content
stringlengths
1
15.9M
\section{Introduction} Expanding shells are ubiquitous in the interstellar medium. They are driven by energetic phenomena of massive stars, such as emission of ionizing photons, stellar winds, and supernova explosions. Recently, using 102 samples identified as shell, \citet{Detal10} found evidences of the star formation in more than a quarter of the shells, suggesting that the triggered star formation by HII regions may be an efficient process of the massive star formation. Theoretically, \citet{EL77} presented a sequential star formation scenario where the massive star formation takes place through gravitational fragmentation of the expanding shell that is driven by HII regions surrounding massive stars, and newly formed massive star also triggers the formation of next generation. To understand the triggered star formation, it is important to investigate how and when the expanding shell fragments through the gravitational instability (GI). Earliest studies were done by using linear analyses of the static dense gas layer confined by the same thermal pressures of hot rarefied gases on both sides \citep{GL65,EE78,LP93}. They showed that the GI begins to develop with a scale comparable to the layer thickness and with a growing timescale comparable to the free-fall time of the layer. However, their linear analyses are oversimplified because the actual shells are confined by the shock front (SF) on the leading surface and the contact discontinuity (CD), or the ionization front (IF) on the trailing surface. Moreover, an unbalance between the ram pressure and the thermal pressure causes a decelerating or an accelerating expansion. Many authors have tackled the stability analyses with these effects by mainly using the thin-shell approximation where the perturbed variables are averaged across the thickness. The stability analysis of expanding shells has been investigated by \citet{V83}, \citet{E94}, and \citet{Wetal94b}. They took into account dilution effects of perturbations owing to the expansion and the mass accretion. Their linear analyses of expanding shells neglected the structure across the thickness and the boundary effect of the CD. Thus, how these effects that they neglected influence the GI have been unknown yet. \citet{V88} investigated stability of asymmetric layers, and found that the asymmetry of the density profile of the shell greatly influences the development of the GI. Moreover, by using shock-like boundary conditions, he found that the different choice of the boundary condition greatly modifies the dispersion relation. However, their analysis is limited to be in the incompressible fluid. In this paper, we perform a linear analysis taking into account the structure across the thickness and the effects of boundaries, i.e., the SF on the leading surface and the CD on the trailing surface. In order to determine the density profile all the time, we develop a semi-analytic method that well describes the one-dimensional (1D) evolution. This paper extends the study of \citet{V88} to include the compressible effect and the more realistic density profile by taking into account the radial self-gravitational force \citep{WF02}. We neglect the effects of expansion and mass accretion through the SF. In this paper, since we focus on investigation of how the boundary effects and asymmetric density profiles influence the GI, we do not apply our result to estimate fragmentation time and scale. We will perform three-dimensional simulation of expanding shells to compare with the results of the linear analysis, and present detailed quantitative aspects of the fragmentation process of expanding shells in a subsequent paper \citep[][submitted]{IIT11}. The outline of the paper is as follows: in Section \ref{sec:HII}, we present a thin-shell model of the expanding shell driven by the HII region. In Section \ref{sec:unp}, we develop a semi-analytic method to derive time evolution of the density profile. We investigate influences of the asymmetric density profile on the dispersion relation of the GI by considering pressure-confined layer in Section \ref{sec:asym}. In Section \ref{sec:shell}, we perform linear analysis of expanding shells by using density profile obtained in Section \ref{sec:unp} and by imposing the approximate SF and the CD boundary conditions. In Section \ref{sec:discuss}, we compare our results with previous works. Summary is presented in Section \ref{sec:summary}. \section{Thin-Shell Model Driven by HII Region}\label{sec:HII} Massive stars emit ultraviolet photons ($h\nu>13.6$ eV) and produce HII regions around them. Here, we consider a massive star that emits ionizing photons with the photon number luminosity $Q_\mathrm{UV}\:[\mathrm{s}^{-1}]$, into the ambient gas with the uniform density of $\rho_\mathrm{E}=mn_\mathrm{E}$, where $n_\mathrm{E}$ and $m$ are the number density and the mean mass of the ambient gas particle, respectively. In the standard picture \citep[e.g.,][]{S78}, the IF initially expands with a supersonic speed with respect to the sound speed of ionized gas, $c_\mathrm{II}$. The HII region begins to expand by the pressure difference between the HII region and the ambient gas when the IF reaches the Str{\"o}mgren radius, $R_\mathrm{ST}$ given by \begin{equation} R_\mathrm{ST} = \left( \frac{3Q_\mathrm{UV}}{4\pi \alpha_\mathrm{B} n_\mathrm{E}^2} \right)^{1/3}, \end{equation} where $\alpha_\mathrm{B}$ indicate the case-B recombination coefficient. In this phase, the SF emerges in front of the IF and sweeps up the ambient gas into a dense shell. This paper focuses on the evolution of the shell after the shock emerges. The equation of motion of the shell is given by \begin{equation} \frac{\mathrm{d} }{\mathrm{d} t}\left(M_\mathrm{s} \frac{\mathrm{d} R_\mathrm{s}}{\mathrm{d} t} \right) = 4\pi R_\mathrm{s}^2 P_\mathrm{II}, \label{eom shell} \end{equation} where $M_\mathrm{s}=4\pi G \rho_\mathrm{E} R_\mathrm{s}^3/3$ is the total mass of the shell, i.e. the mass of the ambient gas that initially occupied the volume of the HII region, $R_\mathrm{s}$ is the mean radius of the shell and $P_\mathrm{II}$ is the thermal pressure of the HII region. Here, we neglect the pressure of the ambient gas and the thickness of the shell. In the HII region, the detailed balance between the recombination and the ionization is approximately established all the time. Therefore, $P_\mathrm{II}$ can be expressed using $R_\mathrm{s}$ as follows: \begin{equation} P_\mathrm{II} = \rho_\mathrm{E} c_\mathrm{II}^2 \left( \frac{R_\mathrm{ST}}{R_\mathrm{s}} \right)^{3/2}. \label{Pii} \end{equation} Using Equation (\ref{Pii}), we obtain the solution of Equation (\ref{eom shell}), \begin{equation} R_\mathrm{s}(t) = R_\mathrm{ST}\left( 1+\frac{7}{\sqrt{12}}\frac{c_\mathrm{II} t}{R_\mathrm{ST}} \right)^{4/7} \label{thin-shell} \end{equation} \citep{HI06}. Equations (\ref{eom shell}) and (\ref{thin-shell}) are valid only in the early phase. As the shell sweeps up the ambient gas and increases its mass, the self-gravity influences the expansion. The equation of motion including the self-gravity becomes \begin{equation} \frac{\mathrm{d} }{\mathrm{d} t}\left( M_\mathrm{s} \frac{\mathrm{d} R_\mathrm{s}}{\mathrm{d} t} \right) = 4\pi R_\mathrm{s}^2 P_\mathrm{II} - \frac{G M_\mathrm{s}^2}{2R_\mathrm{s}^2}, \label{eom shell grav} \end{equation} where the second term on the right-hand side represents the self-gravitational force \citep{WF02}. The factor of $1/2$ in the self-gravity term arises because the gravitational acceleration vanishes at the inner surface, it is $GM_\mathrm{s}/R_\mathrm{s}^2$ at the outer surface, and the mass-weighted average across the thickness is $GM_\mathrm{s}/2R_\mathrm{s}^2$. One can see that the self-gravity slows the expansion in Equation (\ref{eom shell grav}). In this paper, for convenience, the units of the time, length, and mass scales are taken to be \begin{equation} t_0 = \sqrt{\frac{3\pi}{32G\rho_\mathrm{E}}} = 1.6\;n_\mathrm{E,3}^{-1/2}\;\mathrm{Myr}, \label{t scale} \end{equation} \begin{equation} R_0 = \left( \frac{7 c_\mathrm{II} t_0}{\sqrt{12}} \right)^{4/7} R_\mathrm{ST}^{3/7} = 5.9\; Q_\mathrm{UV,49}^{1/7}\: n_\mathrm{E,3}^{-4/7}\;\mathrm{pc}, \label{r scale} \end{equation} and \begin{equation} M_0 = \rho_\mathrm{E} R_0^3 = 5.0\times10^3\; Q_\mathrm{UV,49}^{3/7}\: n_\mathrm{E,3}^{-5/7}\;M_\odot, \label{m scale} \end{equation} respectively, where $Q_\mathrm{UV,49}=Q_\mathrm{UV}/10^{49}\:\mathrm{s}^{-1}$, and $n_\mathrm{E,3}=n_\mathrm{E}/10^3\:\mathrm{cm^{-3}}$. Non-dimensional quantities normalized by $t_0$, $R_0$, and $M_0$ are expressed by using tilde, e.g., $\tilde{R}_\mathrm{s}=R_\mathrm{s}/R_0$. Using non-dimensional quantities, we can rewrite Equations (\ref{Pii}) and (\ref{eom shell grav}) as \begin{equation} \tilde{P}_\mathrm{II} = \frac{12}{49}\tilde{R}_\mathrm{s}^{-3/2}, \label{nondim PII} \end{equation} and \begin{equation} \frac{\mathrm{d} }{\mathrm{d} \tilde{t}}\left( \tilde{R}_\mathrm{s}^3 \frac{\mathrm{d} \tilde{R}_\mathrm{s}}{\mathrm{d} \tilde{t}} \right) = \left(\frac{6}{7}\right)^2\tilde{R}_\mathrm{s}^{1/2} - \frac{\pi^2}{16}\tilde{R}_\mathrm{s}^4, \label{eom shell nondim} \end{equation} respectively. \begin{figure}[htpb] \begin{center} \includegraphics[width=8cm]{f1.eps} \end{center} \caption{ Expansion laws of shells. The abscissa and ordinate axes indicate the time $t/t_0$ and the radius of the shell $R_\mathrm{s}/R_0$, respectively. The solid lines correspond to the case with ($n_\mathrm{E}/\mathrm{cm^{-3}}$, $Q_\mathrm{UV}/\mathrm{s^{-1}}$)$=(10^3$, $10^{49})$, $(10^2$, $10^{49})$, $(10^4$, $10^{49})$, $(10^3$, $10^{48})$, and $(10^3$, $10^{45})$. } \label{fig:Quv n} \end{figure} We integrate Equation (\ref{eom shell nondim}) with respect to time with the initial condition, $\tilde{R}=\tilde{R}_\mathrm{ST}$ at $\tilde{t}=0$. The initial velocity $\mathrm{d}\tilde{R}_\mathrm{ST}/\mathrm{d}\tilde{t}$ is obtained from Equation (\ref{thin-shell}) with $\tilde{t}=0$. Figure \ref{fig:Quv n} shows the obtained expansion law with various parameters, $(n_\mathrm{E}/\mathrm{cm^{-3}}$, $Q_\mathrm{UV}/\mathrm{s^{-1}})=(10^3$, $10^{49})$, $(10^2$, $10^{49})$, $(10^4$, $10^{49})$, $(10^3$, $10^{48})$, and $(10^3$, $10^{45})$. The difference of these parameter gives the different values of $\tilde{R}_\mathrm{s}$ at $\tilde{t}=0$ as shown in Figure \ref{fig:Quv n}. In Figure \ref{fig:Quv n}, it is seen that as the shell expands, the lines quickly approach to an asymptotic line that is independent of the parameters. Therefore, the dependence of the expansion law on the parameters is approximately eliminated by using the non-dimensional quantities. \citet{WF02} derived similar thin-shell equations for the shells driven by steady stellar winds. They found a change of the power-law index (from 3/5 to 1/5) at the time when the self-gravity starts to be important. In the gravity dominated phase, the shell expands keeping the force balance between the thermal pressure of the hot bubble and the self-gravity. In the stellar wind case, the steady energy input allows the outward expansion of the shell ($\propto R_\mathrm{s}^{1/5}$) even when the self-gravity becomes important. On the other hand, in the case with the HII regions, from Equation (\ref{eom shell nondim}), the gravitational force ($\propto \tilde{R}_\mathrm{s}^4$) increases more rapidly than the pressure force by the HII region ($\propto \tilde{R}_\mathrm{s}^{1/2}$), suggesting that the shell begins to collapse toward the center at a certain radius. In the numerical calculation, it occurs at $\tilde{R}_\mathrm{s}\sim2.3$ in all parameters. The last term of Equation (\ref{eom shell nondim}) is valid until only the expansion phase. In reality, besides ionizing photon, the massive star emits strong stellar wind continuously over several tens of million years and dies through supernova explosion \citep{W77}. They may influence the dynamics of the shell in the self-gravity dominated phase. In this paper, for simplicity, we focus on the expansion phase by the ionizing photon. \section{Time Evolution of Density Profiles: Unperturbed State}\label{sec:unp} In this section, we derive the time evolution of the density profile of the shell in a semi-analytic way. We assume that the shell is in instantaneous hydrostatic equilibrium at each instant of time. This is reasonable assumption because the shell is very thin and the sound-crossing time across the thickness is very short compared with the expansion timescale. The equation of the hydrostatic equilibrium in the frame of the shell is given by \begin{equation} -\frac{c_\mathrm{s}^2}{\rho}\frac{\mathrm{d} \rho}{\mathrm{d} r} - \frac{\mathrm{d} \phi}{\mathrm{d} r} + g_\mathrm{dec}=0, \label{hydrostatic} \end{equation} where $g_\mathrm{dec} = -\mathrm{d}^2 R_\mathrm{s}/\mathrm{d} t^2$ is the inertial force owing to the deceleration of the shell, and is assumed to be spatially constant within the shell. In the decelerating shell, the inertia force is parallel to the radial direction. The Poisson equation is \begin{equation} \frac{\mathrm{d}^2 \phi}{\mathrm{d} r^2} + \frac{2}{r}\frac{\mathrm{d} \phi}{\mathrm{d} r}\simeq \frac{\mathrm{d}^2 \phi}{\mathrm{d} r^2} = 4\pi G \rho, \label{poisson} \end{equation} where the curvature effect is neglected because $R_\mathrm{s}$ is much larger than the thickness. We confirmed that the curvature effect is negligible by comparing density profiles with and without curvature effect. Substituting Equation (\ref{hydrostatic}) into Equation (\ref{poisson}), one obtains \begin{equation} \frac{\mathrm{d} }{\mathrm{d} r}\left( \frac{c_\mathrm{s}^2}{\rho} \frac{\mathrm{d} \rho}{\mathrm{d} r} \right) = -4\pi G \rho. \label{hydro stat} \end{equation} Equation (\ref{hydro stat}) can be solved analytically as follows: \begin{equation} \rho(r) = \rho_{00}\left\{\mathrm{cosh}\left( \frac{r-R_\mathrm{c}}{H_0} \right)\right\}^{-2}, \label{den prof} \end{equation} where $R_\mathrm{c}$ and $\rho_{00}$ are the radius and the density where $\mathrm{d} \rho /\mathrm{d} r=0$, respectively \citep[c.f.][]{S42}, and $H_0\equiv c_\mathrm{s}/\sqrt{2\pi G \rho_{00}}$ is the scale height. From Equation (\ref{den prof}), if we determine $\rho_{00}$ and $R_\mathrm{c}$, the density profile is completely specified except for the boundaries that are discussed later. Here, the value of $R_\mathrm{c}$ itself loses its physical meaning since the curvature is neglected. Therefore, only $\rho_{00}$ specifies the density profile. The peak density $\rho_\mathrm{00}$ is determined by the condition of the force balance at $r=R_\mathrm{CD}$. The gravitational force must vanish at $r=R_\mathrm{CD}$ because the total mass of the hot bubble is negligible. Therefore, from Equation (\ref{hydrostatic}), the inner boundary conditions are given by \begin{equation} \frac{c_\mathrm{s}^2}{\rho}\frac{\mathrm{d} \rho}{\mathrm{d} r}\Bigr|_{r=R_\mathrm{CD}} = g_\mathrm{dec}. \label{bound} \end{equation} The column density from $R_\mathrm{CD}$ to $R_\mathrm{c}$ is \begin{equation} \Sigma_\mathrm{dec}= \int_{R_\mathrm{CD}}^{R_\mathrm{c}} \rho \mathrm{d} r = \rho_{00} H_0 \tanh \left( \frac{ R_\mathrm{c}-R_\mathrm{CD} }{H_0} \right) = \frac{g_\mathrm{dec}}{4\pi G}, \label{sigmaacc} \end{equation} where we use Equation (\ref{bound}) in the last equality. The characteristic column density $\Sigma_\mathrm{dec}$ represents the amount of the deceleration. The ratio of the column density $\Sigma_\mathrm{s}$ to $\Sigma_\mathrm{dec}$ determines the importance of self-gravity relative to deceleration. From Equation (\ref{sigmaacc}) and the pressure equilibrium at the CD, $\rho(R_\mathrm{CD})c_\mathrm{s}^2 =P_\mathrm{II}$, the peak density can be expressed by $\Sigma_\mathrm{dec}$ and $P_\mathrm{II}$ as follows: \begin{equation} \rho_{00}c_\mathrm{s}^2 = P_\mathrm{II} + 2\pi G \Sigma_\mathrm{dec}^2. \label{den p sig} \end{equation} Substituting Equation (\ref{sigmaacc}) into Equation (\ref{den p sig}), one obtains \begin{equation} \rho_{00}c_\mathrm{s}^2 = P_\mathrm{II} + \frac{g_\mathrm{dec}^2}{8\pi G}. \label{den00} \end{equation} The peak density $\rho_{00}$ is determined by the following way. We use the thin-shell model shown in Section \ref{sec:HII} to get $\mathrm{d}^2R_\mathrm{s}/\mathrm{d}t^2=-g_\mathrm{dec}$ and ${R}_\mathrm{s}$ at any given times. The pressure of the HII region $P_\mathrm{II}$ is given by Equation (\ref{Pii}). Substituting obtained $g_\mathrm{dec}$ and $P_\mathrm{II}$ into Equation (\ref{den00}), we can get $\rho_{00}$, and can specify the functional form of the density profile. Next, we determine the positions of boundaries, both the CD and the SF. As mentioned above, only the distance relative to $R_\mathrm{c}$ has physical meaning. The position of the CD and the SF is determined from the pressure balances on both sides which are given by \begin{equation} c_\mathrm{s}^2 \rho(R_\mathrm{CD}) = P_\mathrm{II}\;\;\;\mathrm{and}\;\;\; c_\mathrm{s}^2 \rho(R_\mathrm{SF}) = \rho_\mathrm{E} \left( \frac{\mathrm{d} R_\mathrm{s}}{\mathrm{d}t} \right)^2, \label{bound0} \end{equation} respectively, where $\mathrm{d} R_\mathrm{s}/\mathrm{d}t$ is obtained from the thin-shell model. \subsection{Three Evolutionary Phases of Density Profiles}\label{sec:den evo} \begin{figure*}[htpb] \begin{center} \begin{tabular}{ccc} \includegraphics[width=5.5cm]{f2a.eps} \hspace{-6mm} & \includegraphics[width=5.5cm]{f2b.eps} \hspace{-6mm} & \includegraphics[width=5.5cm]{f2c.eps} \end{tabular} \end{center} \caption{ Schematic pictures of the density profiles of the shell in (a) deceleration-dominated phase $(\Sigma_\mathrm{s}<\Sigma_\mathrm{dec})$, (b) intermediate phase $(\Sigma_\mathrm{dec}<\Sigma_\mathrm{s}<2\Sigma_\mathrm{dec})$, and (c) self-gravity-dominated phase $(2\Sigma_\mathrm{dec}<\Sigma_\mathrm{s})$. } \label{fig:linear} \end{figure*} \begin{figure}[htpb] \begin{center} \includegraphics[width=8cm]{f3.eps} \end{center} \caption{ Time evolution of the ratio of the column density $\Sigma_\mathrm{s}$ to the characteristic column density $\Sigma_\mathrm{dec}$ (Equation (\ref{sigmaacc})). Evolutionary phases corresponding to Figure \ref{fig:linear} are labeled. } \label{fig:den_pro} \end{figure} The time evolution of the density profile is characterized by the ratio of the column density $\Sigma_\mathrm{s}$ to the characteristic column density $\Sigma_\mathrm{dec}$. Here, the column density $\Sigma_\mathrm{s}$ is given by the thin-shell approximation (see Section \ref{sec:HII}). The column density $\Sigma_\mathrm{s}=\rho_\mathrm{E} R_\mathrm{s}/3$ can be derived from the mass conservation, since $M_\mathrm{s}=4\pi G R_\mathrm{s}^2\Sigma_\mathrm{s}$ (see Section \ref{sec:HII}). The time evolution of the density profile is roughly divided into the following three phases: deceleration-dominated phase ($\Sigma_\mathrm{s}<\Sigma_\mathrm{dec}$), intermediate phase ($\Sigma_\mathrm{dec}<\Sigma_\mathrm{s}<2\Sigma_\mathrm{dec}$), and self-gravity-dominated phase ($2\Sigma_\mathrm{dec}<\Sigma_\mathrm{s}$), depending on the value of $\Sigma_\mathrm{s}/\Sigma_\mathrm{dec}$. The schematic pictures of the density profiles in these three phases are shown in Figures \ref{fig:linear}. Figure \ref{fig:den_pro} shows the time evolution of $\Sigma_\mathrm{s}/\Sigma_\mathrm{dec}$. In the early deceleration-dominated phase, $R_\mathrm{c}$ is outside of the shell and it is in front of the SF, or $R_\mathrm{SF}<R_\mathrm{c}$ (see Figure \ref{fig:linear}(a)). This means that the actual density peak exists at $R_\mathrm{SF}$. As the shell expands, $\Sigma_\mathrm{s}$ increases by accretion while $\Sigma_\mathrm{dec}$ decreases by deceleration. In Figure \ref{fig:den_pro}, it is seen that $\Sigma_\mathrm{s}$ becomes larger than $\Sigma_\mathrm{dec}$ at $t/t_0\sim 0.44$. When $\Sigma_\mathrm{s}>\Sigma_\mathrm{dec}$, $R_\mathrm{c}$ is inside the shell. In the intermediate phase ($\Sigma_\mathrm{dec}<\Sigma_\mathrm{s}<2\Sigma_\mathrm{dec}$), $R_\mathrm{c}$ is closer to $R_\mathrm{SF}$ than $R_\mathrm{CD}$ as shown in Figure \ref{fig:linear}(b). When $\Sigma_\mathrm{s}$ becomes larger than $2\Sigma_\mathrm{dec}$ ($t/t_0>0.57$), $R_\mathrm{c}$ becomes closer to $R_\mathrm{CD}$ than $R_\mathrm{SF}$ (see Figure \ref{fig:linear}(c)). Since the period of the intermediate phase is relatively short, roughly speaking, the density profile transforms from the deceleration- to the self-gravity-dominated profiles around $t/t_0\sim0.5$. \subsection{Comparison with One-Dimensional Simulation} Obtained density profile by above semi-analytic method is compared with results of 1D simulation. We use the 1D spherically symmetric Lagrangian Godunov method \citep{vL97}. We do not calculate the radiative transfer of ionizing photons and ionized gas, but the cold gas is pushed by interior pressure whose value is given by Equation (\ref{Pii}). The equation of state is assumed to be isothermal. We calculate the expanding shell around the 41$M_{\odot}$ star that is embedded by the uniform ambient gas of $n_\mathrm{E}=10^3$ cm$^{-3}$. \begin{figure}[htpb] \begin{center} \includegraphics[width=8cm]{f4.eps} \end{center} \caption{ Snapshots of density profiles for $t/t_0=0.5$, 0.7, 1.0, and 1.26. The abscissae are the distance from the CD. The thick gray lines in the upper panel indicate the results of the 1D simulation. The dashed lines in the upper panel represent the instantaneous hydrostatic density profiles. } \label{fig:1dim} \end{figure} Figure \ref{fig:1dim} shows the snapshots of density profiles for $t/t_0=0.5$, 0.7, 1.0, and 1.26. The thick gray lines represent the results of the 1D calculation. The dashed lines show the density profiles obtained from the semi-analytic method. It is seen that the semi-analytic method describes the density profile of the 1D simulation reasonably well. The density profile in the semi-analytic method is slightly lower than the results of the 1D calculation because the actual CD expands a little slower than the mean radius of the shell $R_\mathrm{s}$ in the thin-shell approximation. As shown in Section \ref{sec:den evo}, one can see that the density peak moves the CD from the SF owing to the self-gravity. \subsection{Scaling Law of Unperturbed Density Profiles}\label{sec:scaling den} As shown in Section \ref{sec:HII}, the non-dimensional position of the shell, $\tilde{R}_\mathrm{s}$, is approximately independent of the model parameters ($n_\mathrm{E}$, $Q_\mathrm{UV}$). Similarly, it is useful to investigate how the density profile depends on the above parameters. The non-dimensional pressures at the CD and the SF are given by Equation (\ref{nondim PII}) and $\tilde{V}_\mathrm{s}^2$, respectively, that is, they are independent of the parameters. Moreover, the pressure at the density peak $\tilde{P}_{00} = \tilde{\rho}_{00}\tilde{c}_\mathrm{s}^2$ is also independent of the parameters as seen in Equation (\ref{den00}). Thus, noting that the non-dimensional sound speed $\tilde{c}_\mathrm{s}=c_\mathrm{s} t_0/R_0$ is proportional to the reciprocal of the typical Mach number ${\cal M}_0=4R_0/(7t_0c_\mathrm{s})$, where the factor of $4/7$ arises from Equation (\ref{thin-shell}), we have the scaling laws of $\tilde{H_0}$, $\tilde{\rho}_{00}$, and $\tilde{t}_\mathrm{ff}$ given by \begin{equation} \tilde{H}_0 \propto \tilde{c}^2_\mathrm{s} \tilde{P}_{00}^{-1/2} \propto {\cal M}_0^{-2}, \label{H sou} \end{equation} \begin{equation} \tilde{\rho}_{00} \propto \tilde{c}_\mathrm{s}^{-2} \tilde{P}_{00} \propto {\cal M}_0^{2}, \end{equation} and \begin{equation} \tilde{t}_\mathrm{ff} \propto \tilde{\rho}_{00}^{-1/2} \propto \tilde{c}_\mathrm{s} \tilde{P}_{00}^{-1/2} \propto {\cal M}_0^{-1}, \label{t sou} \end{equation} respectively, where $t_\mathrm{ff}\equiv 1/\sqrt{2\pi G \rho_{00}}$ is the free fall timescale of the shell. As a result, it is found that the density profiles for various set of $(n_\mathrm{E},\;Q_\mathrm{UV})$ are characterized by a single parameter, that is the typical Mach number, \begin{equation} {\cal M}_0 = \frac{4}{7}\frac{R_0}{c_\mathrm{s} t_0}= 7\; Q_\mathrm{UV,49}^{1/7}\: T_\mathrm{c,10}^{-1/2}\: n_\mathrm{E,3}^{-1/14}, \label{mach} \end{equation} where $T_\mathrm{c,10}=T_\mathrm{c}/10$ K. \section{Influence of Asymmetric Density Profile on Gravitational Instability}\label{sec:asym} As shown in Section \ref{sec:unp}, the expanding shell has the highly asymmetric density profile and it is expected to influence the GI. In this section, we investigate influences of the asymmetric density profile on the dispersion relation of the GI. What we discuss here is to extend the classical stability analysis of the GI in the symmetric layer with respect to the mid-plane \citep{GL65,EE78,LP93} to the GI in the asymmetric layer. The linear analysis in the incompressible limit has been investigated by \citet{V88}. We take $z$-axis parallel to the thickness of the layer, and take $x$-axis as the transverse direction. The density is assumed to peak at $z=0$, and positions of boundaries are $z_1$ and $z_2$ ($z_1<z_2$). We consider a layer that is subject to a constant deceleration. The deceleration arises from the difference of pressures on the boundaries ($z=z_1$ and $z_2$). In this case, the position of the density peak is not in the mid-plane of the layer, the density profile is asymmetric, or $-z_1 \ne z_2 $. The amount of deceleration directly enhances the degree of asymmetry of the density profile. \begin{figure*}[htpb] \begin{center} \includegraphics[width=14.0cm]{f5.eps} \end{center} \caption{ Dispersion relations for (a) the even mode and (b) the odd mode in the symmetric layer with $|z_1|=z_2=3H_0$. The ordinate denotes $\omega^2/2\pi G \rho_{00}$. The abscissa denotes the wavenumber multiplied by the effective thickness of the shell, $H_\mathrm{eff} \equiv \sigma/(2\rho_{00})$. The dashed lines show higher harmonics of the sound wave with respect to the $z$-direction. } \label{fig:sym3.0} \end{figure*} \begin{figure*}[htpb] \begin{center} \includegraphics[width=14.0cm]{f6.eps} \end{center} \caption{ Distribution of the Lagrangian density perturbation, $\Delta \rho/\rho_0\equiv \delta \rho/\rho_0 + v_z \mathrm{d}\ln\rho_0(z)\mathrm{d}z$ for $kH_\mathrm{eff}=3.5$ in the even mode. Each panel corresponds to (a) the P-mode and (b) the SG-mode. The normalization is determined by $|\delta z_2|/z_2=0.1$. } \label{fig:sym3.0 per} \end{figure*} \subsection{Perturbation Equations} We consider the following perturbations: \begin{eqnarray} \rho(z,x,t) & = & \rho_0(z) + \delta \rho(z)e^{i(kx - \omega t)}, \nonumber \\ v_z(z,x,t) & = & v_z(z)e^{i(kx - \omega t)}, \\ v_x(z,x,t) & = & v_x(z)e^{i(kx - \omega t)}, \nonumber\\ \phi(z,x,t) & = & \phi_0(z) + \delta \phi(z)e^{i(kx - \omega t)}. \nonumber \end{eqnarray} Perturbation equations are \begin{equation} -i\omega\delta \rho + \frac{\mathrm{d} (\rho_0 v_z)}{\mathrm{d} z} + \rho_0 ik v_x = 0, \label{eoc per} \end{equation} \begin{equation} i\omega v_z = \frac{\mathrm{d}}{\mathrm{d} z} \left( c_\mathrm{s}^2\frac{\delta \rho}{\rho_0} + \delta \phi \right), \label{eomr per} \end{equation} \begin{equation} \omega v_x = k \left( c_\mathrm{s}^2\frac{\delta \rho}{\rho_0} + \delta \phi \right), \label{eomy per} \end{equation} and \begin{equation} \frac{\mathrm{d}^2 \delta \phi }{\mathrm{d} z^2} - k^2 \delta \phi = 4\pi G \delta \rho, \label{poi per} \end{equation} where the sound speed is assumed to be constant. \subsubsection{Boundary Conditions} To concentrate on the effect of asymmetry of the unperturbed state, we impose the CD boundary conditions at both $z_1$ and $z_2$ \citep{GL65,EE78} as follows: \begin{equation} \delta \rho(z_1) = - \frac{\mathrm{d} \rho_0}{\mathrm{d} z}\Bigr|_{z=z_{1}}\delta z_1,\;\; v_z(z_1) = -i\omega \delta z_1, \label{bou 1 z1} \end{equation} \begin{equation} \frac{\mathrm{d} \delta \phi}{\mathrm{d} z}\Bigr|_{z=z_{1}} - k\delta \phi(z_1) + 4\pi G \rho_0(z_1) \delta z_1, \label{bou 2 z1} \end{equation} and \begin{equation} \delta \rho(z_2) = - \frac{\mathrm{d} \rho_0}{\mathrm{d} z}\Bigr|_{z=z_{2}}\delta z_2,\;\; v_z(z_2) = -i\omega \delta z_1, \label{bou 1 z2} \end{equation} \begin{equation} \frac{\mathrm{d} \delta \phi}{\mathrm{d} z}\Bigr|_{z=z_{2}} + k\delta \phi(z_2) + 4\pi G \rho_0(z_2) \delta z_2, \label{bou 2 z2} \end{equation} where $\delta z_1$ and $\delta z_2$ are the displacements of the surfaces at $z_1$ and $z_2$, respectively. \subsubsection{Numerical Methods}\label{sec:numerical} We solve Equations (\ref{eoc per})-(\ref{poi per}) as a boundary-value problem for a given wavenumber. Equations (\ref{eoc per}), (\ref{eomr per}), and (\ref{poi per}) are integrated from $z=z_1$ to $z_2$ by using the fourth order Runge-Kutta method. Note that $v_x$ is determined by $\delta \rho$ and $\delta \phi$ from Equation (\ref{eomy per}). Given $\omega$, at $z=z_1$, we have five unknown variables ($\delta \rho$, $v_z$, $\delta \phi$, $\mathrm{d}\delta\phi/\mathrm{d}z$, and $\delta z_1$), and have three boundary conditions (see Equations (\ref{bou 1 z1}) and (\ref{bou 2 z1})). Therefore, if we determine two variables $Q_1$ and $Q_2$, all variables at $z_1$ are specified, where $Q_1$ is one of ($\delta \rho$, $v_z$, $\delta z_1$) and $Q_2$ is one of ($\delta \phi$, $\mathrm{d}\delta\phi/\mathrm{d}z$). Generally, the boundary conditions at $z_2$ are not satisfied if we start from arbitrary values of $Q_1$ and $Q_2$ at $z_1$. Equation (\ref{bou 1 z2}) can always be satisfied by using a linear combination of two independent solutions having the boundary values $(Q_1(z_1),\;Q_2(z_1))=(1,0)$ and (0,1). Eigenvalue, $\omega$, is modified iteratively until the solutions satisfy Equation (\ref{bou 2 z2}) by using the Newton-Raphson method. \subsection{Symmetric Layer} First, we investigate the symmetric case with $-z_1=z_2=3H_0$. Because of symmetry, perturbation can be divided by even and odd modes completely. In the even (odd) mode, the density perturbation is symmetric (antisymmetric) with respect to the mid-plane. Figures \ref{fig:sym3.0}(a) and (b) show the dispersion relations for the even and odd modes, respectively. The abscissa denotes the wavenumber multiplied by the effective thickness of the shell, $H_\mathrm{eff} \equiv \sigma/(2\rho_{00})$. It is well known that the unstable mode ($\omega^2<0$) is found only in the even mode. The unstable mode belongs to the ``compressible mode'' that means that the density perturbation in the central region collapses leaving behind the gas around boundaries. The detailed structure of stable modes is also plotted in Figure \ref{fig:sym3.0}. The stable mode can be divided by the ``P mode'' (pressure mode, or compressible mode) and the ``SG mode'' (surface-gravity mode). Figure \ref{fig:sym3.0 per} shows that the distribution of the Lagrangian density perturbation $\Delta \rho\equiv\delta\rho + v_z \mathrm{d}\rho_0/\mathrm{d}z$ for $kH_\mathrm{eff}=3.5$ in the even mode. Figures \ref{fig:sym3.0 per}(a) and (b) correspond to the P and the SG modes, respectively. The normalization is determined by $|\delta z_2|/z_2=0.1$. One can see that $\Delta \rho$ profiles of the P and SG modes are quite different. In the P mode, $\Delta \rho/\rho_0$ peaks at the mid-plane. The displacement of the boundary $|\delta z_2|/z_2$ is negligible compared with $\Delta \rho/\rho_0$. The P mode propagates as longitudinal variation of pressure. On the other hand, the SG-mode has two $\Delta \rho/\rho_0$ peaks near both boundaries, and has the minimum value at the mid-plane. Moreover, since $|\delta z_2|/z_2$ is much larger than $\delta \rho/\rho_0$, the SG mode is almost incompressible. The SG mode propagates as the deformation of the surface. In Figure \ref{fig:sym3.0}(a), it is seen that the unstable mode transforms into the stable P mode around $kH_\mathrm{eff}\sim1$. On the other hand, there is the another stable mode labelled by the SG mode ($kH_0<2$). The P and SG modes approach each other as the wavenumber rises from the small limit. One can see a remarkable feature around $kH_\mathrm{eff}\sim2.5$ where these two modes do not intersect but begin to move apart. At this point, they exchange their properties, suggesting the mode exchange. The mode exchange between the P and the SG modes is also occurred in the odd mode (see Figure \ref{fig:sym3.0}(b)). This is the first time when the mode exchange is found in the dispersion relation of self-gravitating layer. The dashed lines in Figures \ref{fig:sym3.0} show higher harmonics of the sound wave with respect to the $z$-direction. For large wavenumber, the frequencies of the P and the SG modes show different dependence on wavenumber. The P mode shows $k^2$ dependence while the SG mode shows $k$ dependence. The angular frequencies of the SG modes associated by the deformation of $z_1$ and $z_2$ are \begin{equation} \omega_\mathrm{SG,z_1}^2 = - 2\pi G \rho_0(z_1) + \frac{1}{\rho_0}\frac{\partial P_0}{\partial r} \Bigr|_{z_1}k \label{sg mode} \end{equation} and \begin{equation} \omega_\mathrm{SG,z_2}^2 = - 2\pi G \rho_0(z_2) - \frac{1}{\rho_0}\frac{\partial P_0}{\partial r} \Bigr|_{z_2}k, \end{equation} respectively \citep{WS81}, for $kH_0\gg1$. The SG branches for large wavenumber in the even and odd modes are identical with each other because the surface gravities at the two boundaries are the same. \begin{figure*}[htpb] \begin{center} \includegraphics[width=14.0cm]{f7.eps} \end{center} \caption{ Dispersion relations for $-z_1/H_0=$(a)2.0, (b)1.0, (c)0.3, and (d)0.0. The ordinate and the abscissa are the same as Figure \ref{fig:sym3.0}. } \label{fig:asym} \end{figure*} \begin{figure} \begin{center} \includegraphics[width=8.0cm]{f8.eps} \end{center} \caption{ Cross sections of the layers with the fastest growing mode for (a)$-z_1=2.0H_0$ and (b)$-z_1=0.3H_0$. The contour indicates the density perturbation normalized by $\rho_{00}$. The contour levels of the density perturbation take values of 0.04, 0.08, and 0.16. } \label{fig:asym eigen} \end{figure} \subsection{Asymmetric Layer} In this section, we investigate the dependence of the dispersion relation on the degree of the asymmetry by changing $z_1$. Since the layer is no longer symmetric with respect to $z=0$, perturbations cannot be divided into the even and the odd modes. Figure \ref{fig:asym}(a) shows the dispersion relation for $z_1=-2H_0$. One can see more complex structure of the mode exchanges around $kH_\mathrm{eff}\sim2.4$ than that in Figure \ref{fig:sym3.0}. For large wavenumber, the angular frequencies of the two SG modes split because $\omega_\mathrm{SG,z_1}^2<\omega_\mathrm{SG,z_2}^2$. Figure \ref{fig:asym eigen}(a) shows the cross section of the layer ($z_1=-2H_0$) in the fastest growing mode. The contour indicates the density perturbation normalized by $\rho_{00}$. Here, we take $\delta \rho_\mathrm{max}/\rho_{00}=0.2$ to specify the normalization of the perturbations. The arrows represent the velocity vectors. The boundary surfaces hardly deform, and the gas collapses from all directions to the center ($z=0$, $x=0$). This behavior corresponds to the compressible mode. In Figure \ref{fig:asym}(a), the unstable branch transforms the P mode around $kH_\mathrm{eff}\sim1$ and it is connected with the SG mode around $kH_\mathrm{eff}\sim2.4$ through the mode exchange. The case with stronger asymmetry with $z_1=-H_0$ is shown in Figure \ref{fig:asym}(b). In this case, the difference of the angular frequencies between the two SG modes is larger because the surface gravity at $z_1$ is lower. The frequency of the SG mode associated with $z_1$ becomes smaller than that with $z_2$. Comparing with Figure \ref{fig:asym}(a), as well as frequency, the wavenumber of the mode exchange is smaller. As a result, the frequency range of P mode is narrower and the range of the SG mode spreads. The P mode $\omega^2 \propto k^2$ is expected to disappear when the wavenumber of the mode exchange is smaller than a critical wavenumber that separates unstable mode from stable mode. The case with $-z_1<H_0$ is quite different from the case with $-z_1\ge H_0$. The dispersion relation for $-z_1=0.3H_0$ is shown in Figure \ref{fig:asym}(c). In Figure \ref{fig:asym}(c), one can see that the angular frequency of the SG mode $\omega_\mathrm{SG,z_1}^2$ is significantly lower than $\omega_\mathrm{SG,z_1}^2$ for large wavenumbers. Unlike the case with $-z_1>H_0$, the unstable mode appears to directly connect with the SG mode around $kH_\mathrm{eff}\sim1.2$ as mentioned above. Figure \ref{fig:asym eigen}(b) shows the cross section of the layer ($z_1=-0.3H_0$) in the fastest growing mode. The gas tends to collect toward the density peak $z=0$ because the unperturbed gravitational potential has the minimum value there. One can see that eigen-functions in $z>0$ are similar to those in Figure \ref{fig:asym eigen}(a). The gas collapses toward the center ($z=0$, $x=0$) leaving behind the gas around $z_2$. However, in the region where $z<0$, eigenfunctions are quite different. The sound wave can travel between $z_1$ and the density peak many times during the development of the GI. Therefore, collapse toward $z=0$ is suppressed by the pressure gradient. However, the GI can proceed even in $z<0$ through the deformation of the $z_1$ that makes the gravitational potential deeper. From Figure \ref{fig:asym eigen}(b), one can see that the velocity field is not headed for the density peak ($z=0)$ but arises so that the surface at $z_1$ deforms. Therefore, the features of GI in the region $z>0$ and $z<0$ have properties of ``compressible mode'' and ``incompressible mode'', respectively. If the distance of the $z_1$ from the density peak is zero, the layer is unstable for all wavenumbers (see Figure \ref{fig:asym}(d)). \begin{figure}[htpb] \begin{center} \includegraphics[width=8.0cm]{f9.eps} \end{center} \caption{ Dispersion relation of the asymmetric layer for $-z_1/H_0=2$(the thick solid line), $1$(the thick dashed line), $0.3$(the thick dotted line), $0.1$(the thin solid line), $0$(the thin dashed line), and $-0.1$(the thin dotted line), where $z_2/H_0$ is assumed to be $3.0$. } \label{fig:unstable} \end{figure} Figure \ref{fig:unstable} shows the dispersion relation of the unstable mode for variety of $z_1$ with $z_2=3H_0$. The thick solid and the thick dashed lines correspond to $-z_1/H_0=2$ and 1, respectively. For $-z_1/H_0\ge1$, the growth rate $-\omega^2/2\pi G\rho_{00}$ decreases as $-z_1/H_0$ decreases. This property is the same as that in symmetric layers \citep[e.g., see Figure 1 in][]{NIM98}. On the other hand, for the cases with $-z_1/H_0=0.3$ and 0.1, Figure \ref{fig:unstable} shows that the maximum growth rate increases as $-z_1/H_0$ decreases, indicating the opposite tendency to the case with $-z_1/H_0>1$. On the other hand, the wavenumber of the most unstable mode is not different so much. One can see that the square growth rate in large wavenumber is proportional to $\propto k$ while the square growth rate for $-z_1/H_0>1$ is proportional to $\propto k^2$. The unstable mode appears to directly connect with the surface gravity mode at $z_1$ whose frequency is given by Equation (\ref{sg mode}). This is also seen in Figure \ref{fig:disp} for $k>k_\mathrm{max}$. For $-z_1/H_0=0$, the surface gravity mode at $z_1$ becomes unstable for all wavenumber. In this case, destabilized surface gravity wave has the growth rate $\omega_\mathrm{SG,z_1}^2 = -2\pi G \rho(z_1)<0$ independent of $k$ for large wavenumber limit (see Equation (\ref{sg mode})). This is the case with a static shell with $g_\mathrm{dec}=0$ (Equation (\ref{hydrostatic})). \citet{TI83} investigated this situation including shell curvature and found that the shell is unstable for all wavenumber \citep[also see][]{WS81}. For $-z_1/H_0=-0.1$, the square growth rate increases as $\propto k$ with wavenumbers because $\omega_\mathrm{SG,z_1}^2 \sim \frac{1}{\rho_0}\frac{\partial P_0}{\partial r} \Bigr|_{z_2}k<0$ (Equation (\ref{hydrostatic})). This is well-known scaling law of the Rayleigh-Taylor instability. The enhancement of the growth rate for $-z_1/H_0<1$ arises from the combination of the GI and the Rayleigh-Taylor instability. \section{Gravitational Instability of Expanding Shells}\label{sec:shell} In previous section, we focus on the effect of asymmetry of the density profile by imposing the same boundary conditions in both boundaries. In this section, in a more realistic situation, we investigate the stability of expanding shells driven by the expansion the HII region. The unperturbed density profile at each instant of time is given by the semi-analytic method presented in Section \ref{sec:unp}. We neglect the curvature effect and solve the perturbation Equations (\ref{eoc per})-(\ref{poi per}) but $z\rightarrow r$. In this case, as well as in the asymmetric density profile, the difference of boundary properties between leading (the SF) and trailing (the CD) surfaces plays important roles in the GI. \subsection{Influences of Boundaries on the Gravitational Instability} \label{sec:influence} Before presenting a linear analysis, we review how the SF and the CD influence the GI through the boundary effect. This point is important in understanding the results of the linear analysis. In the early phase, the shell is highly confined by the ram pressure on the leading surface and by the thermal pressure on the trailing surface. In this phase, the pressure at boundaries is as large as that at the density maximum, and the thickness of the shell is much smaller than the scale height, $H_0=c_\mathrm{s}/\sqrt{2\pi G \rho_{00}}$, where $\rho_{00}$ is the maximum density. Thus, in this phase, the boundary effect can strongly influence the GI. In the later phase, the boundary effect of the CD is expected to be also important because the density peak is close to the CD as shown in Section \ref{sec:den evo}. In this section, we summarize how the growth rate of GI is controlled by the different boundary conditions. For simplicity, in Section \ref{sec:influence}, the layer is assumed to be symmetric with respect to the mid-plane, and physical variables are averaged across the thickness. \subsubsection{Shock-confined Layer}\label{sec:shock} Many authors have investigated influences of the SF on the GI \citep{V83,E89,N92,V94,E94,Wetal94a,IT08}. The dispersion relation of the shock-confined layer is given by \begin{equation} \omega^2 \simeq c_\mathrm{s}^2k^2 - 2\pi G k\Sigma_\mathrm{s}, \label{disp shock} \end{equation} where $\Sigma_\mathrm{s}$ is the column density, and $k$ is the transverse wavenumber of the perturbation. This dispersion relation is the same as that for the infinitesimally thin layer. In the highly confined layer, it is well known that the perturbation behaves like incompressible mode because the sound-crossing time over the thickness is much smaller than the free-fall timescale, $\sim1/\sqrt{G\rho_{00}}$ \citep{EE78,LP93}. Therefore, density fluctuation is small. The layer becomes unstable mainly by the deformation of the surfaces that makes the perturbation of the gravitational potential deeper. Hereafter, we call this mode the ``incompressible mode''. The deformation of the SF generates the tangential flow carrying the gas from the convex to the concave regions (seen from the downstream). Therefore, the tangential flow tends to make the SF flat, suggesting that it suppresses the growth of the GI. In the shock-confined layer, the restoring term $c_\mathrm{s}^2 k^2$ arises from the tangential flow behind the oblique SF. On the other hand, in the case of the infinitesimally thin layer, this term comes from the pressure gradient. Therefore, the origin of the restoring force is quite different. From Equation (\ref{disp shock}), the maximum growth rate is given by $\pi G \Sigma_\mathrm{s}/c_\mathrm{s}$, and the corresponding wavenumber is given by $\pi G \Sigma_\mathrm{s}/c_\mathrm{s}^2$. When $\Sigma_\mathrm{s}$ is small ($\le \rho_{00}H_0)$, the maximum growth rate is smaller than the inverse of the free-fall timescale, $\sqrt{G \rho_{00}}$, and the corresponding scale is larger than the scale height $H_0$ that is comparable to the Jeans scale. \subsubsection{Pressure-confined Layer} Next, we review the influence of the CD on the GI. We consider the layer confined by thermal pressure of hot rarefied gases (CD boundary condition) on both sides. The dispersion relation becomes \begin{equation} \omega^2 \simeq 2\pi G \Sigma_\mathrm{s} L_\mathrm{s} k^2 - 2\pi G k\Sigma_\mathrm{s}, \label{disp pre} \end{equation} where $L_\mathrm{s}$ is the thickness of the layer, and we consider the large-scale limit where $k\ll 1/L_\mathrm{s}$. Detailed derivation of Equation (\ref{disp pre}) is shown in Appendix 3 of \citet{IT08}. In the pressure-confined layer, the stabilization effect of the tangential flow does not exist. Therefore, the restoring term in Equation (\ref{disp pre}) is quite different from that in Equation (\ref{disp shock}). Using the gravitational acceleration at the surfaces as $|g|=2\pi G \Sigma_\mathrm{s}$, we can express the restoring term in Equation (\ref{disp pre}) by $|g|L_\mathrm{s} k^2$. Therefore, one can see that the restoring force arises from the surface gravity wave. The layer with the CD boundary condition is less stabilized compared with the shock boundary condition because the phase velocity of the gravity wave $\sqrt{|g|L_\mathrm{s}}$ is much smaller than $c_\mathrm{s}$ when $L_\mathrm{s}\ll H_0$. From the dispersion relation (\ref{disp pre}), the maximum growth rate is comparable to the inverse of the free fall time of the layer $\simeq \sqrt{G\rho_{00}}$, and the corresponding wavelength is about the thickness of the layer, $\simeq L_\mathrm{s}$ \citep{EE78,LP93}. Therefore, one can see that the most unstable mode in the pressure-confined layer has a larger growth rate and a smaller scale than the shock-confined layer \citep[see Figure 9 of][in detail]{IT08}. \subsubsection{Expanding Shells} Equations (\ref{disp shock}) and (\ref{disp pre}) cannot be applied directly in the GI of the expanding shells because the GI is expected to be stabilized by evolutionary effects, such as the expansion of the shell and the accretion of fresh gas through the SF. \citet{E94} derived the following approximate dispersion relation, \begin{equation} i\omega = -\frac{3V_\mathrm{s}}{R_\mathrm{s}} + \sqrt{\left( \frac{V_\mathrm{s}}{R_\mathrm{s}} \right)^2 + 2\pi G k\Sigma_\mathrm{s} - c_\mathrm{s}^2k^2}. \label{disp elme} \end{equation} The terms with $V_\mathrm{s}/R_\mathrm{s}$ come from evolutionary effects that stabilize the GI. One can see that Equation (\ref{disp elme}) for the limit of $V_\mathrm{s}/R_\mathrm{s}\rightarrow0$ is the same as Equation (\ref{disp shock}). Therefore, \citet{E94} and \citet{Wetal94b} essentially applied Equation (\ref{disp shock}) in the context of the GI of the expanding shell. However, they did not take into account the boundary effect of the CD on the trailing surface. Comparing Equations (\ref{disp shock}) and (\ref{disp pre}), we suggest that the stability of the thin shell neglecting the effect of the CD is suffered by large stabilizing effect, and it will underestimate the growth rate of GI in expanding shells. \subsection{Boundary Condition}\label{sec:linear bc} First, we assume that a constant pressure exerts on the CD all the time \citep[the CD boundary condition;][]{GL65,EE78}. The boundary conditions are \begin{equation} \delta \rho(R_\mathrm{CD}) = - \frac{\mathrm{d} \rho}{\mathrm{d} r}\Bigr|_{r=R_\mathrm{CD}}\delta R_\mathrm{CD},\;\;\; v_r(R_\mathrm{CD}) = i\omega \delta R_\mathrm{CD}, \label{boundary P} \end{equation} and \begin{equation} \frac{\mathrm{d} \delta \phi}{\mathrm{d} r} - k\delta \phi + 4\pi G \rho(R_\mathrm{CD}) \delta R_\mathrm{CD}=0, \label{boundary phi} \end{equation} where $\delta R_\mathrm{CD}$ is the displacement of the CD. Next, let us consider the boundary conditions at $r=R_\mathrm{SF}$. Since the unperturbed state is assumed to be the hydrostatic configuration, it is impossible to impose the shock boundary conditions self-consistently. In order to treat it self-consistently, time-dependent initial value problem is needed to be solved \citep{W82,IT08}. Therefore, in this paper, we mimic the shock boundary conditions by introducing the stabilization effect. We consider the following two approximate boundary conditions. {\it Rigid surface boundary condition (RSBC). $\frac{\;\;\;\;\;\;}{\;\;\;\;\;\;}$} \citet{V88} and \citet{UHF95} assumed that no ripples arise on the surface, or $\delta R_\mathrm{SF}=0$, where $\delta R_\mathrm{SF}$ is the displacement of the SF. The reason why we adopt $\delta R_\mathrm{SF}=0$ is that the thin-shell linear analysis of the layer confined by rigid surfaces gives the same dispersion relation as that of the shock-confined layer (Equation (\ref{disp shock})). In more precisely, in the shock-confined layer, the tangential flow boosts the suppression effect against the self-gravity as mentioned in Section \ref{sec:shock}. Instead, the RSBC weakens the self-gravity. {\it Tangential flow boundary condition (TSBC). $\frac{\;\;\;\;\;}{\;\;\;\;\;}$} If the SF is rippled, the tangential flow behind the SF is generated. Therefore, we set the tangential velocity $v_x$ at $r=R_\mathrm{SF}$. Linearizing the Rankine-Hugoniot relation, we have \begin{equation} v_x (R_\mathrm{SF}) = - \left( \dot{R}_\mathrm{SF} - \frac{c_\mathrm{s}^2}{\dot{R}_\mathrm{SF}} \right) ik \delta R_\mathrm{SF}. \label{bound tan} \end{equation} The detailed derivation of Equation (\ref{bound tan}) is found in \citet{IT08}. With both of above boundary conditions (RSBC and TFBC), we also impose the following ordinary used boundary conditions, \begin{equation} v_r(R_\mathrm{SF}) = i\omega \delta R_\mathrm{SF}, \end{equation} and \begin{equation} \frac{\mathrm{d} \delta \phi}{\mathrm{d} r} + k\delta \phi + 4\pi G \rho(R_\mathrm{SF}) \delta R_\mathrm{SF}=0. \end{equation} It is well known that the SF of the deceleration shell is subject to the hydrodynamical overstability \citep{V83}. The linear analysis in this paper cannot capture the Vishniac instability (VI) correctly since the approximate shock boundary conditions are imposed. The effect of the VI is discussed in Section \ref{sec:discuss}. The numerical method is the same as that in Section \ref{sec:numerical}. \subsection{Scaling Law of Dispersion Relations}\label{sec:scaling disp} As shown in Section \ref{sec:scaling den}, it is found that the density profiles are characterized by a single parameter ${\cal M}_0$. This is because the scale height, the peak density, and the free fall time have the scaling laws with respect to ${\cal M}_0$ as shown in Equations (\ref{H sou})-(\ref{t sou}). The same is the case with the perturbation equations and the dispersion relation. The non-dimensional maximum growth rate $\tilde{\omega}_\mathrm{max}\equiv\omega_\mathrm{max} t_0$ and the corresponding wavenumber $\tilde{k}_\mathrm{max}\equiv k_\mathrm{max}R_0$ scale as $\propto {\cal M}_0$ and $\propto {\cal M}_0^{2}$, respectively. Therefore, in the present model, the evolution of the shell for various set of $(n_\mathrm{E},\:Q_\mathrm{UV})$ can be described by a single unperturbed profile and a single time-dependent dispersion relation that are normalized by $H_0$, $\rho_{00}$, and $t_\mathrm{ff}$. The result can be applicable to a wide range of parameters simply by using the scaling relation on ${\cal M}_0$. \subsection{Results} \begin{figure}[htpb] \begin{center} \includegraphics[width=8cm]{f10.eps} \end{center} \caption{Dispersion relations derived from our linear analysis using RSBC (the solid lines) and TFBC (the dotted lines). For comparison, the dispersion relation of shock-confined layer (Equation (\ref{disp shock})) is plotted by the dashed gray lines. The thick gray lines represent modified dispersion relation (Equation (\ref{disp mod})). The abscissa and ordinate axes indicate the wavenumber $kH_0/2\pi$ and the growth rate normalized by $t_\mathrm{ff}=1/\sqrt{2\pi G \rho_{00}}$, respectively. } \label{fig:disp} \end{figure} \begin{figure}[htpb] \begin{center} \includegraphics[width=8cm]{f11.eps} \end{center} \caption{Time evolution of the ratio of $c_\mathrm{eff}$ to $c_\mathrm{s}$. } \label{fig:ratio} \end{figure} \begin{figure}[htpb] \begin{center} \includegraphics[width=8cm]{f12.eps} \end{center} \caption{ Cross section of the shell is plotted using eigenfunctions. The corresponding time and angular wavenumber are $t/t_0=1.3$ and $l=52$, respectively. The contour indicates the density perturbation normalized by $\rho_{00}$. The vectors represent velocity perturbations. } \label{fig:cross} \end{figure} At any time, the unperturbed state is given by the procedure in Section \ref{sec:unp}. Perturbation Equations (\ref{eoc per})-(\ref{poi per}) are solved as the eigenvalue- and boundary-value problem. As a result, the growth rate, $\omega(k,t)$ can be obtained as a function of the wavenumber and time. First, we present the results of the linear analysis in Figure \ref{fig:disp} at various epochs. The ordinate and the abscissa axes represent the non-dimensional growth rate $\omega t_\mathrm{ff}$ and wavenumber $kH_0/2\pi$. The solid and the dotted lines indicate the results of the linear analysis using RSBC and TFBC, respectively. We refer the growth rates obtained by using RSBC and TFBC to $\omega_\mathrm{RSBC}$ and $\omega_\mathrm{TFBC}$, respectively. The dependence of the dispersion relation on the parameters $(n_\mathrm{E},\:Q_\mathrm{UV})$ can be eliminated by using non-dimensional growth rate $\omega t_\mathrm{ff}$ and wavenumber $kH_0$ as shown in Section \ref{sec:scaling disp}. We have confirmed that the dispersion relation is identical to that with other parameter sets of $(n_\mathrm{E},\;Q_\mathrm{UV})$ by using the non-dimensional quantities. Figure \ref{fig:disp} shows that the difference between $\omega_\mathrm{RSBC}$ and $\omega_\mathrm{TFBC}$ is negligible although RSBC and TFBC are physically quite different. In this analysis, we do not take into account the evolutionary effects, such as the expansion and accretion of the gas. Therefore, we compare the results of the linear analysis with the dispersion relation of the shock-confined layer (Equation (\ref{disp shock})) rather than that of the expanding shell (Equation (\ref{disp elme})). One can see that the growth rate is larger than the prediction from the shock-confined layer. As shown in Section \ref{sec:influence}, this difference comes from the boundary effect of the CD. Therefore, the shell is expected to begin to grow earlier and to fragment more quickly than the prediction from \citet{E94} that is based on Equation (\ref{disp shock}). The dispersion relation with CD + SF boundary conditions is expected to lie between that with SF + SF (Equation (\ref{disp shock})) and that with CD + CD (Equation (\ref{disp pre})). Therefore, to approximate the dispersion relation with RSBC analytically, we combine Equation (\ref{disp shock}) with Equation (\ref{disp pre}) as follows: \begin{equation} \omega_\mathrm{mod}^2 = c_\mathrm{eff}^2 k^2 - 2\pi G k \Sigma_\mathrm{s}, \label{disp mod} \end{equation} where $c_\mathrm{eff}$ is the effective sound speed, \begin{equation} c_\mathrm{eff} = \sqrt{ A 2\pi G \Sigma_\mathrm{s} L_\mathrm{eff} + \left( \frac{c_\mathrm{s}}{2} \right)^2}, \label{soueff} \end{equation} where $A$ is a parameter and $L_\mathrm{eff}=\Sigma_\mathrm{s}/\rho_{00}$ is the effective thickness that approaches the actual thickness $L_\mathrm{s}$ for small $\Sigma_\mathrm{s}$ and $2H_0$ for large $\Sigma_\mathrm{s}$. The first and the second terms inside the square root correspond to the effect of the CD and the SF boundary conditions, respectively. Here, we choose the parameter $A$ by the condition where the maximum value of $\omega_\mathrm{mod}$ coincides with that of $\omega_\mathrm{RSBC}$. As a result, it is found that a single value of $A=0.39$ shows good agreement in growth rates between the modified dispersion relation and the detailed linear analysis. The modified dispersion relations in Equation (\ref{disp mod}) are plotted by the thick gray lines in Figure \ref{fig:disp}. In Figure \ref{fig:disp}, one can see that $\omega_\mathrm{mod}$ well describes $\omega_\mathrm{RSBC}$ for $k<k_\mathrm{max}$ all the time. This suggests that simply Equation (\ref{disp mod}) can describe the most unstable mode obtained by the detailed linear analysis all the time. Figure \ref{fig:ratio} shows the time evolution of the effective sound speed. In the early phase, $c_\mathrm{eff}$ is about $0.5c_\mathrm{s}$, suggesting that the effect of the CD diminishes the effective sound speed $c_\mathrm{eff}$ by half in Equation (\ref{disp shock}). As the shell expands, $c_\mathrm{eff}$ increases. The effect of asymmetric density is seen in Figure \ref{fig:disp} where it is found that $\omega_\mathrm{mod}$ deviates from $\omega_\mathrm{RSBC}$ for $k>k_\mathrm{max}$ in the gravity-dominated phase ($t/t_0>0.5$). This is because $\omega_\mathrm{mod}^2$ connects with the P mode $\propto k^2$ while $\omega_\mathrm{RSBC}^2$ connects with the SG mode $\propto k$ as shown in Section \ref{sec:asym}. The predicted cross section of the shell by the linear analysis for $(Q_\mathrm{UV}=10^{48.78}$ $\mathrm{s^{-1}}$, $ n_\mathrm{E}=10^3$ $\mathrm{cm}^{-3})$ is shown in Figure \ref{fig:cross} by using the eigenfunctions. The corresponding time is $t/t_0=1.3$ and the angular wavenumber is $l=52$. In Figure \ref{fig:cross}, the gas tends to accumulate onto the peak only through the upper half region $r>R_\mathrm{c}$. This property of the flow can be seen from the direction of arrows in Figure \ref{fig:cross}. Actually, in the upper half region, we find $R_\mathrm{SF}-R_\mathrm{c}=1.05H_0>H_0$ that represents that the gas can collapse to the peak because the sound wave cannot travel from $R_\mathrm{c}$ to $R_\mathrm{SF}$ within the free fall time. On the other hand, in the region of bottom half ($r<R_\mathrm{c}$), we find that $R_\mathrm{c}-R_\mathrm{CD}=0.285H_0<H_0$. This indicates that the gas in $r<R_\mathrm{c}$ cannot collapse to the peak because the sound wave can travel from $R_\mathrm{c}$ to $R_\mathrm{CD}$ many times within the free fall time. Thus, the pressure gradient prevents the compression of gas in the region $r<R_\mathrm{c}$. However, the GI can proceed even in $r<R_\mathrm{c}$ through the deformation of the CD that makes the gravitational potential deeper. Therefore, the features of GI in the region $r>R_\mathrm{c}$ and $r<R_\mathrm{c}$ have the properties of the ``compressible mode'' and ``incompressible mode'', respectively. \section{Discussion}\label{sec:discuss} The gravitational fragmentation of expanding shells confined from both sides by the CD was investigated by \citet{Detal09} numerically and by \citet{WDPW10} using analytical approximations. They assumed that the thermal pressure on both sides is the same and temporally constant. Therefore, the density peak is always around the mid-plane of the shell, and the density profile is almost symmetric. In their calculation, the column density decreases with time because the shell expands keeping the mass fixed. Therefore, the pressures at the boundaries approach to the peak pressure. They found that the confining pressure accelerates fragmentation in the later phase, and described this effect as ``pressure-assisted'' gravitational fragmentation. This mode is the same as the incompressible mode in this paper. \citet{WDPW10} established a semi-analytic linear analysis that explains results of \citet{Detal09}. The linear analysis in this paper cannot describe the VI correctly since the approximate shock boundary conditions are imposed in Section \ref{sec:shell}. The original analysis by \citet{V83} did not find the finite scale most unstable mode because the thickness of the shell is neglected. \citet{VR89} derived a simple analytic dispersion relation of the VI for a decelerating isothermal spherical shock wave taking into account the effect of the thickness \citep[also see][]{RV87}. Although, their analysis did not include the self-gravity, here, we use their dispersion relation (see Equations 19(a) and (b) in their paper) to estimate the effect of the VI. Their dispersion relation depends on the Mach number ${\cal M}$ of the shell and the expansion law. For the case with the expanding HII regions, the shell expands as $\propto t^{4/7}$ if the self-gravity is neglected. In this case, the perturbation grows not exponentially but in a power-law $\propto t^s$, where $s$ characterizes the growth rate. Figure \ref{fig:vishniac} shows the real part of $s$ as a function of the angular wavenumber $l$. One can see that the maximum growth rate $\mathrm{Re}(s)$ increases with ${\cal M}$. The angular scale of the most unstable mode is smaller for larger $\cal M$. We find that the unstable mode exists only for ${\cal M}\ge4.7$. To see the typical value of the Mach number, we consider the expanding shell around the 41$M_{\odot}$ star that is embedded by the uniform ambient gas of $n_\mathrm{E}=10^3$ cm$^{-3}$. Figure \ref{fig:v} shows the Mach number of the shell for $T_\mathrm{c}$ = 10 K (the solid line) and 30 K (the dashed line). In the early phase when the self-gravity is not important ($t/t_0<0.5$), since the Mach number is as large as several tens, Re$(s)$ is large. The small scale perturbation with $l=10^2\sim10^3$ quickly grows and saturates in the nonlinear stage \citep{MN93}. On the other hand, in the later phase (the self-gravity-dominated phase, $t/t_0>0.5$), the Mach number is as low as $5-10$ as shown in Figure \ref{fig:v}. In this phase, Re$(s)\sim 1$ from Figure \ref{fig:vishniac}. This means that the growth rate of the perturbations is comparable to the expansion rate $\propto t^{4/7}$. Therefore, in the self-gravity-dominated phase, the VI is not expected to be important. The influence of VI on the GI is expected to be only the increase of the initial amplitude of perturbations for the GI. \begin{figure}[htpb] \begin{center} \includegraphics[width=8cm]{f13.eps} \end{center} \caption{ Growth rate of the VI when the shell expands as $\propto t^{4/7}$. Each line corresponds to ${\cal M}=4.7$, 10, 7, and 4.7. } \label{fig:vishniac} \end{figure} \begin{figure}[htpb] \begin{center} \includegraphics[width=8cm]{f14.eps} \end{center} \caption{ The Mach number of the shell for $Q_\mathrm{UV}=10^{49}\:s^{\mathrm{-1}}$ and $n_\mathrm{E}=10^3$ cm$^{-3}$. The solid and the dashed lines indicate the case with $T_\mathrm{c}$=10 K and 30 K, respectively. } \label{fig:v} \end{figure} \section{Summary}\label{sec:summary} In this paper, we have performed linear perturbation analysis of decelerating shells created by the expansion of HII regions. We summarize our results as follows: \begin{enumerate} \item We develop a semi-analytic method for describing the density profile in the shell. The time evolution of the density profile of the expanding shell can be divided into three phases, deceleration-dominated, intermediate, and self-gravity-dominated phase. In the deceleration-dominated phase, the density peak is in SF by the inertia force owing to the deceleration. As the shell mass increases and the self-gravity becomes important, the density peak is inside the shell, but it is closer to the SF than the CD in the intermediate phase. In the self-gravity-dominated phase, the shell becomes massive and the density peak is closer to the CD than the SF. The evolution is confirmed by 1D hydrodynamical simulation. \item We show detailed structures of dispersion relation in the asymmetric layer subjected to a constant deceleration both of unstable and stable modes by imposing the CD boundary condition from/at both sides. \begin{itemize} \item We discover the mode exchange between the compressible and surface-gravity modes in the stable regime. \item In a situation where the distance from one surface $z_1$ to the density peak $z=0$ is smaller than the scale height of the self-gravity $H_0$ and the distance from the other surface $z_2$ to $z=0$ larger than $H_0$, the nature of the GI is quite different from the symmetric case with the same column density and the peak density. The eigenfunction in the region $0<z<z_2$ is approximately the compressible mode. On the other hand, the eigenfunction in the region $z_1<z<0$ is approximately the incompressible mode. Moreover, the growth rate is enhanced compared with symmetric cases through cooperation with the Rayleigh-Taylor instability. \end{itemize} \item We investigate linear stability of expanding shells driven by HII regions taking into account the shock-like boundary condition on the leading surface, the CD boundary condition on the trailing surface, and the asymmetric density profile obtained by the semi-analytic method. \begin{itemize} \item The shell is expected to grow earlier than the prediction of previous studies \citep{E94,Wetal94b} that are based on the dispersion relation of the shock-confined layer. \item In the self-gravity-dominated phase, since the density peak is closer to the CD than the SF, the CD is expected to deform significantly. \end{itemize} \end{enumerate} These results provide useful knowledge for the analysis of more detailed nonlinear numerical simulations that is the scope of our next paper \citep{IIT11}. \acknowledgments We thank the referee for many constructive comments that improve our paper significantly. This work was supported by Grants-in-Aid for Scientific Research from the MEXT of Japan (K.I.:22864006; S.I.:18540238 and 16077202), and Research Fellowship from JSPS (K.I.:21-1979). This work was based on the results of the companion paper \citep{IIT11} where numerical computations carried out on Cray XT4 at the CfCA of Numerical Astronomical Observatory of Japan. The page charge of this paper is supported by CfCA
\section{Introduction} \parag{Natural extension and regular part.} Let $f:\overline{\mathbb{C}} \to \overline{\mathbb{C}} = \mathbb{C} \cup \{\infty\}$ be a rational function of degree $\ge 2$. It generates a non-invertible dynamical system $(f,\overline{\mathbb{C}})$ but it also generates an invertible dynamics in the space of ``backward orbits" (the inverse limit) $$ {\mathcal{N}}_f := \braces{\hat{z} = (z_{-n})_{n \ge 0} \,:\, z_0 \in \overline{\mathbb{C}},~z_{-n} = f(z_{-n-1})} $$ with action $$ \hat{f}((z_0, z_{-1}, \ldots )) := (f(z_0), f(z_{-1}), \ldots ) = (f(z_0), z_0, z_{-1}, \ldots ). $$ We say ${\mathcal{N}}_f$ (with dynamics by $\hat{f}$) is the \textit{natural extension} of $f$, with topology induced by $\overline{\mathbb{C}}\times\overline{\mathbb{C}}\times \cdots$. Note that the {\it projection} $\pi:{\mathcal{N}}_f \to \overline{\mathbb{C}}$ defined by $\pi(\hat{z}):= z_0$ semiconjugates $\hat{f}$ and $f$. In 1990's, M.Lyubich and Y.Minsky \cite{LM} introduced the theory of hyperbolic 3-lamination associated with rational functions, which is analogous to the theory of hyperbolic 3-manifold for Kleinian groups. The theory is based on the study of the natural extension, in particular the subset called the \textit{regular part} (or \textit{regular leaf space}), defined as follows: The point $\hat{z} =(z_0, z_{-1}, \ldots)$ is \textit{regular} if there exists a neighborhood $U_0$ of $z_0$ whose pull-back $\cdots \to U_{-1} \to U_0$ along $\hat{z}$ (i.e., $U_{-n}$ is the connected component of $f^{-1}(U_{n-1})$ containing $z_{-n}$) is eventually univalent. The \textit{regular part} ${\mathcal{R}}_f$ of ${\mathcal{N}}_f$ is the set of all regular points, and we say the point in ${\mathcal{N}}_f-{\mathcal{R}}_f$ is \textit{irregular}. The regular part is invariant under $\hat{f}$, and each path-connected component (``leaf") of the regular part possesses a Riemann surface structure isomorphic to $\mathbb{C}$, $\mathbb{D}$, or an annulus. (The annulus appears only when $f$ has a Herman ring.) \parag{Type problem.} When the critical orbits of $f$ behave nicely, we may regard ${\mathcal{R}}_f$ as a Riemann surface lamination with all leaves isomorphic to $\mathbb{C}$. Such a situation yields some nice properties of dynamics, like rigidity, or existence of conformal invariant measures on the lamination. For example, this is the case when $f$ has no recurrent critical points in the Julia set \cite[Prop.4.5]{LM}. Another intriguing case is when $f$ is an infinitely renormalizable quadratic map with a persistently recurrent critical point \cite[Lem.3.18]{KL}. For general cases, it is questioned in \cite[\S 4, \S 10]{LM} when we have leaves of \textit{hyperbolic type}, especially leaves isomorphic to $\mathbb{D}$. (The counterpart, leaves isomorphic to $\mathbb{C}$, are conventionally called \textit{parabolic}.) Easy examples of hyperbolic leaves are provided by invariant lifts of Siegel disks and Herman rings. Non-rotational hyperbolic leaves (that are rather non-trivial) are found by J.Kahn and by J.Rivera-Letelier. Readers may find details in the paper by J.Kahn, M.Lyubich, and L.Rempe \cite[\S 3]{KLR}, that can be summarized as follows: When the Julia set is contained in the postcritical set, there are infinitely many hyperbolic leaves. In this case such a leaf may not touch the (lifted) Julia set in the natural extension. However, by using the tuning technique and \textit{the Gross star theorem}, which gives a necessity condition of a leaf to be parabolic, we may construct a quadratic polynomial with hyperbolic leaves that do intersect with the Julia set. In both cases, a recurrent critical point plays a crucial role. In the quest of new non-rotational hyperbolic leaves, it is natural to ask the following question: {\it Is there any non-rotational hyperbolic leaf when $f$ has an irrationally indifferent fixed point?} Because existence of such a fixed point implies existence of a recurrent critical point whose postcritical set is a continuum, and it seems really close to the situations in \cite{KLR}. The aim of this note is to give some results on this question. \parag{Siegel disk of bounded type.} $f(z) = e^{2 \pi i \theta}z + z^2$ with irrational $\theta$ of bounded type has a Siegel disk $\Delta$ centered at the origin, whose boundary $\partial \Delta$ is a quasicircle. In Section 2 of this note we give a proof of \begin{thm}[No hyperbolic leaf except the Siegel disk]\label{thm_siegel} In the regular part of the natural extension $f:\overline{\mathbb{C}} \to \overline{\mathbb{C}}$, the only hyperbolic leaf is the invariant lift $\widehat{\Delta}$ of the Siegel disk. \end{thm} In the proof we use Lyubich and Minsky's criteria for parabolic leaves, \textit{uniform deepness} of the postcritical set, and one of McMullen's results on bounded type Siegel disks. \parag{Feigenbaum maps.} It would be worth mentioning that the same method as the proof of Theorem \ref{thm_siegel} can be applied to a class of infinitely renormalizable quadratic maps, called \textit{Feigenbaum maps} (Precise definitions will be given later.) In Section 3 we give an alternative proof a result in \cite{LM} on non-existence of hyperbolic leaves: \begin{thm}[Lyubich-Minsky]\label{thm_feigenbaum_intro} The regular part ${\mathcal{R}}_f$ of a Feigenbaum map $f$ has only parabolic leaves. \end{thm} \parag{Cremer points and hedgehogs.} Section 4 is devoted for rational functions with Cremer fixed points and their hedgehogs. For any small neighborhood of Cremer fixed point $\zeta_0$, there exists an invariant continuum $H$ (a ``hedgehog") containing $\zeta_0$, equipped with invertible ``sub-dynamics" $f|~H \to H$. In Section 4, we will present a proof of the next result by following A.Ch\'eritat: \begin{thm}[Lifted hedgehogs are irregular]\label{thm_Hhat_intro} The invariant lift $\widehat{H}$ of $H$ is a continuum contained in the irregular part of the natural extension. \end{thm} Since this natural extension has a continuum of irregular points, one may expect to apply the classical Gross star theorem to find a hyperbolic leaf, as in \cite{KLR}. However, the actual situation is not that good. It is still difficult to show the (non-)existence of hyperbolic leaves without assuming the same conditions as \cite{KLR}. Indeed, we will show that the irregular points in hedgehogs are not big enough to apply the Gross star theorem. \parag{Acknowledgment.} The authors would like to thank A.Ch\'eritat, J.Kahn, M.Lyubich, and L.Rempe for stimulating discussions on this subject. \section{No hyperbolic leaves except Siegel disks} Here we give a proof of Theorem \ref{thm_siegel}. The idea is fairly simple and we will apply it to Feigenbaum quadratic maps in the next section. Let us start with some terminologies: \parag{Postcritical sets.} Let $f:\mathbb{C} \to \mathbb{C}$ be a polynomial of degree more than one and we denote the set of its critical points by $C_f$. The \textit{postcritical set} of $f$ is defined by $$ P_f := \overline{ \bigcup_{n \ge 1} f^n(C_f)}. $$ For example, if $f(z) = e^{2 \pi i \theta}z + z^2$ with $\theta$ of bounded type, then its Siegel disk $\Delta$ is a quasidisk and its boundary contains the only critical point $c_0 = -e^{2 \pi i \theta}/2$. Since the dynamics of $f:\overline{\Delta} \to \overline{\Delta}$ is topologically conjugate to an irrational rotation, we have $\partial \Delta = P_f$. \parag{Deep points and uniform deepness.} Let $K$ be a compact set in $\mathbb{C}$. For $x \in K$, let $\delta_x(r)$ denote the radius of the largest open disk contained in $\mathbb{D}(x, r)-K$. (When $\mathbb{D}(x,r) \subset K$, we define $\delta_x(r) := 0$.) Then it is not difficult to check that the function $(x,r) \mapsto \delta_x(r)$ is continuous. We say $x \in K$ is a \textit{deep point} of $K$ if $\delta_x(r)/r \to 0$ as $r \to 0$. \footnote{The original version due to C.McMullen \cite[\S 2.5]{Mc1} is as follows: $x \in K$ is a \textit{deep point} if $\delta_x(r) = O(r^{1 + {\alpha}})$ for some $\alpha>0$. Here we mildly generalize it.} For a subset $P$ of $K$, we say $P$ is \textit{uniformly deep} in $K$ if for any $\epsilon>0$ there exists an $r_0$ such that for any $x \in P$ and $r<r_0$, we have $\delta_x(r)/r <\epsilon$. \parag{Deepness and measurable deepness.} For a given measurable set $X \subset \mathbb{C}$, let $|X|$ denote its area. For a compact set $K$ in $\mathbb{C}$ and an $X$ with $0<|X| < \infty$, we define the {\it density} of $K$ in $X$ by $$ \mathrm{dens}(K/X) := \frac{|K \cap X|}{|X|}. $$ We say $x \in K$ is a {\it measurable deep point} of $K$ if $\mathrm{dens}(K/\mathbb{D}(x,r)) \to 1$ as $r \to 0$. We say a subset $P$ of $K$ is {\it uniformly measurable deep} in $K$ if for any $\epsilon>0$, there exists an $r_0 >0$ such that for any $x \in P$ and $r<r_0$ we have $$ 1-\epsilon < \mathrm{dens}(K/\mathbb{D}(x,r)) \le 1. $$ \begin{lem}\label{lem_deepness} Let $K$ be a compact set in $\mathbb{C}$. Then \begin{enumerate}[\rm (1)] \item If $x \in K$ is a measurable deep point of $K$, then $x$ is a deep point. \item If $P \subset K$ is uniformly measurable deep in $K$, then $P$ is uniformly deep. \end{enumerate} \end{lem} \begin{pf} It is enough to show (2): Suppose that $P$ is uniformly measurable deep. Then for any $\epsilon >0$, there exists an $r_0$ such that $1-\epsilon <\mathrm{dens}(K/\mathbb{D}(x,r))$ for any $x \in P$ and $r<r_0$. Since $$ \mathrm{dens}(K/\mathbb{D}(x,r)) \le \frac{|\mathbb{D}(x,r)| -\pi \delta_x(r)^2}{|\mathbb{D}(x,r)|} = 1-\frac{\delta_x(r)^2}{r^2}, $$ we have $\delta_x(r)/r < \sqrt{\epsilon}$. This implies that $P$ is uniformly deep. \hfill $\blacksquare$\end{pf} \parag{Uniform deepness of the postcritical set.} Now let us go to the proof of Theorem \ref{thm_siegel}. Set $f(z) = e^{2 \pi i \theta}z + z^2$, where $\theta$ is of bounded type. Its Siegel disk is denoted by $\Delta$. We will use the following result by C.McMullen \cite[\S 4]{Mc2}: \begin{thm}[Uniform deepness of $P_f = \partial \Delta$]\label{thm_McMullen} The postcritical set $P_f = \partial\Delta$ is uniformly measurable deep in $K_f$. In particular, $P_f$ is uniformly deep by Lemma \ref{lem_deepness} above. \end{thm} Indeed, it is shown in \cite[\S 4]{Mc2} that there exist two positive constants $\alpha$ and $C$ such that for any $x \in \partial\Delta$, $ \mathrm{dens}(K_f/\mathbb{D}(x,r)) \ge 1-C r^{\alpha} $ for sufficiently small $r>0$. \footnote{ The uniformity cannot be found in the statements of \cite{Mc2}, but it comes from the geometry of the Siegel disk $\Delta$ as a quasidisk. See also \cite[Cor.5, p.42]{BC} for a bit more elementary proof for the uniformity. } \begin{pf}[Theorem \ref{thm_siegel}] Let ${\mathcal{R}} = {\mathcal{R}}_f$ be the regular part of ${\mathcal{N}}_f$, and $\widehat{\Delta}$ be the invariant lift of the Siegel disk $\Delta$. We will show that for any leaf $L$ of ${\mathcal{R}}-\widehat{\Delta}$ is parabolic. We first claim: \textit{Any leaf $L$ of ${\mathcal{R}}-\widehat{\Delta}$ contains a backward orbit $\hat{z}$ that stays in $\mathbb{C}- K_f$.} In fact, if $L$ is parabolic, the projection $\pi:L \to \mathbb{C}$ has at most two exceptional values by Picard's theorem, and we can find such a $\hat{z}$. If $L$ is hyperbolic and $\pi(L) \cap J_f \neq \emptyset$, the claim is true because $\pi$ is an open map. In the remaining case $\pi(L)$ is contained in a Fatou component $U$. Since there is no critical point in the Fatou set, the projection $\pi:L \to U$ has to be a conformal isomorphism that cannot be extended. This happens only when $L = \widehat{\Delta}$, because $P_f = \partial \Delta$. Hence the claim is justified. \parag{Case 1.} When $\hat{z} = \braces{z_{-n}}$ does not accumulate on $P_f =\partial\Delta$, the leaf $L = L(\hat{z})$ is parabolic by a criterion of parabolicity by Lyubich and Minsky \cite[Cor.4.2]{LM}. \parag{Case 2.} Now let us assume that $\hat{z} = \braces{z_{-n}}$ accumulates on $P_f = \partial\Delta$. Since $z_{-n}$ is contained in the basin at infinity, none of $z_{-n}$ hits the filled Julia set $K_f$, in particular, none of $z_{-n}$ hits $\partial \Delta$ either. By another criterion of parabolicity by Lyubich and Minsky \cite[Lem 4.4]{LM}, it is enough to show: \begin{quote} {\it $\norm{Df^{-n}(z_0)} \to 0 ~(n \to \infty)$, where $Df^{-n}$ is the derivative of the branch of $f^{-n}$ sending $z_0$ to $z_{-n}$, and the norm is measured in the hyperbolic metric of $\mathbb{C}-\partial\Delta$.} \end{quote} Then $L = L(\hat{z})$ is a parabolic leaf. Now set $\Omega:= \mathbb{C} - \overline{\Delta}$. Then $z_{-n}$ is contained in $\Omega$ for all $n$. Since $\Omega$ is topologically a punctured disk, it has a unique hyperbolic metric $\rho= \rho(z)|dz|$ induced by the metric $|dz|/(1-|z|^2)$ of constant curvature $-4$ on the unit disk. To show the claim, it is enough to show $$ \norm{Df^{n}(z_{-n})}_\rho = \frac{\rho(z_0)|Df^{n}(z_{-n})|}{\rho(z_{-n})} \to \infty~~(n \to \infty), $$ where the norm in the left is measured in the hyperbolic metric $\rho$. Here is a well-known property on $\rho$ that plays an important role (See for example, \cite[Thm. 1-11]{Ah}): \begin{lem}\label{lem_metric} The hyperbolic metric $\rho_U = \rho_U(z)|dz|$ of any hyperbolic domain $U \subset \mathbb{C}$ is bounded by $1/d$-metric. More precisely, $$ \rho_U(z) \le \frac{1}{d(z, \partial U)} $$ for any $z \in U$. \end{lem} We can check this by comparing $\rho_U$ and the hyperbolic metric on the disk of radius $r = d(z, \partial U)$ centered at $z$. Of course this lemma holds for $U = \Omega$. Now it is enough to show: \begin{equation}\label{eq:Df} \norm{Df^{n}(z_{-n})}_\rho \asymp \frac{|Df^{n}(z_{-n})|}{\rho(z_{-n})} \ge d(z_{-n}, \partial \Delta)|Df^{n}(z_{-n})| \to \infty. \end{equation} Set $R_n: = d(z_{-n}, \partial \Delta)$. By assumption, $R_n$ tends to $0$ by taking $n$ in a suitable subsequence. Let $D_0$ denote the disk of radius $R_0$ centered at $z_{0}$, and let $U_n$ denote the connected component of $f^{-n}(D_0)$ containing $z_{-n}$. Since $D_0 \subset \Omega$, we have a univalent branch $g_n:D_0 \to U_n$ of $f^{-n}$. Set $v_n: = |Dg_n(z_0)| = |Df^n(z_{-n})|^{-1} >0$. By the Koebe $1/4$ theorem, $g_n(D_0) = U_n$ contains the disk of radius $R_0 v_n/4$ centered at $z_{-n}$, and since $U_n \subset f^{-n}(\Omega) \subset \Omega$ we have $R_0 v_n/4 \le R_n$. \parag{Case 2-1:} First assume that $\liminf v_n/R_n = 0$. If $n$ ranges over a suitable subsequence, we have $v_n/R_n \to 0$ and thus (\ref{eq:Df}) holds. (Note that by the proof of \cite[Lem 4.4]{LM} we need (\ref{eq:Df}) only for a subsequence.) \parag{Case 2-2:} Next consider the case when $\liminf v_n/R_n = q >0$. We may assume that $n$ ranges over a subsequence with $\lim v_n/R_n =q$. For $t>0$, let $tD_0$ denote the disk $\mathbb{D}(z_0, tR_0)$. Since $D_0 = \mathbb{D}(z_0,R_0)$ is centered at a point in $\mathbb{C}-K$, we can choose an $s<1$ such that $sD_0 \subset \mathbb{C}-K$. By the Koebe 1/4-theorem, $|g_n(sD_0)|$ contains $\mathbb{D}(z_{-n}, sR_0v_n/4) \subset \mathbb{C}-K$. Let us take a point $x_n$ in $\partial\Delta$ such that $|x_n-z_{-n}| =R_n$. Then we have $$ \mathbb{D}(z_{-n}, sR_0v_n/4) \subset \mathbb{D}(x_n, 2R_n) $$ and thus $\delta_{x_n}(2R_n) \ge sR_0v_n/4$. Recall the assumption $v_n/R_n \sim q>0$ for $n \gg 0$. This implies that the ratio $\delta_{x_n}(2R_n)/2R_n$ is bounded by a positive constant from below. However, $R_n =d(z_{-n}, \partial \Delta) \to 0$ by assumption and it contradicts to the uniform deepness of $P_f$ (Theorem \ref{thm_McMullen}). \hfill $\blacksquare$ \end{pf} \section{Feigenbaum quadratic polynomials} In this section we give an alternative proof of Theorem \ref{thm_feigenbaum_intro} (\cite[Lem 4.6]{LM}). \parag{Infinitely renormalizable quadratic maps.} Let $U$ and $V$ be a topological disk with $U \Subset V \Subset \mathbb{C}$. A proper branched covering $g:U \to V$ of degree two is called a \textit{quadratic-like map}. A quadratic map $f_c$ is \textit{infinitely renormalizable} if there is a sequence of quadratic-like maps $g_n:U_n \to V_n~(n = 0,1, \ldots)$ such that: $0 \in U_n$ and it is the critical point of $g_n$; $g_n$ is a restriction of $f_c^{p_n}$ on $U_n$ for some $p_n \in \mathbb{N}$; and for each $n$ the ratio $p_{n + 1}/p_n$ is an integer $ \ge 2$. \parag{Feigenbaum maps.} An infinitely renormalizable quadratic map $f_c$ is called \textit{Feigenbaum} (or \textit{Feigenbaum-like}) if there exist positive constants $b$ and $m$ independent of $n$ such that $p_{n + 1}/p_n \le b$ and we can choose $U_n$ and $V_n$ satisfying $\mathrm{mod}(V_n-\overline{U_n}) \ge m$. Now let us restate Theorem \ref{thm_feigenbaum_intro}: \begin{thm}[Lyubich-Minsky]\label{thm_feigenbaum} The regular part ${\mathcal{R}}_f$ of a Feigenbaum quadratic map $f$ has only parabolic leaves. \end{thm} To apply the same argument as Theorem \ref{thm_siegel}, we first show: \begin{prop}[Uniformly deep postcritical set] \label{prop_feigenbaum} The postcritical set $P_f$ of a Feigenbaum quadratic map $f$ is uniformly deep in the filled Julia set $K_f$. \end{prop} \begin{pf} By McMullen \cite[Thm.8.3]{Mc1}, each point in the postcritical set is a deep point of $K = K_f$, so we only need to show the uniform deepness. Here we follow the idea of \cite[Cor. 5]{BC}. Let us prove it by contradiction: Suppose that there exist an $\eta >0$, and sequences $x_i \in P_f$ and $r_i \searrow 0$ such that $\delta_{x_i}(r_i)/r_i \ge \eta$ for all $i \in \mathbb{N}$. Then for each disk $D_i:= \mathbb{D}(x_i, r_i)$ we can find a disk $\Delta_i:= \mathbb{D}(y_i, \eta r_i)$ in $D_i -K$. We may also assume that $x_i \to x \in P_f$ as $i \to \infty$. For $n \in \mathbb{N}$ set $$ Q_n := \braces{z \in P_f \,:\, \text{for any $r < 1/n$ }~\delta_{z}(r)/r \le \eta/20}. $$ Then $Q_n$ is a closed set with $Q_{n} \subset Q_{n + 1}$ and $P_f = \bigcup Q_n$. It is known that the postcritical set $P_f$ is a Cantor set with minimal invertible dynamics $f|\,P_f \to P_f$ \cite[Chap.8]{Mc1}. In particular, $P_f$ itself is a complete metric space by the Euclidean metric on $\mathbb{C}$. Hence by the Baire category theorem there exists an $N$ such that $Q_N$ contains an open ball of $P_f$. More precisely, there exists a round disk $V$ such that $E:= V \cap P_f \subset Q_N$. Next we take a neighborhood $U$ of $x$ and a univalent map $g:U \to g(U)$ such that $g(x) \in E$, $g(U \cap P_f) = g(U) \cap E$, and $g(U \cap K) = g(U) \cap K$. In fact, when $x$ does not land on the critical point, we just take a small disk $U$ around $x$ and $k \in \mathbb{N}$ such that $f^k(x) \in E$. (Here we used the minimality of the dynamics on $P_f$.) Then we have a univalent map $g = f^k|_U$ as desired. Otherwise, there exist a $y \in E$ and a $k \in \mathbb{N}$ such that $f^k(y) = x$ (again by minimality) with $Df^k(y)\neq 0$. Then we take a small disk $U$ where univalent branch $g$ of such $f^k$ is defined. For both cases, we may take $U$ as a disk of certain radius $r_0$ centered at $x$. Now let us work with the deepness: Let $v$ denote $|Dg(x)| \neq 0$ and $tU~(t >0)$ denote the disk $\mathbb{D}(x,tr_0)$. By the Koebe distortion theorem, we can find a $t \in(0,1)$ such that $$ \frac{v}{2} \le |Dg(z)| \le 2 v $$ for any $z \in tU \subset U$. When $i$ is sufficiently large, $D_i$ is contained in $tU$ and we have $$ g(D_i) \subset \mathbb{D}(g(x_i), 2 v r_i) ~~\text{with}~~ g(x_i) \in E. $$ Moreover, by the Koebe 1/4 theorem, $$ g(\Delta_i) \supset \mathbb{D}\paren{g(y_i), \frac{|Dg(y_i)| \eta r_i}{4}} \supset \mathbb{D}\paren{g(y_i), \frac{v \eta r_i}{8}}. $$ Since $g(\Delta_i) \subset \mathbb{C} -K$, we have $ \delta_{g(x_i)}( 2 v r_i) \ge v \eta r_i/8 $ and thus $$ \frac{\delta_{g(x_i)}( 2 v r_i)}{2 v r_i} \ge \frac{\eta}{16} > \frac{\eta}{20}. $$ This is a contradiction, since $g(x_i) \in E \subset Q_N$ and $r_i \to 0$. \hfill $\blacksquare$ \end{pf} \begin{pf}[Theorem \ref{thm_feigenbaum}] We just follow the proof of Theorem \ref{thm_siegel}. Take a leaf $L$ of ${\mathcal{R}}_f$. To show $L$ is parabolic we only need to check: \begin{enumerate}[(i)] \item We can always take a backward orbit $\hat{z} \in L$ contained in $\mathbb{C}-K_f$. \item The hyperbolic metric on $U = \mathbb{C}-P_f$ is hyperbolic in order to apply Lemma \ref{lem_metric}. \item The postcritical set $P_f$ is uniformly deep in $K_f$. \end{enumerate} (i) is clear since $K_f$ has no interior. (ii) is also clear because $P_f$ contains at least two points. (iii) is checked by Proposition \ref{prop_feigenbaum}. \hfill $\blacksquare$ \end{pf} \parag{Remark.} As Lyubich and Minsky's original proof of Theorem \ref{thm_feigenbaum_intro} in \cite[Lem. 4.6]{LM}, it would be possible to show Theorem \ref{thm_siegel} without using the deepness of the postcritical set. The virtue of our proofs presented here is that we only concern with the geometry of the Julia set and the postcritical set, and there is no need to look at the dynamics in detail. One may expect to apply it to the Cremer case. But so far the authors do not have any example of Cremer quadratic map with uniformly deep postcritical set. \section{Lifted hedgehogs and the Gross criterion} Let $f:\overline{\mathbb{C}} \to \overline{\mathbb{C}}$ be a rational function of degree more than one that has a Cremer fixed point $\zeta_0$. Here is a fundamental result due to P\'erez-Marco (See \cite[Thm. 1]{PM1} and \cite[Thm. 2]{PM2}): \begin{thm}[Cremer hedgehogs]\label{thm_PM} Let $D_0$ be any neighborhood of $\zeta_0$ where $f$ is univalent and there exists a univalent branch $g:D_0 \to \mathbb{C}$ of $f^{-1}$ with $g(\zeta_0) = \zeta_0$. Then for any Jordan neighborhood $D \Subset D_0$ of $\zeta_0$, there exists a compact set $H \subset \overline{D}$ containing $\zeta_0$ with the following properties: \begin{enumerate} \item $H$ is a connected and full continuum in the Julia set. \item $g(H) = H$, $f(H) = H$, and $H \cap \partial D \neq \emptyset$. \item There exists a subsequence $\braces{n_k} \subset \mathbb{N}$ such that $f^{n_k}|_H \to \mathrm{id}~~(k \to \infty)$. \end{enumerate} \end{thm} We say $H$ a \textit{hedgehog} of the Cremer point $\zeta_0$. By this theorem we have an invertible ``sub-dynamics" $f:H \to H$. Let ${\mathcal{N}} = {\mathcal{N}}_f$ be the natural extension of $f:\overline{\mathbb{C}} \to \overline{\mathbb{C}}$ and $\widehat{H}$ be the {\it lifted hedgehog} in ${\mathcal{N}}$, that is, the set of backward orbits in remaining in $H$. Here we restate Theorem \ref{thm_Hhat_intro}: \begin{thm}[Lifted hedgehogs are irregular]\label{thm_Hhat} Any point $\hat{z}$ in $\widehat{H}$ is irregular in ${\mathcal{N}}$. In particular, $\widehat{H}$ forms a continuum of irregular sets. \end{thm} The authors learned the principal idea of the proof by A.Ch\'eritat. \begin{pf} Suppose that $\hat{z} = (z_0,z_{-1}, \ldots) \in \widehat{H}$ is a regular point, that is, there exists a neighborhood $U_0$ of $z_0 \in H$ such that its pull-back along $\hat{z}$ is eventually univalent. By replacing $z_0$ by $z_{-n}$ with sufficiently large $n$, we may assume that whole pull-back $\cdots \to U_{-1} \to U_0$ along $\hat{z}$ is univalent. Then $g^n|~ U_0 \to \overline{\mathbb{C}}$ makes sense for all $n$ and $U_{-n} = g^n(U_0)$ does not touch the critical set $C_f$ and its preimage $f^{-1}(C_f)$. Since $f$ has degree more than one, the family $\braces{g^n|U_0}$ is normal and thus it has a holomorphic sequential limit $\lim g^{n_k} = G:U_0 \to \overline{\mathbb{C}}$. If $G$ is not constant, then the set $G(U_0)$ is an open set intersecting with $H$. Since $f^{n_k} \circ G \to \mathrm{id}~(k \to \infty)$, $f^{n_k}$ is normal on $G(U_0)$. This implies that $G(U_0)$ is contained in the Fatou set, but it contradicts the fact that $H$ is contained in the Julia set. Now $G$ must be constant. However, we may also assume that $g^{n_k}|{U_0 \cap H} \to \mathrm{id}$ by the theorem above. This is again a contradiction. Since the backward action $g:H \to H$ is a homeomorphism, $H$ and $\widehat{H}$ is homeomorphic. Hence $\widehat{H}$ is a compact continuum. \hfill $\blacksquare$ \end{pf} \subsection{Does a hedgehog generate any hyperbolic leaves?} By the theorem above, we have a fairly big set of irregular points in the natural extension generated by the Cremer hedgehogs. Hence, according to \cite[Lem.3.3]{KLR}, one would expect to apply the Gross star theorem to find hyperbolic leaves. However, we will see that these hedgehogs are not big enough to apply the Gross star theorem. For simplicity we consider the case when $f(z) = z^2 + c$ is a quadratic polynomial. Let $P$ and $J$ denote the postcritical set and the Julia set. (Conventionally we remove $\infty$ from quadratic postcritical sets.) For the natural extension ${\mathcal{N}} = {\mathcal{N}}_f$, let $\pi_{-n}:{\mathcal{N}} \to \overline{\mathbb{C}}$ denote the projection $\pi_{-n}(\hat{z}) = z_{-n}$, the $n$-th entry of $\hat{z}$. Instead of $\pi_0$ we use the notation $\pi$ as before. \parag{The Gross criterion.} Fix any $z_0 \in \mathbb{C}-P$. Then each $\hat{z} \in \pi^{-1}(z_0)$ is regular in ${\mathcal{N}}$. In particular, the projection $\pi:L(\hat{z}) \to \overline{\mathbb{C}}$ is locally univalent near $\pi:\hat{z} \mapsto z_0$. \if0 \footnote{Any leaf of the regular part ${\mathcal{R}}_f$ contains such a $\hat{z}$ by the same reasoning as the proof of Theorem \thmref{thm_siegel}.Indeed, we can take it such that $\hat{z} \in \mathbb{C} - K_f$. } \fi Let $\ell(\theta)~(\theta \in [0,2\pi))$ denote the half-line given by $\ell(\theta) := \braces{z_0 + re^{i\theta} \,:\, r \ge 0}$. By using the Gross star theorem, \cite[Lem.3.3]{KLR} claims: \textit{ if $L(\hat{z})$ is isomorphic to $\mathbb{C}$, then for almost every angle $\theta \in [0,2\pi)$ the locally univalent inverse $\pi^{-1}: z_0 \mapsto \hat{z}$ has an analytic continuation along the whole half-line $\ell(\theta)$.} Hence to show $L(\hat{z})$ is hyperbolic, we should show: \begin{quote} $(\ast)$: \textit{There exist a $\hat{z} \in \pi^{-1}(z_0)$ and a set of $\theta \in [0, 2\pi)$ of positive length such that the analytic continuation of $\pi^{-1}: z_0 \mapsto \hat{z}$ along $\ell(\theta)$ hits an irregular point at some $z = z_0 + re^{i \theta}$.} \end{quote} This is what they do in \cite[Prop.3.2]{KLR} to find hyperbolic leaves that intersect the Julia set. \parag{Where the irregular points come from?} Now we assume that $(\ast)$ holds in our setting. We will claim that for almost every $\theta$, the irregular point corresponding to the half-line $\ell(\theta)$ does not belong to the lifted hedgehog $\widehat{H}$: that is, the hyperbolic leaf is not generated by $\widehat{H}$. Since the critical orbit $CO:= \braces{f^n(0)}_{n \ge 1}$ is a countable set, the set of angles $\theta$ with $\ell(\theta) \cap CO \neq \emptyset$ is at most countable, i.e., a null set of angles. We may forget about such angles for our purpose. So we define the set $\Theta \subset [0,2\pi)$ as follows: $\theta \in \Theta$ if $\ell(\theta) \cap CO = \emptyset$ and $\ell(\theta) \cap H \neq \emptyset$. Since $H$ is a continuum, $\Theta$ is a set of angles with positive length. One more fact we need to recall is that the hedgehog $H$ does not intersect with $CO$. (But $H$ is contained in $P = \overline{CO}$. See \cite{Ch}.) In fact, if $H \cap CO \neq \emptyset$, the only critical point of $f(z) = z^2 + c$ eventually captured in $H ( = f^n(H)$ for all $n \ge 0)$. However, this contradicts the fact that larger hedgehogs are also contained in $P$. Hence hedgehog $H$ has a ``backward orbit" $\cdots \to H_{-2} \to H_{-1} \to H$ with $H_{-n}$ homeomorphic to $H$. In particular, $\pi^{-1}(H)$ consists of homeomorphic copies of $H$. \begin{prop}\label{prop_} For any $\ell(\theta)$ with $\theta \in \Theta$, there exists a unique path $\ell(\theta,H)$ in the natural extension such that it intersects with $\widehat{H}$ and $\pi: \ell(\theta,H) \to \ell(\theta)$ is a homeomorphism. \end{prop} \begin{pf} Since $\ell(\theta)$ does not contain the points of $CO$, its preimage by $f^n$ consists of exactly $2^n$ disjoint curves. We can uniquely choose one of them that touches $H$, since $\ell(\theta) \cap H \neq \emptyset$, $H \cap CO =\emptyset$, and $f\mid H \to H$ is a homeomorphism. Now the backward orbits remaining in such a curve for each $n$ form a unique path in the natural extension that has a unique initial point $\hat{z}(\theta,H) \in \pi^{-1}(z_0)$ and passes though a point in $\widehat{H}$. This is the desired path $\ell(\theta,H)$. \hfill $\blacksquare$ \end{pf} \parag{Remark.} Note that the analytic continuation along $\ell(\theta)$ of the germ $\pi^{-1}$ near $\pi:\hat{z}(\theta,H) \mapsto z_0$ will have singularity at least when it hits $\widehat{H}$. Next we prove: \begin{prop}\label{prop_injectivity} The map $\chi:\Theta \to \pi^{-1}(z_0)$ defined by $\chi(\theta):= \hat{z}(\theta,H)$ is injective. \end{prop} Recall that every $\theta \in \Theta$ uniquely determines $\ell(\theta,H)$ and $\hat{z}(\theta, H)$. By the proposition above, if there is a $\hat{z} = \hat{z}(\theta, H)$ as in $(\ast)$, then for any $\theta' \in \Theta-\{\theta\}$, the analytic continuation of the locally univalent inverse $\pi^{-1}: z_0 \mapsto \hat{z}(\theta, H)$ along $\ell(\theta')$ does not hit $\widehat{H}$. Hence it can only hit an irregular point that is \textit{not} contained in $\widehat{H}$. \begin{pf} Let us take $\theta \in \Theta$ and $\theta' \in \Theta$ with $\theta \neq \theta'$. Then within the bounded region enclosed by $\ell(\theta)\cup \ell(\theta') \cup H$, we have at least one point in $CO$. (Actually infinitely many.) Let $z_{-n}(\theta,H) \in f^{-n}(z_0)$ denote $\pi_{-n}(\hat{z}(\theta,H))$, i.e., the starting point of the $n$-th pull-back of $\ell(\theta)$ along $\widehat{H}$. Now it is enough to claim: \textit{ There exists an $n$ such that $z_{-n}(\theta',H)$ is different from $z_{-n}(\theta,H)$. } Let $U$ be the connected component of the region enclosed by $\ell(\theta)\cup \ell(\theta') \cup H$ containing $z_0$ on its boundary. Suppose that $z_{-n}(\theta,H) = z_{-n}(\theta',H) =: z_{-n}$ for all $n$. Then we have a pull-back $\braces{U_{-n}}$ of $U = U_0$ that has $\braces{z_{-n}}$ on its boundary. If $U_{-n}$ contains a critical point, $z_{-n}(\theta',H)$ and $z_{-n}(\theta,H)$ can not be the same. (See Figure \ref{fig_H}.) \begin{figure}[htbp] \centering \includegraphics[width=.55\textwidth]{H.eps} \caption{ The star is the critical point and it is mapped to the triangle by $f^n$.}\label{fig_H} \end{figure} Thus $U_{-n}$ does not contain the critical point for all $n$, and we have a univalent branch $h_n:U \to U_{-n}$ of $f^{-n}$. Since $h_n(U)$ avoids $0$, $c$, and $\infty$, $\braces{h_n}$ forms a normal family. By a similar argument as in the theorem above, any sequential limit cannot be an open map and they must be constant. However, this is impossible, because the compact set $\partial U \cap H$ contains a continuum of definite diameter, and the action on $f^{n_k}|\partial U \cap H$ will be arbitrarily close to identity. \hfill $\blacksquare$ \end{pf} In conclusion, the lifted hedgehog $\widehat{H}$ is not big enough to apply the Gross criterion. On the other hand, according to the technique of Theorem \ref{thm_siegel}, it seems reasonable to \parag{Conjecture.} \textit{There exists a Cremer quadratic polynomial whose regular part has no hyperbolic leaf.}
\section{Introduction} \label{section:intro} Data centers spend a significant portion of their overall operational costs towards their electricity bills. As an example, one recent case study suggests that a large 15MW data center (on the more energy-efficient end) might spend about \$1M on its monthly electricity bill. In general, a data center spends between 30-50\% of its operational expenses towards power. A large body of research addresses these expenses by reducing the energy consumption of these data centers. This includes designing/employing hardware with better power/performance trade-offs~\cite{Soyeon07,Zhu04,Gurumurthi03}, software techniques for power-aware scheduling~\cite{Lebeck00}, workload migration, resource consolidation~\cite{Muse}, among others. Power prices exhibit variations along time, space (geography), and even across utility providers. As an example, consider Fig. \ref{fig:one_week} that shows the average hourly spot market prices for the Los Angeles Zone LA1 obtained from CAISO~\cite{caiso}. These correspond to the week of 01/01/2005-01/07/2005 and denote the average price of 1 MW-Hour of electricity. Consequently, minimization of energy consumption need not coincide with that of the electricity bill. \begin{figure} \centering \includegraphics[height=3.5cm, width=8.5cm,angle=0]{price_LA1_1week} \caption{Average hourly spot market price during the week of 01/01/2005 - 01/07/2005 for LA1 Zone \cite{caiso}.} \label{fig:one_week} \end{figure} Given the diversity within power price and availability, attention has recently turned towards {\em demand response} (DR) within data centers. DR within a data center (or a set of related data centers) attempts to optimize the electricity bill by adapting its needs to the temporal, spatial, and cross-utility diversity exhibited by power price. The key idea behind these techniques is to preferentially shift power draw (i) to times and places or (ii) from utilities offering cheaper prices. Typically some constraints in the form of performance requirements for the workload (e.g., response times offered to the clients of a Web-based application) limit the cost reduction benefits that can result from such DR. Whereas existing DR techniques have relied on various forms of workload scheduling/shifting, a complementary knob to facilitate such movement of power needs is offered by {\em energy storage devices}, typically uninterrupted power supply (UPS) units, residing in data centers. A data center deploys captive power sources, typically diesel generators (DG), that it uses for keeping itself powered up when the utility experiences an outage. The UPS units serve as a bridging mechanism to facilitate this transition from utility to DG: upon a utility failure, the data center is kept powered by the UPS unit using energy stored within its batteries, before the DG can start up and provide power. Whereas this transition takes only 10-20 seconds, UPS units have enough battery capacity to keep the entire data center powered at its maximum power needs for anywhere between 5-30 minutes. Tapping into the energy reserves of the UPS unit can allow a data center to improve its electricity bill. Intuitively, the data center would store energy within the UPS unit when prices are low and use this to augment the draw from the utility when prices are high. In this paper, we consider the problem of developing an online control policy to exploit the UPS unit along with the presence of delay-tolerance within the workload to optimize the data center's electricity bill. This is a challenging problem because data centers experience time-varying workloads and power prices with possibly unknown statistics. Even when statistics can be approximated (say by learning using past observations), traditional approaches to construct optimal control policies involve the use of Markov Decision Theory and Dynamic Programming \cite{DP}. It is well known that these techniques suffer from the ``curse of dimensionality'' where the complexity of computing the optimal strategy grows with the system size. Furthermore, such solutions result in hard-to-implement systems, where significant re-computation might be needed when statistics change. In this work, we make use of a different approach that can overcome the challenges associated with dynamic programming. This approach is based on the recently developed technique of Lyapunov optimization \cite{neely-NOW}\cite{neely_new} that enables the design of online control algorithms for such time-varying systems. These algorithms operate \emph{without requiring any knowledge of the system statistics} and are easy to implement. We design such an algorithm for optimally exploiting the UPS unit and delay-tolerance of workloads to minimize the time average cost. We show that our algorithm can get within $O(1/V)$ of the optimal solution where the maximum value of $V$ is limited by battery capacity. We note that, for the same parameters, a dynamic programming based approach (if it can be solved) will yield a better result than our algorithm. However, this gap reduces as the battery capacity is increased. Our algorithm is thus most useful when such scaling is practical. \section{Related Work} \label{sec:back} One recent body of work proposes online algorithms for using UPS units for cost reduction via shaving workload ``peaks'' that correspond to higher energy prices~\cite{CUNYPeakShaving08,CUNYPeakShaving08_2}. This work is highly complementary to ours in that it offers a worst-case competitive ratio analysis while our approach looks at the average case performance. Whereas a variety of work has looked at workload shifting for power cost reduction~\cite{Zhu04} or other reasons such as performance and availability~\cite{Muse}, our work differs both due to its usage of energy storage as well as the cost optimality guarantees offered by our technique. Some research has considered consumers with access to multiple utility providers, each with a different carbon profile, power price and availability and looked at optimizing cost subject to performance and/or carbon emissions constraints~\cite{bianchini09_2}. Another line of work has looked at cost reduction opportunities offered by geographical variations within utility prices for data centers where portions of workloads could be serviced from one of several locations~\cite{bianchini09_2,Qureshi09}. Finally, \cite{marios} considers the use of rechargeable batteries for maximizing system utility in a wireless network. While all of this research is highly complementary to our work, there are three key differences: (i) our investigation of energy storage as an enabler of cost reduction, (ii) our use of the technique of Lyapunov optimization which allows us to offer a provably cost optimal solution, and (iii) combining energy storage with delay-tolerance within workloads. \section{Basic Model} \label{section:basic_model} We consider a time-slotted model. In the basic model, we assume that in every slot, the total power demand generated by the data center in that slot must be met in the current slot itself (using a combination of power drawn from the utility and the battery). Thus, any buffering of the workload generated by the data center is not allowed. We will relax this constraint later in Sec. \ref{section:ext_model} when we allow buffering of some of the workload while providing worst case delay guarantees. In the following, we use the terms UPS and battery interchangeably. \begin{figure} \centering \includegraphics[height=2.5cm, width=7.5cm,angle=0]{block_diag_basic} \caption{Block diagram for the basic model.} \label{fig:one} \end{figure} \subsection{Workload Model} \label{section:workload_model} Let $W(t)$ be total workload (in units of power) generated in slot $t$. Let $P(t)$ be the total power drawn from the grid in slot $t$ out of which $R(t)$ is used to recharge the battery. Also, let $D(t)$ be the total power discharged from the battery in slot $t$. Then in the basic model, the following constraint must be satisfied in every slot (Fig. \ref{fig:one}): \begin{align} W(t) = P(t) - R(t) + D(t) \label{eq:w_t} \end{align} Every slot, a control algorithm observes $W(t)$ and makes decisions about how much power to draw from the grid in that slot, i.e., $P(t)$, and how much to recharge and discharge the battery, i.e., $R(t)$ and $D(t)$. Note that by (\ref{eq:w_t}), having chosen $P(t)$ and $R(t)$ completely determines $D(t)$. \emph{Assumptions on the statistics of $W(t)$}: The workload process $W(t)$ is assumed to vary randomly taking values from a set $\mathcal{W}$ of non-negative values and is not influenced by past control decisions. The set $\mathcal{W}$ is assumed to be finite, with potentially arbitrarily large size. The underlying probability distribution or statistical characterization of $W(t)$ is not necessarily known. We only assume that its maximum value is finite, i.e., $W(t) \leq W_{max}$ for all $t$. Note that unlike existing work in this domain, we do not make assumptions such as Poisson arrivals or exponential service times. For simplicity, in the basic model we assume that $W(t)$ evolves according to an i.i.d. process noting that the algorithm developed for this case can be applied without any modifications to non i.i.d. scenarios as well. The analysis and performance guarantees for the non i.i.d. case can be obtained using the delayed Lyapunov drift and $T$ slot drift techniques developed in \cite{neely-NOW}\cite{neely_new}. \subsection{Battery Model} \label{section:battery_model} Ideally, we would like to incorporate the following idiosyncrasies of battery operation into our model. First, batteries become unreliable as they are charged/discharged, with higher depth-of-discharge (DoD) - percentage of maximum charge removed during a discharge cycle - causing faster degradation in their reliability. This dependence between the useful lifetime of a battery and how it is discharged/charged is expressed via battery lifetime charts~\cite{BatteryBook}. For example, with lead-acid batteries that are commonly used in UPS units, 20\% DoD yields $1400$ cycles ~\cite{UPS_DepthOfDischarge}. Second, batteries have conversion loss whereby a portion of the energy stored in them is lost when discharging them (e.g., about 10-15\% for lead-acid batteries). Furthermore, certain regions of battery operation (high rate of discharge) are more inefficient than others. Finally, the storage itself maybe ``leaky'', so that the stored energy decreases over time, even in the absence of any discharging. For simplicity, in the basic model we will assume that there is no power loss either in recharging or discharging the batteries, noting that this can be easily generalized to the case where a fraction of $R(t), D(t)$ is lost. We will also assume that the batteries are not leaky, so that the stored energy level decreases only when they are discharged. This is a reasonable assumption when the time scale over which the loss takes place is much larger than that of interest to us. To model the effect of repeated recharging and discharging on the battery's lifetime, we assume that with each recharge and discharge operation, a fixed cost (in dollars) of $C_{rc}$ and $C_{dc}$ respectively is incurred. The choice of these parameters would affect the trade-off between the cost of the battery itself and the cost reduction benefits it offers. For example, suppose a new battery costs $B$ dollars and it can sustain $N$ discharge/charge cycles (ignoring DoD for now). Then setting $C_{rc} = C_{dc} = B/N$ would amount to expecting the battery to ``pay for itself'' by augmenting the utility $N$ times over its lifetime. In any slot, we assume that one can either recharge or discharge the battery or do neither, but not both. This means that for all $t$, we have: \begin{align} R(t) > 0 \implies D(t) = 0, \; D(t) > 0 \implies R(t) = 0 \label{eq:rt_dt} \end{align} Let $Y(t)$ denote the battery energy level in slot $t$. Then, the dynamics of $Y(t)$ can be expressed as: \begin{align} Y(t+1) = Y(t) - D(t) + R(t) \label{eq:y_t} \end{align} The battery is assumed to have a finite capacity $Y_{max}$ so that $Y(t) \leq Y_{max}$ for all $t$. Further, for the purpose of reliability, it may be required to ensure that a minimum energy level $Y_{min} \geq 0$ is maintained at all times. For example, this could represent the amount of energy required to support the data center operations until a secondary power source (such as DG) is activated in the event of a grid outage. Recall that the UPS unit is integral to the availability of power supply to the data center upon utility outage. Indiscriminate discharging of UPS can leave the data center in situations where it is unable to safely fail-over to DG upon a utility outage. Therefore, discharging the UPS must be done carefully so that it still possesses enough charge so reliably carry out its role as a transition device between utility and DG. Thus, the following condition must be met in every slot under any feasible control algorithm: \begin{align} Y_{min} \leq Y(t) \leq Y_{max} \label{eq:y_t_bound} \end{align} The effectiveness of the online control algorithm we present in Sec. \ref{section:optimal_algorithm} will depend on the magnitude of the difference $Y_{max} - Y_{min}$. In most practical scenarios of interest, this value is expected to be at least moderately large: recent work suggests that storing energy $Y_{min}$ to last about a minute is sufficient to offer reliable data center operation~\cite{hp_avail_10}, while $Y_{max}$ can vary between 5-20 minutes (or even higher) due to reasons such as UPS units being available only in certain sizes and the need to keep room for future IT growth. Furthermore, the UPS units are sized based on the \emph{maximum provisioned} capacity of the data center, which is itself often substantially (up to twice~\cite{GoogleBook}) higher than the maximum actual power demand. The initial charge level in the battery is given by $Y_{init}$ and satisfies $Y_{min} \leq Y_{init} \leq Y_{max}$. Finally, we assume that the maximum amounts by which we can recharge or discharge the battery in any slot are bounded. Thus, we have $\forall t$: \begin{align} 0 \leq R(t) \leq R_{max}, \; 0 \leq D(t) \leq D_{max} \label{eq:rt_dt_bound} \end{align} We will assume that $Y_{max} - Y_{min} > R_{max} + D_{max}$ while noting that in practice, $Y_{max} - Y_{min}$ is much larger than $R_{max} + D_{max}$. Note that any feasible control decision on $R(t), D(t)$ must ensure that both of the constraints (\ref{eq:y_t_bound}) and (\ref{eq:rt_dt_bound}) are satisfied. This is equivalent to the following: \begin{align} &0 \leq R(t) \leq \min[R_{max}, Y_{max} - Y(t)] \label{eq:rt_bound} \\ &0 \leq D(t) \leq \min[D_{max}, Y(t) - Y_{min}] \label{eq:dt_bound} \end{align} \subsection{Cost Model} \label{section:cost_model} The cost per unit of power drawn from the grid in slot $t$ is denoted by $C(t)$. In general, it can depend on both $P(t)$, the total amount of power drawn in slot $t$, and an auxiliary state variable $S(t)$, that captures parameters such as time of day, identity of the utility provider, etc. For example, the per unit cost may be higher during business hours, etc. Similarly, for any fixed $S(t)$, it may be the case that $C(t)$ increases with $P(t)$ so that per unit cost of electricity increases as more power is drawn. This may be because the utility provider wants to discourage heavier loading on the grid. Thus, we assume that $C(t)$ is a function of both $S(t)$ and $P(t)$ and we denote this as: \begin{align} C(t) = \hat{C}(S(t), P(t)) \label{eq:c_hat} \end{align} For notational convenience, we will use $C(t)$ to denote the per unit cost in the rest of the paper noting that the dependence of $C(t)$ on $S(t)$ and $P(t)$ is implicit. The auxiliary state process $S(t)$ is assumed to evolve independently of the decisions taken by any control policy. For simplicity, we assume that every slot it takes values from a finite but arbitrarily large set $\mathcal{S}$ in an i.i.d. fashion according to a potentially unknown distribution. This can again be generalized to non i.i.d. Markov modulated scenarios using the techniques developed in \cite{neely-NOW}\cite{neely_new}. For each $S(t)$, the unit cost is assumed to be a non-decreasing function of $P(t)$. Note that it is not necessarily convex or strictly monotonic or continuous. This is quite general and can be used to model a variety of scenarios. A special case is when $C(t)$ is only a function of $S(t)$. The optimal control action for this case has a particularly simple form and we will highlight this in Sec. \ref{section:case1}. The unit cost is assumed to be non-negative and finite for all $S(t), P(t)$. We assume that the maximum amount of power that can be drawn from the grid in any slot is upper bounded by $P_{peak}$. Thus, we have for all $t$: \begin{align} 0 \leq P(t) \leq P_{peak} \label{eq:p_peak} \end{align} Note that if we consider the original scenario where batteries are not used, then $P_{peak}$ must be such that all workload can be satisfied. Therefore, $P_{peak} \geq W_{max}$. Finally, let $C_{max}$ and $C_{min}$ denote the maximum and minimum per unit cost respectively over all $S(t), P(t)$. Also let $\chi_{min} > 0$ be a constant such that for any $P_1, P_2 \in [0, P_{peak}]$ where $P_1 \leq P_2$, the following holds for all $\chi \geq \chi_{min}$: \begin{align} P_1(-\chi + C(P_1, S)) \geq P_2(-\chi + C(P_2, S)) \qquad \forall S \in \mathcal{S} \label{eq:chi_defn} \end{align} For example, when $C(t)$ does not depend on $P(t)$, then $\chi_{min} = C_{max}$ satisfies (\ref{eq:chi_defn}). This follows by noting that $(-C_{max} + C(t)) \leq 0$ for all $t$. Similarly, suppose $C(t)$ does not depend on $S(t)$, but is continuous, convex, and increasing in $P(t)$. Then, it can be shown that $\chi_{min} = C(P_{peak}) + P_{peak} C'(P_{peak})$ satisfies (\ref{eq:chi_defn}) where $C'(P_{peak})$ denotes the derivative of $C(t)$ evaluated at $P_{peak}$. In the following, we assume that such a finite $\chi_{min}$ exists for the given cost model. We further assume that $\chi_{min} > C_{min}$. The case of $\chi_{min} = C_{min}$ corresponds to the degenerate case where the unit cost is fixed for all times and we do not consider it. \emph{What is known in each slot?}: We assume that the value of $S(t)$ and the form of the function $C(P(t), S(t))$ for that slot is known. For example, this may be obtained beforehand using pre-advertised prices by the utility provider. We assume that given an $S(t)=s$, $C(t)$ is a deterministic function of $P(t)$ and this holds for all $s$. Similarly, the amount of incoming workload $W(t)$ is known at the beginning of each slot. Given this model, our goal is to design a control algorithm that minimizes the time average cost while meeting all the constraints. This is formalized in the next section. \section{Control Objective} \label{section:objective} Let $P(t), R(t)$ and $D(t)$ denote the control decisions made in slot $t$ by any feasible policy under the basic model as discussed in Sec. \ref{section:basic_model}. These must satisfy the constraints (\ref{eq:w_t}), (\ref{eq:rt_dt}), (\ref{eq:rt_bound}), (\ref{eq:dt_bound}), and (\ref{eq:p_peak}) every slot. We define the following indicator variables that are functions of the control decisions regarding a recharge or discharge operation in slot $t$: \begin{displaymath} 1_R(t) = \left\{ \begin{array}{ll} 1 & \textrm{if $R(t) > 0$}\\ 0 & \textrm{else} \end{array} \right. \;\; 1_D(t) = \left\{ \begin{array}{ll} 1 & \textrm{if $D(t) > 0$}\\ 0 & \textrm{else} \end{array} \right. \end{displaymath} Note that by (\ref{eq:rt_dt}), at most one of $1_R(t)$ and $1_C(t)$ can take the value $1$. Then the total cost incurred in slot $t$ is given by $P(t) C(t) + 1_R(t) C_{rc} + 1_D(t) C_{dc}$. The time-average cost under this policy is given by: \begin{align} \lim_{t\rightarrow\infty} \frac{1}{t} \sum_{\tau = 0}^{t-1} \expect{P(\tau) C(\tau) + 1_R(\tau) C_{rc} + 1_D(\tau) C_{dc}} \label{eq:nine} \end{align} where the expectation above is with respect to the potential randomness of the control policy. Assuming for the time being that this limit exists, our goal is to design a control algorithm that minimizes this time average cost subject to the constraints described in the basic model. Mathematically, this can be stated as the following \emph{stochastic optimization problem}: \begin{align*} & \textrm{\bf{P1}}: \\ &\textrm{Minimize:} \;\; \lim_{t\rightarrow\infty} \frac{1}{t} \sum_{\tau = 0}^{t-1} \expect{P(\tau) C(\tau) + 1_R(\tau) C_{rc} + 1_D(\tau) C_{dc}} \\ & \textrm{Subject to:}\;\; \textrm{Constraints} \; (\ref{eq:w_t}), (\ref{eq:rt_dt}), (\ref{eq:rt_bound}), (\ref{eq:dt_bound}), (\ref{eq:p_peak}) \end{align*} The finite capacity and underflow constraints (\ref{eq:rt_bound}), (\ref{eq:dt_bound}) make this a particularly challenging problem to solve even if the statistical descriptions of the workload and unit cost process are known. For example, the traditional approach based on Dynamic Programming \cite{DP} would have to compute the optimal control action for all possible combinations of the battery charge level and the system state $(S(t), W(t))$. Instead, we take an alternate approach based on the technique of Lyapunov optimization, taking the \emph{finite} size queues constraint explicitly into account. Note that a solution to the problem \textbf{P1} is a control policy that determines the sequence of feasible control decisions $P(t)$, $R(t)$, $D(t)$, to be used. Let $\phi_{opt}$ denote the value of the objective in problem \textbf{P1} under an optimal control policy. Define the time-average rate of recharge and discharge under any policy as follows: \begin{align} \overline{R} = \lim_{t\rightarrow\infty} \frac{1}{t} \sum_{\tau = 0}^{t-1} \expect{R(\tau)}, \; \overline{D} = \lim_{t\rightarrow\infty} \frac{1}{t} \sum_{\tau = 0}^{t-1} \expect{D(\tau)} \label{eq:r_bar_d_bar} \end{align} Now consider the following problem: \begin{align} & \textrm{\bf{P2}}: \nonumber\\ &\textrm{Minimize:} \;\; \lim_{t\rightarrow\infty} \frac{1}{t} \sum_{\tau = 0}^{t-1} \expect{P(\tau) C(\tau) + 1_R(\tau) C_{rc} + 1_D(\tau) C_{dc}} \nonumber\\ &\textrm{Subject to:}\;\; \textrm{Constraints} \; (\ref{eq:w_t}), (\ref{eq:rt_dt}), (\ref{eq:rt_dt_bound}), (\ref{eq:p_peak}) \nonumber\\ & \qquad \qquad \;\;\;\;\; \overline{R} = \overline{D} \label{eq:eleven} \end{align} Let $\hat{\phi}$ denote the value of the objective in problem \textbf{P2} under an optimal control policy. By comparing \textbf{P1} and \textbf{P2}, it can be shown that \textbf{P2} is less constrained than \textbf{P1}. Specifically, any feasible solution to \textbf{P1} would also satisfy \textbf{P2}. To see this, consider any policy that satisfies (\ref{eq:rt_bound}) and (\ref{eq:dt_bound}) for all $t$. This ensures that constraints (\ref{eq:y_t_bound}) and (\ref{eq:rt_dt_bound}) are always met by this policy. Then summing equation (\ref{eq:y_t}) over all $\tau \in \{0, 1, 2, \ldots, t-1\}$ under this policy and taking expectation of both sides yields: \begin{align*} \expect{Y(t)} - Y_{init} = \sum_{\tau =0}^{t-1} \expect{R(\tau) - D(\tau)} \end{align*} Since $Y_{min} \leq Y(t) \leq Y_{max}$ for all $t$, dividing both sides by $t$ and taking limits as $t\rightarrow\infty$ yields $\overline{R} = \overline{D}$. Thus, this policy satisfies constraint (\ref{eq:eleven}) of \textbf{P2}. Therefore, any feasible solution to \textbf{P1} also satisfies \textbf{P2}. This implies that the optimal value of \textbf{P2} cannot exceed that of \textbf{P1}, so that $\hat{\phi} \leq \phi_{opt}$. Our approach to solving \textbf{P1} will be based on this observation. We first note that it is easier to characterize the optimal solution to \textbf{P2}. This is because the dependence on $Y(t)$ has been removed. Specifically, it can be shown that the optimal solution to \textbf{P2} can be achieved by a stationary, randomized control policy that chooses control actions $P(t), D(t), R(t)$ every slot purely as a function (possibly randomized) of the current state $(W(t), S(t))$ and \emph{independent of} the battery charge level $Y(t)$. This fact is presented in the following lemma: \vspace{-0.1in} \begin{lem} (Optimal Stationary, Randomized Policy): If the workload process $W(t)$ and auxiliary process $S(t)$ are i.i.d. over slots, then there exists a stationary, randomized policy that takes control decisions $P^{stat}(t), R^{stat}(t), D^{stat}(t)$ every slot purely as a function (possibly randomized) of the current state $(W(t), S(t))$ while satisfying the constraints (\ref{eq:w_t}), (\ref{eq:rt_dt}), (\ref{eq:rt_dt_bound}), (\ref{eq:p_peak}) and providing the following guarantees: \begin{align} &\expect{R^{stat}(t)} = \expect{D^{stat}(t)} \label{eq:stat1} \\ &\expect{P^{stat}(t) C(t) + 1_R^{stat}(t) C_{rc} + 1_D^{stat}(t) C_{dc}} = \hat{\phi} \label{eq:stat2} \end{align} where the expectations above are with respect to the stationary distribution of $(W(t), S(t))$ and the randomized control decisions. \label{lem:one} \end{lem} \begin{proof} This result follows from the framework in \cite{neely-NOW, neely_new} and is omitted for brevity. \end{proof} It should be noted that while it is possible to characterize and potentially compute such a policy, it may not be feasible for the original problem \textbf{P1} as it could violate the constraints (\ref{eq:rt_bound}) and (\ref{eq:dt_bound}). However, the existence of such a policy can be used to construct an approximately optimal policy that meets all the constraints of \textbf{P1} using the technique of Lyapunov optimization \cite{neely-NOW}\cite{neely_new}. This policy is dynamic and does not require knowledge of the statistical description of the workload and cost processes. We present this policy and derive its performance guarantees in the next section. This dynamic policy is approximately optimal where the approximation factor improves as the battery capacity increases. Also note that the distance from optimality for our policy is measured in terms of $\hat{\phi}$. However, since $\hat{\phi} \leq \phi_{opt}$, in practice, the approximation factor is better than the analytical bounds. \section{Optimal Control Algorithm} \label{section:optimal_algorithm} We now present an \emph{online} control algorithm that approximately solves \textbf{P1}. This algorithm uses a control parameter $V > 0$ that affects the distance from optimality as shown later. This algorithm also makes use of a ``queueing'' state variable $X(t)$ to track the battery charge level and is defined as follows: \begin{align} X(t) = Y(t) - V\chi_{min} - D_{max} - Y_{min} \label{eq:x_t_def} \end{align} Recall that $Y(t)$ denotes the actual battery charge level in slot $t$ and evolves according to (\ref{eq:y_t}). It can be seen that $X(t)$ is simply a shifted version of $Y(t)$ and its dynamics is given by: \begin{align} X(t+1) = X(t) - D(t) + R(t) \label{eq:x_t} \end{align} Note that $X(t)$ can be negative. We will show that this definition enables our algorithm to ensure that the constraint (\ref{eq:y_t_bound}) is met. We are now ready to state the dynamic control algorithm. Let $(W(t), S(t))$ and $X(t)$ denote the system state in slot $t$. Then the dynamic algorithm chooses control action $P(t)$ as the solution to the following optimization problem: \begin{align} & \textrm{\bf{P3}}: \nonumber\\ &\textrm{Minimize:} \; X(t)P(t) + V \Big[P(t) {C}(t) + 1_R(t)C_{rc} + 1_D(t) C_{dc}\Big] \nonumber\\ &\textrm{Subject to:} \;\textrm{Constraints} \; (\ref{eq:w_t}), (\ref{eq:rt_dt}), (\ref{eq:rt_dt_bound}), (\ref{eq:p_peak}) \nonumber \end{align} The constraints above result in the following constraint on $P(t)$: \begin{align} P_{low} \leq P(t) \leq P_{high} \label{eq:p_t_constraint} \end{align} where\\ $P_{low} = \max[0, W(t) - D_{max}]$ and $P_{high} = \min[P_{peak}, W(t) + R_{max}]$. Let $P^*(t)$ denote the optimal solution to \textbf{P3}. Then, the dynamic algorithm chooses the recharge and discharge values as follows. \begin{displaymath} R^*(t) = \left\{ \begin{array}{ll} P^*(t) - W(t) & \textrm{if $P^*(t) > W(t)$}\\ 0 & \textrm{else} \end{array} \right. \end{displaymath} \begin{displaymath} D^*(t) = \left\{ \begin{array}{ll} W(t) - P^*(t) & \textrm{if $P^*(t) < W(t)$}\\ 0 & \textrm{else} \end{array} \right. \end{displaymath} Note that if $P^*(t) = W(t)$, then both $R^*(t)=0$ and $D^*(t)=0$ and all demand is met using power drawn from the grid. It can be seen from the above that the control decisions satisfy the constraints $0 \leq R^*(t) \leq R_{max}$ and $0 \leq D^*(t) \leq D_{max}$. That the finite battery constraints and the constraints (\ref{eq:rt_bound}), (\ref{eq:dt_bound}) are also met will be shown in Sec. \ref{section:performance_analysis}. After computing these quantities, the algorithm implements them and updates the queueing variable $X(t)$ according to (\ref{eq:x_t}). This process is repeated every slot. Note that in solving \textbf{P3}, the control algorithm only makes use of the current system state values and does not require knowledge of the statistics of the workload or unit cost processes. Thus, it is \emph{myopic} and \emph{greedy} in nature. From \textbf{P3}, it is seen that the algorithm tries to recharge the battery when $X(t)$ is negative and per unit cost is low. And it tries to discharge the battery when $X(t)$ is positive. That this is sufficient to achieve optimality will be shown in Theorem \ref{thm:one}. The queueing variable $X(t)$ plays a crucial role as making decisions purely based on prices is not necessarily optimal. \begin{figure} \centering \includegraphics[height=2.5cm, width=7.5cm,angle=0]{basic_example} \caption{Periodic $W(t)$ process in the example.} \label{fig:two} \end{figure} To get some intuition behind the working of this algorithm, consider the following simple example. Suppose $W(t)$ can take three possible values from the set $\{W_{low}, W_{mid}, W_{high}\}$ where $W_{low} < W_{mid} < W_{high}$. Similarly, $C(t)$ can take three possible values in $\{C_{low}, C_{mid}, C_{high}\}$ where $C_{low} < C_{mid} < C_{high}$ and does not depend on $P(t)$. We assume that the workload process evolves in a frame-based periodic fashion. Specifically, in every odd numbered frame, $W(t) = W_{mid}$ for all except the last slot of the frame when $W(t) = W_{low}$. In every even numbered frame, $W(t) = W_{mid}$ for all except the last slot of the frame when $W(t) = W_{high}$. This is illustrated in Fig. \ref{fig:two}. The $C(t)$ process evolves similarly, such that $C(t) = C_{low}$ when $W(t) = W_{low}$, $C(t) = C_{mid}$ when $W(t) = W_{mid}$, and $C(t) = C_{high}$ when $W(t) = W_{high}$. In the following, we assume a frame size of $5$ slots with $W_{low} = 10$, $W_{mid} = 15$, and $W_{high} = 20$ units. Also, $C_{low} = 2$, $C_{mid} = 6$, and $C_{high} = 10$ dollars. Finally, $R_{max} = D_{max} = 10$, $P_{peak} = 20$, $C_{rc} = C_{dc} = 5$, $Y_{init} = Y_{min} = 0$ and we vary $Y_{max} > R_{max} + D_{max}$. In this example, intuitively, an optimal algorithm that knows the workload and unit cost process beforehand would recharge the battery as much as possible when $C(t) = C_{low}$ and discharge it as much as possible when $C(t) = C_{high}$. In fact, it can be shown that the following strategy is feasible and achieves minimum average cost: \begin{itemize} \item If $C(t) = C_{low}, W(t) = W_{low}$, then $P(t) = W_{low} + R_{max}$, $R(t) = R_{max}$, $D(t) = 0$. \item If $C(t) = C_{mid}, W(t) = W_{mid}$, then $P(t) = W_{mid}$, $R(t) = 0$, $D(t) = 0$. \item If $C(t) = C_{high}, W(t) = W_{high}$, then $P(t) = W_{high} - D_{max}$, $R(t) = 0$, $D(t) = D_{max}$. \end{itemize} The time average cost resulting from this strategy can be easily calculated and is given by $87.0$ dollars/slot for all $Y_{max} > 10$. Also, we note that the cost resulting from an algorithm that does not use the battery in this example is given by $94.0$ dollars/slot. Now we simulate the dynamic algorithm for this example for different values of $Y_{max}$ for $1000$ slots ($200$ frames). The value of $V$ is chosen to be $\frac{Y_{max} - Y_{min} - R_{max} - D_{max}}{C_{high} - C_{low}} = \frac{Y_{max} - 20}{8}$ (this choice will become clear in Sec. \ref{section:performance_theorem} when we relate $V$ to the battery capacity). Note that the number of slots for which a fully charged battery can sustain the data center at maximum load is $Y_{max}/W_{high}$. \begin{table} \centering \begin{tabular}{|c|c|c|c|c|c|l|} \hline $Y_{max}$ & 20 & 30 & 40 & 50 & 75 & 100 \\ \hline $V$ & 0 & 1.25 & 2.5 & 3.75 & 6.875 & 10.0 \\ \hline Avg. Cost & 94.0 & 92.5 & 91.1 & 88.5 & 88.0 & 87.0 \\ \hline \end{tabular} \caption{Average Cost vs. $Y_{max}$} \label{table:table1} \end{table} In Table \ref{table:table1}, we show the time average cost achieved for different values of $Y_{max}$. It can be seen that as $Y_{max}$ increases, the time average cost approaches the optimal value. (This behavior will be formalized in Theorem \ref{thm:one}) This is remarkable given that the dynamic algorithm operates without any knowledge of the future workload and cost processes. To examine the behavior of the dynamic algorithm in more detail, we fix $Y_{max} = 100$ and look at the sample paths of the control decisions taken by the optimal offline algorithm and the dynamic algorithm during the first $200$ slots. This is shown in Figs. \ref{fig:example2} and \ref{fig:example3}. It can be seen that initially, the dynamic tends to perform suboptimally. But eventually it \emph{learns} to make close to optimal decisions. \begin{figure} \centering \includegraphics[height=3cm, width=9cm,angle=0]{sample_path_P_t_optimal} \caption{$P(t)$ under the offline optimal solution with $Y_{max} = 100$.} \label{fig:example2} \end{figure} \begin{figure} \centering \includegraphics[height=3cm, width=9cm,angle=0]{sample_path_P_t_Ymax100} \caption{$P(t)$ under the Dynamic Algorithm with $Y_{max} = 100$.} \label{fig:example3} \end{figure} It might be tempting to conclude from this example that an algorithm based on a price threshold is optimal. Specifically, such an algorithm makes a recharge vs. discharge decision depending on whether the current price $C(t)$ is smaller or larger than a threshold. However, it is easy to construct examples where the dynamic algorithm outperforms such a threshold based algorithm. Specifically, suppose that the $W(t)$ process takes values from the interval $[10, 90]$ uniformly at random every slot. Also, suppose $C(t)$ takes values from the set $\{2, 6, 10\}$ dollars uniformly at random every slot. We fix the other parameters as follows: $R_{max} = D_{max} = 10$, $P_{peak} = 90$, $C_{rc} = C_{dc} = 1$, $Y_{init} = Y_{min} = 0$ and $Y_{max} = 100$. We then simulate a threshold based algorithm for different values of the threshold in the set $\{2, 6, 10\}$ and select the one that yields the smallest cost. This was found to be $280.7$ dollars/slot. We then simulate the dynamic algorithm for $10000$ slots with $V = \frac{Y_{max} - 20}{10 - 2} = 10.0$ and it yields an average cost of $275.5$ dollars/slot. We also note that the cost resulting from an algorithm that does not use the battery in this example is given by $300.73$ dollars/slot. We now establish two properties of the structure of the optimal solution to \textbf{P3} that will be useful in analyzing its performance later. \begin{lem} The optimal solution to \textbf{P3} has the following properties: \begin{enumerate} \item If $X(t) > -V C_{min}$, then the optimal solution always chooses $R^*(t) = 0$. \item If $X(t) < -V \chi_{min}$, then the optimal solution always chooses $D^*(t) = 0$. \end{enumerate} \label{lem:two} \end{lem} \begin{proof} See Appendix A. \end{proof} \subsection{Solving \textbf{P3}} \label{section:solving_p3} In general, the complexity of solving \textbf{P3} depends on the structure of the unit cost function $C(t)$. For many cases of practical interest, \textbf{P3} is easy to solve and admits closed form solutions that can be implemented in real time. We consider two such cases here. Let $\theta(t)$ denote the value of the objective in \textbf{P3} when there is no recharge or discharge. Thus $\theta(t) = W(t)(X(t) + V C(t))$. \subsubsection{$C(t)$ does not depend on $P(t)$} \label{section:case1} Suppose that $C(t)$ depends only on $S(t)$ and not on $P(t)$. We can rewrite the expression in the objective of \textbf{P3} as $P(t)(X(t) + V C(t)) + 1_R(t) V C_{rc} + 1_D(t) V C_{dc}$. Then, the optimal solution has the following simple threshold structure. \begin{enumerate} \item If $X(t) + VC(t) > 0$, then $R^*(t) = 0$ so that there is no recharge and we have the following two cases: \begin{enumerate} \item If $P_{low}(X(t) + VC(t)) + V C_{dc} < \theta(t)$, then discharge as much as possible, so that we get $D^*(t) = \min[W(t), D_{max}]$, $P^*(t) = \max[0, W(t) - D_{max}]$. \item Else, draw all power from the grid. This yields $D^*(t) = 0$ and $P^*(t) = W(t)$. \end{enumerate} \item Else if $X(t) + VC(t) \leq 0$, then $D^*(t) = 0$ so that there is no discharge and we have the following two cases: \begin{enumerate} \item If $P_{high}(X(t) + VC(t)) + V C_{rc} < \theta(t)$, then recharge as much as possible. This yields $R^*(t) = \min[P_{peak} - W(t), R_{max}]$ and $P^*(t) = \min[P_{peak}, W(t) + R_{max}]$. \item Else, draw all power from the grid. This yields $R^*(t) = 0$ and $P^*(t) = W(t)$. \end{enumerate} \end{enumerate} We will show that this solution is feasible and does not violate the finite battery constraint in Sec. \ref{section:performance_analysis}. \subsubsection{$C(t)$ convex, increasing in $P(t)$} \label{section:case2} Next suppose for each $S(t)$, $C(t)$ is convex and increasing in $P(t)$. For example, $\hat{C}(S(t), P(t))$ may have the form $\alpha(S(t))P^2(t)$ where $\alpha(S(t)) > 0$ for all $S(t)$. In this case, \textbf{P3} becomes a standard convex optimization problem in a single variable $P(t)$ and can be solved efficiently. The full solution is provided in Appendix E. \subsection{Performance Theorem} \label{section:performance_theorem} We first define an upper bound $V_{max}$ on the maximum value that $V$ can take in our algorithm. \begin{align} V_{max} \defequiv \frac{Y_{max} - Y_{min} - R_{max} - D_{max}}{\chi_{min} - C_{min}} \label{eq:v_max} \end{align} Then we have the following result. \begin{thm} (Algorithm Performance) Suppose the initial battery charge level $Y_{init}$ satisfies $Y_{min} \leq Y_{init} \leq Y_{max}$. Then implementing the algorithm above with any fixed parameter $V$ such that $0 < V \leq V_{max}$ for all $t \in \{0, 1, 2, \ldots\}$ results in the following performance guarantees: \begin{enumerate} \item The queue $X(t)$ is deterministically upper and lower bounded for all $t$ as follows: \begin{align} -V \chi_{min} - D_{max} \leq X(t) &\leq Y_{max} - Y_{min} \nonumber \\ &\;\;\;\; - D_{max} - V \chi_{min} \label{eq:x_bounds} \end{align} \item The actual battery level $Y(t)$ satisfies $Y_{min} \leq Y(t) \leq Y_{max}$ for all $t$. \item All control decisions are feasible. \item If $W(t)$ and $S(t)$ are i.i.d. over slots, then the time-average cost under the dynamic algorithm is within $B/V$ of the optimal value: \begin{align} \lim_{t\rightarrow\infty} \frac{1}{t} \sum_{\tau = 0}^{t-1}& \expect{P(\tau) C(\tau) + 1_R(\tau) C_{rc} + 1_D(\tau) C_{dc}} \nonumber \\ &\qquad \qquad \leq \phi_{opt} + B/V \label{eq:utility_bound} \end{align} where $B$ is a constant given by $B = \frac{\max[R^2_{max}, D^2_{max}]}{2}$ and $\phi_{opt}$ is the optimal solution to \textbf{P1} under \emph{any} feasible control algorithm (possibly with knowledge of future events). \end{enumerate} \label{thm:one} \end{thm} Theorem \ref{thm:one} part $4$ shows that by choosing larger $V$, the time-average cost under the dynamic algorithm can be pushed closer to the minimum possible value $\phi_{opt}$. However, $V_{max}$ limits how large $V$ can be chosen. \subsection{Proof of Theorem \ref{thm:one}} \label{section:performance_analysis} Here we prove Theorem \ref{thm:one}. \begin{proof} (Theorem \ref{thm:one} part $1$) We first show that (\ref{eq:x_bounds}) holds for $t=0$. We have that \begin{align} Y_{min} \leq Y(0) = Y_{init} \leq Y_{max} \label{eq:Y_0} \end{align} Using the definition (\ref{eq:x_t_def}), we have that $Y(0) = X(0) + V \chi_{min} + D_{max} + Y_{min}$. Using this in (\ref{eq:Y_0}), we get: \begin{align*} Y_{min} \leq X(0) + V \chi_{min} + D_{max} + Y_{min} \leq Y_{max} \end{align*} This yields \begin{align*} -V \chi_{min} - D_{max} \leq X(0) &\leq Y_{max} - Y_{min} - D_{max} \\ &\;\;\;\; - V \chi_{min} \end{align*} Now suppose (\ref{eq:x_bounds}) holds for slot $t$. We will show that it also holds for slot $t+1$. First, suppose $-V C_{min} < X(t) \leq Y_{max} - Y_{min} - D_{max} - V \chi_{min}$. Then, from Lemma \ref{lem:two}, we have that $R^*(t) = 0$. Thus, using (\ref{eq:x_t}), we have that $X(t+1) \leq X(t) \leq Y_{max} - Y_{min} - D_{max} - V \chi_{min}$. Next, suppose $X(t) \leq -V C_{min}$. Then, the maximum possible increase is $R_{max}$ so that $X(t+1) \leq -V C_{min} + R_{max}$. Now for all $V$ such that $0 < V \leq V_{max}$, we have that $-V C_{min} + R_{max} \leq Y_{max} - Y_{min} - D_{max} - V \chi_{min}$. This follows from the definition (\ref{eq:v_max}) and the fact that $\chi_{min} \geq C_{min}$. Thus, we have $X(t+1) \leq Y_{max} - Y_{min} - D_{max} - V \chi_{min}$. Next, suppose $-V\chi_{min} - D_{max} \leq X(t) < -V \chi_{min}$. Then, from Lemma \ref{lem:two}, we have that $D^*(t) = 0$. Thus, using (\ref{eq:x_t}) we have that $X(t+1) \geq X(t) \geq -V \chi_{min} - D_{max}$. Next, suppose $-V \chi_{min} \leq X(t)$. Then the maximum possible decrease is $D_{max}$ so that $X(t+1) \geq -V \chi_{min} - D_{max}$ for this case as well. This shows that $X(t+1) \geq -V \chi_{min} - D_{max}$. Combining these two bounds proves (\ref{eq:x_bounds}). \end{proof} \begin{proof} (Theorem \ref{thm:one} parts $2$ and $3$) Part $2$ directly follows from (\ref{eq:x_bounds}) and (\ref{eq:x_t_def}). Using $Y(t) = X(t) + V \chi_{min} + D_{max} + Y_{min}$ in the lower bound in (\ref{eq:x_bounds}), we have: $-V \chi_{min} - D_{max} \leq Y(t) - V \chi_{min} - D_{max} - Y_{min}$, i.e., $Y_{min} \leq Y(t)$. Similarly, using $Y(t) = X(t) + V \chi_{min} + D_{max} + Y_{min}$ in the upper bound in (\ref{eq:x_bounds}), we have: $Y(t) - V \chi_{min} - D_{max} - Y_{min} \leq Y_{max} - Y_{min} - D_{max} - V \chi_{min}$, i.e., $Y(t) \leq Y_{max}$. Part $3$ now follows from part $2$ and the constraint on $P(t)$ in \textbf{P3}. \end{proof} \begin{proof} (Theorem \ref{thm:one} part $4$) We make use of the technique of Lyapunov optimization to show (\ref{eq:utility_bound}). We start by defining a Lyapunov function as a scalar measure of congestion in the system. Specifically, we define the following Lyapunov function: $L(X(t)) \defequiv \frac{1}{2} X^2(t)$. Define the conditional $1$-slot Lyapunov drift as follows: \begin{align} \Delta(X(t)) \defequiv \expect{L(X(t+1)) - L(X(t))|X(t)} \label{eq:drift1} \end{align} Using (\ref{eq:x_t}), $\Delta(X(t))$ can be bounded as follows (see Appendix B for details): \begin{align} \Delta(X(t)) \leq B - X(t)\expect{D(t) - R(t)|X(t)} \label{eq:drift2} \end{align} where $B = \frac{\max[R^2_{max}, D^2_{max}]}{2}$. Following the Lyapunov optimization framework, we add to both sides of (\ref{eq:drift2}) the penalty term $V \expect{P(t)C(t) + 1_R(t)C_{rc} + 1_D(t)C_{dc}|X(t)}$ to get the following: \begin{align} &\Delta(X(t))+ V \expect{P(t)C(t) + 1_R(t)C_{rc} + 1_D(t)C_{dc}|X(t)} \nonumber \\ &\qquad \leq B - X(t)\expect{D(t) - R(t)|X(t)} \nonumber\\ &\qquad\;\;+V \expect{P(t)C(t) + 1_R(t)C_{rc} + 1_D(t)C_{dc}|X(t)} \label{eq:drift3} \end{align} Using the relation $W(t) = P(t) - R(t) + D(t)$, we can rewrite the above as: \begin{align} &\Delta(X(t))+ V \expect{P(t)C(t) + 1_R(t)C_{rc} + 1_D(t)C_{dc}|X(t)} \leq \nonumber \\ &\qquad B - X(t)\expect{W(t)|X(t)} + X(t)\expect{P(t)|X(t)} \nonumber\\ &\qquad + V \expect{P(t)C(t) + 1_R(t)C_{rc} + 1_D(t)C_{dc}|X(t)} \label{eq:drift4} \end{align} Comparing this with \textbf{P3}, it can be seen that given any queue value $X(t)$, our control algorithm is designed to \emph{minimize} the right hand side of (\ref{eq:drift4}) over all possible feasible control policies. This includes the optimal, stationary, randomized policy given in Lemma $\ref{lem:one}$. Then, plugging the control decisions corresponding to the stationary, randomized policy, it can be shown that: \begin{align*} &\Delta(X(t))+ V \expect{P(t)C(t) + 1_R(t)C_{rc} + 1_D(t)C_{dc}|X(t)} \leq \nonumber \\ & B + V \expect{P^{stat}(t)C^{stat}(t) + 1^{stat}_R(t)C_{rc} + 1^{stat}_D(t)C_{dc}|X(t)} \nonumber \\ & = B + V \hat{\phi} \leq B + V \phi_{opt} \end{align*} Taking the expectation of both sides and using the law of iterated expectations and summing over $t \in \{0, 1, 2, \ldots, T-1\}$, we get: \begin{align*} &\sum_{t=0}^{T-1} V \expect{P(t)C(t) + 1_R(t)C_{rc} + 1_D(t)C_{dc}} \leq \\ & BT + VT \phi_{opt} - \expect{L(X(T))} + \expect{L(X(0))} \end{align*} Dividing both sides by $VT$ and taking limit as $T \rightarrow\infty$ yields: \begin{align*} \lim_{T\rightarrow\infty} \frac{1}{T} \sum_{t = 0}^{T-1}& \expect{P(t) C(t) + 1_R(t) C_{rc} + 1_D(t) C_{dc}} \leq \phi_{opt} + B/V \end{align*} where we have used the fact that $\expect{L(X(0))}$ is finite and that $\expect{L(X(T))}$ is non-negative. \end{proof} \section{Extensions to Basic Model} \label{section:ext_model} In this section, we extend the basic model of Sec. \ref{section:basic_model} to the case where portions of the workload are delay-tolerant in the sense they can be postponed by a certain amount without affecting the utility the data center derives from executing them. We refer to such postponement as buffering the workload. Specifically, we assume that the total workload consists of both delay tolerant and delay intolerant components. Similar to the workload in the basic model, the delay intolerant workload cannot be buffered and must be served immediately. However, the delay tolerant component may be buffered and served later. As an example, data centers run virus scanning programs on most of their servers routinely (say once per day). As long as a virus scan is executed once a day, their purpose is served - it does not matter what time of the day is chosen for this. The ability to delay some of the workload gives more opportunities to reduce the average power cost in addition to using the battery. We assume that our data center has system mechanisms to implement such buffering of specified workloads. In the following, we will denote the total workload generated in slot $t$ by $W(t)$. This consists of the delay tolerant and intolerant components denoted by $W_1(t)$ and $W_2(t)$ respectively, so that $W(t) = W_1(t) + W_2(t)$ for all $t$. Similar to the basic model, we use $P(t), R(t), D(t)$ to denote the total power drawn from the grid, the total power used to recharge the battery and the total power discharged from the battery in slot $t$, respectively. Thus, the total amount available to serve the workload is given by $P(t) - R(t) + D(t)$. Let $\gamma(t)$ denote the fraction of this that is used to serve the delay tolerant workload in slot $t$. Then the amount used to serve the delay intolerant workload is $(1-\gamma(t))(P(t) - R(t) + D(t))$. Note that the following constraint must be satisfied every slot: \begin{align} 0 \leq \gamma(t) \leq 1 \label{eq:gamma_t} \end{align} \begin{figure} \centering \includegraphics[height=4cm, width=7.5cm,angle=0]{block_diag_extended} \caption{Block diagram for the extended model with delay tolerant and delay intolerant workloads.} \label{fig:ext_model} \end{figure} We next define $U(t)$ as the unfinished work for the delay tolerant workload in slot $t$. The dynamics for $U(t)$ can be expressed as: \begin{align} U(t+1) = \max[U(t) - \gamma(t)(P(t) - R(t) + D(t)), 0] + W_1(t) \label{eq:u_t} \end{align} For the delay intolerant workload, there are no such queues since all incoming workload must be served in the same slot. This means: \begin{align} W_2(t) = (1- \gamma(t))(P(t) - R(t) + D(t)) \label{eq:w2_t} \end{align} The block diagram for this extended model is shown in Fig. \ref{fig:ext_model}. Similar to the basic model, we assume that for $i=1, 2$, $W_i(t)$ varies randomly in an i.i.d. fashion, taking values from a set $\mathcal{W}_i$ of non-negative values. We assume that $W_1(t) + W_2(t) \leq W_{max}$ for all $t$. We also assume that $W_1(t) \leq W_{1,max} < W_{max}$ and $W_2(t) \leq W_{2, max} < W_{max}$ for all $t$. We further assume that $P_{peak} \geq W_{max} + \max[R_{max}, D_{max}]$. We use the same model for battery and unit cost as in Sec. \ref{section:basic_model}. Our objective is to minimize the time-average cost subject to meeting all the constraints (such as finite battery size and (\ref{eq:w2_t})) and ensuring finite average delay for the delay tolerant workload. This can be stated as: \begin{align} & \textrm{\bf{P4}}: \nonumber\\ &\textrm{Minimize:} \;\; \lim_{t\rightarrow\infty} \frac{1}{t} \sum_{\tau = 0}^{t-1} \expect{P(\tau) C(\tau) + 1_R(\tau) C_{rc} + 1_D(\tau) C_{dc}} \nonumber\\ &\textrm{Subject to:}\;\; \textrm{Constraints} \; (\ref{eq:rt_dt}), (\ref{eq:rt_dt_bound}), (\ref{eq:rt_bound}), (\ref{eq:dt_bound}), (\ref{eq:p_peak}), (\ref{eq:gamma_t}), (\ref{eq:w2_t}) \nonumber\\ & \qquad \qquad \;\;\;\;\; \textrm{Finite average delay for $W_1(t)$} \nonumber \end{align} Similar to the basic model, we consider the following \emph{relaxed} problem: \begin{align} & \textrm{\bf{P5}}: \nonumber\\ &\textrm{Minimize:} \;\; \lim_{t\rightarrow\infty} \frac{1}{t} \sum_{\tau = 0}^{t-1} \expect{P(\tau) C(\tau) + 1_R(\tau) C_{rc} + 1_D(\tau) C_{dc}} \nonumber\\ &\textrm{Subject to:}\;\; \textrm{Constraints} \; (\ref{eq:rt_dt}), (\ref{eq:rt_dt_bound}), (\ref{eq:p_peak}), (\ref{eq:gamma_t}), (\ref{eq:w2_t}) \nonumber\\ & \qquad \qquad \;\;\;\;\; \overline{R} = \overline{D} \label{eq:27} \\ & \qquad \qquad \;\;\;\;\; \overline{U} < \infty \label{eq:28} \end{align} where $\overline{U}$ is the time average expected queue backlog for the delay tolerant workload and is defined as: \begin{align} \overline{U} \defequiv \limsup_{t\rightarrow \infty} \frac{1}{t} \sum_{\tau=0}^{t-1} \expect{U(\tau)} \label{eq:u_bar} \end{align} Let ${\phi}_{ext}$ and $\hat{\phi}_{ext}$ denote the optimal value for problems \textbf{P4} and \textbf{P5} respectively. Since \textbf{P5} is less constrained than \textbf{P4}, we have that $\hat{\phi}_{ext} \leq {\phi}_{ext}$. Similar to Lemma $\ref{lem:one}$, the following holds: \begin{lem} (Optimal Stationary, Randomized Policy): If the workload process $W_1(t), W_2(t)$ and auxiliary process $S(t)$ are i.i.d. over slots, then there exists a stationary, randomized policy that takes control decisions $\hat{P}(t), \hat{R}(t), \hat{D}(t), \hat{\gamma}(t)$ every slot purely as a function (possibly randomized) of the current state $(W_1(t), W_2(t), S(t))$ while satisfying the constraints (\ref{eq:w2_t}), (\ref{eq:rt_dt}), (\ref{eq:rt_dt_bound}), (\ref{eq:p_peak}), (\ref{eq:gamma_t}) and providing the following guarantees: \begin{align} &\expect{\hat{R}(t)} = \expect{\hat{D}(t)} \label{eq:stat1_ext} \\ &\expect{\hat{\gamma}(t)(\hat{P}(t) - \hat{R}(t) + \hat{D}(t))} \geq \expect{W_1(t)} \label{eq:stat2_ext}\\ &\expect{\hat{P}(t) \hat{C}(t) + \hat{1}_{{R}}(t) C_{rc} + \hat{1}_{{D}}(t) C_{dc}} = \hat{\phi}_{ext} \label{eq:stat3_ext} \end{align} where the expectations above are with respect to the stationary distribution of $(W_1(t), W_2(t), S(t))$ and the randomized control decisions. \label{lem:three} \end{lem} \begin{proof} This result follows from the framework in \cite{neely-NOW, neely_new} and is omitted for brevity. \end{proof} The condition (\ref{eq:stat2_ext}) only guarantees queueing stability, not bounded worst case delay. We will now design a dynamic control algorithm that will yield bounded worst case delay while guaranteeing average cost that is within $O(1/V)$ of $\hat{\phi}_{ext}$. \subsection{Delay-Aware Queue} \label{section:delay_aware_queue} In order to provide worst case delay guarantees to the delay tolerant workload, we will make use of the technique of $\epsilon$-persistent queue \cite{neely_smartgrid}. Specifically, we define a virtual queue $Z(t)$ as follows: \begin{align} Z(t+1) = [&Z(t) - \gamma(t)(P(t) - R(t) + D(t)) + \epsilon 1_{U(t)}]^+ \label{eq:z_t} \end{align} where $\epsilon > 0$ is a parameter to be specified later, $1_{U(t)}$ is an indicator variable that is $1$ if $U(t) > 0$ and $0$ else, and $[x]^+ = \max[x, 0]$. The objective of this virtual queue is to enable the provision of worst-case delay guarantee on any buffered workload $W_1(t)$. Specifically, if any control algorithm ensures that $U(t) \leq U_{max}$ and $Z(t) \leq Z_{max}$ for all $t$, then the worst case delay can be bounded. This is shown in the following: \begin{lem} (Worst Case Delay) Suppose a control algorithm ensures that $U(t) \leq U_{max}$ and $Z(t) \leq Z_{max}$ for all $t$, where $U_{max}$ and $Z_{max}$ are some positive constants. Then the worst case delay for any delay tolerant workload is at most $\delta_{max}$ slots where: \begin{align} \delta_{max} \defequiv \lceil (U_{max} + Z_{max})/\epsilon \rceil \label{eq:delta_max} \end{align} \label{lem:worst_case_delay} \end{lem} \begin{proof} Consider a new arrival $W_1(t)$ in any slot $t$. We will show that this is served on or before time $t+\delta_{max}$. We argue by contradiction. Suppose this workload is not served by $t+\delta_{max}$. Then for all slots $\tau \in \{t+1, t+2, \ldots, t + \delta_{max}\}$, it must be the case that $U(\tau) > 0$ (else $W_1(t)$ would have been served before $\tau$). This implies that $1_{U(\tau)} = 1$ and using (\ref{eq:z_t}), we have: \begin{align*} Z(\tau + 1) \geq Z(\tau) - \gamma(\tau)(P(\tau) - R(\tau) + D(\tau)) + \epsilon \end{align*} Summing for all $\tau \in \{t+1, t+2, \ldots, t + \delta_{max}\}$, we get: \begin{align*} Z(t + \delta_{max} + 1) &- Z(t+1) \geq \delta_{max}\epsilon \\ &- \sum_{\tau = t+1}^{t + \delta_{max}} [\gamma(\tau)(P(\tau) - R(\tau) + D(\tau))] \end{align*} Using the fact that $Z(t + \delta_{max} + 1) \leq Z_{max}$ and $Z(t+1) \geq 0$, we get: \begin{align} \sum_{\tau = t+1}^{t + \delta_{max}} [\gamma(\tau)(P(\tau) - R(\tau) + D(\tau))] \geq \delta_{max}\epsilon - Z_{max} \label{eq:32} \end{align} Note that by (\ref{eq:u_t}), $W_1(t)$ is part of the backlog $U(t+1)$. Since $U(t+1) \leq U_{max}$ and since the service is FIFO, it will be served on or before time $t+\delta_{max}$ whenever at least $U_{max}$ units of power is used to serve the delay tolerant workload during the interval $(t+1, \ldots, t+\delta_{max})$. Since we have assumed that $W_1(t)$ is not served by $t+\delta_{max}$, it must be the case that $\sum_{\tau = t+1}^{t + \delta_{max}} [\gamma(\tau)(P(\tau) - R(\tau) + D(\tau))] < U_{max}$. Using this in (\ref{eq:32}), we have: \begin{align*} U_{max} > \delta_{max}\epsilon - Z_{max} \end{align*} This implies that $\delta_{max} < (U_{max} + Z_{max})/\epsilon$, that contradicts the definition of $\delta_{max}$ in (\ref{eq:delta_max}). \end{proof} In Sec. \ref{section:performance_theorem_ext}, we will show that there are indeed constants $U_{max}, Z_{max}$ such that the dynamic algorithm ensures that $U(t) \leq U_{max}, Z(t) \leq Z_{max}$ for all $t$. \subsection{Optimal Control Algorithm} \label{section:optimal_algorithm_ext} We now present an online control algorithm that approximately solves \textbf{P4}. Similar to the algorithm for the basic model, this algorithm also makes use of the following queueing state variable $X(t)$ to track the battery charge level and is defined as follows: \begin{align} X(t) = Y(t) - Q_{max} - D_{max} - Y_{min} \label{eq:x_t_def_ext} \end{align} where $Q_{max}$ is a constant to be specified in (\ref{eq:q_max}). Recall that $Y(t)$ denotes the actual battery charge level in slot $t$ and evolves according to (\ref{eq:y_t}). It can be seen that $X(t)$ is simply a shifted version of $Y(t)$ and its dynamics is given by: \begin{align} X(t+1) = X(t) - D(t) + R(t) \label{eq:x_t_ext} \end{align} We will show that this definition enables our algorithm to ensure that the constraint (\ref{eq:y_t_bound}) is met. We are now ready to state the dynamic control algorithm. Let $(W_1(t), W_2(t), S(t))$ be the system state in slot $t$. Define $\boldsymbol{Q}(t) \defequiv (U(t), Z(t), X(t))$ as the queue state that includes the workload queue as well as auxiliary queues. Then the dynamic algorithm chooses control decisions $P(t), R(t), D(t)$ and $\gamma(t)$ as the solution to the following optimization problem: \begin{align} & \textrm{\bf{P6}}: \nonumber\\ &\textrm{Max:} [U(t)+Z(t)]P(t) - V \Big[P(t) {C}(t) + 1_R(t)C_{rc} + 1_D(t) C_{dc}\Big] \nonumber\\ & \qquad \qquad \;\;\;\; + [X(t) + U(t) + Z(t)](D(t) - R(t)) \nonumber\\ &\textrm{Subject to:} \; \textrm{Constraints} \; (\ref{eq:gamma_t}) , (\ref{eq:w2_t}), (\ref{eq:rt_dt}), (\ref{eq:rt_dt_bound}), (\ref{eq:p_peak}) \nonumber \end{align} where $V > 0$ is a control parameter that affects the distance from optimality. Let $P^*(t), R^*(t), D^*(t)$ and $\gamma^*(t)$ denote the optimal solution to \textbf{P6}. Then, the dynamic algorithm allocates $(1 - \gamma^*(t))(P^*(t)-R^*(t)+ D^*(t))$ power to service the delay intolerant workload and the remaining is used for the delay tolerant workload. After computing these quantities, the algorithm implements them and updates the queueing variable $X(t)$ according to (\ref{eq:x_t_ext}). This process is repeated every slot. Note that in solving \textbf{P6}, the control algorithm only makes use of the current system state values and does not require knowledge of the statistics of the workload or unit cost processes. We now establish two properties of the structure of the optimal solution to \textbf{P6} that will be useful in analyzing its performance later. \begin{lem} The optimal solution to \textbf{P6} has the following properties: \begin{enumerate} \item If $X(t) > -V C_{min}$, then the optimal solution always chooses $R^*(t) = 0$. \item If $X(t) < - Q_{max}$ (where $Q_{max}$ is specified in (\ref{eq:q_max})), then the optimal solution always chooses $D^*(t) = 0$. \end{enumerate} \label{lem:five} \end{lem} \begin{proof} See Appendix C. \end{proof} \subsection{Solving \textbf{P6}} \label{section:solving_P6} Similar to \textbf{P3}, the complexity of solving \textbf{P6} depends on the structure of the unit cost function $C(t)$. For many cases of practical interest, \textbf{P6} is easy to solve and admits closed form solutions that can be implemented in real time. We consider one such case here. \subsubsection{$C(t)$ does not depend on $P(t)$} \label{section:case1_ext} For notational convenience, let $Q_1(t) = [U(t) + Z(t) - VC(t)]$ and $Q_2(t) = [X(t) + U(t) + Z(t)]$. Let $\theta_1(t)$ denote the optimal value of the objective in \textbf{P6} when there is no recharge or discharge. When $C(t)$ does not depend on $P(t)$, this can be calculated as follows: If $U(t) + Z(t) \geq VC(t)$, then $\theta_1(t) = Q_1(t) P_{peak}$. Else, $\theta_1(t) = Q_1(t) W_2(t)$. Next, let $\theta_2(t)$ denote the optimal value of the objective in \textbf{P6} when the option of recharge is chosen, so that $R(t) > 0, D(t) = 0$. This can be calculated as follows: \begin{enumerate} \item If $Q_1(t) \geq 0, Q_2(t) \geq 0$, then $\theta_2(t) = Q_1(t) P_{peak} - V C_{rc}$. \item If $Q_1(t) \geq 0, Q_2(t) < 0$, then $\theta_2(t) = Q_1(t) P_{peak} - Q_2(t) R_{max} - V C_{rc}$. \item If $Q_1(t) < 0, Q_2(t) \geq 0$, then $\theta_2(t) = Q_1(t) W_2(t) - V C_{rc}$. \item If $Q_1(t) < 0, Q_2(t) < 0$, then we have two cases: \begin{enumerate} \item If $Q_1(t) \geq Q_2(t)$, then $\theta_2(t) = Q_1(t) (R_{max} + W_2(t)) - Q_2(t) R_{max} - V C_{rc}$. \item If $Q_1(t) < Q_2(t)$, then $\theta_2(t) = Q_1(t) W_2(t) - V C_{rc}$. \end{enumerate} \end{enumerate} Finally, let $\theta_3(t)$ denote the optimal value of the objective in \textbf{P6} when when the option of discharge is chosen, so that $D(t) > 0, R(t) = 0$. This can be calculated as follows: \begin{enumerate} \item If $Q_1(t) \geq 0, Q_2(t) \geq 0$, then $\theta_3(t) = Q_1(t) P_{peak} + Q_2(t) D_{max} - V C_{dc}$. \item If $Q_1(t) \geq 0, Q_2(t) < 0$, then $\theta_3(t) = Q_1(t) P_{peak} - V C_{dc}$. \item If $Q_1(t) < 0, Q_2(t) \geq 0$, then $\theta_3(t) = Q_1(t) \max[0, W_2(t) - D_{max}] + Q_2(t) D_{max} - V C_{dc}$. \item If $Q_1(t) < 0, Q_2(t) < 0$, then we have two cases: \begin{enumerate} \item If $Q_1(t) \leq Q_2(t)$, then $\theta_3(t) = Q_1(t) \max[0, W_2(t) - D_{max}] + Q_2(t) \min[W_2(t), D_{max}] - V C_{dc}$. \item If $Q_1(t) > Q_2(t)$, then $\theta_3(t) = Q_1(t) W_2(t) - V C_{dc}$. \end{enumerate} \end{enumerate} After computing $\theta_1(t), \theta_2(t), \theta_3(t)$, we pick the mode that yields the highest value of the objective and implement the corresponding solution. \subsection{Performance Theorem} \label{section:performance_theorem_ext} We define an upper bound $V^{max}_{ext}$ on the maximum value that $V$ can take in our algorithm for the extended model. \begin{align} V^{max}_{ext} \defequiv \frac{Y_{max} - Y_{min} - (R_{max} + D_{max} + W_{1,max} + \epsilon)}{\chi_{min} - C_{min}} \label{eq:v_max_ext} \end{align} Then we have the following result. \begin{thm} (Algorithm Performance) Suppose $U(0) = 0$, $Z(0) = 0$ and the initial battery charge level $Y_{init}$ satisfies $Y_{min} \leq Y_{init} \leq Y_{max}$. Then implementing the algorithm above with any fixed parameter $\epsilon \geq 0$ such that $\epsilon \leq W_{max} - W_{2,max}$ and a parameter $V$ such that $0 < V \leq V^{max}_{ext}$ for all $t \in \{0, 1, 2, \ldots\}$ results in the following performance guarantees: \begin{enumerate} \item The queues $U(t)$ and $Z(t)$ are deterministically upper bounded by $U_{max}$ and $Z_{max}$ respectively for all $t$ where: \begin{align} &U_{max} \defequiv V \chi_{min} + W_{1,max} \label{eq:u_max} \\ &Z_{max} \defequiv V \chi_{min} + \epsilon \label{eq:z_max} \end{align} Further, the sum $U(t) + Z(t)$ is also deterministically upper bounded by $Q_{max}$ where \begin{align} Q_{max} \defequiv V \chi_{min} + W_{1,max} + \epsilon\label{eq:q_max} \end{align} \item The queue $X(t)$ is deterministically upper and lower bounded for all $t$ as follows: \begin{align} - Q_{max} - D_{max} \leq X(t) &\leq Y_{max} - Y_{min} - Q_{max} \nonumber \\ &\;\;\;- D_{max} \label{eq:x_bounds_ext} \end{align} \item The actual battery level $Y(t)$ satisfies $Y_{min} \leq Y(t) \leq Y_{max}$ for all $t$. \item All control decisions are feasible. \item The worst case delay experienced by any delay tolerant request is given by: \begin{align} \Big\lceil \frac{2V \chi_{min} + W_{1,max} + \epsilon}{\epsilon} \Big\rceil \end{align} \item If $W_1(t), W_2(t)$ and $S(t)$ are i.i.d. over slots, then the time-average cost under the dynamic algorithm is within $B_{ext}/V$ of the optimal value: \begin{align} \lim_{t\rightarrow\infty} \frac{1}{t} \sum_{\tau = 0}^{t-1}& \expect{P(\tau) C(\tau) + 1_R(\tau) C_{rc} + 1_D(\tau) C_{dc}} \nonumber \\ &\qquad \qquad \leq \hat{\phi}_{ext} + B_{ext}/V \label{eq:utility_bound_ext} \end{align} where $B_{ext}$ is a constant given by $B_{ext} = (P_{peak} + D_{max})^2 + \frac{(W_{1,max})^2 + \epsilon^2}{2} + B$ and $\hat{\phi}_{ext}$ is the optimal solution to \textbf{P4} under \emph{any} feasible control algorithm (possibly with knowledge of future events). \end{enumerate} \label{thm:two} \end{thm} Thus, by choosing larger $V$, the time-average cost under the dynamic algorithm can be pushed closer to the minimum possible value $\phi_{opt}$. However, this increases the worst case delay bound yielding a $O(1/V, V)$ utility-delay tradeoff. Also note that $V^{max}_{ext}$ limits how large $V$ can be chosen. \begin{proof} See Appendix D. \end{proof} \begin{comment} \subsection{Proof of Theorem \ref{thm:two}} \label{section:performance_analysis_ext} Here we prove Theorem \ref{thm:two}. \begin{proof} (Theorem \ref{thm:two} part $1$) We first show (\ref{eq:u_max}). Clearly, (\ref{eq:u_max}) holds for $t=0$. Now suppose it holds for slot $t$. We will show that it also holds for slot $t+1$. First suppose $U(t) \leq V \chi_{min}$. Then, by (\ref{eq:u_t}), the most that $U(t)$ can increase in one slot is $W_{1,max}$ so that $U(t+1) \leq V \chi_{min} + W_{1,max}$. Next, suppose $V \chi_{min} < U(t) \leq V \chi_{min} + W_{1,max}$. Now consider the terms involving $P(t)$ in the objective of \textbf{P6}: $[U(t) + Z(t) - V C(P(t))]P(t)$. Since $U(t) > V \chi_{min}$, using property (\ref{eq:chi_defn}), we have: \begin{align*} [U(t) + Z(t) - &V C(P(t))]P(t) \leq \\ &[U(t) + Z(t) - V C(P_{peak})]P_{peak} \end{align*} Thus, the optimal solution to problem \textbf{P6} chooses $P^*(t) = P_{peak}$. Now, let $R^*(t), D^*(t)$ and $\gamma^*(t)$ denote the other control decisions by the optimal solution to \textbf{P6}. Then the amount of power remaining for the data center (after recharging or discharging the battery) is $P_{peak} - R^*(t) + D^*(t)$. Out of this, a fraction $1 - \gamma^*(t)$ is used to serve the delay intolerant workload. Thus: \begin{align*} (1 - \gamma^*(t))[P_{peak} - R^*(t) + D^*(t)] = W_2(t) \end{align*} Using this, and the fact that $R^*(t) \leq R_{max}$, we have: \begin{align*} &\gamma^*(t)[P_{peak} - R^*(t) + D^*(t)] \\ &= P_{peak} - R^*(t) + D^*(t) - W_2(t) \\ &\geq P_{peak} - R_{max} - W_2(t) \geq W_1(t) \end{align*} where we used the fact that $W_1(t) + W_2(t) \leq W_{max} \leq P_{peak} - R_{max}$. Thus, using (\ref{eq:u_t}), it can be seen that the amount of new arrivals to $U(t)$ cannot exceed the total service and this yields $U(t+1) \leq U(t)$. (\ref{eq:z_max}) can be shown by similar arguments. Clearly, (\ref{eq:z_max}) holds for $t=0$. Now suppose it holds for slot $t$. We will show that it also holds for slot $t+1$. First suppose $Z(t) \leq V \chi_{min}$. Then, by (\ref{eq:z_t}), the most that $Z(t)$ can increase in one slot is $\epsilon$ so that $Z(t+1) \leq V \chi_{min} + \epsilon$. Next, suppose $V \chi_{min} < Z(t) \leq V \chi_{min} + \epsilon$. Then, by a similar argument as before, the optimal solution to problem \textbf{P6} chooses $P^*(t) = P_{peak}$ Now, let $R^*(t), D^*(t)$ and $\gamma^*(t)$ denote the other control decisions by the optimal solution to \textbf{P6}. Then the amount of power remaining for the data center is $P_{peak} - R^*(t) + D^*(t)$. Out of this, a fraction $(1 - \gamma^*(t))$ is used for the delay intolerant workload. Thus: \begin{align*} (1 - \gamma^*(t))[P_{peak} - R^*(t) + D^*(t)] = W_2(t) \end{align*} Using this, and the fact that $R^*(t) \leq R_{max}$, we have: \begin{align*} &\gamma^*(t)[P_{peak} - R^*(t) + D^*(t)] \geq P_{peak} - R_{max} - W_2(t) \\ &\geq P_{peak} - R_{max} - W_{2,max} \geq W_{max} - W_{2,max} \geq \epsilon \end{align*} where we used the fact that $W_2(t) \leq W_{2,max}$ and $W_{max} \leq P_{peak} - R_{max}$. Thus, using (\ref{eq:z_t}), it can be seen that the amount of new arrivals to $Z(t)$ cannot exceed the total service and this yields $Z(t+1) \leq Z(t)$. (\ref{eq:q_max}) can be shown by similar arguments and the proof is omitted for brevity. \end{proof} \begin{proof} (Theorem \ref{thm:two} parts $2-6$) See Appendix D. \end{proof} \end{comment} \begin{figure} \centering \includegraphics[width=8.5cm,angle=0]{prices_periodic} \caption{One period of the unit cost process.} \label{fig:c_periodic} \end{figure} \begin{figure} \centering \includegraphics[width=8.5cm,angle=0]{workload_periodic} \caption{One period of the workload process.} \label{fig:w_periodic} \end{figure} \section{Simulation-based Evaluation} \label{section:simulations} We evaluate the performance of our control algorithms using both synthetic and real pricing data. To gain insights into the behavior of our algorithms and to compare with the optimal offline solution, we first consider the basic model and use a simple periodic unit cost and workload process as shown in Figs. \ref{fig:c_periodic} and \ref{fig:w_periodic}. These values repeat every $24$ hours and the unit cost does not depend on $P(t)$. From Fig. \ref{fig:c_periodic}, it can be seen that $C_{max} = \$100$ and $C_{min} = \$50$. Further, we have that $\chi_{min} = C_{max} = 100$. We assume a slot size of $1$ minute so that the control decisions on $P(t), R(t), D(t)$ are taken once every minute. We fix the parameters $R_{max} = 0.2$ MW-slot, $D_{max} = 1.0$ MW-slot, $C_{rc} = C_{dc} = 0, Y_{min} = 0$. We now simulate the basic control algorithm of Sec. \ref{section:case1} for different values of $Y_{max}$ and with $V = V_{max}$. For each $Y_{max}$, the simulation is performed for a duration of $4$ weeks. In Fig. \ref{fig:compare_periodic}, we plot the average cost per hour under the dynamic algorithm for different values of battery size $Y_{max}$. It can be seen that the average cost reduces as $Y_{max}$ is increased and converges to a fixed value for large $Y_{max}$, as suggested by Theorem \ref{thm:one}. For this simple example, we can compute the minimum possible average cost per hour (over all battery sizes) and this is given by $\$33.23$ which is also the value to which the dynamic algorithm converges as $Y_{max}$ is increased. Moreover, in this example, we can also compute the optimal offline cost for \emph{each value} of $Y_{max}$. These also also plotted in Fig. \ref{fig:compare_periodic}. It can be seen that, for each $Y_{max}$, the dynamic algorithm performs quite close to the corresponding optimal value, even for smaller values of $Y_{max}$. Note that Theorem $1$ provides such guarantees only for sufficiently large values of $Y_{max}$. Finally, the average cost per hour when no battery is used is given by $\$39.90$. \begin{figure} \centering \includegraphics[width=8.5cm,angle=0]{compare_periodic} \caption{Average Cost per Hour vs. $Y_{max}$.} \label{fig:compare_periodic} \end{figure} We next consider a six-month data set of average hourly spot market prices for the Los Angeles Zone LA1 obtained from CAISO~\cite{caiso}. These prices correspond to the period 01/01/2005$-$06/30/2005 and each value denotes the average price of 1 MW-Hour of electricity. A portion of this data corresponding to the first week of January is plotted in Fig.~\ref{fig:one_week}. We fix the slot size to 5 minutes so that control decisions on $P(t), R(t), D(t)$, etc. are taken once every 5 minutes. The unit cost $C(t)$ obtained from the data set for each hour is assumed to be fixed for that hour. Furthermore, we assume that the unit cost does not depend on the total power drawn $P(t)$. In our experiments, we assume that the data center receives workload in an i.i.d fashion. Specifically, every slot, $W(t)$ takes values from the set [0.1,1.5] MW uniformly at random. We fix the parameters $D_{max}$ and $R_{max}$ to $0.5$ MW-slot, $C_{dc}=C_{rc}= \$0.1$, and $Y_{min} = 0$. Also, $P_{peak} = W_{max} + R_{max} = 2.0$ MW. We now simulate four algorithms on this setup for different values of $Y_{max}$. The length of time the battery can power the data center if the draw were $W_{max}$ starting from fully charged battery is given by $\frac{Y_{max}}{W_{max}}$ slots, each of length $5$ minutes. We consider the following four control techniques: (A) ``No battery, No WP,'' which meets the demand in every slot using power from the grid and without postponing any workload, (B) ``Battery, No WP,'' which employs the algorithm in the basic model without postponing any workload, (C) ``No Battery, WP,'' which employs the extended model for WP but without any battery, and (D) ``Complete,'' the complete algorithm of the extended model with both battery and WP. For (C) and (D), we assume that during every slot, half of the total workload is delay-tolerant. We simulate these algorithms to obtain the total cost over the $6$ month period for $Y_{max} \in \{15, 30, 50\}$ MW-slot. For (B), we use $V=V_{max}$ while for (C) and (D), we use $V=V^{max}_{ext}$ with $\epsilon = W_{max}/2$. Note that an increased battery capacity should have no effect on the performance under (C). In order to get a fair comparison with the other schemes, we assume that the worst case delay guarantee that case (C) must provide for the delay tolerant traffic is the same as that under (D). Fig.~\ref{fig:compare_real_prices_iid_w} plots the total cost under these schemes over the $6$ month period. In Table~\ref{table:table2}, we show the ratio of the total cost under schemes (B), (C), (D) to the total cost under (A) for these values of $Y_{max}$ over the $6$ month period. It can be seen that (D) provides the most cost savings over the baseline case. \begin{comment} A second set of results that we present employs non-i.i.d. workloads. Specifically, we try to generate a workload exhibiting a ``time-of-day'' like behavior with a 6-hour long ``peak'' duration. To do this, we assume that every day, during a 6-hour window from 10.00am - 4.00pm, $W(t)$ takes values from the set [0.1, 1.5] MW uniformly at random, similar to the previous workload. At other times, it takes lower values from [0.1, 0.7] MW, uniformly at random. Thus, {\em the average workload is smaller at these times.} In Fig.~\ref{fig:compare_real_prices_non_iid_w}, we plot the total cost under the baseline case as well as the basic and extended algorithms over the 6 month period for $Y_{max} \in \{15, 30, 50\}$. We also show the the percentage savings over the baseline case in each case in Table~\ref{table:table3}. It can be seen that the gains are even higher with non i.i.d $W(t)$ because..... \end{comment} \begin{figure} \centering \includegraphics[height=4.5cm, width=8.5cm,angle=0]{compare_real_prices_iid_w} \caption{Total Cost over $6$ months with i.i.d $W(t)$ and different $Y_{max}$} \label{fig:compare_real_prices_iid_w} \end{figure} \begin{table} \centering \begin{tabular}{|c|c|c|l|} \hline $Y_{max}$ & 15 & 30 & 50 \\ \hline Battery, No WP & 95\% & 92\% & 89\% \\ \hline WP, No Battery & 96\% & 92\% & 88\% \\ \hline WP, Battery & 92\% & 85\% & 79\%\\ \hline \end{tabular} \caption{Ratio of cost under schemes (B), (C), (D) to the cost under (A) for different values of $Y_{max}$ with i.i.d. $W(t)$.} \label{table:table2} \end{table} \begin{comment} Finally, to demonstrate the $O(1/V)$ behavior of the time average utility bounds, we consider a simplified model with i.i.d $W(t)$ and $C(t)$. Specifically, $W(t)$ takes values from the interval $[10.0, 90.0]$ uniformly at random. For the cases with WP, we assume that every slot half of the total workload is delay tolerant. Similarly, $C(t)$ takes values from the interval $[2.0, 10.0]$ uniformly at random. The other parameters are set to $R_{max} = D_{max} = 25.0$, $C_{dc} = C_{rc} = 5.0$. $\epsilon$, .. In Fig. \ref{fig:compare_iid}, we plot the average cost over $10000$ slots for the three scenarios algorithms. It can be see that for each .... \begin{figure} \centering \includegraphics[height=4cm, width=7.5cm,angle=0]{compare_iid} \caption{Comparison of....} \label{fig:compare_iid} \end{figure} \end{comment} \section{Conclusions and Future Work} \label{section:conc} In this paper, we studied the problem of opportunistically using energy storage devices to reduce the time average electricity bill of a data center. Using the technique of Lyapunov optimization, we designed an online control algorithm that achieves close to optimal cost as the battery size is increased. We would like to extend our current framework along several important directions including: (i) multiple utilities (or captive sources such as DG) with different price variations and availability properties (e.g., certain renewable sources of energy are not available at all times), (ii) tariffs where the utility bill depends on peak power draw in addition to the energy consumption, and (iii) devising online algorithms that offer solutions whose proximity to the optimal has a smaller dependence on battery capacity than currently. We also plan to explore implementation and feasibility related concerns such as: (i) what are appropriate trade-offs between investments in additional battery capacity and cost reductions that this offers? (ii) what is the extent of cost reduction benefits for realistic data center workloads? and (iii) does stored energy make sense as a cost optimization knob in other domains besides data centers? Our technique could be viewed as a design tool which, when parameterized well, can assist in determining suitable configuration parameters such as battery size, usage rules-of-thumb, time-scale at which decisions should be made, etc. Finally, we believe that our work opens up a whole set of interesting issues worth exploring in the area of consumer-end (not just data centers) demand response mechanisms for power cost optimization. \section*{Acknowledgments} This work was supported in part by the NSF Career grant CCF-0747525.
\section{Introduction} Massive stars have a profound effect on the evolution of their natal molecular clouds. Their strong stellar winds and ultraviolet (UV) radiation cause an important feedback of energy and momentum in the surrounding medium. Once massive stars form they begin to ionise the remaining parental molecular cloud. The ionising UV radiation has two competing effects on the parental molecular cloud. One is negative feedback on star formation activity, i.e., the remaining molecular cloud is dispersed and further star formation is halted. The other is positive feedback. The interaction can trigger new episodes of star formation as the H{\sc ii} region expands into the molecular cloud. Two processes have been considered for the triggering of star formation at the edge of the H{\sc ii} region, namely `collect and collapse' and `radiation driven implosion (RDI)'. In the collect and collapse process, a compressed layer of high density neutral material is accumulated between the ionisation front (IF) and the shock front (SF). The dynamical instabilities in the compressed layer result in the fragmentation of the layer and formation of second generation stars. If the IF/ SF encounters pre-existing denser parts, it compresses them to induce star formation. The process is known as RDI. Detailed model calculations of the RDI process have been carried out by several authors (e.g., Bertoldi 1989, Lefloch $\&$ Lazareff 1995, Kessel-Deynet \& Burkert 2003, Miao et al. 2006). Star formation is predicted to occur in {\bf the} initial short compression phase. This compression phase is followed by a transient phase of re-expansion and then by a quasi-stationary cometary phase. During this last phase, the cloud represents a structure of a dense head and a long tail and moves slowly away from the ionising source by the rocket effect. The signature of the RDI process is the anisotropic density distribution of gas in a relatively small molecular cloud surrounded by a curved ionisation front (bright rim) as well as a small group of YSOs in front of it. BRCs are small molecular clouds located near the edge of evolved H{\sc ii} regions and show signs of the RDI and are hence considered to be good laboratories to study the physical processes involved in the RDI process. Sugitani et al. (1995) carried out near infrared (NIR) imaging of 44 BRCs and found that elongated small clusters or aggregates of YSOs, which are aligned toward the direction of the ionizing star, are often associated with them. These aggregates showed a tendency that `redder' (presumably younger) stars tend to be located inside the BRCs, whereas relatively `bluer' (presumably older) stars are found outside the clouds, suggesting an age gradient. Thus, they advocated a hypothesis called `{\it small-scale sequential star formation} ({\it S$^4$F})'. If the BRC is originally relatively large, the star formation may propagate along the axis of the BRCs as the ionization/shock front advances further and further into the molecular cloud (Kessel-Deynet \& Burkert 2003). The W5 H{\sc ii} region is an extended H{\sc ii} region with relatively simple morphology and shows indications of triggered star formation. It is a part of the large W3/W4/W5 cloud complex in the Perseus arm and consists of two adjacent circular H{\sc ii} regions, W5 E and W5 W. There are many studies on this region. Karr \& Martin (2003) discussed triggered star formation in W5 using multi-wavelength archival data. Based on the timescales of the expansion of the H{\sc ii} region and the age of the YSOs, they obtained the timescale of the interaction between the molecular clouds and the H{\sc ii} region, $t \sim 0.5-1.0$ Myr. Using the $Spitzer$ Space Telescope imaging with Infrared Array Camera (IRAC) and Multiband Imaging Photometer for $Spitzer$ (MIPS), Koenig et al. (2008) noticed dense clusters of YSOs, centered around the O stars HD 17505, HD 17520, BD +60 586 and HD 18326. The H{\sc ii} region W5 E is primarily ionised by HD 18326. Chauhan et al. (2009) also paid attention to the cluster around this O7 V star. W5 E H{\sc ii} region has two BRCs, namely BRCs 13 and 14 (Sugitani et al. 1991, hereafter SFO 91) at its periphery. Based on the column densities of $^{13}$CO and the spatial distribution of YSO candidates, Niwa et al. (2009) identified a BRC candidate in the north-western part of the W5 E H{\sc ii} region. We refer to this BRC candidate as BRC NW. Hence W5 E is an interesting region to study triggered star formation. In our earlier papers (Ogura et al. 2007, hereafter Paper I; Chauhan et al. 2009, hereafter Paper II) we have studied the star formation scenario in/ around six BRCs, including BRCs 13 and 14. The analysis was limited to the YSOs detected using the H$\alpha$ emission and NIR excess only. A recent study by Koenig et al. (2008) has increased the number of YSOs in W5 E significantly. Hence, these data can be used to further investigate the YSO contents which we partly failed to detect in the H$\alpha$ and NIR excess surveys reported in Paper I and Paper II. In this paper, we have made an attempt to make photometric studies of the stellar content of the newly identified cluster in W5 E, by incorporating the NIR and mid infrared (MIR) data from IRAC/ MIPS of the $Spitzer$ telescope. We have also considered the properties of the YSOs in the cluster as well as the three BRC regions to understand the star formation scenario in the W5 E H{\sc ii} region. The influence of the ionizing source on the surrounding parental molecular cloud has also been discussed. In Sections 2 and 3, we describe the observations, data reductions and archival data used in the present work. Section 4 describes the analysis of the associated cluster. Sections 5 and 6 illustrate the procedure to estimate the membership, age, mass of the YSOs and total-to-selective extinction, $R_V$ in the cluster and BRC regions. In Section 7 we discuss the initial mass function (IMF) and cumulative mass functions (CMFs) of the cluster and BRC regions. Section 8 describes the star formation scenario in the cluster and BRC regions. In Section 9 the disk evolution of T Tauri Stars (TTSs) has been discussed. \section{Observations and Data reductions} The 50$\times$50 arcmin$^2$ area containing the cluster around the O7 star HD 18326 that is noticed by Koenig et al. (2008) and Chauhan et al. (2009), is reproduced from the DSS2-R image, and shown in Fig. 1. As is evident from the figure, the cluster is embedded in an H{\sc ii} region W5 E. BRCs 13 and 14 are located towards the eastern side, whereas BRC NW detected by Niwa et al. (2009) can be seen towards the north-west direction of the cluster. In the ensuing subsections we describe the observations carried out to study the region in detail. \subsection{Optical CCD Observations} The $UBVI_c$ CCD optical observations of W5 E were carried out using the the 2048 $\times$ 2048 pixel$^2$ CCD camera mounted at the f/3.1 Schmidt focus of the 1.05-m telescope of Kiso Observatory, Japan. The pixel size of 24 $\mu$m with an image scale of $1^{\prime\prime}.5$/pixel covers a field of view of $\sim$ 50$\times$ 50 arcmin$^2$ on the sky. The average FWHM of the star images during the observations was $\sim$$3^{\prime\prime}$. \begin{table} \caption{Log of observations} \begin{tabular}{|p{.7in}|p{.5in}|p{3.in}|p{1.2in}|} \hline $\alpha_{(2000)}$ & $\delta_{(2000)}$ & Filter \& Exposure(sec)$\times$no. of frames& Date of observations\\ (h:m:s) & (d:m:s) & &(yr-mm-dd) \\ \hline KISO&&&\\ 02:59:22.60 &+60:33:48.7 & U:180$\times$9,30$\times$6; B:60$\times$9,10$\times$6; V:60$\times$9,10$\times$6; I:60$\times$9,10$\times$6 &2007-10-20\\ &&&\\ ST&&&\\ 02:59:22.60 &+60:33:48.7 & U:240$\times$2,10$\times$1; B:180$\times$2,5$\times$1; V:100$\times$2,4$\times$1; I:60$\times$2,4$\times$1 & 2009-10-13\\ 02:59:22.60 &+60:33:48.7 & U:900$\times$1,300$\times$1; B:600$\times$5; V:360$\times$9; I:120$\times$10 & 2006-12-16\\ 03:00:08.34 &+60:39:19.3 & V:600$\times$5;I:300$\times$5 & 2007-10-13\\ 02:58:38.78 &+60:39:06.1 & V:600$\times$5;I:300$\times$5 & 2007-10-13\\ 03:00:03.49 &+60:27:59.6 & V:600$\times$5;I:300$\times$5 & 2007-10-13\\ 02:58:33.34 &+60:28:47.2 & V:300$\times$10;I:300$\times$5 & 2007-11-06\\ 02:57:44.41 &+60:38:29.1 & V:180$\times$2;I:100$\times$2 & 2009-10-13\\ 02:57:44.41 &+60:38:29.1 & V:600$\times$6;I:300$\times$8 & 2009-10-15\\ 02:59:34.13 &+61:05:28.4 & V:300$\times$10;I:300$\times$5 & 2006-12-15\\ &&&\\ HCT&&&\\ 02:59:23.83 &+60:34:00.0 &Gr7/167l:300$\times$1 &2009-11-16\\ \hline \hline \end{tabular} \label{tab1} \end{table} The $UBVI_c$ CCD observations of the central region of W5 E have also been carried out using the 2048 $\times$ 2048 pixel$^2$ CCD camera mounted on the 1.04-m Sampurnanand Telescope (ST) of the Aryabhatta Research Institute of Observational Sciences (ARIES), Nainital, India. To improve the signal-to-noise ratio (S/N), the observations were carried out in a binning mode of $2 \times 2$ pixel$^2$. The pixel size is 24 $\mu$m with an image scale of $0^{\prime\prime}.37$/pixel and the entire chip covers a field of $\sim$13$\times$13 arcmin$^2$ on the sky. The average FWHM of star images was $\sim$$2^{\prime\prime}.5$. The observations of the central region of W5 E were standardised on 2009 October 13 by observing standard stars in the SA 92 field (Landolt 1992). Deep imaging of a nearby field region towards the north from the cluster centre ($\alpha_{2000}$ = $02^{h}59^{m}34^{s}$; $\delta_{2000}$ = $+61^{\circ}05^{\prime}28^{\prime\prime}$), was also carried out in $V$ and $I_c$ bands using the ST. The magnitudes of bright stars which were saturated in deep exposure frames have been taken from short exposure frames. A number of bias and twilight frames were also taken during the observing runs. The log of the observations is tabulated in Table \ref{tab1}. The pre-processing of the data frames was done using the various tasks available under the $IRAF$ data reduction software package. The photometric measurements of the stars were performed using the $DAOPHOT II$ software package (Stetson 1987). The point spread function was obtained for each frame using several uncontaminated stars. The instrumental magnitudes of the central region observed on 2009 October 13 with ST were converted into the standard system using least-square linear regression procedures outlined by Stetson (1992). The photometric calibration equations used are as follows:\\ \noindent $u = U + (7.858 \pm 0.007) + (0.596 \pm 0.024) X + (0.124 \pm 0.008)(U-B)$,\\ \noindent $b = B + (5.464 \pm 0.006) + (0.336 \pm 0.010) X + (0.134 \pm 0.006)(B-V)$,\\ \noindent $v = V + (5.088 \pm 0.006) + (0.188 \pm 0.011) X + (0.032 \pm 0.007)(V-I_c)$,\\ \noindent $i = I_c + (5.320 \pm 0.012) + (0.121 \pm 0.019) X + (0.106 \pm 0.011)(V-I_c)$\\ where $U, B, V$ and $I_c$ are the standard magnitudes; $u, b, v$ and $i$ are the instrumental magnitudes obtained after time and aperture corrections and X is the airmass. We have ignored the second-order colour correction terms as they are generally small in comparison with other errors present in the photometric data reduction. The standard deviations of the standardisation residuals, $\Delta$, between the standard and transformed magnitudes and colours of the standard stars, are found to be $\Delta$$V = 0.008$, $\Delta$$(B-V) = 0.017$, $\Delta$$(V-I_c) = 0.020$ and $\Delta$$(U-B) = 0.011$. The photometric accuracies depend on the brightness of the stars, and the typical $DAOPHOT$ errors in $B, V$ and $I_c$ bands at $V$ $\sim$ 18 are smaller than 0.01 mag. Near the limiting magnitude of $V$ $\sim$ 21, the $DAOPHOT$ errors increase to 0.06 and 0.04 mag in the $V$ and $I_c$ bands, respectively. The Kiso data were standardised using the secondary standards obtained from the central region observations as mentioned above. To study the luminosity function (LF)/ mass function (MF) of the cluster region we have used $VI_c$ data taken with ST. It is necessary to take into account the incompleteness in the observed data that may occur for various reasons (e.g., crowding of the stars). A quantitative evaluation of the completeness of the photometric data with respect to the brightness and the position on a given frame is necessary to convert the observed LF to a true LF. We used the ADDSTAR routine of $DAOPHOT II$ to determine the completeness factor (CF). The procedure has been outlined in detail in our earlier works (see e.g., Pandey et al. 2001). We randomly added artificial stars to both $V$ and $I_c$ images in such a way that they have similar geometrical locations but differ in $I_c$ brightness according to the mean $(V-I_c)$ colour (=1.5 mag) of the data sample. The luminosity distribution of artificial stars is chosen in such a way that more stars are inserted towards the fainter magnitude bins. The frames are reduced using the same procedure used for the original frame. The ratio of the number of stars recovered to that added in each magnitude interval gives the CF as a function of magnitude. The minimum value of the CF of the pair (i.e., $V$ and $I_c$ band observations) for the two sub-regions, given in Table \ref{cf_opt}, is used to correct the data for incompleteness. The incompleteness of the data increases with increasing magnitude as expected. However, it does not depend on the area significantly. \begin{table} \caption{Completeness factor of photometric data in the cluster and field regions.} \label{cf_opt} \begin{tabular}{cccc} \hline V range& cluster region& & field region\\ (mag)& $r\le 3^\prime$ & $3^\prime <r \le6^\prime$& \\ \hline 13.5 - 14.0&1.00&1.00&1.00\\ 14.0 - 14.5&1.00&1.00&1.00\\ 14.5 - 15.0&0.99&0.99&1.00\\ 15.0 - 15.5&0.98&0.98&0.99\\ 15.5 - 16.0&0.98&0.98&0.98\\ 16.0 - 16.5&0.96&0.97&0.98\\ 16.5 - 17.0&0.97&0.96&0.98\\ 17.0 - 17.5&0.97&0.96&0.98\\ 17.5 - 18.0&0.95&0.95&0.96\\ 18.0 - 18.5&0.93&0.94&0.95\\ 18.5 - 19.0&0.91&0.92&0.94\\ 19.0 - 19.5&0.88&0.90&0.91\\ 19.5 - 20.0&0.85&0.84&0.89\\ 20.0 - 20.5&0.81&0.82&0.84\\ 20.5 - 21.0&0.72&0.71&0.77\\ 21.0 - 21.5&0.51&0.54&0.57\\ \hline \end{tabular} \end{table} The photometric results for the BRC 13 and BRC 14 regions have been taken from our earlier work (Paper II). They are based on observations with Himalayan Faint Object Spectrograph Camera (HFOSC) on the 2.0-m Himalayan Chandra Telescope (HCT). The boundaries of the earlier observations are shown with dashed lines in Fig. 1. \subsection { Grism Slit spectroscopy} We obtained a low resolution optical spectrum of the exciting star of W5 E, HD 18326, on 2009 November 16 using HFOSC on HCT, with a slit width of 2 arcsec and Grism 7 ($\lambda = 3800 - 6840$ \AA, dispersion = 1.45 \AA /pixel). A one dimensional spectrum was extracted from the bias subtracted and flat-field corrected image in the standard manner using IRAF. The wavelength calibration of the spectrum was done using a FeAr lamp source. The standard star G191-B2B is used for the standardisation and flux calibration. \section{Archival Data} \subsection { Near-infrared data from 2MASS} NIR $JHK_s$ data for point sources within a radius of $25^\prime$ around the central cluster have been obtained from the Two Micron All Sky Survey (2MASS) Point Source Catalog (PSC) (Cutri et al. 2003). Sources having uncertainty less than 0.1 mag (S/N $\ge$ 10) in all the three bands were selected to ensure high quality data. The $JHK_s$ data were transformed from the 2MASS system to the CIT system using the relations given at the 2MASS website\footnote{http://www.astro.caltech.edu/$\sim$jmc/2mass/v3/transformations/}. \subsection { Mid-infrared data from $Spitzer$} The near- and mid-infrared data (3.6 to 24 $\mu$m) from the $Spitzer$ Space telescope have provided the capability to detect and measure the infrared excesses due to circumstellar disk emission of the YSOs. In order to study the evolutionary stages of the YSOs detected using the $Spitzer$, we used IRAC (3.6 $\mu$m, 4.5 $\mu$m, 5.8 $\mu$m and 8.0 $\mu$m) and MIPS (24 $\mu$m) photometry taken from Koenig et al. (2008). \subsection {H$\alpha$ emission stars from slitless spectroscopy} The H$\alpha$ emission stars for the cluster region and BRC regions have been taken from Nakano et al. (2008) and Ogura et al. (2002), respectively. \section{Analysis of the associated cluster} \subsection{Radial stellar surface density profile}\label{rden} The radial extent is one of the important parameters to study the dynamical properties of clusters. To estimate this we assumed a spherically symmetric distribution of stars in the cluster. The star count technique is one of the useful tools to determine the distribution of cluster stars with respect to the surrounding stellar background. In order to determine the cluster centre, we derived the highest peak of stellar density by fitting a Gaussian profile to the star counts in strips along both the X and Y axes around the eye estimated cluster centre. The cluster centre from the optical data has turned out to be at $\alpha_{2000}$ = $02^{h}59^{m}22^{s}.0$$\pm$$ 1^{s}.0$; $\delta_{2000}$ = $+60^{\circ}34^{\prime}37^{\prime\prime}$$\pm 12^{\prime\prime}$. We repeated the same procedure using the 2MASS data to estimate the cluster centre and obtained it to be $\sim$$12^{\prime\prime}$ away from the optical co-ordinates. However, this difference is within the uncertainty. Henceforth, we adopt the optical centre. We estimated the radial density profile (RDP) to study the radial structure of the cluster. We divided the cluster into a number of concentric circles and the projected stellar density in each concentric annulus was obtained by dividing the number of stars by the respective annulus area. Stars brighter than $V$ = 19.5 mag and $K$ = 14.7 mag were considered for estimating the RDPs from the optical and 2MASS data, respectively. The densities thus obtained are plotted as a function of radius in Fig. 2. The error bars are derived assuming that the number of stars in each annulus follows the Poisson statistics. The extent of the cluster $r_{cl}$ is defined as the radius where the cluster stellar density merges with the field stellar density. The horizontal dashed line in the plot shows the field star density, which is obtained from a region $\sim$ 25$^\prime$ away towards the north from the cluster centre ($\alpha_{2000}$ = $02^{h}59^{m}34^{s}$; $\delta_{2000}$ = $+61^{\circ}05^{\prime}28^{\prime\prime}$). Based on the radial density profile, we find that the $r_{cl}$ is about 6$^\prime$ for stars brighter than $V$ = 19.5 mag. Almost the same value for the cluster extent is obtained for the 2MASS data. We adopted a radius of 6$^\prime$ for this cluster to obtain the cluster parameters such as reddening, distance, IMF etc. To parameterise the RDP of the cluster, we fitted the observed RDP with the empirical model of King (1962) which is given by \begin{center} $\rho (r) \propto {\displaystyle{\rho_0} \over \displaystyle{1+\left({r\over r_c}\right)^2}}$, \end{center} where $r_c$ is the core radius at which the surface density $\rho(r)$ becomes half of the central density, $\rho_0$ . The best fit to the radial density obtained by a $\chi^2$ minimization technique, is shown in Fig. 2. The core radius thus estimated is 1$^\prime$.01 $\pm$ 0$^\prime$.12. \subsection{Interstellar reddening} We know that the extinction or reddening $E(B - V)$ of a star in a cluster arises due to two distinct sources: \begin{enumerate} \item the general interstellar medium (ISM) in the foreground of the cluster [$E(B −- V)_{f}$], and \item the localized ISM associated with the cluster [$E(B −- V )_c$ = $E(B −- V)$ $−-$ $E(B −- V)_{f}$], \end{enumerate} The former component is characterised by the ratio of the total-to-selective extinction $R_V$ [= $A_V$ /$E(B −- V )$] = 3.1 (Wegner 1993; He et al. 1995; Winkler 1997), whereas, for the intra-cluster regions of young clusters embedded in a dust and gas cloud, the value of $R_V$ may vary significantly (Chini \& Wargau 1990; Tapia et al. 1991; Pandey et al. 2000). The value of $R_V$ affects the distance determination significantly, and consequently the age determination of stars. Several studies have already pointed out {\bf an} anomalous reddening law with high $R_V$ values in the vicinity of star forming regions (see e.g., Neckel \& Chini 1981, Chini \& Kr{\"u}egel 1983, Chini \& Wargau 1990, Pandey et al. 2000, Samal et al. 2007). Since the W5 E cluster and the BRCs are associated with the H{\sc ii} region, it will be interesting to examine the reddening law in these objects. The ratio of total-to-selective extinction $R_V$ is found to be normal in the cluster region (cf. Section 6 for details). Since spectroscopic observations are not available, the interstellar reddening $E(B −- V)$ towards the cluster region is estimated using the $(U −- B)$/$(B −- V)$ colour-colour (CC) diagram. The CC diagram of the cluster region is presented in Fig. 3. Since the cluster is very young, a variable reddening within the cluster region is expected. In Fig. 3, the continuous lines represent the intrinsic zero age main sequence (ZAMS) by Girardi et al. (2002) which are shifted by $E(B −- V )$ = 0.62 and 0.80 mag respectively, along the normal reddening vector (i.e., $E(U −- B)$/$E(B −- V)$ = 0.72) to match the distributions of probable cluster members. Fig. 3 thus yields a variable reddening with $E(B −- V)_{min}$ = 0.62 mag to $E(B −- V)_{max}$ = 0.80 mag in the cluster region. The stars lying within these two reddened ZAMSs may be probable members of the cluster. Reddening of individual stars with spectral classes earlier than A0 have been computed using the reddening free index, Q (Johnson \& Morgan 1953). Assuming a normal reddening law, we calculated $Q = (U - B) - 0.72 \times (B - V)$. The value of Q for stars earlier than A0 will be $<$ 0. For main sequence (MS) stars, the intrinsic $(B - V)_0$ colour and colour excess can be obtained by the relations; $(B - V)_0 = 0.332 \times Q$ and $E(B - V) = (B - V) - (B - V)_0$, respectively. Fig. 3 also indicates a large amount of contamination due to field stars. The probable late type foreground stars with spectral types later than A0 may follow the ZAMS reddened by $E(B −- V )=0.50$ mag. A careful inspection of Fig. 3 indicates the presence of further reddened background populations. The reddening $E(B −- V)$ for the background population is found out to be in the range of $\sim$ 0.95 - 1.25 mag. This population may belong to the blue plume (BP) of the Norma-Cygnus arm (cf. Pandey et al. 2006). The estimated $E(B −- V)$ values for the background population are comparable to the $E(B −- V)$ value of the BP population around $l \sim 130 ^{\circ}$ (cf. Pandey et al. 2006). \subsection{Spectral classification of the ionising star in W5 E H{\sc ii} region} We obtained a slit spectrum of the brightest source to study its nature. In Fig. 4, we present the flux calibrated, normalised spectrum of HD 18326, which is the ionising source of the H{\sc ii} region, in the wavelength range $3990 ­- 5000$ \AA. The important lines have been identified and labeled. HD 18326 is identified as an O7V and O7V(n) type star by Conti \& Leep (1974) and Walborn (1973), respectively. The ratio of HeI $\lambda$4471/ HeII $\lambda$4542 is a primary indicator of the spectral class of early type stars. The ratio we found for this star is $\sim$1, which indicates that it is an O7 $\pm$ 0.5 star. With the present resolution of the spectrum, luminosity assessment is quite difficult. However, due to the presence of strong absorption in HeII $\lambda$4686, we assign the luminosity class V. \subsection{Distance and optical colour magnitude diagrams} The spectral class of the ionising source yields an intrinsic distance modulus of 11.2 which corresponds to a distance of 1.74 kpc. Here, it is worthwhile noting that the $M_V$ for an O7V star in the literature varies significantly; e.g., $M_V$ = -5.2 (Schmidt-Kaler 1982) to -4.9 (Martins \& Plez 2006). This star is also reported as a variable star and a suspected spectroscopic binary (Kazarovets et al. 1998; Turner et al. 2008). Hence, the distance estimation based only on the O-type star alone may not be reliable. We also estimated the individual distance modulus of other probable MS stars. The intrinsic colours for each star were estimated using the Q-method as discussed in Sec. 4.2. We estimated corresponding $M_V$ values for each star using the ZAMS by Girardi et al. (2002). The average value of the intrinsic distance modulus, obtained using 24 probable MS members, comes out to be $11.65 \pm 0.57$, corresponding to a distance of $2.1 \pm 0.3$ kpc. This distance estimate is in agreement with those obtained by Becker \& Fenkart (1971; 2.2 kpc), Georgelin \& Georgelin (1976; 2.0 kpc) and Hillwig et al. (2006; 1.9 kpc). We used the optical colour magnitude diagrams (CMDs) to derive the fundamental parameters of the cluster, such as age, distance etc. The $V/(B −- V )$ and $V/ (V −- I )$ CMDs for stars lying within 6$^\prime$ radius are shown in Figs. 5a and 5b. Fig. 5c shows the $V/ (V −- I )$ CMD for a nearby field region (see Sec. 4.1). A 4 Myr isochrone for $Z$ = 0.019 by Girardi et al. (2002) and the pre-main-sequence (PMS) isochrones for 1 Myr and 5 Myr by Siess et al. (2000) have also been plotted for $(m - M_V)$ = 13.5 mag and $E(B - V)$ = 0.62 mag assuming $E(V - I)$ = 1.25$\times$$E(B - V)$ and $R_V = 3.1$. A comparison of the CMDs of the cluster region with the field region reveals an unambiguous population of PMS sources along with a significant contamination due to field star population. \section{IDENTIFICATION OF PRE-MAIN-SEQUENCE OBJECTS ASSOCIATED WITH THE CLUSTER AND BRCS} Since the W5 E region is located at a low galactic latitude, the region is significantly contaminated by foreground/background stars as discussed above. In order to understand star formation in the region, we selected probable PMS members associated with the region using the following criteria. Some PMS stars, specifically classical T Tauri stars (CTTSs), show emission lines in their spectra, among which usually H$\alpha$ is the strongest. Therefore, H$\alpha$ emission stars can be considered as good candidates for PMS stars associated with the region. In the present study, we use H$\alpha$ emission stars found by Ogura et al. (2002) and Nakano et al. (2008) in the W5 E H{\sc ii} region. Since many PMS stars also show NIR/MIR excesses caused by circumstellar disks, NIR/MIR photometric surveys are also powerful tools to detect low-mass PMS stars. We have also used the YSOs identified by Koenig et al. (2008) in the W5 E H{\sc ii} region using $Spitzer$ IRAC and MIPS photometry. Fig. 6a shows the NIR ${(J - H)/(H - K)}$ colour-colour (NIR-CC) diagram of all the sources detected in the 2MASS catalogue along with the YSOs identified by Koenig et al. (2008) in the cluster region, whereas Fig. 6b shows the NIR-CC diagram for the sources in the nearby reference field. In Figs. 6a and 6b, the thin and long-dashed curves represent the unreddened MS and giant branches (Bessell $\&$ Brett 1988), respectively. The dotted line indicates the locus of intrinsic CTTSs (Meyer et al. 1997). The curves are also in the CIT system. The parallel dashed lines are the reddening vectors drawn from the tip (spectral type M4) of the giant branch (``upper reddening line''), from the base (spectral type A0) of the MS branch (``middle reddening line'') and from the tip of the intrinsic CTTS line (``lower reddening line''). The extinction ratios $A_J/A_V = 0.265, A_H/A_V = 0.155$ and $A_K/A_V=0.090$ have been adopted from Cohen et al. (1981). We classified sources into three regions in the NIR-CC diagrams (cf. Ojha et al. 2004a). `F' sources are located between the upper and middle reddening lines and are considered to be either field stars (MS stars, giants) or Class III sources and Class II sources with small NIR excesses. `T' sources are located between the middle and lower reddening lines. These sources are considered to be mostly CTTSs (Class II objects). There may be an overlap in NIR colours of Herbig Ae/Be stars and CTTSs in the `T' region (Hillenbrand et al. 1992). `P' sources are those located in the region redward of the `T' region and are most likely Class I objects (protostar-like objects; Ojha et al. 2004b). So, objects falling in the `T' and `P' regions of NIR-CC diagrams are considered to be NIR excess stars and hence are probable members of the cluster. These sources are included in the analysis of the present study in addition to H$\alpha$ emission stars. It is worthwhile, however, to note that Robitaille et al. (2006) have recently shown that there is a significant overlap between protostars and CTTSs in the NIR-CC space. The $V/(V - I)$ CMD for the YSOs taken from the catalogue by Koenig et al. (2008) for the cluster region ($r_{cl} = 6^\prime$) is shown in Fig. 7. Here the well-known age-with-mass trend that higher mass stars look older than lower mass stars (Hillenbrand et al. 2008) is evident. In addition a few sources, having $V \ga 15$, classified as Class III objects are located near the MS. They are also located on the MS in the NIR-CC diagram and hence could be field stars. This indicates that part of Class III objects by Koenig et al. (2008) are not YSOs, but rather stars found in the W5 Spitzer photometric sample that appear to have photospheric colours in the 3 to 24 $\mu$m bands and thus appear as Class III SEDs. Thus, the listed Class III objects by Koenig et al. (2008) may be heavily contaminated by foreground and background field populations. A comparison of the NIR-CC diagram of the cluster region and nearby field region indicates that the YSOs identified by Koenig et al. (2008) and having $(J-H) > 0.7$ mag and $(H-K) > 0.3$ mag can be safely considered as YSOs associated with the region. The NIR-CC diagrams for the identified YSOs (with H$\alpha$ emission and IR excess) in the BRC NW, BRC 13 and BRC 14 are shown in Figs. 8a, 8b and 8c, respectively. The NIR-CC diagrams were used to estimate $A_V$ for each of these YSOs by tracing them back to the intrinsic CTTS locus of Meyer et al. (1997) along the reddening vector (for details see Paper I \& Paper II). The $A_V$ for the stars lying in the `F' region is estimated by tracing them back to the extension of the intrinsic CTTS locus. The mean reddening for each {\bf BRC} region is calculated. The mean $A_V$ values for BRC NW, BRC 13 and BRC 14 are found to be 2.26 mag, 2.33 mag and 3.05 mag, respectively. Fig. 9 shows the $V/(V-I)$ CMDs of the YSOs selected using the NIR-CC diagram in the cluster region as well as in the three BRC regions. Again, the CMDs indicate that practically all of them are PMS stars but, at the same time reveal a significant scatter in their age. The age of each YSO was estimated by referring to the isochrones. The mass of the YSOs was estimated using the $V/(V −- I_c )$ colour-magnitude diagram as discussed in Pandey et al. (2008) and Chauhan et al. (2009). The resultant age and mass are given in Table 3, which is available in an electronic form. Here, we would like to point out that the estimation of the age of the PMS stars by comparing the observations with the theoretical isochrones is prone to two kinds of errors; random errors in observations and systematic errors due to the variation between the predictions of different theoretical evolutionary tracks (see e.g., Hillenbrand 2005, Hillenbrand et al. 2008). The effect of random errors in determination of age and mass was estimated by propagating the random errors to their observed estimation by assuming normal error distribution and using Monte-Carlo simulations. The use of different PMS evolutionary models give different ages and hence an age spread in a cluster (e.g., Sung et al. 2000). In the present study, we have used the models by Siess et al. (2000) only for all the BRCs and the cluster region, therefore our age and mass estimations are not affected by the systematic errors. However, the use of different sets of PMS evolutionary tracks will introduce a systematic shift in age determination. The presence of binaries may be another source of errors in the age determination. Binarity will brighten the star, consequently the CMD will yield a lower age estimate. In the case of equal mass binaries we expect an error of $\sim$ 50 - 60\% in the age estimation of the PMS stars. However, it is difficult to estimate the influence of binarity on the mean age estimation as the fraction of binaries is not known. \begin{table*} \caption{The {\it B, V} and {\it I$_c$} photometric data along with their position, mass and age for the YSOs in the cluster and BRC regions} \label{phot_data} \begin{tabular}{cccccccc} \hline S. No.&$\alpha_{2000}$&$\delta_{2000}$&$B \pm eB$&$V \pm eV$&$I \pm eI$&$Age\pm \sigma$&$mass \pm \sigma$ \\ &$h:m:s$&$d:m:s$&$mag$&$mag$&$mag$&$Myr$&$M_\odot$ \\ \hline {\bf cluster region}&&&&&&&\\ 1 &$02:58:39.03$&$60:37:25.8$&$-$&$19.67 \pm 0.02$&$16.78 \pm 0.02$&$0.7 \pm 0.01$&$0.4 \pm 0.00$ \\ 2 &$02:58:39.24$&$60:37:02.7$&$20.07 \pm 0.02$&$18.21 \pm 0.01$&$15.60 \pm 0.01$&$0.2 \pm 0.02$&$0.5 \pm 0.00$ \\ 3 &$02:58:39.32$&$60:35:00.6$&$-$&$20.78 \pm 0.03$&$18.05 \pm 0.02$&$2.4 \pm 0.05$&$0.4 \pm 0.01$ \\ -- &$------$&$------$&$-----$&$------$&$------$&$----$&$----$\\ -- &$------$&$------$&$-----$&$------$&$------$&$----$&$----$\\ \hline \end{tabular} \end{table*} \section {Reddening law in the cluster and BRC regions} \label{reddening} To study the nature of the extinction law in the region, we used two colour diagrams (TCDs) as described by Pandey et al. (2003). The TCDs of the form of $(V −- \lambda)$ vs. $(B −- V )$, where $\lambda$ is one of the broad-band filters $(R, I, J, H, K, L)$, provide an effective method of separating the influence of the normal extinction produced by the diffuse interstellar medium from that of the abnormal extinction arising within regions having a peculiar distribution of dust sizes (cf. Chini \& Wargau 1990, Pandey et al. 2000). The TCDs for the Class III YSOs associated with the cluster and BRC regions are shown in Figs. 10a - 10d. In order to avoid IR excess stars, we have used all the $Spitzer$ Class III sources having $V$ $<$ 17 mag. The slopes of the distributions are given in the figure. The ratio of total-to-selective extinction `$R_V$' in the regions is estimated using the procedure described in Pandey et al. (2003). The $R_V$ values in the cluster and BRC regions, i.e., BRC NW, BRC 13 and BRC 14 are estimated to be $R_{cluster}$ = 3.14 $\pm$ 0.12, $R_{BRC NW}$ = 3.46 $\pm$ 0.20, $R_{BRC 13}$ = 3.41 $\pm$ 0.03 and $R_{BRC 14}$ = 2.75 $\pm$ 0.12, respectively. The value of $R_{cluster}$ indicates a normal reddening law in the cluster region. The higher values of $R_{BRC NW}$ and $R_{BRC 13}$ indicate a larger grain size in the BRC NW and BRC 13 regions, whereas the smaller value of $R_{BRC 14}$ suggests a smaller grain size in the case of BRC 14. This indicates that the evolution of dust grains in the W5 E region has not taken place in a homogeneous way. \section{Mass functions of the cluster and BRC regions} \subsection{Initial mass function of the cluster} The IMF is the distribution of the mass of stars at the time of a star formation event. Young clusters are preferred sites for IMF studies as their mass functions (MFs) can be considered as IMFs, since they are too young to lose significant number of members either due to dynamical evolution or stellar evolution. The IMF is defined as the number of stars per unit logarithmic mass interval, and is generally represented by a power law having a slope, \\ $\Gamma$ = {{ $\rm {d}$ log $N$(log $m$)}/{$\rm{d}$ log $m$}},\\ where $N$(log $m$) is the number of stars per unit logarithmic mass interval. For the mass range $0.4 < M/M_{\odot} \le 10$, the classical value derived by Salpeter (1955) is $\Gamma = -1.35$ . To study the MF and LF, it is necessary to eliminate the field star contamination from the cluster region. In the absence of proper motion data, one can use statistical criteria to estimate the number of probable member stars in the cluster region. To remove the contamination due to field stars from the MS and PMS sample, we statistically subtracted the contribution of field stars from the observed CMD of the cluster region using the following procedure. For any star in the $V /(V - I)$ CMD of the control field (Fig. 5c), the nearest star in the cluster's $V/(V - I)$ CMD (Fig. 5b) within $V \pm 0.125$ and $(V - I) \pm 0.065$ was removed. The statistically cleaned CMD is shown in Fig. 11, which clearly shows a sequence of PMS stars. The PMS isochrones by Siess et al. (2000) for age of 0.1 and 5 Myr (dashed lines) and the 4 Myr isochrone by Girardi et al. (2002) (continuous line) are shown in Fig. 11. The evolutionary tracks by Siess et al. (2000) for different masses are also shown which are used to estimate the mass of PMS stars. Here we would like to {\bf note} that the points shown by filled circles in Fig. 11 may not represent the actual members of the clusters. However, the filled circles should represent the statistics of PMS stars that can be used to study the MF of the cluster region. We used the statistics of the sources having age 0.1 $\le$ age $\le$ 5 Myr in the statistically cleaned CMD (Fig. 11) to study the IMF of the cluster region. It is also important to make corrections in the data sample for incompleteness which may be due to various reasons, e.g., crowding of the stars. We determined the CF as described in Sec. 2.1. Since the MS age of the most massive star in the cluster is $<$ 4 Myr, the stars having $V$ $<$ 14.7 mag (M $> 3 M$$_\odot$) have been considered on the MS. In order to obtain the MF for MS stars, the LF is converted to MF using the theoretical model of Girardi et al. (2002). The MF of the PMS stars was obtained by counting the number of stars in different mass bins (for details see Pandey et al. 2008, Jose et al. 2008). Fig. 12 shows the MF of the cluster in the mass range 0.4 $\le$ M/$M_\odot$ $\le$ 30. A single slope for the MF in the mass range 0.4 $\le$ M/$M_\odot$ $\le$ 30 can be fitted with $\Gamma$ = -1.29 $\pm$ 0.03, which is comparable to the Salpeter value (-1.35). \subsection{Cummulative mass function of identified YSOs in the cluster and BRC regions} The MF is an important tool to compare the star formation process/scenario in different regions. Morgan et al. (2008), based on SCUBA observations, have estimated the mass of 47 dense cores within the heads of 44 BRCs. They concluded that the slope of the MF of these cores is significantly shallower than that of the Salpeter MF. They also concluded that it depends on the morphological type of BRCs (for the morphological description of BRCs we refer to SFO 91): `A' type BRCs appear to follow the mass spectrum of the clumps in the Orion B molecular cloud, whereas the BRCs of the `B' and `C' types have a significantly shallower MF. In Paper II, we have studied the CMFs of YSOs selected on the basis of NIR excess and H$\alpha$ emission and found that the `A' type BRCs seem to follow a MF similar to that found in young open clusters, whereas `B/C' type BRCs have a significantly steeper CMF, indicating that BRCs of the latter type tend to form relatively low mass YSOs in the mass range 0.2 $\le$ M/M$_\odot$ $\le$ 0.8. The CMF of the YSOs associated with the `A' type BRCs in the mass range 0.2 $\le$ M/M$_\odot$ $\le$ 0.8 is found to be comparable with the CMF of the average Galactic IMF (cf. Paper II). \begin{table} \caption{Cumulative mass function of the YSOs in the cluster and BRC regions} \label{mfs} \begin{tabular}{ccc} \hline Region &CMF in the mass range & \\ & $0.8\le M/M_\odot \le 1.2$ &$0.2\le M/M_\odot \le 0.8$ \\ \hline Cluster &-2.54 $\pm$ 0.40 & -1.97 $\pm$ 0.28\\ BRC NW &-5.06 $\pm$ 3.18 & -2.63 $\pm$ 0.21\\ BRC 13 &-6.45 $\pm$ 2.01 & -0.98 $\pm$ 0.14\\ BRC 14 &-4.69 $\pm$ 0.75 & -1.08 $\pm$ 0.14\\ \hline \end{tabular} \end{table} As mentioned above, in Paper II, the YSOs were selected on the basis of NIR excess and H$\alpha$ emission. To make the sample statistically significant we combined the data of different types of BRCs lying in different star forming regions. Since star formation and evolution of TTSs in and around BRCs may depend on the prevailing conditions in the region, it will be worthwhile to re-investigate the CMF of the YSOs (identified in the present work) in BRC NW, BRCs 13 and 14 as well as those associated with the cluster region. Fig. 13 compares the CMFs of the YSOs in the BRC regions and the cluster region presuming that the biases (if any) in all the four samples are the same. It is interesting to note that the CMFs of the three BRCs show a break in the slope at $\sim$ 0.8 $M_\odot$. The slopes of the CMFs are given in Table 4, which indicate that in the case of three BRCs, the slopes in the mass range 0.8 $\le$ M/$M_\odot$ $\le$ 1.2 are almost the same. However, in the mass range $0.2\le M/M_\odot \le 0.8$, the slopes in the BRCs 13 and 14 are found to be similar, whereas CMF in BRC NW and the central cluster are biased towards lower mass in comparison to the BRCs 13 and 14. The average Galactic IMF in the mass range $0.2\le M/M_\odot \le 0.6$, i.e., $\Gamma = -0.3$ (Kroupa 2001, 2002) corresponds to the slope of the CMF of -1.1 $\pm$ 0.1. This fact also indicates that the cluster region and BRC NW have relatively more low mass YSOs in the mass range $0.2\le M/M_\odot \le 0.8$. \section{Star formation scenario in W5 E} The W5 E region is an excellent example of triggered star formation. The presence of central O7 MS star HD 18326 and several bright-rim like structures makes this region an interesting object to study triggered star formation. This region contains two of the BRCs catalogued in SFO 91. The millimeter line study by Niwa et al. (2009) has revealed the presence of a $^{13}$CO cloud and C$^{18}$O cores on the eastern and northern sides of the region but there is no evidence for clouds on the southern side. They also found high density clumps in the BRC NW region. Karr \& Martin (2003) concluded that the exciting O stars and YSOs along the edges of the whole W5 E H{\sc ii} region belong to two different generations. Based on the expansion velocity of the H{\sc ii} region and the evolutionary stages of the IRAS YSOs, they concluded that the timescale is consistent with the triggering by the RDI process. In our earlier work (Paper I and Paper II) we have studied the star formation scenario in and around BRCs using the YSOs selected on the basis of H$\alpha$ emission and NIR excess and found evidence for triggered star formation around BRCs 13 and 14. Nakano et al. (2008) detected several H$\alpha$ emission stars in the W5 E region. They found that the young stars near the exciting stars are systematically older ($\sim$4 Myr) than those near the edge of the H{\sc ii} region ($\sim$1 Myr) and concluded that the formation of stars proceeded sequentially from the centre of the H{\sc ii} region to the eastern bright rims. Based on the observations of IR excess stars, we proposed in Paper II the occurrence of a series of RDI events in this particular region. Koenig et al. (2008) have carried out an extensive $Spitzer$ survey of the whole IC 1848 region. On the basis of the large-scale distribution of YSOs selected using $Spitzer$ data, they found that the ratio of Class II to Class I sources within the H{\sc ii} region cavity is $\sim$ 7 times higher compared to the regions associated with the molecular cloud. They attributed this difference to an age difference between the two locations and concluded that there exist at least two distinct generations of stars in the region. They stated that the triggering is a plausible mechanism to explain the multiple events of star formation and suggested that the W5 H{\sc ii} region merits further investigation. Earlier works studying the star formation scenario in the region were often qualitative (e.g., Karr \& Martin 2003, Koenig et al. 2008). Some were quantitative studies, but they were based on a smaller sample of stars (e.g., Nakano et al. 2008, Papers I and II). Since in the present work we have a larger database, it will be worthwhile studying the global scenario of star formation in the region. In the following subsections we shall study the star formation scenario in the cluster as well as around the BRCs. \subsection{Cluster region} The CMD of the identified YSOs (Fig. 9a) and the statistically cleaned CMD (Fig. 11) reveal a non-coeval star formation in the cluster region. The age distribution is shown in Fig. 14. The mean age of the YSOs is estimated to be 1.26 $\pm$ 0.69 Myr. This is smaller than the average age of the YSOs obtained by Nakano et al. (2008, age $\sim$4 Myr). Nakano et al. (2008) have used only H$\alpha$ emission stars while the present sample is larger, including NIR and MIR excess stars in addition. To estimate the age of the H$\alpha$ emission stars, Nakano et al. (2008) used PMS isochrones by Palla \& Stahler (1999), whereas we have used those by Siess et al. (2000). The use of different PMS evolutionary models can introduce a systematic shift in the age estimation. \subsection{BRC regions} BRCs are considered to be a sort of remnant clouds originating from the dense parts (cores) in an inhomogeneous molecular cloud. So, if the original core was big enough, the resultant BRC could have undergone a series of RDI events (Kessel-Deynet \& Burkert 2003), leaving an elongated distribution of young stars. The distribution and evolutionary stages of such YSOs could be used to probe the star formation history in the H{\sc ii} regions. Using $Spitzer$ observations Koenig et al. (2008) have identified clustered and distributed population of YSOs in W5 (see their figure 12). The clustered population shows a nice alignments of Class II sources towards the directions of BRCs from the ionization sources. In Paper II, we also examined the global distribution of YSOs, the radial distribution of $A_V$ as well as the amount of NIR excess $\Delta$$∆(H-K)$, defined as the horizontal displacement from the middle reddening vector in the NIR-CC diagram (see Fig. 6), in the BRCs 13 and 14 regions. On the basis of these distributions, star formation was found to have propagated from the ionising source in the direction of the BRCs. Fig. 15 shows the global distribution of clustered YSOs selected from the study of Koenig et al. (2008), in the whole W5 E region, which indicates an alignment of YSOs towards the direction of the BRCs. Fig. 16 shows the radial variation of $\Delta$$(H - K)$ and $A_V$, of the YSOs located within the strip towards the direction of BRC NW region. The distribution reveals higher $A_V$ values near the BRC NW region. On the basis of the global distribution of YSOs in the region and the radial distribution of the amount of NIR excess $\Delta$$(H - K)$ and $A_V$ in the region (cf. Figs. 16, 17 and figures 6, 7 and 8 of Paper II) as well as the age distribution of YSOs, it seems that a series of RDI processes proceeded in the past from near the central O star towards the present locations of the BRCs. \subsubsection{\bf Small scale sequential star formation ($S^4F$)} \begin{table} \caption{Mean age inside/on the rim and outside rim} \label{age_in_out} \begin{tabular}{ccc} \hline Region &Mean age (Myr) \\ \hline & Inside/On the rim (number of sources)& Outside rim (number of sources)\\ \hline BRC NW &0.92 $\pm$ 0.56 (12)& 1.29 $\pm$ 0.54 (19)\\ BRC 13 &1.61 $\pm$ 1.41 (10)& 2.44 $\pm$ 1.37 (24)\\ BRC 14 &1.01 $\pm$ 0.73 (18)& 2.32 $\pm$ 1.22 (58)\\ \hline \end{tabular} \end{table} There has been qualitative evidence for the $S^4$F hypothesis such as an asymmetric distribution of probable TTSs (Ogura et al. 2002) and of the properties of NIR excess stars (Matsuyanagi et al. 2006). Papers I and II presented some quantitative evidence on the basis of $BVI_C$ photometry. In the present study the sample of YSOs is significantly larger as compared to that used in Papers I and II. To further verify the $S^4$F hypothesis we follow the approach as given in Papers I and II . We have divided the YSOs associated with BRCs into two groups: those lying inside/on the rim (i.e., stars embedded or projected onto the molecular cloud/lying on the rim) and outside the rim (i.e., stars lying outside the rim in the projected H{\sc ii} region) (see e.g., Figure A1 of Paper II for BRCs 13 and 14). Mean age has been calculated for these regions. Since the ionising source of the BRCs studied here has a maximum MS lifetime of 4-5 Myr, therefore the sources having age greater than 5 Myr can not be expected as the products of triggered star formation. They might have formed spontaneously in the original molecular cloud prior to the formation of the H{\sc ii} region. Some of them may be background stars; larger distances make them look older in the CM diagram. Therefore, while calculating the mean age we have not included those stars. The results are given in Table 5, which shows that in all the BRCs, the YSOs lying on/inside the rim are younger than those located outside it. The above results are exactly the same as those obtained in Papers I and II. Therefore, the present results further confirm the $S^4$F hypothesis. As in Papers I and II, we again find a large scatter in the stellar age in spite of a clear trend of the mean age. Possible reasons for the scatter, as discussed in earlier papers, include photometric errors, errors in extinction correction, light variation of young stars, drift of stars due to their proper motions, binarity of the stars, etc. Photometric errors and light variation as big as 0.5 mag would affect stellar ages by 0.25 dex, so they do not seem to be the major reason for the scatter. As for the extinction correction, it probably does not affect the results much, since in the $V$, ${(V −- I_c)}$ CMD the reddening vector is nearly parallel to the isochrones. As discussed in Papers I and II, we speculate that the proper motions of the newly born stars may probably be the main cause of the scatter. \section{ EVOLUTION OF DISKS OF T-TAURI STARS} H$\alpha$ emission and IR excess are important signatures of young PMS stars. These signatures in CTTSs indicate the existence of a well-developed circumstellar disk actively interacting with the central star. Strong H$\alpha$ emission (equivalent width EW $>$ 10 \AA) in CTTSs is attributed to the magnetospheric accretion of the innermost disk matter onto the central star (Hartmann et al. 1994; Edwards et al. 1994; Muzerolle et al 2001 and references therein). On the other hand the weak H$\alpha$ emission (EW $<$ 10 \AA) in weak-line T Tauri stars (WTTSs), which lack disks (or, at least inner disks), is believed to originate from their chromospheric activity (e.g., Walter et al. 1988; Mart{\'{\i}}n 1998). In the 1990s, a large number of WTTSs were found in and over wide areas around T-associations by X-ray surveys with ROSAT, which led to active studies on the nature of the so-called dispersed WTTSs. The ``standard model'' (Kenyon and Hartmann 1995) postulates that the CTTSs evolve to the WTTSs by losing their circumstellar disk (or, at least its inner part). The age distribution derived from the HR diagram of the Taurus region indicates that the WTTSs are systematically older than the CTTSs, but the statistical significance is low (Kenyon and Hartmann 1995; Hartmann 2001; Armitage et al. 2003). Bertout et al. (2007) concluded that the observed age and mass distribution of CTTSs and WTTSs in the Taurus-Auriga T association can be explained by assuming that a CTTS evolves into a WTTS. In Paper II we compared the age distribution of CTTSs and WTTSs associated with several BRCs and supported the conclusion of Bertout et al. (2007). On the other hand, there have also been many observations which claimed that the CTTS and the WTTS are coeval and have indistinguishable age distribution (e.g., Walter et al. 1988; Lawson et al. 1996; Gras-Vel{\'a}zquez \& Ray 2005). From the analyses of the HR diagram of the CTTSs and WTTSs in Chamaeleon I, Lawson et al. (1996) concluded that some stars may be born even almost diskless or lose the disk at very early stages (age $<$ 1 Myr). In the present work we have derived the age of 79, 26, 29, 59 Class II and 27, 5, 5, 17 Class III sources in the cluster, BRC NW, BRC 13, BRC 14 regions, respectively. Assuming that all the identified Class II and Class III stars are CTTSs and WTTSs respectively, we can study the possible evolution of the TTSs. The advantage of our sample in addressing this issue is that the stars are spatially, i.e., three-dimensionally, very close to each other, so there should be no problem of distance difference, contrary to extended T associations. Here we would like to caution the readers that although we have attempted to clean the Class III sample from sources not belonging to W5, however, to confirm the WTTSs nature of these sources in the absence of spectral information such as measurement of the Lithium absorption line is difficult. Since data for Class III sources in the BRC NW and BRC 13 regions are not statistically significant, in Fig. 17 we show the cumulative distribution of Class II and Class III sources in the cluster and BRC 14 region only. Fig. 17 indicates that both the Class III and Class II sources have rather similar distribution. A Kolmogorov-Smirnov (KS) test for the combined sample of the cluster and BRC 14 region confirms the statement that the cumulative distributions of Class II sources (CTTSs) and Class III sources (WTTSs) are different only at a confidence level of 50\%. Hence, we can conclude that both the samples have rather similar distribution with practically indistinguishable age distribution. This result is in contradiction with that of Bertout et al. (2007) for the Taurus-Auriga T-association and that of Paper II, that WTTSs are older than CTTSs and CTTSs evolve into WTTSs; and it is in agreement with those which claim that the CTTSs and WTTSs are coeval and have indistinguishable properties. Here we have to keep in mind that the classification of CTTS and WTTS in the present work is based on the Spitzer MIR observations whereas in Paper II and in Bertout et al. (2007), the classification was based on the EWs of H$\alpha$ emission stars. H$\alpha$ surveys may fail to detect Class III sources which have smaller EWs whereas, those sources can be identified using the MIR observations. Here it is worthwhile to point out that the Class III sources by Koenig et al. (2008) were identified on the basis of all four $Spitzer$ IRAC bands (3.6, 4.5, 5.8 and 8.0 $\mu$m). The detection of Class III sources would be suppressed because of less sensitivity at 5.8 and 8.0 $\mu$m bands and also because of the very bright, variable background at these wavelengths in W5. Koenig et al. (2008) have stated that their photospheric sample is only 90\% complete to 2 M$_\odot$ in general in W5, and to 8 M$_\odot$ on regions of bright background emission (e.g., the BRCs studied in this paper). This fact is evident in $V/ (V-I)$ CMD (Fig. 7) by comparing the number of Class II sources to the number of Class IIIs fainter than 20th magnitude in $V$ band. \section{Conclusions} In this paper we have made $VI_c$ photometric studies of the newly identified central cluster of W5 E. NIR data from 2MASS and MIR data from IRAC/MIPS of the $Spitzer$ telescope have also been added to consider the properties of the cluster. Also, by incorporating $Spitzer$ data we have re-analysed the properties (age and spatial distribution, etc.) of the YSOs in W5 E with special emphasis on the three BRC regions. We obtained the following as the main conclusion of the present work. The central cluster has a distance of $\sim$2.1 kpc, a radius of $6^\prime$ and a mean age of $\sim$ 1.3 Myr. The reddening law is normal. The star formation in the cluster region is found to be non-coeval, with an age spread of $\sim$ 5 Myr. The slope of the IMF within the cluster region in the mass range $0.4 \le M/M_\odot \le 30$ is found to be $\Gamma = -1.29 \pm 0.03$, which is comparable to the Salpeter value. In the mass range of $0.2 \le M/M_\odot \le 0.8$; the CMFs of the YSOs associated with the three BRCs show a break in the slope at $\sim$ $0.8$ $M_\odot$. The CMFs indicate that the cluster region and BRC NW have relatively more low mass YSOs in the mass range $0.2 \le M/M_\odot \le 0.8$. The distribution of the YSOs in the W5 E region indicates that they are globally aligned from the ionising source towards the BRCs. A comparison of the average age of the YSOs lying on/inside and outside the bright rim indicates a quantitative age gradient in the sense that the YSOs located on/inside the rim are younger than those located outside the rim. The results are similar to those reported in Paper I and Paper II. These results confirm the $S^4$F hypothesis. The globally aligned distribution of the YSOs, indicate that a series of RDI events took place in the past from near the central ionising source to the periphery of the H{\sc ii} region. In the present study it is found that the age distributions of the Class II and Class III sources are the same. This result is in accordance with the results which claimed that the CTTS and the WTTS are coeval and have indistinguishable age distribution (e.g., Walter et al. 1988; Lawson et al. 1996; Gras-Velzquez \& Ray 2005). \section{ACKNOWLEDGMENTS} The authors are grateful to the anonymous referee for useful comments that improved the contents of the paper. We are thankful to the Kiso Observatory, IAO and ARIES for allotting the observing time. We also thank the staff of Kiso Observatory (Japan), IAO, Hanle and its remote control station CREST, Hosakote for their assistance during observations. This publication makes use of data from the Two Micron All Sky Survey, which is a joint project of the University of Massachusetts and the Infrared Processing and Analysis Center/California Institute of Technology, funded by the National Aeronautics and Space Administration and the National Science Foundation. NC is thankful for the financial support for this study through the fellowships granted by the DST and CSIR, India.
\section{Introduction} Many biological processes depend on efficient transport on the microscopic scale. Biological cells contain a large number of microscopic machines that are for example able to maintain the exchange of nutrients between the cell and the surrounding medium. Another important issue is the transport of cargos between the cell center and the membrane~\cite{Alberts02}. In this context, transport driven by molecular motors is of particular importance: Molecular motors are specialized proteins that are able to perform a directed motion along actin filaments and microtubules, i.e., filaments that are part of the cytoskeleton~\cite{Schliwa03}. Several aspects of motor driven biological transport have been modeled recently~\cite{Lipowsky01,Parmeggiani03,Klumpp03,Evans03,Juhasz04,Parmeggiani04,Tailleur09} with variants of the so-called asymmetric exclusion process (ASEP) \cite{Krug91,Derrida98a}. The use of this type of models has been motivated since the molecular motors move stepwise (hence the relevance of a model defined on a discrete lattice) and interact via mutual exclusion. But in addition to this, molecular motors can attach and detach from the filament. This property of molecular motors led to extensions of the ASEP~\cite{Lipowsky01,Parmeggiani03,Parmeggiani04} which successfully describe the unidirectional motion of \emph{in vitro} motor assays \cite{Nishinari05}. In the case of bidirectional systems of molecular motors, the theoretical understanding is so far incomplete. It has been shown that simple extensions of the unidirectional models are not able to describe efficient bidirectional transport if the filament is embedded in a small volume and the diffusivity of unbound particles is limited~\cite{Ebbinghaus09}. This situation could for example be relevant for motor-driven transport in axons. The question that naturally arises is the following: What are the minimal ingredients that must be added to the existing unidirectional models in order to describe bidirectional transport of stochastic interacting particles? In this article, we consider different kinds of particle-particle interactions which may lead to lane formation, i.e., the self-organized separation of particles moving in opposite directions. This is in contrast to models for bidirectional transport with predefined lanes for each direction (e.g.,~\cite{juhasz07b}). We shall discuss their ability to generate efficient bidirectional transport. A first mechanism which has formerly been proposed by Klumpp and Lipowsky~\cite{Klumpp04} takes into account the experimentally observed preferential adsorption of motors to a filament if the neighboring site is occupied by a motor of the same type~\cite{Vilfan01,Roos08,Muto05}. In~\cite{Klumpp04}, they have observed lane formation above a critical value of the coupling parameter. We complete their results and present a more extensive study of the model. We show that the properties of the model depend strongly on the kind of diffusion reservoir that is considered around the filaments. In particular we have shown that lane formation is hindered if diffusion occurs in a confined environment. In a second part, as an alternative mechanism, we introduce particle-particle interactions that induce lane changes if oppositely moving particles are encountered. This mechanism does allow to have lane formation in a confined environment. Eventually, we also consider that the filament itself can undergo some dynamical process, motivated by the experimentally observed continuous reorganization of the microtubule network. We shall consider a much simplified version of the filament dynamics, as this was done in~\cite{Ebbinghaus10}. There, we had shown that a dynamic lattice may enhance the transport efficiency of bidirectional stochastic transport. Here, we shall study the influence of lattice dynamics in the presence of particle-particle interactions and show that both mechanisms can cooperate to obtain efficient transport. Our work is organized as follows: After introducing some general definitions and summarizing some previously obtained results (next section), we shall consider two types of interactions: first, we investigate the model introduced by Klumpp and Lipowsky~\cite{Klumpp04} considering the preferential binding of particles (section~\ref{sec:interact}). In section~\ref{sec:sidestep}, we discuss the effect of another type of interaction, namely a dynamic particle-particle interaction on the filament inducing lane changes. As mentioned above, for both types of interactions, we apply different kinds of particle reservoirs: we shall consider grand-canonical and canonical particle reservoirs and also the effect of a finite diffusivity of unbound particles. We shall also systematically discuss the impact of a dynamic lattice on lane formation and transport capacity of the systems. In the final section, we compare the different approaches and discuss their relevance for axonal transport. \section{General definitions} \subsection{Model definition} \label{subsec:modeldef} The models which are discussed in this article are variants of the totally asymmetric simple exclusion process (TASEP) with two species of particles. The two species have opposite `charges' resulting in opposite moving directions on a one-dimensional lattice with regular spacing. The one-dimensional lattice represents the microtubule, or more precisely, one of the filaments that compose the microtubule, and thus it will be referred to as a filament in the remaining of the paper. Particles hop with rate $p$ along the filament in the direction determined by their charge which we will refer to as positive or negative depending on the preferential moving direction (see \fref{fig:basic_model}). We additionally consider attachment and detachment of particles to and from the lattice as first proposed in~\cite{Lipowsky01}. Particles detach from the lattice with rate $\omega_\mathrm{d}$ to a reservoir. The adsorption of a particle from the reservoir onto a site of the lattice occurs at rate $\omega_\mathrm{a}$. We examine different kinds of reservoirs which are specified below in the corresponding sections. They have in common that particles in the reservoir diffuse freely without any interactions between particles. On the filament, all particles interact via hard-core exclusion and positional exchanges of oppositely charged particles are excluded in contrast to the model considered in~\cite{Arndt98}. A stepping or attachment move is therefore rejected if the target site is already occupied by another particle. As standard set of parameters for the particle dynamics, we will use $p=1$, $\omega_\mathrm{a}=0.1$ and $\omega_\mathrm{d}=0.01$. This choice of parameters corresponds to processive motion (i.e., motors are attached on the filament long enough so that directed motion contributes significantly to the overall motion), a basic feature of the molecular motors contributing to long-range transport, as conventional kinesin or cytoplasmic dynein~\cite{Alberts02}. As there are several parallel microtubules in axons, each of them made of several protofilaments, we could a priori consider a large number $n_\mathrm{fil}$ of parallel filaments. However, in order to keep the model simple, we shall consider only one filament except when the mechanism under study requires to have at least two filaments in parallel. Particle densities are denoted by $\rho_\pm$ and defined as the number of particles divided by the system length. The index refers to the particle species. Densities and particle numbers are therefore related through $N_\pm=\rho_\pm\times L\times n_\mathrm{fil}$ and we choose the total density to be equal to $\rho = 2\rho_+ = 2\rho_-$ throughout the paper. Note that $\rho$ and $\rho_\pm$ can be greater than one as they take into account the total number of particles (including those in the reservoir which is assumed to have an infinite capacity in this paper), divided by the \emph{number of filament sites}. The quantities $\rho_\mathrm{b}$, $\rho_{\mathrm{b},\pm}$ denote the densities of bound particles on the filament and $\rho_\mathrm{u}$, $\rho_{\mathrm{u},\pm}$ the densities of particles in the reservoir. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.8, clip]{Figures/basic_model} \caption{Sketch of the hopping rules of the two different particle species, depicted by circles and triangles. Particles step forward at rate $p$ if the target site is empty. A particle detaches from the lattice at rate $\omega_\mathrm{d}$ and adsorbs to unoccupied sites at rate $\omega_\mathrm{a}$.} \protect\label{fig:basic_model} \end{center} \end{figure} \subsection{Reservoirs} \label{subsec:reservoir_def} When motors detach from the microtubule, they undergo diffusive motion in the surrounding cytoplasm - a region of the cell that will be referred to as the \emph{reservoir}. Depending on the geometry of the reservoir, the diffusive motion can have various characteristics. We shall define three types of reservoirs below. \subsubsection{Grand-canonical reservoir} If the surroundings of the filament is an open space, motors can diffuse very far from the filament, and thus, most of the time, motors that attach to the filament have completely lost the memory of their previous detachment point. Hence there is no need to keep track of spatial positions of the diffusing motors. Actually, the grand-canonical reservoir will be modeled by a single number, representing the density of motors in the reservoir, which is assumed to be constant and (in this paper) equal to $\rho_\mathrm{u}=2\rho_\mathrm{u,+}=2\rho_\mathrm{u,-}=0.1$. Attachment to empty sites on the filament occurs at rate $\rho_\mathrm{u,\pm}\cdot\omega_\mathrm{a}$. This type of reservoir is relevant if the filament is embedded in a large volume and the number of attached motors is small compared to the number of motors in solution. This is the case for many \emph{in vitro} experiments. \subsubsection{Canonical reservoir} An infinite diffusion rate in the surroundings of the lattice is also considered in the canonical reservoir, and thus particles in the reservoir do not have any spatial coordinate and can attach to any empty site along the lattice. However, in the canonical setup, we consider that the total number of particles in the system is finite. This implies, with our definition of the density, that $\rho_\pm=\rho_\mathrm{b,\pm}+\rho_\mathrm{u,\pm}$ is fixed. Again, attachment occurs at rate $\rho_\mathrm{u,\pm}\cdot\omega_\mathrm{a}$. This type of reservoir is relevant if the filament is embedded in a large volume and the number of motors attached to the filament is of the same order as the number of motors in solution. This situation can also be encountered in \emph{in vitro} experiments. \subsubsection{Finite diffusion} \label{subsubsec:finite_diff} Actually, the axon is a rather crowded environment\footnote{ The importance of confinement in the axon was for example illustrated by the simulations in \cite{greulich_s11} which reproduce the experimental results of H. Erez et al \cite{erez07} for transected axons. }, where the size of the transported objects is of the same order as the distance between the microtubules \cite{shemesh_s10b,chen92}, and the previous reservoirs are not relevant to model the diffusive motion episodes. In order to study the effects of confinement, we shall introduce a reservoir with a memory effect: there must be a correlation between the locations where a motor detaches, and where it attaches again on the microtubule. In order to do so, the model is extended by a second lane which represents the reservoir (see \fref{fig:finitediff}). Particles in the reservoir symmetrically hop to both neighboring sites with rate $D$ without any interaction between particles. Note that this one-dimensional reservoir actually represents a three-dimensional region around the microtubule, which allows for several particles at the same longitudinal position. Only the longitudinal diffusion, along the microtubule, is modelled explicitly. The transversal dimensions of the three-dimensional diffusion reservoir, which are not represented explicitly, can be tuned by taking a larger or weaker effective attachment rate (see \cite{Ebbinghaus10b} for an example). The larger the diffusive region is (in the direction transverse to the microtubule), the weaker the effective attachment rate is. Thus, under strong confinement, diffusion in the transverse direction should be more limited, the attachment rate in the model will be larger, and the memory effect will increase. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.8, clip]{Figures/model_fin_diff} \caption{Schematic representation of the particle dynamics in the system with finite diffusion in the reservoir. The lower lane represents the filament already shown in \fref{fig:basic_model}. The upper lane is the reservoir within which particle do not interact with each other but diffuse at finite rate $D$. } \protect\label{fig:finitediff} \end{center} \end{figure} \subsection{Lattice dynamics} \subsubsection{Definition} \label{subsec:latticedyn_def} In this paper, we shall also consider that the underlying lattice itself can evolve dynamically. We shall consider the same type of lattice dynamics as in~\cite{Ebbinghaus10}: a site of the lattice is randomly eliminated at rate $k_\mathrm{d}$ and recreated at rate $k_\mathrm{p}$ (see figure \ref{fig:model_defdyn}). The indices refer to the processes of microtubule de-/polymerization, although the dynamics we consider here have little in common with realistic dynamics and must rather be considered as a minimal model. A particle cannot bind to an eliminated site and immediately detaches from the lattice if it steps onto an eliminated site or is bound to a site which is being eliminated. We fix the polymerization rate equal to $k_\mathrm{p}=1$ in order to reduce the number of free parameters (we saw indeed in~\cite{Ebbinghaus10} that transport features were more sensitive to $k_\mathrm{d}$ than to $k_\mathrm{p}$). \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.8, clip]{Figures/modeldefdyn} \caption{Same figure as in Fig. \protect{\ref{fig:finitediff}}, but the lattice dynamics has been added. A site of the filament (lower lane) can be suppressed with rate $k_d$, and restored afterwards with a rate $k_p$. When a particle arrives on a site that has been suppressed, it goes in the diffusion reservoir (upper lane). } \protect\label{fig:model_defdyn} \end{center} \end{figure} \subsubsection{Summary of previous results - impact of the lattice dynamics} It has been shown that bidirectional transport models in which the particle species interact only via an exclusion interaction generically exhibit macroscopic clustering at any finite density $\rho$~\cite{Ebbinghaus09}. This large cluster controls the current in the system and therefore limits the total transport capacity. In particular, for large systems, the current vanishes. Considering the case of bidirectional transport on dynamical lattices, it has been shown that lattice dynamics can induce a transition from the clustered phase to a homogenous phase in which the particles are distributed over the whole system~\cite{Ebbinghaus10}. The homogenous states are density-dependent so that a finite (non-vanishing) current of particles is present even in very large systems, which would not be the case on a static lattice. The transition takes place because the lattice dynamics breaks up forming clusters and thus limits the reachable maximum cluster sizes. At a given strength of the lattice dynamics, the nascent clusters are dissolved more quickly than they can form and the system appears homogenous. The transition depends mostly on the rate at which binding sites disappear suggesting that the finite lifetime of individual binding sites is crucial for the observed transition. In order to support this point of view, it has been verified that this effect is not simply due to the cutting of the filament into several segments of different lengths, by considering a static lattice with the same density of individual holes. In that case, the phase transition is not observed, thus indicating that the cluster dissolution is really an effect of the dynamics of the lattice. Though this scenario was inspired by the fact that microtubules are themselves evolving through the so-called dynamic instability, i.e., events of polymerization and depolymerization, the dynamics of the filament as we have defined it in~\cite{Ebbinghaus10} or in section \ref{subsec:latticedyn_def} do not aim at being realistic, but rather are the simplest kind of lattice dynamics that could be considered in order to illustrate the aforementioned mechanism. \section{Interactions through modified attachment/detachment rates} \label{sec:interact} \subsection{Model definition}\label{subsec:interact_def} Decoration experiments with kinesin on microtubules~\cite{Vilfan01,Roos08,Muto05} showed that kinesins attach on the microtubule preferentially in the vicinity of similar motors. This motivates the assumption of a general attractive interaction between molecular motors of the same species. This experimental fact was first considered by Klumpp and Lipowsky~\cite{Klumpp04} in a modification of the above-presented basic model by consideration of detachment and attachment rates that depend on the next neighbor in the stepping direction of the particle: If the next site in moving direction is occupied by a particle of the same species, the detachment rate is lowered by a factor $1/q$ whereas the attachment to that site is enhanced by a factor $q$. If the next site is occupied by a particle of the opposite species, the detachment is enhanced by a factor $q$ and attachment is lowered by a factor $1/q$ (see \fref{fig:KL_interaction}). In all other cases, the rates remain unchanged. In the remaining, we shall call $q$ the strength of the interaction, as the modified attachment and detachment rates are supposed to be due to attractive/repulsive interactions between similar/different motor species. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.8, clip]{Figures/KL_interaction} \caption{Modified attachment/detachment rates. The attachment (detachment) rate increases (decreases) by a factor $q$ if the next site is occupied by a particle of the same species. In the case of a particle of the opposite species, detachment is enhanced and attachment is de-favored.} \protect\label{fig:KL_interaction} \end{center} \end{figure} We shall now study the consequences of having these modified attachment/detachment rates on the efficiency of transport, as an extension of the results presented in~\cite{Klumpp04}. In particular, several types of reservoirs will be considered and shown to have a strong influence on transport properties. In a first stage, we shall study the influence of these modified attachment/detachment rates on a static lattice, i.e., the lattice dynamics defined in section \ref{subsec:latticedyn_def} will not be considered. \subsection{Static lattice} \subsubsection{Infinite diffusion rate}\label{subsubsec:static_infinite} In~\cite{Klumpp04}, it has been shown that for a grand-canonical setup, lane formation is observed if the particles' attachment/detachment rates are modified according to figure~\ref{fig:KL_interaction} on a static lattice. In this section, we briefly present some new results obtained in the same frame, in order to discuss the efficiency of the lane formation mechanism. \paragraph{Grand-canonical reservoir} As already shown in~\cite{Klumpp04}, lane formation occurs in the grand-canonical setup if the interaction strength $q$ exceeds a critical value $q_\mathrm{c}$. This effect is illustrated in the space-time plots in figure~\ref{fig:gc_static:config}. With increasing interaction strength, the typical size of the jams in the system increases, until one particle species completely takes over the system at $q_\mathrm{c}$ so that all particles move in the same direction. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.5, clip]{Figures/gc_static/configs_small.png} \caption{Space-time plots of the filament with a grand-canonical reservoir on a static filament. Every line is a snapshot of the filament of length $L=400$ for different interaction strengths $q$: (a) $q=1$, (b) $q=3.5$, (c) $q=6$, (d) $q=7$, (e) $q=10$. Red dots represent particles moving to the right, green dots are particles moving to the left, white dots are vacancies on the filament.} \protect\label{fig:gc_static:config} \end{center} \end{figure} The transition manifests itself by a dramatic increase of the magnetization as shown in~\cite{Klumpp04}. Here, we define the magnetization slightly differently, since we normalize the difference in the densities of the two particle species with the total density of particles on the filament $m=(\rho_\mathrm{b,+}-\rho_\mathrm{b,-})/(\rho_\mathrm{b,+}+\rho_\mathrm{b,-})$. This quantity takes the value one for completely demixed subsystems, i.e., in the case of lane formation and is zero for equal numbers of particles of both species on the filament (see \fref{fig:gc_static:current}(a)). For $m\approx 0$ or $m\approx 1$, we will refer to unpolarized or polarized states, respectively, as is known from systems with magnetization. The currents of the two species along the filament exhibit a bifurcation at the transition: while one species dominates the filament and moves in a TASEP-like fashion, the excluded species does not participate in transport at all for $q>q_\mathrm{c}$ (see \fref{fig:gc_static:current}(b)). In a real system, there are several filaments, so that, above the transition, some of them conduct transport in one direction while others conduct transport in the other direction. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.25, clip]{Figures/gc_static/magnetization} \includegraphics[scale=0.25, clip]{Figures/gc_static/current} \caption{(a) Magnetization $m$ of the filament in systems of size $L=1600$ (purple), $L=400$ (black) and $L=200$ (red). (b) Current along a static filament of the dominant (green) and excluded (blue) particle species. The sum of both currents is shown in black and red for systems of size $L=1600$, $L=400$ and $L=200$ respectively, with an almost perfect overlap for all system sizes. All quantities are plotted against the interaction strength $q$ tuning the modified attachment/detachment rates, and were obtained for a grand-canonical reservoir. All graphs displaying the current in this article will have a vertical axis going to $J_\mathrm{b}=0.25$ which corresponds to the maximum current of the prototypal TASEP. The inset then always shows the same data on a more appropriate scale of the vertical axis if necessary.} \protect\label{fig:gc_static:current} \end{center} \end{figure} Two remarks can be made from the data shown in \fref{fig:gc_static:current}(b). First, the current does not exhibit strong finite-size effects, although the magnetization does. In particular, the critical interaction strength $q_\mathrm{c}$ above which lane formation occurs depends on the system size and increases for larger systems. In~\cite{Klumpp04}, numerical evidence was given that $q_\mathrm{c}$ has a finite value in the limit of infinite system sizes which is supported by the mean field treatment of the system in the same paper. However, one has to be cautious before claiming that there is true symmetry breaking in the thermodynamic limit. Indeed, a subtlety has been exemplified in the case of another bidirectional transport model, the AHR model~\cite{Arndt98}, for which numerical evidence for a phase transition had been found. Actually, a very careful analysis~\cite{Rajewsky00} of the AHR model has shown that the correlation length can grow up to $10^{70}$, and then remain finite, so that there is no true symmetry breaking. So, although the data presented in~\cite{Klumpp04} seem to be rather convincing, there might be a subtlety which cannot be addressed by a numerical treatment. Second, although the difference in current between the two species is very large above the transition, indicating that lane formation has occurred, the transition does not influence the total current of the system as it is continuous. For the choice of parameters considered here, the maximum of the total current is actually located before the onset of lane separation. This can be seen by the sum of the currents (black and red line in \fref{fig:gc_static:current}(b)) which corresponds to the current of a single species in a system with two filaments, of which each is dominated by a different species. It is to note that the relative position of the onset of lane formation with respect to the maximum of the total current varies with the reservoir density such that the onset of lane formation might also occur for lower interaction strengths than the maximum in the current. The interesting feature is that, above the transition for high values of $q$, the current actually decreases although the encounters of oppositely moving particles are less frequent. This decrease is instead caused by the filament being overcrowded, as can be seen in \fref{fig:gc_static:config}. The density on the filament is close to one and although all particles move in the same direction, most of the attempted steps are rejected because of the lack of vacancies. The stronger the interactions between particles, the more the situation worsens. Consequently, the current continues to decrease for increasing interactions strengths, since the particles have an ever-increasing affinity to the filament and the number of vacancies thus decreases with increasing $q$. \paragraph{Canonical reservoir} Considering that actually, the number of motors in the system may not be infinite, we fix the total number of positive (negative) particles $N_+$ ($N_-$) and observe the consequences of using a canonical reservoir instead of a grand-canonical one on the transport properties. Besides, we consider here more than only one track on which particles can walk. In this scenario, choosing more than one filament becomes important since lane formation would be hindered otherwise. In a system with a single filament, the species which is excluded from the filament becomes dominant in the reservoir and therefore tends to suppress lane formation. Putting two (or more generally any pair number of) filaments in a system resolves this issue. This is an appropriate approach as in the biological situation, one typically has several filaments in parallel. In the following, we shall consider the case of two filaments only. Note that for multilane unidirectional systems, strong correlations between the lanes were found, both for strong and weak coupling~\cite{reichenbach_f_f06,schiffmann_a_s10}. Thus, simulating only one lane turns out to be representative for the whole system. This is in contrast to the bidirectional case considered here, for which lane formation may require to consider more than one filament. The behavior of the system is qualitatively different for densities $\rho=2\rho_+=2\rho_-\geq 1$ and $\rho<1$ since in the latter case, there are not enough particles to fill both filaments completely with a single particle species each. The results are illustrated in \fref{fig:c_static:magnetization_current}. For the magnetization, it is interesting to see that the transition still takes place, even at very low total particle densities. The fewer particles are present in the system, the higher the interaction between particles has to be in order to induce polarization. For $\rho = 1$, there are exactly as many particles of one species in the system as there are sites on a single filament and lane formation is extremely stable in this case since there are enough particles to mediate the interaction at best but not too many to avoid that particles frequently attach to the ``wrong'' filament on which the species is not dominant. For densities $\rho>1$, the latter effect is not avoided anymore as the reservoir cannot be emptied. There are always many particles of both species in the reservoir which interfere with the existing lanes such that the transition to the polarized state is hindered. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.25, clip]{Figures/c_static/magnetization} \includegraphics[scale=0.25, clip]{Figures/c_static/current} \caption{(a) Magnetization of the filament $m=(\rho_\mathrm{b,+}-\rho_\mathrm{b,-})/(\rho_\mathrm{b,+}+\rho_\mathrm{b,-})$ and (b) current of positive particles along both filaments in the canonical setup with a static filament, for a system size $L=200$ and different densities $\rho$. Full lines (\full) are for densities $\rho<1$ and dashed lines (\dashed) are for densities $\rho\geq1$. All quantities are plotted against the interaction strength $q$ tuning the modified attachment/detachment rates.} \protect\label{fig:c_static:magnetization_current} \end{center} \end{figure} The current also reflects these two regimes: For $\rho<1$, the current increases monotonously with increasing interaction strength. At the polarization transition, the current jumps toward a value very close to the current of the one-species TASEP, which is the upper-bound for the flux on the filament (see \fref{fig:c_static:currentq20}). For densities $\rho\geq 1$, the behavior is distinctively different as the curves for the current have much more similarity with those found in the grand-canonical setup and decrease with further increasing interaction. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.25, clip]{Figures/c_static/currentq20} \caption{Comparison of the current in a one species TASEP (green line) and the recorded current along one given filament in the two-species system with a canonical reservoir and a static lattice, and with an interaction strength $q=20$ (which ensures that lane formation has occurred for most densities shown in fig. \protect{\ref{fig:c_static:magnetization_current}}). The dominating particle species is shown as black crosses, the other species as red plus signs. Following the black crosses from left to right along the green parabola, the total density of particles increases from $\rho = 0.1$ to $\rho=4.0$. The value for $\rho=8.0$ is far from the TASEP solution as lane formation is not complete. The system size is $L=200$.} \protect\label{fig:c_static:currentq20} \end{center} \end{figure} On the basis of these observations, we are able to draw an approximative phase diagram (\fref{fig:c_static:phase_diagram}). The system was considered to be phase separated at magnetization $|m|\geq 0.8$, where a distinction is made between two different phase-separated regimes depending on the current at infinite interaction strength as explained above. In terms of the transport capacity, only ``phase-separated I'' can be considered to be an efficient state, as the current in ``phase-separated II'' does not reach very high values due to the overcrowding of the filament as discussed above. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.25, clip]{Figures/c_static/phase_diagram} \caption{Phase diagram of a system with a canonical reservoir, where $|m|\geq 0.8$ is taken as the criterion for lane separation. The phase-separated state is subdivided into two different regions (I and II). In the first region, the current reaches a constant and large value for strong interactions while the current decreases in region II, because the filament is overcrowded although completely polarized.} \protect\label{fig:c_static:phase_diagram} \end{center} \end{figure} In total, we can draw the conclusion that for low densities, the dominating effect of the interaction is to induce lane formation which leads to very good values of the current but necessitates strong particle-particle interactions. For intermediate total densities (greater than one) or a grand-canonical reservoir, lane formation is not efficient as it occurs at densities on the filament that are so high that they mostly prevent particles from moving. \subsubsection{Finite diffusion rate} In order to study the effect of confinement, we consider now a reservoir such as the one defined in section \ref{subsubsec:finite_diff}. Actually, we consider two identical subsystems (see \fref{fig:2lanemodel}) for the same reasons as explained above. Particles can hop from one reservoir to the other while conserving their longitudinal position at rate $c_\mathrm{R}$. This corresponds to diffusion in transverse direction. We choose the diffusion in both directions along the reservoir lattices to be equal to the attachment rate, i.e., $D=c_\mathrm{R}=\omega_\mathrm{a}=0.1$. The two filament lattices are not directly coupled in this model, an assumption that facilitates lane formation for this setup. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.6, clip]{Figures/2lanemodel} \caption{Sketch of the system with two filaments and explicit positions in the reservoir. In addition to the moves explained for the model with infinite diffusion (\sref{subsubsec:static_infinite}), we add a coupling between the two reservoirs by allowing particles to jump from one to the other at rate $c_\mathrm{R}$.} \protect\label{fig:2lanemodel} \end{center} \end{figure} Without the modified attachment/detachment rates defined in \sref{subsec:interact_def}, this model has been shown to generically form a single big cluster which contains almost all of the particles in the system~\cite{Ebbinghaus09}. The existence of this big cluster is a clear indicator for an inefficient state since it blocks most of the transport. Furthermore, the cluster formation depends on the number of particles rather than density so that systems form larger and more stable clusters with increasing system size although the total density of particles is constant. As a consequence, the current vanishes in the thermodynamic limit. If modified attachment/detachment rates are included, we see that the finite diffusion in the reservoir inhibits even partial demixing of the particles into the different subsystems (see \fref{fig:fd_static:magnetization_current}(a)). Although lane formation is suppressed by the limited diffusion, the current (\fref{fig:fd_static:magnetization_current}(b)) is enhanced by the interaction, though a single big cluster is still present in the system. The increase in the current is caused by the reduced time blocked particles spend in front of each other and the fact that, in low density regions, particles of a given species are more likely to have nearest neighbors of the same species. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.25, clip]{Figures/fd_static/magnetization} \includegraphics[scale=0.25, clip]{Figures/fd_static/current} \caption{(a) Magnetization of the filament and (b) current of positive particles along both filaments in the setup with finite diffusivities and a static filament, for a system size $L=1000$ and different densities $\rho$. All quantities are plotted against the interaction strength $q$ tuning the modified attachment/detachment rates. } \protect\label{fig:fd_static:magnetization_current} \end{center} \end{figure} \subsection{Dynamic lattice} In this section, we are interested in the impact that a dynamic lattice has, first, on the lane formation mechanism that exists at least in the case of infinite diffusion, and, second, on the overall transport efficiency. We shall consider for the filament the simplified dynamic lattice defined in \sref{subsec:latticedyn_def}. We again discriminate between reservoirs with infinite and finite diffusion rates. \subsubsection{Infinite diffusion rate}\label{subsubsec:KL_dynamic_inifinite} Eliminating lattice sites reduces the effectivity of the particle-particle interaction since it is next-neighbor and does not reach across holes in the filament. As a consequence, the transition is shifted to higher values of $q$ with increasing depolymerization rate $k_\mathrm{d}$ as can be seen in \fref{fig:gc_dynamic:magnetization_current}(a). For a very dynamic lattice, there seems to be no transition toward lane formation at all. This effect is partly due to the fact that lattice dynamics cuts the filament in shorter segments on which lane formation is less stable, as has been verified by comparison with a static lattice with the same density of holes. However, the effect observed here is stronger if the lattice additionally is dynamic. However, although lane formation is hindered by the lattice dynamics, it positively affects the current of the system (\fref{fig:gc_dynamic:magnetization_current}(b)). By pushing particles to the reservoir when a lattice site is eliminated, the lattice dynamics keeps the density on the filament low enough so that particles have enough space in front of them to move. Thus, extreme densities that were strongly limiting the current in the case of a static lattice (see section \ref{subsubsec:static_infinite}) are avoided here. The results shown in \fref{fig:gc_dynamic:magnetization_current} are obtained for the grand-canonical reservoir but are qualitatively the same for a canonical setup at high densities. For densities $\rho<1$, the current on the static lattice is already close to optimal (see \sref{subsubsec:static_infinite}) and so there is little space for improvement. Actually, the lattice dynamics corrupts these states by shifting the transition to higher values of $q$ and making the phase separation less stable. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.25, clip]{Figures/gc_dynamic/magnetization} \includegraphics[scale=0.25, clip]{Figures/gc_dynamic/current} \caption{(a) Magnetization of the filament and (b) current of positive particles along both filaments in the grand-canonical setup on a dynamic lattice of size $L=200$. The polymerization rate of the dynamic lattice is kept constant and equal to $k_p=1$. All quantities are plotted against the interaction strength $q$ tuning the modified attachment/detachment rates. The lattice dynamics suppresses lane formation and improves the current if the lattice dynamics is not too strong.} \protect\label{fig:gc_dynamic:magnetization_current} \end{center} \end{figure} \subsubsection{Finite diffusion rate} In the model with finite diffusion rates in the reservoir, there is no lane formation on the static lattice and the same remains true if a lattice dynamics at any strength is added. But as has already been reported in~\cite{Ebbinghaus10}, a dynamic lattice is capable of dramatically increasing the current along the lattice and reaching an efficient state by dissolving large clusters. This effect is obviously also present in this system and the strength of the additional interaction only has very little impact on the current on the dynamic lattice. The increase of current due to the modified attachment/detachment rates on the dynamic lattice is of the same order as the one observed on the static lattice (figure~\ref{fig:fd_static:magnetization_current}) and represents only a small fraction of the increase due to lattice dynamics: In a system of density $\rho=1$ and length $L=1000$, the maximum current increase caused by the lattice dynamics is almost ten-fold, whereas the modified attachment/detachment rates do not even double the current in the system. \subsection{Summary} \begin{table}[tbp] \centering \includegraphics[scale=0.3, clip]{Figures/table1} \caption{\label{tab:KL_results}Overview of results for modified attachment/detachment rates. As a function of the two dimensions \emph{type of reservoir} and \emph{lattice dynamics}, the most important results on the lane formation are given. A green cell indicates that lane formation occurs whereas the inverse is true for a red cell. It should be kept in mind however that lane formation does not necessarily imply that transport is efficient, and that efficient transport can also be obtained without lane formation. The text in the cell gives additional information on the phenomenology.} \end{table} An overview of the results of this section with its multiple scenarios is shown in table~\ref{tab:KL_results} with the color of the cell indicating if lane formation is possible. In summary, particle-particle interactions which modify the attachment and detachment rates of particles depending on the occupation of the neighboring sites can lead to lane formation for reservoirs with an infinite diffusion rate only. In this case, although the number of encounters of particles of different species is reduced, the throughput of particles is extremely low in systems with a {\em large} number of particles. This is due to overcrowding of the lattice caused by the strong attractive interactions in lane-separated systems. On the other hand, we have observed that efficient transport through lane formation can be obtained if the total particle density is limited to {\em low} enough values. However, in order to be in this optimal regime, the interaction strength $q$ should be large enough. There is no direct experimental measurement of the interaction strength that would allow to decide whether real systems are in this efficient regime. Crude estimates for $q$ can be made from the decoration experiments with kinesin, and would give $q\approx 4$ \cite{Muto05} or $q\approx 2.25$ \cite{Roos08}, thus values that would be too low to trigger lane formation. However, this is certainly not a definite statement, as the interaction terms could have a different form than the one of figure~\ref{fig:KL_interaction}, and further experimental measurements (in particular involving two types of motors) should be performed to refine the prediction. It should be noted that due to the dynamics of microtubules in real systems, the interaction strength $q$ needed to obtain separated lanes may be shifted to higher values, as we have found that it is the case here for a much simplified lattice dynamics. More generally, the fact that the lane formation mechanism is dependent on an infinite diffusivity around the transport lattice is a major drawback for the relevance of this type of interaction for the axon, which is a rather crowded environment. Thus, though an efficient regime was evidenced by our simulations for the canonical reservoir, we are not able to decide yet whether it is relevant for real systems, and thus it is worth to explore alternative scenarios (as will be done in the next sections). In the absence of the aforementioned particle-particle interaction, the lattice dynamics was shown to improve the current along the filament for all three types of reservoirs. With the interaction presented here, it has a positive effect whenever current is hindered by a (possibly local) high density. The lattice dynamics dominate the behavior of the system in the sense that the lane formation disappears for strong lattice dynamics whereas for strong particle-particle interactions, the effect of the lattice dynamics remains visible. \section{Side-stepping in front of obstacles} \label{sec:sidestep} The interaction presented in the previous section was able to induce lane formation and efficient transport only in the case of infinite diffusion in the reservoir. By contrast, in this section, we propose another type of particle interaction that is capable of inducing lane formation even for finite diffusion rates in the reservoir. As a consequence, only the reservoir with a finite diffusion rate will be treated here. \subsection{Model definition} Particles obey to the same hopping rules as depicted in \fref{fig:2lanemodel}, i.e., they hop into a preferential direction along the filaments and hop with equal rates in both directions in the reservoirs. In order to keep the model simple, we consider again only two filaments and the two associated reservoirs. Exchanges between reservoirs or reservoir and filament occur with the same rates as before (see fig.~\ref{fig:2lanemodel}). The particles still interact via hard-core exclusion on the filament but instead of modifying attachment and detachment, we consider the following interaction between particles: If a particle's step along the filament is rejected because the target site is occupied by a particle of the opposite species, the particle switches to the other filament with probability $\alpha$ provided the site at the same longitudinal position is empty on the other filament (see \fref{fig:sidestepmodel}(a)). We shall refer to this interaction as the ``single obstacle'' interaction in the following. So far, there is no experimental data showing a similar behavior of molecular motors. However, the only known experiments on interactions between molecular motors are the decoration experiments for kinesins addressed in section~\ref{sec:interact} which was shown to be rather questionable as a cause for possible lane formation. Here, the idea is that opposed motors push against each other and thus could exert a force which might induce lane changes. This effect might be even more pronounced if one thinks of the relatively large cargos carried by the molecular motors. We shall also consider a variant of this interaction where the particle may only switch from one filament to the other with probability $\alpha$ if it encounters \emph{two} particles of the opposite species on the two next sites in stepping direction (see \fref{fig:sidestepmodel}(b)). This mechanism will be referred to as the ``two obstacles'' interaction. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.8, clip]{Figures/sidestepmodel1} \hspace{1.0cm} \includegraphics[scale=0.8, clip]{Figures/sidestepmodel2} \caption{Lane changes (or side stepping) through steric interactions. A particle may change onto the neighboring filament with filament $\alpha$ if it encounters (a) one or (b) two particles of the other species. The reservoirs are not shown.} \protect\label{fig:sidestepmodel} \end{center} \end{figure} \subsection{Static lattice} \subsubsection{``Single obstacle'' interaction}\label{subsubsec:static_single_obst} On a static lattice, changing lanes in front of a single particle of opposite species does not lead to dramatic effects. In particular, no lane formation is observed although the absolute magnetization of the filament slightly increases. This effect competes with the reservoir exchange rate $c_\mathrm{R}$ which tends to mix the system and destroys any phase separation between the two subsystems. At $c_\mathrm{R}=D=0.1$, no effect of the additional particle-particle interaction is visible at any probability $\alpha$. Nevertheless, there is a small effect for decoupled reservoirs at $c_\mathrm{R}=0$. The increase of the magnetization is stronger the fewer particles we have in the system, but even for densities as low as $\rho=0.1$, the magnetization does not exceed $|m|<0.3$. It is noteworthy that at the system size $L=1000$ considered here, there is no important clustering at this low density. In a clustered system with higher particle density, absolute increases in magnetization are almost negligible: For $\rho=1$, the magnetization passes from $|m|=0.047$ at $\alpha=0$ to $|m|=0.0784$ at $\alpha=1$. Alike, the current does not improve much with this side-stepping interaction. The clustered systems remain clustered and exhibit a maximal gain of their current of $25\%$ while starting from an extremely low value being caused by the existence of the large cluster. \subsubsection{``Two obstacles'' interaction} If we consider a stronger condition for filament changes as shown in~\fref{fig:sidestepmodel}(b), lane formation is obtained much more easily compared to the single obstacle model (\sref{subsubsec:static_single_obst}) and occurs at any density with decoupled reservoirs, i.e., $c_\mathrm{R}=0$. The current of particles along each filament is consequently very high and close to the optimal value found in a one-species TASEP. The interaction is asymmetric in the sense that a single particle changes the filament if opposed to two particles of opposite charge while the single particle cannot induce any lane change on the two particles. As a consequence, a particle species which is only slightly dominant on one filament can push more and more particles from the minority species to the other filament. Ultimately, complete lane formation is observed. As discussed in the last section, the lane formation competes with the mixing through the reservoirs. If the reservoir coupling is increased, the magnetization is lowered at some point and lane formation disappears (\fref{fig:sidestep2_static:magnetization_current}(a)). The onset of remixing the separated lanes occurs at lower couplings $c_\mathrm{R}$ for higher densities as in these cases, more particles are continuously transported to reservoir belonging to the `wrong' filament. For $c_\mathrm{R}=D=0.1$, the system is completely mixed at any density. The current increases by one order of magnitude if lane formation occurs (\fref{fig:sidestep2_static:magnetization_current}(b)) and is very close to the optimal value in the one-species TASEP. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.25, clip]{Figures/sidestep2/magnetizationkdp0dens10} \includegraphics[scale=0.25, clip]{Figures/sidestep2/currentkdp0dens10} \caption{(a) Magnetization of the filament and (b) current along both filaments of positive particles on a static lattice with filament changes of particles as depicted in \fref{fig:sidestepmodel}(b) (side stepping induced by ``two obstacles''). The system size is $L=1000$ and the total density $\rho=1$. The reservoir coupling inhibits lane formation. Systems with lane formation show a close-to-optimal current which is one order of magnitude higher than in the mixed case.} \protect\label{fig:sidestep2_static:magnetization_current} \end{center} \end{figure} \subsection{Dynamic lattice} \subsubsection{``Single obstacle'' interaction}\label{subsubsec:dynamic_single_obst} If the possibility to perform filament changes is combined with lattice dynamics, the system's tendency toward lane formation is increased (see \fref{fig:sidestep1:magnetization_current}(a)). A system of density $\rho=0.4$ reaches complete lane formation at $k_\mathrm{d}=0.1$. However, at this value of the depolymerization rate $k_\mathrm{d}$, the basic model without filament changes does not exhibit a large cluster anymore, but is in a homogenous state with very small structures, and thus has already improved transport properties only due to lattice dynamics. The enhanced lane formation can be understood in the following way: In order to form lanes, filament changes of particles are necessary which can only occur if particles of different species meet. Consequently, more lane changes are induced if there are more interfaces between positive and negative particles. In a clustered system, almost all the particles are accumulated in the cluster so that there are only very few interfaces. The lattice dynamics, though, inhibits the formation of large clusters and instead distributes the particles more homogeneously over the whole system leading to many very small clusters. This effectively increases the number of interfaces between positive and negative particles and thus favors lane changes and lane formation. The effect which has been mentioned in \sref{subsubsec:KL_dynamic_inifinite} that holes in the lattice decrease the effectivity of a particle-particle interaction because the interaction is only next-neighbor seems to be overcompensated by the increase in interfaces due to the dissolution of the big cluster. The strength of the lattice dynamics that is needed to form lanes depends on the particle density, e.g., a system of density $\rho=1$ does not exhibit complete lane formation at any lattice dynamics (see \fref{fig:sidestep1:magnetization_current}(c)) while a system of density $\rho=0.1$ forms lanes at much lower lattice dynamics (not shown). \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.25, clip]{Figures/sidestep1/magnetizationdens04cR0} \includegraphics[scale=0.25, clip]{Figures/sidestep1/currentdens04cR0}\vspace{5mm} \includegraphics[scale=0.25, clip]{Figures/sidestep1/magnetizationdens10cR0} \includegraphics[scale=0.25, clip]{Figures/sidestep1/currentdens10cR0} \caption{(a,c) Magnetization of the filament and (b,d) current of one particle species along both filaments in a system of length $L=1000$ with decoupled reservoirs $c_\mathrm{R}=0$, for a density (a,b) $\rho=0.4$ or (c,d) $\rho=1$ and ``single obstacle'' interaction. For $\rho=0.4$, the enhancement of lane formation by the lattice dynamics is obvious (a), while it is hardly existent for $\rho=1$ (c). Lattice dynamics have a stronger impact on the current than the lane formation as currents in (b) and (d) are comparable although only one of the systems exhibits lane formation.} \protect\label{fig:sidestep1:magnetization_current} \end{center} \end{figure} Again, the current is more strongly (and positively) affected by the lattice dynamics than by the additional particle-particle interaction as can be seen in \fref{fig:sidestep1:magnetization_current}(b) and (d): The higher the lattice dynamics, the higher the overall position of the current curves. In particular, for the completely lane separated system at $\rho=0.4$ for $\alpha>0$, the current increases by $40\%$ due to the lane formation, but more than quadruples because of the lattice dynamics (\fref{fig:sidestep1:magnetization_current}(b)). This impression is strengthened by the observation that similar gains due to the dynamic lattice are obtained even if no lane formation occurs (\fref{fig:sidestep1:magnetization_current}(d)). The values of the current for $\rho=1$ are remarkable since they are rather close to the maximum current of $1/4$ that would be found in a one-species TASEP, although encounters between particles of different species are still frequent in our model even at important lattice dynamics. These results have so far been obtained at decoupled reservoirs $c_\mathrm{R}=0$. The influence of the reservoir coupling $c_\mathrm{R}$ is shown in \fref{fig:sidestep1:magnetization_current_cR} for a dynamic lattice. Already an extremely small reservoir coupling destroys the lane formation (\fref{fig:sidestep1:magnetization_current_cR}(a)). If diffusion in longitudinal and transverse direction are equal, i.e., $c_\mathrm{R}=D=0.1$, the lane formation effect disappears almost completely. However, the current is only marginally affected (\fref{fig:sidestep1:magnetization_current_cR}(b)) and reaches almost identical values for all reservoir couplings at $\alpha=1$. This once more confirms that the lattice dynamics is dominant in determining the transport capacity of the system. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.25, clip]{Figures/sidestep1/magnetizationkdp01dens04} \includegraphics[scale=0.25, clip]{Figures/sidestep1/currentkdp01dens04} \caption{(a) Magnetization of the filament and (b) current of one particle species along both filaments in a system of length $L=1000$ at density $\rho=0.4$. Motors interact through the ``single obstacle'' interaction, and a dynamic lattice is considered with $k_d=0.1$. The different curves correspond to different reservoir couplings which acts against lane formation induced by the ``single obstacle'' interaction.} \protect\label{fig:sidestep1:magnetization_current_cR} \end{center} \end{figure} \subsubsection{``Two obstacles'' interaction} As for the the ``single obstacle'' interaction, the lattice dynamics also improve the lane formation mechanism by increasing the number of interfaces between oppositely moving particles for the ``two obstacles'' interaction (\fref{fig:sidestep2_dynamic:magnetization_current}(a)). The influence of the lattice dynamics and the competition with the reservoir coupling $c_\mathrm{R}$ on the magnetization and therefore on the lane formation remains qualitatively unchanged compared to \sref{subsubsec:dynamic_single_obst}. There is nevertheless an interesting difference for the value of the current in the systems with lane formation: For the most dynamic lattices $k_\mathrm{d}=0.1$, the current in the separated system can sometimes be lower than in de-mixed or even mixed systems at lower lattice dynamics (blue and green lines in \fref{fig:sidestep2_dynamic:magnetization_current}(b)). In these cases, the lattice dynamics actually inhibit any further improvement of the current by eliminating too many sites of the filament along which no transport can happen. This effect is the more pronounced, the lower the density of particles is. \begin{figure}[tbp] \begin{center} \includegraphics[scale=0.25, clip]{Figures/sidestep2/magnetizationdens10cR-4} \includegraphics[scale=0.25, clip]{Figures/sidestep2/currentdens10cR-4} \caption{(a) Magnetization of the filament and (b) current along both filaments of positive particles on a dynamic lattice of size $L=1000$ at density $\rho=1.0$, with ``two obstacle'' interactions as depicted in \fref{fig:sidestepmodel}(b), and reservoir coupling $c_\mathrm{R}=10^{-4}$. The lattice dynamics enhance lane formation in only partially de-mixed systems and have an important impact on the current.} \protect\label{fig:sidestep2_dynamic:magnetization_current} \end{center} \end{figure} \subsection{Summary} \begin{table}[tbp] \centering \includegraphics[scale=0.3, clip]{Figures/table2} \caption[Overview of results for lane formation through direct filament changes.]{\label{tab:stericIA_results}Overview of results for lane formation through direct filament changes. As a function of the two dimensions \emph{type of interaction} and \emph{lattice dynamics}, the most important results on the lane formation are given. A green cell indicates that lane formation occurs whereas the inverse is true for a red cell. The text in the cell gives additional information on the phenomenology. Note that for a dynamic lattice, high transport capacities are maintained even for higher reservoir couplings, though lane formation is hindered.} \end{table} The most important results of this section are summarized in table~\ref{tab:stericIA_results}. The proposed interaction between particles which eventually induces filament changes of the particles has been shown to lead to lane formation under special conditions. In general, three factors determine the possibility of lane formation: 1. A higher particle density $\rho$ decreases the tendency to form separate lanes for both species (in contrast to what was observed for the modified attachment/detachment rates of section \ref{sec:interact}). 2. The reservoir coupling $c_\mathrm{R}$ suppresses lane formation by mixing partially phase-separated subsystems (already true for the modified attachment/detachment rates of section \ref{sec:interact}). This mixing is very efficient as the rates needed to inhibit lane formation are several orders of magnitude smaller than all the other rates in the system. 3. Lattice dynamics promotes lane formation by increasing the number of contacts between positive and negative particles through a redistribution of the particles on several filament segments. We therefore have two effects leading to higher currents, one of which (lattice dynamics) improves the other (lane formation). Considering the current, lane-separated states can obviously be considered as efficient transport states. They have a high throughput of particles and because of the absence of large structures, no finite-size effects are present, so that we have a density-dependent state. This property is necessary to have finite current in very long systems. However, we have shown that the effect of lattice dynamics on the current has a much larger amplitude than the one due to the side stepping mechanism. \section{Discussion} In the present article, we presented two different types of particle-particle interactions in a quasi one-dimensional lattice gas with oppositely moving particle species. Both types of interactions lead to lane formation under certain conditions. We explored the robustness of these lane-separated states and their transport capacity. An efficient transport state was supposed to be characterized by a system size-independent (= density-dependent) state, with a finite current that compares to the current in a one-species TASEP serving as a benchmark. The first type of interaction which was considered by Klumpp and Lipowsky~\cite{Klumpp04} affects the affinity to the filament in the vicinity of other particles. The lane-separated states that are found (only for infinite reservoir diffusion) exhibit a density-dependent current but many of these states also have extremely high densities on the filament so that the actual current of bound particles is rather low compared to an optimal regime. This is in particular the case for open systems (grand-canonical reservoir), or for closed systems with high enough densities (canonical reservoir). The conclusion is that lane formation does not necessarily imply efficient transport although this can be the case. Lower densities with a canonical reservoir do lead to very efficient states which compare well to the one-species TASEP. Lane formation with this type of interaction (leading to modified attachment/detachment rates) was only possible for an infinite diffusion rate in the reservoir. With regard to an application of these concepts to real transport processes as intracellular transport, this is a very strong assumption. The interior of a cell is very crowded and considering the typical sizes of vesicles and organelles, diffusion should be very limited. In the case of finite diffusion, no lane formation is observed and the interaction plays a minor role in improving the current, compared to the much more positive impact of lattice dynamics. In the second type of interaction that has been considered in this paper, particles hop to the neighboring filament when they meet an oppositely charged motor. Although this model is in principle able to exhibit lane formation at finite longitudinal diffusion, the lane-separated state is extremely sensitive to diffusion between reservoirs, i.e., diffusion in the transverse direction. This is in sharp contrast to the first interaction model which actually needed infinite diffusion rates to exhibit lane formation. The difference comes from the nature of the particle-particle interaction. Any de-mixing in the first scenario has to be carried out via particle exchanges with the reservoir whereas in the second scenario, particles directly switch from one filament to the other and do not need the reservoir to form lanes. From a biological point of view, the strong limitation of transversal diffusion required for the scenario based on side-stepping could be realized if the axon is compartmentalized such that diffusing particles cannot reach easily other filaments than the ones in their direct neighborhood. Furthermore, based on the experimental observation that microtubule-based transport in axons takes place on dynamic microtubules, we have considered that the underlying lattice itself can undergo some dynamics, through the much simplified random polymerization/depolymerization of filament units. As, from a general point of view, the consequences of a lattice dynamics on transport properties are not known, we chose to concentrate on a simplified lattice dynamics, to study generic effects, rather than going directly into the full complexity of the biological system. We had already shown in \cite{Ebbinghaus10} how such a lattice dynamics can drive the system from a size-dependent state with inefficient transport, to a density-dependent state with efficient transport. In the present paper, we have studied again what would be the influence of a dynamic lattice on the transport efficiency, but now in the presence of interactions. In almost all cases (i.e., for almost all types of reservoirs and particle interactions), we found that lattice dynamics improves the efficiency of transport. Actually, we found only one case in which the lattice dynamics does not improve the current in the system: if the system forms lanes at low enough density $\rho$, with infinite diffusion rate in the reservoir, then lattice dynamics worsens a state which is already close to optimal transport. However, an infinite diffusion rate in the reservoir is not expected to be relevant for transport in real cells, and besides, there is no experimental evidence yet that the motor-motor interaction strength is sufficient to reach this state. In all the other cases, the benefits from lattice dynamics as described in~\cite{Ebbinghaus10} were still valid also when combined with particle-particle interactions. More precisely, the lattice dynamics modifies the lane formation mechanism for both types of interaction scenarios. In the first scenario, while lane formation is shifted to stronger interactions, lattice dynamics still improve the transport in the system by lowering the density on the filament in the inefficiently crowded states. The second lane formation mechanism through side-stepping is enhanced by the lattice dynamics as it relies on direct contacts between particles of opposite species which are increased by the dissolution of clusters. Then lattice dynamics on the one hand lowers the interaction strength required to form lanes, and on the other hand improves the current in lane separated states. For both types of interactions, the same effects are already present on a static lattice with a sufficient density of holes, due to an effective limitation of the system size. But our results indicate that the effects are enhanced when the lattice undergoes some dynamics (at equal hole density). In total, lane formation appears difficult to achieve in bidirectional systems as considered here, because the fact that the run length along the filament is finite (due to processivity or lattice dynamics) actively works against any sorting of particles onto different filaments. Lane formation can be achieved only for special combinations of parameters or characteristics of the system. It is an open question to know whether biological parameters for axonal transport are or are not in this regime. Several types of molecular motors which participate in intracellular transport have been studied experimentally, but results are obtained mostly for \emph{in vitro} experiments, while it is not obvious that dynamical parameters are the same in an in vivo environment. Besides, some motors (as dyneins) are more difficult to study, and we are lacking data. There are almost no experimental results about interactions between different types of motors. It cannot be excluded that other interactions between motors than those considered here lead to lane formation mechanisms which are less sensitive to system parameters. There is an urgent need for more data on particle-particle interactions which could possibly be acquired by statistical exploitation of \emph{in vitro} experiments involving many motors. As mentioned above, the lattice dynamics were intentionally kept simple in this paper. We found that such lattice dynamics produce transport enhancement through cluster dissolution, and in \cite{Ebbinghaus10}, we found that it was robust for several types of simple lattice dynamics. Still, in further studies, we plan to apply our approach to more biologically relevant dynamics, but there is still a need of experimental observations about the precise dynamics of the microtubule network. Anyhow, for the interactions considered in this paper, we found that for finite diffusion the lattice dynamics always has a positive effect on transport, whether lane formation is present or not. Thus in the context of axonal transport, lattice dynamics and motor-motor interactions should not be considered as competing mechanisms, but rather as two complementary processes that can contribute in a cooperative way to the efficiency of bidirectional transport. Only further experimental informations can allow to quantify the contribution of the various ingredients. However, in view of our results, we suggest that the microtubule dynamics could play an important role in the regulation of bidirectional transport, whether in combination with motor-motor interactions or not. \ack ME would like to thank the DFG Research Training Group 1276 for financial support. \section*{Bibliography} \bibliographystyle{unsrt}
\section{Introduction} There have been numerous studies of collections of driven particles interacting with periodic substrates in which directional or kinetic locking of the particle motion occurs \cite{Nori,Ahn,Korda,Spalding,Lacasta}. Here, some or all of the particles move along a symmetry direction of the substrate even though the external driving force is not applied along the symmetry direction. This effect was first observed in a superconducting vortex system with a square pinning array in \cite{Nori}. The direction of drive was rotated with respect to the substrate by applying one dc drive $F_D^x$ along a major symmetry axis of the array while gradually increasing a second perpendicular dc drive $F_D^y$. The initial dc drive was strong enough to cause all the vortices to flow over the substrate so that there were no pinned vortices. As $F_D^y$ increased, the $y$-component of the response did not increase smoothly as would be expected in the absence of pinning, but instead increased in a series of steps which formed as the vortex motion locked to different symmetry directions of the substrate. For a square substrate lattice, locking steps appear whenever $F^{y}_{D}/F^x_{D} = n/m$, where $n$ and $m$ are integers, giving a devil's staircase structure. Although this initial study was performed for superconducting vortices, in \cite{Nori} it was suggested that similar effects should occur for other systems of particles moving over periodic substrates at varied drive angles, such as colloidal particles moving over optical substrates. A later study predicted similar effects for the motion of classical charged particles over a two dimensional periodic potential array \cite{Ahn}. The first experimental observation of this type of symmetry locking was obtained for colloidal particles driven at different angles over an optically generated square substrate \cite{Korda}. The locking, termed kinetic locking in \cite{Korda}, was proposed as a novel fractionation method for separating different colloidal species which could be effective whenever one species locked much more strongly than the other to the symmetry direction of the optical array. Such separation was specifically demonstrated in other experiments with colloidal particles moving over periodic substrates \cite{Spalding}. Following these works, there have been numerous experiments and simulations showing symmetry locking for particles moving on periodic substrates \cite{Lacasta,Olson,AG,Wong,Linke,Reimann,Eichhorn,Drazer1,Drazer,Hermann,Grier,Khoury,Huang,Austin,Hastings,Tierno}, as well as new proposals for achieving a similar effect with nanoparticles \cite{Koplick}. Most of these studies \cite{Ahn,Korda,Spalding,Lacasta,AG,Wong,Linke,Reimann,Eichhorn,Drazer1,Drazer,Hermann,Grier,Khoury,Huang,Austin,Hastings,Tierno} involved noninteracting particles and did not consider collective effects. In the superconducting system studied in \cite{Nori}, the particle-particle interactions are sufficiently long ranged that collective particle interactions play an important role in the response of the system, producing different types of triangular or square orderings. This suggests that there could be a rich variety of collective behaviours and even different types of symmetry locking for particles driven over periodic substrates that have not been explored yet. In addition to the colloidal work, symmetry locking effects have been further studied for superconducting vortices in numerical simulations \cite{Marconi,Carneiro} and have also been observed experimentally \cite{Marconi,Surdeanu,Look,Schuller}. For systems in which the particles are strongly interacting, dynamical symmetry locking effects can occur even when the particles are moving over a {\it random} substrate provided that the particle-particle interactions are strong enough to overcome the randomness of the substrate and produce a triangular ordering of the moving particles \cite{Giamarchi,Olson2}. The initial triangular ordering of a lattice of strongly interacting vortices results in directional locking steps whenever the direction of the external drive matches one of the lattice vectors of the triangular vortex lattice. Under these conditions, the transverse depinning threshold for motion perpendicular to the lattice symmetry directions is enhanced. This effect was predicted in theoretical work on the moving vortex Bragg glass where the vortex lattice maintains its triangular ordering \cite{Giamarchi} and was also observed in numerical simulations for systems with weak random substrates \cite{Olson2}. The appearance of a critical or nonzero transverse depinning threshold due to directional locking has also been predicted to occur for frictional systems of sliding elastic manifolds on periodic surfaces \cite{Achim,Yang,Ying}. Vortices and colloids driven over quasicrystalline arrays at varied angles also show directional locking effects where the motion locks to certain orientational degrees of freedom of the lattice even though the substrate has no long-range translational order \cite{OlsonA}. Since numerical models of vortex and colloidal systems have proved to be valuable systems for understanding the general behaviour of particles moving over periodic substrates, in this work we use the motion of vortices and colloids to study several aspects of collective effects in symmetry locking that have not been considered previously. The initial study of the symmetry locking effect for a square substrate was performed in the limit where all the vortices were moving \cite{Nori}. It would be interesting to understand how the locking effects change as the ratio of the external drive to the pinning strength is varied, particularly when a portion of the particles become pinned for stronger substrates. One example of a system exhibiting partial pinning is a superconductor with an applied magnetic field of $B/B_{\phi} > 1.0$, where $B_{\phi}$ is the field at which the number of vortices in the sample equals the number of substrate minima in the sample. If each substrate minima can trap only one vortex, then for $B/B_\phi>1$, a portion of the vortices occupy interstitial locations between the substrate minima. In order to move under an applied current, these interstitially confined vortices must either flow along the occupied rows of pinning by displacing the pinned vortices, or they can flow through the interstitial regions between the pinning sites \cite{Harada,Commensurate,Peeters,Reichhardt}. Interstitial vortices, when present, are much more mobile than the pinned vortices and depin at a lower driving threshold than the vortices at the pinning sites \cite{Harada,Reichhardt,Transverse}. The interstitial vortices may exhibit dynamical locking effects as the direction of the drive is changed; however, it is also possible that for some driving directions the moving interstitial vortices can cause a portion of the vortices at the pinning sites to depin, disrupting or changing the locking effects. The initial symmetry locking study of vortices moving through a square pinning array \cite{Nori} focused only on fields very near $B/B_{\phi} = 1.0$, and it is not known how the locking effects would change for higher fields or for varied particle density with a fixed pinning density. It might be expected that the strength of the locking effects would simply decrease for increasing particle density; however, in this work we show that the locking actually undergoes particle density-induced oscillations related to dynamical commensurability effects. \section{Simulation} We model a two-dimensional system with periodic boundary conditions. For the case of superconducting vortices, we consider a sample of size $24\lambda \times 24\lambda$, where length is measured in units of the London penetration depth $\lambda$. The motion of an individual vortex evolves according to the overdamped equation \begin{equation} \eta\frac{ d{\bf R}_{i}}{dt} = {\bf F}_{i}^{vv} + {\bf F}^{p}_{i} + {\bf F}^{ext}_{i} . \end{equation} Here ${\bf R}_{i}$ is the location of vortex $i$ and $\eta$ is the damping coefficient $\eta=\phi_0^2d/2\pi\xi^2\rho_N$,where $d$ is the sample thickness, $\xi$ is the superconducting coherence length, $\rho_N$ is the normal state resistivity, and $\phi_0=h/2e$ is the flux quantum. The first term on the right is the vortex-vortex interaction force given by ${\bf F}_{i}^{vv} = \sum^{N_{v}}_{j\ne i}f_{0} K_{1}({R_{ij}}/{\lambda}){\bf {\hat R}}_{ij}$ where $K_{1}$ is the modified Bessel function, $f_{0}=\phi_0^2/(2\pi\mu_0\lambda^3)$, $R_{ij}=|{\bf R}_i-{\bf R}_j|$, and ${\bf {\hat R}}_{ij}=({\bf R}_i-{\bf R}_j)/R_{ij}$. Since the Bessel function diverges at the origin, we place a cutoff on the interaction force at $0.1\lambda$; in practice, the vortices do not approach each other this closely. The repulsive force falls off exponentially at larger distances so we place a maximum interaction distance cutoff at $6\lambda$ to increase the computational efficiency. The periodic substrate is modelled as $N_{p}$ parabolic potential traps or pinning sites of radius $R_{p} = 0.3\lambda$ and maximum strength $F_{p}$. The vortex-substrate interaction has the form ${\bf F}^{p}_{i} = \sum_{k=1}^{N_p}(F_{p}R_{ik}^{(p)}/R_{p})\Theta((R_{p} - R_{ik}^{(p)})/\lambda ){\bf {\hat R}}^{(p)}_{ik}$. Here $\Theta$ is the Heaviside step function, $R_{k}^{(p)}$ is the location of pinning site $k$, $R^{(p)}_{ik} = |{\bf R}_{i} -{\bf R}^{(p)}_{k}|$, and ${\hat {\bf R}}^{(p)}_{ik} = ({\bf R}_{i} - {\bf R}^{(p)}_{k})/R^{(p)}_{ik}$ The pinning sites are placed in a triangular or square arrangement. The initial vortex configurations are obtained by simulated annealing, where we form a high temperature molten state by applying Langevin kicks to the vortices, and slowly cool the sample to $T=0$. We anneal by decreasing $T$ in increments of $\delta T=0.002$ with a waiting time of $5000$ simulation time steps between increments. After annealing, we apply an external force in the form of a drive applied at an angle that changes very slowly, \begin{equation} {\bf F}_{ext} = A\sin(\theta(t)){\bf \hat x} + A\cos(\theta(t)){\bf {\hat y}} \end{equation} Here the force amplitude is $A=2.0$, $\theta=\omega t$, and $\omega$ is the frequency of rotation, which is taken to be small. The velocity response in the $x$ and $y$ directions can be obtained by measuring the average vortex velocities $\langle V_{x}\rangle = N_{v}^{-1}\sum_{i=1}^{N_{v}}{\bf v}\cdot {\hat {\bf x}}$ and $\langle V_{y}\rangle = N_{v}^{-1}\sum_{i=1}^{N_{v}}{\bf v}\cdot {\hat {\bf y}}$. We measure the velocity as a function of the drive angle $\theta$. We focus on the case of low frequencies to avoid any transient effects in the vortex dynamics. We have specifically checked that the simulated annealing time is long enough that the initial vortex configurations do not change for slower annealing rates and that the rotation frequency is small enough that there are no changes in the widths of the directional locking steps for lower values of $\omega$. For the colloidal simulations we use the same type of overdamped equation of motion and the same form for the pinning substrates. The main difference is the particle-particle interactions, which are still repulsive but have the Yukawa form ${\bf F}_i^{vv}=-\sum_{j\ne i}^{N_v}\nabla V(R_{ij}){{\bf \hat R}_{ij}}$ with $V(R_{ij}) = (E_{0}/R_{ij})\exp(-\kappa R_{ij})$, where $E_{0} = Z^{*2}/4\pi \epsilon \epsilon_{0}$, $\epsilon$ is the solvent dielectric constant, $Z^{*}$ is the effective charge of each colloid and $1/\kappa$ is the screening length. In this case lengths are measured in units of $a_{0}$ and forces in units of $F_{0} = E_{0}/a_{0}$. \begin{figure} \includegraphics[width=3.5in]{Fig1.ps} \caption{ The positions of the pinning sites (large open circles) and vortices (small filled circles) for a triangular pinning array at $B/B_\phi=1$ and zero drive. The arrow indicates the initial direction of the external drive, which rotates counterclockwise. In this work we consider directional locking for drive angles ranging from $\theta = 0^\circ$ to $\theta=90^\circ$. (b) The structure factor $S(k)$ for the vortex positions in (a) indicates triangular ordering. (c) The positions of the pinning sites (large open circles) and vortex locations (small filled circles) for a square pinning array at $B/B_\phi=1$ and zero drive. (d) $S(k)$ from the vortex positions in (c). \label{imagefig} } \end{figure} \section{Structural Transitions and Directional Locking} In figure~1(a) we show a snapshot of the system for a triangular pinning array at $N_v/N_p=B/B_\phi=1$ and zero drive. The arrow indicates the initial direction of the applied force, which rotates counterclockwise with time. In figure~1(b) we plot the corresponding structure factor for the vortex positions, \begin{equation} S({\bf k}) = \frac{1}{L^2}\sum_{i,j}\exp(i{\bf k} \cdot[{\bf R}_{i}(t) - {\bf R}_{j}(t)]). \end{equation} Here, six peaks appear which are indicative of the triangular ordering of the vortex lattice. In figure~1(c) we illustrate the nondriven phase for a square pinning array at $B/B_{\phi} = 1.0$, along with the corresponding structure factor in figure~1(d). \begin{figure} \includegraphics[width=3.5in]{Fig2.ps} \caption{ (a) The average velocity $V$ per particle vs drive angle $\theta$ for vortices moving on a triangular pinning array with $F_p=1.85$ at $B/B_\phi=1.5$. Dark line: $V_x$; light line: $V_{y}$. Locking steps occur at $\theta = \tan^{-1}(\sqrt{3}m/(2n +1))$, where $m,n$ are integers. Here the locking steps $(m,n)$ at (0,0), (1,2), (1,1), (2,1), (1,0), and (3,0) are highlighted. There is also a locking step at $\theta=90^\circ$. (b) The corresponding fraction of sixfold coordinated particles $P_{6}$ vs $\theta$. Changes in $P_{6}$ are correlated with the velocity locking steps in (a). \label{imagefig2} } \end{figure} We first consider directional locking on a triangular pinning substrate, which occurs at driving angles $\theta = \tan^{-1}(\sqrt{3}m/(2n +1))$. The dominant locking angles fall at $\theta=60^\circ$ for $m = 1$, $n = 0$ and $\theta=30^\circ$ for $m = 1$, $n = 1$. We use the notation $(m,n)$ to denote the locking regions. In figure~2(a) we plot $V_{y}$ and $V_{x}$ versus $\theta$ for a sample with $F_{p} = 1.85$ at $B/B_{\phi} = 1.5$. In the absence of pinning, the velocities would follow a smooth sinusoidal curve with $V_{y}$ starting from zero and reaching a maximum at $\theta=90^\circ$ when $V_{x}$ goes to zero. Figure~2(a) shows that in the presence of pinning, both $V_{y}$ and $V_{x}$ pass through a series of pronounced steps and jumps. For $ \theta < 10^\circ$, the motion is locked in the $x$-direction with a finite $V_{x}$ and $V_{y}= 0.0$. The value of the $y$ component of the driving force at the end of the $(0,0)$ step when the locking to the $x$ direction is lost is the critical transverse depinning force $F^{Tr}_{c}$ corresponding to the $(0,0)$ locking. At the end of the $(0,0)$ step there is a discontinuous jump in $V_{y}$ to a finite value which is correlated with a sudden {\it increase} in $V_{x}$. The increase in $V_x$ occurs even though the $x$ component of the driving force is decreasing. Over the range $11^\circ < \theta < 16^\circ$, $V_{y}$ increases, passing through a small step near $\theta=14^\circ$. A large locking step is centred at $\theta = 30^\circ$ corresponding to the $(1,1)$ locking. A second strong step in both $V_x$ and $V_y$ occurs at $\theta=60^\circ$ at the $(1,0)$ locking. When the system exits this step, $V_{y}$ jumps up and $V_{x}$ jumps down. In figure~2(b) we plot the fraction of sixfold coordinated particles $P_{6}$ as a function of $\theta$. Here $P_6=N_v^{-1}\sum_{i=1}^{N_v}\delta(z_i -6)$, where the coordination number $z_i$ of each particle is obtained from a Voronoi construction. In the absence of pinning, $P_6=1.0$ when the vortices form a triangular lattice. On the $(0,0)$ step, $P_{6} = 0.8$, indicating that the system does not have complete triangular ordering and that some dislocations must be present. Along the $(1,1)$ step, $P_6=0.9$, but $P_{6}$ dips at the start and the end of the step. For the first half of the $(1,2)$ step, $P_{6}$ has a low value, and then for the second half of the step $P_6$ increases. \begin{figure} \includegraphics[width=3.5in]{Fig3.ps} \caption{ The vortex positions (a,c,e) and corresponding $S(k)$ (b,d,f) for the triangular pinning system in figure~2. (a,b) The smectic structure along the (0,0) step. (c,d) Square lattice formation on the (1,2) step. (e,f) Partial triangular ordering in a non-step region at $\theta = 36^\circ.$ \label{imagefig3} } \end{figure} To better characterize the different vortex structures in the locking regimes, in figure 3(a) we plot the vortex positions on the $(0,0)$ step for the system in figure 2, and in figure 3(b) we show the corresponding $S(k)$. Here the particles are moving in one-dimensional channels along the pinning rows in the $x$-direction. $S(k)$ has smectic features with well spaced peaks along the $k_y$-axis indicating that periodic spacing of the particles along the $y$ direction is induced by the underlying rows of pinning. Particles in adjacent rows can slip past each other along the $x$ direction. In this regime, $P_{6} = 0.8$ due to the formation of aligned dislocations between adjacent rows. Similar smectic ordering has previously been observed for vortices moving over random pinning arrays \cite{Moon,GiamarchiA,Pardo,Fangohr} and is associated with a transverse depinning barrier \cite{Moon,GiamarchiA,Fangohr2}. For vortices moving over pinning arrays with driving applied only in the $x$-direction, moving smectic phases are also possible at finite temperature \cite{Zimanyi,GC}. In figure 3(a), the smectic ordering occurs when all the vortices are confined to move only along the pinning rows and not between the rows of pinning. Since $B/B_{\phi} > 1.0$, this means that the vortex lattice spacing in the $x$ direction along the pinning rows must be smaller than the lattice spacing in the $y$ direction transverse to the pinning rows, resulting in an effectively anisotropic interaction between the vortices. Additionally, certain moving channels may contain more vortices than other moving channels, creating dislocations in the vortex lattice. Along the $(1,1)$ step, the system has a smectic ordering similar to that shown in figure~3(a,b) but tilted by $30^\circ$ with respect to the $x$ axis. Figure~3(c,d) illustrates the vortex positions and $S(k)$ on the $(1,2)$ locking step. In this case the vortex lattice has square symmetry with some disordered regions which produce some smearing in $S(k)$. The formation of the square ordering is what causes the drop in $P_{6}$ on the $(1,2)$ step shown in figure~2(b). The Voronoi construction we use to determine the particle coordination numbers $z_i$ can accurately identify triangular ordering but is not well suited for measuring slightly disordered square ordering such as that found on the $(1,2)$ step. As a result, $P_{6}$ shows large fluctuations on the $(1,2)$ step even though the $S(k)$ measurement indicates the presence of a consistent square ordering throughout the step. In figure~3(e,f) we show the vortex positions and $S(k)$ for $\theta = 36^\circ$, a non-step region with $P_{6} = 0.95$. The system has triangular ordering as indicated by the sixfold peaks in $S(k)$. Typically the vortex channeling effect is lost in the non-step regions. For sufficiently weak pinning the vortex-vortex interactions dominate over the vortex-pin interactions and the vortices form a mildly disordered triangular lattice, resulting in large values of $P_{6}$. Figure~2(a) shows a prominent $(1,0)$ locking step at $\theta = 60^\circ$. Along the step, $V_{y}$ decreases with increasing $\theta$ until at $\theta =70.1^\circ$ there is a sharp jump up in $V_{y}$ along with a sharp jump down in $V_x$ at the end of the locking step. This shows that directional locking can induce {\it negative differential conductivity}, where the driven particles actually move more slowly in the direction of drive when the external driving force is increased. Negative differential conductivity has been observed in simulations and experiments for vortices driven in a fixed direction over periodic pinning arrays \cite{Reichhardt,Xiao}. The negative differential conductivity effect which we observe here for triangular pinning did not appear in previous simulations which considered only square pinning \cite{Nori}. More recently a study with two crossed channels showed that a phase locking state could be realized that has velocity-force curves very similar to those in figure~2(a) and that also exhibits negative differential conductivity \cite{L}. \begin{figure} \includegraphics[width=3.5in]{Fig4.ps} \caption{ The vortex positions (a,c,e) and corresponding $S(k)$ (b,d,f) for the triangular pinning system in figure~2. (a,b) The smectic structure on the $(1,0)$ step. (c,d) An anisotropic liquid at the transition out of the $(1,0)$ step. (e,f) A distorted square lattice at the locking regime for $\theta=90^\circ$ \label{imagefig4} } \end{figure} In figure 2(b), the $(1,0)$ locking step has dips in $P_{6}$ at the start and end of the step, while along the step $P_{6} = 0.945$. The dips are caused by the sudden disordering of the particles at the transition into and out of the locked regime, and are associated with a strongly anisotropic vortex lattice structure. In figure~4(a,b) we show the particle positions and $S(k)$ for $\theta = 60^\circ$ on the $(1,0)$ step. The particles again form one-dimensional channels and move along the pinning rows. There are some dislocations present in the vortex lattice which result in smectic ordering; however, there is a considerably larger amount of ordering in the direction transverse to the locking direction than along the locking direction, causing the amount of smearing in $S(k)$ to be less than that observed for the $(0,0)$ step. Figure~4(c,d) illustrates the system at the dip in $P_{6}$ right at the end of the $(1,0)$ locking step. The lattice structure is disordered, producing a ringlike structure in $S(k)$. Smeared sixfold peaks remain visible in $S(k)$ due to the anisotropic nature of the liquidlike structure. Figure~2(a) shows that the $(3,0)$ locking step is accompanied by a strong dip in $P_{6}$. Along this step a square vortex lattice forms which is similar to the one illustrated for the $(1,2)$ locking step in figure 3(c,d). There is another locking region centred at $\theta=90^\circ$ where $V_{x} = 0.0$ and $V_{y}$ shows a cusp feature. Along this step $P_{6} = 0.78$, and figure~4(e,f) shows that a distorted square lattice appears. As $\theta$ increases above $\theta=90^\circ$, the system cycles back through the same transitions. \begin{figure} \includegraphics[width=3.5in]{Fig5.ps} \caption{ (a) Vortex velocities $V_{y}$ vs $\theta$ for a triangular pinning array with $F_{p} = 1.85$ at $B/B_{\phi} = 0.852$, 1.26, 1.5, 2.0, 2.78, and $4.07$, from bottom right to top right. The velocities are normalized by $B_{\phi}$. (b) A blowup of panel (a) in the region near the $(0,0)$ step showing that the width of the $(0,0)$ step decreases to zero at $B/B_{\phi} = 2.0$ and increases again for $B/B_{\phi} = 4.07$ \label{Fig5} } \end{figure} \section{Density Dependence and Dynamic Commensuration Effects} We next consider the effect of particle density on the directional locking. In figure~5(a) we plot $V_{y}$ for the same triangular pinning system from figure 2 with $F_p=1.85$ for different vortex densities $B/B_{\phi} = 0.852$, 1.26, 1.5, 2.0, 2.78, and $4.07$. As the vortex density increases, the smaller steps become narrower and more difficult to resolve; however, the steps at $(0,0)$, $(1,1)$, $(1,0)$, and $\theta=90^\circ$ remain clearly visible. Different steps respond differently to changes in $\theta$. For example, for $B/B_{\phi} < 2.0$ the $(0,0)$ and $(1,0)$ steps are present but at $B/B_{\phi} = 2.0$ these steps are lost. In contrast, the step at $(1,1)$ is present at all the values of $B/B_\phi$. The $(0,0)$ and $(1,0)$ steps reappear for $B/B_{\phi} \ge 2.78$ and grow in width with increasing vortex density up to $B/B_{\phi} = 4.07$. Figure~5(b) shows a blowup of the region around the $(0,0)$ step indicating that at $B/B_{\phi} = 2.0$ the width of the $(0,0)$ step drops to zero but that at $B/B_{\phi} = 4.07$ the step reappears, producing a crossing in the $V_y$ versus $\theta$ curves. In figure 6 we plot the width $F_c^{Tr}$ of the $(0,0)$ step versus $B/B_\phi$, where $F_c^{Tr}$ is defined as $F_c^{Tr}=A\cos(\theta)$, the $y$ component of the force at which the step disappears. For low $B/B_\phi$, $F_c^{Tr}$ is large since the system is in the single particle limit when the vortex-vortex interactions are weak. As $B/B_{\phi}$ increases, $F_{c}^{Tr}$ deceases until it reaches a local minimum at $B/B_\phi=0.75$. This is followed by a local maximum in $F_c^{Tr}$ at $B/B_{\phi} = 1.4$, after which $F_{c}^{Tr}$ decreases nearly to zero for $1.8 < B/B_{\phi} < 2.4$. A broad maximum in $F_c^{Tr}$ appears for $3.0 < B/B_{\phi} < 5.5$ before $F_{c}^{Tr}$ drops again at higher $B/B_\phi$. This nonmonotonic behaviour of $F_c^{Tr}$ contrasts with the critical depinning force observed in a system with random pinning, which monotonically decreases to a saturation level with increasing vortex density. In recent studies of directional locking for vortices moving over quasicrystalline pinning arrays \cite{OlsonA}, a nonmonotonic behaviour of the width of the first locking step was observed as a function of $B/B_{\phi}$. In the quasicrystalline case, the width of the step never drops completely to zero; however, a broad local minimum occurs at $B/B_{\phi} =1.6$ and a broad peak appears for $ 1.6 < B/B_{\phi} < 4.0$, similar to the features shown in figure~6. \begin{figure} \includegraphics[width=3.5in]{Fig6.ps} \caption{ The width $F_c^{Tr}$ of the $(0,0)$ step vs $B/B_{\phi}$ for the system in figure 5 with triangular pinning. The width is defined as the force component in the $y$-direction, $F_{c}^{Tr}=A\cos(\theta)$. A series of minima and maxima appear that are not simply related to the commensuration effects expected at integer multiples of $B/B_{\phi}$. \label{Fig6} } \end{figure} \begin{figure} \includegraphics[width=3.5in]{Fig7.ps} \caption{ The vortex positions (a,c,e,g) and corresponding $S(k)$ (b,d,f,h) for the triangular pinning system from figure 6 with $F_{p} = 1.85$ along the $(0,0)$ step. (a,b) $B/B_{\phi} = 0.74$. (c,d) $B/B_{\phi} = 2.037$. (e,f) $B/B_{\phi} = 4.074$. (g,h) $B/B_{\phi} = 5.92$. \label{Fig.7} } \end{figure} In figure~7 we illustrate the vortex positions and $S(k)$ at different vortex densities for the system in figure~6 along the $(0,0)$ step. At $B/B_\phi=0.74$, figure~7(a) shows that a disordered triangular lattice forms. For lower fillings $B/B_\phi<0.74$, the ordering becomes more smectic-like as the vortex-vortex interactions are reduced in strength. Smectic ordering also appears close to the peak in $F_c^{Tr}$ at $B/B_{\phi} = 1.5$, as shown in figure~3(a,b). In the region where $F_c^{Tr}$ drops to zero, the lattice is disordered and $S(k)$ has a ringlike structure, as shown in figure~7(c,d) for $B/B_{\phi} = 2.037$. There is a tendency for some vortices to form stripe-like structures aligned with the $x$ direction, generating weak peaks in $S(k)$ along the $k_y$-axis and making the liquidlike structure anisotropic. At $B/B_{\phi} = 4.074$, near the middle of the broad peak in $F_{c}^{Tr}$ in figure 6, figure~7(e,f) indicates that the lattice has smectic ordering, while at $B/B_{\phi} = 5.92$ where $F_{c}^{Tr}$ drops again, figure~7(g,h) shows that the lattice is disordered with some partial $x$ direction alignment. For $3.8 < B/B_{\phi} < 5.0$ the vortex lattice has smectic structure while at vortex densities where $F_c^{Tr}$ is low or zero, the vortex lattice is disordered or nematic. In recent work on the directional locking of vortices moving over quasicrystalline arrays, for values of $B/B_\phi$ where $F_c^{Tr}$ is enhanced, the vortices have smectic ordering, while for higher $B/B_{\phi}$ where the value of $F_{c}^{Tr}$ drops, the system becomes partially disordered \cite{Olson}. This is very similar to what we observe for the triangular pinning arrays, as shown in figure~6. In the quasicrystalline array system, square vortex lattices form at fillings where $F_{c}^{Tr}$ passes through a local minimum but remains finite. At the local minimum in $F_c^{Tr}$ that we observe in figure 6 at $B/B_{\phi} = 0.74$, the vortex lattice is not square but it does have a distorted triangular ordering, as shown in figure 7(a,b). We note that the dynamical ordering which occurs just above a critical transverse depinning force differs from the dynamical structure that forms just above the longitudinal depinning force. In the case of the transverse depinning, the vortices are already moving and may form a dynamically ordered configuration even before transverse depinning occurs. In contrast, for the longitudinal depinning, the vortices start from a pinned state. For longitudinal depinning, peaks in the critical current occur at matching fields $B/B_{\phi} = n$ and fractional matching fields $m/n$, where $m$ and $n$ are integers \cite{Harada,Commensurate,Peeters,Baret}. Figure~6 shows that the peaks in the transverse critical current $F_{c}^{Tr}$ do not fall at integer matching fields or fractional matching fields, so the local maxima and minima must arise due to some other type of commensuration effect and not due to simple matching between the number of vortices and the number of pinning sites. \begin{figure} \includegraphics[width=3.5in]{Fig8.ps} \caption{ $V_{y}$ vs $\theta$ for the triangular pinning system in figure~5 showing a comparison between the low density, single particle behaviour limit $B/B_{\phi}=0.037$ (lower line) and the high density, strongly collective behaviour at $B/B_{\phi} = 4.07$ (upper line). In the noninteracting limit the particles jump directly from one locking step to another and show no unlocked phases. \label{Fig.8} } \end{figure} At low vortex densities the system acts in the single particle limit and the vortices jump from one locking step to another with no unlocked regions between the steps. At higher densities, unlocked regions of disordered collective flow appear between the steps. A comparison between the low and high density behaviour appears in figure 8, which shows $V_y$ versus $\theta$ for $B/B_{\phi}= 0.037$ and $B/B_{\phi} = 4.07$. In the unlocked regions, the vortex-vortex interactions are strong enough to permit the vortices to form a triangular lattice. It is the strong vortex-vortex interactions that destroy the higher order steps at the higher densities. \begin{figure} \includegraphics[width=3.5in]{Fig9.ps} \caption{ The positions of the pinning sites (large open circles) and vortices (small filled circles) in a portion of the sample for a triangular pinning array along the $(0,0)$ step for the system in figure~6. (a) $B/B_{\phi} = 1.5$. The dashed lines indicate the motion of the vortices in one-dimensional channels aligned with the pinning rows. (b) $B/B_{\phi} = 2.037$, a filling at which $F_c^{Tr}=0$ in figure~6. Here the one-dimensional channel structure shown in panel (a) is lost. (c) $B/B_{\phi} = 4.07$, where there are one-dimensional channels of motion both along and between the pinning sites, as indicated by the dashed lines. (d) $B/B_{\phi} = 5.93$, where $F_c^{Tr}$ is small. The one-dimensional channel structures are lost. \label{Fig.9} } \end{figure} In studies of vortex matter confined to narrow channels, the critical current or depinning force oscillates as a function of vortex density depending on how many rows of vortices can fit inside the channel \cite{Kes,Karapetrov}. More recent studies of two-dimensional periodic pinning arrays show a dynamical commensuration effect that occurs in the limit where the vortices at the pinning sites remain pinned but the number of interstitial vortices flowing through interstitial regions increases with $B/B_\phi$ \cite{Transverse}. In this case the transverse depinning force $F^{Tr}_{c}$ exhibits local minima and maxima as a function of $B/B_{\phi}$. At each local maximum, an integer number $n$ of vortex rows fit between the pinned vortices and the vortex trajectories are highly ordered. As long as this integer number of rows can be maintained, $F^{Tr}_{c}$ remains high, but eventually a buckling instability occurs and produces a disordered moving vortex structure which has a low $F^{Tr}_c$. As $B/B_\phi$ increases further, a new ordered vortex state with $n+1$ rows of moving vortices forms and $F^{Tr}_c$ increases again. The oscillations in $F_{c}^{Tr}$ shown in figure~6 are very similar in nature to this effect; however, a key difference is that there are no pinned vortices in the rotating drive system. Along the $(0,0)$ step, all of the vortices are moving and some of the vortices are sliding over rows of pinning sites. The remaining vortices slide through the interstitial regions between rows of pinning sites. When an integer number of interstitial sliding rows fits between adjacent rows of vortices sliding over the pinning sites, the structure of the vortex lattice is smectic and there is a local maximum in $F_c^{Tr}$. At other values of $B/B_\phi$ where an integer number of interstitial sliding rows is unable to form, the vortex lattice is more disordered and $F_c^{Tr}$ is low or zero. We illustrate this effect in figure 9 where we show the locations of the vortices and pinning sites for different values of $B/B_\phi$ on the $(0,0)$ step. Near the local maximum in $F_c^{Tr}$ at $B/B_\phi=1.5$, figure 9(a) indicates that the vortices flow in one-dimensional channels along the pinning rows and that there are no vortices flowing in the interstitial regions between rows of pinning. At $B/B_{\phi} = 2.037$, figure~9(b) shows that the vortices are no longer aligned with the pinning rows and that some vortices are flowing through the interstitial regions. Near another local maximum in $F_c^{Tr}$ at $B/B_{\phi} = 4.07$, we show in figure 9(c) that all of the vortices are flowing in one-dimensional rows and that half of the rows pass through pinning sites while the other half of the rows pass through interstitial regions. At $B/B_{\phi} = 5.93$, near a local minimum in $F_c^{Tr}$, figure 9(d) illustrates that the one-dimensional channel structure is lost. We expect that for even higher values of $B/B_{\phi}$, additional local maxima in $F_c^{Tr}$ will occur for fields at which two, three, or higher integer numbers of rows of vortices can be accommodated in the interstitial regions. This same mechanism of the formation of integer numbers of ordered one-dimensional flowing channels also produces the local minima and maxima in the transverse critical force $F^{Tr}_{c}$ found for quasicrystalline pinning arrays in \cite{OlsonA}. In the quasicrystalline system, the existence of orientational order is sufficient to permit the formation of ordered channels of flow, and translational order is not required. Systems with random pinning substrates exhibit no oscillations in $F^{Tr}_{c}$ as a function of field since these substrates lack long-range orientational order. We thus expect that any periodic or quasiperiodic pinning substrate which has orientational order will produce oscillations in the transverse depinning force as a function of particle density. Similar oscillations of the widths of the higher order locking steps with increasing field should also occur; however, since the spacing between the one-dimensional channels of particles flowing along the pinning sites will vary from step to step, the particle densities at which the local minima or maxima in step width occur may be different than the densities at which maxima and minima of $F_c^{Tr}$ for the $(0,0)$ step occur. \begin{figure} \includegraphics[width=3.5in]{Fig10.ps} \caption{ (a) $V_{y}$ vs $\theta$ for a sample with a square pinning array at $F_{p} = 1.5$ for $B/B_{\phi} = 0.2$, $1.5$, and $4.0$ (from bottom to top). Locking steps occur at $\theta = \tan^{-1}(m/n)$ where $m$ and $n$ are integers. The steps at $(m,n)$= (0,1), (1,3), (1,2), (1,1), (2,1), (3,1), and (1,0) are marked The $B/B_\phi=0.2$ and $B/B_\phi=1.5$ curves have been shifted up for clarity. (b) The width of the first step given by $F_c^{Tr}$, the value of the force component in the $y$ direction, vs $B/B_{\phi}$ for the same system. \label{Fig10} } \end{figure} \begin{figure} \includegraphics[width=3.5in]{Fig11.ps} \caption{ The vortex positions (a,c) and corresponding $S(k)$ (b,d) for the square pinning system from figure 10 with $F_p=1.5$ at $B/B_{\phi} = 1.5$. (a,b) The $(0,1)$ step. (c,d) The $(1,2)$ step. \label{Fig11} } \end{figure} \section{Square Pinning Array} The same general behaviour found for the triangular pinning array also occurs for vortices moving over square pinning arrays. In figure~10(a) we plot $V_{y}$ versus drive angle $\theta$ for a sample containing a square pinning array with $F_{p} = 1.5$ for $B/B_{\phi} = 0.2$, 1.5, and $4.0$. In the square array, locking steps appear when $\theta = \tan^{-1}(m/n)$ with $m$ and $n$ integers, and in the figure we highlight steps with $(m,n)$= (0,1), (1,3), (1,2), (1,1), (2,1), (3,1), and (1,0). The most prominent steps fall at (0,1) for $\theta=0^\circ$ and (1,1) for $\theta=45^\circ$. At $B/B_{\phi} = 4.0$, many of the higher order steps are very small or or missing and the (1,1) step is much reduced in size while the (1,2) and (2,1) steps remain prominent. In figure~10(b) we plot the width of the (0,1) step $F_{c}^{Tr}$ vs $B/B_{\phi}$. The behaviour of $F_c^{Tr}$ is very similar to that shown for the triangular pinning array in figure 6. For the square array, local minima in $F_c^{Tr}$ appear at $B/B_{\phi} = 0.6$, 2.0, and $5.5$. At the local maxima of $F_c^{Tr}$, we find the same one-dimensional channeling effects described in the previous section for the triangular pinning arrays. The structure of the vortex lattice on the steps in the square pinning array system is also similar to that found for the triangular arrays, as illustrated in figure 11. For example, a smectic structure appears at $B/B_\phi=1.5$ on the (0,1) step, shown in figure 11(a,b). One distinction is that the square pinning array system shows a much larger number of locking steps where the vortices form a square moving lattice structure, such as that illustrated for the (1,2) step at $B/B_\phi=1.5$ in figure 11(c,d). \section{Substrate Strength and Different Locking Regimes} We next consider the effect of substrate strength on the locking regimes for a system with a triangular pinning lattice at fixed $B/B_\phi=1.11$. In figure~12 we plot $V_{y}$ versus $\theta$ for samples with $F_{p} = 0.25$, 0.5, 1.0, and 1.5. The step widths grow with increasing $F_{p}$. A similar effect was observed for locking on square pinning arrays in previous work \cite{Nori}. As the substrate strength becomes very large, we observe a new phenomenon where the locking effects become reduced. The plot of $V_y$ versus $\theta$ for $F_p=2.35$ in figure~13(a) shows that although the $(0,0)$ and the $(1,0)$ locking steps are present, all of the remaining steps are gone and are replaced by a strongly fluctuating regime. Some directional guidance effects still occur within this strongly fluctuating regime, as shown by the dip in $V_y$ appearing at $\theta=90^\circ$ and the shoulder feature near $\theta = 36^{\circ}$. In the non-step regions, the flow is strongly disordered. The trajectories of the particles do not fall into ordered channels but mix strongly, and vortices become pinned and depinned at random. Although ordered flow occurs along the $(0,0)$ and $(1,0)$ steps, it differs from the ordered flow found at the lower pinning forces shown in figure~12. We find that collective effects between the particles begin to dominate the behaviour once $F_{p} > 2.0$. In a system with a vortex density low enough to fall into the single particle behaviour limit, all of the vortices are immobilized for $F_p>2.0$ since the pinning strength exceeds the magnitude of the driving force, $F_p>A$. For all of the values of $F_p$ shown in figure 12, we have $F_p<A$ and there are no pinned vortices; instead, all of the vortices flow along or between the pinning sites. On the locking steps at $F_{p} = 2.35$, motion occurs in the form of a pulse of depinned vortices which passes through a background of pinned vortices. Each vortex spends part of the time pinned and part of the time moving, and there are always some pinned vortices present, but the identity of the the pinned vortices is constantly changing. This is why $V_{y}$ along the $(1,0)$ step for $F_p=2.35$ is nearly a factor of 3 lower than $V_y$ along the (1,0) step for $F_p=1.5$, where the vortices move continuously and are never pinned. A similar soliton or incommensurate flow of vortices along rows of pinning sites has been observed previously for vortices driven along a single principle axis of periodic pinning arrays \cite{Commensurate}. Additionally, a transition from a higher velocity random or turbulent type of vortex flow to a lower velocity flow state with smaller fluctuations was also observed in Ref.~\cite{Commensurate}, a feature which resembles the transition in and out of the (1,0) step in figure 13(a). We find a very pronounced jump up in $V_{y}$ at the end of each of the two locking steps which is correlated with a sudden jump in $V_{x}$ (not shown). \begin{figure} \includegraphics[width=3.5in]{Fig12.ps} \caption{ $V_{y}$ vs $\theta$ for a triangular pinning array at $B/B_{\phi} = 1.11$ for different substrate strengths $F_{p} = 0.25$, 0.5, 1.0, and 1.5, from top to bottom. Here the step widths grow with increasing $F_{p}$. \label{Fig12} } \end{figure} Figure 13(b) shows that for $F_{p} = 2.5$, all the steps are gone and the flow is always in the strongly fluctuating regime. The former steps are replaced with local minima in $V_y$ at the angles where the $(0,1)$, $(1,1)$, $(1,0)$, and $\theta=90^{\circ}$ locking steps would have occured, indicating that there is still a guidance effect from the substrate but not complete locking of the vortex motion. At $F_{p} = 2.75$ in figure 13(c), the (0,0), (1,1), and $\theta=90^{\circ}$ locking steps reappear and a dip in $V_y$ persists at $\theta=60^{\circ}$ where the (1,0) step would have been. For $F_{p} = 2.75$, figure 13(d) shows that the (0,1), (1,2), (1,1), (2,1), and $\theta=90^{\circ}$ steps are now all restored, while between the steps the flow enters a rapidly fluctuating phase in which $V_y$ is significantly enhanced. In figure 13(d), along a given locking step $V_y$ is not constant but has a curved shape and decreases noticeably just before the end of each step. The vortex flow on the steps occurs in the form of an incommensurate or solitonlike pulse of depinned vortices which passes through a background of pinned vortices. For $F_{p} > 2.9$, the vortices transition directly from one locking step to the next locking step and there are no longer regions of random flow between the steps, as illustrated in figure 14 for a sample with $F_p=3.0$ that exhibits a rich variety of locking steps. As $F_{p}$ increases further, the $V_{y}$ versus $\theta$ curves retain the shape shown in figure 14 with small shifts in the steps until $F_{p} \ge 3.9$, at which point all the vortices become pinned for all $\theta$. \begin{figure} \includegraphics[width=3.5in]{Fig13.ps} \caption{ $V_{y}$ vs $\theta$ for the sample from figure 12 with a triangular pinning array at $B/B_{\phi} = 1.11$. (a) $F_{p} = 2.35$. There are only two locking regions separated by strongly fluctuating regions where some guided motion of the particles occurs. (b) $F_{p} = 2.5$. The locking regions are almost completely absent. (c) $F_{p} = 2.75$. Several locking regions reappear. (d) $F_{p} = 2.85$. There are a larger number of locking steps intermixed with randomly fluctuating regions. \label{Fig13} } \end{figure} \begin{figure} \includegraphics[width=3.5in]{Fig14.ps} \caption{ $V_{y}$ vs $\theta$ for a triangular pinning array at $B/B_{\phi} = 1.11$ with $F_{p} = 3.0$. The random fluctuating regimes are lost and the system passes directly from one locking phase to the next. \label{Fig14} } \end{figure} \begin{figure} \includegraphics[width=3.5in]{Fig15.ps} \caption{ The positions of the pinning sites (large open circles) and vortices (small filled circles) as well as vortex trajectories over a fixed time interval (lines) in a portion of a sample with a triangular pinning array on the (1,1) locking step at $\theta=30^\circ$. (a) In the weak pinning regime at $F_{p} = 1.75$, an ordered flow occurs with all the vortices moving along the $\theta=30^\circ$ direction. (b) In the strong pinning regime at $F_{p} = 2.75$, a portion of the vortices are pinned and the flow occurs by a pulse motion or flowing kink. (c) At $F_{p} = 2.75$ for $\theta = 15^\circ$, a non-locking fluctuating flow phase occurs. \label{Fig15} } \end{figure} \begin{figure} \includegraphics[width=3.5in]{Fig16.ps} \caption{ The dynamic phase diagram of $\theta$ vs $F_{p}$ for a sample with a triangular pinning array at $B/B_{\phi} = 1.11$. The regions in which the (0,1), (1,1), (1,0), and $90^{\circ}$ locking steps appear are marked. The left side of the diagram at lower $F_p$ is the weak pinning regime. Near $F_{p} = 2.5$ a large portion of the vortex dynamics falls in the random fluctuating phase rather than on locking steps. In the strong pinning regime the second type of locking steps appear. For $F_{p} \ge 3.9$ all the vortices are pinned. \label{Fig16} } \end{figure} To demonstrate the differences in the flow for samples with strong and weak pinning, in figure~15(a,b) we plot the vortex trajectories on the (1,1) locking step at $\theta=30^\circ$ over a fixed time interval. For $F_{p} = 1.75$, figure 15(a) shows that all the vortices move along one-dimensional paths oriented along the $\theta=30^\circ$ driving direction. For $F_{p} = 2.75$ in figure 15(b), only a portion of the vortices move in one-dimensional paths along the pinning rows while the remaining vortices are pinned. Figure~15(c) shows that in the $F_{p} = 2.75$ sample at $\theta = 15^\circ$, a fluctuating flow phase occurs and there is no longer any one-dimensional channeling of the vortex motion. For samples with strong substrates, along the locking steps the vortices generally exhibit a triangular structure since a large portion of the vortices are trapped by the pinning sites, so the large scale structural transitions found for samples with weak substrates are lost. By conducting a series of simulations for varied $F_{p}$ we map the transition between the strong and weak substrate regimes, as shown in figure 16 where we highlight the widths of the (0,1), (1,1), (1,0), and $\theta=90^\circ$ locking steps. The (0,1) step increases in width with increasing $F_p$ up to $F_{p} = 2.45$, after which the step vanishes. This denotes the transition from the weak pinning locking regime to the random fluctuating phase. For $F_{p} > 2.55$ the (0,1) step reappears in the strong pinning regime and its width saturates for $F_{p} > 3.0$. The higher order steps also show similar features with the step widths diminishing to zero at $F_{p} = 0.0$ and the steps vanishing close to $F_{p} = 2.5$. There are also many other higher order steps not shown in figure~16 which in general have similar behaviour. \begin{figure} \includegraphics[width=3.5in]{Fig17.ps} \caption{ (a) The width $\Delta\theta$ of the $(1,0)$ locking phase from figure 16 vs $F_{p}$. (b) The corresponding fraction of six-fold coordinated particles $P_{6}$ has a dip in the random fluctuating phase which separates the weak and strong pinning regimes. \label{Fig17} } \end{figure} \begin{figure} \includegraphics[width=3.5in]{Fig18.ps} \caption{ (a) The average velocity $V_y$ vs $F_{p}$ for the system in figure 16 at $\theta = 90^{\circ}$ (upper curve) and $\theta = 30^{\circ}$ (lower curve) showing that in the strong pinning regime the particle velocity saturates. (b) A scaling collapse of the same curves near the crossover at $F_c^p$ from the weak pinning to the strong pinning regime. The line is a fit to $V_{y} - V^{c}_{y} \propto (F_{p} - F_{c}^p)^{\alpha}$ with $\alpha=1/3$, where $V^{c}_{y}$ is the value of the $V_y$ in the strong pinning regime. \label{Fig18} } \end{figure} In figure~17 we show that the crossover from the weak pinning to the strong pinning regime can also be identified by measuring $P_6$ versus $F_p$. We plot the width $\Delta\theta$ of the (1,0) step from figure 16 in figure 17(a), and show the corresponding $P_6$ in figure 17(b). At $F_{p} = 0.0$, $P_{6} = 1.0$, and $P_6$ generally decreases with increasing $F_p$ as more dislocations enter the system in the moving smectic phase until reaching $P_{6} = 0.7$ at $F_{p} =2.4$. There is then a dip in $P_{6}$ at $F_p=2.5$ where the step width $\Delta\theta$ drops to zero. For $F_p>2.5$, $P_{6}$ increases with increasing $F_p$ until reaching $P_6=0.67$ when the system enters the strongly pinned regime and a large portion of the vortices become pinned in the triangular substrate, increasing the amount of sixfold ordering present. It is also possible to detect the crossover between the weak and strong pinning regimes using the average velocity in the $y$-direction $V_{y}$ versus $F_{p}$ for a given $\theta$, as shown in Figure~18(a) for $\theta = 90^\circ$ and $\theta = 30^\circ$. At $F_{p} = 0.0$ the values of the velocities are simply $V_y=A\sin(30^\circ) = 1.0$ and $V_y=A\sin(90^\circ) = A = 2.0$. As $F_{p}$ increases, $V_{y}$ monotonically decreases until just above $F_{p} = 2.5$ which marks the crossover to the strong pinning regime in which $V_{y}$ remains constant for increasing $F_{p}$. The decrease in $V_y$ in the weak pinning regime can be fit to the functional form $V_{y} - V^{c}_{y} \propto (F_{p} - F^p_{c})^{\alpha}$, where $V^{c}_{y}$ is the saturation value of the velocity in the strong pinning regime and $F^p_{c}$ is the critical value of the pinning force at which the system enters the strong pinning regime, identified as the value of $F_p$ above which $V_y$ becomes constant. In figure~18(b) we show this scaling with $V_y$ normalized by $\sin(\theta)$. Here the $\theta=30^\circ$ and $\theta=90^\circ$ curves collapse on each other and the solid line indicates a fit with $\alpha = 1/3$. The behaviour of the $V_{y}$ curves varies on different sets of locking steps, so a straightforward scaling such as that shown in figure~18(b) is not always possible. For example, in figure~19 we plot $V_{y}$ versus $F_{p}$ on the $(1,0)$ step as well as for a driving angle of $\theta=17^\circ$. In both cases $V_{y}$ decreases with increasing $F_{p}$ for $F_{p} < 2.5$. For $\theta = 17^\circ$, $V_y$ drops to zero within the weak pinning regime when the (0,1) step widens to include this driving angle and the vortices move in one-dimensional channels that are aligned with the $x$ axis. Near $F_{p} = 2.5$, $V_y$ for both driving angles passes through a local maximum when the system enters the random fluctuating flow regime. At $F_{p} = 2.85$ for $\theta=60^\circ$, the $(1,0)$ step reappears in the strong pinning regime, where $V_{y}$ remains constant. Similarly for $\theta=17^\circ$ $V_y$ saturates to a nearly constant value in the strong pinning regime. \begin{figure} \includegraphics[width=3.5in]{Fig19.ps} \caption{ The average velocity $V_y$ vs $F_{p}$ for the system in figure~16 at $\theta = 60^\circ$ on the $(1,0)$ step (upper curve) and at $\theta = 17^\circ$ (lower curve). Here a local maximum in $V_y$ occurs in the random fluctuating regime which separates the weak and strong pinning regimes. \label{Fig19} } \end{figure} \begin{figure} \includegraphics[width=3.5in]{Fig20.ps} \caption{ $V_{y}$ vs $\theta$ for a triangular pinning array with $F_{p} = 3.75$ at $B/B_{\phi} = 1.11$, 1.48, 1.852, 2.407, 2.78, 3.148, 4.0, and $4.78$, from bottom to top. \label{Fig20} } \end{figure} \begin{figure} \includegraphics[width=3.5in]{Fig21.ps} \caption{ The width $F_c^{Tr}$ of the (0,0) step expressed in terms of the $y$ component of the driving force at the end of the step vs $B/B_{\phi}$ for the triangular pinning system from figure 20. \label{Fig21} } \end{figure} We next consider the effects of changing $B/B_{\phi}$ on the behaviour in the strong pinning regime. In figure 20 we plot $V_{y}$ versus $\theta$ for a triangular pinning system with $F_{p} = 3.75$ at $B/B_{\phi} = 1.11$, 1.48, 1.852, 2.407, 2.78, 3.148, 4.0, and $4.78$. The system is pinned at all $\theta$ for $B/B_{\phi} < 1.0$. For all of the fillings shown in figure 20, strong locking effects occur, and the widths of some of the locking steps vary with $B/B_\phi$. For $B/B_{\phi} > 2.78$ the (1,0) locking step shows increased curvature and regions of negative differential conductivity appear near $\theta = 38^\circ$, $68^\circ$, and $ 78^\circ$, while there is a dome like feature on the $\theta=90^\circ$ locking step. At some values of $B/B_\phi$, a series of smaller locking steps appear, but these small steps disappear for larger values of $B/B_\phi$. In general, all of the smaller steps are washed out for increasing $B/B_{\phi}$. In figure~21 we plot the width $F_c^{Tr}$ of the (0,0) step versus $B/B_{\phi}$ for the strong pinning regime sample from figure 20. The broad features of the curve are similar to the behaviour of $F_c^{Tr}$ in the weak pinning regime that was shown in figure 6. There are several local minima and maxima in $F_c^{Tr}$ and a broad maximum in the range $ 3.5 < B/B_{\phi} < 5.5$, as well as another local maximum near $B/B_{\phi} = 2.4$. As in the weak pinning regime, for the strong pinning regime the maxima in $F_c^{Tr}$ are not centred at integer matching fields. Unlike the weak pinning regime, however, there are no fillings at which $F_c^{Tr}$ drops to zero. We also observe sharp and narrow peaks at $B/B_{\phi} = 4/3$ and $B/B_\phi=5/3$, while no comparably sharp peaks in $F_c^{Tr}$ occured in the weak pinning regime. Longitudinal depinning studies performed for vortices moving over triangular pinning arrays have demonstrated enhanced pinning at fractional matching fields such as $B/B_\phi=1/3$, $B/B_\phi=2/3$, and higher order multiples where the vortices can form submatching configurations with triangular ordering \cite{Jensen}. The vortex flow on the (0,0) step for $B/B_{\phi} < 2.5$ occurs via the same flow of incommensurations along the pinning sites that was illustrated in figure 15(b), and the peaks in $F_c^{Tr}$ at $B/B_\phi=4/3$ and $B/B_\phi=5/3$ correspond to fillings at which the moving incommensurations can form a triangular ordering. We expect that for a square pinning lattice in the strong pinning regime, peaks in the width of the first step would occur at $B/B_\phi=3/2$, $5/4$, and $7/4$. In figure 21 for $B/B_{\phi} > 2.5$, a portion of the vortices begin to flow in the interstitial regions, which may prevent the formation of higher order fractional matching peaks. \begin{figure} \includegraphics[width=3.5in]{Fig22.ps} \caption{ $V_{x}$ (dark line) and $V_{y}$ (light lines) vs $\theta$ for a sample with a square pinning array at $B/B_{\phi} = 1.11$. (a) At $F_{p} = 2.25$, only two locking steps are present which are separated by a random fluctuating phase. (b) At $F_{p} = 2.5$ the $(1,1)$ locking step appears. (c) At $F_{p} = 2.75$ we find a mixture of locking steps and randomly fluctuating phases. (d) At $F_{p} = 3.75$ the system transitions directly from one locking step to another with no randomly fluctuating regimes. \label{Fig22} } \end{figure} We find the same transition from a weak pinning regime to a strong pinning regime for square pinning arrays. In figure 22(a) we plot $V_{x}$ and $V_{y}$ versus $\theta$ for a sample with square pinning at $F_{p} = 2.25$ and $B/B_{\phi} = 1.11$, where locking steps and randomly fluctuating phases appear. On the (0,1) and (1,0) locking steps, the vortices all flow along rows or columns of pinning sites. At $\theta=45^\circ$ where the (1,1) step should appear, we find no step but instead both $V_x$ and $V_y$ pass through a local minimum. There are also some weak locking shoulder features in $V_{x}$ and $V_{y}$ near $\theta=26^\circ$ and $\theta=65^\circ$. Even though $F_y$ reaches its maximum cycle value at $\theta=90^\circ$, $V_y$ sits in a local minimum at this driving angle. For $F_{p} = 2.5$ shown in figure 22(b), the $(0,1)$ and $(1,0)$ steps have almost completely disappeared; however, there is now a clear (1,1) locking step. At $F_p=2.75$, figure~22(c) indicates that locking steps emerge at (0,1), (1,2), (1,1), (2,1), and $(0,1)$, with large fluctuating regions falling between adjacent locking steps. For $F_{p} > 3.0$ the system enters the strong pinning regime and the random fluctuating regions disappear, as shown in figure~22(d) for $F_{p} = 3.75$. Here, $V_y$ is higher on the (2,1) step than on the (1,0) step even though no random fluctuating region separates the two steps. The length of the moving incommensurations on the $(2,1)$ step is slightly larger than the length of the moving incommensurations along the $(1,0)$ step, leading to the higher value of $V_y$ for the (2,1) step. \begin{figure} \includegraphics[width=3.5in]{Fig23.ps} \caption{ \label{Fig23} (a) $V_{y}$ vs $\theta$ for colloidal particles with interaction strength $C=0.001$ on a square pinning array with $F_p=1.85$. The ratio of the number of colloids to pinning sites is $N_{c}/N_{p} =0.432$, 0.778, 1.125, $1.82$, and 2.85, from bottom to top. (b) $V_{y}$ vs $\theta$ for colloidal particles on a triangular pinning array with $F_{p} = 1.85$ for $N_{c}/N_{p} = 0.432$ and varied colloid-colloid interaction strength of $C = 0.0001$, 0.01, 0.05, and $0.1$, from bottom to top. (c) The width $F_c^{Tr}$ of the first locking step from the square pinning array sample in panel (a) at $N_c/N_p=0.432$ vs $C$. (d) The same as (c) for a triangular pinning array with the same parameters as in panel (b). } \end{figure} \section{Colloidal Particles Moving Over Triangular and Square substrates} Another question is how general the results we have obtained for the vortex system are for other types of particle interactions, particularly colloidal particles where there is currently considerable interest in kinetic locking effects. We have tested all of the major predictions for the vortex system on square and triangular pinning lattices for colloidal particles interacting with a screened Yukawa potential. In figure~23(a) we plot $V_{y}$ vs $\theta$ for colloidal particles on a square pinning array of strength $F_p=1.85$ for varied colloid densities of $N_{c}/N_{p} = 0.432$, 0.778, 1.125, 1.82, and $2.85$. The colloid-colloid interaction coefficient is $C= 0.001$. Here we find the same locking step features observed for the vortex system, with the same oscillations in the width of the first and higher order steps. At $N_{c}/N_{p} = 1.82$ the width of the first step drops to zero, but the first step reappears at $N_{c}/N_{p} = 2.85$, similar to what was observed for the vortex system. We also find the same behaviours for colloids on triangular pinning arrays. One quantity that can be varied in the colloidal system but not in the vortex system is the particle-particle interaction strength. This can be achieved either by increasing the effective charge of the colloids or by changing the screening length while keeping the strength of the substrate fixed. In figure~23(b) we plot $V_{y}$ versus $\theta$ for colloids on a triangular pinning lattice at fixed $F_{p} = 1.85$ and $N_{c}/N_{p} = 0.432$ with $C=0.0001$, 0.01, 0.05, and $0.1$. As $C$ increases, the widths of the locking steps decrease since the colloid lattice becomes stiffer and is less able to distort to adjust to the pinning. Figure~23(d) shows the width $F_c^{Tr}$ of the first locking step as given by the value of the $y$ component of the driving force at the end of the step as a function of $C$ for colloids on a triangular pinning lattice from the system in figure 23(b). As $C$ increases, $F_c^{Tr}$ gradually decreases to zero. There is no clear transition between weak and strong pinning regimes when $C$ is varied, unlike the transition found when $F_p$ was varied for the vortex system. This is because our choice of fixed $F_{p} = 1.85$ falls below the driving amplitude of $A = 2.0$, so all the colloids are moving even when the particle-particle interaction strength is negligible. In order to observe the strong pinning regime discussed earlier, it is necessary for a portion of the particles to be pinned and for the motion to occur in the form of depinned incommensurations which pass through the system. In figure~23(c) we plot the width $F_c^{Tr}$ of the first locking step versus $C$ for colloids on a square pinning array with the same parameters used in figure 23(a), indicating that the same behaviour found for colloids on a triangular pinning lattice also occurs for colloids on a square pinning lattice. \section{Summary} In summary, we have investigated the collective ordering and disordering effects on directional locking for particles such as vortices and colloids moving over triangular and square substrate arrays. We identify several different regimes of collective behaviour as a function of the substrate strength and of the ratio of particle density to substrate minima density. For weak substrates, at certain driving angles all the particles flow along one-dimensional channels through the pinning sites, generating a series of constant velocity steps on which the motion remains locked to a certain direction over a range of driving angles. As the pinning strength decreases, the width of the locking steps decreases and larger ranges of driving angle are occupied by nonlocking regions in which the particle-particle interactions dominate and a triangular particle lattice forms. On the locking steps for triangular substrate arrays, we find that a rich variety of different types of moving lattices form, including moving smectic, square, anisotropic disordered, and distorted triangular lattice structures. The most prominent locking steps are associated with smectic type particle orderings. In the weak substrate regime, we observe that the widths of the steps including the initial transverse depinning barrier pass through local minima and maxima as a function of the ratio of particle density to substrate minima density. In contrast to the longitudinal depinning threshold for periodic substrates, which shows peaks at commensurate fields, the local maxima for the width of the first locking step are not correlated with the two-dimensional periodicity of the pinning array but are instead related to a dynamical commensuration effect caused by the formation of one-dimensional channels of moving particles. A local maximum in the width of the first locking step occurs when integer numbers of rows of moving vortices can fit in the interstitial areas between the pinning sites. For fillings at which the moving rows are unable to fit without buckling, the particle structure becomes disordered and the width of the first locking step is small or zero. As a function of substrate strength for fixed particle density, we identify two distinct locking regimes: a weak pinning regime where all the particles flow along the pinning sites, and a strong pinning regime where the flow occurs by means of an incommensuration or a pulse passing through a background of pinned particles. Between these two regimes the locking steps are lost and are replaced by a strongly fluctuating regime where the particle motion does not lock to a particular direction. For a fixed driving angle, the average particle velocity drops sharply at the crossover between these two regimes, and the velocity saturates to a plateau value in the strong substrate limit. In the strong substrate regime the width of the first step displays commensurate peaks when the number of particles is a fractional matching ratio of the number of substrate minima, in addition to showing peaks at the incommensurate fields as in the weak pinning regime. We expect these effects to be relevant to a wide class of collectively interacting particles moving over periodic substrates, such as vortices in type II superconductors, colloids, electron crystals, and other soft matter systems. \section{Acknowledgments} This work was supported by the U.S.~Department of Energy under Contract No.~W-7405-ENG-36. \section*{References}
\section{Introduction} \label{sec:Intro} Neural Network (NN) has been considerably utilized in High Energy Physics in the past decade. In most applications, The NN was used as a discriminator to separate signal from backgrounds. It is a powerful tool to extract the features of target categories in the multivariate phase space, and project them into a scalar discriminator. However, such applications are often criticized for the reliance on the simulation or test-beam data as training samples, which may have distinct features comparing to the real data. On the other hand, the usage of NN as a non-parametric regression tool is much less exploited, and usually does not suffer from such concerns. Given sufficient complexity, even a single-hidden-layer NN can be seen as a universal approximator of any nonlinear multivariate function~\cite{Cybenko:1989,Hornik1989359}. Composed of simple nonlinear functions called ``neurons", such as hyperbolic tangent functions, an NN can achieve great complexity by connecting many neurons with variable weights $\mathbf{w}$, which serves as the free parameters of the model. Equation~(\ref{eqn:NNfunction}) shows the analytical form of a typical NN, with its structure shown in figure~\ref{fig:MLPstructure}. \begin{equation} \label{eqn:NNfunction} \begin{split} &y_i^1=\vphantom{\sum_i} f^{(1)}(x_i) \qquad\qquad\qquad\quad f^{(1)}(h)=ah+b \\ &y_j^2=f^{(2)}(w_{0j}^1+\sum_i w_{ij}^1 y_i^1) \quad f^{(2)}(h) = \tanh(h) \\ &y_1^3=f^{(3)} (w_{01}^2+\sum_i w_{j1}^2 y_j^2) \quad f^{(3)}(h) = h \end{split} \end{equation} \begin{figure}[htbp] \begin{center} \includegraphics[width=0.6\textwidth]{figure1.eps} \caption{The structure of an NN with one hidden layer~\cite{TMVA}.} \label{fig:MLPstructure} \end{center} \end{figure} NN can approximate not only functions whose output values span real number space, but also those with confined output values. One such category particularly interesting is a probability. The output value can be confined within 0 and 1 by applying a sigmoid transformation to the output neuron, i.e. replacing $f^{(3)}$ in equation~(\ref{eqn:NNfunction}) by \begin{equation} \label{eqn:sigmoid} \begin{split} &f^{(3)}(h) = \frac{1}{1+e^{-h}} \end{split} \end{equation} There are several advantages of NN comparing to the conventional representation of probabilities by histograms. First, NN can approximate the distributions in an unbinned manner, without the arbitrariness in the choice of binning and the subsequent loss of information. Second, NN is more practical for multivariate approximation without suffering the curse of dimensionality. Another great advantage of NN as a regression tool is that the correlations between the input variables can be well approximated. Compared to the application as a ``black-box" discriminator, NN application as a regression tool must follow a more explicit statistical interpretation. This is particularly important if the subsequent application requires detailed statistical information, such as limit setting for new physics searches. Here we present an NN algorithm following the Bayesian inference theory, implemented in the TMVA package~\cite{TMVA}. This manuscript is organized as follows: section~\ref{sec:Bayesian} is a brief review of the statistical interpretation for the training (fitting) and prediction procedure of the NN. Then the implementation of our Bayesian NN (BNN) algorithm is described in detail in section~\ref{sec:Implementations}. Finally in section~\ref{sec:Application}, an application of this BNN in High Energy Physics is demonstrated, where it is used to approximate the false identification rate of isolated muons. \section{Statistical Interpretation of Training and Prediction} \label{sec:Bayesian} As a generic model, NN normally has a huge number of degrees of freedom and incomprehensible complexity. On the other hand, the procedure to train an NN and makes predictions with it can be clearly interpreted by probability theory as Bayesian inference. Given an observed sample $\mathbf{D}=\{\mathbf{x_i}\,, t_i \}$, with $\mathbf{x_i}$ as the multiple input variables of entry $i$, and $t_i$ as its observed output value, the training (fitting) of NN can be viewed as a process to determine the probability of free parameters $\mathbf{w}$, based on $\mathbf{D}$. According to the Bayes theorem, this ``posterior" probability comes from the combination of previous knowledge of $\mathbf{w}$ (``prior") and the compatibility of sample $\mathbf{D}$ with the NN (``likelihood") \begin{equation} \label{eqn:Training} \begin{split} P(\mathbf{w}|\mathbf{D}) \propto P(\mathbf{D}|\mathbf{w}) P(\mathbf{w}) \end{split} \end{equation} The likelihood $P(\mathbf{D}|\mathbf{w})$ in Bayesian language is closely related the ``cost function" in machine learning language. The optimization of NN by minimizing the cost function is mostly equivalent to maximizing the likelihood. For example, the most commonly used sum of the square error (SSE) function can actually be translated as the negative logarithm of the Gaussian likelihood, as shown by equation~(\ref{eqn:SSE}). \begin{equation} \label{eqn:SSE} \begin{split} \text{SSE}&=\sum_i ( y(\mathbf{x_i;\mathbf{w}})-t_i )^2 \\ &= -\log(\prod_i (\exp(-(y(\mathbf{x_i};\mathbf{w})-t_i)^2)\\ &\propto -\log(P(\mathbf{D}|\mathbf{w})) \end{split} \end{equation} The prior probability $P(\mathbf{w})$ is much less emphasized in classic usage of NN, which in fact often assumes a flat distribution. We will see later that a Bayesian regulator term can be added to the cost function, based on a simple prior knowledge. It is also worth mentioning that, although the probability distribution of $\mathbf{w}$ can be obtained, only the most probable value is kept in classic usage. Given a new input vector $\mathbf{x'}$, the prediction with NN can also be performed as a Bayesian inference. Although classic usage of NN only gives one single value of $y'$ with the most probable $\mathbf{w}$, we should be able to predict a probability distribution of the output if we marginalize over the distribution of NN parameters $P(\mathbf{w|D})$ by equation~(\ref{eqn:Prediction}). \begin{equation} \label{eqn:Prediction} \begin{split} & P(y'| D, \mathbf{x'} ) = \int P(y'|\mathbf{x'}\,,\mathbf{w}) P(\mathbf{w}| D) \, d\mathbf{w} \end{split} \end{equation} \section{Bayesian Implementations} \label{sec:Implementations} \subsection{Cost Function} \label{sec:CostFunction} As shown in equation~(\ref{eqn:SSE}), the commonly used cost function, sum of the square error, can be interpreted as the negative logarithm of Gaussian likelihood function. This cost function is applicable for most regression applications, where a Gaussian distribution can be assumed for the observed values around their true values. However, when the NN is used to approximate a probabilistic distribution, such an assumption of Gaussian likelihood may not be appropriate. As a probabilistic classifier, the NN's output $y$ is expected to approximate the probability of membership to one category, constrained between 0 and 1 by the sigmoid function (equation~(\ref{eqn:sigmoid})). And the observed value $t$ for each entry in the input sample $D$ is usually either 0 or 1, representing the fact whether the entry meets the condition, or belongs to the desired category. The distribution of observation $t$ around probability $y$ should then follow the Bernoulli distribution \begin{equation} \label{eqn:BernL} \begin{split} &P(\mathbf{D}|\mathbf{w})=y^t(1-y)^{1-t} \end{split} \end{equation} Correspondingly, the cost function for classification should take the form of the so-called ``cross-entropy" function (CE), the sum of negative logarithm of Bernoulli distribution, \begin{equation} \label{eqn:CE} \begin{split} \text{CE}&=\sum_i (-t_i\log y(\mathbf{x_i};\mathbf{w})-(1-t_i)\log(1-y(\mathbf{x_i};\mathbf{w}))) \end{split} \end{equation} With the sigmoid transformation and CE cost function, the NN can approximate the probabilities with rigorous statistics interpretation. This can be chosen by the option of the MLP method~\cite{TMVA} {\tt EstimatorType=CE}. \subsection{Complexity Control} \label{ComplexityControl} NN gains the capability of universal approximation by a huge number of degrees of freedom. A typical single-hidden-layer NN, even only for a few input variables, could have $O(10^2)$ free parameters $\mathbf{w}$. A model with such great complexity may suffer from over-fitting. That is to say, it will approximate not only the desired connection between the input variables and the output value, but also the undesired fluctuations of the input sample. This is particularly an issue if the input sample has limited statistics. The predictivity of the model will be greatly deteriorated by exaggerated fluctuations. The commonly employed solution against over-fitting is the so-called ``cross validation" technique. A fraction of the input sample, normally half of the statistics, is taken away from the training process and used as a test set. Over-fitting is identified during the process of training, if the cost function of the test set starts to increase. One problem with this technique is the possibility that the cost function of test set may have merely hit a local minimum. Another problem is the reduction of training sample size. This is a non-trivial drawback for cases in which over-fitting may occur, which normally have trouble with statistics already. In our implementation, another solution with regulators is adopted to avoid over-fitting. Although it is necessary to keep a large number of free parameters in order to make the model generic, the value of the parameters can be constrained to reduce unnecessary complexity. This can be expressed as a Bayesian prior knowledge about the model, assuming the value of the free parameters $\mathbf{w}$ should be limited to the vicinity of zero. A Gaussian distribution centered at zero is used to represent such prior. Correspondingly, a ``regulator" function can be obtained as the negative logarithm of this Gaussian prior for all NN parameters $w_i$. \begin{equation} \label{eqn:regulator} \begin{split} &\text{Reg}=-\log(P(\mathbf{w}))=\sum_i (\alpha_i w_i^2) \end{split} \end{equation} Adding this regulator term into the cost function actually gives the negative logarithm of posterior probability $P(\mathbf{w}|D)$. In the BNN, this summed value is minimized instead to obtain the optimal $\mathbf{w}$. In equation~(\ref{eqn:regulator}), the hyper-parameters $\alpha_i$ determine the range of $\mathbf{w}$, consequently reflecting the knowledge of required complexity of the model. The values of $\alpha_i$ are not necessarily the same for each $w_i$. From a topological point of view, all the neurons within one hidden layer are computationally exchangeable. So their outgoing weights share the same hyper-parameter. This is not applicable to the input variables because they normally have different importance. Therefore, each group of weights originated from the same input neuron has its own $\alpha_i$. For the same reason, the bias neurons in each layer have independent hyper-parameters. Although we can categorize the weights and associate them to different hyper-parameters, in most cases we do not actually possess \textit{a priori} knowledge about the complexity needed, namely the values of $\alpha_i$. We implemented an iterative approach proposed by MacKay in 1992~\cite{MacKay:1992}, in which these hyper-parameters are estimated during the training of NN, by optimizing the ``evidence" of the models: \begin{equation} \label{eqn:evidence} \begin{split} P( D | \pmb{\alpha} ) & = \int P( D | \mathbf{w},\pmb{\alpha}) P(\mathbf{w} | \pmb{\alpha}) \, d\mathbf{w} \end{split} \end{equation} where the optimal $\mathbf{w}$ is determined by minimizing the cost function and the integral is evaluated approximately for a given $\pmb{\alpha}$. After estimating the optimal $\pmb{\alpha}$, a new optimal $\mathbf{w}$ is recalculated and the process is iterated, until desired convergence is reached. This functionality can be activated by the MLP option {\tt UseRegulator=true}, together with the BFGS training method. \subsection{Bayesian Prediction} \label{sec:BayesianPrediction} In the classic usage of NN, the prediction upon new input $\mathbf{x'}$ is the most probable value obtained with the most probable $\mathbf{w}$. Instead, in Bayesian data analysis, it is more essential to marginalize over all possible values of $\mathbf{w}$, and obtain the prediction as a probability distribution, as shown by equation~(\ref{eqn:Prediction}). Such a prediction contains not only the most probable value, but also the uncertainty of the inference. The estimation of uncertainty is crucial, especially for extrapolated predictions in multivariate phase space. Unfortunately, as a common difficulty for most Bayesian applications, the integration of equation~(\ref{eqn:Prediction}) is generally non-trivial. Although the posterior of NN parameters $P(\mathbf{w}|D)$ is calculable for any $\mathbf{w}$, the distribution for such ``nuisance parameters" does not have a closed-form expression. In our implementation, an analytical distribution is used for the integration, which is the Laplace approximation of the posterior around the optimal value $\mathbf{w^\text{MP}}$~\cite{Mackay:1995}, as shown in equation~(\ref{eqn:GausApp}). \begin{equation} \label{eqn:GausApp} \begin{split} & P(\mathbf{w}| D) \simeq P(\mathbf{w^{\text{MP}}}|D) \exp\left(-\frac{1}{2}\Delta \mathbf{w^{\text{T}}} \mathbf{A} \Delta \mathbf{w}\right) \\ &\Delta \mathbf{w=w-w^{\text{MP}}} \end{split} \end{equation} $\mathbf{A}$ represents the Hessian matrix of the cost function, namely the negative logarithm of the posterior \begin{equation} \label{eqn:Hessian} \begin{split} \mathbf{A}&=-\nabla\nabla\log P(\mathbf{w}|D) | _{\mathbf{w}^{\text{MP}}}. \\ \end{split} \end{equation} For feed-forward NN either with a linear output neuron and SSE cost function, or with a sigmoid output neuron and CE cost function, its Hessian matrix $\mathbf{A}$ can be approximated and written consistently as \begin{equation} \label{eqn:ApproximateHessian} \begin{split} \mathbf{A}&\simeq\sum_{\mathbf{x_i}}f'\mathbf{g^Tg} \end{split} \end{equation} $f'=dy/dh$ and $\mathbf{g}=\nabla h$. $h$ and $y$ are the values before and after output neuron transformation. Furthermore, a linear dependence of $h$ over weights $\mathbf{w}$ can be approximated as well. \begin{equation} \label{eqn:LinApp} \begin{split} & h( \mathbf{x'} ; \mathbf{w} ) \simeq h( \mathbf{x'} ; \mathbf{w^{\text{MP}}} ) + \mathbf{g} \cdot\Delta \mathbf{w} \end{split} \end{equation} Therefore, the distribution of $h$ can be calculated analytically as \begin{equation} \label{eqn:ApproximatePrediction} \begin{split} P(h| D, \mathbf{x'} ) &= \int h(\mathbf{x'};\mathbf{w}) P(\mathbf{w}| D) \, d\mathbf{w}\\ &\simeq \mathcal{N}(\, h(\mathbf{x'};\mathbf{w^{\text{MP}}})\,,\mathbf{g^TA^{-1}g}) \end{split} \end{equation} It is a Gaussian distribution with the mean value of the classic NN prediction. In addition, each prediction can give an associated uncertainty, which originates from the uncertainty of the NN parameters determination. For probability fitting, the probability density function (p.d.f.) of the output $y$ is a sigmoid-transformed Gaussian distribution of $h$ (equation~\ref{eqn:sigmoid}). As a non-linear transformation, the sigmoid function will convert the symmetric error bar of h into an asymmetric one for y. Besides the Laplace approximation used in our implementation, the integration can also be solved numerically by Markov Chain Monte Carlo (MCMC)~\cite{Neal:1993}. Compared to MCMC approach, the analytical approximation is easier for both training and prediction. The estimation of the Hessian matrix during the training process can be activated by MLP option {\tt CalculateErrors=true}. By configuring the Reader option {\tt Error=true}, the Hessian matrix will be loaded for prediction. And the asymmetric uncertainties can be evaluated by Reader functions {\tt GetMVAErrorUpper()} and {\tt GetMVAErrorLower()}. \section{Application in High Energy Physics} \label{sec:Application} To demonstrate the practical usage of the BNN, we will show an example in High Energy Physics: measurement of the false identification rate of isolated muons. The test data, job control scripts and instructions can be obtained from the CPC library. Muons are an important electroweak signature in collider physics. According to their sources, they can be categorized by the so-called isolation condition, i.e. adjacent particle flow. Those ``non-isolated" muons, which have accompanying particles flying in a similar direction, mostly come from semi-leptonic decay of heavy flavor quarks ($b,c$). The other ``isolated" muons are more likely from electro-weak processes such as $W$ boson production, and therefore taken as signals in many physics topics. To get rid of the former category from a mixed sample, an isolation cut is often imposed on the sum of transverse momenta, for all visible particles inside a cone around the muon. Here we choose a typical configuration, limiting transverse particle flow within $\Delta R=\sqrt{(\Delta\eta)^2+(\Delta\phi)^2}\leq0.2$ to be less than 15\% of the muon's transverse momentum. Due to event-specific kinematics and detector response, there is always a considerable fraction of muons from ``non-isolated sources" being falsely identified as isolated muons. Such muons will contaminate the signal sample when a final state with isolated muons is expected. It is non-trivial to estimate this background accurately, for both new physics searches and precise measurements. Rather than relying on simulation, it is highly desirable to measure the false identification rate $f=P(\text{isol})$ directly from collision data. In the following, we demonstrate how BNN can be used for such false rate measurement, using Monte-Carlo simulation of heavy-flavor quark production ($b\bar{b},c\bar{c}$) in the proton-proton collisions. The samples are produced by the Pythia generator~\cite{Pythia}, with 7 TeV center-of-mass energy as at LHC~\cite{LHC}. Muon pseudo-rapidity acceptance is assumed to be within 2.5, with the threshold of transverse momentum as above 10 GeV. The fiducial efficiency of the detector is assumed to be 100\% for simplicity. Two samples are generated for comparison. The first sample requires single muon within the detector acceptance, while the second sample requires two such muons with the same charge. The former final state is dominated by the non-isolated sources, and therefore ideal for the measurement of fake rate. The latter final state instead is a typical channel in which new physics may manifest, and requires accurate estimation of the background contribution. With collision data, we need to measure the fake rate from the single muon events, then apply it to those same-charge di-muon events to estimate the background contribution~\cite{SSpaper}. With the MC samples mentioned above, we can study how to make the fake rate measurement compatible between these two channels. \begin{figure}[htbp] \begin{center} \includegraphics[width=0.4\textwidth]{figure2a.eps} \includegraphics[width=0.4\textwidth]{figure2b.eps} \caption{Probability density distributions over $p_{\text{T}}$ (left) and $H_{\text{T}}$ (right), for muons in the single muon control sample (solid) and di-muon signal sample (circle).} \label{fig:Distdependence} \end{center} \end{figure} In a first attempt to measure the average false identification rates, we obtain a quite different values, 33.3(0.1)$\pm$\% from the single muon sample and 19.8(0.2)\% from the same-charge di-muon sample. This incompatibility is due to the fact that the probability of false identification, $P(\text{isol}|\mathbf{x})$, is not constant over kinematic variables $\mathbf{x}$. Two examples of such kinematic variables are \begin{itemize} \item $p_{\text{T}}$: the transverse momentum of the muon itself. \item $H_{\text{T}}$: the scalar sum of transverse momenta for all visible particles in the event, and the measurable energy imbalance. \end{itemize} The kinematic distributions in these two samples are quite distinct, as can be seen in figure~\ref{fig:Distdependence}. As a result, the observed average rates, marginalized by equation~(\ref{eqn:AvgK}), turned out to be incompatible. In order to make a correct prediction in the signal region, it is important to measure the probabilities $P(\text{isol}\,|\,\mathbf{x})$ rather than the marginalized rate. \begin{equation} \label{eqn:AvgK} \begin{split} &\langle f\rangle=\int P(\text{isol}\,|\,\mathbf{x})P(\mathbf{x})\,d\mathbf{x} \end{split} \end{equation} Our BNN implementation is used to perform this measurement of $P(\text{isol}\,|\,\mathbf{x})$. About 50,000 muons in the single muon QCD events is used as input sample $\mathbf{D}$. Their corresponding kinematic variables $p_{\text{T}}$ and $H_{\text{T}}$ are declared as the input $\mathbf{x_i}$ of the NN. And a target value $t_i$ as 1 or 0 is assigned, depending on whether the muon passed the isolation criteria. The NN is constructed with one hidden layer of ten neurons, and a sigmoid-transformed output neuron. As a probability fit, the training is configured to use the cross-entropy cost function of equation~(\ref{eqn:CE}). In addition, the regulator mechanism is activated to prevent over-fitting. The fitted distribution $P(\text{isol}\,|\,p_{\text{T}},H_{\text{T}})$ can be visualized in figure~\ref{fig:BNNmap}. The correlation between the two variables is clearly fitted, with a smooth extrapolation into the peripheral phase space region. \begin{figure}[htbp] \begin{center} \includegraphics[width=0.65\textwidth]{figure3.eps} \caption{2-dimensional false isolation probabilities, fitted by the BNN.} \label{fig:BNNmap} \end{center} \end{figure} We then test this 2D false rate function with muons in the same-charge di-muon sample. Using the trained BNN, we can predict the probability of passing isolation criteria $P(\text{isol}\,|\,p_{\text{T}},H_{\text{T}})$ for each muon. Marginalizing the predicted probabilities over all the muons in this sample (30764 muons), we can predict that 6077 of them will pass the isolation cut, corresponding to an average false rate of 19.8\%. This is very close to the actual number of passed muon, 6093, equivalent to an average false rate of 19.8(0.2)\%. As described is section~\ref{sec:BayesianPrediction}, the BNN can also calculate the uncertainty associated to each prediction, based on the uncertainty on the determination of the free parameters $\mathbf{w}$. It reflects the statistical property of the training sample. To test this estimation, another 100 NNs are trained with the same network topology. But the input samples, as well as the random seeds for initialization, are different in each training. For every muon in the same-charge di-muon sample, we use the BNN to predict its probability of pass $P_\text{BNN}$, as well as the associated asymmetric error bars, denoted as $\sigma_\text{BNN}^+$ and $\sigma_\text{BNN}^-$. As a comparison, we also use the ``batch'' NNs to make 100 predictions, and calculate their mean value $P_\text{Batch}$ and standard deviation $\sigma_\text{Batch}$. Comparing the ratio between $\sigma_\text{BNN}$ and $\sigma_\text{Batch}$ (figure~\ref{fig:SigmaRatio}) for all the muons, we can see that the BNN uncertainty is generally consistent with the standard deviation of the batch predictions. \begin{figure}[htbp] \begin{center} \subfigure[]{ \label{fig:SigmaRatio} \includegraphics[width=0.45\textwidth]{figure4a.eps} } \subfigure[]{ \label{fig:BNNvsBatch} \includegraphics[width=0.45\textwidth]{figure4b.eps} } \caption{(a) The distribution of the ratios between $\sigma_\text{BNN}$ and $\sigma_\text{Batch}$, for all muons in the same-charge di-muon events. Positive value stands for $\sigma_\text{BNN}^+/\sigma_\text{Batch}$ and negative value stands for $\sigma_\text{BNN}^-/\sigma_\text{Batch}$. (b) The correlation between $\log_{10}(\sigma_\text{BNN}/P_\text{BNN})$ and $\log_{10}(\sigma_\text{Batch}/P_\text{Batch})$. $\sigma_\text{BNN}$ is the average of $\sigma_\text{BNN}^+$ and $\sigma_\text{BNN}^-$. } \label{fig:Uncertainties} \end{center} \end{figure} To further understand the precision of the BNN uncertainty estimation, the correlation between $\log_{10}(\sigma_\text{BNN}/P_\text{BNN})$ and $\log_{10}(\sigma_\text{Batch}/P_\text{Batch})$ for all the muons are plotted in figure~\ref{fig:BNNvsBatch}. Good consistency can be observed when the relative uncertainties are less than $\sim$30\%, which is the case for a large fraction of the entries. For predictions with large relative uncertainty, BNN tends to over-estimate the uncertainty, as the approximation applied in the Bayesian marginalization becomes less accurate. It is worthwhile to notice that the uncertainty estimated by BNN only accounts for the confidence in the determination of BNN parameters, evaluated based on the training sample used. The difference between the prediction and observation also involves the statistical fluctuations of the prediction sample, as well as the systematic uncertainties in the application, such as sample selections, the choice of parameterized variables and their measurement uncertainties. Furthermore, only two kinematic variables were considered in this truth-level study, and consistent false rate estimation has already been observed. In reality, there could be additional factors which considerably affect the false rate, due to detector effects and collision configuration. Fortunately, the measurement can be easily extended to a higher dimensional phase space with BNN as the fitting tool. \section{Conclusion} \label{sec:Conclusion} In this manuscript we presented a BNN algorithm which can be used as an unbinned fitting tool, which is particularly interesting for fitting probabilities. The Bayesian implementation also provides functionalities such as controlling unnecessary complexity, and uncertainty estimation. The demonstration with a HEP use case clearly showed the capability of BNN as an unbinned regression tool, especially if several input variables with correlation are involved. This technique has already been used to analyze the data collected by LHC in 2010~\cite{SSpaper}. It has a very promising future for further applications, particularly for higher dimensional problems. \section*{Acknowledgements} We thank Andreas Hoecker, Joerg Stelzer, Peter Speckmayer, Jan Therhaag, Eckhard von Toerne and Helge Voss for their help in implementing this program into TMVA. We thank Song-Ming Wang and Zhili Weng for helpful discussions. Jiahang Zhong and Shih-Chang Lee are partially supported by the National Science Council, Taiwan under the contract number NSC99-2119-M-001-015. \bibliographystyle{elsarticle-num}
\section{Introduction} The general framework we consider is that of a finite graph $G=(V,E)$, in which \textit{spanning subgraphs} are weighted according to their local aspect around each vertex as follows : \begin{eqnarray} \label{eq:productform} \mu(F) & = & \prod_{i\in V}\mu_i(F\cap E_i). \end{eqnarray} Here, a spanning subgraph $(V,F)$ is identified with its egde-set $F\subseteq E$, and each $\mu_i$ is a given non-negative function over the subsets of $E_i:=\{e\in E; e\textrm{ is incident to }i\}$. We call $\mu$ the \textit{global measure} induced by the \textit{local measures} $\mu_i,{i\in V}$. Of particular interest in combinatorial optimization is the number \begin{eqnarray} \label{eq:rankdef} M(G) & = & \max\left\{|F|: F\in{\mathrm{supp\,}}(\mu)\right\}, \end{eqnarray} which is the maximum possible size of a spanning subgraph $F$ satisfying the local contraint $\mu_i(F\cap E_i)>0$ at every node $i\in V$. More generally, counting the weighted number of spanning subgraphs of each given size in $G$, i.e. determining the generating polynomial \begin{eqnarray} \label{eq:pf} Z(G;t) & = & \sum_{F\subseteq E}\mu(F)t^{|F|} \end{eqnarray} is a fundamental task, of which many combinatorial problems are special instances. Intimately related to this is the study of a random spanning subgraph ${\mathcal F}$ sampled from the \textit{Gibbs-Boltzmann} law : \begin{eqnarray} \label{eq:boltzmann} {\mathbb P}^{t}_G({\mathcal F}=F) & = &\frac{\mu(F)t^{|F|}}{Z(G;t)}, \end{eqnarray} where $t>0$ is a variable parameter called the \textit{activity}. In particular, the expected size of ${\mathcal F}$ is called the \textit{energy} $U(G;t)$ and is connected to $Z(G;t)$ via the elementary identity \begin{eqnarray} \label{eq:logderivative} U(G;t) & = & t\frac{d}{dt}\log Z(G;t). \end{eqnarray} Our concern is the behavior of these quantities in the \textit{infinite volume limit} : $|V|\to\infty$, $|E|=\Theta(|V|)$. Originating from spin glass theory \cite{mezardparisi}, the \textit{cavity method} is a powerful nonrigorous technique for evaluating such asymptotics on graphs that are \textit{locally tree-like}. Essentially, the heuristic consists in neglecting cycles in order to obtain an approximate local fixed point equation for the marginals of the Gibbs-Boltzmann law. Despite its remarkable practical efficiency and the mathematical confirmation of its analytical predictions for various important models \cite{talagrand,zeta,mwis,urbanke,bayatinair,dembomontanari,matcharxiv}, this \textit{ansatz} is still far from being completely understood, and the exact conditions for its validity remain unknown. More precisely, two crucial questions arise in presence of cycles : \begin{enumerate} \item \textbf{convergence} : is there a unique, globally attractive fixed point to the cavity equation ? \item \textbf{correctness} : if yes, does it have any relation to the Gibbs-Boltzmann marginals ? \end{enumerate} In this paper, we exhibit a general condition under which the cavity method is valid for counting spanning subgraphs subject to local constaints. Specifically, we positively answer question 1 for arbitrary finite graphs (Theorem \ref{th:convergence}), under the only assumption that each local measure enjoys a certain form of negative association which we call the \textit{cavity-monotone} property, and which simply boils down to \textit{ultra-log-concavity} in the exchangeable case. Regarding question 2, we use the framework of \textit{local weak convergence} \cite{bensch,aldste} and the notion of \textit{unimodularity} \cite{aldlyo} to prove asymptotical correctness for any sequence of graphs whose random weak limit is concentrated on trees (Theorem \ref{th:main}). This includes many classical sequences of \textit{diluted graphs}, such as random $d-$regular graphs, Erd\H{o}s-R\'enyi random graphs with fixed average degree, or more generally random graphs with a prescribed degree distribution. In all these examples, the limit is a \textit{unimodular Galton-Watson (UGW) tree}. Thanks to the distributional self-similarity of such a tree, the cavity equation simplifies into a \textit{recursive distributional equation} which may be solved explicitely. As a motivation, let us first describe the implications of our work in the special case of \textit{b-matchings}. A famous combinatorial structure that fits in the above framework is obtained by fixing $b\in{\mathbb N}$ and taking $\mu_i(F)={\mathbf{1}}(|F|\leq b)$ for all $i\in V$ : the induced global measure $\mu$ is then nothing but the counting measure for $b-$matchings in $G$, i.e. spanning subgraphs with maximum degree at most $b$. The reader is refered to the monograph \cite{schrijver} for a complete survey on $b-$matchings, and to \cite{lovaszplummer} for the important case of \textit{matchings} ($b=1$). The associated quantities $M_b(G)$ and $Z_b(G;t)$ are important graph invariants respectively known as the \textit{$b-$matching number} and \textit{$b-$matching polynomial}. Determining $Z_1(G;t)$ is a classical example of a computationally hard problem \cite{valiant}, although efficient approximation algorithms have been designed \cite{stoc07,bangam}. The mathematical properties of $Z_b(G;t)$ have been investigated in detail, notably in the case $b=1$ for the purpose of understanding \textit{monomer-dimer systems} \cite{heilmannlieb,berg}. Interestingly, the geometry of the complex zeros of $Z_b(G,t)$ has been proven to be quite remarkable (see \cite{heilmannlieb} for $b=1$, \cite{ruelle} for $b=2$, and \cite{wagner} for the general case). Regarding $M_1(G)$, the first results in the infinite volume limit were obtained by Karp and Sipser \cite{karpsipser} for the Erd\H{o}s-R\'enyi random graph $G_n$ with average degree $c>0$ on $n$ vertices : \begin{equation} \label{eq:KS} \frac{1}{n}M_1(G_n)\xrightarrow[n\to\infty]{P}1-\frac{t_c+e^{-ct_c}+ct_ce^{-ct_c}}{2}, \end{equation} where $t_c\in(0,1)$ is the smallest root of $t=e^{-ce^{-ct}}$. The analysis has then been extended to random graphs with a log-concave degree profile \cite{friezebohman}, and finally to any graph sequence that converges in the local weak sense \cite{matcharxiv}. Contrastingly, only little is known for $b\geq 2$ : to the best of our knowledge, the limit of $\frac{1}{|V_n|}M_b(G_n)$ is only known to exist in the Erd\H{o}s-R\'enyi case \cite{gamarnik}, and could not be explicitely determined. As a special case of our main result, it will follow that \begin{theorem}[$b-$matchings in locally tree-like graphs] \label{th:KSb} For any sequence of finite graphs $(G_n)_{n\in{\mathbb N}}$ satisfying $|E_n|=O(|V_n|)$ and whose random weak limit ${\mathcal L}$ is concentrated on trees, the limits \begin{eqnarray*} f_b({\mathcal L}):=\lim_{n\to\infty}\frac{1}{|V_n|}\log Z_b(G_{n};t) & \textrm{ and } & m_b({\mathcal L}):=\lim_{n\to\infty}\frac{M_b(G_{n})}{|V_n|} \end{eqnarray*} exist and depend only on the random weak limit ${\mathcal L}$. When ${\mathcal L}$ is a UGW tree, we have the explicit formula \begin{equation*} m_b({\mathcal L}):=\min_{s\in[0,1]}\left\{b-\frac{b}{2}g_b(s)-\frac{b}{2}(g_b\circ f_b)(s)+\frac{c}{2}f_b(s)(f_b\circ f_b)(s)\right\}, \end{equation*} where $c,f,g$ are defined in terms of the degree generating function $\phi(s)=\sum_{k}\pi_ks^k$ as follows : \begin{equation*} c=\phi'(1),\qquad \textrm{ } \qquad f_b(s)=\frac{1}{c}\sum_{k=0}^{b-1}\frac{s^{k}\phi^{(k+1)}(1-s)}{k!}\qquad\textrm{ and }\qquad g_b(s)=\sum_{k=0}^b\frac{s^{k}\phi^{(k)}(1-s)}{k!}. \end{equation*} Moreover, any $s$ where the above minimum is achieved must be a root of $s=(f_b\circ f_b)(s)$. \end{theorem} For example, in the case of Erd\H{o}s-R\'enyi random graphs with average degree $c>0$ on $n$ vertices, the random weak limit ${\mathcal L}$ is a.s. the law of a UGW tree with Poisson(c) degree distribution, and hence, \begin{equation*} \frac{1}{n}M_b(G_n)\xrightarrow[n\to\infty]{a.s.}\min_{s\in[0,1]}\left\{b-\frac{b}{2}\varphi_{b+1}(s) - \frac{b}{2}(\varphi_{b+1}\circ\varphi_{b})(s) + \frac{c}{2}\varphi_{b}(s)(\varphi_{b}\circ \varphi_{b})(s)\right\}, \end{equation*} where we have set $$\varphi_b(s)=e^{-ct}\sum_{k=0}^{b-1}\frac{{cs}^k}{k!}.$$ Since any $s$ where the minimum is achieved must satisfy $s=(\varphi_{b}\circ \varphi_{b})(s)$, we recover exactly (\ref{eq:KS}) in the special case of matchings ($b=1$). The paper is organized as follows : in section \ref{sec:prelim}, we recall the basic notions and properties pertaining to measures over subsets, which will be of constant use throughout the paper. In section \ref{sec:finite}, we define and study the cavity equation associated to a finite network. In section \ref{sec:infinite}, we extend the results to infinite networks that arise as local weak limits of finite networks. Finally, section \ref{sec:activity} is devoted to the study of the cavity equation in the limit of infinite activity, and to its explicit resolution in the case of $b-$matchings. \section{Preliminaries} \label{sec:prelim} In this section, we define the important notions pertaining to (non-negative) measures $\mu$ over the subsets of an arbitrary finite \textit{ground set} $E$. Later on, these will be specialized to the local measures $(\mu_i)_{i\in V}$ attached to the vertices of a graph $G$. First, $\mu$ is caracterized by its \textit{multivariate generating polynomial} \begin{eqnarray} \label{eq:gp} Z({\mathbf w}) & = & \sum_{F\subseteq E}\mu(F){\mathbf w}^{F}, \end{eqnarray} where ${\mathbf w}=(w_e)_{e\in E}$ and ${\mathbf w}^F=\prod_{e\in F}w_e$. Since $Z$ is affine in each $w_e,e\in E$, it can be decomposed as \begin{eqnarray} \label{eq:decomposition} Z({\mathbf w}) & = & w_eZ^{/e}({\mathbf w}')+Z^{\setminus e}({\mathbf w}'), \end{eqnarray} where ${\mathbf w}'=(w_f)_{f\neq e}$ and $Z^{\setminus e}$, $Z^{/e}$ are the multi-affine polynomials with ground set $E\setminus e$ respectively obtained from $Z$ by setting the variable $w_e$ to $0$ (\textit{deletion}) and differentiating with respect to $w_e$ (\textit{contraction}). By definition, the \textit{cavity ratio} of the pair $(\mu,e)$ is then simply the multi-affine rational function \begin{eqnarray} \label{eq:cavity} \Gamma^e_\mu({\mathbf w}') & = & \frac{Z^{/e}({\mathbf w}')}{Z^{\setminus e}({\mathbf w}')}. \end{eqnarray} When positive values are assigned to the variables (a so-called \textit{external field}), we may consider the probability distribution ${\mathbb P}^{\mathbf w}_\mu({\mathcal F}=F) = {\mu(F){\mathbf w}^F}/{Z({\mathbf w})}.$ A quantity of interest is the expected size of ${\mathcal F}$ when viewed as a function of the external field. We call this the \textit{energy} : \begin{eqnarray} U_\mu({\mathbf w}) & = & {\mathbb E}^{\mathbf w}_\mu\left[|{\mathcal F}|\right]. \end{eqnarray} From the decomposition (\ref{eq:decomposition}), it follows immediately that \begin{eqnarray} \label{eq:energycavity} {\mathbb P}^{\mathbf w}_\mu(e\in{\mathcal F}) \ = \ \frac{w_e\Gamma^e_\mu({\mathbf w}')}{1+w_e\Gamma^e_\mu({\mathbf w}')}, & \textrm{ hence } & U_\mu({\mathbf w}) \ = \ \sum_{e\in E}\frac{w_e\Gamma^e_\mu({\mathbf w}')}{1+w_e\Gamma^e_\mu({\mathbf w}')}. \end{eqnarray} Note that the supremum of the energy is exactly the \textit{rank} of $\mu$ : $\rm{rank}(\mu) = \max\left\{|F|; F\in{\mathrm{supp\,}}(\mu)\right\}.$ The following properties will be of crucial importance throughout the paper. \begin{definition}[Cavity-monotone measures] The measure $\mu$ is called \begin{itemize} \item \textit{Rayleigh} if every two distinct ground elements $e\neq f$ are negatively correlated in ${\mathcal F}$ : $$\forall {\mathbf w}>0, {\mathbb P}^{\mathbf w}_\mu\left(e\in {\mathcal F},f\in {\mathcal F}\right)\leq {\mathbb P}^{\mathbf w}_\mu\left(e\in {\mathcal F}\right){\mathbb P}^{\mathbf w}_\mu\left(f\in {\mathcal F}\right).$$ \item \textit{Size-increasing} if every ground element $e$ positively influences the total size $|{\mathcal F}|$ : $$\forall {\mathbf w}>0, {\mathbb E}^{\mathbf w}_\mu\left[|{\mathcal F}| {\mathbf{1}}_{(e\in {\mathcal F})}\right]>{\mathbb E}^{\mathbf w}_\mu\left[|{\mathcal F}|\right]{\mathbb P}^{\mathbf w}_\mu(e\in{\mathcal F}).$$ \item \textit{Cavity-monotone} if its satisfies $\mu(\emptyset)>0$ and the two above properties. \end{itemize} \end{definition} Rayleigh measures were introduced in the context of matroid theory \cite{wagner08}, but soon found their place in the modern theory of negative dependence for probability measures \cite{pemantle, kahnneiman}. Cavity-monotone measures will play a major role in our study, for the following elementary reason. \begin{lemma}[Monotony of energy and cavity ratios] \label{lm:equiv} \begin{eqnarray*} \mu(\emptyset)>0 & \Longleftrightarrow & \textrm{ the cavity ratios }\Gamma^e_\mu,e\in E\textrm{ are well-defined on } [0,\infty)\times\ldots\times [0,\infty). \frac{}{}\\ \mu\textrm{ is Rayleigh } & \Longleftrightarrow & \textrm{ the cavity ratios } \Gamma^e_\mu,e\in E \textrm{ are non-increasing in each variable}.\frac{}{}\\ \mu\textrm{ is size-increasing} & \Longleftrightarrow & \textrm{ the energy } U_\mu \textrm{ is increasing in each variable} ;\\ & \Longleftrightarrow & \textrm{ for each } e\in E\textrm{ and }{\mathbf w}>0, t\mapsto t\Gamma^e_\mu(t{\mathbf w}')\textrm{ is increasing}. \end{eqnarray*} \end{lemma} \bp{} Differentiating the corresponding quantities and playing with the definition of ${\mathbb P}_\mu^{\mathbf w}$ easily yields \begin{eqnarray*} \frac{\partial \Gamma^e_\mu({\mathbf w}')}{\partial w_f} & = & \left( {\mathbb P}^{\mathbf w}_\mu\left(e\in {\mathcal F},f\in {\mathcal F}\right)- {\mathbb P}^{\mathbf w}_\mu\left(e\in {\mathcal F}\right){\mathbb P}^{\mathbf w}_\mu\left(f\in {\mathcal F}\right) \right)/ w_ew_f{\mathbb P}^{\mathbf w}_\mu\left(e\notin {\mathcal F}\right)^2.\\ \frac{\partial U_\mu({\mathbf w})}{\partial w_e} & = & \left({\mathbb E}^{\mathbf w}_\mu\left[|{\mathcal F}| {\mathbf{1}}_{(e\in {\mathcal F})}\right]-{\mathbb E}^{\mathbf w}_\mu\left[|{\mathcal F}|\right]{\mathbb P}^{\mathbf w}_\mu(e\in{\mathcal F}) \right)/ w_e.\\ \frac{\partial t\Gamma^e_\mu(t{\mathbf w}')}{\partial t} & = & \left( {\mathbb E}^{\mathbf w}_\mu\left[|{\mathcal F}| {\mathbf{1}}_{(e\in {\mathcal F})}\right]-{\mathbb E}^{\mathbf w}_\mu\left[|{\mathcal F}|\right]{\mathbb P}^{\mathbf w}_\mu(e\in{\mathcal F}) \right)/ tw_e{\mathbb P}^{\mathbf w}_\mu\left(e\notin {\mathcal F}\right)^2. \end{eqnarray*} \begin{remark}[Matroids] \label{re:support} Interestingly, the support of a cavity-monotone measure admits a remarkable structure : it follows from \cite[Theorem 4.6]{wagner08} that for $\mu$ Rayleigh with $\mu(\emptyset)>0$, $I={\mathrm{supp\,}} \mu$ is a \textit{matroid}: \begin{itemize} \item $I$ is not empty ; \item If $B\in I$ and $A\subseteq B$, then $A\in I$ ; \item If $A,B\in I$ and $|A| < |B|$, then $\exists e\in B\setminus A$ such that $A\cup e\in I$. \end{itemize} \end{remark} The cavity-monotone property admits a particularly simple caracterization in the important case where $\mu$ is \textit{exchangeable}, i.e. $\mu(F)=c(|F|)$ for some non-negative coefficients $c(0),\ldots,c(m), m=|E|$: \begin{lemma}[The exchangeable case] \label{lm:exchangeable} An exchangeable measure $\mu$ is cavity-monotone if and only if \begin{enumerate} \item $c$ is log-concave, i.e. $c^2(k)\geq c(k-1)c(k+1)$ for all $0<k<m$, and \item the support $\{0\leq k\leq m:c(k)>0\}$ is an interval containing $0$ and $1$. \end{enumerate} \end{lemma} In particular, so is the measure $\mu(F)={\mathbf{1}}_{(|F|\leq b)}$ describing the local constraints of a $b-$matching. \bp{ of Lemma \ref{lm:exchangeable}} The result essentially follows from the work of Pemantle \cite{pemantle}. Indeed, Theorem 2.7 therein guarantees that $\mu$ is Rayleigh if and only if the sequence $c$ is log-concave and its support is an interval. That the latter must contain $0$ is nothing but the last property in the definition of a cavity-monotone measure. That it is not reduced to $0$ is imposed by the strict inequality in the size-increasing property. Conversely, let us show that any exchangeable measure $\mu$ with $c(0)>0$ and $c(1)>0$ is indeed size-increasing. Fix an external field ${\mathbf w}>0$. By Lemma 2.9 in \cite{pemantle}, the law obtained from ${\mathbb P}^{\mathbf w}_\mu$ by conditionning on the event $\{|{\mathcal F}|=k\}$ is stochastically increasing in $k$. By Proposition 1.2 in \cite{pemantle}, this implies in particular that for every $e\in E$, the following weak inequality holds : $${\mathbb E}^{\mathbf w}_\mu\left[|{\mathcal F}| \big| e\in {\mathcal F}\right]\geq {\mathbb E}^{\mathbf w}_\mu\left[|{\mathcal F}|\right].$$ Note that the condition $c(1)>0$ guarantees that this conditional expectation is well-defined. Since we have not yet used the fact that $c(0)>0$, the above inequality remains true if one changes the coefficient $c(0)$ to $0$. Setting it then back to its initial (positive) value does not affect the left-hand side, but strictly decreases the right-hand side, hence the desired strict inequality. \hfill $\Box$ \section{The cavity equation on finite networks} \label{sec:finite} Let $G=(V,E)$ be a finite graph at the vertices of which some local measures $\mu_i,i\in V$ are specified. We call the resulting object a \textit{network}. A \textit{configuration} ${\mathbf{x}}$ is an assignment of numbers $x_{i\to j}\geq 0$ to every oriented edge $i\to j\in\vec{E}$. Starting from a configuration ${\mathbf{x}}$, we define a new configuration ${\mathbf{y}}={\Gamma}_G({\mathbf{x}})$ by \begin{equation} \label{eq:BPdef} y_{i\to j} = \Gamma^{ij}_{\mu_i}\left(x_{k\to i} : k\in\partial i\setminus j\right), \end{equation} where $\partial i$ denotes the set of all neighbors of $i$. Each $x_{i\to j}$ may be thought of as a message sent by $i$ to $j$ along the edge $ij$, and ${\Gamma}_G$ as a local rule for propagating messages. For $t>0$, the fixed point equation \begin{equation} \label{eq:cavityequation} {\mathbf{x}}=t{\Gamma}_G({\mathbf{x}}) \end{equation} is called the \textit{cavity equation} at activity $t$ on the network $G$. Its relation to the global measure $\mu$ induced by the $(\mu_i)_{i\in V}$ is revealed by the following well-known result. \begin{lemma}[Validity on trees] \label{lm:trees} Assume that $G$ is finite and acyclic. Then, for every activity $t>0$, \begin{enumerate} \item \textbf{convergence} : the cavity equation admits a unique solution ${\mathbf{x}}(t)$, which can be reached from any initial configuration by iterating $t{\Gamma}_G$ a number of times equal to the diameter of $G$ ; \item\textbf{correctness} : for every $i\in V$, the exact marginal law of ${\mathcal F}\cap E_i$ under the Gibbs-Boltzmann law ${\mathbb P}^{t}_G$ is given by directly imposing the external field $\{x_{j\to i}(t):j\in\partial i\}$ onto the local measure $\mu_i$. \end{enumerate} \end{lemma} The important consequence is that on trees, the energy $U(G;t)$ can be determined using only local operations : \begin{eqnarray} \label{eq:cavityformula} U(G;t) & = & \frac{1}{2}\sum_{i\in V}U_{\mu_i}(x_{j\to i}(t) : j\in\partial i) \ = \ \sum_{ij\in E}\frac{x_{j\to i}(t)x_{i\to j}(t)}{t+x_{j\to i}(t)x_{i\to j}(t)}, \end{eqnarray} where the second equality is obtained by applying (\ref{eq:energycavity}) to each $\mu_i,i\in V$. \bp{ of Lemma \ref{lm:trees} } When $i$ is a leaf, the message $y_{i\to j}$ defined by equation (\ref{eq:BPdef}) does not depend at all on the initial configuration $\mathbf{x}$. Iterating this argument immediately proves the convergence part, and we now focus on correctness. Let $G=(V,E)$ be a finite tree, $\circ$ a vertex, and $i$ a neighbour of $\circ$. We let $G_{i\to\circ}$ denote the subtree induced by $\circ$ and all vertices that the edge $i\circ$ separates from $\circ$. Now assume that $G$ is equipped with local measures, and let $G_{i\to\circ}$ inherit from these local measures, except for $\mu_\circ$ which we replace by the trivial local measure with constant value $1$. With these notations, any spanning subgraph $F\subseteq E$ can be uniquely decomposed as the disjoint union of a subset $I\subseteq E_\circ$ and a spanning subgraph $F_i$ on each $G_{i\to\circ},i\in\partial\circ$, with $i\circ\notin F_i$. Thus, writing $\mu_G$ for the global measure on the network $G$, we have for any $t>0$, \begin{eqnarray*} \mu_G(F)t^{|F|} & = & \mu_\circ(I)\prod_{i\in I}t^{|F_i|+1}\mu_{G_{i\to\circ}}({F_i\cup {i\circ}})\prod_{i\notin I}t^{|F_i|}\mu_{G_{i\to\circ}}({F_i}).\\ \end{eqnarray*} Fixing $I$ and summing over all possible values for $F_i,i\in\partial\circ$, we obtain \begin{eqnarray*} {\mathbb P}^t_G({\mathcal F}\cap E_\circ = I) & = & C \mu_\circ(I)\prod_{i\in I}{\mathbb P}^t_{G_{i\to\circ}}({i\circ\in{\mathcal F}})\prod_{i\notin I}{\mathbb P}^t_{G_{i\to\circ}}({i\circ\notin{\mathcal F}}).\\ & = & C'\mu_\circ(I)\prod_{i\in I}\frac{{\mathbb P}^t_{G_{i\to\circ}}({i\circ\in{\mathcal F}})}{{\mathbb P}^t_{G_{i\to\circ}}({i\circ\notin{\mathcal F}})}, \end{eqnarray*} where $C,C'$ are normalizing constants that do not depend on $I$. This already proves that the law of ${\mathcal F}\cap E_\circ$ can be obtained from the local measure $\mu_\circ$ by imposing on each edge $i\circ\in E_\circ$ the external field \begin{equation} \label{eq:treerec} x_{i\to\circ}(t):=\frac{{\mathbb P}^t_{G_{i\to\circ}}({i\circ\in{\mathcal F}})}{{\mathbb P}^t_{G_{i\to\circ}}({i\circ\notin{\mathcal F}})}. \end{equation} In turn, this ratio can now be computed by applying the result to the vertex $i$ in the network $G_{i\to\circ}$ : \begin{eqnarray*} \frac{{\mathbb P}^t_{G_{i\to\circ}}(i\circ \in {\mathcal F})}{{\mathbb P}^t_{G_{i\to\circ}}(i\circ \notin {\mathcal F})} & = & t\Gamma^{i\circ}_{\mu_i}\left(x_{k\to i}(t): k\in\partial i\setminus \circ\right), \end{eqnarray*} which shows that the configuration $\mathbf{x}(t)$ defined on $G$ by (\ref{eq:treerec}) satisfies the cavity equation (\ref{eq:cavityequation}). \hfill $\Box$ There are two distinct parts in Lemma \ref{lm:trees} : convergence and correctness. As we will now show, the former extends to arbitrary graphs under the only assumption that each local measure is cavity-monotone. Henceforth, such a network will be called a \textit{cavity-monotone network}. \begin{theorem}[Convergence on finite cavity-monotone networks] \label{th:convergence} On a finite cavity-monotone network, the cavity equation admits a unique, globally attractive fixed point $\mathbf{x}(t)$ at any activity $t>0$. \end{theorem} \bp{} Fixing $t>0$ and starting with the minimal configuration ${\mathbf{x}}^0:=\bf{0}$, we set inductively $${\mathbf{x}}^{k+1}(t):=t{\Gamma}_G({\mathbf{x}}^k(t)),$$ for all $k\in{\mathbb N}$. By Lemma \ref{lm:equiv}, the Rayleigh property of the local measures $\mu_i,i\in V$ ensures that ${\Gamma}_G$ is coordinate-wise non-increasing on the space of configurations. Therefore, the limiting configuration \begin{equation} {\mathbf{x}}^{-}(t):=\lim_{k\to\infty}\uparrow{\mathbf{x}}^{2k}(t)\qquad\textrm{ and }\qquad {\mathbf{x}}^{+}(t):=\lim_{k\to\infty}\downarrow{\mathbf{x}}^{2k+1}(t) \end{equation} exist, and any fixed point ${\mathbf{x}}=t{\Gamma}_G({\mathbf{x}})$ must satisfy ${\mathbf{x}}^{-}(t)\leq{\mathbf{x}}\leq{\mathbf{x}}^+(t).$ Moreover, ${\Gamma}_G$ is clearly continuous with respect to the product topology on configurations, so that $t{\Gamma}_G({\mathbf{x}}^-(t))={\mathbf{x}}^+(t)$ and $t{\Gamma}_G({\mathbf{x}}^+(t))={\mathbf{x}}^-(t)$. Thus, the existence of unique globally attractive solution to (\ref{eq:cavityequation}) boils down to the equality \begin{equation} \label{eq:toshow} {\mathbf{x}}^-(t)={\mathbf{x}}^+(t). \end{equation} Now applying (\ref{eq:energycavity}) to the local measure at a fixed vertex $i\in V$ yields \begin{eqnarray*} U_{\mu_i}\left(x^-_{j\to i}(t): j\in\partial i\right) \ = \ \sum_{j\in\partial i}\frac{x^-_{j\to i}(t)x^+_{i\to j}(t)}{t+x^-_{j\to i}(t)x^+_{i\to j}(t)}, & & U_{\mu_i}\left(x^+_{j\to i}(t): j\in\partial i\right) \ = \ \sum_{j\in\partial i}\frac{x^+_{j\to i}(t)x^-_{i\to j}(t)}{t+x^+_{j\to i}(t)x^-_{i\to j}(t)}. \end{eqnarray*} Summing over all vertices $i\in V$, we therefore obtain \begin{eqnarray*} \sum_{i\in V}U_{\mu_i}\left(x^-_{j\to i}(t): j\in\partial i\right)& = & \sum_{ij\in E}\left(\frac{x^-_{j\to i}(t)x^+_{i\to j}(t)}{t+x^-_{j\to i}(t)x^+_{i\to j}(t)}+\frac{x^+_{j\to i}x^-_{i\to j}(t)}{t+x^+_{j\to i}(t)x^-_{i\to j}(t)}\right)\\ & = & \sum_{i\in V}U_{\mu_i}\left(x^+_{j\to i}(t): j\in\partial i\right). \end{eqnarray*} This implies (\ref{eq:toshow}), since by Lemma \ref{lm:equiv} each $U_{\mu_i},i\in V$ is strictly increasing in every coordinate. \hfill $\Box$ \section{The limit of infinite volume} \label{sec:infinite} In the previous section, we have established existence and uniqueness of a \textit{cavity solution} on any finite cavity-monotone network. Our concern now is its asymptotical meaning as the size of the underlying graph tends to infinity. Following the principles of the \textit{objective method} \cite{aldste}, we will replace the asymptotical analysis of our finite networks by the direct study of their infinite limits. \subsection{Random weak limits} We first briefly recall the framework of local convergence, introduced by Benjamini and Schramm \cite{bensch} and developped further by Aldous and Steele \cite{aldste}. Examples of successful uses include \cite{aldlyo, BenjaminiSS08,elek,lyotree,borgs2010left,rankarxiv,matcharxiv,dembomontanari}. Here, a \textit{network} will be simply a denumerable graph $G=(V,E)$ whose vertices are equipped with local measures $\mu_i,i\in V$. A \textit{rooted network} $(G,\circ)$ is a network together with the specification of a particular vertex $\circ\in V$, called the \textit{root}. For $\varepsilon\geq 0$, we write $(G',\circ')\stackrel{\varepsilon}{\equiv}(G,\circ)$ if there exists a bijection $\gamma\colon V\to V'$ that preserves \begin{itemize} \item the root : $\gamma(\circ)=\circ'$ ; \item the adjacency : $ij\in E\Longleftrightarrow \gamma(i)\gamma(j)\in E'$ ; \item the support of the local measures : $\mu_i(F)>0 \Longleftrightarrow \mu'_{\gamma(i)}(\gamma(F))>0$, with $\gamma(F)=\{\gamma(i)\gamma(j):ij\in F\}$. \item the values of the local measures, up to $\varepsilon$ : $|\mu'_{\gamma(i)}(\gamma(F))-\mu_i(F)|\leq \varepsilon$. \end{itemize} We let ${\mathcal G}_*$ denote the set of all locally finite connected rooted networks considered up to the isomorphism relation $\stackrel{0}{\equiv}$. In the space ${\mathcal G}_*$, a sequence $\left\{(G_n,\circ_n);n\in {\mathbb N}\right\}$ \textit{converges locally} to $(G,\circ)$ if for every radius $k\in{\mathbb N}$ and every $\varepsilon>0$, there is $n_{k,\varepsilon}\in{\mathbb N}$ such that $$n\geq n_k\Longrightarrow [G_n,\circ_n]_k\stackrel{\varepsilon}{\equiv}[G,\circ]_k,$$ where $[G,\circ]_k$ denotes the finite rooted network obtained by keeping only the vertices lying at graph-distance at most $k$ from $\circ$. It is not hard to construct a distance which metrizes this notion of convergence and turns ${\mathcal G}$ into a complete separable metric space. We can thus import the usual machinery of weak convergence of probability measures on Polish spaces (see e.g. \cite{billingsley}). \textit{Uniform rooting} is a natural procedure for turning a finite deterministic network $G$ into a random element of ${\mathcal G}_*$ : one simply chooses uniformly at random a vertex $\circ$ to be the root, and restrains $G$ to the connected component of $\circ$. If $(G_n)_{n\in{\mathbb N}}$ is a sequence of finite networks and if the sequence of their laws under uniform rooting admits a weak limit ${\mathcal L}\in{\mathcal P}({\mathcal G}_*)$, we call ${\mathcal L}$ the \textit{random weak limit} of the sequence $(G_n)_{n\in{\mathbb N}}$. In \cite{aldlyo}, it was shown that any such limit enjoys a remarkable invariance property known as \textit{unimodularity} : let ${\mathcal G}_{**}$ denote the space of locally finite connected networks with an ordered pair of distinguished adjacent vertices $(G,\circ,i)$, taken up to the natural isomorphism relation and endowed with the natural topology. A measure ${\mathcal L}\in{\mathcal P}({\mathcal G}_{*})$ is called unimodular if it satisfies the \textit{Mass-Transport Principle} : for any Borel function $f\colon {\mathcal G}_{**}\to [0,\infty]$, \begin{equation} \label{eq:mtp} {\mathcal L}\left[\sum_{i\in\partial\circ}f(G,\circ,i)\right]={\mathcal L}\left[\sum_{i\in\partial\circ}f(G,i,\circ)\right], \end{equation} where we have written ${\mathcal L}[\cdot]$ for the expectation with respect to ${\mathcal L}$. This is a deep and powerful notion, which we will now use to extend the results of section \ref{sec:finite} to the infinite setting. \subsection{Main result : validity of the cavity method on unimodular trees} The definition of ${\Gamma}_G$ remains valid for any locally finite network $G$. When the latter is cavity-monotone, the configurations ${\mathbf{x}}^{-}(t),{\mathbf{x}}^+(t)$ introduced in the proof of Theorem \ref{th:convergence} remain perfectly well-defined, and the convergence of the cavity method again boils down to the identity $\mathbf{x}^-(t)=\mathbf{x}^+(t)$. However, the proof of the latter involves a summation over all edges, which is no longer valid in the infinite setting. Instead, the desired $\mathbf{x}^-(t)=\mathbf{x}^+(t)$ will be derived from unimodularity, and will thus hold for any random weak limit of finite networks. Indeed, applying the Mass-Transport Principle to the function $$f(G,\circ,i) := \frac{x^-_{i\to\circ}(t)x^+_{\circ\to i}(t)}{t+x^-_{i\to\circ}(t)x^+_{\circ\to i}(t)}$$ yields ${\mathcal L}\left[U_{\mu_\circ}(x^-_{i\to\circ}(t):i\in\partial\circ)\right] = {\mathcal L}\left[U_{\mu_{\circ}}(x^+_{i\to\circ}(t):i\in\partial\circ)\right]$ ($f$ is Borel as the pointwise limit of continuous functions). Under the assumption ${\mathcal L}\left[\rm{rank}\,(\mu_\circ)\right]<\infty$, this expectation is finite, and the size-increasing property of $\mu_\circ$ then implies that ${\mathcal L}-$almost surely, $x^-_{i\to\circ}(t)=x^{+}_{i\to\circ}(t)$ for all $i\in\partial\circ$. This automatically extends to every oriented edge since under unimodularity, \textit{everything shows up at the root} (another fruitful application of the Mass-Transport-Principle, see \cite[Lemma 2.3]{aldlyo}). We state this as a Theorem. \begin{theorem}[Convergence of the cavity method on unimodular networks] \label{th:unimodular} Let ${\mathcal L}$ be a unimodular probability measure supported by cavity-monotone networks. If ${\mathcal L}\left[\rm{rank}\,(\mu_\circ)\right]<\infty$, then the cavity equation admits ${\mathcal L}-$a.-s. a unique, globally attractive solution $\mathbf{x}(t)$ at any activity $t>0$. \end{theorem} By analogy with formula (\ref{eq:cavityformula}) in the finite case, the (now well-defined) quantity \begin{equation} \label{eq:ulim} u({\mathcal L};t)=\frac{1}{2}{\mathcal L}\left[\sum_{i\in\partial\circ}\frac{x_{i\to\circ}(t)x_{\circ\to i}(t)}{t+x_{i\to\circ}(t)x_{\circ\to i}(t)}\right \end{equation} appears as a natural candidate for the limiting energy of any sequence of finite networks whose random weak limit is ${\mathcal L}$. Our second result is the validity of this \textit{cavity ansatz} when ${\mathcal L}$ is concentrated on trees. \begin{theorem}[Asymptotical correctness of the cavity method] \label{th:main} Let $(G_n)_{n\in{\mathbb N}}$ be a sequence of finite cavity-monotone networks admitting a random weak limit ${\mathcal L}$ which is concentrated on cavity-monotone trees. Assume that the local rank at a uniformly chosen vertex is uniformly integrable as $n\to\infty$. Then, \iffalse \begin{eqnarray} \label{eq:energy} \frac{U(G_n;t)}{|V_n|} & \xrightarrow[n\to\infty]{} & u({\mathcal L};t) \\ \label{eq:ldp} \frac{1}{|V_n|}\log \frac{Z(G_n;t)}{Z(G_n;1)} & \xrightarrow[n\to\infty]{} & \int_{1}^t \frac{u({\mathcal L};s)}s ds. \end{eqnarray} \fi \begin{eqnarray} \label{eq:energy} \frac{U(G_n;t)}{|V_n|} & \xrightarrow[n\to\infty]{} & u({\mathcal L};t). \end{eqnarray} If $|E_n|=O(|V_n|)$ and all the local measures take values in $\{0\}\cup K$ for a fixed compact $K\subseteq (0,\infty)$, then \begin{eqnarray} \label{eq:number}\frac{1}{|V_n|}\log {Z(G_n;t)} & \xrightarrow[n\to\infty]{} & {\mathcal L}[\log\mu_\circ(\emptyset)] + \int_{0}^t \frac{u({\mathcal L};s)}s ds,\\ \label{eq:rank} \frac{M(G_n)}{|V_n|} & \xrightarrow[n\to\infty]{} & m({\mathcal L}):=\lim_{t\to\infty}\uparrow u({\mathcal L};t). \end{eqnarray} \end{theorem} \begin{remark}[Large deviation principle] \label{re:ldp} Integrating (\ref{eq:energy}) immediately implies that \begin{eqnarray*} \label{eq:ldp} \frac{1}{|V_n|}\log \frac{Z(G_n;t)}{Z(G_n;1)} & \xrightarrow[n\to\infty]{} & \int_{1}^t \frac{u({\mathcal L};s)}s ds. \end{eqnarray*} It will later be checked that $t\mapsto u({\mathcal L};t)$ is continuous on ${\mathbb R}_+$ (Remark \ref{re:continuity}). Therefore, denoting by ${\mathcal F}_n$ a random spanning subgraph with the Gibbs-Boltzmann law ${\mathbb P}^1_{G_n}$, G\"artner-Ellis Theorem \cite{dembozeitouni} guarantees that $|{\mathcal F}_n|/|V_n|$ obeys a large deviation principle with rate $|V_n|$ and good rate function $y\mapsto \int_{0}^\infty \left(y-u({\mathcal L};e^s)\right)^+ ds$. \end{remark} \subsection{Proof of the main result} \begin{lemma}[Tree approximation] \label{lm:treeapprox} Let $(G,\circ)$ be a finite rooted cavity-monotone network, and let $k\in{\mathbb N}$. If $[G,\circ]_{2k+2}$ is a tree, then for every activity $t>0$, \begin{eqnarray*} U_{\mu_\circ}\left(x^{2k}_{i\to\circ}(t):i\in\partial\circ\right)\leq {\mathbb E}^t_G\left[|{\mathcal F}\cap E_\circ|\right] \leq U_{\mu_\circ}\left(x^{2k+1}_{i\to\circ}(t):i\in\partial\circ\right). \end{eqnarray*} \end{lemma} \bp{} The proof makes use of a classical ingredient known as the \textit{spatial Markov property}, which we first briefly recall. Let $G=(V,E)$ be a finite network and let $S$ be an induced subgraph. We let $\partial S$ denote the boundary of $S$, i.e. the set of edges having one end-point in $S$ and one in $S^c$. Any \textit{boundary condition} $B\subseteq \partial S$ can be used to assign local measures to the vertices of $S$, namely $\mu^B_i(F):=\mu_i\left(F\cup (B\cap E_i)\right)$. Note that these local measures differ from the original ones only for vertices that are adjacent to the boundary. The resulting network is denoted by $S|B$. Now, a spanning subgraph $F\subseteq E$ is clearly the disjoint union of a spanning subgraph $F_{\rm{int}}$ of $S$, a boundary condition $B\subseteq \partial S$ and a spanning subgraph $F_{\rm{ext}}$ in $S^c$. The product form of $\mu_G$ immediately yields : \begin{equation} {\mathbb P}^t_G({\mathcal F}=F)={\mathbb P}^t_{S|B}({\mathcal F}=F_{\rm{int}}){\mathbb P}^t_G({\mathcal F}\cap\partial S=B){\mathbb P}^t_{S^c|B}({\mathcal F}=F_{\rm{ext}}). \end{equation} In other words, conditionally on the boundary ${\mathcal B}:={\mathcal F}\cap \partial S$, the restrictions of ${\mathcal F}$ to $S$ and $S^c$ are independent with law ${\mathbb P}^t_{S|{\mathcal B}}$ and ${\mathbb P}^t_{S^c|{\mathcal B}}$, respectively. Applying this to the tree $S=[G,\circ]_{2k+2}$, \begin{eqnarray*} {\mathbb E}^t_G\left[|{\mathcal F}\cap E_\circ|\right]& = &\sum_{B\subseteq \partial S}{\mathbb P}^t_G({\mathcal F}\cap\partial S=B){\mathbb E}^t_{S|B}\left[|{\mathcal F}\cap E_\circ|\right]\\ & = & \sum_{B\subseteq \partial S}{\mathbb P}^t_G({\mathcal F}\cap\partial S=B)U_{\mu_\circ}\left(x^{(B)}_{i\to\circ}(t):i\in\partial\circ\right), \end{eqnarray*} where we have applied Lemma \ref{lm:trees} to the tree $S|B$, writing $\mathbf{x}^{(B)}(t)$ for the unique solution to the cavity equation at activity $t$ thereon. But by monotony of the cavity operator, each $x^{(B)}_{i\to\circ}(t),i\in\partial\circ$ must satisfy $x^{2k}_{i\to\circ}(t)\leq x^{(B)}_{i\to\circ}(t)\leq x^{2k+1}_{i\to\circ}(t)$. Using the size-increasing property of $\mu_\circ$, we see that $$U_{\mu_\circ}\left(x^{2k}_{i\to\circ}(t):i\in\partial\circ\right) \leq U_{\mu_\circ}\left(x^{(B)}_{i\to\circ}(t):i\in\partial\circ\right)\leq U_{\mu_\circ}\left(x^{2k+1}_{i\to\circ}(t):i\in\partial\circ\right),$$ and re-injecting this into the above equation finally yields the desired inequalities. \hfill $\Box$ Let us now see how Lemma \ref{lm:treeapprox} implies the convergence (\ref{eq:energy}). Let $(G_n)_{n\in{\mathbb N}}$ be a sequence of finite cavity-monotone networks admitting a random weak limit ${\mathcal L}$ which is concentrated on cavity-monotone trees. Denote by ${\mathcal L}_n\in{\mathcal P}({\mathcal G}_*)$ the law under uniform rooting of $G_n$, so that ${\mathcal L}_n\Rightarrow{\mathcal L}$. We will use the short-hand $u_{k}(G,\circ)=U_{\mu_\circ}\left(x^{k}_{i\to\circ}(t):i\in\partial\circ\right)$, and $\chi_k(G,\circ)$ for the indicator function that $[G,\circ]_{2k+2}$ is a tree. Lemma \ref{lm:treeapprox} guarantees that for any finite cavity-monotone network $G$ and any vertex $\circ$, \begin{equation} \label{eq:ineqq}\chi_k(G,\circ)u_{2k}(G,\circ)\leq {\mathbb E}^t_{G}\left[|{\mathcal F}|\cap E_\circ\right]\leq \chi_k(G,\circ)u_{2k+1}(G,\circ) + (1-\chi_k(G,\circ))\rm{rank(\mu_\circ)}. \end{equation} As functions of $(G,\circ)$, the left-hand side and right-hand side are continuous on ${\mathcal G}_*$, since they depend only on $[G,\circ]_{2k+2}$. Moreover, both are dominated by $(G,\circ)\mapsto \rm{rank(\mu_\circ)}$ which is assumed to be uniformly integrable with respect to the sequence $({\mathcal L}_n)_{n\in{\mathbb N}}$. Thus, their expectation under ${\mathcal L}_n$ tends to their expectation under ${\mathcal L}$ as $n\to\infty$. But $\chi_k$ is zero on the support of ${\mathcal L}$, so we are simply left with \begin{eqnarray*} \frac{1}{2}{\mathcal L}\left[U_{\mu_\circ}\left(x^{2k}_{i\to\circ}(t):i\in\partial\circ\right)\right] \ \leq \ \liminf_{n\to\infty}\frac{U(G_n;t)}{|V_n|} & \leq & \limsup_{n\to\infty}\frac{U(G_n;t)}{|V_n|} \ \leq \ \frac{1}{2}{\mathcal L}\left[U_{\mu_\circ}\left(x^{2k+1}_{i\to\circ}(t):i\in\partial\circ\right)\right]. \end{eqnarray*} Since the random weak limit ${\mathcal L}$ is unimodular, Theorem \ref{th:unimodular} finally implies that both the lower and upper bounds tend to ${\mathcal L}\left[U_{\mu_\circ}\left(x_{i\to\circ}(t):i\in\partial\circ\right)\right]=u({\mathcal L};t)$ as $k\to\infty$. Note that the requirement ${\mathcal L}[\rm{rank}(\mu_\circ)]<\infty$ in Theorem \ref{th:unimodular} is here automatically fullfilled, by the uniform integrability assumption. It now remains to show (\ref{eq:number}) and (\ref{eq:rank}). The identity (\ref{eq:logderivative}) implies that for any activity $t>0$ and any finite network $G$ satisfying $\mu(\emptyset)>0$, $$\frac{1}{|V|}\log {Z(G;t)} = \frac{1}{|V|}\sum_{\circ\in V}\log \mu_\circ(\emptyset) + \int_{0}^t \frac{U(G;s)}{s|V|} ds.$$ Now take $G=G_n$ and let $n\to\infty$ : the compactness assumption guarantees that $\log \mu_\circ(\emptyset)$ is bounded uniformly in $n$, so the first term converges to ${\mathcal L}[\log\mu_\circ(\emptyset)]$. As per the second one, it tends to $\int_{0}^t \frac{u({\mathcal L};s)}s ds$ because of (\ref{eq:energy}), provided the uniform domination holds in Lebesgue's dominated convergence Theorem. The latter fact is ensured by the first inequality in Lemma \ref{lm:unifctrl} below, combined with the compactness assumption and the fact that $|E_n|=O(|V_n|)$. The second inequality in Lemma \ref{lm:unifctrl} easily guarantees (\ref{eq:rank}). \begin{lemma}[Uniform controls for the energy] \label{lm:unifctrl} Let $G$ be a finite cavity-monotone network. As a function of the activity $t$, the energy $U(G;t)$ increases from $0$ to $M(G)$. Furthermore, the rate of convergence to these two extrema can be precisely controlled : \begin{eqnarray} \label{eq:ctrlzero} \forall t >0, \qquad U(G;t) & \leq & t \sum_{ij\in E}A(\mu_i)A(\mu_j);\\ \label{eq:ctrlinfinity} \forall t > 1, \qquad U(G;t) & \geq & M(G) - \frac{1}{\log t}\left(|E|\log 2 + \sum_{i\in V}\log A(\mu_i)\right). \end{eqnarray} where $A(\mu)=\frac{\max \mu}{\min \mu}$, with $\max \mu={\max\{\mu(F):F\in{\mathrm{supp\,}}(\mu)\}}$ and $\min\mu ={\min\{\mu(F):F\in{\mathrm{supp\,}}(\mu)\}}$. \end{lemma} \bp{ of Lemma \ref{lm:unifctrl}} That the energy increases with the activity is equivalent by (\ref{eq:logderivative}) to the convexity of $\theta\mapsto \log Z(G;e^\theta)$, a direct consequence of H\"older's inequality. This also implies that for any $t>1$ \begin{eqnarray*} {U(G;t)}\log t & \geq & \log\frac{Z(G;t)}{Z(G;1)}. \end{eqnarray*} Clearly $Z(G;t)\geq t^{M(G)}\min \mu$ and $Z(G;1)\leq 2^{|E|}\max \mu$ and $A(\mu)\leq\prod_{i\in V}A(\mu_i)$, so (\ref{eq:ctrlinfinity}) follows. Regarding (\ref{eq:ctrlzero}), we have for any $t>0$ \begin{eqnarray*} {U(G;t)} & = & \sum_{ij\in E}{{\mathbb P}^t(ij\in{\mathcal F})}\\ & = & t\sum_{ij\in E}\frac{\sum_{F\subseteq E\setminus ij}\mu(F\cup ij)t^{|F|}}{\sum_{F\subseteq E}\mu(F)t^{|F|}}\\ & \leq & t\sum_{ij\in E}\max_{F\subseteq E\setminus ij,\mu(F)>0}\frac{\mu(F\cup ij)}{\mu(F)}\\ & \leq & t\sum_{ij\in E}A(\mu_i)A(\mu_j), \end{eqnarray*} where the third line uses the standard inequality $\frac{a+b}{c+d}\leq \max(\frac{a}{c},\frac{b}{d})$ for any $a,b,c,d>0$, and the crucial fact that $\mu(F\cup ij)>0 \Longrightarrow \mu(F)>0$ (see Remark \ref{re:support}). \section{The limit of infinite activity} \label{sec:activity} The goal of this final section is to describe the important quantity $m({\mathcal L})$ introduced in Theorem \ref{th:main} directly in terms of a certain local equation which we naturally call the \textit{cavity equation at infinite activity}. This will then be used to establish the explicit formulae that have been mentioned in the introduction. \subsection{The cavity equation at infinite activity} Let $G$ be a cavity-monotone network. From Lemma \ref{lm:equiv}, it follows that $(t,\mathbf{x})\mapsto t\Gamma_G(t\mathbf{x})$ is increasing in $t$ and decreasing in $\mathbf{x}$. We may thus define a limiting cavity-operator by $$\overline{\Gamma}_G(\mathbf{x}):=\lim_{t\to\infty}\uparrow t\Gamma_G(t\mathbf{x}).$$ By monotony, $\overline\Gamma_G\colon [0,\infty)^{\vec E}\to (0,\infty]^{\vec E}$ is well-defined without any ambiguity regarding the order in which the limits $t\to\infty$ and $\mathbf{x}\to 0$ are taken. Note also that $\overline\Gamma_G$ can be composed with $\Gamma_G\colon (0,\infty]^{\vec E}\to[0,\infty)^{\vec E}$, yielding a two-step local update rule on $(0,\infty]^{\vec E}$ which will now play a crucial role. \begin{theorem}[The cavity equation at infinite activity] \label{th:infiniteactivity} Let $G$ be a cavity-monotone network on which the cavity equation at activity $t$ admits a unique globally attractive fixed point $\mathbf{x}(t)$, for every $t>0$. Then, \begin{equation} \label{eq:uxox} \overline{{\mathbf{x}}}:=\lim_{t\to\infty}\uparrow {\mathbf{x}}(t) \end{equation} exists in $(0,\infty]^{\vec E}$, and is the smallest solution to the so-called \textit{cavity equation at infinite activity} on $G$ : \begin{equation} \label{eq:reczero} \overline{{\mathbf{x}}}=\left(\overline{\Gamma}_G\circ\Gamma_G\right)(\overline{{\mathbf{x}}}). \end{equation} In particular, for any unimodular probability measure ${\mathcal L}$ concentrated on cavity-monotone networks, and satisyfing ${\mathcal L}\left[\rm{rank}(\mu_\circ)\right]<\infty$, we have $$m({\mathcal L})=\frac{1}{2}{\mathcal L}\left[U_{\mu_\circ}\left(\overline{x}_{i\to\circ}:i\in\partial\circ\right)\right].$$ \end{theorem} \bp{ of Theorem \ref{th:infiniteactivity}} By assumption $\mathbf{x}^{k}(t)\to\mathbf{x}(t)$ for any $t>0$, where $\mathbf{x}^0\equiv\bf{0}$ and for all $k\in{\mathbb N}$, \begin{eqnarray} \label{eq:klambda} \mathbf{x}^{k+1}(t)=t\Gamma_G\left(t\frac{\mathbf{x}^k(t)}{t}\right) & \textrm{ or equivalently, } & \frac{\mathbf{x}^{k+1}(t)}{t}=\Gamma_G\left(\mathbf{x}^{k}(t)\right) . \end{eqnarray} But $(t,\mathbf{x})\mapsto t\Gamma_G(t\mathbf{x})$ is increasing in $t$ and decreasing in $\mathbf{x}$, so an immediate induction over $k$ shows that $t\mapsto t^{-1}{\mathbf{x}^{k}(t)}$ and $t\mapsto \mathbf{x}^{k}(t)$ are respectively non-increasing and non-decreasing, for every $k\in{\mathbb N}$. Thus, $t\mapsto \mathbf{x}(t)$ is non-decreasing, hence the existence of (\ref{eq:uxox}). The identity (\ref{eq:reczero}) is then obtained by passing to the limits in (\ref{eq:klambda}). Finally, if $\mathbf{y}\in(0,\infty]^{\vec{E}}$ satisfies $\mathbf{y}=(\overline{\Gamma}_G\circ\Gamma_G)(\mathbf{y})$, then for every $k\in{\mathbb N}$ and $t>0$, \begin{equation} \label{eq:maximal} \mathbf{x}^{2k}(t) \leq \mathbf{y}. \end{equation} Indeed, the property is trivial when $k=0$, and is preserved from $k$ to $k+1$ because $t\Gamma_G(t{\mathbf w})\leq\overline{\Gamma}_G({\mathbf w})$ for any ${\mathbf w}\in [0,\infty)^{\vec{E}}$. Letting $k\to\infty$ and then $t\to\infty$ in (\ref{eq:maximal}) yields $\overline{\mathbf{x}}\leq\mathbf{y}$, as desired. \hfill $\Box$ \begin{remark}[Continuity with respect to the activity] \label{re:continuity} Incidentally, we have just obtained that $t\mapsto t^{-1}{\mathbf{x}(t)}$ and $t\mapsto \mathbf{x}(t)$ are respectively non-increasing and non-decreasing, so that \begin{eqnarray*} 0< s\leq t & \Longrightarrow & \frac{s}{t}\mathbf{x}(t) \leq \mathbf{x}(s)\leq \mathbf{x}(t). \end{eqnarray*} This guarantees the continuity of $t\mapsto \mathbf{x}(t)$, and hence that of $u({\mathcal L};t)$, as promised in Remark \ref{re:ldp}. \end{remark} \subsection{Explicit resolution for $b-$matchings on GW trees} Many classical sequences of diluted random graphs admit almost surely a particularly simple random weak limit ${\mathcal L}$, namely a \textit{unimodular Galton-Watson (UGW) tree} (see Example 1.1 in \cite{aldlyo}). This random rooted tree is parametrized by a probability distribution $\pi\in{\mathcal P}({\mathbb N})$ with finite mean, called its \textit{degree distribution}. It is obtained by a Galton-Watson branching process where the root has offspring distribution $\pi$ and all other genitors have the size-biased offspring distribution $\widehat{\pi}\in{\mathcal P}({\mathbb N})$ defined by \begin{equation*} \label{eq:F} \forall n\in {\mathbb N}, \widehat{\pi}_{n} = {(n+1) \pi_{n+1}}/{\sum_{k} k \pi_k}. \end{equation*} Thanks to the markovian nature of the branching process, the cavity equation at infinite activity simplifies into a \textit{recursive distributional equation} (RDE) (see \cite{aldousbandyopadhya} for a survey). Let us describe it and solve it in the case of $b-$matchings, where $b\geq 1$ is fixed. The local cavity and energy ratios are simply \begin{eqnarray*} \Gamma(x_1,\ldots,x_n)=\frac{\sum_{I\subseteq [N]:|I|\leq b-1}\prod_{i\in I}x_i}{\sum_{I\subseteq [N]:|I|\leq b}\prod_{i\in I}x_i} & \textrm{ and } & U(x_1,\ldots,x_n) = \frac{\sum_{I\subseteq [N]:|I|\leq b}|I|\prod_{i\in I}x_i}{\sum_{I\subseteq [N]:|I|\leq b}\prod_{i\in I}x_i}. \end{eqnarray*} In the infinite activity limit, the local cavity ratio becomes \begin{eqnarray*} \overline{\Gamma}(x_1,\ldots,x_n) & = & \frac{\sum_{I\subseteq [N]:|I|= b-1}\prod_{i\in I}x_i}{\sum_{I\subseteq [N]:|I|= b}\prod_{i\in I}x_i}, \end{eqnarray*} where all conventions regarding degenerate cases are obtained by taking the corresponding limits. Given $Q\in{\mathcal P}((0,\infty])$, we let $\Theta(Q)\in{\mathcal P}\left([0,1])\right)$ denote the law of $\Gamma\left(Y_{1},\ldots,Y_{\widehat{N}}\right)$, where $\widehat{N}$ has law $\widehat{\pi}$ and $Y_1,Y_2,\ldots$ are i.i.d. with law $Q$, independent of $\widehat N$. Similarly, given $P\in{\mathcal P}([0,1])$, we let $\overline{\Theta}(P)\in{\mathcal P}\left((0,\infty]\right)$ denote the law of $\overline{\Gamma}\left(X_{1},\ldots,X_{\widehat{N}}\right)$, where $\widehat{N}$ has law $\widehat{\pi}$ and $X_1,X_2,\ldots$ are i.i.d. with law $P$, independent of $\widehat N$. Thanks to the markovian nature of the GW branching process, the law $Q\in{\mathcal P}((0,\infty])$ of a message sent towards the root in the configuration $\overline{\mathbf{x}}$ must satisfy the RDE $Q = (\overline{\Theta}\circ\Theta)(Q)$. Equivalently, $P=\Theta(Q)$ must satisfy $P = (\Theta\circ\overline{\Theta})(P).$ More precisely, letting $M(P)$ denote the expectation of $\frac{1}{2}U\left(Y_{1},\ldots,Y_{N}\right)$, where $N$ has law $\pi$ and $Y_1,Y_2,\ldots$ are i.i.d. with law $Q=\overline{\Theta}(P)$, independent of $N$, we may rephrase Theorem \ref{th:infiniteactivity} as follows (distributions are here endowed with the usual stochastic order) : \begin{corollary} $m({\mathcal L})=M(P)$, where $P\in{\mathcal P}([0,1])$ is the smallest solution to the RDE $P = (\Theta\circ\overline{\Theta})(P)$. \end{corollary} The fixed points of $\Theta\circ\overline{\Theta}$ turn out to be in one-to-one correspondance with the \textit{historical minima} of a certain function $H\colon[0,1]\to{\mathbb R}$ defined in terms of the degree generating function $\phi(s)=\sum_{k}\pi_ks^k$ : \begin{equation*} H(s)=b-\frac{b}{2}g(s)-\frac{b}{2}(g\circ f)(s)+\frac{c}{2}f(s)(f\circ f)(s), \end{equation*} \begin{equation*} \textrm{ with }\qquad c=\phi'(1),\qquad\qquad f(s)=\frac{1}{c}\sum_{k=0}^{b-1}\frac{s^{k}\phi^{(k+1)}(1-s)}{k!} \qquad\textrm{ and }\qquad g(s)=\sum_{k=0}^b\frac{t^{k}\phi^{(k)}(1-s)}{k!}. \end{equation*} A \textit{historical minima} of $H$ is a number $s\in [0,1]$ satisfying $H'(s)=0$ and $H(t)>H(s)$ for all $t\in[0,s)$. \begin{theorem}[Resolution of the RDE] \label{th:rde} Let $s_1<\ldots<s_r$ denote the historical minima of the function $H$. Then, the distributional equation $P = (\Theta\circ\overline{\Theta})(P)$ admits exactly $r$ solutions, and they are stochastically ordered : $P_1<\ldots<P_r$. Moreover, for each $1\leq i\leq r$, we have $M(P_i)=H(s_i)$. \end{theorem} In particular, $m({\mathcal L})=\min H$, which is exactly the formula given in Theorem \ref{th:KSb}. Theorem \ref{th:rde} was established in \cite{rankarxiv} for the special case $b=1$, but the proof can easily be adapted to the general case. For the sake of completeness, we have included a general proof in the Appendix. \section*{Appendix : resolution of the RDE} First observe that the mappings $\Theta, \overline{\Theta}$ and $M$ are all decreasing with respect to stochastic order, and continuous with respect to the topology of weak convergence. Note also that $c\widehat{f}'(t)t=bf(t)$, so that $H'(t)=c f'(t)\left((f\circ f)(t)-t\right).$ Thus, $H'(t)=0$ if and only if $(f\circ f)(t)=t.$ \begin{lemma}[Properties of $\Gamma,\overline{\Gamma}$ and $U$]\mbox{} \label{lm:propgamma} \begin{enumerate} \item Let $(x_1,\ldots,x_n) \in [0,1]^n$. Then, \begin{enumerate} \item $\overline{\Gamma}(x_1,\ldots,x_n)=\infty \Longleftrightarrow \sum_{i=1}^{n}{\mathbf{1}}_{\left\{x_i>0\right\}} < b$ ; \item Setting $y_i=\overline{\Gamma}(x_k:k\neq i)$, we have $\displaystyle{\sum_{i=1}^n\frac{x_iy_i}{1+x_iy_i}{\mathbf{1}}_{\{y_i<\infty\}} = b{\mathbf{1}}_{\left\{\sum_{i=1}^{n}{\mathbf{1}}_{\left\{x_i>0\right\}}>b\right\}}}$ \end{enumerate} \item Let $(y_1,\ldots,y_n) \in (0,\infty]^n$. Then, \begin{enumerate} \item $\Gamma(y_1,\ldots,y_n)>0 \Longleftrightarrow \sum_{i=1}^{n}{\mathbf{1}}_{\left\{y_i=\infty\right\}}<b$; \item Setting $x_i'=\Gamma(y_k:k\neq i)$, we have $\displaystyle{\sum_{i=1}^n\frac{x_i'y_i}{1+x_i'y_i}{\mathbf{1}}_{\{x_i'<\infty\}} = U(x_1',\ldots,x_n') - b\wedge \sum_{i=1}^{n}{\mathbf{1}}_{\left\{y_i=\infty\right\}}}.$ \end{enumerate} \end{enumerate} \end{lemma} \bp{} Properties $1.a$ and $2.a$ are straightforward from the definition of $\overline{\Gamma}$ and $\Gamma$. Regarding property $1.b$, set $K=\#\left\{i\in[n]:x_i>0\right\}.$ If the sum is non-zero then there must be an $i$ satisfying both $y_i>0$ and $x_i<\infty$. By $1.a$, this implies $K>b$. Conversely, if $K>b$ then $x_i<\infty$ for every $i\in[n]$. We have just shown \begin{eqnarray*} \sum_{i=1}^n\frac{x_iy_i}{1+x_iy_i}{\mathbf{1}}_{\{y_i<\infty\}} & = & {\mathbf{1}}_{\left\{K>b\right\}}\sum_{i=1}^n\frac{x_iy_i}{1+x_iy_i}.\\ & = & {\mathbf{1}}_{\left\{K>b\right\}}\sum_{i=1}^n\frac{\sum_{|I|=b,I\ni i}\prod_{k\in I}x_k}{\sum_{|I|=b}\prod_{k\in I}x_k}\\ & = & b{\mathbf{1}}_{\left\{K> b\right\}}, \end{eqnarray*} where the second equality is obtained by replacing $y_i=\overline{\Gamma}(x_k:k\neq i)$ by its definition. For property $2.b$, set $L=\#\left\{i\in[n]:y_i=\infty\right\}.$ When $L=0$, $2.b$ boils down to formula (\ref{eq:energycavity}). The case $1\leq L \leq b$ can then be obtained by successively setting each of the $L$ variables to $\infty$, which amounts to condition on the presence of the corresponding ground elements. For $L\geq b$, both sides of the equation are zero. \hfill $\Box$ \begin{lemma} \label{lm:last} Assume that $P\xrightarrow{\overline{\theta}}Q\xrightarrow{\theta}P'$. Set $s=P(\{0\}^c)$, $t=Q(\{\infty\})$ and $s'=P'(\{0\}^c)$. Then, \begin{enumerate} \item $s \xrightarrow{f} t \xrightarrow{f} s'$ ; \item $P'\leq P \Longrightarrow M(P)\leq H(s)$ ; \item $P'\geq P \Longrightarrow M(P)\geq H(s)$. \end{enumerate} In particular, if $P = (\Theta\circ\overline{\Theta})(P)$ then $M(P) = H(s)$ and $H'(s)=0$. \end{lemma} \bp{} In the whole proof, $N$ denotes a generic random integer with law $\pi$, $\widehat{N}$ a generic random integer with law $\widehat{\pi}$, $X,X_1,X_2,\ldots$ generic $(0,\infty]-$valued random variables with law $P$, $Y,Y_1,Y_2,\ldots$ generic $[0,1]-$valued random variables with law $Q$, and $X',X_1',X_2',\ldots$ generic $(0,\infty]-$valued random variables with law $P'$. We use the convention that all variables appearing under the same expectation are independent. With these notations, properties $1.a$ and $2.a$ in Lemma \ref{lm:propgamma} give $${\mathbb P}\left(Y=\infty\right) = {\mathbb P}\left(\sum_{i=1}^{\widehat N}{\mathbf{1}}_{\left\{X_i>0\right\}} < b\right)\quad\textrm{ and }\qquad{\mathbb P}\left(X'>0\right) = {\mathbb P}\left(\sum_{i=1}^{\widehat N}{\mathbf{1}}_{\left\{Y_i=\infty\right\}}< b\right),$$ which, in view of the definition of $f$, yields exactly the first claim of the Lemma. Now, using property $1.b$ and $2.b$, we respectively obtain the two following identities : \begin{eqnarray*} {\mathbb E}\left[\frac{XY}{1+XY}{\mathbf{1}}_{\{Y<\infty\}}\right] & = & \sum_{n\in{\mathbb N}}\widehat{\pi}(n){\mathbb E}\left[\frac{X\overline{\Gamma}\left(X_1,\ldots,X_{n-1}\right)}{1+X\overline{\Gamma}\left(X_1,\ldots,X_{n-1}\right)}{\mathbf{1}}_{\left\{\overline{\Gamma}\left(X_1,\ldots,X_{n-1}\right)<\infty\right\}}\right]\\ & = & \sum_{n\in{\mathbb N}}\pi(n)n{\mathbb E}\left[\frac{X\overline{\Gamma}\left(X_1,\ldots,X_{n-1}\right)}{1+X\overline{\Gamma}\left(X_1,\ldots,X_{n-1}\right)}{\mathbf{1}}_{\left\{\overline{\Gamma}\left(X_1,\ldots,X_{n-1}\right)<\infty\right\}}\right]\\ & = & \sum_{n\in{\mathbb N}}\pi(n){\mathbb E}\left[\sum_{i=1}^n\frac{X_i\overline{\Gamma}\left(X_k:k\neq i\right)}{1+X_i\overline{\Gamma}\left(X_k:k\neq i\right)}{\mathbf{1}}_{\left\{\overline{\Gamma}\left(X_k : k\neq i\right)<\infty\right\}}\right]\\ & = & b{\mathbb P}\left(\sum_{i=1}^N{\mathbf{1}}_{\left\{X_i>0\right\}}> b\right)\\ & = & b(1-g(s)).\\ \\ \\ {\mathbb E}\left[\frac{X'Y}{1+X'Y}{\mathbf{1}}_{\{Y<\infty\}}\right] & = & \sum_{n\in{\mathbb N}}\widehat{\pi}(n){\mathbb E}\left[\frac{Y\Gamma\left(Y_1,\ldots,Y_{n-1}\right)}{1+Y\Gamma\left(Y_1,\ldots,Y_{n-1}\right)}{\mathbf{1}}_{\{Y<\infty\}}\right]\\ & = & \sum_{n\in{\mathbb N}}\pi(n)n{\mathbb E}\left[\frac{Y\Gamma\left(Y_1,\ldots,Y_{n-1}\right)}{1+Y\Gamma\left(Y_1,\ldots,Y_{n-1}\right)}{\mathbf{1}}_{\{Y<\infty\}}\right]\\ & = & \sum_{n\in{\mathbb N}}\pi(n){\mathbb E}\left[\sum_{i=1}^n\frac{Y_i\Gamma\left(Y_k:k\neq i\right)}{1+Y_i\Gamma\left(Y_k:k\neq i\right)}{\mathbf{1}}_{\{Y_i<\infty\}}\right]\\ & = & {\mathbb E}\left[U(Y_1,\ldots,Y_N)\right] - {\mathbb E}\left[b\wedge\sum_{i=1}^N{\mathbf{1}}_{\left\{Y_i=\infty\right\}}\right] \\ & = & 2M(P) - b(1-g(s)) - csf(s).\\ \end{eqnarray*} Since the mapping $\frac{xy}{1+xy}$ is increasing in $x$, claims 2 and 3 follow. \hfill $\Box$ \bp{ of Theorem \ref{th:rde}} Fix $s\in[0,1]$ satisfying $H'(s)=0$, i.e. $(f\circ f)(s)=s$. Define $P_0^{s}\in{\mathcal P}([0,1])$ to be the Bernoulli distribution with parameter $s$, and set then iteratively $$P_{n+1}^{s}=(\Theta\circ\overline{\Theta})(P_{n}^{s})$$ for all $n\in{\mathbb N}$. By part 1 in Lemma \ref{lm:last}, $P_1^{s}$ is a distribution on $[0,1]$ satisfying $P_1(\{0\}^c)=s$. Since $P^{s}_0$ is the largest such distribution, we have $P^{s}_1\leq P^{s}_0$. But both $\Theta$ and $\overline{\Theta}$ are decreasing, so by immediate induction, the sequence $(P_n^{s})_{n\in{\mathbb N}}$ is non-increasing. Thus, the limit $P^{s}=\lim_{n\to\infty}\downarrow P_n^{s}$ exists in ${\mathcal P}([0,1])$. Setting $s_\infty=P^{s}(\{0\}^c)$, we claim that \begin{enumerate} \item $P^{s}$ is a fixed point of $\Theta\circ\overline{\Theta}$ ; \item $M(P^{s})=H(s_\infty);$ \item $s_\infty\leq s;$ \item $H(s_\infty)\leq H(s)$. \end{enumerate} Part 1 follows from the continuity of $\Theta$ and $\overline{\Theta}$. Part 2 is guaranteed by Lemma \ref{lm:last}. Part 3 is a consequence of the fact that $P^{s} \leq P^{s}_0$. Finally, for each $n\in{\mathbb N}$, we have $P_n(\{0\}^c)=s$ and $P^{s}_n\geq P^{s}_{n+1}$, so Lemma \ref{lm:last} guarantees that $M(P^{s}_n) \leq H(s)$. Letting $n\to\infty$ yields exactly part 4. We are now in position to prove the equivalence between the historical minima of $H$ and the solutions to $(\Theta\circ\overline{\Theta})(P)=P$. If $s$ is a historical minimum, then parts 3 and 4 force $s_\infty = s$ so $P=P^{s}$ is a solution satisfying $M(P)=H(s)$, as desired. Conversely, we must show that any solution $P$ is in fact of the form $P^s$ for some historical minimum $s$. Set $s=P(\{0\}^c)$, which satisfies $H'(s)=0$ by Lemma \ref{lm:last}. We have $P\leq P^s_n$ for any $n\in{\mathbb N}$ : this holds for $n=0$ because $P^s_0$ is the largest element of ${\mathcal P}([0,1])$ such that $P_0(\{0\}^c)=s$, and it then inductively extends to all $n\in{\mathbb N}$ by monotony of $\Theta\circ\overline{\Theta}$. Letting $n\to\infty$, we obtain $P\leq P^s$ ; but by Lemma \ref{lm:last} we also have $M(P)=H(s)=M(P^s)$. Thus, $P=P^s$ ($M$ is decreasing). Finally, if $t<s$ is any historical minimum then clearly $P^t_0\leq P^s_0$, which implies $P^t\leq P^s$. In fact the inequality is strict, because $P^t(\{0\}^c)=t<s=P^s(\{0\}^c)$. Applying the decreasing mapping $M$ yields $H(t)>H(s)$, which shows that $s$ is a historical minimum. \bibliographystyle{abbrv}
\section{In cautious praise of string theory} Practitioners of string theory aiming to present an overview of their subject, or to convey a flavor of it to non-specialists, have come up with some memorable expressions.\footnote{The remarks quoted in the first two paragraphs come from various sources. ``Theory of everything'' came to early prominence in \cite{Ellis86}. String theory's development is characterized as backward in \cite{Kaku:2005nh}. The phrase ``string miracles'' occurs in \cite{Dine88}. Witten's remark appeared in print in \cite{Lemonick04}. Townsend's quote hasn't appeared in print as far as I know, and it is more properly understood as the closest paraphrase that my memory can provide. The expression ``Not even wrong'' is apparently due to Pauli, but its application to string theory is most prominent in \cite{Woit:2006js}. ``The Trouble with Physics'' is the title of \cite{Smolin:2006pe}. Wilczek's quote appeared in \cite{Wilczek09}.} String theory is (a candidate for) the ``theory of everything;'' the theory which grew backwards; a theory of ``string miracles;'' and, in Edward Witten's words, ``a bit of 21st century physics that somehow dropped into the 20th century.'' Paul Townsend remarked about ten years ago, ``Someday we will discover the ultimate theory underlying all of physics, and we will call it string theory.'' In painful contrast, critics describe string theory as ``not even wrong.'' The rise of string theory, in Lee Smolin's words, is the ``Trouble with Physics.'' Less dark, but still clearly critical, is Frank Wilczek's remark, ``String theory is sort of the extreme of non-empirical physics.'' Here is how I would trace the logic of the debate which I reduced to sound bites in the previous paragraphs. String theorists characterize their theory as exceptional in some way. The main claim, usually, is that string theory is uniquely positioned to solve the biggest problems in fundamental physics. Critics of the theory seldom convince me that they are making a serious bid to refute this claim. Instead, they attack string theory for failing to meet the ordinary standards, norms, and principles of theoretical physics. For example, string theory is characterized by its critics as untested and excessively mathematical. As biting as these criticisms may seem, they are (with a caveat I will come to next) attacks on a straw man. Here is the caveat---and the main concession that I willingly make to the critics. Their straw man is based on common understanding of what claims of exceptionalism imply. Indeed, such claims are generally understood as implying that ordinary standards, norms, and principles need not be applied. Of course, ordinary standards {\sl should} be applied to string theory, no matter how amazing its theoretical reach might become. In particular, we should be worried by the degree to which string theory remains untested by experiment. We should entertain some skepticism about the utility of formal constructions that have no foreseeable application to phenomenology. And we should feel at least a modicum of concern about how far ahead of mathematical rigor the technical developments of string theory have run. In my experience, these concerns are widely felt by the string theory community, even though they are seldom stated up front. Perhaps it is precisely our reticence to articulate these concerns that gives critics an opening for their straw man argument. In short, the aim for proponents of string theory should be to give the theory its due praise without hinting at excuses for its known weaknesses. The main truth that I would draw out of the impressive statements I started with is that string theory sits at the center of a locus of ideas that spans a large fraction of modern theoretical physics. String theory exerts a unique pull on the imagination of high-energy theoretical physicists---a pull now being felt by theorists of other stripes, including nuclear and condensed matter physicists. In the remainder of this essay, I plan to discuss the particular corner of string theory that I am most interested in, namely the gauge-string duality. More than most subfields of string theory, it possesses the two qualities I described in the previous paragraph: on one hand, it draws in the imagination; on the other, it reaches out to many other fields of theoretical physics. In an attempt to convey these qualities, I once wrote, ``I think about how black holes in a fifth dimension relate to collisions of heavy ions, and people take me seriously.'' Readers of the remainder of this essay should be in a position to judge whether I made a meaningful claim to success while skirting the dangers of exceptionalism. \section{The gauge-string duality} The essential ideas of the gauge-string duality were articulated in the late 1990's by Juan Maldacena \cite{Maldacena:1997re}; by Igor Klebanov, Alexander Polyakov, and myself \cite{Gubser:1998bc}; and by Edward Witten \cite{Witten:1998qj}. The grand idea is that quantum field theories that do not include gravity are often equivalent to string theory or M-theory (or perhaps to some other, as yet undiscovered, theory of quantum gravity) in a higher dimensional spacetime. While I do not aim to trace the history of the gauge-string duality fully, some comparisons to the earlier ideas are in order. By the middle 1990's, string dualities abounded, so the notion of sharp equivalences between superficially very different theories was well established. For example, the duality between type IIA string theory and M-theory \cite{Townsend:1995kk,Witten:1995ex} illustrated the possibility of a fairly comprehensive mapping (purportedly extensible to a complete mapping) between a theory in ten dimensions and a theory in eleven dimensions. However, this mapping is an extension of Kaluza-Klein theory, and so rather different from the gauge-string duality. A more direct progenitor of the gauge-string duality was the extensive study of black hole microstates from D-brane constructions, initiated by Strominger and Vafa \cite{Strominger:1996sh}. The big successes of this program hinged upon finding $1+1$-dimensional conformal field theories (CFTs) which could account for the Bekenstein-Hawking entropy of black holes as well as explaining the interaction of black holes with low-energy probes \cite{Das:1996wn}. It was clear that the CFTs effectively stood in lieu of the black hole horizon, at least for the purposes of specific calculations. This replacement of a horizon by a field theory provided an interesting link to ideas of holography that had been proposed earlier by 't Hooft and Susskind \cite{tHooft:1993gx,Susskind:1994vu}. The holographic paradigm hinges on the idea that in a theory of quantum gravity, the microstates do not occupy the bulk of spacetime, but instead, in some appropriate sense, reside on boundaries. Black holes provide a canonical example: In the spirit of John Wheeler's ``It from bit,'' the entropy of a horizon is considered to arise from degrees of freedom that reside on the horizon. The membrane paradigm \cite{Thorne:1986iy} provides a calculational framework based on essentially this point of view. In the gauge-string duality, the holographic principle finds a precise and powerful expression, thanks to the conformal properties of the spacetimes in which the gravitational theory resides. The essential property of these spacetimes is that they have a natural boundary. This boundary is not the horizon. It is a boundary on which null geodesics begin and/or end. The field theory to which the gravitational theory is dual can be defined on that boundary. At first the presence of the boundary seems like a complication, because to specify the forward time evolution of the gravitational theory, even classically, one has to have precise information about the boundary conditions, not just on an initial time-slice, but also on the boundary where null geodesics begin and end. But it turns out that this is just what one needs in order to have a complete mapping between the gravitational theory and the dual field theory. The boundary conditions one needs on the gravitational side are in perfect correspondence to all the ways one can deform the field theory. What you do with the field theory tells the gravitational theory what boundary conditions it must satisfy. In the classical limit, the gravitational theory finds the optimal configuration satisfying specified boundary conditions, and the action of that optimal configuration corresponds to the generator of connected Green's functions of the field theory. If one moves beyond the classical limit on the gravity side, a more generally valid phrasing is that the partition functions of the gravity theory and the field theory coincide when the former is subjected to boundary conditions corresponding to the deformations of the latter. On one hand, this prescription is deeply in accord with the holographic principle, since all the degrees of freedom of the bulk theory are encoded on the boundary. On the other hand, it privileges the boundary of spacetime over more {\it ad hoc} boundaries, leading to a more precise and complete statement. The equivalence of gravity in the bulk of spacetime with field theory on the boundary subsumes the statements of semi-classical black hole thermodynamics which have been a touchstone for theoretical work in gravity for decades: When there is a black hole in the bulk, its Hawking temperature is the temperature of the field theory; its Bekenstein-Hawking entropy is the entropy of the field theory; and its action is (up to regularization and a factor of the temperature) the free energy of the field theory. The reason to expect an equivalence along the lines of the gauge-string duality is that D-branes (or, more precisely, large stacks of D-branes) admit alternative descriptions in terms of open and closed strings. The low-energy dynamics of open strings with their ends attached to D-branes is a non-gravitational field theory. The reason this is so, roughly speaking, is that the open string spectrum includes massless degrees of freedom up to spin $1$, but not a graviton. On the other hand, at least for some special cases (notably the D3-brane and the D1-D5 bound state), the geometry of many coincident branes is smooth and free of singularities: in a sense, the branes ``disappear'' down a warped throat, much in the way that electric charge disappears down the throat of an extremal Reissner-Nordstrom black hole. This geometrical description of many coincident branes is a closed string description, because it is the closed string sector which includes the graviton, as well as the generalized gauge fields which carry the charges of the branes. The gauge-string duality can be understood, at least in part, as the necessary equivalence between two ways of describing the same physics---namely, the low-energy dynamics of a large number of coincident branes. More broadly, much of the progress in string theory since 1995 can be characterized as advances in understanding localized defects in spacetimes: singularities and their resolutions, branes and intersections of branes. Part of the appeal of this line of work is that the dynamics of localized defects in string theory is extraordinarily rich and interesting, encompassing non-abelian gauge theories, non-perturbative dynamics, and renormalization group flows---all subjects of great interest independent of string theory. Equivalence between gravitational theories in spacetimes with boundaries and non-gravi\-tational theories that can be defined on those boundaries is quite a general idea, and part of its charm is that it does not appear to depend particularly on supersymmetry or other special features of string theory. However, symmetries---especially relativistic conformal symmetry---play a crucial role in the best understood examples. The relativistic conformal group is an extension of the Lorentz group. In addition to boosts and rotations, it includes translations, dilations, and so-called special conformal transformations which preserve the causal structure of spacetime but rescale spacetime volumes in a more complicated way than dilations. In four dimensions, where the Lorentz group is $SO(3,1)$, the conformal group is $SO(4,2)$. Relativistic quantum field theories with vanishing beta function are (up to possible anomalies) invariant under conformal transformations, and are termed conformal field theories. The gravity duals of CFTs are gravitational theories in five-dimensional anti-de Sitter space, which is denoted $AdS_5$. This curved spacetime can be realized as an $SO(4,2)$-symmetric hyperboloid embedded in flat ${\bf R}^{4,2}$. It inherits the $SO(4,2)$ symmetry of ${\bf R}^{4,2}$ in the same way that the sphere inherits the $SO(3)$ rotational symmetry of three-dimensional flat space ${\bf R}^3$. Relativistic conformal symmetry has played such an important role in the development of the gauge-string duality that the duality itself is commonly referred to as AdS/CFT, short for the anti-de Sitter / Conformal Field Theory correspondence. In attempts to apply the gauge-string duality to other areas of physics (notably nuclear and condensed matter physics) an assumption is often made early on that conformal invariance is a reasonably good symmetry of the physical system under consideration. This is clearly a tricky assumption for nuclear physics, where the phenomenon of confinement picks out a particular energy scale. If anything, it is more fraught with danger in a condensed matter setting, where the emergence of relativistic conformal invariance in strongly correlated many-body systems is rare. In the next two sections, I will discuss applications to nuclear physics at greater length and explain how, in particular examples, interesting comparisons can nevertheless be made between the physics of the quark-gluon plasma and a theory with relativistic conformal symmetry. \section{String theory and heavy ion collisions} In 2003, a simple and striking calculation was published by Policastro, Son, and Starinets \cite{Policastro:2001yc}: Using the gauge-string duality, they showed that in the strong coupling limit, and at finite temperature, the shear viscosity of ${\cal N}=4$ super-Yang-Mills theory was ${1 \over 4\pi}$ times the entropy density. This calculation was the beginning of a serious effort to relate string theory constructions to heavy ion physics.\footnote{It is striking that early explorations \cite{Damour79} of what became the membrane paradigm of black hole horizons revealed essentially the same result for the shear viscosity as found in \cite{Policastro:2001yc}. But the interpretation of that early work is obscured by the existence of a negative (and so apparently unphysical) bulk viscosity. Also, the horizons considered in \cite{Damour79} are of finite extent, which obstructs the hydrodynamic limit. In any case, the context of the gauge-string duality, together with the motivation from heavy-ion physics to be explained below, make clear the proper physical interpretation of the result, as well as its importance.} To explain why the calculation was important and why the subsequent effort gained such traction, both among string theorists and nuclear theorists, I should first explain how ${\cal N}=4$ super-Yang-Mills comes up in the gauge-string duality and also summarize the outlines of what heavy ion collisions are. I have already noted that a key underpinning of the gauge-string duality is the study of multiple coincident D-branes in string theory. The simplest such construction is $N$ D3-branes in otherwise flat ten-dimensional spacetime, as a configuration in type~IIB superstring theory. The low-energy dynamics of the open strings ending on the D3-branes is the aforementioned ${\cal N}=4$ super-Yang-Mills theory. This is a particularly simple non-gravitational quantum field theory whose beta function vanishes for symmetry reasons. The symmetry in question is ${\cal N}=4$ supersymmetry, which is the most supersymmetry a non-gravitational field theory can have in four dimensions. The key ingredient in the dynamics of all Yang-Mills theories is the spin $1$ gluon field, which in field theory terms owes its existence to a gauge symmetry, which is $SU(N)$ for $N$ D3-branes. Felicitously, gluons associated with $SU(3)$ gauge symmetry underly quantum chromodynamics (hereafter QCD), which is the theory that describes most of what goes on inside the atomic nucleus, and also most of what happens in a heavy ion collision. There are profound differences between ${\cal N}=4$ super-Yang-Mills theory (hereafter SYM or ${\cal N}=4$ SYM) and QCD, the most striking being the lack of any supersymmetry in QCD and the existence of a negative beta-function which leads to confinement. In contrast, SYM possesses full relativistic conformal invariance, which means that no scale is privileged, and in particular confinement is impossible. Conformal invariance is a {\it sine qua non} for a field theory to have an $AdS_5$ dual, and ${\cal N}=4$ SYM was the original example of the duality. Its dual is more properly $AdS_5 \times S^5$, which is the near-horizon geometry of a large number of D3-branes. This geometry is weakly curved (meaning that methods based on elaborations of Einstein gravity can be used, instead of calling on the full type~IIB string theory) provided $N \gg 1$ and that the 't Hooft coupling is strong. The 't Hooft coupling is a measure of the probability for a gluon to split into two gluons, and it generally controls the strength of all interactions in ${\cal N}=4$ SYM. QCD also is characterized by a 't Hooft coupling, but it changes with energy scale according to the renormalization group equations, on account of the non-vanishing beta function. In particular, it becomes large as one approaches confinement. Strong coupling in reference to gauge theories generally refers to a large value of the 't Hooft coupling. Let's recap. Both ${\cal N}=4$ SYM and QCD have gluons, but their other ingredients and properties differ. The gauge-string duality provides a tool for understanding the strong coupling limit of SYM. Qualitative properties of SYM at strong coupling---like the small value of the shear viscosity compared to the entropy density---might be expected to carry over to QCD at energy scales not too far above the confinement scale. Such expectations clearly hinge on a degree of optimism that can be called into question. Perhaps it is fair to say that the burden of proof on the question whether a quantitative relation between SYM and QCD exists falls more on the proponents than the skeptics. Now, let's pass on to high-energy collisions. Particle physicists have long been eager to learn everything possible from high-energy collisions, but the favorites have been collisions of electrons and positrons, electrons and protons, and protons and anti-protons.\footnote{Collisions of protons on protons are also common, and the LHC focuses on this type of collision.} It is not hard to see why from a theoretical point of view. The simpler the objects one collides, the more control one has in understanding the initial state. Also, the interactions between electrons and positrons are electroweak, and therefore the scattering amplitudes are small, making a perturbative approach feasible. Collisions of protons and anti-protons are already complicated compared to electrons and positrons: so much so that Leon Lederman joked about how it was like colliding pails of garbage and waiting to see a pearl drop out \cite{Lederman97}. Nevertheless, perturbative techniques, supplemented by renormalization group methods, are quite successful in describing these collisions, particularly the subset where a large momentum is transferred during the scattering event. In heavy ion collisions, one strips all the electrons off of a heavy isotope (gold and lead are the typical favorites) and collides the resulting ions at relative velocities comparable to those reached in proton-anti-proton collisions. The most authoritative experimental reviews to date are \cite{Adcox:2004mh,Arsene:2004fa,Back:2004je,Adams:2005dq}, and a wide cross-section of theoretical perspectives is presented in \cite{Abreu:2007kv}. Describing heavy ion collisions in perturbative quantum field theory seems like a hopeless task because there are too many interactions.\footnote{Nevertheless there is a robust effort to describe many facets of the initial state and early stages of the collision using a combination of perturbative and semi-classical methods. In addition to \cite{Abreu:2007kv}, see for example the reviews \cite{McLerran:2008uj,Gelis:2010nm}.} One can hope that pushing far away from the perturbative regime will eventually reveal some new regime of simplicity. That in fact happens, and the new regime of simplicity is fluid dynamics. Fluid dynamics relies on frequent interactions among constituent particles: so frequent that it is essentially impossible to keep track of them individually, and meaningful instead to describe their collective behavior in terms of local density and velocity. There is a vigorous and remarkably successful enterprise to describe bulk features of heavy-ion collisions in terms of relativistic fluid dynamics: for a pedagogical review, see for example \cite{Heinz:2004qz}. It is worth noting that fluid dynamical descriptions of the atomic nucleus have an old and honorable tradition, dating back to the liquid drop model of the nucleus used by Bohr and Wheeler to describe nuclear fission \cite{Bohr:1939ej}. In that historic work, the fluid elements were understood to be individual nucleons (protons and neutrons). In heavy-ion collisions, the nucleons are utterly destroyed, and the fluid that emerges is composed of strongly interacting quarks and gluons. It is called the quark-gluon plasma, and it is by far the hottest substance created in the laboratory: Recent measurements suggest a temperature as high as $4$ trillion degrees Kelvin \cite{Adare:2009qk}. The whole enterprise of comparing string theory calculations with heavy-ion collisions hinges on the description of the quark-gluon plasma---or a thermal state with comparable properties---in terms of a dual black hole. A favorite starting point is a black hole solution known as $AdS_5$-Schwarzschild, which captures the strong coupling dynamics of finite-temperature ${\cal N}=4$ SYM theory \cite{Gubser:1996de}. In the remainder of this section I will discuss two particularly successful calculations in this framework. The first is the shear viscosity computation mentioned at the beginning of this section. The second is a computation of the rate of energy loss of energetic particles traversing the thermal medium. Experimental observations of the anisotropic expansion of nuclear matter in off-center heavy-ion collisions prompted hydrodynamic analyses which show consistency with the data provided the shear viscosity is much smaller than the entropy density: see for example \cite{Luzum:2008cw}. A rough understanding of the phenomenon of anisotropic expansion can be achieved as follows. Consider an initial lump of interacting quarks and gluons formed in the collision. Usually this lump will not be symmetrical. If the quarks and gluons interact very little, then most of what happens during the expansion is that these particles free-stream away from one another until they go through the hadronization process that turns them into observable particles. This free-streaming has a strong tendency to erase initial anisotropies. On the other hand, if the quarks and gluons interact very strongly, the initial lump will wobble and shake as it expands, and the imprint of its initial anisotropies will remain in its collective outward flow. This imprint is more visible when shear viscosity is small, because viscosity generally has a damping property that diffusively erases irregularities. Shear viscosity is hard to compute reliably in the framework of perturbative quantum field theory, and existing estimates \cite{Arnold:2000dr} tended to put the shear viscosity at unacceptably high values. So the calculation of \cite{Policastro:2001yc} was phenomenologically attractive. Moreover, it was subsequently shown in \cite{Kovtun:2004de}, among other works, to be quite robust in the sense that alterations of the gravitational theory changed it either by small corrections, or in many cases not at all. Another key aspect of heavy-ion phenomenology is the suppression of high-energy particles in the final state, relative to collisions of protons. The common understanding of this suppression hinges on a thought experiment. Instead of colliding two gold nuclei, imagine separating the constituent nucleons of each nucleus just a little in the direction of their motion. Then, instead of one big collision, there is a series of pairwise nucleon collisions. There are accepted ways of estimating how many such pairwise collisions occur, and individual proton-proton collisions at the relevant energies are experimentally well studied. So there is a definite prediction, starting from data on proton-proton collisions, of the spectrum of particles that emerge in a heavy ion collision, based on replacing the heavy ion collision by an appropriate number of pairwise nucleon collisions. This whole approach is recognized as providing only baseline expectations whose success or failure help teach us about what really happens in heavy ion collisions. Suppression of high-energy particles is a case in point. A characteristic feature of QCD is that some fraction of the final state particles in proton-proton collisions are quite energetic. If a heavy ion collision were really the same as a series of nucleon-nucleon collisions, then the fraction of final state particles above a specified energy would be the same as in proton-proton collisions. Instead, considerably fewer particles are highly energetic. According to common understanding, the initial stages of a heavy ion collision are essentially identical to the series of pairwise nucleon collisions discussed above; but as particles try to escape toward the detectors, the detritus of other pairwise nucleon collisions gets in their way and saps their energy. The detritus is understood to be the quark-gluon plasma, whose fluid properties I discussed above. Thus the suppression of high-energy particles in the final state of heavy ion collisions is understood as an opportunity to probe the properties of the quark-gluon plasma. For comparison with experimental data on suppression of high-energy particles (well reviewed in \cite{Adcox:2004mh,Arsene:2004fa,Back:2004je,Adams:2005dq}), a key quantity is the typical length that an energetic particle can travel through the quark-gluon plasma before it loses a large fraction of its original energy. Experimental evidence suggests that this length is only a few times the proton radius. (The proton radius is a little less than $1\,{\rm fm}$.) So again we are confronted with a situation which is far from the free-streaming picture where perturbative quantum field theory is best justified.\footnote{I would be remiss not to note that there are QCD calculations, both in perturbative and partially perturbative frameworks, which have made impressive headway on the problem of describing rapid energy loss. For an introductory review of these methods, see for example \cite{CasalderreySolana:2007pr}.} In 2006, calculations appeared in string theory which in various ways probe the rate of energy loss by energetic particles in a strongly coupled thermal medium. These calculations were performed by Rajagopal, Liu, and Wiedemann \cite{Liu:2006ug}; by Herzog et.\ al.\ \cite{Herzog:2006gh}; by Casalderrey-Solana and Teaney \cite{Casalderrey-Solana:2006rq}; and by the author \cite{Gubser:2006bz}. While there are some tensions among these calculations, they generally point toward rapid energy loss. Two obstacles to leveraging these string theory calculations into quantitative predictions for QCD are 1) ${\cal N}=4$ SYM has about three times as many degrees of freedom as QCD; and 2) there is some uncertainty on how best to choose the gauge coupling in ${\cal N}=4$ SYM. I attempted a resolution of these two points through a comparison of static properties of quark-anti-quark pairs between lattice QCD and ${\cal N}=4$ SYM, with the result that charm quarks propagate about $2\,{\rm fm}$ before losing a large fraction of their energy. A phenomenological study \cite{Akamatsu:2008ge} indicates that this estimate is consistent with data. Low shear viscosity and rapid energy loss are two of the high water marks of the effort to relate string theory to heavy ion collisions. It is perhaps appropriate to close this section with some reflections on their relative merits. The shear viscosity calculation has special appeal because of its universality and simplicity. Macroscopic liquids have shear viscosity and entropy density, and much has been made of the observation that their ratio (appropriately defined to avoid difficulties with superfluids) is always greater than the $1/4\pi$ that comes up in the study of black hole horizons. A significant effort has emerged aimed at tracking more precisely how horizons relate to fluid dynamics. On the other hand, the heavy ion data constrains the shear viscosity mostly in the direction of an upper bound. It is possible, at least in terms of the data, that the true shear viscosity of the quark-gluon plasma is significantly less than $1/4\pi$ times the entropy density. Much depends on the initial conditions for hydrodynamic evolution, in particular the thermalization time. The energy loss calculations are less universal and harder to relate to macroscopic systems (see however \cite{Gubser:2009qf}). Moreover, the key results always involve the gauge coupling, and there is no punchline quite as simple as the $1/4\pi$ result in the shear viscosity story. And yet the experimental situation is, if anything, better, in that both upper and lower bounds on the rate of energy loss are supported by the data, and the results from string theory, at least as applied in \cite{Akamatsu:2008ge}, lie between the two. Altogether, the shear viscosity and drag force calculations in the gauge-string duality are best viewed as two sides of the same coin: they both emphasize a wholly non-perturbative description of the quark-gluon plasma based on a black hole horizon, and they both point toward dynamics that is far from the free-streaming limit. In the next section I will explain more fully (though still qualitatively) how the string theoretic calculation of energy loss is done. While the chance for a comparison with data motivated this calculation, it has some interesting and surprising theoretical features related to a causal horizon on the string worldsheet. \section{The trailing string} In the early literature of the gauge-string duality, the attractive force between static quarks and anti-quarks was examined \cite{Rey:1998ik,Maldacena:1998im}. In a conformal field theory at zero temperature, that force depends inversely on the square of the separation between the quark and anti-quark. It arises on the gravity side because a fundamental string comes out of the quark, goes down into the boundary, and then goes across and up again to the anti-quark. A purely classical calculation on the string theory side, based on the area of the string worldsheet, leads to a definite form for the attractive force. This calculation is easily extended to the case of finite temperature, where the attractive force weakens compared to the zero-temperature result due to the influence of the black hole. The force between a static quark and anti-quark is one of the standard quantities studied in lattice QCD: for a concise introduction, see for example \cite{Karsch:2006sf}. It is a very revealing quantity, as it encodes both the departures from conformality due to renormalization group flow and finite temperature corrections due to Debye screening. I proposed in \cite{Gubser:2006qh} that when comparing calculations in QCD to calculations in ${\cal N}=4$ super-Yang-Mills theory---the latter performed using the gauge-string duality---a sensible approach is to consider thermal states with the same energy density in both theories, and to set the Yang-Mills coupling in such a way that the force between a static quark and anti-quark matches at a radius significantly less than the length scale of confinement. This approach is to an extent {\it ad hoc}, in that one might reasonably prefer comparisons at fixed temperature, and/or comparisons where the Yang-Mills coupling in ${\cal N}=4$ super-Yang-Mills theory is set equal to the gauge coupling in QCD. However, using fixed energy density is a simple way to compensate for the fact that ${\cal N}=4$ super-Yang-Mills theory has about three times as many degrees of freedom as QCD; and using the force between quarks and anti-quarks to normalize the coupling seems particularly well motivated when considering the drag force on a single quark, as I will discuss next. Finite-temperature lattice QCD is well adapted to quantities which can be measured in static systems, like the equation of state and the attraction between static quarks and anti-quarks. It is much less well suited to quantities where evolution in real time is an essential feature. This is because the lattice is constructed using a Wick-rotated spacetime, with real time replaced by periodic Euclidean time, where the period is the reciprocal of the temperature. In the gauge-string duality, the Wick rotation between Minkowskian geometries and Euclidean geometries is, at least in many interesting circumstances, almost trivial. So properties like the drag force on a moving quark are fairly straightforward to calculate.\footnote{Viscosity also relates to a time-dependent situation, where a fluid has some non-trivial motion (shearing flow, for example) which damps out over time at a rate that the viscosity controls. For viscosity (as well as other transport properties) a standard approach is to extract an appropriate transport coefficient from a two-point correlator, which represents a perturbation of a uniform, static system. In principle, lattice QCD practitioners can get at the appropriate two-point functions, and the effort to do so for viscosity has had some notable success \cite{Meyer:2007ic}. So the point is not that lattice QCD cannot possibly get at the quantities that string theorists compute; rather, it's that string theorists have, at least temporarily, the advantage of a simpler and more nearly analytically tractable approach.} The way the drag force calculation goes can be summarized in four main points: \begin{itemize} \item A single heavy quark at rest in a thermal bath can be represented on the gravity side as a string hanging straight down from the boundary into the horizon of $AdS_5$-Schwarzschild. This string cannot break because the string theory we're discussing is type~IIB, where string breaking is explicitly forbidden except where there are D-branes. The string's upper end must remain where the quark sits, and the rest of the string also remains stationary, at least in the classical limit where we ignore quantum fluctuations of the position of the string. \item The endpoint of the string, which is attached to the heavy quark, can be required to move along any timelike trajectory on the boundary. The speed limit for its motion is the speed of light in the boundary theory. The speed of light is identical in the bulk theory, but because the bulk spacetime is curved, the speed of light {\sl appears} to a boundary observer to get slower as one goes down into the bulk geometry. This is a key point, so let's be quantitative. If $t$ is time of the boundary theory, $x$ is one of the spatial directions, and $r$ is the fifth dimension of $AdS_5$, then a light ray moving parallel to the boundary at a ``depth'' $r$ moves at an apparent speed $v_{\rm max}(r) = \sqrt{|g_{tt}(r)/g_{xx}(r)|}$. As one approaches the black hole horizon, $v_{\rm max}(r) \to 0$. This is an example of gravitational redshift: everything that happens near a black hole horizon seems to distant observers to occur very slowly. \item Suppose the heavy quark moves at a constant velocity with magnitude $v_0 \in (0,1)$, where for convenience I have now set the speed of light to unity. Sufficiently close to the horizon, we will find $v_{\rm max}(r) < v_0$. This means that part of the string (the part close to the horizon) cannot ``keep up'' with the heavy quark. So the string trails out behind the heavy quark. Its precise shape can be determined by minimizing the Nambu-Goto action \cite{Herzog:2006gh,Gubser:2006bz}. The trailing string exerts a backward force on the heavy quark. This is the drag force. A closely related calculation of stochastic forces on the string appeared independently \cite{Casalderrey-Solana:2006rq}. \item The final result for the drag force indicates that it is proportional to the tension of the fundamental string. This string tension appears in the same way in the force between static quarks. So what string theory offers, in practical terms, is not so much an absolute calculation of the drag force on a single quark, but a ratio of the drag force to the force between a static quark and anti-quark. Because the latter is well studied in lattice QCD, one can put the string theory calculation together with lattice results to get a real prediction. This, in a nutshell, is how I arrived \cite{Gubser:2006qh} at the estimate that charm quarks propagate about $2\,{\rm fm}$ before losing a large fraction of their energy. \end{itemize} The trailing string has an interesting causal structure. Recall that for any velocity $v_0 \in (0,1)$ of its endpoint, there is a part of the trailing string near the black hole horizon which cannot keep up with the endpoint. The endpoint of the string is causally inaccessible to this part of the string, at least if one is limited to signals which propagate along the string worldsheet. There is a horizon on the string which demarcates the region which has no causal access to the endpoint. This horizon emits fluctuations which propagate up to the endpoint of the string. These fluctuations are precisely analogous to the Hawking radiation from a black hole. In the description of the dynamics of heavy quarks, they play a key role: they provide the stochastic forces which are generally expected to arise in conjunction with the dissipative drag force \cite{Casalderrey-Solana:2006rq,Gubser:2006nz,Casalderrey-Solana:2007qw}. In the original example of the trailing string, where the background geometry is $AdS_5$-Schwarzschild, there is a horizon on the string worldsheet even in the limit $v_0 \to 0$: It coincides with the horizon of the background geometry in this limit. However, in \cite{Gubser:2009qf}, it was observed that trailing string configurations exist even in background geometries without a horizon. The example studied explicitly was a solution of type~IIB string theory found in \cite{Gubser:2009qm}, where $\sqrt{|g_{tt}(r)/g_{xx}(r)|}$ varies over a range $(v_*,1)$ in the bulk geometry. The quantity $v_*$ can be understood in field theory terms as the reciprocal of the index of refraction of the zero-temperature state of matter dual to the geometry found in \cite{Gubser:2009qm}. When the endpoint of the string travels at a speed $v_0$ which is less than $v_*$, the equilibrium shape of the string has no horizon. If $v_0>v_*$, then there is a horizon. This situation offers a simple venue in which to explore some of the mysteries of black hole physics. Suppose we start with a stationary string, so that there is no horizon. Next let's put the endpoint in motion at a velocity $v_0>v_*$. In some appropriate sense, a horizon must eventually form on the string worldsheet.\footnote{The sense in which this must happen is that signals on the parts of the worldsheet where $v(r) < v_0$ have no choice but to propagate further away from the string endpoint. This is a simple version of the notion of an apparent horizon.} The horizon will produce Hawking radiation which results in stochastic forces on the string endpoint. At a later time, we could choose to have the endpoint slow down or stop. If we wait a sufficiently long time, any given part of the string (at any prespecified value of $r$) will regain causal access to the endpoint of the string. So there is no horizon anymore.\footnote{There is a significant caveat to this statement: one could imagine a situation where for arbitrarily late times, there is always some part of the string worldsheet, however small it may be, which cannot send a signal to the endpoint of the string. Such a situation would be like a black hole remnant. To rule out such a possibility, one could impose the constraint that the string ends on a brane which is deep down in the bulk.} In short, just by shaking the endpoint of the string, we can get a horizon to form, radiate, and then disappear. At the end of the day, the entire string has causal access to the endpoint, so no information can be lost. The narrative of the previous paragraph could, at least in principle, be supplemented by precise mathematics. The string worldsheet can be treated through methods of $1+1$-dimensional conformal field theory. Admittedly, the conformal field theory for the background geometry of \cite{Gubser:2009qm} is a complicated one, involving Ramond-Ramond fields. But this is not a problem of principle. Once boundary conditions on the endpoint of the string are specified, one can in principle track the wave-function of the string throughout its evolution. This wave-function does not involve quantum gravity in any way: in the probe approximation, where the string doesn't back-react significantly on the background geometry, the wave-function would only describe the position of the string in a fixed background. And yet, the wave-function would explicitly include a horizon, an analog of Hawking radiation, and even black hole evaporation. Details are left as an exercise for the ambitious reader. \section{Summary} The gauge-string duality, conceived in contemplation of stacks of many coincident D-branes, has turned out to be a generally useful tool in exploring strongly coupled systems. Its strengths include ease of calculation, geometrical intuitiveness, and direct relation to interesting strongly coupled gauge theories. The most interesting example of a strongly coupled gauge theory that Nature has, to date, furnished us, is quantum chromodynamics; so it is not surprising that extensive efforts have been devoted to using the gauge-string duality to elucidate properties of QCD. I have focused in this essay on properties related to finite temperature and heavy-ion collisions. This is an easy choice for me since I have been working hard lately on this type of application of the gauge-string duality. There are also extensive efforts to understand zero-temperature properties of QCD starting from AdS/CFT. A more balanced review of these efforts can be found in \cite{Gubser:2009md}. A special charm of studying finite-temperature effects in AdS/CFT is that one is constantly working with black hole horizons. Viscosity and drag force are only two examples of the quantities one can calculate in this framework. Another quantity of phenomenological interest is the characteristic time scale on which a black hole equilibrates, corresponding to the thermalization time of the dual field theory. A crude estimate of the thermalization time is to ask how long it would take a graviton to propagate in pure $AdS_5$ down to the depth where a horizon eventually forms, and then back up to the boundary. This leads to the estimate $\tau = {2 \over \pi T}$ for the thermalization time. Interestingly enough, recent numerical simulations of classical black hole formation in $AdS_5$ \cite{Chesler:2010bi} bear out the validity of this estimate in a setting not dissimilar to heavy-ion collisions. In perturbative treatments, the thermalization time typically is enhanced by a negative power of the coupling. Such treatments generally have trouble explaining why the quark-gluon plasma equilibrates in a real heavy-ion collision before the medium blows itself apart. Estimating $\tau = {2 \over \pi T}$, where $T$ is the peak equilibrated temperature, seems to be at least in the right ballpark for a phenomenologically acceptable account. Wonderful as the gauge-string duality is, there are fairly sharp limitations on the types of field theories one can study, especially when one restricts to the supergravity approximation in the bulk. The theories must have some sort of large $N$ approximation, and the examples which can be derived explicitly from string theory are usually either supersymmetric or closely related to supersymmetric theories. The question naturally arises, what general lessons can we extract from these examples about strongly coupled phenomena? Of course, one well-appreciated theme is that symmetries constrain dynamics in important ways. I have tried to argue in recent papers \cite{Gubser:2010ze,Gubser:2010ui,Gubser:2011qv} that the approximate conformal symmetry of QCD above the confinement scale has not yet been fully exploited. Another theme, which perhaps deserves a more cautious treatment, is that strongly coupled phenomena tend to be universal. The universality of the $1/4\pi$ ratio of shear viscosity to entropy density over a broad range of black hole constructions is one example. I would be eager to see some more general field theory understanding of how to make semi-quantitative statements about field theories in which no weakly coupled quasi-particle description is available. \bibliographystyle{ssg}
\section{Introduction} At the time of the beautiful conference in Corfu\footnote{ Corfu Summer Institute on Elementary Particles and Physics - Workshop on Non Commutative Field Theory and Gravity, September 8-12, 2010, Corfu Greece.}, an extensive review on these and related topics had already been completed, which now is published as \cite{Piacitelli:2010bn}. I will then take the opportunity of the present conference proceedings to complement that review with an explicit description of some applications to quantum field theory \cite{Doplicher:1994tu,Bahns:2003vb,Bahns:2004fc,Piacitelli:2004rm} on DFR quantum spacetime \cite{Doplicher:1994tu}. The presentation is however self contained and addresses a possibly different audience. The second chapter partially overlaps with \cite{Piacitelli:2010bn}, but contains more explicit equations. The third chapter contains a much more detailed description of results about quantum field theory than \cite{Piacitelli:2010bn}. For the sake of dissemination, I will give explicit formulas in the Dirac notation, still favoured by many physicists. The reader interested in mathematical rigour is referred to the original papers. In this first introductory chapter, we will very briefly recall some basics about local quantum field theory on the flat Minkowski spacetime in physical (i.e.\ 4) dimensions (section \ref{subsec:lqft}). Then we will discuss motivations for introducing non commutative coordinates, and their interpretation: in particular we will stress that they are NOT observables (section \ref{subsec:why}). As for the comparison with other approaches to covariance, the interested reader may find a detailed discussion in \cite{Piacitelli:2010bn}. \subsection{A minimal account of local quantum field theory} \label{subsec:lqft} Relativistic quantum field theory results from merging the quantum theory of observables with the principle of locality: it is formulated in terms of operator fields \(A(x)\), which can be regarded (up to idealisations) as sets of pointwise localised observables, labeled by the event \(x\) at which they are localised; equivalently as more or less generalised ``functions'' of \(\mathbb R^4\). Einstein causality amounts to require the commutativity of any two observable fields \(A(\cdot),B(\cdot)\) at spacelike distances, namely \([A(x+a),B(x)]=0\) for every \(a\) spacelike. There is a representation \(U(\varLambda,a)\) of the Poincar\'e group. Then a (scalar) operator field \(A(\cdot)\) is said covariant if \(U(\varLambda,a)A(x)U(\varLambda,a)^{-1}=A(\varLambda x+a)\). Covariance is required so that every observable which is at rest in given frame can be described by any other equivalent observer (passive point of view); and also so that the measuring device can be displaced, rotated and boosted so to be brought at rest with respect to any other equivalent observer (active point of view). A covariant field, then, essentially describe a single device in all possible Lorentz frames. For general reasons (spin-statistics theorem), possibly unobservable fields also must be allowed for, which either commute or anticommute at spacelike distances; for these and related reasons, covariance has to be generalised to multiplets of such fields. Here however we will confine ourselves with a theory generated by a single covariant Bosonic field. The pairwise commuting generators \(P^\mu\) of translations, defined by \(U(I,a)=e^{iaP}\), fulfil the spectrum condition: \(P^0\geqslant 0\) and \({P^0}^2-|\vec P|^2\geqslant 0\). In particular \(H=P^0\) is the generator of time translations=time evolution, and is called the Hamiltonian (with respect to the given Lorentz frame). The vacuum state \(\ket\emptyset\) is defined as the unique translation invariant state (if symmetries are not spontaneously broken), thus fulfilling \(P^\mu\ket\emptyset=0\). If the theory is defined by a single field \(A(x)\), any state \(|\Psi\rangle\) can be approximated by linear combinations of states of the form \(A(x_1)\dotsm A(x_k)\ket\emptyset\) (any \(k\)). By analogy with the Fock construction in the case of free fields, particles are usually told to be ``carried'' by fields: the statistics of particles (Bose/Fermi) is usually related with the kind of commutation rule at spacelike distance. Indeed a much deeper and gratifying understanding of statistics as a property of charged sectors (instead of particle-carrying fields) is available (see the review \cite{Doplicher:2009qs}); however we will not need such a theoretical deployment here, since we only will be concerned with toy models involving the simplest case (neutral Klein-Gordon free theory and perturbations). Unfortunately, the free fields are the only known examples (in dimension 4) of theories fulfilling the above general requirements, and they only can describe a lifeless universe made of non interacting particles. A perturbative approach has been developed, where the interacting dynamics is compared with the free dynamics, as an attempt to describe scattering experiments: incoming particles which are free in the far past and far away from the interaction region interact at finite times, and produce outgoing particles which are free and far away in the far future. The (formal) unitary operator \(S\) which interpolates between the incoming and outgoing (asymptotic) free states is called the \(S\) matrix. The perturbation series in powers of the coupling parameter is called the Dyson series. This perturbative approach also is plagued by terrible problems; the formal equations defining the matrix elements of \(S\) are affected by all kinds of divergences, and even conceptual obstructions to its existence (``Haag theorem'') can be devised. Notwithstanding that, a clever strategy (driven by physical interpretation) for covariantly removing the most severe class of divergences (ultraviolet divergences) has been devised, called renormalisation. A theory is called renormalisable if the perturbation series for \(S\) can be made to converge, at the cost of introducing infinite recursive subtractions depending from at most a small set of phenomenological parameters. Unfortunately the only known renormalisable model for which some indications about the limit \(S\) can be obtained seems to give \(S=I\), namely to converge to\ldots a free theory. Quite surprisingly, however, lowest order corrections in the perturbation theory of a physical theory (quantum electrodynamics) give experimentally verified predictions of incredible accuracy. The interested reader will find more details on any standard textbook (e.g.\ \cite{Bjorken:1965zz}); the first two chapters of Haag's monograph \cite{Haag:1992hx} also provide a nice conceptual introduction, while the rest of the book is devoted to a mathematically advanced introduction to local quantum physics. \subsection{Why should we quantise the coordinates?} \label{subsec:why} Notwithstanding the lack of non trivial well defined models, even perturbative, it would be way too much to dismiss the theory as a failure. The successful experimental predictions should instead be regarded as a strong indication that the illness of the theory is due to some conceptual ingredient which is still missing. The ultraviolet divergences ultimately are a consequence of a too strict assumption about locality: the divergent expressions arise from interaction terms which are polynomials in the fields under the pointwise product. String theory arose as an attempt to replace points with less singular geometric objects. However this solution remains in the realm of classical geometry, and did not result as effective as it was hoped, so far. The concept itself of space as a collection of infinitely small points dates back to Euclid and has never been challenged. Indeed, even Einstein observed that, as a logical consequence of accepting quantum physics, a quantum description of geometry would be conceptually necessary. Apart from this, if we take the Compton wavelength \(\lambda_C(m)\) as the characteristic parameter driving the quantum behaviour of a point particle of mass \(m\) and the Schwarzschild radius \(\lambda_C(m)\) as characteristic of a pointwise source of gravitational field of mass \(m\), the condition \(\lambda_S(m)\sim\lambda_C(m)\) has solution \(m\sim m_P\), the Planck mass, and \(\lambda_S(m_P)\sim\lambda_C(m_P)\sim\lambda_P\), where \(\lambda_P\sim 10^{-33}\text{cm}\) is the Planck length. This is a strong indication that quantum phenomena and gravitation come to interplay at the Planck scale, where the concept of point particle should be expected to break down. As a first attempt in the direction of concrete physical models, it was proposed in \cite{Doplicher:1994tu} to provide a set of non commuting coordinates \(q^\mu\) for the flat Minkowski spacetime, covariant under a unitary representation of the Poincar\'e group, in order to replace the usual localisation of quantum fields. The hope was to describe an intermediate model where the energy involved in single processes is sufficiently high to sense the quantum texture of spacetime; yet the density of processes is too small to produce curvature. Here we only will describe the solution, while we refer to the original paper or the less technical \cite{Doplicher:2001qt} for a derivation of the uncertainty and commutation relations. Earlier attempts are shortly discussed in \cite{Piacitelli:2010bn}. Precisely as the components \(x^\mu\) of the label \(x\) of \(A(x)\) are not observables, we are not going to interpret the selfadjoint operators \(q^\mu\) as observables. To fix the interpretation, let us first describe a bit more precisely what happens in usual quantum field theory. A localisation state on the classical spacetime may be described by a density \(f(x)\,dx\) with \(\int f(x)\,dx=1\), so that the average of the observable field \(A(x)\) over the density gives the smeared field \(A(f)=\int f(x)A(x)\,dx\). A sharp localisation\footnote{We will not concern ourselves here with the underlying technicalities (fields should be treated as generalised functions), since they are not relevant here.} is obtained by a delta: if \(\delta_a(x)dx=\delta(x-a)dx\), then \(A(\delta_a)\) is the sharp localisation of the field \(A(x)\) at \(a\). We are led to think of \(x\) as of a set of coordinate functions, of \(f\) as a localisation state, and of the point \(a\) as of a particular kind of localisation states. In the case of quantum coordinates \(q^\mu\), localisation states will be described by density matrices \(\rho\), giving the expectation \(\langle q^\mu\rangle_\rho=\text{Tr}(\rho q^\mu)\). Vector states are a special cases where \(\rho\) is of the form \(|\xi\rangle\langle\xi|\). To avoid confusion, we anticipate that there will not be a direct correspondence between classical sharp localisation states and quantum vector states. Let \(A(x)\) be a quantum field on classical spacetime, taking values in the operators on some Hilbert space \(\mathfrak H\); its DFR quantisation is the replacement of the classical coordinate functions \(x^\mu\) with the quantum coordinate operators \(q^\mu\) on the Hilbert space \(\mathfrak K\), using a natural covariant generalisation of the Weyl prescription. If \(A(x)=\int\limits_{\mathbb R^4} dk\,\check A(k)e^{ikx}\) , then \[ \mathbf A(q)=\int\limits_{\mathbb R^4}dk\,\check A(k)\otimes e^{ikq} \] as operators on \(\mathfrak H\otimes\mathfrak K\), where \(kx=k_\mu x^\mu\) and \(kq=k_\mu q^\mu\). States on the second tensor factor of \(\mathfrak H\otimes\mathfrak K\) describe a choice of the ``localisation'' of the field; then for any such choice we get an observable, whose physical states live in the first tensor factor. In other words, the expectation functional \(\langle\cdot\rangle_\rho\), acting on the second tensor factor only, plays the same role as the density \(f(x)\,dx\): by analogy with the case of classical spacetime, we may introduce the notation \(\mathbf A(\langle\cdot\rangle_\rho)\) for the partial expectation \(\langle\mathbf A(q)\rangle_\rho\); then by linearity \begin{subequations}\label{eq:smeared_qfield} \begin{equation} \mathbf A(\langle\cdot\rangle_\rho)=\int\limits_{\mathbb R^4}dk\,\check A(k)\langle e^{ikq}\rangle_\rho=A(f_\rho), \end{equation} where \begin{equation} f_\rho(x)=(2\pi)^{-4}\int dk\,e^{-ikx}\langle e^{ikq}\rangle_\rho. \end{equation} \end{subequations} It seems that the only effect of DFR quantisation is to select a certain subclass of test functions \(f_\rho\) for the usual quantum fields. Indeed, the effect of quantisation manifests itself when products of fields are considered, as \[ (\mathbf{AB})(q)\neq \mathbf A(q)\mathbf B(q). \] Hence, interaction Lagrangians---which are usually defined in terms of local polynomials in the fields---have non trivial generalisations to DFR quantum spacetime. It has to be stressed that, as far as the time component \(x^0\) of classical localisation in quantum field theory has no interpretation as a time observable, so is for its quantum counterpart \(q^0\). \section{Covariant Quantum Geometry} \subsection{The DFR quantum coordinates }\label{subsec:dfr_coord} Consider the operators \(P_j=-i\partial_j\), \(Q_j=s_j\cdot\) on \(L^2(\mathbb R^4)\), \(j=1,2,3,4\), which fulfil \(P_jQ_k-Q_kP_j=-i\delta_{jk}\). We then introduce the notations \(X^0=P_1,X^1=P_2,X^2=Q_1,X^3=Q_2\). Finally, we set \[ \mathfrak K=L^2(\mathscr L,d\varLambda)\otimes L^2(\mathbb R^2,ds_1ds_2ds_3ds_4),\] where \(d\varLambda\) is the Haar measure of the Lorentz group \(\mathscr L\). As usual, we associate to it a complete set of generalised kets \[ \ket{\varLambda}\ket{\underline s},\qquad \varLambda\in\mathscr L,\underline s=(s_1,s_2,s_3,s_4)\in\mathbb R^4, \] with bracket \begin{gather*} \{\bra{\varLambda}\bra{\underline s}\}\{\ket{\varLambda'}\ket{\underline s'}\}= \bracket{\varLambda}{\varLambda'}\bracket{\underline s}{\underline s'} =\delta(\varLambda^{-1}\varLambda')\delta^{(4)}(\underline s_1-\underline s_1'), \end{gather*} where integrals are taken with the measure \(d\varLambda d\underline s\) and \(\delta(\varLambda)d\varLambda\) is the purely atomic normalised measure on \(\mathscr L\), concentrated on \(I\). We define the operators \( q^\mu\) by their actions on the kets \(\ket{\varLambda}\ket{\xi}\): \begin{equation}\label{eq:def_q} q^\mu\ket{\varLambda}\ket{\xi}=\lambda_P\ket{\varLambda} \{{\varLambda^\mu}_\nu X^\nu\ket\xi\}. \end{equation} We may easily check that the operators \( Q^{\mu\nu}\) defined by \[ [ q^\mu, q^\nu]=i\lambda_P^2 Q^{\mu\nu} \] are simultaneously diagonalised by the kets \(\ket{\varLambda}\ket{\underline s}\): \[ Q^{\mu\nu}\ket{\varLambda}\ket{\underline s}= {\sigma{(\varLambda)}}^{\mu\nu} \ket{\varLambda}\ket{\underline s}, \] where \begin{subequations}\label{eq:sigma_all} \begin{equation}\label{eq:sigmanot} \sigma{(I)}=\begin{pmatrix}0&0&-1&0\\0&0&0&-1\\1&0&0&0\\0&1&0&0\end{pmatrix},\\ \end{equation} and \begin{equation} {\sigma{(\varLambda)}}^{\mu\nu}={\varLambda^{\mu}}_{\mu'}{\varLambda^{\nu}}_{\nu'} {\sigma{(I)}}^{\mu'\nu'}. \end{equation} \end{subequations} Moreover, by construction \begin{equation}\label{eq:Q1} [q^\mu,Q^{\mu\nu}]=0. \end{equation} We have a unitary representation \( U(\cdot,0)\) of the Lorentz group \[ U(\varLambda,0)\ket M\ket{\underline s}=\ket{\varLambda M}\ket{\underline s}; \] it fulfils \begin{gather*} U(\varLambda,0)^{-1} q^\mu U(\varLambda,0)={\varLambda^\mu}_\nu q^\nu,\\ U(\varLambda,0)^{-1} Q^{\mu\nu} U(\varLambda,0)= {\varLambda^\mu}_{\mu'}{\varLambda^\mu}_{\mu'} Q^{\mu'\nu'}. \end{gather*} Note that, since \({ \sigma{(\varLambda)}}_{\mu\nu}{\sigma{(\varLambda)}}^{\mu\nu}= {\sigma{(I)}}_{\mu\nu}{\sigma{(I)}}^{\mu\nu}=0\) is a Lorentz invariant, we have \(Q^{\mu\nu}Q_{\mu\nu}|\varLambda\rangle|\xi\rangle=0\) identically and thus \begin{subequations}\label{eq:Q} \begin{equation}\label{eq:Q2} Q_{\mu\nu}Q^{\mu\nu}=0. \end{equation} Analogously, \begin{equation}\label{eq:Q3} Q_{\mu\nu}(\ast Q)^{\mu\nu}=\pm 4 \end{equation} \end{subequations} where \((\ast Q)^{\mu\nu}=(1/2)\epsilon^{\mu\nu\mu'\nu'}Q_{\mu'\nu'}\). We finally make use of the remaining Schr\"odinger operators to construct the representation of translations. We first define \[ \Pi^0=Q_1+Q_3,\quad\Pi^1=-Q_2-Q_4,\quad\Pi^2=P_1-P_3, \quad\Pi^3=P_2-P_4, \] which fulfil \([\Pi^\mu,\Pi^\nu]=0\) and \[ [\Pi^\mu,X^\nu]=ig^{\mu\nu}. \] Then we define \[ p^\mu\{|\varLambda\rangle|\xi\rangle\}=|\varLambda\rangle\{{\varLambda^\mu}_\nu\Pi^\nu|\xi\rangle\} \] which fulfil \[ [p^\mu,p^\nu]=0,\quad [p^\mu,q^\nu]=ig^{\mu\nu}. \] It follows that \[ U(\varLambda,a)=e^{iap}U(\varLambda,0) \] fulfils \[ U(I,0)=I,\quad U(\varLambda a)U(M,b)=U(\varLambda M, a+\varLambda b) \] and \begin{gather} U(\varLambda,a)^{-1} q^\mu U(\varLambda,a)={\varLambda^\mu}_\nu q^\nu+a^\nu,\\ U(\varLambda,a)^{-1} Q^{\mu\nu} U(\varLambda,a)= {\varLambda^\mu}_{\mu'}{\varLambda^\mu}_{\mu'} Q^{\mu'\nu'}. \end{gather} Neither the coordinates \(q^\mu\) nor the generators of translations \(p^\mu\) have an interpretation as observables here. We are not aiming at a ``more non commutative'' quantum mechanics, but at a noncommutative localisation framework for quantum fields. \subsection{States, uncertainties and optimal localisation} The operators \(q^\mu\) on \(\mathfrak K\) generate all possible localisations through the choice of localisation states, namely expectation functionals of the form \(\langle\cdot\rangle_\rho=\text{Tr}(\rho\cdot)\) for some positive operator \(\rho\) with \(\text{Tr}(\rho)=1\) (a density matrix). Such a state describes fuzzy localisation around the point \(a\in\mathbb R^4\) given by \(a^\mu=\langle q^\mu\rangle_\rho\), with variance \(\Delta_\rho(q^\mu)^2=\langle (q^\mu-\langle q^\mu\rangle_\rho)^2\rangle_\rho\). By Heisenberg--like arguments, it can be proved that the uncertainties \(\Delta_\rho(q^\mu)\) fulfil the bounds\footnote{There is no reason to expect such bounds to be form--covariant: indeed the uncertainty \(\Delta_\rho\) is not linear in its argument, so that \(\Delta_\rho({\varLambda^\mu}_\nu q^\nu)\neq {\varLambda^\mu}_\nu\Delta_\rho(q^\nu))\) in general.} \begin{gather} \Delta_\rho(q^0)(\Delta_\rho(q^1)+\Delta_\rho(q^2)+\Delta_\rho(q^3))\geqslant\lambda_P^2,\\ \Delta_\rho(q^1)\Delta_\rho(q^2)+\Delta_\rho(q^2)\Delta_\rho(q^3)+\Delta_\rho(q^3)\Delta_\rho(q^1)\geqslant\lambda_P^2. \end{gather} The proof can be found in \cite{Doplicher:1994tu}. In the classical case, localisation states arise as probability densities \(f(x)dx\) on \(\mathbb R^4\). Points correspond to sharp densities \(\delta_a(x)=\delta(x-a)dx\). Since \(f\)'s may be rewritten as \(f(\cdot)=\int da\, f(a)\delta_a(\cdot)\), they can be thought of as convex linear combinations of \(\delta_a\)'s (up to taking limits of integral sums). Hence probability densities are the classical analogues of statistical mixtures and sharp densities are the analogues of pure states. Since however the set of operators \(q^\mu\) is not irreducible (by Schur's lemma: the commutators \([q^\mu,q^\nu]\) are not multiples of the identity), the usual identification of statistical mixtures with non trivial density matrices, and of pure states with vector states, breaks down: there are indeed vector states which are not pure! The pure states are those described by those particular vector states, which are of the form \(|\varLambda\rangle|\xi\rangle\), namely they must in particular be eigenkets of the commutators \([q^\mu,q^\nu]\). In view of the large scale limit, one would like to have a notion of states with the best possible localisation properties; then these states could be used to define interactions with the smallest possible deviations from usual locality. Indeed, an important condition is that the usual local quantum theory should appear as a limiting case of the new theory (large scale limit). A moment's though, however, shows that this is impossible, at least in such naive terms. Because of the uncertainty relations, states are extended objects in some sense, and as such they always can be delocalised at wish by suitable Lorentz boosts. No such notion as a covariant class of states with optimal localisation can be devised. This is the fundamental reason why all more or less trivial generalisations of local interactions have led to break Lorentz covariance so far. It can be regarded as an indication that the noncommutative notion which should give locality in the large scale limit is non trivial and still missing. The best one can do is to define well localised states with respect to some choice of a class of reference frames which are pairwise related by a Galilei transformation (no Lorentz boosts). A suitable criterion, then, is to select those states \(\rho\) which minimise \(\sum_\mu\Delta_\rho(q^\mu)^2\). It is clear that these states are essentially given in terms of the coherent states of the Schr\"odinger operators \(X^\mu\) used in the construction of the coordinate operators. Consider first a state of the form \(\ket{I}\ket{\eta_0}\) where \(\ket{\eta_0}\) is the normalised ground state of the harmonic oscillator for the Schr\"odinger operators\footnote{Actually, we should add a degeneration label \(\kappa\) and write \(\ket{\eta_0,\kappa}\); since however this degeneracy is only an artefact of the amplification which is used to implement translations, we shall omit the label \(\kappa\).}; then the sum of the squares of the corresponding uncertainties attains the minimum \[ \sum_\mu\Delta(q^\mu)^2=\lambda_P^2\sum_\mu\Delta(X^\mu)^2=\lambda_P^2\big(\Delta(Q_1)^2+\Delta(Q_2)^2+\Delta(P_1)^2+\Delta(P^2)^2\big)=\lambda_P^2; \] a state with these properties is said an optimal localisation state. Note that in the states described here above, the coordinates have expectation \(0\), so that \(\Delta(q^\mu)\) equals the expectation of \({q^\mu}^2\) in such states. Next, we consider the state \(\ket R\ket{\eta_0}\) where \(R\in O(3)\subset\mathscr L\). For such a state, the coordinates still have expectation in the origin, and \[ \frac{\{\bra R\bra{\eta_0}\}\sum_\mu (q^\mu)^2\{\ket R\ket{\eta_0}\}}% {\{\bra R\bra{\eta_0}\}\{\ket R\ket{\eta_0}\}}= \lambda_P^2\bra{\eta_0}\sum_\mu {R^\mu}_\nu{X^\nu}^2\ket{\eta_0}= \lambda_P^2\bra{\eta_0}\sum_\mu {X^\mu}^2\ket{\eta_0}=\lambda_P^2; \] we used that \(R\) is orthogonal and that \(\sum_\mu {X^\mu}^2=2H_0\) where \(H_0=\tfrac12(P_1^2+P_2^2+Q^2_1+Q_2^2)\). So we still find the ground state of the harmonic oscillator. It follows that \(\ket R\ket{\eta_a}\) also is an optimal localisation state, with expectation in the origin. Finally for every \(a\in\mathbb R^4\) and any \(R\in O(3)\subset\mathscr L\) we define \(|\eta_a\rangle\) by setting \(\ket R\ket{\eta_a}=U(I,a)\ket R\ket{\eta_0}\); by unitarity, \(\ket R\ket{\eta_a}\) is an optimal localisation state, but now \(q\) is expected at \(a\). Indeed, it can be shown (see \cite{Doplicher:1994tu}) that the states described above and their superpositions (with same \(a\)) are precisely all the possible optimal localisation states. We have \begin{equation} \{\langle R|\langle\eta_a|\}e^{ikq}\{|R\rangle|\eta_a\rangle\}= e^{ika}e^{-\frac1{2}\lambda_P^2\sum_\mu(k^\mu)^2}. \end{equation} \subsection{Independent localisation events}\label{subsec:ILE} The standard way of constructing the coordinates \(q^\mu_j\) of independent events is via tensor products, taking \[ q^\mu_j=I\otimes\dotsm\otimes I\otimes q^\mu\otimes I\otimes\dotsm\otimes I\quad \text{(\(q^\mu\) in the \(j^\text{th}\) position)}, \] so that the commutation relations are of the form \begin{equation}\label{eq:many_Q} [q^\mu_j,q^\nu_k]=i\delta_{jk}\lambda_P^2Q^{\mu\nu}_j. \end{equation} If we take the usual definition of tensor product, we get \[ Q^{\mu\nu}_j=I\otimes\dotsm\otimes Q^{\mu\nu}\otimes\dotsm\otimes I\quad \text{(\(Q^{\mu\nu}\) in the \(j^\text{th}\) position)}. \] However, again due to the reducibility of the set \(\{q^\mu\}\) of operators, a different construction which also deserves the name of tensor product is possible, for which the commutators fulfil \begin{equation}\label{eq:Qequal} Q^{\mu\nu}_1=Q^{\mu\nu}_2=\dotsb \end{equation} and the \(j\) dependence of \(Q^{\mu\nu}\) in \eqref{eq:many_Q} can be dropped \cite{Bahns:2003vb}. The idea is to define the direct product of kets ``pointwise in \(\varLambda\)'': \[ \{|\varLambda\rangle|\xi_1\rangle\}\{|\varLambda\rangle|\xi_2\rangle\}\dotsm \{|\varLambda\rangle|\xi_n\rangle\}= |\varLambda\rangle|\xi_1\rangle|\xi_2\rangle\dotsm|\xi_n\rangle \] These kets span the Hilbert space \(L^2(\mathscr L)\otimes L^2(\mathbb R^{4})\otimes\dotsm \otimes L^2(\mathbb R^{4}) \) (usual direct product). On such kets, we define the operator \[ F_j|\varLambda\rangle|\xi_1\rangle|\xi_2\rangle\dotsm|\xi_n\rangle= |\varLambda\rangle|\xi_j\rangle|\xi_1\rangle|\xi_2\rangle\dotsm|\xi_{j-1}\rangle|\xi_{j+1}\rangle\dotsm|\xi_n\rangle, \] which exchange \(|\xi_1\rangle\) with \(|\xi_j\rangle\). Finally, accordingly with the new definition of direct product, \begin{gather} q^\mu_1|\varLambda\rangle|\xi_1\rangle|\xi_2\rangle\dotsm|\xi_n\rangle= \{q^\mu|\varLambda\rangle|\xi_1\rangle\}\rangle|\xi_2\rangle\dotsm|\xi_n\rangle,\\ q^\mu_j=F_jq^\mu F_j, \end{gather} which are easily checked to have the desired properties. Both choices of \(\otimes\) give covariant coordinates. In particular for the construction described above---which we will adopt from now on---the representation of the Poincar\'e group is \[ U(\varLambda,0)|M\rangle|\xi_1\rangle|\xi_2\rangle\dotsm|\xi_n\rangle= |\varLambda M\rangle|\xi_1\rangle|\xi_2\rangle\dotsm|\xi_n\rangle, \] and \begin{equation} U(\varLambda,a)^{-1}q^\mu_j U(\varLambda,a)={\varLambda^\mu}_\nu q^\nu_j+a^\mu. \end{equation} \subsection{How close can independent events come to?} \label{subsec:close} One reason why the direct product ``taken pointwise over \(\varLambda\)'' is preferable when constructing the coordinates of many independent events is that it leads to a natural generalisation of the classical concept of localising independent events at the same point \cite{Bahns:2003vb}. This can be used for example when a function \(f(x_1,x_2,\dotsc,x_n)\) of \(n\) events is evaluated on the diagonal set, giving a function \(g(x)=f(x,x,\dotsc,x)\) of one event only. Define the operator \[ \bar q^\mu=\frac1{\sqrt n}(q^\mu_1+\dotsb+q^\mu_n). \] As a consequence of \eqref{eq:Qequal}, \[ [\bar q^\mu,q^\nu_{j}-q^\nu_k]=0, \] namely \(\bar q^\mu\) is statistically independent from the differences of any two events (this would not be the case if the ordinary construction of the direct product were taken instead). Note then that every \(q^\mu_j\) can be written as a linear combination of \(\bar q^\mu\) and the differences \(q^\mu_j-q^\mu_k\): \[ q^\mu_j=\frac1{\sqrt n}\bar q^\mu+\frac1{n}\sum_k(q^\mu_j-q^\mu_k). \] The above remarks suggest to consider a different realisation of the same commutation relations, using one more tensor factor. We define \begin{equation}\label{eq:tildeq} \tilde q^\mu_j=\frac1{\sqrt n}q^\mu\otimes\underbrace{I\otimes\dotsm\otimes I}_{\text{\footnotesize \(n\) factors}}\;+\;\frac1{n}\sum_kI\otimes(q^\mu_j-q^\mu_k). \end{equation} as operators on \(\underbrace{\mathfrak K\otimes\dotsm\otimes\mathfrak K}_{\text{\footnotesize \(n+1\) factors}}\) (direct products taken ``pointwise in \(\Lambda\)''). It is clear by construction that \[ [\tilde q^\mu_j,\tilde q^\nu_k]=i\lambda_P^2\delta_{jk}Q^{\mu\nu}, \] where \(I\otimes Q^{\mu\nu}\) is identified with \(Q^{\mu\nu}\) according to \eqref{eq:Qequal}. Moreover the average coordinate is \[ \frac 1n\sum_j\tilde q_j=\frac1{\sqrt n}q^\mu\otimes\underbrace{I\otimes\dotsm\otimes I}_{\text{\footnotesize \(n\) factors}}, \] which commutes with the \(\tilde q_j^\mu\)'s. The unitary representation \[ \tilde U(\varLambda,a)=\underbrace{U(\varLambda,a)\otimes\dotsm\otimes U(\varLambda,a)}_{\text{\footnotesize \(n+1\) factors}} \] fulfils \[ \tilde U(\varLambda,a)^{-1}\tilde q^\mu_j\tilde U(\varLambda,a)={\varLambda^\mu}_\nu \tilde q^\nu_j+a^\mu. \] We now want to set all difference \(\tilde q_j-\tilde q_k\) to thei minimum value at once, compatibly with the uncertainty relations. Before giving the general construction, we first discuss an easier, less general construction, which allows to highlight the main point. We choose a state \(|R\rangle|\eta_a\rangle\) with optimal localisation, as discussed in section \ref{subsec:ILE}; here \(R\) is an element of \(O(3)\subset\mathscr L\) and \(\eta_a\) is a coherent state. Observe now that the direct product \(\ket\Psi\) of \(n\) copies of this state gives, with our particular definition of direct product, \[ \ket\Psi=\underbrace{\{|R\rangle|\eta_a\rangle\}\dotsm\{|R\rangle|\eta_a\rangle\}}_{\text{\footnotesize \(n\) factors}}= |R\rangle\underbrace{|\eta_a\rangle|\eta_a\rangle\dotsm|\eta_a\rangle}_{\text{\footnotesize \(n\) factors}}. \] We can use it to define a partial expectation on the last \(n\) tensor factor. The components of the separation \[ \delta_{jk}\tilde q^\mu=\frac{\tilde q^\mu_j-\tilde q^\mu_k}{\sqrt 2} \] between two independent events still fulfil the same relations as the coordinates themselves: \[ [\delta_{jk}\tilde q^\mu,\delta_{jk}\tilde q^\nu]=i\lambda_P^2Q^{\mu\nu}. \] Moreover, the partial expectation over the state \(\ket\Psi\) (acting on the last \(n\) tensor factors) gives \begin{gather*} \bra\Psi\delta_{jk}\tilde q^\mu\ket\Psi=0,\\ \sum_\mu\Delta(\delta_{jk}\tilde q^\mu)^2=\sum_\mu \bra\Psi(\delta_{jk}\tilde q^\mu)^2\ket\Psi=\lambda_P^2, \end{gather*} and the latter is precisely the property selecting the states with optimal localisation; note that, as expected, the choice of \(a\) is irrelevant. Hence we may say that this partial expectation has the effect of setting the differences \(\delta\tilde q_{jk}\) as close to zero as possible, compatibly with the uncertainty relations. We regard this as a quantum generalisation of the classical operation of setting \(x_1=x_2=\dotsc\). This is almost what we want; the only problem is that there is no need to restrict to a particular joint eigenspace of the \(Q^{\mu\nu}\)'s, namely the one corresponding to the projection on \(\ket R\). It is sufficient to restrict to the sum of all joint eigenspaces of the \(Q^{\mu\nu}\)'s which correspond to orthogonal transformations. To do this, we split the above operation in two steps. We first define the orthogonal projection \(E\) which sends \(|\varLambda\rangle|\xi_1\rangle|\xi_2\rangle\dotsm|\xi_n\rangle\) to 0 if \(\varLambda\) contains a Lorentz boost, and leaves it unchanged otherwise. We have \begin{gather*} [\tilde q^\mu_j,E],\\ [\tilde U(R,a),E]=0,\quad R\in O(3),a\in\mathbb R^4. \end{gather*} In other words, \(E\) is the biggest possible projection which commutes with all \(q_j^\mu\)'s and is stable under orthogonal transformations. We then restrict our coordinates \(\tilde q^\mu_j\) to operators acting on the range \(L^2(O(3))\otimes L^2(\mathbb R^{4(n+1)})\) of \(E\), and afterwards we take the partial expectation on the state \(\ket{\eta_a}\dotsm\ket{\eta_a}\) (\(n\) factors) acting on the last \(n\) direct factors. The resulting map \(\mathbb E\) has its range in the operators on \(L^2(O(3))\otimes L^2(\mathbb R^4)\), and has the following properties: \begin{gather} \mathbb E[\delta_{jk}\tilde q^\mu]=0,\\ \label{eq:ultra_gauss} \mathbb E[e^{ik_\mu\delta_{jk}\tilde q^\mu}]=e^{-\lambda_P^2\frac12\sum_\mu (k^\mu)^2} \end{gather} as multiples of the identity operator. Moreover \[ \mathbb E\left[\frac{\tilde q^\mu_1+\dots+\tilde q^\mu_n}n\right]\ket R\ket\xi= \frac{\lambda_P}{\sqrt n}\ket R\{{R^\mu}_\nu X^\nu\ket\xi\}, \] which defines new operators \begin{equation} \dot q^\mu=\mathbb E\left[\frac{q_1+\dotsb+q_n}n\right] \end{equation} on \(L^2(O(3))\otimes L^2(\mathbb R^4)\) with the nice property that the corresponding commutators \[ [\dot q^\mu,\dot q^\nu]=i\left(\frac{\lambda_P}{\sqrt n}\right)^2\dot Q^{\mu\nu} \] induce the same uncertainty relations of the initial coordinates, but with the Planck length scaled by \(\sqrt n\). This is precisely what one would expect of the statistical behaviour of a mean of independent stochastic variables. In the large \(n\) limit, the average coordinate of many events becomes deterministic. Note that the coordinates \(\dot q^\mu\) are covariant under orthogonal transformations and translations: \begin{subequations} \begin{equation} \dot U(R,a)^{-1}\dot q^\mu\dot U(R,a)={R^\mu}_\nu\dot q^\nu+a^\mu,\quad R\in O(3)\subset\mathscr L, a\in\mathbb R^4, \end{equation} where the representation \(\dot U(R,a)\) is obtained by restricting each unitary operator \(U(R,a)\) to \(L^2(O(3))\otimes L^2(\mathbb R^4)\). Finally, the map \(\mathbb E\) is covariant in the sense that \begin{equation} \dot U(R,a)^{-1}\mathbb E[\,\cdot\,]\dot U(R,a)= \mathbb E[\tilde U(R,a)^{-1}\,\cdot\, \tilde U(R,a)],\quad R\in O(3)\subset \mathscr L,a\in\mathbb R^4. \end{equation} \end{subequations} We will use this map to define a quantum generalisation of the Wick product in section \ref{subsec:quantum_wick}, where we will need the explicit form of \(\mathbb E[e^{i\sum_jk_jq_j}]\) which we will now compute. We first map \(e^{i\sum_j k_jq_j}\) (which acts on kets of the form \(\ket\varLambda\ket{\xi_1}\dotsm\ket{\xi_n}\)), into \(e^{i\sum_jk_j\tilde q_j}\) (which acts on kets of the form \(\ket\varLambda\ket\xi\ket{\xi_1}\dotsm\ket{\xi_n}\)). We observe that \[ \sum_jk_j\tilde q_j=\left(\frac{1}{\sqrt n}\sum_jk_j\right) q\otimes \underbrace{I\otimes\dotsm\otimes I}_{\text{\(n\) factors}}\;+\; I\otimes\sum_j\left(k_j-\frac 1n\sum_l k_l)q_l\right). \] acting on \(\ket R\ket{\xi}\ket{\xi_1}\dotsm\ket{\xi_n}\). It follows that \[ e^{i\sum_jk_j\tilde q_j}=\left(e^{\frac i{\sqrt n}\big(\sum_jk_j\big) q}\right)\otimes \left(e^{i\sum_j\left(k_j-\frac 1n\sum_l k_l\right)q_l}\right). \] where the direct product is taken ``pontwise in \(\varLambda\)''. Now we restrict to the range of the projection \(E\). We do that simply by restricting ourselves from now on to kets \(\ket{R}\) with \(R\in O(3)\subset \mathscr L\). We take the partial expectation of \(e^{i\sum_jk_j\tilde q_j}\) (restricted to the range of \(E\)) over the last \(n\) factors, using a state \(\ket{\eta_0}\dotsm\ket{\eta_0}\) where \(\eta_0\) is the ground state of the harmonic oscillator: this gives \begin{align} \nonumber\mathbb E[e^{i\sum_jk_jq_j}]&=e^{i\sum_jk_j\dot q} \{\underbrace{\bra{\eta_0}\dotsm\bra{\eta_0}}_{\text{\footnotesize{\(n\) factors}}}\}\sum_j\left(k_j-\frac 1n\sum_l k_l\right)q_l \{\underbrace{\ket{\eta_0}\dotsm\ket{\eta_0}}_{\text{\footnotesize{\(n\) factors}}}\}=\\ &= e^{-\lambda_P^2\frac12\left(\sum_j|k_j|^2-\sum_{jl}k_j\cdot k_l\right)}e^{i\sum_jk_j\dot q} \label{eq:E_weyl} \end{align} where \(h\cdot k=\sum_{\mu=0}^3k^\mu h^\mu\), \(|k|^2=\sqrt{k\cdot k}\), and we recall that \(\dot q^\mu\) is the restriction of \(q^\mu/\sqrt n\) to \(L^2(O(3))\otimes L^2(\mathbb R^4)\). \subsection{Distance, area and volume operators} In the framework of the universal differential calculus of \cite{dubois-violette:univ-calc}, we may define the differential of coordinates as \begin{equation} dq^\mu=q^\mu\otimes I-I\otimes q^\mu. \end{equation} This provides another reason why the construction of \(\otimes\) which we used in section \ref{subsec:ILE} is preferable: if it is used in the definition of \(d\), then \(dQ^{\mu\nu}=0\), which is compatible with the interpretation of \(Q^{\mu\nu}\) as an independent background. If the universal calculus is used alone, the realisation of the commutation relations by operators on the Hilbert space plays little role. An interesting way of making the differential calculus to interplay with operator products is to use the operator product instead of the tensor product when multiplying differentials with each other \cite{4-volume}, e.g. \begin{align*} dq^\mu\cdot dq^\nu&=(q^\mu\otimes I-I\otimes q^\mu)\cdot (q^\nu\otimes I-I\otimes q^\nu)=\\ &=q^\mu\otimes q^\nu\otimes I-q^\mu\otimes I\otimes q^\nu-I\otimes q^\mu q^\nu\otimes I+I\otimes q^\mu\otimes q^\nu. \end{align*} So the product of two differentials is a combination of products of operator living on the 3-fold tensor product of the one--event state space; which is consistent with the interpretation of \(dq\) as a ``segment'' with two extreme events, the product of two differentials describing the ``join'' of two such ``segments'' at the same event. In particular, a very simple generalisation of the usual definitions of area and 3- and 4-volume operators can be given \cite{4-volume}. For example, the 4-volume operator is defined as \begin{equation} V=\epsilon_{\mu\nu\rho\sigma}dq^\mu\cdot dq^\nu\cdot dq^\rho\cdot dq^\sigma, \end{equation} which lives in the 5-fold tensor product, and indeed one needs five events to give a hypercube in four dimensions. The resulting operator is not selfadjoint, as a consequence of the commutators which show up when exchanging the order of the ``vertexes''. Quite unexpectedly, \(V\) is normal, namely \(VV^*=V^*V\). The phase operator appearing in the polar decomposition of the 4-volume operator can be regarded as a quantum generalisation of the sign describing the orientation. The 4-volume operator is very complicated; yet its spectrum can be computed and is found to be \(\{(n\sqrt 5\pm 2+ia)\lambda_P^4:n\in\mathbb Z,a\in\mathbb R\}\). In particular the absolute value of the 4-volume operator is bounded below by \((\sqrt 5-2)\lambda_P^4\approx .23 \lambda_P^4\). We refer to the original paper \cite{4-volume} for the details of the computation. \subsection{The $\star$-product}\label{subsec:star} Let \begin{equation}\label{eq:def_Sigma} \Sigma=\{\sigma{(\varLambda)}:\varLambda\in\mathscr L\}, \end{equation} according to the notation \eqref{eq:sigma_all}. Provided that the integrals exist, we may associate to each complex function \(f(\sigma;x)\) of \(\Sigma\times\mathbb R^4\) the operator \begin{align}\nonumber f(Q;q)\{\ket\varLambda\ket\xi\}&= \ket\varLambda\left\{\int dk{}\check f(\sigma{(\varLambda)};k) e^{i\lambda_P(\varLambda X)k}\ket\xi\right\}=\\ &=\ket\varLambda\left\{\int dk{}\check f(\sigma{(\varLambda)};k) e^{i\lambda_PX(\varLambda^{-1}k)}\ket\xi\right\}, \end{align} where the Fourier transformation acts on \(f(\sigma;\cdot)\) for every \(\sigma\) fixed. Note that, if \(f\) does not depend explicitly on \(\sigma\), the above is simply \(\int dk\,{}\check f(k)e^{ikq}\); if, otherwise, \(f\) does not depend explicitly on \(x\), the above is the usual function \(f(Q)\) of the sixteen pairwise commuting operators \(Q^{\mu\nu}\). Now we consider the product of two such operators \begin{align}\nonumber f(Q;q)&g(Q;q)\{\ket\varLambda\ket\xi\}=\\ &=\ket\varLambda\left\{\int dh\,dk{} \check f(\sigma{(\varLambda)};h) \check g(\sigma{(\varLambda)};k) e^{i\lambda_PX(\varLambda^{-1}h)}e^{i\lambda_PX(\varLambda^{-1}k)}\ket\xi\right\} \label{eq:prod_op} \end{align} By definition the operators \(X^\mu\) (defined at the beginning of section \ref{subsec:dfr_coord}) fulfil the commutation relations \([X^\mu,X^\nu]= {\sigma(I)}^{\mu\nu}\), where \(\sigma{(I)}\) is given by \eqref{eq:sigmanot}. The BCH formula implies \[ e^{i\lambda_PhX}e^{i\lambda_PkX}=e^{-\frac i2\lambda_P^2 \sigma{(I)}^{\mu\nu}h_\nu k_\nu}e^{i(h+k)X}; \] substituting this in \eqref{eq:prod_op}, we get \begin{equation} f(Q;q)g(Q;q)\{\ket\varLambda\ket\xi\}= \ket\varLambda\left\{\int dh\,dk{}(\check f\tilde\times\check g)(\sigma{(\varLambda)};k) e^{i\lambda_PkX)}\ket\xi\right\}, \end{equation} where \begin{equation} (\check f\tilde\times\check g)(\sigma;k)= \int dh \check f(\lambda_P^2\sigma;h)\check g(\lambda_P^2\sigma;k-h) e^{-\frac i2\lambda_P^2\sigma^{\mu\nu}h_\nu k_\nu}, \end{equation} and antisymmetry of \(\sigma\) has been used. Defining now \begin{equation} (f\star g)(\sigma;x)=\int dk(\check f\tilde\times\check g)(\sigma;k)e^{ikx}, \end{equation} we get \begin{equation} f(Q;q)g(Q;q)=(f\star g)(Q;q). \end{equation} Note that, even in the case when \(f\) and \(g\) do not explicitly depend on \(\sigma\), their \(\star\)-product does. For the explicit expression of \(\star\) and its (complicate) relationship with the Moyal expansion, see \cite{Piacitelli:2010bn}. The \(\star\)-product here only plays an ancillary role. Its only use in this paper is the following. To every \(f(Q;q)\) and \(t\in\mathbb R\) we can associate the operator \[ \int\limits_{x^0=t} d^3x\,f(Q;x) \] on \(L^2(\mathscr L)\) whose action is \[ \int\limits_{x^0=t} d^3x\,{}f(Q;x)\ket\varLambda= \int\limits_{x^0=t} d^3x\,{}f(\sigma{(\varLambda)};x)\ket\varLambda. \] This map is positive, in the sense that it maps \(f(Q;q)^*f(Q;q)\) (which is a positive operator) to another positive operator (see \cite[Sec. 5]{Doplicher:1994tu} for the proof). We only will need the \(\star\)-product in the case of operators of the form \(f_1(Q;q)\dotsm f_n(Q;q)=(f_1\star\dotsm \star f_n)(Q;q)\), which the above map sends into \(\int_{x^0=t}(f_1\star\dotsm \star f_n)(Q;x)\). \section{Quantum Field Theory on Quantum Spacetime} \subsection{The Klein--Gordon field on classical spacetime} To fix the notations, we briefly recall the standard definition of the massive free scalar spin 0 field (see any standard textbook, e.g.~\cite{Bjorken:1965zz}). We establish a Dirac bracket notation which defines the (Fock) Hilbert space~\(\mathfrak H\). The complete system of kets \begin{align*} &\ket\emptyset,&n=0,\\ &|\vec k_1,\dotsc,\vec k_n\rangle,\quad &n=1,2,\dotsc,\quad \vec k_j\in\mathbb R^3 \end{align*} fulfils the normalisation condition \begin{eqnarray}\nonumber \lefteqn{\langle \vec h_1,\vec h_2\dotsc,\vec h_m|\vec k_1,\vec k_2,\dotsc,\vec k_n\rangle=}\\ &=& \frac{\delta_{nm}}{n!}\sum_\pi\delta^{(3)}(\vec h_1-\vec k_{\pi_1})\delta^{(3)}(\vec h_2-\vec k_{\pi_2})\dotsm\delta^{(3)}(\vec h_n-\vec k_{\pi_n}), \end{eqnarray} where the sum runs over all permutations \(\pi\) of \((1,\dotsc,n)\), and the \(\delta^{(3)}\)'s are defined with respect to the usual translation invariant measure \(d^3k\) on \(\mathbb R^3\). In particular for any such \(\pi\) we have \(|\vec k_1,\dotsc,\vec k_n\rangle= |\vec k_{\pi_1},\dotsc,\vec k_{\pi_n}\rangle\). The ket \(|\emptyset \rangle\) is called the vacuum state. The creation and annihilation operators \begin{subequations} \begin{align} a^\dagger(\vec k)|\vec k_1,\dotsc,\vec k_n\rangle&=\sqrt{n+1}|\vec k,\vec k_1,\dotsc,\vec k_n\rangle,\\ a(\vec k)|\vec k_1,\dotsc,\vec k_n\rangle&=\sqrt{\frac1n}\sum_j\delta^{(3)}(k-k_j)|\vec k_1,\dotsc,\vec k_{j-1},\vec k_{j+1},\dotsc,\vec k_n\rangle \end{align} \end{subequations} fulfil \begin{subequations} \begin{gather}a^\dagger(k)=a(k)^*,\\ [a(\vec h),a^\dagger(\vec k)]=\delta^{(3)}(\vec h-\vec k),\\ \quad [a(\vec h),a(\vec k)]= [a^\dagger(\vec h),a^\dagger(\vec k)]=0,\\ a(\vec k)|\emptyset\rangle=0. \end{gather}\end{subequations} The scalar Klein-Gordon field is defined as \begin{subequations} \begin{equation} \varphi(x)=\int\limits_{\mathbb R^4} d^4k\,\check\varphi(k)e^{ikx} \end{equation} where \begin{equation} \check\varphi(k^0,\vec k)=\sqrt{\frac{2|k^0|}{(2\pi)^3}}\delta(k^2-m^2)\{\theta(-k^0)a(-\vec k)+\theta(k^0)a^\dagger(\vec k)\}. \end{equation} \end{subequations} Note that to each 3-vector \(\vec k\) there is a unique 4-vector \(\tilde k\) belonging to the upper mass shell (namely fulfilling \(k^0>0\) and \(k^2={k^0}^2-|\vec k|^2=m^2\)). Explicitly, \(\tilde k=(\omega_m(\vec k),\vec k)\), where \(\omega_m(\vec k)=\sqrt{m^2+|\vec k|^2}\). Since \(\square e^{ikx}=-k^2e^{ikx}\) (where \(\square=\partial_\mu\partial^\mu\)), we have \begin{equation} (\square+m^2)\varphi=0 \end{equation} There is a representation \(\mathscr U(\varLambda,a)\) of the restricted Poincar\'e group \(\mathscr P_+^\uparrow\) (where only Lorentz transformations preserving the arrow of time and the orientation of space are allowed) by unitary operators on \(\mathfrak H\): its action is \begin{subequations} \begin{gather} \mathscr U(\varLambda,a)\ket \emptyset =\ket \emptyset ,\\ \mathscr U(\varLambda,a)\ket{\vec k_1,\dotsc,\vec k_n}=e^{i(\sum_j\varLambda\tilde k_j)a}\ket{ \overrightarrow{\varLambda \tilde k_1}, \overrightarrow{\varLambda \tilde k_2},\dotsc,\overrightarrow{\varLambda \tilde k_n}}. \end{gather} \end{subequations} The notation is a bit involved, let us describe what happens: we start from a 3-vector \(\vec k\), we construct the corresponding on-shell 4-vector \(\tilde k\), we apply to it the Lorentz transformation \(\varLambda\) giving the 4-vector \(\varLambda\tilde k\), whose space part is \(\overrightarrow{\varLambda\tilde k\phantom{_j}}\). Note that, since \(\varLambda\) preserves the time arrow, \(\varLambda\tilde k\) is in the upper mass shell, too. By construction, \[ \mathscr U(\varLambda,a)a^\dagger(\vec k)\mathscr U(\varLambda,a)^{-1}= e^{i(\varLambda\tilde k)a}a^\dagger\Big(\overrightarrow{\varLambda\tilde k\,}\Big). \] It follows that\footnote{To check these computations the matrix notation for Lorentz matrices can be useful: the Lorentzian product \(ka=k_\mu a^\mu\) may be written as \(K^t GA\), where \(K,A\) are column vectors, \(t\) is matrix transposition, and \(G=\text{diag}(1,-1,-1,-1)\) is the metric. Then conservation of the metric is \(\varLambda G\varLambda^t=G\). From this and \(G^2=I\) follows \(\varLambda^{-1}=G\varLambda^t G\), which in turn gives (back to usual notations) \(k(\varLambda a)= (\varLambda^{-1}k)a\).} \begin{subequations} \begin{align} \mathscr U(\varLambda,a)\check\varphi(k)\mathscr U(\varLambda,a)^{-1} &=e^{i(\varLambda k)a}\check\varphi(\varLambda k),\\ \mathscr U(\varLambda,a)\varphi(x)\mathscr U(\varLambda,a)^{-1}&= \varphi(\varLambda x+a)),\\ \end{align} \end{subequations} where \((\varLambda,a)\in\mathscr P_+^\uparrow\). The spectrum condition holds, namely the generators \(P^\mu\) of translations defined by \(\mathscr U(I,a)=e^{iaP}\) fulfil \(P_\mu P^\mu\geqslant 0\) and \(P^0\geqslant 0\). In particular we have \(P^\mu\ket\emptyset=0\) and \begin{equation} P^\mu\ket{\vec k_1,\dotsc,\vec k_n}=\sum_{j}{\tilde k_j}^\mu \ket{\vec k_1,\dotsc,\vec k_n}; \end{equation} note that any finite sum \(\sum_j{\tilde k_j}^\mu\) is contained in the convex hull of the upper mass shell of mass \(m\). It is noteworthy for our purposes that the Hamiltonian \(H_0=P^0\) of the free field takes the form \begin{subequations} \begin{equation} H_0=\int\limits_{x^0=t}d^3x\;{}\mathscr H_0(x), \end{equation} where \begin{equation} \mathscr H_0(x)=\frac12\int\limits_{x^0=0}d^3x\wick{(\partial^0\varphi)(x)^2-(\partial^0\partial^0\varphi)(x)\varphi(x)} \end{equation} \end{subequations} and the double dots indicate normal (Wick) ordering of annihilations and creations. \subsection{DFR quantisation of the Klein--Gordon field} According to the discussion of the introduction, \begin{equation} \boldsymbol\varphi(q)=\int dk\,\check\varphi(k)\otimes e^{ikq} \end{equation} as an operator on \(\mathfrak H\otimes\mathfrak K\), where \(\mathfrak H\) is the Fock space and the coordinates \(q^\mu\) are operators on \(\mathfrak K\). In particular, for \(\ket{k_1,\dotsc,k_n}\in\mathfrak H\) and \(\ket\varLambda\ket\xi\in\mathfrak K\), \begin{equation} \boldsymbol\varphi(q)\{|k_1,\dots,k_n\rangle|\varLambda\rangle|\xi\rangle\}= \int dk\{\check\varphi(k)|k_1,\dotsc,k_n\rangle\}\{e^{ikq}|\varLambda\rangle|\xi\rangle\}. \end{equation} By abuse of notations, we still denote by \(\mathscr U,U\) the representations of Poincar\'e transformations acting non trivially on the first and second tensor factor of \(\mathfrak H\otimes\mathfrak K\), respectively. We find \begin{align*} \mathscr U(\varLambda,a)\boldsymbol\varphi(q) \mathscr U(\varLambda,a)^{-1}&=\int dk\,\left(\mathscr U(\varLambda,a) \check\varphi(k)\mathscr U(\varLambda,a)^{-1}\right)\otimes e^{ikq}=\\ &=\int dk\,e^{i(\varLambda k)a}\check\varphi(\varLambda k)\otimes e^{ikq}=\\ &=\int dh\,\check\varphi(h)\otimes e^{ih(\varLambda q+a)}=\\ &=\int dh\,\check\varphi(h)\otimes \left(U(\varLambda,a)^{-1}e^{ihq}U(\varLambda,a)\right)=\\ &=U(\varLambda,a)^{-1}\boldsymbol\varphi(q)U(\varLambda,a). \end{align*} Hence the DFR quantisation of a free quantum field is covariant. Note that the above result can be given the simpler form \begin{equation} \mathscr U(\varLambda,a)\boldsymbol\varphi(q) \mathscr U(\varLambda,a)^{-1}=\boldsymbol\varphi(\varLambda q+a). \end{equation} Since translations are unitarily implemented, we also have derivatives; we find that the DFR quantisation commutes with taking derivatives: \begin{equation} \lim_{\lambda\rightarrow 0}\frac1\lambda(\mathbf\varphi(q+\lambda e^\mu)= (\boldsymbol{\partial_\mu\varphi})(q), \end{equation} where \(e^\mu\) is the \(\mu^{\text{th}}\) canonical basis vector of \(\mathbb R^4\). Hence, the DFR quantised free field fulfils the Klein--Gordon equation: \begin{equation} (\square + m^2)\boldsymbol\varphi(q)=0. \end{equation} The partial expectation of \(\boldsymbol\varphi(q)\) over a state with optimal localisation around \(a\in\mathbb R^4\) gives, according to \eqref{eq:smeared_qfield}, the free field operator on the Fock space \(\mathfrak H\), smeared with a Gaussian: \begin{align}\nonumber F_a=\{ \bra R \bra{\eta_a} \} \boldsymbol\varphi(q)\{\ket R\ket{\eta_a}\} &=\int dk\,{} \check\varphi(k) \{\bra R\bra{\eta_a}\} e^{ikq}\{\ket R\ket{\eta_a}\}=\\ &=\frac1{(2\pi)^{2}}\int dx\; \varphi(x)e^{-\frac{|x-a|^2}{2\lambda_P^2}}, \end{align} where \(|x-a|^2=\sum_\mu(x^\mu-a^\mu)^2\). It follows that \begin{equation} [F_a,F_{a+x}]\propto i\frac{\lambda_P}{|\vec x|}\left(e^{-\frac1{8\lambda_P^2}(|\vec x|-x^0)^2}-e^{-\frac1{8\lambda_P^2}(|\vec x|+x^0)^2}\right) \end{equation} which falls off as a Gaussian in spacelike dimensions (as a function of \(x\)), and converges to the usual commutator function in the large scale limit. \subsection{The DFR perturbative setup}\label{subsec:dfr_setup} The basic idea of the DFR perturbative setup is to construct an {\itshape effective non local quantum field theory on the classical spacetime}: the underlying idea is the following: there are incoming and outgoing free fields on the classical spacetime, describing free particles: since they do not interact, they ``do not know'' that the spacetime is quantum. When interaction takes place, the quantum texture of spacetime enters in the game, and this is taken into account by a nonlocal deformation of the interaction Lagrangian. A key remark is that \begin{equation} \boldsymbol H_0(Q)=\int\limits_{x^0=t}d^3x\mathscr H_0(q)=H_0\otimes I, \end{equation} namely the free Hamiltonian is left essentially unchanged by the Weyl quantisation, apart from the \(\otimes I\) which reminds that, while \(H_0\) is an operator on the Fock space \(\mathfrak H\), its quantisation is an operator on \(\mathfrak H\otimes\mathfrak L^2(\mathscr L)\). Since \(Q^{\mu\nu}\) is unaffected by time translations, we have \begin{equation} e^{it\boldsymbol H_0(Q)}\boldsymbol\varphi(q^0,q^1,q^2,q^3)e^{-it\boldsymbol H_0(Q)}= \boldsymbol\varphi(q^0+t,q^1,q^2,q^3). \end{equation} Free fields are essentially unaffected by the DFR quantisation. This remark led the authors of \cite{Doplicher:1994tu} to continue this analogy, and define a nonlocal generalisation of the interaction Lagrangian \(\wick{\varphi(x)^n}\) as \(\wick{\boldsymbol\varphi(q)^n}\), which can be written equivalently as \(\wick{(\varphi\star\dotsm\star\varphi}(Q;q)\). Then, by the remarks at the end of section \ref{subsec:star}, it makes sense to consider \begin{equation} \boldsymbol H_{I,\star}(Q;t)=\int\limits_{x^0=t}d^3x \wick{(\varphi\star\dotsm\star\varphi)}(Q,x), \end{equation} again as a (formal) operator on \(\mathfrak H\otimes\mathfrak L^2(\varLambda)\), and we add the subscript \(\star\) to keep track of the choice of the noncommutative Wick product. At a certain point, we will have to take a partial expectation so to obtain an effective interaction term \(H_{I,\star}^{\text{eff}}(t)\) as an operator on the Fock space \(\mathfrak H\); in other words, we have to integrate out the \(Q\) dependence. This is necessary to obtain a scattering matrix which interpolates the incoming and outgoing free fields, which live on the Fock space \(\mathfrak H\) alone; indeed, physical intuition suggests that the noncommutativity gets averaged out over large distances without interactions. However, let us leave this apart for a while. Mimicking usual QFT, we formally define the limit \(\boldsymbol S_{\star}(Q)=\boldsymbol U_{\star}(Q;\infty,-\infty)\) of the unitary evolution semigroup \(\boldsymbol U_{\star}(Q;t,s)\), which fulfils \begin{gather*} \boldsymbol U_{\star}(Q;t,t)=\boldsymbol I,\\ \boldsymbol U_{\star}(Q;s,t)\boldsymbol U_{\star}(Q;t,u)=\boldsymbol U_{\star}(Q;s,u),\\ \boldsymbol U_{\star}(Q;s,t)^{-1}=\boldsymbol U_{\star}(Q;t,s), \end{gather*} and solves the evolution equation \begin{equation} \frac{\partial \boldsymbol U_{\star}}{\partial t}(Q;t,s)=i\boldsymbol H_{I,\star}(Q;t)\boldsymbol U_{\star}(Q;t,s) \end{equation} Its formal solution is given by the Dyson series \begin{equation} \boldsymbol S_{\star}(Q)=I+\sum_{N=1}^\infty\frac{i^N}{N!}\int dt_1\dotsm dt_N\,T[\boldsymbol H_{I,\star}(t_1),\dotsc,\boldsymbol H_{I,\star}(t_N)], \end{equation} where \(T\) means that the product of the \(\boldsymbol H_{I,\star}(t_j)\)'s is taken in the order of decreasing times, namely \begin{eqnarray}\nonumber \lefteqn{T[\boldsymbol H_{I,\star}(t_1),\dotsc,\boldsymbol H_{I,\star}(t_N)]=}\\ &=& \sum_\pi\theta(t_{\pi_1}-t_{\pi_2})\theta(t_{\pi_2}-t_{\pi_3})\dotsm \theta(t_{\pi_{n-1}}-t_{\pi_n})\boldsymbol H_{I,\star}(t_{\pi_1})\boldsymbol H_{I,\star}(t_{\pi_2})\dotsm \boldsymbol H_{I,\star}(t_{\pi_n})\nonumber\\ && \end{eqnarray} where \(\theta\) is Heaviside's step function and the sum runs over the permutations of \((1,\dotsc,n)\). Note that the time ordered product is taken with respect to the labels \(t_j\) at which the space integral is taken. The matrix elements of \(\boldsymbol S_{\star}\) (as an operator on the Fock space, times \(L^2(\mathscr L)\)) are of the form \begin{equation} \{\bra{h_1,\dotsc,h_m}\bra\varLambda\}\boldsymbol S_{\star}\{\ket{k_1,\dotsc,k_n}\ket M\}=\delta(\varLambda^{-1}M)\bra{h_1,\dotsc,h_m}S_{\star}(\sigma(\varLambda)) \ket{k_1,\dotsc,k_n} \end{equation} where \(S_{\star}(\sigma)\) is a non local, non causal scattering matrix on the usual Fock space. Note that the dependence on \(\lambda_P\) is hidden in the product \(\star\). Indeed, for every \(\sigma\in\Sigma\) we have the formal limit \begin{equation} S_{\star}(\sigma)\underset{\lambda_P\rightarrow 0}{\longrightarrow} S_{\text{loc}}, \end{equation} where \(S_{\text{loc}},\) is the local, causal scattering matrix of the (non renormalised) \(\varphi^n_4\) theory on the classical Minkowski spacetime. The situation is much alike that of a bundle of non local theories over \(\Sigma\). To integrate out this dependence, one would like to take a partial expectation on the second tensor factor with some Lorentz invariant state in \(L^2(\mathscr L)\). Unfortunately, no such state exists, essentially because the Lorentz group is not amenable\footnote{This means that there is no left-invariant mean of the functions of \(\mathscr L\). Of course there is the Haar measure \(d\varLambda\), but a mean should send, by definition, the constant function 1 to 1, while \(\int d\varLambda\, 1=\infty\).}. The most symmetric choice is to take the rotation invariant state described by the characteristic function of the set \(O(3)\subset\mathscr L\), which is square summable since \(O(3)\) is compact. The partial expectation of \(\boldsymbol S_{\star}\) on such state defines an effective scattering matrix \begin{equation} S_{\star}^{\text{eff}}=\int\limits_{\Sigma^{(1)}} d\sigma\,S_{\star}(\sigma) \end{equation} on the Fock space \(\mathfrak H\), where \(\Sigma^{(1)}= \{\sigma(R):R\in O(3)\subset\mathscr L\}\) and \(d\sigma\) is the invariant measure on \(\Sigma\) induced by the Haar measure of \(\mathscr L\), normalised so that \(\Sigma^{(1)}\) has measure 1. This gives a theory covariant under rotations, but not under Lorentz boosts\footnote{Some authors claim to obtain a fully covariant interacting theory by means of a Lorentz invariant measure \(W(\theta)d\theta\), where \(d\theta\) is the invariant measure on the space \(\mathcal T\) of real second rank antisymmetric tensors. Unfortunately, such a Lorentz invariant measure must be of the form \(W(\theta)d\theta=w(\theta^{\mu\nu}\theta_{\mu\nu},(\theta^{\mu\nu}(\ast\theta)_{\mu\nu})^2)d\theta\) for some \(w(a,b)\). Hence \[ \int\limits_{\mathcal T} W(\theta)d\theta\;f(\theta)= \int\limits_{-\infty}^{\infty}da\int\limits_0^\infty db\,w(a,b) \int\limits_{\mathcal T_{a,b}}d\theta_{a,b}f(\theta), \] where \(\mathcal T_{a,b}=\{\theta:\theta^{\mu\nu}\theta_{\mu\nu}=a,(\theta^{\mu\nu}(\ast\theta)_{\mu\nu})^2=b)\}\) and \(d\theta_{a,b}\) is the measure induced by \(d\theta\) on \(\mathcal T_{a,b}\). For every \(a,b\), \(\int_{\mathcal T_{a,b}}d\theta_{a,b}=\infty\), hence this measure, though Lorentz invariant, does not define a mean. The situation is similar to the absence of a translation invariant normalised measure on the line: there's no such thing as the expected position of a particle equally distributed on the line.}. If we perform a shameless exchange \(\int d\sigma\sum_N=\sum_N\int d\sigma\) in the Dyson series, the above would be the same as starting from the beginning with a non local effective interaction term \begin{equation} H_{I,\star}^{\text{eff}}(t)=\int\limits_{\Sigma^{(1)}}d\sigma\;{} \int\limits_{x_0=0} d^3x\, \wick{\varphi\star\dotsm\star\varphi}(\sigma;x) \end{equation} on the Fock space \(\mathfrak H\). Since all these developments are formal, there is room for experimentation about the order of summation and integrations. Choosing to integrate out the \(\sigma\) dependence separately at each vertex after having performed Wick reduction, the effective scattering matrix was found ultraviolet finite in the \(\varphi_4^3\) theory \cite{Bahns:2004zb}. It is clear that, even if the effective theory is regular, its large scale limit will reproduce the non renormalised theory. Hence finite renormalisation would anyway be necessary, where the finite subtractions should diverge in the large scale limit so to reproduce the infinite subtractions of usual renormalisation. \subsection{Unitarity and Feynman diagrams} Since the Hamiltonian is formally selfadjoint, the scattering matrix is formally unitary, and no violations of unitarity should be expected. The violations discussed in the literature may be regarded as a consequence of an inconsistent prescription for the time ordering (as pointed out in \cite{Bahns:2002vm}). Indeed, for a local theory, the second order contribution to the Dyson series is \[ S_{\text{loc},2}=\frac12\iint ds\,dt\,T[H_I^{\text{loc}}(s),H_I^{\text{loc}}(t)]. \] Since the time ordering does nothing to a pointwise product of \(n\) fields, namely \(T[\varphi(x),\dotsc,\varphi(x)]=\varphi(x)^n\), the above can be written as \begin{align*} S_{\text{loc},2}&=\frac12\iint ds\,dt\,\int\limits_{x^0=s} d^3x\int\limits_{y^0=t} d^3y\;{}\;{} T[\wick{\varphi(x)^n}\,,\,\wick{\varphi(y)^n}]=\\ &=\frac12\int d^4x\int d^4y\;{}\;{} T[\wick{\varphi(x)^n}\,,\,\wick{\varphi(y)^n}], \end{align*} where the time ordering is with respect to the times \(x^0,y^0\). In other words, the time ordering can be brought inside integrals. For the non local theory described by the interaction term \(H_{I,\star}^{\text{eff}}(t)\), this cannot be done, since the latter is of the form \begin{equation} H_{I,\star}^{\text{eff}}=\int da_1\dotsm da_n\;w(a_1,\dotsc,a_n;t) \wick{\varphi(a_1)\dotsm \varphi(a_n)} \end{equation} for some totally symmetric kernel \(w\), depending on the time parameter \(t\) (and implicitly on \(\lambda_P\)). The time ordering is taken with respect to such time parameters, not to the time components \(a_j^0\) of the integration variables. Indeed, using the proper integral form of \(\star\), there's no such object as a ``\(T[\varphi(x_1)\star\dotsm\star\varphi(x_n)]\)''. But if instead one {\itshape illegally} uses the Moyal expansion of \(\star\), then he/her is misled to think that the noncommutative product is defined pointwise, since the twist only contains derivatives; in which case one would find ``\(T[\varphi(x)\star\dotsm\star\varphi(x)]= \varphi(x)\star\dotsm\star\varphi(x)\)'' (false) and again could safely bring the time ordering inside the integral (false). This is one possible mechanism to obtain the violations of unitarity. For a general discussion of the drawbacks of the Moyal expansion, see \cite{Piacitelli:2010bn}. Upon inserting the Dyson series in the Gell-Mann\&Low formula, the usual diagrammatic expansion may be used, with minor modifications to the rules. To every vertex, associate a factor \(w(a_1,\dotsc,a_n;t)da_1\dotsm da_n\); to every line originating from that vertex and labeled by \(x\) pick a factor \(\frac1i(\Delta_+(x-a_j)\theta(x^0-t)+\Delta_+(a_j-x)\theta(t-x^0)\); between any line connecting the vertex with another vertex \(w(b_1,\dotsc,b_n;s)db_1\dotsm db_n\), pick a factor \(\frac1i(\Delta_+(b_k-a_l)\theta(s-t)+\Delta_+(a_l-n_k)\theta(t-s)\); and for any two external lines labeled by \(x,y\), pick a usual Stueckelberg-Feynman propagator \(\Delta_{SF}(a_j-b_k)\). See \cite{Piacitelli:2004rm} for a detailed discussion. \subsection{Quantum Wick Products and ultraviolet regularity} \label{subsec:quantum_wick} It is peculiar of the process of generalisation that equivalent procedures may have inequivalent generalisations. Consider \(n\) functions \(f_j(x_j)\) of independent variables, and define \(F(x_1,\dotsc,x_n)=f_1(x_1)\dotsm f_n(x_n)\). The evaluation of \(F\) at coincident points may be described either as 1) setting \(x_1=x_2=\dotsc=x_n=x\), or 2) evaluate the pointwise product of functions \(f_1\dotsm f_n\) at \(x\). The equivalence of these two procedures is summarised by \[ f_1(x)\dotsm f_n(x)=(f_1\dotsm f_n)(x), \] which is so natural that on first sight we do not even notice the point. The non commutative generalisation of the ``product strategy'' is to replace the pointwise product with the product of quantised functions, or equivalently with the star product, so that one obtains \[ (f_1\star\dotsm\star f_n)(Q;q). \] This was used in the definition of non local Wick product \(\wick{\varphi\star\dotsm\star\varphi}\) discussed in the preceding section. A non commutative generalisation of the ``bring independent events to the same place'' strategy instead may be given in terms of the map \(\mathbb E\) discussed in section \ref{subsec:close}, and gives a different result. It was used in \cite{piac_tesi,Bahns:2003vb} to obtain a different generalisation of Wick product. The idea is to define the quantum wick product as \begin{equation} \qwick{\varphi(\dot q)^n}= \mathbb E[\wick{\boldsymbol\varphi(q_1)\dotsm\boldsymbol\varphi(q_n)}], \end{equation} where it is understood that \(\mathbb E\) acts on the localisation part. Since \begin{align*} \wick{\boldsymbol\varphi(q_1)\dotsm\boldsymbol\varphi(q_n)}&= \int d^4k_1\dotsm d^4k_n\wick{\check\varphi(k_1)\dotsm\check\varphi(k_n)}\otimes e^{ik_1q_1}\dotsm e^{ik_nq_n}=\\ &=\int d^4k_1\dotsm d^4k_n\wick{\check\varphi(k_1)\dotsm\check\varphi(k_n)}\otimes e^{i\sum_jk_jq_j}, \end{align*} we get by linearity and \eqref{eq:E_weyl} \begin{align*} \mathbb E[\wick{\boldsymbol\varphi(q_1)\dotsm\boldsymbol\varphi(q_n)}] &=\int d^4k_1\dotsm d^4k_n\wick{\check\varphi(k_1)\dotsm\check\varphi(k_n)}\otimes \mathbb E[e^{i\sum_jk_jq_j}]=\\ &=\int d^4k_1\dotsm d^4k_n\;e^{-\lambda_P^2\frac12\left(\sum_j|k_j|^2-\sum_{jl}k_j\cdot k_l\right)} \wick{\check\varphi(k_1)\dotsm\check\varphi(k_n)}\otimes e^{i(\sum_jk_j)\dot q}. \end{align*} Standard Fourier theory now gives \[ \mathbb E[\wick{\boldsymbol\varphi(q_1)\dotsm\boldsymbol\varphi(q_n)}]= \qwick{\underbrace{\varphi\star\dotsm\star\varphi}_{\text{\footnotesize \(n\) factors}}}(\dot q) \] where \begin{eqnarray}\nonumber \lefteqn{\qwick{\underbrace{\varphi\star\dotsm\star\varphi}_{\text{\footnotesize \(n\) factors}}}(x)=}\\\nonumber &=&\frac{n^2}{(2\pi)^{8(n-1)}}\int da_1\dotsm da_n\,\wick{\varphi(x+a_1)\dotsm\varphi(x+a_n)} e^{-\frac1{2\lambda_P^2}\sum_j|a_j|^2}\delta^{(4)}\left(\frac1{n\lambda_P}\sum_ja_j\right)\\ && \end{eqnarray} With this definition, we obtain an interaction term of the form \begin{equation} \boldsymbol H_{I,\mathscr G}(t)=H_{I,\mathscr G}^{\text{eff}}(t)\otimes \dot I \end{equation} as an operator on \(\mathfrak H\otimes L^2(O(3))\), where \begin{eqnarray}\nonumber \lefteqn{H_{I,\mathscr G}^{\text{eff}}(t)=\int\limits_{x^0=0} d^3x\,\qwick{\varphi\star\dotsm\star\varphi}(x)=}\\ &=&\nonumber \frac{n^2}{(2\pi)^{8(n-1)}}\int\limits_{x^0=t}d^3x\int da_1\dotsm da_n \wick{\varphi(x+a_1)\dotsm \varphi(x+a_n)}\\ &&e^{-\frac1{2\lambda_P^2}\sum_j|a_j|^2}\delta^{(4)} \left(\frac1{n\lambda_P}\sum_ja_j\right). \end{eqnarray} Here covariance under Lorentz boosts is broken by the map \(\mathbb E\). The resulting effective interaction term \(\boldsymbol H_{I,\mathscr G}^{\text{eff}}(t)\) does not depend explicitly on \(\sigma\in\Sigma^{(1)}\). Hence the average over the invariant measure gives precisely \(H_{I,\mathscr G}^{\text{eff}}(t)\) which defines a non local, non causal scattering matrix on the Fock space \(\mathfrak H\). Note that the only effect of noncommutativity here is to naturally reproduce a particular recipe for the so called ``point-split regularisation'' in terms of a \(\mathscr G\)aussian kernel. The resulting \(H_{I,\mathscr G}^{\text{eff}}(t)\) is completely free of ultraviolet divergences. However, the same remarks apply here about the need of finite renormalisation, as in the end of section \ref{subsec:dfr_setup}. \footnotesize \bibliographystyle{utphys}
\section{Introduction} Although most of the excitement surrounding the discovery\cite{kamihara_iron-based_2008,rotter_superconductivity_2008} of superconductivity (SC) in the iron pnictide compounds has focused on the underlying mechanism, these compounds also provide us with a fascinating opportunity to study subtle, and not so subtle, aspects of the interactions between SC, structure and magnetism. A great deal of this research has focused on the $\emph{R}$FeAsO ($\emph{R}$ = rare earth), or \emph{1111} compounds, and the $\emph{AE}$Fe$_2$As$_2$ ($\emph{AE}$ = alkaline earth), or \emph{122} family. The parent \emph{1111} and \emph{122} systems undergo transitions from a high-temperature paramagnetic (PM) tetragonal phase to a low-temperature antiferromagnetic (AFM) orthorhombic structure\cite{lumsden_magnetism_2010,rotter_spin-density-wave_2008,goldman_lattice_2008,yan_structural_2008,zhao_spin_2008,jesche_strong_2008,huang_neutron-diffraction_2008}. In the \emph{1111} parent compounds, the structural transition occurs at somewhat higher temperature than the AFM ordering.\cite{lumsden_magnetism_2010} In the \emph{122} parent compounds, these transitions appear coincident in temperature and coupled.\cite{goldman_lattice_2008,zhao_spin_2008,jesche_strong_2008,huang_neutron-diffraction_2008} The consequences of electron/hole doping for the BaFe$_2$As$_2$ compound have been studied widely. For example, upon electron doping through substitution on the Fe site by Co, Ni, Rh, Pt or Pd, the structural and AFM transitions are suppressed and split, with the structural transition found at somewhat higher temperature.\cite{canfield_feas_2010,ni_effects_2008,Chu_2009,li_superconductivity_2009,Lester_2009,pratt_coexistence_2009,Christianson_2009,kreyssig_suppression_2010,wang_electron-doping_2010} Superconductivity emerges over a small but finite range in dopant concentration. In contrast, the structural and AFM transitions remain coincident in superconducting samples produced by K doping on the Ba site, P doping on the As site, and Ru doping on the Fe site.\cite{rotter_superconductivity_2008,chen_coexistence_2009,jiang_superconductivity_2009,thaler_physical_2010,kim_neutron_2010} In Co-, Rh-, Ni-, and Ru-doped BaFe$_2$As$_2$, neutron and x-ray measurements revealed a suppression in both the magnetic order parameter and the orthorhombic distortion below the superconducting transition temperature, which indicates the coexistence and competition between magnetism and superconductivity in these systems.\cite{pratt_coexistence_2009,Christianson_2009,kreyssig_suppression_2010,wang_electron-doping_2010,nandi_anomalous_2010,kim_neutron_2010,fernandes_unconventional_2010} The nature of the structural and AFM transitions has, itself, been the subject of intense scrutiny. For CaFe$_2$As$_2$ and SrFe$_2$As$_2$, several neutron, x-ray, $\mu$SR and NMR measurements have reported that the structural/magnetic transitions are discontinuous (first-order) and hysteretic.\cite{zhao_spin_2008,goldman_lattice_2008,yan_structural_2008,jesche_strong_2008,kitagawa_antiferromagnetism_2009} However, in BaFe$_2$As$_2$, there has been significant debate concerning the character of the structural and magnetic order parameters. Early neutron measurements on polycrystalline samples found a second-order magnetic transition\cite{huang_neutron-diffraction_2008}. Neutron diffraction measurements by some groups, however, described a first-order magnetic transition but failed to observe any hysteresis,\cite{matan_anisotropic_2009} while neutron and NMR measurements by others found a first-order magnetic transition and observed a large hysteresis upon cooling and warming\cite{kofu_title_2009,kitagawa_commensurate_2008}. Wilson \emph{et al.} initially reported that the magnetic and structural transitions in BaFe$_2$As$_2$ were continuous in nature, and could be described by a simple power-law dependence with an critical exponent consistent with a two-dimensional Ising model.\cite{wilson_neutron_2009,wilson_2010_1} Later heat capacity and x-ray work by this group on annealed samples of BaFe$_2$As$_2$ found that the orthorhombic distortion appeared first as a second-order transition interrupted, at slightly lower temperature, by a first-order transition to the low temperature orthorhombic phase.\cite{Rotundu_2010} As noted by these authors, this complex structural transition and its relationship to the concomitant AFM ordering calls for further investigations. To shed light on the nature of structural and magnetic transitions, we present a combined high-resolution x-ray diffraction and x-ray resonant magnetic scattering (XRMS) study of as-grown BaFe$_2$As$_2$. In Section II we provide details of the scattering experiments on the parent BaFe$_2$As$_2$ compound and the Co- and Rh-doped compounds. In Sections III, we report the results of high-resolution x-ray diffraction and XRMS measurements on the parent BaFe$_2$As$_2$ compound and show that there is a small, but distinct, difference in the temperatures of the structural and AFM transitions. We also studied the doped compounds to substantiate our conclusion that the structural transition is continuous in nature, whereas the AFM transition changes from a first-order transition at low doping to a second-order transition for higher doping levels as the system passes through a tricritical point. In Section IV, we estimate the position of this tricritical point for the Ba(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ phase diagram and employ a mean-field approach to show that our measurements can be explained by the inclusion of an anharmonic term in the elastic free energy and magneto-elastic coupling in the form of an emergent Ising-nematic degree of freedom. In Section V, we summarize our results. \section{Experimental Details} Single crystals of BaFe$_2$As$_2$, Ba(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ and Ba(Fe$_{1-x}$Rh$_{x}$)$_2$As$_2$ compounds were produced using the self-flux solution growth method described elsewhere.\cite{ni_effects_2008} Energy dispersive spectroscopy (EDS) was performed to confirm the absence of foreign elements, and wavelength dispersive spectroscopy (WDS) was employed to determine the compositions of the Co- and Rh-doped compounds at several points on each sample, providing a combined statistical and systematic error of less than 5$\%$ of the relative elemental concentration [e.g. 0.018$\pm$0.001 for the Ba(Fe$_{0.982}$Co$_{0.018}$)$_2$As$_2$ sample]. Temperature-dependent ac electrical resistance data (\emph{f} = 16 Hz, \emph{I} = 3 mA) were collected using a Quantum Design Magnetic Properties Measurement System (MPMS) with a Linear Research LR700 resistance bridge. Electrical contact was made to the sample using Epotek H20E silver epoxy to attach Pt wires in a four-probe configuration. Temperature-dependent, high-resolution, single-crystal x-ray diffraction measurements were performed on a four-circle diffractometer using Cu \emph{K}$_{\alpha1}$ radiation from a rotating anode x-ray source, selected by a germanium (1~1~1) monochromator. For these measurements, the plate-like single crystals with typical dimensions of 3\,$\times$\,3\,$\times$\,0.5\,mm$^3$ were attached to a flat copper sample holder on the cold finger of a closed-cycle displex refrigerator. The mosaicities of the BaFe$_2$As$_2$, Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$ and Ba(Fe$_{1-x}$Rh$_x$)$_2$As$_2$ single crystals were all less than 0.02$^\circ$ full-width-at-half-maximum (FWHM) as measured by the rocking curves of the (1~1~10) reflection at room temperature. The diffraction data were obtained as a function of temperature between room temperature and 8~K, the base temperature of the refrigerator. To correlate the evolution of the structure with the occurrence of magnetic order, both conventional x-ray diffraction and XRMS measurements were performed on the 6ID-B beamline at the Advanced Photon Source (APS) using the same as-grown BaFe$_2$As$_2$ single crystal studied with the laboratory source. The single crystal was attached to a flat copper sample holder on the cold finger of a closed-cycle displex refrigerator with the tetragonal ($HHL$) plane coincident with the vertical scattering plane. The temperature, measured at a sensor mounted to the copper block holding the sample, was stable within $\pm$0.002 K. Care was taken to ensure that heating effects associated with the incident x-ray beam were minimized by measuring charge and magnetic reflections in close proximity and using the appropriate incident beam attenuation. Measurements of both the charge scattering and the XRMS were done at the Fe $K$-edge ($E$ = 7.112 keV).\cite{kim_resonant_2010} The incident radiation was linearly polarized perpendicular to the vertical scattering plane ($\sigma$-polarized) with a spatial cross section of 1.0 mm (horizontal) $\times$ 0.2 mm (vertical). In this configuration, dipole resonant magnetic scattering rotates the plane of linear polarization into the scattering plane ($\pi$-polarization), while the charge scattering leaves the polarization unchanged. Cu (2 2 0) was used as a polarization analyzer to suppress the charge and fluorescence background relative to the magnetic scattering signal by approximately a factor of 200. \section{Results} \subsection{High-resolution x-ray diffraction and XRMS measurements of BaFe$_2$As$_2$} In Fig.~\ref{parent}(a), we display [$\xi$ $\xi$ 0] scans through the (1 1 10)$_T$ charge peak, obtained using the laboratory source, for the parent BaFe$_2$As$_2$ compound measured with temperature steps of 0.25 K. Above the structural transition temperature, $T_S$ = 134.5 K, we observe a single sharp peak consistent with the tetragonal structure. Upon cooling below $T_S$, the (1 1 10)$_T$ charge peak continuously broadens and, then, clearly splits at $T$ = 133.75 K concomitant with the abrupt appearance of two additional peaks at this temperature [vertical arrows in Fig.~\ref{parent}(a)] bracketing the two inner peaks. Upon further cooling, the splitting of the two inner peaks evolves continuously as their intensities decrease, whereas the positions of the outer peaks change only slowly as their intensities increase. Below $T$ = 133.0 K, the two inner peaks disappeared leaving only the outer peaks in evidence. We note that these observations are qualitatively consistent with similar diffraction measurements on an annealed sample of BaFe$_2$As$_2$ recently reported by Rotundu \emph{et~al}.\cite{Rotundu_2010} although the transition temperatures for their annealed sample were approximately 5 K higher. \begin{figure} \begin{center} \includegraphics[clip, width=.42\textwidth]{parent}\\ \caption{(Color online) (a) X-ray diffraction scans, measured using the laboratory source, along the [$\xi$ $\xi$ 0] direction through the position of the tetragonal (1 1 10)$_T$ reflection for selected temperatures in the parent BaFe$_2$As$_2$ upon cooling. The lines present the fitted curves using a Lorentzian-squared line shape. The two-component fit to broadened peaks is illustrated for $T$ = 134.25 K. The arrows denote the positions of peaks associated with Ort-AFM as discussed in the text. At this temperature, the integrated intensity of the Ort-AFM peaks are approximately 5$\%$ of the Ort-PM diffraction peaks. (b) The orthorhombic distortion as a function of temperature upon cooling and warming determined from fits to the (1 1 10) Bragg diffraction peak.} \label{parent} \end{center} \end{figure} Having described the temperature evolution of the diffraction peaks qualitatively, it is useful at this point to introduce some labeling of the corresponding phases. The high-temperature paramagnetic phase is denoted as Tet-PM. Anticipating the results of our XRMS study, we label the orthorhombic phase that evolves continuously over a very narrow temperature range below $T_S$ [corresponding to the inner pair of peaks in Fig.~\ref{parent}(a)] as Ort-PM. We further label the orthorhombic phase that abruptly appears at $T$ = 133.75 K [corresponding to the two outer bracketing peaks in Fig.~\ref{parent}(a)] as Ort-AFM. Structurally, we assume that Ort-PM and Ort-AFM differ only with respect to the values of their lattice constants and orthorhombic distortion at a given temperature. Figure~\ref{parent}(b) describes the temperature evolution of these phases. Upon cooling, a second-order transition from Tet-PM to Ort-PM occurs at $T_S$ = 134.5 K followed by a first-order transition to Ort-AFM at $T_N$ = 133.75 K. There is a region of coexistence between Ort-AFM and Ort-PM from 133.75 K to 133.0 K, and only the Ort-AFM phase is observed below this temperature. Upon warming, Ort-PM appears at 133.0 K and coexists with Ort-AFM up to $T'_N$ = 134.0 K, where Ort-AFM disappears. The orthorhombic distortion associated with Ort-PM decreases continuously up to $T_S$ = 134.5 K, where Tet-PM is recovered. We find no hysteresis in the transformations from Tet-PM to Ort-PM and $\lesssim$0.25 K hysteresis associated with the appearance/disappearance of Ort-AFM. In order to investigate the relationship between the structural transition and AFM ordering in this system we have performed a combined study using high-resolution x-ray diffraction and XRMS measurements. These simultaneous measurements eliminate concerns regarding disparities in the temperature calibration of sensors for different experiments. Using the configuration at the APS described in the last section we measured the scattering at both the charge and magnetic Bragg peak positions for several temperatures close to the structural transition. In Fig.~\ref{magpeaks}(a) we show a [$\xi$ $\xi$ 0] scan through the (1 1 8)$_T$ charge Bragg peak at $T$ = 137 K, well above the structural transition temperature. At $T$ = 130 K, below $T_N$ and $T_S$, two well-separated peaks were observed [Fig.~\ref{magpeaks}(b)]. These are the (2 0 8)$_O$ and (0 2 8)$_O$ charge Bragg peaks of the orthorhombic phase. The difference in intensity arises from different populations of the domains within the illuminated volume of the sample. At this same temperature, a single peak is found at the (1 0 7)$_O$, magnetic peak position for the orthorhombic phase, [Fig.~\ref{magpeaks}(c)] in agreement with previous measurements of a magnetic propagations vector given by \textbf{Q$_m$} = (1 0 1)$_O$ [($\frac{1}{2}$ $\frac{1}{2}$ 1)$_T$] with lattice constants $a_O$ $>$ $b_O$.~\cite{huang_neutron-diffraction_2008,wilson_neutron_2009,matan_anisotropic_2009,kofu_title_2009,kim_resonant_2010} For simplicity, we will henceforth label all peaks with tetragonal indices. Therefore, the (1 0 7)$_O$ magnetic Bragg peak will be referred to as ($\frac{1}{2}$ $\frac{1}{2}$ 7)$_T$, keeping in mind that the magnetic peaks are displaced from $\xi$ = $\frac{1}{2}$ because of the orthorhombic distortion. \begin{figure} \begin{center} \includegraphics[clip, width=0.42\textwidth]{magpeaks}\\ \caption{(Color online) (a) The measured (1 1 8)$_T$ charge diffraction peak above the structural/magnetic transitions. Panels (b) and (c) show the (1 1 8)$_T$ charge peak and ($\frac{1}{2}$ $\frac{1}{2}$ 7)$_{T}$ magnetic peak at $T$ = 130 K, well below the transition region. Panels (d) and (e) show the measured intensities at the (1 1 8)$_T$ charge peak and ($\frac{1}{2}$ $\frac{1}{2}$ 7)$_{T}$ magnetic positions at $T$ = 133.3 K. The arrows in (c) and (e) indicate the calculated magnetic peak positions corresponding to each of the charge peaks in (b) and (d), respectively. The fitted value for the width of the charge and magnetic peaks are the same.} \label{magpeaks} \end{center} \end{figure} The principal result conveyed in Figs.~\ref{magpeaks}(b) and (c) is that the expected AFM order exists in the Ort-AFM phase. The question, however, is whether this AFM order is also associated with the Ort-PM intermediate phase. Figures~\ref{magpeaks}(d) and (e) show [$\xi$ $\xi$ 0] scans through the (1 1 8)$_T$ charge and ($\frac{1}{2}$ $\frac{1}{2}$ 7)$_{T}$ magnetic peak positions at $T$ = 133.3 K. Similar to what was found in our laboratory-based measurement [Fig.~\ref{parent}(a)] we observed four charge peaks [two outer peaks from Ort-AFM and two inner peaks from Ort-PM]. However, Fig.~\ref{magpeaks}(e) displays only a single magnetic peak. The arrows in this panel denote the expected positions for magnetic peaks associated with each of the charge peaks in Fig.~\ref{magpeaks}(d) and we see that the magnetic peak is found at a position that corresponds to one of the two outer peaks associated with the Ort-AFM phase. This allows us to conclude that the magnetic order is associated only with the Ort-AFM phase. Taken together, the x-ray diffraction and XRMS measurements suggest that: (1) The orthorhombic distortion at $T_S$ is best described as a second-order transition; (2) the structural and AFM transitions in the as-grown BaFe$_2$As$_2$ compound are separated in temperature by approximately 0.75 K and; (3) a first-order magnetic transition at $T_N$ drives the discontinuity in the structural order parameter at 133.75 K. To further substantiate these conclusions, we now turn to a study of the evolution of the structural transition in electron-doped BaFe$_2$As$_2$ compounds. \subsection{High-resolution x-ray diffraction and resistance measurements of Ba(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ and Ba(Fe$_{1-x}$Rh$_{x}$)$_2$As$_2$} \begin{figure} \begin{center} \includegraphics[clip, width=0.42\textwidth]{co_018}\\ \caption{(Color online) (a) X-ray data, (b) resistance (black line) and its temperature derivative (blue line), (c) orthorhombic distortion and (d) FWHM of the split (1 1 10)$_T$ Bragg peaks measured for Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$ with $x$ = 0.018. In panel (c) the structural and magnetic transition temperatures are marked.} \label{co_018} \end{center} \end{figure} It has already been established that the substitution of Co or Rh for Fe in the parent BaFe$_2$As$_2$ compound results in new and interesting behavior.\cite{canfield_feas_2010,ni_effects_2008,Chu_2009,Lester_2009,pratt_coexistence_2009,Christianson_2009,kreyssig_suppression_2010,nandi_anomalous_2010,fernandes_unconventional_2010} As doping is increased, both the structural and magnetic transitions are suppressed and split, with the structural transition occurring at higher temperature. In Ba(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$, for Co concentrations 0.03 $\leq$ $x$ $\leq$ 0.06, we enter a region of the phase diagram where magnetism and superconductivity coexist and compete.\cite{ni_effects_2008,fernandes_unconventional_2010} Within this region, the magnetic and structural transitions are well-separated in temperature, and continuous in nature (see for example, references ~\onlinecite{nandi_anomalous_2010} and ~\onlinecite{fernandes_unconventional_2010}). It is, therefore, interesting to probe the behavior of the structural and AFM transitions, described above, as they evolve towards split second-order transitions with doping. To this end, we have performed high-resolution x-ray diffraction measurements on four doped BaFe$_2$As$_2$ samples: Ba(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ for $x$ = 0.018 and 0.047, and Ba(Fe$_{1-x}$Rh$_{x}$)$_2$As$_2$ for $x$ = 0.012 and 0.040. Figures~\ref{co_018} through \ref{rh_040} display the raw diffraction data, the orthorhombic distortion ($\delta$) and diffraction peak widths derived from fits to the data, and the electrical resistance measured as a function of temperature. \begin{figure} \begin{center} \includegraphics[clip, width=0.42\textwidth]{rh_012}\\ \caption{(Color online) (a) X-ray data, (b) resistance (black line) and its temperature derivative (blue line), (c) orthorhombic distortion and (d) FWHM of the split (1 1 10)$_T$ Bragg peaks measured for Ba(Fe$_{1-x}$Rh$_x$)$_2$As$_2$ with $x$ = 0.012. In panel (c) the structural and magnetic transition temperatures are marked.} \label{rh_012} \end{center} \end{figure} Turning first to the compounds at lower doping concentrations, Ba(Fe$_{0.982}$Co$_{0.018}$)$_2$As$_2$ and Ba(Fe$_{0.988}$Rh$_{0.012}$)$_2$As$_2$ (Figs.~\ref{co_018} and \ref{rh_012}), below $T_S$ both samples manifest a lattice distortion that evolves continuously as temperature is lowered, until the onset of magnetic ordering where a step-like feature in the structural order parameter ($\delta$) is observed. At $T_N$ a distinct broadening of the split orthorhombic diffraction peaks is evident over a narrow range in temperature. In contrast, the temperature dependence of the order parameter and peak widths for the higher doping concentrations, Ba(Fe$_{0.953}$Co$_{0.047}$)$_2$As$_2$ and Ba(Fe$_{0.960}$Rh$_{0.040}$)$_2$As$_2$, is decidedly different near $T_N$ (Figs.~\ref{co_047} and \ref{rh_040}). For these samples, the structural distortion evolves continuously, with only a mild kink in evidence at $T_N$ and without the attendant peak broadening at $T_N$. \begin{figure} \begin{center} \includegraphics[clip, width=0.42\textwidth]{co_047}\\ \caption{(Color online) (a) X-ray data, (b) resistance (black line) and its temperature derivative (blue line), (c) orthorhombic distortion and (d) FWHM of the split (1 1 10)$_T$ Bragg peaks measured for Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$ with $x$ = 0.047. In panel (c) the structural and magnetic transition temperatures are marked.} \label{co_047} \end{center} \end{figure} \begin{figure} \begin{center} \includegraphics[clip, width=0.42\textwidth]{rh_040}\\ \caption{(Color online) (a) X-ray data, (b) resistance (black line) and its temperature derivative (blue line), (c) orthorhombic distortion and (d) FWHM of the split (1 1 10)$_T$ Bragg peaks measured for Ba(Fe$_{1-x}$Rh$_x$)$_2$As$_2$ with $x$ = 0.040. In panel (c) the structural and magnetic transition temperatures are marked.} \label{rh_040} \end{center} \end{figure} \begin{figure} \begin{center} \includegraphics[clip, width=0.42\textwidth]{PD}\\ \caption{(Color online) Diagram showing the nature of the structural and magnetic phase transitions for Ba(Fe$_{1-x}$Co$_x$)$_2$As$_2$ at $T_S$ and $T_N$, respectively. The thick line denotes a first-order transition whereas the thinner lines represent second-order transitions. The crosses denote values for $T_S$ and $T_N$ determined from our measurements. The open circle denotes the approximate position of a tricritical point as described in the text.} \label{PD} \end{center} \end{figure} The differences between the lower and higher doping concentrations are consistent with a change in the nature of the magnetic transition from first-order for low doping, to second-order for higher doping levels. At low-doping, as for the parent BaFe$_2$As$_2$ compound, there is a second-order transition from the tetragonal phase to the Ort-PM structure as temperature is decreased below $T_S$. The step in the orthorhombic distortion ($\delta$) at $T_N$ is a consequence of the abrupt appearance of Ort-AFM coincident with a first-order AFM transition. We note that throughout this temperature range only two broadened peaks are observed in contrast to what was shown above for the parent compound. This is expected, however, since the larger separation of $T_S$ and $T_N$ allows $\delta$ to evolve to a value for the Ort-PM phase that is close to its magnitude for the Ort-AFM phase. The anomalous increase in the widths of the x-ray diffraction peaks at $T_N$ arises from the coexistence and near coincidence in position of the Ort-AFM and Ort-PM diffraction peaks over a narrow temperature range. For the higher doping levels, within our experimental resolution, the absence of a distinct step in $\delta$ or peak broadening at $T_N$ is consistent with second-order AFM and structural transitions as found for electron-doped BaFe$_2$As$_2$ previously.\cite{fernandes_unconventional_2010,nandi_anomalous_2010} We summarize our results in Fig. \ref{PD} which displays a phase diagram for Ba(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ focusing on the concentration range of the present study. The structural transition, over the entire range is second-order, whereas the magnetic transition changes from first-order to second-order at a tricritical point as discussed below. \section{Discussion} To understand the existence, and estimate the location, of a magnetic tricritical point in the phase diagram of $\mathrm{Ba\left(Fe_{1-x}Co_{x}\right)_{2}As_{2}}$, we can, at first, rationalize the interplay between the magnetic and elastic degrees of freedom in terms of a simple Ginzburg-Landau model, similar to what was done by Cano \emph{et al.} in Ref. ~\onlinecite{Cano_10}. We start from the effective free energy: \begin{equation} F_{\mathrm{eff}}=\left(\frac{a_{\delta}}{2}\delta^{2}+\frac{u_{\delta}}{4}\delta^{4}\right)+\left(\frac{a_{m}}{2}m^{2}+\frac{u_{m}}{4}m^{4}\right)-\lambda\delta\: m^{2}\label{F_eff}\end{equation} with $a_{\delta}=a_{\delta,0}\left(T-T_{S,0}\right)$, $a_{m}=a_{m,0}\left(T-T_{N,0}\right)$, and positive constants $u_{\delta}$, $u_{m}$, $\lambda$. Here, $m$ is the antiferromagnetic order parameter and $T_{S,0}$, $T_{N,0}$ denote the bare structural and magnetic transition temperatures respectively. For $T_{S,0} < T_{N,0}$, this model describes a simultaneous magnetic/structural first-order transition. However, for $T_{S,0} > T_{N,0}$, this model describes a second-order structural transition at $T_{S} = T_{S,0}$, followed by a magnetic transition at $T_{N}$ ($T_{N,0}<T_{N}<T_{S}$), which can be either first-order or second-order. Considering that $T_{N}$ and $T_{S}$ change with doping, the magnetic tricritical point takes place at the doping concentration $x_{\mathrm{tri}}$ where $u_{m}a_{\delta,0}\left(T_{S}-T_{N}\right)=\lambda^{2}$. Experimentally, we know that $\left(T_{S}-T_{N}\right)$ increases with doping, $x$. Therefore, it is straightforward to conclude from the mean-field solution of Eq. (\ref{F_eff}) that, close to the magnetic tricritical point, the jump in the orthorhombic order parameter across the first-order magnetic transition changes with doping as $\Delta\delta\equiv\delta_{\mathrm{Ort-AFM}}-\delta_{\mathrm{Ort-PM}}\propto\left(x-x_{\mathrm{tri}}\right)$. Extrapolating this linear relation and using the values of $\Delta\delta$ from Figs. \ref{parent} and \ref{co_018}, we estimate that the magnetic tricritical point is located at $x_{\mathrm{tri}}\approx0.022$, as shown in Fig. \ref{fig_tricritical}. \begin{figure} \begin{centering} \includegraphics[width=0.9\columnwidth]{tricritical} \par\end{centering} \caption{Jump of the orthorhombic order parameter $\Delta\delta\equiv\delta_{\mathrm{Ort-AFM}}-\delta_{\mathrm{Ort-PM}}$ across the first-order magnetic transition, as function of $x$. The linear relationship $\Delta\delta\propto\left(x-x_{\mathrm{tri}}\right)$ (dashed line) follows from the mean-field solution of Eq. \ref{F_eff}. \label{fig_tricritical}} \end{figure} The main issue with the model in Eq. (\ref{F_eff}), however, is that it requires a fine tuning of the independent structural and magnetic transition temperatures $T_{S,0}$ and $T_{N,0}$ across the phase diagram. In all of the phase diagrams of the iron pnictide compounds, it is observed that the two transition lines track each other very closely, even within the superconducting dome. \cite{Fernandes_2010_2,nandi_anomalous_2010} This suggests that these two states are strongly coupled, rather than independent, as assumed by the previous model. To address this issue, it has been proposed that the particular magnetic structure of the iron pnictides gives rise to emergent Ising-nematic degrees of freedom that couple to the lattice, inducing the tetragonal-to-orthorhombic phase transition \cite{Fang_08,Xu_08,Fernandes_2010_2}. In the magnetically ordered phase, there are two degenerate ground states characterized by in-plane spin stripes along each of the two orthogonal Fe-Fe bond directions. These ground states can be described in terms of two interpenetrating AFM sublattices with staggered magnetization $\mathbf{m}_{1}$ and $\mathbf{m}_{2}$, such that $\mathbf{m}_{1}$ is either parallel or antiparallel to $\mathbf{m}_{2}$ (see Fig. \ref{fig_AFM_sublattices}). Within this description, the magnetic free energy of the system $F_{\mathrm{mag}}$ has contributions from each sublattice $F_{i}$ and from the coupling between them, $F_{12}$. The former is given by: \begin{equation} F_{i}=\frac{1}{2}\int\frac{d^{3}q}{\left(2\pi\right)^{3}}\:\chi_{i}^{-1}\left(\mathbf{q}\right)\mathbf{m}_{i}\left(\mathbf{q}\right)\cdot\mathbf{m}_{i}\left(-\mathbf{q}\right)+\frac{u}{4}\int\frac{d^{3}x}{v}\:\mathbf{m}_{i}^{4}\label{Fi}\end{equation} where $\chi_{i}\left(\mathbf{q}\right)=\chi_{0}\left(r_{0}+q_{\parallel}^{2}a^{2}-2\eta_{z}\cos q_{\perp}c\right)^{-1}$ is the static susceptibility of each sublattice,\cite{Fernandes_2010_2} $u$ is a positive coupling constant, and the momentum $\mathbf{q}$ is measured relative to the magnetic ordering vector. Here, $\chi_{0}^{-1}$ is a magnetic energy scale, $r_{0}$ measures the distance to the magnetic critical point, $a$ and $c$ are the lattice parameters of the unit cell of volume $v$ containing two Fe atoms, and $\eta_{z}$ is the inter-plane AFM coupling. The coupling between the two sublattices is given by: \begin{equation} F_{12}=-\frac{g}{2}\int\frac{d^{3}x}{v}\left(\mathbf{m}_{1}\cdot\mathbf{m}_{2}\right)^{2}\label{F12}\end{equation} with $g>0$, favoring configurations where $\mathbf{m}_{1}$ and $\mathbf{m}_{2}$ are either parallel or antiparallel. In a description of the magnetically ordered phase in terms of localized moments, this term originates from quantum and thermal spin fluctuations \cite{Chandra_90}. On the other hand, within an itinerant approach, where the magnetic moments arise from the conduction electrons, the same term appears as a consequence of the ellipticity of the electron pockets \cite{EandC_2010}. \begin{figure} \begin{centering} \includegraphics[width=0.9\columnwidth]{two_AFM_sublattices} \par\end{centering} \caption{(Color online) The two magnetic ground states of the iron pnictides, characterized by stripes along two orthogonal directions, expressed in terms of two interpenetrating AFM sublattices with N\'{e}el vectors $\mathbf{m}_{1}$ and $\mathbf{m}_{2}$. Notice that the $\left(x,y\right)$ coordinate system used here refers to the unit cell with two Fe atoms and is rotated by $45^{\circ}$ with respect to the $\left(a,b\right)$ coordinate system relative to the single-Fe atom unit cell. \label{fig_AFM_sublattices}} \end{figure} The coupling (\ref{F12}) between the sublattices gives rise to an emergent Ising-nematic degree of freedom $\varphi=\mathbf{m}_{1}\cdot\mathbf{m}_{2}$ \cite{Chandra_90}, which may be finite even in the absence of magnetic order (i.e. $\left\langle \varphi\right\rangle $ $\neq$ 0, but $\left\langle \mathbf{m}_{i}\right\rangle =0$) as long as the magnetic fluctuations are strong enough \cite{Fernandes_2010_2}. A finite value, $\left\langle \mathbf{m}_{1}\cdot\mathbf{m}_{2}\right\rangle \neq0$, breaks the Ising symmetry embedded in Eq. (\ref{F12}) and, consequently, the tetragonal symmetry. This can be seen explicitly through the magneto-elastic term: \begin{equation} F_{\mathrm{mag-el}}=\lambda\int\frac{d^{3}x}{v}\:\delta\left(\mathbf{m}_{1}\cdot\mathbf{m}_{2}\right)\label{F_mag_el}\end{equation} where $\lambda>0$ is the magneto-elastic coupling and $\delta$ is the orthorhombic distortion. From the bilinear coupling of $\delta$ and $\varphi$ in Eq. (\ref{F_mag_el}), both the nematic and structural transitions are simultaneous. This mechanism for the tetragonal-to-orthorhombic transition explains why the magnetic and structural transitions track each other closely in all the phase diagrams of the iron pnictides. Furthermore, it also explains several experimental observations, such as the softening of the lattice in the tetragonal phase and its hardening in the superconducting state,\cite{Fernandes_2010_2} as well as the suppression of the orthorhombic distortion below the superconducting transition temperature.\cite{nandi_anomalous_2010} In the case where the elastic free energy is harmonic, $F_{el}=C_{s}\delta^{2}/2$ [where $C_{s}$ is the shear modulus] the only effect of the elastic degree of freedom is to renormalize the sublattice coupling constant $g$ in Eq. (\ref{F12}), yielding $g\rightarrow g+\lambda^{2}/C_{s}$ \cite{Fernandes_2010_2}. In a mean-field approach, this implies that the two transitions remain split and second order. Although fluctuations could induce a simultaneous first-order transition \cite{Gorkov_09,Qi_09}, it is unclear whether they could explain a second-order structural transition split from a first-order magnetic transition, as our data for low doping levels in $\mathrm{BaFe_{2}As_{2}}$ suggests. To account for our observations, we move beyond the harmonic lattice approximation to consider the effects of anharmonic elastic terms (for more details on the formalism, see Ref. ~\onlinecite{Fadda_02}). In the tetragonal phase, the most general form of the free energy can be written as $F_{\mathrm{el}}=\frac{1}{2}\bar{C}_{ij}\epsilon_{i}\epsilon_{j}+\frac{1}{6}\bar{C}_{ijk}\epsilon_{i}\epsilon_{j}\epsilon_{k}$, where $\bar{C}_{ij}$ are given in terms of the six independent elastic constants and the strain components $\epsilon_{i}$ are: \begin{eqnarray} \epsilon_{1}= & u_{xx}+u_{yy}+u_{zz} & \,;\quad\quad\epsilon_{4}=2u_{yz}\nonumber \\ \epsilon_{2}= & \left(u_{xx}+u_{yy}-2u_{zz}\right)/6 & \,;\quad\quad\epsilon_{5}=2u_{xz}\nonumber \\ \epsilon_{3}= & \left(u_{xx}-u_{yy}\right)/\sqrt{2} & \,;\quad\quad\epsilon_{6}=2u_{xy}\label{strain_tensor}\end{eqnarray} with $u_{ij}=\left(\partial_{i}u_{j}+\partial_{j}u_{i}\right)/2$ and $\mathbf{u}=\left(u_{x},u_{y},u_{z}\right)$ denoting the displacement vector. In this notation, we have the orthorhombic distortion $\delta=\epsilon_{6}/2$ and the shear modulus $C_{s}\equiv4\bar{C}_{66}$. Since we are interested in describing the transition from the tetragonal to the orthorhombic phase, we retain only the essential anharmonic terms that contain $\epsilon_{6}$: \begin{eqnarray} F_{\mathrm{el}} & = & \frac{1}{2}\bar{C}_{11}\epsilon_{1}^{2}+\frac{1}{2}\bar{C}_{22}\epsilon_{2}^{2}+\bar{C}_{12}\epsilon_{1}\epsilon_{2}+\frac{1}{2}\bar{C}_{44}\left(\epsilon_{4}^{2}+\epsilon_{5}^{2}\right)+\nonumber \\ & & \frac{1}{2}\bar{C}_{66}\epsilon_{6}^{2}+\frac{1}{2}\left[\bar{C}_{166}\epsilon_{1}+\bar{C}_{266}\epsilon_{2}\right]\epsilon_{6}^{2}+\bar{C}_{456}\epsilon_{4}\epsilon_{5}\epsilon_{6}\label{F_el}\end{eqnarray} Minimization with respect to the other strain components yields an effective elastic free energy in terms only of $\epsilon_{6}=2\delta$: \begin{equation} F_{\mathrm{el}}\left[\delta\right]=\frac{1}{2}C_{s}\delta^{2}+\frac{1}{4}U\delta^{4}+\frac{1}{6}W\delta^{6}\label{F_el_eff}\end{equation} where we included the sixth-order term $W>0$ to ensure stability of the functional. Note that since:\cite{Fadda_02} \begin{equation} \frac{U}{16} = U_{0} - \frac{\left( \bar{C}_{22}\bar{C}_{166}^{2} - 2\bar{C}_{12}\bar{C}_{166}\bar{C}_{266} + \bar{C}_{11}\bar{C}_{266}^{2} \right)}{2\left( \bar{C}_{11} \bar{C}_{22} - \bar{C}_{12}^{2} \right)} \label{quart_F_el_eff}\end{equation} the fourth-order coefficient can be negative, depending on the magnitudes of the anharmonic terms $\bar{C}_{ijk}$. Here, $U_0$ is the bare coefficient coming from higher-order quartic anharmonic terms. In what follows, we consider all elastic coefficients to be temperature independent, and that the only minimum of Eq. (\ref{F_el_eff}) is at $\delta=0$. Thus, different from the model in Eq. (\ref{F_eff}), the system has no intrinsic structural instability, and the elastic phase transition results solely from the magneto-elastic coupling in Eq. (\ref{F_mag_el}). In the case of a harmonic lattice, it was shown that nematic fluctuations renormalize the shear modulus in the tetragonal phase, making it vanish when the magnetic correlation length achieves a threshold value \cite{Fernandes_2010_2}. Here, not only $C_{s}$ will be renormalized by nematic fluctuations, but also the anharmonic term $U$ in Eq. (\ref{F_el_eff}), which gives rise to a much richer phase diagram. To calculate the total free energy of the system, we use the 'mean-field $1/N$ approach' discussed elsewhere \cite{Fang_08,Fernandes_2010_2}. Basically, we assume that the magnetic order parameter $\mathbf{m}_{i}$ has $N$ components and expand to leading order for large $N$. We then obtain self-consistent equations involving the magnetic correlation length $\xi$, the nematic order parameter $\varphi$, the magnetic order parameter $m=\left|\langle\mathbf{m}_{1}\rangle\right|=\left|\langle\mathbf{m}_{2}\rangle\right|$, and the orthorhombic distortion $\delta$. The latter is obtained by minimizing the effective elastic free energy $F_{\mathrm{eff}}=F_{\mathrm{el}}+\tilde{F}$, where $\tilde{F}$ is an implicit function of $\delta$, arising from the $1/N$ solution of the magnetic problem with free energy $F_{\mathrm{mag}}+F_{\mathrm{mag-el}}$. Thus, $\tilde{F}$ describes how magnetism changes the elastic free energy. \begin{figure} \begin{centering} \includegraphics[width=0.9\columnwidth]{1st_order_phase_diagram} \par\end{centering} \caption{(Color online) Phase diagram of the system with anharmonic elastic terms. $T$ denotes temperature, $C_{s}$ is the bare shear modulus, and $\chi_{0}^{-1}$ is a magnetic energy scale. Thin (thick) lines refer to second-order (first-order) phase transitions, with the red (blue) lines denoting magnetic (structural) transitions; the simultaneous first-order transition line is denoted by the double line. We use the notation Ort' to emphasize that the orthorhombic distortion jumps across the first-order magnetic transition. The orange dotted line signals the occurrence of a jump in both the magnetic and orthorhombic order parameters, without symmetry breaking. The open circle refers to the magnetic tricritical point, while the arrow indicates the value of $C_{s}$ for which we calculate the temperature dependence of both the magnetic and orthorhombic order parameter (see Fig.~\ref{fig_order_parameters}). \label{fig_phase_diagram}} \end{figure} We choose parameters that yield relative temperatures and jumps comparable to those observed experimentally (see Section IIIB).\cite{parameters} In particular, we take $U<0$ in Eq. (\ref{F_el_eff}); once again, we stress that the values used for $U$ do not introduce any local minimum other than $\delta=0$ in the bare $F_{el}$. To illustrate the richness of the resulting phase diagram, in Fig.~\ref{fig_phase_diagram} we show the results obtained after fixing all parameters but the bare shear modulus $C_{s}$. For smaller values of $C_{s}$, the system undergoes a simultaneous first-order structural/magnetic transition from the tetragonal/paramagnetic phase to the orthorhombic/antiferromagnetic phase. This corresponds to a direct first-order transition from the Tet-PM phase to the Ort-AFM phase, which has not been observed in the experiments reported here. As the bare shear modulus increases, the two transitions split: at higher temperatures, the system undergoes a \emph{second-order} structural transition and then a \emph{first-order} magnetic transition at lower temperature. The latter is accompanied by a discontinuity in the orthorhombic order parameter $\delta$ due to the magneto-elastic coupling. This is precisely the sequence observed in our experiments described in Section III for the parent BaFe$_{2}$As$_{2}$ and doped compounds for low doping concentrations (Tet-PM $\rightarrow$ Ort-PM $\rightarrow$ Ort-AFM). Note that this is not another structural phase transition, but a consequence of the first-order character of the magnetic transition. To show this explicitly, in Fig.~\ref{fig_order_parameters}, we plot both $\delta$ and $m$ as function of temperature for the value of $C_{s}$ indicated by the arrow in Fig.~\ref{fig_phase_diagram}. Not only is the relative size of the step comparable to that measured experimentally for BaFe$_2$As$_2$, but also the relative temperature at which the step occurs (see Fig.~\ref{parent}(b), where $T_{s}\approx134.6$ K and $T_{N}\approx134$ K). The discontinuity in the orthorhombic distortion accompanying the first-order magnetic transition is a very general feature that holds regardless of the specific values of the parameters. Thus, it supports our interpretation that the experimental data in Fig.~\ref{parent} on the parent compound, BaFe$_{2}$As$_{2}$, describe a second-order structural transition followed by a first-order magnetic transition. Returning to the phase diagram of Fig.~\ref{fig_phase_diagram}, we note that as the shear modulus is increased even further, the transitions remain split but the magnetic transition becomes second-order, as it is observed for higher doping concentrations in Ba(Fe$_{1-x}$Co$_{x}$)$_{2}$As$_{2}$ and Ba(Fe$_{1-x}$Rh$_{x}$)$_{2}$As$_{2}$. At low temperatures, there is another line that marks a simultaneous jump in both the magnetic and the orthorhombic order parameter, without any symmetry breaking. However, we point out that in our $1/N$ approach we have not taken into account a key feature of the magnetically ordered state: the reconstruction of the Fermi surface. For instance, we note that $x_{\mathrm{tri}} \approx 0.02$ is close to the composition where evidence for a Lifshitz transition, below $T_N$, in Ba(Fe$_{1-x}$Co$_{x}$)$_2$As$_2$ has been reported by thermoelectric power, Hall coefficient measurements and angle-resolved photoemission.\cite{Mun_2009,Changliu_2010} Therefore, features in our model deep in the magnetically ordered phase, such as this extended line, are likely to change once the reconstruction of the Fermi surface is considered. For instance, one possibility is that this extended line terminates at a finite temperature critical point. \begin{figure} \begin{centering} \includegraphics[width=0.9\columnwidth]{1st_order_parent} \par\end{centering} \caption{(Color online) Magnetic ($m$, open symbols) and orthorhombic ($\delta$, filled symbols) order parameters as function of temperature $T$ (in units of the structural transition temperature $T_{s}$) for the system indicated by the green arrow in the phase diagram of Fig.~\ref{fig_phase_diagram}. \label{fig_order_parameters}} \end{figure} Furthermore, although in the phase diagram of Fig.~\ref{fig_phase_diagram} we changed only the bare shear modulus, it is unlikely that this is the only modified parameter as doping is introduced in the parent compound. In particular, the increase in the splitting between the transitions is much more modest in Fig.~\ref{fig_phase_diagram} than found experimentally (Fig.~\ref{PD}). It is possible, then, that other parameters controlling the splitting are also changed, such as the magneto-elastic coupling, $\lambda$, and the inter-plane magnetic coupling, $\eta_{z}$. The main objective of the phase diagram presented here is to illustrate the various possible phase transitions once anharmonic elastic terms are taken into account. It is interesting to note that, in our simple phase diagram, systems with softer lattices are more likely to display simultaneous first-order transitions. Indeed, CaFe$_{2}$As$_{2}$, which is significantly softer than BaFe$_{2}$As$_{2}$, presents relatively strong simultaneous first-order transitions.\cite{goldman_lattice_2008} \section{Summary} Our high-resolution x-ray diffraction and XRMS studies of BaFe$_2$As$_2$ have provided several new insights concerning the nature of the structural and magnetic transitions in the fascinating \emph{122} iron pnictide family. First, we find that the orthorhombic distortion at $T_S$ is best described as a second-order transition and that the structural and AFM transitions in the as-grown BaFe$_2$As$_2$ compound are separated in temperature by approximately 0.75 K. We propose that a first-order magnetic transition at $T_N$ drives the discontinuity in the structural order parameter at 133.75 K, and this is consistent with our measurements of the evolution of the character of the transitions in Co- and Rh-doped BaFe$_2$As$_2$. Using these results, we can provide an estimate of the position of a tricritical point in the phase diagram of Ba(Fe$_{1-x}$Co$_{x}$)$_{2}$As$_{2}$. Finally, we employ a mean-field approach to show that our measurements can be explained by the inclusion of an anharmonic term in the elastic free energy and magneto-elastic coupling in the form of an emergent Ising-nematic degree of freedom. We acknowledge valuable discussions with J. Lang. This work was supported by the Division of Materials Sciences and Engineering, Office of Basic Energy Sciences, U.S. Department of Energy. Ames Laboratory is operated for the U.S. Department of Energy by Iowa State University under Contract No. DE-AC02-07CH11358. Use of the Advanced Photon Source was supported by the US DOE under Contract No. DE-AC02-06CH11357. \bibliographystyle{apsrev}
\section{Introduction} Glueballs, the bound states of the gauge bosons of QCD, the gluons, are naturally expected in QCD due to the nonabelian nature of the theory: the gluons interact strongly with themselves and thus they can bind and form colorless states, analogously to what occurs in the quark sector. The existence of glueballs has been studied in the framework of the effective bag model for QCD already four decades ago \cite{bag-glueball} and it has been further investigated in a variety of approaches \cite{Close}. Numerical calculations of the Yang-Mills sector of QCD also find a full glueball spectrum in which the scalar glueball is the lightest state \cite{Morningstar}. Glueballs can mix with quarkonium ($\bar{q}q$) states with the same quantum numbers. This makes the experimental search for glueballs more complicated, because physical resonances emerge as mixed states. The scalar sector $J^{PC}=0^{++}$ has been investigated in many works in the past. The resonance $f_{0}(1500)$ is relatively narrow when compared to other scalar-isoscalar states: for this reason it has been considered as a convincing candidate for a glueball state. Mixing scenarios in which two quark-antiquark isoscalar states $\bar{n}n$ and $\bar{s}s$ and one scalar glueball $gg$ mix and generate the physical resonances $f_{0}(1370),$ $f_{0}(1500)$, and $f_{0}(1710)$ have been discussed in Refs.\ \cite{refs,longglueball}. The aim of this work is to extend the linear chiral model of Refs.\ \cite{Paper1,Susanna} by including the dilaton/glueball field. The first attempt to incorporate a glueball into a linear sigma model was performed long ago in Ref.\ \cite{schechter}. The novel features of the present study are the following: (i) The glueball is introduced as a dilaton field within a theoretical framework where not only scalar and pseudoscalar mesons, but also vector and axial-vector mesons are present from the very beginning. This fact allows also for a calculation of decays into vector mesons. The model is explicitly evaluated for the case of $N_{f}=2,$ for which only one scalar-isoscalar quarkonium state exists: $\sigma\equiv\bar{n}n$ which mixes with the glueball. The two emerging mixed states are assigned to the resonances $f_{0}(1370)$ which is, in accordance with Ref.\ \cite{Paper1}, predominantly a $\bar{q}q$ state, and with $f_{0}(1500)$ which is predominantly a glueball state. (ii) We consequently test --- to our knowledge for the first time --- this mixing scenario above 1 GeV in the framework of a chiral model. The model under consideration is built in accordance with the symmetries of the QCD Lagrangian. It possesses the known degrees of freedom of low-energy QCD [(pseudo)scalar and (axial-)vector mesons] as well as the same global chiral invariance. Another feature of the QCD Lagrangian is scale (or dilatation) invariance $x^{\mu}\rightarrow\lambda^{-1}x^{\mu}$ (where $x^{\mu }$ is a Minkowski-space coordinate and $\lambda$ the scale parameter of the conformal group). It is realized at the classical level but broken at the quantum level due to the loop corrections in the Yang-Mills sector (scale anomaly). In this work the breaking of scale invariance is implemented at tree-level by means of a dilaton field (representing a glueball) with the usual logarithmic dilaton potential \cite{schechter}. However, all the other interaction terms (with the exception of the chiral anomaly) are dilatation-invariant in the chiral limit. Having constructed the Lagrangian of the effective model, we calculate the masses of the pure $\bar{q}q$ and glueball states in the $J^{PC}=0^{++}$ channel, study their mixing and calculate the decay widths of the mixed states. Although we work with $N_{f}=2,$ the use of flavor symmetry enables us to calculate the decay widths of the scalar resonances into kaons and into both the $\eta$ and $\eta^{\prime}$ mesons which contain the $s$-quark in their flavor wave functions. After the study of the already mentioned scenario where $f_{0}(1370)$ and $f_{0}(1500)$ are predominantly quarkonium and glueball, respectively, we also test the alternative scenario in which the resonance $f_{0}(1710)$ is predominantly glueball and scenarios in which $f_{0}(600)$ is predominantly quarkonium. They, however, lead to inconsistencies when compared to the present data and are therefore regarded as less favorable. This paper is organized as follows. In Sec.\ II the Lagrangian of the linear sigma model with (axial-)vector and glueball degrees of freedom is constructed. In Sec.\ III we discuss the results for the masses of the quarkonium-glueball mixed states and their decay widths. In Sec.\ IV we present our conclusions. \section{The Model} The Yang-Mills (YM) sector of QCD (QCD without quarks) is classically invariant under dilatations. This symmetry is, however, broken at the quantum level. The divergence of the corresponding current is the trace of the energy-momentum tensor $T_{\text{YM}}^{\mu\nu}$ of the YM Lagrangian \begin{equation} \left( T_{\text{YM}}\right) _{\mu}^{\mu}=\frac{\beta(g)}{4g}\, G_{\mu\nu }^{a}G^{a,\mu\nu} \neq0\text{ ,} \label{ta \end{equation} where $G_{\mu\nu}^{a}$ is the field-strength tensor of the gluon fields, $g=g(\mu)$ is the renormalized coupling constant at the scale $\mu$, and the $\beta$-function is given by $\beta(g)=\partial g/\partial\ln\mu.$ At the one-loop level $\beta(g)=-bg^{3}$ with $b=11N_{c}/(48\pi^{2}).$ This implies $g^{2}(\mu)=\left[ 2b\ln(\mu/\Lambda_{YM})\right] ^{-1},$ where $\Lambda_{YM}\simeq200$ MeV is the Yang-Mills scale. A finite energy scale thus emerges in a theory which is classically invariant under dilatation (dimensional transmutation). The expectation value of the trace anomaly does not vanish and represents the so-called gluon condensate: \begin{equation} \left\langle T_{YM,\mu}^{\mu}\right\rangle =-\frac{11N_{c}}{48}\left\langle \frac{\alpha_{s}}{2\pi}\,G_{\mu\nu}^{a}G^{a,\mu\nu} \right\rangle =-\frac{11N_{c}}{48}C^{4}\text{ ,} \label{gc \end{equation} where \begin{equation} C^{4}\simeq(300-600\text{ MeV})^{4}\text{ . \end{equation} The numerical values have been obtained through QCD sum rules (lower range of the interval) \cite{Sumrules} and lattice simulations (higher range of the interval) \cite{Lattice}. At the composite level one can build an effective theory of the YM sector of QCD by introducing a scalar dilaton field $G$ which describes the trace anomaly. The dilaton Lagrangian reads \cite{schechter \begin{equation} \mathcal{L}_{dil}=\frac{1}{2}(\partial_{\mu}G)^{2}-\frac{1}{4}\frac{m_{G}^{2 }{\Lambda^{2}}\left( G^{4}\ln\left\vert \frac{G}{\Lambda}\right\vert -\frac{G^{4}}{4}\right) \text{ .} \label{ldil \end{equation} The minimum $G_{0}$ of the dilaton potential is realized for $G_{0}=\Lambda.$ Upon shifting $G\rightarrow G_{0}+G,$ a particle with mass $m_{G}$ emerges, which is interpreted as the scalar glueball. The numerical value has been evaluated in Lattice QCD and reads $m_{G}\sim1.5$ GeV \cite{Morningstar}. The logarithmic term of the potential explicitly breaks the invariance under a dilatation transformation. The divergence of the corresponding current reads $\partial_{\mu}J^{\mu}_{dil}=T_{dil,\,\mu}^{\;\mu} =-\frac{1}{4}m_{G ^{2}\Lambda^{2}$. This can be compared with the analogous quantity in Eq.\ (\ref{gc}) which implies $\Lambda=\sqrt{11}\,C^{2}/(2m_{G})$. QCD with quarks is also classically invariant under dilatation transformations in the limit of zero quark masses (chiral limit). The scale of all hadronic phenomena is given by the previously introduced energy scale $\Lambda_{YM}.$ This fact holds true also when the small but nonzero values of the quark masses is considered. In order to describe these properties in a hadronic model we now extend the linear sigma model with $U(N_{f})_{R}\times U(N_{f})_{L}$ of Refs.\ \cite{Paper1,GG,Mainz,UBW} by including the dilaton. To this end, the following criteria are applied \cite{dynrec}: (i) With the exception of the chiral anomaly, the parameter $\Lambda$ from Eq.\ (\ref{ldil ), which comes from the Yang-Mills sector of the theory in accordance with QCD, is the only dimensionful parameter of the Lagrangian in the chiral limit. (ii) The Lagrangian is required to be finite for every finite value of the gluon condensate $G_{0}.$ This, in turn, also assures that no singular terms arise in the limit $G_{0}\rightarrow0.$ In accordance with the requirements (i) and (ii) only terms with dimension exactly equal to 4 are allowed in the chiral limit. The hadronic Lagrangian obeying these requirements reads \begin{align \mathcal{L & =\mathcal{L}_{dil}+\text{\textrm{Tr}}\left[ (D^{\mu}\Phi)^{\dag}(D_{\mu }\Phi)-m_{0}^{2}\left( \frac{G}{G_{0}}\right) ^{2}\Phi^{\dag}\Phi -\lambda_{2}(\Phi^{\dag}\Phi)^{2}\right] -\lambda_{1}(\text{\textrm{Tr }\left[ \Phi^{\dag}\Phi\right] )^{2}\nonumber\\ & +c[\text{\textrm{det}}(\Phi^{\dag})+\text{\textrm{det}}(\Phi )]+\text{\textrm{Tr}}\left[ H\left( \Phi^{\dag}+\Phi\right) \right] -\frac{1}{4}\text{\textrm{Tr}}\left[ (L^{\mu\nu})^{2}+(R^{\mu\nu})^{2}\right] \nonumber\\ & +\frac{m_{1}^{2}}{2}\left( \frac{G}{G_{0}}\right) ^{2}\text{\textrm{Tr }\left[ (L^{\mu})^{2}+(R^{\mu})^{2}\right] +\frac{h_{1}}{2}\text{\textrm{Tr }[\Phi^{\dag}\Phi]\text{\textrm{Tr}}[L_{\mu}L^{\mu}+R_{\mu}R^{\mu}]\nonumber\\ & +h_{2}\text{\textrm{Tr}}[\Phi^{\dag}L_{\mu}L^{\mu}\Phi+\Phi R_{\mu}R^{\mu }\Phi^{\dag}]+2h_{3}\text{\textrm{Tr}}[\Phi R_{\mu}\Phi^{\dag}L^{\mu }]+...\text{ ,} \label{Lagrangian \end{align} where $\Phi$ represents the $N_{f}\times N_{f}$ (pseudo)scalar multiplet, and $L^{\mu}$ and $R^{\mu}$ the left- and right-handed vector multiplets. The dots represent further terms which do not affect the processes studied in this work and can be omitted. In the particular case of $N_{f}=2$ studied in this manuscript one has $\Phi=(\sigma+i\eta_{N})\,t^{0}+(\vec{a}_{0}+i\vec{\pi})\cdot\vec{t}$ (our eta meson $\eta_{N}$ contains only non-strange degrees of freedom), $L^{\mu }=(\omega^{\mu}+f_{1}^{\mu})\,t^{0}+(\vec{\rho}^{\mu}+\vec{a}_{1}^{\mu )\cdot\vec{t}$ and $R^{\mu}=(\omega^{\mu}-f_{1}^{\mu})\,t^{0}+(\vec{\rho ^{\mu}-\vec{a}_{1}^{\mu})\cdot\vec{t}$ ; $t^{0}$, $\vec{t}$ are the generators of $U(2)$. Moreover, $D^{\mu}\Phi=\partial^{\mu}\Phi-ig_{1}(L^{\mu}\Phi-\Phi R^{\mu})$, $L^{\mu\nu}=\partial^{\mu}L^{\nu}-\partial^{\nu}L^{\mu}$, $R^{\mu\nu}=\partial^{\mu}R^{\nu}-\partial^{\nu}R^{\mu}$. The explicit breaking of the global chiral symmetry is described by the term \textrm{Tr}$[H(\Phi+\Phi^{\dagger})]\equiv h\sigma$ $(h=const$. $\propto m_{q}^{2})$, which allows us to take into account the nonvanishing value $m_{q}$ of the quark mass. This term contains the dimensionful parameter $h$ with $[h]$ $=[\mathrm{energy}^{3}]$ and also explicitly breaks the dilatation invariance, just as the quark masses do in the underlying QCD Lagrangian. Finally, the chiral anomaly is described by the term $c\,(\det\Phi+\det \Phi^{\dagger})$ \cite{Hooft}. For $N_{f}=2$ the parameter $c$ carries the dimension $[\mathrm{energy}^{2}]$ and represents a further breaking of dilatation invariance. This term, however, is driven by instantons, which are also a property of the Yang-Mills sector of QCD. The identification of the fields of the models with the resonances listed in Ref.\ \cite{PDG} is straightforward in the pseudoscalar and (axial-)vector sectors: the fields $\vec{\pi}$ and $\eta_{N}$ correspond to the pion and the $SU(2)$ counterpart of the $\eta$ meson, respectively, $\eta_{N \equiv(\overline{u}u+\overline{d}d)/\sqrt{2}$, with a mass of about $700$ MeV. This value can be obtained by `unmixing' the physical $\eta$ and $\eta ^{\prime}$ mesons, which also contain $\overline{s}s$ contributions. The fields $\omega^{\mu}$ and $\vec{\rho}^{\;\mu}$ represent the $\omega(782)$ and $\rho(770)$ vector mesons, respectively, while the fields $f_{1}^{\mu}$ and $\vec{a}_{1}^{\;\mu}$ represent the $f_{1}(1285)$ and $a_{1}(1260)$ axial-vector mesons, respectively. (In principle, the physical $\omega$ and $f_{1}$ states also contain $\overline{s}s$ contributions but their admixture is small.) As shown in Ref.\ \cite{Paper1}, the $\sigma$ field should be interpreted as a predominantly $\bar{q}q$ state because its decay width decreases as $1/N_{c}$ in the limit of large number of colors. The $\sigma$ and $G$ fields mix: the physical fields $\sigma^{\prime}$ and $G^{\prime}$ are obtained through an $SO(2)$ rotation, as we shall show in the following. Then the first and most natural assignment is $\{\sigma^{\prime},G^{\prime }\}=\{f_{0}(1370),f_{0}(1500)\},$ see Sec.\ IIIA. Note that the $\vec{a}_{0}$ state is assigned to the physical $a_{0}(1450)$ resonance in accordance with results of Ref.\ \cite{Paper1}. Other assignments for $\{\sigma^{\prime },G^{\prime}\}$ will be also tested in Secs.\ III.B and III.C and turn out to less favourable. In order to study the non-vanishing vacuum expectation values (vev's) of the two $J^{PC}=0^{++}$ scalar-isoscalar fields of the model $\sigma$ and $G$, we set all the other fields in Eq.\ (\ref{Lagrangian}) to zero and obtain \begin{equation \mathcal{L _{\sigma G}=\mathcal{L}_{dil}+\frac{1}{2}(\partial^{\mu}\sigma)^{2}-\frac {1}{2}\left[ m_{0}^{2}\left( \frac{G}{G_{0}}\right) ^{2}-c\right] \sigma^{2}-\frac{1}{4}\left( \lambda_{1}+\frac{\lambda_{2}}{2}\right) \sigma^{4}+h\sigma\text{ .} \label{Lagrangian1 \end{equation} Upon shifting the fields by their vev's, $\sigma\rightarrow\sigma+ \phi$ and $G \rightarrow G+ G_{0}$, we obtain the masses of the states $\sigma=(\bar {u}u+\bar{d}d)/\sqrt{2}$ and $G=gg$ \cite{Paper1}, \begin{equation} M_{\sigma}^{2}=m_{0}^{2}-c+3\left( \lambda_{1}+\frac{\lambda_{2}}{2}\right) \phi^{2}\;,\;\;\;\;\;M_{G}^{2}=m_{0}^{2}\, \frac{\phi^{2}}{G_{0}^{2} +m_{G}^{2}\, \frac{G_{0}^{2}}{\Lambda^{2}}\, \left( 1+3\ln\left\vert \frac{G_{0}}{\Lambda}\right\vert \right) \text{ .} \label{M_G \end{equation} Note that the pure glueball mass $M_{G}$ depends also on the quark condensate $\phi$, but correctly reduces to $m_{G}$ in the limit $m_{0}^{2}=0$ (decoupling of quarkonia and glueball). In the presence of quarkonia, $m_{0}^{2} \neq0$, the vev $G_{0}$ is given by the equation \begin{equation} -\frac{m_{0}^{2}\phi^{2}\Lambda^{2}}{m_{G}^{2}}=G_{0}^{4}\ln\left\vert \frac{G_{0}}{\Lambda}\right\vert \text{.} \label{G0 \end{equation} The shift of the fields by their vev's introduces a bilinear mixing term $\sim\sigma G$ in the Lagrangian (\ref{Lagrangian1}). The physical fields $\sigma^{\prime}$ and $G^{\prime}$ can be obtained through an $SO(2)$ rotation, \begin{equation} \left( \begin{array} [c]{c \sigma^{\prime}\\ G^{\prime \end{array} \right) =\left( \begin{array} [c]{cc \cos\theta & \sin\theta\\ -\sin\theta & \cos\theta \end{array} \right) \left( \begin{array} [c]{c \sigma\\ G \end{array} \right) \text{ , \end{equation} wit \begin{align} M_{\sigma^{\prime}}^{2} & =M_{\sigma}^{2}\cos^{2}\theta+M_{G}^{2}\sin ^{2}\theta+2\,m_{0}^{2}\,\frac{\phi}{G_{0}}\sin(2\theta)\text{ , \label{m_sigma_r}\\ M_{G^{\prime}}^{2} & =M_{G}^{2}\cos^{2}\theta+M_{\sigma}^{2}\sin^{2 \theta-2\, m_{0}^{2}\,\frac{\phi}{G_{0}}\sin(2\theta)\text{ ,} \label{m_G_r \end{align} where the mixing angle $\theta$ reads \begin{equation} \theta=\frac{1}{2}\arctan\left[ - 4\, \frac{\phi}{G_{0}}\,\frac{m_{0}^{2}}{ M_{G}^{2} -M_{\sigma}^{2} }\right] \text{ .} \label{theta \end{equation} The quantity $m_{0}^{2}$ can be calculated from the masses of the pion, $\eta_{N}$ and the bare $\sigma$ mass [see Ref.\ \cite{Paper1}]: \begin{equation} m_{0}^{2}=\left( \frac{m_{\pi}}{Z}\right) ^{2}+\frac{1}{2}\left[ \left( \frac{m_{\eta_{N}}}{Z}\right) ^{2}-M_{\sigma}^{2}\right] \text{.} \label{m_0 \end{equation} If $m_{0}^{2}-c<0$, spontaneous breaking of chiral symmetry is realized. \section{Results and Discussion} The Lagrangian (\ref{Lagrangian}) contains the following twelve free parameters: $m_{0}$, $\lambda_{1}$, $\lambda_{2}$, $m_{1}$, $g_{1}$, $c$, $h$, $h_{1}$, $h_{2}$, $h_{3}$, $m_{G}$, $\Lambda=\sqrt{11}\,C^{2}/(2m_{G})$. The processes that we will consider depend only on the combination $h_{1 +h_{2}+h_{3},$ thus reducing the number of parameters to ten. We replace the set of ten parameters by the following equivalent set: $m_{\pi}$, $m_{\eta _{N}}$, $m_{\rho}$, $m_{a_{1}}$, $\phi$, $Z$, $M_{\sigma}$, $m_{G}$, $m_{1}$, $C$. The masses $m_{\pi}$ ($=139.57$ MeV) and $m_{\rho}$ ($=775.49$ MeV) are fixed to their PDG values. As outlined in Refs.\ \cite{Paper1, Mainz}, the mass of the $\eta_{N}$ meson can be calculated using the mixing of strange and non-strange contributions in the physical fields $\eta$ and $\eta^{\prime}(958)$: \begin{equation} \eta=\eta_{N}\cos\varphi+\eta_{S}\sin\varphi,\text{ }\eta^{\prime}=-\eta _{N}\sin\varphi+\eta_{S}\cos\varphi\text{,} \label{phi \end{equation} where $\eta_{S}$ denotes a pure $\bar{s}s$ state and $\varphi\simeq-36^{\circ }$ \cite{Giacosa:2007up}. In this way, we obtain the value $m_{\eta_{N}}=716$ MeV. (Given the well-known uncertainty of the value of the angle $\varphi$, one could also consider other values, e.g., $\varphi=-41.4^{\circ}$, as published by the KLOE Collaboration \cite{KLOE}, which corresponds to $m_{\eta_{N}}=755$ MeV. Variations of the pseudoscalar mixing angle affect the results presented in this paper only slightly.) The value of $m_{a_{1}}$ is fixed to $1050$ MeV according to the study of Ref.\ \cite{UBW}. (We note that taking the present PDG estimate of 1230 MeV does not change our conclusions.) The chiral condensate is fixed as $\phi=Zf_{\pi}$ and the renormalization constant $Z$ is determined by the study of the process $a_{1}\rightarrow\pi\gamma$: $Z=1.67\pm0.2$ \cite{Paper1}. \subsection{Assigning $\sigma^{\prime}$ and $G^{\prime}$ to $f_{0}(1370)$ and $f_{0}(1500)$} The $\sigma^{\prime}$ field denotes an isoscalar $J^{PC}=0^{++}$ state and its assignment to a physical state is a long-debated problem of low-energy QCD \cite{Close,refs,Morningstar,fariborz}. The two major candidates are the resonances $f_{0}(600)$ and the $f_{0}(1370)$ \cite{PDG}. The study of Ref.\ \cite{Paper1} has shown that $f_{0}(1370)$ is favoured to be a state which is predominantly $\bar{q}q$. As stated above, the resonance $f_{0}(1500)$ is a convincing glueball candidate. For these reasons we first test the scenario in which $\{\sigma^{\prime},G^{\prime}\}=\{f_{0 (1370),f_{0}(1500)\},$ which turns out to be phenomenologically successful, see below. We are left with the following four free parameters: $C,M_{\sigma},m_{G ,m_{1}.$ They can be obtained by a fit to the five experimental quantities of Table \ref{Table1}: the masses of the resonances $f_{0}(1500)$ ($M_{G^{\prime }}\equiv M_{f_{0}(1500)}=1505$ MeV \cite{PDG}) and $f_{0}(1370)$ (for which we use the mean value $M_{\sigma^{\prime}}^{ex}= (1350\pm150)$ MeV taking into account the PDG mass range between 1200 MeV and 1500 MeV \cite{PDG}) and the three well-known decay widths of the well-measured resonance $f_{0}(1500)$: $f_{0}(1500)\rightarrow\pi\pi$, $f_{0}(1500)\rightarrow\eta\eta$ and $f_{0}(1500)\rightarrow K\bar{K}$ \begin{table}[h] \centering \begin{tabular} [c]{|c|c|c|}\hline Quantity & Our Value [MeV] & Experiment [MeV]\\\hline $M_{\sigma^{\prime}}$ & $1191\pm26$ & $1200$-$1500$\\\hline $M_{G^{\prime}}$ & $1505\pm6$ & $1505\pm6$\\\hline $G^{\prime}\rightarrow\pi\pi$ & $38\pm5$ & $38.04\pm4.95$\\\hline $G^{\prime}\rightarrow\eta\eta$ & $5.3\pm1.3$ & $5.56\pm1.34$\\\hline $G^{\prime}\rightarrow K\bar{K}$ & $9.3\pm1.7$ & $9.37\pm1.69$\\\hline \end{tabular \caption{Fit in the scenario \{$\sigma '$, $G'$\} = \{$f_0(1370)$, $f_0(1500)$\}. Note that the $f_0(1370)$ mass ranges between 1200 MeV and 1500 MeV \cite{PDG} and therefore, as an estimate, we are using the value $m_{\sigma' =(1350 \pm150)$ MeV in the fit.\label{Table1} \end{table Using the Lagrangian (\ref{Lagrangian}), these observables can be expressed as functions of the parameters listed above. Note that, although our framework is based on $N_{f}=2$, we can calculate the amplitudes for the decays into mesons containing strange quarks by making use of the flavor symmetry $SU(N_{f}=3)$ \cite{longglueball}. It is then possible to calculate the following $f_{0}(1500)$ decay widths into pseudoscalar mesons containing $s$-quarks: $f_{0}(1500)\rightarrow K\bar{K}$, $f_{0}(1500)\rightarrow\eta\eta$ and $f_{0}(1500)\rightarrow\eta\eta^{\prime}$. The $\chi^{2}$ method yields $\chi^{2}/$d.o.f. $=0.29$ (thus very small), $C=(699\pm40)$ MeV, $M_{\sigma}=(1275\pm30)$ MeV, $m_{G}=(1369\pm26)$ MeV and $m_{1}=(809\pm18)$ MeV. The consequences of this fit are the following: (i) The quarkonium-glueball mixing angle reads $\theta=\left( 29.7\pm 3.6\right) {{}^\circ $. This, in turn, implies that the resonance $f_{0}(1500)$ consists to $76\%$ of a glueball and to the remaining $24\%$ of a quark-antiquark state. An inverted situation holds for $f_{0}(1370)$. (ii) Our fit allows us to determine the gluon condensate: $C=(699\pm40)$ MeV. This result implies that the upper value in Eq.\ (\ref{gc}) is favoured by our analysis. It is remarkable that insights into this basic quantity of QCD can be obtained from the PDG data on mesons. (iii) Further results for the $f_{0}(1500)$ meson are reported in the first two entries of Table \ref{Table2}. The decay into $4\pi$ is calculated as a product of an intermediate $\rho\rho$ decay. To this end the usual integration over the $\rho$ spectral function is performed. Our result yields 30 MeV in the $4\pi$ decay channel and is about half of the experimental value $\Gamma_{f_{0}(1500)\rightarrow4\pi}$ $=54.0\pm7.1$ MeV. However, it should be noted that an intermediate state consisting of two $f_{0}(600)$ mesons (which is also expected to contribute in this decay channel) is not included in the present model. The decay into the $\eta\eta^{\prime}$ channel is also evaluated; this channel is subtle because it is exactly on the threshold of the $f_{0}(1500)$ mass. Therefore, an integration over the spectral function of the decaying meson $f_{0}(1500)$ is necessary. The result is in a qualitative agreement with the experiment. (iv) The results for the $f_{0}(1370)$ meson are reported in the last four rows of Table \ref{Table2}. They are in agreement with the experimental data regarding the full width: $\Gamma_{f_{0}(1370)}=(200$-$500)$\ MeV \cite{PDG}. Unfortunately, the experimental results in the different channels are not yet conclusive. Our theoretical results point towards a dominant direct $\pi\pi$ and a non-negligible $\eta\eta$ contribution; these results correspond well to the experimental analysis of Ref.\ \cite{Bugg} where $\Gamma_{f_{0 (1370)\rightarrow\pi\pi}=325$ MeV and $\Gamma_{f_{0}(1370)\rightarrow\eta\eta }/\Gamma_{f_{0}(1370)\rightarrow\pi\pi}=$ $0.19\pm0.07$ are obtained. We find that the four-pion decay of $f_{0}(1370)\rightarrow\rho\rho\rightarrow4\pi$ is strongly suppressed (as was also found in Ref.\ \cite{Paper1}). This is unlike Ref.\ \cite{Bugg}, where a small but non-negligible value of about $50$ MeV is found. However, it should be noted that due to interference effects our result for this decay channel varies strongly when the parameters are even slightly modified. (v) The mass of the $\rho$ meson can be expressed as $m_{\rho}^{2}=m_{1 ^{2}+\phi^{2}\left( h_{1}+h_{2}+h_{3}\right) /2.$ In order that the contribution of the chiral condensate is not negative, the condition $m_{1}\leq m_{\rho}$ should hold. In the framework of our fit this condition is fulfilled at the two-sigma level. This result points towards a dominant $m_{1}$ contribution to the $\rho$ mass. This property, in turn, means that the $\rho$ mass is predominantly generated from the gluon condensate and not from the chiral condensate. It is therefore expected that the $\rho$ mass in the medium scales as the gluon condensate rather than as the chiral condensate. In view of the fact that $m_{1}$ is slightly larger than $m_{\rho }$ we have also repeated the fit by fixing $m_{1}=m_{\rho}$: the minimum has a $\chi^{2}/$d.o.f. $\simeq1$ and the results are very similar to the previous case. The corresponding discussion about the phenomenology is unchanged. (vi) As already stressed in Refs.\ \cite{Paper1,Zakopane}, the inclusion of (axial-)vector mesons plays a central role to obtain the present results. The artificial decoupling of (axial-)vector states would generate a by far too wide $f_{0}(1370)$ state. For this reason the glueball-quarkonium mixing scenario above 1 GeV has been previously studied only in phenomenological models with flavor symmetry \cite{Close,longglueball} but not in the context of chirally invariant models \begin{table}[h] \centering \begin{tabular} [c]{|c|c|c|}\hline Quantity & Our Value [MeV] & Experiment [MeV]\\\hline $G^{\prime}\rightarrow\rho\rho\rightarrow4\pi$ & $30$ & $54.0\pm7.1$\\\hline $G^{\prime}\rightarrow\eta\eta^{\prime}$ & $0.6$ & $2.1\pm1.0$\\\hline $\sigma^{\prime}\rightarrow\pi\pi$ & $284\pm43$ & -\\\hline $\sigma^{\prime}\rightarrow\eta\eta$ & $72\pm6$ & -\\\hline $\sigma^{\prime}\rightarrow K\bar{K}$ & $4.6\pm2.1$ & -\\\hline $\sigma^{\prime}\rightarrow\rho\rho\rightarrow4\pi$ & $0.09$ & -\\\hline \end{tabular \caption{Further results regarding the $\sigma' \equiv f_0(1370)$ and $G' \equiv f_0(1500)$ decays.\label{Table2} \end{table \subsection{Assigning $\sigma^{\prime}$ and $G^{\prime}$ to $f_{0}(1370)$ and $f_{0}(1710)$} Although the resonance $f_{0}(1710)$ has also been regarded as a glueball candidate in a variety of works \cite{refs2}, its enhanced decay into kaons and its rather small decay width make it compatible with a dominant ${\bar{s }s$ contribution in its wave function. Nonetheless, we have also tested the assumption that the pure quarkonium and glueball states mix to produce the resonances $f_{0}(1370)$ and $f_{0}(1710)$. The resonance $f_{0}(1710)$ is experimentally well known. Decays into $\pi \pi,$ $\bar{K}K$, and $\eta\eta$ have been seen, while no decay into $\eta \eta^{\prime}$ and into $4\pi$ have been detected. Using the total decay width $\Gamma_{f_{0}(1710)}= (135\pm8)$ MeV and the branching ratios reported in Ref.\ \cite{PDG} it is possible to deduce the decay widths into $\pi\pi,$ $\bar{K}K$, and $\eta\eta,$ see Table III. A fit analogous to the one in Table I yields too large errors for the decay width $\sigma^{\prime}\equiv f_{0}(1370)\rightarrow\pi\pi.$ For this reason we repeat our fit by adding the following constraint: $\Gamma_{\sigma^{\prime }\rightarrow\pi\pi}=(250\pm150)$ MeV. The large error assures that this value is in agreement with experimental data on this decay width. The results of the fit are reported in Table III \begin{table}[h] \centering \begin{tabular} [c]{|c|c|c|}\hline Quantity & Our Value [MeV] & Experiment [MeV]\\\hline $M_{\sigma^{\prime}}$ & $1386\pm134$ & $1350\pm150$\\\hline $M_{G^{\prime}}$ & $1720\pm6$ & $1720\pm6$\\\hline $G^{\prime}\rightarrow\pi\pi$ & $29.7\pm6.5$ & $29.3\pm6.5$\\\hline $G^{\prime}\rightarrow\eta\eta$ & $6.9\pm5.8$ & $34.3\pm17.6$\\\hline $G^{\prime}\rightarrow K\bar{K}$ & $16\pm14$ & $71.4\pm29.1$\\\hline $\sigma^{\prime}\rightarrow\pi\pi$ & $379\pm147$ & $250\pm150$\\\hline \end{tabular \caption{Fit in the scenario \{$\sigma '$, $G'$\} = \{$f_0(1370)$, $f_0(1710)$\}. \label{SzenarioIII} \end{table \bigskip The $\chi^{2}$ fit yields $\chi^{2}/$d.o.f. $=1.72$, $C=(764\pm256)$ MeV, $M_{\sigma}=(1516\pm80)$ MeV, $m_{G}=(1531\pm233)$ MeV and $m_{1}=(827\pm36)$ MeV. The mixing angle between the pure quarkonium $\sigma$ and the pure glueball $G$ calculated from Eq.\ (\ref{theta}) is $\theta=37. {{}^\circ \pm21. {{}^\circ $. The $\chi^{2}$ is wors than in the previous case, but the overall agreement is acceptable. The mixing angle is large and could also overshoot the value of $4 {{}^\circ ,$ which would imply a somewhat unexpected and unnatural reversed ordering, in which $f_{0}(1370)$ is predominantly glueball and $f_{0}(1710)$ predominantly quarkonium. In Table IV we report the decay widths $G^{\prime}\rightarrow4\pi$, $G^{\prime}\rightarrow\eta\eta^{\prime},$ $\sigma^{\prime}\rightarrow\eta\eta$ and $\sigma^{\prime}\rightarrow K\bar{K}$ , which can be calculated as a consequence of the fit of Table III \begin{table}[h] \centering \begin{tabular} [c]{|l|l|c|}\hline Decay Width & Our Value [MeV] & Experimental value [MeV]\\\hline $G^{\prime}\rightarrow4\pi$ & $115$ & -\\\hline $G^{\prime}\rightarrow\eta\eta^{\prime}$ & $16$ & -\\\hline $\sigma^{\prime}\rightarrow\eta\eta$ & $153\pm79$ & -\\\hline $\sigma^{\prime}\rightarrow K\bar{K}$ & $2.1_{-2.1}^{+13.6}$ & -\\\hline \end{tabular \caption{Further results from the fit with \{$\sigma '$, $G$'\} = \{$f_0(1370)$, $f_0(1710)$\}.\label{SzenarioIII1} \end{table \bigskip A clear problem in the framework of this scenario emerges: the decay width $G^{\prime}\equiv f_{0}(1710)\rightarrow4\pi$ is large, while experimentally it has not been seen. Therefore, we conclude that this scenario is not favoured. Moreover, in this scenario the remaining resonance $f_{0}(1500)$ should then be interpreted as a predominantly $\bar{s}s$ state, contrary to what its experimentally dominant $\pi\pi$ decay pattern suggests. Consequently, $f_{0}(1710)$ is unlikely to be predominantly a glueball state; this is also in accordance with the results from the ZEUS Collaboration \cite{ZEUS}. \subsection{Scenarios with $\sigma^{\prime}\equiv f_{0}(600)$} The scenarios $\{\sigma^{\prime},G^{\prime}\}=$ $\{f_{0}(600),$ $f_{0 (1500)\}$ and $\{\sigma^{\prime},G^{\prime}\}=$ $\{f_{0}(600),$ $f_{0 (1710)\}$ have also been tested. In both cases the mixing angle turns out to be small ($\lesssim15^{\circ}$), thus the state $f_{0}(600)$ is predominantly quarkonium. Then, in these cases the analysis of Ref.\ \cite{Paper1} applies: a simultaneous description of the $\pi\pi$ scattering lengths and the $\sigma\rightarrow\pi\pi$ decay width cannot be achieved. For these reasons the mixing scenarios with the resonance $f_{0}(600)$ as a quarkonium state are not favoured. \section{Conclusions and Outlook} We have presented a globally chirally invariant linear sigma model with (axial-)vector mesons and a dilaton/glueball degree of freedom. We have studied the phenomenology of the scalar states for the case $N_{f}=2$: in the favoured scenario the resonance $f_{0}(1500)$ is predominantly a glueball with a subdominant $\bar{q}q$ component and, conversely, $f_{0}(1370)$ is predominantly a quark-antiquark $(\bar{u}u+\bar{d}d)/\sqrt{2}$ state with a subdominant glueball contribution. It is interesting to observe that the success of the phenomenological description of these scalar resonances is due to the inclusion of the (axial-)vector mesons in the model. The gluon condensate is also an outcome of our study and turns out to be in agreement with lattice QCD results. Different scenarios in which $f_{0}(1710)$ is predominantly glueball and/or $f_{0}(600)$ is predominantly quarkonium do not seem to be in agreement with the present experimental data. Natural extensions of the model are the case $N_{f}=3$ \cite{Krakau} and the inclusion of a nonet of tetraquark states as additional low-lying scalar states. In this general scenario, a mixing of five scalar-isoscalar states takes place, which allows to describe all relevant scalar-isoscalar resonances listed in the PDG below 1.8 GeV \cite{PDG}. Applications of the model at nonzero temperature and density are also important because the presence of the dilaton field allows to study the restoration of both the dilatation and the chiral symmetry of QCD. \section*{Acknowledgments} The authors acknowledge fruitful discussions with A.\ Heinz and E.\ Seel. The work of D.P.\ is supported by the Foundation "Polytechnical Society."
\section{Introduction} \IEEEPARstart{M}{ultilevel} modulation has attracted significant research interest with its ability to improve the spectral efficiency of communication systems. The enabling technology behind it is the coherent transmission and detection, which gives access to both the carrier amplitude and phase to carry information. However, this increased spectral efficiency comes at the expense of a reduced power efficiency, which is undesirable in systems where power consumption is a constraint. Therefore, designing modulation formats which offer a good trade-off between spectral and power efficiency becomes challenging. Using \emph{lattice codes}, which are a finite set of points selected out of an $N$-dimensional lattice, is one approach which has been extensively used in the construction of multilevel modulation formats for additive white Gaussian noise (AWGN) channels with coherent detection~\cite{Forney1988,Forney1989,Conway1999}. In addition, techniques such as constellation shaping and nonequiprobable signaling have been used to minimize the average power\cite{Forney1989,Calderbank1990}. The former is done by selecting the set of points in a lattice which have minimum energies, whereas the latter minimizes the average power by reducing the transmission frequency of points with high energies. Another approach is by resorting to \emph{numerical optimization} techniques to find the best possible packing of constellation points as in~\cite{Foschini1974,Porath2003,Sloane1995,Graham1990,Agrell2009} for different power constraints, whether average or peak power. The drawback is the lack of geometric regularity, which increases the modulator and demodulator complexity. As the number of constellation points increases, the best known packings approach a regular structure such as a lattice~\cite[Ch. 1]{Conway1999}. Both approaches for designing power-efficient modulation formats assume that both the amplitude and phase of the carrier can be used to carry information. However, in systems where phase information is absent, different modulation techniques must be considered. Examples of such systems include phase noise limited systems, and noncoherent systems where information is encoded onto the amplitude of the carrier and the envelope of the received signal is detected at the receiver, etc. The latter is prevalent in optical communication systems where the overall cost and complexity is a critical constraint. Such type of noncoherent systems are known as \emph{intensity-modulated direct-detection} (IM/DD) systems and will be the focus of our work. In such systems the information is encoded onto the intensity of the optical carrier, and this intensity must, at all time instances, be nonnegative. Applications using IM/DD are, for example, wireless optical communications~\cite{Barry1994,Kahn1997,Hranilovic2004a}, and short-haul fiber links including data centers~\cite{Randel2008}. In the absence of optical amplification, IM/DD systems can be modeled as a conventional AWGN channel whose input is constrained to being nonnegative~\cite[Ch. 5]{Barry1994},~\cite{Kahn1997,Hranilovic2004,Hranilovic2003,Farid2010,Lapidoth2009}. Since the optical phase cannot be used to carry information, resorting to multilevel pulse amplitude modulation ($M$-PAM) is a natural low-complexity way of extending the widely spread on-off keying (OOK) to improve spectral efficiency. However, this is different from the conventional PAM since no negative amplitudes can be used~\cite[Eq. (5.8)]{Barry1994}. In~\cite{Cunningham2006}, an IM/DD link analysis using $4$-PAM signaling was performed. In~\cite{Hranilovic2004}, upper and lower bounds on the capacity of $2$-, $4$-, $8$-, and $16$-PAM were derived and in~\cite{Walklin}, the power efficiency of $M$-PAM was shown to be low. The $M$-ary pulse-position modulation ($M$-PPM) are known to be power-efficient; however, they have a poor spectral efficiency~\cite{Hranilovic2005,Kahn1997}. Since any nonnegative electrical waveform satisfies the above channel constraint, it can be communicated successfully over an IM/DD link. This implies that if the information to be transmitted is firstly modulated on a subcarrier (electrical) using any $M$-level modulation format, it can be transmitted on an IM/DD link after adding a direct current (DC) bias to ensure its nonnegativity, i.e., the subcarrier amplitude and phase which carries the information can be retrieved at the receiver. This concept is known as \emph{subcarrier modulation} (SCM) and was described in the wireless infrared communication context~\cite[Ch. 5]{Barry1994}. Therefore, the power efficiency compared to $M$-PAM can be improved since SCM allows the use of power-efficient multilevel modulation formats with IM/DD systems. In~\cite{Wiberg2009}, the SCM concept is experimentally demonstrated, and in~\cite{Space}, a novel transmitter design for the subcarrier quadrature phase-shift keying (QPSK) and 16-ary quadrature amplitude modulation (16-QAM) is presented. The DC bias required to ensure the nonnegativity of the electrical waveform does not carry information~\cite[Ch. 5]{Barry1994},~\cite{Wiberg2009,Space}. Therefore, the improved power efficiency can be achieved by allowing the DC bias to vary on a symbol-by-symbol basis and within the symbol interval as in~\cite{Hranilovic1999} and~\cite{You2001}, respectively. By guaranteeing nonnegativity, the investigation of lattice codes for IM/DD with AWGN became feasible and this is explored in~\cite{Shiu1999,Hranilovic2003}. In~\cite{Hranilovic2003}, a signal space model for optical IM/DD channels is presented, where average and peak optical power are considered as design constraints for constructing lattice-based modulation formats. In addition, constellation shaping to reduce the average optical power has been studied in~\cite{Shiu1999} for the case where no amplification is used, and in~\cite{Mao2008} where optical amplifiers are used. In this work, we optimize IM/DD modulation formats with and without confining them to a lattice structure. We propose a set of 4- and 8-level single-subcarrier modulation formats which are optimized for average electrical and optical power. These optimization criteria are both relevant, because the average \emph{electrical} power is the standard power measure in digital and wireless communications~\cite[p. 40]{Simon1995} and it helps in assessing the power consumption in optical communications~\cite{Chen1996}, while the average \emph{optical} power is an important figure of merit for skin- and eye-safety measures in wireless optical links~\cite[Ch. 5]{Barry1994},~\cite{Kahn1997,Hranilovic2003} and for quantifying the impact of shot noise in fiber-optical communications~\cite[p. 20]{Cox2002}. \section{System Model}\label{sec:sysmodel} \begin{figure} \psfrag{1}[c][c][1][0]{$u(k)$ } \psfrag{2}[c][c][1][0]{Modulator } \psfrag{3}[c][c][1][0]{$x(t) \geq 0$ } \psfrag{4}[c][c][1][0]{Laser diode } \psfrag{5}[c][c][1][0]{$z(t)$ } \psfrag{6}[c][c][1][0]{Optical link } \psfrag{7}[c][c][1][0]{Photodetector } \psfrag{8}[c][c][1][0]{$y(t) $ } \psfrag{9}[c][c][1][0]{Demodulator } \psfrag{a}[c][c][1][0]{$\hat u(k)$ } \psfrag{b}[c][c][1][0]{$n(t)$ } \centering \subfloat{\label{basebandtrans}\resizebox{3in}{!}{\includegraphics{basebandtrans}}} \hspace{3pt} \subfloat[][]{\label{Passbandtrans} \psfrag{1}[c][c][1.2][0]{$u(k)$ } \psfrag{2}[c][c][1.2][0]{Modulator } \psfrag{3}[c][c][1.2][0]{$x(t) \geq 0$ } \psfrag{4}[c][c][1.2][0]{Light Source } \psfrag{5}[c][c][1.2][0]{$z(t)$ } \psfrag{6}[c][c][1.2][0]{Optical link } \psfrag{7}[c][c][1.2][0]{Photodetector } \psfrag{8}[c][c][1.2][0]{$y(t) $ } \psfrag{9}[c][c][1.2][0]{Demodulator } \psfrag{a}[c][c][1.2][0]{$\hat u(k)$ } \resizebox{3.4in}{!}{\includegraphics{passbandtrans}}} \caption{(a) Baseband transceiver with constrained-input Gaussian channel. (b) Passband transceiver of IM/DD systems.} \label{fig:model} \end{figure} The system model under study is depicted in Fig.~\ref{fig:model}(a). It consists of a modulator which maps the data symbols $u(k)$ at instant $k$ to a waveform belonging to the signaling set $S=\{s_0(t),s_1(t), \ldots, s_{M-1}(t)\}$, where $M$ is the size of the signaling set. The generated waveform \begin{equation}\label{sig:xt} x(t)=\sum_{l=-\infty}^{\infty} s_{\Gamma[l]}(t-l T_s), \end{equation} where $\Gamma[l]$ is an ergodic process uniformly distributed over $\{0,1,\ldots,M-1\}$ and $T_s$ is the symbol period, is constrained to being real and nonnegative. The received signal can be written as \begin{equation}\label{basebandreceivedsignal} y(t)= x(t) + n(t), \end{equation} where $n(t)$ is a zero-mean Gaussian process with double-sided power spectral density $N_0/2$. It should be noted that there exists no nonnegativity constraint on the signal $y(t)$. This is then followed by the demodulation of $y(t)$ which yields $\hat u(k)$, an estimate of $u(k)$. The demodulator is a correlator or matched filter receiver, which minimizes the symbol error rate at a given signal-to-noise ratio (SNR)~\cite[Sect. 4.1]{Simon1995}. This model is different from the conventional AWGN channel by the fact that the input $x(t)$ is constrained to being nonnegative. The baseband model in Fig.~\ref{fig:model}(a) has been extensively studied in the optical communications context, since it serves as a good model for intensity-modulated direct-detection (IM/DD) systems ~\cite[Ch. 5]{Barry1994},~\cite{Kahn1997,Hranilovic2004,Hranilovic2003,Farid2010,Lapidoth2009}. The passband transceiver for IM/DD systems is depicted in Fig.~\ref{fig:model}(b). In such systems, the electrical nonnegative waveform $x(t)$ directly modulates a light source, such as a laser diode. Therefore, the information is carried on the envelope of the passband signal $z(t)=\sqrt{2 c x(t)} \cos( 2 \pi f_o t +\theta)$, i.e., the intensity of the optical field, where $c$ represents the electro-optical conversion factor in watts per ampere (W/A)~\cite[pp. 1--33]{Cox2002},~\cite{Westbergh2009},~\cite[pp. 32--67]{Coldren1999}, $f_o$ is the optical carrier frequency, and $\theta$ is a random phase, uniformly distributed in $[0,2\pi)$. It then propagates through the optical medium depicted as an optical fiber in Fig.~\ref{fig:model}(b), which could be a free-space optical link in other applications. At the receiver, the photodetector detects the power of $z(t)$. Since the dominant channel impairment in optical IM/DD systems is the thermal noise resulting from the optical-to-electrical conversion~\cite{Mao2008},~\cite[p. 155]{Agrawal2005}, the received electrical signal can be written as \begin{equation}\label{ytwithslopeefficiency} y(t)= r c x(t) + n(t), \end{equation} where $r$ is the responsivity of the opto-electrical converter in A/W. Without loss of generality, we set $rc=1$, which yields~(\ref{basebandreceivedsignal}). \section{Signal Space Model}\label{sec:signalspace} By defining a set of orthonormal basis functions $\phi_k(t)$ for $k=1,2, \ldots,N$ and $N \leq M$ as in~\cite{Hranilovic2003}, each of the signals in $S$ can be represented as \begin{equation}\label{eachsignal} s_i(t)= \sum_{k=1}^{N} s_{i,k} \phi_k(t) \end{equation} for $i=0, \ldots, M-1$, where $\mathbf{s}_i=(s_{i,1},s_{i,2}, \ldots, s_{i,N})$ is the vector representation of $s_i(t)$ with respect to the aforementioned basis functions. Therefore, the constellation representing the signaling set $S$ can be written as $\Omega=\{\mathbf{s}_0,\mathbf{s}_1, \ldots, \mathbf{s}_{M-1}\}$. \subsection{Single-Subcarrier Modulation Formats}\label{sec:scm} For in-phase and quadrature phase (I/Q) modulation formats to be used on IM/DD channels, a DC bias is required in order for $x(t)$ to be nonnegative. This could be translated geometrically by having a three-dimensional (3d) Euclidean space spanned by the orthonormal basis functions \begin{eqnarray}\label{basisfunctions} \phi_1(t) &=& \sqrt{ \frac{1}{T_s} } ~\mathop{\mathrm{rect}}\nolimits\left(\frac{t}{T_s}\right) \\ \nonumber \phi_2(t) &=& \sqrt{ \frac{2}{T_s} }~\cos{(2\pi f t)} ~\mathop{\mathrm{rect}}\nolimits\left(\frac{t}{T_s}\right)\\\nonumber \phi_3(t) &=& \sqrt{ \frac{2}{T_s} }~\sin{(2\pi f t)}~\mathop{\mathrm{rect}}\nolimits\left(\frac{t}{T_s}\right), \end{eqnarray} where \begin{eqnarray*} \mathop{\mathrm{rect}}\nolimits(t) = \begin{cases} 1 & \mbox{if } 0 \leq t \leq 1 \\ 0 & \mbox{otherwise } \end{cases} \end{eqnarray*} and $f$ is the electrical subcarrier frequency~\cite{Hranilovic2003}. The basis function $\phi_1(t)$ represents the DC bias, where $s_{i,1}$ is chosen for each $i=0,\ldots,M-1$ such that \[\min_{t} s_i(t) \geq 0,\] which guarantees the nonnegativity of $x(t)$ in~(\ref{sig:xt}). However, $\phi_2(t)$ and $\phi_3(t)$ are the basis functions of the conventional I/Q modulation formats such as $M$-PSK and $M$-QAM. As in~\cite[pp. 115--116]{Barry1994} and~\cite{Hranilovic2003}, we use $f=1/T_s$, which is the minimum value for which $\phi_1(t)$, $\phi_2(t)$, and $\phi_3(t)$ are orthonormal. In~\cite{Hranilovic2003}, IM/DD modulation formats based on these three basis functions are referred to as raised-QAM, and in~\cite{Westbergha2010} as single-cycle SCM. \subsection{Performance Measures} Two important power performance measures can be extracted from the baseband and passband models in Fig.~\ref{fig:model}. The first entity is the average electrical power defined as \begin{equation*}\label{aveele} \bar P_{e}= \lim_{T \to \infty} \frac{1}{2T} \int_{-T}^{T} \! x^2(t) \, dt, \end{equation*} which for any basis functions can be simplified to \begin{equation}\label{aveelesig} \bar P_{e}= \frac{\bar{E_s}}{T_s} =\frac{1}{T_s}~\mathbb{E}[ \|\mathbf{s}_i \|^2] , \end{equation} where $\bar{E_s}$ is the average energy of the constellation and $\mathbb{E}[\cdot]$ is the expected value. This entity is an important figure of merit for assessing the performance of digital and wireless communication systems~\cite[p. 40]{Simon1995}. Therefore, it is relevant for IM/DD systems for compatibility with classical methods and results~\cite{Channels2005,SvalutoMoreolo2010}. In addition, it helps in quantifying the impact of relative intensity noise (RIN) in fiber-optical links~\cite[pp. 1--33]{Cox2002}, and in assessing the power consumption of optical systems~\cite{Chen1996}. In~\cite{Karout2010}, $\bar P_{e}$ was used as a performance measure for comparing different intensity modulation formats. The second measure is the average optical power $\bar P_o$, which has been studied in~\cite{Barry1994,Kahn1997,Hranilovic2004,Hranilovic2003,Farid2010} for the wireless optical channel. Limitations are set on $\bar P_o$ for skin- and eye-safety standards to be met. In fiber-optic communications, this entity is used to quantify the impact of shot noise on the performance~\cite[p. 20]{Cox2002}. It is defined as \begin{equation*}\label{opticalpower} \bar P_{o}= \lim_{T\to \infty}\frac{1}{2T} \int_{-T}^{T} \! z^2(t) \, dt= \lim_{T \to \infty} \frac{c}{2T} \int_{-T}^{T} \! x(t) \, dt. \end{equation*} This measure depends solely on the DC bias required to make the signals nonnegative and can be represented in terms of the symbol period and the constellation geometry as~\cite{Hranilovic2004,Hranilovic2003} \begin{equation}\label{opticalpowersig} \bar P_{o}= \frac{c}{\sqrt{T_s}}~\mathbb{E} [s_{i,1}]. \end{equation} In order to have a fair comparison between the different modulation formats, the spectral efficiency defined as $ \eta={R_b/W} $ (bits/s/Hz) should be taken into account, where $R_b=R_s \log_2M$ is the bit rate, $R_s=1/T_s$ is the symbol rate, and $W$ is the baseband bandwidth defined as the first null in the spectrum of $x(t)$. The term baseband bandwidth is due to the fact that the baseband model in Fig.~\ref{fig:model}(a) hides the high frequency nature of the optical carrier~\cite[pp. 109--116]{Barry1994}. At the same symbol rate, modulation formats such as OOK and $M$-PAM have $W=R_s$, whereas the modulation formats belonging to the single-subcarrier family in Sec.~\ref{sec:scm} occupies $W=2 R_s$; this is due to the intermediate step of modulating the information onto an electrical subcarrier before modulating the optical carrier~\cite[Ch. 5]{Barry1994},~\cite{Karout2010}. \begin{figure*} \begin{tabular}{cccc} \includegraphics[width=0.23\textwidth]{11} & \includegraphics[width=0.23\textwidth]{14} & \includegraphics[width=0.23\textwidth]{15}& \includegraphics[width=0.23\textwidth]{L8} \end{tabular} \caption{(left to right):~$\mathscr{C}_{4}$ or $\mathscr{L}_4$, $\mathscr{C}_{\bar P_e,8}$, $\mathscr{C}_{\bar P_o,8}$, and $\mathscr{L}_8$.} \label{4pointscone} \label{8pointscone} \end{figure*} \section{Constellation Optimization}\label{sec:const} For designing constellations, the admissible region defined in~\cite[Eq. (10)]{Hranilovic2003} as the set of all signals satisfying the nonnegativity constraint has to be taken into account. Given the 3d-Euclidean space defined for SCM in Sec.~\ref{sec:scm}, the admissible region can be written as \begin{equation}\label{adm:scm} \Upsilon= \{\mathbf{s} \in \mathbb{R}^3 : s_{i,1}^2 \geq 2(s_{i,2}^2 +s_{i,3}^2)\}, \end{equation} which is a 3d-cone with apex angle of $\cos^{-1}(1/3)=70.528^{\circ}$ pointing in the dimension spanned by $\phi_1(t)$. As done before for the conventional AWGN channel~\cite{Foschini1974,Porath2003,Sloane1995,Graham1990,Agrell2009}, our approach of finding the best constellations can be formulated as a sphere-packing problem with the objective of minimizing a cost function depending on the constraints that might be present in the system model shown in Fig.~\ref{fig:model}. Thus, the optimization problem, for given constants $M$ and $d_{\text{min}}$, can be written as \begin{eqnarray}\label{obj} \label{minline} \text{Minimize~} & & \xi(\Omega) \\ \label{minline1} \text{Subject to}& & |\Omega| =M\\ \label{cons2} & & \Omega \subset \Upsilon\\ \label{cons1} & & d(\Omega) = d_{\text{min}}, \end{eqnarray} where \[d(\Omega)=\min_{ \underset{i \ne j }{\mathbf{s}_i ,\mathbf{s}_j \in \Omega}} \| \mathbf{s}_i -\mathbf{s}_j \|.\] Choosing the objective function as $\xi(\Omega)=\mathbb{E}[ \|\mathbf{s}_i \|^2]$ results in $\Omega=\mathscr{C}_{\bar P_e,M}$, i.e., a constellation optimized for average electrical power, and $\xi(\Omega)=\mathbb{E} [s_{i,1}]$ results in $\Omega=\mathscr{C}_{\bar P_o,M}$, i.e., a constellation optimized for average optical power. The constraint in~(\ref{cons2}) guarantees that the signals belong to the admissible region $\Upsilon$, therefore satisfying the nonnegativity criterion of the channel. The minimum distance $d_{\text{min}}$ serves as a good measure of error probability performance in the presence of AWGN at high SNR. Although this optimization problem is well formulated mathematically, it is rather difficult to obtain an analytical solution. Therefore, we resorted to numerical optimization techniques as in~\cite{Foschini1974,Porath2003,Sloane1995,Graham1990,Agrell2009} to find the best constellations. The optimization problem is nonconvex; therefore, a local solution does not imply that it is global. A special case of this optimization problem, which might not guarantee the optimal solution, is to confine the possible constellations to have a regular structure such as that of a lattice, denoted by $\Lambda$. In this case, the above optimization problem can be reformulated by replacing~(\ref{cons2}) with $ \Omega \subset \Upsilon \cap \Lambda$, and dropping~(\ref{cons1}) since it is directly inferred by~(\ref{cons2}). By using the face-centered cubic lattice ($A_3$), which provides the densest packing for the 3d-Euclidean space~\cite[p.~\rmnum{16} ]{Conway1999}, we obtain $\mathscr{L}_{\bar P_e,M}$, and $\mathscr{L}_{\bar P_o,M}$, the constellations optimized for average electrical and optical power, respectively. \subsection{Optimized Constellations} Below is the description of the obtained constellations whose coordinates are included in App.~\ref{bestconstapp}. We conjecture that all of them are optimal solutions of~(\ref{minline})--(\ref{cons1}). \subsubsection{$4$-level Constellations} Fig.~\ref{4pointscone} depicts the 4-level constellation which provides the lowest $\bar P_e$ and $\bar P_o$ while satisfying the optimization constraints. The geometry of this constellation is a regular tetrahedron where all the spheres, or the constellation points lying at the vertices of this regular tetrahedron, are equidistant from each other and normalized to unit $d_{\text{min}}$. This constellation is also the result of $\Upsilon \cap A_3$. Since the obtained constellation is optimized for both $\bar P_e$ and $\bar P_o$, we will refer to it as $\mathscr{C}_4$ or $\mathscr{L}_4$. It is a remarkable fact that the vertex angle of the tetrahedron, defined as the apex angle of the circumscribed cone, is exactly $\cos^{-1}(1/3)$, which is equal to the apex angle of the admissible region $\Upsilon$. Thus, $\mathscr{C}_4$ fits $\Upsilon$ snugly, in the sense that all constellation points, regarded as unit-diameter spheres, touch each other as well as the boundary of $\Upsilon$, which, as we shall see in the next section, makes the modulation format very power-efficient. This modulation consists of a zero level signal and a biased ternary PSK. In~\cite{Karout2010}, a power-efficient modulation format called on-off phase-shift keying (OOPSK) was presented. It turns out that it has the same geometry as $\mathscr{C}_4$. Other hybrids between amplitude-shift keying and PSK have been studied in~\cite{Essiambre2010} and \cite{Gursoy2009}; however, such modulation formats do not satisfy the nonnegativity constraint of IM/DD channels. \subsubsection{$8$-level Constellations} Fig.~\ref{8pointscone} also shows the 8-level constellations $\mathscr{C}_{\bar P_e,8}$ and $\mathscr{C}_{\bar P_o,8}$. None of these constellations are lattice-based, but all of them contain $\mathscr{C}_4$ as the lowest four spheres. The highly symmetric and compact constellation $\mathscr{C}_{\bar P_e,8}$ consists of four central spheres arranged in a tetrahedron and four additional spheres, each touching three spheres in the central tetrahedron. Surprisingly, seven of the eight spheres touch the conical boundary of $\Upsilon$. This modulation is a hybrid between 2-PAM and two ternary PSK which are DC biased differently. The constellation $\mathscr{C}_{\bar P_o,8}$ is the same as $\mathscr{C}_{\bar P_e,8}$ but with one sphere moved. On the other hand, when confining the set of points to a lattice structure, the resulting constellations which provide the lowest $\bar P_e$ and $\bar P_o$ are the same, $\mathscr{L}_{8}=\mathscr{L}_{\bar P_e,8}=\mathscr{L}_{\bar P_o,8}$, and is depicted in Fig.~\ref{8pointscone}. This constellation also contains $\mathscr{C}_4$ as the lowest four spheres. \subsection{Previously Known Constellations} Our investigation encompasses other previously known formats which are presented after being normalized to unit $d_{\text{min}}$. At spectral efficiency $\eta=1$ bits/s/Hz, OOK defined as $\{(0),(1)\}$ in terms of $\phi_1(t)$ will be compared with $\mathscr{C}_4$, and with subcarrier QPSK defined as $\{(1,\pm 1/2,\pm 1/2)\}$ in terms of the basis functions defined in Sec.~\ref{sec:scm}. At a spectral efficiency $\eta=3/2$ bits/s/Hz, $\mathscr{C}_{\bar P_e,8}$, $\mathscr{C}_{\bar P_o,8}$, and $\mathscr{L}_{8}$ will be compared with subcarrier 8-PSK defined as $(1/\sin(\pi/8))\{(1/ \sqrt{2} , \cos( \pi i/4)/2 , \sin( \pi i/4) / 2 )\}$ for $i=0,\ldots,7$, star-shaped 8-QAM~\cite{Essiambre2010} with a constant bias defined as $\{ ( (1+\sqrt{3})/\sqrt{2},\pm 1/2 ,\pm 1/2 ), ((1+\sqrt{3})/\sqrt{2},0,\pm (1+\sqrt{3})/2),((1+\sqrt{3})/\sqrt{2},\pm (1+\sqrt{3})/2,0) \}$. We also include in our analysis a star-shaped 8-QAM denoted as $\breve 8$-QAM in which the DC bias is allowed to vary from symbol to symbol, thus carrying information, and is defined as $\{ ( 1,\pm 1/2 ,\pm 1/2 ), ((1+\sqrt{3})/\sqrt{2},0,\pm (1+\sqrt{3})/2),((1+\sqrt{3})/\sqrt{2},\pm (1+\sqrt{3})/2,0) \}$. \begin{figure} \centering \footnotesize \psfrag{aaaaaaaa1}[c][c][0.75][0]{$\mathrm{OOK}$} \psfrag{aaaaaaaa2}[c][c][0.75][0]{QPSK } \psfrag{aaaaaaaa3}[c][c][0.9][0]{$\mathscr{C}_4$ } \psfrag{aaaaaaaa4}[c][c][0.75][0]{8-QAM} \psfrag{aaaaaaaa5}[c][c][0.75][0]{$\mathscr{L}_8$} \psfrag{aaaaaaaa6}[c][c][0.9][0]{$\mathscr{C}_{\bar P_e,8}$} \psfrag{aaaaaaaa7}[c][c][0.9][0]{$\mathscr{C}_{\bar P_o,8}$} \psfrag{aaaaaaaa8}[c][c][0.9][0]{$\mathscr{C}_{\hat P_o,8}$} \psfrag{xxxxxxxx4}[c][c][0.75][0]{$\breve 8$-QAM} \psfrag{xxxxxxxx5}[c][c][0.75][0]{8-PSK} \psfrag{SER}[c][c][1][0]{$P_s$} \psfrag{SNREbN0dB}[t][c][1][0]{$\gamma_{\bar E_b}~\text{[dB]}$} \psfrag{TbavePosquaredNodB}[t][c][1][0]{$\gamma_{\bar P_o}~\text{[dB]}$} \psfrag{TbpeakPosquaredNodB}[t][c][1][0]{$\gamma_{\hat P_o}~\text{[dB]}$} \begin{tabular}{c} \includegraphics[scale=0.9]{serebno} \\ \\ \includegraphics[scale=0.9]{seravepo} \\ \\ \end{tabular} \caption{Simulated (solid) and theoretical (dotted) SER for the various modulation formats vs. $\gamma_{\bar E_b}$ (top), $\gamma_{\bar P_o}$ (bottom).} \label{serebno} \end{figure} \section{Performance Analysis}\label{sec:perf} The symbol error rate (SER) performance of the different modulation schemes will be assessed. The standard union bound found in~\cite[Eq. (4.81)]{Simon1995} is used to approximate the theoretical SER. This union bound can be approximated as \begin{equation}\label{bound} P_{ s } \approx \frac{2 K }{M }~Q\left( \sqrt{\frac{ d_{\text{min}}^2}{2 N_0}} \right), \end{equation} where $K$ is the number of distinct signal pairs $(s_i(t),s_j(t))$ with $i<j$ for which $\int (s_i(t)-s_j(t))^2 dt = d_{\text{min}}^2$. This approximation is tight at high SNR. Fig.~\ref{serebno} (top) shows the simulated and theoretical SER of the studied modulation formats vs. SNR defined as \begin{equation}\label{snreb} \gamma_{\bar E_b} =10 \log_{10}\frac{\bar E_b}{N_0}. \end{equation} Apparently, all the modulation formats which are optimized for $\bar P_e$ outperforms the other formats at the same spectral efficiency. For spectral efficiency $\eta=1$, $\mathscr{C}_4$ has a 0.86 dB average electrical power gain over OOK and 2.87 dB gain over QPSK to achieve $P_s= 10^{-6}$. For $\eta=3/2$, $\mathscr{C}_{\bar P_e,8}$ has a 0.3 dB gain over $\mathscr{C}_{\bar P_o,8}$, 0.58 dB gain over $\mathscr{L}_{8}$, 2.55 dB gain over $\breve 8$-QAM, 4.35 dB gain over 8-QAM, and 4.39 dB gain over 8-PSK to achieve $P_s= 10^{-6}$. The modulation formats optimized for $\bar P_e$ and $\bar P_o$ are very close in performance to $\mathscr{L}_{8}$, the lattice-based modulation format. In order to facilitate the comparison of modulation formats in terms of their average optical power requirements, we define the optical SNR as \begin{equation}\label{snravePo} \gamma_{\bar P_o} = 10 \log_{10}\frac{ \bar P_o}{c\sqrt{R_b N_0}} \end{equation} in a similar fashion as in~\cite[Eq. (5)]{Kahn1997} . Fig.~\ref{serebno} (bottom) shows the SER plotted vs. $\gamma_{\bar P_o}$. Quite obviously, the modulation formats optimized for $\bar P_o$ perform better than the rest. For $\eta=1$, $\mathscr{C}_4$ has a 0.43 dB average optical power gain over OOK, and a 2.06 dB gain over QPSK to achieve an SER of $10^{-6}$. For $\eta=3/2$, $\mathscr{C}_{\bar P_o,8}$ has a 0.04 dB gain over $\mathscr{C}_{\bar P_e,8}$, 0.46 dB gain over $\mathscr{L}_8$, 1.35 dB gain over $\breve 8$-QAM, 2.48 dB gain over 8-PSK, and a 2.75 dB gain over 8-QAM to achieve a $P_s= 10^{-6}$. Besides the very close performance of $\mathscr{C}_{\bar P_o,8}$ and $\mathscr{C}_{\bar P_e,8}$, it is clear that they together with the lattice-based modulation perform better than the other modulation formats under study in terms of average optical power performance. \section{Conclusion}\label{sec:conclusion} By relaxing the constraint on the set of points used to design modulation formats for IM/DD channels, we were able to design 4- and 8-level modulation formats which are more power-efficient than known ones. For the 4-level modulation formats, the most power-efficient modulation in terms of average electrical and optical power happens to have a lattice structure even though the number of constellation points is small. This constellation is also a subset of all the obtained higher level constellations. As for the 8-level constellations, power-efficient schemes are obtained by not confining the set of constellation points to a lattice structure. However, this comes at the price of losing the geometric regularity found in the lattice structure. We conjecture that the new modulation formats are optimal for their size and optimization criteria over IM/DD channels. \appendices % \section{Obtained Constellations}\label{bestconstapp} Constellations are normalized to unit $d_{\text{min}}$. \vspace{-4mm} \begin{align*} \mathscr{C}_{\bar P_e,4}= & \mathscr{C}_{\bar P_o,4}=\mathscr{L}_{\bar P_e,4}=\mathscr{L}_{\bar P_o,4}=\{(0 , 0, 0),\\ &(\sqrt{2/3} , 0 , 1/\sqrt{3}), (\sqrt{2/3}, \pm 1/2 , -\sqrt{3}/6)\}.\\ \mathscr{C}_{\bar P_e,8}= & \mathscr{C}_4 \cup \{ ((5/3)\sqrt{2/3} ,0, -5/(3\sqrt{3})),\\ &((5/3)\sqrt{2/3} ,\pm 5/6, 5/(6\sqrt{3})), (2 \sqrt{2/3} , 0 , 0) \}.\\ \mathscr{C}_{\bar P_o,8}= & \mathscr{C}_4 \cup \{ ((5/3)\sqrt{2/3}, 0, -5/(3\sqrt{3})),\\ &((5/3)\sqrt{2/3}, \pm 5/6 , 5/(6\sqrt{3})),\\ &(1.6293 ,0.9236, -0.6886) \}.\\ \mathscr{L}_{\bar P_e,8}= & \mathscr{L}_{\bar P_o,8}=\mathscr{C}_4 \cup \{ (2\sqrt{2/3}, \pm1/2, \sqrt{3}/6),\\ &(2\sqrt{2/3}, 0, -1/\sqrt{3}), ( 2\sqrt{2/3}, 1, -1/\sqrt{3}) \}. \end{align*} \section*{Acknowledgment} The authors would like to acknowledge the SSF funding under grant RE07-0026 and LINDO Systems for the free license to use their numerical optimization software. \ifCLASSOPTIONcaptionsoff \newpage \fi
\section{Introduction} de Sitter spacetime is extensively investigated in the literature from different points of view. In fact, it is particularly relevant for inflation \cite{Guth1981} and hence the physics of the very early universe. Furthermore, there are many recent experimental evidences and astronomical observations which indicate that the cosmological constant in the universe is positive leading to an accelerating expansion (see, e.g., Ref. \cite{bass} and references therein). The pioneering work of Gibbons and Hawking \cite{gibbons} extending to cosmological horizons the concepts of thermodinamics and particle creation previously introduced for black hole event horizons opened the way to the study of the properties of quantum field theory on de Sitter space, especially the temperature and entropy (see, e.g., Refs. \cite{lohiya1,lohiya2,biswas,suzuki}), and on asymptotically de Sitter spaces containing black holes. In this respect, it proved useful to express the de Sitter metric in static form (see, e.g., Ref. \cite{ellis}). We are interested here in studying metric perturbations in the static region of the de Sitter spacetime between the origin and the cosmological horizon. We will then use the Regge--Wheeler \cite{ReggeW} formalism to decompose the perturbations in tensor harmonics and Fourier transform it with respect to time, as customary. We will account for perturbations of both parity, and investigate the features of geodesic motion in the perturbed gravitational field. In particular, we will consider an initially radial geodesic in the unperturbed spacetime and study how the motion deviates from maintaining purely radial as a result of the perturbation. Furthermore, we will also consider gauge- and tetrad-invariant first-order massless perturbations of any spin following the approach of Teukolsky \cite{Teuk}, and discuss the existence of closed-form, i.e. Liouvillian, solutions to the radial equation. Note that our results are consistent with those of Refs. \cite{guven} and \cite{khanal} concerning the perturbations of the Schwarzschild-de Sitter spacetime, which however focused on the stability of the de Sitter spacetime in the presence of the black hole and on the scattering properties of both the event and cosmological horizons. Section 2 summarizes what is known about radial geodesics in de Sitter spacetime, while metric perturbations for both electric and magnetic multipoles are discussed in section 3. The equations for perturbations to radial geodesics are integrated in section 4, while section 5 contains the derivation of Liouvillian solutions to the radial part of the Teukolsky master equation for massless perturbations of any spin. Concluding remarks are presented in section 6, while relevant details are given in the appendices. \section{Radial geodesics in de Sitter spacetime} Consider de Sitter spacetime, whose line element written in spherical-like coordinates is given by \beq \label{metric} \rmd s^2 = N^2\rmd t^2 - N^{-2} \rmd r^2 - r^2 (\rmd \theta^2 +\sin^2 \theta \rmd \phi^2), \eeq where $N=(1-H^2r^2)^{1/2}$ denotes the \lq\lq lapse" function. The spacetime region which can be accessed is the ball of radius $1/H$ and center at the origin. Timelike radial geodesics are characterized by their $4$-velocity \beq \label{rad_geo} U=\Gamma (\partial_t +\zeta \partial_r) \eeq with \beq \Gamma=\frac{\rmd t}{\rmd \tau}=\frac{E}{N^2},\qquad \frac{\rmd r}{\rmd \tau}=\Gamma \zeta=\pm \sqrt{E^2-N^2}, \eeq so that $\tau$ denotes the proper time and \beq \zeta=\pm \frac{N^2}{E}\sqrt{E^2-N^2}; \eeq $E$ is the Killing constant associated with the stationarity of the metric. It is convenient to introduce an orthonormal frame adapted to the static observer family (at rest with respect to the coordinates) with basis vector fields \beq \fl\quad e_{\hat 0}=N^{-1}\partial_t,\quad e_{\hat r} =N\partial_r,\quad e_{\hat \theta}=1/r\partial_\theta, \quad e_{\hat \phi}=1/(r\sin\theta)\partial_\phi, \eeq with dual basis of 1-forms \beq \fl\quad \omega^{\hat 0}=N dt,\quad \omega^{\hat r}=-N^{-1}dr, \quad \omega^{\hat \theta}=-rd\theta,\quad \omega^{\hat \phi} =-r\sin\theta d\phi. \eeq With respect to this frame the geodesic $4$-velocity vector field can be written as \beq U=\gamma (e_{\hat 0}+\nu e_{\hat r}), \eeq where \beq \gamma=\Gamma N,\quad \nu=N^{-2}\zeta. \eeq The parametric equations of the geodesics corresponding to initial values \beq \label{iniconds} t(0)=0\,,\quad r(0)=0,\quad \theta(0)=0,\quad \phi(0)=0 \eeq can be written explicitly as follows. \begin{enumerate} \item $E^2>1$. In this case it is convenient to use the notation $E=\cosh \alpha$. We have then \begin{eqnarray} \fl t(\tau)&=& \frac{1}{H}\left[ {\rm arctanh}\left(\frac{\tanh (\frac12 H\tau)+\sinh \alpha}{\cosh \alpha}\right) +{\rm arctanh}\left(\frac{\tanh (\frac12 H\tau)-\sinh \alpha} {\cosh \alpha}\right) \right]\nonumber \\ \fl r(\tau)&=& \frac{\sinh \alpha}{H}\sinh (H\tau) \end{eqnarray} \item $E^2=1$. In this case the initial conditions (\ref{iniconds}) imply the trivial solution of a particle at rest at the origin \beq \label{solEeq1} r=0,\quad t=\tau. \eeq \item $E^2<1$. In this case it is convenient to use the notation $E=\cos \alpha$. However $r(0)$ cannot be made to vanish but it should be always greater than a certain value $0<r_*=\sin \alpha/H<1/H$. We have then \begin{eqnarray} \fl t(\tau)&=& \frac{1}{H}\left\{ {\rm arctanh }\left[ \frac{1+\sin\alpha}{\cos\alpha} \tanh \left(\frac12 H\tau \right)\right] + {\rm arctanh }\left[ \frac{1-\sin\alpha}{\cos\alpha} \tanh \left(\frac12 H\tau \right)\right] \right\}\nonumber \\ \fl r(\tau)&=& \frac{\sin \alpha}{H} \cosh (H\tau) \equiv r_* \cosh (H\tau). \end{eqnarray} \end{enumerate} With a slight modification one can obtain the solution corresponding to more general initial data $x^\alpha(0)=x^\alpha_0$. For instance, for $r(0)\not=0$ the solution (\ref{solEeq1}) for $E^2=1$ becomes \beq r=r_0e^{\pm H\tau}, \qquad t=\tau\mp\frac1H\ln\frac{N}{N_0}. \eeq For a later use we also introduce the Newman--Penrose \cite{NP} frame \beq \fl\qquad l=\frac{1}{N^2}\partial_t+\partial_r,\quad n=\frac{N^2}{2}\left(\frac{1}{N^2}\partial_t-\partial_r\right),\quad m=\frac{1}{\sqrt{2}r}\left(\partial_\theta+\frac{{\rm i}} {\sin\theta}\partial_\phi\right). \eeq The non-vanishing spin coefficients are \beq\fl\qquad \rho=-\frac{1}{r},\quad \mu=-\frac{N^2}{2r},\quad \alpha=-\beta=-\frac{\sqrt{2}}{4r}\cot\theta,\quad \gamma=-\frac{H^2r}{2}. \eeq The Weyl scalars are all identically zero. \section{Metric perturbations} Let us consider the perturbations \beq \tilde g_{\mu \nu }=g_{\mu \nu } + h_{\mu \nu} \eeq of de Sitter spacetime. Since the background metric (\ref{metric}) is static and spherically symmetric, we decompose the metric perturbation $h_{\mu \nu }$ in tensor harmonics and Fourier transform it with respect to time, as customary. We will use the Regge-Wheeler \cite{ReggeW} gauge to simplify the form of the perturbation. \subsection{Electric multipoles} The metric perturbation $h_{\mu \nu }$, for the electric multipoles, is given by \begin{eqnarray} \label{elepert} ||h_{\mu \nu }||=\left[ \begin {array}{cccc} N^2H_0&H_1&0&0 \\\noalign{\medskip}\rm{sym}&\displaystyle\frac{1}{N^2}H_2&0&0 \\\noalign{\medskip}\rm{sym}&\rm{sym}&{r}^{2}K&0\\\noalign{\medskip} \rm{sym}&\rm{sym} &\rm{sym}&{r}^{2} \sin ^{2}\theta K \end {array} \right]{\rm e}^{-{\rm i}\omega t}Y_{l0} , \end{eqnarray} where the symbol ``sym'' inherited from \cite{ReggeW} indicates that the missing components of $h_{\mu \nu }$ should be found from the symmetry $h_{\mu \nu }=h_{\nu \mu }$ and the functions $Y_{l0}$ are normalized spherical harmonics (see e.g. \cite{jackson}) with azimuthal index $m=0$, defined by \begin{eqnarray} \label{ypsilonl0} Y_{l0}=\frac12\sqrt{{\frac {2l+1}{\pi }}}P_l(\cos\theta) . \end{eqnarray} For $l\geq2$, the system of radial equations we have to solve is the following (here $L \equiv l(l+1)$): \begin{eqnarray} \label{eqsele} 0&=&H_1{}'+\frac{{\rm i} \omega}{N^2}(W+K)-\frac{2rH^2}{N^2}H_1 , \nonumber\\ 0&=&K{}'-\frac{W}{r}-\frac{{\rm i}L}{2\omega r^2}H_1+\frac{K}{rN^2} , \end{eqnarray} since \beq H_0=H_2\equiv W , \qquad \eeq together with the algebraic relation \beq \fl\qquad \label{constr} 0=\frac{(L-2)}{r}W-\frac{{\rm i}}{\omega}(H^2L+2\omega^2)H_1 +\frac{2}{rN^2}\left(1+r^2\omega^2-N^2\frac{L}{2}\right)K . \eeq Let us introduce the dimensionless variables $x \equiv Hr$, $\Omega \equiv \omega/H$, and set $H_{1} \equiv {\rm i} \tilde H_1$. Solving for $W$ in the constraint equation (\ref{constr}) and substituting into the system (\ref{eqsele}) we get (from now on a prime denotes differentiation with respect to $x$) \begin{eqnarray} \label{eqsele2a} \tilde H_1{}'&=&\frac{(2\Omega^2+3L-4)x}{(1-x^2)(L-2)}\tilde H_1 +\frac{2\Omega[(\Omega^2+L-1)x^2+2-L]}{(1-x^2)^2(L-2)}K , \\ \label{eqsele2b} K{}'&=&-\frac{[2x^2(L+2\Omega^2)+L(L-2)]}{2(L-2)\Omega x^2} \tilde H_1-\frac{x(L+2\Omega^2)}{(1-x^2)(L-2)}K , \end{eqnarray} which can be solved in terms of Heun's functions (see Appendix C). Figure \ref{fig:1} shows the behaviour of the metric perturbation functions $\tilde H_1$, $K$ and $W$ in terms of the rescaled radial variable $x$ for $l=2$ and different values of $\Omega$. The perturbative regime is generally lost very quickly. High frequency modes instead oscillate with small amplitudes over a wide range of the radial coordinate. The oscillations become very high when approaching the de Sitter horizon in the case of $\tilde H_1$ and $W$. The amplitude remains instead practically constant in the case of $K$. In fact, in the high frequency limit $\Omega\gg1$ one finds \beq K{}''+\frac{2x}{1-x^2}K{}'+\frac{\Omega^2}{(1-x^2)^2}K=0, \eeq or equivalently \beq \frac{d^2K }{dz^2}+\Omega^{2}K=0, \eeq having defined $z = {\rm arctanh}\,x$. The solution is then \beq K=c_1\sin(\Omega\,{\rm arctanh}\,x)+c_2\cos(\Omega\,{\rm arctanh}\,x), \eeq where $c_1$ and $c_2$ are arbitrary constants. \begin{figure} \typeout{*** EPS figure 1} \begin{center} $\begin{array}{cc} \includegraphics[scale=0.3]{metric_ele_leq2_om1.eps}&\quad \includegraphics[scale=0.3]{metric_ele_leq2_om40.eps}\\[.4cm] \quad\mbox{(a)}\quad &\quad \mbox{(b)} \end{array}$\\ \end{center} \caption{The behaviour of the metric perturbation functions $\tilde H_1$, $K$ and $W$ in the case of electric multipoles is shown in terms of the rescaled radial variable $x$ for $l=2$ and different values of $\Omega$. Fig. (a) corresponds to the choice $\Omega=1$ and the initial conditions are $\tilde H_1(x_0)=10^{-4}=K(x_0)$, with $x_0=10^{-2}$, so that $W(x_0)\approx10^{-4}$. Fig. (b) corresponds to $\Omega=40$ and initial conditions $\tilde H_1(x_0)=10^{-4}=K(x_0)$, with $x_0=10^{-2}$, so that $W(x_0)\approx7\times10^{-5}$. Larger values of $l$ correspond to a further growth of the perturbation functions.} \label{fig:1} \end{figure} A real solution for the metric can be obtained by considering $W$ and $K$ and $\tilde H_1$ as real. In this case the non-vanishing metric components are \begin{eqnarray} g_{tt}&=& N^2 (1+WY_{l0} \cos \omega t), \nonumber \\ g_{tr}&=& \tilde H_1Y_{l0} \sin \omega t, \nonumber \\ g_{rr}&=& -N^{-2} (1-WY_{l0} \cos \omega t), \nonumber \\ g_{\theta\theta}&=& -r^2 (1-KY_{l0} \cos \omega t), \nonumber \\ g_{\phi\phi}&=& -r^2\sin^2\theta (1-KY_{l0} \cos \omega t), \end{eqnarray} so that \begin{eqnarray} ds^2&=&N^2 (1+WY_{l0} \cos \omega t) \left(dt-\tilde H_1N^{-2}Y_{l0} \sin\omega t dr\right)^{2} \nonumber \\ &&-N^{-2} (1-WY_{l0} \cos \omega t) dr^2\nonumber \\ && -r^2 (1-KY_{l0} \cos \omega t)(d\theta^2+\sin^2\theta d\phi^2), \end{eqnarray} to first order in the perturbation quantities. A natural orthonormal frame associated with this form of the metric is then \begin{eqnarray} \Omega^{\hat 0}&=& N \left(1+\frac12WY_{l0} \cos \omega t\right) \left(dt+\tilde H_1N^{-2}Y_{l0} \sin\omega t dr\right) \nonumber \\ &=& N \left(1+\frac12WY_{l0} \cos \omega t\right)dt+\tilde H_1N^{-1}Y_{l0} \sin\omega tdr, \nonumber \\ \Omega^{\hat r}&=& -N^{-1} \left(1-\frac12WY_{l0} \cos \omega t\right) dr, \nonumber \\ \Omega^{\hat \theta}&=& -r\left(1-\frac12KY_{l0} \cos \omega t\right)d\theta, \nonumber \\ \Omega^{\hat \phi}&=& -r \sin \theta \left(1-\frac12KY_{l0} \cos \omega t\right) d\phi . \end{eqnarray} One can then introduce a Newman--Penrose \cite{NP} frame in a standard way \cite{chandra} \beq \label{NPframe} \fl l=(\Omega^{\hat 0}+\Omega^{\hat r})/\sqrt{2},\quad n =(\Omega^{\hat 0}-\Omega^{\hat r})/\sqrt{2},\quad m =(\Omega^{\hat \theta}+{\rm i} \Omega^{\hat \phi})/\sqrt{2}, \eeq and conveniently rotate it according to $l\to l\sqrt{2}/N$, $n\to nN/\sqrt{2}$. We list here the non-vanishing first-order spin coefficients and Weyl scalars (hereafter $C \equiv \cos \omega t$ and $ S \equiv \sin \omega t$): \begin{eqnarray} \rho&=&-\frac{1}{r}+\frac{1}{2r}(rK'-W)Y_{l0}C-\frac{\omega} {2N^2}KY_{l0}S, \nonumber\\ \mu&=&-\frac{N^2}{2r}+\frac{N^2}{4r}(rK'-W)Y_{l0}C+\frac{\omega}{4} KY_{l0}S, \nonumber\\ \alpha&=&-\frac{\sqrt{2}}{4r}\cot\theta+\frac{\sqrt{2}}{8r}K \left(\frac{dY_{l0}}{d\theta}-\cot\theta Y_{l0}\right)C -\frac{\sqrt{2}}{8r}\tilde H_1 Y_{l0}S, \nonumber\\ \beta&=&-\alpha-\frac{\sqrt{2}}{4r}\tilde H_1\frac{dY_{l0}} {d\theta}S, \nonumber\\ \gamma&=&-\frac{H^2r}{2}-\frac18(-N^2W'+2\omega\tilde H_1 +2rH^2W)Y_{l0}C-\frac{\omega}{8}WY_{l0}S, \nonumber\\ \nu&=&\frac{\sqrt{2}N^2}{8r}(WC-\tilde H_1S)\frac{dY_{l0}}{d\theta}, \nonumber\\ \epsilon&=&\frac{Y_{l0}}{4N^2}[(N^2W'-2\omega\tilde H_1)C +\omega WS], \nonumber\\ \kappa&=&-\frac{\sqrt{2}}{2N^2r}(WC+\tilde H_1S)\frac{dY_{l0}}{d\theta}, \end{eqnarray} and \begin{eqnarray} \label{psiele} \psi_0&=&-\frac{1}{2N^2r^2}(WC+\tilde H_1S){}_2Y^0{}_l, \nonumber\\ \psi_1&=&\frac{\sqrt{2}}{4N^2r^2}\left[\frac{(\tilde H_1LN^2 +2r\omega K)}{2r\omega}C+(\tilde H_1N^2+r\omega K)S\right] \frac{dY_{l0}}{d\theta}, \nonumber\\ \psi_2&=&\frac{L}{4\omega r^3}(\tilde H_1N^2+r\omega K)Y_{l0}C, \nonumber\\ \psi_3&=&-\frac{\sqrt{2}}{8r^2}\left[\frac{(\tilde H_1LN^2 +2r\omega K)}{2r\omega}C-(\tilde H_1N^2+r\omega K)S\right] \frac{dY_{l0}}{d\theta}, \nonumber\\ \psi_4&=&-\frac{N^2}{8r^2}(WC-\tilde H_1S){}_2Y^0{}_l, \end{eqnarray} where \beq {}_2Y^0{}_l=2\frac{dY_{l0}}{d\theta}\cot\theta +LY_{l0}. \eeq Note that the first-order Ricci scalar coincides with the zeroth-order one. It is useful to introduce the speciality index $\mathcal{S}$, which is a suitable combination of Weyl scalars defined by \beq \label{specdef} \mathcal{S}=\frac{27J^2}{I^3} =27\frac{(\psi_0\psi_2\psi_4-\psi_2^3)^2}{(\psi_0\psi_4+3\psi_2^2)^3}, \eeq and has the value 1 for algebraically special spacetimes. Note that the imaginary part of $\mathcal{S}$ turns out to be identically vanishing, so that it is a purely real quantity. Its behaviour as a function of the rescaled radial coordinate $x$ for fixed values of $t$ and $\theta$ is shown in Fig. \ref{fig:S_ele}. \begin{figure} \typeout{*** EPS figure S_ele} \begin{center} \includegraphics[scale=0.3]{S_ele_om1_new.eps} \end{center} \caption{The behaviour of the spectral index $\mathcal{S}$ in the case of electric multipoles is shown in terms of the rescaled radial variable $x$ for fixed values of $t=\pi/4$, $\theta=\pi/2$, $l=2$ and $\Omega=1$. The choice of initial conditions is the same as in Fig. \ref{fig:1} (a). The variation of radial coordinate is limited to the range where the perturbative regime holds. } \label{fig:S_ele} \end{figure} \subsection{Magnetic multipoles} The metric perturbation $h_{\mu \nu }$, for magnetic multipoles, is given by \begin{eqnarray} \label{magnpert} ||h_{\mu \nu }||=\left[ \begin {array}{cccc} 0&0&0&h_0 \\\noalign{\medskip}\rm{sym}&0&0&h_1 \\\noalign{\medskip} \rm{sym} &\rm{sym} &0&0\ \\\noalign{\medskip} \rm{sym} & \rm{sym} & \rm{sym} &0 \end {array} \right]{\rm e}^{-{\rm i}\omega t}\sin\theta\frac{dY_{l0}}{d \theta}. \end{eqnarray} For $l\geq2$, the system of radial equations we have to solve is \begin{eqnarray} \label{eqsmagn} 0&=&h_0{}'-\frac{2h_0}{r}+{\rm i}h_1\left[\omega-\frac{N^2}{r^2} \frac{(L-2)}{\omega}\right] , \nonumber\\ 0&=&h_1{}'-\frac{2rH^2}{N^2}h_1-\frac{{\rm i}\omega}{N^4}h_{0} , \end{eqnarray} where again $L \equiv l(l+1)$. By introducing the dimensionless variables $x \equiv Hr$, $\Omega \equiv \omega/H$ as above and setting $h_{0} \equiv i\tilde h_0$, the system (\ref{eqsmagn}) becomes \begin{eqnarray} \label{eqsmagn2a} \tilde h_0{}'&=&\frac{2}{x}\tilde h_0-\frac{[(\Omega^2+L-2)x^2 +2-L]}{\Omega x^2}h_{1} , \\ \label{eqsmagn2b} h_1{}'&=&\frac{\Omega}{(1-x^2)^2}\tilde h_0+\frac{2x}{1-x^2}h_{1} , \end{eqnarray} which can be solved in terms of Heun's functions (see appendix C). Figure \ref{fig:2} shows the behaviour of the metric perturbation functions $\tilde h_0$ and $h_1$ in terms of the rescaled radial variable $x$ for $l=2$ and different values of $\Omega$. The same considerations holding for electric multipoles apply also in this case. \begin{figure} \typeout{*** EPS figure 2} \begin{center} $\begin{array}{cc} \includegraphics[scale=0.3]{metric_magn_leq2_om1.eps}&\quad \includegraphics[scale=0.3]{metric_magn_leq2_om40.eps}\\[.4cm] \quad\mbox{(a)}\quad &\quad \mbox{(b)} \end{array}$\\ \end{center} \caption{ The behaviour of the metric perturbation functions $\tilde h_0$ and $h_1$ in the case of magnetic multipoles is shown in terms of the rescaled radial variable $x$ for $l=2$ and different values of $\Omega$. The initial conditions are chosen so that $\tilde h_0(x_0)=10^{-4} =h_1(x_0)$, with $x_0=10^{-2}$. Figures (a) and (b) correspond to $\Omega=1$ and $\Omega=40$, respectively. } \label{fig:2} \end{figure} A real solution for the metric can be obtained by considering $\tilde h_0$ and $h_1$ as real. In this case the non-vanishing metric components are \begin{eqnarray} \fl\quad g_{tt}&=& N^2 \,,\quad g_{t\phi}=\tilde h_0\sin\omega t \sin\theta\frac{dY_{l0}}{d \theta } ,\quad g_{r\phi}=h_1 \cos\omega t \sin\theta\frac{dY_{l0}}{d \theta } , \nonumber \\ \fl\quad g_{rr}&=& -N^{-2} ,\quad g_{\theta\theta}=-r^2 ,\quad g_{\phi\phi}=-r^2\sin^2\theta , \end{eqnarray} so that \begin{eqnarray} \fl\quad ds^2&=&ds_{\rm (dS)}^2 +2\sin\theta\frac{dY_{l0}}{d \theta } \left(\tilde h_0\sin\omega t d\phi +2h_1 \cos\omega t dr\right) dt , \end{eqnarray} to first order in the perturbation quantities. A natural orthonormal frame associated with this form of the metric is then \begin{eqnarray} \Omega^{\hat 0}&=& Ndt +N^{-1}\sin\theta\frac{dY_{l0}} {d \theta }\tilde h_0\sin\omega t d\phi, \nonumber \\ \Omega^{\hat r}&=& -N^{-1}dr+N\sin\theta\frac{dY_{l0}} {d \theta }h_1 \cos\omega t d\phi, \nonumber \\ \Omega^{\hat \theta}&=&-r d\theta ,\quad \Omega^{\hat \phi}=-r\sin \theta d\phi . \end{eqnarray} One can then introduce a Newman--Penrose frame in a standard way, as in Eq. (\ref{NPframe}). We find that the non-vanishing first-order spin coefficients, Weyl scalars and Ricci terms are as follows: \begin{eqnarray} \fl\quad \rho&=&-\frac{1}{r}-{\rm i}\frac{L}{2N^2r^2}[N^2h_1C+\tilde h_0S]Y_{l0}, \nonumber\\ \fl\quad \mu&=&-\frac{N^2}{2r}+{\rm i}\frac{L}{4r^2}[N^2h_1C-\tilde h_0S]Y_{l0}, \nonumber\\ \fl\quad \alpha&=&-\frac{\sqrt{2}}{4r}\cot\theta-{\rm i}\frac{\sqrt{2}} {4r^2}\left[(1-2N^2)h_1C+\frac{2\omega r\tilde h_0+N^4(L-2)h_1} {2\omega rN^2}S\right]\frac{dY_{l0}}{d\theta}, \nonumber\\ \fl\quad \beta&=&-\alpha+{\rm i}\frac{\sqrt{2}N^2}{2r^2}h_1\frac{dY_{l0}} {d\theta}C, \nonumber\\ \fl\quad \gamma&=&-\frac{H^2r}{2}+{\rm i}\frac{L}{8r^2}[N^2h_1C-\tilde h_0S] Y_{l0}, \nonumber\\ \fl\quad \nu&=& {\rm i}\frac{\sqrt{2}}{4r}\left\{ [N^2H^2rh_1+\omega\tilde h_0]C\right. \nonumber\\ \fl\quad &&\left.-\frac1{2\omega r^2}[2\omega r\tilde h_0 +N^2(N^2(L-2)-2\omega^2 r^2)h_1]S \right\}\frac{dY_{l0}}{d\theta}, \nonumber\\ \fl\quad \epsilon&=&-{\rm i}\frac{L}{4N^2r^2}[N^2h_1C+\tilde h_0S]Y_{l0}, \nonumber\\ \fl\quad \kappa&=&{\rm i}\frac{\sqrt{2}}{N^4r}\left\{ [N^2H^2rh_1+\omega\tilde h_0]C\right. \nonumber\\ \fl\quad &&\left.+\frac1{2\omega r^2}[2\omega r\tilde h_0 +N^2(N^2(L-2)-2\omega^2 r^2)h_1]S \right\}\frac{dY_{l0}}{d\theta}, \end{eqnarray} and \begin{eqnarray} \label{psimagn} \psi_0&=& {\rm i}\frac{1}{r^2N^4}\left\{ [N^2H^2rh_1+\omega\tilde h_0]C\right. \nonumber\\ &&\left.+\frac1{2\omega r^2}[2\omega r\tilde h_0 +N^2(N^2(L-2)-2\omega^2 r^2)h_1]S \right\} {}_2Y^0{}_l, \nonumber\\ \psi_1&=& {\rm i}\frac{\sqrt{2}(L-2)}{4r^3}\left[h_1C -\frac1{\omega rN^2}[N^4h_1-\omega r\tilde h_0]S\right] \frac{dY_{l0}}{d\theta}, \nonumber\\ \psi_2&=&-{\rm i} \frac{N^2}{4\omega r^4}L(L-2)h_1Y_{l0}S, \nonumber\\ \psi_3&=& {\rm i} \frac{\sqrt{2}N^2(L-2)}{8r^3}\left[h_1C +\frac1{\omega rN^2}[N^4h_1-\omega r\tilde h_0]S\right] \frac{dY_{l0}}{d\theta}, \nonumber\\ \psi_4&=&-{\rm i} \frac1{4r^2}\left\{ [N^2H^2rh_1+\omega\tilde h_0]C\right. \nonumber\\ &&\left.-\frac1{2\omega r^2}[2\omega r\tilde h_0 +N^2(N^2(L-2)-2\omega^2 r^2)h_1]S \right\} {}_2Y^0{}_l. \end{eqnarray} The behaviour of the speciality index (\ref{specdef}) as a function of the rescaled radial coordinate $x$ for fixed values of $t$ and $\theta$ is shown in Fig. \ref{fig:S_magn}. Note that $\mathcal{S}$ is purely real also in this case. \begin{figure} \typeout{*** EPS figure S_magn} \begin{center} \includegraphics[scale=0.3]{S_magn_om1_new.eps} \end{center} \caption{The behaviour of the spectral index $\mathcal{S}$ in the case of magnetic multipoles is shown in terms of the rescaled radial variable $x$ for fixed values of $t=\pi/4$, $\theta=\pi/2$, $l=2$ and $\Omega=1$. The choice of initial conditions is the same as in Fig. \ref{fig:2} (a). The variation of radial coordinate is limited to the range where the perturbative regime holds. } \label{fig:S_magn} \end{figure} \section{Perturbations of radial geodesics} We are now in a position to consider the perturbations \beq \tilde U=U_{\rm geo}+u \eeq to the radial geodesic (\ref{rad_geo}). We are interested in finding the solution for $u$ such that the path is geodesic in the perturbed gravitational field, i.e. $\nabla_{\tilde U}\tilde U=0$, to first order in the perturbation. \subsection{Electric multipoles} The perturbed 4-velocity is given by \beq u={\rm e}^{-{\rm i}\omega t} \left[-\frac{\Gamma_1}{N^2}Y_{l0}\partial_t +\zeta_1N^2Y_{l0}\partial_r+\frac{\xi_1}{r^2}\frac{d Y_{l0}} {d\theta}\partial_\theta\right] , \eeq where $\Gamma_1$, $\zeta_1$ and $\xi_1$ are functions of $r$. Real solutions for $u$ require \begin{eqnarray} \label{elefunctu} {\rm e}^{-{\rm i}\omega t}\xi_{1} &=&A_1\cos\omega t+A_2\sin\omega t, \nonumber\\ {\rm e}^{-{\rm i}\omega t}\zeta_1 &=&\frac1{E\zeta_0}\left[\left(B_1 +\frac{N^2}{2}W\right)\cos\omega t+B_2\sin\omega t\right], \nonumber\\ {\rm e}^{-{\rm i}\omega t}\Gamma_1 &=&-\frac1{E}\left[\left(B_1 +E^2W\right)\cos\omega t+\left(B_2+E\Gamma_0\zeta_0\tilde H_1\right) \sin\omega t\right] \end{eqnarray} where the functions $A_1,A_2$ and $B_1,B_2$ satisfy the systems of equations \begin{eqnarray} \frac{dA_1}{dr}&=&-\frac{\omega}{\zeta_0}\left(A_2 -\frac{2E^{2}-N^{2}}{2E\omega}W\right), \nonumber\\ \frac{dA_2}{dr}&=&\frac{\omega}{\zeta_0}\left(A_1 +\frac{\Gamma_0\zeta_0}{\omega}\tilde H_1\right), \end{eqnarray} and \begin{eqnarray} \frac{dB_1}{dr}&=&-\frac{\omega}{\zeta_0}\left(B_2 +E\Gamma_0\zeta_0\tilde H_1\right), \nonumber\\ \frac{dB_2}{dr}&=&\frac{\omega}{\zeta_0}\left(B_1 +\frac{2E^2-N^2}{2}W\right), \end{eqnarray} respectively, which can be integrated numerically. The behavior of the perturbed velocity functions (\ref{elefunctu}) is shown in Fig. \ref{fig:u_ele} in terms of the rescaled radial variable $x$ for different values of $t$ and fixed values of $l$, $\Omega$ and $E$. \begin{figure} \typeout{*** EPS figure u_ele} \begin{center} $\begin{array}{cc} \includegraphics[scale=0.3]{xi1_ele.eps}&\quad \includegraphics[scale=0.3]{zeta1_ele.eps}\\[.4cm] \quad\mbox{(a)}\quad &\quad \mbox{(b)}\\[.6cm] \end{array}$\\ \includegraphics[scale=0.3]{Gamma1_ele.eps}\\[.4cm] \mbox{(c)}\\[.6cm] \end{center} \caption{The behavior of the perturbed velocity functions ${\rm e}^{-{\rm i}\omega t}\xi_1$, ${\rm e}^{-{\rm i}\omega t}\zeta_1$ and ${\rm e}^{-{\rm i}\omega t}\Gamma_1$ in the case of electric multipoles is shown in terms of the rescaled radial variable $x$ for different values of $t$ and the same choice of parameters as well as initial conditions for the perturbed metric functions as in Fig. \ref{fig:1} (a). The functions $A_1,A_2$ and $B_1,B_2$ are taken instead identically vanishing at the initial point. The unperturbed geodesic radial motion is directed outwards with energy parameter $E=1.1$. Note that in the high frequency limit the perturbed velocity functions exhibit instead an oscillating behavior similar to that of the perturbed metric functions, the amplitude of ${\rm e}^{-{\rm i}\omega t}\xi_1$ at fixed distance being about $10^2$ smaller than that associated with $\zeta_1$ and $\Gamma_1$. } \label{fig:u_ele} \end{figure} \subsection{Magnetic multipoles} The perturbed 4-velocity is given by \beq u={\rm e}^{-{\rm i}\omega t}\frac{\xi_1}{r^2\sin\theta} \frac{d Y_{l0}} {d \theta}\partial_\phi, \eeq where $\xi_1$ is a function of $r$. Real solutions for $u$ require \beq \label{magnfunctu} {\rm e}^{-{\rm i}\omega t}\xi_1=A_1\cos\omega t+A_2\sin\omega t, \eeq where the functions $A_1,A_2$ satisfy the system of equations \begin{eqnarray} \frac{dA_1}{dr}&=&-\frac{\omega}{\zeta_0}\left[A_2 +\frac{2E^{2}-N^{2}}{EN^2}\left(\tilde h_0+\frac{rH^2N^2}{\omega} h_1\right)\right],\nonumber\\ \frac{dA_2}{dr}&=&\frac{\omega}{\zeta_0}\left\{A_1 -\frac{2\Gamma_0\zeta_0}{\omega rN^2}\left[\tilde h_0 -\omega rN^2\left(1-\frac{N^2(L-2)}{2\omega^2r^2}\right) h_1\right]\right\}, \end{eqnarray} which can be integrated numerically. The behavior of the perturbed velocity function (\ref{magnfunctu}) is shown in Fig. \ref{fig:u_magn} in terms of the rescaled radial variable $x$ for different values of $t$ and fixed values of $l$, $\Omega$ and $E$. \begin{figure} \typeout{*** EPS figure u_magn} \begin{center} \includegraphics[scale=0.3]{xi1_magn.eps} \end{center} \caption{The behavior of the perturbed velocity function ${\rm e}^{-{\rm i}\omega t}\xi_1$ in the case of magnetic multipoles is shown in terms of the rescaled radial variable $x$ for different values of $t$ and the same choice of parameters as well as initial conditions for the perturbed metric functions as in Fig. \ref{fig:2} (a). The functions $A_1,A_2$ are taken instead identically vanishing at the initial point. The unperturbed geodesic radial motion is directed outwards with energy parameter $E=1.1$. Note that in the high frequency limit the perturbed velocity function exhibits instead an oscillating behavior similar to that of the perturbed metric functions. } \label{fig:u_magn} \end{figure} \section{Teukolsky equation} In this section we study gauge- and tetrad-invariant first-order massless perturbations of any spin ($s= \pm2$ for gravitational waves, $s= \pm1$ for electromagnetic waves, and $s= \pm1/2$ for neutrinos) in the de Sitter background following the approach of Teukolsky \cite{Teuk}. Although this problem have been already addressed in the literature (see, e.g., Ref. \cite{galtsov}, where the perturbation equations for fields of different spin have been solved by using the technique of Debye potentials), we are are interested here in investigating the existence of closed-form, i.e. Liouvillian, solutions to the perturbation equations. The Teukolsky master equation, in this case, reads as \begin{eqnarray} \label{teukgen} \fl\qquad 0&=&\biggr \{ \frac{1}{2N^2}\partial_{tt}-\frac{N^2}{2}\partial_{rr} -\frac{1}{2r^2}\partial_{\theta\theta}-\frac{1}{2r^2\sin^2\theta} \partial_{\phi\phi} \nonumber\\ \fl\qquad &&+\frac{s}{rN^2}\partial_t+\frac{(s+1)(1-2N^2)}{r}\partial_r -\frac{\cot\theta}{2r^2}\partial_\theta \nonumber\\ \fl\qquad &&-\frac{is\cos\theta}{r^2\sin^2\theta}\partial_{\phi} +\frac{1}{2r^2}\left[(1+s)[3s+2-2N^2(2s+1)] +\frac{s^2}{\sin^2\theta}\right]\biggr \} \psi. \end{eqnarray} Note that this equation is solved by $\psi=\psi_0$ with $s=2$ and by $\psi=\psi_4/\rho^4$ with $s=-2$, where $\psi_0$ and $\psi_4$ are the perturbed Weyl scalars given by Eqs. (\ref{psiele}) and (\ref{psimagn}) for electric and magnetic multipoles, respectively. Therefore, the latter equations provide a link between the perturbed metric functions and the solutions to the Teukolsky equation. Let us now study the Teukolsky equation in completely general form, relaxing the assumption of azimuthal symmetry. The master equation (\ref{teukgen}) admits separable solutions of the form \beq \psi(t,r,\theta,\phi) ={\rm e}^{-{\rm i}\omega t}{\rm e}^{{\rm i} m \phi} R(r)S(\theta) , \eeq where $\omega>0$ is the wave frequency and $m$ is the azimuthal separation constant. The angular function satisfies the equation of the spin-weighted spherical harmonics, i.e. \beq \frac{1}{\sin\theta}\frac{\rmd }{\rmd \theta} \left(\sin\theta \frac{\rmd S(\theta)}{\rmd \theta}\right) + V_{\rm (ang)}(\theta)S(\theta)=0 , \eeq where \begin{eqnarray} V_{\rm (ang)}(\theta) & = &L-s^2-\frac{(s\cos\theta+m)^2}{\sin^2\theta} , \end{eqnarray} and the separation constant has been chosen according to Teukolsky. The radial equation can be cast in the form \beq \label{radeq} Q^{-s} \frac{\rmd}{\rmd r}\left(Q^{s+1}\frac{\rmd R(r)}{\rmd r} \right) +V_{\rm (rad)}(r)R(r)=0 , \eeq where $Q = r^{2} N^{2}$ and \begin{eqnarray}\fl \label{radiale1} V_{\rm (rad)}(r)& = & \frac{1}{N^4}\left\{\omega^2+\frac{2{\rm i}\omega s}{r} -\frac{N^2}{r^2}[L+(1+s)(3s+2)]+2\frac{N^4}{r^2}(1+s)(2s+1)\right\}. \end{eqnarray} \subsection{Liouvillian solutions to the radial equation} The general solution to the radial part of the Teukolsky equation can be expressed in terms of Heun functions. We are interested here in investigating the existence of closed-form, i.e. Liouvillian, solutions to the radial equation (\ref{radeq}) governing the perturbations. Roughly speaking, the set of Liouvillian functions includes the usual elementary functions such as exponential, trigonometric, logarithmic functions, etc., but not generic hypergeometric functions or other special functions. We apply the well-known Kovacic algorithm \cite{kovacic} outlined in appendix D. The radial equation (\ref{radeq}) can be converted in normal form, i.e. \beq \label{radeqNF} \frac{\rmd^2y(r)}{\rmd r^2}=W_{\rm (rad)}(r)y(r), \eeq by the scaling \beq R = yQ^{-(1+s)/2} , \eeq where the function $W_{\rm (rad)}$ is given by \beq\fl\qquad \label{Wdef} W_{\rm (rad)}(r) = \frac{c_0}{r^2}+\frac{c_H^-}{(r-r_H)^2} +\frac{c_H^+}{(r+r_H)^2}+\frac{d_0}{r}+\frac{d_H^-}{(r-r_H)} +\frac{d_H^+}{(r+r_H)}, \eeq with parameters \begin{eqnarray} \fl\qquad c_0& = &L, \qquad c_H^{\pm} = \frac{1}{4}[(s\pm {\rm i}\omega r_H)^2-1], \nonumber\\ \fl\qquad d_0& = &-2{\rm i}\omega s, \qquad d_H^{\pm} = \mp \frac{1}{4r_H}[\omega^2r_H^2\mp4{\rm i}\omega r_Hs-s^2-2L+1]. \end{eqnarray} Let us discuss in detail the case of type 1 solutions (see again appendix D). For all possible pole structures of (\ref{Wdef}), all functions $\tilde\Omega$ generated by the Kovacic algorithm have the form \beq \tilde\Omega=\frac{\alpha_0}{r}+\frac{\alpha_{H}^+}{(r+r_H)} +\frac{\alpha_{H}^-}{(r-r_H)}, \eeq where \beq \alpha_{0}=\frac12\left[1+\delta_0\sqrt{1+4c_0}\right] , \qquad \alpha_H^{\pm}=\frac12\left[1+\delta_H^\pm\sqrt{1+4c_H^\pm}\right] , \eeq the quantities $\delta_0$, $\delta_H^+$ and $\delta_H^-$ taking independently values $\pm1$. The necessary conditions for type 1 solutions are fulfilled if the following constraint is imposed: \beq \label{cond1} d_0+d_H^++d_H^-=0 , \eeq implying that the order of the pole at infinity is $2$. The algorithmic condition $d=n$ is given by \beq \label{cond2} \alpha_\infty-\alpha_0-\alpha_{H}^+-\alpha_{H}^-=n , \eeq where \beq \alpha_{\infty}=\frac12\left[1+\delta_\infty\sqrt{1+4(c_0+c_H^+ +c_H^-)}\right]\ , \qquad \delta_\infty=\pm1 . \eeq For every pole structure, we construct the Liouvillian solutions to Eq. (\ref{radeqNF}) by deriving a consistent recursion relation which generates the finite set of coefficients in the polynomial ${\mathcal P}$. To obtain a recursion relation with the fewest number of terms we take, without loss of generality, ${\mathcal P}$ to be expanded about a pole of non-vanishing order, say $r=0$, as follows: \beq {\mathcal P}=\sum_{k=0}^n a_kr^k\ , \qquad a_n\not=0 . \eeq After substituting this expression for ${\mathcal P}$ into Eq. (\ref{eqPdir}) we obtain in the general case, when all three poles are present, the recursion relation \begin{eqnarray} \label{recureq} 0&=&\Bigr[(k-1)(k-2-2n+2\alpha_\infty)-r_H(g_H^+-g_H^-)\Bigr]a_{k-1} \nonumber\\ &&-r_{H}\Bigr[2k(\alpha_H^+-\alpha_H^-)-r_H(g_H^++g_H^-)\Bigr]a_{k} \nonumber\\ &&-(k+1)r_H^2(k+2\alpha_0)a_{k+1} , \qquad k=0,\ldots,n+1, \end{eqnarray} where \begin{eqnarray} g_0& = &-d_0+2\frac{\alpha_0}{r_H} (\alpha_H^+-\alpha_H^-) , \nonumber\\ g_H^\pm& = &-d_H^\pm\mp \frac{\alpha_H^\pm}{r_H}(2\alpha_0+\alpha_H^\mp), \end{eqnarray} with the understanding that $a_i=0$ if $i\leq-1$ or $i\geq n+1$. Liouvillian solutions (\ref{ysol}) to Eq. (\ref{radeqNF}) are thus given by \beq y={\mathcal P}r^{\alpha_0}(r+r_H)^{\alpha_H^+}(r_H-r)^{\alpha_H^-} , \eeq implying that \beq R={\mathcal P}r_{H}^{1+s} r^{\alpha_0-\frac{1+s}2}(r+r_H)^{\alpha_H^+ -\frac{1+s}2}(r_H-r)^{\alpha_H^--\frac{1+s}2} . \eeq \section{Concluding remarks} The present work has been motivated by a previous study on gravitational waves about de Sitter backgrounds \cite{Bini2008}, which is relevant for the stochastic background emerging from inflation, and by the analysis in \cite{Ferrari1988} of gravitational waves and their geodesics. We have solved the gravitational perturbation problem in the static region of the de Sitter spacetime between the origin and the cosmological horizon by using the Regge--Wheeler formalism. The set of perturbation equations has been reduced to a single second order differential equation of the Heun-type for both electric and magnetic multipoles. We have then investigated the geodesic motion in the perturbed gravitational field. In particular, an initially radial geodesic in the unperturbed spacetime cannot remain radial as a result of the perturbation. The deviation from radial motion has been shown to occur in both polar and azimuthal directions. Finally, we have investigated gauge- and tetrad-invariant first-order massless perturbations of any spin following the approach of Teukolsky. The general solution to the radial part of the Teukolsky equation can be expressed in terms of Heun functions. However, we have shown that there also exists in addition a class of closed-form, i.e. Liouvillian, solutions.
\section{Introduction} In our recent research \cite{cccdh,ccmzkh} we employed \textit{projection methods }to solve some huge linear feasibility problems that arise in Intensity-Modulated Proton Therapy (IMPT) treatment planning. These huge Linear Programming (LP) problems present a challenge to every LP solver or solution method and we have made the case in our research for tackling them with some elaborate projection methods. Since the papers \cite{cccdh,ccmzkh} are available on the Web we are not going into any further details about the research itself here. We only wish to mention that, in the language of \cite{cccdh}: {}``The main advantage of projection methods, which makes them successful in many real-world applications, is computational. They have the ability to handle some huge-size problems of dimensions beyond which more sophisticated methods cease to be efficient or even applicable due to memory requirements. This is so because the building blocks of a projection algorithm are the projections onto the given individual sets, which are assumed to be easy to perform, and the algorithmic structure is either sequential or simultaneous, or in-between, as in the block-iterative projection methods or in the more recent string-averaging projection methods.\textquotedblright{} The purpose of this Technical Report, which we do not intend to publish otherwise, is to announce the availability of our data sets for these problems along with detailed instructions where to get them and how to read them. We were asked to post these data sets publicly and we are pleased to do so. The data sets are accessible from: \\ http://dig.cs.gc.cuny.edu/\textasciitilde{}wei/web/?page\_id=221. Please contact <EMAIL> for any related questions. \section{A Set of 8 Huge LP Problems for IMPT} The following is the information for each LP problem associated with \textit{Task0, Task1, \ldots{}, Task7}. For details about these tasks consult the papers where the research is reported \cite{cccdh,ccmzkh}. The data are binary, double precision, in the order of $a,c,d,e,f,A$ as in\begin{equation} \min\left\langle a,x\right\rangle \text{ subject to }c\leq Ax\leq d\text{ and }e\leq x\leq f.\end{equation} The components of the vectors $c,d,e,f$ can be infinite numbers (DBL\_MAX in double precision in C language). The sparse matrix $A$ is in column ordered sparse matrix form as described in the MOSEK documentation, which is standard in storage of huge sparse matrix. For example, it can be used in CPLEX and other LP solvers as well. The four arrays of the matrix $A$ are in the order of: $ptrb,ptre,asub,aval$. For a sample C code of how to read the data see the Appendix below. \begin{tabular}{|c|c|c|c|c|c|} \hline & \#Rows & \#Columns & \#NonZeros & Objective & Data\tabularnewline \hline \hline Task0 & 302,491 & 13,734 & 62,256,376 & MIN & \textasciitilde{}750M\tabularnewline \hline Task1 & 314,546 & 13,734 & 74,554,123 & MAX & \textasciitilde{}900M\tabularnewline \hline Task2 & 302,491 & 13,734 & 62,256,376 & MIN & \textasciitilde{}750M\tabularnewline \hline Task3 & 302,491 & 13,734 & 62,256,376 & MIN & \textasciitilde{}750M\tabularnewline \hline Task4 & 302,491 & 13,734 & 62,256,376 & MIN & \textasciitilde{}750M\tabularnewline \hline Task5 & 302,491 & 13,734 & 62,256,376 & MIN & \textasciitilde{}750M\tabularnewline \hline Task6 & 302,491 & 13,734 & 62,256,376 & MIN & \textasciitilde{}750M\tabularnewline \hline Task7 & 604,982 & 13,734 & 124,754,745 & MIN & \textasciitilde{}1.5G\tabularnewline \hline \end{tabular} \section{Appendix} The sample code to read the data in C language: \begin{lstlisting}[basicstyle={\footnotesize\ttfamily},breaklines=true,language=C,showstringspaces=false] char DataFileName[50] = "./0.dat"; FILE* file = fopen(DataFileName, "rb"); if(file == NULL){ cout<<endl<<"**** fail to open file "<<DataFileName<<" ****"<<endl; return 0; }else{ cout<<endl<<"Reading a, c, d, e, f and ptrb, ptre, asub, aval of A from the binary file "<<DataFileName<<"...";} fread(a, sizeof(double), numCol, file); fread(c, sizeof(double), numRow, file); fread(d, sizeof(double), numRow, file); fread(e, sizeof(double), numCol, file); fread(f, sizeof(double), numCol, file); fread(ptrb, sizeof(int), numRow, file); fread(ptre, sizeof(int), numRow, file); fread(asub, sizeof(int), numNonZeros, file); fread(aval, sizeof(double), numNonZeros, file); fclose(file); \end{lstlisting}
\section{Introduction} \label{sec:intro} In this paper we study bilocal sums of spin spherical harmonics \cite{bie85a,var88} (see sect.\ \ref{sec:ssh} below for more details). Such expressions occur in the computation of physical observables in systems undergoing dynamical transitions induced by rotationally invariant spin-dependent interactions. Expanding the states involved in such transitions in a basis of total angular-momentum eigenfunctions leads to the sums considered here. In quantum systems, partial-wave expansions of transition amplitudes, or other matrix elements, are given by addition theorems for spin spherical harmonics. Another example is provided by multipolar expansions of the classical electromagnetic radiation field \cite{jackxx} in quadratic observables like energy, energy flow, or radiated power, which lead in some cases to bilocal sums of vector spherical harmonics. Our main motivation for the present paper is the application of its results to the partial-wave analysis of scattering processes. In that context, partial waves satisfying two-body unitarity play an essential role in the theoretical approach (see \cite{bou09} for a realistic application to hadronic reactions and an extensive reference list). Two-body intermediate states with different spins must be included in the analysis in order to satisfy unitarity, both as genuine asymptotic states or, in the case of resonances, as an approximation to higher $n$-body intermediate states. The addition theorems we consider in this paper are then needed for a systematic approach to partial-wave expansions of $S$-matrix elements between states involving particles with different spins. For that reason, we expect the results given below to be of interest also in other fields where quantum scattering is relevant. More generally, however, given the ubiquitous applications of spherical harmonics in all areas of physics as solutions to the Laplace equation, we hope the addition theorems discussed here to be of interest by themselves, independently of our specific motivations. Our discussion of bilocal sums of spin spherical harmonics in the following sections is entirely based on results from the first part of this paper \cite{bou10}, hereafter referred to as I. We refer to equations and sections of the first part by prefixing their numbers with I. The matrix elements obtained in sect.\ I.\ref{I.sec:proj} are restated below as bilocal sums of ordinary spherical harmonics. In particular, they provide an explicit general expression for bilocal spherical harmonics \cite{var88}. The results of sect.\ I.\ref{I.sec:proj} also lead to a completely general addition theorem for, and to some classes of bilocal sums of, one scalar and one rank-$n$ tensor spherical harmonic for any $n>0$. Using the results of sects.\ I.\ref{I.sec:fac} and I.\ref{I.sec:proj}, we obtain below a general addition theorem for two spin spherical harmonics with spins $s',s>0$, and discuss it in completely explicit form in the cases $s',s \leq 3/2$, $|s'-s|=0,1$. Our approach can easily be applied to higher-spin spherical harmonics, although for $s>2$ the size of the resulting algebraic expressions grows rapidly with $s$. The paper is organized as follows. In the next section we briefly review the definition and main properties of spin-$s$ spherical harmonics, for any integer or half-integer $s$. In section \ref{sec:2scalar} we study bilocal sums of ordinary spherical harmonics, including bilocal spherical harmonics. In section \ref{sec:scalspin} we discuss bilocal sums involving one scalar and one tensor spherical harmonic. Addition theorems involving two spin spherical harmonics are considered in sect.\ \ref{sec:spin}. Finally, in section \ref{sec:finrem} we offer some final remarks. Throughout the paper we follow the notation and conventions of appendices I.\ref{I.sec:notatio} and I.\ref{I.sec:standard}. \section{Spin spherical harmonics} \label{sec:ssh} Spin-$s$ spherical harmonics $Y^{\ell s}_{jj_z}(\verr{}) = \langle\verr{}, \psi_s | \ell,s,j,j_z\rangle$ \cite{bie85a,var88} are eigenfunctions of $\vec{L}^{\,2}$, $\vec{S}^{\,2}$, $\vec{J}^{\,2}$, $J_z$, appropriate for the description of a spin-$s$ particle subject to spin-dependent central interactions. Expansion of the state $| \ell,s,j,j_z\rangle$ in the product basis $| \ell,\ell_z; s,s_z\rangle$ yields \begin{equation} \label{eq:def} Y^{\ell s}_{jj_z}(\verr{}) = \sum_{\ell_z=-\ell}^\ell \sum_{s_z=-s}^s \CG{\ell}{\ell_z}{s}{s_z}{j}{j_z} \langle\verr{} | \ell,\ell_z\rangle \langle \psi_s | s, s_z\rangle~, \end{equation} where $|\verr{}\rangle$ denotes a position eigenstate on the unit sphere, and $|\psi_s\rangle$ a basis spin state. For integer spin $n>0$ the spin wave functions are given by the standard rank-$n$ irreducible tensors defined in sect.\ I.\ref{I.sec:tensor}, $\langle \psi_s | s, s_z\rangle =\veps{i_1\ldots i_s}(s_z)$, $-s\leq s_z \leq s$, so that \begin{equation} \label{eq:ndef} \left(Y_{jj_z}^{\ell n}(\verr{})\right)^{i_1\ldots i_n} = \sum_{s_z=-n}^{n}\sum_{\ell_z=-\ell}^\ell \CG{\ell}{\ell_z}{n}{s_z}{j}{j_z} Y_{\ell\ell_z}(\verr{}) \veps{i_1\ldots i_n}(s_z)~. \end{equation} For $n=1$ this equality reduces to the definition of vector spherical harmonics familiar from textbooks \cite{gal90,jackxx}. For $n>1$, spin-$n$ spherical harmonics are totally symmetric and traceless, as shown in appendix I.\ref{I.sec:tensor}. From that appendix we also obtain, \begin{equation} \label{eq:nrel} \begin{gathered} {\left(Y^{\ell n}_{j j_z}(\verr{})\right)^{i_1\ldots i_n}}^* = (-1)^{j_z} (-1)^{\ell+n-j} \left(Y^{\ell n}_{j (-j_z)}(\verr{})\right)^{i_1\ldots i_n}~, \\ \int d^2p\, {\left(Y_{jj_z}^{\ell n}(\verp{})\right)^{i_1\ldots i_n}}^* \left(Y_{j'j'_z}^{\ell' n}(\verp{})\right)^{i_1\ldots i_n} = \delta_{\ell'\ell} \delta_{j'_z j_z} \delta_{j'j}~, \\ \sum_{j,\ell=0}^\infty \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell n}(\verr{})\right)^{i_1\ldots i_n} {\left(Y_{jj_z}^{\ell n}(\verrp{})\right)^{j_1\ldots j_n}}^* = \delta\left(\verr{}-\verrp{}\right) X^{i_1\ldots i_n;j_1\ldots j_n}, \end{gathered} \end{equation} where in the last equality $X^{i_1\ldots i_n;j_1\ldots j_n}$ is the orthogonal projector onto the subspace of irreducible tensors of $\mathbb{C}^{3\times \ldots \times 3}$ defined in (I.\ref{I.eq:tensorcomplete}). For half-integer spin, $s=n+1/2$, $n\geq 0$, the spin wave functions are given by the standard spinors defined in sect.\ I.\ref{I.sec:spinor}, $\langle \psi_{n+1/2} | n+1/2, s_z\rangle =\vchiU{A}{i_1\ldots i_n}(s_z)$, which leads to spin-$(n+1/2)$ spherical harmonics defined as \begin{equation} \label{eq:3halfdef} \left(Y_{jj_z}^{\ell (n+\frac{1}{2})}(\verr{})\right)_A^{ i_1\ldots i_n} = \sum_{s_z=-n-1/2}^{n+1/2}\sum_{\ell_z=-\ell}^\ell \CG{\ell}{\ell_z}{n+1/2}{s_z}{j}{j_z} Y_{\ell\ell_z}(\verr{}) \vchiU{A}{i_1\ldots i_n}(s_z)~. \end{equation} For $n=0$ we have the definition of spin-1/2 spherical harmonics, possessing two independent complex components. For $n>0$, from appendix (I.\ref{I.sec:spinor}) we have that spin-$(n+1/2)$ spherical harmonics are totally simmetric and traceless in their tensor indices and satisfy, \begin{equation} \label{eq:nhalfpolar} \sigma^{i_k}_{AB} \left(Y^{\ell(n+1/2)}_{j j_z}(\verr{}) \right)_{B}^{i_1\ldots i_k\ldots i_n}=0~, \qquad 1\leq k\leq n~. \end{equation} From the properties of spinors in appendix (I.\ref{I.sec:spinor}) we also obtain, \begin{equation} \label{eq:3halfrel} \begin{gathered} i\sigma^2_{AB} \left( Y^{\ell(n+1/2)}_{j j_z}(\verr{}) \right)^{i_1\ldots i_n}_{B} = (-1)^{\ell+n+1/2-j} (-1)^{1/2+jz} {\left( Y^{\ell(n+1/2)}_{j (-j_z)}(\verr{}) \right)^{i_1\ldots i_n}_{B}}^*~, \\ \int d^2p\, {\left(Y_{jj_z}^{\ell (n+\frac{1}{2})}(\verp{})\right)^{i_1\ldots i_n}_A}^* \left(Y_{j'j'_z}^{\ell' (n+\frac{1}{2})}(\verp{})\right)^{ i_1\ldots i_n}_A = \delta_{\ell'\ell} \delta_{j'_z j_z} \delta_{j'j}~, \\ \sum_{j,\ell=0}^\infty \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell (n+\frac{1}{2})}(\verr{})\right)^{i_1\ldots i_n}_A {\left(Y_{jj_z}^{\ell (n+\frac{1}{2})}(\verrp{})\right)^{j_1\ldots j_n}_B}^* = \delta\left(\verr{}-\verrp{}\right) X^{i_1\ldots i_n; j_1\ldots j_n}_{AB}~, \end{gathered} \end{equation} where $X^{i_1\ldots i_n;j_1\ldots j_n}_{AB}$ is the orthogonal projector onto the spin-$(n+1/2)$ subspace of $\mathbb{C}^{3\times \ldots\times3\times 2}$ defined in (I.\ref{I.eq:nspincompl}). \section{Bilocal sums of two scalar spherical harmonics} \label{sec:2scalar} The matrix elements of the angular-momentum projector operators with tensor products of $\vec{L}$ and $\verr{}$ obtained in section I.\ref{I.sec:proj} constitute addition theorems, or weighted sums, for two scalar spherical harmonics. In this section we summarize the main results. From the definition (I.\ref{I.eq:proj}) of $\P_\ell$ we have, \begin{equation} \label{eq:mix1} \begin{split} \sum_{\ell'_z=-\ell_n}^{\ell_n}\sum_{\ell_z=-\ell}^\ell Y_{\ell_n \ell'_z}(\verpp{}) Y_{\ell \ell_z}(\verp{})^* \langle\ell_n,\ell'_z | \verr{\{i_1}\ldots \verr{i_n} L^{j_1}\ldots L^{j_t\}_0} &| \ell, \ell_z\rangle = \\ &=\langle\verpp{} | \P_{\ell_n} \verr{\{i_1}\ldots \verr{i_n} L^{j_1}\ldots L^{j_t\}_0} \P_\ell |\verp{}\rangle~. \end{split} \end{equation} The matrix element on the r.h.s.\ of (\ref{eq:mix1}) is given explicitly for any $\ell\ge0$ by (I.\ref{I.eq:mix4}) and (I.\ref{I.eq:mix5}) for $n>0$, $t>0$, by (I.\ref{I.eq:genL}) and (I.\ref{I.eq:Ls}) for $n=0$, $t>0$, and by (I.\ref{I.eq:rmat3}) and (I.\ref{I.eq:rmat4}) for $n>0$, $t=0$. Notice that, in the last case, the matrix element in (\ref{eq:mix1}) involves an additional symmetrization with respect to (I.\ref{I.eq:rmat3}). The equalities (I.\ref{I.eq:mix4}), (I.\ref{I.eq:genL}) and (I.\ref{I.eq:rmat3}) written in the form (\ref{eq:mix1}) will be needed below in the derivation of addition theorems for spin spherical harmonics. By multiplying (\ref{eq:mix1}) by a standard tensor of rank $n+s$, as defined in appendix (I.\ref{I.sec:standard}), and applying the Wigner-Eckart theorem \cite{edm96,wig59,jud75,bie85a,bie85b,var88,gal90} to the matrix element on the l.h.s., we obtain the equivalent form \begin{equation} \label{eq:mix2} \begin{split} \sum_{\ell_z=-\ell}^\ell Y_{\ell_n(\ell_z+m)}(\verpp{}) Y_{\ell \ell_z}(\verp{})^* &\CG{\ell}{\ell_z}{n+t}{m}{\ell_n}{\ell_z+m} = \\ &=\frac{1}{(n+t)!}\veps{h_1\ldots h_nk_1\ldots k_t}(m) \frac{\langle\verpp{} | \P_{\ell_n} \verr{\{h_1}\ldots \verr{h_n} L^{k_1}\ldots L^{k_t\}_0} \P_\ell |\verp{}\rangle} {\langle\ell_n || \veps{a_1\ldots a_nb_1\ldots b_t} \verr{a_1}\ldots \verr{a_n} L^{b_1}\ldots L^{b_t} || \ell\rangle}~, \end{split} \end{equation} where the reduced matrix element in the denominator on the r.h.s.\ is given by (I.\ref{I.eq:redmat7}) for $n>0$, $t>0$, by (I.\ref{I.eq:redmat3}) for $n=0$, $t>0$, and by (I.\ref{I.eq:redmat6}) for $n>0$, $t=0$. Equation (\ref{eq:mix2}) will be recast below in sect.\ \ref{sec:scalspin} in the form of an addition theorem for one scalar and one tensor spherical harmonic. Equations (\ref{eq:mix1}) and (\ref{eq:mix2}) contain a great deal of information. First, together with the matrix elements given explicitly in I, (\ref{eq:mix2}) provides an explicit representation for bilocal spherical harmonics \cite{var88}, the wave functions associated to coupled orbital angular momentum states $|\ell, \ell', j, j_z\rangle$ \begin{equation*} \label{eq:mix2aux} \begin{split} \langle \verp{}, \verpp{} | \ell,\ell',n,m\rangle &= \sum_{\ell'_z=-\ell'}^{\ell'} \sum_{\ell_z=-\ell}^{\ell} Y_{\ell'\ell'_z}(\verpp{}) Y_{\ell\ell_z}(\verp{}) \langle \ell, \ell_z; \ell',\ell'_z | n,m\rangle\\ &= \frac{(-1)^{n-\ell'}}{n!} \sqrt{\frac{2n+1}{2\ell'+1}} \veps{h_1\ldots h_n}(m) \frac{\langle\verpp{} | \P_{\ell'} \verr{\{h_1}\ldots \verr{h_{|\Delta\ell|}} L^{h_{|\Delta\ell|+1}}\ldots L^{h_n\}_0} \P_\ell |\verp{}\rangle} {\langle\ell' || \veps{a_1\ldots a_n} \verr{a_1}\ldots \verr{a_{|\Delta\ell|}} L^{a_{|\Delta\ell|+1}}\ldots L^{a_n} || \ell\rangle}~. \end{split} \end{equation*} Second, seen as a generic sum of products of two spherical harmonics weighted by a CG coefficient, (\ref{eq:mix2}) is best encoded in terms of tensor spherical harmonics, as done in the following section. Finally, by considering the explicit expression of the CG on its l.h.s.\ as a function of $\ell_z$, we can interpret (\ref{eq:mix2}) as a sum of bilocal products of two spherical harmonics weighted by specific functions. We discuss several such bilocal sums in the remainder of this section. If we set $n=0$, (\ref{eq:mix1}) involves only matrix elements of $\vec{L}$. We will discuss here two classes of bilocal sums obtained from (\ref{eq:mix1}) in that case. First, we consider moments of $\ell_z$. We have \begin{equation} \label{eq:momaux} \begin{aligned} \langle\ell,\ell_z | L^{\{3}\ldots L^{3\}_0}| \ell,\ell_z\rangle &= t!\, \veps{3\ldots3}(0)^* \langle\ell || \veps{j_1\ldots j_t} L^{j_1}\ldots L^{j_t} || \ell\rangle \CG{\ell}{\ell_z}{t}{0}{\ell}{\ell_z}\\ &= \frac{(t!)^2}{2^t (2t-1)!!} \frac{1}{\sqrt{2\ell+1}} \sqrt{\frac{(2\ell+t+1)!}{(2\ell-t)!}} \CG{\ell}{\ell_z}{t}{0}{\ell}{\ell_z}, \end{aligned} \end{equation} where the second equality follows from (I.\ref{I.eq:tensor2}) applied to $\veps{3\ldots3}(m)$. The CG coefficient on the r.h.s.\ of (\ref{eq:momaux}) is a polynomial of degree $t$ in $\ell_z$, so substituting (\ref{eq:momaux}) on the l.h.s.\ of (\ref{eq:mix1}) we obtain the desired moments. For $t\leq 3$ the irreducible tensors appearing in the r.h.s.\ of (\ref{eq:mix1}) (see (I.\ref{I.eq:genLa})) are easily expanded to get, with the notation of (I.\ref{I.eq:genLb}) \begin{subequations} \label{eq:momres} \begin{align} \label{eq:momresa} \sum_{\ell_z=-\ell}^\ell \ell_z Y_{\ell \ell_z}(\verpp{}) Y_{\ell \ell_z}(\verp{})^* &= i \frac{2\ell+1}{4\pi} v^3 P'_\ell(x)~, \\ \label{eq:momresb} \sum_{\ell_z=-\ell}^\ell {\ell_z}^2 Y_{\ell \ell_z}(\verpp{}) Y_{\ell \ell_z}(\verp{})^* &= -\frac{2\ell+1}{4\pi} \left( \left(v^3\right)^2 P''_\ell(x) + \left( \verp{3}\verpp{3} - x\right) P'_\ell(x) \right)~,\\ \label{eq:momresc} \sum_{\ell_z=-\ell}^\ell {\ell_z}^3 Y_{\ell \ell_z}(\verpp{}) Y_{\ell \ell_z}(\verp{})^* &= \begin{aligned}[t] & -i \frac{2\ell+1}{4\pi} v^3 \left( \left(v^3\right)^2 P'''_\ell(x) + 3 \left( \verp{3}\verpp{3} - x\right) P''_\ell(x) - P'_\ell(x)\rule{0pt}{10pt} \right), \end{aligned} \end{align} where the Legendre equation was used to simplify the right-hand sides. For $t>3$ the relations among tensors and their irreducible components become too lengthy, so we do not expand them \begin{align} \label{eq:momresd} & \begin{aligned} \sum_{\ell_z=-\ell}^\ell &{\ell_z}^4 Y_{\ell \ell_z}(\verpp{}) Y_{\ell \ell_z}(\verp{})^* = \frac{2\ell+1}{4\pi} \frac{1}{4!} \left( \rule{0pt}{14pt} v^{\{3} v^3 v^3 v^{3\}_0} P_\ell^{(4)}(x) + 6 \verp{\{3}\verpp{3} v^3 v^{3\}_0} P_\ell^{(3)}(x) \right. \\ &+3 \verp{\{3} \verp{3} \verpp{3} \verpp{3\}_0} P_\ell^{(2)}(x) -\frac{12}{7} (6\ell(\ell+1)-5) \left( v^{\{3} v^{3\}_0} P_\ell^{(2)}(x) + \verp{\{3} \verpp{3\}_0} P_\ell^{(1)}(x) \right)\\ &\left. + \frac{8}{5} \ell (\ell+1) (3\ell(\ell+1)-1) P_\ell(x) \right), \end{aligned}\\ \label{eq:momrese} & \begin{aligned} \sum_{\ell_z=-\ell}^\ell &{\ell_z}^5 Y_{\ell \ell_z}(\verpp{}) Y_{\ell \ell_z}(\verp{})^* = i \frac{2\ell+1}{4\pi} \frac{1}{5!} \left(\rule{0pt}{14pt} v^{\{3} v^3 v^3 v^3 v^{3\}_0} P_\ell^{(5)}(x) + 10\, \verp{\{3}\verpp{3} v^3 v^3 v^{3\}_0} P_\ell^{(4)}(x) \right. \\ &+ 15\, \verp{\{3} \verp{3} \verpp{3} \verpp{3} v^{3\}_0} P_\ell^{(2)}(x) - \frac{100}{9} (2\ell(\ell+1)-3) \left( v^{\{3} v^3 v^{3\}_0} P_\ell^{(3)}(x) + 3\, \verp{\{3} \verpp{3} v^{3\}_0} P_\ell^{(2)}(x) \right)\\ & \left.+\frac{120}{7} (3\ell^2(\ell+1)^2 - 3\ell (\ell+1) +1) v^3 P_\ell^{(1)}(x) \right). \end{aligned} \end{align} \end{subequations} In the last two equalities the tensors on the r.h.s.\ may be numerically evaluated as, e.g., $v^{\{3} v^3 v^3 v^{3\}_0} = 4!\veps{3333}(0)^* \veps{i_1i_2i_3i_4}(0) v^{i_1} v^{i_2} v^{i_3} v^{i_4}$, as we actually have done for numerical verifications of (\ref{eq:momresd}), (\ref{eq:momrese}). A second class of bilocal sums is obtained from (\ref{eq:mix1}) with $n=0$ by multiplying both sides by $\veps{i_1\ldots i_t}(\pm t)$ and using (I.\ref{I.eq:tensor2f}) and the known matrix elements of $L^\pm = L^1\pm i L^2$. Thus, \begin{equation} \label{eq:addthr2}\renewcommand{\minalignsep}{0pt} \begin{aligned} &\sum_{\ell_z=-\ell}^\ell Y_{\ell(\ell_z\pm t)}(\verpp{}) Y_{\ell\ell_z}(\verp{})^* & &\sqrt{\frac{(\ell\mp\ell_z)!}{(\ell\mp\ell_z-t)!}} \sqrt{\frac{(\ell\pm\ell_z+t)!}{(\ell\pm\ell_z)!}} = \\ & \sum_{\ell_z=-\ell}^\ell Y_{\ell(\ell_z\pm t)}(\verpp{}) Y_{\ell\ell_z}(\verp{})^* & &\CG{\ell}{\ell_z}{t}{\pm t}{\ell}{\ell_z\pm t} (\pm1)^t 2^{\frac{t}{2}} \langle \ell || \veps{i_1\ldots i_t}L^{i_1}\ldots L^{i_t} || \ell \rangle =\\ & & &\hspace{22ex} =i^t \frac{2\ell+1}{4\pi} \sum_{q=0}^{[t/2]} C_{t,q} (\verp{\pm})^q (\verpp{\pm})^q (v^\pm)^{t-2q} P_\ell^{(t-q)}(x), \end{aligned} \end{equation} with $C_{t,q}$ as defined in (I.\ref{I.eq:genL}), $y^\pm = y^1\pm iy^2 = \mp\sqrt{2} \veps{}(\pm1)\cdot\vec{y}$ for any $\vec{y}$, and with $Y_{\ell m}\equiv 0$ if $|m|>\ell$. It is understood in (\ref{eq:addthr2}) that we must choose either all upper signs or all lower ones. Next, we consider (\ref{eq:mix1}) with $t=0$, so only matrix elements of $\verr{}$ are involved. In that situation (\ref{eq:mix1}) generalizes to the bilocal case some results known in the local case $\verpp{} = \verp{}$ (see \cite{var88} and refs.\ therein). We give here their explicit form for $n=1$, 2. For $n=1$, $t=0$ we have, \begin{subequations} \label{eq:rmat6} \begin{align} \label{eq:rmat6a} &\sum_{\ell_z=-\ell}^\ell Y_{\ell_1\ell_z}(\verpp{}) Y_{\ell\ell_z}(\verp{})^* \sqrt{\left( \langle\ell\rangle + 1/2\right)^2 - \ell_z^2} = \Delta\ell \frac{1}{4\pi} \sqrt{2\ell+1} \sqrt{2\ell_1+1} \left( \verpp{3} P'_{\ell_1}(x) - \verp{3} P'_{\ell}(x) \right), \\ \label{eq:rmat6b} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell Y_{\ell_1(\ell_z+m)}(\verpp{}) Y_{\ell\ell_z}(\verp{})^* \sqrt{\ell_1+\Delta\ell m \ell_z} \sqrt{\ell_1 + \Delta\ell m \ell_z + 1} =} \hspace{45ex}\\ &=-\frac{m}{4\pi} \sqrt{2\ell+1} \sqrt{2\ell_1+1} \left( \verpp{m} P'_{\ell_1}(x) - \verp{m} P'_{\ell}(x)\right), \end{aligned} \end{align} \end{subequations} where $m=\pm1$. For $n=2$, $t=0$ we can write (\ref{eq:mix1}) as \begin{subequations} \label{eq:rmat7} \begin{align} \label{eq:rmat7a} & \begin{aligned} \sum_{\ell_z=-\ell+1}^{\ell-1} Y&_{(\ell+1)\ell_z}(\verpp{}) Y_{(\ell-1)\ell_z}(\verp{})^* \sqrt{(\ell^2-\ell_z^2)((\ell+1)^2-\ell_z^2)} = \hspace{15ex}\\ & =\frac{1}{4\pi} \sqrt{(2\ell-1)(2\ell+3)} \left( (\verpp{3})^2 P''_{\ell+1}(x) -2 \verp{3} \verpp{3} P''_{\ell}(x) + (\verp{3})^2 P''_{\ell-1}(x) - P'_\ell(x)\right), \end{aligned}\\ \label{eq:rmat7b} & \begin{aligned} \sum_{\ell_z=-\ell+1}^{\ell-1} Y&_{(\ell+1)(\ell_z+m)}(\verpp{}) Y_{(\ell-1)\ell_z}(\verp{})^* \sqrt{(\ell^2-\ell_z^2)}\sqrt{(\ell+m\ell_z+1) (\ell+m\ell_z+2)} = \\ & = -\frac{m}{4\pi} \sqrt{(2\ell-1)(2\ell+3)} \left( \verpp{m}\verpp{3} P''_{\ell+1}(x) - (\verpp{m} \verp{3} + \verpp{3} \verp{m}) P''_{\ell}(x) + \verp{m}\verp{3} P''_{\ell-1}(x) \right), \end{aligned}\\ \label{eq:rmat7c} & \begin{aligned} \sum_{\ell_z=-\ell+1}^{\ell-1} Y&_{(\ell+1)(\ell_z+2m)}(\verpp{}) Y_{(\ell-1)\ell_z}(\verp{})^* \sqrt{\frac{(\ell+m\ell_z+3)!}{(\ell+m\ell_z-1)!}} = \\ & = \frac{1}{4\pi} \sqrt{(2\ell-1)(2\ell+3)} \left( (\verpp{m})^2 P''_{\ell+1}(x) - 2 \verpp{m}\verp{m} P''_{\ell}(x) + (\verp{m})^2 P''_{\ell-1}(x) \right), \end{aligned} \end{align} \end{subequations} where on the second and third equalities $m=\pm1$, and $\verp{m} = \verp{1} + i m \verp{2}$. For $n>2$, similar but more involved results are obtained from (\ref{eq:mix1}). We will not discuss them further here for reasons of space. Finally, we discuss some explicit forms of (\ref{eq:mix1}) for low values of $n,t>0$, which extend (\ref{eq:rmat6}) and (\ref{eq:rmat7}) by insertion of powers of $\ell_z$ in the l.h.s. For $n=1=t$ with $m=0$, $\pm1$ we find \begin{subequations} \label{eq:mix3} \begin{align} \label{eq:mix3a} &\sum_{\ell_z=-\ell}^\ell Y_{\ell_1\ell_z}(\verpp{}) Y_{\ell\ell_z}(\verp{})^* \ell_z \sqrt{(\langle\ell\rangle + 1/2)^2-\ell_z^2} = i \frac{\Delta\ell}{4\pi} \sqrt{(2\ell+1)(2\ell_1+1)}\, v^3 \left( \verpp{3} P''_{\ell_1}(x) - \verp{3} P''_{\ell}(x)\right), \\ \label{eq:mix3b} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell Y_{\ell_1(\ell_z+m)}(\verpp{}) Y_{\ell\ell_z}(\verp{})^* \ell_z \sqrt{\frac{(\ell_1+\Delta\ell m l_z+1)!}{(\ell_1+\Delta\ell m l_z-1)!}} = -\frac{1}{8\pi} \sqrt{(2\ell+1)(2\ell_1+1)} \left[ i m (v^m \verpp{3} + \rule{0pt}{10pt}\right.} \hspace{4.5ex}\\ & + v^3 \verpp{m}) \left.P''_{\ell_1}(x) - i m (v^m \verp{3} + v^3 \verp{m}) P''_{\ell}(x) +\Delta\ell (\ell+(1-\Delta\ell)/2) \left( \verpp{m} P'_{\ell_1}(x) - \verp{m} P'_{\ell}(x) \right)\rule{0pt}{10pt}\right], \end{aligned} \end{align} \end{subequations} to be compared with (\ref{eq:rmat6}). Similarly, for $n=1$, $t=2$, with $m=0$ we get \begin{equation} \label{eq:mix4} \begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell Y_{\ell_1\ell_z}(\verpp{}) Y_{\ell\ell_z}(\verp{})^* {\ell_z}^2 \sqrt{(\langle\ell\rangle + 1/2)^2-\ell_z^2} = -\frac{\Delta\ell}{20\pi} \sqrt{(2\ell+1)(2\ell_1+1)} \left[ \left(-\verpp{3} (1-x^2) + 5 \verpp{3} (v^3)^2\right)\right. }\hspace{12ex}\\ &\times P'''_{\ell_1}(x) - \left(-\verp{3} (1-x^2) + 5 \verp{3} (v^3)^2\right) P'''_{\ell}(x) +\left(-\verp{3} - 2x \verpp{3} + 5 \verp{3} (\verpp{3})^2 \right) P''_{\ell_1}(x) \\ &\left. -\left(-\verpp{3} - 2x \verp{3} + 5 \verpp{3} (\verp{3})^2 \right) P''_{\ell}(x) -(\langle\ell\rangle-1/2)(\langle\ell\rangle+3/2) \left(\verpp{3} P'_{\ell_1}(x) - \verp{3} P'_\ell(x)\right) \right], \end{aligned} \end{equation} to be compared with (\ref{eq:rmat6a}) and (\ref{eq:mix3a}). The analogous results for $m=\pm1$, $\pm2$, $\pm3$ are somewhat lengthy, so we omit them for brevity. Finally, with $n=2$, $t=1$ and $m=0$ we obtain \begin{equation} \label{eq:mix5} \begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell+1}^{\ell-1} Y_{(\ell+1)\ell_z}(\verpp{}) Y_{(\ell-1)\ell_z}(\verp{})^* \ell_z \sqrt{(\ell^2-\ell_z^2) ((\ell+1)^2-\ell_z^2)} = \frac{1}{4\pi} \sqrt{(2\ell-1)(2\ell_1+3)}\, i v^3 } \hspace{35ex}\\ &\times\left[ (\verpp{3})^2 P'''_{\ell+1}(x) - 2 \verpp{3} \verp{3} P'''_\ell(x) + (\verp{3})^2 P'''_{\ell-1}(x) - P''_\ell(x) \right], \end{aligned} \end{equation} which is related to (\ref{eq:rmat7a}). As in the previous case we omit the explicit results for $m\neq 0$, as well as those for higher $n$ and $t$, for brevity. Those cases can be obtained from the general form (\ref{eq:mix2}), either algebraically or numerically. Analogous, but lengthier, results can be obtained by the same techniques for higher values of $n$ and $t$. Before leaving the subject of bilocal sums of spherical harmonics, we briefly discuss the restriction of the previous results to the local case $\verpp{} = \verp{}$. From (\ref{eq:mix2}) with (I.\ref{I.eq:mix4}), (I.\ref{I.eq:tensor6}), (I.\ref{I.eq:redmat7}) and (I.\ref{I.eq:redmat4}) we get, \begin{equation} \label{eq:mix6} \begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell Y_{\ell_n(\ell_z+m)}(\verp{}) Y_{\ell \ell_z}(\verp{})^* \CG{\ell}{\ell_z}{n+t}{m}{\ell_n}{\ell_z+m}= }\hspace{41ex}\\ &= \sqrt{\frac{(2\ell+1)(2\ell_n+1)}{2(n+t)+1}} \CG{\ell}{0}{n+t}{0}{\ell_n}{0} \frac{1}{\sqrt{4\pi}} Y_{(n+t)m}(\verp{}), \end{aligned} \end{equation} valid for $n,t\ge0$ and $|m| \leq n+t$. Notice that the r.h.s.\ vanishes for $t$ odd, because the CG coefficient does. This is due to the fact that, as seen from (I.\ref{I.eq:mix4}), when $\verpp{}=\verp{}$ and $t$ is odd all terms in the r.h.s.\ of (\ref{eq:mix1}), (\ref{eq:mix2}) contain a positive tensor power of $\vec{v}=0$. Equation (\ref{eq:mix6}) is, of course, the inverse of the well-known Clebsch-Gordan series for spherical harmonics \cite{var88}. For particular values of its parameters it reduces to sums of spherical harmonics with certain weight functions. We list several of those particular cases in appendix \ref{sec:applocal}. \section{Addition theorems for one scalar and one tensor spherical harmonic} \label{sec:scalspin} The results from the previous section for bilocal sums of spherical harmonics lead to a completely general addition theorem involving one scalar and one tensor spherical harmonic. Multiplying both sides of (\ref{eq:mix2}) by $\veps{i_1\ldots i_nj_1\ldots j_t}(m)^*$, and summing over $m$, we get \begin{equation} \label{eq:sca-ten-addthr1} \begin{split} \sum_{\ell'_z=-\ell_n}^{\ell_n} Y_{\ell_n\ell'_z}(\verpp{})\left( \left.Y_{\ell_n\ell'_z}^{\ell(n+t)}(\verp{})\right)^{i_1\ldots i_{n+t}}\right.^* = (-1)^n \sqrt{\frac{2\ell_n+1}{2\ell+1}} \sum_{\ell_z=-\ell}^\ell \left(Y_{\ell\ell_z}^{\ell_n (n+t)}(\verpp{})\right)^{i_1\ldots i_{n+t}} Y_{\ell\ell_z}(\verp{})^* \\ = \frac{1}{(n+t)!} \frac{\langle\verpp{}|\P_{\ell_n} \verr{\{i_1}\ldots \verr{i_n} L^{i_{n+1}} \ldots L^{i_{n+t}\}_0} \P_\ell | \verp{} \rangle}{ \langle\ell_n||\veps{k_1\ldots k_{n+t}} \verr{k_1}\ldots \verr{k_n} L^{k_{n+1}} \ldots L^{k_{n+t}} ||\ell\rangle}~, \end{split} \end{equation} with $n$, $t$ nonnegative integers. The matrix elements on the r.h.s.\ of (\ref{eq:sca-ten-addthr1}) are given explicitly by (I.\ref{I.eq:mix4}) and (I.\ref{I.eq:redmat7}) for $n>0$, $t>0$, by (I.\ref{I.eq:genL}) and (I.\ref{I.eq:redmat3}) for $n=0$, $t>0$, and by (I.\ref{I.eq:rmat3}) and (I.\ref{I.eq:redmat6}) for $n>0$, $t=0$. Notice that, in the last case, the matrix element in (\ref{eq:sca-ten-addthr1}) involves an additional symmetrization with respect to (I.\ref{I.eq:rmat3}). We give here the expanded forms of (\ref{eq:sca-ten-addthr1}) for spins $n+t=1$, 2, 3 (see \cite{var88} for some related results). For vector spherical harmonics (\ref{eq:sca-ten-addthr1}) yields, \begin{subequations} \label{eq:sca-ten-addthr2} \begin{align} \label{eq:sca-ten-addthr2a} \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell 1}_{\ell\ell_z} (\verpp{}) \right)^i Y_{\ell\ell_z}(\verp{})^* &= \frac{i}{4\pi} \frac{2\ell+1}{\sqrt{\ell(\ell+1)}}\, v^i P'_\ell(x)~, \\ \label{eq:sca-ten-addthr2b} \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell_1 1}_{\ell\ell_z} (\verpp{}) \right)^i Y_{\ell\ell_z}(\verp{})^* &= -\frac{\sqrt{2}}{4\pi} \sqrt{\frac{2\ell+1}{\ell_1+\ell+1}} \left(\verpp{i} P'_{\ell_1}(x) - \verp{i} P'_\ell(x)\right). \end{align} \end{subequations} For rank-2 tensor spherical harmonics, by setting $n+t=2$ in (\ref{eq:sca-ten-addthr1}) we get, \begin{subequations} \label{eq:sca-ten-addthr3} \begin{align} \label{eq:sca-ten-addthr3a} \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell 2}_{\ell\ell_z} (\verpp{}) \right)^{i_1 i_2} Y_{\ell\ell_z}(\verp{})^* &= -\frac{\sqrt{3/2}}{4\pi} \frac{(2\ell+1)/\sqrt{\ell(\ell+1)}}{ \sqrt{(2\ell-1)(2\ell+3)}} \left( v^{\{i_1} v^{i_2\}_0} P''_\ell(x) + \verpp{\{i_1} \verp{i_2\}_0} P'_\ell(x)\right), \\ \label{eq:sca-ten-addthr3b} \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell_1 2}_{\ell\ell_z} (\verpp{}) \right)^{i_1 i_2} Y_{\ell\ell_z}(\verp{})^* &= -\frac{i}{2\pi} \sqrt{2\ell+1} \sqrt{\frac{(\ell_1+\ell-3)!!} {(\ell_1+\ell+3)!!}}\left( \verpp{\{i_1} v^{i_2\}} P''_{\ell_1}(x) - \verp{\{i_1} v^{i_2\}} P''_\ell(x) \right), \\ \label{eq:sca-ten-addthr3c} \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell_2 2}_{\ell\ell_z} (\verpp{}) \right)^{i_1 i_2} Y_{\ell\ell_z}(\verp{})^* &= \frac{1}{4\pi}\frac{1}{\sqrt{2\ell_2+1}} \sqrt{\frac{(\ell_2+\ell-1)(\ell_2+\ell+3)} {(\ell_2+\ell)(\ell_2+\ell+1)(\ell_2+\ell+2)}}\\ &\quad\times\nonumber \left( \verpp{\{i_1} \verpp{i_2\}_0} P''_{\ell_2}(x) - 2 \verpp{\{i_1} \verp{i_2\}_0} P''_{\ell_1}(x) + \verp{\{i_1} \verp{i_2\}_0} P''_\ell(x) \right). \end{align} \end{subequations} For rank-3 tensor spherical harmonics, setting $n+t=3$ in (\ref{eq:sca-ten-addthr1}) yields, \begin{subequations} \label{eq:sca-ten-addthr4} \begin{align} \label{eq:sca-ten-addthr4a} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell 3}_{\ell\ell_z} (\verpp{}) \right)^{i_1 i_2 i_3} Y_{\ell\ell_z}(\verp{})^* = -\frac{i}{2\pi} \frac{\sqrt{10}}{3} \sqrt{\frac{(2\ell-3)!} {(2\ell+4)!}} (2\ell+1)^{3/2} }\hspace{40ex} \\ &\times \left( v^{\{i_1} v^{i_2} v^{i_3\}_0} P^{(3)}_\ell(x) + 3 \verpp{\{i_1} \verp{i_2} v^{i_3\}_0} P^{(2)}_\ell(x) \right), \end{aligned}\\ \label{eq:sca-ten-addthr4b} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell_1 3}_{\ell\ell_z} (\verpp{}) \right)^{i_1 i_2 i_3} Y_{\ell\ell_z}(\verp{})^* = \frac{1}{4\pi} \sqrt{\frac{10}{3}} \sqrt{2\ell+1} \sqrt{\frac{(\ell_1+\ell-3)!}{(\ell_1+\ell+4)!}} \sqrt{(\ell_1+\ell) (\ell_1+\ell+2)} }\hspace{3ex}\\ &\times \left( \verpp{\{i_1} v^{i_2} v^{i_3\}_0} P^{(3)}_{\ell_1}(x) - \verp{\{i_1} v^{i_2} v^{i_3\}_0} P_\ell^{(3)}(x) + \verpp{\{i_1} \verpp{i_2} \verp{i_3\}_0} P_{\ell_1}^{(2)}(x) - \verpp{\{i_1} \verp{i_2} \verp{i_3\}_0} P_{\ell}^{(2)}(x) \right), \end{aligned}\\ \label{eq:sca-ten-addthr4c} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell_2 3}_{\ell\ell_z} (\verpp{}) \right)^{i_1 i_2 i_3} Y_{\ell\ell_z}(\verp{})^* = \frac{i}{8\pi} \frac{1}{\sqrt{3}} \frac{1}{(2\ell_1+1)\sqrt{2\ell_2+1}} \sqrt{\frac{(2\ell_1+3)!!}{(2\ell_1-3)!!}} \sqrt{\frac{(\ell_1-2)!}{(\ell_1+2)!}} }\hspace{25ex}\\ &\times \left( \verpp{\{i_1} \verpp{i_2} v^{i_3\}_0} P^{(3)}_{\ell_2}(x) - 2 \verpp{\{i_1} \verp{i_2} v^{i_3\}_0} P_{\ell_1}^{(3)}(x) + \verp{\{i_1} \verp{i_2} v^{i_3\}_0} P_{\ell}^{(3)}(x) \right), \end{aligned}\\ \label{eq:sca-ten-addthr4d} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell_3 3}_{\ell\ell_z} (\verpp{}) \right)^{i_1 i_2 i_3} Y_{\ell\ell_z}(\verp{})^* = -\frac{1}{3\pi} \frac{\sqrt{2}\sqrt{\langle\ell\rangle+2}}{(2\ell_1+1)(2\ell_2+1)\sqrt{2\ell_3+1}} \sqrt{\frac{(\ell_3+\ell-3)!!}{(\ell_3+\ell+3)!!}} \sqrt{\frac{(\langle\ell\rangle+1)!}{(\langle\ell\rangle-2)!}} }\hspace{0ex} \\ &\times \left( \verpp{\{i_1} \verpp{i_2} \verpp{i_3\}_0} P^{(3)}_{\ell_3}(x) -3 \verpp{\{i_1} \verpp{i_2} \verp{i_3\}_0} P^{(3)}_{\ell_2}(x) +3 \verpp{\{i_1} \verp{i_2} \verp{i_3\}_0} P^{(3)}_{\ell_1}(x) - \verp{\{i_1} \verp{i_2} \verp{i_3\}_0} P^{(3)}_{\ell}(x) \right). \end{aligned} \end{align} \end{subequations} Similar relations for tensor spherical harmonics of arbitrary rank $n+t>3$ are contained in (\ref{eq:sca-ten-addthr1}). Equation (\ref{eq:sca-ten-addthr1}) yields also information on matrix elements of operators between spinless and integer-spin states. We consider, as the simplest representative example, matrix elements of the operator $L^3$. Combining (\ref{eq:sca-ten-addthr1}), with $n+t=1$, with the decomposition into irreducible components of the tensor matrix elements $\langle \ell,\ell'_z | L^i L^j | \ell, \ell_z \rangle$ and $\langle \ell,\ell'_z | \verr{i} L^j | \ell, \ell_z \rangle$, and setting $j=3$, we get the following bilocal sums of one scalar and one vector spherical harmonic weighted by $\ell_z$ \begin{subequations} \label{eq:sca-ten-addthr5} \begin{align} \label{eq:sca-ten-addthr5a} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^{\ell} \ell_z \left( Y_{\ell\ell_z}^{\ell 1} (\verpp{}) \right)^i Y_{\ell\ell_z}(\verp{})^* = -\frac{1}{8\pi} \frac{2\ell+1}{\sqrt{\ell(\ell+1)}} \left( v^{\{i} v^{3\}_0} P^{(2)}_\ell(x) + \verpp{\{i} \verp{3\}_0} P'_\ell(x)\right. }\hspace{53ex} \\ &\left. +(\verp{i} \verpp{3} - \verp{3} \verpp{i}) P'_\ell(x) - \frac{2}{3} \ell (\ell+1) \delta^{i3} P_\ell(x) \right), \end{aligned}\\ \label{eq:sca-ten-addthr5b} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^{\ell} \ell_z \left( Y_{\ell\ell_z}^{\ell_1 1} (\verpp{}) \right)^i Y_{\ell\ell_z}(\verp{})^* = -\frac{i}{8\pi}\sqrt{2}\sqrt{\frac{2\ell+1}{\ell_1+\ell+1}} \left(\rule{0pt}{15pt} \left( \verpp{\{i} v^{3\}} P''_{\ell_1}(x) - \verp{\{i} v^{3\}} P''_\ell(x) \right)\right. }\hspace{32ex}\\ & \left. -\left((\ell_1-\ell)(\ell+1/2)-1/2)\right) \varepsilon^{i3p} \left(\verpp{p} P'_{\ell_1}(x) - \verp{p} P'_\ell(x)\right) \rule{0pt}{15pt} \right). \end{aligned} \end{align} \end{subequations} Similarly, from (\ref{eq:sca-ten-addthr1}) and the irreducible-tensor decompositions of $\langle \ell,\ell'_z | L^i L^j L^k | \ell, \ell_z \rangle$ and $\langle \ell,\ell'_z | \verr{i} L^j L^k | \ell, \ell_z \rangle$, setting $j=3=k$ we obtain bilocal sums of one scalar and one vector spherical harmonic weighted by $\ell_z^2$ \begin{subequations} \label{eq:sca-ten-addthr6} \begin{align} \label{eq:sca-ten-addthr6a} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \ell_z^2 \left( Y_{\ell \ell_z}^{\ell 1}(\verpp{})\right)^i {Y_{\ell \ell_z}(\verp{})}^* = -\frac{i}{4\pi} \frac{2\ell+1}{\sqrt{\ell(\ell+1)}} \left(\frac{1}{6} \left( v^{\{i} v^3 v^{3\}_0} P_\ell^{(3)}(x) + 3 \verpp{\{i} \verp{3} v^{3\}_0} P_\ell^{(2)}(x)\right)\right. }\hspace{20ex}\\ &+ \left(\verp{i}\verpp{3} - \verp{3} \verpp{i} \right) v^3 P_\ell^{(2)}(x) + \frac{1}{2} \varepsilon^{i3h} \verpp{\{h} \verp{3\}_0} P_\ell'(x) - \frac{1}{5} (\ell(\ell+1)+1/2) v^i P'_\ell(x) \\ &- \left. \frac{2}{5} (\ell(\ell+1)-3/4) v^3 \delta^{i3} P'_\ell(x) \rule{0pt}{15pt}\right), \end{aligned}\\ \label{eq:sca-ten-addthr6b} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \ell_z^2 \left( Y_{\ell \ell_z}^{\ell_11}(\verpp{})\right)^i {Y_{\ell \ell_z}(\verp{})}^* = -\frac{1}{2\pi} \sqrt{\frac{\ell+1/2}{\ell_1+\ell+1}} \left( -\frac{1}{6} \left( \verpp{\{i} v^3 v^{3\}_0} P^{(3)}_{\ell_1}(x) - \verp{\{i} v^3 v^{3\}_0} P^{(3)}_{\ell}(x) \right.\right. }\hspace{6ex}\\ &+ \left. \verpp{\{i} \verpp{3} \verp{3\}_0} P''_{\ell_1}(x) - \verp{\{i} \verp{3} \verpp{3\}_0} P''_{\ell}(x)\right) +\frac{1}{6} \left((\ell_1-\ell)(\ell_1+\ell+1)-3\right) \varepsilon^{i3p}\\ &\times \left( \verpp{\{p} v^{3\}_0} P''_{\ell_1}(x) - \verp{\{p} v^{3\}_0} P''_{\ell}(x) \right) - \frac{1}{20} (\ell_1(\ell_1+1)-9\ell(\ell+1)-2) \left( \verpp{i} P'_{\ell_1}(x) - \verp{i} P'_{\ell}(x) \right)\\ &+ \left.\frac{1}{20} (3\ell_1(\ell_1+1)-7\ell(\ell+1)-6) \left( \verpp{3} P'_{\ell_1}(x) - \verp{3} P'_{\ell}(x) \right) \delta^{i3}\right). \end{aligned} \end{align} \end{subequations} Finally, combining (\ref{eq:sca-ten-addthr1}) with the irreducible-tensor decompositions of $\langle \ell,\ell'_z | L^i L^j L^k | \ell, \ell_z \rangle$, $\langle \ell,\ell'_z | \verr{i} L^j L^k | \ell, \ell_z \rangle$ and $\langle \ell,\ell'_z | \verr{i} \verr{j} L^k | \ell, \ell_z \rangle$, with $k=3$, we obtain bilocal sums of one scalar and one rank-2 tensor spherical harmonic weighted by $\ell_z$ \begin{subequations} \label{eq:sca-ten-addthr7} \begin{align} \label{eq:sca-ten-addthr7a} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \ell_z \left( Y_{\ell \ell_z}^{\ell 2}(\verpp{})\right)^{ij} {Y_{\ell \ell_z}(\verp{})}^* = -\frac{i}{2\pi} \sqrt{\frac{3}{2}} \frac{(2\ell+1)/\sqrt{\ell(\ell+1)}}{\sqrt{(2\ell-1)(2\ell+3)}} \left[\rule{0pt}{0pt} \frac{1}{6} v^{\{i}v^{j}v^{3\}_0} P^{(3)}_\ell(x) \right. + \frac{1}{4} \left(\rule{0pt}{14pt}\! -\varepsilon^{ijh} v^{\{h}v^{3\}_0}\right. }\hspace{9ex}\\ & \left. + 2 \verpp{\{i} \verp{j} v^{3\}_0} + \frac{4}{3} \left( (\verp{i}\verpp{j}-\verp{j}\verpp{i}) v^3 + (\verp{j}\verpp{3}-\verp{3}\verpp{j}) v^i + 2 (\verp{i}\verpp{3}-\verp{3}\verpp{i}) v^j \right) \right) P^{(2)}_\ell(x)\\ &+\left( \frac{1}{6}\left( -\frac{1}{2} \varepsilon^{ijh} \verpp{\{h}\verp{3\}_0} + \varepsilon^{hj3} \verpp{\{h}\verp{i\}_0} + 2 \varepsilon^{i3h} \verpp{\{h}\verp{j\}_0} \right) -\frac{1}{4} \varepsilon^{ijh} (\verp{h}\verpp{3} - \verp{3}\verpp{h}) \right.\\ &\left.\left.+ \frac{2}{15} (\ell(\ell+1)-3/4) \delta^{ij} v^3 -\frac{1}{5} (\ell(\ell+1)+1/2) \delta^{j3} v^i -\frac{1}{5} (\ell(\ell+1)-2) \delta^{i3} v^j \right) P'_\ell(x) \rule{0pt}{0pt}\right], \end{aligned}\\ \label{eq:sca-ten-addthr7b} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \ell_z \left( Y_{\ell \ell_z}^{\ell_1 2}(\verpp{})\right)^{ij} {Y_{\ell \ell_z}(\verp{})}^* = \frac{\sqrt{2\ell+1}}{\pi} \sqrt{\frac{(\ell_1+\ell-3)!!}{(\ell_1+\ell+3)!!}} \left[\rule{0pt}{14pt} \frac{1}{6} \left( \verpp{\{i} v^j v^{3\}_0} P^{(3)}_{\ell_1}(x) - \verp{\{i} v^j v^{3\}_0} P^{(3)}_{\ell}(x) \right.\right.}\hspace{8ex}\\ &+ \left. \verpp{\{i} \verpp{j} \verp{3\}_0} P^{(2)}_{\ell_1}(x) - \verpp{\{i} \verp{j} \verp{3\}_0} P^{(2)}_{\ell}(x) \right) +\frac{1}{24} (\ell_1(\ell_1+1)-\ell(\ell+1)-6) \left( (\varepsilon^{ih3} \verpp{\{h} v^{j\}_0} \right.\\ &+ \left. \varepsilon^{jh3} \verpp{\{h} v^{i\}_0} ) P^{(2)}_{\ell_1}(x) - (\varepsilon^{ih3} \verp{\{h} v^{j\}_0} + \varepsilon^{jh3} \verp{\{h} v^{i\}_0} ) P^{(2)}_{\ell}(x)\right) -\frac{3}{80}(\ell_1+\ell-1)(\ell_1+\ell+3) \\ &\times \left.\left( (\delta^{j3} \verpp{i} + \delta^{i3} \verpp{j} -2/3\, \delta^{ij} \verpp{3}) P'_{\ell_1}(x) -(\delta^{j3} \verp{i} + \delta^{i3} \verp{j} -2/3\,\delta^{ij} \verp{3}) P'_{\ell}(x) \right) \rule{0pt}{14pt}\right], \end{aligned}\\ \label{eq:sca-ten-addthr7c} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \ell_z \left( Y_{\ell\ell_z}^{\ell_22}(\verpp{})\right)^{ij} {Y_{\ell\ell_z}(\verp{})}^* = \frac{i}{24\pi} \sqrt{\frac{2\ell+1}{2\ell_1+1}} \frac{1}{\sqrt{\ell_1(\ell_1+1)}} \left[\rule{0pt}{11pt} \verpp{\{i} \verpp{j} v^{3\}_0} P^{(3)}_{\ell_2}(x) - 2\verpp{\{i} \verp{j} v^{3\}_0} P^{(3)}_{\ell_1}(x)\right.} \hspace{31ex}\\ &+ \verp{\{i} \verp{j} v^{3\}_0} P^{(3)}_{\ell}(x) - \frac{1}{2} \left((\ell_1-\ell) (\ell_2 + \ell +1) -3\right) (\varepsilon^{hj3}\delta^{pi} - \varepsilon^{ih3} \delta^{pj}) \\ &\left.\times \left( \verpp{\{h} \verpp{p\}_0} P^{(2)}_{\ell_2}(x) - 2 \verpp{\{h} \verp{p\}_0} P^{(2)}_{\ell_1}(x) + \verp{\{h} \verp{p\}_0} P^{(2)}_{\ell}(x) \right)\right]~. \end{aligned} \end{align} \end{subequations} Similar results involving higher powers of $\ell_z$ and/or higher-rank tensor spherical harmonics follow by considering higher-rank operators. Also with the same techniques, other components of $\vec{L}$, instead of $L^3$, can be considered, or other operators. \subsection{Local results} \label{sec:scalspinlocal} The previous results simplify considerably when specialized to $\verpp{}=\verp{}$. The local case is of interest by itself, so we discuss it in this section. The general addition theorem (\ref{eq:sca-ten-addthr1}) with $\verpp{}=\verp{}$ reduces to \begin{equation} \label{eq:sca-ten-local0} \begin{split} \sum_{\ell'_z=-\ell_n}^{\ell_n} Y_{\ell_n \ell'_z}(\verp{}) {\left(Y_{\ell_n\ell'_z}^{\ell(n+t)}(\verp{})\right)^{i_1\ldots i_nj_1\ldots j_t}}^* = (-1)^n \sqrt{\frac{2\ell_n+1}{2\ell+1}} \sum_{\ell_z=-\ell}^\ell \left(Y_{\ell\ell_z}^{\ell_n(n+t)}(\verp{})\right)^{i_1\ldots i_nj_1\ldots j_t} {Y_{\ell_n \ell_z}(\verp{})}^* \\ =(-1)^{n+t} \sqrt{(2\ell+1)(2\ell_n+1)} \CG{\ell}{0}{n+t}{0}{\ell_n}{0} \frac{1}{\sqrt{4\pi}} \left( Y^{(n+t)(n+t)}_{0 0}(\verp{})\right)^{i_1\ldots i_nj_1\ldots j_t}, \end{split} \end{equation} a result valid for all $\ell$, $n$, $t\ge 0$. Notice that the r.h.s.\ vanishes for $t$ odd, for the same reasons as explained in connection with (\ref{eq:mix6}). Thus, for vector spherical harmonics, $n+t=1$ in (\ref{eq:sca-ten-local0}), the only non-trivial result is \begin{equation} \label{eq:sca-ten-local1} \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell_1 1}_{\ell \ell_z}(\verp{})\right)^i {Y_{\ell\ell_z}(\verp{})}^* = -\frac{(\ell_1-\ell)}{4\pi}\sqrt{(\ell+1/2)(\ell_1+\ell+1)} \,\verp{i}~. \end{equation} For rank-2 tensor spherical harmonics, the local version of (\ref{eq:sca-ten-addthr3}) is \begin{subequations} \label{eq:sca-ten-local2} \begin{align} \label{eq:sca-ten-local2a} \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell 2}_{\ell \ell_z}(\verp{})\right)^{j_1j_2} {Y_{\ell\ell_z}(\verp{})}^* &= -\frac{1}{8\pi} \sqrt{\frac{3}{2}} (2\ell+1) \sqrt{\frac{\ell(\ell+1)} {(2\ell-1)(2\ell+3)}} \,\verp{\{j_1} \verp{j_2\}_0}~,\\ \label{eq:sca-ten-local2b} \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell_2 2}_{\ell \ell_z}(\verp{})\right)^{i_1i_2} {Y_{\ell\ell_z}(\verp{})}^* &= \frac{3}{16\pi} \sqrt{\ell_1(\ell_1+1)} \sqrt{\frac{2\ell+1}{\ell_2+\ell+1}} \,\verp{\{i_1} \verp{i_2\}_0}~, \end{align} \end{subequations} with (\ref{eq:sca-ten-addthr3b}) trivially vanishing for $\verpp{}=\verp{}$. For rank-3 tensor spherical harmonics, the non-trivial local versions of (\ref{eq:sca-ten-addthr4}) are \begin{subequations} \label{eq:sca-ten-local3} \begin{align} \label{eq:sca-ten-local3a} &\begin{aligned} \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell_1 3}_{\ell \ell_z}(\verp{})\right)^{i_1j_1j_2} {Y_{\ell\ell_z}(\verp{})}^* &= \frac{\ell_1-\ell}{64\pi} \sqrt{\frac{10}{3}} \sqrt{2\ell+1} \sqrt{\frac{(\ell_1+\ell-1)(\ell_1+\ell+1)(\ell_1+\ell+3)} {(\ell_1+\ell-2)(\ell_1+\ell+4)}} \\ &\quad \times \verp{\{i_1} \verp{j_1} \verp{j_2\}_0}~, \end{aligned}\\ \label{eq:sca-ten-local3b} &\begin{aligned} \sum_{\ell_z=-\ell}^\ell \left(Y^{\ell_3 3}_{\ell \ell_z}(\verp{})\right)^{i_1i_2i_3} {Y_{\ell\ell_z}(\verp{})}^* &= -\frac{\ell_1-\ell}{64\pi} \frac{5\sqrt{2}}{3} \sqrt{2\ell+1} \sqrt{\frac{(\ell_3+\ell-1)(\ell_3+\ell+1)(\ell_3+\ell+3)} {(\ell_3+\ell)(\ell_3+\ell+2)}}\\ &\quad \times \verp{\{i_1} \verp{i_2} \verp{i_3\}_0}~. \end{aligned} \end{align} \end{subequations} The matrix elements of $L^3$ between one scalar and one vector spherical harmonic, with $\verpp{}=\verp{}$, are given by the local form of (\ref{eq:sca-ten-addthr5}) \begin{subequations} \label{eq:sca-ten-local4} \begin{align} \label{eq:sca-ten-local4a} \sum_{\ell_z=-\ell}^\ell \ell_z \left(Y^{\ell 1}_{\ell \ell_z}(\verp{})\right)^i {Y_{\ell\ell_z}(\verp{})}^* &= -\frac{1}{8\pi}(2\ell+1)\sqrt{\ell(\ell+1)} \left( \verp{i} \verp{3} - \delta^{i3} \right),\\ \label{eq:sca-ten-local4b} \sum_{\ell_z=-\ell}^\ell \ell_z \left(Y^{\ell_1 1}_{\ell \ell_z}(\verp{})\right)^i {Y_{\ell\ell_z}(\verp{})}^* &= \frac{i}{8\pi}\sqrt{2}\sqrt{\frac{2\ell+1}{\ell_1+\ell+1}} \ell (\ell+1) \varepsilon^{i3h} \verp{h}. \end{align} \end{subequations} For $(L^3)^2$, the local analog of (\ref{eq:sca-ten-addthr6}) is \begin{subequations} \label{eq:sca-ten-local5} \begin{align} \label{eq:sca-ten-local5a} &\begin{aligned} \sum_{\ell_z=-\ell}^\ell {\ell_z}^2 \left(Y^{\ell 1}_{\ell \ell_z}(\verp{})\right)^i {Y_{\ell\ell_z}(\verp{})}^* &= -\frac{i}{8\pi} (2\ell+1)\sqrt{\ell(\ell+1)}\, \varepsilon^{i3h}\verp{h} \verp{3}, \end{aligned}\\ \label{eq:sca-ten-local5b} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell {\ell_z}^2 \left(Y^{\ell_1 1}_{\ell \ell_z}(\verp{})\right)^i {Y_{\ell\ell_z}(\verp{})}^* = \frac{(\ell_1-\ell)}{2\pi}\sqrt{(\ell+1/2)(\ell_1+\ell+1)} \left[ \frac{1}{96} (\ell_1+\ell-1)(\ell_1+\ell+3) \verp{\{i} \verp{3} \verp{3\}_0} \right. }\hspace{22ex}\\ &+\left.\frac{1}{40} (\ell_1(\ell_1+1)-9 \ell(\ell+1) -2) \verp{i} -\frac{1}{40} (3\ell_1(\ell_1+1)-7 \ell(\ell+1) -6) \verp{3} \delta^{i3} \right]. \end{aligned} \end{align} \end{subequations} Finally, for rank-2 tensor spherical harmonics, the local version of (\ref{eq:sca-ten-addthr7}) yields \begin{subequations} \label{eq:sca-ten-local6} \begin{align} \label{eq:sca-ten-local6a} & \begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \ell_z \left(Y^{\ell 2}_{\ell \ell_z}(\verp{})\right)^{ij} {Y_{\ell\ell_z}(\verp{})}^* = -\frac{i}{24\pi}\sqrt{\frac{3}{2}} (2\ell+1)\sqrt{\frac{\ell(\ell+1)} {(2\ell-1)(2\ell+3)}} \left[ -\frac{1}{2} \varepsilon^{ijh} \verp{\{h} \verp{3\}_0} + \varepsilon^{hj3} \verp{\{h} \verp{i\}_0} \right. }\hspace{81ex}\\ &+ \left. 2\varepsilon^{i3h} \verp{\{h} \verp{j\}_0} \rule{0pt}{14pt}\right], \end{aligned}\\ \label{eq:sca-ten-local6b} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \ell_z \left(Y^{\ell_1 2}_{\ell \ell_z}(\verp{})\right)^{ij} {Y_{\ell\ell_z}(\verp{})}^* = \frac{\ell_1-\ell}{32\pi} \sqrt{2\ell+1} \sqrt{(\ell_1+\ell-1)(\ell_1+\ell+1)(\ell_1+\ell+3)} \left[\rule{0pt}{14pt} \frac{1}{3}\verp{\{i} \verp{j} \verp{3\}_0} \right. }\hspace{65ex} \\ &- \left. \frac{3}{5} \left( \delta^{j3} \verp{i} + \delta^{i3} \verp{j} - \frac{2}{3} \delta^{ij} \verp{3}\right) \right], \end{aligned}\\ \label{eq:sca-ten-local6c} &\begin{aligned} \lefteqn{ \sum_{\ell_z=-\ell}^\ell \ell_z \left(Y^{\ell_2 2}_{\ell \ell_z}(\verp{})\right)^{ij} {Y_{\ell\ell_z}(\verp{})}^* = -\frac{i}{32\pi} ((\ell_1-\ell)(2\ell+1)-1) \sqrt{\frac{2\ell+1}{2\ell_1+1}} \sqrt{\ell_1(\ell_1+1)} \left( \varepsilon^{i3h} \verp{\{h} \verp{j\}_0} \right. }\hspace{83ex} \\ &+ \left. \varepsilon^{j3h} \verp{\{h} \verp{i\}_0} \right). \end{aligned} \end{align} \end{subequations} \section{Addition theorems for spin spherical harmonics} \label{sec:spin} We consider now addition theorems for spin spherical harmonics of the form \begin{equation} \label{eq:seed} \sum_{j_z=-j}^j Y_{jj_z}^{\ell' s'}(\verrp{}) {Y_{jj_z}^{\ell s}(\verr{})}^*, \end{equation} with $s',s>0$. Combining the factorization of orbital and spin degrees of freedom in products of two CG coefficients from sect.\ I.\ref{I.sec:fac} and the matrix elements of orbital operators from sect.\ I.\ref{I.sec:proj}, we have \begin{equation} \label{eq:adthrgen} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j Y^{\ell's'}_{jj_z}(\verpp{}) {Y^{\ell s}_{jj_z}(\verp{})}^* = \sum_{\Delta=\Delta_\mathrm{min}}^{\Delta_\mathrm{max}} \frac{1}{\Delta!} C^{s's\Delta}_{\ell'\ell j} \langle\verpp{}| \P_{\ell'} \verr{\{i_1} \ldots \verr{i_{|\Delta\ell|}} L^{i_{|\Delta\ell|+1}} \ldots L^{i_\Delta\}_0} \P_\ell | \verp{} \rangle }\hspace{59ex}\\ &\times \langle\psi_{s'} | T^{i_1} \ldots T^{i_{|\Delta\ell|}} S^{i_{|\Delta\ell|+1}} \ldots S^{i_\Delta} | \psi_s \rangle. \end{aligned} \end{equation} In this equality $\P_\ell$ stands for the orbital angular momentum projector operator (see sect.\ I.\ref{I.sec:proj}), $|\psi_s\rangle$ are the basis spin states entering the definition of $Y^{\ell s}_{j j_z}$ (see sect.\ \ref{sec:ssh}), and $C^{s's\Delta}_{\ell'\ell j}$ and $\Delta_{\substack{\mathrm{max}\\\mathrm{min}}}$ are defined in (I.\ref{I.eq:CGmaster}). The orbital matrix element appearing in (\ref{eq:adthrgen}) is given explicitly for any values of their parameters in sect.\ I.\ref{I.sec:proj}. For low values of $s',s>0$, the spin matrix elements and simplified forms of the coefficients $C^{s's\Delta}_{\ell'\ell j}$ are given in sect.\ I.\ref{I.sec:fac}. In the remainder of this section we discuss the resulting addition theorems for spin spherical harmonics. As above, throughout this section we denote $x\equiv \verp{}\cdot\verpp{}$ and $\vec{v}\equiv \verp{}\wedge \verpp{}$. \subsection{Addition theorems for spin-1/2 spherical harmonics} \label{sec:spin1half} Spin-1/2 spherical harmonics $Y_{jj_z}^{\ell\frac{1}{2}}$, as defined by (\ref{eq:3halfdef}), vanish identically unless $j=\ell\pm 1/2$. In this subsection we always assume those values for $j$. In the case of two spin-1/2 harmonics with the same orbital angular momentum, (\ref{eq:adthrgen}) together with (\ref{eq:mix1}) with $n=0$ yield \begin{equation} \label{eq:add1half2} \begin{aligned} \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell\frac{1}{2}}(\verpp{})\right)_A {\left(Y_{jj_z}^{\ell\frac{1}{2}}(\verp{})\right)_B}^* &= \frac{j+1/2}{2\ell+1} \langle\verpp{}|\P_\ell|\verp{}\rangle \delta_{AB} + \frac{2(j-\ell)}{2\ell+1} \langle\verpp{}|L^k \P_\ell|\verp{}\rangle \sigma^k_{AB}~,\\ &= \frac{j+1/2}{4\pi} P_\ell(x) \delta_{AB} + i \frac{2(j-\ell)}{4\pi} P'_\ell(x)\, \vec{v} \cdot \vec{\sigma}_{AB}~, \end{aligned} \end{equation} where in the second equality we used the matrix elements (I.\ref{I.eq:proj3}) and (I.\ref{I.eq:L}). Eq. (\ref{eq:add1half2}) is the addition theorem for spin-1/2 spherical harmonics with the same orbital angular momentum. It plays an important role in the partial-wave expansion of (parity conserving) $S$-matrix elements between spin-1/2 states with the same intrinsic parity (see, e.g., \cite{nac90}). If the intrinsic parity of the initial and final spin-1/2 states is opposite, on the other hand, a parity-conserving transition can occur only if the initial and final orbital angular momenta differ by one unit. To derive the addition theorem for spin-1/2 spherical harmonics with different orbital angular momenta we substitute (I.\ref{I.eq:1half-3}) for the product of CG coefficients, (\ref{eq:mix1}) with $t=0$, and (I.\ref{I.eq:rmat4a}) for the resulting matrix element of $\P_\ell$, in (\ref{eq:adthrgen}) to get \begin{equation} \label{eq:add1half3} \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_1\frac{1}{2}}(\verpp{})\right)_A {\left(Y_{jj_z}^{\ell\frac{1}{2}}(\verp{})\right)_B}^* = -\frac{\ell_1-\ell}{4\pi} \left( \verpp{}\cdot \vec{\sigma}_{AB} P'_{\ell_1} (x) - \verp{}\cdot \vec{\sigma}_{AB} P'_\ell(x) \right). \end{equation} This equation holds for either $\ell_1=\ell+1$ and $j=\ell+1/2$, or $\ell_1=\ell-1$ and $j=\ell-1/2$, otherwise the l.h.s.\ trivially vanishes. The local forms of these addition theorems are also of interest. Setting $\verpp{}=\verp{}$ in the above equalities we get, \begin{equation} \label{eq:add1halflocal} \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell\frac{1}{2}}(\verp{})\right)_A {\left(Y_{jj_z}^{\ell\frac{1}{2}}(\verp{})\right)_B}^* = \frac{2j+1}{8\pi} \delta_{AB}, \quad \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_1\frac{1}{2}}(\verp{})\right)_A {\left(Y_{jj_z}^{\ell\frac{1}{2}}(\verp{})\right)_B}^* = -\frac{2\langle\ell\rangle+1}{8\pi} \verp{}\cdot\vec{\sigma}_{AB}~. \end{equation} Eqs.\ (\ref{eq:add1half2}) and (\ref{eq:add1half3}) exhaust the addition theorems of the form (\ref{eq:seed}) for two spin-1/2 spherical harmonics. \subsection{Addition theorems for spin-1 spherical harmonics} \label{sec:spin1} We consider first the addition theorem for two spin-1 spherical harmonics with the same orbital angular momentum. We proceed in the same way as in the previous section, with the separation of orbital and spin quantum numbers in the product of CG coefficients carried out by means of (I.\ref{I.eq:1-2}) and the orbital matrix elements given by (\ref{eq:mix1}) with $n=0$, (I.\ref{I.eq:L}) and (I.\ref{I.eq:LL}), to find, \begin{equation} \label{eq:add1-1} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell 1}(\verpp{})\right)^r {\left(Y_{jj_z}^{\ell 1}(\verp{})\right)^s}^* = }\hspace{12ex} \\ &= \frac{2\ell+1}{4\pi} \left[ C^{110}_{\ell\ell j} P_\ell(x) \delta^{rs} + C^{111}_{\ell\ell j} P'_\ell(x) \verp{[r}\verpp{s]} + \frac{1}{2} C^{112}_{\ell\ell j} \left( P'_\ell(x) \verp{\{r}\verpp{s\}_0} + P''_\ell(x) v^{\{r} v^{s\}_0} \right)\right], \end{aligned} \end{equation} with $C^{11p}_{\ell\ell j}$, $p=0,1,2$, as given by (I.\ref{I.eq:1-2}). Eq.\ (\ref{eq:add1-1}) obviously can hold only when $j=\ell$, $\ell\pm 1$, its l.h.s.\ trivially vanishing otherwise. For vector spherical harmonics with orbital angular momenta differing by one unit, with the product of CG coefficients in (I.\ref{I.eq:1-5}) and the matrix elements (\ref{eq:mix1}) with $n=1$, $t=0$ and $n=1=t$, and (I.\ref{I.eq:rmat4a}), (I.\ref{I.eq:mix5a}), we find \begin{equation} \label{eq:add1-2} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_1 1}(\verpp{})\right)^r {\left(Y_{jj_z}^{\ell 1}(\verp{})\right)^s}^* = }\hspace{8ex}\\ &= -\frac{i}{8\pi}(\ell_1-\ell) \left[ 2 C^{111}_{\ell_1\ell j} \varepsilon^{rsh} \left(\verpp{h} P'_{\ell_1} (x) - \verp{h} P'_{\ell} (x) \right) + C^{112}_{\ell_1\ell j} \left(v^{\{r} \verpp{s\}} P''_{\ell_1} (x) - v^{\{r} \verp{s\}} P''_{\ell} (x) \right)\right], \end{aligned} \end{equation} with the coefficients $C^{11p}_{\ell_1\ell j}$, $p=1,2$, defined in (I.\ref{I.eq:1-5}). We remark here that (\ref{eq:add1-2}) holds if either $\ell_1=\ell+1$ and $j=\ell+1$, $\ell$, or $\ell_1=\ell-1$ and $j=\ell$, $\ell-1$, otherwise the l.h.s.\ vanishes identically. Similarly, for vector spherical harmonics with orbital angular momenta differing by two units, with the product of CG coefficients in eq.\ (I.\ref{I.eq:1-8}) and the matrix elements (\ref{eq:mix1}) with $n=2$, $t=0$ and (I.\ref{I.eq:rmat4b}) we get \begin{equation} \label{eq:add1-3} \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_2 1}(\verpp{})\right)^r {\left(Y_{jj_z}^{\ell 1}(\verp{})\right)^s}^* = -\frac{1}{4\pi} \frac{1}{\sqrt{j(j+1)}} \left( \verpp{(r}\verpp{s)_0} P''_{\ell_2}(x) -\verpp{\{r}\verp{s\}_0} P''_{\ell_1}(x) +\verp{(r}\verp{s)_0} P''_{\ell}(x) \right). \end{equation} In this equation $x$ is defined as in (\ref{eq:add1-1}). Equation (\ref{eq:add1-3}) holds only if either $\ell_2=\ell+2$ and $j=\ell_1=\ell+1$, or $\ell_2=\ell-2$ and $j=\ell_1=\ell-1$, the l.h.s.\ being identically zero in any other case. In the local case $\verpp{}=\verp{}$ the above results take the form \begin{equation} \label{eq:add1-local} \begin{aligned} \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell 1}(\verp{})\right)^r {\left(Y_{jj_z}^{\ell 1}(\verp{})\right)^s}^* &= \frac{2\ell+1}{4\pi} \left[ C^{110}_{\ell\ell j}\delta^{rs} + \frac{1}{4} \ell(\ell+1) C^{112}_{\ell\ell j} \verp{\{r} \verp{s\}_0} \right],\\ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_1 1}(\verp{})\right)^r {\left(Y_{jj_z}^{\ell 1}(\verp{})\right)^s}^* &= \frac{i}{8\pi} \sqrt{2j+1}\sqrt{2j-\langle\ell\rangle+1/2}\, \varepsilon^{rsh} \verp{h}, \\ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_2 1}(\verp{})\right)^r {\left(Y_{jj_z}^{\ell 1}(\verp{})\right)^s}^* &= -\frac{3}{8\pi} \sqrt{j(j+1)}\verp{(r}\verp{s)_0}. \end{aligned} \end{equation} Eqs.\ (\ref{eq:add1-1}), (\ref{eq:add1-2}), (\ref{eq:add1-3}) are all possible addition theorems of the form (\ref{eq:seed}) for two vector spherical harmonics (see \cite{var88} for related results). \subsection{Addition theorems for spin-3/2 spherical harmonics} \label{sec:spin3half} For spin-3/2 spherical harmonics we have four possible addition theorems, with $0\leq\ell'-\ell \leq 3$. We begin with the case $\ell'=\ell$, for which the product of CG coefficients is given by (I.\ref{I.eq:3h-2}), and the needed orbital matrix elements are (\ref{eq:mix1}) with $n=0$ and (I.\ref{I.eq:L})---(I.\ref{I.eq:LLL}). With those results we arrive at, \begin{equation} \label{eq:add3hal1} \begin{split} \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell \frac{3}{2}}(\verpp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^j_B}^* = \frac{2\ell+1}{4\pi} X^{ih}_{AC} \left[ C^{\frac{3}{2}\frac{3}{2}0}_{\ell\ell j} P_\ell(x) \delta^{hk} \delta_{CD} + i \frac{3}{2} C^{\frac{3}{2}\frac{3}{2}1}_{\ell\ell j} P'_\ell(x) \delta^{hk} \vec{v}\cdot \vec{\sigma}_{CD} +\frac{3}{2} C^{\frac{3}{2}\frac{3}{2}2}_{\ell\ell j} \right.\\ \times\left. \left(v^{\{h} v^{k\}_0} P''_\ell(x) + \verp{\{h} \verpp{k\}_0} P'_\ell(x) \right) \delta_{CD} + \frac{i}{4} C^{\frac{3}{2}\frac{3}{2}3}_{\ell\ell j} \left(v^{\{h}v^k v^{t\}_0} P'''_\ell(x) + 3 \verp{\{h} \verpp{k} v^{t\}_0} P''_\ell(x) \right) \sigma^t_{CD} \right] X^{kj}_{DB}, \end{split} \end{equation} where the coefficients $C^{\frac{3}{2}\frac{3}{2}p}_{\ell\ell j}$, $p=0,\ldots, 3$ are given in (I.\ref{I.eq:3h-2b}), and $X^{pq}_{FG}$ is the projector defined in (I.\ref{I.eq:nspincompl}). Notice that when the r.h.s.\ of (\ref{eq:add3hal1}) is contracted with $\vchiU{A}{i*}$ or $\vchiU{B}{j}$, the corresponding projector may be dropped since it leaves the spinors invariant. We remark that (\ref{eq:add3hal1}) holds when $j=\ell\pm 3/2$, $\ell\pm 1/2$, its l.h.s.\ vanishing identically otherwise. For orbital angular momenta differing by one unit, the appropriate factorization of orbital and spin degrees of freedom in CG coefficients is (I.\ref{I.eq:3h-4}), and the orbital matrix elements are given by (I.\ref{I.eq:mix1}) with $t=0$ and (I.\ref{I.eq:rmat2}), (I.\ref{I.eq:mix1}) with $t=1$ and (I.\ref{I.eq:mix5a}), and (I.\ref{I.eq:mix1}) with $t=2$ and (I.\ref{I.eq:mix5b}). We then get, \begin{equation} \label{eq:add3hal2} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_1 \frac{3}{2}}(\verpp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^j_B}^* = \frac{\ell_1-\ell}{4\pi} X^{ih}_{AC} \left[ \frac{3}{2}C^{\frac{3}{2}\frac{3}{2}1}_{\ell_1\ell j} \left(\verpp{q} P'_{\ell_1}(x) - \verp{q} P'_\ell(x)\right) \delta^{hk} \sigma^q_{CD} \right. }\hspace{2ex}\\ &- i \frac{3}{2} C^{\frac{3}{2}\frac{3}{2}2}_{\ell_1\ell j} \left(\verpp{\{h} v^{k\}_0} P''_{\ell_1}(x) - \verp{\{h} v^{k\}} P''_\ell(x)\right) \delta_{CD} + \frac{1}{4}C^{\frac{3}{2}\frac{3}{2}3}_{\ell_1\ell j} \left( \verpp{\{h} v^k v^{q\}_0} P'''_{\ell_1}(x) - \verp{\{h} v^k v^{q\}_0} P'''_{\ell}(x) \right.\\ &+ \left.\left. \verpp{\{h} \verpp{k} \verp{q\}_0} P''_{\ell_1}(x) - \verp{\{h} \verp{k} \verpp{q\}_0} P''_{\ell}(x) \right)\sigma^q_{CD} \right] X^{kj}_{DB}~, \end{aligned} \end{equation} with the coefficients $C^{\frac{3}{2}\frac{3}{2}p}_{\ell_1\ell j}$, $p=1,\ldots, 3$ from (I.\ref{I.eq:3h-4b}) and the projector $X^{pq}_{FG}$ defined in (I.\ref{I.eq:nspincompl}) Equation (\ref{eq:add3hal2}) is valid when either $\ell_1=\ell+1$ and $j=\ell+3/2$, $\ell+1/2$, $\ell-1/2$, or $\ell_1=\ell-1$ and $j=\ell+1/2$, $\ell-1/2$, $\ell-3/2$, its l.h.s.\ being identically zero otherwise. The case $|\ell'-\ell| = 2$ follows by using the relation among CG coefficients (I.\ref{I.eq:3h-6}), (\ref{eq:mix1}) with $n=2$, $t=0$ and $t=1$, and the matrix elements (I.\ref{I.eq:rmat4b}) and (I.\ref{I.eq:mix5b}), with the result \begin{equation} \label{eq:add3hal3} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_2 \frac{3}{2}}(\verpp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^j_B}^* = -\frac{1}{4\pi}\frac{1}{2\ell_1+1} X^{ip}_{AC}} \hspace{16ex}\\ &\times\left[ \frac{3}{2}C^{\frac{3}{2}\frac{3}{2}2}_{\ell_2\ell j} \left(\verpp{\{p} \verpp{r\}_0} P''_{\ell_2}(x) + \verp{\{p} \verp{r\}_0} P''_{\ell}(x) -2 \verpp{\{p} \verp{r\}_0} P''_{\ell_1}(x) \right) \delta_{CD} \right.\\ &+ \left. \frac{i}{4} C^{\frac{3}{2}\frac{3}{2}3}_{\ell_2\ell j} \left( \verpp{\{p} \verpp{q} v^{r\}_0} P'''_{\ell_2}(x) +\verp{\{p} \verp{q} v^{r\}_0} P'''_{\ell}(x) - 2\verpp{\{p} \verp{q} v^{r\}_0} P'''_{\ell_1}(x) \right) \sigma^{q}_{CD}\right] X^{rj}_{DB}~, \end{aligned} \end{equation} where $x$, $\vec{v}$ and $X^{pq}_{FG}$ are as above, and $C^{\frac{3}{2}\frac{3}{2}p}_{\ell_2\ell j}$, $p=2$, 3, are defined in (I.\ref{I.eq:3h-6}). Equation (\ref{eq:add3hal3}) is valid when either $\ell_2=\ell+2$ and $j=\ell+3/2$, $\ell+1/2$, or $\ell_2=\ell-2$ and $j=\ell-1/2$, $\ell-3/2$, its l.h.s.\ being identically zero otherwise. Finally, the case $|\ell'-\ell|=3$ follows from the CG relation (I.\ref{I.eq:3h-8}) and (I.\ref{I.eq:mix1}) evaluated at $n=3$, $t=0$, with (I.\ref{I.eq:rmat4c}). With the same notations as in the previous equations, we find \begin{equation} \label{eq:add3hal4} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_3 \frac{3}{2}}(\verpp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^j_B}^* = \frac{1}{4\pi}\frac{\ell_1-\ell}{(2\ell_1+1)(2\ell_2+1)} \sqrt{\frac{j(j+1)}{(j-1/2)(j+3/2)}} X^{ip}_{AC}} \hspace{0ex}\\ &\times \left[ \frac{1}{3} \verpp{\{p} \verpp{q} \verpp{r\}_0} P'''_{\ell_3}(x) - \verpp{\{p} \verpp{q} \verp{r\}_0} P'''_{\ell_2}(x) + \verpp{\{p} \verp{q} \verp{r\}_0} P'''_{\ell_1}(x) -\frac{1}{3} \verp{\{p} \verp{q} \verp{r\}_0} P'''_{\ell}(x) \right] \sigma^{q}_{CD} X^{rj}_{DB}, \end{aligned} \end{equation} which is valid for either $\ell_3 = \ell+3$ and $j=\ell+3/2$, or $\ell_3 = \ell-3$ and $j=\ell-3/2$. For other values of $j$, the l.h.s.\ vanishes. We quote here also the local forms of the previous results. With $\verpp{}=\verp{}$ we have \begin{equation} \label{eq:add3hal-local} \begin{aligned} \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^j_B}^* &= \frac{2\ell+1}{4\pi} X^{ih}_{AC} \left[ C^{\frac{3}{2}\frac{3}{2}0}_{\ell\ell j} \delta^{hk} + \frac{3}{4} \ell(\ell+1) C^{\frac{3}{2}\frac{3}{2}2}_{\ell\ell j} \verp{\{h} \verp{k\}_0} \right] X^{kj}_{CB}~, \\ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_1 \frac{3}{2}}(\verp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^j_B}^* &= \frac{1}{16\pi} (\ell_1+\ell+1) X^{ih}_{AC} \left[ \rule{0pt}{14pt} 3 C^{\frac{3}{2}\frac{3}{2}1}_{\ell_1\ell j} \verp{q} \delta^{hk} \right.\\ &\quad \left.+\frac{1}{16} C^{\frac{3}{2}\frac{3}{2}3}_{\ell_1\ell j} (\ell_1+\ell-1)(\ell_1+\ell+3) \verp{\{h} \verp{k} \verp{q\}_0} \right] \sigma^{q}_{CD} X^{kj}_{DB}~, \\ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_2 \frac{3}{2}}(\verp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^j_B}^* &= -\frac{9}{16\pi} \frac{\ell_1(\ell_1+1)}{2\ell_1+1} C^{\frac{3}{2}\frac{3}{2}2}_{\ell_2\ell j} X^{ip}_{AC} \verp{\{p} \verp{r\}_0} X^{rj}_{CB}~, \\ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_3 \frac{3}{2}}(\verp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^j_B}^* &= \frac{5}{192\pi} \frac{\sqrt{2j+1}}{(2\ell_1+1)(2\ell_2+1)} \sqrt{\frac{(2j+3)!}{(2j-2)!}} X^{ip}_{AC} \verp{\{p} \verp{q} \verp{r\}_0} \sigma^{q}_{CD} X^{rj}_{DB}. \end{aligned} \end{equation} With (\ref{eq:add3hal1})--(\ref{eq:add3hal4}) established, there are no further non-trivial relations of the form (\ref{eq:seed}) for two spin-3/2 spherical harmonics. \subsection{Addition theorems for one spin-0 and one spin-1 spherical harmonics} \label{sec:add01} Using the factorization of orbital and spin degrees of freedom in products of CG coefficients provided by (I.\ref{I.eq:10-2})---(I.\ref{I.eq:10-5}), we recover the results already given in (\ref{eq:sca-ten-addthr2}). \subsection{Addition theorems for one spin-1/2 and one spin-3/2 spherical harmonics} \label{sec:add13half} For $s=1/2$ and $s'=3/2$, with $\ell'=\ell$, the relation among CG coefficients (I.\ref{I.eq:3h1h-2}) or (I.\ref{I.eq:3h1h-5}), and (\ref{eq:mix1}) with $n=0$ and $t=1$, 2, together with (I.\ref{I.eq:L}) and (I.\ref{I.eq:LL}), lead to, \begin{equation} \label{eq:add13half1} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell \frac{3}{2}}(\verpp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{1}{2}}(\verp{})\right)_B}^* = \frac{2\ell+1}{8\pi} \sqrt{\frac{3}{2}}X^{ik}_{AC} \left[ C^{\frac{3}{2}\frac{1}{2}1}_{\ell\ell j} i v^k P'_\ell(x) \delta_{CB}\right. }\hspace{49ex}\\ &-\left. \frac{1}{4} C^{\frac{3}{2}\frac{1}{2}2}_{\ell\ell j} \left(v^{\{k} v^{j\}_0} P''_\ell(x) + \verp{\{k} \verpp{j\}_0}P'_{\ell}(x)\right) \sigma^j_{CB} \right], \end{aligned} \end{equation} with $C^{\frac{3}{2}\frac{1}{2}1,2}_{\ell_2\ell j}$ given by (I.\ref{I.eq:3h1h-2b}) and $X^{pq}_{FG}$ by (I.\ref{I.eq:nspincompl}). Notice that the subindex ``0'' in the second term on the r.h.s.\ of (\ref{eq:add13half1}) is actually not needed, because $X^{ik}_{AC} \sigma^k_{CB}\equiv 0$. The case with $s=3/2$ and $s'=1/2$ follows immediately from (\ref{eq:add13half1}) by complex conjugation and the exchange $\verp{}\leftrightarrow\verpp{}$. The equality in (\ref{eq:add13half1}) holds for $j=\ell\pm 1/2$, otherwise $Y_{jj_z}^{\ell \frac{1}{2}}(\verp{}) \equiv 0$. The case $|\ell'-\ell|=1$ follows from (I.\ref{I.eq:3h1h-7}), (\ref{eq:mix1}) with $n=1$, $t=0$ and (I.\ref{I.eq:rmat4a}), and (\ref{eq:mix1}) with $n=1$, $t=1$ and (I.\ref{I.eq:mix5a}) \begin{equation} \label{eq:add13half2} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_1 \frac{3}{2}}(\verpp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{1}{2}}(\verp{})\right)_B}^* = \frac{\ell_1-\ell}{8\pi} \sqrt{\frac{3}{2}} X^{ik}_{AC} \left[ C^{\frac{3}{2}\frac{1}{2}1}_{\ell_1\ell j} \left(\verpp{k} P'_{\ell_1}(x) - \verp{k} P'_\ell(x)\right) \delta_{CB}\right. }\hspace{50ex}\\ &+\left. \frac{i}{4} C^{\frac{3}{2}\frac{1}{2}2}_{\ell_1\ell j} \left(\verpp{\{k} v^{p\}} P''_{\ell_1}(x) - \verp{\{k} v^{p\}}P''_{\ell}(x)\right) \sigma^p_{CB} \right], \end{aligned} \end{equation} with the coefficients $C^{\frac{3}{2}\frac{1}{2}1,2}_{\ell_1\ell j}$ given by (I.\ref{I.eq:3h1h-7b}), with $\Delta s=1$. Eq.\ (\ref{eq:add13half2}) holds for $j=\ell\pm 1/2$, its l.h.s.\ vanishing otherwise. Similarly, \begin{equation} \label{eq:add13half2x} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_1 \frac{1}{2}}(\verpp{})\right)_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^i_B}^* = \frac{\ell_1-\ell}{8\pi} \sqrt{\frac{3}{2}} \left[ C^{\frac{1}{2}\frac{3}{2}1}_{\ell_1\ell j} \left(\verpp{k} P'_{\ell_1}(x) - \verp{k} P'_\ell(x)\right) \delta_{AC}\right. }\hspace{43ex} \\ &+\left. \frac{i}{4} C^{\frac{1}{2}\frac{3}{2}2}_{\ell_1\ell j} \left(\verpp{\{k} v^{p\}} P''_{\ell_1}(x) - \verp{\{k} v^{p\}}P''_{\ell}(x)\right) \sigma^p_{AC}\right] X^{ki}_{CB}~, \end{aligned} \end{equation} where now $C^{\frac{1}{2}\frac{3}{2}1,2}_{\ell_1\ell j}$ are given by (I.\ref{I.eq:3h1h-7b}) with $\Delta s=-1$, and the equality holds for $j=\ell_1\pm 1/2$. Finally, the last case to be considered is $\ell'-\ell=\pm2$. In this case we use the factorization of orbital and spin degrees of freedom from (I.\ref{I.eq:3h1h-c}), together with (\ref{eq:mix1}) with $n=2$, $t=1$ and (I.\ref{I.eq:rmat4b}). In this way we get, \begin{equation} \label{eq:add13half3} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_2 \frac{3}{2}}(\verpp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{1}{2}}(\verp{})\right)_B}^* = \frac{(\ell_1-\ell)}{4\pi} \sqrt{\frac{j+1/2}{\ell_1(\ell_1+1)(2\ell_1+1)}} X^{ik}_{AC} }\hspace{40ex} \\ &\times \left[ \verpp{(k} \verpp{p)_0} P''_{\ell_2}(x) - \verpp{\{k} \verp{p\}_0} P''_{\ell_1}(x) + \verp{(k} \verp{p)_0} P''_{\ell}(x)\right]\sigma^p_{CB} ~, \end{aligned} \end{equation} with $X^{ik}_{AC}$ defined as in the previous equations. The result (\ref{eq:add13half3}) applies if either $\ell_2 = \ell+2$ and $j=\ell+1/2$, or $\ell_2 = \ell-2$ and $j=\ell-1/2$, otherwise its l.h.s.\ trivially vanishes. Similarly, we can derive, \begin{equation} \label{eq:add13half4} \begin{aligned} \lefteqn{ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_2 \frac{1}{2}}(\verpp{})\right)_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^i_B}^* = -\frac{(\ell_1-\ell)}{4\pi} \sqrt{\frac{j+1/2}{\ell_1(\ell_1+1)(2\ell_1+1)}} \sigma^k_{AC} }\hspace{40ex} \\ &\times \left[ \verpp{(k} \verpp{p)_0} P''_{\ell_2}(x) - \verpp{\{k} \verp{p\}_0} P''_{\ell_1}(x) + \verp{(k} \verp{p)_0} P''_{\ell}(x)\right] X^{pi}_{CB} ~, \end{aligned} \end{equation} the extra minus sign in the r.h.s., with respect to (\ref{eq:add13half3}), coming from the factor $\Delta s$ in (I.\ref{I.eq:3h1h-cb}). Now (\ref{eq:add13half4}) holds if either $\ell_2 = \ell+2$ and $j=\ell+3/2$, or $\ell_2 = \ell-2$ and $j=\ell-3/2$. Setting $\verpp{}=\verp{}$ in the above equalities, we obtain the local sums \begin{equation} \label{eq:add13half-local} \begin{aligned} \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell \frac{3}{2}}(\verpp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{1}{2}}(\verp{})\right)_B}^* &= -\sqrt{\frac{3}{2}} \frac{2\ell+1}{64\pi} \ell(\ell+1) C^{\frac{3}{2}\frac{1}{2}2}_{\ell\ell j} X^{ik}_{AC} \verp{\{k}\verp{j\}_0} \sigma^j_{CB}, \\ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_1 \frac{3}{2}}(\verpp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{1}{2}}(\verp{})\right)_B}^* &= \frac{1}{16\pi} \sqrt{\frac{3}{2}} (\ell_1+\ell+1) C^{\frac{3}{2}\frac{1}{2}1}_{\ell_1\ell j} X^{ik}_{AB} \verp{k},\\ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_1 \frac{1}{2}}(\verpp{})\right)_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^i_B}^* &= \frac{1}{16\pi} \sqrt{\frac{3}{2}} (\ell_1+\ell+1) C^{\frac{1}{2}\frac{3}{2}1}_{\ell_1\ell j} \verp{k} X^{ki}_{AB},\\ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_2 \frac{3}{2}}(\verpp{})\right)^i_A {\left(Y_{jj_z}^{\ell \frac{1}{2}}(\verp{})\right)_B}^* &= \frac{3}{16\pi} (\ell_1-\ell)\sqrt{\frac{(j+1/2)\ell_1(\ell_1+1)}{2\ell_1+1}} X^{ik}_{AC} \verp{\{k} \verp{p\}_0} \sigma^p_{CB},\\ \sum_{j_z=-j}^j \left(Y_{jj_z}^{\ell_2 \frac{1}{2}}(\verpp{})\right)_A {\left(Y_{jj_z}^{\ell \frac{3}{2}}(\verp{})\right)^i_B}^* &= -\frac{3}{16\pi} (\ell_1-\ell)\sqrt{\frac{(j+1/2)\ell_1(\ell_1+1)}{2\ell_1+1}} \sigma^p_{AC} \verp{\{p} \verp{k\}_0} X^{ki}_{CB}. \end{aligned} \end{equation} No further non-trivial addition theorems of the form (\ref{eq:seed}) can be given for one spin-1/2 and one spin-3/2 spherical harmonics. \section{Final Remarks} \label{sec:finrem} Using the results of I we developed here a systematic approach to the derivation of addition theorems for spin spherical harmonics. The results of our approach are appropriately summarized by the general expressions (\ref{eq:mix1}), (\ref{eq:mix2}) for bilocal sums of spherical harmonics, which are also explicit expressions for bilocal spherical harmonics, the general form (\ref{eq:sca-ten-addthr1}) of the addition theorem for one scalar and one tensor spherical harmonics, and the general form (\ref{eq:adthrgen}) of the addition theorem for two spin spherical harmonics. Those results are based on the irreducible-tensor matrix elements from sect.\ I.\ref{I.sec:proj}. Bilocal sums of a more general type can be obtained by means of reducible matrix elements, as illustrated by (\ref{eq:momres})---(\ref{eq:mix5}) and (\ref{eq:sca-ten-addthr5})---(\ref{eq:sca-ten-addthr7}). In sect.\ \ref{sec:2scalar} we give results for bilocal sums of ordinary spherical harmonics with certain weight functions depending on $\ell_z$. Many other classes of sums can in principle be obtained with the same techniques, by considering other matrix elements. In sect.\ \ref{sec:scalspin} we explicitly state addition theorems for and other bilocal sums of one scalar and one tensor spherical harmonics, up to rank 3. Results for higher ranks can equally well be obtained, although the involved amount of algebraic labor is a rapidly increasing function of rank. The local versions of those results are also of interest, and are summarized in sect.\ \ref{sec:scalspinlocal}. Addition theorems for spin spherical harmonics of the form (\ref{eq:seed}) are given in sect.\ \ref{sec:spin}, together with their local forms, for spins $1/2 \leq s'=s \leq 3/2$, and $(s',s)=(3/2,1/2)$ and (1/2,3/2). Similar results for arbitrary values of $s',s$ can be obtained as particular cases of (\ref{eq:adthrgen}) with the coefficients given by (I.\ref{I.eq:CGmaster}) and the matrix elements from sect.\ I.\ref{I.sec:proj} and app.\ I.\ref{I.sec:matele}. As in the previous case, however, for higher spins ($s',s>2$) the algebraic complexity of the results quickly grows unmanageable. Clearly, for spins larger than 2 an automated procedure would be needed. Even though there is no pressing physical need for such further generalizations, because higher spin states occur infrequently in nature, they could lead to improved calculational tools that would be of interest even in phenomenological contexts. The addition theorems for spin spherical harmonics given in sections \ref{sec:scalspin} and \ref{sec:spin} are directly applicable to the computation of partial-wave expansions of $S$-matrix elements for two-body scattering of particles with spin. As discussed in the introduction that is our main motivation for this paper, but we hope our results to be more widely applicable.
\section{Introduction} In \cite{biggs2}(or see also \cite{biggs}), Biggs laid the foundation for studying electric resistance on distance-regular graphs. Such graphs were shown to be very natural objects in the study of potential theory, due to the ease of making explicit calculations. In the same paper, Biggs made the following conjecture, which has recently been proved in \cite{markool}. \bt \lll{bigguy} Let G be a distance-regular graph with degree larger than 2 and diameter D. If $d_j$ is the electric resistance between any two vertices of distance $j$, then \be \max_j d_j = d_D \leq K d_1 \ee \noi where $K=1+\frac{94}{101} \approx 1.931$. Equality holds only in the case of the Biggs-Smith graph. \et \noi In this paper we prove several results which extend this theorem, the primary of which is the following. \bt \lll{latcor} Let G be a distance-regular graph with degree larger than 2 and diameter $D \geq 3$. Then \be \max_j d_j = d_D < (1+\frac{6}{k}) d_1 \ee \noi where $k$ is the degree of $G$. \et This will be seen to be a corollary of Theorem \ref{thispap} below. Note that $d_1 = \min_{1 \leq j \leq D} d_j$. Theorem \ref{latcor} therefore shows, essentially, that under the electric resistance metric all points are more or less equidistant in distance-regular graphs of large degree(other than the strongly regular graphs, which are handled in Section \ref{srgraphs}). We will proceed as follows. Section \ref{drgprop} gives the definition of distance-regular graphs, while Section \ref{prevkno} gives known properties of electric resistance on this class of graphs. Section \ref{newres} states the results of this paper, while Section \ref{test} gives a proof of our main result. Finally, Section \ref{srgraphs} discusses the case in which the underlying graph is strongly regular and Section \ref{conc} gives a few concluding remarks. \section{Distance-regular graphs} \lll{drgprop} All the graphs considered in this paper are finite, undirected and simple (for unexplained terminology and more details, see for example \cite{drgraphs}). Let $G$ be a connected graph and let $\VV=\VV(G)$ be the vertex set of $G$. The distance $d(x,y)$ between any two vertices $x,y$ of $G$ is the length of a shortest path between $x$ and $y$ in $G$. The diameter of $G$ is the maximal distance occurring in $G$ and we will denote this by $D = D(G)$. For a vertex $x \in \VV(G)$, define $K_i(x)$ to be the set of vertices which are at distance $i$ from $x~(0\le i\le D)$. In addition, define $K_{-1}(x):=\emptyset$ and $K_{D+1}(x) := \emptyset$. We write $x\sim_{G} y$ or simply $x\sim y$ if two vertices $x$ and $y$ are adjacent in $G$. A connected graph $G$ with diameter $D$ is called {\em distance-regular} if there are integers $b_i,c_i$ $(0 \le i \leq D)$ such that for any two vertices $x,y \in \VV(G)$ with $d(x,y)=i$, there are precisely $c_i$ neighbors of $y$ in $K_{i-1}(x)$ and $b_i$ neighbors of $y$ in $K_{i+1}(x)$ (cf. \cite[p.126]{drgraphs}). In particular, distance-regular graph $G$ is regular with valency $k := b_0$ and we define $a_i:=k-b_i-c_i$ for notational convenience. The numbers $a_i$, $b_{i}$ and $c_i~(0\leq i\leq D)$ are called the {\em intersection numbers} of $G$. Note that $b_D=c_0=a_0=0$, $b_0 = k$ and $c_1=1$. The intersection numbers of a distance-regular graph $G$ with diameter $D$ and valency $k$ satisfy (cf. \cite[Proposition 4.1.6]{drgraphs})\\ (i) $k=b_0> b_1\geq \cdots \geq b_{D-1}$;\\ (ii) $1=c_1\leq c_2\leq \cdots \leq c_{D}$;\\ (iii) $b_i\ge c_j$ \mbox{ if }$i+j\le D$.\\ Moreover, if we fix a vertex $x$ of $G$, then $|K_i(x)|$ does not depend on the choice of $x$ as $c_{i+1} |K_{i+1}(x)| = b_i |K_i(x)|$ holds for $i =1, 2, \ldots D-1$. We will therefore write $K_i$ instead of $K_i(x)$ where convenient. In the next section, it will be shown that the resistance between any two vertices of $G$ can be calculated explicitly using only the intersection array, so that the proof can be conducted using only the known properties of the array. \section{Electric resistance on distance-regular graphs} \lll{prevkno} Henceforth let $G$ be a distance-regular graph with $n$ vertices, degree $k \geq 3$, and diameter $D$. To calculate the resistance between any two vertices we use Ohm's Law, which states that \be \label{} V=IR \ee \noi where $V$ represents a difference in voltage(or potential), $I$ represents current, and $R$ represents resistance. That is, we imagine that our graph is a circuit where each edge is a wire with resistance 1. We attach a battery of voltage $V$ to two distinct vertices $u$ and $v$, producing a current through the graph. The resistance between $u$ and $v$ is then $V$ divided by the current produced. The current flowing through the circuit can be determined by calculating the voltage at each point on the graph, then summing the currents flowing from $u$, say, to all vertices adjacent to $u$. Calculating the voltage at each point is thereby seen to be an important problem. A function $f$ on the vertex set $\VV$ is harmonic at a point $z\in \VV$ if $f(z)$ is the average of neighboring values of $f$, that is \be \label{} \sum_{x\sim z} (f(x)-f(z)) = 0 \ee The voltage function on $\VV$ can be characterized as the unique function which is harmonic on $\VV-\{u,v\}$ having the prescribed values on $u$ and $v$. For our purposes, on the distance-regular graph $G$, we will first suppose that $u$ and $v$ are adjacent. It is easy to see that, for any vertex $z$, $|d(u,z)-d(v,z)| \leq 1$, where $d$ denotes the ordinary graph-theoretic distance. Thus, any $z$ must be contained in a unique set of one of the following forms: \bea \label{} && K_i^i = \{x: d(u,x)=i \mbox{ and } d(v,x)=i \} \\ \nn && K_i^{i+1} = \{x: d(u,x)=i+1 \mbox{ and } d(v,x)=i \} \\ \nn && K_{i+1}^i = \{x: d(u,x)=i \mbox{ and } d(v,x)=i+1 \} \eea \noi Suppose that $(b_0,b_1,\ldots ,b_{D-1};c_1,c_2,\ldots,c_D)$ is the intersection array of $G$. For $0 \leq i \leq D-1$ define the numbers $\phi_i$ recursively by \bea \label{smile} && \pp_0=n-1 \\ \nn && \pp_i = \frac{c_i\pp_{i-1}-k}{b_i} \eea It can be shown(see \cite{biggs2} or \cite{markool}) that $\phi_0,\phi_1, \ldots, \phi_{D-1}$ is a strictly decreasing sequence. The explicit value of $\phi_i$ is given by the following equation, first stated by Biggs in \cite{biggs2}. \be \label{nut} \phi_i = k\Big(\frac{1}{c_{i+1}} + \frac{b_{i+1}}{c_{i+1}c_{i+2}} + \ldots + \frac{b_{i+1} \ldots b_{D-1}}{c_{i+1} \ldots c_{D}} \Big) \ee We then have the following fundamental proposition from \cite{biggs2}. \begin{proposition} \label{vp} The function $f$ defined on $\VV$ by \bea \label{} && f(u) = -f(v) = \pp_0 \\ \nn && f(z)= 0 \mbox{ for } x \in K_{i}^i \\ \nn && f(z)= \pp_i \mbox{ for } x \in K_{i+1}^i \\ \nn && f(z)= -\pp_i \mbox{ for } x \in K^{i+1}_i \eea is harmonic on $\VV-\{u,v\}$. \end{proposition} This leads to the following, also given in \cite{biggs2}. \begin{corollary} \label{tool} The resistance between two vertices of distance $j$ in a graph is given by \be \label{} d_j = \frac{2\sum_{0\leq i<j}\pp_i}{nk} \ee \end{corollary} Theorem \ref{bigguy} and Corollary \ref{tool} imply that \be d_{D} \leq \frac{4\pp_0}{nk} < \frac{4}{k} \ee so that the maximal resistance between any two points on a distance-regular graph goes to 0 as the degree of the graph goes to infinity. Note also that Theorem \ref{bigguy} implies the following. \be \label{} \frac{d_D}{d_1} = \frac{\phi_0 + \ldots + \phi_{D-1}}{\phi_{0}} \leq \frac{195}{101} \ee with equality holding only in the case of Biggs-Smith graph. \section{Results on $\phi_i$ for $i \geq 1$} \lll{newres} The discussion in the previous section indicates that understanding the behavior of the $\phi_i$'s is crucial for understanding the theory of electric resistance on distance-regular graphs. In this section, we present some further results. Theorem \ref{bigguy} shows that $\phi_0$ bounds the sum of the terms which follow. Similar behavior is exhibited by the ensuing $\phi_i$'s, as the following theorem indicates. \bt \lll{iii} For any $m \geq 0$, \be \label{} \phi_{m+1} + \ldots + \phi_{D-1} < (3m+3)\phi_m \ee \et {\bf Proof:} If $D \leq 4(m+1)$, this is trivial due to the strict monotonicity of the $\phi_i$'s. Suppose $D>4(m+1)$. By Lemma 5.2 of \cite{hbk}, $l \geq m+2$, where $l$ is the unique integer which satisfies $\frac{b_{l-1}}{c_{l-1}}\geq 2$ but $\frac{b_l}{c_l}<2$. Again applying Lemma 5.2 of \cite{hbk}, we see that $D \leq 4l$. Using the fact that \be \lll{comm} \frac{\phi_i}{\phi_{i-1}} < \frac{c_i}{b_i} \ee and the monotonicity of the $\phi_i$'s, we have \bea \label{} && \frac{\phi_{m+1} + \ldots + \phi_{D-1}}{\phi_m} < \frac{1}{2} + \frac{1}{4} + \ldots + \frac{1}{2^{l-m-1}} + \frac{1}{2^{l-m-1}}(3l) \\ \nn && \hspace{1cm} < 1 + \frac{3l}{2^{l-m-1}} \eea The last expression is decreasing in $l$, so we can bound it by plugging in $l=m+2$ to get \be \label{} \frac{\phi_{m+1} + \ldots + \phi_{D-1}}{\phi_m} < 1 + \frac{3(m+2)}{2}<3m+3 \ee \qed If we take $m=1$ we get $\phi_{2} + \ldots + \phi_{D-1} < 6 \phi_1$. However, this can be improved quite a bit as is shown by the following theorem, which is the main result of this paper. \bt \lll{thispap} \be \phi_{2} + \ldots + \phi_{D-1} \leq\phi_1 \ee with equality holding only in the case of the dodecahedron. \et The proof of this theorem relies on analyzing a number of cases, and is given in Section \ref{test}. This theorem yields an interesting consequence when combined with Corollary \ref{tool}. Let us consider the ratio of $d_1$ with the maximal possible resistance on $G$, $d_D$. This is given by \be \label{} \frac{d_D}{d_1} = \frac{\phi_0 + \ldots + \phi_{D-1}}{\phi_{0}} \ee Theorem \ref{bigguy} implies that this ratio is bounded by 2. Theorem \ref{thispap} improves this bound, for we see that \be \label{} \frac{d_D}{d_1} \leq \frac{\phi_0 + 2\phi_1}{\phi_{0}} \ee If $G$ is not strongly regular(diameter 2), then $b_1 \geq k/3$ by Lemma 3 of \cite{parkool2}, and since $c_1$ is necessarily 1 we see that $\phi_1 < \frac{3}{k} \phi_0$. This allows us to obtain the following corollary, referred to earlier as Theorem \ref{latcor}. \begin{corollary} \label{hhh22} \be \frac{d_D}{d_1} \leq 1+\frac{6}{k} \ee \end{corollary} This shows that for large $k$, all points become nearly equidistant when measured with respect to the resistance metric. We remark further that it has been shown that $b_1 \geq k/2$ in all but a small number of known families of distance-regular graphs; see Theorem 11 in \cite{parkool2}. We may therefore replace the $1+\frac{6}{k}$ by $1+\frac{4}{k}$ in many cases if desired. We would like to thank Professor Tommy Jensen for posing the question to us whether something like Corollary \ref{hhh22} might be true. \ind In light of Theorems \ref{bigguy} and \ref{thispap} it may be tempting to hope that $\phi_{m+1} + \ldots + \phi_{D-1} \leq \phi_m$ for all $m$. However, the Biggs-Smith graph, with intersection array $(3,2,2,2,1,1,1;1,1,1,1,1,1,3)$, yields the following potentials. \be \label{} \phi_0=101, \phi_1=49, \phi_2=23, \phi_3=10, \phi_4=7, \phi_5=4, \phi_6=1 \ee Note that $\phi_4 + \phi_5 + \phi_6 > \phi_3$. Nonetheless, we do conjecture the following strengthening of Theorem \ref{iii}. \begin{conjecture} There is a universal constant $K$ such that \be \phi_{m+1} + \ldots + \phi_{D-1} \leq K \phi_m \ee for all $m$ and all distance-regular graphs. \end{conjecture} \vski It is an educated guess that $2$ might work for $K$, but we do not at this stage have a proof. \section{Proof of Theorem \ref{thispap}} \lll{test} As in the proof of Theorem \ref{bigguy} in \cite{markool}, we will consider a number of special cases. \vski \ccases{smallD}: $D \leq 3$. There is nothing to prove when $D=2$, and the case $D=3$ is trivial, since $\phi_2<\phi_1$. \hfill $\triangle$ \vski \ccases{deg3}: $k=3$. It is known(see \cite{drgraphs}, Theorem 7.5.1) that the only distance-regular graphs of degree 3 with diameter greater than 3 are given by the intersection arrays below, and which give rise to the resistances below: \begin{tabular}{ l c c r } Name & Vertices & Intersection array & $\frac{\phi_2+ \ldots \phi_{D-1}}{\phi_1}$ \\ \hline Pappus graph & 18 & (3,2,2,1;1,1,2,3) & 0.428571 \\ Coxeter graph & 28 & (3,2,2,1;1,1,1,2) & 0.5 \\ Tutte's 8-cage & 30 & (3,2,2,2;1,1,1,3) & 0.461538 \\ Dodecahedron & 20 & (3,2,1,1,1;1,1,1,2,3) & 1.0 \\ Desargues graph & 20 & (3,2,2,1,1;1,1,2,2,3) & 0.6875 \\ Tutte's 12-cage & 126 & (3,2,2,2,2,2;1,1,1,1,1,3) & 0.786885 \\ Biggs-Smith graph & 102 & (3,2,2,2,1,1,1;1,1,1,1,1,1,3) & 0.918367 \\ Foster graph & 90 & (3,2,2,2,2,1,1,1;1,1,1,1,2,2,2,3) & 0.854651 \\ \end{tabular} \vski \ccases{deg4}: $k=4$. It is known(see \cite{broukool}) that the only distance-regular graphs of degree 4 with diameter greater than 3 are given by the intersection arrays below, and which give rise to the resistances below: \noi \begin{tabular}{ l c c r } Name & Vertices & Intersection array & $\frac{\phi_2+ \ldots \phi_{D-1}}{\phi_1}$ \\ \hline 4-cube & 16 & (4,3,2,1;1,2,3,4) & 0.727273\\ Flag graph of $PG(2,2)$ & 21 & (4,2,2;1,1,2) & 0.25\\ Incidence graph of $PG(2,3)$ & 26 & (4,3,3;1,1,4) & 0.142857\\ Incidence graph of $AG(2,4)$-p.c. & 32 & (4,3,3,1;1,1,3,4) & 0.296296\\ Odd graph $O_4$ & 35 & (4,3,3;1,1,2) & 0.2\\ Flag graph of $GQ(2,2)$ & 45 & (4,2,2,2;1,1,1,2) & 0.5\\ Doubled odd graph & 70& (4,3,3,2,2,1,1;1,1,2,2,3,3,4)& 0.661538\\ Incidence graph of $GQ(3,3)$ & 80 & (4,3,3,3;1,1,1,4) & 0.32\\ Flag graph of $GH(2,2)$ & 189 & (4,2,2,2,2,2;1,1,1,1,1,2) & 0.804348\\ Incidence graph of $GH(3,3)$ & 728 & (4,3,3,3,3,3;1,1,1,1,1,4) & 0.46473\\ \end{tabular} \vski \ccases{niceb2c2}: $\frac{b_2}{c_2} \geq 10$. \vski Applying Theorem \ref{iii}, we have $\phi_2 + \ldots + \phi_{D-1} \leq 10 \phi_2$, so the result follows on noting $\phi_2 < \frac{c_2}{b_2} \phi_1$. \hfill $\triangle$ \vski \ccases{smallD4}: $D = 4, c_3>1$. It is a consequence of \cite[Theorem 5.4.1]{drgraphs} that $c_3 \geq \frac{3}{2}c_2$. Using \rrr{nut}, we have \be \lll{fff} \frac{c_2c_3c_4}{k}(\phi_1-\phi_2-\phi_3) = c_3c_4 + b_2c_4 + b_2b_3 -c_2c_4 - c_2b_3 - c_2c_3 \ee But $b_2 \geq c_2$ by Property $(iii)$ of Section \ref{drgprop}, and thus $b_2c_4 \geq c_2c_3$, $b_2b_3 \geq c_2b_3$. Since $c_3c_4 \geq \frac{3}{2}c_2c_4$, \rrr{fff} is strictly positive. \hfill $\triangle$ \vski \ccases{smallD5}: $D = 5, c_3>1$. \vski The following lemma will be useful in this and subsequent cases. \begin{lemma} \lll{mj} Suppose $c_3\geq2$ and $D\geq5$. Then $c_3 \geq \frac{3}{2}c_2$, and either $c_4\geq2c_2$ or $c_5\geq c_2+c_3$. In both cases we have $c_5 \geq 2 c_2$, and if $c_5\geq c_2+c_3$ then $c_5\geq \frac{5}{2}c_2$. \end{lemma} {\bf Proof:} If $c_2\geq2$, then $c_3\geq\frac{3}{2}c_2$ holds by \cite[Theorem 5.4.1]{drgraphs}, while if $c_2=1$ then $c_3 \geq 2 = 2c_2$, proving that $c_3 \geq \frac{3}{2}c_2$ in all cases. Let $j\geq4$ be the minimal integer such that $c_{j-1}<c_j$. Then $j=4$ or $5$ by \cite[Theorem 1.1]{hbk}. If $j=4$(i.e., $c_3<c_4$), then $c_4\geq c_2+c_{4-2}=2c_2$ holds by \cite[Proposition 1 (ii)]{koolen}. Similarly, $c_5\geq c_2+c_{5-2}=c_2+c_3$ holds when $j=5$. This proves the first statement, and the last statement is a simple consequence of the first. This proves the lemma. \hfill $\lozenge$ \vski Now, if $\frac{b_2}{c_2} < \frac{3}{2}$, Lemma \ref{mj} shows that $c_3>b_2$, contradicting Property $(iii)$ of Section \ref{drgprop}. Thus, we may assume $\frac{b_2}{c_2} \geq \frac{3}{2}$. Thus, $\phi_1-\phi_2 = \Big(\frac{b_2\phi_2+k}{c_2}\Big) - \phi_2 \geq \frac{k}{c_2} + \frac{1}{2}\phi_2$. We therefore have \bea \label{} && \frac{c_3c_4c_5}{k}(\phi_1-\phi_2-\phi_3-\phi_{4}) \\ \nn && \hspace{1cm} \geq \frac{c_3c_4c_5}{k}(\frac{k}{c_2}+\frac{1}{2}\phi_2-\phi_3-\phi_{4}) \\ \nn && \hspace{1cm} \geq c_3c_4c_5(\frac{1}{c_2}+\frac{1}{2}(\frac{1}{c_3}+\frac{b_3}{c_3c_4} + \frac{b_3b_4}{c_3c_4c_5})-(\frac{1}{c_4}+\frac{b_4}{c_4c_5})-\frac{1}{c_5}) \\ \nn && \hspace{1cm} = (\frac{c_4}{c_2}-1)c_3c_5+\frac{1}{2}(c_4c_5+b_3c_5 + b_3b_4)-c_3c_4-c_3b_4 \eea If $c_4\geq 2 c_2$, then $(\frac{c_4}{c_2}-1) \geq 1$, and we are reduced to showing \be \lll{} c_3c_5+\frac{1}{2}(c_4c_5+b_3c_5 + b_3b_4)>c_3c_4+c_3b_4 \ee This is clear, since $c_3c_5 \geq c_3c_4$ and $b_3c_5 \geq c_3b_4$, while $c_4c_5 \geq c_3b_4$ if $b_4 \leq c_4$ whereas $b_3b_4 > c_3b_4$ if $b_4 > c_4$. Now, if $c_4<2c_2$ we still have $c_4 \geq \frac{3}{2}c_2$ by \cite[Theorem 5.4.1]{drgraphs}, and Lemma \ref{mj} and its proof show that $c_3=c_4$. We must therefore show \be \lll{rent} \frac{1}{2}(c_3c_5+c_4c_5+b_3c_5 + b_3b_4)>c_3c_4+c_3b_4 = c_3^2 + c_3b_4 \ee Also by Lemma \ref{mj} we have $c_5\geq c_2+c_3$. We see that \bea \lll{rent2} \nn \\ \nn && \frac{1}{2}(c_3c_5+c_4c_5+b_3c_5 + b_3b_4)> \frac{1}{2}(2c_3^2+2c_2c_3+b_3c_5 + b_3b_4) \\ \\ \nn && \hspace{1cm} > \frac{3}{2} c_3^2 + \frac{1}{2}(b_3c_5 + b_3b_4) \eea In all cases $b_3c_5 \geq c_3b_4$, and if $c_3 \geq b_3$ then $c_3^2 \geq c_3b_4$, whereas if $c_3< b_3$ then $b_3b_4 > c_3 b_4$. We conclude either way that \be \label{rent3} \frac{3}{2} c_3^2 + \frac{1}{2}(b_3c_5 + b_3b_4) \geq c_3^2 + c_3b_4 \ee \rrr{rent2} and \rrr{rent3} together verify \rrr{rent}. \hfill $\triangle$ \vski \ccases{niceD}: $6 \leq D \leq \frac{2b_2}{c_2}+2$, $c_3 > 1$. \vski Let $\aaa=D-4$, so that $\frac{b_2}{c_2} \geq 1+\frac{\aaa}{2}$, and \be \phi_1-\phi_2 = \Big(\frac{b_2\phi_2+k}{c_2}\Big) - \phi_2 \geq \frac{k}{c_2} + \frac{\aaa}{2}\phi_2 \ee We will show $\frac{\phi_1-\phi_2-\cdots-\phi_{D-1}}{k}>0$. We have \bea \label{} && \frac{\phi_1-\phi_2-\cdots-\phi_{D-1}}{k} \\ \nn && \hspace{1cm} \geq \frac{\frac{k}{c_2}+\frac{\aaa}{2}\phi_2-\phi_3-\cdots-\phi_{D-1}}{k} \\ \nn && \hspace{1cm} = \Bigg\{\frac{1}{c_2}+\frac{\alpha}{2}\times\frac{1}{c_3}-\frac{1}{c_4}-\frac{1}{c_5}-\cdots-\frac{1}{c_{\alpha+4}} \Bigg\} \\ \nn && \hspace{1.5cm}+ \Bigg\{\frac{\alpha}{2}\Big(\frac{b_3}{c_3c_4}+\frac{b_3b_4}{c_3c_4c_5}+\cdots+\frac{b_3b_4\cdots b_{\alpha+3}}{c_3c_4c_5\cdots c_{\alpha+4}}\Big) \\ \nn && \hspace{1.5cm} -\Big(\frac{b_4}{c_4c_5}+\frac{b_4b_5}{c_4c_5c_6}+\cdots+\frac{b_4b_5\cdots b_{\alpha+3}}{c_4c_5\cdots c_{\alpha+4}}\Big) \\ \nn && \hspace{5cm} \vdots \\ \nn && \hspace{1.5cm} - \Big(\frac{b_{\alpha+3}}{c_{\alpha+3}c_{\alpha+4}}\Big) \Bigg\} \\ \nn && \hspace{1cm} =: \Big\{ I \Big\} + \Big\{ II \Big\} \eea We may now invoke the ensuing two lemmas. Lemma \ref{jimmy} below shows that $\{II\}$ is positive in the preceding expression, and Lemma \ref{river} shows that $\{I\}$ is nonnegative. \begin{lemma} \lll{jimmy} For any $\gg$ with $2 \leq \gg \leq D-4$, the expression defined by $\{II\}$ is positive. \end{lemma} We will show this lemma by induction on $\gg$. If $\gg=2$, then $D \geq 6$, and thus $b_3\geq c_3$. We therefore know $\frac{b_3b_4}{c_3c_4c_5}\geq\frac{b_4}{c_4c_5}$ and $\frac{b_3b_4b_5}{c_3c_4c_5c_6}\geq\frac{b_4b_5}{c_4c_5c_6}$. As $c_3\geq2$, we have $|\{i|c_i=c_3\}|\leq2$ (\cite[Theorem 1.1]{hbk}), which implies $c_5>c_3$. We see that $\frac{b_3}{c_3c_4}>\frac{b_5}{c_5c_6}$, as $b_3\geq b_5$ and $c_6\geq c_4$. This proves the lemma for $\gg=2$. \vski Suppose now that the lemma is true for $\gg$. Using the induction hypothesis, in order to obtain the result for $\gg+1$ we need to show \bea \label{cov} && \frac{1}{2}(\frac{b_3}{c_3c_4}+\frac{b_3b_4}{c_3c_4c_5}+\cdots+\frac{b_3b_4\cdots b_{\gg+3}}{c_3c_4\cdots c_{\gg+3}c_{\gg+4}})+\frac{\gg+1}{2}\times\frac{b_3b_4\cdots b_{\gg+4}}{c_3c_4\cdots c_{\gg+4}c_{\gg+5}} \\ \nn && \hspace{1cm} \geq\frac{b_4b_5\cdots b_{\gg+3}b_{\gg+4}}{c_4c_5\cdots c_{\gg+3}c_{\gg+4}c_{\gg+5}}+\frac{b_5b_6\cdots b_{\gg+3}b_{\gg+4}}{c_5c_6\cdots c_{\gg+3}c_{\gg+4}c_{\gg+5}}+\cdots+\frac{b_{\gg+4}}{c_{\gg+4}c_{\gg+5}} \eea Note that \be \lll{spy} \frac{b_ib_{i+1}\cdots b_j}{c_ic_{i+1}\cdots c_j}=\frac{b_i}{c_j}\times\frac{b_{i+1}}{c_{j-1}}\times\cdots\times\frac{b_j}{c_i}\geq 1 \ee if $i+j\leq D$. This will be an important fact for us. We first suppose that $\gg+1$ is an even integer. We can check easily that \bea && \nn \frac{\gg+1}{2}\times\frac{b_3b_4\cdots b_{\gg+4}}{c_3c_4\cdots c_{\gg+4}c_{\gg+5}} \geq\frac{b_4b_5\cdots b_{\gg+3}b_{\gg+4}}{c_4c_5\cdots c_{\gg+3}c_{\gg+4}c_{\gg+5}}+\frac{b_5b_6\cdots b_{\gg+3}b_{\gg+4}}{c_5c_6\cdots c_{\gg+3}c_{\gg+4}c_{\gg+5}} + \\ \nn && \hspace{1cm} \cdots+\frac{b_{(\gg+1)/2+3}b_{(\gg+1)/2+4}\cdots b_{\gg+3}b_{\gg+4}}{c_{(\gg+1)/2+3}c_{(\gg+1)/2+4}\cdots c_{\gg+3}c_{\gg+4}c_{\gg+5}} \eea due to \rrr{spy} and the fact that $3+(\frac{\gg+1}{2}+2) \leq D$. Also, we may show that \bea && \nn \frac{1}{2}(\frac{b_3b_4\cdots b_{\gg+3-2i}}{c_3c_4\cdots c_{\gg+4-2i}}+\frac{b_3b_4\cdots b_{\gg+2-2i}}{c_3c_4\cdots c_{\gg+3-2i}}) \\ \nn && \hspace{.2cm} \geq \frac{1}{2}(\frac{b_3\cdots b_{(\gg+1)/2+2-i}b_{(\gg+1)/2+4+i}\cdots b_{n+3}}{c_3\cdots c_{(\gg+1)/2+2-i}c_{(\gg+1)/2+4+i}\cdots c_{\gg+4}}+\frac{b_3\cdots b_{(\gg+1)/2+1-i}b_{(\gg+1)/2+4+i}\cdots b_{n+3}}{c_3\cdots c_{(\gg+1)/2+1-i}c_{(\gg+1)/2+4+i}\cdots c_{\gg+4}}) \\ \nn && \hspace{.2cm} \geq\frac{b_{(\gg+1)/2+4+i}\cdots b_{\gg+3}b_{\gg+4}}{c_{(\gg+1)/2+4+i}\cdots c_{\gg+3}c_{\gg+4}c_{\gg+5}} \eea holds for $i=0,1,\ldots,\frac{n-1}{2}$. To see this, note that the first inequality is obtained by merely shifting some of the indices, resulting in smaller quotients, and the second inequality is due again to \rrr{spy} and the fact that $3+(\gg+1)/2+2-i \leq D$. Thus, \rrr{cov} is true when $\gg+1$ is an even integer. \vski Now let us suppose that $\gg+1$ is an odd integer. By the same arguments as above, we have \bea && \frac{\gg}{2}\times\frac{b_3b_4\cdots b_{\gg+4}}{c_3c_4\cdots c_{\gg+4}c_{\gg+5}}\geq\frac{b_4b_5\cdots b_{\gg+3}b_{\gg+4}}{c_4c_5\cdots c_{\gg+3}c_{\gg+4}c_{\gg+5}}+\frac{b_5b_6\cdots b_{\gg+3}b_{\gg+4}}{c_5c_6\cdots c_{\gg+3}c_{\gg+4}c_{\gg+5}}+ \\ \nn && \hspace{1cm} \cdots+\frac{b_{\gg/2+3}b_{\gg/2+4}\cdots b_{\gg+3}b_{\gg+4}}{c_{\gg/2+3}c_{\gg/2+4}\cdots c_{\gg+3}c_{\gg+4}c_{\gg+5}} \eea and \be \frac{1}{2}(\frac{b_3b_4\cdots b_{\gg+4-2i}}{c_3c_4\cdots c_{\gg+5-2i}}+\frac{b_3b_4\cdots b_{\gg+3-2i}}{c_3c_4\cdots c_{\gg+4-2i}})\geq\frac{b_{\gg/2+4+i}\cdots b_{\gg+3}b_{\gg+4}}{c_{\gg/2+4+i}\cdots c_{\gg+3}c_{\gg+4}c_{\gg+5}} \ee for $i=0,1,\ldots,\frac{n}{2}$. Thus, \rrr{cov} is true if $n+1$ is an odd integer. This completes the induction and the proof of the lemma. \hfill $\lozenge$ \begin{lemma} \lll{river} For any $\gg$ with $0 \leq \gg \leq D-4$, we have \be \lll{time} \frac{1}{c_2}+\frac{\gg}{2}\times\frac{1}{c_3}\geq\frac{1}{c_4}+\frac{1}{c_5}+\cdots+\frac{1}{c_{\alpha+4}} \ee \end{lemma} To prove this, let us consider several cases. We begin with $\gg=1$, as the case $\gg=0$ is trivial. Note that we are still assuming $c_3>1$. \vski $(i)$ For $\gg=1$, by Lemma \ref{mj} we have $c_5 \geq 2c_2$. As a consequence of Theorem 5.4.1 of \cite{drgraphs} and the fact that $c_3>1$, $c_2 \leq \frac{2}{3}c_3$, whence $\frac{1}{3} \times \frac{1}{c_2} \geq \frac{1}{2}\times \frac{1}{c_3}$. Thus, \be \frac{1}{c_2} + \frac{1}{2}\times\frac{1}{c_3} \geq \frac{2}{3} \times \frac{1}{c_2} + \frac{1}{c_3} \geq \frac{2}{3} \times 2 \times \frac{1}{c_5} + \frac{1}{c_3} > \frac{1}{c_4} + \frac{1}{c_5}. \ee \vski $(ii)$ For $\gg=2$, we know that $c_5\geq2c_2$ holds by Lemma \ref{mj}. Thus, $\frac{1}{c_2} \geq\frac{2}{c_5}\geq\frac{1}{c_5}+\frac{1}{c_6}$, and the result follows by noting $c_3\leq c_4$. \vski $(iii)$ For $\gg=3$, we first assume $c_5>c_4$, which implies $c_5\geq c_2+c_3$ by \cite[Proposition 1 (ii)]{koolen}. If $c_3\geq2c_2$, then $c_5\geq3c_2$ holds, hence $\frac{1}{c_2}\geq\frac{3}{c_5}\geq\frac{1}{c_5}+\frac{1}{c_6}+\frac{1}{c_7}$. The inequality therefore holds, as $\frac{3}{2}\times\frac{1}{c_3}\geq\frac{1}{c_4}$. So we may assume $c_3<2c_2$. i.e., $\frac{1}{c_3}>\frac{1}{2}\times\frac{1}{c_2}$. Note that $c_5\geq\frac{5}{2}c_2$ by Lemma \ref{mj}. This implies $\frac{1}{c_2}+\frac{1}{2}\times\frac{1}{c_3}>\frac{5}{4}\times\frac{1}{c_2}>\frac{6}{5}\times\frac{1}{c_2}\geq\frac{1}{c_5}+\frac{1}{c_6}+\frac{1}{c_7}$. The inequality therefore holds, as $c_3\leq c_4$. Now suppose $c_5=c_4$. The proof of Lemma \ref{mj} implies that $c_4 \geq 2c_2$. By \cite[Theorem 1.1]{hbk}, we know that $|\{i|c_i=c_4\}|\leq 3$, which implies that either $c_6>c_5$ or $c_7>c_6$. Both cases imply $c_7\geq2c_3$ by \cite[Proposition 1 (ii)]{koolen}, and thus $\frac{1}{2}\times\frac{1}{c_3}\geq\frac{1}{c_7}$. We therefore have $\frac{1}{c_2} \geq \frac{1}{c_4}+\frac{1}{c_5}$ and $\frac{3}{2}\times\frac{1}{c_3} \geq \frac{1}{c_4} + \frac{1}{c_7}$. The result follows. \vski $(iv)$ For $\gg=4$, suppose $c_i>c_{i-1}$ holds for some $i\in\{6,7,8\}$. Then, by \cite[Proposition 1 (ii)]{koolen}, $c_i\geq2c_3$. This is enough to give the result, for in all cases $2c_3\leq c_8$, and thus we may replace $\frac{1}{c_8}$ by $\frac{1}{2} \times \frac{1}{c_3}$ in the right side of \rrr{time} and appeal to $(iii)$. We may therefore assume $c_5=c_6=c_7=c_8$. By \cite[Theorem 1.1]{hbk}, we know that $|\{i|c_i=c_4\}|\leq 3$, and thus $c_5>c_4$. As $\frac{1}{c_3}\geq\frac{1}{c_4}$, we want to show $\frac{1}{c_2}+\frac{1}{c_3}\geq\frac{1}{c_5}+\frac{1}{c_6}+\frac{1}{c_7}+\frac{1}{c_8}=\frac{4}{c_5}$. To show this, let us assume $\frac{1}{c_2}+\frac{1}{c_3}<\frac{4}{c_5}$ and derive a contradiction. Let $c_5=\beta c_2$ (We know $\beta \geq 2$ by Lemma \ref{mj}). Then $c_5\geq c_2+c_3$ by \cite[Proposition 1 (ii)]{koolen}, and thus $c_3\leq(\beta-1)c_2$. We see that $\frac{1}{\beta-1}\times\frac{1}{c_2}\leq\frac{1}{c_3}$ holds. As $\frac{1}{c_3}<\frac{4}{c_5}-\frac{1}{c_2}=(\frac{4}{\beta}-1)\times\frac{1}{c_2}$, we have $\frac{1}{\beta-1}<\frac{4}{\beta}-1$, which implies $(\beta-2)^2<0$. Clearly, this is a contradiction, and therefore the desired inequality holds. \vski $(v)$ For $\gg\geq5$, we know $c_9\geq2c_3$ by \cite[Proposition 1 (ii)]{koolen} and \cite[Theorem 1.1]{hbk}. Thus, $\frac{1}{2}\times\frac{1}{c_3}\geq\frac{1}{c_i}$ for all integers $i\geq9$. The inequality therefore holds by induction, using $(iv)$ as our initial case. This completes the proof of the lemma, and Case \ref{niceD} is now complete. \hfill $\triangle$ \vski \ccases{c2>1}: $c_2 > 1$, $D \geq 6$, $G$ contains a quadrangle. \vski The following is Lemma 11 in \cite{parkool}. \begin{lemma} \label{} Assume $D\geq4$ and $c_2\geq2$. If $G$ contains a quadrangle and $\frac{b_2}{c_2}<\frac{\alpha}{2}$ holds for some integer $\alpha\geq2$, then $D \leq \alpha+1$. \end{lemma} \vski It was shown in Case \ref{smallD5} that since $D \geq 5$, $\aaa \geq 3$. The lemma implies that $D \leq \frac{2b_2}{c_2}+2$, and we may therefore appeal to Case \ref{niceD}. \hfill $\triangle$ \vski \ccases{c2>1}: $c_2 > 1$, $D \geq 6$, $G$ does not contain a quadrangle. \vski $G$ is what is called a {\it Terwilliger graph}. By \cite[Corollary 1.16.6]{drgraphs} there is no distance-regular Terwilliger graph with $D \geq 6$ and $k<50(c_2-1)$, so we may assume $50(c_2-1)\leq k$. Also, we may assume $\frac{b_2}{c_2}<10$ due to Case \ref{niceb2c2}. If $a_2+c_2\geq\frac{1}{2}k$, then the second largest eigenvalue $\theta_1$ of $G$ is bigger than $\frac{b_1}{2}-1$, as $\theta_1>a_2+c_2\geq\frac{1}{2}k>\frac{b_1}{2}-1$. As $\theta_1>\frac{b_1}{2}-1$, there is no distance-regular Terwilliger graph satisfying $D \geq 6$ by Proposition 9 in \cite{parkool}. Thus, we may assume $k-b_2=a_2+c_2<\frac{1}{2}k$. i.e., $b_2>\frac{1}{2}k$. Then the inequality $20c_2> 2b_2>k\geq50c_2-50$ holds, and this inequality gives $c_2<\frac{5}{3}$, which contradicts $c_2\geq2$. \hfill $\triangle$ \vski \ccases{c2c3=1}: $c_2 = c_3 = 1$, $b_2 \geq 4$. \vski The following lemma gives a number of key calculations required for this and ensuing cases. The quantities $j=\inf\{i:c_i \geq b_i\}$ and $h=\inf \{i:c_i > b_i\}$ will be fundamental in all that follows. Clearly $h \geq j$. From this point on we will define $\phi_i = 0$ for $i \geq D$; this will allow us to state a number of facts more simply. \begin{lemma} \lll{bad} The following relations hold. \vski i) $D-h \leq j-1$ \vski ii) $0 \leq h-j \leq j-1$, unless $c_j=1$, in which case we have $0 \leq h-j \leq j$. \vski iii) $D \leq 3j-2$, unless $c_j=1$, in which case $D \leq 3j-1$. \vski iv) For $0 \leq i \leq h-j$, we have $\phi_{j-1} \geq \phi_{D-i}+\phi_{j-1+i} \geq \phi_{h+j-1-i} +\phi_{j-1+i}$. \vski v) $\phi_{j-1} \geq \phi_{2j-2} + \phi_{2j-1} > 2 \phi_{2j-1}$, unless $c_j=1$, in which case we still have $\phi_{j-1} \geq 2 \phi_{2j-1}$. \vski vi) $\phi_j + \ldots + \phi_{D-1} \leq (j-1) \phi_{j-1}$ unless $c_j=1$, in which case we still have $\phi_j + \ldots + \phi_{D-1} \leq (j-1/2) \phi_{j-1}$. \vski \end{lemma} To prove $(i)$, note that we must have either $c_h > b_j$ or $c_j>b_h$, and in either case we must have $j+h>D$, whence $D+1 \leq j+h$ by Property $(iii)$ in Section \ref{drgprop}. For $(ii)$, let us note that Corollary 5.9.6 of \cite{drgraphs} immediately implies that $h-j\leq j$. Now assume $c_j>1$, and let $k=\inf\{i:c_i=c_j\}$. Theorem 1.1 of \cite{hbk} implies that $c_{2k-1}>c_k=c_j$, so $h \leq 2k-1$. Clearly $k \leq j$, and $(ii)$ follows. $(iii)$ follows easily by combining $(i)$ and $(ii)$. The second inequality in $(iv)$ is a simple consequence of $(i)$ and the monotonicity of the $\phi$'s, so we need only prove the first. The first inequality is trivial if $i=0$(since $\phi_D=0$), and for $i>0$ note that $\frac{b_j \ldots b_{j-1+i}}{c_j \ldots c_{j-1+i}} = 1$, so using \rrr{nut} we have \bea \label{} && \frac{\phi_{j-1} - \phi_{j-1+i}}{k} = (\frac{1}{c_j} + \ldots +\frac{b_j\ldots b_{D-1}}{c_j\ldots c_{D}}) - (\frac{1}{c_{j+i}} + \ldots +\frac{b_{j+i}\ldots b_{D-1}}{c_{j+i}\ldots c_{D}}) \\ \nn && \hspace{1cm} = (\frac{1}{c_j} + \ldots +\frac{b_j\ldots b_{j+i-2}}{c_j\ldots c_{j+i-1}}) \\ \nn && \hspace{1cm} \geq (\frac{1}{c_{D-i+1}} + \ldots +\frac{b_{D-i+1}\ldots b_{D-1}}{c_{D-i+1}\ldots c_{D}}) = \frac{\phi_{D-i}}{k} \eea This establishes $(iv)$. Choosing $i=h-j$ in $(iv)$, together with $(ii)$ and $(i)$ imply $(v)$, since by $(ii)$ we have $h-1 \leq 2j-1$($h-1 \leq 2j-2$ when $c_j>1$) and by $(i)$ we have $D-h+j \leq 2j-1$ as well. To achieve $(vi)$, write \bea \lll{} && \nn \phi_j + \ldots + \phi_{D-1} = (\phi_j + \ldots + \phi_{h-1}) + (\phi_h + \ldots + \phi_{h+j-2}) \\ \nn && \hspace{1cm} =: (I) + (II) \eea Suppose first that $c_j > 1$, so that $h-j \leq j-1$. There are $h-j$ terms in $(I)$, each of which by $(iv)$ can be paired with one of the $j-1$ terms in $(II)$ to form a total bounded by $\phi_{j-1}$. We arrive at $\phi_j + \ldots + \phi_{D-1} \leq (j-1)\phi_{j-1}$. If $c_j = 1$, then it can happen that $h-j=j$. In that case $(I)$ has $j$ terms, but each of the terms in $(II)$ can be paired by $(iv)$ to a term in $(I)$ to form a total bounded by $\phi_{j-1}$, leaving only the term $\phi_{h-1}=\phi_{2j-1}$ left. We therefore obtain the weaker bound $\phi_j + \ldots + \phi_{D-1} \leq (j-1)\phi_{j-1}+ \phi_{2j-1}$. Applying $(v)$ we obtain $\phi_j + \ldots + \phi_{D-1} \leq (j-1/2)\phi_{j-1}$, and $(vi)$ is proved. This completes the proof of the lemma. \hfill $\lozenge$ \vski We may now dispose of Case \ref{c2c3=1}. Suppose first that $b_3=1$, so $j=3$. Using Lemma \ref{bad}$(vi)$ and \rrr{comm} we have \be \lll{} \frac{\phi_2+ \ldots +\phi_{D-1}}{\phi_1} < \frac{1}{b_2} + \frac{5}{2}\times\frac{1}{b_2} \ee As $b_2 \geq 4$, we see that this is bounded above by $\frac{7}{8}$. Now suppose $b_3 \geq 2$, so $j \geq 4$. If $j=4$, then again using Lemma \ref{bad}$(vi)$ and \rrr{comm} we have \be \lll{} \frac{\phi_2+ \ldots +\phi_{D-1}}{\phi_1} < \frac{1}{b_2} + \frac{1}{b_2b_3} + \frac{7}{2}\times\frac{1}{b_2b_3} \ee As $b_2\geq 4, b_3\geq 2$, this is bounded above by $\frac{13}{16}$. Now suppose $j \geq 5$. Let $\la = \frac{b_3-1}{b_3}$. For $4 \leq i < j$ we see $\frac{c_i}{b_i}\leq \la$, so once again using Lemma \ref{bad}$(vi)$ and \rrr{comm} we have \bea \lll{jw} && \frac{\phi_2+ \ldots + \phi_{D-1}}{\phi_1} < \frac{1}{b_2} + \frac{1}{b_2b_3} + \frac{\la}{b_2b_3}+ \ldots + \frac{\la^{j-4}}{b_2b_3} + (j - 1/2)\frac{\la^{j-4}}{b_2b_3} \\ \nn && \hspace{1cm} < \frac{2}{b_2} + (j - 1/2)\frac{\la^{j-4}}{b_2b_3} \eea The last inequality is due to the fact that $1+\la + \la^2 + \ldots = b_3$. As $b_2 \geq 4$, the result will follow if we show $f(j) := (j - 1/2)\frac{\la^{j-4}}{b_2b_3} \leq \frac{1}{b_2}$ for all $j \geq 5$. Fix $b_3$. Suppose that $j > b_3$. Then \be \lll{} \frac{f(j+1)}{f(j)} = \frac{b_3-1}{b_3} \times \frac{j+1/2}{j-1/2} \leq \frac{j-1}{j} \times \frac{j+1/2}{j-1/2} < 1 \ee Thus, $f(j) > f(j+1)$, and this tells us that we may assume $j \leq b_3+1$. But in that case, \rrr{jw} is bounded by $\frac{1}{b_2}(2+\frac{b_3+1/2}{b_3} \times \la^{j-4}) < \frac{3}{b_2}<1$. This completes the proof of this case. \hfill $\triangle$ \vski \ccases{c2=1}: $b_2 \geq 4, c_2 =1, c_3>1$. \vski We will use the $j$ and $h$ as defined in Case \ref{c2c3=1}. It is clear that we may use the better bounds of Lemma \ref{bad} in this case. Assume first that $D>16$. By Lemma 4.2 of \cite{hbk}, $b_4 \geq 2 c_5$, so that $\frac{b_4}{c_4} \geq 2$. Note that Lemma \ref{bad}$(iii)$ implies $j \geq 7$. Similarly to Case \ref{c2c3=1} we let $\la = \frac{b_2-1}{b_2}$, so that $\frac{c_i}{b_i} \leq \la$ for $5 \leq i < j$. We may then write \bea \lll{jw2} && \frac{\phi_2+ \ldots + \phi_{D-1}}{\phi_1} \\ \nn && \hspace{1cm} < \frac{1}{b_2} + \frac{1}{2b_2} + \frac{1}{4b_2} + \frac{\la}{4b_2}+ \frac{\la^2}{4b_2} +\ldots + \frac{\la^{j-5}}{4b_2} + (j - 1)\frac{\la^{j-5}}{4b_2} \\ \nn && \hspace{1cm} < \frac{3}{2b_2} + \frac{1}{4} + (j - 1)\frac{\la^{j-5}}{4b_2} \eea where we have used Lemma \ref{bad}$(vi)$ and the fact that $1+\la + \la^2 + \ldots = b_2$. The same argument as in Case \ref{c2c3=1} allows us to assume that $j \leq b_2$, and this gives an immediate upper bound of $\frac{3}{2b_2} + \frac{1}{4} + \frac{\la^{j-5}}{4}< \frac{3}{2b_2}+\frac{1}{2}$ for \rrr{jw2}. This is clearly bounded by $1$ for $b_2 \geq 3$. \vski Now suppose $12 < D \leq 16$. By Lemma 5.2 of \cite{hbk}, $b_3 \geq 2 c_4$, so that $\frac{b_3}{c_3} \geq 2$. We also have $j \geq 5$ by Lemma \ref{bad}$(iii)$. We have, setting $\la = \frac{b_2-1}{b_2}$ as before, \bea \lll{jw3} && \frac{\phi_2+ \ldots + \phi_{15}}{\phi_1} \\ \nn && \hspace{1cm} < \frac{1}{b_2} + \frac{1}{2b_2} + \frac{\la}{2b_2}+ \frac{\la^2}{2b_2} +\ldots + \frac{\la^{j-4}}{2b_2} + \phi_{j} + \ldots + \phi_{15} \\ \nn && \hspace{1cm} = \frac{1}{b_2} + \frac{1}{2}(1-\la^{j-3}) + \phi_{j} + \ldots + \phi_{15} \eea We now claim $\phi_{j} + \ldots + \phi_{15} < 7 \phi_{j-1}$. This is clear if $j \geq 9$, since $\phi_{j} + \ldots + \phi_{15}$ contains at most $7$ elements, whereas Lemma \ref{bad}$(vi)$ applies if $j \leq 8$. Since $\phi_{j-1} < \frac{\la^{j-4}}{2b_2}$, \rrr{jw3} gives \be \lll{jw4} \frac{\phi_2+ \ldots + \phi_{15}}{\phi_1} < \frac{7 \la^{j-4}+2-b_2\la^{j-3}}{2b_2} + \frac{1}{2} = \frac{(8-b_2) \la^{j-4}+2}{2b_2} + \frac{1}{2} \ee where the identity $b_2 \la = b_2-1$ was used. It is now immediate that this is bounded by $1$ if $b_2 \geq 5$, while we also obtain $1$ as a bound if we substitute $b_2=4, j \geq 7$. Suppose $b_2=4, j=6$. Then by Lemma \ref{bad}$(vi)$, $\phi_{6} + \ldots + \phi_{15} < 5 \phi_{5}$, and proceeding as before we obtain \be \lll{jw5} \frac{\phi_2+ \ldots + \phi_{15}}{\phi_1} < \frac{5 \la^{2}+2-b_2\la^{3}}{2b_2} + \frac{1}{2} = \frac{(6-b_2) \la^{2}+2}{2b_2} + \frac{1}{2} , \ee and this is less than $1$. Now assume $b_2=4,j=5$. We apply Lemma \ref{bad}$(vi)$ once again to get \bea \lll{jw6} && \frac{\phi_2+ \ldots + \phi_{15}}{\phi_1} \\ \nn && \hspace{1cm} < \frac{1}{b_2} + \frac{1}{2b_2} + \frac{\la}{2b_2} + \phi_{j} + \ldots + \phi_{13} \\ \nn && \hspace{1cm} < \frac{3}{2b_2} + 4 \times \frac{\la}{2b_2} = \frac{7}{2b_2} \eea This is clearly bounded by $1$, since $b_2 \geq 4$. This completes the proof for $12<D \leq 16$. \vski Now suppose $D\leq 12$. Case \ref{niceD} covers $b_2 \geq 5$, so we may assume $b_2=4$. Case \ref{niceD} also covers $b_2=4, D \leq 10$, so we may assume $D \geq 11$, whence $j \geq 5$ by Lemma \ref{bad}$(iii)$. If $c_3 \geq 3$, then by Lemma 5.2 of \cite{hbk} we would have $D \leq 8$. Thus, $c_3=c_3=2$, and $b_2$ may be $3$ or $4$. Let us suppose first that $j=5$. There are two possibilities to consider. $b_3$ may be $3$, in which case $b_4=3, c_4=2$ as well and we may use \rrr{comm} and Lemma \ref{bad}$(vi)$ to obtain \be \lll{jw7} \frac{\phi_2+ \ldots + \phi_{11}}{\phi_1}< \frac{1}{4} + \frac{2}{4 \times 3} + 5 \times \frac{2^2}{4 \times 3^2} < 1 \ee If that does not occur, then $b_3 = 4$, and $\frac{c_4}{b_4} \leq \frac{3}{4}$, so we have \be \lll{jw8} \frac{\phi_2+ \ldots + \phi_{11}}{\phi_1}< \frac{1}{4} + \frac{2}{4 \times 4} + 5 \times \frac{2\times 3}{4 \times 4 \times 3} = 1 \ee $j=5$ is thereby handled. Assume now that $j \geq 6$. Note that if $b_3=3$ then since it was shown earlier that $c_5 \geq 3$ we have $c_5 \geq b_5$ and thus $j=5$. We may therefore assume $b_3=4$. Note that $\frac{c_i}{b_i} \leq \frac{3}{4}$ for $i < j$, so we have \bea \lll{jw9} && \nn \frac{\phi_2+ \ldots +\phi_{11}}{\phi_1} \\ \nn && \hspace{1cm} < \frac{1}{4} + \frac{1}{8} + \frac{1}{8} \times \frac{3}{4} + \frac{1}{8} \times \frac{3^2}{4^2} + \ldots + \frac{1}{8} \times \frac{3^{j-4}}{4^{j-4}} + \frac{\phi_{j} + \ldots + \phi_{11}}{\phi_1} \\ \nn && \hspace{1cm} < \frac{1}{4} + \frac{1}{8} + \frac{1}{8} \times \frac{3}{4} + \frac{1}{8} \times \frac{3^2}{4^2} + \ldots + \frac{1}{8} \times \frac{3^{j-4}}{4^{j-4}} + (12-j) \times \Big(\frac{1}{8} \times \frac{3^{j-4}}{4^{j-4}}\Big) \\ \nn && \hspace{1cm} = \frac{1}{4} + \frac{1}{2}(1-\frac{3^{j-3}}{4^{j-3}}) + (12-j) \times \Big(\frac{1}{8} \times \frac{3^{j-4}}{4^{j-4}}\Big) \\ \nn && \hspace{1cm} = \frac{3}{4} + \frac{(9-j)(3/4)^{j-4}}{8} \eea The last expression is clearly either negative or decreasing in $j$, and plugging in $j=6$ gives a bound less than $1$. This completes the proof for $b_2=4$, and completes Case \ref{c2=1}. \hfill $\triangle$ \vski \ccases{b_2<=3}: $b_2\leq3$, $c_2=1$ \vski Suppose first that $a_1=a_2$. As $c_2=c_1=1$, we have $b_1=b_2$. Also, we know that $a_1+1$ divides $b_2$, as $a_1+1$ divides $k=1+a_1+b_1$ and $b_1=b_2$. i.e., $\alpha\times(a_1+1)=b_2\leq3$ for some integer $\alpha$. If $b_1=b_2\in\{1,2\}$, then $a_1=a_2\in\{0,1\}$, so the valency $k$ is at most $4$, and we may appeal to Case \ref{deg3} or Case \ref{deg4}. We may therefore assume $b_1=b_2=3$. Then we know $a_1=a_2\in\{0,2\}$. But $a_1=a_2=0$ implies that $k=4$, handled in Case \ref{deg4}, so we may assume $a_1=a_2=2$. This implies that $k=6$ and $G$ is a line graph, as $c_2=1$ and $a_1=\frac{1}{2}k-1$. Then the graph is either the flag graph of a regular generalized $D$-gon of order $(3,3)$ or the line graph of a Moore graph by \cite[Theorem 4.2.16]{drgraphs}. It is straightforward to check that these graphs satisfy the desired inequality. \vski Now let us consider the case $a_1\neq a_2$, which implies $a_2>a_1$. First, we will assume $c_3=1$. Let $x$ and $y$ be vertices of the graph $G$, and put $\Delta(x,y):=\{x\}\cup A\cup C$, where $C$ is the component of $K_2(x)$(the set of vertices at distance two from $x$) containing $x$, and $A$ is the union of all maximal cliques containing $x$ and a neighbor of a point of $C$. Then $\Delta(x,y)$ is a strongly regular graph with parameters $(v',k',a_1',c_2')=(v',a_2+1,a_1,1)$ by \cite[Proposition 4.3.11]{drgraphs}. As the size of a maximal clique in $G$ is at most $b_2+c_3$, we have $a_1+2\leq b_2+c_3$, which implies $a_1+1\leq b_2\leq3$. By \cite[Corollary 4.3.12]{drgraphs}, we also have $b_2\geq a_2-1$. Then $k'=a_2+1\leq a_1+b_2+1\leq2b_2\leq6$ holds. As $k'\leq6$ and $b_2\leq3$, we know $v'\leq25$. By checking the table of strongly regular graphs (http://www.win.tue.nl/$\sim$aeb/graphs/srg/), we find that the only possible case is that the strongly regular graph $\Delta(x,y)$ is the pentagon. i.e., $G$ has valency $k=5$ and intersection numbers $a_1=0$, $a_2=1$ and $b_2=3$. There is no distance-regular graph with $c_4=1$ by \cite[Theorem 1.1]{hiraki} and \cite[Theorem 1.2]{chk}, so we may assume $c_4 \geq 2$. If $c_3 \geq 2$, then by Lemma 5.2 of \cite{hbk} we have $D \leq 8$, and we may then appeal to Case \ref{niceD}. We may therefore assume $c_3=1$, so we have $c_2=c_3=1, c_4 \geq 2$. Assume first that $b_3=3$ as well. Then $\frac{c_i}{b_i} \leq \frac{2}{3}$ for $i < j$, so using Lemma \ref{bad}$(vi)$ we write \bea \lll{jc} && \nn \frac{\phi_2+ \ldots \phi_{D-1}}{\phi_1} \\ \nn && \hspace{1cm} < \frac{1}{3} + \frac{1}{9} + \frac{1}{9} \times \frac{2}{3} + \frac{1}{9} \times \frac{2^2}{3^2} + \ldots + \frac{1}{9} \times \frac{2^{j-4}}{3^{j-4}} + \frac{\phi_{j} + \ldots + \phi_{D-1}}{\phi_1} \\ \nn && \hspace{1cm} < \frac{1}{3} + \frac{1}{9} + \frac{1}{9} \times \frac{2}{3} + \frac{1}{9} \times \frac{2^2}{3^2} + \ldots + \frac{1}{9} \times \frac{2^{j-4}}{3^{j-4}} + (j-1/2) \times \Big(\frac{1}{9} \times \frac{2^{j-4}}{3^{j-4}}\Big) \\ \nn && \hspace{1cm} = \frac{1}{3} + \frac{1}{3}(1-\frac{2^{j-3}}{3^{j-3}}) + (j-1/2) \times \Big(\frac{1}{9} \times \frac{2^{j-4}}{3^{j-4}}\Big) \\ \nn && \hspace{1cm} = \frac{2}{3} + \frac{(j-5/2)(2/3)^{j-4}}{9} \eea It is simple to verify as in Case \ref{c2c3=1} that the last expression is decreasing in $j$ for $j \geq 4$, and plugging in $j=4$ gives a bound of $\frac{5}{6}$. Now let us assume $b_3\leq2$. As $c_4\geq2$, we know $c_7>c_4\geq2\leq b_3$. So, the diameter $D$ is at most nine and the number of vertices, $n$, is at most $446$. Consulting the table of intersection arrays of \cite[Chapter 14]{drgraphs}, we see that there are no distance-regular graph with $k=5$, $b_1=4$, $b_2=3$, $b_3\leq2$, $c_2=c_3=1$, $c_4\geq2$, $D\leq9$ and $v\leq446$. \hfill $\triangle$ \vski The reader may now verify that we have covered all cases, and the proof of Theorem \ref{thispap} is complete. \qed \section{The strongly regular case} \lll{srgraphs} Let $G$ be a strongly regular graph with diameter $D=2$(if $D=1$ then $G$ is a complete graph, which is a trivial case for our considerations). Suppose $G$ has parameters $(v,k,a_1,c_2)$. Here note that if $c_2=k$ then $G$ is complete multipartite (or, see \cite[Theorem 1.3.1 $(v)$]{drgraphs}). \begin{theorem} \lll{sreg} Let $G$ be a strongly regular graph with diameter $2$ with parameters $(v,k,a_1,c_2)$, and assume that $G$ is not complete multipartite. Then $b_1=k-a_1-1\geq {\rm min}\{\frac{5}{16}k, \frac{2}{1+\sqrt{2}}\sqrt{k}\}$. In particular, there are only finitely many co-connected, non-complete strongly regular graphs with fixed $b_1$. \end{theorem} {\bf Proof:} Let $\theta_1>\theta_2$ be non-trivial eigenvalues of $G$. If one of $\theta_1$ and $\theta_2$ is non-integral, then both are non-integral and they have the same multiplicity. i.e., $G$ is a conference graph and hence $G$ has the parameters $(4b_1+1,2b_1,b_1-1,b_1)$. Thus, $k=2b_1$ in this case, and the theorem holds. From now on, we may assume that both $\theta_1$ and $\theta_2$ are integral. Note that we may assume that $\theta_1\geq1$ and $\theta_2\leq-3$, unless $G$ has $b_1\geq\frac{5}{16}k$ by \cite[Theorem 1.3.1 and Theorem 3.12.4]{drgraphs}. By \cite[Theorem 3.6]{kpy}, we have $-b_1=(\theta_1+1)(\theta_2+1)$. Then we know that $\theta_1\leq \frac{b_1}{2}-1$ and $\theta_2\geq-\frac{b_1}{2}-1$ hold. As $G$ is not complete multipartite it is not antipodal, hence $(k_2)^2>k_2(k_2-1)\geq k$ holds by \cite[Proposition 5.6.1]{drgraphs}. i.e., $\sqrt{k}b_1>c_2$ holds. As $c_2=\theta_1\theta_2+k$ (see \cite[Chapter 10]{gr}), we have $-\sqrt{k}b_1<-\theta_1\theta_2-k<\frac{b_1^2}{4}-k$. The quadratic inequality in $\sqrt{k}$, $k-b_1\sqrt{k}-\frac{b_1^2}{4}<0$, gives the inequality $\sqrt{k}<\frac{1+\sqrt{2}}{2}b_1$. \qed A complete multipartite graph $K_{m \times t}$ can be realized in the following way. Let the vertices be the set of all pairs $(a,b)$, with $a \in \{1, 2, \ldots , m\}$ and $b \in \{1, 2, \ldots , t\}$. We let $(a,b) \sim (a',b')$ if and only if $a \neq a'$. This is a strongly regular graph containing $mt$ vertices, and $k=(m-1)t, b_1=t-1$. Theorem \ref{sreg} therefore fails for this graph, since $m$ may be arbitrarily large. However one may readily check that $\phi_0=mt-1, \phi_1 = 1$, so $\frac{r_2}{r_1} = \frac{\phi_0+\phi_1}{\phi_0} = 1+\frac{1}{mt-1} \leq 1+\frac{1}{k}$. The following is therefore a corollary of the preceding theorem, together with the fact that $\phi_1 < \frac{\phi_0}{b_1}$. \begin{corollary} \lll{last} Let $C(k)={\rm min}\{\frac{5}{16}k, \frac{2}{1+\sqrt{2}}\sqrt{k}\}$. Then, if $G$ is a strongly regular graph with diameter $2$, we have \be \label{} \frac{r_2}{r_1} = \frac{\phi_0+\phi_1}{\phi_0} < 1 + \frac{1}{C(k)} \ee \end{corollary} This, combined with Theorem \ref{latcor}, validates the statement given in the abstract and introduction, that all points are more or less equidistant under the electric resistance metric in distance-regular graphs with large valency. \section{Concluding remarks} \lll{conc} We would like to remark first that Theorem \ref{bigguy}, the subject of \cite{markool}, is almost a corollary of Theorem \ref{thispap}. This is because if $b_1 \geq 2$ then applying Theorem \ref{thispap} gives \be \label{} \frac{\phi_0+ \ldots \phi_{D-1}}{\phi_0} \leq \frac{\phi_0 + 2\phi_1}{\phi_0} < \frac{\phi_0 + 2\times \frac{\phi_0}{b_1}}{\phi_0} \leq 2 \ee Improving the constant slightly from $2$ to $K=1+\frac{94}{101}$ and dealing with the case $b_1=1$ is not difficult. Indeed, the proof of Theorem \ref{bigguy} given in \cite{markool} can be made substantially shorter and cleaner using some of the new ideas in this paper, in particular Lemma \ref{bad}$(vi)$. \vski Next, we would like to give examples of some intersection arrays which are ruled out by Theorem \ref{thispap}. \vski \noi \begin{tabular}{ l c r } Intersection array & Vertices & $\frac{\phi_2+ \ldots \phi_{D-1}}{\phi_1}$ \\ \hline (3, 2, 2, 1, 1, 1, 1;1, 1, 1, 1, 1, 1, 3) & 62 & 1.2069 \\ (5, 2, 2, 1, 1, 1, 1;1, 1, 1, 1, 1, 1, 4) & 101 & 1.18421 \\ (6, 4, 4, 3, 3, 2, 1, 1;1, 2, 2, 3, 3, 3, 4, 4) & 112 & 1.03333\\ \end{tabular} \vski We hope that Theorem \ref{thispap} might be found useful for ruling out possible intersection arrays, as well as for proving other facts. \section{Acknowledgements} The first author was partially supported by the Basic Science Research Program through the National Research Foundation of Korea(NRF) funded by the Ministry of Education, Science and Technology (Grant \# 2009-0089826). The second author was supported by Priority Research Centers Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education, Science and Technology (Grant \#2009-0094070).
\section{Introduction} The first examples of the low-temperature L- and T-spectral classes were discovered as companions to stars \citep{Becklin:1988,Nakajima:1995}. The upper temperature limit for a Y-type object is not known; though it is expected to be $<500$~K, when water vapor is predicted to condense (see Figure~2 in \citealt{Burrows:2003}). Wide-field searches for low temperature T (and Y) dwarfs are currently in progress and several very cool objects have been found at temperatures of: $\sim$570~K \citep{Burningham:2009}, $550-500$~K \citep{Leggett:2009}, $500-400$~K \citep{Lucas:2010}, and $<$500~K \citep{Eisenhardt:2010}. However, the spectra of those objects (when available) do not differ substantially from late T-dwarfs. An object comoving with WD~0806--661 could represent the coolest substellar companion observed to date \citep{Luhman:2011}. While no spectrum has yet been obtained, this could very well be the first example of the Y spectral class. This Letter presents an upper limit at J-band to the substellar companion to WD~0806--661 (GJ~3483). Because the `WD' designation is used exclusively for white dwarfs (E. Sion 2011, private comm.), we suggest the companion be referred to as GJ~3483B rather than WD~0806--661B, as adopted in the discovery paper \citep{Luhman:2011}. We will use GJ~3483 and GJ~3483B throughout this Letter. We discuss what constraints our upper limit places on the object's mass and temperature as well as how it ties in to other imaged low-mass companions. This object, and similar low-mass companions, probably formed at large separations from their primary star via Jeans-mass fragmentation \citep{Low:1976} rather than been scattered out via planet-planet interactions. \section{Observations}\label{observations} As part of an ongoing imaging campaign to search for wide separation low-mass companions to nearby, old white dwarfs, we observed GJ~3483 using the Infrared Side Port Imager (ISPI, \citealt{van-der-Bliek:2004}) on the CTIO 4-m Blanco telescope. Observations were carried out on UT 2009-03-16, 2009-03-17, 2010-04-03, and 2010-04-05, each lasting 3240 seconds (3 sets of $3\times3$ dithers with individual exposure times of 120 seconds) and covering a field of view of approximately $10\arcmin \times 10\arcmin$. Conditions were generally good with seeing $\sim$1\arcsec~at J-band ($\sim$1.3\arcsec~on 2009-03-17) and clear (except for thin clouds on 2009-03-16). Data reduction was carried out in the usual manner using standard IRAF routines\footnote{IRAF is distributed by the National Optical Astronomy Observatory, which is operated by the Association of Universities for Research in Astronomy (AURA) under cooperative agreement with the National Science Foundation.}. The brown dwarf companion observed by Spitzer \citep{Luhman:2011} was not detected in any of the individual nights. To obtain a deeper J-band limit, we coadded data from the four nights together. Because the white dwarf has proper motion of ($+340.3$, $-289.6$) mas~yr$^{-1}$\, \citep{Subasavage:2009}, we shifted the 2009 data by 1~pixel in both R.A.\ and Decl.\ to match the white dwarf's motion (the ISPI plate scale is 0.3\arcsec~pix$^{-1}$). Individual nights were weighted by the square of the signal-to-noise of well-detected 2MASS stars. Our coadded, 3.5-hour image is displayed in Figure~\ref{fig:image} alongside the 2009 $4.5\mu$m Spitzer field from program 60160 (M.\ Burleigh) and it is clear we do not detect the companion brown dwarf. To estimate a limiting magnitude, we generated synthetic stars in 0.1 magnitude bins ranging from J=20.6 to 22.6 using IRAF/DAOPHOT's {\sf addstar} routine with a PSF derived from stars in our field. PSF fitting was performed on these synthetic stars, which allows us to estimate a 3-$\sigma$ limit of $J=21.7$ for this coadded exposure, 1.7~magnitudes fainter than the limit provided by \citet{Luhman:2011}. \section{Results}\label{resultsWD} With our upper limit of $J=21.7$, we estimate $J-[4.5]>4.95$, nearly two magnitudes greater than the value quoted in \citet{Luhman:2011} and redder than any other T-dwarf currently known. Figure~\ref{fig:m45} illustrates the trend of decreasing absolute $4.5\mu$m magnitude for known T-dwarfs as a function of $J-[4.5]$ color. Our upper limit for GJ~3483B is consistent with the T-dwarf trend, though it could be redder (and, thus, as faint as $J\sim23-24$). The initial-final mass relationships in \citet[and references therein]{Catalan:2008} along with the estimated white dwarf mass of $0.62\pm0.03$~$M_\odot$\, \citep{Subasavage:2009} suggest the progenitor mass was $2.0\pm0.3$~$M_\odot$\, with a main sequence lifetime of $1.3_{-0.5}^{+0.7}$~Gyr (\citealt{Catalan:2008}, and references therein; S.~Leggett 2011, private comm.). With the cooling age of 670~Myr derived in \citet{Subasavage:2009}, this implies a total age of 1.5 to 2.7~Gyr. Based on our 3-$\sigma$ limit, an age of 1.5~Gyr, and theoretical evolutionary models from \citet{Burrows:2003} and \citet{Baraffe:2003}, we estimate a mass of $<10$~$M_{Jup}$\, and temperature $<410$~K. However, with an age of 2.7~Gyr, we find the companion has a mass of $<13$~$M_{Jup}$\, and temperature $<400$~K. The IRAC 4.5$\mu$m photometric magnitude of 16.72 \citep{Luhman:2011} can also be used to derive the mass and temperature of GJ~3483B. With an age of 1.5~Gyr, we find the \citet{Burrows:2003} models predict a mass of $\sim6$~$M_{Jup}$\, and temperature $\sim330$~K. With the upper age limit of 2.7~Gyr, we find mass and temperature of $\sim10$~$M_{Jup}$\, and $\sim350$~K. These model temperatures are somewhat warmer than the value \citet{Luhman:2011} present ($\sim300$~K). While the uncertainty in age and thus the mass of GJ~3483B are substantial, the range of implied masses is consistent with those anticipated from Jeans-mass fragmentation (see Section~\ref{discussionWD}). That is, the mass of GJ~3483B is unlikely to be much smaller than $\sim7$~$M_{Jup}$\,. The range in mass and temperature ($6-10$~$M_{Jup}$\,, $330-350$~K) for GJ~3483B are comparable to those of CFBDSIR~J1458+1013B ($6-15$~$M_{Jup}$\,, $370\pm40$~K), another recently discovered ultra cool companion \citep{Liu:2011}. \section{Discussion}\label{discussionWD} Companions with masses less than $\sim$20~$M_{Jup}$\,~have been imaged in only a handful of systems (listed in Table~\ref{tab:lowmass}) and most have masses between 7 and 15~$M_{Jup}$\,. As described in \citet{Zuckerman:2009}, objects of mass $\sim$15~M$_{Jup}$ would require at least 2~Gyr to cool down to $\sim$500~K, which is usually taken as the temperature in which the Y-dwarf spectral type will appear. Binaries with brown dwarf secondaries having masses larger than 15 M$_{Jup}$ are somewhat more common than the few listed in Table~\ref{tab:lowmass} (see Table 2 in \citealt{Zuckerman:2009}), but for a $\sim$25~M$_{Jup}$ object to cool to 500~K it must be at least 7~Gyr old, according to the \citet{Burrows:2003} models. Hence the coolest companions are more likely to be found in relatively old systems. A handful of white dwarfs are known to host widely separated brown dwarf companions (see Table~\ref{tab:wdbd}). While a few other WD+BD pairs are known, these are unresolved systems whose separations are a few AU or less (GD 1400, \citealt{Farihi:2004}; WD~0137-349, \citealt{Maxted:2006}). The separations among the resolved WD+BD pairs is generally on the order of $\sim$1000's of AU, albeit with low number statistics. Companions around white dwarfs are expected (and observed, see \citealt{Farihi:2010}) to have a bimodal distribution in their orbital semi-major axes \citep{Nordhaus:2010}. Those orbiting close to the main sequence star will spiral in via tidal dissipation \citep{Hansen:2010}. More widely separated companions (such as most of those in Table~\ref{tab:lowmass}) will undergo orbital expansion following post main sequence mass loss from the white dwarf progenitor. Assuming the mass loss was adiabatic, which is almost certainly true (the orbital period is short compared to the time frame of mass-loss), the ratio of semimajor axes ($a$) between the white dwarf and main sequence phases should be identical to the inverse ratio of white dwarf and main sequence masses, or $a_{\rm wd}=a_{\rm ms}M_{\rm ms} /M_{\rm wd}$ \citep{Jeans:1924}. As previously mentioned, GJ~3483 has a final mass of 0.62~$M_\odot$\,~and initial mass of 2.0~$M_\odot$\,. If we assume the 2500~AU projected separation corresponds to a semi-major axis, then while on the main sequence this binary would have had $a\sim780$~AU, consistent with the values in Table~\ref{tab:lowmass}. The commonly accepted mass limits for brown dwarfs are 13 and 75~$M_{Jup}$\,, where an object would fuse deuterium, but not hydrogen. In this case, planets (in addition to orbiting stars) would have masses below $\sim$13~$M_{Jup}$\,. However, Jeans fragmentation can produce gravitationally collapsing clumps with masses as low as $\sim$7~$M_{Jup}$\, \citep{Low:1976}. Typically, these fragments will have average separations of a few 100~AU. As seen in Table~\ref{tab:lowmass}, there are several imaged systems with masses lower than $\sim$15~$M_{Jup}$\,~that orbit their host stars at these wide separations. Giant planets, on the other hand, can form via core accretion in a disk fairly close to the star \citep{Pollack:1996,Kenyon:2009} or via gravitational instability at larger separations so long as the disk is sufficiently massive \citep{Boss:1997}. Numerical simulations, however, have shown that planet formation via core accretion does not generally occur beyond 35~AU (\citealt{Dodson-Robinson:2009}, but see also \citealt{Currie:2011} for contrasting arguments). Gravitational instability could create massive planets at larger semi-major axes, but only for the most massive disks would one expect planets to form at $\sim$100~AU (see \citealt{Rafikov:2005}, and references therein). Figure~\ref{fig:lowmass} shows the separations and masses of low mass companions from Table~\ref{tab:lowmass} and extrasolar planets from the Exoplanet Orbit Database \citep{Wright:2010}. The population of exoplanets extends to lower masses and shorter separations (semi-major axes), but is not displayed here. As mentioned in the preceding paragraphs, one would not expect giant planets to form at separations larger than $\sim100$~AU. However, it appears that for objects $\sim7-17$~$M_{Jup}$\,, companions are distributed in a wide range of separations, reaching as far as $\sim1000$~AU. Planet-planet scattering could conceivably eject objects out to these large separations \citep[and references therein]{Veras:2009,Dodson-Robinson:2009}. Since lower mass planets are more readily scattered out to larger orbits than more massive objects, one would expect to see a larger number of low mass planets at large separations. However, numerous adaptive optics searches for companions have been performed, yet very few low mass objects have been found despite sensitivities to objects with masses $\gtrsim3$~$M_{Jup}$\, at separations $\gtrsim$40~AU (\citealt{Chauvin:2010,Nielsen:2010}; and references therein). Additionally, while many giant planets have been detected with radial velocity searches, there is a lack of $>13$~$M_{Jup}$\, substellar companions within $\lesssim5$~AU, despite being sensitive to such objects (the well-known brown dwarf desert, see \citealt{Marcy:2000}). The paucity of low mass companions at large separations contrasts with both theoretical expectations and detected giant planets at $a\lesssim5$~AU and suggests that planet-planet scattering is not a common mechanism to move large, $\sim7-17$~$M_{Jup}$\, mass companions, such as GJ~3483B and those listed in Table~\ref{tab:lowmass}, to large separations. The low mass, directly imaged companions with separations $\lesssim100$~AU are worth mentioning, as they may be notable exceptions to Jeans fragmentation: HR~8799b,c,d,e; $\beta$~Pic~b; and 2M1207b. In the case of HR~8799 and $\beta$~Pic, the planetary mass companions orbit relatively close to their A-type stars, which possess extended circumstellar disks (see \citealt{Rhee:2007}). The brown dwarf 2M1207 also possesses a disk close to the primary ($R\lesssim0.2$~AU; \citealt{Riaz:2006a}), but the low mass companion orbits beyond it at 46~AU. While the disks around A-type stars can be massive enough to form giant planets at large separations, it is unlikely that a brown dwarf can possess a similarly massive disk. This suggests that, while low mass brown dwarf formation and planet formation operate on different scales, formation mechanisms for companions with masses $\lesssim13$~$M_{Jup}$\,~begin to overlap (see discussions in \citealt{Currie:2011} and \citealt{Kratter:2010}). The discovery of additional low mass, widely separated companions will play a key role in our understanding of giant planet and low mass brown dwarf formation. \acknowledgements {\it Acknowledgements.} We thank Adam Burgasser, Kevin Luhman, and Patrick Dufour for useful discussions. We thank our referee, Sandy Leggett, for a prompt review and useful suggestions that strengthened this paper. We would also like to thank Jay Farihi for bringing to our attention the incorrect use of WD designations for non-white dwarf companions to white dwarf stars. This research has made use of the Exoplanet Orbit Database and the Exoplanet Data Explorer at exoplanets.org. This research was supported by NASA Astrophysics Data Analysis Program grant NNX09AC96G to RIT and UCLA.
\section{#1}} \def\ssect#1{\subsection{#1}} \def\sssect#1{\subsubsection{#1}} \def\lt#1{\left#1} \def\rt#1{\right#1} \def\t#1{\tilde{#1}} \def\h#1{\hat{#1}} \def\b#1{\bar{#1}} \def\frc#1#2{\frac{#1}{#2}} \newcommand{\underline{\mathrm{P}}}{\underline{\mathrm{P}}} \newcommand{\Gamma}{\Gamma} \newcommand{\partial}{\partial} \newcommand{{\cal P}\exp}{{\cal P}\exp} \newcommand{{\cal P}}{{\cal P}} \newcommand{{\rm vac}}{{\rm vac}} \newcommand{\langle}{\langle} \newcommand{\rangle}{\rangle} \newcommand{{\mathbb{Z}}}{{\mathbb{Z}}} \newcommand{{\mathbb{N}}}{{\mathbb{N}}} \newcommand{{\mathbb{R}}}{{\mathbb{R}}} \newcommand{{\mathbb{C}}}{{\mathbb{C}}} \newcommand{{\rm Tr}}{{\rm Tr}} \newcommand{{\cal O}}{{\cal O}} \newcommand{\uparrow}{\uparrow} \newcommand{\downarrow}{\downarrow} \newcommand{\epsilon}{\epsilon} \newcommand{\varepsilon}{\varepsilon} \newcommand{\alpha}{\alpha} \newcommand{\beta}{\beta} \newcommand{\gamma}{\gamma} \newcommand{\lambda}{\lambda} \newcommand{\Lambda}{\Lambda} \def\Res#1{\mbox{Res}_{#1}} \newcommand{{\rm End}}{{\rm End}} \newcommand{{\int \hspace{-4mm} \backslash}}{{\int \hspace{-4mm} \backslash}} \newcommand{{\cal J}}{{\cal J}} \newcommand{\alpha^\dag}{\alpha^\dag} \newcommand{\t\alpha^\dag}{\t\alpha^\dag} \newcommand{\Delta}{\Delta} \begin{document} \title{Entanglement entropy of highly degenerate states and fractal dimensions} \author{Olalla A. Castro-Alvaredo} \affiliation {Centre for Mathematical Science, City University London, Northampton Square EC1V 0HB, U.K.} \author{Benjamin Doyon} \affiliation {Department of Mathematics, King's College London, Strand WC2R 2LS, U.K.} \date{\today} \pacs{03.65.Ud, 65.40.gd,11.25.Hf, 75.10.Pq, 75.10.Jm} \begin{abstract} We consider the bi-partite entanglement entropy of ground states of extended quantum systems with a large degeneracy. Often, as when there is a spontaneously broken global Lie group symmetry, basis elements of the lowest-energy space form a natural geometrical structure. For instance, the spins of a spin-1/2 representation, pointing in various directions, form a sphere. We show that for subsystems with a large number $m$ of local degrees of freedom, the entanglement entropy diverges as $\frac{d}{2}\log m$, where $d$ is the fractal dimension of the subset of basis elements with non-zero coefficients. We interpret this result by seeing $d$ as the (not necessarily integer) number of zero-energy Goldstone bosons describing the ground state. We suggest that this result holds quite generally for largely degenerate ground states, with potential applications to spin glasses and quenched disorder. \end{abstract} \maketitle The entanglement entropy is a measure of entanglement between two complementary sets of observables in a quantum system \cite{bennet}. It is defined as the von Neumann entropy of the reduced density matrix of the state $|\Psi\rangle$ with respect to a tensor factor of the Hilbert space ${\cal H}$: \begin{equation} \label{def} S = -{\rm Tr}_{\cal A}(\rho_A\,\log\rho_A)\quad \text{with} \quad \rho_A = {\rm Tr}_{\cal B}|\Psi\rangle\langle\Psi|, \end{equation} and ${\cal H} = {\cal A} \otimes {\cal B}$. A related measure is obtained from the R\'enyi entropy, $S_n = \frc1{1-n}\log {\rm Tr}_{\cal A}(\rho_A^n)$; clearly, $S = S_1=\lim_{n\to 1^+}S_n$. The entanglement and R\'enyi entropies have important applications to e.g. quantum computation and numerical simulations of quantum systems. In extended quantum systems near to critical points, the entanglement entropy has turned out to reveal fundamental properties of ground states (for reviews, see e.g. \cite{special}). An important result is the so-called area law. Consider a quantum system of dimensionality $D\ge 2$ with correlation length $\xi$, and a subsystem ${\cal A}$ composed of the local degrees of freedom on a $D$-dimensional region $A$ of linear extension $\ell$ (generically, the region $A$ is composed various components of different connectivities, and $\ell$ is the overall scale of $A$). It turns out that the entanglement entropy between the subsystem and the rest diverges as $\xi$ and $\ell$ increase, the ratio $r=\ell/\xi$ being fixed, with a power law $\ell^{D-1}$, with possible logarithmic corrections for gapless systems \cite{Bombelli:1986rw,Srednicki:1993im,Wolf08,Wolf06,Gioev06,CalMinVic11}. But this area law is special in the cases where $D=1$. There, the divergence is always logarithmic: $\frc{qc}6\log(\ell)$ where $q$ is the number of points separating $A$ from the rest and $c$ is the central charge of the critical theory \cite{Holzhey,CalabreseCardy}. Interestingly, the number $c$ comes out, which essentially measures the number of degrees of freedom that are carried over from the microscopic theory to the macroscopic universal theory. Further, for $D=1$ again, subtracting this divergence, the rest is a finite quantity which depends on $r$, which saturates to a finite value at $r=\infty$, and which tends to this value in an exponential way that is solely determined by the spectrum of masses of the corresponding perturbation of the critical point \cite{entropy,entropy2}. The spectrum of asymptotic particles characterizes the low-energy degrees of freedom of the universal theory. Moreover, in systems with a boundary, the boundary degeneracy appears also by a natural subtraction \cite{CalabreseCardy,entropy3}. This degeneracy characterizes the number of degrees of freedom carried by the boundary. These results point to the observation that if the entanglement entropy diverges logarithmically at large subsystem size $\ell$, then the way it diverges is controlled by some basic counting of universal degrees of freedom. All these results were established for non-degenerate ground states, or ground states with small, finite degeneracies. A question arises as to the entanglement entropy for highly-degenerate ground states. Let us start by discussing an example where a symmetry group is spontaneously broken: the Heisenberg ferromagnet. This is an $N$-site lattice ${\tt L}$ with spin-$1/2$ local degrees of freedom, with Hamiltonian: $H = J\sum_{(i,j)\;\in\; {\rm edges\ of\ }{\tt L}} \vec\sigma_i\cdot\vec\sigma_j,\quad J<0\label{xxx}$ ($\vec\sigma_i$ is a vector of Pauli matrices acting on site $i$). This model has an $SU(2)$ global symmetry, and the states $|\psi_{\vec{v}}\rangle^{(N)}=\otimes_{i\in{\tt L}} |\psi_{\vec{v}}\rangle_i$, where all spins point in the same direction $\vec{v}$ (i.e.~$\vec\sigma_i\cdot\vec{v}|\psi_{\vec{v}}\rangle_i = |\psi_{\vec{v}}\rangle_i$, $|\vec{v}|=1$), span the lowest-energy subspace. In the usual description, we make a choice of an arbitrary direction $\vec{v}_0$. Such a state is not invariant under $SU(2)$ transformations, hence the symmetry is dynamically broken. The Hilbert space ${\cal H}_{\vec{v}_0}$ in the thermodynamic limit $N\to\infty$ is then, with the ground state $|\psi_{\vec{v}_0}\rangle^{(N)}$, the set of all finite-energy, local excitations above it. By locality of the Hamiltonian, it excludes all ground states and excited states associated to other directions, ${\cal H}_{\vec{v}}$ for $\vec{v}\neq \vec{v}_0$ (these cannot be reached by a finite number of local changes of the infinite system). But linear combinations of $|\psi_{\vec{v}}\rangle^{(N)}$s also give lowest-energy states, and for them we will take a different description of quantum states that is more appropriate. The lowest-energy subspace is the $N+1$-dimensional subspace forming a spin-$N/2$ representation. For every $N$, there exists a set of $N+1$ points $\vec{v}_k$ such that the set of vectors $|\psi_{\vec{v}_k}\rangle^{(N)}$ forms a basis for this subspace. Further, in the limit $N\to\infty$, every point on the unit sphere is arbitrarily close to such a basis point. A good description of the resulting space of infinite-volume lowest-energy quantum states is then obtained by using the geometry induced by averages of local operators (see \cite{permutation}, Section 4). In this geometry, the distance between states in directions $\vec{v}$ and $\vec{v}'$ is smoothly related to the distances between the vectors $\vec{v}$ and $\vec{v}'$ on the unit sphere. This geometry is convenient for discussing the entanglement entropy, because, as is developed in \cite{permutation} (based on earlier works \cite{entropy}), the latter can be evaluated from the average of a local permutation operator. Linear combinations could involve infinitely many directions $\vec{v}$, with appropriate integration measures on the unit sphere. This occurs, e.g., when a ground state of the infinite-length one-dimensional Heisenberg ferromagnet is reached by an adiabatic lowering of the anisotropy of the XXZ model: an integration over a great circle on the unit sphere is obtained \cite{permutation}. Although each state $|\psi_{\vec{v}}\rangle^{(\infty)}$ has zero entanglement entropy (since it is factorisable), linear combinations do not, and linear combinations involving infinitely many directions $\vec{v}$ should have growing entropy as $\ell\to\infty$. What is the $\ell\to\infty$ behaviour for such infinite linear combinations? Let ${\cal A}$ be composed of $m$ degrees of freedom and $N=\infty$. Clearly, any minimal-energy state has a symmetry under exchange of any two sites, hence the entanglement entropy depends on $m$ but not on the particular sites chosen. We may take the $m$ sites to form a continuum of dimension $D$, writing $m = \ell^D$. First note that a large-$m$ divergence $\frc{1}2\log m$ of the entanglement entropy was found in \cite{permutation,popkov} for the state formed by an integration over a great circle. Second, recall that when there is spontaneous symmetry breaking, there are massless excitations in the spectrum, the Goldstone bosons. In general, our idea is that linear combinations composed of all points along an arc on the unit sphere should be interpreted as representing the presence of a zero-energy Goldstone boson corresponding to the continuous motion along this arc. Moreover, every linearly independent local direction on the unit sphere corresponds to a linearly independent Goldstone boson, each of which can be seen as a universal degree of freedom. Hence, the observations above suggest a divergence of the form $\frc{d}2 \log m$, where $d$ is the number of Goldstone degrees of freedom present in the linear combinations. This number is simply the dimension of the support of the linear combination on the unit sphere. The ``number'' of Goldstone degrees of freedom $d$ is not restricted to the integers: the support of the linear combination may have a fractal dimension. Here we argue that the large-$m$ (large-$\ell$) behaviour is \begin{equation}\label{main} S_n = \frc{d}2 \log m + O(1) = \frc{dD}{2} \log \ell + O(1) \end{equation} for all $n$, where $d$ is the (fractal) dimension of the support of the linear combination, $0\leq d\leq 2$ for the spin-$1/2$ Heisenberg ferromagnet. For instance, if the great circle in the above example is replaced by the Cantor set, we would find $d=\log(2)/\log(3)$. Note that the result is independent of $n$. A simple application of this formula is to detect a possible blurring of the dynamically chosen direction $\vec{v}_0$ obtained, for instance, as the system is cooled in a fixed magnetic field. The blurring could lead to a linear combination covering a possibly fractal small surface around $\vec{v}_0$. Standard local observables would not discern this, whereas formula (\ref{main}) shows that the entanglement entropy is extremely sensitive to it, giving $d>0$ instead of $d=0$. Beyond the Heisenberg ferromagnet, our derivation below makes it clear that (\ref{main}) should hold much more generally. There are two conditions: 1) there exists a basis for the lowest-energy subspace where the entanglement entropy of each basis element is zero or small, and 2) the basis elements are given the local-operator geometry \cite{permutation}. The dimension $d$ in (\ref{main}) is that of the support of the linear combination in this geometry, which may be an integer or not, and which essentially counts the number of Goldsone bosons in the state. For instance, for a quantum system in a ``Mexican hat'' potential, the basis set is the geometrical circle at the bottom of the hat, and subsets of this will have $0\leq d\leq 1$; similar observations hold for any system with spontaneously broken continuous symmetry. Note that some ``permutation-symmetric'' (PS) states of the above type in a Hilbert space with on-site spin $S$ were considered in \cite{popkov}, and (\ref{main}) with $d=2S$ was observed. An analysis shows that the states chosen generalize the $S=1/2$ great-circle state. Further, this is in agreement with our general arguments, which imply that all possibilities $0\leq d\leq 4S$ may occur for PS states. Our formula is in sharp contrast with behaviors reviewed above (e.g. $\ell^{D-1}$ for $D>1$), related to the geometric structure of the region $A$ and arising thanks to locality of the system's interaction. To explain this, consider the case of a spontaneous symmetry breaking: local interactions only fix the lowest-energy subspace, not the ground state. By choosing a basis of lowest-energy states with minimal entanglement and with a local-operator geometry, we expect that we encode all local information in the basis states themselves, and only the symmetry is probed by the degeneracy. Hence, our result, which has to do with the degeneracy, cannot measure geometrical objects in the system's real space. Rather, a logarithm occurs, whose coefficient counts Goldstone degrees of freedom, associated with the symmetry. If condition 1) above does not hold, we expect two contributions to the asymptotic of the entanglement entropy: that of the large degeneracy (\ref{main}), and that coming from locality. Examples of fractal sets of minima are found wherever random potentials occur (quenched disorder, see e.g. \cite{CarLeDou}), with possible connections to glasses. In the classical phenomenology \cite{Dotsenko}, at temperatures below the glass transition point, the free energy surface reveals finer structures in the form of new energy minima within previous valleys, displaying self-similarity and a fractal structure; the set of effective minima has a nontrivial fractal dimension. High classical degeneracy also naturally occurs in frustrated spin systems \cite{Diep}. These degeneracies may be lifted by quantum fluctuations (so-called ``order by disorder''), although the underlying classical degeneracy is known to have nontrivial quantum effects and to survive semi-classically \cite{Berg}. By our formula (\ref{main}), the entanglement entropy could provide a further indicator at the quantum level of this (semi-)classical degeneracy. In the rest of this paper, we provide the main lines of the derivation of (\ref{main}). A more precise proof and statement will be given in a separate work. \section{The Heisenberg ferromagnet case} The present derivation uses the replica trick, whereby $n$ is assumed to be an integer $>1$. The result, however, can be interpreted for $n\in(1,\infty)$. This provides the unique analytic continuation which does not diverge exponentially at large $n$; as is usual, this analytic continuation is assumed to provide $S_n$ for all real $n\geq1$. Given a point $\vec{v}$ on the unit sphere $S^2$, let us denote by $\psi_{\vec{v}}\in{\cal F}$ the quantum state corresponding to the $N\to\infty$ limit of $|\psi_{\vec{v}}\rangle^{(N)}$. As developed in \cite{permutation}, a quantum state is a linear functional on the space of finitely-supported operators, which evaluates the average; e.g. $\psi_{\vec{v}}({\cal O}) = \lim_{N\to\infty}{}^{(N)}\langle\psi_{\vec{v}}|{\cal O}|\psi_{\vec{v}}\rangle^{(N)}$. We can write $\psi_{\vec{v}}$ as a product of single-site quantum states, all acting in the same way: $ \psi_{\vec{v}} = \bigotimes_{i\in{\mathbb{Z}}} \psi_{\vec{v};i}.$ At infinite volume, vectors pointing in different directions have zero overlap: $\lim_{N\to\infty} {}^{(N)}\langle \psi_{\vec{v}}|\psi_{\vec{v'}}\rangle^{(N)} = 0$ for $\vec{v}\neq \vec{v'}$. This holds as well with insertions of finitely-supported operators, so the infinite-volume limit of linear combinations $\sum_{\vec{v}} a_{\vec{v}} |\psi_{\vec{v}}\rangle^{(N)}$ gives the quantum state \begin{equation}\label{pa} \psi_{\{a_{\vec{v}}\}} := \sum_{\vec{v}} |a_{\vec{v}}|^2 \psi_{\vec{v}},\quad \sum_{\vec{v}} |a_{\vec{v}}|^2 = 1. \end{equation} In order to evaluate the R\'enyi entanglement entropy associated to the ground state $\psi_{\{a_{\vec{v}}\}}$ we recall the approach developed in \cite{permutation}. There, the R\'enyi entropy of a region $A$ in a quantum state $\psi$ was expressed as an average on the $n^{\rm th}$ tensor power of $\psi$: \begin{equation}\label{ren} S_n =\frc1{1-n} \log\left(\psi^{\otimes n}( \mathcal{T}_A)\right). \end{equation} The operator averaged is $\mathcal{T}_A=\prod_{i \in A} \mathcal{T}_i$, where $\mathcal{T}_i$ are \emph{local cyclic replica permutation operators} which act on site $i$ of the quantum spin chain by cyclicly permuting the spins of the $n$ replicas of the model at that particular site. One of the results of \cite{permutation} was the closed formula \begin{equation}\label{trace} {\mathcal{T}}_i=\text{Tr}_{\text{aux}} \prod_{\alpha=1}^n \sum_{\epsilon_1,\epsilon_2} E^{\epsilon_1\epsilon_2}_{\text{aux}} E_{\alpha,i}^{\epsilon_2\epsilon_1}, \end{equation} where $ E_{V}^{\epsilon_2\epsilon_1}$ represent elementary $2\times 2$ matrices with a single non-vanishing entry at row $\epsilon_2$, column $\epsilon_1$, acting on space $V=\alpha,i$ (site $i$ tensor copy $\alpha$) or $V={\rm aux}$ (auxiliary space). For the quantum state $\psi_{\{a_{\vec{v}}\}}$, we write \[ \psi_{\{a_{\vec{v}}\}}^{\otimes n} = \sum_{\{\vec{v}_\alpha:\alpha=1,\ldots,n\}} \lt(\prod_{\alpha=1}^n |a_{\vec{v}_\alpha}|^2\rt) \bigotimes_{\alpha=1}^n \psi_{\vec{v}_\alpha}. \] From the trace expression (\ref{trace}) we find \begin{equation} \bigotimes_{\alpha} \psi_{\vec{v}_\alpha} \lt({\cal T}_A\rt) = \prod_{i\in A}\text{Tr}_{\text{aux}} \prod_{\alpha} \sum_{\epsilon_1,\epsilon_2} E_{\text{aux}}^{\epsilon_1\epsilon_2} \psi_{\vec{v}_\alpha;i}\lt(E_{i}^{\epsilon_2\epsilon_1}\rt). \end{equation} Clearly, $\psi_{\vec{v}_\alpha;i}\lt(E_{i}^{\epsilon_2\epsilon_1}\rt)$ is independent of $i$. Writing $|\psi_{\vec{v}}\rangle = s_{\vec{v},1}|\uparrow\rangle + s_{\vec{v},2}|\downarrow\rangle$, we find $\psi_{\vec{v}_\alpha,i}\lt(E_{\alpha,i}^{\epsilon_2\epsilon_1}\rt) = s_{\vec{v}_\alpha,\epsilon_2}^* s_{\vec{v}_\alpha,\epsilon_1}$, and tracing over the auxiliary space we obtain \[ \text{Tr}_{\text{aux}} \prod_{\alpha} \sum_{\epsilon_1,\epsilon_2} E_{\text{aux}}^{\epsilon_1\epsilon_2} \psi_{\vec{v}_\alpha;i}\lt(E_{i}^{\epsilon_2\epsilon_1}\rt) = \prod_{\alpha} \langle\psi_{\vec{v}_\alpha}|\psi_{\vec{v}_{\alpha+1}}\rangle. \] Hence, we find \begin{equation}\label{rgsa} S_n= \frc1{1-n} \log\lt(\sum_{\{\vec{v}_\alpha\}} \lt[\prod_{\alpha} |a_{\vec{v}_\alpha}|^2 \rt] \lt[\prod_{\alpha} \langle\psi_{\vec{v}_\alpha}|\psi_{\vec{v}_{\alpha+1}}\rangle\rt]^{m}\rt) \end{equation} with $\vec{v}_{n+1} := \vec{v}_1$. This saturates at large $m$ to \begin{equation}\label{saturation} \lim_{m\to\infty} S_n = \frc1{1-n}\log\lt(\sum_{\vec{v}} |a_{\vec{v}}|^{2n}\rt). \end{equation} That is, as expected, for any ground state given by a finite linear combination of basic zero entropy states, the entanglement entropy reaches a finite maximum as the number $m$ of site of $A$ tends to infinity. This corresponds to the case $d=0$ in (\ref{main}). More interesting behaviours are obtained from ``infinite linear combinations'' of basic states, generalising (\ref{pa}). Given a smooth, self-avoiding path $\vec\gamma:[0,1]\to S^2$ and a smooth function $f:S^2\to{\mathbb{R}}^+$ with $\int_0^1 |d\vec{\gamma}(t)|\,f(\vec{\gamma}(t)) = 1$, the following integral can be defined and is a quantum ground state: $\psi^{(1)}:= \int_0^1 |d\vec{\gamma}(t)| \,f(\vec{\gamma}(t))\, \psi_{\vec\gamma(t)}$. Similarly, let $\vec\mu:[0,1]\times [0,1] \to S^2$ be a two-dimensional smooth curve such that $\int_0^{1} \int_0^{1} |d^2\vec{\mu}(\lambda,\phi)| f(\vec{\mu}(\lambda,\phi))=1$ (where $|d^2\vec{\mu}(\lambda,\phi)|$ is the surface element on the unit sphere). Then, the following is a ground state: $ \psi^{(2)}:= \int_0^{1} \int_0^{1} |d^2\vec{\mu}(\lambda,\phi)|\, f(\vec{\mu}(\lambda,\phi))\, \psi_{\vec\mu(\lambda,\phi)} $. Generalising, we may consider the set of non-zero coefficients to be a fractal set $\mathcal{W} \subset S^2$ with fractal dimension $d$. With $d{\mathcal{H}}(\vec{v})$ the corresponding Hausdorff integration measure, we may write \[ \psi^{(d)}:=\int_{\mathcal{W}}d{\mathcal{H}}(\vec{v}) \,f(\vec{v})\, \psi_{\vec{v}} \,\, \,\text{with}\,\, \int_{\mathcal{W}}d{\mathcal{H}}(\vec{v})\, f(\vec{v})= 1. \] The Hausdorff measure is expected to occur naturally in taking the large-volume limit, if the set of vectors $\vec{v}$ such that $a_{\vec{v}}\neq0$ becomes a fractal set. Computing the R\'enyi entropy of $\psi^{(d)}$ yields a simple generalisation of (\ref{rgsa}) where the sums over the vectors $\vec{v}_\alpha$ are replaced by integrations and the coefficients $|a_{\vec{v}_\alpha}|^2$ by the functions $f(\vec{v}_\alpha)$. The logarithmic factor in (\ref{rgsa}) becomes \begin{equation}\label{rgsf} \log\lt(\int_{\mathcal{W}} \prod_{\alpha} d{\mathcal{H}}(\vec{v}_\alpha)\,f(\vec{v}_\alpha) \lt(\prod_{\alpha} \langle\psi_{\vec{v}_\alpha}|\psi_{\vec{v}_{\alpha+1}}\rangle\rt)^{m}\rt). \end{equation} The large $m$ asymptotics of these expressions will however be radically different from (\ref{saturation}): there will be no saturation, and we will recover the behaviour highlighted in (\ref{main}). This can be shown using a saddle-point analysis, as was done in \cite{permutation} in a particular case; here it is generalised to integrals over fractal domains. For the explicit calculations, we use $ |\psi_{\vec{v}}\rangle = \frc1{\sqrt{2}} \mato{c} \sqrt{1+z} \\ \sqrt{1-z} \, e^{i\theta}\ea\right) $, where $\vec{v}=:(x,y,z)$ is a unit vector, and $\theta$ is defined by $x+iy = \sqrt{1-z^2}\, e^{i\theta}$. From this we see that $|\langle\psi_{\vec{v}}|\psi_{\vec{w}}\rangle|\leq1$, with equality if and only if $\vec{v}=\vec{w}$. The saddle-point analysis from (\ref{rgsf}) is done by expanding the overlaps $\langle\psi_{\vec{v}_\alpha}|\psi_{\vec{v}_{\alpha+1}}\rangle$ around $\vec{v}_\alpha = \vec{v}_{\alpha+1}$, and re-writing the product $\prod_{\alpha}$ of these overlaps as an exponential. We get \begin{equation} \prod_{\alpha=1}^n \langle\psi_{\vec{v}_\alpha}| \psi_{\vec{v}_{\alpha+1}}\rangle = \exp\lt[-\frac{1}{8}\sum_{\alpha=1}^n |\vec{v}_{\alpha+1} -\vec{v}_\alpha|^2 + \ldots\rt],\label{eq1} \end{equation} where the ellipsis stand for terms that are order-2 and antisymmetric, and higher order terms. The order-2 antisymmetric terms vanish when the integrations in (\ref{rgsf}) are performed. In the case of $\psi^{(1)}$ for instance, we may use the assumptions relating to $f$ and $\gamma$: both are smooth, and the curve $\gamma$ is self-avoiding. Hence, with $\vec{v}_\alpha = \vec{\gamma}(t_\alpha)$, the maximum occurs when $t_\alpha = t_{\alpha+1}$ for all $\alpha=1,\ldots,n$. In this case we find \begin{equation} \prod_{\alpha=1}^n \langle\psi_{\vec{\gamma}(t_\alpha)}| \psi_{\vec{\gamma}(t_{\alpha+1})}\rangle = \exp\lt[-\frac{|\dot{\vec{\gamma}}|^2}{8}\sum_{\alpha=1}^n (t_{\alpha+1} -t_\alpha)^2 + \ldots\rt],\label{eq2} \end{equation} where $|\dot{\vec{\gamma}}|^2$ is evaluated at $t=t_1$. The saddle-point analysis is then performed as follows. We need to raise the quantity above to the power $m$ and substitute into the integral (\ref{rgsf}). We can replace $f(\vec\gamma(t_\alpha))$ by $f(\vec\gamma(t_1))$ for all $\alpha$, since $f$ is smooth. Changing variables to $\hat{t}_i=\sqrt{m}({t_{i}-t_{1}})$, $i=2,\ldots,n$ guarantees that larger positive powers of $\h{t}_\alpha$ give lower-order contributions at large $m$. We obtain \begin{eqnarray} S_n&=& \frc1{1-n} \log\lt(\frac{1}{m^{\frac{n-1}{2}}}\int_{0}^{1} dt_1| \dot{\vec{\gamma}}(t_1)|^n f(\vec{\gamma}(t_1))^n \rt.\label{int}\\ && \lt. \int_{-\infty}^{\infty} d^{n-1}\hat{t} \, e^{-\frac{|\vec{\gamma}|^2}{8}\left[\sum\limits_{\alpha=2}^{n-1} (\hat{t}_{\alpha+1} - \hat{t}_{\alpha})^2+\h{t}_2^2 + \h{t}_n^2 \right]+ O(\hat{t}^3/\sqrt{m})}\rt),\nonumber \end{eqnarray} where the integrals over $\h{t}_2,\ldots,\h{t}_n$ have been extended to $(-\infty,\infty)$ (the resulting correction terms are exponentially small). These integrals are of standard gaussian type and can be carried out explicitly. A very similar computation can be carried out for the state $\psi^{(2)}$ instead of $\psi^{(1)}$. The final result can be expressed in both cases $d=1$ and $d=2$ as \begin{equation}\label{logm} S_n \sim \frc{d}2 \log \lt(\frc{m}{8\pi}\rt) +\frac{1}{1-n} \log\lt(n^{-\frc{d}2}\int |d^d\vec{v}|\, \,f(\vec{v})^n\rt), \end{equation} where higher order corrections would be $O(m^{-1/2})$. This is in agreement with (\ref{main}). Note that the constant term in (\ref{logm}) is $-\log(f_{\rm max})$ as $n\to\infty$, where $f_{\rm max}$ is the maximum of $f$ on its support. At $n=1$, we have rather $d/2-\int |d^d\vec{v}|\, f(\vec v) \log f(\vec{v})$. The calculation for fractal sets follows similar lines. A crucial feature of the Hausdorff measure is its scaling property. On the plane, the Hausdorff measure ${\cal H}'$ satisfies $ s^{d} \, {\mathcal{H}}'(\mathcal{W}') ={\mathcal{H}'}(s \mathcal{W}'+\vec{u}) $ for any $\mathcal{W}'\subset{\mathbb{R}}^2$. For the measure $\mathcal{H}$ on $S^2$, this scaling covariance is replaced by an asymptotic behaviour that gives rise to the measure $\mathcal{H}'$ on the tangent plane: \begin{equation}\label{asympt} \lim_{m\to\infty} m^{d/2}\,d{\cal H}(\h{\vec{v}}_i/\sqrt{m} + \vec{v}_1) = d{\cal H}'(\h{\vec{v}}_i). \end{equation} Putting (\ref{eq1}) inside (\ref{rgsf}), changing variables to $\h{\vec{v}}_i = \sqrt{m}(\vec{v}_i-\vec{v}_1)$, $i=2,\dots,n$, and using (\ref{asympt}), as $m\to\infty$, \begin{eqnarray} S_n&\sim& \frc1{1-n} \log\lt(\frac{1}{m^{\frac{d(n-1)}{2}}}\int_{{\cal W}} d{\cal H}(\vec{v}_1) f(\vec{v}_1) \int_{{\cal W}_m'} \prod_{i=2}^n \rt.\label{intd}\nonumber\\ && \lt. \hspace{-1cm} d{\cal H}'(\h{\vec{v}}_i) f\lt(\frc{\h{\vec{v}}_i}{\sqrt{m}} +\vec{v}_1\rt) \, e^{-\frac{1}{8}\left[\sum\limits_{\alpha=2}^{n-1} |\hat{\vec{v}}_{\alpha+1}-\hat{\vec{v}}_{\alpha}|^2+|\hat{\vec{v}}_2|^2 + |\hat{\vec{v}}_n|^2 \right]}\rt)\nonumber \end{eqnarray} where ${\cal W}_m' = \sqrt{m}({\cal W}-\vec{v}_1)$ (projected to the tangent plane at $\vec{v}_1$). Although the integral might not exist in the large-$m$ limit, it is bounded, thanks to the exponentially decaying factor. This boundedness immediately gives rise to the leading asymptotics (\ref{main}). It would be desirable to investigate more precisely the nature of the constant corrections to this general leading behaviour; we hope to return to this in a future work. {\bf Acknowledgment:} We would like to thank J.L. Cardy for useful comments.
\section{Introduction} \label{sec:intro} Semantic interoperability refers to an agreement between multiple software or data infrastructures on the terms by which a scenario, \textit{i.e.}, the circumstances relevant to a particular application, can be described. In the presence of such an agreement, different platforms can annotate data with metadata of the same type and associated to each other by the same relations, so that their meaning is clarified and an exchange of information can rely on standardized \textit{semantics}. This is independent of the precise technical mode in which the exchange is implemented, which additionally requires an agreement at the syntactic level, \textit{e.g.}, on the file formats or application programming interfaces that are employed for this purpose. There are common approaches by which semantic content can be serialized (\textit{i.e.}, denoted) straightforwardly, \textit{e.g.}, using the JSON, YAML, TTL, and RDF/XML formats; obversely, semantic information can be included in file formats that permit the annotation of their content, such as CML~\cite{WMCTBTWDAP06, XRGP19} and HDF5~\cite{DCH14, Schmitz16}. Accordingly, if there is a common standard for the semantics, solutions for achieving syntactic interoperability are immediately available as well. Semantic standards are documented by \textit{semantic assets}, which include, in increasing order of expressivity~\cite{EMMC19b}, \begin{enumerate} \item{} simple lists, where labels or names for concepts are collected without any further elaboration, \item{} informal hierarchies, which include further information on the concepts, \item{} thesauri, where concept definitions are presented systematically in text form, possibly including certain relations, \textit{e.g.}, between synonymous or antonymous concepts, \item{} taxonomies, \textit{i.e.}, class hierarchies, \item{} conceptual models, \textit{e.g.}, XSD or RDFS schemas, which extend the class hierarchy by a specification of possible contents or relations, \item{} ontologies, \textit{i.e.}, class hierarchies + relation definitions + axioms. \end{enumerate} This is known as the hierarchy of semantic assets; levels 1 to 3 are targeted at human users, whereas at levels 4 to 6, a machine-processable formalization is usually given. This work deals with \textit{ontologies} which, beside defining classes and their properties in a way largely analogous to object-oriented programming, also include inference rules (or axioms) that can be used for automated reasoning. The OWL language, for which a variety of formats exist, is the established standard for formulating these definitions and rules; thereby, references to concepts from other ontologies or metadata schemas can be included, by which a \textit{semantic web} is created in a similar way as hyperlinks are fundamental to the world wide web~\cite{AH11}. The technical use of ontologies typically requires an agreement on data and metadata related to one or multiple specific fields, or domains of knowledge, for which domain ontologies need to be developed in an effort requiring competencies from data management as well as concrete scientific or technical expertise. In materials informatics, a variety of ontology-based approaches have been employed successfully to integrate data from diverse sources~\cite{MMCMGP17, ZQ17}. Moreover, domain-specific automated reasoning mechanisms can enhance the functionality of cyber-physical and industry 4.0 infrastructures, supplementing the evaluation of discrete process models, such as Petri nets~\cite{WWJ19}. Since ontologies can point to other ontologies, the semantic web exhibits the tendency for the semantic assets to aggregate into large connected networks with a complex structure. If algorithmic logical reasoning is applied to these structures, any inconsistencies become fatal, since a single contradiction at any point is sufficient to destroy the logical coherence of the entire content as a whole. On the other hand, it is practically impossible to avoid mutual inconsistencies between any out of the multitude of domain ontologies that are developed by different groups, coming from different fields, who may all have their own approach to the problem. This raises the challenge of establishing semantic standards that apply at highest possible level of abstraction, under which all conceivable domain ontologies can be subsumed; these components, the design of which requires a solid philosophical underpinning, are known as \textit{top-level ontologies} or upper ontologies~\cite{ASS15, BM10, MLR10}. The present work addresses the problem of making a top-level ontology viable technically by connecting it to domain-specific ontologies and scenarios. The considered top-level ontology is the European Materials and Modelling Ontology (EMMO)~\cite{EMMC19}, which is developed by the European Materials Modelling Council (EMMC) on the basis of previous efforts, \textit{cf.}~Schmitz~\textit{et al.}~\cite{SBAELABBV16}. The relevant domains of knowledge are related to applications of materials modelling, including computational molecular engineering (CME), which has a focus on fluids and interfacial phenomena~\cite{HNVH13, HNBCSCELNSSTVC20}, and integrated computational materials engineering (ICME), which has a focus on solids~\cite{Schmitz16, SBAELABBV16}. Knowledge bases that employ semantic technology can be split into two components, one of which is terminological and deals with universals (here, \textit{classes}) and possible worlds, \textit{i.e.}, what relations there can theoretically be between objects (here, \textit{individuals}); the second one is assertional and deals with a factual scenario, \textit{i.e.}, a description of the real world as it is, or with a concrete possible scenario that is not necessarily factual. Accordingly, the assertional component contains individuals and defines actual (rather than merely possible or necessary) relations between them. In description logic, these two components are referred to as the TBox and the ABox, and in model theory, the content of the ABox is referred to as a model \cite{BHLS17}; here we refrain from using this term to avoid confusion with the concept of a model in materials modelling in general and the EMMO in particular. Instead, the term \textit{ontology} will be used specifically for the terminological part (including axioms and rules), and \textit{scenario} for a possible, concrete realization of the assertional part; this understanding of the term is in line with the philosophical paradigm of nominalism, \textit{i.e.}, non-existence of universals \cite{BP15, Lewis83, PM12}, and its implications on ontology design as implemented by the EMMO, which generally avoids the explicit definition of individuals. This yields a strict separation between terminology (ontology), which applies to classes, and assertions that apply to individuals. Accordingly, where an ontology definition file (\textit{e.g.}, in TTL format) includes individuals, as it is the case for the present domain ontologies, \textit{cf.}~Section~\ref{sec:marketplace-level}, the latter are considered to be part of the scenario, not the ontology. The remainder of the present work is structured as follows: Section~\ref{sec:marketplace-level} introduces ontologies used by a system of interoperable infrastructures for CME/ICME services: The European Virtual Marketplace Framework. Section \ref{sec:combining} discusses the problem of matching top-level and domain ontologies with each other, from a general point of view, and Section \ref{sec:example} applies this to the challenge of describing concrete features of services provided at the European Virtual Marketplace Framework in agreement with the joint top-level interoperability standard which is given by the EMMO; to illustrate this, a scenario from molecular modelling is considered in detail. Conclusions are formulated in Section~\ref{sec:conclusion}. Work in progress on representing EMMO scenarios as graphs and using these graphs to automatically create Python objects is documented in the Appendix. \section{Semantic assets for services and marketplace platforms} \label{sec:marketplace-level} \subsection{European Virtual Marketplace Framework} \label{subsec:evmpo} The European Virtual Marketplace Framework, established by the joint work of the MarketPlace and Virtual Materials Marketplace (VIMMP) consortia in coordination with the EMMC, is open to participation by any interested provider, translator (\textit{i.e.}, facilitator), or end user of CME/ICME services. It is entirely based on transparent and openly accessible specifications, in particular, on a coherent system of ontologies with the EMMO at the top level. By creating an open framework on the basis of community-governed interoperability standards, a variety of projects, many of which (including EMMC-CSA, MarketPlace, VIMMP, and SimDOME) are funded from the LEIT-NMBP line of the European Union's Horizon 2020 research and innovation programme, contribute to a system of platforms and infrastructures that will support the uptake of CME/ICME solutions by industrial research and development practice. The European Virtual Marketplace Ontology (EVMPO) was agreed as a common point of departure for the standardization of service-oriented semantics, relevant to marketplace platforms, by the projects involved in establishing the European Virtual Marketplace Framework. By defining eleven funda­mental paradigmatic categories, which correspond to irreducible terms that are constitutive to the paradigm underlying \textit{materials model\-ling marketplaces}, the EVMPO provides a structure for further, more specific marketplace-level ontologies. These fundamental paradigmatic categories are specified in Section~\ref{subsec:paradigmatic}. Terms which are not closely related to the marketplace paradigm itself, but occur in the related semantic web, are defined to be \textit{non-paradigmatic}. For this purpose, the EVMPO includes \ttl{evmpo:annotation} as a fundamental non-paradigmatic category. Below the fundamental level, the EVMPO also includes non-fundamental entites as subclasses, \textit{e.g.}, \ttl{evmpo:simulation} as a subclass of \ttl{evmpo:process}, and \ttl{evmpo:service} as a subclass of \ttl{evmpo:product}. Fig.~\ref{fig:emmo-evmpo} shows how, in terms of the \ttl{rdfs:subClassOf} relation, this class hierarchy can be integrated with the most closely related entities from the EMMO. It should be noted that the EMMO, and consequently also the integration as outlined in Fig.~\ref{fig:emmo-evmpo}, is work in progress and may therefore be subject to significant extensions and modifications in the future. \begin{figure}[p] \centering \includegraphics[width=9cm]{emmo-evmpo.eps} \caption{Fundamental paradigmatic categories and other classes from the EVMPO (ellipses) together with related classes from the EMMO (rectangles); arrows between classes represent the transitive reduction of the \ttl{rdfs:subClassOf} relation, and double lines between classes represent the \ttl{owl:equivalentClass} relation. Note: The EVMPO and the EMMO are work in progress; this diagram refers to EMMO pre-release version 0.9.10 \cite{EMMC19}.} \label{fig:emmo-evmpo} \end{figure} Consistency with the EVMPO, and by implication consistency with the EMMO (subsequent to a release of the first stable version of the EMMO~\cite{EMMC19}), is a requirement for all components and infrastructures that aim at interoperating within the European Virtual Marketplace Framework. This design facilitates that VIMMP, MarketPlace, and others can agree on the definition of paradigmatic entities as well as annotations which are either directly or indirectly related to paradigmatic entities, while any platform retains the option to extend its own semantic base as required. To remain interoperable within the European Virtual Marketplace Framework, any such additional works need to be connected semantically to the EVMPO. In this way, a multi-tier system of ontologies is established as follows, from the top (most general) to the lowest (most specific) level: \begin{itemize} \item{} Top-level ontology: The top level is specified within the EMMO \cite{EMMC19}. \item{} Marketplace-level fundamentals: The fundamental categories and their most significant subclasses are specified within the EVMPO. \item{} Marketplace-level ontologies: A more detailed development of the EVMPO categories, with a focus on service and model interoperability, is covered by domain ontologies at the marketplace level \cite{HCSTSLABMGKSFBSC20}. The structure of this system of ontologies mostly follows the subdivision of the semantic space into fundamental paradigmatic categories as specified by the EVMPO, cf.~Section~\ref{sec:marketplace-level}. \item{} Subdomain-specific ontologies: These ontologies deal with subcategories; \textit{e.g.}, subdividing the semantic space covered by the VIMMP Software Ontology (VISO), specific modelling and simulation granularity levels are addressed by VISO-EL (electronic), VISO-AM (atomistic and mesoscopic), and VISO-CO (continuum) \cite{HNBCSCELNSSTVC20}. \end{itemize} The design of the marketplace-level ontologies is guided by two principles: First, they should include classes and relations that are suitable to describe services, agents, and other aspects that are relevant to infrastructures which are expected to interoperate within the European Virtual Marketplace Framework \cite{HCSTSLABMGKSFBSC20}. Beside materials modelling marketplaces, this prospectively includes data marketplaces, innovation platforms, translation environments and simulation platforms as well as any resources connected to such infrastructures (e.g., external databases) and services associated with them. As a second principle, the structure and scope of the individual marketplace-level ontologies should follow the subdivision of the semantic space into fundamental paradigmatic categories from the EVMPO; by implication, any entities that cannot be subsumed under any of these categories need to be classified as subclasses of \ttl{evmpo:annotation}. The alignment of the eight marketplace-level ontologies MACRO, MMTO, OSMO, OTRAS, VICO, VISO, VIVO, and VOV~\cite{HCSTSLABMGKSFBSC20} with the fundamental paradigmatic categories from the EVMPO is specified in Section \ref{subsec:paradigmatic}. Section \ref{subsec:osmo-vov} summarizes how models and the associated variables can be described in this context; it introduces the example scenario that will be used in Section~\ref{sec:example} to illustrate a possible way of matching terms from the marketplace-level ontologies with terms from the EMMO. \subsection{EVMPO fundamental paradigmatic categories} \label{subsec:paradigmatic} Below we list the fundamental paradigmatic categories from the EVMPO and their definitions, including a description of selected subclasses of the fundamental categories and the related marketplace-level ontologies~\cite{HCSTSLABMGKSFBSC20} from the VIMMP project: \begin{enumerate} \item{} \ttl{evmpo:assessment}, \textit{i.e.}, a proposition on the accuracy or performance of an entity or an a expression of trust in an entity \\ $\longrightarrow$ \quad \ttl{evmpo:endorsement\_assessment}, \textit{i.e.}, an assessment by which an entity is claimed to be good or to be fit for a certain purpose \\ $\longrightarrow$ \quad \ttl{evmpo:requirement\_assessment}, \textit{i.e.}, an assessment concerning computational requirements (\textit{e.g.}, computing time, memory, or hardware and software prerequisites) \\ $\longrightarrow$ \quad \ttl{evmpo:validity\_assessment}, \textit{i.e.}, an assessment concerning the uncertainty or error associated with a data item or with a model or simulation workflow by which data are generated \\ \textit{Marketplace-level ontology:}~VIMMP Validation Ontology (VIVO) \item{} \ttl{evmpo:calendar\_event}, \textit{i.e.}, a meeting or activity which is scheduled or can be scheduled; this is defined to be equivalent with the entity \ttl{Vevent} from the W3C iCalendar ontology with time zones as datatypes (ICALTZD) \cite{CM05} \\ \textit{Marketplace-level ontology:}~Ontology for Training Services (OTRAS) \item{} \ttl{evmpo:communication}, \textit{i.e.}, any message that is communicated \\ $\longrightarrow$ \quad \ttl{evmpo:declaration}, \textit{i.e.}, a communication without a recipient \\ $\longrightarrow$ \quad \ttl{evmpo:interlocution}, \textit{i.e.}, a communication with recipient(s) \\ $\longrightarrow$ \quad \ttl{evmpo:statement}, \textit{i.e.}, an elementary communication that cannot be decomposed into multiple statements \\ \textit{Marketplace-level ontology:}~VIMMP Communication Ontology (VICO) \item{} \ttl{evmpo:information\_content\_entity}, \textit{e.g.}, a journal article or a graph; this is defined to be equivalent with \ttl{IAO\_0000030}, labelled \textit{information content entity}, from the Information Artifact Ontology (IAO) \cite{Ceusters12} \\ \textit{Marketplace-level ontology:}~Ontology for Training Services (OTRAS) \item{} \ttl{evmpo:infrastructure}, \textit{i.e.}, infrastructure of an EVMPO interoperable platform (\textit{e.g.}, related to data, hardware, and software) \\ \textit{Marketplace-level ontologies:}~Marketplace-Accessible Computational Resource Ontology (MACRO), VIMMP Software Ontology (VISO) \item{} \ttl{evmpo:interpreter}, corresponding to the concept from Peirce's semiotics, which is based on the triad \textit{sign, interpreter, object}; this is defined to be equivalent with \ttl{emmo-semiotics:interpreter} \\ $\longrightarrow$ \quad \ttl{evmpo:agent}, \textit{i.e.}, an interpreter that can interact with an infrastructure (\textit{e.g.}, with a virtual marketplace platform) \\ \textit{Marketplace-level ontology:}~VIMMP Communication Ontology (VICO) \item{} \ttl{evmpo:material}, \textit{i.e.}, an amount of a physical substance (or mixture of substances) that is part of a more comprehensive real-world object~\cite{EMMC19}; this is defined to be equivalent with \ttl{emmo-material:ma\-terial} \item{} \ttl{evmpo:model}, \textit{i.e.}, an entity that represents a physical object or process by direct similitude or by capturing the relations between its properties in a mathematical framework; this is defined to be equivalent with \ttl{emmo-models:model} \\ \textit{Marketplace-level ontologies:}~Materials Modelling Translation Ontology (MMTO), Ontology for Simulation, Modelling, and Optimization (OSMO), VIMMP Software Ontology (VISO) \item{} \ttl{evmpo:process}, \textit{i.e.}, the temporal evolution of one or multiple entities \\ $\longrightarrow$ \quad \ttl{evmpo:business\_process}, \textit{i.e.}, an abstract procedural representation of economic relations \\ $\longrightarrow$ \quad \ttl{evmpo:physical\_process}; this is defined to be equivalent with \ttl{emmo-processual:process} \\ \textit{Marketplace-level ontology:}~Ontology for Simulation, Modelling, and Optimization (OSMO) \item{} \ttl{evmpo:product}, \textit{i.e.}, a good or service (which can be offered either on a virtual marketplace or off-site) \\ \textit{Marketplace-level ontologies:}~Materials Modelling Translation Ontology (MMTO), Ontology for Training Services (OTRAS) \item{} \ttl{evmpo:property}, \textit{i.e.}, an entity that is determined by an observation process, involving a specific observer that perceives or measures it; this is defined to be equivalent with \ttl{emmo-properties:property} \\ \textit{Marketplace-level ontology:}~VIMMP Ontology of Variables (VOV) \end{enumerate} The fundamental paradigmatic categories need not be disjoint; \textit{e.g.}, \ttl{evmpo:ma}\-\ttl{terial} and \ttl{evmpo:product} overlap, since a material can be manufactured with the intent of selling it as a commodity, by which it becomes a product. Concerning category 9, \textit{n.b.}, due to including business processes, which are not necessarily processes in the sense of the EMMO, \ttl{evmpo:process} is a proper superclass of \ttl{emmo-process:process}. To facilitate ontology alignment, the subclass \ttl{evmpo:physical\_process} was introduced, which is equivalent to \ttl{emmo-process:process}. Subclasses of \ttl{evmpo:physical\_process} include \ttl{evmpo:manufacturing\_process}, \textit{i.e.}, a physical process that serves the production of a good, and \ttl{evmpo:simulation}, \textit{i.e.}, a simulation workflow. \subsection{Variables and model objects} \label{subsec:osmo-vov} The purpose of the VIMMP Ontology of Variables (VOV) consists in organizing the variables (in a broad sense, including constants) that appear in modelling and simulation, and to connect them to models and algorithms in which they are involved as well as to model-related entities (\textit{e.g.}, interaction sites) to which they are attached. In VISO, these model-related entities are referred to as model objects (class \ttl{viso:model\_object}). In particular, the marketplace-level ontologies VOV, VISO, and OSMO can be combined to characterize models, algorithms, and workflows. Two relations from VOV that serve this purpose are \ttl{vov:involves} and \ttl{vov:has\_at}\-\ttl{tached}. A triple of the type \ttl{:X vov:involves :Y} describes that there is a mathematical expression, extension, or algorithmic formulation of \ttl{:X} that contains the variable or the model object \ttl{:Y}; therein, \ttl{:X} can be a model, a constituent part of a model (\textit{e.g.}, a physical equation or materials relation), a solver (numerical implementation of a model), or a physical entity that is modelled. A triple of the type \ttl{:X vov:has\_attached :Y} is employed to associate a model object \ttl{:X} with a variable \ttl{:Y}. In this way, VOV, VISO, and OSMO can be used to state that a rigid two-site Mie potential is employed as model a for ammonia: {\small\color{MidnightBlue} \begin{verbatim} molmod:AMMONIA a osmo:einecs_listed_material; osmo:has_ec_number "231-635-3"^^xs:string. # identifies ammonia molmod:NH3_POTENTIAL a osmo:materials_relation; osmo:has_aspect_paradigmatic_content molmod:AMMONIA; vov:involves molmod:NH3_RIGID_UNIT. molmod:NH3_RIGID_UNIT a viso-am:rigid_object; viso:has_part molmod:NH3_SITE_A, molmod:NH3_SITE_B, molmod:NH3_SITE_COM. molmod:NH3_SITE_A a viso-am:mie_site, viso-am:mass_site. # Mie site 1 molmod:NH3_SITE_B a viso-am:mie_site, viso-am:mass_site. # Mie site 2 molmod:NH3_SITE_COM a viso-am:structureless_object. # centre of mass \end{verbatim}} The scenario given by the statements above will be employed below as an example for illustrating the procedure of matching marketplace-level ontologies with the EMMO. The problem in general and the present procedure are introduced in Section~\ref{sec:combining}. In Section~\ref{subsec:transposition}, the present scenario is reexpressed in terms of classes and relations from the EMMO, which inevitably results in a loss of information; in Section~\ref{subsec:correspondences}, conceivable (``candidate'') correspondences resulting from this transposition are evaluated and reformulated, contributing to an ontology alignment. Further triples can provide more information, \textit{e.g.}, on the size parameter of the Mie interaction sites, which is here specified to be $\sigma = 2.5764$ \AA: {\small\color{MidnightBlue} \begin{verbatim} molmod:NH3_POTENTIAL osmo:has_aspect_object_content molmod:NH3_POTENTIAL_SITE_A. molmod:NH3_POTENTIAL_SITE_A a osmo:materials_relation; osmo:has_aspect_object_content molmod:NH3_CONDITION_POT_A; vov:involves molmod:NH3_SITE_A. molmod:NH3_CONDITION_POT_A a osmo:quantitative_condition; osmo:contains_predetermined_variable molmod:NH3_PARAMETER_SIG. molmod:NH3_PARAMETER_SIG a osmo:unique_elementary; osmo:has_variable_name "sigma"^^xs:string; osmo:has_initial_elementary_value molmod:NH3_ELEMENTARY_SIG; osmo:has_variable_unit qudt-unit:Angstrom. molmod:NH3_ELEMENTARY_SIG a osmo:elementary_value; osmo:is_decimal 2.5764. \end{verbatim}} Therein, the entity representing the unit \AA{} is obtained from the system of ontologies for quantities, units, and datatypes (QUDT) \cite{ZLZP17}. \section{Combining top-level and domain ontologies} \label{sec:combining} \subsection{Semantic heterogeneity} \label{subsec:heterogeneity} A major design goal for a top-level ontology (see Mascardi~\textit{et al.}~\cite{MCR07} for an illustrating comparison of popular ones) consists in achieving the desired level of expressivity with a minimal repertoire of basic terms and relations. Obversely, to ensure interoperability at the marketplace level, the employed ontologies need to capture detailed characteristics of many particular services, models, and interactions. Accordingly, the structure of the corresponding semantic space at the lower level is comparably complex; \textit{e.g.}, the marketplace-level ontologies from VIMMP contain over 400 object class definitions (and, for technical reasons, over 800 additional definitions of property classes), over 250 definitions of object properties (\textit{i.e.}, instances of \ttl{owl:ObjectProperty}), and over 100 definitions of data properties (\textit{i.e.}, instances of \ttl{owl:DatatypeProperty}). Therefore, by design, the EMMO needs to have a structure that is substantially different from that of the marketplace-level ontologies \cite{HCSTSLABMGKSFBSC20}. To ensure that the EMMO is consistently employed at all levels, so that it can contribute to platform and service interoperability as far as possible, the marketplace-level ontologies need to be aligned with the EMMO. Before returning to this specific problem, the present section summarizes some of the related theoretical concepts. In principle, semantic assets are designed to allow data integration and overcome the data heterogeneity problem; in reality, semantic heterogeneity does arise, and it grows over time as resources are added to the semantic web. This is known as the Tower of Babel problem \cite{HH06, Iliadis19}. While some authors regard any presence of semantic heterogeneity as a failure of semantic interoperability and hope for universal agreements, others think that it is unavoidable and look for strategies to deal with it. This may involve a standardized way of documenting semantic assets, basic agreements on the approach to ontology design (\textit{e.g.}, formal monism), and meta-ontological formalizations of roles, procedures, and good practices (or best practices), aiming at pragmatic interoperability \cite{AS10, HCSTSKK20, SD20, SMD06}. For this approach, the challenge consists in agreeing and specifying how the semantic space is structured, documented, and employed in practice; by raising the domain for which universal agreements are pursued from the ontological level to the meta-ontological level, ``the Tower of Babel becomes a Meta-Tower of Babel'' \cite{Varzi19}. As a consequence, semantic heterogeneity is seen as a necessary property of the semantic web, and ontology matching and integration become basic features of its successful mode of operation, rather than an expression of incompleteness. Options for implementing such a mode of operation have been extensively discussed in the literature, first for schemas and then for ontologies; for example, \textit{cf.}~Noy~\cite{Noy04}, Euzenat and Shvaiko~\cite{ES13}, the Ontology Matching website \cite{SE19}, and the material from a series of events organized by the Ontology Alignment Evaluation Initiative (OAEI) \cite{Jimenez19}. The common challenge is how to make use of the knowledge represented in two ontologies, which can differ at various levels (language used, expressivity, modelling paradigm, \textit{etc.}). Typically, such challenges arise if there is an overlap in the domains of knowledge addressed by multiple ontologies, such that data annotated in diverse ways need to be combined and processed together, or if a platform employs multiple domain ontologies that are based on different top-level ontologies. Typical applications include, \textit{e.g.}, simultaneous querying of multiple knowledge bases or, as addressed here, the transposition of semantic content from a source ontology $s$ to a target ontology $t$. \subsection{Ontology alignment} \label{subsec:alignment} Requirements generally differ between tasks occurring at runtime (emphasis on efficiency) and at design time (emphasis on completeness). Similarly, the desired outcome is not always the same: As opposed to ontology integration, \textit{i.e.}, the creation of a merged (integrated) ontology, \textit{ontology matching} is a process that yields a set of correspondences: An ontology alignment \cite{ES13, SE13}. This is known as the ontology matching problem (OMP), for which a great variety of strategies and algorithms have been devised \cite{AR14, ES13, MA12, MMCMGP17, SE13}. The correspondences can be formulated, with increasing expressive power, as follows: \begin{enumerate} \item{} As tuples $(\sigma, \tau, \omega)$, where $\sigma$ and $\tau$ are classes or relations from the source and target ontologies $s$ and $t$, respectively, and $\omega \in \{\sqsubseteq, \sqsupseteq, \equiv\}$ is a logical operator indicating whether $\sigma$ is a subclass or subproperty (\textit{i.e.}, $\sigma \sqsubseteq \tau$) or a superclass or superproperty of $\tau$ (\textit{i.e.}, $\sigma \sqsupseteq \tau$), or whether the two are equivalent (\textit{i.e.}, $\sigma \equiv \tau$). If a statistical approach is employed, the tuple may contain an additional metadata item indicating the probability that the operator can be applied; \textit{cf.}~Shvaiko and Euzenat~\cite{SE13} for a discussion of such approaches. \item{} As OWL statements (\textit{e.g.}, in TTL format) or equivalently as formul\ae{} in OWL description logic (OWL DL); where viable, this approach is preferable in the present context, since it can be implemented immediately in any technical infrastructure where the marketplace-level ontologies are used. \item{} In more expressive logics, \textit{e.g.}, first-order logic or description logics that extend OWL DL \cite{BHLS17}, or by rewriting rules constituting, \textit{e.g.}, a graph transformation system~\cite{KNPR18}. While these formalisms are undecidable in general, their particular application to the OMP might restrict formul\ae{} and rules in a way that keeps them decidable and tractable computationally; this will be addressed by future work, since as discussed below, OWL DL is insufficient to capture a number of typical and relevant cases. \end{enumerate} For the present purpose, we will assume that the source ontology, which here is a marketplace-level ontology, is more expressive semantically, and less abstract; the EMMO will be the target ontology. Since ontologies can easily involve hundreds of entities, automatic and semi-automatic tools with different levels of user involvement have been created to perform ontology matching; see, \textit{e.g.}, Tab.~2 from Mart\'inez and Aldana \cite{MA12} for a list of algorithms, and Tab.~1 from Shvaiko and Euzenat \cite{SE13} for a list of tools. The strategy they use to find correspondences is to look for similarities between entities (classes, relations, individuals), considering various aspects: Label and documentation, using exact or approximate text matching (terminological/linguistic aspect); subclasses and superclasses, relations, their domain and ranges (structural aspect); instances of classes (extensional aspect); data type (constraint-based aspect); class descriptions in the sense of rules (semantic aspect) \cite{Noy04, SE13}. Different matchers can be combined, with weights and thresholds, to build a meta-matching approach~\cite{MA12}; an API to describe alignments has been proposed as well~\cite{Euzenat04}. To be able to compare possible candidate correspondences, distances and similarities measures can be defined~\cite{MA12}. The quality of the overall alignment can also be evaluated, using precision (a measure of correctness) and recall (a measure of completeness); a combination of the two is called F-measure~\cite{SE13}. These concepts were borrowed from the area of data retrieval; in the context of ontology alignment, they can be defined as follows: ``given a reference alignment $R$, the precision of an alignment $A$ is $P(A,R) = |R \cap A| / |A|$, and the recall is given by $R(A,R) = |R \cap A| / |R|$'' (Euzenat~\cite{Euzenat07}, Definition 9). Note that for this purpose of evaluation and comparison of alignments, a reference alignment, for example compiled by a human, has to be provided. To support the matching process, external resources can be used, \textit{e.g.}, a higher-level ontology operating at a moderate level of abstraction~\cite{MLR10} or a linguistic resource such as WordNet~\cite{Miller95}. Applying the OMP to the particular problem at hand, this work aims at establishing a limited semantic space which is aligned between the two levels, serving both as a proof of concept and as a basis for future work that will further extend the aligned space. In the present case, the concerned ontologies are all in an early stage of development. As a consequence, substantial corpora of triples formulated in any of the ontologies do not exist; any attempt at matching the marketplace-level ontologies with the EMMO needs to be based on limited sets of triples that were either created for this special purpose or to guide the marketplace platform design. This precludes any automated approach to ontology matching. Instead, the present strategy is purely based on (human-)asserted correspondences of classes and relations. It can be summarized as follows; we assume that in the beginning, a description in terms of the source ontology $s$ is available for a scenario that is well understood by the ontologist who carries out the matching: \begin{enumerate} \item{} Reexpress the scenario in terms of the target ontology $t$; observe how source-ontology terms $\sigma^\circ_i$, \textit{i.e.}, classes, relations, or more complex expressions, are mapped to target-ontology terms $\tau^\circ_i$, where $i \in \mathbb{N}$ is an index. These instances, $\sigma^\circ_i \mapsto \tau^\circ_i$, yield candidate correspondences $\sigma^\circ_i \sqsubseteq^? \tau^\circ_i$, each of which is further addressed by the subsequent steps. \smallskip \item{} If the candidate correspondence is valid, $\sigma^\circ_i \sqsubseteq \tau^\circ_i$, proceed to the next step without any change, \textit{i.e.}, $\sigma_i' = \sigma^\circ_i$, $\tau_i' = \tau^\circ_i$. If it is invalid, $\sigma^\circ_i \not\sqsubseteq \tau^\circ_i$, relax it such that $\sigma_i' \sqsubseteq \tau_i'$ becomes valid by \begin{itemize} \item{} replacing $\tau^\circ_i$ with a more general term $\tau_i' \sqsupseteq \tau^\circ_i$ ($\tau$-generalization), or \item{} replacing $\sigma^\circ_i$ with a more specific term $\sigma_i' \sqsubseteq \sigma^\circ_i$ ($\sigma$-refinement). \end{itemize} If this attempt reduces the correspondence to a trivial statement, discard the candidate correspondence. \smallskip \item{} Strengthen the correspondence as far as possible by \begin{itemize} \item{} replacing $\sigma_i'$ with a more general term $\sigma_i'' \sqsupseteq \sigma_i'$ ($\sigma$-generalization), \item{} replacing $\tau_i'$ with a more specific term $\tau_i'' \sqsubseteq \tau_i'$ ($\tau$-refinement), or \item{} replacing the subclass/subproperty operator $\sqsubseteq$ with the equivalence operator $\equiv$ ($\sigma$-$\tau$-identification). \end{itemize} The outcome has the form $\sigma_i'' \sqsubseteq \tau_i''$, or $\sigma_i'' \equiv \tau_i''$ if the operator has been replaced. \smallskip \item{} Express the correspondence in OWL (\textit{e.g.}, TTL notation) or OWL DL if possible. If it cannot be expressed in OWL, attempt to simplify it, \textit{e.g.}, by relaxing it again as far as necessary; if that is impossible without reducing the correspondence to a trivial statement, the candidate is discarded. \end{enumerate} Step 4 can easily be adjusted in cases where there is no need to introduce the alignment immediately into an OWL based architecture. This procedure is not meant to be automated; in particular, for the present problem of matching domain ontologies with the EMMO pre-release version, it requires a close reading of definitions from the source and target ontologies and the available documentation to assess how the statements must be relaxed and strengthened, respectively, to be valid and as powerful as possible. \section{Example: Intermolecular pair potential} \label{sec:example} \subsection{Reexpressing the scenario in the target ontology} \label{subsec:transposition} The following remarks refer to the EMMO pre-release development version 0.9.10~\cite{EMMC19}; the precise way of mapping individuals and relations between them from the marketplace-level ontology representation to an EMMO representation will be subject to change as all of the involved ontologies are further developed. However, the main purpose of the present example consists not in its result, but in taking the first steps toward ontology alignment within the European Virtual Marketplace Framework, evaluating to what extent the method proposed in Section~\ref{subsec:alignment} is suitable for this purpose, and providing an orientation for future work on this basis. Mapping the first part of the example from Section~\ref{subsec:osmo-vov} to entities from EMMO version 0.9.10 yields: {\small\color{MidnightBlue} \begin{verbatim} molmod:AMMONIA a emmo-material:material. molmod:NH3_POTENTIAL a emmo-models:material_relation. molmod:AMMONIA emmo-models:has_model [ a emmo-models:physics_based_model; emmo-mereotopology:has_proper_part molmod:NH3_POTENTIAL, molmod:NH3_RIGID_UNIT ]. molmod:NH3_RIGID_UNIT a emmo-graphical:symbolic, emmo-semiotics:sign; emmo-mereotopology:has_proper_part molmod:NH3_SITE_A, molmod:NH3_SITE_B, molmod:NH3_SITE_COM. molmod:NH3_SITE_A a emmo-graphical:symbol. molmod:NH3_SITE_B a emmo-graphical:symbol. molmod:NH3_SITE_COM a emmo-graphical:symbol. \end{verbatim}} To keep the example above and the present discussion readable, EMMO entities are represented by their labels rather than their identifiers; \textit{e.g.}, we write \ttl{emmo-models:has\_model} to represent the relation that has the identifier \ttl{emmo-models:EMMO\_24c71baf\_6db6\_48b9\_86c8\_8c70cf36db0c} and the label \ttl{"has\_model"}. The transposed version above does not include any entity corresponding to the elementary data item from the source-ontology version of the example, \textit{i.e.}, the string \ttl{"231-635-3"}, since the present target ontology does not include any data properties and elementary data items; in the EMMO, strings, numbers, \textit{etc.}, are \ttl{emmo-graphical:symbolic} individuals rather than elementary data items, and all relations that are defined in the EMMO are object properties. Accordingly, it would be possible to introduce an EMMO individual representing \ttl{"231-635-3"}; however, since it is impossible in OWL for an elementary data item to be the \textit{same as} (\ttl{owl:sameAs}) an individual, this would not yield any formal correspondence at the ontological level. The same, consequently, applies to the datatype properties from the marketplace-level ontologies: They cannot be matched with any of the relations from the EMMO; the EMMO only contains object properties, which cannot be \textit{equivalent} (\ttl{owl:equivalentProperty}) to datatype properties. Considering the present example, it should be noted that entities such as the pair potential or the molecular centre of mass from the example are not actual features of fluid ammonia, but of a molecular model for ammonia. For the transposition of the scenario, we assume that in an appropriate formal language for molecular models, interaction sites and other \textit{structureless objects} (\ttl{viso-am:structureless\_object}) are syntactically irreducible elementary symbols and hence \ttl{emmo-graphical:symbol} individuals by the EMMO definition~\cite{EMMC19}, whereas a rigid unit that contains multiple sites is an entity composed of multiple symbols (in the theory of formal languages, a \textit{word}) and hence a \ttl{emmo-graphical:symbolic} entity, which in the EMMO is defined as a composition of symbols, including a single symbol as a special case~\cite{EMMC19}. The specification of such a formal language, which would be unproblematic, is beyond the scope of the present work. We merely note that by the EMMO definition, symbols ``of a formal language'' are the smallest irreducible parts of symbolic entities, which depends on the way in which the formal language is specified; it is certainly possible to refer to interaction sites and other structureless objects by elementary symbols ($a$, $b$, $c$, \dots, or special symbols or elementary keywords devised for this purpose). By its foundation on Peircean semiotics \cite{Peirce91}, the EMMO applies a clear distinction between physical objects and the signs for them; thereby, symbolic entities (including irreducible symbols) need not be signs; they only become signs if they represent existing physical objects in the eyes of an interpreter. (Here, the interpreter, who is not explicitly represented in the example, might be a provider or user of the molecular model.) Moreover, due to the interpretation of mereotopology~\cite{Varzi96} underlying the EMMO, any existing (``real world'') physical objects must be four-dimensional spacetime entities; \textit{i.e.}, they must correspond to trajectories of contiguous volumes that can be tracked over time. Accordingly, the definition of the top entity from EMMO version 0.9.10, \ttl{emmo-mereotopology:emmo}, states: ``A real world object is then a 4D topological sub-region of the universe. [\dots] It follows that, for the EMMO, real world objects of dimensionality lower than 4D do not exist (\textit{e.g.}{} surfaces, lines)'' \cite{EMMC19}. If a symbolic entity is used to refer to any lower-dimensional structure, it is not a \ttl{emmo-semiotics:sign} (nor an \ttl{emmo-models:model}), since it does not represent a ``real-world object'' in the sense attributed to this term by the EMMO. Hence, in particular, \ttl{molmod:NH3\_RIGID\_UNIT}, the rigid unit that contains the interaction sites of the molecular model, is a sign for an ammonia molecule. It is debatable whether it is also a model in the sense of the EMMO, which requires ``direct similitude'' with the represented object or a mathematical formalization of its behaviour \cite{EMMC19}; here, we do not classify it as a model. The two Mie sites \ttl{molmod:NH3\_SITE\_A} and \ttl{molmod:NH3\_SITE\_B}, however, are only symbols (and part of a sign), since they do not represent any particular part of the molecule or any other part of spacetime specifically. The pair potential \ttl{molmod:NH3\_POTENTIAL} might be understood to represent the potential energy from the pairwise interaction between two NH$_3$ molecules; however, this does not constitute semiosis in the sense of the EMMO, since the referenced object is not a 4D entity, but a hypothetical additive contribution to a scalar quantity. Consequently, \ttl{molmod:NH3\_POTENTIAL} is \textit{not} an \ttl{emmo-models:model} individual; however, it is a part of such an individual, since the combination of all pair potentials involved in modelling a system yields a parameterization of a classical-mechanical equation of motion that describes the trajectory of the system, which is a spacetime individual in the sense of the EMMO. In the same way, \ttl{molmod:NH3\_SITE\_COM}, which would represent the centre of mass of the molecule, cannot be a sign in the sense of the EMMO: The centre of mass is a point (not a volume), and its trajectory over time is one-dimensional rather than four-dimensional. However, \ttl{molmod:NH3\_SITE\_COM} is part of a sign, by belonging to \ttl{molmod:NH3\_RIGID\_UNIT}. \subsection{Construction of ontological correspondences} \label{subsec:correspondences} The procedure from Section~\ref{subsec:alignment} will now be followed to create the fragment of an ontology alignment between marketplace-level ontologies and the EMMO. By reexpressing the source-ontology (OSMO, VISO, and VOV) scenario from Section~\ref{subsec:osmo-vov} in the target ontology (EMMO) as in Section~\ref{subsec:transposition}, classes and relations are mapped to each other (step 1) \begin{equation} \sigma_i^\circ ~ \mapsto ~ \tau_i^\circ \quad \textnormal{for} ~ 1 \leq i \leq 10, \label{eqn:step1} \end{equation} where the initial source terms are \begin{eqnarray} \sigma_1^\circ ~ & ~ = ~ & ~ \ttl{osmo:einecs\_listed\_material}, \label{eqn:step1source} \\ \sigma_2^\circ ~ & ~ = ~ & ~ \ttl{osmo:materials\_relation}, \nonumber \\ \sigma_3^\circ ~ = ~ \sigma_4^\circ ~ & ~ = ~ & ~ \ttl{viso-am:rigid\_object}, \nonumber \\ \sigma_5^\circ ~ & ~ = ~ & ~ \ttl{viso-am:mie\_site}, \nonumber \\ \sigma_6^\circ ~ & ~ = ~ & ~ \ttl{viso-am:mass\_site}, \nonumber \\ \sigma_7^\circ ~ & ~ = ~ & ~ \ttl{viso-am:structureless\_object}, \nonumber \\ \sigma_8^\circ ~ & ~ = ~ & ~ \ttl{viso:has\_part}, \nonumber \\ \sigma_9^\circ ~ & ~ = ~ & ~ \ttl{vov:involves}, \nonumber \\ \sigma_{10}^\circ ~ & ~ = ~ & ~ \ttl{osmo:has\_aspect\_paradigmatic\_content}, \nonumber \end{eqnarray} and the initial target terms are \begin{eqnarray} \tau_1^\circ ~ & ~ = ~ & ~ \ttl{emmo-material:material}, \label{eqn:step1target} \\ \tau_2^\circ ~ & ~ = ~ & ~ \ttl{emmo-models:material\_relation}, \nonumber \\ \tau_3^\circ ~ & ~ = ~ & ~ \ttl{emmo-semiotics:sign}, \nonumber \\ \tau_4^\circ ~ & ~ = ~ & ~ \ttl{emmo-graphical:symbolic}, \nonumber \\ \tau_5^\circ = \tau_6^\circ = \tau_7^\circ ~ & ~ = ~ & ~ \ttl{emmo-graphical:symbol}, \nonumber \\ \tau_8^\circ ~ & ~ = ~ & ~ \ttl{emmo-mereotopology:has\_proper\_part}, \nonumber \\ \tau_9^\circ ~ & ~ = ~ & ~ (\ttl{emmo-mereotopology:has\_proper\_part})^- \nonumber \\ & & \quad \quad \circ ~ \ttl{emmo-mereotopology:has\_proper\_part}, \nonumber \\ \tau_{10}^\circ ~ & ~ = ~ & ~ (\ttl{emmo-models:has\_model} ~ \circ \nonumber \\ & & \quad \quad \ttl{emmo-mereotopology:has\_proper\_part})^-. \nonumber \end{eqnarray} Therein, $p^-$ denotes the inverse relation to $p$, and $p \circ q$ denotes the chain product of the relations $p$ and $q$. By evaluating the respective candidate correspondences (step 2) on the basis of the definitions from the marketplace-level ontologies and the EMMO, $\sigma_i^\circ \sqsubseteq \tau_i^\circ$ is found to be valid for $i \in \{1, 2, 4, 5, 6, 7\}$; hence, $\sigma'_i = \sigma_i^\circ$ and $\tau'_i = \tau_i^\circ$ for these $i$. For $i = 3$, no non-trivial and valid relaxation can be found: A rigid object need not be a sign according to the EMMO, and whether it is one or not depends on its understanding by an interpreter. For the associated semiotic processes, a clear and simple rule cannot be formulated; accordingly, this candidate is discarded. The correspondences between relations can be relaxed by $\tau$-generalization to \begin{equation} \tau'_8 ~ = ~ \ttl{emmo-mereotopology:has\_part}, \end{equation} with $\sigma'_8 = \sigma_8^\circ$, and by $\sigma$-refinement to \begin{eqnarray} \sigma_{9}' ~ & ~ = ~ & ~ \ttl{vov:involves} ~ \sqcap ~ [\ttl{osmo:materials\_relation}]^\bullet \\ && \quad \quad \sqcap ~ ^\bullet[\ttl{viso:model\_object}], \nonumber \\ \sigma_{10}' ~ & ~ = ~ & ~ \ttl{osmo:has\_aspect\_paradigmatic\_content} \nonumber \\ & & \quad \quad \sqcap ~ [\ttl{osmo:materials\_relation}]^\bullet ~ \sqcap ~ ^\bullet[\ttl{evmpo:material}], \nonumber \end{eqnarray} with $\tau'_{9} = \tau_{9}^\circ$ and $\tau'_{10} = \tau_{10}^\circ$, where $[c]^\bullet$ is the relation that holds whenever the subject is an individual of class $c$ (irrespective of the object), $^\bullet{}[c]$ is the relation that holds whenever the object is an individual of class $c$ (irrespective of the subject), and $\sqcap$ is the intersection operator, applied to relations. In this way, $\sigma_i' \sqsubseteq \tau_i'$ is valid for all the remaining cases (\textit{i.e.}, $i \neq 3$). Strengthening the correspondences (step 3) yields \begin{equation} \ttl{evmpo:material} ~ \equiv ~ \ttl{emmo-material:material} \label{eqn:step3case1} \end{equation} by $\sigma$-generalization and $\sigma$-$\tau$-identification for $i = 1$, \begin{equation} \ttl{osmo:materials\_relation} ~ \equiv ~ \ttl{emmo-models:material\_relation} \label{eqn:step3case2} \end{equation} by $\sigma$-$\tau$-identification for $i = 2$, \begin{equation} \ttl{viso:model\_object} ~ \sqsubseteq ~ \ttl{emmo-graphical:symbolic} \label{eqn:step3case4} \end{equation} by $\sigma$-generalization for $i = 4$, \begin{equation} \ttl{viso-am:structureless\_object} ~ \sqsubseteq ~ \ttl{emmo-graphical:symbol} \label{eqn:step3case567} \end{equation} for $i \in \{5, 6\}$ by $\sigma$-generalization and for $i = 7$ unchanged, \begin{equation} \ttl{viso:has\_part} ~ \sqsubseteq ~ \ttl{emmo-mereotopology:has\_part}, \label{eqn:step3case8} \\ \end{equation} for $i = 8$ unchanged, \begin{eqnarray} & & \Big(\ttl{vov:involves} \label{eqn:step3case9} \\ & & \quad \quad \sqcap ~ [\ttl{osmo:materials\_relation}]^\bullet ~ \sqcap ~ ^\bullet[\ttl{viso:model\_object}] \Big) \nonumber \\ & & \quad \quad \quad \quad \sqsubseteq \quad \Big(\Big([\ttl{emmo-models:model}]^\bullet \nonumber \\ & & \quad \quad \quad \quad \quad \quad \sqcap ~ \ttl{emmo-mereotopology:has\_proper\_part}\Big)^- \nonumber \\ & & \quad \quad \quad \quad \quad \quad \quad \quad \circ ~ \ttl{emmo-mereotopology:has\_proper\_part}\Big), \nonumber \end{eqnarray} for $i = 9$ by $\tau$-refinement, and \begin{eqnarray} & & \Big(\ttl{osmo:has\_aspect\_paradigmatic\_content} \label{eqn:step3case10} \\ & & \quad \quad \quad \sqcap ~ [\ttl{osmo:materials\_relation}]^\bullet ~ \sqcap ~ ^\bullet[\ttl{evmpo:material}]\Big) \nonumber \\ & & \quad \quad \quad \quad \quad \quad \sqsubseteq \quad \Big(\ttl{emmo-models:has\_model} ~ \circ \nonumber \\ & & \quad \quad \quad \quad \quad \quad \quad \quad \quad \ttl{emmo-mereotopology:has\_proper\_part}\Big)^-, \nonumber \end{eqnarray} for $i = 10$ unchanged. Eqs.~(\ref{eqn:step3case1}) to (\ref{eqn:step3case8}) can be expressed in OWL (step 4): {\small\color{MidnightBlue} \begin{verbatim} evmpo:material owl:equivalentClass emmo-material:material. osmo:materials_relation owl:equivalentClass emmo-models:material_relation. viso:model_object rdfs:subClassOf emmo-graphical:symbolic. viso-am:structureless_object rdfs:subClassOf emmo-graphical:symbol. viso:has_part rdfs:subPropertyOf emmo-mereotopology:has_part. \end{verbatim}} Therein, the first statement was already included in the EVMPO-EMMO integration, \textit{cf.}~Section~\ref{subsec:evmpo} and Fig.~\ref{fig:emmo-evmpo}, whereas the subsequent statements contribute to aligning the marketplace-level ontologies with the EMMO. The present example also illustrates the limitations due to using OWL for the purpose of formalizing the alignment. Eqs.~(\ref{eqn:step3case9}) and (\ref{eqn:step3case10}) exceed the expressive capacity of OWL; however, the meaning of these correspondences is intuitively straightforward, and similar cases occur often in practice: Eq.~(\ref{eqn:step3case9}), from $i = 9$, states that ``if \ttl{:X vov:involves :Y}, where \ttl{:X} is a \ttl{osmo:materials\_relation} and \ttl{:Y} is a \ttl{viso:model\_object}, then there is an \ttl{emmo-models:model} that relates to both of them by \ttl{emmo-mereo}\-\ttl{topology:has\_proper\_part},'' \textit{i.e.}, they are both part of the same model. Eq.~(\ref{eqn:step3case10}), from $i = 10$, expresses the rule that ``if \ttl{:X osmo:has\_}\-\ttl{aspect\_para}\-\ttl{digmatic\_content :Y}, where \ttl{:X} is a \ttl{osmo:materials\_rela}\-\ttl{tion} and \ttl{:Y} is a \ttl{evmpo:material}, then there is an individual \ttl{:Z} such that \ttl{:Y em}\-\ttl{mo-models:has\_}\-\ttl{model :Z} and \ttl{:Z emmo-mereotopology:has\_proper\_}\-\ttl{part :X}.'' Statements like these can easily be formulated in first-order logic, extensions of OWL DL by additional operators (see above), or by graph transformation systems~\cite{KNPR18} which would apply to graph representations of the scenarios (see the Appendix). \section{Conclusion} \label{sec:conclusion} Data technology for CME/ICME services and platforms needs to aim at FAIR data management~\cite{Bicarregui16} and semantic interoperability with respect to concrete software and data infrastructures, \textit{e.g.}, materials modelling marketplaces, for which it is crucial to develop marketplace-level domain ontologies by which the associated models, tools, infrastructures, and workflows, can be documented in detail. The EMMO, on the other hand, aims at capturing materials modelling and characterization in general; beyond this, it is expected to serve as an entirely domain-independent top-level ontology. The present work shows that the gap between the top level and the domain level can indeed be bridged, even where, as it is the case here, the involved ontologies are at a relatively early stage of development. An ontology alignment, once established, becomes community know\-ledge and remains available for future use; we suggest to include these alignment statements in a TTL file that should be distributed together with the EVMPO and the marketplace-level ontologies~\cite{HCSTSLABMGKSFBSC20}. As such knowledge is accumulated over time, the EMMO becomes more accessible to its prospective community of users, not all of whom can be expected to familiarize themselves with all intricacies of the philosophical conceptualization underlying the EMMO classes and relations. Domain ontologies, however, are comparably close to the language employed in a particular field and the intuition of domain experts. Therefore, ontology matching, even fragment by fragment, successively contributes to creating the necessary link between domain-specific expertise and the EMMO as an overarching interoperability standard. To illustrate this, it is improbable that among developers of molecular simulation software, a majority will at any point be aware of the circumstance that a Lennard-Jones interaction site can be documented as an \ttl{emmo-graphical:symbol} individual, or that a multi-site rigid-unit part of a molecular model is best represented as an \ttl{emmo-graphical:symbolic}. Instead, a CME/ICME domain expert might find it more easy to recognize that \ttl{viso-am:lj\_site} and \ttl{viso-am:rigid\_object}, respectively, are appropriate concepts. Then, from VISO~\cite{HNBCSCELNSSTVC20} and the present ontology alignment, \begin{eqnarray} \ttl{viso-am:lj\_site} ~ &\sqsubseteq& ~ \ttl{viso-am:structureless\_object} \\ &\sqsubseteq& ~ \ttl{emmo-graphical:symbol}, \nonumber \\ \ttl{viso-am:rigid\_object} ~ &\sqsubseteq& ~ \ttl{viso:model\_object} \\ &\sqsubseteq& ~ \ttl{emmo-graphical:symbolic}, \nonumber \end{eqnarray} the EMMO representation of these entities can be deduced correctly. To make this approach and the EMMO-based semantic interoperability architecture as a whole more viable, future work should address mechanisms by which alignment rules can be included if they are beyond the expressive capacity of OWL DL; \textit{e.g.}, graph rewriting rules could be applied to representations of scenarios as graphs, building on the work in progress documented in the Appendix. Furthermore, a community-approved procedure needs to be established for suggesting, evaluating, and disseminating ontology alignments that connect the EMMO to domain knowledge. \begin{acknowledgement} The authors thank N.~Adamovic, W.~L.~Cavalcanti, \AA.~Ervik, A.~Hashibon, and E.~A.~M\"uller for fruitful discussions. The co-authors Y.B., E.G., G.G., G.M., and G.J.S.\ acknowledge funding from the European Union's Horizon 2020 research and innovation programme under grant agreement no.\ 723867 (EMMC-CSA), the co-authors Y.B., G.G., G.M., and G.J.S.\ under grant agreement no.\ 760173 (MarketPlace), the co-authors S.C., G.G., M.T.H., G.M.\ under grant agreement no.\ 760907 (VIMMP), and the co-author E.G.\ under grant agreement no.\ 814492 (SimDOME). \end{acknowledgement} \section*{Appendix: Graph representation of EMMO scenarios} \addcontentsline{toc}{section}{Appendix} Using the EMMO Python API~\cite{EMMC19} in combination with the Lucidchart online tool~\cite{Lucidchart20}, scenarios represented as a graph (\textit{e.g.}, see Fig.\ \ref{fig:lucidchart-model}) can be converted automatically to a list of Python classes consistent with the Owlready2 format \cite{Lamy17} which facilitates further processing by the EMMO API. The complete procedure involves performing the following steps: \begin{enumerate} \item{} Assign numerical labels to concepts and relations (\textit{e.g.}, see Tab.~\ref{tab:edge-labels}). \item{} Export the flowchart data from Lucidchart~\cite{Lucidchart20} into CSV format. \item{} Insert parameters in the \texttt{parameters.py} module file~\cite{EMMC19}. \item{} Execute the \texttt{CSP\_ontology.py} script~\cite{EMMC19} to generate the list of classes for Owlready2~\cite{Lamy17}. \end{enumerate} For further details, we refer to the EMMO Lucidchart documentation~\cite{Mogni19} and the upcoming release version of the EMMO. \begin{figure}[p] \centering \includegraphics[width=12cm]{lucidchart-model-rot.eps} \caption{Graph representation of EMMO individuals and relations from a scenario describing a simulation workflow for crystal structure prediction; \textit{cf.}~Tab.~\ref{tab:edge-labels} for the edge labels. This diagram was created using Lucidchart~\cite{Lucidchart20}.} \label{fig:lucidchart-model} \end{figure} \begin{table}[h] \caption{Codes (edge labels) employed for the EMMO relations in the present graph representation.} \label{tab:edge-labels} \begin{tabular}{cl} \hline code ~ & ~ EMMO relation name and description, \textit{cf.}~Ghedini~\textit{et al.}~\cite{EMMC19} \\ \hline 0 ~ & ~ \ttl{emmo-properties:has\_property} \\ ~ & ~ a property is a ``sign that stands for an object that the 'interpreter' \\ ~ & ~ perceived through a well defined observation process'' \cite{EMMC19}, \textit{e.g.}, an \\ ~ & ~ experimental measurement process; \ttl{has\_property} relates the observed \\ ~ & ~ object to the outcome of that process \\ 1 ~ & ~ \ttl{emmo-processual:has\_proper\_participant} \\ ~ & ~ relates a process to an entity that participates in the process; irreflexive \\ ~ & ~ relation (as opposed to \ttl{has\_participant}) \\ 2 ~ & ~ \ttl{emmo-semiotics:has\_sign} \\ ~ & ~ relates an object to a sign that refers to it by participation in semiosis \\ 3 ~ & ~ \ttl{emmo-mereotopology:has\_proper\_part} \\ ~ & ~ irreflexive parthood relation \\ 4 ~ & ~ \ttl{emmo-mereotopology:has\_spatial\_part} \\ ~ & ~ ``relation that isolates a proper part that extends itself in time within the \\ ~ & ~ lifetime of the whole, without covering the full spatial extension of the 4D \\ ~ & ~ whole (\textit{i.e.}{} is not a temporal part)'' \cite{EMMC19} \\ \hline \end{tabular} \end{table}
\section{Introduction} \label{sec:intro} Network coding has been attracting increasing attention since the seminal papers~\cite{ACLY00,LiYeuCai03} as it increases the communication throughput compared to routing. An algebraic formulation for the network coding problem can be found in~\cite{KM03}. A detailed survey on multicast network coding can be found in~\cite{FraSol16}. Throughout this paper we consider only linear networks, namely, all the nodes in the network compute linear functions. In a line of recent works, there is a distinction between scalar network coding and vector network coding, depending on whether messages sent along network edges are scalars or vectors. Vector network coding was mentioned in~\cite{CDFZ06} as \emph{fractional network coding} and extended to vector network coding in~\cite{EbrFra11}. In~\cite{SunYanLonYinLi16}, a network was constructed whose minimal alphabet for a scalar linear solution is strictly larger than the minimal alphabet for a vector linear solution, albeit, this gap is just $1$. In~\cite{EW18}, a larger gap was found in certain carefully constructed networks, which was later extended even to minimal networks in~\cite{CaiEtzSchWac19}. The main object we study in this paper is the \emph{generalized combination network}. Originally, the (non-generalized) combination networks were first introduced in~\cite{RiiAhl06}. It was shown in~\cite{EW18,CaiEtzSchWac19} that vector linear network coding does not outperform scalar linear coding schemes in terms of the gap for \emph{minimal} combination networks. The \emph{generalized combination networks} were first introduced in~\cite{EW18} and a gap was shown to exist for certain network parameters. The goal of this work is to investigate the gap between the minimum required alphabet size for scalar-linear and vector-linear solutions of generalized combination networks. Our main contributions are: we first develop new upper and lower bounds on the maximal number of nodes in the middle layer of such networks depending on the other parameters of the network. Our new upper bounds are better than a previous bound from~\cite{EZ19covering-multiple} in some parameter range and the lower bounds cover a wide range of network parameters. We then convert these bounds to bounds on the minimal alphabet size for a linear solution for many networks. Finally, we derive a lower bound on the gap for any fixed network structure. To the best of our knowledge, this is the first lower bound that applies to nearly all generalized combination networks. The rest of this paper is organized as follows. In Section~\ref{sec:pre} we introduce the concept of generalized combination networks and provide the notation used throughout this paper. In Section~\ref{sec:ub_rs} we give two new upper bounds on the maximum number of middle-layer nodes, and in Section~\ref{sec:lb_rv} we give two new lower bounds on it. In Section~\ref{sec:bound_gap} we show the gap between the field sizes of scalar-linear and vector-linear solutions. In Section~\ref{sec:discussion} we conclude with a brief discussion of the results. \section{Preliminaries} \label{sec:pre} \subsection{The Generalized Combination Network} \begin{figure}[t] \centering \resizebox{.9\linewidth}{!}{\input{GeneralizedNetwork.tex}} \caption{Illustration of $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ networks}\label{fig:Network} \vspace{-3ex} \end{figure} An $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ generalized combination network is illustrated in Figure~\ref{fig:Network} (see also~\cite{EW18}). The network has $3$ layers. The first layer consists of a source with $h$ source messages. The source transmits $h$ messages to $r$ middle nodes via $\ell$ parallel links (solid lines) between itself and each middle node. Any $\alpha$ middle nodes in the second layer are connected to a unique receiver (again, by $\ell$ parallel links each). Each receiver is also connected to the source via $\varepsilon$ direct links (dashed lines). \subsection{Network Coding Solutions} In the multicast setting, we have the following coding problem: for each node in the graph, find functions of its incoming messages to transmit on its outgoing links, such that each receiver can recover all the messages. Such an assignment of functions is called a \emph{solution} of the network. If these functions are linear, we obtain a \emph{linear solution}. In linear network coding, each linear function for a receiver consists of \emph{coding coefficients} for each incoming message. If the messages are scalars in ${{\Bbb F}}_{\!q}$ and the coding coefficients are vectors over ${{\Bbb F}}_{\!q}$, the solution is called a \emph{scalar linear solution}, denoted by $(q,1)$-{linear solution}. If the messages are vectors in ${{\Bbb F}}_{\!q}^t$, and the coding coefficients are matrices over ${\Bbb F}_q$, it is called a \emph{vector solution}, denoted by $(q,t)$-linear solution. It was shown in~\cite[Thm.~8]{EW18} that the $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ network has a trivial solution if $h\leq\ell+\varepsilon$ and it has no solution if $h>\alpha\ell+\varepsilon$. In this paper we focus on the non-trivially solvable networks, so it is assumed $\ell+\varepsilon< h \leq \alpha\ell+\varepsilon$ throughout the paper. \subsection{The Field Size Gap} The field size of a linear solution is an important parameter that directly influences the complexity of the calculations at the network nodes. In order to investigate the advantage of vector solutions in terms of the field size, a metric to measure the improvement needs to be specified. We follow the notations from~\cite{CaiEtzSchWac19} to distinguish between scalar and vector linear solutions. Given a network $\mathcal{N}$, let $$q_s(\mathcal{N}):=\min\{q: \mathcal{N}\textrm{ has a } (q,1)-\textrm{linear solution}\}.$$ The $(q_s(\mathcal{N}),1)$ is said to be \emph{scalar-optimal}. Similarly, let $$q_v(\mathcal{N}):=\min\{q^t: \mathcal{N}\textrm{ has a } (q,t)-\textrm{linear solution}\}.$$ Note that $q_v(\mathcal{N})$ is defined by the size of the vector space, rather than the field size. For $q^t = q_v(\mathcal{N})$, a $(q,t)$-linear solution is called \emph{vector-optimal}. By definition, $q_s(\mathcal{N})\geq q_v(\mathcal{N}).$ Small field sizes are preferable in practical algorithm designs for network coding~\cite{LSB2004,LS09,GSRMsep2019}. We define the \emph{gap} as \[ \gap (\mathcal{N})\triangleq \log_2 (q_s(\mathcal{N})) -\log_2(q_v(\mathcal{N})),\] which intuitively measures the advantage of vector network coding by the amount of extra bits per link we have to pay for an optimal scalar-linear solution compared to an optimal vector-linear solution. We note that this differs from the definition of gap in~\cite{CaiEtzSchWac19}. \subsection{Codes in the Grassmannian Space} The Grassmannian $\mathcal{G}(n,k)$ is a set of all subspaces of $\mathbb{F}_q^n$ of dimension $k\leq n$. The cardinality of $\mathcal{G}(n,k)$ is the well-known $q$-binomial: \begin{equation*} |\mathcal{G}(n,k)|=\quadbinom{n}{k}_q \triangleq \prod\limits_{i=0}^{k-1} \frac{q^n-q^i}{q^k-q^i}=\prod\limits_{i=0}^{k-1} \frac{q^{n-i}-1}{q^{k-i}-1}, \end{equation*} where \begin{equation} \label{eq:gauss} q^{k(n-k)}\leq \quadbinom{n}{k}_q < \gamma \cdot q^{k(n-k)}, \end{equation} with $\gamma\approx 3.48$~\cite[Lemma 4]{KK08}. \begin{definition}[Covering Grassmannian Codes~\cite{EZ19covering-multiple}] An $\alpha$-$(n,k,\delta)_q^c$ \emph{covering Grassmannian code} $\mathbb{C}$ is a subset of $\mathcal{G}(n,k)$ such that each subset with $\alpha$ codewords of $\mathbb{C}$ spans a subspace whose dimension is at least $\delta+k$ in $\mathbb{F}_q^n$. \end{definition} The following theorem from~\cite{EZ19covering-multiple} shows the connection between covering Grassmannian codes and linear network coding solutions. \begin{theorem}[{\cite[Thm.~4]{EZ19covering-multiple}}]\label{thm:cover_scalar_sol} The $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ network is solvable with a $(q,t)$-linear solution if and only if there exists an $\alpha$-$(ht,\ell t,ht-\ell t-\varepsilon t)_{q}^c$ code with $r$ codewords. \end{theorem} \section{Upper Bounds on the Middle Layer} \label{sec:ub_rs} In this section we fix the network parameters $\alpha,\ell,\varepsilon, h$ and we upper bound the number of nodes in the middle layer,~$r$. \begin{lemma}\label{lm-full-t2} Let $\alpha\geq 2$, $h,\ell,t\geq 1$, $\varepsilon\geq 0$, $h-\varepsilon \geq 2 \ell$, and let $\mathcal{T}$ be a collection of subspaces of ${\Bbb F}_q^{(h-\varepsilon) t}$ such that \begin{enumerate} \item[(i)] each subspace has dimension at most $\ell t$; and \item[(ii)] any subset of $\alpha$ subspaces spans ${\Bbb F}_q^{(h-\varepsilon)t}$. \end{enumerate} Then we have $\alpha \ell \geq h-\varepsilon$ and $$|\mathcal{T}| \leq \parenv*{\floor*{ \frac{h-\varepsilon}{\ell} }-2} +\parenv*{\alpha- \floor*{ \frac{h-\varepsilon}{\ell} }+1} \sbinom{\ell t+1}{1}.$$ \end{lemma} \begin{IEEEproof} Take arbitrarily $\lfloor \frac{h-\varepsilon}{\ell} \rfloor-2$ subspaces from $\mathcal{T}$ and take arbitrarily a subspace $W$ of dimension $(h-\varepsilon)t-\ell t-1$ which contains all these $\lfloor \frac{h-\varepsilon}{\ell} \rfloor-2$ subspaces. Then for any subspace $T\in \mathcal{T}$, there is a hyperplane of ${\Bbb F}_q^{(h-\varepsilon)t}$ containing both $W$ and $T$. Note that there are $\sbinom{\ell t+1}{\ell t}=\sbinom{\ell t +1}{1}$ hyperplanes containing $W$ and each of them contains at most $\alpha-1$ subspaces from $\mathcal{T}$. Thus \begin{align*} |\mathcal{T}| &\leq \parenv*{\floor*{ \frac{h-\varepsilon}{\ell} }-2} \\ &\quad\ + \sbinom{\ell t+1}{\ell t}\parenv*{\alpha-1 - \parenv*{\floor*{ \frac{h-\varepsilon}{\ell} }-2}} \\ &= \parenv*{\floor*{ \frac{h-\varepsilon}{\ell} }-2} +\parenv*{\alpha- \floor*{ \frac{h-\varepsilon}{\ell} }+1} \sbinom{\ell t+1}{1}. \end{align*} \end{IEEEproof} \begin{theorem}\label{thm-upbound-v2} Let $\alpha\geq 2$, $h,\ell,t\geq 1$, $\varepsilon\geq 0$, $h-\varepsilon\geq 2\ell$, and let $\mathcal{S}$ be a collection of subspaces of ${\Bbb F}_q^{ht}$ such that \begin{enumerate} \item[(i)] each subspace has dimension at most $\ell t$; and \item[(ii)] any subset of $\alpha$ subspaces spans a subspace of dimension at least $(h-\varepsilon)t$. \end{enumerate} Then we have $\alpha \ell \geq h-\varepsilon$ and \begin{align*}|\mathcal{S}| &\leq \sbinom{(\varepsilon+\ell)t}{\varepsilon t} \parenv*{ \parenv*{\alpha- \floor*{ \frac{h-\varepsilon}{\ell} }+1} \frac{q^{\ell t+1}-1}{q-1}-1} \\ &\quad\ + \floor*{\frac{h-\varepsilon}{\ell}}-1\\ &\overset{(*)}{<} \gamma\parenv*{\alpha- \floor*{ \frac{h-\varepsilon}{\ell} }+1} q^{\ell t (\varepsilon t+1)} {+ \floor*{ \frac{h-\varepsilon}{\ell}}-1}. \end{align*} \end{theorem} \begin{IEEEproof} Take arbitrarily $\floor*{\frac{h-\varepsilon}{\ell}}-1$ subspaces from $\mathcal{S}$ and a subspace $W \subset {\Bbb F}_q^{ht}$ of dimension $(h-\varepsilon)t-\ell t$ such that $W$ contains all these $\floor*{\frac{h-\varepsilon}{\ell}}-1$ subspaces. Then for any subspace $S \in \mathcal{S}$ there is a subspace of dimension $(h-\varepsilon)t$ containing both $W$ and $S$. Let $m\triangleq \sbinom{(\varepsilon+\ell )t}{\varepsilon t}$. Then there are $m$ subspaces of dimension $(h-\varepsilon)t$ containing $W$, say $W_1, W_2, \ldots, W_m$. Note that every $\alpha$ subspaces in $W_i \cap \mathcal{S}$ span the subspace $W_i$. According to Lemma~\ref{lm-full-t2}, we have \begin{align*} |W_i \cap \mathcal{S}| &\leq \parenv*{\floor*{ \frac{h-\varepsilon}{\ell} }-2} +\parenv*{\alpha- \floor*{ \frac{h-\varepsilon}{\ell} }+1} \sbinom{\ell t +1}{1}. \end{align*} Hence, \begin{align*} |\mathcal{S}| &\leq \sum_{i=1}^{m}\parenv*{|W_i\cap \mathcal{S}|- \parenv*{\floor*{ \frac{h-\varepsilon}{\ell}}-1 }} + \floor*{ \frac{h-\varepsilon}{\ell}}-1 \\ &\leq \sbinom{(\varepsilon+\ell)t}{\varepsilon t} \parenv*{ \parenv*{\alpha- \floor*{ \frac{h-\varepsilon}{\ell} }+1} \frac{q^{\ell t+1}-1}{q-1} -1 } \\ &\quad\ + \floor*{ \frac{h-\varepsilon}{\ell}}-1. \end{align*} The inequality $(*)$ is derived by \eqref{eq:gauss}. \end{IEEEproof} The following corollary rephrases Theorem~\ref{thm-upbound-v2} with network parameters. \begin{corollary}\label{cor:imupperbound-N} Let $\alpha\geq 2$, $h,\ell,t\geq 1$, $\varepsilon\geq 0$, and $h-\varepsilon \geq 2\ell$. If $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ has a $(q,t)$-linear solution then \[ r < \gamma\theta q^{\ell t (\varepsilon t+1)} +\alpha-\theta, \] where $\theta\triangleq \alpha- \floor*{ \frac{h-\varepsilon}{\ell} }+1$. \end{corollary} \begin{IEEEproof} If a $(q,1)$-linear solution exists, then each of the $r$ nodes in the middle layer gets a subspace of dimension $\ell t$ of the source messages space. Since all receivers are able to recover the entire source message space, every $\alpha$-subset of the middle nodes span a space of dimension at least $(h-\varepsilon)t$. We then use Theorem~\ref{thm-upbound-v2}. \end{IEEEproof} Theorem~\ref{thm-upbound-v2} and Corollary~\ref{cor:imupperbound-N} are valid for all $\alpha\geq 2$. However, we derive a better upper bound for $\alpha = 2$, as shown in the following theorem. \begin{theorem}\label{thm:imupbound-2} Let $h,\ell,t\geq 1$, $\varepsilon\geq 0$, and let $\mathcal{S}$ be a collection of subspaces of ${\Bbb F}_q^{ht}$ such that \begin{enumerate} \item[(i)] each subspace has dimension at most $\ell t$; and \item[(ii)] the sum of any two subspaces has dimension at least $(h-\varepsilon)t$. \end{enumerate} Then we have \[|\mathcal{S}| \leq \frac{\sbinom{ht}{2\ell t - (h-\varepsilon)t+1}}{ \sbinom{\ell t}{2\ell t - (h-\varepsilon)t+1}} \leq \gamma \cdot q^{(h-\ell)(2\ell+\varepsilon-h)t^2+(h-\ell)t}. \] \end{theorem} \begin{IEEEproof} We may assume that each subspace has dimension $\ell t$. Since the sum of every two subspaces has dimension at least $(h-\varepsilon)t$, then their intersection has dimension at most $2\ell t - (h-\varepsilon)t$. It follows that any subspace of dimension $2\ell t - (h-\varepsilon)t+1$ is contained in at most one subspace of $\mathcal{S}$. Note that there are $\sbinom{ht}{2\ell t - (h-\varepsilon)t+1}$ subspaces of dimension $2\ell t - (h-\varepsilon)t+1$ and each subspace of dimension $\ell t$ contains $\sbinom{\ell t}{2\ell t - (h-\varepsilon)t+1}$ such spaces. We have that $$|\mathcal{S}| \leq \sbinom{ht}{2\ell t - (h-\varepsilon)t+1}/ \sbinom{\ell t}{2\ell t - (h-\varepsilon)t+1}.$$ \end{IEEEproof} \section{Lower Bounds on the Middle Layer Nodes} \label{sec:lb_rv} We now turn to study a lower bound on the number of nodes in the middle layer, when we fix the network parameters $\alpha,\ell,\varepsilon,h$. The main results are summarized in Theorem~\ref{thm:LLL_bound} and Corollary~\ref{cor:EK19_ub}. In the following, we first give the condition on the coding coefficients under which a linear solution exists. Let $\ve{x}_1,\dots,\ve{x}_h\in\mathbb{F}^t_{q}$ denote the $h$ source messages and $\ve{y}_1,\dots,\ve{y}_N\in\mathbb{F}^{(\varepsilon+\alpha\ell)t}_q$ the messages received by each receiver\footnote{The vector $\ve{y}_i$ is the concatenation of all the messages received by the $i$th receiver node.}. Since each middle-layer node receives $\ell$ incoming edges, and has $\ell$ outgoing edges directed at a given receiver, we may assume without loss of generality that this node just forwards its incoming messages. Let us denote the \emph{coding coefficients} used by the source node for the messages transmitted to the $r$ middle nodes by $\ve{A}_1,\dots,\ve{A}_r \in {{\Bbb F}}_{\!q}^{\ell t \times ht}$. Additionally, we denote the coding coefficients used by the source node for the messages transmitted directly to the receivers by $\ve{B}_1,\dots,\ve{B}_N\in{\Bbb F}_q^{\varepsilon t\times ht}$. Each receiver has to solve the following linear system of equations (LSE): \begin{equation*} \ve{y}_i =\begin{pmatrix} \ve{A}_{i_1}\\ \vdots\\ \ve{A}_{i_\alpha}\\ \ve{B}_i \end{pmatrix}_{(\varepsilon+\alpha\ell)t\times ht} \cdot \begin{pmatrix} \ve{x}_1\\ \vdots\\ \ve{x}_{h} \end{pmatrix}_{ht\times 1},\ \forall i =1,\dots,N=\binom{r}{\alpha}, \end{equation*} where $\{\ve{A}_{i_1},\dots, \ve{A}_{i_\alpha}\}\subset \{\ve{A}_1,\dots,\ve{A}_r \}$. Any receiver can recover the $h$ source messages $\ve{x}_1,\dots,\ve{x}_h$ if and only if \begin{equation}\label{eq:NC_sol} \rank \begin{pmatrix} \ve{A}_{i_1}\\ \vdots\\ \ve{A}_{i_\alpha} \end{pmatrix}_{\alpha \ell t\times ht} \geq (h-\varepsilon)t,\ \forall i =1,\dots,N. \end{equation} Here the {solution} of the $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ network is a set of the coding coefficients $\{\ve{A}_1,\dots,\ve{A}_r \}$ s.t.~\eqref{eq:NC_sol} holds (where $\ve{B}_1,\dots,\ve{B}_N$ may be easily determined from the solution). \subsection{A Lower Bound by the Lov\'asz-Local Lemma} \begin{lemma}[The Lov\'asz-Local-Lemma~{\cite[Ch.~5]{TheProbMethod}}\cite{LLLbeck1991}]\label{lem:LLL} Let $\mathcal{E}_1, \mathcal{E}_2, \hdots,\mathcal{E}_k$ be a sequence of events. Each event occurs with probability at most $p$ and each event is independent of all the other events except for at most $d$ of them. If $epd\leq 1$, then there is a non-zero probability that none of the events occurs. \end{lemma} We choose the matrices $\ve{A}_1,\dots,\ve{A}_r \in {{\Bbb F}}_{\!q}^{\ell t \times ht}$ independently and uniformly at random. For $1 \leq i_1 < \dots<i_\alpha \leq r$, we define the event \begin{align*} \mathcal{E}_{i_1,\dots,i_\alpha} \triangleq \set*{ (\ve{A}_{i_1},\dots, \ve{A}_{i_\alpha}) ; \rank \begin{pmatrix} \ve{A}_{i_1} \\ \vdots \\ \ve{A}_{i_\alpha} \end{pmatrix} < (h-\varepsilon)t }. \end{align*} Let $p=\Pr(\mathcal{E}_{i_1,\dots,i_\alpha})$ and denote by $d$ the number of other events $\mathcal{E}_{i'_1,\dots,i'_\alpha}$ that are dependent on $\mathcal{E}_{i_1,\dots,i_\alpha}$. \begin{lemma}\label{lem:upper_bound_on_p} Let $\alpha\geq 2$, $h,\ell,t\geq 1$, $\varepsilon\geq 0$. Fixing $1 \leq i_1 < \dots < i_\alpha \leq r$, we have \begin{align*} \Pr(\mathcal{E}_{i_1,\dots,i_{\alpha}}) \leq 2\gamma \cdot q^{(h-\alpha\ell-\varepsilon)\varepsilon t^2+(h-\alpha\ell-2\varepsilon)t-1}. \end{align*} \end{lemma} \begin{IEEEproof} The number of matrices $\ve{A}\in\mathbb{F}_q^{m\times n}$ of rank $s$ is \begin{equation} M(m,n,s)\triangleq\prod\limits^{s-1}_{j=0}\frac{(q^m-q^j)(q^n-q^j)}{q^s-q^j} \leq \gamma\cdot q^{(m+n)s-s^2} \label{eq:number_matrices_upper_bound}. \end{equation} Then, \begin{align} \Pr(\mathcal{E}_{i_1,\dots,i_{\alpha}}) &=\frac{\sum\limits^{(h-\varepsilon)t-1}_{i=0}M(\alpha \ell t,ht,i)}{q^{\alpha \ell h t^2}}\nonumber\\ & \leq \frac{\sum\limits^{(h-\varepsilon)t-1}_{i=0}\gamma \cdot q^{(h+\alpha\ell)ti-i^2}}{q^{\alpha\ell h t^2}}\label{eq:NM_upper_bound} \\ & \leq \gamma \cdot \frac{q}{q-1}\cdot q^{\max_i\{(h+\alpha\ell)ti-i^2\} - \alpha\ell h t^2} \label{eq:summation_upper_bound}\\ & = \gamma \cdot \frac{q}{q-1}\cdot q^{(h+\alpha\ell)ti-i^2|_{i=(h-\varepsilon)t-1} - \alpha\ell h t^2} \label{eq:quadratic_maximum}\\ & \leq \gamma\cdot 2\cdot q^{(h-\alpha\ell-\varepsilon)\varepsilon t^2+(h-\alpha\ell-2\varepsilon)t-1} \end{align} where (\ref{eq:NM_upper_bound}) holds due to~\eqref{eq:number_matrices_upper_bound}, (\ref{eq:summation_upper_bound}) follows from a geometric sum, and \eqref{eq:quadratic_maximum} follows by maximizing $(h+\alpha\ell)ti-i^2$. \end{IEEEproof} \begin{lemma}\label{lem:upper_bound_on_d} Let $\alpha\geq 2$, $h,\ell,t\geq 1$, $\varepsilon\geq 0$. Fixing $1 \leq i_1 <\dots < i_\alpha \leq r$, the event $\mathcal{E}_{i_1,\dots,i_\alpha}$ is statistically independent of all the other events $\mathcal{E}_{i_1',\dots,i_\alpha'}$ ($1 \leq i_1' < \dots < i_\alpha' \leq r$), except for at most $\alpha\binom{r-1}{\alpha-1}$ of them. \end{lemma} \begin{IEEEproof} For $1 \leq i_1 < \dots < i_\alpha \leq r$ and $1 \leq i_1' <\dots < i_\alpha' \leq r$, the events $\mathcal{E}_{i_1,\dots,i_\alpha}$ and $\mathcal{E}_{i_1',\dots,i_\alpha'}$ are statistically independent if and only if $\{i_1,\dots,i_\alpha\} \cap \{i_1',\dots,i_\alpha'\} = \emptyset$. Thus, having chosen $1 \leq i_1 < \dots < i_\alpha \leq r$, there are at most $\alpha\binom{r-1}{\alpha-1}$ ways of choosing an independent event. \end{IEEEproof} \begin{remark} Lemma~\ref{lem:upper_bound_on_d} is a union-bound argument on the number of dependent events. The exact number is $\binom{r}{\alpha}-\binom{r-\alpha}{\alpha}$. However the exact expression makes it harder to resolve everything for $r$ later so we use the bound here. \end{remark} \begin{theorem}\label{thm:LLL_bound} Let $\alpha\geq 2$, $\varepsilon \geq 0$, $\ell,t \geq 1$, and $1\leq h \leq \alpha\ell+\varepsilon$ be fixed integers. If $r \leq \beta \cdot q^{\frac{f(t)}{\alpha-1}}$, where $\beta \triangleq \parenv*{\frac{(\alpha-1)!}{2e\gamma\alpha}}^{\frac{1}{\alpha-1}}$ and $f(t)\triangleq(\alpha\ell+\varepsilon-h)\varepsilon t^2+(\alpha\ell+2\varepsilon-h)t +{1}$, then $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ has a $(q,t)$-linear solution. \end{theorem} \begin{IEEEproof} By the Lov\'asz Local Lemma, it suffices to show that $epd\leq 1$. Noting that $d\leq \alpha\binom{r-1}{\alpha-1}\leq \alpha\cdot \frac{(r-1)^{\alpha-1}}{(\alpha-1)!}$, we shall require \begin{align*} e\cdot2\gamma q^{(h-\alpha\ell-\varepsilon)\varepsilon t^2+(h-\alpha\ell-2\varepsilon)t-1} \cdot \alpha\frac{(r-1)^{\alpha-1}}{(\alpha-1)!}\leq 1. \end{align*} Namely, $ r \leq {\beta}\cdot q^{\frac{(\alpha\ell+\varepsilon-h)\varepsilon}{\alpha-1}t^2+\frac{\alpha\ell+2\varepsilon-h}{\alpha-1}t+\frac{1}{\alpha-1}}+1.$ We omit the plus one for simplicity. \end{IEEEproof} \subsection{A Lower Bound by $\alpha$-Covering Grassmannian Codes} Let ${\cal B}_q(n,k,\delta;\alpha)$ denote the maximum possible size of an $\alpha$-$(n,k,\delta)_q^c$ covering Grassmannian code. Let $\ve{A}$ be a $k\times (n-k)$ matrix, and let $\ve{I}_k$ be a $k\times k$ identity matrix. The matrix $[\ve{I}_k\ \ve{A}]$ can be viewed as a generator matrix of a $k$-dimensional subspace of ${{\Bbb F}}_{\!q}^{n}$, and it is called the \emph{lifting} of $\ve{A}$. When all the codewords of an MRD code are lifted to $k$-dimensional subspaces, the result is called \emph{lifted MRD code}, denoted by $\mathbb{C}^{MRD}$. \begin{theorem}\label{thm:EK_1_ext} Let $n,k,\delta$ and $\alpha$ be positive integers such that $1\leq \delta \leq k$, $\delta+k\leq n$ and $\alpha\geq 2$. Then $${\cal B}_q(n,k,\delta;\alpha) \geq (\alpha -1) q^{\max\{k,n-k\}(\min\{k,n-k\}-\delta+1)}.$$ \end{theorem} \begin{IEEEproof} Let $m=n-k$ and $K=\max\{m,n-m\}(\min\{m,n-m\}-\delta+1)$. Since $\delta \leq \min\{m,n-m\}$, an $[m\times (n-m), K, \delta]_q$ MRD code $\mathbb{C}$ exists. Let $\mathbb{C}^{MRD}$ be the lifted code of $\mathbb{C}$. Then $\mathbb{C}^{MRD}$ is a subspace code of ${{\Bbb F}}_{\!q}^n$, which contains $q^K$ $m$-dimensional subspaces as codewords and its minimum subspace distance is $2\delta$~\cite{SKK08}. Hence, for any two distinct $C_1,C_2 \in \mathbb{C}^{MRD}$ we have $\dim (C_1 \cap C_2)\leq m-\delta$. Now, let $\mathbb{D}=\set*{C^{\perp} ; C \in \mathbb{C}^{MRD}}$. Take $\alpha -1$ copies of $\mathbb D$ and denote their multiset union as $\mathbb{D}^{(\alpha)}$. We claim that $\mathbb{D}^{(\alpha)}$ is an $\alpha$-$(n,k,\delta)_q^c$ covering Grassmannian code. For each codeword of $\mathbb{D}^{(\alpha)}$, since it is the dual of a codeword in $\mathbb{C}^{MRD}$, it has dimension $n-m$, which is $k$. For arbitrarily $\alpha$ codewords $D_1,D_2,\ldots, D_\alpha$ of $\mathbb{D}^{(\alpha)}$, there exist $1\leq i < j\leq \alpha$ such that $D_i \not= D_j$. Let $C_i=D_i^{\perp}$ and $C_j=D_j^\perp$. Then $C_i$ and $C_j$ are two distinct codewords of $\mathbb{C}^{MRD}$. It follows that \begin{align*} \dim\parenv*{\sum_{\ell=1}^\alpha D_\ell} & \geq \dim \parenv*{D_i +D_j } = n - \dim \parenv*{D_i^{\perp} \cap D_j^{\perp}}\\ & = n - \dim \parenv*{C_i \cap C_j} \geq n-m+\delta = k+\delta. \end{align*} So far we have shown that $\mathbb{D}^{(\alpha)}$ is an $\alpha$-$(n,k,\delta)_q^c$ covering Grassmannian code. Then the conclusion follows since \begin{align*} |\mathbb{D}^{(\alpha)}|= & (\alpha-1)|\mathbb{D}|=(\alpha-1)|\mathbb{C}^{MRD}| \\ = & (\alpha-1) q^{\max\{k,n-k\}(\min\{k,n-k\}-\delta+1)}. \end{align*} \end{IEEEproof} As a consequence, we have the following: \begin{corollary}\label{cor:EK19_ub} Let $\alpha\geq 2$, $h,\ell,t\geq 1$, $\varepsilon\geq 0$, $h\leq 2\ell+\varepsilon$. If $r\leq (\alpha-1)q^{g(t)}$, where \begin{align*} g(t)&\triangleq\max\{\ell t,(h-\ell)t\}\\ &\quad\ \cdot(\min\{\ell t, (h-\ell)t\}-(h-\ell-\varepsilon)t+1) \\ &=\begin{cases}\ell\varepsilon t^2 +\ell t & h\leq 2\ell, \\ (h-\ell)(2\ell+\varepsilon-h)t^2+(h-\ell)t & \text{otherwise.} \end{cases} \end{align*} then $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ has a $(q,t)$-linear solution. \end{corollary} Note that Theorem~\ref{thm:LLL_bound} and Corollary~\ref{cor:EK19_ub} are both sufficient conditions on $r$ s.t.~a solution exists for $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$. Thus they can be regarded as lower bounds on maximum number of nodes in the middle layer. \section{Bounds on the Field Size Gap} \label{sec:bound_gap} In previous sections, we discussed bounds on the maximum number of nodes in the middle layer. To discuss $\gap (\mathcal{N})$, we first need the following conditions on the smallest field size $q_s(\mathcal{N})$ or $q_v(\mathcal{N})$, for which a network $\mathcal{N}$ is solvable. \begin{lemma}\label{lem:lb_q} Let $\alpha\geq 2$, $r,h,\ell,t\geq 1$, $\varepsilon\geq 0$. If $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ has a $(q,t)$-linear solution then \begin{align*} q^t \geq \begin{cases} \parenv*{ \frac{r+\theta-\alpha}{\gamma\cdot\theta}}^{\frac{1}{\ell (\varepsilon t+1)}} & h\geq 2\ell+\varepsilon,\\ \parenv*{ \frac{r}{\gamma(\alpha-1)}}^{\frac{1}{\ell(\varepsilon t+1)}} & \text{otherwise,} \end{cases} \end{align*} where $\theta \triangleq \alpha-\floor*{\frac{h-\varepsilon}{\ell}}+1$ and $\gamma\approx 3.48$. \end{lemma} \begin{IEEEproof} It follows from Corollary~\ref{cor:imupperbound-N} that for $h\geq 2\ell+\varepsilon$, $q^t\geq \parenv*{ \frac{r+\theta-\alpha}{\gamma\cdot\theta}}^{\frac{1}{\ell (\varepsilon t+1)}}$, so the first case follows. The second case may be derived from~\cite{EZ19covering-multiple} in a similar manner. \end{IEEEproof} \begin{lemma}\label{lem:ub_q} Let $\alpha\geq 2$, $r,h,\ell,t\geq 1$, $\varepsilon\geq 0$. There exists a $(q,t)$-linear solution to $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ when \begin{align}\label{eq:qv_ub} q^t \geq \begin{cases} \parenv*{\frac{r}{\beta}}^{\frac{(\alpha-1)t}{f(t)}} & h\geq2\ell+\varepsilon \\ \parenv*{\frac{r}{\alpha-1}}^{\frac{t}{g(t)}} &\text{otherwise,} \end{cases} \end{align} where $\beta$ and $f(t)$ are defined as in Theorem~\ref{thm:LLL_bound}, and $g(t)$ is defined as in Corollary~\ref{cor:EK19_ub}. \end{lemma} \begin{IEEEproof} The proof is similar to that in Lemma~\ref{lem:lb_q} and the cases follow from Theorem~\ref{thm:LLL_bound} and Corollary~\ref{cor:EK19_ub} respectively. \end{IEEEproof} Lemma~\ref{lem:lb_q} and Lemma~\ref{lem:ub_q} can be seen as the necessary and the sufficient conditions respectively on the pair $(q,t)$ s.t.~a $(q,t)$-linear solution exists. In the following, we use the lemmas above to derive a lower bound on the $\gap(\mathcal{N})$ for a given network $\mathcal{N}$. The bound is determined only by the network parameters. \begin{theorem \label{thm:gap_lb} Let $\alpha\geq 2$, $r,h,\ell\geq 1$, $\varepsilon\geq 0$. Then for the $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ network, \begin{align*} \gap(\mathcal{N})\geq \begin{cases} \frac{1}{\ell(\varepsilon+1)}\log_2\parenv*{\frac{r+\theta-\alpha}{\gamma\theta}}-t_{\Delta} & h\geq 2\ell+\varepsilon\\ \frac{1}{\ell(\varepsilon+1)}\log_2\parenv*{\frac{r}{\gamma(\alpha-1)}}-t_{\star} & \text{otherwise}, \end{cases} \end{align*} where $t_{\Delta}$ is the smallest positive integer s.t.~$2^{\frac{f(t_{\Delta})}{\alpha-1}}\geq \frac{r}{\beta}$ and $t_{\star}$ is the smallest positive integer s.t.~$2^{g(t_{\star})}\geq \frac{r}{\alpha-1}$. Here, $\beta$ and $f(t)$ are defined as in Theorem~\ref{thm:LLL_bound}, and $g(t)$ is defined as in Corollary~\ref{cor:EK19_ub}. \end{theorem} \begin{IEEEproof} Let us first consider the first case $h\geq 2\ell+\varepsilon$. According to Lemma~\ref{lem:lb_q}, we have the lower bound on the smallest field size of a scalar solution, $q_s(\mathcal{N})\geq \parenv*{ \frac{r+\theta-\alpha}{\gamma\cdot\theta}}^{\frac{1}{\ell (\varepsilon +1)}}$, For vector solutions, according to Lemma~\ref{lem:ub_q}, we want to find $(q,t)$ s.t.~$q^{\frac{f(t)}{\alpha-1}}\geq \frac{r}{\beta}.$ Since $t_{\Delta}$ is the smallest positive integer $t$ s.t.~$2^{\frac{f(t)}{\alpha-1}}\geq \frac{r}{\beta}$, it is guaranteed that a $(2,t_{\Delta})$-linear solution exists. Therefore, $q_v(\mathcal{N})$ (the smallest value of $q^t$) should be at most $q_v(\mathcal{N})\leq 2^{t_{\Delta}}$. The lower bound then follows directly from the definition of $\gap(\mathcal{N})$. The other case can be proved in the same manner. \end{IEEEproof} By carefully bounding $t_{\star}$ and $t_{\Delta}$, the following is obtained: \begin{corollary} \label{cor:gap} Let $\alpha\geq 2$, $r,h,\ell,\varepsilon\geq 1$. Then for the $(\varepsilon,\ell)-\mathcal{N}_{h,r,\alpha\ell+\varepsilon}$ network, \[ \gap(\mathcal{N}) \geq \begin{cases} \frac{\log_2\left(\frac{r}{\alpha-1}\right)-2}{\ell(\varepsilon+1)}-\sqrt{\frac{\log_2(\frac{r}{\alpha-1})}{\ell\varepsilon}} & h\leq 2\ell+\varepsilon,\\ \frac{\log_2\left(\frac{r+\theta-\alpha}{\gamma \theta}\right)}{\ell(\varepsilon+1)} - \sqrt{\frac{(\alpha-1)\log_2(\frac{r}{\beta})}{(\alpha\ell+\varepsilon-h)\varepsilon}} & \text{otherwise.} \end{cases} \] In particular, if all parameters are constants except for $r\to\infty$, then $\gap(\mathcal{N})=\Omega(\log r)$. \end{corollary} \section{Discussion}\label{sec:discussion} In this work, we studied necessary and sufficient conditions for the existence of $(q,t)$-linear solutions to the generalized combination network. The derived conditions led us to find a lower bound on the gap for almost all network parameters. Unlike previous works, e.g., \cite{EW18,CaiEtzSchWac19}, which were focused on engineering specific networks with a high gap, we start with almost any given network, and provide an expression for its gap. It is of particular interest to note the implications of~Corollary~\ref{cor:gap}. Fixing the number of messages, and parameters relating to the connectivity level of the network, we only vary the number of middle layer nodes, $r$, or equivalently, the number of receivers $N\triangleq\binom{r}{\alpha}$. Corollary~\ref{cor:gap} then shows that the gap is $\Omega(\log r)=\Omega(\log N)$, namely, that scalar-linear solutions over-pay an order of $\log(r)$ extra bits per link to solve the network, in comparison with vector-linear solutions. Our bounds, however, are weak in the case of no direct links, i.e., $\varepsilon=0$, and improving them is left for future research. In the full version of this paper we further study the bounds presented here, and compare them with the other known bounds of~\cite{EZ19covering-multiple}. \bibliographystyle{IEEEtranS}
\section{Introduction} The last 10 years have seen a dramatic drop in the cost of electricity generated from solar photovoltaic (PV) systems \cite{fu2018us}. This drop in costs directly leads to an increased rate of deployment of PV systems, and therefore a reduction in future emissions of GHGs from fossil fuels. Once considered too expensive to be useful in the fight against climate change, ground mount and rooftop solar are now both ranked among the top 10 most promising methods for reducing GHGs. Rooftop solar alone is estimated to have the potential to offset 24.6 gigatons of CO$_2$ by 2050 if the fraction of global electricity produced by rooftop solar grows from today's level of .4$\%$ to 7$\%$ by 2050 \cite{hawken2017drawdown}. In order to reach or exceed this 7$\%$ level, however, the cost of installing solar needs to drop even further. The hard costs of installing solar, including materials and equipment, have dropped to the point where now over two-thirds of the cost of installing solar comes from `soft costs' \cite{friedman2013benchmarking}\cite{sird} such as labor, permitting and customer acquisition costs. Customer acquisition costs (CAC) alone can account for up to 20\% of the \emph{total} costs of installing solar \cite{mond2017us} \cite{friedman2013benchmarking}. By developing automated methods for identifying and ranking potential solar installation sites, solar developers can focus their sales and marketing budgets on the most promising sites, and thereby reduce their customer acquisition costs. In turn, this reduction in cost leads to an overall increased rate in the deployment of solar power \cite{sird}. Given that the roof of a building is easily visible from aerial images, global-scale satellite image data can be brought to bear on the site-selection problem, and this is precisely where machine learning (ML) can have a major impact. In this work we study how satellite imagery can be used to estimate the age of a building's roof. The roof age is a critical piece of information for solar developers because it directly impacts whether a building is currently well suited for rooftop solar. This is because rooftop solar installations last for 25+ years, and it is important that the roof does not need to be replaced during the lifetime of the solar array because the additional labor costs of removing and reinstalling the solar array while replacing the roof would typically cripple the economics of the solar project. This is especially true for commercial and industrial buildings where large, complex solar arrays typically cover all available roof area. Solar developers therefore generally seek out rooftops which are either 0-4 years or 25+ years of age, since in the first case the existing roof will likely last long enough, and in the latter case the roof is already old enough to justify replacement in conjunction with the installation of the solar array. Although roof age can usually be determined by consulting the building's owner, making contact with the building owner, particularly for commercial and industrial buildings, can take considerable time and effort. This is where an automated estimation of roof age can lower customer acquisition costs, and therefore accelerate the deployment of rooftop solar \cite{sird}. We estimate that a full solution to this problem would displace an additional 750 megatons of CO$_2$ between the years of 2020 and 2050, with the details behind this estimated included in Appendix \ref{co2_savings}. \section{Related Work}\label{related-work} The general site-selection problem for rooftop solar has multiple components, a number of which have been studied previously. One important problem is to estimate the potential size and output of a solar array on a given rooftop. Some pioneering approaches to automate this process include Mapdwell \cite{jakubiec2012towards}, as well as Project Sunroof \cite{projectsunroof}, which used LIDAR data to produce solar array size and shading estimates. More recently Ref. \cite{lee2019deeproof} proposed a data-driven method for estimating solar array size using only RGB satellite images and ML. Another component of the site-selection problem involves estimating a building owner's current electricity bill by estimating the energy consumption of the building, to which ML has been applied in Refs. \cite{kreider1995building} and \cite{amasyali2018review}. However, to the best of our knowledge, ours is the first work to study data-driven approaches to the roof age estimation problem in particular, and we believe a robust solution to this problem removes one of the last obstacles to a fully automated approach to rooftop solar site-selection. \section{Methodology} We propose to determine the age of a roof using only satellite imagery, which is widely available and global in scope. Instead of attempting to directly regress the age of a roof from a present-day satellite image, however, we instead propose to use historical satellite imagery to determine the year in which the roof was last replaced, thereby solving for the roof age as the number of years since that date. If no reroof is detected during the range of available historical satellite imagery, then the age of the roof is determined to be greater than that range. \iffalse \begin{figure}[!htb] \centering \includegraphics[width=0.35\textwidth]{before_2013_545_N_commonwealth.png} \includegraphics[width=0.35\textwidth]{before_2015_864_S_New_Hampshire.png} \includegraphics[width=0.35\textwidth]{after_2014_545_N_commonwealth.png} \includegraphics[width=0.35\textwidth]{after_2016_864_S_New_Hampshire.png} \caption{Top row shows satellite imagery of two building rooftops, imaged at years 2013 and 2015 respectively, and the bottom row shows images of the same roofs one year later, after a reroof took place.} \label{fig:roofs} \end{figure} \fi \subsection{Data}\label{data} \begin{figure}[!t] \centering \includegraphics[width=0.135\textwidth]{2012.png} \includegraphics[width=0.135\textwidth]{2013.png} \includegraphics[width=0.135\textwidth]{2014.png} \includegraphics[width=0.135\textwidth]{2015.png} \includegraphics[width=0.135\textwidth]{2016.png} \includegraphics[width=0.135\textwidth]{2017-min.png} \includegraphics[width=0.135\textwidth]{2018.png} \includegraphics[width=0.135\textwidth]{2012_hard.png} \includegraphics[width=0.135\textwidth]{2013_hard.png} \includegraphics[width=0.135\textwidth]{2014_hard.png} \includegraphics[width=0.135\textwidth]{2015_hard.png} \includegraphics[width=0.135\textwidth]{2016_hard.png} \includegraphics[width=0.135\textwidth]{2017_hard.png} \includegraphics[width=0.135\textwidth]{2018_hard.png} \caption{Example sequences of rooftop images taken in the years 2012-2018. The top row shows an easy example, with a clear roof change in the fifth column, meanwhile the second row shows a harder example which exhibits some of the challenges of this problem, including image blur and varying image exposures which can be mistaken for a changing roof. } \label{fig:roofs} \end{figure} We introduce a new dataset of commercial and industrial building roof images for studying this problem. The dataset consists of 1,610 images of building rooftops, covering over 230 buildings in Southern California. For each property we include one image per year in the range 2012-2018 and indicate (a) whether the roof was replaced during the 2012-2018 time frame and (b) the year when the reroof took place if there was one. Approximately 180 of the 230 buildings in the dataset underwent a reroof, and the reroof year was obtained from public building permit data from the City of Los Angeles and verified by eye \cite{ladata}. The dataset was partitioned into subsets for training, validation and testing, consisting of 150, 25 and 55 buildings respectively. Example image sequences are shown in Fig. \ref{fig:roofs}. \footnote{See https://github.com/cpheinrich/reroofdata for access to the reroof dataset} \subsection{Algorithms} We train a $\beta$-VAE \cite{betavae}, an unsupervised generative model, see appendix \ref{appendix:algorithms}, to embed satellite images into latent codes $x \rightarrow z$. In addition we also train a binary classifier, on the latent vectors of all image pairs for a given building, to predict whether the two images correspond to the same roof or a different roof. At inference time, latent vectors for every image in the sequence are generated, and adjacent pairs are classified with the binary classifier: $(z_{t-1},z_{t}) \rightarrow p_t$, with $p_t$ being the probability that the roofs at time $t-1$ and $t$ are different. If $p_t < 0.5 \text{ for all } t$, then no reroof is predicted for the image sequences, otherwise the transition year is determined to be $T = \text{argmax}_t( p_t)$. See Appendix \ref{hyperparams} for additional implementation details. \section{Results}\label{results} The metrics used to evaluate performance are (a) the reroof detection accuracy, i.e. the fraction of buildings for which it was correctly predicted whether there was or was not a reroof in the image sequence and (b) the average error in years, $\sum_i|y^i_{\textrm{true}}-y^i_{\textrm{pred}}| / N$. The average error metric is only computed on the buildings for which it was correctly determined that a reroof did take place. The average error is a useful metric because, for the problem at hand, it is generally sufficient to know the approximate roof age rather the exact year. We compare the $\beta$-VAE method to a categorical distribution baseline fit to the training data in Table \ref{table:results}. For the categorical baseline, a reroof year, or a no-reroof label, were randomly guessed according to the distribution of labels in the training dataset. \begin{table} \centering \begin{tabular}{lcc} \hline \textbf{Method} & \textbf{Reroof detection accuracy} & \textbf{Avg error (years)} \\ \hline $\beta$-VAE & $\mathbf{0.872} $ & $\mathbf{0.680}$ \\ Categorical baseline & 0.648 & 1.868 \\ \end{tabular} \caption{Evaluation results on the test dataset.} \label{table:results} \end{table} \begin{comment} \begin{table} \centering \begin{tabular}{cccc} \hline \textbf{Method} & \textbf{Evaluation set} & \textbf{Fraction of reroofs} & \textbf{Avg error (years)} \\ \hline $\beta$-VAE & easy & \textbf{0.533} & \textbf{0.8} \\ Triplet & easy & 0.4 & 1.50 \\ Categorical & easy & 0.2 & 1.533 \\ $\beta$-VAE & hard & \textbf{0.270} & \textbf{1.326} \\ Triplet & hard & 0.258 & 1.640 \\ Categorical & hard & 0.225 & 1.730 \\ \end{tabular} \caption{Evaluation results on the easy and hard evaluation sets.} \label{table:results} \end{table} \end{comment} \subsection{Discussion} We see from Table \ref{table:results} that the $\beta$-VAE significantly outperforms the categorical baseline on both metrics. While the historical range of this dataset is still limited, these results could already be used to suggest that buildings whose roof was replaced in 2012 or 2013 are less ideal targets for solar developers. In addition to the categorical baseline, we also compared the $\beta$-VAE to non-learning based methods that used features such as zero-normalized cross correlation, and normalized color intensity, to detect roof transitions but found that these alternative methods did not outperform the categorical baseline, providing additional justification for the use of learning based methods to adequately solve this problem. Several confounding factors make the problem of roof-age estimation from satellite images challenging. The quality and resolution of satellite image data can vary drastically year-to-year due to environmental factors, such as weather conditions and time of day, as well as sensor heterogeneity across data providers. We also found that wide-area high-resolution satellite imagery is less available before 2010, and virtually non-existent prior to the 1980s. Fortunately, the availability of high-resolution satellite images will only grow over time, and we expect our method to increase in quality and utility as more data becomes available. While building permit data can also be used to determine roof age, this data source comes with its own set of problems, including limited or difficult access, incomplete or false records, and non-standardized formatting across municipalities. The attractiveness of the satellite-image based approach is that it could be applied on a national, or even global scale, using only a single data source. \begin{comment} \begin{enumerate} \item Public record data is noisy \item Satellite images can be blurry \item Images are often not taken at same time of day -- lighting changes \item Images from different years are not perfectly registered \item Quality and resolution of images is not constant (heterogeneous sensors) \end{enumerate} \end{comment} \section{Conclusion} In this paper, we argued that automated roof-age estimation will enable faster large-scale deployment of rooftop solar and showed that it is possible to make such predictions within a reasonable margin of error using historical satellite imagery. We also introduced a new dataset to enable the continued study of data-driven approaches to this problem. Some interesting future directions for this work include developing methods that are more robust to confounding factors such as image blur and variation in satellite image sources, as well as applying the method to residential rooftops. It would also be useful to solve zero-shot roof-age estimation from a single image instead of detecting the year the roof was replaced. \begin{comment} Interesting directions for future work \begin{enumerate} \item estimating roof age from a single present day image \item develop methods that are more robust to confounding factors such as image blur and variation in satellite image sources \item applying the method to residential roofs, which are generally smaller \item increase size of dataset \end{enumerate} \subsubsection*{Acknowledgments} This work was supported by the Wizard of Oz. \end{comment} \bibliographystyle{unsrt}
\section{Introduction and notation} The digraphs in this note may have antiparallel arcs, but do not have loops. Let $D$ be a digraph. We denote by $V(D)$ and $A(D)$ the vertex set and the arc set of $D$, respectively. We say $D$ is {\it weakly connected} if the underlying graph of $D$ is connected. Let $x\in V(D)$. The {\em open (closed) outneighborhood} and {\em inneighborhood} of $x$ in $D$, denoted $N_D^+(x)$ ($N_D^+[x]$) and $N_D^-(x)$ ($N_D^-[x]$) are defined as follows. \begin{eqnarray*} N_D^+(x)=\{y\in V(D)\,|\, xy\in A(D)\}, & N_D^+[x]=N_D^+(x)\cup\{x\}, \\ N_D^-(x)=\{y\in V(D)\,|\, yx\in A(D)\}, & N_D^-[x]=N_D^-(x)\cup\{x\}. \end{eqnarray*} The {\em outdegree} of $x$ in $D$ is $d_D^+(x)=|N_D^+(x)|$, and the {\em indegree} of $x$ in $D$ is $d_D^-(x)=|N_D^-(x)|$. Vertices of indegree zero in $D$ are called \emph{sources} of $D$ and vertices of outdegree zero in $D$ are called \emph{sinks} of $D$. By $\delta^+(D)$ (respectively, $\delta^-(D)$) we denote the minimum outdegree (respectively, indegree) in $D$ among all vertices of $D$. For each $X\subseteq V(D)$, we let \begin{eqnarray*} N_D^+(X)=\bigcup_{x\in X}N_G^+(x) \setminus X, & N_D^+[X]=N_D^+(X)\cup X, \\ N_D^-(X)=\bigcup_{x\in X}N_G^-(x) \setminus X, & N_D^-[X]=N_D^-(X)\cup X. \end{eqnarray*} Let $u,v\in V(D)$ and $K\subseteq V(D)$. The distance from $u$ to $v$ in $D$, denoted ${\fam0 dist}_D(u,v)$, is the length of a shortest directed path from $u$ to $v$. The distance from $K$ to $v$ in $D$, is ${\fam0 dist}_D(K,v)=\min\{{\fam0 dist}_D(x,v)\,|\, x\in K\}$. We say $K$ is a \emph{kernel} of $D$ if $K$ is independent in $D$ and for every $v\in V(D)\setminus K$, ${\fam0 dist}_D(K,v)=1$. We say $K$ is a \emph{quasi-kernel} of $D$ if $K$ is independent in $D$ and for every $v\in V(D)\setminus K$, ${\fam0 dist}_D(K,v)\le 2$. A digraph $D$ is \emph{kernel-perfect} if every induced subdigraph of it has a kernel. Richardson proved the following result. \begin{THM}[Richardson~\cite{MR0014057}]\label{kernel} Every digraph without directed odd cycles is kernel-perfect. \end{THM} The proof gives rise to an algorithm to find one. On the other hand, Chv\'atal~\cite{kernelnp} showed that in general it is NP-complete to decide whether a digraph has a kernel, and by a result of Fraenkel~\cite{MR675689} it is NP-complete even in the class of planar digraphs of degree at most 3. While not every digraph has a kernel, Chv\'atal and Lov\'asz~\cite{MR0414412} proved that every digraph has a quasi-kernel. In 1976, P.L. Erd\H{o}s and S. A. Sz\'ekely made the following conjecture on the size of a quasi-kernel in a digraph. \begin{CON}[Erd\H{o}s--Sz\'ekely~\cite{quasi-kernel}]\label{ESC} Every $n$-vertex digraph $D$ with $\delta^+(D)\ge 1$ has a quasi-kernel of size at most $\frac{n}{2}$. \end{CON} If $D$ is an $n$-vertex digraph consisting of disjoint union of directed 2- and 4-cycles, then every kernel or quasi-kernel of $D$ has size exactly $\frac{n}{2}$. Thus, Conjecture~\ref{ESC} is sharp. In 1996, Jacob and Meyniel~\cite{MR1395467} showed that a digraph without a kernel contains at least three distinct quasi-kernels. Gutin et al.~\cite{MR2051468} characterized digraphs with exactly one and two-quasi-kernels, thus provided necessary and sufficient conditions for a digraph to have at least three quasi-kernels. However, these results do not discuss the sizes of the quasi-kernels. Heard and Huang~\cite{MR2419520} in 2008 showed that each digraph $D$ with $\delta^+(D)\ge 1$ has two disjoint quasi-kernels if $D$ is semicomplete multipartite (including tournaments), quasi-transitive (including transitive digraphs), or locally semicomplete. As a consequence, Conjecture~\ref{ESC} is true for these three classes of digraphs. We propose a conjecture which formally implies Conjecture~\ref{ESC}. It suggests a bound for digraphs that may have sources. Note that each quasi-kernel of a digraph contains all of its source vertices and hence contains no outneighbors of the source vertices. \begin{CON}\label{con2} Let $D$ be an $n$-vertex digraph, and let $S$ be the set of sources of $D$. Then $D$ has a quasi-kernel $K$ such that $$ |K|\le \frac{n+|S|-|N_D^+(S)|}{2}. $$ \end{CON} To show that the upper bound above is best possible, consider the following examples. \begin{itemize} \item Let $S$ be a nonempty set of isolated vertices, and let $D$ be a digraph obtained from a directed triangle by adding an arc from every vertex in $S$ to the same vertex in the triangle. Then every quasi-kernel of $D$ has size $|S|+1=\frac{(|S|+3)+|S|-1}{2}$. \item Let $D$ be an orientation of a connected bipartite graph with parts $S$ and $T$ where each arc goes from $S$ to $T$. Then $S$ forms a quasi-kernel of $D$ of size $|S| = \frac{(|S|+|T|) + |S| - |T|}{2}$. \end{itemize} In this paper, we support Conjectures~\ref{ESC} and~\ref{con2} by showing the following results. \begin{THM}\label{4-partitea} Let $D$ be an $n$-vertex digraph and $S$ be the set of sources of $D$. Suppose that $V(D)\setminus N_D^+[S]$ has a partition $V_1\cup V_2$ such that $D[V_i]$ is kernel-perfect for each $i=1,2$. Then $D$ has a quasi-kernel of size at most $\frac{n+|S|-|N_D^+(S)|}{2}$. \end{THM} Since by Theorem~\ref{kernel}, every digraph without directed odd cycles is kernel-perfect, Theorem~\ref{4-partitea} immediately yields: \begin{COR}\label{cor0} Conjectures~\ref{ESC} and~\ref{con2} hold for every orientation of each graph with chromatic number at most $4$. \end{COR} By the Four Color Theorem~\cite{4color1,4color2}, Corollary~\ref{cor0} yields that Conjectures~\ref{ESC} and \ref{con2} hold for every digraph whose underlying graph is planar. \begin{THM}\label{THM:minc} If Conjecture~\ref{con2} fails and $D$ is a counterexample to it with the minimum number of vertices, then $D$ has no source. \end{THM} Since Conjecture~\ref{con2} implies Conjecture \ref{ESC}, Theorem~\ref{THM:minc} implies that the two conjectures are equivalent. In the next section we prove Theorem~\ref{4-partitea} and in Section~\ref{sec3} prove Theorem~\ref{THM:minc}. \section{Proof of Theorem~\ref{4-partitea} } Let $D_1=D-N_D^+[S]$, and $V_1\cup V_2=V(D_1)$ be a partition of $V(D_1)$ such that $D[V_i]$ is kernel-perfect for each $i=1,2$. In addition, we choose such a partition so that $|V_2|$ is as small as possible. Observe that adding a source vertex $v$ to a kernel-perfect digraph $H$ results in a new kernel-perfect digraph: let $H'$ be the resulting digraph, and let $F$ be a subdigraph of $H'$ that contains $v$. Then $K \cup \{v\}$ is a kernel of $F$ where $K$ is any kernel of $F - N^+_{H'}[v]$ in $H$. If there exists some $v \in V_2$ with no inneighbors in $V_1$, then we may move $v$ from $V_2$ to $V_1$, and obtain a new partition of $V(D_1)$ into kernel-perfect subgraphs with a smaller $V_2$. Thus, by the choice of $V_2$, \begin{equation}\label{V2_indeDree} N_{D_1}^-(v)\cap V_1\ne \emptyset \quad \mbox{ for every $v\in V_2$}. \end{equation} Since $D[V_1]$ is kernel-perfect, it has a kernel $R$. Let $R_0 $ be a smallest subset of $R$ such that $N_{D_1}^+(R_0)=N_{D_1}^+(R)$. By the minimality of $R_0$, for every $v\in R_0$, there exists $u\in N_{D_1}^+(R)$ such that $v$ is the only inneighbor of $u$ in $R_0$. In particular, this yields \begin{equation}\label{R0_size2} |R_0|\le |N_{D_1}^+(R)|. \end{equation} Let $D_2=D_1-(R_0\cup N_{D_1}^+(R))=D_1 - N_{D_1}^+[R_0]$, and $S_2$ be the set of sources of $D_2$. Since $R$ is a kernel in $D[V_1]$, $V(D_2) \subseteq V_2 \cup (R \setminus R_0)$. We partition $R \setminus R_0$ into the set $S_2'$ of the sources and the set $T_2$ of the non-sources of $D_2$: \[S_2':= S_2 \cap (R \setminus R_0), \qquad T_2=(R\setminus R_0) \setminus S_2.\] Then every vertex in $T_2$ has an inneighbor in the digraph $D_2$. As $V(D_2)=(R\setminus R_0)\cup (V_2\setminus N^+_{D_1}(R))$, and $T_2 \subseteq R$ is independent, we get \begin{equation}\label{T2} N_{D_2}^-(v)\cap (V_2\setminus N_{D_1}^+(R))\ne \emptyset \quad \mbox{for every $v\in T_2$}. \end{equation} Let $ K=S\cup R_0\cup T_2=S\cup (R\setminus S_2).$ Since $R_0\cup T_2\subseteq R$, $K$ is an independent set in $D$. We now show that ${\fam0 dist}_D(K,v)\le 2$ for every $v\in V(D)\setminus K$. Note that $$ V_1\setminus K=S_2'\cup( N_{D_1}^+(R)\cap V_1), \quad \mbox{and}\quad V_2\cap K=\emptyset.$$ Since $K\supseteq S\cup R_0$, \begin{equation}\label{dist1} \text{${\fam0 dist}_D(K,v)=1$ for every $v\in N_D^+(S)\cup N_{D_1}^+(R)$. } \end{equation} Consider $v\in S_2'=R\cap S_2$. Since $v$ is not a source of $D$, $N_D^-(v)\cap (N_D^+(S)\cup N_{D_1}^+(R))\ne \emptyset$. This, together with \eqref{dist1}, gives that ${\fam0 dist}_D(K,v)\le 2$. Lastly let $v\in V_2\setminus N_{D_1}^+(R)$. By~\eqref{V2_indeDree}, $v$ must have an inneighbor in $V_1$. As $v \notin N^+_{D_1}(R)$, and every vertex in $V_1 \setminus R$ is an outneighbor of a vertex in $R_0$, ${\fam0 dist}_D(K,v)= 2$. Therefore, $K$ is a quasi-kernel of $D$. If $|T_2|\le |V(D_2)\setminus T_2|$, then using~\eqref{R0_size2}, $$|K|=|S|+|R_0|+|T_2|\leq |S|+\frac{1}{2}|R_0\cup N^+_{D_1}(R)|+\frac{1}{2}|T_2\cup V(D_2)|\leq \frac{1}{2}(n+|S|-|N_D^+(S)|), $$ and the theorem holds. Thus, assume that $|T_2|> |V(D_2)\setminus T_2|$ (so $|V(D_2) \setminus T_2)| \leq |V(D_2)|/2$). Note that $V(D_2)\setminus T_2=(V_2\setminus N_{D_1}^+(R))\cup S_2'$. Since $D[V_2]$ is kernel-perfect and adding source vertices preserves kernel-perfectness, the digraph $D_2-T_2$ is also kernel-perfect. So let $W$ be a kernel of $D_2-T_2$ and $K'=(S\cup R_0\cup W)\setminus N_D^+(W)$. Similarly to $K$, the set $K'$ is independent in $D$. Since $|T_2|> |V(D_2)\setminus T_2|$, $$|K'|\le |S|+|R_0|+|W|\leq |S|+\frac{1}{2}|R_0\cup N^+_{D_1}(R)|+\frac{1}{2}|V(D_2)|\leq \frac{n+|S|-|N_D^+(S)|}{2}.$$ We now show that ${\fam0 dist}_D(K',v)\le 2$ for every $v\in V(D)\setminus K'$. Note that $$ S_2\subseteq K', \quad V_1\setminus K'= V_1 \cap [(R_0\setminus N_D^+(W))\cup (T_2\cup N_{D_1}^+(R))], \quad V_2\setminus K'=V_2\setminus W=N_{D}^+(W)\cap V_2. $$ By definition, ${\fam0 dist}_D(K',v)=1$ for every $v\in N_D^+(S)\cup N_{D_1}^+(R_0\setminus N_D^+(W)) \cup N_D^+(W)$. Thus, for every vertex $v\in N_{D_1}^+(R)\setminus N_{D_1}^+(R_0\setminus N_D^+(W))$, ${\fam0 dist}_D(K',v)\leq 2$. By~\eqref{T2}, for every $v\in T_2$, ${\fam0 dist}_D(K',v)\le 2$. Hence $K'$ is a quasi-kernel of $D$. \qed \section{ Proof of Theorem~\ref{THM:minc}}\label{sec3} Assume Conjecture~\ref{con2} fails and $D$ is a counterexample to it with the fewest vertices. Let $n=|V(D)|$. We assume $n\ge 4$ as the cases $n \leq 3$ are verifiable by hand. By the minimality of $n$, $D$ is weakly connected. Let $S$ be the set of sources of $D$. We show that $S=\emptyset$. Assume instead that $S\ne \emptyset$. {\bf Case 1:} $|N_D^+[S]|\ge 3$. Let $D_1$ be obtained from $D$ by deleting all vertices in $N_D^+[S]$, adding two new vertices $x$ and $y$, adding an arc from $y$ to every vertex of $D-N_D^+[S]$ that is an outneighbor of some vertex of $N_D^+(S)$ in $D$, and adding an arc from $x$ to $y$. Then $x$ is the only source vertex of $D_1$, and $N_{D_1}^+(x)=\{y\}$. Since $|V(D_1)|=|V(D)|-|N_D^+[S]|+2\le |V(D)|-1 $, the minimality of $n$ implies that $D_1$ has a quasi-kernel $K_1$ of size at most $\frac{n-|N_D^+[S]|+2+1-1}{2}$. Then $K=(K_1\setminus \{x\})\cup S$ is a quasi-kernel of $G$ that has size at most $$ \frac{n-|N_D^+[S]|+2+1-1}{2}-1+|S|=\frac{n+|S|-|N_D^+(S)|}{2}, $$ as desired. {\bf Case 2:} $|N_D^+[S]|\ge 2$. Since $D$ is weakly connected, and $|S|\geq 1$, we get $|S|=1$ and $|N_D^+(S)|=1$. Let $D_1=D-N_D^+[S]$. If $D_1$ has no sources, then by the minimality of $D$, digraph $D_1$ has a quasi-kernel $K_1$ with $|K_1|\leq\frac{n-2}{2}$. Then $K=K_1\cup S$ is a desired quasi-kernel of $D$. Therefore, we assume that $D_1$ has a source. Let $$S_1=\{v\in V(D_1)\,|\, d_{D_1}^-(v)=0\}.$$ If $|N^+_{D_1}(S_1)|\le |S_1|$, we let $D_2=D_1-S_1$. By the minimality of $D$, $D_2$ has a quasi-kernel $K_1$ of size at most $\frac{n-2-|S_1|+|N_{D_1}(S_1)|}{2}\le \frac{n-2}{2}$. Then $K=K_1\cup S$ is a desired quasi-kernel of $D$. Thus, we assume that $|N_{D_1}(S_1)|> |S_1|$. Let $D_2$ be obtained from $D_1$ by deleting all vertices in $N_{D_1}^+[S_1]$, adding two new vertices $x$ and $y$, adding an arc from $y$ to every vertex of $D_1-N_{D_1}^+[S_1]$ that is an outneighbor of some vertex of $N_{D_1}^+(S_1)$ in $D_1$, and adding an arc from $x$ to $y$. Note that $x$ is the only source of $D_2$, and $N_{D_2}^+(x)=\{y\}$. Again, by the minimality of $D$, $D_2$ has a quasi-kernel $K_1$ of size at most $\frac{n-2-|N_{D_1}^+[S_1]|+2+1-1}{2}$. Then $K=(K_1\setminus \{x\})\cup S\cup S_1$ is a quasi-kernel of $D$ that has size at most $$ \frac{n-2-|N_{D_1}^+[S_1]|+2+1-1}{2}-1+|S|+|S_1|\le \frac{n-1}{2}, $$ as desired. \qed \vskip\bigskipamount {\bf Acknowledgment.} We thank Peter L. Erd\H os for helpful discussions.
\section{Introduction} \begin{figure} \begin{center} \begin{minipage}{0.45\linewidth} \includegraphics[width=0.9\linewidth, angle=0]{EagleAlulaLabeled_lowQ.png}\\ \end{minipage} \end{center} \vspace{-10pt} \caption{\footnotesize Eagle landing with deflected alular feathers (or alula) as marked. } \label{fig:eagle} \vspace{-5pt} \end{figure} The expedient landing ability of birds stems from a delicate maintenance of separated flows across their wings. In a glide-assisted landing, birds tilt their wings to high angles of attack to produce the necessary drag forces required to airbrake to safe touchdown speeds (\cite{VidelerJJ:05a,ThomasALR:07a}). Despite the leading-edge flow being separated, as evinced by the deflection of the lesser covert feathers (see Fig. \ref{fig:eagle}), birds sustain the ability to control attitude by maintaining flow reattachment over their outer wing through use of their alular feathers (\cite{ChoiH:15a}). However, precisely how the alular feathers accomplish this remains unclear and has been veiled in part by a lack of three-dimensional flow measurements of the alula in the literature. Here, we use Stereoscopic-Digital Particle Image Velocimetry (S-DPIV) to resolve the global, time-averaged, vortex flow over a canonical wing with model bird alulae and explain the mechanisms behind the alula's stall prevention ability. The following portion of the introduction reviews the literature relevant to this work. First, the historical treatment of the alula and its associated aerodynamics are reviewed. Then, the relevant literature regarding post-stall flows over finite wings are discussed. Lastly, prior work from the authors that is relevant to this work is reviewed and the current approach outlined. \textit{The aerodynamics of the alula:} A bird's alula consists of a cohort of feathers, approximately $15\%$ the length of the bird's wing (\cite{AlvarezJC:01a}), that stem from the bird's primary digit, or thumb (\cite{VidelerJJ:05a}). It was first observed on primitive birds living 115+ million years ago (\cite{SanzJL:96a,ZhouZ:00a,RauhutOWM:14a}) and is currently found on all modern bird species (minus hummingbirds) (\cite{VidelerJJ:05a}). The alula's function is largely aerodynamic, although research has indicated a possible sensory role (\cite{FeddeMR:93a}). During slow flight or flight requiring the bird's wing to be tilted at high angles, the alula increases wing lift by preventing stall (\cite{AlvarezJC:01a,VidelerJJ:05a,ThomasALR:07a,AndersonAM:07a,ChoiH:15a,WissaA:17a,WissaA:19a}) and has been shown to allow birds to perform steeper descents with greater changes in body orientation when landing (\cite{ChoiH:15a}). Despite consensus regarding the alula's stall-prevention ability, details of the underlying mechanisms remain unresolved. Aeroelastic observations of alula deflections during gliding portions of a bird's perching sequence show that the alula passively peels, then is actively protracted, from the plane of the wing (\cite{ThomasALR:07a}). The resulting gap formed between the alula and the top surface of the wing (see image in Fig. \ref{fig:eagle}) has resulted in early comparisons of the alula to flow control devices on aircraft such as leading-edge slots or slats that work by energizing the boundary layer to subvert its detachment and sustain wing lift (\cite{AlvarezJC:01a,SanzJL:05a,AndersonAM:07a}). However, this explanation does not account for the three-dimensionality of the alula, which, in its deflected state, mimics a miniature, canted, flap positioned at the leading-edge of the bird's wing. The recent discovery of conical leading-edge vortices (LEVs) over the thin hand-wings of real (\cite{LentinkD:07a}) and model (\cite{VidelerJJ:04a}) swift wings has prompted a revaluation of the aerodynamics of the alula. \cite{VidelerJJ:04a} argued that the arm-wing and hand-wing of birds have differing lift-generating mechanisms; the thick-profiled arm-wing abides by conventional `attached-flow' aerodynamic principles and the thin hand-wings induce separated LEV flow. \cite{VidelerJJ:05a} suggests that the alula, which overhangs the thin hand-wing of birds, likely prevents stall via maintenance of separated edge flow rather than preventing flow separation from occurring in the first place. Two updated interpretations of the aerodynamic function of the alula have been put forth (\cite{VidelerJJ:05a,ThomasALR:07a}). First, that the alula generates a small vortex which separates the attached-flow system on the arm-wing and the separated leading-edge vortex (LEV) on the hand-wing (\cite{VidelerJJ:05a}). This function has been partially corroborated by \cite{ChoiH:15a} due to planar PIV measurements of a streamwise alula vortex stemming from the alula and a stall-delaying effect outboard of the alula. Here, stall-delay on the outer wing was argued to be the result of root-to-tip spanwise flow induced by the streamwise-oriented alula vortex. However, the LEV was not resolved likely because flow measurements were two-dimensional and isolated to a region in the immediate vicinity of the alula. The second hypothesis is that the alula promotes LEV formation over the swept-back hand-wing of birds in flight scenarios when the arm-wing is completely stalled (\cite{VidelerJJ:05a,ThomasALR:07a}). Until recently, there has been no quantitative experimental evidence of the alula promoting LEV formation, nor a clear explanation on how it may do so. In this work, we will build upon our previous work elucidating the aerodynamics of the alula (described at the end of this section) and attempt to clarify the alula's role in LEV formation. \textit{Post-stall flows over finite wings at high incidences:} The leading-edge vortex (LEV) is a flow pattern leveraged by natural and man-made fliers to achieve high-lift generation during flight involving separated flow (\cite{EllingtonCP:96a, Dickinson:99a,ThomasALR:02a,WalkerSM:17a,SpeddingGR:08a,TobalskeBW:09a,VidelerJJ:04a,LentinkD:07a,TropeaC:10a}). Many interpretations of lift enhancement via LEV flow exist. The stationary vortex model of \cite{Saffman:77a} showed theoretically that a free vortex attached to the wing increases wing lift by inducing a stronger bound circulation around the wing. \cite{Mohseni:13ag} showed lift enhancement of the stablized LEV to be the combined effect of both LEV and TEV motion where an attached LEV, moving with the airfoil, decreases the negative lift contribution associated with LEV motion. Physically, the presence of a recirculatory LEV above the wing accelerates fluid on the wing's top surface which enhances lift via suction. In each interpretation, the key to harnessing LEV-lift is prolonging its residence near the wing surface for the time-scales relevant to the flight objective. Flapping fliers such as insects (\cite{EllingtonCP:96a, Dickinson:99a,ThomasALR:02a,WalkerSM:17a}) leverage complex kinematics to stabilize the LEV. Here, mechanisms such as Coriolis tilting (\cite{JardinT:17a,LentinkD:09a}), vorticity annihilation (\cite{BuchholzJHJ:14a}), and spanwise flow (\cite{DavidL:14a}) are suggested to stabilize the LEV and/or delay its detachment. Readers are referred to (\cite{EldredgeJD:19a}) for a detailed review of LEV mechanics on maneuvering aerofoils and wings. However, as this manuscript attempts to resolve the LEV-stabilizing ability of the alula in a glide-assisted landing scenario, the following review focuses on the fluid dynamics associated with steadily translating wings at post-stall incidence angles as opposed to maneuvering wings. The fluid dynamics and associated loading of a finite wing at post-stall incidences is dominated by the growth, development, and interaction of the vortices stemming from the edges of the wing. The transient motion of the wing involves the roll-up of leading-, trailing-, and side-edge shear layers into a leading-edge vortex (LEV), trailing-edge vortex, and tip vortices, respectively, that collectively form an apparent vortex loop (\cite{FreymuthP:86a,Colonius:09b}). \cite{Colonius:09b} showed via computations at $Re_c = O(100)$ that with increasing time the trailing-edge vortex is displaced further into the wake and the tip vortices form columnar structures. The LEV continues to accumulate spanwise vorticity, subsequently growing in length and eventually submits to shedding, likely when the length of the LEV approaches or exceeds that of the chord (\cite{RivalDE:14a}). Hair-pin-type leading-edge vortices are continually shed which disrupt the coherency of the columnar tip vortices. Around this time, the lift of the wing peaks and settles to a lower nominal value. At Reynolds numbers in the range $Re_c = O(10^4-10^5)$ the LEV and its shedding is transitional and is characterized by a Kelvin-Helmholtz instability in the leading-edge shear layer that results in the break up and shedding of discrete vortices that succumb to turbulence in their downstream evolution (\cite{AzumaA:11a,LiburdyJ:09a}). Regulating LEV growth and/or shedding is thus key to sustained lift generation during steady flight at post-stall incidences. Certain modifications to the geometry of the wing are known to achieve this. Wings of sufficiently low aspect ratio produce downward-induced velocity via tip vortex downwash that pin the LEV close to the wing plane (\cite{Colonius:09b}). This downwash forces LEV vorticity to recirculate above the wing restricting large-scale vortex shedding (\cite{Mohseni:17o}). \cite{Mohseni:17c} explains that tip vortex downwash limits the chord-wise growth of the LEV as indicated by the saddle point associated with the LEV lying on the wing surface as opposed to in the wake. The existence of the saddle point upstream of the trailing-edge results in a smooth merging of flow at the trailing-edge, reduced trailing-edge vorticity generation, and in consequence, sustained wing lift. In addition to tip vortex downwash, LEV shedding can be delayed or curtailed at high incidences by encouraging the spanwise transport, or release, of vorticity toward the wing tip through use of curved or swept leading-edges (\cite{Colonius:09b}). On rectangular wings, the LEV and tip vortices remain separate structures due to the sharp corners of the wing, however, for the elliptical-type and semicircular test cases considered by \cite{Colonius:09b} there are no discontinuities in the vortex sheet that emanates from the leading-edge and wing tips. Moreover, the elimination of wing tips altogether through use of a delta-wing planform is readily understood to form two separate but stable LEVs on the left and right wing. \textit{Prior work and current approach:} The authors have been investigating the possibility that bird's alula can induce and stabilize a LEV on a wing in steady translation without requiring the wing to be swept back. This feature would enable the bird to maintain a spread-wing gliding posture that expedites landing through increased drag while subsequently utilizing LEV-lift to adjust attitude. In \cite{Mohseni:19g}, a canonical wing-alula configuration was considered where the wing and alula were modeled as thin, rectangular flat-plates with relative dimensions consistent with bird measurements. The alula was represented by a canted flap stationed at the leading-edge of the wing whose area was 1\% that of the wing. In this study, certain parameters of the wing and alula were varied, such as the angle of attack of the wing, the cant angle and spanwise position of the alula among others. The lift benefit of the alula was isolated to a range of post-stall incidences in the range 22 deg - 38 deg. In this range, surface-oil visualizations revealed the surface footprint of an apparent vortex that swept across the outer edges of the wing (see Fig. \ref{fig:surfaceoil}). The addition of a second alula resulted in two vortex systems on the left and right wing respectively. Lift and drag increment was found to be as high as $13\%$ and $25\%$ for certain single and dual alula configurations. In the current work, we use S-DPIV to elucidate these flow physics and connect this flow pattern to an aft-tilted LEV. Moreover, in the current work we explain the mechanisms of the alula that promote LEV formation and its attachment. \begin{figure} \begin{center} \begin{minipage}{0.32\linewidth} \includegraphics[width=0.9\linewidth, angle=0]{None_dewarped_lowlowQ_labeled.png}\\ \centering \footnotesize (a) baseline, no alula \end{minipage} \begin{minipage}{0.32\linewidth} \includegraphics[width=0.9\linewidth, angle=0]{L_100_dewarped_lowlowQ_labeled.png}\\ \centering \footnotesize (b) leftward-oriented alula \end{minipage} \begin{minipage}{0.32\linewidth} \includegraphics[width=0.9\linewidth, angle=0]{LW_100_dewarped_lowlowQ_labeled.png}\\ \centering \footnotesize (c) dual-opposing alula \end{minipage} \end{center} \vspace{-5pt} \caption{\footnotesize Surface-oil flow visualizations of an \AR\ = 1.5 wing at $\alpha = 25^\circ$ with (a) no alula, (b) leftward-oriented alula and (c) dual-opposing alula. Alula indicated by boxes. Separation line associated with an apparent vortex indicated by arrows. From \cite{Mohseni:19g}.} \label{fig:surfaceoil} \vspace{-5pt} \end{figure} The paper is organized as follows. The experimental set-up is described in Section \ref{sec:exp}. The global flow structure over the wing with and without alula(e) is described in Section \ref{sec:global}. The creation and stabilization mechanisms associated with the observed attached vortex system are investigated in Section \ref{sec:rollup}, Section \ref{sec:tilt}, and Section \ref{sec:spanflow} through analysis of LEV formation, vortex tilting, and outboard vorticity flux. In Section \ref{sec:carve} the reduced effectiveness of the alula at high angles of attack is considered. Concluding remarks regarding these findings are then given in Section \ref{sec:concl}. \section{Experimental set-up}\label{sec:exp} The wing planform and alula are similar to that described in \cite{Mohseni:19g}. The wing is an acrylic rectangular flat-plate with a chord of 9.53 cm and a span of 14.29 cm (\AR\ = 1.5). The rectangular planform is chosen to isolate the vortex stabilizing mechanisms of the alula from that associated with leading-edge curvature. The thickness of the wing was $0.047c$ where $c$ is the wing chord. All edges were left square. Model alulae were mounted to the wing via 3D printed, low-profile, press-fit pins. The alula is represented as a rigid flat plate with a fixed geometry and orientation with its root positioned at the midspan of the wing. The alula is rectangular with a thickness of $0.008c$, a span of $0.15b$, and an area of $0.01S$ where $b$ is the wing length and $S$ is the wing area. Unless otherwise noted, the leading-edge of the alula is offset 0.007c in front of the leading-edge of the wing. The orientation of the deployed alula relative to the wing is defined by three angles: 1. The incidence angle defined by the angle of the alula's chord relative to the wing chord. 2. The deflection angle or cant angle, defined by the rotation of the alula from the plane of the wing. 3. The pronation angle, or the sweep angle of the alula (in the plane of the wing) relative to the wing's leading edge. The alula is canted off the plane of the wing at an angle of $25$ deg with an incidence angle and pronation angle fixed at zero degrees. During testing, the wing affixed with the alula is inclined to steady flow at an angle of attack of 28 deg with select cases repeated at an angle of attack of 36 deg. The flow speed was 12.1 m/s corresponding to a Reynolds number of 75,000 which is within the range of bird flight (\cite{VidelerJJ:04a}). Two modified alula's were also tested: a `forward-shifted' alula, and an `overhung alula'. The forward-shifted alula had identical properties as the baseline alula (described above), however, it was shifted forward on the wing such that its mid chord was coincident with the wing's leading-edge (offset distance of 0.044c). The overhung alula, maintained the same chordwise location on the wing as the baseline alula but had its root vertically offset from the wing plane and possessed no cant angle. The gap between the overhung alula and the wing's top surface was set so that its frontal area was approximately equal to that of the baseline (canted) alula. Moreover, the span of the overhung alula was kept the same as the projected span of the canted alula. Each alula was printed using a 3D Systems Projet 2500 multijet printer. The printer has a net build volume (XYZ) of 294 $\times$ 211 $\times$ 144 mm with a 800 $\times$ 900 $\times$ 790 DPI resolution with 32 $\mu m$ layers. Resolution before post processing is $\pm 0.025-0.05$ mm per 25.4 mm of part dimension. The material was VisiJet M2 RWT. Wind tunnel experiments were performed in the Engineering Laboratory Design recirculating wind tunnel located at the University of Florida. The test section has a 61 $\times$ 61 cm$^2$ cross-section and is 2.44 m in length. The wind tunnel can achieve freestream velocities ranging from 3 - 91.4 m/s. The turbulence intensity of the freestream was 0.12\% at the tested velocity. A Stereo-Digital Particle Image Velocimetry (S-DPIV) system (see Fig. \ref{fig:PIVsch}) was used to measure the three-component velocity field in streamwise planes of the flow (2D-3C). The wind tunnel was seeded with $\sim$1 $\mu$m olive oil particles generated by an atomizer. These particles were illuminated by a 4 mm thick laser sheet generated by a 20 mJ Nd:YLF laser (Quantronix Darwin Duo, $\lambda=527$~nm). The imaging system consists of high-speed CMOS 1 Mpx cameras (Phantom v210/v211, 1280 $\times$ 800 px$^2$) with the object-to-image plane mapping function (\cite{AdrianRJ:97a}) determined with a precision-machined, dual-plane calibration target. Misalignment of the target with the laser sheet was corrected with the disparity map method (\cite{AdrianRJ:97a,WillertC:97a,WienekeB:05a}) for which 100 images (of the undisturbed freestream) were used. \begin{figure} \centering \vspace{0pt} \begin{minipage}{0.8\linewidth} \includegraphics[width=1\textwidth, angle=0]{PIV_setup.pdf}\\ \end{minipage} \vspace{-10pt} \caption{\footnotesize Stereo-Digital Particle Image Velocimetry (S-DPIV) system in wind tunnel.} \vspace{-10pt} \label{fig:PIVsch} \end{figure} An approximation of the mean volumetric flow field (3D-3C) is constructed from closely-spaced planes of data collected by translating the wing-alula model through a stationary vertically-oriented laser plane. 38 equally-spaced streamwise planes of data were taken a distance $0.06c$ apart on the wing where $c$ is the chord length of the wing. Each plane of S-DPIV data consists of 300 images taken at a rate of 100 Hz (3 sec of acquisition time). Each image was processed with Insight 4G software by TSI Inc. Images were first dewarped according to calibration images taken for each camera. Thereafter, an iterative multi-pass DPIV evaluation algorithm consisting of windowing shifting/deformation was performed on each image pair. Interrogation windows were made rectangular starting from 40 $\times$ 40 px$^2$ down to 20 $\times$ 20 px$^2$ (50\% overlap). The resulting spatial resolutions of the volumetric flow measurements in the horizontal, vertical, and streamwise directions are $\Delta y = 0.06c, \> \Delta z = \Delta x = 0.026c $. The size of the measurement volume is 2.94c $\times$ 2.28c $\times$ 2.94c where the total number of measured velocity vectors is 113 $\times$ 38 $\times$ 75. Measured quantities such as circulation are computed using this grid. A refined grid with four times the resolution, i.e. 452 $\times$ 152 $\times$ 300, is used for three-dimensional plots. Statistics of S-DPIV measurements of the undisturbed freestream were used to quantify measurement errors. Taking each time-averaged velocity measurement in space as a single sample, velocity errors corresponding to twice the standard deviation of the sampling distribution were $e_{u}/U = 0.02$, $e_{v}/U= 0.01$, and $e_{w}/U = 0.02$. Vorticity is computed using the local circulation method \cite{Raffel:98a}. An estimate of the error in vorticity from this method is $e_{\omega} c/{U} = 0.61e_{U}c/(U\Delta x) = 0.72$ where $e_{U}$ is taken as the average of the above velocity errors. Unless otherwise noted, the coordinate system used to represent the data is in the laboratory axis where $x$ is downstream, $z$ is toward azimuth and $y$ is out the right wing as observed from an observer at the trailing-edge of the wing facing the leading-edge of the wing. \section{Post-stall vortical flow over a wing with an alula}\label{sec:global} This section describes the three-dimensional time-averaged vortical flow over the wing with a single alula, and pair of alulae, in comparison to its plain wing counterpart. Fig. \ref{fig:Vortiso} plots two different isosurface values atop three-dimensional streamline patterns. Vortex sheets are identified by an isosurface of vorticity magnitude ($||\boldsymbol{\omega}||_2 = 3$) where vortex cores are identified by an isosurface of the Q-criterion (Q = 13). $Q$ locally measures the excess of rotation rate relative to strain rate (\cite{Moin:88b}) and for incompressible flows is given by $Q \equiv \frac{1}{2}(||\boldsymbol{\Omega}||^2 - ||\boldsymbol{S}||^2)$, where $\boldsymbol{\Omega} \equiv \frac{1}{2}[\boldsymbol{\nabla u} - (\boldsymbol{\nabla u})^T]$ and $\boldsymbol{S} \equiv \frac{1}{2}[\boldsymbol{\nabla u} + (\boldsymbol{\nabla u})^T]$. Streamlines are initialized at the leading edge of the wing at spacial locations of high-magnitude positive spanwise vorticity ($\omega_y > 15$). These leading-edge streamlines are colored black. Streamlines are also initiated at the side-edges of the wing and are uniformly spaced along the chord of the wing. These streamlines are colored magenta. Vortical flow over the baseline wing takes the form of blanketing shear layers that envelop a separation region. Streamlines stemming from the leading and side edges of the wing follow the trajectory of separated shear layers and do not reattach to the wing. We observe the separation region to extend downstream passed the wing's trailing-edge which implies that the flow over the baseline wing is `massively separated' in this time-averaged sense. The addition of a single alula to the wing results in two disparate vortical flow regions on the wing. For wing sections outboard of the alula, the leading-edge vortex sheet is pinned back to the wing plane. Underneath, leading-edge and wing-tip streamlines wind around the core of an aft-tilted leading-edge vortex (LEV) (as identified by Q). The LEV stems from the alula's root and sweeps across the outer corner of the wing merging with the tip flow to form an apparent recirculatory tip vortex by the trailing-edge of the wing. Adjacent wing sections remain topologically similar to that of the baseline wing as vortical flow takes the form of separated shear layers that blanket a separation region. However, the spanwise extent of the separation region is reduced. For the dual-opposing alula configuration, two LEV vortex systems span the outer edges of the left and right wing. In between these regions, lies a separation region of further reduced size in comparison to the single and baseline wing cases. \begin{figure} \centering \vspace{0pt} \begin{minipage}{1\linewidth} \includegraphics[width=1\textwidth, angle=0]{Q_Vortmag_iso.png}\\ \end{minipage} \vspace{-10pt} \caption{\footnotesize Time-averaged vortical flow over wing with no alula (\textit{left column}), single alula (\textit{middle column}), and dual-opposing alulae (\textit{right column}). Shown in yellow is the iso-surface of $||\boldsymbol{\omega}||_2 = 3$. Shown in cyan is the iso-surface of $Q = 13$ to indicate vortex cores. Streamlines stemming from the side-edge of the wing are colored magenta. Streamlines stemming from the leading-edge of the wing are colored black. Rows depict isometric views, top views (parallel to wing plane), and front views (orthogonal to wing plane), respectively. } \vspace{-10pt} \label{fig:Vortiso} \end{figure} For insight into the strength of vortices, we consider sectional cuts of spanwise- and streamwise-oriented vorticity, $\omega_y$ and $\omega_x$, respectively, in planes normal to the respective component of vorticity (see Fig. \ref{fig:VortDistSlice}). Accompanying these figures are plots comparing the corresponding circulation distributions across the span and chord, respectively. Spanwise-oriented circulation, $\Gamma_y$, is computed from $+\omega_y$, where streamwise-oriented circulation, $\Gamma_x$, is computed from $-\omega_x$ at $y/b < 0$ (left semispan of the wing). The distribution of $\Gamma_x$ is represented using a wing-aligned coordinate system where $x^*/c = -1$ marks the leading-edge of the wing, and, $x^*/c = 0$ marks the trailing edge of the wing. \begin{figure} \centering \vspace{0pt} \begin{minipage}{1\linewidth} \includegraphics[width=1\textwidth, angle=0]{CircDist.pdf}\\ \end{minipage} \vspace{-10pt} \caption{\footnotesize Contour slices of time-averaged (\textit{top}) spanwise and (\textit{bottom}) streamwise vorticity for the wing affixed with no alula (baseline), single alula, and dual-opposing alulae. Plots on the right depict corresponding circulation distributions across the span and chord, respectively. Spanwise-oriented circulation is computed from positive spanwise vorticity in the flow. Streamwise-oriented circulation is computed from negative streamwise vorticity above the wing plane located on the left half of the wing. Regions marked i-iii are explained as follows: i) emergence and growth of the surface-layer vortex, SLV, via aft-tilting of LEV ii) amalgamation of SLV and side-edge shear layer into tip vortex, iii) tip vortex strengthening through feeding of side-edge shear layer. } \vspace{-10pt} \label{fig:VortDistSlice} \end{figure} The aft-tilted LEV has components in the $+\omega_y$ and $\mp \omega_x$ directions; the $\mp$ sign depending on if the alula is oriented to the left or right wing. Outboard of the alula $+\omega_y$ concentrates near the wing plane and lifts off as the wing tip is approached. $\omega_x$ comprising the LEV initiates as a surface layer (depicted as surface-layer vortex or `SLV') and with increasing downstream distance shifts outboard amalgamating with the side-edge shear layer, of like sign, forming a near-circular tip vortex by the midchord of the wing. Stemming from the trailing-edge of the alula lies a vortex, termed alula trailing-edge vortex or ATEV, that hugs the inner periphery of the LEV. This vortex is of opposite sign to the LEV containing vorticity of $-\omega_y$ and $\pm \omega_x$ direction; the $\pm$ sign depending on if the alula is oriented to the left or right wing. These results reflect the aft-tilted nature of vortices associated with the alula, i.e. the LEV and the ATEV. We will explain the tilting of these structures in section \ref{sec:tilt}. From the circulation distributions shown in Fig. \ref{fig:VortDistSlice}, notable changes in spanwise and chordwise loading of the wing with an alula(e) are observed relative to the baseline wing. Spanwise stations harboring an LEV experience a reduction in $\Gamma_y$ which is approximately equal between the dual-opposing and single alula cases. This result suggests that the alula facilitates the removal and/or reorientation of $+\omega_y$ generated at the wing's leading-edge. In regard to streamwise-oriented circulation distributions, the emergence and growth of the SLV associated with the aft-tilted LEV results in the rapid increase in the magnitude of $-\Gamma_x$ which peaks around the chordwise location of $x^*/c = -0.75$. With increasing chordwise distance in the range $-0.75 < x^*/c < -0.5$, the amalgamation of the surface-layer vortex and side-edge shear layer into the tip vortex results in a reduction in magnitude of $-\Gamma_x$ due to the contraction of these vortices. From $-0.25< x^*/c < 0$ the tip vortex strengthens as it is continues to be fed by the side-edge shear layer. We refer to the interested reader to the Fig. \ref{fig:VortVelX} in the Appendix which depicts the streamwise evolution of the SLV and its merging with the tip flow. \section{LEV formation and maintenance}\label{sec:rollup} Having described the vortical flow over the wing, we now investigate the mechanisms that enable the alula to induce and stabilize the observed attached vortex system. We start by considering the flow at spanwise stations in the vicinity of the alula to grant insight into the alula's interaction with the leading-edge flow and the formation of the LEV and oppositely-signed ATEV. A topological map is constructed to assist the discussion. Then we explain the mechanisms that drive the LEV to both tilt aft and smoothly merge with the tip flow. We then consider a series of tests performed at a higher angle of attack for which the effectiveness of the alula is hindered, and use our newfound knowledge of the aerodynamic mechanisms of the alula to slightly modify the alula in an attempt to restore its effectiveness at this high angle of attack condition. \subsection{Topological description of LEV roll-up via alula}\label{sec:rollup} We consider the case of the wing with a single alula and analyze streamline patterns and spanwise vorticity contours in chordwise planes in the immediate vicinity of the alula (refer to Fig. \ref{fig:Topology}). To assist the discussion, topological maps are created which have been previously used by the authors to describe the vortex shedding process on an airfoil (\cite{Mohseni:08l}) and the time-average mid-plane vortex structure on low-\AR\ wings at high incidences (\cite{Mohseni:17c}). From \cite{HuntJCR:78a} critical/fixed points in a two-dimensional plane section of the flow satisfy, \begin{equation} \big(\sum N + \frac{1}{2} \sum N'\big) - \big(\sum S + \frac{1}{2}\sum S'\big) = 1-n, \label{eq:topo} \end{equation} \noindent where $S$ and $S'$ are full- and half-saddles, $N$ and $N'$ are full- and half-nodes and $n$ is the connectivity of the plane. $n = 3$ when the wing and alula are considered and $n = 2$ when the wing is considered. \begin{figure} \centering \vspace{0pt} \begin{minipage}{1\linewidth} \includegraphics[width=1\textwidth, angle=0]{Alula_topology.pdf}\\ \end{minipage} \vspace{-10pt} \caption{Topological description of the time-averaged flow over a wing with a single alula in streamwise planes at spanwise locations as indicated. Full-nodes and saddles are depicted by yellow squares and circles, respectively. Half-saddle points are depicted by cyan circles. Measured streamline patterns and spanwise vorticity contours are included on the right. Inset figures display measured velocity vectors near leading-edge of the wing.} \label{fig:Topology} \end{figure} We start by considering a plane of data, $y/b = 0.06$, located near the alula's root on the wing section opposite that for which the alula is overhung. Spanwise vorticity is organized into a shear layer stemming from the leading-edge of the wing which envelops a leading-edge separation region comprised of clockwise swirl. A trailing-edge vortex is also apparent comprised of anti-clockwise swirl. A topological flow description of the separated flow at the mid-plane of thin low-\AR\ wings was given by \cite{Mohseni:17c} which is adopted here. Two full-nodes represent the counter-rotating regions associated with the leading-edge separation region and the trailing-edge vortex, and three full-saddles represent the leading and trailing-edge stagnation points as well as the rear stagnation point associated with the leading-edge separation region. A separation streamline is added that blankets all recirculatory regions in the flow. The topology of the flow on the wing sections outboard of the alula is fundamentally different than that on the adjacent wing section. The first plane considered ($y/b = -0.14$) is located immediately outboard of the alula, a distance $0.004b$ away from the alula's tip. The projection of the alula's tip on the contour plot of spanwise vorticity is as indicated. We observe the leading-edge shear layer to stem from the leading-edge of the alula as opposed to the leading-edge of the wing. Two additional vortices are introduced into the flow, the LEV and the ATEV, comprised of clockwise and anti-clockwise swirl. The LEV stems from the wing's leading-edge where the ATEV stems from the alula's trailing edge. Underneath the ATEV, lies high-magnitude flow near the surface of the wing as indicated by the magnitude of time-averaged velocity vectors there. This flow penetrates the separation region terminating at an apparent stagnation point as indicated by streamline patterns. Streamlines in this plane of data are used to topologically describe the flow in a plane that slices through the alula and wing at a spanwise location coincident with the alula's wing tip. The topological description of this flow is explained as follows. With the addition of the alula, two bodies are now present, thus $n = 3$ in Eq. \ref{eq:topo}. Fixed points are the same as the topological description at $y/b =0.06$, however, two full saddles are added to represent the leading and trailing-edge stagnation points on the alula and two half saddles are added to represent additional stagnation points on the wing. Underneath the alula, the wing's leading-edge streamline impinges back on the wing surface forming a region of clockwise swirl (designated LEV). Aft of the LEV lies a streamline that both originates and terminates at the alula's trailing-edge. This streamline encircles a region of anti-clockwise swirl associated with the ATEV. With the LEV and ATEV occupying the leading-edge of the wing, the separation region is no longer enclosed by a streamline stemming from the leading-edge of the wing. Rather the streamline encircling the separation region stems from a half-saddle point on the wing located aft of the ALEV at approximately the 0.4c location. This streamline terminates at a full saddle point in the wake in a similar fashion to that which occurs at $y/b = 0.06$, however, this fixed point is closer to the trailing-edge of the wing resulting in a trailing-edge vortex, comprised of anti-clockwise swirl, of reduced size. Lastly, we consider a plane of data outboard of the alula's tip at $y/b = -0.22$. The aft stagnation point of the LEV and the forward stagnation point of the separation region both move rearward, causing the enlargement of the LEV region and the shrinking of the separation region. In between, the ATEV, released from the alula, is suspended by a full saddle point formed from the merging of the full-saddle points located at the leading and trailing-edges of the alula. Curved streamlines associated with the enlarged LEV and reduced separation region indicate enhanced lift generation at spanwise stations outboard of the alula. This analysis invites the current interpretation of the formation of the LEV and ATEV. The no-flow-through condition imposed by the alula, or the image vortex in the alula, steers separated leading-edge flow back to the wing plane. Shear produced from the penetration of this flow into the separation region results in the formation of the ATEV. The LEV forms from the accumulation of spanwise vorticity generated at the wing's leading-edge which is subsequently `trapped' by the oppositely-signed ATEV. While this pairing of the LEV and ATEV may assist in regulating LEV growth through vorticity annihilation it is unlikely that two-dimensional mechanisms alone are responsible for the attached LEV. As is discussed next, LEV growth appears to also be regulated by vortex tilting and outboard vorticity flux. \begin{figure} \centering \vspace{0pt} \begin{minipage}{1\linewidth} \includegraphics[width=1\textwidth, angle=0]{NearSurf_streamline_tilt.png}\\ \end{minipage} \vspace{-10pt} \caption{\footnotesize Time-averaged velocity iso-surfaces for wing affixed with no alula (\textit{left column}), single alula (\textit{middle column}), and dual-opposing alulae (\textit{right column}). The two dimensional figures plot near-surface streamline patterns obtained at a vertical distance $dz = 0.09c$ from the top surface of the wing. Overlayed in these figures are contours of time-averaged in-plane velocity magnitude. Inset schematics depict the aft tilting of spanwise-oriented vorticity associated with boxed regions labeled A and B.} \vspace{-10pt} \label{fig:NearSurf} \end{figure} \subsection{On the aft tilting of the LEV and outboard vorticity flux}\label{sec:tilt} This subsection starts by describing how spanwise vorticity, steered back toward the wing plane by the alula, is subsequently tilted aft to form the SLV (recall Fig. \ref{fig:VortDistSlice}). This subsection ends by explaining the amalgamation of the SLV and side-edge shear layer into the tip vortex through an analysis of outboard vorticity flux. To begin, we analyze near-surface streamline patterns and in-plane non-dimensional velocity magnitude contours in a plane parallel to the wing located a vertical distance $dz = 0.09c$ from the top surface of the wing (see Fig. \ref{fig:NearSurf}). Isometric views depicting three-dimensional streamline patterns and isosurfaces of the spanwise and streamwise-oriented velocity are also included for the readers convenience. From the near-surface streamline patterns, we observe high-magnitude root-to-tip flow ($>$$80\%$ that of the freestream velocity) to exist between two stagnation regions: one associated with the LEV that lies near the upstream corner of the wing and the other associated with the separation region which lies inboard of the alula's tip. A gradient in in-plane velocity magnitude is apparent immediately aft of the alula due the aforementioned high-magnitude `alley-way' flow lying adjacent to stalled flow in the separation region. As depicted in the schematics in Fig. \ref{fig:NearSurf}, a spanwise-aligned vortex element $+\omega_y$, generated at the wing's leading-edge and steered back to the wing plane by the alula, tilts aft when confronted with this gradient. The tilting of $+\omega_y$ on a leftward-oriented alula results in the production of $-\omega_x$ while the tilting of a rightward-oriented alula results in the production of $+\omega_x$. This is precisely the sign of vorticity comprising the SLV as observed in Fig. \ref{fig:VortDistSlice}. \begin{figure} \centering \vspace{0pt} \begin{minipage}{1\linewidth} \includegraphics[width=1\textwidth, angle=0]{UdotGradOmegaXY.pdf}\\ \end{minipage} \vspace{-10pt} \caption{\footnotesize Outboard convective flux of spanwise and streamwise vorticity shown by isosurfaces of $\boldsymbol{(u \cdot \nabla)_y}\omega_y$ and $\boldsymbol{(u \cdot \nabla)_y}\omega_x$ on baseline wing, wing with single canted alula, and wing with single overhung alula.} \vspace{-10pt} \label{fig:UgradOmega} \end{figure} Having explained the likely mechanism behind the aft-tilted LEV, or SLV, next we investigate the mechanism that enables the merging of this vortex with the tip flow. In addition to facilitating vortex tilting, high magnitude root-to-tip spanwise flow produced by the alula drives an outboard flux of vorticity toward the wing tip. This is shown in Fig. \ref{fig:UgradOmega} which plots isosurfaces of $\boldsymbol{(u \cdot \nabla)_y}\omega_x = -20$ and $\boldsymbol{(u \cdot \nabla)_y}\omega_y = 20$ for the wing with a single canted alula in comparison to the baseline wing (the case of the overhung alula will be explained in the next subsection). On the wing with the canted alula, we observe an outboard flux of $+\omega_y$ and $-\omega_y$ which is associated with the transport of the non-tilted components of the LEV and ATEV, respectively. More importantly, we observe an outboard flux of $-\omega_x$ that emerges aft of the alula and is sustained across the outer wing section. This outboard flux of $-\omega_x$ drives the amalgamation of the SLV and the like-signed side-edge shear layer into a near circular tip vortex by the midchord of the wing. This is observed in contour plots of the baseline (canted) alula shown in Fig. \ref{fig:Amal} (see also Appendix Fig. \ref{fig:VortVelX}). These results emphasize the role of three-dimensional vorticity transport mechanisms (i.e. vortex tilting and outboard vorticity flux) in enabling the smooth merging of leading- and side-edge vortex flows and, in consequence, the attached LEV. \subsection{On high-magnitude spanwise flow generation}\label{sec:spanflow} We explained the role of the aft-located wall-jet of spanwise flow induced by the alula in facilitating the smooth merging of leading- and side-edge vortex flows. Still unclear is how the alula produces this flow. A starting point is to consider the orientation of the alula. The fact that the alula is canted and affixed to an inclined wing means that a component of the freestream is directed tangent to the alula. The tangential flow component is given as $U\sin{\alpha}\cos{\phi}$ where $U$ is the freestream velocity, $\alpha$ is the angle of attack, and $\phi$ is the alula's cant angle. For the test conditions considered, the freestream flow directed tangent to the alula is $0.18U$; a value substantially weaker than the spanwise velocity magnitudes measured which reach magnitudes $>0.80U$. Thus, there must be an additional mechanism driving the high-magnitude root-to-tip flow. To assist this investigation, Fig. \ref{fig:Spanflow} plots spanwise velocity contours in streamwise planes at $y/b = -0.14$, a plane located immediately outboard of the alula. The projection of the alula's tip on this plane is plotted for reference. We observe an influx of spanwise flow at chordwise stations upstream of the alula's trailing-edge and an outboard flux of spanwise flow at chordwise stations downstream of the alula's trailing-edge. The inflow and outflow has a maximum spanwise velocity magnitude of $0.50U$ and $0.60U$, respectively. This organization of spanwise flow suggests that a region of clockwise swirl is established underneath the canted alula (when viewed from the top of the alula). Here, a fluid element stemming from the leading-edge of the wing in the vicinity of the alula is first directed toward the alula's root and, upon confronting it, is turned and subsequently ejected outboard toward the wing tip. The ability of the alula to entrain fluid not just from its front but also from its side would magnify the jet of flow directed outboard toward the wing tip by mass conservation which may explain the high magnitudes of root-to-tip spanwise flow produced by the alula. We hypothesize the observed side-edge entrainment to be sustained by a spanwise pressure gradient associated with the canted alula. Here, the pressure gradient is the result of the contraction (and subsequent acceleration) experienced by spanwise flow directed toward the alula's root. We tested a modified alula which has no cant angle to corroborate this hypothesis. As opposed to being canted, the modified alula is overhung such as to form a small gap between its bottom surface and the wing's top surface. The gap between the `overhung alula' was set so that its frontal area was equal to that of the baseline (canted) alula. Moreover, the span of the overhung alula was kept the same as the projected span of the canted alula. \begin{figure} \centering \vspace{0pt} \begin{minipage}{1\linewidth} \includegraphics[width=1\textwidth, angle=0]{Overhung_crossVort.png}\\ \end{minipage} \vspace{-10pt} \caption{\footnotesize Time-averaged streamwise vorticity contours and streamlines in cross-stream planes at select chordwise locations. The plot on the right depicts the chordwise circulation distribution of the wing. Circulation is computed from negative streamwise vorticity above the wing plane located on the left half of the wing. } \vspace{-10pt} \label{fig:Amal} \end{figure} Spanwise flow contours for the overhung alula are also plotted in Fig. \ref{fig:Spanflow}. The high magnitudes of inflow measured on the baseline (canted) alula are not observed on the overhung alula. Moreover, the outflow, or root-to-tip spanwise flow, produced by the overhung alula is weaker, more diffuse, and is displaced further aft of the trailing-edge of the alula in comparison to that which is observed on the baseline (canted) alula. This result lends itself to the notion that high-magnitude root-to-tip flow is connected to the cant angle of the alula. However, further research into high-magnitude spanwise flow generation via canted alula is necessary to resolve this connection. The consequence of reduced spanwise flow generation is clear when comparing outboard vorticity flux (see Fig. \ref{fig:UgradOmega}) and chordwise circulation distributions (see Fig. \ref{fig:Amal}) measured on the wing with the overhung alula compared to that of the baseline (canted) alula. From Fig. \ref{fig:UgradOmega}, the overhung alula, with reduced spanwise flow generation sees outboard vorticity flux localized near the alula. Without sustained vorticity flux toward the wing tip, the amalgamation process of the aft-tilted LEV, or SLV, with the edge shear layer is hindered resulting in a less coherent tip vortex by the trailing-edge of the wing as observed in Fig. \ref{fig:Amal}. This result is further reflected in chordwise circulation distributions of $\Gamma_x$ which depict consistently lower magnitudes of $-\Gamma_x$ for the overhung alula compared to the canted alula. These results emphasize the importance of spanwise flow generation on the stability of the vortex system exhibited by the wing with the alula and the apparent importance high-magnitude spanwise flow generation on enabling the smooth merging of leading- and side-edge flows and the apparent importance of the canted orientation of the alula. \begin{figure} \centering \vspace{0pt} \begin{minipage}{0.6\linewidth} \includegraphics[width=1\textwidth, angle=0]{Spanwise_flow_compare.pdf}\\ \end{minipage} \vspace{-10pt} \caption{\footnotesize Spanwise velocity contours in streamwise plane stationed at $y/b = -0.14$ for wing affixed with baseline (canted) alula (\textit{left column}) and overhung alula (\textit{right column}).} \vspace{-10pt} \label{fig:Spanflow} \end{figure} \subsection{Shadowing of the alula at high angles of attack}\label{sec:carve} In the previous analysis, we connected LEV formation to the alula's ability to steer spanwise vorticity generated at the wing's leading-edge back to the wing plane. We showed this to manifest itself in distribution plots of spanwise circulation as a reduction in $\Gamma_y$ relative to the baseline wing with no alula. Recall, the reduction in $\Gamma_y$ was associated with spanwise vorticity in the LEV being reoriented and evacuated toward the wing tip via vortex tilting and outboard vorticity flux. The force measurements of \cite{Mohseni:19g} showed the alula to be ineffective if the angle of attack of the wing is too high. This suggests that the LEV formation and stabilization processes are hindered in some way. To elucidate this feature, we conducted experiments at a higher angle of attack $\alpha = 36$ deg. Spanwise and streamwise vorticity contours are compared in Fig. \ref{fig:Vortfshift} between the two angles of attack considered with spanwise- and chordwise- circulation distributions also plotted. At spanwise stations outboard of the alula, we observe $\Gamma_y$ to be significantly larger than at the higher angle of attack. Contour plots of spanwise circulation at $y/b = -0.3$ reveal spanwise vorticity to be more approximately organized into a leading-edge shear layer at the higher angle of attack as opposed to the concentrated LEV observed at the lower angle of attack. This inability to steer leading-edge vorticity back toward the wing plane to induce a recirculatory LEV means that vortex tilting and outboard vorticity flux via spanwise flow cannot take effect. The consequence is the downstream shedding of spanwise vortices into the wake manifesting itself as the diffuse shear layer observed in time averaged measurements. Moreover, with less spanwise vorticity being tilted, less streamwise vorticity is introduced into the flow resulting in a weaker and more diffuse tip vortex as is observed at the wing's trailing-edge of the wing, $x^*/c = 0$. We hypothesize that one of the reasons why the alula is less effective at the higher angle of attack is because the alula is less immersed in the wing's leading-edge flow due to it being shadowed behind the inclined wing. Because of this shadowing, the alula is less able to steer spanwise vorticity from the leading-edge shear layer back to the wing plane to induce the LEV. In an attempt to restore the alula's effectiveness at this higher angle of attack, we consider an identical alula that is shifted forward on the wing a distance one-half the chord length of the alula. Fig. \ref{fig:Vortfshift} includes contour plots of the forward-shifted alula with circulation measurements also plotted. We observe a reduction in $\Gamma_y$ on the outboard wing stations and subsequent increase in $-\Gamma_x$ on the aft portion of the wing; results that suggest that the forward-shifted alula, being less shadowed behind the wing, is more effective at steering leading-edge vorticity back to the wing plane. The ability to steer leading-edge vorticity back to the wing plane allows this flow to be tilted and subsequently evacuated toward the wing tip via high-magnitude spanwise flow generated by the canted alula. \begin{figure} \centering \vspace{0pt} \begin{minipage}{1\linewidth} \includegraphics[width=1\textwidth, angle=0]{CircDist_fshift.pdf}\\ \end{minipage} \vspace{-10pt} \caption{\footnotesize Contour slices of time-averaged non-dimensional (\textit{top}) spanwise and (\textit{bottom}) streamwise vorticity for the wing affixed with a single alula (baseline) and an alula that is shifted forward a distance one-half the chord length of the alula at angles of attack as marked. Plots depict corresponding circulation distributions across the span and chord respectively. Spanwise-oriented circulation is computed from positive spanwise vorticity in the flow. Streamwise-oriented circulation is computed from negative streamwise vorticity above the wing plane located on the left half of the wing. Contour plots at select spanwise and chord wise locations are also indicated.} \vspace{-10pt} \label{fig:Vortfshift} \end{figure} \section{Concluding remarks}\label{sec:concl} Based on the results described in this manuscript, we put forth the following explanation of the alula's maintenance of an attached aft-tilted leading-edge vortex (LEV). This flow pattern is the consequence of the alula's ability to smoothly merge otherwise separated leading and side-edge vortical flows. This is accomplished by leading-edge vorticity generated at the wing's leading-edge being steered back to the wing plane and subsequently subjected to an aft-located wall-jet of root-to-tip spanwise flow ($>80\%$ that of the freestream velocity). The latter feature induces LEV roll-up while the former feature tilts LEV vorticity aft and evacuates this flow toward the wing tip via an outboard vorticity flux. Our results further indicate that the hindrance of vortex steering, via the alula being shadowed behind the inclined wing, or the hindrance of high-magnitude root-to-tip spanwise flow generation, via elimination of the alula's cant angle, both result in a weakened and more diffuse vortex system (in the time-averaged sense). This leads us to conclude that it is the alula's ability to simultaneously i) steer leading-edge flow back to the wing plane and ii) subject this flow to a aft-located wall jet of high-magnitude root-to-tip spanwise flow that is critical to the alula's LEV stabilizing ability and thus enhanced wing lift at post-stall incidences. The unique construction of the alula, which mimics a canted flap oriented toward the wing tip and stationed at the leading-edge of the wing, thus appears to possess all necessary ingredients to form and maintain an attached LEV on a steadily translating unswept wing that is inclined to the flow at post-stall angles. This capability of the alula would enable birds to maintain a spread-wing gliding posture to facilitate airbraking while enjoying enhanced wing lift via LEV flow to facilitate maneuvering. Additional work is necessary to the usefulness of an alula-inspired control effector for aircraft applications; although the need for such a device is apparent. Stealth aircraft require high-lift technologies with low observability whereas micro-aerial-vehicles require control effectors that are lightweight. The size of the alula, which in this study occupies an area 1\% that of the wing, makes an alula-inspired technology an attractive pain-reliever for these applications. However, key details such as the effects of maneuvering flight, leading-edge curvature of the wing, wing airfoil geometry, Reynolds number, among others on the attached vortex system associated with the alula still needs to be resolved.\\
\section{Introduction} Sensitive measurements of temperature are essential throughout natural science and modern technology. Increasingly detailed studies of biological, chemical, and physical processes, the miniaturisation of electronics, and emerging quantum technology drive a need for new thermometry techniques applicable at the nanoscale and in regimes where quantum effects become important. Many new approaches are being developed \cite{Carlos2016,Mehboudi2019,PhysRevLett.103.245301,Gasparinetti2011,Neumann2013NanoLett,Lukin2013Nature,Sabin2014ScientificReports,Gasparinetti2015,Moldover2016,Palma2017ChipCooling,PhysRevApplied.10.044068,Scigliuzzo2020}, however the fundamental limits to precision thermometry are not yet fully understood. Here, we determine a tight bound on the best possible precision with which temperature can be estimated in cold quantum systems, which accounts for limitations due to imperfect measurements. The classical picture of thermometry is that of a thermometer which is brought into thermal contact with a sample. Observing the state of the thermometer after some time conveys information about the sample temperature. A similar picture can be applied in the quantum regime, where an individual quantum probe, e.g.~a two-level system, may interact with a sample system in a thermal state, and subsequently be measured to estimate the temperature. If the probe reaches thermal equilibrium with the sample, or a non-equilibrium steady state, optimal designs of the probe and of the probe-system interaction can be determined \cite{Correa2015PRL,PhysRevA.96.062103,Mehboudi2019PRL,PhysRevLett.119.090603, Guarnieri2019,Latune2020}. Outside of the steady state regime, it was found that access to the transient probe dynamics may outperform the steady-state protocols \cite{PhysRevA.91.012331,PhysRevLett.118.130502,PhysRevA.93.053619}, that dynamical control acts as a resource \cite{Killerich2018PRA,Feyles2019PRA,Mukherjee2019}, and that thermometry can in some cases be mapped to a phase estimation problem \cite{PhysRevA.92.032112,PhysRevA.82.011611}. These findings have spurred further investigations into non-equilibrium thermometry \cite{Cavina2018PRA,PhysRevA.96.012316,Seah2019arxiv}. Any thermometric technique will be subject to constraints due to finite measurement resolution. In the probe-sample picture, the size of the probe will limit the amount of information which can be extracted about the sample. More generally, any measurement on the sample, implemented using a finite-sized apparatus, comes with a lower bound on the attainable resolution of e.g.\ the system energy spectrum \cite{Frowis2016PRL,Potts2019fundamentallimits,Guryanova2019arxiv}. Similar restrictions apply in situations where measurements can be made on only part of a large sample \cite{Pasquale2015Nature,Hovhannisyan2018PRB,PhysRevA.95.052115}, and clearly such finite-resolution constraints must play an important role in formulating fundamental bounds on the attainable thermometric sensitivity. Here, we derive a bound on the precision scaling with temperature, as the temperature approaches zero, for thermometers with finite energy resolution. Our bound applies to any thermometric technique based on measurements which do not resolve the individual energy levels of the sample energy spectrum. We furthermore demonstrate that this scaling can be attained using a single-qubit probe, showing that the bound is tight. To derive our bound, we build upon the framework for finite-resolution quantum thermometry introduced by Potts, Brask, and Brunner in \cite{Potts2019fundamentallimits}. Our results also demonstrate that thermometry with a vanishing absolute error at low temperature is possible with finite resolution, answering an interesting question left open by previous work \cite{Potts2019fundamentallimits,Hovhannisyan2018PRB,Razavian2019EPJ}. For systems with a heat capacity that vanishes at low temperatures, a property often included in the third law of thermodynamics, the relative error must diverge, regardless of the available resolution \cite{Potts2019fundamentallimits}. The absolute error may either also diverge, stay constant, or vanish, with the latter thus being the best behaviour one can hope for. However, for gapped systems, even the absolute error in any unbiased temperature estimate must diverge when the temperature becomes comparable to the gap \cite{Paris2016JPAMT}. A constant or vanishing absolute error, on the other hand, has been seen in gapless systems, when employing a measurement with a continuous outcome implying an infinite resolution~\cite{Hovhannisyan2018PRB}. Our results show that a vanishing absolute error may be obtained with a finite-resolution measurement having as little as two outcomes. This paper is organized as follows. In Sec.~\ref{sec:temperature_estimation} we introduce a general temperature estimation procedure, following \cite{Potts2019fundamentallimits}, and discuss the fundamental precision bounds imposed by the third law of thermodynamics. In Sec.~\ref{sec:scaling_bound} we propose a finite-resolution criterion, and show how this criterion leads to a tight bound on the attainable precision. In Sec.~\ref{sec:noisy_measurements} we generalize the framework to include noisy measurements, and finally in Sec.~\ref{sec:spin_boson_model} we investigate a single-qubit thermometer coupled to a bosonic bath, showing that our bound can be saturated in a physical scenario. Our analytical results are supported by numerical simulations of the temperature estimation procedure. \section{Temperature estimation} \label{sec:temperature_estimation} We consider a quantum system described by the canonical thermal state $\rho_{\beta}=\exp\left[-\beta H\right]/\mathcal{Z}_{\beta}$, with $H$ the Hamiltonian operator of the system, and $\mathcal{Z}_{\beta} \equiv \tr \left\lbrace \exp\left[-\beta H\right] \right\rbrace$ the canonical partition function. The thermal state is parameterized by an inverse temperature $\beta = 1/k_{B}T$ where $k_{B}$ is the Boltzmann constant. For convenience we adopt units in which $k_{B}=1$, such that temperature has the units of energy. The task we consider is how to estimate the temperature $T$ of the system. We remark that throughout we consider thermal states where the temperature does not itself fluctuate. However, since temperature is not directly measurable (it is not a quantum mechanical observable), there are fluctuations in any temperature estimate based on indirect measurements. \subsection{Quantifying the estimation precision} A general temperature estimation procedure consists of first performing a measurement on the system. The most general $N$-outcome measurement is represented by a positive-operator valued measure ($\text{\small{POVM}}$) with $N$ elements $\Pi_{m}$. Such $\text{\small{POVM}}$s capture any possible measurement in quantum mechanics, including scenarios in which information is obtained through a probe interacting with the system, as well as those exploiting quantum coherence \cite{Sabin2014ScientificReports,PhysRevA.91.012331,PhysRevLett.118.130502}. Each $\text{\small{POVM}}$ element $\Pi_{m}$ corresponds to a measurement outcome $m$ which is observed with probability \begin{equation} \label{eq:probability} p_{m; \beta} = \tr \left\lbrace \Pi_{m} \rho_{\beta} \right\rbrace , \end{equation} and the resulting probability distribution encodes the system temperature as a statistical parameter. The second step in estimating the temperature is to construct an estimator $T_{\text{est}}$. A general prescription for doing this does not exist \cite{Paris2009IJQI}. However, it can be shown that for any unbiased estimator the variance is lower bounded through the Cramer-Rao inequality $\delta T_{\text{est}}^{2} \geq 1/\nu \mathcal{F}_{T}$ \cite{Cramer1999}, where $\nu$ is the number of independent measurement rounds and \begin{equation} \label{eq:fisher_info} \mathcal{F}_{T} \equiv \sum_{m=1}^{N} p_{m;\beta} \left[ \partial_{T} \ln p_{m;\beta} \right]^{2}, \end{equation} is the Fisher information. We note that the Cramer-Rao inequality is asymptotically tight for Bayesian or maximum likelihood estimators \cite{Paris2009IJQI}. Throughout, motivated by the Cramer-Rao inequality, we adopt the Fisher information as the quantifier of precision. Identifying measurement strategies for which the temperature estimate can achieve minimal variance corresponds to maximizing the Fisher information over all possible measurements ($\small{\text{POVM}}$s). This results in a measurement-independent quantity, the quantum Fisher information $\mathcal{F}_{T}^{Q}$ \cite{Braunstein1994PRL} . Within the canonical ensemble, it can be shown that a projective measurement of the system energy is optimal \cite{Paris2016JPAMT,Potts2019fundamentallimits}. The quantum Fisher information is then related to the variance of the system energy \begin{equation} \label{eq:energy_variance} T^{4} \mathcal{F}^{Q}_{T} = \left\langle H^{2} \right\rangle - \left\langle H \right\rangle^{2}, \end{equation} where $\left\langle O \right\rangle=\tr \left\lbrace O \rho_{\beta} \right\rbrace$. This expression provides a fundamental upper bound on the attainable value of the Fisher information for any measurement at any temperature. As a consequence of the third law of thermodynamics, or more explicitly the assumption that the heat capacity vanishes at zero temperature, the variance of the system energy must vanish at least quadratically in temperature as absolute zero is approached \cite{Potts2019fundamentallimits}. Hence it follows that $T^{2}\mathcal{F}^{Q}_{T}$ must vanish in the low-temperature limit, and that the relative error $\delta T_{\text{est}}^{2}/T^{2}$ must diverge by virtue of the Cramer-Rao inequality. This relation constitutes the ultimate bound on the optimal low-temperature scaling behaviour of the Fisher information, applicable for any system and for any measurement strategy. \begin{figure} \begin{center} \includegraphics[width=7.5cm]{fig_concept.png} \caption{Finite measurement resolution is interpreted as an inability to sharply distinguish between consecutive system energy eigenstates and results in a non-trivial constraint on the attainable thermometric precision. For a macroscopic system with an effectively continuous energy spectrum, any measurement is subject to finite resolution and thus limited by the bound in Eq.~\eqref{eq:bound2}.} \label{fig:concept} \end{center} \end{figure} \subsection{Accounting for measurement limitations} In many settings of interest, it is not realistic to implement a projective measurement of the system energy. For instance, whenever the gaps in the energy spectrum are below the energy resolution of the available measurement \cite{Hovhannisyan2018PRB}, which happens, e.g.,\ when the system is large enough to appear continuous while the measurement apparatus has a finite size, or whenever only a finite part of the full system can be interacted with within a finite time (see Fig.~\ref{fig:concept}). Under such conditions of constrained experimental access, it is useful to introduce the $\text{\small{POVM}}$ energies \cite{Potts2019fundamentallimits} \begin{equation} \label{eq:spectrum} E_{m;\beta} \ \equiv \ \frac{1}{p_{m;\beta}}\tr \left\lbrace \Pi_{m} H \rho_{\beta} \right\rbrace , \end{equation} where $E_{m;\beta}$ may be interpreted as the best guess of the system energy before the measurement, given that outcome $m$ was observed \cite{Potts2019fundamentallimits}. In the case of projective energy measurements on the system, the $\text{\small{POVM}}$ energies coincide with the system energy eigenvalues. In general however, the $\text{\small{POVM}}$ energies are temperature dependent. For convenience we may identify a specific $\text{\small{POVM}}$ energy $E_{0;\beta}$, defined as the smallest $\text{\small{POVM}}$ energy in the low-temperature limit. We can then introduce the $\text{\small{POVM}}$ energy gaps $\Delta_{m;\beta} \equiv E_{m;\beta} - E_{0;\beta}$, which by definition are non-negative at low temperatures. In terms of these gaps, the Fisher information for a general measurement is given by \begin{equation} \label{eq:povm_variance} \mathcal{F}_{T} \ = \ \frac{\sum_{m}p_{m;\beta}\Delta_{m;\beta}^{2} - \left( \sum_{m}p_{m;\beta}\Delta_{m;\beta}\right)^{2}}{T^{4}} . \end{equation} Similarly to the quantum Fisher information, the above expression takes the form of an energy variance. However for general measurements the energy spectrum of the system is replaced by the spectrum of $\text{\small{POVM}}$ energies, and the Boltzmann probabilities associated with projective energy measurements are replaced by the $\text{\small{POVM}}$ probabilities. These changes incorporate restrictions due to limitations of the measurement on top of those imposed by the system itself. In investigating the scaling behaviour we are implicitly assuming that the Fisher information is a continuous function of temperature, which implies that the $\text{\small{POVM}}$ energy gaps $\Delta_{m;\beta}$ must also be continuous functions. Following Ref.~\cite{Potts2019fundamentallimits}, we are going to study the scaling behaviour of the Fisher information when the $\text{\small{POVM}}$ energy gaps have a well-defined power-series expansion in temperature around absolute zero \begin{equation} \label{eq:spectrum_expansion} \Delta_{m;\beta} = \Delta_{m,0} + \sum_{k=1}^{\infty} \Delta_{m,k} \beta^{-k} . \end{equation} By virtue of Weierstrass' approximation theorem, any continuous function can be approximated arbitrarily well by such a power series~\cite{Jeffreys2000}. Note that this formulation does not exclude the case of projective energy measurements as this would be described by a series with only the constant term. For more general measurements, however, the expansion might contain non-zero higher-order coefficients. Following Potts et al.~\cite{Potts2019fundamentallimits} we can make use of the relation between the $\small{\text{POVM}}$ energies and the associated probabilities (Eq. \eqref{eq:spectrum}) to write $\Delta_{m;\beta} = - \partial_{\beta} \ln p_{m;\beta}/p_{0;\beta}$. Given the power-series expansion of the $\text{\small{POVM}}$ energy gaps, we can integrate this equation and express the ratio of the probabilities for outcomes $m$ and 0 as \begin{equation} \label{eq:formal_distribution} \frac{p_{m;\beta}}{p_{0;\beta}} = g_{m} e^{-\beta \Delta_{m,0}} \beta^{-\Delta_{m,1}} \prod_{k=1}^{\infty} e^{\Delta_{m,k+1}\beta^{-k}/k} , \end{equation} where $g_{m}$ is a temperature-independent integration constant. We stress that as a consequence of how we defined $E_{0;\beta}$, the probability $p_{0;\beta}$ is the largest probability at zero temperature and must be non-vanishing in this limit. We thus obtain an expression for the probability of obtaining outcome $m$ given fully in terms of the expansion coefficients of the corresponding $\small{\text{POVM}}$ energy gap (note that the explicit dependence on $p_{0;\beta}$ could be avoided by using the fact that the full distribution must be normalised). \subsection{Low-temperature scaling behaviour} The above model of limited measurements allows us to obtain, by substituting Eqs.~\eqref{eq:spectrum_expansion} and ~\eqref{eq:formal_distribution} into Eq.~\eqref{eq:povm_variance}, an expression for the Fisher information given fully in terms of the $\small{\text{POVM}}$ energy gaps. Based on this, we can analyse the possible scaling behaviour of the Fisher information, as the system approaches zero temperature. First of all, we note that Eq.~\eqref{eq:povm_variance} can be rewritten as \begin{equation} \label{eq:fisher_low_temperatures} \mathcal{F}_{T} = \frac{1}{2 T^2}\sum_{m,n} p_{m;\beta}p_{n;\beta} \left( \beta\Delta_{m;\beta} - \beta\Delta_{n;\beta} \right)^{2} . \end{equation} Notice that all terms on the right-hand side are positive, and because of this the scaling behaviour of the Fisher information is determined by the term in the sum (or the set of terms) which vanishes least rapidly as the temperature goes to zero. We now consider the scaling that arises from different terms in Eq.~\eqref{eq:fisher_low_temperatures}. We focus on terms that result in sub-exponential scalings, referring the reader to Ref.~\cite{Potts2019fundamentallimits} for a discussion of the remaining terms. For convenience, we define the ground-state set of measurement outcomes, as those for which the probability of obtaining that outcome remains finite at zero temperature (note that the outcome $m=0$ is in the ground-state set by definition). From Eq.~\eqref{eq:formal_distribution}, we see that formally this set can be defined as $\Omega = \{m \, | \, \Delta_{m,0} = \Delta_{m,1} = 0 \}$. Now consider those terms in the Fisher information above where both outcomes belong to the ground-state set. To leading order in temperature, the contribution from these terms takes the form \begin{equation} \label{eq:gs_contribution} \frac{1}{2 T^2} \sum_{m,n \in \Omega} p_{m;\beta}p_{n;\beta} \left( \Delta_{m,j} - \Delta_{n,j} \right)^{2} T^{2(j-1)} , \end{equation} where $j$ labels the lowest order for which the expansion coefficient of any element in the ground-state set is non-zero ($j\geq 2$). These terms in the sum thus vanish at least quadratically, giving at best a constant contribution to the Fisher information. Notice that if the ground-state set contains only a single outcome ($m=0$), then the contribution is identically zero. Next we consider the terms in the Fisher information where one of the outcomes belong to the ground-state set but the other one does not. To this end, we define the set of outcomes $\tilde{\Omega} = \{m \, | \, \Delta_{m,0} = 0$ and $\Delta_{m,1} \neq 0 \}$, for which the associated probability vanish sub-exponentially as the temperature goes to zero. The set of outcomes $\tilde{\Omega}$ has an associated $\small{\text{POVM}}$ energy coinciding with that of the ground-state set at zero-temperature, but exhibits a linear degeneracy splitting at finite temperature. To leading order in temperature, the contribution from the corresponding terms is \begin{equation} \label{eq:es_contribution} \frac{1}{T^2}\sum_{m \in \tilde{\Omega} } g_{m} \Delta_{m,1}^{2} T^{\Delta_{m,1}} , \end{equation} which vanishes at a rate determined by the the first-order expansion coefficients $\Delta_{m,1}$. It is straightforward to show that all other contributions vanish exponentially in the low-temperature limit. The (sub-exponential) low-temperature behaviour of the right-hand side of the Fisher information \eqref{eq:fisher_low_temperatures}, is generally given by the sum of Eq.~\eqref{eq:gs_contribution} and Eq.~\eqref{eq:es_contribution}. Which of these two dominate depends on the smallest first-order expansion coefficient. If the set $\tilde{\Omega}$ is not empty, and at least one element in the set has a value $\Delta_{m,1}<2(j-1)$, where $j$ denotes the lowest order with non-vanishing expansion coefficient within the ground-state set, then the low-temperature behaviour of the Fisher information is captured by \begin{equation} \label{eq:fisher_omega_tilde} \mathcal{F}_{T} = \sum_{m \in \tilde{\Omega} } g_{m} \Delta_{m,1}^{2} T^{\Delta_{m,1}-2} . \end{equation} In principle the first-order coefficient can take any positive value without violating the scaling bound imposed by the third law of thermodynamics (ensuring divergence of the relative error). Notice that even a divergent low-temperature behaviour of the Fisher information can in principle be realised, if $\Delta_{m,1}$ can take a value smaller than 2. \section{Scaling bound for large systems} \label{sec:scaling_bound} In this section, we propose a finite-resolution criterion characterizing realistic measurements. We aim to capture any situation in which the available measurements cannot resolve the individual gaps in the system energy spectrum, which therefore appears continuous. Below, we make this statement precise. We then go on to show how this criterion leads to a lower bound on the first-order coefficient $\Delta_{m,1}$, constraining the low-temperature scaling of the error in any temperature estimation scheme. Furthermore we present an example of a measurement saturating the finite-resolution bound, showing that the bound is tight. \subsection{Finite-resolution criterion} In the regime where the system has an effectively continuous energy spectrum (as the measurement only resolves energy differences much larger than the gaps in the spectrum, it is convenient to work with the system density of states $\mathcal{D}(\epsilon) \equiv \sum_{k} d_{k} \delta(\epsilon-\epsilon_k)$, where the sum is over distinct system energy eigenvalues and $d_{k}$ is the corresponding degeneracy. Throughout, we adopt the convention that the smallest system energy eigenvalue is set to zero ($\epsilon_{0} = 0$). Now, we introduce a filtered density of states $\mathcal{D}_{m}$ for each measurement outcome $m$, as the system density of states filtered through the corresponding $\small{\text{POVM}}$ element \begin{equation} \mathcal{D}_{m}(\epsilon) \equiv \sum_{k} d_{k} \delta(\epsilon-\epsilon_{k}) \tr \left[ \Pi_{m} \frac{\mathbbm{1}_{\epsilon_{k}}}{d_{k}} \right] , \end{equation} where $\mathbbm{1}_{\epsilon_{k}}$ is the projection operator onto the eigenspace with energy $\epsilon_{k}$. Notice that the sum of all the filtered densities of states adds up to the total density of states. Furthermore, we introduce the continuous filter function $f_{m}(\epsilon)$, formally defined by the values $f_{m}(\epsilon_{k})= \tr \left[ \Pi_{m} \mathbbm{1}_{\epsilon_{k}}/d_{k} \right]$ and the straight-line segments connecting these values. In addition we note that the density of states can be expressed as the rate of change of the number of states with energy below $\epsilon$ $\sigma(\epsilon) = \sum_{k} d_{k} \theta(\epsilon-\epsilon_{k})$, where $\theta$ denotes the Heaviside step function. Given these, the filtered density of states decompose into the product \begin{equation} \mathcal{D}_{m}(\epsilon) = f_{m}(\epsilon) \frac{d\sigma(\epsilon)}{d\epsilon} , \end{equation} where the filter function fully characterizes the implemented measurement. Importantly we notice that the function $\sigma(\epsilon)$ is non-decreasing for all energies. If we compute the Laplace transform in $\beta$ of the filtered density of states, the result takes the form of a Stieltjes integral over a measure given by $\sigma(\epsilon)$ \cite{Ballentine2014} \begin{equation} \label{eq:dmproba} \hat{\mathcal{D}}_{m}(\beta) \equiv \int_{0}^{\infty} d\sigma(\epsilon) f_{m}(\epsilon) e^{-\beta \epsilon} = \mathcal{Z}_{\beta}p_{m;\beta} . \end{equation} The last equality can be obtained directly from equation~\eqref{eq:probability}, and relates the Laplace transformed filtered density of states to the product of the probability and the canonical partition function. Notice that the measure $\sigma(\epsilon)$ is a discontinuous function of energy. For macroscopic systems the measure can often be approximated by an effective continuous measure, when $\sigma(\epsilon)$ and $f_{m}(\epsilon)$ vary on widely separated energy scales. To see this, we first define the averaged measure with respect to an energy window $\omega$ by \begin{equation} \sigma_{\omega}(\epsilon) = \theta(\epsilon) \frac{1}{\omega} \int_{\epsilon-\omega/2}^{\epsilon+\omega/2} ds \sigma(s) , \end{equation} which for non-zero $\omega$ is a continuous function of energy except at $\epsilon = 0$, and which tends to a differentiable function of energy as $\omega$ is increased. The inclusion of the step function at zero energy is important if we are to capture the zero temperature limit correctly, since it ensures that the ground-state of the averaged model coincides with that of the exact model. For the purposes of low-temperature thermometry only the low-energy behaviour is of importance, and to leading order in energy we adopt an effective measure given by \begin{equation} d\sigma_{\omega}(\epsilon) = \left[ d_{0;\omega} \delta(\epsilon) + \alpha_{\omega} \gamma_{\omega} \epsilon^{\gamma_{\omega}-1} + \mathcal{O}(\epsilon^{\gamma_{\omega}}) \right] d\epsilon, \end{equation} where $d_{0;\omega}$ is an effective ground-state degeneracy and $\alpha_{\omega}$,$\gamma_{\omega}$ are positive, real-valued constants. The coefficient $\gamma_{\omega}>0$ characterizes the low-energy growth in the total number of states with energy less than $\epsilon$. If we compute the Laplace transform with respect to this averaged measure (which now takes the form of a standard Riemann integral) we obtain to leading order in energy \begin{equation} \label{eq:continous_Dm} \begin{aligned} \hat{\mathcal{D}}_{m;\omega}(\beta) = \ & d_{0;\omega}f_{m}(0) \\ & + \alpha_{\omega} \gamma_{\omega} \int_{0}^{\infty} d\epsilon \epsilon^{\gamma_{\omega}-1} f_{m}(\epsilon) e^{-\beta \epsilon} . \end{aligned} \end{equation} The averaged measure tends to overestimate the number of low-energy states as $\omega$ is increased, however this effect becomes negligible in the limit $\omega\ll T$. Now if we assume that $f_{m}(\epsilon)$ does not vary significantly across an energy range $\omega$, then $\hat{\mathcal{D}}_{m}(\beta)$ is well approximated by the averaged function $\hat{\mathcal{D}}_{m;\omega}(\beta)$. More quantitatively we can state this condition in the form of an inequality \begin{equation} \label{eq:discrete_criterion} \frac{ \mid f_{m}(\epsilon+\omega) - f_{m}(\epsilon)\mid }{\omega} \ll \frac{1}{\omega} , \end{equation} which bounds the rate of change of the filter function with energy. For macroscopic systems we can take the limit $\omega \rightarrow 0$, and in this case we are going to adopt the following \textit{finite-resolution criterion (FRC)}: \\ \begin{quote} \textbf{FRC:} \textit{In the limit of a macroscopic system, the filter function $f_{m}(\epsilon)$ tends to a continuous, right-differentiable function of the system energy.} \end{quote} This is nothing more than a restatement of equation~\eqref{eq:discrete_criterion} for vanishing $\omega$, which restricts the rate of change of the filter function to a finite value. We note that at $\epsilon=0$, the filter function may be discontinuous and Eq.~\eqref{eq:discrete_criterion} tends to the right derivative for $\omega\rightarrow0$. \subsection{Finite-resolution bound} Having characterized what we mean by a finite-resolution measurement, we ask what the consequences of our finite-resolution criterion are for the behaviour of the $\small{\text{POVM}}$ energy gaps in the macroscopic limit. By making use of equation~\eqref{eq:formal_distribution}, we obtain the relation (we now drop the dependence on the energy window $\omega$ and write simply $d_{0}$,$\alpha$ and $\gamma$) \begin{equation} \label{eq:povm_dos_laplace} \hat{\mathcal{D}}_{m}(\beta) = \hat{G}_{m}(\beta) \hat{\mathcal{D}}_{0}(\beta) , \end{equation} where for convenience we have defined the transfer function \begin{equation} \hat{G}_{m}(\beta) \equiv g_{m} e^{-\beta \Delta_{m,0}} \beta^{-\Delta_{m,1}} \prod_{k=1}^{\infty} e^{\Delta_{m,k+1}\beta^{-k}/k} . \end{equation} Now this is a relation at the level of the Laplace-transformed, filtered densities of states. We can obtain a relationship directly between the filtered densities of states by taking the inverse Laplace transform of both sides of Eq.~\eqref{eq:povm_dos_laplace}. By applying the Laplace convolution theorem \cite{Arfken2013,Cahill2013}, we derive the relation \begin{equation} \label{eq:relation_Dm} \mathcal{D}_{m}(\epsilon) = \int_{0}^{\epsilon}ds \ G_{m}(\epsilon-s) \mathcal{D}_{0}(s) . \end{equation} We now focus on the specific case of $m \in \tilde{\Omega}$. For these outcomes, the inverse Laplace transform can be computed straightforwardly, and to leading order in energy we obtain \begin{equation} \label{eq:Gm_defapp} G_{m}(\epsilon) = \frac{g_m}{\Gamma(\Delta_{m,1})} \epsilon^{\Delta_{m,1}-1} + \mathcal{O}(\epsilon^{\Delta_{m,1}}), \end{equation} where $\Gamma(\Delta_{m,1})$ denotes the Gamma function \cite{Arfken2013}. As we saw in the preceding section, the outcomes within $\tilde{\Omega}$ are exactly the ones with potential to provide optimal low-temperature scaling of the Fisher information. Recall, that the reference outcome $m=0$, was chosen such that the associated probability approaches a constant value at zero temperature. This implies that the overlap of the $\small{\text{POVM}}$ element $\Pi_{0}$ with the system ground state is non-zero, and therefore $f_{0}(0)$ is non-zero. On the other hand for outcomes $m \in \tilde{\Omega}$ the probability vanishes in the low-temperature limit, implying a vanishing overlap $f_{m}(0)=0$. Hence in this case we find from equations~\eqref{eq:continous_Dm} and \eqref{eq:relation_Dm} that to leading order in energy \begin{equation} \label{eq:filter_low_energy} f_{m}(\epsilon) = \frac{g_{m}d_{0}f_{0}(0)}{\alpha \gamma \Gamma(\Delta_{m,1})} \ \epsilon^{\Delta_{m,1}-\gamma} + \mathcal{O}(\epsilon^{\Delta_{m,1}+1-\gamma}) . \end{equation} Based on this expression we can infer constraints on the linear coefficient. First, the requirement that $f_{m}(0) = 0$ gives the weakest constraint $\Delta_{m,1}>\gamma$. This simply expresses the fact that the Fisher information is upper bounded by the the quantum Fisher information, which scales as $T^{\gamma -2}$ for a density of states scaling as $\epsilon^{\gamma -1}$. Further, the finite-resolution criterion restricts the rate of change to be bounded, $\frac{d}{d\epsilon}f_m(\epsilon) < \infty$. This implies a tightened scaling bound \begin{equation} \Delta_{m,1}\geq 1+\gamma, \ \ \ \text{for} \ \ m \in \tilde{\Omega}. \end{equation} Since $\gamma>0$ by definition, this implies that the Fisher information must grow slower than $1/T$, i.e., \begin{equation} \label{eq:bound} \lim_{T\rightarrow 0}T\mathcal{F}_T = 0. \end{equation} Further note that a diverging Fisher information in the low-temperature limit can only be realized through a $\sigma(\epsilon)$ that grows sub-linearly with energy, i.e., $\gamma<1$. As an example of a system exhibiting such a sub-linear growth we mention systems of massive non-interacting particles at zero chemical potential \cite{Potts2019fundamentallimits}. For such systems $\gamma = 1/2$ for one-dimensional geometries. By virtue of the Cramer-Rao bound, Eq.~\eqref{eq:bound} implies that the absolute error (squared) must vanish more slowly than $T$ \begin{equation} \label{eq:bound2} \lim_{T\rightarrow 0} \frac{\delta T^2_{\rm est}}{T} = \infty. \end{equation} The equivalent Eqs.~\eqref{eq:bound} and \eqref{eq:bound2} constitute the main result of our paper. They imply that for an effectively continuous spectrum, the low-temperature scaling of the precision is not only bounded by the third law, which demands a diverging relative error, but by a tighter bound. Interestingly, our bound still allows for a vanishing absolute error, a scenario that can be physically realized as illustrated below. \subsection{Proving tightness of bound} \label{sec:exp-res-meas} We now illustrate that the proposed finite-resolution bound is tight. Consider a binary measurement which resolves the system ground state exponentially well in the sense that it has $\small{\text{POVM}}$ elements \begin{equation} \Pi_{0} = e^{-\kappa {H}} , \ \ \ \ \Pi_{1} = \mathbbm{1} - e^{-\kappa {H}} , \end{equation} where $\kappa > 0$. Note that the overlap of $\Pi_0$ with the system energy eigenstates decays exponentially away from zero. This feature makes is straightforward to write down the filtered density of states. Focusing on $m=1$ we find \begin{equation} \mathcal{D}_{1}(\epsilon) = \left[1-e^{-\kappa \epsilon} \right] \mathcal{D}(\epsilon) , \end{equation} where nothing has been assumed about the form of the system density of states. We thus see that the corresponding filter function takes the form $f_{1}(\epsilon) = \kappa \epsilon + \mathcal{O}(\epsilon^{2})$ to leading order in energy. If we adopt the density of states introduced in the preceding subsection, that is $\mathcal{D}(\epsilon) = d_{0}\delta(\epsilon) + \alpha \gamma \epsilon^{\gamma - 1} + \mathcal{O}(\epsilon^{\gamma})$, then upon comparison with equation~\eqref{eq:filter_low_energy} we find $\Delta_{1,1}=1+\gamma$. Hence the binary exponential resolution measurement saturates the finite-resolution bound. For good measure we now show how the same conclusion can be derived directly from the probabilities. The probability of obtaining outcome $m=0$ can be written in terms of the system partition function as \begin{equation} p_{0;\beta} = \mathcal{Z}_{\kappa + \beta} \mathcal{Z}_{\beta}^{-1} . \end{equation} Substituting the probabilities $p_{0;\beta}$ and $p_{1;\beta}=1-p_{0;\beta}$ into the general form of the Fisher information (Eq.~\ref{eq:fisher_info}), one finds that \begin{equation} T^{4}\mathcal{F}_{T} = \frac{\mathcal{Z}_{\kappa+\beta}}{\mathcal{Z}_{\beta}-Z_{\kappa+\beta}} \left( \left\langle H \right\rangle_{\beta} - \left\langle H \right\rangle_{\kappa+\beta} \right)^{2} . \end{equation} The partition function is given by the Laplace transform of the density of states, hence we find $\mathcal{Z}_{\beta} = d_{0} \exp \left( \alpha \gamma \Gamma(\gamma) \beta^{-\gamma}/d_{0} \right)$ (in \appref{app:bosonDOS} we show how this form of the partition function describes a system of non-interacting bosonic modes). From this form of the partition function we can derive the low-temperature behaviour of the average energy \begin{equation} \left\langle H \right\rangle_{\beta} = \frac{\alpha \gamma^{2} \Gamma(\gamma)}{d_{0}} \beta^{-(1+\gamma)} . \end{equation} If we substitute these into the above Fisher information, we find that to leading order in temperature (assuming that $\kappa/\beta \ll 1$) \begin{equation} \label{eq:fisher_exp} \mathcal{F}_{T} = \alpha \kappa \gamma^{2} \Gamma(\gamma) (1+\gamma)^{2} T^{\gamma-1} + \mathcal{O}(T^{2\gamma}), \end{equation} which takes the form of Eq.~\eqref{eq:fisher_omega_tilde} with $\Delta_{1,1} = 1+\gamma$ and $g_{1} = \alpha \kappa \gamma^{2} \Gamma(\gamma)$. Since $\gamma$ can in principle take any positive value, the exponential-resolution measurement saturates the finite-resolution bound and asymptotically attains a Fisher information scaling as $1/T$ in the limit $\gamma\rightarrow 0$. \section{Generalization to noisy measurements} \label{sec:noisy_measurements} In this section we extend the thermometry framework above to include noisy measurements. As the framework is general, one might ask if noise effects are not already accounted for. The answer is that in principle noise effects are described. However, for some noisy measurements, the $\small{\text{POVM}}$ energy gap does not have a Taylor expansion. While one may still approximate the energy gap by a polynomial, a physically appealing extension of the formalism allows for circumventing this approximation. We find that our bound given in Eq.~\eqref{eq:bound2} also holds for noisy measurements. \subsection{Noisy temperature measurements} To model noisy measurements, we consider the case where the observed outcomes $m$ correspond to coarse graining over a fine-grained $\small{\text{POVM}}$ with elements $\Pi_{m\mu}$. The probability of observing $m$ is then \begin{equation} p_{m;\beta} = \sum_{\mu} p_{m\mu;\beta} = \sum_{\mu} \tr \left\lbrace \Pi_{m\mu} \rho_{\beta} \right\rbrace . \end{equation} Physically this could correspond to a measurement implemented using a sensor, where only a subset of the sensor degrees of freedom (or a subspace of the full sensor Hilbert space) is experimentally accessible. If we were to compute the Fisher information directly using the fine-grained distribution $p_{m\mu}$, we recover the noiseless results, and obtain an upper bound on the Fisher information computed from the coarse-grained distribution. This fact follows directly from the relation between the relative entropy of two probability distributions differing by an infinitesimal temperature $\delta T$ and the Fisher information \begin{equation} \begin{aligned} D\left( p_{T} \vert \vert p_{T+\delta T}\right) = \mathcal{F}_{T} \delta T^{2} \ \ \ \text{as} \ \ \ \delta T \rightarrow 0 . \end{aligned} \end{equation} Since the relative entropy is monotonically decreasing under coarse-graining \cite{Wilde2017}, we conclude that noise always reduces the Fisher information. The question we now address is, how it impacts the attainable scaling with temperature. Following the approach developed above, we introduce the fine-grained $\small{\text{POVM}}$ energies \begin{equation} \label{eq:fine_grained_povm_energy} E_{m\mu;\beta} \equiv \frac{1}{p_{m\mu;\beta}} \tr \left\lbrace \Pi_{m\mu} \rho_{\beta} \right\rbrace , \end{equation} which may be interpreted as the best guess of the system energy before the measurement, given the outcome $(m,\mu)$ \cite{Potts2019fundamentallimits}. For convenience we identify the smallest $\small{\text{POVM}}$ energy in the low-temperature limit with the outcome $E_{00;\beta}$, and then define the fine-grained $\small{\text{POVM}}$ energy gap $\Delta_{m\mu;\beta} \equiv E_{m\mu;\beta} - E_{00;\beta}$, which by definition is non-negative at low temperatures. Modelling the fine-grained $\small{\text{POVM}}$ energy gaps by a power-series expansion around zero temperature as in Eq.~\eqref{eq:spectrum_expansion}, we are led to a probability distribution identical to \eqref{eq:formal_distribution}, but with $m$ replaced by the compound index $m\mu$. Since the Fisher information is not defined with respect to the fine-grained probabilities, but rather with respect to the coarse-grained probabilities, the relevant energies are the coarse-grained $\small{\text{POVM}}$ energy gaps defined by \begin{equation} \label{eq:gap_cg} \Delta_{m;\beta}^{(c)} \equiv \sum_{\mu} \frac{p_{m\mu;\beta}}{p_{m;\beta}} \Delta_{m\mu;\beta} . \end{equation} In terms of these, the Fisher information can be written in the same form as the fine-grained Fisher information of Eq.~\eqref{eq:fisher_low_temperatures}, but with the fine-grained probability and the fine-grained $\small{\text{POVM}}$ energy gaps replaced by their coarse-grained versions \begin{equation} \label{eq:coarse_fisher_info} \mathcal{F}_{T} = \frac{1}{2 T^2} \sum_{m,n} p_{m;\beta}p_{n;\beta} \left( \beta \Delta^{(c)}_{m;\beta} - \beta \Delta^{(c)}_{n;\beta} \right)^{2} . \end{equation} Notice that all terms in the sum are positive. Hence, the scaling behaviour of the Fisher information is determined by the term (or set of terms) which vanishes least rapidly as the temperature approaches zero. From Eq. \eqref{eq:gap_cg}, we can anticipate that fine-grained energy gaps that have a Taylor expansion may result in coarse-grained gaps that do not. This may result in qualitatively different behaviour of the fine- and coarse-grained Fisher information. In particular, noise may render the scaling of the Fisher information worse. In appendix \ref{app:noise} we discuss in general terms how noise impacts the attainable Fisher information scaling. In particular, we show that the noise can never result in a better scaling for the Fisher information, implying that the bound given in Eq.~\eqref{eq:bound2} also holds for noisy measurements. Here we illustrate the effect of noise with an example. \begin{figure} \begin{center} \includegraphics[width=8.5cm]{fig_povm_dos.png} \caption{Illustration of filtered density of state for a noisy binary exponential resolution measurement using $\mathcal{D}(\epsilon) = \mathcal{L}^{-1}\left[ \exp \left( \alpha \beta^{-1} \right)\right]$ (dotted red line) with $\alpha=0.2$. (a) The white noise measurement corresponds to swapping the observed measurement outcomes with some probability, such that each coarse-grained outcome has contributions both from elements within and elements not within the ground-state set. The dashed green lines gives $\mathcal{D}_{00}$ and $\mathcal{D}_{01}$ (their sum is shown with the solid green line), and the blue dashed-dotted lines correspond to elements $\mathcal{D}_{10}$ and $\mathcal{D}_{11}$ (with their sum given by the solid blue line). (b) In \appref{app:noise} we show that an alternative noise model consists of a mixing of several similar measurement outcomes. In the specific case depicted here, the fine-grained outcomes to be summed are almost identical except for projecting onto slightly different energy distributions.} \label{fig:povm_dos} \end{center} \end{figure} \subsection{Illustration of noisy measurement} \label{sec:noisy_measurements_example} A simple example illustrating noise is obtained by adding white noise to the binary, exponential-resolution measurement of \secref{sec:exp-res-meas}. That is, we study a binary $\small{\text{POVM}}$ defined by $\Pi_{0} = \eta \exp\left(-\kappa H\right) + (1-\eta)\mathbbm{1}/2$. To understand how this noise model arises from coarse graining a fine-grained measurement, we consider the fine-grained $\small{\text{POVM}}$ \begin{equation} \label{eq:exppovmfine} \begin{aligned} &\Pi_{00} = \frac{1+\eta}{2} e^{-\kappa H} , \ \ \ \ \Pi_{01} = \frac{1-\eta}{2} \left( \mathbbm{1} - e^{-\kappa H}\right), \\ &\Pi_{10} = \frac{1+\eta}{2} \left( \mathbbm{1} - e^{-\kappa H}\right) , \ \ \ \ \Pi_{11} = \frac{1-\eta}{2}e^{-\kappa H}, \end{aligned} \end{equation} such that $\Pi_{0}=\Pi_{00}+\Pi_{01}$ and $\Pi_{1}=\Pi_{10}+\Pi_{11}$. As in the noiseless case, we suppose that the average energy exhibits a power-law behaviour $\left\langle H \right\rangle_{\beta} = \alpha \beta^{-(1+\gamma)}$ at low temperatures in the macroscopic limit, with $\alpha$ and $\gamma$ both positive. The corresponding partition function (at low temperatures) is then $\mathcal{Z}_{\beta} = \exp \left( \alpha \beta^{-\gamma}/\gamma \right)$. For the fine-grained measurement outcomes, we find that to leading order in temperature (assuming that $\kappa/\beta \ll 1$ and $\eta<1$), the $\small{\text{POVM}}$ energy gaps with respect to the reference $E_{00;\beta}$, take the form \begin{equation} \begin{aligned} & \Delta_{00;\beta} = \Delta_{11;\beta} = 0 , \\ & \Delta_{10;\beta} = \Delta_{01;\beta} = (1+\gamma)T + \mathcal{O}(T^{2+\gamma}) . \end{aligned} \end{equation} We see that the fine-grained measurement outcomes have an associated set of $\small{\text{POVM}}$ energy gaps that have a Taylor series in the low-temperature limit. Furthermore, they exhibit a linear degeneracy splitting. It then follows from Eq.~\eqref{eq:fisher_omega_tilde} that the Fisher information takes the form \begin{equation} \mathcal{F}_{T} = \alpha \kappa (1+\gamma)^{2} T^{\gamma-1} + \mathcal{O}(T^{2\gamma}) , \end{equation} which is equivalent to the noiseless form found above [cf.~Eq.~\eqref{eq:fisher_exp}]. Notice that when having access to the fine-grained distribution, both the $\small{\text{POVM}}$ energies and the resulting Fisher information is independent of the parameter $\eta$ quantifying the amount of white noise. The picture changes when considering the coarse-grained energy gap (Eq.~\eqref{eq:gap_cg}). To leading order in temperature this is given by \begin{equation} \Delta_{1;\beta}^{(c)} = \frac{1+\eta}{1-\eta} \alpha \kappa (1+\gamma) T^{2+\gamma} + \mathcal{O}(T^{3+2\gamma}). \end{equation} Notice that in contrast to the fine-grained energy gaps, this coarse-grained gap does not have a Taylor expansion. Computing the Fisher information over the coarse-grained gaps and probabilities (making use of Eq.~\eqref{eq:coarse_fisher_info}) gives \begin{equation} \mathcal{F}_{T} = \frac{4\eta^{2}}{1-\eta^{2}}\left(\alpha \kappa(1+\gamma)\right)^{2} T^{2\gamma} + \mathcal{O}(T^{1+3\gamma}). \end{equation} This example thus illustrates how noise can result in a coarse-grained gap that has no Taylor expansion and how this may result in a different (worse) scaling for the Fisher information at low-temperatures. Qualitatively we can understand the altered scaling by studying the coarse-grained filtered density of states. For the example considered here we have \begin{equation} \begin{aligned} & \mathcal{D}_{00}(\epsilon)= f_{00}(\epsilon)\mathcal{D}(\epsilon) = \frac{1+\eta}{2} e^{- \kappa \epsilon} \mathcal{D}(\epsilon) , \\ & \mathcal{D}_{01}(\epsilon)= f_{01}(\epsilon)\mathcal{D}(\epsilon) = \frac{1-\eta}{2} \left( 1- e^{- \kappa \epsilon}\right) \mathcal{D}(\epsilon) , \end{aligned} \end{equation} and under coarse-graining these are added together. Notice that whereas the filter function $f_{01}(\epsilon)$ goes to zero as $\epsilon \rightarrow 0$, this is not true of $f_{00}(\epsilon) + f_{01}(\epsilon)$ (the same feature is found for the $m=1$ outcomes). Hence in this case the noise removes outcomes from the set $\tilde{\Omega}$, resulting in the worse scaling (note that a vanishing filter function at $\epsilon=0$ implies a vanishing probability at $T=0$ and vice versa, cf.~Eq.~\eqref{eq:dmproba}). This effect is illustrated in Fig.\ref{fig:povm_dos}a. In \appref{app:noise} we study an alternative noise model. In this model each coarse-grained outcome can be seen as the sum of several similar (in the sense of preparing similar energy distributions) fine-grained outcomes. This is illustrated in Fig.\ref{fig:povm_dos}b. The noisy framework put forward here shows that our finite-resolution bound, as well as the results of Ref.~\cite{Potts2019fundamentallimits} apply for any $\small{\text{POVM}}$ that can be written as a coarse graining over a fine-grained $\small{\text{POVM}}$ which has a spectrum with a well defined Taylor series. As the coarse-grained $\small{\text{POVM}}$ itself may not have a spectrum with a well defined Taylor series, this extends the applicability of the results of Ref.~\cite{Potts2019fundamentallimits} (as long as we do not want to rely on approximate Taylor series in the spirit of the Weierstrass theorem). \section{Single-qubit probe} \label{sec:spin_boson_model} \subsection{Measurement protocol} We now illustrate our results by considering temperature estimation of a system of non-interacting bosons using a single qubit as a probe. The system is described by a spectrum of single-particle energies $\omega_{k}$ (we take $\hbar = 1$). Consider the following measurement strategy: (i) first we initialise the probe qubit in its ground state $\ket{0}$, (ii) then an interaction is turned on between the probe and the system for a short time $t$, and (iii) we perform a projective measurement of the qubit energy. Given this protocol, the probability of finding the qubit in the excited state $\ket{1}$ is \begin{equation} \label{eq:qubit_p1} p_{1;\beta} = \tr \left\lbrace \bra{0}U^{\dagger}_{t}\ket{1} \! \bra{1}U_{t}\ket{0} \rho_{\beta}\right\rbrace . \end{equation} We take the time-evolution operator $U_{t}$ to be generated by a time-independent Hamiltonian \begin{equation} H = \sum_{k} \omega_{k} a_{k}^{\dagger}a_{k} + \frac{\Omega}{2} \sigma_{z} + H_{\text{int}} , \end{equation} where $a_{k}^{\dagger},a_{k}$ denotes the bosonic creation and annihilation operators. The probe qubit is characterised by the three Pauli operators $\left\lbrace \sigma_{x},\sigma_{y},\sigma_{z} \right\rbrace$, and we take the probe energy to be proportional to the $\sigma_{z}$ operator. Computing the outcome probabilities requires specifying an interaction Hamiltonian and determining the resulting dynamics. This task is complicated by the fact that the low-temperature and short-time regime is generally not accessible via standard Markovian master equations \cite{Vega2017RMP,Mehboudi2019PRL}. However, if the interaction time is sufficiently short we can make analytical progress by approximating the probability up to second order in $t$. In this case we find that \begin{equation} \label{eq:prob_approx} p_{1;\beta} = t^{2} \tr \left\lbrace \bra{0}H_{\text{int}}\ket{1} \! \bra{1}H_{\text{int}}\ket{0} \rho_{\beta} \right\rbrace + \mathcal{O}(t^{4}). \end{equation} We consider a linear interaction Hamiltonian consisting of an excitation-preserving part and a non-excitation-preserving part. Introducing the raising and lowering operators $\sigma_\pm = \frac{1}{2}(\sigma_x \pm i \sigma_y)$ for the probe qubit, the interaction Hamiltonian takes the form \begin{equation} \begin{aligned} H_{\text{int}} = & \sum_{k} g_{k} \left[ \sigma_+ a_{k} + \sigma_- a_{k}^{\dagger} \right] \\ & + \sum_{k} \lambda_{k} \left[ \sigma_- a_{k} + \sigma_+ a_{k}^{\dagger} \right] , \end{aligned} \end{equation} where $\left\lbrace g_{k}, \lambda_{k} \right\rbrace$ are real-valued coupling coefficients. In the limit of a macroscopic system, these coupling coefficients are taken to approach continuous functions. Physically this means that the interaction cannot selectively probe an individual system mode (ensuring that the finite resolution criterion is satisfied). Given $H_{\text{int}}$, it becomes straightforward to show from Eq.~\eqref{eq:prob_approx} that the excited-state probability at short times takes the form \begin{equation} \label{eq:pexcited} \begin{aligned} p_{1;\beta} = \ t^{2} \sum_{k} \left( g_{k}^{2} + \lambda_{k}^{2} \right) n_{\beta}(\omega_{k}) + t^{2} \sum_{k} \lambda_{k}^{2}, \end{aligned} \end{equation} where $n_{\beta}(\omega_{k})$ denotes the Bose-Einstein distribution. We see that the probability consists of two contributions: a temperature-dependent term, in which the probability is directly related to the occupation of the bath modes, and a temperature-independent term. The presence of the temperature-independent term means that the probability of finding the probe qubit in the excited state is generally non-zero even at arbitrarily low temperatures. As in the example in Sec.~\ref{sec:noisy_measurements_example}, this prevents a scaling of the form of Eq.~\eqref{eq:fisher_omega_tilde} and can be captured by our framework for noisy thermometry. \subsection{Excitation-preserving interaction} We now focus on the excitation-preserving case ($\lambda_{k}=0$), and consider an interaction characterised by a continuous spectral density of the form \begin{equation} \label{eq:spectraldens} \rho(\omega) = \sum_{k} g_{k}^{2} \delta(\omega-\omega_{k}) = 2 \alpha \omega_{c}^{1-s}\omega^{s} e^{-\omega/\omega_{c}} , \end{equation} where $\alpha$ is the dissipation strength, $s$ is the ohmicity and $\omega_{c}$ is the cutoff energy \cite{BreuerPetruccione2002,Carmichael2003,Weiss2012,Vega2017RMP}. The sum in the excited-state probability \eqref{eq:pexcited} is then replaced by an integral, which can be solved analytically. In the low-temperature limit we find \begin{equation} p_{1;\beta} = 2 \alpha \left( \omega_{c} t\right)^{2} \Gamma(1+s) \left(\frac{T}{\omega_{c}}\right)^{1+s} + \mathcal{O}(T^{2+s}). \end{equation} We see that this protocol gives a probability vanishing sub-exponentially as the temperature goes to zero, and comparing with the general expression Eq.~\eqref{eq:formal_distribution}, we see that to lowest order, the $\small{\text{POVM}}$ gap scales as $\Delta_{1}=\left(1+s\right)T$. The case of an excitation-preserving interaction can thus (for short time at least) be described within our noiseless thermometry framework. From the value of the linear expansion coefficient, $\Delta_{1,1} = 1 + s$, it follows that for ohmicity approaching zero, the finite-resolution bound $\Delta_{1,1} \geq 1$ is approached. The corresponding Fisher information scales as $\mathcal{F}_{T} \propto T^{s-1}$ and thus diverges for sub-Ohmic baths in the low-temperature limit. This serves as an illustration that the finite-resolution bound is in principle attainable via an excitation-preserving interaction in the short-time limit, and thus the bound is tight. Realising such an excitation-preserving interaction may however be challenging. \begin{figure} \begin{center} \includegraphics[width=8.0cm]{figure.png} \caption{Numerically computed Fisher information for (a) the sub-Ohmic $(s=1/2)$, and (b) the Ohmic $(s=1)$ spin-boson model, with $\delta t = 0.1/\Omega$, $\alpha=0.1$ and $\omega_{c} = 10 \Omega$. The solid black lines display the short-time analytical results at time $\Omega t = 0.2$, showing good agreement with the numerical simulations. In case (b) the simulations exhibit a quadratic temperature scaling at low temperatures, while in case (a) a linear scaling is obtained. The solid grey line gives the Fisher information obtained from the steady state of a secular Born-Markov master equation, which scales exponentially at low temperatures \cite{Potts2019fundamentallimits}.} \label{fig:FI_sbm} \end{center} \end{figure} \subsection{Excitation-non-preserving interaction} We now turn to the arguably more realistic excitation non-preserving case. The case $\lambda_{k}=g_{k}$ corresponds to the well-known spin-boson model \cite{PhysRevLett.97.016802,BreuerPetruccione2002,Weiss2012,Carmichael2003}. Adopting the same spectral density as above, the excited-state probability in this case takes the form \begin{equation} \label{eq:p1nonpres} \begin{aligned} p_{1;\beta} = \ & 4 \alpha \left( \omega_{c} t\right)^{2} \Gamma(1+s) \left(\frac{T}{\omega_{c}}\right)^{1+s} \\ & + 2 \alpha \left( \omega_{c} t\right)^{2} \Gamma(1+s) + \mathcal{O}(T^{2+s}) . \end{aligned} \end{equation} In contrast to the excitation-preserving case, this probability does not in general correspond to the noiseless version of Eq.~\eqref{eq:formal_distribution} since the $\small{\text{POVM}}$ energy gap $\Delta_1\propto T^{s+2}$, does not have a Taylor expansion for arbitrary $s$ at low temperatures. However, as shown in \appref{app:noisy_sbm}, this scenario can be described using a fine-grained POVM with energy gaps that do have a Taylor expansion. Therefore, the scenario is captured by the noisy framework. Given the probability \eqref{eq:p1nonpres}, a short calculation shows that the Fisher information has a low-temperature scaling given by $\mathcal{F}_{T} \propto T^{2s}$. Again, this is in full agreement with the general noisy theory developed above. Within the spin-boson model, the Fisher information thus vanishes quadratically for an Ohmic spectral density with $s=1$, and linearly for a sub-Ohmic spectral density with $s=1/2$. To corroborate the analytical results based on the short-time approximation, we turn to a numerical simulation of the Fisher information for the spin-boson model. To perform the simulations we made use of the recently developed tensor-network TEMPO algorithm and its extension to multi-time measurement scenarios \cite{Strathearn2018NC,Jorgensen2019arxiv}. Details of the simulations are provided in \appref{app:tensor}. Making use of this algorithm has the benefit that the temperature derivative of the excited state can itself be expressed as a tensor network and computed to the same level of accuracy as the probability itself. Results for the Ohmic and the sub-Ohmic cases are shown in Fig.~\ref{fig:FI_sbm}. Generally we find that the short-time approximation provides a good description of the observed scaling behaviour at sufficiently short times. Even more interesting we note that the scaling behaviour predicted within the short-time approximation is valid even at times well beyond the regime in which the short-time approximation is expected to hold ($\alpha \delta t^{2} \Gamma(1+s) \omega_{c}^{2} \ll 1$). This indicates that the predicted precision scaling is experimentally relevant, even without the requirement of being able to probe the non-equilibrium qubit dynamics at very short-times. Notice that the low-temperature Fisher information tends to initially increase with time as information about the environment state is extracted by the qubit. After some time the low-temperature Fisher information starts to decrease. This can be understood as the qubit reaching a stationary state, such that a one-time measurement performed on the qubit can no longer probe the relaxation dynamics induced by the coupling with the thermal bath (see also \cite{Correa2015PRL,Mehboudi2019}). Finally, we note that at sufficiently low temperatures the simulated Fisher information differs from the Markovian result, even for the rather weak coupling and long times considered here. A similar effect was observed in the context of temperature estimation via the Kubo-Martin-Schwinger-like relations obeyed by emission and absorption spectra of multichromophoric systems \cite{Buser_PRA2017_InitialCorrelations}. There it was pointed out that faithfully recovering the temperature from observed spectra requires taking into account system-environment correlations. This is true even at very low coupling strengths, where these correlations are generally weak. \section{Conclusion} In this paper we have discussed precision scaling for thermometry in cold quantum systems. In particular, we have investigated how finite measurement resolution, meaning that states that are close in energy cannot be perfectly distinguished, impacts the precision scaling. We have proposed a finite-resolution criterion characterising such measurements. Based on this, we derived a tightened bound on the scaling of the Fisher information. Furthermore, we showed that this bound is tight as it can be saturated via both an exponential resolution measurement as well as an excitation-preserving, single-qubit measurement on a sample of non-interacting bosons. We validated the approximations involved in demonstrating tightness for the single-qubit measurement by performing a numerical simulation of the sub-Ohmic spin-boson model. Here, we provided an illustration of a Fisher information scaling linearly with temperature. Interestingly, as far as we are aware, this is the best scaling which has been found in any concrete physical model subject to finite-resolution constraints. \begin{acknowledgments} MRJ and JBB were supported by the Independent Research Fund Denmark. PPP acknowledges funding from the European Union's Horizon 2020 research and innovation programme under the Marie Sk{\l}odowska-Curie Grant Agreement No. 796700. \end{acknowledgments}
\section{WENO method} For the sake of completeness, we give the formula of WENO interpolation for a hyperbolic system and WENO approximation for a H-J equation. Here, we only show the 1D case with fifth order accuracy. For 2D case, it can be obtained in a dimension-by-dimension fashion, in which we fix one index and do the process in the other direction. \subsection{WENO interpolation for a system} \label{sec:WENO} Given the point values $\{\textbf{q}_i\}$, we will approximate the values at half points $\textbf{q}_{i+1/2}^{\pm}$ : \begin{enumerate} \item Compute an average state $\textbf{q}_{i+1/2}$, using either the simple arithmetic mean or a Roe average. Construct the right and left eigenvectors of the Jacobian $\partial \widetilde{\textbf{f}} / \partial \textbf{q}$, and denote their matrices by $$R_{i+1/2}=R(\textbf{q}_{i+1/2}) ,\quad R^{-1}_{i+1/2}=R^{-1}(\textbf{q}_{i+1/2}).$$ \item Project the conserved quantities $\textbf{q}$ to the local characteristic variables $\textbf{v}$, \begin{equation*} \textbf{v}_{j} = R^{-1}_{i+1/2} \textbf{q}_{j}, \quad \text{for } j = i-2, \ldots, i+3. \end{equation*} \item Perform a scalar WENO interpolation on each component of the characteristic variable $\textbf{v}_{j}$ to obtain the corresponding component of $\textbf{v}_{i+1/2}^{\pm}$. Here, the procedure of a fifth-order WENO interpolation to obtain the $k$-th component $v^{-}_{k,i+1/2}$ is described: \begin{enumerate} \item Choose one big stencil as $S = \{x_{i-2},\ldots,x_{i+2}\}$, and three small stencils as $S^{(r)} _{i}= \{x_{i-r},\ldots, x_{i-r+2}\}$, $r=0,1,2$. On each small stencil, the standard interpolation gives \begin{align*} & v^{(0)}_{k,i+1/2} = \frac{3}{8}v_{k,i} +\frac{3}{4}v_{k,i+1} -\frac{1}{8}v_{k,i+2},\\ & v^{(1)}_{k,i+1/2} = -\frac{1}{8}v_{k,i-1} +\frac{3}{4}v_{k,i} +\frac{3}{8}v_{k,i+1},\\ & v^{(2)}_{k,i+1/2} = \frac{3}{8}v_{k,i-2} -\frac{5}{4}v_{k,i-1} +\frac{15}{8}v_{k,i}, \\ & v^\text{big}_{k,i+1/2} = d_{0} v^{(0)}_{k,i+1/2} +d_{1} v^{(1)}_{k,i+1/2} +d_{2} v^{(2)}_{k,i+1/2}, \end{align*} with the linear weights being $d_{0}={5}/{16}$, $d_{1}={5}/{8}$ and $d_{2}={1}/{16}$. \item Compute nonlinear weights $\omega_r$ from the linear weights $d_r$, \begin{equation*} \omega_{r}=\frac{\alpha_{r}}{\alpha_{0}+\alpha_{1}+\alpha_{2}}, \quad \alpha_{r}=\frac{d_{r}}{(IS_{r}+\epsilon)^2}, \quad r=0,1,2, \end{equation*} where $\epsilon = 10^{-6}$ is used to avoid division by zero, and the smoothness indicators are given by \begin{align*} &IS_{0} = \frac{13}{12}\left( v_{k,i}-2v_{k,i+1}+v_{k,i+2}\right)^2 +\frac{1}{4}\left( 3v_{k,i}-4v_{k,i+1}+v_{k,i+2}\right)^2,\\ &IS_{1} = \frac{13}{12}\left( v_{k,i-1}-2v_{k,i}+v_{k,i+1}\right)^2 +\frac{1}{4}\left( v_{k,i}-v_{k,i+1}\right)^2,\\ &IS_{2} = \frac{13}{12}\left( v_{k,i-2}-2v_{k,i-1}+v_{k,i}\right)^2 +\frac{1}{4}\left( v_{k,i-2}-4v_{k,i-1}+3v_{k,i}\right)^2. \end{align*} \item The WENO interpolation is defined by $$v^{-}_{k,i+1/2}=\sum_{r=0}^{2}\omega_{r}v^{(r)}_{k,i+1/2}.$$ \end{enumerate} \item Finally, project $\textbf{v}_{i+1/2}^{\pm}$ back to the conserved quantities, \begin{equation*} \textbf{q}_{i+1/2}^{\pm} = R_{i+1/2} \textbf{v}_{i+1/2}^{\pm}. \end{equation*} \end{enumerate} Note that the process to obtain $\textbf{v}^{+}_{i+1/2}$ is mirror-symmetric to the procedure described above, with respect to the target point $x_{i+1/2}$. \subsection{WENO approximation for H-J equations} \label{append2} Given th point values $\{\phi_i\}$, we want to approximate the derivative $\partial_{\xi}\phi$ at $\xi = \xi_{i}$. Introduce $\Delta^{+} \phi_{k}=\phi_{k+1}-\phi_{k}$ and $\Delta^{-} \phi_{k}=\phi_{k}-\phi_{k-1}$. Then, the fifth order approximation of $\partial_{\xi}\phi^{+}_{i}$ can be obtained as follows. \begin{enumerate} \item There are three small stencils $S^{(r)}_{i}=\{\xi_{i-2+r},\ldots,\xi_{i+1+r}\}$, $r=0,1,2$. On each stencil, we can obtain the approximation to $\partial_\xi \phi_{i}$. \begin{equation*} \begin{aligned} \partial_\xi \phi_{i}^{(0)} &= \frac{1}{\Delta\xi} \left( \frac{1}{6}\phi_{i-2}-\phi_{i-1}+\frac{1}{2}\phi_{i}+\frac{1}{3}\phi_{i+1} \right),\\ \partial_\xi \phi_{i}^{(1)} &= \frac{1}{\Delta\xi} \left( -\frac{1}{3}\phi_{i-1}-\frac{1}{2}\phi_{i}+\phi_{i+1}-\frac{1}{6}\phi_{i+2} \right),\\ \partial_\xi \phi_{i}^{(2)} &= \frac{1}{\Delta\xi} \left( -\frac{11}{6}\phi_{i}+3\phi_{i+1}-\frac{3}{2}\phi_{i+2}+\frac{1}{3}\phi_{i+3} \right), \\ \partial_\xi \phi_{i} ^{big} &= d_0 \partial_\xi \phi_{i}^{(0)} + d_1 \partial_\xi \phi_{i}^{(1)} + d_2 \partial_\xi \phi_{i}^{(2)} , \end{aligned} \end{equation*} with linear weights $d_0=3/10$, $d_1=6/10$ and $d_2=1/10$. \item Get the nonlinear weights \begin{equation*} \omega_{r}=\frac{\alpha_{r}}{\alpha_{0}+\alpha_{1}+\alpha_{2}}, \quad \alpha_{r}=\frac{d_r}{\left(\epsilon+IS_{r}\right)^{2}}, \quad r=0,1,2. \end{equation*} Here, we take $\epsilon=10^{-6}$. And the smoothness indicators $IS_{r}$ are defined by \begin{equation*} \begin{aligned} IS_{0} &=13(b-a)^{2}+3(3b- a)^{2}, \\ IS_{1} &=13(c-b)^{2}+3( c+ b)^{2}, \\ IS_{2} &=13(d-c)^{2}+3( d-3c)^{2} , \end{aligned} \end{equation*} and the parameters have form as \begin{equation*} a =\frac{1}{ \Delta \xi} \Delta^+ \Delta^- \phi_{i-1}, \quad b =\frac{1}{ \Delta \xi} \Delta^+ \Delta^- \phi_{i }, \quad c =\frac{1}{ \Delta \xi} \Delta^+ \Delta^- \phi_{i+1}, \quad d =\frac{1}{ \Delta \xi} \Delta^+ \Delta^- \phi_{i+2}. \end{equation*} \item Finally, we can obtain the WENO approximation \begin{equation*} \partial_\xi \phi^+_{i}=\sum^2_{r=0}\omega_{r} {\partial_\xi \phi_{i}}^{(r)}. \end{equation*} \end{enumerate} The process to obtain $\partial_{\xi}\phi^{-}_{i}$ is mirror-symmetric to that for $\partial_{\xi}\phi^{+}_{i}$ with respect to the target point $\xi_{i}$. \section{Concluding remarks} In this paper, we have discussed the performance of finite difference WENO scheme on solving the ideal MHD equation on generalized meshes. A constrained transport framework is used to control the divergence error of the magnetic field. In this framework, a magnetic vector potential is evolved by a H-J equation, and set the magnetic field to be the (discrete) curl of the magnetic potential after each time step. In order to preserve the free-stream condition, we employ an alternative flux formulation of the finite difference WENO scheme to the ideal MHD equations \cite{christlieb2018high}. Moreover, a novel method is proposed to solve the H-J equations, which combines the standard WENO approximation on lattice meshes with a general Lax-Friedrichs type monotone Hamiltonian. In particular, the metric terms in the method are carefully defined such that they can be canceled exactly, and further ensure the scheme could maintain the linear function solutions of H-J equations on both stationary and dynamically generalized coordinate systems The free-stream preservation property of ideal MHD equation for the new schemes have been investigated both theoretically and numerically. Several numerical benchmark problems are used to confirm that the standard finite difference WENO schemes have a rather large error arising from the metric terms on randomized and moving grids, while the proposed WENO schemes can simulate the solution well for all grids. \section{Governing equations} In this section, we will briefly review the governing equations. Firstly, we start with the ideal MHD equations on Cartesian coordinates. A constrained transport framework is used here to control the divergence error of the magnetic field. And then, we will give the form of governing equations in curvilinear coordinates system. \subsection{Ideal MHD equations} The set of ideal MHD equations is a system of equations describing the conservation of mass, momentum, energy, and magnetic field of a particular fluid. It is given in the following conservation form: \begin{equation}\label{mhd} \partial _t\left[ \begin{array}{c} \rho \\ \rho \textbf{u} \\ E \\ \textbf{B} \end{array} \right] + \nabla \cdot \left[ \begin{array}{c} \rho \textbf{u}\\ \rho \textbf{u} \otimes \textbf{u}+\left( p+\frac{1}{2}\|\textbf{B}\|^2\right) \mathbf{I}-\textbf{B} \otimes \textbf{B} \\ \textbf{u} \left(E+p+\frac{1}{2}\|\textbf{B}\|^2\right) -\textbf{B}(\textbf{u} \cdot \textbf{B})\\ \textbf{u} \otimes \textbf{B} - \textbf{B} \otimes \textbf{u} \end{array} \right] =0, \end{equation} \begin{equation}\label{div_free} \nabla \cdot \textbf{B}=0, \end{equation} \noindent where, $\rho$ is the mass density, $\rho \textbf{u}=\left(\rho u, \rho v, \rho w\right)^T$ is the momentum, $E$ is the total energy, $\textbf{B}=\left(B_1, B_2, B_3\right)^T$ is the magnetic field, $p$ is the thermal pressure, and $\|\cdot\|$ is the Euclidean vector norm. The total energy density is given by \begin{equation*}\label{eq_of_state} E=\frac{p}{\gamma-1} +\frac{1}{2}\rho\|\textbf{u}\|^2 +\frac{1}{2}\|\textbf{B}\|^2. \end{equation*} where $\gamma=5/3$ is the ideal gas constant. In particular, in the case of two dimensions considered in this work, all eight conserved variables, $\textbf{q}= ( \rho, \rho\textbf{u}, E, \textbf{B}) ^T$, can be non-zero, but each only depends on $x$, $y$, and $t$. \subsection{Constrained transport} In order to reconstruct a discrete divergence-free magnetic field, we employ the constrained transport (CT) framework \cite{christlieb2014finite, christlieb2018high}. Instead of solving the magnetic field directly, a magnetic potential $\textbf{A}=(A_1, A_2, A_3)^T$ is introduced, satisfying \begin{align} \label{eq:CT} \textbf{B}=\nabla \times \textbf{A}. \end{align} \noindent Furthermore, evolution equation for $\textbf{A}$ can be derived from the magnetic induction equation, as \begin{equation}\label{ct} \partial _t \textbf{A} + (\nabla \times \textbf{A})\times \textbf{u}=0. \end{equation} See \cite{rossmanith2006unstaggered} for details. In the CT framework, we will simultaneously evolve the ideal MHD equations \eqref{mhd} and magnetic potential equations \eqref{ct} alongside each other, and set the magnetic field $\textbf{B}$ to be the (discrete) curl of the magnetic potential after each time step. Previous works \cite{christlieb2014finite, christlieb2018high} show such a procedure can control the divergence error in \textbf{B} and improve numerical stabilities of base schemes. In the case of two dimensions, the divergence-free condition (\ref{div_free}) becomes \begin{equation*} \nabla \cdot \textbf{B}=\partial _x B_1+\partial _y B_2=0. \end{equation*} Thus $B_3$ has no impact on the divergence of $\textbf{B}$. It therefore suffices to only correct $B_1$ and $B_2$ in terms of controlling divergence errors. Furthermore, only the third component of $\textbf{A}$ need be evolved. Hence, for ease of presentation, we use a scalar quantity $A$ to denote the third component of $\textbf{A}$ in the following parts. Consequently, the magnetic potential equations \eqref{ct} reduces to a scalar equation \begin{equation}\label{ct1} \partial _t A +u\partial _x A+v\partial _y A=0 , \end{equation} which is a H-J equation. While, $B_1$ and $B_2$ relate with $A$ by \begin{equation} \label{eq:relation_AB} B_1=\partial _y A,\quad \text{and} \quad B_2=-\partial _x A. \end{equation} \subsection{Curvilinear coordinates and the free-stream condition} Here we provide a brief discussion of using curvilinear coordinates as the computational domain to solve a general hyperbolic system and a H-J equation. Assume the Cartesian coordinates $\textbf{x}= (x,y,t)$ can be transformed in curvilinear coordinates $\textbf{r}=(\xi,\eta,\tau)$ via a continuous coordinate transformation. As illustrated in Fig. \ref{fig:CurvilinearMeshDomain}, a uniform mesh in the computational domain is typically used in our implementation. \begin{figure}[htb] \centering \includegraphics[width=4.8in]{domain.pdf} \caption{A schematic diagram of the transformations between the physical and computational domain.} \label{fig:CurvilinearMeshDomain} \end{figure} Here, we choose $\tau=t$, and $J$ is the determinant of the Jacobian matrix defined by \begin{equation} \label{eq:Jacobian} J^{-1}:=det \left[\frac{\partial \textbf{x}}{\partial \textbf{r}}\right]= \left|\begin{array}{cccc} \partial _\xi x & \partial _\eta x & \partial _\tau x \\ \partial _\xi y & \partial _\eta y & \partial _\tau y \\ 0 & 0 & 1 \end{array}\right| =\partial _\xi x \,\partial _\eta y-\partial _\eta x \, \partial _\xi y. \end{equation} And the standard metrics satisfy \begin{equation}\label{transform} \begin{array}{lll} \partial _x \xi=J\, \partial _\eta y, &\partial _y \xi=-J\,\partial _\eta x, &\partial _t \xi=J \left( \partial _{\tau} y \, \partial _{\eta} x - \partial _{\tau} x \, \partial _{\eta} y \right), \\ \partial _x \eta=- J\, \partial _\xi y, &\partial _y \eta=J\,\partial _\xi x, &\partial _t \eta= J \left( \partial _{\tau} x \, \partial _{\xi} y -\partial _\tau y \, \partial _\xi x \right). \\ \end{array} \end{equation} For the system of hyperbolic conservation law in two dimensions, \begin{equation*}\label{h-c-l-Cartesian} \partial _t \textbf{q} + \partial _x \textbf{f}(\textbf{q}) + \partial _y \textbf{g}(\textbf{q})=0, \end{equation*} it can be transformed to the curvilinear coordinates, which has a conservative form \begin{equation}\label{h-c-l-curvilinear} \partial _{\tau} \widetilde{\textbf{q}}+\partial _\xi \widetilde{\textbf{f}}+\partial _\eta \widetilde{\textbf{g}}=0. \end{equation} where, \begin{equation*} \widetilde{\textbf{q}}=J^{-1}\textbf{q} ,\qquad \widetilde{\textbf{f}}=J^{-1}\left(\partial _t \xi \,\textbf{q}+\partial _x \xi \,\textbf{f} + \partial _y \xi \,\textbf{g} \right) ,\qquad \widetilde{\textbf{g}}=J^{-1}\left(\partial _t \eta \,\textbf{q}+\partial _x \eta \,\textbf{f} + \partial _y \eta \,\textbf{g} \right). \end{equation*} \noindent When considering the magnetic potential equations \eqref{ct1} and \eqref{eq:relation_AB} in curvilinear mesh, they turn to \begin{align} \label{eq:CT_curve} \partial _\tau A + \left( u \partial _x \xi + v \partial _y \xi + J \partial_{t} \xi \right) \partial _\xi A + \left( u \partial _x \eta + v \partial _y \eta + J \partial_{t}\eta \right) \partial _\eta A = 0, \end{align} and \begin{align} \label{eq:relation_AB_curve} B_1 = \partial _y \xi \, \partial _\xi A + \partial _y \eta \, \partial _\eta A , \quad B_2 = -\partial _x \xi \, \partial _\xi A - \partial _x \eta \, \partial _\eta A , \end{align} which are another H-J equation and the combination of partial derivatives of $A$, respectively. In this work, we will look at the uniform flow (free-stream flow), i.e. $\textbf{q}=(\rho, \rho\textbf{u}, E, \textbf{B} )^T$ are constants. At this time, $\textbf{f}$ and $\textbf{g}$ are constants as well, and equation \eqref{h-c-l-curvilinear} can be simplified as \begin{align*} \partial_{\tau} \textbf{q} = -J \left( I_t \textbf{q} + I_x \textbf{f} + I_y \textbf{g}\right), \end{align*} where, \begin{align} \label{eq:SCL} \left\{ \begin{array}{ll} I_{t} = \partial_{\tau} J^{-1} + \partial_{\xi} (J^{-1} \partial_{t} \xi) + \partial_{\eta} (J^{-1} \partial_{t}\tau),\\ I_{x} = \partial_{\xi} \left( J^{-1} \partial_{x}\xi \right) + \partial_{\eta} \left( J^{-1} \partial_{x}\eta \right), \\ I_{y} = \partial_{\xi} \left( J^{-1} \partial_{y}\xi \right) + \partial_{\eta} \left( J^{-1} \partial_{y}\eta \right). \\ \end{array}\right. \end{align} With the help of \eqref{eq:Jacobian} and \eqref{transform}, it is easy to check that $I_x = I_y = I_t =0$. Therefore, we have $\partial_{\tau} \textbf{q}=0$, that is, the uniform flow conditions are held. In a finite difference discretization, all three of the identities in equation \eqref{eq:SCL} must hold numerically to achieve the free-stream preserving condition. For stationary meshes, only the last two identities for $I_x$ and $I_y$ are required. On the other hand, in the CT framework, $\mathbf{B}$ is determined through discreting $A$. We can prove that for the uniform flow, the initial magnetic potential should be in the form of $A(x,y,0) = B_1\, y - B_2\, x + C$, where $C$ is a constant. In this case, the evolution equation \eqref{eq:CT_curve} tells us that \begin{align*} \partial_\tau A= (u - \partial_{\tau}x) B_2 - (v-\partial_{\tau}y) B_1. \end{align*} Therefore, \begin{align*} \label{eq:linear} A(\xi,\eta,\tau) = B_1\, y(\xi,\eta,\tau) - B_2\, x(\xi,\eta,\tau) + C + (u B_2 - v B_1) \tau . \end{align*} This means the magnetic potential $A$ is a linear function with respect to $(x,y)$ at any time. Note that we set $\textbf{B}$ as the discrete curl of $A$. Hence, in order to achieve the free-stream condition on curvilinear mesh numerically, we require the scheme can hold the linear solution of $A$ exactly. Actually, it is easy to verify that the general H-J equation \begin{equation}\label{h-j} \partial _t \phi +H(\partial _x \phi,\partial _y \phi) =0 \end{equation} would be transformed to the following one in the curvilinear coordinates \begin{equation}\label{h-j c} \partial _\tau \phi + \tilde{H}(\partial_{\xi}\phi, \partial_{\eta}\phi) =0, \end{equation} where, \begin{align} \tilde{H}(\partial_{\xi}\phi, \partial_{\eta}\phi) = H(\{\partial _x \phi\},\{\partial _y \phi\}) - \partial _\tau x \, \{\partial _x \phi\} - \partial _\tau y \, \{\partial _y \phi\}, \end{align} and \begin{equation} \label{eq:curl_cureve} \{\partial _x \phi\}= \partial _x \xi \, \partial _\xi \phi + \partial _x \eta \, \partial _\eta \phi, \qquad \{\partial _y \phi\}= \partial _y \xi \, \partial _\xi \phi + \partial _y \eta \, \partial _\eta \phi. \end{equation} \noindent Moreover, it can preserve linear solution in physical domain, in the sense that if the initial condition is linear about $(x, y)$, i.e., $\phi(x,y,0)=C_1 x+C_2 y+C_3$ with constants $C_1, C_2$ and $C_3$, then the exact solution has the form that $$ \phi(\xi,\eta,\tau)=C_1 x(\xi,\eta,\tau)+C_2y (\xi,\eta,\tau)-H(C_1,C_2) \tau+C_3. $$ Therefore, in the next section, we will design the high order finite difference WENO schemes, which can preserve the free-stream condition of conservation law \eqref{h-c-l-curvilinear}, or preserve linear function of H-J equation \eqref{h-j c} on curvilinear coordinate, respectively. \section{Introduction} The ideal magnetohydrodynamic (MHD) equations are a fluid model to describe the dynamics of a perfectly conducting quasi-neutral plasma. A range of areas including astrophysics and laboratory plasmas can be modeled with this system. The magnetic field has to satisfy an extra constraint that its divergence is zero, which is a reflection of the principle that there are no magnetic monopoles. Mathematically, the exact solution of the MHD equations preserves zero divergence for the magnetic field in future time, if the initial divergence is zero. However, most standard numerical discretizations based on shock capturing methods do not propagate a discrete version of the divergence-free condition forward in time. The relevant information will be discussed later In this work, we are interesting in the free-stream preservation, which is an important property when finite difference schemes are applied to curvilinear meshes (also referred to as generalized coordinate systems). Failing preserving the free-stream condition may cause large errors and even lead to numerical instabilities for high-order schemes, see \cite{nonomura2010freestream, visbal2002use} for Euler equation and Navier-Stokes equation. This is because errors from nonpreserved free-stream may hide small physical oscillations, such as turbulent flow structures. Here, we will consider the finite difference weighted essentially non-oscillatory (WENO) schemes. The standard WENO schemes \cite{jiang1996efficient, balsara2000monotonicity, shu2009high} are widely employed for the simulation of complex flow fields due to their high order accuracy and good shock-capturing properties. In particular, the methods have been studied to solve the ideal MHD equations successfully \cite{jiang1999high, balsara2009divergence, shen2012cusp, balsara2013efficient, christlieb2014finite, christlieb2016high} However, it was found that standard finite difference WENO schemes could preserve the free-stream condition in the Cartesian coordinate system, but not in the generalized coordinate system due to non-exact cancellations of the metric derivatives when nonlinear reconstructions are performed. Details see \cite{cai2008performance, nonomura2010freestream}. More recently, Jiang et al. \cite{jiang2014free} studied an alternative formulation of finite-difference WENO scheme, originally proposed by Shu and Osher \cite{shu1988efficient}. Different from the standard one, in this formulation, the high order WENO interpolation procedure is applied to the solution, and the numerical technique for the metric terms \cite{visbal2002use} can be applied. Moreover, theoretical derivation and numerical results showed that the finite difference WENO schemes based on the alternative flux formulation can preserve free-stream of Euler equation on both stationary and dynamically generalized coordinate systems. Even though the alternative formulation could be used to solve ideal MHD equation on curvilinear meshes \cite{christlieb2018high}, however, the free-stream condition is not satisfied. The main reason is that the numerical method used to deal with zero divergence for the magnetic field may break the free-stream preserving property. Controlling divergence errors in the magnetic field is one of the main numerical difficulties for simulating the ideal MHD equations. Failure to control the divergence error in numerical computation could create an unphysical force parallel to the magnetic field (see \cite{brackbill1980effect} for instance), which may eventually result into numerical instabilities as its effects accumulate. There are mainly four types of numerical approaches to solve this problem: the nonconservative eight-wave method \cite{gombosi1994axisymmetric}, the projection method \cite{brackbill1980effect}, the hyperbolic divergence cleaning method \cite{dedner2002hyperbolic}, and the various constrained transport methods \cite{evans1988simulation, dai1998divergence, balsara1999staggered, fey2003constrained, balsara2004second, rossmanith2006unstaggered, helzel2011unstaggered, helzel2013high, christlieb2014finite, christlieb2018high}. See the review paper \cite{toth2000b} for more discussion. In \cite{christlieb2014finite, christlieb2018high}, authors used the unstaggered constrained transport method to address this issue. In this framework, vector potential was introduced to correct the magnetic field. Numerically, the conserved quantities of the ideal MHD equations and a magnetic vector potential are simultaneously evolved at the same time, with the evolution equations as hyperbolic conservation law and Hamilton-Jacobi (H-J) equation, respectively. And then, set the magnetic field to be the (discrete) curl of the magnetic potential after each time step. We find that for the free-stream flow, the magnetic potential should be a linear function in physical domain. As a consequence, it is necessary to keep the linear solution exactly over time for the constrained transport equation on curvilinear coordinate systems numerically. However, if we use the finite difference WENO method designed for H-J equations \cite{jiang2000weighted} on lattice grid to solve magnetic potential on computational domain, it may fail to preserve the linear function. Because the magnetic potential is not a linear function in computational domain any more. One way to address this problem is that we can solve the equation on physical domain based on the WENO schemes for H-J equation on 2D triangular meshes \cite{zhang2003high}. However, the algorithm employs the least square procedure and the computational cost would be very large for moving mesh problems. In this work, we will take the alternative formulation of finite difference WENO method to solve conservation laws, and develop a novel WENO method for the constrained transport equation or H-J equation, such that it can preserve the free-stream condition of ideal MHD equation on the generalized coordinate systems. In the proposed scheme, we employ the standard WENO approximation to approach the derivatives on computational domain, coupled with the general Hamiltonian on unstructured meshes. Moreover, the metric terms are well designed to ensure they can be canceled exactly. The organization of the remaining sections is as follows. In Section 2, we will review the governing equations on generalized coordinate system. The numerical methods and the analysis of the free-stream-preservation property will be discussed in Section 3. In Section 4, extensive numerical examples are provided to demonstrate the free-stream preservation performance. Concluding remarks are given in Section 5. \section{Numerical results} In this section, the numerical simulations for both Hamilton-Jacobi equations and the ideal MHD equations will be presented. At first, we will study the performance of proposed scheme in solving H-J equations on wavy mesh, comparing with the classical WENO scheme \cite{jiang2000weighted}. For simplicity, the scheme we proposed in this paper is denoted as PL-WENO, and the classical WENO scheme is denoted as NPL-WENO. Next, we will discuss the results of ideal MHD equations coupled with constrained transport equation on both stationary and dynamical meshes. For comparison, we also test the method in \cite{christlieb2018high}. The only difference between those two methods is the scheme solving the constrained transport equation, that our method uses PL-WENO, while \cite{christlieb2018high} used the classical NPL-WENO, which can not preserve free-stream condition. Here, We only test with the fifth order WENO schemes in space. And the third order TVD Runge-Kutta scheme \eqref{eq:RK3} is used for time integration. The computational domain is taken as $(\xi,\eta)\in[0,L_x]\times[0,L_y]$ without special declaration, and take the mesh sizes $$\Delta \xi =L_x/(I_{max}-1) ,\quad \Delta\eta = L_y/(J_{max}-1).$$ \subsection{H-J Equation: accuracy test} \label{exadd1} We consider the problem that \begin{equation*} \left\{ \begin{array}{lr} \phi_{t}=\phi_x+\phi_y, \\ \phi(x,y,0)=\sin(x+y). \\ \end{array} \right. \end{equation*} on a stationary wavy grid \begin{equation}\label{wavy_grid} \begin{aligned} x_{i,j}&=x_{min}+\Delta \xi \left[ (i-1)+A_x \sin{\frac{N_y(j-1)\Delta \eta}{L_y}} \right],\\ y_{i,j}&=y_{min}+\Delta \eta \left[ (j-1)+A_y \sin{\frac{N_x(i-1)\Delta \xi}{L_x}} \right], \end{aligned} \end{equation} where, \begin{equation*} \begin{aligned} &i=1,2,\cdots,I_{max},\qquad j=1,2,\cdots,J_{max},\\ &x_{min}=-\frac{L_{x}}{2},\qquad y_{min}=-\frac{L_{y}}{2}. \end{aligned} \end{equation*} The wavy grid parameters used in this test are $L_x=L_y=2\pi$, $\Delta\xi A_x=0.01$, $\Delta \eta A_y=-0.02$, $N_x=N_y=2\pi$. And we test with $I_{max} = J_{max} = 41, 81, 161$ and $321$ successively. To realize fifth order in time, the time step is choose as $\Delta \tau \approx \Delta \xi^{5 / 3}$. The boundary condition are all periodic for this smooth test. The $L_1$ and $L_\infty$ errors and orders of accuracy at time $T=0.5$ are presented in Table \ref{accuracy}, showing that the scheme can achieve the designed fifth order accuracy. \begin{table} \caption{Example \ref{exadd1}: $L_1$ and $L_\infty$ errors at $T=0.5$} \bigskip \centering \begin{tabular}{ccccc} \hline $I_{max} \times J_{max}$ & $L_1$ errors & order & $L_\infty$ errors & order \\ \hline $41 \times 41$ & 9.37E-06 & -- & 2.05E-05 & -- \\ $81 \times 81$ & 2.96E-07 & 4.89 & 6.08E-07 & 5.08\\ $161\times161$ & 9.21E-09 & 5.00 & 1.84E-08 & 5.04\\ $321\times321$ & 2.86E-10 & 5.01 & 5.67E-10 & 5.02\\ \hline \end{tabular} \label{accuracy} \end{table} \subsection{H-J Equation: 2D nonconvex Riemann problem}\label{ex0} We solve a 2D nonconvex Riemann problem from \cite{osher1991high}, \begin{equation*} \left\{ \begin{aligned} &\partial_t \phi + \sin\left(\partial_x \phi+\partial_y \phi \right)=0,\\ &\phi (x,y,0)=\pi(\left|y\right|-\left|x\right|), \end{aligned} \right. \end{equation*} on a stationary wavy grid expressed as \eqref{wavy_grid}. The wavy grid parameters used in this test are $I_{max}=J_{max}=81$, $L_x=L_y=2$, $A_x=1.5$, $A_y=-1.5$, $N_x=N_y=16\pi$. The time step is chosen as $\Delta \tau= CFL \,\Delta \xi / \lambda$, with $CFL=0.1$, and $\lambda$ is given in (\ref{eq:parameter}). We compute the solutions up to time $T=1$. Numerical solutions are plotted in Fig. \ref{example0}. It is observed that the PL-WENO can keep the solution's shape from the influence of the wavy grid and give better simulation to the viscosity solutions. \cite{osher1991high}, while NPL-WENO bend the linear part of solution we do not want. \begin{figure}[htbp] \centering \subfigure[Grid]{ \begin{minipage}[t]{0.33\linewidth} \centering \includegraphics[width=2in]{fig/1_grid.png} \end{minipage}% }% \subfigure[PL-WENO]{ \begin{minipage}[t]{0.33\linewidth} \centering \includegraphics[width=2in]{fig/1_1-2.png} \end{minipage}% }% \subfigure[NPL-WENO]{ \begin{minipage}[t]{0.33\linewidth} \centering \includegraphics[width=2in]{fig/1_2-2.png} \end{minipage}% \centering \caption{Example \ref{ex0}: 16 contour lines of $\phi$ between $-2.5$ and $2.5$ are shown.} \label{example0} \end{figure} \subsection{MHD: Free-stream preserving properties}\label{ex1} In this example, an free-stream fluid is imposed, with $\rho = \gamma^2$, $p= \gamma$, $\textbf{u}=(1,0,0)^T$, and $\textbf{B}=(1,1,0)^T$. Thus the $y$-direction velocity $v$ and the $z$-direction velocity $w$ are expected to remain machine zero. Here, we test with four different grids: \begin{itemize} \item \textbf{Stationary wavy grid}. It is expressed as \eqref{wavy_grid} with wavy grid parameters $I_{max}=J_{max}=41$, $L_x=L_y=4\pi$, $\Delta \xi A_x=\Delta \eta A_y=0.2$, $N_x=N_y=16$. We take the final time $t = 10$. \item \textbf{Randomized grid}. The randomized grid is generated by a $41 \times 41$ uniform grids $[-0.5,0.5]\times[-0.5,0.5]$ with 10\% magnitude grid spacing in a random direction. The final time is $t = 10$. \item \textbf{Moving wavy grid}. The grid is given as \begin{equation}\label{moving_grid} \begin{aligned} x_{i,j}(\tau)&=x_{min}+\Delta \xi \left[ (i-1)+A_x\left(1+0.1 \times \sin{2\pi \omega \tau}\right) \sin{\frac{N_y(j-1)\Delta \eta}{L_y}} \right],\\ y_{i,j}(\tau)&=y_{min}+\Delta \eta \left[ (j-1)+A_y\left(1+0.1 \times \sin{2\pi \omega \tau}\right) \sin{\frac{N_x(i-1)\Delta \xi}{L_x}} \right], \end{aligned} \end{equation} where, \begin{equation*} \begin{aligned} &i=1,2,\cdots,I_{max},\qquad j=1,2,\cdots,J_{max},\\ &x_{min}=-\frac{L_{x}}{2},\qquad y_{min}=-\frac{L_{y}}{2}, \end{aligned} \end{equation*} with the specified parameters $I_{max}=J_{max}=21$, $L_x=L_y=1$, $\Delta \xi A_x=\Delta \eta A_y=0.05$, $N_x=N_y=4$, and the frequency of oscillation $\omega=1.0$. The final time is taken as $t = 10$. \item \textbf{Stationary spherical grid}. The grid is expressed as \begin{equation}\label{cylinder_grid} \begin{aligned} x_{i,j}&=\left(r_1-\left(r_1-r_0\right)\Delta \xi(i-1)\right) \, \cos(\pi+\theta \, (1-2\Delta \eta(j-1))),\\ y_{i,j}&=\left(r_2-\left(r_2-r_0\right)\Delta \xi(i-1)\right) \, \sin(\pi+\theta \, (1-2\Delta \eta(j-1))), \end{aligned} \end{equation} where, \begin{equation*} \begin{aligned} &i=1,2,\cdots,I_{max},\qquad j=1,2,\cdots,J_{max},\\ \end{aligned} \end{equation*} with $I_{max}=J_{max}=41$, $r_1=0.3$, $r_2=0.65$, $r_0=0.125$, $\theta=5\pi/12$ and $\Delta \xi =\Delta \eta =0.025$. And we test the problem with final time $t=0.1$ \end{itemize} The grids are shown in Fig \ref{grid1}. Time steps are taken as $\Delta \tau=0.05$, $\Delta \tau=0.05$, $\Delta \tau=0.01$ and $\Delta \tau=5.0 \times 10^{-4}$, respectively. The $L_\infty$ errors of $v$ at final time are shown in Table \ref{tab1}. We can see that PL-WENO have errors that are close to the machine zero. However, NPL-WENO have large errors on the level of $10^{-2}$. These demonstrate that PL-WENO can preserve the free-stream condition, while NPL-WENO can not. \begin{figure}[htbp] \centering \subfigure[Stationary wavy grid]{ \begin{minipage}[t]{0.4\linewidth} \centering \includegraphics[width=2in]{fig/2_1.png} \end{minipage}% \subfigure[Randomized grid]{ \begin{minipage}[t]{0.4\linewidth} \centering \includegraphics[width=2in]{fig/2_2.png} \end{minipage}% } \\ \subfigure[Moving wavy grid at $t=10$]{ \begin{minipage}[t]{0.4\linewidth} \centering \includegraphics[width=2in]{fig/2_3.png} \end{minipage}% \subfigure[Stationary spherical grid]{ \begin{minipage}[t]{0.4\linewidth} \centering \includegraphics[width=1.5in]{fig/2_4.png} \end{minipage}% } \centering \caption{Example \ref{ex1}: The grids for the free-stream preserving test.} \label{grid1} \end{figure} \begin{table}[htbp] \caption{Example \ref{ex1}: $L_\infty$ errors of $v$ component in the free-stream preservation test.} \vspace{0.3cm} \centering \begin{small} \begin{tabular}{ccccc} \hline & Stationary wavy grid & Randomized grid & Moving wavy grid & Stationary spherical grid \\\hline PL-WENO & 3.41E-14 & 8.21E-14 & 9.13E-14 & 6.32E-14 \\ NPL-WENO & 6.85E-02 & 1.52E-02 & 2.16E-03 & 5.18E-07 \\ \hline \end{tabular} \end{small} \label{tab1} \end{table} \subsection{MHD: 2D field loop} \label{ex4} In this section we consider a 2D advection of a weakly magnetized field loop from \cite{gardiner2005unsplit}. The initial conditions are \begin{equation*} (\rho,u,v,w,p)(x,y,0)=(1,\sqrt 5\cos(\theta),\sqrt 5\sin(\theta),0,1), \end{equation*} with the advection angle of $\theta = \arctan (0.5)$. Magnetic field components are initialized by taking the curl of the magnetic potential $A$, \begin{equation*} A(x,y,0)= \left\{ \begin{array}{ll} 0.001(R-r), &\text{if} \ r\leq R,\\ 0, & \text{otherwise}, \\ \end{array} \right. \end{equation*} with $r=\sqrt{x^2+y^2}$ and $R=0.3$. Periodic boundary conditions are used in both directions. We will test 2D field loop problem on wavy grid, randomized grid and moving wavy grid. In this problem, the wavy grid (\ref{wavy_grid}) and the moving wavy grid (\ref{moving_grid}) are formulated with the parameters $$I_{max}=101, \quad J_{max}=51, \quad L_x=2, \quad L_y=1, $$ $$\Delta \xi A_x=0.03, \quad \Delta \eta A_y=0.06, \quad N_x=N_y=8,$$ and the frequency of oscillation $\omega=1.0$. The randomized grid is generated by a $101 \times 51$ uniform grids on $[-1,1]\times[-0.5,0.5]$ with $10\%$ magnitude grid spacing in a random direction. The time step is chosen as $\Delta \tau= CFL \,\Delta \xi / \alpha$, with $CFL=0.1$, and $\alpha$ is the largest wave speed estimated in the curvilinear coordinates. We present contour plots of the potential $A$ and $\|\textbf{B}\|^2=B_1 ^2+B_2 ^2+B_3^2$ at $t=2$ in Fig. \ref{example4_1} and Fig. \ref{example4_2}. It is observed that both schemes can maintains the circular symmetry of the loop as expected, but there are small irrational disturbances founded in NPL-WENO solution. \begin{figure}[htbp] \centering \subfigure[PL-WENO. Stationary wavy grid. ]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example4_1.png} \end{minipage}% }% \subfigure[NPL-WENO. Stationary wavy grid]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example4_2.png} \end{minipage}% }\\ \subfigure[PL-WENO. Randomized grid.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example5_1.png} \end{minipage}% }% \subfigure[NPL-WENO. Randomized grid.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example5_2.png} \end{minipage}% }\\% \subfigure[PL-WENO. Moving wavy grid.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example6_1.png} \end{minipage}% }% \subfigure[NPL-WENO. Moving wavy grid.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example6_2.png} \end{minipage}% \centering \caption{Example \ref{ex4}: $A$ of the 2D field loop. 20 contour lines between $-2.16\times 10^{-6}$ and $2.7\times 10^{-4}$ are shown.} \label{example4_1} \end{figure} \begin{figure}[htbp] \centering \subfigure[PL-WENO. Stationary wavy grid.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example4_3.png} \end{minipage}% }% \subfigure[NPL-WENO. Stationary wavy grid.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example4_4.png} \end{minipage}% } \\ % \subfigure[PL-WENO. Randomized grid.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example5_3.png} \end{minipage}% }% \subfigure[NPL-WENO. Randomized grid.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example5_4.png} \end{minipage}% } \\% \subfigure[PL-WENO. Moving wavy grid.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example6_3.png} \end{minipage}% }% \subfigure[NPL-WENO. Moving wavy grid.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=3in]{fig/example6_4.png} \end{minipage}% }% \centering \caption{Example \ref{ex4}: $\|\textbf{B}\|^2$ of the 2D field loop. 20 contour lines between $3\times 10^{-9}$ and $5.2\times 10^{-7}$ are shown} \label{example4_2} \end{figure} \subsection{MHD: 2D rotor problem}\label{ex5} The initial condition is given as \begin{equation*} \left(\rho,u,v\right) = \left\{ \begin{array}{ll} \left( 10,-\left(y-0.5\right)/r_0,\left(x-0.5\right)/r_0 \right),\quad &\text{if} \ r \leq r_0, \\ \left( 1+9f(r),-f(r)(y-0.5)/r,f(r)(x-0.5)/r \right),\quad &\text{if} \ r_0 \le r \leq r_1,\\ \left( 1,0,0 \right),\quad &\text{if} \ r \ge r_1,\\ \end{array} \right. \end{equation*} and \begin{equation*} w=0,\quad B_1=2.5 /\sqrt{4\pi}, \quad B_2=0, \quad B_3=0, \quad p=0.5, \quad A=2.5/\sqrt{4\pi} y, \end{equation*} where $r=\sqrt{(x-0.5)^2+(y-0.5)^2}$, $r_0=0.1$, $r_1=0.115$ and $f(r)=(r_1-r)/(r_1-r_0)$. Here we use the same initial condition of the second rotor problem test in \cite{toth2000b}. The problem is solved on a randomized grid generated by a $101 \times 101$ uniform grids with $5\%$ magnitude grid spacing in a random direction. Same method of time step chosen as in 2D field loop is used here. The contour plots of $\|\textbf{B}\|^2=B_1 ^2+B_2 ^2+ B_3^2$ at $t=0.295$ are presented in Fig. \ref{example4.5}. Results of NPL-WENO show large numerical errors owing to the grid distortions, but PL-WENO can ignore the discontinuity in the derivatives of the randomized grid to some extent from the result. \begin{figure}[htbp] \centering \subfigure[PL-WENO]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example11_1.png} \end{minipage}% }% \subfigure[NPL-WENO]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example11_2.png} \end{minipage}% \centering \caption{Example \ref{ex5}: $\|\textbf{B}\|^2$ of the 2D rotor problem. 16 contour lines between $0.1$ and $1.0$ are shown.} \label{example4.5} \end{figure} \subsection{MHD: 2D blast wave} \label{ex3} Next we consider the blast wave problem. In this test strong shocks interact with a low-$\beta$ background, which could potentially cause negative density or pressure in numerical simulations. The problem has been commonly used to test the positivity-preserving capabilities of numerical methods for MHD equation \cite{balsara2009efficient, balsara1999staggered}. The initial conditions contain a constant density, velocity and magnetic field \begin{equation*} (\rho,u,v,w,B_1,B_2,B_3)(x,y,0)=(1,0,0,0,50\sqrt{2\pi},50\sqrt{2\pi},0), \end{equation*} and a piecewise defined pressure \begin{equation*} p(x,y,0)= \left\{ \begin{array}{ll} 1000, & \text{if} \ r\leq 0.1,\\ 0.1, & \text{otherwise}. \\ \end{array} \right. \end{equation*} Similarly, we will test 2D blast wave problem on wavy grid, randomized grid and moving wavy grid. For both the wavy grid (\ref{wavy_grid}) and the moving wavy grid (\ref{moving_grid}), the parameters are taken as $$I_{max}=J_{max}=101, \quad L_x=L_y=1, \quad N_x=N_y=4, \quad \Delta \xi A_x=0.03=\Delta \eta A_y=0.03, $$ and the frequency of oscillation $\omega=1.0$. The randomized grid is generated by a $101 \times 101$ uniform grids on $[0,1]\times[0,1]$ with $1\%$ magnitude grid spacing in a random direction. Same method of time step chosen as in 2D field loop is used here. PL-WENO can successfully run to $T=0.01$, keeping density and pressure positive all the time in the computational domain for all three types of grids However, NPL-WENO would produce negative pressures at around $T=0.002898$, $T=0.002257$, $T=0.001486$ on the three types of grids, respectively. This indicates that missing free-stream-preserving property can lead large error. Moreover, in Fig.\ref{example9}, we present contour plots of $\rho$ at $T=0.0025$ on wavy grid, $T=0.0015$ on randomized grid and $T=0.0013$ on moving wavy grid. It's obvious that NPL-WENO would introduce extra errors and can not maintain the structure of solution on the three types of grids, while PL-WENO can. \begin{figure}[htbp] \centering \subfigure[PL-WENO. Stationary wavy grid. $T=0.0025$.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example7_1.png} \end{minipage}% }% \subfigure[NPL-WENO. Stationary wavy grid. $T=0.0025$.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example7_2.png} \end{minipage}% }\\ % \subfigure[PL-WENO. Randomized grid. $T=0.0015$.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example8_1.png} \end{minipage}% }% \subfigure[NPL-WENO. Randomized grid. $T=0.0015$.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example8_2.png} \end{minipage}% } \\ % \subfigure[PL-WENO. Moving wavy grid. $T=0.0013$.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example10_1.png} \end{minipage}% }% \subfigure[NPL-WENO. Moving wavy grid. $T=0.0013$. ]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example10_2.png} \end{minipage}% }% \centering \caption{Example \ref{ex3}: $\rho$ of the 2D blast wave. In (a)-(b), we use 15 contour lines between $0.5$ and $1.9$ are shown; in (c)-(f), we use 19 contour lines between $0.5$ and $1.9$ are shown. } \label{example9} \end{figure} \subsection{MHD: Bow shock flow} \label{ex41} In this test, we simulate the supersonic flow past a cylinder, to examine the performance of our scheme when applied to problems involving curved physical boundaries. The computational grid is generated by (\ref{cylinder_grid}) with $r_1=0.3$, $r_2=0.65$, $r_0=0.125$, $\theta=5\pi/12$ and $\Delta \xi =\Delta \eta =\frac{1}{150}$. Assuming $r=\sqrt{x^{2}+y^{2}}$, $\delta r=0.125$, the initial condition is given as \begin{equation*} \begin{aligned} (\rho,u,v,w,p)=(1,2,0,0,0.2),\\ \mathbf{B}=\left\{ \begin{array}{ll}{ \left(B_{1}, B_{2}, 0\right)^{T}}, & {\text { if } r \leq r_{0}+\delta r}, \\ {(0.1,0,0)^{T}}, & {\text { otherwise, }} \end{array} \right. \end{aligned} \end{equation*} where, \begin{align*} B_{1}&=0.1 \frac{\pi y^{2}}{2 \delta r \cdot r} \cos \left(\frac{\pi\left(r-r_{0}\right)}{2 \delta r}\right)+0.1 \sin \left(\frac{\pi\left(r-r_{0}\right)}{2 \delta r}\right),\\ B_{2}&=-0.1 \frac{\pi x y}{2 \delta r \cdot r} \cos \left(\frac{\pi\left(r-r_{0}\right)}{2 \delta r}\right). \end{align*} The corresponding initial magnetic potential is \begin{equation} \begin{aligned} A=\left\{ \begin{array}{ll} 0.1 y \sin \left(\frac{\pi\left(r-r_{0}\right)}{2 \delta r}\right), &{\text { if } r \leq r_{0}+\delta r}, \\ 0.1 y, &\text{otherwise}. \end{array} \right. \end{aligned} \end{equation} Here we use a uniform grid of size $150 \times 150$ in the domain $(\xi,\eta)$, and the boundary condition is identical to the bow shock flow test in \cite{christlieb2018high}. The contour plots of pressure $p$ and norm of the magnetic field $\|\textbf{B}\|^2$ at $t=6$ are presented in Fig. \ref{example12} and Fig. \ref{example13}, respectively. We can see that both two schemes can simulate the bow shock flow well. \begin{figure}[htbp] \centering \subfigure[PL-WENO.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example12_1.png} \end{minipage}% }% \subfigure[NPL-WENO.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example13_1.png} \end{minipage}% } \centering \caption{Example \ref{ex41}: pressure of the bow shock flow at $t=6$. In (a)-(b), we use 16 contour lines between $0.4$ and $3.4$ are shown. } \label{example12} \end{figure} \begin{figure}[htbp] \centering \subfigure[PL-WENO.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example12_3.png} \end{minipage}% }% \subfigure[NPL-WENO.]{ \begin{minipage}[t]{0.5\linewidth} \centering \includegraphics[width=2.5in]{fig/example13_3.png} \end{minipage}% } \centering \caption{Example \ref{ex41}: $\|\textbf{B}\|^2$ of the bow shock flow at $t=6$. In (a)-(b), we use 20 contour lines between $0.002$ and $0.034$ are shown. } \label{example13} \end{figure} \subsubsection{Spatial discretization} Let us look at the physical domain first. For simplify, we use node $(i,j)$ to stand for the point $\left( x_{i,j}, y_{i,j}\right)=\left( x\left(\xi_i,\eta_j\right), y\left(\xi_i,\eta_j\right)\right)$. As shown in Fig. \ref{Fig1}, the area around node $(i,j)$ can be divided into four angular sectors, by the straight lines connecting $(i,j)$ and its surround nodes $(i\pm1,j)$ and $(i,j\pm1)$. For each quadrilateral, denoted by $T_m$, $m=1,\ldots,4$, we use $D_m=(\alpha,\beta)(\alpha=\pm,\beta=\pm)$ to indicate the positive/negative direction of $\xi$ and $\eta$, or the quadrilateral contains the nodes $(i\pm 1, j)$ and $(i,j\pm 1)$. For instance, $D_4=(+,-)$ means the region is enclosed with node $(i+1,j)$ and $(i,j-1)$. In the follows, for each node $(i,j)$, we order the four quadrilaterals $T_{m}$ counterclockwise, starting from $D_{1}=(+,+)$. See Fig. \ref{Fig1} as an example. Additionally, we define $T_5=T_1$ for notational convenience. \begin{figure}[htbp] \center{\includegraphics[width=8cm] {fig/fig12.png}} \caption{\label{Fig1} Node $(i,j)$ and its surrounding nodes. In this example, we have $\mathbf{D}_1=(+,+), \mathbf{D}_2=(-,+), \mathbf{D}_3=(-,-), \mathbf{D}_4=(+,-)$.} \end{figure} We will denote by $\phi_{i,j}$ the numerical approximation to the solution at node $(i,j)$. The equation \eqref{h-j c} can be solved by using a semi-discrete scheme \begin{align} \partial_\tau \phi_{i,j} + \widehat{H}\left( (\nabla \phi)^{1}_{i,j},(\nabla \phi)^{2}_{i,j},(\nabla \phi)^{3}_{i,j},(\nabla \phi)^{4}_{i,j} \right)=0. \end{align} Here, $(\nabla\phi)^{m}_{i,j}$ represents the numerical approximation of $\left(\{\partial _x\phi\},\{\partial _y\phi\}\right)$ (see \eqref{eq:curl_cureve}) at node $(i,j)$ in $T_m$. The monotone Hamiltonian for \eqref{h-j c} is given by \begin{equation}\label{monotone_Hamiltonian} \begin{aligned} \widehat{H}\left((\nabla \phi)^{1},(\nabla \phi)^{2},(\nabla \phi)^{3},(\nabla \phi)^{4}\right) =&H\left(\frac{1}{2\pi} \sum^{4}_{m=1}\theta_{m}(\nabla \phi)^{m} \right) -\left(x_\tau,y_\tau\right) \cdot \left(\frac{1}{2\pi} \sum^{4}_{m=1}\theta_{m}(\nabla \phi)^{m} \right)\\ -&\frac{\lambda}{\pi}\sum^4_{m=1}\gamma_{m+\frac{1}{2}} \left(\frac{(\nabla \phi)^{m}+(\nabla \phi)^{m+1}}{2}\right) \cdot \textbf{n}_{m+\frac{1}{2}}, \end{aligned} \end{equation} where, $\theta_m$ is the inner angle of sector $T_m$, and $\textbf{n}_{m+\frac{1}{2}}$ is the unit vector of the half-line $T_m \cap T_{m+1}$. The remaining variables are defined as follows, \begin{equation}\label{eq:parameter} \begin{aligned} &\gamma_{m+\frac{1}{2}}=\tan(\frac{\theta_m}{2})+\tan(\frac{\theta_{m+1}}{2}),\\ &\lambda = \max \left\{ \max_{\substack{A\leq u \leq B\\C\leq v \leq D}} \left|H_1(u,v)-x_\tau \right| , \max_{\substack{A\leq u \leq B\\C\leq v \leq D}} \left|H_2(u,v)-y_\tau \right|\right\}. \end{aligned} \end{equation} Here, $H_1$ and $H_2$ are the partial derivatives of $H$ with respect to $\partial _x \phi$ and $\partial _y \phi$, respectively. And $[A, B]$ is the value range of $ \{\partial_x \phi\}^m_{i,j} $ and $[C, D]$ is the value range of $ \{\partial_y \phi\}^m_{i,j}$ for all $i,j,m$ Next we will develop the high-order approximations for $(\nabla \phi)^{m}_{i,j}$. With the help of \eqref{eq:Jacobian} and \eqref{transform}, $\left(\{\partial _x\phi\},\{\partial _y\phi\}\right)$ can be rewritten as follows \begin{equation} \begin{aligned} \left(\{\partial _x\phi\},\{\partial _y\phi\}\right) =& \left( \partial _x \xi \, \partial _\xi \phi + \partial _x \eta \, \partial _\eta \phi, \, \partial _y \xi \, \partial _\xi \phi + \partial _y \eta\, \partial _\eta \phi \right) \\ =& \left( \frac{\partial_\xi \phi \, \partial_\eta y -\partial_\eta \phi \, \partial_\xi y} {\partial_\xi x \, \partial_\eta y -\partial_\eta x \, \partial_\xi y} , - \frac{\partial_\eta \phi \, \partial_\xi x -\partial_\xi \phi \, \partial_\eta x} {\partial_\xi x \, \partial_\eta y -\partial_\eta x \, \partial_\xi y} \right). \end{aligned} \end{equation} Suppose $\mathbf{D}_m=(\alpha,\beta)$. Then, we take \begin{align} (\partial _\xi \phi)^{m}_{i,j}= \partial _\xi \phi^{\alpha}_{i,j}, \quad (\partial _\eta \phi)^{m}_{i,j}=\partial _\eta \phi^{\beta}_{i,j}. \end{align} Here, $\partial _\xi \phi^{\pm}_{i,j}$ and $\partial _\eta \phi^{\pm}_{i,j}$ are obtained by the 1D WENO approximation, based on the one-point left/right-biased stencils in $\xi$- and $\eta$-direction, respectively. Formulas with fifth order accuracy are given in Appendix \ref{append2}. In general, at node$(i,j)$, the schemes of $\partial_\xi \phi^{\pm}_{i,j}$ and $\partial_\eta \phi^{\pm}_{i,j}$ have the following form, \begin{equation} \partial_\xi \phi^{\pm}_{i,j}= \sum^{q_1}_{l=-p_1} a^{\pm,l}_{i,j} \, \phi_{i+l,j}, \quad \partial_\eta \phi^{\pm}_{i,j}= \sum^{q_2}_{m=-p_2} b^{\pm,m}_{i,j} \, \phi_{i,j+m}, \end{equation} with $\displaystyle \sum^{q_1}_{l=-p_1} a^{\pm,l}_{i,j}=0$ and $\displaystyle \sum^{q_2}_{m=-p_2} b^{\pm,m}_{i,j}=0$. If $\phi$ is linear for $x$ and $y$, with form \begin{equation}\label{linear_function} \phi=C_1 \, x+C_2 \, y-H(C_1,C_2) \, t+C_3, \end{equation} and $C_1$, $C_2$ and $C_3$ are arbitrary constants, we can obtain that \begin{equation*}\label{scheme_for_linear} \begin{aligned} \partial_\xi \phi^\pm_{i,j}&= C_1 \, \sum^{q_1}_{l=-p_1} a^{\pm,l}_{i,j} \, x_{i+l,j} +C_2 \, \sum^{q_1}_{l=-p_1} a^{\pm,l}_{i,j} \, y_{i+l,j},\\ \partial_\eta \phi^\pm_{i,j}&= C_1 \, \sum^{q_2}_{m=-p_2} b^{\pm,m}_{i,j} \,x_{i,j+m} +C_2 \, \sum^{q_2}_{m=-p_2} b^{\pm,m}_{i,j} \,y_{i,j+m}. \end{aligned} \end{equation*} It's natural to notice that $\displaystyle\sum^{q_1}_{l=-p_1} a^{\pm,l}_{i,j} \, k_{i+l,j}$ and $\displaystyle \sum^{q_2}_{m=-p_2} b^{\pm,m}_{i,j} \, k_{i,j+m}$ are high order approximations of $\partial_\xi k$ and $\partial_\eta k$ at node $(i,j)$ respectively, where $k$ stands for $x$ or $y$. Denote \begin{equation}\label{scheme_for_metrics} \begin{array}{lll} \displaystyle \widehat{\partial_\xi x}^{\pm}_{i,j}=\sum^{q_1}_{l=-p_1} a^{\pm,l}_{i,j} \, x_{i+l,j},&& \displaystyle \widehat{\partial_\xi y}^{\pm}_{i,j} =\sum^{q_1}_{l=-p_1} a^{\pm,l}_{i,j} \, y_{i+l,j},\\ \displaystyle \widehat{\partial_\eta x}^{\pm}_{i,j}=\sum^{q_2}_{m=-p_2} b^{\pm,m}_{i,j} \, x_{i,j+m},&& \displaystyle \widehat{\partial_\eta y}^{\pm}_{i,j}=\sum^{q_2}_{m=-p_2} b^{\pm,m}_{i,j} \, y_{i,j+m}. \end{array} \end{equation} Therefore, we approximate the metric terms at $(i,j)$ in each $T_m$ by \begin{align}\label{eq:matric_form} (\partial_{\xi}k)^{m}_{i,j}=\widehat{\partial_\xi k}^{\alpha}_{i,j}, \quad (\partial_{\eta}k)^{m}_{i,j}=\widehat{\partial_\eta k}^{\beta}_{i,j}. \end{align} This means on each grid point, we do the WENO method to obtain $\displaystyle\partial_\xi \phi^{\pm}_{i,j}$ and $\displaystyle\partial_\eta \phi^{\pm}_{i,j}$ at first, and then use the nonlinear weights to simulate the metrics by \eqref{scheme_for_metrics}. Finally, we define the numerical approximations as \begin{equation}\label{approximation2} \begin{aligned} \{\partial _x \phi\}^{m}_{i,j} &=\frac {\partial_\xi \phi^\alpha_{i,j} \, \widehat{\partial_\eta y}^\beta_{i,j} -\partial_\eta \phi^\beta_{i,j} \, \widehat{\partial_\xi y}^\alpha_{i,j}} {\widehat{\partial_\xi x}^\alpha_{i,j} \, \widehat{\partial_\eta y}^\beta_{i,j} -\widehat{\partial_\eta x}^\beta_{i,j} \, \widehat{\partial_\xi y}^\alpha_{i,j}}, \quad \{\partial _y \phi\}^{m}_{i,j} = - \frac{\partial_\eta \phi^{\beta}_{i,j} \, \widehat{\partial_\xi x}^{\alpha}_{i,j} -\partial_\xi \phi^{\alpha}_{i,j} \, \widehat{\partial_\eta x}^{\beta}_{i,j} } {\widehat{\partial_\xi x}^\alpha_{i,j} \, \widehat{\partial_\eta y}^\beta_{i,j} -\widehat{\partial_\eta x}^\beta_{i,j} \, \widehat{\partial_\xi y}^\alpha_{i,j}} . \end{aligned} \end{equation} Moreover, when $\phi$ is given as \eqref{linear_function}, we can prove that \begin{equation*} \begin{aligned} \{\partial _x \phi \}^{m}_{i,j} &=\frac {\left(C_1 \, \widehat{\partial_\xi x}^{\alpha}_{i,j} +C_2 \, \widehat{\partial_\xi y}^{\alpha}_{i,j}\right) \, \widehat{\partial_\eta y}^{\beta}_{i,j} - \left(C_1 \, \widehat{\partial_\eta x}^{\beta}_{i,j}+C_2 \, \widehat{\partial_\eta y}^{\beta}_{i,j}\right) \, \widehat{\partial_\xi y}^{\alpha}_{i,j}} {\widehat{\partial_\xi x}^\alpha_{i,j} \, \widehat{\partial_\eta y}^\beta_{i,j} -\widehat{\partial_\eta x}^\beta_{i,j} \, \widehat{\partial_\xi y}^\alpha_{i,j}} =C_1. \\ \{\partial _y \phi\}^{m}_{i,j} &= - \frac{ \left(C_1 \, \widehat{\partial_\eta x}^{\beta}_{i,j}+C_2 \, \widehat{\partial_\eta y}^{\beta}_{i,j}\right) \, \widehat{\partial_\xi x}^{\alpha}_{i,j} -\left(C_1 \, \widehat{\partial_\xi x}^{\alpha}_{i,j} +C_2 \, \widehat{\partial_\xi y}^{\alpha}_{i,j}\right) \, \widehat{\partial_\eta x}^{\beta}_{i,j} } {\widehat{\partial_\xi x}^\alpha_{i,j} \, \widehat{\partial_\eta y}^\beta_{i,j} -\widehat{\partial_\eta x}^\beta_{i,j} \, \widehat{\partial_\xi y}^\alpha_{i,j}} = C_2. \end{aligned} \end{equation*} Therefore, according to the consistence of this monotone Hamiltonian \cite{abgrall1996numerical}, we have \begin{equation}\label{linear_condtion_spatial} \widehat{H}\left((\nabla \phi)^{1},(\nabla \phi)^{2},(\nabla \phi)^{3},(\nabla \phi)^{4}\right) =H(C_1,C_2)-(C_1,C_2) \cdot(\partial _\tau x_{i,j} ,\partial _\tau y_{i,j}). \end{equation} It's obviously that condition (\ref{linear_condtion_spatial}) is enough to preserve linear solution exactly for stationary meshes ($\partial_{\tau}x=\partial_{\tau}y=0$). But for moving meshes, the discrete schemes of $\partial _\tau x$ and $\partial _\tau y$ should be consistent with time integration scheme. \subsubsection{Temporal derivatives} For simplicity, we will start with the Euler forward method at first, \begin{align} \phi_{i,j}^{n+1} = \phi_{i,j}^{n} - \Delta \tau \, \widehat{H}\left( (\nabla \phi)^{1}_{i,j}, (\nabla \phi)^{2}_{i,j}, (\nabla \phi)^{3}_{i,j}, (\nabla \phi)^{4}_{i,j} \right). \end{align} \noindent In particular, suppose $\phi$ satisfies the linear solution (\ref{linear_function}) at $\tau=\tau_n$ exactly, $$\phi_{i,j}^{n}=\phi(x^{n}_{i,j},y^{n}_{i,j},\tau_n)=-\tau_n H(C_1,C_2)+(C_1,C_2) \cdot (x^{n}_{i,j},y^{n}_{i,j}) + C_3.$$ To ensure this is still true for $\phi^{n+1}_{i,j}$ \begin{align*} \phi_{i,j}^{n+1} &=\phi(x^{n+1}_{i,j},y^{n+1}_{i,j},\tau_{n+1})=-\tau_{n+1} H(C_1,C_2)+(C_1,C_2) \cdot (x^{n+1}_{i,j},y^{n+1}_{i,j}) + C_3\\ &=-\tau_n H(C_1,C_2)+(C_1,C_2) \cdot (x^{n}_{i,j},y^{n}_{i,j}) + C_3 \\ & + \Delta \tau\left(- H(C_1,C_2) + (C_1,C_2) \cdot (\frac{x^{n+1}_{i,j}-x^{n}_{i,j}}{\Delta \tau}, \frac{y^{n+1}_{i,j}-y^{n}_{i,j}}{\Delta \tau}) \right), \end{align*} \noindent we can set the time derivative $(x_\tau,y_\tau)$ at $\tau_n$ as \begin{equation} \begin{aligned} (\widehat{\partial _\tau x}^n_{i,j} ,\widehat{\partial _\tau y}^n_{i,j}) = ( \frac{x(\xi_{i},\eta_{j},\tau_{n+1})-x(\xi_{i},\eta_{j},\tau_{n})}{\Delta\tau}, \frac{y(\xi_{i},\eta_{j},\tau_{n+1})-y(\xi_{i},\eta_{j},\tau_{n})}{\Delta\tau} ). \end{aligned} \end{equation} Extension to the third-order TVD Runge-Kutta method \eqref{eq:RK3} is straightforward, since the schemes are convex combinations of Euler forward steps. \begin{equation} \begin{aligned} (\widehat{\partial _\tau x}^n_{i,j} ,\widehat{\partial _\tau y}^n_{i,j}) =& \frac{1}{\Delta \tau}\left(x_{i, j}^{(1)}-x_{i, j}^{n} , y_{i, j}^{(1)}-y_{i, j}^{n}\right), \\ (\widehat{\partial _\tau x}^{(1)}_{i,j} ,\widehat{\partial _\tau y}^{(1)}_{i,j}) =& \frac{1}{\Delta \tau} \left( 4 x_{i, j}^{(2)}-3 x_{i, j}^{n} - x_{i, j}^{(1)} , 4 y_{i, j}^{(2)}-3 y_{i, j}^{n} - y_{i, j}^{(1)} \right), \\ (\widehat{\partial _\tau x}^{(2)}_{i,j} ,\widehat{\partial _\tau y}^{(2)}_{i,j}) =& \frac{1}{\Delta \tau} \left( 3 x_{i, j}^{n+1} - x_{i, j}^{n} - 2 x_{i, j}^{(2)} , 3 y_{i, j}^{n+1} - y_{i, j}^{n} - 2 y_{i, j}^{(2)} \right), \end{aligned} \end{equation} where, $\gamma_{i, j}^{(1)}=\gamma(\xi_{i},\eta_{j},\tau_{n}+\Delta \tau)$, $\gamma_{i, j}^{(2)}=\gamma(\xi_{i},\eta_{j},\tau_{n}+1/2\Delta \tau)$, and $\gamma$ stands for $x$ or $y$. \subsection{Algorithm} We summarize this framework below. We write the semi-discrete form of MHD equations (\ref{mhd_semi-discrete}) as \begin{equation}\label{semi_dis_mhd} \widetilde{\textbf{q}}'\left(\tau\right) =\mathcal{L} \left( \widetilde{\textbf{q}} \left(\tau\right) \right), \end{equation} where $\widetilde{\textbf{q}}=J^{-1} \left(\rho,\rho\textbf{u},E,\textbf{B}\right)$. And the evolution equation of the magnetic potential (\ref{ct}) in semi-discrete form is \begin{equation}\label{semi_dis_ct} A\left(\tau\right) =\mathcal{H}\left(A\left(\tau\right),\textbf{u}\left(\tau\right)\right). \end{equation} A single time-step from time $\tau=\tau_n$ to time $\tau=\tau_{n+1}$ with Euler forward consists of the following sub-steps: \begin{itemize} \item [(0)] Start with $\widetilde{\textbf{q}}^n$ and $A^{n}$ (the solutions at $\tau _n$). \item [(1)] Build the right-hand sides of systems (\ref{semi_dis_mhd}) and (\ref{semi_dis_ct}) with WENO methods. Note that the metric terms in $\mathcal{L}\left(\widetilde{\textbf{q}}^n\right)$ are obtained by \eqref{eq:matric_linear}, while the terms in $\mathcal{H}\left(A^n,\textbf{u}^n\right)$ are obtained by \eqref{scheme_for_metrics}. \item[(2)] Update each system independently: \begin{align*} \widetilde{\textbf{q}}^{*} &=\widetilde{\textbf{q}}^n+\Delta \tau \mathcal{L}\left(\widetilde{\textbf{q}}^n\right),\\ A^{n+1} &=A^{n} +\Delta \tau \mathcal{H}\left(A^n,\textbf{u}^n\right), \end{align*} where $\textbf{q}^*=1/J^{n+1} \left(\rho^{n+1},\rho\textbf{u}^{n+1},E^*,\textbf{B}^*\right)$. $\textbf{B}^*$ is the predicted magnetic field that in general does not satisfy a discrete divergence-free constraint and $E^*$ is the predicted energy. \item [(3)] Replace $\textbf{B}^*$ by a discrete curl of the magnetic potential $A^{n+1}$: \begin{equation}\label{eq:discrete} \begin{aligned} (B_1)^{n+1}_{i,j} =& J^{n+1}_{i,j} \left( -( \partial _\eta x )^{n+1}_{i,j} \, (\partial _\xi A)^{n+1}_{i,j} + ( \partial _\xi x)^{n+1}_{i,j} \, (\partial _\eta A)^{n+1}_{i,j} \right) , \\ (B_2)^{n+1}_{i,j} =& J^{n+1}_{i,j} \left( -( \partial _\eta y)^{n+1}_{i,j} \, (\partial _\xi A)^{n+1}_{i,j} + ( \partial _\xi y)^{n+1}_{i,j} \, (\partial _\eta A)^{n+1}_{i,j} \right) . \end{aligned} \end{equation} Here, we only use the sixth-order central differences in the constrained transport step \begin{equation} \begin{aligned} \partial_{\xi} k_{i,j} \approx \frac{1}{60\Delta \xi} \left(- k_{i-3, j}+9 k_{i-2, j} -45 k_{i-1, j} +45 k_{i+1, j} -9 k_{i+2, j} + k_{i+3, j} \right), \\ \partial_{\eta} k_{i,j}\approx \frac{1}{60 \Delta \eta} \left(- k_{i, j-3} +9 k_{i, j-2} -45 k_{i, j-1} +45 k_{i, j+1} -9 k_{i, j+2} + k_{i, j+3}\right), \end{aligned} \end{equation} where $k$ stands for $A$, $x$ and $y$. \item [(4)] Set the corrected total energy density $E^{n+1}$. Here, we keep the pressure the same before and after the magnetic field correction step: \begin{align*} E^{n+1}= E^{*}+\frac{1}{2}\left(\Vert{\textbf{B}^{n+1}}\Vert ^2-\Vert\textbf{B}^*\Vert ^2 \right), \end{align*} with $\|\textbf{B}\|^2 = B_1^2 + B_2^2 + B_3^2$. \end{itemize} We want to remark that when $\phi$ is the linear function \eqref{linear_function}, the discretization \eqref{eq:discrete} can give $B_1$ and $B_2$ exactly. On the other hand, we note that while such discretization only guarantees the divergence free condition of magnetic field to truncation errors on general curvilinear meshes. In \cite{christlieb2018high}, authors found this is sufficient to suppress the unphysical oscillations associated with the divergence error of $\textbf{B}$. \section{Numerical approach} In this section, we describe the construction of high order numerical methods to the governing equations. For time integration, we will use the third-order total-variation-diminishing (TVD) Runge-Kutta scheme for ordinary differential equation $u_\tau=L(u)$: \begin{equation} \label{eq:RK3} \begin{aligned} u^{(1)} =& u^n + \Delta \tau L(u^{n}),\\ u^{(2)} =& \frac{1}{4} u^n + \frac{3}{4} \left( u^{(1)} +\Delta \tau L(u^{(1)}) \right),\\ u^{n+1}=& \frac{1}{3} u^n + \frac{2}{3} \left( u^{(2)} +\Delta \tau L(u^{(2)}) \right). \end{aligned} \end{equation} \noindent Here, we will focus on the spatial discretization and the matrix terms. Firstly, we give a brief description of the scheme for solving hyperbolic conservation systems, which can preserve the free-stream property. Then we deduce a novel numerical scheme for general H-J equations which can hold the linear solution exactly in arbitrary curvilinear meshes, even for moving mesh depending on time. The computational domain is divided uniformly, with grid $\xi_i=i \Delta \xi$ and $\eta_j=j\Delta \eta$. \subsection{The numerical scheme for the ideal MHD equations} The ideal MHD equations in the curvilinear coordinates have a conservative form (\ref{h-c-l-curvilinear}), which is solved by a semi-discrete conservative finite difference scheme \begin{equation}\label{mhd_semi-discrete} \partial_{\tau} \widetilde{\textbf{q}}_{i,j}= - \frac{1}{\Delta \xi} \left( \widehat{\textbf{f}}_{i+1/2,j} - \widehat{\textbf{f}}_{i-1/2,j} \right) - \frac{1}{\Delta \eta} \left( \widehat{\textbf{g}}_{i,j+1/2} - \widehat{\textbf{g}}_{i,j-1/2} \right). \end{equation} \noindent Here, $\widetilde{\textbf{q}}_{i,j}(\tau)$ is the numerical approximation to the point value $\widetilde{\textbf{q}}\left(\xi_{i}, \eta_{j}, \tau \right)$, and $\widehat{\textbf{f}}_{i+1/2,j}$ and $\widehat{\textbf{g}}_{i,j+1/2}$ are numerical fluxes sitting at the half points $\left(\xi_{i+1/2},\eta_{j}\right)$ and $\left(\xi_{i},\eta_{j+1/2}\right)$ respectively, satisfying \begin{subequations} \begin{align} \label{eq:order_conser_xi} & \frac{1}{\Delta \xi} \left( \widehat{\textbf{f}}_{i+1/2,j} - \widehat{\textbf{f}}_{i-1/2,j} \right) = \partial_{\xi} \widetilde{\textbf{f}}|_{i,j} + \mathcal{O}(\Delta \xi^k), \\ \label{eq:order_conser_eta} & \frac{1}{\Delta \eta} \left( \widehat{\textbf{g}}_{i,j+1/2} - \widehat{\textbf{g}}_{i,j-1/2} \right)=\partial_{\eta} \widetilde{\textbf{g}}|_{i,j} + \mathcal{O}(\Delta \eta^k). \end{align} \end{subequations} In this work, we employ the numerical method introduced in \cite{christlieb2018high}, which based on an alternative formulation of the finite difference WENO scheme \cite{shu1988efficient, jiang2013alternative, jiang2014free}. In this framework, a high order WENO interpolation procedure is applied to the solution $\{\widetilde{\textbf{q}}\}$ rather than to the flux functions For a multi-dimensional problem, the numerical fluxes can be obtained in a dimension-by-dimension fashion. Here, we take $\widehat{\textbf{f}}$ as an example, \begin{equation}\label{flux} \widehat{\textbf{f}}_{i+1/2,j}= \widetilde{\textbf{f}}_{i+1/2,j} +\sigma_{i+1/2,j} \left( -\frac{1}{24}\Delta \xi^2 \frac{\partial ^2\widetilde{\textbf{f}}}{\partial \xi^2}|_{i+1/2,j}+ \frac{7}{5760}\Delta \xi^4 \frac{\partial ^4\widetilde{\textbf{f}}}{\partial \xi^4}|_{i+1/2,j}\right), \end{equation} which gives fifth order accuracy in \eqref{eq:order_conser_xi}. $\sigma_{i+1/2,j}$ is a filter to control numerical oscillations and will be defined later Likewise, the construction of numerical flux $\widetilde{\textbf{g}}_{i,j+1/2}$ can follow the similar idea in $\eta$-direction. The first term of the numerical flux (\ref{flux}) is approximated by \begin{equation} \widetilde{\textbf{f}}_{i+1/2,j}=h \left( \textbf{q}^-_{i+1/2,j}, \textbf{q}^+_{i+1/2,j} \right), \end{equation} where, the values $\textbf{q}^{\pm}_{i+1/2,j}$ obtained by a WENO interpolation on $\textbf{q}$ in curvilinear coordinates $(\xi, \eta)$ in the $\xi$-direction for fixed $j$. Formulas of a fifth-order WENO interpolation are given in Appendix \ref{sec:WENO}. The two-argument numerical function $h$ is an exact or approximate Riemann solver. In particular, the Lax-Friedrichs flux is used in this work \begin{align*} h \left( \textbf{q}^-, \textbf{q}^+ \right) = \frac{1}{2} \left( \, \widetilde{\textbf{f}}(\textbf{q}^-) + \widetilde{\textbf{f}}(\textbf{q}^+) -\alpha ( \textbf{q}^+ - \textbf{q}^-)\right), \end{align*} where, $\alpha=\max_{1\leq l \leq 8} |\lambda_{l}(\textbf{q})|$ taken over the relevant range of $\textbf{q}$, and $\lambda_{l}(\textbf{q})$ are the eigenvalues of the Jacobian $\partial\widetilde{\textbf{f}} / \partial\textbf{q}$, which can be found in \cite{christlieb2018high}. The remaining higher order terms in (\ref{flux}) are constructed by central differences, \begin{equation} \label{eq:high_order_terms} \begin{aligned} \Delta \xi^2 \frac{\partial ^2\widetilde{\textbf{f}}}{\partial \xi^2}|_{i+1/2,j}&= \frac{1}{48} \left( - 5 \, \widetilde{\textbf{f}}_{i-2,j} + 39 \, \widetilde{\textbf{f}}_{i-1,j} - 34 \, \widetilde{\textbf{f}}_{i,j} - 34 \, \widetilde{\textbf{f}}_{i+1,j} + 39 \, \widetilde{\textbf{f}}_{i+2,j} - 5 \, \widetilde{\textbf{f}}_{i+3,j}\right),\\ \Delta \xi^4 \frac{\partial ^4\widetilde{\textbf{f}}}{\partial \xi^4}|_{i+1/2,j}&= \frac{1}{2} \left( \widetilde{\textbf{f}}_{i-2,j} -3 \, \widetilde{\textbf{f}}_{i-1,j} +2 \, \widetilde{\textbf{f}}_{i,j} +2 \, \widetilde{\textbf{f}}_{i+1,j} -3 \, \widetilde{\textbf{f}}_{i+2,j} + \widetilde{\textbf{f}}_{i+3,j}\right). \end{aligned} \end{equation} Both approximations give a truncation error of $\mathcal{O} (\Delta \xi^6)$, which guarantees a fifth-order accuracy of the numerical flux \eqref{flux}. Previous work \cite{jiang2013alternative, jiang2014free} showed that the numerical flux \eqref{flux} with $\sigma=1$ has a good performance of the compressible Euler equations in hydrodynamics. However, \cite{christlieb2018high} found that for the ideal MHD equations, an extra limiter $\sigma$ is necessary to switch the high-order numerical flux to a first-order flux near a strong discontinuity, since the linear approximations for high order terms \eqref{eq:high_order_terms} may cause oscillations . The filter $\sigma$ is carefully designed with the following property, \begin{align} \sigma_{i+1/2,j}= \left\{ \begin{array}{ll} 1+ O \left(\Delta \xi^3 \right), & \text{when \textbf{q} is smooth in the stencil $\{(\xi_{i-2},\eta_j), \ldots, (\xi_{i+3},\eta_j)\}$}, \\ O \left(\Delta \xi^2 \right), & \text{when \textbf{q} contains a strong discontinuity in the stencil.}\\ \end{array} \right. \end{align} Hence, the numerical flux \eqref{flux} can retain high-order accuracy in smooth regions, while control the oscillations around discontinuities. The detailed formulation of $\sigma$ can be found in \cite{christlieb2018high}. In particular, when $\textbf{q}$ are constants, we can easily prove that $\sigma=1$ always holds. In this case, the flux formula \eqref{flux} degenerates to the one used for the compressible Euler equations in hydrodynamics \cite{jiang2013alternative, jiang2014free}. Moreover, \cite{jiang2014free} showed that if we take the metrics at half points as follows, \begin{equation} \label{eq:matric_linear} \begin{aligned} & \partial_{\xi}\gamma|_{i+1/2, j} = \frac{1}{256 \Delta \xi } \left( 3 \gamma_{i-2,j} -25\gamma_{i-1,j} +150\gamma_{i,j} + 150\gamma_{i+1,j} -25\gamma_{i+2,j} +3\gamma_{i+3,j}\right) , \\ & \partial_{\eta}\gamma|_{i, j+1/2} = \frac{1}{256 \Delta \eta} \left( 3 \gamma_{i,j-2} -25\gamma_{i,j-1} +150\gamma_{i,j} + 150\gamma_{i,j+1} -25\gamma_{i,j+2} +3\gamma_{i,j+3}\right) , \end{aligned} \end{equation} where $\gamma$ stands for $x$ and $y$, then finite difference WENO schemes with alternative formulation can preserve $I_x=I_y=0$ in \eqref{eq:SCL} exactly. Hence, the proposed scheme \eqref{flux} can preserve free-stream scheme on stationary curvilinear mesh. Furthermore, for moving meshes, we simply invoke the identity $I_t=0$ to evaluate $(J^{-1})_{\tau}$, i.e., \begin{align} (J^{-1})_{\tau} =- \partial_{\xi} \left( \partial _{\tau} y \, \partial _{\eta} x - \partial _{\tau} x \, \partial _{\eta} y \right) - \partial_{\eta} \left( \partial _{\tau} x \, \partial _{\xi} y -\partial _\tau y \, \partial _\xi x \right) . \end{align} Here, we use the linear scheme \eqref{eq:matric_linear} for spatial derivatives. And the temporal ones $(\partial _{\tau} x, \partial _{\tau} y)$ can be set as the exact derivatives or any numerical approach. Therefore, the free-stream conditions can be maintained in generalized curvilinear coordinate systems. \subsection{The numerical scheme for constrained transport equation} In the previous work \cite{christlieb2018high}, the evolution equation \eqref{eq:CT_curve} is solved by a standard finite difference WENO method designed for H-J equations \cite{jiang2000weighted}, in which $A$ was treated as a function of $(\xi , \eta )$, and solved in a dimension-by-dimension fashion in the computational domain. Unfortunately, it can be proved that the standard WENO schemes could preserve the linear-function condition in the Cartesian coordinate system, but not in the generalized coordinate system. This {\color{red}is} because $A$ may be not linear for $\xi$ or $\eta$ in generalized coordinates, and the non-exact cancellations from nonlinear reconstructions will break the linear property. In the following part, we will propose a novel numerical schemes for H-J equation on curvilinear coordinates, in which we will approximate $\partial_x\phi$ and $\partial_y\phi$ in computational domain, and employ the Lax-Friedrichs type monotone Hamiltonian for arbitrary unstructured mesh developed by Abgrall in \cite{abgrall1996numerical}. In additional, the metrics are carefully designed such that the scheme can preserve the linear function exactly.
\section{Introduction} The GKS game is a three-player game where two players, Alice and Bob, play as a team against their opponent Merlin. The game has two natural parameters $n,k$. In the first phase of the game Merlin and Alice fill an initially empty string $x$ of length $n$ with bits in the following fashion: First Merlin arbitrarily picks a permutation of the set $\{1,2,\dots,n\}$. Then he sends indices $1,2,\dots, n$ one-by-one in the chosen order to Alice. Once Alice receives an index $i$, she immediately has to pick a bit to fill the $i$th position in the string, that is she chooses $x_i$. This goes on until only one empty position is left, that position is filled by Merlin, not Alice. We will commonly refer to this bit as the last bit. The now-filled string is sent to Bob, whose goal is to determine the position filled by Merlin. To this end Bob chooses a set $S$ of $k$ natural numbers. Alice and Bob win if $S$ contains the position filled by Merlin, otherwise Merlin wins. Alice and Bob can communicate before the game starts but cannot communicate during the play. A winning strategy for Alice and Bob in the $(k,n)$-game is called \emph{a $(k,n)$-strategy}. The minimal $k$ for which there is a $(k,n)$-strategy is called \emph{the cost of the $n$-game}. The following proposition is very important for the study of the strategies for the GKS game: \begin{proposition}\label{p1} If there are a $(k, n)$-strategy and a $(k', n')$-strategy, then there exists a $(kk', nn')$-strategy. \end{proposition} The proof of this proposition can be found in [2]. This result allows to use $(k,n)$-strategies constructed for small values of $n$ to obtain upper bounds for the cost of the $n$-game for arbitrary $n$. More precisely, if a $(K,N)$-strategy exists, then the cost of the $n$-game is $O(n^{\log_NK})$, where the constant hidden in O-notation depends on $K,N$. Szegedy proved a $O(n^{0.4732})$ upper bound using $(5,30)$-strategy [2]. Ingram's $O(n^{0.4696})$ bound is derived from a $(11,165)$-strategy [3]. \section{Results} \begin{theorem}\label{t2} There exists a $(9,108)$-strategy. \end{theorem} \begin{proof} The proof relies heavily on a table that is presented in Appendix A and was found by a computer search. This table consists of 220 binary strings of length 12. We call those strings \emph{codewords}. In every codeword three positions are underlined, all those positions contain ones. An important property of the table is that every possible combination of three underlined positions out of $\binom{12} 3 = 220$ combinations appears exactly once. Another property that is important for us is the following: \begin{proposition}\label{p3} Let x and y be different codewords. Let $x'$ and $y'$ be strings obtained from $x$ and $y$, respectively, by flipping at most one non-underlined bit. Then $x' \ne y'$. \end{proposition} Informally this property can be understood as follows: the code corrects one error provided it appears in a non-underlined position. This is where our construction differs from that proposed by Ingram [3], who used Hamming codes that correct one error (in any position). Unfortunately, it is rather difficult to verify this property by hand and we cannot provide any proof of this fact. We verified this property by a computer program. The table itself was also found by that program. We will now construct a $(9,108)$-strategy. First, Alice divides the string of length 108 into 9 blocks of length 12. Alice then fills each block independently from other blocks as follows: 1. The three first received positions in each block are filled by ones. 2. Once those three positions are filled, find the (unique) codeword in which those three positions are underlined and assign this codeword to the block. 3. The remaining positions except the last one are filled as in the assigned codeword. 4. The last position is filled so that the resulting block \emph{differs} from the assigned codeword. Observe that every block completed by Alice alone is a codeword with one error in a non-underlined position. From Proposition 3 we can conclude that every such block is different from each codeword. So Bob can receive two kinds of strings: 1. Either the received string has a block which is a codeword. In that case Bob knows that this block contains the last filled position and that that position is not underlined. Thus, he forms the set of 9 non-underlined positions in that block. 2. Or, there is no such block in the received string, that is, all the blocks are codewords with one error, and that error occurs in a non-underlined position. Then, due to Proposition~\ref{p3}, for each block Bob can find the assigned codeword and the position of error, that position was filled last. The set of those positions has size 9 and contains the last bit. In both cases Bob can find a set of 9 positions containing the last bit. \end{proof} \begin{corollary} The cost of a GKS game is less then $O(n^{\log_{108}9})=O(n^{0.4693})$ \end{corollary} This bound is derived by applying Proposition~\ref{p1} to Theorem~\ref{t2}.
\section{Introduction} Hermitian modular forms of degree $n \in \mathbb{N}$ are modular forms that transform under an action of the split-unitary group $\mathrm{SU}(n,n;\mathcal{O})$ with entries in some order $\mathcal{O}$ in an imaginary-quadratic number field. Through the natural embedding of $\mathrm{SU}(n,n;\mathcal{O})$ in $\mathrm{Sp}_{4n}(\mathbb{Z})$, the Shimura variety attached to $\mathrm{SU}(n,n;\mathcal{O})$ parameterizes certain principally polarized $(2n)$-dimensional abelian varieties, namely the abelian varieties $A$ of \emph{Weil type}, i.e. admitting multiplication by $\mathcal{O}$ in such a way that the eigenvalues of $\mathcal{O}$ acting on $A$ occur in complex-conjugate pairs. (These were investigated by Weil in connection with the Hodge conjecture; see for example the discussion in \cite{LPS}, which also explains the connection to orthogonal Shimura varieties when $n=2$.) To study such objects it is helpful to have coordinates on the moduli space; in other words, generators for graded rings of Hermitian modular forms. In \cite{DK1}, \cite{DK2}, Dern and Krieg began a program to compute these rings in degree $n=2$ based on Borcherds' \cite{B} theory of orthogonal modular forms with Heegner divisors (and the exceptional isogeny from $\mathrm{SU}(2,2)$ to $\mathrm{SO}(2,4)$). In particular they give an explicit description of the modular fourfolds associated to $\mathrm{SU}(2,2,\mathcal{O})$ where $\mathcal{O}$ is the maximal order in $\mathbb{Q}(\sqrt{-3})$ and $\mathbb{Q}(\sqrt{-1})$ (where the fourfold is rational) and in $\mathbb{Q}(\sqrt{-2})$ (where it is not). The contribution of this note is to carry out these computations for the imaginary-quadratic fields of the smallest two remaining discriminants: $\mathbb{Q}(\sqrt{-7})$ and $\mathbb{Q}(\sqrt{-11})$. The rough idea of \cite{DK1}, \cite{DK2} is similar to the well-known computation of the ring of elliptic modular forms, $M_{\ast}(\mathrm{SL}_2(\mathbb{Z})) = \mathbb{C}[E_4,E_6]$. The Riemann-Roch theorem (in the form of the ``$k/12$ formula'') shows that every modular form of weight not divisible by $6$ has a zero at the elliptic point $\rho = e^{2\pi i / 3}$, and that the Eisenstein series $E_4$ and $E_6$ have no zeros besides a simple zero at $\rho$ and at $i$ (and their conjugates under $\mathrm{SL}_2(\mathbb{Z})$), respectively. Now every form in $M_{\ast}(\mathrm{SL}_2(\mathbb{Z}))$ of weight not a multiple of $6$ is divisible by $E_4$, and every form of weight $6k$ becomes divisible by $E_4$ after subtracting some scalar multiple of $E_6^k$. The claim follows by induction on the weight, together with the fact that modular forms of weight $k \le 0$ are constant. In the $\mathrm{SU}(2,2)$ case the role of $E_4$ above is played by a Borcherds product; the elliptic point $\rho$ is replaced by the Heegner divisors; and the evaluation at $\rho$ is replaced by the pullbacks, which send Hermitian modular forms to Siegel paramodular forms of degree two. With increasing dimension and level, the Heegner divisors which occur as divisors of modular forms are more complicated and the pullback maps to Heegner divisors are rarely surjective. To overcome these issues our basic argument is as follows. We construct Hermitian modular forms (Eisenstein series, theta lifts, pullbacks from $\mathrm{O}(2,5)$, theta series, etc; here, theta lifts and Borcherds products turn out to be sufficient) and compute their pullbacks to paramodular forms. At the same time we use the geometry of the Hermitian modular fourfold (in particular the intersections of special divisors) to constrain the images of the pullback maps, with the goal of determining sufficiently many images completely. There seems to be no reason in general to believe that this procedure will succeed, and as the discriminant of the underlying field increases it certainly becomes more difficult; however, when this computation does succeed it is straightforward to determine the complete ring structure. This note is organized as follows. In section 2 we review Hermitian and orthogonal modular forms, theta lifts and pullbacks. In section 3 we recall the structure of the graded rings of paramodular forms of degree two and levels $1,2,3$. In sections 4 and 5 we compute the graded rings of Hermitian modular forms for the rings of integers of $\mathbb{Q}(\sqrt{-7})$ and $\mathbb{Q}(\sqrt{-11})$ by reducing against distinguished Borcherds products of weight $7$ and $5$, respectively. (The ideal of relations for $\mathbb{Q}(\sqrt{-11})$ is complicated and left to an auxiliary file.) In section 6 we compute the dimensions of spaces of Hermitian modular forms. \textbf{Acknowledgments.} I am grateful to Jan H. Bruinier, Aloys Krieg and John Voight for helpful discussions. \section{Preliminaries} In this section we review some facts about Hermitian modular forms of degree two and the related orthogonal modular forms. For a more thorough introduction the book \cite{K} and the dissertation \cite{Dern} are useful references. \subsection{Hermitian modular forms of degree two} Let $\mathbf{H}_2$ denote the Hermitian upper half-space of degree two: the set of complex $(2 \times 2)$-matrices $\tau$ for which, after writing $\tau = x + iy$ where $x = \overline{x}^T$ and $y = \overline{y}^T$, the matrix $y$ is positive-definite. The split-unitary group $$\mathrm{SU}_{2,2}(\mathbb{C}) = \Big\{ M \in \mathrm{SL}_4(\mathbb{C}): \; M^T J \overline{M} = J \Big\}, \; \; J = \begin{psmallmatrix} 0 & 0 & -1 & 0 \\ 0 & 0 & 0 & -1 \\ 1 & 0 & 0 & 0 \\ 0 & 1 & 0 & 0 \end{psmallmatrix}$$ acts on $\mathbf{H}_2$ by M\"obius transformations: $$M \cdot \tau = (a \tau + b)(c \tau + d)^{-1}, \; \; M = \begin{psmallmatrix} a & b \\ c & d \end{psmallmatrix} \in \mathrm{SU}_{2,2}(\mathbb{C}), \; \tau \in \mathbf{H}_2.$$ Fix an order $\mathcal{O}$ in an imaginary-quadratic number field $K$. A \textbf{Hermitian modular form} of weight $k \in \mathbb{N}_0$ (and degree two) is a holomorphic function $F : \mathbf{H}_2 \rightarrow \mathbb{C}$ which satisfies $$F(M \cdot \tau) = \mathrm{det}(c \tau + d)^k F(\tau) \; \text{for all} \; M = \begin{psmallmatrix} a & b \\ c & d \end{psmallmatrix} \in \mathrm{SU}_{2,2}(\mathcal{O}) \; \text{and} \; \tau \in \mathbf{H}_2.$$ Note that $F$ extends holomorphically to the Baily-Borel boundary (i.e. Koecher's principle) as this contains only components of dimension $1$ and $0$. \textbf{Cusp forms} of weight $k$ are modular forms which tend to zero at each one-dimensional cusp: that is, modular forms $f$ for which $$\lim_{y \rightarrow \infty} \Big( f \Big|_k M \Big)(iy) = 0 \; \text{for all} \; M \in \mathrm{SU}_{2,2}(K).$$ \subsection{Orthogonal modular forms and Hermitian modular forms} Suppose $\Lambda = (\Lambda,Q)$ is an $\ell$-dimensional positive-definite even lattice; that is, $\Lambda$ is a free $\mathbb{Z}$-module of rank $\ell$ and $Q$ is a positive-definite quadratic form on $\Lambda \otimes \mathbb{R}$ taking integral values on $\Lambda$. One can define an upper half-space $$\mathbb{H}_{\Lambda} = \{(\tau,z,w): \; \tau,w \in \mathbb{H}, \; z \in \Lambda \otimes \mathbb{C} , \; Q(\mathrm{im}(z)) < \mathrm{im}(\tau) \cdot \mathrm{im}(w)\} \subseteq \mathbb{C}^{\ell + 2}.$$ This is acted upon by $\mathrm{SO}^+(\Lambda \oplus \mathrm{II}_{2,2})$ (the connected component of the identity) by M\"obius transformations. To make this explicit it is helpful to fix a Gram matrix $\mathbf{S}$ for $Q$ and realize $\mathrm{SO}^+(\Lambda \oplus II_{2,2})$ as a subgroup of those matrices which preserve the block matrix $\begin{psmallmatrix} 0 & 0 & 0 & 0 & 1 \\ 0 & 0 & 0 & 1 & 0 \\ 0 & 0 & \mathbf{S} & 0 & 0 \\ 0 & 1 & 0 & 0 & 0 \\ 1 & 0 & 0 & 0 & 0 \end{psmallmatrix} \in \mathbb{Z}^{6 \times 6}$ under conjugation. For such a matrix $M$ and $(\tau,z,w) \in \mathbb{H}_{\Lambda}$, one can define $M \cdot (\tau,z,w) = (\tilde \tau, \tilde z, \tilde w) \in \mathbb{H}_{\Lambda}$ by $$M \begin{psmallmatrix} Q(z) - \tau w \\ \tau \\ z \\ w \\ 1 \end{psmallmatrix} = j(M;\tau,z,w) \begin{psmallmatrix} Q(\tilde z) - \tilde \tau \tilde w \\ \tilde \tau \\ \tilde z \\ \tilde w \\ 1 \end{psmallmatrix} \; \text{for some} \; j(M;\tau,z,w) \in \mathbb{C}^{\times}.$$ The \textbf{orthogonal modular group} $\Gamma_{\Lambda}$ is the discriminant kernel of $\Lambda \oplus \mathrm{II}_{2,2}$; that is, the subgroup of $\mathrm{SO}^+(\Lambda \oplus \mathrm{II}_{2,2})$ which acts trivially on $\Lambda'/\Lambda$. An \textbf{orthogonal modular form} is then a holomorphic function $f : \mathbb{H}_{\Lambda} \rightarrow \mathbb{C}$ which satisfies $$f(M \cdot (\tau,z,w)) = j(M;\tau,z,w)^k f(\tau,z,w)$$ for all $M \in \Gamma_{\Lambda}$ and $(\tau,z,w) \in \mathbb{H}_{\Lambda}$. (There is again a boundedness condition at cusps which is automatic by Koecher's principle.) Hermitian modular forms for $\mathrm{SU}_{2,2}(\mathcal{O}_K)$ are more or less the same as orthogonal modular forms for the lattice of integers $(\Lambda,Q) = (\mathcal{O}_K,N_{K/\mathbb{Q}})$ of $K$. One way to see this is as follows. The complex space of antisymmetric $(4 \times 4)$-matrices admits a nondegenerate quadratic form $\mathrm{pf}$ (the \emph{Pfaffian}, a square root of the determinant) which is preserved under the conjugation action $M \cdot X = M^T X M$ by $\mathrm{SL}_4(\mathbb{C})$; explicitly, $$\mathrm{pf} \begin{psmallmatrix} 0 & a & b & c \\ -a & 0 & d & e \\ -b & -d & 0 & f \\ -c & -e & -f & 0 \end{psmallmatrix} = af - be + cd.$$ The conjugation action identifies $\mathrm{SL}_4(\mathbb{C})$ with the spin group $\mathrm{Spin}(\mathrm{pf}) = \mathrm{Spin}_6(\mathbb{C})$. The six-dimensional real subspace $$V = \Big\{ \begin{psmallmatrix} 0 & a & b & c \\ -a & 0 & d & -\overline{b} & \\ -b & -d & 0 & f \\ -c & \overline{b} & -f & 0 \end{psmallmatrix}: \; a,c,d,f \in \mathbb{R}, \, b \in \mathbb{C}\Big\}$$ on which the Pfaffian has signature $(4,2)$ is preserved under conjugation by $\mathrm{SU}_{2,2}(\mathbb{C})$, and this action realizes the isomorphism $\mathrm{SU}_{2,2}(\mathbb{C}) \cong \mathrm{Spin}_{4,2}(\mathbb{R})$. The lattice of $\mathcal{O}_K$-integral matrices (which is isometric to $\mathcal{O}_K \oplus \mathrm{II}_{2,2}$) is preserved by $\mathrm{SU}_{2,2}(\mathcal{O}_K)$ and we obtain an embedding of $\mathrm{SU}_{2,2}(\mathcal{O}_K)$ in the discriminant kernel $\Gamma_{\mathcal{O}_K}$. This isomorphism induces an identification between the homogeneous spaces $\mathbf{H}_2$ and $\mathbb{H}_{\Lambda}$ and allows orthogonal modular forms to be interpreted as Hermitian modular forms of the same weight. The discriminant kernel $\Gamma_{\mathcal{O}_K}$ contains the involution $\alpha \mapsto \overline{\alpha}$ of $\mathcal{O}_K$ (in other words, $\alpha - \overline{\alpha} \in \mathcal{O}_K$ for all $\alpha$ in the codifferent $\mathcal{O}_K^{\#}$), and this involution does not come from the action of $\mathrm{SU}_{2,2}(\mathcal{O}_K)$. This means that Hermitian modular forms which arise from orthogonal modular forms are either symmetric or skew-symmetric: \begin{defn} A Hermitian modular form $F : \mathbf{H}_2 \rightarrow \mathbb{C}$ of weight $k$ is \emph{(graded) symmetric} if $$F(z^T) = (-1)^k F(z) \; \text{for all} \; z \in \mathbf{H}_2,$$ and \emph{(graded) skew-symmetric} if $F(z^T) = -(-1)^k F(z)$. \end{defn} Note that many references (e.g. \cite{DK1},\cite{DK2}) use the notion of (skew)-symmetry without respect to the grading, i.e. without the factor $(-1)^k$. The \emph{maximal} discrete extension $\Gamma_K^*$ of $\Gamma_K$ (as computed in \cite{KRW}) also contains a copy of the class group $\mathrm{Cl}(\mathcal{O}_K)$ which is generally not contained in the discriminant kernel. We only consider the fields $K = \mathbb{Q}(\sqrt{-7}),\mathbb{Q}(\sqrt{-11})$ of class number one so we will not discuss this point further; however, if one were to extend the arguments below to general number fields then most instances of the discrete extension $\Gamma_{\mathcal{O}_K}$ of $\Gamma_K$ below should probably be replaced by $\Gamma_K^*$. \subsection{Heegner divisors} On orthogonal Shimura varieties there is a natural construction of \emph{Heegner divisors}. Suppose $\Lambda$ is an even lattice of signature $(\ell,2)$. Given any lattice vector $\lambda \in \Lambda$ of positive norm, consider the orthogonal complement $\lambda^{\perp} \cap \mathbb{H}_{\Lambda}$ which has codimension one. The union of these orthogonal complements as $\lambda$ ranges through the (finitely many) primitive lattice vectors of a given norm $D$ is $\Gamma_{\Lambda}$-invariant and defines an analytic cycle $\mathcal{H}_D$ on $\overline{\Gamma_{\Lambda} \backslash \mathbb{H}_{\Lambda}}$. (If we do not take only primitive vectors then we obtain the divisors $\sum_{f^2 | D} \mathcal{H}_{D/f^2}$, which are also often called the Heegner divisors in the literature. For our purposes this definition is less convenient.) The irreducible components $\mathcal{H}_{D,\pm \beta}$ of $\mathcal{H}_D$ correspond to pairs $(\pm \beta) \in \Lambda'/\Lambda$ of norm $D / \mathrm{disc}(\Lambda)$. In particular when $\mathrm{disc}(\Lambda)$ is prime then every $\mathcal{H}_D$ is irreducible. Each Heegner divisor is itself an orthogonal Shimura variety for a lattice of signature $(2,\ell - 1)$. (For example, in the Hermitian modular form case the Heegner divisor $\mathcal{H}_D$ may be identified with the paramodular threefold $X_{K(D)}$ of level $D$ modulo Atkin-Lehner involutions.) Moreover the intersection of any two Heegner divisors is itself a Heegner divisor in this interpretation. The intersection numbers can be computed in general by counting certain lattice embeddings up to equivalence. However it seems worthwhile to mention a trick which (in the cases we will need) makes this computation quite easy and which works in some generality. A special case of Borcherds' higher-dimensional Gross-Kohnen-Zagier theorem \cite{BGKZ} shows that the Heegner divisors on $\Gamma_K \backslash \mathbf{H}_2$ interpreted appropriately are coefficients of a modular form of weight $3$. If $K$ has prime discriminant $d_K < 0$, and we take intersection numbers with a fixed Heegner divisor of squarefree discriminant $m \in \mathbb{N}$ and apply the Bruinier-Bundschuh isomorphism (see \cite{BB}, or Remark 3 below) then this implies that there are weights $\alpha_m(D)$, $D \in \mathbb{N}$ such that $$\Phi_m(\tau) := -1 + \sum_{D=1}^{\infty} \alpha_m(D) \sum_{f^2 | D} (\mathcal{H}_m \cdot \mathcal{H}_{D/f^2}) q^D \in M_3^+(\Gamma_0(-d_K),\chi),$$ where $\chi$ is the quadratic Dirichlet character modulo $d_K$, and where $M_3^+(\Gamma_0(-d_K),\chi)$ is the subspace of weight three modular forms of level $\Gamma_0(-d_K)$ whose Fourier expansions at $\infty$ are supported on exponents which are quadratic residues. Moreover the sums $\sum_{f^2 | D} \alpha_m(D/f^2)$ themselves (for fixed $m$) are coefficients of a modular form of weight $5/2$ and level $\Gamma_0(4m)$ satisfying the Kohnen plus-condition and which has constant term $-1$ (and for $m=1,2,3$ this determines it uniquely); for example, $$-1 + \sum_{D=1}^{\infty} \sum_{f^2 | D} \alpha_1(D/f^2) q^D = -1 + 10q + 70q^4 + 48q^5 + 120q^8 + 250q^9 + ... = 6 \frac{\theta'(\tau)}{2\pi i} - E_2(4 \tau) \theta(\tau),$$ $$-1 + \sum_{D=1}^{\infty} \sum_{f^2 | D} \alpha_2(D/f^2) q^D = -1 + 4q + 22q^4 + 24q^8 + 100q^9 + ... = 3 \frac{\theta'(\tau)}{2\pi i} - E_2(8\tau) \theta(\tau),$$ $$-1 + \sum_{D=1}^{\infty} \sum_{f^2 | D} \alpha_3(D/f^2) q^D = -1 + 2q + 14q^4 + 34q^9 + 24q^{12} + ... = 2 \frac{\theta'(\tau)}{2\pi i} - E_2(12 \tau) \theta(\tau),$$ where $\theta(\tau) = 1 + 2q + 2q^4 + 2q^9 + ...$ is the usual theta function and where $E_2(\tau) = 1 - 24 \sum_{n=1}^{\infty} \sigma_1(n) q^n$. Unfortunately the spaces $M_3^+(\Gamma_0(-d_K),\chi)$ are two-dimensional for $d_K \in \{-7,-11\}$. However one can specify the correct modular forms more precisely by observing that the intersections in cohomology are themselves the Fourier coefficients of a vector-valued Jacobi form of index $m/|d_K|$ and weight three (for a particular representation of the Jacobi group) and the intersection numbers are obtained by setting the elliptic variable of that Jacobi form to zero. (More precisely these Jacobi forms occur as Fourier-Jacobi coefficients of the Siegel modular form introduced by Kudla-Millson in \cite{KM}.) For $m \le 3$ the relevant space of Jacobi forms is always one-dimensional (for \emph{every} $d_K$), spanned by the Eisenstein series (for which some computational aspects are discussed in \cite{W}) so the generating series of intersection numbers is exactly what was called the \emph{Poincar\'e square series} of index $m/|d_K|$ in \cite{W}. In this way we can compute the relevant intersection numbers without computing any intersections. We find: \noindent (1) For $K = \mathbb{Q}(\sqrt{-7})$, $$\Phi_1(\tau) = -1 - 2q + 20q^2 + 18q^4 + 70q^7 + 160q^8 + 94q^9 + ...$$ and $$\Phi_2(\tau) = -1 + 4q + 2q^2 + 48q^4 + 28q^7 + 142q^8 + 148q^9 + ...$$ \noindent (2) For $K = \mathbb{Q}(\sqrt{-11})$, $$\Phi_1(\tau) = -1 - 2q + 20q^3 - 2q^4 + 20q^5 + 18q^9 + 70q^{11} + ...$$ and $$\Phi_3(\tau) = -1 + 2q + 0q^3 + 14q^4 + 16q^5 + 82q^9 + 26q^{11} + ...$$ It follows that for $K = \mathbb{Q}(\sqrt{-7})$, the intersection of $\mathcal{H}_1$ and $\mathcal{H}_2$ as a Heegner divisor of $X_{K(1)}$ is $2H_1$ and as a Heegner divisor of $X_{K(2)}$ is just $H_1$ itself; and for $K = \mathbb{Q}(\sqrt{-11})$ the intersection of $\mathcal{H}_1$ and $\mathcal{H}_3$ in $X_{K(1)}$ is $2 H_1$ and in $X_{K(2)}$ is $H_1$. This means, for example, that if $F$ is a Hermitian modular form for $\mathcal{O}_K$, $K = \mathbb{Q}(\sqrt{-7})$ with a zero on $\mathcal{H}_2$, then the pullbacks of all orders to $\mathcal{H}_1$ are Siegel modular forms of degree two with at least a double zero along the diagonal. \subsection{Lifts} To construct generators we make use of two lifts from elliptic modular forms: the \emph{Maass lift} (or additive theta lift) and the \emph{Borcherds lift} (or multiplicative theta lift). Both theta lifts most naturally take vector-valued modular forms which transform under a Weil representation as inputs. Recall that if $(\Lambda,Q)$ is an even-dimensional even lattice with dual $\Lambda'$ then there is a representation $\rho^*$ of $\mathrm{SL}_2(\mathbb{Z})$ on $\mathbb{C}[\Lambda'/\Lambda] = \mathrm{span}(\mathfrak{e}_{\gamma}: \; \gamma \in \Lambda'/\Lambda)$ defined by $$\rho^* \left( \begin{psmallmatrix} 0 & -1 \\ 1 & 0 \end{psmallmatrix} \right) \mathfrak{e}_{\gamma} = \frac{e^{-\pi i \mathrm{sig}(\Lambda)/4}}{\sqrt{|\Lambda'/\Lambda|}} \sum_{\beta \in \Lambda'/\Lambda} e^{2\pi i \langle \beta, \gamma \rangle} \mathfrak{e}_{\beta}, \; \; \rho^* \left( \begin{psmallmatrix} 1 & 1 \\ 0 & 1 \end{psmallmatrix} \right) \mathfrak{e}_{\gamma} = e^{-2\pi i Q(\gamma)} \mathfrak{e}_{\gamma}.$$ We consider holomorphic functions $F : \mathbb{H} \rightarrow \mathbb{C}[\Lambda'/\Lambda]$ which satisfy the functional equations $$F \left( \frac{a \tau + b}{c \tau + d} \right) = (c \tau + d)^k \rho^*\left( \begin{psmallmatrix} a & b \\ c & d \end{psmallmatrix} \right)$$ for all $\begin{psmallmatrix} a & b \\ c & d \end{psmallmatrix} \in \mathrm{SL}_2(\mathbb{Z})$. These are called \emph{nearly-holomorphic modular forms} if they have finite order at $\infty$ (in other words, $F(x+iy)$ has at worst exponential growth as $y \rightarrow \infty$), and are \emph{(holomorphic) modular forms} or \emph{cusp forms} if $F(x+iy)$ is bounded or tends to zero in that limit, respectively. The functional equation under $T = \begin{psmallmatrix} 1 & 1 \\ 0 & 1 \end{psmallmatrix}$ implies a Fourier expansion of the form $$F(\tau) = \sum_{\gamma \in \Lambda'/\Lambda} \sum_{n \in \mathbb{Z}^n - Q(\gamma)} c(n,\gamma) q^n \mathfrak{e}_{\gamma}$$ where $q = e^{2\pi i \tau}$ and $c(n,\gamma) \in \mathbb{C}$. Then $F$ is a nearly-holomorphic modular form if and only if $c(n,\gamma) = 0$ for all sufficiently small $n$; a holomorphic modular form if and only if $c(n,\gamma) = 0$ for all $n < 0$; and a cusp form if and only if $c(n,\gamma) = 0$ for all $n \le 0$. Now suppose $\Lambda$ is positive-definite and that $k \ge \frac{1}{2} \mathrm{dim}\, \Lambda$, $k \in \mathbb{Z}$. The \emph{Maass lift} takes a vector-valued modular form $F(\tau) = \sum_{\gamma,n} c(n,\gamma) q^n \mathfrak{e}_{\gamma}$ of weight $\kappa = k - \frac{1}{2}\mathrm{dim}\, \Lambda$ for $\rho^*$ to the orthogonal modular form $$\Phi_F(\tau,z,w) = -\frac{B_k}{2k} c(0,0) \Big( E_k(\tau) + E_k(w) - 1 \Big) + \sum_{a,b=1}^{\infty} \sum_{\substack{\lambda \in \Lambda' \\ \lambda \; \text{positive} \\ Q(\lambda) \le ab}} \sum_{n=1}^{\infty} c(ab - Q(\lambda), \lambda) n^{k-1} e^{2\pi i n (a \tau + b w + \langle \lambda, z \rangle)}$$ for $\Lambda \oplus \mathrm{II}_{2,2}$, where $E_k(\tau), E_k(w)$ denote the Eisenstein series of weight $k$ for $\mathrm{SL}_2(\mathbb{Z})$. (If $k$ is odd then $c(0,0) = 0$ so there is no need to define $E_k$.) The Maass lift is additive and preserves the subspace of cusp forms. The second lift we use is the Borcherds lift, which takes a \emph{nearly-holomorphic} vector-valued modular form $F(\tau) = \sum_{\gamma,n} c(n,\gamma) q^n \mathfrak{e}_{\gamma}$ of weight $-\frac{1}{2}\mathrm{dim}\, \Lambda$ (where we again take $\Lambda$ to be positive-definite) and yields a multivalued meromorphic orthogonal modular form (in general with character) which is locally represented as a convergent infinite product: $$\Psi_F(\tau,z,w) = e^{2\pi i (A \tau + \langle B,z \rangle + Cw)} \prod_{a,b,\lambda} (1 - e^{2\pi i (a\tau + bw + \langle \lambda,z \rangle)})^{c(ab - Q(\lambda),\lambda)}.$$ There is an analogy to the formal $k=0$ case of the Maass lift; however, the set over which $a,b,\lambda$ is more complicated (depending on a \emph{Weyl chamber} containing $(\tau,z,w)$) and the \emph{Weyl vector} $(A,B,C)$ has no analogue in the additive lift. The most important aspect of the Borcherds lift for us is not the product expansion but the fact that the divisor of $\Psi_F$ may be computed exactly: it is supported on Heegner divisors, and the order of $\Psi_F$ on the rational quadratic divisor $\lambda^{\perp}$ (with $Q(\lambda) < 0$) is $$\mathrm{ord}(\Psi_F; \lambda^{\perp}) = \sum_{r \in \mathbb{Q}_{>0}} c(r^2 Q(\lambda), r\lambda)$$ (where $c(r^2 Q(\lambda),r \lambda) = 0$ if $r \lambda \not \in \Lambda'$). In particular $\Psi_F$ is an orthogonal modular form if and only if these orders are nonnegative integers. In all cases the weight of $F$ is $c(0,0)/2$. \begin{rem} One can always compactify $\Gamma_{\Lambda} \backslash \mathbb{H}_{\Lambda}$ by including finitely many zero-dimensional and one-dimensional cusps (corresponding to isotropic one-dimensional or two-dimensional sublattices of $\Lambda \oplus \mathrm{II}_{2,2}$ up to equivalence). If $K$ has class number one (or slightly more generally if the norm form on $\mathcal{O}_K$ is alone in its genus) then our discriminant kernel $\Gamma_{\mathcal{O}_K}$ admits only one equivalence class each of zero-dimensional and one-dimensional cusps and both are contained in the closure of every rational quadratic divisor. In particular any Borcherds product which is holomorphic is automatically a cusp form. (This is peculiar to the lattices considered here; it is certainly not true in general.) \end{rem} \begin{rem} Let us say a few words about the input functions $F$. A general method to compute vector-valued modular forms for general lattices was given in \cite{W} and \cite{W2} (the two references corresponding to even and odd-weight theta lifts, respectively), and this is what was actually used in the computations below because the implementation was already available. Of course one can obtain all nearly-holomorphic modular forms by dividing true modular forms of an appropriate weight by a power of the discriminant $\Delta(\tau) = q \prod_{n=1}^{\infty} (1 - q^n)^{24}$. However a few other formalisms apply to the particular lattices $\Lambda = (\mathcal{O}_K,N_{K/\mathbb{Q}})$ considered here: \\ \noindent (i) Modular forms for the representation $\rho^*$ attached to a positive-definite lattice $\Lambda$ are equivalent to \emph{Jacobi forms of lattice index} which are scalar-valued functions $\phi(\tau,z)$ in a ``modular variable" $\tau \in \mathbb{H}$ and an ``elliptic variable" $z \in \Lambda \otimes \mathbb{C}$ satisfying certain functional equations and growth conditions. The main advantage of Jacobi forms is that they can be multiplied: for example, in many cases it is possible to construct all Jacobi forms of a given weight and level by taking linear combinations of products of Jacobi theta functions at various arguments (i.e. theta blocks).\\ \noindent (ii) If $\Lambda$ has odd prime discriminant $p$ and $k + (\mathrm{dim}\, \Lambda)/2$ is even then Bruinier and Bundschuh show in \cite{BB} that vector-valued modular forms of weight $k$ for $\rho^*$ can be identified with either a ``plus-" or ``minus-" subspace of $M_k(\Gamma_0(p),\chi_p)$ (where $\chi_p$ is the nontrivial quadratic character mod $p$), i.e. the subspace of modular forms whose Fourier coefficients are supported on quadratic residues modulo $p$, or quadratic nonresidues mod $p$ and $p\mathbb{Z}$, respectively. The isomorphism simply identifies the form $F(\tau) = \sum_{\gamma,n} c(n,\gamma) q^n \mathfrak{e}_{\gamma}$ with $$\sum_{\gamma,n} c(n,\gamma) q^{pn} \in M_k(\Gamma_0(p),\chi_p).$$ This fails when $k + (\mathrm{dim}\, \Lambda)/2$ is odd (in which case $c(n,\gamma) = -c(n,-\gamma)$, so the resulting sum is always zero!). To obtain any results in the the same spirit, it seems necessary to consider instead the ``twisted sums" $$\sum_{\gamma,n} c(n,\gamma) \chi(\gamma) q^{pn},$$ where $\chi$ is an odd Dirichlet character mod $p$ (and where an isomorphism $\Lambda'/\Lambda \cong \mathbb{Z}/p\mathbb{Z}$ has been fixed). The result is a modular form of level $\Gamma_0(p^2)$ with character $\chi \otimes \chi_p$. These maps were studied in \cite{SW}; they are injective and their images can be characterized in terms of the Atkin-Lehner involutions modulo $p^2$. \end{rem} \subsection{Pullbacks} Let $\lambda \in \mathcal{O}_K$ have norm $\ell = N_{K/\mathbb{Q}} \lambda$, and consider the embedding of the Siegel upper half-space into $\mathbf{H}_2$: $$\phi : \mathbb{H}_2 \longrightarrow \mathbf{H}_2, \; \; \phi \left( \begin{psmallmatrix} \tau & z \\ z & w \end{psmallmatrix} \right) = \begin{psmallmatrix} \tau & \overline{\lambda} z \\ \lambda z & \ell w \end{psmallmatrix} = U_{\lambda} \cdot \begin{psmallmatrix} \tau & z \\ z & w \end{psmallmatrix}, \; U_{\lambda} := \mathrm{diag}(1,\lambda,1,\lambda/\ell).$$ For any paramodular matrix $$M \in K(\ell) := \{M \in \mathrm{Sp}_4(\mathbb{Q}): \; \sigma_{\ell}^{-1} M \sigma_{\ell} \in \mathbb{Z}^{4 \times 4} \}, \; \sigma_{\ell} := \mathrm{diag}(1,1,1,\ell),$$ we find $U_{\lambda} M U_{\lambda}^{-1} \in \mathrm{SU}_{2,2}(\mathcal{O}_K)$ and $$\phi(M \cdot \tau) = (U_{\lambda} M U_{\lambda}^{-1}) \cdot \phi(\tau), \; \tau \in \mathbb{H}_2,$$ so $\phi$ descends to an embedding of $K(\ell) \backslash \mathbb{H}_2$ into $\Gamma_K \backslash \mathbf{H}_2$ (and more specifically into the Heegner divisor of discriminant $\ell$). In particular if $F : \mathbf{H}_2 \rightarrow \mathbb{C}$ is a Hermitian modular form then $f := F \circ \phi$ is a paramodular form of the same weight, i.e. $$f(M \cdot \tau) = (c \tau + d)^k f(\tau) \; \text{for all} \; M = \begin{psmallmatrix} a & b \\ c & d \end{psmallmatrix} \in K(\ell) \; \text{and} \; \tau \in \mathbb{H}_2.$$ The preprint \cite{W3} gives expressions in the higher Taylor coefficients about a rational quadratic divisor which yield ``higher pullbacks" $P_N F$, $N \in \mathbb{N}_0$. If $F$ is a Hermitian modular form of weight $k$ then its pullback $P_N^{\mathcal{H}_{\ell}} F$ along the embedding above is a paramodular form of level $K(\ell)$ and weight $k+N$ and a cusp form if $N > 0$. The higher pullbacks of theta lifts are themselves theta lifts and are particularly simple to compute. One computational aspect of the higher pullbacks worth mentioning is that a form $F$ vanishes to some order $h$ along the rational quadratic divisor if and only if its pullbacks $P_N F$, $N < h$ are identically zero, and this can be checked rigorously using Sturm bounds (or their generalizations) for the lower-dimensional group under which $P_N F$ transforms. An important case is the $N^{\mathrm{th}}$ pullback of a modular form $F$ to a Heegner divisor along which it has order exactly $N$. The result in this case is the well-known \emph{quasi-pullback} and we denote it $\mathrm{Q}F$. The quasi-pullback is multiplicative i.e. $\mathrm{Q}(FG) = \mathrm{Q}F \cdot \mathrm{Q}G$ for all Hermitian modular forms $F,G$. \section{Paramodular forms of levels one, two and three} The pullbacks of Hermitian modular forms to certain Heegner divisors have interpretations as paramodular forms (as in subsection 2.5 above). Structure results for graded rings of paramodular forms are known for a few values of $N$. We will rely on the previously known generators for the graded rings of paramodular levels 1,2 and 3. The first of these is now classical and was derived by Igusa \cite{Ig}; the second was computed in \cite{IO} by Ibukiyama and Onodera; and the third was computed by Dern \cite{Dern2}. For convenience we express the generators as Gritsenko lifts or Borcherds products. (Igusa and Ibukiyama--Onodera expressed them in terms of thetanulls.) \begin{prop} (i) There are cusp forms $\psi_{10},\psi_{12},\psi_{35}$ of weights $10,12,35$ such that $M_{\ast}(K(1))$ is generated by the Eisenstein series $E_4,E_6$ and by $\psi_{10},\psi_{12},\psi_{35}$. \\ (ii) There are graded-symmetric cusp forms $\phi_8,\phi_{10},\phi_{11},\phi_{12}$ of weights $8,10,11,12$ and an antisymmetric non-cusp form $f_{12}$ such that $M_{\ast}(K(2))$ is generated by the Eisenstein series $E_4,E_6$ and by $\phi_8,\phi_{10},\phi_{11},\phi_{12},f_{12}$. \\ (iii) There are graded-symmetric cusp forms $\varphi_6,\varphi_8,\varphi_9,\varphi_{10},\varphi_{11},\varphi_{12}$ of weights $6,8,9,10,11,12$ and an antisymmetric non-cusp form $f_{12}$ such that $M_{\ast}(K(3))$ is generated by the Eisenstein series $E_4,E_6$ and by $\varphi_6,\varphi_8,\varphi_9,\varphi_{10},\varphi_{11},\varphi_{12},f_{12}$. \end{prop} For later use, we fix the following concrete generators. Let $E_4,E_6$ denote the modular Eisenstein series; $E_{k,m}$ the Jacobi Eisenstein series of weight $k$ and index $m$; and $E_{k,m}'$ its derivative with respect to $z$. The inputs into the Gritsenko and Borcherds lifts are expressed as Jacobi forms following Remark 3 above. \\ (i) $\psi_{10}$ and $\psi_{12}$ are the Gritsenko lifts of the Jacobi cusp forms $$\varphi_{10,1}(\tau,z) = \frac{E_{4,1}E_6 - E_4 E_{6,1}}{144} \; \text{and} \; \varphi_{12,1}(\tau,z) = \frac{E_4^2 E_{4,1} - E_6 E_{6,1}}{144}$$ respectively, and $\psi_{35}$ is the Borcherds lift of $\frac{11 E_4^2 E_{4,1} + 7 E_6 E_{6,1}}{18\Delta}$. \\ (ii) $\phi_8,\phi_{10},\phi_{11},\phi_{12}$ are the Gritsenko lifts of the Jacobi cusp forms $$\varphi_{8,2} = \frac{E_4 E_{4,2} - E_{4,1}^2}{12}, \; \varphi_{10,2} = \frac{E_{4,2} E_6 - E_{4,1}E_{6,1}}{12}, \; \varphi_{11,2} = \frac{E_{4,1} E_{6,1}' - E_{4,1} E_{6,1}'}{288\pi i}, \; \varphi_{12,2} = \frac{E_4^2 E_{4,2} - E_6 E_{6,2}}{24},$$ respectively, and $f_{12}$ is the Borcherds lift of $\frac{3 E_4^2 E_{4,2} + 4 E_4 E_{4,1}^2 + 5 E_6 E_{6,2}}{12 \Delta}$. \\ (iii) $\varphi_6,\varphi_8,\varphi_9,\varphi_{10},\varphi_{11},\varphi_{12}$ are the Gritsenko lifts of the Jacobi cusp forms $$\varphi_{6,3} = \frac{\varphi_{10,1}\varphi_{8,2}}{\Delta}, \; \varphi_{8,3} = \frac{E_4 E_{4,3} - E_{4,1} E_{4,2}}{2}, \; \varphi_{9,3} = \frac{\varphi_{10,1} \varphi_{11,2}}{\Delta},$$ $$\varphi_{10,3} = \frac{\varphi_{10,2} \varphi_{12,1}}{\Delta}, \; \varphi_{11,3} = \frac{\varphi_{11,2}\varphi_{12,1}}{\Delta}, \; \varphi_{12,3} = \frac{E_4 E_{4,1}E_{4,2} + E_4^2 E_{4,3}}{2} - E_{6,1} E_{6,2},$$ respectively, and $f_{12}$ is the Borcherds lift of $\frac{2 E_4 E_{4,1} E_{4,2} + 5 E_{4,1}^3 + 5E_{6,1} E_{6,2}}{12 \Delta}.$ (Note that these are not quite the generators used by Dern; the choices used here simplify the ideal of relations somewhat.) \begin{rem} For later use we will need to understand the ideals of symmetric (under the Fricke involution $\tau \mapsto -\frac{1}{N} \tau^{-1}$) paramodular forms of level $N \in \{1,2,3\}$ which vanish along the diagonal. The pullback of a paramodular form to the diagonal is a modular form for the group $\mathrm{SL}_2(\mathbb{Z}) \times \mathrm{SL}_2(\mathbb{Z})$ or in other words a linear combination of expressions of the form $(f_1 \otimes f_2)(\tau_1,\tau_2) = f_1(\tau_1)f_2(\tau_2)$, where $f_1,f_2$ are elliptic modular forms of level one of the same weight; and if the paramodular form is symmetric then the pullback is symmetric under swapping $(\tau_1,\tau_2) \mapsto (\tau_2,\tau_1)$. The graded ring of symmetric modular forms under $\mathrm{SL}_2(\mathbb{Z}) \times \mathrm{SL}_2(\mathbb{Z})$ is the weighted polynomial ring $$M_{\ast}(\mathrm{SL}_2(\mathbb{Z}) \times \mathrm{SL}_2(\mathbb{Z})) = \mathbb{C}[E_4 \otimes E_4, E_6 \otimes E_6, \Delta \otimes \Delta]$$ where $E_4,E_6,\Delta$ are defined as usual. Therefore: \\ \noindent (i) In level $N=1$, the pullbacks of $E_4,E_6,\psi_{12}$ to the diagonal are the algebraically independent modular forms $E_4 \otimes E_4$, $E_6 \otimes E_6$, $\Delta \otimes \Delta$, so every even-weight form which vanishes on the diagonal is a multiple of $\psi_{10}$ (which has a double zero). The odd-weight form $\psi_{35}$ has a simple zero on the diagonal. \\ \noindent (ii) In level $N=2$, the pullbacks of $E_4,E_6,\phi_{12}$ to the diagonal are algebraically independent, so the ideal of even-weight symmetric forms which vanish on the diagonal is generated by $\phi_8$ (which has a fourth-order zero there) and $\phi_{10}$ (which has a double zero). Moreover $\phi_{10}^2$ is itself a multiple of $\phi_8$, so the ideal of even-weight modular forms which vanish to order at least three along the diagonal is principal, generated by $\phi_8$. The odd-weight form $\phi_{11}$ has a simple zero along the diagonal. \\ \noindent (iii) In level $N=3$, the pullbacks of $E_4,E_6,\varphi_{12}$ to the diagonal are algebraically independent, so the ideal of even-weight symmetric forms which vanish on the diagonal is generated by $\varphi_6,\varphi_8,\varphi_{10}$ (which have zeros of order $6,4,2$ respectively). These forms satisfy $\varphi_8^2 = \varphi_6 \varphi_{10}$ and $\varphi_{10}^2 = \varphi_8 \varphi_{12}$, so the ideals of (even-weight, symmetric) forms which vanish to order at least $3$ or at least $5$ are $\langle \varphi_6,\varphi_8 \rangle$ and $\langle \varphi_6 \rangle$, respectively. The odd-weight forms $\varphi_9$ and $\varphi_{11}$ have order $3$ and $1$ along the diagonal, respectively, and satisfy the relations $$\varphi_6 \varphi_{11} = \varphi_8 \varphi_9, \; \varphi_8 \varphi_{11} = \varphi_9 \varphi_{10},$$ and $\varphi_{11}^3$ and $\varphi_{10} \varphi_{11}$ (and therefore all odd-weight symmetric forms with at least a triple zero on the diagonal) are multiples of $\varphi_9$. \end{rem} \section{Hermitian modular forms for $\mathbb{Q}(\sqrt{-7})$} In this section we compute the graded ring of Hermitian modular forms for the maximal order in $K = \mathbb{Q}(\sqrt{-7})$ by studying the pullbacks to Heegner divisors of discriminant $1$ and $2$ and applying the structure theorems of Igusa and Ibukiyama-Onodera. We first consider graded-symmetric forms and reduce against a distinguished Borcherds product $b_7$ (which is also a Maass lift) whose divisor is $$\mathrm{div} \, b_7 = 3\mathcal{H}_1 + \mathcal{H}_2.$$ We will express all graded-symmetric forms in terms of Maass lifts $\mathcal{E}_4,\mathcal{E}_6,b_7,m_8,m_9,m_{10}^{(1)},m_{10}^{(2)},m_{11},m_{12}$ in weights $4,6,7,8,9,10,10,11,12$ which are described in more detail on the next page. The Maass lifts of weight $4,6,7,8,9$ are essentially unique, and the Maass lifts of weight $10$ are chosen such that $m_{10}^{(1)}$ vanishes on $\mathcal{H}_1$ and $m_{10}^{(2)}$ vanishes on $\mathcal{H}_2$. By contrast $m_{11}$ could have been chosen almost arbitrarily (so long as it is not a multiple of $\mathcal{E}_4 b_7$, which is also a Maass lift), and similarly for $m_{12}$. \afterpage \clearpag \begin{landscape In Table 1 we describe the even-weight Maass lifts used as generators. For each Maass lift of weight $k$ we give its input form (in the convention of Bruinier-Bundschuh; this is a modular form of weight $k-1$ and level $\Gamma_0(7)$ for the quadratic character) and its first pullbacks to the Heegner divisors of discriminant $1$ and $2$. (The pullbacks of odd order to $\mathcal{H}_1$ are always zero and therefore omitted.) \begin{table}[htbp] \centering \caption{Maass lifts in even weight} \begin{tabular}{l*{8}{c}r} \hline Name & Weight & Input form & $P_0^{\mathcal{H}_1}$ & $P_2^{\mathcal{H}_1}$ & $P_4^{\mathcal{H}_1}$ & $P_0^{\mathcal{H}_2}$ & $P_1^{\mathcal{H}_2}$\\ \hline \hline $\mathcal{E}_4$ & 4 & $1 + 14q^3 + 42q^5 + 70q^6 + 42q^7 + 210q^{10} \pm ...$ & $E_4$ & $0$ & $0$ & $E_4$ & $0$ \\ \hline $\mathcal{E}_6$ & 6 & $1 - 10q^3 - 78q^5 - 170q^6 - 150q^7 - 1326q^{10} \pm ...$ & $E_6$ & $0$ & $1814400\psi_{10}$ & $E_6$ & $0$ \\ \hline $m_8$ & $8$ & $q^3 - q^5 - 8q^6 + 7q^7 + 8q^{10} \pm ...$ & $0$ & $120 \psi_{10}$ & $4352\psi_{12}$ & $2 \phi_8$ & $0$ \\ \hline $m_{10}^{(1)}$ & $10$ & $q^3 - q^5 + 16q^6 - 17q^7 - 136q^{10} \pm ... $ & $0$ & $152 \psi_{12}$ & $8736 E_4 \psi_{10}$ & $2 \phi_{10}$ & $24\psi_{11}$ \\ \hline $m_{10}^{(2)}$ & $10$ & $q^5 - q^6 - q^7 + q^{10} - 16q^{12} \pm ...$ & $2 \psi_{10}$ & $-2\psi_{12}$ & $-420E_4 \psi_{10}$ & 0 & $-4\psi_{11}$ \\ \hline $m_{12}$ & $12$ & $q^5 + 3q^6 + 7q^7 - 19q^{10} - 72q^{12} \pm ...$ & $2 \psi_{12}$ & $2 E_4 \psi_{10}$ & $134E_4 \psi_{12} - 710E_6 \psi_{10}$ & $\frac{1}{3}\phi_{12} - \frac{1}{3}E_4 \phi_8$ & $0$ \\ \hline \end{tabular} \end{table} The input functions into the Maass lift in odd weight are given as twisted sums as in \cite{SW}. Here, $\chi$ may be any odd Dirichlet character mod $7$; the input form is then a modular form of level $\Gamma_0(49)$ and character $\chi \otimes \chi_7$ where $\chi_7$ is the quadratic character. The Borcherds product $b_7$ happens to lie in the Maass Spezialschar and is listed in this table. \begin{table}[htbp] \centering \caption{Maass lifts in odd weight} \begin{tabular}{l*{8}{c}r} \hline Name & Weight & Input form & $P_1^{\mathcal{H}_1}$ & $P_3^{\mathcal{H}_1}$ & $P_5^{\mathcal{H}_1}$ & $P_0^{\mathcal{H}_2}$ & $P_1^{\mathcal{H}_2}$\\ \hline \hline $b_7$ & $7$ & $\chi(5)q^3 + 3\chi(3)q^5 + 2 \chi(1)q^6 - 6 \chi(5)q^{10} \pm ...$ & $0$ & $-360\psi_{10}$ & $4080\psi_{12}$ & $0$ & $-4\phi_8$ \\ \hline $m_9$ & $9$ & $\chi(5)q^3 - 9\chi(3)q^5 - 10\chi(1)q^6 - 90\chi(5)q^{10} \pm ...$ & $-24 \psi_{10}$ & $72 \psi_{12}$ & $-21168E_4 \psi_{10}$ & $0$ & $-4\phi_{10}$ \\ \hline $m_{11}$ & $11$ & $\chi(3)q^5 - 5\chi(1)q^6 + 11\chi(5)q^{10} - 30\chi(3)q^{12} \pm ...$ & $-2\psi_{12}$ & $40 E_4 \psi_{10}$ & $\frac{6290}{3}E_4 \psi_{12} - \frac{9350}{3} E_6 \psi_{10} $ & $6 \phi_{11}$ & $2\phi_{12}$ \\ \hline \end{tabular} \end{table} The Borcherds products below can be shown to exist by a Serre duality argument as in \cite{BGKZ}. \begin{table}[htbp] \centering \caption{Borcherds products} \begin{tabular}{l*{4}{c}r} \hline Name & Weight & Divisor & Graded-symmetric? \\ \hline \hline $b_7$ & $7$ & $3\mathcal{H}_1 + \mathcal{H}_2$ & yes \\ \hline $b_{28}$ & $28$ & $7\mathcal{H}_1 + \mathcal{H}_7$ & no \\ \hline \end{tabular} \end{table} \end{landscape} \clearpag } \begin{lem} Let $F$ be a symmetric Hermitian modular form. There is a polynomial $P$ such that $$F - P(\mathcal{E}_4,\mathcal{E}_6,m_8,m_{10}^{(1)},m_{11},m_{12})$$ vanishes along the Heegner divisor $\mathcal{H}_2$. \end{lem} \begin{proof} This amounts to verifying that the pullbacks of $\mathcal{E}_4,\mathcal{E}_6,m_8,m_{10}^{(1)},m_{11},m_{12}$ generate the ring of symmetric paramodular forms of level $2$, and is clear in view of Ibukiyama-Onodera's structure result and Tables 1 and 2 below. \end{proof} \begin{thrm} The graded ring of symmetric Hermitian modular forms for $\mathcal{O}_K$ is generated by Maass lifts $$\mathcal{E}_4,\mathcal{E}_6,b_7,m_8,m_9,m_{10}^{(1)},m_{10}^{(2)}, m_{11}, m_{12}$$ in weight $4,6,7,8,9,10,10,11,12$. The ideal of relations is generated by \begin{align*} m_8 m_9 &= b_7 (m_{10}^{(1)} + 12 m_{10}^{(2)}); \\ m_9^2 + 12 b_7 m_{11} &= \mathcal{E}_4 b_7^2 + 36 m_8 m_{10}^{(2)}; \\ m_9 m_{10}^{(1)} &= b_7 (\mathcal{E}_4 m_8 + 12 m_{12}); \\ \mathcal{E}_6 b_7^2 + 18 m_{10}^{(1)} m_{10}^{(2)} &= \mathcal{E}_4 b_7 m_9 + 6 m_9 m_{11}; \\ m_{10}^{(1)} (m_{10}^{(1)} + 12 m_{10}^{(2)}) &= m_8 (\mathcal{E}_4 m_8 + 12 m_{12}); \\ \mathcal{E}_4 b_7 m_{10}^{(1)} + 6 \mathcal{E}_4 b_7 m_{10}^{(2)} + 72 m_{10}^{(2)} m_{11} &= \mathcal{E}_6 b_7 m_8 + 6 m_9 m_{12}; \\ 3 \mathcal{E}_4 m_8 m_{10}^{(1)} + 6 \mathcal{E}_4 b_7 m_{11} + \mathcal{E}_6 b_7 m_9 + 72 m_{11}^2 &= \mathcal{E}_4^2 b_7^2 + 3 \mathcal{E}_6 m_8^2 + 18 m_{10}^{(1)} m_{12}. \end{align*} \end{thrm} \begin{proof} We use induction on the weight. As usual any modular form of negative or zero weight is constant. \\ Using the previous lemma we may assume that $F$ has a zero along $\mathcal{H}_2$. Since $\mathcal{H}_2$ has a double intersection with $\mathcal{H}_1$ along its diagonal $H_1$ it follows that the pullbacks of $F$ to $\mathcal{H}_1$ of all orders have (at least) a double zero along the diagonal; in particular, they are multiples of the Igusa discriminant $\psi_{10}$. Since the pullbacks of $\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12}$ to $\mathcal{H}_1$ generate the graded ring of even-weight Siegel modular forms, and $m_{10}^{(2)}$ vanishes along $\mathcal{H}_2$ but pulls back to the Igusa form $\psi_{10}$ on $\mathcal{H}_1$, it follows that we can subtract some expression of the form $$m_{10}^{(2)} P(\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12})$$ away from $F$ to obtain a form whose pullbacks to both $\mathcal{H}_1$ and $\mathcal{H}_2$ are zero. Similarly, we can subtract some expression of the form $$m_9 P(\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12})$$ away from $F$ to ensure that the zero along $\mathcal{H}_1$ has multiplicity at least two. \\ Now assume that $F$ has exactly a double zero along $\mathcal{H}_1$ (in particular, it must have even weight) and a zero along $\mathcal{H}_2$. Suppose first that $F$ has exactly a simple zero along $\mathcal{H}_2$. Then its first pullback $P_1^{\mathcal{H}_2} F$ has odd weight and at least a double zero along the diagonal in $X_{K(2)}$ and is therefore contained in the ideal generated by $\phi_8 \phi_{11}$ and $\phi_{10}\phi_{11}$. The products $m_8 m_{10}^{(2)}$ and $m_{10}^{(1)} m_{10}^{(2)}$ have (up to a constant multiple) exactly these first pullbacks, so subtracting away some expression of the form $$m_8 m_{10}^{(2)} P_1(\mathcal{E}_4,\mathcal{E}_6,m_8,m_{10}^{(1)},m_{11},m_{12}) + m_{10}^{(1)} m_{10}^{(2)} P_2(\mathcal{E}_4,\mathcal{E}_6,m_8,m_{10}^{(1)},m_{11},m_{12})$$ with polynomials $P_1,P_2$ leaves us with a modular form with at least double zeros along both $\mathcal{H}_1$ and $\mathcal{H}_2$. The double zero along $\mathcal{H}_2$ forces the second pullback to $\mathcal{H}_1$ to have at least a \emph{fourth}-order zero along the diagonal and therefore to be a multiple of $\psi_{10}^2$. Since $m_9^2$ has exactly this second pullback to $\mathcal{H}_1$ (up to a constant multiple) and a double zero along $\mathcal{H}_2$, we may subtract away some expression of the form $$m_9^2 P(\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12})$$ from $F$ to obtain a form with a third-order zero along $\mathcal{H}_1$ and which continues to have a double zero on $\mathcal{H}_2$. Finally, any modular form $F$ with a triple zero along $\mathcal{H}_1$ and a zero along $\mathcal{H}_2$ is divisible by $b_7$ (by Koecher's principle), with the quotient $\frac{F}{b_7}$ having strictly lower weight. By induction, $F/b_7$ and therefore $F$ is a polynomial expression in the generators in the claim. The relations were computed by working directly with Fourier expansions. Here the main difficulties are determining how many Fourier coefficients must be computed to show that a modular form is identically zero, and determining how many relations are needed to generate the full ideal. To verify the correctness of these computations in both cases it is enough to know the dimensions of spaces of Hermitian modular forms, and these are derived in section 6 below. \end{proof} \begin{prop} There are holomorphic skew-symmetric forms $h_{30},h_{31},h_{32},h_{33},h_{34},h_{35}$, which are obtained from $b_{28}$ and the Maass lifts constructed above by inverting $b_7$, such that every Hermitian modular form for $\mathcal{O}_K$ is a polynomial in $$\mathcal{E}_4,\mathcal{E}_6,b_7,m_8,m_9,m_{10}^{(1)},m_{10}^{(2)},m_{11},m_{12},b_{28},h_{30},h_{31},h_{32},h_{33},h_{34},h_{35}.$$ \end{prop} \begin{proof} As a skew-symmetric form, $F$ has a forced zero on the Heegner divisor $\mathcal{H}_7$. If $F$ has even weight, the point will be to subtract away skew-symmetric forms from $F$ to produce something with at least a seventh-order zero on the surface $\mathcal{H}_1$, which will therefore be divisible by $b_{28}$. By contrast if $F$ has odd weight then it seems to be more effective to reduce first against the product $b_7$. (i) Suppose $F$ has even weight, so its order along $\mathcal{H}_1$ is odd and its quasi-pullback to $\mathcal{H}_1$ takes the form $$\mathrm{Q}F = \psi_{35} P(\psi_4,\psi_6,\psi_{10},\psi_{12})$$ for some polynomial $P$. The quotients $h_{30} := b_{28} \frac{m_9}{b_7}, h_{32} := b_{28} \frac{m_9^2}{b_7^2}, h_{34} := b_{28} \frac{m_9^3}{b_7^3}$ are holomorphic and skew-symmetric, with zeros along $\mathcal{H}_1$ of order $5,3,1$ respectively, and in all cases their quasi-pullback to $\mathcal{H}_1$ is a constant multiple of $\psi_{35}$. By subtracting from $F$ expressions of the form $$\{h_{30},h_{32},h_{34}\} \cdot P(\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12}),$$ we are able to force the first, third and fifth order pullbacks of $F$ to $\mathcal{H}_1$ to vanish. But then $F$ is divisible by $b_{28}$ with symmetric quotient, so we apply the previous proposition. \\ (ii) Suppose $F$ has odd weight (and therefore even order along $\mathcal{H}_1$). Then we will find expressions to subtract away from $F$ to force divisibility by $b_7$. (The reduction against $b_{28}$ as in the even-weight case seems impossible, as there are no skew-symmetric modular forms of weight $29$ and therefore no way to handle sixth-order zeros on $\mathcal{H}_1$.) We will first force $F$ to have at least a fourth-order zero along $\mathcal{H}_1$. The quotients $$h_{33} := \frac{b_{28} m_{10}^{(2)} m_9}{b_7^2}, \; h_{35} := \frac{b_{28} m_{10}^{(2)} m_9^2}{b_7^3}$$ are holomorphic and skew-symmetric, with zeros along $\mathcal{H}_1$ of orders $2$ and $0$, respectively, and their quasi-pullbacks to $\mathcal{H}_1$ are again constant multiples of $\psi_{35}$. By subtracting from $F$ expressions of the form $$\{h_{33},h_{35}\} \cdot P(\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12}),$$ we can ensure that the $0^{\mathrm{th}}$ and $2^{\mathrm{nd}}$ pullbacks of $F$ to $\mathcal{H}_1$ vanish, so $\mathrm{ord}_{\mathcal{H}_1}(F) \ge 4$. \\ Now the pullback of $F$ to $\mathcal{H}_2$ is skew-symmetric, has odd weight, and vanishes on the diagonal to order at least four, so it is therefore a multiple of the weight $31$ form $\phi_8 \phi_{11} f_{12}$: i.e. $$F\Big|_{\mathcal{H}_2} = \phi_8 \phi_{11} f_{12} P(E_4,E_6,\phi_8,\phi_{10},\phi_{12})$$ for some polynomial $P$. But the form $$h_{31} := \frac{b_{28} m_{10}^{(2)}}{b_7}$$ is holomorphic and skew-symmetric, with a fourth-order zero on $\mathcal{H}_1$, and it restricts to (a multiple of) $\phi_8 \phi_{11} f_{12}$ on $\mathcal{H}_2$. Therefore, some expression of the form $$F - h_{31} P(\mathcal{E}_4,\mathcal{E}_6,m_8,m_{10}^{(1)},m_{12})$$ has a zero on $\mathcal{H}_2$ and continues to have at least a fourth-order zero on $\mathcal{H}_1$. The result will be divisible by $b_7$ with the quotient having even weight and therefore being covered by case (i). \end{proof} \section{Hermitian modular forms for $\mathbb{Q}(\sqrt{-11})$} In this section we reduce the computation of the graded ring of Hermitian modular forms of degree two for the maximal order in $\mathbb{Q}(\sqrt{-11})$ to the results of Igusa and Dern on paramodular forms. The argument is very nearly the same as the previous section. We first deal with symmetric Hermitian modular forms (of all weights) by reduction against the distinguished Borcherds product $b_5$ with divisor $$\mathrm{div}\, b_5 = 5 \mathcal{H}_1 + \mathcal{H}_3.$$ The Maass lifts we take as generators are described in more detail in the tables on the next page. \afterpage{ \clearpag \begin{landscape \begin{footnotesize} As in the previous section, the input forms into the Maass lift in Tables 4 and 5 are expressed as component sums using the convention of \cite{BB} and \cite{SW}. The Borcherds products $b_5,b_8,b_9$ satisfy the Maass condition so they are listed both as Maass lifts and Borcherds products. \begin{table}[htbp] \centering \caption{Maass lifts in even weight} \begin{tabular}{l*{8}{c}r} \hline Name & Weight & Input form & $P_0^{\mathcal{H}_1}$ & $P_2^{\mathcal{H}_1}$ & $P_4^{\mathcal{H}_1}$ & $P_0^{\mathcal{H}_3}$ & $P_1^{\mathcal{H}_3}$\\ \hline \hline $\mathcal{E}_4$ & 4 & $1 + 2q^2 + 20q^6 + 32q^7 + 34q^8 + 52q^{10} + ...$ & $E_4$ & $0$ & $0$ & $E_4$ & $0$ \\ \hline $\mathcal{E}_6$ & 6 & $1 - \frac{22}{85}q^2 - \frac{1804}{85}q^6 - \frac{704}{17}q^7 - \frac{5654}{85}q^8 - \frac{13772}{85}q^{10} - ... $ & $E_6$ & $0$ & $-\frac{26345088}{17}\psi_{10}$ & $E_6 - \frac{266112}{5185}\varphi_6$ & $0$ \\ \hline $m_6$ & $6$ & $q^2 - 3q^6 - 10q^7 + 2q^8 + 31q^{10} \pm ...$ & $0$ & $0$ & $37440\psi_{10}$ & $2\varphi_6$ & $0$ \\ \hline $m_8$ & $8$ & $q^2 - 3q^6 + 14q^7 + 2q^8 - 65q^{10} \pm ...$ & $0$ & $0$ & $62016\psi_{12}$ & $2\varphi_8$ & $48\varphi_9$ \\ \hline $b_8$ & $8$ & $q^6 - q^7 - q^8 + q^{11} + q^{13} \pm ...$ & $0$ & $120 \psi_{10}$ & $-544\psi_{12}$ & $0$ & $-6\varphi_9$ \\ \hline $m_{10}^{(1)}$ & $10$ & $q^6 + 3q^7 - q^8 + 8q^{10} - 11q^{11} - 27q^{13} \pm ...$ & $0$ & $152 \psi_{12}$ & $2688E_4 \psi_{10}$ & $-\frac{1}{6}E_4 \varphi_6 + \frac{1}{6} \varphi_{10}$ & $2\varphi_{11}$ \\ \hline $m_{10}^{(2)}$ & $10$ & $q^6 - q^7 + 11q^8 - 12q^{10} - 11q^{11} + q^{13} \pm ...$ & $24\psi_{10}$ & $-16\psi_{12}$ & $240 E_4 \psi_{10}$ & $0$ & $-6\varphi_{11}$ \\ \hline $m_{12}$ & $12$ & $q^2 + 136q^6 - 77q^7 + 7q^8 + 463q^{10} \pm ...$ & $288 \psi_{12}$ & $24136 E_4 \psi_{10}$ & $1023040E_6 \psi_{10} + 34784E_4 \psi_{12}$ & $2\varphi_{12}$ & $-690E_4 \varphi_9$ \\ \hline \end{tabular} \end{table} \begin{table}[htbp] \centering \caption{Maass lifts in odd weight} \begin{tabular}{l*{8}{c}r} \hline Name & Weight & Input form & $P_1^{\mathcal{H}_1}$ & $P_3^{\mathcal{H}_1}$ & $P_5^{\mathcal{H}_1}$ & $P_0^{\mathcal{H}_3}$ & $P_1^{\mathcal{H}_3}$\\ \hline \hline $b_5$ & $5$ & $\chi(8)q^2 - 5\chi(7)q^6 + 4\chi(2)q^7 + 10\chi(6)q^8 - 5\chi(1)q^{10} \pm ...$ & $0$ & $0$ & $187200\psi_{10}$ & $0$ & $6\varphi_6$ \\ \hline $m_7$ & $7$ & $\chi(8)q^2 + 7\chi(7)q^6 - 8\chi(2)q^7 - 26\chi(6)q^8 + 19\chi(1)q^{10} \pm ...$ & $0$ & $4320\psi_{10}$ & $-32640\psi_{12}$ & $0$ & $6\varphi_8$ \\ \hline $b_9$ & $9$ & $\chi(2)q^7 - \chi(6)q^8 - \chi(1)q^{10} + \chi(8) q^{13} + \chi(7)q^{17} \pm ...$ & $\psi_{10}$ & $-40\psi_{12}$ & $2472E_4 \psi_{10}$ & $\frac{1}{2}\varphi_9$ & $\frac{1}{24}E_4 \varphi_6 - \frac{1}{24}\varphi_{10}$ \\ \hline $m_9$ & $9$ & $\chi(8)q^2 + 19\chi(7)q^6 - 20\chi(2)q^7 + 82\chi(6)q^8 - 101\chi(1)q^{10} \pm ...$ & $288\psi_{10}$ & $-576\psi_{12}$ & $570816E_4 \psi_{10}$ & $0$ & $\varphi_{10}$ \\ \hline $m_{11}$ & $11$ & $\chi(2)q^7 + 2\chi(6)q^8 + 8 \chi(1)q^{10} - 17\chi(8)q^{13} - 29\chi(7)q^{17} \pm ...$ & $4 \psi_{12}$ & $-152E_4 \psi_{10}$ & $\frac{8980}{3}E_4 \psi_{12} + \frac{17300}{3}E_6 \psi_{10}$ & $\varphi_{11}$ & $\frac{1}{8}E_4 \varphi_8 - \frac{5}{36} E_6 \varphi_6 - \frac{4560}{61} \varphi_6^2 + \frac{1}{72} \varphi_{12}$ \\ \hline \end{tabular} \end{table} \begin{table}[htbp] \centering \caption{Borcherds products} \begin{tabular}{l*{4}{c}r} \hline Name & Weight & Divisor & Graded-symmetric? \\ \hline \hline $b_5$ & $5$ & $5\mathcal{H}_1 + \mathcal{H}_3$ & yes \\ \hline $b_8$ & $8$ & $2\mathcal{H}_1 + \mathcal{H}_3 + \mathcal{H}_4$ & yes \\ \hline $b_9$ & $9$ & $\mathcal{H}_1 + \mathcal{H}_5$ & yes \\ \hline $b_{24}$ & $24$ & $11\mathcal{H}_1 + \mathcal{H}_{11}$ & no \\ \hline \end{tabular} \end{table} \end{footnotesize} \end{landscape} \clearpag } \begin{lem} Let $F$ be a symmetric Hermitian modular form. There is a polynomial $P$ such that $$F - P(\mathcal{E}_4,\mathcal{E}_6,m_6,m_8,b_9,m_{10}^{(1)},m_{11},m_{12})$$ vanishes along the Heegner divisor $\mathcal{H}_3$. \end{lem} \begin{proof} We only need to check that the pullbacks of $\mathcal{E}_4,\mathcal{E}_6,m_6,m_8,b_9,m_{10}^{(1)},m_{11},m_{12}$ to $\mathcal{H}_3$ generate the graded ring of paramodular forms of level $3$. This is clear from Tables 4 and 5 below after comparing the pullbacks with the generators found by Dern as described in Section 3. \end{proof} \newpage \begin{thrm} The graded ring of symmetric Hermitian modular forms for $\mathcal{O}_K$ is generated by Maass lifts $$\mathcal{E}_4,b_5,\mathcal{E}_6,m_6,m_7,b_8,m_8,b_9,m_9,m_{10}^{(1)},m_{10}^{(2)},m_{11},m_{12}$$ in weights $4,5,6,6,7,8,8,9,9,10,10,11,12$. \end{thrm} The ideal of relations is considerably more complicated than the analogous ideal for $K = \mathbb{Q}(\sqrt{-7})$ so it is left to an auxiliary file for convenience. \begin{proof} We use induction on the weight. Any modular form of nonpositive weight is constant. \\ Let $F$ be any symmetric Hermitian modular form. Using the previous lemma we assume that $F$ has a zero along $\mathcal{H}_3$. Then the pullbacks of $F$ to $\mathcal{H}_1$ of all orders have at least a double zero along the diagonal and are therefore multiples of $\psi_{10}$. The pullbacks of $\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12}$ to $\mathcal{H}_1$ generate the ring of even-weight Siegel modular forms of degree two. Moreover, the forms $m_{10}^{(2)},m_9,b_8,m_7$ vanish along $\mathcal{H}_3$ and their quasi-pullbacks to $\mathcal{H}_1$ are scalar multiples of $\psi_{10}$. By successively subtracting away from $F$ expressions of the form $$\{m_{10}^{(2)},m_9,b_8,m_7\} \cdot P(\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12})$$ with appropriately chosen polynomials $P$, we may set the zeroth, first, second and third order pullbacks to $\mathcal{H}_1$ equal to zero while maintaining a zero on the divisor $\mathcal{H}_3$. Therefore, we may assume that $F$ has at least a fourth-order zero on $\mathcal{H}_1$ and a zero on $\mathcal{H}_3$. Suppose $F$ has exactly a fourth-order zero on $\mathcal{H}_1$. (In particular, $F$ has even weight.) Then the quasi-pullback $\mathrm{Q}F$ of $F$ to $\mathcal{H}_3$ is an odd-weight paramodular form of level $3$ with at least a fourth-order zero on the diagonal, so $\mathrm{Q}F$ is a multiple of $\varphi_9$ and $\mathrm{Q}F / \varphi_9$ is contained in the ideal $\langle \varphi_6,\varphi_8,\varphi_{10} \rangle$ of symmetric paramodular forms of even weight with a zero on the diagonal. Then we can write $$\mathrm{Q}F = \varphi_6 \varphi_9 P_1 + \varphi_8 \varphi_9 P_2 + \Big( -\frac{1}{6} E_4 \varphi_6 + \frac{1}{6} \varphi_{10}\Big) \varphi_9 P_3$$ for some even-weight symmetric paramodular forms $P_1,P_2,P_3$. Since $m_6 b_8$, $m_8 b_8$ and $m_{10}^{(1)} b_8$ have fourth-order zeros on $\mathcal{H}_1$ and are zero on $\mathcal{H}_3$ with respective quasi-pullbacks $\varphi_6 \varphi_9$, $\varphi_8 \varphi_9$ and $(-1/6 E_4 \varphi_6 + \varphi_{10}/6) \varphi_9$, we can take any symmetric forms $\tilde P_1, \tilde P_2, \tilde P_3$ whose pullbacks to $\mathcal{H}_3$ are $P_1,P_2,P_3$ (some polynomials in $\mathcal{E}_4,\mathcal{E}_6,m_6,m_8,b_9,m_{10}^{(1)},m_{11},m_{12}$ will do) and subtract away $$b_8 \cdot \Big( m_6 \tilde P_1 + m_8 \tilde P_2 + m_{10}^{(1)} \tilde P_3 \Big)$$ from $F$ to obtain an even-weight form with (at least) a fourth-order zero on $\mathcal{H}_1$ and (at least) a double zero on $\mathcal{H}_3$. Suppose still that $F$ has order exactly four on $\mathcal{H}_1$. Then the quasi-pullback of $F$ to $\mathcal{H}_1$ is a Siegel modular form of even weight with at least an fourth-order zero on the diagonal (due to the double zero of $F$ on $\mathcal{H}_3$) and is therefore a multiple of $\psi_{10}^2$. Since $b_8^2$ has a fourth-order zero on $\mathcal{H}_1$ with quasi-pullback (up to scalar multiple) $\psi_{10}^2$, and it also has a double zero along $\mathcal{H}_3$, we may subtract away some expression of the form $b_8^2 P(\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12})$ from $F$ to obtain a modular form which vanishes to at least order $5$ along $\mathcal{H}_1$ and which has at least a double zero on $\mathcal{H}_3$. Now if $F$ has order at least $5$ along $\mathcal{H}_1$ and a zero on $\mathcal{H}_3$, then the quotient $F / b_5$ is holomorphic (by Koecher's principle) and has lower weight, so $F/b_5$ and therefore $F$ is a polynomial expression in the generators in the claim. \end{proof} \begin{prop} The graded ring of Hermitian modular forms of degree 2 for $\mathbb{Q}(\sqrt{-11})$ is generated by the symmetric generators of Theorem 10 and the holomorphic quotients $$h_{24+2N} = \frac{b_{24} m_7^N}{b_5^N}, \; 0 \le N \le 5$$ and $$h_{24 + 2N+ 3} = \frac{b_{24} b_8 m_7^N}{b_5^{N+1}}, \; 0 \le N \le 4.$$ \end{prop} \begin{proof} In the even-weight case our goal is to reduce against the skew-symmetric Borcherds product $b_{24}$ with divisor $$\mathrm{div} \, b_{24} = 11 \mathcal{H}_1 + \mathcal{H}_{11}.$$ To show that the pullbacks to $\mathcal{H}_1$ of odd orders $1 \le N \le 9$ are surjective it is enough to find skew-symmetric modular forms of weights $35-N$ with exactly an $N^{\mathrm{th}}$ order zero on $\mathcal{H}_1$ (whose $N^{\mathrm{th}}$ pullback must then be a multiple of $\psi_{35}$), since we have already produced preimages of the even-weight Siegel modular forms. It is easy to see that the quotients $h_{24+2N} = b_{24} (m_7 / b_5)^N$ are holomorphic and have order $11-2N$ on $\mathcal{H}_1$. We will reduce odd-weight skew-symmetric forms $F$ to even-weight skew-symmetric forms by reducing against $b_5$. (The reduction against $b_{24}$ as in the previous paragraph fails as there are no skew-symmetric modular forms of weight 25.) First we force at least a fifth-order zero on $\mathcal{H}_1$ using the holomorphic forms $$h_{24 + 2N + 3} = \frac{b_{24} b_8 m_7^N}{b_5^{N+1}}, \; 2 \le N \le 4,$$ which have a zero of order $8-2N$ on $\mathcal{H}_1$ and whose quasi-pullbacks must be scalar multiples of $\psi_{35}$. Therefore by subtracting away expressions of the form $$\{h_{31},h_{33},h_{35}\} \cdot P(\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12})$$ we may assume that $F$ has at least a sixth-order zero on $\mathcal{H}_5$. Now the pullback of $F$ to $\mathcal{H}_3$ is an skew-symmetric modular form of odd weight with at least a sixth-order zero on the diagonal and is therefore contined in the ideal generated by $\varphi_6 \varphi_9 f_{12}$ and $\varphi_8 \varphi_9 f_{12}$. Up to scalar multiple these are exactly the pullbacks of $h_{27} = \frac{b_{24}b_8}{b_5}$ and $h_{29} = \frac{b_{24} b_8 m_7}{b_5^2}$ to $\mathcal{H}_3$. Since $h_{27}$ and $h_{29}$ both vanish to order at least $5$ on $\mathcal{H}_1$, we subtract away some expression $$h_{27} P_1(\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12}) + h_{29} P_2(\mathcal{E}_4,\mathcal{E}_6,m_{10}^{(2)},m_{12})$$ from $F$ to obtain a form (again called $F$) whose divisor contains $5 \mathcal{H}_1 + \mathcal{H}_3$ and which is therefore divisible by $b_5$. The quotient $F / b_5$ is skew-symmetric of even weight so the previous case applies. \end{proof} \section{Dimension formulas} The task of computing ideals of relations is much easier if dimension formulas for the spaces of modular forms are available (for one thing, such formulas make it clear when enough relations have been found to generate the ideal). In principle the dimensions can always be calculated via a trace formula or Riemann-Roch theorem; however this is a rather lengthy computation which does not seem to appear explicitly in the literature. In this section we observe that those dimensions can be read off almost immediately from the method of proof in sections 4 and 5 above. Recall that the Hilbert series of a finitely generated graded $\mathbb{C}$-algebra $M = \bigoplus_{k=0}^{\infty} M_k$ is $$\mathrm{Hilb}\, M = \sum_{k=0}^{\infty} ( \mathrm{dim}\, M_k) t^k \in \mathbb{Z}[|t|].$$ \subsection{Dimension formulas for $K = \mathbb{Q}(\sqrt{-7})$.} We will express the Hilbert series of dimensions of Hermitian modular forms for $\Gamma_K = \mathrm{SU}_{2,2}(\mathcal{O}_K)$ in terms of the Hilbert series for $\mathrm{Sp}_4(\mathbb{Z})$ and the symmetric paramodular group $K(2)^+ = \langle K(2), V_2 \rangle$ of level 2. Recall that the latter series are $$\sum_{k=0}^{\infty} \mathrm{dim}\, M_k(\mathrm{Sp}_4(\mathbb{Z})) t^k = \frac{1 + t^{35}}{(1 - t^4)(1-t^6)(1-t^{10})(1-t^{12})}$$ and $$\sum_{k=0}^{\infty} \mathrm{dim}\, M_k^{sym}(K(2)) t^k = \frac{(1 + t^{10})(1 + t^{11})}{(1 - t^4)(1-t^6)(1-t^8)(1-t^{12})}$$ corresponding to the ring decompositions $$M_{\ast}(\mathrm{Sp}_4(\mathbb{Z})) = \mathbb{C}[E_4,E_6,\psi_{10},\psi_{12}] \oplus \psi_{35} \mathbb{C}[E_4,E_6,\psi_{10},\psi_{12}]$$ and $$M_{2\ast}^{sym}(K(2)) = \mathbb{C}[E_4,E_6,\phi_8,\phi_{12}] \oplus \phi_{10} \mathbb{C}[E_4,E_6,\phi_8,\phi_{12}], \; \; M_{\ast}^{sym}(K(2)) = M_{2\ast}^{sym}(K(2)) \oplus \phi_{11} M_{2\ast-11}^{sym}(K(2)).$$ We first consider (graded-) symmetric even weight Hermitian modular forms. Write $$H_{even}(t) = \sum_{k \, \text{even}} \mathrm{dim}\, M_k^{sym}(\Gamma_K) t^k, \; \; H_{odd}(t) = \sum_{k \, \text{odd}} \mathrm{dim}\, M_k^{sym}(\Gamma_K) t^k.$$ Although we reduce against the product $b_7$ whose zero on the Heegner divisor $\mathcal{H}_2$ is simple, the proof of Theorem 7 suggests that we consider both the zeroth and first order pullbacks there; so altogether we take the tuple of pullbacks $$P = (P_0^{\mathcal{H}_1},P_2^{\mathcal{H}_1},P_0^{\mathcal{H}_2},P_1^{\mathcal{H}_2}) : M_{2 \ast}^{sym}(\Gamma_K) \longrightarrow M_{2 \ast}(\mathrm{Sp}_4(\mathbb{Z})) \oplus S_{2\ast+2}(\mathrm{Sp}_4(\mathbb{Z})) \oplus M_{2\ast}^{sym}(K(2)) \oplus S_{2\ast+1}^{sym}(K(2)).$$ Then we obtain the exact sequences $$0 \longrightarrow \mathrm{ker}\Big(P_0^{\mathcal{H}_2} : M_{2 \ast -7}^{sym}(\Gamma_K) \rightarrow M_{2 \ast-7}^{sym}(K(2))\Big) \stackrel{\times b_7}{\longrightarrow} M_{2 \ast}^{sym}(\Gamma_K) \stackrel{P}{\longrightarrow} \mathrm{im}\, P \longrightarrow 0$$ and $$0 \longrightarrow \psi_{10}^2 \cdot \Big( M_{2 \ast-20}(\mathrm{Sp}_4(\mathbb{Z})) \oplus M_{2 \ast - 18}(\mathrm{Sp}_4(\mathbb{Z})) \Big) \longrightarrow \mathrm{im}\, P \longrightarrow M_{2 \ast}^{sym}(K(2)) \oplus M_{2 \ast+1}^{sym}(K(2)) \longrightarrow 0,$$ from which we obtain the Hilbert series $$\mathrm{Hilb}\, \mathrm{im}\, P = \frac{t^{18} + t^{20}}{(1 - t^4)(1-t^6)(1-t^{10})(1-t^{12})} + \frac{(1 + t^{10})^2}{(1-t^4)(1-t^6)(1-t^8)(1-t^{12})}$$ and \begin{align*} H_{even}(t) &= \mathrm{Hilb}\, \mathrm{im}\, P + t^7 \Big(H_{odd}(t) - \frac{(1+t^{10})t^{11}}{(1-t^4)(1-t^6)(1-t^8)(1-t^{12})} \Big) \\ &= t^7 H_{odd}(t) + \frac{1 + t^{10} - t^{26} - t^{28} - t^{30} + t^{38}}{(1-t^4)(1-t^6)(1-t^8)(1-t^{10})(1-t^{12})}. \end{align*} By reducing odd-weight symmetric forms against $b_7$ we obtain the exact sequences $$0 \longrightarrow M_{2\ast - 6}^{sym}(\Gamma_K) \stackrel{\times b_7}{\longrightarrow} M_{2\ast+1}^{sym}(\Gamma_K) \stackrel{P = (P_1^{\mathcal{H}_1},P_0^{\mathcal{H}_2})}{\longrightarrow} \mathrm{im}\, P \longrightarrow 0$$ and $$0 \longrightarrow \psi_{10} \cdot M_{2 \ast - 9}(\mathrm{Sp}_4(\mathbb{Z})) \longrightarrow \mathrm{im}\, P \longrightarrow M_{2\ast+1}^{sym}(K(2)) \longrightarrow 0$$ and therefore $$H_{\mathrm{odd}}(t) = t^7 H_{\mathrm{even}}(t) + \frac{t^9}{(1-t^4)(1-t^6)(1-t^{10})(1-t^{12})} + \frac{(1+t^{10})t^{11}}{(1 - t^4)(1-t^6)(1-t^8)(1-t^{12})}.$$ These equations resolve to \begin{align*} &\quad \mathrm{Hilb}\, M_{\ast}^{sym}(\Gamma_K) = H_{even}(t) + H_{odd}(t) \\ &= \frac{1 + t^4 + t^8 + t^9 + t^{10} + t^{11} + t^{12} + t^{13} + t^{14} + t^{15} + t^{16} + t^{18} + t^{19} + t^{20} + t^{22} + t^{23} + t^{24} + t^{27} - t^{30} - t^{34}}{(1 - t^6)(1-t^7)(1-t^8)(1-t^{10})(1-t^{12})}. \end{align*} Now we compute dimensions of spaces of (graded) skew-symmetric modular forms. For even-weight forms the first, third and fifth order pullbacks to $\mathcal{H}_1$ yield an exact sequence $$0 \longrightarrow M_{2\ast-28}^{sym}(\Gamma_K) \stackrel{\times b_{28}}{\longrightarrow} M_{2\ast}^{skew}(\Gamma_K) \stackrel{(P_1,P_3,P_5)}{\longrightarrow} S_{2\ast+1}(\mathrm{Sp}_4(\mathbb{Z})) \oplus S_{2\ast+3}(\mathrm{Sp}_4(\mathbb{Z})) \oplus S_{2\ast+5}(\mathrm{Sp}_4(\mathbb{Z})) \longrightarrow 0$$ and we obtain the generating series $$\sum_{k=0}^{\infty} \mathrm{dim}\, M_{2k}^{skew}(\Gamma_K) t^{2k} = \frac{t^{30} + t^{32} + t^{34}}{(1 - t^4)(1-t^6)(1-t^{10})(1 - t^{12})} + t^{28} \sum_{k=0}^{\infty} \mathrm{dim}\, M_{2k}^{sym}(\Gamma_K) t^{2k}.$$ As for odd-weight skew-symmetric forms, we use the exact sequences $$0 \longrightarrow M_{2\ast-6}^{skew}(\Gamma_K) \stackrel{\times b_7}{\longrightarrow} M_{2\ast+1}^{skew}(\Gamma_K) \stackrel{P = (P_0^{\mathcal{H}_1},P_2^{\mathcal{H}_1},P_0^{\mathcal{H}_2})}{\longrightarrow} \mathrm{im}\, P \longrightarrow 0$$ and $$0 \longrightarrow \phi_8 \phi_{11} f_{12} M_{2\ast-30}^{sym}(K(2)) \longrightarrow \mathrm{im}\, P \longrightarrow M_{2\ast+1}(\mathrm{Sp}_4(\mathbb{Z})) \oplus M_{2\ast+3}(\mathrm{Sp}_4(\mathbb{Z})) \longrightarrow 0$$ to obtain \begin{align*} \sum_{k=0}^{\infty} \mathrm{dim}\, M_{2k+1}^{skew}(\Gamma_K) t^{2k+1} &= \frac{t^{33} + t^{35}}{(1 - t^4)(1-t^6)(1-t^{10})(1 - t^{12})} + \frac{t^{31}(1 + t^{10})}{(1 - t^4)(1-t^6)(1-t^8)(1-t^{12})} \\ &\quad \quad + t^7 \sum_{k=0}^{\infty} \mathrm{dim}\, M_{2k}^{skew}(\Gamma_K) t^{2k}, \end{align*} reducing the computation to the previous paragraph. Altogether we find $$\sum_{k=0}^{\infty} \mathrm{dim}\, M_k(\Gamma_K) t^k = \frac{P(t)}{(1-t^4)(1 - t^6)(1-t^7)(1-t^{10})(1-t^{12})}$$ where \begin{align*}P(t) &= 1 + t^{8} + t^{9} + t^{10} + t^{11} + t^{16} + t^{18} + t^{19} + t^{24}+ t^{27} + 2t^{32} + t^{33} + t^{34} + 2t^{35} - t^{42} + t^{43}. \end{align*} The table below lists dimensions for the full space of Hermitian modular forms; the subspace of graded-symmetric Hermitian modular forms; and the subspace of Maass lifts. \begin{table}[htbp] \centering \caption{Dimensions for $\mathbb{Q}(\sqrt{-7})$} \begin{tabular}{l*{21}{c}r} \hline $k$ & 1 & 2 & 3 & 4 & 5 & 6 & 7 & 8 & 9 & 10 & 11 & 12 & 13 & 14 & 15 & 16 & 17 & 18 & 19 & 20 \\ \hline $\mathrm{dim}\, M_k(\Gamma_K)$ & 0 & 0 & 0 & 1 & 0 & 1 & 1 & 2 & 1 & 3 & 2 & 4 & 2 & 5 & 4 & 8 & 5 & 10 & 8 & 13 \\ \hline $\mathrm{dim}\, M_k^{sym}(\Gamma_K)$ & 0 & 0 & 0 & 1 & 0 & 1 & 1 & 2 & 1 & 3 & 2 & 4 & 2 & 5 & 4 & 8 & 5 & 10 & 8 & 13 \\ \hline $\mathrm{dim}\, \mathrm{Maass}_k(\Gamma_K)$ & 0 & 0 & 0 & 1 & 0 & 1 & 1 & 2 & 1 & 3 & 2 & 3 & 2 & 4 & 3 & 5 & 3 & 5 & 4 & 6 \\ \hline \hline $k$ & 21 & 22 & 23 & 24 & 25 & 26 & 27 & 28 & 29 & 30 & 31 & 32 & 33 & 34 & 35 & 36 & 37 & 38 & 39 & 40 \\ \hline $\mathrm{dim}\, M_k(\Gamma_K)$ & 10 & 17 & 14 & 22 & 17 & 26 & 23 & 35 & 28 & 42 & 37 & 52 & 44 & 63 & 57 & 76 & 66 & 90 & 84 & 109 \\ \hline $\mathrm{dim}\, M_k^{sym}(\Gamma_K)$ & 10 & 17 & 14 & 22 & 17 & 26 & 23 & 34 & 28 & 41 & 36 & 50 & 43 & 60 & 54 & 72 & 63 & 84 & 78 & 101 \\ \hline $\mathrm{dim}\, \mathrm{Maass}_k(\Gamma_K)$ & 4 & 7 & 5 & 7 & 5 & 8 & 6 & 9 & 6 & 9 & 7 & 10 & 7 & 11 & 8 & 11 & 8 & 12 & 9 & 13 \\ \hline \end{tabular} \end{table} \subsection{Dimension formulas for $K = \mathbb{Q}(\sqrt{-11})$.} The procedure we use to compute Hilbert series of Hermitian modular forms for the field $\mathbb{Q}(\sqrt{-11})$ is mostly the same as the previous subsection. Here we need the corresponding series for symmetric paramodular forms of level three: $$\sum_{k=0}^{\infty} \mathrm{dim}\, M_k^{sym}(K(3)) t^k = \frac{1 + t^8 + t^{9} + t^{10} + t^{11} + t^{19}}{(1 - t^4)(1-t^6)^2 (1 - t^{12})}.$$ (This can be derived from Corollary 5.6 of \cite{Dern2} or computed directly. We remark that the series presented in \cite{Dern2} do not agree with this because the definition of ``symmetric" there is not graded-symmetric.) \\ Again write $$H_{even}(t) = \sum_{k \, \text{even}} \mathrm{dim}\, M_k^{sym}(\Gamma_K) t^k, \; \; H_{odd}(t) = \sum_{k \, \text{odd}} \mathrm{dim}\, M_k^{sym}(\Gamma_K) t^k.$$ Let $P = (P_0^{\mathcal{H}_1},P_2^{\mathcal{H}_1},P_4^{\mathcal{H}_1},P_0^{\mathcal{H}_3},P_1^{\mathcal{H}_3}) $ denote the tuple of pullbacks $$P : M_{2*}^{sym}(\Gamma_K) \rightarrow M_{2*}(\mathrm{Sp}_4(\mathbb{Z})) \oplus S_{2*+2}(\mathrm{Sp}_4(\mathbb{Z})) \oplus S_{2*+4}(\mathrm{Sp}_4(\mathbb{Z})) \oplus M_{2*}^{sym}(K(3)) \oplus S_{2*+1}^{sym}(K(3)).$$ Reducing graded-symmetric even-weight forms against $b_5$ yields the exact sequences $$0 \rightarrow \mathrm{ker}\Big(P_0^{\mathcal{H}_3} : M_{2\ast-5}^{sym}(\Gamma_K) \rightarrow M_{2\ast-5}^{sym}(K(3)) \Big) \stackrel{\times b_5}{\longrightarrow} M_{2 \ast}^{sym}(\Gamma_K) \stackrel{P}{\longrightarrow} \mathrm{im}\, P \rightarrow 0,$$ $$0 \rightarrow \psi_{10}^2 \cdot \Big( \bigoplus_{k \in \{0,2,4\}} M_{2\ast - 20 + 2k}(\mathrm{Sp}_4(\mathbb{Z})) \Big) \longrightarrow \mathrm{im}\, P \longrightarrow M_{2 \ast}^{sym}(K(3)) \oplus M_{2\ast+1}^{sym}(K(3)) \longrightarrow 0,$$ from which we obtain $$\mathrm{Hilb}\, \mathrm{im}\, P = \frac{t^{16} + t^{18} + t^{20}}{(1-t^4)(1-t^6)(1-t^{10})(1-t^{12})} + \frac{1 + 2t^8 + 2t^{10} + t^{18}}{(1-t^4)(1-t^6)^2(1-t^{12})}$$ and \begin{align*} H_{even}(t) &= \mathrm{Hilb} \, \mathrm{im}\, P + t^5 \Big( H_{odd}(t) - \frac{t^9 + t^{11} + t^{19}}{(1-t^4)(1-t^6)^2(1-t^{12})} \Big) \\ &= t^5 H_{odd}(t) + \frac{1 + 2t^8 + t^{10} - t^{14} - t^{20} - t^{22} - t^{24} - t^{28} + t^{34}}{(1-t^4)(1-t^6)^2(1-t^{10})(1-t^{12})}. \end{align*} Similarly, the reduction of odd-weight symmetric forms against $b_5$ through the tuple of pullbacks $P = (P_1^{\mathcal{H}_1},P_3^{\mathcal{H}_1},P_0^{\mathcal{H}_3})$ yields the exact sequences $$0 \longrightarrow M_{2\ast-4}^{sym}(\Gamma_K) \stackrel{\times b_5}{\longrightarrow} M_{2\ast+1}^{sym}(\Gamma_K) \stackrel{P}{\longrightarrow} \mathrm{im}\, P \longrightarrow 0$$ and $$0 \longrightarrow \psi_{10} \cdot \Big( M_{2\ast - 9}(\mathrm{Sp}_4(\mathbb{Z})) \oplus M_{2\ast - 7}(\mathrm{Sp}_4(\mathbb{Z})) \Big) \longrightarrow \mathrm{im}\, P \longrightarrow M_{2\ast+1}^{sym}(K(3)) \longrightarrow 0,$$ so $$H_{odd}(t) = \frac{t^7 + t^9}{(1-t^4)(1-t^6)(1-t^{10})(1-t^{12})} + \frac{t^9 + t^{11} + t^{19}}{(1-t^4)(1-t^6)^2 (1-t^{12})} + t^5 H_{even}(t).$$ Altogether we find \begin{align*} \mathrm{Hilb} \, M_*^{sym}(\Gamma_K) &= H_{even}(t) + H_{odd}(t) \\ &= \frac{1 + t^5 + t^7 + 2t^8 + 2t^9 + 2t^{10} + t^{11} + t^{12} + t^{13} + t^{14} + t^{15} + t^{16} + t^{17} + t^{18} + t^{19} + t^{23} - t^{29}}{(1-t^4)(1-t^6)^2(1-t^{10})(1-t^{12})}. \end{align*} For skew-symmetric modular forms we argue as in the previous subsection and find $$\sum_{k=0}^{\infty} \mathrm{dim}\, M_{2k}^{skew}(\Gamma_K) t^{2k} = \frac{t^{26} + t^{28} + t^{30} + t^{32} + t^{34}}{(1 - t^4)(1-t^6)(1-t^{10})(1-t^{12})} + t^{24} \sum_{k=0}^{\infty} \mathrm{dim}\, M_{2k}^{sym}(\Gamma_K) t^{2k}$$ and \begin{align*} \sum_{k=0}^{\infty} \mathrm{dim}\, M_{2k+1}^{skew}(\Gamma_K) t^{2k+1} &= \frac{t^{31} + t^{33} + t^{35}}{(1 - t^4)(1-t^6)(1-t^{10})(1-t^{12})} + \frac{t^{27} + t^{29} + t^{37}}{(1 - t^4)(1-t^6)^2 (1 - t^{12})} \\ &\quad + t^5 \sum_{k=0}^{\infty} \mathrm{dim}\, M_{2k}^{skew}(\Gamma_K) t^{2k}, \end{align*} and altogether $$ \sum_{k=0}^{\infty} \mathrm{dim}\, M_k(\Gamma_K) t^k = \frac{P(t)}{(1-t^4)(1-t^5)(1-t^6)^2(1-t^{12})}$$ where \begin{align*} P(t) &= 1 + t^{7} + 2t^{8} + 2t^{9} + 2t^{10} + t^{11} - t^{13} - t^{14} - t^{15} + t^{17} + 2t^{18} + 2t^{19} + t^{20} \\ &- t^{22} - t^{23} - t^{24} - t^{25} + t^{26} + 2t^{27} + 2t^{28} + 2t^{29} + 2t^{30} + t^{31} - t^{36} + t^{37}. \end{align*} The table below lists dimensions for the full space of Hermitian modular forms; the subspace of graded-symmetric Hermitian modular forms; and the subspace of Maass lifts. \begin{footnotesize} \begin{table}[htbp] \centering \caption{Dimensions for $\mathbb{Q}(\sqrt{-11})$} \begin{tabular}{l*{21}{c}r} \hline $k$ & 1 & 2 & 3 & 4 & 5 & 6 & 7 & 8 & 9 & 10 & 11 & 12 & 13 & 14 & 15 & 16 & 17 & 18 & 19 & 20 \\ \hline $\mathrm{dim}\, M_k(\Gamma_K)$ & 0 & 0 & 0 & 1 & 1 & 2 & 1 & 3 & 3 & 5 & 4 & 8 & 6 & 10 & 10 & 15 & 14 & 21 & 19 & 28 \\ \hline $\mathrm{dim}\, M_k^{sym}(\Gamma_K)$ & 0 & 0 & 0 & 1 & 1 & 2 & 1 & 3 & 3 & 5 & 4 & 8 & 6 & 10 & 10 & 15 & 14 & 21 & 19 & 28 \\ \hline $\mathrm{dim}\, \mathrm{Maass}_k(\Gamma_K)$ & 0 & 0 & 0 & 1 & 1 & 2 & 1 & 3 & 3 & 4 & 3 & 5 & 4 & 6 & 5 & 7 & 6 & 8 & 6 & 9 \\ \hline \hline $k$ & 21 & 22 & 23 & 24 & 25 & 26 & 27 & 28 & 29 & 30 & 31 & 32 & 33 & 34 & 35 & 36 & 37 & 38 & 39 & 40 \\ \hline $\mathrm{dim}\, M_k(\Gamma_K)$ & 27 & 36 & 35 & 49 & 45 & 60 & 60 & 77 & 76 & 98 & 94 & 120 & 120 & 147 & 147 & 181 & 177 & 216 & 219 & 260 \\ \hline $\mathrm{dim}\, M_k^{sym}(\Gamma_K)$ &27 & 36 & 35 & 48 & 45 & 59 & 59 & 75 & 74 & 94 & 91 & 114 & 114 & 138 & 138 & 168 & 165 & 198 & 200 & 236 \\ \hline $\mathrm{dim}\, \mathrm{Maass}_k(\Gamma_K)$ & 8 & 10 & 8 & 11 & 9 & 12 & 10 & 13 & 11 & 14 & 11 & 15 & 13 & 16 & 13 & 17 & 14 & 18 & 15 & 19 \\ \hline \end{tabular} \end{table} \end{footnotesize} \bibliographystyle{plainnat} \bibliofont
\section{Introduction} \label{sec:introduction} Game playing has long been a core area of traditional AI research. While classical board games such as Chess and Go are computationally very hard, they are also somewhat simple in their actual game play mechanics and representations. Modern board games, such as Settlers of Catan, Ticket to Ride, Agricola, etc. are a rich source of entertainment and creativity that often include complicated game states and complex rules. The more complicated game states, rules, and interactions represent a challenge for implementing game playing logic. In particular, the branching factor is often very large, and at the same time the complicated states make each step much more computationally expensive. Patchwork~\cite{game:patchwork} by Uwe Rosenberg is a two player strategy game that uses polyomino tile drafting and placement. A polyomino is a geometric form formed by joining one or more squares edge to edge, for example as in Tetris. It was released in 2014, and is in the top 100 games on Board Game Geek~\cite{bgg:toplist}. The game is simple to describe for a human, but the central tile placement mechanic is non-trivial to implement in an effective and correct manner. This paper shows how to implement the tile placement sub-problem using constraint programming. Game playing AI typically uses a tree-based search such as Minimax, Alpha-Beta, or Monte-Carlo Tree Search. For reaching good performance, it is crucial to have heuristics for guiding the tree search into promising parts of the search tree quickly, AlphaGo~\cite{Silver2016} is a prime example of this. In Patchwork, this requires having good heuristics for packing polyominoes. This paper defines a \emph{strategy} as a combination of a \emph{policy} used for creating placements of the tiles and an \emph{evaluation} that chooses among the generated placements. Policies are designed based on classical packing literature, in particular the Bottom-Left strategy from~\cite{Baker1980}. In addition and as contrast, standard constraint programming heuristics are also used for placement policies, both simple heuristics such as first-fail as well as more advanced modern heuristics such as accumulated failure count/weighted degree~\cite{Boussemart04}. For evaluation, \emph{global propagation guided regret} is introduced, essentially choosing placements based on not ruling out later placements. This is contrasted with more obvious measures such as packing to the left or towards a corner. \paragraph{Contributions} This paper proposes using constraint programming for implementing parts of complex game states in modern board games. It extends and improves a previous polyomino placement model using \cons{regular} constraints, including optional placements and explicit handling of transformations. A formulation for exact resource usage for tiles using \cons{regular} constraints is also introduced. For guiding search, a new and straight-forward heuristic called \emph{propagation guided global regret} is designed, that uses look-ahead and the results of propagation to guide search. Extensive evaluation of the model and proposed heuristics is done. \paragraph{Plan of paper} In the next section, some background on constraint programming and AI for game play is given. In Sect.~\ref{sec:patchwork} the game Patchwork is described in detail. Sect.~\ref{sec:model} introduces the model for the core placement problem, and the following section introduces the placement heuristics developed. The heuristics are evaluated in Sect.~\ref{sec:experiments}, and finally some conclusions and directions for future work are given. \section{Background} \label{sec:background} This paper is concerned with implementing a representation of a part of a game state using constraint programming. To give the context, some general background on both game playing AI and constraint programming is needed. \subsection{Game playing} \label{sec:game-playing} Game playing is a branch of AI where agents interact following a certain set of rules. Common board games are typically \emph{discrete} and \emph{sequential}. The number of potential actions in each step is the \emph{branching factor} ($b$), and the number of actions taken by each agent during a game is the number of \emph{plies} ($d$). The full tree defined by the potential actions is typically very large, in the order of $O(b^d)$. Game playing is most often implemented using heuristic state space exploring game tree search. Typical classical examples are Minimax and Alpha-beta pruning. More recently, Monte-Carlo Tree Search (MCTS) has become very influential. For a survey of MCTS methods and results, see~\cite{Browne2012}. A core issue in implementing a game playing AI system is to represent the game state. Key requirements are \emph{correctness}, \emph{speed}, and \emph{memory size}. Classical games such as Chess, Go, and Othello/Reversi have fairly simple game states, and much effort has been in creating very small and efficient representations. Modern board games in contrast have more complex state spaces and rules, which complicate game state implementation. Some recent examples of implementing game AI for modern board games include Settlers of Catan~\cite{Szita2009}, Scotland Yard~\cite{Nijssen2012}, 7~Wonders~\cite{Robilliard2014}, and Kingdomino~\cite{Gedda2018}. \subsection{Constraint programming} \label{sec:cp} Constraint programming is a method for modeling and solving combinatorial (optimization) problems. Modeling problems with constraint programming is done by defining the variables of the problem and the relations, called constraints, that must hold between these variables for them to represent a solution. A key feature is that variables have finite domains of possible values. Constraints can be simple logical and arithmetic constraints as well as complicated global or structural constraints. Of particular interest for this paper is the the \cons{regular} constraint introduced by Pesant~\cite{Pesant2004}, where a specification for a regular language (a regular expression or a finite automaton) is used to constraint a sequence of variables. \section{Patchwork} \label{sec:patchwork} Patchwork~\cite{game:patchwork} is the first game in a series of games by Uwe Rosenberg that uses placing polyominoes as a core game mechanic. Patchwork is the simplest of these games, with the polyomino placement being front and center to the game play. It is a top-ranking game on the Board Game Geek website, at place 64 out of more than a hundred thousand entries~\cite{bgg:toplist} in July 2019, around five years after the original release. \begin{figure} \centering \includegraphics[width=0.8\textwidth]{game-in-progress-small.png} \caption{Patchwork game in progress} \label{fig:game-in-progress} \end{figure} \subsection{Rules} \label{sec:patchwork:rules} Patchwork is a two-player game with perfect information. The game consists of 33 polyominoes called \emph{patches}, a marker, currency markers called \emph{buttons}, two player tokens, two 9 by 9 boards (one per player) where patches are to be placed, and a central time board. Each patch has a button cost, a time cost, and between 0 and 3 buttons for income. The time board has 53 steps in total. Five of the steps have a special 1 by 1 patch, and 9 steps are marked for income. At the start of the game, the patches are organized in a circle, with a marker after the smallest patch. The player tokens are at the start of the time board, and each player has an empty board and 5 buttons. The game is scored based on the number of buttons gained and squares covered for each player at the end of the game. In each turn, the player whose marker is the furthest back gets to move (if both players are at the same place, the last to arrive there gets to play). When making a move, a player may either advance their time marker to the step after the other player or buy and place a patch. Advancing the time marker to the step after the opponents time token is always possible, and gives the number of steps in button income. To buy and place a patch, the player may choose one of the three next patches in the circle. The player must pay the indicated number of buttons on the patch (between 0 and 10) and place the patch on their board. The marker is moved to the place of the bought patch, and the player token is moved the number of steps indicated on the patch (between 1 and 6). To buy a patch, the player must have sufficient funds and the ability to place the patch on their board. If the player when advancing passes a step marked for income on the time board, they collect new buttons based on the number of income buttons on the patches they have placed. If the player is the first to pass one of the special 1 by 1 patches on the time board, they get the patch and place it on their board immediately. The game ends when both players have reached the center of the time board. The final score is the buttons they have acquired, minus two for each uncovered square on the board. The first player (if any) that filled a complete 7 by 7 area of their board gets an extra 7 points. For a full description of the rules, see~\cite{game:patchwork}. \subsection{Strategy} \label{sec:patchwork:strategy} The game requires balancing income, filling squares, and placing patches to not disallow future patch placements. The time remaining for a player can be viewed as a resource that is spent when making moves. Initially the player has $5 - 2\cdot9\cdot9=-157$ points. If no patches are purchased (only advancing the time marker), the final score for the player would be $-157 + 53=-104$. A normal good score for patchwork is positive, leading to a goal of earning at least 3 points per square advanced ($157/53\approx 2.96$). Each patch can be evaluated in isolation for the total change in score that patch would give. There are four main things to consider for a patch $P$: \begin{itemize} \item Size $S_P$, the number of squares the patch will cover. \item Button cost $C_P$, the number of buttons to pay for the patch. \item Time cost $T_P$, the number of steps to advance the time marker. \item Button income $B_P$, the number of buttons to collect at income spots. \end{itemize} The total income gained by the end of the game when buying patch $P$ at time $t$ is determined by the number of remaining button income spots on the board $I(t)$ (starting at 9 and mostly evenly spaced out). Assuming that we are interested in maximizing our point gain per time used for patch $P$ at time $t$, the following formula can be used \begin{equation} \label{eq:gain} G(P,t) = \frac{2\cdot S_P - C_P + I(t)\cdot B_P}{\min(T_P, 53-t)} \end{equation} Two additional issues relevant to the above evaluation are the 7-by-7 bonus and the size 1 squares on the board. The bonus is a property that needs to be planned for, so we leave it to the planning. The 5 size 1 squares are each on their own worth 2 points and can easily be added when evaluating $G$, but depend on the current game state. Their main use however is in either completing a 7-by-7 square or \emph{preventing} the opponent from completing their own 7-by-7 square. Again, we leave this out of the basic evaluation since it is question of planning and not static evaluation. \subsection{Characteristics} \label{sec:patchwork:characteristics} The game is as mentioned a 2-player game with perfect information. The game set-up includes a shuffle of the polyominoes giving $32!\approx 2.6\cdot 10^{35}$ different games. The branching factor can be quite large. The first part is the choice of either advancing the time marker or buying one of the three next patches (if possible). Given that a patch is bought, it must be placed on the board. For example, in the initial step, a 2 by 3 L-part can be placed in 42 different positions for each of the 8 symmetries of the patch. The average branching factor is experimentally found by running 100 random games. Both players use a simple heuristic, by choosing tiles based on Equation~\ref{eq:gain} and placing tiles using \emph{BL-Every} and \emph{Regret} (see Sections~\ref{sec:placing-tiles} and~\ref{sec:experiments}), In this setting, the game averages 23.2 plies for the first player and 23 plies for the second player, with an average branching factor of 83.2. There is also a slight first-player advantage in this setting, with the first player winning 56 games. \section{Placement model} \label{sec:model} Core for implementing a game state for Patchwork is the players individual boards where patches are placed. Implementing placement and packing from scratch is complicated and error-prone. We use constraint programming to quickly and reliably implement the packing part of the game state. The model for placing parts on the board builds upon the placement model for polyominoes introduced in~\cite{Lagerkvist2008}. The model uses \cons{regular} constraints to specify the required placement of a patch on a board. First the original model is explained briefly, and then the additions for Patchwork are given. \subsection{Original model} \label{sec:model:original} Consider the placement of the patch in Figure~\ref{fig:part-and-board} in the 4-by-4 grid shown. Each square is represented by a $0/1$-variable ($1$ meaning the patch covers the square), and the grid is encoded in row-major order. All placements of the patch are encoded by the regular expression $0^*110^310^310^*$. This encoding includes all valid placements, but it also includes some invalid ones (see right side in Figure~\ref{fig:valid-invalid-placement}). To forbid such placements, an extra column of dummy squares is added that are fixed to 0 as shown in Figure~\ref{fig:extended-board-placement}, and the expression is changed to $0^*110^410^410^*$. Rotations and flips are handled by combining the regular expressions for each transform using disjunction, relying on the DFA minimization for removing states representing equal rotations. Unique sets $B_p$ of $0/1$ variables are used for each patch $p$. The variables for different patches are connected with integer variables $B$ with domain values representing patches, empty squares, and the end column: $P\cup \textrm{empty}\cup \textrm{end}$. While the constraint can be defined directly on the $B$ variables, \cite{Lagerkvist2008} showed that using the auxiliary $B_p$ variables performs much better. \begin{figure} \centering \begin{tikzpicture}[scale=0.5] \draw [fill] (1.1,0.1) -- (1.9,0.1) -- (1.9,2.9) -- (0.1,2.9) -- (0.1,2.1) -- (1.1,2.1); \begin{scope}[xshift=5cm] \draw (0,0) grid (4,4); \node at (0.5,3.5) {A}; \node at (1.5,3.5) {B}; \node at (2.5,3.5) {C}; \node at (3.5,3.5) {D}; \node at (0.5,2.5) {E}; \node at (1.5,2.5) {F}; \node at (2.5,2.5) {G}; \node at (3.5,2.5) {H}; \node at (0.5,1.5) {I}; \node at (1.5,1.5) {J}; \node at (2.5,1.5) {K}; \node at (3.5,1.5) {L}; \node at (0.5,0.5) {M}; \node at (1.5,0.5) {N}; \node at (2.5,0.5) {O}; \node at (3.5,0.5) {P}; \end{scope} \end{tikzpicture} \caption{Part to place and the grid to place on.} \label{fig:part-and-board} \end{figure} \begin{figure} \centering \begin{tikzpicture}[scale=0.5] \draw (0,0) grid (4,4); \draw [fill] (1.1,0.1) -- (1.9,0.1) -- (1.9,2.9) -- (0.1,2.9) -- (0.1,2.1) -- (1.1,2.1); \begin{scope}[xshift=5cm] \draw (0,0) grid (4,4); \draw [fill] (3.1,3.1) -- (4,3.1) -- (4,3.9) -- (3.1,3.9); \draw [fill] (0.1,0.1) -- (0.9,0.1) -- (0.9,2.9) -- (0,2.9) -- (0,2.1) -- (0.1,2.1); \end{scope} \end{tikzpicture} \caption{A valid (left) and an erroneous (right) placement} \label{fig:valid-invalid-placement} \end{figure} \begin{figure}[t] \centering \begin{tikzpicture}[scale=0.5] \draw [fill,lightgray] (4,0) -- (5,0) -- (5,4) -- (4,4); \draw (0,0) grid (5,4); \node at (0.5,3.5) {A}; \node at (1.5,3.5) {B}; \node at (2.5,3.5) {C}; \node at (3.5,3.5) {D}; \node at (4.5,3.5) {Q}; \node at (0.5,2.5) {E}; \node at (1.5,2.5) {F}; \node at (2.5,2.5) {G}; \node at (3.5,2.5) {H}; \node at (4.5,2.5) {R}; \node at (0.5,1.5) {I}; \node at (1.5,1.5) {J}; \node at (2.5,1.5) {K}; \node at (3.5,1.5) {L}; \node at (4.5,1.5) {S}; \node at (0.5,0.5) {M}; \node at (1.5,0.5) {N}; \node at (2.5,0.5) {O}; \node at (3.5,0.5) {P}; \node at (4.5,0.5) {T}; \begin{scope}[xshift=6cm] \draw [fill,lightgray] (4,0) -- (5,0) -- (5,4) -- (4,4); \draw (0,0) grid (5,4); \draw [fill,xshift=1cm,yshift=1cm] (1.1,0.1) -- (1.9,0.1) -- (1.9,2.9) -- (0.1,2.9) -- (0.1,2.1) -- (1.1,2.1); \end{scope} \end{tikzpicture} \caption{Grid extended with dummy column, and placement in new grid.} \label{fig:extended-board-placement} \end{figure} \subsection{Extensions} \label{sec:model:extensions} The original model is not enough for implementing a model for Patchwork. In particular, optional placements and control of transformations is needed, as is measuring usage. \paragraph{Transforms} For heuristics, it can be useful to branch on which, if any, of the up to 8 transforms of a patch is placed (transforms include rotations and flips of the patches). In order to do this, the unique transforms are generated beforehand in the model set-up code, instead of always generating all 8 transforms and using DFA minimization to handle symmetries. To encode the different rotations, 8 Boolean control values $S_{ps}$ for patch $p$ in each possible transform $s$ are prepended to each placement expression, with exactly 1 of the variables set to 1 for each transform. Note that for simplicity the same number of Boolean variables are prepended, regardless of the number of non-symmetric transforms generated. \paragraph{Optional placements} In Patchwork, not all patches are placed on the board. While it is possible to dynamically add variables and constraints during solving/searching, it is better to set up all constraints for all patches from the start and controlling placement of a patch using reification. Given a patch $p$ with board variables $B_p$, placement expression $R_p$ for all transforms, a $0/1$ control variable $U_p$ indicating if the patch is to be placed, the 8 $S_p$ Boolean variables indicating which transform is used, and a Boolean variable $N_p$ indicating that no transform was used, the following constraint is posted: \begin{equation} \label{eq:reified-placement} \cons{regular}((10R_p)\,|\,(010^*),\ U_pN_pS_pB_p) \end{equation} This is a domain-consistent full reification of the placement constraint; when a patch can no longer be placed the propagation will set $U_p$ to $0$. Note that the second value corresponds to no transform chosen. This is so that the Boolean variables $N_pS_p$ can be channeled into a single integer variable with domain ${0..8}$ \paragraph{Usage} It is well-known that cumulative usage reasoning can be very effective for packing problems~\cite{Simonis2008}. A first step towards cumulative reasoning is to model resource usage. Usage reasoning \emph{per patch} is added to the model using regular expressions. Variables $C_{pc}^\Sigma$ for column sums and $R_{pr}^\Sigma$ for row sums indicating the number of ones in each column $c$ and row $r$ for patch $p$ in $B_p$. Consider again the patch in Figure~\ref{fig:extended-board-placement}: the first column it is placed in has a single one and the second column has three ones, while it has usage two, one, and one for its rows. This means that $C_{p}^\Sigma$ belongs to the language $0^*130^*$ and $R_p^\Sigma$ belongs to the language $0^*2110^*$. Concatenating the column (including the dummy column) and row usages into $C_p^\Sigma R_p^\Sigma$, all usages for all placements belong to the language $0^*130^*00^*2110^*$. Using the same infrastructure for symmetries, pre-fixing with the control variable $U_p$ and transform $S_p$ gives a domain consistent full reification for the usage constraint for a single patch. \section{Placing patches on the board} \label{sec:placing-tiles} Armed with a model that expresses the underlying placement model, heuristics are needed that can be used when a player chooses a patch and needs to place it on the board. It is important to remember here that in the context of game playing (both for MCTS-style roll-outs and for traditional tree search), a patch needs to be fully placed, without deciding on any of the other parts concurrently. Also important, there is no possibility of a back-track. We call the overall heuristic used to generate a placement on the board a \emph{strategy}. The strategy is divided into two independent parts, a \emph{policy} that generates placements of a tile, and an \emph{evaluation} that chooses among different placements. The concept of a placement policy is common in packing literature. The policy is typically incomplete; most policies can not be used to find a guaranteed optimal packing. \subsection{Placement policy} \label{sec:policy} A \emph{policy} in this paper is is a method used to place a tile on a partially filled board in some manner, potentially generating many different placements. Policies can be implemented using standard constraint programming branching and search. Which placement that is used is not something the policy needs to consider. A central goal for a policy is to cheaply produce some good placements of a part. In constraint programming terms, a policy can be regarded as an incomplete large-step heuristic branching without ordering of the alternatives produced. Recall from Section~\ref{sec:model} that a patch $p$ has 0/1 variables $B_p$ representing the placement of that patch, variables $C_{pc}^\Sigma$ and $R_{pr}^\Sigma$ representing the number of \mbox{occupied} squares in each column and row for the patch, and control variables $S_p$ representing the transform of the patch. \paragraph{Bottom-Left} One of the most common heuristics for placement problems is the Bottom-Left heuristic~\cite{Baker1980} (BL), in which each part is placed in the bottom-most position, and among all bottom-most positions the left-most is chosen. Worth noting is that in the context of a symmetric and bounded board the direction is arbitrary (i.e., Right-Top is the same as Bottom-Left, and so on), compared to the original context where packing was on a roll of material that was infinite in the top/up direction. To implement the policy, integer variables representing the first occupied row $R_p^f$ (and $C_p^f$ for columns) are needed. For patches that are not placed on a board the sentinel value of one past the end is used. The row variable is defined using the following schema for the patch $p$ using the 8 row sum variables $R_{pr}^\Sigma$ (column variables defined similarly). \begin{gather} R_p^f \in \{0..9\},\ Z_{0..8} \in \{0,1\},\ F_{0..8} \in \{0,1\} \\ \forall_{i=0..8}\ Z_i \Leftrightarrow R_{pi}^\Sigma = 0 \\ Z_0 = F_0,\ \forall_{i=1..8}\ F_i \Leftrightarrow F_{i-1} \land Z_i \\ R_p^f = \sum_{i=0..8} F_i \end{gather} The $Z$ variables indicate if there is no placement in a row, and the $F$ variables define if an index is part of the first run of zero variables. Summing up $F$ gives the first index, or 9 (one past the end) if there is no placement. This is somewhat similar to the decomposition for \cons{length\_first\_sequence} in the Global Constraint Catalogue~\cite{GlobalConstraintCatalogue}. Using these variables standard constraint programming variable/value heuristics can be used to implement Bottom-Left for the placement of patch $p$. Branchings are added on first $C_p^f$ and then $R_p^f$ trying the smallest value first. A third branching on the $B_p$ variables is added with in-order true-first choices. Searching for the first solution using DFS will give the Bottom-Left placement of the patch in some transformation. \paragraph{BL/LB} Building on the standard BL heuristic, it is easy to extend to a heuristic that places in both Bottom-Left and Left-Bottom order producing two results. Two individual DFS searches are made, one with branching first on $C_p^f$ and then on $R_p^f$, and one with the order of the branchings reversed. In both cases the $B_p$ branching is kept the same. \paragraph{Pareto BL} Pareto Bottom-Left is a generalization of Bottom-Left, where instead of only finding a solution for a single value in one direction, we try all values in that direction. This corresponds to testing all columns as the minimum column and finding the minimum row placement for each. The minimum row/column values for the placements found ($(r_i,c_i)$) form a Pareto front under the natural point wise order relation, thus the name, In practice, to limit the amount of branching in the beginning and keep solutions heuristically relevant, not all columns are tested for placement. The maximum column with some fixed placement on the board $c_{\max}$ is found before search, and only columns in $0..c_{\max}+1$ are used. For a partial packing that is still close to a corner, this means that non-needed placements close to the other corner are not tested. Given a set of columns to test, the implementation manually assigns the $C_p^f$ to each values in $0..c_{\max}+1$. After this step, for each column the search proceeds as for Bottom-Left. \paragraph{Policies based on standard heuristics} There is a rich area of research into general heuristics for constraint programming. We use five different general heuristics that are available in Gecode, the system used for implementation. The heuristic values used are: \begin{description} \item[In Order] Use the order of the variables. This is actually quite close to a Bottom-Left style heuristic, but instead of working on the bounding box of the patch, it works on the individual squares. \item[Size] The domain size for variables. Commonly called \emph{First fail}. \item[AFC] The accumulated failure count~\cite{Boussemart04} (also known as \emph{weighted degree}) is the sum of all the times propagators connected to the variable have failed a search tree. \item[Action] Action is the number of times the domain of a variable has been reduced~\cite{Michel12} (also known as \emph{activity}). \item[CHB] CHB (Conflict History-based Branching, \cite{Liang16,MPG:6.2.0}) uses a combination of domain reduction counts and when failures occur. \end{description} The branching is done on the $B_p$ Boolean variables, but for all but the simplest (\emph{In Order}), the heuristic values would not make much sense on the $B_p$ variables: the domain size is always 2 and there is typically not much activity on the Boolean variables. The base version is to use the heuristic value associated with the corresponding $B$ variable that represents all the patches. For \emph{AFC}, \emph{Activity}, and \emph{CHB} variants are also defined that sum the heuristic value over both the corresponding $B$ variable and the corresponding $B_t$ variables for \emph{all} patches $t$ (including the current patch $p$). The summed variants are called \emph{$\sum$AFC}, \emph{$\sum$Activity}, and \emph{$\sum$CHB}. For \emph{AFC}, \emph{Activity}, \emph{CHB}, and their summed variants, the heuristic values that are used in the policies are divided by the domain size of the variable, as is common. This is denoted \emph{X/Size} for the measure \emph{X}. For all the standard heuristics, equal values use the order of the variables as a tie-breaker. \paragraph{Every transform} The above heuristics all produce a result in some transformation, without actually making any specific choice. For all the heuristics, variants that create placements for all possible rotations of a patch are also tested. To implement an \emph{every transform} variant for a placement policy, all possible values for the rotation variable $U_p$ are assigned first. For each assignment, the base policy is applied to generate a placement of the patch. \paragraph{All} Finally, just generating all the possible placement and letting the evaluation make the choice is possible. This is simply implemented as a standard DFS search for all solutions when branching over the $B_p$ variables. Note that \emph{All} will naturally always generate solutions for all rotations, so it does not make sens to use the \emph{every transform} modification. \subsection{Placement evaluation} \label{sec:placement-evaluation} Many of the policies produce more than one alternative. To choose among the various alternatives, an \emph{evaluation} is used that takes multiple placements and returns the ``best'' one. In constraint programming terms, an evaluation can be seen as an ordering of the alternatives produced by a branching, so that a left-most exploration order would follow the evaluations heuristic. Compared to many constraint programming branchings, the evaluation expects the alternatives to be of equal type; they would not work for classical $c\lor \lnot c$ two-way branching such as $x=d\lor x\neq d$. Each placement evaluated by the evaluation is represented by the full search state with the patch placed and all the other board variables present and all constraints fully propagated. Also, the evaluations have access to the state before the placement, for comparisons. \paragraph{First and Random} The evaluation \emph{First} simply chooses the first alternative. This is not a meaningful evaluation (except for heuristics that only generate one placement), but is interesting as a baseline. Similarly, the \emph{Random} evaluation chooses one of the alternatives at random. \paragraph{Bottom. Left, and Area} A placement of a patch has a maximum extent to the right and to the top. The \emph{Left} evaluation chooses the placement with minimum right extent, while the \emph{Bottom} evaluation chooses the minimum top extent. The \emph{Area} evaluation measures the increase in the bounding box of the fixed placements, promoting placements that are kept tight to a corner. \paragraph{Propagation Guided Global Regret} When placing a patch, propagation will remove possible placements for other patches. This is a valuable signal on how many possibilities we have left, and can be used to guide the search. We call this the \emph{Propagation Guided Global Regret}, since it uses propagation to give an indication of the effect of a choice globally. More formally, we define it as follows. Let the original variables for the whole board be $B$, and the variables after a placement and propagation of that placement be $B'$. The expression $B_{ij}$ represents the square at indexes $i$ and $j$, and $|B_{ij}|$ represents the domain size of the variable. The patch to place is named $p$. The heuristic value is defined by the following summation. \begin{equation} \label{eq:regret} \mathrm{pggr}(B, B', p) = \sum_{i=0}^8\sum_{j=0}^8 \begin{cases} 0 & \text{if } |B_{ij}| = 1 \\ 0 & \text{if } B'_{ij} = p \\ |B_{ij}| - |B'_{ij}| & \text{otherwise} \end{cases} \end{equation} Regret is a well-known heuristic in constraint programming, and is usually defined as the difference between the minimum and next to minimum (and similarly for maximum) value in a domain. This is mostly useful when there is a direct connection between variable domain values and some optimization criteria. However, the concept of regret is more general than the typical single-variable domain centric value optimizing view. Here we lift the concept to be with respect to keeping possible future options open. In a sense, propagation guided global regret is the anti-thesis of Impact based search~\cite{Refalo04}, where variable/value pairs are chosen based on the amount of propagation that they trigger historically. The context here is very different though, with the amount of propagation used is a negative signal. In addition, it is used for the current assignment using look-ahead, and not based on statistics of historic values. \section{Experimental evaluation} \label{sec:experiments} This section reports results of experimental evaluation to clarify how the different strategies formed by combinations of the policies and evaluations introduced perform. \subsection{Implementation and Execution Environment} \label{sec:experiments:implementation} The implementation consists of a game state implemented in C++17 with the placement model implemented using the Gecode~\cite{gecode} constraint programming system version 6.2.0. The code is single-threaded only. While it would be possible to use multi-threaded search, single-threaded execution gives a simple and more stable evaluation. The implementation is available at \url{htts://github.com/zayenz/cp-mod-ref-2019-patchwork}. All experiments are run on a Macbook Pro 15 with a 6-core 2.7 GHz Intel Core i7 processor and 16 GiB memory. For the learning heuristics (those that use \emph{AFC}, \emph{Activity}, and \emph{CHB}) the statistics they are based on are collected throughout the whole experiment, giving them their best possible chance of learning interesting aspects. \subsection{Core packing problem} \label{sec:experiments:packing} The central aspect in the game play is that a sequence of patches are chosen and placed on the board. Each placement must be done without knowing which future patches will be placed. A pure packing problem that captures this is to order all the patches, and to test placing each patch in turn, incrementally building up a patchwork. In table~\ref{tab:placement} results are shown for testing the same 1000 random orders of parts on 119 strategies. The strategies are combinations of policies with \emph{Some} or \emph{Every} transformation matched with different evaluations. Each strategy has four metrics. For each metric, the best value is marked with dark blue, those within 1\% of the best value are marked with medium blue, and those within 5\% are marked with light blue background. The metrics are \begin{description} \item[Area] The mean amount of area placed after all patches have been placed. This is the main metric in the game, and is a natural metric on the power of a strategy to make good placements without knowing what patches to try next. \item[Streak] The mean number of patches placed before the first failure. This is a measure of how much the strategy manages to keep options open, but does not necessarily correspond to the amount of area placed. \item[Time] The mean time spent making a single placement of a patch in milliseconds. \item[Alts] The mean number of alternatives produced for each patch. \end{description} Note that for strategies that only create one alternative, the evaluation does not matter, but is tested for completeness. The evaluation \emph{ReverseRegret} (choosing the maximum instead of minimum regret) is added to show the behaviour when explicitly going against the intuition that keeping options open for packing is a good idea. For all learning heuristics, only the version with the heuristic value divided by domain size is tested. We do not show the results for \emph{$\sum$AFC}, \emph{$\sum$Activity}, and \emph{CHB} since they were slightly worse than their corresponding summed/non-summed variants. The full data is available on request. \begin{sidewaystable} \centering \tiny \begin{tabular}{lll@{\hspace{1em}}rr@{\hspace{1em}}rr@{\hspace{1em}}rr@{\hspace{1em}}rr@{\hspace{1em}}rr@{\hspace{1em}}rr@{\hspace{1em}}rr@{\hspace{1em}}rr@{\hspace{1em}}rl} \toprule & & & \multicolumn{2}{c}{In Order} & \multicolumn{2}{c}{Size} & \multicolumn{2}{c}{AFC/Size} & \multicolumn{2}{c}{Action/Size} & \multicolumn{2}{c}{$\sum$CHB/Size} & \multicolumn{2}{c}{BL} & \multicolumn{2}{c}{BL/LB} & \multicolumn{2}{c}{Pareto BL} & \multicolumn{1}{c}{All} & \\ & & & \multicolumn{1}{c}{Some} & \multicolumn{1}{c}{Every} & \multicolumn{1}{c}{Some} & \multicolumn{1}{c}{Every} & \multicolumn{1}{c}{Some} & \multicolumn{1}{c}{Every} & \multicolumn{1}{c}{Some} & \multicolumn{1}{c}{Every} & \multicolumn{1}{c}{Some} & \multicolumn{1}{c}{Every} & \multicolumn{1}{c}{Some} & \multicolumn{1}{c}{Every} & \multicolumn{1}{c}{Some} & \multicolumn{1}{c}{Every} & \multicolumn{1}{c}{Some} & \multicolumn{1}{c}{Every} & \multicolumn{1}{c}{Every} & \\ \midrule & \multirow{4}{*}{First} & \whitebox{Area} & \closetobest{76.51} & \whitebox{72.25} & \whitebox{66.49} & \whitebox{65.95} & \whitebox{73.73} & \whitebox{71.68} & \closetobest{74.97} & \whitebox{71.70} & \closetobest{74.98} & \whitebox{72.16} & \closetobest{76.12} & \whitebox{72.28} & \closetobest{76.12} & \whitebox{72.28} & \closetobest{76.12} & \whitebox{73.75} & \closetobest{76.51}\\ & & \whitebox{Streak} & \whitebox{15.79} & \whitebox{14.06} & \whitebox{12.22} & \whitebox{12.50} & \whitebox{14.50} & \whitebox{13.72} & \whitebox{15.52} & \whitebox{14.15} & \whitebox{14.85} & \whitebox{13.72} & \whitebox{15.62} & \whitebox{14.46} & \whitebox{15.62} & \whitebox{14.46} & \whitebox{15.62} & \whitebox{14.88} & \whitebox{15.79}\\ & & \whitebox{Time} & \whitebox{25.37} & \whitebox{86.90} & \almostbest{24.22} & \whitebox{83.72} & \closetobest{24.72} & \whitebox{87.86} & \closetobest{25.16} & \whitebox{88.90} & \closetobest{25.01} & \whitebox{88.90} & \whitebox{162.30} & \whitebox{316.35} & \whitebox{217.67} & \whitebox{501.64} & \whitebox{722.31} & \whitebox{1669.19} & \whitebox{1815.18}\\ & & \whitebox{Alts} & \whitebox{1.00} & \whitebox{2.99} & \whitebox{1.00} & \whitebox{2.95} & \whitebox{1.00} & \whitebox{2.97} & \whitebox{1.00} & \whitebox{3.03} & \whitebox{1.00} & \whitebox{2.97} & \whitebox{1.00} & \whitebox{3.04} & \whitebox{1.94} & \whitebox{6.02} & \whitebox{3.64} & \whitebox{9.62} & \best{71.86}\\ & \\ & \multirow{4}{*}{Random} & \whitebox{Area} & \closetobest{76.51} & \whitebox{72.25} & \whitebox{66.49} & \whitebox{66.18} & \whitebox{73.73} & \whitebox{71.63} & \closetobest{74.97} & \whitebox{71.50} & \closetobest{74.98} & \whitebox{72.08} & \closetobest{76.12} & \whitebox{72.35} & \closetobest{75.43} & \whitebox{71.91} & \whitebox{72.72} & \whitebox{70.62} & \whitebox{69.49}\\ & & \whitebox{Streak} & \whitebox{15.79} & \whitebox{14.26} & \whitebox{12.22} & \whitebox{12.27} & \whitebox{14.50} & \whitebox{13.60} & \whitebox{15.51} & \whitebox{14.02} & \whitebox{14.85} & \whitebox{13.71} & \whitebox{15.62} & \whitebox{14.36} & \whitebox{15.66} & \whitebox{14.18} & \whitebox{14.19} & \whitebox{13.10} & \whitebox{12.29}\\ & & \whitebox{Time} & \whitebox{26.03} & \whitebox{89.09} & \almostbest{24.15} & \whitebox{82.85} & \closetobest{24.76} & \whitebox{87.68} & \closetobest{25.11} & \whitebox{88.47} & \closetobest{25.05} & \whitebox{88.42} & \whitebox{161.86} & \whitebox{317.08} & \whitebox{210.55} & \whitebox{497.82} & \whitebox{1208.40} & \whitebox{2793.32} & \whitebox{1197.45}\\ & & \whitebox{Alts} & \whitebox{1.00} & \whitebox{3.02} & \whitebox{1.00} & \whitebox{2.91} & \whitebox{1.00} & \whitebox{2.98} & \whitebox{1.00} & \whitebox{3.02} & \whitebox{1.00} & \whitebox{2.96} & \whitebox{1.00} & \whitebox{3.02} & \whitebox{1.94} & \whitebox{5.99} & \whitebox{4.87} & \whitebox{11.22} & \whitebox{51.41}\\ & \\ & \multirow{4}{*}{Left} & \whitebox{Area} & \closetobest{76.51} & \whitebox{72.79} & \whitebox{66.49} & \whitebox{66.05} & \whitebox{73.73} & \whitebox{72.03} & \closetobest{74.99} & \whitebox{71.91} & \closetobest{74.97} & \whitebox{72.48} & \closetobest{76.12} & \whitebox{73.47} & \closetobest{76.11} & \whitebox{73.47} & \closetobest{75.93} & \whitebox{74.47} & \closetobest{75.08}\\ & & \whitebox{Streak} & \whitebox{15.79} & \whitebox{14.08} & \whitebox{12.22} & \whitebox{12.18} & \whitebox{14.50} & \whitebox{13.70} & \whitebox{15.52} & \whitebox{14.22} & \whitebox{14.85} & \whitebox{13.97} & \whitebox{15.62} & \whitebox{14.91} & \whitebox{15.62} & \whitebox{14.91} & \whitebox{15.51} & \whitebox{15.13} & \whitebox{14.95}\\ & & \whitebox{Time} & \closetobest{25.24} & \whitebox{88.13} & \best{24.13} & \whitebox{82.60} & \closetobest{24.75} & \whitebox{88.46} & \closetobest{25.11} & \whitebox{89.28} & \closetobest{24.98} & \whitebox{89.49} & \whitebox{162.11} & \whitebox{303.51} & \whitebox{217.95} & \whitebox{447.45} & \whitebox{726.92} & \whitebox{1127.38} & \whitebox{1657.31}\\ & & \whitebox{Alts} & \whitebox{1.00} & \whitebox{3.00} & \whitebox{1.00} & \whitebox{2.91} & \whitebox{1.00} & \whitebox{2.98} & \whitebox{1.00} & \whitebox{3.03} & \whitebox{1.00} & \whitebox{2.97} & \whitebox{1.00} & \whitebox{3.05} & \whitebox{1.94} & \whitebox{6.05} & \whitebox{3.60} & \whitebox{7.95} & \whitebox{65.69}\\ & \\ & \multirow{4}{*}{Bottom} & \whitebox{Area} & \closetobest{76.51} & \whitebox{72.25} & \whitebox{66.49} & \whitebox{65.95} & \whitebox{73.73} & \whitebox{71.68} & \closetobest{75.00} & \whitebox{71.74} & \closetobest{74.98} & \whitebox{72.16} & \closetobest{76.12} & \whitebox{72.28} & \closetobest{76.12} & \whitebox{72.28} & \closetobest{76.12} & \whitebox{73.75} & \closetobest{76.51}\\ & & \whitebox{Streak} & \whitebox{15.79} & \whitebox{14.06} & \whitebox{12.22} & \whitebox{12.50} & \whitebox{14.50} & \whitebox{13.72} & \whitebox{15.54} & \whitebox{14.15} & \whitebox{14.85} & \whitebox{13.72} & \whitebox{15.62} & \whitebox{14.46} & \whitebox{15.62} & \whitebox{14.46} & \whitebox{15.62} & \whitebox{14.88} & \whitebox{15.79}\\ & & \whitebox{Time} & \closetobest{25.30} & \whitebox{86.58} & \almostbest{24.13} & \whitebox{83.87} & \closetobest{24.67} & \whitebox{87.80} & \closetobest{25.13} & \whitebox{89.22} & \closetobest{25.03} & \whitebox{88.71} & \whitebox{162.03} & \whitebox{315.70} & \whitebox{217.42} & \whitebox{501.39} & \whitebox{722.04} & \whitebox{1668.19} & \whitebox{1815.77}\\ & & \whitebox{Alts} & \whitebox{1.00} & \whitebox{2.99} & \whitebox{1.00} & \whitebox{2.95} & \whitebox{1.00} & \whitebox{2.97} & \whitebox{1.00} & \whitebox{3.03} & \whitebox{1.00} & \whitebox{2.97} & \whitebox{1.00} & \whitebox{3.04} & \whitebox{1.94} & \whitebox{6.02} & \whitebox{3.64} & \whitebox{9.62} & \best{71.86}\\ & \\ & \multirow{4}{*}{Area} & \whitebox{Area} & \closetobest{76.51} & \whitebox{72.79} & \whitebox{66.49} & \whitebox{66.05} & \whitebox{73.73} & \whitebox{72.03} & \closetobest{74.98} & \whitebox{71.91} & \closetobest{74.98} & \whitebox{72.48} & \closetobest{76.12} & \whitebox{73.47} & \closetobest{76.11} & \whitebox{73.47} & \closetobest{75.93} & \whitebox{74.47} & \closetobest{75.08}\\ & & \whitebox{Streak} & \whitebox{15.79} & \whitebox{14.08} & \whitebox{12.22} & \whitebox{12.18} & \whitebox{14.50} & \whitebox{13.70} & \whitebox{15.51} & \whitebox{14.24} & \whitebox{14.85} & \whitebox{13.97} & \whitebox{15.62} & \whitebox{14.91} & \whitebox{15.62} & \whitebox{14.91} & \whitebox{15.51} & \whitebox{15.13} & \whitebox{14.95}\\ & & \whitebox{Time} & \closetobest{25.26} & \whitebox{88.03} & \almostbest{24.16} & \whitebox{82.82} & \closetobest{24.67} & \whitebox{88.14} & \closetobest{25.12} & \whitebox{89.41} & \closetobest{25.07} & \whitebox{89.45} & \whitebox{161.79} & \whitebox{303.60} & \whitebox{217.66} & \whitebox{447.02} & \whitebox{727.14} & \whitebox{1129.46} & \whitebox{1652.75}\\ & & \whitebox{Alts} & \whitebox{1.00} & \whitebox{3.00} & \whitebox{1.00} & \whitebox{2.91} & \whitebox{1.00} & \whitebox{2.98} & \whitebox{1.00} & \whitebox{3.03} & \whitebox{1.00} & \whitebox{2.97} & \whitebox{1.00} & \whitebox{3.05} & \whitebox{1.94} & \whitebox{6.05} & \whitebox{3.60} & \whitebox{7.95} & \whitebox{65.69}\\ & \\ & \multirow{4}{*}{Regret} & \whitebox{Area} & \closetobest{76.51} & \closetobest{77.13} & \whitebox{66.49} & \whitebox{69.67} & \whitebox{73.73} & \closetobest{75.11} & \closetobest{75.00} & \closetobest{76.23} & \closetobest{74.98} & \closetobest{75.75} & \closetobest{76.12} & \closetobest{77.20} & \closetobest{77.21} & \almostbest{78.21} & \almostbest{77.86} & \almostbest{78.36} & \best{78.40}\\ & & \whitebox{Streak} & \whitebox{15.79} & \closetobest{16.21} & \whitebox{12.22} & \whitebox{13.76} & \whitebox{14.50} & \whitebox{15.36} & \whitebox{15.56} & \closetobest{15.99} & \whitebox{14.85} & \whitebox{15.52} & \whitebox{15.62} & \closetobest{16.24} & \closetobest{16.39} & \best{16.76} & \closetobest{16.43} & \almostbest{16.65} & \closetobest{16.56}\\ & & \whitebox{Time} & \closetobest{25.29} & \whitebox{96.33} & \almostbest{24.23} & \whitebox{89.96} & \closetobest{24.71} & \whitebox{95.29} & \closetobest{25.06} & \whitebox{98.15} & \closetobest{25.03} & \whitebox{96.50} & \whitebox{161.95} & \whitebox{355.38} & \whitebox{223.62} & \whitebox{606.60} & \whitebox{1426.38} & \whitebox{3550.62} & \whitebox{1464.55}\\ & & \whitebox{Alts} & \whitebox{1.00} & \whitebox{3.17} & \whitebox{1.00} & \whitebox{3.03} & \whitebox{1.00} & \whitebox{3.12} & \whitebox{1.00} & \whitebox{3.21} & \whitebox{1.00} & \whitebox{3.11} & \whitebox{1.00} & \whitebox{3.17} & \whitebox{1.94} & \whitebox{6.46} & \whitebox{4.76} & \whitebox{12.39} & \whitebox{59.48}\\ & \\ & \multirow{4}{*}{ReverseRegret} & \whitebox{Area} & \closetobest{76.51} & \whitebox{68.91} & \whitebox{66.49} & \whitebox{63.34} & \closetobest{75.14} & \whitebox{68.97} & \whitebox{74.12} & \whitebox{68.54} & \closetobest{74.78} & \whitebox{69.69} & \closetobest{76.12} & \whitebox{68.75} & \whitebox{73.34} & \whitebox{67.57} & \whitebox{67.46} & \whitebox{64.70} & \whitebox{62.73}\\ & & \whitebox{Streak} & \whitebox{15.79} & \whitebox{12.82} & \whitebox{12.22} & \whitebox{11.03} & \whitebox{15.46} & \whitebox{12.68} & \whitebox{14.90} & \whitebox{12.39} & \whitebox{14.96} & \whitebox{12.34} & \whitebox{15.62} & \whitebox{12.80} & \whitebox{14.93} & \whitebox{12.32} & \whitebox{11.59} & \whitebox{10.57} & \whitebox{9.49}\\ & & \whitebox{Time} & \whitebox{26.64} & \whitebox{84.63} & \closetobest{24.81} & \whitebox{79.56} & \whitebox{26.24} & \whitebox{84.72} & \whitebox{25.72} & \whitebox{83.81} & \whitebox{25.58} & \whitebox{83.63} & \whitebox{164.97} & \whitebox{278.77} & \whitebox{187.41} & \whitebox{404.47} & \whitebox{1174.86} & \whitebox{2116.79} & \whitebox{1195.69}\\ & & \whitebox{Alts} & \whitebox{1.00} & \whitebox{2.92} & \whitebox{1.00} & \whitebox{2.82} & \whitebox{1.00} & \whitebox{2.93} & \whitebox{1.00} & \whitebox{2.90} & \whitebox{1.00} & \whitebox{2.87} & \whitebox{1.00} & \whitebox{2.92} & \whitebox{1.94} & \whitebox{5.72} & \whitebox{4.94} & \whitebox{9.82} & \whitebox{52.05}\\ \bottomrule \end{tabular} \caption{Results for combinations of policy and evaluation for the core packing problem. Best values for each metric are indicated with blue, darker being better.} \label{tab:placement} \end{sidewaystable} \subsection{Results of packing experiments} \label{sec:experiments:results} The most striking observation, is that using propagation guided global regret is clearly the most important factor in maximizing the amount of area placed. The fact that regret is best when trying all placements is a strong indication that it is an evaluation that can truly guide the placement, and not just choose among a set of probably good placements. The reverse of regret is clearly the worst among all evaluations, validating the assumption that regret is a good measure. Among the other evaluations, it is worth noting that when using a heuristic that places first bottom then left, it is better to use an evaluation that agrees with the direction placements are made in (that is, for Bottom-Left it is better to make choices based on bottomness than leftness). Given a reasonable evaluation (that is, not \emph{First}, \emph{Random}, nor \emph{ReverseRegret}), the policies based on packing heuristics are better than generic constraint programming heuristics. The most interesting stand-out here is \emph{In Order}, since it combines a very simple constraint programming definition and speed of evaluation with actually being similar in effect to classical packing heuristics. In implementing game tree search, the time used for expanding nodes is crucial to get reasonable performance, since there is typically a hard limit on the deliberation time of an agent. It is clear that many of the strategies take much more time than would be feasible. Some simple profiling of the code indicates that there is some overhead in the implementation in how many clones are generated of the Gecode search spaces, which could potentially be optimized. Parallel execution is also a clear potential for improving time. In game play, combinations of strategies can be used. For example, when implementing MCTS it is common to use different strategies for the tree expansion and for the roll outs. For tree expansion, quality of moves and strong ordering is important, while roll-outs have very strong speed requirements. A combination of a more expensive tree expansion such as \emph{BL/LB-Every + Regret}, and a simple and fast roll-out strategy such as \emph{In Order-Some + First} could be useful. In conclusion, the most important decision is to use propagation guided global regret to choose among possible placements, with the choice of policy guided by the time-requirements needed. \section{Conclusions} \label{sec:conclusions} This paper has introduced the use of constraint programming for representing parts of a game state for the game Patchwork. The model represents a packing of an unknown subset of polyominoes, that are to be chosen during game tree search. The packing model extended and improved a previous polyomino packing model based on \cons{regular} constraints. The use of constraint programming simplified the task of implementing the packing part of the game state, with a high-level specification. To guide the search, several new strategies were developed for placing patches. Placement policies inspired by classical packing literature are shown to be good. For choosing among different placements, the concept of propagation guided global regret was introduced and shown to be very effective in guiding search towards good placements of patches. \paragraph{Future work} This paper has focused on the strategies used for placing polyominoes when implementing the game Patchwork. The natural next step is to also apply the model in game playing agents. An investigation into the relative complexity of implementing the packing model without the support of a constraint programming system would also be interesting. In particular, something like global propagation guided regret would be very hard to implement by hand. \section*{Acknowledgments} Thanks to Magnus Gedda, Magnus Rattfeldt, and Martin Butler for interesting and informative discussions on games and search methods. Thank the anonymous reviewers for their comments that helped improve this paper. \bibliographystyle{splncs04}
\section*{} \vspace{-1cm} \footnotetext{\textit{$^{a}$~School of Mathematics, University of Bristol - Bristol BS8 1UG, UK.}} \footnotetext{$^{\ast}$~E-mail: aurore.loisy@bristol.ac.uk.} \footnotetext{$^{\ddag}$~E-mail: t.liverpool@bristol.ac.uk.} \section{Introduction} To perform essential biological functions such as wound healing and immune response, but also in pathological processes such as cancer metastasis, eukaryotic cells adapt their mode of migration to the geometrical and physicochemical properties of their environment while relying on the same machinery, the actomyosin cytoskeleton \cite{Lammermann2009,Liu2015,Paluch2016}. In view of the complexity of cell motility, one may want to ask first: what are the physical requirements for autonomous motion, and what are the possible ways to move? Here we answer these questions by taking a deformable drop of active matter (such as the cytoskeleton) and classifying the possible mechanisms for self-propulsion on a substrate. Motion on a hard surface is a particularly important class of motility, because it is the first step towards understanding the self-propulsion of cells in the tissue of multicellular organisms, and \textit{in vitro} experimental investigations of cell motility often involve the study of cells in contact with a solid substrate~\cite{Anderson1996,Verkhovsky1999,Yam2007,Keren2008,Lammermann2009}. However, how such self-propulsion emerges from the components of living cells remains a subject of debate~\cite{Kruse2006,Keren2008,Shao2012,Blanch-Mercader2013,Callan-Jones2013,Recho2013,Tjhung2015,Khoromskaia2015}. A minimal system to study motility is provided by a deformable drop of material with anisotropic components that consume energy (active matter) on a flat rigid surface~\cite{Sanchez2012,Tjhung2015,Khoromskaia2015}. For a drop of soft material to self-propel, two things are required: an asymmetry to give a direction of motion and a mechanical energy flux to provide the source of motion. The asymmetry may be in the drop shape, resulting from an imbalance in surface tension, typically due to imposed chemical or thermal gradients which provide a non-zero flux leading to motion even for a passive drop~\cite{DeGennes2004book,Bonn2009,Brochard1989}. A drop of active matter, in contrast, generates fluxes and asymmetry all by itself due to energy input from its components~\cite{Ramaswamy2010,Marchetti2013,Saintillan2013,Prost2015,Julicher2018} that can cause the drop to move spontaneously~\cite{Sanchez2012,Hawkins2011,Tjhung2012,Tjhung2015,Giomi2014,Blanch-Mercader2013,Callan-Jones2013,Recho2013,Whitfield2016a}. Several studies have shown propulsion of active drops on a surface with a number of related models~\cite{Kruse2006,Shao2012,Ziebert2012,Tjhung2015,Khoromskaia2015,Trinschek2019arXiv}. However the complexity of the underlying dynamics means identifying similarities and differences between them is difficult, leading to an ongoing debate about mechanisms. The hydrodynamic theory of active matter provides a now well-accepted description of active liquids in terms of a limited number of coupled nonlinear governing equations for conserved fields and broken-symmetry fields \cite{Ramaswamy2010,Marchetti2013,Prost2015,Julicher2018}. One way to study the problem of a moving active drop is through direct numerical simulations of those equations in a domain with moving boundaries \cite{Tjhung2012,Tjhung2015,Giomi2014,Whitfield2014,Whitfield2016a,Marth2015}. While those provide valuable information, they are computationally expensive and they fail at providing a simple picture of the mechanisms at play. Another approach, which we shall follow here, takes advantage of the geometry of the problem: assuming that the drop is characterized by a small height-to-width ratio, one can use the disparity of length scales to reduce the full set of governing equations and boundary conditions to a single evolution equation much easier to analyze and comprehend. This framework, known as the lubrication (or long-wave) theory \cite{Oron1997,Craster2009}, has been exploited extensively for the study of thin films and droplets of passive nematic liquid crystals \cite{BenAmar2001,Cummings2004,Cummings2011,Lin2013a,Lin2013b,Crespo2017} and has recently been extended to active liquids with (nematic or polar) orientational order \cite{Sankararaman2009,Joanny2012,Khoromskaia2015,Kitavtsev2018,Trinschek2019arXiv}. Prior work has been concerned with thin film stability \cite{Sankararaman2009}, dewetting \cite{Trinschek2019arXiv}, and drop spreading \cite{Joanny2012}. But to the best of our knowledge the question of motility has only been tackled superficially~\cite{Khoromskaia2015,Trinschek2019arXiv}, mostly due to the difficulty in obtaining a closed form for the evolution equation. \begin{figure} \centering \includegraphics[width=0.99\linewidth]{drawing_tractionless_tank_treading} \\ \includegraphics[width=0.99\linewidth]{drawing_crawling} \\ \includegraphics[width=0.99\linewidth]{drawing_capillary} \caption{ Classification of the modes of motion of an active drop. In tractionless tank-treading driven by active stresses, here drawn in the drop frame of reference, motion arises from the internal net flow (blue arrows) generated by active stresses ($\propto \alpha$), and is achieved without exerting any traction anywhere on the substrate except near the contact line. In crawling driven by self-advection, macroscopic motion arises from the self-advection ($\propto w$) of polarized active units, provided that adhesion with the substrate is strong enough to transmit momentum effectively. In sliding driven by capillarity, the drop is pulled by a net capillary force (due to, e.g., an asymmetry in contact angles $\phi_1$ and $\phi_2$), the driving mechanism is an external or a self-generated gradient of surface tension or energy. \label{fig:scheme_intro} } \end{figure} In this paper, we present a unifying description of a thin active drop on a planar substrate in terms of a single ODE. We show that its available modes of motion fall into three distinct classes which can be identified based on general principles, independent of the details of the model~(\cref{fig:scheme_intro}). A first way to generate motion is through the extra stresses generated by the active components in the bulk. At the continuum scale, these active stresses yield an extra contribution to the stress tensor $\m{\sigma}^a = - \alpha \v{n} \v{n}$ where $\v{n}$ is the director (a unit vector that describes the local orientation of the active units). We show that the motion of a drop that originates from active stresses is controlled by the global topology of the director field, and can be achieved without exerting traction on the surface, a remarkable property which has been the subject of a recent communication \cite{Loisy2019b}. The second possible source of motion is the self-advection term $w \v{n}$ that arises if the active units propel themselves at a speed $w$ along their own tangent. When coupled to strong enough friction with the substrate, self-advection allows a drop to ``crawl'' along the surface \cite{Kruse2006,Keren2008,Shao2010,Shao2012,Blanch-Mercader2013,Ziebert2013,Tjhung2015}. Crawling driven by self-advection encompasses much prior work on motile active drops on hard surfaces \cite{Kruse2006,Keren2008,Shao2010,Shao2012,Blanch-Mercader2013,Ziebert2013,Tjhung2015,Trinschek2019arXiv}, and is revisited here within our simple framework. The third way to move is due to the action of a net capillary force, as would result from (possibly self-induced) thermal or chemical gradients. This mechanism has been exploited extensively to create self-propelled passive droplets \cite{DeGennes2004book,Bonn2009,Brochard1989,DeGennes1998,Chaudhury1992,Bain1994,DosSantos1995,Cira2015}, and here we address the effect of coupling it to internal activity. \section{Model of a thin active drop \label{sec:model}} Our model, illustrated in \cref{fig:scheme_drop_height_BC_annotated}, consists of a 2D drop of viscous, active, nematic liquid on a rigid substrate and confined by surface tension. The director is strongly anchored at the boundaries, and the interaction of the liquid with the substrate is modelled by a partial slip boundary condition. The number density of active units is assumed uniform: motility induced by density gradients~\cite{Hawkins2011,Callan-Jones2013,Recho2013} is not considered here. We further assume a drop geometry with a small height-to-width ratio and use the lubrication approximation to reduce the original problem to a nonlinear third-order ordinary differential equation for the drop shape which involves the drop velocity as an unknown constant and with prescribed contact angles as boundary conditions. It is obtained from the balance of activity, viscosity and surface tension in a regime where the director field minimizes the free energy (no backcoupling to the flow). In the following subsections we outline each of the ingredients that go into our model and analysis. The reader not interested in the details of the model and the derivation can find the thin drop problem we solve summarized in \cref{sec:reduced_problem}. \subsection{Height equation \label{sec:height_equation}} We consider a drop moving on a substrate in the $x$-direction. At steady-state, the drop shape is described by the height function $h(x)$, and the constant drop velocity is denoted $V$ (both being unknown). In the co-moving frame of reference, the flux through a cross section must vanish. This reads \begin{subequations} \begin{equation} \label{eq:unscaled_ODE} \int_0^h (u_x+w n_x - V) \; \d z = 0 \end{equation} where $\v{u}$ is the fluid velocity inside the drop (with $\div \v{u} = 0$) and $w \v{n}$ describes the additional transport due to the self-advection at speed $w$ of active units whose orientations are characterised by a local orientation $\v{n}$ (a unit vector). The height function, defined on the domain $x \in [-L/2, L/2$], must satisfy \cref{eq:unscaled_ODE} together with four boundary conditions at the contact lines: \begin{equation} \label{eq:unscaled_BC} \begin{gathered} h(-\tfrac{L}{2}) = 0, \quad h(\tfrac{L}{2})=0, \\ h'(-\tfrac{L}{2}) = \phi_1, \quad h'(\tfrac{L}{2}) = - \phi_2, \end{gathered} \end{equation} where $\phi_{1,2}$ are the contact angles on each side of the drop. The drop velocity $V$ enters as a constant which must be determined as part of the solution. The drop width $L$ is also unknown and is determined by the volume constraint \begin{equation} \label{eq:unscaled_volume_constraint} \int_{-L/2}^{L/2} h \; \d x = \Omega \end{equation} \end{subequations} where $\Omega$ is the (prescribed) drop volume. To close the problem described by \cref{eq:unscaled_ODE,eq:unscaled_BC,eq:unscaled_volume_constraint}, one must now determine an explicit expression of the integral on the left-hand-side of \cref{eq:unscaled_ODE} in terms of $h$. \begin{figure} \centering \includegraphics[width=0.99\linewidth]{scheme_drop_height_BC_annotated} \caption{ Model of a 2D drop of active fluid moving at velocity $V$ on a rigid surface. The fluid motion inside the drop is governed by the incompressible Stokes flow equations, with $\v{u}$ the velocity and $\m{\sigma}$ the stress tensor, which includes an active contribution $\m{\sigma}^a = - \alpha \v{n} \v{n}$ where $\v{n}$ is the director field. The mechanical interaction with the substrate is modeled by a partial slip boundary condition ($\ell_u$ is the slip length, $\eta$ is the viscosity) and a free surface boundary condition is applied at the interface ($\gamma$ is the surface tension coefficient and $\kappa$ is the curvature). The drop shape is described by the height function $h(x)$ on the domain $x \in [-L/2,L/2]$ where $L$ is the drop width. Contact angles $\phi_1$ and $\phi_2$ are prescribed on each side of the drop. \label{fig:scheme_drop_height_BC_annotated} } \end{figure} \subsection{Self-advection of active units \label{sec:self_advection}} The self-advection velocity $w \v{n}$ in \cref{eq:unscaled_ODE} accounts for the ability of polarized active components, such as motile bacteria or cytoskeletal filaments undergoing polymerization and treadmilling, to propel themselves along their own tangent. Such self-advection is confined close to the substrate, and to facilitate comparison with prior work we assume the same following functional form as in \cite{Tjhung2015}: \begin{equation} w = w_0 \exp \left( - \frac{z}{\ell_w} \right) \label{eq:self_advection_expression} \end{equation} where $w_0$ is a characteristic self-advection speed and $\ell_w$ is the characteristic height over which the self-advection term decays in the direction normal to the substrate. \subsection{Hydrodynamics of an active liquid \label{sec:hydrodynamics}} The equations of motion for an active liquid are well-established \cite{Ramaswamy2010,Marchetti2013,Prost2015,Julicher2018}. Inside the drop, the velocity field is solution of the momentum conservation equation (neglecting inertia, see Appendix \ref{app:validity_regime}): \begin{subequations} \label{eq:momentum_conservation} \begin{equation} \partial_j \sigma_{ij} = 0 \label{eq:div_stress_zero} \end{equation} where $\sigma_{ij}$ is the stress tensor \begin{equation} \label{eq:stress_definition} \sigma_{ij} = - p \delta_{ij} + \eta (\partial_j u_i + \partial_i u_j) + \sigma_{ij}^n + \sigma_{ij}^a \end{equation} and $p$ is the pressure, $\eta$ is the viscosity, $\sigma_{ij}^a$ is the contribution to the stress arising from activity, and $\sigma_{ij}^n$ is the contribution to the stress arising from its nematic elasticity \cite{deGennes1993book}. The active stress reads \cite{Marchetti2013} \begin{equation} \sigma_{ij}^a= -\alpha n_i n_j \end{equation} \end{subequations} and is due to the forces exerted by the active units on the surrounding fluid. It can be derived from modeling active units as force dipoles \cite{Pedley1992} and subsequent coarse-graining. The magnitude of $\alpha$ is proportional to the strength of the force pair and the density of units, and the sign of $\alpha$ depends on whether the induced flow is extensile ($\alpha > 0$) or contractile ($\alpha < 0$). For $\alpha=0$, one recovers the standard momentum balance for passive nematic liquid crystals. Since thin films and drops of passive nematics have been studied extensively (e.g. \cite{BenAmar2001,Cummings2004,Cummings2011,Lin2013a,Lin2013b,Crespo2017}), and since we are chiefly concerned here by $\alpha \neq 0$, we will first work in a regime where nematic stresses $\sigma_{ij}^n$ can be neglected (see Appendix \ref{app:validity_regime}). They will be included later on in Appendix \ref{app:effect_of_nematic_stresses}. At the solid/liquid interface we use a partial slip boundary condition: \begin{subequations} \begin{equation} u_x = \frac{\ell_u \sigma_{xz}}{\eta} \qquad \text{at $z=0$} \label{eq:BC_slip} \end{equation} where $\ell_u$ is a slip length (no-slip is obtained for $\ell_u = 0$). At the gas/liquid interface we use a free surface boundary condition: \begin{equation} \m{\sigma} \bcdot \v{m} = \gamma \kappa \v{m} \qquad \text{at $z=h$} \label{eq:BC_surface_tension} \end{equation} \end{subequations} where $\v{m}$ is the unit outward vector normal to the free surface, $\gamma$ is the uniform surface tension, and $\kappa = - \div \v{m}$ is the signed curvature. The director $\v{n}=(\cos \theta, \sin \theta)$, which describes the coarse-grained orientation of the active units, is determined by minimizing the free energy of a nematic liquid crystal in the strong elastic limit~\cite{deGennes1993book}: \begin{equation} \nabla^2 \theta = 0. \label{eq:director_eq} \end{equation} Hence the effect of the director on the flow is taken into account, but the back-coupling of the flow on the director is negligible in this regime (see Appendix \ref{app:validity_regime}). As for boundary conditions, we assume strong anchoring (fixed angle relative to the surface orientation) at both the substrate and the free surface. Restricting to situations where anchoring is either parallel or normal to the surfaces, and remarking that a rotation of $\v{n}$ by $\pi/2$ is equivalent to a change of sign of $\alpha$, we assume without loss of generality that the director is anchored parallel to the substrate: \begin{subequations} \label{eq:director_BC} \begin{equation} \theta = 0 \qquad \text{at $z=0$}. \end{equation} At the free surface, we assume that the anchoring angle with respect to the surface tangent is $\omega \pi/2$ ($\omega \in \mathbb{Z}$), which reads \begin{equation} \theta = \omega \frac{\pi}{2} + \arctan(h') \qquad \text{at $z=h$}. \end{equation} \end{subequations} \subsection{Force and traction on the drop \label{sec:force_traction}} Before going further it is useful to write down, without any simplifying assumptions, the force balance for a drop on a substrate. It reads (as shown in Appendix \ref{app:force_balance}) \begin{subequations} \label{eq:force_balance} \begin{equation} F_{\text{friction}} + F_{\text{capillary}} = 0 \end{equation} with \begin{align} F_{\text{capillary}} & = \gamma \left( \cos \phi_2 - \cos \phi_1 \right) \label{eq:Fcapilary}\\ F_{\text{friction}} & = \int_{\text{substrate}} - \sigma_{xz} \rvert_{z=0} \id x \label{eq:Ffriction} \end{align} \end{subequations} where $F_{\text{capillary}}$ is a driving force due to an imbalance in surface energies (with $\phi_1$ and $\phi_2$ the contact angles on each side of the drop), and $F_{\text{friction}}$ is the opposing force (of frictional nature) exerted by substrate on the drop. If the $\phi_1 \neq \phi_2$, $\abs{F_{\text{capillary}}}>0$: the drop is pulled by the net capillary force, and its velocity is determined by the balance with friction (leading to capillarity-driven sliding). If the contact angles are the same, $F_{\text{capillary}}=F_{\text{friction}}=0$: while a passive drop would necessarily remain static, this is not the case in the presence of activity (leading to tractionless tank-treading or crawling). Besides, the mechanical interaction of the drop with the substrate can be characterized by the spatial distribution of the traction, the latter being defined as the \emph{local force per unit area} exerted by the substrate on the drop. The tangential component of the traction, denoted $\sigma_{\text{substrate/drop}}$, is \begin{equation} \sigma_{\text{substrate/drop}} = \v{e}_x \bcdot \m{\sigma} \bcdot (- \v{e}_z) \rvert_{z=0} = -\sigma_{xz} \rvert_{z=0} \end{equation} (in \cref{sec:results} we report instead $\sigma_{\text{drop/substrate}}=-\sigma_{\text{substrate/drop}}$ as this is what one would measure experimentally). From \cref{eq:force_balance} one can remark that, for $F_{\text{capillary}}=0$, we necessarily have \begin{equation} \int_{\text{substrate}} \sigma_{\text{substrate/drop}} \id x = 0 \end{equation} but $\sigma_{\text{substrate/drop}}$ does not have to be identically zero. In other words, autonomous propulsion driven by active processes is necessarily force-free (in the sense that $F_{\text{capillary}}=F_{\text{friction}}=0$) but is not, in general, traction-free ($\sigma_{\text{drop/substrate}}$ is not zero everywhere). \subsection{Lubrication approximation \label{sec:thin_film}} We consider a geometry where the drop characteristic height $H$ is much smaller than its characteristic width $L$. We introduce a small parameter $\epsilon=H/L\ll 1$ and work in the framework of lubrication theory \cite{Oron1997,Craster2009}. Following the usual procedure (e.g., \cite{Cummings2011,Lin2013a,Crespo2017,Sankararaman2009,Kitavtsev2018,Joanny2012,Khoromskaia2015}), we rescale the coordinates and variables as follows: $\tilde{t}=(t U)/L$, $\tilde{x} = x / L$, $\tilde{z} = z/(\epsilon L)$, $\tilde{h} = h/(\epsilon L)$, $\tilde{\ell}_{u,w} = \ell_{u,w}/(\epsilon L)$, $\tilde{u}_x = u_x / U$, $\tilde{u}_z = u_z / (\epsilon U)$, $\tilde{p} = (p \epsilon^2 L) / (\eta U)$, $\tilde{\sigma}_{ij} = (\sigma_{ij} L)/(\eta U)$ where $U$ is a characteristic velocity scale in the $x$-direction for the internal flow. We introduce several dimensionless groups that reflect the physics at play: $\mathcal{C} = \gamma/(\eta U)$ is an inverse capillary number which compares surface tension to viscous stresses, $\mathcal{A}=(\alpha L)/(\eta U)$ is the ratio of active stresses to viscous ones, and $\mathcal{W} = w_0/U$ controls the strength of self-advection compared to the internal fluid flow. At leading order in $\epsilon$, \cref{eq:director_eq} reduces to $\partial_{\tilde{z}}^2 \theta = 0$. Integrating twice and using the anchoring conditions [\cref{eq:director_BC}], we find the expression of the orientation field: \begin{equation} \theta = m \left( \frac{\omega \pi}{2} + \epsilon \tilde{h}' \right) \frac{\tilde{z}}{\tilde{h}} \end{equation} where $\omega$ is effectively a winding number which measures the number of quarter-turns of the director across the drop height, and where \begin{equation} m = \frac{h^2}{h^2 + \ell_\theta^2} \label{eq:m_regularization} \end{equation} is an \emph{ad hoc} regularizing function, borrowed from \cite{Cummings2011,Lin2013a}, and introduced to alleviate the conflict of strong anchoring conditions for $h \rightarrow 0$. Here $\ell_\theta$ is a characteristic small length scale such that for $h \gg \ell_\theta$, one retrieves the strong anchoring limit ($m=1$) and for $h \ll \ell_\theta$, the anchoring constraint is relaxed ($m=0$). Then, we have to distinguish between two situations: \begin{enumerate} \item $\omega \neq 0$ implies $\theta=O(1)$, therefore no rescaling is needed ($\tilde{\theta}=\theta$) and at leading order the director is not coupled to the drop shape; \item $\omega=0$, the director remains aligned with the bounding surfaces (deviations from the aligned state are due to deformations of the free interface), $\theta=O(\epsilon)$ so we rescale the director orientation as $\tilde{\theta}=\theta/\epsilon$. \end{enumerate} The expression of the (rescaled) director orientation is, at leading order in $\epsilon$, \begin{equation} \tilde{\theta} = \begin{dcases} m \omega \pi \tilde{z} / (2 \tilde{h}) & \text{if $\omega \neq 0$,}\\ m \tilde{h}' \tilde{z} /\tilde{h} & \text{if $\omega = 0$.} \end{dcases} \end{equation} The derivation of the thin drop equation then proceeds as follows. The $z$-component of the Stokes flow equation [\cref{eq:div_stress_zero}] gives, at leading order in $\epsilon$, $\partial_{\tilde{z}} \tilde{p} = 0$, and using the normal component of the free surface boundary condition [\cref{eq:BC_surface_tension}] we find \begin{equation} \tilde{p} = -\mathcal{C} \epsilon^3 \tilde{h}'' \qquad \qquad \text{for any $\omega$}. \end{equation} The $x$-component of \cref{eq:div_stress_zero} gives, at leading order, $\partial_{\tilde{z}} \tilde{\sigma}_{xz} = \partial_{\tilde{x}} \tilde{p}$. This can be integrated once in $\tilde{z}$, and using the tangential component of \cref{eq:BC_surface_tension} we find the expression of the shear stress: \begin{equation} \label{eq:lub_shear_stress} \tilde{\sigma}_{xz} = \begin{dcases} - \mathcal{C} \epsilon^3 \tilde{h}''' (\tilde{z} - \tilde{h}) & \text{if $\omega \neq 0$,}\\ - \mathcal{C} \epsilon^3 \tilde{h}''' (\tilde{z} - \tilde{h}) - \mathcal{A} \epsilon^2 \tilde{h}' & \text{if $\omega = 0$.} \end{dcases} \end{equation} Substituting the definition of $\tilde{\sigma}_{xz}$ [\cref{eq:stress_definition}] into \cref{eq:lub_shear_stress} and integrating once in $\tilde{z}$ with the partial slip boundary condition [\cref{eq:BC_slip}] yields the parallel component of the fluid velocity: \begin{subequations} \label{eq;lub_parallel_velocity} \begin{equation} \tilde{u}_x = \tilde{u}_x^c + \tilde{u}_x^a \end{equation} with $\tilde{u}_x^c$ the capillary flow \begin{equation} \tilde{u}_x^c = - \mathcal{C} \epsilon^3 \left( \frac{\tilde{z}^2}{2} - (\tilde{z}+\tilde{\ell}_u) \tilde{h} \right) \tilde{h}''' \end{equation} and $\tilde{u}_x^a$ the active flow \begin{equation} \tilde{u}_x^a = \begin{dcases} \mathcal{A} \epsilon \frac{(1 - \cos 2 \tilde{\theta})}{2 \pi \omega m} \tilde{h} & \text{if $\omega \neq 0$,}\\ \mathcal{A} \epsilon^2 \left( \frac{m \tilde{z}^2}{2} - (\tilde{z}+\tilde{\ell}_u) \tilde{h} \right) \frac{\tilde{h}'}{\tilde{h}} & \text{if $\omega = 0$.} \end{dcases} \end{equation} \end{subequations} Averaging the flow over the drop height we find \begin{subequations} \label{eq:scaled_fluxes} \begin{equation} \frac{1}{\tilde{h}} \int_0^{\tilde{h}} \tilde{u}_x^c \; \d \tilde{z} = \mathcal{C} \epsilon^3 \left( \frac{\tilde{h}}{3} + \tilde{\ell}_u \right) \tilde{h} \tilde{h}''' \end{equation} and \begin{equation} \frac{1}{\tilde{h}} \int_0^{\tilde{h}} \tilde{u}_x^a \; \d \tilde{z} = \begin{dcases} \mathcal{A} \epsilon \frac{1}{2 \pi \omega m} \tilde{h} & \text{if $\omega \neq 0$,}\\ - \mathcal{A} \epsilon^2 \left( \frac{(3-m)\tilde{h}}{6} + \tilde{\ell}_u \right) \tilde{h}' & \text{if $\omega = 0$.} \end{dcases} \end{equation} Using the expression of $w$ given by \cref{eq:self_advection_expression} we can also write the mean flow due to self-advection \begin{equation} \frac{1}{\tilde{h}} \int_0^{\tilde{h}} \tilde{w} \tilde{n}_x \; \d \tilde{z} = \begin{dcases} \text{not considered} & \text{if $\omega \neq 0$,} \\ \mathcal{W} \tilde{\ell}_w \frac{\left[ 1 - \exp \left( - \tilde{h}/\tilde{\ell}_w \right) \right]}{\tilde{h}} & \text{if $\omega = 0$.} \end{dcases} \end{equation} \end{subequations} \Cref{eq:scaled_fluxes} closes \cref{eq:unscaled_ODE} which, in rescaled variables, can be written as \begin{equation} \tilde{V} = \frac{1}{\tilde{h}} \int_0^{\tilde{h}} (\tilde{u}_x^c + \tilde{u}_x^a + \tilde{w} \tilde{n}_x ) \; \d \tilde{z} \end{equation} Note that we must have $\mathcal{C} \sim \epsilon^{-3}$ such that surface tension enters at leading order, $\mathcal{A} \sim \epsilon^{-1}$ for $\omega \neq 0$ and $\mathcal{A} \sim \epsilon^{-2}$ for $\omega=0$ such that active stresses play a role at leading order, and $\mathcal{W} \sim 1$ to have the effect of self-advection at leading order. \subsection{Thin drop equation \label{sec:reduced_problem}} To summarize, the steady-state shape $h$ of a thin active drop moving at constant (unknown and possibly zero) velocity $V$ along the substrate is the solution of a third-order nonlinear ODE. The form of this ODE depends on the winding number $\omega$, defined as the number of quarter-turns of the director across the drop height imposed by the anchoring boundary conditions. Introducing appropriate nondimensionalization and rescaling (denoted by a tilde), such that all rescaled quantities are $O(1)$, and defining \begin{align} \tilde{\mathcal{V}} & = \frac{\eta V}{\gamma \epsilon^3}, \\ % \tilde{\mathcal{A}} & = \begin{dcases} \frac{\alpha L}{2 \pi \omega \gamma \epsilon^2} & \text{if $\omega \neq 0$,}\\ \frac{\alpha L}{\gamma \epsilon} & \text{if $\omega = 0$,} \end{dcases} \\ \tilde{\mathcal{W}} & = \frac{\eta w_0}{\gamma \epsilon^3} \end{align} we can write the problem as \begin{subequations} \label{eq:full_scaled_problem} \begin{equation} \label{eq:scaled_ODE} \begin{split} & \left( \frac{\tilde{h}}{3} + \tilde{\ell}_u \right) \tilde{h} \tilde{h}''' + \tilde{\mathcal{A}} \tilde{f}^{\alpha}(\tilde{h}) + \tilde{\mathcal{W}} \tilde{f}^w(\tilde{h}) = \tilde{\mathcal{V}} \\ \tilde{f}^{\alpha}(\tilde{h}) & = \begin{dcases} \frac{\tilde{h}}{m} & \text{if $\omega \neq 0$,}\\ - \left( \frac{(3-m) \tilde{h}}{6} + \tilde{\ell}_u \right) \tilde{h}' & \text{if $\omega = 0$,} \end{dcases} \\ \tilde{f}^w(\tilde{h}) & = \begin{dcases} \text{not considered} & \text{if $\omega \neq 0$,}\\ \frac{\tilde{\ell}_w}{\tilde{h}} \left[ 1 - \exp \left( - \tilde{h}/\tilde{\ell}_w \right) \right] & \text{if $\omega = 0$,} \end{dcases} \end{split} \end{equation} where $\tilde{\mathcal{V}}$ is the dimensionless rescaled drop velocity, to be determined as part of the solution, and $m$ is a regularizing function, defined by \cref{eq:m_regularization}, that relaxes the strong anchoring boundary conditions for $h \rightarrow 0$. This ODE is supplemented by four boundary conditions \begin{equation} \label{eq:scaled_BC} \begin{gathered} \tilde{h}(-\tfrac{\tilde{L}}{2}) = 0, \quad \tilde{h}(\tfrac{\tilde{L}}{2})=0, \\ \tilde{h}'(-\tfrac{\tilde{L}}{2}) = \tilde{\phi}_1, \quad \tilde{h}'(\tfrac{\tilde{L}}{2}) = - \tilde{\phi}_2, \end{gathered} \end{equation} where $\tilde{\phi}_{1,2}$ are the contact angles on each side of the drop, and where the drop width $\tilde{L}$ is determined from \begin{equation} \int_{-\tilde{L}/2}^{\tilde{L}/2} \tilde{h} \; \d \tilde{x} = \tilde{\Omega} \label{eq:scaled_volume_constraint} \end{equation} \end{subequations} where $\tilde{\Omega}$ is a prescribed drop volume. To characterize the local mechanical interaction of the drop with the rigid surface, we also introduce \begin{equation} \tilde{\sigma}_{\mathrm{drop/substrate}} = \frac{L}{\gamma \epsilon^3} \sigma_{xz}\rvert_{z=0} \end{equation} which is the (rescaled dimensionless) local traction exerted by the drop on the surface in the x-direction. It can be expressed in terms of the local drop shape and reads: \begin{equation} \label{eq:definition_traction_surface} \tilde{\sigma}_{\mathrm{drop/substrate}} = \begin{dcases} \tilde{h} \tilde{h}''' & \text{if $\omega \neq 0$,}\\ \tilde{h} \tilde{h}''' - \tilde{\mathcal{A}} \tilde{h}' & \text{if $\omega = 0$.} \end{dcases} \end{equation} Finally the flow inside the drop is, at leading order, parallel to the wall. Redefining \begin{equation} \tilde{u}_x = \frac{\eta u_x}{\gamma \epsilon^3} \end{equation} the rescaled fluid velocity is given as a function of the drop shape by \begin{equation} \tilde{u}_x = \begin{dcases} \tilde{u}_x^c + \tilde{\mathcal{A}} \frac{\tilde{h}}{m} \left[1 - \cos \left( \frac{\omega \pi \tilde{z}}{\tilde{h}}\right) \right] & \text{if $\omega \neq 0$,}\\ \tilde{u}_x^c + \tilde{\mathcal{A}} \left( \frac{m \tilde{z}^2}{2} - (\tilde{z}+\tilde{\ell}_u) \tilde{h} \right) \frac{\tilde{h}'}{\tilde{h}} & \text{if $\omega = 0$,} \end{dcases} \end{equation} where $\tilde{u}_c$ is the usual capillary parabolic flow \begin{equation} \tilde{u}_x^c = - \left( \frac{\tilde{z}^2}{2} - (\tilde{z}+\tilde{\ell}_u) \tilde{h} \right) \tilde{h}'''. \end{equation} \subsection{Numerical methods and parameters} Stable solutions to \cref{eq:scaled_ODE,eq:scaled_BC,eq:scaled_volume_constraint} and presented in \cref{sec:results} were obtained numerically as steady solutions to the time-dependent problem (presented in \cref{app:height_equation} and given by \cref{eq:height_eq_PDE}) in the thin drop approximation. Our time integration algorithm is based on a Crank-Nicolson scheme with adaptive time-stepping. For space discretization, we use second-order finite difference schemes on a uniform grid. At each time step, the resulting nonlinear system of equations was solved using the Matlab nonlinear system solver. The solution was advanced in time until the steady-state was reached, corresponding to the sought-after travelling-wave solution. Numerical parameters used in the simulations are summarized in \cref{tab:numerical_parameters}. The volume (surface area) of the drop was kept constant across all the simulations and set to $\tilde{\Omega}=1$. \begin{table}[!h] \begin{tabular*}{0.48\textwidth}{@{\extracolsep{\fill}}lccc} \hline & \multicolumn{3}{c}{self-propulsion driven by} \\ & active stresses & self-advection & capillarity \\ \hline $N_{\text{grid}}$ & 800 & 400 & 200 \\ $\tilde{\Omega}$ & 1 & 1 & 1 \\ $\tilde{\ell}_u$ & 0.05 & 0.01 & 0.05 \\ $\tilde{\ell}_\theta$ & 0.05 & 0.01 & 0.05 \\ $\tilde{\phi}_1$ & 1 & 1 & 10 \\ $\tilde{\phi}_2$ & 1 & 1 & 5 \\ \hline \end{tabular*} \caption{Numerical parameters used in the simulations (unless mentioned otherwise): number of grid points ($N_{\text{grid}}$), drop volume ($\tilde{\Omega}$), slip length ($\tilde{\ell}_u$), characteristic thickness for strong anchoring relaxation ($\tilde{\ell}_\theta$, set equal to $\tilde{\ell}_u$), and contact angles ($\tilde{\phi}_1$ and $\tilde{\phi}_2$). \label{tab:numerical_parameters}} \end{table} \section{Results \label{sec:results}} Three distinct driving mechanisms (active stresses, self-advection, and capillary forces due to different contact angles) are embedded in \cref{eq:scaled_ODE,eq:scaled_BC,eq:scaled_volume_constraint}, leading to the three modes of motion summarized in \cref{tab:modes_of_motion_parameters} and that we will analyze separately in the following. \begin{table}[!h] \begin{tabular*}{0.48\textwidth}{@{\extracolsep{\fill}}cccc} \hline & \multicolumn{3}{c}{self-propulsion driven by} \\ & active stresses & self-advection & capillarity \\ \hline $\omega$ & $\neq 0$ & 0 & 0 \\ $\tilde{\mathcal{A}}$ & $\neq 0$ & 0 & 0 and $\neq 0$ \\ $\tilde{\mathcal{W}}$ & 0 & $\neq 0$ & 0 \\ $\phi_2-\phi_1$ & 0 & 0 & $\neq 0$ \\ \hline \end{tabular*} \caption{The three basic modes of motion: (i) tractionless tank-treading driven by active stresses ($\propto \tilde{\mathcal{A}}$) and controlled by the winding number $\omega$ (if $\omega=0$ the drop is static), (ii) crawling driven by self-advection ($\propto \tilde{\mathcal{W}}$), (iii) sliding driven by a capillary force $F_{\text{capillary}}=\gamma (\cos \phi_2 - \cos \phi_1)$ and possibly modulated by activity. \label{tab:modes_of_motion_parameters}} \end{table} \subsection{Self-propulsion driven by active stresses \label{sec:TTT}} \begin{figure*} \flushleft (a) \\[-1em] \centering \includegraphics[height=3.1cm]{scheme_drop_height_BC_EQ1} \includegraphics[height=3.1cm]{scheme_winding_number} \\ \vspace{-0.5em} \flushleft (b) \\[-0.3em] \centering \includegraphics[width=0.99\linewidth]{TTT_numerics_profiles_same_scale} \\ \vspace{-0.5em} \flushleft (c) \hspace{11.8cm} (d) \\[-0.3em] \centering \includegraphics[width=0.66\linewidth]{TTT_numerics_effect_of_activity} \includegraphics[width=0.33\linewidth]{TTT_numerics_effect_of_slip} \\ \flushleft (e) \\[-1em] \centering \includegraphics[width=0.97\linewidth]{scheme_TTT_winding_numbers} \caption{ Self-propulsion driven by active stresses: the motion of a drop endowed with active stresses is controlled by the global topology of the director field and can be achieved without exerting traction locally on the surface. (a) Model of a thin active drop with active stresses and a winded director. The drop shape and velocity are controlled by $\tilde{\mathcal{A}} =(\alpha L) / ( 2 \pi \omega \gamma \epsilon^2)$ where $\omega$ is the winding number. (b) Numerical profiles of the drop shape and tangential traction exerted on the substrate. (c) Effect of $\tilde{\mathcal{A}}$ on the drop shape and velocity, $\tilde{H}$ is the mean height and the analytical solution for $\tilde{\mathcal{V}}$ is given by \cref{eq:TTT_pert_an}. (d) Effect of slip on the drop shape and velocity ($\mathcal{\tilde{A}}=1$). (e) Sketch of a tractionless flat drop moving at velocity $V=(\alpha H)/(2 \pi \omega \eta)$: director and velocity fields in the co-moving frame of reference (solution for $\omega=2$ is also valid for a drop confined between two walls). Colored symbols in (b-d) mark corresponding state points across panels. \label{fig:TractionlessTankTreading} } \end{figure*} We consider the motion of a drop arising solely from active stresses ($\tilde{\mathcal{W}}=0$, $\tilde{\phi}_1 = \tilde{\phi}_2$). We found that if $\omega=0$, the drop is static (we comment on this at the end of this subsection). Therefore we assume $\omega \neq 0$, that is, we enforce a winding of the director through anchoring conditions at the bounding surfaces [\cref{fig:TractionlessTankTreading}(a)]. The governing ODE for the drop shape reduces to \begin{equation} \label{eq:TTT} \left( \frac{\tilde{h}}{3} + \tilde{\ell}_u \right) \tilde{h} \tilde{h}''' + \tilde{\mathcal{A}} \frac{\tilde{h}}{m} = \tilde{\mathcal{V}}. \end{equation} One can readily see that the drop shape and velocity are controlled by the dimensionless parameter $\tilde{\mathcal{A}} = (\alpha L)/(2 \pi \omega \gamma \epsilon^2)$, where $\alpha$ and $\omega$ can be of either sign. Since $\tilde{\mathcal{A}}(\alpha,\omega)=\tilde{\mathcal{A}}(-\alpha,-\omega)$, changing the direction in which the director winds (from counter-clockwise to clockwise) is equivalent to changing the sign of activity (from extensile to contractile). It is also interesting to note that if $\{\tilde{h}(\tilde{x}),\mathcal{V}\}$ is a solution for $\tilde{\mathcal{A}}$ then $\{\tilde{h}(-\tilde{x}),-\tilde{\mathcal{V}}\}$ is a solution for $-\tilde{\mathcal{A}}$: reversing the sign of $\tilde{\mathcal{A}}$ simply reverses the direction of motion. Therefore in the following we will only consider $\tilde{\mathcal{A}} \geqslant 0$. The evolution of the drop shape and velocity with $\tilde{\mathcal{A}}$ is shown in \cref{fig:TractionlessTankTreading}(b,c). Overall, the drop becomes thinner and faster as activity increases. Solutions are however qualitatively different at low and high $\tilde{\mathcal{A}}$. In the limit of small $\tilde{\mathcal{A}}$, the drop shape is close to a parabola (the equilibrium shape for a passive drop), and its velocity can be computed analytically at linear order in $\tilde{\mathcal{A}}$ (Appendix \ref{app:TTT_perturbation_solution}): \begin{equation} \label{eq:TTT_pert_an} \tilde{\mathcal{V}} = \tilde{\mathcal{A}} \frac{\tilde{\phi} \tilde{L}_0}{4} \frac{\sqrt{\tilde{b}} - (\tilde{b}-1) \arctanh(1/\sqrt{\tilde{b}})}{\arctanh(1/\sqrt{\tilde{b}})} \end{equation} where $\tilde{b}=1 + 12 \tilde{\ell}_u/(\tilde{L}_0 \tilde{\phi})$ and $\tilde{L}_0= \sqrt{6 \tilde{\Omega}/\tilde{\phi}}$. The first correction for the drop width is quadratic, so at linear order $\tilde{L}=\tilde{L}_0=\sqrt{6 \tilde{\Omega}/\tilde{\phi}}$ and the mean drop height is $\tilde{H}=\tilde{H}_0=\tilde{\Omega}/\tilde{L}_0$ where $\tilde{\Omega}$ is the drop volume (kept constant across simulations). Comparison to the numerical solution (dash-dotted lines in \cref{fig:TractionlessTankTreading}(c) (left panels) is excellent and shows that this solution remains valid up to $\tilde{\mathcal{A}} \approx 0.1$. For $\tilde{\mathcal{A}} \geqslant 1$, the drop is locally flat (the numerical value of this threshold depends on $\tilde{\ell}_u$ and $\phi$, so the fact it is unity here is coincidental). The extent of the flat region rapidly increases with $\tilde{\mathcal{A}}$: analysis of numerical data indicates that, for $\tilde{\mathcal{A}} \geqslant 1$, the fraction of the drop which is \emph{not flat} first decreases as $\tilde{\mathcal{A}}^{-1}$. For $\tilde{\mathcal{A}} \gtrsim 10$, more than $90 \%$ of the drop is bounded by a flat free surface [\cref{fig:TractionlessTankTreading}(c), top right panel]. In this regime the drop velocity is exactly given by $\tilde{\mathcal{V}} = \tilde{\mathcal{A}} \tilde{h}_{\textrm{flat}}$ where $\tilde{h}_{\textrm{flat}}$ is the height of the flat region. In practice, the drop velocity is well approximated by [\cref{fig:TractionlessTankTreading}(c), bottom panels] \begin{equation} \label{eq:flat_drop_velocity} \tilde{\mathcal{V}} = \tilde{\mathcal{A}} \tilde{H} \end{equation} with $\tilde{H}$ the mean drop height: the error on $\tilde{\mathcal{V}}$ is less than 5 \% for $\tilde{\mathcal{A}} \geqslant 1$ and goes to zero as $\tilde{\mathcal{A}} \rightarrow \infty$. The mechanical interaction with the wall (modeled through the slip length $\ell_u$) does not appear in \cref{eq:flat_drop_velocity}, but it enters indirectly through the dependence of $\tilde{H}$ on $\tilde{\ell}_u$ (\cref{fig:TractionlessTankTreading}d): more slip yields thicker (and hence faster) droplets. At high $\tilde{\mathcal{A}}$, the drop is flat everywhere except near the contact lines, and the local tangential traction $\tilde{\sigma}_{\text{drop/substrate}}$ induced by this drop on the substrate is identically zero almost everywhere (\cref{fig:TractionlessTankTreading}b, right panel). This is remarkable: while autonomous propulsion driven by active processes is necessarily force-free, it is not, in general, tractionless (see \cref{sec:force_traction}). Strictly speaking $\tilde{\sigma}_{\text{drop/substrate}}=0$ where $h'''=0$ (from \cref{eq:definition_traction_surface}), that is, everywhere except at the drop edges. Integrating $\tilde{\sigma}_{\text{drop/substrate}}$ over an edge yields a force of magnitude $\tilde{\phi}^2 / 2$ and directed inward: as seen from the substrate, the drop effectively acts as a contractile force dipole, independent of activity and due to finite contact angle $\tilde{\phi}$. A sketch of the tractionless motion of a flat drop is provided in \cref{fig:TractionlessTankTreading}(e), where we also illustrate the role played by the winding number $\omega$. The winding of the director (green rods) induces an active stress in the liquid which must be balanced by the viscous stress such that the total shear stress vanishes. The internal fluid flow thereby generated is sinusoidal, rather than parabolic in other modes of motion (blue arrows, plotted in the co-moving frame of reference). Going back to the original dimensional variables, the fluid velocity reads, in the laboratory frame of reference, \begin{equation} u_x = V \left[ 1 - \cos \left( \frac{\omega \pi z}{H} \right) \right] \end{equation} where $H$ is the drop height and where \begin{equation} V = \frac{\alpha H}{2 \pi \omega \eta}. \end{equation} The net flow is not zero and causes the drop to move at a velocity $V$ in a tank-treading fashion while exerting no tangential traction on the surface. The winding number controls the number of fluid circulation cells, which is exactly equal to $|\omega|$. The drop speed is maximum for $|\omega|=1$, which corresponds to antagonist anchoring conditions for the director at the wall and at the free surface. The case $|\omega|=2$, while less favored energetically, generates a flow which is symmetric with respect to the drop midplane. In particular, the solution has zero fluid velocity \emph{and} zero shear stress at \emph{both} boundaries, therefore it also solves the problem of a drop squeezing through a narrow channel [right panel in \cref{fig:TractionlessTankTreading}(e)]. In this configuration the drop motion is completely independent of the amount of slip at the walls, since the drop height is geometrically constrained. This solution is reminiscent of contraction-based amoeboid motility such as exhibited by leukocyte and human breast cancer cells squeezing through complex 3D extracellular geometries \cite{Lammermann2008,Poincloux2011} and by confined cells migrating in microchannels \cite{Liu2015,Hung2013}. This geometrically constrained setup is perhaps the easiest to control experimentally: one can imagine confining a drop of bacterial suspension~\cite{Lopez2015,Guo2018} or of microtubule-kinesin mixture~\cite{Sanchez2012} between two surfaces, one used for imaging the traction maps \cite{Dembo1996,Tan2003,duRoure2005} and the other designed to ensure appropriate anchoring (through, e.g., manipulation of the surface chemistry or architecture \cite{Koumakis2014,Sipos2015,Yuan2017,Munoz-Bonilla2018,Hasan2013}). Traction maps would show a zero traction on the channel walls everywhere except at the drop edges, where the traction magnitude and sign would only depend on the wettability of the walls. It is important to emphasize that tractionless motion controlled by $\omega \neq 0$ is not related to the spontaneous flow transition in active nematics films \cite{Voituriez2005}. Our analysis describes a drop of active nematic in the strong elastic limit, that is, in a regime where $\mathcal{K} \geqslant O(1)$ (see Appendix \ref{app:validity_regime}), where $\mathcal{K} = (\Gamma K)/(U L)$ with $1/\Gamma$ the rotational viscosity and $K$ the nonequilibrium analog of an elastic constant. In this limit, there is no internal flow (and hence no drop motion) for $\omega=0$. It is well-known that for $\omega=0$, internal flows can occur spontaneously in thin films of active nematics beyond a critical height due to a splay (or bend) instability \cite{Voituriez2005}. Within our framework and with our notations, this instability requires $\mathcal{K} \leqslant O(\epsilon)$, in other words, it requires a drop thicker than the one we consider here. Whether the spontaneous flow transition for active films \cite{Voituriez2005} results in a ``spontaneous tractionless motion transition'' for active drops remains an open question. To answer it, one must first integrate the full dynamic equation for the director [\cref{eq:full_director_eq}] rather than its strong elastic limit [\cref{eq:director_eq}]. This problem, significantly more intricate, is left to future work. In any case it is of fundamental importance to note that this kind of motion is \emph{only} possible for active matter driven in the bulk and cannot happen for propulsion due to driving at or near boundaries (the other two modes considered in this paper). \subsection{Self-propulsion driven by self-advection \label{sec:AC}} \begin{figure*} \flushleft (a) \\ \centering \includegraphics[height=3.1cm]{scheme_drop_height_BC_EQ0} \\ \flushleft (b) \\ \centering \includegraphics[width=0.99\linewidth]{AC_numerics_profiles} \\ \flushleft (c) \hspace{11.8cm} (d) \\ \centering \includegraphics[width=0.66\linewidth]{AC_numerics_effect_of_activity} \includegraphics[width=0.33\linewidth]{AC_numerics_effect_of_slip} \caption{ Self-propulsion driven by self-advection: a drop with directed self-advection of active units (due to e.g. polymerization toward the front) develops a frontal protrusion and crawls more effectively as slip is reduced. (a) Model of a thin active drop with self-advection close to the substrate. The effect of self-advection on the drop shape and velocity is controlled by $\tilde{\mathcal{W}}=(w_0 \eta) / (\gamma \epsilon^3)$ where $w_0$ is the characteristic self-advection speed of the active units. The height over which the strength of self-advection decays was kept constant across simulations ($\tilde{\ell}_w=0.1$). (b) Numerical profiles of the drop shape and tangential traction exerted on the substrate. (c) Effect of $\tilde{\mathcal{W}}$ on the drop shape and velocity, the analytical solution is given by \cref{eq:AC_pert_an}. (d) Effect of slip on the drop shape and velocity (top and middle panels, $\tilde{\mathcal{W}}=0.25$), and on the transition between non-protruded and protruded drops (bottom panel). Colored symbols in (b-d) mark corresponding state points across panels. \label{fig:AdhesiveCrawling} } \end{figure*} Crawling is a mode of cell motility well-characterized experimentally \cite{Verkhovsky1999,Loisel1999,Yam2007} and captured by various physical models \cite{Kruse2006,Keren2008,Shao2012,Ziebert2012,Tjhung2015,Khoromskaia2015}. Crawling motility is usually understood as follows: polymerization of actin filaments in a thin protrusion at the leading edge generates a pushing force against the cell membrane, which, when combined with anchoring to the substrate via focal adhesions, causes the cell to move forward. A simple way to account for this mechanism, illustrated in \cref{fig:AdhesiveCrawling}(a), consists in adding a self-advection term to the mass conservation equation (which describes the net polymerization of filaments in a given direction), while adhesion is controlled by the amount of slip at the substrate (here through the slip length $\ell_u$). To ease comparison with prior work \cite{Tjhung2015} we chose an advection velocity which is maximum at the substrate (denoted $w_0$) and decays exponentially over a characteristic length $\ell_w$ in the direction normal to the substrate, as described in \cref{sec:self_advection}. We emphasize that what generates motion here is a flux of matter: crawling can be obtained solely from self-advection, in the absence of active stresses ($\tilde{\mathcal{A}}=0$) or mismatch in the contact angles ($\tilde{\phi}_1 = \tilde{\phi}_2$). The governing equation then reduces to \begin{equation} \label{eq:AC} \left( \frac{\tilde{h}}{3} + \tilde{\ell}_u \right) \tilde{h} \tilde{h}''' + \tilde{\mathcal{W}} \frac{\tilde{\ell}_w}{\tilde{h}} \left[ 1 - \exp \left( - \tilde{h}/\tilde{\ell}_w \right) \right] = \tilde{\mathcal{V}}. \end{equation} Besides $\tilde{\ell}_w$ (which is kept constant here, $\tilde{\ell}_w=0.1$) and $\tilde{\ell}_u$ (set here to $\tilde{\ell}_u = 0.01$), the drop shape and velocity are controlled by a single dimensionless group: $\tilde{\mathcal{W}}=(\eta w_0)/(\gamma \epsilon^3)$. Numerical solutions of \cref{eq:AC}, computed for a range of $\tilde{\mathcal{W}}$, are presented in \cref{fig:AdhesiveCrawling}(b,c). They reveal the existence of a critical value of $\tilde{\mathcal{W}}$, denoted $\tilde{\mathcal{W}}_c$, above which a protrusion develops at the front. The numerical value of $\tilde{\mathcal{W}}_c$ increases linearly with $\tilde{\ell}_u$ [\cref{fig:AdhesiveCrawling}(d), bottom panel], and the transition is sharper for larger $\tilde{\ell}_u$, in agreement with prior work \cite{Tjhung2015}. For $\tilde{\mathcal{W}}<\tilde{\mathcal{W}}_c$, the drop profile is nearly parabolic and it is possible to derive an analytical expression of the drop velocity at linear order in $\tilde{\mathcal{W}}$ (Appendix \ref{app:AC_perturbation_solution}): \begin{equation} \label{eq:AC_pert_an} \begin{split} & \tilde{\mathcal{V}} = \tilde{\mathcal{W}} \frac{2 \tilde{\ell}_w}{\tilde{L}_0 \tilde{\phi}} \frac{1}{(\tilde{b}-1) \arctanh(1/\sqrt{\tilde{b}})} \Bigg\{ \\ & \phantom{+} 2 \sqrt{\tilde{b}} \tilde{d} \,_2F_2(\{1,1\},\{3/2,2\},-\tilde{d}) \\ & + 2 \big[ \mathrm{e}^{(\tilde{b}-1) \tilde{d}} - 1 \big] \ln\Big( 1 + 2 \big[\cot \big( \arcsin(1/\sqrt{\tilde{b}}) / 2 \big) - 1 \big]^{-1} \Big) \\ & - \mathrm{e}^{(\tilde{b}-1) \tilde{d}} \Big[ 2 \arctanh(\sqrt{\tilde{b}}) + \mathrm{i} \pi \big[ 1 + 4 T(\sqrt{2\tilde{b}\tilde{d}},\mathrm{i}/\sqrt{\tilde{b}}) \big] \Big] \Bigg\} \end{split} \end{equation} with $\mathrm{i}^2=-1$, $\tilde{b}=1 + 12 \tilde{\ell}_u/(\tilde{L}_0 \tilde{\phi})$, $d=(\tilde{\phi} \tilde{L}_0)/(4 \tilde{\ell}_w)$, and where $T(\chi,c)$ is Owen's T function \cite{Owen1956} and $_2F_2(\{a_1,a_2\},\{b_1,b_2\},\zeta)$ is the generalized hypergeometric function \cite{NIST2010book} (these functions are implemented in Mathematica). The first correction to the drop width is quadratic, so at linear order $\tilde{L}=\tilde{L}_0=\sqrt{6 \tilde{\Omega}/\tilde{\phi}}$. Comparison to the numerical solution is shown in \cref{fig:AdhesiveCrawling}(c) (left panels): agreement is excellent nearly up to $\tilde{\mathcal{W}}_c$. For $\tilde{\mathcal{W}}>\tilde{\mathcal{W}}_c$, the drop has a frontal protrusion of thickness $\sim \tilde{\ell}_w$ which grows in length upon increasing $\tilde{\mathcal{W}}$ [\cref{fig:AdhesiveCrawling}(c), right panels]. The drop velocity magnitude is of the order of $\tilde{\mathcal{W}}$, but its growth with $\tilde{\mathcal{W}}$ is faster than linear. Increasing slip reduces the drop velocity [\cref{fig:AdhesiveCrawling}(d), middle panel]: as expected crawling is most effective when the substrate provides strong adhesion. We finally emphasize that these results, here obtained under the thin drop approximation, are in very good agreement with prior full numerical simulations \cite{Tjhung2015} (Fig.~1 and S1 therein). \subsection{Self-propulsion driven by capillarity and modulated by activity \label{sec:CS}} \begin{figure* \flushleft (a) \\ \centering \includegraphics[height=3.1cm]{scheme_drop_height_BC_EQ2.pdf} \includegraphics[height=3.1cm]{scheme_dipoles_polarization} \\ \flushleft (b) \\ \centering \includegraphics[width=0.99\linewidth]{CS_numerics_profiles} \\ \flushleft (c) \hspace{11.5cm} (d) \\ \centering \includegraphics[width=0.325\linewidth]{CS_numerics_effect_of_activity_width} \includegraphics[width=0.325\linewidth]{CS_numerics_effect_of_activity_velocity} \includegraphics[width=0.325\linewidth]{CS_numerics_effect_of_slip} \caption{ Self-propulsion driven by capillarity and modulated by activity: the motion of an asymmetric drop is enhanced by contractility and hindered by extensility. (a) Model of a thin active drop driven by the capillary force that results from the difference in contact angles (here $\tilde{\phi}_1=10$ and $\tilde{\phi}_2=5$) that may arise from, e.g., a gradient of surface energy. Parallel anchoring of the director is prescribed at both bounding surfaces. The effect of activity on the drop shape and velocity is controlled by $\tilde{\mathcal{A}}=(\alpha L) / (\gamma \epsilon)$, whose sign depends on whether the active stress is extensile ($\alpha > 0$) or contractile ($\alpha < 0$). (b) Numerical profiles of the drop shape and tangential traction exerted on the substrate. (c) Effect of $\tilde{\mathcal{A}}$ on the drop width and velocity with respect to the passive case, analytical expressions are given by \cref{eq:CS_pert_an_L} and \cref{eq:CS_pert_an_V}. (d) Effect of slip on the drop velocity. Colored symbols in (b-d) mark corresponding state points across panels. \label{fig:CapillarySliding} } \end{figure*} We consider an asymmetric drop moving under the action of a net capillary force ($\phi_{1} \neq \phi_{2}$ implies $\abs{F_{\text{capillary}}}>0$), as depicted in \cref{fig:CapillarySliding}(a). The director field is chosen to be nearly aligned ($\omega=0$), as larger distortions would essentially lead back to \cref{sec:TTT} (motion driven by active stresses and controlled by the winding of the director). Here we ask: can activity facilitate (or impede) the drop motion, and does the sign of activity (extensile or contractile) matter? The answer: Yes, and yes. A minimal mathematical description of capillarity-driven sliding is obtained by setting $\tilde{\mathcal{W}}=0$ and $\omega=0$ in \cref{eq:scaled_ODE}, which yields \begin{subequations} \label{eq:CS-A} \begin{equation} \left( \frac{\tilde{h}}{3} + \tilde{\ell}_u \right) \tilde{h} \tilde{h}''' - \tilde{\mathcal{A}} \left( \frac{(3-m)\tilde{h}}{6} + \tilde{\ell}_u \right) \tilde{h}' = \tilde{\mathcal{V}} \end{equation} with different contact angles imposed at the boundaries (as may arise, from, e.g., a gradient of surface energy): \begin{equation} \tilde{\phi}_1 = \tilde{\phi} + \frac{\tilde{\varphi}}{2}, \qquad \tilde{\phi}_2 = \tilde{\phi} - \frac{\tilde{\varphi}}{2} \end{equation} \end{subequations} with $\tilde{\varphi}=\tilde{\phi}_1-\tilde{\phi}_2$ the contact angle difference, as depicted in \cref{fig:CapillarySliding}(a). The effect of activity on the drop shape and velocity is controlled by the dimensionless parameter $\tilde{\mathcal{A}} = (\alpha L)/(\gamma \epsilon)$. The sign of $\tilde{\mathcal{A}}$ depends on whether active units, modelled as force dipoles \cite{Pedley1992}, induce an extensile flow ($\alpha > 0$, e.g. certain bacteria) or a contractile flow ($\alpha < 0$, e.g. the actin-myosin complex). Numerical solutions to \cref{eq:CS-A} for various $\tilde{\mathcal{A}}$ are presented in \cref{fig:CapillarySliding}(b,c). With respect to the passive case, the drop base is narrower (wider) with contractile (extensile) activity [\cref{fig:CapillarySliding}(b,c)], as is the case for static symmetric drops \cite{Joanny2012}. At high $-\tilde{\mathcal{A}}$ (high contractility), the drop breaks up; this phenomenon is outside the scope of this paper and its analysis is left to future work. Activity also influences the drop speed: contractile (extensile) drops are faster (slower) than their passive counterpart [\cref{fig:CapillarySliding}(c)] (note that with normal anchoring, the extensile drop would be narrower and faster). Increasing slip results in greater drop velocities, as for a passive drop since friction hinders sliding motion [\cref{fig:CapillarySliding}(d)]. The dependence of $\mathcal{\tilde{V}}$ and $\tilde{L}$ on $\tilde{\mathcal{A}}$ is approximately linear over a rather large range of $\tilde{\mathcal{A}}$, and can be computed exactly from a perturbation analysis in the limit of small $|\tilde{\varphi}|$ and small $|\tilde{\mathcal{A}}|$. We find (Appendix \ref{app:CS_perturbation_solution}) that the drop width is \begin{subequations} \label{eq:CS_pert_an_L} \begin{equation} \tilde{L} = \tilde{L}_0 + \tilde{\mathcal{A}} \tilde{L}_\alpha + O(\tilde{\mathcal{A}}^2, \tilde{\varphi}^2) \end{equation} with ($\Omega$ is the drop volume) \begin{equation} \tilde{L}_0 = \sqrt{\frac{6 \tilde{\Omega}}{\tilde{\phi}}}, \qquad \tilde{L}_\alpha = \frac{\tilde{\Omega}}{2 \tilde{\phi}^2} \end{equation} \end{subequations} and the drop velocity is \begin{subequations} \label{eq:CS_pert_an_V} \begin{equation} \tilde{\mathcal{V}} = \tilde{\varphi} \left[ \tilde{\mathcal{V}}_{\varphi,L_0} + \tilde{\mathcal{A}} (\tilde{\mathcal{V}}_{\varphi,L_\alpha} + \tilde{\mathcal{V}}_{\varphi,\alpha}) \right] + O(\tilde{\mathcal{A}}^2, \tilde{\varphi}^2) \end{equation} where the coefficients are given below: \begin{align} \tilde{\mathcal{V}}_{\varphi,L_0} & = \frac{\tilde{\beta}_0 \tilde{\phi}}{6 \ln (\tilde{\beta}_{p/m})} \\[0.8em] % \tilde{\mathcal{V}}_{\varphi,L_\alpha} & = - \frac{\tilde{\phi}^2 \tilde{L}_\alpha [ \tilde{\beta}_0 \tilde{L}_0 + 6 \tilde{\ell}_u \ln (\tilde{\beta}_{p/m}) ] }{ 6 \tilde{L}_0^2 \tilde{\beta}_0 [\ln (\tilde{\beta}_{p/m})]^2}\\[0.8em] % \tilde{\mathcal{V}}_{\varphi,\alpha} & = \frac{\tilde{L}_0 \tilde{\beta}_{p/m}}{24 \tilde{\beta}_0 [ \ln (\tilde{\beta}_{p/m}) ]^2} \Bigg\{ \\ & + ( 2\tilde{\beta}_0^2 - \tilde{\beta}_{m}^2 ) \dilog ( \tilde{\beta}_{p/m} ) \nonumber \\ & - ( 2\tilde{\beta}_0^2 + \tilde{\beta}_{m}^2 ) \dilog ( 2 \tilde{\phi}/\tilde{\beta}_{p} ) \nonumber \\ & - \tilde{\beta}_0^2 \big\{ [ \ln(\tilde{\beta}_{p}) ]^2 - [ \ln(\tilde{\beta}_{m}) ]^2 \big\} \nonumber \\ & + \big\{ [ 2 \tilde{\beta}_0^2 + \tilde{\beta}_{m}^2 ] \ln(2\tilde{\phi}) - \tilde{\beta}_{m}^2 [ 1 + \ln(\tilde{\beta}_{p}) ] \big\} \ln (\tilde{\beta}_{p/m}) \nonumber \\ & + \frac{\pi^2}{6} ( 2 \tilde{\beta}_0^2 + \tilde{\beta}_{m}^2 ) - 2 \frac{\tilde{\beta}_0 \tilde{\phi}}{\tilde{\beta}_{p/m}} \Bigg\} \nonumber \end{align} \end{subequations} with $\tilde{\beta}_0 = \tilde{\phi} \sqrt{1+(12 \tilde{\ell}_u)/(\tilde{L}_0 \tilde{\phi})}$, $\tilde{\beta}_{p} = \tilde{\beta}_0 + \tilde{\phi}$, $\tilde{\beta}_{m} = \tilde{\beta}_0 - \tilde{\phi}$, $\tilde{\beta}_{p/m}= \tilde{\beta}_{p}/\tilde{\beta}_{m}$ and with $\dilog (y) = \displaystyle \int_1^y \dfrac{\ln(t)}{1-t} \id t$. Comparison with the numerical solution is excellent [bottom panels in \cref{fig:CapillarySliding}(c)]. Embedding an active suspension into an otherwise self-propelled passive droplet, driven by a gradient of surface energy or surface tension \cite{Chaudhury1992,Bain1994,DosSantos1995,Cira2015}, could be a rather straightforward way to realize experimentally this activity-modulated, capillarity-driven self-propulsion. \section{Conclusions} To summarize, we have obtained a generic and unified description of a thin 2D drop of active liquid moving on a solid substrate that consists of a single ODE. We have analyzed, using a combination of numerical simulations and asymptotic analysis, the autonomous propulsion of this drop induced by three possible driving sources (summarized in \cref{fig:scheme_intro}): active stresses (\cref{fig:TractionlessTankTreading}), active self-advection (\cref{fig:AdhesiveCrawling}), and a (possibly self-generated) capillary force (\cref{fig:CapillarySliding}). Motion driven by active stresses does not require a shape asymmetry, is efficient even in the presence of slip and allows self-propulsion without the need to exert traction anywhere on the surface, giving rise to ``tractionless tank treading''. This new mode of motion, driven in the bulk rather than at the boundaries, is topologically protected and is particularly suited for moving rapidly through tiny pores. Therefore it provides a robust physical mechanism for efficient cell migration in tissues. In contrast, motion driven by the self-advection of polarized active units at the substrate, known as crawling, is characterized by a strong shape anisotropy and is most efficient in the absence of slip. Therefore this mode of self-propulsion is particularly suited for moving on 2D surfaces which provides strong anchoring points. A prominent example of crawling is mesenchymal migration, a mode of cell motility characterized by strong cell-substrate adhesions, with self-advection provided by actin polymerization in a leading edge protrusion \cite{Verkhovsky1999,Loisel1999}. Finally the third mode motion is, unlike the other two, not driven by active processes but by a net capillary force, as can be induced by (external or self-generated) thermal or chemical gradients. By coupling this driving with internal activity, one can further tune the drop velocity and create droplets faster than their passive counterparts. Our 2D model is expected to be valid for any 3D drop where variations in the additional spatial dimension are much slower than in the other two. Beyond that, while extending the thin drop formulation to 3D is rather straightforward, solutions may be far more complex (for example, based on the form of \cref{eq:TTT}, we expect a fingering instability for a 3D drop driven by active stresses). Our present attempt to provide a generic classification of self-propulsion mechanisms, one of them being the extensively studied treadmilling-driven crawling, led us to introduce an entirely new class (tractionless tank-treading driven by bulk active stresses) and to give a new twist to an old mechanism (self-propulsion driven by gradients): we hope those will trigger further theoretical investigations and experimental realizations.
\section{Introduction}\label{Star-sec1} Let $\varOmega$ be a bounded domain in $\mathbb{R}^n$, $n\ge 2$, with a Lipschitz boundary $\partial\varOmega$. In the space-time cylinder $\varOmega_T=\varOmega\times (0,T)$, $T\in(0,\infty)$, we consider the following differential equation: \begin{equation}\label{Star-1.1} \partial_t u -\Delta u +\varphi\Big(\int_0^T u(\cdot,s)\,ds\Big)\, u =0, \end{equation} where $u=u(x,t)$ is an unknown scalar function, $x=(x_1,\ldots,x_n)$ the vector of the spatial variables in $\mathbb{R}^n$, $t$ the time variable in the interval $[0,T]$, $\varphi$ a scalar function that will be specified below. We suppose that the following boundary and initial conditions are satisfied: \begin{equation}\label{Star-1.2} u(x,t)=0\quad \text{for}\quad x\in\partial\varOmega,\quad t\in [0,T], \end{equation} \begin{equation}\label{Star-1.3} u(x,0)=u_0(x)\quad \text{for}\quad x\in\varOmega, \end{equation} where the function $u_0:\varOmega\to \mathbb{R}$ is prescribed. An interesting feature of this problem is that equation \eqref{Star-1.1} contains a non-local in time term that depends on the integral over the whole interval $(0,T)$ on which the problem is being solved. For this reason, equation \eqref{Star-1.1} is called global in time in the title of the paper. There are a lot of works that study problems with memory for parabolic equations which includes the integral of the solution from the initial to the current time and it is not difficult to find appropriate works on this subject. The problems with memory differ from ours. In fact, we need to know the ``future'' in order to determine the coefficient in equation \eqref{Star-1.1}. It should be noted that the problem cannot be reduced to known ones by any transformations. There are papers that study problems, where the ``future'' stands in the data (see, e.g., \cite{Star-P,Star-Sh,Star-BB}). The paper \cite{Star-L} is devoted to the investigation of a system of equations that contain an integral of the solution over the entire time interval, but this nonlocality is easily eliminated and the equation is reduced to a parabolic equation with a prescribed combination of initial and final data as in \cite {Star-Sh}. Our problem appeared when describing the chaotic dynamics of a single polymer molecule or, as it is also called, a polymer chain in an aqueous solution (see \cite{Star-StSt}). The time $t$ in equation \eqref{Star-1.1} is in fact the arc length parameter along the chain. The unknown function $u=u(x,t)$ is the density of probability that the $t$-th segment of the chain is at the point $x$. Since each segment of the chain interacts with all other segments through the surrounding fluid, the equation contains an interaction term which includes an integral of $u$ over the entire chain. Equation \eqref{Star-1.1} is simpler than that obtained in \cite{Star-StSt}, however, it looks similar and also contains the term with the integral of the solution from $0$ to $T$. In \cite{Star-St}, the weak solvability of the problem is proven for the case where $u$ is a positive bounded function and $\varphi$ is the so called Flory --- Huggins potential. The positiveness is a natural requirement since $u$ is the density of probability. The Flory --- Huggins potential is a convex increasing function that tends to infinity as its argument approaches a certain positive value. Such an equation can appear in other problems as well. It would be interesting to investigate it with another potential $\varphi$. In this paper, we consider the potential $\varphi$ that is, in general, not convex and not everywhere increasing. Besides that, we do not require that the solution is positive and bounded. Generally speaking, equation \eqref{Star-1.1} has features unusual for parabolic equations. First of all, the causality principle is violated. The state of the system depends not only on the past but also on the future. Besides, from mathematical point of view, the solution of a nonlinear parabolic problem is commonly being constructed locally in time and is extended afterwards. In our case this procedure is impossible. Finally, as a rule, the local in time uniqueness of the solution implies the global one. We cannot prove the uniqueness without restrictions on $T$. However, it is possible that a more skilled author will be able to do this. In the next section, we define the notion of weak solution of problem \eqref{Star-1.1}--\eqref{Star-1.3} and formulate Theorem~\ref{Star-t2.3}, the main result of the paper, that states the weak solvability of the problem. The proof of this result (Section~\ref{Star-sec4}) is based on the Tikhonov theorem on the existence of a fixed point of a map $\varPsi$. The construction of this map is divided into two standard problems which are considered in Section~\ref{Star-sec3}. The mapping $\varPsi$ must be weakly continuous. Roughly speaking, we have to show that not only a subsequence but the whole sequence converges weakly. In Section~\ref{Star-sec5}, we present one of possible uniqueness results. We managed to prove the uniqueness of the weak solution of problem \eqref{Star-1.1}--\eqref{Star-1.3} only for sufficiently small $T$. Even in the case where $\varphi$ is the Flory --- Huggins potential, a convex increasing function, and the solution of the problem is a non-negative bounded function, we are forced to impose a restriction on $T$. Generally speaking, this fact can be explained by physical reasons. Recall that the original problem describes the dynamics of a polymer chain and $T$ is its length. If the chain is too long, it can form knots that significantly affect the chaotic motion of the chain. Nevertheless, from a mathematical point of view, such a situation cannot be considered completely satisfactory. In forthcoming studies, we will try to get rid of the restriction on $T$ in proving the uniqueness of the solution. Notice that the Cauchy problem for the corresponding ordinary differential equation has a unique solution for all values of $T$. Since we intend to establish only a local in time uniqueness result, it makes no sense to prove it under the most general conditions on the data of the problem. We suppose that the initial value of the solution is a bounded function. This condition is natural for the problem of the polymer chain dynamics. Besides that, we impose an additional restriction on the potential $\varphi$. \section{Weak statement of the problem and main result}\label{Star-sec2} At first, we formulate conditions on the potential $\varphi$ which will be fulfilled throughout the paper. \begin{assumption}\label{Star-t2.1} The potential $\varphi:\mathbb{R}\to [0,+\infty)$ is a continuous non-negative function such that $\varphi(0)=0$ and $s\mapsto \varphi(s)s$ is a non-decreasing differentiable function whose derivative is bounded on every compact subset of $\mathbb{R}$. \end{assumption} This assumption admits functions $\varphi$ that are not convex and not increasing as its argument tends to $+\infty$. Besides that, we do not impose any restrictions on the growth of $\varphi$ at infinity. Figure~\ref{Star-pic} shows examples of possible functions $\varphi$. The functions in the figure are even but it is not necessary. \begin{figure}[h] \begin{center} \includegraphics[width=0.7\textwidth]{Star-pic.pdf} \caption{\small Examples of the potential: $\displaystyle\varphi(s)=\frac{2|s|+\sinh|s|}{\cosh|s|}$ and $\varphi(s)=2|s|+3\sin|s|$.} \label{Star-pic} \end{center} \end{figure} We will use the standard Lebesgue and Sobolev spaces $L^p(\varOmega)$, $H^1_0(\varOmega)$, $L^2(0,T;H^1_0(\varOmega))$ and $C(0,T; L^2(\varOmega))$ (see, e.g., \cite{Star-GGZ,Star-Br}). As usual, $H^{-1}(\varOmega)$ is the dual space of $H^1_0(\varOmega)$ with respect to the pivot space $L^2(\varOmega)$. The norm and the inner product in $L^2(\varOmega)$ will be denoted by $\|\cdot\|$ and $(\cdot,\cdot)$, respectively. \begin{definition}\label{Star-t2.2} Let $\varphi$ satisfies Assumption~\ref{Star-t2.1} and $u_0\in L^2(\varOmega)$. A function $u:\varOmega_T\to \mathbb{R}$ is said to be a weak solution of problem \eqref{Star-1.1}--\eqref{Star-1.3}, if \begin{enumerate} \item $u\in L^2(0,T;H^1_0(\varOmega))$ and $\varphi(v)\,u\in L^1(\varOmega_T)$, where $v=\int_0^T u\,dt$; \item the following integral identity $$ \int_0^T \int_\varOmega \big(u\,\partial_t h - \nabla u\cdot\nabla h - \varphi(v)\,u\, h\big)\,dxdt + \int_\varOmega u_0 h_0\, dx=0 $$ holds for an arbitrary smooth in the closure of $\varOmega_T$ function $h$ such that $h(x,t)=0$ for $x\in\partial\varOmega$ and for $t=T$. Here, $h_0=h|_{t=0}$. \end{enumerate} \end{definition} The main result of the paper is the following theorem. \begin{theorem}\label{Star-t2.3} If $u_0\in L^2(\varOmega)$, $T$ is an arbitrary positive number, and $\varphi$ satisfies Assumption~\ref{Star-t2.1}, then problem \eqref{Star-1.1} -- \eqref{Star-1.3} has a weak solution $u\in L^\infty(0,T;L^2(\varOmega))\cap L^2(0,T;H^1_0(\varOmega))$ such that $$ \varphi(v)\in L^2(\varOmega),\quad \varphi(v)\, v\in L^2(\varOmega), \quad \varphi(v)\, u^2 \in L^1(\varOmega_T), \quad u\in C(0,T;L^2(\varOmega)), $$ where $v=\int_0^T u\,dt$. \end{theorem} The proof of this result will be given in Sections~\ref{Star-sec3} and \ref{Star-sec4}. \section{Auxiliary results}\label{Star-sec3} In this section, we consider two intermediate problems. The first problem is elliptic and the second one is parabolic. \subsection{Elliptic problem}\label{Star-sec3.1} For every function $f:\varOmega\to \mathbb{R}$, define a function $v:\varOmega\to \mathbb{R}$ as a solution of the following problem: \begin{equation}\label{Star-3.1} -\Delta v + \varphi(v)\,v +f=0\quad\text{in}\quad\varOmega,\quad v|_{\partial\varOmega}=0. \end{equation} This problem is a result of the integration of equation \eqref{Star-1.1} with respect to $t$ from $0$ to $T$. The functions $v$ and $f$ correspond to $\int_0^T u(\cdot,t)\,dt$ and $u(\cdot,T)-u_0$, respectively. Problem \eqref{Star-3.1} was already considered even in a more general situation with a nonlinear elliptic operator instead of the Laplace operator (see \cite{Star-Gos,Star-Hess,Star-BrBr}). For every function $f\in H^{-1}\varOmega)$, the existence of the solution $v\in H^1_0(\varOmega)$ such that $\varphi(v)v$ and $\varphi(v)v^2$ are in $L^1(\varOmega)$ was proven. The techniques used were different. In \cite{Star-Gos}, the Orlicz spaces were employed under an additional assumption that the function $\varphi$ is even. In \cite{Star-Hess}, the problem was regularized by a problem of a higher order. The order of the approximate problem depended on the dimension $n$ and was such that its solution was a bounded function. So, there were no difficulties with the integrability of the term $\varphi(v)v$. Notice that this is the main difficulty of the problem. In \cite{Star-BrBr}, the function $\varphi(v)v$ was truncated by constants $\pm k$ and then $k$ tended to infinity. In our case, the function $f$ is not only in $H^{-1}\varOmega)$ but in $L^2(\Omega)$, therefore, we can expect more from the solution of the problem. We need in particular that $\varphi(v)\in L^2(\varOmega)$. For brevity, we introduce the following notation: $\eta(s)=\varphi(s)s$. A function $v\in H^1_0(\varOmega)$ is said to be a weak solution of problem \eqref{Star-3.1} if $\eta(v)\in L^1(\varOmega)$ and \begin{equation}\label{Star-3.2} (\nabla v,\nabla\psi)+(\eta(v),\psi)+(f,\psi)=0\quad\text{for all}\quad\psi\in H^1_0(\varOmega)\cap L^\infty(\varOmega). \end{equation} \begin{lemma}\label{Star-t3.1} Let Assumption~\ref{Star-t2.1} be satisfied. For every $f\in L^2(\varOmega)$, problem \eqref{Star-3.1} has a unique weak solution $v\in H^1_0(\varOmega)$ such that \begin{enumerate} \item $\|\nabla v\|\le d(\varOmega)\,\|f\|$, where $d(\varOmega)$ is the diameter of the domain $\varOmega$; \item $\|\varphi(v)\,v\|\le \|f\|$; \item $\|\varphi(v)\|\le C$, where the constant $C$ depends on $\|f\|$ and $\varOmega$. \end{enumerate} \end{lemma} \begin{proof} As noted above, the weak solvability of problem \eqref{Star-3.1} is already known (see, e.g., \cite{Star-Gos,Star-Hess,Star-BrBr}). We present here a simple proof of this fact that based on the Galerkin method. Let $\{\psi_k\}$ be the orthonormal basis in $L^2(\varOmega)$ that consists of the eigenfunctions of the Laplace operator $(-\Delta)$ with the homogeneous boundary condition. If we define the inner product in $H^1_0(\varOmega)$ as $(w_1,w_2)_{H^1_0(\varOmega)}=(\nabla w_1,\nabla w_2)$ for $w_1,w_2\in H^1_0(\varOmega)$, then the set $\{\psi_k\}$ is an orthogonal basis in this space. It is well known that $\psi_k\in L^\infty(\varOmega)$ for every $k\in \mathbb{N}$ (see, e.g., \cite[Sec.~9.8]{Star-Br}). Let $H_k$ be the subspace of $L^2(\varOmega)$ spanned by the basis functions $\{\psi_1,\ldots,\psi_k\}$. For every $k\in \mathbb{N}$, denote by $v_k$ a function from $H_k$ such that \begin{equation}\label{Star-3.3} (\nabla v_k,\nabla\psi)+(\eta(v_k),\psi)+(f,\psi)=0\quad\text{for all}\quad\psi\in H_k. \end{equation} By employing the Brouwer fixed point theorem, it is not difficult to prove the existence of $v_k$. Notice that the function $\eta(v_k)$ is bounded and $(\eta(v_k),\psi)$ is well defined. If we take $\psi=v_k$, then we easily find that \begin{equation}\label{Star-3.4} \|\nabla v_k\|^2 +\int_\varOmega \varphi(v_k)v_k^2\,dx\le \|f\|\,\|v_k\|,\quad k\in \mathbb{N}. \end{equation} The positiveness of $\varphi$ and the Poincar\'{e} inequality imply that \begin{equation}\label{Star-3.5} \|\nabla v_k\|\le d(\varOmega)\,\|f\|,\quad k\in \mathbb{N}, \end{equation} where $d(\varOmega)$ is the diameter of the domain $\varOmega$. Therefore, the sequence $\{v_k\}$ has a subsequence which converges weakly in $H^1_0(\varOmega)$ and almost everywhere in $\varOmega$ to a function $v$. We denote this subsequence again by $\{v_k\}$. Due to the continuity of the function $\eta$, we obtain that \begin{equation}\label{Star-3.6} \eta(v_k)\to\eta(v)\quad\text{almost everywhere in $\varOmega$.} \end{equation} Let us prove that the functions $\eta(v_k)$ are uniformly integrable. Estimates \eqref{Star-3.4} and \eqref{Star-3.5} imply that $\int_\varOmega \eta(v_k)\, v_k\, dx \le C_0$, where the constant $C_0$ is independent of $k$ and depends only on $\|f\|$. For every measurable set $A\subset\varOmega$ and every positive number $M$, we introduce the set $A_M^k=\{x\in A\,|\, |v_k(x)|\ge M\}$. Then $$ \int_{A_M^k}|\eta(v_k)|\,dx \le \frac{1}{M}\int_{\varOmega}\eta(v_k)\, v_k\, dx\le \frac{C_0}{M}. $$ Since the function $\eta$ is continuous, there exists a constant $\gamma(M)$ such that $|\eta(s)|\le \gamma(M)$ for $s\in[-M,M]$. In fact, as $\eta$ is non-decreasing, $\gamma(M)=\max \{-\eta(-M),\eta(M)\}$. Thus, $$ \int_{A\setminus A_M^k} |\eta(v_k)|\,dx \le \gamma(M)\,\mu(A), $$ where $\mu(A)$ is the Lebesgue measure of the set $A$. These inequalities imply that $$ \int_A|\eta(v_k)|\,dx\le \frac{C_0}{M} + \gamma(M)\,\mu(A). $$ For arbitrary $\varepsilon >0$, we take $M=2C_0/\varepsilon$ and $\delta=\varepsilon/(2\gamma(M))$. Then we find that $\int_A|\eta(v_k)|\,dx< \varepsilon$ for an arbitrary measurable set $A\subset\varOmega$ such that $\mu(A)<\delta$. Thus, the uniform integrability of $\eta(v_k)$ is proven. This fact together with \eqref{Star-3.6} and the Vitali convergence theorem (see, e.g., \cite[Sec.~4.8.7]{Star-MP}) enable us to conclude that $\eta(v)\in L^1(\varOmega)$ and $\eta(v_k)\to \eta(v)$ in $L^1(\varOmega)$ as $k\to\infty$. Now we are able to pass to the limit in \eqref{Star-3.3} as $k\to\infty$. As a result, we find that $v$ satisfies \eqref{Star-3.2}, which means that $v$ is a weak solution of problem~\eqref{Star-3.1}. This solution is unique since the function $\eta$ is non-decreasing. Let us prove the estimates for $v$ stated in the lemma. The first estimate is a direct consequence of \eqref{Star-3.5}. In order to prove the second one, we introduce the truncated function for every $m\in \mathbb{N}$: $$ v_m(x)=\begin{cases} m, & v(x)\ge m, \\ v(x), & -m< v(x)< m, \\ -m, & v(x)\le -m. \end{cases} $$ Let us take $\psi=\eta(v_m)$ in \eqref{Star-3.2}. Since $\eta(v)\eta(v_m)\ge \eta^2(v_m)$, we easily find that $$ \int_\varOmega \eta'(v_m)\,|\nabla v_m|^2\,dx +\|\eta(v_m)\|^2 \le \|f\| \|\eta(v_m)\|. $$ The sequence $\{\eta^2(v_m)\}$ converges to $\eta^2(v)$ almost everywhere in $\varOmega$, therefore, the second estimate of the lemma follows from the Fatou lemma. Finally, let us prove the third estimate. If $A_1=\{x\in\varOmega\;|\; |v(x)|\ge 1\}$, then $$ \int_{A_1} \varphi^2(v)\,dx \le \int_\varOmega \varphi^2(v)\,v^2\,dx\le \|f\|^2. $$ Since the function $\varphi$ is continuous, there exists a constant $\gamma$ such that $\varphi^2(s)\le \gamma$ for $s\in[-1,1]$. Thus, $$ \int_{\varOmega\setminus A_1} \varphi^2(v)\,dx \le \gamma\,\mu(\varOmega). $$ These inequalities imply the required estimate with $C^2=\|f\|^2 + \gamma\,\mu(\varOmega)$. \end{proof} Denote by $V$ the mapping from $L^2(\varOmega)$ into $H^1_0(\varOmega)$ such that $v=V(f)$ is the unique weak solution of problem \eqref{Star-3.1}. \begin{lemma}\label{Star-t3.2} Let $\{f_k\}$ be a sequence in $L^2(\varOmega)$ that converges to $f$ weakly in this space. If $v_k=V(f_k)$ and $v=V(f)$, then \begin{enumerate} \item $v_k\to v$ in $H^1_0(\varOmega)$ as $k\to\infty$; \item $\varphi(v_k)\to \varphi(v)$ weakly in $L^2(\varOmega)$ as $k\to\infty$. \end{enumerate} \end{lemma} \begin{proof} It is not difficult to see that $v_k-v$ is the weak solution of the following problem: $$ -\Delta(v_k- v) + \varphi(v_k)\,v_k -\varphi(v)\,v +f_k-f=0\quad\text{in}\quad\varOmega,\quad (v_k-v)|_{\partial\varOmega}=0. $$ Since the function $s\mapsto\eta(s)=\varphi(s)s$ is non-decreasing, we obtain that $$ \int_\varOmega |\nabla (v_k-v)|^2\,dx \le \Big|\int_\varOmega (f_k-f)(v_k-v)\,dx\Big| \le \|f_k-f\|_{H^{-1}(\varOmega)}\|v_k-v\|_{H^1_0(\varOmega)}. $$ The first assertion of the lemma follows from the fact that $\|f_k-f\|_{H^{-1}(\varOmega)}\to 0$ as $k\to\infty$. Since $v_k\to v$ in $H^1_0(\varOmega)$ as $k\to\infty$, the sequence $\{v_k\}$ converges to $v$ in measure and, as $\varphi$ is a continuous function, the sequence $\{\varphi(v_k)\}$ converges in measure to $\varphi(v)$. Lemma~\ref{Star-t3.1} states that the sequence $\{\varphi(v_k)\}$ is bounded in $L^2(\varOmega)$, therefore, due to the Vitali convergence theorem (see, e.g., \cite[Sec.~4.8.7]{Star-MP}), $\varphi(v_k)\to \varphi(v)$ in $L^p(\varOmega)$ as $k\to\infty$ for $p\in [1,2)$. Consequently, $$ \int_\varOmega \big(\varphi(v_k)-\varphi(v)\big)\, h\, dx \to 0\quad\text{as}\quad k\to\infty $$ for every $h\in L^\infty(\varOmega)$. The density of $L^\infty(\varOmega)$ in $L^2(\varOmega)$ implies the second assertion of the lemma. \end{proof} The advantage of the lemma just proven is that we have established the convergence results not for a subsequence but for the entire sequence $\{V(f_k)\}$. These results will be used for the proof of the weak continuity of the mapping $\varPsi$ in the Tikhonov theorem. \subsection{Parabolic problem}\label{Star-sec3.2} We consider the following parabolic problem: \begin{equation}\label{Star-3.7} \partial_t u -\Delta u +\zeta u=0\quad\text{in}\quad\varOmega_T,\quad u|_{\partial\varOmega}=0,\quad u|_{t=0}=u_0, \end{equation} where $\zeta:\varOmega\to \mathbb{R}$ is an independent of $t$ non-negative function. We suppose that $\zeta\in L^2(\varOmega)$ and $u_0\in L^2(\varOmega)$. This problem is standard and we omit the proof of its unique weak solvability as well as various justifications (see, e.g., \cite{Star-GGZ}). A little trouble is that the function $\zeta$ is in $L^2(\varOmega)$ only, which can be easily overcome if we consider the solution in $L^2\big(0,T;H_0^1(\varOmega)\cap L^2(\varOmega,\zeta)\big)$, where $L^2(\varOmega,\zeta)$ is the Hilbert space with the norm $\|u\|_{\zeta}^2=\int_\varOmega \zeta u^2\,dx$. The weak solution of problem \eqref{Star-3.3} satisfies the energy estimate: \begin{equation}\label{Star-3.8} \frac{1}{2}\, \|u(\cdot,s)\|^2 +\int_0^s \|\nabla u\|^2\,dxdt + \int_0^s \int_\varOmega \zeta\, u^2\,dxdt \le\frac{1}{2}\, \|u_0\|^2 \end{equation} for almost all $s\in[0,T]$. Besides that, $\partial_t u$ belongs to the space $L^2\big(0,T;(H_0^1(\varOmega)\cap L^2(\varOmega,\zeta))^*\big)$, where $(H_0^1(\varOmega)\cap L^2(\varOmega,\zeta))^*$ is the conjugate space to $H_0^1(\varOmega)\cap L^2(\varOmega,\zeta)$. As a consequence of this fact, we find that $u\in C(0,T;L^2(\varOmega))$. Thus, the function $u_T=u|_{t=T}$ is well defined as an element of $L^2(\varOmega)$ and \eqref{Star-3.8} holds for all $s\in [0,T]$. For every non-negative function $\zeta\in L^2(\varOmega)$, we denote by $U(\zeta)$ the unique weak solution of problem \eqref{Star-3.7} and by $U_T(\zeta)$ the function $U(\zeta)|_{t=T}$. Our goal is to investigate the dependence of $U$ and $U_T$ on $\zeta$. \begin{lemma}\label{Star-t3.3} Let $u_0\in L^2(\varOmega)$ and a sequence of non-negative functions $\{\zeta_k\}$ converges weakly in $L^2(\varOmega)$ to a function $\zeta$. Then $U_T(\zeta_k)\to U_T(\zeta)$ weakly in $L^2(\varOmega)$ as $k\to\infty$. \end{lemma} \begin{proof} Notice that the lemma asserts the convergence of the entire sequence $\{U_T(\zeta_k)\}$ . For brevity, we denote by $u_k$ and $u$ the functions $U(\zeta_k)$ and $U(\zeta)$, respectively. Let $h:\varOmega_T\to \mathbb{R}$ be an arbitrary smooth function such that $h|_{\partial\varOmega}=0$. As it follows from \eqref{Star-3.8}, $$ \int_0^T\int_\varOmega |\nabla u_k|^2\,dxdt\le \frac{1}{2}\, \|u_0\|^2,\quad k\in \mathbb{N}. $$ This estimate implies that $$ \big\|\nabla\int_0^T u_k h\,dt\big\|\le C,\quad k\in \mathbb{N}, $$ where the constant $C$ depends, of course, on $h$. Therefore, the sequence $\{u_k\}$ has a subsequence $\{u_{k'}\}$ such that \begin{align*} & u_{k'}\to w\quad \text{weakly in}\quad L^2\big(0,T;H_0^1(\varOmega)), \\ & \int_0^T u_{k'} h\,dt\to \int_0^T w h\,dt\quad\text{in}\quad L^2(\varOmega) \end{align*} as $k'\to\infty$, where $w$ is some function. As a consequence of the second relation, we have that $$ \int_0^T\int_\varOmega \zeta_{k'} u_{k'} h\,dxdt \to \int_0^T\int_\varOmega \zeta w h\,dxdt \quad\text{as}\quad k'\to\infty. $$ Here, we have used the fact that the functions $\zeta_k$ do not depend on $t$. The passage to the limit as $k'\to\infty$ in the weak formulation of \eqref{Star-3.3} and the uniqueness of the solution of this problem imply that $w=U(\zeta)$. Besides that, equation \eqref{Star-3.7} implies that \begin{multline*} \int_\varOmega \big(U_T(\zeta_{k'})-U_T(\zeta)\big)\, h(\cdot,T)\, dx \\ =-\int_0^T\int_\varOmega \big(\nabla (u_{k'}-u)\cdot\nabla h + (\zeta_{k'}u_{k'}-\zeta u)\,h\big)\,dxdt \to 0\quad\text{as}\quad k'\to\infty. \end{multline*} Since the set of smooth functions is dense in $L^2(\varOmega)$, we conclude that $U_T(\zeta_{k'})\to U_T(\zeta)$ weakly in $L^2(\varOmega)$ as $k'\to\infty$. Thus, we have proven that every subsequence of the sequence $\{U_T(\zeta_k)\}$ has a subsequence that converges weakly to $U_T(\zeta)$ in $L^2(\varOmega)$. The uniqueness of the limit yields the assertion of the lemma. \end{proof} \section{Weak solvability of the problem}\label{Star-sec4} In order to prove the weak solvability of problem \eqref{Star-1.1}--\eqref{Star-1.3} stated in Theorem~\ref{Star-t2.3}, we employ the Tikhonov fixed-point theorem which states that, for a reflexive separable Banach space $X$ and a closed convex bounded set $E\subset X$, if a mapping $\varPsi:E\to E$ is weakly sequentially continuous, then $\varPsi$ has at least one fixed point in $E$. We take $X=L^2(\varOmega)$, $E=\{w\in L^2(\varOmega)\,|\; \|w\|\le \|u_0\|\}$ and define the mapping $\varPsi$ as follows: for every $w\in E$, $\varPsi (w)= U_T(\varphi(v))$, where $v=V(w-u_0)$. The operators $V$ and $U_T$ were introduced in the previous section. If $u$ is the weak solution of the original problem, then $\int_0^T u\, dt= V(u_T-u_0)$ and $$ u_T=U_T\Big(\varphi\big(\int_0^T u\, dt\big)\Big)=\varPsi(u_T). $$ Thus, the fixed point of the mapping $\varPsi$ is a function that corresponds to $u_T$. If we know $u_T$, we define the function $v=V(u_T-u_0)$ and finally find the weak solution of the original problem $u=U(\varphi(v))$. As it follows from the properties of the operators $V$ and $U$, the mapping $\varPsi$ is well defined on $L^2(\varOmega)$. Besides that, for every non-negative function $\zeta\in L^2(\varOmega)$, the function $U(\zeta)$ satisfies \eqref{Star-3.8} which implies that $\|U_T(\zeta)\|\le \|u_0\|$. Thus, $\varPsi(E)\subset E$. It remains to prove the weak sequential continuity of $\varPsi$. Let $\{w_k\}$ be an arbitrary sequence in $E$ that converges to $w\in E$ weakly in $L^2(\varOmega)$. We need to prove that $\varPsi(w_k)\to \varPsi(w)$ weakly in $L^2(\varOmega)$ as $k\to\infty$. It is a simple consequence of the results obtained in Section~\ref{Star-sec3}. Due to Lemma~\ref{Star-t3.2}, $\varphi(v_k)\to\varphi(v)$ weakly in $L^2(\varOmega)$ as $k\to\infty$, where $v_k=V(w_k-u_0)$ and $v=V(w-u_0)$. In turn, Lemma~\ref{Star-t3.3} implies that $\varPsi (w_k)= U_T(\varphi(v_k))\to U_T(\varphi(v))=\varPsi (w)$ weakly in $L^2(\varOmega)$ as $k\to\infty$. Thus, the weak solvability of problem \eqref{Star-1.1}--\eqref{Star-1.3} is proven. \section{Uniqueness of the solution}\label{Star-sec5} In this section, we prove the following uniqueness theorem. \begin{theorem}\label{Star-t5.1} Let Assumption~\ref{Star-t2.1} be satisfied. Assume that there exist constants $K$ and $M$ such that $|u_0|\le K$ almost everywhere in $\varOmega$ and $|\varphi'(s)|\le M$ for $s\in [-KT,KT]$. If $MKT^2<2$, then the weak solution of problem \eqref{Star-1.1}--\eqref{Star-1.3} is unique. \end{theorem} \begin{proof} Suppose that this problem has two weak solutions $u_1$ and $u_2$. Denote by $u$ its difference $u_1-u_2$. Then $$ \partial_t u -\Delta u + \varphi (v_1)\, u_1 - \varphi(v_2)\,u_2=0, \quad u|_{\partial\varOmega}=u|_{t=0}=0, $$ where $v_i(x)=\int_0^T u_i(x,t)\,dt$, $i=1,2$. Since equation~\eqref{Star-1.1} admits the maximum principle, $|u_1|\le K$ and $|u_2|\le K$ almost everywhere in $\varOmega_T$ and $\big|\int_0^T u_i\,dt\big|\le KT$, $i=1,2$, almost everywhere in $\varOmega$. Therefore, the equation for $u$ holds in $L^2(0,T; H^{-1}(\varOmega))$. The multiplication of this equation by $u$ and the integration over $\varOmega$ lead to the following equality: $$ \frac{1}{2}\,\frac{d}{dt}\|u\|^2+\|\nabla u\|^2+\int_\varOmega \varphi(v_1)\, u^2\,dx +\int_\varOmega \big(\varphi(v_1)-\varphi(v_2)\big)\,u_2\, u\,dx =0 $$ which implies that $$ \frac{1}{2}\,\|u(\cdot,t)\|^2+\int_0^t\|\nabla u(\cdot,s)\|^2ds\le MK\int_0^t\int_\varOmega |v(x)|\,|u(x,s)|\,dxds $$ for all $t\in[0,T]$, where $v=v_1-v_2$. Since \begin{multline*} \int_0^t\int_\varOmega |v(x)|\,|u(x,s)|\,dxds=\int_\varOmega |v(x)|\,\int_0^t|u(x,s)|\,ds dx \\ \le \|v\|\,\int_0^t\|u(\cdot,s)\|\,ds\le \int_0^T\|u(\cdot,s)\|\,ds\,\int_0^t\|u(\cdot,s)\|\,ds, \end{multline*} we obtain the following inequality: \begin{equation}\label{Star-5.1} \|u(\cdot,t)\|^2\le 2MK\int_0^T\|u(\cdot,s)\|\,ds\,\int_0^t\|u(\cdot,s)\|\,ds \end{equation} which holds for all $t\in[0,T]$. If $MKT^2<2$, this inequality implies that $u=0$. Really, let us denote: $\xi(t)=\int_0^t\|u(\cdot,s)\|\,ds$. Then \eqref{Star-5.1} can be rewritten as follows: $$ (\xi'(t))^2\le 2MK\xi(T)\, \xi(t),\quad t\in (0,T]. $$ This inequality yields that $\xi(t)\le t^2MK\xi(T)/2$ for all $t\in [0,T]$ and, in particular, $\xi(T)\le T^2MK\xi(T)/2$. If $T^2MK<2$, then the only solution of this inequality is $\xi(T)=0$ which implies that $u=0$. \end{proof}
\section{Introduction} The distance of an error-correcting code is of central importance in coding theory, because it quantifies the number of adversarial errors that can be corrected. For codes of fixed length and rate, upper and lower bounds on their distance can be determined. The best lower bounds can be obtained from various randomized code constructions that yield the Gilbert-Varshamov bound~\cite{MS77} and this is also true in the quantum case~\cite{FeM04,JiX11,ouyang2014concatenated}). On the contrary, markedly different techniques are used to derive upper bounds. In classical coding theory, weight enumerators count the weight distribution of codewords in a code~\cite{MS77}. The MacWilliams identity establishes a linear relationship between the weight enumerators of a code and that of its dual code. This allows one to obtain upper bounds on the distance of codes. Further extensions of this technique leads to the celebrated linear programming bounds \cite{Aal90} and their generalizations \cite{schrijver2005new}. The notion of weight enumerators in the quantum setting is less obvious, because quantum codes on $n$ qubits are subspaces of $\mathbb C^{2^n}$, and these subspaces do not in general admit a combinatorial interpretation. Shor and Laflamme nonetheless introduced a meaningful definition for weight enumerators for quantum codes \cite{ShL97} in terms of the codes' projectors $P$ and a nice error basis for matrices. In particular, the Shor-Laflamme (SL) quantum weight enumerators are sums of terms of the form $|\text{tr}(EP)|^2$ and $\text{tr}(E P E^\dagger P)$, respectively, where the sums are performed over all Paulis $E$ of a given weight. We will call the vector of these enumerators labeled by Pauli weights the A-type and B-type quantum weight enumerators, respectively. Shor and Laflamme showed that the A- and B-type quantum weight enumerators are still linearly related in a way reminiscent of the classical relationship~\cite{SL97}. The relation between the two enumerators is the quantum analogue of the famous MacWilliams identity. Variations on the SL enumerators were then studied by Rains, which allowed better bounds on the parameters of quantum codes~\cite{Rains98a}. Because of the existence of a linear relationship between the two types of enumerators, linear programming techniques can be applied to establish upper bounds on the minimum distance for (small) quantum stabilizer codes~\cite{CRSS98}. Algebraic linear programming bounds based on the MacWilliams identity, such as the Singleton, Hamming, and the first linear programming bounds, are also derived for general quantum codes~\cite{AL99}. These results have been extended to entanglement-assisted quantum stabilizer codes~\cite{LBW13,LA18} and quantum data-syndrome codes~\cite{ALB20}. Also there is a MacWilliams identity for (entanglement-assisted) quantum convolutional codes~\cite{LHL16}. Although the distance of a quantum code is a meaningful metric with respect to adversarial noise, estimates on the performance of a quantum code derived from the distance under specific noise models are often overly pessimistic. For instance, while a minimum of five qubits is needed to perfectly correct an arbitrary error~\cite{ShL97}, four qubits suffice to correct a single \textit{amplitude damping} (AD) error~\cite{LNCY97}. Quantum codes designed specifically to combat AD errors are called \textit{AD codes} and are well-studied~\cite{LNCY97,CLY97,SSSZ09, DGJZ10,jackson2016concatenated,ouyang2014permutation,ouyang2015permutation,grassl2018quantum,ouyang2019permutation}. However, existing quantum weight enumerators give no direct result regarding limits on the ultimate performance of AD codes. To better understand these fundamental limits, it would be advantageous to have MacWilliams-type identities for different quantum weight enumerators defined for various noisy quantum channels. In spite of this, finding suitable generalizations of the quantum weight enumerators to specialized noise models remains an open problem. There are several challenges in generalizing linear programming bounds for quantum codes to allow the consideration of AD errors. First, quantum weight enumerators only describe quantum error correction in the perfect setting~\cite{Rains98a}, and therefore cannot describe quantum codes designed for the AD channel that often approximately satisfy the Knill-Laflamme perfect quantum error correction conditions~\cite{KnL97}. Second, while the Pauli errors used to express quantum weight enumerators form a nice error basis, the Kraus operators of an AD channel do not span the matrix space on all of the qubits. In this work, we overcome the above challenges, and extend the theory of quantum weight enumerators to deal with approximate quantum error-correcting (AQEC) codes and AD errors. Namely, we generalize the two SL quantum weight enumerators to address quantum codes that approximately correct AD errors. While we do not have a MacWilliams identity that establishes a direct linear relationship between these two generalized quantum weight enumerators, we do establish an indirect linear relationship between them. To enable this, we introduce an \textit{auxiliary exact weight enumerator} with respect to Pauli operators, which is exact in the sense that it depends explicitly on the matrix decomposition of the code projector $P$ in the Pauli basis. We thereby show linear connections between this enumerator and our two generalized quantum weight enumerators. This allows us to establish a linear program that is infeasible only when AQEC AD codes do not exist. To illustrate our linear program, we numerically rule out the existence of three-qubit AQEC AD codes that are capable of correcting an arbitrary AD error. Our linear program cannot eliminate the existence of a four-qubit code that can correct one AD error and this agrees to the four-qubit AD code proposed in~\cite{LNCY97}. This paper is organized as follows. In the next section, we review notation for Pauli operators, amplitude damping channels, and review quantum weight enumerators. In Sec.~\ref{sec:AD-wtenum}, we introduce our quantum weight enumerators specialized to deal with AD errors and approximate quantum error correction. In Sec.~\ref{sec:aux}, we introduce auxiliary weight enumerators, and in Sec.~\ref{sec:connection-matrices}, we propose connection matrices that establish linear relationships between our quantum weight enumerators and the auxiliary weight enumerators. In Sec.~\ref{sec:linear program bounds}, we formulate a linear program that is infeasible only when the corresponding AD-code does not exist. We conclude our results and discuss the potential for further work in Sec.~\ref{sec:discussions}, \section{Preliminaries} \label{sec:prelims} \subsection{Pauli Operators} A single-qubit state space is a two-dimensional complex Hilbert space $\mathbb{C}^2$, and a multiple-qubit state space is simply the tensor product space of single-qubit spaces. The Pauli matrices $$I_2=\begin{bmatrix}1 &0\\0&1\end{bmatrix}, X=\begin{bmatrix}0 &1\\1&0\end{bmatrix}, Z=\begin{bmatrix}1 &0\\0&-1\end{bmatrix}, Y=iXZ$$ form a basis of the linear operators on a single-qubit state space. Let \[{\cG}_n=\{M_1\otimes M_2\otimes \cdots \otimes M_n: M_j\in\{I_2,X,Y,Z\} \},\] which is a basis of the linear operators on the $n$-qubit state space $\mathbb{C}^{2^n}$. We denote the weight of any element of $\cG_n$ as $\wt{E}$, which is the number of $M_j$'s that are non-identity matrices. \subsection{Amplitude Damping Channel} Amplitude damping (AD) errors model energy relaxation in quantum harmonic oscillator systems and photon loss in photonic systems. By ensuring that each quantum harmonic oscillator couples identically to a unique bosonic bath, in the low temperature limit, the effective noise model can be described by an AD channel. When quantum information lies in a qubit, the corresponding AD channel $\cN_\gamma$ models energy loss in a two-level system, where $\gamma$ is the probability that an excited state relaxes to the ground state, and $\cN_\gamma$ has two Kraus operators $A_0$ and $A_1$, where \[ A_0=\begin{bmatrix}1&0\\0&\sqrt{1-\gamma}\end{bmatrix}, \quad A_1=\begin{bmatrix}0&\sqrt{\gamma}\\ 0&0\end{bmatrix}. \] When energy loss occurs independently and identically in an $n$-qubit system, the corresponding noisy channel can be modeled with $\cN_{n,\gamma}=\cN_{\gamma}^{\otimes n}$. The set of all Kraus operators of $\cN_{n,\gamma}$ can be written as \begin{align} \mathcal K = \{A_{{\bf x}} \newcommand{\X}{{\bf X}}\triangleq A_{x_1}\otimes \cdots \otimes A_{x_n}: {\bf x}} \newcommand{\X}{{\bf X}\in \{0,1\}^n\}. \end{align} Since the Kraus operator $A_1$ models energy loss on one qubit, it is useful to know how many times the Kraus operator $A_1$ occurs in $A_{\bf x}} \newcommand{\X}{{\bf X}$. Hence we define the following property of $A_{\bf x}} \newcommand{\X}{{\bf X}$. {\bf d}}\newcommand{\bD}{{\bf D} The weight of $A_{{\bf x}} \newcommand{\X}{{\bf X}}$ is defined as $\wt{{\bf x}} \newcommand{\X}{{\bf X}}$. \end{definition} The weight of $A_{\bf x}} \newcommand{\X}{{\bf X}$ counts the number of qubits where $A_{\bf x}} \newcommand{\X}{{\bf X}$ induces energy loss. For example, $\wt{A_1\otimes A_0\otimes A_1}=\wt{A_{101}}= 2$, which corresponds to energy loss in two qubits. Using this notion of weight, we partition the set of Kraus operators $\cK$ accordingly. Namely, by denoting \begin{align} \cK_i = \{ E \in \cK : \wt{E} = i\}, \end{align} we have $\cK = \cK_0 \cup \dots \cup \cK_n$. In this terminology, a code corrects $t$ errors perfectly if all the errors in $\cK_i$ for $i \le t$ satisfy the Knill-Laflamme quantum error correction criterion \cite{KnL97}. \subsection{Quantum Codes and Weight Enumerators} An $((n,M))$ quantum code $\cQ$ is an $M$-dimensional subspace of $\mC^{2^n}$. Let $P$ denote the codespace projector of $\cQ$. Shor and Laflamme define two weight enumerators $\{A^{\texttt{SL}}_{i}\}$ and $\{B^{\texttt{SL}}_{i}\}$ of $\cQ$ by \begin{align} A^{\texttt{SL}}_{i}=&\frac{1}{M^2}\sum_{ E\in {\cG}_n, \wt{E}=i } \Tr{E P}\Tr{E^\dag P}, \label{eq:Bij} \end{align} and \begin{align} B^{\texttt{SL}}_{i}=&\frac{1}{M}\sum_{ E\in {\cG}_n, \wt{E}=i} \Tr{E PE^\dag P}, \label{eq:Bij_perp} \end{align} for $i=0,\dots,n$ \cite{SL97}. Note that ${\cG}_n$ is a basis for the linear operators on $\mathbb{C}^{2^n}$. These two weight enumerators will be called \emph{SL enumerators} in this article. The power of the SL enumerators is that the perfect quantum error correction criterion of Knill and Laflamme are equivalent to certain linear constraints on these SL enumerators. From this context, perturbations to the Knill-Laflamme quantum error correction criterion can be understood by directly perturbing linear constraints on quantum weight enumerators. \section{Quantum weight enumerators for amplitude damping errors} \label{sec:AD-wtenum} In what follows, we generalize the SL enumerators to allow direct consideration of AD errors. The above-mentioned key technical difficulty is inability of the corresponding set of Kraus operators $\cal K$ to span the space of linear operators on $\mathbb{C}^{2^n}$. We nonetheless can generalize SL enumerators to deal with AD channels. Our new enumerators are vectors with coefficients \begin{align} A_i &= \frac{1}{(\text{tr} P)^2} \sum_{E \in \cK_i} \text{tr}(EP)\text{tr}(E^\dagger P),\ i=0,\dots,n, \\ B_i &= \frac{1}{\text{tr} P} \sum_{E \in \cK_i} \text{tr}(EPE^\dagger P) , \ i=0,\dots,n. \end{align} It can be shown, as in \cite{AL99} that \begin{align} B_i\geq A_i, \ i=0,\dots,n. \label{eq:BgeqA} \end{align} Furthermore, since the code projector $P$ is Hermitian and we have the cyclic property of the trace, it is clear that $\text{tr}(EP)\text{tr}(E^\dagger P) = \text{tr}(EP)\text{tr}(P^\dagger E^\dagger) = |\text{tr}(EP)|^2$. This implies that $A_i$ is always a sum of non-negative terms, and hence we must have \begin{align} A_i \ge 0 , \quad 0 \le i \le n. \end{align} Now the sum of B type enumerators retains interpretation as the fidelity of a quantum code after the action of the AD channel without error correction. Hence \begin{align} B_0 + \cdots + B_n \le 1. \end{align} Since the only Kraus operator in $\cK_0$ has a minimum singular value of $(1-\gamma)^{n/2}$ for $A_0$, we have the lower bound \begin{align} A_0 \ge (1-\gamma)^n. \end{align} This is reminiscent of the scenario for SL weight enumerators, where we have $A^{\texttt{SL}}_0=1.$ Furthermore, it is easy to see that every $B_i$ is at most of order $O(\gamma^i)$, Since the operator norm of Kraus operators from $\cK_i$ is $\gamma^{i/2}$, the operator norm of $EPE^\dagger$ for any $E \in \cK_i$ is at most $\gamma^i \text{tr}(P)$. Hence it follows from the H\"older inequality on the Hilbert-Schmidt inner product that \[|\text{tr}(EPE^\dagger P )|= |\<EPE^\dagger ,P \>|\le \|EPE^\dagger \|\|P\|_1,\] where $\|\cdot \|_1$ denotes the trace norm and $\|\cdot \|$ denotes the operator norm, which is the maximum singular value of a matrix. Thus by counting the number of terms in $\cK_i$, we have \begin{align} B_i/\gamma^{i} \le \binom n i. \end{align} In what follows, we use the Dirac ket notation to represent weight enumerators as in \cite{LHL16}. Let $\{|0\>,\dots, |n\>\}$ be an orthonormal basis of $\mathbb{R}^{n+1}$. The SL enumerators of $\cQ$ for AD channels are \begin{align} |A \> &= A_0 |0\> + \dots + A_{n} |n\>, \notag \\ |B \> &= B_0 |0\> + \dots + B_{n} |n\> . \end{align} In this paper, we define approximate quantum error correction using the language of quantum weight enumerators. In the case of perfect quantum error correction, for a quantum code that has minimum distance $d$, we must have \[ B^{\texttt{SL}}_i - A^{\texttt{SL}}_i = 0 , \quad i = 0, \dots, d-1. \] These equations can be relaxed to yield the following definition of approximate quantum error correction for AD channels. {\bf d}}\newcommand{\bD}{{\bf D} \label{def:tc-AD-code} An $((n,M))$ quantum code is called a $(t,c)$-AD code if its quantum weight enumerators satisfy the constraints \begin{align} B_i-A_i\leq c \gamma^{t+1}, i=0,\dots,t. \label{eq:BleqA} \end{align} \end{definition} \begin{example} The four-qubit code in~\cite{LNCY97} has two logical codewords \begin{align*} \ket{0}_L=& \frac{1}{\sqrt{2}}\left(\ket{0000}+\ket{1111}\right),\\ \ket{1}_L=& \frac{1}{\sqrt{2}}\left(\ket{0011}+\ket{1100}\right). \end{align*} It has weight enumerators \begin{align*} A_0&=\gamma^4/64 - \gamma^3/4 + 5 \gamma^2/4 - 2 \gamma + 1;\\ A_1&=A_2=A_3=0;\\ A_4&=\gamma^4/64. \end{align*} \begin{align*} B_0&=\gamma^4/16 - \gamma^3/4 + 5 \gamma^2/4 - 2 \gamma + 1;\\ B_2&=3 \gamma^4/8 - 3 \gamma^3/4 + 3 \gamma^2/4;\\ B_4&=\gamma^4/16;\\ B_1&=B_3=0. \end{align*} Therefore, this code cannot be a $(2,c)$-AD code for any $c>0$, and is consistent with the fact that this code corrects a single AD error \cite{LNCY97}. \end{example} \begin{example} The weight enumerators of the nine-qubit Shor code are as follows. Note that (\ref{eq:BgeqA}) holds here. In addition, by Definition~\ref{def:tc-AD-code}, this code cannot correct AD errors of weight three. \begin{align*} A_0=B_0 &= 1 - 9\gamma/2 + 153\gamma^2/16 \\ &\quad - 399\gamma^3/32 + 351\gamma^4/32 + O(\gamma^5); \\ A_i = B_i &=0, \quad i=1,2,4,5,7,8;\\ A_3 = A_9 &=0;\\ B_3 & = 3\gamma^3/4 + O(\gamma^4);\\ B_9 & = \gamma^9/32;\\ A_6 & = 3\gamma^6/16 + - 9\gamma^7/32 + 45\gamma^8/256 + O(\gamma^9);\\ B_6 & = 3\gamma^6/16 - 9\gamma^7/32 + 9\gamma^8/32 + O(\gamma^9). \end{align*} Since the leading order of $B_3-A_3$ in $\gamma$ is cubic, the Shor code cannot be a $(3,c)$-AD code for any $c>0$. Hence, this is consistent with the fact that the Shor code corrects two AD errors~\cite{gottesman-thesis}. \end{example} \section{Auxiliary weight enumerators} \label{sec:aux} Without the existence of a MacWilliams identity, we can nonetheless establish a linear relationship between $|A \>$ and $|B \>$ by introducing additional vectors that reside on an auxiliary space. We call these vectors \textit{auxiliary exact weight enumerators} or \textit{ auxiliary weight enumerators} for short. Now the projector $P$ of a quantum code, when decomposed in the Pauli basis, can be written as \begin{align} P=& \sum_{\sigma\in {\cG}_n} \frac{\text{tr}(\sigma P)}{2^{n}} \sigma. \label{eq:P} \end{align} Our auxiliary weight enumerator depends on the Pauli decomposition~\eqref{eq:P}, and is given by \begin{align} \ket{{\texttt{AUX}}} &= |\phi\> \otimes |\phi\> , \end{align} where \begin{align} |\phi\> = \sum_{\sigma \in {\cG}_n} \text{tr}(\sigma P) |\sigma\> . \end{align} The auxiliary weight enumerator is exact in the sense that it encompasses complete information about the quantum code's projector. We emphasize that the state $|\phi\>$ depends only on the code's projector $P$. Hence $|\phi\>$ is independent of the parameters of the AD channel. Since $\text{tr}(\sigma P)\text{tr}(\tau P)$ is invariant under the swap of $\sigma$ and $\tau$, it follows that \begin{align} \Pi_{} \ket{{\texttt{AUX}}} &= \ket{{\texttt{AUX}}} , \end{align} where \begin{align} \Pi_{} &= \sum_{\sigma, \tau \in {\cG}_n} |\sigma\>\<\tau| \otimes |\tau\>\<\sigma|. \end{align} We later exploit this permutation symmetry to introduce additional constraints in our linear programming bound for amplitude damping channels. \section{Connection Matrices}\label{sec:connection-matrices} To establish the connection between our auxiliary weight enumerator with the two generalized weight enumerators, we define matrices that relate the $A$- and $B$-type generalized weight enumerators with the auxiliary weight enumerator as follows: \begin{align} M_A &= \sum_{i=0}^n \sum_{E \in \cK_i} \sum_{\sigma , \tau \in {\cG}_n} 2^{-2n} \text{tr}(E \sigma ) \text{tr}(E^\dagger \tau) |i\> \<\sigma|\<\tau|,\label{eq:MA-defi}\\ M_B &= \sum_{i=0}^n \sum_{E \in \cK_i} \sum_{\sigma , \tau \in {\cG}_n} 2^{-2n} \text{tr}(E \sigma E^\dagger \tau) |i\> \<\sigma|\<\tau| \label{eq:MB-defi}. \end{align} The matrices $M_A$ and $M_B$ establish an indirect linear relationship between the generalized enumerators $|A\>$ and $|B\>$ via an additional linear relationship with the auxiliary weight enumerator. Namely, we have the following linear relationships. \begin{lemma} \label{lem:connection-matrices} The following matrix identities hold. \begin{align} M_A \ket{{\texttt{AUX}}} &=(\text{tr} P )^2 |A \>, \label{eq:MAewe}\\ M_B \ket{{\texttt{AUX}}} &= \text{tr} P |B \>. \label{eq:MBewe} \end{align} \end{lemma} \begin{proof} By expanding the code projector $P$ in the Pauli basis, we get \begin{align} |A \> =& \frac{1}{(\text{tr} P )^2} \sum_{i=0}^n \sum_{E \in \cK_i} 2^{-2n} \sum_{\sigma, \tau \in {\cG}_n} \text{tr}(E\sigma)\text{tr}(E^\dagger \tau) \notag\\ &\quad \times \text{tr}(\sigma P) \text{tr}( \tau P) |i\>. \end{align} Also we can see that \begin{align} M_A \ket{{\texttt{AUX}}} = \sum_{i=0}^n \sum_{\substack{ E \in \cK_i\\ \sigma , \tau \in {\cG}_n }} \frac{ \text{tr}(E \sigma ) \text{tr}(E^\dagger \tau) }{2^{2n} } |i\> \text{tr}(\sigma P) \text{tr}(\tau P) . \end{align} Hence \eqref{eq:MAewe} holds. To obtain the second result, we also expand the code projector $P$ in the Pauli basis to get \begin{align} |B \> &= \frac{1}{\text{tr}(P)} \sum_{i=0}^n \sum_{E \in \cK_i} 2^{-2n} \sum_{\sigma, \tau \in {\cG}_n} \text{tr}(E\sigma E^\dagger \tau) \text{tr}(\sigma P) \text{tr}( \tau P) |i\>. \end{align} Next, note that \begin{align} M_B \ket{{\texttt{AUX}}} = \sum_{i=1}^n \sum_{\substack{ E \in \cK_i\\ \sigma , \tau \in {\cG}_n }} 2^{-2n} \text{tr}(E \sigma E^\dagger \tau) |i\> \text{tr}(\sigma P) \text{tr}(\tau P) . \end{align} The result $M_B \ket{{\texttt{AUX}}} = \text{tr}(P) |B \>$ then follows. \end{proof} While we do not have a direct linear relationship between the generalized quantum weight enumerators $|A\>$ and $|B\>$, Lemma~\ref{lem:connection-matrices} establishes a linear relationship between each generalized quantum weight enumerator and the auxiliary weight enumerator. This thereby establishes an indirect linear relationship between $|A\>$ and $|B\>$, which later allows us to obtain linear programming bounds for amplitude damping codes. It is also important to note the following properties of connection matrices. \begin{enumerate} \item The connection matrices $M_A$ and $M_B$ are devoid of information content about the code, because they are both independent of the code projector $P$. \item The connection matrices $M_A$ and $M_B$ depend on the damping parameter $\gamma$ of AD channel. \end{enumerate} \section{Linear Programming Bounds} \label{sec:linear program bounds} From the above discussion, the weight enumerators $\ket{A}$ and $\ket{B}$ of a $(t,c)$-AD code must satisfy (\ref{eq:BleqA}), (\ref{eq:MAewe}), and (\ref{eq:MBewe}). We formulate a linear program with a constant objective function, and find non-negative variables $A_0,\dots,A_n$, $B_0,\dots,B_n$ that belong to a particular feasible region. The feasibility problem of our linear program is then equivalent to the following. \begin{align} {\rm Find}\ \ A_0,\dots,&A_n,B_0,\dots, B_n\notag\\ {\rm subject\ to\ } (\text{tr} P)^2|A \> &=M_A \supwe \ket{{\texttt{AUX}}} \notag\\ \text{tr} P|B \> &=M_B \supwe \ket{{\texttt{AUX}}}\notag\\ (B_i - A_i)/\gamma^{t+1} &\le c , \quad 0 \le i \le d-1\notag\\ B_i /\gamma^i &\le \binom n i , \quad 0 \le i \le n\notag\\ B_0+\dots +B_n &\le 1 \notag\\ A_i &\ge 0, \quad 0 \le i \le n \notag\\ \Pi_{} \ket{{\texttt{AUX}}} &= \ket{{\texttt{AUX}}}. \label{eq:linear-constraints} \end{align} Since integer programs are hard to solve in general, our feasibility conditions are attractive because they have no integer constraints, in contrast to many other linear programming bounds for stabilizer codes \cite{CRSS98,LBW13,LA18,ALB20}. Hence, we have a linear program as opposed to an integer program. However, one may wonder whether such a linear program is sufficiently constrained to be potentially infeasible. We demonstrate numerically that our linear program can be infeasible, by analyzing the potential of using three qubits to correct a single AD error. To do this, we have an additional observation that our linear program is parameterized by $\gamma$. Since a $(t,c)$-AD code is defined for an arbitrary $\gamma$, we can concatenate the linear constraints for various values of $\gamma$. Crucially, constraints for different values of $\gamma$ are related because $\ket{{\texttt{AUX}}}$ is independent of $\gamma$. We illustrate the linear dependence of all of our linear constraints in Fig.~\ref{fig:star}. \begin{figure} \begin{center} \begin{tikzpicture}[scale=1.2][thick] \fontsize{8pt}{1} \tikzstyle{checknode} = [draw,fill=blue!10,shape= circle,minimum size=0.4em] \tikzstyle{variablenode} = [draw,fill=white, shape=circle,minimum size=0.4em] \tikzstyle{measurenode} = [draw,fill=yellow!40,shape= rectangle,rounded corners, minimum size=4.0em] \node[measurenode] (mn1) at (0,0) {$\ket{{\texttt{AUX}}}$} ; \node[checknode] (cn1) at (-1,2) { $\ket{A^{(\gamma_1)}}$} ; ; \node[variablenode] (vn4) at (-1,-2) { $\ket{B^{(\gamma_4)}}$} ; \node[variablenode] (vn2) at (1,2) {$ \ket{B^{(\gamma_2)}}$} ; \node[variablenode] (vn3) at (2,-1) {$\ket{B^{(\gamma_3)}}$} ; \node[checknode] (cn3) at (1,-2) { $\ket{A^{(\gamma_3)}}$} ; ; \node[checknode] (cn4) at (-2,-1) { $\ket{A^{(\gamma_4)}}$} ; \node[checknode] (cn2) at (2,1) {$ \ket{A^{(\gamma_2)}}$} ; \node[variablenode] (vn1) at (-2,1) {$\ket{B^{(\gamma_1)}}$} ; \node (label1) at (-0.4,1.5) {$M_A^{(\gamma_1)}$} ; \node (label2) at (0.4,1.5) {$M_B^{(\gamma_2)}$}; \node (label1) at (-0.4,-1.5) {$M_B^{(\gamma_4)}$} ; \node (label2) at (0.4,-1.5) {$M_A^{(\gamma_3)}$}; % \draw (cn1) -- (mn1) (vn1) --node[midway,left]{$M_B^{(\gamma_1)}$} (mn1) (vn2) --(mn1) (cn2) --node[midway,right]{$M_A^{(\gamma_2)}$} (mn1); \draw (cn3) -- (mn1) (vn3) --node[right]{$M_B^{(\gamma_3)}$} (mn1) (vn4) -- (mn1) (cn4) --node[midway,left]{$M_A^{(\gamma_4)}$} (mn1); % \end{tikzpicture} \end{center} \caption{ The relationship between various enumerators is depicted here. Every A and B-type enumerator for differing values of AD parameter $\gamma_i$ relates linearly to the same auxiliary enumerator. }\label{fig:star} \end{figure} To determine if our concatenated linear program is feasible, we code up the linear constraints in the \texttt{Matlab} solver \texttt{cvx}, and use the algorithm SDPT3. In the linear constraints of \eqref{eq:linear-constraints}, we write the monomials of $\gamma$ as denominators. This normalizes our constraints so that a numerical solver can be numerically stable even for small values of $\gamma$. Also, when coding up the linear constraints of \eqref{eq:linear-constraints} in a solver, we do not explicitly construct the permutation matrix $\Pi$ because it is much too big. Rather we specify its implied linear constraints directly into the optimizer environment for our linear program. In our numerical study, we analyze the possibility of correcting a single AD error using three qubits. We obtain mainly no-go results on the existence of a three-qubits code that corrects a single AD error. For this, we consider four different values of $\gamma$ in the construction of our linear program. More precisely, we numerically find the maximum $c$ for which the convex solver returns a result that says that the linear program is infeasible. \begin{example} For $n=3$, $M=2$, $t=1$, we rule out $c=9.8 \times 10^4$ using $\gamma = 0.1 , 0.05, 0.01, 0.0001$. \end{example} \section{Discussions} \label{sec:discussions} In this paper, we showed that quantum weight enumerators can be generalized to the setting of AQEC AD codes. Key to our analysis is our introduction of auxiliary weight enumerators, which allows us to establish an indirect linear relationship between the generalized quantum weight enumerators. As it stands, the auxiliary weight enumerator is a vector of size $4^{2n}$ in the number of qubits $n$. If we restrict our attention to stabilizer codes, this size potentially can be greatly reduced. This is because the representation of the code projectors of stabilizer codes in the Pauli basis can be written entirely in terms of the code's stabilizers. Since the number of stabilizers for an $[[n,k]]$ code is $2^{n-k}$, this number is far fewer than $4^{2n}$. In view of this, we will discuss the extent in which the connection matrices and auxiliary weight numerators can be compressed in a subsequent work. This will make tractable exploration of the performance of larger sized codes. \section{Acknowledgements}\label{eq:acknow} YO acknowledges support from the EPSRC (Grant No. EP/M024261/1) and the QCDA project (Grant No. EP/R043825/1)) which has received funding from the QuantERA ERANET Cofund in Quantum Technologies implemented within the European Union’s Horizon 2020 Programme. CYL was financially supported from the Young Scholar Fellowship Program by Ministry of Science and Technology (MOST) in Taiwan, under Grant No. MOST108-2636-E-009-004.
\section{Introduction}} Quantum information theory is an advanced approach and is basically an amalgam of computer science, physics, and mathematics. It uses the principles of quantum mechanics. In quantum mechanics, the state of the system is expressed by a wave function. The fundamental laws of quantum mechanics are widely adopted in computation as well as in communication. As a comparatively modern computational model, the quantum computing\cite{42}\cite{43} brings the dawn of solving the so-called NP problem because of the strong parallel computation power of quantum computing. Many of the principles of quantum mechanics, such as quantum no-cloning theorem, uncertainty principle, and entanglement provide quantum communication protocols the provable security. We first introduce the key aspects of quantum mechanics in computer science such as quantum computation and quantum communication. The novel concepts of process algebra in the light of formal methods have been explained further with a brief overview of previous researches. \textbf{\subsection{Quantum Computation \& Communication}} Quantum Computing is a new computational theory in computer science. The machine which carries out this computation is referred to as Quantum Computer. We know in digital computing, computations are performed by Standard Computers that consist of transistors. Such types of standard computers are able to interpret data only in the binary format that consist of either 0 or 1 state. On the other hand, the novel Quantum computation uses quantum bits (qubits) which can be in a superposition of the two states. Quantum computers could possess incredibly large processing power and could process much more amount of information at a given time. The amount of information flow quantum mechanical computer can measure would be: $2^{N}$ where N = Number of qubits. For larger qubits, if we are given 300 qubits then $2^{300}$ would be huge enough that it might be equal to the total number of particles present in the observeable universe. \\ A classical computer can take millions of years to find the prime factor of 2048 bits number whereas using a quantum computer it will take only a few minutes. The processing power of quantum computer when we are given with 30 qubits would be equal to the classical computer that computes at 10 Teraflops. These computers took advantages of quantum superposition to reduce \textbf{T(n): Number of steps requires to get the computational results} and can only perform faster operations only if we are using some particular algorithms as we can perform a number of computational operations in an exponentially smaller time. Nowadays, communication devices and protocols are based on the principles of classical physics where information is communicated in the form of bits. In addition to quantum computing, the important aspects of quantum mechanics \cite{12} such as quantum teleportation\cite{5}, no-cloning theorem and entanglement \cite{13} needs to be studied (For details, one should refer to these \cite{12}\cite{13}\cite{42}\cite{43}. Quantum computing actually offers the option of an entirely new paradigm for information processing, with the alluring possibility of having the capacity to break existing crypto-systems.\\ In recent years substantial progress has been made in the area of quantum communication. Moreover, the laws of quantum mechanics have made it possible to accomplish the communication tasks that are not possible using classical principles. Some of these tasks include dense coding \cite{14}; unconditionally secure quantum key distribution \cite{12} and quantum teleportation (QT). The basic protocols of quantum communication tasks were propounded from 1984 to 1993. For example \begin{itemize} \item In 1984, Bennett and Brassard put forward the very first protocol of QKD known as BB84 protocol. In this protocol, there is a sender that relays a random sequence of bits and then distributes it to a remote receiver using quantum means. \item Moving to the concept of dense coding, aka super dense coding was proposed first time by Bennett \cite{3} in 1992. In this, a sender can communicate two classical bits of information to the receiver by sending only one qubit of information with the condition that the sender and receiver must share a prior entanglement. \item In 1993, Bennett introduced the quantum teleportation (QT) scheme \cite{5}\cite{13}\cite{15} in which a sender transmits an unknown quantum state to a distant receiver using two bits of classical communication along with an entangled state that has already been shared by both the sender and receiver. \end{itemize} After the publication of these fundamental research works regarding quantum protocols, several new quantum communication protocols have been coined. Some of which do not need security as these are already secured such as quantum teleportation and super dense coding and some of these require security proof such as protocols of quantum key distribution (QKD), Deterministic secure quantum communication (DSQC), Quantum secret sharing (QSS), quantum dialogue (QD) and Quantum secure direct communication (QSDC) \cite{16}\cite{17}. \textbf{\subsection{Algebra of Quantum Processes}} In the algebra of quantum processes, formal methods are used to provide systematic techniques for modeling \cite{5}, analysis and verification of quantum systems. It is normally used to model the behavior of systems that are created with both classical and quantum information. There are many formal languages available pertinent to specification and verification. There has been greater than before interest in process algebra \cite{11} for the specification and modeling of concurrent systems. It is appealing to unite quantum computing and classical computing under the same process algebra framework as most quantum communication protocols involve quantum information and classical information, quantum computing and classical computing. In the last few years, serious efforts have been made to link the computer science areas like programming languages and formal verification with quantum information processing. \\ The scheme of devising a robust computational machine based on quantum mechanical laws dates back to 1980 \cite{39} and \cite{45}. Then, Feynman \cite{19} propounded that a quantum mechanical system becomes useful for computing, a great deal of attention was paid over quantum computing based on quantum information theory. Quantum computing (as discussed earlier) can provide a great speedup as compared to its classical analogue after taking advantage of the characteristics of being in a superposition of quantum states. \cite{25} \cite{26} \cite{27}. In order to offer an approach of examining the computational difficulties in a more logical way, some researchers started studying the semantics and design of quantum programming languages (QPL). Knill composed a set of fundamental transition rules for describing the quantum pseudo-codes \cite{14}, whereas Omer proposed the very 1st real-time programming language for quantum systems known as QCL\cite{25} \cite{26}. In the meantime, different programming languages have been proposed that would possibly be working on quantum computers (Refer to this survey by Gay \cite{46}), among which is qGCL which resembles Dijkstra guarded commands language was formulated by Zuliani et al. in \cite{28} \cite{29}. An extended version of C++ with principles of quantum systems, which is being proposed as a C++ library, was proposed by Bettelli \cite{24}. But the first breakthrough was when Selinger \cite{37} proposed the quantum language (QPL) which was first function-based programming language. QPL combines high-level classical design with its basic operations on quantum information. A short time ago, Selinger et al. \cite{41} further enhanced this function-based programming language with the same quantum information paradigm along with classical control where the information is being shared, the same idea has been extended in the calculus being introduced by Arrighi et al. \cite{40}. \\ \\ Van \cite{38}\cite{39} presented a quantum $\lambda$ calculus collaborating higher-order logic. Up till now the languages in hand, mostly serve the sequential quantum computing, where no transition rules have been presented to model the communication between distant observers. The formulation of such programming languages has now started that would possibly describe the concurrent quantum systems along with the principles of communication between them. \\ Quantum cryptography \cite{9}, is able to provide an utmost level of security even if it is vulnerable to attacks of intended eave-droppers. Rapid progress was made in quantum cryptographic systems that now these have become commercially available \cite{36}. Now we are in direct need of a language which can describe a concurrent system more instantly both on the basis of quantum and classical computation. Additionally, a system for formulating the quantum concurrent activities is needed that can provide methods to verify the various properties of that specific system such as security, secrecy, and correctness of any cryptography-based quantum protocol. Jorrand et al. \cite{32}, and Gay et al. \cite{31} independently made the effort of designing a generalized framework of modeling concurrent quantum systems where process algebra has been extended to the quantum setting. Jorrand et al. \cite{32} formulated an algebra for quantum systems which could describe both quantum and classical data sharing. After that, Lalire proposed a probabilistic branching bisimulation for their previously formulated language which was able to identify quantum systems connected to their process graph with similar branching structure\cite{34}. While Gay et al. \cite{4} described a process algebraic language called Communicating Quantum Processes (CQP) which is an instance of calculus that was introduced by Lalire et al. \cite{34}, which gave both the primitives for unitary transformations and measurements for the analysis of quantum communication systems. \textit{\subsection{Overview of this paper}} This paper is organized as follows: In \textbf{Section 2}, we review some basic notions from linear algebra and quantum mechanics which will be used in this paper. The syntax of eQPAlg is presented in \textbf{Section 3}. \textbf{Section 4 and 5} are the major contribution of the present paper. First, we write the formal specifications of the well-known quantum teleportation protocol with eQPAlg then show that it indeed teleports any qubit from one party to another with a cost of sending only 2 classical bits. Secondly, programs are written that could satisfy the specification and these programs can also be implemented in the form of computer code for simulation. The improved algebraic transition rules for communication between two quantum processes are defined and examples are given for supporting these transition rules. \textbf{Section 6} is the concluding section in which we outline the research work and point out some problems for further study. \textbf{\section{Preliminaries}} For reader's understanding, we introduce some fundamental concepts about linear algebra and quantum mechanics (Reader is intended to read \cite{42}\cite{43} and \cite{44} for details). The syntax and structural operational semantics of the former quantum process algebra can be found here (\cite{3}\cite{32} and \cite{34} for detailed study). \textbf{\subsection{Linear Algebra: Vector Spaces and Operators}} Study of vector spaces and linear transformations in linear algebra. Hilbert Space, where quantum mechanics are formulated, is an significant vector space in mathematics and physics. First we give fundamental definitions and notes, then officially define Hilbert Space. \textbf{\subsubsection{Qubit}} The fundamental unit of representing information in quantum computation is called \textit{quantum bit} or \textit{qubit}\cite{1}. Alike \textit{bit}, a qubit can be in one of the two states. We will write these states by $\ket{0}$ and $\ket{1}$. Anything enclosed using this notation $\ket{\,}$ is known as \textit{state}, \textit{vector} or a \textit{ket}. A classical bit can only be in one state, it can be 0 or 1. A qubit can exist in $\ket{0}$ or $\ket{1}$ and it can also occurs in both states and this state is called \textit{superposition}. If we have a state $\ket{\psi}$ then the superposition state will be: \\ \begin{equation*} \ket{\psi} = \alpha\ket{0} + \beta\ket{1} \end{equation*} $\alpha$ and $\beta$ are the complex coefficients. While measuring $\ket{\psi}$, we can have the probability of finding $\ket{\psi}$ in one of the two states which is calculated by modulus squared $\alpha$, $\beta$ such that: \\ \\ $|\alpha|^2$: Gives the probability of finding $\ket{\psi}$ in $\ket{0}$ \\ $|\beta|^2$: Gives the probability of finding $\ket{\psi}$ in $\ket{1}$ \textbf{\subsubsection{Vector Spaces}} The term vector is used for representing the quantum state of a physical system in a \textit{complex} vector space. An important vector space in quantum computation is $\mathbb{C}^n$ consisting of "n-tuples" of different complex numbers. We can name the components of $\mathbb{C}^n$ using $\ket{a}\, \ket{b}\, \ket{c}$. One can denote each part of this type of vector space in the form of n-dimensional \textit{column vector} such as: \begin{align*} \ket{a} = \begin{pmatrix} a_1\\ a_2\\ .\\ .\\ .\\ a_n\\ \end{pmatrix} \end{align*} We use such notations to denote qubits. A qubit in Hilbert space $\mathbb{C}^2$ (which we will discuss later) can be written in column vector format: \begin{align*} \ket{\psi} = \begin{pmatrix} \alpha \\ \beta \\ \end{pmatrix} \end{align*} \textbf{\subsubsection{Basis and Dimension}} If we have a group of vectors spanning the space of a vector V and linearly independent to each other, we can call this group as a \textit{basis} and the No. of elements in this basis set is known as the \textit{dimension} of V \cite{1}. Basis set of qubits states $\ket{0}$ and $\ket{1}$ for $\mathbb{C}^2$ with: \begin{align*} \ket{0} = \begin{pmatrix} 1\\ 0\\ \end{pmatrix} ,\; \ket{1} = \begin{pmatrix} 0\\ 1\\ \end{pmatrix} \end{align*} \textbf{\subsubsection{Inner Product}} The generalized form of dot products that can be along with simple vectors in the Euclidean space. In dot product we have two vectors mapped into a real number whereas inner product get two vectors from $\mathbb{C}^2$ and do the mapping into complex number so the inner product is normally considered as complex number. We have two vectors $\ket{u}$, $\ket{v}$ and the inner product can be represented by $\braket{u}{v}$. To calculate inner product among two vectors, we have to first compute the hermitian conjugate of one of the two vectors. \begin{align*} (\ket{u})^\dag = \bra{u} \end{align*} If we have \begin{align*} \braket{u\,}{\,v} = 0 \end{align*} then it is stated that $\ket{u}$, $\ket{v}$ will be \textit{orthogonal} to each other and if the norm of a vectors is unity such that \begin{align*} \braket{u}{v} = 1 \end{align*} then $\ket{u}$, $\ket{v}$ are \textit{normalized}. If we have a vector which isn't normalized then we get a normalized vector by calculating the \textit{norm} (that can be a real number) this way, \\ \begin{equation*} ||u|| = \sqrt{\braket{u}{u}} \end{equation*} and dividing the vector by it. If every component of a group of vectors is orthogonal as well as normalized to one another then this set is said to be the \textit{orthonormal}. \textbf{\subsubsection{Bra-ket Notation}} Most commonly written notation for representing the states of a quantum system in the orthonormal basis is \textit{Bra-ket}. If we have vectors $\ket{u}$, $\ket{v}$ then we will call it a \textit{ket} or \textit{column vector} and we can find its \textit{bra} or \textit{dual vector} by calculating the \textit{hermitian conjugate}. So, the bras corresponding to kets will be $\bra{u}$, $\bra{v}$. \textbf{\subsubsection{The Trace of an operator}} If we have an operator in the form of matrix then we can compute the \textit{trace} of this operator by summing up its diagonal elements. Such as, \begin{align*} Z = \begin{pmatrix} w & x \\ y & z \\ \end{pmatrix}, \quad Tr(Z) = w + z \end{align*} In case, the operator can be in outer product form then we can calculate the trace by adding the inner products with its the basis states. If we have our vector in basis $\ket{v_i}$, then trace of operator will be\\ \begin{equation*} Tr(Z) = \sum_{i=0}^n \expval{v_i}{Z} \end{equation*} \textbf{\subsubsection{Hilbert Space}} An Hilbert Space\cite{1} is a two dimensional complex vector space and a generalization of \textit{Euclidean space} where a qubit resides. It is represented by $\mathcal{H}$. \textbf{\subsubsection{Tensor Product}} If $H_1$, $H_2$ are 2-Hilbert spaces where $\ket{\phi_1} \, \epsilon \, H_1$ $\ket{\phi_2} \, \epsilon \, H_2$ are the two vectors belongs to $H_1$ and $H_2$ then the \textit{tensor product} for these vectors can construct a larger Hilbert space H represented by state vector $\ket{\psi}$ such as \begin{equation*} \ket{\psi} = \ket{\phi_1 \otimes \phi_2} \end{equation*} \textbf{\subsection{Quantum Mechanics}} Now we provide a review on the basics of quantum mechanics that is needed to understand the paper. \textbf{\subsubsection{Quantum Gates}} In the context of quantum mechanics, data processing id done through gates also known as unitary operators\cite{1}. A quantum gate or a logic gate is the basic element of quantum computation consisting of small quantum registers and connected with wires to build a circuit. Quantum algorithm is actually the number of gates which are connected together and performing different operations on quantum states to get the desired measurement. They can also be represented by \textit{unitary matrices}. Quantum gates can perform reversible computation whereas in most of the classical gates only perform irreversible computation. For examples, a classical \textit{AND} gate performs operation on two different bits and the measurement results will not be reverted back to get the original bits. However, in reversible computing such as \textit{NOT} gate, one can measure the input bit from the resulting bit. \subsubsubsection{Hadamard Gate:} Hadamard gate\cite{1} can perform actions on a single qubit. This plot the basic state $\ket{0}$ to $\frac{\ket{0} + \ket{1}}{\sqrt{2}}$ and $\ket{1}$ to $\frac{\ket{0} - \ket{1}}{\sqrt{2}}$ that states that the measurement to be performed will have equal probabilities of 0 or 1. It is represented as the 2 X 2 matrices form\cite{1}: \begin{align*} H = \frac{1}{\sqrt{2}} \begin{pmatrix} 1 & 1 \\ 1 & -1 \end{pmatrix} \end{align*} As, $HH^{*} = I$, here I is the identity matrix and hence H is a unitary operator. \subsubsubsection{CNOT Gate:} CNOT gate operates on a pair of qubits where the first qubit is the control qubit whereas the other qubit is the target qubit\cite{1}. NOT Gate or Pauli-X operation will be applied to target qubit with respect to control qubit values. If the value of control qubit is $\ket{1}$ then it flips the state of target qubit to $\ket{0}$ otherwise leaves it unchanged. The matrix representation of a 2-qubit CNOT operator can be given by \begin{align*} CNOT = \begin{pmatrix} 1 & 0 & 0 & 0 \\ 0 & 1 & 0 & 0 \\ 0 & 0 & 0 & 1 \\ 0 & 0 & 1 & 0 \\ \end{pmatrix} \end{align*} \subsubsubsection{Phase-Shift Gates} This a group of single-qubit gates that changes the basic state $\ket{1}$ to $e^{\iota \phi}\ket{1}$ and leaves the basic state $\ket{0}$ unchanged. The phase-shift is represented by $\phi$ \\ \begin{align*} R_\phi = \begin{pmatrix} 1 & 0 \\ 0 & e^{\iota \phi} \\ \end{pmatrix} \end{align*} The examples of phase-shift gates are Pauli-Z gate where $\phi = \pi$, the phase gate where $\phi = \frac{\pi}{2}$ and $\frac{\pi}{8}$ gate where $\phi = \frac{\pi}{4}$ \textbf{\subsubsection{Pauli Operators}} Pauli operators are of fundamental importance in quantum computation. Different symbolic representations are used for Pauli operators, sometimes represented by $\sigma_0 \, , \sigma_1 \, , \sigma_2 \,$ , $\sigma_3 \, $ and sometimes I, X, Y or Z, or $\sigma_0 \, , \sigma_x \, , \sigma_y \,$ , $\sigma_z \, $ where, $\sigma_0 = I \, , \sigma_1=\sigma_x = X \, , \sigma_2 =\sigma_y = Y \,$ and $\sigma_3 = \sigma_z = Z \, $ \cite{1}. As the name suggests, applying identity on any state will leaves the state unchanged: \begin{equation*} I\ket{\psi} = \ket{\psi}\quad \text{such that} \quad I\ket{0} = \ket{0}, \: I\ket{1} = \ket{1} \label{eq:3.4} \end{equation*} The next operator is known as \textit{bit-flip} and is denoted by X. It operates the same as \textit{NOT operator}: \begin{equation*} X\ket{0} = \ket{1}, \; \; X\ket{1} = \ket{0} \label{eq:3.5} \end{equation*} Third operator is abbreviated by Y and it operates as follows: \begin{equation*} Y\ket{0} = -\iota\ket{1}, \; \; Y\ket{1} = \iota\ket{0} \label{eq:3.6} \end{equation*} Lastly, we have Z operator sometimes called \textit{phase-flip} and is denoted by Z. It acts as follows: \begin{equation*} Z\ket{0} = \ket{0}, \; \; Z\ket{1} = -\ket{1} \label{eq:3.7} \end{equation*} \textbf{\subsubsection{Hermitian Operator}} In quantum theory, one special type of operator is \textit{Hermitian}. Operators which represents the physical observables are hermitian. An operator A is said to be hermitian if and only if \begin{equation*} A = A^\dag \end{equation*} The Pauli operators are hermitian. \textbf{\subsubsection{Unitary Operator}} A linear operator represented by \textit{U} also known as \textit{unitary}, if the adjoint of \textit{U} equals its inverse if $UU^{\dag}\, = \, U^{\dag}U \, = \, I$, here I represents the identity operator and $U^{\dag}$ denotes the conjugate transpose\cite{1}. \textbf{\subsubsection{Density Operators}} For describing quantum state to vector we can use use Density operators. Density operators represents the mixed(uncertain) state of the system in a compact way. There are basically two formulations of density operators, first one formulation uses \textit{probabilities} and other uses \textit{trace-preserving} matrices. A density operator is a linear operator in Hilbert space $\mathcal{H}$ and is represented by $\varrho$. Density operator satisfies following conditions:\\ \begin{enumerate} \item A density operator is Hermitian, that is, $\varrho$ = $\varrho^\dag$. \item $\varrho$ must be positive, only if, $\expval{\psi}{\varrho}\geq 0$. \item Trace of density operator $\varrho$ is equal to one, that is, $Tr(\varrho) = 1$. \end{enumerate} $\mathcal{D}(\mathcal{H})$ represents the group of all positive density operators exists in $\mathcal{H}$. \textbf{\subsubsection{Quantum Measurement}} Quantum measurement contains of a group of measurement operators which is $M_{m}$, m represents the measurement results and satisfying the following: $$ \sum_{m} M^\dag_{m} M_{m} = \mathcal{I}_\mathcal{H} $$ \textbf{\section{Algebra for Distributed Quantum Systems - eQPAlg}} Motivated from classical process algebras, which offer a framework for modeling cooperating computations, a process algebraic notation has been outlined, named QPAlg for Quantum Process Algebra, that provides a uniform style to formal descriptions of synchronous and distributed computations comprising each quantum and classical elements. On the quantum aspect, QPAlg provides quantum variables, operations on quantum variables (unitary operators and measure observables), likewise as new sorts of communications involving the quantum world \cite{3}. \\ The idea of this paper is to model the quantum operations involved in distributed quantum systems into the algebra of Lalire \cite{16} with a slight extension of writing specifications. The extended algebra also provides the support not only to formally analyze the data flow in quantum communication protocols that involve classical data, but also we can write down their specifications. The current work introduces an easy to understand and a short description of classical and quantum components as well as communication between distributed quantum systems. \textbf{\subsection{The Quantum Process Algebra - eQPAlg}} \texttt{Syntax:} \begin{equation*} \begin{split} process ::= nil \,|\, end \,|\, action.process\,|\, process;process \,|\, process\backslash\{gate\_list\} \\ |\, \textbf{[} var\_decl\_list.process \textbf{]} \,|\, process \textbf{[} var\_list \textbf{]} \,|\,process \parallel process \,|\,process\parallel_{\{var\}}process \end{split} \end{equation*} \begin{equation*} \begin{split} action \,\, ::= \,\, com\,|\, unit\_transf |\, measure \end{split} \end{equation*} \begin{equation*} \begin{split} com \,\, ::= \,\, gate ! exp \,|\, gate ! measure |\, gate ? variable \end{split} \end{equation*} \begin{equation*} \begin{split} unit\_transf \,\, ::= \,\, unitary\_operator \textbf{[} var\_list \textbf{]} \end{split} \end{equation*} \begin{equation*} \begin{split} measure \,\, ::= \,\, observable \textbf{[} var\_list \textbf{]} \end{split} \end{equation*} \begin{equation*} \begin{split} var\_decl \,\, ::= \,\, variable : var\_type \end{split} \end{equation*} \begin{equation*} \begin{split} proc\_def \,\, ::= \,\, process\_name \, \xrightarrow{def} \, process \end{split} \end{equation*} \begin{equation*} \begin{split} Spec \,\, ::= \,\, \big(Var,Op,Eq,State\big) \end{split} \end{equation*} Where: \\ \begin{equation*} Op \,\, ::= \,\, \wedge \,|\, \vee \,|\, \Rightarrow \,|\, + \,|\, \geqslant \,|\, \coloneqq \,|\, \equiv \end{equation*} Var ::= Any variable of classical or quantum type \\ Eq ::= Any equation or expression \\ State ::= Any quantum state represented by Dirac Notation \newline \newline \begin{theorem}[Specification] A specification is a statement written using mathematical expressions that is used to describe a system during the system analysis, system design and requirement analysis. A specification is generally not an executable program. A specification is said to be implementable if there is at least one output state produced for each input state of the specification. They are used to describe the what, not the how. Normally, in writing specifications various process calculi are used. However, we will be using standard logical expressions such as conjunction $\wedge$ for joining expressions, disjunction $\vee$ in place of OR, implication $\Rightarrow$ for implication, equivalence $\equiv$ for approximately equal to. \end{theorem} \begin{theorem}[Program] To specify the behavior of a computer a program is used or A program is an implementable form of specification. \end{theorem} \textbf{\subsection{Representing Distributed Quantum Systems}} Let we have two quantum processes $P$ and $Q$ that represent two quantum systems in the state $\ket{\psi}$ and $\ket{\phi}$ then $P \parallel Q$ represents the distributed quantum systems that may have entanglement between them then we have: \begin{itemize} \item p and q are integer variables representing the variables associated to $P$ and $Q$. \item $Var_{p}$ and $Var_{q}$ are the set of variables used by $P$ and $Q$. \item If we have $n+m$ quantum system in state $\psi$ then first n\-qubits represents quantum system $P$ and m\-qubits represents quantum system $Q$ then \begin{equation*} P = \psi_{0...n} \quad Q = \psi_{n...m} \end{equation*} \end{itemize} If we have \begin{equation*} \psi = \frac{\ket{00}+\ket{11}}{\sqrt{2}} \end{equation*} as an entangled quantum system then $P$ owns the first qubit of state $\psi$ and $Q$ owns the second qubit of state $\psi$ and we can say that the entangled system $\psi$ has been distributed as well as shared between $P$ and $Q$. \newline\newline To represent such entangled quantum systems, we use parallelism: $$ P\,\parallel_{\psi}\, Q = (P \otimes Q)_{\psi}$$ where $$ P\,\parallel_{\psi}\, Q = \psi_{0}, p \otimes \psi_{1},q $$ So, $$ P\,\parallel_{\psi}\, Q= Var_{p} \otimes Var_{q} $$ \begin{theorem}Distributed Quantum Systems are both Distributed and Shared \\ \textbf{Shared:} If $P$ performs any operation to its state $\psi_{0}$ then it will affect the results of $Q$'s $\psi_{1}$ state.\\ \textbf{Distributed:} $P$ and $Q$ can only perform the operation to its own qubit and can access their own set of variables. \end{theorem} \textbf{\subsubsection{Performing Operations on Quantum Systems}} The representation of unitary operations is written as: \begin{equation*} P = \psi_{0...n} \quad Q = \psi_{n...m} \end{equation*} Then \begin{equation*} P = \cup_{{P}_{\psi_{0...n}}} \quad Q =\cup_{{Q}_{\psi_{n...m}}} \end{equation*} For Distributed Quantum Systems: \newline To apply a unitary operation on two distributed quantum systems, we write it as follows: \begin{equation*} \begin{split} P\,\parallel_{\psi}\, Q = (\cup_{{P}_{\psi_{0...n}}} \otimes \cup_{{Q}_{\psi_{n...m}}}) \\ = (\cup_{{P}} \otimes \cup_{{Q}})_{\psi} \quad \quad \quad \; \\ \text{where} \quad \psi = (\psi_{0...n} \otimes \psi_{n...m}) \quad \quad \end{split} \end{equation*} \textbf{\subsubsection{Performing Measurement on Quantum Systems}} The representation of Quantum measurement is written as: \begin{equation*} \begin{split} P = measure\;P_{\psi,p} \quad Q = measure\;Q_{\psi,q} \end{split} \end{equation*} For Distributed Quantum Systems: \newline To apply measurement on two distributed quantum systems, we write it as follows: \begin{equation*} \begin{split} P\,\parallel_{\psi}\, Q = measure\;{P}_{\psi_{0},p} \otimes measure\; Q_{\psi_{1},q} \\ \psi_{0} = \psi_{0...n} \, \text{qubit system,} \\ \psi_{1}=\psi_{n...m} \, \text{qubit system} \end{split} \end{equation*} \textbf{\section{Formal Analysis of Quantum Teleportation}} We have used Quantum teleportation which is a quantum communication protocol initially described by Bennett et. al. (\cite{15}), Now this protocol has become so famous and is widely used as an integral part of some sophisticated quantum communication protocols.We have benefited from this advanced protocol because it helps to achieve successful passing of quantum data using a classical channel along with a pair of entangled qubits, which implies that no qubits could be transferred during this process. \\ Informal description of Quantum teleportation protocol\cite{15} is as follows: In a state $\ket\phi$ = $\frac{\ket{00} + \ket{11}}{\sqrt{2}}$ , Alice and Bob have a common pair of entangled qubits where Alice having some qubits with some unidentified state that she wants to establish communication with Bob's quantum state $$\ket\psi = (\alpha\ket{0} + \beta\ket{1})$$. Alice initiates it by associating the qubit with the first half of the entangled pair that she actually intends to teleport. To do so, Alice first has to perfom CNOT, then Hadamard Transformation and apply measurement operator on the qubits she has. Alice then shares the results of this measurements to Bob. Here the measurement result will be the 2-bits. Bob then gets these 2\-bits and starts performing identity operator to his qubit. Bob ultimately retrieves the state that Alice wants to teleport to him. \\ The informal description of working of quantum teleportation can be seen in the Figure 4.1. The description that has been presented above is not enough because it just defines how the quantum system evolves. \begin{figure}[!htb] \centering \includegraphics{teleport.png} \caption{Informal description of Protocol} \label{Figure: 3.8 } \end{figure} On the other hand, the protocol has been described informally in plain English. The revolutions of the previous century have simplified certain algebras. Several non-simple algebras still wait to be simplified such as Algebra for modelling Quantum Teleportation protocol. In previous approaches, algebraic approach for teleportation was a little complex and demands a thorough understanding of the Algebra they use to model the teleportation protocol. Our research effort is to formalize the protocol in an easy to understand and simplified way. This would also helps us in verifying the correctness of quantum teleportation protocol using ePAlg syntax. The previous approaches mentioned in literature (e.g. \cite{29}) have tried to formulate teleportation as a program which can be used as a tool to implement a specification in this way $\psi^{'} = \phi$. We have observed that the given specification can also be tested with a program which requires transferring the qubit through a quantum channel that needs not be the teleportation. Moreover, the specification has not explained the sending or receiving of the two classical bit that is the integral part in defining the teleportation process. For this communication, we also require a pair of maximally entangled qubit. \\ As an illustration of the algebra, we give details of the teleportation protocol of \cite{2}. We write down the specification for Quantum Teleportation protocol and then write programs to satisfy these specifications. \textbf{\subsection{Specification}} The formal specification of quantum teleportation has been given as: \begin{equation*} \begin{split} S \coloneqq var_{Alice} \, \wedge \,var_{Bob} \, \wedge \, \ket{\phi} \, \wedge \, \ket{\psi} \, \wedge \, \text{1 ebit} + \text{2 cbits} \geqslant \text{1 qubit} \end{split} \end{equation*} The specification shows that the teleportation protocol works in a way that instead of using 1 qubit, we will be using 1 maximally entangled bit (1 ebit) and 2 classical bits (2 cbit) with a cost of sending 2 cbits from Alice to Bob for obtaining the Bob's z qubit. We have two processes $P^{Alice}$ and $Q^{Bob}$, and $\ket\phi$ = $\frac{\ket{00} + \ket{11}}{\sqrt{2}}$ is the entangled state that is partitioned among Alice and Bob as the first qubit $\ket{\phi_{0}}$ owns by Alice whereas the second qubit $\ket{\phi_{1}}$ belongs to Bob. Now Alice owns the two qubits, one from entangled state and other that needs to be sent to Bob $\ket\psi$ = $(\alpha\ket{0} + \beta\ket{1})$. Moreover, pq are the classical variables of type integer belongs to Alice that will store the classical outcomes obtained after applying measurement and will be sent on Channel and rs variables belongs to Bob which will receive the classical data from Alice and then apply unitary operations. And the, $var_{Alice} = \psi\phi_{0}, pq$ and $var_{Bob} = \phi_1,rs$ will be the set of variables that both of these processes own. \subsection{Algebraic Programs} We now describe the programs $P^{Alice}$ and $Q^{Bob}$ that represents respectively, the sender as well as the receiver of teleportation protocol are represented by the program \textit{Teleport}. \subsubsection{Program : $P^{Alice}$} \begin{equation*} \begin{split} P^{Alice} \coloneqq \bigg[ x: Qubit,\, \, y: Qubit \\ x = \ket{\phi_{0}}, y = \ket{\psi} \\ CNOT[var_{Alice}] \\ \Rightarrow CNOT[x,y] \\ \Rightarrow CNOT[\ket{\phi_{0}}, \ket{\psi}]; \\ H[x] \Rightarrow H[\ket{\phi_0} \\ \big[ p: Integer, q: Integer \\ measure[var_{Alice}, pq] \\ \Rightarrow measure[\{x,y\}, pq]\\ \Rightarrow measure[\ket{\phi_{0}\psi}, pq]; \\ \big] \\ & \bigg] \end{split} \end{equation*} \begin{figure}[t] \centering \includegraphics[width=8cm, height=8cm]{palice.jpg} \caption{Behaviour of Alice} \label{Figure: 3.9 } \end{figure} \textbf{\subsubsection{Program : $Q^{Bob}$}} \begin{equation*} \begin{split} Q^{Bob} \coloneqq \Bigg[ z: Qubit\\ \; \; \; \; \; \; z = \ket{\phi_{1}}\\ \bigg[ r: Integer, \,\, s: Integer \\ \; \; \; \; \; \; \; \ket{\phi_{1}} \Rightarrow Z[r].X[s].\ket{\phi_{1}} \\ \bigg] \\ & \Bigg] \\ \end{split} \end{equation*} \begin{figure}[t] \centering \includegraphics[width=8cm, height=8cm]{pbob.jpg} \caption{Behaviour of Bob} \label{Figure: 3.10} \end{figure} \textbf{\subsubsection{Program : BuildEPR}} \begin{equation*} \begin{split} BuildEPR \coloneqq \Bigg[ \ket{\Psi}: Qubit \\ \; \; \; \; \bigg[ a: Qubit, \; b: Qubit \\ \; \; \; \; \; \; a = \ket{0},\; b = \ket{0} \\ H[a] \;\otimes\; I[b] \\ \; \; \; \; \; \; \Rightarrow H\ket{0} \otimes I\ket{0}; \\ CNOT[\;H[a]\; \otimes \; I[b]\;] \\ \Rightarrow CNOT[\;H\ket{0} \otimes I\ket{0}\;] \\ \Rightarrow \ket{\Psi} \bigg] \\ & \; \; \; \Bigg] \\ \end{split} \end{equation*} The above program creates EPR pair by applying Hadamard gate on first quantum state after applying CNOT gate with two $\ket{0}$ states as an input. The output state $\ket{\Psi}$ will be the EPR pair which is a classical example of an entangled pair. \begin{figure}[t] \centering \includegraphics[width=6cm, height=13cm]{buildepr.jpg} \caption{Behaviour of BuildEPR} \label{Figure:3.11 } \end{figure} \textbf{\subsubsection{Program : $QCOM$}} \begin{equation*} \begin{split} P^{Alice}\; \parallel_{\phi} \; Q^{Bob} \coloneqq \; Alice_{\phi_{0}\psi,pq}\; \parallel \; Bob_{\phi_{1},rs} \end{split} \end{equation*} \newline \textbf{\subsubsection{Program : Teleport}} \begin{equation*} \begin{split} Teleport \coloneqq \Bigg[ \ket{\Psi}: Qubit \\ \bigg[ a: Qubit, \; b: Qubit \\ \ket{\Psi} = BuildEPR[a,b] \\ \ket{\Psi} = \ket{\phi_{0}} \; \otimes \; \ket{\phi_{1}} \\ QCom \Rightarrow P^{Alice} \; \parallel_{\phi} \, \, Q^{Bob} \\ \bigg] \\ & \Bigg] \\ \end{split} \end{equation*} The program \textbf{Teleport} will also be able to demonstrate that teleportation can get the z-qubit of Bob, if it has the real state of x-qubit of Alice, by sending only 2-bits from Alice towards Bob. \cite{3}. \textbf{\section{Formally Modelling of Quantum Communication}} Our main objective is to improve some algebraic representations for modeling the communication between two quantum processes. Before modeling the communication between quantum processes, we must accept that the quantum algorithms are made up of classical and quantum parts. They require cooperation between quantum and classical computation. Also, we know that quantum computation is probabilistic by nature and the results of these computations are checked and verified by the classical part. In case the classical result of the quantum computation is incorrect, we have to repeat this computation until we get the correct results. Quantum teleportation best exhibits the cooperation between classical and quantum computation. Through our upgraded process algebra, we intend to improve the previous version of communication transition rules between classical and quantum systems just to model this cooperation. \\ \\ \textbf{\subsection{Improved Transition Rules for Modelling Communication}} This section is subjected to extend some of the existing transition rules of communication between two quantum processes defined in \cite{3}\cite{34}. For communication, we have rewritten quantum and classical input, output transition rules here again with reasons on why previously written transition rules need improvement. \textbf{\subsection{Classical Communication Transition Rules}} In order to transfer classical data between two quantum processes, we have extended the syntax of classical value-passing \cite{2} and also modeled the transition rules for communication between two systems. \textbf{\subsubsection{C-IN}} $$ \mbox{\huge $ \frac{}{g?x.P \textbackslash C \quad \xrightarrow{g?v} \quad P \textbackslash C^{'}}$} $$ where \begin{itemize} \item $ C = \langle \; s, q = \rho, f \; \rangle $ \item $ C^{'} = \langle \; s, q = \rho, f \cup \{x \rightarrow{v} \}\; \rangle $ \item $ x \; \epsilon \; Var(s) $ , $ x \; \epsilon \;$ Nat(Integer type) and $ v \epsilon N$ \;\text{N: Set of Natural numbers} \end{itemize} \textbf{\subsubsection{C-OUT:}} $$ \mbox{\huge $ \frac{}{g!v.P \textbackslash C \quad \xrightarrow{g!v} \quad P \textbackslash C}$} $$ where \begin{itemize} \item $ C = \langle \; s, q = \rho, f \; \rangle $ \item $ v \epsilon N$ \;\text{N: Set of Natural numbers} \end{itemize} \textbf{\subsubsection{C-COM:} } \begin{center} \scalebox{1.4}{$$\mbox{$\frac{P\textbackslash C \, \xrightarrow{g?v} \quad P^{'} \textbackslash C \quad \quad Q\textbackslash C \, \xrightarrow{g!v} \quad Q^{'} \textbackslash C }{P \parallel Q \textbackslash C \, \xrightarrow{\tau} \quad P^{'} \parallel Q^{'} \textbackslash C}$}$$} \scalebox{1.4}{$$\mbox{$\frac{P\textbackslash C \, \xrightarrow{g!v} \quad P^{'} \textbackslash C \quad \quad Q\textbackslash C \, \xrightarrow{g?v} \quad Q^{'} \textbackslash C }{P \parallel Q \textbackslash C \, \xrightarrow{\tau} \quad P^{'} \parallel Q^{'} \textbackslash C}$}$$} \end{center} where context of both systems remains unchanged. These transition rules are similar to those defined in communicating data between two classical systems in classical process algebra{\cite{2}}. Contexts do not change in these transition rules as the information being modified is classical by nature and and also the quantum state of the accompanying systems remains unchanged. \textbf{\subsection{Quantum Communication Transition Rules}} Communication between two quantum systems defines cooperation by classical information and quantum information. We have improved some important input and output transition rules here. Using these transition rules, we have written a rule that can define the communication between two quantum systems using parallel composition operator from process algebra \cite{2}. \textbf{\subsubsection{Q-IN1:}} $$ \mbox{\huge $ \frac{}{g?x.P \textbackslash C \quad \xrightarrow{g?v: \sigma} \quad P \textbackslash C^{'}}$} $$ \\ where \begin{itemize} \item $ C = \langle \; s, q = \rho, f \; \rangle $ \item $ C^{'} = \langle \; s, x.q = \rho \otimes \sigma , f \; \rangle $ \item $ \sigma \; \epsilon \; \mathcal{D(H}_2) $ \item $ x \; \epsilon \; Var(s) $ , $ x \; \epsilon \; q $ and $ v \notin q $ \end{itemize} \textbf{\subsubsection{Q-IN2:} } $$ \mbox{\huge $ \frac{}{g?x.P \textbackslash C \quad \xrightarrow{g?v} \quad P \textbackslash C}$} $$\\ where \begin{itemize} \item $ C = \langle \; s, q = \rho, f \; \rangle $ \item $ x \; \epsilon \; Var(s) $ , $ x \; \epsilon \; q $ and $ v \epsilon q - \{ g?x.P \}$ \end{itemize} In previous work \cite{3}\cite{34}, the quantum input rule (Q-IN1) has been defined in a similar way, but that rule works only when the quantum system being input (here quantum variable v is representing input system) must not be in entangled state or is not correlated classically with the quantum system represented by x. As the entanglement is a physical phenomenon where the state of different quantum systems can be found entangled in such a way that the state of any of the two quantum systems cannot be measured independently of the state of other system even if they are physically light years away. The below mentioned rule clearly models the statement by this process algebra: \\ $$ \mbox{\huge $ \frac{}{g?x.P \space \textbackslash C \quad \xrightarrow{g?v: \rho^{'}} \quad P \textbackslash C^{'}}$} $$ \\ where \begin{itemize} \item $ C = \langle \; s, q = \rho, f \; \rangle $ \item $ C^{'} = \langle \; s, q = \sigma , f \; \rangle $ \item $ \sigma \; \epsilon \; \mathcal{D(H}_2) $ \item $ x \; \epsilon \; Var(s) $ , $ x \; \epsilon \; q $ and $ v \notin q $ \item $ C^{'} = \langle \; s, Tr_{q}(\sigma) = \rho^{'} , Tr_{v}(\sigma) = \rho ,f \; \rangle$ \end{itemize} We can model any kind of quantum data being input using this rule as no such change has been applied to the new quantum state other than this: $Tr_{v}\sigma = \rho $ that says: the initial state of quantum systems will not be changed. The rule we derived above seems little absurd as it does not retain the property of being image finite \cite{2} from its previous states $ g?x.P\textbackslash C $ where context of this system is $ C = \langle x, q = \rho, f \rangle $ and the action it applies $ g?v:\rho^{'} $, there are never-ending numerous determined configurations fulfilling this rule. \\ Taking in view the above discussion, we have introduced these two quantum input transition rules which explain the situations where the qubit is being inputted from outside the context of the system and within the context, separately. The point to be noted here again is that the context of the system remains unchanged after applying quantum input rule-2. The input system has already been explained within the context of that specific process. And the above-mentioned rule doesn't modify the quantum state of this entire system (stored in x) as the process is only referencing the quantum system. \textbf{\subsubsection{Q-OUT:}} $$ \mbox{\huge $ \frac{}{g!x.P \textbackslash C \quad \xrightarrow{ g!x } \quad P \textbackslash C}$} $$ \\ where \begin{itemize} \item $ C = \langle \; s, q = \rho, f \; \rangle $ \item $ x \; \epsilon \; Var(s) $ and $ x \; \epsilon \; q $ \end{itemize} The output rule proposed in \cite{3}\cite{34} is as follows: $$ \mbox{\huge $ \frac{}{g!x.P \textbackslash C \quad \xrightarrow{g!x} \quad P \textbackslash C^{'}}$} $$ \\ where \begin{itemize} \item $ C = \langle \; s, q = \rho, f \; \rangle $ \item $ C^{'} = \langle \; s \textbackslash\{x\}, q\textbackslash\{x\} = Tr_{q/\{x\}}(\rho) , f \; \rangle $ \item $ x \; \epsilon \; Var(s) $ and $ x \; \epsilon \; q $ \end{itemize} The instinct behind this old version of output rule is that once the quantum state of the system is sent out (output) to another system then this state (represented by variable name x) can be removed from the quantum sequence list as defined in this part ($q\textbackslash\{x\}$ and also from the stack of variables (\textbackslash\{x\}) of running process. Further, $Tr_{q\{x\}}(\rho)$ is used to obtain the quantum state by applying partial trace on $\rho$ over the qubit value in x. This transition rule also implies that the context of the quantum system being output is also changed. \\ For justification of our improved transition rule, we assume that the system being sent out is correlated or entangled with the systems remaining in the context and once the state is removed from the context then this cannot be referenced in future. Now, after some time, if we input the same system again which has just been removed from the context then this can be problematic as we do not have this system in our context and hence we cannot measure the entangled state anymore. So, the Q-Output rule presented here can help us prevent this problem to happen since we do not wish remove the state being sent out from the context, so we keep that information. In this way, the context of the current system would be untouched. \textbf{\subsubsection{Q-COM:}} \begin{center} \scalebox{1.4}{$$ \mbox{$\frac{P\textbackslash C \,\xrightarrow{g?v} \quad P^{'} \textbackslash C \quad \quad Q\textbackslash C \, \xrightarrow{g!v} \quad Q^{'} \textbackslash C}{P \parallel Q \textbackslash C \, \xrightarrow{\tau} \quad P^{'} \parallel Q^{'} \textbackslash C}$}$$} \\ \scalebox{1.4}{$$ \mbox{$ \frac{P\textbackslash C \, \xrightarrow{g!v} \quad P^{'} \textbackslash C \quad \quad Q\textbackslash C \, \xrightarrow{g?v} \quad Q^{'} \textbackslash C }{P \parallel Q \textbackslash C \, \xrightarrow{\tau} \quad P^{'} \parallel Q^{'} \textbackslash C}$} $$} \end{center} This is a simple rule representing the communication between two quantum systems outside of the context (using Q-IN2), but this is not completely quantum by nature as quantum state of the system is neither sent nor any measurements have to be applied so the context of these two systems remains unchanged. \textbf{\subsection{Examples}} Some examples are presented below to elaborate the transition rules formulated in last section. In the below mentioned theorems, U will be the set of unitary transformation: \begin{equation*} U = \{H, CNot\} \end{equation*} where H will be the Hadamard transformation and CNot will be the "Controlled-Not" operation. In the following theorems, we perform the Hadamard transformation by using our transition rules and explain how quantum systems are passed between two quantum processes even if they are entangled. After that, we see how the quantum systems work when we perform the unitary transformation. \begin{theorem} If \begin{equation*} P = g?y.P^{'} \quad \, , \, Q = g!x.Q^{'} \end{equation*} and \begin{equation*} R \quad = \quad (P\parallel Q) \textbackslash g \; \text{where} \; y \notin q - (g!x.Q^{'}) \end{equation*} Then \begin{equation*} T_{1}\, = \, R \textbackslash C \quad \xrightarrow{\tau} \quad (P^{'}\{x/y\} \parallel Q^{'}) \textbackslash g, C \end{equation*} \\ \\ \textbf{Proof:} In the above transition $T_{1}$, the quantum system x is being sent out from the process Q to process P through quantum channel g. Note that, the context of the system remains unchanged as density operator $\rho$ only represents the quantum state of the output system x and doesn't store any other quantum information such as the position of the system. So, the above transition is valid and support the correctness of our communication rule. \end{theorem} \begin{theorem} If \begin{equation*} P_{1} = g?y.H[y].P_{1}^{'} \quad , \quad Q_{1} = (P_{1} \parallel Q) \textbackslash g \end{equation*} and \begin{equation*} \rho \,= \,\ket{1}_{x}\bra{1} \otimes \rho^{'} \end{equation*} \begin{equation*} \text{where} \quad \quad y \notin q\; -\; (g!x.P_{1}^{'}), \; \; \rho^{'}\, \in\, \mathcal{D(H}_{Var-\{x\}}) \end{equation*} Then \begin{equation*} T_{2} \, = \, Q_{1} \textbackslash C \quad \xrightarrow{\tau} \quad (H[x].P_{1}^{'}\{x/y\} \parallel Q^{'}) \textbackslash g, C \end{equation*} \begin{equation*} \quad \quad \quad \xrightarrow{H[x]} \quad (P_{1}^{'}\{x/y\} \parallel Q^{'}) \textbackslash g, C^{'} \end{equation*} Now the new state will be \begin{equation*} \ket{-}_{x}\bra{-} \otimes \rho^{'} \end{equation*} \textbf{Proof:} \\ \\ In this transition $T_{2}$, the context of the system is changed as the quantum system x is being sent out from $Q$ to $P_{1}$ and then the Hadamard transformation is applied on state $\rho$ of the quantum system x and state $\rho$ of the quantum system x is changed from $\ket{1}$ to $\ket{-}$. \end{theorem} \begin{theorem} If \begin{equation*} P_{2} = g?y.CNOT[y,z].P_{2}^{'} \quad , \quad Q_{2} = (P_{2} \parallel Q) \textbackslash g \end{equation*} and \begin{equation*} \gamma\,= \,\ket{-}_{x}\bra{-} \otimes\ket{1}_{z}\bra{1} \otimes \gamma^{'} \end{equation*} \begin{equation*} \text{where} \quad \quad y \notin q\; -\; (g!x.P_{2}^{'}), \; \; \gamma^{'}\, \in\, \mathcal{D(H}_{Var-\{x,z\}}) \end{equation*} Then \begin{equation*} T_{3} \, = \, Q_{2} \textbackslash C \quad \xrightarrow{\tau} \quad (CNOT[x,z].P_{2}^{'}\{x/y\} \parallel Q^{'}) \textbackslash g, C \end{equation*} \begin{equation*} \quad \quad \quad \xrightarrow{CNOT[x,z]} \quad (P_{2}^{'}\{x/y\} \parallel Q^{'}) \textbackslash g, C^{'} \end{equation*} Now the new state will be \begin{equation*} \ket{\alpha_{11}}_{x}\bra{\alpha_{11}} \otimes \gamma^{'} \end{equation*} \textbf{Proof:} \\ \\ In this transition $T_{3}$, again the context of the system is changed as the system x is being sent out from Q to $P_{2}$ then unitary operation CNOT applied on quantum state $$\gamma$$ of the system x along with the system z and quantum state of the physical system\-xz will be entangled. As, we can see before applying CNOT, we have the quantum system x and quantum system z as separable states but once we applied CNOT operation we get the entanglement between these two quantum systems. \end{theorem} \textbf{\section{Discussion and Conclusion}} Complete formal descriptions of quantum algorithms that uses the principles of quantum mechanics must uses both classical as well as quantum computational components and utilize these to make the communication and cooperation work. Furthermore, modeling of distributed and concurrent quantum systems, quantum to quantum communication and quantum communication protocols that physically transfers the qubits from one location to another must also be taken into account. In this paper, we have discussed the theory of formal modeling of concurrent and distributed quantum processes and provided with some improved transition rules for checking the correctness of communication between two quantum processes. We have discussed the limitation of some of the communication transition rules of the previous notation algebraic notation of quantum processes. Motivated by Milner's classical process algebras, which give an extended framework to formally model the cooperation between processes, Lalire have had introduced an algebraic notation for communicating processes which is named as Quantum Process Algebra (QPAlg). This Quantum Process Algebra gives a homogeneous style to formal specification and modeling of distributed and concurrent quantum systems consisting of both classical as well as quantum data. On the quantum part, QPAlg gives quantum variables, the operations on quantum variables such as applying quantum gates, pauli operators and the measurement observables, and also new types of communications including the quantum world. The operational semantics ensures that these quantum systems, their operations and the communication between these systems work as indicated by the postulates of quantum mechanics. We have introduced an improved version of some algebraic representations for modelling the communication between two quantum processes and proved the formal model as a tool to check the correctness of practical concurrent quantum systems. Also, we have presented a direct approach for two quantum systems to communicate. We have identified a different approach to model the communication between distant quantum systems.We have further introduced the support of writing the specifications of working of distributed quantum systems. As an example, we formally specify the working of Quantum teleportation protocol and also provided the programs that best satisfies these specifications. Diagrams have also been added to best describe the flow and formal working of protocol. Moreover, we have introduced the concept of Entanglement based instant messaging and mathematically perform the calculations. Further, in our examples we assumed to have two quantum systems and modeled two different examples of classical and quantum processes for checking the level of correctness of the communication between them. We have also applied our transition rules for some test examples where two processes are using the communication primitives of Quantum Process Algebra (QPAlg) provided that the communication is entirely based of the principles of quantum mechanics. We have elaborated the examples to describe the concurrent communication activities between these modeled systems.\\ On the theoretical side, there is a need to prove if the given program can prove the formal specification of teleportation protocol. We also aim to develop an approach for the development of a easy to understand quantum programming language and use our extended form of eQPAlg for modelling and specifying quantum superdense coding and BB84 protocol. On the practical side, there is a need to work on more practical examples for modeling cryptographic systems. Possibly a quantum cryptographic protocol can be modeled using the cryptographic protocol simulators. \\ \\
\section{Introduction} Multiple particle production at high-energy hadron colliders, such as at the LHC, is dominated by simultaneous multiple interactions between partons from the initial hadrons. Such multiple-parton interactions (MPIs) are indispensable in scrutinizing many event activities and hadron multiplicities at colliders. One particularly interesting case is that, when more-than-one reactions in a collision are lying at hard scales, the perturbative QCD approach based on the factorization theorem~\cite{Diehl:2018wfy} or conjecture applies. The studies of the so-called hard multiple-parton scattering processes can deepen our understanding of QCD and the possible multiple-parton correlations in a nucleon (see, e.g., Refs.~\cite{Blok:2013bpa,Kasemets:2014yna,Rinaldi:2016jvu,Rinaldi:2018bsf,Rinaldi:2018slz}). They provide new means to access the information of the nonperturbative structure of hadrons, which is complementary to the one obtained from nucleon one-body distributions. Because of the power counting of the cross sections, the leading multiple-parton scattering mechanism is the double parton scattering (DPS), where only two partonic scattering subprocesses happen at the same time. In the LHC era, we have witnessed rapid theoretical developments~\cite{Blok:2011bu,Diehl:2011yj,Diehl:2011tt,Gaunt:2011xd,Ryskin:2011kk,Snigirev:2010ds,Ceccopieri:2010kg, Manohar:2012jr,Chang:2012nw,Manohar:2012pe, Gaunt:2012dd,Rinaldi:2013vpa,Blok:2013bpa,Diehl:2014vaa,Golec-Biernat:2014bva,Rinaldi:2014ddl,Kasemets:2014yna,Diehl:2015bca,Rinaldi:2016jvu,Buffing:2017mqm, Diehl:2017kgu,Vladimirov:2017ksc,Diehl:2018wfy,Gaunt:2018eix,Rinaldi:2018bsf,Rinaldi:2018slz, Cabouat:2019gtm,Diehl:2019rdh,Diehl:2018kgr,Vladimirov:2016qkd, Calucci:2008jw,Calucci:2009sv,Calucci:2009ea,Treleani:2012zi,Snigirev:2016uaq,dEnterria:2016ids}, vast phenomenological applications~\cite{Kom:2011bd,Lansberg:2014swa,Lansberg:2015lva,Borschensky:2016nkv,Shao:2016wor, Lansberg:2016rcx,Lansberg:2016muq,Lansberg:2017chq,Blok:2010ge,Gaunt:2010pi,Maina:2010vh,Berger:2011ep,Kom:2011nu,Luszczak:2011zp,Kasemets:2012pr,Golec-Biernat:2014nsa,vanHameren:2014ava,Echevarria:2015ufa,Blok:2016lmd,Blok:2015afa,Tao:2015nra,Blok:2015rka,Maciula:2015vza, Luszczak:2014mta,Ceccopieri:2017oqe,Cao:2017bcb,Kumar:2019twx,Cotogno:2018mfv, Maina:2009sj,Maciula:2017meb,Maciula:2017wpe,Shao:2019qob}, and impressive experimental measurements~\cite{Aaij:2011yc,Abazov:2014qba,Khachatryan:2014iia,Aaboud:2016fzt, Aaij:2016bqq,Abazov:2015fbl,Khachatryan:2016ydm,Aad:2014rua,Aaboud:2019wfr,Aad:2014kba, Aaij:2012dz,Aaij:2015wpa,Aad:2013bjm,Chatrchyan:2013xxa,Aad:2016ett,Sirunyan:2017hlu,Sirunyan:2019zox} of DPS, and even triple parton scattering in the last decade, concentrating on proton-proton ($pp$) collisions. Moreover, following the pioneering work~\cite{Strikman:2001gz} by Strikman and Treleani, it is suggested that DPS cross sections in proton-nucleus ($pA$) and nucleus-nucleus ($AB$ or $AA$) collisions will be largely enhanced thanks to collision geometry. The DPS $pA$ cross sections scale by 3 times the number of nucleons $A$ in a nucleus~\cite{Frankfurt:2004kn,Cattaruzza:2004qb,Blok:2012jr,dEnterria:2012jam}, while the single parton scattering (SPS) cross sections in $pA$ only scale by the nuclear mass number $A$ (modulo other nuclear matter effects). The geometrical enhancement is more pronounced in nucleus-nucleus collisions. The DPS cross sections in $AA$ collisions scale as $A^{3.3}/5$~\cite{dEnterria:2013mrp,dEnterria:2014lwk}, while those for SPS are scaling as $A^2$. However, one should bear in mind that such quantitative estimates are based on the assumption that the nuclear matter effects (thermal or nonthermal) are independent of the collision geometry, which is, in fact, not always justified. One counterexample is the nuclear modification of the initial parton flux encoded in the nuclear parton distribution functions (nPDFs). Although the additional geometric effect from the nuclear modifications for DPS is insignificant anyway if the sizes of such modifications are small, the nuclear parton densities can deviate significantly from their free-nucleon counterparts at a scale of a few GeV (see, e.g., Refs.~\cite{Kusina:2017gkz,Lansberg:2016deg,Eskola:2019bgf}). Therefore, the existing DPS formula in heavy-ion collisions should be revised in order to incorporate the extra geometric/spatial effect from nPDFs.~\footnote{To the best of our knowledge, none of the existing DPS phenomenological applications in heavy-ion collisions~\cite{Strikman:2010bg,Blok:2012jr,dEnterria:2012jam,dEnterria:2013mrp,dEnterria:2014lwk,Cazaroto:2016nmu,dEnterria:2017yhd, Blok:2017alw,Alvioli:2018jls,Alvioli:2019kcy,Helenius:2019uge,Blok:2019fgg,Fedkevych:2019ofc} considers such an effect.} In addition, the understanding of the spatial (or impact-parameter) dependence of nPDFs is also essential to interpret the nuclear observables measured in different centrality classes, where one usually has to use the (optical or Monte Carlo) Glauber model to link the impact parameter and the centrality. Given the modest amount of available nuclear hard-reaction-process data available in the global fits, almost all considered nPDFs~\cite{Walt:2019slu,AbdulKhalek:2019mzd,Eskola:2016oht,Kovarik:2015cma,Khanpour:2016pph,deFlorian:2011fp, Eskola:2009uj,Eskola:2008ca,Hirai:2007sx,Hirai:2004wq,deFlorian:2003qf,Hirai:2001np,Eskola:1998df} nowadays are only spatially averaged. They can only be directly used in minimum-bias nuclear collisions. The only one exception is that the authors of Ref.~\cite{Helenius:2012wd} determined the two impact-parameter dependent nPDFs~\footnote{There are also a few attempts to obtain the spatial form of the nPDFs based on phenomenological models (see, e.g., Refs.~\cite{Frankfurt:2011cs,Frankfurt:2016qca,Kumano:1989eh}).} from the $A$ dependencies of the two spatially averaged nPDFs. New means of extracting the spatial dependencies of the nPDFs from experimental data are therefore desired not only because the spatially dependent nPDFs in Ref.~\cite{Helenius:2012wd} are more-or-less obsolete, but also due to the fact that a second independent validation is always valuable. The primary goal of the paper is to derive the generic expression for the DPS cross section in heavy-ion collisions by accommodating both the nuclear collision geometry and the spatially dependent nuclear modification effect. Additionally, we also suggest that the measurements of the DPS processes in minimum-bias collisions are able to constrain the impact-parameter dependent nPDFs. The remainder of the context is organized as follows. After introducing the nucleon density and the thickness function in Sec.~\ref{sec:rhoA}, we derive a new generic formula for the DPS cross section in nucleus-nuclues collisions in Sec.~\ref{sec:DPSAB}. We explore the possibility of using the DPS cross sections in $pA$ to determine the spatial dependence of the nPDFs in Sec.~\ref{sec:nPDF}. A short summary is presented in Sec.~\ref{sec:summary}. Finally, Appendix~\ref{sec:tpFpp} discusses the transverse parton profile and the overlap function, and Appendix~\ref{sec:pndiff} considers the case when the transverse position dependencies of protons and neutrons are different in a nucleus. \medskip \section{The nucleon density and the thickness function\label{sec:rhoA}} The nucleon number density in a nucleus is usually parameterized by a Woods-Saxon nucleon density function \begin{eqnarray} \rho_A(\overrightarrow{r})&=&\rho_{0,A}\frac{1+w_A(r/R_A)^2}{1+\exp{\left(\frac{r-R_A}{a_A}\right)}},\label{eq:rhoAWS} \end{eqnarray} where $r\equiv |\overrightarrow{r}|$, $\rho_{0,A}$ corresponds to the nucleon density in the center of the nucleus, $R_A$ is the radius of the nucleus $A$, $a_A$ is the skin thickness, and $w_A$ characterizes deviations from a spherical shape. The concrete values of these parameters can be found in, e.g., Ref.~\cite{DeJager:1987qc}. Such a function should work well for nuclei with $A\geq 4$. An alternative simpler density function is the so-called hard-sphere model, i.e., \begin{eqnarray} \rho_A(\overrightarrow{r})=\rho_{0,A}\theta(R_A-r),\label{eq:rhoAhardsphere} \end{eqnarray} where $\theta(x)$ is the Heaviside function. The normalization for $\rho_A$ is \begin{eqnarray} \int{d^3\overrightarrow{r}\rho_A(\overrightarrow{r})}=A. \end{eqnarray} For convenience, we also define the nucleon probability density $\hat{\rho}_A(\overrightarrow{r})\equiv \frac{\rho_A(\overrightarrow{r})}{A}$, which is normalized to unity. In the case of a single nucleon, we can write \begin{eqnarray} \rho_{N}(\overrightarrow{r})=\delta^3(\overrightarrow{r}), \end{eqnarray} where $\delta^n()$ is an $n$-dimensional Dirac delta function. For other $A<4$ nuclei, one should utilize other nucleon density profiles. For instance, a profile for deuterium was suggested in Ref.~\cite{Helenius:2012wd}. Let us consider a heavy-ion collision of $A$ (the target) and $B$ (the projectile), which is schematically shown in Fig.~\ref{fig:geometry}. Their transverse displacement is a two-dimensional vector $\overset{\rightharpoonup} b$. One considers two flux tubes located at the transverse displacement $\overset{\rightharpoonup} s$ and $\overset{\rightharpoonup}{s}-\overset{\rightharpoonup}{b}$ with respect to the centers of the target $A$ and the projectile $B$, respectively. In our notation, a three-dimensional vector $\overrightarrow{x}$ can be decomposed into a two-dimensional transverse part $\overset{\rightharpoonup}{x}$ and the longitudinal part $x_z$, i.e., $\overrightarrow{x}=(\overset{\rightharpoonup}{x},x_z)$. The two-dimensional nucleon number density or the thickness function is \begin{eqnarray} T_A(\overset{\rightharpoonup}{b})=\int_{-\infty}^{+\infty}{\rho_A(\overset{\rightharpoonup}{b},z_A)dz_A}, \end{eqnarray} where the nucleon probability density per unit transverse area is \begin{eqnarray} \hat{T}_A(\overset{\rightharpoonup}{b})\equiv \frac{T_A(\overset{\rightharpoonup}{b})}{A} = \int_{-\infty}^{+\infty}{\hat{\rho}_A(\overset{\rightharpoonup}{b},z_A)dz_A}. \end{eqnarray} The integrations of $T_A(\overset{\rightharpoonup}{b})$ and $\hat{T}_A(\overset{\rightharpoonup}{b})$ over $\overset{\rightharpoonup}{b}$ in the whole two-dimensional area result in the nucleon number $A$ and unity. One can define the thickness function $T_{AB}(\overset{\rightharpoonup}{b})$ and thickness probability function $\hat{T}_{AB}(\overset{\rightharpoonup}{b})$ for $AB$ collisions as follows: \begin{eqnarray} T_{AB}(\overset{\rightharpoonup}{b})&=&\int_{-\infty}^{+\infty}{T_A(\overset{\rightharpoonup}{s})T_B(\overset{\rightharpoonup}{s}-\overset{\rightharpoonup}{b})d^2\overset{\rightharpoonup}{s}},\nonumber\\ \hat{T}_{AB}(\overset{\rightharpoonup}{b})&=&\int_{-\infty}^{+\infty}{\hat{T}_A(\overset{\rightharpoonup}{s})\hat{T}_B(\overset{\rightharpoonup}{s}-\overset{\rightharpoonup}{b})d^2\overset{\rightharpoonup}{s}},\label{eq:TABdef} \end{eqnarray} which are normalized to $AB$ and unity after integrating over the transverse plane $\overset{\rightharpoonup}{b}$. One can interpret the thickness probability function $\hat{T}_{AB}(\overset{\rightharpoonup}{b})$ as the effective overlap area for which a nucleon in $A$ can meet with a nucleon in $B$, which is a pure geometrical factor. \begin{figure*}[hbt!] \centering \includegraphics[width=1.0\textwidth,draft=false]{AB_DPS_WD-crop.pdf} \caption{\label{fig:geometry} Schematic representations of the geometry for DPS in nucleus-nucleus collisions from (a) side and (b) beam views. The two large ellipses (circles) represent the two colliding nuclei, while the four small ellipses (circles) are the nucleons.} \end{figure*} \medskip \section{DPS in nucleus-nucleus collisions\label{sec:DPSAB}} The DPS cross section for a generic reaction $AB\to f_1f_2$ is \begin{eqnarray} &&\sigma_{AB\rightarrow f_1 f_2}^{\rm DPS}=\frac{1}{1+\delta_{f_1f_2}}\sum_{i,j,k,l}{\int{dx_1dx_2dx_1^{\prime}dx_2^{\prime}}}\nonumber\\ &&\Gamma^{ij}_{A}(x_1,x_2,\overset{\rightharpoonup}{s}_1,\overset{\rightharpoonup}{s}_2,\overset{\rightharpoonup}{u}_1,\overset{\rightharpoonup}{u}_2)\hat{\sigma}^{f_1}_{ik}(x_1,x_1^{\prime})\hat{\sigma}^{f_2}_{jl}(x_2,x_2^{\prime})\times\nonumber\\ &&\Gamma_{B}^{kl}(x_1^{\prime},x_2^{\prime},\overset{\rightharpoonup}{s}_1-\overset{\rightharpoonup}{b}+\overset{\rightharpoonup}{v}_1,\overset{\rightharpoonup}{s}_2-\overset{\rightharpoonup}{b}+\overset{\rightharpoonup}{v}_2,\overset{\rightharpoonup}{u}_1-\overset{\rightharpoonup}{v}_1,\overset{\rightharpoonup}{u}_2-\overset{\rightharpoonup}{v}_2)\nonumber\\ && d^2\overset{\rightharpoonup}{u}_1d^2\overset{\rightharpoonup}{u}_2d^2\overset{\rightharpoonup}{v}_1d^2\overset{\rightharpoonup}{v}_2d^2\overset{\rightharpoonup}{s}_1d^2\overset{\rightharpoonup}{s}_2d^2\overset{\rightharpoonup}{b},\label{eq:masterequation} \end{eqnarray} where the relevant geometry is shown in Fig.~\ref{fig:geometry}. $\hat{\sigma}^{f_1}_{ik}$ and $\hat{\sigma}^{f_2}_{jl}$ are the two partonic cross sections for $ik\to f_1$ and $jl\to f_2$ with the initial partons $i,j,k,l$ being either (anti)quarks or gluons. $\delta_{f_1f_2}$ is the Kronecker delta function to take into account the symmetry of the final states $f_1$ and $f_2$ in the reaction. There are two contributions for the generalized double parton distribution (GDPD) of the nucleus $A$.~\footnote{The parton distributions also depend on the factorization scale $\mu_F$, which we have neglected in our notations since $\mu_F$ will not affect our discussions.} They are \begin{eqnarray} &&\Gamma_A^{ij}(x_1,x_2,\overset{\rightharpoonup}{s}_1,\overset{\rightharpoonup}{s}_2,\overset{\rightharpoonup}{u}_1,\overset{\rightharpoonup}{u}_2)=\nonumber\\ &&\delta^2(\overset{\rightharpoonup}{s}_1-\overset{\rightharpoonup}{s}_2)T_A(\overset{\rightharpoonup}{s}_1)\bar{\Gamma}_{N/A}^{ij}(x_1,x_2,\overset{\rightharpoonup}{s}_1,\overset{\rightharpoonup}{u}_1,\overset{\rightharpoonup}{u}_2)\nonumber\\ &&+\frac{A-1}{2A}T_A(\overset{\rightharpoonup}{s}_1)T_A(\overset{\rightharpoonup}{s}_2)\left[\bar{\Gamma}^i_{N/A}(x_1,\overset{\rightharpoonup}{s}_1,\overset{\rightharpoonup}{u}_1)\bar{\Gamma}^j_{N/A}(x_2,\overset{\rightharpoonup}{s}_2,\overset{\rightharpoonup}{u}_2)\right.\nonumber\\ &&\left.+ \bar{\Gamma}^i_{N/A}(x_1,\overset{\rightharpoonup}{s}_2,\overset{\rightharpoonup}{u}_1)\bar{\Gamma}^j_{N/A}(x_2,\overset{\rightharpoonup}{s}_1,\overset{\rightharpoonup}{u}_2)\right]\label{eq:gammaAij} \end{eqnarray} where $\bar{\Gamma}^{ij}_{N/A}$ and $\bar{\Gamma}^i_{N/A}$ are the isospin-averaged GDPD and the isospin-averaged generalized single parton distribution (GSPD) for a nucleon in $A$. The isospin average is written as \begin{eqnarray} \bar{\Gamma}^{ij}_{N/A}&=&\overline{\sum_{N^A}}{\Gamma^{ij}_{N^A}}=\frac{1}{A}\sum_{N^A}{\Gamma^{ij}_{N^A}}=\frac{Z}{A}\Gamma^{ij}_{p^A}+\frac{A-Z}{A}\Gamma^{ij}_{n^A},\nonumber\\ \bar{\Gamma}^i_{N/A}&=&\overline{\sum_{N^A}}{\Gamma^{i}_{N^A}}=\frac{1}{A}\sum_{N^A}{\Gamma^{i}_{N^A}}=\frac{Z}{A}\Gamma^{i}_{p^A}+\frac{A-Z}{A}\Gamma^{i}_{n^A},\nonumber\\ \end{eqnarray} for a nucleus $A$ with $Z$ protons and $A-Z$ neutrons. We call $\Gamma^{ij}_{N^A}$ and $\Gamma^{i}_{N^A}$ the generalized double parton distribution in a nucleon and the generalized single parton distribution in a nucleon, respectively. We have used the bounded nucleon (bounded proton, bounded neutron) in nucleus $A$ as $N^A$ ($p^A$, $n^A$), while a free-nucleon, a free-proton, and a free-neutron are denoted as $N, p$, and $n$, respectively. The first term on the right-hand side of Eq. (\ref{eq:gammaAij}) represents the two partons $i$ and $j$, which belong to the same nucleon in nuclues $A$ with the impact parameter of the nucleon $\overset{\rightharpoonup}{s}_1$. The second term means that the two partons are from two distinct nucleons, where the prefactor $\frac{A-1}{A}$ takes into account the difference between the number of nucleon pairs and the number of different nucleon pairs. Such a factor is essential to guarantee the correct normalization of $\Gamma_A^{ij}$, which was first noticed in Refs.~\cite{Frankfurt:2004kn,Blok:2012jr}. If $A$ is a nucleon ($A=1$), the second term is zero because of the prefactor. Finally, we also have the decomposition for the GDPD $\Gamma_{B}^{kl}$ of nucleus $B$ akin to Eq. (\ref{eq:gammaAij}) for nucleus $A$. We can use the factorized ansatz for the remaining nucleon GDPD $\Gamma_{N^A}^{ij}$ and the nucleon GSPDs $\Gamma^i_{N^A}$ and $\Gamma^j_{N^A}$ as follows: \begin{eqnarray} &&\Gamma_{N^A}^{ij}(x_1,x_2,\overset{\rightharpoonup}{s}_1,\overset{\rightharpoonup}{u}_1,\overset{\rightharpoonup}{u}_2)\nonumber\\ &&=t_{N^A}(\overset{\rightharpoonup}{u}_1)t_{N^A}(\overset{\rightharpoonup}{u}_2)g_{N^A}^i(x_1,\overset{\rightharpoonup}{s}_1)g_{N^A}^j(x_2,\overset{\rightharpoonup}{s}_1),\nonumber\\ &&\Gamma^i_{N^A}(x_1,\overset{\rightharpoonup}{s}_1,\overset{\rightharpoonup}{u}_1)=t_{N^A}(\overset{\rightharpoonup}{u}_1)g_{N^A}^i(x_1,\overset{\rightharpoonup}{s}_1),\nonumber\\ &&\Gamma^j_{N^A}(x_2,\overset{\rightharpoonup}{s}_2,\overset{\rightharpoonup}{u}_2)=t_{N^A}(\overset{\rightharpoonup}{u}_2)g_{N^A}^j(x_2,\overset{\rightharpoonup}{s}_2),\label{eq:gammafact} \end{eqnarray} where we have used $t_{N^A}(\overset{\rightharpoonup}{u})$ as the transverse parton profile in the bounded nucleon $N^A$ and $g_{N^A}^i(x,\overset{\rightharpoonup}{s})$ the impact-parameter $\overset{\rightharpoonup}{s}$ dependent nPDF for the parton $i$. A similar factorized ansatz is widely used in DPS processes in (free) nucleon-nucleon collisions. It assumes the vanishing parton-parton correlations in DPS and yields the well-known ``pocket formula" for the cross section in nucleon-nucleon $N_1N_2$ collisions \begin{eqnarray} \sigma^{\rm DPS}_{N_1N_2\to f_1f_2}&=&\frac{1}{1+\delta_{f_1f_2}}\frac{\sigma_{N_1N_2\to f_1}\sigma_{N_1N_2\to f_2}}{\sigma_{{\rm eff},N_1N_2}} \end{eqnarray} with the effective cross section as \begin{eqnarray} \sigma_{{\rm eff},N_1N_2}&=&\left[\int{F_{N_1N_2}(\overset{\rightharpoonup}{v})d^2\overset{\rightharpoonup}{v}}\right]^{-1} \end{eqnarray} and the overlap function \begin{eqnarray} F_{N_1N_2}(\overset{\rightharpoonup}{v})&=&\int{t_{N_1}(\overset{\rightharpoonup}{u})t_{N_2}(\overset{\rightharpoonup}{u}-\overset{\rightharpoonup}{v})d^2\overset{\rightharpoonup}{u}}.\label{eq:overlapF} \end{eqnarray} Usually, one assumes that the transverse parton profile $t_N(\overset{\rightharpoonup}{u})$ is independent of the type of the free-nucleon $N$, which is either a proton or a neutron. Then, we are left with one single effective cross section parameter $\sigma_{{\rm eff}, N_1N_2}=\sigma_{{\rm eff}, pp}, \forall\ N_i \in \{p,n\}$. In addition, it is reasonable to assume that the transverse parton profile is not affected by the surrounding nucleons in a nucleus, i.e., $t_{N^A}(\overset{\rightharpoonup}{u})=t_{N}(\overset{\rightharpoonup}{u})$. In the following, we will use such two simplifications and retain only one $t_p$ and one $F_{pp}$ as the unique transverse parton profile and the overlap function. Further discussions about these two functions can be found in Appendix \ref{sec:tpFpp}. Motivated by the shadowing at small $x$ and the Gribov-Glauber modeling~\cite{Frankfurt:2011cs,Armesto:2010kr,Tywoniuk:2007xy} of the nPDFs, we can assume the nuclear matter effects encoded in nPDFs are only depending on the thickness function $T_A$. We can introduce the general expression as \begin{eqnarray} \frac{g^i_{N^A}(x,\overset{\rightharpoonup}{s})}{g^i_N(x)}-1=\left(\frac{g^i_{N^A}(x)}{g^i_N(x)}-1\right)G\left(\frac{T_A(\overset{\rightharpoonup}{s})}{T_A(\overset{\rightharpoonup}{0})}\right),\label{eq:bnPDF} \end{eqnarray} where $g^i_N(x)$ is the free-nucleon $N$ PDF for parton $i$ and $g^i_{N^A}(x)$ is the spatially averaged nucleon $N$ PDF for parton $i$ in $A$. $G()$ can be an arbitrary function~\footnote{A reasonable constraint one can impose is $\lim_{|\overset{\rightharpoonup}{s}|\to +\infty}{G\left(\frac{T_A(\overset{\rightharpoonup}{s})}{T_A(\overset{\rightharpoonup}{0})}\right)}=0$. This can be understood because, at sufficiently large distance, the nucleons would behave like free particles. We, however, will not use such a constraint in the following discussions.} with the normalization condition \begin{eqnarray} \int{T_A(\overset{\rightharpoonup}{s})G\left(\frac{T_A(\overset{\rightharpoonup}{s})}{T_A(\overset{\rightharpoonup}{0})}\right)d^2\overset{\rightharpoonup}{s}}&=&A. \end{eqnarray} The simple form $G\left(\frac{T_A(\overset{\rightharpoonup}{s})}{T_A(\overset{\rightharpoonup}{0})}\right)=\frac{AT_A(\overset{\rightharpoonup}{s})}{T_{AA}(\overset{\rightharpoonup}{0})}$ is the most frequently used one in the literature~\cite{Eskola:1991ec,Emelyanov:1999pkc,Klein:2003dj,Vogt:2004dh,Vogt:2004hf,Ferreiro:2008wc, Vogt:2010aa} and also in the {\sc\small hijing} event generator~\cite{Gyulassy:1994ew}. However, such a simple form conflicts with the $A$ dependence of the nPDF global fit~\cite{Helenius:2012wd}. A study based on the $A$ dependencies of the nPDFs reveals that a polynomial function $G()$ with terms up to $\left(\frac{T_A(\overset{\rightharpoonup}{s})}{T_A(\overset{\rightharpoonup}{0})}\right)^4$ can reproduce the nPDF $A$ dependence over the entire $x$ range. In the following, for simplicity, we will use the abbreviations $G_{A,1}(\overset{\rightharpoonup}{s})\equiv G\left(\frac{T_A(\overset{\rightharpoonup}{s})}{T_A(\overset{\rightharpoonup}{0})}\right)$, $G_{A,2}(\overset{\rightharpoonup}{s})\equiv 1-G_{A,1}(\overset{\rightharpoonup}{s})$, $g^i_{N^A,1}(x)\equiv g^i_{N^A}(x)$, and $g^i_{N^A,2}(x)\equiv g^i_{N}(x)$. Therefore, Eq.~(\ref{eq:bnPDF}) can be reformulated as \begin{eqnarray} g^i_{N^A}(x,\overset{\rightharpoonup}{s})&=&\sum_{m=1}^{2}{g^i_{N^A,m}(x)G_{A,m}(\overset{\rightharpoonup}{s})}.\label{eq:bnPDF2} \end{eqnarray} After applying the ansatz Eq.~(\ref{eq:gammafact}) and the relation Eq.~(\ref{eq:bnPDF2}) into Eq.~(\ref{eq:masterequation}), we arrive at the main result of the paper \begin{eqnarray} &&\sigma^{\rm DPS}_{AB\to f_1f_2}=\frac{1}{1+\delta_{f_1f_2}}\sum_{N_1^A,N_2^A,N_1^B,N_2^B}{\sum_{m_1,m_2,m_3,m_4=1}^{2}}\nonumber\\ &&\times \left(\sigma^{m_1m_3}_{N_1^AN_1^B\to f_1}\sigma^{m_2m_4}_{N_2^AN_2^B \to f_2}\right)\nonumber\\ &&\times \left[\delta_{N_1^AN_2^A}\delta_{N_1^BN_2^B}\frac{\hat{T}_{A,m_1m_2}\hat{T}_{B,m_3m_4}}{\sigma_{{\rm eff},pp}}\right.\nonumber\\ &&+\delta_{N_1^BN_2^B}\frac{A-1}{A}\hat{T}^{(2)}_{nA,m_1m_2}\hat{T}_{B,m_3m_4}\nonumber\\ &&+\delta_{N_1^AN_2^A}\frac{B-1}{B}\hat{T}_{A,m_1m_2}\hat{T}^{(2)}_{nB,m_3m_4}\nonumber\\ &&\left.+\frac{(A-1)(B-1)}{AB}\hat{T}^{(2)}_{nAB,m_1m_2m_3m_4}\right],\label{eq:mainAB} \end{eqnarray} where we have used \begin{eqnarray} &&\sigma^{m_1m_3}_{N_1^AN_1^B\to f_1}=\nonumber\\ &&\sum_{i,k}{\int{dx_1dx_1^\prime g^i_{N_1^A,m_1}(x_1)g^k_{N_1^B,m_3}(x_1^\prime)\hat{\sigma}_{ik}^{f_1}(x_1,x_1^\prime)}},\nonumber\\ &&\sigma^{m_2m_4}_{N_2^AN_2^B\to f_2}=\nonumber\\ &&\sum_{j,l}{\int{dx_2dx_2^\prime g^j_{N_2^A,m_2}(x_2)g^l_{N_2^B,m_4}(x_2^\prime)\hat{\sigma}_{jl}^{f_2}(x_2,x_2^\prime)}}. \end{eqnarray} In addition, the symbols $\hat{T}$ are defined as \begin{eqnarray} &&\hat{T}_{A,m_1m_2}=\int{\hat{T}_A(\overset{\rightharpoonup}{b})G_{A,m_1}(\overset{\rightharpoonup}{b})G_{A,m_2}(\overset{\rightharpoonup}{b})d^2\overset{\rightharpoonup}{b}},\nonumber\\ &&\hat{T}_{nA,m_1m_2}^{(2)}=\int{\left(\hat{T}_{nA,m_1}(\overset{\rightharpoonup}{b})\hat{T}_{nA,m_2}(\overset{\rightharpoonup}{b})\right)d^2\overset{\rightharpoonup}{b}},\nonumber\\ &&\hat{T}^{(2)}_{nAB,m_1m_2m_3m_4}=\frac{1}{2}\int{\left[\hat{T}_{nAB,m_1m_3}(\overset{\rightharpoonup}{b})\hat{T}_{nAB,m_2m_4}(\overset{\rightharpoonup}{b})\right.}\nonumber\\ &&\left.+\hat{T}_{nAB,m_1m_4}(\overset{\rightharpoonup}{b})\hat{T}_{nAB,m_2m_3}(\overset{\rightharpoonup}{b})\right]d^2\overset{\rightharpoonup}{b},\nonumber\\ &&\hat{T}_{nA,m}(\overset{\rightharpoonup}{b})=\int{F_{pp}(\overset{\rightharpoonup}{v})\hat{T}_A(\overset{\rightharpoonup}{v}-\overset{\rightharpoonup}{b})G_{A,m}(\overset{\rightharpoonup}{v}-\overset{\rightharpoonup}{b})d^2\overset{\rightharpoonup}{v}},\nonumber\\ &&\hat{T}_{nAB,m_1m_2}(\overset{\rightharpoonup}{b})=\int{F_{pp}(\overset{\rightharpoonup}{v})\hat{T}_{AB,m_1m_2}(\overset{\rightharpoonup}{b}-\overset{\rightharpoonup}{v})d^2\overset{\rightharpoonup}{v}},\nonumber\\ &&\hat{T}_{AB,m_1m_2}(\overset{\rightharpoonup}{b})=\int{\left[\hat{T}_A(\overset{\rightharpoonup}{s})G_{A,m_1}(\overset{\rightharpoonup}{s})\right.}\nonumber\\ &&\left.\times\hat{T}_B(\overset{\rightharpoonup}{s}-\overset{\rightharpoonup}{b})G_{B,m_2}(\overset{\rightharpoonup}{s}-\overset{\rightharpoonup}{b})\right]d^2\overset{\rightharpoonup}{s}. \end{eqnarray} Because of the normalization relations, we have \begin{eqnarray} \hat{T}_{A,12}&=&\hat{T}_{A,21}=-\hat{T}_{A,22}=1-\hat{T}_{A,11}. \end{eqnarray} The interpretation of the four terms in the brackets of Eq.~(\ref{eq:mainAB}) is straightforward. They represent three different DPS contributions from nucleus-nucleus interactions. The first term is from the two pairs of the colliding partons belonging to the same pair of incident nucleons. The second and the third terms originate from the two partons from a nucleon in a nucleus interaction with the two partons from two different nucleons in another nucleus. The last term is the contribution of the two pairs of partons belonging to two different nucleons from both nuclei. A few special situations are worth being explored. When we take the identity of the impact-parameter dependent nPDF $g^i_{N^A}(x,\overset{\rightharpoonup}{s})$ and the spatially averaged nPDF $g^i_{N^A}(x)$ via $G_{A,1}(\overset{\rightharpoonup}{s})=1$ and $G_{A,2}(\overset{\rightharpoonup}{s})=0$, we can recover the well-known DPS formula in $AB$ collisions [see, e.g., Eqs.(1) and (2) in Ref.~\cite{Helenius:2019uge}], which, however, does not take into account the spatially dependent initial nuclear modifications. Moreover, if we set $g^i_{N^A}(x)=g^i_{N}(x)$ (i.e., zero nuclear modification), we have $g_{N^A,1}^i(x)=g_{N^A,2}^i(x)=g^i_{N}(x)$. The final expression is independent of $G()$, as it must be. Finally, if we take nucleus $B$ as a proton, which amounts to setting $B=1,G_{B,1}(\overset{\rightharpoonup}{s})=1$, and $G_{B,2}(\overset{\rightharpoonup}{s})=0$, Eq.~(\ref{eq:mainAB}) is reduced to \begin{eqnarray} &&\sigma^{\rm DPS}_{Ap\to f_1f_2}=\frac{1}{1+\delta_{f_1f_2}}\sum_{N_1^A,N_2^A}{\sum_{m_1,m_2=1}^{2}}\nonumber\\ &&\times \left(\sigma^{m_1 1}_{N_1^A p\to f_1}\sigma^{m_2 1}_{N_2^A p \to f_2}\right)\nonumber\\ &&\times \left[\delta_{N_1^AN_2^A}\frac{\hat{T}_{A,m_1m_2}}{\sigma_{{\rm eff},pp}}+\frac{A-1}{A}\hat{T}^{(2)}_{nA,m_1m_2}\right].\label{eq:mainAp} \end{eqnarray} This gives rise to a DPS formula in $pA$ (or $Ap$) collisions. If $A\gg 1$, we can impose a good approximation $F_{pp}(\overset{\rightharpoonup}{v})\approx \delta^2(\overset{\rightharpoonup}{v})$. This can be understood because a nucleon in a heavy nucleus looks like a point in space. Then, \begin{eqnarray} \hat{T}_{nA,m}(\overset{\rightharpoonup}{b})&\approx& \hat{T}_A(\overset{\rightharpoonup}{b})G_{A,m}(\overset{\rightharpoonup}{b}),\nonumber\\ \hat{T}_{nAB,m_1m_2}(\overset{\rightharpoonup}{b})&\approx& \hat{T}_{AB,m_1m_2}(\overset{\rightharpoonup}{b}).\label{eq:Fvapprox} \end{eqnarray} With such a simplification, the transverse parton profile $t_p$ will only enter into $\sigma_{{\rm eff},pp}$ in Eqs.~(\ref{eq:mainAB}) and (\ref{eq:mainAp}). The goodness for the above approximation will be validated in Appendix \ref{sec:tpFpp} with a few concrete modelings of $F_{pp}(\overset{\rightharpoonup}{v})$. Finally, it would be useful to consider a few exceptional cases in which our assumptions do not hold. The first case is when our factorization ansatz Eq.~(\ref{eq:bnPDF}) is violated by, for instance, the existence of strong correlations~\cite{Alvioli:2014eda}. The concrete formulas (\ref{eq:mainAB}) and (\ref{eq:mainAp}) for DPS cross sections should be revised depending on the new ansatz. Our general idea of using DPS cross sections in minimum-bias nuclear collisions as a sensitive probe of the transverse position dependence of the nuclear modification of parton densities is, however, still valid. For simplicity, we have not discriminated the possible different transverse position dependencies of protons and neutrons in nuclei, also known as the neutron skin effect (see, e.g., in Refs.~\cite{Abrahamyan:2012gp,Tarbert:2013jze,Paukkunen:2015bwa}). Since the first sums in Eqs.~(\ref{eq:mainAB}) and (\ref{eq:mainAp}) run over all possible (bounded) nucleons, it is easy to incorporate such an effect, which can be found in Appendix \ref{sec:pndiff}. \medskip \section{Impact-parameter dependent nuclear PDF from DPS\label{sec:nPDF}} From Eqs.~(\ref{eq:mainAB}) and (\ref{eq:mainAp}), we know that the DPS cross sections in nuclear collisions depend on the function $G()$ characterizing the impact-parameter dependence of nPDFs, as introduced in Eq.~(\ref{eq:bnPDF}). In turn, we can view DPS as a probe to determine the spatial dependence $G()$. The task of DPS cross section extraction from experimental data is, however, far from nontrivial due to the presence of the contamination from the SPS contribution. An ideal case is to look for a process in which the SPS contribution is suppressed. A few such examples are same-sign open charm~\cite{Aaij:2012dz}, $J/\psi+$charm~\cite{Aaij:2012dz}, $\Upsilon+$charm~\cite{Aaij:2015wpa},~\footnote{A recent calculation based on $k_T$ factorization~\cite{Karpishkov:2019vyt} shows that SPS is very big in $\Upsilon+$charm production.} and $J/\psi+\Upsilon$~\cite{Shao:2016wor,Abazov:2015fbl} production. In order to avoid the complications from the final-state nuclear effects, we only take the $pA$ collisions as an example here. The above mentioned processes are dominated by gluon-gluon initial state at the LHC energies, which is blind with the isospin effect. For these gluon-induced processes, Eq.~(\ref{eq:mainAp}) can be further simplified. The nuclear modification factor is expressed as \begin{eqnarray} &&R^{\rm DPS}_{pA \to f_1f_2}\equiv \frac{\sigma_{pA \to f_1f_2}^{\rm DPS}}{A\sigma_{pp\to f_1f_2}^{\rm DPS}}\nonumber\\ &=&\sum_{i,j=1}^2{\left(\hat{T}_{A,ij}+(A-1)\sigma_{{\rm eff},pp}\hat{T}^{(2)}_{nA,ij}\right)\left(R_{pA}^{f_1}\right)^{2-i}\left(R_{pA}^{f_2}\right)^{2-j}}\label{eq:RpAgg} \end{eqnarray} with $R_{pA}^{f}\equiv \frac{\sigma_{pA\to f}}{A\sigma_{pp\to f}}$ in the minimum-bias collisions. One reasonable approximation we can take is that the nucleon number density follows the hard-sphere form of Eq.~(\ref{eq:rhoAhardsphere}). Then, the thickness function is $T_A(\overset{\rightharpoonup}{b})=\frac{3A}{2\pi R_A^2}\sqrt{1-|\overset{\rightharpoonup}{b}|^2/R_A^2}\theta(R_A-|\overset{\rightharpoonup}{b}|)$. For illustration purposes only, we consider $G(x)$ as a monomial in the argument $x$ only here, although its practical form can be sufficiently complicated. Therefore, the analytical expression of $G_{A,1}$ is $G_{A,1}(\overset{\rightharpoonup}{b})=\frac{a+3}{3}\left(\frac{T_A(\overset{\rightharpoonup}{b})}{T_A(\overset{\rightharpoonup}{0})}\right)^a$. Then, we can derive \begin{eqnarray} &&\hat{T}_{A,11}\approx\frac{3^{1-2a}\left(a+3\right)^{2a}}{2a+3},\nonumber\\ &&\hat{T}_{nA,11}^{(2)}\approx\frac{9^{1-a}(a+3)^{2a}}{4(a+2)\pi R_A^2},\nonumber\\ &&\hat{T}_{nA,12}^{(2)}=\hat{T}_{nA,21}^{(2)}\approx\frac{3^{2-a}(a+3)^{a}}{2\left(a+4\right)\pi R_A^2}-\frac{9^{1-a}(a+3)^{2a}}{4\left(a+2\right)\pi R_A^2},\nonumber\\ &&\hat{T}_{nA,22}^{(2)}\approx\frac{9}{8\pi R_A^2}-\frac{3^{2-a}(a+3)^{a}}{\left(a+4\right)\pi R_A^2}+\frac{9^{1-a}(a+3)^{2a}}{4\left(a+2\right)\pi R_A^2}. \end{eqnarray} In such a case, the nuclear modification factor becomes \begin{eqnarray} &&R_{pA \to f_1f_2}^{\rm DPS}\approx R_{pA}^{f_1}R_{pA}^{f_2}\left(\frac{3^{1-2a}(a+3)^{2a}}{2a+3}\right.\nonumber\\ &&\left.+\sigma_{{\rm eff},pp}\frac{(A-1)9^{1-a}(a+3)^{2a}}{4(a+2)\pi R_A^2}\right)\nonumber\\ &&+\left(R_{pA}^{f_1}+R_{pA}^{f_2}\right)\left[1-\frac{3^{1-2a}(a+3)^{2a}}{2a+3}\right.\nonumber\\ &&\left.+\sigma_{{\rm eff},pp}\left(A-1\right)\left(\frac{3^{2-a}(a+3)^a}{2(a+4)\pi R_A^2}-\frac{9^{1-a}(a+3)^{2a}}{4(a+2)\pi R_A^2}\right)\right]\nonumber\\ &&+\left[\frac{3^{1-2a}(a+3)^{2a}}{2a+3}-1+\sigma_{{\rm eff},pp}\left(A-1\right)\right.\nonumber\\ &&\left.\times\left(\frac{9}{8\pi R_A^2}+\frac{9^{1-a}(a+3)^{2a}}{4(a+2)\pi R_A^2}-\frac{3^{2-a}(a+3)^a}{(a+4)\pi R_A^2}\right)\right]. \end{eqnarray} It is easy to check that, when $a=0$ (zero spatial dependence), we are left with the first term proportional to $R_{pA}^{f_1}R_{pA}^{f_2}$. Let us take the lead (Pb) beam with $A=208$, $R_A=6.624$ fm, and $\sigma_{{\rm eff},pp}=15$ mb as a special example. Such a beam is available at the LHC. Different numbers of the power $a$ in $G(x)\propto x^a$ predict quite different values of the nuclear modification factor $R_{pA \to f_1f_2}^{\rm DPS}$, as reported in Fig.~\ref{fig:RpADPS}. The curves corresponding to five different values of $R_{pA}^f=R_{pA}^{f_1}=R_{pA}^{f_2}$ are displayed. $R_{pA\to f_1f_2}^{\rm DPS}$ dramatically increases when $a>1.5, 2.0, 3.0$ and $1.0$ for $R_{pA}^f=0.4,0.6,0.8$, and $1.2$. As anticipated, the curve of $R_{pA}^f=1.0$ (no nuclear modification) is independent of $G(x)$ (or $a$). As realistic examples, $R_{pA}^f$ from the single-$f$ inclusive processes, with $f$ being either the open charm or $J/\psi$ mesons at the LHC proton-lead collisions were precisely measured to be close to $0.6$ in the forward rapidity region (see, e.g., Fig.1 in Ref.~\cite{Kusina:2017gkz}). The $a=0,1,2$, and $3$ predict $R_{pA\to f_1f_2}^{\rm DPS}=1.27, 1.22, 1.07$, and $7.26$ in the same kinematic regime. These numbers can be refined by using the Woods-Saxon density [cf. Eq.~(\ref{eq:rhoAWS})] and with a concrete parton overlap function $F_{pp}(\overset{\rightharpoonup}{v})$ [cf. Eq.~(\ref{eq:overlapF})]. The numerical differences with respect to what we have shown should be minor though. From this example, we have clearly shown that the nuclear modification factors of $J/\psi$ plus open charm and same-sign charm production in proton-lead collisions will provide precious inputs for determining the impact-parameter dependent nPDFs. Such measurements are independent of the centrality-based measurements, where the latter ones are crucially dependent on Glauber modeling (see, e.g., Refs.~\cite{Vogt:1999jp,Miller:2007ri}) and are subject to large uncertainties, particularly in proton-nucleus collisions. \begin{figure}[hbt!] \centering \includegraphics[width=1.0\columnwidth,draft=false]{RpPb_DPS_sigmaeff15-crop.pdf} \caption{\label{fig:RpADPS} $R_{pA\to f_1f_2}^{\rm DPS}$ dependence of $a$, where $a$ is the power of $x$ in $G(x)$ via $G(x)\propto x^a$. Five different exemplified values $R_{pA}^f=R_{pA}^{f_1}=R_{pA}^{f_2}$ are shown.} \end{figure} \medskip \section{Summary\label{sec:summary}} In this paper, for the first time, we have considered both the nuclear collision geometry and the impact-parameter dependent nuclear modification in the nPDFs for DPS processes in heavy-ion collisions. A simple generic equation (\ref{eq:mainAB}) has been derived for evaluating the DPS cross sections in nucleus-nucleus collisions, while its $pA$ counterpart is given in Eq.~(\ref{eq:mainAp}). Both of the above effects are important in scrutinizing the DPS heavy-ion data. The latter is particular relevant when the nuclear modification encoded in the nPDFs is significant (e.g. the open/hidden charm and beauty production~\cite{Kusina:2017gkz} at the LHC). In turn, we can also extract the spatial dependence of the nPDFs by measuring DPS cross sections in minimum-bias nuclear collisions. We take the gluon-induced charm and beauty production processes as an example. $\sigma_{{\rm eff},pp}$ can be determined from their $pp$ data (e.g., Ref.~\cite{Aaij:2012dz}), and $R_{pA}^{f_1}$ and $R_{pA}^{f_2}$ are measured in their single inclusive processes. The measurements of the DPS nuclear modification factor $R^{\rm DPS}_{pA\to f_1f_2}$ can be readily used to pin down the spatial function $G()$ entering into the impact-parameter dependent nPDFs. Such an approach has the virtue of independence of Glauber modeling. \acknowledgments I would like to thank Michael Winn for the useful comments on the manuscript. The work is supported by the ILP Labex (ANR-11-IDEX-0004-02, ANR-10-LABX-63).
\section{Introduction} \label{sec:introduction}} \input{sections/introduction} \section{Background and related work} \label{sec:background} \input{sections/background} \section{Class integration testing} \label{sec:approach} \input{sections/approach} \section{Empirical evaluation} \label{sec:evaluation} \input{sections/evaluation} \section{Evaluation Results} \label{sec:results} \input{sections/results} \section{Discussion} \label{sec:discussion} \input{sections/discussion} \section{Threats to validity} \label{sec:threats} \input{sections/threats} \section{Conclusion and future work} \label{sec:future-conclusion} \input{sections/future-conclusion} \ifCLASSOPTIONcompsoc \section*{Acknowledgments} \else \section*{Acknowledgment} \fi This research was partially funded by the EU Project STAMP ICT-16-10 No.731529, the EU Horizon 2020 H2020-ICT-2020-1-RIA ``COSMOS'' project (No.957254), and the NWO Vici project ``TestShift'' (No. VI.C.182.032). \balance \bibliographystyle{IEEEtran} \subsection{Coupled Branch testing criterion} \label{sec:approach:coupledBranchDef} To test the integration between two classes $E$ and $R$, we need to define a coverage criterion that helps us to measure how thoroughly a test suite $T$ exercises the interaction calls between the two classes ($E$ and $R$). One possible coverage criterion would consist of testing all possible paths (\textit{inter-class path coverage}) that start from the entry node of the caller $R$, execute the integration calls to $E$ and terminate in one of the exit points of $R$. However, such a criterion will be affected by the \textit{path explosion problem}~\cite{Baier2008}: the number of paths increases exponentially with the cyclomatic complexity of $E$ and $R$, and thus the number of interaction calls between the two classes. To avoid the \textit{path explosion problem}, we define an inte\-gra\-tion-level coverage criterion, namely the Coupled Branch Criterion (CBC), where the number of coverage targets remains polynomial to the cyclomatic complexity of $E$ and $R$. More precisely, CBC focuses on call coupling between caller and callee classes. Intuitively, let $s \in R$ be a call site, \textit{i.e.,~} a call statement to a method of the class $E$. Our criterion requires to cover all pairs of branches $ (b_r, b_e)$, where $b_r$ is a branch in $R$ that leads to $s$ (the method call), and $b_e$ is a branch of the callee $E$ that is not trivially covered by every execution of $E$. So, in the worst case, the number of coverage targets is quadratic in number of branches in the caller and callee classes. \subsubsection{Target caller branches} Among all branches in the caller class, we are interested in covering the branches that are not trivially (always) executed, and they always lead to the integration call site (\textit{i.e.,~} calling the callee class) when covered. We refer to these branches as \textit{target branches} for the caller. \begin{definition}[Target branches for the caller] For a call site $s$ in $R$, the set of target branches $B_{R}(s)$ for the caller $R$ contains the branches having the following characteristics: \begin{inparaenum}[(i)] \item the branches are outgoing edges for the node on which $s$ is control dependent (\textit{i.e.,~} nodes for which $s$ post-dominates one of its outgoing branches but does not post-dominate the node itself); and \item the branches are post-dominated by $s$, \textit{i.e.,~} branches for which all the paths through the branch to the exit point pass through $s$. \end{inparaenum} \end{definition} To understand how we determine the target branches in the caller, let us consider the example of the caller and the callee in Figure~\ref{fig:CCFF_new}. The code for the class \texttt{Per\-son} is reported in Listing~\ref{list:ClassA}. The class \texttt{Per\-son} contains two methods, \texttt{add\-Energy()} and \texttt{drive\-To\-Home()}, with the latter invoking the former (line 6 in Listing~\ref{list:ClassA}). The method \texttt{Person.addEnergy()} invokes the method \texttt{refuel()} of the class \texttt{Car} (line 16 in Listing~\ref{list:ClassA}). The method \texttt{Person.driveToHome()} invokes the method \texttt{Car.drive()} (line 8 in Listing~\ref{list:ClassA}). Therefore, the class \textit{Person} is the caller, while \texttt{Car} is the callee. Figure~\ref{fig:CCFF_new} shows an excerpt of the Class-level Control Flow Graphs (CCFGs) for the two classes. In the figure, the names of the nodes are labelled with the line number of the corresponding statements in the code of Listing~\ref{list:ClassA}. Node 16 in \texttt{Per\-son.add\-Energy()} is a call site to \texttt{Car.re\-fuel()}; it is also control dependent on nodes 5 (\texttt{Person.drive\-To\-Home()}) and 13 (\texttt{Person.add\-Energy()}). Furthermore, node 16 only post-dominates branch $\langle 13,16\rangle$. Instead, the branch $\langle 5,6c\rangle$ is not post-dominated by node 16 as covering $\langle 5,6c\rangle$ does not always imply covering node 16 as well. Therefore, the branches in the caller \texttt{Person.addEnergy()} that always lead to the callee are $B_{\mathtt{Person}}(\mathtt{Car.refuel()})=\{\langle 13,16\rangle\}$. Hence, among all branches in the caller class (\texttt{Person} in our example), we are interested in covering the branches that, when executed, always lead to the integration call site (i.e., calling the callee class). We refer to these branches as \textit{target branches} for the caller. \subsubsection{Target callee branches} Like the target branches of the caller, the target branches of the callee are branches that are not trivially (always) executed each time the method is called. \begin{definition}[Target branches for the callee] The set of target branches $B_{E}(s)$ for the callee $E$ contains branches satisfying the following properties: \begin{inparaenum}[(i)] \item the branches are among the outgoing branches of branching nodes (\textit{i.e.,~} the nodes having more than one outgoing edge); and \item the branches are accessible from the entry node of the method called in $s$. \end{inparaenum} \end{definition} Let us consider the example of Figure~\ref{fig:CCFF_new} again. This time, let us look at the branches in the callee (\texttt{Car}) that are directly related to the integration call. In the example, executing the method call \texttt{Car.refuel()} (node 16 of the method \texttt{Person.addEnergy()}) leads to the execution of the branching node $b8$ of the class \texttt{Car}. Hence, the set of branches affected by the interaction calls is $B_{\mathtt{Car}}(\mathtt{Car.refu}$-$\mathtt{el()}) = \{\langle b8,b9\rangle;$ $\langle b8,b10\rangle\}$. In the following, we refer to these branches as target branches for the callee. Note that, for a call site $s$ in $R$ calling $E$, the set of target branches for the callee also includes branches that are trivially executed by any execution of $s$. \subsubsection{Coupled branches} \label{sec:approach:coupledBranches} Given the sets of target branches for both the caller and callee, an integration test case should exercise at least one target branch for the caller (branch affecting the integration call) and one target branch for the callee (i.e., the integration call should lead to covering branches in the callee). In the following, we define pairs of target branches $(b_r \in B_{R}(s), b_e \in B_{E}(s))$ as \textit{coupled branches} because covering $b_r$ can lead to covering $b_e$ as well. \begin{definition}[Coupled branches] Let $B_{R}(s)$ be the set of target branches in the caller class $R$; let $B_{E}(s)$ be the set of target branches in the callee class $E$; and let $s$ be the call site in $R$ to the methods of $E$. The set of coupled branches $CB_{R,E}(s)$ is the cartesian product of $B_{R}(s)$ and $B_{E}(s)$: \begin{equation}\label{def2} CB_{R,E}(s) = CB_{R,E}(s) = B_{R}(s) \times B_{E}(s) \end{equation} \end{definition} In our example of Figure~\ref{fig:CCFF_new}, we have two coupled branches: the branches $(\langle 13,16\rangle,\langle b8,b9\rangle)$ and the branches $(\langle 13,16\rangle$, $\langle b8,b10\rangle)$. \begin{definition}[Set of coupled branches]\label{def3} Let $S=(s_1, \dots, s_k)$ be the list of call sites from a caller $R$ to a callee $E$, the set of coupled branches for $R$ and $E$ is the union of the coupled branches for the different call sites $S$: $$CB_{R,E} = \cup_{s \in S} CB_{R,E}(s)$$ \end{definition} \subsubsection{Coupled Branches Criterion (CBC)}\label{sec:approach:coupledBranchCrit} Based on the definition above, the CBC criterion requires that for all the call sites $S$ from a caller $R$ to a callee $E$, a given test suite $T$ covers all the coupled branches: $$ CBC_{R,E} = \frac{ \vert \{(r_i,e_i) \in CB_{R,E} \vert \exists t \in T: t \ covers \ r_i \ and \ e_i\} \vert }{ \vert CB_{R,E} \vert } $$ We do note that this formula is only relevant if there are indeed call interactions between caller and callee. As for classical branch and branch-pair coverage, $CB_{R,E}$ may contain incompatible branch-pairs (\textit{e.g.,~} when the conditions are mutually exclusive). However, detecting and filtering such pairs is an undecidable problem. Hence, in this study, we target all coupled branches. \subsubsection{Inheritance and polymorphism} \label{subsec:inheritance} \begin{lstlisting}[frame=tb, caption={Class GreenPerson}, label=list:ClassAPrime, captionpos=t, numbers=left, belowskip=-2em, float=t, language=java, firstnumber=1] class GreenPerson extends Person{ private HybridCar car = new HybridCar(); @override public void addEnergy(){ if(this.lazy){ takeBus(); }else if (chargerAvailable()){ car.recharge() }else{ car.refuel(); } } private void chargerAvailable(){ if(ChargingStation.takeavailableStations().size > 0){ return true; } return false; } } \end{lstlisting} In the special case where the caller and callee classes are in the same inheritance tree, we use a different procedure to build the CCFG of the super-class and find the call sites $S$. The CCFG of the super-class is built by merging the CFGs of the methods that are not overridden by the sub-class. As previously, the CCFG of the sub-class is built by merging the CFGs of the methods defined in this class, including the inherited methods overridden by the sub-class (other non-overridden inherited methods are not part of the CCFG of the sub-class). \begin{figure}[!t] \vspace{1.5mm} \includegraphics[width=0.94\linewidth]{figures/GreenPerson2} \caption{CCFG of $GreenPerson$ as subclass} \label{fig:greenPersonCCFG} \end{figure} For instance, the class \texttt{GreenPerson} in Listing \ref{list:ClassAPrime}, representing owners of hybrid cars, extends class \texttt{Person} from Listing \ref{list:ClassA}. For adding energy, a green person can either refuel or recharge her car (lines 7 to 11). \texttt{Green\-Person} overrides the method \texttt{Person.add\-En\-er\-gy()} and defines an additional method \texttt{Green\-Person.char\-ger\-Avai\-la\-ble()} indicating whether the charging station is available. Only those two methods are used in the CCFG of the class \texttt{Green\-Person} presented in Figure \ref{fig:greenPersonCCFG}, inherited methods are not included in the CCFG; the CCFG of the super-class \texttt{Person} does not contain the method \texttt{Person.addEnergy()}, redefined by the sub-class \texttt{GreenPerson}. The call sites $S$ are identified according to the CCFGs, depending on the caller and the callee. If the caller $R$ is the super-class, $S$ will contain all the calls in $R$ to methods that have been redefined by the sub-class. For instance, nodes 6 and 13 in Figure \ref{fig:CCFF_new} with \texttt{Person} as caller. If the caller $R$ is the sub-class, $S$ will contain all the calls in $R$ to methods that have been inherited but not redefined by $R$. For instance, node 7c in Figure \ref{fig:greenPersonCCFG} with \texttt{GreenPerson} as caller. \subsection{\integration} \label{sec:cling} \integration is the tool that we have developed to generate integration-level test suites that maximize the proposed CBC adequacy criterion. The inputs of \integration are the (1) \textit{application's bytecode}, (2) a \textit{caller class} $R$, and (3) \textit{callee class} $E$. As presented in Figure \ref{fig:approach}, \integration first detects the covering methods (step \circled{1}) and identifies the coupled branches $CB_{R,E}(s)$ for the different call sites (step \circled{2}), before starting the search-based test case generation process (detailed in the following subsections). \integration produces a test suite that maximizes the CBC criterion for $R$ and $E$. Satisfying the CBC criterion is essentially a many-objective problem where integration-level test cases have to cover pairs of coupled branches separately. In other words, each pair of coupled branches corresponds to a search objective to optimize. The next subsection describes our search objectives. \subsubsection{Search objectives} In our approach, each objective function measures the distance of a generated test from covering one of the coupled branch pairs. The value ranges between $[0,+\infty)$ (zero denoting that the objective is satisfied). Assuming that $CB_{R,E} = \{c_1, c_2, \ldots, c_n \}$ is the set of coupled branches $\langle r_i, e_i \rangle$ between $R$ and $E$. Then, the fitness for a test case $t$ is defined by the following distinct objectives: \begin{equation}\label{eq:fitness_functions} \setlength{\nulldelimiterspace}{0pt} Objectives=\left\{ \begin{IEEEeqnarraybox}[\relax][c]{x} $d(c_1,t) = D(r_1,t) \oplus D(e_1,t)$\\ \dots\\ $d(c_n,t) = D(r_n,t) \oplus D(e_n,t)$\\ \end{IEEEeqnarraybox}\right. \end{equation} \noindent where $D(b,t) = al(b,t) + bd(b,t) $ computes the distance between the test $t$ to the branch $b$ using the classical approach level $al(b,t)$ (\textit{i.e.,~} the minimum number of control dependencies between $b$ and the execution path of $t$) and normalized branch distance $bd(b,t)$ (\textit{i.e.,~} the distance, computed based on a set of rules, to the branch leading to $b$ in the closest node on the execution path of $t$) \cite{McMinn2004}; and $D(r_i,t) \oplus D(e_i,t)$ is defined as $D(r_i,t) + 1 $ if $D(r_i,t) > 0$ (\textit{i.e.,~} the caller branch is not covered) and $D(e_i,t)$ otherwise (\textit{i.e.,~} the caller branch is covered). For example, let assume that we want to measure the fitness of a test case $t'$, generated during the search process while targeting coupled branches from the classes \texttt{Person} (caller class) and \texttt{Car} (callee class). This test case covers the following path in the CCFG depicted by Figure \ref{fig:CCFF_new}: $Entry \rightarrow 13 \rightarrow 16 \rightarrow b8 \rightarrow b10 \rightarrow Exit$. As explained in Section \ref{sec:approach:coupledBranches}, this pair of classes contain two coupled branches: $(\langle 13,16\rangle,\langle b8,b10\rangle)$ and $(\langle 13,16\rangle,\langle b8,b9\rangle)$, each one corresponding to a search objective. Since $t'$ covers both of the branches in the first couple, the objective corresponding to that couple is fulfilled and its fitness value is 0. In contrast, $t'$ only covers the first branch of the second couple (\textit{i.e.,~} $\langle b8,b9\rangle$ is not covered). In this case, $D(r,t')$ equals zero, but $D(e,t')$ is calculated using the approach level and branch distance heuristics. Since $t'$ covers all of the control dependent branches the approach level, $al(b,t')$, equals zero. The branch distance, $bd(b,t') \in [0,1]$, is calculated according to the concrete values used in the branching condition in the last covered control dependent node (here, $b8$) where the execution path of $t'$ changed away from reaching to the second target branch $\langle b8,b9\rangle$. \subsubsection{Search algorithm} To solve such a many-objective problem, we tailored the Many-Objective Sorting Algorithm (MOSA)~\cite{Panichella2015} to generate test cases through class integration. MOSA has been introduced and assessed in the context of unit test generation~\cite{Panichella2015} and security testing~\cite{jan2019search}. Additionally, previous studies~\cite{Campos2018, Panichella2015} have shown that MOSA is very competitive compared with alternative algorithms when handling hundreds and thousands of testing objectives. Interested readers can find more details about the original MOSA algorithm in Panichella \textit{et al.}\xspace~\cite{Panichella2015}. Although a more efficient variant of MOSA has recently been proposed~\cite{Panichella2018}, such a variant (DynaMOSA) requires to have a hierarchy of dependencies between coverage targets that exists only at the unit level. Since targets in unit testing are all available in the same control flow graph, the dependencies between objectives can be calculated (\textit{i.e.,~} control dependencies). In contrast, \integration's objective is covering combinations of targets in different control flow graphs. Since covering one combination does not depend on the coverage of another combination, DynaMOSA is not applicable to this problem. Therefore, in \textsc{Cling}\xspace, we tailored MOSA to work at the integration level, targeting pairs of coupled branches rather than unit-level coverage targets (e.g., statements). In the following, we describe the main modifications we applied to MOSA to generate integration-level test cases. \subsubsection{Initial population} The search process starts by generating an initial population of test cases. A random test case is a sequence of statements (\textit{object instantiations}, \textit{primitive statements}, \textit{method calls}, and \textit{constructor calls to the class under test}) of variable lengths. More precisely, the random test cases include \textit{method calls} and \textit{constructors} for the caller $R$, which directly or indirectly invoke methods of the callee $E$ (\textit{covering methods}). Although \textsc{Cling}\xspace generates these test cases randomly, it extends the initialization procedure used for search-based crash reproduction \cite{soltani2017}. In particular, the initialization procedure in \integration gives a higher priority to methods in the caller class $R$ that invoke methods of the callee class $E$. While calls to other methods of $R$ are also inserted, their insertion has a lower probability. This prioritization ensures to generate tests covering call sites to the callee class. In the original MOSA algorithm, all methods of the class under test are inserted in each random test case with the same probability without any prioritization. The execution time of the initialisation procedure is part of the search budget. \subsubsection{Mutation and crossover}\label{sec:mutation_and_crossover} \integration uses the traditional single-point crossover and mutation operators (adding, changing and removing statements) \cite{Fraser2011} with an additional procedure to repair broken chromosomes. The initial test cases are guaranteed to contain at least one \textit{covering method} (a method of $R$ that directly or indirectly invokes methods of $E$). However, mutation and crossover can lead to generating \textit{offspring} tests that do not include any \textit{covering method}. We refer to these chromosomes as \textit{broken chromosomes}. To fix the broken chromosomes, the \textit{repair procedure} works in two different ways, depending on whether the broken chromosome is created by the crossover or by the mutation. If the broken chromosome is the result of the mutation operator, then the repair procedure works as follows: let $t$ be the broken chromosome and let $M$ be the list of covering methods; then, \integration applies the mutation operator to $t$ in an attempt to insert one of the covering methods in $M$. If the insertion is not successful, then the mutation operator is invoked again within a loop. The loop terminates when either a covering method is successfully injected in $t$ or when the number of unsuccessful attempts is greater than a threshold ($50$ by default). In the latter case, $t$ is not inserted in the new population for the next generation. If the broken chromosome is generated by the crossover operator, then the broken child is replaced by one of its parents. \subsubsection{Polymorphism} \label{sec:approach:polymorphism} If the caller and callee are in the same hierarchy and the caller is the super-class, \integration cannot generate tests for the caller class that will cover the callee class (since the methods to cover are not defined in the super-class). This is the case for instance if the super-class (caller) calls abstract methods defined in the sub-class (callee). In this particular case, \integration generates tests for the callee class. However, it selects the covering methods only from the inherited methods which are not overridden by the callee (sub-class). A covering method should be able to cover calls to the methods that have been redefined by the sub-class. With this slight change, \integration can improve the CBC coverage, as described in Section \ref{subsec:inheritance}. \subsection{Implementation} \label{sec:implementation} We implemented \integration as an open-source tool written in Java.\footnote{Available at \url{https://github.com/STAMP-project/botsing/tree/master/cling}} The tool relies on the \textsc{EvoSuite}\xspace \cite{Fraser2011} library as an external dependency. It implements the code instrumentation for pairs of classes, builds the CCFGs at the byte-code level, and derives the coverage targets (pairs of branches) according to the CBC criterion introduced in Section~\ref{sec:approach:coupledBranchCrit}. The tool also implements the search heuristics, which are applied to compute the objective scores as described in Section~\ref{sec:approach}. Besides, it implements the repair procedure described in Section~\ref{sec:mutation_and_crossover}, which extends the interface of the genetic operators in \textsc{EvoSuite}\xspace. Moreover, we customized the many-objective MOSA algorithm~\cite{Panichella2018}, which is implemented in \textsc{EvoSuite}\xspace, for our test case generation problem in \integration. \subsection{Search-based approaches for unit testing} SBST algorithms have been extensively used for unit test generation. Previous studies confirmed that thus generated tests achieve a high code coverage~\cite{Panichella2018a, Campos2018}, real-bug detection~\cite{almasi2017industrial}, and a debugging cost reduction~\cite{soltani2017, Panichella2016}, complementing manually-written tests. From McMinn's \cite{McMinn2004} survey about search-based test data generation, we observe that most of the current approaches rely on the control flow graph (CFG) to abstract the source code and represent possible execution flows. The $\mathit{CFG_m}=(N_m,E_m)$ represents a method (or function in procedural programming languages) $m$ as a directed graph of \textbf{basic blocks} of code (the nodes $N_m$), while $E_m$ is the set of the control flow edges. An edge connects a basic block $n_1$ to another one $n_2$ if the control may flow from the last statement of $n_1$ to the first statement of $n_2$. Listing~\ref{list:ClassA} presents the source code of \texttt{Person}, a class representing a person and her transportation habits. A \texttt{Person} can drive home (lines 4-10), or add energy to her car (lines 12-18). Figure~\ref{fig:CCFG} presents the CFG of two of Person's methods, with the labels of the nodes representing the line numbers in the code. Since method \texttt{driveToHome} calls method \texttt{addEnergy}, \textit{node 6} is transformed to two nodes, which are connected to the entry and exit point of the called method. This transformation is explained in the last paragraph of this section. \begin{lstlisting}[frame=tb, caption={Class \texttt{Person}}, label=list:ClassA, language=java, captionpos=t, numbers=left, belowskip=-2.5em, float=t, firstnumber=1] class Person{ private Car car = new Car(); protected boolean lazy = false; public void driveToHome(){ if (car.fuelAmount < 100) { (*@\label{line:branchdistance}@*) addEnergy(); } else { car.drive(); } } protected void addEnergy(){ if (this.lazy) { takeBus(); } else { car.refuel(); } } } \end{lstlisting} Many approaches based on CFGs combine two common heuristics to reach a high branch and statement coverage in unit-level testing: the \textit{branch distance} and the \textit{approach level}. The \textit{branch distance} measures (based on a set of rules) the distance to \textit{satisfying} (true branch) and the distance to \textit{not satisfying} (false branch) a particular branching node in the program. For instance, the distance to true for the condition at line \ref{line:branchdistance} in Listing~\ref{list:ClassA} is $100 - \mathit{car.fuelAmount} + 1$, and the distance to false is $\mathit{car.fuelAmount} - 100$. The \textit{approach level} measures the distance between the execution path and a target node in a CFG. For that, it relies on the concepts of \textbf{post-dominance} and \textbf{control dependency}~\cite{Allen:1970:CFA:800028.808479}. As an example, in Figure \ref{fig:CCFG}, \textit{node 8} is control dependent on \textit{node 5} and \textit{node 8} post-dominates edge $\langle 5,8\rangle$. The \textit{approach level} is the minimum number of control dependencies between a target node and an executed path by a test case. In this study, we analyze how a class is used/invoked by the other classes within the same system. For this purpose, we merge the Class-level Control Flow Graph (CCFG) of target callee and caller classes. \subsection{Search-based approaches for integration testing} Integration testing aims at finding faults that are related to the interaction between components. We discuss existing integration testing criteria and explain the search-based approaches that use these criteria to define fitness functions for automating integration-level testing tasks. \subsubsection{Integration testing criteria} \label{sec:background-integ-testing-criteria} \begin{figure}[t] \centering \includegraphics[width=0.85\linewidth]{figures/CCFG_new} \caption{Class-level CFG for class \texttt{Person}} \label{fig:CCFG} \end{figure} Jin \textit{et al.}\xspace \cite{Jin1998} categorize the connections between two procedures into four types: \textit{call couplings} (type 1) occur when one procedure calls another procedure; \textit{parameter couplings} (type 2) happen when a procedure passes a parameter to another procedure; \textit{shared data couplings} (type 3) occur when two procedures refer to the same data objects; \textit{external device coupling} (type 4) happens when two procedures access the same storage device. They introduce integration testing criteria according to the data flow graph (containing the definitions and usages of variables at the integration points) of procedure-based software. Their criteria, called \textit{coupling-based testing criteria}, require that the tests' execution paths cover the last definition of a parameter's value in the CFG of a procedure (the \textit{caller procedure}), a node (the \textit{call site}) calling another procedure with that parameter, and the first use of the parameter in the \textit{callee} (and in the caller after the call if the parameter is a call-by-reference). Harrold \textit{et al.}\xspace \cite{Harrold1994} introduced data flow testing for a single class focusing on method-integration testing. They define three levels of testing: \textit{intra-method testing}, which tests an individual method (\textit{i.e.,~} the smallest possible unit to test); \textit{inter-method testing}, in which a public method is tested that (in)directly calls other methods of the same class, and \textit{intra-class testing}, in which the various sequences of public methods in a class are tested. For data flow testing of inter-method and intra-class testing, they defined a \textit{Class-level Control Flow Graph} (CCFG). The CCFG of class \textit{C} is a directed graph $CCFG_C=(N_{Cm},E_{Cm})$ which is a composition of the control flow graphs of methods in $C$; the CFGs are connected through their call sites to methods in the same class~\cite{Harrold1994}. This graph demonstrates all paths that might be crossed within the class by calling its methods or constructors. Let us consider again the class $Person$ in Listing~\ref{list:ClassA}. The CCFG of class $Person$ is created by merging the CFGs of its method, as demonstrated in Figure~\ref{fig:CCFF_new}. For example, in the CFG of the method \texttt{Person.driveToHome()}, the \textit{node 6c} is a call site to \texttt{Person.addEnergy()}. In the approach introduced by Harrold \textit{et al.}\xspace \cite{Harrold1994}, they detect the def-use paths in the constructed CCFGs and try to cover those paths. Denaro \textit{et al.}\xspace \cite{Denaro2008} revisited previous work on data flow analysis for object-oriented programs \cite{Harrold1994, Souter2003} to define an efficient approach to compute \textit{contextual def-use} coverage \cite{Souter2003} for class integration testing. The approach relies on \textit{contextual data flow analysis} to take state-dependent behavior of classes that aggregate other classes into account. Compared to def-use paths, contextual def-use include the chain of method calls leading to the definition or the use. A special case is represented by the polymorphic interactions that need to be tested. Alexander \textit{et al.}\xspace \cite{Alexander2000, Alexander2010} used the data flow graph to define testing criteria for integrations between classes in the same hierarchy tree. All of the mentioned approaches are using data-flow analysis to define integration testing criteria. However, generating data-flow graphs covering the def-uses involved in between classes is expensive and not scalable in complex cases \cite{Su2017}. Vivanti \textit{et al.}\xspace \cite{vivanti2013search} shows that the average number of def-use paths in a single class in isolation is three times more than the number of branches. By adding def-use paths between the non-trivial classes, this number grows exponentially. In search-based approaches, the number of search objectives matters, as too many objectives lead to search process misguidance. Compared to previous work, our approach does not try to cover def-use paths. Instead, we use a \textit{control flow analysis} to identify from a CCFG a restricted number of pairs of branches (in a caller and a callee) that are not trivially executed together. For instance, the couple of branches $\langle 13,16\rangle$ and $\langle b8,b9\rangle$ in Figure \ref{fig:CCFF_new} are used to define the search objectives of our test case generator. Section \ref{sec:approach} details the analysis of the CCFG to identify such pairs of branches, including for special cases of interaction (namely inheritance and polymorphism), and the definition of the objectives and search algorithm. CCFGs have previously been used in other approaches. For instance, Wang \textit{et al.}\xspace \cite{wang2019could} merge the CFGs of methods of classes in the dependencies of the software under test to identify dependency conflicts. \subsubsection{Search-based approaches} \label{subsubsec:search-based-integration-testing} Search-based approaches are widely used for test ordering \cite{Wang2010, Steindl2012, Hashim2005, Vergilio2012, Bansal2009, JIiang2019, Borner2009, Mariani2016, Guizzo2015, Abdurazik2009, DaVeigaCabral2010, Briand2003a, Vergilio2012}, typically with the aim of executing those tests with the highest likelihood of failing earlier on. However, search-based approaches have rarely been used for generating class integration tests. Ali Khan \textit{et al.}\xspace \cite{AliKhan2013} have proposed a high-level evolutionary approach that detects the coupling paths in the data-flow graphs of classes and have used it to define the fitness function for the genetic algorithm. They also proposed another approach for the same goal relying on Particle Swarm Optimization \cite{Khan2014}. Since objectives are defined according to the def-use paths between classes, the number of search objectives can grow exponentially, thus severely limiting the scalability of the approach (as we explained in Section \ref{sec:background-integ-testing-criteria}). Most related to our approach is the work on \textit{dynamic data flow testing} (\textsc{DynaFlow}\xspace) from Denaro \textit{et al.}\xspace \cite{Denaro2015}. Dynamic data flow testing is a two steps \textit{test amplification} pipeline \cite{Danglot2019} where: (i) a set of existing test cases are executed to collect execution traces, compute new data flow information, and subsequently derive new test objectives; and (ii) the new test objectives are fed to a test case generation tool. The pipeline is repeated until no new test objectives are found. In this study, we propose a novel approach for class integration test generation. Instead of using the data flow graph, which is relatively expensive to construct as it needs to find the coupling paths, or incrementally amplify the existing test suite, requiring several executions of a test case generation tool, we use the information available in the class call graph of the classes to calculate the fitness of the generated tests. We do note that we could not find any available implementation of data flow-based approaches. \subsection{Evolutionary approaches for other testing levels} Arcuri \cite{Arcuri2019} proposed EvoMaster, an evolutionary-based white-box approach for system-level test generation for RESTful APIs. A test for a RESTful web service is a sequence of HTTP requests. EvoMaster tries to cover three types of targets: \begin{inparaenum}[(i)] \item the statements in the System Under Test (SUT); \item the branches in the SUT; and \item different returned HTTP status codes. \end{inparaenum} Although EvoMaster tests different classes in the SUT, it does not systematically target different integration scenarios between classes. In contrast to EvoMaster, other approaches perform fuzzing \cite{Holler2012}, \textit{``an automated technique providing random data as input to a software system in the hope to expose a vulnerability.''} Fuzzing uses information like grammar specifications \cite{Holler2012, beyene2012, coppit2005, godefroid2008} or feedback from the program during the execution of tests \cite{Padhye2019} to steer the test generation process. These approaches are black-box and do not rely on any knowledge about classes in the SUT. Hence, their search processes are not guided by the integration of classes. Our approach performs white-box testing. It monitors the interaction between the target classes and strives to cover different integration scenarios between them. \subsection{Applicability} \integration considers pairs of classes and exercises the integration between them. We did not propose any procedure for selecting pairs of classes to give in input to \textsc{Cling}\xspace. Since the technique requires pairs of classes to test, it would be time-consuming and tedious for developers to manually collect and provide the class pairs. Hence, we suggest using an automated process for class pair selection, as well. In this study, we implemented a tool that automatically analyzes each class pair to find the ones with high cyclomatic complexity and coupled branches (according to the CBC criterion defined in this article). This procedure is explained in Section \ref{sec:setup:subselection}. Besides, our approach can be further extended by incorporating automated integration test prioritization approaches and selecting classes to integrate according to a predefined ordering \cite{Wang2010, Hashim2005, Vergilio2012, Bansal2009, JIiang2019, Mariani2016, Guizzo2015, Abdurazik2009, DaVeigaCabral2010, Briand2003a}. So, the end-to-end process of generating test for class integrations can be automated to require a minimal manual effort from the developer. \subsection{Test generation cost} One of the challenges in automated class integration testing is detecting the integration points between classes in a SUT. The number of code elements (\textit{e.g.,~} branches) that are related to the integration points increases with the complexity of the involved classes. Finding and testing a high number of integration code targets increases the time budget that we need for generating integration-level tests. With CBC, the number of coupled branches to exercise is upper bounded to the cartesian product between the branches in the caller $R$ and the callee $E$. Let $B_R$ be the set of branches in $R$ and $B_E$ the set of branches in $E$, the maximum number of coupled branches $CB_{R,E}$ is $B_R \times B_E$. In practice, the size of $CB_{R,E}$ is much smaller than the upper bound as the target branches in the caller and callee are subsets of $R$ and $E$, respectively. Besides, CBC is defined for pairs of classes and not for multiple classes together. This substantially reduces the number of targets we would incur when considering more than two classes at the same time. While a fair amount of the test generation process can be automated, multiple instances of this approach can be executed simultaneously, and thereby, this approach can be used to generate test suites for a complete project at once in a reasonable amount of time. For instance, in this study, we managed to test each of the 140 class pairs with \integration for 20 times in less than a day thanks to a parallelization of the executions. Finally, we have used a five minutes time budget to test each class pair's interactions. Since \integration considers each coupled branch as an objective for the search process, we could have defined a different search budget per pair, depending on the number of objectives. Similarly to \textsc{EvoSuite}\xspace and \textsc{Randoop}\xspace, the outcome of \integration may differ depending on the given time budget. Defining the best trade-off between the search-budget and effectiveness of the tests generated using \integration is part of our future work. \subsection{Effectiveness} To answer \textbf{RQ2}, we analyzed the set of mutants that are killed by \integration (integration tests), but not by the unit-test suites for the caller and callee separately (boxes labeled with $T_{EvoE+R}$ and $T_{RanE+R}$ in Figure~\ref{fig:mutation:diff:boxplot}). The test suite $T_{\integration}$ was generated using a search budget of five minutes. Similarly, the unit-level suites were generated with a search budget of five minutes for each caller and callee class separately. Therefore, the total search budget for unit test generation ($T_{EvoE+R}$ and $T_{RanE+R}$) is twice as large (10 minutes for each tool). Despite the larger search budget spent on unit testing, there are still mutants and faults detected only by \integration and in less time. \textbf{\integration is not an alternative to unit testing}. In fact, integration test suites do not subsume unit-level suites as the two types of suites focus on different aspects of the system under test. Our results (\textbf{RQ2}) confirm that integration and unit testing are complementary. Indeed, some mutants can be killed exclusively by unit-test suites: \textit{e.g.,~} the overall mutation scores for the unit tests $T_{EvoE}$, and $T_{EvoR}$ are larger than the overall mutation scores of \integration. This higher mutation score is expected due to the larger unit-level branch coverage achieved by the unit tests (coverage is a necessity but not a sufficient condition to kill mutant). Instead, \integration focuses on a subset of the branches in the units (caller and callee), but exercises the integration between them more extensively. In other words, the search is less broad (fewer branches), but more in-depth (the same branches are covered multiple times within different pairs of coupled branches). This more in-depth search allows killing mutants that could not be detected by satisfying unit-level criteria. Furthermore, our results in \textbf{RQ3} indicate that \integration also allows us to find bugs that are not detectable by unit tests. In Section \ref{sec:results:rq3}, we have shown that the tests generated by \integration capture exceptions, which are not detectable by unit tests. We have carefully performed an extensive manual analysis on these stack traces to identify whether they expose software faults. According to this manual analysis, we have detected 25 failures. Finally, for external confirmation, we have investigated if these 25 faults are identified and fixed by developers in the subsequent commits. The investigation results have confirmed that developers actually fixed some of the faults in the following commits. To demonstrate the impact of the \integration in finding bugs, we have presented an example in Section \ref{sec:results:rq3}. Moreover, the other faults, which were confirmed by our investigation, are available in our replication package \cite{Derakhshanfar2020}. While our evaluation pointed to 25 real faults, we have not yet applied \integration in a live setting in a currently active project. Doing so requires a project that does intensive (unit) testing already, and whose developers are interested in exploring issues raised by tests dedicated to exercising various inter-class interactions. As part of our future work, we intend to set up and conduct such a (longitudinal) study. \subsection{Baseline Selection} The goal of this evaluation is to explore the impact and complementarity of the tests generated by \textsc{Cling}\xspace on the results of the search-based unit testing in various aspects. To achieve this purpose, we run our tool against \textsc{EvoSuite}\xspace, which is currently the best tool in terms of achieving branch coverage \cite{rueda2016unit, panichella2017java, molina2018java, kifetew2019java, Devroey2020}, and Randoop \cite{Pacheco2007}, a random-based unit test case generator. We configured \textsc{EvoSuite}\xspace to use \textit{DynaMOSA} (\texttt{-Dalgorithm=DynaMOSA}), which has the best outcome in structural and mutation coverage \cite{Panichella2018} and branch coverage (\texttt{-Dcriterion=BRANCH}). For \textsc{Randoop}\xspace, we used the default parameter values. \subsection{Subjects Selection} \label{sec:setup:subselection} \begin{table*} [t] \center \caption{Projects in our empirical study. \texttt{\#} indicates the number of caller-callee pairs. \texttt{CC} indicates the cyclomatic complexity of the caller and callee classes. \texttt{Calls} indicates the number of calls from the caller to the callee. \texttt{Coupled branches} indicates the number of coupled branches.} \label{tab:projects} \input{tables/projects-table.tex} \end{table*} The subjects of our studies are five Java projects, namely \textit{Closure compiler}, \textit{Apache commons-lang}, \textit{Apache commons-math}, \textit{Mockito}, and \textit{Joda-Time}. Our primary reason to use these projects is that they have been used in prior studies to assess the coverage and the effectiveness of unit-level test case generation \cite{ma2015grt, Panichella2018, just2014defects4j, Shamshiri2016}, program repair \cite{smith2015cure, martinez2016astor}, fault localization \cite{pearson2017evaluating, b2016learning}, and regression testing \cite{noor2015similarity, lu2016does}. A consequence of this selection is that the source code under analysis is relatively old, making it hard to interact with developers to get confirmation about potential faults. Thus, the route that we take instead is to use \emph{future commits} (after the commits under analysis) to explore whether the bugs we identify were addressed (possibly after failures in production), as explained in the next section. To sample the classes under test, we first extract pairs of \texttt{caller} and \texttt{callee} classes (\textit{i.e.,~} pairs with interaction calls) in each project. Then, we remove pairs that contain trivial classes, \textit{i.e.,~} classes where the caller and callee methods have no decision point (\textit{i.e.,~} with cyclomatic complexity equal to one). This is because methods with no decision points can be covered with single method calls at the unit testing level. Note that similar filtering based on code complexity has been used and recommended in the related literature~\cite{Campos2017, molina2018java, Panichella2018}. From the remaining pairs, we sampled 140 distinct pairs of classes from the five projects in total, which offers a good balance between generalization (\textit{i.e.,~} the number of pairs to consider) and statistical power (\textit{i.e.,~} the number of executions of each tool against each class or pair of classes). We performed the sampling to have classes with a broad range of complexity and coupling. In our sampling procedure, each selected class pair includes either the classes with the highest cyclomatic complexity or the mosts coupled classes. The numbers of pairs selected from each project are reported in Table~\ref{tab:projects}. The least and most complex classes in the selected class pairs have one and 5,034 branching nodes, respectively. Also, the caller class of the least and most coupled class pairs contain one and 453 call sites to the callee class, respectively. Each pair of caller and callee classes represents a target for \integration. Our replication package \cite{Derakhshanfar2020}\footnote{\url{https://github.com/STAMP-project/Cling-application}} contains the list of class pairs sampled for our study, their detailed statistics (\textit{i.e.,~} cyclomatic complexity and the number of interaction calls), and the project versions. \subsection{Evaluation Procedure} To answer the research questions, we run \integration on each of the selected class pairs. For each class pair targeted with \integration, we run \textsc{Randoop}\xspace and \textsc{EvoSuite}\xspace with the caller and the callee classes as target classes under test (\textit{i.e.,~} each class is targeted independently) to compare the class integration test suite with unit level test suites for the individual classes. This results in having five test suites, each one corresponding to an independent execution of \integration, \textsc{Randoop}\xspace or \textsc{EvoSuite}\xspace: \begin{compactenum} \item $T_{\integration}$, the integration-level test suite generated by \integration (\texttt{-target\_classes <Caller>:<Callee>}); \item $T_{RanR}$, the unit-level test suite generated by \textsc{Randoop}\xspace for the caller (\texttt{--testclass=<Caller>}); \item $T_{RanE}$, the unit-level test suite generated by \textsc{Randoop}\xspace for the callee (\texttt{--testclass=<Callee>}); \item $T_{EvoR}$, the unit-level test suite generated by \textsc{EvoSuite}\xspace for the caller (\texttt{-class <Caller>}); \item $T_{EvoE}$, the unit-level test suite generated by \textsc{EvoSuite}\xspace for the callee (\texttt{-class <Callee>}). \end{compactenum} To address the random nature of the three tools, we repeat each run 20\xspace times (140 pairs of classes $\times$ 5 executions $\times$ 20\xspace repetitions $=$ 14,000 executions). Moreover, each \integration run is configured with a search budget of five minutes, including two minutes of search initialization timeout. To allow a fair comparison, we run \textsc{Randoop}\xspace and \textsc{EvoSuite}\xspace for five minutes on each caller/callee class, including default initialization timeout (14,000 $\times$ 5 minutes $\simeq$ 48.6 days execution time for test case generation). For \textbf{RQ1}, we analyze the CBC coverage achieved by $T_{Cling}$. As the CBC coverage of $T_{RanE}$ and $T_{EvoE}$ is equal to 0.0 by construction, we compare $T_{Cling}$ with $T_{RanR}$ and $T_{EvoR}$ across the 20\xspace independent runs. For \textbf{RQ2}, we measure the effectiveness of the generated test suite using both \textit{line coverage} and \textit{mutation analysis} on the callee classes $E$ (considered as the class under test in our approach). Mutation analysis is a high-end coverage criterion, and mutants are often used as substitutes for real faults since previous studies highlighted its significant correlation with fault-detection capability~\cite{just2014mutants, andrews2005mutation}. Besides, mutation analysis provides a better measure of the test effectiveness compared to more traditional coverage criteria~\cite{wei2012branch} (\textit{e.g.,~} branch coverage). We compute the line coverage and mutation scores achieved by $T_{\integration}$ for the callee class in each target class pair. Then, we compare them to the line coverage and mutation scores achieved by the unit-level test suites ($T_{RanR}$, $T_{RanE}$, $T_{EvoR}$, and $T_{EvoE}$) for the callee class. Moreover, we analyse the orthogonality of the sets of mutants in the callee that are strongly killed by $T_{\integration}$, and those killed by the unit-level tests individually. In other words, we look at whether $T_{\integration}$ allows killing mutants that are not killed at unit-level (strong mutation). Also, we analyze the type of the mutants which are only killed by $T_{\integration}$. For line coverage and mutation analysis, we use \textsc{Pit}\xspace~\cite{Coles2016}, which is a state-of-the-art mutation testing tool for Java code, to mutate the callee classes. \textsc{Pit}\xspace also collects and reports the line coverage of the test suite on the original class before mutation. \textsc{Pit}\xspace has been used in literature to assess the effectiveness of test case generation tools~\cite{DBLP:journals/stvr/ZhuPZ18,ma2015grt, panichella2017java, molina2018java, kifetew2019java, Devroey2020}, and it has also been applied in industry\footnote{http://pitest.org/sky\_experience/}. In our study, we use \textsc{Pit}\xspace v.1.4.9 with all mutation operators activated (\textit{i.e.,~} the \texttt{ALL} mutators group). For \textbf{RQ3}, we analyze the exceptions triggered by both integration and unit-level test suites. In particular, we extract unexpected exceptions causing crashes, \textit{i.e.,~} exceptions that are triggered by the test suites but that are (i) not declared in the signature of the caller and callee methods using \texttt{throws} clauses, (ii) not caught by a \texttt{try-catch} blocks, and (iii) not documented in the \texttt{Javadoc} of the caller or callee classes. Then, we manually analyze unexpected exceptions that are triggered by the integration-level test cases (\textit{i.e.,~} by \integration), but not by the unit-level tests. Since our subjects are selected from \textsc{Defects4j}\xspace, and thereby the projects used as subjects in this study are not the latest versions, the faults that we find for this research question may be fixed in the subsequent commits. Hence, the three first authors performed a code history analysis by looking at the modifications made to the source code of the classes involved in a fault. Based on this analysis, the authors could examine whether the faults found by \integration were later identified, approved, and fixed by the developers. The test suites generated by \integration, \textsc{EvoSuite}\xspace, and \textsc{Randoop}\xspace may contain \textbf{flaky tests}, \textit{i.e.,~} test cases that exhibit intermittent failures if executed with the same configuration. To detect and remove flaky tests, we ran each generated test suite five times. Then, we removed tests that fail in at least one of the independent runs. Hence, the test suites used to answer our three research questions likely do not contain flaky tests. In this process, we identified 8\%, 3.5\%, and 4.5\% of the tests generated by \integration, \textsc{EvoSuite}\xspace, and \textsc{Randoop}\xspace, respectively, as flaky. For 20\xspace runs, we detected a total of 247,775 flaky tests out of 5,443,556 generated test cases. To keep the execution time (which includes test generation, flaky test detection, and mutation and coverage analysis) manageable, we used a cluster (with 20 CPU-cores, 384 GB memory, and 482 GB hard drive) to parallelize the execution for our evaluation (50 simultaneous executions). With this parallelization, the automated execution of the whole evaluation took about three days (one day for test generation and two days for flaky test detection and mutation and line coverage measurement). \subsection{CBC achieved by \integration (RQ1.1)} \begin{figure}[t] \centering \includegraphics[width=0.48\textwidth]{figures/cbc-frequency-distribution.pdf} \caption{Distribution of \integration's CBC coverage for the different class pairs.} \label{fig:cbcdistribution} \end{figure} \begin{figure}[t] \centering \includegraphics[width=0.48\textwidth]{figures/cbc-per-project.pdf} \caption{Total coupled-branches coverage achieved by $T_{\integration}$ (C), $T_{RanR}$ (RanR) and $T_{EvoR}$ (EvoR). ($\diamond$) denotes the arithmetic mean and (---) is the median.} \label{fig:cbccoverage} \end{figure} As reported in Table~\ref{tab:projects}, \integration did not identify any coupled-branches for three pairs of classes (one in \texttt{mockito} and two in \texttt{time}). This is due to the absence of target branches in either the caller or the callee, resulting in no couple of branches to cover. Those three pairs have been excluded from the results presented in this section. Figure~\ref{fig:cbcdistribution} gives the distribution of the CBC coverage achieved by \integration for the remaining 137 pairs of classes. In total, \integration could generate at least one test suite achieving a coupled-branches coverage of at least 50\% for 87 out of 137 class pairs. Figure~\ref{fig:cbccoverage} presents the coupled-branches coverage of $T_{\integration}$ in all of the projects. On average (the diamonds in Figure~\ref{fig:cbccoverage}) the test suites generated by \integration cover 48.7\% of coupled-branches. The most covered couples are in the \texttt{math} project ($61.9\%$ on average), followed by \texttt{time} ($61.8\%$ on average) and \texttt{lang} ($46.5\%$ on average). The least covered couples are in the \texttt{closure} ($24\%$ on average) and \texttt{mockito} projects ($33.6\%$ on average), which are also the projects with the highest number of coupled-branches in Table~\ref{tab:projects} (10,542 coupled-branches on average for all the class pairs in \texttt{closure} and 1,185 coupled-branches on average in \texttt{mockito}). For 9 caller-callee pairs, \integration could not generate a test suite able to cover at least one coupled branch out of 20\xspace executions: 3 pairs from \texttt{math}, 3 pairs from \texttt{mockito}, 2 pairs from \texttt{closure}, and 1 from \texttt{lang}. In the class pair from \texttt{lang}, \integration could not cover any coupled branch because the callee class (\texttt{StringUtils}) misleads the search process (we detail the explanation in Section \ref{subsec:rq12}). The remaining 8 pairs cannot be explained solely by the complexities of the caller (with a cyclomatic complexity ranging from 8 to 5,034 for those classes) and the callee (with a cyclomatic complexity ranging from 1 to 2,186) or the number of call sites (ranging from 1 to 177). This calls for a deeper understanding of the interactions between caller and callee around the call sites. In our future work, we plan to refine the caller-callee pair selection (for which we currently looked at the global complexity of the classes) to investigate the local complexity of the classes around the call sites. \smallskip\noindent\fbox{\parbox{0.475\textwidth}{ \textbf{Summary (RQ1.1).} On average, the generated tests by \integration cover 48.7\% of coupled-branches. In 87 out of 140 (59.2\%) of the pairs, these test suites achieve a CBC higher than 50\%. }} \subsection{CBC achieved by \integration vs. unit tests (RQ1.2)} \label{subsec:rq12} \begin{figure}[t] \centering \includegraphics[width=0.48\textwidth]{figures/cbc-friedman-nemenyi.pdf} \caption{Non-parametric multiple comparisons in terms of CBC score for $T_{\integration}$ (C), $T_{EvoR}$ (EvoR), and $T_{RanR}$ (RanR) using Friedman's test with Nemenyi's post-hoc procedure.} \label{fig:cbcfriedman} \end{figure} Since $T_{RanE}$ and $T_{EvoE}$ cover only branches in the callee class (\textit{i.e.,~} it does not call any methods in the caller class), the coupled-branches coverages achieved by these tests are always zero. Hence, for this research question, we compare the tests generated by \integration ($T_{\integration}$) against the tests generated by \textsc{Randoop}\xspace and \textsc{EvoSuite}\xspace applied to the caller class ($T_{RanR}$ and $T_{EvoR}$) \textit{w.r.t.~} coupled-branches coverage. Figure \ref{fig:cbccoverage} presents the coupled-branches coverage of $T_{\integration}$, $T_{RanR}$, and $T_{EvoR}$ for all the projects. The number of covered coupled-branches by $T_{\integration}$ is higher in total (\textit{all} in Figure~\ref{fig:cbccoverage}). On average (the diamonds in Figure~\ref{fig:cbccoverage}), the test suites generated by \integration (48.7\%) cover more coupled-branches compared to 37\% for $T_{EvoR}$, and 15.7\% for $T_{RanR}$. On average, the coupled-branches coverage achieved by unit tests is lower than the one achieved by \integration in all of the projects except \texttt{lang}. The average coupled-branches coverage of \textsc{EvoSuite}\xspace in this project is $55.6\%$, compared to $48.9\%$ for \integration. We also observe a wider distribution of the CBC coverage for $T_{\integration}$ (with a median of $51.0\%$ and an IQR of $78.2\%$) compared to $T_{EvoR}$ (with a median of $30.7\%$ and an IQR of $59.0\%$) and $T_{RanR}$ (with a median $<1.0\%$ and an IQR of $25.0\%$). We further compare the different test suites using Friedman's non-parametric test for repeated measurements with a significance level $\alpha = 0.05$~\cite{Garcia:2009} . This test is used to test the significance of the differences between groups (treatments) over the dependent variable (CBC coverage in our case). We complement the test for significance with Nemenyi's post-hoc procedure~\cite{japkowicz2011evaluating,panichella2021systematic}. Figure \ref{fig:cbcfriedman} provides a graphical representation of the ranking (\textit{i.e.,~} mean ranks with confidence interval) of the different test suites. According to the Friedman test, the different treatments (i.e., \integration, \textsc{EvoSuite}\xspace, and \textsc{Randoop}\xspace) achieve significantly different CBC coverage (p-values $ <0.001$). According to Figure~\ref{fig:cbcfriedman}, the average rank of \integration is much smaller than the average ranks of the two baselines. Furthermore, the differences between the average rank of $T_{\integration}$ and the average rank of the two baselines are larger than the critical distance $CD=0.283$ determined by Nemenyi's post-hoc procedure. This indicates that $T_{\integration}$ achieves a significantly higher CBC coverage than $T_{EvoR}$ and $T_{RanR}$. Finally, we have manually analyzed the search progress of \integration for pairs of classes where the number of covered coupled-branches is low (\textit{i.e.,~} lower than 10). We noticed that \integration is counter-productive for specific class pairs where the callee class is \texttt{StringUtils}. In those cases, the test cases generated during the search initialization throw a \texttt{NoSuchFieldError} in the callee class (\texttt{StringUtils} here). Since these test cases achieve small approach levels and branch distances from the callee branches, they are fitter (\textit{i.e.,~} their fitness value is lower) than other test cases. Therefore, these test cases are selected for the next generation and drive the search process in local optima. \smallskip\noindent\fbox{\parbox{0.475\textwidth}{ \textbf{Summary (RQ1.2).} On average, the generated test suites by \integration cover 11.7\% more coupled-branches compared to \textsc{EvoSuite}\xspace and 33\% more coupled-branches compared to \textsc{Randoop}\xspace. }} \subsection{Line Coverage and Mutation Scores (RQ2.1)} \begin{figure*}[t] \centering \subfloat[Line coverage of the callee (E)]{ \includegraphics[width=0.48\textwidth]{figures/line-coverage.pdf} \label{fig:linecoverage} } \hfil \subfloat[Mutation score of the callee (E)]{ \includegraphics[width=0.48\textwidth]{figures/mutation-coverage-boxplot.pdf} \label{fig:mutation:boxplot} } \caption{Effectiveness of $T_\textsc{Cling}\xspace$ (C), $T_{EvoE}$ (EvoE), $T_{EvoR}$ (EvoR), $T_{RanE}$ (RanE), and $T_{RanR}$ (RanR). ($\diamond$) denotes the arithmetic mean and (---) indicates the median.} \label{fig:effectiveness} \end{figure*} Figure \ref{fig:linecoverage} shows line coverage of the callee classes ($E$) for the test suites generated by the different approaches. On average, \integration covers 39.5\% of the lines of the callee classes. While this is lower compared to unit-level tests generated using \textsc{EvoSuite}\xspace (58.2\% for $T_{EvoE}$ and 59.4\% for $T_{EvoR}$), \integration still achieves a better line coverage than \textsc{Randoop}\xspace (38.2\% for $T_{RanE}$ and 22\% for $T_{RanR}$). To understand the fault revealing capabilities of \textsc{Cling}\xspace compared to unit-level test suites, we first show in Figure~\ref{fig:mutation:boxplot} the overall mutation scores when mutating class $E$, and apply the test suite $T_{EvoE}$, $T_{EvoR}$, $T_{RanE}$, $T_{RanR}$, and $T_{\textsc{Cling}\xspace}$. Similar to line coverage, test suites optimized for overall branch coverage achieve a total higher mutation score (35.4\% for $T_{EvoE}$ and 34.2\% for $T_{EvoR}$ on average), simply because a mutant that is on a line that is never executed cannot be killed. \textsc{Randoop}\xspace achieves on average a mutation score of 25.9\% for $T_{RanE}$ and 11.4\% for $T_{RanR}$. $T_{\textsc{Cling}\xspace}$ scores lower (20.0\% on average), since \textsc{Cling}\xspace searches for dedicated interaction pairs, but does not try to optimize overall line coverage. Note that $T_{\textsc{Cling}\xspace}$ achieves the highest average mutation score for classes in \texttt{math}, while it achieves the lowest mutation score for classes in the \texttt{mockito} project. \smallskip\noindent\fbox{\parbox{0.475\textwidth}{ \textbf{Summary (RQ2.1).} Our results are consistent with the design and objectives of the tools: \textsc{EvoSuite}\xspace seeks to cover all the branches of the class under test; \integration targets specific pairs of branches between the caller and callee; and \textsc{Randoop}\xspace performs (feedback-directed) random testing. Our results also confirm previous observations that \textsc{EvoSuite}\xspace achieves a better structural coverage and mutation score than \textsc{Randoop}\xspace \cite{rueda2016unit, panichella2017java, molina2018java, kifetew2019java, Devroey2020}. }} \subsection{Combined Mutation Analysis (RQ2.2)} \begin{figure}[t] \centering \includegraphics[width=0.48\textwidth]{figures/mutation-diff-boxplot.pdf} \caption{Increases ($\Delta$) of the mutation score when combining $T_\textsc{Cling}\xspace$ with unit test suites $T_{EvoE}$, $T_{EvoR}$, $T_{RanE}$, $T_{RanR}$ and their unions $T_{EvoE+EvoR}$, and $T_{RanE+RanR}$. ($\diamond$) denotes the arithmetic mean and (---) is the median.} \label{fig:mutation:diff:boxplot} \end{figure} Figure~\ref{fig:mutation:boxplot} shows that unit test suites do not kill almost half of the mutants. \textsc{Cling}\xspace targets more mutants, including those that remain alive with unit tests. In Figure \ref{fig:mutation:diff:boxplot}, we report the \textit{improvement} ($\Delta$) in the mutation score when executing $T_\integration$ in addition to unit test suites ($T_{EvoE}$, $T_{EvoR}$, $T_{RanE}$, and $T_{RanE}$), and their unions ($T_{EvoE+EvoR}$, $T_{RanE+RanR}$). On average, 13\%, resp. 19.5\%, of the mutants are killed only by $T_{\textsc{Cling}\xspace}$, compared to $T_{EvoE}$, resp. $T_{RanE}$, the unit test suites optimized for the class under test ($E$). This difference decreases to 10.3\%, resp. 17.8\%, if we use $T_{EvoR}$, resp. $T_{RanR}$, the unit test suites exercising $E$ via the caller class $R$ (as more class interactions are executed). The difference with traditional unit testing is still 7.7\%, resp. 13.5\%, when comparing \textsc{Cling}\xspace with the combined unit test suites $T_{EvoE+EvoR}$, resp. $T_{RanE+RanR}$, exercising $E$ directly as much as possible as well as indirectly via call sites in $R$. The outliers in Figure~\ref{fig:mutation:diff:boxplot} are also of interest: for 20, resp. 18, classes (out of 140), \integration was able to generate a test suite where more than half of the mutants were killed \emph{only} by $T_{\integration}$, compared to $T_{EvoE}$, resp. $T_{RanE}$, (i.e., +50\% of mutation score). When compared to $T_{EvoE+EvoR}$, resp. $T_{RanE+RanR}$, there are 4, resp. 9, classes for which $T_{\integration}$ kills more than half of the mutants that are killed by neither $T_{EvoE}$, resp. $T_{RanE}$, nor $T_{EvoR}$, resp. $T_{RanE}$. This further emphasizes the complementarity between the unit and integration testing. \begin{table*}[t] \center \caption{Status (for $T_EvoR$, $T_EvoE$, $T_RanR$, and $T_RanE$) of the mutants killed solely by $T_{\integration}$. \texttt{Not-covered} denotes the number of mutants killed by $T_{\integration}$, which are not covered by \textsc{EvoSuite}\xspace (or \textsc{Randoop}\xspace) test suites, and \texttt{survived} denotes the number of mutants killed by $T_{\integration}$, which are covered by \textsc{EvoSuite}\xspace (or \textsc{Randoop}\xspace) tests but not killed. The numbers between parentheses denote the percentage of mutants.} \label{tab:mutant-status-table} \resizebox{0.99\textwidth}{!}{% \input{tables/mutant-status-table.tex} } \end{table*} Table \ref{tab:mutant-status-table} presents the status of the mutants that are killed by $T_{\integration}$ but not by unit-level test cases. What stands out is that many mutants are in fact covered, but not killed by unit-level test suites. Here \integration leverages the context of caller, not only to reach a mutant, but also to \emph{propagate} the (modified) values inside the caller's context, so that the mutants can be eventually killed. \subsubsection{Mutation Operators} \begin{table}[t] \center \caption{Number of mutants killed solely by $T_{\integration}$ and grouped by mutation operators. Integration-level operators are highlighted in \textbf{bold} face and the corresponding integration-level mutation operator defined by Delamaro \textit{et al.}\xspace \cite{delamaro2001interface} is indicated between parenthesis.} \label{tab:mutant-operators-table} \resizebox{0.49\textwidth}{!}{% \input{tables/mutation-operators-all.tex} } \end{table} We analyzed the mutation operators that generate mutants that are exclusively killed by $T_{\integration}$. We categorize the mutation operators implemented in \textsc{Pit}\xspace into \textit{integration-level} and \textit{non-integration-level}. For this categorization, we rely on the definition of mutation operators for integration testing provided by Delamaro \textit{et al.}\xspace \cite{delamaro2001interface}. We observed that ten of the mutation operators implemented in \textsc{Pit}\xspace inject integration-level faults. These operators can be mapped to two integration-level operators defined by Delamaro \textit{et al.}\xspace \cite{delamaro2001interface}: \textit{RetStaRep}, which replaces the return value of the called method, and \textit{FunCalDel}, which removes the calls to void method calls and replaces the non-void method calls by a proper value. Table \ref{tab:mutant-operators-table} lists the number of mutants killed exclusively by $T_{\integration}$ and grouped by mutation operators. Integration-level operators are indicated in bold with the mapping to either \textit{RetStaRep} or \textit{FunCalDel} between parenthesis. As we can see in this table, the most frequently killed mutants are produced by an integration-level operator, and other integration-level operators also produce frequently killed mutants. We can see that all of the ten integration-level mutation operators generate mutants that can be killed using \textsc{Cling}\xspace. Furthermore, some of the most frequently killed mutants are not produced by integration-level operators. For instance, operator \textit{NegateConditionalsMutator}, which mutates the conditions in the target class, produces the second most frequently killed mutants. These mutants are not killed but also not covered by tests generated by \textsc{EvoSuite}\xspace. \newsavebox\callerbox \begin{lrbox}{\callerbox} \begin{minipage}{0.44\textwidth} \begin{lstlisting}[ numbers=left, firstnumber=1] boolean evaluateStepC(StepInterpolator interpolator){ if (functions.isEmpty()){[...]} if (! initialized) {[...]} for ([...]) { [...]; // calling the callee class in the next line. if (state.evaluateStep(interpolator)){ // Changing variable first [...] } } return first != null; } \end{lstlisting} \end{minipage} \end{lrbox} \newsavebox\calleebox \begin{lrbox}{\calleebox} \begin{minipage}{0.44\textwidth} \begin{lstlisting}[ numbers=left, firstnumber=1] boolean evaluateStep(final StepInterpolator interpolator){ [...] for([...]){ if([...]){ [...]; } if([...]){ [...]; } } [...]; |return false;| return true; //mutant } \end{lstlisting} \end{minipage} \end{lrbox} \begin{figure*}[t] \centering \subfloat[Method \texttt{evaluateStepC} declared in the caller class \texttt{SwitchingFunctionsHandler}.]{\usebox\callerbox\label{fig:mutant:example:caller}} \hfil \subfloat[Mutant \texttt{evaluateStep} declared in the callee class \texttt{switchsState}.]{\usebox\calleebox\label{fig:mutant:example:callee}} \caption{Example of a integration-level mutant killed only by \textsc{Cling}\xspace From \texttt{Apache commons-math}.} \label{fig:mutant:example} \end{figure*} Lets look at an example of a mutant killed only by $T_{\integration}$. Figure \ref{fig:mutant:example:callee} illustrates one of the mutants in method \texttt{evaluateStep} in class \texttt{Switch\-Sta\-te} (callee class) from the \textit{Apache commons-math} project. This mutant is produced by an integration-level mutation operator (\textit{RetStaRep}) that replaces a boolean return value by \texttt{true}. Method \textit{evaluateStep} is called from the method \texttt{evaluateStepC} (Figure~\ref{fig:mutant:example:caller}) declared in \texttt{SwitchingFunctionsHandler} (caller class). Method \texttt{evaluateStepC} must return false if it calls the callee class in a certain situation: (i) the variable \texttt{first} in the caller class is null, and (ii) the callee method returns false because of the execution of line 12 in Figure~\ref{fig:mutant:example:callee}. The unit test suites generated by \textsc{EvoSuite}\xspace targeting \texttt{Switch\-Sta\-te} ($T_{EvoE}$) or class \texttt{Swi\-tching\-Fun\-ctions\-Hand\-ler} ($T_{EvoR}$) both cover the mutant but do not kill it. $T_{EvoE}$ easily cover the mutant statement, but it does not have any assertion to check the return value. $T_{EvoR}$ also covers this statement by calling the right method in \texttt{SwitchingFunctionsHandler}. However, as is depicted by Figure~\ref{fig:mutant:example}, both methods in caller and callee class have multiple branches. So, $T_{EvoR}$ covers the mutant from another path, which does not reveal the change in the boolean return value. \begin{lstlisting}[frame=tb, caption={\integration test case killing mutant in Figure~\ref{fig:mutant:example}.}, label=list:clingTest, captionpos=t, numbers=left, float=t, belowskip=-2.5em, firstnumber=1] public void test07() throws Throwable { [...] boolean boolean1 = switchingFunctionsHandler0.evaluateStepC(stepInterpolator0); assertTrue(boolean1 == boolean0); assertFalse(boolean1); } \end{lstlisting} In contrast, this mutant is killed by $T_{\integration}$, targeting \texttt{SwitchingFunctionsHandler} and \texttt{SwitchState} as the caller and callee classes, respectively (Listing \ref{list:clingTest}). According to the assertion in line 5 of this test case, \texttt{swit\-ching\-Func\-tions\-Hand\-ler0.e\-va\-lu\-ate\-Step} must return false. However, the mutant changes the returned value in line 7 of the caller class (Figure \ref{fig:mutant:example:caller}), and thereby the true branch of the condition in line 7 is executed. This true branch changes the value of variable \texttt{first} from null to a non-null value. Hence, the \texttt{evaluateStep} method in the caller class returns true in line 12. So, the assertion in the last line of the method in Listing~\ref{list:clingTest} kills this mutant. \smallskip\noindent\fbox{\parbox{0.475\textwidth}{ \textbf{Summary (RQ2.2).} The test suite generated by \integration for a caller $R$ and callee $E$, can kill \textit{different} mutants than unit test suites for $E$, $R$ or their union, increasing the mutation score on average by 13.0\%, 10.4\%, and 7.7\%, respectively, for \textsc{EvoSuite}\xspace, and 19.5\%, 17.8\%, and 13.5\%, respectively, for \textsc{Randoop}\xspace, with outliers well above 50\%. Our analysis indicates that many of the most frequently killed mutants are produced by integration-level mutation operators. }} \subsection{Integration Faults Exposed by \textsc{Cling}\xspace (RQ3)} \label{sec:results:rq3} In our experiments, \textsc{Cling}\xspace generates 50 test cases that triggered unexpected exceptions in the subject systems. None of those exceptions were observed during the execution of the unit test cases generated by \textsc{EvoSuite}\xspace and \textsc{Randoop}\xspace. \begin{table}[t] \center \caption{Categorization and number (\textbf{\#}) of the fault revealing test cases.} \label{tab:testcategory} \begin{footnotesize} \begin{tabular}{p{12mm} r p{55mm}} \toprule \textbf{Category} & \textbf{\#} & \textbf{Description} \\ \midrule \textbf{Confirmed} & 7 & The test case exposes a fault that has been fixed (\textit{e.g.,~} by updating the code or the documentation), or has been marked as such in the source code (\textit{e.g.,~} using a comment).\\ \textbf{Pending} & 4 & The test case potentially exposes a fault that has not been fixed.\\ \textbf{Deprecated} & 14 & The test case is not relevant anymore as the source code it executes has been deleted from the project (\textit{e.g.,~} in the case of a deprecated method).\\ \bottomrule \end{tabular} \end{footnotesize} \end{table} \newsavebox\exceptionbox \begin{lrbox}{\exceptionbox} \begin{minipage}{0.45\textwidth} \begin{lstlisting}[ numbers=left, firstnumber=1] java.lang.NullPointerException: at [..].JSType.isEmptyType([..]:159) at [..].JSType.testForEqualityHelper([..]:666) at [..].JSType.testForEquality([..]:655) at [..].NumberType.testForEquality([..]:63) at [..].JSType.getTypesUnderInequality([..]:962) at [..].UnionType.getTypesUnderInequality([..]:486) at [..].JSType.getTypesUnderInequality([..]:957) at [..].UnionType.getTypesUnderInequality([..]:486) \end{lstlisting} \end{minipage} \end{lrbox} \newsavebox\testcasebox \begin{lrbox}{\testcasebox} \begin{minipage}{0.45\textwidth} \begin{lstlisting}[ numbers=left, firstnumber=1] public void testFraction() { [...] UnionType unionType0 = new UnionType((JSTypeRegistry) null, immutableList0); // Undeclared exception! unionType0.getTypesUnderInequality(unionType0); } \end{lstlisting} \end{minipage} \end{lrbox} \begin{figure*}[t] \centering \subfloat[\integration test case triggering the crash in Figure~\ref{list:divzero}.]{\usebox\testcasebox\label{list:testdivzero}} \hfil \subfloat[Exception captured only by \textsc{Cling}\xspace.]{\usebox\exceptionbox\label{list:divzero}} \caption{Example of test case generated by \integration and exposing a fault in the \textit{Closure} project.} \label{fig:divzeroexample} \end{figure*} The first and second authors independently performed a manual root cause analysis for all 50 unexpected exceptions to check if they stemmed from a real integration-level fault. For this analysis, we check the API documentation to see if the generated test cases break any precondition. We indicated a test case as a fault revealing test if it does not violate any precondition according to the documentation, and it truly exposes an issue about the interaction between the caller and callee class. We found that out of the 50 test cases generated by \integration, 25 are fault revealing. To analyze if developers have already identified these faults in the following commits, the first three authors analyzed the code history of the classes involved in the detected faults. In this analysis, we manually checked all of the modifications made to the involved classes to see if the faults are fixed. Based on this analysis, we classify the 25 fault revealing test in one of the categories reported in Table~\ref{tab:testcategory}. According to this Table, seven faults (found only by tests generated via \integration) were detected, confirmed, and fixed by developers in the next commits. Due to the page limitation, this paper cannot describe all seven faults. Instead, the remainder of this section describes a representative example of these faults. The detailed descriptions of the analysis for all of the 25 fault revealing test cases are available in our replication package \cite{Derakhshanfar2020}.\footnote{Also available online at \url{https://github.com/STAMP-project/Cling-application/blob/master/data_analysis/manual-analysis/failure-explanation.md}.} \smallskip \textbf{Example.} To illustrate the type of problem detected by \textsc{Cling}\xspace, let us consider the generated test case in Figure~\ref{list:testdivzero} and the induced stack trace (for a \texttt{NullPointerException}) in Figure~\ref{list:divzero}.\footnote{The details are available at \url{https://github.com/STAMP-project/Cling-application/blob/master/data_analysis/manual-analysis/failure-explanation.md\#st28}} This test is produced by \integration for classes \texttt{UnionType} (caller class) and \texttt{JSType} (callee class). In this scenario, the \texttt{UnionType} is a sub-class of \texttt{JSType}. The test (Figure~\ref{list:testdivzero} Line 3) instantiates a \texttt{UnionType} object and passes a \texttt{null} value for the first parameter of its constructor. This constructor sets the value of a local variable (\texttt{registry}) to the value passed as the first parameter of the constructor (here, \texttt{null}). After instantiating \texttt{UnionType}, the generated test calls \texttt{getTypesUnderInequality} (Figure~\ref{list:testdivzero} Line 6), which in turns indirectly calls \texttt{isEmptyType} in the superclass. The \texttt{isEmptyType} method tries to use the attribute \texttt{registry}. Since this attribute is \texttt{null}, calling \texttt{getTypesUnderInequality} leads to a \texttt{NullPointerException}. No indication in the documentation specifies that the \texttt{registry} parameter should not be \texttt{null}, and no checks are done on the value of the input parameters. By reviewing the code history of \texttt{UnionType} class, we observed that this fault has been fixed.\footnote{The fixing commit is \url{https://github.com/google/closure-compiler/commit/cfc0fab3dc2be49692a4fe9162b8095c934f6c41}.} A \texttt{UnionType} should be instantiated only by a \texttt{UnionTypeBuilder} to ensure that it is instantiated properly, but this was not enforced in the source code nor documented in the class. The fixing commit message indicates that it refactors the \say{\texttt{Union\-Type\-Buil\-der} into \texttt{Union\-Type.Buil\-der}, a nested class of \texttt{Union\-Type}} to \say{better reflects the entangled nature of the two classes.} Concretely, the commit (i) refactors the \texttt{UnionTypeBuilder} class into \texttt{UnionType.Builder}, a nested class of \texttt{UnionType} (ii) make \texttt{UnionType}'s constructor private, and (iii) updates the \texttt{UnionType} constructor's documentation to indicate that this class has to be instantiated using its builder. \smallskip\noindent\fbox{\parbox{0.475\textwidth}{ \textbf{Summary (RQ3).} Our manual analysis indicates that \textsc{Cling}\xspace-based automated testing of $\langle$caller, callee$\rangle$ class pairs can expose actual problems that are not found by unit testing either the caller or callee class individually. These problems relate to conflicting assumptions on the safe use of methods across classes (\textit{e.g.,~} due to undocumented exception throws, implicit assumptions on parameter values, \textit{etc.}\xspace). Further investigations performed by the authors show that some of these faults are identified, confirmed, and fixed later by developers in the subsequent commits. }}
\section{Introduction} One of the key new application scenarios of future wireless networks is known as the Internet-of-Things (IoT), where it is envisioned that a very large number of devices (referred to as users) is sending data to a common access point. Typical examples thereof include sensors for monitoring smart infrastructure or biomedical devices. This type of communication is characterized by short messages and sporadic activity. The large number of users and the sporadic nature of the transmission makes it very wasteful to allocate dedicated transmission resources to all the users. In contrast to this requirements, the traditional information theoretic treatment of the multiple-access uplink channel is focused on few users $K$, large blocklength $n$ and coordinated transmission, in the sense that each user is given an individual distinct codebook, and the $K$ users agree on which rate $K$-tuple inside the capacity region to operate \cite{El1980}. Mathematically, this is reflected by considering the limit of infinite message- and blocklength while keeping the rate and the number of users fixed. Another route, more suited to the IoT requirements, was taken in recent works like \cite{Che2017,Pol2017}, where the number of users $K$ is taken to infinity along with the blocklength. It was shown, that the information theoretic limits may be drastically different, when the number of users grows together with the blocklength.\\ A novel random access paradigm, referred to as unsourced random-access (U-RA), was suggested in \cite{Pol2017}. In U-RA each user employs the same codebook and the task of the decoder is to recover the list of transmitted messages irrespective of the identity of the users. The number of \emph{inactive} users in such a model can be arbitrary large and the performance of the system depends only on the number of \emph{active} users $K_a$. Furthermore, a transmission protocol without the need for a subscriber identity is well suited for mass production. These features make U-RA particularly interesting for the aforementioned IoT applications. \\ In \cite{Pol2017} the U-RA model for the real adder AWGN-MAC was introduced and a finite-blocklength random coding bound on the achievable energy-per-bit over $N_0$($E_b/N_0$) was established. In following works several practical approaches were suggested which successively reduced the gap to the random coding achievability bound \cite{Vem2017,Ama2018,Mar2019,Pra2019}. The model has been extended to fading \cite{Kow2019a} and MIMO channels \cite{Fen2019d}. A concatenated coding approach for the U-RA problem on the real adder AWGN was proposed in \cite{Ama2018}. The idea is to split each transmission up into $L$ subslots. In each subslot the active users send a column from a common \emph{inner} coding matrix, while the symbols across all subslots are chosen from a common \emph{outer tree code}. In \cite{Fen2019c} the relation of the inner code to sparse regression codes (SPARCs) was pointed out. SPARCs were introduced in \cite{Jos2012} as a class of channel codes for the point-to-point AWGN channel, which can achieve rates up to Shannon capacity under maximum-likelihood decoding. Later, it was shown that SPARCs can achieve capacity under approximate message passing (AMP) decoding with either power allocation \cite{Rus2017} or spatial coupling \cite{Bar2017a}. AMP is an iterative low-complexity algorithm for solving random linear estimation problems or generalized versions thereof \cite{Don2009a,Ran2011,Bay2011}. A recent survey on SPARCs can be found in \cite{Ven2019a}.\\ Based on the connection of the inner code of \cite{Ama2018} to SPARCs, in \cite{Fen2019c} we suggested a modified version of AMP as an inner decoder, which improved the performance compared to the original inner decoder of \cite{Ama2018}. One of the appealing features of the AMP algorithm is, that it is possible to analyse its asymptotic performance, averaged over certain random matrix ensembles, through the so called state evolution (SE) equations \cite{Bay2011,Ber2017a}. Interestingly the SE equations can also be obtained as the fixed points of the replica symmetric (RS) potential, an expression that was first calculated through the non-rigorous replica method \cite{Tan2002,Guo2005c}. It was shown that in random linear estimation problems the fixpoints of the RS potential also characterize the symbols-wise posterior distribution of the input elements and therefore also the error probability of several optimal estimators like the symbol-by-symbol maximum-a-posteriori (SBS-MAP) estimator \cite{Guo2009,Ran2012a}. The difference between the AMP and the SBS-MAP estimate is, that the SBS-MAP estimate always corresponds to the global minimum of the RS-potential, while the AMP algorithm gets 'stuck' in local minima. The rate below which a local minimum appears was called the \emph{algorithmic} or \emph{belief-propagation} threshold in \cite{Guo2009, Krz2012a,Bar2017a}. It was shown in \cite{Krz2012a,Bar2017} that, despite the existence of local minima in the RS-potential, the AMP algorithm can still converge to the global minimum when used with spatially coupled matrices. Although the RS-potential was derived by (and named after) the non-rigorous replica method, it was recently proven to hold rigorously \cite{Ree2016,Bar2017}. The proof of \cite{Bar2017} is more general in the sense that it includes the case where the unknown vector ${\bf s}$ consists of blocks of size $2^J$ and each block is considered to be drawn iid from some distribution on $\mathbb{R}^{2^J}$. Initially, the result of \cite{Bar2017} relied on the conjecture that the SE equations of the AMP algorithm hold for the case of a block iid distribution. But \cite{Ber2017a} has shown that the SE equations hold under quite weak assumptions on ${\bf s}$, which include the block iid case, and therefore has proven the missing conjecture in \cite{Bar2017}.\\ Building on these results, in \cite{Fen2019c}, we calculated the RS-potential of the inner decoding problem, which allowed us to calculate the asymptotic error probabilities of the SBS-MAP and the AMP estimate. The results were semi-analytical, in the sense that the fixpoints of the RS-potential could only be evaluated numerically. In this work we show, that in the limit of $K_a,J\to\infty$ with $J = \alpha \log_2 K_a$ for some $\alpha >1$, the RS-potential converges to a simple form with a sharp threshold on the achievable sum-rates. \\ We have also shown in \cite{Fen2019c} that the inner decoding creates an effective outer OR-channel \cite{Cha1981,Coh1971} under a specific input constraint and we gave upper bound on the achievable rates on that channel. As pointed out in \cite{Fen2019e}, the outer tree code of \cite{Ama2018} is able to achieve that bound exactly in the limit of infinite subslots $L$ at a decoding complexity exponential in $L$ or up to a multiplicative constant with a decoding complexity linear in $L$.\\ Our main contribution in this work is to show that the concatenated coding scheme of \cite{Ama2018} consisting of multiuser SPARCs combined with an outer tree code is reliable, in the sense that it can achieve a vanishing per-user error probability in the limit of large blocklength and infinitely many users, at sum-rates up to the symmetric Shannon capacity $0.5\log_2(1+K_a{\sf SNR})$. This also shows that an unsourced random access scheme can, in the considered scaling regime $\alpha >1$, achieve the same symmetric rates as a non-unsourced scheme. \\ The U-RA problem on the real AWGN adder is formally equivalent to the On-Off random access scheme defined in \cite{Fle2009c}, and there are several other works, which analyse the sparse recovery problem, assuming an iid prior on the unknown vector, using either the replica method like \cite{Guo2009,Ree2012a} or more direct compressed sensing based methods like \cite{Guo2009,Fle2009c,Ree2012a}. It is not obvious how the asymptotic result of our Theorem \ref{thm:conc} below can be obtained directly from replica arguments, since it requires $J$ to scale proportional to the blocklength $n$, i.e. the undersampling ratio $2^J/n$ to go to infinity. Such a behavior is not covered by the available framework. We can obtain this result by first calculating the RS-potential in the limit of large $n,L$ with fixed $J$ and then take the limit $J\to\infty$. Also compressed sensing based results like \cite{Fle2009c,Ree2012a} are insufficient, since they contain unspecified constants, which are necessary to derive an exact capacity. \section{System model} \label{sec:system} Let $K_a$ denote the number of active users, $n$ the number of available channel uses and $B = nR$ the size of a message in bits. The spectral efficiency is given by $\mu = K_aB/n$. The channel model used is \begin{equation} {\bf y} = \sum_{i=1}^{K_\text{tot}} q_i {\bf x}_i + {\bf z}, \label{eq:basic_channel} \end{equation} where each ${\bf x}_i \in \mathcal{C} \subset \mathbb{R}^n$ is taken from a common codebook $\mathcal{C}$ and $q_i\in\{0,1\}$ are binary variables indicating whether a user is active. The number of active users is denoted as $K_a = \sum_{i=1}^{K_\text{tot}}q_i$. The codewords are assumed to be normalized $\|{\bf x}_i\|_2^2 = nP$ and the noise vector ${\bf z}$ is Gaussian iid $z_i\sim\mathcal{N}(0,N_0/2)$, such that ${\sf SNR} = 2P/N_0$ denotes the real per-user ${\sf SNR}$. All the active users pick one of the $2^B$ codewords from $\mathcal{C}$, based on their message $W_k\in[1:2^B]$. The decoder of the system produces a list $g({\bf y})$ of at most $K_a$ messages. An error is declared if one of the transmitted messages is missing in the output list $g({\bf y})$ and we define the per-user probability of error as: \begin{equation} P_e = \frac{1}{K_a}\sum_{k=1}^{K_a} \mathbb{P}(W_k \notin g({\bf y})). \end{equation} Note that the error is independent of the user identities in general and especially independent of the inactive users. The performance of the system is measured in terms of the standard quantity $E_b/N_0 := P/(RN_0) $ and the described coding construction is called \emph{reliable} if $P_e \to 0$ in the considered limit. \section{Coding Construction} \label{sec:coding} In this work we focus on a special type of codebook, where each transmitted codeword is created in the following way: First, the $B$-bit message $W_k$ of user $k$ is mapped to an $LJ$-bit codeword from some common \emph{outer} codebook. Then each of the $J$-bit sub-sequences is mapped to an index $i_k(l) \in [1:2^J]$ for $l=[1:L]$ and $k=[1:K_a]$. The inner codebook is based on a set of $L$ coding matrices ${\bf A}_l\in\mathbb{R}^{n\times 2^J}$. Let ${\bf a}^{(l)}_i$ with $i=[1:2^J]$ denote the columns of ${\bf A}_l$. The inner codeword of user $k$ corresponding to the sequence of indices $i_k(1),...,i_k(L)$ is then created as \begin{equation} {\bf x}_k = \sum_{l=1}^L {\bf a}^{(l)}_{i_k(l)}. \end{equation} The ${\bf A}_l$ are assumed to be scaled such that $\|{\bf a}^{(l)}_i\|_2^2 = nP/L$. The above encoding model can be written in matrix form as \begin{equation} {\bf y} = \sum_{k=1}^{K_a} {\bf A} {\bf m}_k + {\bf z} = {\bf A} \left(\sum_{k=1}^{K_a} {\bf m}_k\right) + {\bf z}. \label{eq:inner_channel} \end{equation} where ${\bf A} = ({\bf A}_1|...|{\bf A}_L)$ and ${\bf m}_k \in \mathbb{R}^{L2^J}$ is a binary vector satisfying $m_{k,(l-1)2^J + i_k(l)} = 1$ and zero otherwise, for all $l=[1:L]$. Let ${\bf s} = \sum_{k=1}^{K_a} {\bf m}_k$. \eqref{eq:inner_channel} can be viewed as concatenation of an inner point-to-point channel ${\bf s}\to {\bf A}{\bf s} + {\bf z}$ and an outer binary input adder MAC $({\bf m}_1,...,{\bf m}_{K_a}) \to {\bf s}$. We will refer to those as the \emph{inner} and \emph{outer channel}, the corresponding encoder and decoder will be referred to as \emph{inner} and \emph{outer encoder/decoder} and the aggregated system of inner and outer encoder/decoder as the \emph{concatenated system}.\\ The per-user inner rate in terms of bits/c.u. is given by $R_\text{in} := LJ/n$ and the outer rate is given by $R_\text{out} = B/LJ$. \section{Main Result} Our main result states that inner and outer codes exist, such that the concatenated coding construction described above is reliable at sum-rates up to the symmetric Shannon capacity. \begin{theorem} \label{thm:conc} Let $n,L,J,K_a \to \infty$ and $R,{\sf SNR} \to 0$ with fixed $E_b/N_0 = {\sf SNR}/(2R)$, $S=K_aR$ and $J = \alpha \log_2 K_a$ for any $\alpha >1$. In this limit there is a concatenated code as described above that can be decoded with $P_e \to 0$ if \begin{equation} S < \frac{1}{2}\log_2 (1 + K_a{\sf SNR}) \label{eq:conc_thm} \end{equation} \hfill$\square$ \end{theorem} Note that within our asymptotic regime $K_a{\sf SNR} = 2SE_b/N_0$ is a constant. As mentioned in Section \ref{sec:coding}, the inner decoding is equivalent to a structured sparse recovery problem of finding ${\bf s}$ from the knowledge of ${\bf y}$ and ${\bf A}$, where \begin{equation} {\bf y} = {\bf A}{\bf s} + {\bf z} \label{eq:inner_channel2} \end{equation} and ${\bf s}\in\mathbb{R}^{L2^J}$ is generated according to the model described in Section \ref{sec:coding}, i.e. ${\bf s} = \sum_{k=1}^{K_a} {\bf m}_k$. We say that ${\bf s}$ is \emph{generated from evenly distributed messages}, if the outer encoded sequences $i_k(1),...,i_k(L)$ are distributed evenly, i.e. $\mathbb{P}(i_k(s) = j) = 1/2^J$ for all $j=[1:2^J]$, and so $\mathbb{P}(m_{k,(l-1)2^J + i_k(l)} = 1) = 1/2^J$ for all $l=[1:L]$. We will show that it is enough to recover the support of ${\bf s}$. The asymptotic limitations of the problem of support recovery of structured sparse vectors in the considered scaling regime are a novel result on their own, therefore we analyse two types of support estimators. Let $\hbox{\boldmath$\rho$}$ be the binary vector indicating the support of ${\bf s}$, i.e. $\rho_i = 1$ if and only if $s_i \neq 0$. The SBS-MAP estimator of $\hbox{\boldmath$\rho$}$ \begin{equation} \hat{\rho}_i = \argmax_{\rho \in \{0,1\}} \mathbb{P}(\rho_i = \rho|{\bf y},{\bf A}) \label{eq:sbs-map} \end{equation} minimizes the SBS error probability $\mathbb{P}(\hat{\rho}_i \neq \rho_i)$ but is typically unfeasible to compute in practice. The second estimator is the low-complexity AMP algorithm, which produces an estimate of $\hbox{\boldmath$\rho$}$ by iterating the following equations \begin{equation} \begin{split} \hbox{\boldmath$\rho$}^{t+1} &= \eta_t({\bf A}^\top{\bf z}^t + \hbox{\boldmath$\rho$}^t) \\ {\bf z}^{t+1} &= {\bf y} - {\bf A}\hbox{\boldmath$\rho$}^{t+1} + \frac{2^JL}{n}{\bf z}^{t}\langle\eta^\prime_t({\bf A}^\top{\bf z}^t+\hbox{\boldmath$\rho$}^t)\rangle \end{split} \label{eq:amp} \end{equation} where the functions $\eta_t:\mathbb{R}^{2^JL}\to\mathbb{R}^{2^JL}$ are defined componentwise $\eta_t({\bf x}) = (\eta_{t,1}(x_1),...,\eta_{t,2^JL}(x_{2^JL}))^\top$ and each component is given by \begin{equation} \eta_{t,k}(x) = \sqrt{\hat{P}}\left(1 + \frac{p_0}{1-p_0}\exp\left(\frac{\hat{P}-2\sqrt{\hat{P}}x}{2\tau^2_t}\right)\right)^{-1} \end{equation} with $\tau^2_t = \|{\bf z}^t\|_2^2/n$, $\hat{P} = n{\sf SNR}/L$ and $p_0 = (1-2^{-J})^{K_a}$. $\langle{\bf x}\rangle = (\sum_{i=1}^N x_i)/N$ denotes the average of a vector, $\eta^\prime_t$ denotes the componentwise derivative of $\eta_t$ and we choose $\hbox{\boldmath$\rho$}^0 = \mathbf{0}$ as initial value. Our result on the inner recovery problem is as follows: \begin{theorem} \label{thm:inner} Let ${\bf A} \in \mathbb{R}^{L2^J}$ be a matrix with Gaussian iid entries $A_{ij}\sim\mathcal{N}(0,P/L)$ and let ${\bf y}$ and ${\bf s}$ be jointly distributed according to the model \eqref{eq:inner_channel2} with ${\bf s}$ being generated from evenly distributed messages. Furthermore, let $R_\text{in} = LJ/n$. In the limit $L,n,K_a,J\to \infty$ with $J = \alpha\log_2 K_a$ for some $\alpha>1$ and ${\sf SNR},R_\text{in} \to 0$ with fixed ratio $\mathcal{E}_\text{in}={\sf SNR}/(2R_\text{in})$ and fixed inner sum-rate $S_\text{in} = K_aR_\text{in}$ the following holds:\\ The SBS-MAP detector recovers the support of ${\bf s}$ reliably if \begin{equation} S_\text{in}\left(1-\frac{1}{\alpha}\right) < \frac{1}{2}\log_2 (1 + 2S_\text{in}\mathcal{E}_\text{in}) \label{eq:inner_thm_opt} \end{equation} and the AMP decoder recovers the support of ${\bf s}$ reliably if \begin{equation} S_\text{in}< \log_2 e\left(1 - \frac{1}{\alpha}\right)^{-1} - \frac{1}{\mathcal{E}_\text{in}} \label{eq:inner_thm_alg} \end{equation} \hfill$\square$ \end{theorem} \begin{remark} \normalfont In the case $K_a = 1$ no outer code is necessary, so $R_\text{in} = R$ and furthermore $S_\text{in} = R$ and $2S_\text{in}\mathcal{E}_\text{in} = {\sf SNR}$. Hence, if $K_a=1$ is fixed and $J\to\infty$, which corresponds to $\alpha \to \infty$, then \eqref{eq:inner_thm_opt} recovers the statements of \cite{Jos2012,Bar2017}, i.e. that SPARCs are reliable at rates up to the Shannon capacity $0.5\log_2 (1 + {\sf SNR})$ under optimal decoding. Also the algorithmic threshold \eqref{eq:inner_thm_alg} coincides with the result of \cite{Bar2017a}. In that sense Theorems \ref{thm:conc} and \ref{thm:inner} are an extension of \cite{Bar2017a} and show that SPARCs can achieve the optimal rate limit in the unsourced random access scenario. However, notice that the concept of our proof technique is simpler, since we make use of the result in \cite{Fen2019c}, which states that not only the sections are described by a decoupled channel model, but in the limit $J\to\infty$ also the individual components. So all the results of Theorem \ref{thm:inner} can be derived from the fixpoints of a simple scalar-to-scalar function. \end{remark} \begin{remark} \normalfont The sparse recovery problem \eqref{eq:inner_channel2} is very general and it is possible to describe random coding for several different classical multiple-access variants, where all the users are assumed to have their own codebook. For that, let $K_a = 1$ and identify the number of section with the number of users. The matrices ${\bf A}_1,...,{\bf A}_L$ are then the codebooks of the individual users: \begin{itemize} \item Fixed $L$ in the limit $J,n\to\infty$ describes the classical AWGN adder MAC from \cite{El1980}, where each user has his own codebook. \item $L,J,n\to\infty$, where only a fraction of the sections are non-zero describes the many-access channel treated in \cite{Che2017} \item $J$ fixed and $L,n\to\infty$ describes specific version of the many-access MAC treated in \cite{Zad2019,Pol2017} \end{itemize} It is interesting, that in the first case Theorem \ref{thm:inner} gives the correct result, after letting $\alpha\to\infty$, $K_a = 1$ and $L=K$. The case of $J,n\to\infty$ at finite $L$ is not directly covered though by our analysis framework. Nonetheless, we believe that an extension of this framework should be able to show that all of the above cases can be derived from a single scalar RS-potential, but this is left for future work. \end{remark} \begin{proof}[Proof of Theorem \ref{thm:conc}] Theorem \ref{thm:inner} shows that, if condition \eqref{eq:inner_thm_opt} is fulfilled, there exists an inner coding matrix ${\bf A}$ such that the power constraint is fullfilled on average and the SBS-MAP estimator \eqref{eq:sbs-map} recovers the support $\hbox{\boldmath$\rho$}$ of ${\bf s}$ reliably. Then $\hbox{\boldmath$\rho$}$ is given as the componentwise OR-combination of the input message vectors ${\bf m}_k$: \begin{equation} \hbox{\boldmath$\rho$} = \bigvee_{k=1}^{K_a}{\bf m}_k \end{equation} This creates an outer noiseless OR-MAC \cite{Cha1981,Coh1971}. Let us assume, that all the message vectors ${\bf m}_i$ are independently encoded by the same outer code and that the outer encoded symbols are evenly distributed. The per-user rate of this outer code is limited by \begin{equation} K_aR_\text{out}J < 2^J \mathcal{H}_2((1-2^{-J})^{K_a}) \label{eq:or_bound1} \end{equation} where $\mathcal{H}_2$ denotes the binary entropy function. As shown in \cite{Fen2019e}, in the considered limit $K_a,J\to\infty$, inequality \eqref{eq:or_bound1} implies \begin{equation} R_\text{out} < 1 - \alpha^{-1}. \label{eq:or_bound2} \end{equation} Although \eqref{eq:or_bound2} is formally an upper bound it is shown in \cite{Fen2019e} that the bound is tight, since it is achievable by the outer tree code described in \cite{Ama2018}. Therefore we can assume that a capacity achieving outer code exists if $R_\text{out} < 1 - \alpha^{-1}$. Since the total rate is given by $R = R_\text{in}R_\text{out}$, we have that $S = S_\text{in}R_\text{out}$ and \eqref{eq:conc_thm} follows from Theorem \ref{thm:inner}. \end{proof} It remains to proof Theorem \ref{thm:inner}. For that, we build on our results from \cite{Fen2019c}, which characterize the performance of the SBS-MAP estimator \eqref{eq:sbs-map} in the limit $L,n \to \infty$ with a fixed ratio $L/n$ and fixed $J$. Through a series of approximations it is shown in \cite{Fen2019c} that for a Gaussian iid ${\bf A}$ the error statistics of the SBS-MAP estimator \eqref{eq:sbs-map} converge to the error statistics of an SBS-MAP estimate in $2^JL$ decoupled real Gaussian channels: \begin{equation} r_i = (\eta\hat{P})^{\frac{1}{2}} s_i + z_i \label{eq:d_model} \end{equation} where $\hat{P} = n{\sf SNR}/L = J{\sf SNR}/ R_\text{in} = 2J\mathcal{E}_\text{in}$ and each component $i=[1:L2^J]$ is considered independently of the others. Furthermore, $s_i \in \{0,1\}$ with \begin{equation} p_0 := \mathbb{P}(s_i = 0) = (1-2^{-J})^{K_a} \end{equation} $\mathbb{P}(s_i = 1) = 1-p_0$ and $z_i\sim\mathcal{N}(0,1)$. The factor $\eta$ is determined by the minimizer of the function \begin{equation} i^{RS}(\eta) = 2^JI(\eta\hat{P}) + \frac{2^J}{2\beta}[(\eta - 1)\log_2 e - \log_2 \eta], \label{eq:rs_potential} \end{equation} where $I(\eta\hat{P})$ is the input-output mutual information of the decoupled model \eqref{eq:d_model} and $\beta = 2^JR_\text{in}/J$. The RS potential \eqref{eq:rs_potential} was introduced in \cite{Fen2019c} as an approximation of the true RS potential of the recovery problem \eqref{eq:inner_channel2}, but it was shown that the error terms in this approximation are of order $K_a/2^J$. In the asymptotic regime that we consider $K,J\to\infty$ with $2^J = K_a^\alpha$ and some $\alpha >1$ we have that $K_a/2^J \to 0$. Therefore, in this limit, \eqref{eq:rs_potential} indeed characterizes the performance of the SBS-MAP estimator \eqref{eq:sbs-map} exactly. The AMP algorithm \eqref{eq:amp} is strongly connected to the RS-potential \eqref{eq:rs_potential} in that the asymptotic error distribution of the AMP estimate at convergence is described by the same decoupled channel model \eqref{eq:d_model}, only that the coefficient $\eta$ that determines the effective channel strength is given by the smallest local minimizer of \eqref{eq:rs_potential} \cite{Fen2019c}. The next Theorem gives the pointwise limit of \eqref{eq:rs_potential}. \begin{theorem} \label{thm:limit} In the limit $K_a,J \to \infty$, $R_\text{in},{\sf SNR} \to 0$ with fixed ratios $\mathcal{E}_\text{in} = {\sf SNR}/(2R_\text{in})$, $S=KR_\text{in}$ and $J = \alpha \log_2 K_a$ for some $\alpha > 1$ the pointwise limit of the RS-potential \eqref{eq:rs_potential} is given by (up to additive or multiplicative terms that are independent of $\eta$ and therefore do not influence the critical points of $i^\text{RS}(\eta)$): \begin{equation} \begin{split} &i^\text{RS}_\infty(\eta):=\lim_{J\to\infty} i^\text{RS}(\eta) = \eta S \mathcal{E}_\text{in}[1-\theta(\eta-\bar{\eta})]\\ &+\frac{S}{\log_2 e}\left(1-\frac{1}{\alpha}\right)\theta(\eta-\bar{\eta}) + \frac{1}{2}[(\eta-1)-\ln \eta] \end{split} \label{eq:rs_limit} \end{equation} where \begin{equation} \theta(x):= \begin{cases} 1,\quad \text{if } x > 0\\ \frac{1}{2},\quad \text{if } x=0\\ 0,\quad \text{if } x<0\\ \end{cases} \label{def:theta} \end{equation} and \begin{equation} \bar{\eta} = \frac{1-\frac{1}{\alpha}}{\mathcal{E}_\text{in}\log_2 e} \label{def:eta_bar} \end{equation} \hfill$\square$ \end{theorem} \begin{proof} The RS-potential \eqref{eq:rs_potential}, rescaled by $\beta/2^J$ takes the form \begin{equation} i^\text{RS}(\eta) = \frac{R_\text{in}2^J}{J}I(\eta\hat{P}) + \frac{\log_2 e}{2}[(\eta - 1) - \ln \eta] \label{eq:rs_potential_rescaled} \end{equation} with the mutual information \begin{equation} I(\eta\hat{P}) := I(X;Y) = H(Y)-H(Y|X) \end{equation} for $P(X=0) = p_0$, $P(X=1) = 1-p_0$ and $Y = (\eta\hat{P})^\frac{1}{2}X + Z$, for $Z\sim\mathcal{N}(0,1)$ independent of $X$. The mutual information $I(\eta\hat{P})$ can be evaluated as follows. First, note that in an additive channel $H(Y|X) = H(Z)$, so $H(Y|X)$ is independent of $\eta$ and therefore we can ignore it. The distribution of $Y$ is given by \begin{equation} \begin{split} p(y) &= p_0p(y|x=0) + (1-p_0)p(y|x=1)\\ &= \frac{p_0}{\sqrt{2\pi}}\exp\left(-\frac{y^2}{2}\right)\\ &+ \frac{1-p_0}{\sqrt{2\pi}}\exp\left(-\frac{1}{2}\left(y-(\eta\hat{P})^\frac{1}{2}\right)^2\right), \end{split} \end{equation} so the differential output entropy $H(Y) = -\int p(y)\log_2 p(y)\mathrm{d}y$ can be split into the sum of two parts. Define $H_0$ and $H_1$ respectively by \begin{equation} H_0 := -\frac{1}{\sqrt{2\pi}}\int_{-\infty}^\infty \exp\left(-\frac{y^2}{2}\right)\log_2(p(y))\mathrm{d}y \label{def:H0} \end{equation} and \begin{equation} \begin{split} H_1 &:= -\frac{1}{\sqrt{2\pi}}\int_{-\infty}^\infty \exp\left(-\frac{1}{2}\left(y-(\eta\hat{P})^\frac{1}{2}\right)^2\right)\log_2(p(y))\mathrm{d}y\\ &= -\frac{1}{\sqrt{2\pi}}\int_{-\infty}^\infty \exp\left(-\frac{y^2}{2}\right)\log_2\left(p\left(y+(\eta\hat{P})^\frac{1}{2}\right)\right)\mathrm{d}y \end{split} \label{def:H1} \end{equation} such that the following relation holds: \begin{equation} I(\eta\hat{P}) = p_0H_0 + (1-p_0)H_1. \end{equation} Taking into account the scaling factor in \eqref{eq:rs_potential_rescaled} and using that $\lim_{J\to\infty}2^J(1-p_0) = K_a$ and $\lim_{J\to\infty}p_0 = 1$ we get that \begin{equation} \begin{split} \lim_{J\to\infty}\frac{R_\text{in}2^J}{J}I(\eta\hat{P}) &= \lim_{J\to\infty}\left(\frac{R_\text{in}2^J}{J}H_0 + \frac{S}{J}H_1\right) \label{eq:lim_I} \end{split} \end{equation} Now let us take a closer look at $\log_2 p(y) = \log_2(e) \ln p(y)$ which appears in both $H_0$ and $H_1$. Let $x_1,x_2 > 0$ with $x_2>x_1$. Then for the logarithm of the sum of exponentials it holds that \begin{equation} -\ln (e^{-x_1} + e^{-x_2}) = x_1 + \ln(1+e^{-(x_2-x_1)}). \end{equation} The error term $\ln(1+e^{-(x_2-x_1)})$ decays exponentially as the difference $x_2-x_1$ grows. Since $p(y)$ is the sum of two exponentials we can approximate $\ln p(y)$ by: \begin{equation} \begin{split} &-\ln p(y) =\\ &\min\left\{\frac{y^2}{2} - \ln(p_0),\frac{1}{2}\left(y-(\eta\hat{P})^\frac{1}{2}\right)^2-\ln(1-p_0)\right\} \end{split} \label{eq:max_logsum} \end{equation} This approximation is justified, since the difference of the two exponents in $p(y)$ is proportional to $\sqrt{J}$, and so it grows large with $J$. \footnote{Technically, this approximation does not hold at the point where the two exponents in $p(y)$ are equal. However, since the integral of a function does not depend on the value of the function at points of measure zero, we can redefine $\ln p(y)$ arbitrary at that point.} First, note, that since $\min\{a,b\} \leq a$ and $\min\{a,b\} \leq b$ holds for all $a,b\in \mathbb{R}$, $-\ln p(y) \leq y^2/2-\ln(1-p_0)$ as well as $-\ln p(y+(\eta\hat{P})^\frac{1}{2})\leq y^2/2 + \ln (2^J/K)$. This means that each of the integrands in $H_0$ and $H_1/J$ resp. is bounded uniformly, for all $J$, by an integrable function. This allows us to evaluate the integrals by using Lebesgue's theorem on dominated convergence. For this purpose we need to calculate the pointwise limits of $\ln p(y)$ and $\ln p(y+(\eta\hat{P})^\frac{1}{2})/J$. The theorem on dominated convergence then states, that the limit of the integrals is given by the integral of the pointwise limits.\\ The minimum in \eqref{eq:max_logsum} can be expressed as \begin{equation} -\ln p(y) = \begin{cases} \frac{y^2}{2} &\quad y<\gamma \\ \frac{1}{2}\left(y-(\eta\hat{P})^\frac{1}{2}\right)^2 +\ln\left(\frac{2^J}{K}\right)&\quad y\geq\gamma \end{cases} \end{equation} where we neglected $\ln(p_0)=\ln(1 - K/2^J) \sim K/2^J$ and $\gamma$ is given by \begin{equation} \gamma = \frac{1}{2}\left(\eta\hat{P}\right)^\frac{1}{2} + \ln\left(\frac{2^J}{K}\right)\left(\eta\hat{P}\right)^{-\frac{1}{2}}. \end{equation} Given the considered scaling constraints and $\hat{P} = J{\sf SNR}/R_\text{in} = 2J\mathcal{E}_\text{in}$, $\gamma$ can be rewritten as \begin{equation} \gamma = \sqrt{\frac{J}{2}}\left(\sqrt{\eta \mathcal{E}_\text{in}} + \frac{1-\frac{1}{\alpha}}{\log e\sqrt{\eta \mathcal{E}_\text{in}}}\right) \end{equation} The term in parenthesis is strictly positive for all $\eta$ so $\lim_{J\to\infty}\gamma = \infty$ and therefore the pointwise limit of $\ln p(y)$ is give by $\lim_{J\to\infty} \ln p(y) = -y^2/2$. It follows from Lebesgue's theorem on dominated convergence that \begin{equation} \lim_{J\to\infty} H_0 = \log_2 e \label{eq:lim_H0} \end{equation} which is independent of $\eta$, so we can ignore it when evaluating $i^\text{RS}(\eta)$. For the calculation of $H_1$ note that: \begin{equation} -\ln p\left(y+(\eta\hat{P})^\frac{1}{2}\right) = \begin{cases} \frac{1}{2}\left(y+(\eta\hat{P})^\frac{1}{2}\right)^2 &\quad y<\gamma'\\ \frac{y^2}{2} + \ln \left(\frac{2^J}{K}\right) &\quad y\geq\gamma' \end{cases} \end{equation} where we defined $\gamma' := \gamma - (\eta\hat{P})^\frac{1}{2}$. $\gamma'$ is not non-negative anymore and therefore the asymptotic behavior of $\gamma'$ depends on $\eta$ in the following way: \begin{equation} \lim_{J\to\infty}\gamma' = \begin{cases} \infty &\ \text{if } \eta < \bar{\eta}\\ 0 &\ \text{if } \eta = \bar{\eta}\\ -\infty &\ \text{if } \eta > \bar{\eta}\\ \end{cases} \end{equation} where $\bar{\eta}$ was defined in \eqref{def:eta_bar}. This gives the following asymptotic behavior: \begin{equation} -\lim_{J\to\infty}\frac{\ln p(y + (\eta\hat{P})^\frac{1}{2})}{J} = \begin{cases} \eta \mathcal{E}_\text{in} &\ \eta < \bar{\eta}\\ (1-\alpha^{-1})/\log_2 e &\ \eta \geq \bar{\eta} \end{cases} \label{eq:lim_ln} \end{equation} Finally, using \eqref{eq:lim_H0}, \eqref{def:H1}, \eqref{eq:lim_I}, \eqref{eq:lim_ln} and the $\theta$ function defined in \eqref{def:theta} we get: \begin{equation} \begin{split} &\lim_{J\to\infty}\left(\frac{i^\text{RS}(\eta)}{\log_2 e} - \frac{R_\text{in}2^J}{J}\right) = \eta S\mathcal{E}_\text{in}[1-\theta(\eta-\hat{\eta})] \\ &+ S \left(1-\frac{1}{\alpha}\right)\theta(\eta-\bar{\eta}) +\frac{1}{2}\left[(\eta - 1) - \ln \eta\right] \end{split} \end{equation} This proofs the statement of the theorem. \eqref{eq:max_logsum}. \end{proof} With Theorem \ref{thm:limit} we can proof Theorem \ref{thm:inner} and conclude the proof of Theorem \ref{thm:conc}. \begin{proof}[Proof of Theorem \ref{thm:inner}] We have discussed that the error probability of the SBS-MAP detector is specified by $\eta^*\hat{P} = \eta^*2\mathcal{E}_\text{in}J$, the effective channel strength in the decoupled model \eqref{eq:d_model}, where $\eta^*$ is the global minimizer of $i^\text{RS}(\eta)$ in the interval $[0,1]$. In a similar fashion the error probability of the AMP decoder \eqref{eq:amp} at convergence is described by $\eta^*_\text{loc}\hat{P}$, where $\eta^*_\text{loc}$ is the smallest local minimizer of $i^\text{RS}(\eta)$. \\ By Theorem \ref{thm:limit} the derivative of $i^\text{RS}_\infty(\eta)$ in \eqref{eq:rs_limit} is given by \begin{equation} \frac{\partial i^\text{RS}_\infty}{\partial \eta}(\eta) = S\mathcal{E}_\text{in}[1-\theta(\eta-\bar{\eta})] + \frac{1}{2}\left(1-\frac{1}{\eta}\right) \end{equation} for $\eta\neq\bar{\eta}$. The critical points of the derivative are \begin{equation} \eta_0^* = (1+2S\mathcal{E}_\text{in})^{-1} \end{equation} and \begin{equation} \eta_1^* = 1. \end{equation} Note that the first point $\eta_0^*$ is critical if and only if $\eta_0^* < \bar{\eta}$, which, after rearranging, gives precisely condition \eqref{eq:inner_thm_alg}. Also note, that the second derivative of $i^\text{RS}_\infty$ is $(4\eta)^{-2}$, so it is non-negative for all $\eta>0$. Therefore the critical points are indeed minima. A local maximum may appear only at $\eta=\bar{\eta}$ where $i^\text{RS}_\infty$ is not differentiable. The values of $i^\text{RS}_\infty$ at the minimal points are \begin{equation} \begin{split} i^\text{RS}_\infty(\eta^*_0) &= \frac{S\mathcal{E}_\text{in}}{1 + 2S\mathcal{E}_\text{in}} + \frac{1}{2}\left[\frac{-2S\mathcal{E}_\text{in}}{1 + 2S\mathcal{E}_\text{in}}+\ln(1+2S\mathcal{E}_\text{in})\right] \\ &= \frac{\log_2 (1 + 2S\mathcal{E}_\text{in})}{2\log_2 e} \end{split} \end{equation} if $\eta^*_0< \bar{\eta}$, and \begin{equation} i^\text{RS}_\infty(\eta^*_1) = \frac{S}{\log_2 e}\left(1 - \frac{1}{\alpha}\right) \end{equation} It is apparent that $i^\text{RS}_\infty(\eta^*_1)$ is the global minimum if and only if condition \eqref{eq:inner_thm_opt} is fulfilled. We implicitly used here that $\bar{\eta}\leq 1$, that is because condition \eqref{eq:inner_thm_opt} implies $\bar{\eta}< 1$, which can be seen by solving inequality \eqref{eq:inner_thm_opt} for $\mathcal{E}_\text{in}$. If $\eta^*_1 = 1$ is indeed the global minimizer of \eqref{eq:rs_limit}, the effective power in the decoupled channel \eqref{eq:d_model} is given by $\hat{P}$. Since $\hat{P}$ grows proportional to $J$, the effective power in the channel and therefore also the probability of misestimating the support go to zero with $J\to\infty$. This concludes the proof of Theorem \ref{thm:inner}. \end{proof} \section{Conclusion} We have shown that the concatenated coding construction in \cite{Ama2018,Fen2019c} is asymptotically optimal as the blocklength $n$, the number of active users $K_a$, the number $L$ and the size $J$ of the subslots go to infinity. This makes the SPARC based coding construction the first of the known U-RA codes to have an asymptotic optimality guarantee. Our result also shows more generally that the achievable trade-off between sumrate and $E_b/N_0$ in U-RA converges to the Shannon bound \eqref{eq:conc_thm} in the considered limit. \printbibliography \balance \end{document}
\section{Introduction}\label{sec:intro}} \blue{\IEEEPARstart{P}{erson} re-identification (Re-ID) has been widely studied as a specific person retrieval problem across non-overlapping cameras \cite{pami17craft,survey16}. Given a query person-of-interest, the goal of Re-ID is to determine whether this person has appeared in another place at a distinct time captured by a different camera, or even the same camera at a different time instant \cite{cvpr06reid}. The query person can be represented by an image \cite{arxiv18right,iccv15zheng,cvprw19aggregate}, a video sequence \cite{eccv14video,eccv16mars}, and even a text description \cite{icmr15,iccv17nlp}. Due to the urgent demand of public safety and increasing number of surveillance cameras, person Re-ID is imperative in intelligent surveillance systems with significant research impact and practical importance.} \blue{Re-ID is a challenging task due to the presence of different viewpoints \cite{iccv15viewpoint,avss14viewpoint}, varying low-image resolutions \cite{iccv15lowres,cvpr18multires}, illumination changes \cite{mm19illumination}, unconstrained poses \cite{cvpr16pose,cvpr17spindle,cvpr18pose}, occlusions \cite{cvpr18advocclus,cvpr19occlusion}, heterogeneous modalities \cite{iccv17cross,iccv17nlp}, complex camera environments, background clutter \cite{cvpr18mask}, unreliable bounding box generations, etc. These result in varying variations and uncertainty. In addition, for practical model deployment, the dynamic updated camera network \cite{cviu17camera,eccv16temporal}, large scale gallery with efficient retrieval \cite{tip17rank}, group uncertainty \cite{pami15openworld}, significant domain shift \cite{icip15active}, unseen testing scenarios \cite{cvpr19general}, incremental model updating \cite{eccv14camera} and changing cloths \cite{pami19cloth} also greatly increase the difficulties. These challenges lead that Re-ID is still unsolved problem. Early research efforts mainly focus on the hand-crafted feature construction with body structures \cite{eccv08elf,cvpr10sdalf,eccv14yang,cvpr15lomo,cvpr16gog} or distance metric learning \cite{cvpr12kissme,cvpr11prdc,eccv14kernelmetric,eccv12metric,iccv15liao,pami18unsupervised}. With the advancement of deep learning, person Re-ID has achieved inspiring performance on the widely used benchmarks \cite{iccv15zheng,iccv17duke,cvpr14cuhk,cvpr18msmt}. However, there is still a large gap between the research-oriented scenarios and practical applications \cite{tcsvt19survey}. This motivates us to conduct a comprehensive survey, develop a powerful baseline for different Re-ID tasks and discuss several future directions.} \black{Though some surveys have also summarized the deep learning techniques \cite{survey16,survey19neuro,survey18arxiv}, our survey makes three major differences: 1) We provide an in-depth and comprehensive analysis of existing deep learning methods by discussing their advantages and limitations, analyzing the state-of-the-arts. This provides insights for future algorithm design and new topic exploration. 2) We design a new powerful baseline (AGW: Attention Generalized mean pooling with Weighted triplet loss) and a new evaluation metric (mINP: mean Inverse Negative Penalty) for future developments. AGW achieves state-of-the-art performance on twelve datasets for four different Re-ID tasks. mINP provides a supplement metric to existing CMC/mAP, indicating the cost to find all the correct matches. 3) We make an attempt to discuss several important research directions with under-investigated open issues to narrow the gap between the closed-world and open-world applications, taking a step towards real-world Re-ID system design. } \begin{figure*}[t] \centering \includegraphics[height =3cm,width = 17.6cm]{fig/flow1.pdf}\\ \vspace{-2mm} \caption{The flow of designing a practical person Re-ID system, including five main steps: 1) \textit{Raw Data Collection}, (2) \textit{Bounding Box Generation}, 3) \textit{Training Data Annotation}, 4) \textit{Model Training} and 5) \textit{Pedestrian Retrieval}.}\label{fig:flow} \vspace{-4mm} \end{figure*} Unless otherwise specified, person Re-ID in this survey refers to the pedestrian retrieval problem across multiple surveillance cameras, from a computer vision perspective. Generally, building a person Re-ID system for a specific scenario requires five main steps (as shown in Fig.~\ref{fig:flow}): \vspace{-1mm} \begin{enumerate} \item \label{item:step1}Step 1: \textit{Raw Data Collection}: Obtaining raw video data from surveillance cameras is the primary requirement of practical video investigation. These cameras are usually located in different places under varying environments \cite{prl13survey}. Most likely, this raw data contains a large amount of complex and noisy background clutter. \item \label{item:step2} Step 2: \textit{Bounding Box Generation}: Extracting the bounding boxes which contain the person images from the raw video data. Generally, it is impossible to manually crop all the person images in large-scale applications. The bounding boxes are usually obtained by the person detection \cite{pami09detecsurvey,cvpr09detectbencmark} or tracking algorithms \cite{cvpr17persontrack,cvpr18multicam}. \item \label{item:step3}Step 3: \textit{Training Data Annotation}: Annotating the cross-camera labels. Training data annotation is usually indispensable for discriminative Re-ID model learning due to the large cross-camera variations. In the existence of large domain shift \cite{iccv13domain}, we often need to annotate the training data in every new scenario. \item \label{item:step4} Step 4: \textit{Model Training}: Training a discriminative and robust Re-ID model with the previous annotated person images/videos. This step is the core for developing a Re-ID system and it is also the most widely studied paradigm in the literature. Extensive models have been developed to handle the various challenges, concentrating on feature representation learning \cite{cvpr16dgd,cvpr17prw}, distance metric learning \cite{icpr14deepmetric,arxiv17triplet} or their combinations. \item \label{item:step5}Step 5: \textit{Pedestrian Retrieval}: The testing phase conducts the pedestrian retrieval. Given a person-of-interest (query) and a gallery set, we extract the feature representations using the Re-ID model learned in previous stage. A retrieved ranking list is obtained by sorting the calculated query-to-gallery similarity. Some methods have also investigated the ranking optimization to improve the retrieval performance \cite{cvpr17rerank,tmm16rank}. \end{enumerate} \begin{table}[t] \caption{\small{Closed-world \vs Open-world Person Re-ID.}}\label{tab:openclose} \vspace{-2mm} \begin{tabular}{l|l} \hline Closed-world~(Section \ref{sec:close})& Open-world~(Section \ref{sec:open})\\\hline $\checkmark$ Single-modality Data & Heterogeneous Data (\S~\ref{sec:hetro})\\ $\checkmark$ Bounding Boxes Generation & Raw Images/Videos (\S~\ref{sec:end2end})\\ $\checkmark$ Sufficient Annotated Data & Unavailable/Limited Labels (\S~\ref{sec:unsuper})\\ $\checkmark$ Correct Annotation & Noisy Annotation (\S~\ref{sec:noise})\\ $\checkmark$ Query Exists in Gallery & Open-set (\S~\ref{sec:openset})\\\hline \end{tabular} \vspace{-3mm} \end{table} According to the five steps mentioned above, we categorize existing Re-ID methods into two main trends: \textit{closed-world} and \textit{open-world} settings, as summarized in Table \ref{tab:openclose}. A step-by-step comparison is in the following five aspects: \vspace{-1mm} \begin{enumerate} \item \black{\textit{Single-modality \vs Heterogeneous Data}: For the raw data collection in Step \ref{item:step1}, all the persons are represented by images/videos captured by single-modality visible cameras in the closed-world setting \cite{iccv15zheng,eccv16mars,iccv17duke,cvpr14cuhk,eccv08elf,cvpr18msmt}. However, in practical open-world applications, we might also need to process heterogeneous data, which are infrared images \cite{iccv17cross,sensors17}, sketches \cite{pr19sketch}, depth images \cite{tip17rgbd}, or even text descriptions \cite{cvpr17nlp}. This motivates the heterogeneous Re-ID in \S~\ref{sec:hetro}.} \item \textit{Bounding Box Generation \vs Raw Images/Videos }: For the bounding box generation in Step \ref{item:step2}, the closed-world person Re-ID usually performs the training and testing based on the generated bounding boxes, where the bounding boxes mainly contain the person appearance information. In contrast, some practical open-world applications require end-to-end person search from the raw images or videos \cite{cvpr17prw,cvpr17joint}. This leads to another open-world topic, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, end-to-end person search in \S~\ref{sec:end2end}. \item \textit{Sufficient Annotated Data \vs Unavailable/Limited Labels}: For the training data annotation in Step \ref{item:step3}, the closed-world person Re-ID usually assumes that we have enough annotated training data for supervised Re-ID model training. However, label annotation for each camera pair in every new environment is time consuming and labor intensive, incurring high costs. In open-world scenarios, we might not have enough annotated data (\emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, limited labels) \cite{cvpr14semi} or even without any label information \cite{cvpr13saliency}. This inspires the discussion of the unsupervised and semi-supervised Re-ID in \S~\ref{sec:unsuper}. \item \black{\textit{Correct Annotation \vs Noisy Annotation}: For Step \ref{item:step4}, existing closed-world person Re-ID systems usually assume that all the annotations are correct, with clean labels. However, annotation noise is usually unavoidable due to annotation error (\emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, label noise) or imperfect detection/tracking results (\emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, sample noise, partial Re-ID \cite{cvpr19partial}). This leads to the analysis of noise-robust person Re-ID under different noise types in \S~\ref{sec:noise}.} \item \textit{Query Exists in Gallery \vs Open-set}: In the pedestrian retrieval stage (Step \ref{item:step5}), most existing closed-world person Re-ID works assume that the query must occur in the gallery set by calculating the CMC \cite{iccv07cmc} and mAP \cite{iccv15zheng}. However, in many scenarios, the query person may not appear in the gallery set \cite{icip16openset,tip18open}, or we need to perform the verification rather than retrieval \cite{pami15openworld}. This brings us to the open-set person Re-ID in \S~\ref{sec:openset}. \end{enumerate} This survey first introduces the widely studied person Re-ID under closed-world settings in \S~\ref{sec:close}. A detailed review on the datasets and the state-of-the-arts are conducted in \S~\ref{sec:data}. We then introduce the open-world person Re-ID in \S~\ref{sec:open}. An outlook for future Re-ID is presented in \S~\ref{sec:future}, including a new evaluation metric (\S~\ref{sec:newmetric}), a new powerful AGW baseline (\S~\ref{sec:newbase}). We discuss several under-investigated open issues for future study (\S~\ref{sec:openissue}). Conclusions will be drawn in \S~\ref{sec:conclusion}. A structure overview is shown in the supplementary. \begin{figure*}[t] \centering \includegraphics[height=3cm]{fig/feat.pdf}\\ \vspace{-2mm} \caption{Four different feature learning strategies. a) Global Feature, learning a global representation for each person image in \S~\ref{sec:featglobal}; b) Local Feature, learning part-aggregated local features in \S~\ref{sec:featlocal}; c) Auxiliary Feature, learning the feature representation using auxiliary information, \emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, attributes \cite{eccv16attribute,arxiv17att} in \S~\ref{sec:feataux} and d) Video Feature , learning the video representation using multiple image frames and temporal information \cite{iccv15des,tip18videotemp} in \S~\ref{sec:featvideo}. }\label{fig:featclass} \vspace{-2mm} \end{figure*} \section{Closed-world Person Re-Identification}\label{sec:close} This section provides an overview for closed-world person Re-ID. As discussed in \S~\ref{sec:intro}, this setting usually has the following assumptions: 1) person appearances are captured by single-modality visible cameras, either by image or video; 2) The persons are represented by bounding boxes, where most of the bounding box area belongs the same identity; 3) The training has enough annotated training data for supervised discriminative Re-ID model learning; 4) The annotations are generally correct; 5) The query person must appear in the gallery set. Typically, a standard closed-world Re-ID system contains three main components: \textit{Feature Representation Learning} (\S~\ref{sec:feat}), which focuses on developing the feature construction strategies; \textit{Deep Metric Learning} (\S~\ref{sec:metric}), which aims at designing the training objectives with different loss functions or sampling strategies; and \textit{Ranking Optimization} (\S~\ref{sec:rank}), which concentrates on optimizing the retrieved ranking list. An overview of the datasets and state-of-the-arts with in-depth analysis is provided in \S~\ref{sec:datasota}. \subsection{Feature Representation Learning}\label{sec:feat} We firstly discuss the feature learning strategies in closed-world person Re-ID. There are four main categories (as shown in Fig.~\ref{fig:featclass}): a) Global Feature (\S~\ref{sec:featglobal}), it extracts a global feature representation vector for each person image without additional annotation cues \cite{cvpr17prw}; b) Local Feature (\S~\ref{sec:featlocal}), it aggregates part-level local features to formulate a combined representation for each person image \cite{cvpr17partalign,tip19part,eccv18pcb}; c) Auxiliary Feature (\S~\ref{sec:feataux}), it improves the feature representation learning using auxiliary information, \emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, attributes \cite{eccv16attribute,arxiv17att,icpr16attributes}, GAN generated images \cite{iccv17duke}, etc. d) Video Feature (\S~\ref{sec:featvideo}), it learns video representation for video-based Re-ID \cite{eccv14video} using multiple image frames and temporal information \cite{iccv15des,tip18videotemp}. We also review several specific architecture designs for person Re-ID in \S~\ref{sec:featarchi}. \subsubsection{Global Feature Representation Learning}\label{sec:featglobal} Global feature representation learning extracts a global feature vector for each person image, as shown in Fig.~\ref{fig:featclass}(a). Since deep neural networks are originally applied in image classification \cite{arxvi14vgg,cvpr16resnet}, global feature learning is the primary choice when integrating advanced deep learning techniques into the person Re-ID field in early years. \black{To capture the fine-grained cues in global feature learning, A joint learning framework consisting of a single-image representation (SIR) and cross-image representation (CIR) is developed in \cite{cvpr16jointsir}, trained with triplet loss using specific sub-networks. The widely-used ID-discriminative Embedding (IDE) model \cite{cvpr17prw} constructs the training process as a multi-class classification problem by treating each identity as a distinct class. It is now widely used in Re-ID community \cite{iccv17duke,iccv17svd,cvpr17rerank,eccv18pcb,eccv18race}. Qian \textit{et al.} \cite{iccv17multiscale} develop a multi-scale deep representation learning model to capture discriminative cues at different scales.} \black{\textbf{Attention Information.} Attention schemes have been widely studied in literature to enhance representation learning \cite{pr19attention}. 1) \textit{Group 1: Attention within the person image.} Typical strategies include the pixel level attention \cite{cvpr18hann} and the channel-wise feature response re-weighting \cite{cvpr18hann,eccv18mancs,cvpr18kronecker,cvpr18cascadedconv}, or background suppressing \cite{cvpr18mask}. The spatial information is integrated in \cite{iccv19selfattention}. 2) \textit{Group 2: attention across multiple person images.} A context-aware attentive feature learning method is proposed in \cite{cvpr18dualatt}, incorporating both an intra-sequence and inter-sequence attention for pair-wise feature alignment and refinement. The attention consistency property is added in \cite{cvpr19siameseattend,iccv19consistatt}. Group similarity \cite{cvpr18groupcrf,iccv19sft} is another popular approach to leverage the cross-image attention, which involves multiple images for local and global similarity modeling. The first group mainly enhances the robustness against misalignment/imperfect detection, and the second improves the feature learning by mining the relations across multiple images. } \subsubsection{Local Feature Representation Learning}\label{sec:featlocal} \black{It learns part/region aggregated features, making it robust against misalignment \cite{eccv16lstmpart,eccv18pcb}. The body parts are either automatically generated by human parsing/pose estimation (Group 1) or roughly horizontal division (Group 2).} \black{With automatic body part detection, the popular solution is to combine the full body representation and local part features \cite{eccv18partalign,iccv17partalign}. Specifically, the multi-channel aggregation \cite{cvpr16part}, multi-scale context-aware convolutions \cite{cvpr17contextpart}, multi-stage feature decomposition \cite{cvpr17spindle} and bilinear-pooling \cite{eccv18partalign} are designed to improve the local feature learning. Rather than feature level fusion, the part-level similarity combination is also studied in \cite{iccv17partalign}. Another popular solution is to enhance the robustness against background clutter, using the pose-driven matching \cite{iccv17pose}, pose-guided part attention module \cite{cvpr18partatt}, semantically part alignment \cite{cvpr19denselyalign,iccv19dualpart}. } \black{For horizontal-divided region features, multiple part-level classifiers are learned in Part-based Convolutional Baseline (PCB) \cite{eccv18pcb}, which now serves as a strong part feature learning baseline in the current state-of-the-art \cite{cvpr19viewpoint,cvpr19exemplarmemory,cvpr19general}. To capture the relations across multiple body parts, the Siamese Long Short-Term Memory (LSTM) architecture \cite{eccv16lstmpart}, second-order non-local attention \cite{iccv19secondnonlocal}, Interaction-and-Aggregation (IA) \cite{cvpr19interact} are designed to reinforce the feature learning.} \black{The first group uses human parsing techniques to obtain semantically meaningful body parts, which provides well-align part features. However, they require an additional pose detector and are prone to noisy pose detections \cite{eccv18pcb}. The second group uses a uniform partition to obtain the horizontal stripe parts, which is more flexible, but it is sensitive to heavy occlusions and large background clutter.} \subsubsection{Auxiliary Feature Representation Learning}\label{sec:feataux} Auxiliary feature representation learning usually requires additional annotated information (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, semantic attributes \cite{eccv16attribute}) or generated/augmented training samples to reinforce the feature representation \cite{iccv17duke,cvpr18advocclus}. \textbf{Semantic Attributes}. A joint identity and attribute learning baseline is introduced in \cite{arxiv17att}. Su \textit{et al.} \cite{eccv16attribute} propose a deep attribute learning framework by incorporating the predicted semantic attribute information, enhancing the generalizability and robustness of the feature representation in a semi-supervised learning manner. Both the semantic attributes and the attention scheme are incorporated to improve part feature learning \cite{cvpr19aanet}. Semantic attributes are also adopted in \cite{cvpr19videoatt} for video Re-ID feature representation learning. They are also leveraged as the auxiliary supervision information in unsupervised learning \cite{cvpr18att}. \black{\textbf{Viewpoint Information.} The viewpoint information is also leveraged to enhance the feature representation learning \cite{cvpr18multfac,iccv19view}. Multi-Level Factorisation Net (MLFN) \cite{cvpr18multfac} also tries to learn the identity-discriminative and view-invariant feature representations at multiple semantic levels. Liu \textit{et al.} \cite{iccv19view} extract a combination of view-generic and view-specific learning. An angular regularization is incorporated in \cite{aaai20val} in the viewpoint-aware feature learning.} \textbf{Domain Information.} A Domain Guided Dropout (DGD) algorithm \cite{cvpr16dgd} is designed to adaptively mine the domain-sharable and domain-specific neurons for multi-domain deep feature representation learning. Treating each camera as a distinct domain, Lin \textit{et al.} \cite{cvpr17consistent} propose a multi-camera consistent matching constraint to obtain a globally optimal representation in a deep learning framework. Similarly, the camera view information or the detected camera location is also applied in \cite{cvpr18pose} to improve the feature representation with camera-specific information modeling. \black{\textbf{GAN Generation.} This section discusses the use of GAN generated images as the auxiliary information. Zheng \textit{et al.} \cite{iccv17duke} start the first attempt to apply the GAN technique for person Re-ID. It improves the supervised feature representation learning with the generated person images. Pose constraints are incorporated in \cite{cvpr18posetrans} to improve the quality of the generated person images, generating the person images with new pose variants. A pose-normalized image generation approach is designed in \cite{eccv18posenorm}, which enhances the robustness against pose variations. Camera style information \cite{cvpr18camera} is also integrated in the image generation process to address the cross camera variations. A joint discriminative and generative learning model \cite{cvpr19joint} separately learns the appearance and structure codes to improve the image generation quality. Using the GAN generated images is also a widely used approach in unsupervised domain adaptation Re-ID \cite{cvpr18spgan,iccv19crosspose}, approximating the target distribution.} \black{\textbf{Data Augmentation.} For Re-ID, custom operations are random resize, cropping and horizontal flip \cite{arxiv19trick}. Besides, adversarially occluded samples \cite{cvpr18advocclus} are generated to augment the variation of training data. A similar random erasing strategy is proposed in \cite{arxiv17randomerase}, adding random noise to the input images. A batch DropBlock \cite{iccv19dropblock} randomly drops a region block in the feature map to reinforce the attentive feature learning. Bak \textit{et al.} \cite{eccv18bak} generate the virtual humans rendered under different illumination conditions. These methods enrich the supervision with the augmented samples, improving the generalizability on the testing set.} \subsubsection{Video Feature Representation Learning}\label{sec:featvideo} Video-based Re-ID is another popular topic \cite{prid2011}, where each person is represented by a video sequence with multiple frames. Due to the rich appearance and temporal information, it has gained increasing interest in the Re-ID community. This also brings in additional challenges in video feature representation learning with multiple images. \black{The primary challenge is to accurately capture the temporal information. A recurrent neural network architecture is designed for video-based person Re-ID \cite{cvpr16video}, which jointly optimizes the final recurrent layer for temporal information propagation and the temporal pooling layer. A weighted scheme for spatial and temporal streams is developed in \cite{iccv17videotwo}. Yan \textit{et al.} \cite{eccv16aggregate} present a progressive/sequential fusion framework to aggregate the frame-level human region representations. Semantic attributes are also adopted in \cite{cvpr19videoatt} for video Re-ID with feature disentangling and frame re-weighting. Jointly aggregating the frame-level feature and spatio-temporal appearance information is crucial for video representation learning \cite{cvpr17forest,iccv17joint,iccv19coseg}.} \black{Another major challenge is the unavoidable outlier tracking frames within the videos. Informative frames are selected in a joint Spatial and Temporal Attention Pooling Network (ASTPN) \cite{iccv17joint}, and the contextual information is integrated in \cite{cvpr17forest}. A co-segmentation inspired attention model \cite{iccv19coseg} detects salient features across multiple video frames with mutual consensus estimation. A diversity regularization \cite{cvpr18diversityatt} is employed to mine multiple discriminative body parts in each video sequence. An affine hull is adopted to handle the outlier frames within the video sequence \cite{eccv18race}. An interesting work \cite{cvpr19occlusion} utilizes the multiple video frames to auto-complete occluded regions. These works demonstrate that handling the noisy frames can greatly improve the video representation learning.} \black{It is also challenging to handle the varying lengths of video sequences, Chen \textit{et al.} \cite{cvpr18snippet} divide the long video sequences into multiple short snippets, aggregating the top-ranked snippets to learn a compact embedding. A clip-level learning strategy \cite{aaai19sta} exploits both spatial and temporal dimensional attention cues to produce a robust clip-level representation. Both the short- and long-term relations \cite{iccv19longshort} are integrated in a self-attention scheme.} \subsubsection{Architecture Design}\label{sec:featarchi} Framing person Re-ID as a specific pedestrian retrieval problem, most existing works adopt the network architectures \cite{arxvi14vgg,cvpr16resnet} designed for image classification as the backbone. Some works have tried to modify the backbone architecture to achieve better Re-ID features. For the widely used ResNet50 backbone \cite{cvpr16resnet}, the important modifications include changing the last convolutional stripe/size to 1 \cite{eccv18pcb}, employing adaptive average pooling in the last pooling layer \cite{eccv18pcb}, and adding bottleneck layer with batch normalization after the pooling layer \cite{iccv17svd}. \black{Accuracy is the major concern for specific Re-ID network architecture design to improve the accuracy, Li \textit{et al.} \cite{cvpr14cuhk} start the first attempt by designing a filter pairing neural network (FPNN), which jointly handles misalignment and occlusions with part discriminative information mining. Wang \textit{et al.} \cite{cvpr18cascadedconv} propose a BraidNet with a specially designed WConv layer and Channel Scaling layer. The WConv layer extracts the difference information of two images to enhance the robustness against misalignments and Channel Scaling layer optimizes the scaling factor of each input channel. A Multi-Level Factorisation Net (MLFN) \cite{cvpr18multfac} contains multiple stacked blocks to model various latent factors at a specific level, and the factors are dynamically selected to formulate the final representation. An efficient fully convolutional Siamese network \cite{cvpr18efficient} with convolution similarity module is developed to optimize multi-level similarity measurement. The similarity is efficiently captured and optimized by using the depth-wise convolution.} \black{Efficiency is another important factor for Re-ID architecture design. An efficient small scale network, namely Omni-Scale Network (OSNet) \cite{iccv19osnet}, is designed by incorporating the point-wise and depth-wise convolutions. To achieve multi-scale feature learning, a residual block composed of multiple convolutional streams is introduced.} With the increasing interest in auto-machine learning, an Auto-ReID \cite{iccv19autoreid} model is proposed. Auto-ReID provides an efficient and effective automated neural architecture design based on a set of basic architecture components, using a part-aware module to capture the discriminative local Re-ID features. This provides a potential research direction in exploring powerful domain-specific architectures. \begin{figure}[t] \centering \includegraphics[width = 8.8cm]{fig/metric.pdf}\\ \vspace{-2mm} \caption{Three kinds of widely used loss functions in the literature. (a) Identity Loss \cite{iccv17svd,iccv17duke,cvpr18camera,cvpr18background} ; (b) Verification Loss \cite{cvpr18groupcrf,arxiv16deep} and (c) Triplet Loss \cite{arxiv17triplet,cvpr18mask,cvpr18multires}. Many works employ their combinations \cite{cvpr18efficient,eccv18mancs,tifs19vtreid,arxiv16deep}. }\label{fig:metric} \vspace{-2mm} \end{figure} \subsection{Deep Metric Learning}\label{sec:metric} Metric learning has been extensively studied before the deep learning era by learning a Mahalanobis distance function \cite{cvpr11prdc,cvpr12kissme} or projection matrix \cite{iccv15liao}. The role of metric learning has been replaced by the loss function designs to guide the feature representation learning. We will first review the widely used loss functions in \S~\ref{sec:metricloss} and then summarize the training strategies with specific sampling designs \S~\ref{sec:metrictrain}. \subsubsection{Loss Function Design}\label{sec:metricloss} This survey only focuses on the loss functions designed for deep learning \cite{icpr14deepmetric}. An overview of the distance metric learning designed for hand-crafted systems can be found in \cite{survey16,survey16metric}. There are three widely studied loss functions with their variants in the literature for person Re-ID, including the identity loss, verification loss and triplet loss. An illustration of three loss functions is shown in Fig.~\ref{fig:metric}. \textbf{Identity Loss.} It treats the training process of person Re-ID as an image classification problem \cite{cvpr17prw}, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, each identity is a distinct class. In the testing phase, the output of the pooling layer or embedding layer is adopted as the feature extractor. Given an input image $x_i$ with label $y_i$, the predicted probability of $x_i$ being recognized as class $y_i$ is encoded with a softmax function, represented by $p(y_i|x_i)$. The identity loss is then computed by the cross-entropy \begin{equation}\label{eq:identityloss} \mathcal{L}_{id} = -\frac{1}{n} \sum\nolimits_{i = 1}^{n} {\log(p(y_i|x_i) )}, \end{equation} where $n$ represents the number of training samples within each batch. The identity loss has been widely used in existing methods \cite{iccv17svd,iccv17duke,cvpr18spgan,cvpr18advocclus,cvpr18wu,cvpr18camera,cvpr18background,cvpr19exemplarmemory,cvpr19siameseattend,iccv19sft}. Generally, it is easy to train and automatically mine the hard samples during the training process, as demonstrated in \cite{cvpr19uel}. Several works have also investigated the softmax variants \cite{wacv18cosine}, such as the sphere loss in \cite{spherereid19} and AM softmax in \cite{iccv19sft}. Another simple yet effective strategy, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, label smoothing \cite{iccv17duke,arxiv19trick}, is generally integrated into the standard softmax cross-entropy loss. Its basic idea is to avoid the model fitting to over-confident annotated labels, improving the generalizability \cite{arxiv19labelsmooth}. \textbf{Verification Loss.} It optimizes the pairwise relationship, either with a contrastive loss \cite{eccv16lstmpart,cvpr18spgan} or binary verification loss \cite{arxiv16deep,cvpr14cuhk}. The contrastive loss improves the relative pairwise distance comparison, formulated by \begin{equation}\label{eq:contrastive} \mathcal{L}_{con} = (1- \delta_{ij})\{\max(0, \rho - d_{ij})\}^2 + \delta_{ij} d_{ij}^2, \end{equation} where $d_{ij}$ represents the Euclidean distance between the embedding features of two input samples $x_i$ and $x_j$. $\delta_{ij}$ is a binary label indicator ($\delta_{ij} =1$ when $x_i$ and $x_j$ belong to the same identity, and $\delta_{ij} =0$, otherwise). $\rho$ is a margin parameter. There are several variants, \emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, the pairwise comparison with ranking SVM in \cite{cvpr16jointsir}. Binary verification \cite{arxiv16deep,cvpr14cuhk} discriminates the positive and negative of a input image pair. Generally, a differential feature $f_{ij}$ is obtained by $f_{ij} = (f_{j}- f_{j})^2$ \cite{arxiv16deep}, where $f_{i}$ and $f_{j}$ are the embedding features of two samples $x_i$ and $x_j$. The verification network classifies the differential feature into positive or negative. We use $p(\delta_{ij}|f_{ij})$ to represent the probability of an input pair ($x_i$ and $x_j$) being recognized as $\delta_{ij}$ (0 or 1). The verification loss with cross-entropy is \begin{equation}\label{eq:veriloss} \mathcal{L}_{veri}(i,j) = - {\delta_{ij} \log(p(\delta_{ij}|f_{ij})) } - (1-\delta_{ij})\log(1-p(\delta_{ij}|f_{ij})). \end{equation} The verification is often combined with the identity loss to improve the performance \cite{cvpr18groupcrf,arxiv16deep,cvpr18spgan,eccv16lstmpart}. \textbf{Triplet loss.} It treats the Re-ID model training process as a retrieval ranking problem. The basic idea is that the distance between the positive pair should be smaller than the negative pair by a pre-defined margin \cite{arxiv17triplet}. Typically, a triplet contains one anchor sample $x_i$, one positive sample $x_j$ with the same identity, and one negative sample $x_k$ from a different identity. The triplet loss with a margin parameter is represented by \begin{equation}\label{eq:triloss} \mathcal{L}_{tri}(i,j,k) = \max (\rho + d_{ij} - d_{ik}, 0), \end{equation} where $d(\cdot)$ measures the Euclidean distance between two samples. \black{The large proportion of easy triplets will dominate the training process if we directly optimize above loss function, resulting in limited discriminability. To alleviate this issue, various informative triplet mining methods have been designed \cite{arxiv17triplet,cvpr18mask,cvpr18multires,eccv18partalign}. The basic idea is to select the informative triplets \cite{arxiv17triplet,eccv16deepmetric}. Specifically, a moderate positive mining with a weight constraint is introduced in \cite{eccv16deepmetric}, which directly optimizes the feature difference. Hermans \textit{et al.} \cite{arxiv17triplet} demonstrate that the online hardest positive and negative mining within each training batch is beneficial for discriminative Re-ID model learning. Some methods also studied the point to set similarity strategy for informative triplet mining \cite{cvpr17point2set,eccv18hardaware}. This enhances robustness against the outlier samples with a soft hard-mining scheme.} To further enrich the triplet supervision, a quadruplet deep network is developed in \cite{cvpr17quadloss}, where each quadruplet contains one anchor sample, one positive sample and two mined negative samples. The quadruplets are formulated with a margin-based online hard negative mining. Optimizing the quadruplet relationship results in smaller intra-class variation and larger inter-class variation. The combination of triplet loss and identity loss is one of the most popular solutions for deep Re-ID model learning \cite{cvpr18efficient,cvpr18posetrans,eccv18mancs,tifs19vtreid,cvpr19denselyalign,cvpr19general,cvpr19unpatch,iccv19dualpart,iccv19humanloop,iccv19consistatt,iccv19selfattention}. These two components are mutually beneficial for discriminative feature representation learning. \textbf{OIM loss.} In addition to the above three kinds of loss functions, an Online Instance Matching (OIM) loss \cite{cvpr17joint} is designed with a memory bank scheme. A memory bank $\{v_k,k=1,2,\cdots,c\}$ contains the stored instance features, where $c$ denotes the class number. The OIM loss is then formulated by \begin{equation}\label{eq:oimloss} \mathcal{L}_{oim} = -\frac{1}{n} \sum\nolimits_{i = 1}^{n} {\log \frac{\exp (v_i^T f_i / \tau)}{\sum\nolimits_{k=1}^{c}\exp (v_k^T f_i / \tau)} }, \end{equation} where $v_i$ represents the corresponding stored memory feature for class $y_i$, and $\tau$ is a temperature parameter that controls the similarity space \cite{cvpr19uel}. $v_i^T f_i$ measures the online instance matching score. The comparison with a memorized feature set of unlabelled identities is further included to calculate the denominator \cite{cvpr17joint}, handling the large instance number of non-targeted identities. This memory scheme is also adopted in unsupervised domain adaptive Re-ID \cite{cvpr19exemplarmemory}. \subsubsection{Training strategy}\label{sec:metrictrain} \black{The batch sampling strategy plays an important role in discriminative Re-ID model learning. It is challenging since the number of annotated training images for each identity varies significantly \cite{iccv15zheng}. Meanwhile, the severely imbalanced positive and negative sample pairs increases additional difficulty for the training strategy design \cite{iccv15liao}.} \black{The most commonly used training strategy for handling the imbalanced issue is identity sampling \cite{arxiv17triplet,arxiv19trick}. For each training batch, a certain number of identities are randomly selected, and then several images are sampled from each selected identity. This batch sampling strategy guarantees the informative positive and negative mining.} \black{To handle the imbalance issue between the positive and negative, adaptive sampling is the popular approach to adjust the contribution of positive and negative samples, such as Sample Rate Learning (SRL) \cite{cvpr18cascadedconv}, curriculum sampling \cite{eccv18mancs}. Another approach is sample re-weighting, using the sample distribution \cite{eccv18mancs} or similarity difference \cite{cvpr18multicam} to adjust the sample weight. An efficient reference constraint is designed in \cite{cvpr18reference} to transform the pairwise/triplet similarity to a sample-to-reference similarity, addressing the imbalance issue and enhancing the discriminability, which is also robust to outliers.} \black{To adaptively combine multiple loss functions, a multi-loss dynamic training strategy \cite{cvpr19multi} adaptively reweights the identity loss and triplet loss, extracting appropriate component shared between them. This multi-loss training strategy leads to consistent performance gain.} \begin{figure}[t] \centering \includegraphics[width = 8cm]{fig/rerank.pdf}\\ \vspace{-2mm} \caption{An illustration of re-ranking in person Re-ID. Given a query example, an initial rank list is retrieved, where the hard matches are ranked in the bottom. Using the top-ranked easy positive match (1) as query to search in the gallery, we can get the hard match (2) and (3) with similarity propagation in the gallery set.}\label{fig:rerank} \vspace{-2mm} \end{figure} \subsection{Ranking Optimization}\label{sec:rank} Ranking optimization plays a crucial role in improving the retrieval performance in the testing stage. Given an initial ranking list, it optimizes the ranking order, either by automatic gallery-to-gallery similarity mining \cite{mm15rank,cvpr17rerank} or human interaction \cite{iccv13pop,eccv16humanloop}. Rank/Metric fusion \cite{cvpr15metricensemble,cvpr19rerank} is another popular approach for improving the ranking performance with multiple ranking list inputs. \subsubsection{Re-ranking}\label{sec:rankre} \black{The basic idea of re-ranking is to utilize the gallery-to-gallery similarity to optimize the initial ranking list, as shown in Fig.~\ref{fig:rerank}. The top-ranked similarity pulling and bottom-ranked dissimilarity pushing is proposed in \cite{mm15rank}. The widely-used $k$-reciprocal reranking \cite{cvpr17rerank} mines the contextual information. Similar idea for contextual information modeling is applied in \cite{tip17rank}. Bai \textit{et al.} \cite{cvpr17bai} utilize the geometric structure of the underlying manifold. An expanded cross neighborhood re-ranking method \cite{cvpr18pose} is introduced by integrating the cross neighborhood distance. A local blurring re-ranking \cite{iccv19sft} employs the clustering structure to improve neighborhood similarity measurement.} \textbf{Query Adaptive.} Considering the query difference, some methods have designed the query adaptive retrieval strategy to replace the uniform searching engine to improve the performance \cite{accv14queryadap,iccv17onlinelocal}. Andy \textit{et al.} \cite{accv14queryadap} propose a query adaptive re-ranking method using locality preserving projections. An efficient online local metric adaptation method is presented in \cite{iccv17onlinelocal}, which learns a strictly local metric with mined negative samples for each probe. \textbf{Human Interaction.} It involves using human feedback to optimize the ranking list \cite{iccv13pop}. This provides reliable supervision during the re-ranking process. A hybrid human-computer incremental learning model is presented in \cite{eccv16humanloop}, which cumulatively learns from human feedback, improving the Re-ID ranking performance on-the-fly. \subsubsection{Rank Fusion}\label{sec:rankfusion} Rank fusion exploits multiple ranking lists obtained with different methods to improve the retrieval performance \cite{tmm16rank}. Zheng \textit{et al.} \cite{cvpr15latefusion} propose a query adaptive late fusion method on top of a ``L" shaped observation to fuse methods. A rank aggregation method by employing the similarity and dissimilarity is developed in \cite{tmm16rank}. The rank fusion process in person Re-ID is formulated as a consensus-based decision problem with graph theory \cite{iccv17shape}, mapping the similarity scores obtained by multiple algorithms into a graph with path searching. An Unified Ensemble Diffusion (UED) \cite{cvpr19rerank} is recently designed for metric fusion. UED maintains the advantages of three existing fusion algorithms, optimized by a new objective function and derivation. The metric ensemble learning is also studied in \cite{cvpr15metricensemble}. \setlength{\tabcolsep}{3.75pt} \begin{table}[t] \scriptsize \centering \caption{Statistics of some commonly used datasets for closed-world person Re-ID. ``both" means that it contains both hand-cropped and detected bounding boxes. ``C\&M" means both CMC and mAP are evaluated.} \vspace{-2mm} \begin{tabular}{l|ccccccc} \hline & \multicolumn{7}{c}{\textit{Image datasets}}\\ Dataset& Time& \#ID & \#image & \#cam. & Label & Res. & Eval.\\ \hline VIPeR& 2007 & 632 & 1,264 &2 & hand& fixed&CMC\\ iLIDS& 2009 & 119 & 476 &2 & hand& vary&CMC\\ GRID& 2009 & 250 &1,275 &8 & hand& vary&CMC\\ PRID2011& 2011 & 200 &1,134 &2 & hand& fixed&CMC\\ CUHK01& 2012 & 971 & 3,884&2 & hand& fixed&CMC\\ CUHK02& 2013 & 1,816 & 7,264 &10 & hand & fixed&CMC\\ CUHK03& 2014 & 1,467 & 13,164 &2 & both & vary&CMC\\ Market-1501& 2015 & 1,501 & 32,668 &6 & both &fixed &C\&M\\ DukeMTMC & 2017 & 1,404 & 36,411 & 8 & both & fixed & C\&M\\ Airport & 2017 & 9,651 & 39,902 & 6 & auto & fixed & C\&M \\ MSMT17 & 2018 & 4,101 & 126,441& 15 & auto & vary & C\&M \\ \hline & \multicolumn{7}{c}{\textit{Video datasets}}\\ Dataset& time& \#ID &\#track(\#bbox) & \#cam. & label & Res. & Eval\\ \hline PRID-2011& 2011 & 200 &400 (40k)&2 & hand&fixed&CMC\\ iLIDS-VID& 2014 & 300&600 (44k) &2 & hand&vary&CMC\\ MARS& 2016 & 1261&20,715 (1M) &6 & auto & fixed&C\&M\\ Duke-Video & 2018 & 1,812 & 4,832 (-) & 8 & auto & fixed & C\&M\\ Duke-Tracklet & 2018 & 1,788 & 12,647 (-) & 8 & auto & C\&M \\ LPW & 2018 & 2,731 & 7,694(590K) & 4 & auto & fixed & C\&M \\ LS-VID & 2019 & 3,772 & 14,943 (3M) & 15 & auto & fixed & C\&M \\\hline \end{tabular} \label{tab:dataset} \vspace{-3mm} \end{table} \begin{figure*}[t] \centering \begin{minipage}[t]{0.25\textwidth} \centering \vspace{-0.2cm} \includegraphics[height = 4.3cm, width=4.5cm]{fig/market.pdf} \vspace{-0.2cm} \centerline{\scriptsize{(a) SOTA on Market-1501 \cite{iccv15zheng} }}\medskip \vspace{-2mm} \end{minipage}% \begin{minipage}[t]{0.25\textwidth} \centering \vspace{-0.2cm} \includegraphics[height = 4.3cm,width=4.5cm]{fig/duke.pdf} \centerline{\scriptsize{(b) SOTA on DukeMTMC \cite{iccv17duke} }}\medskip \vspace{-2mm} \end{minipage}% \begin{minipage}[t]{0.25\textwidth} \centering \vspace{-0.2cm} \includegraphics[height = 4.3cm,width=4.5cm]{fig/cuhk.pdf} \vspace{-0.2cm} \centerline{\scriptsize{(c) SOTA on CUHK03 \cite{cvpr14cuhk} }}\medskip \vspace{-2mm} \end{minipage}% \begin{minipage}[t]{0.25\textwidth} \centering \vspace{-0.2cm} \includegraphics[height = 4.3cm,width=4.5cm]{fig/msmt.pdf} \centerline{\scriptsize{(d) SOTA on MSMT17 \cite{cvpr18msmt} }}\medskip \vspace{-2mm} \end{minipage} \vspace{-2mm} \caption{\small{State-of-the-arts (SOTA) on four image-based person Re-ID datasets. Both the Rank-1 accuracy (\%) and mAP value (\%) are reported. For CUHK03 \cite{cvpr14cuhk}, the detected data under the setting \cite{cvpr17rerank} is reported. For Market-1501, the single query setting is used. The best result is highlighted with a {\color{red}red} star. All the listed results do not use re-ranking or additional annotated information.}}\label{fig:imgsota} \vspace{-2mm} \end{figure*} \subsection{Datasets and Evaluation}\label{sec:data} \subsubsection{Datasets and Evaluation Metrics}\label{sec:dataset} \textbf{Datasets.} We first review the widely used datasets for the closed-world setting, including 11 image datasets (VIPeR \cite{eccv08elf}, iLIDS \cite{bmvc09ilids}, GRID \cite{icip13grid}, PRID2011 \cite{prid2011}, CUHK01-03 \cite{cvpr14cuhk}, Market-1501 \cite{iccv15zheng}, DukeMTMC \cite{iccv17duke}, Airport \cite{pami18survey} and MSMT17 \cite{cvpr18msmt}) and 7 video datasets (PRID-2011 \cite{prid2011}, iLIDS-VID \cite{eccv14video}, MARS \cite{eccv16mars}, Duke-Video \cite{cvpr18wu}, Duke-Tracklet \cite{eccv18untracklet}, LPW \cite{aaai18lpw} and LS-VID \cite{iccv19longshort}). The statistics of these datasets are shown in Table \ref{tab:dataset}. This survey only focuses on the general large-scale datsets for deep learning methods. A comprehensive summarization of the Re-ID datasets can be found in \cite{pami18survey} and their website\footnote{\url{https://github.com/NEU-Gou/awesome-reid-dataset}}. Several observations can be made in terms of the dataset collection over recent years: 1) The dataset scale (both \#image and \#ID) has increased rapidly. Generally, the deep learning approach can benefit from more training samples. This also increases the annotation difficulty needed in closed-world person Re-ID. 2) The camera number is also greatly increased to approximate the large-scale camera network in practical scenarios. This also introduces additional challenges for model generalizability in a dynamically updated network. 3) The bounding boxes generation is usually performed automatically detected/tracked, rather than mannually cropped. This simulates the real-world scenario with tracking/detection errors. \textbf{Evaluation Metrics.} To evaluate a Re-ID system, Cumulative Matching Characteristics (CMC) \cite{iccv07cmc} and mean Average Precision (mAP) \cite{iccv15zheng} are two widely used measurements. CMC-$k$ (\textit{a.k.a}, Rank-$k$ matching accuracy) \cite{iccv07cmc} represents the probability that a correct match appears in the top-$k$ ranked retrieved results. CMC is accurate when only one ground truth exists for each query, since it only considers the first match in evaluation process. However, the gallery set usually contains multiple groundtruths in a large camera network, and CMC cannot completely reflect the discriminability of a model across multiple cameras. \black{Another metric, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, mean Average Precision (mAP) \cite{iccv15zheng}, measures the average retrieval performance with multiple grountruths. It is originally widely used in image retrieval. For Re-ID evaluation, it can address the issue of two systems performing equally well in searching the first ground truth (might be easy match as in Fig.~\ref{fig:rerank}), but having different retrieval abilities for other hard matches.} \black{Considering the efficiency and complexity of training a Re-ID model, some recent works \cite{iccv19osnet,iccv19autoreid} also report the FLoating-point Operations Per second (FLOPs) and the network parameter size as the evaluation metrics. These two metrics are crucial when the training/testing device has limited computational resources.} \subsubsection{In-depth Analysis on State-of-The-Arts}\label{sec:datasota} We review the state-of-the-arts from both image-based and video-based perspectives. We include methods published in top CV venues over the past three years. \black{\textbf{Image-based Re-ID.} There are a large number of published papers for image-based Re-ID\footnote{\url{https://paperswithcode.com/task/person-re-identification}}. We mainly review the works published in 2019 as well as some representative works in 2018. Specifically, we include PCB \cite{eccv18pcb}, MGN \cite{mm18mgn}, PyrNet \cite{cvprw19aggregate}, Auto-ReID \cite{iccv19autoreid}, ABD-Net \cite{iccv19abdnet}, BagTricks \cite{arxiv19trick}, OSNet \cite{iccv19osnet}, DGNet \cite{cvpr19joint}, SCAL \cite{iccv19selfattention}, MHN \cite{iccv19mixattention}, P2Net \cite{iccv19dualpart}, BDB \cite{iccv19dropblock}, SONA \cite{iccv19secondnonlocal}, SFT \cite{iccv19sft}, ConsAtt \cite{iccv19consistatt}, DenseS \cite{cvpr19denselyalign}, Pyramid \cite{cvpr19multi}, IANet \cite{cvpr19interact}, VAL \cite{aaai20val}. We summarize the results on four datasets (Fig.~\ref{fig:imgsota}). This overview motivates five major insights, as discussed below.} \black{First, with the advancement of deep learning, most of the image-based Re-ID methods have achieved higher rank-1 accuracy than humans (93.5\% \cite{arxiv17align}) on the widely used Market-1501 dataset. In particular, VAL \cite{aaai20val} obtains the best mAP of 91.6\% and Rank-1 accuracy of 96.2\% on Market-1501 dataset. The major advantage of VAL is the usage of viewpoint information. The performance can be further improved when using re-ranking or metric fusion. The success of deep learning on these closed-world datasets also motivates the shift focus to more challenging scenarios, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, large data size \cite{iccv19longshort} or unsupervised learning \cite{iccv17dgm}.} Second, part-level feature learning is beneficial for discriminative Re-ID model learning. Global feature learning directly learns the representation on the whole image without the part constraints \cite{arxiv19trick}. It is discriminative when the person detection/ tracking can accurately locate the human body. When the person images suffer from large background clutter or heavy occlusions, part-level feature learning usually achieves better performance by mining discriminative body regions \cite{cvpr19partial}. Due to its advantage in handling misalignment/occlusions, we observe that most of the state-of-the-art methods developed recently adopt the features aggregation paradigm, combining the part-level and full human body features \cite{iccv19autoreid,cvpr19multi}. Third, attention is beneficial for discriminative Re-ID model learning. We observe that all the methods (ConsAtt \cite{iccv19consistatt}, SCAL \cite{iccv19selfattention}, SONA \cite{iccv19secondnonlocal}, ABD-Net \cite{iccv19abdnet}) achieving the best performance on each dataset adopt an attention scheme. The attention captures the relationship between different convolutional channels, multiple feature maps, hierarchical layers, different body parts/regions, and even multiple images. Meanwhile, discriminative \cite{iccv19abdnet}, diverse \cite{cvpr18diversityatt}, consistent \cite{iccv19consistatt} and high-order \cite{iccv19secondnonlocal} properties are incorporated to enhance the attentive feature learning. Considering the powerful attention schemes and the specificity of the Re-ID problem, it is highly possible that attentive deeply learned systems will continue dominating the Re-ID community, with more domain specific properties. \black{Fourth, multi-loss training can improve the Re-ID model learning. Different loss functions optimize the network from a multi-view perspective. Combining multiple loss functions can improve the performance, evidenced by the multi-loss training strategy in the state-of-the-art methods, including ConsAtt \cite{iccv19consistatt}, ABD-Net \cite{iccv19abdnet} and SONA \cite{iccv19secondnonlocal}. In addition, a dynamic multi-loss training strategy is designed in \cite{cvpr19multi} to adaptively integrated two loss functions. The combination of identity loss and triplet loss with hard mining is the primary choice. Moreover, due to the imbalanced issue, sample weighting strategy generally improves the performance by mining informative triplets \cite{cvpr18cascadedconv,cvpr18multicam}.} \black{Finally, there is still much room for further improvement due to the increasing size of datasets, complex environment, limited training samples. For example, the Rank-1 accuracy (82.3\%) and mAP (60.8\%) on the newly released MSMT17 dataset \cite{cvpr18msmt} are much lower than that on Market-1501 (Rank-1: 96.2\% and mAP 91.7\%) and DukeMTMC (Rank-1: 91.6\% and mAP 84.5\%). On some other challenging datasets with limited training samples (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, GRID \cite{icip13grid} and VIPeR \cite{eccv08elf}), the performance is still very low. In addition, Re-ID models usually suffers significantly on cross-dataset evaluation \cite{cvpr16dgd,cvpr19general}, and the performance drops dramatically under adversarial attack \cite{iccv19attack}. We are optimistic that there would be important breakthroughs in person Re-ID, with increasing discriminability, robustness, and generalizability.} \begin{figure*}[t] \centering \begin{minipage}[t]{0.25\textwidth} \centering \vspace{-0.2cm} \includegraphics[height = 4.3cm,width=4.5cm]{fig/prid.pdf} \vspace{-0.2cm} \centerline{\scriptsize{(a) SOTA on PRID-2011 \cite{prid2011}}}\medskip \vspace{-2mm} \end{minipage}% \begin{minipage}[t]{0.25\textwidth} \centering \vspace{-0.2cm} \includegraphics[height = 4.3cm,width=4.5cm]{fig/ilids.pdf} \centerline{\scriptsize{(b) SOTA on iLIDS-VID \cite{eccv14video}}}\medskip \vspace{-2mm} \end{minipage}% \begin{minipage}[t]{0.25\textwidth} \centering \vspace{-0.2cm} \includegraphics[height = 4.3cm,width=4.5cm]{fig/mars.pdf} \vspace{-0.2cm} \centerline{\scriptsize{(c) SOTA on MARS \cite{eccv16mars}}}\medskip \vspace{-2mm} \end{minipage}% \begin{minipage}[t]{0.25\textwidth} \centering \vspace{-0.2cm} \includegraphics[height = 4.3cm,width=4.5cm]{fig/dukevideo.pdf} \centerline{\scriptsize{(d) SOTA on Duke-Video \cite{cvpr18wu}}}\medskip \vspace{-2mm} \end{minipage} \vspace{-2mm} \caption{\small{State-of-the-arts (SOTA) on four widely used video-based person Re-ID datasets. The Rank-1 accuracies (\%) over years are reported. mAP values (\%) on MARS \cite{eccv16mars} and Duke-Video \cite{cvpr18wu} are reported. For Duke-Video, we refer to the settings in \cite{cvpr18wu}. The best result is highlighted with a {\color{red}red} star. All the listed results do not use re-ranking or additional annotated information.}}\label{fig:sotavid} \vspace{-2mm} \end{figure*} \textbf{Video-based Re-ID.} Video-based Re-ID has received less interest, compared to image-based Re-ID. We review the deeply learned Re-ID models, including CoSeg \cite{iccv19coseg}, GLTR \cite{iccv19longshort}, STA \cite{aaai19sta}, ADFD \cite{cvpr19videoatt}, STC \cite{cvpr19occlusion}, DRSA \cite{cvpr18diversityatt}, Snippet \cite{cvpr18snippet}, ETAP \cite{cvpr18wu}, DuATM \cite{cvpr18dualatt}, SDM \cite{cvpr18decisionmaking}, TwoS \cite{iccv17videotwo}, ASTPN \cite{iccv17joint}, RQEN \cite{aaai18lpw}, Forest \cite{cvpr17forest}, RNN \cite{cvpr16video} and IDEX \cite{eccv16mars}. We also summarize the results on four video Re-ID datasets, as shown in Fig.~\ref{fig:sotavid}. From these results, the following observations can be drawn. \black{First, a clear trend of increasing performance can be seen over the years with the development of deep learning techniques. Specifically, the Rank-1 accuracy increases from 70\% (RNN \cite{cvpr16video} in 2016) to 95.5\% (GLTR \cite{iccv19longshort} in 2019) on PRID-2011 dataset, and from 58\% (RNN \cite{cvpr16video}) to 86.3\% (ADFD \cite{cvpr19videoatt}) on iLIDS-VID dataset. On the large-scale MARS dataset, the Rank-1 accuracy/mAP increase from 68.3\%/49.3\% (IDEX \cite{eccv16mars}) to 88.5\%/82.3\% (STC \cite{cvpr19occlusion}). On the Duke-Video dataset \cite{cvpr18wu}, STA \cite{aaai19sta} also achieves a Rank-1 accuracy of 96.2\%, and the mAP is 94.9\%.} Second, spatial and temporal modeling is crucial for discriminative video representation learning. We observe that all the methods (STA \cite{aaai19sta}, STC \cite{cvpr19occlusion}, GLTR \cite{iccv19longshort}) design spatial-temporal aggregation strategies to improve the video Re-ID performance. Similar to image-based Re-ID, the attention scheme across multiple frames \cite{aaai19sta,cvpr19videoatt} also greatly enhances the discriminability. Another interesting observation in \cite{cvpr19occlusion} demonstrates that utilizing multiple frames within the video sequence can fill in the occluded regions, which provides a possible solution for handling the challenging occlusion problem in the future. Finally, the performance on these datases has reached a saturation state, usually about less than 1\% accuracy gain on these four video datasets. However, there is still large room for improvements on the challenging cases. For example, on the newly collected video dataset, LS-VID \cite{iccv19longshort}, the Rank-1 accuracy/mAP of GLTR \cite{iccv19longshort} are only 63.1\%/44.43\%, while GLTR \cite{iccv19longshort} can achieve state-of-the-art or at least comparable performance on the other four daatsets. LS-VID \cite{iccv19longshort} contains significantly more identities and video sequences. This provides a challenging benchmark for future breakthroughs in video based Re-ID. \section{Open-world Person Re-Identification}\label{sec:open} This section reviews open-world person Re-ID as discussed in \S~\ref{sec:intro}, including heterogeneous Re-ID by matching person images across heterogeneous modalities (\S~\ref{sec:hetro}), end-to-end Re-ID from the raw images/videos (\S~\ref{sec:end2end}), semi-/unsupervised learning with limited/unavailable annotated labels (\S~\ref{sec:unsuper}), robust Re-ID model learning with noisy annotations (\S~\ref{sec:noise}) and open-set person Re-ID when the correct match does not occur in the gallery (\S~\ref{sec:openset}). \subsection{Heterogeneous Re-ID}\label{sec:hetro} This subsection summarizes four main kinds of heterogeneous Re-ID, including Re-ID between depth and RGB images (\S~\ref{sec:depth}), text-to-image Re-ID (\S~\ref{sec:text2img}), visible-to-infrared Re-ID (\S~\ref{sec:vireid}) and cross resolution Re-ID (\S~\ref{sec:crossresolution}). \subsubsection{Depth-based Re-ID}\label{sec:depth} Depth images capture the body shape and skeleton information. This provides the possibility for Re-ID under illumination/clothes changing environments, which is also important for personalized human interaction applications. A recurrent attention-based model is proposed in \cite{cvpr16depth} to address the depth-based person identification. In a reinforcement learning framework, they combine the convolutional and recurrent neural networks to identify small, discriminative local regions of the human body. Karianakis \textit{et al.} \cite{eccv18depth} leverage the large RGB datasets to design a split-rate RGB-to-Depth transfer method, which bridges the gap between the depth images and the RGB images. Their model further incorporates a temporal attention to enhance video representation for depth Re-ID. Some methods \cite{tip17rgbd,eccv12rgbd} have also studied the combination of RGB and depth information to improve the Re-ID performance, addressing the clothes-changing challenge. \subsubsection{Text-to-Image Re-ID}\label{sec:text2img} Text-to-image Re-ID addresses the matching between a text description and RGB images \cite{cvpr17nlp}. It is imperative when the visual image of query person cannot be obtained, and only a text description can be alternatively provided. \black{A gated neural attention model \cite{cvpr17nlp} with recurrent neural network learns the shared features between the text description and the person images. This enables the end-to-end training for text to image pedestrian retrieval. Cheng \textit{et al.} \cite{eccv18imgtext} propose a global discriminative image-language association learning method, capturing the identity discriminative information and local reconstructive image-language association under a reconstruction process. A cross projection learning method \cite{eccv18img2text} also learns a shared space with image-to-text matching. A deep adversarial graph attention convolution network is designed in \cite{mm19img2txt} with graph relation mining. However, the large semantic gap between the text descriptions and the visual images is still challenging. Meanwhile, how to combine the texts and hand-painting sketch image is also worth studying in the future.} \subsubsection{Visible-Infrared Re-ID}\label{sec:vireid} Visible-Infrared Re-ID handles the cross-modality matching between the daytime visible and night-time infrared images. It is important in low-lighting conditions, where the images can only be captured by infrared cameras \cite{iccv17cross,sensors17,ijcai18vtreid}. \blue{Wu \textit{et al.} \cite{iccv17cross} start the first attempt to address this issue, by proposing a deep zero-padding framework \cite{iccv17cross} to adaptively learn the modality sharable features. A two stream network is introduced in \cite{aaai18vtreid,tifs19vtreid} to model the modality-sharable and -specific information, addressing the intra- and cross-modality variations simultaneously. Besides the cross-modality shared embedding learning \cite{aaai19hsme}, the classifier-level discrepancy is also investigated in \cite{tifs20gray}. Recent methods \cite{cvpr19ivreid,iccv19ivreid} adopt the GAN technique to generate cross-modality person images to reduce the cross-modality discrepancy at both image and feature level. Hierarchical cross-Modality disentanglement factors are modeled in \cite{cvpr20hicmd}. A dual-attentive aggregation learning method is presented in \cite{eccv20ddag} to capture multi-level relations.} \subsubsection{Cross-Resolution Re-ID}\label{sec:crossresolution} Cross-Resolution Re-ID conducts the matching between low-resolution and high-resolution images, addressing the large resolution variations \cite{iccv15lowres,cvpr18multires}. A cascaded SR-GAN \cite{ijcai18resolution} generates the high-resolution person images in a cascaded manner, incorporating the identity information. Li \textit{et al.} \cite{iccv19crossres} adopt the adversarial learning technique to obtain resolution-invariant image representations. \subsection{End-to-End Re-ID}\label{sec:end2end} End-to-end Re-ID alleviates the reliance on additional step for bounding boxes generation. It involves the person Re-ID from raw images or videos, and multi-camera tracking. \textbf{Re-ID in Raw Images/Videos} This task requires that the model jointly performs the person detection and re-identification in a single framework \cite{cvpr17joint,cvpr17prw}. It is challenging due to the different focuses of two major components. \blue{Zheng \textit{et al.} \cite{cvpr17prw} present a two-stage framework, and systematically evaluate the benefits and limitations of person detection for the later stage person Re-ID. Xiao \textit{et al.} \cite{cvpr17joint} design an end-to-end person search system using a single convolutional neural network for joint person detection and re-identification. A Neural Person Search Machine (NPSM) \cite{iccv17neuralmachine} is developed to recursively refine the searching area and locate the target person by fully exploiting the contextual information between the query and the detected candidate region. Similarly, a contextual instance expansion module \cite{cvpr19context} is learned in a graph learning framework to improve the end-to-end person search. A query-guided end-to-end person search system \cite{cvpr19queryguide} is developed using the Siamese squeeze-and-excitation network to capture the global context information with query-guided region proposal generation. A localization refinement scheme with discriminative Re-ID feature learning is introduced in \cite{iccv19locarefine} to generate more reliable bounding boxes. An Identity DiscriminativE Attention reinforcement Learning (IDEAL) method \cite{bmvc17attention} selects informative regions for auto-generated bounding boxes, improving the Re-ID performance.} Yamaguchi \textit{et al.} \cite{iccv17endvideo} investigate a more challenging problem, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, searching for the person from raw videos with text description. A multi-stage method with spatio-temporal person detection and multi-modal retrieval is proposed. Further exploration along this direction is expected. \textbf{Multi-camera Tracking} End-to-end person Re-ID is also closely related to multi-person, multi-camera tracking \cite{cvpr18multicam}. A graph-based formulation to link person hypotheses is proposed for multi-person tracking \cite{cvpr17multiple}, where the holistic features of the full human body and body pose layout are combined as the representation for each person. Ristani \textit{et al.} \cite{cvpr18multicam} learn the correlation between the multi-target multi-camera tracking and person Re-ID by hard-identity mining and adaptive weighted triplet learning. Recently, a locality aware appearance metric (LAAM) \cite{arxiv19multicam} with both intra- and inter-camera relation modeling is proposed. \subsection{Semi-supervised and Unsupervised Re-ID}\label{sec:unsuper} \subsubsection{Unsupervised Re-ID}\label{sec:unsuperun} \black{Early unsupervised Re-ID mainly learns invariant components, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, dictionary \cite{eccv16un}, metric \cite{iccv17smp} or saliency \cite{cvpr13saliency}, which leads to limited discriminability or scalability.} \black{For deeply unsupervised methods, cross-camera label estimation is one the popular approaches \cite{iccv17dgm,arxiv17uncluster}. Dynamic graph matching (DGM) \cite{tip19dgm} formulates the label estimation as a bipartite graph matching problem. To further improve the performance, global camera network constraints \cite{arxiv19camera} are exploited for consistent matching. Liu \textit{et al.} progressively mine the labels with step-wise metric promotion \cite{iccv17smp}. A robust anchor embedding method \cite{eccv18race} iteratively assigns labels to the unlabelled tracklets to enlarge the anchor video sequences set. With the estimated labels, deep learning can be applied to learn Re-ID models.} \blue{For end-to-end unsupervised Re-ID, an iterative clustering and Re-ID model learning is presented in \cite{arxiv17uncluster}. Similarly, the relations among samples are utilized in a hierarchical clustering framework \cite{cvpr20hct}. Soft multi-label learning \cite{cvpr19unsoft} mines the soft label information from a reference set for unsupervised learning. A Tracklet Association Unsupervised Deep Learning (TAUDL) framework \cite{eccv18untracklet} jointly conducts the within-camera tracklet association and model the cross-camera tracklet correlation. Similarly, an unsupervised camera-aware similarity consistency mining method \cite{iccv19unwu} is also presented in a coarse-to-fine consistency learning scheme. The intra-camera mining and inter-camera association is applied in a graph association framework \cite{iccv19ungraph}. The semantic attributes are also adopted in Transferable Joint Attribute-Identity Deep Learning (TJ-AIDL) framework \cite{cvpr18att}. However, it is still challenging for model updating with newly arriving unlabelled data.} \blue{Besides, several methods have also tried to learn a part-level representation based on the observation that it is easier to mine the label information in local parts than that of a whole image. A PatchNet \cite{cvpr19unpatch} is designed to learn discriminative patch features by mining patch level similarity. A Self-similarity Grouping (SSG) approach \cite{iccv19selfgroup} iteratively conducts grouping (exploits both the global body and local parts similarity for pseudo labeling) and Re-ID model training in a self-paced manner.} \textbf{Semi-/Weakly supervised Re-ID.} With limited label information, a one-shot metric learning method is proposed in \cite{cvpr17oneshot}, which incorporates a deep texture representation and a color metric. A stepwise one-shot learning method (EUG) is proposed in \cite{cvpr18wu} for video-based Re-ID, gradually selecting a few candidates from unlabeled tracklets to enrich the labeled tracklet set. A multiple instance attention learning framework \cite{arxiv20weak} uses the video-level labels for representation learning, alleviating the reliance on full annotation. \subsubsection{Unsupervised Domain Adaptation}\label{sec:unsuperuda} Unsupervised domain adaptation (UDA) transfers the knowledge on a labeled source dataset to the unlabeled target dataset \cite{iccv13domain}. Due to the large domain shift and powerful supervision in source dataset, it is another popular approach for unsupervised Re-ID without target dataset labels. \blue{\textbf{Target Image Generation.} Using GAN generation to transfer the source domain images to target-domain style is a popular approach for UDA Re-ID. With the generated images, this enables supervised Re-ID model learning in the unlabeled target domain. Wei \textit{et al.} \cite{cvpr18msmt} propose a Person Transfer Generative Adversarial Network (PTGAN), transferring the knowledge from one labeled source dataset to the unlabeled target dataset. Preserved self-similarity and domain-dissimilarity \cite{cvpr18spgan} is trained with a similarity preserving generative adversarial network (SPGAN). A Hetero-Homogeneous Learning (HHL) method \cite{eccv18zhong} simultaneously considers the camera invariance with homogeneous learning and domain connectedness with heterogeneous learning. An adaptive transfer network \cite{cvpr19adaptrans} decomposes the adaptation process into certain imaging factors, including illumination, resolution, camera view, etc. This strategy improves the cross-dataset performance. Huang \textit{et al.} \cite{iccv19sbsgan} try to suppress the background shift to minimize the domain shift problem. Chen \textit{et al.} \cite{iccv19inscontext} design an instance-guided context rendering scheme to transfer the person identities from source domain into diverse contexts in the target domain. Besides, a pose disentanglement scheme is added to improve the image generation \cite{iccv19crosspose}. A mutual mean-teacher learning scheme is also developed in \cite{iclr20mmt}. However, the scalability and stability of the image generation for practical large-scale changing environment are still challenging.} \blue{Bak \textit{et al.} \cite{eccv18bak} generate a synthetic dataset with different illumination conditions to model realistic indoor and outdoor lighting. The synthesized dataset increases generalizability of the learned model and can be easily adapted to a new dataset without additional supervision \cite{mm20synth}.} \blue{\textbf{Target Domain Supervision Mining.} Some methods directly mine the supervision on the unlabeled target dataset with a well trained model from source dataset. An exemplar memory learning scheme \cite{cvpr19exemplarmemory} considers three invariant cues as the supervision, including exemplar-invariance, camera invariance and neighborhood-invariance. The Domain-Invariant Mapping Network (DIMN) \cite{cvpr19general} formulates a meta-learning pipeline for the domain transfer task, and a subset of source domain is sampled at each training episode to update the memory bank, enhancing the scalability and discriminability. The camera view information is also applied in \cite{iccv19uncamera} as the supervision signal to reduce the domain gap. A self-training method with progressive augmentation \cite{iccv19progressiveaug} jointly captures the local structure and global data distribution on the target dataset. Recently, a self-paced contrastive learning framework with hybrid memory \cite{nips20spcl} is developed with great success, which dynamically generates multi-level supervision signals.} \blue{The spatio-temporal information is also utilized as the supervision in TFusion \cite{cvpr18tffusion}. TFusion transfers the spatio-temporal patterns learned in the source domain to the target domain with a Bayesian fusion model. Similarly, Query-Adaptive Convolution (QAConv) \cite{eccv20liao} is developed to improve cross-dataset accuracy.} \setlength{\tabcolsep}{4.5pt} \begin{table}[t]\scriptsize \centering \caption{Statistics of SOTA unsupervised person Re-ID on two image-based datasets. ``Source" represents if it utilizes the source annotated data in training the target Re-ID model. ``Gen." indicates if it contains an image generation process. Rank-1 accuracy (\%) and mAP (\%) are reported.} \vspace{-2mm} \begin{threeparttable} \begin{tabular}{l|P{0.8cm}P{0.6cm}|P{0.6cm}P{0.6cm}|P{0.6cm}P{0.6cm}} \hline & && \multicolumn{2}{c}{\textit{Market-1501}} & \multicolumn{2}{c}{\textit{DukeMTMC}}\\ Methods & Source & Gen. & R1 & mAP & R1 & mAP \\\hline CAMEL~\cite{iccv17unmetric} \tiny{ICCV17} & Model & No & 54.5 &26.3 & -&- \\ PUL~\cite{arxiv17uncluster} \tiny{TOMM18} & Model & No & 45.5 & 20.5 & 30.0 & 16.4 \\ PTGAN~\cite{cvpr18spgan} \tiny{CVPR18} & Data & Yes &58.1 & 26.9 & 46.9 & 26.4\\ TJ-AIDL\tnote{\dag}~\cite{cvpr18att} \tiny{CVPR18} & Data & No & 58.2 &26.5 & 44.3 & 23.0 \\ HHL~\cite{eccv18zhong} \tiny{ECCV18} & Data & Yes & 62.2 &31.4 & 46.9 & 27.2 \\ MAR\tnote{\ddag} \ \cite{cvpr19unsoft} \tiny{CVPR19} & Data & No & 67.7 & 40.0 & 67.1 & 48.0 \\ ENC~\cite{cvpr19exemplarmemory} \tiny{CVPR19} & Data & No & 75.1 & 43.0 & 63.3 & 40.4 \\ ATNet~\cite{cvpr19adaptrans} \tiny{CVPR19} & Data & Yes & 55.7 & 25.6 & 45.1 & 24.9 \\ PAUL\tnote{\ddag} \ \cite{cvpr19unpatch} \tiny{CVPR19} & Model & No & 68.5 & 40.1 & 72.0 & 53.2 \\ SBGAN~\cite{iccv19sbsgan} \tiny{ICCV19} & Data & Yes & 58.5 & 27.3 & 53.5 & 30.8 \\ UCDA~\cite{iccv19uncamera} \tiny{ICCV19} & Data & No & 64.3 & 34.5 & 55.4 & 36.7 \\ CASC\tnote{\ddag} \ \cite{iccv19unwu} \tiny{ICCV19} & Model & No & 65.4 & 35.5 & 59.3 & 37.8 \\ PDA~\cite{iccv19crosspose} \tiny{ICCV19} & Data & Yes & 75.2 & 47.6 & 63.2 & 45.1 \\ CR-GAN~\cite{iccv19inscontext} \tiny{ICCV19} & Data & Yes & 77.7 & 54.0 & 68.9 & 48.6 \\ PAST~\cite{iccv19progressiveaug} \tiny{ICCV19} & Model & No & 78.4 &54.6 &72.4 & 54.3 \\ SSG~\cite{iccv19selfgroup} \tiny{ICCV19} & Model & No & 80.0 & 58.3 & 73.0 & 53.4 \\ HCT~\cite{cvpr20hct} \tiny{CVPR20}& Model & No & 80.0 & 56.4 & 69.6 & 50.7 \\ SNR~\cite{cvpr20snr} \tiny{CVPR20} & Data & No & 82.8 & 61.7 & 76.3 & 58.1 \\ MMT~\cite{iclr20mmt} \tiny{ICLR20} & Data & No & 87.7 & 71.2 & 78.0 & 65.1 \\ MEB-Net~\cite{eccv20meb} \tiny{ECCV20} & Data & No & 89.9 & 76.0 & 79.6 & 66.1 \\ SpCL~\cite{nips20spcl} \tiny{NeurIPS20} & Data & No & \textbf{90.3} & \textbf{76.7} &\textbf{82.9} &\textbf{68.8} \\\hline \end{tabular} \scriptsize{$\bullet$ $^\dag$ TJ-AIDL~\cite{cvpr18att} requires additional attribute annotation.}\\ \scriptsize{$\bullet$ $^\S$ DAS~\cite{eccv18bak} generates synthesized virtual humans under vairous lightings.}\\ \scriptsize{$\bullet$ $^\ddag$ PAUL~\cite{cvpr19unpatch}, MAR~\cite{cvpr19unsoft} and CASC~\cite{iccv19unwu} use MSMT17 as source dataset.}\\ \end{threeparttable} \label{tab:sotaun} \vspace{-5mm} \end{table} \subsubsection{State-of-The-Arts for Unsupervised Re-ID}\label{sec:unsota} \blue{Unsupervised Re-ID has achieved increasing attention in recent years, evidenced by the increasing number of publications in top venues. We review the SOTA for unsupervised deeply learned methods on two widely-used image-based Re-ID datasets. The results are summarized in Table \ref{tab:sotaun}. From these results, the following insights can be drawn.} \blue{First, the unsupervised Re-ID performance has increased significantly over the years. The Rank-1 accuracy/mAP increases from 54.5\%/26.3\% (CAMEL \cite{iccv17unmetric}) to 90.3\%/76.7\% (SpCL \cite{nips20spcl}) on the Market-1501 dataset within three years. The performance for DukeMTMC dataset increases from 30.0\%/16.4\% to 82.9\%/68.8\%. The gap between the supervised upper bound and the unsupervised learning is narrowed significantly. This demonstrates the success of unsupervised Re-ID with deep learning.} \blue{Second, current unsupervised Re-ID is still under-developed and it can be further improved in the following aspects: 1) The powerful attention scheme in supervised Re-ID methods has rarely been applied in unsupervised Re-ID. 2) Target domain image generation has been proved effective in some methods, but they are not applied in two best methods (PAST \cite{iccv19progressiveaug}, SSG \cite{iccv19selfgroup}). 3) Using the annotated source data in the training process of the target domain is beneficial for cross-dataset learning, but it is also not included in above two methods. These observations provide the potential basis for further improvements.} \blue{Third, there is still a large gap between the unsupervised and supervised Re-ID. For example, the rank-1 accuracy of supervised ConsAtt \cite{iccv19consistatt} has achieved 96.1\% on the Market-1501 dataset, while the highest accuracy of unsupervised SpCL \cite{nips20spcl} is about 90.3\%. Recently, He \textit{et al.} \cite{arxiv19momentum} have demonstrated that unsupervised learning with large-scale unlabeled training data has the ability to outperform the supervised learning on various tasks \cite{pami20embedding}. We expect that several breakthroughs in future unsupervised Re-ID.} \subsection{Noise-Robust Re-ID}\label{sec:noise} Re-ID usually suffers from unavoidable noise due to data collection and annotation difficulty. We review noise-robust Re-ID from three aspects: \textit{Partial Re-ID} with heavy occlusion, \textit{Re-ID with sample noise} caused by detection or tracking errors, and \textit{Re-ID with label noise} caused by annotation error. \black{\textbf{Partial Re-ID.} This addresses the Re-ID problem with heavy occlusions, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, only part of the human body is visible \cite{iccv15partial}. A fully convolutional network \cite{cvpr18partial} is adopted to generate fix-sized spatial feature maps for the incomplete person images. Deep Spatial feature Reconstruction (DSR) is further incorporated to avoid explicit alignment by exploiting the reconstructing error. Sun \textit{et al.} \cite{cvpr19partial} design a Visibility-aware Part Model (VPM) to extract sharable region-level features, thus suppressing the spatial misalignment in the incomplete images. A foreground-aware pyramid reconstruction scheme \cite{iccv19foreground} also tries to learn from the unoccluded regions. The Pose-Guided Feature Alignment (PGFA) \cite{iccv19partial} exploits the pose landmarks to mine discriminative part information from occlusion noise. However, it is still challenging due to the severe partial misalignment, unpredictable visible regions and distracting unshared body regions. Meanwhile, how to adaptively adjust the matching model for different queries still needs further investigation.} \black{\textbf{Re-ID with Sample Noise.} This refers to the problem of the person images or the video sequence containing outlying regions/frames, either caused by poor detection/inaccurate tracking results. To handle the outlying regions or background clutter within the person image, pose estimation cues \cite{cvpr17spindle,cvpr18pose} or attention cues \cite{bmvc17attention,cvpr18mask,cvpr13saliency} are exploited. The basic idea is to suppress the contribution of the noisy regions in the final holistic representation. For video sequences, set-level feature learning \cite{eccv18race} or frame level re-weighting \cite{cvpr18snippet} are the commonly used approaches to reduce the impact of noisy frames. Hou \textit{et al.} \cite{cvpr19occlusion} also utilize multiple video frames to auto-complete occluded regions. It is expected that more domain-specific sample noise handling designs in the future.} \black{\textbf{Re-ID with Label Noise.} Label noise is usually unavoidable due to annotation error. Zheng \textit{et al.} adopt a label smoothing technique to avoid label overfiting issues \cite{iccv17duke}. A Distribution Net (DNet) that models the feature uncertainty is proposed in \cite{iccv19dnet} for robust Re-ID model learning against label noise, reducing the impact of samples with high feature uncertainty. Different from the general classification problem, robust Re-ID model learning suffers from limited training samples for each identity \cite{tifs20noisy}. In addition, the unknown new identities increase additional difficulty for the robust Re-ID model learning.} \subsection{Open-set Re-ID and Beyond}\label{sec:openset} Open-set Re-ID is usually formulated as a person verification problem, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, discriminating whether or not two person images belong to the same identity \cite{icip16openset,tip18open}. The verification usually requires a learned condition $\tau$, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, $sim(query, gallery) > \tau$. Early researches design hand-crafted systems \cite{icip16openset,tip18open,pami15openworld}. For deep learning methods, an Adversarial PersonNet (APN) is proposed in \cite{eccv18open}, which jointly learns a GAN module and the Re-ID feature extractor. The basic idea of this GAN is to generate realistic target-like images (imposters) and enforce the feature extractor is robust to the generated image attack. Modeling feature uncertainty is also investigated in \cite{iccv19dnet}. However, it remains quite challenging to achieve a high true target recognition and maintain low false target recognition rate \cite{pami97error}. \black{\textbf{Group Re-ID.} It aims at associating the persons in groups rather than individuals \cite{bmvc09ilids}. Early researches mainly focus on group representation extraction with sparse dictionary learning \cite{iccv17groupreid} or covariance descriptor aggregation \cite{icpr10group}. The multi-grain information is integrated in \cite{mm18group} to fully capture the characteristics of a group. Recently, the graph convoltuional network is applied in \cite{mm19group}, representing the group as a graph. The group similarity is also applied in the end-to-end person search \cite{cvpr19context} and the individual re-identification \cite{eccv18graphsim,cvpr19queryguide} to improve the accuracy. However, group Re-ID is still challenging since the group variation is more complicated than the individuals.} \black{\textbf{Dynamic Multi-Camera Network.} Dynamic updated multi-camera network is another challenging issue \cite{icip15active,eccv16temporal,cviu17camera,eccv14camera}, which needs model adaptation for new cameras or probes. A human in-the-loop incremental learning method is introduced in \cite{eccv16temporal} to update the Re-ID model, adapting the representation for different probe galleries. Early research also applies the active learning \cite{icip15active} for continuous Re-ID in multi-camera network. A continuous adaptation method based on sparse non-redundant representative selection is introduced in \cite{cviu17camera}. A transitive inference algorithm \cite{cvpr17dynamicopen} is designed to exploit the best source camera model based on a geodesic flow kernel. Multiple environmental constraints (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, Camera Topology) in dense crowds and social relationships are integrated for an open-world person Re-ID system \cite{eccv16reidcrowd}. The model adaptation and environmental factors of cameras are crucial in practical dynamic multi-camera network. Moreover, how to apply the deep learning technique for the dynamic multi-camera network is still less investigated.} \begin{figure}[t] \centering \includegraphics[width = 8.5cm]{fig/pp.pdf}\\ \vspace{-2mm} \caption{\blue{Difference between the widely used CMC, AP and the negative penalty (NP) measurements. True matching and false matching are bounded in green and red boxes, respectively. Assume that only three correct matches exist in the gallery, rank list 1 gets better AP, but gets much worse NP than rank list 2. The main reason is that rank list 1 contains too many false matchings before finding the hardest true matching. For consistency with CMC and mAP, we compute the inverse negative penalty (INP), \emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, INP = 1- NP. Larger INP means better performance. }}\label{fig:ppmetric} \vspace{-2mm} \end{figure} \section{An Outlook: Re-ID in Next Era}\label{sec:future} This section firstly presents a new evaluation metric in \S~\ref{sec:newmetric}, a strong baseline (in \S~\ref{sec:newbase}) for person Re-ID. It provides an important guidance for future Re-ID research. Finally, we discuss some under-investigated open issues in \S~\ref{sec:openissue}. \subsection{mINP: A New Evaluation Metric for Re-ID}\label{sec:newmetric} \blue{For a good Re-ID system, the target person should be retrieved as accurately as possible, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, all the correct matches should have low rank values. Considering that the target person should not be neglected in the top-ranked retrieved list, especially for multi-camera network, so as to accurately track the target. When the target person appears in the gallery set at multiple time stamps, the rank position of the hardest correct match determines the workload of the inspectors for further investigation. However, the currently widely used CMC and mAP metrics cannot evaluate this property, as shown in Fig.~\ref{fig:ppmetric}. With the same CMC, rank list 1 achieves a better AP than rank list 2, but it requires more efforts to find all the correct matches. To address this issue, we design a computationally efficient metric, namely a negative penalty (NP), which measures the penalty to find the hardest correct match} \vspace{-2mm} \begin{equation}\label{eq:np} \mathrm{NP}_i = \frac{R_{i}^{hard}-|G_i|}{R_{i}^{hard}}, \end{equation} where $R_{i}^{hard}$ indicates the rank position of the hardest match, and $|G_i|$ represents the total number of correct matches for query $i$. Naturally, a smaller NP represents better performance. For consistency with CMC and mAP, we prefer to use the inverse negative penalty (INP), an inverse operation of NP. Overall, the mean INP of all the queries is represented by \vspace{-2mm} \begin{equation}\label{eq:minp} \mathrm{mINP} = \frac{1}{n} \sum\nolimits_i (1-\mathrm{NP}_i ) = \frac{1}{n} \sum\nolimits_i \frac{|G_i|}{R_{i}^{hard}}. \end{equation} \blue{The calculation of mINP is quite efficient and can be seamlessly integrated in the CMC/mAP calculating process. mINP avoids the domination of easy matches in the mAP/CMC evaluation. One limitation is that mINP value difference for large gallery size would be much smaller compared to small galleries. But it still can reflect the relative performance of a Re-ID model, providing a supplement to the widely-used CMC and mAP metrics.} \begin{table}[t]\scriptsize \centering \caption{\label{tab:component}Comparison with the state-of-the-arts on single-modality image-based Re-ID. Rank-1 accuracy (\%), mAP (\%) and mINP (\%) are reported on two public datasets.} \vspace{-2mm} \begin{tabular}{l|ccc|ccc} \hline & \multicolumn{3}{c|}{Market-1501 \cite{iccv15zheng}}& \multicolumn{3}{c}{DukeMTMC \cite{iccv17duke}} \\ Method & R1 & mAP &mINP & R1 & mAP & mINP \\\hline BagTricks \cite{arxiv19trick} \tiny{CVPR19W} & 94.5 &85.9 & 59.4 & 86.4 & 76.4 & 40.7 \\ ABD-Net \cite{iccv19abdnet} \tiny{ICCV19} & \textbf{95.6} & \textbf{88.3} & \textbf{66.2} & 89.0 & 78.6 & 42.1 \\\hline B (ours) & 94.2 & 85.4 & 58.3 & 86.1 & 76.1 & 40.3 \\ B + Att \cite{cvpr18nonlocal} & 94.9 & 86.9 & 62.2 & 87.5 & 77.6 & 41.9 \\ B + WRT & 94.6 & 86.8 & 61.9 & 87.1 & 77.0 & 41.4\\ B + GeM \cite{pami18gem} & 94.4 & 86.3 & 60.1 & 87.3 & 77.3 & 41.9 \\ B + WRT + GeM & 94.9 & 87.1 & 62.5 & 88.2 & 78.1 & 43.4\\ AGW (Full) & 95.1 & 87.8 & 65.0 & \textbf{89.0} & \textbf{79.6} & \textbf{45.7}\\\hline \end{tabular} \end{table} \subsection{A New Baseline for Single-/Cross-Modality Re-ID}\label{sec:newbase} \black{According to the discussion in \S~\ref{sec:datasota}, we design a new \textit{AGW}\footnote{Details are in \url{https://github.com/mangye16/ReID-Survey} and comprehensive comparison is shown in the supplementary material.} baseline for person Re-ID, which achieves competitive performance on both single-modality (image and video) and cross-modality Re-ID tasks. Specifically, our new baseline is designed on top of BagTricks \cite{arxiv19trick}, and AGW contains the following three major improved components:} (1) \textbf{Non-local Attention (Att) Block}. As discussed in \S~\ref{sec:datasota}, the attention scheme plays a crucial role in discriminative Re-ID model learning. We adopt the powerful non-local attention block \cite{cvpr18nonlocal} to obtain the weighted sum of the features at all positions, represented by \vspace{-2mm} \begin{equation}\label{eq:nonlocal} \mathbf{z}_i = W_z * \phi(\mathbf{x}_i) + \mathbf{x}_i, \end{equation} where $W_z$ is a weight matrix to be learned, $\phi(\cdot)$ represents a non-local operation, and $+ \mathbf{x}_i$ formulates a residual learning strategy. Details can be found in \cite{cvpr18nonlocal}. We adopt the default setting from \cite{cvpr18nonlocal} to insert the non-local attention block. (2) \textbf{Generalized-mean (GeM) Pooling}. As a fine-grained instance retrieval, the widely-used max-pooling or average pooling cannot capture the domain-specific discriminative features. We adopt a learnable pooling layer, named \textit{generalized-mean (GeM) pooling} \cite{pami18gem}, formulated by \begin{equation}\label{eq:gem} \mathbf{f} =[f_1 \cdots f_k \cdots f_K]^T, f_k = (\frac{1}{|\mathcal{X}_k|}\sum\nolimits_{x_i \in \mathcal{X}_k } x_i^{p_k})^{\frac{1}{p_k}}, \end{equation} \black{where $f_k$ represents the feature map, and $K$ is number of feature maps in the last layer. $\mathcal{X}_k$ is the set of $W \times H$ activations for feature map $k \in \{1,2,\cdots,K\}$. $p_k$ is a pooling hyper-parameter, which is learned in the back-propagation process \cite{pami18gem}. The above operation approximates max pooling when $p_k \rightarrow \infty$ and average pooling when $p_k = 1$.} (3) \textbf{Weighted Regularization Triplet (WRT) loss}. In addition to the baseline identity loss with softmax cross-entropy, we integrate with another weighted regularized triplet loss, \vspace{-3mm} \begin{equation}\label{eq:wtrloss} \mathcal{L}_{wrt}(i) = \log( 1+ \exp(\sum\nolimits_{j} w_{ij}^p d^p_{ij} - \sum\nolimits_k w_{ik}^n d^n_{ik})). \end{equation} \begin{equation}\label{eq:weights} w_{ij}^p = \frac{\exp{(d^p_{ij})}}{\sum\nolimits_{d_{ij}^p\in \mathcal{P}_i}\exp(d^p_{ij})}, w_{ik}^n = \frac{\exp{(-d^n_{ik})}}{\sum\nolimits_{d^n_{ik}\in \mathcal{N}_i}\exp(-d^n_{ik})}, \end{equation} \black{where $(i,j,k)$ represents a hard triplet within each training batch. For anchor $i$, $\mathcal{P}_i$ is the corresponding positive set, and $\mathcal{N}_i$ is the negative set. $d^p_{ij}$/$d^n_{ik}$ represents the pairwise distance of a positive/negative sample pair. The above weighted regularization inherits the advantage of relative distance optimization between positive and negative pairs, but it avoids introducing any additional margin parameters. Our weighting strategy is similar to \cite{cvpr19multisim}, but our solution does not introduce additional hyper-parameters.} \begin{figure}[t] \centering \includegraphics[width = 9cm]{fig/wag.pdf}\\ \vspace{-2mm} \caption{The framework of the proposed AGW baseline using the widely used ResNet50 \cite{cvpr16resnet} as the backbone network. }\label{fig:framework} \vspace{-2mm} \end{figure} \begin{table}[t]\scriptsize \centering \caption{\label{tab:agwcuhk}Comparison with the state-of-the-arts on two image Re-ID datasets, including CUHK03 and MSMT17. Rank-1 accuracy (\%), mAP (\%) and mINP (\%) are reported.} \vspace{-2mm} \begin{tabular}{l|ccc|ccc} \hline & \multicolumn{3}{c|}{CUHK03 \cite{cvpr14cuhk}}& \multicolumn{3}{c}{MSMT17 \cite{cvpr18msmt}}\\ Method & R1 & mAP & mINP & R1 & mAP & mINP \\\hline BagTricks \cite{arxiv19trick} \tiny{CVPR19W} & 58.0 & 56.6 & 43.8 & 63.4 & 45.1 & 12.4 \\ AGW (Full) & \textbf{63.6} & \textbf{62.0} & \textbf{50.3} & \textbf{68.3} & \textbf{49.3} & \textbf{14.7} \\\hline \end{tabular} \vspace{-2mm} \end{table} \begin{table}[t]\scriptsize \centering \caption{\label{tab:agwvid}Comparison with the state-of-the-arts on four video-based Re-ID datasets, including MARS \cite{eccv16mars}, DukeVideo \cite{cvpr18wu}, PRID2011 \cite{prid2011} and iLIDS-VID \cite{eccv14video}. Rank-1 accuracy (\%), mAP (\%) and mINP (\%) are reported.} \vspace{-2mm} \begin{tabular}{l|ccc|ccc} \hline & \multicolumn{3}{c|}{MARS \cite{eccv16mars}}& \multicolumn{3}{c}{DukeVideo \cite{cvpr18wu}}\\ Method & R1 & mAP & mINP & R1 & mAP & mINP \\\hline BagTricks \cite{arxiv19trick} \tiny{CVPR19W} & 85.8 & 81.6 & 62.0 & 92.6 & 92.4 & 88.3 \\ CoSeg \cite{iccv19coseg} \tiny{ICCV19} & 84.9 & 79.9 & 57.8 & 95.4 & 94.1 & 89.8 \\ AGW (Ours) & 87.0 & 82.2 & 62.8 & 94.6 & 93.4 & 89.2 \\ AGW$_+$ (Ours) & \textbf{87.6} & \textbf{83.0} & \textbf{63.9} & \textbf{95.4} & \textbf{94.9} & \textbf{91.9} \\\hline\hline & \multicolumn{3}{c|}{ PRID2011 \cite{prid2011}}& \multicolumn{3}{c}{iLIDS-VID \cite{eccv14video}}\\ Method & R1 & R5 & mINP & R1 & R5 & mINP \\\hline BagTricks \cite{arxiv19trick} \tiny{CVPR19W} & 84.3 & 93.3 & 88.5& 74.0 & 93.3 & 82.2 \\ AGW (Ours) & 87.8 & 96.6 & 91.7 & 78.0 & 97.0 & 85.5 \\ AGW$_+$ (Ours) & \textbf{94.4} & \textbf{98.4} & \textbf{95.4} & \textbf{83.2} & \textbf{98.3} & \textbf{89.0} \\\hline \end{tabular} \vspace{-2mm} \end{table} \begin{table}[t]\scriptsize \centering \caption{\label{tab:agwpsid}Comparison with the state-of-the-arts on two partial Re-ID datasets, including Partial-REID and Partial-iLIDS. Rank-1, -3 accuracy (\%) and mINP (\%) are reported.} \vspace{-2mm} \begin{tabular}{p{2.8cm}|p{0.5cm}<{\centering}p{0.5cm}<{\centering}p{0.65cm}<{\centering}|p{0.5cm}<{\centering}p{0.5cm}<{\centering}p{0.65cm}<{\centering}} \hline \multirow{2}{*}{Method} & \multicolumn{3}{c|}{Partial-REID}& \multicolumn{3}{c}{Partial-iLIDS}\\ \cline{2-7} &R1 &R3 & mINP & R1 & R3 & mINP \\ \hline DSR \cite{cvpr18partial} \tiny{CVPR18} &50.7 &70.0 &- &58.8 &67.2 &- \\ SFR \cite{arxiv2018partial} \tiny{ArXiv18} &56.9 &78.5 &- &63.9 &74.8 &- \\ VPM \cite{cvpr19partial} \tiny{CVPR19} &67.7 &\textbf{81.9} &- &\textbf{67.2} &76.5 &- \\ BagTricks \cite{arxiv19trick} \tiny{CVPR19W} &62.0 &74.0 &45.4 &58.8 &73.9 &68.7 \\ \hline AGW &\textbf{69.7} &80.0 &\textbf{56.7} &64.7 &\textbf{79.8} &\textbf{73.3} \\\hline \end{tabular} \vspace{-2mm} \end{table} \black{The overall framework of AGW is shown in Fig~\ref{fig:framework}. Other components are exactly the same as \cite{arxiv19trick}. In the testing phase, the output of BN layer is adopted as the feature representation for Re-ID. The implementation details and more experimental results are in the supplementary material.} \black{\textbf{Results on Single-modality Image Re-ID.} We first evaluate each component on two image-based datasets (Market-1501 and DukeMTMC) in Table \ref{tab:component}. We also list two state-of-the-art methods, BagTricks \cite{arxiv19trick} and ABD-Net \cite{iccv19abdnet}. We report the results on CUHK03 and MSMT17 datasets in Table \ref{tab:agwcuhk}. We obtain the following two observations:} \black{1) All the components consistently contribute the accuracy gain, and AGW performs much better than the original BagTricks under various metrics. AGW provides a strong baseline for future improvements. We have also tried to incorporate part-level feature learning \cite{eccv18pcb}, but extensive experiments show that it does not improve the performance. How to aggregate part-level feature learning with AGW needs further study in the future. 2) Compared to the current state-of-the-art, ABD-Net \cite{iccv19abdnet}, AGW performs favorably in most cases. In particular, we achieve much higher mINP on DukeMTMC dataset, 45.7\% \vs 42.1\%. This demonstrates that AGW requires less effort to find all the correct matches, verifying the ability of mINP.} \blue{\textbf{Results on Single-modality Video Re-ID.} We also evaluate the proposed AGW on four widely used single modality video-based datasets ( MARS \cite{eccv16mars}, DukeVideo \cite{cvpr18wu}, PRID2011 \cite{prid2011} and iLIDS-VID \cite{eccv14video}, as shown in Table \ref{tab:agwvid}. We also compare two state-of-the-art methods, BagTricks \cite{arxiv19trick} and Co-Seg \cite{iccv19coseg}. For video data, we develop a variant (AGW$_+$) to capture the temporal information with frame-level average pooling for sequence representation. Meanwhile, constraint random sampling strategy \cite{cvpr18diversityatt} is applied for training. Compared to Co-Seg \cite{iccv19coseg}, our AGW$_+$ obtains better Rank-1, mAP and mINP in most cases.} \begin{table}[t]\scriptsize \centering \caption{\label{tab:crossreid}Comparison with the state-of-the-arts on cross-modality visible-infrared Re-ID. Rank-1 accuracy (\%), mAP (\%) and mINP (\%) are reported on two public datasets.} \vspace{-2mm} \begin{tabular}{l|cc|cc|cc} \hline & \multicolumn{2}{c|}{RegDB \cite{sensors17}}& \multicolumn{4}{c}{SYSU-MM01 \cite{iccv17cross}} \\ & \multicolumn{2}{c|}{\emph{Visible-Thermal}}& \multicolumn{2}{c}{\emph{All Search}} & \multicolumn{2}{c}{\emph{Indoor Search}} \\ \hline Method & R1 & mAP & R1 & mAP & R1 & mAP \\\hline Zero-Pad \cite{iccv17cross} \tiny{ICCV17} &17.75 & 18.90 & 14.8 & 15.95 & 20.58 & 26.92 \\ HCML \cite{aaai18vtreid} \tiny{AAAI18} & 24.44 &20.08 & 14.32 &16.16 & 24.52 & 30.08 \\ eBDTR \cite{tifs19vtreid} \tiny{TIFS19} & 34.62 & 33.46 & 27.82 & 28.42 & 32.46 &42.46 \\ HSME \cite{aaai19hsme} \tiny{AAAI19} & 50.85 & 47.00 & 20.68 &23.12 & - & -\\ D$^2$RL \cite{cvpr19ivreid} \tiny{CVPR19} & 43.4 & 44.1 & 28.9 & 29.2 & - & -\\ AlignG \cite{iccv19ivreid} \tiny{ICCV19}& 57.9 & 53.6 & 42.4 & 40.7 & 45.9 & 54.3\\ Hi-CMD \cite{cvpr20hicmd} \tiny{CVPR20} & 70.93 & 66.04 &34.9 & 35.9 \\\hline \multirow{2}{*}{AGW (Ours)} & \textbf{70.05} & \textbf{66.37} & \textbf{47.50} & \textbf{47.65} & \textbf{54.17}& \textbf{62.97}\\ & \multicolumn{2}{c|}{mINP = 50.19 } & \multicolumn{2}{c|}{mINP =35.30 } & \multicolumn{2}{c}{mINP = 59.23}\\\hline \end{tabular} \vspace{-5mm} \end{table} \black{\textbf{Results on Partial Re-ID.} We also test the performance of AGW on two partial Re-ID datasets, as shown in Table \ref{tab:agwpsid}. The experimental setting are from DSR \cite{cvpr18partial}. We also achieve comparable performance with the state-of-the-art VPM method \cite{cvpr19partial}. This experiment further demonstrates the superiority of AGW for the open-world partial Re-ID task. Meanwhile, the mINP also shows the applicability for this open-world Re-ID problem.} \black{\textbf{Results on Cross-modality Re-ID.} We also test the performance of AGW using a two-stream architecture on the cross-modality visible-infrared Re-ID task. The comparison with the current state-of-the-arts on two datasets is shown in Table \ref{tab:crossreid}. We follow the settings in AlignG \cite{iccv19ivreid} to perform the experiments. Results show that AGW achieves much higher accuracy than existing cross-modality Re-ID models, verifying the effectiveness for the open-world Re-ID task.} \subsection{Under-Investigated Open Issues}\label{sec:openissue} \black{We discuss the open-issues from five different aspects according to the five steps in \S \ref{sec:intro}, including uncontrollable data collection, human annotation minimization, domain-specific/generalizable architecture design, dynamic model updating and efficient model deployment.} \subsubsection{Uncontrollable Data Collection} \black{Most existing Re-ID works evaluate their method on a well-defined data collection environment. However, the data collection in real complex environment is uncontrollable. The data might be captured from unpredictable modality, modality combinations, or even cloth changing data \cite{pami19cloth}.} \blue{\textbf{Multi-Heterogeneous Data.} In real applications, the Re-ID data might be captured from multiple heterogeneous modalities, \emph{i.e}\onedot} \def\Ie{\emph{I.e}\onedot, the resolutions of person images vary a lot \cite{ijcai18resolution}, both the query and gallery sets may contain different modalities (visible, thermal \cite{iccv17cross}, depth \cite{tip17rgbd} or text description \cite{iccv17nlp}). This results in a challenging multiple heterogeneous person Re-ID. A good person Re-ID system would be able to automatically handle the changing resolutions, different modalities, various environments and multiple domains. Future work with broad generalizability is expected, evaluating their method for different Re-ID tasks.} \black{\textbf{Cloth-Changing Data.} In practical surveillance system, it is very likely to contain a large number of target persons with changing clothes. A cloth-Clothing Change Aware Network (CCAN) \cite{cvprw18cloth} addresses this issue by separately extracting the face and body context representation, and similar idea is applied in \cite{arxiv20cloth}. Yang \textit{et al.} \cite{pami19cloth} present a spatial polar transformation (SPT) to learn cross-cloth invariant representation. However, they still rely heavily on the face and body appearance, which might be unavailable and unstable in real scenarios. It would be interesting to further explore the possibility of other discriminative cues (e.g., gait, shape) to address the cloth-changing issue.} \subsubsection{Human Annotation Minimization} \black{Besides the unsupervised learning, active learning or human interaction \cite{eccv16temporal,icip15active,iccv19humanloop,eccv16humanloop} provides another possible solution to alleviate the reliance on human annotation.} \black{\textbf{Active Learning.} Incorporating human interaction, labels are easily provided for newly arriving data and the model can be subsequently updated \cite{icip15active,eccv16temporal}. A pairwise subset selection framework \cite{cvpr18labeling} minimizes human labeling effort by firstly constructing an edge-weighted complete $k$-partite graph and then solving it as a triangle free subgraph maximization problem. Along this line, a deep reinforcement active learning method \cite{iccv19humanloop} iteratively refines the learning policy and trains a Re-ID network with human-in-the-loop supervision. For video data, an interpretable reinforcement learning method with sequential decision making \cite{cvpr18decisionmaking} is designed. The active learning is crucial in practical Re-ID system design, but it has received less attention in the research community. Additionally, the newly arriving identities is extremely challenging, even for human. Efficient human in-the-loop active learning is expected in the future.} \blue{\textbf{Learning for Virtual Data.} This provides an alternative for minimizing the human annotation. A synthetic dataset is collected in \cite{mm20synth} for training, and they achieve competitive performance on real-world datasets when trained on this synthesized dataset. Bak \textit{et al.} \cite{eccv18bak} generate a new synthetic dataset with different illumination conditions to model realistic indoor and outdoor lighting. A large-scale synthetic PersonX dataset is collected in \cite{cvpr19viewpoint} to systematically study the effect of viewpoint for a person Re-ID system. Recently, the 3D person images are also studied in \cite{arxiv203d}, generating the 3D body structure from 2D images. However, how to bridge the gap between synthesized images and real-world datasets remains challenging.} \subsubsection{Domain-Specific/Generalizable Architecture Design} \black{\textbf{Re-ID Specific Architecture.} Existing Re-ID methods usually adopt architectures designed for image classification as the backbone. Some methods modify the architecture to achieve better Re-ID features \cite{iccv17svd,arxiv19trick}. Very recently, researchers have started to design domain specific architectures, \emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, OSNet with omni-scale feature learning \cite{iccv19osnet}. It detects the small-scale discriminative features at a certain scale. OSNet is extremely lightweight and achieves competitive performance. With the advancement of automatic neural architecture search (\emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, Auto-ReID \cite{iccv19autoreid}), more domain-specific powerful architectures are expected to address the task-specific Re-ID challenges. Limited training samples in Re-ID also increase the difficulty in architecture design.} \blue{\textbf{Domain Generalizable Re-ID.} It is well recognized that there is a large domain gap between different datsets \cite{icpr14deepmetric,eccv20liao}. Most existing methods adopt domain adaptation for cross-dataset training. A more practical solution would be learning a domain generalized model with a number of source datasets, such that the learned model can be generalized to new unseen datasets for discriminative Re-ID without additional training \cite{cvpr19general}. Hu \textit{et al.} \cite{accv14cross} studied the cross-dataset person Re-ID by introducing a part-level CNN framework. The Domain-Invariant Mapping Network (DIMN) \cite{cvpr19general} designs a meta-learning pipeline for domain generalizable Re-ID, learning a mapping between a person image and its identity classifier. The domain generalizability is crucial to deploy the learned Re-ID model under an unknown scenario.} \subsubsection{Dynamic Model Updating} \black{Fixed model is inappropriate for practical dynamically updated surveillance system. To alleviate this issue, dynamic model updating is imperative, either to a new domain/camera or adaptation with newly collected data.} \black{\textbf{Model Adaptation to New Domain/Camera}. Model adaptation to a new domain has been widely studied in the literature as a domain adaptation problem \cite{eccv18bak,cvpr19adaptrans}. In practical dynamic camera network, a new camera may be temporarily inserted into an existing surveillance system. Model adaptation is crucial for continuous identification in a multi-camera network \cite{cviu17camera,eccv14camera}. To adapt a learned model to a new camera, a transitive inference algorithm \cite{cvpr17dynamicopen} is designed to exploit the best source camera model based on a geodesic flow kernel. However, it is still challenging when the newly collected data by the new camera has totally different distributions. In addition, the privacy and efficiency issue \cite{arxiv20fedreid} also need further consideration.} \black{\textbf{Model Updating with Newly Arriving Data.} With the newly collected data, it is impractical to training the previously learned model from the scratch \cite{eccv16temporal}. An incremental learning approach together with human interaction is designed in \cite{eccv16temporal}. For deeply learned model, an addition using covariance loss \cite{arxiv18incremental} is integrated in the overall learning function. However, this problem is not well studied since the deep model training require large amount of training data. Besides, the unknown new identities in the newly arriving data is hard to be identified for the model updating. } \subsubsection{Efficient Model Deployment} \black{It is important to design efficient and adaptive models to address scalability issue for practical model deployment.} \blue{\textbf{Fast Re-ID.} For fast retrieval, hashing has been extensively studied to boost the searching speed, approximating the nearest neighbor search \cite{tip17hash}. Cross-camera Semantic Binary Transformation (CSBT) \cite{cvpr17fast} transforms the original high-dimensional feature representations into compact low-dimensional identity-preserving binary codes. A Coarse-to-Fine (CtF) hashing code search strategy is developed in \cite{eccv20faster}, complementarily using short and long codes. However, the domain-specific hashing still needs further study.} \blue{\textbf{Lightweight Model.} Another direction for addressing the scalability issue is to design a lightweight Re-ID model. Modifying the network architecture to achieve a lightweight model is investigated in \cite{cvpr18hann,iccv19autoreid,iccv19osnet}. Model distillation is another approach, \emph{e.g}\onedot} \def\Eg{\emph{E.g}\onedot, a multi-teacher adaptive similarity distillation framework is proposed in \cite{cvpr19distillreid}, which learns a user-specified lightweight student model from multiple teacher models, without access to source domain data.} \black{\textbf{Resource Aware Re-ID.} Adaptively adjusting the model according to the hardware configurations also provides a solution to handle the scalability issue. Deep Anytime Re-ID (DaRe) \cite{cvpr18multires} employs a simple distance based routing strategy to adaptively adjust the model, fitting to hardware devices with different computational resources.} \section{Concluding Remarks}\label{sec:conclusion} This paper presents a comprehensive survey with in-depth analysis from a both closed-world and open-world perspectives. We first introduce the widely studied person Re-ID under the closed-world setting from three aspects: feature representation learning, deep metric learning and ranking optimization. With powerful deep learning, the closed-world person Re-ID has achieved performance saturation on several datasets. Correspondingly, the open-world setting has recently gained increasing attention, with efforts to address various practical challenges. We also design a new AGW baseline, which achieves competitive performance on four Re-ID tasks under various metrics. It provides a strong baseline for future improvements. This survey also introduces a new evaluation metric to measure the cost of finding all the correct matches. We believe this survey will provide important guidance for future Re-ID research. \bibliographystyle{IEEEtran}
\section{Joint detection receiver to achieve superadditive capacity with entanglement assistance} \begin{figure} \centering \includegraphics[width=\columnwidth]{JDR.png} \caption{A schematic of our joint detection receiver, which acts on $Mn$ signal modes modulated by Alice, which are received by Bob after transmission through the lossy-noise Bosonic channel ${\cal N}_\eta^{N_B}$, and $Mn$ idler modes held by Bob, entangled with Alice's transmitted modes. The pre-shared entanglement is shown using red (dash-dotted) lines. In an actual realization, only one $n$-mode Green Machine is needed, because the sum-frequency modes ${\hat b}_k^{(i)}$, $1 \le k \le K$ come out in a temporal sequence.} \label{fig:JDR} \end{figure} {\em Joint detection receiver design}---Let us consider the transmitter-receiver structure sketched in Fig.~\ref{fig:JDR}. Alice employs a binary phase shift keying (BPSK) modulation with a Hadamard code of order $n$. Let us assume $n$ is a power of $2$ such that a Hadamard code exists. A block of $M$ temporal modes of the signal output of a pulsed spontaneous parametric downconversion (SPDC) source, an $M$-fold tensor product two-mode squeezed vacuum $|\psi\rangle_{\rm SI}^{\otimes M}$, is modulated by one value of binary phase $\theta_i \in \left\{0, \pi\right\}$. The transmission of an entire BPSK-modulated Hadamard codeword consumes $n$ SPDC signal pulses, modulated with phases $\theta_i, 1 \le i \le n$, consuming $nM$ uses of the single-mode channel ${\cal N}_\eta^{N_B}$. The corresponding idler modes are losslessly pre-shared with Bob, e.g., using a fault-tolerant quantum network. Alice's phase modulation of the signal modes, followed by transmission of the signal modes through ${\cal N}_\eta^{N_B}$, turns into phase modulation of (classical) phase-sensitive cross correlations between Bob's received modes and (losslessly-held) idler modes. This correlation bears the information in Alice's phase modulation through the lossy-noisy channel much stronger than any classical means, e.g., an amplitude-phase modulated coherent state. To translate phase modulation of phase-sensitive signal-idler cross correlations into modulation of (quadrature) field displacement, for which we have significant prior literature on receiver designs, e.g., for phase modulated coherent states, we employ SFG, a non-linear optical process, which runs SPDC in reverse, per the Hamiltonian ${\hat H}_I = \hbar g \sum_{m=1}^M \left({\hat b}^\dagger {\hat a}_{S_m} {\hat a}_{I_m} + {\hat b} {\hat a}_{S_m}^\dagger {\hat a}_{I_m}^\dagger\right)$, with $\hbar$ the reduced Planck constant, and $g$ the non-linear interaction strength. Signal-idler photon pairs from the $M$ input mode pairs are up-converted to a sum-frequency mode $\hat b$, and the phase-sensitive cross-correlations $\langle {\hat a}_{S_m}{\hat a}_{I_m} \rangle$ manifests as a (quadrature) displacement of a thermal state of the $\hat b$ mode~\cite{Zhu17}. Bob employs $n$ feed-forward (FF) SFG modules---made by stacking $K$ SFG stages, each of duration $\pi/2\sqrt{M}g$, and $K$ beamsplitters and combiners of transmissivities $\kappa = 1/K$ and $1-\kappa$ respectively, as shown in Fig.~\ref{fig:JDR}---to mix the $nM$ modulated-received modes with the $nM$ locally-held idler modes, pre-shared with Bob, entangled with Alice's signal modes. The reason for the $K$-stage SFG is that the bright noise background results in bright received modes, and that we wish the signal input of each SFG stage to have much less than a photon per mode, so that we can borrow the ``qubit-approximation" analysis of the SFG from~\cite{Zhu17}. ${\hat b}_k^{(i)}$ denotes the sum-frequency mode of the $k$-th SFG, $1 \le k \le K$, of the $i$-th FF-SFG module, $1 \le i \le n$. The sum-frequency outputs ${\hat b}_k^{(i)}$, $1 \le i \le n$ from the $K$ FF-SFG modules are input into an $n$-mode linear-optical Green Machine (GM) circuit GM$_k$, each of which has $n$ outputs that are each detected by single photon detectors~\cite{Guh11b}. An $n$-mode GM, as shown in the bottom right of Fig.~\ref{fig:JDR}, is a linear-optical circuit comprising $n\log_2(n)/2$ $50$-$50$ beasmplitters. It turns an $n$-mode BPSK-modulated coherent-state Hadamard codeword at its input into one of the $n$ codewords of an order-$n$ coherent-state pulse-position modulation (PPM) at its output. The electrical outputs of the $i$-th detectors from each of the $K$ GM modules are classically combined into one output that is monitored for zero or more clicks, during each SPDC pulse interval. Since the $K$ sum-frequency modes ${\hat b}_k^{(i)}$, $1 \le k \le K$ in the $i$-th FF-SFG module come out in a temporal sequence, in reality we will only need one $n$-mode GM and $n$ detectors. The diagram in Fig.~\ref{fig:JDR} shows $K$ GMs for ease of explanation. Define ${\hat \rho}_{\rm th}(\alpha, N_T) = \int_{\mathbb C} \frac{1}{\pi N_T}e^{-(\beta - \alpha)^2/N_T}|\beta\rangle \langle \beta | d^2\beta$ as a single-mode thermal state with mean field amplitude $\alpha \in {\mathbb C}$. The photodetection statistics of this state is Laguerre-distributed~\cite{Hel76}. The probability that this produces zero clicks when detected with an ideal photon detector, $\langle 0|{\hat \rho}_{\rm th}(\alpha, N_T) |0\rangle = (1/(N_T+1))e^{-|\alpha|^2/(N_T+1)}$. In the $\kappa \ll 1/N_B$ limit, for the $k$-th GM, the $n$ input modes are in states ${\hat \rho}_{\rm th}(\pm \alpha^{(k)}, N_T)$, where the $\pm$ signs are governed by the specific Hadamard codeword that was used, $\alpha^{(k)} = \sqrt{M\kappa \eta N_S(1+N_S)\mu^{k-1}}$, with $\mu = \left(1-\kappa(1+N_S^\prime)\right)^2$, and $N_T = \kappa N_SN_S^\prime$~\cite{Zhu17}. Let us also define $N_k = |\alpha^{(k)}|^2$. One of the $n$ output modes of the $k$-th GM (which one, based on which Hadamard code was sent) is in a displaced thermal state ${\hat \rho}_{\rm th}(\sqrt{n}\,\alpha^{(k)}, N_T)$. We call this the ``pulse-containing output" (mode). The remaining $n-1$ output modes are in the zero-mean thermal state ${\hat \rho}_{\rm th}(0, N_T)$. At the $n$ classically-combined detector outputs---produced by detecting one Hadamard codeword, i.e., $Mn$ received-idler mode pairs---we record a random binary $n$-vector of (no-click, click), i.e., $2^n$ possible outcomes. The $2^n$ click patterns are clubbed into $n+1$ outcomes: a click in a given output and no clicks elsewhere, or an {\em erasure}, which refers to either zero clicks on all $n$ outputs, or multiple clicks in any of the outputs. The modulation-code-receiver sequence described above induces an $n$-input $n+1$-output discrete memoryless channel (DMC), which happens to be identical to the DMC induced by coherent-state pulse-position modulation (PPM) and single photon detectors with non-zero background (or, dark) click probability. The capacity of this channel~\cite{Jar17}, divided by $(Mn)$, is the bits per mode capacity attained by our modulation-code-receiver trio: \begin{eqnarray} R_E^{(M,n)} &=& \frac{1}{Mn}\left( {p_e}\log n + (n-1)p_d\log \frac{np_d}{p_e} \right. \nonumber \\ &-& \left.\big(p_e+(n-1)p_d\big)\log\left[1+\frac{(n-1)p_d}{p_e}\right]\right), \end{eqnarray} where $p_d = (1-p_c)p_b(1-p_b)^{n-2}$ and $p_e = p_c(1-p_b)^{n-1}$. In the above formula, $1 - p_c$ is the probability that the pulse-containing output of the receiver does not produce any clicks, and $1 - p_b$ is the probability that any given non-pulse-containing output does not produce any clicks. Assuming the photodetection statistics of the $i$-th outputs of each of the $K$ GMs are statistically independent, we get $1 - p_c = \Pi_{k=1}^K (1-p_c^{(k)})$, where $1-p_c^{(k)} = \frac{1}{N_T+1}e^{-nN_k/(N_T+1)}$. This simplifies to: \begin{eqnarray} p_c &=& 1-\frac{1}{(1+N_T)^K}e^{-A\left(\frac{1-\mu^K}{1-\mu}\right)}, {\text{and}}\\ p_b &=& 1 -\frac{1}{(1+N_T)^K}, \end{eqnarray} with $A = nM\kappa\eta N_S(N_S+1)/(N_T+1)$. \begin{figure} \centering \includegraphics[width=\columnwidth]{cap_ratio_M100000.png} \caption{The thin magenta lines are plots of $R_E^{(M,n)}/C$ for $n = 2, 4, 8, \ldots, 2^{20}$, for $M = 10^5$. This shows that the capacity ratio scales as $\log(1/N_S)$, which goes to infinity as $N_S \to 0$, for any given $M$. However, this scheme (BPSK modulation, Hadamard code, and our proposed structured joint-detection receiver) does not achieve $C_E$. We have assumed $\eta = 0.01$ and $N_B = 10$ photons per mode, for all the plots in this Figure.} \label{fig:cap_ratio_M100000} \end{figure} In Fig.~\ref{fig:cap_ratio_M100000}, we plot the ratio $C_E/C$ as a function of $N_S$ in the $N_S \ll 1$ regime, for $\eta = 0.01$ and $N_B = 10$. We plot the capacity ratios $R_E^{(M,n)}/C$, attained for $M=10^5$, and $n \in \left\{2, 2^2, \ldots, 2^{20}\right\}$. Let us define $R^{(M)}_E = {{\rm sup}_{n}R_E^{(M,n)}}$ to be the envelope of capacities attained by our scheme over all $n$, for a given $M$. In order to derive the asymptotic capacity scaling, we apply the conditions pertinent to our problem setting, \begin{equation} \eta N_S \ll N_S \ll 1 \ll N_B \ll 1/\kappa, \end{equation} and through a series of approximations, and leveraging analytical connections to noisy pulse-position modulation (PPM), we prove in the Supplementary Information: \begin{equation} \frac{R_E^{(M)}}{C} \sim \log\left(\frac{1}{N_S}\right), \label{eq:REM_scaling_optimal} \end{equation} establishing that our modulation-code-receiver combination attains the optimal scaling of entanglement-assisted communications in the aforesaid regime, and despite not meeting $C_E$, is in principle capable of harnessing the infinite-fold capacity enhancement possible using shared entanglement---using quantum optical states, processes and detection schemes that are readily realizable. Further, this capacity ratio is clearly larger than $2$, the best achievable ratio with an OPA receiver~\cite{Guh09} or an FF-SFG receiver~\cite{Zhu17,Shi19} (See Supplementary Information). {\em Covert communications}---An operational regime that justifies the $N_B \gg 1$ assumption, required for the $\log(1/N_S)$ entanglement-assisted capacity-ratio gain, is radio-frequency (RF), or microwave domain, signaling. Furthermore, aside from practical constraints of the peak source power and high losses, e.g., which may occur in deep turbulent atmospheric propagation or long-range deep-space communications, one obvious regime where $N_S \ll 1$ would be applicable is {\em covert} or provably undetectable communications. Pre-shared entanglement, e.g., distributed at optical frequencies by a future satellite network or the quantum internet, could be leveraged to enhance---potentially by an order of magnitude or more---the amount of information that an RF communication link could transmit provably covertly, i.e., ensuring that the transmission attempt is undiscoverable even by an all-powerful quantum-equipped adversary. For provably covert communications, regardless of whether Alice and Bob employ entanglement assistance or not, the mean transmitted photon number per mode $N_S$ must satisfy $N_S \le \left(\sqrt{2\eta N_B(1+\eta N_B)}/(1-\eta)\right)\, \sqrt{\delta / m}$, where $m$ is the total number of transmitted modes, and $\delta$ quantifies how stringent Alice and Bob are on being covert. The above condition on $N_S$ comes from Alice and Bob setting a requirement that the adversary's probability of error $P_e$, in detecting their transmission attempt must satisfy, $1/2 \ge P_e \ge 1/2 - \delta$. This dependence of $N_S$ on $m$ ultimately leads to the {\em square-root law} of covert communications, i.e., $O(\sqrt{m})$, but no more, bits can be transmitted reliably yet covertly~\cite{Bas15,Bul19}. Both the OPA and the FF-SFG receivers achieve up to a factor of $2$ enhancement over $C$ (see Supplementary Information, and~\cite{Shi19}). Hence, covert communications using either of those receivers will obey the square-root law, albeit with a factor of $2$ enhancement in the scaling constant. Our scheme in Fig.~\ref{fig:JDR} can achieve a factor of $\log(1/N_S)$ capacity enhancement, in the $N_S \ll 1$, $N_B \gg 1$ regime. This will translate to being able to transmit $O(\sqrt{m}\, \log m)$ bits of information reliably and covertly, thereby breaking the square-root law of covert communications (by leveraging pre-shared entanglement). However, a more careful analysis of this is in order: both to find the constant in the aforesaid scaling, and more importantly to prove a rigorous converse result to provably-covert entanglement-assisted communications. We leave such an analysis of our joint-detection receiver in the covert communication regime, for future work. {\em Practical considerations and discussion}---For the assumed values of $\eta = 0.01$ and $N_B = 10$ photons per mode, the highest capacity achieved by the joint-receiver receiver discussed above, occurs at around $M \sim 10^5$. A more detailed discussion of why there is an optimal modulation-block length $M$ is discussed in the Supplementary Information. For a typical SPDC entanglement source of optical bandwidth $W \sim$ THz, With $M \sim WT$, $M = 10^5$ translates to a pulse duration $T \sim 100$ ns. This means the BPSK phase-modulation bandwidth necessary would be $\sim 10$ MHz, which is readily realizable with commercial-grade electro-optical modulators at $1550$ nm. In order to bridge the remainder of the gap to $C_E$, better codes and more complex quantum joint detection receivers will be needed, based on arguments closely aligned with those in~\cite{Chu17}. We believe that the capacity achieved by the receiver in Fig.~\ref{fig:JDR} can be improved by adopting an FF scheme to make use of the extra modes ${\hat e}_k^{m}$'s in Fig.~\ref{fig:JDR}, which was crucial for the optimality of the FF-SFG receiver for quantum radar~\cite{Zhu17}. Further improvement is possible via leveraging insights from a quantum joint-detection receiver for classical optical communications~\cite{Guh11a} which combines the GM and the Dolinar receiver~\cite{Dol73}. This improved scheme would modulate $M$-mode SPDC pulses using a BPSK first-order Reed-Muller code, but now FF-SFG modules will be sandwiched by non-zero-squeezing two-mode-squeezing stages as in~\cite{Zhu17}, and the detectors at the output of the GM stages will feed back into setting the aforesaid squeezing amplitudes, adaptively. We leave this calculation for future work. It should be obvious that we could have instead used a PPM modulation format, instead of BPSK Hadamard codewords followed by the GM stages, and achieved the same capacity performance. In such a scheme, Alice and Bob would need to pre-share (brighter) SPDC signal-idler mode pairs of mean photon number per mode $nN_S$, and Alice would send an $M$-temporal mode signal pulse (of mean photon number $nN_S$) and nothing (vacuum) in $n-1$ pulse slots. So, only $M$ modes will be excited out of each $Mn$ transmitted modes. FF-SFG stages will be used to demodulate, as before, but no GM stages will be needed. Since the optimal PPM order is $n \sim ({\cal E}\log(1/{\cal E}))^{-1}$ with ${\cal E} = M\eta N_S/(2N_B)$ (see Supplementary Information), which translates to $nN_S \sim \frac{N_0}{\log(N_0/N_S)}$ with $N_0 = 2N_B/(M\eta)$. For the numbers in Fig.~\ref{fig:cap_ratio_M100000}, i.e., $\eta=0.01$, $N_B=10$, $M=10^5$, we get $N_0 = 0.2$. This implies that for $N_S < 0.01$, we get $nN_S \lesssim 0.07$. Thus the idler pulses are still in the regime that the implicit ``qubit approximation" analysis of the SFG borrowed from~\cite{Zhu17} is valid. We relegate a slightly more detailed discussion of PPM and on-off-keying (OOK) modulation for entanglement-assisted communications, to the Supplementary Information. There, we also discuss pros and cons of the BPSK modulation described in this paper, and PPM or OOK modulation, both with regards to the requirements on shared entanglement, and the complexity of the receiver. It should be further noted that the PPM modulation format in the context of entanglement-assisted communications as described above, was proposed for entanglement-assisted communication over a general quantum channel over a finite-dimensional Hilbert space~\cite{Din17}. This technique has been termed ``position based encoding" in the quantum information theory literature~\cite{Qi18}. However, there is no simple translation known as yet of the receiver measurement that must be employed to achieve $C_E$ with position-based encoding, into a structured optical receiver. It will be interesting, in future work, to find a structured optical receiver design that achieves the full entanglement-assisted capacity $C_E$ afforded by quantum mechanics. A final point worth noting: pre-shared entanglement affords a large capacity enhancement in the regime of low transmitted signal power per mode and high thermal-noise mean photon number per mode, despite that entanglement does not survive propagation through this (entanglement-breaking) channel. It is this exact same regime where an entangled-state transmitter was shown to attain a superior performance compared to any classical source, for detecting a target at stand-off range---a concept termed {\em quantum illumination}~\cite{Tan08,Guh09,Zhu17}. These two observations are intimately related. These are both tasks that involve extracting information modulated into one half of a two-mode-entangled state where the information-bearing half undergoes propagation over an entanglement-breaking channel. {\em Acknowledgments}---SG acknowledges General Dynamics Mission Systems for supporting this research, and works performed under the DARPA Information in a Photon program (2010-2013) under contract number HR0011-10-C-0159, for extremely valuable insights. QZ and BB were sponsored by the Army Research Office under Grant Numbers W911NF-19-1-0418 and W911NF-19-1-0412, respectively. SG acknowledges Ali Cox, Michael Bullock, Christos Gagatsos and Zheshen Zhang for valuable discussions.
\section{Introduction} Absolutely summing multilinear operators between Banach spaces, as well as closely related classes of multilinear operators, have been studied since the 1983 seminal paper \cite{pietsch1983ideals} by A. Pietsch. A huge amount of research has been done in the subject since then; to avoid a long list of references we just refer the reader to recent developments that can be found in, e.g., \cite{achour2014factorization, annfunctanal, paraibanospilarlama2019, bayart, botelho2017transformation, botelho2016type, pacific, jamilson, dimant2019diagonal, nunez-alarcon2019Sharp, ribeiro2019} As is usual in the multilinear theory, there are several different classes of multilinear operators that generalize the ideal of absolutely $p$-summing linear operators and related operator ideals, and a number of them have already been studied. Each of these classes has its own interest, some of them because they generalize nice and desired properties from the linear case, some of them because the role they play in the nonlinear context. In order to explain the purpose of this paper, we present the very first definition of summing multilinear operators, that goes back to \cite{pietsch1983ideals}. For a Banach space $E$, $E^*$ denotes its topological dual and $B_E$ denotes its closed unit ball. Given Banach spaces $E_1, \ldots, E_n,F$, an $n$-linear operator $T \colon E_1 \times \cdots\times E_n \longrightarrow F$ is absolutely $(q;p_1, \ldots, p_n)$-summing, $\frac{1}{q} \leq \frac{1}{p_1} + \cdots + \frac{1}{p_n}$, if there is a constant $C > 0$ such that $$\left(\sum_{j=1}^k \|T(x_1^j, \ldots, x_n^j)\|^q \right)^{1/q} \leq C \cdot \prod\limits_{i=1}^n \sup_{\varphi_i \in B_{E_i^*}} \left(\sum_{j=1}^k |\varphi_i(x_i^j)|^{p_i} \right)^{1/{p_i}}, $$ for all $k \in \mathbb{N}$ and $x_i^j \in E_i$, $j = 1,\ldots, k$, $i = 1, \ldots, n$. The subject has evolved aiming generality, diversity and usefullness in the following four directions:\\ (i) Instead of summing in only one index, one can sum in some or in all indices. For example, summing in all indices we shall consider $\sum\limits_{j_1=1}^k \sum\limits_{j_2=1}^k \cdots \sum\limits_{j_n=1}^k \|T(x_1^{j_1}, \ldots, x_n^{j_n})\|^q $ instead of $\sum\limits_{j=1}^k \|T(x_1^j, \ldots, x_n^j)\|^q$. This approach led to the successful class of multiple summing operators that goes back to the classical inequalities of Littlewood and of Bohnenblust-Hille. Remarkable applications of the class of multiple summing operators can be found, e.g., in \cite{bayart, defantpopa, montanaro2012some, perez2008unbounded}. \\ (ii) Considering $\mathbb{N}^n$ as a (generalized) matrix, absolutely summing operators take the sum over the diagonal of the matrix and multiple summing operators take the sum over the whole matrix. One can also take sums over other subsets of the matrix, which we call blocks. Sums over some specific blocks, which include the diagonal and the whole matrix, were considered in \cite{nacibarXiv2019, annfunctanal, albuquerque2014bohnenblust, araujo2016some, botelho2008summability, zalduendo1993estimate}.\\ (iii) Instead of working with only one parameter $q$, we can work with parameters $q_1, \ldots, q_n$ and consider iterated sums like $$\left(\sum\limits_{j_1=1}^k \cdots \left(\sum\limits_{j_{n-1}=1}^k \left(\sum\limits_{j_n=1}^k \|T(x_1^{j_1}, \ldots, x_n^{j_n})\|^{q_n}\right)^{\frac{q_{n-1}}{q_n}}\right)^{\frac{q_{n-2}}{q_{n-1}}} \cdots \right)^{\frac{1}{q_1}}. $$ This is called the anisotropic approach and has already been considered in \cite{nacibarXiv2019, annfunctanal, paraibanospilarlama2019, albuquerque2017holder, albuquerque2016optimal, nacibjfa, albuquerque2017some, aron2017optimal, bayart, nunez-alarcon2019Sharp}. Of course, the case $q = q_1 = \cdots = q_n$ recovers the isotropic case.\\ (iv) The $\ell_p$ and weak-$\ell_p$ norms can be replaced by other norms on sequence spaces. For linear operators this was done by Cohen \cite{cohen} to describe the dual of the ideal of absolutely $p$-summing operators, by Diestel, Jarchow and Tonge \cite{diestel1995absolutely} to study almost summing operators and in the definition of operators of type $p$ and of cotype $q$ (see \cite{defant1992tensor}). Multilinear counterparts of these classes were studied in, e.g., \cite{almostsumming, botelho2016type, bushi, jamilson, marceladaniel}. Attempts to consider general sequence norms appeared in \cite{botelho2017transformation, ewertonLAMA, diana}, but only for the diagonal in the isotropic case. The purpose of this paper is to introduce a general framework that encompasses several of the developments describe above in one single definition. This definition considers sums in any number of indices, the isotropic and the anisotropic cases, sums over arbitrary blocks and a large variety of sequence norms. The environment we propose not only recovers the studied classes as particular instances but opens the gate for a number of new classes of summing multilinear operators. We prove that the general classes we introduce are Banach ideals of multilinear operators and, to illustrate how the theory can be fruitful, we prove that a known coincidence theorem for multiple summing bilinear operators is a particular case of a more general result obtained in our framework. By ${\cal L}(E_1, \ldots, E_n;F)$ we denote the Banach space of all $n$-linear continuous operators from $E_1 \times \cdots \times E_n$ to $F$, where $E_1, \ldots, E_n.F$ are Banach spaces over $\mathbb{K} = \mathbb{R}$ or $\mathbb{C}$, endowed with the usual sup norm. For the general theory of (spaces of) multilinear operators we refer to \cite{dineen, mujica}. \section{The construction} By $(e_j)_{j=1}^\infty$ we denote the canonical vectors of scalar-valued sequence spaces and given $x\in E$ and $n \in \mathbb{N}$, we use the notation \begin{align*} x\cdot e_j = (0,\ldots ,0,x,0,0,\ldots ), \end{align*} where $x$ appears in the $j$-th coordinate. The symbols $E\stackrel{1}{\hookrightarrow}F$ means that $E$ is a linear subspace of $F$ and $\Vert x\Vert_F\leq \Vert x\Vert_E$ for every $x\in E$. Given $\varphi_m\in E_m'$, $m=1,\ldots,n$, and $b\in F$, by $\varphi_1\otimes \ldots \otimes \varphi_n\otimes b$ we mean the operator in $\mathcal{L}(E_1,\ldots , E_n;F) $ given by \begin{align*} \varphi_1\otimes \cdots \otimes \varphi_n\otimes b (x_1,\ldots , x_n) = \varphi_1(x_1) \cdots \varphi_n(x_n) b. \end{align*} Finite linear combinations of operators of this kind are called $n$-linear operators of {\it finite type} and the subspace formed by such operators is denoted by $\mathcal{L}_f(E_1, \ldots, E_n;F)$. Throughout, all sequence spaces are considered with the coordinatewise algebraic operations. Given a subset $N$ of $\mathbb{N}$ and a sequence $(x_j)_{j=1}^\infty$ in $E$, the symbol $(x_j)_{j \in N}$ denotes the sequence whose $j$-th coordinate is $x_j$ if $j \in N$ and $0$ if $j \notin J$. It is easy to see that if $(x_j)_{j=1}^\infty$ and $(y_j)_{j=1}^\infty$ are sequence in $E$ and $\lambda$ is a scalar, then \begin{align}\label{eralemma} (x_j)_{j\in N}+\lambda(y_j)_{j\in N} = (x_j+\lambda y_j)_{j\in N}. \end{align} By $c_{00}(E)$ and $\ell_\infty(E)$ we mean the spaces of $E$-valued eventually null sequences and bounded sequences, the latter endowed with the sup norm. \begin{definition}\rm \cite[Definition 1.1]{botelho2017transformation} A {\it sequence class} is a rule $X$ that to each Banach space $E$ assigns a Banach space $X(E)$ of $E$-valued sequences such that:\\ $\bullet$ $c_{00}(E)\subset X(E)\stackrel{1}{\hookrightarrow} \ell_{\infty}(E)$,\\ $\bullet$ $\Vert e_j\Vert_{X(\mathbb{K})} = 1$ for every $j\in\mathbb{N}$. \end{definition} A sequence class $X$ is {\it linearly stable} if, regardless of the Banach spaces $E$ and $F$, the linear operator $u \in {\cal L}(E;F)$ and the sequence $(x_j)_{j=1}^{\infty}\in X(E)$, $(u(x_j))_{j=1}^{\infty}\in X(F)$ and $$\|(u(x_j))_{j=1}^{\infty}\|_{X(F)} \leq \|u\|\cdot \|(x_j)_{j=1}^{\infty}\|_{X(E)}.$$ Several examples of linearly stable sequences classes can be found in \cite{botelho2017transformation}, including the classes $\ell_p(\cdot)$ of absolutely $p$-summable sequences, $\ell_p^w(\cdot)$ of weakly $p$-summables sequences, $\ell_p^u(\cdot)$ of unconditionally $p$-summable sequences, $c_0(\cdot)$ of norm null sequences, $\ell_\infty(\cdot)$ of bounded sequences, $\ell_p\langle \cdot \rangle$ of Cohen strongly $p$-summable sequences, ${\rm Rad}(\cdot)$ of almost unconditionally summable sequences and ${\rm RAD}(\cdot)$ of almost unconditionally surely bounded sequences. Further examples can be found in \cite{pacific}. To comprise the anisotropic case we need to work with iterated sequences classes, for example, $$\ell_p\left(\ell_q(E)\right) = \left\{\left((x_i^j)_{i=1}^\infty \right)_{j=1}^\infty : x_i^j \in E, \sum_{j=1}^\infty \left(\sum_{i=1}^\infty\|x_i^j\|^p \right)^{\frac{p}{q}} < \infty \right\}, $$ which is a Banach space with the norm $$\left\|\left((x_i^j)_{i=1}^\infty \right)_{j=1}^\infty \right\|_{\ell_p\left(\ell_q(E)\right)} = \left( \sum_{j=1}^\infty \left(\sum_{i=1}^\infty\|x_i^j\|^p \right)^{\frac{p}{q}} \right)^{\frac{1}{q}}. $$ Given sequence classes $X_1,\ldots , X_n$, we denote \begin{align*} \mathbf{X}_n(\cdot) := X_1(\cdots (X_n(\cdot))\cdots). \end{align*} A nonvoid subset $B$ of $\mathbb{N}$ shall be called a {\it block}. At the heart of our construction lies the following definition: for any $j_1,\ldots,j_{n-1}\in\mathbb{N}$, we denote \begin{align*} B^{j_1,\ldots, j_{n-1}}: =\{j_n\in\mathbb{N}: (j_1,\ldots, j_{n-1},j_n)\in B\}. \end{align*} The simple but key observation is that $$B = \bigcup_{j_1, \ldots, j_{n-1}=1}^\infty \bigcup_{j_n \in B^{j_1, \ldots, j_{n-1}}}\{j_1, \ldots, j_n\}, $$ and that running $j_n$ over $B^{j_1, \ldots, j_{n-1}}$ for fixed $j_1, \ldots, j_{n-1}$, then runnning backwards $j_{n-1}, \ldots, j_1$ over $\mathbb{N}$, each element of $B$ is taken exactly once. \begin{proposition} Let $X_1,\ldots, X_n$, $Y_1,\ldots, Y_n$ be sequence classes and $B \subseteq \mathbb{N}^n$ be a block. The following conditions are equivalent for an $n$-linear operator $T\in\mathcal{L}(E_1, \ldots,E_n;F)$: \begin{enumerate} \item[\rm(i)] If $(x^{(k)}_j)_{j=1}^{\infty}\in X_k(E_k)$ for $k=1,\ldots,n$, then \begin{align*} \left(\ldots\left(\left( T\left( x_{j_1}^{(1)}, \ldots , x_{j_n}^{(n)}\right)\right)_{j_n\in B^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\ldots\right)_{j_1=1}^{\infty} \in \mathbf{Y}_n(F). \end{align*} \item[\rm(ii)] The map $\widehat{T}_B \colon X_1(E_1) \times \cdots \times X_n(E_n)\longrightarrow \mathbf{Y}_n(F)$ given by \begin{align*} \hspace*{-1.5em}\widehat{T}_B \left( \left( x_{j}^{(1)}\right)_{j=1}^{\infty},\ldots, \left( x_{j}^{(n)}\right)_{j=1}^{\infty} \right) = \left(\ldots\left(\left( T\left( x_{j_1}^{(1)}, \ldots , x_{j_n}^{(n)}\right)\right)_{j_n\in B^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\ldots\right)_{j_1=1}^{\infty}, \end{align*} is a well defined continuous $n$-linear operator. \end{enumerate} \label{prop-1} \end{proposition} \begin{proof} Let us check the nontrival implication. That $\widehat{T}_B$ is well defined is obvious and its $n$-linearity follows from the $n$-linearity of $T$ and from (\ref{eralemma}). We shall check the continuity of $\widehat{T}_B$ in the bilinear case $n = 2$. The reasoning will make clear that the general case is analogous (with a much heavier notation). To apply the Closed Graph Theorem, for each $k\in\mathbb{N}$ let $\overline{x}_k^{(1)} = (x_{k,j}^{(1)})_{j=1}^{\infty}\in X_1(E_1)$ and $\overline{x}_k^{(2)} = (x_{k,j}^{(2)})_{j=1}^{\infty}\in X_2(E_2)$ be such that \begin{align} (\overline{x}_k^{(1)} , \overline{x}_k^{(2)}) \stackrel{k}{\longrightarrow} (\overline{x}^{(1)},\overline{x}^{(2)}) & \mbox{ in } X_1(E_1)\times X_2(E_2) \label{eq-1} \end{align} and \begin{align} \widehat{T}_B(\overline{x}_k^{(1)} , \overline{x}_k^{(2)})\stackrel{k}{\longrightarrow} z:= ((z_{j_1,j_2})_{j_2=1}^{\infty})_{j_1=1}^{\infty} & \mbox{ in } Y_1(Y_2(F)), \label{eq-2} \end{align} where $\overline{x}^{(1)}:=(x^{(1)}_{j})_{j=1}^{\infty}$ and $\overline{x}^{(2)}:=(x^{(2)}_{j})_{j=1}^{\infty}$. Given a pair of indices $(i_1,i_2)\in\mathbb{N}^2$, the projections $$P_{2,i_2}\colon Y_2(F) \longrightarrow F~,~P_{2,i_2}((y_j)_{j=1}^\infty) = y_{i_2} , $$ $$P_{1,i_1}\colon Y_1(Y_2(F)) \longrightarrow Y_2(F)~,~P_{1,i_1}\left(\left(w_j^i))_{i=1}^\infty\right)_{j=1}^\infty\right) = \left(w_{j_1}^i\right)_{i=1}^\infty , $$ are continuous (norm one) linear operators because $Y_2(F)\stackrel{1}{\hookrightarrow} \ell_{\infty}(F)$ and $Y_1(Y_2(F))\stackrel{1}{\hookrightarrow} \ell_{\infty}(Y_2(F))$. Therefore, from \eqref{eq-2} it follows that \begin{align} P_{2,i_2}\circ P_{1,i_1}\left( \widehat{T}_B(\overline{x}_k^{(1)} , \overline{x}_k^{(2)}) \right) &= P_{2,i_2}\circ P_{1,i_1}\left( \left( \left(T(x^{(1)}_{k,j_1},x^{(2)}_{k,j_2}) \right)_{j_2\in B^{j_1}} \right)_{j_1=1}^{\infty} \right)\nonumber\\ &= P_{2,i_2}\left( \left(T(x^{(1)}_{k,i_1},x^{(2)}_{k,j_2}) \right)_{j_2\in B^{i_1}}\right)\nonumber\\ &= \begin{cases} 0,&\mbox{if } i_2\notin B^{i_1} \\ T(x^{(1)}_{k,i_1},x^{(2)}_{k,i_2} ),&\mbox{if } i_2\in B^{i_1} \end{cases} \stackrel{k}{\longrightarrow} P_{2,i_2}\circ P_{1,i_1}(z) =z_{i_1,i_2}. \label{eq-3} \end{align} Note that $z_{i_1,i_2}=0$ whenever $i_2\notin B^{i_1}$, because $ P_{2,i_2}\circ P_{1,i_1}\left( \widehat{T}_B(\overline{x}_k^{(1)} , \overline{x}_k^{(2)}) \right) = 0\stackrel{k}{\longrightarrow} z_{i_1,i_2}$. On the other hand, from $X_l(E_l)\stackrel{1}{\hookrightarrow} \ell_{\infty}(E_l)$ for $l = 1,2$, the convergences in \eqref{eq-1} give, for each pair of indices $(i_1,i_2)\in\mathbb{N}^2$, that \begin{align*} x_{k,i_1}^{(1)}\stackrel{k}{\longrightarrow} x_{i_1}^{(1)} \mbox{ in } E_1 {\rm ~~and~~} x_{k,i_2}^{(2)}\stackrel{k}{\longrightarrow} x_{i_2}^{(2)} \mbox{ in } E_2, \end{align*} so the continuity of $T$ yields \begin{align*} T(x_{k,i_1}^{(1)}, x_{k,i_2}^{(2)})\stackrel{k}{\longrightarrow} T(x_{i_1}^{(1)}, x_{i_2}^{(2)}) \mbox{ in } F {\rm ~for~every~} (i_1,i_2)\in\mathbb{N}^2. \end{align*} In particular, for $i_1\in\mathbb{N}$ and $i_2\in B^{i_1}$, \begin{align} T(x_{k,i_1}^{(1)}, x_{k,i_2}^{(2)})\stackrel{k}{\longrightarrow} T(x_{i_1}^{(1)}, x_{i_2}^{(2)}) \mbox{ in } F. \label{eq-4} \end{align} From \eqref{eq-3} e \eqref{eq-4} we get, for $i_1\in\mathbb{N}$ and $i_2\in B^{i_1}$, $T(x_{i_1}^{(1)},x_{i_2}^{(2)}) = z_{i_1,i_2}$. Since $z_{i_1,i_2}=0$ if $i_2\notin B^{i_1}$, we conclude that \begin{align*} z &:= ((z_{i_1,i_2})_{i_2=1}^{\infty})_{i_1=1}^{\infty} = \left( \left( z_{i_1,i_2}\right)_{i_2\in B^{i_1}}\right)_{i_1=1}^{\infty} = \left( \left( T(x_{i_1}^{(1)},x_{i_2}^{(2)})\right)_{i_2\in B^{i_1}}\right)_{i_1=1}^{\infty} \\ &= \widehat{T}_B(\overline{x}^{(1)} , \overline{x}^{(2)}). \end{align*} By the Closed Graph Theorem for multilinear operators (see, e.g., \cite{cecilia}), it follows that $\widehat{T}_B$ is continuous. \end{proof} \begin{definition}\rm \label{def-1} Let $X_1,\ldots, X_n$, $Y_1,\ldots, Y_n$ be sequence classes and $B \subseteq \mathbb{N}^n$ be a block. A multilinear operator $T\in\mathcal{L}(E_1,\ldots,E_n;F)$ is said to be {\it $(B;X_1,\ldots,X_n;Y_1,\ldots,Y_n)$-summing} if the equivalent conditions of Proposition \ref{prop-1} hold for $T$. In this case we write $T\in\mathcal{L}_{B;X_1,\ldots,X_2;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;F)$ and define \begin{align*} \Vert T\Vert_{B;X_1,\ldots,X_2;Y_1,\ldots,Y_n} = \Vert \widehat{T}_B\Vert . \end{align*} \end{definition} Properties of the classes defined above will be proved in Section 4 \section{Examples} We show how several studied classes of summing multilinear operators can be recovered as particular cases of our general construction. \subsection{The diagonal} In this subsection we consider the (isotropic) case where the block is the diagonal block $D =\{ (j_1,\ldots , j_n)\in\mathbb{N}^n: j_1=\cdots = j_n\}$. In this case, \begin{align*} D^{j_1,\ldots,j_{n-1}} = \begin{cases} \{j\} & \mbox{ if } j_1=\cdots = j_{n-1} =:j, \\ ~\,\emptyset & \mbox{otherwise.} \end{cases} \end{align*} Hence, for any operator $T\in\mathcal{L}(E_1,\ldots,E_n;F)$ and all sequences $(x^k_j)_{j=1}^{\infty}$ in $E_k$, $k=1,\ldots,n$, we have \begin{align}\label{eeqq} \left( \cdots \left( \left( T\left( x^1_{j_1},\ldots , x^n_{j_n}\right)\right)_{j_n\in D^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\cdots \right)_{j_1=1}^{\infty}= \left( T\left( x^1_j,\ldots ,x^n_j\right)\cdot e^{n-1}_j\right)_{j=1}^{\infty}. \end{align} \begin{definition}\label{deffed}\rm \cite[Definition 3.1]{botelho2017transformation} Given sequence classes $X_1,\ldots,X_n,Y$, an $n$-linear operator $T\in\mathcal{L}(E_1,\ldots,E_n;F)$ is {\it $(X_1,\ldots,X_n;Y)$-summing} if $\left( T(x^1_j,\ldots,x^n_j)\right)_{j=1}^{\infty} \in Y(F)$ whenever $(x^k_j)_{j=1}^{\infty}\in X_k(E_k)$, $k=1,\ldots , n$. The class of all these operators is denoted by $\mathcal{L}_{(X_1,\ldots,X_n;Y)}(E_1, \ldots, E_n;F)$, which is a Banach space with the norm $\Vert T\Vert_{X_1,\ldots,X_n;Y}=\Vert \widehat{T}\Vert$, where $\widehat{T}$ it the induced continuous $n$-linear operator \begin{align*} \widehat{T}\colon X_1(E_1)\times\cdots\times X_n(E_n)\longrightarrow Y(F)~,~ \widehat{T}\left( (x^1_j)_{j=1}^{\infty},\ldots, (x^n_j)_{j=1}^{\infty}\right) = \left( T(x^1_j,\ldots,x^n_j)\right)_{j=1}^{\infty}, \end{align*} (see \cite[Theorem 2.4]{botelho2017transformation}). \end{definition} \begin{theorem}\label{inclusion} Let $X_1,\ldots,X_n, Y$ be sequence classes and $E_1,\ldots, E_n,F$ be Banach spaces.\\ {\rm (a)} If there exists a sequence class $Z$ such that: \begin{align*} \left( y_j\cdot e_j\right)_{j=1}^{\infty} \in Y(Z(F)) \Longrightarrow \left( y_j\right)_{j=1}^{\infty} \in Y(F) \mbox{ and } \Vert \left( y_j\right)_{j=1}^{\infty} \Vert_{Y(F)} \leq \Vert \left( y_j\cdot e_j\right)_{j=1}^{\infty}\Vert_{Y(Z(F))}, \end{align*} then \begin{align*} \mathcal{L}_{D;X_1,\ldots,X_n;Y,Z, \ldots,Z}(E_1,\ldots , E_n;F) \stackrel{1}{\hookrightarrow} \mathcal{L}_{X_1,\ldots , X_n;Y}(E_1,\ldots , E_n;F). \end{align*} {\rm (b)} If there exists a sequence class $Z$ tal que \begin{align*} \left( y_j\right)_{j=1}^{\infty} \in Y(F) \Longrightarrow \left( y_j\cdot e_j\right)_{j=1}^{\infty} \in Y(Z(F)) \mbox{ and } \Vert \left( y_j\cdot e_j\right)_{j=1}^{\infty}\Vert_{Y(Z(F))} \leq \Vert \left( y_j\right)_{j=1}^{\infty} \Vert_{Y(F)}, \end{align*} then \begin{align*} \mathcal{L}_{X_1,\ldots , X_n;Y}(E_1,\ldots , E_n;F) \stackrel{1}{\hookrightarrow} \mathcal{L}_{D;X_1,\ldots,X_n;Y,Z,\ldots,Z}(E_1,\ldots , E_n;F). \end{align*} \end{theorem} \begin{proof} {\rm (a)} Let $T\in \mathcal{L}_{D;X_1,\ldots,X_n;Y,Z, \ldots,Z}(E_1,\ldots , E_n;F) $ and $(x^1_j)_{j=1}^{\infty}\in X_1(E_1), \ldots, (x^n_j)_{j=1}^{\infty}\in X_n(E_n)$ be given. From (\ref{eeqq}) and the assumption we have that the sequence \begin{align*} \left( \ldots \left( \left( T\left( x^1_{j_1},\ldots , x^n_{j_n}\right)\right)_{j_n\in B^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\ldots \right)_{j_1=1}^{\infty}= \left( T\left( x^1_j,\ldots ,x^n_j\right)\cdot e^{n-1}_j\right)_{j=1}^{\infty} \end{align*} belongs to $Y(Z(\cdots Z(F)\cdots ))$, hence $\left( T\left( x^1_j,\ldots ,x^n_j\right)\right)_{j=1}^{\infty} \in Y(F)$, proving that $T\in \mathcal{L}_{X_1,\ldots , X_n;Y}(E_1,\ldots , E_n;F)$. And using the assumption's norm inequality we get \begin{align*} \left\| \widehat{T}\left( (x^1_j)_{j=1}^{\infty},\ldots, (x^n_j)_{j=1}^{\infty}\right) \right\| &= \Vert \left(T(x^1_j,\ldots,x^n_j)\right)_{j=1}^{\infty}\Vert_{Y(F)} \\ &\leq \left\| \left( T(x^1_j,\ldots,x^n_j) \cdot e^{n-1}_j\right)_{j=1}^{\infty}\right\|_{Y\left( Z\left(\cdots Z(F)\right)\cdots\right)} \\ &= \left\| \left( \cdots \left( \left( T\left( x^1_{j_1},\ldots , x^n_{j_n}\right)\right)_{j_n\in D^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\cdots \right)_{j_1=1}^{\infty}\right\| \\ &= \left\| \widehat{T}_D\left( (x^1_j)_{j=1}^{\infty},\ldots, (x^n_j)_{j=1}^{\infty}\right) \right\|, \end{align*} which proves that $\Vert T\Vert_{X_1,\ldots , X_n;Y}\leq \Vert T\Vert_{D;X_1,\ldots,X_n;Y,Z,\ldots,Z}$.\\ {\rm (b)} Let $T\in \mathcal{L}_{X_1,\ldots,X_n;Y}(E_1,\ldots , E_n;F) $ and $(x^1_j)_{j=1}^{\infty}\in X_1(E_1), \ldots, (x^n_j)_{j=1}^{\infty}\in X_n(E_n)$ be given. Then $\left( T( x^1_j,\ldots , x^n_j) \right)_{j=1}^{\infty}\in Y(F)$, and the assumption gives \begin{align*} \left( T( x^1_j,\ldots , x^n_j) \cdot e_j^{n-1}\right)_{j=1}^{\infty}\in Y(Z(\cdots Z(F)\cdots)). \end{align*} Calling on (\ref{eeqq}) once again, \begin{align*} \left( \cdots \left( \left( T\left( x^1_{j_1},\ldots , x^n_{j_n}\right)\right)_{j_n\in D^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\cdots \right)_{j_1=1}^{\infty} \in Y(Z(\cdots Z(F)\cdots)), \end{align*} that is, $T\in \mathcal{L}_{D;X_1,\ldots,X_n;Y,Z,\ldots,Z}(E_1,\ldots , E_n;F)$. The norm inequality follows from \begin{align*} &\left\| \widehat{T}_D\left( (x^1_j)_{j=1}^{\infty},\ldots, (x^n_j)_{j=1}^{\infty}\right) \right\|\\ &= \left\| \left( \cdots \left( \left( T\left( x^1_{j_1},\ldots , x^n_{j_n}\right)\right)_{j_n\in D^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\cdots \right)_{j_1=1}^{\infty}\right\|_{Y(Z(\cdots Z(F)\cdots))} \\ &= \Vert \left( T(x^1_j,\ldots,x^n_j) \cdot e^{n-1}_j\right)_{j=1}^{\infty}\Vert_{Y\left( Z\left(\cdots Z(F)\right)\cdots\right)} \\ &\leq \Vert \left(T(x^1_j,\ldots,x^n_j)\right)_{j=1}^{\infty}\Vert_{Y(F)} = \Vert \widehat{T}\left( (x^1_j)_{j=1}^{\infty},\ldots, (x^n_j)_{j=1}^{\infty}\right) \Vert. \end{align*} \end{proof} The class we define now is somewhat folklore in the field, for explicit considerations of it, see, e.g., \cite{edinburgh, popa, souza2003aplicaccoes, botelho2017transformation, kim2007}: For $q,p_1,\ldots , q_n\in [1,\infty)$ with $\frac{1}{q}\leq \frac{1}{p_1}+\cdots +\frac{1}{p_n}$, an operator $T\in\mathcal{L}(E_1,\ldots,E_n;F)$ is said to be {\it $(q;p_1,\ldots , p_n)$-weakly summing} if it is $(\ell^w_{p_1}(\cdot), \ldots, \ell^w_{p_n}(\cdot);\ell_q^w(\cdot))$-summing according to Definition \ref{deffed}. The class of all these operators is denoted by $\mathcal{L}_{ws,(q;p_1,\ldots,p_n)}(E_1,\ldots,E_n;F)$. Every continuous multilinear operator is $(1;1, \ldots,1)$-weakly summing, but this does not hold for other parameters (see \cite[Theorem 4.3]{botelho2017transformation}). \begin{corollary} Let $q,p_1,\ldots , q_n\in [1,\infty)$ be such that $\frac{1}{q}\leq \frac{1}{p_1}+\ldots +\frac{1}{p_n}$, Then, for all Banach spaces $E_1, \ldots, E_n,F$:\\ {\rm (a)} $ \mathcal{L}_{(D; \ell^w_{p_1}(\cdot),\ldots , \ell^w_{p_n}(\cdot); \ell^w_q(\cdot),\ell_1(\cdot) ,\ldots , \ell_1(\cdot))}(E_1,\ldots,E_n;F) \stackrel{1}{\hookrightarrow} \mathcal{L}_{ws,(q;p_1,\ldots,p_n)}(E_1,\ldots,E_n;F) $.\\ {\rm (b)} $\mathcal{L}_{ws,(q;p_1,\ldots,p_n)}(E_1,\ldots,E_n;F)\stackrel{1}{\hookrightarrow} \mathcal{L}_{(D; \ell^w_{p_1}(\cdot),\ldots , \ell^w_{p_n}(\cdot); \ell^w_q(\cdot),\ell_{\infty}(\cdot) ,\ldots , \ell_{\infty}(\cdot))}(E_1,\ldots,E_n;F)$. \end{corollary} \begin{proof} {\rm (a)} Let $(y_j)_{j=1}^{\infty}$ be a sequence in $F$ such that $(y_j\cdot e_j)_{j=1}^{\infty}\in\ell_p^w(\ell_1(F))$. Denoting by $q'$ the conjugate of $q$, from \begin{align*} \Vert (y_j)_{j=1}^{\infty}\Vert_{w,p} &= \sup_{N\in\mathbb{N}}\sup_{(a_j)_{j=1}^{\infty}\in B_{\ell_{p'}}}\Big\Vert \sum_{j=1}^N a_jy_j\Big\Vert_{E} \leq \sup_{N\in\mathbb{N}}\sup_{(a_j)_{j=1}^{\infty}\in B_{\ell_{p'}}} \sum_{j=1}^N \Vert a_jy_j\Vert_{E} \\ &= \sup_{N\in\mathbb{N}}\sup_{(a_j)_{j=1}^{\infty}\in B_{\ell_{p'}}}\Big\Vert \sum_{j=1}^N a_jy_j\cdot e_j\Big\Vert_{\ell_1(E)} = \Vert (y_j\cdot e_j)_{j=1}^{\infty}\Vert_{w,p}, \end{align*} we conclude that $(y_j)_{j=1}^{\infty}\in\ell_p^w(F)$ and $\Vert (y_j)_{j=1}^{\infty}\Vert_{w,p}\leq \Vert (y_j\cdot e_j)_{j=1}^{\infty}\Vert_{w,p}$. The result follows from Theorem \ref{inclusion}(a).\\ {\rm (b)} Let $(y_j)_{j=1}^{\infty}$ be a sequence in $F$ such that $(y_j)_{j=1}^{\infty}\in \ell_p^w(F)$. From \begin{align*} \Vert (y_j\cdot e_j)_{j=1}^{\infty}\Vert_{w,p} &= \sup_{N\in\mathbb{N}}\sup_{(a_j)_{j=1}^{\infty}\in B_{\ell_{p'}}}\Big\Vert \sum_{j=1}^N a_jy_j\cdot e_j\Big\Vert_{\ell_{\infty}(F)} \\ &= \sup_{N\in\mathbb{N}}\sup_{(a_j)_{j=1}^{\infty}\in B_{\ell_{p'}}} \sup_{1\leq k\leq N}\Vert a_ky_k\Vert_F \\ &= \sup_{N\in\mathbb{N}} \sup_{1\leq k\leq N} \sup_{(a_j)_{j=1}^{\infty}\in B_{\ell_{p'}}} \Vert a_ky_k\Vert_F \\ &= \sup_{N\in\mathbb{N}} \sup_{1\leq k\leq N} \sup_{(a_j)_{j=1}^{\infty}\in B_{\ell_{p'}}} \vert a_k\vert \cdot \Vert y_k\Vert_F \\ &= \sup_{N\in\mathbb{N}} \sup_{1\leq k\leq N} \Vert y_k\Vert_F \left(\sup_{(a_j)_{j=1}^{\infty}\in B_{\ell_{p'}}} \vert a_k\vert \right)\\ &= \sup_{N\in\mathbb{N}} \sup_{1\leq k\leq N} \Vert y_k\Vert_F = \Vert (y_j)_{j=1}^{\infty}\Vert_{\ell_{\infty}(F)}\leq \Vert (y_j)_{j=1}^{\infty}\Vert_{w,p}, \end{align*} we conclude that $(y_j\cdot e_j)_{j=1}^{\infty}\in \ell_p^w(\ell_{\infty}(F))$ e $\Vert (y_j\cdot e_j)_{j=1}^{\infty}\Vert_{w,p}\leq \Vert (y_j)_{j=1}^{\infty}\Vert_{w,p}$. The result follows from Theorem \ref{inclusion}(a). \end{proof} \begin{definition}\rm A sequence class $Y$ is {\it $Z$-diagonalizable}, where $Z$ is a sequence class, if, regardless of the Banach space $F$ and the sequence $(y_j)_{j=1}^\infty$ in $Y$, \begin{align*} \left( y_j\right)_{j=1}^{\infty} \in Y(F) \Longleftrightarrow \left( y_j\cdot e_j\right)_{j=1}^{\infty} \in Y(Z(F)) \mbox{ and } \Vert \left( y_j\cdot e_j\right)_{j=1}^{\infty}\Vert_{Y(Z(F))} = \Vert \left( y_j\right)_{j=1}^{\infty} \Vert_{Y(F)}. \end{align*} \end{definition} \begin{example}\rm The sequence classes $c_0(\cdot)$, $\ell_{\infty}(\cdot)$ and $\ell_p(\cdot)$, $1 \leq p < \infty$, are $Z$-diagonalizable for every sequence class $Z$. Indeed, for any sequence class $Z$, $\Vert y\cdot e_j\Vert_{Z(F)} = \Vert y\Vert_F$ para all $y\in F$ and $j\in\mathbb{N}$. \end{example} Our general construction recovers that classes of $(X_1, \ldots, X_n;Y)$-summing operators whenever the sequence class $Y$ is diagonalizable: \begin{corollary}\label{roc} Let $X_1,\ldots,X_n$ be sequences classes and let $Y$ be a $Z$-diagonalizable sequence class. For all Banach spaces $E_1,\ldots, E_n,F$, \begin{align*} \mathcal{L}_{D;X_1,\ldots,X_n;Y,Z, \ldots,Z}(E_1,\ldots , E_n;F) \stackrel{1}{=} \mathcal{L}_{X_1,\ldots , X_n;Y}(E_1,\ldots , E_n;F). \end{align*} \end{corollary} In the next example we recover, as a particular instance of our framework, the first class of summing multilinear operators to be studied. Its definition goes back to Pietsch \cite{pietsch1983ideals} and several authors have been exploring this class since then. \begin{example}[Absolutely summing operators] \rm For $1\leq p_1,\ldots, p_n,q<\infty$ with $\frac{1}{q} \leq \frac{1}{p_1} + \cdots + \frac{1}{p_n}$, an operator $T\in\mathcal{L}(E_1,\ldots,E_n;F)$ is {\it absolutely $(q;p_1,\ldots,p_n)$-summing} if it is $(\ell^w_{p_1}(\cdot), \ldots, \ell^w_{p_n}(\cdot);\ell_q(\cdot))$-summing according to Definition \ref{deffed}. The original definition concerns finite sequences, but the equivalence we have just stated is well known. Since $\ell_q(\cdot)$ is diagonalizable, from Corollary \ref{roc} we have that, for any sequence class $Z$, a continuous multilinear operator is absolutely $(q;p_1,\ldots,p_n)$-summing if and only if it is $$(D;\ell^w_{p_1}(\cdot),\ldots , \ell^w_{p_n}(\cdot);\ell_q(\cdot),Z,\ldots,Z){\rm -summing},$$ and the corresponding summing norms coincide. \label{exe-1} \end{example} Other classes studied in the literature can be recovered using the diagonal block. We just give one more example. \begin{example}[Cotype $q$ operators] \rm Given $1 \leq q<\infty$, an operador $T\in \mathcal{L}(E_1,\ldots,E_n;F)$ has {\it cotype $q$} if there exists a constant $C> 0$ such that, for every $n$ and all $(x^1_j,\ldots x^n_j) \in E_1\times\ldots\times E_n$, $j=1,\ldots,m$, \begin{align*} \Big\Vert \left( T(x^1_j,\ldots,x^n_j)\right)_{j=1}^m \Big\Vert_q \leq C\prod_{k=1}^n\Vert (x^k_j)_{j=1}^m\Vert_{Rad(E)}. \end{align*} The infimum of the constants $C$ defines a complete norm on the class $\mathcal{C}^n_q(E_1,\ldots,E_n;F)$ of all $n$-linear operators from $E_1\times\ldots\times E_n$ to $F$ having cotype $q$. Bearing the notation of Definition \ref{deffed} in mind, in \cite[Theorem 2.6]{botelho2016type} it is proved that $$\mathcal{C}^n_q(E_1,\ldots,E_n;F) \stackrel{1}{=} \mathcal{L}_{Rad(\cdot),\ldots , Rad(\cdot); \ell_q(\cdot)}(E_1,\ldots,E_n;F).$$ Since $\ell_q(\cdot)$ is $Z$-diagonalizable for every sequence class $Z$, Corollary \ref{roc} gives \begin{align*} \mathcal{C}^n_q(E_1,\ldots,E_n;F) \stackrel{1}{=} \mathcal{L}_{D;Rad(\cdot),\ldots , Rad(\cdot); \ell_q(\cdot),Z,\ldots,Z}(E_1,\ldots,E_n;F), \end{align*} for every sequence class $Z$. \end{example} \subsection{Multiple summing operators} In this subsection we consider the block $\mathbb{N}^n$, that is, the whole matrix. In this case, $$(\mathbb{N}^{n})^{j_1,\ldots,j_{n-1}} = \mathbb{N} {\rm ~for~all~} j_1,\ldots , j_{n-1}\in\mathbb{N}.$$ Since we are summing in all indices, in this case we can consider the isotropic and the anisotropic cases. Let us consider the anisotropic case first, from which the isotropic case will follow. The next class was studied in \cite{nacibarXiv2019, annfunctanal, albuquerque2014summability, nacibjfa, araujo2016some}. \begin{example}\rm For $1\leq p_1,\ldots,p_n,q_1, \ldots, q_n <\infty$ with $p_k\leq q_k$, $k = 1, \ldots, n$, an operator $T\in\mathcal{L}(E_1,\ldots, E_n;F)$ is {\it multiple $(q_1, \ldots, q_n; p_1, \ldots, p_n)$-summing} if the following implication holds: $(x_j^{(k)})_{j=1}^\infty \in \ell^w_{p_k}(E_k), \,k=1, \ldots, n \Longrightarrow $ $$\sum_{j_1=1}^{\infty} \left(\sum_{j_2=1}^{\infty} \cdots \left( \sum_{j_n=1}^{\infty} \Vert T(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)}) \Vert_{F}^{q_n} \right)^{\frac{q_{n-1}}{q_n}} \cdots\right)^{\frac{q_1}{q_2}} < \infty. $$ Choosing $X_k = \ell_{p_k}^w(\cdot)$ and $Y_k = \ell_{q_k}(\cdot)$ $k=1,\ldots, n$, an operator $T\in\mathcal{L}(E_1,\ldots, E_n;F)$ is $(\mathbb{N}^{n};X_1,\ldots,X_n;Y_1,\ldots,Y_n)$-summing if, for all sequences $(x_{j_1}^{(1)})_{j_1=1}^{\infty}\in X_1(E_1),\ldots, (x_{j_n}^{(n)})_{j_2=1}^{\infty}\in X_n(E_n)$ it holds \begin{align*} \left(\cdots\left(\left( T\left(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)}\right)\right)_{j_n\in (\mathbb{N}^{n})^{j_1, \ldots, j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\cdots\right)_{j_1=1}^{\infty} = \\ =\left(\cdots\left(\left( T\left(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)}\right)\right)_{j_n =1}^{\infty}\right)_{j_{n-1}=1}^{\infty}\cdots\right)_{j_1=1}^{\infty} \in Y_1(\cdots Y_n(F)\cdots) , \end{align*} what happens if and only if \begin{align*} \infty &> \Big\Vert \left(\cdots \left( T\left(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)}\right)\right)_{j_n =1}^{\infty} \cdots\right)_{j_1=1}^{\infty} \Big\Vert_{Y_1(\cdots Y_n(F)\cdots)} \\ &= \Big\Vert \left(\cdots \left( T\left(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)}\right)\right)_{j_n =1}^{\infty} \cdots\right)_{j_1=1}^{\infty} \Big\Vert_{\ell_{q_1}(\cdots \ell_{q_n}(F)\cdots)} \\ &= \left( \sum_{j_1=1}^{\infty} \Big\Vert \left(\cdots \left( T\left(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)}\right)\right)_{j_n =1}^{\infty}\cdots\right)_{j_2=1}^{\infty} \Big\Vert_{\ell_{q_2}(\cdots \ell_{q_n}(F)\cdots)}^{q_1} \right)^{\frac{1}{{q_1}}} \\ &= \left( \sum_{j_1=1}^{\infty} \left( \left(\sum_{j_2=1}^{\infty} \Big\Vert \left(\cdots \left( T\left(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)}\right)\right)_{j_n =1}^{\infty}\cdots\right)_{j_3=1}^{\infty} \Big\Vert_{\ell_{q_3}(\cdots \ell_{q_n}(F)\cdots)}^{q_2} \right)^{\frac{1}{q_2}} \right)^{q_1} \right)^{\frac{1}{{q_1}}} \\ &= \left( \sum_{j_1=1}^{\infty} \left(\sum_{j_2=1}^{\infty} \Big\Vert \left(\cdots \left( T\left(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)}\right)\right)_{j_n =1}^{\infty}\cdots\right)_{j_3=1}^{\infty} \Big\Vert_{\ell_{q_3}(\cdots \ell_{q_n}(F)\cdots)}^{q_2} \right)^{\frac{q_1}{q_2}} \right)^{\frac{1}{{q_1}}} = \cdots\\ &= \left( \sum_{j_1=1}^{\infty} \left(\sum_{j_2=1}^{\infty} \cdots \left( \sum_{j_n=1}^{\infty} \Vert T(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)}) \Vert_{F}^{q_n} \right)^{\frac{q_{n-1}}{q_n}} \cdots\right)^{\frac{q_1}{q_2}} \right)^{\frac{1}{{q_1}}}. \end{align*} Therefore, $T\in\mathcal{L}(E_1,\ldots,E_n;F)$ is multiple $(q_1, \ldots, q_n;p_1,\ldots,p_n)$-summing if and only if $T$ is $(\mathbb{N}^{n};X_1,\ldots,X_n;Y_1,\ldots,Y_n)$-summing. \end{example} Turning to the isotropic case, we now recover the celebrated class of multiple summing multilinear operators (see the Introduction), which was introduced, independently, by Matos \cite{matos2003fully} and Bombal, Villanueva and P\'erez-Garc\'ia \cite{bombal2004multilinear}. \begin{example}\rm For $1\leq p_1,\ldots,p_n,q<\infty$ with $q\geq p_k$, $k = 1, \ldots, n$, an operator $T\in\mathcal{L}(E_1,\ldots, E_n;F)$ is {\it multiple $(q; p_1, \ldots, p_n)$-summing} if the following implication holds: $$(x_j^{(k)})_{j=1}^\infty \in \ell^w_{p_k}(E_k), \,k=1, \ldots, n \Longrightarrow \sum_{j_1,\ldots,j_n=1}^{\infty} \Vert T(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)})\Vert_{F}^q < \infty. $$ According to the previous example, it is clear that $T$ is multiple $(q; p_1, \ldots, p_n)$-summing if and only if it is multiple $(q,\ldots, q; p_1, \ldots, p_n)$-summing. So, choosing $X_k = \ell_{p_k}^w(\cdot)$, $k=1,\ldots, n$, and $Y = \ell_q(\cdot)$, an operator $T\in\mathcal{L}(E_1,\ldots, E_n;F)$ is multiple $(q;p_1,\ldots,p_n)$-summing if and only if $T$ is $(\mathbb{N}^{n};X_1,\ldots,X_n;Y,\ldots,Y)$-summing. \label{exe-2} \end{example} \subsection{Multiple summing operators with respect to partitions} The anisotropic class we study in this subsection, which was introduced in \cite{araujo2016some} and developed in \cite{annfunctanal, nacibarXiv2019}, is interesting only for $n \geq 3$, for in the bilinear case it collapses either to the diagonal case or to the multiple summing case. Next we show that its trilinear case is a particular case of our general approach. \begin{example} \rm Let $\mathcal{I}=\{I_1,I_2\}$ be the partition of $\{1,2,3\}$ where $I_1=\{1,2\}$ and $I_2 = \{3\}$, and let $p_1,p_2, p_3, q_1,q_2 \in [ 1,\infty)$ be such that $\frac{1}{q_k}\leq \sum\limits_{i\in I_k}\frac{1}{p_i}$, $k=1,2$. Instead of the defintion (see, e.g., \cite[Definition 5.12]{araujo2016some}), we shall use the characterization proved in \cite[Proposition 5.14]{araujo2016some}: an operator $T\in\mathcal{L}(E_1,E_2,E_3;F)$ is {\it partially $\cal I$-$(p_1, p_2,p_3;q_1,q_2)$-summing} if and only if $$\left(\sum_{j_1=1}^{\infty}\left(\sum_{j_2=1}^{\infty} \Big\Vert T\left( \sum_{k=1}^2 \sum_{i\in I_k} x_{j_k}^{(i)}\cdot e_i \right) \Big\Vert_{F}^{q_2}\right)^{\frac{q_1}{q_2}}\right)^{\frac{1}{q_1}}< \infty $$ for all sequences $(x_{j_k}^{(k)})_{j_k=1}^{\infty}\in \ell_{p_k}^w(E_k)$, $k=1,2,3$. Choosing $X_1 = \ell_{p_1}^w(\cdot)$, $X_2 = \ell_{p_2}^w(\cdot)$, $X_3 = \ell_{p_3}^w(\cdot)$, $Y_1 = \ell_{q_1}(\cdot)$, $Y_2 = \ell_{q_2}(\cdot)$, $Y_3 = \ell_{\infty}(\cdot)$, and the block $B = \{(j_1,j_2,j_3)\in\mathbb{N}^3: j_1=j_2\}$, we have, for all $j_1, j_2 \in \mathbb{N}$ \begin{align*} B^{j_1,j_2} &= \{ j_3\in\mathbb{N} : (j_1,j_2,j_3)\in B \} =\begin{cases} \emptyset,& \mbox{ se } j_1\neq j_2 \\ \mathbb{N}, & \mbox{ se } j_1= j_2. \end{cases} \end{align*} So, an operator $T\in\mathcal{L}(E_1,E_2,E_3;F)$ is $(B;X_1,X_2,X_3;Y_1,Y_2,Y_3)$-summing if, given sequences $(x_{j_k}^{(k)})_{j_k=1}^{\infty}\in X_k(E_k)$, $k=1,2,3$, it holds \begin{align*} \left(\left(\left(T(x_{j_1}^{(1)},x_{j_2}^{(2)},x_{j_3}^{(3)})\right)_{j_3\in B^{j_1,j_2}}\right)_{j_2=1}^{\infty}\right)_{j_1=1}^{\infty} \in \ell_{\infty}\left(\ell_{q_1}\left(\ell_{q_2}(F)\right)\right), \end{align*} what happens if and only if \begin{align*} \infty &> \sup_{j_1\in\mathbb{N}}\Big\Vert\left(\left(T(x_{j_1}^{(1)},x_{j_2}^{(2)},x_{j_3}^{(3)})\right)_{j_3 \in B^{j_1,j_2}} \right)_{j_2=1}^{\infty} \Big\Vert_{\ell_{q_1}\left(\ell_{q_2}(F)\right)} \\ &= \sup_{j_1\in\mathbb{N}}\left(\sum_{j_2=1}^{\infty}\Big\Vert\left(T(x_{j_1}^{(1)},x_{j_2}^{(2)},x_{j_3}^{(3)})\right)_{j_3\in B^{j_1,j_2}}\Big\Vert_{\ell_{q_2}(F)}^{q_1}\right)^{\frac{1}{q_1}} \\ &= \left(\sum_{j_2=1}^{\infty}\Big\Vert\left(T(x_{j_2}^{(1)},x_{j_2}^{(2)},x_{j_3}^{(3)})\right)_{j_3\in B^{j_2,j_2}}\Big\Vert_{\ell_{q_2}(F)}^{q_1}\right)^{\frac{1}{q_1}} \\ &= \left(\sum_{j_2=1}^{\infty}\Big\Vert\left(T(x_{j_2}^{(1)},x_{j_2}^{(2)},x_{j_3}^{(3)})\right)_{j_3=1}^{\infty}\Big\Vert_{\ell_{q_2}(F)}^{q_1}\right)^{\frac{1}{q_1}} \\ &= \left(\sum_{j_2=1}^{\infty}\left(\sum_{j_3=1}^{\infty} \Big\Vert T(x_{j_2}^{(1)},x_{j_2}^{(2)},x_{j_3}^{(3)})\Big\Vert_{F}^{q_2}\right)^{\frac{q_1}{q_2}}\right)^{\frac{1}{q_1}} \\ &= \left(\sum_{j_1=1}^{\infty}\left(\sum_{j_2=1}^{\infty} \Big\Vert T(x_{j_1}^{(1)},x_{j_1}^{(2)},x_{j_2}^{(3)})\Big\Vert_{F}^{q_2}\right)^{\frac{q_1}{q_2}}\right)^{\frac{1}{q_1}}\\ &= \left(\sum_{j_1=1}^{\infty}\left(\sum_{j_2=1}^{\infty} \Big\Vert T\left( x_{j_1}^{(1)}\cdot e_1+x_{j_1}^{(2)}\cdot e_2 + x_{j_2}^{(3)} \cdot e_3 \right) \Big\Vert_{F}^{q_2}\right)^{\frac{q_1}{q_2}}\right)^{\frac{1}{q_1}}\\ &= \left(\sum_{j_1=1}^{\infty}\left(\sum_{j_2=1}^{\infty} \Big\Vert T\left( \sum_{i\in\{1,2\}} x_{j_1}^{(i)}\cdot e_i+\sum_{i\in\{3\}} x_{j_2}^{(i)} \cdot e_i \right) \Big\Vert_{F}^{q_2}\right)^{\frac{q_1}{q_2}}\right)^{\frac{1}{q_1}}\\ &=\left(\sum_{j_1=1}^{\infty}\left(\sum_{j_2=1}^{\infty} \Big\Vert T\left( \sum_{k=1}^2 \sum_{i\in I_k} x_{j_k}^{(i)}\cdot e_i \right) \Big\Vert_{F}^{q_2}\right)^{\frac{q_1}{q_2}}\right)^{\frac{1}{q_1}}. \end{align*} This proves that $T$ is $(B;X_1,X_2,X_3;Y_1,Y_2,Y_3)$-summing if and only if it is partially $\cal I$-$(p_1, p_2,p_3;q_1,q_2)$-summing. \end{example} \section{Banach multi-ideals} In this section we prove that the classes of multilinear operators introduced in Definition \ref{def-1} enjoy good properties. Throughout this section, $X_1,\ldots, X_n$, $Y_1,\ldots, Y_n$ are sequence classes, $B \subseteq \mathbb{N}^n$ is a nonvoid block and $E_1, \ldots, E_n,F$ are Banach spaces. \begin{proposition}\label{prop.2} If $T\in\mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;F)$ then \begin{align*} \Vert T\Vert \leq \Vert T\Vert_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}. \end{align*} \end{proposition} \begin{proof}Let $(x^{(1)},\ldots,x^{(n)})\in E_1\times\cdots\times E_n$ and $(j_1',\ldots,j_n')\in B$ be given. Consider the sequences $(x_j^{(k)})_{j=1}^{\infty}:= x^{(k)}\cdot e_{j_k'}\in X_k(E_k)$, $k=1,\ldots, n$. In this fashion, \begin{align*} &\left\| \widehat{T}\left( (x_{j}^{(1)} )_{j=1}^{\infty},\ldots,(x_{j}^{(n)} )_{j=1}^{\infty} \right)\right\|_{\mathbf{Y}_n(F)}= \\ &= \left\| \left(\ldots\left(\left( T\left( x_{j_1}^{(1)}, \ldots , x_{j_n}^{(n)}\right)\right)_{j_n\in B^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\ldots\right)_{j_1=1}^{\infty}\right\|_{Y_1(\cdots(Y_n(F))\cdots)}\\ &= \left\| \left(\ldots\left(\left( T\left( x_{j_1'}^{(1)}, \ldots , x_{j_n}^{(n)}\right)\right)_{j_n\in B^{j_1',\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\ldots\right)_{j_2=1}^{\infty}\cdot e_{j_1'} \right\|_{Y_1(\cdots(Y_n(F))\cdots)} \\ &= \left\| T\left( x_{j_1'}^{(1)}, \ldots, x_{j_n'}^{(n)}\right)\cdot e_{j_{n}'}\cdot\ldots\cdot e_{j_2'}\cdot e_{j_1'} \right\|_{Y_1(\cdots(Y_n(F))\cdots)} \\ &= \left\| T\left( x_{j_1'}^{(1)},\ldots,x_{j_n'}^{(n)}\right) \right\|_{F}= \Vert T\left( x^{(1)},\ldots,x^{(n)}\right) \Vert_{F}. \end{align*} The continuity of $\widehat{T}_B$ gives \begin{align*} \Vert T\left( x^{(1)},\ldots,x^{(n)}\right) \Vert_{F} &= \left\| \widehat{T}\left( (x_{j}^{(1)} )_{j=1}^{\infty},\ldots,(x_{j}^{(n)} )_{j=1}^{\infty} \right)\right\|_{\mathbf{Y}_n(F)} \\ &\leq \Vert \widehat{T}_B \Vert \cdot \prod_{k=1}^{(n)}\Vert (x_{j}^{k})_{j=1}^{\infty} \Vert_{X_k(E_k)} \\ &= \Vert T\Vert_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n} \cdot \prod_{k=1}^{(n)}\Vert x^k \Vert_{E_k}, \end{align*} and the result follows. \end{proof} We omit the proof that, regardless of the sequence classes $X_1$, $\ldots$, $X_n$, $Y_1$, $\ldots$, $Y_n$, $\mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;F)$ is a linear subspace of $\mathcal{L}(E_1,\ldots,E_n;F)$ on which $\Vert\cdot\Vert_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}$ is a norm. \begin{proposition} $(\mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;F), \Vert\cdot\Vert_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n})$ is a Banach space. \end{proposition} \begin{proof} The case $n=2$ is illustrative. The operator $$ T \in \mathcal{L}_{B;X_1,X_2;Y_1,Y_2}(E_1,E_2;F) \mapsto \widehat{T}_B \in\mathcal{L}(X_1(E_1),X_2(E_2);Y_1(Y_2(F)))$$ is a linear isometric embedding into a Banach space. So is it enough to show that its range is closed. To do so, let $(T_j)_{j=1}^\infty$ be a sequence in $ \mathcal{L}_{B;X_1,X_2;Y_1,Y_2}(E_1,E_2;F)$ such that $\widehat{T_j}_B \longrightarrow S$ in $\mathcal{L}(X_1(E_1),X_2(E_2);Y_1(Y_2(F)))$. By Proposition \ref{prop.2}, $$\|T_j - T_k\| \leq \|T_j - T_k\|_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}= \|\widehat{T_j}_B - \widehat{T_k}_B\|, $$ so there is $T \in \mathcal{L}(E_1,E_2;F)$ such that \begin{equation}\label{conv}T_j \longrightarrow T {\rm ~in~}\mathcal{L}(E_1,E_2;F). \end{equation} Given $(x_{j})_{j=1}^{\infty}\in X_1(E_1)$ and $(y_{j})_{j=1}^{\infty}\in X_2(E_2)$, we wish to prove that \begin{align*} S\left((x_{j})_{j=1}^{\infty},(x_{j})_{j=1}^{\infty}\right) = \left( \left( T\left( x_{j_1},y_{j_2}\right)\right)_{j_2\in B^{j_1}}\right)_{j_1=1}^{\infty}, \end{align*} that is, for any pair of indices $j_1,j_2\in\mathbb{N}$, \begin{align*} (P_{2,j_2}\circ P_{1,j_1})\left( S\left((x_{j})_{j=1}^{\infty},(x_{j})_{j=1}^{\infty}\right) \right) &= (P_{2,j_2}\circ P_{1,j_1})\left( \left( \left( T\left( x_{j_1},y_{j_2}\right)\right)_{j_2\in B^{j_1}}\right)_{j_1=1}^{\infty} \right)\\ &=P_{2,j_2}\left( \left( T\left( x_{j_1},y_{j_2}\right)\right)_{j_2\in B^{j_1}} \right), \end{align*} where $P_{2,j_2}$ and $P_{1,j_1}$ are the projections of the proof of Proposition \ref{prop-1}. If $j_1$ is such that $B^{j_1}=\emptyset$ we have, by definition, that \begin{align*} P_{2,j_2}\left( \left( T\left( x_{j_1},y_{j_2}\right)\right)_{j_2\in B^{j_1}} \right) = 0 {\rm ~for~every~} j_2\in\mathbb{N}. \end{align*} From $P_{2,j_2}\circ P_{1,j_1}\left( \widehat{T}_{B,j}\left((x_{k})_{k=1}^{\infty},(y_{k})_{k=1}^{\infty}\right) \right) = 0$ for every $j_2\in B^{j_1}$ and every $j\in\mathbb{N}$, the convergence $\widehat{T_j}_B \longrightarrow S$ gives \begin{align*} P_{2,j_2}\circ P_{1,j_1}\left( \widehat{T}_{B,j}\left((x_{k})_{k=1}^{\infty},(y_{k})_{k=1}^{\infty}\right) \right) \stackrel{j}{\longrightarrow} P_{2,j_2}\circ P_{1,j_1}\left( S\left((x_{k})_{k=1}^{\infty},(y_{k})_{k=1}^{\infty}\right) \right) \end{align*} for every $ j_2\in \mathbb{N}$. Then $P_{2,j_2}\circ P_{1,j_1}\left( S\left((x_{j})_{j=1}^{\infty},(x_{j})_{j=1}^{\infty}\right) \right) = 0$ for every $j_2$ and for every $j_1$ such that $B^{j_1}=\emptyset$, that is, for those $j_1$ and $j_2$, $$P_{2,j_2}\circ P_{1,j_1}\left( S\left((x_{j})_{j=1}^{\infty},(x_{j})_{j=1}^{\infty}\right) \right) = P_{2,j_2}\circ P_{1,j_1}\left( \left( \left( T\left( x_{j_1},y_{j_2}\right)\right)_{j_2\in B^{j_1}}\right)_{j_1=1}^{\infty} \right).$$ On the other hand, for $j_1$ such that $B^{j_1}\neq \emptyset$, from \eqref{conv} it follows that \begin{align*} T_j(x_{j_1},y_{j_2}) \stackrel{j}{\longrightarrow} T(x_{j_1},y_{j_2}) {\rm ~for~every~} j_2\in\mathbb{N}. \end{align*} Calling on the convergence $\widehat{T_j}_B \longrightarrow S$ once again, we get $$T_j(x_{j_1},y_{j_2}) = P_{2,j_2}\circ P_{1,j_1}\left( \widehat{T}_{B,j}\left((x_{k})_{k=1}^{\infty},(y_{k})_{k=1}^{\infty}\right) \right) \stackrel{j}{\longrightarrow} P_{2,j_2}\circ P_{1,j_1}\left( S\left((x_{k})_{k=1}^{\infty},(y_{k})_{k=1}^{\infty}\right) \right)$$ for every $j_2\in B^{j_1}$. So, \begin{align*} T(x_{j_1},y_{j_2}) = P_{2,j_2}\circ P_{1,j_1}\left( S\left((x_{j})_{j=1}^{\infty},(x_{j})_{j=1}^{\infty}\right) \right) {\rm ~for~every~} j_2\in B^{j_1}, \end{align*} from which it follows that \begin{align*} P_{2,j_2}\circ P_{1,j_1}\left( \left( \left( T\left( x_{j_1},y_{j_2}\right)\right)_{j_2\in B^{j_1}}\right)_{j_1=1}^{\infty} \right) &= T(x_{j_1},y_{j_2})\\ &= P_{2,j_2}\circ P_{1,j_1}\left( S\left((x_{j})_{j=1}^{\infty},(y_{j})_{j=1}^{\infty}\right) \right), \end{align*} proving that $\left( \left( T\left( x_{j_1},y_{j_2}\right)\right)_{j_2\in B^{j_1}}\right)_{j_1=1}^{\infty}\in Y_1(Y_2(F))$, that is, $T\in \mathcal{L}_{B;X_1,X_2;Y_1,Y_2}(E_1,E_2;F)$. The reasoning above also shows that $\widehat{T}_B=S$, completing the proof. \end{proof} \begin{proposition} Let $X_1,\ldots, X_n$, $Y_1,\ldots, Y_n$ be linearly stable sequence classes. If $T\in\mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;F)$, $u_k\in\mathcal{L}(G_k;E_k)$, $k=1,\ldots,n$, and $v\in\mathcal{L}(F;H)$, then \begin{align*} v\circ T\circ(u_1,\ldots,u_n)\in\mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(G_1,\ldots,G_n;H){\rm ~and} \end{align*} \begin{align*} \Vert v \circ T\circ (u_1,\ldots,u_n)\Vert_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}\leq\Vert v\Vert\cdot \Vert T\Vert_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}\cdot \prod_{k=1}^{n}\Vert u_k\Vert. \end{align*} \label{prop.3} \end{proposition} \begin{proof} Let $(x_{j}^k)_{j=1}^{\infty}\in X_k(G_k)$, $k=1,\ldots,n$. The linear stability of the sequence classes $X_1, \ldots, X_k$ gives $(u_k(x_{j}))_{j=1}^{\infty}\in X_k(E_k)$. As $T\in\mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;F)$, we have \begin{align*} \left(\ldots\left( \left( T(u_1,\ldots, u_n)(x_{j_1}^{(1)},\ldots,x_{j_n}^{(n)}) \right)_{j_n\in B^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\ldots\right)_{j_1=1}^{\infty} &= \\ =\left(\ldots\left( \left( T(u_1(x_{j_1}),\ldots, u_n(x_{j_n})) \right)_{j_n\in B^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\ldots\right)_{j_1=1}^{\infty} \in \mathbf{Y}_n(F), \end{align*} proving that $T\circ(u_1,\ldots, u_n)\in\mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(G_1,\ldots,G_n;F)$. We prove the other composition in the bilinear case $n=2$ and point out that the general case is analogous. Since $v\colon F\longrightarrow H$ is continuous and $Y_2$ is linearly stable, the operator $\tilde{v} \colon Y_2(F) \longrightarrow Y_2(H)$ induced by $v$ is well defined, linear and continuous. But $Y_1$ is linearly stable as well, so the operator $\widehat{\tilde{v}}\colon Y_1(Y_2(F))\longrightarrow Y_1(Y_2(H))$ induced by $\tilde{v}$ is well defined, linear and continuous. For simplicity, we denote $\widehat{v}:= \widehat{\tilde{v}}$. Given $((z_{j_1,j_2})_{j_2=1}^{\infty})_{j_1=1}^{\infty}\in Y_1(Y_2(F))$, \begin{align*} \left( (v(z_{j_1,j_2}))_{j_2=1}^{\infty} \right)_{j_1=1}^{\infty} &= \left( \tilde{v} ((z_{j_1,j_2})_{j_2=1}^{\infty} \right)_{j_1=1}^{\infty} \\ &= \widehat{v}\left(((z_{j_1,j_2})_{j_2=1}^{\infty})_{j_1=1}^{\infty}\right) \in Y_1(Y_2(H)). \end{align*} Given $(x_{j_1})_{j_1=1}\in X_1(E_1)$ and $(y_{j_2})_{j_2=1}\in X_2(E_2)$, as $T$ is $(B;X_1,X_2;Y_1,Y_2)$-summing, we have $\left( \left( T(x_{j_1},y_{j_2}) \right)_{j_2\in B^{j_1}}\right)_{j_1=1}^{\infty} \in Y_1(Y_2(F))$, from which it follows that \begin{align*} \left( \left( v\circ T(x_{j_1},y_{j_2}) \right)_{j_2\in B^{j_1}}\right)_{j_1=1}^{\infty} = \widehat{v}\left( \left( \left( T(x_{j_1},y_{j_2}) \right)_{j_2\in B^{j_1}}\right)_{j_1=1}^{\infty} \right) \in Y_1(Y_2(H)), \end{align*} establishing that $v\circ T\in \mathcal{L}_{B;X_1,X_2;Y_1,Y_2}(E_1,E_2;H)$. To finish the proof, denote by $\widehat{u_k}\colon X_k(G_k) \longrightarrow X_k(E_k)$ the operator induced by $u_k$, by $$(v\circ T\circ (u_1,\ldots,u_n))^{\wedge} \colon X_1(G_1) \times \cdots \times X_n(G_n) \longrightarrow \mathbf{Y}_n(H)$$ the operator induced by $v\circ T \circ(u_1,\ldots,u_n)$, and by $\widehat{v}\colon \mathbf{Y}_n(F)\longrightarrow \mathbf{Y}_n(H)$ the operator induced by $v$. For $(x_{j}^k)_{j=1}^{\infty}\in X_k(G_k)$, $k=1,\ldots,n$, \begin{align*} (v\circ T\circ (u_1,\ldots,u_n))^{\wedge}\left((x_j^{(1)})_{j=1}^{\infty},\ldots, (x_j^{(n)})_{j=1}^{\infty} \right) = \\ =\widehat{v}\circ \widehat{T}\circ(\widehat{u_1},\ldots , \widehat{u_n})\left((x_j^{(1)})_{j=1}^{\infty},\ldots, (x_j^{(n)})_{j=1}^{\infty} \right), \end{align*} therefore \begin{align*} \Vert v\circ T\circ(u_1,\ldots,u_n))&\Vert_{B;X_1,\ldots, X_n;Y_1,\ldots,Y_n} =\Vert (v\circ T\circ(u_1,\cdots,u_n))^{\wedge}\Vert= \Vert \widehat{v}\circ \widehat{T}\circ(\widehat{u_1},\ldots , \widehat{u_n})\Vert\\ &\leq \Vert\widehat{v}\Vert \cdot\Vert \widehat{T}\Vert\cdot \prod_{k=1}^{n}\Vert\widehat{ u_k}\Vert = \Vert v\Vert \cdot\Vert T\Vert_{B;X_1,\ldots, X_n;Y_1,\ldots,Y_n} \cdot \prod_{k=1}^{n}\Vert u_k\Vert, \end{align*} becuase $\Vert\widehat{v}\Vert=\Vert v\Vert$ and $\Vert\widehat{u}_k\Vert=\Vert u_k\Vert$, $k=1,\ldots,n$, due to the linear stability of the underlying sequence classes \end{proof} \begin{definition}\rm The $2n$-tuple $(X_1,\ldots,X_n,Y_1,\ldots,Y_n)$ of sequence classes is {\it $B$-compatible} if, for all scalar sequences $(\lambda^k_j)_{j=1}^{\infty}\in X_k(\mathbb{K})$, $k=1,\ldots,n$, it holds \begin{align*} (\cdots((\lambda^{(1)}_{j_1}\cdots\lambda^{(n)}_{j_n})_{j_n\in B^{j_1,\ldots,j_{n-1}}})_{j_{n-1}=1}^{\infty}\cdots)_{j_1=1}^{\infty}\in\mathbf{Y}_n(\mathbb{K}) \end{align*} and \begin{align*} \left\| (\cdots((\lambda^{(1)}_{j_1}\cdots\lambda^{(n)}_{j_n})_{j_n\in B^{j_1,\ldots,j_{n-1}}})_{j_{n-1}=1}^{\infty}\cdots)_{j_1=1}^{\infty}\right\|_{\mathbf{Y}_n(\mathbb{K})} \leq\prod_{k=1}^{n}\Vert(\lambda^k_j)_{j=1}^{\infty}\Vert_{X_k(\mathbb{K})}. \end{align*} \end{definition} \begin{examples}\rm (a) For $1\leq p_1\leq q_1<\infty$ and $1\leq p_2\leq q_2<\infty$, let us see that $(\ell_{p_1}(\cdot),\ell_{p_2}(\cdot),\ell_{q_1}(\cdot),\ell_{q_2}(\cdot))$ is $B$-compatible for any block $B \subseteq\mathbb{N}^{2}$. Let $(\lambda^{(1)}_j)_{j=1}^{\infty}\in \ell_{p_1}$ and $(\lambda^{(2)}_j)_{j=1}^{\infty}\in \ell_{p_2}$. For every $j_1\in\mathbb{N}$ the sequence $(\lambda^{(1)}_{j_1}\lambda^{(2)}_{j_2})_{j_2\in B^{j_1}}\in \ell_{q_2}$ because \begin{align*} \sum_{j_2\in B^{j_1}} \vert \lambda^{(1)}_{j_1}\lambda^{(2)}_{j_2} \vert^{q_2} \leq \sum_{j_2=1}^{\infty} \vert \lambda^{(1)}_{j_1}\lambda^{(2)}_{j_2} \vert^{q_2} <\infty, \end{align*} and, furthermore, $\left\| (\lambda^{(1)}_{j_1}\lambda^{(2)}_{j_2})_{j_2\in B^{j_1}}\right\|_{q_2}\leq \left\| (\lambda^{(1)}_{j_1}\lambda^{(2)}_{j_2})_{j_2=1}^{\infty}\right\|_{q_2}$. Hence \begin{align*} \sum_{j_1=1}^{\infty}\left\| (\lambda^{(1)}_{j_1}\lambda^{(2)}_{j_2})_{j_2\in B^{j_1}}\right\|_{{q_2}}^{q_1} &= \sum_{j_1=1}^{\infty}\vert\lambda^{(1)}_{j_1}\vert^{q_1}\cdot\left\| (\lambda^{(2)}_{j_2})_{j_2\in B^{j_1}}\right\|_{{q_2}}^{q_1}= \sum_{j_1=1}^{\infty}\vert\lambda^{(1)}_{j_1}\vert^{q_1}\cdot\left( \sum_{j_2\in B^{j_1}}\vert \lambda^{(2)}_{j_2}\vert^{q_2}\right)^{\frac{q_1}{q_2}}\\ &\leq \sum_{j_1=1}^{\infty}\vert\lambda^{(1)}_{j_1}\vert^{q_1}\cdot\left( \sum_{j_2=1}^{\infty}\vert \lambda^{(2)}_{j_2}\vert^{q_2}\right)^{\frac{q_1}{q_2}}<\infty, \end{align*} that is, $\left((\lambda^{(1)}_{j_1}\lambda^{(2)}_{j_2})_{j_2\in B^{j_1}}\right)_{j_1=1}^{\infty}\in \ell_{q_1}(\ell_{q_2})$, and \begin{align*} \left\| ((\lambda^{(1)}_{j_1}\lambda^{(2)}_{j_2})_{j_2\in B^{j_1}})_{j_1=1}^{\infty} \right\|_{\ell_{q_1}(\ell_{q_2})}&=\left( \sum_{j_1=1}^{\infty}\left\| (\lambda^{(1)}_{j_1}\lambda^{(2)}_{j_2})_{j_2\in B^{j_1}}\right\|_{{q_2}}^{q_1}\right)^{\frac{1}{q_1}}\\ &\leq \left( \sum_{j_1=1}^{\infty}\vert\lambda^{(1)}_{j_1}\vert^{q_1}\cdot\left( \sum_{j_2=1}^{\infty}\vert \lambda^{(2)}_{j_2}\vert^{q_2}\right)^{\frac{q_1}{q_2}}\right)^{\frac{1}{q_1}}\\ &=\left( \sum_{j_1=1}^{\infty}\vert\lambda^{(1)}_{j_1}\vert^{q_1}\right)^{\frac{1}{q_1}}\cdot\left( \sum_{j_2=1}^{\infty}\vert \lambda^{(2)}_{j_2}\vert^{q_2}\right)^{\frac{1}{q_2}}\\ &\leq \Vert(\lambda^{(1)}_j)_{j=1}^{\infty}\Vert_{p_1}\cdot\Vert( \lambda^{(2)}_j )_{j=1}^{\infty} \Vert_{p_2}. \end{align*} For $1 \leq p_j < q_j < \infty$, $j = 1, \ldots, n$, and sequences classes $X_1, \ldots, X_n, Y_1, \ldots, Y_n$ such that $X_j(\mathbb{K}) = \ell_{p_j}$ and $Y_j(\mathbb{K}) = \ell_{q_j}$, the $2n$-tuple $(X_1, \ldots, X_n, Y_1, \ldots, Y_n)$ is $B$-compatible for any block $B \subseteq \mathbb{N}^n$.\\ (b) A similar reasoning shows that, for $1\leq p_1, p_2,q < \infty$ with $p_1\leq q$, the 4-tuple $(X_1, X_2, Y_1, \ell_\infty)$ is $B$-compatible, for any block $B\subseteq\mathbb{N}^{2}$, whenever $X_1 = \ell_{p_1}(\cdot)$ or $\ell_{p_1}^w(\cdot)$, $X_2 = \ell_{p_2}(\cdot)$ or $\ell_{p_2}^w(\cdot)$ and $Y_1 = \ell_{q}(\cdot)$ or $\ell_{q}^w(\cdot)$. \end{examples} \begin{proposition} Let $X_1$, $\ldots$, $X_n$, $Y_1$, $\ldots$, $Y_n$ be linearly stable sequence classes such that $(X_1,\ldots,X_n,Y_1,\ldots,Y_n)$ is $B$-compatible. Then $\mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;F)$ contains the $n$-linear operators of finite type and \begin{align*} \Vert \varphi_1\otimes\cdots\otimes \varphi_n\otimes b\Vert_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n} = \Vert b\Vert\cdot\prod_{k=1}^{n}\Vert \varphi_k\Vert \end{align*} for all $\varphi_k \in E_k'$, $k = 1, \ldots, n$, and $b \in F$. \end{proposition} \begin{proof} Without loss of generality, let us prove the case $n = 2$. Given $(x_j)_{j=1}^{\infty}\in X_1(E_1)$ and $(y_j)_{j=1}^{\infty} \in X_2(E_2)$, the linear stability of $X_1$ and $X_2$ gives $(\varphi_1(x_j))_{j=1}^{\infty}\in X_1(\mathbb{K})$ and $(\varphi(y_j))_{j=1}^{\infty} \in X_2(\mathbb{K})$, hence the $B$-compatibility of $(X_1,X_2,Y_1,Y_2)$ yields \begin{align*} ((\varphi_1\otimes \varphi_2(x_{j_1},y_{j_2}))_{j_2\in B^{j_1}})_{j_1=1}^{\infty}=((\varphi_1(x_{j_1})\varphi(y_{j_2}))_{j_2\in B^{j_1}})_{j_1=1}^{\infty}\in Y_1(Y_2(\mathbb{K})), \end{align*} showing that $\varphi_1\otimes \varphi_2\in \mathcal{L}_{B;X_1,X_2;Y_1,Y_2}(E_1,E_2;\mathbb{K})$. Calling on Proposition \ref{prop.2} we get \begin{align*} \Vert \varphi_1\otimes \varphi_2\Vert_{B;X_1,X_2;Y_1,Y_2} \geq\Vert \varphi_1\otimes \varphi_2\Vert = \Vert \varphi_1\Vert\cdot\Vert\varphi_2\Vert. \end{align*} Consider now $0 \neq x\in B_{E_1}$ and $0 \neq y\in B_{E_2}$, a pair $(j_1',j_2')\in B$ and the sequences $(x_j)_{j=1}^{\infty} = x\cdot e_{j_1'}$ and $(y_j)_{j=1}^{\infty} = y\cdot e_{j_2'}$. So, \begin{align*} \Vert \widehat{(\varphi_1\otimes \varphi_2)}_B \left((x_j)_{j=1}^{\infty}, (y_j)_{j=1}^{\infty}\right)\Vert_{Y_1(Y_2(F))} &= \Vert((\varphi_1\otimes \varphi_2(x_{j_1},y_{j_2}))_{j_2\in B^{j_1}})_{j_1=1}^{\infty}\Vert_{Y_1(Y_2(F))}\\ &=\Vert ((\varphi_1(x_{j_1})\varphi(y_{j_2}))_{j_2\in B^{j_1}})_{j_1=1}^{\infty}\Vert_{Y_1(Y_2(F))} \\ &= \Vert (\varphi_1(x_{j_1'})\varphi(y_{j_2}))_{j_2\in B^{j_1'}})\cdot e_{j_1'} \Vert_{Y_1(Y_2(F))}\\ &= \Vert (\varphi_1(x)\varphi(y_{j_2}))_{j_2\in B^{j_1'}} \Vert_{Y_2(F)}\\ &=\vert \varphi_1(x)\vert\cdot \Vert (\varphi(y_{j_2}))_{j_2\in B^{j_1'}} \Vert_{Y_2(F)}\\ &= \vert \varphi_1(x)\vert\cdot \Vert (\varphi(y_{j_2'}))\cdot e_{j_2'} \Vert_{Y_2(F)} \\ &= \vert \varphi_1(x)\vert\cdot \vert \varphi(y)\vert\leq \Vert \varphi_1\Vert\cdot\Vert\varphi_2\Vert, \end{align*} from which it follows that $\varphi_1\otimes \varphi_2\in \mathcal{L}_{B;X_1,X_2;Y_1,Y_2}(E_1,E_2;\mathbb{K})$ and $\Vert \varphi_1\otimes \varphi_2\Vert_{B;X_1,X_2;Y_1,Y_2} = \Vert \widehat{(\varphi_1\otimes \varphi_2)}_B\Vert\leq \Vert\varphi_1\Vert\cdot\Vert\varphi_2\Vert$. To finish the proof, consider the operator $u\colon \mathbb{K}\longrightarrow F$ given by $u(\lambda) = \lambda b$. It is clear that $\varphi_1\otimes \varphi_2\otimes b = u\circ(\varphi_1\otimes \varphi_2)$, so Proposition \ref{prop.3} gives $\varphi_1\otimes \varphi_2\otimes b\in \mathcal{L}_{B;X_1,X_2;Y_1,Y_2}(E_1,E_2;F)$ and \begin{align*} \Vert \varphi_1\otimes \varphi_2\otimes b\Vert_{B;X_1,X_2;Y_1,Y_2} &= \Vert u\circ\varphi_1\otimes \varphi_2\Vert_{B;X_1,X_2;Y_1,Y_2} \leq \Vert u\Vert\cdot \Vert \varphi_1\otimes \varphi_2\Vert_{B;X_1,X_2;Y_1,Y_2} \\&= \Vert b\Vert\cdot \Vert \leq \varphi_1\Vert\cdot\Vert\varphi_2\Vert. \end{align*} The reverse inequality follows from Proposition \ref{prop.2}. \end{proof} For the definition of Banach ideals of multilinear operators, or Banach multi-ideals, we refer, e.g. to \cite{domingoklaus, floret2002ultrastability}. Assembling the results we have proved in this section we get the: \begin{corollary} If $X_1$, $\ldots$, $X_n$, $Y_1$, $\ldots$, $Y_n$ are linearly stable sequence classes such that $(X_1,\ldots,X_n,Y_1,\ldots,Y_n)$ is $B$-compatible, then $\mathcal{L}_{B;X_1,\ldots, X_n;Y_1,\ldots, Y_n}$ is a Banach multi-ideal. \end{corollary} We finish this section showing that $B$-compatibility is not only sufficient but also necessary for a nontrivial theory. \begin{proposition} Suppose that $X_1, \ldots, X_n$, $Y_1,\ldots, Y_n$ are linearly stable sequences classes such that $(X_1,\ldots, X_n,Y_1,\ldots, Y_n)$ is not $B$-compatible. Then $\mathcal{L}_{B;X_1,\ldots, X_n;Y_1,\ldots, Y_n}(E_1,\ldots, E_n;F) = \{0\}$ for all Banach spaces $E_1, \ldots, E_n$ and $F$. \end{proposition} \begin{proof} Let $T\in \mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;\mathbb{K})$. Suppose that there exists $(x^{(1)}\ldots,x^{(n)})\in E_1\times\cdots\times E_n$ such that $T(x^{(1)}\ldots,x^{(n)})\neq 0$. The non-$B$-compatibility of $(X_1,\ldots,X_n,$ $Y_1,\ldots,Y_n)$ provides scalar sequences $(\lambda^{(k)}_j)_{j=1}^{\infty}\in X_k(\mathbb{K})$, $k=1,\ldots,n$, such that \begin{align}\label{eqeqeq} \left(\cdots\left((\lambda^{(1)}_{j_1}\cdots\lambda^{(n)}_{j_n})_{j_n\in B^{j_1,\ldots,j_{n-1}}}\right)_{j_{n-1}=1}^{\infty}\cdots\right)_{j_1=1}^{\infty}\notin \mathbf{Y}_n(\mathbb{K}). \end{align} For $k = 1, \ldots, n$, consider the operators $u_k\colon \mathbb{K}\longrightarrow E_k$ given by $u_k(\lambda)=\lambda x^{(k)}$. From the linear stability of $X_1, \ldots, X_k$ we have $ (\lambda^{(k)}_jx^{(k)})_{j=1}^{\infty}=(u_k(\lambda^{(k)}_j))_{j=1}^{\infty}\in X_k(E_k)$, and since $T$ is $(B;X_1,\ldots,X_n;Y_1,\ldots,Y_n)$-summing we get \begin{align*} & T( x^{(1)},\ldots, x^{(n)}) \left(\cdots \left(\left( \lambda_{j_1}^{(1)}\cdots \lambda_{j_n}^{(n)} \right)_{j_n\in B^{j_1,\ldots,j_{n-1} }}\right)_{j_{n-1}=1}^{\infty} \cdots\right)_{j_1=1}^{\infty} =\\ &= \left(\cdots \left(\left( \lambda_{j_1}^{(1)}\cdots \lambda_{j_n}^{(n)} T( x^{(1)},\ldots, x^{(n)})\right)_{j_n\in B^{j_1,\ldots,j_{n-1} }}\right)_{j_{n-1}=1}^{\infty} \cdots\right)_{j_1=1}^{\infty}\\ &= \left(\cdots \left(\left( T( \lambda_{j_1}^{(1)}x^{(1)},\ldots, \lambda_{j_n}^{(n)}x^{(n)})\right)_{j_n\in B^{j_1,\ldots,j_{n-1} }}\right)_{j_{n-1}=1}^{\infty} \cdots\right)_{j_1=1}^{\infty} \in \mathbf{Y}_n(\mathbb{K}). \end{align*} But $\mathbf{Y}_n(\mathbb{K})$ is a linear space and $T(x^{(1)}\ldots,x^{(n)})\neq 0$, so this contradicts (\ref{eqeqeq}). Thus far we have proved that $\mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;\mathbb{K})=\{0\}$. Now, consider an operator $T_1\in \mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;F)$. From Proposition \ref{prop.3} we know that, for every linear functional $\varphi\in F'$, $\varphi \circ T_1$ belongs to $\mathcal{L}_{B;X_1,\ldots,X_n;Y_1,\ldots,Y_n}(E_1,\ldots,E_n;\mathbb{K})=\{0\}$, that is, $\varphi \circ T_1 = 0$ for every $\varphi \in F'$. The Hahn-Banach Theorem gives $T_1=0$. \end{proof} \section{A coincidence theorem} In both the linear and nonlinear theories of special classes of operators, coincidence theorems, stating that under suitable conditions every linear/nonlinear operator belongs to a certain class, lie at the heart of the theory. In the multilinear theory, the first coincidence result, known as the Defant-Voigt Theorem, asserts that every multilinear form that is, every scalar-valued multilinear operator, is absolutely $(1;1,\ldots,1)$-summing (see \cite{alencar1989some} or \cite[Corollary 3.2]{port}). Many other coincidence theorems have appeared since then, actually this line of research has been one of the driving forces of the development of the theory. The purpose of this section is to show that our approach can be used to obtain general coincidence results. We do so by generalizing the bilinear case of a coincidence theorem proved in \cite{botelho2009every} for multiple summing operators. By $BAN$ we denote the class of all (real or complex) Banach spaces. Given sequence classes $X$ and $Y$ and a Banach space $F$, we define: \begin{align*} \mathcal{B}(X,Y, F) &= \{ E\in \mathrm{BAN} : \mathcal{L}(E;Y(F)) = \mathcal{L}_{X;Y}(E;Y(F))\} {\rm ~and~} \\ \mathcal{C}(X,Y, F) &= \{ E\in \mathrm{BAN} : \mathcal{L}(E;F) = \mathcal{L}_{X;Y}(E;F)\}. \end{align*} \begin{theorem}\label{fth} Let $X_1, X_2, Y$ be sequence classes, $F$ be a Banach space, $E_1\in \mathcal{B}(X_1,Y, F)$ and $E_2\in \mathcal{C}(X_2,Y, F)$. Then every continuous bilinear operator from $E_1 \times E_2$ to $F$ is $(\mathbb{N}^{2};X_1, X_2; Y,Y)$-summing. Moreover, if $\|u\|_{X_1;Y} \leq C_1\|u\|$ for every $u \in {\cal L}(E_1; Y(F))$ and $\|v\|_{X_2;Y} \leq C_2\|v\|$ for every $v \in {\cal L}(E_2; F)$, then $\Vert A \Vert_{\mathbb{N}^{2};X_1,X_2;Y,Y} \leq C_1C_2\Vert A\Vert$ for every $A\in \mathcal{L}(E_1,E_2;F)$. \label{teo.2} \end{theorem} \begin{proof} Let $A\in \mathcal{L}(E_1,E_2;F)$, $(x_j^{(1)})_{j=1}^{\infty}\in X_1(E_1)$ and $(x_j^{(2)})_{j=1}^{\infty}\in X_2(E_2)$. For $x\in E_1$ consider the bounded linear operator $$A_x \colon E_2\longrightarrow F~,~A_x(y) = A(x,y).$$ The assumption on $E_2$ gives $A_x \in \mathcal{L}_{X_2;Y}(E_2;F)$, so $(A_x(x_j^{(2)}))_{j=1}^{\infty}\in Y(F)$. It follows that \begin{align*} T\colon E_1\longrightarrow Y(F) ~,~T(x) = \left(A_x(x_j^{(2)})\right)_{j=1}^{\infty}, \end{align*} is a well defined linear operator. Consider a sequence $(z_j)_{j=1}^{\infty}$ in $E_1$ converging to $z$ such that $T(z_j)\stackrel{j}{\longrightarrow} w = (a_1,a_2,\ldots)$ in $Y(F)$. From the condition $Y(F)\stackrel{1}{\hookrightarrow} \ell_{\infty}(F)$ we get coordinatewise convergence, that is, $A(z_j,x_{j_2}^{(2)}) = A_{z_j}(x_{j_2}^{(2)}) \stackrel{j}{\longrightarrow}a_{j_2}$ for every $j_2\in\mathbb{N}$. The continuity of $A$ gives $A(z_j,x_{j_2}^{(2)}) \stackrel{j}{\longrightarrow} A(z,x_{j_2}^{(2)}) = A_z(x_{j_2}^{(2)}),$ so $A_z(x_{j_2}^{(2)}) = a_{j_2}$ for every $j_2\in\mathbb{N}$. Therefore \begin{align*} T(z) = \left(A_z(x_{j_2}^{(2)})\right)_{j_2=1}^{\infty} = (a_{j_2})_{j_2=1}^{\infty} = w, \end{align*} from which we conclude that $T\in \mathcal{L}(E_1;Y(F))$. The assumption on $E_1$ gives $T\in \mathcal{L}_{X_1;Y}(E_1;Y(F))$, and since $(x_j^{(1)})_{j=1}^{\infty}\in X_1(E_1)$ we get \begin{align*} \left( \left( A(x_{j_1}^{(1)},x_{j_2}^{(2)})\right)_{j_2=1}^{\infty}\right)_{j_1=1}^{\infty} &= \left( \left( A_{x_{j_1}^{(1)}}(x_{j_2}^{(2)})\right)_{j_2=1}^{\infty}\right)_{j_1=1}^{\infty} \\ &= \left( T(x_{j_1}^{(1)})\right)_{j_1=1}^{\infty}\in Y(Y(F)), \end{align*} proving that $A\in \mathcal{L}_{\mathbb{N}^{2};X_1,X_2,Y,Y}(E_1,E_2;F)$. The norm inequality follows from \begin{align*} &\left\|\widehat{A}_{\mathbb{N}^{2}}\left((x^{(1)}_j)_{j=1}^{\infty}, (x^{(2)}_j)_{j=1}^{\infty}\right)\right\| = \left\| \left(\left( A(x^{(1)}_{j_1},x^{(2)}_{j_2})\right)_{j_2=1}^{\infty}\right)_{j_1=1}^{\infty}\right\| = \left\| \left( T(x^{(1)}_{j_1})\right)_{j_1=1}^{\infty}\right\| \\ & \hspace*{3em} = \Vert \widehat{T}((x^{(1)}_j)_{j=1}^{\infty})\Vert \leq \Vert \widehat{T}\Vert\cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \\ & \hspace*{3em}= \Vert T\Vert_{X_1;Y} \cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \leq C_1\cdot \Vert T\Vert\cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \\ & \hspace*{3em}= C_1\cdot \sup_{x\in B_{E_1}} \Vert T(x) \Vert_{Y(F))}\cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \\ & \hspace*{3em}= C_1\cdot \sup_{x\in B_{E_1}} \Vert \left( A_x(x^{(2)}_j)\right)_{j=1}^{\infty} \Vert_{Y(F))}\cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \\ & \hspace*{3em}= C_1\cdot \sup_{x\in B_{E_1}} \Vert \widehat{A}_x\left( (x^{(2)}_j)_{j=1}^{\infty}\right) \Vert_{Y(F))}\cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \\ & \hspace*{3em}\leq C_1\cdot \sup_{x\in B_{E_1}} \Vert \widehat{A}_x\Vert \cdot \Vert (x^{(2)}_j)_{j=1}^{\infty}\Vert_{X_2(E_2)} \cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \\ & \hspace*{3em}= C_1\cdot \sup_{x\in B_{E_1}} \Vert A_x\Vert_{X_2;Y} \cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \cdot \Vert (x^{(2)}_j)_{j=1}^{\infty}\Vert_{X_2(E_2)} \\ & \hspace*{3em}\leq C_1C_2\cdot \sup_{x\in B_{E_1}} \Vert A_x\Vert \cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \cdot \Vert (x^{(2)}_j)_{j=1}^{\infty}\Vert_{X_2(E_2)} \\ & \hspace*{3em}= C_1C_2\cdot \sup_{x\in B_{E_1}} \sup_{y\in B_{E_2}} \Vert A_x(y)\Vert \cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \cdot \Vert (x^{(2)}_j)_{j=1}^{\infty}\Vert_{X_2(E_2)} \\ & \hspace*{3em}= C_1C_2\cdot \sup_{x\in B_{E_1}} \sup_{y\in B_{E_2}} \Vert A(x,y)\Vert \cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \cdot \Vert (x^{(2)}_j)_{j=1}^{\infty}\Vert_{X_2(E_2)} \\ & \hspace*{3em}= C_1C_2\cdot \Vert A\Vert \cdot \Vert (x^{(1)}_j)_{j=1}^{\infty}\Vert_{X_1(E_1)} \cdot \Vert (x^{(2)}_j)_{j=1}^{\infty}\Vert_{X_2(E_2)}. \end{align*} \end{proof} Taking $X_1 = \ell_p^w(\cdot)$, $X_2 = \ell_r^w(\cdot)$ and $Y = \ell_q(\cdot)$ in the theorem above, we get a result a bit more general than \cite[Theorem 2.1]{botelho2009every}: \begin{corollary} Let $p,r\in [ 1,q]$ and $F$ be a Banach space. If every linear operator from $E_1$ to $\ell_q(F)$ is $(q;r)$-summing and every linear operator from $E_2$ to $F$ is $(q;p)$-summing, then every bilinear operator from $E_1 \times E_2$ to $F$ is multiple $(q;r,p)$-summing. \end{corollary} Consequences of Theorem \ref{fth} can be obtained in the same way that consequences of \cite[Theorem 2.1]{botelho2009every} are obtained in \cite{botelho2009every}.
\section{Introduction} Due to their flexible geometric shapes and deformable materials, soft continuum robots have great potentials in performing tasks under dangerous and cluttered environments \cite{majidi2014soft}. However, planning and control of such type of robots remains a challenging problem, as these robots have infinitely many degrees of freedom in their body links, and soft actuators with hard-to-identify dynamics. We are motivated to develop an intelligent control framework to achieve serpentine locomotion for goal tracking in a soft snake robot, designed and fabricated by \cite{onal2013autonomous}. The crucial observation from nature is that most animals with soft bodies and elastic actuators can learn and adapt to various new motion skills with only a few trials. These mechanisms have been studies for decades, and proposed as \acp{cpg} or neural oscillators. As a special group of neural circuits located in the spinal cord of most animals, \acp{cpg} are able to generate rhythmic and non-rhythmic activities for organ contractions and body movements in animals. Such activities can be activated, modulated and reset by neuronal signals mainly from two directions: bottom-up ascendant feedback information from afferent sensory neurons, or top-down descendant signals from high level modules including mesencephalic locomotor region (MLR) \cite{ijspeert2008central} and motor cortex \cite{roberts1998central, yuste2005cortex}. \begin{figure}[h!] \centering \includegraphics[width=0.95\columnwidth]{figs/scheme.png} \caption{Schematic view of learning based CPG controller.} \label{fig:schematic_view} \end{figure} In literature, bio-inspired control methods have been studied for the control design of locomotion control of rigid robots, including bipedal \cite{mori2004reinforcement, endo2008learning, nassour2014multi, dzeladini2018cpg} and serpentine locomotion \cite{crespi2005swimming, crespi2008online,ryu2010locomotion, bing2017towards, wang2017cpg, bing2019end}. The general approach is to generate motion patterns mimicking animals' behaviors and then to track these trajectories with a closed-loop control design. In \cite{ijspeert2008central}, the authors developed a trajectory generator for a rigid salamander robot using Kuramoto \acp{cpg} and used low-level PD controllers to track the desired motion trajectories generated by the oscillator. In \cite{ryu2010locomotion}, the authors improved the synchronization property of the \ac{cpg} by adapting its frequency parameter with additional linear dynamics. In \cite{wang2017cpg}, the authors introduced a control loop that adjusts the frequency and amplitude of the oscillation for adapting to the changes of the terrain. Another recent work \cite{bing2019end} employed \ac{snn} under the regulation of \ac{rstdp} to map visual information into wave parameters of a phase-amplitude \ac{cpg} net, which generates desired oscillating patterns to locomote a rigid snake robot chasing a red ball. Despite the success of bio-inspired control with rigid robots, it may be impossible to expect good performance if we apply the same control scheme to soft robots. This is mainly because that in these approaches, the trajectories generated by \ac{cpg} require high-performance low-level controllers for tracking. The tracking performance cannot be reproduced with soft snake robots due to the nonlinear, delayed and stochastic dynamical response from the soft actuators. In addition, most of these approaches only focus on improving locomotion performance under certain scenario, with a fixed goal position, or limited terrain types. To the best of our knowledge, none of the investigated work can track a randomly generated target with soft snake robot system. To this end, we develop a bio-inspired intelligent controller for soft snake robots with two key components: To achieve intelligent and robust goal tracking with changing goals, we use model-free reinforcement learning \cite{sutton2000policy,schulman2017proximal} to map the feedback of soft actuators and the goal location, into control commands of a \ac{cpg} network. The \ac{cpg} network consists of coupled Matsuoka oscillators \cite{matsuoka1985sustained}. It acts as a low-level motion controller to generate actuation inputs directly to the soft snake robots for achieving smooth and diverse motion patterns. The two networks forms a variant of cascade control with only one outer-loop, as illustrated in Fig.~\ref{fig:schematic_view}. To reduce the time and samples required for learning-based control, we leverages dynamic properties of Matsuoka oscillators in designing the interconnection between two networks. The \ac{rl} module learns to control \emph{neural stimuli inputs} and \emph{frequency ratio} to a \ac{cpg} network given state feedback from the soft snake robot and the control objective. In analogy to autonomous driving, the neural stimuli inputs play the role of \emph{steering control}, by modulate the amplitudes and phases of the outputs of the \ac{cpg} net in real-time. The frequency ratio plays the role of \emph{velocity control} as the changes the oscillating frequency of the \ac{cpg} net result in changes in the locomotion velocity, measured at the COM of the soft snake robot. To conclude, the contributions include: \begin{itemize} \item A novel bio-inspired tracking controller for soft snake robots, that combines \emph{robust and optimality} in deep reinforcement learning and \emph{stability and diversity in behavior patterns} in the \ac{cpg} system. \item A detailed analysis of Matsuoka oscillators in relation to steering and velocity control of soft snake robots. \item Experimental validation in a real soft snake robot. \end{itemize} The paper is structured as follows: Section~\ref{sec:sys} provides an overview of the robotic system and the state space representation. Section~\ref{sec:CPG} presents the design and configuration of the CPG network. Section~\ref{sec:dis} discusses key properties of the CPG network and the relation to the design of deep neural network for the RL module. Section~\ref{sec:sol} introduces curriculum and reward design for learning goal-reaching locomotion with a soft snake robot. Section~\ref{sec:result} presents the experimental validation and evaluation of the controller in both simulated and real snake robots. \section{System Overview} \label{sec:sys} A full snake robot consists $n$ pneumatically actuated soft links. Each soft link of the robot is made of Ecoflex\texttrademark~00-30 silicone rubber. The links are connected through rigid bodies enclosing the electronic components that are necessary to control the snake robot. In addition, the rigid body components have a pair of one direction wheels to model the anisotropic friction of real snakes. Only one chamber on each link is active (pressurized) at a time. The configuration of the robot is shown in Figure~\ref{fig:coordinate}. At time $t$, state $h(t) \in \mathbb{R}^2$ is the planar Cartesian position of the snake head, $\rho_g(t) \in \mathbb{R}$ is the distance from $h(t)$ to the goal position, $d_g(t) \in \mathbb{R}$ is the distance travelled along the goal direction from the initial head position $h(0)$, $v(t) \in \mathbb{R}$ is the instantaneous planar velocity of the robot, and $v_g(t) \in \mathbb{R}$ is the projection of this velocity vector to the goal direction, $\theta_g(t)$ is the angular deviation between the goal direction and the velocity direction of the snake robot. According to \cite{luo2014theoretical}, the bending curvature of each body link at time $t$ is computed by $ \kappa_i(t) = \frac{\delta_i(t)}{l_i(t)}, \text{ for } i=1,\ldots, 4, $ where $\delta_i(t)$ and $l_i(t)$ are the relative bending angle and the length of the middle line of the $i_{th}$ soft body link. \begin{figure}[ht!] \centering \includegraphics[width=0.8\columnwidth]{figs/coordinate.png} \caption{Notation of the state space configuration of the robot.} \label{fig:coordinate} \end{figure} In \cite{renato2019}, we developed a physics-based simulator that models the inflation and deflation of the air chamber and the resulting deformation of the soft bodies with tetrahedral finite elements. The simulator runs in real-time using GPU. We use the simulator for learning the locomotion controller in the soft snake robot, and then apply the learned controller to the real robot. \begin{figure*}[ht!] \centering \vspace{0.75em} \includegraphics[width=0.9\textwidth]{figs/model_2.png} \caption{Illustrating the input-output connection of the PPOC-CPG net.} \label{fig:rlmatsuoka} \vspace{-4ex} \end{figure*} \section{Design of CPG Network for a Soft Snake Robot} \label{sec:CPG} In this section, we introduce our CPG network design consists of interconnected Matsuoka oscillators \cite{matsuoka1987mechanisms, matsuoka2011analysis}. \noindent \textbf{Primitive Matsuoka CPG: }A primitive Matsuoka CPG consists a pair of mutually inhibited neuron models. The dynanmical model of a primitive Matsuoka CPG is given as follows, \begin{align} \label{eq:matsuoka} &K_f \tau_r \Dot{x}_i^e = -x_i^e - a z_i^f - b y_i^e - \sum_{j=1}^N w_{ji}y_j^e + u_i^e\\ \nonumber &K_f \tau_a \Dot{y}_i^e = z_i^e - y_i^e\\ \nonumber &K_f \tau_r \Dot{x}_i^f = -x_i^f - a z_i^e - b y_i^f - \sum_{j=1}^N w_{ji}y_j^f + u_i^f\\ \nonumber &K_f \tau_a \Dot{y}_i^f = z_i^f - y_i^f\\ \nonumber &\psi_i = A (z_i^e - z_i^f), \end{align} where the subscripts $e$ and $f$ represent variables related to extensor neuron and flexor neuron, respectively, the tuple $(x_i^q, y_i^q)$, $q \in \{e,f\}$ represents the activation state and self-inhibitory state of $i$-th neuron respectively, $z_i^q = g(x_i^q) = \max(0, x_i^q) $ is the output of $i$-th neuron, $b \in \mathbb{R}$ is a weight parameter, $u_i^e, u_i^f$ are the tonic inputs to the oscillator, and $K_f \in \mathbb{R}$ is the frequency ratio. The set of parameters in the system includes: the discharge rate $\tau_r \in \mathbb{R}$, the adaptation rate $\tau_a \in \mathbb{R}$, the mutual inhibition weights between flexor and extensor $a\in \mathbb{R}$ and the inhibition weight $w_{ji}\in \mathbb{R}$ representing the coupling strength with neighboring primitive oscillator. In our system, all coupled signals including $x_i^q, y_i^q$ and $z_i^q$ ($q \in \{e,f\}$) are inhibiting signals (negatively weighted), and only the tonic inputs are activating signals (positively weighted). \noindent \textbf{Configurating the Matsuoka CPG network: }The structure of the proposed CPG network is shown in Fig.~\ref{fig:rlmatsuoka}. The network includes four linearly coupled primitive Matsuoka oscillators. It is an inverted, double-sized version of Network VIII introduced in Matsuoka's paper \cite{matsuoka1987mechanisms}. The network includes four pairs of nodes. Each pair of nodes (e.g., the two nodes colored green/yellow) in a row represents a primitive Matsuoka CPG \eqref{eq:matsuoka}. The edges are correspond to the coupling relations among the nodes. In this graph, all the edges with hollowed endpoints are positive activating signals, while the others with solid endpoints are negative inhibiting signals. The oscillators are numbered $1 \text{ to } 4$ from head to tail of the robot. The outputs $\bm{\psi} = [\psi_1,\psi_2,\psi_3,\psi_4 ]^T$ from the primitive oscillators are the normalized input ratio in the real region $[-1, 1]$. We let $\psi_i = 1$ for the full inflation of the $i$-th extensor actuator and zero inflation of the $i$-th flexor actuator, and vice versa for $\psi_i = -1$. The actual pressure input to the $i$-th chamber is $\lambda_i\cdot\psi_i$, where $\lambda_i$ is the maximal pressure input of each actuator. The primitive oscillator with green nodes controls the oscillation of the head joint. This head oscillator also contributes as a rhythm initiator in the oscillating system, followed by the rest parts oscillating with different phase delays in sequence. Figure~\ref{fig:rlmatsuoka} shows all activating signals to the CPG network. For simplicity, we'll use a vector \begin{equation} \label{eq:bvec} \bm{u} = [u_1^e, u_1^f, u_2^e, u_2^f, u_3^e, u_3^f, u_4^e, u_4^f]^T \end{equation} to represent all tonic inputs to the \ac{cpg} net. To achieve stable and synchronized oscillations of the whole system, the following constraint must be satisfied \cite{matsuoka1985sustained}: \begin{align} \label{eq:oscilexist} (\tau_a-\tau_r)^2 < 4\tau_r\tau_a b, \end{align} where $\tau_a, \tau_r, b > 0$. To satisfy this constraint, we can set the value of $b$ much greater than both $\tau_r$ and $\tau_a$, or make the absolute difference $|\tau_r-\tau_a|$ sufficiently small. To determine the hyper-parameters in the \ac{cpg} network that generate more efficient locomotion pattern, we employed a \ac{gp} algorithm similar to \cite{ijspeert1999evolving} before integrating it with the proposed NN controller. In this step, all tonic inputs are set as constant integer $1$ for the simplicity of fitness evaluation. \begin{figure*}[h!] \centering \vspace{0.75em} \begin{subfigure}[b]{0.09\textwidth} \includegraphics[width=0.99\columnwidth]{figs/offsetturn.png}\caption{ \label{fig:offset}} \end{subfigure} \hspace{-0.01\textwidth} \begin{subfigure}[b]{0.09\textwidth} \includegraphics[width=0.99\columnwidth]{figs/dutyturn.png} \caption{ \label{fig:duty}} \end{subfigure} \begin{subfigure}[b]{0.37\textwidth} \includegraphics[width=\columnwidth]{figs/offsetinput.png} \caption{ \label{fig:offsetwave}} \end{subfigure} \begin{subfigure}[b]{0.42\textwidth} \includegraphics[width=\columnwidth]{figs/dutyinput.png} \caption{ \label{fig:dutywave}} \end{subfigure} \caption{ (a) Locomotion trajectory with biased amplitudes of tonic inputs $\bm{u}=[0.4, 0.6, 0.5, 0.5, 0.5, 0.5, 0.5, 0.5]^T$ \eqref{eq:bvec} to the CPG net. (b) Locomotion trajectory with biased duty cycles of tonic inputs. And plots of CPG outputs corresponding to tonic inputs with (c) biased amplitudes and (d) biased duty cycles.} \vspace{-4ex} \label{fig:turn} \end{figure*} We define the fitness function--the optimization criteria--in \ac{gp} as $F(t) = a_1| v_d(t)| - a_2 |\theta_d(t)| + a_3 |s_d(t)|),$ where all coefficients $a_1, a_2, a_3,T \in \mathbb{R}^+$ are constants \footnote{In experiments, the following parameters are used: $a_1= 40.0$, $a_2= 100.0$, $a_3= 50.0$, and $T=6.4 \text{ sec}$. }. This fitness function is a weighted sum over the robot's instantaneous velocity, angular deviation, and total traveled distance on a fixed straight line at termination time $t=T$. A better fitted configuration is supposed to maintain oscillating locomotion after a given period of time $T$, with faster locomotion speed $|v_d(T)|$ along the original heading direction. In addition, the locomotion pattern is also required to have less angular deviation from the initial heading direction (with a small $ |\theta_d(T)|$), and with overall a longer travelled distance along the initial direction ($|s_d(T)|$). The desired parameter configuration found by \ac{gp} is given by Table.~\ref{tab:config} in the Appendix. \section{Design of Learning Based Controller with Matsuoka CPG Network} \label{sec:dis} With constant tonic inputs, the designed Matsuoka \ac{cpg} net can generate stable symmetric oscillations to efficiently drive the soft snake robot slithering straight forward, it does not control the steering and velocity to achieve goal-reaching behaviors with potentially time-varying goals. Towards intelligent navigation control, we employ a model-free RL algorithm, proximal policy optimization (PPO) \cite{schulman2017proximal}, as the `midbrain' of the \ac{cpg} network. The algorithm is to learn the optimal policy that takes state feedback from the robot and control tonic inputs and frequency ratio of the \ac{cpg} net to generate proper oscillating waveform for reaching a goal. We would like to reduce the data and computation required for the learning to converge by leveraging crucial features of the Matsuoka \ac{cpg}. Next, we present our configuration of RL guided by dynamical properties of Matsuoka \ac{cpg} net. \subsection{Encoding tonic inputs for steering control} \label{sec:steer} Steering and velocity control are key to goal-directed locomotion. Existing methods realize steering by either directly adding a displacement \cite{ijspeert2008central} to the output of the \ac{cpg} system, or using a secondary system such as a deep neural network to manipulate the output from multiple \ac{cpg} systems \cite{mori2004reinforcement}. We show that the maneuverability of Matsuoka oscillator provides us a different approach--tuning tonic inputs to realize the desired wave properties for steering. In this subsection, we show two different combinations of tonic inputs capable of generating imbalanced output trajectories that result in steering of the robot. One way is to apply biased values to each pair of tonic inputs. Another way is to introduce different duty cycles between the actuation of extensor and flexor. \begin{figure}[h!] \centering \includegraphics[width=0.9\columnwidth]{figs/bias62.png} \caption{Relation between oscillation bias and activation amplitude of $u^e$ from a single primitive oscillator when $u^e+u^f=1$.} \label{fig:bias} \vspace{-2ex} \end{figure} Figure~\ref{fig:bias} shows the bias in the output $\psi_i$ given the input $u^e_i$ changing from $0$ to $0.5$ and $u^f_i = 1-u^e_i$ in a primitive Matsuoka oscillator. Here, we approximate the bias of the steady-state output oscillation trajectory by taking the time-average of the trajectory \footnote{Based on Fourier series analysis, given a continuous real-valued $P$-periodic function $\psi_i(t)$, the constant term of its Fourier series has the form $ \frac{1}{P}\int_P \psi_i(t) dt. $}. From Fig.~\ref{fig:bias}, we observe a linear mapping between tonic input $u^e$ of a primitive oscillator and the bias of output, given $u^f +u^e=1$. In other words, the steering bias of a primitive Matsuoka oscillator is proportional to the amplitude of $u^e$ when $u^e$ and $u^f$ are exclusive within $[0, 1]$. This key observation allows us to introduce a dimension reduction on the input space of the \ac{cpg} net: Instead of controlling $u^e_i, u^f_i$ for $i=1,\ldots, n$ for $n$-link snake robot, we only need to control $u^e_i$ for $i=1,\ldots, n$ and let $u^f_i=1-u^e_i$. As the tonic inputs have to be positive in Matsuoka oscillators, we define a four dimensional action vector $\vec{a}= [a_1, a_2, a_3, a_4]^T \in \mathbb{R}^4$ and map $\vec{a}$ to tonic input vector $\vec{u}$ as follows, \begin{equation} \label{eq:decoder} u_i^e = \frac{1}{1+e^{-a_i}},\text{ and } u_i^f =1-u_i^e, \text{ for } i=1,\ldots, 4. \end{equation} This mapping bounds the tonic input within $[0, 1]$. The dimension reduction enables more efficient policy search in \ac{rl}. Furthermore, different action vector $\vec{a}$ can be chosen to stabilize the system to limit cycles or equilibrium points. Under the constraint of Eq.~\eqref{eq:decoder}, steering can also be achieved by switching between different tonic input vectors periodically. When the duty cycle of actuating signals are different between flexors and extensors, an asymmetric oscillating pattern will occur. We construct two tonic input vectors $\bm{u_1}$ and $\bm{u_2}$, with $\bm{u_1} = [1, 0, 1, 0, 1, 0, 1, 0]^T$ and $\bm{u_2} = [0, 1, 0, 1, 0, 1, 0, 1]^T$. As Fig.~\ref{fig:dutywave} shows, when we set the duty cycle of $\bm{u_1}$ to be $1/12$ in one oscillating period, the rest $11/12$ of time slot for will be filled with $\bm{u_2}$. The \ac{cpg} output on each link shows an imbalanced oscillation with longer time duration on the negative amplitude axis, indicating longer bending time on the flexor. As a result, the robot makes a clockwise (right) turn, with a circle trajectory presented in Fig.~\ref{fig:duty}. We compare the steering control with two different methods in Fig.~\ref{fig:offset} and ~\ref{fig:duty}. The corresponding trajectories in joint space are shown in Fig.~\ref{fig:offsetwave} with biased amplitudes of tonic inputs and Fig.~\ref{fig:dutywave} with biased duty cycle of tonic inputs. In both experiments, the \ac{cpg} outputs present noticeable biases to the negative amplitude axis. This indicates that all of the soft actuators are bending more to the right-hand side of the robot during the locomotion. \subsection{Frequency modulation for velocity control} \begin{figure}[h!] \centering \includegraphics[width=0.9\columnwidth]{figs/velocityfactors2.png} \caption{Relating oscillating frequency and amplitude to the average linear velocity of serpentine locomotion.} \label{fig:ampfreqvel} \vspace{-2ex} \end{figure} As seen in Eq.~\eqref{eq:decoder}, the constraint on each pair of tonic inputs prevents us from controlling locomotion speed with different amplitudes tonic inputs. We would like to determine another input to \ac{cpg} net that controls the locomotion velocity. Based on \cite[Eq. (5), Eq. (6)]{matsuoka2011analysis}, since $K_f$ and $\vec{u}$ (Eq.~\eqref{eq:bvec}) are the control inputs, the mapping relations can be concluded as \begin{align} \label{eq:kf_property} \hat{\omega} \propto \frac{1}{\sqrt{K_f}}, ~\forall~ q\in\{e, f\}, i \in \{1, 2, 3, 4\}, \end{align} where $\hat{\omega}$ is the natural frequency of the oscillator. Besides, the oscillation amplitude $\hat{A}$ is linearly proportional to the amplitude of tonic inputs, that is, \begin{equation} \label{eq:amplitude} \hat{A} \propto A(u_i^q), ~\forall~ q\in\{e, f\}, i \in \{1, 2, 3, 4\}, \end{equation} where $A(\cdot)$ is the amplitude function of a rhythmic signal. Equations \eqref{eq:kf_property} and \eqref{eq:amplitude} show that the frequency and amplitude of the Matsuoka \ac{cpg} system can be controlled \emph{ independently} by the frequency ratio $K_f$ and the tonic inputs $u_i^q$, for $q \in \{e, f\}$. Figure~\ref{fig:ampfreqvel} shows the distribution of locomotion velocity over different amplitudes and frequencies by taking $2500$ uniform samples within the region $u_i^q \in [0.4, 0.8]$ for $q\in \{e, f\}, i \in \{1, 2, 3, 4\}$ with all $u_i^q$ to be the same in one sample, and $K_f \in [0.45, 1.05]$. Noticed that in Fig.~\ref{fig:ampfreqvel}, with fixed tonic input, the average velocity increase nearly monotonically with the frequency ratio $K_f$. While the amplitude of tonic input does not affect the velocity that much, especially when $K_f$ is low. Given this analysis, we use $K_f$ to control the velocity of the robot. It is noted that the frequency ratio $K_f$ only influences the strength but not the direction of the vector field of the Matsuoka \ac{cpg} system. Thus, manipulating $K_f$ will not affect the stability of the whole \ac{cpg} system. \subsection{The NN controller} We have now determined the encoded input vector of the \ac{cpg} net to be vector $\vec{a}$ and frequency ratio $K_f$. This input vector of the \ac{cpg} is the output vector of the NN controller. The input to the NN controller is the state feedback of the robot, given by $s=[\rho_g, \Dot{\rho_g}, \theta_g, \Dot{\theta_g}, \kappa_1, \kappa_2, \kappa_3, \kappa_4]^T \in \mathbb{R}^8$ (see Fig.~\ref{fig:coordinate}). Next, we present the design of the NN controller. We adopt a hierarchical reinforcement learning method called the option framework \cite{sutton1999between,precup2000temporal} to learn the optimal controller regulating the tonic inputs (low-level primitive actions) and frequency ratio (high-level options) of the \ac{cpg} net. The low-level primitive actions are computed at every time step. The high-level option changes infrequently as the robot needs not to change velocity very often for smooth locomotion. Specifically, each option is defined by $\langle {\cal{I}}, \pi_y: S\rightarrow \{y\} \times \dom(\vec{a}), \beta_{y} \rangle $ where ${\cal I}= S$ is a set of initial states. By letting ${\cal I}=S$, we allow the frequency ratio to be changed at any state in the system. Variable $y\in \dom(K_f)$ is a value of frequency ratio, and $\beta_y: S\rightarrow[0,1]$ is the termination function such that $\beta_y(s)$ is the probability of changing from the current frequency ratio to another frequency ratio. The options share the same \ac{nn} for their intro-option policies and the same \ac{nn} for termination functions. However, these \acp{nn} for intro-option policies take different frequency ratios. The set of parameters to be learned by policy search include parameters for intra-option policy function approximation, parameters for termination function approximation, and parameters for high-level policy function approximation (for determining the next option/frequency ratio). \ac{ppoc} in the openAI Baselines \cite{baselines} is employed as the policy search in the RL module. Let's now review the control architecture in Figure~\ref{fig:rlmatsuoka}. We have a Multi-layer perceptron (MLP) neural network with two hidden layers to approximate the optimal control policy that controls the inputs of the \ac{cpg} net in Eq.~\eqref{eq:matsuoka}. The output layer of MLP is composed of action $\vec{a}$ (green nodes), option in terms of frequency ratio (pink node) and the terminating probability (blue node) for that option. The input of NN consists of state vector (yellow nodes) and its output from the last time step. The purpose of this design is to let the actor network learn the unknown dynamics of the system by tracking the past actions in one or multiple steps \cite{mori2004reinforcement, peng2018sim, hwangbo2019learning}. Given the BIBO stability of the Matsuoka \ac{cpg} net \cite{matsuoka1985sustained} and that of the soft snake robots, we ensure that the closed-loop robot system with the PPOC-CPG controller is BIBO stable. Combining with Eq.~\eqref{eq:decoder} that enforces limited range for all tonic inputs, this control scheme is guaranteed to work at bounded status. \section{Learning-based Goal Tracking Control Design} \label{sec:sol} In this section, we introduce the design of curriculum and reward function for learning goal-tracking behaviors with the proposed controller. \subsection{Task curriculum} \begin{figure}[h!] \centering \vspace{0.75em} \includegraphics[width=0.9\columnwidth]{figs/lvlup3.png} \caption{Task difficulty upgrade from level $i-1$ to level $i$. As the curriculum level increases, goals are sampled at a narrower distance and wider angle, and acceptance area gets smaller.} \label{fig:curriculumlvlup} \vspace{-2ex} \end{figure} Curriculum teaching \cite{karpathy2012curriculum} is used to accelerate motor skills learning under complex goal reaching task scenario. Through starting the trials with easy-to-reach goals, the agent will learn good policies more quickly. As the level increases, the robot improves the policy with more complex tasks. We design different levels of tasks as follows: At task level $i$, the center of goal is sampled from the 2D workspace based on the current location and head direction of the robot. For each sampled goal, we say the robot reaches the goal if its is $r_{i}$ distance away from the goal. The sampling distribution is a uniform distribution in the fan area determined by the range of angle $\theta_i$ and distance bound $[\rho_i^l, \rho_i^u]$ in polar coordinate given by the predefined curriculum. As shown in Fig.~\ref{fig:curriculumlvlup}, when the task level increases, we have $r_{i}<r_{i-1}$, $\theta_i> \theta_{i-1}$, $\rho_i^u >\rho_{i-1}^{u}$, and $\rho_i^u-\rho_i^l < \rho_{i-1}^u-\rho_{i-1}^l$; that is, the robot has to be closer to the goal in order to success and receive a reward, the goal is sampled in a range further from the initial position of the robot. We select discrete sets of $\{r_i\}, \{\theta_i\}$, $[\rho_i^{l},\rho_i^{u}]$ and determine a curriculum table. We train the robot in simulation starting from level $0$. The task level will be increased to level $i+1$ from level $i$ if the controller reaches the desired success rate $\sigma_i$, for example, $\sigma_i=0.9$ indicates at least $90$ successful goal-reaching tasks out of $n=100$ at level $i$. \subsection{Reward design} Based on the definition of goal-reaching tasks and their corresponding level setups, the reward is defined as \[ R(v_g,\theta_g) = c_v|v_g| + c_g \cos(\theta_g(t))\sum_{k=0}^i{\frac{1}{r_k} I(l_g(t) < r_k)}, \] where $c_v, c_g \in \mathbb{R}^+$ are constant weights, $v_g$ is the velocity towards the goal, $\theta_g$ is the angular deviation from the center of goal, $r_k$ defines the goal range in task level $k$, for $k=0,\ldots, i$, $l_g$ is the linear distance between the head of the robot and the goal, and $I(l_g(t) < r_k)$ is an indicator function that outputs one if the robot head is within the goal range for task level $k$. This reward trades off two objectives. The first term, weighted by $c_v$, encourages movement toward the goal. The second term, weighted by $c_g$, rewards the learner given the level of curriculum the learner has achieved for the goal-reaching task. For every task, if the robot enters the goal range in task level $i$, it will receive a summation of rewards $1/r_k$ for all $k\le i$ (the closer to the goal the higher this summation), shaped by the approaching angle $\theta_g$ (the closer the angle to zero, the higher the reward). If the agent reaches the goal defined by the current task level, a new goal is randomly sampled in the current or next level (if the current level is completed). There are two failing situations, where the desired goal will be re-sampled and updated. The first situation is starving, which happens when the robot stops moving for a certain amount of time. The second case is missing the goal, which happens when the robot keeps moving towards the wrong direction to the goal region for a certain amount of time. \section{Experiment validation} \label{sec:result} We used a four-layered neural net configuration with $128\times128$ hidden layer neurons. At every step, the algorithm samples the current termination function to decide whether to terminate the current option and obtain a new frequency ratio $K_f$ or keep the previous option. The backpropagation of the critic net was done with Adam Optimizer and a step size of $5e-4$. The starvation time for failing condition is $60 \text{ ms}$. The missing goal criterion is determined by whenever $v_g(t)$ stays negative for over $30$ time steps. \subsection{Policy training} \begin{figure}[h!] \centering \vspace{0.75em} \begin{subfigure}[b]{0.9\columnwidth} \includegraphics[width=0.9\columnwidth]{figs/simlvl.png} \caption{ \label{fig:simlvl}} \end{subfigure} \hspace{-0.02\textwidth} \begin{subfigure}[b]{0.9\columnwidth} \includegraphics[width=0.9\columnwidth]{figs/simrew.png} \caption{ \label{fig:simrew}} \end{subfigure} \caption{ (a) Learning progress of task level and (b) average learning score in the goal-reaching task.} \vspace{-2ex} \label{fig:trainresult} \end{figure} Figure~\ref{fig:simlvl} shows improving performance over different levels versus the number of learning episodes. Figure \ref{fig:simrew} shows the corresponding total reward with respect to the number of learning episodes. As shown in Fig.~\ref{fig:simlvl}, we first train the policy net with fixed options (at this moment, the termination probability is always $0$, and a fixed frequency ratio $K_f= 1.0$ is used). When both the task level and the reward cannot increase anymore (at about 3857 episodes), we allow the learning algorithm to change $K_f$ along with termination function $\beta$, and keep training the policy until the highest level in the curriculum is passed. In this experiment, the learning algorithm equipped with stochastic gradient descent converges to a near-optimal policy after $6400$ episodes of training. The whole process takes about $12$ hours with $4$ snakes training in parallel on a workstation equipped with an Intel Core i7 5820K, 32GB of RAM, and one NVIDIA GTX1080 ti GPU. In order to compensate for simulation inaccuracies, most notably friction coefficients, we employed a domain randomization technique \cite{tobin2017domain}, in which a subset of physical parameters are sampled from a distribution with mean on the measured value. The \ac{dr} parameters used for training are on Table \ref{tab:dr}, on the Appendix. \begin{figure}[h!] \centering \vspace{2ex} \includegraphics[width=0.95\columnwidth]{figs/trajresult2.png} \caption{A sample trajectory and the corresponding control events on the first link \ac{cpg} output $\psi_1$.} \label{fig:trajresult} \vspace{-3ex} \end{figure} Figure~\ref{fig:trajresult} shows a sampled trajectory in the simulated snake robot controlled by the learned PPOC-CPG policy. Below the trajectory plot in Fig.~\ref{fig:trajresult} is the recorded pressure input trajectory to the first chamber. In the picture, green circles indicate the goals reached successfully, and the red circle represents a new goal to be reached next. The colors on the path show the reward of the snake state, with a color gradient from red to green, indicating the reward value from low to high. Several maneuvering behaviors discussed in Section~\ref{sec:dis} are exhibited by the policy. First, as the higher frequency can result in lower locomotion speed, the trained policy presents a specific two-phase behavior --- (1) The robot starts from a low oscillation frequency to achieve a high speed when it is far from the goal; (2) then it switches to higher oscillation frequency using different options when it is getting closer to the goal. This allows it to stay close on the moving direction straight towards the goal. If this still does not work, the tonic inputs will be used to force stopping the oscillation with the whole snake bending to the desired direction (see \ref{sec:dis}), and then restart the oscillation to acquire a larger turning angle. \subsection{Experiments with the real robot} \begin{figure}[h!] \centering \vspace{0.75em} \begin{subfigure}[b]{0.9\columnwidth} \includegraphics[width=0.9\columnwidth]{figs/sim_realresult.png} \caption{ \label{fig:simreal}} \end{subfigure} \hspace{-0.02\textwidth} \begin{subfigure}[b]{0.9\columnwidth} \includegraphics[width=0.9\columnwidth]{figs/sim_realresult_x.png} \caption{ \label{fig:simrealx}} \end{subfigure} \begin{subfigure}[b]{0.9\columnwidth} \includegraphics[width=0.9\columnwidth]{figs/sim_realresult_y.png} \caption{ \label{fig:simrealy}} \end{subfigure} \caption{Head trajectory of the simulation and real snake robot in consecutive goal-reaching tasks using PPOC-CPG controller trained in simulation in (a) $x$-$y$ plane, (b) $x$-$t$ plane and (c) $y$-$t$ plane.} \vspace{-2ex} \label{fig:simrealresult} \end{figure} We apply the learned policy directly to the real robot. The policy is tested on goal-reaching tasks guided by a mobile robot with an accuracy radius of $r=0.175$ meter (The robot base has a $0.16$ meter radius). The learning policy obtains the mobile robot position using the Mocap system in $60 Hz$, and send the control commands to the robot through a low-latency wireless transmitter. A pair of example trajectories obtained from both simulation and real robot with identical policy are shown in Fig.~\ref{fig:simreal}. The real robot tracks the goals with an average speed of $0.092 \text{m/s}$, while the simulation robot with tuned contact friction (see Table~\ref{tab:dr} in Appendix) reaches an average speed of $0.083 \text{m/s}$. Though trained on fixed goals only, the policy can also follow the slowly moving target in the test. From Fig.~\ref{fig:simrealx} and \ref{fig:simrealy}, we notice that a delay of state evolution still exists between real robot and simulated robot, which is probably due to the inaccurate contact dynamics modeling by the physical engine. This could be fixed by either reducing the sim-to-real gap with more accurate modeling of the dynamics, or incorporating adaptive mechanism with velocity feedback to reduce the difference. We will leave this challenge as part of our future work. \section{Conclusion} \label{sec:conclusion} The contribution of this paper is two folds: First, we investigate the properties of Matsuoka oscillator for learning diverse locomotion skills in a soft snake robot. Second, we construct a PPOC-CPG net that uses a \ac{cpg} net to actuate the soft snake robot, and a reinforcement learning algorithm to learn a closed-loop near-optimal control policy that utilizes different oscillation patterns in the \ac{cpg} net. This learning-based control method shows promising results on goal-reaching and tracking behaviors in soft snake robots. This control architecture may be extended to motion control of other robotic systems, including bipedal and soft manipulators. Our next step is to verify the scalability of the proposed control framework on the soft snake robot with more body segments and extend it to a three-dimensional soft snake robot and to realize more complex motion and force control in soft snake robots using distributed sensors and visual feedback. \bibliographystyle{IEEEtran}
\section{Introduction} The calculations of molecular properties like rovibrational energies and various relativistic effects are routinely performed at small internuclear distances $R$. Numerical results with standard available quantum mechanical codes are not guaranteed to be accurate for large $R$, especially for exponentially small quantities. While the use of exponential functions with explicit electron correlations has become the natural choice for an approach with correct wave function asymptotics, no efficient method to perform corresponding integrals has been developed. Namely, the original calculations of Ko{\l}os and Roothaan \cite{kolos1} with exponential functions were an extension of earlier developments by Podolanski \cite{podolanski} and R\"udenberg \cite{ruedenberg}. Their method was based on Neumann expansion of the $1/r_{12}$ term in spheroidal coordinates, which has a very slow numerical convergence. In spite of this, a few years later Ko{\l}os and Wolniewicz \cite{kolos2} were able to obtain very accurate, for the time, Born-Oppenheimer energies. This was a remarkable breakthrough in the field of precision molecular structure. Thus far, however, no accurate results for exchange energy have been obtained for large internuclear distances. For this reason the discrepancies between conflicting analytic results have not yet been resolved. Before going into detail, let us introduce the notion of the exchange energy. The hydrogen molecule, assuming clamped nuclei, is described by the electronic wave function, which can be symmetric or antisymmetric with respect to the exchange of electrons and with respect to inversion through the geometrical center. For a large internuclear separation the symmetry of the wave function does not matter, and one has two separate hydrogen atoms. It means that the difference between symmetric and antisymmetric state energies has to be exponentially small. Indeed, this splitting behaves as $e^{-2 R}$, but the question remains concerning the prefactor. If we assume that the wave function is just a product of two properly symmetrized hydrogen orbitals, the so-called Heitler-London wave function~\cite{heitler}, then the splitting is of the form given by Eq.\,(\ref{hl}), which is known to be invalid, even with regard to its sign~\cite{critique}. It means that, even for large internuclear distances, one cannot assume that the electronic wave function is a symmetrized product of hydrogenic ones. Therefore, the asymptotics of the exchange energy and the functional form of the wave function that reproduces this asymptotic behavior is an interesting problem.\\ There are conflicting results among analytic calculations of the exchange energy for the leading term, and there are no conclusive results for subleading ones. The problem seems to be so difficult that no successful attempts to resolve these discrepancies have been reported so far. In this work, we develop a numerical approach to calculate the exchange energy at large internuclear distances with well controlled numerical accuracy. To achieve this, we employed a large basis of exponential functions of the generalized Heitler-London form with an arbitrary polynomial in all interparticle distances. We have previously developed an efficient recursive approach to calculate integrals with two-center exponential functions~\cite{kw}, and demonstrated its advantages by the most accurate calculation of Born-Oppenheimer (BO) energies for the hydrogen molecule. In this work we use an efficient parallel version of linear algebra \cite{hsl,hogg} in an arbitrary precision arithmetic to fully control the precision of the exchange energy. For example, about 230-digit arithmetic is utilized at the largest internuclear separations of $57.5$ au to obtain six significant digits of the exchange energy out of 50 digits for the total energy. To our knowledge, there is no better approach available that will give the exchange energy with full control of the numerical precision. In fact, the widely used Symmetry Adapted Perturbation Theory (SAPT) method~\cite{sapt}, which aims to extract the exchange energy contribution in a perturbative manner, has pathologically slow convergence~\cite{sapt2,sapt3} for large internuclear distances, and its results are far from accurate. \section{Formulation of the problem} Let us consider a stationary Schr\"odinger equation for two electrons with positions given by $\vec r_1$ and $\vec r_2$ in the H$_2$ molecule in the BO approximation with internuclear separation $R$, \begin{equation} H\Psi_g(\vec r_1\,,\vec r_2) = E_g(R)\Psi_g(\vec r_1\,,\vec r_2), \end{equation} \begin{equation} H\Psi_u(\vec r_1\,,\vec r_2) = E_u(R)\Psi_u(\vec r_1\,,\vec r_2), \end{equation} where subscripts $g$ and $u$ denote \emph{gerade} and \emph{ungerade} symmetry under the inversion with respect to the geometrical center. They correspond to the ground electronic states with a total spin $S=0$ and $S=1$. $H$ in the above equation is the nonrelativistic Hamiltonian of the hydrogen molecule with clamped nuclei, \begin{equation} H = -\frac{\nabla_1^2}{2}-\frac{\nabla_2^2}{2}-\frac{1}{r_{1A}}-\frac{1}{r_{1B}} -\frac{1}{r_{2A}}-\frac{1}{r_{2B}} +\frac{1}{r_{12}} +\frac{1}{R}. \end{equation} Within the BO approximation, one considers only the electronic part of the wave function of the system, and thus $R$ serves as a parameter for electronic energies. The difference between these energies \begin{align} \Delta E = E_{\rm u} - E_{\rm g} \end{align} is the \emph{energy splitting}, and half of this splitting with the minus sign, $J = -\Delta E/2$, was the exchange energy according to the definition used in previous works. In this work we always refer to $\Delta E$ and convert results of the previous works from $J$ to $\Delta E$. Consequently, we use the exchange energy as a synonym of the energy splitting. The pioneering theory of Heitler and London~\cite{heitler} was one of the first attempts to explain chemical bonding~\cite{valence} on the grounds of the freshly established foundations of quantum mechanics. Their method was based on approximation of the wave functions corresponding to the lowest energy states of H$_2$ with symmetrized and antisymmetrized products of the exact hydrogen atom solutions. This approach was pursued in the same year by Sugiura~\cite{sugiura} who derived Born-Oppenheimer energies of the lowest gerade and ungerade states as a function of $R$. The asymptotic value for the energy splitting based on Sugiura~\cite{sugiura} reads, \begin{eqnarray}\label{hl} \Delta E_{\rm HL}(R) &=& 2\left\lbrack \frac{28}{45} - \frac{2}{15}\left(\ln R + \gamma_E \right) \right\rbrack R^3\exp(-2R)\nonumber \\ && + \mathcal{O}\left(R^2\exp(-2R)\right), \end{eqnarray} where $\gamma_E = 0.577~215$... is the Euler-Mascheroni constant. The Heitler-London approach appeared plausible because it provided a reasonable mechanism of chemical bond formation and its comparison with the results of ab-initio numerical calculations~\cite{kolos1} obtained later was satisfactory. Nevertheless, its long-range asymptotics is inherently flawed based on mathematical grounds. Analysis of Eq.\,(\ref{hl}) reveals that the asymptotic behavior of $\Delta E$ in Heitler-London theory becomes unacceptable, due to the logarithmic term being dominant as $R\rightarrow \infty$. As a consequence, for sufficiently large $R$ ($\approx 60$ au) the energy splitting becomes negative. The negative sign of $\Delta E_{\rm HL}(R)$ contradicts the well-established theorem on Sturm-Liouville operators with homogeneous boundary conditions stating that the lowest energy eigenstate should be nodeless in the coordinate space. Many years later, it was recognized that the Heitler-London approach underestimates electron correlations~\cite{critique}, and the logarithmic term in Eq.\,(\ref{hl}) could be identified with a potential coming from the \emph{exchange} charge distribution. This line of reasoning led to conjectures (see Refs.~\cite{tang,tang2,burrows}) that the correct asymptotics might be in the same form as Heitler-London if only the logarithmic term is appropriately suppressed (e.g. via proper treatment of electron correlations). Indeed, Burrows \emph{et al.}~\cite{burrows}, on the grounds of algebraic perturbation theory~\cite{burrows2}, have derived their formula for the long-range asymptotics of the splitting \begin{equation}\label{bdc} \Delta E_{\rm BDC}(R) = R^3e^{-2R}\left(\gamma_{\rm BDC}+ \mathcal{O}\left(\frac{1}{R}\right) \right), \end{equation} with $\gamma_{\rm BDC}=0.301\,672$..., a result similar to the Heitler-London result given by Eq.\,(\ref{hl}) aside from the unphysical logarithmic term. A completely different line of reasoning was introduced by Gor'kov and Pitaevskii~\cite{gorkov}, followed only a few months later by a very similar method by Herring and Flicker~\cite{herring}. They both used a kind of quasiclassical approximation for the wave function to derive its asymptotic form, and with the help of a surface integral summarized by Eq.\,(\ref{sim}), they obtained the exchange energy. A mistake in the numerical coefficient of the leading term in the former was indicated and corrected in the latter paper~\cite{herring}, and their final result is \begin{equation}\label{hf} \Delta E_{\rm HF} = \gamma_{\rm HF} R^{5/2}\exp(-2R) + \mathcal{O}\left(R^2\exp(-2R)\right), \end{equation} with the leading order coefficient \begin{align} \gamma_{\rm HF} = 1.636\,572\,063\ldots \label{gammaHF} \end{align} Accounting for the asymptotic wave function requires careful analysis of various regions of the 6-dimensional space (see for instance Ref.~\cite{herring}). With the increasing internuclear distance the exact wave function approaches a symmetrized or antisymmetrized product of two isolated hydrogen atom solutions. Nonetheless, the exact way in which this limit is approached is of paramount importance for the asymptotics of exchange energy, as has been thoroughly discussed with the case of Heitler-London theory in Ref.~\cite{critique}. In comparison to analytic approaches for H$_2^+$~\cite{damburg,cizek,gniewek,gniewek2}, examination of asymptotic energy splitting in H$_2$ is substantially more challenging due to electron-electron correlation, and it is prone to mistakes, as made evident by the presence of conflicting results in the literature~\cite{herring,gorkov,tang2,burrows}, compare Eqs. (\ref{bdc}) and (\ref{hf}). \section{Derivation of the leading asymptotics} To our knowledge, all of the analytic derivations presented in Refs.~\cite{gorkov,herring,andreev,tang,tang2,scott,burrows,burrows2} ultimately rely on the Surface Integral Method (SIM), also referred to in the literature as the Smirnov~\cite{smirnov} or Holstein-Herring~\cite{holstein} method. Here we follow the work of Gor'kov and Pitaevskii~\cite{gorkov} to present the SIM and the derivation of the asymptotic exchange energy in Eq.\,(\ref{hf}). This derivation lacks mathematical rigor but nevertheless helped us to understand the crucial behavior of the asymptotic wave function. Moreover, their asymptotics is confirmed by our numerical calculations, which is only twice the uncertainty ($2\,\sigma$) away from their analytical value. Let us assume that nuclei are on the $z$-axis with $z=a,-a$, $(R=2\,a)$, and let $\Omega$ be half of the 6-dimensional space with $z_2\geq z_1$, and $\Sigma$ is a boundary of $\Omega$, namely 5-dimensional space with $z_1=z_2$. Consider the following integral \begin{align}\label{sim} &\ (E_g-E_u)\int_\Omega d^3r_1\,d^3r_2\,\Psi_g\,\Psi_u \nonumber \\ =&\ \frac{1}{2}\,\int_\Omega d^3r_1\,d^3r_2\, \bigl[\Psi_g\,(\Delta_1+\Delta_2)\,\Psi_u - \Psi_u\,(\Delta_1+\Delta_2)\,\Psi_g\bigr] \nonumber \\ =&\ \int_\Omega d^3r_1\,d^3r_2\, \vec\nabla_1\bigl[\Psi_g\,\vec\nabla_1\,\Psi_u - \Psi_u\,\vec\nabla_1\,\Psi_g\bigr] \nonumber \\ =&\ \oint_\Sigma d\vec S\,\bigl[\Psi_g\,\vec\nabla_1\,\Psi_u - \Psi_u\,\vec\nabla_1\,\Psi_g\bigr]. \end{align} which allows us to express the energy splitting in terms of a surface integral with $\Psi_g$ and $\Psi_u$ functions. Let us introduce a combination of these functions \begin{align} \Psi_1 =&\ \frac{1}{\sqrt{2}}(\Psi_g+\Psi_u),\\ \Psi_2 =&\ \frac{1}{\sqrt{2}}(\Psi_g-\Psi_u), \end{align} with the respective phase chosen in a manner such that $\Psi_{1,2}$ are real and correspond to an electron localized at a specific nucleus, namely \begin{align} \Psi_1 \approx \frac{1}{\pi}\,e^{-|\vec r_1+\vec a| -|\vec r_2-\vec a|},\;\;\mbox{\rm for}\; \vec r_1\rightarrow -\vec a;\;\vec r_2\rightarrow \vec a\\ \Psi_2 \approx \frac{1}{\pi}\,e^{-|\vec r_1-\vec a| -|\vec r_2+\vec a|},\;\;\mbox{\rm for}\; \vec r_1\rightarrow \vec a;\;\vec r_2\rightarrow -\vec a \end{align} and the $\Psi_{g/u}$ functions are normalized to 1. The left-hand side of Eq.\,(\ref{sim}) can be transformed to \begin{align} \int_\Omega \! d^3r_1\,d^3r_2\,\Psi_g \Psi_u =&\ \frac{1}{2}\int_\Omega d^3r_1\,d^3r_2 \bigl[\Psi_g^2+\Psi_u^2 - (\Psi_g-\Psi_u)^2\bigr]\nonumber \\ =&\ \frac{1}{2}-\int_\Omega d^3r_1\,d^3r_2\,\Psi_2^2 \end{align} and the right hand side to \begin{align} &\ \oint_\Sigma d\vec S\,\bigl[\Psi_g\,\vec\nabla_1\,\Psi_u - \Psi_u\,\vec\nabla_1\,\Psi_g\bigr] \nonumber \\ =&\ \oint_\Sigma d\vec S\,\bigl[\Psi_2\,\vec\nabla_1\,\Psi_1 - \Psi_1\,\vec\nabla_1\,\Psi_2\bigr]. \end{align} As a result, one obtains \begin{align} E_g-E_u = \frac{2\,\oint_\Sigma d\vec S\,\bigl[\Psi_2\,\vec\nabla_1\,\Psi_1 - \Psi_1\,\vec\nabla_1\,\Psi_2\bigr]} {1-2\,\int_\Omega dV\,\Psi_2^2}. \label{surfaceint} \end{align} The second term in the denominator is exponentially small, and thus can be safely neglected. By virtue of Eq.\,(\ref{surfaceint}), the knowledge of the wave function and its derivative on $\Sigma$ is sufficient to retrieve the energy splitting. The advantage of this method manifests itself especially in the regime of large internuclear distance, where exact wave functions of singlet and triplet states are close to the appropriately symmetrized and antisymmetrized products of the isolated hydrogen atom solutions. Below we closely follow the procedure of Ref.~\cite{gorkov} and correct several misprints there. Let us assume the following ansatz of the wave functions $\Psi_{1/2}$ \begin{align} \Psi_1(\vec r_1,\vec r_2) =&\ \frac{\chi_1(\vec r_1,\vec r_2)}{\pi}\, e^{-|\vec r_1+\vec a| -|\vec r_2-\vec a|},\\ \Psi_2(\vec r_1,\vec r_2) =&\ \frac{\chi_2(\vec r_1,\vec r_2)}{\pi}\, e^{-|\vec r_1-\vec a| -|\vec r_2+\vec a|}, \end{align} where the functions $\chi_{1/2}$ change slowly in comparison to the exponential terms. Let us consider the region of $z_1\approx a, z_2\approx -a$ and $\rho_1,\rho_2\sim\sqrt{a}$ where the exponentials become \begin{align} &\ e^{-|\vec r_1+\vec a| -|\vec r_2-\vec a|} \nonumber \\ &\ \sim \exp\Bigl\{-2\,a-z_1+z_2-\frac{\rho_1^2}{2\,(a+z_1)} - \frac{\rho_2^2}{2\,(a-z_2)}\Bigr\}, \end{align} and $\rho_i$ is the perpendicular distance of $i$-th electron from the internuclear axis. From the Schr\"odinger equation one obtains for $\chi_1$ \begin{align} \label{chi1} \biggl[\frac{\partial}{\partial z_1} - \frac{\partial}{\partial z_2} + \frac{1}{2\,a}-\frac{1}{a-z_1} -\frac{1}{a+z_2} + \frac{1}{|\vec r_1-\vec r_2|} \biggr]\,\chi_1 = 0, \end{align} where higher order $O(1/\sqrt{a})$ terms are neglected. Introducing $z_1 = (\xi+\eta)/2$ and $z_2 = (\xi-\eta)/2$, this equation takes the form \begin{align} \label{chi1neg} \biggl[\frac{\partial}{\partial\eta} -\frac{1}{2\,a-\xi-\eta} - \frac{1}{2\,a+\xi-\eta} +\frac{1}{2\,\sqrt{\eta^2+\rho_{12}^2}} + \frac{1}{4\,a} \biggr]\chi_1 = 0, \end{align} and the general solution is \begin{align} \chi_1 =&\ C(\xi,\rho_{12})\,e^{-\frac{\eta}{4\,a}}\,\frac{\sqrt{\sqrt{\eta^2+\rho_{12}^2}-\eta}} {(2\,a-\xi-\eta)\,(2\,a+\xi-\eta)}, \end{align} up to the unknown function $C(\xi,\rho_{12})$. This function, which is not a rigorous argument, is determined from the condition that whenever $\vec r_1\approx -\vec a$ or $\vec r_2\approx \vec a$ the wave function $\Psi_1$ should be just exponential, and thus $\chi_1=1$ in this region. This argument can be justified because for $\vec r_1\approx -\vec a$, the second electron interacts dominantly with its nucleus. From this condition one obtains \begin{widetext} \begin{align} \Psi_1(\vec r_1,\vec r_2) =&\ \frac{2\,a\,(2\,a-|z_1+z_2|)}{\pi\,(a-z_1)(a+z_1)}\, \exp\biggl(-2\,a-z_1+z_2 - \frac{\rho_1^2}{2\,(a+z_1)} - \frac{\rho_2^2}{2\,(a-z_2)}\biggr)\nonumber \\ &\ \times\sqrt{\frac{\sqrt{(z_1-z_2)^2+\rho_{12}^2}+z_2-z_1} {\sqrt{(2\,a -|z_1+z_2|)^2+\rho_{12}^2}+2\,a-|z_1+z_2|}} \exp\biggl(-\frac{1}{2} +\frac{z_2-z_1+|z_1+z_2|}{4\,a}\biggr). \end{align} \end{widetext} The function $\Psi_2$ is obtained by the replacement $\vec r_1\leftrightarrow \vec r_2$. The appearance of $\rho_{12}$ in the wave functions $\Psi_1$ is in crucial distinction to the Heitler-London wave function and ensures the correct sign of the leading order asymptotics for all distances, as pointed out in Ref.~\cite{umanski}. $\Psi_1$, however, is not differentiable at $z_1+z_2=0$ and this is one of the reasons we were not able to fully accept this derivation. A similar problem appears in a later derivation of Herring and Flicker~\cite{herring} and this lack of analyticity at $z_1+z_2=0$ was somehow ignored in all the previous works. One may even ask, why this nonanalytic wave function should give the right asymptotics, and here we show that, indeed, $\gamma\,R^{5/2}\,e^{-2\,R}$ behavior is in agreement with our numerical calculations, although $\gamma$ is $2\sigma$ away. Let us now return to Eq.\,(\ref{surfaceint}) to obtain the energy splitting from the above $\Psi_i$. Because $\chi_{1/2}$ is slowly changing in comparison to dominant exponentials, their derivative can be neglected, and the splitting becomes \begin{align}\label{gpint} E_g-E_u =&\ -8\,\int_0^a dz\,d^2\rho_1d^2\rho_2\;\Psi_2\,\Psi_1\biggr|_{z_1=z_2=z}, \end{align} where \begin{align} \Psi_2\,\Psi_1\biggr|_{z_1=z_2=z>0} = \frac{(2a)^2\,\rho_{12}\,e^{-4a-1} }{\pi^2(a-z)(a+z)^2}\,e^{\frac{z}{a}+\frac{a(\rho_1^2+\rho_2^2)}{z^2-a^2}}, \end{align} where only the leading terms in the limit of a large $a$ are retained. Integrals over $\vec \rho_1$, $\vec \rho_2$ yield \begin{align} \int \mathrm{d}^2\rho_1 \mathrm{d}^2\rho_2\;\rho_{12} e^{-\alpha(\rho_1^2+\rho_2^2)} =&\ \pi^2\sqrt{\frac{\pi}{2}} \alpha^{-5/2}. \end{align} As a result one is left with the one-dimensional $z$-integral \begin{align} E_g-E_u = -32 e^{-4a-1} \sqrt{\frac{\pi}{2a}}\int_0^a \! dz\, e^{z/a} (a-z)^{3/2}(a+z)^{1/2}, \end{align} which after change of a variable $q=1-z/a$ yields \begin{align} E_g-E_u =&\ -16\sqrt{2\pi} a^{5/2} e^{-4a} \,\int_0^1 dq\, e^{-q} q^{3/2}(2-q)^{1/2}. \end{align} After noting that $a=\frac{R}{2}$, this result \begin{align}\label{gamma} \gamma =4\,\sqrt{\pi}\,\int_0^1dq\,e^{-q}\,q^{3/2}\,(2-q)^{1/2} \end{align} coincides with Eq.~(19) of Ref.~\cite{herring}. The numerical value $\gamma = \gamma_{\rm HF}$ from Eq. (\ref{gammaHF}) will be verified in the next Sections by direct numerical calculations of the exchange energy. \section{Variational approach} In the simplest implementation of the variational approach one solves the Schr\"odinger equation by representing the wave function as a linear combination of some basis functions and finds linear coefficients without optimization of nonlinear ones. Because we are interested in the large $R$ asymptotics of the exchange energy, the only viable option is to employ an exponential basis. This ensures the short-range \emph{cusp conditions}~\cite{kato} and correct long-range asymptotic behavior of the trial wave function. Consequently, the basis of trial functions is chosen in the following form \begin{eqnarray} \phi &=& \sum_{\{n_i\}}\,c_{\{n_i\}}(1\pm P_{AB})\,(1\pm P_{12}) \,e^{-r_{1A}-r_{2B}}\nonumber \\ && \times r_{12}^{n_1}\,\eta_1^{n_2}\,\eta_2^{n_3}\,\xi_1^{n_4}\,\xi_2^{n_5}, \end{eqnarray} where \begin{equation} \eta_i = r_{iA}-r_{iB},~\xi_i = r_{iA}+r_{iB}, \end{equation} and where $P_{AB}$ and $P_{12}$ represent operators enforcing symmetry with respect to the permutation $r_A \leftrightarrow r_B$ and $r_1 \leftrightarrow r_2$. Only one type of exponent is used in the wave function, because the ionic structures like H${^+}$H${^-}$, which correspond to a different choice of the exponent $e^{-r_{1A}-r_{1B}}$, are subdominant in our problem, as was already discussed in Ref.~\cite{critique}, and thus they can be omitted. It is tempting to assume that the sum over non-negative integer indices ${n_i}$ is chosen such that for the so-called shell number $\Omega$ \begin{equation}\label{shell} \sum_{i=1}^5 n_i \le \Omega, \end{equation} because it gives a good numerical convergence for the total binding energy. However, the main problem here is the very low numerical convergence of the exchange energy at large internuclear distances $R$ with the increasing size of the basis as given by $\Omega$. It was the main reason that previous numerical attempts were not very successful. We notice that for $R\to\infty$, the main contribution to the numerator of the surface integral in Eq.\,(\ref{surfaceint}) comes from the integration over the neighborhood of the internuclear axis. We thus anticipate that the crucial behavior of the wave function is encoded in $\eta_{1,2}$. Consequently, a basis is constructed using three independent shell parameters, such that the sum of powers of $\eta_{1,2}$, $\xi_{1,2}$, and $r_{12}$ are controlled by corresponding shell numbers $\Omega_A$, $\Omega_B$, and $\Omega_C$ \begin{equation}\label{shellm} n_2+n_3 \le \Omega_A,~n_4+n_5 \le \Omega_B,~n_1 \le \Omega_C, \end{equation} and numerical convergence is attained independently in each shell parameter. Matrix elements of the nonrelativistic Hamiltonian in this basis can be expressed in terms of direct and exchange integrals of the form \begin{align} f_{\{n_i\}}(R) =&\ R\!\int\! \frac{d^3 r_1}{4\,\pi}\!\int\! \frac{d^3 r_2}{4\,\pi} \frac{e^{-w_1\,r_{12}-y\,\eta_1-x\,\eta_2-u\,\xi_1-w\,\xi_2}}{r_{1A}\,r_{1B}\,r_{2A}\,r_{2B}}\nonumber \\ &\ \times r_{12}^{(n_1-1)}\,\eta_1^{n_2}\,\eta_2^{n_3}\,\xi_1^{n_4}\,\xi_2^{n_5}, \end{align} with non-negative integers $n_i$. When all $n_i=0$ $f$ is called the master integral, see Ref.~\cite{kw} \begin{align} f(R) =&\ R \int \frac{d^3 r_1}{4\,\pi}\,\int \frac{d^3 r_2}{4\,\pi}\, \frac{e^{-w_1\,r_{12}-y\,\eta_1-x\,\eta_2-u\,\xi_1-w\,\xi_2}}{r_{12}~r_{1A}~r_{2A}~r_{1B}~r_{2B}}. \end{align} All integrals $f_{n_1n_2n_3n_4n_5}(r)$ can be constructed through differentiation of the master integral with respect to the nonlinear parameters and can be reformulated into stable recurrence relations~\cite{kw}, providing a way to obtain all the integrals required to build matrix elements. Details on the computation of necessary integrals and matrix elements can be found in our previous works in Refs.~\cite{h2solv,rec_h2,kw}. Having constructed the Hamiltonian and overlap matrices, the energy and linear coefficients $c_{n_0 \ldots n_4}$ are determined by the secular equation, \begin{equation}\label{eig} \det\left\lbrack \left\langle n_1 \ldots n_5 \big\vert H \big\vert n^{\prime}_1 \ldots n^{\prime}_5 \right\rangle - E \left\langle n_1 \ldots n_5 \big\vert n^{\prime}_1 \ldots n^{\prime}_5 \right\rangle \right\rbrack = 0. \end{equation} It has to be solved separately for $E_g$ and $E_u$. Consequently, to retrieve an exponentially small difference between eigenvalues for large internuclear distances, employment of extended-precision arithmetic is inevitable. The generalized eigenproblem in Eq.\,(\ref{eig}) is solved with the help of the Shifted Inverse Power Method. At each iteration the linear system has to be solved to refine the initial eigenvalue estimation, which is done via calculation of the exact Cholesky factor of the $H-ES$ matrix, where $H$ is the Hamiltonian and $S$ the overlap matrix. A significant drawback of the applied basis is the fact that those matrices are dense, far from diagonally dominant and near-singular, especially for large $R$. This specific structure of matrices in the explicitly correlated exponential basis does not allow for straightforward application of iterative (e.g. Krylov-like) methods. Computation of the exact inverse Cholesky factor proved to be a suitable approach, providing cubic convergence. A crucial advantage of this method is that the Cholesky factor has to be computed only once and can be reused in every iteration. The main drawback of performing full Cholesky factorization is its algorithmic complexity. It requires $n^3/3$ arithmetic operations in arbitrary precision, which eventually become a bottleneck of the whole calculation. Total computation time can be significantly reduced when Cholesky factorization is parallelized. We found that our implementation of procedure HSL\_MP54 for dense Cholesky factorization from the HSL library~\cite{hsl,hogg} adopted to arbitrary precision performed best in terms of performance and accuracy. Relying on our previous calculations of the Born-Oppenheimer potential for H$_2$~\cite{bo_h2} and anticipating that variational calculations will follow one of the analytic results for the leading asymptotics of energy splitting, $\Delta E_{\rm BCD}(R) \sim R^3e^{-2R}$ or $\Delta E_{\rm HF}(R) \sim R^{5/2}e^{-2R}$ with the coefficient of order of unity, the accuracy goal in decimal digits can be estimated as $\lceil\log_{10}\left(\Delta E\right)\rceil + n$. It is the number of correct digits in $E_g$ and $E_u$ required to obtain the difference between them on $n$ last significant digits. In the extreme case of the internuclear distance $R=57.5$ au, approximately 50 correct digits in the final numerical value of $E_g$ and $E_u$ are required. Consequently, solving generalized eigenvalue problems for $E_g$ and $E_u$ requires incorporation of arbitrary precision software. We have found the MPFR library~\cite{mpfr} to be robust and provide the best performance among all the publicly available arbitrary-precision software. \section{Numerical results} \label{results} \begin{table*}[t]\renewcommand{\arraystretch}{1.2} \caption{\label{table1} Dependence of energy splitting $\Delta E = E_u-E_g$ scaled by factor $R^{-5/2}e^{2R}$ on shell parameters at different internuclear distances $R$ [au]. The first column presents $\Delta E$ as obtained with $\Omega_B=0,\Omega_C=0$, i.e. with no explicit correlation in the basis. The second is $\Delta$, the difference in energy splitting between $\Omega_B=\Omega_C=0$ basis and $\Omega_C\ne0$ basis, and the third column is its value as extrapolated in $\Omega_C$, still with $\Omega_B$ fixed at zero. The fourth column shows a correction $\delta$ to $\Delta E$ due to $\Omega_B\neq 0$, and the last column is the total energy splitting. Uncertainty of $\Delta E(\Omega_B=0,\Omega_C=0)$, $\Delta$ and $\delta$ come from extrapolation in $\Omega_A$, $\Omega_C$, and $\Omega_B$, respectively, and were obtained as described in the text.} \centering \begin{ruledtabular} \begin{tabular}{cLLLLL} \cent{R} & \cent{\Delta E(\Omega_B=0,\Omega_C=0)} & \cent{\Delta} & \cent{\Delta E(\Omega_B=0)} & \cent{\delta} & \cent{\Delta E} \\ \hline 20.0 & 1.418\,595\,21(9) & 0.138\,969\,8(18) & 1.557\,565\,0(18) & -0.006\,16(27) & 1.551\,41(27) \\ 22.5 & 1.409\,067\,90(8) & 0.140\,756\,3(20) & 1.549\,824\,2(20) & -0.004\,76(22) & 1.545\,06(22) \\ 25.0 & 1.402\,295\,96(8) & 0.142\,648\,3(22) & 1.544\,944\,3(22) & -0.003\,69(18) & 1.541\,25(18) \\ 27.5 & 1.397\,382\,94(7) & 0.144\,560\,8(24) & 1.541\,943\,7(24) & -0.002\,86(15) & 1.539\,09(15) \\ 30.0 & 1.393\,761\,45(5) & 0.146\,451\,2(26) & 1.540\,212\,6(26) & -0.002\,21(12) & 1.538\,00(12) \\ 32.5 & 1.391\,067\,28(5) & 0.148\,290\,4(28) & 1.539\,357\,7(28) & -0.001\,711(97) & 1.537\,646(97) \\ 35.0 & 1.389\,047\,31(5) & 0.150\,069\,3(30) & 1.539\,116\,6(30) & -0.001\,324(79) & 1.537\,792(79) \\ 37.5 & 1.387\,530\,09(5) & 0.151\,780\,1(32) & 1.539\,310\,2(32) & -0.001\,025(64) & 1.538\,285(64) \\ 40.0 & 1.386\,391\,69(5) & 0.153\,422\,3(34) & 1.539\,814\,0(34) & -0.000\,794(51) & 1.539\,020(51) \\ 42.5 & 1.385\,542\,54(5) & 0.154\,995\,7(35) & 1.540\,538\,2(35) & -0.000\,614(41) & 1.539\,924(41) \\ 45.0 & 1.384\,916\,73(4) & 0.156\,503\,7(37) & 1.541\,420\,4(37) & -0.000\,476(33) & 1.540\,945(33) \\ 47.5 & 1.384\,464\,91(3) & 0.157\,947\,4(39) & 1.542\,412\,3(39) & -0.000\,368(27) & 1.542\,044(27) \\ 50.0 & 1.384\,149\,48(3) & 0.159\,332\,5(41) & 1.543\,482\,0(41) & -0.000\,285(21) & 1.543\,197(21) \\ 52.5 & 1.383\,941\,70(2) & 0.160\,660\,9(44) & 1.544\,602\,6(44) & -0.000\,221(17) & 1.544\,382(18) \\ 55.0 & 1.383\,819\,27(2) & 0.161\,931\,6(45) & 1.545\,750\,9(45) & -0.000\,171(14) & 1.545\,580(15) \\ 57.5 & 1.383\,764\,60(2) & 0.163\,109(31) & 1.546\,874(31) & -0.000\,132(11) & 1.546\,742(33) \\ \end{tabular} \end{ruledtabular} \end{table*} It is crucial to properly choose the $\Omega$ parameters of the basis, in order to obtain sufficiently accurate exchange energy. If we assume $\Omega_B=\Omega_C=0$, i.e. we allow only for a nontrivial dependence in $\eta_1$ and $\eta_2$, the energy splitting has a very low numerical convergence in $\Omega_A$, and thus this shell parameter has to be sufficiently large to saturate the splitting. An essential feature of exponential function basis, other than the desired analytical behavior, is its exponential convergence to the complete basis set (CBS) limit, i.e. the $\log$ of differences of energies calculated for subsequent values of $\Omega$ are very well fitted to the linear function. By virtue of this property, extrapolation to the CBS limit is straightforward and reliable. Interestingly, we observe analogous behavior for the energy splittings, which entails, \begin{equation} \frac{\Delta E\left(\Omega_{A}\right) - \Delta E\left(\Omega_{A}-1\right)}{\Delta E\left(\Omega_{A} - 1 \right) - \Delta E\left(\Omega_{A} - 2\right)} = {\rm const}\,. \end{equation} Consequently, extrapolation to the CBS limit can be performed by linear regression of the logarithm of energy splitting increments, \begin{equation} \log\left(\Delta E\left(\Omega_A\right) - \Delta E\left(\Omega_A - 1\right) \right) = \alpha - \beta~\Omega_A. \end{equation} The obtained coefficient $\beta$ varies from $0.121(2)$ for~$R=20.0$,~$\Omega_A = 40$ down to $0.0366(2)$ for $R=57.5$,~$\Omega_A = 145$. At the largest considered nuclear distance of 57.5 au saturation was achieved with $\Omega_A$ as large as $145$. This explains why previous numerical attempts were not successful. In fact, the only correct results were obtained in a previous work by one of us (KP) in Ref.~\cite{bo_h2}, but those calculations were performed only for internuclear distances up to $R=20$ au. In contrast, numerical convergence in $\Omega_C$ is very fast. We performed calculations with increasing values of $\Omega_A$ and $\Omega_C$ shell parameters, but with $\Omega_B=0$ up to $R=57.5$. At first, saturation is achieved in the $\Omega_A$ parameter, and subsequently $\Omega_C$ is raised. Although such a basis has a multiplicative structure, a value as small as $\Omega_C=4$ was sufficient to achieve the claimed numerical precision. Extrapolation is analogous as described above for the basis with $\Omega_C = 0$. Corresponding numerical results for bases with saturation in $\Omega_A$ and $\Omega_C$ are presented in the fourth column of Table \ref{table1}. The only exception is the case of $R=57.5$ au, for which only $\Omega_C=3$ was technically feasible, which is reflected in higher uncertainty due to extrapolation in the $\Omega_C$ parameter. The limiting factor was the available computer memory of 2TB, which was exhausted by recursive derivation of integrals with extended-precision arithmetic. The numerical convergence in $\Omega_B$ is relatively slow, but the crucial point is that the numerical significance of the basis functions with $n_4+n_5>0$ becomes exponentially small in the limit of large internuclear distance $R$. Therefore, we calculate $\delta = R^{-5/2}e^{2R} \left[\Delta E - \Delta E\left(\Omega_B=0\right)\right] $ using the single shell parameter $\Omega$ as in Eq.\,(\ref{shell}) for all values of internuclear distances up to $R=35$, which was the upper limit set by the available computer memory. The resulting $\delta$, as a function of $R$, is very well fitted to the exponential functions of the form $\alpha\,e^{-\beta\,R}$ with $\alpha = -0.0477(8)$ and $\beta=0.1025(9)$, and we use this fit to obtain extrapolated $\delta$ for internuclear distances $R>35$ au, as shown in Table I. This demonstrates that the correct asymptotics of the exchange energy can be obtained using basis functions with $n_4+n_5=0$ only. Nevertheless, the influence of functions with $n_4+n_5>0$ is included in order to obtain a complete numerical result for the exchange energy at individual values of $R$. The final results for the splitting, presented in the last column of Table \ref{table1}, are obtained as a sum of $\Delta E(\Omega_B=0)$ and $\delta$. In view of the limitations of the available computer memory and reasonable computation times, we were able to perform calculations in $\Omega_B=0$ basis for $R$ up to $57.5$ au. To illustrate the computational cost of these calculations, at $R=57.5$ au, the largest internuclear distance presented, $\Omega_A = 145$, was required for saturation, which amounts to solving a dense eigenproblem in approximately 230 decimal-digit precision with basis size $N\sim27500$. \section{Numerical fit of the asymptotic expansion} \begin{figure}[h] \centering \includegraphics[width=\columnwidth]{figure1.eps} \caption{\label{figure1} Rescaled energy splitting $R^{-5/2}\,e^{2\,R}\,\Delta E$, fitted to numerical points in Table \ref{table1} in the range $R=20 - 57.5$ au, Herring and Flicker~\cite{herring} asymptotics is the red horizontal dotted line, fitted $\gamma$ is blue dashed line and light blue shaded region represents values within the uncertainty $\sigma = 0.014$ of $\gamma$. Results for $R\in(6,19)$ au are taken from Ref.~\cite{bo_h2} for completeness but were not used for fitting. Values of higher order coefficients are presented without any uncertainties because they strongly depend on the length of the expansion. They are shown to represent the actual fitting function.} \end{figure} A brief analysis of numerical results gathered in Table~\ref{table1} and depicted in Fig.~\ref{figure1} reveals that even after rescaling by a factor of $R^{-5/2}e^{2R}$ numerical data are still distant from $\gamma$ in Eq. (\ref{gammaHF}). Nevertheless, around $R=35$ au monotonicity changes and convergence of $R^{-5/2}\,e^{2\,R}\, \Delta E(R)$ to the constant $\gamma$ can be observed. In order to provide comprehensive analysis by performing a numerical fit, an important conclusion from the Herring-Flicker work~\cite{herring} should be recalled, i.e. that the next asymptotic term should be of the relative order $1/\sqrt{R}$, not $1/R$. This conclusion is also supported by the derivation of Gor'kov and Pitaevskii presented in Sec. III. The considered relatively wide region of internuclear distances enforces accounting for at least 3 or 4 terms of asymptotic series to properly model the observed dependence. The result for the leading term depends on the length of the fitting expansion, but converges to the same value with an increasing number of points used for fitting, see Fig. \ref{figure2}. Taking this into account, and the number of terms in the asymptotic series, we can estimate the leading coefficient to be $1.663(14)$, which is $2\sigma$ away from the Herring-Flicker value in Eq. (\ref{gammaHF}), where we use the convention that the number in parentheses is the uncertainty denoted in the text by $\sigma$. This uncertainty is obtained by studying fits of various lengths to variable numbers of points and is chosen very conservatively. \begin{figure}[h] \centering \includegraphics[width=\columnwidth]{figure2.eps} \caption{\label{figure2} Dependence of the leading coefficient in a fit to the rescaled energy splitting $R^{-5/2}\,e^{2\,R}\,\Delta E$, as a function of the number of last numerical data points used for fitting. Error bars represent standard deviation of the leading coefficient resulting from linear regression.} \end{figure} \noindent Because the original calculations in Refs. \cite{herring,gorkov} lack mathematical rigour and the asymptotic wave function is non-differentiable at $z_1 = -z_2$, the value of the asymptotics might be not fully correct. Nonetheless, by assuming correctness of the Herring-Flicker value, which amounts to fixing $\gamma = \gamma_{\rm HF}$, and subsequent fitting in powers of $1/\sqrt{R}$, a coefficient for the next-to-leading, $R^{2}e^{-2R}$, term can be estimated as $-0.66(7)$, which is significant, as conjectured by Hirschfelder and Meath~\cite{intermol}. This value is in disagreement with the work of Andreev~\cite{andreev}, in which the next non-vanishing term is claimed to be $R^{3/2}\,e^{-2\,R}$. \begin{figure}[h] \centering \includegraphics[width=\columnwidth]{figure3.eps} \caption{\label{figure3} Rescaled energy splitting $R^{-5/2}\,e^{2\,R}\,\Delta E$, fitted to numerical points in Table \ref{table1} in the range $R=20 - 57.5$ au, the same as in Fig.~\ref{figure1}, but represented as a function of $1/\sqrt{R}$.} \end{figure} It is perhaps more convenient to present numerical results and the fit as a function of $1/\sqrt{R}$, see Fig. \ref{figure3}. Then it becomes more evident, that the calculated numerical values are sufficient to obtain the leading coefficient, and the polynomial fit should consist of at least 3 or 4 terms to properly model the numerical data. Curiously, in the aforementioned $\Omega_B=\Omega_C=0$ basis, the rescaled exchange splitting $R^{-5/2}e^{2R} \Delta E$ quickly and monotonically converges as a function of $R$, to a constant value of $\gamma_0=1.3835(2)$. Therefore, even in a basis with no powers of $r_{12}$, leading asymptotic behavior could be achieved, although with the slightly smaller coefficient $\gamma_0$. Inclusion of higher powers of $r_{12}$ brings this constant close to $\gamma_{\rm HF}$, but even for the largest distances considered in the calculations, numerical points are still distant from the asymptotic constant, as presented in Fig.\,\ref{figure1}. Considering the result of Ref.~\cite{burrows}, their leading asymptotics seems to be in significant disagreement with our numerical data, see Fig. \ref{figure4}. This asymptotics, even with inclusion of a few higher order terms, cannot match our numerical data. Nevertheless, if one assumes the leading asymptotics of the form $R^3\,e^{-2R}$, although with the unknown coefficient, the results of the fit of a polynomial in $1/R$ strongly depend on the length of the fitting series and the number of points used for fitting. The obtained coefficients are abnormally large and have an alternating sign. This is an indication of improper choice of fitting function. If, nevetheless, one assumes $R^3e^{-2R}$ asymptotics and fits a similar polynomial in $1/\sqrt{R}$ as in Fig. \ref{figure1} to the rescaled energy, one obtains \begin{align} R^{-5/2}\,e^{2\,R}\,\Delta E =&\ 0.000\,06(83) R^{1/2} + 1.662 -1.212\,R^{-1/2} \nonumber \\ &\ + 1.632\,R^{-1} - 7.070\,R^{-3/2}\,. \end{align} The leading coefficient is consistent with 0, what is in disagreement with $\gamma_{\rm BDC}$ from Ref.~\cite{burrows}. This disagreement is even more pronounced when numerical results are confronted with the asymptotics of Ref. \cite{burrows} in Fig. \ref{figure4}. \begin{figure}[h] \centering \includegraphics[width=\columnwidth]{figure4.eps} \caption{\label{figure4} Rescaled energy splitting $R^{-3}\,e^{2\,R}\,\Delta E$ fitted to numerical points in Table \ref{table1} in the range $R=20 - 57.5$ au, the same as in Fig.~\ref{figure1}, but presented as a function of $1/R$. Burrows-Dalgarno-Cohen asymptotics~\cite{burrows} is the dash-dotted orange line.} \end{figure} \section{Conclusions} The high numerical accuracy for the exchange energy is achieved owing not only to the correct asymptotic behavior of explicitly correlated exponential functions, but also due to the specific choice of the basis functions suggested by the significance of the internuclear axis neighborhood. Regardless of the relatively limited range of internuclear distances at $R\leq 57.5$ au, due to this high numerical accuracy, we were able to resolve the long-standing discrepancy between long-range asymptotics. Our results are in agreement with $\gamma\,R^{5/2}\,e^{-2\,R}$ asymptotics, although our numerically fitted $\gamma$ is $2\sigma$ away from the Herring-Flicker value $\gamma_{\rm HF}$. Notably, fits of different lengths converge to the same $\gamma$, as shown in Fig. \ref{figure2}, while the fit to $R^3\,e^{-2\,R}$ asymptotics gives a very small coefficient, consistent with $0$ and in strong disagreement with $\gamma_{\rm BDC}$. This disagreement becomes more evident when the asymptotics from Ref.~\cite{burrows} is confronted with our numerical results in Fig. \ref{figure4}. To conclude, our numerical results revise the recent analytic derivations of the large-distance asymptotics and will provide a valuable benchmark for various calculations of interatomic interactions. \section*{Acknowledgments} The authors wish to acknowledge valuable discussions with Bogumi\l\ Jeziorski and are grateful to Heiko\ Appel for providing access to large memory computer resources. This work was supported by the National Science Center (Poland) Grant No. 2017/27/B/ST2/02459. \section*{Data Availability} Detailed numerical data are available on request from the corresponding author (MS).
\section{Introduction}\label{intr} Let $n\neq0$ be an integer. A set of $m$ positive integers $\{a_1,a_2,\ldots,a_m\}$ is called a $D(n)$-$m$-tuple (or a Diophantine $m$-tuple with the property $D(n)$), if $a_ia_j + n$ is a perfect square for all $1\leq i < j \leq m$. A natural question regarding such sets is about their possible sizes. If $n\equiv2\pmod{4}$, considering congruences modulo 4, it is easy to prove that there does not exist a $D(n)$-quadruple (see for example \cite{Br}, \cite{GS}). On the other hand, Dujella \cite{daa} proved that if an integer $n$ does not have the form $4k + 2$ and $n\not \in \{-4, -3, -1, 3, 5, 8, 12, 20\}$, then there exists at least one $D(n)$-quadruple. The conjecture is that if $n \in \{-4, -3, -1, 3, 5, 8, 12, 20\}$, then there does not exist a $D(n)$-quadruple. In the case $n=-1$, it was proven by Dujella et al.~\cite{DFF} that there does not exist a $D(-1)$-quintuple and that there are only finitely many $D(-1)$-quadruples. Also, bounds for the number of $D(-1)$-quadruples have been significantly improved during the years. But they are still too large to solve the conjecture of the non-existence of $D(-1)$-quadruples completely. Furthermore, the most well-known and studied case especially in recent years is when $n=1$, where very recently He, Togb\'e and Ziegler \cite{HTZ} proved the folklore conjecture saying that there does not exist a $D(1)$-quintuple. Their result is of great importance because they have introduced some new techniques and ideas. However, in the case $n=1$, there is an even stronger conjecture stating that any $D(1)$-triple can be extended to a quadruple with a larger element in a unique way. That conjecture is still open, and many mathematicians are working on it. For general $n$, if we denote $M_n = \sup\{|S|\}$, where set $S$ has the property $D(n)$, Dujella \cite{dmp}, \cite{dglasnik} proved that $M_n\leq 31$ for $|n|\leq 400$, and $M_n < 15.476 \log|n|$ for $|n| > 400$. The whole history of the problem, with recent results and progress, can be found at \cite{web}. \\ In this paper we are interested in the problem of extending a $D(-k)$-pair $\{k,k+1\}$ for a positive integer $k$. There are already some results in that direction in the case where $k=K^2$ for a positive integer $K$. The third author \cite{Fk2} showed that if $\{K^2, K^2+1, 4K^2+1,d\}$ is a $D(-K^2)$-quadruple, then $d=1$. Moreover, the third author and Togb\' e \cite {FT2012} proved, in an elementary and relatively simple manner, that if $\{K^2,K^2 +1,c,d\}$ is a $D(-K^2)$-quadruple with $c < d$, then $c = 1$ and $d = 4K^2 + 1$ (in that case, $3K^2 + 1$ must be a square). Similarly, with a few new ideas, the first two authors \cite{AF} have proven that if $\{2K^2,2K^2 + 1,c,d\}$ is a $D(-2K^2)$-quadruple with $c<d$, then $c=1$ and $d=8K^2+1$ (in which case $6K^2+1$ should be a square). Our motivation for this paper is to generalize those results for any positive integer $k$. However, that problem does not seem so straightforward in general. Thus, our main result is the following Theorem: \begin{thm}\label{thm:main} Let $k$ be a positive integer. If $\{k,k+1,c,d\}$ is a $D(-k)$-quadruple with $c>1$, then $d=1$. \end{thm} The starting point for the proof of Theorem \ref{thm:main} is the fact that the problem can be reduced to solving the system of Pell (or Pell-like) equations, even in the case where $k$ is non-square. While the hypergeometric method (see Theorem \ref{thm:R}) is the main tool to get upper bounds for solutions, which is standard in this area of research, we need a twist to get lower bounds for solutions. In fact, it seems hard to get a lower bound for solutions in terms of $k$ by using ``the congruence method'' as in \cite{Dk}, \cite{DP}, \cite{Fk2}. Instead, we use the property that the sequences $\{s_{\nu}\}$ and $\{v_{\nu}\}$ attached to $c$ and $d$, respectively, are exactly the same (see \eqref{seq:s} and \eqref{seq:v}), to obtain absolute lower bounds for solutions (see Proposition \ref{prop:n>}). Since they are weaker than the ones in terms of $k$, several cases remain to be shown. Most of the cases can be done by applying elementary considerations (see Section \ref{sec:k}), using the standard methods, that is, Baker's method on a linear form in logarithms and the reduction method (see Subsections \ref{subsec:78} and \ref{subsec:1}), or finding the integral points on certain elliptic curves (see Subsection \ref{subsec:2-5}). However, there is a case where we have to find the integral points on a certain hyperelliptic curve of genus $2$ (see Subsection \ref{subsec:6}). This task is not easy at all, since Chabauty's method cannot be applied to this curve, but we could complete it by applying the strategy due to Gallegos-Ruiz (see \cite{Gall}, \cite{PhD}). Such an application is new in this research field, and is expected to be utilized in future work. We also believe that the following Conjecture is valid, which will be considered in our future research. But as we mentioned, that problem is more difficult for general $k$, than those considered in \cite{AF}, \cite{FT2012}. \begin{conj} Let $k$ be a positive integer. If $\{k,k +1,c,d\}$ is a $D(-k)$-quadruple, for positive integer $k$, with $c < d$, then $c = 1$ and $d = 4k + 1$, in which case $3k+1$ must be a square. \end{conj} \section{Determination of fundamental solutions}\label{sec:fs} Let $k$ be a positive integer and $\{k,k+1,c\}$ a $D(-k)$-triple with $c>1$. Then, there exist positive integers $s'$ and $t$ such that \begin{align}\label{s't} kc-k=(s')^2 \quad \text{and}\quad (k+1)c-k=t^2. \end{align} Expressing $k$ as $k=k_0k_1^2$, where $k_0$ and $k_1$ are positive integers with $k_0$ square-free, we may write $c-1=k_0s^2$ with some positive integer $s$, which together with the latter equality of \eqref{s't} implies that \begin{align}\label{eq:st} t^2-(k_0^2k_1^2+k_0)s^2=1. \end{align} The positive solutions $(t,s)$ to this Pell equation can be expressed as \[ t+s\sqrt{k_0^2k_1^2+k_0}=\left(2k+1+2k_1\sqrt{k_0^2k_1^2+k_0}\right)^{\nu}, \] which enables us to write $s=s_{\nu}$, where \begin{align}\label{seq:s} s_0=0,\quad s_1=2k_1,\quad s_{\nu+2}=(4k+2)s_{\nu+1}-s_{\nu}. \end{align} According to $s=s_{\nu}$, we may write $t=t_{\nu}$ and $c=c_{\nu}$. For the later reference, we list small values of $s_{\nu}$: \begin{align*} s_0&=0,\quad s_1=2k_1,\quad s_2=4k_1(2k+1),\\ s_3&=8k_1(2k+1)^2-2k_1,\quad s_4=16k_1(2k+1)^3-8k_1(2k+1),\\ s_5&=32k_1(2k+1)^4-24k_1(2k+1)^2+2k_1,\\ s_6&=64k_1(2k+1)^5-64k_1(2k+1)^3+12k_1(2k+1),\\ s_7&=128k_1(2k+1)^6-160k_1(2k+1)^4+48k_1(2k+1)^2-2k_1,\\ s_8&=256k_1(2k+1)^7-384k_1(2k+1)^5+160k_1(2k+1)^3-16k_1(2k+1),\\ s_9&=512k_1(2k+1)^8-896k_1(2k+1)^6+480k_1(2k+1)^4-80k_1(2k+1)^2+2k_1. \end{align*} Since $c_0=1$, if it is proved that there does not exist a $D(-k)$-quadruple $\{k,k+1,c,d\}$ with $1<c<d$, then it turns out that Theorem \ref{thm:main} is valid. Thus, throughout this paper we assume on the contrary that $\{k,k+1,c,d\}$ is a $D(-k)$-quadruple with $c<d$. Note that we may consider only the case where $k \ge 3$ in view of \cite{D12} and \cite{Br,GS,MR}. Then, there exist positive integers $x,\,y,\,z$ such that \[ d-1=k_0x^2,\quad (k+1)d-k=y^2,\quad cd-k=z^2, \] from which we obtain the following system of Pellian equations \begin{align} y^2-(k_0^2k_1^2+k_0)x^2&=1,\label{P:yx}\\ z^2-k_0cx^2&=c-k.\label{P:zx} \end{align} Just as $s=s_{\nu}$, from \eqref{P:yx} we may write $x=v_m$ with a non-negative integer $m$, where $\{v_m\}$ is the recurrence sequence defined by \begin{align}\label{seq:v} v_0=0,\quad v_1=2k_1,\quad v_{\nu+2}=(4k+2)v_{\nu+1}-v_{\nu}. \end{align} On the other hand, we see from Nagell's argument that for any positive solution $(z,x)$ to \eqref{P:zx} there exist a solution $(z_0,x_0)$ to \eqref{P:zx} satisfying \begin{align}\label{in:zx} 0<z_0\le \sqrt{c(c-k)},\quad |x_0|<s \end{align} and a non-negative integer $n$ such that \begin{align*} z+x\sqrt{k_0c}=(z_0+x_0\sqrt{k_0c})(2k_0s^2+1+2s\sqrt{k_0c})^n. \end{align*} Thus, we may write $x=w_n$, where \begin{align}\label{seq:w} w_0=x_0,\quad w_1=(2k_0s^2+1)x_0+2sz_0,\quad w_{n+2}=(4k_0s^2+2)w_{n+1}-w_n. \end{align} Expressions \eqref{seq:s} and \eqref{seq:v} together show that \[ (v_m \mod s)_{m \ge 0}=(0,s_1,\dots,s_{\nu-1},0,-s_{\nu-1},\dots,-s_1,0,s_1,\dots), \] which yields $v_m \equiv \pm s_i \pmod{s}$ for some $i$ with $0 \le i < \nu$. Since we see from \eqref{seq:w} that $w_n \equiv x_0 \pmod{s}$, we have $x_0 \equiv \pm s_i \pmod s$. It follows from \eqref{in:zx} that $x_0=\pm s_i$.\par In what follows, we assume the following: \begin{ass}\label{ass} $\{k,k+1,c',c\}$ is not a $D(-k)$-quadruple for any $c'$ with $1<c'<c$. \end{ass} Then, putting $d_0:=k_0x_0^2+1$ we have \begin{align*} kd_0-k&=k_0^2k_1^2x_0^2,\\ (k+1)d_0-k&=(k+1)(k_0x^2+1)-k=k_0(k+1)s_i^2+1=t_i^2,\\ cd_0-k&=c(k_0x_0^2+1)-k=z_0^2, \end{align*} that is, $\{k,k+1,d_0,c\}$ is a $D(-k)$-quadruple. Since $d_0<s^2+1 \le c$, from the assumption we obtain $d_0=1$, i.e., $x_0=0$ and $z_0=\sqrt{c-k}$. Note that this occurs only if $c-k$ is a perfect square. Hence, \eqref{seq:w} enables us to express $x=w_n$ as \begin{align}\label{seq:w'} w_0=0,\quad w_1=2s\sqrt{c-k},\quad w_{n+2}=(4c-2)w_{n+1}-w_n, \end{align} from which we obtain a lower bound for $x$ by $n$ and $c$. \begin{lem}\label{lem:x>} If $x=w_n$, then $\log x > (n-1) \log(4c-3)$. \end{lem} \begin{proof} By \eqref{seq:w'} we have \[ w_n>(4c-3)w_{n-1}>(4c-3)^{n-1}w_1>(4c-3)^{n-1}. \] \end{proof} Moreover, since the recurrence sequence $\{v_m\}$ has the same form as $\{s_{\nu}\}$ and $v_m \equiv \pm s_i =x_0=0 \pmod{s}$, we have the following. \begin{lem}\label{lem:mod} If $x=v_m$, then $m \equiv 0 \pmod{\nu}$. \end{lem} \section{Lower bounds for solutions}\label{sec:lb} Our goal in this section is to show the following. \begin{prop}\label{prop:n>} Assume that $v_m=w_n$ has a solution with $n \ne 0$. On Assumption \ref{ass}, the following holds$:$ \begin{itemize} \item[{\rm (1)}] If $\nu=7$, and $k \ge 12$, then $n \ge 8$. \item[{\rm (2)}] If either $\nu=8$ and $k \ge 15$ or $\nu \ge 9$ and $k \ge 7$, then $n \ge 9$. \end{itemize} \end{prop} We first consider the case where $n=1$. It is clear that \begin{align}\label{in:<w1} v_{\nu}=s_{\nu}<2s\sqrt{c-k}=w_1. \end{align} From sequence \eqref{seq:s} one easily see that \begin{align}\label{s} s_{\nu}=\frac{1}{2\sqrt{k_0(k+1)}}\left\{\left(2k+1+2\sqrt{k^2+k}\right)^{\nu}-\left(2k+1-2\sqrt{k^2+k}\right)^{\nu}\right\}. \end{align} \begin{lem}\label{lem:n1} Let $k$ and $l$ be integers with $k \ge 3$ and $l \ge 2$. \begin{itemize} \item[{\rm (1)}] $2^lk_0^{l/4}s_{\nu}^l<s_{l \nu}$. \item[{\rm (2)}] If $l \ge 3$, then $2^lk_0^{l/2}s_{\nu}^l<s_{l \nu}$. \end{itemize} \end{lem} \begin{proof} (1) If $k=3$ and $l=2$, then we know from \eqref{s} that \begin{align*} s_{2\nu}-2^2k_0^{1/2}s_{\nu}^2&=\frac{1}{4\sqrt{3}}\left\{2-2(7-4\sqrt{3})^{2\nu}\right\}>0. \end{align*} In all other cases, \eqref{s} implies that \begin{align*} s_{l\nu}-2^lk_0^{l/4}s_{\nu}^l&=\frac{1}{2\sqrt{k_0(k+1)}}\left\{\left(2k+1+2\sqrt{k^2+k}\right)^{l\nu}-\left(2k+1-2\sqrt{k^2+k}\right)^{l\nu}\right\}\\ &\quad -\frac{1}{k_0^{l/4}(k+1)^{l/2}}\left\{\left(2k+1+2\sqrt{k^2+k}\right)^{\nu}-\left(2k+1-2\sqrt{k^2+k}\right)^{\nu}\right\}^l\\ &>\frac{1}{2k_0^{l/4}(k+1)^{l/2}}\left[\left\{k_0^{(l-2)/4}(k+1)^{(l-1)/2}-2\right\}\left(2k+1+2\sqrt{k^2+k}\right)^{l\nu}\right.\\ &\hspace{200pt} -\frac{k_0^{(l-1)/2}(k+1)^{(l-1)/2}}{\left(2k+1+2\sqrt{k^2+k}\right)^{l\nu}}\bigg]\\ &>\frac{1}{2k_0^{l/4}(k+1)^{l/2}}\left[\left\{(k+1)^{(l-1)/2}-2\right\}(4k)^{l\nu}-1\right]>0, \end{align*} where the last inequality holds for $k \ge 3$ and $l \ge 2$ with $(k,l)\ne (3,2)$. \par (2) In the same way as (1), for $l \ge 3$ it holds that \begin{align*} s_{l\nu}-2^lk_0^{l/2}s_{\nu}^l&>\frac{1}{2\sqrt{k_0}(k+1)^{l/2}}\left[\left\{(k+1)^{(l-1)/2}-2\sqrt{k_0}\right\}\left(2k+1+2\sqrt{k^2+k}\right)^{l\nu}\right.\\ &\hspace{200pt} -\frac{(k+1)^{(l-1)/2}}{\left(2k+1+2\sqrt{k^2+k}\right)^{l\nu}}\bigg]\\ &>\frac{1}{2\sqrt{k_0}(k+1)^{l/2}}\left\{(\sqrt{k}-1)^2\left(2k+1+2\sqrt{k^2+k}\right)^{l\nu}-1\right\}>0. \end{align*} \end{proof} We apply Lemma \ref{lem:n1} (1) with $l=2$ to get \begin{align}\label{in:>w2} v_{2\nu}=s_{2\nu}>2^2k_0^{1/2}s_{\nu}^2=4s\sqrt{c-1}>2s\sqrt{c-k}=w_1. \end{align} Since if $v_m=w_n$, then $m$ is a multiple of $\nu$ by Lemma \ref{lem:mod}, inequalities \eqref{in:<w1} and \eqref{in:>w2} together imply the following. \begin{lem}\label{lem:w1} If $k \ge 3$, then $v_m=w_1$ has no solution for all non-negative integers $m$. \end{lem} Second, consider the case where $n \ge 2$. \begin{lem}\label{lem:v>w} If $k \ge 3$ and $2 \le n \le k+1$, then $v_{2n\nu}>w_n$. \end{lem} \begin{proof} From \eqref{seq:w} we have \begin{align*} w_n&<(4c-2)w_{n-1}=(4k_0s^2+2)w_{n-1}<2s\sqrt{c-k}(4k_0s^2+2)^{n-1}\\ &=2^{2n}k_0^n s^{2n} \cdot \frac{1}{2k_0}\left(1+\frac{1}{2k_0s^2}\right)^{n-1}\sqrt{1-\frac{k-1}{k_0s^2}}. \end{align*} Applying Lemma \ref{lem:n1} (2) with $l=2n \ge 4$, we have $2^{2n}k_0^ns^{2n}<s_{2n\nu}=v_{2n\nu}$. Since $n \le k+1$, it suffices to show \begin{align}\label{in:<4} \left(1+\frac{1}{2k_0s^2}\right)^{2n-2}\left(1-\frac{n-2}{k_0s^2}\right) \le 4 \end{align} for $n \ge 2$. We show this by induction on $n$. \par If $n=2$, then \eqref{in:<4} clearly holds. Assume that \eqref{in:<4} holds for $n$ with $n \ge 2$. Then, \begin{align*} \left(1+\frac{1}{2k_0s^2}\right)^{2n}\left(1-\frac{n-1}{k_0s^2}\right) &=\left(1+\frac{1}{2k_0s^2}\right)^{2n-2}\left(1-\frac{n-2}{k_0s^2}\right)\left(1+\frac{1}{2k_0s^2}\right)^2\cdot \frac{1-\frac{n-1}{k_0s^2}}{1-\frac{n-2}{k_0s^2}}. \end{align*} Since \begin{align*} \left(1+\frac{1}{2k_0s^2}\right)^2\cdot \frac{1-\frac{n-1}{k_0s^2}}{1-\frac{n-2}{k_0s^2}} <\left(1+\frac{1}{2k_0s^2}\right)^2\left(1-\frac{1}{k_0s^2}\right) =1-\frac{3}{4k_0^2s^4}-\frac{1}{4k_0^3s^6}<1, \end{align*} the induction hypothesis shows that \[ \left(1+\frac{1}{2k_0s^2}\right)^{2n}\left(1-\frac{n-1}{k_0s^2}\right)\le 4. \] \end{proof} \begin{lem}\label{lem:v<w} Assume that one of the following holds$:$ \begin{itemize} \item $\nu=7$, $n \le 7$, $k \ge 12$, \item $\nu=8$, $n \le 8$, $k \ge 15$, \item $\nu \le 9$, $n \le 8$, $k \ge 7$. \end{itemize} Then, $v_{(2n-1)\nu}<w_n$. \end{lem} \begin{proof} We see from \eqref{seq:v} that \[ v_{(2n-1)\nu}<(4k+2)v_{(2n-1)\nu-1}<2k_1(4k+2)^{(2n-1)\nu-1} \] and from \eqref{seq:w'} that \[ w_n>(4c-3)w_{n-1}=(4k_0s^2+1)w_{n-1}>2s\sqrt{c-k}(4k_0s^2+1)^{n-1}. \] Since $s=s_{\nu}>(4k+1)s_{\nu-1}>2k_1(4k+1)^{\nu-1}$ by \eqref{seq:s} and $\sqrt{c-k}>\sqrt{k_0}s>2\sqrt{k}(4k+1)^{\nu-1}$, we have \begin{align*} w_n &> 4k_1(4k+1)^{\nu-1}\cdot 2\sqrt{k}(4k+1)^{\nu-1}\left\{16k(4k+1)^{2\nu-2}+1\right\}^{n-1}\\ &> 8\cdot 16^{n-1}k_1 k^{n-1/2}(4k+1)^{2n(\nu-1)}=2k_1\cdot 4^{n-1/2}(4k)^{n-1/2}(4k+1)^{2n(\nu-1)}\\ &>2k_1(4k+1)^{2n\nu-n-1/2}. \end{align*} Thus, it remains to show the inequality \[ (4k+1)^{2n\nu-n-1/2}>(4k+2)^{2n\nu-\nu-1}, \] which is equivalent to \[ g(\nu,n):=\frac{2n\nu-n-1/2}{2n\nu-\nu-1}>\frac{\log(4k+2)}{\log(4k+1)}=:f(k). \] It is easy to check that $g(n,\nu)$ is an increasing function of $\nu$ and a decreasing function of $n$, while $f(k)$ is a decreasing function of $k$. Since \begin{align*} g(7,7)&>1.0055>f(12),\\ g(8,8)&>1.0042>f(15),\\ g(9,8)&>1.0011>f(7), \end{align*} we see that if the assumption in the lemma holds, then $g(\nu,n)>f(k)$. This completes the proof of Lemma \ref{lem:v<w}. \end{proof} Now we are ready to prove Proposition \ref{prop:n>}. \begin{proof}[Proof of Proposition $\ref{prop:n>}$] We may assume that $n \ge 2$ in view of Lemma \ref{lem:w1}. Suppose that $\nu$, $n$, $k$ satisfy one of conditions in Lemma \ref{lem:v<w}. Since $m \equiv 0 \pmod{\nu}$ by Lemma \ref{lem:mod}, it suffices to show that \[ v_{(2n-1)\nu}<w_n<v_{2n\nu}. \] This is an immediate consequence of Lemmas \ref{lem:v>w} and \ref{lem:v<w}. \end{proof} \section{Upper bounds for solutions}\label{sec:ub} Put \[ \theta_1:=\sqrt{1-\frac{1}{c}}\quad \text{and}\quad \theta_2:=\sqrt{1-\frac{k}{(k+1)c}}. \] \begin{lem}\label{lem:max<} \[ \max\left\{\left| \theta_1-\frac{k_1sx}{z}\right|,\left|\theta_2-\frac{ty}{(k+1)z}\right|\right\}<\frac{1}{2k_0x^2}. \] \end{lem} \begin{proof} By \eqref{P:yx} and \eqref{P:zx}, we have \begin{align*} \left|\theta_1-\frac{k_0sx}{z}\right|&=\frac{s\sqrt{k_0}}{z\sqrt{c}}\left|z-x\sqrt{k_0c}\right|=\frac{s\sqrt{k_0}}{z \sqrt{c}}\cdot \frac{c-k}{z+x\sqrt{k_0c}}\\ &<\frac{1}{x\sqrt{k_0c}}\cdot \frac{c}{2x\sqrt{k_0c}}=\frac{1}{2k_0x^2},\\ \left|\theta_2-\frac{ty}{(k+1)z}\right|&=\frac{t}{(k+1)z\sqrt{c}}\left|z\sqrt{k+1}-y\sqrt{c}\right|=\frac{t}{(k+1)z\sqrt{c}}\cdot \frac{k(c-k-1)}{z\sqrt{k+1}+y\sqrt{c}}\\ &<\frac{kc}{y\sqrt{c}\cdot 2y\sqrt{c}}=\frac{k}{2y^2}=\frac{k}{2\left\{k_0(k+1)x^2+1\right\}}<\frac{1}{2k_0x^2}. \end{align*} \end{proof} \begin{thm}\label{thm:R} Let $k \ge 3$ and let $N$ be a multiple of $k+1$. If $N \ge 3.76 k^2(k+1)^2$, then \[ \max\left\{\left|\theta_1-\frac{p_1}{q}\right|,\left|\theta_2-\frac{p_2}{q}\right|\right\}>(1.425\cdot 10^{28}(k+1)N)^{-1}q^{-\lambda}, \] where \[ \lambda=1+\frac{\log(10(k+1)N)}{\log(2.66k^{-2}(k+1)^{-1}N^2)}<2. \] \end{thm} \begin{proof} The proof proceeds along the same lines as the one of \cite[Theorem 2.2]{CF} or \cite[Theorem 2.5]{FF}.\par For $0 \le i,\,j \le 2$ and integers $a_0$, $a_1$, $a_2$, we define the polynomial $p_{ij}(x)$ by \begin{align*} p_{ij}(x):=\sum_{ij}\left(\begin{array}{c}k+1/2\\ h_j\end{array}\right) (1+a_jx)^{k-h_j}x^{h_j}\prod_{l \ne j}\left(\begin{array}{c}-k_{ij}\\ h_l\end{array}\right)(a_j-a_l)^{-k_{il}-h_l}, \end{align*} where $k_{il}=k+\delta_{il}$ with $\delta_{il}$ the Kronecker delta, $\sum_{ij}$ denotes the sum over all non-negative integers $h_0$, $h_1$, $h_2$ satisfying $h_0+h_1+h_2=k_{ij}-1$, and $\prod_{l\ne j}$ denotes the product from $l=0$ to $l=2$ omitting $l=j$ (which is expression (3.7) in \cite{R} with $\nu=1/2$). Substituting $x=1/N$ we have \[ p_{ij}(1/N)=\sum_{ij}\left(\begin{array}{c}k+1/2\\ h_j\end{array}\right) C_{ij}^{-1}\prod_{l \ne j}\left(\begin{array}{c}-k_{ij}\\ h_l\end{array}\right), \] where \[ C_{ij}:=\frac{N^k}{(N+a_j)^{k-h_j}}\prod_{l \ne j}(a_j-a_l)^{-k_{il}-h_l}. \] We take $a_0:=-k-1$, $a_1:=-k$, $a_2:=0$ and $N:=(k+1)N_0$ for some integer $N_0$. \par If $j=0$, then \[ |C_{i0}|=\frac{N^k(k+1)^{k_{i1}+h_1+h_0-k}}{(N_0-1)^{k-h_0}}, \] which shows $(k+1)^kN^kC_{i0}^{-1} \in \bZ$. If $j=1$, then \[ |C_{i1}|=\frac{N^kk^{k_{i2}+h_2}}{(N-k)^{k-h_1}}, \] which shows $k^{2k}N^kC_{i1}^{-1} \in \bZ$. If $j=2$, then \[ |C_{i2}|=\frac{N^k(k+1)^{k_{i0}+h_0+h_2-k}k^{k_{i1}+h_1}}{N_0^{k-h_2}}, \] which shows $k^{2k}(k+1)^kN^kC_{i2}^{-1} \in \bZ$. Hence, $\{k^2(k+1)N\}^kC_{ij}^{-1} \in \bZ$ for all $i$, $j$. It follows from \cite[Theorem 2.2]{CF} that \[ p_{ijk}:=2^{-1}\{4k^2(k+1)N\}^k\cdot \frac{1.6^k}{4.09\cdot 10^{13}}\cdot p_{ij}(1/N)\in \bZ. \] Putting $\theta_0:=1$, we obtain \[ |p_{ijk}|<pP^k\quad \text{and}\quad \left|\sum_{j=0}^2 p_{ijk}\theta_j \right|<lL^{-k}, \] where \begin{align*} p&=\frac{4.09\cdot10^{13}}{2}\left(1+\frac{k}{2N}\right)^{1/2}<2.048\cdot 10^{13},\\ P&=\frac{32\left(1+\frac{2k+3}{2N}\right)k(k+1)N}{1.6(2k+1)}<10(k+1)N,\\ l&=\frac{4.09\cdot10^{13}}{2}\cdot \frac{27}{64}\left(1-\frac{k+1}{N}\right)^{-1}<8.692\cdot10^{12},\\ L&=\frac{1.6}{4k^2(k+1)N}\cdot \frac{27}{4}\left(1-\frac{k+1}{N}\right)^2N^3>\frac{2.66N^2}{k^2(k+1)},\\ \lambda&=1+\frac{\log(10(k+1)N)}{\log(2.66k^{-2}(k+1)^{-1}N^2)}<2,\\ C^{-1}&=4pP\left(\max\{1,2l\}\right)^{\lambda-1}<4\cdot 2.048\cdot10^{13}\cdot10(k+1)N\cdot2\cdot8.692\cdot10^{12}\\ &<1.425\cdot10^{28}(k+1)N. \end{align*} This completes the proof of Theorem \ref{thm:R}. \end{proof} Applying Theorem \ref{thm:R} with $N=(k+1)c$, $p_1=k_0(k+1)sx$, $p_2=ty$, $q=(k+1)z$ and Lemma \ref{lem:max<}, we have \[ \left(1.425\cdot 10^{28}(k+1)^2c\right)^{-1}(k+1)^{-\lambda}z^{-\lambda}<\frac{1}{2k_0x^2}. \] Since $z^2=k_0cx^2+c-k<k_0(c+1)x^2$ by $c \le d-1=k_0x^2$, we see from $\lambda<2$ that \begin{align*} x^{2-\lambda}&<\frac12 \cdot 1.425\cdot10^{28}(k+1)^4c(c+1)=7.125\cdot10^{27}\left(1+\frac1k\right)^4\left(1+\frac1c\right)k^4c^2\\ &<\left(1.502\cdot10^{14}k^2c\right)^2. \end{align*} Since \begin{align*} \frac{2}{2-\lambda}&=\frac{2\log \left(2.66k^{-2}(k+1)c^2 \right)}{\log\left(0.266k^{-2}(k+1)^{-1}c\right)}<\frac{4\log(1.884k^{-1/2}c)}{\log(0.1995k^{-3}c)}, \end{align*} we have \begin{align*} \log x < \frac{4\log(1.502\cdot 10^{14}k^2c)\log(1.884k^{-1/2}c)}{\log(0.1995k^{-3}c)}. \end{align*} which combined with Lemma \ref{lem:x>} implies that \begin{align}\label{in:n<} n-1<\frac{4\log(1.502\cdot10^{14}k^2c)\log(1.884k^{-1/2}c)}{\log(4c-3)\log(0.1995k^{-3}c)}. \end{align} Inequality \eqref{in:n<} shows that if $\nu=8$ and $k \ge 662$, then $n \le 7$, and if $\nu=8$ and $k \ge 5$, then $n \le 8$. Moreover, since the right-hand side of inequality \eqref{in:n<} is a decreasing function of $c=c_{\nu}$, we see that if $\nu \ge 9$ and $k \ge 3$, then $n \le 8$. Comparing these upper bounds for $n$ with the lower bounds in Proposition \ref{prop:n>}, we obtain the following. \begin{prop}\label{prop:ub} Besides Assumption \ref{ass}, we assume that one of the following holds$:$ \begin{itemize} \item $\nu=7$ and $k \ge 662$, \item $\nu=8$ and $k \ge 15$, \item $\nu \ge 9$ and $k \ge 7$. \end{itemize} Then, there exist no $D(-k)$-quadruples of the form $\{k,k+1,c,d\}$ with $c=c_{\nu}$ and $1<c<d$. \end{prop} In view of Proposition \ref{prop:ub}, it remains to consider the following cases: \begin{itemize} \item $k=3,~5,~6$, \item $1 \le \nu \le 6$ and $k \ge 7$, \item $\nu=7$ and $7 \le k \le 661$, \item $\nu=8$ and $7 \le k \le 14$. \end{itemize} \section{Linear form in logarithms} We are trying to solve $x=v_m=w_n$, where \[ v_0 = 0, v_1 = 2k_1, v_{m+2} = (4k+2)v_{m+1}-v_m, \] ($k=k_0k_1^2$). The solution of this recurrence relation is \[ v_m = \frac{1}{2\sqrt{k_0(k+1)}}\left( (2k+1+2\sqrt{k^2+k})^m - (2k+1-2\sqrt{k^2+k})^m\right).\] \noindent The other sequence is $w_0 = 0, w_1=2s\sqrt{c-k}, w_{n+2} = (4c-2)w_{n+1}-w_n$, or explicitly \[ w_n = \frac{\sqrt{c-k}}{2\sqrt{ck_0}}\left( (2c-1+2\sqrt{c^2-c})^n - (2c-1-2\sqrt{c^2-c})^n\right).\] \noindent Lemma 3.3 implies that $m> n \geqslant 2$ or $x=v_0=w_0=0$, so we assume $k\geqslant 3$ and $m>n\geqslant 2$. Define $P=\frac{1}{\sqrt{k+1}}(2k+1+2\sqrt{k^2+k})^m$ and $Q= \frac{\sqrt{c-k}}{\sqrt{c}}(2c-1+2\sqrt{c^2-c})^n$. Then $v_m=w_n$ implies that $P-\frac{1}{k+1}P^{-1} = Q-\frac{c-k}{c}Q^{-1}$. Since $c\geqslant c_1 = 4k+1$, we get $\frac{c-k}{c} > \frac{1}{k+1}$. Then \begin{align*} P - Q &= \frac{1}{k+1}P^{-1} - \frac{c-k}{c}Q^{-1} < \frac{1}{k+1}P^{-1} - \frac{1}{k+1}Q^{-1} =\\ &= \frac{1}{k+1}(P^{-1}-Q^{-1}) = \frac{1}{k+1}P^{-1}Q^{-1} (Q-P), \end{align*} hence $Q>P$. Now $Q-P < \frac{c-k}{c}Q^{-1}$, hence $\frac{Q-P}{Q} < \frac{c-k}{c}Q^{-2}$. Since $n\geqslant 2$, $Q > \sqrt{\frac{c-k}{c}}(4\sqrt{c^2-c})^2 = 16(c^2-c)\sqrt{\frac{c-k}{c}}$, so $Q^{-2} < \frac{c}{c-k}\cdot \frac{1}{256(c^2-c)^2}$. We can conclude that $\frac{Q-P}{Q} < \frac{1}{256(c^2-c)^2} \leqslant \frac{1}{6230016}$ because $c\geqslant 1+4k \geqslant 13$. We can get the upper bound on $\log\frac{Q}{P}$, \begin{align*} 0 < \log\frac{Q}{P} &= -\log\left(1-\frac{Q-P}{Q}\right) \leqslant \frac{-\log\left(1-\frac{1}{6230016}\right)}{\frac{1}{6230016}} \cdot \frac{c-k}{c} Q^{-2} \\ &< 1.00001 (2c-1+2\sqrt{c^2-c})^{-2n}. \end{align*} We define the form as $\Lambda = n\log\alpha_1 - m\log\alpha_2+\log\alpha_3$, where \begin{align*} \alpha_1 &= 2c-1+2\sqrt{c^2-c},& & h(\alpha_1) = \frac 12 \log\alpha_1\\ \alpha_2 &= 2k+1+2\sqrt{k^2+k},& & h(\alpha_2) = \frac 12 \log\alpha_2\\ \alpha_3 &= \sqrt{\frac{(c-k)(k+1)}{c}},& & h(\alpha_3) = \frac 12 \log\left((c-k)(k+1)\right). \end{align*} and $h(\alpha_j)$ denotes the absolute logarithmic height of $\alpha_j$ for $1\leqslant j \leqslant 3$. We have already obtained $0 < \Lambda < 1.0001\alpha_1^{-2n}$. This implies that $m < \frac{\log\alpha_1}{\log\alpha_2}(n+1)$. We will now apply the following theorem by Matveev. \begin{theorem}[Matveev] Let $\Lambda$ be a linear form in logarithms of $l$ multiplicatively independent totally real algebraic numbers $\alpha_1, \dotsc, \alpha_l$ with rational integer coefficients $b_1, \dotsc, b_l$ ($b_l \neq 0$). Define $D=[\Q(\alpha_1, \dotsc, \alpha_l) \colon \Q]$, $A_j = \max\{Dh(\alpha_j), |\log \alpha_j|\}$, $B= \max\left\{1, \max\left\{ \frac{|b_j|A_j}{A_l} \colon 1 \leqslant j \leqslant l\right\} \right\}.$ Then \[ \log\Lambda > -C(l)C_0W_0D^2\Omega,\] where $C(l)= \frac{8}{(l-1)!}(l+2)(2l+3)(4e(l+1))^{l+1}, W_0 = \log(1.5eBD\log(eD))$, \\$C_0 = \log\left(e^{4.4l+7}l^{5.5}D^2\log(eD)\right), \Omega=A_1\cdots A_l$. \end{theorem} In our problem, $l=3, b_1=n, b_2=-m, b_3=1, D=4$. Since $B < m < \frac{\log\alpha_1}{\log\alpha_2}(n+1)$, we can get the following bounds $C(3) < 644065984.903$, $C_0 < 29.8847$, $W_0 < \log\left(38.92\cdot \frac{\log\alpha_1}{\log\alpha_2}(n+1)\right)$. For $\Omega$ we can take $\Omega = 8\log\alpha_1\log\alpha_2\log\left((c-k)(k+1)\right)$. Combining the upper and lower bound for $\log\Lambda$ and using $\alpha_2 < 4k+2$, we get \begin{align}\label{in:log} \frac{n}{\log\left(K(n+1)\right)} < 1.23185\cdot 10^{12} \log(4k+2)\log\left((c-k)(k+1)\right), \end{align} where $K=38.92 \frac{\log\alpha_1}{\log\alpha_2}$. \section{Small values of $k$}\label{sec:k} In the case $k=3$, we have $$c-k=1+3s^2-3=3s^2-2,$$ which should be a square. We also know that $s$ is even, i.e. $s=2s'$ for some integer $s'$. Then, putting $3s^2-2=X^2$, for some integer $X$, we get $$X^2-12s'^2=-2,$$ which obviously does not have any integer solutions if we consider congruences modulo 4. \\ In the case $k=5$, we have that $$c-k=5s^2-4$$ is perfect square. Again, because $s$ is even, for $s=2s'$, we get $$X^2-5s'^2=-1,$$ for some integers $X$ and $s'$. Then, remembering the recurrence relation for $s$, we get that $s=v_m=2w_n$ where $$v_0=0,\,v_1=2,\,v_{m+2}=22v_{m+1}-v_m,$$ $$w_0=1,\,w_1=17,\,w_{n+2}=18w_{n+1}-w_n.$$ Using the standard methods, i.e. Baker's theory on a linear form in logarithms, we get that the only solution is $s=v_1=2w_0=2$, which gives us $c=21$. Now, we have the exact values for $k$ and $c$ and we can again use the linear form in logarithms described above, and it will gives us the desired result. \\ In the case $k=6$, we have that $-k\equiv2\pmod{4}$ and then it is known that there is no $D(-6)$-quadruple. \section{Small indices $\nu \in \{1, 2, 3, 4, 5, 6, 7, 8\}$ }\label{sec:2-8} \subsection{Case $\nu \in \{7,8\}$}\label{subsec:78} Whenever we have fixed $k$ and $c=c_{\nu}$, we can solve our problem using inequalities \eqref{in:log}. After getting the first upper bound on $n$, we can reduce it using the well-known Baker-Davenport reduction method, which gives us the desired result in all cases. More precisely, in the case $c=c_7$, for $7\leq k\leq 661$ we get $n<4.73\cdot10^{16}$, and in the case $c=c_8$, for $7\leq k \leq14$ we get $n<1.39\cdot10^{16}$. Using the reduction, after at most two steps we get $n\leq2$ and we can check that the only solution for $x$ is $x=v_0=w_0=0$ which gives us $c=1$. \subsection{Case $\nu =1$}\label{subsec:1} For $\nu=1$ we have $c=c_1=1+4k$, $k\geq7$. Now, $c-k=1+3k$ should be a square which implies $1+3k=(3l\pm1)^2$ or $k=l(3l\pm2)$ for some positive integer $l$. Thus, $\sqrt{c-k}=3l\pm1$. In this case $s=s_1=2k_1$ and we want to solve $v_m=w_n$, for positive integers $m$ and $n$, where $$v_0=0,\, v_1=2k_1,\,v_{m+2}=(4k+2)v_{m+1}-v_m,$$ $$w_0=0,\, w_1=4k_1(3l\pm1),\,w_{n+2}=(16k+2)w_{n+1}-w_n.$$ Considering congruences modulo $2k_1(4k+1)$ we get $$v_m\equiv0,\pm2k_1\pmod{2k_1(4k+1)},$$ $$w_n\equiv(-1)^{n+1}4nk_1(3l\pm1)\pmod{2k_1(4k+1)},$$ which implies $$(-1)^{n+1}4nk_1(3l\pm1)\equiv0,\pm2k_1\pmod{2k_1(4k+1)}.$$ Now, from $$3(4k+1)=(12l\pm4)(3l\pm1)-1,$$ we see that $(3l\pm1)$ and $(4k+1)$ are relatively prime and then $$\pm2n\equiv0,\pm(12l\pm4)\pmod{(4k+1)},$$ which, in the worst case, implies that $$2n>2(4k+1)-12l-4>4k.$$ Assuming $n\geq2$, we can combine this lower bound for $n$ with the upper bound \eqref{in:log} to get $k<8.528\cdot10^{16}$ and finally $l<1.68603\cdot10^8$, which is small enough to do the Baker-Davenport reduction method, which gives us the desired result in the same way as in the last subsection. \subsection{Cases $\nu \in \{2, 3, 4, 5\}$}\label{subsec:2-5} For $\nu = 2$ we get $y^2 = c_2-k = k_0s_2^2+1-k= 64k^3+64k^2+15k+1$. This is an elliptic curve. Multiplying by $64$ and letting $X=16k, Y=8y$, we get Weierstrass form $Y^2 = X^3+16X^2+60X+64$. Using Sage to find integral points on this curve and condition $16\mid X$ gives that $64k^3+64k^2+15k+1$ is a square only for $k=0$ and $k=1$ ($1^2$ and $12^2$). For $c_3$ we get $y^2 = c-k = 1 + 35 k + 384 k^2 + 1408 k^3 + 2048 k^4 + 1024 k^5$, but the right-hand side can be factored to $(1 + 16 k + 32 k^2) (1 + 19 k + 48 k^2 + 32 k^3)$. The factors are relatively prime, so $1 + 19 k + 48 k^2 + 32 k^3$ must also be a square. This gives us another elliptic curve and as before, one gets only a few points on it (for $k=0, 1$ and $165$). For $c_4$, $y^2 = 1+63k + 1280k^2+9472k^3 +32768k^4+57344k^5 + 49152k^6+16384k^7$ factors as $y^2 = (1 + 32 k + 128 k^2 + 128 k^3) (1 + 31 k + 160 k^2 + 256 k^3 + 128 k^4)$, so $Y^2 = 1 + 32 k + 128 k^2 + 128 k^3$. Only nonnegative integral $k$ are $k=0$ and $k=1$. For $c_5$, $y^2 = (1 + 48 k + 352 k^2 + 768 k^3 + 512 k^4) (1 + 51 k + 400 k^2 + 1120 k^3 + 1280 k^4 + 512 k^5)$, so $Y^2=1 + 48 k + 352 k^2 + 768 k^3 + 512 k^4$. Using IntegralQuarticPoints([512, 768, 352, 48, 1]) in Magma, we get that the only integral solutions are $(1, -41), (-1, 7 ), ( 0, -1 )$. \subsection{Case $\nu = 6$: hyperelliptic curve of genus $2$}\label{subsec:6} For $\nu=6$, we get \[ y^2=(1 + 72 k + 768 k^2 + 2816 k^3 + 4096 k^4 + 2048 k^5) (1 + 71 k + 840 k^2 + 3584 k^3 + 6912 k^4 + 6144 k^5 + 2048 k^6).\] The factors on the right hand side are relatively prime, so each one has to be a complete square. We focus on the first factor. If $1 + 72 k + 768 k^2 + 2816 k^3 + 4096 k^4 + 2048 k^5$ is a square, then so is $16(1 + 72 k + 768 k^2 + 2816 k^3 + 4096 k^4 + 2048 k^5)=16+\dots+(8k)^5$. This allows us to make the coefficients smaller by a change of variable $x=8k$ and multiplying $y$ by $4$. Now, we are looking for integral points on the following hyperelliptic curve \[ C_6 : y^2 =x^5 + 16x^4 + 88x^3 + 192x^2 + 144x +16.\] We resolve this problem using methods developed by Gallegos-Ruiz in his PhD thesis \cite{PhD} and in \cite{Gall}. Using Magma \cite{mgma}, one can determine generators for the Mordell-Weil group of $J_6 (\Q)$, the Jacobian of $C_6$. We obtain that $J_6(\Q)$ is free of rank $r=2$ with Mordell-Weil basis (written in Mumford representation that Magma uses): \[ D_1 = \langle x+2, -4\rangle, \quad D_2 = \langle x^2 + 8x + 12, 4\rangle, \] while the torsion subgroup is trivial (so we let $t=1$, the size of the torsion subgroup). Baker's method, improved in \cite{Gall}, gives us a very large bound $\log |x| \leqslant 1.53106\cdot 10^{489}$. Every integral point $P$ on the curve $C_6$ can be expressed as $P-\infty = n_1D_1+n_2D_2$ with norm $||(n_1, n_2)|| \leqslant 1.2203552 \cdot 10^{245} =:N$, by the Corollary 3.2 of \cite{Gall}. Proposition 6.2 from the same paper gives us an estimate of the precision we need for the computations that will follow. This bound is $\displaystyle \left(\frac 15(48\sqrt{r}Nt+12\sqrt{r}N+5N+48)\right)^{(r+4)/4} \approx 3.25\cdot 10^{369}$. We need a constant $K$ larger than this and we chose $K=10^{750}$, and the computations were done with $1000$ digits of precision. The hyperelliptic logarithms of the base divisors are given by \begin{align*} \varphi (D_1) &= (-0.57355...-i1.292539..., -0.337441...+i0.979713...) \\ \varphi(D_2) &= (-0.09728...+i0.691157..., -0.40469...-i2.809269...). \end{align*} The chosen $K$ reduces the bound on the norm of the coefficients to $129.97...$. We then repeat the reduction process with $K=10^{10}$ and this reduces the bound on $||(n_1, n_2)||$ to $17.9141...$, which is sufficiently low for the simple search. Now we just compute all possible expressions of the form $n_1D_1+n_2D_2$ where $||(n_1, n_2)|| \leqslant 17.92$. This shows that the only integral points on the curve $C_6$ are \[ \{ \infty, (0, -4), (0, 4), (-2, -4), (-2, 4), (-6, -4), (-6, 4), (8, -396), (8, 396)\}. \] Since $x=8k$, returning to the original factor $1 + 72 k + 768 k^2 + 2816 k^3 + 4096 k^4 + 2048 k^5$, we see that it is a square only for $k=0, 1$. \section*{Acknowledgements} N.~A.~and A.~F.~were supported by the Croatian Science Foundation under the project no.~IP-2018-01-1313. Y.~F.~is supported by JSPS KAKENHI Grant Number 16K05079.
\section{Introduction} In this paper, we study Markov chains through its embedding on a discrete random dynamical system with white noise. This approach goes back to Furstenberg in his pioneer work on random products, see \cite{Fur}. Namely, let $X=\{X_{n}\}$ be an independent and identically distributed (i.i.d.) sequence of random variables taking values on a measurable space $E$ and consider a family $\{f_{\alpha}\}_{\alpha\in E}$ of maps $f_{\alpha}\colon S\to S$. Under appropriate measurability assumptions, these two ingredients specify a homogeneous Markov chain with state space $S$ given by \begin{equation}\label{i.i.d.} Z_{n}=f_{X_{n-1}}\circ \dots \circ f_{X_{0}}(Z_{0}) \end{equation} called an \emph{i.i.d. random iteration of maps}, where $Z_{0}$ is a random variable independent of $X=\{X_{n}\}$ taking values on $S$. It is well known that any Markov chain on a standard measurable space admits a representation as in \eqref{i.i.d.}, see Kifer \cite{Kifer}. In this setting, Markov chains have been extensively investigated. It is worth mentioning that there is no unifying technique to be applied in this study. They vary according to the class of maps chosen. A notable example is the seminal work of Hutchinson \cite{Hu}. Therein, the author considers a finite number of contractions maps on a complete metric space and shows that the induced transition probability is asymptotically stable, i.e., that there exists a unique initial distribution (the distribution of $Z_{0}$) for which the Markov chain $Z_{n}$ is stationary, and under every initial distribution the sequence $Z_{n}$ converges in distribution to the stationary measure. The topological support of the stationary measure is a compact set called the \emph{Hutchinson attractor} and plays a fundamental role in the study of fractals. The development of this theory has found applications in diverse areas such as computer graphics, image compression, and fractal theory. From the probabilistic point of view, the results of the ``Hutchinson theory'' were generalized for contracting on average systems. Namely, the asymptotic stability was proved for i.i.d. random iterations of finitely many Lipschitz maps having negative extremal Lyapunov exponent in \cite{Bar1}. Later a generalization for infinitely many maps was given in \cite{Diaconis}. See also \cite{placedependent} for a generalization for iterated function systems with place dependent probabilities and \cite{Stark} for related results on stationary random iterations of Lipschitz maps. Also, we observe that a central limit theorem (CLT) was obtained in some cases, see \cite{Benda, Stenflo, Biao}. In this paper, we study statistical properties of $Z_{n}$ for a certain class of continuous monotone maps on $\mathbb{R}^{k}$ with respect to suitable partial orders. Two of our main results are asymptotic stability and a functional central limit theorem (FCLT), see Theorems \ref{pullback} and \ref{functionalclt}. We observe that an analysis of extremal Lyapunov exponents does not take place here. Indeed, we do not even assume the maps are Lipschitz. The study of i.i.d. random iterations of monotone maps goes back to Dubins and Friedman \cite{Dubins}, where they consider continuous monotone maps on the unit interval and prove the asymptotic stability assuming a condition called \emph{splitting condition}. A generalization of this result in higher dimensions was given in \cite{BhLe} for a class of non-decreasing continuous maps (w.r.t. the componentwise order) defined on a closed subset $S\subset\mathbb{R}^{k}$. Therein, the authors also state a functional central limit theorem in higher dimensions. However, the proof presented for the FCLT works only on dimension one. A corrected proof was given two decades later in \cite{Bhbook} under a stronger hypothesis than the previous one. These results have found applications in mathematical economics and nonlinear autoregressive models, see \cite{Bhbook, BhLe}. Our paper partially follows the same line of \cite{BhLe} in the sense that the asymptotic stability and the FCLT are also stated for an appropriate extension for higher dimensions of the splitting condition introduced in \cite{Dubins}. We consider a generalization of the strict componentwise order for which the induced family of monotone maps widely enlarge the class of monotone maps with respect to the strict componentwise order. However, the ideas from \cite{BhLe} can not be adapted to this context. To overcome this situation we follow a dynamical system approach. It is noteworthy that we established an FCLT for a family consisting of both increasing and decreasing maps, while in \cite{Bhbook} the techniques work only for families of non-decreasing maps with respect to the componentwise order. Our strategy consists in studying the topological behavior of $Z_{n}$ and its ``dual'' $\hat Z_{n}$, a sequence of random variables defined by taking reverse order iterations $$ \hat Z_{n}=f_{X_{0}}\circ \dots \circ f_{X_{n-1}}(Z_{0}). $$ A relation between asymptotic stability and the topological convergence of the sequence $\hat Z_{n}$ is given by a well-known result called the Letac principle. See \cite{Letac} for more details. On the other hand, the functional central limit theorem is obtained through an analysis of the dynamical behavior of $Z_{n}$. More precisely, we investigate the \emph{synchronization phenomenon} for i.i.d. random iterations of monotone maps, see Theorem \ref{sync}. The synchronization phenomenon was first observed by Huygens \cite{Huygens} in the movement of two pendulum clocks hanging from a wall and since then has been investigated in several areas, see \cite{syncrhonizationbook}. For random iterations, results on synchronization were obtained in several settings where no contraction-like property is given a priori, see \cite{Antonov, Goro,Homburg, KlepAntonov,Malicet}. The synchronization in a random environment manifests itself in several ways, whether local, in mean, or global. In this paper, the synchronization appears globally, meaning that the topological behavior of $Z_{n}^{x}$ is asymptotically the same for all $x\in S$, where $Z_{n}^x$ denotes the Markov chain in \eqref{i.i.d.} with initial distribution $Z_{0}=x$. In other words, for every pair $x,y\in S$, the i.i.d. random iterations $Z_{n}^{x}$ and $ Z^{y}_{n}$ satisfy $$ d(Z^{x}_{n}, Z^{y}_{n})\underset{n\to \infty}\longrightarrow 0 $$ with probability $1$, where $d$ is the distance in $S$. The synchronization of i.i.d. random iterations, or some contraction property, usually leads to a central limit theorem (CLT). In \cite{Benda, Biao}, central limit theorems are obtained for a certain class of i.i.d. random iterations of Lipschitz maps having negative Lyapunov exponent. For an i.i.d. random iteration of homeomorphisms on the circle, Malicet in \cite{Malicet} shows that a local synchronization holds under the assumption that the maps do not have an invariant measure in common. This result was later used to prove a CLT in \cite{Annaa}. In \cite{Stenflo}, a central limit theorem is obtained for contractive iterated function systems with place-dependent probabilities. Most of the synchronization properties in the literature are derived from Lyapunov exponents, with a suitable definition in each setting. However, in some situations Lyapunov exponents play no role. For instance, this is the case of the i.i.d. random iteration of double rotations studied in \cite{Goro}, where the authors obtain a synchronization on average using properties of simple random walks on $\mathbb{Z}$. In our paper, we also do not use Lyapunov exponents. Instead, we explore our extension of the splitting condition to show the shrinking of the entire space under the action of the random compositions of the monotone maps. Finally, for the class of i.i.d. random iterations of monotone maps that we consider in this paper, as a simple consequence of our study of the sequence $\hat Z_{n}$, we characterize stationary measures as the distribution of pullback random attractors, a notion of random attractors introduced by Crauel and Flandoli in \cite{CrauelFranco}. We refer to \cite{Recurrent, EdgarD,Volk} for related results for Markovian random iterations of finitely many maps. \subsection*{Organization of the paper} In Section \ref{mainn} we state precisely the main definitions and results of this work. In Section \ref{p1} we prove Theorem \ref{pullback} and Corollary \ref{Cor1}. In Section \ref{p2} we prove Theorem \ref{sync} and Corollaries \ref{expofastW} and \ref{Cor2}. Theorem \ref{functionalclt} is proved in Section \ref{p3}. \section{Statements of results}\label{mainn} \subsection{General setting}\label{GS} Let $(E,\mathscr{F}, \nu)$ be a probability space and consider an i.i.d. sequence of random variables $X=\{X_{n}\}$ with state space $E$. Throughout, $\nu$ denotes the common distribution of $X$ and $(\Omega, \mathscr{F},\mathbb{P})$ is the probability space where $X$ is defined. Let $S\subset \mathbb{R}^{k}$ be a connected subspace and consider a measurable map $f\colon E\times S\to S$. We denote by $f_{\alpha}$ the map $f_{\alpha}(x)=f(\alpha,x)$. For every random variable $Z_{0}\colon \Omega\to S$ independent of $X$, the pair $(f,X)$ induces a homogeneous Markov chain $Z_{n}$ as defined in \eqref{i.i.d.}, whose transition probability is given by \begin{equation}\label{tp} p(x, A)=\int \mathds{1}_{A}(f_{\alpha}(x))\, d\nu(\alpha). \end{equation} The pair $(f,X)$, as well as any of its induced Markov chain, will be called an \emph{i.i.d. random iteration of maps}. Now, let us introduce the class of maps that we study in this paper. Consider a subset $J\subset\{1,\dots, k\}$ and define a partial order as follows: given $x,y\in \mathbb{R}^{k}$, we write $x<_{J} y$ if and only if $$ x_{i}<y_{i} \,\,\, \mbox{ for }\,\,\, i\in J \,\,\,\mbox{ and }\,\,\, x_{i}>y_{i} \,\,\, \mbox{ for }\,\,\, i\notin J. $$ Note that if $J=\{1,\dots, k\}$, then the induced order is the well-known strict componentwise order. We say that a map $f\colon S\to S$ is $J$-\emph{increasing} if $$ x<_{J}y \Rightarrow f(x)<_{J}f(y). $$ Similarly, we say that $f$ is $J$-\emph{decreasing} if $$ x<_{J}y \Rightarrow f(y)<_{J}f(x). $$ The map $f$ is called $J$-\emph{monotone} if $f$ is either $J$-increasing or $J$-decreasing. Given subsets $S_{1}, S_{2}\subset \mathbb{R}^{k}$, we write $S_{1}<_{J} S_{2}$ if $$ x<_{J}y\,\,\, \mbox{for every} \,\,\, x\in S_{1}\,\,\,\mbox{and}\,\,\, y\in S_{2}. $$ Let $\pi_{s}\colon \mathbb{R}^k\to \mathbb{R}$ be the natural projection $\pi_{s}(x)=x_{s}$, $s=1,\dots, k$. \begin{remark}\label{capempty} \emph{ A crucial property of the partial order $<_{J}$ for the proofs of our main theorems is the following: if $S_{1}<_{J} S_{2}$, then $$ \pi_{s}(S_{1})\cap \pi_{s}(S_{2})=\emptyset $$ for every $s=1,\dots, k$. In other words, the respective projections of $S_{1}$ and $S_{2}$ are disjoints. In particular, for every $J$-monotone map $f$ we have that $f(S_{1})$ and $f(S_{2})$ have disjoints projections because either $f(S_{1})<_{J}f(S_{2})$ or $f(S_{2})<_{J}f(S_{1})$.} \end{remark} \begin{figure}[h!] \centering \begin{tikzpicture}[xscale=3.5,yscale=3.5] \draw[->] (0,0)-- (1,0); \draw[->] (0,0)--(0,1); \draw (0.2,0.7) ellipse (1mm and 1.8mm); \draw (0.8,0.2) ellipse (1.2mm and 1mm); \draw[dashed] (0,1)--(1,1); \draw[dashed] (1,0)--(1,1); \draw[dashed] (0.2,0.88)--(0,0.88); \draw[dashed] (0.2,0.52)--(0,0.52); \draw[dashed] (0.8,0.3)--(0,0.3); \draw[dashed] (0.8,0.1)--(0,0.1); \node[scale=0.8,left] at (0.45,0.7) {$S_{1}$}; \node[scale=0.8,above] at (0.85,0.3) {$S_{2}$}; \node[scale=0.8,left] at (2.2,0.2) {$f(S_{1})$}; \node[scale=0.8,below] at (1.92,0.8) {$f(S_{2})$}; \node[scale=0.8,below] at (0.8,0) {$\pi_{1}(S_{2})$}; \node[scale=0.8,below] at (0.2,0) {$\pi_{1}(S_{1})$}; \node[scale=0.8,left] at (0,0.2) {$\pi_{2}(S_{2})$}; \node[scale=0.8,left] at (0,0.7) {$\pi_{2}(S_{1})$}; \draw[dashed] (0.1,0.7)--(0.1,0); \draw[dashed] (0.3,0.7)--(0.3,0); \draw[dashed] (0.68,0.2)--(0.68,0); \draw[dashed] (0.92,0.2)--(0.92,0); \draw[->] (1.5,0)-- (2.5,0); \draw[->] (1.5,0)--(1.5,1); \draw (1.7,0.8) ellipse (1mm and 1.4mm); \draw (2.3,0.2) ellipse (1.2mm and 1mm); \draw[dashed] (1.5,1)--(2.5,1); \draw[dashed] (2.5,1)--(2.5,0); \end{tikzpicture} \caption{The action of a $J$-decreasing map on $\mathbb{R}^{2}$ for $J=\{1\}$. Take, for instance, $f(x,y)=(\arctan(y-x), e^{x-y})$.} \label{f.nonregular} \end{figure} In this paper, we study i.i.d. random iterations of $J$-monotone maps satisfying the following ``topological'' property: \begin{definition}\label{Definition1} \emph{ We say that an i.i.d. random iteration $(f,X)$ of $J$-monotone maps satisfies the $J$-\emph{splitting condition} if there are $m\in \mathbb{N}$ and measurable subsets $A$ and $B$ of $E^m$ with $\nu^m(A)>0$ and $\nu^m(B)>0$ such that for every $(\alpha_{0},\dots, \alpha_{m-1})\in A$ and $(\beta_{0},\dots, \beta_{m-1})\in B$ we have $$ f_{\alpha_{0}}\circ\dots \circ f_{\alpha_{m-1}}(S)<_{J} f_{\beta_{0}}\circ\dots \circ f_{\beta_{m-1}}(S). $$} \end{definition} This condition is a generalization of the splitting condition introduced in \cite{Dubins} and is closely related to the splitting condition considered in \cite{Bhbook, BhLe}, see the discussion in Section \ref{S.stationary}. \subsection{Stationary measures}\label{S.stationary} Let $p$ be the transition probability defined in \eqref{tp}. Associate with $p$ there is an operator acting on the space of probability measures on $S$ given by $\mu\mapsto T\mu$, where $T\mu$ is the probability measure defined by $$ T\mu(A)=\int p(x,A)\, d\mu(x) $$ for every Borel set $A\subset S$. A fixed point for $T$ is called a \emph{stationary measure}. In other words, a probability measure $\mu$ on $S$ is a stationary measure if \[ \mu(A)=\int p(x,A)\, d\mu(x) \] for every Borel set $A\subset S$. We say that $T$ is \emph{asymptotically stable} if there is a stationary measure $\mu$ such that for every probability measure $\varsigma$ we have that $T^{n}\varsigma$ converges to $\mu$ in the weak-star topology. Results on the stability of Markov operators for i.i.d. random iterations of monotone continuous maps go back to Dubins and Freedman \cite{Dubins}. Therein, asymptotic stability is proved for Markov operators associated with i.i.d. random iterations of monotone maps on $[0,1]$ satisfying a condition called \emph{splitting condition}: there are $x_{0}\in \mathbb{R}$ and $m\geq 1$ such that \begin{equation}\label{bata} \mathbb{P}(Z_{m}^x\leq x_{0}\,\, \forall x)>0 \quad \mbox{and}\quad \mathbb{P}(Z_{m}^x\geq x_{0}\,\, \forall x)>0. \end{equation} This result was generalized in higher dimensions in \cite{Bhbook,BhLe} for i.i.d. random iterations of monotone maps defined on a closed subset $S\subset \mathbb{R}^{k}$ satisfying the multidimensional analog of the splitting condition, where the total order $\leq$ of $\mathbb{R}$ is replaced by the componentwise order on $\mathbb{R}^k$. Recall that the componentwise order is a partial order $\leq $ defined by: $x\leq y$ if and only if $x_{i}\leq y_{i}$ for every $i=1,\dots ,k$. It is not difficult to see that in the case $<_{J}$ is the strict componentwise order (i.e., $J=\{1,\dots, k\}$), a $J$-monotone map is also a monotone map with respect to the componentwise order and an i.i.d. random iteration of $J$-monotone maps satisfying the $J$-splitting condition also satisfy the splitting condition with respect to the componentwise order $\leq$ as defined in \eqref{bata}. Our first result states the asymptotic stability of Markov operators associated with i.i.d. random iterations of $J$-monotone continuous maps satisfying the $J$-splitting condition, extending the results on asymptotic stability in \cite{Bhbook,BhLe} for a considerable class of monotone maps. In what follows, for any measurable map $\pi\colon \Omega\to S$ we denote by $\pi\mathbb{P}$ the image of $\mathbb{P}$ by $\pi$, i.e., the probability measure on $S$ given by $\pi\mathbb{P}(A)=\mathbb{P}(\pi^{-1}(A))$ for every Borel set $A\subset S$. The probability measure $\pi\mathbb{P}$ is also called the distribution of $\pi$. \begin{mtheorem}\label{pullback} Let $S$ be a connected closed subset of $\mathbb{R}^k$ and let $(f,X)$ be an i.i.d. random iteration of $J$-monotone continuous maps on $S$ satisfying the $J$-splitting condition. Then \begin{enumerate} \item [(i)] There is a measurable map $\pi\colon \Omega\to S$ such that for $\mathbb{P}$-almost every $\omega$ we have \[ \pi(\omega)=\lim_{n\to \infty} f_{X_{0}(\omega)}\circ\dots\circ f_{X_{n}(\omega)}(x) \] for every $x\in S$. \item[(ii)]The probability measure $\pi\mathbb{P}$ is the unique stationary measure and for every probability measure $\varsigma$ on $S$ we have $$ T^n\varsigma\to \pi\mathbb{P} $$ in the weak-star topology, where $T$ is the Markov operator. \end{enumerate} \end{mtheorem} The second item of Theorem \ref{pullback} says that the Markov operator is asymptotically stable. We observe that the proof of item (ii) follows from item (i) and the Letac principle, see \cite{Letac}. \subsubsection{Pullback attractor}\label{Apullbak} In this section, we take an alternative point of view of i.i.d. random iterations in order to show that the map $\pi$ of Theorem \ref{pullback} is a \emph{pullback random attractor}. We observe that this notion and several notions of random attractors have been extensively studied by Crauel et al. in \cite{CrauelHans,CrauelHans2, CrauelHans3,CrauelDebussche,CrauelDimitroff, CrauelFranco}. See also Section \ref{forwardattractor}. Let $\Omega=E^ {\mathbb{Z}}$ be the product space endowed with the product $\sigma$-algebra and the product measure $\mathbb{P}=\nu^{\mathbb{Z}}$. Consider a measurable map $f\colon E\times S\to S$ and denote by $f_{\alpha}$ the map $f_{\alpha}(x)=f(\alpha,x)$. Following Arnold \cite{Arnold}, the map $\varphi\colon \mathbb{N}\times \Omega\times S\to S$ given by \begin{equation}\label{newphi} \varphi(n,\omega,x)=f_{\omega_{n-1}}\circ \dots \circ f_{\omega_{0}}(x)\stackrel{\scriptscriptstyle\rm def}{=} f_{\omega}^{n}(x) \end{equation} is called an \emph{i.i.d. random iteration of maps}. Note that the sequence of natural projections $X_{n}(\omega)=\omega_{n}$, $n\geq 0$, is an i.i.d. sequence of random variables with distribution $\nu$. Hence the sequence $\omega\mapsto f_{\omega}^{n}(x)$ is also an i.i.d. random iteration in the sense of \eqref{i.i.d.}. We say that the map $\varphi$ satisfies the $J$-splitting condition if $(f,X)$ does satisfy. We recall that a (global point) \emph{pullback random attractor} of $\varphi$ is a $\varphi$-invariant random compact set $\omega\mapsto K(\omega)$ such that for every $x\in S$ $$ \lim_{n\to \infty}d(\varphi(n,\sigma^{-n}(\omega),x),K(\omega))=0, $$ for $\mathbb{P}$-almost every $\omega$, where $\sigma$ is the shift map on $\Omega$. See for instance Crauel and Scheutzow \cite{CrauelScheutzow}. As a consequence of Theorem \ref{pullback} we have: \begin{corollary}\label{Cor1} Let $S$ be a connected closed subset of $\mathbb{R}^k$ and let $\varphi$ be an i.i.d. random iteration of $J$-monotone continuous maps on $S$ satisfying the $J$-splitting condition. Then, there is a measurable map $\pi\colon \Omega\to S$ such that for every $x\in S$ $$ \lim_{n\to \infty}d(\varphi(n,\sigma^{-n}(\omega),x),\pi(\omega))=0 $$ for $\mathbb{P}$-almost every $\omega$. Moreover, the distribution of $\pi$ is the unique stationary measure. \end{corollary} Corollary \ref{Cor1} says that the random compact set $\omega\mapsto \{\pi(\omega)\}$ is a pullback random attractor. As an example, consider the maps $f_{1}(x)=e^x$ and $f_{2}(x)=-e^{x}$ on $\mathbb{R}$. We take $E=\{1,2\}^{\mathbb{Z}}$ and $\mathbb{P}=\nu^{\mathbb{Z}}$, where $\nu$ is a probability measure on $\{1,2\}$ such that $\nu(\{i\})>0$ for $i=1,2$. Then, the i.i.d. random iteration $\varphi$ given by $$ \varphi(n,\omega,x)=f_{\omega_{n-1}}\circ \dots \circ f_{\omega_{0}}(x) $$ satisfies the $J$-splitting condition. \subsection{Synchronization}\label{syncq} We say that an i.i.d. random iteration of maps $(f,X)$ satisfy the \emph{synchronization property} if for every $x$ and $y$, there is a measurable set $\Omega^{x,y}\subset \Omega$ with $\mathbb{P}$-full measure, such that $$ \lim_{n\to \infty}d(Z_{n}^{x}(\omega),Z_{n}^{x}(\omega))=0 $$ for every $\omega\in \Omega^{x,y}$. In other words, given any $x$ and $y$, with probability $1$, the random orbits $Z_{n}^{x}$ and $Z_{n}^{y}$ converge to each other. In what follows, we use $f_{\omega}^{n}(x)$ to denote $Z_{n}^{x}(\omega)$. The class of i.i.d. random iterations of Lipschitz maps with negative maximal Lyapunov exponent is the most known class satisfying the synchronization property. Namely, let $(f,X)$ be an i.i.d. random iteration of Lipschitz maps and assume that there is an integrable map $c\colon \Omega\to \mathbb{R}$ such that for $\mathbb{P}$-almost every $\omega$ we have $$ d(f_{\alpha}(x),f_{\alpha}(y))\leq c(\omega)d(x,y) $$ for every $x,y\in S$. The \emph{maximal Lyapunov exponent} of the i.i.d. random iteration $(f,X)$ is defined by $$ \lambda(\omega)=\lim_{n\to\infty} \frac{1}{n}\log \sup_{x,y}\frac{d(f^{n}_{\omega}(x),f^{n}_{\omega}(y))}{d(x,y)}. $$ The above limit exits for $\mathbb{P}$-almost every $\omega$ by Kingman's theorem, see \cite{Stark}. Note that if the Lyapunov exponent is bounded (a.e.) by a negative constant, then it follows from the definition that there are a measurable map $C\colon \Omega\to \mathbb{R}$ and $\lambda<1$ such that $$ d(f_{\omega}^{n}(x),f^{n}_{\omega}(y))\leq C(\omega) \lambda^n d(x,y). $$ In other words, negative maximal Lyapunov exponent implies exponentially fast synchronization. A practical way to verify the negativity of the Lyapunov exponent is the following estimate \begin{equation}\label{folk} \lambda(\omega)\leq \int \log c(\omega)\, d\mathbb{P}(\omega)\stackrel{\scriptscriptstyle\rm def}{=} \lambda_{0} \end{equation} for $\mathbb{P}$-almost every $\omega$. This seems to be a folklore result and we do not found a reference stating \eqref{folk} explicitly. We observe that this estimate holds for any \emph{stationary} random iteration of Lipschitz maps (not necessarily i.i.d. random iterations). A proof can be performed using ideas from \cite[Section 5]{Stark}. In our next theorem, we present a result stating exponentially fast synchronization for a certain class of i.i.d. random iterations of $J$-monotone continuous maps. Under an additional boundedness condition on the maps we show that the $J$-splitting condition implies (uniform) synchronization. We observe that in our study a negative extremal Lyapunov exponent is replaced by the $J$-splitting condition. \begin{assumption}\label{A2} There are a bounded set $B$ and $m_{0}$ such that $$ f_{\omega}^{m_{0}}(S)\subset B $$ for $\mathbb{P}$-almost every $\omega$. \end{assumption} Clearly, Assumption \ref{A2} holds when either $S$ is bounded or the images of the maps $f_{\alpha}$ are bounded. For an example where neither $S$ is bounded nor the images of the maps are bounded, consider the maps $f_{1},f_{2}\colon \mathbb{R}\to \mathbb{R}$ where $f_{1}(x)=e^{-x}$ and $f_{2}$ is a strictly monotone map whose image is a bounded subset $B_{0}$ of $(-\infty,0)$. Then, for every $i,j\in\{1,2\}$ the composition $f_{i}\circ f_{j}$ has image contained in $B\stackrel{\scriptscriptstyle\rm def}{=} B_{0}\cup [0,1]$. \begin{mtheorem} \label{sync} Let $S$ be a connected subset of $\mathbb{R}^k$ and let $(f,X)$ be an i.i.d. random iteration of $J$-monotone continuous maps on $S$ satisfying the $J$-splitting condition. Then, under Assumption \ref{A2}, there exist constants $r<1$ and $m_{0}\geq 1$, and an integrable map $c\colon \Omega\to [0,\infty)$ such that for $\mathbb{P}$-almost every $\omega$ \[ \emph{diam}\,f_{\omega}^{n}(S)\leq c(\omega)r^n \] for every $n\geq m_{0}$. \end{mtheorem} Let us illustrate Theorem \ref{sync} presenting an example of i.i.d. random iterations of Lipschitz maps satisfying the synchronization property, which can not be deduced from the extremal Lyapunov exponent. Take an i.i.d. random iteration of two Lipschitz maps $f_{1}$ and $f_{2}$ with Lipschitz constants equal to $2$ and $\frac{1}{2}$, respectively. If we denote $p_{i}\stackrel{\scriptscriptstyle\rm def}{=}\mathbb{P}(X_{0}=i)>0$, $i=1,2$, we have $$ \lambda_{0}=p_{1}\cdot\log 2+p_{2}\cdot \log \frac{1}{2}=(p_{1}-p_{2})\cdot \log 2. $$ Then, $\lambda_{0}$ is negative, if and only if, $p_{1}< p_{2}$. On the other hand, if the maps are $J$-monotone and the induced i.i.d. random iteration satisfies the $J$-splitting condition (if the images of $f_{1}$ and $f_{2}$ are disjoint for instance), then Theorem \ref{sync} applies independently of the signal of $p_{1}-p_{2}$. \subsubsection{Exponentially fast convergence in the Wasserstein distance} Under assumptions of Theorem \ref{sync}, we are able to improve item (ii) of Theorem \ref{pullback} by showing exponentially fast convergence in the Wasserstein distance. Recall that for any pair of probability measures $\mu_{1}$ and $\mu_{2}$ on $S$ of bounded supports, the $1$-Wasserstein distance $W_{1}$ is given by \[ W_{1}(\mu_{1},\mu_{2})=\sup \left|\int f\, d\mu_{1}-\int f\, d\mu_{2}\right|, \] where the sup is taken over all Lipschitz maps with Lipschitz constant $1$. \begin{corollary}\label{expofastW} Under assumptions of Theorem \ref{sync}, we have the following: \begin{enumerate} \item[(i)] $\pi\mathbb{P}$ has bounded support and there is $m_{0}$ such that for every probability measure $\varsigma$ the probability measure $T^n\varsigma$ has bounded support for every $n\geq m_{0}$. \item[(ii)] There are $C$ and $r<1$ such that for every probability measure $\varsigma$ on $S$ \[ W_{1}(T^n\varsigma, \pi\mathbb{P})\leq C r^{n} \] for every $n\geq m_{0} $ . \end{enumerate} \end{corollary} An exponentially fast convergence is also obtained in \cite{Bhbook,BhLe} for the $n$-step transition probability of an i.i.d. random iteration of monotone maps (w.r.t. the weak componentwise order) satisfying their splitting condition. The authors consider a Kolmogorov type distance, and Assumption \ref{A2} is not required. \subsubsection{Forward random attractor}\label{forwardattractor} We now return to the setting of Section \ref{Apullbak}. We show that the map $\pi$ of Corollary \ref{A1} is also a forward random attractor. Given an i.i.d. random iteration $\varphi$, we recall that a \emph{forward random attractor} of $\varphi$ is a $\varphi$-invariant random compact set $\omega\mapsto K(\omega)$ such that for every $x\in S$, $$ \lim_{n\to \infty}d(\varphi(n,\omega,x),K(\sigma^{n}(\omega))=0, $$ for $\mathbb{P}$-almost every $\omega$, where $\sigma$ is the shift map on $\Omega$. See for instance Crauel and Scheutzow \cite{CrauelScheutzow}. As a consequence of Theorem \ref{sync}, we have the following: \begin{corollary}\label{Cor2} Let $\varphi$ be an i.i.d. random iteration of $J$-monotone maps satisfying the $J$-splitting condition. Let $\pi\colon \Omega\to S$ be the map as in Corollary \ref{Cor1}. Then, under Assumption \ref{A2}, we have that for every $x\in S$ $$ \lim_{n\to \infty}d(\varphi(n,\omega,x),\pi(\sigma^{n}(\omega))=0 $$ for $\mathbb{P}$-almost every $\omega$. \end{corollary} It follows from Corollaries \ref{Cor1} and \ref{Cor2} that $\omega\mapsto \{\pi(\omega)\}$ is a pullback and a forward random attractor. \subsection{Functional central limit theorem}\label{FCLT} We now present a functional central limit theorem for the class of i.i.d. random iterations considered in Theorem \ref{sync}. In the study of central limit theorems for homogeneous Markov chains, there are several results that reduce the problem to the verification of some analytical condition on the associated transfer operator, see for instance \cite{BataCLT,Gordin, Wood}. In our paper, we obtain a functional central limit theorem by solving the Poisson equation induced by the transition probability defined in \eqref{tp}. Indeed, a solution of the Poisson equation allows us to reduce the problem the martigale case. This technique came up with Gordin and Lifsic in \cite{Gordin}. To be more precise, we first recall the definitions of transfer operator and Poisson equation. Let $p$ be a transition probability on a measurable space. The \emph{transfer operator} $P$ induced by the transition probability $p$ is defined as follows: given a non-negative measurable map $f$, the action of $P$ in $f$ is a non-negative measurable map $Pf$ given by \begin{equation} \label{transferoperator} Pf(x)=\int f(y)\,p(x,dy). \end{equation} For a measurable map $f$ not necessarily non-negative, we write $f=f^{+}-f^{-}$ as a difference of non-negative measurable maps and we define $$ Pf(x)=Pf^{+}(x)-Pf^{-}(x), $$ if $Pf^{+}(x)$ and $Pf^{-}(x)$ are both finite. Let $\mu$ be a stationary measure. Given a non-constant (a.e.) map $\phi\colon S\to \mathbb{R}$ with $\phi\in L^{2}(\mu)$ and $\int \phi\, d\mu=0$, the equation $$ (I-P)\psi=\phi $$ is called the \emph{Poisson equation}. Let $Z_{n}$ be an ergodic stationary Markov chain with transition probability $p$ and stationary measure $\mu$. The existence of a solution $\psi\in L^{2}(\mu)$ of the Poisson equation implies that a FCLT holds for the Markov chain $Z_{n}$ taking $\phi$ as observable, i.e., the process $Y_{n}$ given by \[ Y_{n}(t)=\displaystyle\frac{1}{\sigma\sqrt{n}}\sum_{j=0}^{[nt]}\phi(Z_{j}), \qquad 0\leq t<\infty \] converges in distribution (weak-star convergence) to the Wiener measure in $D[0,\infty)$, where $D[0,\infty)$ is the space of real-valued right continuous function on $[0,\infty)$ having left limits endowed with the Skorohod topology and $\sigma\stackrel{\scriptscriptstyle\rm def}{=} \int \psi^2\,\mu-\int (P\psi)^2\, d\mu>0$. The FCLT stated above is proved by reducing the problem to the martigale case. See \cite[Page 1340]{BhLe} for this reduction and Billingsley \cite[Theorem 18.3]{Patrick} for a FCLT for martigale differences. \begin{mtheorem}\label{functionalclt} Let $S$ be a connected closed subset of $\mathbb{R}^k$ and let $(f,X)$ be an i.i.d. random iteration of $J$-monotone continuous maps on $S$ satisfying the $J$-splitting condition. Let $\mu$ be the unique stationary measure and consider a non-constant (a.e.) Lipschitz map $\phi\colon S\to \mathbb{R}$ in $L^{2}(\mu)$ with $\int \phi\, d\mu=0$. Then, under Assumption \ref{A2} \begin{enumerate} \item[(i)] there is $\psi\in L^{2}(\mu)$ such that $(I-P)\psi=\phi$. \item [(ii)] If $Z_{n}$ is a stationary Markov chain associated with $(f,X)$, then the process $Y_{n}$ given by \[ Y_{n}(t)=\displaystyle\frac{1}{\sigma\sqrt{n}}\sum_{j=0}^{[nt]}\phi(Z_{j}), \qquad 0\leq t<\infty, \] converges in distribution to the Wiener measure in $D[0,\infty)$, where $\sigma=\int (\psi-P\psi)^2\, d\mu$. \end{enumerate} \end{mtheorem} \begin{remark}\emph{ It follows from Theorem \ref{sync} that the FCLT in Theorem \ref{functionalclt} holds under every initial distribution.} \end{remark} Theorem \ref{functionalclt} extends \cite[Theorem 3.1]{BhLe} and \cite[Theorem 4.2, Page 362]{Bhbook}. Therein, for i.i.d. random iterations of non-decreasing maps on a closed subset $S\subset \mathbb{R}^{k}$ satisfying the splitting condition, the authors show that the Poisson equation $(I-P)\psi=\phi$ has a solution provided that $\phi$ may be expressed as a difference of two non-decreasing bounded functions. Furthermore, they also obtain item (ii) under every initial distribution. However, their proof works only for i.i.d. random iterations of non-decreasing maps. It worth mentioning that our dynamical systems approach allows us to prove the FCLT for i.i.d. random iterations of $J$-monotone maps (increasing and decreasing). \section{Proof of Theorem \ref{pullback}} \label{p1} We start with a preliminary result. Let $\pi_{s}\colon \mathbb{R}^k\to \mathbb{R}$ be the natural projection $\pi_{s}(x)=x_{s}$, $s=1,\dots, k$. \begin{theorem}\label{tcni} Let $S$ be a connected closed subset of $\mathbb{R}^k$ and let $(f,X)$ be an i.i.d. random iteration of $J$-monotone continuous maps on $S$ satisfying the $J$-splitting condition. Then, there exists $0<r <1$ such that for every finite Borel measure $\eta$ on $\mathbb{R}$ there is $C\geq 0$ such that \[ \int \eta( \pi_{s}(f^{n}_{\omega}(S)))\, d\mathbb{P}(\omega)=\int \eta(\pi_{s}(f_{X_0}\circ \cdots \circ f_{X_{n-1}}(S))) \, d\mathbb{P}\leq r^n C \] for every $n\geq 0$ and every $s=1,\dots, k$. \end{theorem} This theorem is an important step of the proof of Theorem 1 and its proof is inspired by the ideas in \cite{Yuri}. \begin{proof}[Proof of Theorem \ref{tcni}] For every $s\in\{1,\dots, k\}$, $x\in S$ and $n\geq 1$, define \[ \Sigma_{n}^x(s)=\{\omega\in \Omega\colon x\in \pi_{s}(f_{X_{0}(\omega)}\circ \cdots \circ f_{X_{n-1}(\omega)}(S))\}. \] Note that for every $n\geq 1$, we have the following useful property $$ \Sigma_{n+1}^x(s)\subset \Sigma_{n}^x(s) $$ for every $s=1,\dots, k$. \begin{lemma}\label{weaki} There are $\lambda<1$ and an integer $m\geq 1$ such that \[ \mathbb{P}(\Sigma_{jm}^x(s))\leq \lambda^j \] for every $j\geq 1$ and $s=1,\dots, k$. \end{lemma} \begin{proof} Fix $s\in \{1,\dots, k\}$. The proof is by induction on $j$. Let $m$, $A$ and $B$ as in the definition of the $J$-splitting condition, recall Definition \ref{Definition1}. For $j=1$, it follows from the $J$-splitting condition and Remark \ref{capempty} that \[ \Sigma_{m}^x(s)\subset \Omega-\Gamma_{1}, \] where either \[ \Gamma_{1}=\{\omega\in \Omega\colon (X_{0}(\omega), \dots,X_{m-1}(\omega))\in A\}\stackrel{\scriptscriptstyle\rm def}{=} A_{1} \] or \[ \Gamma_{1}=\{\omega\in \Omega\colon (X_{0}(\omega), \dots,X_{m-1}(\omega))\in B\}\stackrel{\scriptscriptstyle\rm def}{=} B_{1}. \] In particular, \[ \mathbb{P}(\Sigma_{m}^x(s))\leq 1-\rho\stackrel{\scriptscriptstyle\rm def}{=}\lambda, \] where $\rho=\min\{\mathbb{P}(A_{1}),\mathbb{P}(B_{1})\}>0$. Assume that the lemma holds for $j\geq 1$. We now prove the lemma for $j+1$. Consider the random variable $Z=(X_{0},\dots, X_{jm-1})$ taking values in $E^{jm}$. For every $z\in E^{jm}$, we claim that \begin{equation}\label{funddesi} \Sigma_{(j+1)m}^x(s)\cap [Z=z]\subset \Sigma_{jm}^x(s)-[Z=z]\cap\Gamma_{j}\cap \Sigma_{jm}^x(s) \end{equation} where either $$ \Gamma_{j}=\{\omega \in \Omega\colon (X_{jm}(\omega),\dots, X_{(j+1)m-1}(\omega))\in A\}\stackrel{\scriptscriptstyle\rm def}{=} A_{j} $$ or $$ \Gamma_{j}=\{\omega\in \Omega\colon (X_{jm}(\omega),\dots, X_{(j+1)m-1}(\omega))\in B\}\stackrel{\scriptscriptstyle\rm def}{=} B_{j} $$ Indeed, if \eqref{funddesi} does not hold, then there are $\omega, \hat\omega\in \Omega$ such that \[ \omega \in \Sigma_{(j+1)m}^x(s) \cap [Z=z]\cap A_{j} \quad \mbox{and} \quad \hat \omega \in \Sigma_{(j+1)m}^x(s) \cap [Z=z]\cap B_{j}. \] If we write $z=(\alpha_{0},\dots, \alpha_{jm-1})$, we have that \[ x\in \pi_{s}(f_{\alpha_{0}}\circ \dots\circ f_{\alpha_{jm-1}}\circ f_{X_{mj}(\omega)}\circ \dots \circ f_{X_{(j+1)m}(\omega)}(S)) \] and \[ x\in \pi_{s}(f_{\alpha_{0}}\circ \dots\circ f_{\alpha_{jm-1}}\circ f_{X_{mj}(\hat \omega)}\circ \dots \circ f_{X_{(j+1)m}(\hat \omega)}(S)). \] The inclusions above can not hold simultaneously. Again, this follows from the $J$-splitting condition and Remark \ref{capempty}. This proves that \ref{funddesi} holds. \vspace{2mm} Now, let $\mathbb{P}(\cdot|Z=\cdot)$ denote the regular conditional probability given by $Z$. Since $\mathbb{P}([Z=z]|Z=z)=1$, it follows from \eqref{funddesi} that \[ \begin{split} \mathbb{P}(\Sigma_{(j+1)m}^x(s)|Z=z)\leq \mathbb{P}(\Sigma_{jm}^x(s)|Z=z)-\mathbb{P}( \Gamma_{j}\cap \Sigma_{jm}^x(s)) |Z=z). \end{split} \] In particular, since $z$ is arbitrary, we have \begin{equation}\label{cregular} \mathbb{P}(\Sigma_{(j+1)m}^x(s)|Z=z)\circ Z\leq \mathbb{P}(\Sigma_{jm}^x(s)|Z=z)\circ Z-\mathbb{P}( \Gamma_{j}\cap \Sigma_{jm}^x(s)) |Z=z)\circ Z. \end{equation} It follows from the definition of the regular conditional probability that $$ \mathbb{P}( \Gamma_{j}\cap \Sigma_{m}^x(s)) |Z=z)\circ Z=\mathbb{E}(\mathds{1}_{ \Gamma_{j}}\mathds{1}_{ \Sigma_{jm}^x(s)}|Z). $$ Since $\Gamma_{j}$ and $Z$ are independent random variables, we conclude \[ \mathbb{E}(\mathds{1}_{ \Gamma_{j}}\mathds{1}_{ \Sigma_{jm}^x(s)}|Z)=\mathds{1}_{ \Gamma_{j}}\mathbb{E}(\mathds{1}_{ \Sigma_{jm}^{x}(s)}|Z)=\mathds{1}_{\Gamma_{j}}\mathbb{P}(\Sigma_{jm}^{x}(s)|Z=z)\circ Z. \] Note that $\mathds{1}_{\Gamma_{j}}$ and $\mathbb{P}(\Sigma_{jm}^{x}(s)|Z=z)\circ Z$ are also independent random variables. Therefore, integrating \eqref{cregular} we get \begin{equation}\label{md} \mathbb{P}(\Sigma_{(j+1)m}^x(s))\leq \mathbb{P}(\Sigma_{jm}^x(s))-\mathbb{P}(\Gamma_{j})\mathbb{P}(\Sigma_{jm}^x(s))=\mathbb{P}(\Sigma_{jm}^x(s))(1-\mathbb{P}(\Gamma_{j})). \end{equation} Since $X=\{X_{n}\}$ is an i.i.d. sequence of random variables, we have $\mathbb{P}(A_{j})=\mathbb{P}(A_{1})$ and $\mathbb{P}(B_{j})=\mathbb{P}(B_{1})$. Hence, we conclude from \eqref{md} that \[ \mathbb{P}(\Sigma_{(j+1)m}^x(s))\leq \lambda^j\cdot(1-\rho)=\lambda^{j+1}. \] Note that $\lambda$ does not depend on $s$. The proof of the lemma is now complete. \end{proof} We now conclude the proof of Theorem \ref{tcni}. Let $\lambda$ as in Lemma \ref{weaki} and define $\hat \lambda=\lambda^{\frac{1}{m}}$. Thus, for every $s$ we have \[ \mathbb{P}(\Sigma_{jm}^x(s))\leq \hat\lambda^{mj}. \] Now, choose any $r>0$ such that $r<1$ and $\hat \lambda \leq \min\{r,r^2,\dots r^{m}\}$. Let $n\geq m$. Then, there is $e\in\{0,\dots, m-1\}$ such that $n=jm+e$. Note that $\Sigma_{n}^x(s)\subset\Sigma_{jm}^x(s)$. Therefore \[ \mathbb{P}(\Sigma_{n}^x(s))\leq \mathbb{P}(\Sigma_{jm}^x(s))\leq \hat\lambda^{mj}=\hat \lambda^{mj-1}\hat \lambda\leq r^{mj-1}r^{e+1}=r^{n}. \] Now, it follows from Fubbini theorem that \[ \begin{split} \int \eta(\pi_{s}(f_{\omega}^{n}(S)))\, d\mathbb{P}(\omega) &=\int \mathbb{P}(x\in \pi_{s}(f^{n}_{(\cdot)}(S)))\, d\eta(x)\\ &=\int \mathbb{P}(\Sigma_{n}^{x}(s))\, d\eta(x)\leq r^{n}\eta(\mathbb{R}) \end{split} \] for every $n\geq m$. This implies that there is $C\geq 0$ such that \[ \begin{split} \int \eta(\pi_{s}(f_{\omega}^{n}(S)))\, d\mathbb{P}(\omega) &\leq r^{n}C \end{split} \] for every $n\geq 0$ for every $s$. \end{proof} Before proving Theorem \ref{pullback}, we need two technical lemmas. The first one says that with probability $1$ the set $\pi_{s}(f_{X_{0}}\circ \cdots \circ f_{X_{n-1}}(S))$ is bounded for $n$ sufficiently large. The second one is a general result from measure theory that will be used to state that $\pi_{s}(f_{X_{0}}\circ \cdots \circ f_{X_{n-1}}(S))$ is ``contracting'' exponentially fast with respect to any finite Borel measure. \begin{lemma}\label{A1} For $\mathbb{P}$-almost every $\omega$, there is $n_{0}$ (depending on $\omega$) such that $$ \pi_{s}(f_{X_{0}(\omega)}\circ \cdots \circ f_{X_{n-1}(\omega)}(S)) $$ is bounded for every $n\geq n_{0}$. \end{lemma} \begin{proof} Let $A,B\subset E$ and $m$ as in the definition of the $J$-splitting condition. Consider the set $A\times B$. For every $(\alpha,\beta)$ we define the sets $$ G_{\alpha\beta}= \pi_{s}(f_{\alpha_{0}}\circ\dots \circ f_{\alpha_{m-1}}\circ f_{\beta_{0}} \circ \dots \circ f_{\beta_{m-1}}(S)) $$ and $$ G_{\alpha\alpha}=\pi_{s}(f_{\alpha_{0}}\circ\dots \circ f_{\alpha_{m-1}}\circ f_{\alpha_{0}} \circ \dots \circ f_{\alpha_{m-1}}(S)) $$ and $$ G_{\beta\alpha}=\pi_{s}(f_{\beta_{0}} \circ \dots \circ f_{\beta_{m-1}}\circ f_{\alpha_{0}}\circ\dots \circ f_{\alpha_{m-1}}(S)). $$ Associate to theses set there are the subsets of $A\times B$: $$ E_{\alpha\beta}=\{(\alpha,\beta)\in A\times B\colon G_{\alpha\beta}\,\, \mbox{is bounded}\} $$ and $$ E_{\alpha\alpha}=\{(\alpha,\beta)\in A\times B\colon G_{\alpha\alpha}\,\, \mbox{is bounded}\} $$ and $$ E_{\beta\alpha}=\{(\alpha,\beta)\in A\times B\colon G_{\beta\alpha}\,\, \mbox{is bounded}\}. $$ \begin{claim} We have $$ A\times B=E_{\alpha\beta}\cup E_{\alpha\alpha}\cup E_{\beta\alpha}. $$ \end{claim} \begin{proof} Given $(\alpha,\beta)=(\alpha_{0},\dots, \alpha_{m-1},\beta_{0},\dots, \beta_{m-1})\in A\times B$, it follows from the $J$-splitting condition that $$ f_{\alpha_{0}}\circ\dots \circ f_{\alpha_{m-1}}(S)<_{J} f_{\beta_{0}} \circ \dots \circ f_{\beta_{m-1}}(S). $$ In particular, the sets $G_{\alpha\beta}, G_{\alpha\alpha},G_{\beta\alpha}$ are disjoints. Since $S$ is connected, they also are intervals, which implies that some of them must be bounded. \end{proof} Now, since $\nu^{2m}(A\times B)>0$, we have that at least one of the sets $G_{\alpha\beta}, G_{\alpha\alpha},G_{\beta\alpha}$ has positive $\nu^{2m}$-measure. Without loss of generality, we can assume that $\nu^{2m}(G_{\alpha\beta})>0$. In particular, it follows from Birkoff's Ergodic Theorem that for $\mathbb{P}$-almost every $\omega$, there is $n_{1}$ such that $$ (X_{n_{1}}(\omega),\dots,X_{n_{1}+2m-1}(\omega))\in G_{\alpha\beta}. $$ By definition of $G_{\alpha\beta}$, we have that $\pi_{s}(f_{X_{n_{1}}(\omega)}\circ \dots \circ f_{X_{n_{1}+2m-1}(\omega)}(S))$ is bounded. Since $S$ is closed, the image of a bounded set by a continuous maps is also bounded and then we conclude that for every $n\geq n_{0}\stackrel{\scriptscriptstyle\rm def}{=} n_{1}+2m$ we have that the set $$ \pi_{s}(f_{X_{0}(\omega)}\circ \dots \circ f_{X_{n}(\omega)}(S)) $$ is bounded. \end{proof} \begin{lemma}\label{mt} Let $Y_n\colon \Omega\to [0,\infty)$ be a sequence of measurable maps and assume that there exists $0<\lambda<1$ such that $\mathbb{E}Y_{n} \leq \lambda^n$. Then, there exist an integrable function $c\colon \Omega\to [0,\infty)$ and $q<1$ such that for $\mathbb{P}$-almost every $\omega$ it holds $Y_n(\omega)\leq c(\omega)\cdot q^n$ for every $n\geq 0$ . \end{lemma} \begin{proof} We take any $q<1$ with $\lambda<q$ and apply the Monotone Convergence Theorem to obtain that $$ \displaystyle\int\sum _{n=1}^{\infty}\frac{ Y_{n}(\omega)}{q^{n}}\, d\mathbb{P}(\omega)= \displaystyle\sum _{n=1}^{\infty}\frac{\mathbb{E}Y_{n}}{q^{n}}<\infty. $$ Therefore $$ c(\omega)\stackrel{\scriptscriptstyle\rm def}{=}\sum _{n=0}^{\infty}\frac{ Y_{n}(\omega)}{q^{n}}< \infty, $$ for $\mathbb{P}$-almost every $\omega$, which implies that $$ Y_{n}(\omega)\leq c(\omega) q^{n} $$ $\mathbb{P}$-almost every $\omega$. \end{proof} \subsection{Proof of Theorem \ref{pullback}} Denote by $\mbox{Leb}$ the Lebesgue measure on $\mathbb{R}$ and consider the finite Borel measure $m_{\ell}$ given by $m_{\ell}(A)=\mbox{Leb}([-\ell,\ell]\cap A)$. Thus, it follows from Theorem \ref{tcni} and Lemma \ref{mt} that for every $s$, there is an integrable map $c\colon \Omega\to [0,\infty)$ (which we can assume that does not depend on $s$, because $s$ varies on a finite set) such that for $\mathbb{P}$-almost every $\omega$ it holds \begin{equation}\label{T31} m_{\ell}(\pi_{s}(f_{X_{0}(\omega)}\circ \cdots \circ f_{X_{n-1}(\omega)}(S)))\leq c(\omega)q^n \end{equation} for every $n\geq 1$. Now, let $\omega$ as in Lemma \ref{A1} satisfying eq. \eqref{T31}. Then, there is $n_{0}$ such that $$ \pi_{s}(f_{X_{0}(\omega)}\circ \dots \circ f_{X_{n-1}(\omega)}(S)) $$ is bounded for every $n\geq n_{0}$ and $s$. Since the sequence $(\pi_{s}(f_{X_{0}(\omega)}\circ \dots \circ f_{X_{n-1}(\omega)}(S)))_{n}$ is nested, we conclude that there is $\ell\in \mathbb{N}$ such that $$ \pi_{s}(f_{X_{0}(\omega)}\circ \dots \circ f_{X_{n-1}(\omega)}(S))\subset [-\ell,\ell] $$ for every $n\geq n_{0}$ and $s$. Note that for every connected subset $I$ of $[-\ell,\ell]$ we have $m_{\ell}(I)=\mbox{diam}(I)$. Since $\pi_{s}(f_{X_0(\omega)}\circ \cdots \circ f_{X_{n-1}(\omega)}(S))$ is a connected subset of $\mathbb{R}$, we get that $$ m_{\ell}(\pi_{s}(f_{X_0(\omega)}\circ \cdots \circ f_{X_{n-1}(\omega)}(S)))=\mbox{diam}(\pi_{s}(f_{X_0(\omega)}\circ \cdots \circ f_{X_{n-1}(\omega)}(S))) $$ for every $n\geq n_{0}$ and $s$. Therefore, it follows from eq. \eqref{T31} that $$ \mbox{diam}(\pi_{s}(f_{X_0(\omega)}\circ \cdots \circ f_{X_{n-1}(\omega)}(S)))\leq c(\omega)q^n $$ for every $n\geq n_{0}$ and $s$. Now, if $\mathbb{R}^{k}$ is endowed with the sup distance, we have $$ \mbox{diam}\, f_{X_0(\omega)}\circ \cdots \circ f_{X_{n-1}(\omega)}(S)=\max_{s}\mbox{diam}(\pi_{s}(f_{X_0(\omega)}\circ \cdots \circ f_{X_{n-1}(\omega)}(S)))\leq c(\omega)q^n $$ for every $n\geq n_{0}$. This implies that \begin{equation}\label{cauchy} \lim_{n\to \infty}\mbox{diam}\, f_{X_0(\omega)}\circ \cdots \circ f_{X_{n-1}(\omega)}(S)=0. \end{equation} To conclude the proof of item (i), note that it follows from \eqref{cauchy} that for every $x$ the sequence $f_{X_{0}(\omega)}\circ\dots\circ f_{X_{n}(\omega)}(x)$ is a Cauchy sequence. Item (ii) follows from Letac principle \cite{Letac} and item (i). \hfill \qed \subsection{Proof of Corollary \ref{Cor1}} Since the sequence $\hat X_{n}(\omega)=\omega_{-n}$, $n\geq 1$, is an i.i.d. sequence of random variables with distribution $\nu$, it follows from Theorem \ref{pullback} that for $\mathbb{P}$-almost every $\omega$, the limit $$ \lim_{n\to \infty} f_{\omega_{-1}}\circ \dots\circ f_{\omega_{-n}}(x)\stackrel{\scriptscriptstyle\rm def}{=} \pi(\omega) $$ exists and is independent of the point $x$. \hfill \qed \section{Proof of Theorem \ref{sync}} \label{p2} In this section, we consider $\mathbb{R}^{k}$ endowed with the taxcab metric. Then, we have for every subset $B\subset\mathbb{R}^{k}$ that \begin{equation} \label{denovo} \mbox{diam}\, B\leq \sum_{s=1}^{k}\mbox{diam}\,\pi_{s}(B) \end{equation} By Assumption \ref{A2}, there are a bounded set $B$ and $m_{0}$ such that for $\mathbb{P}$-almost every $\omega$ we have $$ f_{\omega}^{m_{0}}(S)\subset B. $$ In particular, since the random variables $(X_{0},\dots, X_{m_{0}-1})$ and $(X_{m_{0}-1},\dots, X_{0})$ have the same distribution, we also have $$ f_{X_{0}(\omega)}\circ \dots \circ f_{X_{m_{0}-1}(\omega)}(S)\subset B $$ for $\mathbb{P}$-almost every $\omega$. This implies that for every $n\geq m_{0}$, it holds $$ f_{X_{0}(\omega)}\circ \dots \circ f_{X_{n-1}(\omega)}(S)\subset B $$ for $\mathbb{P}$-almost every $\omega$. Indeed, recall that the sequence $(f_{X_{0}(\omega)}\circ \dots \circ f_{X_{n-1}(\omega)}(S))_{n}$ is nested. Now, let $\ell$ be such that $\pi_{s}(B)\subset [-\ell,\ell]$ for every $s$. In particular, $$ \pi_{s}(f_{X_{0}(\omega)}\circ \dots \circ f_{X_{n-1}(\omega)}(S))\subset [-\ell,\ell] $$ for every $n\geq m_{0}$ and $s$. Let $m_{\ell}$ be the finite Borel measure given by $m_{\ell}(A)=\mbox{Leb}([-\ell,\ell]\cap A)$. Note that if $I$ is a connected set with $I\subset[-\ell, \ell]$, then $m_{\ell}(I)=\mbox{diam}\, I$. Then, applying Theorem \ref{tcni} to the measure $m_{\ell}$, we get that there is $C$ such that \begin{equation}\label{repe} \begin{split} \int \mbox{diam}\,(\pi_{s}(f^{n}_{\omega}(S)))\, d\mathbb{P}(\omega)&=\int \mbox{diam}(\pi_{s}(f_{X_0}\circ \cdots \circ f_{X_{n-1}}(S))) \, d\mathbb{P}\\ &=\int m_{\ell}(\pi_{s}(f_{X_0}\circ \cdots \circ f_{X_{n-1}}(S))) \, d\mathbb{P}\leq r^n C \end{split} \end{equation} for every $n\geq m_{0}$ and every $s$, where the first equality follows from the fact the $(X_{0},\dots, X_{n-1})$ and $(X_{n-1},\dots, X_{0})$ have the same distribution. Thus, it follows from eq. \eqref{denovo} and \eqref{repe}, that $$ \int \mbox{diam}\,(f^{n}_{\omega}(S))\, d\mathbb{P}(\omega)=\int \mbox{diam}(f_{X_0}\circ \cdots \circ f_{X_{n-1}}(S)) \, d\mathbb{P}\leq kC r^n $$ for every $n\geq m_{0}$. Now, it follows from Lemma \ref{mt} that there is an integrable map $c\colon \Omega\to \mathbb{R}$ such that for $\mathbb{P}$-almost every $\omega$ we have $$ \mbox{diam}\,(f^{n}_{\omega}(S))\leq c(\omega)r^{n} $$ for every $n\geq m_{0}$. \hfill \qed \subsection{Proof of Corollary \ref{expofastW}} Arguing as in the proof of Theorem \ref{sync}, we have that there are $m_{0}\geq 1$ and a bounded set such that for every $n\geq m_{0}$, it holds \begin{equation}\label{ql} f_{X_{0}(\omega)}\circ \dots \circ f_{X_{n-1}(\omega)}(S)\subset B \end{equation} for $\mathbb{P}$-almost every $\omega$. This implies that $\mbox{supp}\,\pi\mathbb{P}\subset \bar B$. Note that $\mathbb{P}(\{\omega\colon f_{\omega}^{n}(x)\,\in B\})= \mathbb{P}(\{\omega\colon f_{X_{0}(\omega)}\circ \dots \circ f_{X_{n-1}(\omega)}(x)\,\in B\})=1$, for every $n\geq 1$. Also, by the definition of $T$ we have that $$ T^{n}\varsigma(B)=\int \mathbb{P}(\{\omega\colon f_{\omega}^{n}(x)\,\in B\})\, d\varsigma(x) $$ for every probability measure $\varsigma$ on $S$. Therefore, it follows from eq. \eqref{ql} that $$ T^{n}\varsigma(B)=1 $$ for every $n\geq m_{0}$. This implies that $\mbox{supp}\, T^{n}\varsigma\subset \bar B$ for every $n\geq m_{0}$. We now prove item (ii). Let $\{X_{n}\}_{n\in \mathbb{Z}}$ be a bilateral sequence of i.i.d. random variables with distribution $\nu$. For every $n\geq 0$, the sequence $X_{n-1},\dots X_{0},X_{-1},\dots$ is an i.i.d. sequence of random variables with distribution $\nu$. Then, it follows from Theorem \ref{pullback}, that for every $n\geq 0$ there is a measurable map $ \pi_{n}$ such that $$ \pi_{n}(\omega)= \lim_{k \to \infty}f_{X_{n-1}(\omega)}\circ \dots \circ f_{X_{0}(\omega)}\circ f_{X_{-1}(\omega)}\circ \dots \circ f_{X_{-k}(\omega)}(p) $$ for $\mathbb{P}$-almost every $\omega$. Note that $\pi_{n}(\omega)=f_{\omega}^{n}(\pi_{0}(\omega))$ and for every $n$, and the maps $\pi$ and $\pi_{n}$ have the same distribution. In particular, for every $\pi\mathbb{P}$-integrable map $\phi\colon S\to \mathbb{R}$ we have $$ \int \phi(\pi(\omega))\,d\mathbb{P}(\omega)=\int \phi(f_{\omega}^{n}(\pi_{0}(\omega)))\,d\mathbb{P}(\omega). $$ Assume now that $\phi$ is a Lipschitz map with Lipschitz constant $1$. It follows from the definition of the transfer operator $P$ and the Markov operator $T$ that, $$ P^n\phi(x)=\int \phi(f^{n}_{\omega}(x))\, d\mathbb{P}(\omega) \quad \mbox{and}\quad \int P^n \phi(x)\, d\, \mu(x)=\int \phi(x)\, dT^{n}\varsigma(x), $$ for every $n\geq m_{0}$ and $x\in S$. Hence, we have \begin{equation}\label{maeq} \begin{split} \left|\int \phi\, dT^{n}\varsigma-\int \phi\,d\pi\mathbb{P}\right| &=\left|\int P^n\phi(x)\, d\mu(x)-\int \phi(f_{\omega}^{n}(\pi_{0}(\omega)))\,d\mathbb{P}(\omega)\right|\\ &= \left|\int \int \phi(f_{\omega}^{n}(x))\, d\mathbb{P}(\omega)\, d\varsigma(x) -\int \phi(f_{\omega}^{n}(\pi_{0}(\omega)))\,d\mathbb{P}(\omega)\right|\\ &=\left|\int \int \left(\phi(f_{\omega}^{n}(x))-\phi(f_{\omega}^{n}(\pi_{0}(\omega)))\right)\, d\mathbb{P}(\omega)\, d\varsigma(x)\right|. \end{split} \end{equation} It follows from Theorem \ref{sync} that there are an integrable map $c\colon \Omega\to \mathbb{R}$ and $r<1$ such that $$ \mbox{diam}\,f_{\omega}^n(S)\leq c(\omega)r^{n} $$ for $\mathbb{P}$-almost every $\omega$ and $n\geq m_{0}$. Then, $$ \left|\phi(f_{\omega}^{n}(x))-\phi(f_{\omega}^{n}(\pi_{0}(\omega)))\right|\leq \mbox{diam}\,f_{\omega}^n(S)\leq c(\omega)r^n $$ for $\mathbb{P}$-almost every $\omega$ and $n\geq m_{0}$, and thus it follows from eq. \eqref{maeq} that $$ \left|\int \phi\, dT^{n}\mu-\int \phi\,d\pi\mathbb{P}\right|\leq \int \mbox{diam}\,f_{\omega}^n(S)\, d\mathbb{P}(\omega)\leq Cr^n $$ for every $n\geq m_{0}$. This implies that $$ W_{1}(T^{n}\mu,\pi\mathbb{P})\leq C r^{n} $$ for every $n\geq m_{0}$. \hfill \qed \subsection{Proof of Corollary \ref{Cor2}} Using the notation of Section \ref{forwardattractor}, Theorem \ref{sync} can be rewrite as: there are $c\colon \Omega\to \mathbb{R}$, $r<1$ and a constant $C\geq 0$ such that for $\mathbb{P}$-almost every $\omega$, \begin{equation}\label{RW} d(\varphi(n,\omega,x),\varphi(n,\omega,y))\leq c(\omega)r^{n} \end{equation} for every $x,y\in S$ and $n\geq m_{0}$. Since the sequence $\hat X_{n}(\omega)=\omega_{-n}$, $n\geq 1$, is an i.i.d. sequence with distribution $\nu$, we get from Theorem \ref{pullback} that for $\mathbb{P}$-almost every $\omega$, the limit $$ \lim_{n\to \infty} f_{\omega_{-1}}\circ \dots\circ f_{\omega_{-n}}(x)\stackrel{\scriptscriptstyle\rm def}{=} \pi(\omega) $$ exists and is independent of the point $x$. Note that the map $\pi$ satisfies the following invariance equation $$ f_{\omega}(\pi(\omega))=\pi(\sigma(\omega)) $$ for $\mathbb{P}$-almost every $\omega$, where $\sigma$ is the shift map on $E^{\mathbb{Z}}$. By induction, we get $$ \varphi(n,\omega,\pi(\omega))=\pi(\sigma^{n}(\omega)) $$ for $\mathbb{P}$-almost every $\omega$ and every $n$. Therefore, \[ \begin{split} \lim_{n\to \infty}d(\varphi(n,\omega,x),\pi(\sigma^{n}(\omega))&=\lim_{n\to \infty}d(\varphi(n,\omega,x),\varphi(n,\omega,\pi(\omega)))\\ &\leq \lim_{n\to \infty}c(\omega)r^{n}=0 \end{split} \] for $\mathbb{P}$-almost every $\omega$. \hfill \qed \section{Solving the Poisson equation. Proof of Theorem \ref{functionalclt}}\label{p3} As observed in Section \ref{FCLT}, we only need to prove item (i). Let $(f,X)$ be an i.i.d. random iteration as in Theorem \ref{functionalclt} and $p$ be the transition probability given by \eqref{tp}. Let $P$ be the associated transfer operator as defined in \ref{transferoperator}. Let $\mu$ be the unique stationary measure and consider a Lipschitz map $\phi\in L^{2}(\mu)$ with $\int \phi\, d\mu=0$. It follows from the definition of the transfer operator $P$ that for every $x$ and every $n\geq 1$ we have \[ P^n\phi(x)=\int \phi(f^{n}_{\omega}(x))\, d\mathbb{P}(\omega) \quad \mbox{and}\quad \int P^n \phi(x)\, d\, \mu(x)=\int \phi(x)\, dT^{n}\mu(x), \] where $T$ is the Markov operator. Then, for every $x$ we have \[ \begin{split} |P^{n}\phi(x)|&=\left|P^{n}\phi(x)-\int\phi(y)\, d\mu(y)\right|\\ &=\left|P^n\phi(x)-\int P^n\phi(y)\,d\mu(y)\right|\\ &=\left|\int P^n\phi(x)\,d\mu(y)-\int P^n\phi(y)\,d\mu(y)\right| \\ &=\left|\int \int \phi(f^{n}_{\omega}(x))\, d\mathbb{P}(\omega) \, d\mu(y)-\int \int \phi(f^{n}_{\omega}(x))\, d\mathbb{P}(\omega) \, d\mu(y)\right|\\ &\leq \int \int \left|\phi(f^{n}_{\omega}(x))-\phi(f^{n}_{\omega}(y))\right|\, d\mathbb{P}(\omega)\, d\mu(y). \end{split} \] Let $L$ be the Lipschitz constant of $\phi$. Thus, we have \[ \left|\phi(f^{n}_{\omega}(x))-\phi(f^{n}_{\omega}(y))\right|\leq L \cdot d(f^{n}_{\omega}(x),f^{n}_{\omega}(y))\leq L\cdot \mbox{diam}f_{\omega}^{n}(S) \] for every $\omega\in \Omega$. On the other hand, it follows from Theorem \ref{sync} that there are constants $C\geq 0$, $0<r<1$ and an integer $m_{0}\geq 1$ such that $$ \int \mbox{diam} f_{\omega}^{n}(S)\, d\mathbb{P}(\omega)\leq C r^{n} $$ for every $n\geq m_{0}$. Therefore, for every $x$ and $n\geq m_{0}$ we have $$ (P^{n}\phi(x))^2\leq C^2\cdot L^2\cdot r^{2n}. $$ This implies that $\|P^{n}\phi\|_{2}\leq C_{0}\lambda^{n}$ for every $n\geq m_{0}$, where $C_{0}= C^2\cdot L^2$ and $\lambda=r^2<1$. In particular, $$ \sum_{n=0}^{\infty} \|P^{n}\phi\|_{2}<\infty. $$ Then, the map $\psi=-\sum_{n=0}^{\infty} P^{n}\phi$ is a well defined element of $L^{2}(\mu)$ and solves the Poisson equation $(I-P)\psi=\phi$. \hfill \qed \bibliographystyle{acm}
\section{Introduction} Sequence modeling and time series modeling have been critical in real life applications. Their vast applications range from market demand forecast, missile defense, weather forecast, logistics calculation, shipping routes and cost prediction to even the spreading speed of contagions. However, there have been relatively few papers addressing sequence modeling in the artificial intelligence field, currently dominated by deep learning methodologies. There is also a surging interest in the investment field to incorporate deep learning methodologies to compete in ever-competitive financial markets \cite{kim2019financial}. However, there are three main challenges facing this type of data. First, real life data may have long-dependency issues. The most popular sequence modeling methodology in artificial intelligence has been long-short-term memory (LSTM), which is a type of recurrent neural network. Second, financial data notoriously has high noise-to-signal ratio, which means the random information to actual pattern information can be quite imbalanced, and despite the modeling power of deep neural networks, the model learns primarily noises. It overfits easily and cannot generalize well \cite{kim2019financial}. Lastly, sequence data can often be non-stationary. This means that the patterns often change, and what the model learns may not be applicable to the new market scenarios. One way to compensate for this is to extend the look-back period to incorporate for historical data in the past so the model can recognize more pattern types \cite{zeng2019holistic}. This is also related to the first challenge as few models can address the long-dependency issues - though LSTM was first created to tackle this challenge, it has not been able to solve this issue effectively and has since been replaced by other attention-based algorithms especially in the natural-language domain \cite{riou2019reinforcement}. For sequence modeling tasks with deep learning, natural-language processing (NLP) has been at the forefront of innovations. For speech recognition and translation domains, many types of new architectures employing attention mechanism have been created such as attention-LSTM \cite{liu2017global}, transformer \cite{guo2019star}(bert), and Bert \cite{devlin2018bert} . \cite{ahmed2017weighted} has shown that attention mechanism has been much more effective than LSTM in language tasks, and this idea was recently adopted by \cite{song2018attend} to tackle sequence classification tasks. Compared to other modeling techniques, the authors claim attention-based methodologies are better at addressing long-dependency issues \cite{bin2018describing}. Additionally, some researchers have adopted techniques from the computer vision field and transfer the architectures to sequence modeling. For example, \cite{bai2018empirical} uses convolution neural net for sequence modeling. \cite{seo2018structured}. Recently in the statistics field, \cite{he2016deep} uses residual neural net (ResNet) for sequence modeling and outperforms many benchmarks based on statistical method. Some newly developed statistical methods such as Hive and Hive-Cote have shown to be extremely powerful in some sequence modeling \cite{fawaz2019deep}, but they are ensemble methods based on numerous previous models, and they take extremely long time to train \cite{shifaz2019ts} and are not practical for real-life applications \cite{shifaz2019ts}. The limitations call for a sophisticated model architecture which can be readily applied in a practical setting while alleviating the above three challenges. Typically, it is in theory inappropriate to use convolution-based methodology to tackle sequence modeling. Though it does not have long-dependency issues \cite{martin2019neural} as the data points are not passed through to the next block but are output directly in the pooling layer (average or global), convolution-based methodologies are "translation-invariant," which simply means time and sequence are not captured in CNN-based models - the architecture does not care where the pattern is and only cares that it appears in the sequence \cite{zhang2019linked}. This is in theory inappropriate for time-driven sequence modeling especially for noisy data. A recent series of papers \cite{karim2019insights,karim2017lstm,karim2019multivariate} focusing on LSTM-FCN, which combines LSTM and fully convolutional net (check proper name) and achieved numerous state-of-the-art (SOTA) results on public benchmarks. This paper series will feature prominently in our paper and has inspired our work here. LSTM-FCN architecture focuses on two branches, once based on LSTM (and a variant attention-LSTM, an LSTM with attention block), and the other based on a simple, three-block convolutions. For a recent analysis \cite{karim2019insights}, in what they call an "ablation test," they present the data represented in the CNN filters. The intriguing part for us is that, based on the visual examination, the filters, depending on the data sets, sometimes have a smoothing effect and other times making the sequence noisier while retaining the overall sequence structure. Though not the focus of this paper, a hypothesis is that, while the sequence model is able to capture the time aspect of the data, the CNN architecture through the filters can make the models more resistant to noises. Our work here elaborates on this concept and attempts to address the three main issues facing sequence modeling by combining a transformer architecture \cite{vaswani2017attention} and a residual, high-way architecture \cite{zhang2018residual} and examine the effectiveness with UCR's 85 public, sequence classification tasks. \section{Related Works} \subsection{ResNet} Residual Networks called ResNet use residuals to reconstruct the mapping of the network. That is to say, the input x is introduced again to the result, so that the weight of the stacked layer tends to zero. \begin{equation} y=\mathcal{F}(x,\{W_i\})+x \end{equation} Here $x$ and $y$ are the input and output vectors of the layers considered. The function $\mathcal{F}(x,\{W_i\})$ is the residual mapping to be learned. In order to match the dimension of $\mathcal{F}(x,\{W_i\})$ and $x$, add a linear projection $W_s$ to the above equation as: \begin{equation} y=\mathcal{F}(x,\{W_i\})+W_sx \end{equation} \subsection{Universal Transformer} The Universal Transformer, which is based on encoder-decoder architecture, has been proposed by \cite{dehghani2018universal}. The details of this architecture is briefly shown as follows. \textbf{Encoder:} At first, for an input sequence with length $m$, initialize a matrix $H^0 \in \mathbb{R}^{ m \times d}$, and each row of it is a $d$-dimensional embedding of the symbols at each position of the sequence. Then use the multi-headed dot-product self-attention mechanism to compute representations $H^t$ at step $t$, followed by a recurrent transition function. In addition, output and layer normalization are also added as the residual connections. Use the scaled dot-product attention which combines queries $Q$, keys $K$ and values $V$ as follows \begin{equation} ATTENTION(Q,K,V)=SOFTMAX(\frac{QK^T}{\sqrt{d}})V \end{equation} $d$ is the number of columns of $Q$, $K$ and $V$. Then based on this equation, use the multi-head version with $k$ heads. \begin{equation} MUITIHEADSELFATTENTION(H^t)=CONCAT(head_1,...,head_k)W^O \end{equation} where \begin{equation} head_1=ATTENTION(H^tW_i^Q,H^tW_i^K,H^tW_i^V) \end{equation} and $W^Q, W^K, W^V, W^O\in \mathbb{R}^{ d \times d/k}$. So the revised representations $H^t \in \mathbb{R}^{ m \times d}$ are computed as follows \begin{equation} H^t=LAYERNORM(A^t+TRANSITION(A^t)) \end{equation} where \begin{equation} A^t=LAYERNORM((H^{t-1}+P^t)+MULTIHEADAELFATTENTION(H^{t-1}+P^t)) \end{equation} $P^t \in \mathbb{R}^{m \times d}$ are fixed, constant, two-dimensional (position, time) coordinate embeddings, for the positions $1 \leq i \leq m$ and the time-step $1 \leq t \leq T$ separately for each vector-dimension $1 \leq j \leq d$, \begin{equation} P_{i,2j}^t=\sin{i/10000^{2j/d}}+\sin{t/10000^{2j/d}} \end{equation} \begin{equation} P_{i,2j+1}^t=\cos{i/10000^{2j/d}}+\cos{t/10000^{2j/d}}. \end{equation} Finally, the output of encoder is a matrix of d-dimensional vector representation $H^T \in \mathbb{R}^{ m \times d}$ for the $m$symbols of the input sequence after $T$ steps\cite{dehghani2018universal}. \textbf{Decoder:} The structure of the decoder is the same as the encoder. Specifically, after the self-attention function, the decoder also attends to the final encoder representation $H^T$ of each position in input sequence using the Equation($2$). But the queries $Q$ obtained from projecting the decoder representation, and keys and values obtained from projecting the encoder representation\cite{dehghani2018universal}. During training, the decoder input is the target output, and finally, per-symbol target distributes are obtained: \begin{equation} P(y_{pos}|y_{[1:pos-1]},H^T)=SOFTMAX(OH^T) \end{equation} where $O \in \mathbb{R}^d \times V$ is an affine transformation from the final decoder state to the output vacabulary size $V$. Softmax yields an $(m \times V)$-dimension output matrix normalized over its rows. Then select the maximal probability symbol as the next symbol. Figure\ref{Fig.main2} is just the architecture of the combination of ResNet and Universal Transformer. \begin{figure}[!htb] \centering \includegraphics[width=1\textwidth]{Resnet-transformer_architecture.pdf} \caption{Resnet-Transformer architecture} \label{Fig.main2} \end{figure} \section{Experimental Results} Here, we present the experimental results between previously existing SOTAs, the LSTM-FCN results (in some cases exceeding the SOTAs) and the Resnet-Transformer results. For LSTM-FCN, we reproduced experimental results and took the best results among several training cycles, following the approach in \cite{karim2019insights}. Notice that, the reported results in \cite{karim2019insights} are fine-tuned for each data set, i.e. the model was adjusted to achieve the best results in individual datasets. The practicality of fine-tuning to boost the validation/ out-of-sample data set performance may produce over-fitted models when not combined with ensemble methods. we tried to achieve similar effects by varying the size of fully-convolutional layers and then took the best results. To compare, we provide the varied architectures by varying the depth size of the transformer branch and the ResNet feature maps. \begin{center} \small{ \captionof{table}{Performance comparison of proposed models with the rest} \tablefirsthead{% \hline \multicolumn{1}{|c|}{\multirow{5}[10]{*}{dataset\_name}} & \multicolumn{1}{c|}{\multirow{5}[10]{*}{Existing SOTA}} & \multicolumn{1}{c|}{\multirow{5}[10]{*}{Best:\newline{}lstm-fcn}} & \multicolumn{1}{c|}{\multirow{5}[10]{1.6cm}{Vanilla:\newline{}ResNet-Transformer}} & \multicolumn{3}{p{15em}<{\centering}|}{ResNet-Transformer} \\ \hhline{|~~~~---|} & & & & \multicolumn{3}{p{15em}<{\centering}|}{Transformer depth} \\ \hhline{|~~~~---|} & & & & 1 & 4 & 4 \\ \hhline{|~~~~---|} & & & & \multicolumn{3}{p{15em}<{\centering}|}{ResNet feature maps} \\ \hhline{|~~~~---|} & & & & \multicolumn{1}{p{5em}<{\centering}|}{[128, 128, 64, 64]} & \multicolumn{1}{p{5em}<{\centering}|}{[128, 128, 64, 64]} & \multicolumn{1}{p{5em}<{\centering}|}{[64, 64, 128, 128]} \\ } \tablehead{% \hline \multicolumn{7}{|l|}{\small\sl continued from previous page}\\ \hline \multicolumn{1}{|c|}{\multirow{5}[10]{*}{dataset\_name}} & \multicolumn{1}{c|}{\multirow{5}[10]{*}{Existing SOTA}} & \multicolumn{1}{c|}{\multirow{5}[10]{*}{Best:\newline{}lstm-fcn}} & \multicolumn{1}{c|}{\multirow{5}[10]{1.6cm}{Best:\newline{}ResNet-Transformer}} & \multicolumn{3}{p{15em}<{\centering}|}{ResNet-Transformer} \\ \hhline{|~~~~---|} & & & & \multicolumn{3}{p{15em}<{\centering}|}{Transformer depth} \\ \hhline{|~~~~---|} & & & & 1 & 4 & 4 \\ \hhline{|~~~~---|} & & & & \multicolumn{3}{p{15em}<{\centering}|}{ResNet feature maps} \\ \hhline{|~~~~---|} & & & & \multicolumn{1}{p{5em}<{\centering}|}{[128, 128, 64, 64]} & \multicolumn{1}{p{5em}<{\centering}|}{[128, 128, 64, 64]} & \multicolumn{1}{p{5em}<{\centering}|}{[64, 64, 128, 128]} \\ } \tabletail{% \hline \multicolumn{7}{|r|}{\small\sl continued on next page}\\ \hline} \tablelasttail{\hline} \setlength{\tabcolsep}{0.5pt} \begin{supertabular}{|l|c|c|c|c|c|c|} \hline Adiac & 0.857 & \textbf{0.869565} & 0.84399 & 0.849105 & 0.849105 & 0.849105 \\ \hline ArrowHead & 0.88 & \textbf{0.925714} & 0.891429 & 0.891429 & 0.891429 & 0.897143 \\ \hline ChlorineConcentration & \textbf{0.872} & 0.816146 & 0.849479 & 0.863281 & 0.409375 & 0.861719 \\ \hline InsectWingbeatSound & 0.6525 & \textbf{0.668687} & 0.522222 & 0.642424 & 0.535859 & 0.536364 \\ \hline Lightning7 & 0.863 & \textbf{0.863014} & 0.821918 & 0.849315 & 0.383562 & 0.835616 \\ \hline Wine & 0.889 & 0.833333 & 0.851852 & 0.87037 & 0.87037 & \textbf{0.907407} \\ \hline WordSynonyms & \textbf{0.779} & 0.680251 & 0.661442 & 0.65047 & 0.636364 & 0.678683 \\ \hline Beef & \textbf{0.9} & \textbf{0.9} & 0.866667 & 0.866667 & 0.866667 & 0.866667 \\ \hline DistalPhalanxOutlineAgeGroup & \textbf{0.835} & 0.791367 & 0.81295 & 0.776978 & 0.467626 & 0.776978 \\ \hline DistalPhalanxOutlineCorrect & 0.82 & 0.797101 & \textbf{0.822464} & \textbf{0.822464} & \textbf{0.822464} & 0.793478 \\ \hline DistalPhalanxTW & \textbf{0.79} & 0.748201 & 0.733813 & 0.748201 & 0.719424 & 0.741007 \\ \hline ECG200 & 0.92 & 0.91 & 0.94 & \textbf{0.95} & 0.94 & 0.93 \\ \hline ECGFiveDays & \textbf{1} & 0.987224 & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} \\\hline BeetleFly & 0.95 & \textbf{1} & \textbf{1} & 0.95 & 0.95 & \textbf{1} \\ \hline BirdChicken & 0.95 & 0.95 & \textbf{1} & 0.9 & \textbf{1} & 0.7 \\ \hline ItalyPowerDemand & 0.97 & 0.963071 & 0.965015 & 0.969874 & 0.962099 & \textbf{0.971817} \\ \hline SonyAIBORobotSurface1 & 0.985 & 0.985025 & \textbf{0.988353} & 0.978369 & 0.708819 & 0.985025 \\ \hline SonyAIBORobotSurface2 & 0.962 & 0.972718 & 0.976915 & 0.974816 & \textbf{0.98426} & 0.976915 \\ \hline MiddlePhalanxOutlineAgeGroup & \textbf{0.8144} & 0.668831 & 0.655844 & 0.662338 & 0.623377 & 0.662338 \\ \hline MiddlePhalanxOutlineCorrect & 0.8076 & 0.841924 & \textbf{0.848797} & \textbf{0.848797} & \textbf{0.848797} & 0.835052 \\ \hline MiddlePhalanxTW & 0.612 & 0.603896 & 0.564935 & 0.577922 & 0.551948 & \textbf{0.623377} \\ \hline ProximalPhalanxOutlineAgeGroup & 0.8832 & 0.887805 & 0.887805 & \textbf{0.892683} & 0.882927 & \textbf{0.892683} \\ \hline ProximalPhalanxOutlineCorrect & 0.918 & \textbf{0.931271} & \textbf{0.931271} & \textbf{0.931271} & 0.683849 & 0.924399 \\ \hline ProximalPhalanxTW & 0.815 & \textbf{0.843902} & 0.819512 & 0.814634 & 0.819512 & 0.819512 \\ \hline MoteStrain & \textbf{0.95} & 0.938498 & 0.940895 & 0.916933 & 0.9377 & 0.679712 \\ \hline MedicalImages & 0.792 & \textbf{0.798684} & 0.780263 & 0.765789 & 0.759211 & 0.789474 \\ \hline Strawberry & 0.976 & \textbf{0.986486} & \textbf{0.986486} & \textbf{0.986486} & \textbf{0.986486} & \textbf{0.986486} \\ \hline ToeSegmentation1 & 0.9737 & \textbf{0.991228} & 0.969298 & 0.969298 & 0.97807 & \textbf{0.991228} \\ \hline Coffee & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} \\ \hline CricketX & 0.821 & 0.792308 & \textbf{0.838462} & 0.8 & 0.810256 & 0.8 \\ \hline CricketY & 0.8256 & 0.802564 & \textbf{0.838462} & 0.820513 & 0.825641 & 0.807692 \\ \hline CricketZ & 0.8154 & 0.807692 & \textbf{0.820513} & 0.805128 & 0.128205 & 0.1 \\ \hline UWaveGestureLibraryX & 0.8308 & \textbf{0.843663} & 0.780849 & 0.814629 & 0.810999 & 0.808766 \\ \hline UWaveGestureLibraryY & 0.7585 & \textbf{0.765215} & 0.664992 & 0.71636 & 0.671413 & 0.67895 \\ \hline UWaveGestureLibraryZ & 0.7725 & \textbf{0.795924} & 0.756002 & 0.761027 & 0.760469 & 0.762144 \\ \hline ToeSegmentation2 & 0.9615 & 0.930769 & \textbf{0.976923} & 0.953846 & 0.953846 & \textbf{0.976923} \\ \hline DiatomSizeReduction & 0.967 & 0.970588 & 0.993464 & \textbf{0.996732} & 0.379085 & \textbf{0.996732} \\ \hline car & 0.933 & \textbf{0.966667} & 0.95 & 0.883333 & 0.866667 & 0.3 \\ \hline CBF & \textbf{1} & 0.996667 & \textbf{1} & 0.997778 & \textbf{1} & \textbf{1} \\ \hline CinCECGTorso & \textbf{0.9949} & 0.904348 & 0.871739 & 0.656522 & 0.89058 & 0.31087 \\ \hline Computers & 0.848 & 0.852 & 0.86 & 0.844 & \textbf{0.908} & 0.84 \\ \hline Earthquakes & 0.801 & \textbf{0.81295} & 0.755396 & 0.755396 & 0.76259 & 0.755396 \\ \hline ECG5000 & 0.9482 & \textbf{0.948222} & 0.941556 & 0.943556 & 0.944222 & 0.940444 \\ \hline ElectricDevices & \textbf{0.7993} & 0.779665 & 0.774219 & 0.771625 & 0.757489 & 0.766178 \\ \hline FaceAll & 0.929 & \textbf{0.956213} & 0.881065 & 0.848521 & 0.949704 & 0.252071 \\ \hline FaceFour & \textbf{1} & 0.943182 & 0.954545 & 0.965909 & 0.977273 & 0.215909 \\ \hline FacesUCR & \textbf{0.958} & 0.941463 & 0.957561 & 0.947805 & 0.926829 & 0.95122 \\ \hline Fish & 0.989 & 0.971429 & \textbf{1} & 0.977143 & 0.96 & 0.994286 \\ \hline FordA & 0.9727 & \textbf{0.976515} & 0.948485 & 0.946212 & 0.517424 & 0.940909 \\ \hline FordB & \textbf{0.9173} & 0.792593 & 0.838272 & 0.830864 & 0.838272 & 0.823457 \\ \hline GunPoint & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} \\ \hline Ham & 0.781 & \textbf{0.809524} & 0.761905 & 0.780952 & 0.619048 & 0.514286 \\ \hline HandOutlines & 0.9487 & \textbf{0.954054} & 0.937838 & 0.948649 & 0.835135 & 0.945946 \\ \hline Haptics & 0.551 & 0.558442 & 0.564935 & 0.545455 & \textbf{0.600649} & 0.194805 \\ \hline Herring & 0.703 & \textbf{0.75} & 0.703125 & 0.734375 & 0.65625 & 0.703125 \\ \hline InlineSkate & \textbf{0.6127} & 0.489091 & 0.516364 & 0.494545 & 0.494545 & 0.165455 \\ \hline LargeKitchenAppliances & 0.896 & 0.898667 & 0.928 & 0.898667 & \textbf{0.936} & 0.933333 \\ \hline Lightning2 & \textbf{0.8853} & 0.819672 & 0.852459 & 0.852459 & 0.754098 & 0.868852 \\ \hline MALLAT & 0.98 & \textbf{0.98081} & 0.977399 & 0.975267 & 0.934328 & 0.979104 \\ \hline Meat & \textbf{1} & 0.883333 & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} \\ \hline NonInvasiveFetalECGThorax1 & 0.961 & \textbf{0.970483} & 0.953181 & 0.953181 & 0.947583 & 0.948092 \\ \hline NonInvasiveFetalECGThorax2 & 0.955 & \textbf{0.961323} & 0.955216 & 0.954198 & 0.948601 & 0.952672 \\ \hline OliveOil & 0.9333 & 0.766667 & \textbf{0.966667} & 0.9 & 0.933333 & 0.9 \\ \hline OSULeaf & 0.988 & 0.983471 & 0.987603 & \textbf{0.991736} & 0.987603 & \textbf{0.991736} \\ \hline PhalangesOutlinesCorrect & 0.83 & 0.83683 & \textbf{0.855478} & 0.848485 & 0.854312 & 0.850816 \\ \hline Phoneme & 0.3492 & 0.341772 & \textbf{0.363924} & 0.191983 & 0.357595 & 0.348101 \\ \hline plane & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} & 0.371429 & \textbf{1} \\ \hline RefrigerationDevices & 0.5813 & 0.605333 & 0.605333 & 0.616 & 0.592 & \textbf{0.618667} \\ \hline ScreenType & \textbf{0.707} & 0.682667 & 0.669333 & 0.645333 & 0.666667 & 0.68 \\ \hline ShapeletSim & \textbf{1} & \textbf{1} & \textbf{1} & 0.911111 & 0.888889 & 0.977778 \\ \hline ShapesAll & 0.9183 & 0.905 & 0.923333 & 0.876667 & 0.921667 & \textbf{0.933333} \\ \hline SmallKitchenAppliances & 0.803 & 0.821333 & 0.808 & 0.810667 & \textbf{0.829333} & 0.813333 \\ \hline StarlightCurves & 0.9796 & 0.977295 & \textbf{0.978873} & 0.979237 & \textbf{0.978873} & 0.975838 \\ \hline SwedishLeaf & 0.9664 & \textbf{0.9792} & \textbf{0.9792} & 0.9728 & 0.9696 & 0.9664 \\ \hline Symbols & 0.9668 & \textbf{0.98794} & 0.9799 & 0.970854 & 0.976884 & 0.252261 \\ \hline SyntheticControl & \textbf{1} & 0.993333 & \textbf{1} & 0.996667 & \textbf{1} & \textbf{1} \\ \hline Trace & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} \\ \hline TwoPatterns & \textbf{1} & 0.99675 & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} \\ \hline TwoLeadECG & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} \\ \hline UWaveGestureLibraryAll & \textbf{0.9685} & 0.961195 & 0.856784 & 0.933277 & 0.939978 & 0.879118 \\ \hline wafer & \textbf{1} & 0.998378 & 0.99854 & 0.998215 & 0.99854 & 0.999027 \\ \hline Worms & 0.8052 & \textbf{0.844156} & 0.831169 & 0.779221 & 0.818182 & 0.25974 \\ \hline WormsTwoClass & 0.8312 & 0.844156 & \textbf{0.857143} & 0.831169 & 0.805195 & 0.831169 \\ \hline yoga & 0.9183 & \textbf{0.921667} & 0.906333 & 0.905667 & 0.884 & 0.866667 \\ \hline ACSF1 & - & 0.9 & \textbf{0.96} & 0.91 & 0.93 & 0.17 \\ \hline AllGestureWiimoteX & - & 0.701429 & 0.77 & 0.76 & \textbf{0.762857} & 0.754286 \\ \hline AllGestureWiimoteY & - & 0.802857 & \textbf{0.814286} & 0.798571 & 0.808571 & 0.8 \\ \hline AllGestureWiimoteZ & - & 0.684286 & \textbf{0.782857} & 0.752857 & 0.767143 & 0.748571 \\ \hline BME & - & 0.993333 & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} \\ \hline Chinatown & - & 0.982609 & \textbf{0.985507} & \textbf{0.985507} & \textbf{0.985507} & \textbf{0.985507} \\ \hline Crop & - & 0.74494 & 0.743869 & 0.742738 & \textbf{0.746012} & 0.740476 \\ \hline DodgerLoopDay & - & \textbf{0.6375} & 0.5375 & 0.55 & 0.4625 & 0.5 \\ \hline DodgerLoopGame & - & 0.898551 & 0.876812 & 0.891304 & 0.550725 & \textbf{0.905797} \\ \hline DodgerLoopWeekend & - & \textbf{0.978261} & 0.963768 & 0.978261 & 0.949275 & 0.963768 \\ \hline EOGHorizontalSignal & - & \textbf{0.654696} & 0.610497 & 0.59116 & 0.60221 & 0.610497 \\ \hline EOGVerticalSignal & - & \textbf{0.505525} & 0.450276 & 0.48895 & 0.146409 & 0.480663 \\ \hline EthanolLevel & - & 0.772 & 0.824 & \textbf{0.868} & 0.82 & 0.802 \\ \hline FreezerRegularTrain & - & 0.997895 & \textbf{0.999649} & 0.999298 & 0.999298 & \textbf{0.999649} \\ \hline FreezerSmallTrain & - & 0.825965 & \textbf{0.975088} & 0.958947 & 0.906667 & 0.771579 \\ \hline Fungi & - & 0.994624 & \textbf{1} & \textbf{1} & 0.994624 & 0.075269 \\ \hline GestureMidAirD1 & - & 0.715385 & 0.715385 & \textbf{0.723077} & \textbf{0.723077} & 0.7 \\ \hline GestureMidAirD2 & - & 0.707692 & \textbf{0.746154} & 0.692308 & 0.676923 & 0.7 \\ \hline GestureMidAirD3 & - & \textbf{0.430769} & 0.353846 & 0.369231 & 0.338462 & 0.338462 \\ \hline GesturePebbleZ1 & - & 0.918605 & \textbf{0.936047} & 0.831395 & \textbf{0.936047} & 0.906977 \\ \hline GesturePebbleZ2 & - & 0.886076 & 0.873418 & 0.841772 & \textbf{0.911392} & 0.879747 \\ \hline GunPointAgeSpan & - & 0.996835 & 0.996835 & 0.996835 & \textbf{1} & 0.848101 \\ \hline GunPointMaleVersusFemale & - & \textbf{1} & \textbf{1} & \textbf{1} & 0.996835 & 0.996835 \\ \hline GunPointOldVersusYoung & - & 0.993651 & \textbf{1} & \textbf{1} & \textbf{1} & 0.990476 \\ \hline HouseTwenty & - & 0.983193 & 0.983193 & 0.907563 & 0.983193 & \textbf{0.991597} \\ \hline InsectEPGRegularTrain & - & 0.995984 & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} \\ \hline InsectEPGSmallTrain & - & 0.935743 & 0.955823 & 0.927711 & \textbf{0.971888} & 0.477912 \\ \hline MelbournePedestrian & - & \textbf{0.913061} & 0.912245 & 0.911837 & 0.904898 & 0.901633 \\ \hline MixedShapesRegularTrain & - & 0.973608 & 0.97567 & 0.969897 & 0.97567 & \textbf{0.980206} \\ \hline MixedShapesSmallTrain & - & 0.936082 & 0.910103 & 0.918763 & 0.92866 & \textbf{0.940619} \\ \hline PickupGestureWiimoteZ & - & 0.74 & \textbf{0.8} & 0.78 & 0.78 & 0.78 \\ \hline PigAirwayPressure & - & \textbf{0.336538} & \textbf{0.336538} & 0.096154 & 0.173077 & 0.153846 \\ \hline PigArtPressure & - & \textbf{1} & \textbf{1} & 0.168269 & 0.043269 & 0.533654 \\ \hline PigCVP & - & 0.875 & \textbf{0.908654} & 0.081731 & 0.211538 & 0.019231 \\ \hline PLAID & - & 0.901304 & 0.944134 & 0.921788 & 0.147114 & \textbf{0.945996} \\ \hline PowerCons & - & \textbf{0.994444} & 0.933333 & 0.944444 & 0.927778 & 0.927778 \\ \hline Rock & - & \textbf{0.92} & 0.78 & \textbf{0.92} & 0.82 & 0.76 \\ \hline SemgHandGenderCh2 & - & 0.91 & 0.866667 & \textbf{0.916667} & 0.848333 & 0.651667 \\ \hline SemgHandMovementCh2 & - & \textbf{0.56} & 0.513333 & 0.504444 & 0.391111 & 0.468889 \\ \hline SemgHandSubjectCh2 & - & \textbf{0.873333} & 0.746667 & 0.74 & 0.666667 & 0.788889 \\ \hline ShakeGestureWiimoteZ & - & 0.88 & \textbf{0.94} & \textbf{0.94} & \textbf{0.94} & \textbf{0.94} \\ \hline SmoothSubspace & - & 0.98 & \textbf{1} & \textbf{1} & 0.993333 & \textbf{1} \\ \hline UMD & - & 0.986111 & \textbf{1} & \textbf{1} & \textbf{1} & \textbf{1} \\ \hline \end{supertabular}} \end{center} \begin{table}[htbp] \centering \caption{Wilcoxon signed rank test comparison of each model} \resizebox{\textwidth}{25mm}{ \begin{tabular}{|l|p{1.5cm}<{\centering}|c|c|c|c|p{1.5cm}<{\centering}|p{1.5cm}<{\centering}|c|p{1.5cm}<{\centering}|c|c|p{1.5cm}<{\centering}|p{1.5cm}<{\centering}|c|c|} \hline & resnet-\newline{}transformer & lstm-fcn & tfcn & Resnet & fcn & 1-NN DTW CV & 1-NN DTW & BOSS & Learning \newline{} Shapelet (LS) & TSBF & ST & EE (PROP) & COTE (ensemble) & MLP & CNN \\ \hline lstm-fcn & 0.096581 & 0 & & & & & & & & & & & & & \\ \hline tfcn & 3.76E-06 & 5.30E-06 & 0 & & & & & & & & & & & & \\ \hline Resnet & 1.03E-08 & 1.82E-06 & 0.005163 & 0 & & & & & & & & & & & \\ \hline fcn & 2.92E-11 & 1.45E-08 & 0.001401 & 0.958291 & 0 & & & & & & & & & & \\ \hline 1-NN DTW CV & 1.52E-13 & 3.48E-13 & 5.74E-12 & 3.69E-10 & 1.53E-07 & 0 & & & & & & & & & \\ \hline 1-NN DTW & 2.81E-14 & 4.45E-14 & 5.64E-13 & 8.44E-13 & 2.98E-10 & 0.000381 & 0 & & & & & & & & \\ \hline BOSS & 1.79E-12 & 1.43E-10 & 2.52E-06 & 0.002485 & 0.012174 & 2.67E-07 & 1.11E-10 & 0 & & & & & & & \\ \hline Learning Shapelet (LS) & 7.05E-12 & 1.65E-11 & 8.39E-09 & 9.77E-06 & 0.000346 & 0.000416 & 1.04E-06 & 0.032497 & 0 & & & & & & \\ \hline TSBF & 1.49E-12 & 1.10E-12 & 1.65E-09 & 1.70E-08 & 1.59E-06 & 0.014259 & 5.39E-05 & 0.001402 & 0.423474 & 0 & & & & & \\ \hline ST & 5.02E-11 & 8.09E-11 & 5.57E-06 & 0.006204 & 0.004078 & 1.61E-07 & 5.75E-10 & 0.15641 & 0.002506 & 0.00031 & 0 & & & & \\ \hline EE (PROP) & 1.23E-11 & 7.22E-11 & 5.22E-08 & 1.66E-06 & 0.000117 & 8.67E-10 & 1.71E-11 & 0.022618 & 0.935015 & 0.518861 & 0.001094 & 0 & & & \\ \hline COTE (ensemble) & 2.38E-09 & 2.25E-07 & 0.002011 & 0.438745 & 0.144622 & 1.82E-13 & 5.82E-14 & 0.000584 & 2.20E-09 & 8.15E-09 & 0.001998 & 1.55E-11 & 0 & & \\ \hline MLP & 3.63E-13 & 4.91E-13 & 1.56E-12 & 5.94E-08 & 9.91E-07 & 0.924497 & 0.168452 & 0.000426 & 0.017383 & 0.046248 & 2.19E-05 & 0.016323 & 8.66E-08 & 0 & \\ \hline CNN & 8.40E-09 & 4.20E-06 & 0.168655 & 0.222513 & 0.316416 & 9.73E-10 & 3.14E-12 & 0.001762 & 1.18E-06 & 4.24E-08 & 0.00088 & 8.24E-07 & 0.114445 & 2.78E-10 & 0 \\ \hline \end{tabular}} \end{table}% \section{Conclusion} We present RAN as a potential new architecture for time-series or sequence-driven modeling. Out of the standard 85 UCR data sets, we have achieved 35 state-of-the-art results with 10 results matching current state-of-the-art results without further model fine-tuning. The results indicate that such architecture is promising in complex, long-sequence modeling and may have vast, cross-domain applications. \newpage \bibliographystyle{plain}
\section{Introduction} Although deep network architectures continue to be successful in a wide range of applications, the problem of learning \emph{robust} deep networks remains an active area of research. In particular, safety and security focused applications are concerned about robustness to adversarial examples, data points which have been adversarially perturbed to fool a model \citep{szegedy2013intriguing}. The goal here is to learn a model which is not only accurate on the data, but also accurate on adversarially perturbed versions of the data. To this end, a number of defenses have been proposed to mitigate the problem and improve the robustness of deep networks, with some of the most reliable being certified defenses and adversarial training. However, both of these approaches come at a non-trivial, additional computational cost, often increasing training time by an order of magnitude over standard training. This has slowed progress in researching robustness in deep networks, due to the computational difficulty in scaling to much larger networks and the inability to rapidly train models when experimenting with new ideas. In response to this difficulty, there has been a recent surge in work that tries to to reduce the complexity of generating an adversarial example, which forms the bulk of the additional computation in adversarial training \citep{zhang2019you, shafahi2019adversarial}. While these works present reasonable improvements to the runtime of adversarial training, they are still significantly slower than standard training, which has been greatly accelerated due to competitions for optimizing both the speed and cost of training \citep{coleman2017dawnbench}. In this work, we argue that adversarial training, in fact, is not as hard as has been suggested by this past line of work. In particular, we revisit one of the the \emph{first} proposed methods for adversarial training, using the Fast Gradient Sign Method (FGSM) to add adversarial examples to the training process \citep{goodfellow2014explaining}. Although this approach has long been dismissed as ineffective, we show that by simply introducing random initialization points, FGSM-based training is \emph{as effective as projected gradient descent based training} while being an order of magnitude more efficient. Moreover, FGSM adversarial training (and to a lesser extent, other adversarial training methods) can be drastically accelerated using standard techniques for efficient training of deep networks, including e.g. cyclic learning rates \citep{smith2018super}, mixed-precision training \citep{micikevicius2017mixed}, and other similar techniques. The method has extremely few free parameters to tune, and can be easily adapted to most training procedures. We further identify a failure mode that we call ``catastrophic overfitting'', which may have caused previous attempts at FGSM adversarial training to fail against PGD-based attacks. The end result is that, with these approaches, we are able to train (empirically) robust classifiers far faster than in previous work. Specifically, we train an $\ell_\infty$ robust CIFAR10 model to $45\%$ accuracy at $\epsilon=8/255$ (the same level attained in previous work) in \emph{6 minutes}; previous papers reported times of 80 hours for PGD-based training \citep{madry2017towards} and 10 hours for the more recent ``free'' adversarial training method \citep{shafahi2019adversarial}. Similarly, we train an $\ell_\infty$ robust ImageNet classifier to $43\%$ top-1 accuracy at $\epsilon=2/255$ (again matching previous results) in 12 hours of training (compared to 50 hours in the best reported previous work that we are aware of \citep{shafahi2019adversarial}). Both of these times roughly match the comparable time for quickly training a standard \emph{non-robust} model to reasonable accuracy. We extensively evaluate these results against \emph{strong PGD-based attacks}, and show that they obtain the same empirical performance as the slower, PGD-based training. Thus, we argue that despite the conventional wisdom, adversarially robust training is not actually more challenging than standard training of deep networks, and can be accomplished with the notoriously weak FGSM attack. \section{Related work} After the discovery of adversarial examples by \citet{szegedy2013intriguing}, \citet{goodfellow2014explaining} proposed the Fast Gradient Sign Method (FGSM) to generate adversarial examples with a single gradient step. This method was used to perturb the inputs to the model before performing backpropagation as an early form of adversarial training. This attack was enhanced by adding a randomization step, which was referred to as R+FGSM \citep{tramer2017ensemble}. Later, the Basic Iterative Method improved upon FGSM by taking multiple, smaller FGSM steps, ultimately rendering both FGSM-based adversarial training ineffective \citep{kurakin2016adversarial}. This iterative adversarial attack was further strengthened by adding multiple random restarts, and was also incorporated into the adversarial training procedure. These improvements form the basis of what is widely understood today as adversarial training against a projected gradient descent (PGD) adversary, and the resulting method is recognized as an effective approach to learning robust networks \citep{madry2017towards}. Since then, the PGD attack and its corresponding adversarial training defense have been augmented with various techniques, such as optimization tricks like momentum to improve the adversary \citep{dong2018boosting}, combination with other heuristic defenses like matrix estimation \citep{yang2019me} or logit pairing \citep{mosbach2018logit}, and generalization to multiple types of adversarial attacks \citep{tramer2019adversarial, maini2019adversarial}. In addition to adversarial training, a number of other defenses against adversarial attacks have also been proposed. Adversarial defenses span a wide range of methods, such as preprocessing techniques \citep{guo2017countering, buckman2018thermometer, song2017pixeldefend}, detection algorithms \citep{metzen2017detecting, feinman2017detecting, carlini2017adversarial}, verification and provable defenses \citep{katz2017reluplex, sinha2017certifying, wong2017provable, raghunathan2018semidefinite}, and various theoretically motivated heuristics \citep{xiao2018training, croce2018provable}. While certified defenses have been scaled to reasonably sized networks \citep{wong2018scaling, mirman2018differentiable, gowal2018effectiveness, cohen2019certified, salman2019provably}, the guarantees don't match the empirical robustness obtained through adversarial training. With the proposal of many new defense mechanisms, of great concern in the community is the use of strong attacks for evaluating robustness: weak attacks can give a misleading sense of security, and the history of adversarial examples is littered with adversarial defenses \citep{papernot2016distillation, lu2017no, kannan2018adversarial, tao2018attacks} which were ultimately defeated by stronger attacks \citep{carlini2016defensive, carlini2017towards, athalye2017synthesizing, engstrom2018evaluating, carlini2019ami}. This highlights the difficulty of evaluating adversarial robustness, as pointed out by other work which began to defeat proposed defenses en masse \citep{uesato2018adversarial, athalye2018obfuscated}. Since then, several best practices have been proposed to mitigate this problem \citep{carlini2019evaluating}. Despite the eventual defeat of other adversarial defenses, adversarial training with a PGD adversary remains empirically robust to this day. However, running a strong PGD adversary within an inner loop of training is expensive, and some earlier work in this topic found that taking larger but fewer steps did not always significantly change the resulting robustness of a network \citep{wang2018bilateral}. To combat the increased computational overhead of the PGD defense, some recent work has looked at regressing the $k$-step PGD adversary to a variation of its single-step FGSM predecessor called ``free'' adversarial training, which can be computed with little overhead over standard training by using a single backwards pass to simultaneously update both the model weights and also the input perturbation \citep{shafahi2019adversarial}. Finally, when performing a multi-step PGD adversary, it is possible to cut out redundant calculations during backpropagation when computing adversarial examples for additional speedup \citep{zhang2019you}. Although these improvements are certainly faster than the standard adversarial training procedure, they are not much faster than traditional training methods, and can still take hours to days to compute. On the other hand, top performing training methods from the DAWNBench competition \citep{coleman2017dawnbench} are able to train CIFAR10 and ImageNet architectures to standard benchmark metrics in mere minutes and hours respectively, using only a modest amount of computational resources. Although some of the techniques can be quite problem specific for achieving bleeding-edge performance, more general techniques such as cyclic learning rates \citep{smith2018super} and half-precision computations \citep{micikevicius2017mixed} have been quite successful in the top ranking submissions, and can also be useful for adversarial training. \section{Adversarial training overview} Adversarial training is a method for learning networks which are robust to adversarial attacks. Given a network $f_\theta$ parameterized by $\theta$, a dataset $(x_i,y_i)$, a loss function $\ell$ and a threat model $\Delta$, the learning problem is typically cast as the following robust optimization problem, \begin{equation} \min_\theta \sum_i \max_{\delta \in \Delta} \ell(f_\theta(x_i + \delta), y_i). \end{equation} A typical choice for a threat model is to take $\Delta = \{\delta : \|\delta\|_\infty \leq \epsilon\}$ for some $\epsilon >0$. This is the $\ell_\infty$ threat model used by \citet{madry2017towards} and is the setting we study in this paper. The procedure for adversarial training is to use some adversarial attack to approximate the inner maximization over $\Delta$, followed by some variation of gradient descent on the model parameters $\theta$. For example, one of the earliest versions of adversarial training used the Fast Gradient Sign Method to approximate the inner maximization. This could be seen as a relatively inaccurate approximation of the inner maximization for $\ell_\infty$ perturbations, and has the following closed form \citep{goodfellow2014explaining}: \begin{equation} \delta^\star = \epsilon\cdot \sign(\nabla_x \ell(f(x),y)). \end{equation} A better approximation of the inner maximization is to take multiple, smaller FGSM steps of size $\alpha$ instead. When the iterate leaves the threat model, it is projected back to the set $\Delta$ (for $\ell_\infty$ perturbations. This is equivalent to clipping $\delta$ to the interval $[-\epsilon, \epsilon]$). Since this is only a local approximation of a non-convex function, multiple random restarts within the threat model $\Delta$ typically improve the approximation of the inner maximization even further. A combination of all these techniques is known as the PGD adversary \citep{madry2017towards}, and its usage in adversarial training is summarized in Algorithm \ref{alg:pgd}. \begin{algorithm}[t] \caption{PGD adversarial training for $T$ epochs, given some radius $\epsilon$, adversarial step size $\alpha$ and $N$ PGD steps and a dataset of size $M$ for a network $f_\theta$} \label{alg:pgd} \begin{algorithmic} \FOR {$t=1\dots T$} \FOR {$i=1\dots M$} \STATE \textit{// Perform PGD adversarial attack} \STATE $\delta = 0$ \textit{// or randomly initialized} \FOR {$j=1\dots N$} \STATE $\delta = \delta + \alpha \cdot \sign(\nabla_\delta \ell(f_\theta(x_i + \delta),y_i))$ \STATE $\delta = \max(\min(\delta, \epsilon), -\epsilon)$ \ENDFOR \STATE $\theta = \theta - \nabla_\theta \ell(f_\theta(x_i + \delta), y_i)$ \textit{// Update model weights with some optimizer, e.g. SGD} \ENDFOR \ENDFOR \end{algorithmic} \end{algorithm} Note that the number of gradient computations here is proportional to $O(MN)$ in a single epoch, where $M$ is the size of the dataset and $N$ is the number of steps taken by the PGD adversary. This is $N$ times greater than standard training (which has $O(M)$ gradient computations per epoch), and so adversarial training is typically $N$ times slower than standard training. \subsection{``Free'' adversarial training} To get around this slowdown of a factor of $N$, \citet{shafahi2019adversarial} instead propose ``free'' adversarial training. This method takes FGSM steps with full step sizes $\alpha = \epsilon$ followed by updating the model weights for $N$ iterations on the same minibatch (also referred to as ``minibatch replays''). The algorithm is summarized in Algorithm \ref{alg:free}. Note that perturbations are not reset between minibatches. To account for the additional computational cost of minibatch replay, the total number of epochs is reduced by a factor of $N$ to make the total cost equivalent to $T$ epochs of standard training. Although ``free'' adversarial training is faster than the standard PGD adversarial training, it is not as fast as we'd like: \citet{shafahi2019adversarial} need to run over 200 epochs in over 10 hours to learn a robust CIFAR10 classifier and two days to learn a robust ImageNet classifier, whereas standard training can be accomplished in minutes and hours for the same respective tasks. \begin{algorithm}[t] \caption{``Free'' adversarial training for $T$ epochs, given some radius $\epsilon$, $N$ minibatch replays, and a dataset of size $M$ for a network $f_\theta$} \label{alg:free} \begin{algorithmic} \STATE $\delta = 0$ \STATE \textit{// Iterate T/N times to account for minibatch replays and run for T total epochs} \FOR {$t=1\dots T/N$} \FOR {$i=1\dots M$} \STATE \textit{// Perform simultaneous FGSM adversarial attack and model weight updates $T$ times} \FOR {$j=1\dots N$} \STATE \textit{// Compute gradients for perturbation and model weights simultaneously} \STATE $\nabla_\delta, \nabla_\theta = \nabla \ell(f_\theta(x_i + \delta),y_i)$ \STATE $\delta = \delta + \epsilon \cdot \sign(\nabla_\delta)$ \STATE $\delta = \max(\min(\delta, \epsilon), -\epsilon)$ \STATE $\theta = \theta - \nabla_\theta$ \textit{// Update model weights with some optimizer, e.g. SGD} \ENDFOR \ENDFOR \ENDFOR \end{algorithmic} \end{algorithm} \section{Fast adversarial training} To speed up adversarial training and move towards the state of the art in fast standard training methods, we first highlight the main empirical contribution of the paper: that FGSM adversarial training combined with random initialization is just as effective a defense as PGD-based training. Following this, we discuss several techniques from the DAWNBench competition \citep{coleman2017dawnbench} that are applicable to all adversarial training methods, which reduce the total number of epochs needed for convergence with cyclic learning rates and further speed up computations with mixed-precision arithmetic. \begin{algorithm}[t] \caption{FGSM adversarial training for $T$ epochs, given some radius $\epsilon$, $N$ PGD steps, step size $\alpha$, and a dataset of size $M$ for a network $f_\theta$} \label{alg:fast} \begin{algorithmic} \FOR {$t=1\dots T$} \FOR {$i=1\dots M$} \STATE \textit{// Perform FGSM adversarial attack} \STATE $\delta = \text{Uniform}(-\epsilon, \epsilon)$ \STATE $\delta = \delta + \alpha \cdot \sign(\nabla_\delta \ell(f_\theta(x_i + \delta),y_i))$ \STATE $\delta = \max(\min(\delta, \epsilon), -\epsilon)$ \STATE $\theta = \theta - \nabla_\theta \ell(f_\theta(x_i + \delta), y_i)$ \textit{// Update model weights with some optimizer, e.g. SGD} \ENDFOR \ENDFOR \end{algorithmic} \end{algorithm} \subsection{Revisiting FGSM adversarial training} \label{sec:random} Despite being quite similar to FGSM adversarial training, free adversarial training is empirically robust against PGD attacks whereas FGSM adversarial training is not believed to be robust. To analyze why, we identify a key difference between the methods: a property of free adversarial training is that the perturbation from the previous iteration is used as the initial starting point for the next iteration. However, there is little reason to believe that an adversarial perturbation for a previous minibatch is a reasonable starting point for the next minibatch. As a result, we hypothesize that the main benefit comes from simply starting from a non-zero initial perturbation. \begin{table}[t] \caption{Standard and robust performance of various adversarial training methods on CIFAR10 for $\epsilon=8/255$ and their corresponding training times} \label{table:fgsm} \begin{center} \begin{tabular}{lrrr} {Method} & {Standard accuracy} &{PGD ($\epsilon=8/255$)} & {Time (min)}\\ \toprule FGSM + DAWNBench\\ \quad + zero init & 85.18\% & 0.00\% & 12.37\\ \quad\quad + early stopping & 71.14\% & 38.86\% & 7.89\\ \quad + previous init & 86.02\% & 42.37\% & 12.21\\ \quad + random init & 85.32\% & 44.01\% & 12.33\\ \quad\quad + $\alpha=10/255$ step size & 83.81\% & 46.06\% & 12.17\\ \quad\quad + $\alpha=16/255$ step size & 86.05\% & 0.00\% & 12.06\\ \quad\quad\quad + early stopping & 70.93\% & 40.38\% & 8.81\\ \midrule ``Free'' $(m=8)$ \citep{shafahi2019adversarial}\tablefootnote{As reported by \citet{shafahi2019adversarial} using a different network architecture and an adversary with 20 steps and 10 restarts, which is strictly weaker than the adversary used in this paper.} & 85.96\% & 46.33\% & 785\\ \quad + DAWNBench & 78.38\% & 46.18\% & 20.91\\ \midrule PGD-7 \citep{madry2017towards}\tablefootnote{As reported by \citet{madry2017towards} using a different network architecture and an adversary and an adversary with 20 steps and no restarts, which is strictly weaker than the adversary used in this paper} & 87.30\% & 45.80\% & 4965.71 \\ \quad + DAWNBench & 82.46\% & 50.69\% & 68.8\\ \bottomrule \end{tabular} \end{center} \end{table} In light of this difference, our approach is to use FGSM adversarial training with random initialization for the perturbation, as shown in Algorithm \ref{alg:fast}. We find that, in contrast to what was previously believed, this simple adjustment to FGSM adversarial training can be used as an effective defense on par with PGD adversarial training. Crucially, we find that starting from a non-zero initial perturbation is the primary driver for success, regardless of the actual initialization. In fact, both starting with the previous minibatch's perturbation or initializing from a uniformly random perturbation allow FGSM adversarial training to succeed at being robust to full-strength PGD adversarial attacks. Note that randomized initialization for FGSM is not a new idea and was previously studied by \citet{tramer2017ensemble}. Crucially, \citet{tramer2017ensemble} use a different, more restricted random initialization and step size, which does not result in models robust to full-strength PGD adversaries. A more detailed comparison of their approach with ours is in Appendix \ref{app:rfgsm}. To test the effect of initialization in FGSM adversarial training, we train several models to be robust at a radius $\epsilon=8/255$ on CIFAR10, starting with the most ``pure'' form of FGSM, which takes steps of size $\alpha=\epsilon$ from a zero-initialized perturbation. The results, given in Table \ref{table:fgsm}, are consistent with the literature, and show that the model trained with zero-initialization is not robust against a PGD adversary. However, surprisingly, simply using a random or previous-minibatch initialization instead of a zero initialization actually results in reasonable robustness levels (with random initialization performing slightly better) that are comparable to both free and PGD adversarial training methods. The adversarial accuracies in Table \ref{table:fgsm} are calculated using a PGD adversary with 50 iterations, step size $\alpha=2/255$, and 10 random restarts. Specific optimization parameters used for training these models can be found in Appendix \ref{app:fgsm_table}. \paragraph{FGSM step size} Note that an FGSM step with size $\alpha=\epsilon$ from a non-zero initialization is not guaranteed to lie on the boundary of the $\ell_\infty$ ball, and so this defense could potentially be seen as too weak. We find that increasing the step size by a factor of 1.25 to $\alpha=10/255$ further improved the robustness of the model so that it is on par with the best reported result from free adversarial training. However, we also found that forcing the resulting perturbation to lie on the boundary with a step size of $\alpha=2\epsilon$ resulted in catastrophic overfitting: it does not produce a model robust to adversarial attacks. These two failure modes (starting from a zero-initialized perturbation and generating perturbations at the boundary) may explain why previous attempts at FGSM adversarial training failed, as the model overfits to a restricted threat model, and is described in more detail in Section \ref{sec:failure}. A full curve showing the effect of a range of FGSM step sizes on the robust performance can be found in Appendix \ref{app:stepsize}. \paragraph{Computational complexity} A second key difference between FGSM and free adversarial training is that the latter uses a single backwards pass to compute gradients for both the perturbation and the model weights while repeating the same minibatch $m$ times in a row, called ``minibatch replay''. In comparison, the FGSM adversarial training does not need to repeat minibatches, but needs two backwards passes to compute gradients separately for the perturbation and the model weights. As a result, the computational complexity for an epoch of FGSM adversarial training is not truly free and is equivalent to two epochs of standard training. \subsection{DAWNBench improvements} \label{sec:dawnbench} Although free adversarial training is of comparable cost per iteration to traditional standard training methods, it is not quite comparable in total cost to more recent advancements in fast methods for standard training. Notably, top submissions to the DAWNBench competition have shown that CIFAR10 and ImageNet classifiers can be trained at significantly quicker times and at much lower cost than traditional training methods. Although some of the submissions can be quite unique in their approaches, we identify two generally applicable techniques which have a significant impact on the convergence rate and computational speed of standard training. \paragraph{Cyclic learning rate} Introduced by \citet{smith2017cyclical} for improving convergence and reducing the amount of tuning required when training networks, a cyclic schedule for a learning rate can drastically reduce the number of epochs required for training deep networks \citep{smith2018super}. A simple cyclic learning rate schedules the learning rate linearly from zero, to a maximum learning rate, and back down to zero (examples can be found in Figure \ref{fig:cyclic-lr}). Using a cyclic learning rate allows CIFAR10 architectures to converge to benchmark accuracies in tens of epochs instead of hundreds, and is a crucial component of some of the top DAWNBench submissions. \begin{figure}[t] \centering \begin{subfigure}[t]{0.45\textwidth} \centering \includegraphics{figures/lr_cifar10.pdf} \caption{CIFAR10} \end{subfigure}% ~ \begin{subfigure}[t]{0.45\textwidth} \centering \includegraphics{figures/lr_imagenet.pdf} \caption{ImageNet} \end{subfigure} \caption{Cyclic learning rates used for FGSM adversarial training on CIFAR10 and ImageNet over epochs. The ImageNet cyclic schedule is decayed further by a factor of 10 in the second and third phases.} \label{fig:cyclic-lr} \end{figure} \paragraph{Mixed-precision arithmetic} With newer GPU architectures coming with tensor cores specifically built for rapid half-precision calculations, using mixed-precision arithmetic when training deep networks can also provide significant speedups for standard training \citep{micikevicius2017mixed}. This can drastically reduce the memory utilization, and when tensor cores are available, also reduce runtime. In some DAWNBench submissions, switching to mixed-precision computations was key to achieving fast training while keeping costs low. We adopt these two techniques for use in adversarial training, which allows us to drastically reduce the number of training epochs as well as the runtime on GPU infrastructure with tensor cores, while using modest amounts of computational resources. Notably, both of these improvements can be easily applied to existing implementations of adversarial training by adding a few lines of code with very little additional engineering effort, and so are easily accessible by the general research community. \section{Experiments} To demonstrate the effectiveness of FGSM adversarial training with fast training methods, we run a number of experiments on MNIST, CIFAR10, and ImageNet benchmarks. All CIFAR10 experiments in this paper are run on a single GeForce RTX 2080ti using the PreAct ResNet18 architecture, and all ImageNet experiments are run on a single machine with four GeForce RTX 2080tis using the ResNet50 architecture \citep{he2016deep}. Repositories for reproducing all experiments and the corresponding trained model weights are available at \url{https://github.com/locuslab/fast_adversarial}. All experiments using FGSM adversarial training in this section are carried out with random initial starting points and step size $\alpha=1.25\epsilon$ as described in Section \ref{sec:random}. All PGD adversaries used at evaluation are run with 10 random restarts for 50 iterations (with the same hyperparameters as those used by \citet{shafahi2019adversarial} but further strengthened with random restarts). Speedup with mixed-precision was incorporated with the Apex \texttt{amp} package at the \texttt{O1} optimization level for ImageNet experiments and \texttt{O2} without loss scaling for CIFAR10 experiments.\footnote{Since CIFAR10 did not suffer from loss scaling problems, we found using the \texttt{O2} optimization level without loss scaling for mixed-precision arithmetic to be slightly faster.} \begin{table}[t] \caption{Robustness of FGSM and PGD adversarial training on MNIST} \label{table:mnist} \begin{center} \begin{tabular}{lrrrr} { Method} & {Standard accuracy} &{ PGD $(\epsilon=0.1)$} & { PGD $(\epsilon=0.3)$} &{ Verified $(\epsilon=0.1)$}\\ \toprule PGD & 99.20\% & 97.66\% & 89.90\% & 96.7\% \\ FGSM & 99.20\% & 97.53\% & 88.77\% & 96.8\% \\ \bottomrule \end{tabular} \end{center} \end{table} \subsection{Verified performance on MNIST} Since the FGSM attack is known to be significantly weaker than the PGD attack, it is understandable if the reader is still skeptical of the true robustness of the models trained using this method. To demonstrate that FGSM adversarial training confers real robustness to the model, in addition to evaluating against a PGD adversary, we leverage mixed-integer linear programming (MILP) methods from formal verification to calculate the exact robustness of small, but verifiable models \citep{tjeng2017evaluating}. We train two convolutional networks with 16 and 32 convolutional filters followed by a fully connected layer of 100 units, the same architecture used by \citet{tjeng2017evaluating}. We use both PGD and FGSM adversarial training at $\epsilon=0.3$, where the PGD adversary for training has 40 iterations with step size $0.01$ as done by \citet{madry2017towards}. The exact verification results can be seen in Table \ref{table:mnist}, where we find that FGSM adversarial training confers empirical and verified robustness which is nearly indistinguishable to that of PGD adversarial training on MNIST.\footnote{Exact verification results at $\epsilon=0.3$ for both the FGSM and PGD trained models are not possible since the size of the resulting MILP is too large to be solved in a reasonable amount of time. The same issue also prevents us from verifying networks trained on datasets larger than MNIST, which have to rely on empirical tests for evaluating robustness.} \begin{figure}[t] \centering \begin{subfigure}[t]{0.33\textwidth} \centering \includegraphics{figures/fgsm_curves.pdf} \caption{FGSM} \end{subfigure}% ~ \begin{subfigure}[t]{0.33\textwidth} \centering \includegraphics{figures/pgd_curves.pdf} \caption{PGD} \end{subfigure}% ~ \begin{subfigure}[t]{0.33\textwidth} \centering \includegraphics{figures/free_curves.pdf} \caption{``Free'' ($m=8$)} \end{subfigure} \caption{Performance of models trained on CIFAR10 at $\epsilon=8/255$ with cyclic learning rates and half precision, given varying numbers of epochs across different adversarial training methods. Each point denotes the average model performance over 3 independent runs, where the $x$ axis denotes the number of epochs $N$ the model was trained for, and the $y$ axis denotes the resulting accuracy. The orange dots measure accuracy on natural images and the blue dots plot the empirical robust accuracy on adversarial images. The vertical dotted line indicates the minimum number of epochs needed to train a model to 45\% robust accuracy.} \label{fig:epochs} \end{figure} \subsection{Fast CIFAR10} We begin our CIFAR10 experiments by combining the DAWNBench improvements from Section \ref{sec:dawnbench} with various forms of adversarial training. For $N$ epochs, we use a cyclic learning rate that increases linearly from $0$ to $\lambda$ over the first $N/2$ epochs, then decreases linearly from $\lambda$ to $0$ for the remaining epochs, where $\lambda$ is the maximum learning rate. For each method, we individually tune $\lambda$ to be as large as possible without causing the training loss to diverge, which is the recommended learning rate test from \citet{smith2018super}. To identify the minimum number of epochs needed for each adversarial training method, we repeatedly run each method over a range of maximum epochs $N$, and then plot the final robustness of each trained model in Figure \ref{fig:epochs}. While all the adversarial training methods benefit greatly from the cyclic learning rate schedule, we find that both FGSM and PGD adversarial training require much fewer epochs than free adversarial training, and consequently reap the greatest speedups. \begin{table}[t] \caption{Time to train a robust CIFAR10 classifier to 45\% robust accuracy using various adversarial training methods with the DAWNBench techniques of cyclic learning rates and mixed-precision arithmetic, showing significant speedups for all forms of adversarial training.} \label{table:fast} \begin{center} \begin{tabular}{lrrr} { Method} &{ Epochs} &{ Seconds/epoch} &{ Total time (minutes)}\\ \toprule DAWNBench + PGD-7 & 10 & 104.94 & 17.49 \\ DAWNBench + Free ($m=8$) & 80 & 13.08 & 17.44 \\ DAWNBench + FGSM & 15 & 25.36 & 6.34 \\ \midrule PGD-7 \citep{madry2017towards}\tablefootnote{Runtimes calculated on our hardware using the publicly available training code at \url{https://github.com/MadryLab/cifar10_challenge}.} & 205 & 1456.22 & 4965.71 \\ Free ($m=8$) \citep{shafahi2019adversarial}\tablefootnote{Runtimes calculated on our hardware using the publicly available training code at \url{https://github.com/ashafahi/free_adv_train}.} & 205 & 197.77 & 674.39 \\ \bottomrule \end{tabular} \end{center} \end{table} Using the minimum number of epochs needed for each training method to reach a baseline of 45\% robust accuracy, we report the total training time in Table \ref{table:fast}. We find that while all adversarial training methods benefit from the DAWNBench improvements, FGSM adversarial training is the fastest, capable of learning a robust CIFAR10 classifier in 6 minutes using only 15 epochs. Interestingly, we also find that PGD and free adversarial training take comparable amounts of time, largely because free adversarial training does not benefit from the cyclic learning rate as much as PGD or FGSM adversarial training. \begin{table}[t] \caption{Imagenet classifiers trained with adversarial training methods at $\epsilon=2/255$ and $\epsilon=4/255$.} \label{table:imagenet_eps4} \begin{center} \begin{tabular}{lcrrrrr} { Method} & { $\epsilon$} &{ Standard acc.} &{ PGD+1 restart} & {PGD+10 restarts} & {Total time (hrs)}\\ \toprule FGSM & $2/255$ & 60.90\% & 43.46\% & 43.43\% & 12.14\\ Free $(m=4)$ & $2/255$ & 64.37\% & 43.31\% & 43.28\% & 52.20\\ \midrule FGSM & $4/255$ & 55.45\% & 30.28\% & 30.18\% & 12.14\\ Free $(m=4)$ & $4/255$ & 60.42\% & 31.22\% & 31.08\% & 52.20\\ \bottomrule \end{tabular} \end{center} \end{table} \subsection{Fast ImageNet} Finally, we apply all of the same techniques (FGSM adversarial training, mixed-precision, and cyclic learning rate) on the ImageNet benchmark. In addition, the top submissions from the DAWNBench competition for ImageNet utilize two more improvements on top of this, the first of which is the removal of weight decay regularization from batch normalization layers. The second addition is to progressively resize images during training, starting with larger batches of smaller images in the beginning and moving on to smaller batches of larger images later. Specifically, training is divided into three phases, where phases 1 and 2 use images resized to 160 and 352 pixels respectively, and phase 3 uses the entire image. We train models to be robust at $\epsilon=2/255$ and $\epsilon=4/255$ and compare to free adversarial training in Table \ref{table:imagenet_eps4}, showing similar levels of robustness. In addition to using ten restarts, we also report the PGD accuracy with one restart to reproduce the evaluation done by \citet{shafahi2019adversarial}. \begin{table}[t] \caption{Time to train a robust ImageNet classifier using various fast adversarial training methods} \label{table:imagenet-times} \begin{center} \begin{tabular}{lcrrr} { Method} & { Precision} &{ Epochs} &{ Min/epoch} &{Total time (hrs)}\\ \toprule FGSM (phase 1) & single & 6 & 22.65 & 2.27 \\ FGSM (phase 2) & single & 6 & 65.97 & 6.60 \\ FGSM (phase 3) & single & 3 & 114.45 & 5.72 \\ \cmidrule{2-5} FGSM & single & 15 & - & 14.59 \\ \midrule Free $(m=4)$ & single & 92 & 34.04 & 52.20\\ \midrule[0.08em] FGSM (phase 1) & mixed & 6 & 20.07 & 2.01 \\ FGSM (phase 2) & mixed & 6 & 53.39 & 5.34 \\ FGSM (phase 3) & mixed & 3 & 95.93 & 4.80 \\ \cmidrule{2-5} FGSM & mixed & 15 & - & 12.14 \\ \midrule Free $(m=4)$& mixed & 92 & 25.28 & 38.76\\ \bottomrule \end{tabular} \end{center} \end{table} With these techniques, we can train an ImageNet classifier using 15 epochs in 12 hours using FGSM adversarial training, taking a fraction of the cost of free adversarial training as shown in Table \ref{table:imagenet-times}.\footnote{We use the implementation of free adversarial training for ImageNet publicly available at \url{https://github.com/mahyarnajibi/FreeAdversarialTraining} and reran it on the our machines to account for any timing discrepancies due to differences in hardware} We compare to the best performing variation of free adversarial training which which uses $m=4$ minibatch replays over 92 epochs of training (scaled down accordingly to 23 passes over the data). Note that free adversarial training can also be enhanced with mixed-precision arithmetic, which reduces the runtime by 25\%, but is still slower than FGSM-based training. Directly combining free adversarial training with the other fast techniques used in FGSM adversarial training for ImageNet results in reduced performance which we describe in Appendix \ref{app:free-imagenet}. \subsection{Catastrophic overfitting} \label{sec:failure} While FGSM adversarial training works in the context of this paper, many other researchers have tried and failed to have FGSM adversarial training work. In addition to using a zero initialization or too large of a step size as seen in Table \ref{table:fgsm}, other design decisions (like specific learning rate schedules or numbers of epochs) for the training procedure can also make it more likely for FGSM adversarial training to fail. However, all of these failure modes result in what we call ``catastrophic overfitting'', where the robust accuracy with respect to a PGD adversarial suddenly and drastically drops to 0\% (on the training data). Due to the rapid deterioration of robust performance, these alternative versions of FGSM adversarial training can be salvaged to some degree with a simple early-stopping scheme by measuring PGD accuracy on a small minibatch of training data, and the recovered results for some of these failure modes are shown in Table \ref{table:fgsm}. Catastrophic overfitting and the early-stopping scheme are discussed in more detail in Appendix \ref{app:overfitting}. \subsection{Takeaways from FGSM adversarial training} While it may be surprising that FGSM adversarial training can result in robustness to full PGD adversarial attacks, this work highlights some empirical hypotheses and takeaways which we describe below. \begin{enumerate} \item \emph{Adversarial examples need to span the entire threat model.} One of the reasons why FGSM and R+FGSM as done by \citet{tramer2017ensemble} may have failed is due to the restricted nature of the generated examples: the restricted (or lack of) initialization results in perturbations which perturb each dimension by either $0$ or $\pm\epsilon$, and so adversarial examples with feature perturbations in between are never seen. This is discussed further in Appendix \ref{app:overfitting}. \item \emph{Defenders don't need strong adversaries during training.} This work suggests that rough approximations to the inner optimization problem are sufficient for adversarial training. This is in contrast to the usage of strong adversaries at evaluation time, where it is standard practice to use multiple restarts and a large number of PGD steps. \end{enumerate} \section{Conclusion} Our findings show that FGSM adversarial training, when used with random initialization, can in fact be just as effective as the more costly PGD adversarial training. While a single iteration of FGSM adversarial training is double the cost of free adversarial training, it converges significantly faster, especially with a cyclic learning rate schedule. As a result, we are able to learn adversarially robust classifiers for CIFAR10 in minutes and for ImageNet in hours, even faster than free adversarial training but with comparable levels of robustness. We believe that leveraging these significant reductions in time to train robust models will allow future work to iterate even faster, and accelerate research in learning models which are resistant to adversarial attacks. By demonstrating that extremely weak adversarial training is capable of learning robust models, this work also exposes a new potential direction in more rigorously explaining when approximate solutions to the inner optimization problem are sufficient for robust optimization, and when they fail.
\section{Introduction}\label{intro} When trends of charts of indices or stocks are investigated then it is common to use so called trend indicators to decide whether to buy, hold or sell. But how are these indicators calculated? The first idea is, to smooth the curve of points given by the closes and extract informations from the relation between the original and the smoothed curve. One assumption on the smoothing, is that local maxima and minima should not be seen by the smoothed curve when they are only short living or of low amplitude. Another assumption is, that the information is achieved from the data alone and not from its development. Therefore, usual simple methods like interpolation by polynomials or Bezier curves are not appropriate, if we do not want to remove single data from our calculations. Another way is to use regression methods. This is not applicable to our problem, too, because the choice of an adequate regression curve needs the knowledge of the shape of the original curve, i.e.\ the development of the data. For the properties of interpolation and regression see for example \cite{num1} and \cite{num2}. A good way of smoothing turns out to consider averages of the original sequence of closes. But what average should we take? In the literature moving averages as well as exponential averages are taken to be good candidates, see for example \cite{appel}, \cite{kauf1}, or \cite{pring}. In this note we discuss some frequently used objects such as the so called exponential moving average (EMA), which is not a moving average in a mathematically rigorous sense, and compare it to the rigorous moving exponential average (MEA), see Section \ref{meaea}. Before we do so, we give a precise notion of average and moving average for a real sequence in Sections \ref{av} and \ref{movav} and discuss examples. In Section \ref{appli} we apply the discussion to trend analysis by introducing the EMA and the moving average convergence/divergence (MACD). We discuss these objects at a basic example, too. The motivation for this note came from the request to explain special technical trend indicators like the MACD. This request was annexed a lot of texts from the world wide web. In all of these texts the terms we explain here in a rigorous way were mixed up or were not used properly. Also in the professional literature which explains the handling of trend indicators and discusses markets the authors often do not mention the precise mathematical definitions and structures. Of course, this is caused by the author's intention to describe the market analysis and the system of trading intelligibly to all readers, see e.g.~\cite{PohlBook}. With this note we give the interested user the chance to learn about the mathematical tools needed to construct trend indicators. \section{Averages}\label{av} We consider a sequence of real numbers $x=(x_k)_{k=1,2,\ldots}$ and a further sequence $\alpha =(\alpha_k)_{k=1,2,\ldots}$ where the latter takes its values in the interval $[0,1]$. The aim is to define the average of the sequence $x$ with respect to the weights $\alpha$. \begin{definition}\label{def1} Let $x=(x_1,x_2,\ldots )$ be a real sequence and $\alpha=(\alpha_1,\alpha_2,\ldots )$ a sequence taking its values in the interval $[0,1]$. The $\alpha$-{\em average} of $x$ is defined as the sequence $\delta=(\delta_1,\delta_2,\ldots)$ defined recursively by \begin{equation}\label{1} \delta_{n+1}:=(1-\alpha_{n})\delta_{n}+\alpha_{n} x_{n+1},\ n\geq 1,\qquad \delta_1:=x_1\,. \end{equation} If the limit $\bar\delta:=\lim_{n\to \infty}\delta_n$ exists, then this is called the {\em limit average}. For a finite sequence of length $n_0$ we identify $\bar\delta$ with $\delta_{n_0}$. \end{definition} \begin{remark} This recursively defined element can be expanded to \begin{equation} \delta_n = \prod_{s=\ell}^{n-1}(1-\alpha_s) \delta_\ell +\sum_{r=\ell+1}^{n}\left(\prod_{s=r}^{n-1}(1-\alpha_s)\right) \alpha_{r-1}x_{r}\,. \end{equation} Using this with $\ell=1$ and inserting the initial condition $\delta_1=x_1$ yields \begin{equation}\label{delta} \delta_n = \prod_{s=1}^{n-1}(1-\alpha_s)x_1+ \sum_{r=2}^{n}\left(\prod_{s=r}^{n-1}(1-\alpha_s)\right)\alpha_{r-1}x_{r}\,. \end{equation} \end{remark} \begin{definition} The coefficients $\hat\alpha^{(n)}_s$ in $\delta_n=\sum_{r=1}^n\hat\alpha^{(n)}_r x_r$ are called the {\em weights} of the $\alpha$-average: \begin{equation} \hat\alpha^{(n)}_1=\prod_{s=1}^{n-1}(1-\alpha_s),\quad \hat\alpha^{(n)}_r=\alpha_{r-1}\prod_{s=r}^{n-1}(1-\alpha_s)\,,\quad 2\leq r\leq n\,. \end{equation} In particular, $\sum_{s=1}^n\hat\alpha^{(n)}_s=1$. \end{definition} \begin{example}\label{ex1} Special choices for $\alpha$ yield well known examples: \begin{enumerate}[leftmargin=2.25em] \item[(1)] The sequence $ \alpha_s=\frac{\mu-\nu+1}{s+\mu+1}$ with $0\leq\nu\leq\mu$ yields weights \[\qquad \hat\alpha_1^{(n)} =\frac{\binom{n+\nu-1}{n-1}}{\binom{n+\mu}{n-1}},\quad \hat\alpha_r^{(n)} =\frac{\mu-\nu+1}{r+\mu}\frac{\binom{n+\nu-1}{n-r}}{\binom{n+\mu}{n-r}}\,,\quad 2\leq r\leq n\,. \] \begin{itemize}[leftmargin=2.25em] \item[(a)] $\mu=\nu=0$ defines the {\em arithmetic mean} with $ \alpha_s=\frac{1}{s+1}$ and $ \hat\alpha^{(n)}_r=\frac{1}{n}$ as well as $ \delta_n=\frac{1}{n}\sum\limits_{s=1}^n x_s$. \item[(b)] $\mu=1,\nu=0$ defines the {\em weighted arithmetic mean} with $ \alpha_{s}=\frac{2}{s+2}$ and $ \hat\alpha^{(n)}_r=\frac{2r}{n(n+1)}$ as well as $ \delta_n=\frac{2}{n(n+1)}\sum\limits_{s=1}^n sx_s$. \end{itemize} \item[(2)] The sequence $\alpha_s=\alpha<1$ yields \begin{equation} \qquad \delta_n=(1-\alpha)^{n-1}x_1 + \alpha\sum_{s=0}^{n-2}(1-\alpha)^s x_{n-s}\,, \label{EA}\end{equation} the {\em exponential average (EA) of weight $\alpha$}. Its weights are given by $\hat\alpha^{(n)}_1=(1-\alpha)^{n-1}$ and $\hat\alpha^{(n)}_r=\alpha(1-\alpha)^{n-r}$ for $r\geq 2$. \end{enumerate} \end{example} \begin{remark} There are further classical and important averages which are not covered by Definition \ref{def1}. As an example we would like to mention the geometric mean which is defined by $\gamma_n:=\sqrt[n]{x_1x_2\cdot\ldots\cdot x_n}$. The recurrence formula for the geometric mean is given by $\gamma_n=\sqrt[n]{(\gamma_{n-1})^{n-1}\cdot x_n}$. This average is important in applications, for instance the calculation of elliptic integrals uses the geometric mean (see for example \cite{koen}). \end{remark} \begin{remark}\label{rem1} In the weighted arithmetic as well as in the exponential average the values of $x$ with higher indices have a bigger influence to the average, due to their higher weights. In particular the bigger $\alpha$ the less the influence of the lower contributions to the exponential average. Moreover, because the entries in the weight sequence are constant, the exponential average has the advantage that if we go from $\delta_n$ to $\delta_{n+1}$ we do not need to know how far we have gone in the sequence $x$ to calculate the new average. It is calculated only from the next entry of $x$ and the old average. \end{remark} \section{Moving averages}\label{movav} We modify the discussion from the last section in such a way that we do not consider the whole sequence $x$ up to $n$ to evaluate the average $\delta_n$. As we saw in Example \ref{ex1} (1b) and (2) the ``older'' the value of $x$ the smaller the weight with which it enters into the average. Therefore we forget about the old ones and for fixed $N$ we let only enter the ``youngest'' ones $(x_{n-N},x_{n-N+1},\ldots, x_n)$ to our new average. This property is sometimes called limited memory. \begin{definition} Let $x=(x_1,x_2,\ldots )$ be an infinite real sequence and $N\in\mathbbm N$ a fixed number. Furthermore let $\alpha=(\alpha_1,\ldots,\alpha_N)$ be a finite sequence taking its values in the interval $[0,1]$. For every finite subsequence $x^{(n)}=(x_{n-N+1},\ldots,x_{n})$ of $x$ of length $N$ we define the associated $\alpha$-average $\delta^{(n),N}\!\!=(\delta^{(n),N}_1,\ldots,\delta^{(n),N}_N) $ as in Definition \ref{def1}: \begin{equation}\label{2} \begin{aligned} \delta^{(n),N}_{k}&:=(1-\alpha_{k-1})\delta^{(n),N}_{k-1}+\alpha_{k-1} x_{n-N+k},\ \ 2\leq k\leq N,\\ \delta^{(n),N}_1&:=x_{n-N+1}\,. \end{aligned} \end{equation} The $N$-{\em moving} $\alpha$-{\em average} of $x$ is defined by the sequence $\Delta^N=(\Delta^N_1,\Delta^N_2,\ldots)$ with \begin{equation} \Delta^N_n:=\delta^{(n),N}_N\,. \end{equation} If it exists, we denote the limit by \[\bar\Delta^N:=\lim_{n\to\infty}\Delta_n^N\] and call it the {\em limit moving average}. \end{definition} \begin{example} We consider the special choices similar to Example \ref{ex1}. \begin{enumerate}[leftmargin=2.25em] \item[(1)] In case of the arithmetic average, i.e.\ $ \alpha_s=\frac{1}{s+1}$, we get \begin{equation*} \qquad \delta^{(n),N}_k = \frac{1}{k}\big(x_{n-N+1}+\ldots+x_{n-N+k}\big)\,, \end{equation*} and the $N$-moving arithmetic average is given by \begin{equation} \qquad \Delta^N_n = \frac{1}{N}\big(x_{n-N+1}+\ldots + x_{n}\big)\,. \end{equation} \item[(2)] In case of the weighted arithmetic mean, i.e.\ $ \alpha_s=\frac{2}{s+2}$, we get \begin{equation*} \qquad \delta^{(n),N}_k = \frac{2}{k(k+1)}\big( x_{n-N+1}+2x_{n-N+2}+\ldots+k x_{n-N+k}\big)\,, \end{equation*} and the $N$-moving arithmetic mean is given by \begin{equation} \qquad \Delta^N_n = \frac{2}{N(N+1)}\big(x_{n-N+1}+2x_{n-N+2}+\ldots + N x_{n}\big)\,. \end{equation} \item[(3)] In case of the exponential average of weight $\alpha$ we get \begin{equation*} \qquad \delta^{(n),N}_k = (1-\alpha)^{k-1}x_{n-N+1}+\alpha\sum_{s=0}^{k-2}(1-\alpha)^s x_{n-N+k-s}\,, \end{equation*} and the $N$-moving exponential average (MEA) is given by \begin{equation} \qquad \Delta^N_n = (1-\alpha)^{N-1}x_{n-N+1}+\alpha\sum_{s=0}^{N-2}(1-\alpha)^s x_{n-s}\label{MEA}\,. \end{equation} \end{enumerate} \end{example} \begin{example} \begin{enumerate}[leftmargin=2.25em] \item[(1)] In our first example we consider the sequence $x$ with $x_s=s$. Then $\delta^{(n),N}_k$ as well as the $N$-moving averages $\Delta^N_n$ are given in terms of $\delta_n$ by \[ \qquad \delta^{(n),N}_k=(n-N)+ \delta_k , \quad \Delta^N_n =(n-N)+\delta_N \] with \begin{itemize}[leftmargin=2em] \item arithmetic mean \[ \displaystyle \delta_n = \frac{n+1}{2} \] \item weighted arithmetic mean \[ \displaystyle \delta_n = \frac{2n+1}{3} \] \item exponential average \[ \displaystyle \delta_n = n-\frac{1-\alpha}{\alpha}\big(1-(1-\alpha)^{n-1}\big) \] \end{itemize} \item[(2)] The second example deals with the sequence defined by $ x_s=\frac{1}{s}(1-\beta)^s$. This yields the following averages\footnote{This example has been corrected compared with the published version.}: \begin{itemize}[leftmargin=2em] \item arithmetic mean \[ \displaystyle\delta_n \approx \frac{1}{n}\Big(\ln\frac{1}{\beta}-\frac{1}{n+1}\Big) \] \item weighted arithmetic mean \[ \displaystyle \delta_n = \frac{ 2 (1-\beta) (1-\beta^{n+1}) }{ n(n+1)\beta } \] \item exponential average \[ \displaystyle \delta_n \approx (1-\alpha)^n\Big(1-\beta-\frac{\alpha}{n+1}+\alpha\ln\frac{1-\alpha}{\beta-\alpha}\Big) \] \end{itemize} Here we used the expansion \[\qquad \ln\frac{1}{1-x}=\sum\limits_{k=1}^\infty\frac{x^k}{k}\approx \sum\limits_{k=1}^n\frac{x^k}{k}+\frac{1}{n+1}\,.\] \end{enumerate} \end{example} \section{Comparing MEA and EA}\label{meaea} To compare the exponential average \eqref{EA} and the moving exponential average \eqref{MEA} and their respective limits, we turn from the finite sequence $x^{(n)}=(x_1,x_2,\ldots,x_n)$ to the finite sequence $y^{(n)}=(y^{(n)}_0,\ldots,y^{(n)}_{n-1})=(x_{n},x_{n-1},\ldots,x_1)$, i.e.\ $y^{(n)}_k:=x_{n-k}$. This numbering ensures, that the ``youngest'' element of the sequence belongs to the lowest index. Then \eqref{EA} and \eqref{MEA} are rewritten as \begin{equation*} \delta_n=(1-\alpha)^{n-1}y^{(n)}_{n-1} +\alpha\sum_{s=0}^{n-2}(1-\alpha)^sy^{(n)}_{s} \tag{\ref{EA}'} \end{equation*} and \begin{equation*} \Delta^N_n = (1-\alpha)^{N-1}y^{(n)}_{N-1}+\alpha\sum_{s=0}^{N-2}(1-\alpha)^s y^{(n)}_{s} \tag{\ref{MEA}'} \end{equation*} for any finite subsequence and look quite similar. Now let $x=(x_1,x_2,x_3,\ldots)$ be an infinite sequence with finite subsequences $x^{(n)}$ and associated inversed sequences $y^{(n)}$. Then the limit exponential average as well as the limit moving exponential average of the sequence $x$ is\footnote{These expressions seem to be a little formal, because we deal with terms like $y_s:=x_{\infty-s}$, i.e.\ we need to know the whole starting sequence in reverse order. In practical applications this is not a problem, because the sequences are given in the way ``the first data is the youngest one''.} \begin{equation}\begin{aligned}\label{formally} \bar\delta &=\alpha \sum_{s=0}^{\infty}(1-\alpha)^s y_{s}\,,\\ \bar\Delta^{N} &= (1-\alpha)^{N-1}y_{N-1}+\alpha\sum_{s=0}^{N-2}(1-\alpha)^s y_{s}\,. \end{aligned}\end{equation} To compare EA and MEA, we calculate the difference \begin{equation}\label{4} \begin{aligned} \bar\delta-\bar\Delta^{N} &= \alpha\sum_{s=N-1}^\infty(1-\alpha)^sy_{s}-(1-\alpha)^{N-1}y_{N-1}\\ &=(1-\alpha)^{N}\left( \alpha\sum_{s=0}^\infty(1-\alpha)^sy_{s+N} -y_{N-1}\right) \end{aligned} \end{equation} \begin{definition}\label{adm} A sequence $x$ is called admissible, if it does not spread widely. More precisely, for $N\in\mathbbm N$ we assume $\alpha\displaystyle \sum_{s=0}^\infty(1-\alpha)^sy_{N+s}\approx \bar\delta$ and $\displaystyle\frac{|\bar\delta-y_{N}|}{\bar\delta}<1$. \end{definition} From the calculations in (\ref{4}) we get the following observation. \begin{proposition} If the initial sequence is admissible then \begin{equation}\label{app} \frac{|\bar\delta-\bar\Delta^{N}|}{\bar\delta} < (1-\alpha)^{N}\,. \end{equation} \end{proposition} In particular, formula (\ref{app}) tells us, that for a given sequence -- under the assumptions of admissibility -- the relative error by replacing the limit EA by the limit MEA only depends on the moving length $N$. \begin{remark} Sometimes the value which we get by canceling the sum of $\bar \delta$ in (\ref{formally}) is taken as an average and the error is estimated with regard to this finite sum. The problem is, that this value is not an average in the sense of Definition \ref{def1}, because the weights do not sum up to 1. Nevertheless, under the assumption of admissibility, the error will be the same. \end{remark} The inversion of the sequence $x$ is also needed, when we want to add new values to a given sequence and compare their respective limit averages. In this situation, which will be important in the application in the next section, we start with an infinite (inversed) sequence $y^{[k]}=(y^{[k]}_0,y^{[k]}_1,\ldots)$ at a ``day'' $k$. The next day $k+1$ we add an element to get a new sequence expanding the old one. The new element should be the initial value of our new sequence, and so we call it $y^{[k+1]}_0$. The whole sequence $y^{[k+1]}=(y^{[k+1]}_0,y^{[k+1]}_1,\ldots)$ is then supplemented by $y^{[k+1]}_i:=y_{i-1}^{[k]}$ for $i\geq 1$. For finite sequences $y^{(n)}$ and $y^{[n]}$ coincide, when we define $y^{[n+1]}_0:=x_{n+1}$ and $y^{[1]}:=(x_1)$. The inversed sequence $y$ of the infinite sequence $x$ can then be viewed as the limit sequence of $y^{[k]}$. \section{Application to index charts}\label{appli} When we want to discuss the chart of a stock or an index it is necessary to smooth the curve, given by the closes. This may be done by taking an appropriate average instead of the closes itself. One condition which can be taken as natural is that the ``younger'' closes are more important than the ``older'' ones. Therefore, the weighted arithmetic and the exponential average seem to be proper candidates. One obvious advantage of the exponential average is that the sequence $\alpha$ is constant (see Remark \ref{rem1}). More restrictively we could demand that the market do not see very old closes at all but only closes of a specific amount of periods. This leads us to the moving variants of the averages, where we always consider a fixed amount of closes. But in the context of moving averages we lose the nice recurrence formula (\ref{1}), because the initial condition changes every day, see (\ref{2}). Nevertheless, these averages have their application in trend analysis, too, see \cite{pring}. As we saw in (\ref{app}) the relative error we make when we pass from the moving exponential average to its non moving variant is given by $(1-\alpha)^{N}$. This is true, when we make some mild assumptions on the starting sequence $x$ (see Definition \ref{adm}). A usual way to model the moving length is the choice $\alpha=\frac{\rho}{N+1}$ with suitable $\rho\in\mathbbm R$. For instance $\rho=2$ yields a relative error less than $13.5\%$, and an error less than $1\%$ is achieved by $\rho\geq 4.7$. This can be seen by using $(1-\frac{\rho}{N+1})^N\leq e^{-\rho}$. The moving exponential average with this special choice of weight is called $N$-day EMA in the literature, see e.g.\ \cite{alex}, \cite{appel}. \begin{definition}\label{close} The values of an index (or an stock) at the closes of the market define a sequence of non-negative real numbers $c^{[k]}=(c^{[k]}_0,c^{[k]}_1,\ldots )$ and is called the sequence of closes at day $k$. The value $c^{[k]}_0$ is called the close at day $k$. The sequence of closes obey $c^{[k]}_i=c^{[k-1]}_{i-1}$ for $i\geq 1$, such that $c^{[k]}_0$ is always the youngest contribution. \end{definition} \begin{definition}\label{def3} The $N${\em -day exponential moving average (EMA)} at close $c^{[k]}$ is defined by the exponential average of weight $\frac{2}{N+1}$ of the series $c^{[k]}$ and will be denoted by $E_k^N(c)$, i.e. \begin{equation} E_k^N(c) := \bar\delta^{\text{EA}}\Big|_{\alpha=\tfrac{2}{N+1}, y=c^{[k]}}\,.\label{EMA} \end{equation} \end{definition} Within the investigation of market trends we use a further EMA, which is based on a sequence defined by two EMAs of the sequence of closes. The so constructed EMA is used to produce a trend indicator for the initial sequence of closes. \begin{definition}\label{def4} The {\em MACD (Moving Average Convergence/Divergence)} at the close $c^{[k]}$ associated to the moving lengths $N_1$ and $N_2$ is defined as the difference \begin{equation} M^{N_1,N_2}_k(c):=E^{N_1}_k(c)-E^{N_2}_k(c)\,. \end{equation} The MACD defines a new sequence $m^{[k]}$ with $m^{[k]}_0:=M^{N_1,N_2}_k$ and $m^{[k]}_i:=m^{[k-1]}_{i-1}$. We call the close $c^{[k]}$ (or the day $k$) $N_0${\em -short} or $N_0${\em -long} if the difference $m^{[k]}_0-E_k^{N_0}(m)$ is negative or positive, respectively. \end{definition} \begin{remark} The change from short to long and from long to short may be taken as indicator for ``buy'' and ``sell'', respectively. \end{remark} \begin{example}\label{ex} Figures \ref{f1} and \ref{f2} show an application of Definition \ref{def3} to the values of the MDAX between December 8, 2008 and April 3, 2009.\footnote{The closes from Example \ref{ex} were kindly provided by \href{http://www.easytrend24.de}{\bf EasyTrend24}.} We used a short term EMA ($N_1=12$) and a minor intermediate EMA ($N_2=26$) to define a very short term EMA of the MACD ($N_0=9$). This is a common combination used in market analysis, see \cite{kauf1}. This combination yields two sell and two buy signals. \end{example} \section{Concluding remarks} The EMA, as used in Section \ref{appli} as well as in the literature, is not a moving average in the mathematical sense of Section \ref{movav}. In fact, it is a usual limit exponential average with a specific weight. For its calculation we do not use a finite subsequence of the closes $c$ of constant length, but all of it. On the one hand, the name is motivated my the special choice of the weight and the error discussion above, see (\ref{app}). On the other hand a further motivation for the term moving comes from the fact that $c^{[k]}$ is by construction an infinite subsequence of $c^{[k+1]}$, see Definition \ref{close}. As noticed in Example \ref{ex} and the subsequent remark the MACD and its EMA are used to define ``buy'' and ``sell'' signals. For small $N$ local effects in $c$ play a major role, so that the incidents buy/sell will appear more often. In particular if the sequence of closes itself is range-bound, then maxima and minima within this region lead to unnecessary signals (compare Example \ref{ex} with figures \ref{f3} and \ref{f4} in particular regions day 1 to day 13 and day 64 to day 75). It is a question of strategy which moving lengths we take in Definition \ref{def3} and \ref{def4}, or if we -- in particular for small $N$ -- replace the EMA by another moving average. Another way to handle the sometimes unnecessary signals in range-bound regions is the introduction of more subtle indicators such as the ADX (Average Directional Movement Index) or the RSI (Relative Strength Index). For the calculation of the ADX -- in contrast to the RSI -- the data sequence we used in Section \ref{appli} are not sufficient. In addition we need the highest and lowest value within one period. For more details on this see for example \cite{adx-lit}. The MACD is a trend follower, i.e.\ the signals always appear after the extrema -- how far depends on the choice of the parameters. In this sense the trend followers only describe the direction of the trend of the data but neither describes the strength of the trend nor does it make predictions on the future development of the data. The first problem may be weakened by introducing indicators like the ADX, as noticed before. One method to gain more information about the future development is the introduction of a trend forecasters, see for example \cite{Mendel}. Usually this is made by using regression curves to extrapolate the closes, e.g.\ linear, polynomial, logarithmic or exponential regression, see \cite{kauf2} or \cite{num2}. Which method is used depends highly on the data structure. Therefore the calculation of such trend forcasters -- in contrast to the trend follower -- needs more than the pure data but a good knowledge of its developing. \begin{center} \begin{minipage}[t]{\linewidth} \centering \includegraphics[width=\textwidth]{diagram-1.pdf}\\[2ex] \captionof{figure}{\small Series of closes, $c$, and its 12-day and 26-day EMA, $E^{12}(c)$ and $E^{26}(c)$, for the period 2008-12-08 to 2009-04-03.}\label{f1} \centering \includegraphics[width=\textwidth]{diagram-2.pdf}\\[2ex] \captionof{figure}{\small MACD, $m=M^{12,26}(c)$, its 9-day EMA, $E^9(m)$, and the associated signal for the period 2008-12-08 to 2009-04-03.} \label{f2} \end{minipage} \end{center} \begin{center} \begin{minipage}[t]{\linewidth} \centering \includegraphics[width=\textwidth]{diagram-3.pdf}\\[2ex] \captionof{figure}{\small Series of closes, $c$, and its 7-day and 14-day EMA,\ \ $E^7(c)$ and $E^{14}(c)$, for the period 2008-12-08 to 2009-04-03.}\label{f3} \centering \includegraphics[width=\textwidth]{diagram-4.pdf}\\[2ex] \captionof{figure}{\small MACD, $m=M^{7,14}(c)$, its 4-day EMA, $E^4(m)$, and the associated signal for the period 2008-12-08 to 2009-04-03.}\label{f4} \end{minipage} \end{center} \bigskip\bigskip
\section{Introduction} Plasma-facing components (PFCs) in magnetic confinement fusion devices are designed to withstand high heat loads of bombardments from energetic particles. Meanwhile, hydrogen (H) isotopes such as deuterium (D) and tritium (T) are utilized as fuels and their interactions with PFCs need to be thoroughly understood \cite{02JNM-Causey}. In particular, the retention and recycling of D/T attract many attentions due to their impacts on the fueling and vacuum pumping systems, and also the plasma conditions \cite{00FED-Mattas}. Here, {\it retention} and {\it recycling} respectively refer to the hydrogen isotopes that remain in PFCs and return back to plasma after the PFCs receive particle bombardments. On one hand, a high retention rate of hydrogen isotopes suggests that the temperature of core plasma is less affected by preventing cold atoms from reentering the plasma, therefore, the plasma performance could be increased with PFCs that can retain a large amount of D/T atoms \cite{13PP-Majeski,15JNM-Abrams,15NF-Abrams}. On the other hand, a high recycling rate of H isotopes can significantly reduce the fuel cost, and a low retention of D/T atoms in PFCs also reduces safety concerns \cite{00FED-Mattas}. The emergence of liquid-metal PFCs~\cite{14PS-Coenen} began receiving widespread attention in recent years. Unlike solid metallic PFCs that unavoidably suffer from mechanical failure problems caused by high energetic particles~\cite{12NF-Lipschultz, 13JNM-Pitts, 14NF-Eden}, liquid metals for PFCs own a low melting point, resist erosion and neutron damage to a large extent, and has high heat dissipation capabilities. For instance, lithium (Li) has a low melting point of 453 K and was found to improve the plasma parameters in a variety of experiments~\cite{13PP-Majeski,14FED-Fiflis,14PPCF-Tritz, 15JNM-Abrams,15NF-Abrams,17FED-Ono, 17FED-Maingi, 17L-Boyle, 18NF-Rindt}. Tin (Sn) has also been tested in several experiments~\cite{15JNM-Morgan,16L-Eden,18NME-Cremona} due to its low melting point of 505 K,~\cite{12JAP-Weir} and additionally owns a low vapor pressure that is beneficial for high operating temperatures. Nevertheless, plasma contamination due to accumulation of impurities atoms in plasma is concerned since Sn has a high atomic number. In this regard, Li-Sn eutectic is considered as an alternative candidate for PFCs with combined advantages of both Li and Sn. However, the Li-Sn alloy has been investigated in a few experiments \cite{04FED-Bastasz,04FED-Allain,07B-Allain,17NME-Kvon,17NME-Loureiro}. Therefore, it is of great help to utilize first-principles computational methods to provide fundamental insights into understanding liquid metals~\cite{13MP-Chen,18JCP-Beatriz,19NME-Beatriz} and their interactions with hydrogen isotopes~\cite{13L-Krstic,16NF-Chen,17JCP-Liu,19NF-Beatriz}. Experiments have found that hydrogen isotopes interact differently with liquid Li and liquid Sn. For example, it is known that hydrogen isotopes can be largely absorbed by liquid Li due to their strong chemical affinity with Li atoms~\cite{92JNM-Moriyama,05JNM-Fukada,17FED-Kul,17FED-Taz}. In contrast, the low reactivity of Sn with hydrogen isotopes leads to a small retention ratio of hydrogen isotopes in liquid Sn~\cite{18NME-Cremona}. It is intuitively expected that D atoms can be trapped by Li atoms in liquid Li-Sn eutectic, resulting in a higher number of retained hydrogen isotopes in liquid Li-Sn than liquid Sn. Surprisingly, a recent experiment~\cite{17NME-Loureiro} observed that Li-Sn eutectic has a smaller retention ratio of D than pure Sn against intuition. Although the above experiment may suffer from contaminants such as oxygen and carbon at the surface of the sample, it is still worth understanding the fundamental processes regarding the interactions of hydrogen isotopes with liquid Li-Sn. For example, how do D atoms escape from Li-Sn eutectic, causing the low retention ratio of D in Li-Sn? More importantly, what is the underlying mechanism that explain liquid Li, Sn, and Li-Sn interact differently with D? In this work, we performed first-principles molecular dynamics (FPMD) simulations to tackle the above issues. We observe the formation and evaporation of D$_2$ molecules in the Li-Sn slab, which may be a reason for the low retention ratio of D observed in experiment~\cite{17NME-Loureiro}. These results are remarkable, because as predicted by recent FPMD studies, D$_2$ molecules hardly form in liquid Li because D atoms form strong ionic bonds with Li atom \cite{16NF-Chen}, whereas forming D$_2$ molecules is also difficult in liquid Sn, which may be caused by the low reactivity of D in liquid Sn \cite{17JCP-Liu}. In addition, it is still inconclusive which molecules can escape the surfaces of Li-Sn slab. Very recently, an independent work~\cite{19NF-Beatriz} has also found the formation of D$_2$ molecules and D$_2$ bubbles in bulk liquid Li-Sn systems with FPMD simulations. However, the detailed forming processes of D$_2$ molecules have not been fully explored. Furthermore, due to the lack of vacuum in the study, the evaporation of molecules was not investigated. Herein, \MC{we prepare two Li-Sn slabs with low and high concentrations of D atoms.} We unveil a cooperative mechanism of forming D$_2$ molecules in liquid Li-Sn slabs, where Li atoms play a central role to trap a D atom, and wait for a second D to come nearby, triggering the forming process of D$_2$ molecule. During the formation of D$_2$ molecule, the surplus electrons are transferred from D$_2$ to its adjacent Sn atoms. D$_2$ molecules then diffuse rapidly by leaving their adjacent Li and Sn atoms. Importantly, \MC{in the low concentration case,} we find the existence of both D$_2$ molecules and LiD molecules in the vacuum area of the simulated cell. Our results show that LiD molecules are more difficult to form than D$_2$ molecules \MC{below 873 K}, and we predict a optimal temperature window \MC{in the low concentration case} that allows evaporation of D$_2$ molecules from surfaces of PFCs but not for LiD molecules, which may potentially contaminate the plasma. The above findings offer a series of new microscopic insights into our understanding of how hydrogen isotopes interact with liquid Li-Sn eutectic. \section{Computational Details} All of the FPMD simulations were performed with the ABACUS (Atomic-orbital Based Ab-initio Computation at USTC) package~\cite{16CMS-Li}. We adopted norm-conserving pseudopotentials \cite{81PRB-Perdew} and local density approximation \cite{80PRL-Ceperley}. We chose an energy cutoff of 120 Ry for charge density and only the gamma point to sample the Brillouin zone with periodic boundary conditions. We used numerical atomic orbitals~\cite{10JPCM-Chen} as basis sets to construct the electronic wave functions. Specifically, double-zeta plus polarized (DZP) orbital sets were adopted for D ($2s1p$), Li ($2s1p$) and Sn ($2s2p1d$)~\cite{10JPCM-Chen, 11JPCM-Chen}. The radius cutoffs of numerical atomic orbitals were chosen to be 6.0, 9.0 and 8.0 bohr for D, Li, and Sn elements, respectively. Born-Oppenheimer molecular dynamics simulations were performed in the canonical ensemble NVT with the Nos\'{e}-Hoover thermostat~\cite{84JCP-Nose, 85PRA-Hoover} at 573, 673, and 873 K. A liquid Li-Sn slab with a vacuum and two concentrations of D atoms in a periodic cell ($60\times 14.98 \times 14.98$ \AA$^3$ where the vacuum is placed along $x$-axis) was studied. A Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab containing 36 Li, 144 Sn, and 10 D atoms is referred as the low concentration system, while a Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ slab consisting of 36 Li, 144 Sn, and 100 D atoms is referred as the high concentration system for brevity. \MC{We performed FPMD simulations with 30 ps trajectories for the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab at temperatures of 573, 673, and 873 K. In addition, we ran FPMD simulations with 20, 24, and 22 ps trajectories for the Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ slab at temperatures of 573, 673, and 873 K, respectively. For comparison, we also carried out FPMD simulations for bulk Li$_{0.2}$Sn$_{0.8}$ (36 Li and 144 Sn atoms) and Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ (36 Li, 144 Sn, and 10 D atoms) systems. The ionic densities of the two bulk systems were obtained by performing FPMD simulations in the NVT ensemble with varying cell volumes until the averaged pressure is less than 1 GPa; the resulting cell sizes of the bulk Li$_{0.2}$Sn$_{0.8}$ and Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ systems are 23.14$\times$14.20$\times$14.20~\AA$^3$ and 23.01$\times$14.12$\times$14.12~\AA$^3$, respectively. We generated 20 ps trajectories for the two systems. The time step of FPMD simulations utilized in systems with D atoms was set to 0.2 fs to better characterize the D atoms that have a small mass; for those Li-Sn systems without D atoms, the time step was set to 0.5 fs.} The liquid configurations of Li-Sn slabs were generated by performing FPMD simulations as follows. \MC{ We first ran FPMD simulations of a Li$_{0.20}$Sn$_{0.80}$ slab for 5.0 ps at 1073 K with a time step of 0.5 fs in order to obtain its liquid structure. Next, we randomly inserted 10 and 100 deuterium (D) atoms into the Li$_{0.20}$Sn$_{0.80}$ system to generate two systems with different D concentrations, i.e., Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ and Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ systems, respectively. We then ran FPMD simulations at selected temperatures, i.e., 573, 673 and 873 K. The lengths of the trajectories have been described above. In order to let the systems evolve towards the equilibrium state, our analysis was based on the last 20 ps trajectories.} \section{Results and Discussions} \begin{figure} \centering \includegraphics[width=0.6\textwidth]{./Figure1.eps}\\ \caption{(Color online) Ionic density profiles of the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ and Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ slabs along the surface normal direction at 573, 673, and 873 K. The two dashed lines at 20.4 and 36.6 \AA~represent the surfaces of the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ Li-Sn slab, while the other two dashed lines at 16.8 and 39.0 \AA~indicate the surfaces of the Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ Li-Sn slab. }\label{fig:surface} \end{figure} \begin{figure} \centering \includegraphics[width=0.6\textwidth]{./Figure2.eps}\\ \caption{(Color online) Surface coverages of Li, Sn, and D atoms in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ and Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ slabs at 573, 673, and 873 K.}\label{fig:surface2} \end{figure} \begin{figure} \centering \includegraphics[width=0.7\textwidth]{./Distribution.eps}\\ \caption{\MC{(Color online) Counted number of atoms per snapshot of D, Li, and Sn atoms along the surface normal direction $r$ of the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ and Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ slab systems. The density profiles are averaged over the two surfaces. The interval of $r$ is chosen to be 0.06~\AA. }}\label{fig:decompose} \end{figure} \subsection{Li-Sn Surfaces} Figure~\ref{fig:surface} illustrates the simulated ionic density profiles of liquid Li-Sn systems with both low and high concentrations of D atoms at 573, 673, and 873 K. \MC{ We can see that the volume of a Li-Sn slab is insensitive to temperatures ranging from 573 to 873 K. This is due to the fact that Li-Sn eutectic is a metallic liquid, whose volume increases by about 1\% per 100 degrees. For temperature that increases from 573 to 873 K, the length of the slab along the surface normal direction ($x$ direction) slightly changes. Therefore, we define the surface of a Li-Sn slab as the space between the first peak of the ionic density profile and the vacuum as shown in Figure~\ref{fig:surface}, while the bulk of the slab is defined as the space between the two surfaces of the slab. Since the volume of a Li-Sn-D slab is insensitive to temperatures, we take the Li-Sn-D slab systems at 673 K to define the bulk region of the slab. Specifically, we define the bulk region of the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab system as the space ranging from $x$=20.4 to 36.6~\AA~as shown in Figure 1. In addition, the volume of the Li-Sn-D slab substantially increases with a higher concentration of D. In this regard, the bulk region of the Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ slab system is defined as the space covering from $x$=16.8 to 39.0~\AA. } We also observe that the ionic density profiles of Li-Sn systems exhibit a series of sharp peaks, \MC{which may be due to the finite size effects. However,} the heights of peaks decrease at higher temperatures, suggesting a more uniform distribution of atoms in the slabs at higher temperatures. \MC{We also compute the mean square displacements (MSD) of Li and Sn atoms in both low- and high-concentration systems at 573 K and found the increase of MSD with respect to time (see Supplementary Materials), suggesting that atoms are in the liquid state. } \MC{ Figure~\ref{fig:surface2} shows the surface compositions of Li-Sn-D slabs from simulations. For both Li-Sn-D systems, we observe a similar trend as compared to experiment~\cite{04FED-Bastasz,04FED-Allain,07B-Allain} that the surface coverage of Li increases at a higher temperature, which can be explained as Li reduces the surface tension more effectively than Sn~\cite{04FED-Bastasz,17NME-Kvon}. In addition, the surface coverage of D only slightly decreases with increasing temperature; however,} in the high-concentration Li-Sn system, the surface coverage of D is twice more than that of Sn, although the total number of Sn atoms is slightly larger than the number of D atoms. \MC{Figure~\ref{fig:decompose} illustrates the density profiles of Li-Sn-D slab systems decomposed into atomic components. Both low- and high-concentration slab systems at temperatures of 573, 673, and 873 K are considered. We average two surfaces of a slab in order to yield more converged results. We find that the outmost surface areas are dominated by Li atoms rather than Sn atoms in all of the six systems shown in Figure~\ref{fig:decompose}, which suggests that Li atoms are segregated to the surface of the Li-Sn-D slab system. } \MC{ However, since the FPMD simulations are extremely expensive, the lengths of our FPMD trajectories are limited to a few tens of ps and the system only consists of a few hundred atoms. It would be possible that the segregation of Li to the surface is faster in a short time scale because the velocities of Li atoms are higher and the system has not yet reached the equilibrium state. Additionally, the sharp peaks also imply that the trajectory length may not be long enough to smooth out the inherent ordering in the Li-Sn-D slabs. In order to obtain a thorough understanding of the segregation effect and the density profiles in the Li-Sn slab systems, substantially larger systems with much longer trajectories in MD simulations are needed in future works. However, we consider the FPMD trajectories are still meaningful to yield important properties of D, such as the formation and evaporation of D$_2$ molecules and LiD molecules at the Li-Sn surfaces.} \subsection{Formation of D$_2$ Molecules} \begin{figure}[h] \centering \includegraphics[width=0.8\textwidth]{./Figure3.eps}\\ \caption{(Color online) Partial pair distribution functions of (a) D-D, (b) Li-Li, (c) Sn-Sn, (d) Li-D, (e) Sn-D, (f) Li-Sn in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab (red lines), the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ bulk (green lines), the Li$_{0.20}$Sn$_{0.80}$ bulk (blue lines), \MC{and the Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ slab (black lines)} at 673 K.} \label{PPDF} \end{figure} Figure~\ref{PPDF} illustrates the partial pair distribution functions $g_{\alpha\beta}(r)$ of D-D, Li-Li, Sn-Sn, Li-D, Sn-D, and Li-Sn, which were obtained with FPMD simulations in the liquid Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ \MC{and Li$_{0.13}$Sn$_{0.56}$D$_{0.36}$ slabs} at 673 K. As comparisons, we also show the pair distribution functions for bulk Li$_{0.20}$Sn$_{0.80}$ and Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ systems. The partial pair distribution function $g_{\alpha\beta}(r)$ with two different atomic species $\alpha$ and $\beta$ is defined as \begin{equation} g_{\alpha\beta}(r)=\frac{N_{\alpha}+N_{\beta}}{\rho N_{\alpha}N_{\beta}} \sum_{i=1}^{N_{\alpha}}\sum_{j=1}^{N_{\beta}}\langle\delta(\mathbf{r+R_{i}-R_{j}})\rangle, \end{equation} where $\rho$ is the atomic density, $N_{\alpha}$ and $N_{\beta}$ are the numbers of atoms for species $\alpha$ and $\beta$, respectively. $\mathbf{R_{i}}$ and $\mathbf{R_{j}}$ are the atomic positions of atoms $i$ and $j$. \MC{The above formula can be directly applied to bulk systems. For a slab system, we only compute $g_{\alpha\beta}(r)$ for the bulk region of the slab, which has been defined above. } First of all, we can see that the partial pair distribution functions in Figures~\ref{PPDF}(b-f) all exhibit liquid-like structural characteristics. As can be seen from Figure~\ref{PPDF}(a), $g_{DD}(r)$ with peaks centered at around 0.8 \AA~suggests that D$_2$ molecules form in the liquid Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab and bulk, as the typical bond length of a D$_2$ molecule is 0.74 \AA. Both in the bulk and in the slab, the Li-D pair distribution functions have strong peaks around 1.85\AA, suggesting that Li-D may form strong bonds. \MC{We can see that most partial pair distribution functions from the high-concentration slab system exhibit more prominent peaks. The result indicates that the Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ slab system is more structured as compared to the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab system, which may be caused by the presence of high-concentration D atoms in the system. Besides, the result also implies that Li and Sn atoms in the high-concentration slab system interact more strongly with D atoms than those in the low-concentration slab system.} \begin{figure} \centering \includegraphics[width=0.6\textwidth]{./Events.eps}\\ \caption{(Color online) \MC{Two stable formation events of D$_2$ molecules in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab system. The cell length along the surface normal direction $r$ is 60 \AA. For convenience, we plot $r=$60 to 80~\AA~ in order to see the oscillations of the bond length $r_{\mathrm{D-D}}$ of a D$_2$ molecule. Periodic boundary conditions are used.} }\label{fig:events} \end{figure} \begin{figure} \centering \includegraphics[width=0.8\textwidth]{./stru.eps}\\ \caption{\MC{ (Color online) Representative snapshots of (a) Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab system at 873 K and (b) Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ slab system at 673 K from first-principles molecular dynamics. The Li, Sn and D atoms are labeled with pink, yellow and red colors, respectively. } }\label{fig:stru} \end{figure} \begin{figure} \centering \includegraphics[width=0.6\textwidth]{./Figure4.eps}\\ \caption{(Color online) A series of steps to form D$_2$ molecules in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab at 673 K. (a) Li and Sn trap a D atom at the surface. (b) Two D atoms come closer at the surface. (c) Formation of a D$_2$ molecule. (d) The D$_2$ molecule diffuses away from Li and Sn atoms. $t$ is the simulation time, whereas $r$ is the distance between the two D atoms. }\label{fig:snapshots} \end{figure} \MC{In the analyzed 20-ps FPMD trajectories of the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab, we observe 6, 8, and 6 stable formation events of D$_2$ molecules at 573, 673, and 873 K, respectively. Among the formation events, 4, 3, and 5 D$_2$ molecules respectively evaporate into the vacuum in the system at 573, 673, and 873 K, whereas others only diffuse in the bulk region. We show two examples in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab system in Figure~\ref{fig:events}, where we record the period from the formation of a D$_2$ molecule to the decomposition of a D$_2$ molecules into two D atoms. From this figure, we observe oscillations of the bond length of two D$_2$ molecules; one in the vacuum and the other in the slab near the surface. In Figure~\ref{fig:events}(a), a D$_2$ molecule evaporates into the vacuum at around 11.14 ps and then redeposits into another surface of the slab at about 11.54 ps. In Figure~\ref{fig:events}(b), a D$_2$ molecule forms at the surface at about 12.60 ps and decomposes to D atoms at around 14.25 ps. Due to the periodic boundary conditions, most of the D$_2$ molecules that evaporate into the vacuum redeposit into the other surface of the slab. The number of D$_2$ molecules observed in the vacuum is therefore smaller than the number of evaporation events, as shown in Figure~\ref{fig:stru}(a). In contrast, we find several D$_2$ molecules that exist in the vacuum of the Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$ system, and D clusters only exist in the bulk region, as illustrated in Figure~\ref{fig:stru}(b). This can be explained as the D atoms are saturated in the high-concentration slab system, so more D$_2$ molecules evaporate to the vacuum. Furthermore, we do not observe evaporation of single D atoms or D clusters in the high-concentration case. } During the preparation of Li-Sn-D samples, each D atom was randomly implanted in the liquid Li-Sn slab before the simulations. Hence, D$_2$ molecules can only form from individual D atoms in the Li-Sn sample during the simulations,~\cite{19NF-Beatriz} and then escape into the vacuum area of the simulation cell. In addition, D$_2$ molecules are only found to dissociate into D atoms inside the Li-Sn slab but not in the vacuum. \MC{The evaporation of D$_2$ molecules instead of D atoms or D clusters in both low and high concentrations of Li-Sn-D systems provides some clues to the recent experiment.~\cite{17NME-Loureiro} A very recent work has also found the formation of D$_2$ molecules in bulk liquid Li-Sn systems with FPMD simulations.~\cite{19NF-Beatriz} However, due to the limitations of the FPMD simulations that trajectories are still too short,} it is very difficult to compare even quantitatively the calculated percentage of released D$_2$ molecules with the experiments, where almost all D$_2$ molecules are released.~\cite{17NME-Loureiro} Additionally, several factors that exist in experiments but are not considered in our simulations. For example, in the experiments, the liquid slabs may not be in the equilibrium state due to the continuous bombardments of deuterium atoms and the defects in the slab may also affect the final results. \MC{ However, by investigating the 20 stable formation events of D$_2$ molecules from the low concentration case at temperatures of 573, 673, and 873 K, we analyze the detailed forming processes of D$_2$ molecules. We do not investigate the formation of D$_2$ molecules in the high-concentration case because a large number of D atoms exist in the slab, some of which form D clusters. Therefore, it is challenging to have an algorithm to define D$_2$ molecules in D clusters. In addition, even if we can identify D$_2$ molecules in the high-concentration case, it is still difficult to get a clear picture about how D atoms interact with Li and Sn atoms before a D$_2$ molecule forms, because the existence of adjacent D atoms complicates the analysis. In contrast, in the low-concentration case, the generation of each D$_2$ molecule can be nonambiguously identified and the forming process can be analyzed. More importantly, the low-concentration case is a more realistic case in a fusion device that uses liquid metals as shields because huge amounts of D atoms bombarding liquid wall is unlikely to occur in an operating fusion device. } \MC{In a previous FPMD simulation work of inserted D atoms in bulk Li}~\cite{16NF-Chen}, the formation of D$_2$ molecules did not occur when the proportion of D atoms is smaller than that of Li atoms due to the strong bonding between Li and D atoms. Only a small amount of D$_2$ molecules were recorded when the proportions of D and Li are equal. \MC{In another FPMD simulation work,} no D$_2$ formation with a long lifetime was observed in pure liquid Sn ~\cite{17JCP-Liu}. In stark contrast, in the Li-Sn slab, a considerable number of D$_2$ molecules form in a system with more Li than D, indicating there may be a different mechanism to form D$_2$ in the Li-Sn eutectic. Based on our analysis, there are typically four steps to form D$_2$ molecules in the Li-Sn slab as shown in Figure~\ref{fig:snapshots} (see the movie in the SM \cite{SM}): In the first step, a D atom is first trapped by a Li atom in the Li-Sn slab to form a Li-D pair, as shown in Figure~\ref{fig:snapshots}(a). The trapped D keeps moving at a relatively low velocity, setting up a stable environment with adjacent Li and Sn atoms and waiting for other D atoms to form a D$_2$ molecule. Figure~\ref{PPDF}(a) further demonstrates that D atoms interact strongly with Li atoms, as can be seen by the high first peak of $g_{LiD}$(r). Next, Figure~\ref{fig:snapshots}(b) shows that a second D atom comes close to the first D, while the position of the Li-D pair does not change much. As will be explained later, we find that the second \MC{D atom slows down and diffuses} towards the first D. Third, a D$_2$ molecule starts to form by triggering the charge transfer from D to its adjacent Sn atoms ({\it vide infra}), as shown in Figure~\ref{fig:snapshots}(c). In the last step, the newly formed D$_2$ molecule diffuses away from its Li and Sn neighbors as illustrated in Figure~\ref{fig:snapshots}(d). We also provide a movie~\cite{SM} that shows the formation of a D$_2$ molecule near the surface of Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ system (673 K) and evaporation of this D$_2$ molecule into the vacuum (see the Supporting Information). \begin{figure} \centering \includegraphics[width=0.52\textwidth]{./Figure5.eps}\\ \caption{(Color online) Distances from D atoms to its adjacent atoms in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab during the formation of D$_2$ molecules. $d_{\mathrm{D-D}}$, $d_{\mathrm{D-Li}}$, and $d_{\mathrm{D-Sn}}$ are defined as the distances between D and its adjacent D, Li, and Sn atoms, respectively. \MC{The results are averaged over 20 stable formation events of D$_2$ molecules found in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab at temperatures of 573, 673, and 873 K.} }\label{fig:properties} \end{figure} \begin{figure} \centering \includegraphics[width=0.52\textwidth]{./Figure6.eps}\\ \caption{(Color online) Velocities of two D atoms (labeled as D-1 and D-2) during the formation of D$_2$ molecules in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab. \MC{The results are averaged over 20 stable formation events of D$_2$ molecules found in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab at temperatures of 573, 673, and 873 K.} }\label{fig:properties2} \end{figure} \begin{figure} \centering \includegraphics[width=0.52\textwidth]{./Figure7.eps}\\ \caption{(Color online) Number of electrons on D and its adjacent Sn atoms during the formation of a D$_2$ molecule in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab. \MC{The results are averaged over 20 stable formation events of D$_2$ molecules found in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab at temperatures of 573, 673, and 873 K.} }\label{fig:properties3} \end{figure} \subsection{Processes of Forming D$_2$} We systematically analyze the processes of forming D$_2$ molecules in order to quantify the above observations in simulations. \MC{For those properties illustrated in Figure~\ref{fig:properties}, Figure~\ref{fig:properties2}, and Figure~\ref{fig:properties3}, we average 20 stable formation events of D$_2$ molecules. The 20 events are collected from the 6, 8, and 6 stable formation events of D$_2$ in the low-concentration system at temperatures of 573, 673, and 873 K, respectively. Although more stable formation events of D$_2$ molecules are expected at higher temperatures, it is counter intuitive that only 6 events of D$_2$ are found at 873 k, which is smaller than the 8 events of D$_2$ found at 673 K. Nevertheless, at 873 K, we record 10 evaporation events of LiD molecules ({\it vide infra}), indicating that some of the D atoms in the low-concentration slab system are involved in forming LiD molecules. } In particular, we track the D-D pairs in the low-concentration Li-Sn slab and report their interesting dynamics. The criterion to track D-D pairs was selected when any two D atoms come close within 1.1~\AA~and last for more than 0.2 ps. Moreover, we chose a time window of 100 fs that is relevant to the formation of D$_2$ molecules, emphasizing the formation moment which occurs at around 50 fs corresponding to Figures~\ref{fig:snapshots}(a-c). By investigating the changes of properties before and after the formation of D$_2$ molecules within the 100 fs, we can obtain insights into the fundamental process of forming D$_2$ molecules. Specifically, the analyzed time-dependent properties include distances of D to its neighbors, instantaneous velocities of D atoms, and number of electrons on D, which are respectively shown in Figure~\ref{fig:properties}, Figure~\ref{fig:properties2}, and Figure~\ref{fig:properties3}, respectively. \MC{We point out that due to the limited size of systems utilized in our FPMD simulations, the structural and dynamical properties of atoms in the slab could be affected. However, in our analysis of these time-dependent properties, we only focus on a local environment around the two D atoms that form a D$_2$ molecule. Therefore, we expect that the size effects are not substantial in affecting these properties. In addition, the number of D atoms in the low-concentration system is only 10 due to the limited size of the system, we observe 20 stable formation events of D$_2$ molecules from 573, 673, and 873 K. Although the current work could not provide more detailed temperature-dependent forming mechanisms for D$_2$ molecules, we still consider the averaged properties from the 20 events are sufficient to provide useful information.} Figure~\ref{fig:properties} shows that the distance between two D atoms ($d_{\rm D-D}$) quickly shortens approximately from 2.8 to 0.8 \AA~ in the first 50 fs before the formation of D$_2$, and then stably oscillates around 0.8 \AA~ with a damped amplitude up to 100 fs. The value of 0.8 \AA~ is the location of the first peak of the partial pair distribution function g$_{\rm DD}$(r), as illustrated in Figure~\ref{PPDF}(a). Meanwhile, the distances between D atoms and its adjacent atoms, i.e., $d_{\rm D-Li}$ and $d_{\rm D-Sn}$, slowly elongates from around 2.5 to 2.8 \AA~during the first 50 fs, which can be understood since Li and Sn atoms should provide spaces for two neighboring D atoms to meet and the process of forming D$_2$ starts. Meanwhile, as displayed in Figures~\ref{PPDF}(d) and (e), D atoms start to deviate from positions of the first peak in g$_{\rm LiD}$(r) and g$_{\rm SnD}$(r), indicating that the interactions between D and Li/Sn atoms are weakened. We then see a dramatic increase of $d_{\rm D-Li}$ and $d_{\rm D-Sn}$ from around 2.8 to 4.0 \AA~within the second 50 fs, suggesting that the D$_2$ molecule quickly diffuse away after its formation (see Figure~\ref{fig:snapshots}(d) and the movie in the Supplementary Materials~\cite{SM}). The \MC{averaged} velocities of the selected D-D pairs during the formation of D$_2$ molecules are illustrated in Figure~\ref{fig:properties2}. \MC{One of the two D atoms (labeled as D-1) has a velocity that is slower than the velocity of the other D atom (labeled as D-2) in the first 50 fs,} indicating that the two D atoms are experiencing different environments, i.e., the D-1 atom is trapped by surrounding Li and Sn atoms and the D-2 atom diffuses freely in the liquid with its velocity abruptly drops. \MC{ During the formation of D$_2$ molecule at around 50 fs, the two D atoms slow down and we know from Figure~\ref{fig:properties} that a bond forms between them. Next, after the formation of a D$_2$ molecule, both D-1 and D-2 atoms experience a vast increase of velocity after the 50 ps, and then diffuse together with similar velocities.} In Figure~\ref{fig:properties3}, we also compute the averaged charge change of D atoms and their adjacent atoms during the formation of D$_2$ molecules. We utilized the Bader charge analysis method~\cite{09JPCM-Tang}. From this analysis, we find electrons transfer from D to Sn atoms during the formation of D$_2$ molecules. Quantitatively, before forming D$_2$ molecules at around 50 fs, more than 1.5 electrons are assigned to a D atom while less than 4.0 valence electrons per atom are on its nearby Sn atoms. In the first 50 fs, a small amount of electrons (less than 0.5 electrons per atom) on D transfer to Sn. When D$_2$ forms at around 50 fs, the number of electrons on the D atom abruptly drops to about 1.0 within a very short time, which occurs at the same time when the changes of distances and velocities of D atoms occur. Meanwhile, the electrons on Sn are accumulated to above 4.0. The resulting number of electrons on D is slightly above 1.0, which is close to that of a single D atom. Furthermore, the D-D pair therefore has a bond of around 0.8 {\AA} with two electrons. Therefore, we identify the formation of D$_2$ molecules in the liquid Li-Sn slab based on all of the above considerations. It should be noted that no electrons are assigned to Li according to the Bader analysis, suggesting Li loses all its $2s$ valence electrons in the metallic liquid Li-Sn slab. \begin{figure} \centering \includegraphics[width=0.95\textwidth]{./Figure8.eps}\\ \caption{(Color online) Distributions of D-D and Li-D pairs in the Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ slab system along the surface normal direction at 573, 673 and 873 K. \MC{Distributions of D-D and Li-D pairs are divided into four parts according to the length of trajectories, i.e., (a-c) 0-5, (d-f) 5-10, (g-i) 10-15, (j-l) 15-20 ps.} The region within the two solid brown lines is defined as the bulk of Li-Sn. }\label{fig:LiD} \end{figure} \subsection{Formation of LiD Molecules} The FPMD simulations show that the D$_2$ molecules diffuse rapidly in the Li-Sn eutectic and some of them evaporate into the vacuum. \MC{Although we observe no evaporation of single D atoms or Li$_2$ molecules in liquid Li-Sn slab systems from the FPMD trajectories,} we find the existence of LiD molecules in vacuum, which is not surprising since Li and D atoms form strong ionic bonds \MC{and tend to stay near the surface}. \MC{To be specific, we observe 10 evaporation events for LiD molecules in the low-concentration slab system at 873 K, while only 1 evaporation event of LiD molecules is found in the high-concentration slab system at 673 K.} \MC{Additionally, according to the clues provided by the atomic decomposed density profiles illustrated in Figure~\ref{fig:decompose}, we respectively observe 2 and 1 events for a single Li atom that appears in the vacuum region of the low- and high-concentration slab systems at 873 K. Based on the above findings, we focus on discussing the formation of LiD molecules in the low-concentration slab system at 873 K since more evaporation cases are observed in this system than those in other systems.} Because Li could potentially contaminate the plasma, it is important to know how the LiD molecules evaporate compared to D$_2$. Figure~\ref{fig:LiD} depicts the distributions of D$_2$ and LiD molecules in the low-concentration Li-Sn slab at 573, 673, and 873 K. \MC{We divide the 20 ps trajectory into four parts, i.e., 0-5, 5-10, 10-15, 15-20 ps.} D$_2$ molecules distribute in both liquid Li-Sn slab and vacuum at all temperatures considered. In contrast, Li-D pairs mostly reside in the Li-Sn slab at 573 and 673 K, and are occasionally recorded around the surface. At the higher temperature of 873 K, we find a small amount of LiD molecules escape to the vacuum, although the chance to find the LiD molecules is almost an order of magnitude smaller than that of D$_2$ molecules. This finding is significant, because it suggests that the facility should work in an optimal temperature window below 873 K, which allows efficient recycling of D atoms but reduce the risk of LiD molecules from contaminating the plasma. \section{Conclusions} To summarize, we carry out FPMD simulations to investigate the retention and recycling of deuterium in liquid Li-Sn with two different concentrations (Li$_{0.19}$Sn$_{0.76}$D$_{0.05}$ and Li$_{0.13}$Sn$_{0.51}$D$_{0.36}$) at three temperatures of 573, 673, and 873 K. First of all, we find the formation of D$_2$ molecules in all of the simulations. Importantly, we unveil a cooperative mechanism of forming D$_2$ molecules in liquid Li-Sn, where Li atoms behave as catalytic centers, allowing efficient generation of D$_2$ molecules in liquid metal Li-Sn. During the formation process, Li traps a D atoms and another D atom comes close to trigger the charge transfer from D atoms to their nearby Sn atoms. After formation, the D$_2$ molecules diffuse promptly in the Li-Sn liquid and evaporate to the vacuum. The above mechanism reduces the retention of D in liquid Li-Sn slabs, and is beneficial for the recycling of D atoms. This work therefore provides new clues to a recent experimental finding~\cite{17NME-Loureiro} that Li-Sn eutectic has an unexpected low retention rate of hydrogen isotopes. Furthermore, although we do not observe evaporation of single D atoms or Li$_2$ molecules in our simulations, \MC{we occasionally observe the evaporation of LiD molecules in the high-concentration slab system at 673 K and the appearance of Li atoms in the vacuum in both concentrations of systems at 873 K. Importantly,} we observe \MC{a substantial amount of} LiD molecules, \MC{which form and evaporate in the low-concentration slab system} at 873 K. We predict a temperature window below 873 K, allowing efficient recycling of D atoms but reduce the risk of LiD molecules from contaminating the plasma. The new findings deepen our understanding of interactions between hydrogen isotopes and liquid Li-Sn and can be potentially used for improving the design of magnetically confined fusion reactors. Because the FPMD simulations of liquid slabs are computationally very expensive, currently we can only simulate a slab with a few hundred atoms for short period of times, which unavoidably suffers from size effects. Phenomena such as segregation of Li atoms to the liquid surface~\cite{17FED} cannot be fully reproduced in the FPMD simulations.~\cite{19NME-Beatriz} Simulations on much larger systems and for a longer simulation time using reliable potentials constructed by machine learning~\cite{18L-Zhang} is a promising routine along this direction. \section{Data availability statement} The data that support the findings of this study are available from the corresponding author upon reasonable request. \acknowledgements Daye Zheng and Zhen-Xiong Shen contributed equally to this work. This work was funded by the National Key Research and Development Program of China (Grants No. 2016YFB0201202), and the Chinese National Science Foundation Grant number 11774327. XR acknowledges the support of the Chinese National Science Foundation Grant No. 11574283 and 11874335. The numerical calculations have been done on the USTC HPC facilities. Part of the numerical simulations was performed on the High Performance Computing Platform of CAPT.
\subsection{\lstinline[basicstyle=\ttfamily\large]{#1}}\lstinputlisting{#2}} \title{Emission tomography with a multi-bang assumption on attenuation} \author{Sean Holman and Philip Richardson} \begin{document} \maketitle \abstract{We consider the problem of joint reconstruction of both attenuation $a$ and source density $f$ in emission tomography in two dimensions. This is sometimes called the Single Photon Emission Computed Tomography (SPECT) identification problem, or referred to as attenuation correction in SPECT. Assuming that $a$ takes only finitely many values and $f \in C_c^1(\mathbb{R}^2)$ we are able to characterise singularities appearing in the Attenuated Radon Transform $R_a f$, which models emission tomography data. Using this characterisation we prove that both $a$ and $f$ can be determined in some circumstances. We also propose a numerical algorithm to jointly compute $a$ and $f$ from $R_af$ based on a weakly convex regularizer when $a$ only takes values from a known finite list, and show that this algorithm performs well on some synthetic examples.} \section{Introduction} In this paper we consider the problem of emission tomography in which we seek to recover both attenuation $a$ and radiation source density $f$ based on passive radiation measurements. We will only consider the problem in two dimensions, and use the photon transport equation for the forward model. Assume that $a$ and $f$ are compactly supported functions on $\mathbb{R}^2$ and let $\Omega\subset \mathbb{R}^{2}$ be a bounded set containing the supports. Then the photon transport equation is \begin{equation}\label{phtranseq} \begin{split} \theta\cdot\nabla{u(x,\theta)}+a(x)u(x,\theta) = f(x), \quad (x,\theta)\in \Omega\times\mathbb{S}^{1},\\ u|_{\Gamma^{-}}=0, \end{split} \end{equation} where $u(x,\theta)$ is the photon flux through the point $x$ in a unit direction $\theta\in\mathbb{S}^{1}$ and $$ \Gamma^{-}=\{(x,\theta)\in\partial\Omega\times\mathbb{S}^{1}\ |\ \theta\cdot \underline{n}(x)\leq 0\},$$ where $\underline{n}(x)$ is the unit outward pointing normal to the boundary at $x$. Intuitively the differential equation in \eqref{phtranseq} states that photons are created by a source with density $f$ and then move along straight lines while being attenuated at a rate given by $a$. The boundary condition in \eqref{phtranseq} requires that we have no radiation entering the domain $\Omega$. The photon transport equation can be solved (for example by method of characteristics as in \cite{atrt}) to find the solution $u(x,\theta)$ which satisfies \begin{equation}\label{eq,2} \lim_{\tau\rightarrow\infty}u(s \theta^\perp +\tau\theta,\theta)=\int_{-\infty}^{\infty}\!f(s \theta^\perp+t\theta)e^{-Da(s \theta^{\perp}+t\theta,\theta)}\,\mathrm{d}t, \end{equation} where $\theta^\perp\in \mathbb{S}^1$ denotes $\theta$ rotated in the anticlockwise direction by $\pi/2$ and $Da$ is the beam transform of $a$ defined as $$ Da(x,\theta)=\int_{0}^{\infty}\! a(x+t\theta)\,\mathrm{d}t.$$ We define the Attenuated Radon Transform(AtRT)\cite{atrt} of $f$ with attenuation $a$ to be the integral on the right hand side of \eqref{eq,2}, and denote this $R_af(s,\theta)$. The basic question we investigate in this paper is whether it is possible to determine both of $a$ and $f$ from $R_a f$. When $a$ is fixed, the mapping $f \mapsto R_a f$ is known to be analytically invertible under certain mild conditions, and when these hold a closed form solution for the inverse is known, see \cite{inversion,Identification2,Identification3}. The problem of recovering both $a$ and $f$ from the AtRT is sometimes known as the Single Photon Emission Computed Tomography (SPECT) identification problem \cite{Ident,Identification1}, and one particular result, given in \cite{Quinto}, shows non-uniqueness for radial $a$ and $f$. That is, there are different pairs of $a$ and $f$ depending only on distance to the origin which give the same AtRT. The issue persists for maps which are also ``close" to being radial, as shown in \cite{GourionNoll}, and numerical investigations in \cite{Phil} also show evidence of non-uniqueness in other situations. One should also note that if $f = 0$, then it is trivially clear that $a$ can be anything and still $R_af = 0$. Despite these negative results, under some additional hypotheses determination of $a$ and $f$ from $R_a f$ can still be possible. In medical imaging literature there has been quite a lot of work aimed towards numerical methods for what is more typically called ``attenuation correction" in that context (e.g. \cite{attcorr1,attcorr2,attcorr3} and many others), although for practical applications of SPECT the standard method is to obtain the attenuation through a separate transmission CT scan. Some studies have also attempted to make use of scattered photons for attenuation identification in SPECT (\cite{scatter1,scatter2}) although the forward model must be enriched to include the scattering, and so the mathematical problem is different. There are not many positive theoretical results concerning recovery of both $a$ and $f$ from emission data alone. In the case when $Da$ in \eqref{eq,2} is replaced by a constant $\mu$ times $t$ the transform is called the exponential Radon transform, and in \cite{Identification1} it is shown that $\mu$ can be determined from the exponential Radon transform when $f$ is unknown, but not radial. A linearisation of the problem is studied from a microlocal point of view in \cite{Ident}, and used to establish some results for the nonlinear problem as well. A range characterisation of $f \mapsto R_a f$ for given $a$ originally found in \cite{inversion} and further explored in \cite{Novikovrange} was used in \cite{BalJollivet} to analyse recovery of both $a$ and $f$. Perhaps closest to the results of the present paper is the work in \cite{Bukgeimstar} which shows that unique recovery of $a$ and $f$ is possible when $a$ is a multiple of the characteristic function of a star shaped region. In this work we assume that $a$ takes on only finitely many values, and refer to such $a$ as {\it multi-bang}. As detailed below, we are able to show unique recovery of such $a$ from $R_af$ in some cases. Recently the authors of \cite{MB,MBorig} introduced a convex multi-bang regularization technique intended to allow reconstructions of images in which there are only certain known values, and our line of research leading to the present paper was originally inspired by this technique. There are many applications where the multi-bang regularization technique might be useful, particularly in many forms of medical imaging, e.g. SPECT imaging\cite{GourionNoll} and X-ray Imaging\cite{limrays}. The convex multi-bang technique of \cite{MB,MBorig} was applied numerically to the problem of recovering multi-bang $a$ and $f$ from $R_a f$ in \cite{Phil} with mixed results, and in the present paper we modified the method to use a weakly convex (rather than convex) multi-bang regularization combined with Total Variation(TV) to promote the joint recovery of multi-bang $a$ and $f$ from the AtRT $R_af$. We implement this by alternating updates between $a$ and $f$ using \cite{alternating} to prove convergence. The $a$ update is the most computationally intensive step due to the nonlinearity and using recent work by \cite{Guo,weakconvex} we apply a variant of the Alternating Direction Method of Multipliers(ADMM) with a non-convex multi-bang regularizer, which we show lends itself to promoting multi-bang solutions. The novel contributions of this paper are summarised as follows. The precise and rigorous versions of the theoretical results, which include a few other technical assumptions, are presented later in the paper. \begin{enumerate} \item Theorem \ref{thm1}. Assuming that $a$ is multi-bang, $f \in C^1_c(\mathbb{R}^2)$ is non-negative, and with some additional assumptions about the regularity of the boundaries of the regions of constant $a$, we can characterise the singularities occurring in $R_af$ as a result of the jumps in $a$. \item Theorem \ref{thm2}. If $a$ and $f$ are as in Theorem \ref{thm1} with the regions of constant $a$ being constructed using a sequence of nested convex sets, then $a$ and $f$ can be uniquely determined from $R_af$. \item We propose a numerical algorithm for joint recovery of multi-bang $a$ and $f$ for limited projection data, and demonstrate its utility with some numerical examples. \end{enumerate} Our proofs for Theorems \ref{thm1} and \ref{thm2} are based on a careful analysis of the singularities which occur in $R_af$ arising from the jumps of $a$, as well as a result that if $a$ is known outside of a convex region, then $R_af$ determines $f$ uniquely also outside this convex region (see Lemma \ref{lem:f}). We prove this latter result by reducing it to the problem considered in \cite[Theorem 3.1]{Bukgeim}, although other proofs using for example analytic microlocal analysis as in \cite{FSU} should also be possible. The rest of the paper is structured as follows. Section \ref{sec:theory} gives the theoretical results of the paper introducing some necessary definitions in subsection \ref{sec:def}, stating and proving Theorem \ref{thm1} as well as some related results in subsection \ref{sec:thm1}, and stating and proving Theorem \ref{thm2} in subsection \ref{sec:thm2}. Section \ref{sec:nummethod} describes the numerical methods used and section \ref{sec:numex} gives a number of numerical examples. The final section concludes the work in the paper and suggests avenues for further research. \section{Identification problem theoretical results} \label{sec:theory} \subsection{Problem set-up and definitions}\label{sec:def} We first recall from the introduction that the AtRT, $R_af$ is defined by the formula \begin{equation}\label{start} R_{a}f(s,\theta)=\int_{-\infty}^{\infty}\!f(s\theta^{\perp}+t\theta)e^{-Da(s\theta^{\perp}+t\theta,\theta)}\,\mathrm{d}t. \end{equation} Throughout this section we will assume that $f \in C_c^1(\mathbb{R}^2)$ and that $a$ is multi-bang. Note that $(s,\theta)$ corresponds to the line tangent to $\theta$ with distance $s$ from the origin (this is slightly different from the standard parametrisation of lines in the Radon transform in which $\theta$ is normal to the line), and $R_af$ is an integral along that line. We will always parametrise $\theta \in \mathbb{S}^1$ by the angle $\omega \in \mathbb{R}$ such that $\theta = (\cos(\omega),\sin(\omega))$ and $\theta^\perp = (-\sin(\omega),\cos( \omega))$. We now introduce the precise definition of multi-bang. \begin{defn}{\bf (Multi-bang)} \label{def:multibang} We say that $a \in L^\infty(\mathbb{R}^2)$ is {\it multi-bang} if there exists a finite set $\mathcal{A} = \{a_1,\ ... \ , \ a_n\} \subset \mathbb{R}$, called the {\it admissible set}, and a collection of disjoint bounded open sets $\{\Omega_{j}\}_{j = 1}^n$ with smooth boundaries possibly having corners such that \begin{equation} \label{multibang} a = \sum_{j=1}^n a_j \chi_{\Omega_j}. \end{equation} Here $\chi_{\Omega_j}$ is the characteristic function of the set $\Omega_j$, and we assume that for all $\Omega_j$ the interior of the closure of $\Omega_j$ is equal to $\Omega_j$. We also assume that any line only intersects the boundaries $\cup_{j=1}^n \partial \Omega_j$ finitely many times. \end{defn} \noindent The final hypothesis about lines intersecting the boundaries only finitely many times is added for technical reasons, and can probably be removed although we haven't proven this. It is also worthwhile to point out that for the theoretical results in section \ref{sec:theory} we do not require knowledge of the set of admissible values $\mathcal{A}$, although we do assume knowledge of the admissible values for the numerical algorithm. As we will see below in section \ref{sec:thm2}, we will be able to determine certain points on the boundaries of the sets $\Omega_j$ in Definition \ref{def:multibang} from $R_af$. The set of points which we can determine will be denoted $\mathcal{P}_a$, which we now define. \begin{defn}{\bf ($\mathcal{P}_a$)}\label{def:P} Suppose that $a$ is multi-bang with sets $\{\Omega_{j}\}_{j = 1}^n$ as in Definition \ref{def:multibang}. Then $\mathcal{P}_a$ is the set of points $x \in \partial \Omega_j$ for some $j$ such that either \begin{enumerate} \item\label{0curve} $\partial \Omega_j$ has non-zero curvature at $x$, or \item\label{corner} $\partial \Omega_j$ has a corner at $x$. \end{enumerate} We further write $\mathcal{P}_{a,1}$ for the subset of $\mathcal{P}_a$ where the boundary has non-zero curvature as in \ref{0curve} and $\mathcal{P}_{a,2}$ for the subset of $\mathcal{P}_a$ of corners as in \ref{corner}. \end{defn} \noindent As we might expect from microlocal analysis (e.g. see \cite{Ident}) the jumps in $a$ along the boundaries of $\Omega_j$ lead to singularities in $R_af$ at points $(s,\theta)$ corresponding to lines which are either tangent to the boundaries $\partial \Omega_j$, or pass through corners of $\partial \Omega_j$. We introduce the following definition for these lines. Note that in this definition we consider lines passing through a corner of $\partial \Omega_j$ that are also tangent to one of the branches of the corner to be tangent to $\partial \Omega_j$ (so there would always be at least two lines passing through a corner that are also tangent). \begin{defn}{\bf($ \mathcal{K}_a$)} \label{def:K} Suppose that $a$ is multi-bang with sets $\{\Omega_{j}\}_{j = 1}^n$ as in Definition \ref{def:multibang} and $\mathcal{P}_a$ is as in Definition \ref{def:P}. We define $\mathcal{K}^0_a$ to be the subset of $\{ (s,\theta) \ : \ s \in \mathbb{R}, \quad \theta \in \mathbb{S}^1\}$ such that the line corresponding of $(s,\theta)$ is either tangent to $\partial \Omega_j$ or passes through a corner of $\partial \Omega_j$ for some $j$. We further define $\mathcal{K}_a \subset \mathcal{K}^0_a$ to be the same set with the added requirement that if the line is tangent, then the tangency must be at a point where $\partial \Omega_j$ has nonzero curvature. Finally, we define subsets of $\mathcal{K}_a$ which are the set $\mathcal{K}_{a,1}$ of lines tangent at a point where the curvature is non-zero, and $\mathcal{K}_{a,2}$ the set of lines passing through corners. (Note that $\mathcal{K}_{a,1}$ and $\mathcal{K}_{a,2}$ may not be disjoint.) \end{defn} \noindent For Theorem \ref{thm2} we will also require an additional definition which describes precisely what we meant when we said the regions of constant $a$ are constructed using a sequence of nested convex sets. \begin{defn}{\bf(Nicely multi-bang)} \label{def:nicemb} We say that $a$ is nicely multi-bang if $a$ is multi-bang and can furthermore be written in the form \begin{equation}\label{eq:nicelymb} a = \sum_{i=1}^N c_j \chi_{C_j} \end{equation} where the sets $C_j$ are all convex, bounded, open with smooth boundary possibly having corners and nested in the sense that \[ C_n \Subset C_{n-1} \Subset \ ... \ \Subset C_1. \] Here $C_{j} \Subset C_{j-1}$ means that $C_{j}$ is contained in a compact set that is contained in $C_{j-1}$. \end{defn} \noindent In the next section we will state and prove Theorem \ref{thm1} as well as some other related results. \subsection{Theorem \ref{thm1} and related results} \label{sec:thm1} We start the section with the statement of Theorem \ref{thm1}. \begin{theorem} \label{thm1} Suppose that $f \in C^1_c(\mathbb{R}^2)$ is non-negative and $a$ is multi-bang with sets $\Omega_j$ as given in Definition \ref{def:multibang}. The theorem has two parts corresponding to $\mathcal{P}_{a,1}$ and $\mathcal{P}_{a,2}$. \begin{enumerate} \item Suppose $x \in \mathcal{P}_{a,1}$ and the line tangent to a boundary $\partial \Omega_j$ at $x$ is not tangent to a boundary anywhere else. If this tangent line is given by $(s^*,\theta^*)$ with $\theta^* = (\cos(\omega^*),\sin(\omega^*))$ and the ray $\{x + t \theta^* \ | \ t < 0\}$ intersects the set $\{f>0\}$, then $\partial_s R_a f(s,\theta^*)$ has a singularity of order $1/2$ at $s = s^*$, and $x$ is the unique point on the line such that \[ \lim_{\omega\rightarrow \omega^*}|\sin(\omega-\omega^*)|^{1/2} \partial_{\omega}R(x \cdot \theta^\perp,\theta) = 0. \] (Recall that $\theta = (\cos(\omega),\sin(\omega))$.) \item Suppose that $x \in \mathcal{P}_{a,2}$ lies on a corner of a boundary for a component of $\Omega_j$ and is also a corner for only one other component of some $\Omega_l$. If $(s^*,\theta^*) \in \mathcal{K}_{a,2}$ corresponds to any line passing through $x$ that passes through no other corners, is not tangent to any of the boundaries and the ray $\{x + t \theta \ | \ t < 0\}$ passes through the set $\{f>0\}$, then $\partial_s R_a f(s,\theta^*)$ has a jump across $s = s^*$. \end{enumerate} \end{theorem} \begin{remark} We comment that while we have chosen Theorem \ref{thm1} to summarise the results in this section in a concise manner, in fact the lemmas we prove taken together can provide stronger statements and more information than given in Theorem \ref{thm1} concerning the singularities of $R_a f$ when $a$ is multi-bang. In particular Lemmas \ref{lem:cont} and \ref{lem:flat}, and Corollary \ref{cor:0curv} are not reflected in the statement of Theorem \ref{thm1}. \end{remark} \noindent We now begin establishing lemmas and a corollary which will lead to the proof of Theorem \ref{thm1}. For the first lemma we look at the regularity of $R_a f$ in the complement of $\mathcal{K}_a^0$, which is actually not directly related to Theorem \ref{thm1}. . \begin{lemma}\label{lem:cont} Suppose that $f \in C_c^1(\mathbb{R}^2)$, $a$ is multi-bang, and $(s^*,\theta^*) \in (\mathcal{K}_a^0)^c$. Then the mapping $s \mapsto \partial_s R_a f(s,\theta^*)$ is continuous at $s^*$. \end{lemma} \begin{proof} Since $(s^*,\theta^*) \in (\mathcal{K}_a^0)^c$ the line tangent to $\theta^*$ with distance $s^*$ from the origin is neither tangent to one of the boundaries where $a$ jumps, nor passing through a corner of one of these boundaries. W.L.O.G we can rotate the axis so that the line corresponding to $(s^*,\theta^*)$ lies on the $x$-axis and $\theta^*=(1,0)$. Then we have \begin{equation}\label{lem1eq1} R_{a}f(s,\theta^*)=\int_{-\infty}^{\infty}f(x,s)e^{-Da((x,s),\theta^*)}\mathrm{d}x. \end{equation} For $x\in\mathbb{R}$, recall that $$Da((x,s),\theta^*)=\int_{x}^{\infty}a(t,s)\mathrm{d}t.$$ By assumption, the line given by $(s,\theta^*)$ only crosses the jumps of $a$ finitely many times and let us label the ordered values of $t$ for which these crossings occur (when the line is parametrised as $t \mapsto (t,s)$) as $\{t_i(s)\}_{i = 1}^N$. Since $(s^*,\theta^*) \in (\mathcal{K}_a^0)^c$ these functions $t_i$ are differentiable in a neighbourhood of $s = 0$. Next we introduce the functions \begin{equation}\label{lem1phi} \phi_i(x,s) = \left \{ \begin{array}{ll} t_i(s) & x < t_i(s)\\ x & x \geq t_i(s). \end{array} \right . \end{equation} Note that for all $i$, $\phi_i $ is continuous with bounded first derivative in a neighbourhood of $s = 0$ which is also continuous when $x \neq t_i(s)$. Using these functions we have \begin{equation} \label{lem1eq2} Da((x,s),\theta^*)=\sum_{i=1}^{N-1}c_{i}(\phi_{i+1}(x,s)-\phi_{i}(x,s)) = \sum_{i=1}^N (c_{i-1}-c_i) \phi_i(x,s) \end{equation} where for each $i$, $c_i$ is one of the admissible values or possibly zero (in particular $c_0$ and $c_N$ are always zero). We thus see that $D a ((x,s),\theta^*)$ also has bounded derivatives in a neighbourhood of $s = 0$ that are continuous except when $x = t_i(s)$ for some $i$, and differentiating this with respect to $s$ gives $$\partial_{s}Da((x,s),\theta^*)=\sum_{i=1}^{N}(c_{i-1} -c_i)\partial_s \phi_i(x,s).$$ Since $f \in C^1(\mathbb{R}^2)$ as well, we can therefore differentiate under the integral sign in \eqref{lem1eq1} to get \begin{equation}\label{lem1eq3} \begin{split} \partial_{s}R_{a}f(s,\theta^*) & =\int_{-\infty}^{\infty}\left(\partial_{s}f(x,s)-\partial_{s}Da((x,s),\theta^*)f(x,s)\right)e^{-Da((x,s),\theta^*)}\mathrm{d}x\\ & = \int_{-\infty}^{\infty}\partial_{s}f(x,s)e^{-Da((x,s),\theta^*)}\mathrm{d}x + \sum_{i=1}^{N} (c_i - c_{i-1}) t_i'(s) \int_{-\infty}^{t_i(s)} f(x,s) e^{-Da((x,s),\theta^*)}\mathrm{d}x. \end{split} \end{equation} Since $f \in C^1_c(\mathbb{R}^2)$ and the derivatives $t_i'$ are all continuous, we see that in fact $\partial_s R_af(s,\theta^*)$ is also continuous with respect to $s$ at $s = 0$ which completes the proof. \end{proof} \noindent We now begin to consider what can happen to $R_a f$ at lines in $\mathcal{K}_a$. First we consider $\mathcal{K}_{a,2}$. \begin{lemma}\label{lem:corner} Suppose that $f \in C_c^1(\mathbb{R}^2)$, $a$ is multi-bang, and $(s^*,\theta^*) \in \mathcal{K}_{a,2}$ passes though exactly one corner and is not tangent to any boundary $\partial \Omega_j$. Then $s \mapsto \partial_s R_a f(s,\theta^*)$ is bounded near $s^*$. Suppose additionally that the corner point occurs at $s^* (\theta^*)^\perp + t^* \theta^*$, is a corner for $N$ different components of the regions $\Omega_j$, and the boundaries of these regions make angles $\{\alpha_k\}_{k=1}^N$ with $(\theta^*)^\perp$ where the orientation is chosen so that $\theta^*$ is at a positive angle. Also suppose that the jump in $a$ across the boundary with angle $\alpha_k$ in the direction of increasing angle is $b_k$ (see figure \ref{cornerfig} and caption). Then there is a jump in $\partial_s R_a f(s,\theta^*)$ across $s = s^*$ given by \begin{equation} \label{eq:corner} \Big [ \partial_s R_a f(s,\theta^*)\Big ]_{s^*_-}^{s^*_+} = \left ( \sum_{k=1}^N b_k \tan(\alpha_k) \right ) \int_{-\infty}^{t^*} f(s^* (\theta^*)^\perp + t \theta^*) e^{-Da(s^* (\theta^*)^\perp + t \theta^*, \theta^*)} \ \mathrm{d} t. \end{equation} \end{lemma} \begin{figure} \begin{center} \includegraphics[scale=.7]{Cornerfig.pdf} \end{center} \caption{This figure illustrates some of the notation used in the statement and proof of Lemma \ref{lem:corner}. The line corresponding to $(s^*,\theta^*)$ is shown in red. Note that the jump $b_1$ across the boundary corresponding to the angle $\alpha_1$ in the example shown in the figure would be $b_1 = c_{i_3^+}^+ - c_{i_2^+}^+$.} \label{cornerfig} \end{figure} \begin{proof} We use the same set-up and notation as in the proof of Lemma \ref{lem:cont}, although by translating if necessary we also assume W.L.O.G. that the corner occurs at the origin. Unlike in Lemma \ref{lem:cont} there may be a different number of boundary crossings $N$ when $s>0$ and $s<0$, and so we introduce corresponding functions $\{t^\pm_i\}_{i=1}^{N^\pm}$ giving the crossing points where the $t_i^+$ are defined for $s>0$ and the $t_i^-$ are defined for $s<0$. As in Lemma \ref{lem:cont} these $t_i^\pm$ will all have bounded derivatives up to $s = 0$ (this is because the line given by $(s^*,\theta^*)$ is not tangent to any boundary). We also introduce the corresponding $\phi^\pm_i$ defined as in \eqref{lem1phi} but only for $s>0$ and $s<0$ respectively. The formula \eqref{lem1eq2} still holds with $\pm$ added in appropriate places, and we can still see that $Da((x,s),\theta^*)$ is continuous for $s$ close to zero. For the derivative $\partial_s Da((x,s),\theta^*)$ we have for $s \neq 0$, where $\pm$ is the sign of $s$, \begin{equation}\label{lem3eq1} \partial_s Da((x,s),\theta^*)=\sum_{i=1}^{N^\pm}(c^\pm_{i-1}- c^\pm_i) \partial_s \phi^\pm_{i}(x,s). \end{equation} Since these derivatives are all bounded (but not necessarily continuous at $s = 0$) we still have \eqref{lem1eq3} for $s \neq 0$, and we see that $\partial_s R_a f(s,\theta^*)$ is bounded thus proving the first statement of the theorem. It remains to analyse the jump at $s = 0$. Let us first consider the jump in $\partial_s Da((x,s),\theta^*)$ across $s = 0$. The only terms contributing to this jump in \eqref{lem3eq1} will be those with $\phi_i^\pm$ where $t_i^\pm(s) \rightarrow 0$ as $s \rightarrow 0^\pm$ since the others correspond to boundaries which do not have corners along $(s^*,\theta^*)$ and the line is not tangent to any of the boundaries. Let us reindex the indices $i$ corresponding to such $t_i$ using a new index $k$ as $\{ i^\pm_{k}\}_{k=1}^{\tilde{N}^\pm}$. Then the jump in $\partial_s Da((x,s),\theta^*)$ is given by \[ \begin{split} \Big [ \partial_s Da((x,s),\theta^*)\Big ]_{0^-}^{0^+} & = \lim_{s \rightarrow 0^+} \partial_s Da((x,s),\theta^*) - \lim_{s \rightarrow 0^-} \partial_s Da((x,s),\theta^*)\\ & = \left [ \sum_{k=1}^{\tilde{N}^+} (c^+_{i^+_k-1} -c^+_{i^+_k}) \partial_s \phi^+_{i_k^+}(x,0^+)\right ] - \left [ \sum_{k=1}^{\tilde{N}^-} (c^-_{i^-_k-1} -c^-_{i^-_k}) \partial_s \phi^-_{i_k^-}(x,0^-)\right ]. \end{split} \] Using \eqref{lem1eq3} we find that the jump of $\partial_s R_a f(s,\theta^*)$ across $s = 0$ will be \[ \begin{split} \Big[ \partial_s R_a f(s,\theta^*) \Big ]^{0^+}_{0^-} & = \lim_{s \rightarrow 0^+} \partial_s R_a f(s,\theta^*) - \lim_{s \rightarrow 0^-} \partial_s R_a f(s,\theta^*) \\ & = - \left (\left [ \sum_{k=1}^{\tilde{N}^+} (c^+_{i^+_k-1} -c^+_{i^+_k}) \partial_s t^+_{i_k^+}(0^+) \right ] - \left [ \sum_{k=1}^{\tilde{N}^-} (c^-_{i^-_k-1} -c^-_{i^-_k}) \partial_s t^-_{i_k^-}(0^-)\right ] \right )\\ & \hskip1cm \times \int_{-\infty}^0 f(x,0) e^{-Da((x,0),\theta^*)} \ \mathrm{d} x. \end{split} \] Taking into account the rotation and translation used at the beginning we see that this corresponds with \eqref{eq:corner} and so completes the proof. \end{proof} \noindent Next we consider $\mathcal{K}_{a,1}$ which requires a bit more work. \begin{lemma}\label{curveint} Suppose that $f \in C_c^1(\mathbb{R}^2)$, $a$ is multi-bang, and that $(s^*,\theta^*) \in \mathcal{K}_{a,1}$ is such that the line corresponding to $(s^*,\theta^*)$ is only tangent to a boundary $\partial \Omega_j$ at one point given by $s^* (\theta^*)^\perp + t^* \theta^*$ which is not also a corner. Furthermore, suppose that $a = c$ on the convex side of the point of tangency, $a = c_0$ on the concave side, the curvature of $\partial \Omega_j$ at the point of tangency is $\kappa > 0$, and $\theta_\perp^* \in \mathbb{S}^1$ is orthogonal to $\theta^*$ and pointing into the convex side. Then \begin{equation}\label{eq:tangent} \begin{split} \lim_{s\rightarrow (s^*)^{\pm}}|s-s^*|^{\frac{1}{2}}\partial_{s}R(s ,\theta^*)= \pm\frac{c_0-c}{\sqrt{\kappa/2}} \int_{-\infty}^{t^*}f(s^* (\theta^*)^\perp + t \theta^*))e^{-Da(s^* (\theta^*)^\perp + t \theta^*,\theta^*)}\ \mathrm{d}t \end{split} \end{equation} where $\pm$ is the sign of $(\theta^*)^\perp \cdot \theta^*_\perp$. \end{lemma} \begin{proof} After possibly rotating as in the proof of Lemma \ref{lem:cont} and reflecting across the $x$-axis we can assume that $s^* = 0$, $\theta^* = (1,0)$ and $\theta_\perp^* = (0,1)$. We further assume W.L.O.G. by translating if necessary that the single point of tangency is the origin. This means that locally near the origin the boundary $\partial \Omega_j$ will be given as a graph in the form \begin{equation}\label{boundary} y = x^2 g(x) \end{equation} where $g$ is a strictly positive function and $g(0) = \frac{\kappa}{2}$. For sufficiently small $s>0$ we then follow the same reasoning as in the proof of Lemma \ref{lem:cont} and so obtain (for $s>0$) the equation \eqref{lem1eq2}. The difference from Lemma \ref{lem:cont} is that in the current case the derivatives of the $t_i$'s corresponding to the point of tangency will blow up as $s \rightarrow 0^+$. There will be two such $t_i$'s which both go to $0$ as $s\rightarrow 0^+$, one positive and one negative which we label respectively as $t_\pm$, and differentiating \eqref{boundary} we can show that \begin{equation}\label{lem2eq1} \lim_{s\rightarrow 0^+} s^{1/2} \partial_s t_\pm(s) = \pm \frac{1}{\sqrt{2 \kappa}}. \end{equation} Now we have \eqref{lem1eq3} which holds for $s>0$ sufficiently small, and all the terms in this will be bounded as $s \rightarrow 0^+$ except those that involve derivatives of $t_\pm$. Thus when we multiply by $s^{1/2}$ and take the limit $s \rightarrow 0^+$ the only terms that will possibly remain are \[ \begin{split} \lim_{s\rightarrow 0^+} s^{1/2} \partial_{s}R_{a}f(s,\theta^*)& = \lim_{s \rightarrow 0^+} \Bigg\{ - s^{1/2}(c-c_0) \partial_s t_+(s) \int_{t_-(s)}^{t_+(s)} f(x,s) e^{-Da((x,s),\theta^*)} \mathrm{d} x\\ & \quad -s^{1/2} (c - c_0) \left (\partial_s t_+(s) - \partial_s t_-(s) \right ) \int_{-\infty}^{t_-(s)} f(x,s) e^{-Da((x,s),\theta^*)} \mathrm{d} x \Bigg\}. \end{split} \] The term on the right on the first line is zero by \eqref{lem2eq1} and using the fact the integrand is continuous, while using \eqref{lem2eq1} another time we can evaluate the term on the second line to get \[ \lim_{s\rightarrow 0^+} s^{1/2} \partial_{s}R_{a}f(s,\theta^*) = \frac{c_0-c}{\sqrt{\kappa/2}} \int_{-\infty}^{0} f(x,0) e^{-Da((x,0),\theta^*)} \mathrm{d} x. \] Taking into account the rotation, translation and reflection at the beginning of the proof, this corresponds with \eqref{eq:tangent} and so completes the proof. \end{proof} \begin{remark} Note that Lemma \ref{curveint} precisely characterises the leading order singularity of the derivative $\partial_s R_a f$ at $(s^*,\theta^*)$. It is possible to obtain a similar formula and characterisation for some smooth parts of the boundary where the curvature is zero with some higher order derivative which does not vanish at $x=0$. In this case we would use $y=x^{2n}g(x)$ in place of \eqref{boundary} where $n\geq 2$ and $g(0)\neq0$. The order of the singularity in $\partial_s R_af$ as $s\rightarrow (s^*)^{\pm}$ is then $1-\frac{1}{2n}$ rather than $1/2$. \end{remark} \begin{remark} It is possible to combine the methods of proof of the previous lemmas to characterise the singularities at $(s^*,\theta^*)$ corresponding to lines both tangent to the boundaries at multiple places and/or passing through through multiple corners, but to simplify the statements we have not done this explicitly. \end{remark} \noindent At this point we note that these first three lemmas already show how we can determine some information about multi-bang $a$ from $R_af$. First of all, Lemma \ref{lem:cont} shows that if $R_af(s,\theta)$ is not continuous in $s$ at a point $(s^*,\theta^*)$, then the corresponding line must either be tangent to or passing through a corner of the boundary of one of the regions $\Omega_j$. If $\partial_s R_a f(s,\theta)$ is bounded near $(s^*,\theta^*)$, but has a jump in $s$ at this point, then the line must be passing through a corner from Lemma \ref{lem:corner}. If $\partial_s R_a f(s,\theta^*)$ blows up as $s \rightarrow s^*$, then the line $(s^*,\theta^*)$ must be tangent to one of the boundaries by Lemma \ref{curveint}. This already gives most of the information required to prove Theorem \ref{thm1} except for the part about the derivative with respect to $\omega$. For this we include one additional lemma studying the derivative with respect to variation in the angle $\omega$ rather than $s$ as in the previous lemmas. \begin{lemma}\label{lem:omega} Assume the same hypotheses as in Lemma \ref{curveint}. Additionally suppose that\\ $\theta^* = (\cos(\omega^*),\sin(\omega^*))$ and $x^*$ is a point on the line corresponding to $(s^*,\theta^*)$. Then \begin{equation}\label{eq:omega} \begin{split} &\lim_{\omega\rightarrow (\omega^*)^{s_1}}|\sin(\omega-\omega^*)|^{1/2} \partial_{\omega}R(x^*\cdot \theta^\perp,\theta)=\\ & \hskip2cm s_2(c_0-c) \sqrt{\frac{2|x^* \cdot \theta^* -t^*|}{\kappa}} \int_{-\infty}^{t^*}f(s^* (\theta^*)^\perp + t \theta^*))e^{-Da(s^* (\theta^*)^\perp + t \theta^*,\theta^*)}\ \mathrm{d}t \end{split} \end{equation} where $s_1$ is the sign of $(t^* - x^* \cdot \theta^*) (\theta^*)^\perp \cdot \theta^*_\perp$, and $s_2$ is the sign of $(\theta^*)^\perp \cdot \theta^*_\perp$. In the case that $t^* - x^* \cdot \theta^* = 0$, the equation \eqref{eq:omega} still holds with $s_1$ removed (note the right hand side is zero in that case). \end{lemma} \begin{proof} As in the previous lemmas by rotating, translating and possibly reflecting about the x-axis we assume W.L.O.G. that $\theta^* = (1,0)$, $\theta^*_\perp = (0,1)$ and the point of tangency is at the origin (i.e. $t^* = 0$). We also assume that $x^* = (\ell,0)$ and for the moment consider only the case $\ell \neq 0$. Note that the line corresponding to $(x^* \cdot \theta^\perp,\theta)$ is precisely the line through $x^*$ tangent to $\theta$, and we will change the parametrisation of this line in the integral definition of the AtRT so that $t = 0$ always corresponds with $x^*$. After doing all of this we have \begin{equation}\label{Rafomega} R_a f(x^* \cdot \theta^\perp,\theta) = \int_{-\infty}^\infty f(x^* + t \theta) e^{-Da(x^* + t \theta,\theta)} \ \mathrm{d} t. \end{equation} Now we use the same notation as in the previous lemmas and label the ordered values of $t$ along the line $t \mapsto x^* + t \theta$, for $\mathrm{sgn}(\ell) \omega > 0$ and $|\omega|$ sufficiently small, at which the line intersects one of the boundaries $\partial \Omega_j$ as $\{t_i(\omega)\}_{i=1}^N$. Two of the $t_i$ will correspond to the point of tangency and these will satisfy $t_i(\omega) \rightarrow -\ell$ as $\omega \rightarrow 0^{-\mathrm{sgn}(\ell)}$. Combining \eqref{boundary} with the geometric relations \begin{equation}\label{eq:ell0} \cos(\omega) = \frac{x-\ell}{t_\pm}, \quad \sin(\omega) = \frac{y}{t_\pm}, \quad \tan(\omega)= \frac{y}{x-\ell} \end{equation} we can show by taking derivatives with respect to $\omega$, and some computation, that \begin{equation}\label{lem4eq1} \lim_{\omega \rightarrow 0^{-\mathrm{sgn}(\ell)}} |\sin(\omega)|^{1/2} \partial_\omega t_\pm(\omega) = \pm \sqrt{\frac{|\ell|}{2\kappa}}. \end{equation} In the case that $\ell = 0$ we will still have $t_\pm(\omega)$ when $\omega \neq 0$ is sufficiently small corresponding to the two intersections near the tangent point, but $t_{-\mathrm{sgn}(\omega)}(\omega) = 0$ and $\omega\ t_{\mathrm{sgn}(\omega)}(\omega) > 0$ for all $\omega \neq 0$. In this case we can show in a similar manner to the $\ell \neq 0$ case that \begin{equation}\label{ell0lim} \lim_{\omega \rightarrow 0} |\sin(\omega)|^{1/2} \partial_\omega t_\pm(\omega) = 0. \end{equation} We next define functions $\phi_i$ in a similar way to before (compare with \eqref{lem1phi}) as \begin{equation}\label{lem4phi} \phi_i(t,\omega) = \left \{ \begin{array}{ll} t_i(\omega) & t < t_i(\omega)\\ t & t \geq t_i(\omega), \end{array} \right . \end{equation} for $-\mathrm{sgn}(\ell) \omega > 0$. As before \[ Da(x^*+t\theta,\theta) = \sum_{i=1}^{N} (c_{i-1}-c_i) \phi_i(t,\omega) \] also for $-\mathrm{sgn}(\ell) \omega > 0$. In the case $\ell = 0$ we still have versions of the previous formula for $\omega \neq 0$, but it will change depending on the sign of $\omega$. We will also write $\phi_\pm$ for those $\phi_\pm$ corresponding to $t_\pm$. Now let us take the derivative of \eqref{Rafomega} in the case when $-\mathrm{sgn}(\ell) \omega > 0$ if $\ell \neq 0$ or $\omega \neq 0$ if $\ell = 0$. We then have \begin{equation}\label{domegaRaf} \partial_\omega R_a f(x^* \cdot \theta^\perp,\theta) = \int_{-\infty}^\infty \Big ( \partial _\omega f(x^* + t \theta) - \partial_\omega Da(x^* + t\theta, \theta) f(x^* + t \theta) \Big ) e^{-Da(x^* + t \theta,\theta)} \ \mathrm{d} t. \end{equation} First consider the case $\ell = 0$. In this case when we multiply by $|\sin(\omega)^{1/2}|$ and take the limit as $\omega \rightarrow 0$, using \eqref{ell0lim} we see that the limit is zero. Since $\ell = x^* \cdot \theta^* - t^*$, this proves the result when $\ell = 0$. Now consider when $\ell \neq 0$. In this case we multiply by $|\sin(\omega)|^{1/2}$ and take the limit as $\omega \rightarrow 0^{-\mathrm{sgn}(\ell)}$. The only terms that are not bounded in \eqref{domegaRaf} for $\omega$ close to zero are those that involve derivatives of $\phi_\pm$. We therefore have \[ \begin{split} \lim_{\omega \rightarrow 0^{-\mathrm{sgn}(\ell)} }|\sin(\omega)|^{1/2} \partial_\omega R_a f(x^* \cdot \theta^\perp,\theta)& = \\ &\hskip-3cm (c-c_0) \lim_{\omega \rightarrow 0^{-\mathrm{sgn}(\ell)} } \int_{-\infty}^{t_-(\omega)} |\sin(\omega)|^{1/2} \partial_\omega t_-(\omega) f(x^* + t \theta) e^{-Da(x^* + t \theta,\theta)} \ \mathrm{d} t\\ &\hskip-2cm +(c_0-c)\lim_{\omega \rightarrow 0^{-\mathrm{sgn}(\ell)} } \int_{-\infty}^{t_+(\omega)} |\sin(\omega)|^{1/2} \partial_\omega t_+(\omega) f(x^* + t \theta) e^{-Da(x^* + t \theta,\theta)} \ \mathrm{d} t. \end{split} \] Applying \eqref{lem4eq1} to this we finally obtain \[ \lim_{\omega \rightarrow 0^{-\mathrm{sgn}(\ell)} }|\sin(\omega)|^{1/2} \partial_\omega R_a f(x^* \cdot \theta^\perp,\theta) = (c_0 - c) \sqrt{\frac{2 |\ell|}{\kappa}} \int_{-\infty}^{-\ell} f(x^* + t \theta^*) e^{-Da(x^* + t \theta^*,\theta^*)} \ \mathrm{d} t \] Taking into account the translations, rotation and reflection from the beginning of the proof this formula agrees with \eqref{eq:omega}, and so completes the proof. \end{proof} Before giving the proof of Theorem \ref{thm1} we record a corollary of the proof of Lemma \ref{lem:omega} which looks at one case in which at the point of tangency of a line to the boundary of an $\Omega_j$, the curvature of the boundary is zero. This corollary will be useful for the proof of Theorem \ref{thm2} later. \begin{corollary}\label{cor:0curv} Assume the same hypotheses as in Lemma \ref{lem:omega} including the assumption that there is a convex and concave side of the boundary near the point of tangency, but say the curvature is $\kappa = 0$ at the point of tangency. If $x^* \cdot \theta^* - t^* \neq 0$ and the ray $\{x^* + t \theta^* \ : \ t < t^*\}$ intersects the set $\{f >0\}$, then limits in \eqref{eq:omega} and \eqref{eq:tangent} are one of $\pm \infty$. \end{corollary} \begin{proof} The proof follows the same outline as the proofs of Lemma \ref{curveint} and \ref{lem:omega}, but in \eqref{boundary} we have $g(0) = 0$. Because of this \eqref{lem2eq1} and \eqref{lem4eq1} respectively change to \[ \lim_{s \rightarrow 0^+} s^{1/2} \partial_s t_\pm(s) = \pm\infty, \quad \mbox{and} \quad \lim_{\omega \rightarrow 0^{-\mathrm{sgn}(\ell)}} |\sin(\omega)|^{1/2} \partial_\omega t_\pm(\omega) = \pm \infty. \] Following the proofs through the rest of the way with this change, and using the fact that the integrals appearing at the end do not vanish, proves the corollary. \end{proof} \noindent The proof of Theorem \ref{thm1} now follows simply from Lemmas \ref{lem:corner}, \ref{curveint} and \ref{lem:omega} as we now point out.\\ \noindent{{\it Proof of Theorem \ref{thm1}.}} For the first item in Theorem \ref{thm1} we note that if the hypotheses are satisfied, then by Lemma \ref{curveint} equation \eqref{eq:tangent} holds, and since the ray $\{x + t \theta^* \ | \ t<0\}$ intersects $\{f>0\}$, the integral on the right side of \eqref{eq:tangent} is not zero. Therefore $\partial_s R_a f(s,\theta^*)$ has a singularity of order $1/2$ at $s = s^*$. Similarly Lemma \ref{lem:omega} implies that \eqref{eq:omega} will hold and this limit will only be zero when $x^* = x$. This proves the first part. The second part follows similarly from Lemma \ref{lem:corner}, although we note the under the given hypotheses $N=2$ in \eqref{lem:corner} and $b_1 = -b_2 \neq 0$. Thus we have a jump in $\partial_s R_a f$ if \[ \tan(\alpha_1) \neq \tan(\alpha_2). \] This will always be true at a corner since there would be equality only if $\alpha_1 = \alpha_2 + n \pi$ for an integer $n$, but that would mean we are not at a corner. \qed\\ \noindent To finish this section we prove one more lemma concerning what can happen if there is a flat section of a boundary of one of the $\Omega_j$. This will be used in the proof of Theorem \ref{thm2}. \begin{lemma}\label{lem:flat} Assume that $a$ is multi-bang and $f \in C^1_c(\mathbb{R}^2)$ is non-negative. Suppose that the line given by $(s^*,\theta^*)$ intersects the boundary of one of the $\Omega_j$ in a line segment of length $\ell$ given by $\{s^* (\theta^*)^\perp + t \theta^* \ | \ t \in [t_- ,t_+]\}$, and that there are no corners for any of the other regions contained in the interior of this line segment. Assume also that the ray $\{s^* (\theta^*)^\perp + t \theta^* \ | \ t < t_+\}$ intersects the set $\{f>0\}$. Then $R_af(s,\theta^*)$ is discontinuous at $s = s^*$. \end{lemma} \begin{proof} We follow the same method as the proofs of Lemma \ref{lem:corner} using the notation $t_i^\pm$ and $\phi^\pm_i$ as before. The difference here is that some of these $t_i^\pm(\omega)$ will converge to the endpoints $t_-$ and $t_+$ of the line segment as $s \rightarrow 0^\pm$. These will lead to a jump in $Da((x,s),\theta^*)$ given by \eqref{lem1eq2} at $s = 0$ when $x<t_+$. This jump will then lead to a jump in $R_af$ if $f$ satisfies the given hypothesis. \end{proof} \noindent We next proceed to the statement and proof of Theorem \ref{thm2} as well as some related results. \subsection{Theorem 2 and related results} \label{sec:thm2} In this section we state and prove Theorem \ref{thm2}. \begin{theorem}\label{thm2} Suppose that $a$ is nicely multi-bang (see Definition \ref{def:nicemb}) and $f \in C^1_c(\mathbb{R}^2)$ is non-negative. Also assume that \begin{enumerate} \item for all $x \in \mathcal{P}_{a,1}$ the line tangent to a boundary at $x$ passes through the set $\{f>0\}$, and \item for all $x \in \mathcal{P}_{a,2}$ there is a line passing through $x$ that also passes through the set $\{f>0\}$. \end{enumerate} Then $a$ and $f$ are uniquely determined by $R_af$. \end{theorem} \noindent We prove Theorem \ref{thm2} throughout this section in a series of lemmas. The initial step in the proof of Theorem \ref{thm2} is to show that under the given hypotheses we can determine the set of points where $a$ jumps. We will do this now. \begin{lemma}\label{lem:boundary} Assume the same hypotheses as Theorem \ref{thm2}. Then we can determine from $R_af$ the sets $C_j$ appearing in Definition \ref{def:nicemb} for $a$. \end{lemma} \begin{proof} We first note that by Lemmas \ref{lem:cont} and \ref{lem:corner} and Corollary \ref{cor:0curv} the set of $(s^*,\theta^*)$ such that $\partial_s R_a f(s,\theta^*)$ for $s$ near $s^*$ is not bounded gives the set of lines which are tangent to some boundary $\partial C_j$, possibly missing some of the lines which intersect a boundary in a line segment. We can get rid of all of the $(s^*,\theta^*)$ corresponding to lines which intersect a boundary $\partial C_j$ in a line segment by looking at the continuity of $R_af(s,\theta^*)$ near $s^*$ and using Lemma \ref{lem:flat}. Thus we can determine the set of $(s^*,\theta^*)$ such that the corresponding lines are tangent to a boundary $\partial C_j$ at some point, and since the $C_j$ are nested convex sets the point of tangency along each such line must be unique. We can determine the point of tangency along each line that is tangent at a point where the curvature of $\partial C_j$ is not zero using Theorem \ref{thm1} or we can determine if at the point of tangency the curvature is zero using Corollary \ref{cor:0curv}. Thus we can identify all points in the boundaries of the $C_j$ at which the curvature of $\partial C_j$ is not zero. Next we will show that we can also find the corners of the boundaries $\partial C_j$. By Lemma \ref{lem:corner} and the hypotheses, for every corner point $x$ for some $\partial C_j$ there will infinitely many lines passing through $x$ such that for at least $(s^*,\theta^*)$ corresponding to these lines $\partial_s R_a f(s,\theta^*)$ is bounded, but has a jump at $s = s^*$. This allows us to determine the corner points, and combining this with the previous paragraph we see that we can determine the $\mathcal{P}_a$ from $R_af$ under the given hypotheses. We next show that this is sufficient to determine all of the $C_j$. By Lemma \ref{lem:cohull}, which we will prove next, the closure of the convex hull of $\mathcal{P}_a$ is equal to the closure of $C_1$. Therefore we can determine $C_1$. The rest of the sets $C_j$ can now be determined inductively. Indeed, suppose that we know $C_{l}$ for all $l<j$. Then by Lemma \ref{lem:cohull} again \[ \overline{C_j} = \overline{\mathrm{conhull}\left ( \mathcal{P}_a \setminus \bigcup_{l=1}^{j-1}\partial C_l \right )}, \] and so we can determine $C_j$. This completes the proof. \end{proof} \noindent The following geometric lemma was needed in the proof of Lemma \ref{lem:boundary}. \begin{lemma} \label{lem:cohull} Suppose that $C \subset \mathbb{R}^2$ is closed, convex, bounded and has smooth boundary possibly with corners. Also let $\mathcal{P}$ be the subset of $\partial C$ consisting of points which are either corners of $\partial C$, or where $\partial C$ has nonzero curvature. Then \[ C = \overline{\mathrm{conhull} \left ( \mathcal{P} \right )} \] where $\mathrm{conhull}(\mathcal{P})$ is the convex hull of $\mathcal{P}$. \end{lemma} \begin{proof} Since $C$ is closed and convex, and $\mathcal{P} \subset C$, we have $\overline{\mathrm{conhull} \left ( \mathcal{P} \right )} \subset C$. Thus it only remains to show the opposite inclusion. Suppose that $x \in \partial C \setminus \overline{\mathrm{conhull} \left ( \mathcal{P} \right )}$. Then there must be a neighbourhood $U$ of $x$ such that $U \cap \partial C$ does not intersect $\mathcal{P}$. Therefore the curvature of $\partial C$ is zero at all points in $U \cap \partial C$, and since $x$ is also not a corner for $\partial C$, this implies that $U \cap \partial C$ must contain a line segment containing $x$ in its relative interior. There must then be some maximally extended line segment containing $x$ which is contained in $\partial C$. At least one of the end points of this maximal line segment must also be in $\partial C \setminus \overline{\mathrm{conhull} \left ( \mathcal{P} \right )}$ since otherwise we would have $x \in \overline{\mathrm{conhull} \left ( \mathcal{P} \right )}$ by convexity. However this is a contradiction since by the argument we have already given this endpoint would be in the relative interior of a line segment contained in $\partial C \setminus \overline{\mathrm{conhull} \left ( \mathcal{P} \right )}$. Thus $\partial C \setminus \overline{\mathrm{conhull} \left ( \mathcal{P} \right )} = \emptyset$, which then implies the result. \end{proof} \noindent Having proven in Lemma \ref{lem:boundary} that we can determine the sets $C_j$ from $R_a f$ under the hypotheses of Theorem \ref{thm2}, it remains to show that we can recover $f$ and the jumps in $a$ across each of the boundaries. For this we argue by induction starting at the outermost region $C_1$, and continuing inward. First suppose that $a$ and $f$ are known everywhere outside of $C_{j-1}$ for some $j \geq 2$. Then since there must be at least one point $x$ on the boundary $\partial C_{j-1}$ in $\mathcal{P}_a$, we can either use \eqref{eq:corner} or \eqref{eq:tangent} to determine the jump in $a$ across the boundary at $x$. Therefore we can determine $a$ outside of $C_j$. To complete the induction step it then remains to show we can determine $f$ outside of $C_j$. For this we use the following lemma. \begin{lemma}\label{lem:f} Suppose that $f \in C_c^1(\mathbb{R}^2)$, and a is nicely multi-bang with sets $\{C_j\}_{j=1}^n$, and let $C_0$ be an open ball centred at the origin that is sufficiently large so that $C_1 \Subset C_0$ and $\mathrm{supp}(f) \Subset C_0$. Then for $j \geq 1$, $f|_{C_{j-1} \setminus C_j}$ is uniquely determined if we know all of \begin{enumerate} \item $R_a f$, \item the sets $C_j$, \item $a|_{\mathbb{R}^2 \setminus C_{j}}$, and \item $f|_{\mathbb{R}^2 \setminus C_{j-1}}$. \end{enumerate} \end{lemma} \begin{proof} For this proof we will write $(x,y)$ as Cartesian coordinates for points in $\mathbb{R}^2$. By translating and rotating as necessary we assume W.LO.G. that $C_{j}$ is contained in the upper half plane $\{y>0\}$, and show that we can then uniquely determine $f$ restricted to the lower half-plane $\{y<0\}$. By translating to bring $C_{j}$ arbitrarily close to $\{y = 0\}$ and rotating this then shows we can determine $f$ everywhere outside of $C_{j}$ and so will complete the proof. Having done the transformations described in the previous paragraph, we also assume that $C_{j-1} \subset \{y > -h\}$. Now choose $\omega > \epsilon > 0$ such that the parabola $\{ y= \epsilon x^2\}$ lies entirely outside of $C_{j}$ and the parabola $\{ y= \omega x^2 - h\}$ lies entirely outside of $C_{j-1}$. It is possible to find such $\omega$ and $\epsilon$ since the $C_j$ are all bounded. Now choose $\phi \in C^\infty(\mathbb{R}^2)$ such that $\phi(x,y) = 1$ on $C_{j-1}$ and $\phi(x,y) = 0$ on the set $\{y < \omega x^2 - h\}$. Then define $\tilde{f} = \phi f$ so that $\tilde{f}$ has support contained in the set $\{y \geq \omega x^2 - h\}$ and is such that $\tilde{f}|_{C_{j-1}} = f|_{C_{j-1}}$. Also, supposing that $a = c$ on $C_{j-1} \setminus C_j$, we set \[ \tilde{a} = \left \{ \begin{array}{ll} \tilde{a}(x,y) = a(x,y) & (x,y) \in C_{j-1}\\ \tilde{a}(x,y) = c & (x,y) \in (\mathbb{R}^2 \setminus C_{j-1})\cap \{ y>\epsilon x^2 - h-1\}\\ \tilde{a}(x,y) = 0 & \mbox{otherwise}. \end{array} \right . \] The setup described in the last few lines is illustrated in figure \ref{parabolasetup}. Our next step is to show that we can determine $R_{\tilde{a}} \tilde{f}(s,\theta)$ if $(s,\theta)$ corresponds to a line contained in the set $\{y< \epsilon x^2\}$ given the hypotheses of the lemma. If this line does not pass through $C_{j-1}$, then there is no problem since we know $\tilde{f}$ and $\tilde{a}$ outside of $C_{j-1}$. Suppose on the other hand that the line does pass through $C_{j-1}$, and let the two points of intersection between the line and $\partial C_{j-1}$ be denoted $t_1<t_2$ (note there will always be two such points by convexity and these can be determined from $C_j$). We then have \[ \begin{split} R_af(s,\theta) & = \int_{-\infty}^{t_1} f(s\theta_\perp + t \theta) e^{-Da(s \theta_\perp + t \theta,\theta)} \ \mathrm{d} t + \int_{t_1}^{t_2} f(s\theta_\perp + t \theta) e^{-Da(s \theta_\perp + t \theta,\theta)} \ \mathrm{d} t \\ & \hskip1cm + \int_{t_2}^{\infty} f(s\theta_\perp + t \theta) e^{-Da(s \theta_\perp + t \theta,\theta)} \ \mathrm{d} t. \end{split} \] The first and third terms on the right side of the last equation only involve $a|_{\mathbb{R}^2 \setminus C_{j}}$ and $f|_{\mathbb{R}^2 \setminus C_{j-1}}$ as well as $t_1$ and $t_2$, and thus are known functions of $(s,\theta)$ under the given hypotheses. We combine these together, and also $R_a f$, into one function $G(s,\theta)$, and so, since also $f |_{C_{j-1}} = \tilde{f} |_{C_{j-1}}$, we have \[ \int_{t_1}^{t_2} \tilde{f}(s\theta_\perp + t \theta) e^{-Da(s \theta_\perp + t \theta,\theta)} \ \mathrm{d} t = G(s,\theta) \] where $G$ is a function which can be determined from the known information. Next note that for $t \in (t_1,t_2)$, $F = -Da(s \theta_\perp + t \theta,\theta) + D\tilde{a}(s \theta_\perp + t \theta,\theta)$ only depends on $s$ and $\theta$, and can be determined under the hypotheses. Therefore we have \[ \int_{t_1}^{t_2} \tilde{f}(s\theta_\perp + t \theta) e^{-D\tilde{a}(s \theta_\perp + t \theta,\theta)} \ \mathrm{d} t = e^{-F(s,\theta)} G(s,\theta). \] Finally, we can add back in the integrals with $\tilde{f}$ and $\tilde{a}$ from $-\infty$ to $t_1$ and $t_2$ to $\infty$ since these only involve $\tilde{a}|_{\mathbb{R}^2 \setminus C_{j}}$, and $\tilde{f}|_{\mathbb{R}^2 \setminus C_{j-1}}$ which are assumed to be known. Doing this we see that $R_{\tilde{a}} \tilde{f}$ can be determined given the hypotheses. The problem has now been reduced to determining $\tilde{f} |_{C_{j-1} \cap \{y<0\}}$. \begin{figure} \begin{center} \begin{tikzpicture}[scale=.6] \draw[black,thick,<->](-1,10.5)--(11,10.5); \draw[black,thick,<->](5,5)--(5,18); \node at (11.3,10.4){$x$}; \node at (5.2,18.3){$y$}; \draw [gray,thick] plot [smooth cycle] coordinates{(2,13) (5,11) (8,13) (5,16)}; \draw[gray,thick] plot [smooth cycle] coordinates{(0,11) (5,7)(9,10.5)(8,16)(3,17)}; \draw[black,thick,dashed] plot[smooth] coordinates {(-1,12.3)(1,11.3)(3,10.7)(5,10.5)(7,10.7)(9,11.3)(11,12.3)}; \draw[black,thick,dashed] plot[smooth] coordinates {(-1,7.3)(1,6.3)(3,5.7)(5,5.5)(7,5.7)(9,6.3)(11,7.3)}; \node at (11,5.8){$y=\epsilon x^{2}-h$}; \node at (11,13){$y=\epsilon x^{2}$}; \draw[black,thick,dashed] plot[smooth] coordinates{(-1,12.3)(1,8.52)(3,6.26)(5,5.5)(7,6.26)(9,8.52)(11,12.3)}; \node at (11.6,9.6){$y=\omega x^{2}-h$}; \node at (7,9.2){$C_{j-1}$}; \node at (6.5,12.3){$C_j$}; \draw[thick,black,dashed] plot coordinates{(-1,9)(11,7.7)}; \node at (-2.4,9){$y = kx + l$}; \end{tikzpicture} \caption{This illustrates the setup and some of the notation used in the proof of Lemma \ref{lem:f}. Note that we assume $a = c$ in the region $C_{j-1} \setminus C_j$, and $\tilde{a} = c$ in the region above the lowest parabola translated downwards by $1$ and outside of $C_j$. $f$ is assumed to be known outside of $C_{j-1}$, and then $\tilde{f}$ is supported in the region above the middle parabola.} \label{parabolasetup} \end{center} \end{figure} Our final step is to change variables in order to reduce the problem to the one considered in \cite[Theorem 3.1]{Bukgeim}. For this we consider only $R_{\tilde{a}}\tilde{f}(s,\theta)$ for $(s, \theta)$ corresponding to lines contained in $\{y< \epsilon x^2\}$. We reparametrise such lines using $y = kx + l$ where the slope $k$ and intercept $l$ replace $\theta$ and $s$ respectively. We will also write $x_+(k,l) = \frac{k + \sqrt{k^2 + 4\epsilon (l+h+1)}}{2\epsilon}$ for the larger value of $x$ at which $\{y = kx + l\}$ intersects $\{ y = \epsilon x^2 - h-1\}$. When we parametrise the lines in this way, the beam transform becomes \[ D\tilde{a}((x,kx+l),k) = \int_0^\infty \tilde{a}(x+s,k(x+s) + l)\sqrt{1+k^2} \ \mathrm{d} s = c(x_+(k,l) - x) \sqrt{1+k^2} \] and so the AtRT becomes \[ R_{\tilde{a}} \tilde{f}(k,l) = \int_{-\infty}^\infty \tilde{f}(x,kx+l) e^{c (x - x_+(k,l))\sqrt{1+k^2}} \sqrt{1+k^2} \ \mathrm{d} x. \] We now introduce the new coordinates $(z,w)$ defined by $z = \sqrt{\epsilon} x$ and $w = y - \epsilon x^2 + h$. With this change, the region $\{\epsilon x^2 > y > \epsilon x^2 - h\}$ becomes the strip $\{h>w> 0\}$, and abusing notation slightly by writing $\tilde{f}$ also for the same function in these coordinates the AtRT becomes \[ R_{\tilde{a}} \tilde{f}(k,l) = \int_{-\infty}^\infty \tilde{f}\left (z,-\left (z-\frac{k}{2 \sqrt{\epsilon}}\right )^2 + \frac{k^2}{4 \epsilon} + l - h \right ) e^{c (\sqrt{\epsilon} z - x_+(k,l))\sqrt{1+k^2}} \sqrt{\epsilon (1+k^2)} \ \mathrm{d} z \] for any $(k,l)$ corresponding to a line contained in $\{y<\epsilon x^2\}$ and passing through the region $\{ y > \epsilon x^2 - h\}$. The uniqueness of $\tilde{f}$ in the region $\{y<\epsilon x^2\}$, and therefore also $f$ in the same region, now follows from \cite[Theorem 3.1]{Bukgeim} since we have that \[ a = e^{c (\sqrt{\epsilon} z - x_+(k,l))\sqrt{1+k^2}} \sqrt{\epsilon (1+k^2)} \] is an analytic function of $k/(2\sqrt{\epsilon})$ and $z$ provided the imaginary part of $k$ is sufficiently small. \end{proof} \noindent Lemma \ref{lem:f} now allows us to complete the proof of Theorem \ref{thm2}. Indeed, the induction step is already proved as described just above the lemma. The base case is also included in Lemma \ref{lem:f} since we can determine the set $C_0$ as in the lemma by looking at the support of $R_af$, and then we always know $f|_{\mathbb{R}^2 \setminus C_0} = 0$ and $a|_{\mathbb{R}^2 \setminus C_1} = 0$. This completes the proof of Theorem \ref{thm2}. \section{Numerical method} \label{sec:nummethod} We now turn our attention to numerically recovering $a$ and $f$ from data. We begin by first outlining how we discretize the domain. Let $\Omega$ be the domain of interest, and split $\Omega$ into $M^{2}$ square pixels of resolution $\mathrm{d}x$. We order the pixels lexicographically from the top left to the bottom right. We then assume that $a$ and $f$ are piecewise constant over each pixel. Recall that for an oriented line given by $(s,\theta)$ we define the AtRT via \begin{equation}\label{discretepart} R_{a}f(s,\theta)=\int_{-\infty}^{\infty}\!f(s\theta^{\perp}+t\theta)e^{-Da(s\theta^{\perp}+t\theta,\theta)}\,\mathrm{d}t \end{equation} where $s$ is the signed closest approach to the origin and $\theta$ is a unit direction tangent to the line and giving the orientation. Since $a$ and $f$ are piecewise constant on the pixels, we can evaluate \eqref{discretepart} exactly as follows. Let $P$ be a list of the pixels passed, in the order in which they are passed, along the oriented line and denote the length of $P$ by $N$. Note for this to be well-defined we need the ray to be oriented. Let $K$ be the ordered set of $t$ values which correspond to an intersection with an edge of a pixel in the grid and let $IT$ be the set of distances between adjacent entries in $K$. Using this notation we find \begin{equation}\label{DAtRT} R_af(s,\theta)=\sum_{i=1}^{N}f_{P(i)}IT(i)e^{-\frac{IT(i)a_{P(i)}}{2}}\mathrm{sinhc}\left(\frac{IT(i)a_{P(i)}}{2}\right)S(i). \end{equation} where $a_{P(i)},f_{P(i)}$ are the values of $a$ and $f$ in the $P(i)$th pixel, \begin{equation}\label{di} \mathrm{sinhc}(z)=\begin{cases} \hfill \frac{\mathrm{sinh}({z})}{{z}}\hfill & { z \neq 0}\\ \hfill 1 \hfill & { z=0}\\ \end{cases} \end{equation} and $S(N)=1$, $S(i-1)=S(i)e^{-IT(i)a_{P(i)}}$. This allows us to rewrite the AtRT as a vector equation involving $a$ and $f$. If we are given data vector $d$ for a set $\mathcal{I}$ of oriented lines $(s_{i},\theta_{i})_{i\in\mathcal{I}}$ then we can combine all of these vector equations into a matrix equation \begin{equation} \label{eq:discrete} R[a]f=d. \end{equation} The discretised problem of interest is then to determine both $a$ and $f$ from $d$ given by \eqref{eq:discrete} where $a$ is multi-bang with the admissible set $\mathcal{A} = \{a_0,a_1,...,a_n\}$ known (note that for notational convenience we have reindexed the admissible values relative to Definition \ref{def:multibang}). We attempt to do this by solving the variational problem \begin{equation}\label{variationalproblem} \mathrm{argmin}_{a,f}\mathcal{R}(a,f):=\|R[a]f-d\|^{2}+\alpha\mathcal{M}(a)+\lambda\mathrm{TV}(a)+\eta\mathrm{TV}(f) \end{equation} where $\mathrm{TV}$ is a discrete version of the total variation and $\mathcal{M}$, which will be described below, is used to enforce the multi-bang assumption. The known set of admissible attenuation values is $A:=\{a_0,a_1,...,a_n\}$ with $a_{0}<a_1<...<a_n$. Recent work in \cite{MB,MBorig} attempted to design a convex regularizer to promote multi-bang solutions when the admissible set is known. The original idea in \cite{MB} was to make a convex penalty with jumps in gradient at admissable values. In this paper we instead use a modified, non-convex, version of the multi-bang penalty given by \begin{equation}\label{globalMB} \mathcal{M}(a):=\int_{\Omega}m(a(x))\mathrm{d}x \end{equation} where \begin{equation}\label{multibang} m(t)= \left \{ \begin{array}{cl} (a_{i+1}-t)(t-a_{i}), & t\in[a_{i},a_{i+1}]\\ \infty, &\mathrm{otherwise}. \end{array} \right . \end{equation} Compared to the convex multi-bang penalty from \cite{MB}, this has the advantage of giving a proximal map which has multi-bang values as stationary points. Note that in the discrete case we consider piecewise constant $a$ and so \eqref{globalMB} is really a sum over pixels given by \begin{equation}\label{discreteMB} \mathcal{M}(a):=\sum_{i=1}^{M^{2}}m(a(i)). \end{equation} Strictly speaking \eqref{discreteMB} should have a factor of $\mathrm{d}x^2$ in front of the summation but this gets absorbed by the regularization parameter $\alpha$ and so we omit it. Although the regularizer \eqref{discreteMB} promotes multi-bang solutions it provides no spatial regularity, and so we also include total variation\cite{TV} regularization as a joint regularizer. Total variation has been widely studied and is well known to promote piecewise constant images with small perimeter\cite{TV,MB}. This combination, at least numerically, allows us to significantly reduce the number of projections required to obtain a good reconstruction. For practical implementation we use a smoothed version of the isotropic total variation \cite{TV} \begin{equation}\label{isoTVMAT} \begin{split} \mathrm{TV}_{c}(a)=&\sum_{i=1}^{M^{2}-1}\sqrt{\|D_{i}a\|^{2}_{2}+c},\\ \end{split} \end{equation} where $c>0$ is a small smoothing constant and each $D_{i}\in\mathbb{R}^{2\times M^{2}}$ is a finite difference matrix satisfying \begin{equation}\label{eq:Di} D_{i}a=\begin{cases} \begin{pmatrix}a(i)-a(i+1)\\a(i)-a(i+M)\end{pmatrix}& \mathrm{if}~1\leq i\leq M^2-M~\&~\mod(i,M)\neq 0\\ \begin{pmatrix}0\\a(i)-a(i+M)\end{pmatrix}& \mathrm{if}~1\leq i\leq M^2-M~\&~\mod(i,M)= 0\\ \begin{pmatrix}a(i)-a(i+1)\\0\end{pmatrix}& \mathrm{if}~M^2-M+1\leq i\leq M^2-1.\\ \end{cases} \end{equation} Note that the smoothness of the total variation is required in order to guarantee global Lipschitz continuity of its gradient. At this point we would like to mention that although \eqref{isoTVMAT} is convex and the non-convex multi-bang regularizer is weakly convex, we still have to be careful with the data fidelity term. It can be shown that for sufficiently large $a$, $\|R[a]f-d\|^2$ may be non-convex. Because of this we use the following alternating minimization scheme \cite{alternating} designed for non-convex objective functions \begin{equation}\label{Alternating1} \begin{split} a^{k+1}&\in\argmin_{a}\mathcal{R}(a,f^{k})+\frac{1}{2\xi^{k}}\|a-a^{k}\|^{2},\\ f^{k+1}&\in\argmin_{f}\mathcal{R}(a^{k+1},f)+\frac{1}{2\xi^{k}}\|f-f^{k}\|^{2}, \end{split} \end{equation} for sufficiently small $\{\xi_{k}\}_{k=1}^\infty$. We first turn our attention to the $a$ update. \subsection{Updating attenuation $a$} Since we only concern ourselves with parts of the objective function $\mathcal{R}(a,f)$ involving $a$, the $a$ update in \eqref{Alternating1} is equivalent to \begin{equation} \label{aupdate} a^{k+1}\in\argmin_{a}\|R[a]f^{k}-d\|^{2}+\alpha\mathcal{M}(a)+\lambda{\mathrm{TV}}_{c}(a)+\frac{1}{2\xi^{k}}\|a-a^{k}\|^{2}. \end{equation} For the purpose of solving this optimisation problem we introduce two auxiliary variables which are $x$ corresponding to $a$ itself, and $y$ corresponding to the discrete derivative of $a$. These two parts are linked by the matrix equation $$Dx=y$$ where $D$ is the finite difference matrix obtain by stacking all the $D_{i}$ defined by \eqref{eq:Di} on top of each other. We further split $y$ into a series of 2 by 1 column vectors which are linked to $x$ by the matrix equations $$D_{i}x=y_{i}.$$ Therefore, we can rewrite \eqref{aupdate} as \begin{equation}\label{admmaup} \begin{split} a^{k+1}\in&\argmin_{x}\|R[x]f^{k}-d\|^{2}+\alpha\mathcal{M}(x)+\lambda\sum_{i=1}^{M^{2}-1}\sqrt{\|y_{i}\|^{2}_{2}+c}+\frac{1}{2\xi^{k}}\|x-a^{k}\|^{2},\\ &\mathrm{subject~to}~Dx=y. \end{split} \end{equation} A standard algorithm for solving a optimization problem in the form of \eqref{admmaup} is the Alternating Direction Method of Multipliers (ADMM)\cite{addm}. In this case the augmented Lagrangian\cite{addm} is given by \begin{equation}\label{augmentedLagrangian1} \begin{split} \mathrm{L}_{\beta}(x,y,\mu)& =\sum_{i=1}^{M^{2}-1}\left(\lambda \sqrt{\|y_{i}\|^{2}_{2}+c} -{\mu}_{i}^{T}({y}_{i}-D_ix)+\frac{\beta}{2}\|{y}_{i}-D_{i}x\|^{2}\right)\\ & \hskip2cm+\|R[x]f^{k}-d\|_2^{2}+\alpha\mathcal{M}(x)+\frac{1}{2\xi^{k}}\|x-a^{k}\|^{2}. \end{split} \end{equation} where $\beta>0$ and $\mu_{i}$ are Lagrange multipliers related to $y_i$. We also define a vector $\mu$ given by placing the $\mu_i$ related to $y_i$ in the same positions in $\mu$ as the corresponding $y_i$ are in $y$. The ADMM algorithm for solving \eqref{aupdate} then proceeds as follows \begin{equation*} \begin{split} x^{l+1}&=\argmin_{x}\mathrm{L}_{\beta}(x,y^{l},\mu^{l}),\\ y^{l+1}&=\argmin_{y}\mathrm{L}_{\beta}(x^{l+1},y,\mu^{l}),\\ \mu^{l+1}&=\mu^{l}+\beta(y^{l+1}-Dx^{l+1}). \end{split} \end{equation*} Removing terms not involving $x$, we see that the $x$ update for $x^{l+1}$ can be calculated using the first order optimality condition \begin{equation*} \begin{split} 0&\in\partial_{x}\left\{ \|R[x^{l+1}]f-d\|^{2}+\frac{\beta}{2}\|y^{l}-Dx^{l+1}\|^{2}+\frac{1}{2\xi^{l}}\|x^{l+1}-a^{k}\|^{2}-\mu^{T}(y^l-Dx^{l+1})+\alpha \mathcal{M}(x^{l+1})\right\}\\ 0&\in \nabla_{x}(\|R[x^{l+1}]f-d\|^{2})+\beta D^{T}(Dx^{l+1}-y^l)+D^{T}\mu+\frac{1}{\xi^{l}}(x^{l+1}-a^{k})+\partial_{x}\alpha\mathcal{M}(x^{l+1}). \end{split} \end{equation*} where $\nabla_{x}( \|R[x^{l+1}]f-d\|^{2})$ is determined from \eqref{DAtRT} as in \cite{Phil}. Note that since the non-convex multi-bang regularizer is separable, we have the elementwise optimality condition \begin{equation} \label{eq:elwise} \begin{split} 0& \in \nabla_{x}(\|R[x^{l+1}]f-d\|^{2})(i)+\beta D^{T}( Dx^{l+1}-y^l)(i)+D^{T}\mu(i)\\ &\hskip4cm +\frac{1}{\xi^{l}}(x^{l+1}(i)-a^{k}(i))+\partial_{x}\alpha{m}(x^{l+1}(i)). \end{split} \end{equation} Now as $\nabla_{x}(\|R[x^{l+1}]f-d\|^{2})+\beta D^{T} (y^l -Dx^{l+1})+D^{T}\mu+\frac{1}{\xi^{l}}(x^{l+1}-a^{k})$ is differentiable it is Lipschitz continuous. Furthermore, as the pointwise multi-bang regularizer is weakly convex by \cite{weakconvex} the pointwise multi-bang regularizer admits a well-defined proximal map \begin{equation*} \mathrm{prox}_{\frac{1}{t}} \alpha m(x)=\begin{cases} a_{0}&\mathrm{if}~x\leq x_{0,+}\\ a_{i}&\mathrm{if}~x_{i,-}\leq x \leq x_{i,+}~\mathrm{for~}i\in\{1, 2,\ ...\ , n-1\}\\ a_{n}&\mathrm{if}~x_{n,-}\leq x\\ \frac{1}{1-2\alpha t}\bigg(x-\alpha t(a_{i+1}+a_i)\bigg)&\mathrm{if}~x_{i,+}<x<x_{i+1,-}~\mathrm{for}~i\in\{0,1,\ ...\ , n-1\} \end{cases} \end{equation*} where \begin{equation*} \begin{split} x_{i,-}&=a_i-\alpha t(a_{i}-a_{i-1})~\mathrm{for}~i=1,\ ...\ , n,\\ x_{i,+}&=a_i+\alpha t(a_{i+1}-a_{i})~\mathrm{for}~i=0,\ ...\ , n-1. \end{split} \end{equation*} $\mathcal{A}=\{a_0,a_1,\ ...\ , a_n\}$ is the admissable set and $\frac{1}{2}>\alpha t>0$. \begin{figure} \centering \includegraphics[scale=0.4]{weaklyconvexmbprox} \caption{Weakly convex proximal map}\label{weakconvex} \end{figure} Figure \ref{weakconvex} gives an example of the proximal map for the weakly convex multi-bang regularizer when the admissible set is $\mathcal{A} = \{0,\ 0.25,\ 0.5,\ 0.75,\ 1\}$. Note in particular that $\mathrm{prox}_{\frac{1}{t}}\alpha {m}(a_{i})=a_{i}$ which is in contrast to the convex case \cite{MB}. Using this we can we find $x^{l+1}$ satisfying the optimality condition \eqref{eq:elwise} via a fixed point iteration such as ISTA or FISTA \cite{FISTA}. Indeed, provided $0<\alpha t<\frac{1}{2}$ by \cite{FISTA,weakconvex} both ISTA and FISTA produce iterates which converge to a solution $x^{l+1}$ of \eqref{eq:elwise} to within any prescribed tolerance. We now turn our attention to the $y$ update. The first order optimality condition for the $y$ update gives \begin{equation}\label{yupdate} 0= \lambda\frac{y_{i}}{\sqrt{\|y_{i}\|^{2}_{2}+c}}-\mu_{i}+\beta(y_{i}-D_{i}x^{l+1}) \end{equation} for all $i$. Whilst this cannot be explicitly solved for $y_i$ easily, we can make use of the gradient on the right hand side of \eqref{yupdate} to solve the $y$ update via gradient descent. Once we have updated all of the $y_i$ in this way we can combine them to update $y$. Finally since $\|R[a]f^{k}-d\|^{2}+\alpha\mathcal{M}(a)+\lambda{\mathrm{TV}}(a)$ is lower semi-continuous and $\sum_{i=1}^{M^{2}-1}\lambda{\sqrt{\|y_{i}\|^{2}_{2}+c}}$ has Lipschitz continuous gradient, \cite{Guo} gives convergence of ADMM to a critical point; that is, both the primal residual $r^{l}:=y^{l+1}-Dx^{l+1}$ and dual resdual $s_l:=\beta D^{T}(y^{l+1}-y^{l})$ converge. Numerically we can speed up the rate of convergence of the ADMM algorithm by having an adaptive $\beta$. We use the following scheme from \cite{addm}: pick $\beta^{0}>0$ then for $l\geq 0$ define \begin{equation}\label{betaupdate} \beta^{l+1}:=\begin{cases} \hfill\tau^+\beta^{l}\hfill&\hfill\mathrm{if} \|r_{l}\|_2>\nu \|s_{l}\|_2\hfill\\ \hfill\frac{\beta^{l}}{\tau^-}\hfill&\mathrm{if} \|s_{l}\|_2>\nu \|r_{l}\|_2\\ \hfill\beta^{l}\hfill&\mathrm{otherwise} \end{cases} \end{equation} for some chosen positive $\tau^{\pm}$ and $\nu$. This completes the $a$ update section of the numerical method. We now turn our attention to updating $f$. \subsection{Updating source radiation $f$} Removing terms not involving $f$, the $f$ update satisfies \begin{equation}\label{fupdate} f^{k+1}\in\argmin_{f}\|R[a^{k+1}]f-d\|^{2}+\eta \sum_{i=1}^{M^{2}-1}\sqrt{\|D_{i}f\|^{2}_{2}+c}+\frac{1}{2\xi^{k}}\|f-f^{k}\|^{2} \end{equation} again where $c>0$ is some small smoothing constant. We find $f^{k+1}$ solving this equation via ADMM \cite{addm,Guo} in a similar way to the $a$ update. However it is simpler here because we do not have the multi-bang regularization term. The method is again proven to converge to a critical point. With both the $a$ and $f$ update dealt with we are ready to outline the joint reconstruction algorithm. \begin{algorithm}[H] \caption{Joint reconstruction algorithm}\label{jointrecon} \begin{algorithmic}[1] \State Input $a^0$ as initial guess, step sizes $t,\beta^{0}$, tolerances $\delta_{1},\delta_{2},\delta_{3},\delta_4,\delta_5$ and regularization parameters $\alpha,\lambda$ and $\mu $. \State Set $f^{0}$ to be the least squares solution of $\|R[a^{0}]f-d\|^{2}$. \For{$k\geq 0$} \State Set $x^0 = a^k$ and $y^0 = D x^0$. \For{$l\geq 0$} \State Update $x^{l+1}$ via ISTA or FISTA with $\delta_1$ as a tolerance on $\|x^{l+1}-x^{l}\|$. \State Update $y^{l+1}$ via gradient descent on \eqref{yupdate}. \State Set $\mu^{l+1}=\mu^{l}+\beta^{l}(y^{l+1}-Dx^{l+1})$. \State Update $\beta^{l+1}$ via \eqref{betaupdate} \State Terminate when $r^{l}<\delta_2$ and $s^{l}<\delta_{3}$ and output $a^{k+1} = x^{l+1}$. \EndFor \State Update $f^{k+1}$ via \eqref{fupdate} using ADMM with tolerance $\delta_4$. \State Terminate when $\|a^{k+1}-a^{k}\|_{2}<\delta_5$ and $\|f^{k+1}-f^{k}\|_{2}<\delta_5$. \EndFor \end{algorithmic} \end{algorithm} \noindent We point out that in this algorithm $\beta^0$ is reset to the same initialised value whenever the inner iterations aimed at the $a$ update in \eqref{Alternating1} (those indexed by $l$) restart. With the numerical method outlined we now present some numerical results. \section{Numerical Reconstructions} \label{sec:numex} Throughout this section we produce data on a 340 by 340 pixel grid and reconstruct on a 200 by 200 grid to avoid inverse crime. All of the following examples have $5\%$ added Gaussian white noise and were performed on a standard 4 core laptop using MATLAB. Note that much of the computational time is spent computing and recomputing the matrix representation of $R[a]$ when $a$ is updated, and many of the steps in this reconstruction can be done using parallel computing toolboxes. Unless otherwise stated the following reconstructions use 12 parallel ray projections which are equally spaced with some small perturbation to make the angles irrationally related (i.e. unless otherwise stated we only use data with 12 different values of $\theta$). Irrationally related angles have been shown to reduce the number of projections required to obtain good reconstructions\cite{chenrays,limrays}. For 12 projections the simultaneous reconstruction algorithm takes approximately 8 minutes. There are a large number of parameters to control which gives good flexibility but does require extensive parameter tuning in order to obtain optimal results. In the following examples we use initial guesses where $a$ is constant. In practice convergence is obtained for all tested phantoms for any constant initial guess of $a$, provided the constant value lies between $a_0$ and $a_n$ in the admissable set. We therefore use initial guess $a^{0}=0$ for all numerical results presented here. The last general comment we make is that if we set $\xi=\infty$, effectively removing the added terms $\|a-a^{k}\|^{2}$ and $\|f-f^{k}\|^{2}$ from \eqref{Alternating1} we still obtain convergence. In many cases removing this part improves the speed of convergence, although the theoretical proof of convergence does not hold in this case. Throughout the section we fix $\xi=50$ and set all tolerances $\delta_i$ to $1\times 10^{-3}$. \begin{figure} \caption{Numerical reconstruction with joint regularizer versus total variation alone}\label{TVfig} \includegraphics[width=\textwidth]{paperTVcomp} \end{figure} Figure \ref{TVfig} shows reconstructions obtained via an optimized parameter joint TV and multi-bang regularizer algorithm against those obtained purely by a TV approach. The left hand column gives the true phantoms for $a$ and $f$; $a$ is binary so here $\mathcal{A}=\{0,1\}$. The middle column shows the joint reconstruction for $a$ and $f$ with both TV and multi-bang regularization. Here the step sizes are $t=10$ and $\beta^{0}=0.1$. The regularization parameters are $\alpha=0.2$ and $\lambda=\eta=0.1$. The reconstruction for $a$ is multi-bang with the overall structure very well recovered. This is also seen in the reconstruction for $f$. We note that an L1 regularizer could have been used in the place of TV on $f$. In practice however TV performs much more favourably in removing cross talk-artefacts which are common in these types of joint reconstructions\cite{Bukgeim,Quinto,GourionNoll}. The right hand column is an optimized parameter reconstruction obtained using just TV with 80 projections. In this case both the binary nature and the structure of $a$ are lost, even with the extra data. This can also be seen in the recovery of $f$; the structure is roughly recovered but there are several ring artefacts appearing in the reconstruction. \begin{figure} \caption{Numerical reconstructions showing effect of the number of projections used }\label{projection} \includegraphics[width=\textwidth]{paperprojectioncomp} \end{figure} Figure \ref{projection} shows the effect of the number of projections on reconstruction quality. Here the phantom is made up of 3 regions with $\mathcal{A}=\{0,0.5,1\}$. The left column shows the true phantoms for $a$ and $f$. The middle column is an optimized reconstruction using 6 projections with $\alpha=0.1$ and $\lambda=\eta=0.05$. The right column shows an optimized reconstruction using 12 projections with $\alpha=0.1,\lambda=0.05$ and $\eta=0.15$. In both reconstructions for $a$ we obtain multi-bang solutions. The middle column shows a poor recovery of the structure of $a$ and $f$. The recovered $a$ has a lot of misclassification and has been unable to separate the regions. The inaccuracies in $a$ have an impact on the recovery of $f$, with the outer most regions of $f$ being poorly recovered. The rightmost column is a very good recovery of both $a$ and $f$, with just a small section on the left bracket being misclassified. The matching $f$ is also very well recovered. Although the smoothed TV regularization removes cross talk artefacts it is important not to use too large $\eta$ as this removes the continuous nature of $f$ at the edges. We also remark that there is no significant improvement in the quality of the reconstruction if we increase the number of projections further. \begin{figure} \caption{Graph of percentage multi-bang pixels at each iteration}\label{mbvaluegraph} \begin{center} \includegraphics[scale=0.2]{papermbprop} \end{center} \end{figure} Figure \ref{mbvaluegraph} shows a plot of the proportion of pixels taking admissible values against outer iteration number (that is $k$ in Algorithm \ref{jointrecon}) for the rightmost reconstruction of $a$ in Figure \ref{projection}. The initial guess is $a^0$ constant at 0, which is why the initial proportion is 1. The proportion increases monotonically after about 20 iterations with some large jumps before this point. These typically line up with $\beta^{l+1}$ being either increased or decreased in the inner iterations. This graph is typical for reconstructions presented here and suggests that another suitable stopping criteria would be to terminate after a certain proportion of admissible values is reached. Typically a convergent reconstruction has a multi-bang proportion of over 0.95 by the time the algorithm is terminated by the step size tolerances. \begin{figure} \centering \caption{Numerical reconstructions showing the effect of shrinking the size of $\mathrm{supp}(f)$.}\label{fshrink} \includegraphics[width=.8\textwidth]{papersizefcomp} \end{figure} Figure \ref{fshrink} shows the effect of shrinking the size of the support of $f$ on reconstruction. This is linked to the proof of uniqueness from Theorems 1 and 2, where we require $f$ to be non-zero on a sufficient number of rays tangent to the jumps in $a$. Here the true $a$ is a multi-bang version of the Shepp-Logan phantom, with admissable set $\mathcal{A}=\{0,0.2,0.3,0.4,1 \}$. The step sizes are $t=0.075$ and $\beta^{0}=0.1$ and regularization parameters are $\alpha=0.1,\lambda=0.05$ and $\eta=0.15$ for each reconstruction. The top row shows reconstructions of $a$ with fixed and known true $f$ in the bottom row. The reconstruction algorithm here is then performed by simply performing one update for $a$. The rightmost reconstruction captures the shape and classifies almost all pixels correctly; most importantly it captures the smallest regions well. Note here that as in Theorem 1 and 2 $f$ has a larger support than $a$. It is possible to obtain reconstructions similar to that of the rightmost recovery for $f$ which have a slightly smaller support than $a$. The 2nd column from the right also has a decent shape recovery but has lost some of the finer features such as the ellipses at the bottom. The 2nd column from the left does a poor job of the recovery of $a$ with very few pixels correctly classified as $1$. The high valued outer ellipse is lost and all the finer details are missing. This is a similar effect to reducing the number of projections, which could be expected as reducing $f$ leads to fewer rays contributing data per projection. We can however still see some detail outside of the support of $f$, this is due to TV being able to fill in the gaps and extend our visibility. The angled straight edges in the reconstruction are related to the angles of the projections in the data set. \begin{figure} \caption{Numerical reconstruction of walnut phantom for $a$ with 30 projections}\label{walnut} \includegraphics[width=\textwidth]{paperwalnut} \end{figure} The final numerical result we present in Figure \ref{walnut} is obtained using an image of a walnut reconstructed from CT data by the Finnish Inverse Problems Society \cite{finnish} as the attenuation map. The walnut phantom for $a$ is binary and so $\mathcal{A}=\{0,1\}$. Here the step sizes are $t=0.05$ and $\beta^{0}=0.2$ and the regularization parameters are $\alpha=0.2,\lambda=0.1$ and $\eta=0.15$. The left hand column is the true $a$ and $f$ and the right hand column the reconstruction. In general the larger structures of $a$ are recovered but the finer details are lost. This is still true even if the number of projections is upped significantly. This is in part due to the detail being compressed going from 340 by 340 to 200 by 200 pixels and the TV regularizer eliminating the smallest non-zero regions. The larger sections are well-recovered and the outermost boundary is very well classified. The reconstruction for $f$ is again good with the areas towards the boundaries being the areas most affected by the errors in $a$. There are no cross-talk artefacts present, even with the more complicated $a$. \section{Conclusion} In this paper we have presented and proved two theorems on the identification problem for SPECT involving multi-bang attenuation. In particular, for nicely multi-bang $a$ and $f \in C_c^1(\mathbb{R}^2)$ non-negative with sufficiently large support we have shown uniqueness of joint recovery for the AtRT. The method of proof for these theorems gives possible methods to produce similar results with further relaxed conditions on $a$ and $f$, and we intend to investigate this in future work. On the numerical side, we have formulated a variational problem including a weakly convex version of the convex multi-bang regularizer\cite{MB,MBorig} and a smoothed total variation, and presented an algorithm for simultaneous recovery of $a$ and $f$ from the resulting variational problem \eqref{variationalproblem}. Using an alternating direction approach for non-convex objective functions \cite{alternating} coupled with ADMM\cite{addm} we are able to successfully solve these variational problems. The addition of a joint multi-bang and total variation regularizer has produced good results for joint recovery with projection numbers similar to those used in the X-Ray recovery case when the image is known to have only a finite number of values \cite{chenrays,limrays}. The apparent convergence of the algorithm even in the case $\xi_k = \infty$ in all cases we have investigated, and also independent of the smoothing parameter $c$ for the total variation presents theoretical questions for future work. Also, even though the variational problems on which our method is based are non-convex, our algorithm consistently converges to a reasonable approximation for the correct solution. This suggests we may actually be finding the global minimiser, or be getting close to the global minimiser, and there is potential for future research investigating whether this is indeed correct. Finally, the numerical examples shown in Figure \ref{fshrink} indicate that we are able to obtain good recovery for $a$ even when the support of $f$ is smaller than required in our theoretical results. We suspect that the total variation may be playing a role in filling in the boundaries of regions of constant $a$, and would like to investigate this further as well.
\section{Introduction}\label{intro} We consider the abelian stochastic sandpile model on the integer line and obtain a uniform lower bound on the critical density threshold for its absorbing state phase transition. The stochastic sandpile model is a continuous time particle system on a finite or infinite graph, where the number of particles at a site $x$ is denoted by $\eta(x)$. An integer $k$ is specified and a site $x$ is declared \emph{unstable} when $\eta(x) \geqslant k$. Each unstable site $x$ \emph{topples} at rate $1$, sending $k$ of its particles to neighbours chosen independently according to a specified probability distribution. Our work focuses on the case $k = 2$. This abelian variation of Manna’s model~\cite{Manna91} is frequently considered in the physics and mathematics literature. We let $0 < q < 1$ denote the probability that each particle at $x$ is sent to $x-1$, so that $1-q$ is the probability with which it is sent to $x+1$. It was shown in~\cite{RollaSidoravicius12} that the critical density for this dynamics is positive, bounded from below by $q(1-q)$. In this paper we improve the analysis of~\cite{RollaSidoravicius12} and obtain a uniform lower bound of $\frac{1}{2}$ for every $0 < q < 1$. In \S\ref{background} below, we discuss physical motivation, related models and existing literature on these topics. In \S\ref{model}, we describe the model in detail and state the main result, and in \S\ref{proof_method:sec}, we discuss the main ideas involved in the proof of the result. In \S\ref{toppling_properties:sec} we state combinatorial properties of the sandpile dynamics in its particle-wise construction. In \S\ref{half_toppling:sec} we describe the stabilization strategy that is at the core of our proof. In \S\ref{half_toppling:subsec}, we define the \emph{half-toppling} operation; in \S\ref{traps:subsec}, we describe the setting of traps where the particles will ultimately be settled; in \S\ref{success_fixation:subsec}, we show that a successful execution of the stabilization strategy will imply that the system is in absorbing phase. Finally, in \S\ref{main:sec}, we show that the stabilization strategy succeeds with positive probability. \subsection{Background}\label{background} Stochastic sandpile models are an important example within a wide class of driven-dissipative lattice systems that naturally evolve to a critical state. Such systems are attracted to a critical equilibrium distribution without being specifically equipped with a tuning parameter for which a phase transition is observed. Some of the related models that can be found in the literature are \emph{abelian networks}, including \emph{oil and water model} and \emph{abelian mobile agents}~\cite{BondLevine16,BondLevine16a,BondLevine16b} and \emph{activated random walks}~\cite{Shellef10, AmirGurel-Gurevich10, CabezasRollaSidoravicius14, StaufferTaggi18, RollaTournier18, Taggi16, Taggi19, AsselahSchapiraRolla19, DickmanRollaSidoravicius10, Rolla19}. The latter is a special case of a class introduced by F. Spitzer in the 1970s. All these models involve strong non-locality of correlations and dynamic long-range effects, and the theory of \emph{self-organized criticality} attempts to justify this behaviour~\cite{Dhar99, Dhar06, Hinrichsen00}. The original models of self-organized criticality were defined on finite lattices. Consider the dynamics defined in a finite box in $\mathbb{Z}^{d}$. Whenever a particle moves to the exterior of the box, it is eliminated from the system. This is termed as \emph{dissipation}. Under this rule, since the box is finite, the system reaches an absorbing state after a finite time. At this point, a new particle is added uniformly randomly to the box. This is termed as \emph{driving}. This could destabilize the chosen site and possibly the entire box. The dynamics will then continue until a stable configuration is reached again. In this setting, the chain reactions or avalanches provoked by a single toppling are believed to display power law distributions at equilibrium and motivate the conjecture that they feature a critical behaviour. These models are termed \emph{driving-dissipation models} (DDM). In order to explain how the operations of driving and dissipation drift spontaneously towards criticality, a conservative lattice gas model known as the \emph{fixed energy sandpile} (FES) has been studied in~\cite{MunozDickmanPastor-SatorrasVespignaniZapperi01}. Simulations indicate that the FES model undergoes a phase transition at a critical density $\zeta_{c}$. For energy densities below $\zeta_{c}$, the FES goes to an absorbing state, and for densities above $\zeta_{c}$, it is in the active phase. This behaviour is similar to that exhibited in DDM models, where particles being gradually introduced are accommodated for inside the box as long as the density inside it remains below $\zeta_{c}$, leading to increases in the density. On the other hand, when the density is above $\zeta_{c}$, the toppling activity as well as dissipation at the boundary continue, bringing down the density. Many interacting particle systems, such as cellular automata and rotor networks, studied in statistical physics and combinatorics, have an underlying abelian property which guarantees that the order of the interactions has no effect on the final state of the system. Common techniques that have been used to study such systems include the least action principle, local-to-global principles, burning algorithm, transition monoids and critical groups. A generalization of rotor networks and abelian sandpiles, known as the \emph{height arrow model}, has been studied in~\cite{PriezzhevDharDharKrishnamurthy96, DartoisRossin04}. The version of stochastic sandpile models that we study in this paper is particularly influenced by the generalizations explored in~\cite{DiaconisFulton91} and~\cite{Eriksson96}. Yet another generalization of sandpiles is the oil and water model, where each edge of the graph is marked as an \emph{oil edge} or \emph{water edge}, and two types of particles, the oil ones and the water ones, are considered. A vertex topples only if sufficient numbers of \emph{both} types of particles are present, sending one oil particle along each outgoing oil edge and one water particle along each outgoing water edge. Stochastic versions of the oil and water model have been studied in~\cite{AlcarazPyatovRittenberg09} and~\cite{CandelleroGangulyHoffmanLevineothers17}. We mention here that the \emph{deterministic sandpile model} has also been studied in the physics literature, forming a universality class of its own, exhibiting strong non-ergodic effects. The toppling procedure is unable to eliminate certain microscopic symmetries in the configuration by the time the system becomes unstable, due to the existence of several toppling invariants in this model. The stationary state in deterministic sandpile models is uniform over a special subset of configurations exhibiting combinatorial properties and a well-studied algebraic structure. In stochastic sandpile models, by contrast, the driving-dissipation operations are themselves random, leading to a set of coupled polynomial equations~\cite{SadhuDhar09} and so few rigorous results regarding phase transitions in these models are known. As noted in~\cite{RollaSidoravicius12}, the main questions that are pursued in this field are the attempts to understand the critical behaviour, the scaling relations and critical exponents, and whether the critical density $\zeta_{c}$ is the same as the asymptotic limit $\zeta_{s}$ observed in finite DDM systems at equilibrium as the size of the box grows. The critical behaviour of stochastic sandpiles seems to belong to the same universality class as the depinning of a linear elastic interface subject to random pinning potentials, roughly depicted by a nailed carpet being detached from the floor by an external force of critical intensity, where the rupture of each nail induces other ruptures nearby, giving rise to avalanches~\cite{Dickman02}. We discuss a few more notable results. In~\cite{SidoraviciusTeixeira17}, the existence of an absorbing phase is established for different models, including stochastic sandpile and activated random walks, for any dimension $d$, along with quantitative results on expected time of absorption and warm-up phase of the DDM models. In~\cite{FeyMeester15}, a discrepancy between stationary density and transitive density is shown to exist in a ``quenched'' version of Manna's sandpile model. \subsection{Description of the stochastic sandpile model} \label{model} We describe the \emph{stochastic sandpile model} (abbreviated henceforth as SSM) on $\mathbb{Z}$. At time $t$, the \emph{configuration} of this model is given by the (random) tuple $\eta_{t} = (\eta_{t}(x): x \in \mathbb{Z}) \in (\mathbb{N}_{0})^{\mathbb{Z}}$, where $\eta_{t}(x)$ is the random variable indicating the number of particles at site $x$ at time $t$. We assume that the distribution $\nu$ of the initial configuration $\eta_{0}$ of the particles is given by i.i.d.\ random variables $\eta_{0}(x)$ for $x \in \mathbb{Z}$ such that $\E[\eta_{0}(0)] = \zeta$. We let $\mathbb{P}^{\nu}$ denote the law of the stochastic process $\{\eta_{t}: t \geqslant 0\}$. We call a site $x \in \mathbb{Z}$ \emph{stable} at time $t$ if $\eta_{t}(x) \leqslant 1$, otherwise \emph{unstable}. Each unstable site $x$ \emph{topples} according to a Poisson clock, independent of all other sites, sending $2$ of the particles at $x$ to neighbours $y$ and $z$ of $x$ chosen independently with transition kernel $p(-1) = q$ and $p(1) = 1-q$ for some fixed $q \in [0,1]$. Formally, we can describe this process as follows: given any configuration $\eta \in (\mathbb{N}_{0})^{\mathbb{Z}}$, for each $x \in \mathbb{Z}$, the transition $\eta \rightarrow \toppling_{x,y} \toppling_{x,z} \eta$ happens at rate $A(\eta(x)) p(y-x) p(z-x)$, where \[ \toppling_{x,y}\eta(z) = \begin{cases} \eta(x)-1 & \text{if } z = x,\\ \eta(y)+1 & \text{if } z = y,\\ \eta(z) & \text{otherwise,} \end{cases} \] the indicator function $A(k) = \1_{k \geqslant 2}$ indicates whether the site is unstable or not, and $p(-1) = 1 - p(+1) = q$ and $p(z) = 0$ for all $z \neq \pm 1$. We say that the system \emph{locally fixates} if every site $x$ is visited only finitely many times by the particles and eventually becomes stable, i.e.\ $\eta_{t}(x)$ is eventually constant for each $x$; otherwise we say that the system \emph{stays active}. \begin{theorem}\label{main} Consider the above-described dynamics of the stochastic sandpile model, with the distribution of the initial configuration $\eta_{0}$ given by i.i.d.\ random variables $\eta_{0}(x)$ for all $x \in \mathbb{Z}$ with $\E[\eta_{0}(0)] = \zeta$. If $\zeta < \frac{1}{2}$, then the system locally fixates almost surely. \end{theorem} \subsection{About the proof method} \label{proof_method:sec} We recall the argument used in~\cite{RollaSidoravicius12} to prove that $\zeta_c \geqslant \frac{1}{4}$ for $q = \frac{1}{2}$ (or $\zeta_c \geqslant q(1-q)$ in general) and comment on the new ideas introduced here to get a uniform bound $\zeta_c \geqslant \frac{1}{2}$ for all $0<q<1$. The argument builds upon the \emph{site-wise representation}, which focuses on the total number of jumps rather than the order in which they occur. Then one introduces the \emph{half-toppling} operation whereby stable particles that would otherwise remain still can be forced to move. This new framework is related to the original representation for an appropriate definition of stability: sites which have been half-toppled an odd number of times are deemed unstable if they contain at least one particle. A key property is that half-toppling stable sites cannot decrease the amount of activity in the system. With this tool at hand, a typical tool to study fixation vs.\ activity is to specify a \emph{toppling procedure}: an explicit choice of which site should be toppled next, possibly after a preliminary stage where some bits of the underlying randomness are examined. A toppling procedure is good if its analysis can yield good estimates. In~\cite{RollaSidoravicius12}, an explorer is launched from each particle's position and finds a suitable \emph{trap} for that particle. To keep the outcome of each explorer independent of previous ones, the procedure only uses properties intrinsic to the current exploration when setting up the trap, in a way that neither depends on the randomness exposed in previous steps, nor reveals any information which could affect the conditional distribution of subsequent steps. The novelty here is that, instead of keeping the randomness completely hermetic between different steps, on the contrary we consider the parity at each site resulting from the passage of \emph{all previous explorers}. We observe that the field of parities becomes roughly independent, with probabilities approximately $ \frac{1}{2} $. This way, the trap can be set up using properties of the current explorer's trajectory combined with parity considerations. \section{Site-wise representation}\label{toppling_properties:sec} In order to define the random topplings, we start with a set of mutually independent random instructions $\mathscr{I} = (\toppling^{x,j}: x \in \mathbb{Z}, j \in \mathbb{N})$ where, for each $j \in \mathbb{N}$, the random variable $\toppling^{x,j}$ equals $\toppling_{x,x-1}$ with probability $q$ and $\toppling_{x,x+1}$ with probability $1-q$. We make $\mathscr{I}$ independent of the initial configuration $\eta_{0}$, and we let $\Prob^{\nu}$ denote the joint law of $(\eta_{0}, \mathscr{I})$. The coordinate $h(x)$ of the \emph{odometer} tuple $h = (h(x): x \in \mathbb{Z})$ denotes the number of topplings that have occurred at $x$ \emph{so far}. The toppling operation at a site $x$ that is unstable under a given configuration $\eta$, is defined by $\Phi_{x}(\eta, h) = (\toppling^{x, 2h(x)+2} \toppling^{x, 2h(x)+1} \eta, h + \delta_{x})$, where \[ (h + \delta_{x})(y) = \begin{cases} h(x) + 1 & \text{if } y = x,\\ h(y) & \text{otherwise.} \end{cases} \] We let $h = \mathbf{0}$ indicate $h(y) = 0$ for all $y \in \mathbb{Z}$. We abbreviate $\Phi_{x}(\eta, \mathbf{0})$ as $\Phi_{x} \eta$. The toppling operation $\Phi_{x}$ at $x$ is termed \emph{legal} for a configuration $\eta$ when $x$ is unstable, i.e.\ when $\eta(x) \geqslant 2$, and \emph{illegal} otherwise. In the actual dynamics, illegal topplings do not occur. In the rest of this section, the toppling instruction $\toppling^{x, j}$ is fixed and known for every site $x \in \mathbb{Z}$ and every $j \in \mathbb{N}$, and no randomness is involved. Given a sequence $\alpha = (x_{1}, x_{2}, \ldots, x_{k})$ of sites, we denote by $\Phi_{\alpha} = \Phi_{x_{k}} \Phi_{x_{k-1}} \cdots \Phi_{x_{2}} \Phi_{x_{1}}$ the composition of the topplings at the sites $x_{1}, x_{2}, \ldots, x_{k-1}, x_{k}$, in that order. We call $\Phi$ \emph{legal} for a configuration $\eta$ if $\Phi_{x_{1}}$ is legal for $\eta$ and $\Phi_{x_{\ell}}$ is legal for $\Phi_{(x_{1}, \ldots, x_{\ell-1})} \eta$ for each $\ell = 2, \ldots, k$. In this case we call $\alpha$ a \emph{legal sequence} of topplings for $\eta$. We define \begin{equation}\label{m_defn} m_{\alpha} = (m_{\alpha}(x): x \in \mathbb{Z}), \quad \text{where} \quad m_{\alpha}(x) = \sum_{\ell=1}^{k} \1_{x_{\ell} = x} \end{equation} to be the field that indicates the number of times a site $x$ is toppled in the sequence $\alpha$, for each $x \in \mathbb{Z}$. Henceforth, given any two fields $\gamma = (\gamma_{x}: x \in \mathbb{Z})$ and $\gamma' = (\gamma'_{x}: x \in \mathbb{Z})$, we define $\gamma \geqslant \gamma'$ if, for every $x \in \mathbb{Z}$, we have $\gamma(x) \geqslant \gamma'(x)$. Given a finite subset $V$ of $\mathbb{Z}$ and a configuration $\eta$, we say that $\eta$ is \emph{stable inside} $V$ if every site $x \in V$ is stable in $\eta$, i.e.\ $\eta(x) \leqslant 1$ for each $x \in V$. Given a toppling sequence $\alpha = (x_{1}, x_{2}, \ldots, x_{k})$, we say that $\alpha$ is \emph{contained in $V$} if $x_{\ell} \in V$ for all $\ell = 1, \ldots, k$. We say that $\alpha$ \emph{stabilizes} a given configuration $\eta$ in $V$ if every site $x \in V$ is stable in $\Phi_{\alpha}\eta$. We refer to [\cite{RollaSidoravicius12}, Lemmas 1, 2 and 3] for the following lemmas: \begin{lemma}\label{least_action_principle} If $\alpha$ and $\beta$ are both legal sequences of topplings for a configuration $\eta$, the sequence $\beta$ is contained in a finite subset $V$ of $\mathbb{Z}$ and $\alpha$ stabilizes $\eta$ in $V$, then $m_{\beta} \leqslant m_{\alpha}$. \end{lemma} \begin{lemma}\label{abelian_toppling} Given a finite subset $V$ of $\mathbb{Z}$, a configuration $\eta$, and two toppling sequences $\alpha$ and $\beta$ that are legal for $\eta$, contained in $V$ and stabilizing $\eta$ in $V$, we have $m_{\alpha} = m_{\beta}$. \end{lemma} This lemma allows us to define $m_{V, \eta} = m_{\alpha}$ for any toppling sequence $\alpha$ that is legal for $\eta$, contained in $V$ and stabilizes $\eta$ in $V$. \begin{lemma}\label{monotonic_toppling} If $V$ and $V'$ are two finite subsets of $\mathbb{Z}$ with $V \subseteq V'$, and $\eta$ and $\eta'$ are two configurations with $\eta \leqslant \eta'$, then $m_{V, \eta} \leqslant m_{V', \eta'}$. \end{lemma} Due to this monotonicity result, choosing \emph{any} sequence $\{V_{n}\}_{n \in \mathbb{N}}$ of monotonically increasing finite subsets of $\mathbb{Z}$, i.e.\ $V_{n} \uparrow \mathbb{Z}$, we can define the limit $m_{\eta} = \lim_{n \rightarrow \infty} m_{V_{n}, \eta}$, and this limit does not depend on the particular sequence of subsets chosen. The following result, used in this paper to establish fixation when $\zeta < \frac{1}{2}$, is Lemma 4 of~\cite{RollaSidoravicius12}. Recall $\nu$, $\mathscr{I}$, $\mathbb{P}^{\nu}$ and $\Prob^{\nu}$ from discussions above. \begin{lemma}\label{m(0)_finite} Let $\nu$ be a translation-invariant, ergodic distribution with finite density $\nu(\eta_{0}(0))$. Then \begin{equation} \mathbb{P}^{\nu}(\text{the system locally fixates}) = \Prob^{\nu}(m_{\eta_{0}}(0) < \infty) \in \{0,1\}. \nonumber \end{equation} \end{lemma} This theorem tells us that, in order to establish local fixation almost surely, it is enough to show that the origin is toppled a finite number of times with positive probability. \section{Half-toppling and strategy for stabilization}\label{half_toppling:sec} At the very outset of this section, we mention that much of the description of the stabilization algorithm is the same as that in~\cite{RollaSidoravicius12}. We construct an algorithm that, given any random pair $(\eta_{0}, \mathscr{I})$ generated according to the aforementioned distribution, tries to stabilize the particles according to the instructions in $\mathscr{I}$, but includes some additional, ``semi-legal'' single-topplings, whereby stable sites, which otherwise would have remain untouched, are now \emph{half-toppled}. We need to make sure that whenever the algorithm is \emph{successful}, we have $m_{\eta}(0) = 0$, and that it succeeds with positive probability. This algorithm prescribes a settling procedure or rule for each particle, by defining a suitable \emph{trap} for the particle. We imagine an \emph{explorer} associated with each particle, and the trap for the particle is decided by the trajectory of this explorer. It may be helpful for the reader to visualize the explorer as acting like a scout for an army, riding ahead and inspecting the terrain before the army moves. The exploration follows the path that the particle would traverse if we always toppled the site it occupies, and it stops at the site where the trap has been placed for the particle. We declare the algorithm \emph{successful} if we are able to define a suitable trap for every particle. The trap will always lie on the exploration path of the particle, but it need not lie at the end of the exploration path, as we generally have to expose some instructions in $\mathscr{I}$ further along the exploration path before we can decide where the trap must lie. Once the trap has been chosen, the particle is moved along the exploration path until it reaches the trap, where it is settled. We make sure that the following conditions are satisfied by this algorithm. We do not disturb the particles that have already been settled, which requires that a particle is not allowed to visit the sites where previous particles have been settled already. We try to ensure that the traps for different particles are placed as close to each other as possible, so that the next particles have greater room for exploration. We call an instruction $\toppling^{x,j}$ in $\mathscr{I}$ \emph{corrupted} (and the corresponding site $x$ \emph{corrupted} as well) if this instruction has been exposed while deciding where to place the trap for some particle but is not actually executed by the particle. We make sure that the corrupted site $x$ is not visited by the subsequent particles, so as to ensure mutual independence of explorations of different particles. We also try to keep the regions containing the corrupted sites as compact as possible. \subsection{Half-topplings}\label{half_toppling:subsec} In this subsection, we define \emph{half-topplings}, relaxing the restrictions of the original dynamics, and discuss their properties in the spirit of \S\ref{toppling_properties:sec}. In a half-toppling, a single particle from the site concerned, say $x$, is sent to the neighbouring site $x-1$ with probability $q$ and to $x+1$ with probability $1-q$. If for some $x \in \mathbb{Z}$ and some configuration $\eta$, we have $\eta(x) = 1$, then $x$ is stable if it has been half-toppled an even number of times, and unstable if it has been half-toppled an odd number of times. A half-toppling at $x$ under the configuration $\eta$ is considered legal if $x$ is unstable, and \emph{semi-legal} when $\eta(x) \geqslant 1$, regardless of whether $x$ is stable or not. The half-toppling operation performed on the configuration $\eta$, at the site $x$, is denoted $\varphi_{x} \eta$, so that given an odometer $h$, we define $\varphi_{x}(\eta, h) = (\toppling^{x, 2h+1} \eta, h + \frac{1}{2} \delta_{x})$. As before, we abbreviate $\varphi_{x}(\eta, \mathbf{0})$ by $\varphi_{x} \eta$. This definition implies that $\Phi_{x} = \varphi_{x} \varphi_{x}$, i.e.\ the composition of two half-topplings at $x$ constitutes a toppling at $x$. Definitions analogous to those introduced for the toppling operations can also be introduced for half-topplings. Given a sequence $\beta = (y_{1}, y_{2}, \ldots, y_{k})$ of sites, we define the sequence of half-topplings $\varphi_{\beta}$ as the composition $\varphi_{y_{k}} \varphi_{y_{k-1}} \cdots \varphi_{1}$ of half-topplings. We define, for any site $y \in \mathbb{Z}$, \begin{equation}\label{widetilde_m_defn} \widetilde{m}_{\beta}(y) = \sum_{\ell=1}^{k} \1_{y_{\ell} = y}, \quad \text{and} \quad \widetilde{m}_{\beta} = (\widetilde{m}_{\beta}(y): y \in \mathbb{Z}). \end{equation} We note here that although there is no difference between the definitions in \eqref{m_defn} and \eqref{widetilde_m_defn}, the $\widetilde{m}_{\beta}$ emphasizes that the $\beta$ here refers to a sequence of half-topplings and not a sequence of topplings. Given such a $\beta$, we define $\beta^{2} =(y_{1}, y_{1}, y_{2}, y_{2}, \ldots, y_{k}, y_{k})$, which gives us $m_{\beta} = \frac{1}{2}\widetilde{m}_{\beta^{2}}$. As before, given $V$ and $\beta = (y_{1}, y_{2}, \ldots, y_{k})$, we say that $\beta$ is \emph{contained in $V$} if $x_{\ell} \in V$ for all $\ell = 1, \ldots, k$. We say that $\beta$ \emph{stabilizes} $\eta$ in $V$ if every $x \in V$ is stable in $\varphi_{\beta}\eta$, i.e.\ for each site $x \in V$, either $\varphi_{\beta}\eta(x) = 0$ or $\varphi_{\beta}\eta(x) = 1$ and the site has been half-toppled an even number of times. We refer to [\cite{RollaSidoravicius12}, Lemma 6] for the following lemma. \begin{lemma}\label{least_action_half_toppling} Let $\beta$ be a sequence of half-topplings contained in $V$ and legal for $\eta$, and $\alpha$ another sequence of half-topplings that is semi-legal for $\eta$ and stabilizes $\eta$ in $V$. Then $\widetilde{m}_{\beta} \leqslant \widetilde{m}_{\alpha}$. \end{lemma} \subsection{Procedure for setting traps}\label{traps:subsec} Recall the random walk bias parameter $q$ from \S\ref{model}. By symmetry we may assume that $q \geqslant \frac{1}{2}$. We shall focus on the positive half-line of integers $\mathbb{Z}^{+}$. The argument for the particles on $\mathbb{Z}^{-}$ is symmetric when $q = \frac{1}{2}$, and easier when $q > \frac{1}{2}$, as discussed farther below. Let $0 < x_{1} < x_{2} < x_{3} < \cdots$ denote the positions of the particles under the initial configuration $\eta_{0}$. Given realizations of $\mathscr{I}$ and $\eta_{0}$, we construct the settling procedure as follows. We set $b_{0} = 0$, and consider the first particle, located at $x_{1}$. The explorer associated with this particle now reveals the instructions in $\mathscr{I}$ one by one, starting at $x_{1}$ and then following the path that would have been traversed by the particle if we were to half-topple the site currently containing it, over and over again, until it hits barrier $b_{0}$ for the first time. We now set the trap for the first particle. We let $\tau_{1}$ denote the first time that it hits barrier $b_{0}$, and let $\{X^{1}_{n}\}_{0 \leqslant n \leqslant \tau_{1}}$ denote the trajectory of the first explorer, where $X^{1}_{0} = x_{1}$. We define \begin{equation a_{1} = \min\Big\{x \in \mathbb{Z}: \sum_{n=0}^{\tau_{1}} \1_{X^{1}_{n} = x} \equiv 1 \bmod 2\Big\}. \nonumber \end{equation} Let \begin{equation} \theta_{1} = \max\big\{1 \leqslant n < \tau_{1}: X^{1}_{n} = X^{1}_{n-1} + 1\big\}, \nonumber \end{equation} so that the last time that the first explorer jumps to the right is at time $\theta_{1}-1$. We then let \begin{equation c_{1} = X^{1}_{\theta_{1}}. \nonumber \end{equation} We then choose \begin{equation b_{1} = \min\{a_{1}, c_{1}\}, \nonumber \end{equation} which will serve as the barrier for the second explorer starting at $x_{2}$. The trap for the first particle has now been set up at $b_{1}$. If both $a_{1}$ and $c_{1}$ are greater than $x_{1}$, we define $b_{k} = \infty$ for every $k \in \mathbb{N}$, stop and declare the settling procedure to have failed. If the trap for the first particle is successfully set up, we have $b_{1} \in [b_{0}+1, x_{1}] \cap \mathbb{Z}$. Suppose the first $k$ traps have been laid down already, at positions $0 < b_{1} < b_{2} < \cdots < b_{k}$. The $(k+1)$-st explorer, starting at $x_{k+1}$, reveals and follows, one by one, the instructions from $\mathscr{I}$ corresponding to the current site it is occupying, that have not been revealed by the previous $k$ explorers, until it hits $b_{k}$ for the first time. Its exploration is described by $\{X^{k+1}_{n}\}_{0 \leqslant n \leqslant \tau_{k+1}}$, where $X^{k+1}_{0} = x_{k+1}$ and $\tau_{k+1}$ is the first time that it hits $b_{k}$. We define \begin{equation}\label{a_{k}_defn} a_{k+1} = \min\Big\{x > b_{k}: \sum_{j=1}^{k+1} \sum_{n=0}^{\tau_{j}} \1_{X^{j}_{n} = x} \equiv 1 \bmod 2\Big\}. \end{equation} Once again, we define \begin{equation} \theta_{k+1} = \max\big\{1 \leqslant n \leqslant \tau_{k+1}: X^{k+1}_{n} = X^{k+1}_{n-1}+1\big\} \end{equation} so that $\theta_{k+1}-1$ is the last time that the $(k+1)$-st explorer jumps to the right. Then we set \begin{equation}\label{c_{k}_defn} c_{k+1} = X^{k+1}_{\theta_{k+1}}, \end{equation} and finally define the trap for the $(k+1)$-st particle to be at the site \begin{equation}\label{b_{k}_defn} b_{k+1} = \min\{a_{k+1}, c_{k+1}\}. \end{equation} Once again, if both $a_{k+1}$ and $c_{k+1}$ exceed $x_{k+1}$, we stop and declare the settling procedure to have failed, and define $b_{j} = \infty$ for all $j \geqslant k+1$. If the trap can be set up successfully, we have $b_{k+1} \in [b_{k}+1, x_{k+1}] \cap \mathbb{Z}$. As mentioned earlier, we declare the entire settling procedure to have been successful when it is possible to define a finite $b_{k}$ for every $k \in \mathbb{N}$. \subsection{Success implies fixation}\label{success_fixation:subsec} We show here that, for given realizations of $\mathscr{I}$ and $\eta_{0}$, if the settling procedure succeeds, then $m_{\eta_{0}}(0) = 0$, which in turn implies fixation. To this end, we make use of Lemma~\ref{m(0)_finite} and the same argument as that given in~\cite{RollaSidoravicius12}, showing that if the settling procedure succeeds for all particles on both $\mathbb{Z}^{+}$ and $\mathbb{Z}^{-}$, then every finite interval can be stabilized with semi-legal half-topplings without ever toppling the origin. We note here that each step of an explorer corresponds either to a semi-legal half-toppling of a stable site, or a legal half-toppling of an unstable site, and if a site is visited more than once, then at least one of the last two moves has to correspond to the former scenario. Suppose we have settled the particles starting at $x_{1}$, $x_{2}$, $\ldots$, $x_{k}$ and established that, at this point, the sites $b_{1}$, $b_{2}$, $\ldots$, $b_{k}$ are stable. If $b_{k+1} = c_{k+1}$, then the sites found by the $(k+1)$-st explorer have been successively half-toppled until the second-last half-toppling at $c_{k+1}$. If $c_{k+1}$ has been half-toppled an even number of times so far, then it is stable, and the particle is left there without executing any further half-toppling instruction revealed by the $(k+1)$-st explorer. If $c_{k+1}$ has been half-toppled an odd number of times so far, then the second-last half-toppling at $c_{k+1}$ is executed and the particle is again left at $c_{k+1}$. This ensures that $c_{k+1}$ is stable. After the last two instructions at $c_{k+1}$ had been revealed by the $(k+1)$-st explorer, it did not jump to the right again. Thus all half-toppling instructions revealed by the $(k+1)$-st explorer, except possibly some that lie in the interval $[b_{k}+1, c_{k+1}] \cap \mathbb{Z}$, are executed. Thus the instructions and sites corrupted by the $(k+1)$-st explorer lie inside $[b_{k}+1, c_{k+1}] \cap \mathbb{Z}$ and are never encountered by the $(k+2)$-nd explorer. Now we consider the scenario where $b_{k+1} = a_{k+1} < c_{k+1}$. Note that the particle starting at $x_{k+1}$ is left at the site $a_{k+1}$ without executing the last half-toppling instruction at $a_{k+1}$ that the $(k+1)$-st explorer reveals. By definition of $a_{k+1}$, the total number of times $a_{k+1}$ is visited by the explorers starting at $x_{1}$, $x_{2}$, $\ldots$, $x_{k+1}$ is odd. This means that the total number of times the site $a_{k+1}$ has been half-toppled, not counting the last instruction at $a_{k+1}$ revealed by the $(k+1)$-st explorer, is even. Therefore, once the particle starting at $x_{k+1}$ is settled at $a_{k+1}$, the site $a_{k+1}$ is stabilized. The sites corrupted by the $(k+1)$-st explorer all lie in $[b_{k}+1, a_{k+1}] \cap \mathbb{Z}$, and are never encountered by the $(k+2)$-nd explorer during its journey. Thus, by induction, we conclude that by the time the $(k+1)$-st particle is settled, all sites in $[0, b_{k+1}] \cap \mathbb{Z}$ are stable and the origin remains untouched. This argument works by symmetry for particles on $\mathbb{Z}^{-}$ when $q = \frac{1}{2}$. In the case where $q > \frac{1}{2}$, the event that each particle on $\mathbb{Z}^{-}$ escapes to $-\infty$ without ever hitting the origin has strictly positive probability. Therefore, on that event, any sequence of semi-legal topplings on $\mathbb{Z}^{-}$ keeps the origin untouched. This completes the argument that a successful settling procedure implies fixation. In \S\ref{main:sec}, we show that the settling procedure succeeds with positive probability, implying that $\Prob^{\nu}(m_{\eta_{0}}(0) = 0) > 0$. Combined with Lemma~\ref{m(0)_finite}, this establishes that the system locally fixates almost surely. \section{Positive probability of success}\label{main:sec} Suppose the initial average density $\zeta < \frac{1}{2}$ is fixed. Fix $\gamma_{1}$ and $\gamma_{2}$ such that $2 < \gamma_{2} < \gamma_{1} < \frac{1}{\zeta}$. By the strong law of large numbers, $\frac{k}{x_{k}} \rightarrow \zeta$ almost surely. Moreover, the event $\mathcal{A} = \{x_{k} > \gamma_{1} k \text{ for all } k \in \mathbb{N}\}$ has positive probability. We define the $\sigma$-field $\mathcal{G}_{k}$ containing the values of $b_{1}, b_{2}, \ldots, b_{k}$ as well as the starting site $x_{i}$ for each $i \in \mathbb{N}$. Given positive integers $M$ and $N$, we define the positive integer \begin{equation}\label{K_{M,N}} K_{M,N} = \Big\lceil \frac{\gamma_{1} M + N}{\gamma_{1} - \gamma_{2}} \Big\rceil, \end{equation} and for each $k \geqslant K_{M,N}$, we define the event \begin{multline}\label{B_{k}^{M,N}_event} \mathcal{B}_{k}^{M, N} = \{b_{K_{M,N}} < \gamma_{2} K_{M,N} \text{ and } b_{K_{M,N}+j} \leqslant b_{K_{M,N}} + \gamma_{2} j \text{ for all }\\ j = 1, \ldots, k - K_{M,N}\}, \nonumber \end{multline} which has positive probability. The purpose of choosing $K_{M,N}$ as in \eqref{K_{M,N}} is to guarantee that on the event $\mathcal{B}_{k}^{M,N} \cap \mathcal{A}$, we have $b_{k}+N < x_{k-M}$, so that it leaves a large enough terrain for the estimates we shall make for the $(k+1)$-st explorer. The event $\mathcal{B}_{k}^{M, N}$ also requires that the settling procedure has not failed for the first $k$ particles on $\mathbb{Z}^{+}$. The sequence $\{\mathcal{B}_{k}^{M,N}\}_{k \in \mathbb{N}}$ is decreasing and we denote its limit by $\mathcal{B}_{\infty}^{M,N}$. That the settling procedure succeeds with positive probability follows from the following lemma. \begin{lemma}\label{main_2} We can choose $M$ and $N$ so that $\Prob[\mathcal{B}_{\infty}^{M, N}] > 0$. \end{lemma} The proof of Lemma~\ref{main_2} is accomplished based on the following lemma. \begin{lemma}\label{main_lemma} Given $\varepsilon > 0$, there exists a positive integer $M = M_{\varepsilon}$ such that for all $N \geqslant 2$ and all $k \geqslant K_{M,N}$, on the event $\mathcal{B}_{k}^{M, N} \cap \mathcal{A}$, \begin{equation}\label{b_{k+1}-b_{k}_tail_upto_N} \Prob[a_{k+1} - b_{k} > s\big|\mathcal{G}_{k}] \leqslant \Big(\frac{1}{2}+\varepsilon\Big)^{s} \quad \text{for all } s \leqslant N, \end{equation} and \begin{equation}\label{b_{k+1}-b_{k}_tail_beyond_N} \Prob[c_{k+1} - b_{k} > s\big|\mathcal{G}_{k}] \leqslant \rho^{s} \quad \text{for all } s > N, \end{equation} for some constant $\rho \in (0,1)$. \end{lemma} As a side remark, the constant $\rho$ depends only on $q$, but we do not need this fact in the proof of Lemma~\ref{main_lemma}. The proof of Lemma~\ref{main_lemma} involves several steps. In \S\ref{proof:subsec:1}, the trajectories of the explorers are identified with suitable $h$-transforms of random walks, in \S\ref{proof:subsec:2}, a general result regarding the parity of the sum of i.i.d.\ integer-valued random variables is discussed, and \S\ref{proof:subsec:3} and \S\ref{proof:subsec:4} are respectively dedicated to the proofs of \eqref{b_{k+1}-b_{k}_tail_upto_N} and \eqref{b_{k+1}-b_{k}_tail_beyond_N}. We now prove that Lemma~\ref{main_lemma} implies Lemma~\ref{main_2}. We choose $\varepsilon > 0$ and $N \in \mathbb{N}$ such that \begin{equation} \sum_{s=0}^{N} \Big(\frac{1}{2} + \varepsilon\Big)^{s} + \sum_{s=N+1}^{\infty} \rho^{s} < \gamma_{2}. \nonumber \end{equation} We now set $M = M_{\varepsilon}$ as in Lemma~\ref{main_lemma} and $K = K_{M,N}$ as in \eqref{K_{M,N}}. Define an i.i.d.\ sequence $\{Y_{i}\}_{i}$, independent of both the sequences $\{x_{i}\}_{i}$ and $\{b_{i}\}_{i}$, whose distribution is \[ \Prob[Y_{i} > s] = \begin{cases} \Big(\frac{1}{2}+\varepsilon\Big)^{s} & \text{for all } s = 1, \ldots, N,\\ \min\Big\{\Big(\frac{1}{2} + \varepsilon\Big)^{N}, \rho^{s}\Big\} & \text{for all } s > N. \end{cases} \] By our choice of $\varepsilon$ and $N$, we have $\Ex[Y_{i}] < \gamma_{2}$, so that \begin{equation}\label{all_Y_{j}_smaller} \inf_{j \in \mathbb{N}} \Prob\Big[\sum_{i=1}^{\ell} Y_{i} < \gamma_{2} \ell \text{ for all } \ell = 1, \ldots, j\Big] > 0. \end{equation} Define $U_{j+1} = (b_{K+j+1} - b_{K+j}) \1_{b_{K+\ell} \leqslant b_{K}+\gamma_{2}\ell \text{ for all } \ell = 1, \ldots, j}$, for all $j \geqslant 0$. By Lemma~\ref{main_lemma}, conditioned on $\mathcal{G}_{K+j}$, the random variable $U_{j+1}$ is stochastically dominated by $Y_{j+1}$, for all $j \geqslant 0$. We claim that \begin{equation}\label{stoch_dom_claim} (U_{1}, \ldots, U_{j}) \preccurlyeq (Y_{1}, \ldots, Y_{j}) \text{ for all } j \in \mathbb{N}, \end{equation} where ``$\preccurlyeq$'' denotes the usual stochastic domination of random vectors. We prove this claim by induction on $j$. Let $f$ be a test function that is monotonically increasing and bounded. Note that $Y_{j+1}$ is independent of $\mathcal{G}_{K+j}$. We then have \begin{align} \Ex f(U_{1}, \ldots, U_{j}, U_{j+1}) &= \Ex \Ex\big[f(U_{1}, \ldots, U_{j}, U_{j+1})\big|\mathcal{G}_{K+j}\big] \nonumber\\ &\leqslant \Ex \Ex\big[f(U_{1}, \ldots, U_{j}, Y_{j+1})\big|\mathcal{G}_{K+j}\big] \nonumber\\ &= \Ex f(U_{1}, \ldots, U_{j}, Y_{j+1}) \nonumber\\ &= \Ex \Ex\big[f(U_{1}, \ldots, U_{j}, Y_{j+1})\big|Y_{j+1}\big] \nonumber\\ &\leqslant \Ex \Ex\big[f(Y_{1}, \ldots, Y_{j}, Y_{j+1})\big|Y_{j+1}\big] \nonumber\\ &= \Ex f(Y_{1}, \ldots, Y_{j}, Y_{j+1}). \nonumber \end{align} The first of the two inequalities above follows from the fact that $U_{1}, \ldots, U_{j}$ are measurable with respect to $\mathcal{G}_{K+j}$, and conditioned on $\mathcal{G}_{K+j}$, we have $U_{j+1} \preccurlyeq Y_{j+1}$. The second inequality follows from induction hypothesis and the fact that both $(U_{1}, \ldots, U_{j})$ and $(Y_{1}, \ldots, Y_{j})$ are independent of $Y_{j+1}$. This proves the claim of \eqref{stoch_dom_claim} by induction. To conclude, we define the transformation $\Psi$ on sequences $\mathbf{y} = (y_{\ell})_{\ell = 1, \ldots, j}$ by $(\Psi \mathbf{y})_{1} = y_{1}$ and for all $m = 2, \ldots, j+1$, \[ (\Psi \mathbf{y})_{m} = \begin{cases} y_{m} & \text{if } \sum_{\ell=1}^{r} y_{\ell} \leqslant \gamma_{2}r \text{ for all } r = 1, \ldots, m-1; \\ \infty & \text{otherwise.} \end{cases} \] Since $\Psi$ is non-decreasing, $\Psi(U_{1}, \ldots, U_{j}) \preccurlyeq \Psi(Y_{1}, \ldots, Y_{j})$, and by \eqref{all_Y_{j}_smaller}, we get $\Prob[\mathcal{B}_{\infty}^{M,N}] > 0$, concluding the proof of Lemma~\ref{main_2}. \subsection{Reversed trajectories and $h$-transform}\label{proof:subsec:1} Consider the trajectory of the $k$-th explorer, denoted $\{X^{k}_{n}\}_{0 \leqslant n \leqslant \tau_{k}}$, where $\tau_{k}$ is the first time that it hits the barrier at $b_{k-1}$. This path is distributed as a random walk $\widetilde{W}$ coming from $+\infty$ towards $-\infty$, with transition probabilities $p(-1) = 1-p(+1) = q$, between the \emph{first} time it hits $x_{k}$ and the \emph{first} time it hits $b_{k-1}$. The time-reversed walk $W$ goes from $-\infty$ to $\infty$ with jump probabilities $\tilde{p}(+1) = 1-\tilde{p}(-1) = q$. Then $\{X^{k}_{\tau_{k}-n}\}_{0 \leqslant n \leqslant \tau_{k}}$ becomes the piece of $W$ between the \emph{last} time it visits $b_{k-1}$ and the \emph{last} time it visits $x_{k}$. However, the path of $W$ observed after the \emph{last} visit to the origin $x = 0$ has the distribution of an $h$-transformed random walk that is conditioned to start at $0$ and remain strictly positive thereafter. We denote this $h$-transformed walk by $\{Z^{k}_{n}\}_{n \geqslant 0}$, and let $\sigma^{k}_{x}$ denote the last time it visits the site $x$, for all $x \in \mathbb{Z}^{+}$. We can thus identify $\{X^{k}_{\tau_{k}-n}\}_{0 \leqslant n \leqslant \tau_{k}}$ with $\big\{Z^{k}_{\sigma^{k}_{b_{k-1}}+n}\big\}_{0 \leqslant n \leqslant \sigma^{k}_{x_{k}} - \sigma^{k}_{b_{k-1}}}$. Henceforth, we shall use this representation of the trajectory of the $k$-th explorer. Note that the law of the process $\{Z^{k}_{n+j}\}_{n \geqslant 0}$, conditioned on $\sigma^{k}_{x} = j$, is the same as the law of the process $\{x+Z^{k}_{n}\}_{n \geqslant 0}$, for every site $x \in \mathbb{Z}^{+}$ and every $j \in \mathbb{N}$. This shows that, for each fixed $k$, the processes $\{Z^{k}_{n}\}_{\sigma^{k}_{x} \leqslant n \leqslant \sigma^{k}_{x+1}}$ are i.i.d.\ over all sites $x \geqslant 0$. Note, from \eqref{c_{k}_defn}, that the random variable $c_{k+1} - b_{k}$, conditioned on $\mathcal{G}_{k}$, has the same distribution as the site on the positive integer line where the random walk $\{Z^{k+1}_{n}\}_{n}$ jumps to the left for the first time. Equivalently, \begin{equation}\label{c_{k+1}-b_{k}_reversed_walk} \Prob[c_{k+1} - b_{k} > s\big|\mathcal{G}_{k}] = \Prob\big[Z^{k+1}_{n} = n \text{ for all } n = 1, \ldots s+1\big]. \end{equation} \subsection{Parity of the sum of i.i.d.\ variables}\label{proof:subsec:2} We make an elementary observation in this subsection. \begin{lemma}\label{lem:parity_general} Let $\{X_{n}\}$ be an i.i.d.\ sequence of integer-valued random variables. If $0 < \Prob[X_{1} \equiv 0 \bmod 2] < 1$, then \begin{equation} \lim_{n \rightarrow \infty} \Prob\Big[\sum_{i=1}^{n} X_{i} \equiv 0 \bmod 2\Big] = \frac{1}{2}. \nonumber \end{equation} \end{lemma} \begin{proof} We define the random variable $Y_{i}$ which takes the value $1$ when $X_{i}$ is even, and the value $-1$ when $X_{i}$ is odd. Note that $\sum_{i=1}^{n} X_{i}$ is even if and only if an even number of the $X_{i}$'s are odd, which is equivalent to $\prod_{i=1}^{n} Y_{i}$ being equal to $1$. Note that $p_{1} = \Prob[Y_{1} = 1]$, and let $p_{n} = \Prob[\prod_{i=1}^{n} Y_{i} = 1]$ for all $n \geqslant 2$. Then $\Ex[\prod_{i=1}^{n} Y_{i}] = 2p_{n}-1$. Since we assume that $0 < p_{1} < 1$, we have $-1 < 2p_{1}-1 < 1$. Using independence, we have \begin{equation} |2p_{n+1}-1| = \big|\Ex[\prod_{i=1}^{n+1} Y_{i}]\big| = |2p_{n}-1| |2p_{1}-1|, \nonumber \end{equation} implying \begin{equation \big|p_{n} - \frac{1}{2}\big| = \frac{1}{2}|2p_{1}-1|^{n}, \nonumber \end{equation} which establishes exponential decay. This shows that $p_{n}$ converges to $\frac{1}{2}$ at an exponentially fast rate that depends only on $p_{1}$. \end{proof} \subsection{The conditional distribution of $a_{k+1} - b_{k}$}\label{proof:subsec:3} Fix $M \geqslant 2$ and $N \geqslant 2$, set $K = K_{M,N}$ as in \eqref{K_{M,N}}, and fix $k \geqslant K_{M,N}$. Later on we shall select $M$ depending on $\varepsilon$ whereas $N$ will remain free. The definitions and estimates that follow depend implicitly on $M$ and $N$. In this subsection, we prove \eqref{b_{k+1}-b_{k}_tail_upto_N}. Recalling from \S\ref{proof:subsec:1} how $\{Z^{j}_{n}\}_{n}$ relates with $\{X^{j}_{n}\}_{n}$, we introduce \begin{equation} D_{k,s} = \sum_{j=1}^{k} \sum_{n = \sigma^{j}_{b_{j-1}}}^{\sigma^{j}_{x_{j}}} \1_{Z^{j}_{n}=b_{k}+s} \nonumber \end{equation} for all $s \geqslant 1$, and rewrite \eqref{a_{k}_defn} as follows: \begin{equation}\label{new_representation_a} a_{k+1} = b_{k} + \min\{s \geqslant 1: D_{k,s} \equiv 1 \bmod 2\}. \nonumber \end{equation} In order to analyse $D_{k,s}$, we break it into a ``known'' component and an ``unknown'' component conveniently. To this end, for $s \geqslant 0$, define the $\sigma$-field $\mathcal{S}_{k}^{s}$ which contains the following information: \begin{enumerate} \item the values of $x_{j}$ for all $j \in \mathbb{N}$; \item the value of $b_{k}$; \item the trajectories $\{Z^{j}_{n}\}_{n = \sigma^{j}_{b_{j-1}}, \dots, \sigma^{j}_{x_{j}}}$ for $j = 1, \ldots, k-M-1$; \item\label{iv} the pieces $\{Z^{j}_{n}\}_{n = \sigma^{j}_{b_{j-1}}, \dots, \sigma^{j}_{b_{k}+s}}$ for $j = k-M, \ldots, k+1$. \end{enumerate} Note that each $\mathcal{S}_{k}^{s}$ is a finer $\sigma$-field than $\mathcal{G}_{k}$. For every $s \geqslant N$, we write $D_{k,s} = D^{1}_{k,s} + D^{2}_{k,s}$ where \begin{equation} D_{k,s}^{1} = \sum_{j = 1}^{k-M-1} \sum_{n=\sigma^{j}_{b_{j-1}}}^{\sigma^{j}_{x_{j}}} \1_{Z^{j}_{n} = b_{k}+s} + \sum_{j=k-M}^{k+1} \sum_{n=\sigma^{j}_{b_{j-1}}}^{\sigma^{j}_{b_{k}+s-1}} \1_{Z^{j}_{n} = b_{k}+s} \nonumber \end{equation} and \begin{equation}\label{random_part_D^{2}} D_{k,s}^{2} = \sum_{j=k-M}^{k+1} \sum_{n=\sigma^{j}_{b_{k}+s-1}}^{\sigma^{j}_{b_{k}+s}} \1_{Z^{j}_{n} = b_{k}+s}. \end{equation} Note that $D_{k,s}^{1}$ is measurable with respect to $\mathcal{S}_{k}^{s-1}$ and $D_{k,s}^{2}$ is independent of $\mathcal{S}_{k}^{s-1}$. This in turn implies that the event $\{a_{k+1} - b_{k} > s\}$ is contained in $\mathcal{S}_{k}^{s}$. We now show that, for every $s \geqslant 1$, on the event $\{a_{k+1} - b_{k} > s\}$, we have \begin{equation}\label{ind_claim_new} \Prob[a_{k+1} - b_{k} > s\big|\mathcal{S}_{k}^{s-1}] \leqslant \frac{1}{2} + \varepsilon. \end{equation} From this we establish \eqref{b_{k+1}-b_{k}_tail_upto_N} inductively on $s$, as follows: \begin{align} \Prob[a_{k+1}-b_{k} > s+1\big|\mathcal{G}_{k}] &= \Ex[\1_{a_{k+1} - b_{k} > s+1}\big|\mathcal{G}_{k}] \nonumber\\ &= \Ex\big[\Ex[\1_{a_{k+1} - b_{k} > s+1}\big|\mathcal{S}_{k}^{s}]\big|\mathcal{G}_{k}\big] \nonumber\\ &= \Ex\big[\Ex[\1_{a_{k+1} - b_{k} > s} \1_{a_{k+1}-b_{k} > s+1}\big|\mathcal{S}_{k}^{s}]\big|\mathcal{G}_{k}\big] \nonumber\\ &= \Ex\big[\1_{a_{k+1} - b_{k} > s} \Ex[\1_{a_{k+1}-b_{k} > s+1}\big|\mathcal{S}_{k}^{s}]\big|\mathcal{G}_{k}\big] \nonumber\\ &\leqslant \Big(\frac{1}{2} + \varepsilon\Big) \Ex[\1_{a_{k+1} - b_{k} > s}\big|\mathcal{G}_{k}] \leqslant \Big(\frac{1}{2} + \varepsilon\Big)^{s+1}. \nonumber \end{align} The proof of \eqref{ind_claim_new} happens via induction on $s$ as well. The base case of $s = 1$ is resolved by noting that, conditioned on $\mathcal{S}_{k}^{0}$, the random variable $D_{k,1}^{2}$ is the sum of i.i.d.\ random variables $\sum_{n=\sigma^{j}_{b_{k}}}^{\sigma^{j}_{b_{k}+1}} \1_{Z^{j}_{n} = b_{k}+1}$ for $j = k-M, \ldots, k+1$, and applying Lemma~\ref{lem:parity_general} for all $M$ large enough. Suppose we have proved \eqref{ind_claim_new} for some $s < N$. The probability $\Prob[a_{k+1} - b_{k} > s+1\big|\mathcal{S}_{k}^{s}]$ is equal to \begin{equation} \Prob\Big[\sum_{j=k-M}^{k+1} \sum_{n = \sigma^{j}_{b_{k}+s}}^{\sigma^{j}_{b_{k}+s+1}} \1_{Z^{j}_{n} = b_{k}+s+1} + D_{k,s+1}^{1} \equiv 0 \bmod 2\big|\mathcal{S}_{k}^{s}\Big], \nonumber \end{equation} where the summands $\sum_{n = \sigma^{j}_{b_{k}+s}}^{\sigma^{j}_{b_{k}+s+1}} \1_{Z^{j}_{n} = b_{k}+s+1}$ are i.i.d.\ over $j = k-M, \ldots, k+1$. By Lemma~\ref{lem:parity_general}, the above probability is bounded above by $\frac{1}{2} + \varepsilon$ if $M$ is chosen large enough. This completes the inductive proof. \subsection{The conditional distribution of $c_{k+1} - b_{k}$}\label{proof:subsec:4} Here, $N \geqslant 2$ is fixed and \eqref{b_{k+1}-b_{k}_tail_beyond_N} will be established. We fix $k$ and henceforth omit the superscript from $\{Z_{n}^{k+1}\}_{n}$. Recall from \S\ref{model} that $q$ denotes the random walk parameter. The analysis of $c_{k+1} - b_{k}$ will be split into two parts: $q = \frac{1}{2}$ and $\frac{1}{2} < q < 1$. \subsubsection{When the sandpile dynamics has no bias}\label{no_bias} We assume that $q = \frac{1}{2}$. The $h$-transformed walk $\{Z_{n}\}_{n}$ uses the harmonic function $h(x) = x$ for $x \in \mathbb{Z}_{+}$. Therefore the transition kernel of $\{Z_{n}\}_{n}$ is given by \begin{equation}\label{transition_h_transform_unbiased} \Prob[Z_{n+1} = x+1|Z_{n} = x] = \frac{1}{2} \big(\frac{x+1}{x}\big) \text{ for all } x \in \mathbb{N}, \end{equation} From \eqref{c_{k+1}-b_{k}_reversed_walk}, for all $s > N$, we have \begin{align \Prob[c_{k+1} - b_{k} > s\big|\mathcal{G}_{k}] &= \prod_{x=1}^{s} \Prob[Z_{x+1} = x+1|Z_{x} = x] \nonumber\\ &= \prod_{x=1}^{s} \frac{1}{2} \big(\frac{x+1}{x}\big) = \frac{s+1}{2^{s}}, \nonumber \end{align} thus establishing \eqref{b_{k+1}-b_{k}_tail_beyond_N} in this case. \subsubsection{When the jumps have a negative bias}\label{neg_bias} We assume that $\frac{1}{2} < q < 1$. Let $\Prob_{x}$ denote the law of a random walk $\{W_{n}\}_{n}$ that starts at $W_{0} = x$ and jumps by an increment of $+1$ with probability $q$ and by $-1$ with probability $1-q$. Recall from \S\ref{proof:subsec:1} that $\{Z_{n}\}_{n}$ is the $h$-transform of $\Prob_{0}$, i.e.\ it starts at $0$ and is conditioned on staying strictly positive thereafter. We establish \eqref{b_{k+1}-b_{k}_tail_beyond_N} by providing an explicit form for the transition kernel of $\{Z_{n}\}_{n}$. This is given by \begin{equation}\label{transition_h_transform_-ve_bias} \Prob[Z_{n+1} = x+1|Z_{n} = x] = \frac{q^{x+1} - (1-q)^{x+1}}{q^{x} - (1-q)^{x}} \end{equation} for all $n$ and all $x \in \mathbb{N}$, and $\Prob[Z_{1} = 1|Z_{0} = 0] = 1$. Then, for all $s > N$, from \eqref{c_{k+1}-b_{k}_reversed_walk}, we have \begin{align}\label{c_{k+1}-b_{k}_bound_+ve_bias} \Prob[c_{k+1} - b_{k} > s\big|\mathcal{G}_{k}] &= \Prob\big[Z_{n} = n \text{ for all } x = 1, \ldots s+1\big] \nonumber\\ &= \prod_{x=1}^{s} \Prob[Z_{x+1} = x+1|Z_{x} = x] \nonumber\\ &= \prod_{x=1}^{s} \frac{q^{x+1} - (1-q)^{x+1}}{q^{x} - (1-q)^{x}} \nonumber\\ &= \frac{q^{s+1} - (1-q)^{s+1}}{2q - 1}, \nonumber \end{align} which establishes \eqref{b_{k+1}-b_{k}_tail_beyond_N}. It remains to justify \eqref{transition_h_transform_-ve_bias}. Note that the function $h$, defined as \begin{equation}\label{h_transform_explicit} h(x) = 1 - \Big(\frac{1-q}{q}\Big)^{x} \text{ for all } x \in \mathbb{Z}_{+}, \nonumber \end{equation} is strictly positive and $q$-harmonic on $\mathbb{N}$, and $h(0) = 0$. Hence the law of $\{Z_{n}\}_{n}$ is given by $Z_{1} = 1$ and \begin{equation} \Prob[Z_{n+1} = x+1|Z_{n} = x] = \frac{h(x+1)}{h(x)} q \text{ for all } x \geqslant 1, \nonumber \end{equation} giving us \eqref{transition_h_transform_-ve_bias}. \parskip 0pt \setstretch{1} \small \bibliographystyle{bib/leoabbrv}
\section{Introduction} The ordinary supervised classification problems require that each training sample should be equipped with an exact label that denotes the class the sample belongs to. However, the preparation of massive exactly labeled data is usually laborious and unrealistic in practical. Therefore, a lot of studies on learning from weak supervision have been made to tackle this problem in different scenarios, e.g. semi-supervised learning \cite{DBLP:books/mit/06/CSZ2006,DBLP:conf/icml/SakaiPNS17,DBLP:conf/ijcai/ZhangZ18,SSL1,SSL2}, partial label learning \cite{DBLP:journals/jmlr/CourST11,DBLP:journals/tkde/ZhangYT17}, and positive-unlabeled learning \cite{DBLP:conf/kdd/ElkanN08,DBLP:conf/icml/PlessisNS15,DBLP:journals/pami/SansoneNZ19,DBLP:conf/icml/HsiehNS19}. Recently, another weakly-supervised learning scenario called \textit{complementary-label learning} (CLL) has been proposed. In the CLL setting, each ordinary label is substituted with the complementary label, which denotes one of the classes that a training sample does \textit{not} belong to. It is obvious that the preparation of complementarily labeled data is much more labor-saving than that of ordinarily labeled data. The complementary-label learning problem has been investigated in previous studies \cite{DBLP:conf/nips/IshidaNHS17,DBLP:conf/eccv/YuLGT18,DBLP:conf/icml/IshidaNMS19}. In these works, different risk estimators were proposed to recover classification risk only from complementarily labeled data under the empirical risk minimization (ERM) framework. In \cite{DBLP:conf/nips/IshidaNHS17} and \cite{DBLP:conf/eccv/YuLGT18}, the proposed risk estimators had restrictions on loss functions and unbiasedness respectively. \cite{DBLP:conf/icml/IshidaNMS19} overcame the shortcomings by giving an unbiased risk estimator without any restriction on models and loss functions while guaranteeing the superior performance in terms of classification accuracy over the previous two methods. It is noticeable that in these works, each training sample was given only a single complementary label. However, in quite a few cases, the training samples can be multi-complementarily labeled, namely each training sample is equipped with multiple complementary labels. For example, in the stage of data annotation, an annotator who has no idea of a training sample's exact label may be able to recognize multiple classes that the sample does not belong to, which results in a sample with multiple complementary labels. In crowdsourcing scenario \cite{Crowdsourcing,CS}, the quality of crowdsourcing label is especially crucial \cite{DBLP:journals/chinaf/WangZ15a}. Instead of being ordinarily labeled, a sample can be complementarily labeled to alleviate the effect of low-quality noisy crowdsourcing labels. Since a sample can be complementarily labeled by different crowdworkers, each training sample may have more than one complementary label. Moreover, compared with the single-complementary-label setting in previous CLL studies, the samples with multiple complementary labels are more informative. To sum up, a framework for learning from data with arbitrary\footnote{ `Arbitrary' means the samples can be equipped with different numbers of complementary labels.} number of complementary labels is in demand. Furthermore, the information concealed in the easily accessible unlabeled data proved to be helpful in many other weakly-supervised learning scenario both theoretically and practically \cite{shai,incomplete,partial_unlabeled}. Therefore, it is promising to further enhance the capability of CLL framework by incorporating the unlabeled data. In this paper, we study the \textit{multi-complementary label and unlabeled learning} (MCUL) problem, where both multi-complementarily labeled data and unlabeled data are leveraged to obtain better classifiers. In our method, we propose a novel unbiased risk estimator for MCUL problem with no limitation on loss functions and models. By using a mild assumption, we first derive the risk estimator for \textit{multi-complementary label learning} (MCL) problem. Then we further utilize the unlabeled data to construct the risk estimator for MCUL problem. With no more assumption on loss functions and models, we show that the estimation error bounds of MCL and MCUL are in optimal parametric convergence rate \cite{vapnik}. The effectiveness of the proposed MCUL is demonstrated through experiments on both linear and deep models. The main contributions are summarized as follows: \begin{itemize} \item We propose the novel MCL framework that allows unbiased estimation of the classification risk only from samples with arbitrary number of complementary labels and can be applied on \textit{arbitrary losses and models}. \item We further propose the MCUL framework to utilize the unlabeled samples, which are neglected in previous studies on CLL\cite{DBLP:conf/nips/IshidaNHS17,DBLP:conf/eccv/YuLGT18,DBLP:conf/icml/IshidaNMS19} and validate the benefits of the incorporation of unlabeled samples both experimentally and theoretically. \item The previous CLL framework and ordinary classification problems are proven to be special cases of the MCUL framework, which shows the comprehensiveness of the MCUL framework as a weakly-supervised leaning framework. \end{itemize} This rest of this paper is organized as follows. We give the review of complementary-label learning in Section 2. The MCL and MCUL frameworks are proposed in Section 3. Moreover, we analyse the estimation error bounds of the proposed methods in Section 4 and discuss the helpfulness of integrating the class-prior information in Section 5. Finally, we give the experimental results of our frameworks on both linear and deep models in Section 6 and conclude the paper in Section 7. The detailed proof is shown in the appendix. \section{Review of Complementary-Label Learning} To begin with, we first show the classification risk of learning from ordinary labels and then review how the previous risk estimators of learning from complementarily labeled samples recover the classification risk under the ERM framework. \subsection{Ordinary Classification Problem} Let's denote the feature space with $\mathcal{X}\in\mathbb{R}^{d}$ and $\mathcal{Y}=\{1,2,\ldots,K\}$ is the label space. The training samples are drawn independently and identically from the unknown distribution $\mathcal{D}$, which is the joint distribution over $\mathcal{X}\times\mathcal{Y}$ with density $p(\bm{x},y)$. Then the critical work is to find a decision function $\bm{g}:\mathcal{X}\rightarrow\mathbb{R}^{K}$ that minimizes the classification risk with loss function $\ell:\mathcal{X}\times\mathcal{Y}\rightarrow\mathbb{R}^{+}$: \begin{equation} \label{E1} R(g):=\mathbb{E}_{p(\bm{x},y)}[\ell(\bm{g}(\bm{x}),y)]. \end{equation} Since the density $p(\bm{x},y)$ is unknown, the classification risk is approximated by the empirical risk: \begin{equation} \label{ordinary} \hat{R}(g):=\frac{1}{n}\sum_{i=1}^{n}\ell(\bm{g}(\bm{x}_{i}),y_{i}). \end{equation} \subsection{Complementary-Label Learning} In the CLL setting, each sample is equipped with a complementary label. The complementarily labeled data $\{(\bm{x}_i,\overline{y}_{i})\}_{i=1}^{n}$ are sampled independently and identically from a joint distribution with density $\overline{p}(\bm{x},\overline{y})$. In \cite{DBLP:conf/nips/IshidaNHS17}, an assumption on density $\overline{p}(\bm{x},\overline{y})$ was made: \begin{equation} \label{E2} \overline{p}(\bm{x},\overline{y})=\frac{1}{K-1}\sum_{y\neq\overline{y}}p(\bm{x},y). \end{equation} Under this assumption, \cite{DBLP:conf/nips/IshidaNHS17} proved that classification risk (\ref{E1}) can be recovered by an unbiased estimator only from complementarily labeled data. However, the loss functions are restricted to one-versus-all and pairwise comparison multi-class loss functions \cite{TZhang}. Moreover, the binary loss functions $\ell^{'}(z): \mathbb{R}\rightarrow\mathbb{R}^{+}$ used in the two multi-class loss functions are required to fulfill symmetric condition: $\ell^{'}(z)\!+\!\ell^{'}(-z)=1$. Obviously, the popular softmax cross-entropy loss and all the other convex loss functions do not meet these conditions. Since the softmax cross-entropy loss is widely used in deep learning, this requirement will be a serious limitation for the application of state-of-the-art deep models. To make deep models available, \cite{DBLP:conf/eccv/YuLGT18} proposed another risk estimator limited to softmax cross-entropy loss. Though the risk estimator is not necessarily unbiased, the method is ensured to identify the optimal classifier that minimizes classification risk (\ref{E1}) by minimizing its learning object. The method also introduces bias into the choice of complementary labels. However, in the stages of bias estimation, ordinarily labeled data are required. The severe requirement might not align with the motivation of complementary-label learning. The limitations above were removed in \cite{DBLP:conf/icml/IshidaNMS19}. An unbiased risk estimator with only complementarily labeled data was deduced by taking a different approach than \cite{DBLP:conf/nips/IshidaNHS17}. With the same assumption (\ref{E2}) adopted, the risk formulation is valid for arbitrary losses and models. Experiments on both linear and deep models showed the superiority of the estimator in \cite{DBLP:conf/icml/IshidaNMS19} than those in previous works \cite{DBLP:conf/nips/IshidaNHS17,DBLP:conf/eccv/YuLGT18}. Nevertheless, the estimator is still confined within single-complementary-label setting, where each sample is given merely one complementary label. The unlabeled data are also neglected in previous CLL studies, which prevents the CLL from being a more general framework. \begin{figure*}[t] \centerline{\includegraphics[width = 20cm, height = 7.5cm,trim=10 140 160 80,clip]{comp.pdf}} \caption{The demonstration of previous CCL setting and the proposed MCL\&MCUL settings.} \label{Comp} \end{figure*} The MCUL framework proposed in this paper further enables learning from both multi-complementarily labeled samples and unlabeled samples. Figure \ref{Comp} describes the differences between the previous CLL setting and the proposed MCUL setting. \section{Proposed Frameworks} In this section, we propose our framework to enable unbiased estimation of classification risk from both multi-complementarily labeled data and unlabeled data. We first prove that the classification risk can be recovered from multi-complementarily labeled data under a mild assumption by employing the risk rewrite technique \cite{UU}. Then we further present the risk formulation of MCUL and show the estimation error bounds of the two methods. {\em \textbf{Notations and Settings:}} Denote by $\overline{\mathcal{Y}}\!=\!\{1,\ldots,K\}$ the complementary label space. $\mathcal{\overline{Y}}_{c}$ is the collection of all the possible combinations of $c$ different complementary labels, e.g. $\overline{Y}_{c}=\{1,\ldots,c\}\in\mathcal{\overline{Y}}_{c}$. $\overline{Y}_{c}$ is referred to as complementary-label set in the following sections. Suppose the training samples are sampled as follows: \begin{align} &\mathcal{S}_{u}:=\{\bm{x}^{u}_{i}\}_{i=1}^{n_{u}}\mathop{\sim}\limits^{i.i.d.} p(\bm{x}),\nonumber\\ &\mathcal{S}_{c}:=\{(\bm{x}^{c}_{i},\overline{Y}^{c}_{i})\}_{i=1}^{n_{c}}\mathop{\sim}\limits^{i.i.d.} \overline{p}_{c}(\bm{x},\overline{Y}),~~c=1,\ldots,K\!-\!1.\nonumber \end{align} where $p(\bm{x})$ is the marginal density and $\overline{p}_{c}(\bm{x},\overline{Y})$ is the density on $\mathcal{X}\times\overline{\mathcal{Y}}_{c}$. $\mathcal{S}_{u}$ are the unlabeled data and $\mathcal{S}_{c}$ are the multi-complementarily labeled data with complementary-label sets of size $c$. The size of complementary-label set $\overline{Y}$ is denoted by $|\overline{Y}|$ and $|\mathcal{S}_{c}|=n_{c},~c=1,\ldots,K-1$. \subsection{Multi-Complementary Label Learning (MCL)} In this section, we give an account of the risk minimization framework of multi-complementary label learning. As in the previous works, we first make assumptions on the relation between density $\overline{p}_{c}(\bm{x},\overline{Y})$ and $p(\bm{x},y)$. \begin{align} \label{E3} \overline{p}_{c}(\bm{x},\overline{Y})=\dfrac{1}{\binom{K\!-1}{\mbox{\textit{c}}}}\sum\limits_{y\notin\overline{Y}}p(\bm{x},y). \end{align} The assumption implies each combination of $c$ complementary labels are selected uniformly, which is a mild generalized assumption of those in the previous works \cite{DBLP:conf/nips/IshidaNHS17,DBLP:conf/eccv/YuLGT18,DBLP:conf/icml/IshidaNMS19}. Under this assumption, we prove that the \textit{multi-complementary loss} allows unbiased estimation of classification risk (\ref{E1}) from samples with complementary-label sets: \begin{lemma} \label{T1}Suppose the density $\overline{p}_{c}(\bm{x},\overline{Y})$ and $p(\bm{x},y)$ follow the assumption (\ref{E3}). For \textbf{any} loss function $\ell$ and decision function $\bm{g}$, the classification risk (\ref{E1}) is equal to the risk formulation below: \begin{equation} \label{E4} R_{c}(\bm{g})=\mathbb{E}_{\overline{p}_{c}(\bm{x},\overline{Y})}[\overline{\ell}(\bm{g}(\bm{x}),\overline{Y})]. \end{equation} where $\overline{\ell}$ is the multi-complementary loss: \begin{equation} \overline{\ell}(\bm{x},\overline{Y}):=\sum\limits_{y=1}^{K}\ell(\bm{g}(\bm{x}),y)-\dfrac{K\!-\!1}{|\overline{Y}|}\sum\limits_{y\in\overline{Y}}\ell(\bm{g}(\bm{x}),y). \end{equation} \end{lemma} The proof can be found in the Appendix \ref{AA}. For ease of notation, we the following notation for cumulative loss $\sum\limits_{y=1}^{K}\ell(\bm{g}(\bm{x}),y)$: \begin{align} \mathcal{L}(\bm{g}(\bm{x})):=\sum\limits_{y=1}^{K}\ell(\bm{g}(\bm{x}),y). \end{align} Due to the notation, we can further rewrite the multi-complementary loss into the form below: \begin{align} \label{E5} \overline{\ell}(\bm{x},\overline{Y}):=\mathcal{L}(\bm{g}(\bm{x}))-\dfrac{K\!-\!1}{|\overline{Y}|}\sum\limits_{y\in\overline{Y}}\ell(\bm{g}(\bm{x}),y). \end{align} Notice that the cumulative loss $\mathcal{L}(\bm{g}(\bm{x}))=\sum\limits_{y=1}^{K}\ell(\bm{g}(\bm{x}),y)$ is obtained by summing up the loss of the prediction $\bm{g}(\bm{x})$ \textit{w.r.t.} all the potential labels $y\in\{1,\ldots,K\}$, so it only relies on the sample $\bm{x}$ and the classifier $\bm{g}(\cdot)$. As a result, the label information used in the calculation of multi-complementary loss (\ref{E5}) is only complementary-label set $\overline{Y}$. Therefore, the multi-complementary label learning setting totally gets rid of the dependence on true labels. The risk formulation in Lemma \ref{T1} shows that the classification risk can be recovered only from samples with complementary-label sets of fixed size $c$. However, the complementary-label sets of samples are \textit{not} necessarily limited to a certain size in reality. To completely remove the limitation on the size of complementary-label set, we consider the convex combination of $R_{c}(\bm{g})$ called \textit{multi-complementary risk}. \begin{definition}\label{D1}(Multi-Complementary Risk)~For any decision function $\bm{g}$, its MCL risk is defined as: \begin{equation} \label{tot1} R_{\mbox{\tiny{\rm{MCL}}}}(\bm{g})=\sum_{c=1}^{K-1}\alpha_{c}R_{c}(\bm{g}), \end{equation} where $\bm{\alpha}$ is any vector in $\{\bm{\alpha}\big|\sum\limits_{c=1}^{K-1}\alpha_{c}=1,~\bm{\alpha}\succeq\bm{0}\}$. \end{definition} \begin{theorem} The MCL risk is equal to classification risk (\ref{E1}): \begin{equation} R_{\mbox{\tiny{\rm{MCL}}}}(\bm{g})=R(\bm{g}). \end{equation} \end{theorem} \begin{proof} Due to Lemma \ref{T1}, we can get $R_{c}(\bm{g})=R(\bm{g})$. Then the following equations holds:$$R_{\mbox{\tiny{MCL}}}(\bm{g})=\sum\limits_{c=1}^{K-1}\alpha_{c}R_{c}(\bm{g})=\sum\limits_{c=1}^{K-1}\alpha_{c}R(\bm{g})=R(\bm{g}).$$ \end{proof} The empirical MCL risk is as below: \begin{align} \label{unbiased} \hat{R}_{\mbox{\tiny{MCL}}}(\bm{g}) =\sum\limits_{c=1}^{K-1}\dfrac{\alpha_{c}}{n_{c}}\sum\limits_{i=1}^{n_{c}}\left(\mathcal{L}(\bm{g}(\bm{x}_{i}^{c}))-\dfrac{K\!-\!1}{\mbox{\textit{\large c}}}\sum\limits_{y\in\overline{Y}_{i}^{c}}\ell(\bm{g}(\bm{x}_{i}^{c}),y)\right). \end{align} Then the following work is to find the minimizer $\hat{\bm{g}}_{\mbox{\tiny{MCL}}}$ of empirical MCL risk: \begin{equation} \hat{\bm{g}}_{\mbox{\tiny{MCL}}}=\mathop{\mbox{arg~min}}\limits_{\bm{g}\in\mathcal{G}^{K}}\hat{R}_{\mbox{\tiny{MCL}}}(\bm{g}). \end{equation} where $\mathcal{G}=\{g(\bm{x})\}$ is a real function class and $\mathcal{G}^{K}=[\mathcal{G}_{i}]^{K}_{i=1}$ is a $K$-dimensional function class. In (\ref{unbiased}), all the samples are taken into consideration regardless of the size of their complementary-label sets. Since there is no restriction on loss function $\ell$ and classifier $\bm{g}$, any loss and model is available for the multi-complementary learning framework. \begin{remark}{\rm There are some special cases in the multi-complementary label learning setting. If $\alpha_{1}=1$, the proposed estimator will reduce to the estimator in single-complementary-label setting \cite{DBLP:conf/icml/IshidaNMS19}. If $\alpha_{K-1}=1$, the proposed estimator will be the same with that in ordinary classification problem (\ref{ordinary}). According to the special cases, the proposed MCL proved to be a comprehensive weakly-supervised learning framework.} \end{remark} \subsection{Multi-Complementary and Unlabeled Learning (MCUL)} To utilize both multi-complementarily labeled data and unlabeled data, we further rewrite the risk formulation and propose the MCUL framework. Based on Lemma \ref{T1}, we can incorporate the unlabeled data to construct an unbiased estimator of classification risk (\ref{E1}): \begin{lemma} \label{T2} The classification risk (\ref{E1}) is equal to the risk formulation below: \begin{align} \label{Eu} R_{c}^{u}(\bm{g})\!&=\!\mathbb{E}_{\overline{p}_{c}(\bm{x},\overline{Y})}\left[(1\!-\!\gamma)\mathcal{L}(\bm{g}(\bm{x}))\!-\!\dfrac{K\!-\!1}{c}\sum\limits_{y\in\overline{Y}}\ell(\bm{g}(\bm{x}),y)\right]\!+\!\gamma\mathbb{E}_{p(\bm{x})}\!\left[\mathcal{L}(\bm{g}(\bm{x}))\right] \end{align} where $\gamma\in[0,1]$ is the trade-off coefficient. \end{lemma} \begin{proof} The cumulative loss $\mathcal{L}(\bm{g}(\bm{x}))$ is independent of $\overline{Y}$, and thus: \begin{align} \mathbb{E}_{p(\bm{x})}\left[\mathcal{L}(\bm{g}(\bm{x}))\right]=\mathbb{E}_{\overline{p}_{c}(\bm{x},\overline{Y})}\left[\mathcal{L}(\bm{g}(\bm{x}))\right].\nonumber \end{align} According to the equation above and Lemma \ref{T1}, we can obtain:$$R_{c}^{u}(\bm{g})=R_{c}(\bm{g})=R(\bm{g}).$$ \end{proof} In the same manner as in the derivation of (\ref{tot1}), we can derive the \textit{multi-complementary and unlabeled risk}: \begin{definition}(Multi-Complementary\&Unlabeled Risk)~For any decision function $\bm{g}$, its MCUL risk is defined as: \label{D2} \begin{align} \label{MCUL} R_{\mbox{\tiny{{\rm MCUL}}}}(\bm{g})&=\sum\limits_{c=1}^{K-1}\alpha_{c}R_{c}^{u}(\bm{g}). \end{align} where $\bm{\alpha}$ is any vector in $\{\bm{\alpha}\big|\sum\limits_{c=1}^{K-1}\alpha_{c}=1,~\bm{\alpha}\succeq\bm{0}\}$. \end{definition} When the trade-off coefficient $\gamma$ is set to 0, the MCUL risk is the same with MCL risk (\ref{tot1}). The following Theorem allows unbiased estimation with both unlabeled data and multi-complementarily labeled data. \begin{theorem} The MCUL risk is equal to classification risk (\ref{E1}): \begin{equation} R_{\mbox{\tiny{{\rm MCUL}}}}(\bm{g})=R(\bm{g}). \end{equation} \end{theorem} The Theorem can be proven in the same way as in Theorem \ref{tot1}. We can approximate the MCUL risk by the empirical MCUL risk below: \begin{align} \label{EMMCUL} \hat{R}_{\mbox{\tiny{MCUL}}}(\bm{g})=&\dfrac{\gamma}{n_{u}}\sum\limits_{i=1}^{n_{u}}\mathcal{L}(\bm{g}(\bm{x}^{u}_{i}))+\sum\limits_{c=1}^{K-1}\dfrac{\alpha_{c}(1-\gamma)}{n_{c}}\mathcal{L}(\bm{g}(\bm{x}_{i}^{c}))\nonumber\\&-\sum\limits_{c=1}^{K-1}\dfrac{\alpha_{c}(K\!-\!1)}{c\!\cdot\!n_{c}}\sum\limits_{i=1}^{n_{c}}\sum\limits_{y\in\overline{Y}_{i}^{c}}\ell(\bm{g}(\bm{x}_{i}^{c}),y). \end{align} Notice that the unlabeled data are used for construct the estimator of cumulative loss since the calculation of $\mathcal{L}(\bm{g}(\bm{x}))$ does not need any label information. Theorem \ref{T2} shows that this incorporation can still yields an unbiased estimator of classification risk (\ref{E1}). Then the following work is to find the minimizer $\hat{\bm{g}}_{\mbox{\tiny{MCUL}}}$ of empirical MCUL risk: \begin{equation} \hat{\bm{g}}_{\mbox{\tiny{MCUL}}}=\mathop{\mbox{arg~min}}\limits_{\bm{g}\in\mathcal{G}^{K}}\hat{R}_{\mbox{\tiny{MCUL}}}(\bm{g}). \end{equation} Compared with the empirical MCL risk (\ref{unbiased}), the empirical MCUL risk (\ref{MCUL}) further incorporates the unlabeled data into the risk formulation. With the incorporation of easily accessible unlabeled data, the estimation error bound will be tighter, which indicates a better decision function $\bm{g}$. The claim is further validated in the following sections. \section{Estimation Error Bounds of MCL and MCUL} In this section, we give the estimation error bounds of the proposed MCL and MCUL frameworks. Suppose the non-negative loss function $\ell$ does not exceed $C_{\ell}$ on feature space $\mathcal{X}$ and let $L_{\ell}$ be the Lipschitz constant of $\ell$. $\mathfrak{R}_{n}(\mathcal{G})$ is the Rademacher complexity \cite{foundation} of function class $\mathcal{G}$ with sample size of $n$ from $p(\bm{x})$ and we suppose it decays in the rate of $\mathcal{O}(1/\sqrt{n})$. We have the following estimation error bounds, which show the convergence of $\hat{\bm{g}}_{\mbox{\tiny{MCL}}}$ and $\hat{\bm{g}}_{\mbox{\tiny{MCUL}}}$ to the optimal decision function $\bm{g}^{*}=\mathop{\mbox{arg~min}}\limits_{\bm{g}\in\mathcal{G}^{K}}R(\bm{g})$: \begin{theorem}(Estimation error bound of MCL) For any $\delta>0$, with probability at least $1-\delta$: \label{MCL_bound} \begin{align} R(\hat{\bm{g}}_{\mbox{\tiny{MCL}}})\!-\!R(\bm{g}^{*})&\leq\sum\limits_{c=1}^{K-1}2K\left(\frac{K-1}{\mbox{\textit{c}}}+1\right)\alpha_{c}\nonumber\\&\times\left(2KL_{\ell}\mathfrak{R}_{n_{c}}(\mathcal{G})+C_{\ell}\sqrt{\dfrac{\ln(2K/\delta)}{2n_{c}}}\right). \end{align} \end{theorem} \begin{theorem}(Estimation error bound of MCUL) For any $\delta>0$, with probability at least $1-\delta$: \label{MCUL_bound} \begin{align} R(\hat{\bm{g}}_{\mbox{\tiny{MCUL}}})\!-\!R(\bm{g}^{*})=\mathcal{O}(1/\sqrt{n_{u}}+\sum\limits_{c=1}^{K-1}1/\sqrt{n_{c}}). \end{align} \end{theorem} The proof of the theorems above can be found in the Appendix \ref{AB}. \begin{remark}{\rm From Theorems \ref{MCL_bound} and \ref{MCUL_bound}, we can learn the estimation error bounds of the proposed methods are in the optimal convergence rate without any additional assumption \cite{vapnik}. Moreover, with increasing number of unlabeled data, the error bound of MCUL will get tighter, which implies the helpfulness of utilizing unlabeled data.}\end{remark} \section{Integration of Class-Prior Information} In the previous sections, a sample with $c$ complementary labels is considered to be sampled from the distribution with density $\overline{p}_{c}(\bm{x},\overline{Y})$, which is independent from the class-prior probability $p(|\overline{Y}|=c)$. In practical situations, however, the class-prior may be accessible. For example, in \cite{CR}, the class-prior can be estimated from the given data; the prior is simply approximated by the relative frequency in \cite{DBLP:conf/icml/IshidaNMS19}. \cite{PUPN} proves the helpfulness of integrating the class-prior into learning algorithm. As can be seen, it is promising to further enhance the capability of proposed MCL and MCUL framework by utilizing the class-prior information. Notice that ${\overline{p}_{c}(\bm{x},\overline{Y})}$ is the conditional density $\overline{p}\left(\bm{x},\overline{Y}\left||\overline{Y}|=c\right.\right)$ in essence. Then the following equation holds: \begin{align} \label{cond} \overline{p}(\bm{x},\overline{Y})=\overline{p}_{c}(\bm{x},\overline{Y})\pi_{c}. \end{align} where $\pi_{c}=p(|\overline{Y}|=c)$ and $|\overline{Y}|=c$. Due to the equation (\ref{cond}), we can integrate the class-prior information into the risk formulations of MCL and MCUL as follows: \begin{theorem}(MCL$^{cl}$ risk and MCUL$^{cl}$ risk) \label{CPI} \begin{align} \label{tot2}&R(\bm{g})=\mathbb{E}_{\overline{p}(\bm{x},\overline{Y})}\left[\mathcal{L}(\bm{g}(\bm{x}))-\lambda\sum\limits_{y\in\overline{Y}}\ell(\bm{g}(\bm{x}),y)\right]\\ \label{tot3}&=\mathbb{E}_{\overline{p}(\bm{x},\overline{Y})}\left[(1-\gamma)\mathcal{L}(\bm{g}(\bm{x}))-\lambda\sum\limits_{y\in\overline{Y}}\ell(\bm{g}(\bm{x}),y)\right]+\gamma\mathbb{E}_{\overline{p}(\bm{x})}\left[\mathcal{L}(\bm{g}(\bm{x}))\right] \end{align} where $\lambda=({K-1})/{\sum\limits_{c=1}^{K-1}c\pi_{c}}$ and $\gamma\in[0,1]$ is a trade-off parameter. (\ref{tot2}) and (\ref{tot3}) are called MCL$^{cl}$ risk and MCUL$^{cl}$ risk respectively. \end{theorem} The proof can be found in the Appendix \ref{AC}. From the Theorem \ref{CPI}, the coefficient $\bm{\alpha}$ in (\ref{tot1}) and (\ref{MCUL}) is substituted by the class-prior $\pi_{c}$. Compared with (\ref{tot1}) that converges in the rate of $\mathcal{O}(\sum_{c=1}^{K-1}1/\sqrt{n_{c}})$, MCL$^{cl}$ risk (\ref{tot2}) converges in $\mathcal{O}(1/\sqrt{n})$, which often indicates a faster convergence rate. We will experimentally evaluate the helpfulness of integrating class-prior information in the next section. \section{Experiments} In this section, we experimentally evaluate the proposed methods on nine benchmark datasets including: PENDIGITS, LETTER, SATIMAGE, USPS, MNIST \cite{MNIST}, Fashion-MNIST \cite{FMNIST}, Kuzushi-MNIST \cite{kmnist}, EMNIST-balanced \cite{EMNIST} and SVHN \cite{SVHN}. The first three datasets can be downloaded from the \textit{UCI machine learning repository} and all the other datasets are available on public websites. We compare three complementary-label learning baseline methods: Pairwise Comparison(\textit{PC}) with sigmoid loss from \cite{DBLP:conf/nips/IshidaNHS17}, Forward Correction(\textit{Fwd}) from \cite{DBLP:conf/eccv/YuLGT18} and Gradient Ascent(\textit{GA}) from \cite{DBLP:conf/icml/IshidaNMS19}. The details of the datasets are shown in the following sections. The implementation is based on Pytorch. \subsection{Experimental Setup} In the experiments, the empirical risk minimization of MCL and MCUL is conducted by minimizing the risk formulation (\ref{unbiased}) and (\ref{EMMCUL}) \textit{w.r.t.} softmax cross-entropy loss. \textit{GA}, and \textit{Fwd} follow the setting above and \textit{PC} is trained with pairwise-comparison loss. \textit{Adam} \cite{Adam} is applied for optimization. All the datasets are split into training/testing sets with a 9:1 ratio and the training sets are further divided into training/validation sets with the same ratio. To ensure that the assumption (\ref{E3}) is satisfied, each complementary-label set of size \textit{c} is generated by randomly choosing \textit{c} labels from the candidate labels other than the true label. Though a sample with \textit{c} complementary labels can be simply split into \textit{c} samples with one complementary label each, it's obvious that the \textit{c} samples are not independent of each other. Therefore this approach will lead to serious violation of the fundamental \textit{i.i.d.} assumption. For fair comparison in these experiments, the complementary labels are generated in the same way as in \cite{DBLP:conf/icml/IshidaNMS19}. For PENDIGITS, LETTER, SATIMAGE, USPS, and MNIST, a linear-in-input model with a bias term is used. For MNIST, the learning rate is fixed to 1e-4; weight decay 1e-4; maximum iterations 60000; and batch size is set to 100. For the rest datasets, the learning rate is selected from $\{$1e-1, 1e-2, 1e-3, 1e-4$\}$ and the number of maximum iterations is changed to 5000. For Fashion-MNIST, Kuzushi-MNIST and EMNIST-balanced, a MLP model(\textit{d}-500-\textit{K}) is trained for 300 epochs. The learning rate and weight decay are fixed to 1e-4 and the batch size is 256. For SVHN, Resnet-18 \cite{resnet} is deployed and trained for 120 epochs. The learning rate is selected from $\{$1e-2, 1e-3, 1e-4$\}$ and weight decay is fixed to 5e-4. To alleviate overfitting by forcing the non-negativity of loss functions \cite{nn}, in the experiments on flexible models, MCL and MCUL losses are replaced by their absolute values. Experiments on datasets with or without unlabeled samples are both conducted. When the unlabeled samples are incorporated, we randomly set 99\% of training samples to be unlabeled for datasets with less than 50000 samples, which is a common setting in previous studies of weakly-supervised learning \cite{DBLP:conf/icml/SakaiPNS17,nn}. The fraction is further increased to 99.5\% for datasets with more than 50000 samples. In respect of parameter setting, the setting of baseline methods follow the previous work \cite{DBLP:conf/icml/IshidaNMS19}. For MCUL, we use $\gamma\!=0.1$. The parameter $\bm{\alpha}$ is set according to the equations below: $$\begin{cases} \alpha_{i}:\alpha_{j}= \frac{n_{i}}{(K-i)^{2}}:\frac{n_{j}}{(K-j)^{2}}.\\ \sum_{i=1}^{K-1}\alpha_{1} =1. \end{cases}$$ In our methods, we make no assumption on the distribution of the size of complementary-label sets. To generate the multi-complementarily labeled samples as close to the reality, we suppose that samples with too few or too many complementary labels are less likely to appear. Then the $n_{i}$ follows the equation below: $$n_{i}:n_{j}=e^{-(i-\mu)^{2}}:e^{-(j-\mu)^{2}}.$$ In the experiments, $\mu = \frac{K}{2}$ is used. \subsection{Experiments on Linear Model and Flexible Models} The experimental results of linear and flexible models are summarized in Table \ref{TB1} and Table \ref{TB22} respectively. The experimental results under the presence of unlabeled samples are shown in the second row corresponding to each dataset. \begin{table*}[htbp] \caption{\footnotesize Test mean and standard deviation of the classification accuracy of linear model for 10 trials. The best one is emphasized in bold. \#n, \#f and \#c denote the number of samples, features and classes of each dataset. The results of experiments under the presence of unlabeled samples are shown in the second row corresponding to each dataset.} \footnotesize \centering \begin{tabular}{ccccccccc}\hline \label{TB1} Datasets&\#n&\#f&\#c&\textit{PC}&\textit{Fwd}&\textit{GA}&\textit{MCL}&\textit{MCUL}\\\hline \rule{0pt}{10pt} \multirow{2}*{PENDIGITS}&\multirow{2}*{10092}&\multirow{2}*{16}&\multirow{2}*{10}&62.98$\pm$5.09&77.91$\pm$2.83&15.01$\pm$6.71&\textbf{84.32$\pm$1.09}&--~~$\pm$~~--\\&&&&5.98$\pm$4.24&8.09$\pm$1.71&11.05$\pm$5.05&11.44$\pm$5.68&\textbf{28.03$\pm$8.10}\\\rule{0pt}{15pt} \multirow{2}*{LETTER}&\multirow{2}*{20000}&\multirow{2}*{16}&\multirow{2}*{26}&9.17$\pm$2.44&9.37$\pm$2.52&4.68$\pm$0.81&\textbf{45.75$\pm$2.31}&--~~$\pm$~~--\\&&&&4.66$\pm$2.78&3.99$\pm$0.88&5.12$\pm$2.01&5.33$\pm$0.76&\textbf{8.41$\pm$1.86}\\\rule{0pt}{15pt} \multirow{2}*{SATIMAGE}&\multirow{2}*{6435}&\multirow{2}*{36}&\multirow{2}*{6}&74.05$\pm$4.65&77.45$\pm$5.43&38.32$\pm$1.82&\textbf{82.10$\pm$1.82}&--~~$\pm$~~--\\&&&&15.92$\pm$6.67&17.77$\pm$10.98&17.68$\pm$12.08&21.13$\pm$7.57&\textbf{51.35$\pm$7.94}\\\rule{0pt}{15pt} \multirow{2}*{USPS}&\multirow{2}*{9298}&\multirow{2}*{256}&\multirow{2}*{10}&41.75$\pm$5.45&46.15$\pm$13.10&14.19$\pm$6.07&\textbf{82.31$\pm$2.32}&--~~$\pm$~~--\\&&&&9.66$\pm$4.72&11.56$\pm$7.23&8.57$\pm$3.38&9.66$\pm$6.62&\textbf{26.20$\pm$3.98}\\\rule{0pt}{15pt} \multirow{2}*{MNIST}&\multirow{2}*{70000}&\multirow{2}*{784}&\multirow{2}*{10}&51.21$\pm$4.87&52.17$\pm$4.88&67.80$\pm$1.89&\textbf{77.36$\pm$1.27}&--~~$\pm$~~--\\&&&&13.78$\pm$4.16&13.58$\pm$2.11&14.86$\pm$1.77&25.86$\pm$3.49&\textbf{38.21$\pm$5.24}\\\hline \end{tabular} \end{table*} \begin{table*}[htbp] \footnotesize \caption{\footnotesize Test mean and standard deviation of the classification accuracy of flexible models for 4 trials. The best one is emphasized in bold. \#n, \#f and \#c denote the number of samples, features and classes of each dataset. The results of experiments under the presence of unlabeled samples are shown in the second row corresponding to each dataset.} \centering \begin{tabular}{ccccccccc}\hline \label{TB22} Datasets&\#n&\#f&\#c&\textit{PC}&\textit{Fwd}&\textit{GA}&\textit{MCL}&\textit{MCUL}\\\hline \rule{0pt}{10pt} \multirow{2}*{Fashion-MNIST}&\multirow{2}*{70000}&\multirow{2}*{784}&\multirow{2}*{10}&77.34$\pm$0.88&83.49$\pm$0.18&81.73$\pm$0.25&\textbf{84.97$\pm$0.09}&--~~$\pm$~~--\\&&&&25.75$\pm$4.39&23.36$\pm$3.05&22.34$\pm$3.18&49.81$\pm$4.42&\textbf{56.93$\pm$1.66}\\\rule{0pt}{15pt} \multirow{2}*{Kuzushi-MNIST}&\multirow{2}*{70000}&\multirow{2}*{784}&\multirow{2}*{10}&59.31$\pm$1.07&66.46$\pm$0.17&70.68$\pm$0.88&\textbf{79.25$\pm$0.28}&--~~$\pm$~~--\\&&&&16.35$\pm$4.92&12.94$\pm$2.72&15.13$\pm$2.42&23.42$\pm$1.15&\textbf{31.04$\pm$1.89}\\\rule{0pt}{15pt} \multirow{2}*{EMNIST-balanced}&\multirow{2}*{131600}&\multirow{2}*{784}&\multirow{2}*{47}&14.28$\pm$1.18&18.21$\pm$2.93&4.25$\pm$0.71&\textbf{65.41$\pm$0.22}&--~~$\pm$~~--\\&&&&2.36$\pm$0.36&2.68$\pm$0.08&2.54$\pm$0.36&4.14$\pm$1.13&\textbf{6.77$\pm$0.51}\\\rule{0pt}{15pt} \multirow{2}*{SVHN}&\multirow{2}*{99289}&\multirow{2}*{1024}&\multirow{2}*{10}&20.74$\pm$2.61&76.27$\pm$2.07&6.87$\pm$0.41&\textbf{83.27$\pm$0.55}&--~~$\pm$~~--\\&&&&14.77$\pm$1.27&12.95$\pm$0.75&17.56$\pm$1.54&19.05$\pm$0.44&\textbf{19.47$\pm$0.17}\\\hline\end{tabular} \end{table*} \begin{figure*}[htbp] \subfigure[FMNIST]{\includegraphics[keepaspectratio,width=8.5cm]{Fmnist.pdf}} \subfigure[KMNIST]{\includegraphics[keepaspectratio,width=8.5cm]{Kmnist.pdf}}\\ \subfigure[EMNIST-balanced]{\includegraphics[keepaspectratio,width=8.5cm]{Emnist.pdf}} \subfigure[SVHN]{\includegraphics[keepaspectratio,width=8.5cm]{SVHN.pdf}} \caption{The training curves of baseline methods and MCL on flexible models.} \label{F1} \end{figure*} {\em Results of MCL:} First we compare the proposed MCL framework with the three baseline methods. From the experimental results, we can see that MCL framework outperforms the baseline methods on all the datasets regardless of which model is applied. The superiority of MCL is especially apparent when the datasets have a large number of classes. Due to the experimental results on LETTER and EMNIST-balanced, it can be seen that the baseline methods can hardly generate effective classifiers. Furthermore, the training curves in Figure \ref{F1} show that in most cases, MCL can generate better classifiers and converge in a faster rate. Compared with the baseline methods, MCL remains valid owing to the capability of utilizing multi-complementarily labeled samples. {\em Results of MCUL:} From Table \ref{T1}, as can be seen, under the presence of a great percentage of unlabeled samples, the baseline methods suffer from the lack of complementarily labeled samples, while MCUL can still enhance its performance by incorporating unlabeled samples. Moreover, in the cases that only a small number of complementarily labeled samples are available, the performance of baseline methods \textit{GA} is seriously degraded due to the imprecise estimation of class prior, which is one of the reasons that the performance of \textit{GA} is relatively weak with a small fraction of complementarily labeled samples. \subsection{Experiments with Accessible Class-Prior Probability} In this section, we further show the benefits of integrating the class-prior information. We compare the performance of MCL and MCUL with MCL$^{cl}$ and MCUL$^{cl}$ on linear model. The experimental results are summarized in Table \ref{TB2} and the setup is consistent with that in the previous experiments. From the results, we can see that by integrating the class-prior probability, MCL$^{cl}$ outperforms MCL on most datasets and MCUL$^{cl}$ performs better than MCUL on all the datasets, which shows the helpfulness of utilizing the class-prior information when it is accessible. Furthermore, under the presence of a great percentage of unlabeled samples, the integration of class-prior information can always boost the performance of models. A rational explanation is that when supervision information is inadequate, the benefits of incorporating class-prior information is more conspicuous. \begin{table}[tbph] \caption{\footnotesize Test mean and standard deviation of the classification accuracy of linear model for 10 trials. The best one is emphasized in bold. The results of experiments under the presence of unlabeled samples are shown in the second row corresponding to each dataset.} \footnotesize \centering \begin{tabular}{ccccc}\hline \label{TB2} Datasets&\textit{MCL}&\textit{MCUL}&\textit{MCL}$^{cl}$&\textit{MCUL}$^{cl}$\\\hline\rule{0pt}{10pt} \multirow{2}*{PENDIGITS}&\textbf{84.32$\pm$1.09}&--~~$\pm$~~--&84.27$\pm$0.26&--~~$\pm$~~--\\&11.44$\pm$5.68&28.03$\pm$8.10&13.82$\pm$2.39&\textbf{38.47$\pm$5.68}\\\rule{0pt}{15pt} \multirow{2}*{LETTER}&45.75$\pm$2.31&--~~$\pm$~~--&\textbf{53.29$\pm$5.31}&--~~$\pm$~~--\\&5.33$\pm$0.76&8.41$\pm$1.86&17.32$\pm$1.84&\textbf{18.54$\pm$0.92}\\\rule{0pt}{15pt} \multirow{2}*{SATIMAGE}&82.10$\pm$1.82&--~~$\pm$~~--&\textbf{83.53$\pm$1.19}&--~~$\pm$~~--\\&21.13$\pm$7.57&51.35$\pm$7.94&39.61$\pm$9.57&\textbf{54.23$\pm$6.14}\\\rule{0pt}{15pt} \multirow{2}*{USPS}&\textbf{82.31$\pm$2.32}&--~~$\pm$~~--&81.07$\pm$1.58&--~~$\pm$~~--\\&9.66$\pm$6.62&26.20$\pm$3.98&24.29$\pm$4.72&\textbf{39.58$\pm$2.99}\\\rule{0pt}{15pt} \multirow{2}*{MNIST}&77.36$\pm$1.27&--~~$\pm$~~--&\textbf{81.47$\pm$2.46}&--~~$\pm$~~--\\&25.86$\pm$3.49&38.21$\pm$5.24&27.54$\pm$2.71&\textbf{41.58$\pm$5.27}\\\hline \end{tabular} \end{table} \section{Conclusion} We first derive the MCL framework to learn from samples with any number of complementary labels for arbitrary losses and models. Then we incorporate unlabeled data into the risk formulation and propose the MCUL framework to enhance the performance of MCL by learning from multi-complementarily labeled data and unlabeled data simultaneously. We further show that the estimation error bounds of the proposed methods are in the optimal parametric convergence rate. Finally, we conduct experiments and show our methods outperform the current state-of-the-art methods on both linear and deep model. A promising direction is applying our methods on crowdsourcing and other weakly-supervised classification scenarios, which is our future work. \section*{Acknowledgement} This work was supported in part by the National Natural Science Foundation of China under Grant 11671010, and Beijing Natural Science Foundation under Grant 4172035.
\section{Introduction} Les recherches récentes en traitement automatique du langage ont permis d'atteindre des performances proches des capacités humaines, notamment en ce qui concerne la détection de paraphrase ou l'évaluation de la similarité sémantique entre deux phrases\footnote{Voir les résultats obtenus sur le benchmark GLUE : \url{gluebenchmark.com}}. Cependant, ces avancées, fondées sur l'entraînement de réseaux de neurones sur de très vastes corpus de textes, sont à nuancer. En effet, malgré des progrès rapides ces dernières années dans l'adaptabilité des modèles de traitement du langage (GLUE, le benchmark de référence \citep{wang2018glue}, est constitué de 9 tâches différentes, et les modèles sont évalués en fonction de leur performance moyenne sur toutes ces tâches), il reste difficile d'adapter ces modèles à de nouvelles tâches. Dans cet article, nous nous intéressons ainsi à la similarité thématique de phrases\footnote{Plus précisément, nous nous intéressons à la similarité thématique de texte courts, ici des tweets, qui ont la particularité de n'être pas toujours grammaticalement corrects. Pour simplifier, nous considérons les tweets comme des phrases dans cet article.} (savoir si deux phrases parlent du même sujet), qui diffère dans certains cas de la similarité sémantique (savoir si deux phrases veulent dire la même chose) évaluée dans GLUE. Il est vrai que de nouveaux modèles, comme BERT \citep{devlin_2018_bert} sont prévus pour être facilement adaptés sur de nouveaux corpus. Cependant, toute transformation de la tâche initiale, même minime, demande d'adapter ce réseau en ayant recours au fine-tuning sur (au minimum) quelques milliers de phrases, ce qui implique des heures d'annotation manuelle pour créer un jeu de données adapté. Par ailleurs, même sur une tâche strictement identique, les performances annoncées dans la littérature ne sont parfaitement reproductibles que sur des corpus en anglais. Enfin, la plupart de ces modèles sont conçus pour être utilisés en entrée de systèmes de bout-en-bout (\textit{end-to-end}). Par exemple, pour calculer un score de similarité entre phrases avec BERT, il faut traiter chaque couple de phrases au lieu de chaque phrase. Ces architectures s'appliquent mal à des systèmes de recherche d'information qui supposent de comparer des centaines de milliers de phrases\footnote{Pour reprendre l'exemple proposé par \citet{reimers_2019_sentence}, si l'on cherche à trouver les deux phrases les plus similaires dans un corpus de $n$ = 10 000 phrases, le nombre de traitements à réaliser est $n(n-1)/2$ = 49 995 000 opérations, ce qui représente environ 65 heures de traitement avec BERT sur un GPU V100.}. Pour des tâches de clustering ou de recherche d'information, il est plus efficace de représenter chaque phrase dans un espace vectoriel où les phrases similaires sont proches (ce que l'on appelle un plongement lexical, \textit{embedding} en anglais), où l'on peut ensuite appliquer des mesures de distance classiques (cosinus, distance euclidienne). En utilisant des structures d'index adaptées, trouver la paire la plus similaire parmi 10 000 phrases peut dès lors s'effectuer en quelques millisecondes \citep{johnson_2019_billion}. Dans cet article, nous testons différents plongements lexicaux pour une tâche de clustering thématique de tweets : il s'agit de grouper ensemble les documents traitant du même sujet, dans des corpus de tweets concernant des événements médiatiques. Nous comparons une représentation traditionnelle des documents sous forme de vecteurs tf-idf \citep{sparck_1972_statistical} à des plongements lexicaux plus récents : Word2Vec \citep{mikolov2013efficient}, \textit{Universal Sentence Encoder} \citep{cer2018universal}, SBERT \citep{reimers_2019_sentence}. Afin d'obtenir un plongement lexical à partir de réseaux de neurones profonds, il est possible d'utiliser la sortie d'une couche intermédiaire en tant que représentation vectorielle d'une phrase, ce que nous testons également pour deux modèles, ELMo \citep{peters2018deep} et BERT. Nos expériences sont menées sur un jeu de données de tweets en anglais accessible publiquement \citep{mcminn2013building} ainsi que sur un jeu de données similaire de tweets en français annoté par notre équipe. Le code de nos expériences est disponible en ligne\footnote{\url{https://github.com/ina-foss/twembeddings}}. Nous montrons que les plongements lexicaux créés à partir de techniques récentes fondées sur des réseaux de neurones profonds ne permettent pas d'améliorer la performance de l'algorithme de clustering, même sur le jeu de données en anglais. Nous réalisons également plusieurs expériences de fine-tuning afin d'améliorer BERT et SBERT sur le corpus français. Dans ce cadre, nous montrons qu'utiliser un dataset traduit automatiquement de l'anglais en français (ici le benchmark STS\footnote{\url{http://ixa2.si.ehu.es/stswiki/index.php/STSbenchmark}}) est une piste valable pour obtenir des jeux de données de fine-tuning en français. Enfin, nous proposons une analyse détaillée des résultats obtenus et montrons la supériorité des approches classiques de type tf-idf pour le clustering de tweets. \section{État de l'art} Nous présentons tout d'abord dans cette partie les travaux antérieurs consacrés au clustering thématique de tweets, avec une attention particulière portée aux types de représentations vectorielles utilisées, puis nous détaillons les techniques existantes de plongement lexical de phrases. \subsection{Clustering thématique de tweets} Le clustering thématique de tweets vise à regrouper ensemble les tweets traitant du même sujet. Pour ce type de clustering, il est souvent fait appel à des algorithmes prenant en compte à la fois la similarité thématique des documents et leur proximité temporelle, afin de ne pas regrouper dans le même cluster des tweets émis à des époques très différentes. Par ailleurs, le nombre de thématiques (et donc de clusters) n'est pas connu à l'avance dans la plupart des cas. De ce fait, des techniques telles que l'algorithme ``First Story Detection", utilisé dans le système UMass \citep{allan_2000_detections}, sont souvent appliquées aux tweets. C'est notamment le cas chez \citet{petrovic_streaming_2010}, \citet{hasan_twitternews_2016}, et \citet{repp_extracting_2018}. \citet{petrovic_streaming_2010} proposent une méthode fondée sur du \textit{Locality Sensitive Hashing} pour accélérer la recherche, tandis que \citet{repp_extracting_2018} introduisent des mini-batches. Cet algorithme "FSD" est détaillé ci-dessous car c'est également celui que nous utilisons. \label{FSD} \begin{algorithm} \caption{``First Story Detection"} \begin{algorithmic}[1] \REQUIRE threshold $t$, window size $w$, corpus $C$ of documents in chronological order \ENSURE thread ids for each document \STATE $T \leftarrow \left[ \right] ; i \leftarrow 0 $ \WHILE{document $d$ in $C$} \IF{$T$ is empty} \STATE $thread\_id(d) \leftarrow i$ \STATE $i \leftarrow i+1$ \ELSE \STATE $d_{nearest} \leftarrow $ nearest neighbor of $d$ in $T$ \IF{$cosine(d, d_{nearest}) < t$} \STATE $thread\_id(d) \leftarrow thread\_id(d_{nearest})$ \ELSE \STATE $thread\_id(d) \leftarrow i$ \STATE $i \leftarrow i+1$ \ENDIF \ENDIF \IF{$|T| \geq w$} \STATE remove first document from $T$ \ENDIF \STATE add $d$ to $T$ \ENDWHILE \end{algorithmic} \end{algorithm} \citet{sankaranarayanan_twitterstand_2009} et \citet{becker2011beyond} utilisent un autre algorithme fondé sur la distance (pondérée par un facteur temporel) entre la moyenne des vecteurs de chaque cluster et chaque nouveau tweet. \citet{hasan_twitternews_2016} utilisent l'algorithme FSD dans un premier temps pour déterminer le caractère ``unique" d'un tweet (c'est-à-dire s'il est suffisamment éloigné des tweets précédents), mais l'attribution d'un tweet à un cluster se fait ensuite en fonction de la distance à la moyenne, de façon similaire à \citet{sankaranarayanan_twitterstand_2009}. Ici, nous utilisons l'algorithme FSD car il est fondé sur une simple mesure de distance, ce qui permet de bien tester la qualité des plongements sémantiques pour des tâches de clustering. Nous introduisons cependant la même variante ``mini-batch" que \cite{repp_extracting_2018} pour diminuer le temps de traitement. Dans ces travaux, les tweets sont représentés sous la forme de vecteurs tf-idf dans la grande majorité des cas \citep{sankaranarayanan_twitterstand_2009,petrovic_streaming_2010,becker2011beyond, hasan_twitternews_2016}. \citet{repp_extracting_2018} testent différents types de représentations des tweets (moyenne de Word2Vec, moyenne de GloVe, Doc2Vec, moyenne de Word2Vec pondérée par l'idf de chaque mot). Cependant ces représentations sont uniquement testées sur une tâche de classification, et la meilleure représentation (la moyenne de Word2Vec) est ensuite utilisée pour le clustering. Il nous paraît donc important de mettre à jour ces travaux en testant des plongements lexicaux récents, et notamment ceux développés en vue de la représentation de phrases. \subsection{Plongements lexicaux de texte} La méthode de ``vectorisation" la plus couramment utilisée jusque dans les années 2010 était le tf-idf, introduit par \citet{sparck_1972_statistical}. Il s'agit d'une amélioration du principe des vecteurs ``sac de mots" (\textit{``bag of words"}) \citep{harris1954distributional}, où chaque document est décrit par le nombre d'occurrences des mots qu'il contient (``term frequency"). La pondération tf-idf pondère chacun des mots inversement proportionnellement au nombre de documents dans lesquels il apparaît. \subsubsection{Plongements lexicaux de mots} Avec la publication de Word2Vec \citep{mikolov2013efficient} et GloVe \citep{pennington2014glove}, des méthodes fondées sur la prédiction du contexte de chaque mot (ou la prédiction de chaque mot en fonction de son contexte) ont permis de créer des vecteurs de mots porteurs d'une forme de sémantique autre que leurs fréquence dans le corpus. Ces représentations perdent cependant la faculté de décrire chaque document par un seul vecteur. Pour contourner ce problème, on représente souvent chaque document par la moyenne des vecteurs des mots qu'il contient. Avec ELMo \citep{peters2018deep} apparaît une nouvelle génération de modèles, permettant une représentation des mots non seulement en fonction de leur contexte général (les mots avec lesquels ils sont fréquemment employés dans le corpus d'entraînement), mais aussi en fonction de leur contexte local (dans une phrase en particulier). ELMo est fondé sur un réseau de neurones LSTM bi-directionnel entraîné à prédire dans les deux sens le prochain mot d'une séquence (c'est-à-dire prédire le prochain mot d'une phrase, mais aussi, étant donné la fin d'une phrase, prédire le mot venant juste avant). ELMo n'est toutefois pas prévu pour produire des plongements lexicaux de phrases, mais pour être utilisé en entrée de modèles neuronaux spécifiques à certaines tâches. Les auteurs testent néanmoins la performance de vecteurs de mots directement issus de la première couche ou de la deuxième couche de leur modèle (qui en contient trois) pour une tâche de désambiguïsation par recherche du premier plus proche voisin. Les résultats obtenus sont proches de l'état de l'art. BERT \citep{devlin_2018_bert} est plus générique encore qu'ELMo, car ce modèle ne nécessite aucune architecture spécifique à chaque type de tâche : il peut être fine-tuné sur un nouveau jeu de données en ajoutant simplement une couche de sortie. BERT est construit avec une architecture de type \textit{Transformer} \citep{vaswani2017attention}, et pré-entraîné sur deux types de tâches: prédire des mots masqués dans une phrase et prédire la phrase suivante dans un texte. Comme pour ELMo, les auteurs de BERT ne prévoient pas l'extraction de vecteurs de phrases à partir de leur modèle, mais ils démontrent qu'un simple transfer learning (extraction de vecteurs de mots sans fine-tuning utilisés à l'entrée d'un nouveau modèle) permet d'égaler l'état de l'art pour une tâche de détection d'entités nommées. \subsubsection{Plongements lexicaux de phrases} \label{embedding_phrases} Il existe un grand nombre de travaux cherchant à représenter les phrases par des vecteurs génériques, utilisables dans une très grande variété de tâches, notamment pour du transfer-learning. Ainsi Skip-Thought \citep{kiros2015skip} est fondée sur une architecture encodeur-décodeur entraînée à générer le passage encadrant une phrase donnée dans un texte. \citet{conneau2017supervised} montrent avec InferSent, un réseau LSTM bi-directionnel siamois (c'est-à-dire que le réseau prend deux phrases en entrée, mais ce sont les mêmes poids qui sont appliqués dans les deux parties du réseau), qu'un apprentissage supervisé fournit de meilleurs résultats pour la création de vecteurs de phrases génériques. En l'occurrence, InferSent est entraîné sur le jeu de données SNLI, qui contient 570 000 paires de phrases en anglais annotées manuellement en trois catégories : la première phrase implique la deuxième, la première phrase contredit la deuxième, ou la première phrase et la deuxième phrase sont mutuellement neutres. \citet{cer2018universal} (\textit{Universal Sentence Encoder}) appliquent les résultats de \citet{kiros2015skip} et \citet{conneau2017supervised} en entraînant une architecture de type \textit{Transformer} à la fois sur des tâches non-supervisées, comme Skip-Thought et sur le jeu de données SNLI, comme InferSent. Sentence-BERT \citep[SBERT,][]{reimers_2019_sentence} propose non pas des vecteurs universels, mais une architecture de fine-tuning du modèle BERT spécifiquement adaptée pour produire des plongements lexicaux de phrases adaptés à certains types de tâches. Ce modèle modifie BERT pour en faire un réseau siamois, complété par une dernière couche dépendante du type de tâche sur lequel le réseau est entraîné. Les auteurs testent leurs représentations sur le jeu de données STS (8628 paires de phrases auxquelles est associé un score de similarité entre 0 et 5) en calculant un simple score de similarité cosinus entre les vecteurs associés à chaque phrase. Ils montrent que les meilleures performances sur le jeu de données STS sont obtenues par un premier fine-tuning sur SNLI puis un second sur le jeu d'entraînement de STS. Nous détaillons dans la partie suivante les méthodes utilisées pour tester différents types de représentations (tf-idf, Word2Vec, ELMo, BERT, Universal Sentence Embedding, SBERT) pour la tâche de clustering dynamique de tweets. \section{Méthodes d'évaluation} Évaluer la ``qualité" d'un plongement lexical pour la représentation de tweets peut se faire selon différentes approches : d'une part, évaluer si la représentation permet une bonne séparabilité des différentes classes (événements). D'autre part, s'assurer que les vecteurs produits se prêtent bien à des mesures de distance, qui sont utilisées pour le clustering. Enfin, il faut évaluer la qualité des modèles pré-entraînés pour différentes langues. Nous avons donc, dans un premier temps, ramené la tâche de détection non supervisée d'événements à une tâche de classification. Dans un second temps, nous avons modélisé le problème de détection d'événements de façon plus réaliste comme un clustering dynamique, en utilisant l'algorithme FSD. Chaque type d'évaluation a été réalisé sur le jeu de données en anglais \citep{mcminn2013building} et sur notre propre corpus en français. Pour la classification des tweets, nous utilisons un classifieur de type SVM avec un kernel dit ``triangulaire" \citep{fleuret2003scale}. Ce kernel est de la forme $k(x, y) = 1 - ||x - y||$. Nos expériences montrent que ce type de kernel, en plus d'être invariant aux changements d'échelles \citep{fleuret2003scale}, s'applique à la fois à des vecteurs denses et creux, sans modification de paramètres, et obtient des performances similaires aux noyaux paramétriques sur du clustering de texte. Le classifieur est entraîné sur un échantillon aléatoire de 50\% du corpus. La classification est évaluée par la moyenne macro du score F1 de chaque classe. Pour le clustering, nous utilisons l'algorithme FSD (voir \ref{FSD}) en introduisant des ``mini-batch" de 8 tweets de façon à paralléliser la recherche de plus proche voisin. Les paramètres de cet algorithme sont $w$ (nombre de tweets du passé parmi lesquels on recherche un plus proche voisin) et $t$, le seuil de distance au-dessus duquel un tweet est jugé suffisamment éloigné des tweets passés pour former un nouveau cluster. La valeur de $w$ a été fixée différemment pour chaque corpus : elle est fixée à environ un jour d'historique de tweets, en fonction du nombre moyen de tweets par jour dans chaque corpus. On a ensuite testé différentes valeurs de $t$ pour chaque type de plongement lexical. D'une manière générale, des valeurs de $t$ plus basses entraînent une création de clusters plus fréquente, et donc une meilleure homogénéité intra-cluster, mais peuvent augmenter le sur-clustering. La performance du clustering est évaluée par une mesure que nous nommons ``F1 du meilleur appariement" (\textit{best matching F1}). Elle est définie par \citet{yang1998study}: on évalue le score F1 de chaque paire entre les clusters (détectés) et les événements (annotés). On apparie alors chaque événement au cluster pour lequel le score F1 est le meilleur. Chaque événement ne peut être associé qu'à un seul cluster. Le ``F1 du meilleur appariement" correspond donc à la moyenne des F1 des couples cluster/événement, une fois l'appariement réalisé. \section{Expériences réalisées} Nous présentons dans cette partie nos expériences, en détaillant le contenu des jeux de données utilisés puis le type de plongements lexicaux testés. Enfin nous revenons sur nos tests de fine-tuning visant à améliorer les performances de BERT et S-BERT sur le corpus français. \subsection{Jeux de données} \textbf{Corpus en anglais.} Le corpus \textit{Event2012} \citep{mcminn2013building} est le seul jeu de données publiquement accessible en anglais pour la détection d'événements sur Twitter. Il contient plus de 150 000 tweets annotés, au sein d'un corpus total de 120 millions de tweets collectés entre Octobre et Novembre 2012. Chaque tweet est associé à un identifiant d'événement parmi une liste de plus de 500 événements. L'annotation a été réalisée sur Amazon Mechanical Turk. Conformément aux conditions d'utilisation de l'API Twitter, les auteurs ne partagent pas directement le contenu des tweets, mais seulement leurs identifiants. Le corpus datant de 2012, beaucoup de tweets ont été effacés, et nous n'avons pu obtenir (en Mars 2019) que 66,5 millions de tweets du corpus initial (55\%), et seulement 72 790 tweets annotés (72\%). \textbf{Corpus en français.} Nous avons annoté notre propre jeu de données de tweets en français, \textit{Event2018}, à partir d'un corpus de 40 millions de tweets collectés entre Juillet et Août 2018. L'annotation a été réalisée manuellement par 3 étudiants en Sciences Politiques\footnote{Tous nos remerciements à Liza Héliès, Siegrid Henry et Antoine Moutiez pour leur annotation attentive}. Les événements ont été tirés aléatoirement parmi les articles parus pendant cette période dans 6 quotidiens français (\textit{Le Monde}, \textit{Le Figaro}, \textit{Les \'Echos} , \textit{Lib\'eration}, \textit{L'Humanit\'e}, \textit{M\'ediapart}) ainsi que parmi les événements particulièrement relayés sur Twitter durant cette période. Les annotateurs avaient pour consigne de trouver pour chaque événement des mots-clefs associés. Pour chaque mot-clef, les tweets contenant cette expression dans le corpus étaient affichés, et les annotateurs devaient sélectionner parmi ceux-ci ceux qui étaient en lien avec l'événement. Au total, 316 événements ont été annotés, avec un score inter-annotateurs \citep{randolph_free_2005} de 0,79. Un travail de regroupement des événements sur plusieurs jours a ensuite été effectué (par exemple, tous les rebondissements de l'affaire Benalla ont été regroupés en un seul événement), pour obtenir 243 "macro-événements", que nous utilisons comme vérité de terrain pour les tâches de clustering et de classification. Au total, 95 796 tweets ont été annoté comme liés à l'un de ces événements. Le corpus est accessible en ligne\footnote{\url{https://dataset.ina.fr/corpus}. Veuillez remplir le formulaire en indiquant le nom du jeu de données (Event2018). Conformément aux CGU de Twitter, nous ne fournissons pas le contenu des tweets mais seulement leurs identifiants. Un script permettant d'obtenir le texte des tweets est fourni dans notre dépôt github. En novembre 2019, 81\% des tweets annotés étaient encore disponibles.} à des fins de recherche. \subsection{Plongements lexicaux testés} Afin de mener nos expériences sur les deux corpus, nous avons choisis des modèles entraînés à la fois sur du français et de l'anglais. Cette sous-partie détaille les modèles utilisés. \textbf{Tf-idf.} Du fait de la brièveté inhérente aux tweets, nous avons simplifié le calcul de tf-idf à un simple calcul d'idf, car il est peu fréquent qu'un terme soit utilisé plusieurs fois dans le même tweet. La forme utilisée pour calculer le poids d'un terme $t$ dans un tweet est donc $idf(t) = 1 + log(n+1/df(t)+1)$, avec $n$ le nombre total de documents dans le corpus et $df(t)$ le nombre de documents du corpus qui contiennent $t$. Nous avons distingué deux modes de calcul pour $n$ et $df(t)$: \textbf{tfidf-dataset} désigne la méthode qui ne décompte que les tweets annotés, et \textbf{tfidf-all-tweets} désigne le mode de calcul qui prend en compte tous les tweets du corpus (plusieurs dizaines de millions de tweets) pour obtenir $n$ et $df(t)$. Pour chaque méthode, nous restreignons le vocabulaire avec une liste de \textit{stop-words} et un seuil $df_{min}$, le nombre minimum de tweets qui doivent contenir $t$ pour qu'il soit inclut dans le vocabulaire. Dans toutes nos expériences, $df_{min}=10$. On obtient donc un vocabulaire de près de 330000 mots en anglais et 92000 mots en français pour \textbf{tfidf-all-tweets}, et de 5000 mots en anglais et 9000 mots en français pour \textbf{tfidf-dataset}. \textbf{Word2Vec.} Nous avons utilisé des modèles pré-entraînés pour l'anglais, et entraînés nos propres modèles français. Pour chaque corpus, nous distinguons \textbf{w2v-twitter}, les modèles entraînés sur des tweets, et \textbf{w2v-news}, les modèles entraînés sur des articles de presse. Pour l'anglais, w2v-twitter est un modèle pré-entraîné publié par \citet{godin2015multimedia}\footnote{\url{github.com/loretoparisi/word2vec-twitter}} (400 dimensions) et w2v-news est un modèle entraîné sur Google News et publié par Google\footnote{\url{code.google.com/archive/p/word2vec/}} (300 dimensions). En français, w2v-twitter a été entraîné avec l'algorithme CBOW sur 370 millions de tweets collectés entre 2018 et 2019, et w2v-news a été entraîné de la même façon sur 1.9 millions de dépêches AFP collectées entre 2011 et 2019. Les deux modèles ont 300 dimensions. Comme Word2Vec fournit un plongement lexical de mots et non de phrase, la représentation des tweets est obtenue en moyennant les vecteurs de chaque mot. Deux méthodes ont été utilisées pour la moyenne : une moyenne simple, et une moyenne pondérée par l'idf (tfidf-all-tweets). \textbf{ELMo.} Pour l'anglais, nous avons utilisé le modèle publié sur TensorFlow Hub\footnote{\url{tfhub.dev/google/elmo/2}}. Pour le français, un modèle entraîné sur du français publié par \citet{che2018towards}\footnote{\url{github.com/HIT-SCIR/ELMoForManyLangs}}. Dans chaque cas, nous utilisons la moyenne des trois couches du réseau comme représentation de chaque mot. La représentation d'un tweet est produite en moyennant ces vecteurs (de dimension 1024). \textbf{BERT.} Google fournit un modèle en anglais et un modèle multilingue\footnote{\url{github.com/google-research/bert}. Modèles: bert-large, uncased et bert-base, multilingual cased}. Afin d'améliorer les performances du modèle multilingue sur des tweets en français, nous avons poursuivi l'entraînement pendant 150 000 étapes sur des tweets collectés en juin 2018. Nous désignons le modèle multilingue simple par \textbf{bert} et le modèle entraîné sur des tweets par \textbf{bert-tweets}. Dans chaque cas, nous avons utilisé l'avant-dernière couche du réseau (de dimension 768) comme plongement lexical, en moyennant les tokens pour obtenir une représentation de tweet. \textbf{Universal Sentence Encoder.} Les modèles fournis\footnote{\url{tfhub.dev/google/universal-sentence-encoder-large/3}}\textsuperscript{,}\footnote{\url{tfhub.dev/google/universal-sentence-encoder-multilingual-large/1}} (anglais et multilingue) sont prévus pour fournir des plongements lexicaux de phrases, nous avons donc pu les utiliser tels quels. Les vecteurs calculés sont de dimension 512. \textbf{Sentence BERT.} Les auteurs de SBERT fournissent des modèles pré-entraînés pour l'anglais\footnote{\url{github.com/UKPLab/sentence-transformers}. Modèle: bert-large-nli-stsb-mean-tokens}. Pour le français, nous avons dû réaliser un fine-tuning du modèle BERT multilingue, que nous présentons dans la sous-partie suivante. Les vecteurs obtenus sont de dimension 768. \subsection{Fine-tuning pour le corpus français} Le modèle SBERT est spécifiquement entraîné pour fournir des scores de similarité cosinus. Ainsi, sur le corpus STS de similarité sémantique, la fonction de coût est l'erreur quadratique moyenne entre le score de similarité cosinus entre les vecteurs des deux phrases et le score de similarité évalué manuellement dans le jeu de données. Ce type de modèles paraît particulièrement adapté pour notre algorithme de clustering, et en effet, parmi les plongements sémantiques de phrases (\textit{Universal Sentence Embedding} et SBERT) c'est celui qui fournit les meilleurs résultats de clustering en anglais (voir le tableau \ref{clustering}). Cependant, le modèle pré-entraîné en anglais est fondé sur le fine-tuning de BERT sur des tâches supervisées (voir la partie \ref{embedding_phrases} pour le détail des tâches SNLI et STS), ce qui ne peut pas être réalisé sans corpus en français annoté. Nous avons donc mis en place deux stratégies pour réaliser un fine-tuning du modèle bert-tweets sur des données en français: d'une part nous avons utilisé \textit{Cloud Translation API}\footnote{\url{cloud.google.com/translate/docs/reference/rest/}} dans la limite d'utilisation gratuite pour traduire une partie du dataset STS (nous avons obtenu 2984 paires de phrases en français). D'autre part, nous avons annoté manuellement 500 paires de titres d'articles de presse sélectionnés car ils contenaient des mots-clefs en commun. L'annotation s'est fait sur une échelle de 0 à 5, de la même façon que pour STS. Cependant, au lieu d'indiquer le degré de similarité sémantique entre les phrases, nous avons plutôt cherché à évaluer si les deux titres décrivaient le même événement. Les deux types de fine-tuning (corpus traduit, ou corpus traduit + corpus annoté) sont désignés par \textbf{sbert-tweets-sts-short} et \textbf{sbert-tweets-sts-long}. Les performances des différentes représentations sont décrites dans la prochaine partie. \begin{table}[ht] \begin{center} \input{results_classif.tex} \caption{Résultats de la classification des tweets en événements pour chaque corpus. La performance est calculée par la moyenne macro de la mesure F1 pour chaque classe. Chaque mesure est réitérée 5 fois avec des initialisations différentes. Chaque cellule indique la moyenne et l'écart-type de ces 5 mesures, en pourcentages.} \label{classif} \end{center} \end{table} \section{Résultats} D'une manière générale, pour les deux tâches, aucun des modèles testés ne parvient à faire mieux que le modèle tf-idf calculé sur l'ensemble du corpus (tfidf-all-tweets). Cependant, la performance relative des modèles varie selon la langue, et selon le type de tâche. Les résultats de classification par SVM (voir tableau \ref{classif}) montrent que BERT et ELMo ne fournissent pas des plongements lexicaux facilement séparables. Les modèles prévus pour être utilisés comme plongements lexicaux (Word2Vec, \textit{Universal Sentence Encoder}, SBERT) obtiennent de meilleurs résultats. Sur le corpus français, les résultats de ces modèles sont similaires à ceux des vecteurs tf-idf. Sur le corpus anglais, les vecteurs tf-idf demeurent les mieux adaptés, avec les vecteurs w2v-news pondérés par les poids tf-idf. Les vecteurs tfidf-all-tweets donnent également les meilleurs résultats pour la tâche de clustering (tableau \ref{clustering}), et ce de façon encore plus nette que pour la classification. Cela s'explique par la forme des vecteurs tf-idf, particulièrement adaptés aux calculs de similarité cosinus, ainsi que par les caractéristiques propres aux événements dans les deux jeux de données : les mêmes termes sont manifestement largement employés parmi les tweets d'un même événement. Concernant les modèles neuronaux adaptés aux plongements lexicaux de phrases (SBERT, \textit{Universal Sentence Encoder}), ils ne font pas mieux que les modèles w2v-news pondérés par tf-idf. Sur le corpus anglais, on note que le fine-tuning de \textit{Sentence-BERT} sur des corpus de similarité sémantique (sbert-nli-sts) permet de meilleurs résultats que les vecteurs génériques de \textit{Universal Sentence Encoder}. Notre propre fine-tuning de \textit{Sentence-BERT} (sbert-tweets-sts-short et sbert-tweets-sts-long) ne permet pas de surpasser \textit{Universal Sentence Encoder} sur le corpus français. On note cependant que le corpus de similarité thématique (qui ne contient que 500 paires de phrases) permet d'augmenter de 2 points la performance du clustering. Toutefois, ne disposant pas d'un corpus de taille similaire à SNLI, notre fine-tuning ne parvient pas à d'aussi bons résultats que le modèle anglais. \begin{table}[ht] \begin{center} \input{results_clustering.tex} \caption{Résultats du clustering de tweets par l'algorithme FSD. La performance est calculée en utilisant le score ``F1 du meilleur appariement" et affichée en pourcentages. Pour chaque modèle, on a sélectionné la meilleure valeur de seuil $t$ par tests successifs.} \label{clustering} \end{center} \end{table} \section{Conclusion} Dans cet article, nous cherchons à sélectionner le meilleur type de plongement lexical pour une tâche de détection non-supervisée d'événements dans un flux de tweets, que nous modélisons par un clustering dynamique. Nous montrons, sur un corpus en anglais et un corpus en français, qu'une représentation des tweets par tf-idf permet d'obtenir les meilleurs résultats par rapport à Word2Vec, BERT, ELMo, \textit{Universal Sentence Encoder} ou \textit{Sentence-BERT}. Nous montrons également qu'un fine-tuning sur un corpus de quelques centaines de paires de phrases annotées selon leur similarité thématique améliore de deux points les résultats de \textit{Sentence-BERT}, sans permettre néanmoins d'égaler les modèles entraînés sur des centaines de milliers d'examples. \bibliographystyle{rnti}
\section{Introduction} During the last 10-15 years both spectroscopic and photometric observations have definitely established that individual Galactic globular clusters (GCs) host multiple populations (MPs) of stars, characterised by C-N, O-Na (and also, but not always, Mg-Al) anticorrelations and He abundance spreads \citep[see, e.g.][]{gcb, m17, He18, bl18, g19}. Scenarios for the origin of MPs \citep[reviewed, e.g, by][]{r15, bl18} generally invoke more than one episode of star formation, envisaging that stars with CNONa (and He) abundance ratios similar to those observed in halo field stars are the first objects to form (P1 stars), whilst stars enriched in N and Na (and He) and depleted in C and O formed later (P2 stars). These P2 stars are supposed to form out of chemically processed material ejected by some class of massive P1 stars, usually denoted as polluters. To date, none of the proposed polluters can explain quantitatively the full ensemble of chemical patterns observed in individual GCs \citep[][]{r15, bl18}. Photometric \citep[see, e.g.,][and references therein]{larsen14, dale16, gilligan19, lagioia, nardiello19} and to a lesser extent spectroscopic \citep{m09} observations have also shown that MPs are not confined only to Galactic GCs, but are present also in old clusters of the Magellanic Clouds, Fornax and M31. Integrated spectroscopy of old extragalactic clusters in M31 also confirms the signature of MPs amongst old massive stellar clusters \citep[see, e.g.,][]{s13} A further recent development has seen the detection of MPs in resolved massive extragalactic clusters down to ages of $\sim$2~Gyr through spectroscopy \citep{hollyhead17, h19}, and to a much larger extent photometry \citep[see, e.g.,][and references therein]{n17, n17b, martocchia,lagioia,nardiello19,mart19,milone19}. Even more recently \citet{bastian19} found a signature of MPs also in an intermediate-age massive clusters belonging the galaxy NGC~1316, from integrated spectroscopy. These new results are extremely important, for they clearly point to a connection between the formation of old GCs and much younger massive clusters. As mentioned above, photometry plays a crucial role in the detection and characterization of MPs in resolved clusters. Several authors have shown, both empirically and theoretically \citep[see, e.g.,][]{sw06, marino, yong, sbordone, cmp13, dale16, mucc16, m17, dale18, jwst}, that appropriate choices of filters, colours and colour combinations (these latter usually denoted as \textit{pseudocolours}) are sensitive to the abundance of mainly nitrogen (plus carbon and oxygen to a much lesser extent) in the atmospheres of the target stars, and can clearly detect the presence of MPs \citep[see, e.g.,][]{sumo, p15, m17, n17, jwst}. Due to the distance of the targets, red giant branch (RGB) stars are typically observed for photometric (and also spectroscopic) MP detection. By analyzing results for a number of Magellanic Cloud (MC) clusters covering a large range of ages (2-8~Gyr), \citet{martocchia} and \citet{mart19} -- hereinafter M19-- found in their sample a general trend between the measured width of a cluster RGB and the cluster age. They considered the pseudocolours $C_{F343N,F438W,F814W} \equiv (F343N-F438W)-(F438W-F814W)$ and $C_{F336W, F438W, F343N} \equiv (F336W-F438W)-(F438W-F343N)$ in the filter systems of the WFC3 and ACS (for $F814W$) cameras on board the {\sl Hubble Space Telescope} (HST) --both sensitive to the abundance of N in the stellar spectra-- and found that the RGB width shows a general increase with increasing age in their cluster sample. A natural explanation for this occurrence is that the N spread in these massive clusters increases with increasing cluster age. However, there is an important additional phenomenon to consider when translating the observed RGB widths to N abundance spreads, that has been so far largely unexplored. The samples of cluster stars considered in M19 are distributed between the base of the RGB and approximately the RGB bump. This range covers almost the entire evolution through the first dredge-up \citep[FDU -- see, e.g.,][and references therein]{k14, s15}, that starts on the subgiant branch and ends below the RGB bump level. During the FDU the surface N abundance increases compared to the initial value, and from basic stellar physics we expect this increase to depend on the initial nitrogen abundances. The variation of the surface abundances due to the FDU impacts the stellar spectral energy distributions, hence the predicted colours and pseudocolours sensitive to this element. The upshot is that the observed RGB widths in M19 are determined by a combination of the initial N spreads plus the effect of the dredge up. This is true for any colour or pseudocolour sensitive to the surface N abundance in RGB stars, like $C_{F275W, F336W, F438W} \equiv (F275W-F336W)-(F336W-F438W)$ \citep[see, e.g.,][]{m17, sara19}, or $C_{F336W,F343N,F438W} \equiv(F336W-F343N)-(F343N-F438W)$ \citep{zenn19}, and $C_{F275W,F343N,F438W} \equiv(F275W-F343N)-(F343N-F438W)$ \citep{milone19}, devised to detect MPs in GCs and younger MC massive clusters by means of the so-called \lq{chromosome maps\rq}. In this paper we explore this issue showing qualitatively, and in case of M19 results also quantitatively, the important role played by the FDU when translating to N abundance spreads the observed RGB widths in magnitude-pseudocolour diagrams and chromosome maps. Section~\ref{models} presents our theoretical calculations and the effect of the FDU on the surface abundances of MP stars, followed in Sect.~\ref{analysis} by an analysis of the impact of the FDU on the $C_{F275W, F336W, F438W}$, $C_{F336W, F343N, F438W}$ and $C_{F275W, F343N, F438W}$ pseudocolours used in the chromosome maps to disentangle cluster MPs, plus a quantitative estimate of the effect on the $C_{F343N,F438W,F814W}$ pseudocolour employed by M19. Conclusions follow in Sect.~\ref{conclusions}. \section{Models} \label{models} We have employed the BaSTI isochrones \citep{basti} for two P1 solar scaled chemical compositions with [Fe/H]=$-$0.35 and [Fe/H]=$-$1.3, respectively, representative of the MC clusters studied by M19. We have also isochrones with the same stellar evolution code but for a reference N-enhanced P2 compositions with [C/Fe] =$-$0.28 [N/Fe] = +0.80 [O/Fe] = $-$0.28 (that keeps the CNO sum unchanged compared to the P1 metal distribution) and the same two [Fe/H] values. As discussed by \citet{s15} and \citet{bm17}, BaSTI models reproduce the general observed trends of post-FDU [C/N] ratios as a function of age, measured in field halo stars and a sample of open clusters of various ages. Using the model RGB effective temperatures, surface gravity and surface chemical abundances as inputs, we have calculated model atmospheres and synthetic spectral energy distributions as in \citet{mart17}, employing the ATLAS12 \citep{sao70, k05} and SYNTHE \citep{sao79, sao81} codes, respectively. From these spectral energy distributions we have then computed bolometric corrections to transform the bolometric luminosities of the stellar models to magnitudes in the HST WFC3 and ACS filter systems. All calculations show that at the end of the main sequence the outer convection zone engulfs increasingly deeper regions, dredging to the surface matter partially processed by H-burning in the core --the FDU. In this phase the N abundance slowly increases (and the carbon abundance slowly decreases, but to a much smaller extent), until the maximum penetration of the convective envelope is reached. At this point the inner convective boundary starts to retreat towards the surface, leaving behind a chemical discontinuity. This discontinuity is eventually crossed by the advancing (in mass) H-burning shell, causing the appearance of the RGB bump in the luminosity function of old stellar populations \citep[see, e.g.,][]{cs13}. The change of surface nitrogen abundance (and carbon, whilst the oxygen abundance is essentially never altered in the age range investigated here) during the FDU depends on the mass of the star \citep[hence the population age, see e.g.][and references therein]{s15}, but also on the initial abundance pattern. The reason is that during the FDU the convective envelope reaches layers where the abundances of C and N attained the equilibrium values of the CN cycle during the main sequence. The equilibrium abundance of N is typically higher (and the C abundance lower) than the standard solar scaled (or $\alpha$-enhanced) counterpart for a given total metallicity, hence the FDU causes an increase of surface N (and decrease of C). When the initial metal mixture is N-enhanced (and carbon depleted) the equilibrium abundance of N (and C) becomes more comparable to the initial one, and the effect of the FDU is much less appreciable or negligible. \begin{figure} \includegraphics[width=\columnwidth]{fig_pap_multipop_DNt.eps} \caption{Initial value ($\Delta {\rm [N/Fe]_{ini}}$=0.8 -- dashed line) of the difference in the surface [N/Fe] ratio for a set of bimodal populations with [Fe/H]=$-$1.3 and various ages t, and the corresponding difference $\Delta {\rm [N/Fe]_{FDU}}$ in the surface abundances after the FDU (solid line -- see text for details).} \label{figDN} \end{figure} Figure~\ref{figDN} shows the run with age (ages between 1.0 and 13.5~Gyr) of $\Delta$[N/Fe], defined as the difference of surface [N/Fe] between a population with with N-enhanced P2 composition and a coeval one with P1 composition ([Fe/H]=$-$1.3 in this example) as inferred from our models. We show both the initial value $\Delta {\rm [N/Fe]_{ini}}$ (the same for all ages) and the corresponding surface abundance differences at the completion of the FDU ($\Delta {\rm [N/Fe]_{FDU}}$). The values of $\Delta {\rm [N/Fe]_{FDU}}$ are lower than $\Delta {\rm [N/Fe]_{ini}}$, and display a clear trend with age, despite the fact that $\Delta {\rm [N/Fe]_{ini}}$ is the same at all ages. For the younger populations $\Delta {\rm [N/Fe]_{FDU}}$ is much smaller than $\Delta {\rm [N/Fe]_{ini}}$, but with increasing age it comes progressively closer to its initial value. The reason is that in RGB models with P1 initial N abundance, the surface [N/Fe] at the end of the FDU increases with decreasing age \citep[see, e.g.][]{s15}, whilst the impact of the FDU is much smaller or negligible in N-enhanced populations. The effect of the FDU on the surface carbon abundance is also small or negligible in P2 models with initial C-depleted abundances, whilst in P1 models the surface [C/Fe] at the end of the FDU gets progressively lower with decreasing age. Summarizing, for bimodal coeval populations with fixed $\Delta {\rm [N/Fe]_{ini}}$ (independent of age) and ages between 1.0 and 13.5~Gyr, the difference $\Delta {\rm [N/Fe]_{FDU}}$ measured at the end of the FDU is predicted to be lower than the initial value, showing a trend with age -- $\Delta {\rm [N/Fe]_{FDU}}$ decreasing for decreasing age. This general behaviour is true irrespective of the exact value of [Fe/H]. \section{Analysis} \label{analysis} We start here discussing the impact of the FDU on the representative N-sensitive $C_{F275W, F336W, F438W}$, $C_{F336W, F343N, F438W}$ and $C_{F275W, F343N, F438W}$ pseudocolours used in the chromosome maps to detect MPs from cluster photometry. In a chromosome map the total width of the cluster RGB in one of these pseudocolors is normalized to the value taken two magnitudes above the main sequence turnoff in the $F814W$ filter \citep{m17}. This is a level where typically the FDU has either already started or is essentially completed, but still below the RGB bump, beyond which extra mixing processes that further affect the surface C and N abundances appear to be efficient, at least in low mass stars \citep[see, e.g.,][and references therein]{lagarde19}. \begin{figure} \includegraphics[width=\columnwidth]{fig_pap_chrom.eps} \caption{P1 (solid lines) and P2 (dashed lines) RGBs (at [Fe/H]=$-$1.30) in the $M_{F814W}-C_{F275W, F336W, F438W}$ diagram for ages equal to 3 (upper panel) and 6 (lower panel) Gyr, $\Delta {\rm [N/Fe]_{ini}}$=0.8, accounting for the effect of FDU on the spectral energy distributions. The dotted lines display P1 RGBs calculated without considering the variation of N (and C) due to the FDU. The horizontal thin lines mark the level corresponding to two magnitudes above the main sequence turnoff, where the width of the RGB is taken in the chromosome maps (see text for details).} \label{figchro} \end{figure} As long as cluster ages are of the order of 10-13~Gyr, the effect of the FDU on the surface abundances --hence the RGB $C_{F275W, F336W, F438W}$, $C_{F336W, F343N, F438W}$ and $C_{F275W, F343N, F438W}$ values-- is basically negligible, especially at low metallicity. The situation is however different for intermediate-age clusters, as shown in Figs.~\ref{figchro}, ~\ref{figchrob} and ~\ref{figchromilone} that display $M_{F814W}$-$C_{F275W, F336W, F438W}$, $M_{F814W}-C_{F336W, F343N, F438W}$ and $M_{F814W}-C_{F275W, F343N, F438W}$ diagrams for two P1-P2 bimodal populations (at a representative [Fe/H]=$-$1.3) with ages of 3 and 6 Gyr, respectively, including also P1 RGBs calculated without accounting for the FDU in the spectral energy distributions. In the case of the P2 models the FDU never changes appreciably the surface abundances. The level at which the total RGB width is normalized in the chromosome maps to compare different clusters (two magnitudes above the main sequence turn off in the $F814W$ filter) is also marked. At the beginning of the FDU the pseudocolour difference between P1 and P2 RGBs is essentially the same for these two ages, in all three diagrams; when moving to brighter magnitudes the FDU progresses, causing a reduced [N/Fe] (and [C/Fe]) difference between P1 and P2 stars at a given brightness, and a decreased separation of the sequences. The effect is stronger at younger ages, because of the increasing impact of the FDU on the surface abundances (see Fig.~\ref{figDN}). Clearly, any interpretation in terms of $\Delta {\rm [N/Fe]_{ini}}$ of the RGB widths in the chromosome maps must account for the effect of the FDU on the surface [N/Fe] and pseudocolours, for ages lower than typical GC ages. \begin{figure} \includegraphics[width=\columnwidth]{fig_pap_chromZen.eps} \caption{As Fig.~\ref{figchro} but for the $M_{F814W}-C_{F336W, F343N, F438W}$ diagram.} \label{figchrob} \end{figure} \begin{figure} \includegraphics[width=\columnwidth]{fig_pap_chromMil.eps} \caption{As Fig.~\ref{figchro} but for the $M_{F814W}-C_{F275W, F343N, F438W}$ diagram.} \label{figchromilone} \end{figure} To give at least one quantitative example of the role played by the FDU when inferring and/or comparing $\Delta {\rm [N/Fe]_{ini}}$ values amongst different clusters using N-sensitive photometric properties, we consider the $C_{F343N,F438W,F814W}$ pseudocolour employed by M19. Figure~\ref{figCMD} shows theoretical RGBs for two bimodal P1-P2 populations with ages equal to 6 and 13.5 Gyr at a representative [Fe/H]=$-$1.3, and $\Delta {\rm [N/Fe]_{ini}}$=0.8, plotted in the $M_{F438W}-C_{F343N,F438W,F814W}$ diagram used by M19. The displayed range of $M_{F438W}$ magnitudes corresponds approximately to the range employed in M19 analysis, that roughly encompasses the entire development of the FDU. \begin{figure} \includegraphics[width=\columnwidth]{fig_pap_cmd.eps} \caption{P1 and P2 RGBs (at [Fe/H]=$-$1.30) in the $M_{F438W}-C_{F343N,F438W,F814W}$ diagram for 6 (solid lines) and 13.5 (dashed lines) Gyr, $\Delta {\rm [N/Fe]_{ini}}$=0.8, accounting for the FDU (that has a negligible effect on P2 RGBs). The dotted and dash-dotted blue lines display P1 RGBs calculated without considering the variation of N (and C) due to the FDU, for 6 and 13.5 Gyr, respectively (see text for details).} \label{figCMD} \end{figure} As for the cases discussed before, at a given age the $C_{F343N,F438W,F814W}$ separation between P1 and P2 RGBs decreases with decreasing magnitude, due to the effect of the FDU on the surface N abundances. The variation (decrease) of C plays a much smaller role, but has the same qualitative effect of the increase of N, that is to shift the RGB to larger values of $C_{F343N,F438W,F814W}$. The dotted lines display the P1 RGBs that do not account for the effect of the FDU on the spectral energy distributions due to the change of the surface abundances. At 13.5~Gyr the no-FDU RGB is almost coincident with the FDU case, because at this metallicity and age its effect on the surface abundances is very small also for the P1 composition. For the 6 Gyr case, the no-FDU P1 RGB runs parallel to the P2 one, and diverges steadily from the calculations that include the FDU. To assess quantitatively the impact of the FDU on the interpretation of M19 results, we have considered P1-P2 pairs of RGBs with $\Delta {\rm [N/Fe]_{ini}}$=0.8, ages between 3 and 13.5~Gyr for [Fe/H]=$-$1.3, and between 1 and 6 Gyr for [Fe/H]=$-$0.35. We have distributed randomly 100 stars with a 1:1 ratio between P1 and P2 objects, along the isochrones' RGBs employing a Salpeter mass function --the choice of the mass function is not critical, because of the extremely narrow mass range involved-- in the $M_{F438W}$ range of Fig.~\ref{figCMD}. We have then added to each synthetic star photometry a typical Gaussian photometric error taken from the artificial star tests, that is approximately the same for all stars of the cluster sample, in this representative magnitude range. The number of synthetic stars is roughly the same as the number of stars employed in M19 analysis. For each pair of P1-P2 stars we have then calculated the $C_{F343N,F438W,F814W}$ distribution and determined the 1$\sigma$ dispersion $\sigma(C_{F343N,F438W,F814W})^{RGB}$ --as in M19-- repeating the procedure 100 times to determine its average value. The top panel of Fig.~\ref{figsigmacunbi} displays our theoretical $\sigma(C_{F343N,F438W,F814W})^{RGB}$ as a function of age, together with $\sigma(C_{F343N,F438W,F814W})^{RGB}$ measured by M19 for their sample of Magellanic Cloud clusters that show MPs, plus M19 determinations for the Milky Way GCs 47~Tuc, M15 and NGC2419. These bimodal MPs with 1:1 ratio and a constant $\Delta {\rm [N/Fe]_{ini}}$=0.8 display a trend with age qualitatively similar to the observations. This is due to the effect of the FDU on the surface N abundances discussed above. However, a constant $\Delta {\rm [N/Fe]_{ini}}$ with age does not match the observed average slope, for a linear fit to the observed $\sigma(C_{F343N,F438W,F814W})^{RGB}$ values gives a slope equal to 0.0060$\pm$0.0005~mag/Gyr, whilst the theoretical results displayed in the figure have slopes equal to 0.0018~mag/Gyr and 0.0015~mag/Gyr for [Fe/H]=$-$0.35 and [Fe/H]=$-$1.3, respectively. This implie that the observed trends are explained by a combination of both the effect of the FDU at constant $\Delta {\rm [N/Fe]_{ini}}$, and a general increase of $\Delta {\rm [N/Fe]_{ini}}$ with age. \begin{figure} \includegraphics[width=\columnwidth]{fig_pap_sigmacunbi.eps} \caption{{\sl Top panel:} Theoretical $\sigma(C_{F343N,F438W,F814W})^{RGB}$ as a function of age for [Fe/H]=$-$0.35 (dotted line), [Fe/H]=$-$1.3 (dashed line) and $\Delta {\rm [N/Fe]_{ini}}$=0.8. The dash-dotted line displays the results for $\Delta {\rm [N/Fe]_{ini}}$=1.1 and [Fe/H]=$-$1.3 (see text for details). We also show the $\sigma(C_{F343N,F438W,F814W})^{RGB}$ values determined by M19 for a sample of MC clusters with photometric detection of MPs (filled red triangles for clusters with [Fe/H] around $-$0.35, and filled blue squares for clusters with [Fe/H] around $-$1.3). Results for three GCs are also displayed for comparison (filled black circles). {\sl Bottom panel:} The same as the top panel but with theoretical $\sigma(C_{F343N,F438W,F814W})^{RGB}$ values calculated for $\Delta {\rm [N/Fe]_{ini}}$=0.8 without accounting for the effect of the FDU on the spectral energy distributions.} \label{figsigmacunbi} \end{figure} To clarify this point, the same figure displays also the $\sigma(C_{F343N,F438W,F814W})^{RGB}$ values for the same type of bimodal MPs (1:1 ratio between P1 and P2 stars), but calculated considering P2 models with $\Delta {\rm [N/Fe]_{ini}}$=1.1 (and [C/Fe]=[O/Fe]=$-$1.0, to preserve the CNO sum). These values approximately match the upper envelope of the observed distribution, with $\Delta {\rm [N/Fe]_{ini}}$=1.1 that roughly agrees with the range measured spectroscopically in 47~Tuc \citep{carretta05,marino16}. The theoretical $\sigma(C_{F343N,F438W,F814W})^{RGB}$ values at fixed age, [Fe/H] and $\Delta {\rm [N/Fe]_{ini}}$ depend of course on the statistical distribution of the [N/Fe] abundances within the prescribed range. Still considering a bimodal distribution in terms of [N/Fe], when changing the P1/P2 ratio from 1:1 to a population with 70\% P1 stars and 30\% P2 stars with $\Delta {\rm [N/Fe]_{ini}}$ either 0.8 or 1.1~dex, the $\sigma(C_{F343N,F438W,F814W})^{RGB}$ dispersions are reduced by only a few 0.001~mag. A larger reduction (by up to 0.03~mag in the case of $\Delta {\rm [N/Fe]_{ini}}$=1.1) is found when the [N/Fe] abundances are distributed uniformly within the prescribed $\Delta {\rm [N/Fe]_{ini}}$ range, a sort of extreme opposite case compared to a 1:1 bimodal [N/Fe] distribution. However, even in this case the increase of $\sigma(C_{F343N,F438W,F814W})^{RGB}$ with age is preserved. Equal-weight multiple subpopulations quantized in terms of [N/Fe] --depending on their number-- lead to intermediate results between the bimodal 1:1 population, and the case of uniform [N/Fe] distribution. The lower panel of Fig.~\ref{figsigmacunbi} displays the theoretical $\sigma(C_{F343N,F438W,F814W})^{RGB}$ values for the same bimodal MPs calculated with $\Delta {\rm [N/Fe]_{ini}}$=0.8 and a 1:1 ratio between P1 and P2 stars, but without FDU. The absolute values and trends of $\sigma(C_{F343N,F438W,F814W})^{RGB}$ with age are different from the \lq{correct \rq} ones that include the effect of the FDU. The $\sigma(C_{F343N,F438W,F814W})^{RGB}$ values are higher than the FDU case at the younger ages, showing a general anticorrelation with age. This of course impacts the determination of $\Delta {\rm [N/Fe]_{ini}}$ from the measured $\sigma(C_{F343N,F438W,F814W})^{RGB}$ values in a sample of clusters. \section{Conclusions} \label{conclusions} The impact of the FDU on the observed width of RGBs in old and intermediate-age clusters hosting MPs has been so far largely unexplored. We have addressed this issue by considering several N-sensitive pseudocolours employed to detect MPs in clusters of various ages. In all cases, for a given initial difference $\Delta {\rm [N/Fe]_{ini}}$ between coeval P1 and P2 populations, the effect of the FDU is to reduce the predicted RGB width compared to the case when the effect of the FDU on the spectral energy distribution is neglected. The reduction is a function of age, and has also some dependence on [Fe/H]. These effects stem from the dependence of the FDU variations of the surface N and, to a lesser degree, C abundances, on age and metallicity in models with P1 compositions. In the specific case of the pseudocolour employed by M19, when the FDU is accounted for, a constant $\Delta {\rm [N/Fe]_{ini}}$ produces a general increase with age of the predicted $\sigma(C_{F343N,F438W,F814W})^{RGB}$, qualitatively similar with what is observed, but with a shallower slope. The observed trend with cluster age can be matched only by a combination of both the effect of the FDU at constant $\Delta {\rm [N/Fe]_{ini}}$, and a general increase of $\Delta {\rm [N/Fe]_{ini}}$ with age. When the theoretical spectral energy distributions do not account for the FDU, the values of $\Delta {\rm [N/Fe]_{ini}}$ required to match the observed RGB widths will be smaller. This effect only becomes significant for ages below $\sim$10~Gyr, when the FDU starts to alter more significantly the surface chemical composition-- see, e.g., the case of NGC1978 in Fig.~\ref{figsigmacunbi}. The FDU affects also the quantitative interpretation, in terms N-abundance spreads, of the chromosome maps, when employed to identify MPs in intermediate-age clusters. In the case of GCs, due to their old ages, the FDU is largely unable to affect appreciably the surface N and C abundances, hence its effect on the $C_{F275W, F336W, F438W}$, $C_{F336W, F343N, F438W}$, or $C_{F275W, F343N, F438W}$ pseudocolours is negligible. At younger ages the FDU can affect the predicted values much more appreciably. Hence, also in case of the chromosome maps, neglecting the FDU abundance changes can lead to an underestimate of the initial [N/Fe] spread for a given measured value of the RGB width. The surface chemical changes due to the FDU play therefore an important role in the interpretation of the observed width of RGBs in intermediate age clusters. It needs to be properly accounted for when determining initial N-abundance spreads from photometry, and potential correlations with age or other cluster parameters. \section*{Acknowledgements} CU, NB, and SM gratefully acknowledge financial support from the European Research Council (ERC-CoG-646928, Multi-Pop). NB also acknowledges financial support from the Royal Society (University Research Fellowship). Support for ICZ was provided by NASA through Hubble Fellowship grant HST-HF2-51387.001-A awarded by the Space Telescope Science Institute, which is operated by the Association of Universities for Research in Astronomy, Inc., for NASA, under contract NAS5-26555. SC acknowledges support from Premiale INAF MITiC, from INFN (Iniziativa specifica TAsP), and grant AYA2013- 42781P from the Ministry of Economy and Competitiveness of Spain. \bibliographystyle{mnras}
\section{Introduction} \label{sec:introduction} Let $K$ be a field of characteristic $0$. Let $P=K[X_1,X_2,\dotsc]$, a ring of polynomials in infinitely many variables. Regard $P$ as a graded algebra where the variable $X_i$ has degree $i$. In this grading, the monomial $X_1^{a_1}X_2^{a_2}\dotsb $ has degree $\sum_i i a_i$. \begin{definition} For each $n\geq 1$, let $V_n$ be a representation of the symmetric group $S_n$. The collection $\{V_n\}_{n=1}^\infty$ is said to have \emph{eventually polynomial character}, if there exists $q\in P$ and a positive integer $N$ such that, for each $n\geq N$ and each $w\in S_n$, \begin{displaymath} \mathrm{trace}(w;V_n) = q(X_1(w),X_2(w),\dotsc), \end{displaymath} where $X_i(w)$ is the number of $i$-cycles in $w$. The collection $\{V_n\}$ is said to have \emph{polynomial character} if $N=1$. The polynomial $q$ is called the \emph{character polynomial} of $\{V_n\}$. \end{definition} Character polynomials have been used to study characters of families of representations of symmetric groups that occur naturally in combinatorics, topology and other areas. A survey of their history can be found in the article of Garsia and Goupil \cite{MR2576382}. More recently, Church, Ellenberg and Farb \cite{MR3357185} developed the theory of FI-modules. They showed that each finitely generated FI-module gives rise to a family of representations with eventually polynomial character. Any polynomial $q\in P$ gives rise to a class function on $S_n$ for every positive integer $n$. The value of this function at $w\in S_n$ is obtained by substituting for $X_i$ the number of $i$-cycles in $w$. For each $n$, we define the moment of $q$ as the average value of the associated class function on $S_n$. The ring $P$ has a basis indexed by integer partitions, which we call the binomial basis (Definition~\ref{definition:binomial-basis}). We give an explicit formula for the moment of a binomial basis element (Theorem~\ref{theorem:moment}). This formula can be used to compute inner products of class functions coming from character polynomials. It implies that such an inner product achieves a constant value for large $n$ (Corollary \ref{corollary:stability}). This is a character-theoretic analogue of \cite[Theorem~1.13]{MR3357185}, which establishes representation stability for finitely generated FI-modules. The homogeneous polynomial representations of degree $d$ general linear groups $GL_n(K)$ and the representations of the symmetric group $S_d$ are linked via Schur-Weyl duality (see \cite{Green}). The restriction problem explores a different relationship between polynomial representation of $GL_n(K)$ and $S_n$. It asks how an irreducible polynomial representation of $GL_n(K)$ decomposes when it is restricted to $S_n$ sitting inside $GL_n(K)$ as the subgroup of permutation matrices. For each partition $\lambda$, let $W_\lambda$ denote the Weyl functor (see~\cite[Definition II.1.3]{ABW}) associated to $\lambda$. Let $P(n,d)$ denote the set of all partitions of $d$ with at most $n$ parts. Then $W_\lambda(K^n)$, as $\lambda$ runs over $P(n,d)$, are the irreducible polynomial representations of the general linear group $GL_n(K)$ of degree $d$. Following the notation and terminology of \cite[Definition~2.2.5]{MR3357185}, for a partition $\mu=(\mu_1,\dotsc,\mu_m)$ of size $|\mu|$ and an integer $n\geq \mu_1+|\mu|$, let $\mu[n]$ denote the padded partition $(n-|\mu|, \mu_1,\mu_2,\dotsc,\mu_m)$. Let $V_{\mu[n]}$ denote the Specht module of $S_n$ corresponding to $\mu[n]$. Consider the decomposition of the restriction of $W_\lambda(K^n)$ to $S_n$ into Specht modules: \begin{displaymath} \Res^{GL_n(K)}_{S_n} W_\lambda(K^n) = \bigoplus_\mu V_{\mu[n]}^{\oplus r_{\lambda\mu}(n)}, \end{displaymath} where the sum is over partitions $\mu$ such that $n-|\mu|\geq \mu_1$. It is well-known that the coefficients $r_{\lambda\mu}(n)$ are eventually constant for large $n$ (this result is attributed to D.~E.~Littlewood by Assaf and Speyer \cite{assaf-speyer}). Let $r_{\lambda\mu}$ be their eventually constant value, which is called the \emph{stable restriction coefficient}. Finding a combinatorial interpretation of $r_{\lambda\mu}$ is known as the \emph{restriction problem}. In this article we show that the family $\{\Res^{GL_n(K)}_{S_n} W_\lambda(K^n)\}$ has polynomial character. We determine its character polynomial $S_\lambda$ (Theorem~\ref{theorem:char-poly-weyl}) by applying the Jacobi--Trudi identities to the character polynomials of symmetric and exterior powers of $K^n$ (Theorem~\ref{theorem:he}). The character polynomials of symmetric and exterior tensor powers of $K^n$ have generating functions with Eulerian factorization (Theorem~\ref{theorem:he}). Multiplying $S_\lambda$ by the character polynomial $q_\mu$ of Specht modules $\{V_{\mu[n]}\}$ (which was computed by Macdonald \cite[Example~I.7.14(b)]{MR3443860} and Garsia--Goupil \cite{MR2576382}), and then taking moments (Theorem~\ref{theorem:moment}) gives an algorithm to compute stable restriction coefficients (Theorem~\ref{theorem:stable-res}). Assaf and Speyer \cite{assaf-speyer} and independently, Orellana and Zabrocki \cite{2016arXiv160506672O} introduced \emph{Specht symmetric functions} to study the restriction problem. In Section~\ref{sec:oz} we explain the relationship between these two approaches. Notwithstanding several interesting recent developments \cite{assaf-speyer,2018arXiv180404702H,2016arXiv160506672O,2019arXiv190100378O}, a solution to the restriction problem remains elusive. Even $r_{\lambda\emptyset}$ (here $\emptyset$ denotes the empty partition of $0$, so $r_{\lambda\emptyset}$ is the dimension of the space of $S_n$-invariant vectors in $W_\lambda(K^n)$ for large $n$) appears to be a non-trivial and interesting problem. We provide generating functions in $\lambda$ for the dimension of the space of $S_n$-invariant vectors in $W_\lambda(K^n)$ (Corollary~\ref{corollary:weyl-mom}). Using our main generating function (Theorem~\ref{theorem:hlaemu}) for the dimension of $S_n$-invariants in mixed tensors, we are able to characterize partitions with two rows, two columns and hook partitions which have non-zero $S_n$-invariant vectors. To the best of our knowledge, the specific problem of determining the $S_n$-invariant vectors of a Weyl-module has not been studied before. We conclude this paper by placing the restriction problem in the context of strict polynomial functors and FI-modules. Friedlander and Suslin \cite{MR1427618} introduced strict polynomial functors of degree $d$. The polynomial representations of degree $d$ of $GL_n(K)$ are obtained by evaluating strict polynomial functors of degree $d$ at $K^n$. Similarly, families of representations of $S_n$ with stability properties can be obtained by evaluating finitely generated FI-modules at $\{1,\dotsc,n\}$ (see \cite{MR3357185}). We define a functor from the category of strict polynomial functors of degree $d$ to the category of finitely generated FI-modules for every $d$ (Section~\ref{sec:restriction-functor}). This functor corresponds to restriction of representations from $GL_n(K)$ to $S_n$ under evaluation functors (Theorem~\ref{theorem:Res}). \section{Character Polynomials and their Moments} \label{sec:char-polyn} \subsection{Moments and Stability} \label{sec:moments} \begin{definition}[Moment] The moment of $q\in P$ at $n$ is defined as: \begin{displaymath} \mom q_n=\frac 1{n!} \sum_{w\in S_n} q(X_1(w),X_2(w),\dotsc). \end{displaymath} \end{definition} We shall express integer partitions in \emph{exponential notation}: given a partition $\alpha$ with largest part $r$, we write: \begin{displaymath} \alpha = 1^{a_1}2^{a_2}\dotsb r^{a_r}, \end{displaymath} where $a_i$ is the number of parts of $\alpha$ of size $i$ for each $1\leq i\leq r$. Thus $\alpha$ is a partition of the integer $|\alpha|:=a_1+2a_2+\dotsb+ra_r$. For every integer partition $\alpha=1^{a_1}\dotsb r^{a_r}$ define $\binom X\alpha\in P$ by: \begin{displaymath} \binom X\alpha = \binom{X_1}{a_1}\binom{X_2}{a_2}\dotsb \binom{X_r}{a_r}. \end{displaymath} \begin{definition} [Binomial basis] \label{definition:binomial-basis} The basis of $P$ consisting of elements \begin{displaymath} \left\{\left.\binom X\alpha \;\right|\; \alpha \text{ is an integer partition}\right\} \end{displaymath} is called the \emph{binomial basis} of $P$. \end{definition} For an integer partition $\alpha=1^{a_1}2^{a_2}\dotsb r^{a_r}$, define $z_\alpha = \prod_{i=1}^r i^{a_i}a_i!$. This is the order of the centralizer in $S_n$ of a permutation with cycle-type $\alpha$. \begin{theorem} \label{theorem:moment} For every integer partition $\alpha = 1^{a_1}2^{a_2}\dotsb$, we have: \begin{displaymath} \mom{\binom X\alpha}_n = \begin{cases} 0 & \text{ if } n < |\alpha|,\\ 1/z_\alpha & \text{ otherwise.} \end{cases} \end{displaymath} \end{theorem} \begin{proof} We have: \begin{displaymath} \sum_{n\geq 0}\mom{\binom X\alpha}_nv^n = \sum_{n\geq 0}\frac 1{n!}\sum_{w\in S_n}\prod_{i\geq 1} \binom{X_i(w)}{a_i}v^{iX_i(w)}. \end{displaymath} Replace the sum $w\in S_n$ by a sum over conjugacy classes in $S_n$. If $\beta=1^{b_1}2^{b_2}\dotsb$ is a partition of $n$, then the number of elements in $S_n$ with cycle type $\beta$ is $\frac{n!}{\prod_i i^{b_i}b_i!}$. We get: \begin{align*} \sum_{n\geq 0}\mom{\binom X\alpha}_nv^n & = \sum_{n\geq 0}\sum_{\beta\vdash n}\prod_{i\geq 1}\frac{v^{ib_i}}{i^{b_i}b_i!}\binom{b_i}{a_i}\\ & = \sum_{b_i\geq a_i} \prod_{i\geq 1}\frac{v^{ib_i}}{i^{b_i}b_i!}\binom{b_i}{a_i}\\ & = \sum_{b_i\geq a_i} \prod_{i\geq 1}\frac{v^{ib_i}}{i^{b_i}a_i!(b_i-a_i)!}\\ & = \sum_{b_i\geq a_i} \prod_{i\geq 1}\frac{v^{ia_i}}{i^{a_i}a_i!} \frac{v^{i(b_i-a_i)}}{i^{b_i-a_i}(b_i-a_i)!}. \end{align*} Setting $c_i=b_i-a_i$ gives: \begin{align*} \sum_{n\geq 0}\mom{\binom X\alpha}_nv^n & = \frac{v^{|\alpha|}}{z_\alpha}\prod_{i\geq 1}\sum_{c_i\geq 0}\frac{v^{ic_i}}{i^{c_i}c_i!}\\ & = \frac{v^{|\alpha|}}{z_\alpha}\sum_{n\geq 0} v^n\sum_{\gamma\vdash n} \frac 1{z_\gamma}.\\ \end{align*} Since $\sum_{\gamma\vdash n} 1/z_\gamma = 1$ for every $n$, we get: \begin{equation} \label{eq:binomial-moments} \sum_{n\geq 0}\mom{\binom X\alpha}_nv^n = \frac{v^{|\alpha|}}{z_\alpha}\frac 1{1-v}, \end{equation} from which Theorem~\ref{theorem:moment} follows. \end{proof} For two representations $V$ and $W$ of $S_n$, let: \begin{displaymath} \langle V, W\rangle_n = \dim \Hom_{S_n}(V,W), \end{displaymath} which is the same as the Schur inner product of their characters: \begin{displaymath} \langle V, W\rangle_n = \frac 1{n!}\sum_{w\in S_n} \mathrm{trace}(w;V)\mathrm{trace}(w,W). \end{displaymath} \begin{corollary} \label{corollary:stability} For any $q\in P$ of degree $d$, $\mom{q}_n=\mom{q}_d$ for all $n\geq d$. In particular, if $\{V_n\}$ and $\{W_n\}$ are families of representations with polynomial characters of degree $d_1$ and $d_2$, then $\langle V_n,W_n\rangle_n$ stabilizes for $n\geq d_1+d_2$. \end{corollary} \begin{proof} This follows from the fact that the polynomials $\binom X\alpha$, as $\alpha$ runs over the set of integer partitions, form a basis of $P$. \end{proof} \begin{definition} [Stable moment] For a polynomial $q\in P$ we define the stable moment $\mom q$ of $q$ to be the eventually constant value of $\mom q_n$: \begin{displaymath} \mom q = \lim_{n\to \infty} \mom q_n. \end{displaymath} \end{definition} Let $V_n=V_{\lambda[n]}$, the Specht module of $S_n$ corresponding to the padded partition $\lambda[n]$. It is well-known that $\{V_n\}$ is a family of representations with eventually polynomial character \cite[Proposition~I.1]{MR2576382}. In other words, for every partition $\lambda$, there exists a polynomial $q_\lambda\in P$ such that \begin{equation} \label{eq:qla} \chi_{\lambda[n]}(w) = q_\lambda(X_1(w),X_2(w),\dotsc) \text{ for } n\geq |\lambda|+\lambda_1, \end{equation} where $\chi_{\lambda[n]}$ denotes the character of the Specht module $V_{\lambda[n]}$. Given three partitions $\lambda$, $\mu$, and $\nu$ of the same integer $k$, let $g_{\lambda\mu\nu}(n)$ denote the multiplicity of $V_{\lambda[n]}$ in $V_{\mu[n]}\otimes V_{\nu(n)}$. Then \begin{displaymath} g_{\lambda\mu\nu}(n) = \mom{q_\lambda q_\mu q_\nu}_n. \end{displaymath} By Corollary~\ref{corollary:stability}, $g_{\lambda\mu\nu}(n)$ is eventually constant, recovering a well-known theorem of Murnaghan (see \cite{MR95209}). Church, Ellenberg, and Farb \cite[Section~3.4]{MR3357185} point out that this result can also be obtained by showing that the families $V_{\mu[n]}\otimes V_{\nu[n]}$ and $V_{\lambda[n]}$ come from finitely generated $\mathrm{FI}$-modules. \subsection{Symmetric and Alternating Tensors} \label{sec:symk-altk} Let $\Sym^d$ and $\wedge^d$ denote the symmetric and alternating tensor functors respectively. For every $n\geq 0$, $\Sym^d(K^n)$ and $\wedge^d(K^n)$ can be regarded as representations of $S_n$. In this section, we will prove that they have polynomial character by direct computation. We shall work with generating functions that live in the ring $P[[t]]$ of Laurent series in the variable $t$ and coefficients in $P$. Let $\mch{X_i}j = \binom{X_i+j-1}j$. The ring $P[[t]]$ admits expressions of the kind \begin{align} \label{eq:pow1} (1-t^i)^{-X_i} & = \sum_{j\geq 0} \mch{X_i}j t^{ij},\\ \label{eq:pow2} (1+(-t)^i)^{X_i} & = \sum_{j\geq 0} (-1)^{ij}\binom{X_i}j t^{ij}, \end{align} which will be needed later. Also, given $w\in S_n$ for any $n$ and $q\in P$, we write $q(w)=q(X_1(w),X_2(w),\dotsc)$. \begin{theorem} \label{theorem:he} Let $\{H_d\}_{d=0}^\infty$ be the sequence of polynomials in $P$ defined by: \begin{equation} \label{eq:H} \sum_{d=0}^\infty H_dt^d = \prod_{i=1}^\infty(1-t^i)^{-X_i}, \end{equation} an identity in the formal power series ring $P[[t]]$. As a consequence, for every $n\geq 1$ and every $w\in S_n$, \begin{displaymath} H_d(w) = \mathrm{trace}(w;\Sym^d(K^n)). \end{displaymath} Let $\{E_d\}_{d=0}^\infty$ be the sequence of polynomials in $P$ defined by: \begin{equation} \label{eq:E} \sum_{d=0}^\infty E_dt^d = \prod_{i=1}^\infty(1-(-t)^i)^{X_i}. \end{equation} Then for every $n\geq 1$ and every $w\in S_n$, \begin{displaymath} E_d(w) = \mathrm{trace}(w;\wedge^d(K^n)). \end{displaymath} For every positive integer $d$, we have: \begin{align} \label{eq:sym-char} H_d&=\sum_{\alpha\vdash d}\quad\prod_{i=1}^d\mch{X_i}{a_i},\\ \label{eq:alt-char} E_d&=\sum_{\alpha\vdash d}\quad(-1)^{a_2+a_4+\dotsb}\prod_{i=1}^d\binom{X_i}{a_i}. \end{align} \end{theorem} \begin{proof} The standard basis of $K^n$ is indexed by the set $[n]=\{1,\dotsc,n\}$. The space $\Sym^d K^n$ has an induced basis indexed by multisets of size $d$ with elements drawn from $[n]$. The trace of $w\in S_n$ on $\Sym^d K^n$ is the number of such multisets that are fixed by $w$. In a multiset that is fixed by $w$, the elements in each cycle of $w$ appear with the same multiplicity. Hence a multiset fixed by $w$ may be regarded as a multiset of cycles of $w$. Assign weight $\wt(C)=t^i$ to each $i$-cycle $C$ of $w$. To a multiset $M = \{C_1^{m_1}\dotsb C_r^{m_r}\}$ of cycles of $w$, assign weight $\wt(M)=\prod_{1\leq j\leq r} \wt(C_j)^{m_j}$. Then \begin{displaymath} \sum_{d\geq 0} \mathrm{trace}(w; \Sym^d K^n)t^d = \sum_M \wt(M), \end{displaymath} where the sum runs over all multisets $M$ of cycles of $w$. Each of the $X_i(w)$ $i$-cycles of $w$ contributes a factor $(1-t^i)^{-1}$ to this generating function, so \begin{displaymath} \sum_{d\geq 0} \mathrm{trace}(w; \Sym^d K^n)t^d = \prod_{i\geq 1} (1-t^i)^{-X_i(w)}. \end{displaymath} Similarly, $\wedge^d K^n$ has a basis indexed by subsets of $[n]$ with $d$ elements. Only subsets fixed by $w$ contribute to the trace, and these are unions of the cycles of $w$. A cycle of length $i$ changes the sign of the corresponding basis vector by a factor of $-(-1)^i$. Assign weight $\wt(C)=-(-t)^i$ to each $i$-cycle $C$ of $w$. To a subset $N = \{C_1,\dotsc,C_r\}$ of cycles of $w$, assign weight $\wt(N) = \prod_{1\leq i\leq r} \wt(C_i)$. Then \begin{displaymath} \sum_{d\geq 0} \mathrm{trace}(w; \wedge^d K^n)t^d = \sum_N \wt(N), \end{displaymath} where the sum runs over all subsets $N$ of the set of cycles of $w$. Each of the $X_i(w)$ $i$-cycles of $w$ contributes a factor $(1-(-t)^i)$ to this generating function, so \begin{displaymath} \sum_{d\geq 0} \mathrm{trace}(w; \wedge^d K^n)t^d = \prod_{i\geq 1} (1-(-t)^i)^{X_i(w)}. \end{displaymath} Expansion of the products in \eqref{eq:H} and \eqref{eq:E} using (\ref{eq:pow1}) and (\ref{eq:pow2}) gives (\ref{eq:sym-char}) and (\ref{eq:alt-char}) respectively. \end{proof} \subsection{Character Polynomials of Weyl Modules} \label{sec:char-polyn-weyl} Applying the Jacobi--Trudi identities \cite[Section~I.3]{MR3443860} to the character polynomials of $\Sym^d$ and $\wedge^d$ gives character polynomials for Weyl functors. For a partition $\lambda$, let $\lambda'$ denote its conjugate partition. \begin{theorem} \label{theorem:char-poly-weyl} For every partition $\lambda$, the element of $P$ defined by \begin{equation} \label{eq:jt} S_\lambda = \det(H_{\lambda_i+j-i}) = \det(E_{\lambda'_i+j-i}) \end{equation} is such that for every positive integer $n$ and every $w\in S_n$, \begin{displaymath} S_\lambda(w) = \mathrm{trace}(w;W_\lambda(K^n)). \end{displaymath} \end{theorem} \small{ \begin{table}[htbp] \def1.3{1.3} \begin{center} \begin{tabular}{|p{.1\textwidth}|p{.8\textwidth}|} \hline $\lambda$ & $S_\lambda$\\ \hline \multicolumn{2}{|c|}{$n= 1$}\\ \hline $(1)$&$ X_{1} $\\ \hline \multicolumn{2}{|c|}{$n=2$}\\ \hline $(2)$&$ \frac{1}{2} X_{1}^{2} + \frac{1}{2} X_{1} + X_{2} $\\ $(1^2)$&$ \frac{1}{2} X_{1}^{2} - \frac{1}{2} X_{1} - X_{2} $\\ \hline \multicolumn{2}{|c|}{$n=3$}\\ \hline $(3)$&$ \frac{1}{6} X_{1}^{3} + \frac{1}{2} X_{1}^{2} + X_{1} X_{2} + \frac{1}{3} X_{1} + X_{3} $\\ $(2, 1)$&$ \frac{1}{3} X_{1}^{3} - \frac{1}{3} X_{1} - X_{3} $\\ $(1^3)$&$ \frac{1}{6} X_{1}^{3} - \frac{1}{2} X_{1}^{2} - X_{1} X_{2} + \frac{1}{3} X_{1} + X_{3} $\\ \hline \multicolumn{2}{|c|}{$n=4$}\\ \hline $(4)$&$ \frac{1}{24} X_{1}^{4} + \frac{1}{4} X_{1}^{3} + \frac{1}{2} X_{1}^{2} X_{2} + \frac{11}{24} X_{1}^{2} + \frac{1}{2} X_{1} X_{2} + \frac{1}{2} X_{2}^{2} + X_{1} X_{3} + \frac{1}{4} X_{1} + \frac{1}{2} X_{2} + X_{4} $\\ $(3,1)$&$ \frac{1}{8} X_{1}^{4} + \frac{1}{4} X_{1}^{3} + \frac{1}{2} X_{1}^{2} X_{2} - \frac{1}{8} X_{1}^{2} - \frac{1}{2} X_{1} X_{2} - \frac{1}{2} X_{2}^{2} - \frac{1}{4} X_{1} - \frac{1}{2} X_{2} - X_{4} $\\ $(2,2)$&$ \frac{1}{12} X_{1}^{4} - \frac{1}{12} X_{1}^{2} + X_{1} X_{2} + X_{2}^{2} - X_{1} X_{3} $\\ $(2,1^2)$&$ \frac{1}{8} X_{1}^{4} - \frac{1}{4} X_{1}^{3} - \frac{1}{2} X_{1}^{2} X_{2} - \frac{1}{8} X_{1}^{2} - \frac{1}{2} X_{1} X_{2} - \frac{1}{2} X_{2}^{2} + \frac{1}{4} X_{1} + \frac{1}{2} X_{2} + X_{4} $\\ $(1^4)$&$ \frac{1}{24} X_{1}^{4} - \frac{1}{4} X_{1}^{3} - \frac{1}{2} X_{1}^{2} X_{2} + \frac{11}{24} X_{1}^{2} + \frac{1}{2} X_{1} X_{2} + \frac{1}{2} X_{2}^{2} + X_{1} X_{3} - \frac{1}{4} X_{1} - \frac{1}{2} X_{2} - X_{4} $\\ \hline \multicolumn{2}{|c|}{$n=5$}\\ \hline $(5)$&$ \frac{1}{120} X_{1}^{5} + \frac{1}{12} X_{1}^{4} + \frac{1}{6} X_{1}^{3} X_{2} + \frac{7}{24} X_{1}^{3} + \frac{1}{2} X_{1}^{2} X_{2} + \frac{1}{2} X_{1} X_{2}^{2} + \frac{1}{2} X_{1}^{2} X_{3} + \frac{5}{12} X_{1}^{2} + \frac{5}{6} X_{1} X_{2} + \frac{1}{2} X_{1} X_{3} + X_{2} X_{3} + X_{1} X_{4} + \frac{1}{5} X_{1} + X_{5} $\\ $(4, 1)$&$ \frac{1}{30} X_{1}^{5} + \frac{1}{6} X_{1}^{4} + \frac{1}{3} X_{1}^{3} X_{2} + \frac{1}{6} X_{1}^{3} + \frac{1}{2} X_{1}^{2} X_{3} - \frac{1}{6} X_{1}^{2} - \frac{1}{3} X_{1} X_{2} - \frac{1}{2} X_{1} X_{3} - X_{2} X_{3} - \frac{1}{5} X_{1} - X_{5} $\\ $(3, 2)$&$ \frac{1}{24} X_{1}^{5} + \frac{1}{12} X_{1}^{4} + \frac{1}{6} X_{1}^{3} X_{2} - \frac{1}{24} X_{1}^{3} + \frac{1}{2} X_{1}^{2} X_{2} + \frac{1}{2} X_{1} X_{2}^{2} - \frac{1}{2} X_{1}^{2} X_{3} - \frac{1}{12} X_{1}^{2} - \frac{1}{6} X_{1} X_{2} + \frac{1}{2} X_{1} X_{3} + X_{2} X_{3} - X_{1} X_{4} $\\ $(3, 1^2)$&$ \frac{1}{20} X_{1}^{5} - \frac{1}{4} X_{1}^{3} - X_{1}^{2} X_{2} - X_{1} X_{2}^{2} + \frac{1}{5} X_{1} + X_{5} $\\ $(2^2, 1)$&$ \frac{1}{24} X_{1}^{5} - \frac{1}{12} X_{1}^{4} - \frac{1}{6} X_{1}^{3} X_{2} - \frac{1}{24} X_{1}^{3} + \frac{1}{2} X_{1}^{2} X_{2} + \frac{1}{2} X_{1} X_{2}^{2} - \frac{1}{2} X_{1}^{2} X_{3} + \frac{1}{12} X_{1}^{2} + \frac{1}{6} X_{1} X_{2} - \frac{1}{2} X_{1} X_{3} - X_{2} X_{3} + X_{1} X_{4} $\\ $(2, 1^3)$&$ \frac{1}{30} X_{1}^{5} - \frac{1}{6} X_{1}^{4} - \frac{1}{3} X_{1}^{3} X_{2} + \frac{1}{6} X_{1}^{3} + \frac{1}{2} X_{1}^{2} X_{3} + \frac{1}{6} X_{1}^{2} + \frac{1}{3} X_{1} X_{2} + \frac{1}{2} X_{1} X_{3} + X_{2} X_{3} - \frac{1}{5} X_{1} - X_{5} $\\ $(1^5)$&$ \frac{1}{120} X_{1}^{5} - \frac{1}{12} X_{1}^{4} - \frac{1}{6} X_{1}^{3} X_{2} + \frac{7}{24} X_{1}^{3} + \frac{1}{2} X_{1}^{2} X_{2} + \frac{1}{2} X_{1} X_{2}^{2} + \frac{1}{2} X_{1}^{2} X_{3} - \frac{5}{12} X_{1}^{2} - \frac{5}{6} X_{1} X_{2} - \frac{1}{2} X_{1} X_{3} - X_{2} X_{3} - X_{1} X_{4} + \frac{1}{5} X_{1} + X_{5} $\\ \hline \end{tabular} \end{center} \caption{Character polynomials of Weyl modules} \label{table-char_poly} \end{table} } The polynomials $S_\lambda$ for partitions $\lambda$ of integers at most $5$ are given in Table~\ref{table-char_poly}. The highest degree coefficients in these expansions are character values of symmetric groups. More precisely, we have: \begin{theorem} \label{theorem:binomial-coeff} Let $\lambda$ be a partition of a positive integer $d$. For every partition $\alpha=1^{a_1}2^{a_2}\dotsb$ of $d$, the coefficient of $\binom X\alpha$ in the expansion of $S_\lambda$ in the binomial basis (Definition~\ref{definition:binomial-basis}) is $\chi_\lambda(w_\alpha)$, where $w_\alpha$ is a permutation with cycle type $\alpha$. \end{theorem} The theorem will be a consequence of the following lemma: \begin{lemma} \label{lemma:highest-coeffs} Let $\lambda$ be a partition of a positive integer $d$. For every partition $\alpha$ of $d$, the coefficient of $\binom X\alpha$ in the expansion of $H_\lambda$ in the binomial basis is $\sigma_\lambda(w_\alpha)$, the value of the character $\sigma_\lambda$ of the permutation representation of $S_d$ induced from the trivial representation of the Young subgroup $S_{\lambda_1}\times \dotsb \times S_{\lambda_l}$ (see \cite[Section~2.2]{MR644144} or \cite[Section~2.3]{MR3287258}) at a permutation $w_\alpha$ with cycle type $\alpha$. \end{lemma} \begin{proof} Consider the set of ordered set partitions of $[d]$ with parts of sizes given by $\lambda$: \begin{displaymath} X_\lambda = \{(T_1,\dotsc,T_l)\mid [d]=T_1\cup\dotsb \cup T_l \text{ is a set partition, with $|T_i|=\lambda_i$}\}. \end{displaymath} Let $K[X_\lambda]$ be the permutation representation associated to the action of $S_d$ on $X_\lambda$. This representation is isomorphic to the representation of $S_d$ induced from the trivial representation of its Young subgroup $S_{\lambda_1}\times \dotsb \times S_{\lambda_l}$. Therefore $\sigma_\lambda$ is the character of $K[X_\lambda]$, and $\sigma_\lambda(w_\alpha)=|X_\lambda^{w_\alpha}|$, the number of fixed points of a permutation $w_\alpha$ in $X_\lambda$. Take $(T_1,\dotsc,T_l)\in X_\lambda^{w_\alpha}$. Then each $T_i$ is formed by taking a union of cycles of $w_\alpha$. Suppose that $b_{ij}$ is the number of $j$ cycles of $w_\alpha$ in $T_i$. Then the array $(b_{ij})$ satisfies the constraints: \begin{gather} \label{eq:brow} b_{i1}+2b_{i2}+\dotsb = \lambda_i \text{ for each $i$},\\ b_{1j}+b_{2j}+\dotsb = a_j \text{ for each $j$}, \end{gather} where $a_j$ is the number of $j$-cycles in $\alpha$. Let $B(\lambda;\alpha)$ denote the set of such arrays. We have: \begin{equation} \label{eq:fixed-pt-sum} \mathrm{trace}(w_\alpha,K[X_\lambda]) = \sum_{(b_{ij})\in B(\lambda;\alpha)} \prod_j\binom{a_j}{b_{1j}\;b_{2j}\;\dotsb}. \end{equation} On the other hand, by \eqref{eq:sym-char}, \begin{displaymath} H_\lambda = \sum_{b_{i1}+2b_{i2}+\dotsb=\lambda_i}\prod_{i\geq 1}\prod_{j\geq 1}\mch{X_j}{b_{ij}}. \end{displaymath} The terms of homogeneous degree $d$ in this product come from the top degree terms in each factor. When $|\alpha|=|\lambda|$, such a term has leading coefficient $\prod_j X_j^{a_j}$ if and only if $(b_{ij})\in B(\lambda;\alpha)$. Hence the coefficient of $\binom X\alpha$ is the expression on the right hand side of \eqref{eq:fixed-pt-sum} and the lemma follows. \end{proof} \begin{proof} [Proof of Theorem~\ref{theorem:binomial-coeff}] For partitions $\lambda$ and $\mu$ of $d$, let $K_{\mu\lambda}$ denote the number of semistandard Young tableaux of shape $\mu$ and weight $\lambda$. Then $K=(K_{\mu\lambda})$ is a unitriangular integer matrix with rows and columns indexed by partitions of $d$. We have: \begin{align} \label{eq:kostka1} H_\lambda &= \sum_\mu K_{\mu\lambda}S_\mu,\\ \label{eq:kostka2} \sigma_\lambda & = \sum_\mu K_{\mu\lambda}\chi_\mu. \end{align} Let $K^{-1}_{\mu\lambda}$ be the entries of the inverse matrix $K^{-1}$. Then \begin{align*} S_\lambda & = \sum_\mu K_{\mu\lambda}^{-1}H_\mu & \text{by \eqref{eq:kostka1}}\\ & \equiv \sum_\mu K^{-1}_{\mu\lambda}\sum_{\alpha} \sigma_\mu(\alpha)\binom X\alpha & \text{ignoring lower deg. terms (Lemma~\ref{lemma:highest-coeffs})}\\ & = \sum_{\alpha\vdash d}\sum_\mu K^{-1}_{\mu\lambda}\sigma_\mu(\alpha) \binom X\alpha \\ & = \sum_\alpha \chi_\lambda(\alpha)\binom X\alpha & \text{by \eqref{eq:kostka2}}, \end{align*} thereby completing the proof of Theorem~\ref{theorem:binomial-coeff}. \end{proof} \begin{theorem} \label{theorem:weyl-char-poly-gen} For every partition $\lambda=(\lambda_1,\dotsc,\lambda_l)$, $S_\lambda$ is the coefficient of $t_1^{\lambda_1}\dotsb t_l^{\lambda_l}$ in \begin{displaymath} \prod_{i<j}(1-t_j/t_i)\prod_{r=1}^l \prod_{i\geq 1} (1-t_r^i)^{-X_i}. \end{displaymath} \end{theorem} \begin{proof} For every vector $\lambda=(\lambda_1,\dotsc,\lambda_l)$ with non-negative integer coefficients, define: \begin{displaymath} S_\lambda = \det(H_{\lambda_i-i+j}). \end{displaymath} When $\lambda$ is a partition this coincides with the character polynomial of the Weyl module $W_\lambda$. Then, for every partition $\lambda$, $S_\lambda$ is the coefficient of $t^\lambda$ in $\sum_{\lambda\geq 0} S_\lambda t^\lambda$. Here $\lambda\geq 0$ indicates that the sum is over all vectors in $\mathbf Z_{\geq 0}^l$, and $t^\lambda = t_1^{\lambda_1}\dotsb t_l^{\lambda_l}$. Now \begin{align*} \sum_{\lambda\geq 0}S_\lambda t^\lambda & = \sum_{\lambda\geq 0}\sum_{w\in S_l} \mathrm{sgn}(w)\prod_{r=1}^l H_{\lambda_r-r+w(r)}t_r^{\lambda_r}\\ & = \sum_{w\in S_l} \mathrm{sgn}(w) \prod_{r=1}^l t_r^{r-w(r)} \sum_{\lambda_r\geq 0} H_{\lambda_r-r+w(r)}t_r^{\lambda_r-r+w(r)}\\ & = \sum_{w\in S_l} \mathrm{sgn}(w) \prod_{r=1}^l t_r^{r-w(r)} \sum_{\lambda_r\geq 0} H_{\lambda_r}t_r^{\lambda_r}\\ & = \prod_{i<j}(1-t_j/t_i)\prod_{r=1}^l\prod_{i\geq 1}(1-t_r^i)^{-X_i}. \end{align*} Here we have used the convention that $H_d=0$ when $d<0$. \end{proof} \subsection{Duality} \label{sec:duality} Going through the entries of Table~\ref{table-char_poly}, the reader may have noticed that the coefficients in the expansion of $S_\lambda$ agree up to sign with those of $S_{\lambda'}$ for every partition $\lambda$. For each vector $\mu=(\mu_1,\dotsc,\mu_m)$ with non-negative integer entries, let $X^\mu = X_1^{\mu_1}\dotsb X_m^{\mu_m}$, and $|\mu|=\mu_1+\dotsb+\mu_m$. \begin{theorem} For every partition $\lambda$, if $S_\lambda = \sum_\mu a^\lambda_\mu X^\mu$, then $S_{\lambda'} = \sum_\mu (-1)^{|\lambda|-|\mu|}a^\lambda_\mu X^\mu$. \end{theorem} \begin{proof} Let $\tau_d:P\to P$ denote the linear involution defined by $X^\mu\mapsto (-1)^{d-|\mu|}X^\mu$. Comparing equations \eqref{eq:H} and \eqref{eq:E} shows that: \begin{displaymath} \tau_d(H_d)=E_d. \end{displaymath} It follows that, if $|\mu|=d$, then \begin{displaymath} \tau_d(H_{\mu_1}\dotsb H_{\mu_m}) = E_{\mu_1}\dotsb E_{\mu_m}. \end{displaymath} When $\lambda$ is a partition of $d$, then every term in the expansion of the Jacobi--Trudi determinants $\det(H_{\lambda_i+j-i})$ is of the form $H_\mu$ or $E_\mu$ for integer vector $\mu$ with $|\mu|=d$. Therefore $\tau_d(\det(H_{\lambda_i+j-i})) = \det(E_{\lambda_i+j-i})$. By the Jacobi--Trudi identities \eqref{eq:jt}, \begin{displaymath} \tau_d(S_\lambda) = \tau_d(\det(H_{\lambda_i+j-i})) = \det(E_{\lambda_i+j-i}) = S_{\lambda'}, \end{displaymath} as claimed. \end{proof} \section{The Restriction Problem} \label{sec:relat-with-char} \subsection{Character Polynomials of Specht Modules} \label{sec:char-polyn-specht} Recall that for partitions $\lambda$ and $\mu$, we say that $\lambda-\mu$ is a vertical strip if the Young diagram of $\mu$ is contained inside the Young diagram of $\lambda$, and each row of the Young diagram of $\lambda$ contains at most one box that is not in the Young diagram of $\mu$ \cite[Section~I.1]{MR3443860}. For any partition $\lambda$, Macdonald \cite[Example~I.7.14(b)]{MR3443860} gave the character polynomials $q_\lambda\in P$ of \eqref{eq:qla} as follows: \begin{equation} \label{eq:q_mu-mac} q_\lambda = \sum_{\{\mu\mid \lambda-\mu \text{ is a vertical strip}\}} (-1)^{|\lambda|-|\mu|} \sum_{\alpha \vdash |\mu|} \chi_\mu(\alpha)\binom X\alpha. \end{equation} It immediately follows that the leading coefficients of $q_\lambda$ in the binomial basis are the same as those of $S_\lambda$ (see Theorem~\ref{theorem:binomial-coeff}): \begin{theorem} Let $\lambda$ be a partition of a positive integer $d$. For every partition $\alpha$ of $d$, the coefficient of $\binom X\alpha$ in the expansion of $q_\lambda$ in the binomial basis of $P$ is $\chi_\lambda(\alpha)$. \end{theorem} \begin{corollary} \label{corollary:qla-leading} The sets: \begin{align*} \mathbf S & = \{S_\lambda \mid \lambda \text{ is an integer partition}\},\\ \mathbf q & = \{q_\lambda \mid \lambda \text{ is an integer partition}\} \end{align*} are bases of $P$. \end{corollary} \begin{proof} Regard $P$ as a graded algebra where the degree of $X_i$ is $i$ for each $i\geq 1$. Let $P_d$ denote the homogeneous elements of degree $d$ in $P$. The degree $d$ homogeneous parts of $\binom X\alpha$, as $\alpha$ runs over all partitions of $d$, form a basis of $P_d$. Theorem~\ref{theorem:binomial-coeff} and the identity (\ref{eq:q_mu-mac}) imply that the degree $d$ homogeneous parts of $S_\lambda$ and $q_\lambda$ also form such a basis as $\lambda$ runs over all partitions of $d$, since the character table of $S_d$ forms a non-singular matrix. Therefore $\mathbf S$ and $\mathbf q$ are bases of $P$. \end{proof} \subsection{Stable Restriction Coefficients} The coefficients in the expansion of the elements of the basis $\mathbf S$ in terms of the basis $\mathbf q$: \begin{displaymath} S_\lambda = \sum_\mu r_{\lambda\mu} q_\mu \end{displaymath} are called the stable restriction coefficients. They determine the decomposition of a Weyl module $W_\lambda(K^n)$ into irreducible representations of $S_n$: \begin{displaymath} \Res^{GL_n(K)}_{S_n}W_\lambda(K^n) = \bigoplus_\mu V_{\mu[n]}^{\oplus r_{\lambda\mu}}. \end{displaymath} The following result, which is now immediate, is an algorithm for computing the stable restriction coefficients: \begin{theorem} \label{theorem:stable-res} For any partitions $\lambda$ and $\mu$, \begin{displaymath} r_{\lambda\mu} = \mom{S_\lambda q_\mu}. \end{displaymath} \end{theorem} The polynomial $S_\lambda$ can be computed using Theorem~\ref{theorem:char-poly-weyl}, $q_\mu$ using \eqref{eq:q_mu-mac}. After expanding the product in the binomial basis, the moment can be computed using Theorem~\ref{theorem:moment}. The matrix of the stable restriction coefficients $r_{\lambda\mu}$, as $\lambda$ and $\mu$ run over partitions of $0\leq n\leq 5$ is given by: \begin{displaymath} \left( \begin{array}{r|r|rr|rrr|rrrrr|rrrrrrr} 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ \hline 1 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ \hline 2 & 2 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ 0 & 1 & 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ \hline 3 & 4 & 2 & 1 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ 1 & 3 & 2 & 2 & 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ 0 &0 & 0 & 1 & 0 & 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ \hline 5 & 7 & 5 & 2 & 2 & 1 & 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ 2 & 7 & 5 & 6 & 2 & 3 & 1 & 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ 2 & 3 & 4 & 1 & 1 & 2 & 0 & 0 & 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ 0 & 1 & 1 & 3 & 0 & 2 & 2 & 0 & 0 & 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ 0 & 0 & 0 & 0 & 0 & 0 & 1 & 0 & 0 & 0 & 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 0 \\ \hline 7 & 12 & 9 & 5 & 5 & 3 & 0 & 2 & 1 & 0 & 0 & 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0 \\ 5 & 14 & 13 & 12 & 6 & 9 & 3 & 2 & 3 & 1 & 1 & 0 & 0 & 1 & 0 & 0 & 0 & 0 & 0 \\ 4 & 10 & 11 & 8 & 6 & 8 & 2 & 1 & 3 & 2 & 1 & 0 & 0 & 0 & 1 & 0 & 0 & 0 & 0 \\ 0 & 3 & 4 & 8 & 1 & 7 & 6 & 0 & 2 & 1 & 3 & 1 & 0 & 0 & 0 & 1 & 0 & 0 & 0 \\ 1 & 3 & 4 & 3 & 2 & 5 & 1 & 0 & 1 & 2 & 2 & 0 & 0 & 0 & 0 & 0 & 1 & 0 & 0 \\ 0 & 0 & 0 & 1 & 0 & 1 & 3 & 0 & 0 & 0 & 2 & 2 & 0 & 0 & 0 & 0 & 0 & 1 & 0 \\ 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 0 & 1 & 0 & 0 & 0 & 0 & 0 & 0 & 1 \end{array} \right) \end{displaymath} The blocks demarcate the partitions of each integer $n$, and within each block, the partitions of $n$ are enumerated in reverse lexicographic order. \subsection{Relation to Symmetric Functions} \label{sec:oz} Let $\Lambda$ denote the ring of symmetric functions (as in \cite[Section~I.2]{MR3443860}). Macdonald \cite[Example~I.7.13]{MR3443860} constructed an isomorphism $\phi:\Lambda\to P$ taking the Schur function $s_\lambda$ to the character polynomial $q_\lambda$. In this section we study a different isomorphism $\Phi:\Lambda\to P$, due to Orellana and Zabrocki \cite{2016arXiv160506672O}, which takes $s_\lambda$ to $S_\lambda$. Under this isomorphism $q_\lambda$ is the image of $\tilde s_\lambda$ the \emph{Specht symmetric functions} of \cite{assaf-speyer,2016arXiv160506672O}. Following \cite[Proposition~12]{2016arXiv160506672O}, define an algebra homomorphism\linebreak $\Phi:\Lambda\to P$ by: \begin{equation} \Phi:p_k\mapsto \sum_{d|k} dX_d. \end{equation} For each $k>0$, define \begin{displaymath} \Xi_k = 1, e^{2\pi i/k}, e^{4\pi i/k},\dotsc e^{2(k-1)\pi i/k}, \end{displaymath} and for an integer partition $\mu=(\mu_1,\dotsc,\mu_m)$, \begin{displaymath} \Xi_\mu = \Xi_{\mu_1},\dotsc,\Xi_{\mu_m}. \end{displaymath} Let $R_n$ denote the space of $K$-valued class functions on $S_n$. For every $n\geq 0$ there is a map $\mathrm{ev}_\Lambda^n:\Lambda\to R_n$ defined by: \begin{displaymath} \mathrm{ev}_\Lambda^n f(w) = f(\Xi_\mu), \end{displaymath} where $\mu$ is the cycle type of $w$. In other words, the symmetric function is evaluated on $|\mu|$ variables, whose values are given by the list $\Xi_\mu$, the remaining variables being set to $0$. With this definition, $\mathrm{ev}^n_\Lambda(s_\lambda)$ is the character of $\Res^{GL_n(K)}_{S_n} W_\lambda(K^n)$. For each $q\in P$ consider the function $\mathrm{ev}_P^n(q)\in R_n$ given by: \begin{displaymath} \mathrm{ev}_P^n(q)(w) = q(X_1(w),X_2(w),\dotsc). \end{displaymath} This defines a ring homomorphism $\mathrm{ev}_P^n:P\to R_n$. Observe that $\oplus_{n=1}^\infty \mathrm{ev}_P^n:P\to \oplus_{n=1}^\infty R_n$ is injective, for if $\mathrm{ev}_P^n(q)\equiv 0$ for all $n$, then $q$ vanishes whenever $X_1,X_2,\dotsc$ take non-negative integer values, and hence $q$ must be identically $0$. \begin{theorem} \label{theorem:Phi} The algebra homomorphism $\Phi$ is the unique $K$-linear map $\Lambda\to P$ such that the diagram \begin{equation} \label{eq:oznpps} \xymatrix{ \Lambda\ar[rr]^\Phi\ar[dr]_{\mathrm{ev}_\Lambda^n}& & P\ar[dl]^{\mathrm{ev}_P^n}\\ & R_n & } \end{equation} commutes for every $n\geq 1$. \end{theorem} \begin{proof} From the definition of $\mathrm{ev}^n_\Lambda$, \begin{displaymath} \mathrm{ev}_\Lambda^n(p_k)(w) = \sum_d X_d(w) \sum_{j=0}^{d-1}(e^{2\pi i/d})^{jk}. \end{displaymath} Now observe that \begin{displaymath} \sum_{j=0}^{d-1} (e^{2\pi i/d})^{jk} = \begin{cases} d & \text{if } d|k,\\ 0 & \text{otherwise}. \end{cases} \end{displaymath} It follows that \begin{displaymath} \mathrm{ev}_\Lambda^n(p_k)(w) = \sum_{d|k} dX_d(w) = \mathrm{ev}_P^n(\Phi(p_k)). \end{displaymath} Since $\oplus_n \mathrm{ev}_P^n:P\to \oplus R_n$ is injective, $\Phi(p_k)$ is completely determined by the commutativity of \eqref{eq:oznpps}. Since the polynomials $\{p_k\}_{k\geq 1}$ generate $\Lambda$, $\Phi$ is completely determined by its values on $p_k$. \end{proof} \begin{lemma} The homomorphism $\Phi:\Lambda\to P$ is an isomorphism of rings. \end{lemma} \begin{proof} The inverse of $\Phi$ is obtained using the M\"obius inversion formula: \begin{displaymath} X_k\mapsto \frac 1d \sum_{d|k}\mu(k/d) p_d, \end{displaymath} where $\mu$ denotes the number-theoretic M\"obius function (see, e.g., \cite[Section~3.1.1]{rota}). \end{proof} \begin{theorem} For every partition $\lambda$, we have: \begin{align} \Phi(s_\lambda) & = S_\lambda,\\ \label{eq:oz} \Phi(\tilde s_\lambda) & = q_\lambda. \end{align} \end{theorem} \begin{proof} This follows immediately from Theorem~\ref{theorem:Phi}. \end{proof} \begin{remark} The second identity \eqref{eq:oz} is \cite[Prop.~12]{2016arXiv160506672O}. \end{remark} \section{Moment Generating Functions} \label{sec:moment-gener-funct} \subsection{The Main Generating Function} \label{sec:master-generating-function} In this and the following subsections, we shall frequently use the following elementary identities: \begin{gather} \tag A \label{eq:exp} \exp(t/i) = \sum_{b\geq 0} \frac 1{i^bb!} t^b,\\ \tag B \label{eq:log} \log \frac 1{1-t} = \sum_{i=1}^\infty t^i/i. \end{gather} We shall use $\alpha=1^{a_1}2^{a_2}\dotsb$, $\beta = 1^{b_1}2^{b_2}\dotsb$, $\gamma = 1^{c_1}2^{c_2}\dotsb$. Let $\mathrm{Par}$ denote the set of all integer partitions. We use the notation $\lambda=(\lambda_1,\dotsc,\lambda_l)$, $\mu=(\mu_1,\dotsc,\mu_m)$. Also, $t^\lambda = t_1^{\lambda_1}\dotsb t_l^{\lambda_l}$ and $u^\mu = u_1^{\mu_1}\dotsb u_m^{\mu_m}$. We shall interpret $\lambda\geq 0$ as $\lambda_i\geq 0$ for $i=1,\dotsc,l$ and $\mu\geq 0$ as $\mu_i\geq 0$ for $i=1,\dotsc,m$. We use the notation $R\sqsubset [l]$ to signify that $R$ is a multiset with elements drawn from $[l]$. We write $t^R$ for the monomial where $t_i$ is raised to the multiplicity of $i$ in $R$. Similarly, for any $S\subset [m]$, we write $u^S=\prod_{i\in S}u_i$. \begin{theorem} \label{theorem:hlaemu} We have: \begin{displaymath} \sum_{n\geq 0,\lambda\geq 0,\mu\geq 0} \mom{H_\lambda E_\mu}_n t^\lambda u^\mu v^n = \prod_{R\sqsubset [l]}\frac{\prod_{S\subset [m],\;|S|\text{ odd}}(1+u^St^Rv)}{\prod_{S\subset [m],\;|S|\text{ even}}(1-u^St^Rv)}. \end{displaymath} \end{theorem} \begin{proof} Using \eqref{eq:H} and \eqref{eq:E}, we have: \begin{displaymath} \sum_{\lambda\geq 0,\mu\geq 0} H_\lambda E_\mu t^\lambda u^\mu = \prod_{r=1}^l\prod_{s=1}^m \prod_{i\geq 1} \left(\frac{1-(-u_s)^i}{1-t_r^i}\right)^{X_i}. \end{displaymath} Now proceeding as in the proof of Theorem~\ref{theorem:moment}, \begin{align*} \sum_{n\geq 0,\lambda\geq 0,\mu\geq 0} \mom{H_\lambda E_\mu}_n t^\lambda u^\mu v^n & = \prod_{i\geq 1}\sum_{b_i\geq 0}\frac{v^{ib_i}}{i^{b_i}b_i!}\prod_{r=1}^l\prod_{s=1}^m \left(\frac{1-(-u_s)^i}{1-t^i_r}\right)^{b_i}\\ & \overset{\eqref{eq:exp}}{=} \prod_{i\geq 1}\exp\left(\frac{v^i}{i}\prod_{r=1}^l\prod_{s=1}^m\left[\frac{1-(-u_s)^i}{1-t^i_r}\right]\right) \\ & = \exp\left(\sum_{i\geq 1}\sum_{R\sqsubset[l]}\sum_{S\subset[m]}(-1)^{|S|} \frac{(t^R(-1)^{|S|}u^Sv)^i}i\right)\\ & \overset{~\eqref{eq:log}}{=} \prod_{R\sqsubset[l]}\prod_{S\subset[m]} \left(1-(-1)^{|S|}t^Ru^Sv\right)^{(-1)^{|S|+1}}, \end{align*} which is equivalent to the desired expression. \end{proof} \begin{corollary} \label{corollary:hlamu} We have: \begin{displaymath} \sum_{\lambda\geq 0,\mu\geq 0} \mom{H_\lambda E_\mu} t^\lambda u^\mu = \prod_{R,S}(1-(-1)^{|S|}u^St^R)^{(-1)^{|S|+1}}, \end{displaymath} where the product is over $R\sqsubset[l]$, $S\subset[m]$, with at least one of $R$ and $S$ non-empty. \end{corollary} \begin{corollary} \label{corollary:weyl-mom} For every partition $\lambda$, $\mom{W_\lambda}_n$ is the coefficient of $t^\lambda v^n$ in \begin{displaymath} \prod_{i<j}(1-t_j/t_i) \prod_{R\sqsubset[l]}(1-t^Rv)^{-1}. \end{displaymath} \end{corollary} \begin{proof} From Theorem~\ref{theorem:hlaemu} we get: \begin{equation} \label{eq:hmomgen} \sum_{\lambda\geq 0,n\geq 0} \mom{H_\lambda}_n t^\lambda v^n = \prod_{R\sqsubset [l]} (1-t^Rv)^{-1}. \end{equation} Using this, the corollary can be deduced from Theorem~\ref{theorem:weyl-char-poly-gen} by taking moments. \end{proof} \subsection{$S_n$-invariant Vectors} \label{sec:s_n-invar-vect} For a representation $V_n$ of $S_n$, let $V_n^{S_n}$ denote the subspace of $S_n$-invariant vectors. If a family $\{V_n\}$ of representations has polynomial character $q\in P$, then \begin{displaymath} \mom q_n = \dim(V_n^{S_n}) \text{ for all $n\geq 0$}. \end{displaymath} Therefore, for any partition $\lambda$, $\dim W_\lambda(K^n)^{S_n}=\mom{S_\lambda}_n$. In particular, $W_\lambda(K^n)$ has a non-zero $S_n$-invariant vector if and only if $\mom{S_\lambda}_n\neq 0$. \begin{theorem} \label{theorem:monotonicity} For every positive integer $n$ and every partition $\lambda$ with at most $n$ parts, \begin{displaymath} \dim W_\lambda(K^n)^{S_n} \leq \dim W_\lambda(K^{n+1})^{S_{n+1}}. \end{displaymath} \end{theorem} \begin{proof} We use Littlewood's plethystic formula \cite[Theorem XI]{MR95209} (see also, \cite[Theorem~2.6]{poly-ind}) for restriction coefficients. This formula asserts that, for every partition $\lambda$ with at most $n$ parts, and every partition $\mu$ of $n$, the multiplicity of the Specht module $V_\mu$ in $\Res^{GL_n(K)}_{S_n} W_\lambda(K^n)$ is given by $(s_\lambda, s_\mu[H])$. Here $(-,-)$ denotes the Hall inner product on symmetric functions, and $s_\mu[H]$ denotes the plethystic substitution of $H$ into $s_\mu$ (for definitions, see \cite[Section~1]{MR2576382}). Taking $\mu = (n)$ in Littlewood's formula gives \begin{displaymath} \dim W_\lambda(K^n)^{S_n} = (s_\lambda, h_n[H]). \end{displaymath} Recall \cite[Eq.~1.8]{MR2576382} that \begin{displaymath} h_{n+1}[H] - h_n[H] = h_{n+1}[H-1], \end{displaymath} so that \begin{displaymath} \dim W_\lambda(K^{n+1})^{S_{n+1}} - \dim W_\lambda(K^n)^{S_n} = (s_\lambda,h_{n+1}[H-1]) \geq 0. \end{displaymath} The inequality above holds because the plethystic substitution of a Schur-positive symmetric function into another is Schur-positive. \end{proof} \begin{definition} [Vector Partitions] Let $\mathbf v\in \mathbf Z_{\geq 0}^l$. A \emph{vector partition} of $\mathbf v$ is an unordered collection $\mathbf v_1,\dotsc,\mathbf v_n$ of non-zero vectors in $\mathbf Z^l_{\geq 0}$ such that \begin{displaymath} \mathbf v = \mathbf v_1+\dotsb + \mathbf v_n. \end{displaymath} Let $p_n(\mathbf v)$ (resp. $p_{\leq n}(\mathbf v)$) denote the number of vector partitions of $\mathbf v$ with exactly (resp. at most) $n$ parts. \end{definition} \begin{theorem} \label{theorem:weyl-mom} For every partition $\lambda=(\lambda_1,\dotsc,\lambda_l)$, \begin{displaymath} \dim W_\lambda(K^n)^{S_n} = \sum_{w\in S_l} \mathrm{sgn}(w)p_{\leq n}(\lambda_1-1+w(1),\dotsc,\lambda_l-l+w(l)). \end{displaymath} \end{theorem} \begin{proof} The coefficient of $t^\lambda v^n$ in the right hand side of \eqref{eq:hmomgen} is $p_{\leq n}(\lambda)$. Therefore, \begin{equation} \label{eq:hmom} \mom{H_\lambda}_n = p_{\leq n}(\lambda) \text{ for every $\lambda\in \mathbf Z_{\geq 0}^l$}. \end{equation} By the Jacobi--Trudi identity \eqref{eq:jt}, \begin{displaymath} S_\lambda = \sum_{w\in S_l} H_{\lambda_1-1+w(1),\dotsc,\lambda_l-l+w(l)}, \end{displaymath} so by \eqref{eq:hmom}, \begin{displaymath} \mom{S_\lambda}_n = \sum_{w\in S_l} \mathrm{sgn}(w)p_{\leq n}(\lambda_1-1+w(1),\dotsc,\lambda_l-l+w(l)), \end{displaymath} as claimed. \end{proof} \begin{remark} In general, we do not know of a combinatorial proof of the non-negativity of $\sum_{w\in S_l} \mathrm{sgn}(w)p_{\leq n}(\lambda_1-1+w(1),\dotsc,\lambda_l-l+w(l))$, which follows from Theorem~\ref{theorem:weyl-mom}. When $l=2$, this is the main result of Kim and Hahn~\cite{Kim1997}, who refer to it as a conjecture of Landman, Brown and Portier \cite{landman1992partitions}. \end{remark} The problem of characterizing those partitions $\lambda$ for which $W_\lambda(K^n)$ has a non-zero $S_n$-invariant vector for large $n$ appears to be quite hard. The following result solves this problem for partition with two rows, two columns, and for hook-partitions. \begin{theorem} \label{theorem:2row2colhook} Let $\lambda$ be a partition. \renewcommand{\theenumi}{\thetheorem.\arabic{enumi}} \begin{enumerate} \item \label{item:1} If $\lambda=(\lambda_1,\lambda_2)$, then $\mom{S_\lambda}>0$ unless $\lambda=(1,1)$. \item \label{item:2} If $\lambda'=(\lambda_1,\lambda_2)$, then $\mom{S_\lambda}>0$ if and only if $\lambda_1=\lambda_2$ (in which case $\mom{S_\lambda}=2$) or $\lambda_1=\lambda_2+1$ (in which case $\mom{S_\lambda}=1$). \item \label{item:3} If $\lambda = (a+1,1^b)$, then $\mom{S_\lambda}>0$ if and only if $a\geq \binom{b+1}2$. \end{enumerate} \end{theorem} \begin{proof} [Proof of (\ref{item:1})] By Theorem~\ref{theorem:weyl-mom} we need to show that, for every $\lambda_1\geq \lambda_2\geq 1$, \begin{displaymath} p_{\leq n}(\lambda_1,\lambda_2)>p_{\leq n}(\lambda_1+1,\lambda_2-1) \end{displaymath} for sufficiently large $n$, unless $\lambda_1=\lambda_2=1$. From the main result of Kim and Hahn \cite{Kim1997} (the result on the last line of the first page), it follows that \begin{displaymath} p_n(\lambda_1,\lambda_2)\geq p_n(\lambda_1+1,\lambda_2-1) \text{ for all $n\geq 1$.} \end{displaymath} Therefore, it suffices to prove that $p_n(\lambda_1,\lambda_2)> p_n(\lambda_1+1,\lambda_2-1)$ for at least one value of $n$. When $k\geq l\geq 1$ are such that at least one of $k$ and $l$ is even, $p_2(k,l)>p_2(k+1,l-1)$. When both $k$ and $l$ are odd and $(k,l)\neq (1,1)$, $p_3(k,l)>p_3(k+1,l-1)$. These inequalities will be proved in Lemmas~\ref{lemma:p2} and~\ref{lemma:p3} below. \end{proof} \begin{lemma} \label{lemma:p2p3} For all $k,l\geq 0$, \begin{align} \label{eq:p2} p_2(k,l) & = \begin{cases} \frac{(k+1)(l+1)-1}2 & \text{if both $k$ and $l$ are even,}\\ \frac{(k+1)(l+1)}2-1 & \text{otherwise}, \end{cases} \\ \label{eq:p3} p_3(k,l) & = \frac 16(A+3B+2C), \end{align} where \begin{align*} A & = \binom{k+2}2\binom{l+2}2-3(k+1)(l+1)+3,\\ B & = \begin{cases} (k/2+1)(l/2+1)-2 &\text{if $k$ and $l$ are even,}\\ (k+1)(l+2)/4-1 &\text{if $k$ is odd and $l$ is even,}\\ (k+2)(l+1)/4-1 &\text{if $k$ is even and $l$ is odd,}\\ (k+1)(l+1)/4 - 1 &\text{otherwise}, \end{cases} \\ C & = \begin{cases} 1 &\text{if $k$ and $l$ are divisible by $3$,}\\ 0 &\text{otherwise.} \end{cases} \end{align*} \end{lemma} \begin{proof} Consider the set of all ordered triples $((k_1,l_1),(k_2,l_2),(k_3,l_3))$ such that $\sum_i (k_i,l_i)=(k,l)$ and no $(k_i,l_i)=(0,0)$. The group $S_3$ acts by permutation on the set of all such triples, and the number of orbits if $p_3(k,l)$. The quantities $A$, $B$, and $C$ in Lemma~\ref{lemma:p2p3} are the number of such triples that are fixed by permutations in $S_3$ of cycle types $(1,1,1)$, $(2,1)$, and $(3)$, respectively. The formula for $p_3(k,l)$ then follows from Burnside's lemma. The formula for $p_2(k,l)$ is obtained in a similar fashion. \end{proof} \begin{lemma} \label{lemma:p2} For all integers $k\geq l\geq 1$ such that at least one of $k$ and $l$ is even, \begin{displaymath} p_2(k,l)>p_2(k+1,l-1). \end{displaymath} \end{lemma} \begin{proof} By Lemma~\ref{lemma:p2p3}, we also have: \begin{displaymath} p_2(k+1,l-1) = \begin{cases} \frac{(k+2)l-1}2 &\text{if $k$ and $l$ are odd,}\\ \frac{(k+2)l}2 -1 &\text{otherwise}. \end{cases} \end{displaymath} Thus, if $k$ and $l$ are both even and $k\geq l$, then \begin{align*} p_2(k,l)-p_2(k+1,l-1)&=\frac{(k+1)(l+1)-1}2-\left(\frac{(k+2)l}2-1\right)\\ &=\frac{k-l}2+1>0. \end{align*} If one of $k$ and $l$ is even and the other is odd, then \begin{align*} p_2(k,l)-p_2(k+1,l-1)&=\frac{(k+1)(l+1)}2-1-\left(\frac{(k+2)l}2-1\right)\\ &=\frac{k-l+1}2>0, \end{align*} thereby completing the proof of Lemma~\ref{lemma:p2}. \end{proof} \begin{lemma} \label{lemma:p3} If $k\geq l\geq 1$, both $k$ and $l$ are odd, and $(k,l)\neq (1,1)$, then $p_3(k,l)>p_3(k+1,l-1)$. \end{lemma} \begin{proof} When $k$ and $l$ are odd, Lemma~\ref{lemma:p2p3} gives: \begin{multline*} 12(p_3(k,l)-p_3(k+1,l-1)) \\ = \begin{cases} (kl+2l)(k-l) + k(k-3) + 3l + 4 & \text{if $3|k$ and $3|l$},\\ (kl+2l)(k-l) + k(k-3) + 3l & \text{otherwise}. \end{cases} \end{multline*} This is clearly positive for all $k\geq l$ such that $k\geq 3$ and $l\geq 1$. \end{proof} \begin{proof} [Proof of (\ref{item:2})] By the second Jacobi--Trudi identity, \begin{equation} \label{eq:wlap} W_{\lambda'} = E_{\lambda_1}E_{\lambda_2} - E_{\lambda+1}E_{\lambda_2-1}. \end{equation} Taking $l=0$ and $m=2$ Corollary~\ref{corollary:hlamu} gives: \begin{displaymath} \sum_{\lambda_1,\lambda_2\geq 0} \mom{E_{\lambda_1}E_{\lambda_2}}u_1^{\lambda_1}u_2^{\lambda_2} = \frac{(1+u_1)(1+u_2)}{(1-u_1u_2)}. \end{displaymath} Therefore the coefficient of $u_1^{\lambda_1}u_2^{\lambda_2}$ is the number $p'(\lambda_1,\lambda_2)$ of ways of writing $(\lambda_1,\lambda_2)$ as a sum of vectors of the form $(1,1)$, $(1,0)$ and $(0,1)$, where the vectors $(0,1)$ and $(1,0)$ are used at most once. Clearly \begin{displaymath} p'(\lambda_1,\lambda_2) = \begin{cases} 2 & \text{if $\lambda_1=\lambda_2 \geq 1$},\\ 1 & \text{if $|\lambda_1-\lambda_2|=1$},\\ 0 & \text{otherwise}. \end{cases} \end{displaymath} By \eqref{eq:wlap}, for any partition $\lambda=(\lambda_1,\lambda_2)$ with two parts, \begin{displaymath} \mom{W_{\lambda'}} = p'(\lambda_1,\lambda_2)-p'(\lambda_1+1,\lambda_2-1)= \begin{cases} 2 & \text{if $\lambda_1\geq \lambda_2 \geq 1$},\\ 1 & \text{if $\lambda_1-\lambda_2=1$},\\ 0 & \text{otherwise}, \end{cases} \end{displaymath} as claimed. \end{proof} \begin{proof} [Proof of (\ref{item:3})] Using Pieri's rule, we have: \begin{displaymath} h_ke_l=s_{(k-1|l)}+s_{(k|l-1)}, \end{displaymath} whence \begin{displaymath} s_{(a|b)}=h_{a+1}e_b-h_{a+2}e_{b-1} + \dotsb + (-1)^bh_{a+b+1}e_0. \end{displaymath} It follows that \begin{equation} \label{eq:mom-wab} \mom{W_{(a|b)}} = \sum_{j=0}^b (-1)^j\mom{H_{a+j+1}E_{b-j}}. \end{equation} Taking $l=m=1$ in Corollary~\ref{corollary:hlamu} gives: \begin{equation} \label{eq:he} \sum_{a,b\geq 0} \mom{H_iE_j}t^iu^j = \frac{\prod_{k=0}^\infty (1+t^ku)}{\prod_{k=1}^\infty (1-t^k)}. \end{equation} The coefficient of $t^iu^j$ in the above expression is the number $\tilde p(i,j)$ of ways of writing the vector $(i,j)$ as a sum of vectors of the form $(a,0)$ where $a>0$, and $(a,1)$ where $a\geq 0$, and vectors of the form $(a,1)$ are used at most once. If $\tilde p(i,j)>0$, then $j$ distinct vectors of the form $(a,1)$ are used, so that $i\geq \binom j2$. Therefore \begin{equation} \label{eq:zero-region} \tilde p(i,j) = 0 \text{ for all $i<\binom j2$}. \end{equation} If $a< \binom{b+1}2$, then $a-j<\binom{b+j+1}2$ for all $j\geq 0$. By \eqref{eq:zero-region} $\mom{H_{a-j}E_{b+j+1}}=0$ for all $j\geq 0$. This allows us to extend the index of summation in the right hand side of \eqref{eq:mom-wab} without changing the sum: \begin{multline*} \mom{W_{(a|b)}} = \sum_{j=-a-1}^b (-1)^j\mom{H_{a+j+1}E_{b-j}}\\ = \sum_{k+l=a+b+1}\mom{H_kE_l} = \mom{W_{(0|a+b+1)}}. \end{multline*} Taking $l=0$ and $m=1$ in Corollary~\ref{corollary:hlamu} can be used to show that $\mom{E_k}=0$ for all $k>1$, so $\mom{W_{(0|a+b+1)}}=\mom{E_{a+b+2}}=0$ for all $a,b\geq 0$. Therefore, $\mom{W_{(a|b)}}=0$ for $a<\binom{b+1}2$. Conversely, suppose $a\geq \binom{b+1}2$. By Theorem~\ref{theorem:monotonicity}, it suffices to show that $W_\lambda(K^n)$ contains a non-zero $S_n$-invariant vector for some positive integer $n$. We shall show that $W_\lambda(K^{b+1})$ contains a non-zero $S_{b+1}$-invariant vector. The hook partition $\lambda=(a+1,1^b)$ dominates the partition $\mu=(a-\binom b2+1,b,b-1,\dotsc,2,1)$, which has $b+1$ distinct parts. Therefore $W_{(a|b)}(K^{a+b+1})$ contains a non-zero vector $v$ with weight $\mu$. For each $w\in S_n$ let $v_w=\rho_{(a|b)}(w)v$. Then $v_w$ lies in the weight space of $w\cdot \mu$. Hence the vectors $\{v_w\mid w\in S_n\}$ are linearly independent, and generate a representation that is isomorphic to the regular representation of $S_n$. In particular, the trivial representation is contained in $W_{(a|b)}(K^{a+b+1})$. \end{proof} \section{Strict Polynomial Functors and $\mathrm{FI}$-modules} \label{sec:strict-polyn-funct-1} In this section we may take $K$ to be any field (not necessarily of characteristic zero). Friedlander and Suslin \cite{MR1427618} introduced strict polynomial functors to unify homogeneous polynomial representations of $GL_n(K)$ of degree $d$ across all $n$. Later, Church, Ellenberg and Farb \cite{MR3357185} introduced $\mathrm{FI}$-modules to unify representations of $S_n$ across all $n$. In this section, we lift the restriction functor $\Res^{GL_n(K)}_{S_n}$ to a functor from the category of strict polynomial functors to the category of $\mathrm{FI}$-modules. \subsection{Strict Polynomial Functors} \label{sec:strict-polyn-funct} The Schur category (also known as the divided power category, see \cite{vanderKallen2015}) $\mathbf\Gamma^d$ is the category whose objects are finite dimensional vector spaces over $K$. Given objects $V$ and $W$, \begin{displaymath} \Hom_{\mathbf\Gamma^d}(V,W) = \Hom_{S_d}(V^{\otimes d},W^{\otimes d}). \end{displaymath} The category of strict polynomial functors is the category $\Rep\mathbf\Gamma^d$ whose objects are $K$-linear covariant functors from $\mathbf\Gamma^d$ to the category of $K$-vector spaces, and morphisms are natural transformations between functors (see \cite[Section~2]{MR1427618}). When $K$ has characteristic zero, $\Rep \mathbf\Gamma^d$ is semisimple, and its simple objects are functors known as \emph{Weyl functors} (see \cite{weyl-schur}). For each partition $\lambda$ of $d$ let $W_\lambda$ denote the Weyl functor corresponding to $\lambda$. Let $\Rep^d GL_n(K)$ denote the category of homogeneous polynomial representations of $GL_n(K)$ of degree $d$. Define a functor $\mathrm{ev}_n:\Rep\mathbf\Gamma^d\to \Rep^d GL_n(K)$ as follows: for each strict polynomial functor $F:\mathbf\Gamma^d\to \Vec$ define $\mathrm{ev}_n(F)=F(K^n)$. Let $T\in GL_n(K)$ act on $F(K^n)$ by $F(T^{\otimes d})$. This makes $F(K^n)$ a representation of $GL_n(K)$ which turns out to be a homogeneous polynomial representation of degree $d$. For each $n\geq 1$ and $\lambda\in P(n,d)$, $\mathrm{ev}_n(W_\lambda)= W_\lambda(K^n)$ is the irreducible polynomial representation of $GL_n(K)$ corresponding to $\lambda$ (consistent with the notation of Section~\ref{sec:introduction}). \subsection{$\mathrm{FI}$-modules} \label{sec:fi-modules} The category $\mathrm{FI}$ is the one that has finite sets as objects, and injective functions as morphisms. The category of $\mathrm{FI}$-modules is the category $\mathrm{FI}\mathrm{-Mod}$ whose objects are covariant functors from $\mathrm{FI}$ to the category of $K$-vector spaces, and morphisms are natural transformations of functors. Let $\Rep S_n$ denote the category of representations of $S_n$ over $K$. The evaluation functor $\mathrm{ev}_n:\mathrm{FI}\mathrm{-Mod}\to \Rep S_n$ is defined by setting $\mathrm{ev}_n(V)=V([n])$, where $[n]=\{1,\dotsc,n\}$. For each partition $\lambda=(\lambda_1,\dotsc,\lambda_l)$ there exists an $\mathrm{FI}$-module $V(\lambda)$ (see \cite[Proposition~3.4.1]{MR3357185}) such that, for every $n\geq |\lambda|+\lambda_1$, we have: \begin{displaymath} \mathrm{ev}_n(V(\lambda)) = V_{\lambda[n]}. \end{displaymath} \subsection{The Restriction Functor} \label{sec:restriction-functor} For each object $A$ of $\mathrm{FI}$ let $\mathcal F[A]$ be the vector space of all functions $A\to K$. Given an injective function $i:A\to B$, define $\mathcal F(i):\mathcal F[A]\to \mathcal F[B]$ by: \begin{displaymath} \mathcal F(i)(f)(b) = \begin{cases} f(a) &\text{if there exists $a\in A$ such that $i(a)=b$},\\ 0 & \text{otherwise}, \end{cases} \end{displaymath} for all $f\in \mathcal F[A]$. Then $\mathcal F:\mathrm{FI}\to \mathbf\Gamma^1$ is a functor. For every positive integer $d$, define $\mathcal F^d:\mathrm{FI}\to\mathbf\Gamma^d$ by \begin{displaymath} \mathcal F^d(A) = \mathcal F[A], \quad \mathcal F^d(i) = \mathcal F(i)^{\otimes d}. \end{displaymath} The restriction functor \begin{displaymath} \Res^d:\Rep\mathbf\Gamma^d\to \mathrm{FI}\mathrm{-Mod} \end{displaymath} is defined by: \begin{displaymath} \Res^d F = F\circ \mathcal F^d \text{ for every object $F$ of $\Rep\mathbf\Gamma^d$.} \end{displaymath} \begin{theorem} \label{theorem:Res} The diagram of functors \begin{displaymath} \xymatrix{ \Rep \mathbf\Gamma^d \ar[rr]^{\Res^d} \ar[d]_{\mathrm{ev}_n}&& \mathrm{FI}\mathrm{-Mod}\ar[d]^{\mathrm{ev}_n}\\ \Rep^d GL_n(K) \ar[rr]_{\Res^{GL_n(K)}_{S_n}} && \Rep S_n } \end{displaymath} commutes, in the sense that $\Res^{GL_n(K)}_{S_n}\circ \mathrm{ev}_n$ is naturally isomorphic to $\mathrm{ev}_n\circ \Res^d$. \end{theorem} \begin{proof} Given $F\in \Rep\mathbf\Gamma^d$, $\mathrm{ev}_n(K)$ is $F(K^n)$. Given $w\in S_n$, let $T_w\in GL_n(K)$ denote the linear map the takes the $i$th coordinate vector $e_i$ of $K^n$ to $e_{w(i)}$. An element $w\in S_n$ acts on $F(K^n)$ via $F(T_w^{\otimes d})$. On the other hand, \begin{align*} \mathrm{ev}_n\circ \Res^d(F)&=F\circ \mathcal F^d([n]). \end{align*} An element $w\in S_n$ acts on $F(\mathcal F^d([n]))$ by $F(\mathcal F^d(w))=F(\mathcal F(w)^{\otimes d})$. These two actions of $S_n$ coincide under the isomorphism $K^n\to \mathcal F^d([n])$ given by $e_i\mapsto \delta_i$, where $\delta_i$ is the Kronecker delta function on $[n]$ supported at $i$. Thus we get an isomorphism $\Res^{GL_n(K)}_{S_n}\circ\mathrm{ev}_n\to\mathrm{ev}_n\circ \Res^d(F)$ of representations of $S_n$. The naturality of this isomorphism follows tautologically from unwinding the definitions. \end{proof} Church, Ellenberg and Farb introduced the notion of finite generation of $\mathrm{FI}$-modules \cite[Definition~1.2]{MR3357185}. In characteristic zero, finitely generated $\mathrm{FI}$-modules have eventually polynomial character \cite[Theorem~1.5]{MR3357185}, and in general characteristic, have eventually polynomial dimension \cite[Theorem~B]{CEFN}. Therefore, the stability of restriction coefficients (discussed in Section~\ref{theorem:stable-res}) is also a consequence of the following theorem. \begin{theorem} \label{theorem:isFI} For every finitely generated strict polynomial functor $F$ of degree $d$, the $\mathrm{FI}$-module $\Res^d F$ is finitely generated in degree $d$. \end{theorem} \begin{proof} Let $\Gamma^d$ denote the strict polynomial functor $\Gamma^d(V)=(V^{\otimes d})^{S_d}$, the subspace of $S_d$-invariant tensors in $V^{\otimes d}$. For $\lambda=(\lambda_1,\dotsc,\lambda_l)$, let $\Gamma^\lambda(V)=\Gamma^{\lambda_1}(V)\otimes\dotsb\otimes\Gamma^{\lambda_l}(V)$. The functors $\Gamma^\lambda$, as $\lambda$ runs over all partitions of $d$, generate $\Rep\mathbf\Gamma^d$ \cite[Proposition~2.9]{MR3077659}. Therefore, it suffices to prove the theorem for the functors $F=\Gamma^\lambda$. Since $\Gamma^\lambda$ is a subobject of $\otimes^d$ in the $\Rep\mathbf\Gamma^d$, $\Res^d\Gamma^d$ is a subobject of $\Res^d\otimes^d$ in $\mathrm{FI}\mathrm{-Mod}$. By the Noetherian property of $\mathrm{FI}$-modules \cite[Theorem A]{CEFN}, it suffices to show that $\Res^d\otimes^d$ is finitely generated. But $\Res^d\otimes^d(A)=\mathcal F^1(A)^{\otimes d} \cong \mathcal F^1(A^d)$, which is finitely generated in degree $d$ by \cite[Proposition~2.3.6]{MR3357185}. \end{proof} \subsection*{Acknowledgements} We thank Aprameyo Pal, K. N. Raghavan, Anne Schilling, and S. Viswanath for helpful discussions and encouragement. We thank Brian Hopkins for his answer on mathoverflow \linebreak \url{https://mathoverflow.net/q/340231} which helped us prove part (1) of Theorem~\ref{theorem:2row2colhook}. We thank Dipendra Prasad for an argument in the proof of the sufficiency of the condition in part (3) of Theorem~\ref{theorem:2row2colhook}. We thank the referees for their comments and corrections to the original manuscript.
\section{Introduction} \label{sec:1} \label{intro} In modern age, public opinion has long been playing an important role in domestic politics, international relations and the associated policy making. An illustrative case is the U.S. withdrawal from Vietnam in 1970s, which could be partially attributed to the massive demonstrations. Existing research also proves an alignment between news’ opinions and international events and relations. [1] In the last two decades, online public opinion has proved itself to be as influential as, if not even more than, the opinion delivered by traditional media. A recent example is the controversial tweet by Daryl Morey, which later led to online conflicts and affected the China-US relations. The Ministry of Foreign Affairs of China gave an official response to the problem, and politicians including Hillary Clinton and Mitchell McConnell also took advantage of the incident to promote their political claims. On the other hand, cyberspace empowers non-state and even traditionally non-political actors to join the discussions of political issues, helping constructing social reality.[2] Considering the highly open and interconnected nature of the Internet, millions of data with all kinds of attitudes towards different political entities are being generated every minute, making online public opinion an indispensable factor in analyzing politics and policies. The 70th anniversary of the foundation of the People’s Republic of China, which has attracted worldwide attention, provided a rare opportunity for analyzing the online sentiments towards China. Large amount of messages related to Chinese National Day were published on Twitter, one of the leading social media globally. The volume of such data, for the first time in Chinese history, enables the tracking and observation of the expressed sentiments of all kinds of people around the world during this kind of significant occasions. Thus, this research attempts to gain a comprehensive view of China on the Internet through Twitter data and natural language processing algorithms. We collected Chinese National Day-related tweets around October 1st and conduct sentiment analysis to each and every tweet within the dataset to obtain temporal, spatial and linguistic insights into the overall sentiment towards China on one of the mainstream social platform. We first introduce the collecting and labeling process of the tweets, and examine the validity of our dataset and labels. Then, we present methods used in this study. After that, through experiments, we show the competency of the methods, as well as the analysis with regards to time, countries and language use. In the last, we conclude our research and highlights the significance of the experimental results. \section{Previous Works} \label{sec:2} It has become an emerging field in recent years to apply social media data for analyzing political and international relations problems. The key technique used text-based is opinion mining.[3] This section reviews some of the important works. Whether social media data can be applied to predict the result of political elections and referendums is one of the hot topics. Tsirakis et al. did a primitive attempt by analyzing the public opinion expressed through Twitter during a debate before the 2015 Greek election.[4] Tsakalidis et al. applied a semi-supervised approach to conducting a daily analysis of the voting intentions of over 2,000 Twitter users during the 2015 Greek election.[5] Jungherr et al. collected 3 months of Twitter data before the 2013 German federal election to predict the public opinion and compared the results with human polls and the final election outcomes. Both SVM and simple mentioning methods were used in this paper. The authors concluded that social media is more an indicator of attention rather than political support.[6] Bovet et al. used statistical physics combined with machine learning methods to investigate public opinion during the 2016 US presidential election. The results were found to be remarkably accurate compared with the New York Times National Polling Average.[7] Unlike forecasting the result of political elections, Lopez et al. utilized over 23 million Tweets about Brexit to “nowcast” (real-time monitor) the public opinion about Brexit referendum. And this paper differs from the previous one in that it regards social media data as informative, or at least strongly supplementary to polls, for forecasting and nowcasting political support in elections. [8] Despite elections, social media data was also used to analyze sentiments towards certain political entities. Gull et al. used support vector machine (SVM) to study opinionated English tweets towards Pakistani political parties. [9] Gong et al. applied convolutional neural networks (CNN) to study the sentiments of China-related posts on Reddit from 2007 to 2015 and discovered that these posts showed a “skewed spread” characteristic, with negative information occupying the dominant position and significantly overweighting positive opinions. [10] However, both researches neglects the non-English texts, which makes results somehow unrepresentative. This is particularly noteworthy for [9] due to the fact that the majority of the Pakistani population mainly speak local languages rather than English. There are several studies utilizing non-English social media data for analyzing sentiments. Jamal et al. analyzed the anti-Americanism and anti-interventionism in the Middle East using Twitter texts written in Arabic. The main point of the article was to answer the question of whether the prevalent anti-Americanism and animus in the Middle East were targeted at the U.S. itself or towards the impingement of the United States on other countries.[11] A similar study is [12], which focused on the views of Chinese Weibo users towards the United States and several other neighboring nations. Weibo discourses were collected as datasets. This paper found that Chinese views of the United States were deeply ambivalent: positive to American technology advances while negative to American foreign policy. In addition, Di Giovanni et al. used Italian tweets to predict users’ political inclinations.[13] However, albeit Twitter data were carefully observed in these studies for political analysis, the utilization of social media data was rather primitive. They lack in-depth study of the exact meaning and sentiment tendency of the tweets. Therefore, the coarsely processed twitter data were not able to fulfill their potential. Meanwhile, although these researches took advantage of non-English data, they are still limited to a single language, and other languages used in the studied areas were overlooked. Social media data can also provide insights into political relations. For example, Barnett et al. developed an approach to analyze characteristics of international relations based on the co-occurrence of nations' names in short texts extracted from Facebook and Weibo. [14] Kumar et al. used Twitter data (including hashtags, followers, retweet, mention, etc.) and network analysis to investigate relations between Latin American political organizations. [15] A similar research to this work were conducted by Chambers et al. They applied Twitter data to model relations between nation-states using sentiment analysis, which is a synthesis of the above mentioned three categories. Compared with traditional polling data, data acquisition from social media can be time-saving and low-cost. They picked out Tweets containing country names, and then filtered the data to remove irrelevant tweets like restaurants, sports meetings, etc. The remaining tweets were used to calculate the aggregated nation-nation sentiments. This study provided a temporal result for international relations and verified it with human polls. Therefore, it proved the applicability of utilizing media text data for international relations studies. [16] However, all the non-English tweets were still filtered out in this work. Thus, its results could only represent the English-speaking population. On the other hand, this work merely cared about the overall general relations between different nations. The influences of certain events to international relations and the relationship of specific nation pairs are not fully studied. Another similar study investigated user demographics and topic diversity of Twitter discourse during the Global Landscapes Forum (GLF) 2018 in Nairobi. The study found that convening the GLF in Africa enhanced the voice of Africans compared to the previous GLF in Germany.[17] Whereas, albeit it focused on a specific event, the core of the paper is demographic differences in topic-level engagement between different races, genders and ages. The study provides little implication for the international politics aspect and the relationship between relevant nations. There exist researches that intend to introduce multilingual or multimodal analysis. Rashkin et al. established multilingual connotation frames using existing parallel corpus with automatic word-alignment for English and 10 other European languages to analyze the targeted sentiments of users with diverse language backgrounds. [18] Over 1.2 million tweets were collected from Twitter for the study and LSTM was utilized to predict future sentiments with previous sentiments data. This paper verified the applicability of exploiting cross-language corpus to retrieve and predict targeted sentiments and public opinions of different nations, but more fine-grained and specific studies are still needed. It is also possible to conduct opinion mining from multimodal social media data. Fang et al. analyzed texts and photos simultaneously to realize aspect-opinion retrieval. [19] In addition, Peña-Araya et al. and Fernando et al. independently developed visualization tools to study the geo-temporal contexts in Twitter related to history, politics, and international relations. [20, 21] This paper differs from the above mentioned works by taking into account both English and Chinese data to obtain a more comprehensive perception of the online discourse towards a given nation, namely, China. Moreover, data used in this research was event-centered. Collected during the significant event of the 70th anniversary of the P.R. China, online opinions are supposed to be more explicit and polarized, which would in turn benefit further analysis. \section{Data Sets and Methods} \label{sec:3} This study is based on the Twitter data collected between 8 a.m. September 30 and 10 a.m. October 3. In this part, data acquisition and labeling are introduced in detail. \subsection{Streaming API and Hashtags} \label{sec:4} The data sets used in this study were collected through the Twitter Streaming API. This kind of API allows to collect real-time tweets that incorporate specific hashtags, thus enables a comprehensive and targeted collection of tweets. In order to automatically capture the Chinese National Day-related tweets, over 1000 relevant tweets were studied and 59 frequently used Chinese National Day-related hashtags were extracted. These hashtags are shown in Table 1, and they are in English, Simplified Chinese, and Traditional Chinese. \begin{table} \caption{Hashtags used in this study} \label{tab:1} \begin{tabular}{p{0.22\columnwidth}p{0.71\columnwidth}} \hline\noalign{\smallskip} Language & Hashtags \\ \noalign{\smallskip}\hline\noalign{\smallskip} English & \#Beijing, \#CCP, \#CCP70, \#CCP70Bday, \#CelebrateChina70, \#China, \#china, \#Chinaat70, \#China70, \#China70years, \#Chinese, \#CPC, \#HiChina, \#MilitaryParade, \#NationalDay, \#NationalDay2019, \#NewChina70Years, \#PLA, \#PRC, \#prc, \#PRC70, \#prc70, \#PRC70thAnniv, \#PRC70YearsOn, \#ReformandOpeningUp, \#SeeChina, \#ThisIsChina, \#70thAnniversary, \#70YearsProsperity \\ Simplified Chinese & \#\begin{CJK}{UTF8}{gbsn} 北京 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 大阅兵 \end{CJK} \#\begin{CJK}{UTF8}{gbsn} 国庆 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 国庆阅兵 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 国庆70年 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 七十周年 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 十一国庆 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 中共 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 中国 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 中国国庆 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 中华人民共和国 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 中华人民共和国成立70周年 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 阅兵 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 祖国万岁 \end{CJK}, \#\begin{CJK}{UTF8}{gbsn} 70周年 \end{CJK} \\ Traditional Chinese & \#\begin{CJK}{UTF8}{bsmi} 北京 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 大閱兵 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 國慶 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 國慶閱兵 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 國慶70年 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 七十週年 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 十一國慶 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 中共 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 中國 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 中國國慶 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 中華人民共和國 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 中華人民共和國成立70週年 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 閱兵 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 祖國萬歲 \end{CJK}, \#\begin{CJK}{UTF8}{bsmi} 70週年 \end{CJK}, \\ \noalign{\smallskip}\hline \end{tabular} \end{table} The hashtags above were later applied to the Streaming API to retrieve the tweets containing them. After 74 hours of data collection, a total of 311,935 tweets, written in 54 languages, were obtained. English tweets accounted for 249,602 and Chinese (including simplified and traditional) tweets contributed to another 5,150. The remaining tweets are outside the scope of this article. Therefore, they are excluded from the following steps. Examples of collected tweets are shown in table 2. \subsection{Data Labeling} \label{sec:5} Labeled data sets are necessary for supervised machine learning. Considering the large scale of the data, 1000 tweets were randomly sampled from either language, that is, 1000 English tweets and 1000 Chinese tweets. Then, four labelers with diverse backgrounds were involved in the labeling work. Detailed information about the labelers are shown in table 3. For every tweet within the 1000 English tweets, each labeler needed to independently decide whether it was relevant to the 2019 Chinese National Day, and if so, rate its sentiment towards China on a scale of -2 to +2. Positive number means a positive sentiment while negative number represents negative attitude. The absolute value of the score depicts the degree of the emotion. For example, a tweet labeled as +2 usually has extremely positive view towards China, and a tweet with a -1 shows negative opinion. Zero indicates that the tweet is objective and does not present obvious sentiment. For Chinese tweets, the procedure was the same except that the labelers needed to additionally judge whether the tweet was written in simplified or traditional Chinese. \begin{table} \caption{Examples for collected tweets (only show the time and text part)} \label{tab:2} \renewcommand{\arraystretch}{1.5} \begin{tabular}{p{0.10\columnwidth}p{0.83\columnwidth}} \hline\noalign{\smallskip} Language & Tweets \\ \noalign{\smallskip}\hline\noalign{\smallskip} \multirow{2}*{English} & "created\_at":"Tue Oct 01 16:58:48 +0000 2019" \\ ~ & "text":"@goofrider Big Congratulations to \#China70years" \\ \cline{2-2} ~ & "created\_at":"Tue Oct 01 11:00:43 +0000 2019" \\ ~ & "text":"Happy 70th Anniversary to China. Best wishes from Pakistan. \#China70years \#China" \\ \cline{2-2} ~ & "created\_at":"Tue Oct 01 14:44:33 +0000 2019" \\ ~ & "text":"RT @HappsNews: NOW: Pro-democracy protests are happening all over \#HongKong on the 70th anniversary of \#China's \#NationalDay. " \\ \noalign{\smallskip}\hline\noalign{\smallskip} \multirow{2}*{Chinese} & "created\_at":"Mon Sep 30 18:19:59 +0000 2019" \\ ~ & "text":"\#\begin{CJK}{UTF8}{gbsn} 中国 \end{CJK} \#\begin{CJK}{UTF8}{gbsn} 国庆节快乐 \end{CJK}\begin{CJK}{UTF8}{bsmi} 祝祖国母亲70周年生日快乐 \end{CJK} https://t.co/OXK0jZkA05" \\ \cline{2-2} ~ & "created\_at":"Tue Oct 01 06:00:13 +0000 2019" \\ ~ & "text":"\#China70years \begin{CJK}{UTF8}{gbsn} 想找到和祖国连接的点那就只有好好找到自己对于国家而言的价值了 \end{CJK}" \\ \cline{2-2} ~ & "created\_at":"Tue Oct 01 01:30:42 +0000 2019" \\ ~ & "text": "RT @RFA\_Chinese: \begin{CJK}{UTF8}{gbsn} 【国庆日,香港市面死寂】10月1日,政府制定多项临时措施,防止群众聚集。多个地铁站全日封闭,机场采取特别交通措施,多个市区大型商场停止营业,而街道上亦没有像往年国庆一样挂满国旗。有市民表示,国庆日,香港跟戒严没有分别。 \end{CJK}\#\begin{CJK}{UTF8}{gbsn} 十一国庆 \end{CJK}\#\begin{CJK}{UTF8}{gbsn} 戒严 \end{CJK}" \\ \hline \end{tabular} \end{table} \begin{table} \caption{The backgrounds of the labeler} \label{tab:3} \begin{tabular}{llll} \hline\noalign{\smallskip} Labeler & Comes from & Major & Sex \\ \noalign{\smallskip}\hline\noalign{\smallskip} 1 & Mainland China & Data Science & Male \\ 2 & Taiwan & Environmental Engineering & Female \\ 3 & Mainland China & Accounting & Female \\ 4 & Mainland China & Law & Male \\ \noalign{\smallskip}\hline \end{tabular} \end{table} \begin{table} \centering \caption{The voting ratio of 4 labelers} \label{tab:4} \renewcommand{\arraystretch}{1.5} \begin{tabular}{|p{0.08\columnwidth}|p{0.12\columnwidth}|p{0.12\columnwidth}|p{0.12\columnwidth}|p{0.12\columnwidth}|p{0.06\columnwidth}|p{0.06\columnwidth}|p{0.12\columnwidth}|} \hline \begin{center} Language of tweets \end{center} & \multicolumn{2}{p{0.24\columnwidth}|}{\begin{center}Decisions on\end{center}} & \begin{center} 4:0 (3:0 for row 3, 5, 8 and 10) \end{center} & \begin{center} 3:1 (2:1 for row 3, 5, 8 and 10) \end{center} & \begin{center} 2:2 \end{center} & \begin{center} 2:1:1 \end{center} & \begin{center} 1:1:1:1 (1:1:1 for row 3, 5, 8 and 10) \end{center} \\ \hline \begin{center} \multirow{5}*{English} \end{center} & \multicolumn{2}{p{0.24\columnwidth}|}{\begin{center}Relevance \end{center}} & \begin{center} 880 \end{center} & \begin{center} 92 \end{center} & \begin{center} 28 \end{center} & \begin{center} 0 \end{center} & \begin{center} 0 \end{center} \\ \cline{2-8} ~ & \begin{center} \multirow{2}*{\shortstack{Sentiment (on a\\-2 to +2 scale)}} \end{center} & \begin{center} If the voting result of relevance is 4:0 \end{center} & \begin{center} 53 \end{center} & \begin{center} 164 \end{center} & \begin{center} 64 \end{center} & \begin{center} 31 \end{center} & \begin{center} 1 \end{center} \\ \cline{3-8} ~ & ~ & \begin{center} If the voting result of relevance is 3:1 \end{center} & \begin{center} 12 \end{center} & \begin{center} 53 \end{center} & \begin{center}/ \end{center} & \begin{center} / \end{center} & \begin{center} 6 \end{center} \\ \cline{2-8} ~ & \begin{center} \multirow{2}*{\shortstack{Sentiment (in\\the positive,\\ neutral, negative\\scheme)}} \end{center} & \begin{center} If the voting result of relevance is 4:0 \end{center} & \begin{center} 202 \end{center} & \begin{center} 81 \end{center} & \begin{center} 23 \end{center} & \begin{center} 7 \end{center} & \begin{center} 0 \end{center} \\ \cline{3-8} ~ & ~ & \begin{center} If the voting result of relevance is 3:1 \end{center} & \begin{center} 41 \end{center} & \begin{center} 29 \end{center} & \begin{center} / \end{center} & \begin{center} / \end{center} & \begin{center} 1 \end{center} \\ \hline \begin{center} \multirow{6}*{Chinese} \end{center} & \multicolumn{2}{p{0.24\columnwidth}|}{\begin{center}Relevance \end{center}} & \begin{center} 820 \end{center} & \begin{center} 120 \end{center} & \begin{center} 59 \end{center} & \begin{center} 0 \end{center} & \begin{center} 0 \end{center} \\ \cline{2-8} ~ & \begin{center} \multirow{2}*{\shortstack{Sentiment (on a\\-2 to +2 scale)}} \end{center} & \begin{center} If the voting result of relevance is 4:0 \end{center} & \begin{center} 98 \end{center} & \begin{center} 159 \end{center} & \begin{center} 82 \end{center} & \begin{center} 37 \end{center} & \begin{center} 3 \end{center} \\ \cline{3-8} ~ & ~ & \begin{center} If the voting result of relevance is 3:1 \end{center} & \begin{center} 17 \end{center} & \begin{center} 51 \end{center} & \begin{center} / \end{center} & \begin{center} / \end{center} & \begin{center} 11 \end{center} \\ \cline{2-8} ~ & \begin{center} \multirow{2}*{\shortstack{Sentiment (in\\the positive,\\ neutral, negative\\scheme)}} \end{center} & \begin{center}If the voting result of relevance is 4:0 \end{center} & \begin{center} 309 \end{center} & \begin{center} 48 \end{center} & \begin{center} 17 \end{center} & \begin{center} 5 \end{center} & \begin{center} 0 \end{center} \\ \cline{3-8} ~ & ~ & \begin{center} If the voting result of relevance is 3:1 \end{center} & \begin{center} 51 \end{center} & \begin{center} 24 \end{center} & \begin{center} / \end{center} & \begin{center} / \end{center} & \begin{center} 4 \end{center}\\ \cline{2-8} ~ & \multicolumn{2}{p{0.24\columnwidth}|}{\begin{center} Simplified or traditional \end{center}} & \begin{center} 942 \end{center} & \begin{center} 43 \end{center} & \begin{center} 14 \end{center} & \begin{center} 0 \end{center} & \begin{center} 0 \end{center} \\ \hline \end{tabular} \end{table} \begin{table} \centering \caption{Comparison between decisions made by labeler 2 and the overall voting results} \label{tab:5} \renewcommand{\arraystretch}{1.5} \begin{tabular}{|p{0.10\columnwidth}|p{0.07\columnwidth}|p{0.12\columnwidth}|p{0.12\columnwidth}|p{0.07\columnwidth}|p{0.12\columnwidth}|p{0.12\columnwidth}|p{0.08\columnwidth}|} \hline \begin{center} Language of tweets \end{center} & \multicolumn{3}{p{0.36\columnwidth}|}{\begin{center}English\end{center}} & \multicolumn{4}{p{0.36\columnwidth}|}{\begin{center}Chinese\end{center}} \\ \hline \begin{center} \multirow{2}*{Decisions on} \end{center} & \begin{center} \multirow{2}*{Relecance} \end{center} & \multicolumn{2}{p{0.24\columnwidth}|}{\begin{center}\shortstack{Sentiment (in the positive,\\ neutral, negative scheme)} \end{center}} & \begin{center} \multirow{2}*{Relecance} \end{center} & \multicolumn{2}{p{0.12\columnwidth}|}{\begin{center}\shortstack{Sentiment (in the positive,\\ neutral, negative scheme)} \end{center}} & \begin{center} \multirow{2}*{\shortstack{Simplified\\or\\traditional}} \end{center} \\ \cline{3-4} \cline{6-7} ~ & ~ & \begin{center} If the voting result of relevance is 4:0 \end{center} & \begin{center} If the voting result of relevance is 3:1 \end{center} & ~ & \begin{center} If the voting result of relevance is 4:0 \end{center} & \begin{center} If the voting result of relevance is 3:1 \end{center} & ~ \\ \hline \begin{center} Number of votes that the result is 3:1 or 2:1 * \end{center} & \begin{center} 92 \end{center} & \begin{center}81 \end{center} & \begin{center} 29 \end{center} & \begin{center} 120 \end{center} & \begin{center} 48 \end{center} & \begin{center} 19 \end{center} & \begin{center} 43 \end{center} \\ \hline \begin{center} Number of cases that labeler 2 had different opinion with the other three or two labelers \end{center} & \begin{center} 6 \end{center} & \begin{center}20 \end{center} & \begin{center} 11 \end{center} & \begin{center} 18 \end{center} & \begin{center} 23 \end{center} & \begin{center} 11 \end{center} & \begin{center} 4 \end{center} \\ \hline \begin{center} Ratio of labeler 2 being the dissident \end{center} & \begin{center} 6.5\% \end{center} & \begin{center}24.7\% \end{center} & \begin{center} 37.9\% \end{center} & \begin{center} 15.0\% \end{center} & \begin{center} 47.9\% \end{center} & \begin{center} 57.9\% \end{center} & \begin{center} 9.3\% \end{center} \\ \hline \begin{center} Overall ratio \end{center} & \multicolumn{7}{p{0.80\columnwidth}|}{\begin{center}21.5\% \end{center}} \\ \hline \multicolumn{8}{|p{0.95\columnwidth}|}{* If labeler 2 voted for irrelevance in the first place and thus did not have a vote in the sentiment part, it would not be counted in the number shown in column 4 and 7 due to the absence of labeler 2. In other words, this table only focuses on the voting that labeler 2 has participated. } \\ \hline \end{tabular} \end{table} The results of four labelers were then amalgamated through voting. Before merging the data sets, the voting ratio were counted. The results are displayed in Table 4. From table 4, it can be found that in most cases for relevance and the types of Chinese characters (simplified or simplified), four labelers tend to be consistent. Only in less than 0.6\% of all cases did the voting results of the labelers show a tie (2:2). However, when it comes to the voting of sentiments, the labelers showed greater disagreement and made different decisions on most tweets. Thus, in order to make the labeling result more reliable and concrete, which is critical for the following supervised learning, the final label employs a positive-neutral-negative scheme. As is depicted in row 5, 6, 10 and 11 of table 4, the disagreement between four labelers was significantly narrowed after adopting the positive-neutral-negative scheme. Another issue that needs to be addressed is whether anyone of the four labelers typically holds different opinions with the other three. That is, would the answers provided by a specific labeler always fail in the voting. Due to the balance of genders and majors, the places that the labelers came from constitute the main concern. Therefore, the decisions of labeler 2 were compared with the overall voting results and the outcomes are shown in table 5. As can be found in the table, the overall ratio that labeler 2 making different choices with others is 21.5\%, which does not indicate significant level of being isolated. Although labeler 2 tended to share different opinions when it comes to Chinese tweets, considering the fact that for 78.6\% of Chinese tweets all the four labelers made the same decisions on sentiments and this table only shows the 3:1 or 2:1 cases which accounts for merely 15.7\%, the influence of this difference could be minimal. In most cases, since the decisions made by four labelers converge, the final label was determined without controversy. When faced with rare situations of 2:2 or 1:1:1:1, the final label would be chosen randomly from the two or four. \subsection{Methods} \label{sec:6} The technique used to analyze the general sentiments of the tweets is a mixed method of dictionary and SVM, which is an improved version of Tannier’s classifiers [22] and yields satisfactory results while avoid being too complicated. All the classifiers mentioned below are combinations of a trained SVM and positive-negative dictionaries. Firstly, a relevance classifier would decide whether a tweet is relevant to the topic. For example, some tweets may be talking about the French National Day or the recent disputes and chaos in Hong Kong and were mistakenly fetched during the data collection step. These irrelevant tweets shall be excluded in the following analysis. Secondly, tweets written in Chinese would be categorized according to their typeface, that is, simplified or traditional Chinese. Thirdly, another classifier would judge whether the tweet is simply stating a fact or is expressing certain kinds of affection. Those tweets with affection would then be sent to the last classifier which determines the sentiment, positive or negative, of the tweet. \section{Experiments and Results} \subsection{Performances of the Classifiers} \label{sec:7} After training the SVM on the labeled data set, as well as creating and adjusting the dictionaries manually, all these classifiers have reached an average accuracy of over 93\%. The detailed performances of the classifiers are shown in table 6. \begin{table} \centering \caption{The performances of the classifiers} \label{tab:6} \renewcommand{\arraystretch}{1.5} \begin{tabular}{|p{0.22\columnwidth}|p{0.22\columnwidth}|p{0.22\columnwidth}|p{0.22\columnwidth}|} \hline \multicolumn{4}{|p{0.96\columnwidth}|}{\textbf{Relevance Classifier (for English Tweets)}} \\ \hline \textbf{Label} & \textbf{Precision} & \textbf{Recall} & \textbf{F1} \\ \hline Relevant & 0.943 & 0.984 & 0.963 \\ \hline Irrelevant & 0.984 & 0.941 & 0.962 \\ \hline Accuracy & \multicolumn{3}{|p{0.72\columnwidth}|}{0.962} \\ \hline \multicolumn{4}{|p{0.96\columnwidth}|}{\textbf{Classifier to Determine Whether the Text Has Emotions (for English Tweets)}} \\ \hline \textbf{Label} & \textbf{Precision} & \textbf{Recall} & \textbf{F1} \\ \hline True & 0.909 & 1.0 & 0.952 \\ \hline False & 1.0 & 0.900 & 0.947 \\ \hline Accuracy & \multicolumn{3}{|p{0.72\columnwidth}|}{0.950} \\ \hline \multicolumn{4}{|p{0.96\columnwidth}|}{\textbf{Positive or Negative Sentiment Classifier (for English Tweets)}} \\ \hline \textbf{Label} & \textbf{Precision} & \textbf{Recall} & \textbf{F1} \\ \hline Positive & 0.974 & 1.0 & 0.987 \\ \hline Negative & 1.0 & 0.973 & 0.986 \\ \hline Accuracy & \multicolumn{3}{|p{0.72\columnwidth}|}{0.987} \\ \hline \multicolumn{4}{|p{0.96\columnwidth}|}{\textbf{Relevance Classifier (for Chinese Tweets)}} \\ \hline \textbf{Label} & \textbf{Precision} & \textbf{Recall} & \textbf{F1} \\ \hline Relevant & 0.943 & 0.989 & 0.965 \\ \hline Irrelevant & 0.988 & 0.941 & 0.964 \\ \hline Accuracy & \multicolumn{3}{|p{0.72\columnwidth}|}{0.965} \\ \hline \multicolumn{4}{|p{0.96\columnwidth}|}{\textbf{Classifier to Determine Whether the Text Has Emotions (for Chinese Tweets)}} \\ \hline \textbf{Label} & \textbf{Precision} & \textbf{Recall} & \textbf{F1} \\ \hline True & 0.889 & 1.0 & 0.941 \\ \hline False & 1.0 & 0.875 & 0.933 \\ \hline Accuracy & \multicolumn{3}{|p{0.72\columnwidth}|}{0.938} \\ \hline \multicolumn{4}{|p{0.96\columnwidth}|}{\textbf{Positive or Negative Sentiment Classifier (for Chinese Tweets)}} \\ \hline \textbf{Label} & \textbf{Precision} & \textbf{Recall} & \textbf{F1} \\ \hline Positive & 0.954 & 0.985 & 0.969 \\ \hline Negative & 0.984 & 0.953 & 0.968 \\ \hline Accuracy & \multicolumn{3}{|p{0.72\columnwidth}|}{0.969} \\ \hline \multicolumn{4}{|p{0.96\columnwidth}|}{\textbf{Typeface Classifier (for Chinese Tweets)}} \\ \hline \textbf{Label} & \textbf{Precision} & \textbf{Recall} & \textbf{F1} \\ \hline Simplified & 0.984 & 1.0 & 0.992 \\ \hline Traditional & 1.0 & 0.983 & 0.991 \\ \hline Accuracy & \multicolumn{3}{|p{0.72\columnwidth}|}{0.992} \\ \hline \end{tabular} \end{table} After confirmation of the performances, these classifiers were then applied to the temporal and spatial analysis of all the English and Chinese tweets collected. \subsection{Temporal Fluctuations of the Sentiments} \label{sec:8} In this part, the overall sentiments of the Chinese National Day-related tweets would be analyzed with regard to time. The abscissa in the figure is labeled with Beijing time. Figure 1 and 2 shows the number of English and Chinese tweets concerning the Chinese National Day. The highest peak of English tweets was around 18 o’clock October 1 and the second peak was around 11 o’clock. The two most significant peak for Chinese tweets was around 10 o’clock and 20 o’clock October 1. Figure 3 and 4 depicts the absolute sentiments of the English and Chinese tweets towards China. The absolute sentiments are calculated by subtracting the number of negative tweets from the number of positive tweets, therefore, a score above 0 indicates an overall positive sentiment towards China at the time period, and vice versa. As is shown in the pictures, the sentiments of the two languages are disparate. Figure 5 and Figure 6 are the variation of normalized sentiments towards China with time. The blue line and the green line indicate the percentages of positive and negative tweets, respectively. The red line is the difference between the two, which represents the overall sentiment. The jitter of shown in Figure 6 may be due to the relatively small amount of data of Chinese tweets. In general, Chinese tweets are more positive than English tweets. \subsection{Spatial Analysis of the Sentiments} \label{sec:9} In this section, the overall sentiments of the tweets would be studied based on the self-proclaimed location of the Twitter users. Every tweet returned by the Twitter API attached the corresponding user profile, which includes the location that the user claimed to be. Although this self-proclaimed location might not be the actual place the user lived, the global sentiment maps based on these locations still have some reference value. Also, to reduce the inaccuracy brought by this self-proclaim-error, the following analysis was conducted on the national level rather than local level. Due to the large scale of the English tweets, it would be time-consuming to manually link all the locations written in the user profile with its nation. Therefore, 2000 tweets were randomly picked to be examined and labeled. The pictures shown in this section has proved that 2000 is enough for yielding meaningful results. The scale of Chinese tweets was much smaller than English tweets, and all of them were manually labeled. Figure 7 to 10 shows the exact number of the positive or negative tweets posted by each country. Only countries with at least one tweet are marked. Figure 11 to 12 shows the comparisons of the numbers of positive and negative tweets. The score for each country was calculated by dividing number of positive tweets by the number of negative tweets. \subsection{Frequently Used Words by Different Sentiments} \label{sec:10} To provide an intuitive perception of the discourse expressed in the collected tweets, the frequencies of words for both positive and negative tweets were calculated. After removing the stop words, the histograms for the top 10 frequently used words for both languages and both sentiments are shown in figure 13 and 15. Also, the word clouds are provided in figure 14 and 16 after removing words shared by both parties. \begin{figure} \includegraphics[width=16cm,height=6cm]{figure1.jpg} \caption{Number of English Tweets by Time} \label{fig:1} \end{figure} \begin{figure} \includegraphics[width=16cm,height=6cm]{figure2.jpg} \caption{Number of Chinese Tweets by Time} \label{fig:2} \end{figure} \begin{figure} \includegraphics[width=16cm,height=6cm]{figure3.jpg} \caption{Absolute Sentiments of English Tweets by Time} \label{fig:3} \end{figure} \begin{figure} \includegraphics[width=16cm,height=6cm]{figure4.jpg} \caption{Absolute Sentiments of Chinese Tweets by Time} \label{fig:4} \end{figure} \begin{figure} \includegraphics[width=16cm,height=6cm]{figure5.jpg} \caption{Normalized Sentiments of English Tweets by Time} \label{fig:5} \end{figure} \begin{figure} \includegraphics[width=16cm,height=6cm]{figure6.jpg} \caption{Normalized Sentiments of Chinese Tweets by Time} \label{fig:6} \end{figure} \begin{figure} \includegraphics[width=12.1cm,height=6.6cm]{figure7.jpg} \caption{The number of English positive tweets produced by each country} \label{fig:7} \end{figure} \begin{figure} \includegraphics[width=12.1cm,height=6.6cm]{figure8.jpg} \caption{The number of English negative tweets produced by each country} \label{fig:8} \end{figure} \begin{figure} \includegraphics[width=12.1cm,height=6.6cm]{figure9.jpg} \caption{The number of Chinese positive tweets produced by each country} \label{fig:9} \end{figure} \begin{figure} \includegraphics[width=12.1cm,height=6.6cm]{figure10.jpg} \caption{The number of Chinese negative tweets produced by each country} \label{fig:10} \end{figure} \begin{figure} \includegraphics[width=12.1cm,height=6.6cm]{figure11.jpg} \caption{The comparison of positive and negative English tweets produced by each country} \label{fig:11} \end{figure} \begin{figure} \includegraphics[width=12.1cm,height=6.6cm]{figure12.jpg} \caption{The comparison of positive and negative Chinese tweets produced by each country} \label{fig:12} \end{figure} \begin{figure} \includegraphics[width=16cm,height=5cm]{figure13.jpg} \caption{The top 10 frequently used words of positive and negative English tweets} \label{fig:13} \end{figure} \begin{figure} \includegraphics[width=14cm,height=6cm]{figure14.jpg} \caption{The word clouds of positive and negative English tweets} \label{fig:14} \end{figure} \begin{figure} \includegraphics[width=16cm,height=5cm]{figure15.jpg} \caption{The top 10 frequently used words of positive and negative Chinese tweets} \label{fig:15} \end{figure} \begin{figure} \includegraphics[width=14cm,height=6cm]{figure16.jpg} \caption{The word clouds of positive and negative Chinese tweets} \label{fig:16} \end{figure} \section{Discussion, Conclusions and Future Works} \label{sec:11} In this descriptive study, specific Twitter data sent around the 2019 Chinese National Day was collected and their sentiments were analyzed with a hybrid technique. The temporal, spatial and lingual characteristics of the tweets were explored. It can be found that the number of English and Chinese tweets sent every hour is generally in accordance with the celebration activities and the time zone of Twitter users. The highest peak of English tweets was the morning of October 1 in Europe, when European users were most likely to know the news. The second peak was around 11 o’clock on October 1 during the military parade. The most significant peak for Chinese tweets was around 10 o’clock on October 1 when the parade began and another prominent peak was around 20 o’clock when the firework show and celebration took place. As for the absolute sentiments, Figures 3 and 4 show that except for several hours from 10 o’clock to 12 o’clock on October 1 when a slightly positive attitude was expressed, the general sentiments of English tweets towards China were negative. Chinese tweets, on the contrary, were more positive to China, and the scores were above zero most of the time. The results of normalized sentiments confirmed this observation. Chinese tweets often have a positive view of China while English tweets became constantly negative since noon Oct 1. For spatial characteristics, Figure 7 to 10 depict that people from China (including Hong Kong, Macau, and Taiwan, the same below), the United States, Pakistan, India, and Australia sent the most positive English tweets, while China, the United States, Uganda, and Japan produced the most negative English tweets towards China. As for tweets written in Chinese, China, the United States, Japan, and Thailand were the important positive sentiments providers, and the United States, China, Japan, Australia, and Canada were the most negative. Comparing the number of positive and negative tweets, the overall expressed sentiment of English tweets in most countries were positive, as is shown in Figure 11. The highest score, 89, was achieved by Pakistan. However, English tweets sent from Turkey, Uganda, China, Honduras, Poland, Venezuela, and Germany were in general negative. Meanwhile, the sentiments expressed by Chinese tweets depict a different image. Cambodia, Canada, the United States, Germany, and Australia became the only nations that hold generally negative views towards China. China, Russia, France, the United Kingdom, and Pakistan were the most positive nations. Interestingly, for countries like the United States, Canada, and Australia, English tweets were more positive than Chinese tweets. The linguistic features reveal the different focus points of Twitter users whose sentiments to China were conflicting. The positive side focused more on the celebration activities and the military parade, and expressed all kinds of good wishes for China. On the other hand, the negative discourses were mainly connected with the Hong Kong issue. Although little theoretical improvement or causal inference was achieved in this study, the phenomenon disclosed through the analysis is still worthy of notice and further research. One of the intuitive but significant findings is that English tweets as a whole were more negative towards China, and countries that enjoy relatively better relationship with China tend to hold a more positive view, which indicates a certain consistency between the online opinion and the official relations. This indicates notable discrepancies among the perception of China in different countries, which not only reflect the official attitudes and the public opinions, but also have a realistic impact on China. For example, cyber security and cyber-attacks, a hot topic in Sino-US relations in recent years, are gradually entering the field of diplomacy and international relations.[23] However, according to Kumar and Carley, the probability of experiencing cyber-attacks increases by up to 27\% if the country is being viewed negatively by other nations[24, 25], and this situation can in turn increase tensions. In addition, online public opinion may influence a country’s future foreign policy towards China. Issues and opinions emphasized by social media would be regarded by the public as important. Thus, social media focus could be transferred into public and government agenda.[26, 27] Georgiadou et al. have shown the importance and potential of utilizing social media sentiment analysis to enhancing decision-making during international negotiations such as the UK-EU Brexit negotiation.[28] Negative sentiments can also play a role in the exacerbating and accelerating of the politicization and securitization of China-related issues by providing suitable social background, which may finally influence the bilateral relationships.[29, 30] Therefore, online attitudes towards China are indicative and non-negligible. Further studies are supposed to both refine the techniques used to yield more fine-grained sentiments results as well as to improve the experiment design. For example, the data collecting time needs to be prolonged to include more events, especially events with small probability and cannot be predicted. \begin{acknowledgements} We are grateful for Xin Yin, Hu Lingrui, Liu Yu, and an anonymous student at TBSI for their work in labeling our 2,000 tweets training set. We would like to give our special thanks to Dr. Wan Zuofang at the National Institute of Education Sciences and Professor Hu Yue at the Department of Political Science, Tsinghua University. Our discussion with them has inspired several parts of this research. \end{acknowledgements}
\section{Introduction} The advent of modern mobile traffic, e.g., online gaming, mobile virtual reality (VR)/augmented reality (AR) delivery and etc., incurs ultra-high requirements on the wireless bandwidth \cite{nature}. For example, the mobile VR delivery requires the transmission rate on the order of G bit/s \cite{highorder}. Mobile edge network (MEN) that equips the edge nodes of the mobile network, e.g., the mobile edge computing (MEC) server and the mobile devices, with caching and computing resources is deemed as one of the most promising approaches to alleviate the bandwidth burden on the mobile carriers \cite{colors}. In particular, mobile edge caching indicates proactively storing popular contents into the network edge nodes to reduce the traffic redundancy and transmission latency \cite{ali,joint}. MEC refers to computing the tasks at the network edge nodes to reduce the core network burden and the latency \cite{mec00,mec01,mec02,efficient,tra,mec_tony,liulei}. How to efficiently utilize the caching and computing resources in MEN triggers the research interests from both the academic and industrial areas \cite{efficient,tra,liulei,mec_tony,yang,TCOM_sun,TWC_sun}. The computation model in the currently existing literature on MEC can be named as \textit{one-way} computation task model. That is, the input data of each computation task is assumed to be either generated at the mobile device \cite{efficient,tra,mec_tony} or originated from the Internet \cite{yang, TCOM_sun,TWC_sun}. In particular, in \cite{efficient,tra,mec_tony}, the mobile device offloads the input data to the MEC server for computation and then downloads the output data from the MEC server. In \cite{yang,TCOM_sun,TWC_sun}, when the task is computed at the mobile device, the mobile device has to download the input data from the MEC server first if not cached locally and then computes the input data to obtain the output data. Novelly, in this paper, we consider a \emph{bidirectional} computation task model, where the input data consists of two parts, one of which is generated from the mobile device in real-time and the other of which is originated from the Internet proactively. One of the most directly motivating examples is online Role-Playing Game (RPG). Suppose one player is controlling a role and choosing which place/map to go. The location of the role combined with the map information from the MEC server could help render the picture for the player after some computations. The input data consists of these generated at the mobile device in real-time including current player equipment/weapon selection, strategy selection as well as role selection, and also those proactively generated from the Internet such as the map information. This rendering task could be done either at the mobile device or at the MEC server. If the task is computed at the MEC server, the mobile device has to first upload the player's related information to the MEC server, then the MEC server computes the task and transmits the computation result to the mobile device. If the task is computed at the mobile device, the mobile device has to first download the map information from the MEC server and then computes the rendering task. Since the required transmission load and the computation frequency when computing at the mobile device are different from those when computing at the MEC server, the corresponding consumed bandwidth differs and thus the computing policy requires careful design. Besides, the history of all the players' actions could provide a popularity distribution of the map preferences, e.g., the maps/places the players mostly like to go to. Based on a priori knowledge of the popularity, the popular maps/places could be proactively cached at the mobile device to save the consumed bandwidth. Inspired by this, under the latency, cache size and average power constraints, this paper jointly optimizes the computing and caching policy to minimize the average bandwidth for the bidirectional computation task model. Then, we derive the closed-form expressions for the optimal policy and the minimum bandwidth in the homogeneous scenario. The tradeoff among communications, computing and caching (3C) is at last illustrated both theoretically and numerically \section{System Model} \begin{figure}[t] \centering \includegraphics[width=70mm, height=26mm]{system.png} \caption{System Model} \label{fig:System_model} \end{figure} As illustrated in Fig.~\ref{fig:System_model}, we consider a mobile edge network consisting of one MEC server and one mobile device, both equipped with certain caching and computing abilities The mobile device is assumed to \textcolor{black}{request} one task at each time. \subsection{Task Model} Assume that there are $F$ tasks in total to be requested by the mobile device. Denote with $\mathcal{F} \overset{\Delta}{=} \{1,2, \cdots,f,\cdots, F\}$ the task set. Each task $f\in \mathcal{F}$ is characterized by a $5$-item tuple $\Big\{I^D\ (\text{in\ bits}),\ I^S\ (\text{in\ bits}),\! O\ (\text{in\ bits}),\! w \ (\text{in cycles/bit}),\\ \tau\ (\text{in seconds})\Big\}$.\footnote{This system model can be directly extended to a multi-user heterogeneous scenario.} In particular, for each task $f\in \mathcal{F}$, $I^D$ represents the size of the local input data which is generated at the mobile device in real time. $I^S$ represents the size of the remote input data which is originated from the Internet and can be proactively stored. $O$ represents the size of the output data. $w$ and $\tau$ denote the required computation cycles per bit and the maximum tolerable service latency, respectively. Since the input remote data is generated proactively, the task popularity can be learned based on the request history information. The task request process at the mobile device is assumed to conform to the independent reference model based on the following assumptions \cite{TCOM_sun}: i) the tasks that the mobile device wants to process is fixed to the set $\mathcal{F}$; ii) each probability of task $f$ to be requested, denoted as $P_f$, is assumed to be independent identical distributed (i.i.d.). Namely, $\sum_{f=1}^FP_f = 1$. In particular, we consider a homogeneous scenario, i.e., $P_f = \frac{1}{F}$. Since the local input data is generated in real time, its content may vary from time to time. However, the input local data size is assumed to be unchanged. \subsection{Caching and Computing Model} First, consider the cache placement at the mobile device. From the above-mentioned task model, we can see that only caching of the remote input data can be considered. Denote with \textcolor{black}{$c_{f}\in \{0,1\}$} the caching decision \textcolor{black}{of task $f\in \mathcal{F}$}, where \textcolor{black}{$c_{f}=1$} means that the \textcolor{black}{remote input} data is cached at the mobile device and $c_f=0$, otherwise. Denote with $C$ (in bits) the cache size at the mobile device and the caching constraint is given by \begin{equation}\label{cache} \sum_{f} I^{S}c_{f} \leq C. \end{equation} All the remote input data are assumed to be proactively cached at the MEC server considering the storage size at the MEC server is generally large enough. Next, consider the computing decision at the mobile device. Denote with $d_f \in \{0,1\}$ the computing decision of task $f \in \mathcal{F}$, where $d_f=1$ means that task $f$ is computed at the mobile device and $d_f=0$ means that task $f$ is computed at the MEC server. Denote with $f_D$ (in cycles/second) the computation frequency of the mobile device and $f_S$ (in cycles/second) the computation frequency of the MEC server. The energy consumed for computing one cycle with frequency $f_D$ at the mobile device is $\mu f_D^2$, where $\mu$ is the effective switched capacitance related to the chip architecture and can indicate the power efficiency of CPU at the mobile device \cite{mao2}. Denote with $\bar{P}$ in (W) the average available power at the mobile device. We assume that there is no power constraint at the MEC server considering the MEC server is in general connected to a power grid. \subsection{Service Mechanism} Based on the joint caching and computing decision $\left(\textbf{c}\triangleq \left(c_f\right)_{f\in \mathcal{F}},\ \textbf{d} \triangleq \left(d_f\right)_{f\in \mathcal{F}}\right)$, each task $f\in \mathcal{F}$ can be served via the following three routes. \begin{itemize} \item \textbf{Local computing with local caching}. When $d_f=1$ and $c_f = 1$, the mobile device immediately computes task $f$ based on the real-time local input data and the locally cached remote input data. The required latency is the computation latency at the mobile device only, i.e., $\frac{\left(I^S+I^D\right)w}{f_D}d_f$. For satisfying the latency constraint, we assume that $\frac{\left(I^S+I^D\right)w}{f_D}\leq \tau$. The average consumed power at the mobile device for task $f$ is the consumed computation power only, i.e., $\frac{\mu f_D^2w\left(I^D+I^S\right)}{F\tau}d_f$. \item \textbf{Local computing without local caching}. When $d_f=1$ and $c_f = 0$, the mobile device first downloads the remote input data from the MEC server and then computes the task locally. The required latency includes the downloading latency and the local computation latency, i.e., \begin{align}\label{latency1} \Big(\!\frac{I^{S}}{B_{f}^{D}\log(1+\frac{P_{D}h^2}{N_{0}})}\!+\!\frac{(I^{S}+I^{D})w}{f_D}\!\Big) d_f\!\left(1\!-\!c_f\right)\!\leq\! \tau, \end{align} where $B_f^D$ is the downlink bandwidth allocated for the transmission of task $f$, $P_{D}$ is the average downlink power spectrum density (PSD) at the MEC server, $h$ is the channel coefficient and $N_0$ is the average PSD of the channel noise. The average consumed power at the mobile device for task $f$ is the consumed computation power only, $\frac{\mu f_D^2w\left(I^D+I^S\right)}{F\tau}d_f$. \item{\textbf{MEC computing}}. When $d_f=0$, the mobile device first uploads the local input data to the MEC server. After receiving the local input data, the MEC server computes task $f$ and then transmits the output data to the mobile device. The required latency includes the uplink transmission latency, the computation latency at the MEC server, and the downlink transmission latency, i.e., \begin{align}\label{latency2} &\Bigg(\frac{I^{D}}{B_{f}^{U}\log(1+\frac{P_{U}h^2}{N_0})}+\frac{(I^{S}+I^{D})w}{f_S}\nonumber\\ &+\frac{O_{f}}{B_f^{D}\log(1+\frac{P_{D}h^2}{N_{0}})}\Bigg)(1-d_f) \leq \tau, \end{align} where $B_f^U$ is the uplink bandwidth allocated to the mobile device and $P_{U}$ is the average uplink PSD at the mobile device. The average consumed power at the mobile device for task $f$ is the average uplink transmission power, i.e., $\frac{P_UI^{D}}{F\tau \log\left(1+\frac{P_{U}h^2}{N_{0}}\right)}(1-d_f)$. \end{itemize} From above, under the average power constraint at the mobile device, we have \begin{align}\label{power} \sum_{f=1}^F &\Bigg(\frac{\mu f_D^2w\left(I^D+I^S\right)}{F\tau}d_f \nonumber\\ &+\frac{P_U I^{D}}{F\tau \log\left(1+\frac{P_{U}h^2}{N_{0}}\right)}(1-d_f)\Bigg)\leq \bar{P}. \end{align} The average consumed bandwidth, including both uplink and downlink bandwidth, is given by \begin{align} \frac{1}{F} \sum_{f=1}^F\left(B_f^U+B_f^D\right). \end{align} \section{Problem Formulation and Optimal Property Analysis} \subsection{Problem Formulation} We formulate the joint caching and computing optimization problem to minimize the average required bandwidth, including both the uplink and downlink bandwidth, subject to the cache size, average power and latency constraints, as below. \begin{Prob}[Joint Caching and Computing Optimization] \begin{align} &\min_{\textbf{c},\ \textbf{d}}\ & \ \ \frac{1}{F}\sum_{f=1}^F (B_f^U+B_f^D)\nonumber\\ &\ s.t.\ & (\ref{cache}),\ (\ref{latency1}),\ (\ref{latency2}),\ (\ref{power}),\nonumber\\ &\ \ \ & c_f \in \{0,1\},\ d_f\in \{0,1\}, f\in \mathcal{F}.\nonumber \end{align} \end{Prob} Denote with $\left(\textbf{c}^* \triangleq (c_f^*)_{f\in \mathcal{F}},\textbf{d}^*\triangleq (d_f^*)_{f\in \mathcal{F}}\right)$ the optimal joint caching and computing policy and $B^*$ the corresponding optimal average bandwidth. \subsection{Optimal Properties} First, we can directly observe the following property between the local computing and local caching. \begin{property} When $d_f=0$, $c_f = 0$ without loss of optimality. \end{property} Then, for each $f\in \mathcal{F}$, introduce $x_{f,j}\in \{0,1\},\ j \in \{1,2,3\},$ with $x_{f,j} = 1$ indicating that task $f$ is served via the $j$-th route and $x_{f,j}=0$ otherwise. Here, the first route corresponds to the local computing with local caching, i.e., $d_f=1,\ c_f=1$. The second refers to the local computing without caching, i.e., $d_f=1,\ c_f=0$. The third refers to the MEC computing, i.e., $d_f=0,\ c_f=0$. Denote with $B_{f,j},\ j\in \{1,2,3\}$ the minimum value of $B_f^U+B_f^D$ for the $j$-th route given $(\textbf{c},\ \textbf{d})$. Next, under latency constraint, we obtain the analytical expression for $B_{f,j}$. \begin{property} \textcolor{black}{When $d_f=1,\ c_f=1$, i.e., $x_{f,1}=1$, \ $B_{f,1} = 0$. } \end{property} \begin{property} \textcolor{black}{When $d_f=1,\ c_f=0$, i.e., $x_{f,2} = 1$,\ $B_{f,2} = \frac{I^S}{\left(\tau-\frac{(I^S+I^D)w}{f_D}\right)\log\left(1+\frac{P_Dh^2}{N_0}\right)}$.} \end{property} Property~3 can be obtained directly from (\ref{latency1}). \begin{property} \textcolor{black}{When $d_f=0,\ c_f=0$, i.e., $x_{f,3} =1$,\ $B_{f,3} = \frac{(\sqrt{a_1}+\sqrt{a_2})^2}{a_3}$, where $a_1=\frac{I^D}{\log\left(1+\frac{P_Uh^2}{N_0}\right)}$, $a_2=\frac{O}{\log\left(1+\frac{P_D h^2}{N_0}\right)}$, and $a_3=\tau-\frac{(I^S+I^D)w}{f_S}$.} \end{property} \begin{proof} \textcolor{black}{Proof of Property~4 can be seen in Appendix~A. } \end{proof} After that, via replacing $B_f^U+B_f^D$ in the objective function of Problem~1 with $B_{f,j}$ obtained from Properties 2-4, the latency constraints (\ref{latency1}) and (\ref{latency2}) can be eliminated. \textcolor{black}{Denote with $X_j \triangleq \sum_{f=1}^F x_{f,j},\ j\in \{1,2,3\}$ the number of tasks served via the $j$-th route. Since each task is independent of each other and homogeneous, given $(X_j)_{j\in \{1,2,3\}}$, $(x_{f,j})_{f\in \mathcal{F},j\in \{1,2,3\}}$ can be obtained via \begin{equation}\label{service1} x_{f,1} = \begin{cases} 1& \text{$i = 1, \cdots, X_1$,}\\ 0& \text{otherwise,} \end{cases} \end{equation} \begin{equation}\label{service2} x_{f,2} = \begin{cases} 1& \text{$i = X_1+1, \cdots, X_1+X_2$,}\\ 0& \text{otherwise,} \end{cases} \end{equation} \begin{equation}\label{service3} x_{f,3} = \begin{cases} 1& \text{$i = X_1+X_2+1,\! \cdots,\! X_1+X_2+X_3$,}\\ 0& \text{otherwise.} \end{cases} \end{equation}} Via replacing $(x_{f,j})_{f\in \mathcal{F},j\in \{1,2,3\}}$ with $(X_j)_{j\in \{1,2,3\}}$, Problem~1 is transformed into Problem~2 equivalently. \textcolor{black}{\begin{Prob}[Equivalent Optimization]\label{prob:special2} \begin{align} &\min_{(X_j)_{j\in \{1,2,3\}}} X_1 B_1+X_2 B_2+X_3 B_3 \label{obj_special}\\ & ~~~~~~ s.t. ~~~~~\ \ I^S X_1 \leq C, \label{cache_special}\\ & ~~~~~~~~\ \ \ \ \ \ \ \ \ k_{1}(X_1+X_2) + k_{2}X_3\leq \bar{P},\label{power_special}\\ & ~~~~~~~~~\ \ \ \ \ \ \ \ X_1+X_2+X_3 = F,\\ & ~~~~~~~~\ \ \ \ \ \ \ \ \ 0<=X_1<=F,\\ & ~~~~~~~~\ \ \ \ \ \ \ \ \ 0<=X_2<=F,\\ & ~~~~~~~~\ \ \ \ \ \ \ \ \ 0<=X_3<=F, \end{align} where $k_1 \triangleq \frac{\mu f_D^2w\left(I^D+I^S\right)}{\tau F}$ and $k_2 \triangleq \frac{P_U I^{D}}{F\tau \log\left(1+\frac{P_{U}h^2}{N_{0}}\right)}$ represent the average power consumed at the mobile device of each task for local computing and uplink transmission, respectively. \end{Prob}} \section{Optimal Policy and Tradeoff Analysis} \subsection{Optimal Policy} \begin{theorem} \label{theorem1} (Optimal joint policy when $k_1>k_2$) If $B_{3}>B_{2}$, the optimal joint policy is given as \begin{equation} \label{case1} \begin{aligned} &X_{1}=\min \left \{ \left\lfloor \frac{C}{I^{S}} \right \rfloor , F, \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right\rfloor \right \},\\ &X_{2} = \max \left \{0, \min \left \{F, \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor \right \} -X_1 \right\},\\ & X_3 = F - X_1 - X_2 \end{aligned} \end{equation} where $\lfloor \bullet \rfloor$ denotes the round-down function. $B^*=B_2X_2+B_3X_3 $. If $B_{3} \leq B_{2}$, the optimal joint policy is given as \begin{equation}\label{case2} \begin{aligned} &X_{1}=\min \left \{ \left \lfloor \frac{C}{I^{S}} \right \rfloor, F, \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor \right \},\\ & X_{2} = 0, \\ &X_3 = F -X_1. \end{aligned} \end{equation} $B^*=B_3X_3$. \end{theorem} \begin{proof} Proof of Theorem~1 can be seen in Appendix~B. \end{proof} \begin{theorem}\label{theorem2} (Optimal joint policy when $k_1 \leq k_2$) If $B_3>B_2$, the optimal joint policy is given as \begin{equation}\label{case3} \begin{aligned} &X_{1}= \left \lfloor \frac{C}{I^S} \right \rfloor,\\ &X_{2}=F-X_1,\\ &X_3 = 0. \end{aligned} \end{equation} $B^*=B_2X_2$. If $B_3 \leq B_2$, the optimal joint policy is \begin{equation}\label{case4} \begin{aligned} &X_{1}= \left \lfloor \frac{C}{I^S} \right \rfloor,\\ &X_{2}=\max \left\{0, \left \lceil \frac{\bar{P}-F k_2}{k_2-k_1} \right \rceil-X_{1} \right\},\\ &X_3 = F-X_1-X_2. \end{aligned} \end{equation} $B^*=B_2X_2+B_3X_3$. \end{theorem} \begin{proof} Proof of Theorem~2 can be seen in Appendix~C. \end{proof} \subsection{Tradeoff Analysis} \begin{figure}[t] \begin{center} \subfigure[\textcolor{black}{Cache size when $f_D=4$ GHz and $\tau=0.5$ s}.] {\resizebox{4.2cm}{!}{\includegraphics{Fig2.eps}}} \subfigure[\textcolor{black}{\textcolor{black}{Computing} frequency when $C=400$ MB and $\tau=0.143$ s}.] {\resizebox{4.2cm}{!}{\includegraphics{Fig3.eps}}} \end{center} \caption{\small{Impact of $C$ and $f_D$ on $B^*$. $f_S=15$ GHz, $F=300$, $\frac{P_{D}h^2}{N_0}=28.1573$ dB, $\frac{P_{U}h^2}{N_0}=10.98$ dB, $P_{U}=\frac{250\ \text{mW}}{180\ \text{KHz}}$, $P_{D}=\frac{5\ \text{W}}{180\ \text{KHz}}$, $w=10$, $\mu=10^{-27}$.}} \label{case2} \end{figure} \subsubsection{\textbf{$\mathbf{k_1>k_2}$}} When $k_1>k_2$ and $B_3>B_2$, from (\ref{case1}), there are three possible cases as below. \begin{itemize} \item When $ \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor< \left \lfloor \frac{C}{I^{S}}\right \rfloor <F $, $X_1 = \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor $ decreases with $f_D$ since $k_1$ increases with $f_D$, $X_2 = 0$ is independent of $f_D$ and $X_3 = F- X_1$ increases with $f_D$. Then, $B^* = B_3X_3$ increases with $f_D$ with $B_3$ given in Property~4 independent of $f_D$. This is because when the locally available power is limited, increasing $f_D$ decreases the number of tasks that can be computed locally. Also, $B^*$ is independent of $C$ indicating that it is mainly limited by the local computing power $ \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor$. \item When $ \left \lfloor \frac{C}{I^{S}}\right \rfloor < \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor<F $, $X_1 = \left \lfloor \frac{C}{I^{S}}\right \rfloor $ is independent of $f_D$, $X_2 = \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor -X_1$ decreases with $f_D$ since $k_1$ increases with $f_D$, and $X_3 $ increases with $f_D$. \textcolor{black}{Then, $B^*$ increases with $f_D$ since $B_2<B_3$. Meanwhile, $B^*$ decreases with $C$. } \item When $ \left \lfloor \frac{C}{I^{S}}\right \rfloor <F <\left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor $, $X_1 = \left \lfloor \frac{C}{I^{S}}\right \rfloor$ and $X_2 = F - X_1$ are independent of $f_D$ and $X_3 = 0$ is independent of $f_D$. Then, since $B_2$ given in Property~3 decreases with $f_D$, $B^* = B_2X_2$ decreases with $f_D$. This is because when the locally available power is large enough, increasing $f_D$ decreases the computation latency. Also, $B^*$ decreases with $C$. \end{itemize} When $k_1>k_2$ and $B_3 \leq B_2$, from (17), there are three possible cases as below. \begin{itemize} \item When $ \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor< \left \lfloor \frac{C}{I^{S}}\right \rfloor <F $, $X_1 = \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor $ decreases with $f_D$, $X_2 = 0$ is independent of $f_D$ and $X_3 = F- X_1$ increases with $f_D$. Then, $B^* = B_3X_3$ is independent of $C$ and increases with $f_D$. This is because when the locally available power is limited, i.e., smaller than the number of tasks that can be cached locally $\frac{C}{I^S}$, increasing $f_D$ decreases the number of tasks that can be computed locally. \item When $ \left \lfloor \frac{C}{I^{S}}\right \rfloor < \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor<F $, $X_1 = \left \lfloor \frac{C}{I^{S}}\right \rfloor $, $X_2 = 0$ and $X_3 = F - X_1 $ which are all independent of $f_D$. Then, we have $B^* = B_3X_3$ independent of $f_D$ and decreases with $C$. This is because when $ \left \lfloor \frac{C}{I^{S}}\right \rfloor < \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor<F $, the bandwidth gain is limited by the local cache size $C$. \item When $ \left \lfloor \frac{C}{I^{S}}\right \rfloor <F <\left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor $, $X_1 = \left \lfloor \frac{C}{I^{S}}\right \rfloor$, $X_2 = 0$ and $X_3 = F-X_1$ are independent of $f_D$. Then, $B^* $ is independent of $f_D$ and decreases with $C$. \end{itemize} From Fig.~2 (a), we can see that joint caching and computing at the mobile device helps further reduce the bandwidth compared with computing only either at the MEC server or at the mobile device. From Fig.~2 (b), firstly, when $f_D$ is relatively small, $B_2 \geq B_3$, $k_1>k_2$ and $ \left \lfloor \frac{C}{I^{S}}\right \rfloor < F<\left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor$, and thus bandwidth remains unchanged with $f_D$. The first turning point $f^1$ appears when $B_3=B_2$. By setting $B_3=B_2$, the switching point $f^1$ could be explicitly expressed as \begin{equation} f^1=\frac{(I^S+I^D)w}{\tau-\frac{a_3 I^S }{\log(1+\frac{P_D h^2}{N_0})(\sqrt{a_1}+\sqrt{a_2})^2}}. \end{equation} Then, the bandwidth starts decreasing with $f_D$. This is because as $f_D$ increases, $B_2 < B_3$, $k_1>k_2$ and $ \left \lfloor \frac{C}{I^{S}}\right \rfloor <F<\left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor $. Then, the second turning point $f^2$ appears when $ \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor =F$. By setting $ \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor =F$, we could obtain the explicit expression for the second turning point \begin{equation} f^2 \approx \sqrt{\frac{\tau(\bar{P}-Fk_2)+\tau F k_2}{\mu w (I^D+I^S)}}. \end{equation} Next, the bandwidth $B^*$ starts increasing with $f_D$. This is because as $f_D$ increases, $ \left \lfloor \frac{C}{I^{S}}\right \rfloor <\left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor <F$. Moreover, we could observe that there is another turning point which pushes the optimal policy towards the bandwidth of MEC-computing policy eventually. This turning point happens when $ \left \lfloor \frac{C}{I^{S}}\right \rfloor =\left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor$. By setting $ \left \lfloor \frac{C}{I^{S}}\right \rfloor =\left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor$, the turning point $f^3$ can be expressed as \begin{equation} f^3 \approx \sqrt{\frac{\tau F I^S(\bar{P}-Fk_2)}{\mu w(I^S+I^D)C}+\frac{\tau F k_2}{\mu w (I^S+I^D)}}. \end{equation} When $f_D>f^3$, the optimal policy is the scenario where $k_1>k_2$, $B_3>B_2$ and $ \left \lfloor \frac{\bar{P}-Fk_2}{k_1-k_2} \right \rfloor< \left \lfloor \frac{C}{I^{S}}\right \rfloor <F $. The optimal policy converges to the MEC computing policy as $f_D$ goes to infinity, i.e., $X_3 = F$. \subsubsection{\textbf{$\mathbf{k_1 \leq k_2}$}} When $k_1 \leq k_2$ and $B_3>B_2$, from (\ref{case3}), there is only one possible case. The bandwidth gain mainly comes from the local computing with/without caching. The MEC computing does not bring any gain. \section{Conclusion} In this paper, we consider a novel bidirectional computation task model and formulate the joint caching and computing optimization problem to minimize the average bandwidth under the latency, cache size and average power constraints. We derive the closed-form expressions for the optimal policy and the minimum bandwidth, which illustrates that the 3C tradeoff can be classified into nine regions according to the relationship between the cache and computation capabilities at the mobile device, that between the uplink transmission power consumption and the local computation power consumption \section*{Appendix A: Proof of Property~4} For each task $f\in \mathcal{F}$, when $d_f=0$, we have $\frac{I_{f}^{D}}{B_{f}^{U}\log(1+\frac{P_{U}h^2}{N_{0}})}+\frac{(I_{f}^{S}+I_{f}^{D})w_f}{f_S}+\frac{O_{f}}{B_f^{D}\log(1+\frac{P_{1}h^2}{N_{0}})} \leq \tau$. Hence, $B_{f,3}$ can be obtained via solving the following optimization problem: \begin{equation} \begin{aligned} &\min_{B_{f}^U,B_{f}^D}{~~~B_f^U+B_f^D} \\ &\ \ s.t.~~~~\frac{a_1}{B_f^U}+\frac{a_2}{B_f^D}\leq a_3,\\ &~~~~~~~~~~~~B_f^U > 0,\\ &~~~~~~~~~~~~B_f^D > 0, \end{aligned} \end{equation} where $a_1=\frac{I_{f}^{D}}{\log(1+\frac{P_{U}h^2}{N_{0}})} > 0$, $a_2=\frac{(I_{f}^{S}+I_{f}^{D})w_f}{f_0} > 0$ and $a_3=\tau-\frac{O_{f}}{\log(1+\frac{P_{D}h^2}{N_{0}})} > 0$. We can see that Problem~10 is a convex minimization problem. Denote with $B_f^{U^*}$ and $B_f^{D^*}$ the optimal solution to Problem~10. In order to solve Problem~10, let us first consider a modified version of the above convex problem as below. \begin{equation} \begin{aligned} &\min_{B_{f}^U,B_{f}^D}{~~~B_f^U+B_f^D} \\ &\ \ s.t.~~~~\frac{a_1}{B_f^U}+\frac{a_2}{B_f^D}\leq a_3.\\ \end{aligned} \end{equation} If the solution to Problem 11 satisfies $B_f^U>0$ and $B_f^D>0$, then it is also a solution to Problem~10. Based on KKT conditions of Problem~11, we get an optimal solution to Problem~11 as below. \begin{align} &B_{f}^{U^*} = \frac{a_1+\sqrt{a_1 a_2}}{a_3}>0\\ &B_{f}^{D^*} = \frac{a_2+\sqrt{a_1a_2}}{a_3}>0. \end{align} Therefore, we get $B_f^{U^*}$ and $B_f^{D^*}$ of Problem~10, and then $B_{f,3} = B_f^{U^*}+B_f^{D^*}$. The proof ends. \section*{Appendix B: Proof of Theorem \ref{theorem1}} \begin{itemize} \item{Suppose $B_3>B_2$ and $k_1-k_2>0$, from Problem. \eqref{obj_special} constraint \eqref{power_special}, we could obtain an upper-bound, $X_1+X_2<=\lfloor \frac{\bar{P} -Fk_2}{k_1-k_2} \rfloor$. Meanwhile, constraint. \eqref{cache_special} yields upper-bound $X_1<=\lfloor \frac{C}{I^S} \rfloor$. Since $B_1=0$, assigning as much files to processing method 1 as possible is the best policy. Meanwhile, $X_1$ cannot be larger than the total number of files $F$ obviously.Therefore, we have $X_1=\min\{ \lfloor \frac{C}{I^S} \rfloor, F, \lfloor \frac{\bar{P} -Fk_2}{k_1-k_2} \rfloor \}$. Subsequently, because $B_3>B_2$, assigning files to processing method 2 is the optimal policy with the constraint of $X_1+X_2 <= \lfloor \frac{\bar{P} -Fk_2}{k_1-k_2} \rfloor$ which could be larger than the total number of files. Hence, $X_2=\max\{0,min\{F,\lfloor \frac{\bar{P} -Fk_2}{k_1-k_2} \rfloor \}-X_1\}$. Last but not least, $X_3=F-X_1-X_2$.} \item{If $B_3<=B_2$ and $k_1-k_2>0$, from Problem. \eqref{obj_special} constraint \eqref{power_special}, we could obtain an upper-bound, $X_1+X_2<=\lfloor \frac{\bar{P} -Fk_2}{k_1-k_2} \rfloor$. Meanwhile, constraint \eqref{cache_special} yields upper-bound $X_1<=\lfloor \frac{C}{I^S} \rfloor$. Since $B_1=0$, assigning as much files to processing method 1 as possible is the best policy. Therefore, similarly with the above proof, we have $X_1=\min\{ \lfloor \frac{C}{I^S} \rfloor, F, \lfloor \frac{\bar{P} -Fk_2}{k_1-k_2} \rfloor \}$. Because $B_3<=B_2$, assigning files to processing method 3 is the optimal policy. So we do not utilize process method at all. Hence, $X_2=0$ and $X_3=F-X_1$.} \\\\ The proof ends here. \end{itemize} \section*{Appendix C: Proof of Theorem \ref{theorem2}} \begin{itemize} \item{ Suppose $B_3>B_2$ and $k_1-k_2<=0$. Constraint \eqref{power_special} yields that $X_1+X_2 >= \lceil \frac{\bar{P}-k_2F}{k_1-k_2} \rceil$.Meanwhile, constraint \eqref{cache_special} yields $X_1<=\lfloor \frac{C}{I^S} \rfloor$. Therefore, we have only one upper-bound and we set $X_1=\lfloor \frac{C}{I^S} \rfloor$. Since $B_3>B_2$, we set $X_2=F-X_1$ and $X_3=0$.} \item{ Suppose $B_3<=B_2$ and $k_1-k_2<=0$. Similarly, one upper-bound indicates that $X_1=\lfloor \frac{C}{I^S} \rfloor$. Since $B_3<=B_2$, we get rid of $X_2$ as much as possible by setting $X_2=\max\{0,\lceil \frac{\bar{P}-F k_2}{k_1-k_2}) \rceil -X_{1}\}$. Note that it is possible for $\frac{\bar{P}-k_2F}{k_1-k_2}$ to be negative so that there is no constraint for $X$, which means there is no constraint on $X_2$ and it could be zero directly. Last, $X_3=F-X_1-X_2$.} \\\\ The proof ends here. \end{itemize} \bibliographystyle{IEEEtran}
\section{Background} \label{s:background} \subsection{Language Model} A language model is a probability distribution over sequences of words. It is essential for natural language processing (NLP) tasks, such as speech recognition, machine translation, and text generation. Traditionally, language models estimate the likelihood of a word sequence given its occurrence history in a training set. An $n$-gram language model~\cite{chen:amacl:1996, kim:aaai:2016} approximates this probability based on the occurrence history of the preceding $n-1$ words. Unfortunately, such count-based language models inherently suffer from the \emph{data sparsity problem}~\cite{chen:amacl:1996}, which causes them to yield poor predictions. The problem is mainly due to insufficient representative training instances. NNLMs address the data sparsity problem by representing words as a distributed vector representation, which is often called a \emph{word embedding}, and using it as input into a neural network. Bengio~\etal~\cite{bengio:npl:2003} introduced the first NNLM, a feed-forward neural network (FNN) model. An FNN predicts the next word based on its preceding $n-1$ words, which is called a \textit{history} or a \textit{context} where $n$ is a hyper parameter that represents the size of the word sequence~\cite{ bengio:npl:2003,goodman:csl:2001,arisoy:wlm:2012}. In this NNLM setting, all words in a training set constitute a vocabulary $V$. Each word in $V$ is mapped onto a feature vector. Therefore, a \textit{context}, a word sequence, becomes the concatenation of each feature vector corresponding to its word. The model is then trained to output a conditional probability distribution of words in V for the next word from a given \textit{context}. \noindent\textbf{Long short-term memory (LSTM).} Unlike FNN language models, a recurrent neural network (RNN) is capable of predicting the next word from a history of preceding words of an arbitrary length because an RNN is capable of accumulating information over a long history of words. An LSTM model is a special kind of RNN; it is designed to capture long-term dependencies between words~\cite{hochreiter:nc:1997, gers:lstm:1999}. Because a standard RNN suffers from the gradient vanishing/exploding problem~\cite{ bengio:tnn:1994}, an LSTM model uses neural layers called gates to regulate information propagation and internal memory to update its training parameters over multiple time steps. \subsection{JS Engine Fuzzing} \label{ss:jsfuzzing} Fuzz testing is a form of dynamic software testing in which the program under test runs repeatedly with test inputs in order to discover bugs in the program. Fuzzing can be categorized into two types based on their input generation methodology~\cite{sutton:2007}: mutational fuzzing and generational fuzzing. Mutational fuzzing~\cite{aflfuzz, woo:ccs:2013, rebert:usec:2014, cha:oakland:2015} alters given seeds to generate new test inputs, whereas generational fuzzing~\cite{funfuzz, holler:usec:2012, han:ccs:2017, han:ndss:2019} produces tests based on an input model, such as a grammar. Since JS code is highly structured, randomly generated test inputs are likely to be rejected by JS engines. Therefore, it is common for JS engine fuzzers to employ a generational approach. One notable example is \jsfunfuzz, a seminal JS engine fuzzer~\cite{ jsfunfuzz:blog, funfuzz}. It starts with a start symbol defined in a JS grammar and selects the next potential production in a random fashion until there are no remaining non-terminal symbols. (1.2,0) circle (0.95)~\cite{han:ndss:2019} is another generational fuzzer that resort to the assembly constraints of its building blocks called code bricks to produce semantically valid JS code. Most other JS engine fuzzers use both mutational and generational approaches. LangFuzz~\cite{holler:usec:2012}, GramFuzz~\cite{guo:2013}, and IFuzzer~\cite{veggalam:esorics:2016} parse JS seeds with the JS grammar and construct a pool of code fragments, where a code fragment is a subtree of an AST. They combine code fragments in the pool to produce a new JS test input, but they also mutate given seeds to generate test inputs. Although it does not aim to find security vulnerabilities, TreeFuzz~\cite{patra:2016} leverages a probabilistic context-free grammar (PCFG) to generate a test suite from given seeds. Similarly, Skyfire~\cite{wang:oakland:2017} infers a probabilistic context-sensitive grammar (PCSG) from given seeds and uses it to generate a well-distributed set of seeds. Both approaches apply probabilistic language models to generate JS testing inputs, but their design is too generic to find security vulnerabilities in JS engines. Unlike previous approaches, \sysname is inspired by a systematic study of CVEs, i.e., previous JS engine vulnerabilities, and leverages an NNLM trained to learn syntactic and semantic commonalities between JS regression test suites. \section{Conclusion} We present \sysname, the first fuzzing tool that leverages an NNLM in generating JS tests. We propose a novel algorithm of modeling the hierarchical structures of a JS test case and the relationships among such structures into a sequence of fragments. The encoding of an AST into a fragment sequence enables \sysname to learn the relationships among the fragments by using an LSTM model. \sysname found \ourbug real-world bugs in the latest JS engines, which demonstrates its effectiveness in finding JS engine bugs. \section{Design} \label{s:design} The design goal of \sysname is to generate JS test inputs that can trigger security vulnerabilities in JS engines, which (1) reflect the syntactic and semantic patterns of a given JS training set, and (2) trigger no reference errors. It is a technical challenge to frame the problem of teaching a language model the semantic and syntactic patterns of training code. We address this challenge by abstracting the hierarchical structure by AST subtrees, which we refer to as fragments. We then enable the language model to learn the compositional relationships between fragments. We propose a novel code generation algorithm that leverages a trained language model. We harness an existing JS code that is already designed to trigger JS engine defects. \sysname alters this existing JS code by replacing one of its AST subtrees with a new subtree that the trained language model generates. Thus, \sysname is capable of generating a new JS test, semantically similar to the regression test case that triggers a previously reported bug. We expect that this new JS test triggers a new bug in a different execution context. \subsection{Phase I: Building Training Data of Fragment Sequences} \label{ss:phase1} Phase I prepares training instances using a given training set. It conducts \emph{parsing} and \emph{fragmentation}. \subsubsection{Parsing and Normalizing} \label{ss:parsing} Phase I builds an AST by parsing each JS file in a training set and normalizes the parsed AST. Because the training set includes a variety of JS files from various developers, identifier naming practices are not necessarily consistent. Thus, it is natural that the training files have diverse variable and function names across different JS files. Consider two JS files that contain a JS statement \texttt{var b = a + 1} and \texttt{var c = d + 1}, respectively. Both have the same AST structure and semantics, but different identifiers. This pattern increases the size of unnecessary vocabulary for a language model to learn, rendering the model evaluation expensive as it requires more training instances. To have concise ASTs with consistent identifier names, we rename all the variable and function identifiers in the ASTs. Specifically, for each declared variable identifier, we assign a sequential number in the order of their appearance in a given AST. We then replace each variable name with a new name that combines a common prefix and its sequential number, such as \texttt{v0} and \texttt{v1}. We also apply the same procedure to function identifiers, e.g., \texttt{f0} and \texttt{f1}. We deliberately exclude language-specific built-in functions and engine objects from the normalization step as normalizing them affects the semantics of the original AST. For an \texttt{eval} function that dynamically evaluates a given string as the JS code, we first extract the argument string of the \texttt{eval} function and strip it out as the JS code when the argument is a constant string. Subsequently, we normalize identifiers in the JS code stripped out from the \texttt{eval} argument. As our training set is derived from regression tests of JS engines, JS files in the set make heavy use of predefined functions for testing purposes. Therefore, we manually identified such vendor-provided testing functions and ignore them during the normalization step. That is, we treated common testing functions provided by each JS engine vendor as a built-in function and excluded them from normalization. \subsubsection{Fragmentation} \label{ss:frag} \sysname slices each normalized AST into a set of subtrees while ensuring that the depth of each subtree is one. We call such a unit subtree as a \textit{ fragment}. We represent an AST $T$ with a triple $(\nodes, \edges, \rnode)$, where \nodes is the set of nodes in $T$, \edges is the set of edges in $T$, and \rnode is the root node of $T$. We denote the immediate children of a given AST node $n_i$ by $\children\left(n_i\right)$, where $n_i$ is a node in $\nodes$. Then, we define a subtree of $T$ where the root node of the subtree is $n_i$. When there is such a subtree with a depth of one, we call it a \textit{fragment}. We now formally define it as follows. \begin{defn}[Fragment]\label{def:dfrag} A fragment of $T = (\nodes, \edges, \rnode)$ is a subtree % $T_i = (\nodes_i, \edges_i, n_i)$, where % \begin{itemize} \item $n_i \in \nodes$ s.t. $\children\left(n_i\right) \neq \emptyset$. \item $\nodes_i = \{n_i\} \bigcup \children(n_i)$. \item $\edges_i = \left\{(n_i, n^\prime) \mid n^\prime = \children(n_i) \right\}$. \end{itemize} \end{defn} Intuitively, a fragment whose root node is $n_i$ contains its children and their tree edges. Note that each fragment inherently captures an exercised production rule of the JS language grammar employed to parse the AST. We also define the $type$ of a fragment as the non-terminal symbol of its root node $n_i$. For instance, the first fragment at the bottom side of Figure~\ref{fig:frag-overview} corresponds to the assignment expression statement in Line~\ref{line:example} of Figure~\ref{lst:example}. The fragment possesses four nodes whose root node is the non-terminal symbol of an \texttt{AssignmentExpression}, which becomes the $type$ of this fragment. \sysname then generates a sequence of fragments by performing the pre-order traversal on the AST. When visiting each node in the AST, it emits the fragment whose root is the visited node. The purpose of the pre-order sequencing is to sort fragments by the order of their appearance in the original AST. For example, the bottom side of Figure~\ref{fig:frag-overview} shows the sequence of seven fragments obtained from the AST subtree in the figure. We model the compositional relationships between fragments as a pre-order sequencing of fragments so that an NNLM can predict the next fragment to use based on the fragments appearing syntactically ahead. In summary, Phase I outputs the list of fragment sequences from the training set of normalized ASTs. \subsection{Phase II: Training an LSTM Model} \label{ss:phase2} All distinct fragments become our vocabulary for the NNLM to be trained. Before training, we label the fragments whose frequency is less than five in the training set as out-of-vocabulary (OoV). This is a standard procedure for building a language model to prune insignificant words~\cite{hindle:icse:2012, nguyen:fse:2013, raychev:pldi:2014}. Each fragment sequence represents a JS file in the training set. This sequence becomes a training instance. We build a statistical language model from training instances so that the model can predict the next fragment based on all of its preceding fragments, which is considered as a \textit{context}. This way, the model considers each fragment as a lexicon, and thereby, suggests the next probable fragments based on the current context. \noindent\textbf{Training objectives.} The overall objective is to model a function $f : X \rightarrow Y$ such that $y \in Y$ is a probability distribution for the next fragment $fr_{t+1}$, given a fragment sequence $x = [fr_0, fr_1, ..., fr_t] \in X$, where $fr_i$ denotes each fragment at time step $i$. Given $x$, the model is trained to (1) predict the correct next fragment with the largest probability output and (2) prioritize fragments that share the same $type$ with the true fragment over other types of fragments. Note that this training objective accords with our code generation algorithm in that \sysname randomly selects the next fragment of a given type from the top $k$ suggestions (see \S\ref{ss:phase3}). \begin{figure}[!t] \centering \includegraphics[width=\columnwidth]{figs/model_structure} \caption{Architecture of \sysname LSTM model. $\oplus$ in the figure denotes a concatenation.} \label{fig:model-architecture} \vspace{-1.0em} \end{figure} \noindent\textbf{LSTM.} To implement such a statistical language model, we take advantage of the LSTM model~\cite{hochreiter:nc:1997}. Figure~\ref{fig:model-architecture} depicts the architecture of \sysname LSTM model. Our model consists of one projection, one LSTM, and one output layers. The projection layer is an embedding layer for the vocabulary where each fragment has a dimension size of 32. When $fr_t$ is passed into the model, it is converted into a vector, called $embedding$, after passing the projection layer. Then, the $embedding$ vector becomes one of the inputs for the LSTM layer with a hidden state size of 32. At each time step, the LSTM cell takes three inputs: (1) a hidden state $h_{t-1}$ and (2) a cell state $c_{t-1}$ from the previous time step; and (3) the embedding of a new input fragment. This architecture enables the model to predict the next fragment based on the cumulative history of preceding fragments. In other words, the LSTM model is not limited to considering a fixed number of preceding fragments, which is an advantage of using an RNN model. The output of the LSTM layer $h_t$ is then concatenated with two other vectors: (1) the type embedding $T_{t+1}$ of the next fragment, and (2) the fragment embedding $P_{t+1}$ of the parent fragment of the next fragment in its AST. The concatenated vector is now fed into the final output layer and it outputs a vector $f(x)$ of vocabulary size to predict the next fragment. \noindent\textbf{Loss function.} To address our training objectives, we defined a new loss function that rewards the model to locate type-relevant fragments in its top suggestions. The LSTM model is trained to minimize the following empirical loss over the training set $(x,y) \in D$. \begin{equation} \small \begin{aligned} \label{eq:loss1} g(x) &= \textup{softmax}(f(x)) \\ L_{D}(f) &= \frac{1}{|D|}\sum\limits_{(x,y) \in D} l_1(g(x),y) + l_2(g(x),y) \end{aligned} \end{equation} As shown in Equation~\ref{eq:loss1}, the loss function has two terms: $l_1$ and $l_2$. Note that these terms are designed to achieve our two training objectives, respectively. \begin{equation} \small \begin{aligned} \label{eq:loss2} l_1(g(x),y) &= - \sum\limits_{i=1}^{N}{y_i}\log g(x)_i \\ l_2(g(x),y) &= \sum\limits_{i \in \textup{top}(n)}{g(x)_i} - \sum\limits_{j \in \textup{type}(y)}{g(x)_j}, \end{aligned} \end{equation} Equation~\ref{eq:loss2} describes each term in detail. In the equation, $n$ denotes the number of fragments whose types are same as that of the true fragment. $\textup{top}(n)$ and $\textup{type}(y)$ indicate functions that return the indices of top $n$ fragments and fragments of the true type, respectively. $l_1$ is a cross entropy loss function, which has been used for common natural language models~\cite{mikolov:acisca:2010, jozefowicz:arxiv:2016}. $l_2$ is employed for rewarding the model to prioritize fragments that have the same type as the true fragment. We formally define $l_2$ as a \textbf{type error}. It is a gap between two values: the sum of the model output probabilities corresponding to (1) top $n$ fragments and (2) fragments of the true type. By reducing the sum of $l_1$ and $l_2$ while training, the model achieves our training objectives. Intuitively, the LSTM model is trained not only to predict the correct fragment for a given context, but also to locate fragments whose types are same as the correct fragment in its top suggestions. The fundamental difference of \sysname from previous approaches that use probabilistic language models~\cite{wang:oakland:2017, patra:2016} lies in the use of fragments. To generate JS code, TreeFuzz~\cite{patra:2016} and SkyFire~\cite{wang:oakland:2017} use a PCFG and PCSG to choose the next AST production rule from a given AST node, respectively. SkyFire defines its context to be sibling and parent nodes from a given AST. It picks an AST production rule that is less frequent in the training set. In contrast, \sysname selects a fragment based on the list of fragments, not AST nodes. Therefore, \sysname is capable of capturing the global composition relationships among code fragments to select the next code fragment. Furthermore, \sysname preserves the semantics in the training set by slicing the AST nodes into fragments, which is used as a lexicon for generating JS code. We frame the problem of training a language model to leverage fragments and their sequences, which makes \sysname compatible with prevalent statistical language models. \subsection{Phase III: Generating JS Tests} \label{ss:phase3} Given a set of ASTs from regression tests and the LSTM model, Phase III first mutates a randomly selected seed AST by leveraging the LSTM model. Then, it resolves reference errors in the skeleton AST. Algorithm~\ref{algo:generate} describes our code generation algorithm. The \texttt{MutateAST} function takes two configurable parameters from users. \begin{enumerate}[noitemsep,leftmargin=1.6cm,labelsep=0.6cm] \item[\fmax] The maximum number of fragments to append. This parameter controls the maximum number of fragments that a newly composed subtree can have. \item[\topk] The number of candidate fragments. \sysname randomly selects the next fragment from suggestions of the \topk largest probabilities at each iteration. \end{enumerate} After several exploratory experiments, we observed that bloated ASTs are more likely to have syntactical and semantic errors. We also observed that the accuracy of the model decreases as the size of an AST increases. That is, as the size of AST increases, \sysname has a higher chance of failures in generating valid JS tests. We thus capped the maximum number of fragment insertions with \fmax and empirically chose its default value to be 100. For \topk, we elaborate on its role and effects in detail in \S\ref{ss:topk-test}. \subsubsection{Mutating a Seed AST} The \texttt{MutateAST} function takes in a set of ASTs from regression tests, the trained LSTM model, and the two parameters. It then begins by randomly selecting a seed AST from the given set (Line~\ref{algo:line:seed}). From the seed AST, it removes one randomly selected subtree (Line~\ref{algo:line:rm}). Note that the pruned AST becomes a base for the new JS test. Finally, it composes a new subtree by leveraging the LSTM model (Lines~\ref{algo:line:start}-\ref{algo:line:end}) and returns the newly composed AST. \input{algo/generate} After selecting a seed AST in Line~\ref{algo:line:seed}, we randomly prune one subtree from the AST by invoking the \texttt{RemoveSubtree} function. The function returns a pruned AST and the initial $context$ for the LSTM model, which is a fragment sequence up to the fragment where \sysname should start to generate a new subtree. This step makes a room to compose new code. In the \texttt{while} loop in Lines~\ref{algo:line:start}-\ref{algo:line:end}, the \texttt{MutateAST} function now iteratively appends fragments to the AST at most \fmax times by leveraging the LSTM model. The loop starts by selecting the next fragment via the \texttt{PickNextFrag} function in Line~\ref{algo:line:pick}. The \texttt{PickNextFrag} function first queries the LSTM model to retrieve the \topk suggestions. From the suggestions, the function repeats random selections until the chosen fragment indeed has a correct type required for the next fragment. If all the suggested fragments do not have the required type, the \texttt{MutateAST} function stops here and abandon the AST. Otherwise, it continues to append the chosen fragment by invoking the \texttt{AppendFrag} function. The \texttt{AppendFrag} function traverses the AST in the pre-order to find where to append the fragment. Note that this process is exactly the opposite process of an AST fragmentation in \S\ref{ss:frag}. Because we use a consistent traversal order in Phase I and III, we can easily find whether the current node is where the next fragment should be appended. Lines~\ref{algo:appd:start}-\ref{algo:appd:end} summarize how the function determines it. The function tests whether the current node is a non-terminal that does not have any children. If the condition meets, it appends the fragment to the current node and returns. If not, it iteratively invokes itself over the children of the node for the pre-order traversal. Note that the presence of a non-terminal node with no children indicates that the fragment assembly of the AST is still in progress. The \texttt{IsASTBroken} function checks whether the AST still holds such nodes. If so, it keeps appending the fragments. Otherwise, the \texttt{MutateAST} function returns the composed skeleton AST. We emphasize that our code generation technique based on code fragments greatly simplifies factors that a language model should learn in order to generate an AST. TreeFuzz~\cite{patra:2016} allows a model to learn fine-grained relationships among edges, nodes, and predecessors in an AST. Their approach requires to produce multiple models each of which covers a specific property that the model should learn. This, though, brings the unfortunate side-effects of managing multiple models and deciding priorities in generating an AST when the predictions from different models conflict with each other. On the other hand, our approach abstracts such relationships as fragments, which becomes building blocks for generating AST. The model only learns the compositional relationships between such blocks, which makes training and managing a language model simple. \subsubsection{Resolving Reference Errors}\label{ss:error-resolution} Phase III resolves the reference errors from the generated AST, which appear when there is a reference to an undeclared identifier. It is natural for the generated AST to have reference errors since we assembled fragments that are used in different contexts across various training files. The reference error resolution step is designed to increase the chance of triggering bugs by making a target JS engine fully exercise the semantics of a generated testing code. The previous approaches~\cite{holler:usec:2012, guo:2013, veggalam:esorics:2016} reuse existing AST subtrees and attach them into a new AST, which naturally causes reference errors. However, they overlooked this reference error resolution step without addressing a principled solution. We propose a systematic way of resolving reference errors, which often accompany type errors. Specifically, we take into account both (1) statically inferred JS types and (2) the scopes of declared identifiers. \sysname harnesses these two factors to generate JS test cases with fewer reference errors in the run time. There are three technical challenges that make resolving reference errors difficult. (1) In JS, variables and functions can be referenced without their preceding declarations due to hoisting~\cite{hoisting}. Hoisting places the declarations of identifiers at the top of the current scope in its execution context; (2) It is difficult to statically infer the precise type of each variable without executing the JS code because of no-strict type checking and dynamically changing types; and (3) Each variable has its own scope so that referencing a live variable is essential to resolve reference errors. To address these challenges, \sysname prepares a scope for each AST node that corresponds to a new block body. \sysname then starts traversing from these nodes and fills the scope with declared identifiers including hoistable declarations. Each declared identifier in its scope holds the \texttt{undefined} type at the beginning. When \sysname encounters an assignment expression in its traversal, it statically infers the type of its right-hand expression via its AST node type and assigns the inferred type to its left-hand variable. \sysname covers the following statically inferred types: \texttt{array, boolean, function, null, number, object, regex, string, undefined}, and \texttt{unknown}. Each scope has an identifier map whose key is a declared identifier and value is an inferred type of the declared identifier. To resolve reference errors, \sysname identifies an undeclared variable while traversing each AST node and then infers the type of this undeclared variable based on its usage. A property or member method reference of such an undeclared variable hints to \sysname to infer the type of the undeclared variable. For instance, the \texttt{length} property reference of an undeclared variable assigns the \texttt{string} type to the undeclared variable. From this inferred type, \sysname replaces the undeclared identifier with a declared identifier when its corresponding type in the identifier map is same as the inferred type. If the inferred type of an undeclared variable is \texttt{unknown}, it ignores the type and randomly picks one from the list of declared identifiers. For all predefined and built-in identifiers, \sysname treats them as declared identifiers. \section{Evaluation} \label{sec:eval} We evaluated \sysname in several experimental settings. The goal is to measure the efficacy of \sysname in finding JS engine bugs, as well as to demonstrate the necessity of an NNLM in finding bugs. We first describe the dataset that we used and the experimental environment. Then, we demonstrate (1) how good a trained \sysname NNLM is in predicting correct fragments (\S\ref{ss:model-validity}), (2) how we set a \topk parameter for efficient fuzzing (\S\ref{ss:topk-test}), (3) how many different bugs \sysname discovers, which other existing fuzzers are unable to find (\S\ref{ss:evalcmp}), and (4) how much the model contributes to \sysname finding bugs and generating valid JS tests (\S\ref{ss:model-effectiveness}). We conclude the evaluation with field tests on the latest JS engines (\S\ref{ss:evalfield}). We also discuss case studies of discovered bugs (\S\ref{ss:casestudy}). \subsection{Experimental Setup}\label{ss:evalenv} We conducted experiments on two machines running 64-bit Ubuntu 18.04 LTS with two Intel E5-2699 v4 (2.2 GHz) CPUs (88 cores), eight GTX Titan XP DDR5X GPUs, and 512 GB of main memory. \noindent\textbf{Target JS engine.} The \chakra GitHub repository has managed the patches for all the reported CVEs by the commit messages since 2016. That is, we can identify the patched version of \chakra for each known CVE and have ground truth that tells whether found crashes correspond to one of the known CVEs~\cite{chen:pldi:2013}. Therefore, we chose an old version of \chakra as our target JS engine. We specifically performed experiments on \chakra 1.4.1, which was the first stable version after January 31, 2017. \noindent\textbf{Data.} Our dataset is based on the regression test sets of Test262~\cite{test262} and the four major JS engine repositories at the version of January 31, 2017: \chakra, \jsc, \moz, and \veight. We excluded test files that \chakra failed to execute because of their engine-specific syntax and built-in objects. We did not take into account files larger than 30 KB because large files considerably increase the number of unique fragments with low frequency. In total, we collected 1.7M LoC of 33,486 unique JS files. \noindent\textbf{Temporal relationships.} \sysname only used the regression test files committed before January 31, 2017, and performed fuzz testing campaigns on the first stable version after January 31, 2017. Thus, the bugs that regression tests in the training dataset check and the bugs that \sysname is able to find are disjoint. We further confirmed that all CVEs that \sysname found were patched after January 31, 2017. \noindent\textbf{Fragments.} From the dataset, we first fragmented ASTs to collect 134,160 unique fragments in total. On average, each training instance consisted of 118 fragments. After replacing less frequent fragments with OoVs, they were reduced to 14,518 vocabularies. Note that most replaced fragments were string literals, e.g., bug summaries, or log messages. \noindent\textbf{Bug ground truth.} Once \sysname found a JS test triggering a bug, we ran the test against every patched version of \chakra to confirm whether the found bug matches one of the reported CVEs. This methodology is well-aligned with that of Klees~\etal~\cite{klees:ccs:2018}, which suggests counting distinct bugs using ground truth. When there is no match, the uniqueness of a crash was determined by its instruction pointer address without address space layout randomization (ASLR). We chose this conservative setting to avoid overcounting the number of found bugs~\cite{molnar:usec:2009}. \subsection{Evaluation of the LSTM Model} \label{ss:model-validity} To train and evaluate the LSTM model of \sysname, we performed a 10-fold cross-validation on our dataset. We first randomly selected JS files for the test set, which accounted for 10\% of the entire dataset. We then randomly split the remaining files into 10 groups. We repeated holding out one group for the validation set and taking the rest of them for the training set for 10 times. \begin{figure}[!t] \begin{subfigure}{0.49\columnwidth} \centering \includegraphics[scale=0.6]{graphs/perplexity} \caption{Perplexity of the model.} \label{fig:model-pplx} \end{subfigure} \begin{subfigure}{0.49\columnwidth} \centering \includegraphics[scale=0.6]{graphs/type_error} \caption{Type error proportion.} \label{fig:model-typeerr} \end{subfigure} \caption{Perplexity and type error proportion of the LSTM model measured against the training and validation sets over epochs. They are averaged across the 10 cross-validation sets.} \label{fig:model-test} \vspace{-1.0em} \end{figure} Figure~\ref{fig:model-test} illustrates the \textit{perplexity} and \textit{type error} of the LSTM model measured on the training and validation sets. Recall that the loss function of the model is a sum of the \textit{log perplexity} and \textit{type error} (\S\ref{ss:phase2}). \noindent\textbf{Perplexity.} Perplexity measures how well a trained model predicts the next word that follows given words without perplexing. It is a common metric for evaluating natural language models~\cite{ mikolov:acisca:2010, jozefowicz:arxiv:2016}. A model with a lower perplexity performs better in predicting the next probable fragment. Note from Figure~\ref{fig:model-pplx} that the perplexities for both the training and validation sets decrease without a major difference as training goes on. \noindent\textbf{Type error.} Type error presents how well our model predicts the correct type of a next fragment (recall \S\ref{ss:phase2}). A model with a low type error is capable of predicting the fragments with the correct type in its top predictions. Note from Figure~\ref{fig:model-typeerr} that the type errors for both the training and validation sets continuously decrease and become almost equal as the epoch increases. The small differences of each perplexity and type error between the training set and validation set demonstrate that our LSTM model is capable of learning the compositional relations among fragments without overfitting or underfitting. We further observed that epoch 70 is the optimal point at which both valid perplexity and valid type errors start to plateau. We also noticed that the test perplexity and test type errors at epoch 70 are 28.07 and 0.14, respectively. Note from Figure~\ref{fig:model-test} that these values are close to those from the validation set. It demonstrates that the model can accurately predict fragments from the test set as well. Thus, for the remaining evaluations, we selected the model trained up to epoch 70, which took 6.6 hours on our machine. \subsection{Effect of the \topk Parameter} \label{ss:topk-test} \input{tables/compare_table} \sysname assembles model-suggested fragments when replacing an AST subtree of a given JS code. In this process, \sysname randomly picks one fragment from the \textit{Top-k} (\topk) suggestions for each insertion. Our key intuition is that selecting fragments from the \textit{Top-k} rather than \textit{Top-1} suggestion helps \sysname generate diverse code, which follows the pattern of JS codes in our dataset but slightly differs from them. We evaluated the effect of the \topk with seven different values varying from 1 to 64 to verify our intuition. \begin{figure}[!t] \centering \includegraphics[width=\columnwidth]{graphs/pass_rate} \caption{The pass rate of generated JS tests over \topk.} \label{fig:pr-test} \vspace{-1.0em} \end{figure} We measured the pass rate of generated JS tests. A pass rate is a measurement unit of demonstrating how many tests a target JS engine executes without errors among generated test cases. To measure the pass rate, we first generated 100,000 JS tests with each \topk value. We only considered five runtime errors defined by the ECMAScript standard as errors~ \cite{ecma-script}. We then ran \sysname for 12 hours with each \topk value to count the number of crashes found in \chakra 1.4.1. Figures~\ref{fig:pr-test} and \ref{fig:crash-test} summarize our two experimental results, respectively. As shown in Figure~\ref{fig:pr-test}, the pass rate of \sysname decreases from 79.82\% to 58.26\% as the \topk increases. This fact demonstrates that the suggestion from the model considerably affects the generation of executable JS tests. It is also consistent with the experimental results from Figure~\ref{fig:crash-debug}, in that \sysname finds fewer total crashes when considering more fragment suggestions in generating JS tests. Note that Michael~\etal~\cite{patra:2016} demonstrated that their TreeFuzz achieved a 14\% pass rate, which is significantly lower than that \sysname achieved. However, note from Figure~\ref{fig:crash-debug} that the number of unique crashes increases, as \topk increases, unlike that of total crashes. This observation supports our intuition that increasing the \topk helps \sysname generate diverse JS tests that trigger undesired crashes in the JS engines. Figure~\ref{fig:crash-test} also shows that \sysname found more crashes from the debug build than the release build. Moreover, unlike the debug build, the results for the release build did not show a consistent pattern. We believe these results are mainly due to the nature of the debug build. It behaves more conservatively with inserted assertion statements, thus producing crashes for every unexpected behavior. As Klees~\etal~\cite{klees:ccs:2018} stated, fuzzers should be evaluated using the number of unique crashes, not that of crashing inputs. For both release and debug builds of \chakra 1.4.1, \sysname found the largest number of unique crashes when the \topk was 64. Therefore, we picked the \topk to be 64 for the remaining experiments. \subsection{Comparison to State-of-the-art Fuzzers} \label{ss:evalcmp} \begin{figure}[!t] \begin{subfigure}{0.49\columnwidth} \centering \includegraphics[scale=0.54]{graphs/crash_release} \caption{Crashes on the release build.} \label{fig:crash-release} \end{subfigure} \begin{subfigure}{0.49\columnwidth} \centering \includegraphics[scale=0.54]{graphs/crash_debug} \caption{Crashes on the debug build.} \label{fig:crash-debug} \end{subfigure} \caption{The number of total and unique crashes found in \chakra 1.4.1 while varying the \topk. } \label{fig:crash-test} \vspace{-1.0em} \end{figure} To verify the ability to find bugs against open-source state-of-the-art fuzzers, we compared \sysname with (1.2,0) circle (0.95)~\cite{han:ndss:2019}, \jsfunfuzz~\cite{funfuzz}, and \ifuzzer~\cite{veggalam:esorics:2016}. \jsfunfuzz and \ifuzzer have been used as a controlled group in the comparison studies~\cite{han:ndss:2019, holler:usec:2012}. Furthermore, (1.2,0) circle (0.95), which assembles its building blocks in a semantics-aware fashion, and \ifuzzer, which employs an evolutionary approach with genetic programming, have in common with \sysname in that they take in a corpus of JS tests. Since \sysname, (1.2,0) circle (0.95), and \ifuzzer start from given seed JS files, we fed them the same dataset collected from the repositories of Test262 and the four major JS engines. For fair comparison, we also configured \jsfunfuzz to be the version of January 31, 2017, on which we collected our dataset (recall \S\ref{ss:evalenv}). We ran all four fuzzers on \chakra 1.4.1 and counted the number of found unique crashes and known CVEs. Since most fuzzers depend on random factors, which results in a high variance of fuzzing results~\cite{klees:ccs:2018}, we conducted five trials; each trial lasted for 6,336 CPU hours (72 hours $\times$ 88 cores). We intentionally chose such a long timeout, because fuzzers using evolutionary algorithms, such as \ifuzzer, could improve their bug-finding ability as more tests are generated. Note that we expended a total of 31,680 CPU hours on the five trials of each fuzzer. Because \sysname took 6.6 hours to train its language model and used this model for the five trials, we set the timeout of other fuzzers 1.3 hours (6.6 hours $/$ 5 trials) longer than that of \sysname for fair comparison. The \sysname, CA, \jsfunfuzz, and \ifuzzer columns of Table~\ref{tab:cmp-test} summarize the statistical analysis of the comparison experimental results. For the release build, \sysname found the largest number of CVEs, whereas \jsfunfuzz still discovered more unique crashes than others. For the debug build, \sysname outperformed all others in finding both unique crashes and CVEs. We performed two-tailed Mann Whitney U tests and reported $p$-values between \sysname and the other fuzzers in the table. We verified that all results are statistically significant with $p$-values less than 0.05. The last two rows of the table show the number of total and common bugs found in the five trials from the release and debug builds, respectively. We counted common bugs when \sysname found these bugs in every run of the five campaigns. When a bug was found during at least one campaign, they are counted in the total bugs. Note that \sysname found at least 2.14$\times$ more CVEs compared to others in a total of the five trials. We believe that these results explain the significance of \sysname in finding security bugs compared to the other state-of-the-art fuzzers. \begin{figure}[!t] \begin{subfigure}{0.49\columnwidth} \centering \input{figs/compare1} \caption{The \# of total bugs.} \label{f:cmp-total} \end{subfigure} \begin{subfigure}{0.49\columnwidth} \centering \input{figs/compare2} \caption{The \# of common bugs.} \label{f:cmp-common} \end{subfigure} \caption{The comparison of unique crashes (known CVEs) found by \sysname, (1.2,0) circle (0.95) (CA), and \jsfunfuzz.} \label{f:cmp-bugs} \vspace{-1em} \end{figure} We also compared the bugs discovered by each fuzzer. Figure~\ref{f:cmp-bugs} depicts the Venn diagrams of unique bugs found in \chakra 1.4.1. These Venn diagrams present the total and common bugs that each fuzzer found, corresponding to the last two rows of Table~\ref{tab:cmp-test}. We excluded \ifuzzer from the figure because all found CVEs were also discovered by \sysname. Note from Figure~\ref{f:cmp-total} that \sysname identified 105 unique crashes in total, including eight CVEs that were not found by (1.2,0) circle (0.95) and \jsfunfuzz. Furthermore, \sysname discovered all CVEs that were commonly found in the five trials of (1.2,0) circle (0.95) and \jsfunfuzz, as shown in Figure~\ref{f:cmp-common}. However, (1.2,0) circle (0.95) and \jsfunfuzz also identified a total of 45 and 46 unique bugs that were not found by \sysname, respectively. These results demonstrate that \sysname plays a complementary role against the state-of-the-art fuzzers in finding distinctive bugs. \noindent\textbf{Performance over time.} Figure~\ref{fig:bug-time} shows the number of CVEs that \sysname found over time. The number increases rapidly in the first 1,144 CPU hours (13 hours $\times$ 88 cores) of the fuzzing campaigns; however, \sysname finds additional bugs after running for 2,640 CPU hours (30 hours $\times$ 88 cores), thus becoming slow to find new vulnerabilities. \subsection{Effect of Language Models} \begin{figure}[!t] \centering \includegraphics[width=\columnwidth]{graphs/bug_over_time} \caption{The number of CVEs found by \sysname over time.} \label{fig:bug-time} \vspace{-1em} \end{figure} \label{ss:model-effectiveness} \sysname generates JS tests by assembling language model-suggested fragments. Especially, it takes advantage of the LSTM model to reflect the arbitrary length of preceding fragments when predicting the next relevant fragments. However, \sysname can leverage any other prevailing language models by its design, and the language model it employs may substantially affect its fuzzing performance. Therefore, to analyze the efficacy of the LSTM model in finding bugs, we first conducted a comparison study against two other approaches: (1) a random fragment selection, and (2) Markov model-driven fragment selection. The former approach is the baseline for \sysname where fragments are randomly appended instead of querying a model. The latter approach uses a Markov model that makes a prediction based on the occurrence history of the preceding two fragments. Specifically, we tailored the code from~\cite{markovify} to implement the Markov chain. Additionally, we compared our approach against a character/token-level RNN language model-guided selection. It leverages an NNLM to learn the intrinsic patterns from training instances, which is in common with ours. Recently proposed approaches~\cite{godefroid:ase:2017, cummins:issta:2018, liu:aaai:2019}, which resort to an NNLM to generate highly structured inputs, adopted an approach more or less similar to this one. Note that there is no publicly available character/token-level RNN model to generate JS tests. Thus, we referenced the work of Cummins~\etal~\cite{cummins:issta:2018} to implement this approach and trained the model from scratch. To generate test cases from the trained model, we referenced the work of Liu~\etal~\cite{liu:aaai:2019} because their approach is based on the seed mutation like our approach. The random, Markov, and ch-RNN columns of Table~\ref{tab:cmp-test} summarize the number of crashes found by each approach. We conducted five fuzzing campaigns, each of which lasted 72 hours; all the underlying experimental settings are identical to those in \S\ref{ss:evalcmp}. Note that we conducted resolving reference errors and fed the same dataset as \sysname when evaluating the aforementioned three models. \sysname outperformed the random selection and character/token-level RNN methods in the terms of finding crashes and security bugs; thus, yielding $p$-values under 0.05, which suggests the superiority of \sysname with statistical significance. When comparing the metrics from release and debug build between \sysname and the Markov chain approach, \sysname performed better. \sysname found more unique bugs in total as well. However, the Mann Whitney U test deems the difference insignificant. Nevertheless, we emphasize that \sysname is capable of composing sophisticated subtrees that the Markov chain easily fails to generate. For instance, \sysname generated a JS test triggering CVE-2017-8729 by appending 54 fragments, which the Markov chain failed to find. We provide more details of this case in \S\ref{ss:case1}. \begin{figure}[!t] \centering \includegraphics[width=\columnwidth]{graphs/frag_cdf} \caption{Empirical CDF of the number of appended fragments against JS tests causing crashes in \chakra.} \label{fig:cdf-test} \vspace{-1.0em} \end{figure} To evaluate the effectiveness of the LSTM model, we further analyzed the number of fragments \sysname appended to generate JS tests that caused \chakra 1.4.1 to crash in the experiment from \S\ref{ss:evalcmp}. Figure~\ref{fig:cdf-test} shows the cumulative distribution function (CDF) of the number of inserted fragments against 169,072 and 5,454 JS tests causing crashes and known CVEs, respectively. For 90\% of JS tests that caused the JS engine to crash, \sysname only assembled fewer than 15 fragments; however, it appended up to 52 fragments to generate 90\% of JS tests that found the known CVEs. This demonstrates that \sysname should append more fragments suggested by the model to find security bugs rather than non-security bugs. It also denotes that the random selection approach suffers from finding security bugs. Note that Table~\ref{tab:cmp-test} also accords with this result. From the aforementioned studies, we conclude that the LSTM model trained on fragments is necessary for finding bugs in the JS engines. \noindent \textbf{Resolving reference errors.} We evaluated the importance of the reference error resolution step (recall \S\ref{ss:error-resolution}) in finding JS engine bugs. Specifically, we ran \sysname with the same settings as other approaches while letting it skip the reference error resolution step but still leverage the same LSTM model. The last column of Table~\ref{tab:cmp-test} demonstrates that \sysname finds fewer bugs if the resolving step is not applied, denoting that the error resolving step improves the bug-finding capability of \sysname. However, \sysname still found more bugs than the other state-of-the-art fuzzers and the random approach even without the resolving step. Considering the random approach also takes advantages of the error resolution step, the LSTM model significantly contributes to finding JS engine bugs. \begin{figure}[!t] \centering \includegraphics[width=\columnwidth]{graphs/pass_rate_bar} \caption{The pass rate measured against four different approaches: \sysname (\topk = 64) with and without resolving reference errors, random selection, and Markov model. \sysname without resolving reference errors is denoted by $\dagger$.} \label{fig:pr-cmp} \vspace{-1em} \end{figure} \noindent\textbf{Pass rate.} One of the key objectives of \sysname is to generate a valid JS test so that it can trigger deep bugs in JS engines. Thus, we further measured how the use of language models affects the pass rate of generated codes. A pass rate indicates whether generated test cases are indeed executed after passing both syntax and semantic checking. Figure~\ref{fig:pr-cmp} illustrates the pass rate of 100,000 JS tests generated by the four different approaches: \sysname with and without resolving reference errors, the random selection, and the Markov model. We excluded the character/token-level RNN approach because only 0.58\% of the generated tests were executed without errors. Such a low pass rate could be one possible reason why this approach failed to find many bugs, as shown in Table~\ref{tab:cmp-test}. As Liu~\etal~\cite{liu:aaai:2019} also stated in their paper, we believe this result is attributed to the lack of training instances and the unique characteristics inherent in the regression test suite. Note from the figure that resolving reference errors increases the pass rate by 12.2\%. As a result, this helped \sysname to find more bugs, as shown in Table~\ref{tab:cmp-test}. On the other hand, the pass rates of the random selection and Markov model-guided approach were 5.2\% and 11\% greater than that of \sysname, respectively. We manually inspected the JS tests generated by the random selection and the Markov model-guided approaches. We concluded that these differences stem from appending a small number of fragments. For instance, if a model always replaces one fragment, such as a string literal, from the seed file, all generated JS tests will be executed without errors. \subsection{Field Tests}\label{ss:evalfield} We evaluated the capability of \sysname in finding real-world bugs. \textit{We have run \sysname for 1.5 months on the latest production versions of the four major engines:} \chakra, \jsc, \moz, and \veight. For this evaluation, we collected datasets from the repository of each JS engine at the version of February 3, 2019. We additionally collected 165 PoCs that triggered known CVEs as our dataset. Then, we trained the LSTM model for each JS engine. \sysname has found \ourbug unique bugs from the four major JS engines so far. Among the found bugs, 34 bugs were from \chakra. The remaining two and one bugs were from \jsc and \veight, respectively. We manually triaged each bug and reported all the found bugs to the vendors. In total, \emph{\fixbug of the reported bugs have been patched so far}. Especially, we reported three of the found bugs as security-related because they caused memory corruptions of the target JS engines. The three security bugs were discovered in \chakra 1.11.7, \chakra 1.12.0 (beta), and \jsc 2.23.3, respectively. Note that all of them got CVE IDs: CVE-2019-0860, CVE-2019-0923, and CVE-2019-8594. Particularly, we were rewarded for the bugs found in \chakra with a bounty of 5,000 USD. Our results demonstrate that \sysname is capable of finding \ourbug real-world JS engine bugs, including three security bugs. We further describe one of the real-world security bugs that \sysname found in \S\ref{ss:case3}. \subsection{Case Study}\label{ss:casestudy} To show how \sysname leverages the existing structure of the regression test, we introduce three bugs that \sysname found. We show two bugs that \sysname found in \chakra 1.4.1 from the experiment in \S\ref{ss:evalcmp}. We then describe one of the real-world security bugs found in the latest version of \chakra, which is already patched. Note that we minimized all test cases for ease of explanation. \subsubsection{CVE-2017-8729} \label{ss:case1} \begin{figure}[ht] \begin{lstlisting}[escapechar=$] (function () { for (var v0 in [{ $\label{line:bodystart}$ v1 = class {}, v2 = 2010 }.v2 = 20]) { $\label{line:patternend}$ for([] in { value: function() {}, writable: $\color{superdarkblue}{false}$ }){} } $\label{line:bodyend}$ })(); \end{lstlisting} \caption{A test code that triggers CVE-2017-8729 on \chakra 1.4.1.} \label{lst:case1} \end{figure} Figure~\ref{lst:case1} shows the minimized version of a generated test that triggers CVE-2017-8729 on \chakra 1.4.1. From its seed file, \sysname removed the body of \texttt{FunctionExpression} and composed a new subtree corresponding to Lines~\ref{line:bodystart}-\ref{line:bodyend}. Particularly, \sysname appended 54 fragments to generate the new test. \chakra is supposed to reject the generated test before its execution because it has a syntax error in the \texttt{ObjectPattern} corresponding to Lines~\ref{line:bodystart}-\ref{line:patternend}. However, assuming the \texttt{ObjectPattern} to be an \texttt{ObjectExpression}, \chakra successfully parses the test and incorrectly infers the type of the property \texttt{v2} to be a setter. Thus, the engine crashes with a segmentation fault when it calls the setter in Line~\ref{line:patternend}. Interestingly, the latest version of \chakra still executes this syntax-broken JS test without errors but does not crash. The original regression test checked the functionalities regarding a complicated \texttt{ObjectPattern}. Similarly, the generated test triggered a type confusion vulnerability while parsing the new \texttt{ObjectPattern}. Therefore, we believe that this case captures the design goal of \sysname, which leverages an existing regression test and puts it in a different execution context to find a potential bug. \subsubsection{CVE-2017-8656} \begin{figure}[ht] \begin{lstlisting}[escapechar=$] var v1 = { 'a': function () {} } var v2 = 'a'; (function () { try { } catch ([v0 = (v1[v2].__proto__(1, 'b'))]) { $\label{line:catch}$ var v0 = 4; $\label{line:decl}$ } v0++; $\label{line:crash}$ })(); \end{lstlisting} \caption{A test code that triggers CVE-2017-8656 on \chakra 1.4.1.} \label{lst:case2} \end{figure} Figure~\ref{lst:case2} shows a test case generated by \sysname that triggers CVE-2017-8656 on \chakra 1.4.1. Its seed file had a different \texttt{AssignmentExpression} as the parameter of a \texttt{CatchClause} in Line~\ref{line:catch}. From the seed AST, \sysname removed a subtree corresponding to the \texttt{AssignmentExpression} in Line~\ref{line:catch} and mutated it by appending eight fragments that the LSTM model suggested. In the generated code, the variable \texttt{v0} is first declared as the parameter of the \texttt{CatchClause} (Line~\ref{line:catch}) and then redeclared in its body (Line~\ref{line:decl}). At this point, the \chakra bytecode generator becomes confused with the scope of these two variables and incorrectly selects which one to initialize. Consequently, the variable \texttt{v0} in Line~\ref{line:decl} remains uninitialized. As the JS engine accesses the uninitialized symbol in Line~\ref{line:crash}, it crashes with a segmentation fault. We note that the seed JS test aimed to check possible scope confusions, and the generated code also elicits a new vulnerability while testing a functionality similar to the one its seed JS test checks. Hence, this test case fits the design objective of \sysname. \subsubsection{CVE-2019-0860} \label{ss:case3} \begin{figure}[ht] \begin{lstlisting}[escapechar=$] function f0(f, p = {}) { f.__proto__ = p; $\label{line:assignprop}$ f.arguments = 44; $\label{line:assignarg}$ f.arguments === 44; $\label{line:binop}$ } let v1 = new $\color{superdarkblue}{Proxy}$({}, {}); for (let v0 = 0; v0 < 1000; ++v0) { $\label{line:loop-start}$ f0(function () {'use strict';}, v1); f0(class C {}, v1); } $\label{line:loop-end}$ \end{lstlisting} \caption{A test code that triggers CVE-2019-0860 on \chakra 1.12.0 (beta).} \label{lst:case3} \vspace{-1.0em} \end{figure} Figure~\ref{lst:case3} describes a JS test triggering CVE-2019-0860 on \chakra 1.12.0 (beta), which we reported to the vendor. Its seed file had a \texttt{CallExpression} instead of the statements in Lines~\ref{line:assignarg}-\ref{line:binop}. From the seed JS test, \sysname removed a subtree corresponding to the \texttt{BlockStatement} of the function \texttt{f0} and appended 19 fragments to compose a new block of statements (Lines~\ref{line:assignprop}-\ref{line:binop}). Notably, \sysname revived the \texttt{AssignmentExpression} statement in Line~\ref{line:assignprop}, which is a required precondition to execute the two subsequent statements and trigger the security bug. The seed regression test was designed to test whether JS engines correctly handle referencing the \texttt{arguments} property of a function in the strict mode. For usual cases, JS engines do not allow such referencing; however, to place the execution context in an exceptional case, the seed JS test enables the access by adding a \texttt{Proxy} object to the prototype chain of the function \texttt{f} (Line~\ref{line:assignprop}). As a result, this new test is able to access and modify the property value without raising a type error (Line~\ref{line:assignarg}). While performing the JIT optimization process initiated by the \texttt{for} loop in Lines~\ref{line:loop-start}-\ref{line:loop-end}, \chakra misses a postprocessing step of the property in Line~\ref{line:assignarg}, thus enabling to write an arbitrary value on the memory. Consequently, the engine crashes with a segmentation fault as this property is accessed in Line~\ref{line:binop}. Note that the generated test case triggers a new vulnerability while vetting the same functionality that its seed tests. Moreover, the \texttt{GlobOpt.cpp} file, which is the most frequently patched file to fix CVEs assigned to \chakra, was patched to fix this vulnerability. Therefore, this JS test demonstrates that \sysname successfully discovers bugs that it aims to find. \section{Implementation} We implemented \sysname with 3K+ LoC in Python and JS. We used Esprima 4.0~\cite{esprima} and Escodegen 1.9.1~\cite{escodegen} for parsing and printing JS code, respectively. As both libraries work in the Node.js environment, we implemented an inter-process pipe channel between our fuzzer in Python and the libraries. We implemented the LSTM models with PyTorch 1.0.0~\cite{pytorch}, using the L2 regularization technique with a parameter of 0.0001. The stochastic gradient descent with a momentum factor of 0.9 served as an optimizer. We leveraged the Python subprocess module to execute JS engines and obtain their termination signals. We only considered JS test cases that crash with \texttt{SIGILL} and \texttt{SIGSEGV} meaningful because crashes with other termination signals are usually intended ones by developers. To support open science and further research, we publish \sysname at \url{https://github.com/WSP-LAB/Montage}. \section{Introduction} \label{s:intro} The memory safety of web browsers has emerged as a critical attack vector as they have become an integral part of everyday computing. Malicious websites, which conduct drive-by download attacks~\cite{adityad:bd-2016}, have typically exploited memory corruption vulnerabilities of web browsers. Currently, an exploitable memory corruption vulnerability for a browser can cost 100,000 USD and sell for a million dollars if it is chained with a kernel exploit to remotely jailbreak iOS~\cite{zerodium}. Among many components of web browsers, a JavaScript (JS) engine is of particular interest to attackers as its Turing-complete nature enables attackers to craft sophisticated exploits. One can easily allocate a series of heap chunks to perform heap spraying~\cite{sotirov:blackhat:2007}, write functions in JS to abstract away some exploitation logic~\cite{pwnjs}, and even bypass the mitigation used in modern web browsers~\cite{molinyawe:blackhat:2016}. According to the National Vulnerability Database (NVD), \percentCVE of the total vulnerabilities reported for Microsoft Edge and Google Chrome in 2017 were JS engine vulnerabilities. Despite the increasing attention, there has been relatively little academic research on analyzing JS engine vulnerabilities compared to other studies seeking to find them~\cite{holler:usec:2012, guo:2013, veggalam:esorics:2016}. LangFuzz~\cite{holler:usec:2012} combines code fragments extracted from JS seed files to generate JS test inputs. GramFuzz and IFuzzer employ more or less the same approach~\cite{guo:2013, veggalam:esorics:2016}, but IFuzzer uses evolutionary guidance to improve the fuzzing effectiveness with genetic programming based on the feedback obtained by executing a target JS engine with produced inputs. However, none of the existing approaches consider the relationship between code fragments for generating test inputs. In other words, they produce test inputs by simply combining fragments as long as JS grammars allow it. Thus, they do not determine which combination is likely to reveal vulnerabilities from the target JS engine. Are there any similar patterns between JS test inputs that trigger JS engine vulnerabilities? If so, can we leverage such patterns to drive fuzzers to find security vulnerabilities? These are the key questions that motivated our research. We performed a preliminary study on JS engine vulnerabilities and observed two patterns. We observed that \emph{a new security problem often arises from JS engine files that have been patched for a different bug.} We analyzed 50 CVEs assigned to \chakra, a JS engine used by Microsoft Edge. We found that \chakraGlobalOptPatchRate and \chakraJSArrayPatchRate of the vulnerabilities were related to \texttt{GlobOpt.cpp} and \texttt{JavascriptArray.cpp}, respectively. The second observation was that \emph{JS test code that triggers new security vulnerabilities is often composed of code fragments that already exist in regression tests.} We collected \chakraNumRegressionTests unique JS files from the \chakra regression test suite and \chakraNumPoC JS files that invoked the analyzed vulnerabilities. These two sets of files were disjoint. We sliced the AST of each JS file into AST subtrees of depth one, called \textit{fragments}. We then computed the number of overlapping fragments between the two sets; we found that \chakraAvgOverlapRate of the fragments extracted from the \chakraNumPoC vulnerability-triggering JS files overlapped with the fragments extracted from the regression test suite (see \S\ref{s:motive}). Given these two observations, how do we perform fuzz testing to find JS engine vulnerabilities? For this research question, we propose the first approach that leverages a \emph{neural network language model} (NNLM) to conduct fuzz testing on a target JS engine. Our key idea is to mutate a given regression JS test by replacing its partial code with new code that the NNLM creates. Consider a regression JS test that invokes a patched functionality. We generate a JS test from this regression test while expecting to elicit a new potential bug that resides in the patched JS engine files, thus addressing the first observation. We also assemble existing code from regression test suites under the guidance of the NNLM when composing new partial code. This captures the second observation. To manifest this idea, we designed and implemented \sysname, a system for finding security vulnerabilities in JS engines. The system starts by transforming the AST of each JS test from a given regression test suite into the sequence of fragments. These fragment sequences become training instances over which the NNLM is trained. Therefore, the NNLM learns the relationships between fragments. \sysname mutates a given JS test by reconstructing one of its subtrees as the trained NNLM guides. Previous research focused on learning the relationships between PDF objects~\cite{godefroid:ase:2017}, characters~\cite{cummins:issta:2018, liu:aaai:2019}, and lexical tokens in the source code~\cite{nguyen:fse:2013, hindle:icse:2012, raychev:pldi:2014}. These language models addressed completing incorrect or missing tokens~\cite{ tu:fse:2014, nguyen:fse:2013}, or assembling PDF objects~\cite{godefroid:ase:2017}. Their methods are not directly applicable to generating valid JS tests, which requires modeling structural control flows and semantic data dependencies among JS lexical tokens. Liu~\etal~\cite{liu:aaai:2019} stated their limitation in extracting general patterns from character-level training instances from C code, thus generating spurious tests. Unlike these previous studies~\cite{cummins:issta:2018, godefroid:ase:2017}, \sysname uses fragments as building blocks. Each fragment encapsulates the structural relationships among nodes within an AST unit tree. The model is then trained to learn the relationships between such AST unit trees. \sysname uses this model to assemble unit subtrees when mutating a given regression JS test. Thus, each generated JS test reflects the syntactic and semantic commonalities that exist in the regression test suite. We evaluated \sysname to find bugs in \chakra 1.4.1 and compared the number of found bugs against (1.2,0) circle (0.95)~\cite{han:ndss:2019}, \jsfunfuzz~\cite{funfuzz}, and \ifuzzer~\cite{veggalam:esorics:2016}. We performed five fuzzing campaigns; each round ran for 72 hours. \sysname found 133 bugs, including 15 security bugs. Among the found security bugs, \sysname reported 9, 12, and 12 bugs that (1.2,0) circle (0.95), \jsfunfuzz, and \ifuzzer did not find, respectively. This result demonstrates that \sysname is able to find bugs that the state-of-the-art JS fuzzers are unable to find. We measured the efficacy of the \sysname language model against the random selection method with no language model, Markov-chain model, and the character/token-level recurrent neural network language model. \sysname outperformed the other approaches in terms of finding unique bugs. We further tested \sysname to fuzz the latest versions of \chakra, \jsc, \moz, and \veight. \sysname found \ourbug unique bugs, including three security bugs. 34 bugs were found from \chakra. The remaining two and one bugs were from \jsc and \veight, respectively. Of these three security bugs, \sysname discovered one from \jsc and the other two from \chakra. These results demonstrate the effectiveness of leveraging NNLMs in finding real-world JS engine bugs. \section*{Acknowledgements} We thank anonymous reviewers for their helpful feedback and Yale Song who helped develop some of the ideas used in this paper. We are also grateful to Jihoon Kim for kindly sharing his findings, which indeed inspired our project. Finally, we thank Sunnyeo Park for collecting JS seeds used for the evaluation. This work was partly supported by (1) Institute for Information \& communications Technology Promotion (IITP) grant funded by the Korea government (MSIT), No.2018-0-00254, and (2) LIG Nex1. \input{auth.bbl} \end{document} \section{Motivation} \label{s:motive} Can we find similarities between JS files that trigger security vulnerabilities? We answer this question by conducting a quantitative study of analyzing reported CVEs and corresponding proof of concept (PoC) exploits for \chakra~\cite{chakra}. We chose \chakra because its GitHub repository maintains well-documented commit logs describing whether a specific CVE is patched by a commit. This helps us identify which security vulnerability is related to a given PoC exploit and which source lines are affected by the vulnerability. Other JS engines, in contrast, have not provided an exact mapping between a code commit and a CVE. Note that collecting PoC exploits is not straightforward because CVE reports typically do not carry any PoC exploits due to the potential risk of being abused. We manually collected CVEs as well as their PoC code from exploitDB, vulnerability blogs, and the \chakra GitHub repository. In total, we obtained 67 PoC exploits, each of which corresponds to a unique CVE. We further identified 50 of them where the corresponding vulnerabilities are fixed by a single commit. This means that we can map each of the 50 vulnerabilities to a set of affected source files. The earliest and the latest vulnerabilities in the collected set were patched in September 2016 and March 2018, respectively. In total, 77 files were patched owing to these vulnerabilities. We found that nine out of the 50 vulnerabilities (18\%) are related to the \texttt{GlobOpt.cpp} file, which mainly implements the just-in-time (JIT) compilation step. Seven of them (14\%) have also contributed to patching the \texttt{JavascriptArray.cpp} file. Note that each file implements different functionalities of \chakra. In other words, different JS engine vulnerabilities often arise from a common file that implements the same functionalities, such as JIT optimization and JS arrays. For example, a patch for CVE-2018-0776 forces a deep copy of an array when the array is accessed via the function \texttt{arguments} property within a callee, thus avoiding a type confusion vulnerability. However, the patch was incomplete, still leaving other ways in which a shallow copy of arrays could be caused. CVE-2018-0933 and CVE-2018-0934 were assigned to those bugs. Note that all the patches revised the \texttt{BoxStackInstance} function in the \texttt{JavascriptArray.cpp} file. Among the 77 patched files, 26 (33.8\%) files are patched at least twice due to the reported CVEs. These examples demonstrate that JS engine vulnerabilities often arise from files that were patched for other bugs. Considering that these patches are often checked with regression tests, mutating an existing JS test may trigger a new vulnerability whose root cause lies in the patched files that this test already covered. \vspace{0.5em} \noindent\fbox{% \parbox{0.98\columnwidth}{% \textbf{Observation 1.} JS engine vulnerabilities often arise from the same file patched for different bugs. }% } \vspace{0.4em} We also measured the syntactic similarity between JS code from the PoC exploits and \chakraNumRegressionTests JS files obtained from regression test suites maintained by \chakra. Note that a regression test suite consists of JS tests that trigger previously patched bugs and check expected outcomes with adversarial test input. In particular, we gathered the regression test files from the \chakra version released in August 2016, which is one month ahead of the patching date of the earliest vulnerability. Therefore, the regression test files were not affected by any of the studied vulnerabilities. \vspace{-1.0em} \begin{figure}[ht] \begin{lstlisting}[escapechar=$] var v0 = {}; for (var v1 = 0; v1 < 5; v1++) { v0[v1] = v1 + 5; $\label{line:example}$ } \end{lstlisting} \vspace{-1.0em} \caption{Example of a normalized JS file.} \label{lst:example} \vspace{-0.5em} \end{figure} To measure the similarity, we normalized the identifiers in the regression test files as well as the PoC exploits. Specifically, we renamed each identifier for variables and functions to have a sequential number and a common prefix as their name. We then parsed the normalized JS files down to ASTs. We extracted a set of unit subtrees with a depth of one from each AST. For a given AST, we extracted a unit subtree from each internal node. Thus, the number of extracted unit subtrees becomes the number of AST internal nodes. We call such a unit subtree a \textit{fragment}, as formally defined in \S\ref{s:design}. Note that the root node of each fragment is an internal node of the AST. It also corresponds to a leaf node in another fragment, except the fragment with the root node of the original AST. \begin{figure}[!t] \centering \includegraphics[width=0.98\columnwidth]{figs/motive_frag_example} \caption{Fragmentizing an AST from the example in Figure~\ref{lst:example}.} \label{fig:frag-overview} \vspace{-1.0em} \end{figure} Figure~\ref{fig:frag-overview} illustrates the fragmentation results for a JS file listed in Figure~\ref{lst:example}. The upper side of the figure shows an AST subtree obtained from the Esprima JS parser~\cite{esprima}. This subtree corresponds to Line~\ref{line:example}. The bottom of the figure presents fragments from this subtree. We also divided each PoC that triggers a CVE into fragments and then counted how many fragments existed in the regression test suites. Figure~\ref{fig:motive} depicts the number of PoC files whose common fragment percentage is over each percentage threshold. We found that all the fragments (100\%) from 10 PoC exploits already existed in the regression test files. More than 96\% of the fragments in the 42 PoC exploits and 90\% of the fragments in the 63 PoC exploits existed in the regression test as well. On average, \chakraAvgOverlapRate of the fragments from the PoC exploits were found in the regression test files. \vspace{0.5em} \noindent\fbox{% \parbox{0.98\columnwidth}{% \textbf{Observation 2.} More than 95\% of the fragments syntactically overlap between the regression tests and the PoC exploits. }% } \vspace{0.4em} Both observations imply that it is likely to trigger a new security vulnerability by assembling code fragments from existing regression test suites, which is the primary motivation for this study, as we describe in \S\ref{sec:mljs-overview}. \begin{figure}[tb] \centering \includegraphics[width=1\linewidth]{graphs/motive_frag_cdf} \caption{ The number of all PoC files whose common fragment percentages are greater than varying percentages. } \label{fig:motive} \vspace{-1.0em} \end{figure} \section{Overview} \label{sec:mljs-overview} We present \sysname, an NNLM-driven fuzzer, which automatically finds bugs in JS engines. Recall that the overall design of \sysname is driven by two observations: (1) security bugs often arise from files that were previously patched for different causes, and (2) the JS test code that triggers security-related bugs heavily reuses AST fragments found in the existing regression test sets. We propose a novel fuzzing technique that captures these observations. We train an NNLM to capture the syntactic and semantic relationships among fragments from the regression test sets. When generating a new JS test, \sysname mutates the AST of a given JS regression test. It replaces a subtree of the AST with a new subtree, using the trained NNLM. Thus, each generated test stems from a given regression test that checks previously patched or buggy logic, thereby, capturing the first observation. At the same time, it invokes functionalities in different execution contexts by assembling existing fragments under the guidance of the NNLM, which addresses the second observation. Figure~\ref{fig:detailed-overview} shows the overall workflow of \sysname. Phase I prepares the training instances from given regression test suites. Each training instance is a sequence of AST unit subtrees, called \textit{fragments}. Phase II trains an NNLM that learns compositional relationships among fragments. These two phases are one-time setup procedures. Phase III generates JS tests by leveraging the trained model. \begin{figure}[ht] \centering \includegraphics[width=0.98\columnwidth]{figs/overview} \caption{Overview of \sysname.} \label{fig:detailed-overview} \vspace{-0.5em} \end{figure} Phase I begins with a given training set of JS regression test files. It parses each JS file into an AST and normalizes identifiers that appeared in the AST to deduplicate function and variable names. Figure~\ref{lst:example} shows a normalized JS file example. Each appeared variable name is changed into a common name, such as \texttt{v0} or \texttt{v1}. From a normalized AST tree, Phase I then extracts multiple unit subtrees, each of which is called a \textit{fragment}. For each node in the AST, \sysname recursively slices a unit subtree of depth one. Each of the sliced subtrees becomes a fragment of the AST. It then emits the sequence of these fragments, produced by the pre-order traversal of their root nodes in the normalized AST tree. Phase II trains the NNLM given a set of fragment sequences. From a given fragment sequence of an arbitrary length, we design the NNLM to suggest the next fragments, which are likely to appear after this fragment sequence. This framing is a key contribution of this paper. Note that it is not straightforward to model the inherent structural relationships of an AST in such a way that a language model can learn. By leveraging the fragments encapsulating the structural relationships of ASTs, we encode a given AST into fragment sequences. Considering that a vast volume of natural language NNLMs have been trained upon word sequences, this fragment sequencing eases the application of existing prevailing NNLMs for generating JS tests. Here, the objective is to train the NNLM to learn compositional relationships among fragments so that the JS test code generated from the trained model reflects the syntax and semantics of the given training set, which is the regression testing set of JS engines. Phase III generates a new JS test by leveraging the trained model and the AST of a regression test. Given a set of ASTs from regression test suites, it randomly picks a seed AST. Then, it randomly selects a subtree for \sysname to replace. When generating a new subtree, \sysname considers a \textit{context}, the sequence of all fragments that precedes the selected subtree. \sysname iteratively appends fragments from the root node of the selected subtree while considering its context. Because the current AST is assembled from fragments, it is expected that some variables and function identifiers in the AST nodes are used without proper declarations. \sysname, thus, resolves possible reference errors by renaming them with the declared identifiers. Finally, \sysname checks the generated test and reports a bug if the code crashes the target JS engine. \noindent\textbf{Other model guided approaches.} Previous studies presented language models, which can predict the lexical code tokens in source code. Such framing of language models has been vastly studied while addressing code completion problems~\cite{ tu:fse:2014,nguyen:fse:2013}. However, the generation of an executable test is more challenging than the code completion problem that predicts a limited number of semantically correct lexical tokens. To our knowledge, the PDF fuzzer proposed by Singh~\etal~\cite{godefroid:ase:2017} is the first system that employs a character-level RNN model to generate PDF tests. We evaluated whether our fragment-based approach performs better than the character-level RNN model approach in finding JS engine bugs (see \S\ref{ss:model-effectiveness}). \section{Related Work} \noindent \textbf{Fuzzing.} There have been a vast volume of research on generation-based fuzzing. Highly-structured file fuzzing~\cite{godefroid:pldi:2008,pham:ase:2016}, protocol fuzzing~\cite{ruiter:usec:2015, somorovsky:ccs:2016}, kernel fuzzing~\cite{syzkaller,trinity,han:ccs:2017}, and interpreter fuzzing~\cite{funfuzz, wang:oakland:2017, dewey:ase:2014, patra:2016, aschermann:ndss:2017, blaz:usec:2019} are representative research examples. IMF infers the model of sequential kernel API calls to fuzz macOS kernels~\cite{han:ccs:2017}. Dewey~\etal~\cite{dewey:ase:2014} generated code with specified combinations of syntactic features and semantic behaviors by constraint logic programming. Godefroid~\etal~\cite{godefroid:ase:2017} trained a language model from a large number of PDF files and let the model learn the relations between objects constituting the PDF files. Their approach of using a language model in generating tests is similar to ours \emph{per se}, but their approach is not directly applicable to generating JS tests, which demands modeling complicated control and data dependencies. Cummins~\etal~\cite{cummins:issta:2018} also proposed a similar approach. They trained an LSTM language model from a large corpus of OpenCL code. Unlike \sysname, they trained the model at a character/token-level, which does not consider the compositional relations among the AST subtrees. TreeFuzz~\cite{patra:2016} is another model-based fuzzer. Its model is built on the frequencies of co-occurring nodes and edges from given AST examples. Their modeling of generating tests is not directly applicable to the prevalent state-of-the-art language models, tailored to train word sequences, not node and edge relations in ASTs. Aschermann~\etal~\cite{aschermann:ndss:2017} and Blazytko~\etal~\cite{blaz:usec:2019} recently proposed \nautilus and \grimoire, respectively. Both fuzzers test programs that take highly structured inputs by leveraging code coverage. Based on a given grammar, \nautilus generates a new JS test and checks whether it hits new code coverage for further mutation chances. Contrary to \nautilus, \grimoire requires no user-provided components, such as grammar specification and language models, but synthesizes inputs that trigger new code coverage. As they stated, \grimoire has difficulties in generating inputs with complex structures, requiring semantic information. Previous studies of mutational fuzzing~\cite{aflfuzz, woo:ccs:2013, rebert:usec:2014, cha:oakland:2015,holler:usec:2012,guo:2013, veggalam:esorics:2016, liu:aaai:2019} focus on altering given seeds to leverage functionalities that the seeds already test. LangFuzz~\cite{holler:usec:2012} is a mutational fuzzing tool that substitutes a non-terminal node in a given AST with code fragments. It iteratively replaces non-terminal nodes in the step of inserting fragments. However, LangFuzz does not consider any context regarding picking a promising candidate to cause a target JS engine crash. On the other hand, \sysname is capable of learning implicit relations between fragments that may be inherent in given examples. Liu~\etal~\cite{liu:aaai:2019} proposed a mutation-based approach to fuzz the target program. Given a large corpus of C code, they trained a sequence-to-sequence model to capture the inherent pattern of input at character-level. Then, they leveraged the trained model to mutate the seed. Their approach suffers from the limitation that the model generates many malformed tests, such as unbalanced parenthesis. \noindent \textbf{Language model for code.} Hindle~\etal~\cite{hindle:icse:2012} measured the naturalness of software by computing the cross-entropy values over lexical code tokens in large JAVA and C applications. They also first demonstrated even count-based n-gram language models are applicable to code completion. To make more accurate suggestions for code completion, SLAMC~\cite{nguyen:fse:2013} incorporated semantic information, including type, scope, and role for each lexical token. SLANG~\cite{raychev:pldi:2014} lets a model learn API call sequences from Android applications. It then uses such a model to improve the precision of code completion. GraLan learns the relations between API calls from the graph of API call sequences, and ASTLan uses GraLan to fill holes in the AST to complete the code~\cite{nguyen:icse:2015}. Maddison~\etal~\cite{maddison:icml:2014} studied the generative models of natural source code based on PCFGs and source code-specific structures. Bielik~\etal~\cite{bielik:icml:2016} suggested a new generative probabilistic model of code called a probabilistic higher order grammar, which generalizes PCFGs and parameterizes the production rules on a context. The objective of using a language model in all of the above works is to make better suggestions for code completion. However, \sysname focuses on generating JS tests that should be accepted by a target JS engine.
\section{Introduction} Deuterated molecules are very useful tracers of dense molecular cloud cores, which are direct progenitors of new stars. This is because at the high gas densities ($\sim10^5-10^6$~cm$^{-3}$) and low temperatures ($\sim10$~K) of the interiors of such cloud cores, many observable molecules (e.g. CO) freeze-out onto dust grains, which lowers their gas-phase abundance, rendering them unobservable (see e.g. \cite{bergin2007} for a review). An important exception is the trihydrogen cation, H$_3^+$, and its isotopologic forms (e.g. \cite{walmsley2004}). However, because of their symmetry, H$_3^+$ and D$_3^+$ do not posses a permanent electric dipole moment, and are therefore not observable in the conditions of dense cores. On the other hand, as asymmetric species, both H$_2$D$^+$ and D$_2$H$^+$ have dipole moments, and therefore exhibit rotational transitions that produce observable photons from dense cores. The origin of H$_2$D$^+$, and deuterium fractionation in general, lies in the exothermic reaction \begin{equation} \label{eqn:deut} {\rm H_3^+}+{\rm HD}\rightleftharpoons {\rm H_2D^+} + {\rm H_2} + \Delta E\,, \end{equation} where $\Delta E = 232$~K when the species lie in their lowest energy (ground) states (e.g. \cite{dalgarno1984}; \cite{gerlich2002}; \cite{sipila2017}). Following the first unsuccessful attempts to detect H$_2$D$^+$ in the interstellar medium (ISM; \cite{angerhofer1978}; \cite{phillips1985}; \cite{pagani1992}; \cite{vandishoeck992}), the astronomical detectability of H$_2$D$^+$ was finally demonstrated for the first time about 20~yr ago by Stark et al. (1999) who detected the \textit{ortho}-H$_2$D$^+(J_{K_a,\,K_c}=1_{1,\,0}-1_{1,\,1})$ line at 372~GHz towards the low-mass star-forming core NGC~1333 IRAS~4A. So far, \textit{o}-H$_2$D$^+$ has only been detected towards approximately 15 different low-mass dense cores (e.g. \cite{harju2008}; \cite{caselli2008}; \cite{friesen2010}, 2014) and a few high-mass star-forming regions (\cite{swift2009}; \cite{pillai2012}; \cite{giannetti2019}). Reaching a better understanding of H$_2$D$^+$-based deuterium chemistry in dense cores at different evolutionary stages (e.g. starless cores vs. protostellar cores) requires a more homogeneous H$_2$D$^+$ survey of dense cores in a common parent molecular cloud than those published so far. With such data, the potential role played by the different initial chemical conditions and distance (that is angular resolution) effects could be (largely) eliminated, which in turn is expected to yield more comparable results between dense cores of different ages. Motivated by this possibility, we used the Atacama Pathfinder EXperiment (APEX\footnote{\url{http://www.apex-telescope.org/}}; \cite{gusten2006}) telescope to carry out an \textit{o}-H$_2$D$^+(1_{1,\,0}-1_{1,\,1})$ survey towards six dense cores (three prestellar cores and three protostellar cores) in the Orion~B9 star-forming region. Miettinen et al. (2009) mapped the Orion~B9 region at $\lambda=870$~$\mu$m using the Large APEX BOlometer CAmera (LABOCA; \cite{siringo2009}) on APEX. These latter authors identified 12 dense cores in total, of which 6 were found to be associated with \textit{Spitzer} 24~$\mu$m sources, and were therefore deemed protostellar. The remaining cores have no mid-infrared counterparts and are likely starless. We note that of the present target sources, four (SMM~1, 3, 6, and 7) were first uncovered by our LABOCA mapping (of which only SMM~3 has a 24~$\mu$m counterpart). The remaining two sources included in the present study, IRAS~05399-0121 and IRAS~05405-0117 (hereafter, IRAS~05399 and IRAS~05405), are associated with infrared point sources that were previously identified with the \textit{Infrared Astronomical Satellite} (\textit{IRAS}; \cite{neugebauer1984}). The physical and chemical properties of the Orion~B9 cores (e.g. the NH$_3$-based gas kinetic temperature ($T_{\rm kin}$), CO depletion factor ($f_{\rm D}({\rm CO})$), and the level of N$_2$H$^+$ deuteration, i.e. the $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ ratio) were further characterised by Miettinen et al. (2010, 2012) through Effelsberg and APEX molecular line observations. Miettinen et al. (2010) used a virial parameter analysis to examine whether the starless cores in the region are gravitationally bound ($\alpha_{\rm vir} <2$), and therefore prestellar in nature. On the basis of this, all the starless cores in the present sample can be considered prestellar. Miettinen et al. (2012) imaged the Orion~B9 region at $\lambda=350$~$\mu$m using the Submillimetre APEX BOlometer CAmera (SABOCA; \cite{siringo2010}). The 350~$\mu$m imaging revealed that some of the Orion~B9 cores (e.g. SMM~3 and SMM~6) host two or more subfragments (see also \cite{miettinen2013a},b). As part of the Orion~B (L1630) molecular cloud, Orion~B9 was mapped with \textit{Herschel} (\cite{pilbratt2010}) in the \textit{Herschel} Gould Belt Survey (HGBS; \cite{andre2010})\footnote{The HGBS is a \textit{Herschel} key programme jointly carried out by SPIRE Specialist Astronomy Group 3 (SAG 3), scientists of several institutes in the PACS Consortium (CEA Saclay, INAF-IFSI Rome and INAF-Arcetri, KU Leuven, MPIA Heidelberg), and scientists of the \textit{Herschel} Science Center (HSC). For more details, see \url{http://gouldbelt-herschel.cea.fr}.}. The \textit{Herschel} images revealed that Orion~B9 is actually a filamentary system in which the present target cores appear to be embedded. Miettinen (2012) found that there is a sharp velocity gradient in the parent filament (across its short axis), and suggested that it might be a manifestation of a shock front, resulting from the feedback from the expanding \ion{H}{II} region and OB cluster NGC~2024 that lies about 4~pc to the southwest of Orion~B9. Ohama et al. (2017), who mapped the NGC~2024 region in $^{13}$CO$(J=2-1)$, found that NGC~2024 is comprised of two velocity components (at 9.5~km~s$^{-1}$ and 11.5~km~s$^{-1}$). The authors suggested that collision between two clouds has triggered the formation of stars in NGC~2024, with a collision timescale of $2 \times 10^5$~yr. The systemic radial velocity of the lower velocity component (9.5~km~s$^{-1}$) is consistent with that of Orion~B9 ($\sim9$~km~s$^{-1}$), which suggests that the clouds lie at the same distance from the Sun. It is therefore possible that the formation of dense cores and stars in Orion~B9 (or even that of the whole filament) was triggered by external positive feedback from NGC~2024. However, further studies are required to test this hypothesis. Nevertheless, Orion~B, which is located within the Barnard's Loop, is known to be affected by radiation and winds from massive OB stars (e.g. \cite{cowie1979}; \cite{bally2008} for a review; \cite{schneider2013}). This further strengthens the hypothesis that the Orion~B9 filament is indeed located in a dynamic environment where triggered star formation is plausible. We note that Harju et al. (2006) already used APEX to search for \textit{o}-H$_2$D$^+(1_{1,\,0}-1_{1,\,1})$ emission towards three selected positions near and around IRAS~05405 (the N$_2$H$^+(1-0)$ peaks found by Caselli \& Myers (1994)), but the target positions were offset from the submillimetre dust continuum peaks that we later uncovered, rendering the line detections fairly weak ($\lesssim 3.7\sigma$). Caselli et al. (2008) also searched for \textit{o}-H$_2$D$^+(1_{1,\,0}-1_{1,\,1})$ emission towards a position near ($10\farcs4$ offset) to one of those observed by Harju et al. (2006), but no line was detected. In this paper, we present the results of our 372~GHz \textit{o}-H$_2$D$^+$ observations towards dense cores in Orion~B9. The observations and data reduction are described in Sect.~2. The analysis and its results are presented in Sect.~3. In Sect.~4, we discuss the results, and in Sect.~5 we summarise our results and present our main conclusions. Throughout this paper we adopt a distance of $d=420$~pc to Orion~B9, which is consistent with the most recent distance measurement for NGC~2024 (\cite{kounkel2017}). \section{Source sample, observations, and data reduction} The target sample of the present study consists of the Orion~B9 prestellar cores SMM~1, 6, and 7, and the protostellar cores IRAS~05399, IRAS~05405, and SMM~3. Besides spanning different early evolutionary stages, these six sources were selected for this study because their spatial distribution covers different parts of the Orion~B9 region (see Fig.~\ref{figure:map}). The source list is given in Table~1. The SABOCA 350~$\mu$m peak positions of the aforementioned target sources were observed with the 12 m APEX telescope at the frequency of the \textit{o}-H$_2$D$^+(1_{1,\,0}-1_{1,\,1})$ transition, that is $\nu=372.42135580$~GHz (Cologne Database for Molecular Spectroscopy (CDMS\footnote{\url{http://www.astro.uni-koeln.de/cdms}}; \cite{muller2005})). The observations were carried out on 27-30 August and 15-16 December 2019, and the amount of precipitable water vapour (PWV) during the observations was measured to be between 0.3~mm and 1~mm, which corresponds to a zenith atmospheric transmission range of about 75--43\% at the observed frequency\footnote{The APEX atmospheric transmission calculator is available at \url{http://www.apex-telescope.org/sites/chajnantor/atmosphere/transpwv/}.}. As a front end we used the Large APEX sub-Millimetre Array (LAsMA), which is a seven-pixel sideband separating (2SB) heterodyne array receiver that can be tuned within a frequency range of 273--374~GHz (\cite{gusten2008}). The backend was a Fast Fourier Transform fourth-Generation spectrometer (FFTS4G) that consists of two sidebands. Each sideband has two spectral windows of 4~GHz bandwidth, which provides both orthogonal polarisations and leads to a total bandwidth of 8~GHz. The \textit{o}-H$_2$D$^+$ line was tuned in the upper sideband (USB). The 65\,536 channels of the spectrometer yielded a spectral resolution of 61~kHz, which corresponds to 49~m~s$^{-1}$ at the observed frequency. The beam size (half-power beam width or HPBW) at the observed frequency is $16\farcs8$, which corresponds to a physical resolution of 0.034~pc. The observations were performed in the wobbler-switching mode with a $50\arcsec$ azimuthal throw between two positions on sky (symmetric offsets), and a chopping rate of $R = 0.5$~Hz. The total on-source integration time (excluding overheads) was about 18--46~min depending on the source. The telescope focus and pointing were optimised and checked at regular intervals on the planet Uranus, the variable star \textit{o}-Ceti, the asymptotic giant branch star R Doradus, and the carbon stars W Orionis and R Leporis. The pointing was found to be accurate to $\sim3\arcsec$. The system temperatures during the observations were in the range $T_{\rm sys}\simeq 326-465$~K. Calibration was made by means of the chopper-wheel technique, and the output intensity scale given by the system is the antenna temperature corrected for the atmospheric attenuation ($T_{\rm A}^{\star}$). The observed intensities were converted to the main-beam brightness temperature scale by $T_{\rm MB}=T_{\rm A}^{\star}/\eta_{\rm MB}$, where $\eta_{\rm MB}$ is the main-beam efficiency. The value of $\eta_{\rm MB}$ at the observed frequency was calculated as follows. The aperture efficiency at the central frequency of LAsMA ($\eta_{\rm a}=0.59$ when estimated from observations towards Jupiter) was first scaled to that at the observed frequency using the Ruze formula (\cite{ruze1952}), and then converted to the value of $\eta_{\rm MB}$ using the approximation formula $\eta_{\rm MB}\simeq1.2182 \times \eta_{\rm a}$. This yielded the values $\eta_{\rm a}=0.58$ and $\eta_{\rm MB}=0.71$.\footnote{The APEX antenna efficiences can be found at \url{ http://www.apex-telescope.org/telescope/efficiency/index.php}.} The absolute calibration uncertainty was estimated to be about 10\% (e.g. \cite{dumke2010}). The spectra were reduced using the Continuum and Line Analysis Single-dish Software ({\tt CLASS90}) program of the GILDAS software package\footnote{Grenoble Image and Line Data Analysis Software (GILDAS) is provided and actively developed by Institut de Radioastronomie Millim\'etrique (IRAM), and is available at \url{http://www.iram.fr/IRAMFR/GILDAS}.} (version mar19b). The individual spectra were averaged with weights proportional to the integration time, divided by the square of the system temperature ($w_i \propto t_{\rm int}/T_{\rm sys}^2$). The resulting spectra were smoothed using the Hann window function to a velocity resolution of 98~m~s$^{-1}$ to improve the signal-to-noise ratio. Linear (first-order) baselines were determined from the velocity ranges free of spectral line features, and then subtracted from the spectra. The resulting $1\sigma$ rms noise levels at the 98~m~s$^{-1}$ velocity resolution were 28--33~mK on a $T_{\rm MB}$ scale. The observational parameters are provided in Table~\ref{table:observations}. In Table~\ref{table:lines}, we summarise all the spectral line observations that were employed in the present study. In addition to the newly detected spectral lines, we also used spectral line data from Miettinen et al. (2010, 2012), Miettinen \& Offner (2013b), and Miettinen (2016). \begin{figure*}[!htb] \begin{center} \includegraphics[scale=0.75]{Figures/map.eps} \vspace*{-10mm} \caption{\textit{Herschel}/SPIRE (Spectral and Photometric Imaging REceiver) 250~$\mu$m image towards Orion B9. The image is displayed using a non-linear (arcsinh) stretch, which allows us to better see the faint, extended dust emission. The overlaid contours represent the LABOCA 870~$\mu$m emission (\cite{miettinen2009}); the contours start at $3\sigma$, and increase in steps of $3\sigma$, where $3\sigma=90$~mJy~beam$^{-1}$. The circles indicate the target positions of the present \textit{o}-H$_2$D$^+$ observations (i.e. SABOCA 350~$\mu$m emission peaks of the cores (\cite{miettinenetal2012}; \cite{miettinen2013a})), and the circle size corresponds to the beam size of these observations ($16\farcs8$ HPBW). The white plus signs show the target positions of the spectral line observations from Miettinen et al. (2010, 2012), while the white crosses show the \textit{o}-H$_2$D$^+$ target positions observed by Harju et al. (2006). The black plus symbol marks the position from which Caselli et al. (2008) searched for \textit{o}-H$_2$D$^+$ emission. A scale bar of 0.1~pc projected length is shown in the bottom right corner.} \label{figure:map} \end{center} \end{figure*} \begin{table}[H] \renewcommand{\footnoterule}{} \caption{Source sample.} {\small \begin{minipage}{1\columnwidth} \centering \label{table:sources} \begin{tabular}{c c c c c} \hline\hline Source & $\alpha_{2000.0}$ & $\delta_{2000.0}$ & $\Delta_{\rm line}$ & Type\\ & [h:m:s] & [$\degr$:$\arcmin$:$\arcsec$] & [$\arcsec$] & \\ \hline IRAS 05399-0121 & 05 42 27.7 & -01 20 00.4 & 11.3 & Class 0/I \\ SMM 1 & 05 42 30.9 & -01 20 45.4 & 6.0 & prestellar \\ SMM 3 & 05 42 45.3 & -01 16 16.0 & 18.7 & Class 0 \\ IRAS 05405-0117 & 05 43 03.0 & -01 16 31.0 & 11.0 & Class 0 \\ SMM 6 & 05 43 05.0 & -01 18 49.3 & 11.4 & prestellar \\ SMM 7 & 05 43 22.7 & -01 13 55.0 & 12.7 & prestellar \\ \hline \end{tabular} \tablefoot{The coordinates refer to the SABOCA 350~$\mu$m peak positions of the sources (\cite{miettinenetal2012}; \cite{miettinen2013a},b). The angular offset, $\Delta_{\rm line}$, refers to the distance from these SABOCA peaks to the target positions observed by Miettinen et. al (2010, 2012). The references to the evolutionary stages of the sources are Miettinen et al. (2009, 2010, 2012), Miettinen \& Offner (2013a), and Miettinen (2016).} \end{minipage} } \end{table} \begin{table}[H] \renewcommand{\footnoterule}{} \caption{Observational parameters.} {\normalsize \begin{minipage}{1\columnwidth} \centering \label{table:observations} \begin{tabular}{c c c c c} \hline\hline Source & $t_{\rm ON}$ & PWV & $T_{\rm sys}$\tablefootmark{a} & $1\sigma$ rms\tablefootmark{a} \\ & [min] & [mm] & [K] & [mK] \\ \hline IRAS 05399-0121 & 46.4 & 0.6-1.0 & 655 & 28 \\ SMM 1 & 32.1 & 0.6-1.0 & 600 & 33 \\ SMM 3 & 22.4 & 0.3-1.0 & 581 & 33 \\ IRAS 05405-0117 & 38.4 & 0.4-1.0 & 605 & 28\\ SMM 6 & 17.6 & 0.4-1.0 & 459 & 29 \\ SMM 7 & 20.8 & 0.4-1.0 & 468 & 29 \\ \hline \end{tabular} \tablefoot{\tablefoottext{a}{The system temperature and $1\sigma$ rms noise level are given in the main-beam brightness temperature scale.}} \end{minipage} } \end{table} \begin{table*} \caption{Spectral line transitions employed in the present study.} \begin{minipage}{2\columnwidth} \centering \renewcommand{\footnoterule}{} \label{table:lines} \begin{tabular}{c c c c c c c} \hline\hline Transition & $\nu$ & \multicolumn{2}{c}{HPBW} & \multicolumn{2}{c}{$\Delta_{\rm o-H_2D^+}$\tablefootmark{a}} & Reference \\ & [MHz] & [$\arcsec$] & [pc] & [$\arcsec$] & [pc] & \\ \hline \textit{o}-H$_2$D$^+(1_{1,\,0}-1_{1,\,1})$ & 372\,421.35580 & 16.8 & 0.034 & 0 & 0 & This work\\ N$_2$H$^+(4-3)$ & 372\,672.526 & 16.7 & 0.034 & 0 & 0 & This work\\ DCO$^+(5-4)$ & 360\,169.7771 & 17.3 & 0.035 & 0 & 0 & This work\\ C$^{18}$O$(2-1)$ & 219\,560.3568 & 28.4 & 0.058 & 2.2 & 0.004 & \cite{miettinen2016}\tablefootmark{b}\\ C$^{17}$O$(2-1)$ & 224\,714.199 & 27.8 & 0.057 & 0 & 0 & \cite{miettinen2013b}\tablefootmark{c}\\ & \ldots & \ldots & \ldots & 6.0-18.7 & 0.012-0.038 & \cite{miettinenetal2012}\\ N$_2$D$^+(3-2)$ & 231\,321.912 & 27.0 & 0.055 & 0 & 0 & \cite{miettinen2013b}\tablefootmark{c}\\ & \ldots & \ldots & \ldots & 6.0-18.7 & 0.012-0.038 & \cite{miettinenetal2012}\\ \textit{p}-NH$_3(1,\,1)$ & 23\,694.4955 & 40 & 0.081 & 6.0-18.7 & 0.012-0.038 & \cite{miettinen2010}\\ \textit{p}-NH$_3(2,\,2)$ & 23\,722.6333 & 40 & 0.081 & 6.0-18.7 & 0.012-0.038 & \cite{miettinen2010}\\ \hline \end{tabular} \tablefoot{\tablefoottext{a}{Offset with respect to the present \textit{o}-H$_2$D$^+$ target positions. When this offset is different for different target source, a range of values is quoted (cf.~Table~\ref{table:sources}).}\tablefoottext{b}{The C$^{18}$O$(2-1)$ line was observed only towards SMM~3.}\tablefoottext{c}{Miettinen \& Offner (2013b) studied the prestellar core SMM~6 (their source SMM~6a corresponds to the present target position).}} \end{minipage} \end{table*} \section{Analysis and results} \subsection{Spectral line analysis} The \textit{o}-H$_2$D$^+(1_{1,\,0}-1_{1,\,1})$ spectra are shown in Fig.~\ref{figure:spectra}. The detected lines were fitted by single Gaussian functions using {\tt CLASS90}. The obtained line parameters are listed in Table~\ref{table:parameters}. In addition to the formal $1\sigma$ fitting errors output by {\tt CLASS90}, the errors in the peak intensity ($T_{\rm MB}$) and the integrated intensity of the line ($\int T_{\rm MB} {\rm d}v$) also include the 10\% calibration uncertainty, which were added in quadrature. The observed frequency bands revealed the presence of two additional spectral lines towards the target sources. The N$_2$H$^+(4-3)$ line at 372\,672.526~GHz in the USB was detected towards four target sources, while DCO$^+(5-4)$ at 360\,169.7771 GHz in the lower sideband (LSB) was detected in all of our target sources (see the second and third row in Table~\ref{table:lines}). These additional line detections and their analysis are presented in more detail in Appendix~A. \begin{figure*}[!htb] \begin{center} \includegraphics[width=0.33\textwidth]{Figures/smm1.eps} \includegraphics[width=0.33\textwidth]{Figures/smm6.eps} \includegraphics[width=0.33\textwidth]{Figures/smm7.eps} \includegraphics[width=0.33\textwidth]{Figures/I05399.eps} \includegraphics[width=0.33\textwidth]{Figures/smm3.eps} \includegraphics[width=0.33\textwidth]{Figures/I05405.eps} \caption{APEX \textit{o}-H$_2$D$^+(1_{1,\,0}-1_{1,\,1})$ spectra towards the prestellar cores (\textit{top row}) and protostellar cores (\textit{bottom row}) in our sample. Gaussian fits to the lines are overlaid in green. While the velocity range shown in each panel is the same, the intensity range is different to better show the line profiles.} \label{figure:spectra} \end{center} \end{figure*} \begin{table*} \caption{\textit{o}-H$_2$D$^+(1_{1,\,0}-1_{1,\,1})$ spectral line parameters.} \begin{minipage}{2\columnwidth} \centering \renewcommand{\footnoterule}{} \label{table:parameters} \begin{tabular}{c c c c c c c} \hline\hline Source & $v_{\rm LSR}$ & $\Delta v_{\rm LSR}$ & $T_{\rm MB}$ & $\int T_{\rm MB} {\rm d}v$ & $\tau$\tablefootmark{a} & $T_{\rm ex}$\tablefootmark{b}\\ & [km s$^{-1}$] & [km s$^{-1}$] & [K] & [K km s$^{-1}$] & & [K] \\ \hline IRAS 05399-0121 & \ldots & \ldots & $<0.09$\tablefootmark{c} & $<0.07$\tablefootmark{d} & $<0.02$ & $13.5\pm1.6$\\ [1ex] SMM 1 & $9.20\pm0.02$ & $0.70\pm0.04$ & $0.34\pm0.05$ & $0.25\pm0.03$ & $0.07\pm0.01$ & $11.9\pm0.9$ \\ [1ex] SMM 3 & $8.47\pm0.02$ & $0.74\pm0.03$ & $0.40\pm0.05$ & $0.32\pm0.03$ & $0.09\pm0.01$ & $11.3\pm0.8$ \\ [1ex] IRAS 05405-0117 & \ldots & \ldots & $<0.09$\tablefootmark{c} & $<0.07$\tablefootmark{d} & $<0.02$ & $11.3\pm0.6$ \\ [1ex] SMM 6 & $9.38\pm0.01$ & $0.48\pm0.01$ & $0.74\pm0.08$ & $0.38\pm0.04$ & $0.19\pm0.02$ & $11.0\pm0.4$ \\ [1ex] SMM 7 & $3.56\pm0.02$ & $0.60\pm0.04$ & $0.28\pm0.04$ & $0.18\pm0.02$ & $0.09\pm0.03$ & $9.4\pm1.1$\\ [1ex] \hline \end{tabular} \tablefoot{Columns (2)--(5) give the local standard of rest (LSR) radial velocity ($v_{\rm LSR}$), full width at half maximum (FWHM; $\Delta v$), peak intensity ($T_{\rm MB}$), and the integrated intensity of the line ($\int T_{\rm MB} {\rm d}v$).\tablefoottext{a}{Peak optical thickness calculated using $T_{\rm ex}$ from the last column.}\tablefoottext{b}{The value of $T_{\rm ex}$ was assumed to be equal to $T_{\rm kin}({\rm NH_3})$ (\cite{miettinen2010}).}\tablefoottext{c}{A $3\sigma$ upper limit is placed for the non-detections.}\tablefoottext{d}{The integrated intensity upper limit for these protostellar cores was estimated as the intensity upper limit ($<0.09$~K) times the detected linewidth in the Class~0 object SMM~3 (0.74~km~s$^{-1}$).} } \end{minipage} \end{table*} \subsection{Molecular column densities and fractional abundances} The beam-averaged \textit{o}-H$_2$D$^+$ column densities were calculated by using the standard, local thermodynamic equilibrium (LTE)-based formula, \begin{equation} \label{eqn:CD} N=\frac{3h \epsilon_0}{2\pi^2}\frac{1}{\mu^2S}\frac{Z_{\rm rot}(T_{\rm ex})}{g_Kg_I}e^{E_{\rm u}/k_{\rm B}T_{\rm ex}}F(T_{\rm ex})\int \tau(v){\rm d}v\, , \end{equation} where $h$ is the Planck constant, $\epsilon_0$ is the vacuum permittivity, $\mu$ is the permanent electric dipole moment, $S$ is the line strength, $Z_{\rm rot}$ is the partition function, $T_{\rm ex}$ is the excitation temperature, $g_K$ is the $K$-level degeneracy, $g_I$ is the reduced nuclear spin degeneracy, $E_{\rm u}$ is the upper-state energy, $k_{\rm B}$ is the Boltzmann constant, the function $F(T_{\rm ex})$ is defined as $F(T_{\rm ex})=\left(e^{h\nu /k_{\rm B}T_{\rm ex}}-1\right)^{-1}$, and, for a Gaussian profile, the last integral term can be expressed as \begin{equation} \int \tau(v){\rm d}v = \frac{\sqrt{\pi}}{2\sqrt{\ln 2}}\Delta v \tau_0 \simeq 1.064\Delta v \tau_0\, , \end{equation} where $\tau_0$ is the peak optical thickness of the line. The value of the product $\mu^2S$ for the observed \textit{o}-H$_2$D$^+$ transition, $1.62006$~D$^2$, was taken from the Splatalogue database\footnote{\url{http://www.cv.nrao.edu/php/splat/}} (the CDMS value therein). We assumed that the \textit{o}-H$_2$D$^+(1_{1,\,0}-1_{1,\,1})$ transition is thermalised at the NH$_3$-based gas kinetic temperature derived by Miettinen et al. (2010) towards the target sources, that is $T_{\rm ex}(o-{\rm H_2D^+})=T_{\rm kin}({\rm NH_3})$; see Table~\ref{table:parameters}. This assumption is supported by the results of Caselli et al. (2008), where the $T_{\rm kin}/T_{\rm ex}(o-{\rm H_2D^+})$ ratio for their sample ranges from 1 to 1.47 (at a critical density of $10^5$~cm$^{-3}$), with a mean (median) of 1.1 (1.0). The partition function values at the aforementioned $T_{\rm ex}$ values were interpolated from the values computed by Friesen et al. (2010; Table~3 therein). Because H$_2$D$^+$ is an asymmetric top molecule (the rotational constants from the CDMS database yield a Ray's asymmetry parameter of $\kappa=-0.0657$ (\cite{ray1932})), the value of $g_K$ is unity (i.e. no $K$-level degeneracy), while $g_I=3/4$ for the observed \textit{ortho} form of H$_2$D$^+$ (\cite{turner1991}). The value of $E_{\rm u}/k_{\rm B}$ is 17.8~K (e.g. \cite{friesen2010}). The values of $\tau_0$ were calculated from the antenna equation ($T_{\rm MB}\propto (1-e^{-\tau})$; see e.g. Eq.~(1) in \cite{miettinen2009}) using the aforementioned NH$_3$-based $T_{\rm ex}$ values and assuming that the background temperature is equal to that of the cosmic microwave background (CMB) radiation, that is $T_{\rm bg}=T_{\rm CMB}=2.725$~K (\cite{fixsen2009}). The fractional abundances of \textit{o}-H$_2$D$^+$ were calculated by dividing the \textit{o}-H$_2$D$^+$ column density by the H$_2$ column density, that is $x = N/N({\rm H_2})$. The $N({\rm H_2})$ values were derived from our LABOCA dust continuum data re-reduced by Miettinen (2016). The angular resolution of the corresponding LABOCA image, $19\farcs86$ (HPBW), is comparable to the beam size of our \textit{o}-H$_2$D$^+$ observations (only a factor of 1.18 difference). We employed the standard formula that relates $N({\rm H_2})$ with the dust peak surface brightness (see e.g. Eq.~(3) in \cite{miettinen2009}). We assumed that the dust temperature is equal to $T_{\rm kin}({\rm NH_3})$ derived by Miettinen et al. (2010), the mean molecular weight per H$_2$ molecule is 2.82, the dust opacity at 870~$\mu$m is 1.38~cm$^2$~g$^{-1}$, and that the dust-to-gas mass ratio is $R_{\rm dg}=1/141$ (see \cite{miettinen2016} and references therein for the details). In the present study, we also employ the C$^{17}$O, N$_2$H$^+$, and N$_2$D$^+$ data from Miettinen et al. (2012) and Miettinen \& Offner (2013b), and C$^{18}$O data from Miettinen (2016; only for SMM~3). The column densities of these linear molecules were also re-calculated using Eq.~(\ref{eqn:CD}) so that they can be compared with the present \textit{o}-H$_2$D$^+$ results (e.g. Miettinen et al. (2012) employed a non-LTE approach in their column density analysis). The C$^{17}$O and C$^{18}$O lines were assumed to be thermalised at $T_{\rm kin}({\rm NH_3})$, while the $T_{\rm ex}[{\rm NH_3(1,\, 1)}]$ values were used for N$_2$H$^+$ and N$_2$D$^+$ (we refer to \cite{miettinen2016} for a more detailed description). To properly calculate the fractional abundances of the aforementioned linear molecules, the corresponding $N({\rm H_2})$ values were derived from the LABOCA data smoothed to the coarser resolution of the line observations ($22\farcs3-28\farcs4$ HPBW). The beam-averaged column densities and abundances with respect to H$_2$ calculated in this section are given in Table~\ref{table:results}. The column densities and fractional abundances calculated from the additional spectral line detections are presented in Appendix~A. \begin{table*} \caption{Molecular column densities and fractional abundances.} {\small \begin{minipage}{2\columnwidth} \centering \renewcommand{\footnoterule}{} \label{table:results} \begin{tabular}{c c c c c c c c c} \hline\hline Source & $N(o-{\rm H_2D^+})$ & $x(o-{\rm H_2D^+})$ & $N({\rm C^{17}O})$ & $x({\rm C^{17}O})$ & $N({\rm N_2H^+})$ & $x({\rm N_2H^+})$ & $N({\rm N_2D^+})$ & $x({\rm N_2D^+})$ \\ & [$10^{12}$ cm$^{-2}$] & [$10^{-11}$] & [$10^{14}$ cm$^{-2}$] & [$10^{-8}$] & [$10^{13}$ cm$^{-2}$] & [$10^{-10}$] & [$10^{12}$ cm$^{-2}$] & [$10^{-10}$]\\ \hline IRAS 05399-0121 & $<1.4$ & $<2.3$ & $10.8\pm1.1$ & $2.7\pm0.4$ & $5.5\pm0.8$ & $10.7\pm2.0$ & $4.7\pm0.3$ & $1.1\pm0.1$ \\ [1ex] SMM 1 & $4.8\pm0.8$ & $11.5\pm2.3$ & $17.8\pm1.0$ & $7.4\pm0.9$ & $0.8\pm0.1$ & $3.1\pm0.6$ & $3.8\pm0.4$ & $1.6\pm0.2$ \\ [1ex] SMM 3 & $6.4\pm1.0$ & $5.9\pm1.1$ & $4.0\pm0.6$\tablefootmark{a} & $0.5\pm0.1$\tablefootmark{a} & $1.9\pm0.2$ & $1.6\pm0.3$ & $2.3\pm0.5$ & $0.3\pm0.1$ \\ [1ex] IRAS 05405-0117 & $<1.5$ & $<9.7$ & $3.2\pm0.3$ & $1.0\pm0.2$ & $0.5\pm0.1$ & $3.6\pm0.6$ & $0.3\pm0.2$ & $0.2\pm0.1$ \\ [1ex] SMM 6\tablefootmark{b} & $8.4\pm0.7$ & $30.2\pm5.6$ & $2.0\pm0.3$ & $0.9\pm0.2$ & $0.6\pm0.1$ & $2.4\pm0.4$ & $3.1\pm0.1$ & $1.3\pm0.2$ \\[1ex] & \ldots & \ldots & $3.0\pm0.2$ & $1.3\pm0.2$ & $1.0\pm0.1$ & $3.8\pm0.7$ & $3.5\pm0.6$ & $1.5\pm0.3$ \\ [1ex] SMM 7 & $4.8\pm1.4$ & $11.5\pm3.7$ & $16.0\pm1.4$ & $5.9\pm0.9$ & $2.2\pm0.9$ & $6.8\pm2.9$ & $<3.9$\tablefootmark{c} & $<1.5$ \\ [1ex] \hline \end{tabular} \tablefoot{\tablefoottext{a}{The column density and fractional abundance of the C$^{18}$O isotopologue derived from observations towards the \textit{Spitzer} 24~$\mu$m peak position ($2\farcs2$ offset from the SABOCA peak) are $(7.8\pm1.0)\times10^{14}$ cm$^{-2}$ and $(9.6\pm1.6)\times10^{-9}$, respectively (\cite{miettinen2016}).}\tablefoottext{b}{The values on the first row for SMM~6 refer to the SABOCA 350~$\mu$m peak position (\cite{miettinen2013b}; their source SMM~6a), while those on the second row were derived towards our earlier target position (\cite{miettinenetal2012}).}\tablefoottext{c}{The N$_2$D$^+(3-2)$ line was not detected towards SMM~7 (\cite{miettinenetal2012}), and hence we estimated the column density upper limit from the $3\sigma$ line intensity upper limit and the N$_2$H$^+(3-2)$ linewidth divided by the average $\Delta v({\rm N_2H^+(3-2)})/\Delta v({\rm N_2D^+(3-2)})$ ratio ($=1.26$) in our sample. All the quoted upper limits take the uncertainties into account.}} \end{minipage}} \end{table*} \subsection{CO depletion factor and the degree of deuterium fractionation} To estimate the factors by which the CO molecules are depleted in the target cores, we followed the analysis presented in Miettinen et al. (2012) with the modifications employed by Miettinen (2016). In short, the canonical or undepleted CO abundance was assumed to be $x({\rm CO})_{\rm can}=2.3\times10^{-4}$, and the $[^{16}{\rm O}]/[^{18}{\rm O}]$ and $[^{18}{\rm O}]/[^{17}{\rm O}]$ oxygen isotope ratios needed in the analysis were assumed to be 557 and 4.16, respectively (see \cite{miettinen2016} and references therein). The CO depletion factor was then calculated as $f_{\rm D}({\rm CO})=x({\rm CO})_{\rm can}/x({\rm CO})_{\rm obs}$, where the denominator is the observed CO abundance. The degree of deuterium fractionation in N$_2$H$^+$ was calculated by dividing the column density of N$_2$D$^+$ by that of N$_2$H$^+$. The values of $f_{\rm D}({\rm CO})$ and $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ are tabulated in Table~\ref{table:properties}. \subsection{CO depletion timescale} The rate at which CO molecules freeze out onto dust grain surfaces, $k_{\rm fo}$, can be used to calculate the CO depletion timescale as (e.g. \cite{rawlings1992}; \cite{maret2013}) \begin{equation} \tau_{\rm dep}=k_{\rm fo}^{-1}=\left(n_{\rm g}\sigma_{\rm g}v_{\rm CO}S_{\rm stick} \right)^{-1}\,, \end{equation} where $n_{\rm g}$ is the grain number density, $\sigma_{\rm g}=\pi a_{\rm g}^2$ is the mean geometric grain cross section with $a_{\rm g}$ being the average grain radius (assumed to be 0.1~$\mu$m), $v_{\rm CO}$ is the mean thermal speed of the CO molecules, and $S_{\rm stick}$ is their sticking coefficient. The grain number density can be expressed as $n_{\rm g}=x_{\rm g}\times n({\rm H_2})$, where $x_{\rm g}$ is the fractional abundance of dust grains and $n({\rm H_2})$ is the H$_2$ number density. The value of $x_{\rm g}$ can be solved from the equality $x_{\rm g}\times m_{\rm g}=m_{\rm H_2}\times R_{\rm dg}$, where $m_{\rm g}$ is the mass of a dust grain and $m_{\rm H_2}$ is that of the H$_2$ molecule. Under the assumption of spherical dust grains, the mass of a grain is given by $m_{\rm g}=4/3\times\pi a_{\rm g}^3\rho_{\rm g}$, where $\rho_{\rm g}$ is the mass density of a grain (assumed to be 3~g~cm$^{-3}$). For a Maxwellian distribution of gas-phase CO molecules, the mean thermal speed is given by $v_{\rm CO}=\left(8/\pi \times k_{\rm B}T_{\rm kin}/m_{\rm CO} \right)^{1/2}$, where $m_{\rm CO}$ is the mass of the CO molecule. Finally, we assumed that $S_{\rm stick}=1$, which signifies that the CO molecules stick to the dust grains in each collision, which is expected to be a reasonable assumption at the low temperatures of the present target sources (\cite{burke1983}; \cite{bisschop2006}). The volume-averaged H$_2$ number densities and the corresponding CO depletion timescales of the target sources are listed in Table~\ref{table:properties}. The former values were adopted from our previous studies of the Orion~B9 cores (\cite{miettinen2010}, 2012; \cite{miettinen2013b}), but they were scaled upward owing to the present assumptions about the source distance and dust properties. \subsection{Correlation plots} To search for potential correlations between the different parameters derived in the present paper and our earlier studies, we made several scatter plots that are useful to visualise the relationship between two variables. Figure.~\ref{figure:corr1} shows the degree of deuterium fractionation, or the $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ ratio, as a function of the \textit{o}-H$_2$D$^+$ abundance, CO depletion factor, and the gas kinetic temperature derived from NH$_3$ by Miettinen et al. (2010). The \textit{o}-H$_2$D$^+$ abundance is also shown as a function of the CO depletion timescale and the CO depletion factor as a function of the NH$_3$-based gas temperature. The prestellar and protostellar cores are shown in different colours (blue and red, respectively) to better illustrate how the corresponding data points populate the plotted parameter spaces. Figure~\ref{figure:corr2} shows the \textit{o}-H$_2$D$^+$ abundance as a function of the gas kinetic temperature. For comparison, the relationship between $x(o-{\rm H_2D^+})$ and $T_{\rm kin}$ derived by Caselli et al. (2008; their Eq.~(7)) is indicated in Fig.~\ref{figure:corr2}. We remind the reader that the C$^{17}$O, NH$_3$, N$_2$H$^+$, and N$_2$D$^+$ observations used to construct the plots in Figs.~\ref{figure:corr1} and \ref{figure:corr2} were targeting the same positions. However, the new \textit{o}-H$_2$D$^+$ observations were made towards positions offset from our previous molecular line observations (the mean offset is $11\farcs9$ or 0.7 times the beam of the \textit{o}-H$_2$D$^+$ observations; Table~\ref{table:sources}), except for SMM~6 for which we also have C$^{17}$O, N$_2$H$^+$, and N$_2$D$^+$ data for the present target position (only $2\farcs2$ offset; \cite{miettinen2013b}). \begin{figure* \begin{center} \includegraphics[scale=0.33]{Figures/deutvsabundance.eps} \includegraphics[scale=0.33]{Figures/deutvsdepletion.eps} \includegraphics[scale=0.33]{Figures/deutvstemp.eps} \includegraphics[scale=0.33]{Figures/abundancevstau.eps} \includegraphics[scale=0.33]{Figures/depletionvstemp.eps} \caption{(Top panels) Degree of deuterium fractionation ($[{\rm N_2D^+}]/[{\rm N_2H^+}]$) against \textit{o}-H$_2$D$^+$ abundance, CO depletion factor, and NH$_3$-based gas kinetic temperature. (Bottom panels) \textit{o}-H$_2$D$^+$ abundance against CO depletion timescale; CO depletion factor against gas temperature. The arrows pointing left and down indicate upper limits. In the top middle panel, the prestellar core SMM~6 has two data points that represent our two different target positions within the source (see Table~\ref{table:properties}).} \label{figure:corr1} \end{center} \end{figure*} \begin{figure}[!htb] \centering \resizebox{0.98\hsize}{!}{\includegraphics{Figures/abundancevstemp.eps}} \caption{\textit{ortho}-H$_2$D$^+$ abundance as a function of the NH$_3$-based gas kinetic temperature. The down-pointing arrows indicate upper limits. The black-solid curve represents the $x(o-{\rm H_2D^+})-T_{\rm kin}$ relationship derived by Caselli et al. (2008), and the grey-shaded region shows its uncertainty.} \label{figure:corr2} \end{figure} \section{Discussion} \subsection{Interrelations between \textit{o}-H$_2$D$^+$, CO depletion, and deuterium fractionation} Owing to the low deuteron affinity of the H$_2$D$^+$ molecule, it reacts eagerly with other species by donating a deuteron (e.g. \cite{roberts2002}). Therefore, deuterium enrichements are passed forward to heavier species. For example, one-third of the reactions between H$_2$D$^+$ and molecular nitrogen yield N$_2$D$^+$ (the remaining two-thirds lead to N$_2$H$^+$). The deuterium fractionation in a given species, such as N$_2$H$^+$ for example, is therefore expected to become higher for a higher abundance of H$_2$D$^+$. Despite the angular offset between the N$_2$H$^+$, N$_2$D$^+$, and \textit{o}-H$_2$D$^+$ observations (Sect.~3.5), this is qualitatively consistent with what we see in the top left panel in Fig.~\ref{figure:corr1}, that is the highest $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ ratios are seen at the highest \textit{o}-H$_2$D$^+$ abundances (and vice versa). The H$_2$D$^+$ molecules are mainly destroyed in reactions with CO, which yield either HCO$^+$ or DCO$^+$. Therefore, the less gas-phase CO there is, the lower the destruction rate of H$_2$D$^+$ (e.g. \cite{roberts2000}). In other words, the higher the CO depletion factor, the higher the expected deuteration degree (e.g. \cite{vastel2006}). Although the data points plotted in the top middle panel in Fig.~\ref{figure:corr1} show a large scatter, the prestellar and protostellar core populations are each qualitatively consistent with the aforementioned description, that is the highest $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ ratios are associated with the highest levels of CO depletion (see Sect.~4.2). Because the level of CO depletion via freeze-out becomes higher at higher gas densities (e.g. \cite{bacmann2002}), one would also expect higher $f_{\rm D}({\rm CO})$ values, and hence higher deuteration levels at lower gas temperatures (e.g. \cite{emprechtinger2009}). These trends are not visible in the top right and bottom right panels of Fig.~\ref{figure:corr1}. If anything, there appears to be a positive correlation between $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ and $T_{\rm kin}$ among the prestellar cores. However, the gas temperature range explored here is fairly narrow, from $9.4\pm1.1$~K to $13.5\pm1.6$~K, which might render the trend imperceptible. Another potential issue is the fact that the gas temperatures plotted in Fig.~\ref{figure:corr1} were derived from the $(1,\,1)$ and $(2,\,2)$ inversion lines of \textit{para}-NH$_3$, which have a much lower critical density ($\sim10^3$~cm$^{-3}$) than the $J=3-2$ transitions of N$_2$H$^+$ and N$_2$D$^+$ ($\sim10^6$~cm$^{-3}$) from which the deuteration level was derived (\cite{miettinen2010}, 2012; \cite{miettinen2016}). Therefore, the derived $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ ratios and $T_{\rm kin}({\rm NH_3})$ values might refer to different gas components, which would explain the lack of the expected negative correlation in the top right panel of Fig.~\ref{figure:corr1}. \begin{table*} \renewcommand{\footnoterule}{} \caption{Volume-averaged H$_2$ number density, CO depletion factor and timescale, and degree of deuteration of the target sources.} {\normalsize \begin{minipage}{2\columnwidth} \centering \label{table:properties} \begin{tabular}{c c c c c} \hline\hline Source & $\langle n({\rm H}_2) \rangle$ & $f_{\rm D}({\rm CO})$ & $\tau_{\rm dep}$ & $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ \\ & [$10^4$~cm$^{-3}$] & & [$10^4$~yr] & \\ \hline IRAS 05399-0121 & $10.2\pm2.4$ & $3.6\pm0.5$ & $5.2\pm1.2$ & $0.09\pm0.01$ \\ SMM 1 & $9.9\pm1.7$ & $1.3\pm0.2$ & $5.7\pm1.0$ & $0.47\pm0.08$ \\ SMM 3\tablefootmark{a} & \ldots & $42.7\pm7.0$ & \ldots & \ldots \\ & $19.5\pm3.9$ & $20.8\pm3.9$ & $3.0\pm0.6$ & $0.12\pm0.03$ \\ IRAS 05405-0117 & $7.1\pm0.9$ & $4.0\pm0.6$ & $8.2\pm1.1$ & $0.05\pm0.03$ \\ SMM 6\tablefootmark{b} & $36.4\pm11.8$ & $11.2\pm2.0$ & $1.6\pm0.5$ & $0.50\pm0.05$ \\ & $4.1\pm0.6$ & $7.5\pm1.0$ & $14.3\pm2.0$ & $0.36\pm0.08$ \\ SMM 7 & $8.9\pm2.4$ & $1.7\pm0.2$ & $7.1\pm1.9$ & $<0.24$ \\ \hline \end{tabular} \tablefoot{\tablefoottext{a}{The CO depletion factor quoted on the first row was derived from the C$^{18}$O observations towards the \textit{Spitzer} 24~$\mu$m peak position of the source, which lies $2\farcs2$ to the north-west of the SABOCA peak (\cite{miettinen2016}), while the values on the second row were derived towards our earlier target position (\cite{miettinenetal2012}).}\tablefoottext{b}{The values on the first row for SMM~6 refer to the SABOCA 350~$\mu$m peak position (\cite{miettinen2013b}; their source SMM~6a), while those on the second row were derived towards our earlier target position (\cite{miettinenetal2012}).}} \end{minipage} } \end{table*} \subsection{Comparison of the H$_2$D$^+$-based deuteration between the prestellar and protostellar cores in Orion~B9} As illustrated in the top left panel of Fig.~\ref{figure:corr1}, the studied prestellar cores show higher \textit{o}-H$_2$D$^+$ abundances and $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ deuteration ratios than the protostellar cores. This can be understood by considering the feedback effects from the protostar(s) deeply embedded in the protostellar cores. The central protostar increases its mass by accreting gas from the surrounding envelope via a circumstellar disk, and this process is associated with both heating of the surrounding medium and protostellar jets that drive molecular outflows. When the gas temperature exceeds $\sim25$~K, reaction~(\ref{eqn:deut}) starts to operate from right to left, which leads to the decrease of deuteration (e.g. \cite{vastel2006}). At the same time, thanks to both central heating and outflow shocks, CO molecules can be released from the icy grain mantles back into the gas phase, which leads to the destruction of H$_2$D$^+$. That the prestellar cores populate a higher $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ regime than the more evolved protostellar cores is also visible in the top middle and right panels in Fig.~\ref{figure:corr1}. Interestingly, the lowest CO depletion factor in our sample was derived for the prestellar core SMM~1, namely $f_{\rm D}({\rm CO})=1.3\pm0.2$, which is consistent with no depletion. On the other hand, the protostellar core SMM~3 exhibits the highest level of CO depletion, $f_{\rm D}({\rm CO})=42.7\pm7.0$, towards the core centre and $f_{\rm D}({\rm CO})=20.8\pm3.9$ towards the envelope ($16\farcs7$ or 0.034~pc projected separation). The Class~0 object SMM~3 is the strongest source of 350~$\mu$m and 870~$\mu$m emission in Orion~B9 (\cite{miettinen2009}, 2012), and is therefore likely to be in a very early stage of protostellar evolution, where the dusty envelope is still resembling the properties that prevailed at its prestellar phase. The prestellar core SMM~1 on the other hand might be affected by the northwest-southeast oriented outflow driven by the nearby Class~0/I protostar IRAS~05399 (see \cite{miettinen2013a} and references therein). This could increase the CO abundance in the gas phase in SMM~1 via outflow shock desorption, or simply by pushing extra CO gas towards SMM~1 that is being captured in our observations. We note that the outflow motions from IRAS~05399 are also indicated by the red asymmetric profile of the DCO$^+(5-4)$ line detected in the present work (see Fig.~\ref{figure:otherspectra2}). Nevertheless, the low CO depletion factor in SMM~1 is still puzzling in terms of the high deuteration observed in the source ($[{\rm N_2D^+}]/[{\rm N_2H^+}]\sim0.5$). Perhaps SMM~1 is seen in a specific stage, where the abundant CO molecules have not yet had time to bring down the deuteration in N$_2$H$^+$. \subsection{Orion~B9 in a wider context of H$_2$D$^+$ studies of star-forming regions} As the main comparison sample of \textit{o}-H$_2$D$^+$ observations towards dense cores, we used the Caltech Submillimeter Observatory (CSO) survey by Caselli et al. (2008). To our knowledge, the Caselli et al. (2008) study is the largest H$_2$D$^+$ survey published so far, and therefore provides a useful comparison sample with the present results. These authors observed the same \textit{o}-H$_2$D$^+(1_{1,\,0}-1_{1,\,1})$ transition as we did towards ten starless cores and six protostellar cores. The line was detected in seven ($70\%$) and four ($\sim67\%$) of these targets, respectively. We detected \textit{o}-H$_2$D$^+$ in all three of our prestellar cores, but in only one of the three protostellar cores ($33\%$ detection rate). We note that the Caselli et al. (2008) sample included a target position in Orion~B9, which was called Ori~B9, but that position is not coincident with any significant LABOCA dust emission (see Fig.~\ref{figure:map}), which probably explains their non-detection. As discussed in Sect.~1, the latter position is close to one of the positions observed in \textit{o}-H$_2$D$^+$ by Harju et al. (2006; $10\farcs4$ offset from their source Ori~B9~N). We also note that Ori~B9 is often considered to be a massive dense core in the literature (e.g. \cite{harju2006}; \cite{caselli2008}; \cite{pillai2012}), but the source is composed of a system of low-mass dense cores. Caselli et al. (2008) used a somewhat different method to calculate the \textit{o}-H$_2$D$^+$ column densities (e.g. their calculation made use of the photon escape probability), and therefore it is important to decipher whether or not the two methods lead to similar results. For this purpose, we took the line parameters for the two strongest \textit{o}-H$_2$D$^+$ detections by Caselli et al. (2008), namely those towards L~1544 and L~183 (their Tables~2 and 3; the values valid at a critical density of $10^5$~cm$^{-3}$), and derived $N(o-{\rm H_2D^+})$ values that agree within factors of $1.1\pm0.1$ (our nominal values being $10\%$ higher). We therefore conclude that the two methods yield results that are in good agreement with each other, and a direct comparison is reasonable. The \textit{o}-H$_2$D$^+$ line widths derived by Caselli et al. (2008) for their starless and protostellar cores are $0.33-0.73$~km~s$^{-1}$ and $0.51-1.49$~km~s$^{-1}$ (the authors adopted a line width of 0.42~km~s$^{-1}$ for Ori~B9 from Harju et al. (2006), but that value refers to the starless source Ori~B9~N, and is hence neglected from the latter range). The corresponding averages are 0.47~km~s$^{-1}$ and 0.93~km~s$^{-1}$. We found a factor 1.34 broader average \textit{o}-H$_2$D$^+$ line width (0.63~km~s$^{-1}$) for our prestellar cores, which could indicate that Orion~B9 is dynamic in nature (see Sect.~1). On the other hand, the line width for our only protostellar source detection (SMM~3; 0.74~km~s$^{-1}$) is comparable with those in the prestellar objects (only 1.17 times broader than the average line width for prestellar cores), which is at odds with the average trend in the Caselli et al. (2008) sample, but supports the aforementioned hypothesis that SMM~3 is in its very early Class~0 stage. The \textit{o}-H$_2$D$^+$ column densities derived for starless cores by Caselli et al. (2008) are $(0.2-4.1)\times10^{13}$~cm$^{-2}$, while those for protostellar cores are $(2-9)\times10^{12}$~cm$^{-2}$. The corresponding fractional abundances are $(2.4-34.1)\times10^{-11}$ and $(0.6-5.0)\times10^{-11}$. The $N(o-{\rm H_2D^+})$ values for the Orion~B9 prestellar cores are derived to be $\sim(5-8)\times10^{12}$~cm$^{-2}$, with the corresponding fractional abundances being $\sim(12-30)\times10^{-11}$. Although the former values resemble the lower end values found by Caselli et al. (2008), our $x(o-{\rm H_2D^+})$ values are closer to the highest values in the CSO survey. Although the \textit{o}-H$_2$D$^+$ column density we derived for SMM~3 is bracketed by the range derived by Caselli et al. (2008) for their dense cores associated with ongoing star formation, the $x(o-{\rm H_2D^+})$ value of the source ($6\times10^{-11}$) appears to be higher. However, derivation of the fractional abundances is susceptible to the assumptions used to calculate the H$_2$ column density, and therefore it might be more reliable to compare the $N(o-{\rm H_2D^+})$ values. The only significant correlation between core properties found by Caselli et al. (2008) was that between $x(o-{\rm H_2D^+})$ and $T_{\rm kin}$ (see our Fig.~\ref{figure:corr2}). Within the uncertainties, our results appear to be consistent with this relationship with a notable exception being the prestellar core SMM~6. However, a notable caveat in our analysis is that our $T_{\rm kin}$ values were derived from ammonia observations towards positions that are different from the present target positions (i.e. $6\arcsec-18\farcs7$ offsets from the SABOCA 350~$\mu$m peak positions; Table~\ref{table:sources}), although the large beam size of the former data ($40\arcsec$ HPBW) encompasses the \textit{o}-H$_2$D$^+$ targets. Nevertheless, despite this weakness in our methodology, at least half of our sources are consistent even with the nominal $x(o-{\rm H_2D^+})-T_{\rm kin}$ correlation derived by Caselli et al. (2008). As discussed above, the values of $x(o-{\rm H_2D^+})$ are sensitive to the way the corresponding $N({\rm H_2})$ are calculated, and this can also affect the comparison made here. Regarding the validity of using the NH$_3$-based gas temperature to compare with the \textit{o}-H$_2$D$^+$ data, we also estimated the value of $T_{\rm kin}$ for SMM~6 from the observed line widths of \textit{o}-H$_2$D$^+$ and N$_2$D$^+(3-2)$; see \cite{miettinen2013b}. If the observed transitions of these two species originate in a common gas component, they should be sensitive to the same gas motions and gas temperature, which in turn would imply equally large non-thermal velocity dispersions (see \cite{friesen2010}; Eq.~(7) therein). From the equality $\sigma_{\rm NT}(o-{\rm H_2D^+})=\sigma_{\rm NT}({\rm N_2D^+})$ we derived a value of $T_{\rm kin}=12.2\pm 1.2$~K for SMM~6, which agrees within the uncertainties with the value $T_{\rm kin}({\rm NH_3})=11.0\pm0.4$~K derived by Miettinen et al. (2010). For comparison, using the N$_2$H$^+(4-3)$ line width in the analysis (see Appendix~A), the temperature estimate becomes higher, namely $16.9\pm 2.7$~K. The former comparison is expected to be more accurate because N$_2$D$^+$ is formed from H$_2$D$^+$ (cf. \cite{friesen2010}), and supports the use of $T_{\rm kin}({\rm NH_3})$ values in our analysis. Caselli et al. (2008) suggested the following reasons for the negative $x(o-{\rm H_2D^+})-T_{\rm kin}$ relationship visible in their sample. First, the warmer the source, the smaller the \textit{o}-H$_2$D$^+$-emitting region might be, which would lead to a beam dilution effect (the line intensity is diluted by the ratio of the solid angle subtended by the emission region to the beam solid angle). Secondly, the warmest sources in the Caselli et al. (2008) sample were generally identified as being the most distant ones ($>300$~pc), which could also be an issue owing to beam dilution. Thirdly, the physical and chemical interpretation is that the warmer the gas, the lower the degree of CO depletion, and hence the higher the destruction rate of H$_2$D$^+$. The authors also pointed out that the heating by a central protostar might not significantly increase the gas-phase CO abundance (as supported by the bottom right panel in our Fig.~\ref{figure:corr1}), but that the process might instead affect the \textit{ortho}-\textit{para} ratio of H$_2$D$^{+}$ in such a way that the \textit{o}-H$_2$D$^+$ abundance decreases (see e.g. \cite{sipila2017} for the \textit{ortho}-\textit{para} conversion reactions of H$_2$D$^+$). Pillai et al. (2012) derived $N(o-{\rm H_2D^+})$ values of $(1.9-3.8)\times10^{12}$~cm$^{-2}$ and $x(o-{\rm H_2D^+})$ values of $(0.9-2.1)\times10^{-11}$ towards five sources in the DR~21 filament of Cygnus X, which is a high-mass star-forming region. The authors assumed a $T_{\rm ex}$ value of 10~K for the whole sample and different dust properties from those assumed here to calculate the H$_2$ column density (and hence $x(o-{\rm H_2D^+})$). Taking into account the differences in the dust opacity ($\kappa_{\nu}\propto \nu^{-\beta}$, where the dust emissivity index is $\beta\simeq 1.8$ for our adopted dust model (see \cite{miettinen2013a} and references therein)) and gas-to-dust mass ratio (we used a factor of 1.41 higher value), the fractional abundances reported by Pillai et al. (2012) should be scaled down by a factor of 0.47 for a more meaningful comparison. Our \textit{o}-H$_2$D$^+$ column densities in the detected sources appear to be somewhat higher than in DR~21, but the upper limits for the protostellar cores IRAS~05399 and IRAS~05405 are less than the lowest value found by Pillai et al. (2012). Also, the \textit{o}-H$_2$D$^+$ abundances we derived appear to be higher than in DR~21 (e.g. a factor of 30 difference between the highest values). Giannetti et al. (2019) reported $N(o-{\rm H_2D^+})$ values of $(<2.6-33.3)\times10^{11}$~cm$^{-2}$ towards three clumps in the G351.77-0.51 filament that have the potential to form high-mass stars. These column densities also appear to be lower than in our sample. Hence, the \textit{o}-H$_2$D$^+$ abundances appear to be higher in low-mass star-forming regions than in massive star-forming regions. The process of low-mass star formation is characterised by at least an order of magnitude longer (and colder) starless core phase compared to that of high-mass stars (e.g. \cite{brunken2014}; \cite{tige2017}), which supports the development of matured deuterium chemistry in low-mass dense cores. \subsection{Relative abundances of \textit{o}-H$_2$D$^+$, N$_2$D$^+$, and DCO$^+$ as evolutionary indicators} Giannetti et al. (2019) found that as the clump evolves, the \textit{o}-H$_2$D$^+$ abundance drops while that of N$_2$D$^+$ behaves in the opposite way, and hence the [\textit{o}-${\rm H_2D^+}]/[{\rm N_2D^+}]$ ratio decreases as a function of evolution (see their Fig.~3). The authors suggested that this trend could be caused by the conversion of H$_2$D$^+$ to the doubly and triply deuterated species D$_2$H$^+$ and D$_3^+$ (${\rm H_2D^+}+{\rm HD}\rightarrow {\rm D_2H^+}$ and ${\rm D_2H^+}+{\rm HD}\rightarrow {\rm D_3^+}$), associated with the formation of N$_2$D$^+$ in the reactions ${\rm D_2H^+}+{\rm N_2}\rightarrow {\rm N_2D^+}$ and ${\rm D_3^+}+{\rm N_2}\rightarrow {\rm N_2D^+}$ (e.g. \cite{pagani2009a}, 2011). In the protostellar stage, where the gas-phase CO abundance is expected to be higher than in the starless phase (at least near the central protostar), the H$_2$D$^+$ and N$_2$D$^+$ molecules are being destroyed by CO. Also, the reverse reaction~(\ref{eqn:deut}) becomes relevant at higher temperatures, which leads to the drop of the [\textit{o}-${\rm H_2D^+}]/[{\rm N_2D^+}]$ ratio. To examine if the sources in our sample exhibit such a trend, we first estimated the relative evolutionary stages of the target prestellar cores using the CO depletion timescales derived in Sect.~3.4. The chemical CO depletion timescale can be interpreted as a lower limit to the age of the core (\cite{maret2013}), and the values given in Table~\ref{table:properties} suggest that SMM~6 could be the youngest prestellar core in our sample (age $>10^4$~yr), followed by SMM~1 ($>4.7 \times 10^4$~yr) and SMM~7 ($>5.2 \times 10^4$~yr). We note that in the present study we observed the densest condensation in SMM~6 (\cite{miettinen2013b}; their source SMM~6a), while the CO depletion timescale derived for the lower density elongated parent core suggests an age of $>1.2 \times 10^5$~yr. Miettinen et al. (2009, 2012) studied the spectral energy distributions (SEDs) of the Orion~B9 protostellar cores (see also \cite{miettinen2013a}; \cite{miettinen2016}). As part of the SED analysis, the authors derived the $M_{\rm tot}/L_{\rm bol}^{0.6}$ ratios of the sources, where $M_{\rm tot}$ is the total (gas plus dust) mass of the core (essentially the envelope mass) and $L_{\rm bol}$ is the bolometric luminosity. This ratio is found to decrease with time (it is related to the weakening of the protostellar outflow strength), and can therefore be used as an evolutionary indicator (\cite{bontemps1996}). On the basis of this analysis, SMM~3 is the youngest protostellar core in our sample, followed by IRAS~05405 and then IRAS~05399. Indeed, in our earlier studies we found that SMM~3 and IRAS~05405 are Class~0 objects, while IRAS~05399 appears to be in the transition phase from Class~0 to I. Under the assumption of the aforementioned evolutionary sequence, in Fig.~\ref{figure:evolution1} we plot the fractional abundances of \textit{o}-H$_2$D$^+$ and N$_2$D$^+$ and the [\textit{o}-${\rm H_2D^+}]/[{\rm N_2D^+}]$ ratio (calculated from the column densities) as a function of source evolution. Indeed, the \textit{o}-H$_2$D$^+$ abundance appears to drop as the core evolves in agreement with the finding by Giannetti et al. (2019). We note that the \textit{o}-H$_2$D$^+$ abundances in SMM~1 and SMM~7 are very similar to each other (their ratio is $1.0\pm0.4$), but so are their CO depletion times (with a ratio of $0.8\pm0.3$), which suggests that the cores are in comparable stages of evolution (cf.~the bottom left panel in Fig.~\ref{figure:corr1}). However, the behaviour of the N$_2$D$^+$ abundance is more fluctuating, which might be a manifestation of the fact that our N$_2$D$^+$ observations were offset from the core centres (except for SMM~6). As a result of the aforementioned fluctuation in the observed N$_2$D$^+$ abundance, the relative abundance of \textit{o}-H$_2$D$^+$ and N$_2$D$^+$ does not exhibit a clear decreasing trend with core evolution as found by Giannetti et al. (2019). However, owing to the censored values (especially the upper [\textit{o}-${\rm H_2D^+}$]/$[{\rm N_2D^+}]$ limits for IRAS~05405 and IRAS~05399), the existence of a decreasing trend is still possible, although SMM~3 would still be an outlier from such trend. Figure~\ref{figure:evolution2} is similar to Fig.~\ref{figure:evolution1} but DCO$^+$ was used in the analysis instead of N$_2$D$^+$ (see Appendix~A). The DCO$^+(5-4)$ data were observed from the exact same positions as the \textit{o}-H$_2$D$^+$ data (and simultaneosly in the observed frequency bands). Another benefit of using DCO$^+$ in the analysis is that the species was detected towards all six target sources. The DCO$^+$ abundance does not appear to exhibit any evolutionary trend, and the [\textit{o}-${\rm H_2D^+}]/[{\rm DCO^+}]$ ratio behaves in a similar way as the [\textit{o}-${\rm H_2D^+}]/[{\rm N_2D^+}]$ ratio. However, the prestellar regime shows a somewhat stronger hint of a decreasing trend than in the case of [\textit{o}-${\rm H_2D^+}]/[{\rm N_2D^+}]$. If the decrease of the \textit{o}-H$_2$D$^+$ abundance is indeed driven by its conversion to D$_2$H$^+$ and D$_3^+$, then DCO$^+$ can form in the reactions ${\rm D_2H^+}+{\rm CO}\rightarrow {\rm DCO^+}$ and ${\rm D_3^+}+{\rm CO}\rightarrow {\rm DCO^+}$ (e.g. \cite{pagani2009a}, 2011). On the other hand, the DCO$^+$ formation via these reactions is confronted by the abundance of gas-phase CO, which is first expected to decrease as the core evolves in its prestellar stage, and then to increase in the protostellar stage owing to desorption of icy grain mantles. The difference compared to the case of N$_2$D$^+$ above is that even if the gas-phase CO abundance is very low owing to its depletion, the gas can still be rich in N$_2$. For example, N$_2$ has about 18\% lower binding energy than CO, and therefore N$_2$ can evaporate from dust grain mantles more quickly (see \cite{giannetti2019} and references therein). Another chemical pathway that can contribute to the formation of DCO$^+$ is the reaction ${\rm CH_3^+}+{\rm HD}\rightarrow {\rm CH_2D^+}$, followed by the reaction ${\rm CH_2D^+}+{\rm O}\rightarrow {\rm DCO^+}$ (e.g. \cite{favre2015}; \cite{salinas2017}). However, because the latter reactions are relevant at warm temperatures of $T>50$~K, they are expected to play a role in the formation of DCO$^+$ around the hot corinos of low-mass protostellar cores, where the temperature is $\sim100$~K (see \cite{ceccarelli2007} for a review). To summarise, although we found that the \textit{o}-H$_2$D$^+$ abundance drops as the core evolves, the reliability of using of the [\textit{o}-${\rm H_2D^+}]/[{\rm N_2D^+}]$ and [\textit{o}-${\rm H_2D^+}]/[{\rm DCO^+}]$ abundance ratios as evolutionary indicators remains inconclusive. Larger source samples and observations of additional deuterated species like D$_2$H$^+$ would be particularly useful to better understand the temporal behaviour of the abundances of H$_2$D$^+$, N$_2$D$^+$, and DCO$^+$. \begin{figure* \begin{center} \includegraphics[scale=0.5]{Figures/abundance_evolution.eps} \includegraphics[scale=0.5]{Figures/evolution.eps} \caption{Fractional abundances of \textit{o}-H$_2$D$^+$ and N$_2$D$^+$ (\textit{left panel}) and their abundance ratio (\textit{right panel}) plotted as a function of the potential source evolutionary sequence (see text for details). The arrows pointing up and down indicate the lower and upper limits, respectively. The red, vertical dashed line separates the prestellar phase of evolution on the left from the protostellar phase on the right.} \label{figure:evolution1} \end{center} \end{figure*} \begin{figure* \begin{center} \includegraphics[scale=0.5]{Figures/abundance_evolution2.eps} \includegraphics[scale=0.5]{Figures/evolution2.eps} \caption{Same as Fig.~\ref{figure:evolution1} but using DCO$^+$ in the analysis.} \label{figure:evolution2} \end{center} \end{figure*} \subsection{Chance superposition cores and other line-of-sight gas components seen towards Orion~B9} While the LSR velocities of the detected \textit{o}-H$_2$D$^+$ lines are about 9~km~s$^{-1}$, the \textit{o}-H$_2$D$^+$ emission from the prestellar core SMM~7 appears at $v_{\rm LSR}\simeq3.6$~km~s$^{-1}$. This is also the case for the detected DCO$^+(5-4)$ lines (see Appendix~A). Indeed, Miettinen et al. (2010, 2012) found that the NH$_3(1,\,1)$, NH$_3(2,\,2)$, C$^{17}$O$(2-1)$, DCO$^+(4-3)$, and N$_2$H$^+(3-2)$ line emissions towards SMM~7 occur at 3.6-4~km~s$^{-1}$. These results suggest that SMM~7 might be a chance projection seen towards the Orion~B9 filament. Moreover, the protostellar source IRAS~05413-0104 that lies $13\farcm2$ (1.6~pc) to the northeast of SMM~7 (see Fig.~1 in \cite{miettinen2009}) was found to have NH$_3$ radial velocities that are significantly lower than the bulk of the Orion~B9 cores, namely $\sim1.5$~km~s$^{-1}$ (\cite{miettinen2010}). Also, the protostellar core SMM~4, which was not chosen for the present study, was found to exhibit line emission at 1.5-1.7~km~s$^{-1}$ by Miettinen et al. (2012), although the NH$_3$ lines detected towards SMM~4 showed two components, one at the systemic velocity of Orion~B9 ($\sim9$~km~s$^{-1}$) and the other at about 1.6~km~s$^{-1}$. This could be caused by the large, $40\arcsec$ beam of the NH$_3$ observations that also captured the 9~km~s$^{-1}$ gas component (see Fig.~\ref{figure:map}). Therefore, in addition to SMM~7, the protostellar cores SMM~4 and IRAS~05413 may also be physically unrelated to the Orion~B9 star-forming region. One of the present target sources, IRAS~05405, exhibits additional velocity components in the C$^{17}$O$(2-1)$ and N$_2$D$^+(3-2)$ spectra (\cite{miettinenetal2012}). As was pointed out by Miettinen et al. (2010), the dense gas and dust associated with the additional line-of-sight velocity components can also affect the physical parameters of the cores derived from dust continuum observations. For example, the dust-based H$_2$ column density can be overestimated if the dust continuum surface brightness is contaminated by a physically unrelated component. This would then lead to underestimated fractional abundances of the detected molecules. For instance, the lower velocity C$^{17}$O$(2-1)$ lines detected towards IRAS~05405 (at 1.3~km~s$^{-1}$ and 3.0~km~s$^{-1}$) are $\sim60-70\%$ of the intensity of the systemic velocity (9.2~km~s$^{-1}$) line (\cite{miettinenetal2012}; Table~5 therein). However, the beam size of the aforementioned C$^{17}$O$(2-1)$ observations was 1.65 times larger than that of the present \textit{o}-H$_2$D$^+$ observations, and therefore the contribution from the additional line-of-sight velocity components to the present \textit{o}-H$_2$D$^+$ abundance upper limit is unclear. Moreover, the H$_2$ column density estimates suffer from other uncertain parameters, especially from the uncertainty in the submillimetre dust opacity that can be a factor of approximately two (e.g. \cite{shirley2011}). In conclusion, the additional velocity components seen towards Orion~B9 are relevant for only one of the present targets (IRAS~05405), but their relative contribution to the submillimetre dust continuum emission is difficult to reliably quantify. High-resolution molecular line imaging would be useful to resolve this issue. \section{Summary and conclusions} We used the APEX telescope to observe the 372~GHz \textit{o}-H$_2$D$^+(J_{K_a,\,K_c}=1_{1,\,0}-1_{1,\,1})$ line towards three prestellar cores and three protostellar cores in the Orion~B9 filament. The \textit{o}-H$_2$D$^+$ data were analysed in conjunction with our previous APEX spectral line and dust continuum data for the target sources. Our main results are summarised as follows: \begin{enumerate} \item The \textit{o}-H$_2$D$^+(J_{K_a,\,K_c}=1_{1,\,0}-1_{1,\,1})$ line was detected in all three prestellar cores with the abundances in the range $x(o-{\rm H_2D^+})\sim(12-30)\times10^{-11}$. Only one of the protostellar cores, the Class~0 object SMM~3, was detected in \textit{o}-H$_2$D$^+$ emission with an abundance of $6\times10^{-11}$. \item Besides the \textit{o}-H$_2$D$^+$ line detections, the N$_2$H$^+(4-3)$ line was detected towards all the sources except one prestellar core (SMM~7), and DCO$^+(5-4)$ was detected in all the target sources. \item No significant correlations were found between the level of deuterium fractionation (quantified as the $[{\rm N_2D^+}]/[{\rm N_2H^+}]$ ratio), the factor of CO depletion, the gas kinetic temperature derived from ammonia, or the \textit{o}-H$_2$D$^+$ abundance. However, our results are in fairly good agreement with the $x(o-{\rm H_2D^+})-T_{\rm kin}$ relationship derived by Caselli et al. (2008) for low-mass dense cores. \item The derived \textit{o}-H$_2$D$^+$ abundances in Orion~B9 are more similar to those observed in other low-mass star-forming regions than to those derived for high-mass star-forming clumps where the values are typically a few times $10^{-11}$ or less. \item We found that the \textit{o}-H$_2$D$^+$ abundance appears to decrease as a function of temporal core evolution. We also addressed the evolutionary scenario proposed by Giannetti et al. (2019), namely that the [\textit{o}-${\rm H_2D^+}]/[{\rm N_2D^+}]$ abundance ratio decreases as the core evolves towards more advanced stages. However, our results were not conclusive, which might (partly) be caused by the spatial offset between our \textit{o}-H$_2$D$^+$ and N$_2$D$^+$ observations ($\sim10\arcsec$ on average). Indeed, the N$_2$D$^+$ abundance was not found to increase as the core evolves, but it rather showed a fluctuating behaviour. On the other hand, the [\textit{o}-${\rm H_2D^+}]/[{\rm DCO^+}]$ ratio, where the DCO$^+$ data were observed simultaneously with \textit{o}-H$_2$D$^+$, was also not found to exhibit any clear evolutionary trend. \item The prestellar core SMM~7 exhibits \textit{o}-H$_2$D$^+$ line emission at a radial velocity that is almost $\sim6$~km~s$^{-1}$ lower than the systemic velocity of Orion~B9. Therefore, the source might be a chance projection seen towards the Orion~B9 filament region. \end{enumerate} Orion~B9 is part of the dynamic Orion~B environment, and could itself be a region of triggered core and star formation that lies about $\sim4$~pc from the \ion{H}{II} region NGC~2024. However, large-scale molecular line mapping (covering at least the whole Orion~B9 filament) is required to better understand the line-of-sight velocity distribution of Orion B9, and to quantitatively test the hypothesis that the region is indeed affected by feedback processes. If confirmed, the Orion~B9 filament provides an interesting target system to investigate the deuterium-based chemistry and the possible environmental effects in an important class of star-forming regions. Observations of the \textit{para} form of H$_2$D$^+$ would be useful to constrain the ages of the cores (\cite{brunken2014}; \cite{harju2017}), and thus the age of the whole parent filament. Also, to better understand the behaviour of the [\textit{o}-${\rm H_2D^+}]/[{\rm N_2D^+}]$ evolutionary indicator proposed by Giannetti et al. (2019), observations of D$_2$H$^+$ would be useful to investigate the importance of the deuteration sequence ${\rm H_3^+}\rightarrow {\rm H_2D^+}\rightarrow {\rm D_2H^+}$ in dense cores destined to become new stars. \begin{acknowledgements} I thank the referee for the critical comments and suggestions. I am grateful to the staff at the APEX telescope for performing the service mode LAsMA observations presented in this paper. I would also like to thank S\'ebastien Bardeau and S\'ebastien Maret for the help with the GILDAS software package. This research has made use of NASA's Astrophysics Data System Bibliographic Services. This research made use of {\tt Astropy}\footnote{\url{http://www.astropy.org}}, a community-developed core Python package for Astronomy (\cite{astropy2013}, \cite{astropy2018}). \end{acknowledgements}
\section{Introduction} A new era of multi-messenger astronomy has started with the detection of gravitational waves (GW) from a binary neutron star merger (GW170817) by advanced LIGO/advanced Virgo~\cite{abbott17a,abbott17b}, followed by broadband electromagnetic (EM) observations \cite{abbott17c}. Binary systems involving a neutron star (NS) are the most likely sources for such simultaneous detections of GW and EM signals. In this context, EM emissions from the relatively cleaner environment preceding the merger could provide crucial information about the merger process, sky localization of the source, and the physical parameters of the system, which cannot be accurately obtained only by the gravitational-wave observation. The NS in the binary is generally expected to possess an approximately dipolar magnetic field, and they are likely to be surrounded by a force-free magnetosphere. The source for the precursor EM counterparts comes fundamentally from the orbital and rotational energy of the binary and its individual constituents. This kinetic energy is first electromagnetically extracted from each compact object, by means of the surrounding plasma, and later re-processed within the magnetosphere to produce the observable emissions. Starting from the pioneering work of Goldreich \& Julian \cite{goldreich} and Blandford \& Znajek \cite{Blandford}, the mechanisms to tap rotational energy from a compact object (immersed in a tenuous plasma) were unveiled: while an NS admits a classical electrodynamics interpretation as a \textit{Faraday disk}, for a spinning black hole (BH) the energy is instead extracted in a form of generalized Penrose process, widely known as the \textit{Blandford-Znajek mechanism}. For the orbital motion, on the other hand, there are two such extraction mechanisms identified. The first one is associated with a purely classical effect, produced by the acceleration of a magnetic (e.g.,~dipole) moment \cite{landau1975}. The EM energy loss rate from the motion of a single NS with a dipole magnetic field, as well as for two NSs in a binary, has been estimated (assuming vacuum) in \cite{ioka2000}. The second mechanism is known as \textit{unipolar induction}, which essentially captures the transfer of linear momentum into EM energy, due to the motion of a conductor (or compact object) through a magnetized medium. This effect has been studied long time ago for moving conductors such as satellites (see, e.g.,~\cite{1965drag, goldreich1969}), later extended to NS binaries~\cite{hansen2001,lyutikov2011electro,lai2012dc,piro2012}, and also generalized for BHs, relying on ideas from the membrane paradigm \cite{thorne} to build a circuit model in black hole-neutron star (BHNS) binaries \cite{mcwilliams2011, lyutikov2011electro, lai2012dc, d2013big}. For a BHNS binary, one might associate the moving magnetic dipole (MD) effect with orbital energy being extracted from the NS, while the unipolar induction (UI) mechanism would operate to remove energy from the BH as it moves across the magnetic field of the NS. In a neutron star-neutron star (NSNS) system, on the other hand, both mechanisms are expected to operate together at each NS, with intensities depending mainly on their relative magnetizations. That is, each star could produce the MD effect due to the orbital motion of its own magnetic moment, and could operate as UI as it moves across the magnetic field of its companion. Of course this is only schematic and non-trivial superposition of these two mechanisms, along with other possible effects (like, e.g., magnetospheric flares \cite{most2020}), would complicate the picture. The relative orientations of the magnetic moments (with respect to the orbital plane, and among them in the case of NSNS) and the role played by the spin of each compact object, complicates things even further. Simulations of compact NS binaries in full general relativity (GR), paying attention to precursor EM signals, has been carried out (see, e.g.,~\cite{paschalidis2017} for a review). Late-time inspiral phases of NSNS were considered in \cite{palenzuela2013electromagnetic, palenzuela2013linking, ponce2014} using general relativistic force-free (GRFF) simulations, broadly matching ideal magnetohydrodynamics (MHD) stellar interiors with an exterior force-free magnetosphere. Also, BHNS binary systems at fixed orbital separation --with and without BH spin-- were studied in \cite{paschalidis2013}, relying on a similar GRFF numerical approach. Overall, the EM luminosity found was consistent with estimations from the UI model\footnote{This holds only prior to the last few orbits before the merger in \cite{palenzuela2013electromagnetic, palenzuela2013linking, ponce2014}, in which the dynamics becomes more violent and nonlinear.} and the Poynting flux distributions were analyzed in both scenarios. Even though the MD mechanism has been mentioned in these articles as contributing into the total computed luminosity, typically less attention has been devoted to this effect in the literature as compared to the UI mechanism. For NSNS binaries, further magnetospheric properties such as the formation of current sheets (CS) were reported \cite{palenzuela2013electromagnetic, palenzuela2013linking, ponce2014}, considering different relative magnetic strengths and orientations. However, in these previous studies, the details of the magnetosphere and the EM signals associated with its structure have not been considered in great depth. One of the most challenging aspects of the problem is how --and how much of-- the available energy transferred to the plasma produces the emissions on the different EM bands. Even for pulsars, for which the attempts to understand the principal magnetospheric properties has been done for many decades (e.g.,~\cite{contopoulos1999, mckinney2006relativistic, timokhin2006force, spitkovsky2006}), an ultimate answer to this question still remains elusive, although, of course, a lot can be learned from the development of pulsar theory in this respect (e.g.,~\cite{bai2010, uzdensky2013}). In recent years, there has been significant progress on particle-in-cell (PIC) simulations, which self-consistently model the regions of plasma production and particle acceleration (see, e.g.,~\cite{kalapotharakos2018, philippov2018, philippov2019pulsar}). In this paper, we aim to further clarify the properties of the magnetosphere around an NS in a compact binary system. We consider a single NS with dipolar magnetic fields and surrounded by a force-free plasma, in orbital motion. Our NS follows a trajectory, in flat spacetime, which mimics that of an NS about the center-of-mass (CoM) on a particular binary system. This way, we pay our attention to the MD energy extraction process and how this EM energy gets distributed within the magnetosphere; in a sense, decoupling it from the UI mechanism (or other curvature effects) involved in the binary. Such simplified setting allow us to conduct rather inexpensive, very accurate, numerical simulations for a detailed study of these systems. In particular, we investigate their magnetospheric features in close analogy to those of pulsars. And then, we use recent results of pulsar theory to infer possible EM signals from our numerical results. We see the expected $\gamma$ and $X$ rays luminosities estimated from the orbiting NS are rather weak, rendering their possible detections by current and near future facilities quite unlikely. And thus, as observed in \cite{lyutikov2018electro}, the best chance to detect EM precursor signals from the inspiral phase of compact binary systems is from magnetospheric pulsar-like configurations producing coherent radio emission. The code used here to evolve the equations of force-free electrodynamics was first described in~\cite{FFE2}; and later extended in~\cite{NS}, where a careful treatment to handle the boundary conditions on the NS surface was presented, in contrast to the matching procedure used in previous GRFF simulations~\footnote{It is not clear whether such matching employed in the GRFF simulations can accurately represent the (approximately) perfectly conducting NS surface, which is the key condition for describing the magnetosphere around the NS.}. Since then, our code has been further tested and employed in other astrophysical scenarios \cite{Boost,Magnetar}, as well. The paper is organized as follows. In Sec.~II we setup the problem and describe our numerical implementation. The results are presented in Sec.~III, first focusing on the magnetospheric properties of an NS in circular orbits, and then following inspiral trajectories associated with BHNS and NSNS binaries. Then, possible observational implications of our results are discussed. We summarize and conclude in Sec.~IV. Throughout this paper, $G$ and $c$ denote the gravitational constant and the speed of light, respectively. \section{Setup} \subsection{General Setting} The purpose of this paper is to clarify the magnetosphere around an NS in a compact binary system. Here we suppose that only the NS has a strong magnetic field and the magnetic field of its companion is much weaker. This is trivial for the BHNS case and would be a good approximation for the NSNS case because the first born NS in NSNS systems is likely to be weakly magnetized \cite{tauris2017}. We shall also assume that the spacetime is flat and that the NS moves on a given trajectory centered around the origin of a Cartesian coordinate system $x^a = \{t,x,y,z\}$, which would represent the CoM of the binary system. The line element in this coordinates reads, \begin{equation}\label{eq:flat} ds^2 = -dt^2 + dx^2 + dy^2 + dz^2, \end{equation} thus, with $\alpha=1$, $\beta^i =0$ and $\gamma_{ij}=\delta_{ij}$ representing the lapse, shift and spatial metric, respectively. The trajectory is defined here by the radial distance $R_o (t)$ and the phase $\varphi_o (t)$ (being $\Omega_o (t) \equiv \dot{\varphi_o} (t) $ the associated angular velocity). However, our numerical domain will be centered on the NS instead, thus describing the dynamics from an adapted foliation with coordinates $\hat{x}^a = \{\hat{t},\hat{x},\hat{y},\hat{z}\}$ (see Fig.~\ref{fig:frames}). \begin{figure}[t] \centering{ \includegraphics[scale=0.7]{foliations.png} \caption{\textit{Foliations and coordinates.} The two set of coordinates are illustrated, together with the worldlines of the NS (in red) and CoM (in black).} \label{fig:frames}} \end{figure} The coordinates transformation into this ``co-moving" foliation is defined by: \begin{eqnarray} && t = \hat{t}, \quad z = \hat{z}, \nonumber \\ && x = \hat{x} + R_{o}(\hat{t}) \cos (\varphi_o (\hat{t})), \\ && y = \hat{y} + R_{o}(\hat{t}) \sin (\varphi_o (\hat{t})), \nonumber \end{eqnarray} and thus, \begin{eqnarray*} && dt = d\hat{t}, \quad dz = d\hat{z}, \\ && dx = d\hat{x} + \left[ \dot{R}_{o}(\hat{t}) \cos (\varphi_o (\hat{t})) - R_{o}(\hat{t}) \Omega_{o}(\hat{t}) \sin (\varphi_o (\hat{t}) ) \right] d\hat{t}, \\ && dy = d\hat{y} + \left[ \dot{R}_{o}(\hat{t}) \sin (\varphi_o (\hat{t})) + R_{o}(\hat{t}) \Omega_{o}(\hat{t}) \cos (\varphi_o (\hat{t}) ) \right] d\hat{t}, \end{eqnarray*} Therefore, the line element \eqref{eq:flat} in the new coordinates is, \begin{equation}\label{eq:metric} d\hat{s}^2 = \left( \hat{\beta}^2 - \hat{\alpha}^2 \right) d\hat{t}^2 + 2 \hat{\beta}_i d\hat{x}^i d\hat{t} + \hat{\gamma}_{ij} d\hat{x}^i \hat{x}^j, \end{equation} where again $\hat{\alpha}=1$ and $\hat{\gamma}_{ij} = \delta_{ij} $. However, there is now a non-vanishing shift vector accounting for the difference among the NS worldline tangent $\hat{t}^a$, and the hypersurface normal $\hat{n}^a$ in this foliation. That is, \begin{equation*} \hat{\beta}^i = \left\lbrace \dot{R}_o \cos \varphi_o - v_o \sin \varphi_o , \dot{R}_o \sin \varphi_o + v_o \cos \varphi_o, 0 \right\rbrace, \end{equation*} where we have dropped all time dependencies and defined $v_o := R_o \Omega_o$ to simplify the notation. We will consider essentially two types of trajectories in this work: (i) a purely circular motion at a constant radius $R_o$ and orbital frequency $\Omega_o$; and (ii) quasi-circular inspiral orbits which mimic those of an NS in a binary system close to merger. The boundary condition at the stellar surface is derived by assuming the perfectly conducting condition, \begin{equation} 0 = F_{ab} \hat{t}^a = F_{ab} ( \hat{\alpha} \hat{n}^a + \hat{\beta}^a ), \end{equation} which can be easily generalized to incorporate the NS spin at frequency $\Omega_*$ by, \begin{equation} F_{ab} ( \hat{t}^a + \Omega_* \hat{\phi}^a ) = 0, \end{equation} where $\hat{\phi}^a \equiv (\partial_{\hat{\phi}})^a $. Thus, the resulting condition on the electric field measured by a fiducial observer in this adapted foliation (i.e. $\hat{E}_a := F_{ab} \hat{n}^a$), can be written: \begin{equation}\label{eq:BC} \hat{E}^i = \epsilon^{i}_{\phantom{i}jk} (\hat{\beta}^j + \Omega_* \hat{\phi}^j ) \hat{B}^k . \end{equation} The initial configuration is taken to be a magnetic dipolar field (of dipole-moment $\mu$) and vanishing electric field. The NS is gradually set in motion (at fixed $R_{o,0}$) until it reaches the desired initial orbital frequency $\Omega_{o,0}$ after some time $t=t_0$; from then on, the system follows its prescribed trajectory. We focus primarily on the cases where the magnetic axis is aligned with the orbital angular momentum, but other scenarios in which these two axis are not aligned are considered as well. In our setup, the $z$ axis is always perpendicular to the orbital plane, so the misalignment is attained by just tilting the magnetic moment by an angle $\chi$ along the $x$-$z$ plane. \subsection{Numerical Implementation} We evolve a particular version of force-free electrodynamics derived in \cite{FFE}, which has some improved properties in terms of well posedness and involves the full force-free current density. More concretely, we shall consider the evolution system given by Eqs.~(8)--(10) in \cite{NS}. Our numerical scheme to solve these equations is based on the \textit{multi-block approach} \cite{Leco_1, Carpenter1994, Carpenter1999, Carpenter2001}, in which the numerical domain is built from several non-overlapping grids where only grid-points at their boundaries are sheared. The equations are discretized at each individual subdomain by using difference operators constructed to satisfy summation by parts. In particular, we employ difference operators which are eighth-order accurate on the interior and fourth-order at the boundaries. Numerical dissipation is incorporated through the use of adapted Kreiss-Oliger operators. These compatible difference and dissipation operators were both taken from \cite{Tiglio2007}. A fourth order Runge-Kutta method is used for time integration. We solve the force-free equations in a region between an interior sphere at radius $\hat{r}=R_*$ that represents the NS surface (i.e., $R_*$ denotes the NS radius), and an exterior spherical surface located at $\hat{r}\sim 75 R_*$. The domain is covered by a total of $6 \times 12$ subdomains, with $6$ patches to cover for the angular directions and $12$ being the number of spherical shells expanding in radius. These spherical shells do not cover regions of identical radial extension, having more resolution near the inner boundary than in the asymptotic region: from layer to layer, the radial resolution is decreased by a factor $1.3$. Typically we adopt a resolution with total grid numbers of $N_{\hat{\theta}} \times N_{\hat{\phi}} \times N_{\hat{r}}$ with $N_{\hat{\phi}} = 2 N_{\hat{\theta}} = 240$, while $N_{\hat{r}}$ is taken so as to satisfy $\Delta \hat{r} \lesssim 0.7 \, \hat{r} \Delta \hat{\theta}$ everywhere in the domain. Here $\Delta \hat{r}$ and $\Delta \hat{\theta}$ denote the grid spacing for $\hat r$ and $\hat \theta$, respectively. As already mentioned, the stellar surface is assumed to behave as an idealized perfect conductor. Thus, the normal component of the magnetic field is set to its dipole value assumed from the stellar interior and the electric field is prescribed according to Eq.~\eqref{eq:BC} in order to represent its orbital motion and spin. The electric field components are imposed, by means of the \textit{penalty method} \cite{Carpenter1994, Carpenter1999, Carpenter2001}, fixing the incoming physical modes to a particular combination of outgoing modes. At the outer boundary, on the other hand, we set maximally dissipative (no-incoming) conditions to allow all perturbations to propagate away. The numerical implementation of such boundary conditions has been detailed in \cite{NS} (in particular, Sec.~II-C and Appendix), so we recommend the interest readers to refer there for further details. In order to handle CS, for which the force-free approximation breaks down, we use a standard approach in which the electric field is effectively dissipated to maintain the condition that the plasma is magnetically dominated (i.e., $B^2 -E^2 >0$), as discussed in \cite{FFE2} (see also \cite{komissarov2004}). \subsection{Analysis Quantities} We would like to monitor the EM energy and its associated fluxes. In force-free electrodynamics the four-momentum, $p^a = -T_{EM}^{ab} t_b$, is conserved (i.e. $\nabla_a p^a = 0$)~\footnote{This equation is satisfied except for CS, where dissipation occurs.} in the stationary spacetime. In the co-moving coordinates $\{ \hat{x}^a \}$, it reads: \begin{eqnarray} p^{a'} &=& - T_{EM}^{a'b'} t_{b'} = - T_{EM}^{a'b'} \hat{n}_{b'} \nonumber\\ &=& \frac{1}{2} ( \hat{E}^2 + \hat{B}^2 ) \, \hat{n}^{a'} - \hat{S}^{a'} . \end{eqnarray} Hence, we measure: \begin{equation*} E(\hat{t}) := \int_{\Sigma_{\hat{t}}} \hat{\mathcal{E}} \sqrt{\hat{\gamma}}\, d^{3}\hat{x} \text{, }\quad L (\hat{t}, \hat{r}) := \oint_{\hat{r}} \hat{\mathcal{F}}_E \, \sqrt{-\hat{g}} \, d^{2}\hat{x}, \end{equation*} where the Poynting luminosity $L$ is integrated on spherical surfaces of radius $\hat{r}$ around the NS and, \begin{eqnarray} \hat{\mathcal{E}} &:=& -p^{a'} \hat{n}_{a'} = \frac{1}{2} ( \hat{E}^2 + \hat{B}^2 ), \\ \hat{\mathcal{F}}_E &:=& p^{a'} (d\hat{r})_{a'} = - \frac{1}{2} ( \hat{E}^2 + \hat{B}^2 ) \, \hat{\beta}^{\hat{r}} - \hat{S}^{\hat{r}} , \end{eqnarray} with $\hat{S}^{i} := \epsilon^{ijk} \hat{E}_j \hat{B}_k$ being the spatial Poynting vector. We are also interested in monitoring the charge distribution and electric currents present during the dynamics. Thus, we shall look at the force-free current density along the magnetic field, as seen by a fiducial observer $\hat{n}^{a}$, \begin{equation} \hat{j}_{\parallel} = (\hat{B}_k \hat{\beta}^k) \hat{\rho}_c + \hat{B}_k \mathcal{D}_j H^{kj} + \hat{E}_k \mathcal{D}_j G^{kj} , \end{equation} where we denoted $\mathcal{D}_{j}(\cdot):=\frac{1}{\sqrt{\hat{\gamma}}} \partial_{j}( \sqrt{\hat{\gamma}} ~ \cdot ~)$ and, \begin{eqnarray} H^{ij} &:=& \hat{E}^{i} \hat{\beta}^{j} - \hat{E}^{j} \hat{\beta}^{i} + \epsilon^{ijk} \hat{B}_{k}, \\ G^{ij} &:=& \hat{B}^{i} \hat{\beta}^{j} - \hat{B}^{j} \hat{\beta}^{i} - \epsilon^{ijk} \hat{E}_{k}, \end{eqnarray} with $ \hat{\rho} = \mathcal{D}_j \hat{E}^j $ being the charge seen by this observer. Actually, it is worth mentioning at this point that since in this case $n^{a}$ and $\hat{n}^{a}$ represent exactly the same vector field, the splitting of the electromagnetic tensor in its magnetic and electric components is the same. Hence, the switch from one description to the other in terms of the electric and magnetic fields is quite direct. Since the vector transformation for the spatial index is trivial, one is only left with the appropriate displacement of the point where the field is evaluated. Therefore, although we employ the NS frame $ \{ \hat{x}^a\}$ to evolve the fields, we use the ``CoM'' coordinates $ \{ x^a\}$ to plot all the relevant quantities and describe our results. We also consider the Lorentz invariant quantity, \begin{equation}\label{eq:currents} \varrho := \pm \sqrt{|\rho^2 c^2 - j^2 |}, \end{equation} where the sign is chosen plus for timelike and minus for spacelike currents, as in \cite{bai2010}. Counter-streaming of different signs of charge is required at regions having negative values of this quantity, which may lead to plasma instabilities and dissipation (see, e.g.,~\cite{lyubarskii1996, gruzinov2008, bai2010}). \section{Results} Our interest in this work is centered on the last few orbits of an NS on a compact binary system, until the orbit reaches an innermost stable circular orbit or the NS gets tidally disrupted. Thus, we start by a detailed study of the magnetospheric properties of the NS in a circular orbit, choosing parameters in a relevant range: i.e., $R_o \sim (2$--$6) R_* $ and $ v_o := R_o \Omega_o =(0.1$--$0.4) \, c$. We first focus on the case in which the magnetic moment is aligned to the orbital angular momentum (i.e., $\chi=0$) and the NS is not spinning (i.e., $\Omega_* = 0 $). Our simulations always relax to stationary states presenting similar features to those of pulsar magnetospheres, with strong equatorial CS. We analyze the electric charge/current distributions of the surrounding plasma, along with the resulting Poynting flux luminosity inside the orbital light cylinder. A comparison with vacuum magnetospheres, within the same setting, is also included here. Then, both NS spin and the misalignment of the magnetic axis are incorporated into the picture. We vary these parameters (i.e., $\Omega_*$ and $\chi$) independently, and observe their impact on the solutions. Later, we consider representative quasi-circular inspiral orbits, taking relevant values for the parameters in the contexts of BHNS and NSNS binaries, and connecting with our previous luminosity estimations. Finally, we elaborate on the implication of our results to EM observations. \begin{figure*}[!ht] \centering{ \includegraphics[scale=0.22]{B1-RHOc5_3D_b.png} \includegraphics[scale=0.22]{B1-BP-CS_3D_d.png} \caption{\textit{Magnetosphere for a circular orbit with $R_o \Omega_o = 0.25 c$ and $R_o = 2.5 R_*$ ($\chi=0$, $\Omega_* =0$) after 3 periods.} Left panel: representative magnetic field lines (with the colors indicating its magnitude in logarithmic scale); along with two contours of the electric charge density, normalized by the Goldreich-Julian value $\Omega_o B/2\pi c$. Right panel: normalized toroidal component of the magnetic field, $B^{\phi}/B$, at the $y=0$ plane; together with a contour of $B^2 - E^2 \sim 0.04 \, B^2$ (in gray), signaling the presence of an spiral CS over the orbital plane. Same representative magnetic field lines are also indicated in the figure (in solid black). } \label{fig:CS}} \end{figure*} \subsection{Circular Orbits with no spin} First, we consider the case in which the NS is in a circular orbit with no spin. In numerical computation, the NS is set into circular orbital motion by gradually bringing the angular frequency to its final value $\Omega_o$. The motion generates disturbances on the EM field that propagates into the surrounding plasma; when these waves return to the NS surface, they are reflected due to the perfectly conducting boundary condition. After an initial transient of about 2 orbits, these perturbations --continuously injected from (and reflected at) the stellar surface-- equilibrate within the magnetosphere and lead to a quasi-stationary solution. Such configuration is illustrated by the 3D plots in Fig.~\ref{fig:CS}, where several representative magnetic field lines are shown. The injected Alfven waves twist the magnetic field lines, as the non-spinning NS follows the circular orbit, producing a pattern of alternate signs on their toroidal components, like the one depicted in the right panel of Fig.~\ref{fig:CS}. Waves launched from magnetic footprints in opposite hemispheres of the star meet at the dipole equator, inducing sharp discontinuities on the toroidal field across the orbital plane. These discontinuities form an spiral CS, which is represented by the contour plots in the figures. Electric field is being effectively dissipated at these regions, in order to locally maintain a state in which $B^2 - E^2 \gtrsim 0$. This is a rather standard strategy employed in force-free electrodynamics simulations to avoid violations of the magnetic dominance condition $B^2 - E^2 > 0$ (see \cite{komissarov2004} for a physical justification). Thus, a small value of this Lorentz invariant quantity is a convenient indicator to illustrate CS in this context (right panel). On the other hand, left panel of Fig.~\ref{fig:CS} shows that intense charge density (exceeding the Goldreich-Julian value) develops at the CS, possessing two main components of opposite sign over the spiral arms. As can be noticed, magnetic reconnection take place near the transition from negative to positive charge, producing and ejecting closed magnetic loops outwards. The spiral structure of the magnetic field, clearly manifest on the equatorial CS, is also found for other relevant quantities such as electric charge/currents and Poynting flux density distributions; thus, reflecting the helical symmetry of the problem in this particular setting. The EM solution looks essentially static from a co-rotating frame. As we shall see in more detail later, these configurations resemble in many aspects those of pulsar magnetospheres, with CS outside the wave zone $\sim c/\Omega_{o}$, and energy being extracted (in this case, kinetic energy from the orbital motion) and carried away by the surrounding plasma. \begin{figure \centering{ \includegraphics[scale=0.22]{MAX_orb0025_r301_PF_t25p_LAB_b.png}\\ \includegraphics[scale=0.22]{OHM_orb0025_r301_res61_PF_t25p_LAB_b.png} \caption{\textit{Electromagnetic energy fluxes for a circular orbit with $R_o \Omega_o = 0.25 c$ and $R_o = 2.5 R_*$ ($\chi=0$, $\Omega_* =0$).} Radial Poynting flux distribution (color scale) and magnetic field topology (solid lines) after $2.5$ periods, for vacuum (top panel) and force-free (bottom panel) magnetospheres are shown on the $y=0$ plane. The NS is located at $x=-R_o$ and $z=0$. (Note that $R$ in the figures denotes $R_*$). } \label{fig:comp_PF}} \end{figure} Figure \ref{fig:comp_PF} shows the topology of the magnetic field lines after $2.5$ orbits on the $y=0$ plane (i.e., the one containing both the NS and CoM). Vacuum and force-free solutions are included for a comparison. We remark that even though the driving mechanism is the same (i.e., the effect of a moving MD moment) and both system produce comparable radial Poynting flux intensities (shown in color scale in the figure), the presence of the plasma changes the topology of the magnetic field and the form in which the EM energy is distributed and transported. In particular, the force-free plasma is essential ingredient for CS formation. We further analyze the Poynting flux distribution of the force-free solutions over spherical surfaces located in the outer wave zone. One such EM flux density, after $2.5$ orbits at a sphere of radius $\hat{r} \sim 60 R_*$, is shown in Fig.~\ref{fig:PF_60R}. As can be seen from the plot, the flux is concentrated along a broad beam of $\sim 60$\textdegree$-75$\textdegree \, in the azimuthal direction and within $\sim 60$\textdegree \, from the orbital plane. There is a visible feature in the distribution at $\hat{\theta} \sim 90$\textdegree, reflecting the magnetic reconnections occurring at the equatorial CS. Once the magnetosphere has settled, these structures in the Poynting flux become stationary, just co-rotating with the orbit. And thus, the flow of EM energy produces a lighthouse effect at orbital frequency. Besides the specific details of the distribution presented here, our results are in good qualitative agreement with the ones obtained from GRFF simulations of binary systems involving a non-spinning BH companion \cite{paschalidis2013}, and also for a weakly magnetized NS companion in \cite{palenzuela2013electromagnetic, palenzuela2013linking}. \begin{figure \centering{ \includegraphics[scale=0.6]{NPF_60R.png} \caption{\textit{Angular distribution of the electromagnetic flux for a circular orbit with $R_o \Omega_o = 0.25 c$ and $R_o = 2.5 R_*$ ($\chi=0$, $\Omega_* =0$).} The radial Poynting flux density after $2.5$ orbits is plotted on a spherical surface at radius $\hat{r}\sim 60 R_*$ (i.e., in the wave zone). The flux is normalized with its peak value.} \label{fig:PF_60R}} \end{figure} We integrate the luminosity for the late time solutions at different radius and normalize them with the EM luminosity by the MD radiation formula (see, e.g.,~\cite{ioka2000}), \begin{eqnarray} L_{0} =\frac{4}{15c^5} \mu^2 R_{o}^2 \Omega_{o}^6. \label{eq:zeroth} \end{eqnarray} A typical radial distribution of the luminosity can be seen in Fig.~\ref{fig:L_conv}, where we plot integrated Poynting flux through concentric spheres around the NS, as a function of radius. As in pulsars, the luminosity is constant up to the light cylinder $R_{LC} \equiv c / \Omega_o$, where dissipation at the CS begins. Different numerical resolutions were considered in order to test its convergence. Throughout this work, we have employed the intermediate resolution $N_{\theta} = 120$ for all the simulations, which is practically converging (it differs in less than $4\%$ with respect to the higher resolution one). We note that such resolution required in the present orbital setting is larger than the one we typically needed for pulsars (see Fig.2 in \cite{NS}), where $N_{\theta} = 80$ was enough to resolve even for the misaligned configurations. Notice that dissipation taking place in the region $\hat{r} \sim (1$--$4) R_{LC}$ represents here $65\%$ of the luminosity. These are the typical percentages that we get for most of the circular orbits explored, while the values obtained for pulsars were instead closer to $40\%$ (within the same region)~\footnote{Here, we must emphasize that the amount of dissipation depends on the numerical prescription to deal with CS, where the force-free approximation breaks down. So, this values should only be taken as an indication of how strong these CS are, and not as quantitative astrophysical numbers. For the quantitative study of the amount of dissipation, a different approach like, e.g., PIC simulations would be needed.}. We have also tested our outer boundary conditions, by considering different radial locations for the outer surface of the computational domain. The solutions found at the overlapping regions are essentially identical, both qualitatively and quantitatively. \begin{figure \centering{ \includegraphics[scale=0.33]{L_conv_orb0025_d10.png \caption{\textit{Convergence of the luminosity}. Normalized luminosity, for a circular orbit, as a function of integration radius for three different numerical resolutions, $N_{\theta} = \{ 80, 120, 160 \}$. } \label{fig:L_conv} } \end{figure} The scaling of the total luminosity as a function of the orbital velocity is analyzed and summarized in Fig.~\ref{fig:L_scaling}. For the vacuum magnetosphere we find that $ L/L_0 \approx \gamma_{o}^{11}$ (where $\gamma_o \equiv \displaystyle\frac{1}{\sqrt{1- (v_o /c)^2}}$ is the Lorentz factor of the orbital velocity) approximates the numerical results quite well (perhaps ``accidentally''). \begin{figure \centering{ \includegraphics[scale=0.33]{L_fitting_ffe.png} \caption{\textit{Luminosity for circular orbits in force-free and vacuum cases}. The luminosity normalized by $L_0 := \frac{4}{15} \mu^2 R_{o}^2 \Omega_{o}^6$ as a function of $v_o := R_o \Omega_o$ is shown. The black dots show the numerical force-free values, accompanied by a guideline (see Eq.~\eqref{eq:ffe}) in dashed red. The black crosses refer to numerical data from vacuum solutions, with a reference curve, $\gamma_{o}^{11}$, in grey ($\gamma_o$, being the Lorentz factor).} \label{fig:L_scaling} } \end{figure} On the other hand, the following expression is used as a guideline for the luminosity in the force-free simulations: \begin{eqnarray}\label{eq:ffe} \frac{L}{L_0} &\approx& 1 + 28 \left( \frac{v_o}{c}\right)^2 + 93 \left(\frac{v_o}{c}\right)^4 \nonumber\\ && - 1135 \left(\frac{v_o}{c}\right)^6 + 4814 \left(\frac{v_o}{c}\right)^8 . \end{eqnarray} The error bars in the force-free data indicate certain dispersion found in the values of $L$ within the light cylinder. These errors become more significant at lower values of $v_o$ --as can be expected due to the enlargement of the wave zone--, for which a higher resolution (than the one employed here for all the runs) would be needed. We note that the luminosity does not depend on the other dimensionless parameter of the problem, i.e., $R_o / R_*$. Within our numerical error, we could not find significant deviations on the ratio $L / L_0$, when taking different values of this parameter at fixed $v_o$. \begin{figure* \centering \includegraphics[scale=0.163]{orb0025_d10_B1-RHO_t700_c.png} \includegraphics[scale=0.163]{orb0025_d10_B1-JP_t700_c.png} \includegraphics[scale=0.163]{orb0025_d10_B1-BP_t700_c.png} \caption{\textit{Several quantities for a circular orbit with $R_o \Omega_o = 0.25 c$ and $R_o = 2.5 R_*$ ($\chi=0$, $\Omega_* =0$).} Numerical solution at $t=2.5$ periods on the $y=0$ plane. Black lines in all the plots describe the magnetic field component along the plane. Charge density distribution (left panel) and electric currents along magnetic lines (middle panel) are normalized by $\Omega_o B / 2\pi c$ and $\Omega_o B / 2\pi$, respectively. Right panel: parameter $\varrho$ from Eq.~\eqref{eq:currents} (multiplied by $r^2$ to improve the contrast), showing timelike (blue) and spacelike (red) currents. } \label{fig:co-plane} \end{figure*} The magnetospheric structure after $2.5$ orbital periods is displayed in Fig.~\ref{fig:co-plane}, in which relevant aspects of the solution are represented on the $y=0$ plane (the plane containing both the NS and the CoM). There, electric charge and current distributions are displayed (left and middle panels); as well as the Lorentz invariant quantity $\varrho$ from Eq.~\eqref{eq:currents}. Magnetic field lines projected onto the plane are also shown in all these plots for a reference. First, we notice that similarly to aligned pulsar solutions, there are strong current layers that form a Y-point with the equatorial CS (see middle panel). The magnetic field lines beyond this region are not necessarily open, since the equatorial CS do not extend continuously outside, but instead posses an spiral structure (as previously seen in Fig.~\ref{fig:CS}). In contrast to a spinning NS, we find here that the orbital motion induces a pattern of alternating signs in the charges and parallel currents inside the light cylinder. This is qualitatively consistent with the current distributions shown in Fig.~12 of~\cite{palenzuela2013linking}, especially for the case of a weakly magnetized NS companion ``$U/u$'' where we can interpret this alternate pattern as arising from the orbit (MD) effect and the strong currents connecting the two NSs as representing the UI mechanism. Similar pattern is also found for the quantity $\varrho$ (right panel), meaning that the four-current alternates character from timelike to spacelike, the later being the regions where counter-streaming of charged particles would be expected. Finally, and arguably the most relevant difference of the orbital case with respect to pulsar magnetosphere solutions is the fact that there is almost no charges present nor currents flowing along the magnetic field lines in the polar region of the NS. \subsection{Spin effects}\label{spineff} In order to understand the impact of the NS spin, we shall fix a set of representative parameters for the orbital motion and consider different values for $\Omega_*$. In particular, we pick up an orbit with frequency $\Omega_o = 0.25 c/R_o$ and separation $R_o = 2.5 R_*$, and set the spin to $\Omega_* = \kappa \, \Omega_o $, varying $\kappa$ from $-1$ to $1$. Note that choosing negative values of $\kappa$ corresponds to anti-aligned orbital and spin angular momenta. We measure the luminosity and normalize it with $L_{\rm orb}$, which corresponds to its value for a purely circular orbit at angular velocity $\Omega_o$ (i.e., $\chi=0$, $\Omega_* = 0$). Figure~\ref{fig:L_spin} shows the results, together with a curve (dashed black) that represents an estimation from the simple addition of the orbital and spin contributions (i.e. $L_{\rm orb} + L_{\rm spin}$); and a fitting (red solid line) of the form, \begin{equation} L \approx c^{-5}\mu^2 \Omega_{o}^4 \left[ w_0 + w_1 \kappa + w_2 \kappa^2 + w_3 \kappa^3 + \kappa^4 \right] , \end{equation} where $ w_0 = \frac{4}{15} (v_{o}/c)^2 f(v_{o}/c) \approx 0.042$ comes from the pure orbital part, while the last term represents the pure spin contribution. The other coefficients are fitted from the numerical data, giving: $w_1 \sim 0.06$, $ w_2 \sim 0.35$ and $w_3 \sim 0.23 $. They account for the non-trivial superposition of the two dynamical effects. We note that for the case in which the spin and orbital angular momenta are anti-aligned the resulting luminosity is very close to the direct sum of each contribution, whereas for aligned cases there is an extra enhancement. Also, it is worth mentioning that the orbital motion produces typically much weaker luminosity than the NS spin alone (i.e., pulsars); for this particular setting being $\sim5$\% of the pulsar spin-down luminosity. The reason for this is that the luminosity by the orbital motion is $(v_o / c)^2$ smaller than that by the spin motion from the post-Newtonian viewpoint. On the other hand, we also notice that when the orbit and spin are synchronized, then the pulsar luminosity can be significantly enhanced (for this case, on about $70$\%). In Fig.~\ref{fig:co-plane_sync} we display the charge and current distributions --like the previous plots in Fig.~\ref{fig:co-plane}--, for the case in which the spin is synchronized with the orbit ($\Omega_* = \Omega_o $). As seen before, for the synchronized motion, the spin effect tends to ``dominate'' over the orbital one, thus resulting in a magnetospheric configuration very similar to that of pulsars. Both electric charge and parallel current distributions are consistent with typical aligned pulsar results (see, e.g.,~\cite{bai2010, parfrey2012}): strong current layers manifest as a local enhancement of the parallel current components $j_{\parallel}$ (middle panel), with further currents (of opposite signs for each hemisphere) flowing along the poloidal field lines. Although their intensities are approximately twice stronger than those in the pure spinning setting, in line with the luminosity being about twice larger as well. Another significant difference is again the location of the Y-point at each side of the NS, which we find to be approximately given by, $\hat{r} \approx c/\Omega_o \pm R_o$. Spacelike currents are present (in red color, right panel) along the current layers, surrounding the equatorial CS and also within a small region inside the polar cap. \begin{figure \centering{ \includegraphics[scale=0.33]{Spin_effect_new.png} \caption{\textit{Effects of neutron star spin, $\Omega_*$, on the luminosity.} Luminosity normalized by $L_{0}$ is shown for different values of $\Omega_* / \Omega_o$. The dashed black curve represents a simple superposition of the orbital and spin contributions, while the red solid line is a fitting of the numerical values, capturing the asymmetry due to the aligned/anti-aligned character in angular momenta. } \label{fig:L_spin}} \end{figure} \begin{figure* \centering \includegraphics[scale=0.163]{orb0025_sync_d10_B1-RHO_t700.png} \includegraphics[scale=0.163]{orb0025_sync_d10_B1-JP_t700.png} \includegraphics[scale=0.163]{orb0025_sync_d10_B1-BP_t700.png} \caption{\textit{Several quantities for synchronized orbital motion, with $\Omega_o = \Omega_* = 0.25 c/R_o$ and $R_o = 2.5 R_*$.} Stationary solution after $t=2.5$ periods, on the $y=0$ plane. Charge density distribution (left panel) and electric currents along magnetic lines (middle panel) are normalized by $\Omega_o B / 2\pi c$ and $\Omega_o B / 2\pi$, respectively. Right panel: Lorentz invariant parameter $\varrho$ from Eq.~\eqref{eq:currents} (multiplied by $r^2$ to improve the contrast). Black lines show some representative magnetic field lines along the plane. } \label{fig:co-plane_sync} \end{figure*} \subsection{Misalignment effects} We focus now on the cases in which the magnetic axis is not aligned with the orbital angular momentum. To get the main aspects of the influence of this angle, without exploring the whole parameter space, we shall fix the same parameters $\Omega_o $ and $R_o$ as in Sec.~\ref{spineff}, and consider several angles $\chi = \{$ $0$\textdegree, $30$\textdegree, $60$\textdegree, $90$\textdegree $\}$ for two NS spins, $\Omega_* = \{ 0, \Omega_o \} $. These two limiting cases display very different behaviors, as shown in Fig.~\ref{fig:L_misaligned}: for the synchronized motion with $\Omega_* = \Omega_o$ (bottom panel) the spin effect completely dominates --as expected from the previous section results--, and thus, the resulting luminosity resembles that of an oblique pulsar, i.e., $ L \approx L(\chi=0) \left( 1 + \sin^2 \chi \right) $ (see, e.g., \cite{spitkovsky2006}). On the other hand, in the pure orbital setting, $\Omega_* = 0$ (top panel), the luminosity at a given radius exhibits a strong phase dependency~\footnote{ Note that such phase modulations also appear in the analytic estimations for vacuum magnetospheres, arising from a term proportional to $(\vec{\mu}\cdot \dot{\vec{a}})^2$ (see the second term of Eq.~(A6) in~\cite{ioka2000}).}. Inside the region given by $\hat{r} \lesssim c/\Omega_o$, this can be modeled quite well with, $L \approx L(\chi=0) \, \left( 1 + 0.5 \, \sin^2 \chi \right) \left( 1 - 0.93 \, \sin^2 (\Omega_o t) \, \sin^2 \chi \right) $. Figure~\ref{fig:co-plane_misaligned} illustrates the magnetosphere with $\Omega_* = 0$, after $2.5$ orbits, for three misalignment angles. Although the configurations are intrinsically three-dimensional, some insight can be gained from considering them at the co-orbiting plane (defined by the orbital axis and the vector pointing to the NS from the CoM: in this case, the $y=0$ plane). In color, we represent the electric current component along the magnetic field, together with some representative magnetic field lines projected to the plane. Alternate patterns on the currents can be seen again inside the close zone, like in the aligned setting. Such currents become particularly intense ($j_{\parallel} \sim 4 \, \Omega_o B / 2\pi$) at the CS, that oscillates here about the dipole equator. These shapes are reminiscent to those of oblique pulsars, although there the CS oscillate about the rotational equator instead. Finally, we notice that for the orthogonal case (i.e., $\chi=90$\textdegree) the CS looks steady and smooth, in contrast to the intermediate inclinations for which there are signs of magnetic reconnection activity and plasmoids~\footnote{This fact should be taken with some caution, since it may be indicating lack of numerical resolution/dissipation.}. \begin{figure \centering{ \includegraphics[scale=0.33]{L_misaligned.png}\\ \includegraphics[scale=0.33]{misaligned_orb0025_d20_sync.png} \caption{\textit{Effects of misalignment $\chi$ on the luminosity.} The two limiting cases, $\Omega_* = 0$ and $\Omega_* = \Omega_o$, are considered. \textbf{Top panel ($\Omega_* = 0$):} luminosity computed at a given radius (inside the wave zone), as a function of time. Luminosity is normalized with, $L_n := L(\chi=0) \, \left( 1 + 0.5 \, \sin^2 \chi \right) $. Symbols represent the numerical values, while the solid curves corresponds to a fitting: $L/L_n \approx \left( 1 - 0.93 \, \sin^2 (\Omega_o t) \, \sin^2 \chi \right) $. \textbf{Bottom panel ($\Omega_* = \Omega_o$):} comparison of the constant luminosity inside the light cylinder at different misalignment's, showing a pulsar behavior: $ L / L(\chi=0) \approx \left( 1 + 0.95 \, \sin^2 \chi \right) $. } \label{fig:L_misaligned}} \end{figure} \begin{figure* \centering \includegraphics[scale=0.163]{OHM_orb0025_d10_deg30_res61_B1-JP.png} \includegraphics[scale=0.163]{OHM_orb0025_d10_deg60_res61_B1-JP.png} \includegraphics[scale=0.163]{OHM_orb0025_d10_deg90_res61_B1-JP.png} \caption{\textit{Effects of misalignment on the magnetosphere with $\Omega_* = 0$.} Parallel electric currents, $ 2\pi j_{\parallel} / \Omega_o B $, on the $y=0$ plane after $2.5$ orbits are shown in color scale, for angles $ \chi = 30$\textdegree (left panel), $ \chi = 60$\textdegree (middle panel) and $ \chi = 90$\textdegree (right panel). Black lines show some representative magnetic field lines along the plane. } \label{fig:co-plane_misaligned} \end{figure*} \subsection{Inspiral Orbits} In this section, we analyze the evolution of the luminosity during the late stages of an inspiral orbit. Even though in this paper we are not including curvature effects, we shall mimic the inspiral phase of a binary system by taking relevant astrophysical parameters to set the NS trajectory around the CoM. To that end, we consider similar parameters to those used in \cite{paschalidis2013}. Specifically, we take the mass ratio of the BHNS binary to be $q=M_{\rm BH}/M_{\rm NS} = 3$, with $M_{\rm NS} = 1.4 M_{\odot}$ and stellar compactness, $\mathcal{C} \equiv G M_{\rm NS} / c^2 R_* = 0.2$. The total mass is thus given by $M= 5.6 M_{\odot}$. Instead, for the BNS trajectory we take an equal mass system, i.e., $q=1$, and hence, $M= 2.8 M_{\odot}$. Assuming quasi-circular inspiral orbits, the angular frequency evolves approximately according to~\cite{ShapiroTeukolsky}, \begin{equation} \Omega_{o}(t) = \left[ \Omega_{o,0}^{-8/3} - \frac{256}{5} \frac{G^3}{c^5} \frac{q M^{5/3}}{(1+q)^2} (t-t_0 ) \right]^{-3/8} , \end{equation} with $\Omega_{o,0}$ being the initial orbital frequency at $t=t_0$. Our orbital radius then reads, \begin{equation} R_o (t) = \frac{q}{1+q} \left( \frac{G M}{(\Omega_{o}(t))^2}\right)^{1/3} , \end{equation} where we used $ \Omega_o = \displaystyle\sqrt{\frac{G M}{a^3}}$ with the orbital separation, $a$, through $R_o \equiv \displaystyle\frac{q}{1+q} a$. We start from a quasi-stationary initial configuration with $R_{o,0} \simeq 5.5 R_* $ (and its corresponding $\Omega_{o,0}$) at $t=t_0$, following the inspiral evolution from that moment on, until reaching a final radius $R_{o} \sim 2 R_* $. The expected disruption radius in our setting would be $R_{o}^{\rm dis} \simeq 2.4 R_* $, as estimated \cite{paschalidis2017} from $a^{\rm dis} \simeq 3 M_{\rm BH} \left( \mathcal{C}/0.2\right)^{-1} \left( q/7\right)^{-2/3} $. The evolution of the luminosity during the trajectory for several extraction radii is shown in Fig.~\ref{fig:L_inspiral} (top panel), where time is presented in physical units and relative to $t_{\rm d}$; the time for which the estimated disruption radius $R_{o}^{\rm dis}$ is attained. The luminosity is given in physical units, as well, for a typical magnetic field strength at the stellar pole of $10^{12}$\,G. Since luminosity scales exactly as $B^2$ in force-free electrodynamics, their values can be re-scaled by $B_{12}^2 \equiv \displaystyle \left(\frac{B}{10^{12}\,{\rm G}}\right)^2 $, as indicated in the plot. From the initiation of the inspiral motion, the luminosity is no longer constant inside the light cylinder $\sim c/\Omega_o (t)$, since the rising of the luminosity initiates at the star and it takes some time to propagate outwards. This is clearly seen from different curves representing integration of the flux at several spheres enclosing the NS. Note that the luminosity measured at $\hat{r} = 50 R_*$ departs from the other values from the very beginning, reflecting the fact that a significant fraction of the Poynting flux gets dissipated at the CS. Such difference is further enhanced later, reaching $\sim 2$ orders of magnitude (with respect to the value at $\hat{r}=5R_*$), by the time-delay effect already mentioned. The extra (black dashed) curve, included in the plot, depicts the predicted/estimated values from our previous results of stationary circular orbits (see Eq.~\eqref{eq:ffe}). It can be noted that such estimated curves match with the dynamical results quite well (especially when the comparison is made taking the values at the integration radius close to $\sim c/\Omega_o (t)$), suggesting that the time-scale of the magnetospheric response is comparable to the inspiral one during the whole evolution. \begin{figure \centering{ \includegraphics[scale=0.33]{Inspiral_q3.png}\\ \includegraphics[scale=0.33]{Inspiral_q1.png} \caption{\textit{Evolution of the luminosity for inspiral quasi-circular orbits along two inspiral trajectories}. The luminosity is measured at representative spheres enclosing the NS, at radius $\hat{r} = \{ 5, 10, 20, 50 \} R_* $. The parameters defining the orbits are a mass ratio $q=3$ and total mass $M= 5.6 M_{\odot}$ for the BHNS trajectory (top panel); and $q=1$ with $M= 2.8 M_{\odot}$ for the BNS case (bottom panel). } \label{fig:L_inspiral}} \end{figure} In Fig.~\ref{fig:PF} we illustrate the three-dimensional (radial) Poynting flux density along the inspiral BHNS trajectory. The values have been normalized with $L_0 (t) /4\pi r^2$, for better visualization and to facilitate the comparison among the different snapshots. We find that --as in the stationary circular orbits-- the flux distribution through a sphere of radius $r= c/\Omega_{o}(t)$ remains broadly unchanged, only rotating at the orbital frequency $\Omega_o (t)$. The outgoing fluxes outside the ``instantaneous light cylinder'', i.e., $c/\Omega_{o}(t)$, forms spiral structures over the $x$-$y$ plane(s), producing the equatorial CS (with magnetic reconnections) as these Alfven fronts propagate outwards. \begin{figure* \centering \includegraphics[scale=0.163]{inspiral_q3_PF_t1000_d.png} \includegraphics[scale=0.163]{inspiral_q3_PF_t2000_d.png} \includegraphics[scale=0.163]{inspiral_q3_PF_t2460_d.png} \caption{\textit{Poynting flux for inspiral quasi-circular orbit of a BHNS binary with mass ratio $q=3$ and total mass $M= 5.6 M_{\odot}$.} Snapshots of the Poynting flux normalized by $L_0 (t) / 4\pi r^2$ at three stages, $t-t_d = \{-12.7, -4.1, -0.1 \}$ ms, during the inspiral trajectory are presented. Projections on several slices (i.e., $x=0$, $y=0$, $z=-c/\Omega_{o}(t)$ and $r= c/\Omega_{o}(t) $) are displayed, to illustrate its three-dimensional distribution. The state of the system at each snapshot can be described as follows: $a \sim 6.6 R_*$, $v_o \sim 0.26 c$ and $c/\Omega_o \sim 19 R_*$ (left panel); $a \sim 5.1 R_*$, $v_o \sim 0.3 c$ and $c/\Omega_o \sim 12.9 R_*$ (middle panel); $a \sim 3.3 R_*$, $v_o \sim 0.37 c$ and $c/\Omega_o \sim 6.7 R_*$ (right panel). } \label{fig:PF} \end{figure*} We now estimate how the inclusion of curvature (associated to both the NS and the BH) can impact on the luminosity. To that end, we shall pick up a state at an orbital separation of $a\approx 6.6 R_*$ (represented in the middle panel of Fig.~\ref{fig:PF}) and compare its luminosity with the results reported in \cite{paschalidis2013} for essentially the same parameters. Our results show $L \approx 2.4 \times 10^{39} \, B_{12}^2 \, {\rm erg/s}$, which should be associated in our case exclusively to the MD acceleration mechanism. On the other hand, they obtained $L\approx 6.2 \times 10^{40} \, B_{12}^2 \, {\rm erg/s}$, for the case where both compact objects were non-spinning. Hence, taken at face value, one might say that the luminosity is enhanced by a factor $\sim 25$ due to curvature effects. However, a few important considerations are necessary. First, in \cite{paschalidis2013} the luminosity is measured at large distances, $r\gtrsim 90 R_*$, and not inside the light cylinder where we compute it. As we found dissipation at CS outside the light cylinder, the comparison is not direct, and perhaps even slightly larger luminosity could be expected at the light cylinder when curvature is accounted for. On the other hand, it is not very clear how to disentangle from different curvature effects like unipolar induction, estimated in this context to give $L_{UI} \approx 6.4 \times 10^{39} \, B_{12}^2 \, {\rm erg/s}$ \cite{paschalidis2013}. Similarly to the BHNS binary scenario, we also follow the evolution of the luminosity for an equal mass BNS system (see bottom panel of Fig.~\ref{fig:L_inspiral}). The trajectory is evolved from an orbital separation $a_i \sim 6 R_*$ up to a final one $a_f \sim 3 R_*$ (which sets the reference time $t_f$). Thus, we consider a complementary dynamical range with respect to the one studied in \cite{palenzuela2013electromagnetic, palenzuela2013linking, ponce2014}, where the simulations begins at about our final orbital separation and proceeds though the late inspiral phase until (and after) the merger. Although a comparison of the luminosity here is not as direct as before, we can estimate from their case ``$U/u$'' of a weakly magnetized companion, $L\approx 10^{42} \, B_{12}^2 \, {\rm erg/s}$ at orbital separation $a\sim 3 R_*$, whereas we obtain $L \approx 10^{41} \, B_{12}^2 \, {\rm erg/s}$. Therefore, the enhancement attributed to the effects of curvature is again approximately an order of magnitude. \subsection{Implication to observation} Here, we briefly discuss the implications of our numerical results. As shown in Sec.~III A, CS are always developed in the local wave zone, near the radius $c/\Omega_o$, for orbiting NSs. This feature is shared with the pulsar magnetosphere, for which CS are also developed just outside the light cylinder at radius $\agt c/\Omega_*$. This suggests that some EM signals similar to the ones in pulsars are likely to be emitted from the orbiting NSs, even in the absence of NS spin. In the following, we estimate the luminosity of the EM signals referring to the latest studies of magnetospheric emissions from pulsars. Before going ahead, we show approximately how much EM energy can be emitted in total during the inspiral phase. For this estimate, we simply employ Eq.~\eqref{eq:zeroth} with the orbital evolution determined by the Newtonian gravity plus gravitational radiation reaction via quadrupole formula as (e.g.,~\cite{ShapiroTeukolsky}) \begin{eqnarray} \dot a=-{64G^3M^3 \eta\over 5 a^3 c^5}, \end{eqnarray} where $\eta$ is the symmetric mass ratio, i.e., the ratio of the reduced mass to the total mass, $M$, of a binary and written as $q/(1+q)^2$. Then, the maximum total energy dissipated in EM waves is calculated as, \begin{eqnarray} \int_{t_i}^{t_f} L_0 dt &=& -\int_{a_i}^{a_f}L_0 {5 a^3 c^5 \over 64G^3M^3\eta} da \nonumber \\ &=& {B^2R_{*}^3 q \over 64} \left({R_{*} \over a_f}\right)^3 \nonumber \\ &\approx&2 \times 10^{39}\,{\rm erg} \left({B \over 10^{12}\,{\rm G}}\right)^2 \left({R_* \over 12\,{\rm km}}\right)^6 \nonumber \\ &&~~~~~~~~~~\times \left({a_f \over 42\,{\rm km}}\right)^{-3} \left({q \over 3}\right), \label{eq180} \end{eqnarray} where $B$ is the magnetic-field strength at the pole (i.e., $B=\mu/2R_*^3$), $a_i$ and $a_f$ denote the initial orbital radius at $t=t_i$ and the orbital radius at the onset of merger at $t=t_f$, respectively, and we assume that $a_i \gg a_f$. In this equation, we suppose that $M_{\rm BH} \approx 4.2 M_\odot$, $M_{\rm NS} \approx 1.4M_\odot$, and $a_f \approx 5M$. As we have shown in this paper, the luminosity is enhanced in the close binary orbits, and hence, the total energy emitted could be larger by a factor of several than Eq.~(\ref{eq180}). Nevertheless, Eq.~\eqref{eq180} indicates that for the typical magnetic field strength at the NS pole of $B=10^{12}$\,G, the available energy for the EM signals is at most $\sim 10^{40}$\,erg, and thus, for the observation being possible, the presence of an efficient emission mechanism or unusually high magnetic field strength would be necessary. The latest PIC simulations (e.g.,~\cite{philippov2018}) show that near the so-called Y-point at the light cylinder of the pulsar magnetosphere, CS are developed, and as a result, the reconnection of magnetic field lines is enhanced. In such a region, the magnetic field strength and number density of the electron-positron pair are significantly increased. High-energy electrons and positrons accelerated in the strong magnetic field become the sources of the synchrotron and inverse Compton radiations. Because the particle energy is high, the energy can be extended to the MeV and GeV gamma-ray bands. Such an emission is consistent with the presence of the gamma-ray pulsars observed by {\em Fermi} satellite for the isolated pulsar case~\cite{Fermi2013}. The luminosity of the gamma-ray pulsars could be 1--100\% of the spin-down luminosity of the pulsars. In the present context, the spin-down luminosity should be replaced by the total luminosity of the orbiting NS, which is $L\alt 10^{42}\,{\rm erg/s}$ for typical magnetic field strength of order $10^{12}$\,G at the poles. Thus, it is reasonable to consider that the gamma-ray luminosity would be at most $\sim 10^{42}\,{\rm erg/s}$, for which the duration is $\alt 10$\,ms. It would be quite difficult to detect such a low-luminosity gamma-ray source with very short duration using the current and near-future gamma-ray telescopes, if we suppose that the typical distance to the source is $\agt 100$\,Mpc. This would be also the case for the observation of X-rays. If the magnetic field strength is as high as that of magnetars, $\sim 10^{14}$\,G at its pole, the luminosity could be enhanced and the gamma-ray signals may be observable. However, such high magnetic fields may not be very likely for inspiraling NSs, as the observational results of NSNS in our Galaxy indicates~\cite{Pol2019}. As discussed in Sec.~III D, \cite{paschalidis2013} suggests a significant enhancement of the EM luminosity if curvature effects, i.e., interaction of the magnetic field with the BH, are included: at least an order of magnitude seems possible. Although it is not clear how this extra luminosity is distributed in terms of the magnetospheric configuration, that is, how to disentangle from the unipolar induction mechanism, in which the two compact objects are connected through a twisted bundle of magnetic field lines and thus a DC-circuit established in the near zone, localized plasma winds in between the two compact objects are expected to produce curvature radiation dominating in the $\gamma$-rays band, and synchrotron emissions in the hard $X$-rays and soft $\gamma$-rays bands \cite{mcwilliams2011}. It was also suggested that a fraction of this flux within the bundle, carried in the form of plasma kinetic energy, will reach the primary NS surface and form a hot spot emitting thermal energy as $X$-rays~\cite{mcwilliams2011}. This flux-tube UI configuration was further proposed to model fast radio bursts (FRBs) arising from coherent curvature radiation in the late-inspiral phase (but, prior to the last few orbits) in NSNS binaries \cite{wang2016}. All these speculations encourage us to perform force-free simulations including general relativistic effects, and also to model this radiation along the lines of \cite{bai2010} to obtain light-curves from our solutions. The latest work also shows that in the reconnection region, radio waves may be emitted by coalescence of magnetic islands in the CS that produces magnetic perturbations propagating away~\cite{uzdensky2013, philippov2019pulsar, lyubarsky2019}. For this process, the predicted spectral flux density of the radio waves with the frequency $\nu$ is \begin{eqnarray} S_{\nu} \sim {B_L^2 \over 8\pi}(\Gamma \ell)^3 (\pi D^2)^{-1}(\tau \nu)^{-1}, \end{eqnarray} where $B_L$ denotes the magnetic-field strength for the reconnection region, $\Gamma$ and $\ell$ are the bulk Lorentz factor and characteristic scale of the magnetic islands, $D$ is the distance to the source, and $\tau \sim 10/\omega_p$ with $\omega_p$ the plasma frequency. Here, $\ell$ is determined by the force balance and energy conservation in the magnetic islands, and $\Gamma$ is inferred as 10--100~\cite{uzdensky2013,lyubarsky2019}. In the present context, we obtain a quite small flux for orbits close to the innermost stable circular orbit \begin{eqnarray} S_{\nu} &\sim &2 \times 10^{-8}\,{\rm Jy} \left({B_L \over 4 \times 10^7 \,{\rm G}}\right)^2 \nonumber \\ &&\times \left(\Gamma \over 100\right)^3 \left( {\ell \over 10\,{\rm cm}}\right)^3 \left( {D \over 100\,{\rm Mpc}}\right)^{-2}. \label{eqS1} \end{eqnarray} Here we suppose that the total mass of the system is $5.6M_\odot$, $a \approx 100$\,km, and the magnetic field strength at the NS pole is $B=10^{12}$\,G. We also simply set $\tau \nu=1$. The expected value of $\ell$ in the reconnection region of the pulsar magnetosphere is about 10 times larger than the thickness of the CS, which is proportional to $B_L^{-3/2}$ as~\cite{uzdensky2013, lyubarsky2019} \begin{eqnarray} \sim 0.1 \,{\rm cm}\left({B_L \over 10^8 \,{\rm G}}\right)^{-3/2}. \end{eqnarray} This is the reason why, for the strong magnetic fields in the reconnection region, the intensity of this type of the radio waves is low (i.e., in this scenario, the luminosity decreases with the decrease of the orbital separation, $a$). If the magnetic field strength for the late inspiral stage of NS binaries is $B \approx 10^{10}$\,G, the luminosity would be $10^5$ times lager than that of Eq.~(\ref{eqS1}) because the width of the magnetic islands becomes larger. However, the flux is still $\sim 1$\,mJy. Since the size of each magnetic island is likely to be quite small for the strong magnetic field case, a large number of the magnetic islands may be simultaneously generated. As discussed in Ref.~\cite{lyubarsky2019}, fast waves from many merging magnetic islands may nonlinearly interact and transfer the energy into the plasma. If this happens and the emission occurs in an optimistically coherent way, the predicted luminosity is written as ~\cite{lyubarsky2019} \begin{eqnarray} L_n &\sim& {\Omega_o \over 2\pi \nu}L =3 \times 10^{35}\,{\rm erg/s} \left(\Omega_o \over 2000\,{\rm rad/s}\right) \nonumber \\ && ~~~~~~~~~~~~~~~\times \left( \nu\over 1\,{\rm GHz}\right)^{-1} \left( L \over 10^{42}\,{\rm erg/s}\right), \end{eqnarray} which approximately leads to the following flux density, \begin{eqnarray} S_{\nu} &\sim & 0.1\,{\rm mJy} \left(\Omega_o \over 2000\,{\rm rad/s}\right) \left(\nu \over 1\,{\rm GHz}\right)^{-2} \nonumber \\ &&\times \left(L \over 10^{42}\,{\rm erg/s}\right) \left({D \over 100\,{\rm Mpc}}\right)^{-2}. \end{eqnarray} Thus, a much higher flux than Eq.~\eqref{eqS1} can be predicted, although the flux is still low for the detection by the current wide-field-of-view radio telescopes like CHIME~\cite{CHIME} and OVRO-LWA~\cite{OVRO}. We note that in a small fraction of pulsars~\cite{Manchester2005}, a substantial fraction of the dissipation energy of order $10^{-4}$ is emitted in the radio band. If the orbiting NSs can have such a high efficiency for the radio emission, the radio waves may be observable. As indicated above, it will not be very easy to detect an EM precursor of NS mergers. However, the following point should be kept in mind: In the absence of tidal disruption in the system of BHNS binaries, no EM counterparts are expected {\em after} the merger. Even in such cases, a precursor associated with the moving NS with magnetic fields can be emitted as an EM counterpart of the merger of BHNS binaries. Distinguishing a BHNS binary with a fairly large chirp mass from binary black holes is not an easy task only in the detection of gravitational waves, because the gravitational waveforms for two cases are quite similar. The precursor for BHNS binaries is likely to be emitted always if the magnetic field strength of the NS in binaries is as strong as that for the typical isolated NSs. The observation of the precursor for the BHNS binaries will play an important role for surely identifying the BHNS binaries. It is also worth mentioning that if a precursor is detected for NS binaries, the magnetic field strength of the NS could be estimated. This will provide us important information for the evolution of the magnetic fields in an old NS that has not experienced significant mass accretion. \section{Conclusions} In this paper we have considered force-free magnetosphere induced by an NS orbiting in a binary system, aiming at capturing the EM effects produced by the orbital motion about the CoM of the binary (BHNS or NSNS) system; in a sense, isolating the role played by the acceleration of the MD moment of the NS, from the effects of curvature. The inclusion of curvature --more specifically a BH companion-- has been deferred for a subsequent work. Our present approach, however, has allowed a detailed and systematic study of the magnetospheric properties of these systems in close analogy to pulsars. In particular, the existence of strong return current layers and CS enabled us to connect with known EM emission mechanisms from pulsar theory. Before considering realistic inspiral orbits associated with the binaries, we first analyzed the properties of circular orbits; noticing --as later confirmed-- that the stationary configurations attained here are reliable approximations of the system's states throughout the inspiral. The results can be summarized as follows. For the aligned and non-spinning scenario, a strong spiral CS develops along the orbital plane, beginning at $\sim c/\Omega_o$. An alternate pattern of charges/currents is found in the near zone of the NS, enclosed by thin return current layers that form an Y-point with the equatorial CS. In contrast to pulsars, there is almost no charge flowing over the polar region of the NS. The luminosity can be well described by, $L \approx \displaystyle\frac{4}{15c^5} \mu^2 R_{o}^2 \Omega_{o}^6 f(v_o /c ) $, where $f \sim (1$--$7)$ represents relativistic corrections in $v_o /c$, to the analytic formula \eqref{eq:zeroth}. The orbital effect on the luminosity is much weaker than the one produced by the NS spin (comparing at a given angular frequency), although it can produce a considerable enhancement (factor $\sim 2$) on the pulsar spin-down luminosity if the motion is synchronized. Finally, for the case that the magnetic and orbital axis are not aligned (i.e.,$\chi\neq0$), the magnetosphere resembles that of oblique pulsars, with a strong CS fluctuating about the dipole-equator (instead of the rotational equator, as in misaligned pulsars \cite{spitkovsky2006}). Interestingly, in the non-spinning case, the total luminosity acquires an orbital-phase dependency. We consider inspiral binary trajectories using relevant parameters for both BHNS and NSNS scenarios, finding that the evolution of the luminosity follows quasi-adiabatically from our previous estimations based on the circular orbits configurations. The Poynting fluxes emanating from the orbiting NS forms spiral structures orthogonal to the orbital axis, and produce magnetic reconnections inside the CS as these Alfven fronts propagate outwards. Overall, the radial Poynting flux distribution in the wave zone establishes a lighthouse effect, rotating at orbital frequency $\Omega_o (t)$ and peaking around the orbital plane; which is in qualitative agreement with previous GRFF studies for the cases where the companion to the primary NS is either a weakly magnetized NS \cite{palenzuela2013electromagnetic, palenzuela2013linking} or a BH \cite{paschalidis2013}. This suggests that the EM flows beyond the light cylinder $\sim c/\Omega_o (t)$ are dominated by the MD effect, while UI occurs almost exclusively between the two compact objects in the near region. One might interpret these two mechanisms as constituting two approximately independent sources of EM energy for the plasma (albeit both mined from the kinetic energy of the orbital motion). However, by the interaction of the magnetic field with the curvature of the companion (if curvature is included), the field strength can be amplified by further twisting, resulting in enhanced luminosity of the MD effect --valued here to represent one order of magnitude--. Furthermore, the contribution from each of these two mechanisms (i.e., MD/UI) will be channeled into separate processes within the magnetosphere, which then derive in the actual EM emissions. In particular, we have devoted our attention to the existence of strong CS induced by the NS's orbital motion alone. These CS were not reported before: in the BHNS scenario of \cite{paschalidis2013}, this may be due to the fact that reflection symmetry about the orbital plane was imposed in their simulations; whereas for the weakly magnetized NS companion case studied in \cite{palenzuela2013electromagnetic, palenzuela2013linking}, we see evidence of such CS forming (last panel of Fig.~10 in~\cite{palenzuela2013linking}), although it was omitted in their discussions~\footnote{Only a trailing dissipation region, making a CS tail behind the weakly magnetized NS companion, was described in these works.}. We argue these CS are very important due to their role in explaining radio emissions in pulsars, where recent studies~\cite{uzdensky2013, philippov2019pulsar, lyubarsky2019} have shown that the coalescence of magnetic islands (or plasmoids) in the reconnection regions can produce radio waves, as a coherent superposition of many such individual pulses. We have borrowed these ideas and applied them to get concrete estimations of spectral flux densities of radio waves in our context. The predicted fluxes are not large enough as to be detected by the current wide-field-of-view radio telescopes like CHIME~\cite{CHIME} and OVRO-LWA~\cite{OVRO}. We conclude that only if a substantial fraction of the luminosity (e.g., $\gtrsim 10^{-4}$) is emitted in the radio band, as in some pulsars~\cite{Manchester2005}, then radio waves may be observable. \section{Acknowledgments} We would like to thank Kenta Hotokezaka, Kunihito Ioka, Kotha Murase, Carlos Palenzuela, Oscar Reula, Anatoly Spitkovsky, and Tomoki Wada for several helpful discussions during the realization of this work. Numerical computations were performed on a cluster in Max Planck Institute for Gravitational Physics at Potsdam. This work was in part supported by Grants-in-Aid for Scientific Research (No. 16H02183) of Japanese MEXT/JSPS. \bibliographystyle{unsrt}
\section{Preliminaries} In this section, we recall some definitions and basic facts about the $n$-dimensional complex hyperbolic space, we refer to \cite{Goldman, Kapovich} for details. Consider the $n$-dimensional complex vector space $\mathbb C^{n+1}$ equipped with the pseudo-hermitian bilinear form \begin{equation}\label{eqn:hermitianform} \<z, w\>=-z_0 \bar{w}_0 + \sum_{k=1}^n z_k \bar{w}_k \end{equation} and define the quadratic form $q(z)$ of signature $(n,1)$ by $q(z):= \<z, z\>$. Then $q$ defines the {\em negative light cone} $V_-:= \{z: q(z)<0\} \subset \mathbb C^{n+1}$. The projection of $V_-$ in the projectivization of $\mathbb C^{n+1}$, $\mathbb{P}^{n}$, is an open ball which we denote by $\mathbf B^n$. The tangent space $T_{[z]} \mathbb{P}^n$ is naturally identified with $z^\perp$, the orthogonal complement of $\mathbb C z$ in $V$, taken with respect to $\<\cdot, \cdot\>$. If $z\in V_-$, then the restriction of $q$ to $z^\perp$ is positive-definite, hence, $\<\cdot, \cdot\>$ project to a hermitian metric $h$ (also denoted $\<\cdot, \cdot\>_h$) on $\mathbf B^n$. The {\em complex hyperbolic $n$-space} $\mathbb H^n_{\mathbb C}$ is $\mathbf B^n$ equipped with the hermitian metric $h$. The boundary $\partial\mathbf B^n$ of $\mathbf B^n$ in $\mathbb{P}^n$ gives a natural compactification of $\mathbf B^n$. In this note, we usually denote the complex hyperbolic $n$-space by $\mathbf B^n$. The real part of the hermitian metric $h$ defines a Riemannian metric $g$ on $\mathbf B^n$. The sectional curvature of $g$ varies between $-4$ and $-1$. We denote the distance function on $\mathbf B^n$ by $d$. The distance function satisfies \begin{equation}\label{eqn:dist} \cosh^2(d(0, z))= (1-|z|^2)^{-1}. \end{equation} A real linear subspace $W\subset \mathbb C^{n+1}$ is said to be {\em totally real} with respect to the form (\ref{eqn:hermitianform}) if for any two vectors $z, w\in W$, $\<z, w\>\in \mathbb R$. Such a subspace is automatically totally real in the usual sense: $J W\cap W=\{0\}$, where $J$ is the almost complex structure on $V$. {\em (Real) geodesics} in $\mathbf B^n$ are projections of totally real indefinite (with respect to $q$) 2-planes in $\mathbb C^{n+1}$ (intersected with $V_-$). For instance, geodesics through the origin $0\in \mathbf B^n$ are Euclidean line segments in $\mathbf B^n$. More generally, totally-geodesic real subspaces in $\mathbf B^n$ are projections of totally real indefinite subspaces in $\mathbb C^{n+1}$ (intersected with $V_-$). They are isometric to the real hyperbolic space $\mathbb H^n_\mathbb R$ of constant sectional curvature $-1$. {\em Complex geodesics} in $\mathbf B^n$ are projections of indefinite complex 2-planes. Complex geodesics are isometric to the unit disk with the hermitian metric $$ \frac{dz d\bar z}{(1-|z|^2)^2}, $$ which has constant sectional curvature $-4$. More generally, $k$-dimensional complex hyperbolic subspaces $\mathbb H^k_\mathbb C$ in $\mathbf B^n$ are projections of indefinite complex $(k+1)$-dimensional subspaces (intersected with $V_-$). All complete totally-geodesic submanifolds in $\mathbb H^n_\mathbb C$ are either real or complex hyperbolic subspaces. The group $\mathrm{U}(n,1)\cong \mathrm{U}(q)$ of (complex) automorphisms of the form $q$ projects to the group $\operatorname{Aut}(\mathbf B^n) \cong \mathrm{PU}(n,1)$ of complex (biholomorphic, isometric) automorphisms of $\mathbf B^n$. The group $\operatorname{Aut}(\mathbf B^n)$ is linear, its matrix representation is given, for instance, by the adjoint representation, which is faithful since $\operatorname{Aut}(\mathbf B^n)$ has trivial center. A discrete subgroup $\Gamma$ of $\operatorname{Aut}(\mathbf B^n)$ is called a {\em complex-hyperbolic Kleinian group}. The accumulation set of an(y) orbit $\Gamma x$ in $\partial\mathbf B^n$ is called the {\em limit set} of $\Gamma$ and denoted by $\Lambda(\Gamma)$. The complement of $\Lambda(\Gamma)$ in $\partial\mathbf B^n$ is called the {\em domain of discontinuity} of $\Gamma$ and denoted by $\Omega(\Gamma)$. The group $\Gamma$ acts properly discontinuously on $\mathbf B^n \cup \Omega(\Gamma)$. For a (torsion-free) complex-hyperbolic Kleinian group $\Gamma$, the quotient $\mathbf B^n/\Gamma$ is a Riemannian orbifold (manifold) equipped with push-forward of the Riemannian metric of $\mathbf B^n$. We reserve the notation $M_\Gamma$ to denote this quotient. The {\em convex core} of $M_\Gamma$ is the the projection of the closed convex hull of $\Lambda(\Gamma)$ in $\mathbf B^n$. The subgroup $\Gamma$ is called {\em convex-cocompact} if the convex core of $M_\Gamma$ is a nonempty compact subset. Equivalently (see \cite{Bowditch}), $\overline{M}_\Gamma=(\mathbf B^n \cup \Omega(\Gamma))/\Gamma$ is compact. Below are two interesting examples of convex-cocompact complex-hyperbolic Kleinian groups which will also serve as illustrations our results. \begin{example}[Real Fuchsian subgroups]\label{ex:rFuch} Let $\mathbb H^2_\mathbb R\subset \mathbf B^n$ be a totally real hyperbolic plane. This inclusion is induced by an embedding $\rho:\isom(\mathbb H^2_\mathbb R) = \mathrm{PSL}(2,\mathbb R) \rightarrow \operatorname{Aut}(\mathbf B^n)$ whose image preserves $\mathbb H^2_\mathbb R$. Let $\Gamma'< \isom(\mathbb H^2_\mathbb R)$ be a uniform lattice. Then $\Gamma = \rho(\Gamma')$ preserves $\mathbb H^2_\mathbb R$ and acts on it cocompactly. Such subgroups $\Gamma<\operatorname{Aut}(\mathbf B^n)$ will be called {\em real Fuchsian subgroups}. The compact surface-orbifold $\Sigma = \mathbb H^2_\mathbb R/{\Gamma}$ is the convex core of $M_{\Gamma}$. The critical exponent $\delta(\Gamma)$ is 1. Let $\Gamma_t$, $t\ge 0$, be a continuous family of deformations of $\Gamma_0 = \Gamma$ in $\operatorname{Aut}(\mathbf B^n)$ such that $\Gamma_t$'s, for $t>0$, are convex-cocompact but not real Fuchsian. Such deformation exist as long as $\Gamma_t$ is, say, torsion-free, see e.g. \cite{Weil}. The groups $\Gamma_t$, $t>0$, are called {\em real quasi-Fuchsian subgroups}. The critical exponents of such subgroups are strictly greater than $1$. \end{example} \begin{example}[Complex Fuchsian subgroups]\label{ex:cFuch} Let $\Gamma'$ be a cocompact subgroup of $\mathrm{SU}(1,1)$, the identity component isometry group of the real-hyperbolic plane (modulo $\mathbb{Z}_2$) and let $\mathrm{SU}(1,1) \rightarrow \mathrm{SU}(n,1)$ be any embedding. Note that $\mathrm{SU}(n,1)$ modulo center (isomorphic to $\mathbb{Z}_{n+1}$) is isomorphic to $\mathrm{PU}(n,1)$. By taking compositions, we get a representation $\rho:\Gamma'\rightarrow\mathrm{PU}(n,1)$. Then $\Gamma:= \rho(\Gamma')$ leaves a complex geodesic invariant in $\mathbf B^n$. Such subgroups $\Gamma$ will be called {\em complex Fuchsian subgroups}. In this case, $\mathrm{core}(M_{\Gamma}) = \mathbb H^1_\mathbb C/\Gamma$ is a compact complex curve in $M_{\Gamma}$ where $\mathbb H^1_\mathbb C$ is the $\Gamma$-invariant complex geodesic. The critical exponent $\delta(\Gamma)$ is $2$. \end{example} \section{Generalities on complex manifolds} By a {\em complex manifold with boundary} $M$, we mean a smooth manifold with (possibly empty) boundary $\partial M$ such that $\operatorname{int}(M)$ is equipped with a complex structure and that there exists a smooth embedding $f: M\to X$ to an equidimensional complex manifold $X$, biholomorphic on $\operatorname{int}(M)$. A holomorphic function on $M$ is a smooth function which admits a holomorphic extension to a neighborhood of $M$ in $X$. Let $X$ be a complex manifold and $Y\subset X$ is a codimension $0$ smooth submanifold with boundary in $X$. The submanifold $Y$ is said to be {\em strictly Levi-convex} if every boundary point of $Y$ admits a neighborhood $U$ in $X$ such that the submanifold with boundary $Y\cap U$ can be written as $$ \{\phi\le 0\}, $$ for some smooth submersion $\phi: U\to \mathbb R$ satisfying $ \Hess(\phi) >0, $ where $\Hess(\phi)$ is the holomorphic Hessian: $$ \left( \frac{\partial^2 \phi}{\partial \bar{z}_i\partial z_j}\right). $$ \begin{defn} A {\em strongly pseudoconvex manifold} $M$ is a complex manifold with boundary which admits a strictly Levi-convex holomorphic embedding in an equidimensional complex manifold. \end{defn} \begin{defn} An open complex manifold $Z$ is called {\em holomorphically convex} if for every discrete closed subset $A\subset Z$ there exists a holomorphic function $Z\to \mathbb C$ which is proper on $A$. \end{defn} Alternatively,\footnote{and this is the standard definition} one can define holomorphically convex manifolds as follows: For a compact $K$ in a complex manifold $M$, the {\em holomorphic convex hull} $\hat{K}_M$ of $K$ in $M$ is $$ \hat{K}_M= \{z\in M: |f(z)|\le \sup_{w\in K} |f(w)|, \forall f\in \mathcal{O}_M\}. $$ In the above, $\mathcal{O}_M$ denotes the ring of holomorphic functions on $M$. Then $M$ is holomorphically convex iff for every compact $K\subset M$, the hull $\hat{K}_M$ is also compact. \begin{theorem} [Grauert \cite{G}] The interior of every compact strongly pseudoconvex manifold $M$ is holomorphically convex. \end{theorem} \begin{defn} A complex manifold $M$ is called {\em Stein} if it admits a proper holomorphic embedding in $\mathbb C^n$ for some $n$. \end{defn} Equivalently, $M$ is Stein iff it is holomorphically convex and {\em holomorphically separable}: That is, for every distinct points $x,y\in M$, there exists a holomorphic function $f: M\rightarrow\mathbb C$ such that $f(x) \ne f(y)$. We will use: \begin{theorem}[Rossi \cite{R2}, Corollary on page 20]\label{thm:Rossi} If a compact complex manifold $M$ is strongly pseudoconvex and contains no compact complex subvarieties of positive dimension, then $\operatorname{int}(M)$ is Stein. \end{theorem} We now discuss strong quasiconvexity and Stein property in the context of complex-hyperbolic manifolds. A classical example of a complex submanifold with Levi-convex boundary is a closed round ball $\overline{\mathbf B}^n$ in $\mathbb C^n$. Suppose that $\Gamma< \operatorname{Aut}(\mathbf B^n)$ is a discrete torsion-free subgroup of the group of holomorphic automorphisms of $\mathbf B^n$ with (nonempty) domain of discontinuity $\Omega = \Omega(\Gamma)\subset \partial \mathbf B^n$. The quotient $$ \overline{M}_\Gamma= (\mathbf B^n \cup \Omega)/\Gamma $$ is a smooth manifold with boundary. \begin{lemma}\label{lem:spc} $\overline{M}_\Gamma$ is strongly pseudoconvex. \end{lemma} \begin{proof} We let $T_\Lambda$ denote the union of all projective hyperplanes in $P_\mathbb C^n$ tangent to $\partial \mathbf B^n$ at points of $\Lambda$, the limit set of $\Gamma$. Let $\widehat{\Omega}$ denote the connected component of $P_\mathbb C^n \setminus T_\Lambda$ containing $\mathbf B^n$. It is clear that $\mathbf B^n\cup \Omega\subset \widehat\Omega$ is strictly Levi-convex. By the construction, $\Gamma$ preserves $\widehat\Omega$. It is proven in \cite[Thm. 7.5.3]{CNS} that the action of $\Gamma$ on $\widehat\Omega$ is properly discontinuous. Hence, $X:=\widehat\Omega/\Gamma$ is a complex manifold containing $\overline{M}_\Gamma$ as a strictly Levi-convex submanifold with boundary. \end{proof} Specializing to the case when $\overline{M}_\Gamma$ is compact, i.e. $\Gamma$ is convex-cocompact, we obtain: \begin{proposition}\label{prop:stein} Suppose that $\Gamma$ is torsion-free, convex-cocompact and $n>1$. Then: \begin{enumerate}[nolistsep] \item $\partial \overline{M}_\Gamma$ is connected. \item If $\operatorname{int}(\overline{M}_\Gamma) = M_\Gamma$ contains no compact complex subvarieties of positive dimension, then $M_\Gamma$ is Stein. \end{enumerate} \end{proposition} For example, as it was observed in \cite{BS}, the quotient-manifold $\mathbf B^2/\Gamma$ of a real-Fuchsian subgroup $\Gamma< \operatorname{Aut}(\mathbf B^2)$ is Stein while the quotient-manifold of a complex-Fuchsian subgroup $\Gamma< \operatorname{Aut}(\mathbf B^2)$ is non-Stein. \section{Proof of Theorem \ref{thm:stein}} In this section, we construct certain {plurisubharmonic} functions on $M_\Gamma$, for each finitely generated, discrete subgroup $\Gamma < \operatorname{Aut}(\mathbf B^n)$ satisfying $\delta(\Gamma) < 2$. We use these functions to show that $M_\Gamma$ has no compact subvarieties of positive dimension. At the end of this section, we prove the main result of this paper. Let $X$ be a complex manifold. Recall that a continuous function $f:X\rightarrow \mathbb R$ is called {\em plurisubharmonic}\footnote{There is a more general notion of {\em plurisubharmonic functions}; for our purpose, we only consider this restrictive definition.} if for any homomorphic map $\phi : V( \subset\mathbb C) \rightarrow X$, the composition $f\circ \phi$ is subharmonic. Plurisubharmonic functions $f$ satisfy the maximum principle; in particular, if $f$ restricts to a nonconstant function on a connected complex subvariety $Y\subset X$, then $Y$ is noncompact. Now we turn to our construction of plurisubharmonic functions. Let $\Gamma< \operatorname{Aut}(\mathbf B^n)$ be a discrete subgroup. Consider the Poincar\'e series \begin{equation}\label{eqn:series} \sum_{\gamma\in\Gamma} ({1 - |\gamma(z)|^2}), \quad z\in\mathbf B^n. \end{equation} \begin{lemma}\label{prop:convergence} Suppose that $\delta(\Gamma)<2$. Then (\ref{eqn:series}) uniformly converges on compact sets. \end{lemma} \begin{proof} Since $\delta(\Gamma) < 2$, the Poincar\'e series \[ \sum_{\gamma\in\Gamma} e^{ -2 d(0,\gamma(z))} \] uniformly converges on compact subsets in $\mathbf B^n$. By (\ref{eqn:dist}), we get \begin{equation}\label{eqn:bound} e^{-2d(0,\gamma(z))} \le (1 - |\gamma(z)|^2) \le 4 e^{-2d(0,\gamma(z))}. \end{equation} Then, the result follows from the upper inequality. \end{proof} \begin{remark}\label{rem:series_diverge} Note that when $\delta(\Gamma)>2$, or when $\Gamma$ is of {\em divergent type} (e.g., convex-cocompact) and $\delta(\Gamma) = 2$, then (\ref{eqn:series}) does not converge. This follows from the lower inequality of (\ref{eqn:bound}). \end{remark} Assume that $\delta(\Gamma)<2$. Define $F: \mathbf B^n\rightarrow \mathbb{R}$, \[ F(z) = \sum_{\gamma\in\Gamma} ({ |\gamma(z)|^2 - 1}). \] Since $F$ is $\Gamma$-invariant, i.e., $F(\gamma z) = F(z)$, for all $\gamma\in\Gamma$ and all $z\in\mathbf B^n$, $F$ descends to a function $$f : M_\Gamma \rightarrow \mathbb{R}.$$ \begin{lemma}\label{prop:psh} The function $f : M_\Gamma \rightarrow \mathbb{R}$ is plurisubharmonic. \end{lemma} \begin{proof} Enumerate $\Gamma$ as $\Gamma = \{\gamma_1,\gamma_2,\dots\}$. Consider the sequence of partial sums of the series $F$, \[ S_k(z) = \sum_{j\le k} ({ |\gamma_j(z)|^2 - 1}). \] Since each summand in the above is plurisubharmonic\footnote{This follows from the fact that the function $|z|^2$ is plurisubharmonic.}, $S_k$ is plurisubharmonic for each $k\ge 1$. Moreover, the sequence of functions $S_k$ is monotonically decreasing. Thus, the limit $F = \lim_{k\rightarrow\infty} S_k$ is also plurisubharmonic, and hence so is $f$. \end{proof} Note, however, that at this point we do not yet know that the function $f$ is nonconstant. \medskip Now we prove the main result of this section. \begin{theorem}\label{thm:no_subv} Let $\Gamma$ be a torsion-free discrete subgroup of $\operatorname{Aut}(\mathbf B^n)$. If $\delta(\Gamma) < 2$, then $M_\Gamma$ contains no compact complex subvarieties of positive dimension. \end{theorem} \begin{proof} Suppose that $Y$ is a compact connected subvariety of positive dimension in $M_\Gamma$. Since $\pi_1(Y)$ is finitely generated, so is its image $\Gamma'$ in $\Gamma=\pi_1(M_\Gamma)$. Since $\delta(\Gamma')\le \delta(\Gamma)$, by passing to the subgroup $\Gamma'$ we can (and will) assume that the group $\Gamma$ is finitely generated. We construct a sequence of functions $F_k: \mathbf B^n\rightarrow \mathbb R$ as follows. For $k \in \mathbb N$, let $\Sigma_k\subset \Gamma-\{1\}$ denote the subset consisting of $\gamma\in \Gamma$ satisfying $d(0,\gamma(0)) \le k$. Since $\Gamma$ is a finitely generated linear group, it is residually finite and, hence, there exists a finite index subgroup $\Gamma_k<\Gamma$ disjoint from $\Sigma_k$. For each $k\in \mathbb N$, define $F_k: \mathbf B^n\rightarrow \mathbb R$ as the sum \[ F_k(z) = \sum_{\gamma\in\Gamma_k} ({ |\gamma(z)|^2 - 1}). \] Since $$ \bigcap_{k\in \mathbb N} \Gamma_k=\{1\}, $$ the sequence of functions $F_k$ converges to $(|z|^2-1)$ uniformly on compact subsets of $\mathbf B^n$. As before, each $F_k$ is plurisubharmonic (cf. Lemmata \ref{prop:convergence}, \ref{prop:psh}). Let $\widetilde Y$ be a connected component of the preimage of $Y$ under the projection map $\mathbf B^n \rightarrow M_\Gamma$. Since $\widetilde Y$ is a closed, noncompact subset of $\mathbf B^n$, the function $(|z|^2-1)$ is nonconstant on $\widetilde Y$. As the sequence $(F_k)$ converges to $(|z|^2-1)$ uniformly on compacts, there exists $k\in \mathbb N$ such that $F_k$ is nonconstant on $\widetilde Y$. Let $f_k : M_k = M_{\Gamma_k} \rightarrow \mathbb R$ denote the function obtained by projecting $F_k$ to $M_k$, and $Y_k$ be the image of $\widetilde Y$ under the projection map $\mathbf B^n\rightarrow M_k$. Since $M_k$ is a finite covering of $M_\Gamma$, the subvariety $Y_k\subset M_k$ is compact. Moreover, $f_k$ is a nonconstant plurisubharmonic function on $Y_k$ since $F_k$ is such a function on $\widetilde Y$. This contradicts the maximum principle. \end{proof} \begin{remark}\label{rem:no_subv} Regarding Remark \ref{rem:series_diverge}: The failure of convergence of the series (\ref{eqn:series}) as pointed out in Remark \ref{rem:series_diverge} is not so surprising. In fact, if $\Gamma$ is a complex Fuchsian group, then $\delta(\Gamma) = 2$ and the convex core of $M_\Gamma$ is a compact Riemann surface, see Example \ref{ex:cFuch}. Thus, our construction of $F$ must fail in this case. \end{remark} We conclude this section with a proof of the main result of this paper. \begin{proof}[Proof of Theorem \ref{thm:stein}] By Theorem \ref{thm:no_subv}, $M_\Gamma$ does not have compact complex subvarieties of positive dimensions. Then, by the second part of Proposition \ref{prop:stein}, $M_\Gamma$ is Stein. \end{proof} \section{Further remarks}\label{sec:remarks} In relation to Theorem \ref{thm:stein}, it is also interesting to understand the case when $\delta(\Gamma) = 2$, that is: For which convex-cocompact, torsion-free subgroups $\Gamma$ of $\operatorname{Aut}(\mathbf B^n)$ satisfying $\delta(\Gamma)=2$, is the manifold $M_\Gamma$ Stein? It has been pointed out before that a complex Fuchsian subgroup $\Gamma< \operatorname{Aut}(\mathbf B^n)$ satisfies $\delta(\Gamma) = 2$, but the manifold $M_\Gamma$ is not Stein. In fact, the convex core of $M_\Gamma$ is a complex curve, see Remark \ref{rem:no_subv}. We conjecture that complex Fuchsian subgroups are the only such non-Stein examples. \begin{conjecture} Let $\Gamma<\operatorname{Aut}(\mathbf B^n)$ be a convex-cocompact, torsion-free subgroup such that $\delta(\Gamma) = 2$. Then, $M_\Gamma$ is non-Stein if and only if $\Gamma$ is a complex Fuchsian subgroup. \end{conjecture} We illustrate this conjecture in the following very special case: Let $\phi: \pi_1(\Sigma) \rightarrow \operatorname{Aut}(\mathbf B^n)$ be a faithful convex-cocompact representation where $\Sigma$ is a compact Riemann surface of genus $g \ge 2$. Then $\phi$ induces a (unique) equivariant harmonic map \[ F: \widetilde\Sigma \rightarrow \mathbf B^n. \] which descends to a harmonic map $f: \Sigma\to M_\Gamma$. \begin{proposition} Suppose that $F$ is a holomorphic immersion. Then $\Gamma = \phi(\pi_1(\Sigma))$ satisfies $\delta(\Gamma)\ge 2$. Moreover, if $\delta(\Gamma)= 2$, then $\Gamma$ preserves a complex line. In particular, $\Gamma$ is a complex Fuchsian subgroup of $\operatorname{Aut}(\mathbf B^n)$. \end{proposition} \begin{proof} Noting that $M_\Gamma$ contains a compact complex curve, namely $f(\Sigma)$, the first part follows directly from Theorem \ref{thm:stein}. For the second part, we let $Y$ denote the surface $\tilde\Sigma$ equipped with the Riemannian metric obtained via pull-back of the Riemannian metric $g$ on $\mathbf B^n$. The entropy\footnote{The {\em volume entropy} of a simply connected Riemannian manifold $(X,g)$ is defined as $\lim_{r\rightarrow\infty} \log\vol(B(r,x))/r$, where $x\in X$ is a chosen base-point and $B(r,x)$ denotes the ball of radius $r$ centered at $x$. This limit exists and is independent of $x$, see \cite{Manning}.} $h(Y)$ of $Y$ is bounded above by $\delta(\Gamma)$, i.e. \begin{equation}\label{ineq:entropy} h(Y) \le 2. \end{equation} This can be seen as follows: The distance function $d_Y$ on $Y$ satisfies $$d_Y(y_1,y_2) \ge d(F(y_1), F(y_2)).$$ Therefore, the exponential growth-rate $\delta_Y$ of $\pi_1(\Sigma)$-orbits in $Y$ satisfies $\delta_Y\le \delta(\Gamma)$. On the other hand, the quantity $\delta_Y=h(Y)$ since $\pi_1(\Sigma)$ acts cocompactly on $Y$. Assume that $\widetilde\Sigma$ is endowed with a conformal Riemannian metric of constant $-4$ sectional curvature. Since $\tilde\Sigma$ is a symmetric space, we have \[ h^2(Y)\mathrm{Area}(Y/\Gamma) \ge h^2(\widetilde\Sigma)\mathrm{Area}(\Sigma), \] see \cite[p. 624]{BCG}. The inequality (\ref{ineq:entropy}) together with the above implies that $\mathrm{Area}(Y/\Gamma) \ge \mathrm{Area}(\Sigma)$. On the other hand, since $f: Y/\Gamma\to M_\Gamma$ is holomorphic, $4\cdot \mathrm{Area}(Y/\Gamma)$ equals to the Toledo invariant $c(\phi)$ (see \cite{Toledo}) of the representation $\phi$. Since $c(\phi) \le 4\pi(g-1)$, the inequality $\mathrm{Area}(Y/\Gamma) \ge \mathrm{Area}(\Sigma) = \pi(g-1)$ shows that $\mathrm{Area}(Y/\Gamma) = \pi(g-1)$ or, equivalently, $c(\phi) = 4\pi(g-1)$. By the main result of \cite{Toledo}, $\Gamma$ preserves a complex-hyperbolic line in $\mathbf B^n$. \end{proof} \begin{remark} The assumption that $F$ is an immersion can be eliminated: Instead of working with a Riemannian metric, one can work with a Riemannian metric with finitely many singularities. \end{remark} Motivated by Theorem \ref{thm:no_subv}, we also make the following conjecture. \begin{conjecture} If $\Gamma< \operatorname{Aut}(\mathbf B^n)$ is discrete, torsion-free, and $\delta(\Gamma)<2k$, then $M_\Gamma$ does not contain compact complex subvarieties of dimension $\ge k$. \end{conjecture} We conclude this section with a verification of this conjecture under a stronger hypothesis. \begin{proposition}\label{prop:2k} If $\Gamma< \operatorname{Aut}(\mathbf B^n)$ is discrete, torsion-free, and $\delta(\Gamma)<2k-1$, then $M_\Gamma$ does not contain compact complex subvarieties of dimension $\ge k$. \end{proposition} \begin{proof} Note that if $\Gamma$ is elementary (i.e., virtually abelian), then $\delta(\Gamma) = 0$. In this case, the result follows from Theorem \ref{thm:no_subv}. For the rest, we assume that $\Gamma$ is nonelementary. By \cite[Sec. 4]{BCG2}, there is a natural map $f: M_\Gamma\rightarrow M_\Gamma$ homotopic to the identity map $\mathrm{id}_{M_\Gamma}: M_\Gamma\rightarrow M_\Gamma$ and satisfying \[ |\mathrm{Jac}_p(f)| \le \left(\frac{\delta(\Gamma)+1}{p}\right)^p,\quad 2\le p\le 2n, \] where $\mathrm{Jac}_p(f)$ denotes the $p$-Jacobian of $f$. When $\delta(\Gamma)<2k-1$, we have $|\mathrm{Jac}_p(f)|<1$, for $p\in[2k,2n]$. This means that $f$ strictly contracts the volume form on each $p$-dimensional tangent space at every point $x\in M_\Gamma$, for $p\in [2k,2n]$. Let $Y\subset M_\Gamma$ be a compact complex subvariety of dimension $\ge k$ (real dimension $\ge 2k$). Then, $Y$ is also a volume minimizer in its homology class. Since $f$ strictly contracts volume on $Y$, $f(Y)$ has volume strictly lesser than that of $Y$. However, $f$ being homotopic to $\mathrm{id}_{M_\Gamma}$, $f(Y)$ belongs to the homology class of $Y$. This is a contradiction to the fact that $Y$ minimizes volume its homology class. \end{proof} \begin{remark} Note that Proposition \ref{prop:2k} gives an alternative proof of Theorem \ref{thm:no_subv} (hence Theorem \ref{thm:stein}) under a stronger hypothesis, namely $\delta(\Gamma)\in(0,1)$. However, this method fails to verify Theorem \ref{thm:no_subv} in the case when $\delta(\Gamma)\in[1,2)$. \end{remark} Finally, we note that the papers \cite{Chen} and \cite{Yue} contain other interesting results and conjectures on Stein properties of complex-hyperbolic manifolds. \bibliographystyle{abbrv}
\section{Introduction} The minimal genus problem for smooth $4$-manifolds asks to find the minimal genus of an embedded oriented surface representing a given $2$-dimensional homology class in $4$-manifold. Seiberg-Witten theory has generated vast progress on the minimal genus problem \cite{km,mst,os}, see also the survey paper \cite{law}. In particular one has the adjunction inequality: {\em let $X$ be a compact, oriented, smooth $4$-manifold with $b^+(X)>1$. Suppose $\Sigma \to X$ is an embedded oriented surface of genus $g$ and non-negative self-intersection. \begin{itemize} \item{If $g \ge 1$ then \[ 2g-2 \ge [\Sigma]^2 + | \langle [\Sigma] , c \rangle | \] for every basic class $c \in H^2( X ; \mathbb{Z})$ (recall that $c$ is {\em basic} if $c = c_1(\mathfrak{s})$ for some spin$^c$-structure $\mathfrak{s}$ with non-zero Seiberg-Witten invariant).} \item{If $g=0$ and a basic class exists, then $[\Sigma]$ is a torsion class.} \end{itemize}} In this paper we consider an extension of the minimal genus problem where the embedded surface is required to satisfy an additional constraint. Using a parametrised version of Seiberg-Witten theory, we obtain adjunction inequalities giving a lower bound on the genus of such surfaces. These adjunction inequalities can be non-trivial even on $4$-manifolds with trivial Seiberg-Witten invariants. Let $X$ be a compact, oriented, smooth $4$-manifold and $f : X \to X$ an orientation preserving diffeomorphism. Assume further that $b^+(X) \ge 3$. We are interested in studying embedded surfaces $\Sigma \to X$ such that $\Sigma$ is smoothly isotopic to $f(\Sigma)$. Our adjunction inequality will be expressed in terms of certain classes in $H^2(X ; \mathbb{Z})$ which we call {\em $f$-basic}. Let $\mathfrak{s}$ be a spin$^c$-structure on $X$ which is preserved by $f$ and satisfying $d(X,\mathfrak{s}) = -1$, where \[ d(X , \mathfrak{s}) = \frac{ c_1(\mathfrak{s})^2 - \sigma(X)}{4} - 1 + b_1(X) - b^+(X) \] is the virtual dimension of the Seiberg-Witten moduli space associated to $(X,\mathfrak{s})$. In this case one can associate to $f$ a Seiberg-Witten invariant $SW^{\mathbb{Z}_2}(X , f , \mathfrak{s}) \in \mathbb{Z}_2$ (\cite{rub1}, \cite{bk}). Roughly, $SW^{\mathbb{Z}_2}(X , f , \mathfrak{s})$ is a mod $2$ count of the number of solutions of the Seiberg-Witten equations for the $1$-parameter family of $4$-manifolds given by the mapping cylinder of $f$. If $f$ satisfies an additional orientability condition (see \textsection \ref{sec:swdiff}) then we can count solutions with sign, giving an integer valued invariant $SW^{\mathbb{Z}}(X , f , \mathfrak{s}) \in \mathbb{Z}$ which reduces mod $2$ to $SW^{\mathbb{Z}_2}(X , f , \mathfrak{s})$. We refer to $SW^{\mathbb{Z}_2}(X , f , \mathfrak{s})$ and $SW^{\mathbb{Z}}(X , f , \mathfrak{s})$ (when defined) as the Seiberg-Witten invariants of $f$. \begin{definition}\label{def:basic} We say that a cohomology class $c \in H^2(X ; \mathbb{Z})$ is {\em $f$-basic} if $c = c_1(\mathfrak{s})$ for a spin$^c$-structure $\mathfrak{s}$ on $X$ which is preserved by $f$, satisfies $d(X , \mathfrak{s}) = -1$ and either $SW^{\mathbb{Z}_2}(X , f , \mathfrak{s})$ or $SW^{\mathbb{Z}}(X , f , \mathfrak{s})$ (if defined) is non-zero. \end{definition} Our adjunction inequality for embedded surfaces isotopic to their image under $f$ is as follows: \begin{theorem}\label{thm:fadjunction} Let $X$ be a compact, oriented smooth $4$-manifold with $b^+(X) \ge 3$ and let $f : X \to X$ be an orientation preserving diffeomorphism. Let $\Sigma \to X$ be an embedded oriented surface of genus $g$ with $[\Sigma]^2 \ge 0$ and suppose that $\Sigma$ is smoothly isotopic to $f(\Sigma)$. \begin{itemize} \item{If $g \ge 1$, then $\Sigma$ satisfies the adjunction inequality \[ 2g-2 \ge [\Sigma]^2 + | \langle [\Sigma] , c \rangle |. \] for every $f$-basic class $c$. } \item{If $g=0$ and an $f$-basic class exists, then $[\Sigma]$ is a torsion class.} \end{itemize} \end{theorem} Note Theorem \ref{thm:fadjunction} can be used as a vanishing theorem for the Seiberg-Witten invariants of diffeomorphisms. Namely if there exists an embedded surface $\Sigma$ which is isotopic to its image under $f$ and which violates the adjunction inequality for some characteristic $c$, then $c$ is not a basic class. To extract interesting results from Theorem \ref{thm:fadjunction}, we need to know examples of diffeomorphisms whose associated Seiberg-Witten invariants are non-trivial. A large class of examples can be obtained by a connected sum construction \cite{rub3}, \cite{bk}. As an application of Theorem \ref{thm:fadjunction} combined with the connected sum construction, we obtain examples of infinite classes of embedded surfaces which are all continuously isotopic but mutually non-isotopic smoothly. Before stating the result we comment on some related works. The paper \cite{fs} constructs embedded surfaces which are mapped to each other by an ambient homeomorphism but can not be mapped to each other by an ambient diffeomorphism. The paper \cite{ak} constructs examples of non-isotopic $2$-spheres which become isotopic on connected sum with $S^2 \times S^2$ and \cite{akmr} constructs infinite families of topologically isotopic but smoothly non-isotopic embedded $2$-spheres which become isotopic on connected sum with $S^2 \times S^2$. Recall that a class $u \in H^2(X ; \mathbb{Z})$ is called {\em ordinary} if it not characteristic. \begin{theorem}\label{thm:isotopysurface} Let $X$ be one of the $4$-manifolds \begin{itemize} \item[(i)]{$\#^{n+2m} (S^2 \times S^2) \#^n K3$ for $n,m \ge 0$, $n+m \ge 2$, or} \item[(ii)]{$\#^{2n} \mathbb{CP}^2 \#^{m} \overline{\mathbb{CP}^2}$ for $n \ge 2$, $m \ge 2n+1$.} \end{itemize} Then there exists a diffeomorphism $f : X \to X$ such that: \begin{itemize} \item[(1)]{$f$ is homotopic to the identity.} \item[(2)]{Let $u \in H^2(X ; \mathbb{Z})$ be any class with $u^2 > 0$. If $\Sigma \to X$ is an embedded surface of genus $g$ representing $u$ and $f^n(\Sigma)$, $f^m(\Sigma)$ are smoothly isotopic for some $n \neq m$, then $2g-2 \ge u^2$.} \item[(3)]{Let $u \in H^2(X ; \mathbb{Z})$ satisfy $u^2 > 0$. In case (ii) assume moreover that u is a multiple of a primitive ordinary class. Then there exists an embedded surface $\Sigma \to X$ representing $u$ such that the surfaces $\{ f^n(\Sigma) \}_{n \in \mathbb{Z} }$ are all continuously isotopic but mutually non-isotopic smoothly. If $u$ is primitive then $\Sigma$ can be taken to have genus zero. In all other cases we can take $\Sigma$ to have genus $g$ satisfying $2g-2 < u^2$.} \end{itemize} \end{theorem} \begin{remark} In Theorem \ref{thm:isotopysurface} (3), if $u$ is primitive then it is in addition possible to choose the embedding $\Sigma \to X$ to have simply-connected complement. It follows that the smoothly non-isotopic surfaces $\{ f^n(\Sigma) \}$ are all smoothly isotopic after taking connected sum with a single copy of $S^2 \times S^2$, according to the main theorem of \cite{akmrs} (which is proven using the $4$-dimensional light bulb theorem of Gabai \cite{gab}). To be more precise, for any $n,m$, the surfaces $f^n(\Sigma), f^m(\Sigma)$ become isotopic after taking the connected sum of $X$ with $S^2 \times S^2$, summing at a point disjoint from $f^n(\Sigma) \cup f^m(\Sigma)$. \end{remark} It is interesting to contrast Theorem \ref{thm:isotopysurface} with the case of knots in $S^3$. Cerf's theorem \cite{cer} implies that if two smooth knots in $S^3$ are mapped onto one another by an orientation preserving diffeomorphism, then the two knots are ambiently isotopic. An analogous problem for embedded surfaces in smooth $4$-manifolds was posed in \cite{akmr}:\\ \noindent {\bf Problem 1:} Suppose two embedded surfaces in a smooth $4$-manifold are mapped onto one another by a diffeomorphism homotopic to the identity. Then are the surfaces smoothly isotopic?\\ The authors of \cite{akmr} suspected that Problem 1 does not have a positive solution in general. Here we confirm that this is indeed the case. \begin{theorem} The analogue of Cerf's theorem for embedded surfaces in $4$-manifolds (Problem 1) fails in general: there exist compact smooth $4$-manifolds $X$, embedded surfaces $i_1, i_2 : \Sigma \to X$ and a diffeomorphism $f : X \to X$ homotopic to the identity for which $i_2 = f \circ i_1$, but $i_1, i_2$ are not smoothly isotopic. \end{theorem} \begin{proof} Let $X$ and $f : X \to X$ be as in the statement of Theorem \ref{thm:isotopysurface}. Then according to this theorem, there exists embedded surfaces $\Sigma \to X$ such that $\Sigma$ and $f(\Sigma)$ are not smoothly isotopic. On the other hand the diffeomorphism $f$, which is homotopic to the identity, maps $\Sigma$ onto $f(\Sigma)$. \end{proof} We have just shown that if $X$ is one of the $4$-manifolds in the statement of Theorem \ref{thm:isotopysurface}, then Problem 1 fails in a very strong sense. An interesting problem would be to find examples of compact, smooth $4$-manifolds where Problem 1 has a positive solution, if there are any. A brief outline of the contents of this paper is as follows. In Section \ref{sec:swdiff} we recall the definition of the Seiberg-Witten invariants of a diffeomorphism and recall how the gluing procedure of \cite{bk} can be used to produce examples of diffeomorphisms for which this invariant is non-zero. In Section \ref{sec:adj} we prove the main result of this paper, Theorem \ref{thm:fadjunction}. In Section \ref{sec:noniso} we give our main application of Theorem \ref{thm:fadjunction}, which is the construction of infinite families of embedded surfaces which are continuously isotopic but mutually non-isotopic smoothly.\\ \noindent{\bf Acknowledgments.} The author was financially supported by the Australian Research Council Discovery Project DP170101054. \section{Seiberg-Witten invariants of diffeomorphisms}\label{sec:swdiff} Let $X$ be a compact, oriented, smooth $4$-manifold and $f : X \to X$ an orientation preserving diffeomorphism. Assume also that $b^+(3) \ge 3$. In this section we recall how one can define a notion of Seiberg-Witten invariants for $f$, depending only on the smooth isotopy class of $f$. Let $E_f \to S^1$ denote the mapping cylinder of $f$, which we think of as being a smooth family of $4$-manifolds parametrised by the circle. Let $\mathfrak{s}$ be a spin$^c$-structure on $X$ which is preserved by $f$ and satisfies $d(X,\mathfrak{s}) = -1$, where \[ d(X , \mathfrak{s}) = \frac{ c_1(\mathfrak{s})^2 - \sigma(X)}{4} - 1 + b_1(X) - b^+(X) \] is the virtual dimension of the Seiberg-Witten moduli space associated to $(X,\mathfrak{s})$. Then as described in \cite{bk}, after fixing a choice of a smoothly varying family of metrics and self-dual $2$-form perturbations, we can construct a families Seiberg-Witten moduli space $\mathcal{M}(E_f , \mathfrak{s})$ parametrising solutions to the Seiberg-Witten equations on the fibres of $E_f$. For sufficiently generic perturbations, the moduli space $\mathcal{M}(E_f , \mathfrak{s})$ is a compact manifold of dimension $d(X , \mathfrak{s}) + 1 = 0$. By the usual cobordism argument, the number of points of $\mathcal{M}(E_f , \mathfrak{s})$ counted mod $2$ is independent of the choice of families metric and perturbation and hence defines an invariant \[ SW^{\mathbb{Z}_2}( X , f , \mathfrak{s}) \in \mathbb{Z}_2, \] which we shall refer to as the Seiberg-Witten invariant of $(X,f , \mathfrak{s})$ (or less precisely as the Seiberg-Witten invariants of $f$). The mod $2$ Seiberg-Witten invariants of $f$ can be lifted to integer invariants provided $f$ satisfies an orientability condition which we now describe. The Grassmannian $G_+$ of oriented maximal positive definite subspaces of $H^2(X ; \mathbb{R})$ has two connected components corresponding to the two possible orientations one can put on any particular maximal positive definite subspace. The diffeomorphism $f : X \to X$ is orientation preserving, so induces an isometry of $H^2(X ; \mathbb{R})$, which in turn induces a continuous map of $G_+$ to itself. Let us define $sgn_+(f) = \pm 1$ to be $+1$ if $f$ sends each component of $G_+$ to itself and $sgn_+(f) = -1$ if $f$ exchanges the two components of $G_+$. Suppose that $sgn_+(f)=1$. In this case it follows from \cite{bk} that the families moduli space $\mathcal{M}(E_f , \mathfrak{s})$ is orientable. Moreover the two possible orientations of $\mathcal{M}(E_f , \mathfrak{s})$ correspond in a natural way to the two connected component of $G_+$. From this it can be seen that if the metric and perturbation are varied, then the cobordism between the two moduli spaces can be promoted to an oriented cobordism. Therefore if $sgn_+(f)=1$ then (after choosing a connected component of $G_+$) we obtain an integer invariant \[ SW^{\mathbb{Z}}(X , f , \mathfrak{s}) \in \mathbb{Z} \] by counting with signs the number of points of $\mathcal{M}(E_f , \mathfrak{s})$. \begin{remark} The Seiberg-Witten invariants of $f$, when defined, are invariants of the smooth isotopy class of $f$. One sees this by noting that the underlying family of $4$-manifolds $E_f$ given by the mapping cylinder of $f$ is determined up to isomorphism by the isotopy class of $f$. In the case $f = id$ one easily sees that the Seiberg-Witten invariants of $f$ are zero because the family $E_f$ is just the constant family over $S^1$ and the virtual dimension $d(X , \mathfrak{s}) = -1$ of the unparametrised Seiberg-Witten moduli space is negative. Therefore if an orientation preserving diffeomorphism $f$ has non-zero Seiberg-Witten invariants, it follows that $f$ is not smoothly isotopic to the identity. This observation was used in \cite{rub3} and \cite{bk} to construct examples of diffeomorphisms which are continously isotopic to the identity but not smoothly isotopic. Although it is not the main focus of this paper, we will construct new examples of this phenomenon below. \end{remark} Let $M$ be a smooth compact simply-connected $4$-manifold. We will say that $M$ {\em dissolves on connected sum with $S^2 \times S^2$} if the connected sum $M \# (S^2 \times S^2)$ is diffeomorphic to \[ \#^n \mathbb{CP}^2 \#^m \overline{\mathbb{CP}^2} \; \; \text{or} \; \; \#^n (S^2 \times S^2) \#^m K3 \] for some $n,m \ge 0$, where $K3$ denotes the underlying $4$-manifold of a $K3$ surface. All examples that we consider will have non-positive signature, so the diffeomorphism from $M \# (S^2 \times S^2)$ to $\#^n \mathbb{CP}^2 \#^m \overline{\mathbb{CP}^2} \; \; \text{or} \; \; \#^n (S^2 \times S^2) \#^m K3$ can taken to be orientation preserving. The following result is a special case of \cite[Theorem 9.7]{bk} and is proven using a gluing formula for the families Seiberg-Witten invariant: \begin{theorem}\label{thm:dissolve1} Let $M$ be a compact simply-connected smooth $4$-manifold with $b^+(M)>1$ and $\sigma(M) \le 0$. Assume also that $M$ is not homeomorphic to $K3$. Suppose that $M$ dissolves on connected sum with $S^2 \times S^2$ and that there exists a spin$^c$-structure $\mathfrak{s}$ on $M$ with $d(M , \mathfrak{s}) = 0$ and $SW(M , \mathfrak{s}) = 1 \; ({\rm mod} \; 2)$. Let $X = M \# (S^2 \times S^2)$. Then there exists a diffeomorphism $f : X \to X$ such that $f$ is continuously isotopic to the identity and a spin$^c$-structure $\mathfrak{s}_X$ on $X$ such that $d(X , \mathfrak{s}_X) = -1$ and $SW^{\mathbb{Z}}(X , f , \mathfrak{s}_X) \neq 0$. \end{theorem} \begin{proof} Since $M$ dissolves on connected sum with $S^2 \times S^2$ and $\sigma(M)\le 0$, we have that $X = M \# (S^2 \times S^2)$ is diffeomorphic to either $\#^a \mathbb{CP}^2 \#^b \overline{\mathbb{CP}^2}$ for some $a,b$, if $M$ is not spin or $\#^n (S^2 \times S^2) \#^m K3$ for some $n,m$ if $M$ is spin. Clearly $a,b \ge 2$ in the non-spin case and $n \ge 1$ in the spin case. Let $M'$ be given by $\#^{a-1} \mathbb{CP}^2 \#^{b-1} \overline{\mathbb{CP}^2}$ if $M$ is not spin and $M' = \#^{n-1} (S^2 \times S^2) \#^m K3$ if $M$ is spin. Then $M,M'$ are homeomorphic and become diffeomorphic on connected sum with $S^2 \times S^2$. Moreover, all of the Seiberg-Witten invariants of $M'$ are zero since in all cases $M'$ is reducible (note that we explicitly required $M$ not to be homeomorphic to $K3$ in order to rule out the case $n=0,m=1$ which would give $M' = K3$). Now $M,M'$ satisfy the conditions of \cite[Theorem 9.7]{bk}. According to the proof of \cite[Theorem 9.7]{bk}, there exist diffeomorphisms $f_1,f_2 : X \to X$ inducing the same action on $H^2(X ; \mathbb{Z})$ and a spin$^c$-structure $\mathfrak{s}_X$ with $d(X , \mathfrak{s}_X) = -1$ preserved by $f_1$ and $f_2$ and such that $SW^{\mathbb{Z}_2}(X , f_1 , \mathfrak{s}_X) \neq SW^{\mathbb{Z}_2}(X , f_2 , \mathfrak{s}_X)$. Let $f = f_1 \circ f_2^{-1}$. Then $f$ acts trivially on $H^2(X ; \mathbb{Z})$, which by \cite{qui} implies that $f$ is continuously isotopic to the identity. By \cite[Lemma 2.6]{rub1}, we have \[ SW^{\mathbb{Z}_2}(X , f_1 \circ f_2^{-1} , \mathfrak{s}_X) = SW^{\mathbb{Z}_2}(X , f_1 , \mathfrak{s}_X) - SW^{\mathbb{Z}_2}(X , f_2 , \mathfrak{s}_X) \] and hence $SW^{\mathbb{Z}_2}(X , f , \mathfrak{s}_X) \neq 0$. Of course this implies that $SW^{\mathbb{Z}}(X , f , \mathfrak{s}_X)$ is also non-zero. Note also that $SW^{\mathbb{Z}}(X , f , \mathfrak{s}_X)$ is defined because $sgn_+(f) = 1$, as $f$ acts trivially on $H^2(X ; \mathbb{Z})$. \end{proof} The following corollary is a generalisation of \cite[Corollary 9.8]{bk}: \begin{corollary}\label{cor:ctsnotsmooth} Let $X$ be one of the $4$-manifolds \begin{itemize} \item[(i)]{$\#^{n+2m} (S^2 \times S^2) \#^n K3$ for $n,m \ge 0$, $n+m \ge 2$, or} \item[(ii)]{$\#^{2n} \mathbb{CP}^2 \#^{m} \overline{\mathbb{CP}^2}$ for $n \ge 2$, $m \ge 2n+1$.} \end{itemize} Then there exists a diffeomorphism $f : X \to X$ such that $f$ is continuously isotopic to the identity and a spin$^c$-structure $\mathfrak{s}$ on $X$ such that $d(X , \mathfrak{s}) = -1$ and $SW^{\mathbb{Z}}(X , f , \mathfrak{s}) \neq 0$, hence $f$ is not smoothly isotopic to the identity. \end{corollary} \begin{proof} Consider first case (i) where $X = \#^{n+2m} (S^2 \times S^2) \#^n K3$. The case $m=0, n\ge 2$ follows from \cite[Corollary 9.8]{bk}. In the case $m \ge 1$, it follows easily from \cite[Theorem 5]{hkw}, that there exists a simply connected spin symplectic $4$-manifold $M$ with $b^+(M)>1$ for which $X$ is diffeomorphic to $M \# S^2 \times S^2$. Then the result follows from Theorem \ref{thm:dissolve1} and the fact that on symplectic $4$-manifolds with $b^+(M)>1$ there exists a spin$^c$-structure $\mathfrak{s}$ on $M$ with $d(M , \mathfrak{s}) = 0$ and $SW(M , \mathfrak{s}) = 1 \; ({\rm mod} \; 2)$, namely the canonical spin$^c$-structure associated to a compatible almost complex structure. Now consider case (ii) where $X = \#^{2n} \mathbb{CP}^2 \#^{m} \overline{\mathbb{CP}^2}$. As in case (i) there exists a simply connected spin symplectic $4$-manifold $M$ with $b^+(M)>1$ for which $M \# S^2 \times S^2$ is diffeomorphic to $\#^{2n} (S^2 \times S^2)$. Now let $M'$ be the result of blowing up $M$ at $m-2n$ points. Then $X$ is diffeomorphic to $M' \# S^2 \times S^2$ and the result follows from Theorem \ref{thm:dissolve1} applied to $M'$. \end{proof} \begin{remark} Let $f : X \to X$ be as in Corollary \ref{cor:ctsnotsmooth}. For any integer $n$, let $f^n$ denote the $n$-fold composition of $f$ with itself. Suppose that $SW^{\mathbb{Z}}(X , f , \mathfrak{s}) = k \neq 0$. Then it follows from \cite[Lemma 2.6]{rub1} that $SW^{\mathbb{Z}}(X , f^n , \mathfrak{s}) = nk$, hence the diffeomorphisms $\{ f^n \}_{n \in \mathbb{Z}}$ are all continuously isotopic to the identity but mutually non-isotopic smoothly. \end{remark} \section{The adjunction inequality}\label{sec:adj} In this section we will prove Theorem \ref{thm:fadjunction}. Before getting to the proof we need a few preliminary results. Let $\Sigma$ denote a compact oriented surface equipped with a Riemannian metric $g_\Sigma$ and let $\mu$ be a $1$-form on $\Sigma$. For any $t \in [0,1]$ we define a metric $g'$ on $\mathbb{R} \times \Sigma$ by \[ g' = dx^2 + t( dx \otimes \mu + \mu \otimes dx + \mu^2) + g_\Sigma, \] where $x$ denotes the standard coordinate on $\mathbb{R}$. \begin{lemma}\label{lem:scalcurv} Let $s$ denote the scalar curvature of $g_\Sigma$ and $s'$ the scalar curvature of $g'$. Suppose that the $1$-form $\mu$ is harmonic with respect to $g_\Sigma$. Then \[ s' = s +\gamma \, Ric( \mu , \mu ) -\gamma | \nabla(\mu) |^2 - 2 \gamma^2 | \nabla_{\mu^{\#}}(\mu) |^2 \] where $Ric$ and $\nabla$ denote the Ricci curvature and Levi-Civita connection of $g_\Sigma$, $\mu^{\#} = (g_\Sigma)^{-1}(\mu)$, $\gamma$ is given by \[ \gamma = \frac{ t^2-t}{1+ (t-t^2)|\mu|^2} \] and where $| \; . \; |$ denotes taking the norm of various tensors with respect to $g_\Sigma$. \end{lemma} \begin{proof} The proof is a direct computation. We use local coordinates $(x^1,x^2)$ on $\Sigma$. Setting $x^0 = x$, we have local coordinates $(x^0,x^1,x^2)$ on $\mathbb{R} \times \Sigma$. We will use index notation along with the summation convention. Indices $a,b,c, \dots $ will run from $0$ to $2$ while indices $i,j,k,\dots$ will run from $1$ to $2$ only. For instance we may write \[ g_\Sigma = g_{ij}dx^i dx^j \text{ and } g' = g_{ab} dx^a dx^b. \] Then $g'$ is given in components by \[ g'_{00} = 1, \quad g'_{0i} = t\mu_i, \quad g'_{ij} = g_{ij} + t\mu_i \mu_j. \] One then finds \[ {g'}^{00} = \alpha, \quad {g'}^{0i} = \beta \mu^i, \quad {g'}^{ij} = g^{ij} + \gamma \mu^i \mu^j, \] where $\mu^i = g^{ij}\mu_j$ and \[ \alpha = \frac{1+t|\mu|^2}{1+(t-t^2)|\mu|^2}, \quad \beta = \frac{-t}{1+(t-t^2)|\mu|^2}, \quad \gamma = \frac{t^2-t}{1+(t-t^2)|\mu|^2}. \] Next, we compute the Christoffel symbols of $g'$ in terms of those of $g_\Sigma$. Let $\Gamma_{kij}$ and $\Gamma'_{cab}$ be given by \[ 2\Gamma_{kij} = \partial_i g_{jk} + \partial_j g_{ik} - \partial_k g_{ij}, \quad 2\Gamma'_{cab} = \partial_a g'_{bc} + \partial_b g'_{ac} - \partial_c g'_{ab}. \] Let $\mu_{ij} = \partial_i \mu_j$. Note that $\mu$ is a closed $1$-form since it is harmonic and thus $\mu_{ij} = \mu_{ji}$. A short calculation gives \[ \Gamma'_{kij} = \Gamma_{kij} + t\mu_{ij}\mu_k, \quad \Gamma'_{0ij} = t\mu_{ij} \] and $\Gamma'_{cab}=0$ whenver $a=0$ or $b=0$. Raising the first index gives: \begin{equation*} \begin{aligned} {{\Gamma'}^{0}}_{ij} &= {g'}^{00} \Gamma'_{0ij} + {g'}^{0k} \Gamma'_{kij} \\ &= \alpha t \mu_{ij} + \beta \mu^k ( \Gamma_{kij} t \mu_{ij} \mu_k) \\ &= (\alpha t + t\beta |\mu|^2) \mu_{ij} + \beta \mu^k \Gamma_{kij} \\ &= -\beta( \mu_{ij} - {\Gamma^k}_{ij}\mu_k) \\ &= -\beta( \partial_i \mu_j - {\Gamma^k}_{ik} \mu_k ) \\ &= -\beta \nabla_i \mu_j \end{aligned} \end{equation*} and \begin{equation*} \begin{aligned} {{\Gamma'}^{k}}_{ij} &= {g'}^{k0} \Gamma'_{0ij} + {g'}^{kl} \Gamma'_{lij} \\ &= \beta \mu^k t \mu_{ij} + (g^{kl} + \gamma \mu^k \mu^l)( \Gamma_{lij} + t\mu_{ij} \mu_l) \\ &= \beta\mu^k t \mu_{ij} + {\Gamma^k}_{ij} + t \mu^k \mu_{ij} + \gamma \mu^k \mu^l \Gamma_{lij} + t \gamma |\mu|^2 \mu^k \mu_{ij} \\ &= {\Gamma^k}_{ij} + (t \beta + t + t \gamma |\mu|^2) \mu^k \mu_{ij} + \gamma \mu^k \mu^l \Gamma_{lij} \\ &= {\Gamma^k}_{ij} - \gamma (\mu_{ij} - {\Gamma^l}_{ij} \mu_l) \mu^k \\ &= {\Gamma^k}_{ij} - \gamma (\nabla_i \mu_j) \mu^k. \end{aligned} \end{equation*} Therefore, if $\nabla$ denotes the Levi-Civita connection of $g_\Sigma$ and $\nabla'$ the Levi-Civita connection of $g'$, we have shown that \[ \nabla'_0( \partial_i) = \nabla'_i( \partial_0) = \nabla'_0(\partial_0) = 0 \] and \[ \nabla'_i(\partial_j) = \nabla_i(\partial_j) + \nabla_i(\mu_j) \theta \] where \[ \theta = -\beta \partial_0 - \gamma \mu^{\#}, \quad \mu^{\#} = \mu^j \partial_j. \] Let ${R^l}_{ijk}$ and ${{R'}^{l}}_{ijk}$ be the Riemann curvatures of $g_\Sigma$ and $g'$, so \[ \nabla_i \nabla_j \partial_k - \nabla_j \nabla_i \partial_k = {R^l}_{ijk} \partial_l, \quad \nabla'_a \nabla'_b \partial_c - \nabla'_b \nabla'_a \partial_c = {{R'}^d}_{abc} \partial_d. \] It follows that ${{R'}^{d}}_{abc} = 0$ whenever $a,b$ or $c$ are zero, so the only curvature terms for $g'$ are of the form ${R'}^0_{ijk}$ or ${{R'}^l}_{ijk}$. Moreover only the ${{R'}^l}_{ijk}$ terms contribute to the Ricci curvature, so we only need to compute these. One finds \begin{equation*} \begin{aligned} {{R'}^l}_{ijk} &= {R^l}_{ijk} + \nabla_j \mu_k( -\gamma_i \mu^l - \gamma \nabla_i (\mu^l) + \gamma^2 (\nabla_i(\mu_m)\mu^m)\mu^l) \\ & \; \; \; \; - \nabla_i(\mu_k)( -\gamma_j \mu^l - \gamma \nabla_j(\mu^l) + \gamma^2 (\nabla_j(\mu_m)\mu^m)\mu^l ) \end{aligned} \end{equation*} where $\gamma_i = \partial_i \gamma$. Let $R_{ij} = {R^k}_{ikj}$ and $R'_{ab} = {{R'}^c}_{acb}$ be the Ricci curvatures of $g_\Sigma$ and $g'$. As noted above, the only non-zero terms in $R'$ are given by ${R'}_{ij} = {{R'}^k}_{ikj}$. A direct computation gives \begin{equation*} \begin{aligned} R'_{ij} &= R_{ij} + \nabla_k \mu_j ( -\gamma_i \mu^k - \gamma \nabla_i \mu^k + \gamma^2 \nabla_i (\mu_m)\mu^m \mu^k) \\ & \; \; \; \; - \nabla_i \mu_j ( -\gamma_k \mu^k - \gamma \nabla_k \mu^k + \gamma ^2 \nabla_k (\mu_m) \mu^m \mu^k ) \\ & = R_{ij} - \gamma_i \mu^k \nabla_k \mu_j - \gamma \nabla_i( \mu^k )\nabla_j(\mu_k) + \gamma^2 (\nabla_i(\mu_m)\mu^m)(\nabla_j(\mu_n) \mu^n) \\ & \; \; \; \; + (\nabla_i (\mu_j))(\gamma_k \mu^k) + \gamma (\nabla_k(\mu^k))\nabla_i \mu_j - \gamma^2 (\nabla_i (\mu)_j) \nabla_k(\mu_m)\mu^m \mu^k. \end{aligned} \end{equation*} But note that $\gamma = (t^2-t)/(1+ (t-t^2)|\mu|^2)$, so \[ \gamma_i = \frac{-(t^2-t)}{1 + (t-t^2)|\mu|^2} (t-t^2) \partial_i( |\mu|^2 ) = \gamma^2 \partial_i( |\mu|^2) \] and \[ \partial_i( |\mu|^2) = \partial_i g_\Sigma(\mu,\mu) = 2 \nabla_i(\mu_k) \mu^k. \] So \[ -\gamma_i \mu^k \nabla_k(\mu_j) = -2\gamma^2 (\nabla_i(\mu_m) \mu^m)(\nabla_j(\mu_n)\mu^n) \] and \[ \gamma_k \mu^k = 2 \gamma^2 \nabla_k(\mu_m)\mu^k \mu^m. \] Substituting these into the above expression for $R'_{ij}$, we get \begin{equation*} \begin{aligned} R'_{ij} &= R_{ij} - \gamma \nabla_i( \mu^k) \nabla_j( \mu_k) - \gamma^2 (\nabla_i(\mu_m) \mu^m)(\nabla_j(\mu_n)\mu^n) \\ & \; \; \; \; + \gamma^2 (\nabla_i(\mu)_j) ( \nabla_k(\mu)_m \mu^m \mu^k) + \gamma( \nabla_k(\mu^k)) \nabla_i(\mu_j). \end{aligned} \end{equation*} Moreover, we assume that $\mu$ is harmonic so $\nabla_k(\mu^k) = 0$ and the last term vanishes. Now let $s = g^{ij}R_{ij}$, $s' = {g'}^{ij} R'_{ij}$ be the scalar curvatures. Then contracting the above expression for $R'_{ij}$ and using the assumption that $\mu$ is harmonic gives: \begin{equation*} \begin{aligned} s' &= (g^{ij} + \gamma \mu^i \mu^j)( R_{ij} - \gamma \nabla_i( \mu^k) \nabla_j( \mu_k) - \gamma^2 (\nabla_i(\mu_m) \mu^m)(\nabla_j(\mu_n)\mu^n)) \\ & \; \; \; \; \; \; \; \; + (g^{ij} + \gamma \mu^i \mu^j)(\gamma^2 (\nabla_i(\mu)_j) ( \nabla_k(\mu)_m \mu^m \mu^k) ) \\ &= s + \gamma R_{ij} \mu^i \mu^j - \gamma | \nabla(\mu) |^2 - 2 \gamma^2 | \nabla_{\mu^{\#}}(\mu)|^2. \end{aligned} \end{equation*} \end{proof} \begin{lemma}\label{lem:cs} Let $g_{ij}$ be a real-valued symmetric positive definite matrix and $g^{ij}$ its inverse. Then for any vector $v^i$ and bilinear form $\lambda_{ij}$ we have: \[ \sum_{i,j,k,l} g^{jl} v^i \lambda_{ij} v^k \lambda_{kl} \le |v|^2 |\lambda|^2, \] where $|v|^2 = \sum_{i,j} g_{ij}v^iv^j$, $|\lambda|^2 = \sum_{i,j,k,l} g^{ij}g^{kl} \lambda_{ik}\lambda_{jl}$. \end{lemma} \begin{proof} Set $\tau_j = \sum_i v^i \lambda_{ij}$. Then we need to show $|\tau|^2 = \sum_{j,k} g^{jk} \tau_j \tau_k \le |v|^2 |\lambda|^2$. The sought-after inequality does not depend on the choice of basis so we may as well assume $g_{ij}$ is the identity matrix. Then \[ |v|^2 = \sum_i |v^i|^2, \quad |\lambda|^2 = \sum_{i,j} |\lambda_{i,j}|^2, \quad |\tau|^2 = \sum_i |\tau_i|^2. \] The Cauchy-Schwarz inequality gives \[ |\tau_i|^2 = | \sum_j v^j \lambda_{ij} |^2 \le |v|^2 \sum_j |\lambda_{ij}|^2 \] and thus \[ |\tau|^2 = \sum_i |\tau_i|^2 \le |v|^2 \sum_{i,j} |\lambda_{ij}|^2 = |v|^2 |\lambda|^2. \] \end{proof} Let $X$ be a compact, oriented, smooth $4$-manifold with $b^+(X) \ge 3$ and $f : X \to X$ an orientation preserving diffeomorphism. Assume further that $b^+(X) \ge 3$. Recall that according to Definition \ref{def:basic} we say that a cohomology class $c \in H^2(X ; \mathbb{Z})$ is {\em $f$-basic} if $c = c_1(\mathfrak{s})$ for a spin$^c$-structure $\mathfrak{s}$ on $X$ which is preserved by $f$, satisfies $d(X , \mathfrak{s}) = -1$ and such that either $SW^{\mathbb{Z}_2}(X , f , \mathfrak{s})$ is non-zero or $SW^{\mathbb{Z}}(X , f , \mathfrak{s})$ is defined and is non-zero. \begin{proof}[{\bf Proof of Theorem \ref{thm:fadjunction}:}] Let $j : \Sigma \to X$ be an embedded surface of genus $g$ and suppose there exists an isotopy between the embeddings given by $j$ and $f \circ j$. By the isotopy extension theorem \cite[Theorem B]{pal}, there exists a diffeomorphism $g : X \to X$ isotopic to the identity such that $f \circ j = g \circ j$, hence $(g^{-1} \circ f) \circ j = j$. Note that a class $c \in H^2(X ; \mathbb{Z})$ is $f$-basic if and only if it is $g^{-1} \circ f$ basic, since the Seiberg-Witten invariants of a diffeomorphism depend only on the isotopy class. Replacing $f$ by $g^{-1} \circ f$, we may as well assume that $f$ preserves $\Sigma$ (i.e. $f \circ j = j$). Let $N_\Sigma$ denote the normal bundle of $\Sigma$. Then $N_\Sigma$ is an $SO(2)$-bundle with Euler class $[\Sigma]^2$. Identify a tubular neighbourhood of $\Sigma$ with a neighbourhood of the zero section in $N_\Sigma$. The action of $f$ in such a neighbourhood of $\Sigma$ is then given by the induced action $f_* : N_\Sigma \to N_\Sigma$ of the derivative of $f$ along the normal bundle. Since the identity component of $GL(2,\mathbb{R})$ deformation retracts to $SO(2)$, we can assume after performing an isotopy that $f_*$ is valued in $SO(2)$. In other words, there is a smooth function $\varphi : \Sigma \to SO(2)$ such that the action of $f$ in a suitable tubular neighbourhood of $\Sigma$ has the form \[ N_\Sigma \to N_\Sigma \quad w \mapsto \varphi( \pi(w)) w \] where $\pi : N_\Sigma \to \Sigma$ is the projection. Note that by applying a further isotopy to $f$, we are free to deform $\varphi$ by a smooth homotopy. Let $g_{\Sigma,0}$ be a constant scalar curvature metric on $\Sigma$. Then after applying to a homotopy to $\varphi$ and extending this to a corresponding isotopy of $f$, we can assume that $\varphi : \Sigma \to S^1$ is harmonic with respect to the metric $g_{\Sigma,0}$ (i.e. $\varphi^{-1} d\varphi$ is a harmonic $1$-form on $\Sigma$ with respect to $g_{\Sigma,0}$). Assume first that $[\Sigma]^2 = 0$ and $g \ge 1$. Let $E_f \to S^1$ be the mapping cylinder of $f$ which we interpret as a family of $4$-manifolds parametrised by $S^1 = [0,1]/\{0 \sim 1\}$. So $E_f$ is the quotient of $[0,1] \times X$ by the relation $(1,x) \sim (0,f(x))$. A fibrewise metric for $E_f$ is equivalent to a smooth path $\{ g_t \}_{t \in [0,1]}$ of metrics on $X$ such that $g_1 = f^*(g_0)$. Since $[\Sigma]^2 = 0$, the normal bundle is trivial and we may write $N_\Sigma = \Sigma \times \mathbb{R}^2$. The action of $f$ in a tubular neighbourhood of $\Sigma$ has the form $f( w , z) = (w , \varphi(w)z)$ for some $\varphi : \Sigma \to SO(2)$. Let $\epsilon_1 > \epsilon_2 > 0$ be chosen so that the annulus $Y_{\epsilon_1,\epsilon_2} = \{ (w,z) | \epsilon_1 > |z| > \epsilon_2 \}$ is contained in the tubular neighbourhood. Then $Y_{\epsilon_1,\epsilon_2}$ is diffeomorphic to the product $(\epsilon_1 , \epsilon_2) \times S^1 \times \Sigma = (\epsilon_1 , \epsilon_2) \times Y$ where $Y = S^1 \times \Sigma$. We define a metric $g_{Y_{\epsilon_1,\epsilon_2}}$ on $Y_{\epsilon_1 , \epsilon_2}$ by taking the product of the standard metric on $(\epsilon_1 , \epsilon_2)$ induced from $\mathbb{R}$ with some metric $g_{Y,0}$ on $Y$. Choose an extension of $g_{Y_{\epsilon_1,\epsilon_2}}$ to a metric on all of $X$ and denote this metric as $g_0$. Let $g_1 = f^*(g_0)$ and for $t \in [0,1]$ define $g_t = tg_1 + (1-t)g_0$. So $\{ g_t \}_{t \in [0,1]}$ defines a family of metrics for the family $E_f$. Choose some $\epsilon_3 \in (\epsilon_1 , \epsilon_2)$ and identify $Y$ with the subset $\{ (w,z) \; | \; |z| = \epsilon_3 \}$ of $Y_{\epsilon_1,\epsilon_2}$. Then $f$ sends $Y$ to itself and we let $f_Y : Y \to Y$ denote the restriction of $f$ to $Y$. Note that the restriction of $g_0$ to $Y$ is $g_{Y,0}$. More generally, let $g_{Y,t}$ denote the restriction of $g_t$ to $Y$. Note that $g_{Y,t} = t g_{Y,1} + (1-t)g_{Y,0}$, where $g_{Y,1} = f_Y^*(g_{Y,0})$. Since the normal bundle of $\Sigma$ is trivial, we have that $Y$ separates $X$ into to components $X_+$ and $X_-$ with common boundary $Y$ (the interior of $X_-$ is a tubular neighbourhood of $\Sigma$ and $X_+$ is $X$ minus the interior of $X_-$). Moreover the diffeomorphism $f : X \to X$ respects the decomposition $X = X_+ \cup_Y X_-$. By construction our family of metrics $\{ g_t \}$ when restricted to a collar neighbourhood $(-\epsilon , \epsilon) \times Y$ of $Y$ is the product of the standard metric on $(-\epsilon , \epsilon)$ induced from $\mathbb{R}$ with the family of metrics $\{ g_{Y,t} \}$ on $Y$. For any $R>0$ let $X_R$ be the $4$-manifold obtained from $X$ by cutting along $Y$ and inserting a cylinder $[-R , R] \times Y$ with the family of product metrics (namely the standary metric on $[-R,R]$ times the family $\{ g_{Y,t} \}$ of metrics on $Y$). This defines a family $\{ g_t(R) \}_{t \in [0,1]}$ of metrics on $X_R$ for each $R$, moreover $g_1(R) = f_R^*(g_0(R))$, where $f_R : X_R \to X_R$ is the diffeomophism obtained from $f$ by acting as $id \times f_Y$ on the cylinder $[-R,R] \times Y$. Clearly each $X_R$ can be identified with $X$ in such a way that each $f_R$ is isotopic to $f$, hence has the same Seiberg-Witten invariants. Let $c \in H^2(X ; \mathbb{Z})$ be an $f$-basic class. So there exists a spin$^c$-structure $\mathfrak{s}$ preserved by $f$ with $c = c_1(\mathfrak{s})$ and such that either the mod $2$ Seiberg-Witten invariant of $(X , f , \mathfrak{s})$ is non-zero, or $sgn_+(f)=1$ and the integer Seiberg-Witten invariant of $(X,f,\mathfrak{s})$ is non-zero. In either case this means that the families moduli space $\mathcal{M}(X,f, \mathfrak{s}, \{g_t\} , \{\eta_t\} )$ is non-empty for a generic families perturbation $\{ \eta_t \}_{t \in [0,1]}$. By definition $\eta_t$ is a smooth path of $g_t$-self-dual $2$-forms such that $\eta_1 = f^*(\eta_0)$. Non-emptyness of the moduli space means that for some $t \in [0,1]$ there exists an irreducible solution of the Seiberg-Witten equations for $(X , \mathfrak{s} , g_{t} , \eta_{t})$. We claim this this also implies the existence of a (possibly reducible) solution to the Seiberg-Witten equations for $(X , \mathfrak{s} , g_{t})$ for some $t \in [0,1]$ and with the zero perturbation. To see this, let $H^+_{g_t}$ denote the space of $g_t$-self-dual harmonic $2$-forms and let $w_t \in H^+_{g_t}$ be defined as the $L^2$ orthogonal projection of $c \in H^2(X ; \mathbb{Z})$ to $H^+_{g_t}$, with respect to the metric $g_t$. We note that the $\eta$-perturbed Seiberg-Witten equations in the metric $g_t$ admit a reducible solution if and only if the $L^2$ orthogonal projection of $\eta$ to $H^+_{g_t}$ equals $w_t$. Therefore if $w_t \neq 0$ for all $t \in [0,1]$, then for all families perturbations $\{ \eta_t \}$ in a sufficiently small neighbourhood of the zero, there are no reducibles. Then by taking a sequence of generic families perturbations $\{ \eta_t^{(n)} \}$ converging to zero (in the $\mathcal{C}^\infty$-topology) and using the compactness properties of the Seiberg-Witten equations, we deduce that there exists a solution of the Seiberg-Witten equations for $(X , \mathfrak{s} , g_{t})$ for some $t \in [0,1]$ with zero perturbation. On the other hand if $w_t = 0$ for some $t_0$, then there exists a (reducible) solution of the Seiberg-Witten equations for $(X , \mathfrak{s} , g_{t_0} )$ with zero perturbation. Hence the claim follows in either case. The above argument can likewise be applied to the family of metrics $\{ g_t(R) \}_{t \in [0,1]}$ for any $R>0$. Hence for each $R>0$ there exists a $t_R \in [0,1]$ such that $(X_R , f_R , \mathfrak{s} , g_{t_R}(R) )$ admits a solution of the unperturbed Seiberg-Witten equations. But note that the restriction of $g_{t_R}$ to the collar $[-R , R] \times Y$ is the product of the standard metric on $[-R,R]$ with $g_{Y,t_R}$. By compactness of $[0,1]$, we can find a sequence $R_n$ of positive real numbers such that $R_n \to \infty$ as $n \to \infty$ and $t_{R_n} \to t_\infty $ as $n \to \infty$ for some $t_\infty \in [0,1]$. This implies that the sequence of metrics $g_{Y , t_{R_n}}$ converges in the $\mathcal{C}^\infty$-topology to $g_{Y , t_\infty}$. The argument used in the proof of \cite[Proposition 8]{km} (or alternatively \cite[Section 2.4.2]{nic}) can be adapted to the case where there is a sequence of metrics converging in the $\mathcal{C}^\infty$-topology. It follows that there exists a solution of the Seiberg-Witten equations on $\mathbb{R} \times Y$ with respect to the product ${g}_{\mathbb{R}} \times g_{Y , t_\infty}$ of the standard metric on $\mathbb{R}$ with $g_{Y , t_\infty}$ which is translation invariant in the temporal gauge, and where the spin$^c$-structure is obtained from $\mathfrak{s}$ in the obvious way (restrict $\mathfrak{s}$ to a collar neighbourhood $(-\epsilon , \epsilon) \times Y$ of $Y$ and then extend to $\mathbb{R} \times Y$ by homotopy equivalence). Recall that $Y = S^1 \times \Sigma$. We now take $g_{Y,0} = g_{S^1} \times g_{\Sigma}$ to be the product of a unit length metric $g_{S^1}$ on $S^1$ with $g_{\Sigma} = \lambda g_{\Sigma,0}$ on $\Sigma$, where $g_{\Sigma,0}$ is a fixed constant scalar curvature metric on $\Sigma$ and $\lambda$ is a positive constant which for the moment is left undetermined. Note that $g_{\Sigma}$ is a constant scalar curvature metric and that $\varphi$ is harmonic with respect to $g_\Sigma$ for any $\lambda$. Recall that $g_{Y,t} = t g_{Y,1} + (1-t)g_{Y,0}$ where $g_{Y,1} = f_Y^*(g_{Y,0})$. To proceed further we need to examine the scalar curvature of the metrics $g_{Y,t}$. For this purpose we can view $S^1$ as the quotient of $\mathbb{R}$ with its standard metric by the action of $\mathbb{Z}$ by integer translations. Then we may as well compute the scalar curvature of the pullback metric on $\mathbb{R} \times \Sigma$. Then $f_Y : Y \to Y$ is given by \[ f_Y( x , w ) = (x + \varphi(w) , w ) \] where we view $\varphi : \Sigma \to S^1$ as an $\mathbb{R}/\mathbb{Z}$-valued function such that $\mu = d \varphi$ is a harmonic $1$-form on $\Sigma$ with integral periods. The metric $g_{Y,0}$ lifts to $dx^2 + g_\Sigma$ on $\mathbb{R} \times \Sigma$. It follows that \[ g_{Y,1} = f_Y^*(g_{Y,0}) = f_Y^*( dx^2 + g_\Sigma) = (dx + \mu)^2 + g_\Sigma \] and hence \[ g_{Y,t} = g_{Y,0} + t (dx \otimes \mu + \mu \otimes dx + \mu^2). \] Let $s$ denote the (constant) scalar curvature of $g_\Sigma$ and $s_t$ the scalar curvature of $g_{Y,t}$. Then from Lemma \ref{lem:scalcurv}, we have \[ s_t = s +\gamma \, Ric( \mu , \mu ) -\gamma | \nabla(\mu) |^2 - 2 \gamma^2 | \nabla_{\mu^{\#}}(\mu) |^2 \] where $Ric$ and $\nabla$ denote the Ricci curvature and Levi-Civita connection of $g_\Sigma$, $\mu^{\#} = (g_\Sigma)^{-1}(\mu)$, $\gamma$ is given by \[ \gamma = \frac{ t^2-t}{1+ (t-t^2)|\mu|^2} \] and where $| \; . \; |$ denotes taking the norm of various tensors induced by $g_\Sigma$. Since $\Sigma$ is $2$-dimensional, we have $Ric = \frac{s}{2} g_\Sigma$ and so \begin{equation*} \begin{aligned} s_t &= s +\frac{\gamma s}{2} |\mu|^2 - \gamma | \nabla(\mu) |^2 - 2 \gamma^2 | \nabla_{\mu^{\#}}(\mu) |^2 \\ &= \left(1 + \frac{\gamma |\mu|^2}{2} \right)s - \gamma |\nabla(\mu) |^2 -2 \gamma^2 | \nabla_{\mu^{\#}}(\mu) |^2. \end{aligned} \end{equation*} Lemma \ref{lem:cs} applied to $v^i = \mu^i$ and $\lambda_{ij} = \nabla_i(\mu_j)$ gives \[ | \nabla_{\mu^{\#}}(\mu)|^2 \le |\mu|^2 |\nabla(\mu)|^2. \] Therefore we have \[ s_t \ge \left(1 + \frac{\gamma |\mu|^2}{2} \right)s - \gamma |\nabla(\mu) |^2 \left( 1 - 2 \gamma |\mu|^2 \right). \] Note that \[ 1 - 2 \gamma |\mu|^2 = \frac{1 - (t-t^2)|\mu|^2}{1+(t-t^2)|\mu|^2}. \] Next, we observe that since $g_\Sigma = \lambda g_{\Sigma , 0}$, we have that $|\mu|^2$ scales as $\lambda^{-1}$. Hence for all $\lambda$ sufficiently large we have $|\mu|^2 \le 1$ and $1 - 2\gamma^2 |\mu|^2 \ge 0$. Note also that $\gamma \le 0$ from the definition of $\gamma$. It follows that \begin{equation}\label{equ:st} s_t \ge \left(1 + \frac{\gamma |\mu|^2}{2} \right)s. \end{equation} Assume henceforth that such a $\lambda$ has been chosen. Let $(A , \psi)$ denote a solution of the Seiberg-Witten equations on $\mathbb{R} \times Y$ with respect to the product metric $g_\mathbb{R} \times g_{Y , t_\infty}$ and zero perturbation, which is in the temporal gauge and is translation invariant. The Gauss-Bonnet theorem gives \[ s = \frac{8\pi(1-g)}{vol(\Sigma)} \] where $vol(\Sigma)$ denotes the volume of $\Sigma$ in the metric $g_\Sigma$. Note that $s \le 0$ as $g \ge 1$. Equation (\ref{equ:st}) gives \[ -s_t \le \left(1 + \frac{\gamma |\mu|^2}{2} \right)(-s) \le -s \] because $\gamma \le 0$ for any $t \in [0,1]$. Therefore \[ -s_t \le \frac{8\pi(g-1)}{vol(\Sigma)}. \] Then arguing as in \cite[Section 5]{km}, the Seiberg-Witten equations imply an estimate of the form \[ |F_A| \le \frac{4\pi(g-1)}{vol(\Sigma)} \] and therefore \[ | \langle [\Sigma] , c \rangle | = \frac{1}{2\pi} \left| \int_\Sigma F_A \right| \le (2g-2). \] This proves Theorem \ref{thm:fadjunction} in the case that $[\Sigma]^2 = 0$ and $g \ge 1$. Next assume that $[\Sigma]^2 = 0$ and $g=0$. Proceeding as before we can assume that $f$ preserves $\Sigma$ and that the action of $f$ in a tubular neighbourhood of $\Sigma$ has the form \[ N_\Sigma \to N_\Sigma \quad w \mapsto \varphi( \pi(w)) w \] for some $\varphi : \Sigma \to S^1$. But $g=0$ implies that $H^1(\Sigma ; \mathbb{Z}) = 0$ and hence $\varphi$ is homotopic to the identity. Hence after changing $f$ by a further isotopy, we can assume that $f$ acts as the identity in some tubular neighbourhood $U$ of $\Sigma$. For any integer $n > 0$, let $\Sigma_1 , \dots , \Sigma_n$ denote $n$ parallel copies of $\Sigma$ contained in $U$ and mutually disjoint. This is possible since $[\Sigma]^2 = 0$ means the normal bundle of $\Sigma$ is trivial. Let $X' = X \# \overline{\mathbb{CP}^2}$ denote the connected sum of $X$ with $\overline{\mathbb{CP}^2}$, where the connected sum is performed within $U$. Let $U'$ denote the corresponding open subset of $X'$ obtained from connect summing $\overline{\mathbb{CP}^2}$ to $U$. Then $f$ extends to a diffeomorphism $f' : X' \to X'$ which acts as the identity on $U'$. Let $S \in H^2(X' ; \mathbb{Z})$ represent the exceptional divisor. The blowup formula for families Seiberg-Witten invariants \cite{liu} implies that $c' = c + S \in H^2(X' ; \mathbb{Z})$ is an $f'$-basic class (note that the blowup formula in \cite{liu} was proved under an orientability assumption which in our case amounts to $sgn_+(f)=1$, however the proof works works equally well for the mod $2$ Seiberg-Witten invariants without any orientability assumption). The class $[\Sigma_n] = n[\Sigma] + S$ can be represented by an embedded sphere $\Sigma_n$ in $U' \subset X'$. Moreover $[\Sigma_n]^2 = -1$, so we can blow down $\Sigma_n$ to get a $4$-manifold $Y_n$. Since the blow down operation takes place in $U'$, we see that $f'$ induces a diffeomorphism $f_n : Y_n \to Y_n$. Writing $c' = c_n + [\Sigma_n]$ with $c_n \in H^2( Y_n ; \mathbb{Z})$, we see by another application of the families blowup formula that $c_n$ is an $f_n$-basic class. Applying the families blowup formula yet again, it follows that $c_n - [\Sigma_n]$ is an $f'$-basic class. But \[ c_n - [\Sigma_n] = c_n + [\Sigma_n] - 2[\Sigma_n] = c - S - 2 n[\Sigma]. \] If $[\Sigma]$ is non-torsion, then we have an infinite collection of $f'$-basic classes $\{ c-S-2n[\Sigma] \}$ on $X'$. However, for a given diffeomorphism $f' : X' \to X'$, only finitely many classes can be $f'$-basic. This follows by the same reasoning as in the unparametrised case: we can obtain a bound on solutions of the Seiberg-Witten equations independent of spin$^c$-structure. Therefore $[\Sigma]$ is a torsion class. We now assume that $[\Sigma]^2 = n > 0$. By possibly reversing orientation on $\Sigma$, we can assume that $\langle [\Sigma] , c \rangle \ge 0$. As before we can assume that $f$ preserves $\Sigma$ and that the action of $f$ in a tubular neighbourhood of $\Sigma$ takes the form \[ N_\Sigma \to N_\Sigma \quad w \mapsto \varphi( \pi(w)) w \] for some $\varphi : \Sigma \to SO(2)$. Recall also that we are free to change $\varphi$ by an arbitrary smooth homotopy (and change $f$ by a corresponding isotopy). Therefore, we may assume that there exists a non-empty open subset $U \subset \Sigma$ on which $\varphi$ is the identity. It follows that $f$ acts as the identity on $\pi^{-1}(U)$, where $\pi : N_\Sigma \to \Sigma$ is the projection map. In particular, we can find $n$ points $x_1, \dots , x_n \in \Sigma$ such that $f$ acts as the identity in a neighbourhood of each point. Let $X_n$ be the result of blowing up $X$ at the $n$ points $x_1, \dots , x_n$ of $\Sigma$. Since $f$ acts as the identity in a neighbourhood of these points, we have that $f$ extends naturally to a diffeomorphism $f_n : X_n \to X_n$. Denote by $\mathfrak{s}_i$ a spin$^c$-structure on the $i$-th copy of $\overline{\mathbb{CP}^2}$ in $X_n = X \#^n \overline{\mathbb{CP}^2}$ such that $S_i = c_1(\mathfrak{s}_i)$ represents the exceptional divisor and let $\widetilde{\Sigma}$ denote the proper transform of $\Sigma$ (or more differential geometrically, connect sum $\Sigma$ to $2$-spheres representing $-S_1, \dots , -S_n$ at the points $x_1, \dots , x_n$). Then $\widetilde{\Sigma}$ has the same genus as $\Sigma$, $[\widetilde{\Sigma}]^2 = 0$ and $f_n$ acts as the identity in a neighbourhood of $\widetilde{\Sigma}$. We have that $\widetilde{c} = c + S_1 + \cdots + S_n$ is $f_n$-basic from the blowup formula for families Seiberg-Witten invariants. Therefore, we are in the self-intersection zero case, so if $g \ge 1$, then as shown above we have \begin{equation*} \begin{aligned} 2g-2 &\ge | \langle [\widetilde{\Sigma}] , \widetilde{c} \rangle| \\ & = | \langle [\Sigma] - S_1 - \cdots - S_n , c + S_1 + \cdots + S_n \rangle | \\ &= | \langle [\Sigma] , c \rangle + n | \\ & = |\langle [\Sigma] , c \rangle| + n \quad (\text{since } \langle [\Sigma] , c \rangle \ge 0) \\ &= |\langle [\Sigma] , c \rangle| + [\Sigma]^2, \end{aligned} \end{equation*} which is the adjunction inequality. If $g = 0$, then as above we have shown that $[\widetilde{\Sigma}]$ is a torsion class. But this is impossible since $n > 0$ and each $S_i$ is non-torsion. \end{proof} \section{Non-isotopic embedded surfaces}\label{sec:noniso} In this section we give an application of Theorem \ref{thm:fadjunction} to construct infinite families of embedded surfaces which are homotopic (in fact continuously isotopic) but not smoothly isotopic. \begin{theorem} Let $X$ be one of the $4$-manifolds \begin{itemize} \item[(i)]{$\#^{n+2m} (S^2 \times S^2) \#^n K3$ for $n,m \ge 0$, $n+m \ge 2$, or} \item[(ii)]{$\#^{2n} \mathbb{CP}^2 \#^{m} \overline{\mathbb{CP}^2}$ for $n \ge 2$, $m \ge 2n+1$.} \end{itemize} Then there exists a diffeomorphism $f : X \to X$ such that: \begin{itemize} \item[(1)]{$f$ is homotopic to the identity.} \item[(2)]{Let $u \in H^2(X ; \mathbb{Z})$ be any class with $u^2 > 0$. If $\Sigma \to X$ is an embedded surface of genus $g$ representing $u$ and $f^n(\Sigma)$, $f^m(\Sigma)$ are smoothly isotopic for some $n \neq m$, then $2g-2 \ge u^2$.} \item[(3)]{Let $u \in H^2(X ; \mathbb{Z})$ satisfy $u^2 > 0$. In case (ii) assume moreover that u is a multiple of a primitive ordinary class. Then there exists an embedded surface $\Sigma \to X$ representing $u$ such that the surfaces $\{ f^n(\Sigma) \}_{n \in \mathbb{Z} }$ are all continuously isotopic but mutually non-isotopic smoothly. If $u$ is primitive then $\Sigma$ can be taken to have genus zero. In all other cases we can take $\Sigma$ to have genus $g$ satisfying $2g-2 < u^2$.} \end{itemize} \end{theorem} \begin{proof} Let $X$ be as in (i) or (ii). Then from Corollary \ref{cor:ctsnotsmooth}, there exists a diffeomorphism $f : X \to X$ which is continuously isotopic for the identity (in particular, $f$ is homotopic to the identity proving (1)) and for which there exists a a spin$^c$-structure $\mathfrak{s}$ preserved by $f$ with $d(X , \mathfrak{s}) = -1$ and $SW^{\mathbb{Z}}(X,f,\mathfrak{s}) \neq 0$. Let $f^n$ denote the $n$-fold composition of $f$, where $n$ is any integer. It follows that $f^n$ preserves $\mathfrak{s}$ and that $SW^{\mathbb{Z}}(X , f^n , \mathfrak{s}) \neq 0$ for any $n \neq 0$. Therefore we can apply Theorem \ref{thm:fadjunction} to $(X,f^n)$ for any $n \neq 0$. Let $u \in H^2(X ; \mathbb{Z})$ be any class with $u^2 > 0$ and suppose $\Sigma \to X$ is an embedded surface of genus $g$ representing $u$. If $f^n(\Sigma)$ and $f^m(\Sigma)$ are smoothly isotopic for some $n \neq m$, then $f^{n-m}(\Sigma)$ is smoothly isotopic to $\Sigma$ and hence Theorem \ref{thm:fadjunction} implies that \[ 2g-2 \ge u^2 + | \langle \Sigma , c \rangle | \ge u^2, \] proving (2). Let $u \in H^2(X ; \mathbb{Z})$ satisfy $u^2 > 0$. In case (ii) assume moreover that $u$ is a multiple of a primitive ordinary class (note that this is automatic in case (i)). We will show that there exists an embedded surface $\Sigma \to X$ of genus $g$ representing $u$ and satisfying $2g-2 < u^2$. In light of the above adjunction inequality, this implies that the surfaces $\{ f^n(\Sigma) \}_{n \in \mathbb{Z}}$ are mutually smoothly non-isotopic. On the other hand, $f$ is continuously isotopic to the identity, so all the surfaces $\{ f^n(\Sigma) \}_{n \in \mathbb{Z}}$ are continuously isotopic. Let $(\Lambda , \langle \, , \, \rangle)$ be the lattice $\Lambda = H^2(X ; \mathbb{Z})$ equipped with the intersection pairing $\langle \, , \, \rangle$. Let $\Gamma = Aut(\Lambda)$ denote the group automorphisms of $\Lambda$ preserving the intersection form. Any orientation preserving diffeomorphism of $X$ acts on $H^2(X ; \mathbb{Z})$ preserving the intersection form. In all cases we are considering, $X$ can be written in the form $X = (S^2 \times S^2) \# M$ for some smooth simply-connected compact oriented $4$-manifold $M$ with indefinite intersection form. By a theorem of Wall \cite{wall}, this implies that every element of $\Gamma$ can be realised by an orientation preserving diffeomorphism of $X$. If follows that there exists an embedded surface $\Sigma \to X$ of genus $g$ representing $u$ and satisfying $2g-2 < u^2$ if and only if the corresponding statement holds for $\gamma(u)$ for any $\gamma \in \Gamma$. By another theorem of Wall \cite[Theorem 4 and Theorem 6]{wall0}, if $b^+(X), b^-(X) \ge 2$, then $\Gamma$ acts transitively on the set of primitive elements of $\Lambda$ of given norm and type (recall that the type of an element $x \in \Lambda$ refers to whether $x$ is characteristic or ordinary). It is easy to see that the condition $b^+(X), b^-(X) \ge 2$ is satisfied for the $4$-manifolds we are considering. Since $u^2 > 0$, it follows that $u \neq 0$ and thus we can write $u$ in the form $u = d u_0$, where $d > 0$ is an integer and $u_0$ is primitive. We then have that the $\Gamma$-orbit of $u$ in $\Lambda$ depends only on the values of $d>0$, $u_0^2 > 0$ and the type of $u_0$. Now we consider separately cases (i) and (ii). First consider case (i). Note that in this case any primitive class is ordinary, so we need only consider the values of $d$ and $u^2_0$. We again write $X$ as $X = S^2 \times S^2 \# M$ and then $\Lambda = H \oplus \Lambda'$, where $H = H^2(S^2 \times S^2 ; \mathbb{Z})$ and $\Lambda' = H^2(M ; \mathbb{Z})$ are the intersection forms for $S^2 \times S^2$ and $M$. Recall that $H$ has a basis $x,y$ satisfying \[ \langle x , x \rangle = \langle y , y\rangle = 0, \quad \langle x , y \rangle = 1. \] Since $\Lambda$ is even we must have $u_0^2 = 2k$ for some $k > 0$. Then $u'_0 = kx+y$ is primitive and $(u'_0)^2 = 2k = u_0^2$. So there exists some $\gamma \in \Gamma$ such that $u_0 = \gamma( u'_0)$. Setting $u' = d u'_0$ we likewise have $u = \gamma(u')$. From \cite{rub0} it is known that $u' = dkx + dy$ can be represented by an embedded surface $\Sigma \to S^2 \times S^2$ of genus $g$, where $g=0$ if $d=1$ and \[ g = (dk-1)(d-1) = kd^2 - dk-d+1 \] if $d>1$. Note that \[ 2g-2 = 2d^2k -2dk-2d < 2d^2k = u^2. \] Of course the embedding $\Sigma \to S^2 \times S^2$ representing $u' \in H$ gives rise to an embedding $\Sigma \to X = S^2 \times S^2 \# M$ of the same genus representing $(u' , 0) \in H \oplus \Lambda'$, by taking the connected sum at a point not on $\Sigma$. Now consider case (ii) and assume $u_0$ is ordinary. Then we can write $X$ as $X = S^2 \times S^2 \# \mathbb{CP}^2 \# M$ for $M = \#^{2n-2} \mathbb{CP}^{2} \#^{m-1} \overline{\mathbb{CP}^2}$ and $\Lambda = K \oplus \Lambda'$, where $K = H^2( S^2 \times S^2 \# \mathbb{CP}^2 ; \mathbb{Z})$ and $\Lambda' = H^2(M ; \mathbb{Z})$ are the intersection forms for $S^2 \times S^2 \# \mathbb{CP}^2$ and $M$. Note that $K$ has a basis $x,y,z$ satisfying \[ \langle x , x \rangle = \langle y , y\rangle = \langle x , z \rangle = \langle y , z \rangle = 0, \quad \langle x , y \rangle = \langle z , z \rangle = 1. \] Consider separately the cases where $u_0^2$ is even or odd. In the even case $u_0^2 = 2k$ and we again consider $u'_0 = kx+y$. It is easy to see that $u'_0$ is primitive, ordinary and $(u'_0)^2 = 2k$, so there exists $\gamma \in \Gamma$ for which $u_0 = \gamma( u'_0)$. Proceeding exactly as in case (i), we deduce that $u$ can be represented by an embedded surface $\Sigma \to X$ of genus $g$, where $2g-2 < u^2$. In the odd case $u_0^2 = 2k+1$, $k \ge 0$ and we consider $u'_0 = kx+y+z$. Then $u'_0$ is primitive, ordinary and $(u'_0)^2 = 2k+1$. So there exists $\gamma \in \Gamma$ such that $u_0 = \gamma(u'_0)$. Hence $u = \gamma(u')$, where $u' = du'_0$. Arguing as in case (i), the class $dkx+dy$ can be represented by an embedded surface $\Sigma \to S^2 \times S^2$ of genus $g$, where $g=0$ if $d=1$ or $k=0$ and $g = (dk-1)(d-1)$ otherwise. The class $dz$ can of course be represented by an embedded surface in $\mathbb{CP}^2$ of genus $(d-1)(d-2)/2$. Taking a connected sum, it follows that the class $u' \in \Lambda$ can be represented by an embedded surface $\Sigma \to X$ of genus $g$, where $g = (d-1)(d-2)/2$ if $k=0$ and $(dk-1)(d-1)+(d-1)(d-2)/2$ otherwise. In either case one easily finds that $2g-2 < (2k+1)d^2 = u^2$. Lastly note that in the above constructions, if $u$ is primitive then we have found a representative for $u$ of genus $0$. This completes the proof of (3). \end{proof} \bibliographystyle{amsplain}
\section{Introduction}\label{sec:bsu-intro} This article considers the spatial interaction of triangle-mesh surfaces with a block model as defined by Poniewierski \cite{poniewierski-19}. For this study, a block model may be conceptualised as a collection of rectangular prisms that span a modelled region in 3D space. Using a two-tier description, the block models of interest are formed initially by a set of non-overlapping `parent' blocks; these blocks have identical dimensions and are evenly spaced so they form a regular 3D lattice. Furthermore, a subset of the parent blocks --- particularly those that intersect with a surface --- are decomposed into smaller cuboids (often referred as `children' or sub-blocks) with the objective of preserving surface curvature subject to a minimum block size constraint. The sub-blocking problem represents a major theme in this paper. A distinguishing feature is that this problem is approached from a merging (bottom-up) perspective which offers opportunities for sub-block consolidation to minimise over-splitting, an issue often neglected in top-down approaches that focus exclusively on making block splitting decisions. The proposed framework allows new block models to be generated within a cell-based system using region partitioning surfaces. This comprises a spatial restructuring strategy that also allows iterative refinement of an existing block model given newer surfaces. At its core is a block merging algorithm that increases block model compaction and reduces spatial fragmentation due to subblocking. As motivation, we describe how this framework is deployed in a mine geology modelling system to illuminate key aspects of the proposal and illustrate what purpose they serve. In mining, 3D geological models are used in resource assessment to characterise the spatial distribution of minerals in ore deposits \cite{luo-07}. A block model description of the geochemical composition is often created by fusing various sources of information from drilling campaigns, these include for instance: assay analysis, material or geophysical logging and alignment of stratigraphic units from geologic maps during the exploration phase. Due to the sparseness of these samples, the inherent resolution of these preliminary models are typically low. As the exploitation phase commences, denser samples may be taken strategically to develop a deeper understanding about the geology of viable ore deposits. This knowledge can assist miners with planning and various decision making processes \cite{leite-07}, for instance, to prioritise areas of excavation, to develop a mining schedule \cite{dimitrakopoulos-08}, to optimise the quality of an ore blend in a production plant. Of particular relevance to spatial modelling is that wireframe surfaces can be generated by geo-modelling software \cite{srk-18}\,\cite{mira-18}\, \cite{leapfrog-19}, or via kriging \cite{emery-05}, probabilistic boundary estimation \cite{ball-20}, boundary propagation (differential geometry) \cite{leung-19subsurface} and other inference techniques \cite{vasudevan-09} to minimise the uncertainty of interpolation at locations where data were previously unavailable. For instance, triangle meshes may be created by applying the marching cubes algorithm \cite{newman-06} to Gaussian process implicit surfaces \cite{dragiev-11}. These boundary updates provide an opportunity to refine existing block models and remove discrepancies with respect to verified boundaries. The objective is to maximise the model's fidelity by increasing both accuracy and precision subject to some spatial constraints. The desired outcomes are improved localisation, reduced quantisation errors and less spatial fragmentation. In other words, the boundary blocks in the block model should accurately reflect the location of boundaries between geological domains; smaller blocks should be used to capture the curvature of regions near boundaries to minimise the surface approximation error; the model should provide a compact representation and have a low block count to limit spatial fragmentation. \begin{figure}[h] \centering \includegraphics[width=80mm,trim={0mm 0mm 0mm 0mm},clip]{fig01-essence-of-block-model-spatial-restructuring.pdf}\\ \caption{Essence of block model spatial restructuring given mesh surfaces. A total of three surfaces are involved. For clarity, only the orange blocks situated between the top and middle surfaces are shown.} \label{fig:bsu-intro-picture} \end{figure} Figure~\ref{fig:bsu-intro-picture} provides a visual summary of the primary objective. A key feature of spatial restructuring is that blocks are divided as necessary to adapt the block model to the curvature of the given surfaces. This process, known as \textit{sub-blocking}, is commonly performed in a top-down recursive manner which prioritizes splitting ahead of block consolidation. In some implementations, block consolidation is omitted altogether; this usually results in a highly fragmented and inefficient block representation. In this paper, surface-intersecting blocks are decomposed down to some minimum block size, then hierarchical block merging is performed in a bottom-up manner to consolidate the sub-blocks. In the ensuing sections, a framework for modifying the spatial structure of a block model using triangular mesh surfaces is first presented, the techniques underpinning each subsystem are described. Subsequently, we devote our attention to the block merging component, the algorithm is extended to support different forms of merging constraint. The proposed methods are applicable to orebody modelling given surfaces of mineralisation or stratigraphic boundaries --- see scenarios illustrated by \cite{wang-11}, \cite{feltrin-09}, \cite{mathers-11}, \cite{castagnac-11}; and general purpose 3D block-based modelling given other types of delineation. \subsection{Definition of a surface}\label{sec:def-surfaces} In this paper, the term `surface' encompasses both 2.5D and 3D surfaces. The former refers to open surfaces or warped 2D planes; these generally include mineralisation, hydration and stratigraphic surfaces in a mining context. The latter refers to closed surfaces that envelop a volume in 3D space. Examples include compact 2-manifolds that are topologically equivalent to a sphere. A simply-connected polyhedron surface would satisfy this requirement and have an Euler-Poincar\'{e} characteristic of 2. Closed surfaces may represent regions with local enrichment in an ore deposit or pockets with high level of contaminants. \subsection{Justification for a block-based approach}\label{sec:justification} In our envisaged application, the resultant block structure facilitates volumetric estimation of geochemical or geometallurgical properties within a mine. A block-based representation provides spatial localisation while block labelling provides differentiation between geological domains. These properties are important for two reasons. First, it enables spatially varying signals and non-stationary geostatistics to be learned and captured at an appropriate granularity for mining. Individual blocks can be populated with local estimates of the geochemistry, material type composition or other physical attributes. Second, it prevents sample averaging from being applied across discontinuities (different domains) which can lead to incorrect probabilistic inferences and skewed predictions if applied unknowingly across a boundary with a steep attribute gradient. Although polyhedral, topological and surface-oriented models offer some interesting alternatives, block models have been well established and widely deployed within the resource industry. Introducing a radically different approach will likely cause significant disruption and require changes, acceptance and adaptation by various stakeholders. The proposed block model restructuring strategy is designed to work seamlessly with existing models. It makes changes which are transparent and compatible with subsequent processes such as mining exacavation which also operates on a block scale. \section{Framework for Block Model Spatial Restructuring}\label{sec:bsu-framework} This section develops a framework for altering the spatial structure of a block model to reconcile with the shape of the supplied surfaces as depicted in Fig.~\ref{fig:bsu-intro-picture}. The input block model consists of non-overlapping blocks of varying sizes (with uniform 3D space partitioning being a special case) and the surfaces, typically produced by boundary modelling techniques, represent the interface between different geological domains. The triangular mesh surfaces, together with the initial block model and block tagging instructions constitute the entire input. The tagging instructions simply assign to each block a label which classifies its location relative to each surface. The framework may be described in terms of four components: block surface overlap detection, block structure decomposition, sub-blocks consolidation and block tagging (domain identification) as shown in Fig.~\ref{fig:bsu-framework}. \begin{figure}[h] \centering \includegraphics[width=87.5mm]{fig02-components-in-framework.pdf}\\ \caption{Components in the block model spatial restructuring framework} \label{fig:bsu-framework} \end{figure} \subsection{Block surface overlap detection}\label{sec:bsu-block-surface-overlap-detection} The goal is to identify blocks in the input model which intersect with the given surface(s). These represent areas where model refinement is needed in order to minimise the surface approximation error. To establish a sense of scale, the input blocks (also called ``parent blocks'') typically measure $25\times 25\times 5$m in an axis-aligned local frame, ``axis-aligned'' means the edges of each block are parallel to one of the (x, y or z) axes. \subsection{Block structure decomposition}\label{sec:bsu-block-structure-decomposition} Block decomposition is performed on surface-intersecting parent blocks to improve spatial localisation. This process divides each block into smaller blocks of some minimum size (e.g., $6.25\times 6.25\times 1.25$m). These sub-blocks are disjoint and together, they span the whole parent block. Geometry tests are applied to determine which sub-block inside each surface-intersecting parent block actually intersects with a given surface. This process places blocks into one of three categories: (a) parent blocks that never intersect with any surface; or else sub-blocks inside surface-intersecting parent blocks that (b) intersect with a surface or (c) do not intersect with any surface. \subsection{Sub-blocks consolidation}\label{sec:bsu-subblocks-consolidation} This component coalesces sub-blocks to produce larger blocks in order to prevent over-segmentation. Recall that one of the objective is to minimise the total number of blocks in the output model. Therefore, if an array of $3\times 4\times 2$ sub-blocks could be merged into a perfect rectangular prism, it would be more efficient to represent them collectively by a single block with a new centroid and their combined dimensions. In the event that the sub-blocks (within a surface-intersecting parent block) intersect with multiple different surfaces (say $s_1$ and $s_2$) then merging considerations will be applied separately to the sub-blocks intersecting with $s_1$ and $s_2$. It is important to observe that block consolidation is applied to both category ``b'' and category ``c'' sub-blocks as defined above. Also, merging of sub-blocks across parent block boundaries is not permitted. In Sec.~\ref{sec:bsu-subblocks-consolidation-via-coordinate-ascent}, we describe in detail the proposed block merging approach which draws inspiration from the coordinate-ascent algorithm. \subsection{Block tagging (domain identification)}\label{sec:bsu-block-tagging} As a general principle, block tagging assigns abstract block labels to differentiate blocks located above and below a given surface. The objective is to support tagging with respect to multiple surfaces and two labelling policies. The first policy distinguishes surface-intersecting blocks from non-intersecting blocks. The second policy forces a binary decision and labels surface-intersecting blocks as strictly above or below a surface. The scheme also offers the flexibility of using a surface to limit the scope of an update, thereby leaving previously assigned labels intact above\,/\,below a surface. The processes described throughout (Sec.~\ref{sec:bsu-block-surface-overlap-detection} -- Sec.~\ref{sec:bsu-block-tagging}) are deterministic and applicable in an iterative setting. This completes our brief overview of the system. \section{Techniques}\label{sec:bsu-techniques} The techniques used in each component will now be further described. For maximum efficiency, the general set up assumes the modelled region aligns with the xyz axes. If the modelled deposit follows the inclination of a slope, it is assumed that an appropriate 3D rotation is applied to all spatial coordinates before subsequent techniques are applied. This has the effect of producing axis-aligned blocks in the modelling space that ultimately align with the principal orientation of the deposit in real space once the inverse transformation is applied at the conclusion of the process. \subsection{Detecting block surface intersection}\label{sect:bsu-detect-block-surface-intersection} The method we employed for determining if an axis-aligned rectangular prism intersects with a triangular patch from a surface is described by Akenine-M\"{o}ller in \cite{akenine-01}. This approach applies the Separating Axis Theorem (SAT) which states that two convex polyhedra, A and B, are disjoint if they can be separated along either an axis parallel to a normal of a face of either A or B, \textit{or} along an orthogonal axis computed from the cross product of an edge from A with an edge from B. The technical details can be found in Appendix~\ref{sec:appendix-block-triangle-intersect-detect-moller}. In essence, block-surface intersection assessment consists of a series of ``block versus triangle'' comparisons where the triangles considered for each block are selected based on spatial proximity. The block-triangle overlap assessment operates on one basic principle: a ``no intersection'' decision is reached as soon as one of the tests returns \textsc{false}. A block-triangle intersection is found only when all 13 tests return \textsc{true}, when it failed to find any separation. These tests are used to identify the surface triangles (if any) that intersect with each parent block. To maximise computation efficiency, each block is tested against a subset of triangles on each mesh surface rather than the entire mesh surface. A kD-tree accelerator (a variation of binary space partitioning tree) \cite{pharr2016physically} is constructed using the 3D bounding boxes of each triangle. The subset includes only triangles whose bounding box overlaps with the block; only these candidates can intersect with the block. This pruning step limits the number of comparisons and speeds up computation considerably. The indices harvested here can subsequently reduce the test effort in the block structure decomposition stage. \subsection{Block structure decomposition}\label{sec:bsu-block-structure-decomposition2} The key premise is to decompose surface-intersecting blocks into smaller blocks to improve spatial localisation. The basic intuition is that the surface discretisation error decreases as spatial resolution increases. Precision increases when smaller blocks are used to approximate the surface curvature where the blocks meet the surface. Block structure decomposition entails the following. For each block ($b$) that intersects with the surface, divide it volumetrically into multiple sub-blocks using the specified minimum block dimensions $(\Delta ^\text{block}_{x,\min},\Delta^\text{block}_{y,\min},\Delta^\text{block}_{z,\min})$. The main constraints are that sub-blocks cannot overlap and they must be completely contained by the parent block whose volume is the union of all associated sub-blocks.\footnote{Although we typically require parent blocks $(\Delta^{\text{block}}_{x}[b],\Delta^{\text{block}}_{y}[b],\Delta^{\text{block}}_{z}[b])$ to be divisible by the minimum block dimensions, the method works fine even if fractional blocks emerge during the division, i.e., the last block toward the end is smaller than the minimum size; the ratios in each dimension $n^{\text{block}}_x,n^{\text{block}}_y,n^{\text{block}}_z\notin \mathbb{Z}$ can be non-integers. This essentially means there is no fundamental limit on the minimum spatial resolution.} Within each surface-intersecting parent block, we also identify all sub-blocks that intersect with a surface and which surface they intersect with. This is accomplished using the associative mapping [obtained during block-surface overlap detection] which limits the relevant surface triangles to a small subset for each surface-intersecting parent block. The relevant attributes captured in the output include a list of surface-intersecting parent blocks, and attributes for each sub-block: viz., its centroid, dimensions, parent block index, intersecting surface and position within the parent block. \subsection{Sub-blocks consolidation via coordinate-ascent}\label{sec:bsu-subblocks-consolidation-via-coordinate-ascent} The consolidation component focuses on merging sub-blocks inside surface-intersecting parent blocks to reduce block fragmentation. Its basic objective is to minimise the block count, although other mining or geologically relevant criteria such as block aspect ratio can be optimised for. These options are considered later in Sec.~\ref{sec:bsu-merging-conventions-optimisation-objectives} and Sec.~\ref{sec:bsu-results-statistical}. For now, these high resolution sub-blocks may themselves intersect or not intersect with any surface. This is indicated in the \textit{BlockStructureDecomposition} result which serves as input. This component returns the \textit{SubBlockConsolidation} result which describes the consolidated block structure. This encompasses all parent blocks processed, including those which do not intersect with any surface, as well as sub-blocks or super-blocks that constitute the surface-intersecting parent blocks. The proposed merging algorithm is inspired by \textbf{coordinate-ascent optimisation} and may be summarised as follows. \begin{itemize} \item The algorithm is inspired by ``coordinate ascent'' where the search proceeds along successive coordinate directions in each iteration. The goal is to grow each block (a rectangular prism) from a single cell and find the maximum extent of spatial expansion, $\mathbf{k}=(k_x,k_y,k_z)$, without infringing other blocks or cells that belong to a different class. \item For merging purpose, each parent block is partitioned uniformly down to the minimum block size. The smallest unit (with minimum block size) is referred as a \textit{cell}. Block dimensions are expressed in terms of the number of cells that span in the x, y and z directions. Accordingly, if a block $b$ with cell dimensions $\mathbf{k}=(k_x,k_y,k_z)$ is anchored at position $\mathbf{c}^{(b)}\in\mathbb{R}^3$, its bounding box would stretch from $\mathbf{c}^{(b)} - \frac{1}{2}\boldsymbol{\Delta}^\text{block}_{\min}$ to $\mathbf{c}^{(b)} + (\mathbf{k}-\frac{1}{2})\boldsymbol{\Delta}^\text{block}_{\min}$ for $k_x,k_y,k_z\in\mathbb{Z}\ge 1$. \item Merging states are managed using a binary occupancy map (boolean 3D array) with cell dimensions identical to the parent block. Given a block anchor position $\mathbf{c}^{(b)}$ with $\mathbf{k}$ initialised to $(1,1,1)$, expansion steps are considered in each direction $\boldsymbol{\delta}\in\mathbb{Z}^3$ which must alternate through the sequence $\boldsymbol{\delta}_0=(1,0,0)$, $\boldsymbol{\delta}_1=(0,1,0)$ and $\boldsymbol{\delta}_2=(0,0,1)$. \item A step in the direction $\boldsymbol{\delta}$ is feasible if all of the cells within the bounding box ($\mathbf{c}^{(b)} - \frac{1}{2}\boldsymbol{\Delta}^\text{block}_{\min}$, $\mathbf{c}^{(b)} + (\mathbf{k}+\boldsymbol{\delta}-\frac{1}{2})\boldsymbol{\Delta}^\text{block}_{\min}$) are 1 (active). In this case, the spatial extent is updated via $\mathbf{k}\leftarrow \mathbf{k}+\boldsymbol{\delta}$. Each iteration steps through $\boldsymbol{\delta}_0$, $\boldsymbol{\delta}_1$, $\boldsymbol{\delta}_2$ in turn. This continues until no expansion is possible in any direction, at which point the centroid and dimensions of the merged block are computed and the corresponding cells in the occupancy map are set to 0 (marked as inactive). \item Sub-block merging terminates for a parent block when all cells in the occupancy map are set to 0. \item The volume of a consolidated block is effectively the outer product $[0,k_x) \otimes [0,k_y) \otimes [0,k_z)$ where $k_x$, $k_y$, $k_z$ each represents some integer multiple of the minimum block size, $(\Delta ^\text{block}_{x,\min},\Delta^\text{block}_{y,\min},\Delta^\text{block}_{z,\min})$, with respect to x, y and z. \item Different coordinate directions are used cyclically during the procedure. At all times, it must ensure the expansion does not include alien blocks in the encompassing cube, e.g., an L-shape block within a $2\times2\times1$ cube is not allowed. \end{itemize} \begin{figure}[!ht] \centering \includegraphics[width=135mm]{fig03-coordinate-ascent-wide.pdf} \caption{Sub-blocks consolidation: illustration of the coordinate-ascent merging algorithm using occupancy map} \label{fig:bsu-coalesce} \end{figure} The algorithm is explained by way of an example in Fig.~\ref{fig:bsu-coalesce}. To illustrate the algorithm, let us refer to blocks that belong to the class under consideration as the \textbf{active} cells. In the present context, this refers to either surface-intersecting sub-blocks, $\mathcal{S}_\text{intersect}$, or the non-intersecting sub-blocks, $\mathcal{S}_\text{non-intersect}$, inside a parent block. The \textbf{inactive} cells (labelled 0) refer to the complementary set to the active cells (labelled 1). \vspace{3mm}In Fig.~\ref{fig:bsu-coalesce}, suppose the active sub-blocks (cells) refer to $\mathcal{S}_\text{intersect}$. The initial state shows the decomposition of a parent block in terms of three x/y cross-sections. There are $5\times3\times3$ sub-blocks (cells) within the parent block and 31 are considered ``active''. The white square cells all intersect with the same surface. It so happens the first cell encountered (with index $(i_Z\cdot n_Y + i_Y)\cdot n_X + i_X=0$) is the first active block. The algorithm considers expansion along each axis (x, y and z) in turn. In cycle 1, an expansion step in the x-direction is possible. The progressive expansion of the coalesced block is represented by black square cells. In cycle 2, further growth in the y-direction is not possible due to impediment by one or more ``inactive'' blocks (denoted by $\mathord{\scalerel*{\cdot}{gX}}$), however, the x and z dimensions each allow one step expansion. In cycle 3, expansion continues in the x direction, resulting in the formation of a $4\times2\times3$ super-block. At this point, a coalesced block is extracted as no further growth in any direction is now possible. Subsequently, the cells which have just been merged are marked out-of-bounds. The process repeats itself, starting with the next active cell it encounters in the raster-scan order. \begin{figure}[!ht] \centering \includegraphics[width=85mm]{fig04-subblocks-consolidation.pdf} \caption{Sub-blocks consolidation (continued) --- coalescing remaining active cells} \label{fig:bsu-coalesce-continued1} \end{figure} Once all the sub-blocks (cells) are coalesced within the surface-intersecting parent block, we are left with 3 merged blocks (coloured in different shades of red in Fig.~\ref{fig:bsu-coalesce-continued2}). These have cell dimensions\footnote{These represent multiplying factors relative to the minimum block size.} ($k_x,k_y,k_z$) of $(4,2,3)$, $(1,1,3)$ and $(2,1,2)$ and relative centroids of $(\frac{4}{10},\frac{2}{6},\frac{3}{6})$, $(\frac{9}{10},\frac{1}{6},\frac{3}{6})$ and $(\frac{6}{10},\frac{5}{6},\frac{4}{6})$, respectively, with respect to the parent block's minimum vertex and parent block dimensions. \begin{figure}[!ht] \centering \includegraphics[width=85mm]{fig05-subblocks-consolidation.pdf} \caption{Sub-blocks consolidation (continued) --- consolidated blocks in the surface-intersecting set $\mathcal{S}_\text{intersect}$ and non-intersecting set $\mathcal{S}_\text{non-intersect}$} \label{fig:bsu-coalesce-continued2} \end{figure} \begin{itemize} \item When \textbf{multiple surfaces} are considered, the coalesce function will next be applied to other sub-blocks (within the same parent block) that intersect with other surfaces. This seldom happens but it is possible if the surfaces are close. \item Finally, the coalesce function is \textbf{applied to inactive sub-blocks} (within the same parent block) which do not intersect with any surface. The result for inactive blocks (coloured in different shades of blue) are shown in Fig.~\ref{fig:bsu-coalesce-continued2}. \end{itemize} To summarise, coalescing is applied only to surface-intersecting parent blocks which are subject to decomposition. The sub-blocks contained within may intersect with one or more surfaces, or not intersect with any surface at all. After consolidation, the output contains both the original and merged blocks. Based on the sub-block and surface intersection status, the consolidated blocks may be arranged into two separate sets, $\mathcal{B}_\text{intersect}$ and $\mathcal{B}_\text{non-intersect}$, as shown in Fig.~\ref{fig:bsu-coalesce-continued2}. Surface intersecting merged blocks ${\color{ruby}\blacksquare}{\color{maroon}\blacksquare}{\color{pinky}\blacksquare}$ (within surface-intersecting parent blocks) are placed in $\mathcal{B}_\text{intersect}$. Non surface-intersecting merged blocks ${\color{blue1}\blacksquare}{\color{blue2}\blacksquare}{\color{blue3}\blacksquare}$ (within surface-intersecting parent blocks) are placed in $\mathcal{B}_\text{non-intersect}$. Non surface-intersecting parent blocks are also appended to this. The coordinate ascent algorithm provides a method for merging cells (sub-blocks of minimum size) within the confines of a parent block. Coalesced sub-blocks must share the same label and form a rectangular prism. \subsubsection{Practicalities}\label{sec:coalesce-practicalities} Since the cell division lines are identical for all parent blocks of the same size, to avoid having to compute the sub-block centroids and dimensions repeatedly, the cell dimensions and local coordinates of each sub-block's centroid (relative to the parent block's minimum vertex) are stored in a look-up table and indexed by parent block dimensions to speed up computation. \subsection{Block tagging: domain identification using surfaces}\label{sec:bsu-block-tagging2} The primary objective is to label whether a block is located above or below a surface. A picture of this is shown in Fig.~\ref{fig:bsu-which-side-determination}. More generally, the surface is not always horizontal, so it makes more sense referring to the space on one side of the surface as \textit{positive}, the other as \textit{negative}, however this is defined. \begin{figure}[h] \centering \includegraphics[width=87.5mm]{fig06-tagging-concepts-relating-to-surfaces.pdf} \caption{Concepts relating to surfaces: surface normal (cross product) and block projected distance (inner product) associated with a triangular patch} \label{fig:bsu-which-side-determination} \end{figure} The main points to appreciate in Fig.~\ref{fig:bsu-which-side-determination} are that \begin{itemize} \item Each triangular patch of the surface has a normal vector associated with it. For example, the normal $\mathbf{n}_{t_k}$ associated with triangle $t_k$ points in the upward direction. This normal is computed by taking the cross product between two of its edges, for instance, $(\mathbf{v}_{k,1}-\mathbf{v}_{k,0})\times(\mathbf{v}_{k,2}-\mathbf{v}_{k,0})$. This arrow would point in the opposite direction (rotate by 180\textsuperscript{o}) if the edge traversal direction is reversed; for instance, by swapping two vertices $\mathbf{v}_{k,1}$ and $\mathbf{v}_{k,2}$ in the triangle. \item To determine ``which side of the surface'' a block is on, it suffices to consider the triangular patch located closest to the block. After establishing the positive side as the space `above' the surface, one can say block $b_1$ is located above the surface and has a positive sign ($\sigma_{b_1}=+1$) because the inner product $(\mathbf{c}_{t_k} - \mathbf{c}_{b_1})\cdot \mathbf{n}_{t_k}$ is negative. Here, $\mathbf{n}_{t_k}$ and $\mathbf{c}_{t_k}$ represent the normal and centroid of triangle $t_k$, likewise $\mathbf{c}_{b_1}$ represents the centroid of block $b_1$. Conversely, block $b_0$ is below the surface and has a negative sign ($\sigma_{b_0}=-1$) because the inner product $(\mathbf{c}_{t_j} - \mathbf{c}_{b_0})\cdot \mathbf{n}_{t_j}$ is positive. This `projection onto normal' approach provides the first method for block tagging. \end{itemize} \subsubsection{Discussion}\label{sec:bsu-tagging-projection-on-normal-discussion} For this method to work, the edges for each triangle in the mesh surface must be ordered consistently (e.g., in the anti-clockwise direction) and any ambiguity in regard to surface orientation must be resolved to ensure the assigned labels ultimately conform to user's expectation --- e.g., the positive direction points upward with respect to an open surface (see below) or outward in the case of a closed surface. \subsubsection{Labelling scheme: extension to multiple surfaces}\label{sec:bsu-labeling-scheme} This tagging logic may be extended to multiple surfaces. Fig.~\ref{fig:tagging-abstract-surface-layers} depicts a multi-surface scenario and illustrates how abstract labels are assigned to multiple layers according to a logic table. Proceeding from left to right, blocks from seven distinct locations relative to the surfaces are shown. The \textit{mean surface orientation} shows the direction obtained by averaging over all triangular patch normals. This arrow can point up or down provided the ordering of triangle vertices is consistent. Consistency can be enforced by ensuring triangle edges are traversed only in the anti-clockwise (or clockwise) direction. The \textit{positive direction} is a user-defined concept. By default, it points in the upward direction (+z axis). For a vertical surface (e.g., a geological feature such as a dyke) that runs across multiple layers, the positive direction may be defined as left (or right). \textit{Surface polarity} indicates if there is agreement between the mean surface orientation (a property conferred by the mesh) and the positive direction (intention of the user). If they oppose, as is the case for the bottom surface in Fig.~\ref{fig:tagging-abstract-surface-layers}, the polarity is set to negative. The significance is that the interpretation of the \textit{projected distance} between a block and relevant triangle, and subsequently what sign we assign to the block, depend on the surface polarity. \begin{figure}[!h] \centering \includegraphics[width=146mm]{fig07-tagging-multi-surface-scenario-wide.pdf} \caption{Block tagging in a multi-surface scenario: terminologies and label assignment logic} \label{fig:tagging-abstract-surface-layers} \end{figure} Focusing now on the shaded portion of Fig.~\ref{fig:tagging-abstract-surface-layers}, comparison of block $B_4$ with surface 1 yields $(\mathbf{c}_{t_{s_1,j}}\!-\mathbf{c}_{B_4})\cdot\mathbf{n}_{s_1,t_j}>0$, hence its sign $\sigma_{B_4,s_1}$ is \textit{negative} (it is below the $s_1$ surface). However, comparison with surface 2 yields a \textit{positive} sign $\sigma_{B_4,s_2}$ (it is above the $s_2$ surface) even though the projected distance $( \mathbf{c}_{t_{s_2,k}}\!-\mathbf{c}_{B_4})\cdot\mathbf{n}_{s_2,t_k}>0$; this is correct since $s_2$ has negative surface polarity which negates the logic. This method is adequate for simple surfaces such as those depicted in Fig.~\ref{fig:tagging-abstract-surface-layers}; however it can fail in more complex situations. Therefore, the \textit{projection-onto-patch-normal} approach is used here primarily as a vehicle for illustrating concepts and vulnerabilities. The pitfalls and robust solutions will be discussed in Sec.~\ref{sec:bsu-critical-reflection}. \textit{Abstract labels} are assigned to merged blocks to distinguish between boundaries and embedded layers. In this example, layers are given odd-integer labels whereas boundaries (the interface between layers) are given even-integer labels, as indicated by the circles in Fig.~\ref{fig:tagging-abstract-surface-layers}. For the interleaved layers, given its sign $\sigma_{b,s_n}$ and affiliated surface $s_n$, the abstract label is given by $\lambda(s_n,\sigma_{b,s_n})=2\times(n+1)-\sigma_{b,s_n}$ for $n\ge 0$, where $\sigma_{b,s_n}\in\{-1,0,+1\}$ represent \{\text{below, across, above}\} the surface, respectively. The affiliated surface $s_n$ is deduced from the shaded $\sigma_{b,s_n}$ column of the logic table in Fig.~\ref{fig:tagging-abstract-surface-layers}. For instance, at block locations $B_3$ and $B_4$, the affiliated surface is $s_1$. With $\sigma_{b,s_0}=-1$ and $\sigma_{b,s_2}=+1$ for $b\in\{B_3,B_4\}$, the label only depends on $\sigma_{b,s_1}$ when $n=1$. \subsubsection{Tagging instructions}\label{sec:tagging-instructions} With block tagging, there is tremendous scope for creativity. The scheme described below provides a flexible framework for domain specification given arbitrary surfaces. The diagram shown in Fig.~\ref{fig:tagging-instructions} is similar to Fig.~\ref{fig:tagging-abstract-surface-layers} for the most part. What is different is the emphasis on \textit{surface tagging instructions}. Observe that there are three sets of tagging instructions: one for each surface. Each instruction specifies (1) a positive direction for each surface; (2) nominal labels for blocks located above, across and below each surface; (3) an override field (see ``forced?'') which communicates an intent to either \textbf{preserve} the surface intersecting blocks (by assigning a label different to any other layers) or \textbf{resolve} whether these blocks are strictly above or below the surface, i.e., force a binary decision. \begin{figure}[!ht] \centering \includegraphics[width=146mm]{fig08-tagging-instructions-wide.pdf} \caption{Block tagging instructions: interpretation of the lambda value} \label{fig:tagging-instructions} \end{figure} A trivalent logic is built into the nominal labels specified in item 2. In Fig.~\ref{fig:tagging-instructions}, this is denoted by $\lambda$. User-specified values are assigned to blocks when $\lambda>0$. In addition, there are two special cases worth mentioning. First, an input value of $\lambda=0$ instructs the program to use abstract labels instead of specific domain values (see ``zero'' column in Fig.~\ref{fig:tagging-instructions}). Second, a negative input value $\lambda<0$ instructs the program to \textbf{leave current labels intact}. This retains any prior label which has been assigned to that block (see ``negative'' column in Fig.~\ref{fig:tagging-instructions}). This `retain existing labels' mode allows the spatial structure of a block model to be updated without invalidating previous domain assignments. For instance, a surface $s_0$ may be used as an upper bound. If $\lambda_{s_0}^\text{(above)}=-1$, then all blocks located above this surface will not have their labels modified. Similarly, $s_1$ may be used as a lower bound. If $\lambda_{s_1}^\text{(below)}=-1$, then all blocks located below this surface will not have their labels modified. \subsubsection{Retaining existing domain labels}\label{sec:retain-existing-labels} As a motivating example, suppose we rotate the picture in Fig.~\ref{fig:tagging-instructions} counter-clockwise by 45 degrees. Further, suppose the entire block model is currently labelled as domain A. Then, the space between the two tilted surfaces (below $s_0$ and above $s_1$) can be used to model a dolerite channel that runs diagonally across the layers. By using the following specification: $\lambda_{s_0}^\text{(above)}=-1$, $\lambda_{s_0}^\text{(below)}=\text{B}$, $\lambda_{s_1}^\text{(above)}=\text{B}$, $\lambda_{s_1}^\text{(below)}=-1$ and forced($s$)\,=\,\textsc{true} for both, blocks within the embedded layer will be tagged as domain B (dolerite) for some $\text{B}>$0. \subsection{General interpretation}\label{sec:general-interpretation} A volumetric block region (one comprising blocks of varying size) may be constructed in multiple passes and labelled sequentially by a single or a combination of surfaces using logical \textsc{and}/\textsc{or} operators based on the plane partitioning property of open surfaces, or expressed as the intersection/union of multiple closed surfaces. As an example, a fault surface may partition a space into two disjoint sets, say, blocks to the left (respectively, right) of the divide. Input blocks in contact with the fault line may be partitioned (subblocked) to conform to the shape of the fault surface. Subsequently, block tagging is applied independently to these two sets. The bounding surfaces that correspond across the discontinuity will provide similar block labelling instructions despite their physical separation. This ensures blocks within the same layer will receive the same label notwithstanding the vertical offset introduced by the fault. \section{Visualisation}\label{sec:bsu-visualisation} This section illustrates some of the results produced by the proposed framework. Fig.~\ref{fig:bsu-results-block-restructuring-multiple-surfaces}(a) shows a regular block structure which covers the region $x\in[1000,1250],y\in[750,925],z\in[590,670]$ with parent blocks measuring $25\times25\times5$m. Three horizontal surfaces are also given as input, these are shown in Fig.~\ref{fig:bsu-results-block-restructuring-multiple-surfaces}(b). Surface-intersecting parent blocks identified in (c) are subject to block decomposition. Using block-triangle overlap detection, the surface-intersecting sub-blocks, each measuring $5\times 5\times 1$m, are identified in Fig.~\ref{fig:bsu-results-block-restructuring-multiple-surfaces}(d). To reduce fragmentation, the decomposed sub-blocks in the surface-intersecting and non-intersecting sets are consolidated in Fig.~\ref{fig:bsu-results-block-restructuring-multiple-surfaces}(e)--(f). For the surface-intersecting set, the block-count decreases from 8497 to 2102 after sub-blocks are coalesced. \begin{table}[!t] \setlength\tabcolsep{0pt} \begin{center} \scriptsize \begin{tabular}{p{50mm}p{50mm}p{50mm}} (a) Regular block structure as input & (b) Multiple surfaces as input & (c) Surface intersecting parent blocks\\ \includegraphics[width=43.5mm,trim={0mm 0mm 0mm 0mm},clip]{fig09a-regular-block-structure.pdf} & \includegraphics[width=43.5mm]{fig09b-surfaces.pdf} & \includegraphics[width=43.5mm,trim={0mm 0mm 0mm 0mm},clip]{fig09c-parent-blocks-intersecting-surface.pdf}\\ (d) Surface intersecting sub-blocks & (e) Consolidated sub-blocks & (f) Consolidated sub-blocks from non-\\ & from surface-intersecting set & intersecting (complementary) set\\ \includegraphics[width=43.5mm]{fig09d-block-surface-decomposition.pdf} & \includegraphics[width=43.5mm,trim={0mm 0mm 0mm 0mm},clip]{fig09e-block-surface-consolidation-intersect.pdf} & \includegraphics[width=43.5mm]{fig09f-block-surface-consolidation-intersect.pdf} \end{tabular} \end{center} \captionof{figure}{Block restructuring given multiple surfaces} \label{fig:bsu-results-block-restructuring-multiple-surfaces} \end{table} In regard to the \textit{forced} option for block tagging, the differences between preserving the boundary and classifying the blocks at the interface as strictly above\,/\,below a surface are demonstrated in Fig.~\ref{fig:bsu-results-block-tagging-multiple-surfaces}(g)--(h). For clarity, Fig.~\ref{fig:bsu-results-block-tagging-multiple-surfaces}(i) shows only blocks labelled as A and C (belonging to two domains of interest) in isolation. Clearly, they conform to the shape of the relevant surfaces. In Fig.~\ref{fig:bsu-results-block-tagging-multiple-surfaces}(j), only blocks that intersect with the top surface (labelled 2) have been extracted. \begin{table}[!t] \setlength\tabcolsep{0pt} \begin{center} \scriptsize \begin{tabular}{p{50mm}p{50mm}} (g) Resolving boundary blocks & (h) Preserving boundary blocks\\ \textit{forced}=1 classifies as above/below & \textit{forced}=0 maintains unique identity\\ \includegraphics[width=43.5mm,trim={0mm 0mm 0mm 0mm},clip]{fig10g-block-surface-strata-resolved.pdf} & \includegraphics[width=43.5mm]{fig10h-block-surface-strata-preserved.pdf}\\ (i) Isolated blocks from A and C & (j) Localised blocks extracted from\\ --- two domains of interest & the A/B interface\\ \includegraphics[width=43.5mm,trim={0mm 0mm 0mm 0mm},clip]{fig10i-block-surface-strata-A-C.pdf} & \includegraphics[width=43.5mm]{fig10j-tag-localise-surface0.pdf} \end{tabular} \end{center} \captionof{figure}{Block tagging given multiple surfaces} \label{fig:bsu-results-block-tagging-multiple-surfaces} \end{table} \subsection{Iterative refinement: an application to tilted surfaces}\label{sec:bsu-iterative-application} The running example has thus far taken only a regular block structure as input. In this section, we demonstrate that the framework can also modify the spatial structure of a model with irregular (non-uniform) block dimensions. Of particular interest is that tilted surfaces are used to model a hypothetical dyke channel running through bedded layers. This highlights two significant features: (a) ability to iteratively improve the spatial structure of an existing block model whilst preserving the labels for horizontal strata which have been previously assigned; (b) ability to work with oblique surfaces and produce correct result when the surface orientation is ambiguous (positive may not point upward), thus user has to specify precisely what is meant by the positive direction in relation to the supplied tagging instructions. An example of this is shown in Fig.~\ref{fig:tagging-instructions-tilted-surfaces}. \begin{figure}[!ht] \centering \includegraphics[width=87.5mm]{fig11-tilted-surfaces-tag-instructions.pdf} \caption{Block tagging instructions for tilted surfaces. The labels E, 8 and 10 refer to entities shown in Fig.~\ref{fig:bsu-results-tilted-surfaces}.} \label{fig:tagging-instructions-tilted-surfaces} \end{figure} Fig.~\ref{fig:bsu-results-tilted-surfaces} shows the recut block model follows the curvature of the tilted surfaces. In (k), blocks within the dyke are removed for clarity. Pre-existing labels (outside the dyke) remain intact. The spatial structure is only modified around the tilted surfaces. In Fig.~\ref{fig:bsu-results-tilted-surfaces}(l)--(m), blocks within the dyke and those located on the east\,/\,west interfaces are shown in isolation. Fig.~\ref{fig:bsu-results-tilted-surfaces}(n)--(p) show the existing labels for blocks in A, B, C and D have been perfectly preserved. As expected, new labels --- \{8, 10\} and E respectively --- have only been assigned to blocks that intersect with and sandwiched between the tilted surfaces. \begin{table}[!t] \setlength\tabcolsep{0pt} \begin{center} \scriptsize \begin{tabular}{p{50mm}p{50mm}p{50mm}} (k) Recut block model & (l) Blocks within the dyke (E) & (m) Blocks intersecting with\\ & & east/west tilted surfaces\\ \includegraphics[width=43.5mm]{fig12k-block-surface-strata-with-dyke.pdf} & \includegraphics[width=43.5mm]{fig12l-dyke-within.pdf} & \includegraphics[width=43.5mm]{fig12m-dyke-left-right.pdf}\\ (n) Blocks within the dyke & (o) Blocks in E, A and C & (p) Blocks in E, B and D\\ sandwiched in the middle. & & \\ \includegraphics[width=43.5mm]{fig12n-dyke-C-D.pdf} & \includegraphics[width=43.5mm]{fig12o-dyke-A-C.pdf} & \includegraphics[width=43.5mm]{fig12p-dyke-B-D.pdf} \end{tabular} \captionof{figure}{Iterative refinement incorporating tilted surfaces} \label{fig:bsu-results-tilted-surfaces} \end{center} \end{table} \section{Engineering perspectives and applications}\label{sec:bsu-critical-reflection} Critical reflection and user feedback are both essential to designing robust and flexible systems \cite{arvidsson-08}. Guided by the principle of reflective and iterative design \cite{sedlmair-12}, there was an early and continued focus in our approach on real usage scenarios \cite{rosson-09}, as well as successive evaluation, modification and scenario-based testing. In this section, we describe two improvements made to eliminate flaws identified through this process which made the system more robust. \subsection{Issue 1: Sign inversion due to sparse, jittery surface}\label{sec:issue1} \begin{figure}[!ht] \centering \includegraphics[width=87.5mm]{fig13-issue-projection-onto-patch-normal-when-sparse.pdf} \caption{Local sign inversion when triangle mesh surface is sparse and jittery} \label{fig:issue-projection-onto-patch-normal-when-sparse} \end{figure} In regard to block tagging and `which-side-of-the-surface' determination, the `projection-onto-normal' method described in Section~\ref{sec:bsu-block-tagging} works well when the surface is smooth and triangle mesh is dense and uniform. Potential issues arise when the surface exhibits local jitters and the triangles are sparse. For instance, the mesh resolution is low relative to the parent block size when triangle patches stretch over distances of up to one kilometer in certain areas. As an illustration, Fig.~\ref{fig:issue-projection-onto-patch-normal-when-sparse} shows a block associated with triangle $t_j$ (the nearest patch based on block-triangle centroid-to-centroid distance). This association yields the wrong result, a negative sign with respect to the normal $\mathbf{n}_{t_j}$ is obtained (according to the plane partitioning test) even though it lies above the surface. We observe the projection of the block lies outside the support interval of the referenced triangle $t_j$ and the same comparison with $t_k$ which is further away would produce the right result (a positive sign). This problem can be remedied by upsampling the mesh surface to increase its density. Fig.~\ref{fig:bsu-mesh-refinement} shows an example where triangles are recursively split along the longest edge until the maximum patch area and length of all edges fall below the thresholds of 1250m$^2$ and 100m. A better solution, however, is ray-tracing \cite{moller-05}. In general terms, ray-tracing determines whether a block is above or below an open surface (resp., inside or outside a closed surface) by counting the number of intersections between the surface and a ray casted from the block. This recommended approach is described in Appendix~\ref{sec:appendix-ray-tracing}. The key advantage is that ray tracing is not susceptible to variation in surface mesh density (the sign inversion problem due to folding), furthermore, it does not require dense surfaces or consistent (e.g. clockwise) ordering of triangle vertices. Therefore, ray-tracing will be the method of choice for block tagging moving forward. It replaces the projection-onto-normal approach in our proposal. \begin{table}[!ht] \setlength\tabcolsep{0pt} \begin{center} \scriptsize \begin{tabular}{p{50mm}p{50mm}} \qquad Before: non-uniform density & \qquad After: high density mesh\\ \includegraphics[width=43.5mm,trim={60mm 43mm 65mm 25mm},clip]{fig14a-example-sparse-surface.pdf} & \includegraphics[width=43.5mm,trim={60mm 43mm 65mm 25mm},clip]{fig14b-example-surface-with-mesh-refinement.pdf} \end{tabular} \end{center} \captionof{figure}{Increasing mesh density of a real surface by splitting recursively the longest edge of triangles whose area is above the threshold} \label{fig:bsu-mesh-refinement} \end{table} \subsection{Issue 2: Boundary localisation accuracy}\label{sec:boundary-localisation-accuracy} The block consolidation component, as it currently stands, considers the sub-blocks that belong to the surface-intersecting set ($\mathcal{B}_\text{intersect}$) and non surface-intersecting set ($\mathcal{B}_\text{non-intersect}$) independently. As Fig.~\ref{fig:bsu-coalesce-continued2} has shown, the sub-blocks (cells) within each respective set are merged separately to form larger rectangular prisms within the confines of the parent blocks. While this split is useful for extracting surface-intersecting sub-blocks, it has two drawbacks. In terms of \textbf{boundary localisation accuracy}, Fig.~\ref{fig:issue-of-accuracy-compaction}(a) shows that surface-intersecting sub-blocks --- with centroids located on different sides of the surface --- are merged together irrespective of whether it is predominantly above or below the surface. In terms of compaction, \textbf{merging potential is limited} because adjacent cells from $\mathcal{B}_\text{intersect}$ and $\mathcal{B}_\text{non-intersect}$ cannot be coalesced even if they lie on the same side of the surface. To reinforce the first point, the two cells marked with ``?'' in Fig.~\ref{fig:issue-of-accuracy-compaction}(a) ought to be labelled as above the surface. However, under the current regime, they are considered jointly with the three cells immediately to the right that also intersect with the surface, thus they are treated collectively as a 1-by-5 merged block. Since the centroid (black dot) lies marginally below the surface, the merged block will also be labelled as such. This distorts the boundary as it introduces a vertical bias of around $\Delta_\text{y,min}^\text{(block)}/2$ to the two left-most cells. \begin{figure}[h] \centering \includegraphics[width=87.5mm]{fig15-accuracy-issue.pdf} \caption{Treating surface-intersecting and non-intersecting sub-blocks, $\mathcal{B}_\text{intersect}$ and $\mathcal{B}_\text{non-intersect}$, independently during block consolidation may reduce boundary localisation accuracy and limit merging potential. In the latest proposed scheme (Section~\ref{sec:boundary-localisation-accuracy}), sub-blocks are classified by their location relative to the surface before sub-blocks consolidation.} \label{fig:issue-of-accuracy-compaction} \end{figure} To accurately localise the boundary and achieve the result shown in Fig.~\ref{fig:issue-of-accuracy-compaction}(b), ray tracing is used to determine the location of cells with respect to each relevant surface that intersects the parent block. Given $S$ surfaces, the \{0=above (or no intersection), 1=below\} decisions naturally produce up to $2^S$ categories (or states) which would be treated separately during sub-blocks consolidation in lieu of $\mathcal{B}_\text{intersect}$ and $\mathcal{B}_\text{non-intersect}$. In practice, however, we suggest encoding the location with respect to each surface $s$ using 3 bits $b_{3s+2}b_{3s+1}b_{3s}$, where the mutually exclusive bits are set to 1 to denote the outcomes of \textit{above}, \textit{below} and \textit{untested}, respectively. The rationale is that when $b_{3s}=0$, domain identification needs not be attempted during block tagging with respect to surface $s$, since the decision has already been made here prior to sub-blocks consolidation (either $b_{3s+2}=1$ or $b_{3s+1}=1$) and this information is passed on. In fact, applying ray-casting at the cellular-level (highest resolution) yields more accurate results near the surface than applying to merged blocks, especially for undulating surfaces with high local curvature. To summarise, administering ray-casting before sub-blocks consolidation helps divide cells along surface boundaries; this increases boundary localisation accuracy and ensures merging is performed within the right domains with maximum potential. Table~\ref{tbl:bsu-compare-techniques} provides a comparison of the techniques discussed. \begin{table}[!ht] \setlength\tabcolsep{0pt} \begin{center} \small \begin{tabular}{l} \includegraphics[width=92.5mm]{table1.pdf} \ignore{ Techniques for `which side of the surface' determination\\ \hline \textbullet\ \textbf{Projection onto normal method} (Section~\ref{sec:bsu-block-tagging})\\ \quad + Ability to extrapolate boundary beyond surface support interval\\ \quad -- Susceptible to sign inversion problem depicted in Fig.~\ref{fig:issue-projection-onto-patch-normal-when-sparse}\\ \textbullet\ \textbf{Ray tracing method} (Section~\ref{sec:issue1} and Appendix~\ref{sec:appendix-ray-tracing})\\ \quad + Not impacted by sparse, jittery surface\\ \quad + Consistent edge ordering in triangular mesh surface not required\\ \quad -- Result only defined over support interval of the supplied surface\\ \\ Techniques for sub-blocks consolidation and boundary localisation\\ \hline \textbullet\ \textbf{Earlier proposal} (Section~\ref{sec:bsu-subblocks-consolidation})\\ \quad -- Limited block merging potential due to class segregation\\ \quad -- Possible boundary distortion (introduce small bias)\\ \textbullet\ \textbf{Latest proposal} (Section~\ref{sec:boundary-localisation-accuracy})\\ \quad + Classify sub-blocks w.r.t. surface before consolidation\\ \quad + Accurate (merge \& label decisions made at highest resolution)\\ \hline } \end{tabular} \end{center} \captionof{table}{Comparison of techniques with emphasis on system robustness} \label{tbl:bsu-compare-techniques} \end{table} \begin{table}[!ht] \setlength\tabcolsep{0pt} \begin{center} \footnotesize \begin{tabular}{c} \includegraphics[width=123.5mm,height=56.5mm]{fig15a-real-block-model.pdf}\\ \includegraphics[width=116.5mm,height=49.5mm]{fig15b-minshell.pdf} \end{tabular} \end{center} \captionof{figure}{Typical block model spatial restructuring results. Top: blocks partitioned by surfaces into different domains (not all surfaces are shown). Bottom: reveals two block sets with different levels of mineralisation in an ore deposit. In the \textsc{pdf} article, zoom in to see individual blocks.} \label{fig:bsu-typical-results} \end{table} \newpage\subsection{Applications}\label{sec:applications} The first application we preview relates to block modelling for a typical mine site located in Western Australia. The block model spatial restructuring results shown in Fig.~\ref{fig:bsu-typical-results} illustrate a block-wise partitioning of the mine site into different domains. This is achieved using surfaces which were created to separate geological domains (mineralised, hydrated and waste) within the Brockman Iron Formation which contains members of interbedded BIF and shale bands in the Hamersley Basin Iron Province \cite{clout-06}. Although ore-genesis theories vary depending on the minerals or commodity, the ability to model formations and features such as igneous intrusions in ore deposits is of general interest in areas not limited to mining, but also in further understanding the structural geology of mineral deposits. Using open and closed surfaces to represent structures of varying complexity --- this may encompass volumes with exceptional geochemical or geophysical attributes --- it is possible to extract waste pockets with high concentration of trace elements, or regions with magnetic\,/\,gravity anomaly \cite{wang-15}. Equally, if the surfaces represent the boundary of aquifers separated by clay and lignite seams \cite{wycisk-09}, the process may serve as a basis for creating a structural hydrogeological model to study hydraulic and transport conditions in geotechnical or environmental risk assessment. The techniques developed for shaping a 3D block model can be used potentially in a variety of contexts, including surface buffer analysis (in GIS and structural modelling) for triangle mesh 3D boundary representation of localised objects \cite{li2017irregular}. In the next section, we focus on a specific application of block merging to reduce spatial fragmentation in a block model. \section{Block merging to reduce spatial fragmentation}\label{sec:block-merge-reduce-fragmentation} The proposed block merging algorithm can also be used to consolidate a fragmented block model that exists with or without reference to any mesh surface. Spatial fragmentation is used in this context to mean a highly redundant block model representation where blocks near the boundary are over-segmented or divided in an excessive manner to follow the curvature of a surface without regard for the compactness (total block count) of the model. As an illustration, Fig.~\ref{fig:bsu-stanford-bunny}(b) shows a highly fragmented block model for the \textit{Stanford Bunny} created by block decomposition without consolidation. In an effort to closely approximate the surface, numerous blocks at the minimum block size were produced near the surface. Fig.~\ref{fig:bsu-stanford-bunny}(c) shows a clear reduction in block density as blocks are appropriately merged. This results in a more compact block representation (3D segmentation) of the object. \begin{figure}[!ht] \centering \includegraphics[width=87.5mm]{fig27-bunny-block-merge-one-column.pdf} \caption{Block merging applied to Stanford Bunny to reduce block fragmentation. Zoom in to see individual blocks.} \label{fig:bsu-stanford-bunny} \end{figure} The block merging algorithms are formally described in the Supplementary Material wherein a number of technical issues are discussed in depth. At its core, a notable feature is that `feasibility of cell expansion' is determined using a multi-valued (rather than boolean) 3D occupancy map, where the values correspond to the identity of the cells or sub-blocks. The spatial constraints governing cell expansion are somewhat different, in particular, the lateral dimensions orthogonal to the axis of expansion have to match for all the blocks involved in a merge. These, along with other relevant considerations and implementation details, are described in Appendix~\ref{sec:appendix-cell-expansion-feasibility}--\ref{sec:appendix-bsu-cell-expansion-feasibility-test}. \subsection{Merging conventions and optimisation objectives}\label{sec:bsu-merging-conventions-optimisation-objectives} The block merging algorithms also recognise that merging can be performed under different conventions. For example, in Algorithm~\ref{algo:bsu-coordinate-ascent2}, the procedure preserves the input block boundaries, it does not introduce new partitions (sub-divisions) that are not already present in a parent block. This merging convention is referred as \textbf{persistent block memory}. It has the property that each input block is mapped uniquely to a single block in the merged model. In contrast, Algorithm~\ref{algo:bsu-coordinate-ascent} implicitly erases the sub-block boundaries before block consolidation begins. This merging convention is referred as \textbf{dissolved sub-block boundaries}, it generally achieves higher compaction because it makes no distinction between input blocks from the same class and parent. It is able to grow blocks more freely and produce fewer merged blocks since the size compatibility constraints between individual blocks no longer apply when internal sub-block boundaries are ignored. These differences are illustrated in Fig.~\ref{fig:persistent-vs-dissolved-raster}. \begin{figure}[!ht] \centering \includegraphics[width=146mm]{fig18a-persistent-vs-dissolved-raster.pdf} \caption{Differences between two block merging conventions: persistent block memory vs dissolved sub-block boundaries in 2D} \label{fig:persistent-vs-dissolved-raster} \end{figure} The \textit{dissolved sub-block boundaries} convention can be useful for healing a fractured block model, for instance, over a region where a false geological boundary was given in a previous surface update. Under the \textit{dissolved sub-block boundaries} convention, coordinate-ascent can start from a clean slate and merge sub-blocks in a fragmented area back to the fullest extent in cases where individual sub-block dimensions or internal boundary alignments are otherwise incompatible. It is not bound by the consequences of prior model restructuring decisions. The technical details are given in Appendix~\ref{sec:appendix-merging-convention}. For readers simply looking for a basic explanation, Fig.~\ref{fig:boundary-healing} reinforces these points and illustrates what \textit{healing} really means in practice. \begin{figure}[!ht] \centering \includegraphics[width=120mm]{fig18b-boundary-healing.pdf} \caption{Example of boundary healing through block consolidation --- refer to description in main text} \label{fig:boundary-healing} \end{figure} Fig.~\ref{fig:boundary-healing}(a) shows an existing (poorly estimated) boundary created using limited data at an earlier point in time. Fig.~\ref{fig:boundary-healing}(b) shows the existing block model structure created using this surface which unbeknown to the user is not faithful to the actual boundary shown in gray. At a later point in time (perhaps after several months have elapsed), more assay measurements have been taken at previously unsampled locations. These denser observations help improve the estimated boundary contact points and a new (more accurate) surface is produced as a result; see bottom curve in (a). A second iteration of the block model spatial restructuring process is applied using the new surface. This workflow significantly improves the boundary localisation property of the new block model in (c), however it leaves behind remnant sub-blocks from the previous iteration. By relaxing the internal constraints essentially by dissolving the sub-block boundaries, block merging under the \textit{dissolved sub-block boundaries} convention helps promote healing in fractured areas. As evident in (d), fragmented blocks are coalesced into larger blocks in areas where the misplaced boundary (blue surface) once occupied. The final block merging strategy (see Algorithm~\ref{algo:bsu-final-block-merging} in Appendix~\ref{sec:appendix-pseudocode}) can optimise results with respect to different objectives. For instance, it can minimise the block count or avoid extremely elongated blocks by optimising for the block aspect ratio. It also exploits symmetry by following different scan patterns to alleviate ordering effects associated with using a fixed starting point. These issues are further discussed in Appendixes~\ref{sec:appendix-scan-sequences} and \ref{sec:appendix-scan-implementation}. \subsection{Pseudocode}\label{sec:block-merge-pseudocode-pointer} The block merging algorithms are formally described in Appendix~\ref{sec:appendix-pseudocode} which constitutes part of the Supplementary Material. \subsection{Evaluation}\label{sec:experiments-evaluation} Two experiments were performed targeting two different usage scenarios. The first experiment described in Sec.~\ref{sec:bsu-block-merge-results} uses only the block merging algorithms to reduce block fragmentation in an existing block model where mesh surfaces are not available and the minimum block size has been fixed by the supplier of the model a priori. This restricted setting requires only the use of the sub-blocks consolidation component depicted in the system diagram (see Fig.~\ref{fig:bsu-framework}). The main objective is to analyse its performance in terms of block compaction and multi-threaded execution. The second experiment described in Sec.~\ref{sec:bsu-proposed-vs-octree} provides an end-to-end evaluation of the entire system (from block model creation to block tagging) which applies sub-block consolidation and ray-tracing in an iterative setting. This involves over 80 surfaces and creates approximately 30 different domains. The goal is to compare the proposed strategies with two hierarchical subblocking techniques based on octrees, to highlight the constraints of dyadic decomposition and the importance of inter-scale block merging. \section{Experiment 1: Block merging efficacy on a mining resource block model}\label{sec:bsu-block-merge-results} The proposed block merge strategy (Algorithm~\ref{algo:bsu-final-block-merging}) was implemented in C++ (with boost python bindings) and evaluated using a real model developed for a Pilbara iron ore mine in Western Australia. The model contains 697,097 input blocks of varying sizes\footnote{There were 200 unique input block dimensions, these range from $(5,5,1)$ to $(50,50,2)$ with x and y varying in increments of 5.} spanning 1342 parent blocks with dimensions $(200,200,20)$. The input block model is given as is without associated surfaces. The minimum block dimensions are also fixed by the user at $(5,5,1)$. A key requirement is that blocks smaller than $(5,5,1)$, or being some fractional multiples of it, must not be introduced in the output. This is guaranteed by the proposed system. The metrics of interest are the block aspect ratio, merged block count and execution times with multi-threading. The \nobreak{\textit{AspectRatio}}($m$) obtained using method $m$ is defined by $f_{\pi^*}(\{\boldsymbol{\Delta}^{(b,\pi^*)}\}_{b\in\mathcal{S}_{\mathbf{p},\lambda}})$ in (\ref{eq:min-aspect-ratio-objective}). For comparison, a python implementation that uses a greedy merging strategy based on block edges connectivity is chosen to establish a baseline. Its sub-blocking approach is based on prime number factorisation. Given parent blocks with cell dimensions $(k_x,k_y,k_z)=(40,40,20)=2^2\cdot 5\times (2,2,1)$, it seeks to grow cells into subblocks with dimensions $2^n$ for $n\in\mathbb{Z}$ or 5 and merge iteratively.\footnote{This heuristic is clearly suboptimal since 3 does not appear in the prime factorisation of the cell dimensions, it is not possible for sub-blocks with $k_x,k_y,k_z$ of 3 to emerge in the first pass.}\ignore{The software for this is commercially sensitive and thus cannot be released. However, a formal evaluation against the well established octree hierarchical sub-blocking approach will be presented in Sec.~\ref{sec:bsu-proposed-vs-octree}.} \newpage\subsection{Statistical perspective}\label{sec:bsu-results-statistical} Fig.~\ref{fig:bsu-icdf-aspect-ratio-vs-block-count} illustrates the block merging performance of Algorithm~\ref{algo:bsu-coordinate-ascent2} vs the baseline with emphasis on block aspect ratios. In this plot, performance is measured in terms of block aspect ratio. The volume-weighted aspect ratio is computed for each parent block and sorted in ascending order. Large aspect ratios correspond to long narrow blocks whereas small aspect ratios indicate more balanced, less extreme block dimensions which are more preferred in a mining context. In this plot, the lower the curve, the more desirable it is. The main observation is that the proposed block merge strategy is superior to the baseline. Even when the coordinate-ascent procedure follows only the standard scan pattern, it produces higher quality merged blocks (dotted line is below the dash line). The performance margin increases significantly when multiple scans are deployed in Algorithm~\ref{algo:bsu-final-block-merging} to minimise the aspect ratio explicitly (note: solid line is consistently below the dash line). \begin{figure}[!ht] \centering \includegraphics[width=87.5mm]{fig21-aspect-ratio-performance-margin.pdf} \caption{Inverse cumulative distribution of volume-weighted block aspect ratio vs parent block count} \label{fig:bsu-icdf-aspect-ratio-vs-block-count} \end{figure} \subsection{Spatial perspective}\label{sec:bsu-results-spatial} Fig.~\ref{fig:bsu-xsections-block-merge} provides an alternative view of the same result from a spatial perspective. A birds eye view and two cross-sections from the \textit{proposed} method are shown. Blocks are coloured to highlight differences in aspect ratio between the baseline and proposed method. The darker the red, the more superior is the proposed method. Conversely, blue blocks show the proposed method is inferior. The dominance of the red blocks show the proposed block merge method is able to consistently produce blocks with less extreme aspect ratios across the site. A magnified view for two regions of interest are shown in Fig.~\ref{fig:bsu-perspective-block-merge}. \begin{figure}[!ht] \centering \includegraphics[width=87.5mm]{fig22-merge-quality-spatial-comparison-birds-eye-latest.pdf} \caption{Cross-sections of merged block model coloured by contrast in block aspect ratio} \label{fig:bsu-xsections-block-merge} \end{figure} \begin{figure}[!ht] \centering \includegraphics[width=145mm]{fig23-merge-quality-spatial-comparison-two-perspectives-latest-wide.pdf} \caption{Spatial perspective of merged block model in regions of interest} \label{fig:bsu-perspective-block-merge} \end{figure} \subsection{Local perspective}\label{sec:bsu-results-local} To verify these results, we compare the baseline and proposed method for parent blocks with a high contrast in $\log\left(\frac{AspectRatio(\text{baseline})}{AspectRatio(\text{proposed})}\right)$. Fig.~\ref{fig:bsu-result-local-comparison1} shows the sub-block structure within a parent block of interest, it shows from left to right: the input blocks, and merge results from the baseline and proposed methods. The key observation is the presence of thin narrow blocks in the baseline result; these disappeared under the proposed method. Algorithm~\ref{algo:bsu-final-block-merging} discovers block merging opportunities missed by the baseline method. It is able to minimise the block aspect ratio by conducting multiple scans during coordinate-ascent. Fig.~\ref{fig:bsu-result-local-comparison2} shows a second example. In the top panel, blocks are coloured by block volume such that bigger blocks are coloured in warm colours (yellow, for instance). This shows the proposed method is more effective at consolidating smaller blocks into larger blocks. The bottom panel shows the merge result for the same parent block from a different vantage point. Here, blocks are coloured by domain labels. This illustrates an interesting case where there is a limit to how much merging can be achieved because input blocks from different classes are processed independently even when they share the same parent. \begin{figure}[!ht] \centering \includegraphics[width=87.5mm]{fig24-block-merging-local-region-comparison1.pdf} \caption{Block merging local comparison 1 --- an instance where the log-contrast in block aspect ratio, $\log(AR_\text{baseline}/AR_\text{proposed})$, is highest amongst all parent blocks.} \label{fig:bsu-result-local-comparison1} \end{figure} \begin{figure}[!ht] \centering \includegraphics[width=87.5mm]{fig25-block-merging-local-region-comparison2.pdf} \caption{Block merging local comparison 2 -- a second instance where the log-contrast in block aspect ratio is amongst the highest over all parent blocks.} \label{fig:bsu-result-local-comparison2} \end{figure} \newpage\subsection{Block compaction}\label{sec:bsu-results-compaction} Table~\ref{tab:bsu-block-merge-irregular-input-block-count-comparison} reports the number of output blocks produced by the baseline and proposed methods. The \textit{block count} column shows the proposed method is more efficient at coalescing blocks than the baseline method, as the block count under ``persistent block memory'' is lower. The block count reported for the proposed method under ``dissolved sub-block boundaries'' is lower still, this is consistent with our expectation and the reasoning given in Section~\ref{sec:appendix-merging-convention} based on constraint relaxation. \begin{table}[!ht] \captionof{table}{Block merging given irregular blocks: output block count comparison} \label{tab:bsu-block-merge-irregular-input-block-count-comparison} \small \begin{center} \begin{tabular}{|c|c|c|c|}\hline merge method & convention & block count & relative \% \\ \hline Input & -- & 697,097 & 100.0\%\\ \hline Baseline & -- & 490,928 & 70.42\%\\ \hline Proposed & persistent\,$\dag\star$ & 487,962 & 70.00\%\\ Proposed & dissolved\,$\ddag\star$ & 447,412 & 64.18\%\\ \hline \multicolumn{4}{c}{$\dag$ = persistent block memory\,\, $\ddag$ = dissolved sub-block boundaries}\\ \multicolumn{4}{c}{$\star$ both using multiple-scans, minimising block aspect ratio}\\ \end{tabular} \end{center} \end{table} \subsection{Execution times and memory}\label{sec:bsu-results-times} Table~\ref{tab:bsu-block-merge-time-comparison} reports the processing time for block merging and demonstrates the scalable nature of the proposed algorithm.\footnote{Experiments were conducted on a linux machine with 32 CPUs, 8 cores (Intel Xeon\textregistered\ CPU E5-2680 @ 2.70GHz), 64GB RAM and 2G swap memory\ignore{L1d/L1i/L2/L3 caches: 32K/32K/256K/20480K}} The parallel nature of the algorithm is a consequence of processing all input blocks that belong to the same parent block together independent of other parent blocks. This allows processing to be compartmentalised. From the description in Sec.~\ref{sec:bsu-subblocks-consolidation-via-coordinate-ascent}, it is clear that block consolidation and block tagging are applied locally to spatially disjoint regions; this is exploited in a multi-threaded implementation. Merging under the ``dissolved sub-block boundaries'' convention given 697,097 blocks (of varying sizes) from the input model, is equivalent to merging 29,154,116 blocks (with single cell dimensions) directly under the ``persistent block memory'' convention. The problem size of ``\textit{dissolved}''$\ddag$ grows by a factor of 41.8, however, the computation time increased sub-linearly by a factor of only 9.5, this is partly due to the removal of sub-block alignment\,/\,compatibility constraints when internal sub-block boundaries are dissolved. Of course, the run time still increases relative to ``\textit{persistent}'', ultimately this may be viewed as a trade-off between speed and compaction when Table~\ref{tab:bsu-block-merge-time-comparison} is viewed along side Table~\ref{tab:bsu-block-merge-irregular-input-block-count-comparison}. The CPU utilisation and memory use columns are included for completeness, but these figures are otherwise unremarkable. Running 16 threads, the physical memory footprint amounts to $1\%$ of the RAM available. \begin{table}[!ht] \normalsize \captionof{table}{Block merging processing times and memory footprints comparison} \label{tab:bsu-block-merge-time-comparison} \small \begin{center} \begin{tabular}{|c|c|c|c|c|c|c|}\hline merge method & convention & threads & time (s) & relative & cpu\% & mem (kB)\\ \hline Baseline & -- & -- & 254.181 & 1.0000 & 94.1 & 365,344\\ \hline Proposed & persistent\,$\dag\ast$ & 1 & 4.870 & 0.0192 & -- & -- \\ \hline Proposed & persistent\,$\dag\star$ & 1 & 32.852 & 0.1292 & 100.0 & 285,076\\ Proposed & persistent\,$\dag\star$ & 4 & 9.840 & 0.0387 & 400.0 & 380,884\\ Proposed & persistent\,$\dag\star$ & 16 & 4.162 & 0.0164 & 1553.0 & 614,540\\ \hline Proposed & dissolved\,$\ddag\star$ & 1 & 469.462 & 1.8470 & 100.0 & 293,988\\ Proposed & dissolved\,$\ddag\star$ & 4 & 125.111 & 0.4922 & 400.0 & 370,108\\ Proposed & dissolved\,$\ddag\star$ & 16 & 39.675 & 0.1561 & 1547.0 & 609,064\\ \hline \multicolumn{7}{c}{$\dag$ = persistent block memory\,\, $\ddag$ = dissolved sub-block boundaries}\\ \multicolumn{7}{c}{$\ast$ = single scan, coordinate-ascent follows the standard pattern}\\ \multicolumn{7}{c}{$\star$ multiple scans, minimising block aspect ratio}\\ \end{tabular} \end{center} \end{table} \section{Experiment 2: The proposed coordinate-ascent block merging technique vs octree subblocking}\label{sec:bsu-proposed-vs-octree} Octree decomposition is a volumetric partitioning strategy that is well studied in the literature \cite{samet-88}. As this hierarchical structure has previously been considered as a potential representation for spatial information systems in geology \cite{jones-89}, it provides an interesting reference point to measure our proposed method against. To obtain a fair comparison, the parent blocks ($\boldsymbol{\Delta}_\text{parent}^\text{block}\in\mathbb{R}^3$) must be divisible by the minimum block size ($\boldsymbol{\Delta}_\text{min}^\text{block}$) by some vector $\mathbf{k}=(k_\text{x},k_\text{y},k_\text{z})^T=(2^{K_\text{x}},2^{K_\text{y}},2^{K_\text{z}})^T\in\mathbb{Z}_{+}^3$ where each element is a power of two. This dyadic constraint is necessary for compatibility since the standard octree has to split each dimension into half along the x, y and z axes at each spatial decomposition step. The analysis presented earlier in Table~\ref{tab:bsu-block-merge-irregular-input-block-count-comparison} pertains to a block model where its parameters (e.g. $\boldsymbol{\Delta}_\text{min}^\text{block}$) are already fixed and the cell dimensions $\mathbf{k}=(40,40,20)^T$ are not divisible by 8; thus the maximum number of dyadic decomposition is limited to $D=2$. To facilitate a more wide-ranging comparison, we have chosen another site for which the block structure is not fixed a priori and that geological surfaces are available. This enables all system components in Fig.~\ref{fig:bsu-framework} including block model creation (not just block merging) to be applied. The chosen parameters $\boldsymbol{\Delta}_\text{parent}^\text{block}=(50,50,20)^T$ and $\boldsymbol{\Delta}_\text{min}^\text{block}=(1.5625,1.5625,0.625)^T$ satisfy the dyadic constraints and allow a maximum of $D\!=\!5$ levels of octree decomposition. Fig.~\ref{fig:site8-geological-domain-structure} illustrates the complexity of the domain structure. This surface-induced structure provides spatial separation between significant geological units. A detailed explanation in terms of stratigraphy, material type or geochemical composition however is beyond the scope of this work. The main point is that deposits in the Hamersley Group typically contain interlayered Banded Iron Formations (BIF) and shale bands. Using multiple surfaces to express boundary constraints, it is possible to isolate, for instance, areas of localised iron enrichment within the BIFs where high grade iron ore deposits occur. Interested readers may refer to \cite{thorne2008banded} for geological context. \begin{figure}[!ht] \centering \includegraphics[width=78mm]{fig28-site8-geological-domain-structure.pdf} \caption{Spatial structure of a mine where block model comparison between the proposed and octree representation are made. Around 30 geological domains are represented at this site, each coloured in a different shade. Black stripes represent igneous intrusions demarcated by a set of closed surfaces (not shown). The layers are peeled back one-by-one in an animated sequence in Appendix~\ref{sec:appendix-detailed-octree-subblocking-comparison}. Please refer to page~\pageref{fig:appendix-animated-site8-geological-domains}--\pageref{fig:appendix-animated-site8-geological-domains-dx} (the supplementary material).} \label{fig:site8-geological-domain-structure} \vspace{-3mm} \end{figure} The schemes being compared are the two proposed coordinate-ascent block merging algorithms performed under the \textit{persistent block memory} and \textit{dissolved sub-block boundaries} conventions (denoted `Proposed-P' and `Proposed-D' respectively) versus octree decomposition and a variant that permits intra-scale merging (denoted `Octree' and `Octree+Merge' respectively). In a standard octree decomposition, a heterogenous node (viz.\,a block with dimensions $\boldsymbol{\Delta}_d=\boldsymbol{\Delta}_\text{parent}^\text{block}/2^d$) that contains smaller blocks with different labels is split into an octant with $2\times 2\times 2$ cells of size $\boldsymbol{\Delta}_d / 2$. This sub-division, similar to the approach implemented in the \textit{Surpac} software \cite{poniewierski-19}, is applied recursively to all heterogenous nodes at each decomposition level $d=1,2,\ldots,D$. This process shatters a volume into many smaller blocks and thus vastly increases the block count in its pursuit of higher accuracy. The `Octree+Merge' variant allows 2 and 4 edge-connected cells to be consolidated into a single (rectangular or square-like) block thus achieves higher compaction. This octree merging step applies only to cells at the same scale within an octant in the spatial hierarchy. For completeness, a full description and pictorial examples of these concepts are given in Appendix~\ref{sec:appendix-octree-decomposition-merging}. \subsection{Block count analysis}\label{sec:block-count-vs-octree-analysis} In Table~\ref{tab:aggregate-block-counts-vs-octree}, it can be seen that performing octree decomposition without merging produces a large number of blocks (4241289 for $D\!=\!3$ levels). With octree merging, the block count is reduced to 43.167\%. The proposed strategies have a block count of about 25\% relative to standard octree decomposition. It is worth mentioning that despite this block count disparity, each block model represents the modelled region with the same fidelity and the total block volume for each domain classification remains the same irrespective of $D$ and the block count. In one sense, the `Octree+Merge' method provides an empirical bound on block model efficiency (as measured by block count) that other strategies can surpass. The impressive efficiency gains achieved by the proposed strategies may be attributed to inter-scale block merging without dyadic constraints. For instance, it is possible to combine two adjacent blocks $\mathcal{B}_i$ and $\mathcal{B}_j$ in neighbouring octants if their labels are the same and their cell-dimensions, say, $\mathbf{k}^{(i)}=(1,2,1)$ and $\mathbf{k}^{(j)}=(2,2,1)$ are compatible. This would not be possible using the na\"{i}ve `Octree+Merge' method as it involves blocks from different octants. \begin{table*}[!th] \begin{center} \small \setlength\tabcolsep{4pt} \caption{Block model aggregate block counts: octree vs proposed methodology}\label{tab:aggregate-block-counts-vs-octree} \begin{tabular}{|c|cccc|}\hline &\multicolumn{4}{c|}{Total block count, $B_D$}\\ \hline $D$ levels & Octree & Octree\,+\,Merge & Proposed-P & Proposed-D\\ \hline 3 & 4241289 & 1830826 & 1094917 & 1100585\\ \hline 4 & 17414755 & 7455284 & 4053310 & 4007018\\ \hline 5 & 74065301 & 31052736 & 15608162 & 15204844\\ \hline\hline &\multicolumn{4}{c|}{Relative block count}\\ \hline $D$ levels & Octree & Octree\,+\,Merge & Proposed-P & Proposed-D\\ \hline 3 & 100\% & 43.167\% & 25.816\% & 25.949\%\\ \hline 4 & 100\% & 42.810\% & 23.275\% & 23.009\%\\ \hline 5 & 100\% & 41.926\% & 21.074\% & 20.529\%\\ \hline \multicolumn{5}{c}{\revisit{}The total block volume is approximately $3.693382\times 10^9$ m\textsuperscript{3}}\\ \multicolumn{5}{c}{A detailed breakdown of these figures is given in Appendix~\ref{sec:appendix-detailed-octree-subblocking-comparison}}\\ \end{tabular} \end{center} \end{table*} \begin{table*}[!th] \begin{center} \small \setlength\tabcolsep{4pt} \caption{Block model block count growth factors: octree vs proposed methodology}\label{tab:aggregate-block-growth-factor-vs-octree} \begin{tabular}{|c|cccc|}\hline &\multicolumn{4}{c|}{Block count growth factor based on Table~\ref{tab:aggregate-block-counts-vs-octree}}\\ \hline Growth rate & Octree & Octree\,+\,Merge & Proposed-P & Proposed-D\\ \hline $B_4/B_3$ & 4.1060 & 4.0721 & 3.7019 & 3.6408\\ \hline $B_5/B_4$ & 4.2530 & 4.1652 & 3.8507 & 3.7946\\ \hline $B_5/B_3$ & 17.4629 & 16.9611 & 14.2551 & 13.8152\\ \hline \end{tabular} \end{center} \end{table*} From Table~\ref{tab:aggregate-block-counts-vs-octree}, it is evident the block count roughly grows by a factor of 4 with each additional decomposition level. This is made clear in Table~\ref{tab:aggregate-block-growth-factor-vs-octree} and expressed as a ratio $B_d/B_{d'}$ between levels $d$ and $d'$. Intuitively, the growth rate relates to the surface contact area with the blocks which scales with $O(n^2)$ where $n$ represents the number of cells measured in one dimension. Interestingly, the proposed coordinate-ascent block merging strategies have a lower growth rate compared to `Octree+Merge' --- moving from 3 to 4 levels, the block count increases by a factor of 3.6408 as opposed to 4.0721; from 3 to 5 levels, the growth rate is 13.8152 as opposed to 16.9611. In this respect, the proposed strategies scale better and they are more efficient at representing the same domain information. We caution however that block modelling is not ultimately about an endless pursuit for increasing precision. Block granularity (which may be specified in terms of the number of decompositions, $D$) is often limited by practical considerations. In our application, individual blocks in the model serve as containers for grade estimation. The blockwise spatial distribution of chemical attributes in turn informs what, where and how ore material are excavated. The heavy equipments used to extract and transport such material operate with physical or kinematic constraints (such as bucket size and turn radius), so the required spatial resolution in the case of mining is probably limited to 1.5m to 6m at best. This naturally imposes a lower bound on the spatial fidelity needed from a model. It informs the choice of $D$ in our evaluation, as $D\!=\!3$ and $D\!=\!5$ yield a resolution of 1.5625m and 6.25m, respectively, in a horizontal plane. \subsection{Block aspect ratio analysis}\label{sec:block-aspect-vs-octree-analysis} For grade estimation at a given level of spatial fidelity, a lower block count is desirable not so much for storage but from a computational perspective. A compact model contains fewer blocks that require the inference engine to estimate into, and by extension, it has fewer values to update when new information becomes available. For instance, the difference between `Octree+Merge' and `Proposed' can be as much as 50\% (based on $D\!=\!5$ in Table~\ref{tab:aggregate-block-counts-vs-octree}). A secondary consideration is an optimisation preference for more uniform blocks (as opposed to thin, narrow blocks) that have lower aspect ratios. In a pure octree decomposition scheme, the blocks always maintain the same aspect ratio (in our experiment, this value is 50/20 or 2.5). However, this is obtained at significant cost, resulting in a substantial increase in block count. In Table~\ref{tab:aggregate-block-aspects-vs-octree}, the main observation is that the weighted aspect ratios in the `Proposed-D' column are a marked improvement over `Proposed-P' when merging constraints are relaxed (when input block boundaries are no longer persistent in the sense defined in Sec.~\ref{sec:bsu-merging-conventions-optimisation-objectives}). It also increases slower than `Proposed-P' as the resolution (number of levels $D$) increases, and tends toward the values in the `Octree+Merge' column. \begin{table*}[!th] \begin{center} \small \setlength\tabcolsep{4pt} \caption{Block model average block aspect ratios: octree vs proposed methodology}\label{tab:aggregate-block-aspects-vs-octree} \begin{tabular}{|c|cccc|cccc|}\hline & \multicolumn{4}{c|}{weighted by block volume}\\ \hline $D$ levels & Octree & Octree\,+\,Merge & Proposed-P & Proposed-D\\ \hline 3 & 2.5 & 2.958828 & 3.668188 & 2.615373\\ \hline 4 & 2.5 & 2.968178 & 4.901418 & 2.941797\\ \hline 5 & 2.5 & 2.972378 & 7.395642 & 3.456381\\ \hline \ignore{ & \multicolumn{4}{c|}{weighted by block count}\\ \hline $D$ levels & Octree & Octree\,+\,Merge & Proposed-P & Proposed-D\\ \hline 3 & 2.5 & 3.535403 & 5.068056 & 2.839873\\ \hline 4 & 2.5 & 3.585874 & 7.861600 & 3.650470\\ \hline 5 & 2.5 & 3.585541 & 13.523983 & 5.078064\\ \hline } \end{tabular} \end{center} \end{table*} \begin{figure}[h] \centering \includegraphics[width=120mm]{fig29-octree-vs-proposed-blocksize-cdf.pdf} \caption{Cumulative distribution of block dimensions for $D\!=\!3$: a comparison between the proposed and octree representations.} \label{fig:octree-vs-proposed-blocksize-cdf} \vspace{-3mm} \end{figure} \subsection{Block fragmentation analysis}\label{sec:block-fragmentation-vs-octree-analysis} The diversity of blocks within each model is examined in Fig.~\ref{fig:octree-vs-proposed-blocksize-cdf}. The graph shows the cumulative distribution of block dimensions for $D\!=\!3$ decomposition levels, with block volumes arranged in ascending order (from left to right) and sorted by aspect ratio in the event of a tie. The staircase nature of the orange curve for `Octree+Merge' shows that there is a much smaller pool of possible block size permutations produced via octree decomposition with merging. To simplify the analysis, we measure blocks in multiples of $\boldsymbol{\Delta}_\text{min}^\text{D\!=\!3}=(6.25,6.25,2.5)$, for instance, using $\mathbf{k}=(2,1,3)$ to denote a block with real dimensions $(12.5,6.25,7.5)$. Without merging, octree decomposition alone produces an overwhelming 80.44\% of blocks with cell dimensions $\mathbf{k}=(1,1,1)$, while 96.86\% and 98.93\% of blocks have dimensions at/below $(2,2,2)$ and $(4,4,4)$, respectively. The red curve demonstrates that the blocks in the `Octree' model are indeed highly fragmented. With intra-scale merging, the orange curve shows there is a larger spread of blocks and the proportion occupied by the smallest blocks has substantially reduced. Blocks with cell dimensions $(1,1,1)$, $(1,1,2)$, $(1,2,1)$ and $(2,1,1)$ now occupy the 24.09\textsuperscript{th}, 31.26\textsuperscript{st}, 39.98\textsuperscript{th} and 52.08\textsuperscript{nd} pecentiles, respectively. Because this strategy does not permit inter-scale merging (outside of an octant), it cannot produce blocks with cell dimensions $(1,1,3)$, $(1,3,1)$ or $(3,1,1)$ and indeed $(1,1,4)$. These lost opportunities are capitalised by the proposed strategies. However, the `Octree+Merge' strategy can still produce blocks of size $(1,2,2)$, $(2,1,2)$ and $(2,2,1)$; the so called 4-connected cells occupy the 58.45\textsuperscript{th}, 68.14\textsuperscript{th} and 78.64\textsuperscript{th} percentiles, respectively. Moving up the spatial hierarchy, the $(2,2,2)$, $(2,2,4)$, $(2,4,2)$ and $(4,2,2)$ blocks correspond to the 84.01\textsuperscript{th}, 85.50\textsuperscript{th}, 87.36\textsuperscript{th} and 90.13\textsuperscript{th} percentiles; as opposed to 96.86\% at the $(2,2,2)$ stage for octree decomposition without merging. With intra-scale merging, the $(2,4,4)$, $(4,2,4)$ and $(4,4,2)$ blocks occupy the 91.07\textsuperscript{st}, 92.99\textsuperscript{nd} and 95.25\textsuperscript{th} percentiles. Again, blocks with intermediate cell dimensions, such as $(2,3,4)$ and $(3,2,5)$, can only be synthesized by the proposed techniques through inter-scale merging and relaxation of the dyadic constraints. Similar observations hold for more levels. \subsection{Discussion and insights}\label{sec:octree-vs-proposed-discussion} The octree comparisons with the proposed methods highlight the constraints imposed by hierarchical decomposition and the importance of block merging. In cases where the block structure is subsequently consumed by a block estimation process, minimising the block count (while maintaining the same level of spatial fidelity and domain classification granularity) can substantially reduce the computational effort associated with probabilistic inference of block attributes. The analysis has shown, for instance, when a minimum block size of $(1.5625,1.5625,0.625)$ and 5 decomposition levels are applied to the test site, the block count of the proposed model and `Octree+Merge' model are 20.52\% and 41.92\% respectively relative to standard octree decomposition without block merging. The `Octree+Merge' approach is probably more indicative of the flexible subblocking approach used in the \textit{Datamine} software \cite{poniewierski-19} which adjusts the split depending on the angle of intersection of a particular block with the surface controlling the sub-division. It is however unclear if a split extends all the way down within a parent block, whether different permutations and aspect ratio optimisation are considered in \textit{Datamine}. Returning to the block count comparison, the factor of 2 reduction may be attributed to inter-scale merging and relaxation of dyadic constraints as illustrated in Sec.~\ref{sec:block-fragmentation-vs-octree-analysis}. The proposed coordinate-ascent block merging approach also scales better. For instance, the block count growth rate from 3 to 5 levels is kept at 13.8152 as opposed to 16.9611 (see Table~\ref{tab:aggregate-block-counts-vs-octree}). From the cumulative distribution in Fig.~\ref{fig:octree-vs-proposed-blocksize-cdf}, we observed the block models obtained using the proposed methods are spatially less fragmented. Although the performance metrics all point in favour of the proposed methods, the real strength of the proposal is its flexibility. First, the block merging algorithm was used on its own to consolidate and heal a spatially fragmented block model given only the parent block size and minimum block dimensions (see Sec.~\ref{sec:bsu-block-merge-results}). Second, the same algorithm was used as part of a coherent block model spatial restructuring strategy to coalesce sub-blocks partitioned by intersecting surfaces (see Sec.~\ref{sec:bsu-proposed-vs-octree}). Finally, it provides a successive refinement framework for updating the spatial structure of a block model; this takes a dynamic (non-static) view and emphasizes the evolving nature of the model. In contrast, some commercial softwares \cite{poniewierski-19} produce block models that cannot be altered or easily manipulated. The iterative setting implies the input blocks can have different dimensions. The standard octree paradigm is not equipped to deal with input blocks with varying sizes. As a case in point, given an input block with cell dimensions $(4,2,8)$, a three level dyadic decomposition would need to be applied asymmetrically to each axis, via $d_1(z),d_2(x,z),d_3(x,y,z)$, to not violate the minimum block size (lower bound and integer multiple) conditions. Furthermore, an input block with cell dimensions $(3,5,2)$ would leave the octree approach with no viable sub-blocking options unless the block is divided non-uniformly which would set it on a similar path as the proposed strategy notwithstanding the hierarchical embedding (rigid subblock alignment) constraints. A crucial part of `iterative refinement' is that large portions of an existing model should remain intact, useful information in unaffected parts of the model are not invalidated through the update process, and changes affect only localised regions that interact with new surfaces. This allows creation of a new block model from scratch given a set of surfaces (representing geological boundaries or other types of delineation), as well as automatic correction for misplaced boundaries within an existing model. In \cite{leung-20}, the current proposal is portrayed as a system within a system, where new information captured by sampled assay data are used to manipulate the shape of relevant surfaces to maximise agreement with the latest observations. These are used in turn to update the block model to improve the accuracy of its domain structure by maximising the resolution and positional integrity of the blocks near those surfaces. This has been shown in \cite{leung-20} to have a positive effect on processes downstream. In particular, grade estimation performance improves as boundary (smearing) artefacts are reduced during inferencing. \subsection{Summary of contributions}\label{sec:summary-of-contributions} The overall contributions of this paper may be summarised as follows. \begin{enumerate} \item \textbf{Developing a flexible framework} capable of altering the spatial structure of a block model given boundary constraints in the form of triangle mesh surfaces and a set of tagging instructions. \item \textbf{Describing computational techniques} for all system components \begin{itemize} \item From block-surface intersection detection (identifying areas requiring an update), block structure decomposition (improving boundary localisation), block consolidation (increasing compactness of representation) to block tagging (encoding the location of blocks relative to the given surfaces). \end{itemize} \item \textbf{Devising a new algorithm} (coordinate-ascent inspired block merging) that is amenable to multi-threading. \item \textbf{Demonstrating real applications}: The algorithm was used firstly to reduce block fragmentation in an existing mine resource estimation block model where parameters are fixed and no surfaces are given; secondly as an integrated component within the block model creation/augmentation workflow to coalesce subblocks partitioned by intersecting surfaces. \item \textbf{Providing insights} through quantitative analysis, highlighting the constraints of dyadic hierarchical decomposition and importance of inter-scale merging for achieving a compact block model; discussing why this matters for subsequent block-based estimation processes (see Sec.~\ref{sec:block-count-vs-octree-analysis}--\ref{sec:octree-vs-proposed-discussion}). \end{enumerate} The first point includes correcting the position of previously misplaced boundaries in an existing model (see Fig.~\ref{fig:boundary-healing}). Philosophically, it challenges the perception that voxel-based models are hard to modify once they have been constructed. It demonstrates that local refinement (including consolidation of fragmented blocks from previous updates) is both possible and can be done efficiently in an iterative setting; with changes to the model confined to areas that interact with new surfaces. The second point is about greater transparency. In 3D geological modelling papers, models are often generated using commercial software where the fundamental techniques employed are unclear. This paper sheds light on this and discusses pit falls and robust solutions from an engineering perspective. The third point emphasizes flexibility. Depending on user requirement on whether internal subblock boundaries are to be respected, it can operate in two modes (see Fig.~\ref{fig:persistent-vs-dissolved-raster}): with \textit{persistent block memory} to ensure an input block always maps uniquely to a merged output block, or with \textit{dissolved subblock boundaries} to achieve higher block compaction (a lower block count). The specific objective in the fourth point was to capture geological structures of an ore body in a block model at a specified resolution with a minimal block count. However, the method can potentially be applied elsewhere. \section{Conclusions}\label{sec:bsu-conclusion} This paper described a framework for updating the spatial structure of a 3D geology block model given mesh surfaces. The system consists of four components which perform block-surface overlap detection, spatial structure decomposition, sub-blocks consolidation and block tagging, respectively. These processes are responsible for identifying areas where refinement is needed, increasing spatial resolution to minimise surface approximation error, reducing redundancy to increase the compactness of the model and establishing the domain of each block with respect to geological boundaries. A flexible architecture was presented which allows a model to be updated simultaneously, or iteratively, by multiple surfaces, to selectively retain or modify existing block domain labels. Robustness and accuracy of the system were considered during the design; one notable feature was using ray-tracing to establish the location of sub-blocks relative to surfaces, particularly those near boundaries, prior to block consolidation to minimise boundary distortion. Other techniques employed include block-surface intersection analysis based on the separable axis theorem. The main contribution was a coordinate-ascent merging algorithm which is used during block consolidation in the proposed framework. This technique was extended to solve a related problem, viz., using block merging to reduce fragmentation in an existing block model where surfaces are not involved. Issues relating to scan pattern, merging conventions were discussed, differences between \textit{`persistent block memory'} and \textit{`dissolved sub-block boundaries'} were explained in terms of internal dimensions compatibility and sub-block alignment constraints imposed on the expansion feasibility test. Performance was evaluated with respect to block aspect ratio, output block count and processing time using a multi-threaded implementation. The results demonstrated the quality and scalability of the proposed technique. Systematic evaluation against octree subblocking futher highlights the limitations of hierarchical decomposition and the importance of inter-scale merging and relaxation of dyadic constraints. Algorithm~\ref{algo:bsu-final-block-merging} produced merged blocks with less extreme aspect ratios and the approach is well suited to parallel processing. The techniques described may apply to areas outside of geoscience (see Fig.~\ref{fig:bsu-stanford-bunny}) where 3D body localisation, also known as 3D region segmentation, is required inside a block model given some mesh surfaces. \bibliographystyle{unsrt}
\section{Introduction} This work is concerned with estimating the mixing time of a particular Markov chain on the set of all possible (rooted) planar maps with $n$ edges. Many different Markov chains with a geometric flavour have been considered on a variety of interesting state spaces given by the sets of all possible planar combinatorial structures of a certain type and size -- e.g.~plane trees, binary trees, triangulations of the $n$-gon, lattice triangulations, quadrangulations of the sphere, etc. A natural family of Markov chains which have sparked a lot of interest, both because of their deceptive simplicity and their potential applications (e.g.~to systematic biology \cite{Ald00}), is that of ``edge flip'' chains. The archetypal example of an edge flip chain is Aldous' so-called \emph{triangulation walk} \cite{Ald94b}, defined on the state space of all possible triangulations of the $n$-gon (i.e.~of maximal configurations of non-crossing diagonals). Its transitions are \emph{edge flips} in the following sense: given a triangulation of the $n$-gon, a single step of the chain consists in choosing a diagonal uniformly at random and, with probability $1/2$, replacing it with the \emph{other} diagonal of the unique quadrilateral formed by the two triangles adjacent to it (see Figure~\ref{fig:triangulation walk}). Giving a sharp estimate for the mixing time of the triangulation walk as a function of $n$ is a notoriously difficult open problem. The lower bound of $\Omega(n^{3/2})$ shown by Molloy, Reed and Steiger~\cite{MRS99}, which is in fact Aldous' original conjecture for the actual growth rate of the relaxation time, is still quite distant from the best upper bound to date, which is the $O(n^5\log n)$ obtained by McShine and Tetali~\cite{Catalan97}. But triangulations of the $n$-gon are not the only structures that are well-suited to supporting an edge flip chain, though they provide perhaps the simplest possible example; edge flip dynamics have been considered for example on lattice triangulations~\cite{CMSS15,CMSS16,S17} and rectangular dissections~\cite{CMRdyadic, CLSdyadic}. Recently, Alexandre Stauffer and the author proved a polynomial upper bound for the mixing time of edge flips on quadrangulations of the sphere~\cite{CS2019}. Some very natural classes of combinatorial objects able to support edge flip chains are specific sets of so-called \emph{planar maps}, where by planar map we mean a connected, locally finite planar (multi)graph endowed with a cellular embedding in the two-dimensional sphere, considered up to orientation-preserving homeomorphisms of the sphere itself. For example, one might consider triangulations of the sphere with $n$ edges -- that is, planar maps whose faces have degree 3 -- rather than triangulations of the $n$-gon. An edge flip would then consist in choosing an edge uniformly at random and, with probability 1/2, replacing it with the other diagonal of the quadrilateral formed by the two faces adjacent to it -- or, if the edge is adjacent to only one face, leaving it unchanged (see Figure~\ref{fig:flips on triangulations of the sphere}). This chain has been considered by Budzinski in \cite{B17}, where he shows a lower bound of $\Omega(n^{5/4})$ for the mixing time. Analogous chains can be defined on the set of $p$-angulations of the sphere with $n$ edges for any $p>3$: one chooses an edge uniformly at random and, if it is adjacent to two distinct faces, erases it to obtain a ($2p-2$)-angular face $f$, and then draws an edge joining the $i$-th corner of $f$, where $i$ is chosen uniformly at random in $\{0,1,\ldots,2p-3\}$ (and corners are labelled, say, clockwise), to corner $i+p-1\pmod{2p-2}$, so as to recreate two $p$-angular faces within $f$. Some care must be taken (and some non-canonical choices made) in dealing with edges that are adjacent to a single face on both sides. An especially attractive case is $p=4$, namely, that of quadrangulations (see Figure~\ref{fig:flips on quadrangulations}). In this case, an edge separating two faces, if flipped, will be replaced by one of three edges cutting the hexagon created in its absence ``in half'', chosen uniformly at random. In particular, it remains unchanged with probability $1/3$. It is therefore natural to define a flip for a quadrangulation edge adjacent to the same face on both sides as leaving the edge unchanged with probability $1/3$ and, with probability $2/3$, replacing it with an edge joining its degree $1$ endpoint to the unique vertex of the face which was not an endpoint of the original edge (see Figure~\ref{fig:flips}, and more generally Section~\ref{sec:from rotations to flips} for a detailed description of the dynamics). The case of quadrangulations of the sphere is interesting for multiple reasons. One is that it is still very simple and preserves a strong similarity to the case of edge flips on triangulations of the sphere and of the $n$-gon. Another is the fact that quadrangulations in particular come with a very handy toolset, including Schaeffer-type bijections with labelled plane trees \cite{Sch98}: they fall within the scope of so-called Catalan structures, that is, combinatorial structures whose enumeration is closely related to Catalan numbers (e.g.~plane trees, triangulations of the $n$-gon, binary trees etc.); as a consequence, opportunities arise for a number of possible Markov chain comparisons. One such comparison, made with a ``leaf translation'' Markov chain on labelled plane trees, is what made it possible to show the main result of \cite{CS2019}, namely an upper bound of order $n^{11/2}$ for the relaxation time of the edge flip Markov chain on quadrangulations of the sphere. It should now be mentioned that, in order to have the Schaeffer bijection with labelled plane trees and to have Catalan numbers emerge when enumerating quadrangulations, one considers \emph{pointed}, \emph{rooted} quadrangulations of the sphere -- that is, quadrangulations endowed with a distinguished vertex and a distinguished oriented edge. Redefining the dynamics to take the pointing and rooting into account poses no difficulties; the choice made in \cite{CS2019} is that of performing edge flips exactly as described, preserving the pointing and the orientation of the root edge when flipped (Figure~\ref{fig:flips}). It seems quite reasonable that pointing and rooting should not be truly relevant, and indeed the pointing can be quickly dealt with and does not appear in the results of \cite{CS2019}. As for the rooting, however, it is worth noting that its role is more central. While for example it is natural to conjecture that the upper bound of $O(n^{11/2})$ for the relaxation time proved in \cite{CS2019} should also hold for the mixing time of -- say -- a Markov chain that censors flips of the root edge, or that excludes the root edge from the set of ``flippable'' edges, this fact is not easy to show; moreover, the proof in the aforementioned paper relies heavily on some ad hoc geometric constructions that build upon the Schaeffer bijection, and root edge flips feature prominently in its canonical paths, so that adapting the proof is utterly non-trivial. On the other hand, the argument in \cite{CS2019} does have the potential for generalisation, and one may very well wish to apply variants of it to other edge flip Markov chains and to other classes of planar maps. We have mentioned how one could consider edge flips on $p$-angulations for $p\neq 4$; one other avenue for generalisation would be to consider, rather than edge flips on $p$-angulations, dynamics on the set of all planar maps with -- say -- a fixed number of edges, with no restrictions on face degrees. This is exactly what we propose to do in this paper. We shall consider a natural dynamic on planar maps that, in analogy to edge flips, involves the local manipulation of a single random edge at each step. What we will introduce is a Markov chain which we will call the \emph{edge rotation} chain on (rooted) planar maps with $n$ edges. A single step consists essentially in choosing an oriented edge uniformly at random and sliding its ``tip'' one step to the left, or one step to the right, or leaving everything unchanged (each with probability 1/3), see Figure~\ref{fig:edge rotation chain, informal}. This description, though it should give the right general idea, needs to be formalised and amended to take into account some rather degenerate cases (e.g.~loops and degree 0 vertices); carefully reading Section~\ref{sec:edge rotations} should make it apparent how the more complex presentation given there is truly the one sensible formalisation of the edge rotation chain. \begin{figure} \centering \begin{subfigure}[b]{0.3\textwidth}\centering \begin{tikzpicture} \node[draw=none,minimum size=4cm,regular polygon,regular polygon sides=8] (a) {}; \foreach \x in {1,2,...,8} \node[vertex] (\x) at (a.corner \x) {}; \draw[very thick] (1)--(2)--(3)--(4)--(5) (6)--(7)--(8)--(1); \draw[very thick, ->] (5)--(6); \draw (1)--(3)--(5) (1)--(6)--(8); \draw[red, very thick] (5)--(1); \draw[blue, very thick, dashed] (3)--(6); \end{tikzpicture} \caption{\label{fig:triangulation walk}} \end{subfigure} \begin{subfigure}[b]{0.3\textwidth}\centering \begin{tikzpicture}[scale=.8] \draw[use as bounding box, draw=none] (-3.5,-1.3) rectangle (3,5.2); \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-1, 1) {}; \node [style=vertex] (1) at (-0.75, 3.5) {}; \node [style=vertex] (2) at (-0.25, 1) {}; \node [style=vertex] (3) at (0.5, 2.5) {}; \node [style=vertex] (4) at (0.75, -0.75) {}; \node [style=vertex] (5) at (2.5, 2.25) {}; \node [style=vertex] (6) at (-1.5, -0.75) {}; \node [style=vertex] (7) at (-2.75, 3.25) {}; \node [style=vertex] (8) at (0.5, 4) {}; \node [style=vertex] (9) at (0.25, 0.25) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw (1) to (2); \draw (2) to (3); \draw (1) to (3); \draw [very thick, red, in=150, out=120, looseness=2.75] (2) to (6); \draw [in=-135, out=135, looseness=20] (2) to (2); \draw (2) to (0); \draw (6) to (2); \draw (1) to (8); \draw (8) to (3); \draw (5) to (2); \draw (6) to (4); \draw [bend right=45, looseness=1.25] (2) to (4); \draw [bend left, looseness=1.00] (7) to (2); \draw (8) to (5); \draw (7) to (1); \draw (5) to (4); \draw [bend left=45, looseness=1.25] (2) to (4); \draw (2) to (9); \draw (9) to (4); \draw [bend left=45, looseness=1.50] (8) to (2); \draw [bend right=45, looseness=1.00] (7) to (6); \draw [bend left, looseness=1.00] (7) to (8); \draw [very thick, ->, bend right=60, looseness=1.50] (6) to (5); \draw [bend left=90, looseness=1.50] (7) to (5); \draw [very thick, dashed, blue, in=-135, out=-90, looseness=1.75] (7) to (2); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:flips on triangulations of the sphere}} \end{subfigure} \begin{subfigure}[b]{0.3\textwidth}\centering \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-2.25, -1) {}; \node [style=vertex] (1) at (2, -1) {}; \node [style=vertex] (2) at (2, 3) {}; \node [style=vertex] (3) at (-2.25, 3) {}; \node [style=vertex] (4) at (-1.25, -0) {}; \node [style=vertex] (5) at (-1.25, 2) {}; \node [style=vertex] (6) at (-0.75, 1) {}; \node [style=vertex] (7) at (0.5, 0.75) {}; \node [style=vertex] (8) at (1.25, 2) {}; \node [style=vertex] (9) at (1, 1.25) {}; \node [style=vertex] (10) at (1, -0.25) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw[very thick, ->] (0) to (1); \draw (1) to (2); \draw (2) to (3); \draw (3) to (0); \draw (0) to (4); \draw (3) to (5); \draw [very thick, red, bend left=75, looseness=1.75] (5) to (4); \draw (4) to (6); \draw (5) to (4); \draw [bend right=15, looseness=1.00] (0) to (7); \draw [bend left, looseness=1.00] (5) to (7); \draw [bend left, looseness=0.75] (7) to (8); \draw (7) to (9); \draw [bend right=60, looseness=1.25] (7) to (8); \draw [bend left=45, looseness=1.25] (7) to (2); \draw [in=-105, out=-15, looseness=1.25] (7) to (2); \draw (7) to (10); \draw (10) to (1); \draw[very thick, dashed, blue] (6) to (7); \draw [very thick, dashed, orange, in=82, out=23, looseness=5.8] (0) to (4); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:flips on quadrangulations}} \end{subfigure} \caption{\label{fig:different flips} An edge flip performed on a triangulation of the octagon (a); an edge flip on a rooted triangulation of the sphere -- drawn so that the infinite face lies to the right of the root edge (b); an edge flip on a quadrangulation of the sphere, where both possible new alternative edges are drawn, dashed, in different colours (c).} \end{figure} Note that, by considering the edge rotation chain on \emph{rooted} planar maps, we can take advantage of how general rooted planar maps with a fixed number of edges can themselves be thought of as Catalan structures. Indeed, thanks to Tutte's bijection \cite{Tut63} we shall directly relate the edge rotation chain to a version of the edge flip Markov chain on rooted quadrangulations where the quadrangulation root edge is not included in the set of ``flippable'' edges. We will then proceed to give an upper bound that will apply to both the mixing time of the edge rotation chain and that of the variant edge flip chain on rooted quadrangulations. Our main result is the following: \begin{theorem}\label{main theorem} Let $\nu_n$ and $\mu_n$ be the spectral gaps of the (non-root-flipping) edge flip Markov chain $\FF^n$ on the set $\sQ_n$ of quadrangulations with $n$ faces and of the edge rotation Markov chain $\mathcal{R}_n$ on the set $\sM_n$ of rooted planar maps with $n$ edges, respectively. We have $\nu_n=\mu_n$, and there are positive constants $C_1,C_2$ (independent of $n$) such that $$C_1n^{-5/4}\geq\nu_n\geq C_2n^{-11/2}$$ for all $n$. Consequently, the mixing time of both chains is $O(n^{13/2})$. \end{theorem} The proof will combine part of the approach of \cite{CS2019} with some new ideas, which render it almost completely independent of Schaeffer's bijection: we shall construct probabilistic canonical paths on the set of rooted quadrangulations rather than the set of plane trees, thus making the approach more readily generalisable. Section~\ref{sec:trivial bijection} introduces relevant objects -- maps, quadrangulations -- and contains a brief description of Tutte's bijection, which will be used in Section~\ref{sec:from rotations to flips} to relate the edge rotation chain presented in Section~\ref{sec:edge rotations} to an edge flip chain. The rest of the paper will develop the necessary tools to prove Theorem~\ref{main theorem}. The argument is based on an algorithm to grow quadrangulations uniformly at random by ``adding faces'' one at a time (Section~\ref{sec:growth algorithm}) and a construction of probabilistic canonical paths (Section~\ref{sec:canonical paths}) which is truly the core of this paper. Section~\ref{sec:final bound} concludes the proof. \begin{figure} \centering \begin{tikzpicture}[scale=.7] \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (0, -0.5) {}; \node [style=vertex] (1) at (0, 1.75) {}; \node [style=vertex] (2) at (2, 3) {}; \node [style=vertex] (3) at (4, 2.25) {}; \node [style=vertex] (4) at (4.25, 0.5) {}; \node [style=vertex] (5) at (-1.75, -0.75) {}; \node [style=vertex] (6) at (-1.75, 2.25) {}; \node [style=vertex] (7) at (2.25, 1.25) {}; \node [style=vertex] (8) at (2.25, -0.25) {}; \node [style=vertex] (9) at (2.5, -1.25) {}; \node [style=vertex] (10) at (3, 2) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw (1) to (2); \draw (2) to (3); \draw [bend left=15, looseness=1.00] (3) to (4); \draw [bend right=15, looseness=1.00] (4) to (7); \draw [bend right, looseness=1.00] (7) to (8); \draw [bend right=15, looseness=1.00] (8) to (4); \draw (9) to (0); \draw [bend right=15, looseness=1.00] (9) to (4); \draw (0) to (5); \draw [bend left=60, looseness=1.00] (5) to (6); \draw (6) to (1); \draw [in=105, out=30, looseness=10] (5) to (5); \draw (2) to (10); \draw[very thick, red, ->] (0) to (1); \draw[very thick, blue, dashed, ->] (0) to (2); \draw[very thick, orange, dashed, ->] (0) to (6); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (0, -1) {}; \node [style=vertex] (1) at (0, 1) {}; \node [style=vertex] (2) at (2, 1) {}; \node [style=vertex] (3) at (2, -1) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [bend left=90, looseness=2.25] (0) to (1); \draw (0) to (3); \draw (3) to (2); \draw (1) to (2); \draw [very thick, red, ->] (0) to (1); \draw [very thick, dashed, orange, in=165, out=105, looseness=15, ->] (0) to (0); \draw [very thick, dashed, blue, ->] (0) to (2); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture}[scale=.8] \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (0, -2) {}; \node [style=vertex] (1) at (-2, -0.25) {}; \node [style=vertex] (2) at (0, 1.5) {}; \node [style=vertex] (3) at (2, -0.25) {}; \node [style=vertex, fill=orange] (4) at (-0.25, -1) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw (0) to (1); \draw [very thick, dashed, blue, bend left=45, looseness=1.25, ->] (0) to (3); \draw (1) to (2); \draw (2) to (3); \draw [very thick, red, in=135, out=60, looseness=30, <-] (0) to (0); \draw [very thick, orange, dashed, <-](4) to (0); \draw (0) to (3); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture}[scale=.5] \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (0, -2) {}; \node [style=vertex] (1) at (-2.25, 0.25) {}; \node [style=vertex] (2) at (1.5, 1.5) {}; \node [style=vertex] (3) at (0, 0) {}; \draw [very thick, orange] (-0.2,-0.2)--(0.2,0.2); \draw [very thick, blue] (0.2,-0.2)--(-0.2,0.2); \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [bend right, looseness=1.00] (1) to (0); \draw [bend right=30] (2) to (1); \draw [bend right, looseness=1.00] (0) to (2); \draw [very thick, red, ->] (0) to (3); \draw [very thick, dashed, blue, out=60, in=120, looseness=28, <-] (0) to (0); \draw [very thick, dashed, orange, out=55, in=125, looseness=29, ->] (0) to (0); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:edge rotation chain, informal}An informal look at the edge rotation chain on planar maps with $n$ edges; in each case, an oriented edge is shown, together with the two (or one, in the last picture) faces adjacent to it. One can rotate it clockwise or counterclocwise, which in some cases may create a loop (second picture). If the edge is itself a loop enclosing a face of degree 1 (third picture) one of the two edge rotations causes it to ``detach itself'' from the boundary of its external face and create a new degree 1 vertex. If the edge is oriented towards an endpoint of degree 1 (fourth picture) then rotating it in either direction eliminates that endpoint in favour of a loop. A complete presentation (not in terms of the rotated oriented edge but of the corner that the tip ``rotates through'') is given in Section~\ref{sec:edge rotations}.} \end{figure} \section{Quadrangulations, general planar maps and edge flips}\label{sec:trivial bijection} \begin{df} A \emph{planar map} is a connected, locally finite planar (multi)graph endowed with a cellular embedding in the two-dimensional sphere, considered up to orientation-preserving homeomorphisms of the sphere itself. \end{df} Of course, planar maps inherit terminology and features from graphs -- we shall speak of their \emph{vertices} and \emph{edges} -- but with their built-in planar embedding comes the added perk of having well defined \emph{faces} (i.e.~the connected components of the complement of the image of vertices and edges via the cellular embedding, see Figure~\ref{planar map}). It will often prove useful to endow an edge with an \emph{orientation} (each edge has two possible orientations). Given an oriented edge $\vec{e}$ in a map $m$ whose endpoints are a vertex $e^-$ (the tail) and a vertex $e^+$, we shall informally say that the \emph{corner} corresponding to $\vec{e}$ is a suitably small neighbourhood of the vertex $e^-$ intersected with the face lying directly to the right of $\vec{e}$. We will speak of corners as ``belonging to'' faces (the corner corresponding to $\vec{e}\,$ belongs to the face lying directly to the right of $\vec{e}$) and also to vertices (the corner corresponding to $\vec{e}$ is a corner of vertex $e^{-}$). Corners of a single vertex and corners of a single face have two natural cyclic orderings: \emph{clockwise} and \emph{counterclockwise}. Given a face $f$ of a map $m$, we shall call the cyclic sequence $(c_i)_{i=1}^{\deg f}$ of all corners of $f$ in clockwise (resp.~counterclockwise) order, where the index is considered modulo $\deg f$, a \emph{clockwise} (resp.~\emph{counterclockwise}) \emph{contour} of $f$; the number $\deg f$ of corners of $f$ is the \emph{degree} of the face $f$. When mentioning a contour of the face $f$ without specifying its direction, we shall be referring to its \emph{clockwise} contour. \begin{figure} \centering \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-2.75, 2.5) {}; \node [style=vertex] (1) at (-0.75, 1.25) {}; \node [style=vertex] (2) at (0.25, 3.25) {}; \node [style=vertex] (3) at (-0.25, 5.5) {}; \node [style=vertex] (4) at (-3, 4) {}; \node [style=vertex] (5) at (-5.25, -0) {}; \node [style=vertex] (6) at (-2.75, -0.5) {}; \node [style=vertex] (7) at (-0.25, -0.25) {}; \node [style=vertex] (8) at (1.25, 1.5) {}; \node [style=vertex] (9) at (3, 1.25) {}; \node [style=vertex] (10) at (2.25, 4) {}; \node [style=vertex] (11) at (-1.75, 2.75) {}; \node [style=vertex] (12) at (0.5, 0.5) {}; \node [style=vertex] (13) at (1.5, 0.5) {}; \node [style=vertex] (14) at (-1.75, 3.25) {}; \node [style=vertex] (15) at (-0.75, 3) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \fill[red!10] (4.center) to (0.center) to (1.center) to (2.center) [bend right, looseness=1.1] to (4.center); \begin{scope} \clip (4.center) to (0.center) to (1.center) to (2.center) [bend right, looseness=1.1] to (4.center); \draw [draw=red, fill=red!20] (0) circle (10pt); \draw [draw=red, fill=red!20] (1) circle (10pt); \draw [draw=red, fill=red!20] (2) circle (10pt); \draw [draw=red, fill=red!20] (4) circle (10pt); \draw [draw=red, fill=red!20] (11) circle (10pt); \draw [draw=red, fill=red!20] (15) circle (10pt); \node () at (-2.2, 2.4) {\scriptsize\contour{white}{$c_1$}}; \node () at (-1.6, 2.45) {\scriptsize\contour{white}{$c_2$}}; \node () at (-2.15, 2.85) {\scriptsize\contour{white}{$c_3$}}; \node () at (-2.5, 2.8) {\scriptsize\contour{white}{$c_4$}}; \node () at (-2.7, 3.8) {\scriptsize\contour{white}{$c_5$}}; \node () at (-0.15, 3.35) {\scriptsize\contour{white}{$c_6$}}; \node () at (-0.15, 2.95) {\scriptsize\contour{white}{$c_8$}}; \node () at (-1.15, 3) {\scriptsize\contour{white}{$c_7$}}; \node () at (-0.8, 1.6) {\scriptsize\contour{white}{$c_9$}}; \end{scope} \begin{scope} \clip [bend right=45, looseness=1.25] (6) to (9) [bend left=40] to (5.center)--cycle; \draw [draw=red, fill=red!20] (6) circle (10pt); \end{scope} \draw [b] (11) to (0); \draw [b] (0) to (1); \draw [b] (1) to (8); \draw [b, in=135, out=45, loop] (8) to (); \draw [b] (8) to (9); \draw [b] (1) to (2); \draw [b] (2) to (10); \draw [b] (10) to (9); \draw [b] (2) to (3); \draw [b] (3) to (4); \draw [b] (4) to (0); \draw [b] (0) to (5); \draw [b] (5) to (6); \draw [b] (6) to (0); \draw [b] (6) to (8); \draw [b] (6) to (7); \draw [b, bend right=45, looseness=1.25] (6) to (9); \draw [b] (7) to (12); \draw [b] (7) to (13); \draw [b, in=135, out=45, looseness=15] (11) to (11); \draw [b] (5) to (4); \draw [b] (14) to (11); \draw [b] (15) to (2); \draw [b, bend left, looseness=1.00] (4) to (2); \draw [b,bend left=60, looseness=1.50] (3) to (9); \draw (11) to (0); \draw (0) to (1); \draw (1) to (8); \draw [in=135, out=45, loop] (8) to (); \draw (8) to (9); \draw (1) to (2); \draw (2) to (10); \draw (10) to (9); \draw (2) to (3); \draw (3) to (4); \draw (4) to (0); \draw (0) to (5); \draw (5) to (6); \draw (6) to (0); \draw (6) to (8); \draw (6) to (7); \draw [red, ->, ultra thick, bend right=45, looseness=1.25] (6) to (9); \draw (7) to (12); \draw (7) to (13); \fill [white, in=135, out=45, looseness=15] (11) to (11); \draw [in=135, out=45, looseness=15] (11) to (11); \draw (5) to (4); \draw (14) to (11); \draw (15) to (2); \draw [bend left, looseness=1.00] (4) to (2); \draw [bend left=60, looseness=1.50] (3) to (9); \end{pgfonlayer} \end{tikzpicture} \caption{A rooted planar map drawn in the plane in such a way that the infinite face contains the root corner. A face of degree 9 is shaded and the labels $c_1,\ldots,c_9$ placed along its clockwise contour.\label{planar map}} \end{figure} \begin{figure}\center \begin{tikzpicture}[scale=.9, real/.style={circle, fill=black, draw=white, thick, inner sep=2pt}, new/.style={fill=red, draw=white, thick, inner sep=2pt}, bla/.style={red, thick, densely dashed}, every path/.style={thick}] \begin{pgfonlayer}{nodelayer} \node [style=real] (0) at (-4.5, 2.5) {}; \node [style=real] (1) at (-5.75, -2) {}; \node [style=real] (2) at (-1, -3.75) {}; \node [style=real] (3) at (2.25, 0.75) {}; \node [style=real] (4) at (1.25, 3) {}; \node [style=real] (5) at (-4.25, -0.5) {}; \node [style=real] (6) at (-3.5, -1.75) {}; \node [style=real] (7) at (-2.75, -1) {}; \node [style=real] (8) at (-1.5, 2.25) {}; \node [style=real] (9) at (-0.5, -0.5) {}; \node [style=real, thick, draw=red] (10) at (0.75, 1.5) {}; \node [style=real] (11) at (1.75, -3) {}; \node [style=real] (12) at (-2.75, -2) {}; \node [style=new] (13) at (-3, 1) {}; \node [style=new] (14) at (-0.5, 1) {}; \node [style=new] (15) at (1.5, 0) {}; \node [style=new] (16) at (0.75, -1.75) {}; \node [style=new] (17) at (-2.25, -0.5) {}; \node [style=new] (18) at (-4, -1.25) {}; \node [style=new] (19) at (-1.5, -2.25) {}; \node [style=new] (20) at (-1, -3.25) {}; \node [style=new] (21) at (2.25, 4.5) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \fill[red!10] (9.center)--(15.center)--(10.center)--(14.center)--(9.center); \draw (1) to (0); \draw (1) to (6); \draw (6) to (7); \draw (7) to (5); \draw (1) to (5); \draw (1) to (2); \draw (2) to (11); \draw (11) to (3); \draw (3) to (10); \draw (9) to (10); \draw [bend right=45, looseness=1.25] (9) to (11); \draw [bend left=15] (9) to (7); \draw (8) to (9); \draw (10) to (8); \draw[<-, very thick] (4) to (10); \draw (0) to (8); \draw [in=135, out=45, looseness=17] (2) to (2); \draw [bend left=45] (5) to (9); \draw [bend left=45, looseness=1.25] (9) to (11); \draw (12) to (6); \draw [style=bla] (20) to (2); \draw [style=bla] (5) to (17); \draw [style=bla] (7) to (17); \draw [style=bla] (5) to (13); \draw [style=bla] (17) to (9); \draw [style=bla] (5) to (18); \draw [style=bla] (18) to (7); \draw [style=bla] (6) to (18); \draw [style=bla] (1) to (18); \draw [style=bla] (14) to (9); \draw [style=bla] (8) to (14); \draw [style=bla] (14) to (10); \draw [style=bla] (15) to (10); \draw [style=bla] (9) to (15); \draw [style=bla, in=80, out=-90, looseness=0.75] (15) to (11); \draw [style=bla] (15) to (3); \draw [style=bla] (13) to (8); \draw [style=bla, bend left=15, looseness=0.75] (1) to (13); \draw [style=bla] (0) to (13); \draw [style=bla, bend left] (13) to (9); \draw [style=bla] (7) to (19); \draw [style=bla] (19) to (9); \draw [style=bla, bend right=15] (19) to (11); \draw [style=bla, in=30, out=-30, looseness=1.25] (19) to (2); \draw [style=bla, in=153, out=-105] (19) to (2); \draw [style=bla] (12) to (19); \draw [style=bla, bend left=15] (19) to (1); \draw [style=bla, in=-120, out=-179] (19) to (6); \draw [style=bla, in=30, out=150] (19) to (6); \draw [style=bla] (16) to (11); \draw [style=bla] (9) to (16); \draw [style=bla] (4) to (21); \draw [style=bla, in=15, out=-117, looseness=0.75] (21) to (10); \draw [style=bla] (3) to (21); \draw [style=bla] (8) to (21); \draw [style=bla] (21) to (0); \draw [style=bla, bend left=45] (21) to (11); \draw [style=bla, in=180, out=105, looseness=1.50] (1) to (21); \draw [style=bla, in=-15, out=-30, looseness=1.75] (21) to (2); \draw [red, in=-135, out=105, looseness=1.25, ->, very thick, shorten >=5pt] (10) to (21); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:trivial bijection}Given a rooted planar map (black vertices and edges in the picture), the corresponding quadrangulation (red and black vertices, red dashed edges) has one face for each edge of the original map (look for example to the shaded red face, which encloses the single black edge joining its two black vertices). The map is recovered from the quadrangulation by drawing the edge in each face, which joins the two corners adjacent to black vertices.} \end{figure} A \emph{rooted} planar map is a pair $(m,c)$, where $m$ is a planar map and $c$ is a corner of $m$; since -- as explained above -- there is a direct correspondence between corners and oriented edges, we may also see a rooted planar map as being endowed with a distinguished oriented edge rather than a distinguished corner: we will adopt either point of view, depending of what is most convenient. We shall call the vertex that the root corner $c$ belongs to, i.e.~the tail of the root edge, the \emph{origin} of the rooted map $(m,c)$; we shall often denote the origin of a map by $\emptyset$. Note that all maps we will refer to in this paper will be rooted; we will therefore, for the sake of simplicity, usually denote them by a single letter and not as a pair: we will write $\sM_n$ for the set of all rooted planar maps with $n$ edges and will write $m\in\sM_n$ to indicate that $m$ is a planar map with $n$ edges and is also endowed with a root corner/edge, which will normally be denoted by $\rho$. \begin{df} A quadrangulation is a planar map all of whose faces have degree 4. We shall write $\sQ_n$ for the set of all rooted quadrangulations with $n$ faces. \end{df} It is a classical result of Tutte \cite{Tut63} that we have $|\sQ_n|=|\sM_n|$; and in fact, Tutte himself provides a simple explicit bijection $\Phi:\sM_n\to\sQ_n$, which we shall briefly describe here before making use of it for our purposes. Given a rooted planar map $m\in\sM_n$, build a new rooted planar map as follows: \begin{itemize} \item draw one vertex within each face of $m$; \item connect each newly drawn vertex to all corners in the face it belongs to (draw new edges in such a way that they do not cross); \item erase all original edges of $m$; \item there is one edge drawn by this procedure that crosses the original root corner of $m$; let that edge be the new root edge, oriented away from the original root corner. \end{itemize} The procedure described above yields a rooted planar map $\Phi(m)$ which has $|V(m)|+|F(m)|=n+2$ vertices and $2|E(m)|=2n$ edges, hence $n$ faces, each of which can be shown to be a quadrangle; in other words, $\Phi(m)\in\sQ_n$. An inverse procedure can be described just as easily: given a quadrangulation $q\in\sQ_n$, \begin{itemize} \item partition the set of vertices of $q$ into two parts: we shall call \emph{real vertices} those at even graph distance from the origin and \emph{face vertices} those at odd distance (notice that real vertices are only adjacent to face vertices and vice-versa, so each face has two corners of real vertices and two corners of face vertices); \item within each face, draw an edge joining its two corners belonging to real vertices; \item erase all face vertices and all original edges of $q$; \item root the newly formed map in the one corner that the original root edge of $q$ was issued from. \end{itemize} The map resulting from this procedure, which clearly has $n$ edges, one for each face of $q$, is none other than $\Phi^{-1}(q)$. Indeed, we have the following: \begin{theorem}[Tutte] The mapping $\Phi$ is a bijection between the set $\sM_n$ of rooted planar maps with $n$ edges and the set $\sQ_n$ of rooted quadrangulations with $n$ faces; it induces a correspondence between the set of edges of each map $m$ and the set of faces of $\Phi(m)$.\end{theorem} \section{The edge rotation Markov chain on $\sM_n$}\label{sec:edge rotations} \begin{figure} \centering \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-5, -0) {}; \node [style=vertex] (1) at (-2.5, -0) {}; \node [style=vertex] (2) at (-2.5, 2.5) {}; \node [style=vertex] (3) at (-5, 2.5) {}; \node [style=vertex] (4) at (-0.25, -0) {}; \node [style=vertex] (5) at (-0.25, 2.5) {}; \node [style=vertex] (6) at (2.75, -0) {}; \node [style=vertex] (7) at (4.75, 2.5) {}; \node [style=vertex] (8) at (6, -0) {}; \node [style=vertex] (9) at (6, 1.25) {}; \node [style=vertex] (10) at (7.25, 2.5) {}; \node [style=vertex] (11) at (2.75, 1.25) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \begin{scope} \clip (0.center) to (1.center) to (2.center) to (3.center) to (0.center); \filldraw[draw=red, fill=red!20] (0) circle (12pt); \filldraw[draw=red, fill=red!20] (1) circle (12pt); \filldraw[draw=red, fill=red!20] (3) circle (12pt); \end{scope} \begin{scope} \clip [bend left=45, looseness=1.00](4.center) to (5.center) to (4.center); \filldraw[draw=red, fill=red!20] (4) circle (12pt); \filldraw[draw=red, fill=red!20] (5) circle (12pt); \end{scope} \begin{scope} \clip [in=135, out=45, looseness=30] (6) to (6); \filldraw[draw=red, fill=red!20] (6) circle (12pt); \end{scope} \begin{scope} \clip [bend left=15, looseness=1.00] (8.center) to (7.center) [bend left=0] to (10.center) [bend left=15, looseness=1.00] to (8.center); \filldraw[draw=red, fill=red!20] (8) circle (12pt); \filldraw[draw=red, fill=red!20] (9) circle (9pt); \end{scope} \node (x) at (-4.7, 0.3) {\contour{white}{$c$}}; \node (x) at (-4.7, 1.75) {\contour{white}{$c_+$}}; \node (x) at (-3.1, 0.25) {\contour{white}{$c_-$}}; \node (x) at (-4, 1) {\contour{white}{$e_=$}}; \node (x) at (-4, -0.25) {\contour{white}{$e_-$}}; \node (x) at (-5.25, 1) {\contour{white}{$e_+$}}; \node (x) at (-0.25, 0.45) {\contour{white}{$c$}}; \node (x) at (-0.25, 1.35) {\contour{white}{$e_=$}}; \node (x) at (-1.1, 1.25) {\contour{white}{$e_+$}}; \node (x) at (0.7, 1.25) {\contour{white}{$e_-$}}; \draw[very thick, blue] (0) to (1); \draw (1) to (2); \draw (2) to (3); \draw[very thick, red] (3) to (0); \draw [very thick, red, bend left=45, looseness=1.00] (4) to (5); \draw [very thick, blue, bend right=45, looseness=1.00] (4) to (5); \draw [very thick, violet, in=135, out=45, looseness=30] (6) to (6); \draw[very thick, violet] (9) to (8); \draw [bend left=15, looseness=1.00] (8) to (7); \draw (7) to (10); \draw [bend left=15, looseness=1.00] (10) to (8); \draw [very thick, dashed] (3) to (1); \draw [very thick, dashed, out=-50, in=-130, looseness=15] (5) to (5); \draw [very thick, dashed] (11) to (6); \draw [very thick, dashed, out=130, in=50, looseness=30] (8) to (8); \node (x) at (2.8, 0.45) {\contour{white}{$c=c_+=c_-$}}; \node (x) at (2.8, 1.85) {\contour{white}{$e_+=e_-$}}; \node (x) at (3.2, 1.15) {\contour{white}{$e_=$}}; \node (x) at (6, 2) {\contour{white}{$e_=$}}; \node (x) at (6.3, 1.4) {\contour{white}{$c$}}; \node (x) at (6, 0.7) {\contour{white}{$e_-=e_+$}}; \node (x) at (6.35, 0.3) {\contour{white}{$c_-$}}; \node (x) at (5.8, 0.3) {\contour{white}{$c_+$}}; \end{pgfonlayer} \end{tikzpicture} \caption{The corners $c,c_-,c_+$ within the face $f_c$; the edge $e_=$ drawn by the procedure is dashed. Notice that $e_=$ is a loop if $e_-$ and $e_+$ are corners of the same vertex, which happens when $\deg f_c=2$ and when the degree of the vertex of $c$ is 1 (second and fourth image).\label{draw triangle}} \end{figure} Let $m$ be a map in $\sM_n$, let $c$ be a corner of $m$ other than the root corner and let $s$ be an element of $\{=,+,-\}$. Construct a map $m^{c,s}\in\sM_n$ as follows: \begin{itemize} \item the corner $c$ belongs to a face $f_c$ of $m$; let $c_-$ and $c_+$ be the corners immediately before and immediately after $c$ in a clockwise contour of $f_c$; \item let $e_-$ and $e_+$ be the edges of $f_c$ joining $c_-$ to $c$ and $c$ to $c_+$ respectively; in the case where $\deg f_c=2$, in which $c_-=c_+$, $e_-$ and $e_+$ are the two edges forming the boundary of $f_c$, and they are named in such a way that $f_c$ lies to the right of the edge $e_+$, oriented away from $c$ (Figure~\ref{draw triangle}); in the case where $\deg f_c=1$, in which $c=c_-=c_+$, we set $e_-=e_+$ to be the one loop which constitutes the boundary of $f_c$; \item if $\deg f_c>1$, draw an edge $e_=$ joining corner $c_-$ to corner $c_+$ (in the case where $c_-=c_+$ and the case where the vertex of $c$ has degree 1, notice that $e_=$ will be a loop); \item if $c_-=c=c_+$ (that is if $\deg f_c = 1$) draw a new vertex within the loop $e_-$ and join it to the vertex of $c$ by a new edge $e_=$; \item notice now that, whatever the case for $\deg f_c$, one new edge $e_=$ has been drawn and a triangular face containing $c$, whose boundary edges are $\{e_=,e_-,e_+\}$ (which are not necessarily all distinct), has been created; \item finally, erase the edge $e_s$ (and any vertices adjacent only to $e_s$); if $s=\pm$ and the root corner $\rho$ of $m$ is in $\{c_-,c_+\}$, set the new root corner to be the part of $\rho$ that did not belong to the triangular face containing $c$ created by drawing $e_=$; otherwise, set the new root corner to be the one that contains the original corner $\rho$ (which is ``larger'' than the original only if $e_s$ is an edge adjacent to $\rho$). The new rooted map obtained in this way is $m^{c,s}$; it has exactly as many edges as $m$ and therefore belongs to $\sM_n$. \end{itemize} We shall say that $m^{c,s}$ is obtained from $m$ via an \emph{edge rotation}; though rotating edges is not explicitly mentioned in the construction above, the reason for the name should be clear: except for some rather degenerate cases, the whole construction -- when $s\in\{-,+\}$ -- essentially consists of ``rotating'' the edge $e_s$ within the corner $c_s$ by ``detaching it'' from the vertex of $c$ and instead setting its other endpoint to be within the next corner in the clockwise/counterclockwise contour of $f_c$, thus effectively turning it into the new edge $e_=$ (see Figure~\ref{edge rotation}). Even the case where $e_-=e_+$, which turns an edge with an endpoint of degree 1 into a loop and vice-versa, can be thought of as an edge rotation of sorts. \begin{figure}\centering \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=below right:\contour{white}{$c_+$}] (0) at (-2, 3) {}; \node [style=vertex, label=right:\contour{white}{$c$}] (1) at (-3.25, 1.5) {}; \node [style=vertex, label=above right:\contour{white}{$c_-$}] (2) at (-2, -0) {}; \node [style=vertex] (3) at (0.5, 2.5) {}; \node [style=vertex] (4) at (0, 0.5) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \fill[black!5] (1.center) to (2.center) to (0.center) to (1.center); \begin{scope} \clip (1.center) to (2.center) to (4.center) to (3.center) to (0.center) to (1.center); \draw[draw=red, fill=red!20] (0) circle (15pt); \draw[draw=red, fill=red!20] (1) circle (15pt); \draw[draw=red, fill=red!20] (2) circle (15pt); \end{scope} \draw[b] (1) to (0); \draw[b] (0) to (3); \draw[b] (1) to (2); \draw[b] (2) to (4); \draw[b] (4) to (3); \draw[map] (1) to (0); \draw[map] (0) to (3); \draw[map] (1) to (2); \draw[map] (2) to (4); \draw[map] (4) to (3); \draw[dashed, very thick] (0) to (2); \node (x) at (-0.5, 1.5) {\contour{white}{$f_c$}}; \node (e=) at (-1.7, 1.5) {\contour{white}{$e_=$}}; \node (x) at (-3, 2.3) {\contour{white}{$e_+$}}; \node (x) at (-2.9, 0.5) {\contour{white}{$e_-$}}; \end{pgfonlayer} \end{tikzpicture}\\[.5cm] \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=below right:\contour{white}{$c_+$}] (0) at (-2, 3) {}; \node [style=vertex, label=right:\contour{white}{$c$}] (1) at (-3.25, 1.5) {}; \node [style=vertex, label=above right:\contour{white}{$c_-$}] (2) at (-2, -0) {}; \node [style=vertex] (3) at (0.5, 2.5) {}; \node [style=vertex] (4) at (0, 0.5) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \begin{scope} \clip (1.center) to (2.center) to (4.center) to (3.center) to (0.center) to (1.center); \draw[draw=red, fill=red!20] (0) circle (15pt); \draw[draw=red, fill=red!20] (1) circle (15pt); \draw[draw=red, fill=red!20] (2) circle (15pt); \end{scope} \draw[b] (1) to (0); \draw[b] (0) to (3); \draw[b] (1) to (2); \draw[b] (2) to (4); \draw[b] (4) to (3); \draw[map] (1) to (0); \draw[map] (0) to (3); \draw[map] (1) to (2); \draw[map] (2) to (4); \draw[map] (4) to (3); \node (x) at (-0.5, 1.5) {\contour{white}{$f_c$}}; \node (x) at (-3, 2.3) {\contour{white}{$e_+$}}; \node (x) at (-2.9, 0.5) {\contour{white}{$e_-$}}; \node (x) at (-1.5, -0.8) {\contour{white}{$m^{c,=}$}}; \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=below right:\contour{white}{$c_+$}] (0) at (-2, 3) {}; \node [style=vertex] (1) at (-3.25, 1.5) {}; \node [style=vertex, label=above right:\contour{white}{$c_-$}] (2) at (-2, -0) {}; \node [style=vertex] (3) at (0.5, 2.5) {}; \node [style=vertex] (4) at (0, 0.5) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \begin{scope} \clip (2.center) to (4.center) to (3.center) to (0.center) to (2.center); \draw[draw=red, fill=red!20] (0) circle (15pt); \draw[draw=red, fill=red!20] (1) circle (15pt); \draw[draw=red, fill=red!20] (2) circle (15pt); \end{scope} \draw[b] (0) to (3); \draw[b] (1) to (2); \draw[b] (2) to (4); \draw[b] (4) to (3); \draw[b] (0) to (2); \draw[map] (0) to (3); \draw[map] (1) to (2); \draw[map] (2) to (4); \draw[map] (4) to (3); \draw[map] (0) to (2); \node (x) at (-0.5, 1.5) {\contour{white}{$f_c$}}; \node (e=) at (-1.7, 1.5) {\contour{white}{$e_=$}}; \node (x) at (-2.9, 0.5) {\contour{white}{$e_-$}}; \node (x) at (-1.5, -0.8) {\contour{white}{$m^{c,+}$}}; \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=below right:\contour{white}{$c_+$}] (0) at (-2, 3) {}; \node [style=vertex] (1) at (-3.25, 1.5) {}; \node [style=vertex, label=above right:\contour{white}{$c_-$}] (2) at (-2, -0) {}; \node [style=vertex] (3) at (0.5, 2.5) {}; \node [style=vertex] (4) at (0, 0.5) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \begin{scope} \clip (2.center) to (4.center) to (3.center) to (0.center) to (2.center); \draw[draw=red, fill=red!20] (0) circle (15pt); \draw[draw=red, fill=red!20] (1) circle (15pt); \draw[draw=red, fill=red!20] (2) circle (15pt); \end{scope} \draw[b] (1) to (0); \draw[b] (0) to (3); \draw[b] (2) to (4); \draw[b] (4) to (3); \draw[b] (0) to (2); \draw[map] (1) to (0); \draw[map] (0) to (3); \draw[map] (2) to (4); \draw[map] (4) to (3); \draw[map] (0) to (2); \node (x) at (-0.5, 1.5) {\contour{white}{$f_c$}}; \node (e=) at (-1.7, 1.5) {\contour{white}{$e_=$}}; \node (x) at (-3, 2.3) {\contour{white}{$e_+$}}; \node (x) at (-1.5, -0.8) {\contour{white}{$m^{c,-}$}}; \end{pgfonlayer} \end{tikzpicture} \caption{\label{edge rotation}The three maps of the form $m^{c,s}$ as constructed from $m\in \sM_n$.} \end{figure} We can naturally identify the edge $e_s$ in $m$ with the ``rotated edge'' $e_=$ in $m^{c,s}$ (when $s\in\{+,-\}$) and thus have a natural identification between edges of $m$ and edges of $m^{c,s}$. Faces and vertices cannot be as readily identified between $m$ and $m^{c,s}$, because the number of faces and vertices may increase or decrease; and, even though the number of corners remains unchanged after an edge rotation, defining a 1-to-1 correspondence is not entirely canonical, although there is one that is compatible with our choice of the rerooting, in the sense that it allows us to interpret the new choice of the root corner as ``leaving it unchanged''. Corners other than those involving the vertices of $c,c_-,c_+$ are of course untouched, and will be denoted by the same symbols in $m$ and $m^{c,s}$. If $s\in\{-,+\}$, then we shall identify $c_-$ and $c_+$ with the two (not necessarily distinct) corners joined by the newly drawn edge $e_=$ in the face lying directly to the right of $e_=$, oriented from $c_-$ to $c_+$ (again, see Figure~\ref{edge rotation}). Notice that, if $s=+$, then the number of corners around the vertex $v_+$ of $c_+$ is unchanged; if those corners were $c_+,c_1,\ldots,c_k$ in clockwise order around $v_+$, starting with $c_+$ in the map $m$, we will identify them with the $k+1$ corners around the vertex of $c_+$ in $m^{c,s}$, having already identified $c_+$, by just keeping the same order. The dynamic on maps we shall be considering throughout this paper is given by a Markov chain $\mathcal{R}^n$ on $\sM_n$ which is such that, assuming $\mathcal{R}^n_k=m$ for some $m\in\sM_n$, we have $\mathcal{R}^n_{k+1}=m^{c,s}$, where $c$ and $s$ are independent random variables, $s$ being uniformly distributed in $\{=,+,-\}$ and $c$ being a corner of $m$ other than its root corner, chosen uniformly at random; in other words, transitions probabilities for $\mathcal{R}^n$ are of the form \begin{equation}p_\mathcal{R}(m,m')=\frac{1}{3(2n-1)}\sum_{c\in C(m)\setminus \rho}\left(1_{m'=m^{c,+}}+1_{m'=m^{c,-}}+1_{m'=m}\right),\label{R^n transitions}\end{equation} where $C(m)$ is the set of all corners of $m$ and $\rho$ is its root corner. \begin{lemma} The Markov chain $\mathcal{R}^n$ is reversible, aperiodic and irreducible. \end{lemma} \begin{proof} The first two properties are clear by construction (they can be inferred immediately from expression \eqref{R^n transitions} for the transition probabilities). As for irreducibility, we shall show that every map $m\in\sM_n$ can be turned into the map $m_0$ made of $n$ nested loops, rooted in the corner within the central loop, via a sequence of edge rotations. Given $m\in\sM_n$, consider the face $f_\rho$ containing the root corner $\rho$ of $m$. Suppose it has clockwise contour $\rho,c_1,\ldots,c_k$, with $k\geq 1$: by considering the edge-rotated map $m^{c_1,-}$ we can reduce the degree of $f_\rho$ by 1 (by which we mean the the face containing the root corner in $m^{c_1,-}$ has degree $k$ rather than $k+1$). We can therefore reduce $m$, via a sequence of edge rotations, to a map whose root corner lies within a loop (i.e.~such that the root edge is a loop). Now, given any map $\tilde{m}$ such that the root edge is a loop, consider the first corner $c$ in counterclockwise order around the origin, starting with the root corner $\rho$, such that $c$ lies within a face $f_c$ of degree strictly more than 2, whose clockwise contour we will call $c,c_1,\ldots,c_k$ (with $k>1$). Taking the map $\tilde{m}^{c_1,-}$ decreases the degree of the face $f_c$ by 1: repeating this operation yields a map such that the root edge is a loop and all corners around the origin lie within faces of degree 1 or 2. Such a map can only be $m_0$: if one draws it on the plane in such a way that the root corner lies within the infinite face, so that the root edge is an ``external'' loop, one finds that the finite face adjacent to it is either a degree 1 face -- in which case the map has only one edge -- or has degree 2, in which case its boundary is completed by one ``internal'' loop; repeating this argument inductively identifies the map as $m_0$. \end{proof} \section{From edge rotations on maps to edge flips on quadrangulations}\label{sec:from rotations to flips} We now wish to relate our edge rotation dynamic on planar maps to the Markov chain of edge flips on quadrangulations as introduced in~\cite{CS2019} -- or rather, to a slight variant thereof. The edge flip Markov chain $\F^n$ on the set $\sQ_n$ was introduced in \cite{CS2019} as a chain whose steps consist in, given a quadrangulation, selecting one of its edges uniformly at random and then making an independent uniform choice among the following three options: leaving it unchanged, flipping it clockwise or flipping it counterclockwise. The choice of the root edge was allowed and flipping the root edge would preserve its orientation. \begin{figure}[t]\centering \begin{minipage}{7cm}\begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-4, 3) {}; \node [style=vertex] (1) at (-4, 4) {}; \node [style=vertex] (2) at (-3, 4) {}; \node (x) at (-3,3.5) {\contour{white}{$e$}}; \node [style=vertex] (3) at (-2, 4) {}; \node [style=vertex] (4) at (-2, 3) {}; \node [style=vertex] (5) at (-3, 3) {}; \node [style=vertex] (6) at (-0.5, 4) {}; \node [style=vertex] (7) at (0.5, 5) {}; \node [style=vertex] (8) at (1.5, 4) {}; \node [style=vertex] (9) at (0.5, 4) {}; \node [style=vertex] (10) at (-0.5, 5) {}; \node [style=vertex] (11) at (1.5, 5) {}; \node [style=vertex] (12) at (0.5, 3) {}; \node [style=vertex] (13) at (1.5, 2) {}; \node [style=vertex] (14) at (0.5, 2) {}; \node [style=vertex] (15) at (-0.5, 3) {}; \node [style=vertex] (16) at (-0.5, 2) {}; \node [style=vertex] (17) at (1.5, 3) {}; \node [] (30) at (-1.5, 3.5) {$q$}; \node [] (33) at (2.25, 4.5) {$q^{e,+}$}; \node [] (34) at (2.25, 2.5) {$q^{e,-}$}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [thick, bend left, black!30] (-1.4,3.85) to (-0.75,4.5); \draw [thick, bend right, black!30] (-1.4,3) to (-0.75,2.5); \draw [very thick] (0) to (1); \draw [very thick] (1) to (2); \draw [very thick] (2) to (3); \draw [very thick] (3) to (4); \draw [very thick] (4) to (5); \draw [very thick] (5) to (0); \draw [very thick, red] (5) to (2); \draw [very thick] (6) to (10); \draw [very thick] (10) to (7); \draw [very thick] (7) to (11); \draw [very thick] (11) to (8); \draw [very thick] (8) to (9); \draw [very thick] (9) to (6); \draw [blue, very thick, dashed] (9) to (7); \draw [very thick, red] (6) to (11); \draw [very thick] (16) to (15); \draw [very thick] (15) to (12); \draw [very thick] (12) to (17); \draw [very thick] (17) to (13); \draw [very thick] (13) to (14); \draw [very thick] (14) to (16); \draw [very thick, red] (13) to (15); \draw [blue, very thick, dashed] (14) to (12); \end{pgfonlayer} \end{tikzpicture}\end{minipage}\quad \begin{minipage}{6cm} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-1.5, -1) {}; \node [style=vertex] (1) at (-1.5, -0.25) {}; \node [style=vertex, label=right:$v$] (2) at (-1.5, 0.5) {}; \node [style=vertex] (3) at (0.75, -1) {}; \node [style=vertex, label=right:$v$] (4) at (0.75, 0.5) {}; \node [style=vertex] (5) at (0.75, -0.25) {}; \node [] (w) at (1.1, -0.25) {$w$}; \node [] (w) at (-1.15, -0.25) {$w$}; \node [] (6) at (-2.5, -0.25) {$q$}; \node [] (7) at (2.5, -0.25) {$q^{e,+}=q^{e,-}$}; \node (x) at (-1.5,-0.65) {\contour{white}{$e$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [thick, ->, bend left, black!30] (-0.75,-0.25) to (0,-0.25); \draw [very thick, bend left=60, looseness=1.25] (0) to (2); \draw [very thick, bend right=60, looseness=1.25] (0) to (2); \draw [very thick, red] (0) to (1); \draw [very thick, bend left=60, looseness=1.25] (3) to (4); \draw [very thick, bend right=60, looseness=1.25] (3) to (4); \draw [very thick, red] (5) to (4); \draw [very thick, blue, dashed] (5) to (3); \end{pgfonlayer} \end{tikzpicture}\end{minipage} \caption{\label{fig:flips}Clockwise and counterclockwise flips for a simple and a double edge in a quadrangulation.}\end{figure} More formally, given a quadrangulation $q\in\sQ_n$ and an edge $e$ of $q$, we denote by $q^{e,+}$ (resp.~$q^{e,-}$), \emph{the quadrangulation obtained from $q$ by flipping edge $e$ clockwise} (resp.~\emph{counterclockwise}), by which we mean the quadrangulation given by the following procedure: \begin{itemize} \item if $e$ is adjacent to two distinct faces of $q$, erase $e$ from $q$ (thus obtaining a new face with exactly 6 corners) and replace it with the edge obtained by rotating $e$ clockwise (resp. counterclockwise) by one corner (see Figure~\ref{fig:flips}). \item if $e$ is an internal edge within a degenerate face, let $v$ be the vertex of that face that is \emph{not} an endpoint of $e$ and let $w$ be the endpoint of $e$ having degree 1; erase $e$ and replace it with an edge within the same face having endpoints $v,w$. If $e$ is the root edge of $q$, let the newly drawn edge be the root of $q^{e,+}$ (resp.~$q^{e,-}$), oriented in the same way as before (with respect to $w$).\end{itemize} The edge flip Markov chain as originally described has transition probabilities $$p_\F(q,q')=\frac{1}{6n}\sum_{e\in E(q)}\left(1_{q'=q^{e,+}}+1_{q'=q^{e,-}}+1_{q=q'}\right).$$ In order to directly relate a dynamic on maps to edge flips on quadrangulations, however, one is led to consider a variant of the chain $\F^n$ that does not allow flipping the root edge. Indeed, the Tutte bijection $\Phi$ assigns very different roles to quadrangulation vertices at even and odd distance from the origin: since a root flip (at least as described) would change the parity of the distance to the origin for each vertex in the quadrangulation, the two maps corresponding to the quadrangulation before and after the flip are potentially completely different from each other. It therefore becomes necessary to redefine or completely eliminate root edge flips from the chain $\F^n$; in particular, we shall from here on consider a new edge flip Markov chain where the choice of the edge to flip is uniform \emph{among all edges other than the root edge}. We shall still refer to this as \emph{the edge flip} Markov chain on $\sQ_n$ and we shall denote it by $\FF^n$; its transition probabilities are of the form $$p_{\FF}(q,q')=\frac{1}{3(2n-1)}\sum_{e\in E(q)\setminus \rho}\left(1_{q'=q^{e,+}}+1_{q'=q^{e,-}}+1_{q=q'}\right),$$ where $\rho$ is the root edge of $q$. \begin{figure}[t]\centering \begin{minipage}{7cm}\begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, fill=red] (0) at (-4, 3) {}; \node [style=vertex] (1) at (-4, 4) {}; \node [style=vertex, fill=red] (2) at (-3, 4) {}; \node [style=vertex] (3) at (-2, 4) {}; \node [style=vertex, fill=red] (4) at (-2, 3) {}; \node [style=vertex] (5) at (-3, 3) {}; \node [style=vertex, fill=red] (6) at (-0.5, 4) {}; \node [style=vertex, fill=red] (7) at (0.5, 5) {}; \node [style=vertex, fill=red] (8) at (1.5, 4) {}; \node [style=vertex] (9) at (0.5, 4) {}; \node [style=vertex] (10) at (-0.5, 5) {}; \node [style=vertex] (11) at (1.5, 5) {}; \node [style=vertex, fill=red] (12) at (0.5, 3) {}; \node [style=vertex, fill=red] (13) at (1.5, 2) {}; \node [style=vertex] (14) at (0.5, 2) {}; \node [style=vertex] (15) at (-0.5, 3) {}; \node [style=vertex, fill=red] (16) at (-0.5, 2) {}; \node [style=vertex] (17) at (1.5, 3) {}; \node [] (30) at (-1.5, 3.5) {$q$}; \node [] (33) at (2.25, 4.5) {$q^{e,+}$}; \node [] (34) at (2.25, 2.5) {$q^{e,-}$}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [thick, bend left, black!30] (-1.4,3.85) to (-0.75,4.5); \draw [thick, bend right, black!30] (-1.4,3) to (-0.75,2.5); \draw [red] (0) to (2); \draw [red] (2) to (4); \draw [red, dashed] (8) to (7); \draw [red] (7) to (6); \draw [red, bend right=20] (8) to (6); \draw [red, dashed] (12) to (16); \draw [red] (12) to (13); \draw [red, bend right=20] (13) to (16); \draw [very thick] (0) to (1); \draw [very thick] (1) to (2); \draw [very thick] (2) to (3); \draw [very thick] (3) to (4); \draw [very thick] (4) to (5); \draw [very thick] (5) to (0); \draw [very thick, blue] (5) to (2); \draw [very thick] (6) to (10); \draw [very thick] (10) to (7); \draw [very thick] (7) to (11); \draw [very thick] (11) to (8); \draw [very thick] (8) to (9); \draw [very thick] (9) to (6); \draw [blue, very thick, dashed] (9) to (7); \draw [very thick, blue] (6) to (11); \draw [very thick] (16) to (15); \draw [very thick] (15) to (12); \draw [very thick] (12) to (17); \draw [very thick] (17) to (13); \draw [very thick] (13) to (14); \draw [very thick] (14) to (16); \draw [very thick, blue] (13) to (15); \draw [blue, very thick, dashed] (14) to (12); \end{pgfonlayer} \end{tikzpicture}\end{minipage}\quad \begin{minipage}{6cm} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, fill=red] (0) at (-1.5, -1) {}; \node [style=vertex] (1) at (-1.5, -0.25) {}; \node [style=vertex] (2) at (-1.5, 0.5) {}; \node [style=vertex, fill=red] (3) at (0.75, -1) {}; \node [style=vertex] (4) at (0.75, 0.5) {}; \node [style=vertex, fill=red] (5) at (0.75, -0.25) {}; \node [] (6) at (-2.5, -0.25) {$q$}; \node [] (7) at (2.5, -0.25) {$q^{e,+}=q^{e,-}$}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw[red, looseness=20, out=60, in=120] (0) to (0); \draw[red, bend right=30] (3) to (5); \draw [thick, ->, bend left, black!30] (-0.75,-0.25) to (0,-0.25); \draw [very thick, bend left=60, looseness=1.25] (0) to (2); \draw [very thick, bend right=60, looseness=1.25] (0) to (2); \draw [very thick, blue] (0) to (1); \draw [very thick, bend left=60, looseness=1.25] (3) to (4); \draw [very thick, bend right=60, looseness=1.25] (3) to (4); \draw [very thick, blue] (5) to (4); \draw [very thick, blue, dashed] (5) to (3); \end{pgfonlayer} \end{tikzpicture}\end{minipage} \caption{\label{fig:flips to edge rotations}Clockwise and counterclockwise flips for a simple and a double edge in a quadrangulation.}\end{figure} \begin{proposition}\label{prop:from rotations to flips} Given a quadrangulation $q\in\sQ_n$ with root edge $\rho$, an edge $e\in E(q)\setminus\rho$ and $s\in\{+,-\}$, we have $\Phi(q^{e,s})=\Phi(q)^{c,s}$, where $\Phi$ is the Tutte bijection from Section~\ref{sec:trivial bijection} and $c$ is the corner of $\Phi(q)$ that corresponds to the edge $e$ of $q$. \end{proposition} \begin{proof} Consider the case where $e$ is not an internal edge within a degenerate face, but rather is adjacent to two distinct faces of $q$, within each of which a map edge is drawn by the construction $\Phi$. Orient the edge $e$ away from its endpoint at even distance from the origin and let $f_-$ be the face lying to its right and $f_+$ the one lying to its left. If we take $c$ to be the corner of $\Phi(q)$ that the edge $e$ is issued from, it should be clear that the \emph{map} edges $e_-$ and $e_+$ constructed as a function of $c$ in Section~\ref{sec:edge rotations} correspond to quadrangulation faces $f_-$ and $f_+$ respectively. Now consider for example the edge-flipped quadrangulation $q^{e,+}$; it is clear that, since $e$ is not the root edge, the parity of distances from the origin is unchanged. The endpoints of $e_-$ are therefore still ``real vertices'' which need to be joined by a map edge lying within the quadrangular face next to the flipped edge $e$: we can draw $e_-$ exactly as before. This is in contrast to the edge $e_+$, which would now cross the flipped edge $e$, and therefore needs to be erased. The edge that replaces $e_+$ is an edge $e_=$ that would form a triangle containing $c$, along with $e_-$ and $e_+$, in the original map (left part of Figure~\ref{fig:flips to edge rotations}). Furthermore, notice that the fact that the root edge is unchanged in $q^{e,s}$ implies that the root corner of $\Phi(q^{e,s})$ must still be the one that the quadrangulation root edge is issued from. In order for this to be true in the non-trivial cases where the root corner of $\Phi(q)$ is ``split'' by the addition of $e_=$, the root corner must become the part of the corner lying outside the $e_-,e_+,e_=$ triangle, exactly as described in Section~\ref{sec:edge rotations}. This shows that $\Phi(q^{e,s})=\Phi(q)^{c,s}$ when $e$ is not an internal edge within a degenerate face and $s=+$ (including the case where $e_=$ ends up being a loop, which one can see arise in the situation depicted in Figure~\ref{fig:flips to edge rotations} when edges on the boundary of $f_+$ and $f_-$ are identified); the case of $s=-$ is identical. Now consider the case where the endpoint $u$ of $e$ at odd distance from the origin has degree 1 in $q$. This corresponds to its degenerate face having two face vertices and one real vertex, and a map loop edge ($e_-=e_+$) being drawn within it by the construction $\Phi$. In this case, we know that $q^{e,s}$, for $s=\pm$, is the quadrangulation that replaces $e$ with an edge drawn between $u$ and the other vertex on the external boundary of the degenerate face. It is immediately apparent that $\Phi(q^{e,s})$ is, indeed, the map which replaces the loop $e_-=e_+$ with an edge $e_=$ having a brand new vertex as an endpoint, which is $\Phi(q)^{c,s}$. The rooting poses no real issues, since $e$ cannot be the root edge of $q$ and the identification of corners between $\Phi(q)$ and $\Phi(q^{e,s})$ is clear. Finally, the case where the endpoint of $e$ at \emph{even} distance from the root has degree 1 in $q$ is precisely the inverse of the one above. \end{proof} We have thus shown that the two Markov chains ${\FF}^n$ and $\mathcal{R}^n$ are isomorphic; in particular, they have the same relaxation and mixing time. The main result in \cite{CS2019} consisted in the following bounds for the spectral gap of the Markov chain $\F_n$: \begin{theorem*}[C., Stauffer] Let $\gamma_n$ be the spectral gap of the edge flip Markov chain $\F_n$ on the set $\sQ_n$ of rooted quadrangulations with $n$ faces. There are positive constants $C_1,C_2$ independent of $n$ such that $$C_1n^{-\frac{11}{2}}\leq \gamma_n\leq C_2n^{-\frac54}.$$ Consequently, the mixing time for $\F_n$ is $O(n^{13/2})$. \end{theorem*} While the upper bound above for the spectral gap of $\F_n$ immediately yields a lower bound for the relaxation time of ${\FF}^n$ and therefore $\mathcal{R}^n$, an upper bound for the relaxation time of ${\FF}^n$ cannot trivially be gleaned from \cite{CS2019}. The rest of this paper will therefore be devoted to analysing the chain ${\FF}^n$ to obtain an upper bound which applies to the edge rotation Markov chain. Though the general strategy is not dissimilar to the one employed in \cite{CS2019}, some ad hoc constructions and ideas will be necessary; as a result, we will have a partially new proof of an upper bound for the relaxation time of the original chain $\F^n$ which (mostly) does not rely on the Cori-Vanquelin-Schaeffer correspondence with plane trees, and should therefore be better suited for further generalisations. \section{Growing quadrangulations uniformly at random}\label{sec:growth algorithm} Consider the following operation which, given a quadrangulation $q\in\sQ_n$ (with $n>1$) and a corner $c$ of $q$, yields a quadrangulation $\coll{q,c}$ in $\sQ_{n-1}$. If the face $f$ of $q$ containing $c$ has $4$ distinct vertices and $c,c_1,c_2,c_3$ is a clockwise contour of $f$, then ``collapse'' $f$ by identifying the edge joining $c$ to $c_1$ with the one joining $c$ to $c_3$ and the edge joining $c_1$ to $c_2$ with the one joining $c_3$ to $c_2$ as in Figure~\ref{fig:collapse a face}, thus identifying the vertices of corners $c_1$ and $c_3$. If $f$ has fewer than $4$ distinct vertices then it has exactly $3$, one of which is adjacent to two corners $c_1, c_3$ of $f$, where $c_1,c_2,c_3,c_4$ is a clockwise contour; in this case, whatever $c$, identify the edge joining $c_1$ to $c_2$ with the edge joining $c_4$ to $c_1$ and the edge joining $c_2$ to $c_3$ with the edge joining $c_3$ to $c_4$, thus also identifying the vertices of $c_2$ and $c_4$. Note that the latter procedure applies to the case of $f$ being a degenerate face (lower part of Figure~\ref{fig:collapse a face}). If the root corner does not belong to $f$, it is simply preserved; if it belongs to $f$, then we root the quadrangulation $\coll{q,c}$, in such a way that the root edge is the collapsed image of the original root edge, oriented as before. We shall say that two quadrangulations $q\in\sQ_n$ and $q'\in\sQ_{n-1}$ \emph{differ by collapsing a face} if there is a corner $c$ of $q$ such that $q'=\coll{q,c}$. \begin{figure}\centering \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-1.5, -0) {}; \node [style=vertex] (1) at (0, 1) {}; \node [style=vertex] (2) at (1.5, -0) {}; \node [style=vertex] (3) at (0, -1) {}; \node (f) at (0,0) {\contour{white}{$f$}}; \node [style=vertex] (0b) at (3.5, -0) {}; \node [style=vertex] (1b) at (5, 0) {}; \node [style=vertex] (2b) at (6.5, -0) {}; \node [] (->) at (2.5, 0) {$\rightsquigarrow$}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \begin{scope} \clip (1.center) to (2.center) to (3.center) to (0.center) to (1.center); \draw[draw=red, fill=red!20] (0) circle (15pt); \end{scope} \draw[<->, bend left] (-0.7,0.45) to (-0.7,-0.45); \draw[<->, bend right] (0.7,0.45) to (0.7,-0.45); \draw[quad] (0) to (1) to (2) to (3) to (0); \draw[quad, very thick,->] (3) to (2); \draw[dashed] (1) to (3); \draw[quad, very thick] (0b) to (1b) [->] to (2b); \end{pgfonlayer} \end{tikzpicture}\\[5pt] \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-1.5, -0) {}; \node [style=vertex] (1) at (0, 0) {}; \node [style=vertex] (2) at (1.5, -0) {}; \node (f) at (0.75,0) {\contour{white}{$f$}}; \node [style=vertex] (0b) at (3.5, -0) {}; \node [style=vertex] (2b) at (6.5, -0) {}; \node [] (->) at (2.5, 0) {$\rightsquigarrow$}; \node [style=vertex] (0c) at (8.5, -0) {}; \node [style=vertex] (1c) at (10, 0) {}; \node [style=vertex] (2c) at (11.5, -0) {}; \node (fc) at (10.8,0) {\contour{white}{$f$}}; \draw (9.8,0.2) to (10.2,-0.2); \draw (10.2,0.2) to (9.8,-0.2); \node [] (<-) at (7.5, 0) {$\leftsquigarrow$}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \begin{scope} \clip[bend left=45] (0.center) to (2.center) [bend left=0] to (0.center); \draw[draw=red, fill=red!20] (0) circle (15pt); \end{scope} \draw[<->, bend left=10] (-0.7,0.45) to (-0.6,0.05); \draw[<->, bend right=10] (-0.7,-0.45) to (-0.6,-0.05); \draw[quad, bend left=45] (0.center) to (2.center); \draw[quad, bend left=45, very thick, <-] (2) to (0); \draw[quad] (0) to (1); \draw[dashed] (1) to (2); \draw[quad, very thick,->] (0b) to (2b); \draw[draw=red, fill=red!20] (1c) circle (12pt); \draw[<->, bend right] (10.7,0.45) to (10.7,-0.45); \draw[quad, bend left=45] (0c.center) to (2c.center) to (0c.center); \draw[quad, very thick, ->] (0c) to (1c); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:collapse a face}Collapsing a face in a quadrangulation.} \end{figure} What we need is a ``hierarchy'' like the one described for coloured plane trees in Section 5 of \cite{CS2019}, but for quadrangulations, where the adjacency condition of differing by erasing a leaf is replaced by the one given by collapsing faces. What we wish to produce is a collection of mappings $g_n:\sQ_n\times \sQ_{n-1}\to \mathbb{R}_{\geq 0}$ with the following properties: \begin{itemize} \item[(i)] $g_n(q,q')=0$ if $q'$ cannot be obtained from $q$ by collapsing a face; \item[(ii)] $\displaystyle\sum_{q'\in\sQ_{n-1}}g_n(q,q')=1$ for all $q$ in $\sQ_n$; \item[(iii)] $\displaystyle\sum_{q\in\sQ_n}g_n(q,q')=\frac{|\sQ_n|}{|\sQ_{n-1}|}$ for all $q'$ in $\sQ_{n-1}$. \end{itemize} Such a collection of mappings $g_n$ can be built explicitly from the mappings $f_n$ given in Section~5 of \cite{CS2019}. In order to do this, we need to briefly recall some notation and standard results. \begin{df} A \emph{labelled tree} is a plane tree $t$ (i.e.~a rooted planar map with a single face) endowed with a labelling $l:V(t)\to \mathbb{Z}$ such that \begin{itemize} \item if $\emptyset$ is the origin of $t$, $l(\emptyset)=0$; \item for any vertex $v\in V(t)\setminus\{\emptyset\}$, $|l(v)-l(p(v))|\in \{1,-1,0\}$, where $p(v)$ denotes the parent of $v$. \end{itemize} We shall call $\LT_n$ the set of all labelled trees with $n$ edges, and conventionally set $\LT_0=\{\bullet\}$ to be the set containing the graph with a single vertex labelled 0. \end{df} We shall also write $\sQ_n^\bullet$ for the set of all pairs $(q,\delta)$, where $q\in\sQ_n$ and $\delta\in V(q)$, i.e.~for the set of all \emph{pointed} (rooted) quadrangulations of the sphere with $n$ faces. We shall conventionally define the set $\sQ_0=\{\rightarrow\}$ as the one containing a rooted planar map with a single edge and two distinct vertices; as a consequence, $\sQ_0^\bullet$ has two elements. Also by convention, but consistently with our previous definition, we shall set $\coll{q,c}$, where $c$ is any corner in a quadrangulation $q\in\sQ_1$, to be the ``root-only map'' $\rightarrow\in\sQ_0$. Labelled trees (and pointed quadrangulations) will be useful thanks to the Cori-Vanquelin-Schaeffer correspondence (see~\cite{Sch98}), which is an explicit bijective construction $\phi:\LT_n\times\{-1,1\}\to\sQ_n^\bullet$ transforming tree labels into quadrangulation graph distances: given $t\in\LT_n$ and $\epsilon\in\{-1,1\}$, the mapping $\phi$ naturally induces an identification between vertices of $t$ and vertices of $\phi(t,\epsilon)$ other than the distinguished vertex such that, if $l$ is the labelling of $t$, we have $l(v)=d_{\mathrm{gr}}(v,\delta)-d_{\mathrm{gr}}(\delta,\emptyset)$, where $v$ is interpreted as a vertex of $t$ in the left hand side of the equation and as a vertex of $\phi(t,\epsilon)$ in the right hand side, $\emptyset$ is the origin of $\phi(t,\epsilon)$ and $\delta$ its distinguished vertex, and $d_{\mathrm{gr}}$ is the graph distance on the vertex set of $\phi(t,\epsilon)$. In Section~5 of \cite{CS2019} we provided a collection of maps $f_n:\LT_n\times\LT_{n-1}\to\mathbb{R}$ with the exact properties stated for $g_n$ above, where every instance of $\sQ_k$ is replaced by $\LT_k$ and (i) is replaced by \begin{itemize} \item[(i)] $f_n(t,t')=0$ if $t'$ cannot be obtained from $t$ by erasing a leaf. \end{itemize} In particular, we showed that such properties hold for the collection of maps constructed recursively as follows: \begin{itemize} \item if $(t,t')\in\LT_n\times\LT_{n-1}$ do not differ by erasing a leaf, $f_n(t,t')=0$; \item if $(t,t')\in\LT_1\times\LT_{0}$, set $f_1(t,t')=1$; \item if $(t,t')\in\LT_n\times\LT_{n-1}$, where $n>1$, differ by erasing a leaf, consider the subtrees $L(t),L(t')$ containing the leftmost child of the root vertex and its descendants in $t,t'$ respectively; if $|L(t)|=i$ and $|L(t')|=i-1$ for some $i>0$, set $$f_n(t,t')=\frac{i(i+1)(3n-2i-1)}{(n-1)n(n+1)}f_i(L(t),L(t'));$$ otherwise set $R(t)$, $R(t')$ to be the trees obtained by erasing $L(t), L(t')$ from $t,t'$ (as well as the edge joining the root vertex to its leftmost child); we then have $|R(t)|=|R(t')|+1=i$ for some $i>0$ and we set $$f_n(t,t')=\frac{i(i+1)(3n-2i-1)}{(n-1)n(n+1)}f_i(R(t),R(t')).$$ \end{itemize} The main reason why the collection of mappings $f_n$ can be used to construct mappings $g_n$ which satisfy the properties we require is the following: \begin{lemma}\label{leaf erasing to face collapsing} If $(t,t')\in\LT_n\times\LT_{n-1}$, $\epsilon=\pm 1$ and $f_n(t,t')>0$, then $F(\phi(t',\epsilon))$ is obtained from $F(\phi(t,\epsilon))$ by collapsing a face, where $F:\bigcup_{i\geq0}\sQ_i^\bullet\rightarrow\bigcup_{i\geq0}\sQ_i$ is the mapping which forgets the distinguished vertex. \end{lemma} \begin{figure}\centering \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=left:$a$] (0) at (0, 0) {}; \node [style=vertex, label=above:$a$] (1) at (0, 1) {}; \node [style=vertex, label=right:$a-1$] (2) at (2, 0.5) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw[line width=2pt, brown] (0) to (1); \draw[quad, out=120, looseness=2.8] (0) to (2); \draw[quad, bend left=10] (1) to (2); \draw[quad, out=40, in=180, looseness=1] (0) to (2); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=left:$a$] (0) at (0, 0) {}; \node [style=vertex, label=above:$a+1$] (1) at (0, 1) {}; \node [style=vertex, label=right:$a-1$] (2) at (2, 0.5) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw[line width=2pt, brown] (0) to (1); \draw[quad, out=120, looseness=3] (0) to (2); \draw[quad, bend left=25] (1) to (0); \draw[quad, out=40, in=180, looseness=1] (0) to (2); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=left:$a$] (0) at (0, 0) {}; \node [style=vertex, label=above:$a-1$] (1) at (0, 1) {}; \node [style=vertex, label=below:$a-1$] (2) at (1.7, 0.5) {}; \node [style=vertex, label=right:$a-2$] (3) at (2.5, 0.5) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw[line width=2pt, brown] (0) to (1); \draw[quad, bend left] (1) to (3); \draw[quad, bend left=10] (0) to (2); \draw[quad, bend left] (0) to (1); \draw[quad, bend left] (2) to (3); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:erasing leaves to collapsing faces}Erasing a leaf (i.e.~a degree 1 vertex $v$ and the edge $(v,p(v))$ joining it to its parent) from a labelled tree $t\in\LT_n$, whatever the labels, corresponds to collapsing the face built around the edge $(v,p(v))$ in the pointed quadrangulation $\Phi(t,\epsilon)$.} \end{figure} \begin{proof} The proof does of course rely on the specific definition of $\phi$ (and is the only part of this paper that does). The quadrangulation $\phi(t,\epsilon)$ can be drawn using the vertex set of $t$ and an added vertex $\delta$ as follows: consider a counterclockwise (cyclic) contour $c_1,\ldots,c_{2n}$ of the one face of $t$; for each $i$, draw a quadrangulation edge joining $c_i$ to its ``target'' corner, which we will take to be the next corner in the contour whose vertex has strictly smaller label than the vertex of $c_i$, or the corner around $\delta$ if the label of the vertex that $c_i$ belongs to is minimal. Suppose $t'$ is obtained from $t$ by erasing a leaf $v$ and the edge $(v,p(v))$. If $l(v)=l(p(v))$ or $l(v)=l(p(v))+1$, then the the two quadrangulation edges issued from the corner of $t$ right before the one around $v$ and the one right after $v$ have the same ``target'' corner and enclose a degenerate face of the quadrangulation $\phi(t,\epsilon)$ (see Figure~\ref{fig:erasing leaves to collapsing faces}). Erasing $v$ collapses those two edges into a single edge; targets for corners other than the one around $v$ (which is eliminated) are unaffected. Furthermore, there is no issue with the rooting: $\phi(t,\epsilon)$ is rooted in the edge issued by the root corner of $t$, with an orientation given by $\epsilon$: such an edge does correspond to the edge issued from the root corner of $t'$. If $l(v)<l(p(v))$, then the matter slightly more complicated. The contour of $t'$ has two fewer corners than the contour of $t$: the quadrangulation edges $e_1$ and $e_2$ issued from the corner before $v$ and the corner around $v$ are eliminated. Let $c$ be the target corner of the corner immediately \emph{after} $v$, which must be around a vertex labelled $l(v)$. Suppose $c$ is \emph{not} the corner of $v$; then all corners having the corner of $v$ as a target in $t$ have $c$ as a target in $t'$: equivalently, all edges adjacent to $v$ in $\phi(t,\epsilon)$ become adjacent to the vertex of $c$ in $\phi(t',\epsilon)$. Eliminating edges $e_1,e_2$ and rerouting all edges adjacent to $v$ to the vertex of $c$ exactly amounts to collapsing the quadrangulation face which encloses the tree edge $(v,p(v))$. If $\tilde{c}$ is the \emph{quadrangulation} corner in $\phi(t,\epsilon)$ corresponding to the edge $e_1$, oriented towards $v$, the quadrangulation $F(\phi(t',\epsilon))$ is $\coll{F(\phi(t,\epsilon)),\tilde{c}}$ (again, the rooting is correctly preserved). If $c$ is the corner around $v$, then $l(v)$ is minimal and $v$ is the unique vertex carrying label $l(v)$; in that case, the face enclosing the edge $(v,p(v))$ is again degenerate and contains the vertex $\delta$, which is the furthest one from the origin in the quadrangulation $\phi(t,\epsilon)$. In this case, the quadrangulation $\phi(t',\epsilon)$ can be obtained from $t$ and $\phi(t,\epsilon)$ by simply eliminating the original pointed vertex $\delta$ from $\phi(t,\epsilon)$, erasing the tree edge $(v,p(v))$ and renaming vertex $v$ to $\delta$: that way, all one needs to do is erase the two quadrangulation edges that were drawn from the corner of $v$ and from the corner after $v$, which amounts to collapsing the degenerate face that corresponded to the tree edge $(v,p(v))$. The quadrangulation $\phi(t',\epsilon)$ also has its pointing ``moved'' (which is natural, since $\phi(t,\epsilon)$ was pointed in a vertex within the face to be collapsed), but this has no bearing on $F(\phi(t,\epsilon))$. \end{proof} \begin{lemma} The collection of mappings $g_n:\sQ_n\times\sQ_{n-1}\to\mathbb{R}$ defined as $$g_n(q,q')=\frac{1}{n+2}\sum_{v\in V(q)}\sum_{v'\in V(q')}1_{\epsilon_{q,v}=\epsilon_{q',v'}}f_n(t_{q,v},t_{q',v'}),$$ where $f_n:\LT_n\times\LT_{n-1}\to\mathbb{R}_{\geq 0}$ is defined recursively as described before and where $\phi(t_{q,v},\epsilon_{q,v})=(q,v)$ and $\phi(t_{q',v'},\epsilon_{q',v'})=(q',v')$, satisfies properties (i), (ii) and (iii). \end{lemma} \begin{proof} This is straightforward from the properties of $f_n$. Indeed, property (i) for $g_n$ is a consequence of Lemma~\ref{leaf erasing to face collapsing}: if there are $v,v'$ in $V(q)$ and $V(q')$ respectively such that $\phi^{-1}(q,v)=(t,\epsilon)$ and $\phi^{-1}(q',v')=(t',\epsilon)$, where $t\in\LT_n$ and $t'\in\LT_{n-1}$ are such that $f_n(t,t')\neq 0$, then, since $t$ and $t'$ differ by erasing a leaf, the quadrangulations $q=F(\phi(t,\epsilon))$ and $q'=F(\phi(t',\epsilon))$ differ by collapsing a face. As for property (ii), we have $$\sum_{q'\in\sQ_{n-1}}g_n(q,q')=\frac{1}{n+2}\sum_{v\in V(q)}\sum_{(q',v')\in \sQ^\bullet_{n-1}}1_{\epsilon_{q,v}=\epsilon_{q',v'}}f_n(t_{q,v},t_{q',v'})=$$ $$=\frac{1}{n+2}\sum_{v\in V(q)}\sum_{(t',\epsilon)\in\LT_{n-1}\times\{1,-1\}}1_{\epsilon_{q,v}=\epsilon}f_n(t_{q,v},t')= \frac{1}{n+2}\sum_{v\in V(q)}\sum_{t'\in\LT_{n-1}}f_n(t_{q,v},t')= $$ $$=\frac{1}{n+2}\sum_{v\in V(q)}1=1.$$ Similarly, for (iii) one has $$\sum_{q\in\sQ_{n}}g_n(q,q')=\frac{1}{n+2}\sum_{v'\in V(q')}\sum_{t\in\LT_n}f_n(t,t_{q',v'})=\frac{|\LT_n|(n+1)}{|\LT_{n-1}|(n+2)}=\frac{|\sQ_n|}{|\sQ_{n-1}|}.$$ \end{proof} \section{Canonical paths}\label{sec:canonical paths} Given two quadrangulations $q,q'\in\sQ_n$, we intend to build a random canonical path from $q$ to $q'$, that is a probability measure $\P_{q\rightarrow q'}$ on the set $\Gamma_{q\rightarrow q'}$ of all sequences $(q_i,e_i,s_i)_{i=1}^N$ such that \begin{itemize} \item for all $i=1,\ldots,N$, we have $q_i\in\sQ_n$ and $e_i\in E(q_i)\setminus\{\rho\}$, where $\rho$ is the root edge of $q_i$, while $s_i=\pm$; \item $q_{i+1}=q_i^{e_i,s_i}$ for $i=1,\ldots,N-1$; \item $q_1=q$ and $q_N^{e_N,s_N}=q'$. \end{itemize} Note that our aim is to construct these paths in such a way that, given an edge flip $(q,e,s)$, the quantity $\sum_{ q,q'\in\sQ_n}\P_{q\rightarrow q'}\{\gamma \in\Gamma_{q\rightarrow q'}\mid (q,e,s)\mbox{ appears in }\gamma\}$ is as small as possible. The main idea of the construction is to have a canonical way of splitting intermediate quadrangulations in the path into two parts: ideally, we want what we shall call the \emph{right part}, which shrinks with time, to retain as much memory of the initial quadrangulation $q$ as possible, while the \emph{left part} is a growing, increasingly accurate version of $q'$ (see Figure~\ref{fig:eye quadrangulation} for the decomposition). Because, however, our canonical split requires an external face to act as a ``separator'' between the left and right parts, it is not possible -- or at least it is not convenient -- to grow the complete quadrangulation $q'$ on the left, since we we have space for a quadrangulation of size at most $n-1$. That is why we select a mapping $F:\sQ_n^2\to\sQ_{n-1}$ (with certain properties) and construct the random path from $q$ to $q'$ as \begin{itemize} \item a random path from $q$ to a quadrangulation whose left part is $F(q,q')$ and whose right part is empty, distributed according to a probability which will later be called $\P_q^{F(q,q')}$; \item a random path from the final quadrangulation of the path above to $q'$, whose reverse path is distributed according to the probability $\P_{q'}^{F(q,q')}$. \end{itemize} Our objective will be to describe a random flip path distributed according to the probability measure $\P_q^{F(q,q')}$; this will consist of $n$ concatenated flip subpaths, of which \begin{itemize} \item the first is special: it collapses one appropriately chosen random face of $q$ and establishes a ``separating face'' to the right of the root edge; at the end of this flip sequence, the face directly to the right of the root edge separates an empty left quadrangulation $L_0$ from a right quadrangulation $R_0$ of size $n-1$; \item the $(i+1)$th flip subpath (for $i=1,\ldots,n-1$) turns a quadrangulation with left part $L_{i-1}$ and right part $R_{i-1}$ into a quadrangulation with right part $R_i=\coll{R_{i-1},c}$ for some $c$, and left part $L_i$, where $L_i$ has an additional face with respect to $L_{i-1}$ (in the strong sense that $L_{i-1}=\coll{L_i,c'}$ for some corner $c'$ of $L_i$). Given $(L_{i-1},R_{i-1})$, the quadrangulations $L_i,R_i$ are random, distributed in a way that is based on the growth algorithm from Section~\ref{sec:growth algorithm}. The sequence of flips constituting this subpath will be later denoted by $P((L_{i-1},R_{i-1}),(L_{i},R_{i}))$, and itself consists of three distinct phases: \begin{itemize} \item \emph{right phase}: the face of $R_{i-1}$ containing $c$ is replaced, via a local sequence of flips, by a degenerate face, which is then moved within $R_{i-1}$ until it becomes adjacent to the ``separating face''; \item \emph{central phase}: this is a very short sequence of just 4 edge flips which move the extra degenerate face from one side of the ``separating face'' to the other, making it now part of the left portion of the quadrangulation; \item \emph{left phase}: the extra degenerate face is moved to the appropriate location in $L_{i-1}$ and then possibly replaced by a non-degenerate face via local flips in order to create the left quadrangulation $L_i$. \end{itemize} \end{itemize} In conclusion, the full canonical path from $q$ to $q'$ will consist of \begin{itemize} \item a flip sequence modifying $q$ to have a separating face, with a quadrangulation $R_0$ of size $n-1$ on the right and an ``empty quadrangulation'' $L_0$ on the left; \item for each $i=1,\ldots,n-1$, a right phase, central phase and left phase, after which a face has moved from $R_{i-1}$ into $L_{i-1}$, thus yielding left and right parts $L_i, R_i$, where $|R_i|=n-i-1=n-1-|L_i|$, on either side of a separating face. At the end of this whole process $R_{n-1}$ is empty and $L_{n-1}$ is $F(q,q')$; \item $n-1$ sequences, each with a reverse left phase, reverse central phase, reverse right phase, which move a face from the left part of the quadrangulation to the right part, ending with a left part of size 0 and a right part of size $n-1$; \item a final sequence which ``dismantles'' the separating face and moves it to the appropriate location to yield $q'$. \end{itemize} The next subsection will formalise the idea of a ``separating face'' and give the description of our canonical left-right decomposition, as well as the law of the sequence $(L_i,R_i)_{i=0}^{n-1}\in\prod_{i=0}^{n-1}\sQ_i\times\sQ_{n-1-i}$ as a function of the pair $(q,\tilde{q})\in\sQ_n\times\sQ_{n-1}$. Section~\ref{sec:from q to ->coll(q,c)} describes the flip paths used to ``collapse'' a face by turning it into a degenerate face and those that move a degenerate face from one location to another within a quadrangulation. Section~\ref{sec:completing psi} finally explains how to build subpaths of the form $P((L_{i-1},R_{i-1}),(L_i,R_i))$ (which will turn out to be deterministic given $L_{i-1},L_i,R_{i-1},R_i$) by assembling flip sequences from Section~\ref{sec:from q to ->coll(q,c)} into a right phase, central phase and left phase, and establishes our desired estimates. \subsection{Basic structure of canonical paths}\label{sec:canonical paths 1} \begin{figure}\centering \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-3, -0) {}; \node [style=vertex] (1) at (-1, -0) {}; \node [style=vertex] (2) at (-4, -0) {}; \node [style=vertex] (3) at (-2.5, 0.75) {}; \node [style=vertex] (4) at (-1.75, 1) {}; \node at (-2.5,-0.8) {$L$}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [style=quad, blue] (2) to (0); \draw [style=quad, bend left=90, looseness=2.25, blue] (0) to (1); \draw [style=quad, blue] (0) to (3); \draw [style=quad, blue] (3) to (4); \draw [style=quad, blue] (4) to (1); \draw [style=quad, blue, ultra thick,->] (0) to (1); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (0, -1) {}; \node [style=vertex] (1) at (2.5, -1) {}; \node [style=vertex] (2) at (-1.25, 1.25) {}; \node [style=vertex] (3) at (2.5, 2.25) {}; \node [style=vertex] (4) at (0, -1) {}; \node [style=vertex] (5) at (0, 1) {}; \node [style=vertex] (6) at (1.25, 1.25) {}; \node [style=vertex] (7) at (0, -0) {}; \node [style=vertex] (8) at (1.75, -0.25) {}; \node [style=vertex] (9) at (0.75, 0.25) {}; \node [style=vertex] (10) at (2, 1.5) {}; \node at (1,-1.8) {$R$}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [style=quad,->,ultra thick] (0) to (1); \draw [style=quad] (0) to (2); \draw [style=quad] (3) to (2); \draw [style=quad] (1) to (3); \draw [style=quad, bend right=45, looseness=1.50] (6) to (3); \draw [style=quad] (6) to (5); \draw [style=quad] (5) to (2); \draw [style=quad] (5) to (7); \draw [style=quad] (7) to (0); \draw [style=quad, bend left=45, looseness=1.50] (7) to (8); \draw [style=quad] (9) to (8); \draw [style=quad] (8) to (6); \draw [style=quad] (10) to (6); \draw [style=quad] (8) to (1); \draw [style=quad] (6) to (3); \draw [style=quad] (7) to (8); \end{pgfonlayer} \end{tikzpicture}\hspace{.5cm} \begin{tikzpicture} \clip[use as bounding box] (-1,-4) rectangle (5,1.8); \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-1, -1) {}; \node [style=vertex] (1) at (1, -1) {}; \node [style=vertex] (2) at (-0.5, -2) {}; \node [style=vertex] (3) at (-0.5, -0.5) {}; \node [style=vertex] (4) at (0.5, -0.5) {}; \node [style=vertex] (5) at (2.5, -0.5) {}; \node [style=vertex] (6) at (2.25, -1.5) {}; \node [style=vertex] (7) at (3, -1) {}; \node [style=vertex] (8) at (2, 0.75) {}; \node [style=vertex] (9) at (4, -1.25) {}; \node [style=vertex] (10) at (3.75, 0.25) {}; \node [style=vertex] (11) at (3.75, 1) {}; \node [style=vertex] (12) at (5, -1) {}; \node [style=vertex] (13) at (1, -1) {}; \node [style=vertex] (14) at (3.25, -0.5) {}; \node at (2,-3.8) {$L\cdot R$}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \filldraw[red!10] (13.center) [bend right=60, looseness=1.3] to (12.center) [bend right=90, looseness=2.10] to (13.center); \filldraw[blue!10] (0.center) [bend right=90, looseness=3.20] to (1.center) [bend right=90, looseness=2.45] to (0.center); \draw [style=quad, blue] (2) to (0); \draw [style=quad, bend left=90, looseness=2.25,blue,<-, ultra thick] (0) to (1); \draw [style=quad, blue] (0) to (3); \draw [style=quad, blue] (3) to (4); \draw [style=quad, blue] (4) to (1); \draw [quad, bend right=45, looseness=1.00, blue] (0) to (1); \draw [style=quad] (5) to (6); \draw [style=quad] (12) to (11); \draw [style=quad] (6) to (9); \draw [style=quad] (14) to (5); \draw [style=quad, bend left=45, looseness=1.50] (6) to (9); \draw [style=quad] (11) to (8); \draw [style=quad, bend left=90, looseness=2.00, ultra thick, dashed] (13) to (12); \draw [style=quad, bend right=60, looseness=1.25, ultra thick, ->] (13) to (12); \draw [style=quad] (9) to (14); \draw [style=quad] (6) to (13); \draw [style=quad] (10) to (14); \draw [style=quad] (5) to (8); \draw [style=quad] (7) to (9); \draw [style=quad, bend right=45, looseness=1.50] (14) to (11); \draw [style=quad] (9) to (12); \draw [style=quad] (14) to (11); \draw [style=quad] (13) to (8); \draw [blue, ultra thick, bend right=90, looseness=3.00, dashed] (0) to (1); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:eye quadrangulation}From two quadrangulations $L\in\sQ_3$ and $R\in\sQ_8$ to a quadrangulation $L\cdot R\in\sQ_{12}$ (whose root is the red one on the right, while the marked blue oriented edge is forgotten). Notice that it is possible to recover $L$ and $R$ from $L\cdot R$, by splitting the two cycles which form the boundary of the face containing the root corner, erasing the dashed edges and rooting appropriately.} \end{figure} In order to describe the general structure of our canonical paths, it will be useful to introduce certain ``surgical operations'' that will enable us to assemble multiple quadrangulations into a single larger one. Given two quadrangulations $L\in\sQ_l$ and $R\in\sQ_r$, where $l,r\geq 1$, we shall write $L\cdot R$ for the quadrangulation in $\sQ_{l+r+1}$ obtained as follows (Figure~\ref{fig:eye quadrangulation}): first ``double'' the root edges of $L$ and $R$ by attaching a degree two face directly to their right; for convenience, draw this degree two face as the infinite face in the plane, so that $L$ and $R$ are each ``enclosed'' within a cycle of length 2 containing the root edge; now draw both quadrangulation in the plane, identifying their origins, in such a way that both root edges are oriented clockwise (with respect to the infinite face); finally, forget the rooting of $L$ to obtain $L\cdot R$. It will be convenient to also consider the case where $l=0$ or $r=0$ (remember we have conventionally set $\sQ_0=\{\rightarrow\}$); we will set $\rightarrow\cdot q$, for any $q$ with $|q|\geq 1$, to be the quadrangulation obtained by adding a degenerate face directly to the right of the root edge of $q$ (equivalently, the operation described above is performed without actually doubling the root edge of $\rightarrow$). The quadrangulation $q\cdot\rightarrow$ is $\rightarrow\cdot q$, rerooted in the edge within the added degenerate face, so as not to change the origin. We shall write $\sQ_l\cdot\sQ_r$ for the subset $\{L\cdot R \mid (L,R)\in\sQ_l\times\sQ_r\}$ of $\sQ_{l+r+1}$. Notice that, given $q\in\sQ_l\cdot\sQ_r$ such that $q=L\cdot R$, one can quite simply reconstruct $L$ and $R$, since the rooting of $L$, which is the only information not trivially encoded, can still be recovered by following the contour of the face containing the root corner of $q$. As previously described, the idea behind our canonical paths will be to ``destroy'' the starting quadrangulation $q$ on the right while ``growing'' a new quadrangulation on the left. Before dealing with the general case, we shall focus on the case where the ``final'' quadrangulation $q'$ is of the form $\tilde{q}\cdot\rightarrow$ for some $\tilde{q}\in\sQ_{n-1}$. Furthermore, we shall not yet build the full random canonical path from $q$ to $\tilde{q}\cdot\rightarrow$, but a random sequence of quadrangulations of the form $(L_i\cdot R_i)_{i=0}^{n-1}$, taking values in $\prod_{i=0}^{n-1}(\sQ_i\times\sQ_{n-i-1})$, that our random canonical path will ``go through''. Given this sequence, the path will actually be deterministic, as detailed within Sections~\ref{sec:from q to ->coll(q,c)} and~\ref{sec:completing psi}. Given $q\in\sQ_n$ and $q'\cdot\rightarrow\in\sQ_n$, consider the probability distribution $\P_q^{q'}$ on the set $\prod_{i=0}^{n-1}\sQ_i\cdot\sQ_{n-i-1}$ defined as follows. Given $(L_i\cdot R_i)_{i=0}^{n-1}\in \prod_{i=0}^{n-1}\sQ_i\cdot\sQ_{n-i-1}$, set $$\P_q^{q'}((L_i\cdot R_i)_{i=0}^{n-1})=g_n(q,R_0)1_{L_{n-1}=q'}\prod_{i=0}^{n-2} g_{n-i-1}(R_i,R_{i+1})g_{i+1}(L_{i+1},L_i).$$ It should be clear that $\P_q^{q'}$ is a probability distribution: a random sequence $(\lambda_i\cdot\rho_i)_{i=0}^{n-1}$ distributed according to $\P_q^{q'}$ is simply built in such a way that $\lambda_{n-1},\lambda_{n-2},\ldots,\lambda_0$ and $q,\rho_0,\ldots,\rho_{n-1}$ are independent sequences of random quadrangulations, started at $q'$ and $q$ respectively, built so as to collapse one random face according to the probability distribution given by $g_i(-,\cdot)$ at each step. The key feature of the probability distribution $\P_q^{q'}$ which we will use to complete the necessary estimates on the congestion given by our random canonical paths is expressed in the following lemma: \begin{lemma}\label{key estimate} Given positive integers $n, a<n-1, b<n$ and quadrangulations $l\in\sQ_a,r\in\sQ_b$, we have $$\sum_{q\in\sQ_n, q'\in\sQ_{n-1}}\P_q^{q'}\left(\{(L_i,R_i)_{i=0}^{n-1}\mid L_a=l,R_{n-b-1}=r\}\right)\leq 12^{2n-b-a-1}.$$ \end{lemma} \begin{proof} The expression in the statement can be rewritten as $$\left(\sum_{q\in\sQ_n}\sum_{\substack{(R_i)_{i=0}^{n-b-2}\in\prod_{i=0}^{n-b-2}\sQ_{n-i-1}\\mathcal{R}_{n-b-1}=r\\(R_i)_{i=n-b}^{n-1}\in\prod_{i=n-b}^{n-1}\sQ_{n-i-1}}}g_n(q,R_0)\prod_{i=0}^{n-2} g_{n-i-1}(R_i,R_{i+1})\right)% \left(\sum_{q'\in\sQ_{n-1}}\sum_{\substack{(L_i)_{i=0}^{a-1}\in\prod_{i=0}^{a-1}\sQ_i\\L_a=l\\(L_i)_{i=a+1}^{n-1}\in\prod_{i=a+1}^{n-1}\sQ_i}}1_{L_{n-1}=q'}\prod_{i=0}^{n-2} g_{i+1}(L_{i+1},L_{i})\right).$$ Let us give an upper bound for the second factor above: the computations involved in bounding the first factor will be entirely similar. By appropriately exchanging sums and products, we can rewrite it as $$\sum_{(L_i)_{i=a+1}^{n-1}\in\prod_{i=a+1}^{n-1}\sQ_i}g_{a+1}(L_{a+1},l)\prod_{i=a+1}^{n-2}g_{i+1}(L_{i+1},L_{i})\sum_{(L_i)_{i=0}^{a-1}\in\prod_{i=0}^{a-1}\sQ_i}g_a(l,L_{a-1})\prod_{i=0}^{a-2}g_{i+1}(L_{i+1},L_i);$$ the entire internal sum is equal to 1 by property (ii) of the mappings $g_1,\ldots,g_a$; the external sum can thus be evaluated by using property (iii) of the mappings $g_{a+1},\ldots, g_{n-1}$ (and by summing over $L_{n-1},L_{n-2},\ldots,L_{a+1}$ separately, in turn). We obtain that the above is $$\prod_{i=a}^{n-2} \frac{|\sQ_{i+1}|}{|\sQ_i|}\leq 12^{n-a-1},$$ where we have used the simple fact that, for all $i\geq 0$, $|\sQ_{i+1}|=3^{i+1}\operatorname{Cat}(i+1)\geq 3\cdot 4\cdot 3^i\operatorname{Cat}(i)=12|\sQ_i|$. As for the first factor above, a similar argument yields that it is equal to $\prod_{i=b}^{n-1}\frac{|\sQ_{i+1}|}{|\sQ_i|}$, and therefore bounded above by $12^{n-b}$, which concludes the proof of the lemma. \end{proof} Consider now the general case of a pair of quadrangulations $q_1,q_2\in\sQ_n$: we are almost ready to construct our probability measure $\P_{q_1\rightarrow q_2}$ on the set of all possible paths $\Gamma_{q_1\rightarrow q_2}$. This will require three fundamental ingredients: one is the family of probability spaces $(\Gamma_q^{q'},\P_q^{q'})$ (for $q\in\sQ_n,q'\in\sQ_{n-1}$) we just built and discussed; one is a mapping $F:\sQ_n^2\rightarrow\sQ_{n-1}$, which we will use to assign to the pair $q_1,q_2$ the probability space $\left(\Gamma_{q_1}^{F(q_1,q_2)}\times\Gamma_{q_2}^{F(q_1,q_2)},\P_{q_1}^{F(q_1,q_2)}\otimes \P_{q_2}^{F(q_1,q_2)}\right)$; the last one is a mapping $\Psi_{q_1,q_2}:\Gamma_{q_1}^{F(q_1,q_2)}\times\Gamma_{q_2}^{F(q_1,q_2)}\rightarrow \Gamma_{q_1\rightarrow q_2}$, which will enable us to simply define $\P_{q_1\rightarrow q_2}$ as the push-forward via $\Psi_{q_1,q_2}$ of the probability measure $\P_{q_1}^{F(q_1,q_2)}\otimes \P_{q_2}^{F(q_1,q_2)}$. For the mapping $F$, we may choose any which satisfies the condition that, given $q\in\sQ_n$ and $q'\in\sQ_{n-1}$, we have $\left|\left\{\tilde{q}\in\sQ_n\mid F(q,\tilde{q})=q'\right\}\right|\leq 12$, and similarly $\left|\left\{\tilde{q}\in\sQ_n\mid F(\tilde{q},q)=q'\right\}\right|\leq 12$. The fact that such a mapping exists is an immediate consequence of the fact that $|\sQ_n|\leq 12|\sQ_{n-1}|$: we shall from here on use $F:\sQ_n^2\rightarrow\sQ_{n-1}$ under the assumption that we have chosen one such mapping. The next section will be devoted to the construction of a mapping $\Psi_{q_1,q_2}:\Gamma_{q_1}^{F(q_1,q_2)}\times\Gamma_{q_2}^{F(q_1,q_2)}\rightarrow\Gamma_{q_1\rightarrow q_2}$, which will consist in essentially ``interpolating'' sequences $(L^1_i\cdot R^1_i)_{i=0}^{n-1}\in\Gamma_{q_1}^{F(q_1,q_2)}$ and $(L^2_i\cdot R^2_i)_{i=0}^{n-1}\in\Gamma_{q_2}^{F(q_1,q_2)}$ by filling in the ``gap'' between successive quadrangulations via sequences of edge flips and making sure to run the complete flip sequence constructed from $(L^1_i\cdot R^1_i)_{i=0}^{n-1}$ forward, then the one constructed from $(L^2_i\cdot R^2_i)_{i=0}^{n-1}\in\Gamma_{q_2}^{F(q_1,q_2)}$ backwards. This needs to be done with some care: in particular, our aim is to be able to give an upper bound for the quantity $$\sum_{q_1,q_2\in\sQ_n}\P_{q_1\rightarrow q_2}(\{\gamma\in\Gamma_{q_1\rightarrow q_2}\mbox{ containing } (q,e,s)\})$$ independent of the flip $(q,e,s)$ by invoking Lemma~\ref{key estimate}. Indeed, we wish to build $\Psi_{q_1,q_2}$ in such a way that knowing a flip $(q,e,s)$ appears in a path $\Psi_{q_1,q_2}((L^1_i\cdot R^1_i)_{i=0}^{n-1},(L^2_i\cdot R^2_i)_{i=0}^{n-1})$ gives as much information as possible about the actual quadrangulations $L_i^j,R_i^j$. \subsection{The flip path from $q$ to $\rightarrow \cdot \coll{q,c}$}\label{sec:from q to ->coll(q,c)} We now begin the task of constructing our mappings $\Psi_{q_1,q_2}$, for $q_1,q_2\in\sQ_n$. In order to do this, given $(L_i\cdot R_i)_{i=0}^{n-1}\in\Gamma_q^{q'}$ we wish to construct flip sequences leading from the quadrangulation $L_i\cdot R_i$ to the quadrangulation $L_{i+1}\cdot R_{i+1}$, plus a flip path from $q$ to $L_0\cdot R_0$. Notice that with probability 1 (according to $\P_q^{q'}$) the quadrangulation $R_{i+1}$ differs from $R_i$ by collapsing a face; the same is true for $L_i$ and $L_{i+1}$ and for $R_0$ and $q$. We may therefore assume this is the case when constructing $\Psi_{q_1,q_2}$. First of all, we shall construct the very first part of the flip path, which will transform a quadrangulation $q$ into $L_0\cdot R_0$, where $|L_0|=0$ (hence $L_0=\rightarrow$) and $R_0$ is of the form $\coll{q,c}$ for some corner $c$ of $q$. Once this construction is made, all others will be rather straightforward generalisations of it. \begin{figure}\centering \begin{tikzpicture} \clip[use as bounding box] (-2,-2.5) rectangle (3,2); \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-2, -2) {}; \node [style=vertex] (1) at (2, -2) {}; \node [style=vertex] (2) at (-2, 1.5) {}; \node [style=vertex] (3) at (2, 1.5) {}; \node [style=vertex] (4) at (-0.5, 0.75) {}; \node [style=vertex] (5) at (0, -0.25) {}; \node [style=vertex] (6) at (1, -0) {}; \node [style=vertex] (7) at (0.25, 0.75) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \filldraw[red!10] (-2,-2) rectangle (2,1.5); \begin{scope} \clip (4.center) to (5.center) to (6.center) to (7.center) to (4.center); \fill[white] (4.center) to (5.center) to (6.center) to (7.center) to (4.center); \draw[draw=red, fill=red!20] (4) circle (12pt); \end{scope} \draw [style=quad,ultra thick,->] (0) to (1); \draw [style=quad] (1) to (3); \draw [style=quad] (3) to (2); \draw [style=quad] (2) to (0); \draw [style=quad] (4) to (5); \draw [style=quad] (5) to (6); \draw [style=quad] (6) to (7); \draw [style=quad] (7) to (4); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \clip[use as bounding box] (-4,-2.5) rectangle (3,2); \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-2, -2) {}; \node [style=vertex] (1) at (2, -2) {}; \node [style=vertex] (2) at (-2, 1.5) {}; \node [style=vertex] (3) at (2, 1.5) {}; \node [style=vertex] (4) at (-0.5, 0.75) {}; \node [style=vertex] (5) at (0, -0.25) {}; \node [style=vertex] (6) at (1, -0) {}; \node [style=vertex] (7) at (-4, -2) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \filldraw[red!10] (-2,-2) rectangle (2,1.5); \draw [quad, blue] (7) to (0); \draw [style=quad,ultra thick,->] (0) to (1); \draw [style=quad] (1) to (3); \draw [style=quad] (3) to (2); \draw [style=quad] (2) to (0); \draw [style=quad, ultra thick] (4) to (5); \draw [style=quad, ultra thick] (5) to (6); \draw [quad, out=120, in=60, looseness=4.5] (0) to (1); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:q,->xcoll(q,c)}On the left, a quadrangulation $q\in\sQ_n$, drawn in the plane so that the infinite face lies directly to the right of the root edge, with a marked corner $c$ within a face $f$. To the right, the quadrangulation $\rightarrow\cdot\coll{q,c}$: the face $f$ is ``collapsed'' and a degenerate face is added directly to the right of the root edge. If $\rho$ is the root corner of the quadrangulation $q'$ drawn on the right, $\coll{q',\rho}$ is $\coll{q,c}$.} \end{figure} Hence our objective is this: given a quadrangulation $q\in\sQ_n$ and a corner $c$ of $q$, we shall build a unique canonical path that, through a sequence of edge flips, transforms $q$ into the quadrangulation $\rightarrow \cdot \coll{q,c}$ (see Figure~\ref{fig:q,->xcoll(q,c)} for a representation of a quadrangulation of the form $\rightarrow \cdot \coll{q,c}$). We shall say that such a path has two phases: the first phase has the aim of replacing the face $f_c$ containing $c$ with a degenerate face in such a way that the appropriate vertices of $q$ are identified; the second phase consists in ``moving'' the degenerate face so that it ends up lying directly to the right of the root edge. We shall first concern ourselves with the second phase, that is, build a canonical path $P(q,c)$ from $q$ to $\rightarrow\cdot \coll{q,c}$ in the case where $c$ is a corner within a degenerate face; note that the specific case where the internal edge of this face is the root edge of $q$ is a little different and will be dealt with separately. \begin{figure} \centering \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=above:$v_i$,label=left:$4$] (0) at (0, 4) {}; \node [style=vertex, label=right:$w_i$,label=left:$3$] (1) at (0, 2) {}; \node at (0.25,3.4) {$\eta_i$}; \node [style=vertex] (2) at (0, 3) {}; \node [style=vertex,label=left:$2$] (3) at (0, 1) {}; \node [style=vertex,label=left:$1$] (4) at (0, -0) {}; \node [style=vertex,label=left:$0$, label=below:$\emptyset$] (5) at (0, -1) {}; \node [style=vertex] (6) at (1, -1) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [thick] (5) to (1); \draw [very thick,->,red] (5) to (6); \draw [thick, bend right=60, looseness=1.00] (1) to (0); \draw [thick, bend left=60, looseness=1.00] (1) to (0); \draw [very thick, blue] (2) to (0); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=above:$w_{i+1}$,label=left:$4$] (0) at (0, 4) {}; \node [style=vertex, label=right:$v_{i+1}$,label=left:$3$] (1) at (0, 2) {}; \node at (0,2.5) {\contour{white}{$\eta_{i+1}$}}; \node [style=vertex] (2) at (0, 3) {}; \node [style=vertex,label=left:$2$] (3) at (0, 1) {}; \node [style=vertex,label=left:$1$] (4) at (0, -0) {}; \node [style=vertex,label=left:$0$, label=below:$\emptyset$] (5) at (0, -1) {}; \node [style=vertex] (6) at (1, -1) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [thick] (5) to (1); \draw [very thick,->,red] (5) to (6); \draw [thick, bend right=60, looseness=1.00] (1) to (0); \draw [thick, bend left=60, looseness=1.00] (1) to (0); \draw [very thick, blue, dashed] (2) to (0); \draw [very thick, blue] (2) to (1); \end{pgfonlayer} \end{tikzpicture} \hspace{1cm} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=above:$v_{i}$,label=left:$4$] (0) at (0, 4) {}; \node [style=vertex, label=right:$w_{i}$,label=left:\contour{white}{$3$}] (1) at (0, 2) {}; \node at (-0.9,3) {\contour{white}{$\tilde{\eta}_{i}$}}; \node [style=vertex] (2) at (0, 3) {}; \node [style=vertex,label=left:$2$] (3) at (0, 1) {}; \node [style=vertex,label=left:$1$] (4) at (0, -0) {}; \node [style=vertex,label=left:$0$, label=below:$\emptyset$] (5) at (0, -1) {}; \node [style=vertex] (6) at (1, -1) {}; \node [style=vertex] (x) at (-1.5, 2.3) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [thick] (5) to (1); \draw [thick] (x) to (1); \draw [very thick,->,red] (5) to (6); \draw [thick, bend right=60, looseness=1.00] (1) to (0); \draw [blue, very thick, bend left=60, looseness=1.00] (1) to (0); \draw [thick] (2) to (1); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=above:$v_{i+1}$,label=left:$4$] (0) at (0, 4) {}; \node [style=vertex, label=right:$w_{i+1}$,label=left:\contour{white}{$3$}] (1) at (0, 2) {}; \node [style=vertex] (2) at (0, 3) {}; \node [style=vertex,label=left:$2$] (3) at (0, 1) {}; \node [style=vertex,label=left:$1$] (4) at (0, -0) {}; \node [style=vertex,label=left:$0$, label=below:$\emptyset$] (5) at (0, -1) {}; \node [style=vertex] (6) at (1, -1) {}; \node [style=vertex] (x) at (-1.5, 2.3) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [thick] (5) to (1); \draw [thick] (x) to (1); \draw [very thick,->,red] (5) to (6); \draw [thick, bend right=60, looseness=1.00] (1) to (0); \draw [blue, very thick, bend left=60, looseness=1.00, dashed] (1) to (0); \draw [thick] (2) to (1); \draw [very thick, blue, out=90, in=50, looseness=3] (x) to (1); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:move leafy face}} \end{figure} \begin{lemma}\label{lemma:P_1(q,c)}Let $c$ be a corner within a degenerate face $f$ of a quadrangulation $q\in\sQ_n$ and suppose the root edge of $q$ is \emph{not} the internal edge of $f$. Define the path $P(q,c)=(q_i,e_i,+)_{i=1}^N$ recursively as follows (it may be useful to refer to Figure~\ref{fig:move leafy face}): \begin{itemize} \item set $q_1=q$. \item Let $f_1=f$ and $\eta_1$ be the internal edge of $f$; let $f_i$, for $i\geq 2$, be the face of $q_i$ that contains the (possibly flipped) image of edge $\eta_{i-1}$ in $q_i$, and $\eta_i$ the internal edge of $f_i$ (which will automatically be a degenerate face). Let $v_i$ be the vertex on the boundary of $f_i$ that is an endpoint of $\eta_i$, let $w_i$ be the other vertex on the external boundary of $f_i$ and let $\tilde{\eta}_i$ be the edge immediately after $\eta_i$ in counterclockwise order around vertex $v_i$ \item If $d_{\mathrm{gr}}(v_i,\emptyset)>d_{\mathrm{gr}}(w_i,\emptyset)$ (where $d_{\mathrm{gr}}$ is the graph distance on the vertex set of $q_i$), set $e_i=\eta_i$. If, on the other hand, $d_{\mathrm{gr}}(v_i,\emptyset)<d_{\mathrm{gr}}(w_i,\emptyset)$, set $e_i=\tilde{\eta}_i$. \item Set $q_{i+1}=q_i^{e_i,+}$. \item Set $N$ to be the first non-negative integer for which $q_N^{e_N,s_N}$ is the quadrangulation $\rightarrow\cdot\coll{q,c}$. \end{itemize} The path above is well defined, in the sense that $f_i$ is always degenerate (so that the construction can be performed), $e_i$ is never the root edge of $f$ and $N$ is a positive integer. Furthermore, we have $|P(q,c)|=N\leq 6n$ and, for $i=1,\ldots,N$, we have $\coll{q_i,c_i}=\coll{q,c}$, where $c_i$ is the corner corresponding to the edge $e_i$, oriented towards $v_i$. \end{lemma} \begin{proof} The fact that $f_i$ is degenerate is easily shown by induction. Indeed, flipping $\eta_i$ does not change the fact that it is an internal edge in a degenerate face. On the other hand, suppose $d_{\mathrm{gr}}(v_i,\emptyset)<d_{\mathrm{gr}}(w_i,\emptyset)$ and let $u_i$ be the endpoint of $\eta_i$ that is different from $v_i$. Then flipping $\tilde{\eta}_i$ \emph{clockwise} does not increase the degree of $u_i$, so that $\eta_i$ remains within a degenerate face in $q_{i+1}$. Now, since $\eta_1$ is not the root edge of $q$, the edge $\eta_i$ (which is the image of $\eta_1$ after multiple flips in the path) cannot at any point be the root edge. On the other hand, if the root edge were $\tilde{\eta}_i$ and we had $d_{\mathrm{gr}}(v_i,\emptyset)<d_{\mathrm{gr}}(w_i,\emptyset)$, hence $v_i=\emptyset$, we would actually have $q_i=\rightarrow\cdot \coll{q,c}$. The fact that $N$ is finite can be seen as a consequence of the fact that $d_{\mathrm{gr}}(v_i,\emptyset)$ is weakly decreasing (since it is not increased by the flip of $\tilde{\eta}_i$ and is decreased when flipping $\eta_i$). After we have $v_i=\emptyset$, flipping $\tilde{\eta_i}$ repeatedly will eventually make $f_i$ the face immediately to the right of the root edge, yielding exactly the quadrangulation $\rightarrow\cdot\coll{q,c}$. Let us now check the bound on $N$. Consider a step $(q_i,e_i,+)$ in the path, where $e_i\neq \eta_i$ and $e_{i-1}\neq \eta_{i-1}$; the edge $e_i$, which is then $\tilde{\eta}_i$, has never been flipped before (i.e.~it is not the image in $q_i$ of any $e_j$ for $j<i$). On the other hand, $\{i\leq N \mid e_i=\eta_i\}\leq d_{\mathrm{gr}}^q(v_0,\emptyset)\leq 2n$, hence the bound. Finally, $c_i$ is a corner of the degenerate face $f_i$ (since $f_i$ contains $\eta_i$ and lies directly to the right to the right of $\tilde{\eta}_i$), and we can show that $\coll{q_i,c_i}=\coll{q_{i+1},c_{i+1}}$. This is obvious if $e_i=\eta_i$; if $e_i=\tilde{\eta}_i$, the quadrangulation $q_{i+1}$ differs by $q_i$ only by the fact that the degenerate face $f_i$ is ``rotated'' onto the edge after $\tilde{\eta}_i$ in counterclockwise order around $w_i$, then labelled $f_{i+1}$: collapsing it after the procedure will still yield $\coll{q_i,c_i}$. \end{proof} We shall then perform an ad hoc construction in the case where the root edge is the internal edge within the degenerate face of $q$ containing $c$: \begin{figure}\centering \begin{tikzpicture} \clip[use as bounding box] (-1.5,-0.8) rectangle (2.3,2); \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=left:$v$] (0) at (-1, 1) {}; \node [style=vertex, label=right:$u$] (1) at (0, 1) {}; \node [style=vertex, label=above right:$w$] (2) at (1, 1) {}; \node [style=vertex] (3) at (2, 1) {}; \node at (0, 1.8) {\contour{white}{$e_3$}}; \node at (1.5, 0.8) {\contour{white}{$e_2$}}; \node at (0, 0.2) {\contour{white}{$e_1$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [very thick, red, <-] (0) to (1); \draw [thick, bend left=60, looseness=1.00] (0) to (2); \draw [thick, bend right=60, looseness=1.00] (0) to (2); \draw [thick] (2) to (3); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \clip[use as bounding box] (-1.5,-0.8) rectangle (2.3,2); \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=left:$v$] (0) at (-1, 1) {}; \node [style=vertex, label=right:$u$] (1) at (0, 1) {}; \node [style=vertex, label=above right:$w$] (2) at (1, 1) {}; \node [style=vertex] (3) at (2, 1) {}; \node at (0, 1.8) {\contour{white}{$e_3$}}; \node at (1.5, 0.8) {\contour{white}{$e_2$}}; \node at (0, 0.2) {\contour{white}{$e_1$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [very thick, red, <-] (0) to (1); \draw [thick, bend left=60, looseness=1.00] (0) to (2); \draw [very thick, bend right=60, looseness=1.00, blue, dashed] (0) to (2); \draw [very thick, bend right=60, looseness=1.00, blue] (1) to (3); \draw [thick] (2) to (3); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \clip[use as bounding box] (-1.5,-0.8) rectangle (2.3,2); \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=left:$v$] (0) at (-1, 1) {}; \node [style=vertex, label=right:$u$] (1) at (0, 1) {}; \node [style=vertex, label=above right:$w$] (2) at (1, 1) {}; \node [style=vertex] (3) at (2, 1) {}; \node at (0, 1.8) {\contour{white}{$e_3$}}; \node at (1.5, 0.8) {\contour{white}{$e_2$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [very thick, red, <-] (0) to (1); \draw [thick, bend left=60, looseness=1.00] (0) to (2); \draw [thick, bend right=60, looseness=1.00] (1) to (3); \draw [very thick, blue, dashed] (2) to (3); \draw[very thick, blue, out=-20, in=60, looseness=8] (1) to (0); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \clip[use as bounding box] (-1.5,-0.8) rectangle (2.3,2); \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=left:$v$] (0) at (-1, 1) {}; \node [style=vertex, label=right:$u$] (1) at (0, 1) {}; \node [style=vertex, label=above right:$w$] (2) at (1, 1) {}; \node [style=vertex] (3) at (2, 1) {}; \node at (0, 1.8) {\contour{white}{$e_3$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [very thick, red, <-] (0) to (1); \draw [bend left=60, looseness=1.00, blue, very thick, dashed] (0) to (2); \draw [bend left=60, looseness=1.00, blue, very thick] (1) to (2); \draw [thick, bend right=60, looseness=1.00] (1) to (3); \draw[thick, out=-20, in=60, looseness=8] (1) to (0); \end{pgfonlayer} \end{tikzpicture}\\%SECOND SET \begin{tikzpicture} \clip[use as bounding box] (-1.5,-0.8) rectangle (2.8,2); \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=left:$v$] (0) at (-1, 1) {}; \node [style=vertex, label=right:$u$] (1) at (0, 1) {}; \node [style=vertex, label=above right:$w$] (2) at (1, 1) {}; \node [style=vertex] (3) at (2.5, 1) {}; \node at (0, 1.8) {\contour{white}{$e_1$}}; \node at (2, 0.8) {\contour{white}{$e_2$}}; \node at (0, 0.2) {\contour{white}{$e_3$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [very thick, red, ->] (0) to (1); \draw [thick, bend left=60, looseness=1.00] (0) to (2); \draw [thick, bend right=60, looseness=1.00] (0) to (2); \draw [thick] (2) to (3); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \clip[use as bounding box] (-1.5,-0.8) rectangle (2.8,2); \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=left:$v$] (0) at (-1, 1) {}; \node [style=vertex, label=right:\contour{white}{$u$}] (1) at (0, 1) {}; \node [style=vertex, label=above right:$w$] (2) at (1, 1) {}; \node [style=vertex] (3) at (2.5, 1) {}; \node at (0, 1.8) {\contour{white}{$e_1$}}; \node at (2, 0.8) {\contour{white}{$e_2$}}; \node at (0, 0.2) {\contour{white}{$e_3$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [very thick, red, ->] (0) to (1); \draw [very thick, blue, bend left=60, looseness=1.00, dashed] (0) to (2); \draw [very thick, blue, bend left=60] (1) to (3); \draw [thick, bend right=60, looseness=1.00] (0) to (2); \draw [thick] (2) to (3); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \clip[use as bounding box] (-1.5,-0.8) rectangle (2.8,2); \begin{pgfonlayer}{nodelayer} \node [style=vertex, label=left:$v$] (0) at (-1, 1) {}; \node [style=vertex, label=right:\contour{white}{$u$}] (1) at (0, 1) {}; \node [style=vertex, label=above right:\contour{white}{$w$}] (2) at (1, 1) {}; \node [style=vertex] (3) at (2.5, 1) {}; \node at (2, 0.8) {\contour{white}{$e_2$}}; \node at (0, 0.2) {\contour{white}{$e_3$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [very thick, red, ->] (0) to (1); \draw [thick, bend left=60] (1) to (3); \draw [thick, bend right=60, looseness=1.00] (0) to (2); \draw [very thick, blue, dashed] (2) to (3); \draw[very thick, blue, out=20, in=-60, looseness=8] (1) to (0); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:internal root}} \end{figure} \begin{lemma}\label{lemma:annoying root} Let $q\in\sQ_n$ be a quadrangulation whose root edge $\rho$ is the internal edge within a degenerate face $f$ and let $c$ be a corner within $f$. Let $u$ be the degree one endpoint of $\rho$, let $v$ be its other endpoint and let $w$ be the third vertex adjacent to $f$. If $u$ is the origin of $q$, let $e_1,\ldots, e_{\deg(w)}$ be the edges incident to $w$, in counterclockwise order, indexed in such a way that $e_1$ and $e_{\deg(v)}$ are the boundary edges of $q$. Set $P(q,c)=(q_i,e_i,+)_{i=1}^N$, where $q_1=q$ and $q_{i+1}=q_i^{e_i,+}$ for $i=1,\ldots,\deg(w)-1=N$ (Figure~\ref{fig:internal root}, above). If $u$ is \emph{not} the origin of $q$ (hence $v$ is), let $e_1,\ldots, e_{\deg(w)}$ be the edges incident to $w$, in \emph{clockwise} order, indexed in such a way that $e_1$ and $e_{\deg(w )}$ are the boundary edges of $q$. Set $P(q,c)=(q_i,e_i,-)_{i=1}^N$, where $q_1=q$ and $q_{i+1}=q_i^{e_i,+}$ for $i=1,\ldots,\deg(w)-2=N$ (Figure~\ref{fig:internal root}, below). We then have $q_N^{e_N,s_N}=\rightarrow\cdot \coll{q,c}$, where $s_N=+$ in the first case and $s_N=-$ in the second. Notice that in any case we have $N< 2n$. In the first case, let $c_i$ be the corner corresponding to edge $e_i$ in $q_i$, oriented away from $w$; in the second, let $c_i$ be the corner corresponding to $e_i$ in $q_i$, oriented towards $w$. In both cases, we have $\coll{q_i,c_i}=\coll{q,c}$. \end{lemma} \begin{proof} Notice that the root edge $\rho$ does not have $w$ as an endpoint, hence all flips we perform are allowed, and that $N\leq\deg(w)<2n$. Also remark that the quadrangulation $\rightarrow\cdot\coll{q,v}$ can be obtained from $q$ by ``detaching'' the edges $e_2,\ldots,e_{\deg(w)-1}$ from $w$ and rerouting them to $u$, replacing $e_1$ with an edge joining $u$ to $v$ in such a way as to create a face containing $w$ (which has now degree 1) directly on the right of the root edge, and finally replacing $e_{\deg{w}}$ with an edge between $w$ and $u$ in the case where $u$ is the origin of $q$. But indeed, this is exactly the effect achieved by the sequence of flips given: when flipping $e_i$ we are erasing it in favour of an edge that is a version of $e_{i+1}$ rerouted towards $u$ rather than $w$. The flip of $e_{\deg(w)-1}$ creates an edge between $u$ and $v$ enclosing $w$ within a degenerate face, and flipping $e_{\deg(w)}$ in the case where $u$ is the origin ensures that the degree 1 vertex $w$ is a neighbour of the origin (see Figure~\ref{fig:internal root}). Indeed, one can identify $u$ and $w$ in $q_i$ by collapsing the face lying directly to the right of the root and obtain the quadrangulation $\coll{q,c}$; the corner $c_i$ is defined in such a way that this is exactly the effect of taking $\coll{q,c_i}$. \end{proof} We will now construct a path of flips from $q$ to $\rightarrow\cdot\coll{q,c}$ in the case where $c$ is a corner within a non-degenerate face. \begin{lemma}\label{lemma:complete path} Let $c$ be a corner within a non-degenerate face $f$ of a quadrangulation $q\in\sQ_n$; if $f$ has four distinct vertices then let $c=c_1,c_2,c_3,c_4$ be a clockwise contour of $f$, and let $v_1,v_2,v_3,v_4$ be the corresponding vertices. If $f$ has three distinct vertices, then let $c_1,c_2,c_3,c_4$ be a clockwise contour of $f$ such that $c_1$ and $c_4$ are adjacent to the same vertex $v_1$, and let $v_2, v_3$ be the vertices of $c_2,c_3$. If the root edge of $q$ has $v_2$ as an endpoint, let $w=v_4$; otherwise, let $w=v_2$. Let $e_1,e_2,\ldots, e_{\deg(w)}$ be the edges adjacent to $w$, in clockwise order, indexed in such a way that $e_1$ and $e_{\deg(w)}$ are on the boundary of $f$. Set $P_1(q,c)=(q_i,e_i,-)_{i=1}^{\deg(w)-1}$, where $q_1=q$ and $q_{i+1}=q_i^{e_i,-}$ for $i=1,\ldots,\deg(w)$. Now set $P_2(q,c)=P(q_{\deg(w)},c')$, where $c'$ is any corner of the face containing the edge $e_{\deg(w)}$ in $q_{\deg(w)}$ (which is a degenerate face). Set $P(q,c)$ to be the concatenation of $P_1(q,c)$ and $P_2(q,c)$. Then $P(q,c)=(q_i,e_i,s_i)_{i=1}^{N}$ is well defined and we have $q_N^{e_N,s_N}=\rightarrow\cdot \coll{q,c}$. Moreover, we have $N<8n$ and, setting $c'_i$ to be the corner corresponding to the edge $e_i$ in $q_i$, oriented towards $w$ for $i=1,\ldots,\deg w$, and oriented towards the vertex $v_i$ from the construction of Lemma~\ref{lemma:P_1(q,c)} for $N\geq i>\deg w$, we have $\coll{q _i,c'_i}=\coll{q,c}$. \end{lemma} \begin{figure}\centering \begin{tikzpicture} \clip[use as bounding box] (-1.3,-1.7) rectangle (1.3,2.5); \begin{pgfonlayer}{nodelayer} \begin{scope}[yscale=1,xscale=-1] \node [style=vertex] (0) at (-1, -0) {}; \node [style=vertex, label=below:$w$] (1) at (0, 1) {}; \node [style=vertex] (2) at (1, -0) {}; \node [style=vertex,label=below:$\emptyset$] (3) at (0, -1) {}; \node [style=vertex] (4) at (-0.75, 2) {}; \node [style=vertex] (5) at (0.5, 2.25) {}; \node at (0.7,0.7) {$e_1$}; \node at (0.5,1.5) {$e_2$}; \node at (-0.8,1.5) {$e_3$}; \node at (-0.7,0.7) {$e_4$}; \end{scope} \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw[quad] (4) to (1); \draw[quad] (1) to (5); \draw[quad] (1) to (0); \draw[quad] (0) to (3); \draw[quad,very thick,->] (3) to (2); \draw[quad] (2) to (1); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \clip[use as bounding box] (-1.3,-1.7) rectangle (1.3,2.5); \begin{pgfonlayer}{nodelayer} \begin{scope}[yscale=1,xscale=-1] \node [style=vertex] (0) at (-1, -0) {}; \node [style=vertex, label=below:$w$] (1) at (0, 1) {}; \node [style=vertex] (2) at (1, -0) {}; \node [style=vertex,label=below:$\emptyset$] (3) at (0, -1) {}; \node [style=vertex] (4) at (-0.75, 2) {}; \node [style=vertex] (5) at (0.5, 2.25) {}; \node at (0.5,0.7) {\contour{white}{$e_1$}}; \node at (0.5,1.5) {\contour{white}{$e_2$}}; \node at (-0.8,1.5) {$e_3$}; \node at (-0.7,0.7) {$e_4$}; \end{scope} \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw[quad] (4) to (1); \draw[quad] (1) to (5); \draw[quad] (1) to (0); \draw[quad] (0) to (3); \draw[quad,very thick,->] (3) to (2); \draw[very thick, dashed, blue] (2) to (1); \draw[very thick, blue, bend right=20] (5) to (3); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \clip[use as bounding box] (-1.3,-1.7) rectangle (1.3,2.5); \begin{pgfonlayer}{nodelayer} \begin{scope}[yscale=1,xscale=-1] \node [style=vertex] (0) at (-1, -0) {}; \node [style=vertex, label=below:$w$] (1) at (0, 1) {}; \node [style=vertex] (2) at (1, -0) {}; \node [style=vertex,label=below:$\emptyset$] (3) at (0, -1) {}; \node [style=vertex] (4) at (-0.75, 2) {}; \node [style=vertex] (5) at (0.5, 2.25) {}; \node at (0.5,1.5) {\contour{white}{$e_2$}}; \node at (-0.8,1.5) {$e_3$}; \node at (-0.7,0.7) {$e_4$}; \end{scope} \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw[quad] (4) to (1); \draw[very thick, blue, dashed] (1) to (5); \draw[quad] (1) to (0); \draw[quad] (0) to (3); \draw[quad,very thick,->] (3) to (2); \draw[quad, bend right=20] (5) to (3); \draw[very thick, blue, out=180, in=120] (4) to (3); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture} \clip[use as bounding box] (-1.3,-1.7) rectangle (1.3,2.5); \begin{pgfonlayer}{nodelayer} \begin{scope}[yscale=1,xscale=-1] \node [style=vertex] (0) at (-1, -0) {}; \node [style=vertex, label=below:$w$] (1) at (0, 1) {}; \node [style=vertex] (2) at (1, -0) {}; \node [style=vertex,label=below:$\emptyset$] (3) at (0, -1) {}; \node [style=vertex] (4) at (-0.75, 2) {}; \node [style=vertex] (5) at (0.5, 2.25) {}; \node at (-0.8,1.5) {$e_3$}; \node at (-0.7,0.7) {\contour{white}{$e_4$}}; \end{scope} \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw[very thick, blue, dashed] (4) to (1); \draw[quad] (1) to (0); \draw[quad] (0) to (3); \draw[quad,very thick,->] (3) to (2); \draw[quad, bend right=20] (5) to (3); \draw[quad, out=180, in=120] (4) to (3); \draw[very thick, blue, out=110, in=110, looseness=4] (0) to (3); \end{pgfonlayer} \end{tikzpicture} \caption{\label{fig:face collapse}The quadrangulations $q_1,q_2,\ldots,q_{\deg w}$ in the path $P(q,c)$, where $c$ is a corner not belonging to a degenerate face.} \end{figure} \begin{proof} First of all, notice that the root edge does not appear in $\{e_1,e_2,\ldots,e_{\deg w}\}$ so that all of the first $\deg w-1$ flips are ``allowed'': if it did, given our choice of $w$ then the root edge would have both $v_2$ and $v_4$ as endpoints; but this would create a cycle of length $3$ in the quadrangulation $q$, which is bipartite. We can show inductively that $\coll{q_i,c'_i}=\coll{q,c}$ for $i=2,\ldots,\deg w-1$. Let $e_1,e_{\deg_w},\eta,\eta'$ be the edges forming the boundary of $f$ in $q$, named in clockwise order. The quadrangulation $\coll{q,c}$ is obtained by identifying $e_1$ with $\eta'$ and $e_{\deg w}$ with $\eta$, thus collapsing $f$; equivalently, it is obtained by first erasing either $e_1$ or $\eta'$ (i.e.~an edge adjacent to $c$ in $f$), and identifying $e_{\deg w}$ with $\eta$ (the edges opposite $c$). Consider now the quadrangulation $q_2=q^{e_1,-}$; the clockwise boundary of the face lying to the left of the flipped oriented edge $e_1$ is formed by $e_2,e_{\deg w},\eta,-e_1$, with $e_1$ and $e_2$ being adjacent to $c'_2$. We thus have that $\coll{q_2,c'_2}$ can be obtained by first erasing $e_1$, then identifying $e_{\deg w}$ with $\eta$. But, since the map obtained from $q$ by erasing $e_1$ and the map obtained from $q_2$ by erasing the flipped $e_1$ are exactly the same (with all labels assigned to objects in the same way), it follows that $\coll{q_2,c'_2}=\coll{q,c}$. The argument can be repeated to show that, for $i\leq\deg w$, $\coll{q_i,c'_i}=\coll{q_{i-1},c'_{i-1}}$ (because the two are obtained in the same way from the coinciding maps created by erasing $e_{i-1}$ from $q_{i-1}$ and $q_i$). Consider now the quadrangulation $q_{\deg w}$; in it, the degree of $w$ is $1$, and therefore $e_w$ is the internal edge of a degenerate face $f'$ (and is not the root edge). Moreover, collapsing $f'$ yields $\coll{q,c}$. We can thus invoke Lemma~\ref{lemma:P_1(q,c)}, which tells us that $P(q_{\deg w},c')$, where $c'$ is a corner of $f'$, is a flip path of length at most $6n$ ending with $\rightarrow\cdot \coll{q_{\deg w},c'}=\rightarrow\cdot \coll{q,c}$, and that $\coll{q_i,c'_i}=\coll{q_{\deg w}, c'}=\coll{q,c}$ for $i>\deg w$. The estimate for $|P(q,c)|$ follows from the fact that $\deg w < 2n=|E(q)|$. \end{proof} Via the three lemmas above, for all pairs $(q,c)$, where $q\in\sQ_n$ and $c$ is a corner of $q$, we have constructed a canonical path $P(q,c)=(q_i,e_i,s_i)_{i=1}^N$ such that $q_N^{e_N,s_N}=\rightarrow\cdot\coll{q,c}$. The crucial property of these canonical paths is highlighted by the corollary below: \begin{cor}\label{cor:few corners} Consider any triple $(q,e,s)$, where $q\in\sQ_n$, $e$ is an edge of $q$ other than the root edge and $s=\pm$. Suppose $(q,e,s)$ appears in the sequence $P(q',c')$ for some $q'\in\sQ_n$ and some corner $c'$ of $q'$. Let $c_1,c_2$ be the corners of $q$ that correspond to the two possible orientations of $e$; we have $\coll{q',c'}\in\{\coll{q,c_1},\coll{q,c_2}\}$.\end{cor} \subsection{Completing the description of $\Psi_{q_1,q_2}$}\label{sec:completing psi} \begin{figure}[t]\centering \begin{tikzpicture}[scale=.5] \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-3, -0) {}; \node [style=vertex] (1) at (2, -0) {}; \node [style=vertex] (2) at (-6, -0) {}; \node [style=vertex] (3) at (-1.5, 1.25) {}; \node [style=vertex] (4) at (1, 1.5) {}; \node [style=vertex] (5) at (-2, 0.25) {}; \node [style=vertex] (6) at (0.75, -1.5) {}; \node [style=vertex] (7) at (-0.5, 0.75) {}; \node [style=vertex] (8) at (0.25, 1) {}; \node [style=vertex] (9) at (-5, 0.5) {}; \node [style=vertex] (10) at (-4, 0.5) {}; \node [style=vertex] (11) at (-5, -0.5) {}; \node [style=vertex] (12) at (-4, -0.5) {}; \node (x) at (-0.25, 3.2) {\small\contour{white}{$\eta$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \begin{scope} \clip (3.center) [bend right=75, looseness=1.75] to (4.center) [bend right=30, looseness=1.00] to (3.center); \draw[draw=red, fill=red!20] (3) circle (20pt); \end{scope} \draw [bend left=90, looseness=1.75, very thick, red] (0) to (1); \draw [bend right=90, looseness=1.75, very thick, red, ->] (0) to (1); \draw [bend left=90, looseness=1.50, very thick, blue, <-] (2) to (0); \draw [bend right=90, looseness=1.50, very thick, blue] (2) to (0); \draw [bend right=60, looseness=1.50] (0) to (3); \draw [bend right=75, looseness=1.75] (3) to (4); \draw (4) to (1); \draw (0) to (3); \draw (5) to (0); \draw (4) to (6); \draw [bend right, looseness=1.00] (0) to (6); \draw (8) to (4); \draw [bend left, looseness=1.00] (7) to (4); \draw [bend right=45, looseness=1.00] (7) to (4); \draw [bend left, looseness=1.00] (3) to (4); \draw (2) to (9); \draw (9) to (10); \draw (10) to (0); \draw (2) to (11); \draw (11) to (12); \draw (12) to (0); \draw (2) to (0); \end{pgfonlayer} \end{tikzpicture}\quad \begin{tikzpicture}[scale=.5] \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-3, -0) {}; \node [style=vertex] (1) at (2, -0) {}; \node [style=vertex] (2) at (-6, -0) {}; \node [style=vertex] (3) at (-1.5, 1.25) {}; \node [style=vertex] (4) at (1, 1.5) {}; \node [style=vertex] (5) at (-2, 0.25) {}; \node [style=vertex] (6) at (0.75, -1.5) {}; \node [style=vertex] (7) at (-2, 2.45) {}; \node [style=vertex] (8) at (-0.25, 1) {}; \node [style=vertex] (9) at (-5, 0.5) {}; \node [style=vertex] (10) at (-4, 0.5) {}; \node [style=vertex] (11) at (-5, -0.5) {}; \node [style=vertex] (12) at (-4, -0.5) {}; \node (x) at (-0.25, 3.7) {\small\contour{white}{$\eta$}}; \node (x) at (-2.5, 1.5) {\small\contour{white}{$\eta'$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [bend left=90, looseness=2.2, very thick, red] (0) to (1); \draw [bend right=90, looseness=1.75, very thick, red, ->] (0) to (1); \draw [bend left=90, looseness=1.50, very thick, blue, <-] (2) to (0); \draw [bend right=90, looseness=1.50, very thick, blue] (2) to (0); \draw [bend right=60, looseness=1.50] (0) to (3); \draw [bend right=75, looseness=1.75] (3) to (4); \draw (4) to (1); \draw (0) to (3); \draw (5) to (0); \draw (4) to (6); \draw [bend right, looseness=1.00] (0) to (6); \draw (8) to (4); \draw [bend left, looseness=1.00] (3) to (4); \draw (2) to (9); \draw (9) to (10); \draw (10) to (0); \draw (2) to (11); \draw (11) to (12); \draw (12) to (0); \draw (2) to (0); \draw [bend left=80, looseness=1.5] (0) to (1); \draw [out=85, in=220, looseness=0.8] (0) to (7); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture}[scale=.5] \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-3, -0) {}; \node [style=vertex] (1) at (2, -0) {}; \node [style=vertex] (2) at (-6, -0) {}; \node [style=vertex] (3) at (-1.5, 1.25) {}; \node [style=vertex] (4) at (1, 1.5) {}; \node [style=vertex] (5) at (-2, 0.25) {}; \node [style=vertex] (6) at (0.75, -1.5) {}; \node [style=vertex] (7) at (-4.5, 2.1) {}; \node [style=vertex] (8) at (-0.25, 1) {}; \node [style=vertex] (9) at (-5, 0.5) {}; \node [style=vertex] (10) at (-4, 0.5) {}; \node [style=vertex] (11) at (-5, -0.5) {}; \node [style=vertex] (12) at (-4, -0.5) {}; \node (x) at (-4.5, 3) {\small\contour{white}{$\eta$}}; \node (x) at (-3.8, 2) {\small\contour{white}{$\eta'$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [bend right=90, looseness=1.75, very thick, red, ->] (0) to (1); \draw [bend left=90, looseness=1.50] (2) to (0); \draw [bend right=90, looseness=1.50, very thick, blue] (2) to (0); \draw [bend right=60, looseness=1.50] (0) to (3); \draw [bend right=75, looseness=1.75] (3) to (4); \draw (4) to (1); \draw (0) to (3); \draw (5) to (0); \draw (4) to (6); \draw [bend right, looseness=1.00] (0) to (6); \draw (8) to (4); \draw [bend left, looseness=1.00] (3) to (4); \draw (2) to (9); \draw (9) to (10); \draw (10) to (0); \draw (2) to (11); \draw (11) to (12); \draw (12) to (0); \draw (2) to (0); \draw [bend left=90, looseness=2.50, very thick, blue, <-] (2) to (0); \draw [bend left=90, looseness=1.5, red, very thick] (0) to (1); \draw [out=90, in=0, looseness=0.8] (0) to (7); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture}[scale=.5] \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-3, -0) {}; \node [style=vertex] (1) at (2, -0) {}; \node [style=vertex] (2) at (-6, -0) {}; \node [style=vertex] (3) at (-1.5, 1.25) {}; \node [style=vertex] (4) at (1, 1.5) {}; \node [style=vertex] (5) at (-2, 0.25) {}; \node [style=vertex] (6) at (0.75, -1.5) {}; \node [style=vertex] (7) at (-4.5, 2.1) {}; \node [style=vertex] (8) at (-0.25, 1) {}; \node [style=vertex] (9) at (-5, 0.5) {}; \node [style=vertex] (10) at (-4, 0.5) {}; \node [style=vertex] (11) at (-5, -0.5) {}; \node [style=vertex] (12) at (-4, -0.5) {}; \node (x) at (-4.5, 3) {\small\contour{white}{$\eta$}}; \node (x) at (-5.2, 2) {\small\contour{white}{$\eta'$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [bend right=90, looseness=1.75, very thick, red, ->] (0) to (1); \draw [bend left=90, looseness=1.50] (2) to (0); \draw [bend right=90, looseness=1.50, very thick, blue] (2) to (0); \draw [bend right=60, looseness=1.50] (0) to (3); \draw [bend right=75, looseness=1.75] (3) to (4); \draw (4) to (1); \draw (0) to (3); \draw (5) to (0); \draw (4) to (6); \draw [bend right, looseness=1.00] (0) to (6); \draw (8) to (4); \draw [bend left, looseness=1.00] (3) to (4); \draw (2) to (9); \draw (9) to (10); \draw (10) to (0); \draw (2) to (11); \draw (11) to (12); \draw (12) to (0); \draw (2) to (0); \draw [bend left=90, looseness=2.50, very thick, blue, <-] (2) to (0); \draw [bend left=90, looseness=1.5, red, very thick] (0) to (1); \draw [out=90, in=180, looseness=0.8] (2) to (7); \end{pgfonlayer} \end{tikzpicture}\\ \hspace{.5cm}\small{$(\coll{L,c}\cdot q_i^R, e_i^R, s_i^R)_{i=1}^{N_R}$\hspace{.7cm} $\rightsquigarrow$ flip $\eta$ clockwise $\rightsquigarrow$\hspace{.3cm} $\rightsquigarrow$ flip $\eta'$ clockwise $\rightsquigarrow$}\\ \begin{tikzpicture}[scale=.5] \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-3, -0) {}; \node [style=vertex] (1) at (2, -0) {}; \node [style=vertex] (2) at (-6, -0) {}; \node [style=vertex] (3) at (-1.5, 1.25) {}; \node [style=vertex] (4) at (1, 1.5) {}; \node [style=vertex] (5) at (-2, 0.25) {}; \node [style=vertex] (6) at (0.75, -1.5) {}; \node [style=vertex] (7) at (-4.5, -2.1) {}; \node [style=vertex] (8) at (-0.25, 1) {}; \node [style=vertex] (9) at (-5, 0.5) {}; \node [style=vertex] (10) at (-4, 0.5) {}; \node [style=vertex] (11) at (-5, -0.5) {}; \node [style=vertex] (12) at (-4, -0.5) {}; \node (x) at (-4.5, -3) {\small\contour{white}{$\eta$}}; \node (x) at (-5.2, -2) {\small\contour{white}{$\eta'$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [bend right=90, looseness=1.75, very thick, red, ->] (0) to (1); \draw [bend left=90, looseness=1.50, very thick, blue, <-] (2) to (0); \draw [bend right=90, looseness=1.50] (2) to (0); \draw [bend right=60, looseness=1.50] (0) to (3); \draw [bend right=75, looseness=1.75] (3) to (4); \draw (4) to (1); \draw (0) to (3); \draw (5) to (0); \draw (4) to (6); \draw [bend right, looseness=1.00] (0) to (6); \draw (8) to (4); \draw [bend left, looseness=1.00] (3) to (4); \draw (2) to (9); \draw (9) to (10); \draw (10) to (0); \draw (2) to (11); \draw (11) to (12); \draw (12) to (0); \draw (2) to (0); \draw [bend right=90, looseness=2.50, very thick, blue] (2) to (0); \draw [bend left=90, looseness=1.5, red, very thick] (0) to (1); \draw [out=-90, in=180, looseness=0.8] (2) to (7); \end{pgfonlayer} \end{tikzpicture} \begin{tikzpicture}[scale=.5] \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-3, -0) {}; \node [style=vertex] (1) at (2, -0) {}; \node [style=vertex] (2) at (-6, -0) {}; \node [style=vertex] (3) at (-1.5, 1.25) {}; \node [style=vertex] (4) at (1, 1.5) {}; \node [style=vertex] (5) at (-2, 0.25) {}; \node [style=vertex] (6) at (0.75, -1.5) {}; \node [style=vertex] (7) at (-4.5, -2.1) {}; \node [style=vertex] (8) at (-0.25, 1) {}; \node [style=vertex] (9) at (-5, 0.5) {}; \node [style=vertex] (10) at (-4, 0.5) {}; \node [style=vertex] (11) at (-5, -0.5) {}; \node [style=vertex] (12) at (-4, -0.5) {}; \node (x) at (-4.5, -3) {\small\contour{white}{$\eta$}}; \node (x) at (-3.7, -2) {\small\contour{white}{$\eta'$}}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \draw [bend right=90, looseness=1.75, very thick, red, ->] (0) to (1); \draw [bend left=90, looseness=1.50, very thick, blue, <-] (2) to (0); \draw [bend right=90, looseness=1.50] (2) to (0); \draw [bend right=60, looseness=1.50] (0) to (3); \draw [bend right=75, looseness=1.75] (3) to (4); \draw (4) to (1); \draw (0) to (3); \draw (5) to (0); \draw (4) to (6); \draw [bend right, looseness=1.00] (0) to (6); \draw (8) to (4); \draw [bend left, looseness=1.00] (3) to (4); \draw (2) to (9); \draw (9) to (10); \draw (10) to (0); \draw (2) to (11); \draw (11) to (12); \draw (12) to (0); \draw (2) to (0); \draw [bend right=90, looseness=2.50, very thick, blue] (2) to (0); \draw [bend left=90, looseness=1.5, red, very thick] (0) to (1); \draw [out=-90, in=0, looseness=0.8] (0) to (7); \end{pgfonlayer} \end{tikzpicture} \qquad \begin{tikzpicture}[scale=.5] \begin{pgfonlayer}{nodelayer} \node [style=vertex] (0) at (-3, -0) {}; \node [style=vertex] (1) at (2, -0) {}; \node [style=vertex] (2) at (-6, -0) {}; \node [style=vertex] (3) at (-1.5, 1.25) {}; \node [style=vertex] (4) at (1, 1.5) {}; \node [style=vertex] (5) at (-2, 0.25) {}; \node [style=vertex] (6) at (0.75, -1.5) {}; \node [style=vertex] (8) at (-0.25, 1) {}; \node [style=vertex] (9) at (-5, 0.5) {}; \node [style=vertex] (10) at (-4, 0.5) {}; \node [style=vertex] (11) at (-5, -0.5) {}; \node [style=vertex] (12) at (-4, -0.5) {}; \node [style=vertex] (13) at (-5, 1.5) {}; \node [style=vertex] (14) at (-4, 1.5) {}; \end{pgfonlayer} \begin{pgfonlayer}{edgelayer} \begin{scope} \clip (2.center) to (13.center) to (9.center) to (2.center); \draw[draw=blue, fill=blue!20] (2) circle (25pt); \end{scope} \draw [bend right=90, looseness=1.75, very thick, red, ->] (0) to (1); \draw [bend right=90, looseness=1.50, very thick, blue] (2) to (0); \draw [bend right=60, looseness=1.50] (0) to (3); \draw [bend right=75, looseness=1.75] (3) to (4); \draw (4) to (1); \draw (0) to (3); \draw (5) to (0); \draw (4) to (6); \draw [bend right, looseness=1.00] (0) to (6); \draw (8) to (4); \draw [bend left, looseness=1.00] (3) to (4); \draw (2) to (9); \draw (9) to (10); \draw (10) to (0); \draw (2) to (11); \draw (11) to (12); \draw (12) to (0); \draw (2) to (0); \draw [bend left=90, looseness=2.50, very thick, blue, <-] (2) to (0); \draw [bend left=90, looseness=1.5, red, very thick] (0) to (1); \draw (2)--(13)--(14)--(0); \end{pgfonlayer} \end{tikzpicture}\\ \hspace{-4cm}\small{$\rightsquigarrow$ flip $\eta$ clockwise $\rightsquigarrow$\hspace{.3cm} $\rightsquigarrow$ flip $\eta'$ clockwise $\rightsquigarrow$ \hspace{.7cm}$((q_i^L\cdot \coll{R,c'}, e_i^L, s_i^L)_{i=1}^{N_L})^{\rm{rev}}$} \caption{\label{fig:complete path}The path $P(\coll{L,c}\cdot R, L\cdot \coll{R,c'})$; notice how the four flips in the ``central phase'' of the path turn the result of the ``right phase'', which is $\coll{L,c}\cdot (\rightarrow \cdot \coll{R,c'})$, into the quadrangulation $(\rightarrow \cdot \coll{L,c}) \cdot \coll{R,c'}$, so that the ``left phase'' can begin and turn the quadrangulation into the desired $L\cdot \coll{R,c'}$. Note that the root edge of the quadrangulation is always the one marked in red appearing in the lower right part of the picture; the arrow marked in blue represents the root edge of the ``left quadrangulation'' and is marked to help confirm the fact above. } \end{figure} Given $(L_i\cdot R_i)_{i=0}^{n-1}\in\Gamma_q^{q'}$, we now wish to build a flip path turning the quadrangulation $L_i\cdot R_i$ into $L_{i+1}\cdot R_{i+1}$. That is, given $L\in\sQ_a$ and $R\in\sQ_{n-a-1}$ and two corners $c$ and $c'$ of $L$ and $R$ respectively, we wish to build a flip path from $\coll{L,c}\cdot R$ to $L\cdot\coll{R,c'}$. This we shall do by simply combining multiple constructions from the previous section. Indeed, consider $P(L,c)=(q^L_i,e^L_i,s^L_i)_{i=1}^{N_L}$ and $P(R,c')=(q^R_i,e^R_i,s^R_i)_{i=1}^{N_R}$ as constructed previously. Though the edge $e_1^R$ is an edge of $R$, it can be uniquely identified with an edge of $\coll{L,c}\cdot R$; inductively, though $e_i^R$ is an edge of $q_i^R$, we can see it as an edge of $\coll{L,c}\cdot q_i^R=\coll{L,c}\cdot (q_{i-1}^R)^{e^R_{i-1},s^R_{i-1}}$. We may therefore consider the sequence of flips $(\coll{L,c}\cdot q^R_i,e^R_i,s^R_i)_{i=1}^{N_R}$, which is such that $(\coll{L,c}\cdot q^R_{N_R})^{e^R_{N_R},s^R_{N_R}}$ is equal to $\coll{L,c}\cdot (\rightarrow\cdot \coll{R,c'})$. Now consider the face $f$ lying directly to the right of the root in $\coll{L,c}\cdot (\rightarrow\cdot \coll{R,c'})$, let $\eta$ be the edge immediately after the root edge in the clockwise contour of $f$ and let $\eta'$ be the internal edge of the degenerate face adjacent to $\eta$ within the ``right'' quadrangulation $\rightarrow\cdot \coll{R,c'}$. By alternatively flipping $\eta$ and $\eta'$, one can have the degenerate face containing $\eta'$ ``slide'' along the boundary of $f$. Consider in particular the sequence of four flips $$(\coll{L,c}\cdot (\rightarrow\cdot \coll{R,c'}), \eta, +)$$ $$((\coll{L,c}\cdot (\rightarrow\cdot \coll{R,c'}))^{\eta,+}, \eta', +)$$ $$(((\coll{L,c}\cdot (\rightarrow\cdot \coll{R,c'}))^{\eta,+})^{\eta',+}, \eta, +)$$ $$((((\coll{L,c}\cdot (\rightarrow\cdot \coll{R,c'}))^{\eta,+})^{\eta',+})^{\eta,+}, \eta', +)$$ as depicted in Figure~\ref{fig:complete path}. After the first flip, the degenerate face containing $\eta'$ lies immediately to the left of the root edge in the ``left quadrangulation'' obtained as described in Section~\ref{sec:canonical paths 1} and shown in Figure~\ref{fig:eye quadrangulation}; the next three flips make it so that the degenerate face lies immediately to the \emph{right} of the root edge of the ``left quadrangulation'', with $\eta'$ adjacent to the origin. The result of the four flips is therefore $(\rightarrow\cdot\coll{L,c})\cdot \coll{R,c'}$. We can thus define the whole path from $\coll{L,c}\cdot R$ to $L\cdot\coll{R,c'}$, which we shall denote by $P(\coll{L,c}\cdot R, L\cdot\coll{R,c'})$, by a concatenation of the following sequences of flips, which we will refer to as the ``right phase'', the ``central phase'' (consisting of $4$ flips), the ``left phase'': \newcommand{\operatorname{rev}}{\operatorname{rev}} \begin{itemize} \item right phase: $$(\coll{L,c}\cdot q^R_i,e^R_i,s^R_i)_{i=1}^{N_R}$$ \item central phase: $$(\coll{L,c}\cdot (\rightarrow\cdot \coll{R,c'}), \eta, +)$$ $$((\coll{L,c}\cdot (\rightarrow\cdot \coll{R,c'}))^{\eta,+}, \eta', +)$$ $$(((\coll{L,c}\cdot (\rightarrow\cdot \coll{R,c'}))^{\eta,+})^{\eta',+}, \eta, +)$$ $$((((\coll{L,c}\cdot (\rightarrow\cdot \coll{R,c'}))^{\eta,+})^{\eta',+})^{\eta,+}, \eta', +)$$ \item left phase: $$((q_i^L\cdot \coll{R,c'},e^L_i,s^L_i)_{i=1}^{N_L})^{\operatorname{rev}},$$ \end{itemize} where, given a flip path $P=(q_i,e_i,s_i)_{i=1}^N\in\Gamma_{q_1\rightarrow q_N^{e_N,s_N}}$, we set $P^{\operatorname{rev}}$ to be the flip path $$(q_{N-i}^{e_{N+1-i},s_{N+1-i}},e_{N+1-i},-s_{N+1-i})_{i=1}^N$$ in $\Gamma_{q_N^{e_N,s_N}\rightarrow q_1}$. We are now ready to fully describe the mapping $\Psi_{q_1,q_2}$: given $q_1,q_2\in\sQ_n$, consider any pair of sequences $((L^1_i\cdot R^1_i)_{i=0}^{n-1},(L^2_i\cdot R^2_i)_{i=0}^{n-1})\in\Gamma_{q_1}^{F(q_1,q_2)}\times\Gamma_{q_2}^{F(q_1,q_2)}$ that has nonzero probability according to $\P_{q_1}^{F(q_1,q_2)}\otimes\P_{q_2}^{F(q_1,q_2)}$. Set $\Psi_{q_1,q_2}((L^1_i\cdot R^1_i)_{i=0}^{n-1},(L^2_i\cdot R^2_i)_{i=0}^{n-1})$ to be the successive concatenation of \begin{itemize} \item $P(q_1,c)$, where $R^1_0=\coll{q_1,c}$; \item $P((L^1_i,R^1_i),(L^1_{i+1},R^1_{i+1}))$ for $i=0,\ldots,n-2$; \item $P((L^2_{i-1},R^2_{i-1}),(L^2_i,R^2_i))^{\operatorname{rev}}$ for $i=n-1,n-2,\ldots,1$; \item $P(q_2,c')^{\operatorname{rev}}$, where $R^2_0=\coll{q_2,c'}$. \end{itemize} We also have all the setup necessary to show the following important estimate: \begin{proposition}\label{prop:final estimate} Consider a quadrangulation $q\in\sQ_n$, an edge $e$ of $q$ other than the root edge and an element $s\in\{+,-\}$. We have $$\sum_{q_1,q_2\in\sQ_n}\P_{q_1\rightarrow q_2}(\{\gamma\in\Gamma_{q_1\rightarrow q_2}\mbox{ containing } (q,e,s)\})\leq 8\cdot 12^{n+1}.$$ \end{proposition} \begin{proof} By our definition of $\P_{q_1\rightarrow q_2}$, the expression we wish to estimate is $$\sum_{q_1,q_2\in\sQ_n}\P_{q_1}^{F(q_1,q_2)}\otimes\P_{q_2}^{F(q_1,q_2)}(\{X\in\Gamma_{q_1}^{F(q_1,q_2)}\times\Gamma_{q_2}^{F(q_1,q_2)}\mid \Psi_{q_1,q_2}(X)\mbox{ contains } (q,e,s)\}).$$ We will use as an upper bound the one we obtain by summing the terms corresponding to the following three possibilities: \begin{itemize} \item the flip $(q,e,s)$ appears in $P(q_1,c)$ or $P(q_2,c')^{\operatorname{rev}}$, in which case $R^1_0=\coll{q_1,c}\in\{\coll{q,x_1},\coll{q,x_2}\}$ or $R^2_0=\coll{q_2,c'}\in\{\coll{q^e,y_1},\coll{q^e,y_2}\}$, where $x_1,x_2$ are the corners of $q$ that correspond to the two possible orientations of $e$ and $y_1,y_2$ are the corners of $q^e$ that correspond to the two possible orientations of the flipped version of $e$, by Corollary~\ref{cor:few corners}. Now, by Lemma~\ref{key estimate}, we have $$\sum_{i=1,2}\sum_{q_1,q_2}\P_{q_1}^{F(q_1,q_2)}(R^1_0=\coll{q,x_i})+\P_{q_2}^{F(q_1,q_2)}(R^2_0=\coll{q^e,y_i})=$$ $$=\sum_{i=1,2}[\sum_{q_1,q'}|\{q_2\mid F(q_1,q_2)=q'\}|\cdot \P_{q_1}^{q'}(R^1_0=\coll{q,x_i}, L^1_0=\rightarrow)+$$ $$\sum_{q_2,q'}|\{q_1\mid F(q_1,q_2)=q'\}|\cdot \P_{q_2}^{q'}(R^2_0=\coll{q^e,y_i}, L^2_0=\rightarrow)]\leq$$ $$\leq 4\cdot 12 \cdot 12^{2n-(n-1)-1}=4\cdot 12^n. $$ \item The flip $(q,e,s)$ appears in $P(L^1_i\cdot R^1_i, L^1_{i+1}\cdot R^1_{i+1})$ for some $i$; we shall consider some separate subcases: \begin{itemize} \item we have $q=q_L\cdot q_R\in\sQ_l\cdot\sQ_r$ and $e$ is the image of an edge other than the root edge in $E(q_L)$ (so that $q^{e,s}$ also lies in $\sQ_l\cdot\sQ_r$, and in fact in $\sQ_l\cdot q_R$). Let $c_1,c_2$ be the corners corresponding to the two possible orientations of $e$ in $q^e$. If $(q,e,s)$ is a flip in the ``central phase'' of the path, with $e=\eta$ or $e=\eta'$ (see Figure~\ref{fig:complete path}), then at least one of the corner $c_1,c_2$ lies in the degenerate face that is in the process of being moved along the boundary of the ``left'' quadrangulation; as a consequence, we have $L^1_i\in\{\coll{q^e_L,c_1},\coll{q^e_L,c_2}\}$, hence $i=l-1$ and $R^1_{i+1}=q_R$. If not, then the flip happens in the ``left phase'' of the path and Corollary~\ref{cor:few corners} implies that $L^1_i\in\{\coll{q^e_L,c_1},\coll{q^e_L,c_2}\}$, hence $i=l-1$ and $R^1_{i+1}=q_R$. Thus we have the term $$\sum_{i\in\{1,2\}}\sum_{q_1,q_2}\P_{q_1}^{F(q_1,q_2)}(L^1_{l-1}=\coll{q^e_L,c_i},R^1_l=q_R)\leq 2\cdot 12\cdot 12^{2n-(l-1)-(n-l-1)-1}=2\cdot 12^{n+1}.$$ \item we have $q=q_L\cdot q_R\in\sQ_l\cdot\sQ_r$ and $e$ is the image of an edge other than the root edge in $E(q_R)$. This case is analogous: this time Corollary~\ref{cor:few corners} gives $L^1_l=q_L$ and $R^1_{l+1}\in\{\coll{q_R,c_1},\coll{q_R,c_2}\}$, where $c_1,c_2$ are the corners of $q$ corresponding to the two possible orientations of $e$. This yields another term of the form $$\sum_{i\in\{1,2\}}\sum_{q_1,q_2}\P_{q_1}^{F(q_1,q_2)}(L^1_{l}=q_L,R^1_{l+1}=\coll{q_R,c_i})\leq 2\cdot 12\cdot 12^{2n-l-(n-l-2)-1}=2\cdot 12^{n+1}.$$ \item we have $q\in\sQ_l\cdot\sQ_r$ and $q^{e,s}\in\sQ_{l+1}\cdot\sQ_{r-1}$. This is the only case we are missing, i.e.~the one where $e$ is the edge right after the root edge of $q$ in the clockwise contour of the face lying directly to the right of the root edge (it can be seen that, by construction, all other flips in $P(L^1_i\cdot R^1_i, L^1_{i+1}\cdot R^1_{i+1})$ happen within $q_L$ or within $q_R$. In this case, if $q^{e,s}=q'_L\cdot q'_R$, we have $L^1_i=q_L$ and $R^1_{i+1}=q'_R$, hence $i=l$; we get the term $$\sum_{q_1,q_2}\P_{q_1}^{F(q_1,q_2)}(L^1_{l}=q_L,R^1_{l+1}=q'_R)\leq 12\cdot 12^{2n-l-(n-l-2)-1}=12^{n+1}.$$ \end{itemize} Globally, this yields a term that can be upper bounded by $2\cdot 12^{n+1}$. \item The flip $(q,e,s)$ appears in $P(L^2_i\cdot R^2_i, L^2_{i+1}\cdot R^2_{i+1})^{\operatorname{rev}}$ for some $i$; clearly, this case is entirely analogous to the previous one, and will yield another term upper bounded by $2\cdot 12^{n+1}$. \end{itemize} Summing the three upper bounds above proves the lemma. \end{proof} \section{The final bound}\label{sec:final bound} All this being done, we can apply the technique of canonical paths of Diaconis and Saloff-Coste \cite{diaconis96} to bound the relaxation time of $\F_n$. \begin{proof}[Proof of Theorem~\ref{main theorem}] The fact that $\nu_n=\mu_n$ is an obvious consequence of Proposition~\ref{prop:from rotations to flips}. The upper bound for $\nu_n$ can be proven in exactly the same way as the one in \cite{CS2019}: because the only difference between the chains $\F_n$ and $\FF_n$ is the fact that the root edge can no longer be flipped and that each flip is assigned a probability of $\frac{1}{3(2n-1)}$ rather than $\frac{1}{6n}$, the proof of Proposition 4.1 in \cite{CS2019} also applies to the spectral gap $\nu_n$ of $\FF_n$. As for the lower bound, we have $$\frac{1}{\nu_n}\leq\max_{(q,e,s)}\frac{1}{\pi(q)p(q,q^{e,s})}\sum_{q_1,q_2\in\sQ_n}\sum_{\substack{\gamma\in\Gamma_{q_1\to q_2}:\\(q,e,s)\in\gamma}}|\gamma|\P_{q_1\to q_2}(\gamma)\pi(q_1)\pi(q_2),$$ where $\pi$ is the uniform measure on $\sQ_n$, $(q,e,s)$ varies among all possible flips ($q\in\sQ_n$, $e\in E(q)$, $s=\pm$) and $p(q,q^{e,s})$ is the transition probability according to $\FF_n$. Now, all instances of $\pi(\cdot)$ can be replaced by $\frac{1}{|\sQ_n|}$. Also, we have $p(q,q^{e,s})\geq \frac{1}{3(2n-1)}$ (hence $\frac{1}{p(q,q^{e,s})}\leq 6n$) for all $q\in\sQ_n$, $e\in E(q)$, $s=\pm$. Moreover, the length of our canonical paths as constructed is at most $32n^2$. This can be checked by going through the final construction from Section~\ref{sec:completing psi}: each path of non-zero weight in $\Gamma_{q_1\to q_2}$ is built as two sequences (one ``straight'' and one ``reversed'') of \begin{itemize} \item one path of the form $P(q,c)$; \item $n-1$ paths of the form $P((L,R),(L',R'))$. \end{itemize} In turn, every path of the form $P((L,R),(L',R'))$ is built as a concatenation of \begin{itemize} \item one path of the form $P(q,c)$; \item $4$ single flips; \item one path of the form $P(q,c)$, reversed. \end{itemize} By the three lemmas in Section~\ref{sec:from q to ->coll(q,c)}, we know that the length of a path of the form $P(q,c)$ is at most $8n$, which yields the global upper bound of $32n^2$. Applying the bound given by Proposition~\ref{prop:final estimate} we then obtain $$\frac{1}{\nu_n}\leq \frac{6n\cdot 32n^2\cdot 8\cdot 12^{n+1}}{|\sQ_n|}.$$ Since $\frac{|\sQ_n|}{12^n}\geq \frac{C}{n^{5/2}}$, we have $$\frac{1}{\nu_n}\leq 6n\cdot 32n^2\cdot 8\cdot 12 \cdot Cn^{5/2}\leq C_2n^{11/2}$$ for some appropriate constant $C_2$, as desired. \end{proof} \input{Bibliography.bbl} \end{document}
\section{Introduction} Let $G$ be a topological group. Principal $G$-bundles with a commutativity structure on their transition functions are introduced in \cite{AG15}. The classifying space \revtwo{$B(\ZZ,G)$} for such bundles, first introduced in \cite{ACT12}, is a variant of the ordinary classifying space $BG$, which is constructed from pairwise commuting group elements. This construction is a particular case of a class of constructions, denoted by $B(\tau,G)$, that depend on a cosimplicial group $\tau^\dt$: \revC{ We assume that there exists a surjection $\eta^\bullet:F^\bullet\to\tau^\bullet$ where $[n]\mapsto F^n$ is the cosimplicial group free in each degree. Then the precomposition maps $\circ\eta^n:\Hom(\tau^n,G)\to\Hom(F^n,G)\cong G^{\times n}$ are injective, thus we can equip the set $\Hom(\tau^n,G)$ of group homomorphisms with the subspace topology, getting us the simplicial topological space $B(\tau,G)_\bullet=\Hom(\tau^\bullet,G)$. The space $B(\tau,G)$ is the geometric realization $|B(\tau,G)_\bullet|$. The main examples are $BG$, the usual classifying space, corresponding to $F^\dt$ and $B(\ZZ,G)$ corresponding to its level-wise abelianization $\ZZ^\dt$. We say that $G$ is $\tau$-good if the simplicial space $B(\tau,G)_\bullet$ is a good simplicial space of CW-complexes. For example a Lie group is $\mathbb Z$-good \cite{AG15}*{Proposition 9.1}. It was previously shown that for a Lie group $G$, the space $B(\mathbb Z,G)$ classifies transitionally commutative principal $G$-bundles on finite CW-complexes \cite{AG15}*{Theorem 2.2}. We generalize this theorem as follows: \begin{customthm}{\ref{thm:factorsuptohomotopy}} Suppose that $G$ is $\tau$-good. Then the space $B(\tau,G)$ classifies principal $G$-bundles on CW-complexes with $\tau$-atlas. \end{customthm} } We carry over this construction to the simplicial category. Let $K$ be a simplicial group. The classifying space of $K$ is given by the bar construction $\Wbar K$ \cite[\S21]{May67}. \revC{ The simplicial set $\Wbar K$ is isomorphic to the total simplicial set $TNK$ of the nerve of $K$. The nerve $NK$ is the bisimplicial set $(NK)_{p,q}=N(K_q)_p\cong\Hom(F^n,K_q)$. To get a $\tau$-version, we modify this bisimplicial set: we let $N(\tau,K)_{p,q}=\Hom(\tau^n,K_q)$. Then we define $\Wbar(\tau,K)=TN(\tau,K)$. Note that the left Kan extension of the cosimplicial group $\tau^\bullet:\Delta\to\catGrp$ along the natural inclusion $\Delta^\dt:\Delta\to\catsSet$ that sends $[n]$ to the simplicial $n$-simplex $\Delta[n]$ is a left adjoint of the functor $\Hom(\tau^\bullet,\,):\catGrp\to\catsSet$. Since moreover the d\'ecalage functor $\Dec:\catsSet\to\catssSet$ is a left adjoint of the total simplicial set functor $T$, we get} a pair of adjoint functors $$ G(\tau,-): \catsSet \adjoint \catsGrp : \Wbar(\tau,-). $$ We compare our construction to the topological version. \begin{customthm}{\ref{thm:B-Wbar}} There is a natural homotopy equivalence $$ B(\tau,|K|) \rightarrow |\Wbar(\tau,K)|. $$ \end{customthm} Thus our construction has the correct homotopy type. We also show that \begin{customcor}{\ref{cor:simp-Lie}} For a compact Lie group $G$, there is a natural homotopy equivalence $$ B(\tau,G) \to |\Wbar(\tau,SG)| $$ where $S$ denotes the singular functor, the right adjoint of the geometric realization. \end{customcor} As a consequence we can import the results regarding all the interesting examples studied previously, such as \cite{AG15,AGV17,AGLT17,O16,GH19,OW19}, to the simplicial category. Our simplicial construction has the advantage of making available methods from simplicial homotopy theory that are not available in the original topological construction. It would be interesting to understand the homotopical effect of the algebraic modification using model structures. The simplicial approach has the potential for further generalization to the category of simplicial sheaves, a direction the authors plan to pursue elsewhere. \revC{ We also study what objects does the simplicial set $\Wbar(\tau,K)$ classify. The simplicial set $\Wbar(\tau,K)$ is usually not fibrant, so we can't describe the morphism set $[B,\Wbar(\tau,K)]$ in the homotopy category as the set of maps $B\to\Wbar(\tau,K)$ modulo homotopy. On the other hand, using that geometric realization is part of a Quillen equivalence and Theorem \ref{thm:B-Wbar} we get bijections $$ [B,\Wbar(\tau,K)]\cong[|B|,|\Wbar(\tau,K)|]\cong[|B|,B(\tau,|K|)]. $$ Therefore, we can take our cue from topology. Let $\pi:P\to X$ be a topological principal $G$-bundle equipped with an atlas. Then we get an atlas on the pullback $S_\mathscr U\pi$ of $\pi$ along the inclusion $S_\mathscr UX\to SX$ of the simplicial subset of simplices $\sigma:\Delta^n\to X$ which map into $U_i$ for some $i\in I$ (see Construction \ref{cons:S_UP}), but this atlas is in general not regular. Therefore, we need a different model than $\Wbar K$ for the classifying object of principal $K$-bundles to which we can get classifying maps induced by not necessarily regular atlases. An atlas on a principal $K$-bundle $p:E\to B$ corresponds to a choice $\sigma(b)\in p^{-1}(b)$ for all $n$-simplices $b\in B_n$ for all $n\ge0$. For order-preserving maps $\theta:[m]\to[n]$ we get transition elements $\alpha_*(b,\theta)\in K_m$ such that $\sigma(\theta^*b)=\alpha_*(b,\theta)\cdot\theta^*\sigma(b)$. This data can be packaged as a functor between the Grothendieck constructions $$ \alpha_*:\int^{\Delta^\mathrm{op}}B\to\int^{\Delta^\mathrm{op}}K. $$ We give an explicit zigzag of equivalences between $\Wbar K$ and $N\int K$. Moreover, we construct a sub-simplicial set $N(\tau,\int K)\subseteq N\int K$ and extend the zigzag as follows: \begin{customthm}{\ref{thm:full-zigzag-Ntau}} There exists a zigzag of weak equivalences $N(\tau,\int K)\stackrel{\sim}{\longleftrightarrow}\Wbar(\tau,K)$ natural in $\tau$ and $K$. \end{customthm} As a first, direct approach we say that an atlas is a $\tau$-atlas if the nerve $N\alpha_*$ factors through the inclusion $N(\tau,\int K)\to N\int K$. We show that this definition is compatible with the topological one: \begin{customprop}{\ref{pro:tau-atlasSU}} Let $\pi:P\to X$ be a topological principal $G$-bundle equipped with a $\tau$-atlas along an open covering $\mathscr U$. Then the induced atlas on the simplicial principal $SG$-bundle $S_\mathscr U\pi:S_\mathscr UP\to S_\mathscr UB$ is a $\tau$-atlas. \end{customprop} Let $p:E\to B$ be a simplicial principal $K$-bundle. We say that $p$ admits a $\tau$-structure if the homotopy class of a classifying map $B\to\Wbar K$ factors through the map induced by the inclusion $\Wbar(\tau,K)\to\Wbar K$. We can show that if a simplicial principal $K$-bundle $p:E\to B$ admits a $\tau$-atlas, then it has a $\tau$-structure (Lemma \ref{lem:tau-equivalent-onedirection}). But getting a converse seems to be difficult. The problem is again that the simplicial set $N(\tau,\int K)$ is not fibrant. Therefore, we relax the notion of $\tau$-atlas in two different ways: A topological $\tau$-atlas is the $\tau$-atlas gotten via Proposition \ref{pro:tau-atlasSU} from a $\tau$-atlas on the induced topological principal $|K|$-bundle $|p|:|E|\to|B|$. A weak $\tau$-atlas is a $\tau$-atlas after a zigzag of equivariant maps along weak equivalences of simplicial groups. We can show that a topological $\tau$-atlas gives a weak $\tau$-atlas (Lemma \ref{lem:topological tau-atlas => weak tau-atlas}) and having a $\tau$-structure implies having a topological $\tau$-atlas (Lemma \ref{lem:tau-equivalent-seconddirection}). To close the circle of equivalences and show that having a weak $\tau$-atlas implies having a $\tau$-structure, we need: \begin{customconj}{\ref{conj:N-alpha-classifies}} Let $p:E\to B$ be a principal $K$-bundle and $\alpha$ be an atlas. Then the map $N \alpha_*: N\int B \to N\int K$ is a classifying map for $p:E\to B$, i.e.~under the relevant zigzag of equivalences the homotopy class of $N\alpha_*$ coincides with the class $[\hat r]\in [B,\Wbar K]$ of a classifying map coming from a pseudosection. \end{customconj} Using this, we get: \begin{customthm}{\ref{thm:circle of equivalences}} Suppose that Conjecture \ref{conj:N-alpha-classifies} holds. Let $p:E\to B$ be a simplicial principal $K$-bundle. Then the following assertions are equivalent: \begin{enumerate} \item The principal $K$-bundle $p$ admits a $\tau$-structure. \item The principal $K$-bundle $p$ admits a topological $\tau$-atlas. \item The principal $K$-bundle $p$ admits a weak $\tau$-atlas. \end{enumerate} \end{customthm} } The structure of the paper is as follows. In \S \ref{sec:loop-decalage} we study the total d\'{e}calage and Kan's loop group functors. The factorization $G=\pi_1\Dec$ is proved in Proposition \ref{pro:Loop-pi1Dec-iso}. In \S \ref{sec:varWbar} we introduce $\Wbar(\tau,K)$. Under some assumptions on $\tau$ we describe its set of $n$-simplices (Proposition \ref{pro:simplicesWbar}). We also prove that after looping once the natural map $\Wbar(\tau,K)\to \Wbar K$ splits up to homotopy (Proposition \ref{pro:splitting}). \revC{Simplicial bundles with $\tau$-structure and different notions of $\tau$-atlas are introduced and studied in \S \ref{sec:simpbundle}. Assuming Conjecture \ref{conj:N-alpha-classifies} holds, we prove the circle of equivalences between different notions of $\tau$-atlas in Theorem \ref{thm:circle of equivalences}. We study the homotopy type of the simplicial set $N(\tau,\int K)$ in \ref{sec:hocolim}. We give the natural zigzag of equivalences between $N(\tau,\int K)$ and $\Wbar(\tau,K)$ in Theorem \ref{thm:full-zigzag-Ntau}.} We compare our simplicial construction to the topological version $B(\tau,G)$ in \S \ref{sec:comptopcat}. The homotopy equivalence $B(\tau,|K|)\simeq |\Wbar(\tau,K)|$ is proved in Theorem \ref{thm:B-Wbar} and $B(\tau,G) \simeq |\Wbar(\tau,SG)|$ is proved in Corollary \ref{cor:simp-Lie}. \revC{We prove the generalized classification theorem of topological principal bundles with $\tau$-structure in Theorem \ref{thm:factorsuptohomotopy}.} {\bf Acknowledgement:} We thank Danny Stevenson for sharing a proof of Corollary \ref{cor:G=pi1Dec} and Ben Williams for commenting on an earlier version of this paper. The first author is partially supported by NSERC \revC{and by the Air Force Office of Scientific Research under award number FA9550-21-1-0002;} and would like to thank Alfr\'ed R\'enyi Institute of Mathematics for their hospitality during a visit in the summer of 2019. The second author is partially supported by the project NKFIH K 119934. \section{ Kan's loop group and d\'{e}calage} \label{sec:loop-decalage} The standard $n$-simplices $\Delta[n]$ as $n$ varies can be assembled into a cosimplicial simplicial set $\Delta^\dt$. Applying Kan's loop group functor $G$ level-wise gives a cosimplicial simplicial group. In this section we describe this object using the factorization $G=\pi_1 \Dec$. Proposition \ref{pro:Loop-pi1Dec-iso} gives an explicit morphism $G\Delta^\dt \rightarrow \pi_1\Dec\, \Delta^\dt$ of cosimplicial simplicial groups. This description will be essential later on when we introduce variations of the $\Wbar$-construction. For the properties of the loop group functor and the d\'{e}calage functor we refer to \cite{Ste12}. For a category $\catC$ we write $\mathbf{s}\catC$ for the category of simplicial objects in that category. \subsection{D\'{e}calage } Let $\catDelta$ denote the simplex category. Let $\catDelta_+$ denote the category obtained from $\catDelta$ by adjoining the empty ordinal denoted by $[-1]$. The category $\catDelta_+$ is a monoidal category with unit $[-1]$. The monoidal structure is given by the bifunctor $ +:\catDelta_+\times \catDelta_+\rightarrow \catDelta_+ $ which sends a pair $([m],[n])$ to the ordinal $[m+n+1]$, and a pair of morphisms $\varphi:[m]\rightarrow [m']$ and $\theta:[n]\rightarrow [n']$ to the morphism $$ (\varphi+\theta)(i)=\left\lbrace \begin{array}{ll} \varphi(i) & 0\leq i\leq m \\ \theta(i-m-1)+m'+1 & m+1\leq i \leq m+n+1 \end{array} \right. $$ Let $\catsSet$ ($\catsSet_+$) denote the category of (augmented) simplicial sets. Given a simplicial set $X$ the augmented simplicial set $\Dec_0 X$ is defined by pre-composing $X$ with the functor $\catDelta_+ \rightarrow \catDelta$ defined by $[n]\mapsto [n]+[0]$. Note that $(\Dec_0 X)_n=X_{n+1}$ and the simplical structure maps $d_i:(\Dec_0X)_n\to (\Dec_0X)_{n-1}$ and $s_j:(\Dec_0X)_n \to (\Dec_0X)_{n+1}$ are given by $$ d_i:X_{n+1}\to X_n,\;\;\;\; s_j:X_{n+1}\to X_{n+2} $$ where $0\leq i,j\leq n$. $\Dec_0 X$ is an augmented simplicial set where the augmentation map $d_0:\Dec_0X\rightarrow X_0$ is induced in degree $n$ by the $(n+1)$-fold composition \revC{$(d^0)^{n+1}=d^0\circ\cdots\circ d^0:[0]\rightarrow [n]+[0]$}. Let us describe $\Dec_0(\Delta[k])$ in more detail. \begin{lem}\label{lem:Dec0Delta} There is an isomorphism of augmented simplicial sets \begin{equation}\label{Dec0} \begin{tikzcd} \coprod_{0\leq l \leq k} \Delta[l] \arrow{r}{\cong} \arrow{d} & \Dec_0(\Delta[k]) \arrow{d}{d_0}\\ \set{0,1,\cdots,k} \arrow[r,equal] & \Delta[k]_0 \end{tikzcd} \end{equation} which is natural with respect to morphisms in $\catDelta$ and maps $\Delta[l]$ isomorphically onto the pre-image $(d_0)^{-1}(l)$. \end{lem} \Proof{ $\Dec_0(\Delta[k])$ is the coproduct of $(d_0)^{-1}(l)$ over $l$ since the augmentation map $d_0$ is a deformation retraction \cite{Ste12}. An $m$-simplex of $(d_0)^{-1}(l)$ is a functor $\varphi:[m+1]\rightarrow [k]$ such that $\varphi d_0^{m+1}(0)=l$, and such functors are in one-to-one correspondence with functors $[m]\rightarrow [l]$. } \subsection{Total d\'{e}calage} The d\'{e}calage functor $\Dec_0$ is a comonad whose structure maps are described as follows: $\Dec_0\rightarrow(\Dec_0)^2 $ is induced by $[n]+[0]+[0]\rightarrow [n]+[0]$ given by the sum of the identity map on $[n]$ and $s^0:[0]+[0]\rightarrow [0]$, and the other structure map $\Dec_0 \rightarrow \idy$ is induced by \revC{$(d^0)^n:[n]\rightarrow [n]+[0]$}. The total d\'{e}calage of the simplicial set $X$ is defined to be the \revC{bisimplicial set $\Dec X$ obtained from the} comonadic resolution \revC{of $X$, which in degree $n$, is given by the simplicial set} $$ \Dec_n X =(\Dec_0)^{n+1} X. $$ If we think of $\Dec X$ as a vertical bisimplicial set with horizontal simplicial sets then the set of $(m,n)$-simplices is $X_{m+n+1}$. The horizontal face and degeneracy maps are given by $d_i^h=d_i:(\Dec_nX)_m\rightarrow (\Dec_nX)_{m-1}$ and $s_i^h=s_i:(\Dec_nX)_m\rightarrow (\Dec_nX)_{m+1}$ where $0\leq i\leq m$, the vertical face and degeneracy maps are given by $\revC{d_j^v}=d_{m+1+j}:(\Dec_nX)_m\rightarrow (\Dec_{n-1}X)_{m}$ and $\revC{s_j^v}=s_{m+1+j}:(\Dec_nX)_m\rightarrow (\Dec_{n+1}X)_{m}$ where $0\leq j\leq n$. We will give a description of $\Dec\,\Delta[k]$. For this we introduce a bisimplicial set $D[k]$ defined by $$ D_n[k] = \coprod_{\varphi:[n]\to [k]} \Delta[\varphi(0)] $$ together with the simplicial structure $$ d_i(\varphi,\theta) = \left\lbrace \begin{array}{cc} (\varphi d^0, \iota \theta) & i=0 \\ (\varphi d^i , \theta) & 0<i \leq n \end{array} \right. $$ where $\iota:\Delta[\varphi(0)]\to \Delta[\varphi(1)]$ is induced by the inclusion $[\varphi(0)]\subset [\varphi(1)]$ and $$ s_j (\varphi,\theta) =(\varphi s^j,\theta) $$ for all $0\leq j\leq n$. \Pro{\label{pro:DecDelta} There is an isomorphism of bisimplicial sets $$ g: D[k]\to \Dec\,\Delta[k]. $$ } \begin{proof} Applying Lemma \ref{lem:Dec0Delta} gives an isomorphism \begin{equation}\label{dec_Del} g_n:\coprod_{\varphi:[n]\rightarrow [k]} \Delta[\varphi(0)] \rightarrow \Dec_n\Delta[k] \end{equation} which in degree $m$ sends $(\varphi,\theta)$ to the functor $[m+n+1]\rightarrow [k]$ defined using $\theta$ on the subset $[m]\subset [m+n+1]$ and on the rest using $\varphi$. More precisely it is the unique functor which fills the diagram $$ \begin{tikzcd} {[m]}\arrow[d,hook] \arrow{rd}{\theta} & \\ {[m+n+1]} \arrow[r,dashed] & {[k]} \\ {[n]} \arrow{u}{(d^0)^{m+1}} \arrow[ru,"\varphi"'] \end{tikzcd} $$ On the other hand the inverse to this map is given by \begin{equation}\label{dec_Del_inv} g_n^{-1}: \Dec_n\Delta[k] \rightarrow \coprod_{\varphi:[n]\rightarrow [k]} \Delta[\varphi(0)] \end{equation} which in degree $m$ sends a functor $\alpha: [m+1+n]\rightarrow [k]$ to the pair of the functors given by $\alpha (d^0)^{m+1}:[n]\rightarrow [k]$ and $\alpha':[m]\rightarrow [\alpha(m+1)]$ that fits into the diagram $$ \begin{tikzcd} {[m+1+n]} \arrow{r}{\alpha} & {[k]}\\ {[m]} \arrow[hook,u] \arrow{r}{\alpha'} & {[\alpha(m+1)]} \arrow[hook,u] \end{tikzcd} $$ It remains to check that $\set{g_n}_{n\geq 0}$ gives a morphism of simplicial sets. It is straightforward to check this for $s_j$ and $d_i$ with $i>0$. When $i=0$ the face map $d_0$ changes $\varphi(0)$ to $\varphi(1)$, and this is accounted for by adding the inclusion $\iota$. \end{proof} \Rem{{\rm From the definition $$ \catsSet(\Delta[m],\Dec_nX)=\catsSet(\Delta[m+n+1],X) $$ it follows that the $n$-th d\'ecalage is isomorphic to the disjoint union of slice simplicial sets $$ \Dec_nX\cong\bigsqcup_{\phi :\Delta[n]\to X} X_{/\phi}. $$ In particular, $\Delta[k]_{/\phi} = \Delta[\phi(0)]$ if we regard an $n$-simplex as an ordinal map $\phi:[n]\to [k]$. Moreover, the following assertions hold: \begin{enumerate} \item In case $X$ is a Kan complex, the slice simplicial sets $X_{/\phi}$ are contractible. Therefore, for any simplicial set $X$, the map $s_0:X_n\to\sqcup_{\phi\in X_n} X_{/\phi}$ is a deformation retract with quasi-inverse the tail map. \item In case $X$ is a Kan complex, the forgetful maps $X_{/\phi}\to X_{/d_0\phi}$ are Kan fibrations. \end{enumerate} Therefore, in case $X$ is a Kan complex, the map $d_0^v:\Dec_nX\to\Dec_{n-1}X$ is a fibrant resolution of the inclusion $X_n=\sk_0\Dec_{n-1}X\to\Dec_{n-1}X$. That is, the Kan complex $\Dec_nX$ is a model of the $(n+1)$-fold path space of $X$. All these statements can be checked easily. We have found out about them at \cite{nlab:decalage}. }} \subsection{Nerve functor and its adjoint} We can take the nerve of a group to obtain a simplicial set. Let $\catGrp$ denote the category of groups. This construction gives a functor $N:\catGrp \rightarrow \catsSet$. In fact the image of the functor lives in the category $\catsSet_0$ of reduced simplicial sets i.e. those simplicial sets whose set of $0$-simplices is a singleton. Let us define a functor $\pi_1:\catsSet \rightarrow \catGrp$ by assigning \revC{to} a simplicial set $X$ the quotient of the free group $F(X_1)$ on the set of $1$-simplices by the relations $[s_0x]=1$ for all $x\in X_0$, and $ [d_2\sigma][d_0\sigma]=[d_1\sigma]$ for all $\sigma\in X_2$. The functor $\pi_1$ is the left adjoint of $N$. Let us compute $\pi_1$ of a $k$-simplex. Note that the set of $1$-simplices is given by functors $[1]\rightarrow [k]$. The relation coming from $s_0$ will kill those which are not injective. Each $2$-simplex will introduce a relation among the edges in its boundary. As a result there is an isomorphism of groups $$ F^k \rightarrow \pi_1 \Delta[k] $$ which sends a generator $e_i$ of the free group $F^k$ to the $1$-simplex $[1]\rightarrow [k]$ specified by the image $\set{i-1,i}$. We will identify these groups and given an ordinal map $\alpha:[k]\rightarrow [l]$ we will write $$ \alpha_*: F^{k} \rightarrow F^l $$ for the induced map $\pi_1\Delta[k]\rightarrow \pi_1\Delta[l]$. Considering all the simplices at once defines a cosimplicial group $F^\dt:\catDelta \rightarrow \catGrp$ where $F^\dt[k]$ is the free group $F^k=\pi_1\Delta[k]$. At this point we also observe that the nerve functor is represented by the cosimplicial group $F^\dt$ in the sense that $$(NG)_\dt=\catGrp(F^\dt,G).$$ This approach allows us to describe the adjunction $\pi_1\adjoint N$ from the general theory of Kan extensions. \subsection{Loop group} Given a (reduced) simplicial set $X$ the loop group $GX$ is a simplicial group which homotopically behaves as the loop space. The group of $n$-simplices is the free group $F(X_{n+1} - s_0 X_{n})$. The face maps are defined by $$ d_i[x] =\left\lbrace \begin{array}{ll} {[d_1x][d_0x]^{-1}} & i=0\\ {[d_{i+1}x]} & 0< i\leq n \end{array}\right. $$ and the degeneracy maps are defined by $s_j[x]=[s_{j+1}x]$ for all $0\leq j\leq n$. In fact this construction is related to the d\'{e}calage construction. Recall that the bisimplicial set $\Dec\, \Delta[k]$ has a nice description whose simplicial structure is given in Proposition \ref{pro:DecDelta}. Let us consider the simplicial group $ \pi_1\Dec \Delta[k] $ obtained by applying $\pi_1$ to each vertical degree. From the isomorphism \ref{dec_Del} we see that the resulting simplicial group consists of the free groups \begin{equation}\label{eq:pi1Dec} (\pi_1\Dec \Delta[k])_n \cong (\pi_1D[k])_n = \coprod_{\varphi:[n]\rightarrow [k]} F^{\varphi(0)} \end{equation} whose simplicial structure maps are induced by the ones of $D[k]$. Let us describe this structure explicitly. We write $[\varphi,e_j]$ to denote the generator of $F^{\varphi(0)}$ corresponding to the $\varphi$ term in the coproduct. The simplicial structure maps are given by \begin{equation}\label{eq:pi1Dec-simplicial} d_i[\varphi,e_j] =\left\lbrace \begin{array}{ll} {[\varphi d^0, \iota_*(e_j)]} & i=0 \\ {[\varphi d^i, e_j]} & 0<i\leq n \end{array} \right. \end{equation} and $s_i[\varphi,e_j]=[\varphi s^i,e_j]$ for the degeneracy maps. Recall that $\iota_*$ is the map $\pi_1 \Delta[\varphi(0)]\to \pi_1 \Delta[\varphi(1)]$ induced by the inclusion $[\varphi(0)]\subset [\varphi(1)]$. \subsection{Relation to d\'{e}calage} Let $\Delta^\dt:\catDelta \rightarrow \catsSet$ denote the functor defined by sending $[k]$ to the $k$-simplex $\Delta[k]=\catDelta(-,[k])$. We can think of $\Delta^\dt$ as a cosimplicial object in the category of simplicial sets. Applying the functor $\Dec$ to the cosimplicial object $\Delta^\dt$ in each degree and taking $\pi_1$ of the resulting simplicial set gives a cosimplicial object $$ \pi_1\Dec\,\Delta^\dt:\catDelta \to \catsGrp. $$ The object $[n]$ is sent to the \revC{simplicial} group $\pi_1\Dec\,\Delta[n]$. Another cosimplicial object can be obtained by composing with Kan's loop group functor $$ G\Delta^\dt:\catDelta \to \catsGrp. $$ \Pro{\label{pro:Loop-pi1Dec-iso} There is a natural isomorphism of functors $$ \epsilon^\dt:G\Delta^\dt \rightarrow \pi_1\Dec\, \Delta^\dt. $$ } \begin{proof} \revC{Consider the cosimplicial degree $k$ and simplicial degree $n$. We begin by defining a group homomorphism $ (\epsilon^k)_n: G(\Delta[k])_n \to (\pi_1 \Dec \Delta[k])_n. $ For this recall that $G(\Delta[k])_n$ is a quotient of the free group on the set $\Delta[k]_{n+1}$. By \ref{eq:pi1Dec} $(\pi_1 \Dec \Delta[k])_n$ is the free product of $ \pi_1(\Delta[\varphi(0)])$ over the ordinal maps $\varphi:[n]\rightarrow [k]$, hence a free group on the disjoint union $\coprod_\varphi \Delta[\varphi(0)]_1$. We define a map between the set of generators of the free groups} $$ \Delta[k]_{n+1} \rightarrow \coprod_{\varphi:[n]\rightarrow [k]} \Delta[\varphi(0)]_1 $$ by sending $\beta:[n+1]\rightarrow [k]$ to the pair given by $\beta d^0:[n]\rightarrow [k]$ and $\beta|_{[1]}$, the restriction of $\beta$ along the natural inclusion $[1]\subset [n+1]$. \revC{This map induces a group hommorphism} $$ (\epsilon^k)_n: G (\Delta[k])_n \longrightarrow \revC{(\pi_1\Dec \Delta[k])_n} $$ since a generator $[\alpha s^0]$ \revC{for some $\alpha:[n+1]\to [k]$} in the image of the degeneracy map $s_0$ is mapped to the generator given by the pair of the map $\alpha s^0 d^0=\alpha$ and the map obtained by restricting $\alpha s^0$ to $[1]$. The latter generator corresponds to $[(d^0)^{\alpha(0)}s^0]$ in the free group $F^{\alpha(0)}$ and is equivalent to the identity element under the identifications \revC{in $ \pi_1(\Delta[\varphi(0)])$}. Moreover, $(\epsilon^k)_n$ is an isomorphism since both groups are free groups and the map is a bijection between the generators. For simplicity of \revC{notation} we will suppress the cosimplicial degree and write $\epsilon_n=(\epsilon^k)_n$. Next we check that the map is compatible with the simplicial structure. For $0<i\leq n$ we have $\epsilon_nd_i(\alpha)=\epsilon_n(\alpha d^{i+1})=\alpha d^{i+1}d^0=\alpha d^0d^{i}$, similarly for degeneracy maps we have $\epsilon_ns_j(\alpha)= \alpha d^0s^{j}$ for all $0\leq j\leq n$. Thus for the face map we have $$ \epsilon_n(d_i[\alpha])= [\alpha d^0 d^i , \alpha d^{i+1} |_{[1]}] = d_i[\alpha d^0 , \alpha|_{[1]}] = d_i\revC{\epsilon_{n+1}}[\alpha] $$ and similarly $\epsilon_n$ commutes with the degeneracy maps. Finally $d_0$ on the loop group is defined by $d_0[\alpha]=[\alpha d^1][\alpha d^0]^{-1}$. Therefore we have $$ \epsilon_n(d_0[\alpha])=\epsilon_n([\alpha d^1])\epsilon_n([\alpha d^0])^{-1}=[\alpha (d^0)^2,\alpha d^1 |_{[1]}]\;\revC{[\alpha (d^0)^2,\alpha d^0 |_{[1]}]^{-1}} $$ where we used the simplicial identity $d^1d^0=(d^0)^2$. \revC{U}nder $\epsilon_n$ both $[\alpha d^1]$ and $[\alpha d^0]$ map to the same free group $F(\alpha(2))$ indexed by $\alpha (d^0)^2$. Let $\sigma$ denote the restriction of $\alpha$ to $[2]$ (note that $\alpha$ lives in degree $\geq 2$). Then using the relation in the fundamental group $\pi_1 \Delta[\alpha(2)]\cong F(\alpha(2)) $ we can write $$ [\alpha d^1 |_{[1]}][\alpha d^0 |_{[1]}]^{-1} = [d_1\sigma][d_0\sigma]^{-1} = [d_2\sigma] = [\alpha|_{[1]}] $$ which is the same, after adding the coproduct index, as $d_0$ of the generator \revC{$\epsilon_{n+1}[\alpha]$}. Thus we showed that we have an isomorphism of simplicial groups $$ \epsilon^k : G \Delta[k] \rightarrow \pi_1 \Dec \Delta[k] $$ where we remembered the cosimplicial index, and suppressed the simplicial index. The resulting map is compatible with the cosimplicial structure since all the constructions involved are functorial in $\Delta[k]$. \end{proof} \Rem{{\rm \label{rem:inverse-iso} One can check that the inverse of $\epsilon^k$ is induced by the map \begin{equation}\label{map:epsilon-inv} \coprod_{\varphi:[n]\rightarrow [k]} \Delta[\varphi(0)]_1 \rightarrow \Delta[k]_{n+1} \end{equation} which sends $(\varphi,\gamma)$ to the functor $\alpha:[n+1]\rightarrow [k]$ defined by $\alpha(0)=\gamma(0)$ and $\alpha(i)=\varphi(i-1)$ for $0<i\leq n+1$. An argument similar to the proof of Proposition \ref{pro:Loop-pi1Dec-iso} can be used to see that after taking the appropriate quotients of the free groups the resulting map is an isomorphism. We will denote this map simply as the inverse $$ (\epsilon^\dt)^{-1}:\pi_1\Dec \Delta^\dt \rightarrow G\Delta^\dt. $$ }} Almost immediately we obtain the following result which is also proved in \cite[Proposition 16]{Ste12}, however, without an explicit isomorphism. \Cor{\label{cor:G=pi1Dec}For any simplicial set $X$ there is a natural isomorphism of simplicial groups $$ G(X) \to \pi_1\Dec\,(X). $$ } \Proof{ An arbitrary simplicial set can be written as a colimit of $\Delta[n]$ over the simplex category. All the functors in sight $G$, $\pi_1$, \revC{and $\Dec$ (see \cite[\S 3]{Ste12})} are left adjoints, thus they preserve colimits. Then the result follows from Proposition \ref{pro:Loop-pi1Dec-iso}. } \Rem{{\rm In Proposition 16 of \cite{Ste12} Kan's loop group $G$ is compared to $\pi_1 R\, \Dec$ where $R$ is the left adjoint of the inclusion $\catssSet_0 \to \catssSet$. We avoided this functor by defining $\pi_1$ for an arbitrary simplicial set not necessarily a reduced one. }} \subsection{Simplicial group homomorphisms} Let $K$ be a simplicial group. The set of simplicial group homomorphisms $G\Delta[k]\to K$ is well-known \cite{GJ99}. This set is precisely the set of $k$-simplices of the $\Wbar$-construction of $K$. For variations of this construction we need an explicit description of such simplicial group homomorphisms. By Proposition \ref{pro:Loop-pi1Dec-iso} we can instead consider a morphism $f:\pi_1\Dec \Delta[k]\rightarrow K$ of simplicial groups. The degree-$n$ part $f_n$ belongs to the set $$ \catGrp(\pi_1\Dec\Delta[k]_n,K_n) = \prod_{\varphi:[n]\to[k]} \catGrp(F^{\varphi(0)},K_n) = \prod_{\varphi:[n]\to[k]} K_n^{\times \varphi(0)} $$ where $K_n^{\times \varphi(0)}$ is understood to be the trivial group if $\varphi(0)=0$. Therefore $f_n$ is determined by the tuple of elements $f_{n}[\varphi,e_j]$ in $K_n$ where $e_j\in F^{\varphi(0)}$ and $1\leq j\leq \varphi(0)$ . The map $\varphi$ factors as follows $$ \begin{tikzcd} {[n]} \arrow{r}{\varphi} \arrow[rd,"\phi"'] & {[k]} \\ & {[k-\varphi(0)]} \arrow[hook,u,"(d^0)^{\varphi(0)}"'] \end{tikzcd} $$ where $\phi(0)=0$ i.e. the canonical decomposition of $\phi$ does not involve $d^0$. The simplicial structure in \ref{eq:pi1Dec-simplicial} implies that $$ \phi^*[(d^0)^{\varphi(0)},e_j] = [(d^0)^{\varphi(0)}\phi,e_j] = [\varphi,e_j]. $$ and thus $f_n[\varphi,e_j]=\phi^*f_{k-\varphi(0)}[(d^0)^{\varphi(0)},e_j]$. As a result the elements $f_{k-l}[(d^0)^l,e_j]$ where $e_j\in F^l$ for $l=1,\cdots,k$ completely determine $f_n$. It remains to consider the effect of $d^0$. As a consequence of \ref{eq:pi1Dec-simplicial} we have $$ d^0[(d^0)^l,e_j] = [(d^0)^{l+1},d^{l+1}_*e_j]. $$ Note that in this case $\iota$ is induced by the inclusion $d^{l+1}:[l]\to [l+1]$. By abuse of notation we will identify $d^{l+1}_*e_j$ with the generator $e_j$ in $F^{l+1}$. After this identification we see that all the other generators are determined once we fix $f_{k-l}[(d^0)^l,e_l]$ for $1\leq l\leq k$, where $e_l$ is the top generator of $F^l$. We package this information as a diagram \begin{equation}\label{diag:SGHom} \begin{tikzcd} F^1 \arrow{r}{d_*^2} \arrow{d}{f_{k-1}} & F^2 \arrow{r}{d_*^3} \arrow{d}{f_{k-2}} & \cdots \arrow{r}{d^k_*} & F^k \arrow{d}{f_{0}} \\ K_{k-1} \arrow{r}{d_0} & K_{k-2} \arrow{r}{d_0} & \cdots \arrow{r}{d_0} & K_0 \end{tikzcd} \end{equation} where $d^l_*$ is the map induced by $d^l:[l-1]\to [l]$. Evaluating the homomorphisms $f_{k-l}$ at the generator $e_l$ of each free group gives a $k$-tuples $ (x_{k-1},x_{k-2},\cdots, x_0) $ where $x_{k-l}$ belongs to $K_{k-l}$. Then the images of the generators of $F^l$ are given by \begin{equation}\label{eq:imagesofgen} f_{k-l}(e_j)=(d_0)^{l-j}x_{k-j} \end{equation} where $1\leq j\leq l$. \Pro{\label{pro:SGHomSet} There is a bijection of sets $$ \catsGrp(\pi_1\Dec\Delta[k],K) \longrightarrow K_{k-1}\times K_{k-2}\times \cdots \times K_0. $$ defined by sending $$ f\mapsto (x_{k-1},x_{k-2},\cdots, x_0) $$ where $x_{k-l}=f_{k-l}[(d^0)^l,e_l]$. } \Rem{{\rm In particular, for $K=G\Delta[k]$ we can find the $k$-tuple corresponding to the map $(\epsilon^\dt)^{-1}$ defined in Remark \ref{rem:inverse-iso}. Consider the restriction $\Delta[l]_1 \to \Delta[k]_{n+1}$ of the map in \ref{map:epsilon-inv} to the factor $\varphi=(d^0)^l:[k-l]\to [k]$ in the coproduct. The generator $e_l$ in $F^l$ is represented by the map $(d^0)^{l-1}:[1]\to [l]$. Under \ref{map:epsilon-inv} the pair $((d^0)^l,(d^0)^{l-1})$ is mapped to $(d^0)^{l-1}:[k-l+1]\to [k]$. As a result we obtain $$ f_{k-l}(e_l) = [(d^0)^{l-1}] \in G\Delta[k]_{k-l} $$ Thus, under the bijection in Proposition \ref{pro:SGHomSet} we have $$ (\epsilon^\dt)^{-1} \mapsto ([\idy],[d^0],\cdots,[(d^0)^{k-1}]). $$ }} \section{Variants of the $\Wbar$-construction}\label{sec:varWbar} We introduce the simplicial set $\Wbar(\tau,K)$ that depends on an endofunctor $\tau$ on the category of groups. Under some niceness conditions on $\tau$ we describe the set of $n$-simplices. This object comes with a map $\Wbar(\tau,K)\to \Wbar K$, which we show splits up to homotopy after looping once. When $\tau$ is the identity functor we recover $\Wbar K$. Other examples come mainly from the descending central series, and in particular, the abelianization functor, which gives a simplicial version of $B(\ZZ,G)$. \subsection{$\Wbar$-construction} The loop functor $G$ has a well-known right adjoint $\Wbar:\catsGrp \rightarrow \catsSet$. For a simplicial group $K$ the set of $k$-simplices of $\Wbar K$ consists of simplicial group homomorphisms $G\Delta[k]\rightarrow K$, and the simplicial structure is determined by the cosimplicial structure of $G\Delta^\dt$. More explicitly, $\Wbar(K)_k$ can be identified with the product $K_{k-1}\times K_{k-2}\times \cdots\times K_0$. Under this identification the simplicial structure is described as follows: the face maps are given by {\small $$ d_i(x_{k-1},\cdots,x_0) = \left\lbrace \begin{array}{ll} (x_{k-2},x_{k-3},\cdots,x_0) & \revC{i=0}\\ (d_{i-1}x_{k-1},d_{i-2}x_{k-2},\cdots,d_0x_{k-i}x_{k-i-1},x_{k-i-2},\cdots,x_0 ) & 0<i<k \\ (d_{k-1}x_{k-1},d_{k-2}x_{k-2},\cdots , d_1x_1) & i=k \end{array}\right. $$ } and the degeneracy maps are given by {\small $$ s_i(x_{k-1},\cdots,x_0) = \left\lbrace \begin{array}{ll} (1,x_{k-1},\cdots,x_0) & i=0 \\ (s_{i-1}x_{k-1},s_{i-2}x_{k-2},\cdots,s_0x_{k-i},1,x_{k-i-1},x_{k-i-2},\cdots,x_0 ) & 0<i\leq k. \end{array}\right. $$ } As a consequence of the natural isomorphism $G\Delta^\dt \rightarrow \pi_1\Dec\Delta^\dt$ proved in Proposition \ref{pro:Loop-pi1Dec-iso} the functor $\pi_1\Dec$ has also a right adjoint isomorphic to the functor $\Wbar$. The right adjoint of $\pi_1\Dec$ is defined by $$ K \mapsto \catsGrp( \pi_1\Dec\Delta^\dt, K) $$ where the simplicial group homomorphisms are taken level-wise. Let us describe the cosimplicial structure of $\pi_1\Dec\Delta^\dt$. Given an ordinal map $\alpha:[l]\rightarrow [k]$ the induced map on d\'{e}calage $\Dec \Delta[l] \rightarrow \Dec\Delta[k]$ sends a pair $(\varphi,\theta)$ to composition by $\alpha$, namely to the pair $(\alpha\varphi,\alpha\theta)$. The map between the fundamental groups is determined when $\theta$ is a $1$-simplex of $\Delta[\varphi(0)]$, that is, we have $\alpha^*[\varphi,e_j]=[\alpha\varphi,\alpha_*(e_j)]$ where $e_j$ belongs to the free group $F^{\varphi(0)}$. Given this general description for arbitrary ordinal maps let us figure out the effect of the coface maps $d^i:[k-1]\rightarrow [k]$ first. It suffices to consider the generators $[(d^0)^m,e_{m}]$, where $1\leq m\leq k-1$, since the rest is determined by the simplicial structure. Using the cosimplicial identity $d^id^0=d^0d^{i-1}$ for $i>0$ we obtain \begin{equation}\label{eq:DecDelta-face} d^i[(d^0)^m,e_{m}] =\left\lbrace \begin{array}{ll} { [(d^0)^m d^{i-m},e_{m}]} & 1\leq m < i \leq k \\ { [(d^0)^{m+1},e_m]}\,{ [(d^0)^{m+1},e_{m+1}]} & m=i \\ {[(d^0)^{m+1},e_{m+1}]} & i< m\leq k-1 \end{array} \right. \end{equation} and for the codegeneracy maps $s^i:[k+1]\rightarrow [k]$, using $s^id^0=d^0s^{i-1}$ for $i>0$ and $s^0d^0=1$, we have \begin{equation}\label{eq:DecDelta-degeneracy} s^i[(d^0)^m,e_{m}] =\left\lbrace \begin{array}{ll} { [(d^0)^{m}s^{i-m},e_{m}]} & 1\leq m \leq i \leq k \\ { [(d^0)^{m-1},1]} & m=i+1\\ { [(d^0)^{m-1},e_{m-1}]} & i+1 < m\leq k+1. \end{array} \right. \end{equation} \Pro{\label{pro:rightadjoint-Wbar} There is a natural identification of simplicial sets $$ \Wbar(K) = \catsGrp( \pi_1\Dec\,\Delta^\dt, K) . $$ } \Proof{ Using the cosimplicial structure of $\pi_1\Dec\Delta^\dt$ described in \ref{eq:DecDelta-face} and \revC{\ref{eq:DecDelta-degeneracy}} we check that the right adjoint is equal to the $\Wbar$-construction. In Proposition \ref{pro:SGHomSet} we have seen that simplicial group homomorphisms $f:\pi_1\Dec\Delta[k]\rightarrow K$ are in one-to-one correspondence with $k$-tuples $ (x_{k-1},x_{k-2},\cdots, x_0) $ where $x_i\in K_{i}$. The correspondence is obtained by letting $x_{k-m}$ denote the image of $[(d^0)^m,e_m]$ under $f$. Using the cosimplicial structure of $\pi_1\Dec\Delta^\dt$ we first compute the coface maps $d^i:[k-1]\rightarrow [k]$: $$ f(d^i{[(d^0)^m,e_m]}) = \left\lbrace \begin{array}{ll} d_{i-m} x_{k-m} & 1\leq m < i \leq k \\ d_0 (x_{k-i}) x_{k-i-1} & m=i \\ x_{k-m-1} & i<m \leq k-1 \end{array}\right. $$ whereas the codegeneracy maps give $$ f(\revC{s^i}{[(d^0)^m,e_m]}) = \left\lbrace \begin{array}{ll} s_{i-m} x_{k-m} & 1\leq m\leq i \leq k\\ 1 & m=i+1 \\ x_{k-m+1} & i+1< m \leq k-1. \end{array}\right. $$ This shows that the simplicial structure on the $k$-tuples $ (x_{k-1},x_{k-2},\cdots, x_0) $ is exactly the one of the $\Wbar$-construction. } \subsection{Endofunctors} Recall that we used the cosimplicial group $F^\dt$, where $F^k = \pi_1\Delta[k]$, in the definition of the nerve functor, namely $N=\catGrp(F^\dt,-)$. We will introduce a variant of this construction with respect to an endofunctor $\catGrp \to \catGrp$. Left Kan extension \cite[Chapter 1]{riehl2014categorical} of \revC{a cosimplicial group} $\tau^\dt:\catDelta\rightarrow \catGrp$ along the natural inclusion $\Delta^\dt:\catDelta \rightarrow \catsSet$ gives a functor $$ \pi_1(\tau,-):\catsSet \rightarrow \catGrp. $$ By the general theory of left Kan extensions there is a corresponding right adjoint $$ N(\tau,-):\catGrp \rightarrow \catsSet $$ defined by $N(\tau,G)_n = \catGrp(\tau^n,G)$. Given an endofunctor $\tau$ we consider the cosimplicial group $\tau^\dt$ defined by $$ \tau^k = \tau F^k. $$ The group $\pi_1(\tau,\Delta[k])$ is naturally isomorphic to $\tau F^k=\tau\pi_1\Delta[k]$. Note that we recover the adjunction $\pi_1\adjoint N$ when $\tau$ is the identity functor. \Def{\rm{\label{def:quotient-type} We say that \emph{$\tau$ is of quotient type}, if there exists a natural transformation $\eta:\idy\to\tau$ such that the map of groups $\eta_{F^n}:F^n\to\tau^n$ is surjective for all $n\ge0$. In this case we also say that \emph{$\eta$ is surjective on finitely generated free groups}. }} Let us give a list of endofunctors that are of interest to us, see for example \cite{O14}. \begin{itemize} \item Descending central series endofunctor $\Gamma_q$: The descending central series of a group $H$ is defined by $$\Gamma^1(H)=H,\;\;\;\;\Gamma^q(H)=[\Gamma^{q-1}(H),H].$$ We will denote the $q$-th stage $H/\Gamma^qH$ of the descending central series by $\Gamma_qH$. \item $\Gamma_2$ will have a special importance. We introduce the notation $$ \ZZ^\dt = \Gamma_2 F^\dt. $$ This is a cosimplicial group sending $[n]$ to the free abelian group $\ZZ^n$ of rank $n$. Alternatively we can think of this as the functor $[n]\mapsto H_1(\Delta[n]/\Delta[n]_0,\ZZ)$, where $\Delta[n]/\Delta[n]_0$ is the simplicial set obtained by identifying all the vertices of $\Delta[n]$ (see \cite[\S 2]{OW19}). \item Mod-$p$ version $\Gamma_{p,q}$: For a group $H$ mod-$p$ descending central series is defined by $$\Gamma^1_p(H)=H,\;\;\;\;\Gamma^q_p(H)=[\Gamma^{q-1}_p(H),H](\Gamma^{q-1}_p(H))^p.$$ The $q$-th stage $H/\Gamma^q_pH$ is denoted by $\Gamma_{p,q}H$. \item $\Gamma_{p,2}$ is used to define $$ (\ZZ/p)^\dt = \Gamma_{p,2} F^\dt. $$ \item Let $\Gamma_{p^k,2}$ denote the composition of $\Gamma_{2}$ with the mod-$p^k$ reduction functor that sends an abelian group to the largest $p^k$-torsion quotient. We write $$ (\ZZ/p^k)^\dt = \Gamma_{p^k,2} F^\dt. $$ \item Let $H\mapsto H^\wedge_p$ denote the $p$-adic completion functor. Let $\hat\Gamma_{p,q}$ denote the functor $H\mapsto \Gamma_q( H^\wedge_p)$. \item The $p$-adic cosimplicial group is defined by $$ (\ZZ_p)^\dt = \revC{\hat \Gamma_{p,2}} F^\dt. $$ \end{itemize} \Rem{{\rm The endofunctors $\Gamma_q$ and $\Gamma_{p^k,q}$ are of quotient type. The completed version $\hat\Gamma_{p,q}$ fails to satisfy the surjectivity assumption. }} \Ex{{\rm Let $X(n)$ denote the quotient of $\Delta[n]$ by the set of vertices $\Delta[n]_0$. Then one can check that $\pi_1(\ZZ,-)$ of the inclusion $$ \vee^n X(1) \rightarrow X(n) $$ is the abelianization map $F^n\rightarrow \ZZ^n$. Higher simplices \revC{have} the effect of abelianizing the ordinary fundamental group. }} \subsection{Variants of \revtwo{the} $\Wbar$-construction} We can generalize the adjunction between the $\Wbar$-construction and Kan's loop group functor $G$ with respect to a given endofunctor on the category of groups. \revC{Let $\tau^\dt:\Delta \to \catGrp$ be a cosimplicial group.} We define the functor $$ G(\tau,-):\catsSet \rightarrow \catsGrp\;\;\;\; X\mapsto \pi_1(\tau, \Dec X) $$ which, up to natural isomorphism, is the left Kan extension of $\pi_1(\tau, \Dec \Delta^\dt)$ along the inclusion of the simplex category into the category of simplicial sets. On a $k$-simplex this functor is given by $$ G(\tau,\Delta[k])_n = \coprod_{\varphi:[n]\rightarrow [k]} \tau F^{\varphi(0)} $$ and the simplicial structure is induced from the one of $G \Delta[k]$. There exists a right adjoint of the functor $G(\tau,-)$ which we denote by $$ \Wbar(\tau,-):\catsGrp \rightarrow \catsSet. $$ \revC{We restrict our attention to cosimplicial groups $\tau^\dt$ of the form $\tau F^\dt$ for some endofunctor $\tau: \catGrp \to \catGrp$.} Observe that these constructions recover the usual adjunction $G\adjoint\Wbar$ when $\tau$ is the identity functor. \Pro{\label{pro:simplicesWbar} Let $\tau:\catGrp\to\catGrp$ be an endofunctor, and $\eta:\idy\to\tau$ a natural transformation that is surjective on finitely generated free groups (Definition \ref{def:quotient-type}). Then the set of $k$-simplices of $\Wbar(\tau,K)$ is given by tuples $$ (x_{k-1},x_{k-2},\cdots,x_0) \in K_{k-1}\times K_{k-2}\times \cdots\times K_0 $$ that satisfy the following property: For $1\leq l\leq k$ {\color{black} the homomorphism $f_{k-l}:F^l \to K_{k-l}$ defined by $f_{k-l}(e_j)= (d_0)^{l-j}x_{k-j}$ factors through $\eta_{F^l}:F^l\to \tau F^l$.} } \begin{proof} The set $\Wbar(K)_k$, equivalently the set of simplicial group homomorphisms $\pi_1\Dec\Delta[k]\to K$, is described in Proposition \ref{pro:SGHomSet}. Since $\eta_{F^n}$ is surjective by assumption the induced map $\eta_*:\catGrp(\tau F^n,H)\to \catGrp(F^n,H)$ is injective for any group $H$. We see that there is an inclusion of simplicial sets $\Wbar(\tau,K)\subset \Wbar K$ and {\color{black} as a consequence of \ref{diag:SGHom} } the elements of $\Wbar(\tau,K)_k$ \revC{correspond} to diagrams $$ \begin{tikzcd} \tau F^1 \arrow{r}{d_*^2} \arrow{d}{f_{k-1}} & \tau F^2 \arrow{r}{d_*^3} \arrow{d}{f_{k-2}} & \cdots \arrow{r}{d^k_*} & \tau F^k \arrow{d}{f_{0}} \\ K_{k-1} \arrow{r}{d_0} & K_{k-2} \arrow{r}{d_0} & \cdots \arrow{r}{d_0} & K_0 \end{tikzcd} $$ \end{proof} \Ex{{\rm It is instructive to look at $\Wbar(\ZZ,K)$. The set of $k$-simplices consists of $$ (x_{k-1},x_{k-2},\cdots,x_0) $$ such that the elements $(d_0)^{l-1} x_{k-1},(d_0)^{l-2}x_{k-2},\cdots,\revC{d_0x_{k-l+1}}, x_{k-l}$ pairwise commute for all $1\leq l\leq k$. This easily generalizes to $\Wbar(\Gamma_q,K)$. When $K$ is discrete, i.e. $K_n=G$ for some discrete group $G$ and the simplicial maps are all identity, the geometric realization of $\Wbar(\Gamma_q,G)$ is precisely the space $B(q,G)$ introduced in \cite{ACT12}. }} \subsection{Descending central series filtration} We introduce a simplicial version of the filtration introduced in \cite{ACT12} for the classifying space of a topological group. This filtration is obtained from the sequence of endofunctors $$ \revC{\idy \eqqcolon{}} \Gamma_\infty \rightarrow \cdots \rightarrow \Gamma_q \rightarrow \Gamma_{q-1} \rightarrow \cdots \Gamma_2 $$ associated to the stages of the descending central series. For each endofunctor we have a cosimplicial group $$ \Gamma^\dt_q = \Gamma_q F^\dt. $$ We write $$\Wbar(q,-)=\Wbar(\Gamma_q,-),\;\;\;\;G(q,-)=G(\Gamma_q,-).$$ The resulting sequence \begin{equation}\label{eq:cofilt-G} G(X) \rightarrow \cdots \rightarrow G(q,X) \rightarrow G({q-1},X) \rightarrow \cdots\to G(2,X)=G(\ZZ,X) \end{equation} consists of surjective simplicial group homomorphisms since $\Gamma_q H\to \Gamma_{q-1}H$ is surjective for any group $H$. On the other hand, we have a sequence of inclusions of simplicial sets \begin{equation}\label{eq:filt-W} \Wbar(\ZZ,K)= \Wbar(2,K) \rightarrow \cdots \rightarrow \Wbar(q-1,K) \rightarrow \Wbar({q},K) \rightarrow \cdots \to\Wbar(K) \end{equation} that yields a filtration of the $\Wbar$-construction. Applying \revC{the} $\Wbar$ functor to the sequence of simplicial groups in (\ref{eq:cofilt-G}) gives a cofiltration of $X\simeq \Wbar G(X)$. We can use (\ref{eq:filt-W}) to further filter each term by subspaces of the form $\Wbar(q',G(q,X))$. \revC{The construction} of such filtrations is motivated by \cite[Problem 3]{cohen2016survey}. \subsection{Kan suspension} Let $X$ be a pointed simplicial set. \revC{The Kan suspension of $X$} is the simplicial set $\Sigma X$ whose set of $n$-simplices is given by the wedge $X_{n-1}\vee X_{n-2}\vee \cdots \vee X_{0}$ (\cite[page 189]{GJ99}). An ordinal map $\theta: [m]\rightarrow [n]$ induces $\theta^*:(\Sigma X)_n\rightarrow (\Sigma X)_m$ which maps a wedge summand $X_{n-i}$ to the base point if $\theta^{-1}(i)$ is empty, otherwise it is determined by $\theta_i^*: X_{n-\theta(i)} \rightarrow X_{m-i}$ where $\theta_i$ is defined by the diagram \begin{equation*} \begin{tikzcd} {[m-i]} \arrow{r}{(d^0)^{i}} \arrow{d}{\theta_i} & {[m]} \arrow{d}{\theta} \\ {[n-\theta(i)]} \arrow{r}{(d^0)^{\theta(i)}} & {[n]} \end{tikzcd} \end{equation*} Let $K$ be a simplicial group pointed by the identity element of each $K_n$. There is a canonical map of simplicial sets $$ \kappa: \Sigma K \rightarrow \Wbar K $$ induced by the inclusion $K_{n-1} \vee \cdots \vee K_{0} \rightarrow K_{n-1} \times \cdots \times K_{0} $ at the $n$-th level. \Pro{\label{pro:splitting} Assume that $\tau$ is of quotient type and satisfies the property that $\eta_{F_1}:F_1\to \tau F_1$ is an isomorphism. Then the natural map $$ G\Wbar(\tau,K) \rightarrow G(\Wbar K) $$ splits (naturally) up to homotopy. } This is a simplicial analogue of \cite[Theorem 6.3]{ACT12} that applies to the topological $B_\com$ construction. \begin{proof} First observe that under the assumption on $\tau$ we have that $\eta_C: C\to \tau C$ is an isomorphism for any cyclic group $C$. Then by the description of the simplices of $\Wbar(\tau,K)$ given in Proposition \ref{pro:simplicesWbar} the map $\kappa$ factors through $$ \kappa_\tau: \Sigma K \to \Wbar(\tau,K). $$ The splitting is given by the following diagram $$ \begin{tikzcd} G\Wbar(\tau,K) \arrow{d} & G (\Sigma K) \arrow[l,"G(\kappa_\tau)"'] & \\ G(\Wbar K) \arrow{r}{\sim} & K \arrow{r}& FK \arrow{ul}{\cong} \end{tikzcd} $$ Let us explain the maps. The weak equivalence is the counit of the adjunction between the loop group and bar construction. In degree $n$ the simplicial group $FK$, known as \revC{Milnor's construction} \cite[page 285]{GJ99}, is the free group generated on $K_n-\set{\ast}$. The map $K\rightarrow FK$ sends an $n$-simplex to the corresponding generator of the free group. The set of $n$-simplices of $G (\Sigma K)$ is given by $F(\Sigma K)_{n+1} /F(s_0(\Sigma K)_{n} )$ which can be identified with the $n$-simplices of $FK$ since $s_0(\Sigma K)_{n}$ maps onto the wedge summands of $(\Sigma K)_{n+1}$ other than $X_n$. This isomorphism is compatible with the simplicial structure. The last two maps are already described above. Starting from $K$ the composition of the five maps gives the identity. The splitting is natural with respect to $K$ since each construction is functorial in $K$. \end{proof} \Cor{\label{cor:split-surj}Under the assumption of Proposition \ref{pro:splitting} the natural map $\Wbar(\tau,K)\to \Wbar K$ induces a split surjection on homotopy groups.} \section{Simplicial bundles with $\tau$-atlases}\label{sec:simpbundle} In this section $K$ denotes a simplicial group and $\tau^\dt$ denotes a cosimplicial group obtained from an endofunctor $\tau$, i.e. $\tau^k=\tau F^k$, which is \revC{equipped with a natural transformation} $\eta:\idy\to\tau$ that is surjective on finitely generated free groups (Definition \ref{def:quotient-type}). We introduce simplicial principal bundles with $\tau$-\revC{atlas}. This is the simplicial analogue of a topological definition that generalizes the transitional commutative structure defined for topological bundles\revC{, see Definition \ref{def:tau-structure-top}. We study the relation of simplicial principal bundles with $\tau$-atlas and weak $\tau$-atlas to the objects the simplicial set $\Wbar(\tau,K)$ classifies.} \subsection{Simplicial fiber bundles} First, following \cite{May67}, we introduce simplicial fiber bundles. \Def{\rm{ Let $F$ be a nonempty simplicial set. Then a map of simplicial sets $p:E\to B$ is an \emph{$F$-fiber bundle}, if for each $n$-simplex $b:\Delta[n]\to B$, there exists a pullback square of the form \begin{center} \begin{tikzpicture}[xscale=3,yscale=1.5] \node (C') at (0,1) {$F\times\Delta[n]$}; \node (D') at (1,1) {$E$}; \node (C'') at (0,0) {$\Delta[n]$}; \node (D'') at (1,0) {$B.$}; \node at (.5,.5) {$\lrcorner$}; \path[->,font=\scriptsize,>=angle 90] (C') edge node [above] {$\beta(b)$} (D') (C') edge node [right] {$\pi_2$} (C'') (C'') edge node [above] {$b$} (D'') (D') edge node [right] {$p$} (D''); \end{tikzpicture} \end{center} Such a map $F\times\Delta[n]\to E$ is called a \emph{local trivialization}. A collection of a local trivialization ${\beta(b)}:F\times\Delta[n]\to E$ for each simplex $b\in B_n$ for each $n\ge0$ is called an \emph{atlas} of $p$. }} The automorphism simplicial group $\Aut\,F\subseteq\Map(F,F)$ has a natural right action on the mapping simplicial set $\Map(F,E)$, which is defined as follows. For $m$-simplices $\alpha :F\times\Delta[m]\to F$ of $\Aut\,F$ and $\beta:F\times\Delta[m]\to E$ of $\Map(F,E)$, the product $\beta\cdot\alpha$ is defined as the composite $$ F\times\Delta[m]\xrightarrow{(\alpha,\pi_2)}F\times\Delta[m]\xrightarrow\beta E. $$ \Pro{\label{prop:local trivialiations of fiber bundle form pseudo-torsor} Let $p:E\to B$ be an $F$-fiber bundle, $b\in B_m$ an $m$-simplex of $B$, and $\beta(b)\in\Map(F,E)_m$ a local trivialization of $p$ over $b$. Then the set of local trivializations of $p$ over $b$ is a torsor over the group $\Aut(F)_m$. That is, the following assertions hold. (1) Let $\beta'(b)\in\Map(F,E)_m$ be another local trivialization of $p$ over $b$. Then there exists a unique $m$-simplex $\alpha\in\Aut(F)_m$ such that we have $\beta'(b)=\beta(b)\cdot\alpha$. (2) Let $\alpha\in\Aut(F)_m$ be an $m$-simplex. Then the $m$-simplex $\beta(b)\cdot\alpha\in\Map(F,E)_m$ is also a local trivialization of $p$ over $b$. } \Proof{ By the Pasting Lemma, in the commutative diagram below, the square below $\beta'(b)$ is Cartesian if and only if the square below \revC{$(\alpha,\pi_2)$} is Cartesian. \begin{center} \begin{tikzpicture}[xscale=3,yscale=1.5] \node (B') at (-1,1) {$F\times\Delta[\revtwo{m}]$}; \node (C') at (0,1) {$F\times\Delta[\revtwo{m}]$}; \node (D') at (1,1) {$E$}; \node (B'') at (-1,0) {$\Delta[\revtwo{m}]$}; \node (C'') at (0,0) {$\Delta[\revtwo{m}]$}; \node (D'') at (1,0) {$B.$}; \node at (.5,.5) {$\lrcorner$}; \node at (-.5,.5) {$\lrcorner$}; \path[->,font=\scriptsize,>=angle 90] (B') edge [dashed] node [above] {$(\alpha,\pi_2)$} (C') (B') edge [dashed, bend left=60] node [above] {$\beta'(b)$} (D') (B') edge node [right] {$\pi_2$} (B'') (C') edge node [above] {$\beta(b)$} (D') (C') edge node [right] {$\pi_2$} (C'') (B'') edge node [above] {$\Id_{\Delta[\revtwo{m}]}$} (C'') (C'') edge node [above] {$b$} (D'') (D') edge node [right] {$p$} (D''); \end{tikzpicture} \end{center} } \revC{ \begin{defn} Suppose that $p:E\to B$ is equipped with an atlas. Let $\theta:[n]\to[m]$ be a map of ordinals. Let the map $\theta^*\beta(b):F\times\Delta[n]\to E$ be defined by composition as in the upper triangle of the following commutative diagram: \begin{center} \begin{tikzpicture}[xscale=3,yscale=1.5] \node (B') at (-1,1) {$F\times\Delta[n]$}; \node (C') at (0,1) {$F\times\Delta[m]$}; \node (D') at (1,1) {$E$}; \node (B'') at (-1,0) {$\Delta[n]$}; \node (C'') at (0,0) {$\Delta[m]$}; \node (D'') at (1,0) {$B.$}; \node at (.5,.5) {$\lrcorner$}; \node at (-.5,.5) {$\lrcorner$}; \path[->,font=\scriptsize,>=angle 90] (B') edge node [above] {$\Id\times\Delta[\theta]$} (C') (B') edge [bend left=60] node [above] {$\theta^*\beta(b)$} (D') (B') edge node [right] {$\pi_2$} (B'') (C') edge node [above] {$\beta(b)$} (D') (C') edge node [right] {$\pi_2$} (C'') (B'') edge node [above] {$\Delta[\theta]$} (C'') (C'') edge node [above] {$b$} (D'') (D') edge node [right] {$p$} (D''); \end{tikzpicture} \end{center} By Proposition \ref{prop:local trivialiations of fiber bundle form pseudo-torsor} there exists a map $\alpha_*(b,\theta)\in\Aut(F)_n$ such that $$ \theta^*\beta(b)=\beta(\theta^*b)\cdot\alpha_*(b,\theta). $$ We call this map $\alpha_*(b,\theta)$ a \emph{transition map}. In particular, we let $r_i(b)=\alpha_*(b,d^i)$ for $0\le i\le n$. We say that the atlas $\beta$ is \emph{normalized} if we have $\alpha_*(b,s^i)=1$ for all codegeneracy maps ${s^i}:[n+1]\to[n]$ and all $b\in B_n$. If the atlas is normalized, then we say that it is \emph{regular} if moreover we have $r_i(b)=1$ for $i>0$.\end{defn} \begin{defn} Let $K\le\Aut F$ be a sub-simplicial group. Then a \emph{$K$-atlas of $p$} is an atlas $\set{\beta(b):b\in B_n,\,n\ge0}$ such that for all order-preserving maps $\theta:[m]\to[n]$ in $\catDelta$ and all simplices $b\in B_n$ the transition map $\alpha_*(b,\theta)$ is in $K_m\le\Aut(F)_m$. \end{defn} } \begin{nota} \revC{Let $B$ be a simplicial set. Then we denote by $\int B=\int^{\catDelta^\op}B$ the Grothendieck construction of $B:\catDelta^\op\xrightarrow{}\catSet$. That is, the category $\int B$ over $\catDelta$ is defined as follows:} \begin{itemize} \item The objects are the simplicial set maps $b:\Delta[n]\xrightarrow{} B$ for $n\geq 0$. \item The morphisms are the commuting triangles $$ \begin{tikzcd} \Delta[m] \arrow{r}{\theta} \arrow[rd,"\theta^*b"'] & \Delta[n] \arrow{d}{b} \\ & B. \end{tikzcd} $$ \revC{We will denote these morphisms by $\theta:\theta^*b\xrightarrow{} b$.} \item We have a forgetful map $U:\int B\xrightarrow {}\catDelta$ \end{itemize} \end{nota} \begin{nota} \revC{Let $K$ be a simplicial group. Then we denote by $\int K=\int^{\catDelta^\op}K$ the Grothendieck construction of $\catDelta^\op\xrightarrow K\catGrp\hookrightarrow\catCat$. That is, the category $\int K$ over $\Delta$ is defined as follows:} \begin{itemize} \item The objects are the ordinals $[n]$ where $n\geq 0$. \item The morphisms are the pairs $$ (\theta,k):[m]\xrightarrow{} [n] $$ where $\theta$ is an ordinal map and $k\in K_m$. Composition is defined by $$ (\theta,k)(\varphi,k')=(\theta\varphi,k'\varphi^*(k)). $$ \item We have a forgetful map $U:\int K\to\catDelta$ \end{itemize} \end{nota} \begin{cons} \revC{ Let $p:E\xrightarrow{}B$ be an $F$-fiber bundle, $K\le\Aut F$ a sub-simplicial group, $\beta$ a $K$-atlas for $p$, and $\alpha_*$ the corresponding collection of transition maps. Then we can construct the functor} \begin{equation}\label{diag:tran-func} \begin{tikzcd} \int B \arrow{r}{\alpha_*}\arrow[rd,"U"'] & \int K \arrow{d}{U} \\ & \catDelta \end{tikzcd} \end{equation} \revC{by sending an $n$-simplex $b\in B_n$ to the object $[n]$ and a morphism $\theta:\theta^*b\xrightarrow{} b$ to the pair $(\theta,\alpha_*(b,\theta))$.} \end{cons} \Rem{ Suppose that $\alpha_*(b,\theta)=1$ for all maps $\theta:[m]\xrightarrow{}[n]$ in $\catDelta$ and $b\in B_n$. Then the atlas $\beta$ defines an isomorphism \revC{$F\times B=\colim{b\in\int B}(F\times\Delta[n])\to E$} \cite[Theorem 19.4]{May67}. } \Lem{\label{pro:transition} The assignment specified by $\alpha_*$ defines a functor. } \Proof{ Let $[k]\xrightarrow\phi[m]\xrightarrow\theta[n]$ be a diagram in $\catDelta$, and $b\in B_n$. We need to show that $$ (\theta\circ\phi,\alpha_*(\theta\circ\phi))=(\theta,\alpha_*\theta)\circ(\phi,\alpha_*\phi) =(\theta\circ\phi,\alpha_*\phi\cdot\phi^*\alpha_*\theta). $$ By definition, the transition map $\alpha_*\theta\in\Aut(F)_m$ is the unique element such that \begin{align*} \theta^*\beta(b)&=\beta(\theta^*b)\cdot\alpha_*\theta \intertext{in $\Map(F,E)_m$. Therefore, restricting along $\phi$ we get} \phi^*\theta^*\beta(b)&=\phi^*\beta(\theta^*b)\cdot\phi^*\alpha_*\theta, \intertext{substituting into which the definition of $\alpha_*\phi$, we get} \phi^*\theta^*\beta(b)&=\beta(\phi^*\theta^*b)\cdot\alpha_*\phi\cdot\phi^*\alpha_*\theta, \end{align*} which by definition shows that $\alpha_*(\theta\circ\phi)=\alpha_*\phi\cdot\phi^*\alpha_*\theta$. } \revC{ Let $p:E\to B$ be a $K$-fiber bundle equipped with a $K$-atlas $\beta$. We use the nerve $N\alpha_*$ to say when is $\beta$ a $\tau$-atlas on $p$ in Definition \ref{def:tau-structure}. In Lemma \ref{lem:tau-equivalent-onedirection} we show that if $p$ admits a $\tau$-atlas, then its classifying map $\Hat r:B\to \Wbar K$ (see Theorem \ref{thm:r-map}) factors through the inclusion $\Wbar (\tau,K)\to\Wbar K$. The following Conjecture is needed to show that if $p$ admits a weak $\tau$-atlas, then the homotopy class of $\hat r$ lifts to $[B,\Wbar(\tau,K)]$ (see Lemma \ref{lem:weak-tau-implies-tau-structure}). \begin{conj}\label{conj:N-alpha-classifies} Let $p:E\to B$ be a principal $K$-bundle and $\alpha$ be an atlas. Then the map $N \alpha_*: N\int B \to N\int K$ is a classifying map for $p:E\to B$, i.e.~under the relevant zigzag of equivalences (see Section \ref{sec:hocolim}) the homotopy class of $N\alpha_*$ coincides with $[\hat r]\in [B,\Wbar K]$. \end{conj} } \subsection{$\tau$-atlases} Recall that the endofunctor $\tau:\catGrp\xrightarrow{}\catGrp$ is equipped with a natural map $\eta:\Id_{\catGrp}\xrightarrow{}\tau$ such that for all $k\ge0$ the map $\eta_{F^k}:F^k\xrightarrow{}\tau^k$ is surjective. In particular, for a group $G$, the induced map $\catGrp(\tau^k,G)\xrightarrow{}\catGrp(F^k,G)$ is injective. By abuse of notation we will identify $\catGrp(\tau^k,G)$ with its image and write $\catGrp(\tau^k,G)\subseteq\catGrp(F^k,G)$. Let \revC{$N(\tau,\int K)$} denote the sub-simplicial set of the nerve \revC{$N\int K$} whose $k$-simplices are given by $$ [n_0] \xrightarrow{(\theta_1,x_0)} [n_1] \xrightarrow{(\theta_2,x_1)} \cdots \xrightarrow{(\theta_k,x_{k-1}) } [n_k] $$ such that \revC{for $1\leq l\leq k$ the tuple $$ ( x_{k-l},\theta_{k-l+1}^*x_{k-l+1},\cdots, \theta_{k-l+1}^*\cdots\theta_{k-2}^* x_{k-2}, \theta_{k-l+1}^*\cdots\theta_{k-1}^*x_{k-1}) $$ belongs to $N(\tau,K_{n_{k-l}})_l=\catGrp(\tau^l,K_{n_{k-l}})\subseteq\catGrp(F^l,K_{n_{k-l}})\cong K_{n_{k-l}}^{\times l}$.} The simplicial structure is induced from the nerve. \Def{{\rm\label{def:tau-structure} Let $p:E\to B$ be a fiber bundle. An atlas $\beta$ for $p$ is said to be a \revC{$\tau$-atlas} if the nerve $N\alpha_*$ of the associated transition functor $\alpha_*$ (\ref{diag:tran-func}) maps into \revC{$N(\tau,\int\Aut(F))\subseteq N\int\Aut(F)$}. }} \revC{ \begin{rem} Let $K\le\Aut(F)$ be a sub-simplicial group and suppose that $\beta$ is a $K$-atlas. Then as $\tau$ is an endofunctor $\beta$ is a $\tau$-atlas if and only if $N\alpha_*$ factors through $N(\tau,\int K)\subseteq N\int K$. \end{rem} } \begin{ex} \label{ex:simpfromtop} {\rm \revC{Let $G$ be a topological group and $\pi:P\xrightarrow{} X$ a principal $G$-bundle. In Definition \ref{def:tau-structure-top} we define what it means for a trivialization of $\pi$ along an open cover to have a $\tau$-structure. Out of this data, in Construction \ref{cons:S_UP} we show how to construct a principal $SG$-bundle $S_\mathscr UP\to S_\mathscr UX$ with a $\tau$-atlas.} } \end{ex} \revthree{ \begin{thm}\label{thm:full-zigzag-Ntau} There exists a zigzag of weak equivalences $N(\tau,\int K)\stackrel{\sim}{\longleftrightarrow}\Wbar(\tau,K)$ natural in $\tau$ and $K$. \end{thm} \begin{proof} We refer to Appendix \ref{app:hocolim} for the notation. More precisely we will show that there is a zigzag of weak equivalences $$ N(\tau,\int K) \cong T\Psi' N(\tau,K) \xleftarrow{CR} d\Psi'N(\tau,K) \xrightarrow{BK} d N(\tau,K) \xrightarrow{CR} \Wbar (\tau,K) $$ natural in $\tau$. Note that both the Bousfield--Kan (Definition \ref{def:BK}) and Cegarra--Remedios (Definition \ref{def:CR}) maps are defined for arbitrary bisimplicial sets, so it is enough to check that the Tonks isomorphism (Proposition \ref{pro:N int F iso T Psi' NF}) $N\int K\to T\Psi' NK$ restricts to an isomorphism $N(\tau,\int K)\to T\Psi' N(\tau,K)$. Let's take an $l$-simplex $[n_0]\xrightarrow{\theta_0,k_0}\dotsb\xrightarrow{\theta_{l-1},k_{l-1}}[n_l]$ of $N\int K$. We need to show that this is in $N(\tau,\int K)_l$ if and only if its image is in $(T\Psi' N(\tau,K))_l$. But that follows from construction: the component of the image in $(\Psi' NK)_{i,l-i}$ is the pair $$ ([n_0]\xrightarrow{\theta_0}\dotsb\xrightarrow{\theta_{i-1}}[n_i], (k_i,\theta_i^*k_{i+1},\dotsc,\theta_i^*\dotsb\theta_{l-2}^*k_{l-1})). $$ \end{proof} } \subsection{Simplicial principal bundles} \revC{Let $K$ be a simplicial group.} Then a principal $K$-bundle is a map of simplicial sets \revC{$p:E\xrightarrow{}B$} where $K$ acts freely on $E$ \revC{from the left }and $B$ is isomorphic to the quotient space. Free action can be formulated by saying that we have a pull-back diagram \begin{center} \begin{tikzpicture}[xscale=3,yscale=1.5] \node (C') at (0,1) {$K\times E$}; \node (D') at (1,1) {$E$}; \node (C'') at (0,0) {$E$}; \node (D'') at (1,0) {$B.$}; \node at (.5,.5) {$\lrcorner$}; \path[->,font=\scriptsize,>=angle 90] (C') edge node [above] {$m$} (D') (C') edge node [right] {$\pi_2$} (C'') (C'') edge node [above] {$p$} (D'') (D') edge node [right] {$p$} (D''); \end{tikzpicture} \end{center} \noindent where $\pi_2$ is the projection and $m$ is the action map. \revC{For each $b\in B_n$ and $n\ge0$ pick an element $\sigma(b)\in p^{-1}(b)$. Then the diagram \begin{center} \begin{tikzpicture}[xscale=4,yscale=1.5] \node (C') at (0,1) {$K\times \Delta[n]$}; \node (D') at (1,1) {$E$}; \node (C'') at (0,0) {$\Delta[n]$}; \node (D'') at (1,0) {$B$}; \node at (.5,.5) {$\lrcorner$}; \path[->,font=\scriptsize,>=angle 90] (C') edge node [above] {$\beta(b)(k,\theta)=k\cdot \theta^*\sigma(b)$} (D') (C') edge node [right] {$\pi_2$} (C'') (C'') edge node [above] {$b$} (D'') (D') edge node [right] {$p$} (D''); \end{tikzpicture} \end{center} is a pullback square. This gives a $K$-atlas for $p$ as a $K$-fiber bundle and the transition functor has the form $$ \alpha_*: \revC{\int B}\to \revC\int K. $$ Conversely, suppose that there exists a $K$-atlas $\set{\beta(b):b\in B_n,\,n\ge0}$ for $p$ as a $K$-fiber bundle. Then we can define an action map $m:K\times E\xrightarrow{}E$ equipping $p$ with the structure of a principal $K$-bundle as follows: for $n\ge0$ take $(k,x)\in K_n\times E_n$. Let $b=p(x)$. Then we have $x=\beta(b)(l,\Id_{\Delta[n]})$ for some $l\in K_n$. Let $m(k,x)=\beta(b)(kl,\Id_{\Delta[n]})$. We get mutually inverse bijections \begin{center} \begin{tikzpicture}[ Brace/.style={ thick, decoration={ brace, amplitude=5pt }, decorate }, FuncArrow/.style={ -{To[length=3pt]}, shorten >=8pt, shorten <=8pt }, every text node part/.style={align=center} ] \node[align=center] (R) at (-4,0) {$K$-atlases $\beta$\\ for $p$ as a\\ $K$-fiber bundle}; \node[align=center] (C) at (4,0) {Principal $K$-bundle structures on $p$\\ with a choice $\sigma(b)\in p^{-1}(b)$\\ for every $b\in B_n$ for every $n\ge0$}; \draw[FuncArrow,transform canvas={yshift=0.15cm}] (R) -- (C) node[midway,above]{$\scriptstyle m(k,x)=\beta(b)(kl,\Id_{\Delta[n]})$\\$\scriptstyle\sigma(b)=\beta(b)(1,\Id_{\Delta[n]})$}; \draw[FuncArrow,transform canvas={yshift=-0.15cm}] (C) -- (R) node[midway,below]{$\scriptstyle\beta(b)(k,\theta)=k\cdot\theta^*\sigma(b)$}; \foreach \nodename in {R,C} { \draw [Brace] (\nodename.north east) -- (\nodename.south east); \draw [Brace] (\nodename.south west) -- (\nodename.north west); } \end{tikzpicture} \end{center} } \revC{ The collection $\set{\sigma(b)\in p^{-1}(b):b\in B_n,\,n\ge0}$ is called a \emph{pseudo-section} if for all $b\in B_n,\,n\ge0$ we have \begin{align*} s_i\sigma(b)=&\sigma(s_ib)\text{ for all }0\le i\le n\text{ and }\\ d_i\sigma(b)=&\sigma(d_ib)\text{ for all }0<i\le n. \end{align*} Note that the collection $\sigma$ is a pseudo-section if and only if the corresponding $K$-atlas $\beta$ is regular. For $b\in B_{n+1}$ and $n\ge0$ let $r(b)\in K_n$ be the unique element such that $$ d_0\sigma(b) = r(b)\cdot \sigma(d_0b). $$ In terms of the transition functions we have $r(b)=\alpha_*(b,d_0)$. Let $H^1(B,K)$ denote the isomorphism classes of principal $K$-bundles over $B$ (see Remark \ref{rem:H1-tau}). } \revC{ \begin{thm}\label{thm:r-map}\cite{May67}*{\S21} The map sending a map $r:B\to\Wbar K$ to the pullback $WB\times_{\Wbar K}B$ of the universal principal $K$-bundle $WK\to\Wbar K$ along $r$ induces a bijection $$ [B,\Wbar K]\to H^1(B,K). $$ The preimage of a principal $K$-bundle $p:E\to B$ is the homotopy class of the adjoint $\Hat r:B\to\Wbar K$ of the map $r:GB\xrightarrow{b\mapsto r(b)}K$. \end{thm} } \subsection{\revC{On the c}lassification of principal bundles with $\tau$-structure} The category of simplicial sets comes with the Quillen model structure \cite{quillen2006homotopical}. As it is well-known $\Wbar K$ is fibrant in this model structure i.e. a Kan complex. However, $\Wbar(\tau,K)$ is not necessarily fibrant. This is even the case for a discrete non-abelian group if we take $\tau^\dt=\ZZ^\dt$. Therefore the homotopy classes of maps $[\revC B,\Wbar(\tau,K)]$, the set of morphisms in the homotopy category $\Ho(\catsSet)$, cannot be represented as simplicial homotopy classes of maps. \revC{As a fibrant replacement we can take $S|\Wbar(\tau,K)|$, which by Theorem \ref{thm:B-Wbar} is equivalent to $SB(\tau,|K|)$. Then $[B,\Wbar(\tau,K)]$ is in bijective correspondence with the set of simplicial homotopy classes of maps $B\to SB(\tau,|K|)$. Correspondingly, in Lemma \ref{lem:tau-equivalent-seconddirection} we show that a homotopy class in $[B,\Wbar(\tau,K)]$ induces a principal $K$-bundle together with an equivalence with a principal $S|K|$-bundle that is furthermore equipped with a $\tau$-atlas, which structure we call a topological $\tau$-atlas. Conversely, we show in Lemma \ref{lem:weak-tau-implies-tau-structure} that provided Conjecture \ref{conj:N-alpha-classifies} holds if a principal $K$-bundle $p:E\to B$ admits a weak $\tau$-atlas, which is a more homotopically correct relaxation of the notion of $\tau$-atlas, then it is classified by a homotopy class in $[B,\Wbar(\tau,K)]$.} The inclusion map $\iota:\Wbar(\tau,K)\to \Wbar K$ induces a map \begin{equation}\label{eq:iota-star} \iota_*:[\revC{B}, \Wbar(\tau,K)] \to [\revC{B},\Wbar K] \end{equation} which is, in general, neither injective nor surjective. Under the assumption of \revC{Proposition} \ref{cor:split-surj} it is surjective when $|\revC{B}|\simeq S^n$. However, it fails to be injective: \revC{Let $G$ be an extraspecial $p$-group of order $p^{2n+1}$ where $n\geq 2$ as in Example \ref{ex:examples}. Then $[S^n, \Wbar G]$ is trivial whereas $[S^n,\Wbar(\ZZ,G)]$ is a free abelian group of finite rank since the universal cover of $\Wbar(\ZZ,G)$ is a wedge of finitely many $n$-spheres. } \revC{ One would like to interpret $[B,\Wbar(\tau,K)]$ as equivalence classes of principal $K$-bundles which admit a $\tau$-atlas as in its topological analogue Theorem \cite[Theorem 2.2]{AG15} (see Theorem \ref{thm:factorsuptohomotopy}). One way to proceed is to define the equivalence relation using homotopy classes of maps.} \Def{{\rm \label{def:tau-concordance} Let $p:E\to B$ be a principal $K$-bundle and $f: B\to \Wbar K$ denote a classifying map. A choice of a homotopy class in $\iota_*^{-1}([f])$, where $\iota_*$ is as defined in (\ref{eq:iota-star}), is called a $\tau$-structure for the principal bundle $p$. Consider two principal $K$-bundles \revC{$p_i:E_i\to B$,} $i=0,1$, together with $\tau$-structures $[f_\tau^i]$. We say \revC{$(p_0,[f_\tau^0])$} is $\tau$-concordant to \revC{$(p_1 ,[f_\tau^1])$}, written as \revC{$(p_0,[f_\tau^0])\sim_\tau (p_1,[f_\tau^1])$,} if there exists a principal $K$-bundle $p:E\to B\times {\color{black}\Delta[1]}$ with a $\tau$-structure $[f_\tau]$ such that $$ p|_{B\times \set{i}} = p_i,\;\;\;\; [f_\tau|_{B\times\set{i}}] = [f_\tau^i]. $$ Let $H^1_\tau(B,K)$ denote the set of $\tau$-concordance classes of \revC{pairs $(p:E\to B,[f_\tau])$ consisting of a principal $K$-bundle and a $\tau$-structure.} }} \Rem{\label{rem:H1-tau} {\rm When $\tau^\dt=F^\dt$ the set $H^1_\tau(B,K)$ coincides with the set $H^1(B,K)$ of isomorphism classes of principal $K$-bundles. }} \revC{ \begin{pro}\label{pro:TheProposition} For $i=0,1$ let $p_i:E_i\to B$ be a principal $K$-bundle, let $f_i:B\to\Wbar K$ be a classifying map for $p_i$ and let $[f_\tau^i]\in[B,\Wbar (\tau,K)]$ be a $\tau$-structure for $p_i$. Then the following statements are equivalent: \begin{enumerate} \item We have a $\tau$-concordance $(p_0,[f_\tau^0])\sim_\tau(p_1,[f_\tau^1])$. \item The principal $K$-bundles $p_0$ and $p_1$ are equivalent, and all principal $K$-bundles $p:E\to B\times\Delta[1]$ such that $p|_{B\times\{i\}}= p_i$ for $i=0,1$ admit a $\tau$-structure $[f_\tau]\in[B\times\Delta[1],\Wbar (\tau,K)]$ such that $[f_\tau|_{B\times\{i\}}]=[f^i_\tau]$ for $i=0,1$. \item The homotopy classes of maps $[f_\tau^0],[f_\tau^1]\in[B,\Wbar (\tau,K)]$ are equal. \end{enumerate} \end{pro} \begin{proof} (1) $\Rightarrow$ (3): Let $p:E\to B\times\Delta[1]$ be a principal $K$-bundle such that $p|_{B\times\{i\}}=p_i$ for $i=0,1$ and let $[f_\tau]\in[B\times\Delta[1],\Wbar (\tau,K)]$ be a $\tau$-structure for $p$ such that $[f_\tau|_{B\times\{i\}}]=[f_\tau^i]$ for $i=0,1$. Let $\iota_i:B\to B\times\Delta[1]$ denote the maps induced by the inclusions $\{i\}\to\Delta[1]$ for $i=0,1$. Then from $[\iota_0]=[\iota_1]$ we get $[f_\tau^0]=[f_\tau]\circ[\iota_0]=[f_\tau]\circ[\iota_1]=[f_\tau^1]$. (3) $\Rightarrow$ (2): Since we have $[f_\tau^0]=[f_\tau^1]$ we get $[f_0]=[f_1]$, that is $p_0\sim p_1$. Let $p:E\to B\times\Delta[1]$ be a principal $K$-bundle such that $p|_{B\times\{i\}}=p_i$ for $i=0,1$. Then $p$ is classified by a homotopy $H:B\times\Delta[1]\to\Wbar K$ such that $H|_{B\times\{i\}}=f_i$ for $i=0,1$. Let $\pi_B:B\times\Delta[1]\to B$ denote the projection map and $H_0=f_0\circ\pi_B:B\times\Delta[1]\to\Wbar K$ denote the homotopy with constant value $f_0$. There is a simplicial homotopy $(B\times \Delta[1])\times \Delta[1] \to \Wbar K$ between $H$ and $H_0$ obtained by first lifting the map $\revtwo{B\times}\Lambda^2_1\to \Wbar K$, defined by gluing $H$ and $H_0$, to $\revtwo{B\times}\Delta[2]\to \Wbar K$ and precomposing this map with $\Delta[1]\times \Delta[1]\to \Delta[2]$ induced by the map of posets $[1]\times [1]\to [2]$ defined by $(0,0)\mapsto 0$, $(0,1)$ and $(1,0)\mapsto 1$, $(1,1)\mapsto 2$. Thus we have $[H]=[H_0]$. Then $[\revtwo{f_\tau^0}]\circ[\pi_B]\in[B\times\Delta[1],\Wbar (\tau,K)]$ is a lift to $[B\times\Delta[1],\Wbar (\tau,K)]$ of $[H_0]$ and thus of $[H]$. That is, it is a $\tau$-structure for $p$. (2) $\Rightarrow$ (1): Trivial. \end{proof} \begin{cor}\label{cor:ClassificationWithTauStructure} The map $$ H^1_\tau(B,K)\xrightarrow{[(p:E\to B,[f_\tau])]\mapsto[f_\tau]}[B,\Wbar (\tau,K)] $$ induced by the forgetful map is a bijection. \end{cor} \begin{proof} Proposition \ref{pro:TheProposition} shows that the map is well defined and injective. For surjectivity, given a homotopy class $[f_\tau]\in[B,\Wbar (\tau,K)]$ one can take a representative $f:B\to\Wbar K$ of its image in $[B,\Wbar K]$ and then the principal $K$-bundle $p:E\to B$ classified by $f$. \end{proof} In the rest of this section we study the relationship between $\tau$-structures and $\tau$-atlases with an eye towards improving Definition \ref{def:tau-concordance}. } \Lem{\label{lem:tau-equivalent-onedirection} \revC{If a principal $K$-bundle $p:E\to B$ admits a $\tau$-atlas then the classifying map $\hat r:B\to \Wbar K$ factors through the inclusion $\Wbar(\tau,K)\subset \Wbar K$.} } \begin{proof} \revC{ We will make use of the unit $\eta$ and the counit $\epsilon$ of the adjunction $G\adjoint \Wbar$. The map $\eta_X: X\to \Wbar G X$ sends $x\in X_n$ to the tuple $([x],[d_0x],\cdots,[(d_0)^{n-1} x])$ and $\epsilon_K: G\Wbar K\to K$ maps $[k_{n},k_{n-1},\cdots,k_0]$ to $k_{n}\in K_n$ (\cite[Lemma 5.3]{GJ99}). } \revC{Assume that $p$} has a $\tau$-\revC{atlas. That is, the} nerve of the functor \revC{$\alpha_*:\int B\to \int K$} factors through the simplicial set \revC{$N(\tau,\int K)$}. \revC{The classifying map $\hat r:B\to \Wbar K$ in degree $n$ sends $b\in B_n$ to the tuple $(\alpha_*(b,d^0),\alpha_*(d_0 b,d^0),\cdots,\alpha_*((d_0)^{n-1}b,d^0) )$ see Theorem \ref{thm:r-map} \revtwo{or} the proof of \cite[Theorem 21.7]{May67}. That is, $\hat r$ is the composite $X\xrightarrow{\eta_X} \Wbar G X \xrightarrow{\Wbar r} \Wbar K$. Note that this map factors through $\Wbar(\tau,K)$ as a consequence of the description given in Proposition \ref{pro:simplicesWbar}. } \end{proof} \revC{ One would like to have a converse of Lemma \ref{lem:tau-equivalent-onedirection} if the factorization is required to exist in the homotopy category $\Ho(\catsSet)$. However, we do not know if this is correct. The main issue is that the classifying space $\Wbar (\tau,K)$ is not fibrant. To overcome this difficulty we relax the notion of a $\tau$-atlas. We give two more general definitions. The notion of a weak $\tau$-atlas reflects that $\Wbar(\tau,K)$ is not fibrant, while the notion of a topological $\tau$-atlas reflects that we can take $S|\Wbar (\tau,K)|\simeq SB(\tau,|K|)$ as a fibrant replacement of $\Wbar (\tau,K)$. In Lemma \ref{lem:topological tau-atlas => weak tau-atlas} we show that a topological $\tau$-atlas is a weak $\tau$-atlas. In Lemma \ref{lem:tau-equivalent-seconddirection}, we show that if a principal bundle has a $\tau$-structure, then it has a topological $\tau$-atlas. In Lemma \ref{lem:weak-tau-implies-tau-structure} we close the circle of equivalences by showing that provided Conjecture \ref{conj:N-alpha-classifies} holds, if a principal bundle has a weak $\tau$-atlas, then it has a $\tau$-structure. } {\color{black} \begin{defn} Let $p:E\to B$ be a principal $K$-bundle. Suppose that the topological principal $|K|$-bundle $|p|$ admits a $\tau$-atlas (see Definition \ref{def:tau-structure-top}) along an open cover $\mathscr U$ of the realization $|B|$. Then the corresponding \emph{topological $\tau$-atlas on $p$} is the diagram $$ \begin{tikzcd} E \arrow{d}{p}\arrow{r}{\eta_E}& S|E| \arrow{d}{S|p|} & S_\mathscr U|E| \arrow{d}{S_\mathscr U|p|} \arrow[l,phantom,"\supseteq"] \\ B \arrow{r}{\eta_B} & S|B| & S_\mathscr U|B| \arrow[l,phantom,"\supseteq"] \end{tikzcd} $$ where $\eta:\Id_{\catsSet}\to S\circ|\,|$ is the unit map of the Quillen equivalence $(|\,|,S)$ together with the $\tau$-atlas on the principal $S|K|$-bundle $S_\mathscr U|p|$ given by Proposition \ref{pro:tau-atlasSU}. \end{defn} \begin{defn}\label{def:weaktau} Let $p:E\to B$ be a principal $K$-bundle. Then a \emph{weak $\tau$-atlas} is the collection of: \begin{enumerate} \item a zigzag of simplicial group homomorphisms \revtwo{between a collection $K_0,K_1,\cdots,K_n$ of simplicial groups} $$ K=K_0 \xrightarrow{\phi_0} K_1 \xleftarrow{\phi_1} K_ 2 \xrightarrow{\phi_2} \cdots \xleftarrow{\phi_{n-1}} K_n $$ such that for all $0\le i<n$ the induced map $\Wbar (\tau,\phi_i):\Wbar (\tau,K_{i-1})\to\Wbar (\tau,K_i)$ is a weak equivalence, \item a commutative diagram $$ \begin{tikzcd} E \arrow{d}{p}\arrow[r,"F_0","\sim"']& E_1 \arrow{d}{p_1} & E_2 \arrow[d,"p_2"] \arrow[l,"F_1"',"\sim"] \arrow[r,"F_2","\sim"'] & \cdots & E_n \arrow[d,"p_n"] \arrow[l,"F_{n-1}"',"\sim"] \\ B \arrow[r,"f_0","\sim"'] & B_1 & B_2 \arrow[l,"f_1"',"\sim"] \arrow[r,"f_2","\sim"'] & \cdots & B_n \arrow[l,"f_{n-1}"',"\sim"] \end{tikzcd} $$ where \begin{enumerate} \item for $1\le i\le n$ the map $p_i$ is a principal $K_i$-bundle, \item the map $F_{i-1}$ is $\phi_{i-1}$-equivariant \end{enumerate} and \item a $\tau$-atlas on the principal $K_n$-bundle $p_n$. \end{enumerate} \end{defn} \begin{lem}\label{lem:topological tau-atlas => weak tau-atlas} Let $p:E\to B$ be a principal $K$-bundle. Then a topological $\tau$-atlas on $p$ is a weak $\tau$-atlas. \end{lem} \begin{proof} Consider the diagram $$ \begin{tikzcd} E \arrow{d}{p}\arrow{r}{\eta_E}& S|E| \arrow{d}{S|p|} & S_\mathscr U|E| \arrow{d}{S_\mathscr U|p|} \arrow[l,phantom,"\supseteq"] \\ B \arrow{r}{\eta_B} & S|B| & S_\mathscr U|B| \arrow[l,phantom,"\supseteq"] \end{tikzcd} $$ given by a topological $\tau$-atlas. The left square is commutative by naturality of the unit map. The unit map $\eta_E:E\to S|E|$ is an $\eta_K$-equivariant map: Take $x\in E_n$ and $k\in K_n$. Then we have $$ \eta_E(kx)(u)=[u,kx]=[u,k]\cdot[u,x]=(\eta_K(k)\cdot\eta_E(x))(u) \text{ for }u\in\Delta^n. $$ The right square is a pullback square by construction, and the horizontal maps are weak equivalences \cite{dugger2004topological}*{Corollary 3.5}. \end{proof} } \Lem{\label{lem:tau-equivalent-seconddirection} \revC{ Let $p:E\to B$ be a principal $K$-bundle. If $p$ has a $\tau$-structure then $p$ admits a topological $\tau$-atlas. } } \begin{proof} \revC{ By definition of a topological $\tau$-atlas, we need to show that the topological principal $|K|$-bundle $|p|$ admits a $\tau$-atlas. By assumption the homotopy class of the classifying map $B\xrightarrow{\Hat r}\Wbar K$ factors through the homotopy class of the inclusion $\Wbar (\tau,K)\to\Wbar K$. By Theorem \ref{thm:B-Wbar} (and its proof) we have a commutative diagram} $$ \begin{tikzcd} {|\Wbar(\tau,K)|} \arrow{d} & {|dN(\tau,K)|} \arrow[l,"\simeq"'] \arrow{r}{\cong} \arrow{d} & B(\tau,|K|) \arrow{d} \\ {|\Wbar K|} & {|dNK|} \arrow[l,"\simeq"'] \arrow{r}{\cong} & B|K|. \end{tikzcd} $$ \revC{ Therefore using Corollary \ref{cor:zigzag-cl} we get that the homotopy class of the classifying map of the principal $|K|$-bundle $|p|$ factors through the map $B(\tau,K)\to BK$. By Theorem \ref{thm:factorsuptohomotopy} this shows that $|p|$ admits a $\tau$-atlas. } \end{proof} \Rem{ {\rm \revC{ If the unit map $\eta_K:K\to S|K|$ has a homotopy inverse $\phi$ which is also a simplicial group homomorphism then the principal $S|K|$-bundle $S_{\mathscr U}|p|$ can be turned into a $K$-bundle via change of structure group along $\phi$. This is the case for $K=SG$, where $G$ is a topological group, since the simplicial group homomorphism $S\epsilon_G: S |SG|\to SG$ is a homotopy inverse of $\eta_{SG}$. In this situation $\Wbar(\tau,K)$ classifies principal $K$-bundles with a stronger notion of topological $\tau$-atlas: the principal $K$-bundle on $S_{\mathscr U}|B|$ we get has a $\tau$-atlas so we get a zigzag as in the Proof of Lemma \ref{lem:tau-equivalent-seconddirection} but with all principal bundles being $K$-bundles and both upper horizontal maps being $K$-equivariant. } } } \begin{lem}\label{lem:weak-tau-implies-tau-structure} \revC{ Suppose that $p$ admits a weak $\tau$-atlas. If Conjecture \ref{conj:N-alpha-classifies} holds then $p$ admits a $\tau$-structure. } \end{lem} \begin{proof} \revC{ Suppose that $p:E\to B$ admits a weak $\tau$-atlas as in Definition \ref{def:weaktau}, that is there exists a zigzag of simplicial group homomorphisms $$ K =K_0\xrightarrow{\phi_0} K_1 \xleftarrow{\phi_1} K_ 2 \xrightarrow{\phi_2} \cdots \xleftarrow{\phi_{n-1}} K_n $$ such that for all $0\le i<n$ the induced map $\Wbar (\tau,K_{i-1})\to\Wbar (\tau,K_i)$ is a weak equivalence, and a commutative diagram} $$ \begin{tikzcd} E \arrow{d}{p}\arrow[r,"F_0","\sim"']& E_1 \arrow{d}{p_1} & E_2 \arrow[d,"p_2"] \arrow[l,"F_1"',"\sim"] \arrow[r,"F_2","\sim"'] & \cdots & E_n \arrow[d,"p_n"] \arrow[l,"F_{n-1}"',"\sim"] \\ B \arrow[r,"f_0","\sim"'] & B_1 & B_2 \arrow[l,"f_1"',"\sim"] \arrow[r,"f_2","\sim"'] & \cdots & B_n \arrow[l,"f_{n-1}"',"\sim"] \end{tikzcd} $$ \revC{where for $1\le i\le n$ the map $p_i$ is a principal $K_i$-bundle, the map $F_{i-1}$ is $\phi_{i-1}$-equivariant and the principal $K_n$-bundle $p_n$ has a $\tau$-atlas. By definition the last condition means that the transition functor $N\int B_n\xrightarrow{N\alpha_*}N\int K_n$ corresponding to the atlas factors through the inclusion $N(\tau,\int K_n)\to N\int K_n$. By Conjecture \ref{conj:N-alpha-classifies} and Theorem \ref{thm:full-zigzag-Ntau}, this implies that $p_n$ has a $\tau$-structure, that is the homotopy class of a classifying map $B_n\xrightarrow{\hat r_n}\Wbar K_n$ of $p_n$ factors through the homotopy class of the inclusion $\Wbar(\tau,K_n)\to\Wbar K_n$. Let $\Hat r:B\to\Wbar K$ be a classifying map for $p$ and for $1\le i<n$ let $\Hat r_i:B_i\to\Wbar K_i$ be a classifying map for $p_i$. By the weak $\tau$-atlas data we have a homotopy commutative diagram} $$ \begin{tikzcd}[column sep=large] B \arrow[r,"f_0","\sim"'] \arrow[d,"\Hat r"] & B_1 \arrow[d,"\Hat r_1"] & B_2 \arrow[l,"f_1"',"\sim"] \arrow[r,"f_2","\sim"'] \arrow[d,"\Hat r_2"] & \cdots & B_n \arrow[l,"f_{n-1}"',"\sim"] \arrow[d,"\Hat r_n"] \\ \Wbar K \arrow[r,"\Wbar \phi_0","\sim"'] \arrow[d,phantom,"\rotatebox{90}{$\subseteq$}"] & \Wbar K_1 \arrow[d,phantom,"\rotatebox{90}{$\subseteq$}"] & \Wbar K_2 \arrow[l,"\Wbar \phi_1"',"\sim"] \arrow[r,"\Wbar \phi_2","\sim"'] \arrow[d,phantom,"\rotatebox{90}{$\subseteq$}"]& \cdots & \Wbar K_n \arrow[l,"\Wbar \phi_{n-1}"',"\sim"] \arrow[d,phantom,"\rotatebox{90}{$\subseteq$}"] \\ \Wbar (\tau,K) \arrow[r,"\Wbar (\tau{,}\phi_0)","\sim"'] & \Wbar (\tau,K_1) & \Wbar (\tau,K_2) \arrow[l,"\Wbar (\tau{,}\phi_1)"',"\sim"] \arrow[r,"\Wbar (\tau{,}\phi_2)","\sim"'] & \cdots & \Wbar (\tau,K_n). \arrow[l,"\Wbar (\tau{,}\phi_{n-1})"',"\sim"] \end{tikzcd} $$ \revC{ This shows that the zigzag $$ B\xrightarrow{f_0}B_1\xleftarrow{f_1}\dotsb\xleftarrow{f_{n-1}}B_n \xrightarrow{\Hat r_n}\Wbar K_n\xrightarrow{\Wbar \phi_{n-1}}\dotsb \xrightarrow{\Wbar \phi_1}\Wbar K_1\xleftarrow{\Wbar \phi_0}\Wbar K $$ classifies $p$ and its homotopy class factors through the homotopy class of the inclusion $\Wbar (\tau,K)\to\Wbar K$, thus giving a $\tau$-structure to $p$. } \end{proof} \revC{ In summary: \begin{thm}\label{thm:circle of equivalences} Suppose that Conjecture \ref{conj:N-alpha-classifies} holds. Let $p:E\to B$ be a simplicial principal $K$-bundle. Then the following assertions are equivalent: \begin{enumerate} \item The principal $K$-bundle $p$ admits a $\tau$-structure. \item The principal $K$-bundle $p$ admits a topological $\tau$-atlas. \item The principal $K$-bundle $p$ admits a weak $\tau$-atlas. \end{enumerate} \end{thm} In case Conjecture \ref{conj:N-alpha-classifies} holds, Definition \ref{def:tau-concordance} can be modified by replacing the notion of $\tau$-structure with the notion of weak $\tau$-atlas which brings it closer to its topological counterpart. } \section{Comparison to the topological version} \label{sec:comptopcat} In this section $G$ denotes a topological group. We introduced $\Wbar(\tau,K)$ and claimed that this is a simplicial analogue of $B(\tau,G)$. In this section we turn this claim into a theorem. We prove two homotopy equivalences $$ B(\tau,|K|)\simeq |\Wbar(\tau,K)|,\;\;\;\; B(\tau,G) \simeq |\Wbar(\tau,SG)| $$ where in the latter one $G$ is required to be a compact Lie group. \subsection{Classifying spaces} The nerve construction of a discrete group can be extended to the category of topological groups \cite{Seg68}. Given a topological group $G$ the set of $n$-simplices of $NG$ is the $n$-fold direct product $G^{\times n}=G\times \cdots \times G$, hence a topological space when $G$ has \revtwo{a} topology. The simplicial object $NG_\dt$ is a simplicial space, and its geometric realization is denoted by $$ BG = |NG_\dt| $$ which is called the classifying space of $G$. We can think of the $n$-fold product as the space of group homomorphisms $$ NG_n = \Hom(F^n,G). $$ We use $\Hom(-,-)$, rather than $\catGrp(-,-)$, to emphasize the topology. Given a simplicial group $K$, the geometric realization $|K|$ is a topological group, and we can consider $B|K|$. We would like to compare this space to the geometric realization of $\Wbar (K)$. \Pro{\label{B_W} There is a natural homotopy equivalence $$ B|K| \rightarrow |\Wbar(K)|. $$ } \Proof{Taking the geometric realization of Proposition \ref{pro:CR is weak equivalence} we obtain a homotopy equivalence $\revC{|CR|:} |dNK|\rightarrow |\Wbar K|$. We can realize the bisimplicial set $NK$ in different ways. All of these are homeomorphic to each other \cite{Qui73}. There is a sequence of natural homeomorphisms $$ \begin{aligned} |dNK| &\cong | [p]\mapsto | [q]\mapsto N(K_q)_p | | \\ &= |[p]\mapsto |K^p| |\\ & \cong |[p]\mapsto |K|^p | \\ &= B|K| \end{aligned} $$ where we also used the fact that geometric realization preserves finite products \cite{Mil57}. \revC{Thus we obtain the desired map $B|K|\to |\Wbar(K)|$ as the composite $|CR|Q^{-1}$ where $Q:|dNK|\to B|K|$ is the homeomorphism described above.} } \revC{ \Cor{\label{cor:zigzag-cl} Let $p:E\to B$ be a principal $K$-bundle and $\hat r:B\to \Wbar K$ denote the classifying map. Then the zigzag \begin{equation}\label{eq:zigzag-cl} |B|\xrightarrow{|\hat r|}|\Wbar K |\xleftarrow{|CR|}|dNK|\xrightarrow Q B|K| \end{equation} is a classifying map for $|p|:|E|\to |B|$. } } \begin{proof} \revC{ We begin by observing that \begin{itemize} \item the homeomorphism $Q:|dNK|\to B|K|$ takes $[u,(k_i)_{i=1}^n]\in|dNK|$ where $u\in\Delta^n$ and $k_i\in K_n$ for $i=1,\dotsc,n$ to $[u,([u,k_i])_{i=1}^n]\in B|K|$ and \item the weak equivalence $CR:dNK\to\Wbar K$ takes $(k_i)_{i=1}^n\in(dNK)_n$ where $k_i\in K_n$ for $i=1,\dotsc,n$ to $(d_0^ik_i)_{i=1}^n\in(\Wbar K)_n$. \end{itemize} To show that (\ref{eq:zigzag-cl}) classifies the principal bundle $|p|$ we need to lift this zigzag of maps to a zigzag of homotopy pullbacks with vertical arrows principal $|K|$-bundles and top horizontal arrows equivariant maps. Let $\Delta^\op\xrightarrow{\Tilde K}\catCat$ denote the simplicial groupoid where \begin{itemize} \item for $n\ge0$ we have $\ob(\Tilde K_n)=K_n$, \item for $k,l\in K_n$ we have $\Hom_{\Tilde K_n}(k,kl)=\{l\}$, \item for a pair of maps $k\xrightarrow lkl\xrightarrow{l'}kll'$ in $\Tilde K_n$ their composite is $k\xrightarrow{ll'}kll'$ and \item the simplicial structure maps are induced by those on $K$. \end{itemize} We write the $m$-simplex $$ k_0\xrightarrow{k_1}k_0k_1\xrightarrow{k_2}\dotsb\dotsb\xrightarrow{k_m}k_0k_1\dotsb k_m $$ of $N\Tilde K_n$ as $(k_i)_{i=0}^m$. Note that taking all objects to $*$ gives a morphism $\Tilde K\to K$. We get the commutative diagram} $$ \begin{tikzcd} {|E|} \arrow{r} \arrow{d}{|p|} & {|WK|} \arrow{d} & {|dN\Tilde K|} \arrow[l,"|\widetilde{CR}|"'] \arrow{r}{\Tilde Q} \arrow{d} & {E|K|} \arrow{d} \\ {|B|} \arrow{r}{|\Hat r|} & {|\Wbar K|} & {|dNK|} \arrow[l,"|CR|"'] \arrow{r}{Q} & {B|K|} \end{tikzcd} $$ \revC{ where} \begin{itemize} \revC{ \item the vertical arrows are principal $|K|$-bundles, \item the leftmost square is the image by $|\,|$ of the pullback square} $$ \begin{tikzcd} E \arrow {r} \arrow{d}{p} & WK \arrow{d} \\ B \arrow{r}{\Hat r} & \Wbar K, \end{tikzcd} $$ \revC{ \item the map $\widetilde{CR}:dN\Tilde K\to WK$ is the $K$-equivariant weak equivalence that takes $(k_i)_{i=0}^n\in(dN\Tilde K)_n$ to $(d_0^ik_i)_{i=0}^n\in(WK)_n$ \item and the map $\Tilde Q:|dN\Tilde K|\to E|K|$ is the $|K|$-equivariant homeomorphism taking $[u,(k_i)_{i=0}^n]\in|dN\Tilde K]$ to $[u,([u,k_i])_{i=0}^n]\in E|K|$. } \end{itemize} \revC{ Therefore all the squares are homotopy pullback squares with vertical arrows principal $K$-bundles and top horizontal arrows $|K|$-equivariant maps, so indeed the homotopy class $[Q]\circ[|CR|]^{-1}\circ[|\Hat r|]\in[|B|,B|K|]$ classifies the principal $|K|$-bundle $|p|$. } \end{proof} \subsection{$\tau$-version}\label{ss:B(tau,G)} Given an endofunctor $\tau$ on the category of groups we can define $$ B(\tau,G)=| [n]\mapsto \Hom(\tau^n, G ) | $$ where $\tau^\dt = \tau F^\dt$ as usual. Note that this definition works for an arbitrary cosimplicial group not necessarily coming from an endofunctor. For the rest of the section we assume that $\tau$ is of quotient type. In this case the homomorphism space $\Hom(\tau^n,G)$ is topologized as a subspace of $G^{\times n}$. The natural transformation $\eta$ induces an inclusion $B(\tau,G)\subset BG$. We denote by $E(\tau,G)\to B(\tau,G)$ the pull-back of the universal bundle $EG\to BG$. We would like to prove an analogue of Proposition \ref{B_W}. To prepare we need a preliminary result. Observe that the set of group homomorphisms $\Hom(\tau F^n,K_m)$ can be assembled into a simplicial set by using the simplicial structure of $K$. \Lem{\label{lem:real-T} There is a natural homeomorphism $$ |\Hom(\tau F^n,K_\dt)| \rightarrow \Hom(\tau F^n , |K|). $$ } \begin{proof} \revC{ We will use some of the basic properties of the geometric realization proved in \cite[Chapter III]{May67}. A point in the geometric realization $|X|$ of a simplicial set $X$ is given by an equivalence class $[u_m,x_m]$ where $x_m$ is a non-degenerate $m$-simplex of $X$ and $u_m$ is a point in the interior of $\Delta^m$. The natural map $\phi:|X\times X|\to |X|\times |X|$ induced by applying $|\,|$ to the projection maps onto each factor of $X\times X$ is a homeomorphism. Let $\phi^{-1}:|X|\times |X|\to |X\times X|$ denote the inverse of this map. This map can be described explicitly (as in the proof of \cite[Theorem 14.3]{May67}), but we just need to know that a point $([u_{m_1},x_{m_1}],[u_{m_2},x_{m_2}])$ in the product is sent to the point $[u_m,(x^{(1)}_m,x^{(2)}_m)]$ where $u_{m_i},\;i=1,2,$ can be obtained from $u_m$ by applying a sequence of codegeneracy maps and $x^{(i)}_{m},\;i=1,2,$ are given by applying the corresponding sequence of degeneracy maps to $x_{m_i}$. Note that the multiplication map of $|K|$ is given by $|K|\times |K|\xrightarrow{\phi^{-1}} |K\times K| \xrightarrow{|\mu|} |K|$. Let $\phi_n$ denote the map $|K^{\times n}|\to |K|^{\times n}$ obtained by applying $\phi$ multiple times: $|K^{\times n}| \to |K|\times |K^{\times {n-1}}| \to \cdots \to |K|^{\times n} $. Let us define the following maps $$ \iota_1: |\Hom(\tau F^n,K_\dt)| \to |K^{\times n}| $$ defined by $\iota_1([u_m,\tau F^n \xrightarrow{f} K_m])=[u_m,(f(e_1),\cdots,f(e_n))]$, and $$ \iota_2: \Hom(\tau F^n,|K|) \to |K|^{\times n} $$ defined by $\iota_2(\tau F^n\xrightarrow{g} |K| )=(g(e_1),\cdots,g(e_n))$. Both of these maps are embeddings. This is clear for $\iota_1$. For $\iota_2$ it follows from the fact that the geometric realization functor commutes with finite limits, in particular equalizers. We will write $R_n$ for the kernel of $\eta_{F^n}: F^n\to\tau F^n$. Each element of $R_n$ determines a relation $r(e_1,\cdots,e_n)$. A group homomorphism $F^n\to H$ factors through $\tau F^n\to H$ if and only if $r(f(e_1),\cdots,f(e_n))=1$ in $H$ for all $r\in R_n$. Now, consider the composite $\phi_n \iota_1$ which maps $[u_m,\tau F^n \xrightarrow{f} K_m]$ to the tuple $([u_m,f(e_1) ],\cdots,[u_m,f(e_n)])$. This tuple regarded as a group homomorphism $F^n\to |K|^{\times n}$ factors through $\tau F^n$. This follows from the fact that the elements $x_i=[u_m,f(e_i)]$ satisfy the relations $r(x_1,\cdots,x_n)=1$. Note that here we are using the fact that $\phi^{-1}([u_m,k_m],[u_m,k'_m])$ is simply $[u_m,(k_m,k'_m)]$. Therefore we obtain a commutative diagram } $$ \begin{tikzcd} {|\Hom(\tau F^n,K_\dt)|} \arrow[d,hook,"\iota_1"] \arrow{r} & {\Hom(\tau F^n , |K|)} \arrow[d,hook,"\iota_2"] \\ {|K^{\times n}|} \arrow[r,"\phi_n"] & {|K|^{\times n}} \end{tikzcd} $$ \revC{We will show that the top map is a homeomorphism. Injectivity of the map is clear from the diagram. To see surjectivity let $ f:F^n\rightarrow |K|$ be a homomorphism that factors through $\tau F^n$. Each element $f(e_i)$ is given by an equivalence class $[u_{l_i},k_{l_i}]$ where $k_{l_i}$ is an $l_i$-simplex of $K$ and $u_{l_i}$ is a point in the interior of $\Delta^{l_i}$ Let $[u_m, k_{m}^{(1)},\cdots, k_{m}^{(n)} ]$ denote the element which maps to $([u_{l_1},k_{l_1}],\cdots, [u_{l_n},k_{l_n}]) $ under the homeomorphism $\phi_n$. Here $k_{m}^{(i)}$ belongs to $K_m$ and $u_m$ belongs to the interior of $\Delta^m$. Then for each $r\in R_n$ the relation $r(k_{m}^{(1)},\cdots, k_{m}^{(n)})=1$ holds in $K_m$ since $r(f(e_1),\cdots,f(e_n))=1$ in $|K|$. Sending $e_i$ to $k_m^{(i)}$ defines a homomorphism $F^n\rightarrow K_m$ which factors through $f':\tau F^n\rightarrow K_m$. The element $[u_m,f']$ in the geometric realization ${|\Hom(\tau F^n,K_\dt)|}$ maps to $f$ under $\phi_n$. This proves the surjectivity. As a result the homeomorphism $\phi_n$ restricts to a bijection between the subspaces, and consequently gives the desired homeomorphism. } \end{proof} \Thm{\label{thm:B-Wbar} There is a natural homotopy equivalence $$ B(\tau,|K|) \rightarrow |\Wbar(\tau,K)|. $$ } \Proof{ Recall that we have a weak equivalence $dY\rightarrow TY$ for any bisimplicial set $Y$. We apply this to the bisimplicial set $N(\tau,K)$, and use the identification $\Wbar(\tau,K)\cong TN(\tau,K)$. This gives a homotopy equivalence $$ |dN(\tau,K)| \rightarrow |\Wbar(\tau,K)| $$ after realization. It remains to identify $|dN(\tau,K)|$ with $B(\tau,|K|)$. Using Lemma \ref{lem:real-T} and the homeomorphism between different ways of realizing a bisimplicial \revC{set} we obtain $$ \begin{aligned} |dN(\tau,K)| &\cong |[p]\mapsto | [q]\mapsto \Hom(\tau F^p,K_q) | | \\ & \cong |[p]\mapsto \Hom(\tau F^p , |K|) | \\ &= B(\tau,|K|). \end{aligned} $$ } \revC{ Combining this result with Theorem \ref{thm:full-zigzag-Ntau} gives the following. \Cor{\label{cor:NtauK=WtauK} There is a homotopy equivalence $$ B(\tau,|K|)\simeq |N(\tau,\int K)|.$$ } } \subsection{Compact Lie groups} In Theorem \ref{thm:B-Wbar} we started from a simplicial group $K$ and compared the simplicial and topological constructions. Conversely we can do such a comparison for a topological group $G$. However, for such a comparison to work we need to restrict our attention to a nice class of groups such as compact Lie groups. \revC{We introduce the class of $\tau$-good groups in Definition \ref{def:GoodGroup}.} \Rem{\label{rem:fat-real}{\rm The main reason for this restriction is that the geometric realization functor does not respect homotopy equivalences in general. A better behaving realization functor is the {\it fat realization} which is obtained by forgetting the degeneracies when gluing the simplices. For a simplicial space $X$ its fat realization is denoted by $\fat{X}$. If the simplicial space is {\it good}, i.e. all degeneracy maps $s_i:X_{n-1}\to X_n$ are closed cofibrations in the sense of Hurewicz, then the natural map $\fat{X}\to |X|$ is a homotopy equivalence. Any simplicial set is a good simplicial space, or more generally the simplicial space $[n]\mapsto |S(X_n)|$ is good where $X$ is an arbitrary simplicial space. }} \begin{rem}\label{rem:ComLie-Good} If $G$ is a compact Lie group then $[n]\mapsto \Hom(\tau^n,G)$ is good. Thus up to homotopy we can replace geometric realization by the fat realization in the construction of $B(\tau,G)$, see \cite{OW19}. This property will be crucial in our consideration. \end{rem} We need a version of Lemma \ref{lem:real-T} for the singular functor. \revC{ Let $H$ be a discrete group and $G$ a topological group. Recall that the mapping space $\Map(H,G)$ is the set of maps $H\to G$ equipped with the compact-open topology. We equip the subset $\catGrp(H,G)\subseteq\Map(H,G)$ with the subspace topology. In the case of $H=\tau F^n$ this is consistent with the topology induced from $G^{\times n}$ } \Lem{\label{lem:sing} Let $H$ be a discrete group, and $G$ a topological group. Then there is a natural isomorphism of simplicial sets $$ S(\Hom(H,G)) \to \Hom(H,S(G)_\dt). $$ } \begin{proof} \revC{ It is enough to show that the pair of mutually inverse natural isomorphisms \begin{center} \begin{tikzpicture}[xscale=3,yscale=1.5] \node (C) at (0,0) {$\catTop(\Delta^n,\Map(H,G))$}; \node (D) at (1,0) {$\cong$}; \node (E) at (2,0) {$\catSet(H,\catTop(\Delta^n,G))$}; \path[->,font=\scriptsize,>=angle 90] (C) edge [bend left=60] node [above] {$f\mapsto(h\mapsto\ev_h\circ f)$} (E) (E) edge [bend left=60] node [below] {$(x\mapsto(\,h\mapsto w(h)(x)\, ))\mapsfrom w$} (C); \end{tikzpicture} \end{center} restricts to a pair of mutually inverse natural isomorphisms $$ \catTop(\Delta^n,\Hom(H,G))\cong \catGrp(H,\catTop(\Delta^n,G)). $$ Take $f\in \catTop(\Delta^n,\Hom(H,G))$, $h,h'\in H$ and $x\in\Delta^n$. Then we have \begin{align*} (\ev_h\circ f)\cdot(\ev_{h'}\circ f)(x)&=(f(x)(h))\cdot(f(x)(h'))\\ &=f(x)(hh')\\ &=(\ev_{hh'}\circ f)(x) \end{align*} which shows $(h\mapsto\ev_h\circ f)\in\catGrp(H,\catTop(\Delta^n,G))$. Take $w\in \catGrp(H,\catTop(\Delta^n,G))$. Then we have \begin{align*} w(h)(x)\cdot w(h')(x)&=(w(h)\cdot w(h'))(x)\\ &=w(hh')(x) \end{align*} which shows $(x\mapsto(\,h\mapsto w(h)(x)\,))\in\catTop(\Delta^n,\Hom(H,G))$. } \end{proof} \revC{ \Def{\label{def:GoodGroup} A topological group $G$ is said to be $\tau$-good if each $B(\tau,G)_n$ is a good simplicial space consisting of CW-complexes (simplicial structure maps are morphisms of CW-complexes). } } \Cor{\label{cor:simp-Lie} \revC{ Let $G$ be a topological group which is $\tau$-good, and let $K$ be a simplicial group. \begin{enumerate} \item We have a chain of homotopy equivalences \begin{equation}\label{eq:G-|SG|} |\Wbar (\tau,SG)|\simeq B (\tau, |SG|) \simeq B(\tau,G) \end{equation} where the first one is the one in Theorem \ref{thm:B-Wbar} and the second one is induced by the counit $\epsilon_G: |S G|\to G$. \item The unit $\eta_K:K\to S|K|$ induces a weak equivalence \begin{equation}\label{eq:K-S|K|} \Wbar(\tau,K)\to \Wbar(\tau,S|K|). \end{equation} \end{enumerate} } } \begin{proof} \revC{ It is enough to show that the map $B(\tau,|SG|)\to B(\tau,G)$ induced by the counit $\epsilon_G:|SG|\to G$ is a homotopy equivalence.} By Remark \ref{rem:fat-real} we can use fat realization \revC{for good simplicial spaces}. Lemma \ref{lem:real-T}, Lemma \ref{lem:sing}, and the \revC{weak} equivalence \revC{$\epsilon_G:|S G| \to G$} gives us the diagram $$ \begin{tikzcd} {|S\Hom(\tau F^n,G)|} \arrow[r,"\sim"] \arrow[d,"\cong"] & {\Hom(\tau F^n, G)} \\ {|\Hom(\tau F^n, (SG)_\dt)|} \arrow[r,"\cong"] & {\Hom(\tau F^n,|S G|)} \arrow{u} \end{tikzcd} $$ \revC{The top map is a homotopy equivalence since $\Hom(\tau F^n,G)$ is a CW-complex. } Thus we obtain a level-wise homotopy equivalence, which after realization, gives \revC{the} homotopy equivalence \revC{in (\ref{eq:G-|SG|})}. \revC{ To prove part (2) we will show that $|\Wbar(\tau,K)|\to |\Wbar(\tau,S|K|)|$ is a homotopy equivalence. By Theorem \ref{thm:B-Wbar} this amounts to showing that $B(\tau,|K|)\to B(\tau,|S|K||)$ induced by $|\eta_K|$ is a homotopy equivalence. First observe that $B(\tau,|K|)$ is a good simplicial space for any simplicial group $K$: Each degeneracy map $s_i:\Hom(\tau F^n, |K|) \to \Hom(\tau, F^{n+1}, |K|)$ is a closed cofibration since by Lemma \ref{lem:real-T} $|s_i|:|\Hom(\tau F^n, K)| \to |\Hom(\tau F^{n+1}, K)|$ is an inclusion of a subcomplex of a CW-complex. Therefore similar to part (1) we can argue level-wise. Now, consider the map $ \Hom(\tau F^n,|K|) \to \Hom(\tau F^n,|S|K||) $ induced by $|\eta_K|$. By Lemma \ref{lem:real-T} and Lemma \ref{lem:sing} it is a direct calculation to check that, up to homeomorphism, this map coincides with the weak equivalence $$|\eta_{\Hom(\tau F^n,K)}|:|\Hom(\tau F^n,K)| \to |S|\Hom(\tau F^n,K)||.$$ This is a homotopy equivalence since the spaces involved are CW-complexes. After geometric realization we obtain the desired homotopy equivalence. } \end{proof} \Rem{{\rm \revC{The main class of examples for part (1) is compact Lie groups. In this case $B(\tau,G)_\dt$ is a good simplicial space (Remark \ref{rem:ComLie-Good}) consisting of CW-complexes (see e.g. the proof of \cite[Proposition 2.3]{OW19}). } In general, there is no reason to expect that a homomorphism $G\to G'$ which is a homotopy equivalence induces a homotopy equivalence $B(\tau,G)\to B(\tau,G')$. An important exception is the inclusion $K\subset G$ of a maximal compact subgroup $K$ in a complex (or real) reductive algebraic group $G$. In this case the map $\Hom(\ZZ^n,K) \to \Hom(\ZZ^n,G)$ is a homotopy equivalence \cite{PS13}. This implies that $B(\ZZ,K)\to B(\ZZ,G)$ is a homotopy equivalence \cite{AG15}. However, the homotopy equivalence between the homomorphism spaces fails when $\ZZ^n$ is replaced by an arbitrary finitely generated group, see \cite{PS13} for an example. }} \Ex{{\rm\label{ex:examples} We list some of the known results on the homotopy type of $B(\tau,G)$ where $G$ is a topological group. We can use them to deduce results about $\Wbar(\tau,K)$. We focus on the commutative case $\tau^\dt =\ZZ^\dt$. It is better to consider discrete and continuous cases separately. Let $G$ be discrete for now. Then $|\Wbar(\tau,G)|=B(\tau,G)$ by definition. Most of the known results come from the finite case. \begin{enumerate} \item Suppose that $G$ is a finite transitively commutative (TC) group, i.e.~the commutator defines a transitive relation for elements outside the center of the group. For such groups $B(\ZZ,G)$ is homotopy equivalent to the classifying space of $\pi_1B(\ZZ,G)$, as shown in \cite{ACT12}. Thus it is an Eilenberg--Maclane space of type $K(\pi,1)$. For example, the symmetric group $\Sigma_3$ on $3$ letters is a TC group. \item Let $G$ be an extraspecial $p$-group of order $p^{2n+1}$ where $p$ is a prime. If $n\geq 2$ then the universal cover of $B(\ZZ,G)$ is a wedge of equidimensional spheres $S^n$ \cite{O16}. Thus there are non-zero higher homotopy groups. A similar phenomenon occurs for the general linear groups $\GL_n(\FF_q)$, $n \leq 4$, over a field of characteristic $p$, and the symmetric groups $\Sigma_k$ on $k$ letters where $k\geq 2^4$ \cite{O15}. \end{enumerate} Next we consider Lie groups. Let $G$ be a compact Lie group. Using Corollary \ref{cor:simp-Lie} \revC{and Theorem \ref{thm:B-Wbar}}, we can translate the results to $\Wbar(\ZZ,SG)$. \begin{enumerate} \item The rational cohomology of $B(\ZZ,G)$ is computed in \cite{AG15}. These calculations apply to the classical groups $U(n)$, $SU(n)$ and $Sp(n)$. Not much is known integrally. The integral cohomology rings of $SU(2)$, $U(2)$ and $O(2)$ are calculated in \cite{AGV17}. However, a lot more is known stably. For the stable groups $U$, $O$, $Sp$ the space $B(\tau,G)$ gives rise to generalized cohomology theories \cite{AGLT17,Vil17}. In the commutative case its homotopy type is described in \cite{GH19}. \item At a prime $\ell$ the homotopy type of the $\ell$-completion of $B(\ZZ,G)$ in the sense of Bousfield--Kan depends only on the mod-$\ell$ homology of $BG$ when $\pi_0G$ is a finite $\ell$-group \cite{OW19}. When $\ell$ is odd this gives a mod-$\ell$ homology isomorphism $$B(\ZZ,Sp(n))\to B(\ZZ,SO(2n+1)).$$ \end{enumerate} }} \subsection{Topological bundles with $\tau$-structure} We will generalize the definition of a transitionally commutative bundle introduced in \cite{AG15}. Let $\pi:P\to X$ be a principal $G$-bundle of topological spaces. Let $\mathscr U=\set{U_i}_{i\in I}$ be an open cover of $X$ that is trivializing for $\pi$. \revC{ That is, for each $i\in I$ we have a pullback diagram of topological spaces \begin{center} \begin{tikzpicture}[xscale=2,yscale=1.5] \node (C') at (0,1) {$G\times U_i$}; \node (D') at (1,1) {$P$}; \node (C) at (0,0) {$U_i$}; \node (D) at (1,0) {$X$}; \node at (.5,.5) {$\lrcorner$}; \path[->,font=\scriptsize,>=angle 90] (C') edge node [above] {$\beta_i$} (D') (C') edge node [right] {$\pi_2$} (C) (D') edge node [right] {$\pi$} (D) (C) edge node [above] {$\iota_i$} (D); \end{tikzpicture} \end{center} where $\iota_i:U_i\xrightarrow{}X$ is the inclusion map and $\beta_i$ is $G$-equivariant. The collection $\set{\beta_i}_{i\in I}$ is called an atlas. For an $(n+1)$-tuple of indices $\mathbf i=(i_0,\dotsc,i_n)\in I^{\times(n+1)}$ let $U_\mathbf i=U_{i_0\dotsb i_n}=U_{i_0}\cap\dotsb\cap U_{i_n}$. For indices $i,j\in I$ we get transition maps $\rho_{ij}:U_{ij}\xrightarrow{}G$ such that we have $\beta_j(g,x)=\rho_{ij}(x)\beta_i(g,x)$ for $x\in U_{ij}$ and $g\in G$. These maps give the \v Cech 1-cocycle in $\Check H^1(\mathscr U,G)$ classifying $\pi$. Let $U=\coprod_i U_i$ and consider the map $q:U\to X$ induced by the inclusions. The \v{C}ech nerve of $q$ is defined to be the simplicial space $$ \check C(\mathscr U)_n=\check C(q)_n = U^{\times_X(n+1)} = \bigsqcup_{\mathbf i\in I^{\times(n+1)}} U_\mathbf i $$ with the obvious simplicial structure maps. The (topological) transition functions $\rho_{ij}:U_{ij} \to G$ induce a map of simplicial spaces $$ \rho:\check C(q)_\dt \to BG_\dt $$ sending $x\in U_{i_0}\cap \cdots \cap U_{i_{n}}$ to the tuple $(\rho_{i_0,i_1}(x),\cdots,\rho_{i_{n-1},i_n}(x))$ in simplicial degree $n$.} \Def{{\rm \label{def:tau-structure-top} A trivialization along an open cover $\{U_i:i\in I\}$ of a principal $G$-bundle $\pi:P\to X$ is said to have a $\tau$-structure if the corresponding map $\rho:\check C(\mathscr U)_\dt\xrightarrow{} BG_\dt$ factors through the simplicial space $B(\tau,G)_\dt$. \revC{ In this case the corresponding atlas is called a $\tau$-atlas.} A $\tau$-structure for $\pi$ is a choice of a lift of $[f]$, where $f:X\to BG$ is a classifying map for the principal bundle, under the map $[X,B(\tau,G)]\to [X,BG]$ induced by the inclusion $B(\tau,G)\subset BG$. \revC{We say that $\pi$ has a $\tau$-structure if such a lift exists.} }} \Rem{{\rm Note that when $\tau^\dt=\ZZ^\dt$ having a $\ZZ$-structure is the same as being a transitionally commutative cover in the sense of \cite{AG15}. A $\ZZ$-structure is the same as a transitionally commutative structure defined in \cite[Definition 1.1.6]{GriThesis}. }} The definition of a $\tau$-structure for a principal bundle is motivated by \revC{Theorem \ref{thm:factorsuptohomotopy}}. Originally the statement involves transitionally commutative bundles. We state it more generally for principal bundles \revC{admitting a $\tau$-atlas.} In the original statement \revC{\cite[Theorem 2.2]{AG15}} of Theorem \ref{thm:factorsuptohomotopy} $X$ is required to be a finite CW complex. However, with a little more work the techniques of the proof can be improved to remove the finiteness condition \cite{privateJose}. \revC{ \Thm{\label{thm:factorsuptohomotopy} Let $G$ be a topological group which is $\tau$-good and $X$ be a CW complex. A principal $G$-bundle $\pi:P\to X$ admits a $\tau$-atlas if and only if the classifying map $f:X\to BG$ factors through $B(\tau,G)$ in the homotopy category of topological spaces. } } Proof of this result is provided in Appendix \ref{sec:Thm5-15}. \revC{ \begin{cons}\label{cons:S_UP} Let $\tau:\catGrp\xrightarrow{}\catGrp$ be an endofunctor of quotient type, $G$ a topological group, $\pi:P\xrightarrow{} X$ a principal $G$-bundle, $\mathscr U=\{U_i:i\in I\}$ an open cover of $X$ and $\{G\times U_i\xrightarrow{\beta_i}P:i\in I\}$ a $\tau$-atlas for $\pi$. We will now construct a principal simplicial $SG$-bundle equivalent to $S\pi$ with a $\tau$-structure as promised in Example \ref{ex:simpfromtop}. Let $S_\mathscr UX\subseteq SX$ denote the sub-simplicial set on simplices $\sigma:\Delta^n\xrightarrow{} X$ such that $\sigma$ maps into $U_{i(\sigma)}\subseteq X$ for some $i(\sigma)\in I$. Then the inclusion map $S_\mathscr UX\to SX$ is a weak equivalence \cite{dugger2004topological}*{Corollary 3.5}. Let $S_\mathscr UP=SP\times_{SX}S_\mathscr UX$. Restricting the trivialization $\beta_i:G\times U_i\xrightarrow{}P$ over $U_i\to X$ along the map $\Id_G\times\sigma:G\times\Delta^n\xrightarrow{}G\times U_i$ where by an abuse of notation $\sigma$ is regarded as a map $\Delta^n\to U_{i(\sigma)}$, taking the map on singular complexes, and restricting that along the map $\Id_{SG}\times\eta_{\Delta[n]}:SG\times\Delta[n]\xrightarrow{}{SG\times S\Delta^n}$ induced by the unit map $\eta$ of the adjunction $(|\,|,S)$, we get the trivialization $\beta(\sigma):SG\times\Delta[n]\xrightarrow{}S_\mathscr UP$ over $\sigma:\Delta[n]\xrightarrow{} S_\mathscr UX$. That is, the trivialization $\beta(\sigma):SG\times\Delta[n]\xrightarrow{}S_\mathscr UP$ takes $(g,\phi):\Delta[l]\xrightarrow{}SG\times\Delta[n]$ to the composite $$ \Delta^l\xrightarrow{(\hat g,\Delta^\phi)}G\times\Delta^n\xrightarrow{\Id_G\times\sigma}G\times U_i\xrightarrow{\beta_i}P $$ where $\hat g$ is the adjoint of $g:\Delta[l]\to SG$. \end{cons} \begin{pro}\label{pro:tau-atlasSU} The atlas $\set{\beta(\sigma):\sigma\in(S_\mathscr UX)_n, n\ge0}$ of the principal $SG$-bundle $S_\mathscr UP\to S_\mathscr UX$ is a $\tau$-atlas. \end{pro} \begin{proof} We need to show that the nerve of the transition map functor $\alpha_*:\int S_\mathscr UX\xrightarrow{}\int SG$ factors through $N(\tau,\int SG)$. Take $\sigma_0\in(S_\mathscr UX)_m$ and $\sigma_1\in(S_\mathscr UX)_n$. Let $i=i(\sigma_0)$ and $j=i(\sigma_1)$. Then a morphism $\theta:\sigma_0\xrightarrow{}\sigma_1$ in the Grothendieck construction $\int S_\mathscr UP$ is given by an order-preserving map $\theta:[m]\xrightarrow{}[n]$ such that $\sigma_0=\sigma_1\circ\Delta^\theta$. In particular, the simplex $\sigma_0$ maps into $U_{ij}$. Let $\rho_{ij}:U_{ij}\xrightarrow{}G$ denote the transition map from $\beta_i$ to $\beta_j$ that is the map such that we have $\beta_j(g,x)=\rho_{ij}(x)\beta_i(g,x)$ for all $g\in G$ and $x\in U_{ij}$. Then we have $\alpha_*(\sigma_1,\theta)=\rho_{ij}\circ\sigma_0\in(SG)_m$, where we abuse notation by regarding $\sigma_0$ as a map $\Delta^{m}\to U_{ij}$. Let $\sigma_0\xrightarrow{\theta_0}\dotsb\xrightarrow{\theta_{k-1}}\sigma_k$ be a $k$-simplex in $N(\int S_\mathscr UX)$. That is, for $r=0,\dotsc,k$ we have $\Delta^{n_r}\xrightarrow{\sigma_r}U_{i_r}\subseteq X$ and for $s=0,\dotsc,k-1$ we have $\theta_{s}:[n_s]\xrightarrow{}[n_{s+1}]$ such that $\sigma_s=\sigma_{s+1}\circ\Delta^{\theta_{s}}$. Let $x_s=\alpha_*(\sigma_{s+1},\theta_{s})$. For $1\leq l\leq k$ we need to show that \begin{align*} ( x_{k-l},\cdots,\theta_{k-l}^*\cdots\theta_{k-3}^* x_{k-2}, \theta_{k-l}^*\cdots\theta_{k-2}^*x_{k-1}) =&\\ (\rho_{i_{k-l} i_{k-l+1}} \circ \sigma_{k-l},\cdots, \rho_{i_{k-1}i_k}\circ\sigma_{k-1}\circ\Delta^{\theta_{k-2}}\circ\dotsb\circ\Delta^{\theta_{k-l}} ) =&\\ (\rho_{i_{k-l} i_{k-l+1}} \circ \sigma_{k-l},\cdots, \rho_{i_{k-2} i_{k-1}} \circ \sigma_{k-l}, \rho_{i_{k-1}i_k}\circ \sigma_{k-l}) \end{align*} is contained in $ \catGrp(\tau^l,(SG)_{n_0})$. This follows from \revtwo{the fact} that $\rho$ has a $\tau$-structure since this implies $$ U_{i_{k-l}\dotsb i_k}\xrightarrow{(\rho_{i_{k-l}i_{k-l+1}},\dotsc,\rho_{i_{k-1}i_k})}\catGrp(\tau^l,G)\subseteq G^{\times l}. $$ \end{proof}} The set $H^1_\tau(X,G)$ also makes sense in $\catTop$ and \revC{is} defined using the $\tau$-concordance relation whose definition is completely analogous to the simplicial version given in Definition \ref{def:tau-concordance}. Note that a $\tau$-structure for a principal $G$-bundle in the topological context is a choice of a lift of the classifying map under the natural map $[X,B(\tau,G)]\to [X,BG]$. Theorem \ref{thm:factorsuptohomotopy} says that \revC{a principal $G$-bundle admits a $\tau$-atlas} if and only if \revC{the principal $G$-bundle has a $\tau$-structure, i.e.~up to homotopy the classifying map factors through $B(\tau,G)$. As in Corollary \ref{cor:ClassificationWithTauStructure}} we can identify $H^1_\tau(X,G)$ with the set $[X,B(\tau,G)]$. Using the singular functor we can define $$ S:H^1_\tau(X,G) \to H^1_\tau(SX,SG) $$ by sending the class of a bundle $P\to X$ to the class of $SP\to SX$. Conversely, for a simplicial set $Y$ we can define $$ R:H^1_\tau(Y,K) \to H^1_\tau(|Y|,|K|) $$ by sending a simplicial principal bundle $E\to Y$ to it geometric realization. Both of these maps are bijections as a consequence of Theorem \ref{thm:B-Wbar} and Corollary \ref{cor:simp-Lie}. \begin{bibdiv} \begin{biblist} \bib{AGV17}{inproceedings}{ author={Antolin-Camarena, O.}, author={Gritschacher, S.}, author={Villarreal, B.}, title={Classifying spaces for commutativity of low-dimensional lie groups}, organization={Cambridge University Press}, date={2020}, booktitle={Mathematical proceedings of the cambridge philosophical society}, volume={169}, pages={433\ndash 478}, } \bib{ACT12}{article}{ author={Adem, A.}, author={Cohen, F.~R.}, author={Torres~Giese, E.}, title={Commuting elements, simplicial spaces and filtrations of classifying spaces}, date={2012}, ISSN={0305-0041}, journal={Math. Proc. Cambridge Philos. Soc.}, volume={152}, number={1}, pages={91\ndash 114}, url={http://dx.doi.org/10.1017/S0305004111000570}, review={\MR{2860418}}, } \bib{AG15}{article}{ author={Adem, A.}, author={G\'omez, J.~M.}, title={A classifying space for commutativity in {L}ie groups}, date={2015}, ISSN={1472-2747}, journal={Algebr. Geom. Topol.}, volume={15}, number={1}, pages={493\ndash 535}, url={http://dx.doi.org/10.2140/agt.2015.15.493}, review={\MR{3325746}}, } \bib{AGLT17}{article}{ author={Adem, A.}, author={G{\'o}mez, J.}, author={Lind, J.}, author={Tillmann, U.}, title={Infinite loop spaces and nilpotent k--theory}, date={2017}, journal={Algebraic \& Geometric Topology}, volume={17}, number={2}, pages={869\ndash 893}, } \bib{CR05}{article}{ author={Cegarra, Antonio~M}, author={Remedios, Josu{\'e}}, title={The relationship between the diagonal and the bar constructions on a bisimplicial set}, date={2005}, journal={Topology and its Applications}, volume={153}, number={1}, pages={21\ndash 51}, } \bib{cohen2016survey}{incollection}{ author={Cohen, Frederick~R}, author={Stafa, Mentor}, title={A survey on spaces of homomorphisms to lie groups}, date={2016}, booktitle={Configuration spaces}, publisher={Springer}, pages={361\ndash 379}, } \bib{dugger2004topological}{article}{ author={Dugger, Daniel}, author={Isaksen, Daniel~C.}, title={Topological hypercovers and {$\mathbb A^1$}-realizations}, date={2004}, journal={Mathematische Zeitschrift}, volume={246}, pages={667\ndash 689}, } \bib{GH19}{article}{ author={Gritschacher, Simon}, author={Hausmann, Markus}, title={Commuting matrices and {A}tiyah's real {K}-theory}, date={2019}, journal={Journal of Topology}, volume={12}, number={3}, pages={832\ndash 853}, } \bib{GJ99}{book}{ author={Goerss, P.~G.}, author={Jardine, J.~F.}, title={Simplicial homotopy theory}, series={Progress in Mathematics}, publisher={Birkh\"auser Verlag, Basel}, date={1999}, volume={174}, ISBN={3-7643-6064-X}, url={http://dx.doi.org/10.1007/978-3-0348-8707-6}, review={\MR{1711612}}, } \bib{privateJose}{book}{ author={G{\'o}mez, J.~M.}, title={private communication}, } \bib{GriThesis}{article}{ author={Gritschacher, S.~P.}, title={Commutative k-theory}, date={2017}, journal={PhD thesis, University of Oxford}, } \bib{Hir03}{book}{ author={Hirschhorn, P.~S.}, title={Model categories and their localizations}, series={Mathematical Surveys and Monographs}, publisher={American Mathematical Society, Providence, RI}, date={2003}, volume={99}, ISBN={0-8218-3279-4}, review={\MR{1944041}}, } \bib{May67}{book}{ author={May, J.~P.}, title={Simplicial objects in algebraic topology}, series={Van Nostrand Mathematical Studies, No. 11}, publisher={D. Van Nostrand Co., Inc., Princeton, N.J.-Toronto, Ont.-London}, date={1967}, review={\MR{0222892}}, } \bib{Mil57}{article}{ author={Milnor, John}, title={The geometric realization of a semi-simplicial complex}, date={1957}, journal={Ann. of Math.(2)}, volume={65}, number={357-362}, pages={24}, } \bib{nlab:decalage}{misc}{ author={{nLab authors}}, title={decalage}, date={2021}, note={\href{http://ncatlab.org/nlab/revision/decalage/38}{Revision 38}}, } \bib{O14}{article}{ author={Okay, C.}, title={Homotopy colimits of classifying spaces of abelian subgroups of a finite group}, date={2014}, ISSN={1472-2747}, journal={Algebr. Geom. Topol.}, volume={14}, number={4}, pages={2223\ndash 2257}, url={http://dx.doi.org/10.2140/agt.2014.14.2223}, review={\MR{3331614}}, } \bib{O15}{article}{ author={Okay, C.}, title={Colimits of abelian groups}, date={2015}, ISSN={0021-8693}, journal={J. Algebra}, volume={443}, pages={1\ndash 12}, url={http://dx.doi.org/10.1016/j.jalgebra.2015.07.018}, review={\MR{3400392}}, } \bib{O16}{article}{ author={Okay, C.}, title={Spherical posets from commuting elements}, date={2018}, ISSN={1433-5883}, journal={J. Group Theory}, volume={21}, number={4}, pages={593\ndash 628}, url={https://doi-org.ezproxy.library.ubc.ca/10.1515/jgth-2018-0008}, review={\MR{3819543}}, } \bib{OW19}{article}{ author={Okay, C.}, author={Williams, B.}, title={On the mod-$\ell$ homology of the classifying space for commutativity}, date={2020}, journal={Algebraic \& Geometric Topology}, volume={20}, number={2}, pages={883\ndash 923}, } \bib{PS13}{article}{ author={Pettet, Alexandra}, author={Souto, Juan}, title={Commuting tuples in reductive groups and their maximal compact subgroups}, date={2013}, journal={Geometry \& Topology}, volume={17}, number={5}, pages={2513\ndash 2593}, } \bib{quillen2006homotopical}{book}{ author={Quillen, Daniel~G}, title={Homotopical algebra}, publisher={Springer}, date={2006}, volume={43}, } \bib{Qui73}{article}{ author={Quillen, Daniel}, title={Higher algebraic {$K$}-theory. {I}}, date={1973}, pages={85\ndash 147. Lecture Notes in Math., Vol. 341}, review={\MR{0338129}}, } \bib{riehl2014categorical}{book}{ author={Riehl, Emily}, title={Categorical homotopy theory}, publisher={Cambridge University Press}, date={2014}, number={24}, } \bib{Seg68}{article}{ author={Segal, Graeme}, title={Classifying spaces and spectral sequences}, date={1968}, ISSN={0073-8301}, journal={Inst. Hautes \'Etudes Sci. Publ. Math.}, number={34}, pages={105\ndash 112}, url={http://www.numdam.org/item?id=PMIHES_1968__34__105_0}, review={\MR{0232393}}, } \bib{Ste12}{article}{ author={Stevenson, Danny}, title={D\'{e}calage and {K}an's simplicial loop group functor}, date={2012}, ISSN={1201-561X}, journal={Theory Appl. Categ.}, volume={26}, pages={No. 28, 768\ndash 787}, review={\MR{3065943}}, } \bib{thomason1979homotopy}{article}{ author={Thomason, Robert~W.}, title={Homotopy colimits in the category of small categories}, date={1979}, journal={Mathematical Proceedings of the Cambridge Philosophical Society}, volume={85}, pages={91\ndash 109}, } \bib{tonks93theory}{misc}{ author={Tonks, Andrew~Peter}, title={Theory and applications of crossed complexes}, date={1993}, } \bib{Vil17}{article}{ author={Villarreal, Bernardo}, title={Cosimplicial groups and spaces of homomorphisms}, date={2017}, journal={Algebraic \& Geometric Topology}, volume={17}, number={6}, pages={3519\ndash 3545}, } \end{biblist} \end{bibdiv}
\section{Introduction} \label{Introduction} \en{ Synaptic plasticity in neural networks is a substrate of learning and memory, which includes both positive and negative components, i.e., both long-lasting enhancements and declines in the weight of synaptic transmission (long-term potentiation (LTP) and long-term depression (LTD)) \cite{RN55}. Many experimental studies have suggested two plausible mechanisms for the induction of the synaptic plasticity \cite{RN57, RN95}. The first is the frequency of spike trains, which has been studied in association with the Bienenstock, Cooper, and Munro (BCM) rule in classical research conducted approximately half a century ago \cite{RN95, RN18, RN58, RN59}. LTP is induced by high-frequency firing in presynaptic neurons, which produces large increases in postsynaptic calcium concentration \cite{RN58, RN59, RN60, RN61}. The low-frequency firing causes a modest increase in the calcium level, and thereby induces LTD \cite{RN62, RN63, RN64}. The second is the precise timing of presynaptic and postsynaptic firing, which has been investigated as spike-time-dependent plasticity (STDP) in numerous experimental and theoretical studies from approximately 20 years ago \cite{RN95, RN3, RN65}. LTP is induced by the presynaptic action potentials preceding postsynaptic spikes by no more than tens of milliseconds, whereas presynaptic firing that follows postsynaptic spikes produces LTD \cite{RN65, RN50, RN51, RN53, RN69, RN70}. The idea that STDP plays a central role in synaptic plasticity had been becoming mainstream. } \en{ Recent studies have reported, however, that in some cases, the environment in vivo may not be suitable for precise spike timing, which is key to the STDP. Pre- and post-synaptic neurons in the primary visual cortex and extrastriate cortex of awaking animals fire so irregularly that the timing of presynaptic and postsynaptic firing varies \cite{RN13, RN73, RN76}. Neurons and synapses in the cerebral cortex of rats receive a lot of background neuronal activity that is generated internally, which provides strong constraints on spike timing \cite{RN33, RN74, RN75}. In these environments, the firing rate, rather than the spike timing, is likely to be important for the synaptic plasticity and neural coding. For example, it has been demonstrated experimentally that the cerebral cortex in which there is a high level of internal noise uses a rate code \cite{RN75}, and it has been shown mathematically that synaptic changes are induced by variation of firing rate without any timing constraints \cite{RN13}. Moreover, firing variability, as well as the statistical properties of the spike frequency, may be important for real-time information processing \cite{RN44}. Based on these reports, the role of firing frequency in various aspects of neural information processing has again come into the limelight. Furthermore, in vivo characteristic factors such as the variation of the firing pattern, the difference of intracellular parameters, and internal noise have also been suggested to be important for synaptic plasticity and neural coding. However, how these factors are involved in the synaptic plasticity is poorly understood. In order to clarify this problem, we examined the role of the presynaptic input pattern, the intracellular calcium decay time constants, and the background synaptic activity in frequency-dependent synaptic plasticity (FDP) by analyzing a calcium-based model, which is one of the most compatible models with experimental results \cite{RN3}. } \en{ Currently, it is widely accepted that the calcium concentration in the postsynapse determines whether LTP or LTD is induced \cite{RN77, RN78, RN79, RN80}. A moderate elevation of intracellular calcium correlates with induction of LTD, whereas a larger increase correlates with LTP \cite{RN78, RN79}. Only if glutamate is released by presynaptic activity and if the postsynaptic membrane is depolarized sufficiently, calcium ions enter the cell through channels controlled by NMDA receptors \cite{RN3}. The depolarization of the postsynaptic membrane potential is due not only to excitatory postsynaptic potentials (EPSPs) generated by binding glutamate to the AMPA receptors but also to many kinds of background synaptic activities \cite{RN34, RN35, RN27, RN37}. These experimental events were formulated by Shouval et al. \cite{RN1} as a calcium-based model, which has been used in numerous studies. } \en{ In the present study, we investigated the FDP in vivo analytically and numerically using the calcium-based model. First, in order to investigate the FDP in neurons with in vivo-specific firing pattern, we used three types of firing, which are widely observed in the brain, that is, constant-inter-spike intervals (ISI) inputs, Poisson inputs, and gamma inputs. Next, the calcium decay time constant of in vivo neurons varies from cell to cell. Previous reports suggested that pyramidal neurons in superficial layers possess faster calcium dynamics than those in deep layers. Here, $\tau_{ca} \approx 40$ ms in layer II to IV neurons, whereas $\tau_{ca} \approx 100$ ms in layer V to VI neurons \cite{RN23, RN5}. In order to study the association of the calcium decay time constant with the FDP, we examined two kinds of neurons with time constants of 40 ms and 80 ms. Finally, neurons in vivo are constantly exposed to background synaptic activity \cite{RN34, RN37}. The frequency and magnitude of this activity vary depending on the location of the synapse and the level of neuronal activity \cite{RN34, RN37}. We therefore examined the correlation between the amplitude of background activity and the FDP. The findings in the present study may contribute to a detailed understanding of synaptic plasticity in in vivo brain. } \noindent \newline \newpage \newpage \section{Results} \label{Results} \subsection{ \en{Postsynaptic calcium concentration as a function of the presynaptic stimulation frequency with fixed interstimulus intervals } } \en{ In Figure \ref{fig1}, we plot the analytical solution of $Ca$ in Eq. (\ref{eq:<Ca_c(f)>}) as a function of the input frequency $f$. We also plot the simulation results obtained by solving Eqs. (\ref{eq:W'(t)})-(\ref{eq:V_{bg}(t)}) numerically as a function of time and taking the time average of $Ca$ for each frequency. The analytical solution for the long-term behavior of calcium level agrees very well with the numerical simulation results. We adopted $\tau_{Ca}=80$ ms for a long calcium decay time constant and $\tau_{Ca}=40$ ms as a short calcium decay time constant. The calcium concentration as a function of input frequency increases slower for $\tau_{Ca}=40$ ms than for $\tau_{Ca}=80$ ms. Equation (\ref{eq:<Ca_c(f)>}) indicates that the calcium concentration at an arbitrary stimulation rate increases linearly for the calcium time constant $\tau_{Ca}$. } \begin{figure}[htbp] \centerin \includegraphics[width=140mm,cli ]{Fig1.eps} \vskip -\lastskip \vskip -10pt \caption{ \en{ Presynaptic firing rate-induced elevation of intracellular calcium concentration in two types of neurons with different time constants of calcium decay. The analytic solution is indicated by solid lines, while the results of numerical calculation are indicated by dotted lines. The calcium level increases more slowly in neurons with the short calcium decay time constant ($40$ ms) than in neurons with the long decay time constant ($80$ ms). This is also understood from Eq. (\ref{eq:<Ca_c(f)>}). Error bars indicate the standard error of the mean (SEM). } } \label{fig1} \end{figure} \subsection{ \en{ Approximate analytic solution of synaptic weight } } \en{ Figure 2 shows the curve obtained by performing the integration in Eq. (\ref{eq:<W_{c}(f)>}). We also plot the results obtained by the numerical simulation, which agree qualitatively with the analytical results. These results suggest that the LTD/LTP threshold shifts to a lower frequency as the calcium time constant increases. Here, the LTD/LTP threshold is defined as the frequency at which the synaptic weight first returns to 1 after falling below 1 when the input frequency is increased from 0 Hz. This tendency can also be understood from Eq. (\ref{eq:<Ca_c(f)>}) as follows. Equation (\ref{eq:<Ca_c(f)>}) is written as $Ca(f)=\tau_{Ca} \cdot F(f)$, where $F(f)$ is a monotonically increasing function of $f$, so that $f$ can be formally expressed as $f=F^{-1}(Ca/\tau_{Ca})$. Equations (\ref{eq:Omega(ca)}) and (\ref{eq:approxW(f)}) indicate that when the synaptic strength is at the LTD/LTP threshold, the postsynaptic calcium level has a fixed value: } \begin{eqnarray} Ca=\frac{1}{\beta}\log \frac{e^{\beta \alpha_1}-0.25e^{\beta \alpha_2}}{0.75} \ . \label{eq:Ca_th} \end{eqnarray} \en{ \noindent Substituting the numerical values of the parameters in Eq. (\ref{eq:Omega(ca)}) into Eq. (\ref{eq:Ca_th}), we obtained $Ca=0.54$ $\mu$M. Thus, the stimulation frequency when the synaptic weight reaches the LTD/LTP threshold is a monotonically increasing function of $1/\tau_{Ca}$. } \begin{figure}[htbp] \centerin \includegraphics[width=140mm,cli ]{Fig2.eps} \vskip -\lastskip \vskip -10pt \caption{ \en{ Synaptic strength in two types of neurons that have different calcium decay time constants as a function of the constant presynaptic stimulation frequency. The {\it x} axis indicates the input frequency, and the {\it y} axis represents normalized synaptic weights that are obtained after several hundreds of presynaptic spikes. The analytic solutions are indicated by solid lines, whereas the solutions provided by numerical calculation are indicated by dotted lines. Error bars indicate the SEM. } } \label{fig2} \end{figure} \subsection{ \en{ Postsynaptic calcium level and synaptic weight as functions of the average frequency of Poisson input } } \en{ In several experimental studies on synaptic plasticity, the paradigms for inducing synaptic plasticity have consisted of constant-frequency stimulation trains, such as paired pulses or a tetanic stimulus. Neurons in vivo, however, are unlikely to experience such simple inputs. Rather, these neurons receive more complex input patterns in which ISIs are highly irregular \cite{RN19}. The most representative stimulation patterns that are not constant-frequency stimulation trains are the Poisson process and the gamma process. In fact, spike sequences similar to these processes are sometimes observed in neurons of brain \cite{RN3, RN20, RN21, RN22, RN30}. In this section, we discuss the results for the FDP of neurons with Poisson-distributed spike trains. } \begin{figure}[htbp] \centerin \includegraphics[width=110mm,cli ]{Fig3.eps} \vskip -\lastskip \vskip -10pt \caption{ \en{ Relation between the postsynaptic calcium concentration and the average frequency of presynaptic constant-ISI (or Poisson) input. As in Fig. \ref{fig1}, two types of neurons with different calcium time constants were examined. The analytic solution is shown in A and C, whereas the results of numerical simulation are shown in B and C. The blue (or red) lines indicate the calcium concentration of the postsynapse with constant-ISI (or Poisson) input. In the case of Poisson input, the increase in calcium concentration with respect to the average frequency is slower than in the case of constant-ISI input. This result is independent of the calcium time constant. Error bars indicate the SEM. } } \label{fig3} \end{figure} \en{ First, the calcium concentration at the postsynapse receiving Poisson input was calculated numerically, and is plotted in Fig. \ref{fig3}, in which the calcium concentration with constant-ISI input is also plotted for comparison. In the same manner, we examined two kinds of neurons with calcium time constants of 40 ms and 80 ms. The intracellular calcium concentration, regardless of the stimulation pattern, increases more gradually in the case of $\tau_{Ca}=40$ ms than in the case of $\tau_{Ca}=80$ ms. In addition, the calcium level with Poisson input increases more slowly than that with constant-ISI input, which is independent of the calcium time constant (Figs. \ref{fig3}B and \ref{fig3}C). } \en{ Next, we examined the strength of a synapse receiving Poisson input. In Fig. \ref{fig4}, we define the LTD phase or LTP phase as the range of frequency indicating LTD or LTP. When the calcium time constant is $80$ ms, interestingly, Poisson input makes the LTD phase disappear and the LTP phase is observed at any input frequency, whereas in the case of constant-ISI stimulation, the LTD phase still exists at roughly between 3 Hz and 9 Hz (see Fig. \ref{fig4}B, left panel). When the calcium time constant is 40 ms, unlike in the case of $\tau_{Ca}=80$ ms, changing the stimulus pattern from constant-ISI input to Poisson input shifted the LTD/LTP threshold to the right (see Fig. \ref{fig4}B, right panel). Since the firing rate observed in the brain is found to be at most approximately 112 Hz, we need only consider synaptic plasticity within 100 Hz \cite{RN31}. This consideration leads to the conclusion that Poisson input to a neuron with $\tau_{Ca}=40$ ms expands the LTD phase and narrows the LTP phase. These results can be well reproduced by approximate analytical solutions (Eqs. (\ref{eq:<Ca_{poi}(f)>}) and (\ref{eq:<W_{poi}(f)>})). } \begin{figure}[htbp] \centerin \includegraphics[width=110mm,cli ]{Fig4.eps} \vskip -\lastskip \vskip -10pt \caption{ \en{ Synaptic strength for two types of neurons ($\tau Ca = 80$ ms and $\tau Ca = 40$ ms) as a function of the average rate of presynaptic stimulation. The {\it x} axis represents the input frequency, and the {\it y} axis represents normalized synaptic weights that are obtained after several hundreds of presynaptic spikes. The analytic solution is shown in A and C, whereas the results of numerical simulation are shown in B and C. Error bars indicate the SEM. The blue (or red) lines indicate the synaptic weights with constant-ISI (or Poisson) input. The synaptic weight with the Poisson input changes slowly compared to that with the constant-ISI input. As shown by the numerical simulation results, in neurons with $\tau Ca = 80$ ms, the Poisson input makes the LTD phase disappear, and only the LTP phase remains (B, left panel). On the other hand, in neurons with $\tau_{Ca} = 40$ ms, the LTD/LTP threshold moves to the right, and the LTD phase increases (B, right panel). These results are also qualitatively illustrated by analytical solutions (A). } } \label{fig4} \end{figure} \begin{comment} \addtocounter{figure}{-1} \newpage \begin{figure}[htbp] \caption{ \en{ \noindent (Continued) The {\it x} axis represents the input frequency, and the {\it y} axis represents normalized synaptic weights that are obtained after several hundreds of presynaptic spikes. The analytic solution is shown in A and C, whereas the results of numerical simulation are shown in B and C. Error bars indicate the SEM. The blue (or red) lines indicate the synaptic weights with constant-ISI (or Poisson) input. The synaptic weight with the Poisson input changes slowly compared to that with the constant-ISI input. As shown by the numerical simulation results, in neurons with $\tau Ca = 80$ ms, the Poisson input makes the LTD phase disappear, and only the LTP phase remains (B, left panel). On the other hand, in neurons with $\tau_{Ca} = 40$ ms, the LTD/LTP threshold moves to the right, and the LTD phase increases (B, right panel). These results are also qualitatively illustrated by analytical solutions (A). } } \label{fig4} \end{figure} \end{comment} \en{ Analytical solutions for the calcium concentration with Poisson input (Eq. (\ref{eq:<Ca_{poi}(f)>})) are plotted in Fig. \ref{fig3}A. As shown in Fig. \ref{fig3}C, the solutions agree well with the numerical results and indicate that Poisson stimulation gently increases the calcium concentration, as compared to constant-ISI input. This property does not depend on the calcium decay time constant (Fig. \ref{fig5}). } \begin{figure}[htbp] \centerin \includegraphics[width=140mm,cli ]{Fig5.eps} \vskip -\lastskip \vskip -10pt \caption{ \en{Two-dimensional density plot of post-synaptic calcium concentration as a function of $f$ and $\tau_{Ca}$. We illustrate the calcium concentration with the constant-ISI input expressed in Eq. (\ref{eq:<Ca_c(f)>}) (A) and with the Poisson input expressed in Eq. (\ref{eq:<Ca_{poi}(f)>}) (B). (C) Density plot of $\left<Ca_c(f, \tau_{Ca}) \right>-\left<Ca_{poi}(f, \tau_{Ca}) \right>$. The horizontal lines on each figure suggest corresponding values at $\tau_{Ca}=40$ ms and $\tau_{Ca}=80$. } } \label{fig5} \end{figure} \en{ Next, we obtained an approximate expression for the relation between the synaptic weight and the average stimulation rate. By assuming that the synaptic weight $W(t)$ converges to a stationary solution in the long-time scale (Eq. (\ref{eq:approxW(f)})), we obtain Eq. (\ref{eq:<W_{poi}(f)>}). Figures \ref{fig4}A and \ref{fig4}C show that the analytical expression agrees well with the results of the numerical simulation. Regardless of the $\tau_{Ca}$ value, the synaptic weight varies slowly by changing the stimulus pattern from constant-ISI input to Poisson input. This change in the stimulation pattern moves the LTD/LTP threshold to the left and narrows the LTD phase decrease for $\tau_{Ca}=80$ ms (Fig. \ref{fig4}A, left), whereas it has the opposite effect for $\tau_{Ca}=40$ ms (Fig. \ref{fig4}A, right). } \en{ Thus, the numerical and analytical studies indicate that the postsynaptic calcium concentration and synaptic strength receiving Poisson input behave differently from those receiving constant-ISI stimulation. At the same frequency, when $\tau_{Ca}=80$ ms, a synapse receiving Poisson input is more likely to be LTP than a synapse receiving constant-ISI input, and when $\tau_{Ca}=40$ ms, a synapse receiving Poisson input is more likely to be LTD. These findings suggest that the difference in input patterns (constant-ISI or Poisson input) and calcium decay time constant affects the output of FDP, i.e., LTD or LTP. In addition, this tendency to become LTP or LTD by changing the input pattern depends on the postsynaptic calcium decay time constant. } \subsection{ \en{ Postsynaptic calcium level and synaptic weight as a function of the average frequency of gamma process input } } \en{ We studied the postsynaptic calcium concentration and synaptic load of neurons receiving gamma process inputs, which is one of the firing patterns observed in brain \cite{RN30, RN42}. Since the analytic solutions are qualitatively consistent with the simulation results so far presented in the present paper, we discuss the plasticity of synapses receiving gamma process input by only the analytic solutions. The postsynaptic calcium concentration of neurons that receive gamma process input is expressed by Eq. (\ref{eq:<Ca_{Gamma}(f)>}), where $\alpha$ is a shape parameter. The synaptic weight of the neurons receiving gamma process input is approximately expressed by Eq. (\ref{eq:<W_{Gamma}(f)>}) as a function of average input frequency. } \en{ This result for the calcium concentration is illustrated in Fig. \ref{fig6}A. As the shape parameter increases, the slope of the calcium concentration increases. The results for the synaptic weight are shown in Fig. \ref{fig6}B. When neurons with $\tau_{Ca}=80$ ms are stimulated by gamma process input, as the shape parameter $\alpha$ increases, the LTD/LTP threshold shifts to a higher frequency and the minimum value of the synaptic weight becomes smaller (Fig. \ref{fig6}B, left). When $\tau_{Ca}=40$ ms, the LTD/LTP threshold shifts to a lower frequency as the shape parameter $\alpha$ increases; on the other hand, the minimum value of the synaptic weight is approximately the same from $\alpha=1$ to $\alpha=5$ (Fig. \ref{fig6}B, right). } \begin{figure}[htbp] \centerin \includegraphics[width=140mm,cli ]{Fig6.eps} \vskip -\lastskip \vskip -10pt \caption{ \en{ Change in the postsynaptic calcium concentration and the weight in the synapse with gamma process input. We show two types of neurons with different time constants of calcium decay, $\tau_{Ca}=80$ ms and $40$ ms. In each graph, the black, orange, light blue, blue green, yellow, and blue lines indicate constant-ISI input, shape parameter $\alpha = 1$, $\alpha = 2$, $\alpha = 3$, $\alpha = 4$, and $\alpha = 5$, respectively. (A) Relationship between the postsynaptic intracellular calcium concentration and input frequency $f$ in neurons stimulated with gamma process input. A graph of constant-ISI stimulation is shown as a control (black lines). The trace of the shape parameter $\alpha=1$ matches the graph of the Poisson input. As the value of the shape parameter increases, the calcium level increases is faster. (B) Approximate relationship between synaptic weight and mean input frequency in neurons with constant-ISI and gamma process inputs. The LTD/LTP threshold moves to a higher frequency in the case of $\tau_{Ca}=80$ ms and the moves lower in the case of $\tau_{Ca}=40$ ms as the value of the shape parameter becomes large. } } \label{fig6} \end{figure} \en{ In summary, the postsynaptic calcium level with gamma process input increases slower than that with constant-ISI input, but increases faster than that with Poisson input. As the shape parameter increases, the increase in the calcium concentration becomes faster. The tendency to induce LTP or LTD by gamma process input depends on the shape parameter. These results suggest that the difference in input pattern as well as the shape parameter in gamma process input affects the synaptic weight. } \subsection{ \en{ Effect of increase in background synaptic activity receiving constant-ISI input } } \en{ The postsynaptic terminals in neurons in vivo display intense background activity, which is characterized by fluctuations in the postsynaptic membrane potential. This background activity has at least three components: dendritic action potential, BPAPs, and voltage noise \cite{RN37, RN83}. The voltage noise includes the stochastic properties of ion channels, the random release of neurotransmitter, and thermal noise. The distance from the soma or the differences in the cortical layer, in which neurons are located, affects the frequency and size of the amplitude of the background synaptic activity \cite{RN34, RN35, RN27}. In order to examine the FDP under various background synaptic activities, we first analytically and numerically calculated the dependence of the postsynaptic calcium concentration on the constant-ISI input under various frequencies of background Poisson input. The fluctuation of the membrane potential due to background synaptic activity is denoted by $V_{bg}$ in Eq. (\ref{eq:V_{bg}(t)}). Since $V_{bg}$ increases in proportion to the average frequency of the background synaptic activity $f_{bg}$, $H(V)$ in Eq. (\ref{eq:Ca(Delta t)}) is approximately expressed as a bivariate quadratic function of $f$ and $f_{bg}$. Thus, the postsynaptic calcium concentration is given as a function of $f$ and $f_{bg}$ as follows: } \begin{align} \left<Ca_c(f, f_{bg}) \right> =& \tau _{Ca} f (\zeta_0+\zeta_1 f+\zeta_2 f_{bg}+\zeta_3 f^2+\zeta_4 f f_{bg}+\zeta_5 f_{bg}^2) \notag \\ & \times \sum_{j=f, s} I_j \tau_{j} \left[1-\exp \left(-\frac{1}{\tau_{j} \cdot f} \right) \right], \ \label{eq:<Ca(f, f_{bg})>} \end{align} \en{ \noindent where $\zeta_0=1.21 \times 10^{-2}$, $\zeta_1=2.97 \times 10^{-5}$, $\zeta_2=6.12 \times 10^{-4}$, $\zeta_3=3.52 \times 10^{-8}$, $\zeta_4=1.45 \times 10^{-6}$, and $\zeta_5=1.49 \times 10^{-5}$. Figure \ref{fig7}A plots Eq. (\ref{eq:<Ca(f, f_{bg})>}) using $\tau_{Ca}=80$ ms or $\tau_{Ca}=40$ ms. In both cases, the higher the average frequency of the background Poisson input is, the faster the rate of increase in the calcium concentration with synaptic input frequency becomes. As shown in Fig. \ref{fig7}B, qualitatively consistent results were obtained by numerical simulations. } \begin{figure}[htbp] \centerin \includegraphics[width=140mm,cli ]{Fig7.eps} \vskip -\lastskip \vskip -10pt \caption{ \en{ Postsynaptic calcium concentration in two types of neurons ($\tau Ca = 80$ ms and $\tau Ca = 40$ ms) as a function of the frequency of presynaptic input and of the background input. The ISI of the presynaptic input is constant. The background Poisson input with a frequency in the range of 1 to 5 Hz was applied. The analytic solution is shown in A, whereas the results of numerical simulation are shown in B. Error bars indicate the SEM. } } \label{fig7} \end{figure} \en{ We next analytically and numerically calculated the relation between the synaptic weight and the input frequency under various background input rates. The approximate analytic solution is obtained as follows: } \begin{align} \left<W_{c}(f, f_{bg}) \right> = \int_{0}^{\infty} dx \int_{0}^{1} d\epsilon \ \delta(1-x) \Omega(Ca_{c}(f, f_{bg}, x, \epsilon| r_{Ca;c}, r_{j;c})). \label{eq:<W_{c}(f, f_{bg})>} \end{align} \en{ \noindent Here, $Ca_{c}(f, f_{bg}, x, \epsilon| r_{Ca;c}, r_{j;c})$ is defined by Eq. (\ref{eq:<Ca(f, f_{bg})>}) in Eq. (\ref{eq:Ca(Delta t, x, epsilon| r_{Ca}, r_j)}). More explicitly, $Ca_{c}(f, f_{bg}, x, \epsilon| r_{Ca;c}, r_{j;c})$ is given by } \begin{align} Ca_{c}(f, f_{bg}, x, \epsilon| r_{Ca;c}, r_{j;c}) =& (\zeta_0+\zeta_1 f+\zeta_2 f_{bg}+\zeta_3 f^2+\zeta_4 f f_{bg}+\zeta_5 f_{bg}^2) \notag \\ & \sum_{j=f, s} I_j \tau_{0j} \left\{ \exp(-\frac{\epsilon}{\tau_j f})-\exp(-\frac{\epsilon}{\tau_{Ca} f})+\exp(-\frac{\epsilon}{\tau_{Ca} f}) \right. \notag \\ &\left. \left[\exp(-\frac{x}{\tau_{j} f})-\exp(-\frac{x}{\tau_{Ca} f}) \right] + \exp(-\frac{x + \epsilon}{\tau_{Ca} f}) \left(\frac{r_j-r_{Ca}}{1-r_{Ca}} \right) \right\} . \label{eq:Ca_{c}(f, f_{bg}, x, epsilon| r_{Ca;c}, r_{j;c})} \end{align} \en{ The analytical solution (\ref{eq:<W_{c}(f, f_{bg})>}) is plotted in Fig. \ref{fig8}A, and the corresponding numerical solution is shown in Fig. \ref{fig8}B. Although two types of neurons with different calcium time constants were examined, the influence on the synaptic strengths by the increase of the background input level is qualitatively common to both types of neurons. In other words, the increase in the background input rate moves the LTD/LTP threshold to the left, decreases the LTD phase, and broadens the LTP phase. } \begin{figure}[htbp] \centerin \includegraphics[width=140mm,cli ]{Fig8.eps} \vskip -\lastskip \vskip -10pt \caption{ \en{ Synaptic strength as a function of the frequency of presynaptic constant-ISI input and of the background Poisson input, under the background Poisson input with a frequency in the range of 1 to 5 Hz. Two types of neurons ($\tau_{Ca} = 80$ ms and $\tau_{Ca} = 40$ ms) were examined. The analytic solution and the results of numerical calculation are shown in A and B, respectively. Error bars indicate the SEM. } } \label{fig8} \end{figure} \en{ Thus, upregulation of background synaptic activities leads to the enhancement of synaptic efficacy through the acceleration of the increasing rate of postsynaptic calcium concentration. These results suggest that the FDP output (LTP or LTD) varies depending on the magnitude of the applied background noise, even if the input frequency is the same. } \noindent \newline \newpage \section{Discussion} \label{Discussion} \en{ Here, we summarize the findings of the present study: (1) We obtained approximately analytical solutions of the intracellular calcium concentration and the synaptic weight as a function of the frequency of three kinds of input: constant-ISI, Poisson, and gamma process input. The latter two input patterns are often observed in vivo. (2) In all three input patterns, LTP occurs at a lower frequency as the calcium decay time constant increases. We used $80$ ms as the longer calcium decay time constant ($=\tau_{Ca}$) and $40$ ms as the shorter calcium decay time constant. (3) The intracellular calcium level increases more slowly in neurons with Poisson input than in neurons with constant-ISI input. At the same stimulation frequency, a synapse with a long calcium time constant tends to be strengthened (LTP) by changing the stimulation pattern from constant-ISI input to Poisson input, while a synapse with a short calcium time constant weakened (LTD). (4) The calcium level with gamma process input increases faster than that with Poisson input but slower than that with constant-ISI input. Moreover, calcium level with gamma process also increases faster as the shape parameter grows. As the shape parameter increases, the LTD/LTP threshold moves to a higher frequency in $\tau_{Ca}=80$ ms neurons but moves to a lower frequency in $\tau_{Ca}=40$ ms neurons. The minimum value of the synaptic weight is smaller in $\tau_{Ca}=80$ ms neurons but is approximately constant in $\tau_{Ca}=40$-ms neurons as the shape parameter increases. (5) The increase of background synaptic activities induces the acceleration of the increase rate of the calcium level and the enhancement of synaptic weight. These findings indicate that the synaptic weight by FDP depends not only on input frequency but also on input pattern, shape parameter in gamma process input, calcium decay time constant, and background synaptic activity, which have been suggested to vary in vivo depending on the location, the internal state, and the external environment of the neuron \cite{RN37, RN23, RN5, RN30, RN42, RN83}. In the subsequent subsections, we discuss the involvement of these factors in synaptic plasticity and neural coding. } \en{ For a long time, there has been a debate on the nature of neural coding, which is primarily founded on the generation, propagation, and processing of spikes \cite{RN45, RN81, RN82}. The classical view of neural coding emphasizes the information carried by the rate at which neurons produce action potentials, whereas spike variability and background activity were ignored or treated as noise \cite{RN44, RN90, RN91}. In experimental and theoretical studies of recent decades, arguing the importance of the spike timing rather than the firing rate in neural coding, the spike variability and background activity are also considered as noise activities \cite{RN3, RN75}. However, the results of recent electrophysiological experiments on waking animals suggest that they are too large to be ignored for precise spike timing \cite{RN75,RN83}, leading to a renewed awareness of the importance of the rate coding, which is less affected by individual spike variability and background noise \cite{RN13, RN73}. Moreover, recent studies reveal the need for several simultaneous codes (multi-coding), including spike variability and fluctuation of membrane potential, as sources \cite{RN45, RN48, RN47, RN46}. Hence, the multi-coding hypothesis for the neural coding problem may be supported by the results of the present study, suggesting that not only firing rate but also firing variability, the internal parameters of neurons, and the magnitude of background synaptic activity could be important for neural coding and synaptic plasticity \cite{RN44, RN45}. } \en{ We found that the calcium decay time constant determines the plasticity outcome. In neurons with a long time constant, LTP is induced even by a small presynaptic rate (about 9 Hz), because the calcium concentration via the NMDA receptors increases faster in these neurons than in neurons with a short time constant (Figs. \ref{fig1} and \ref{fig2}). In neurons with a short time constant, LTP is not induced until the stimulation frequency is large (over about 50 Hz). This difference due to calcium dynamics is more pronounced when the stimulation pattern is set to Poisson or gamma process input (Figs. \ref{fig4} and \ref{fig6}). The calcium decay time constant is closely related to the function of sodium-calcium exchangers (NCXs) \cite{RN85}. Sodium-calcium exchangers, which are expressed highly in dendrites and dendritic spines in a variety of brain regions \cite{RN84}, are controlled in activity by various intracellular and extracellular signaling molecules \cite{RN88} and are widely involved in many neural events from developmental processes to cognitive abilities \cite{RN86, RN87}. Thus, the calcium decay time constant differs depending on anatomical and physiological characteristics. Indeed, previous reports suggest that the calcium decay time constant varies with the depth of the cerebral cortex and that nitric oxide stimulates the increase of the calcium decay time constant in a cGMP-dependent manner \cite{RN5, RN88, RN89}. Our findings and those of previous studies suggest that, even with the same frequency, the synaptic plasticity induced thereby depends on the anatomical and physiological factors and that this difference becomes more prominent when the stimulation pattern is irregular. } \en{ Previous studies have demonstrated that applying an appropriate level of noise to the postsynapse results in the enhancement of the neural sensitivity and the improvement of signal detection in the central nervous system \cite{RN92, RN93}. Consistent with these findings, our research indicates that increased synaptic noise is more likely to induce LTP, regardless of the calcium time constant. Recently, the dendritic action potential has been considered as one of the main components of synaptic noise. In the record of the dendritic membrane potential of freely behaving rats, dendrite spikes accompanied by large subthreshold membrane potential fluctuations occur with high rates greater than the BPAP evoked in the soma \cite{RN83}. In addition, it has been shown in hippocampal synapses that even a single presynaptic burst induces LTP, provided dendritic action potentials are generated \cite{RN94}. These findings and our results indicate that inputs from other than the presynapse, such as background synaptic activity, including the BPAP and the dendritic action potential, are largely involved in synaptic plasticity, especially the generation of LTP. We cannot, however, conclude from our results that even a single presynaptic input induces LTP. It is necessary to conduct research in which single-burst-induced LTP is substantiated experimentally. Therefore, a mathematical model that further improves the model used in the present study should be constructed. } \en{ In conclusion, a problem regarding the FDP, namely, a firing rate abstraction, in which the temporal average of spikes is taken, is discussed, ignoring a large amount of extra information within the encoding window, such as the variation of firing pattern \cite{RN95, RN44, RN91}. This loss of information contrasts the encoding of rapidly changing neuronal activity observed in the brain \cite{RN95, RN44}. The present study showed theoretically that the output of synaptic plasticity in neurons receiving the same input frequency differs depending on the input pattern, the calcium time constant, and the background activity, which are related by neuron type and the anatomical and physiological condition in the brain. This finding suggests that information neglected in the view that only the firing rate induces the synaptic plasticity is also involved in the synaptic plasticity and neural coding. In the future, the ratio at which this information is related to synaptic plasticity and neural coding should be verified experimentally and theoretically. } \newpage \section{Materials and methods} \label{Method} \subsection{Model} \en{ We used a model for the FDP based on the calcium control hypothesis of Shouval et al., assuming that the change of the synaptic weight is fully determined by the postsynaptic calcium level \cite{RN1,RN2}. This model has been confirmed to integrate STDP observed in acute hippocampal slices within a single theoretical framework \cite{RN96}. Among the few studies that have analytically solved this hypothesis, Yeung et al. \cite{RN29} calculated the mean values of the calcium transients evoked by a spiking neuron. In the present study, we analytically derived the intracellular calcium concentration and synaptic weight with respect to the input frequency focusing only on the long-term behavior of the intracellular calcium concentration and synaptic weight. We incorporated in vivo effects into the model as follows. First, in order to investigate the FDP in vivo, we focused on three types of firing pattern that are widely observed in the brain: constant-ISI (inter-spike intervals) inputs, Poisson inputs, and gamma inputs. Next, calcium decay time constant of in vivo neurons differs from cell to cell. Previous reports suggested that pyramidal neurons in superficial layers possess faster calcium dynamics than deep layers. In order to study the association of the calcium decay time constant with the FDP, we examined two kinds of neurons with time constants of 40 ms and 80 ms. Finally, in vivo neurons are always subjected to background activity. The frequency and magnitude of these neurons depend on the location of the synapse in the brain and the surrounding neuronal activity \cite{RN34, RN37}. Hence, we examined the correlation between the amplitude of background synaptic activity and the FDP. } \en{ The dynamics of the synaptic weight $W(t)$ are governed by } \begin{align} \frac{d}{dt}W(t) = \eta(Ca(t))[\Omega(Ca(t))-W(t)] \ \ ,\label{eq:W'(t)} \end{align} \en{ \noindent where $Ca(t)$ represents the intracellular calcium concentration, and $\eta$ and $\Omega$ are functions of intracellular calcium concentration given by the following formulas: } \begin{align} \eta(Ca) &= \left[\frac{p1}{p2+(Ca)^{p3}}+p4\right]^{-1} \ \ ,\label{eq:eta(ca)}\\ \Omega(Ca) &= 0.25+\mathrm{sig}(Ca-\alpha_2, \beta_2)-0.25 \mathrm{sig}(Ca-\alpha_1, \beta_1) \ \ \label{eq:Omega(ca)}, \end{align} \en{ \noindent where } \begin{align} \quad \mathrm{sig}(x, \beta) = \exp(\beta x)/[1+\exp(\beta x)] \ \ \label{eq:sig}, \end{align} \en{\noindent and we used the following parameters: $p1=0.1$ s, $p2=p1/10^{-4}$, $p3=3$, $p4=1$ s, $\alpha_1=0.35 \ \mu \mathrm{mol/dm^3}$, $\alpha_2=0.55 \ \mu \mathrm{mol/dm^3}$ and $\beta_1=\beta_2=80 \ \mu \mathrm{mol/dm^3}$ \cite{RN1,RN2}. The dynamics of the intracellular calcium concentration are described as follows: } \begin{eqnarray} \frac{d}{dt}Ca(t) &=& I_{\scalebox{0.5}{NMDA}}(t)-\frac{1}{\tau_{ca}}Ca(t) \label{eq:ca1} \ \ , \end{eqnarray} \en{ \noindent where $\tau_{ca}$ is the calcium decay time constant. In order to investigate the relation between the calcium dynamics and the synaptic plasticity, we examined two kinds of neurons with time constants of 40 ms and 80 ms, which are known as representative values in pyramidal cells in the deep cortex (layers V to VI) and the superficial cortex (layers II to IV) \cite{RN23, RN5}. In Eq. (\ref{eq:ca1}), $I_{\scalebox{0.5}{NMDA}}$ represents the calcium current via the NMDA receptor and is expressed as a function of time and postsynaptic potential as follows: } \begin{eqnarray} I_{\scalebox{0.5}{NMDA}}(t, V) &=& H(V) \left[I_f \Theta(t) e^{(-t/\tau_f)} + I_s \Theta(t) e^{(-t/\tau_s)}\right] \label{eq:INMDA} \ \ . \end{eqnarray} \en{ \noindent Here, $\Theta(t)$ is the Heaviside step function and we choose the parameters $I_f=0.75$, $I_s=0.25$, $\tau_f=50$ ms, and $\tau_s=200$ ms, and $H(V)$ is given by } \begin{eqnarray} H(V) &=& -P_0 \ G_{\scalebox{0.5}{NMDA}} \frac{(V-V_r)}{1+(Mg/3.57)\exp(-0.062 V)} \ \ , \label{eq:H(V)} \end{eqnarray} \en{ \noindent where we choose the parameters $P_0=0.5$, $G_{\scalebox{0.5}{NMDA}}=-1/140 \ \mathrm{\mu mol \cdot dm^{-3}/(m \cdot mV)}$, $Mg=3.57$, and a reversal potential for calcium ions of $Vr=130 \ \mathrm{mV}$ \cite{RN1}. Since $H(V)$ increases monotonically with the membrane potential $V$ before reaching a plateau at $V=27.1 \ \mathrm{mV}$, the higher the membrane potential the greater the calcium current through the NMDA receptor, $I_{\scalebox{0.5}{NMDA}}$, as long as $V < 27.1 \ \mathrm{mV}$. The postsynaptic membrane potential is given as the sum of the resting membrane potential $V_{\rm rest}$, which is set to $-65$ mV, and the depolarization terms $V_{\rm epsp}+V_{\rm bg}$: } \begin{eqnarray} V(t) &=& V_{\rm rest}+V_{\rm epsp}(t)+V_{\rm bg}(t) \ \ \label{eq:V(t)}. \end{eqnarray} \en{ The depolarization terms in Eq. (\ref{eq:V(t)}) include both EPSPs generated by binding glutamate to the AMPA receptors ($=V_{\rm epsp}$) and background contribution ($=V_{\rm bg}$), which describes the depolarization due to the factors other than EPSP. Here, $V_{\rm epsp}$ is expressed as } \begin{eqnarray} V_{\rm epsp}(t) &=& \sum_{i} \Theta(t-t_i) \left[e^{-(t-t_i)/\tau_1}-e^{-(t-t_i)/\tau_2}\right] \ \ \label{eq:EPSP(t)}, \end{eqnarray} \en{ \noindent where $t_i$ indicates the {\it i}-th presynaptic spike time, and the time constants are $\tau_1 = 50$ ms and $\tau_2 = 5$ ms \cite{RN1}. Here, $V_{\rm bg}$ is composed of the summation of the dendritic action potentials, the back propagating action potentials (BPAPs), and the voltage noise applied to the postsynapse. The amplitude of the depolarization generated at the postsynaptic dendritic spine by the BPAPs varies, decreasing exponentially with the distance from the soma, at which it is about $100$ mV relative to the synapse \cite{RN27, RN26}. The duration of the depolarization by BPAPs also differs among cell types \cite{RN28}. Moreover, the noise level at dendritic spines has been reported to be similar to that measured at the soma \cite{RN25}. We took these previous studies into consideration in order to perform the numerical simulation and presumed that the spike trains by both BPAPs and voltage noise follow a homogeneous Poisson process. Thus, we simply expressed $V_{\rm bg}$ as follows: } \begin{eqnarray} V_{\rm bg}(t) &=& s\sum_{k} \Theta(t-t_k) \left[e^{-(t-t_k)/\tau_1}-e^{-(t-t_k)/\tau_2}\right] \ \ \label{eq:V_{bg}(t)}, \end{eqnarray} \en{ \noindent where $s = 20$ mV and $\{ t_k \}$ is a Poisson process with a frequency that varies depending on the simulation conditions. (In all simulations except for those of Figs. \ref{fig7} and \ref{fig8}, we used a Poisson process with a mean frequency of 1 Hz.) } \subsection{Numerical simulations} \en{In the present study, we performed numerical simulations as well as analytical calculations in order to investigate the FDP. We used Wolfram Mathematica software in all simulations, and determined the dependence of both the calcium concentration and the synaptic weight on the stimulation frequency as follows. First, we repeatedly solved Eqs. (\ref{eq:W'(t)})-(\ref{eq:V_{bg}(t)}) numerically as a function of time for each frequency. The calcium concentration as a function of time obtained by this calculation is similar to the results of a previous paper \cite{RN29}. Next, after a period of $8.5 \times 10^4 $ ms, which is necessary for the system to reach a steady state, the average of the calcium level or the synaptic efficacy between $8.5 \times 10^4 $ ms to $9.0 \times 10^4 $ ms was calculated. When simulating with Poisson inputs, we performed the above calculations for at least three input patterns by changing the random seed, and took the average. The quantitative data are expressed as the mean of at least three independent experiments plus/minus the standard error of the mean (SEM). } \subsection{Derivation of the analytic solutions of the postsynaptic calcium concentration as functions of the average frequency of constant-ISI, Poisson, and gamma process inputs} \en{ In order to investigate the dependence of the postsynaptic calcium concentration on the average presynaptic stimulation frequency of each input pattern, we developed an approximate analytical solution. By integrating Eq. (\ref{eq:ca1}), we can formally express the solution for $Ca(t)$ as } \begin{equation} Ca(t)=\int_0^t e^{\frac{1}{\tau_{ca}}(s-t)}I_{\scalebox{0.5}{NMDA}}(s) ds \ . \label{eq:formal Ca(t)} \end{equation} \en{ \noindent Considering that the ion current through NMDAR ($I_{\scalebox{0.5}{NMDA}}$) is reset to zero each time presynaptic input is applied, Eq. (\ref{eq:INMDA}) is rewritten as follows for the interval between the presynaptic inputs $\hat{t}_k \leq s \leq \hat{t}_{k+1}$, where $\hat{t}_k$ is the time for $k$-th presynaptic input ($\hat{t}_0=0 \ \mathrm{ms}$): } \begin{align} I_{\scalebox{0.5}{NMDA}}(s)=H(V)\left[I_f\Theta(s-\hat{t}_k) e^{-(s-\hat{t}_k)/\tau_f}+I_s\Theta(s-\hat{t}_k) e^{-(s-\hat{t}_k)/\tau_s}\right] \ . \label{eq:INMDA(s)} \end{align} \\ \\ \en{ Now, we make the following assumptions. \\ \\ } \en{ (Assumption 1) The time dependence of $H(V)$ can be neglected because it varies slowly in time compared to the other terms in Eq. (\ref{eq:INMDA(s)})\\ } \en{ (Assumption 2) The spike interval fluctuates stochastically. If we define the average spike interval as $\Delta t$, $\hat{t}_k$ is written as follows: \begin{align} \hat{t}_k=\delta_k \Delta t + \hat{t}_{k-1}, \ \ \ \hat{t}_0=0.\label{eq:def:hat{t}_k} \end{align} \en{ \noindent Then, } \begin{align} \hat{t}_k = \sum_{k'=1}^{k} \delta_{k'} \Delta t \ \ \ (k \geq 1). \label{eq:hat{t}_k} \end{align} } \en{ \noindent Inserting Eq. (\ref{eq:INMDA(s)}) into Eq. (\ref{eq:formal Ca(t)}) with Assumption 1, we obtain } \begin{align} Ca(t) =& H(V) \sum_{k=0}^{N} \int_{\hat{t}_k}^{\hat{t}_{k+1}} ds \left[ I_f\Theta(s-\hat{t}_k) e^{-(s-\hat{t}_k)/\tau_f} \right. \\ &+ \left. I_s\Theta(s-\hat{t}_k) e^{-(s-\hat{t}_k)\tau_s} \right] e^{\frac{1}{\tau_{ca}}(s-t)} \notag \\ =& H(V)[S_{N-1}^f(t)+T_{N}^f(t)+S_{N-1}^s(t)+T_{N}^s(t)] \ , \label{eq:Ca(t)} \end{align} \\ \en{ \noindent where we have separated the contributions from the {\it N}-th presynaptic input, $T_{N}^f(t)$ and $T_{N}^s(t)$ from the contributions from the first ${\it N}-1$ presynaptic inputs, $S_{N-1}^f(t)$ and $S_{N-1}^s(t)$: } \begin{align} S_{N-1}^j(t) := \sum_{k=0}^{N-1} \int_{\hat{t}_k}^{\hat{t}_{k+1}} ds \ I_j \ e^{-\frac{1}{\tau_j}(s-\hat{t}_k)} \ e^{\frac{1}{\tau_{Ca}}(s-t)}, \ \ \ \ \ \ \mbox{($j=f$ or $s$)} \label{eq:S_{N-1}^j(t)} \end{align} \en{ \noindent and } \begin{align} T_{N}^j(t) := \int_{\hat{t}_N}^{t} ds \ I_j \ e^{-\frac{1}{\tau_j}(s-\hat{t}_N)} \ e^{\frac{1}{\tau_{Ca}}(s-t)}, \ \ \ \ \ \ \mbox{($j=f$ or $s$)} \ . \label{eq:T_{N}^j(t)} \end{align} \en{ \noindent Furthermore, we define $S_{k+1, k}^j(t)$ as } \begin{align} S_{k+1, k}^j(t) :=& \int_{\hat{t}_k}^{\hat{t}_{k+1}} ds \ I_j \ e^{-\frac{1}{\tau_j}(s-\hat{t}_k)} \ e^{\frac{1}{\tau_{Ca}}(s-t)} \notag \\ =& I_j \tau_{0j} e^{-\frac{1}{\tau_{Ca}}(t-\hat{t}_k)} \left[e^{\frac{1}{\tau_{0j}}(\hat{t}_{k+1}-\hat{t}_{k})}-1 \right], \label{eq:S_{k+1, k}^j(t)} \end{align} \en{ \noindent where $\tau_{0f}$ and $\tau_{0s}$ are defined as follows: } \begin{align} \frac{1}{\tau_{0j}} &:= \frac{1}{\tau_{Ca}}-\frac{1}{\tau_{j}}, \ \ \ \ \ \ \mbox{($j=f$ or $s$). } \label{eq:tau0j} \end{align} \en{ We write $t = \hat{t}_N + \epsilon \Delta t$, where $\epsilon \Delta t$ represents the time interval between the last spike time ($\hat{t}_N$) and the time to measure the calcium concentration ({\it t}). Substituting the formula into Eq. (\ref{eq:S_{k+1, k}^j(t)}), we obtain } \begin{align} S_{k+1, k}^j(\hat{t}_N, \epsilon, \Delta t) :=& S_{k+1, k}^j(\hat{t}_N + \epsilon \Delta t) \notag \\ =& I_j \tau_{0j} e^{-\frac{1}{\tau_{Ca}}(\epsilon \Delta t + \hat{t}_N-\hat{t}_k)} \left(e^{\frac{1}{\tau_{0j}}\delta_{k+1} \Delta t}-1 \right) . \label{eq:S_{k+1, k}^j(hat{t}_N, epsilon, Delta t)} \end{align} \en{ \noindent In the case of $0\leq k \leq N-2$, we have } \begin{align} S_{k+1, k}^j(\hat{t}_N, \epsilon, \Delta t) = I_j \tau_{0j} e^{-\frac{1}{\tau_{Ca}}\epsilon \Delta t} \left(e^{-\frac{1}{\tau_{j}}\delta_{k+1} \Delta t}-e^{-\frac{1}{\tau_{Ca}}\delta_{k+1} \Delta t} \right) \prod_{k'=k+2}^N e^{-\frac{1}{\tau_{Ca}}\delta_{k'} \Delta t}. \label{eq:S_{k+1, k}^j(hat{t}_N + epsilon Delta t) k<N-2} \end{align} \en{ \noindent In the case of $k=N-1$, we have } \begin{align} S_{N, N-1}^j(\hat{t}_N, \epsilon, \Delta t) = I_j \tau_{0j} e^{-\frac{1}{\tau_{Ca}}\epsilon \Delta t} \left(e^{-\frac{1}{\tau_{j}}\delta_{N} \Delta t}-e^{-\frac{1}{\tau_{Ca}}\delta_{N} \Delta t} \right). \label{eq:S_{k+1, k}^j(hat{t}_N + epsilon Delta t) k=N-1} \end{align} \en{ Since we are interested in the long-term behavior of the calcium concentration and synaptic weights, but not in the fluctuations caused by each spike, we take the statistical average over one cycle. Let $\delta_k$ in Assumption 2 obey the probability density function $\rho (\delta)$. Then the statistical averages of $e^{-\frac{1}{\tau_{Ca}}\delta_{k} \Delta t}$ and $e^{-\frac{1}{\tau_{j}}\delta_{k} \Delta t}$ can be written as } \begin{align} r_{Ca} &:= \left<e^{-\frac{1}{\tau_{Ca}}\delta_{k} \Delta t} \right> = \int_0^\infty \rho (\delta) e^{-\frac{1}{\tau_{Ca}}\delta \Delta t} d \delta, \notag \\ r_{j} &:= \left<e^{-\frac{1}{\tau_{j}}\delta_{k} \Delta t} \right> = \int_0^\infty \rho (\delta) e^{-\frac{1}{\tau_{j}}\delta \Delta t} d \delta. \label{eq:r_{Ca} r_{j}} \end{align} \en{ \noindent Hence, the statistical average of Eq. (\ref{eq:S_{k+1, k}^j(hat{t}_N + epsilon Delta t) k<N-2}) is given as } \begin{align} \left<S_{k+1, k}^j(\hat{t}_N, \epsilon, \Delta t) \right>=I_j \tau_{0j} e^{-\frac{1}{\tau_{Ca}}\epsilon \Delta t} (r_j-r_{Ca}) r_{Ca}^{N-k-1}. \label{eq:<S_{k+1, k}^j>} \end{align} \en{ \noindent Summing from $k=0$ to $k=N-1$, the statistical average of Eq. (\ref{eq:S_{N-1}^j(t)}) is obtained as } \begin{align} \left<S_{N-1}^j(\hat{t}_N, \epsilon, \Delta t) \right>=I_j \tau_{0j} e^{-\frac{1}{\tau_{Ca}}\epsilon \Delta t} (r_j-r_{Ca}) \frac{1-r_{Ca}^N}{1-r_{Ca}}. \label{eq:<S_{N-1}^j(hat{t}_N, epsilon, Delta t)>} \end{align} \en{ \noindent In order to obtain the long-term behavior of $\left<S_{N-1}^j \right>$, we take the limit $N \rightarrow \infty$. Since $r_{Ca}<1$, and thus $r_{Ca}^N \rightarrow 0$ as $N \rightarrow \infty$, we obtain } \begin{align} \left<S_{N-1}^j(\epsilon, \Delta t) \right> \simeq I_j \tau_{0j} \frac{r_j-r_{Ca}}{1-r_{Ca}} \exp \left(-\frac{\epsilon \Delta t}{\tau_{Ca}} \right) \label{eq:<S_{N-1}^j(epsilon, Delta t)>}. \end{align} \en{ \noindent Similarly, using $t = \hat{t}_N + \epsilon \Delta t$ in Eq. (\ref{eq:T_{N}^j(t)}) and taking the statistical average, we obtain (in the limit $N \rightarrow \infty$) } \begin{align} T_{N}^j(\epsilon, \Delta t) = I_j \tau_{0j} \left(e^{-\epsilon \Delta t/\tau_{j}}-e^{-\epsilon \Delta t/\tau_{Ca}} \right). \label{eq:T_{N}^j(epsilon, Delta t)} \end{align} \en{ \noindent Using Eqs. (\ref{eq:<S_{N-1}^j(epsilon, Delta t)>}) and (\ref{eq:T_{N}^j(epsilon, Delta t)}), we obtain the statistical average of the postsynaptic calcium concentration as } \begin{align} \left<Ca(\Delta t, \epsilon) \right> = H(V) \sum_{j=f, s} I_j \tau_{0j} \left[\exp \left(-\frac{\epsilon \Delta t}{\tau_{j}} \right)-\frac{1-r_{j}}{1-r_{Ca}} \exp \left(-\frac{\epsilon \Delta t}{\tau_{Ca}} \right) \right] \ . \label{eq:Ca(Delta t,epsilon)} \end{align} \en{ \noindent Furthermore, the statistical average of this equation with respect to the observation time is given by } \begin{align} \left<Ca(\Delta t) \right> = H(V) \sum_{j=f, s} I_j \tau_{0j} \left(r'_{j}-\frac{1-r_{j}}{1-r_{Ca}} r'_{Ca} \right), \label{eq:Ca(Delta t)} \end{align} \en{ \noindent where } \begin{align} r'_{Ca}:=\left<e^{-\epsilon \Delta t/\tau_{Ca}} \right> \ \ \mbox{and} \ \ r'_{j}:=\left<e^{-\epsilon \Delta t/\tau_{j}} \right>. \label{eq:r'} \end{align} \subsubsection{Calcium concentration of constant-ISI input} \en{ First, we calculate $r_{Ca}$, $r_{j}$, $r'_{Ca}$, and $r'_{j}$ for the constant-ISI input, which are denoted as $r_{Ca;c}$, $r_{j;c}$, $r'_{Ca;c}$, and $r'_{j;c}$, respectively. In this case, the probability density function is given by $\rho_{Ca;c}(x)=\rho_{j;c}(x)=\delta (1-x)$. Using this function in Eq. (\ref{eq:r_{Ca} r_{j}}), we obtain } \begin{align} r_{Ca;c}=e^{-\frac{\Delta t}{\tau_{Ca}}}, \ \ \ r_{j;c}=e^{-\frac{\Delta t}{\tau_{j}}}. \label{eq:r const} \end{align} \en{ \noindent Since it is assumed that the sampling time follows a uniform distribution, $r'_{Ca}$ and $r'_{j}$ are expressed as follows: } \begin{align} r'_{Ca;c}=\frac{\tau_{Ca}}{\Delta t} \left(1-e^{-\frac{\Delta t}{\tau_{Ca}}} \right), \ \ \ r'_{j;c}=\frac{\tau_{j}}{\Delta t} \left(1-e^{-\frac{\Delta t}{\tau_{j}}} \right). \label{eq:r' const} \end{align} \en{ \noindent Using Eqs. (\ref{eq:r const}) and (\ref{eq:r' const}), we obtain the statistical average of the postsynaptic calcium concentration as a function of the spike interval $\Delta t$ as follows: } \begin{align} \left<Ca(\Delta t) \right> = H(V) \frac{\tau_{Ca}}{\Delta t} \sum_{j=f, s} I_j \tau_{j} \left[1-\exp \left(-\frac{\Delta t}{\tau_{j}} \right) \right]. \label{eq:<Ca(Delta t)>} \end{align} \en{ Note that $H(V)$ is a slowly changing and monotonically increasing function of the membrane potential in the vicinity of the resting membrane potential ($-65 {\rm mV}$), and the duration of depolarization by EPSP is approximately 50 to 100 ms at most. Therefore, the increase in the average membrane potential remains at approximately $5.4 {\rm mV}$, even in the case of the highest frequency, e.g., 100 Hz. The average membrane potential, moreover, increases linearly with the stimulation frequency. Thus, $H(V(\Delta t))$ is approximately expressed as a quadric function of $1/\Delta t(=f)$. With this approximation, we obtain the following expression: } \begin{align} \left<Ca_c(f) \right> = \tau_{Ca} f (\gamma_0+\gamma_1 f+\gamma_2 f^2) \sum_{j=f, s} I_j \tau_{j} \left[1-\exp \left(-\frac{1}{\tau_{j} \cdot f} \right) \right]. \label{eq:<Ca_c(f)>} \end{align} \en{ \noindent Here, $\gamma_0= 1.28\times 10^{-2} {\rm mV}$, $\gamma_1= 3.20\times 10^{-2} {\rm mV \cdot ms}$, and $\gamma_2= 3.71\times 10^{-2} {\rm mV \cdot m^2}$. These values are determined by finding the relation between the input frequency and the time average of $V(t)$ in Eq. (\ref{eq:V(t)}) and by substituting the obtained values into the quadratic approximation of $H(V)$. } \subsubsection{Calcium concentration of Poisson input} \en{ The time interval of the spike sequence according to the Poisson process follows an exponential distribution, the probability density function of which is given by $\rho_{Ca;poi}(x)=\rho_{j;poi}(x)=e^{-x}$. Then, we can calculate $r_{Ca}$ and $r_{j}$ for the Poisson input as } \begin{align} r_{Ca;poi}=\frac{\tau_{Ca}}{\tau_{Ca}+\Delta t}, \ \ \ r_{j;poi}=\frac{\tau_{j}}{\tau_{j}+\Delta t}. \label{eq:r poi} \end{align} \en{ \noindent Since the spike interval fluctuates stochastically in the Poisson input, the observation time is considered to fluctuate with the same statistics. Then, $r'_{Ca}$ and $r'_{j}$ in the Poisson input, written as $r'_{Ca;poi}$ and $r'_{j;poi}$, are equal to $r_{Ca;poi}$ and $r_{j;poi}$, respectively. Substituting $r_{Ca;poi}$, $r_{j;poi}$, $r'_{Ca;poi}$, and $r'_{j;poi}$, we obtain the statistical average of the postsynaptic calcium concentration receiving Poisson input as a function of the average frequency as follows: } \begin{align} \left<Ca_{poi}(f) \right> = \tau_{Ca} (\gamma_0+\gamma_1 f+\gamma_2 f^2) \sum_{j=f, s} I_j \frac{\tau_j f}{\tau_j f+1}. \label{eq:<Ca_{poi}(f)>} \end{align} \subsubsection{Calcium concentration of gamma process input} \en{ The time interval of the spike sequence according to the gamma process follows a gamma distribution, the general formula for the probability density function of which is given as } \begin{align} \rho_{Ca;\Gamma}(x; \alpha)=\rho_{j;\Gamma}(x; \alpha)=\frac{1}{\Gamma(\alpha)} x^{\alpha-1} e^{-x}, \label{eq:rho_{Gamma}} \end{align} \en{ \noindent where $\alpha$ is the shape parameter, and $\Gamma$ is the gamma function, which is given by } \begin{align} \Gamma (\alpha):=\int_{0}^{\infty} t^{\alpha-1} e^{-t} dt. \end{align} \en{ \noindent Since, as in the Poisson input, the spike interval and the sampling time fluctuate with the same statistics, $r_{Ca}=r'_{Ca}=:r_{Ca:\Gamma}$ and $r_{j}=r'_{j}=:r_{j:\Gamma}$ in Eq. (\ref{eq:Ca(Delta t,epsilon)}). Thus, we obtain } \begin{align} r_{Ca:\Gamma}=\left(\frac{\tau_{Ca}}{\tau_{Ca}+\Delta t} \right)^{\alpha}, \ \ \ r_{j:\Gamma}=\left(\frac{\tau_{j}}{\tau_{j}+\Delta t} \right)^{\alpha}. \label{eq:r Gamma} \end{align} \en{ \noindent Noting that the average spike interval of the gamma distribution input is $\alpha \Delta t$, we can express the statistical average of the postsynaptic calcium concentration with gamma process input as follows: } \begin{align} \left<Ca_{\Gamma}(f) \right> = (\gamma_0+\gamma_1 f+\gamma_2 f^2) (\alpha f)^{\alpha} \sum_{j=f, s} I_j \tau_{0j} \left[ \frac{ \left(\frac{\tau_j}{\alpha \tau_j f+1} \right)^\alpha - \left(\frac{\tau_{Ca}}{\alpha \tau_{Ca} f+1} \right)^\alpha } { 1-\left(\frac{\alpha \tau_{Ca} f}{\alpha \tau_{Ca} f+1} \right)^\alpha } \right]. \label{eq:<Ca_{Gamma}(f)>} \end{align} \subsection{Derivation of the approximate analytic solutions for the synaptic weight as functions of the average frequency of constant-ISI, Poisson, and gamma process inputs} \en{ According to the calcium control hypothesis reported by Shouval et al., the time derivative of the synaptic efficacy $W$ is expressed as a function of intracellular calcium concentration as indicated in Eqs. (\ref{eq:W'(t)})-(\ref{eq:Omega(ca)}) \cite{RN1}. Equation (\ref{eq:W'(t)}) indicates that the synaptic strength approaches an asymptotic value $\Omega(Ca(t))$ with time constant $1/\eta(Ca(t))$. The functional form of $\Omega(Ca(t))$ in Eq. (\ref{eq:Omega(ca)}) is based qualitatively on the notion that a moderate rise in calcium leads to a decrease in the synaptic weight, whereas a large rise leads to an increase in the synaptic weight. This notion is closely related to the BCM theory, which states that weak synaptic input activity results in a decrease in synaptic strength, whereas strong input leads to an increase in synaptic weight \cite{RN18, RN17}.\\ Although it is difficult to find the exact relation between the synaptic weight $W$ and the stimulation rate $f$ analytically, we can obtain an approximate relation by assuming that $W(t)$ converges to a stationary solution in the macroscopic time scale, i.e., } \begin{eqnarray} \lim_{t \to \infty} W(t, f) := \left< W(f) \right> \approx \left< \Omega(Ca(f)) \right> \ \ \label{eq:approxW(f)}. \end{eqnarray} \en{ \noindent In order to calculate $\left< \Omega(Ca(f)) \right>$, we express the postsynaptic calcium concentration as } \begin{align} Ca(\Delta t, x, \epsilon| r_{Ca}, r_j) \approx & \lim_{N \to \infty} H(V) \sum_{j=f, s} \left[T^j + S_{N, N-1}^j + \sum_{k=0}^{N-2} S_{k+1, k}^j \right] \notag \\ =& H(V) \sum_{j=f, s} I_j \tau_{0j} \left[ e^{-\frac{1}{\tau_j} \epsilon \Delta t}-e^{-\frac{1}{\tau_{Ca}} \epsilon \Delta t} \right. \notag \\ &+e^{-\frac{1}{\tau_{Ca}} \epsilon \Delta t} \left(e^{-\frac{1}{\tau_{j}} x \Delta t}-e^{-\frac{1}{\tau_{Ca}} x \Delta t} \right) \notag \\ &+ \left. e^{-\frac{1}{\tau_{Ca}} (x + \epsilon) \Delta t} \left(\frac{r_j-r_{Ca}}{1-r_{Ca}} \right) \right], \label{eq:Ca(Delta t, x, epsilon| r_{Ca}, r_j)} \end{align} \en{ \noindent where $x = \delta_N$, $r_{Ca}$, and $r_j$ are defined in Eq. (\ref{eq:r_{Ca} r_{j}}). By substituting Eq. (\ref{eq:Ca(Delta t, x, epsilon| r_{Ca}, r_j)}) into the expression for $\Omega(Ca)$ in Eq. (\ref{eq:Omega(ca)}) and calculating the statistical average with respect to $x$ and $\epsilon$, we obtain an approximate analytical solution for the synaptic weight as a function of the average input frequency. } \en{ In the case of the constant-ISI input, the time interval of the spike sequence obeys the probability density function $\rho (x) = \delta(1-x)$. Moreover, the time interval from the last spike to the sampling time obeys a uniform distribution. Thus, we obtain the statistical average of the synaptic weight as a function of input frequency $f$ as follows: } \begin{align} \left<W_{c}(f) \right> = \int_{0}^{\infty} dx \int_{0}^{1} d\epsilon \ \delta(1-x) \Omega(Ca(1/f, x, \epsilon| r_{Ca;c}, r_{j;c})). \label{eq:<W_{c}(f)>} \end{align} \en{ In the cases of the Poisson input and gamma process input, the spike interval as well as the time interval between the last spike and the observation time obey exponential and gamma distributions, respectively. Thus, the statistical average of the synaptic weight as a function of input frequency $f$ in these inputs are calculated as follows: } \begin{align} \left<W_{poi}(f) \right> = \int_{0}^{\infty} dx \int_{0}^{\infty} d\epsilon \ e^{-(x + \epsilon)} \Omega(Ca(1/f, x, \epsilon| r_{Ca;poi}, r_{j;poi})), \label{eq:<W_{poi}(f)>} \end{align} \begin{align} \left<W_{\Gamma}(f) \right> = \frac{1}{\Gamma(\alpha)^2} \int_{0}^{\infty} dx \int_{0}^{\infty} d\epsilon \ (x \epsilon)^{\alpha-1} e^{-(x+\epsilon)} \Omega(Ca(1/{\alpha f}, x, \epsilon| r_{Ca;\Gamma}, r_{j;\Gamma})). \label{eq:<W_{Gamma}(f)>} \end{align} \noindent \newline \newpage \bibliographystyle{Science}
\section{Introduction} University courses have traditionally been assessed by written examinations: pen and paper at the ready, separated desks, a clock counting down, and invigilators pacing the room~\cite{Sheard-et_al13a}. This format has survived the test of time because it is simple for instructors to administer, has well-established logistics, and perhaps most importantly, is run in a highly controlled environment, minimising the risk and temptation of cheating and plagiarism. In a modern computer science curriculum, however, this style of assessment is completely misaligned with pedagogies and learning objectives that target \emph{practical programming ability}. In an introductory programming course, for example, students learn by interacting with a language's compiler or interpreter: trial and error, testing, debugging, and even looking things up in documentation are all part of the programming experience, regardless of ability. Yet a traditional written exam for such a course is limited to testing the concepts, or the ability to `code' on pen and paper, forcing instructors to simplify the questions and forcing students to train for the exam. While adding a project component to the course can alleviate this problem, retaining some kind of final exam remains a popular option for assessing individual learning outcomes of students. Ideally, the exam of a programming course should recreate the environment that students learnt and practiced in, e.g.~by providing access to their Integrated Development Environment~(IDE) of choice. One way to achieve this is to run the exam in a dedicated computer laboratory in which user accounts have reduced privileges and are unable to connect to the internet. This solution has been demonstrated as effective (e.g.~\cite{English02a,Daly-Waldron04a}), and Zilles et al.~\cite{Zilles-et_al18a} have shown that it is possible to run lab-based testing centres at a reasonable cost. Many institutions, however, lack the resources or space to be able to implement such facilities at the scale required. An alternative option is to run a \emph{bring-your-own-device~(BYOD)} exam in which students use their own laptops to complete the programming questions (e.g.~\cite{Hillier-Fluck17a,Stephenson18a}). This format allows for students to complete the exam using IDEs and tools they are familiar with. However, without the right technology and policies in place, it is difficult for invigilators to prevent plagiarism and cheating~\cite{Sindre-Vegendla15a}. In this article, we describe a BYOD exam solution based on \emph{lockdown browsers}, software which temporarily turns students' laptops into secure workstations with limited access to applications, system functions, or the internet. Our solution combines this technology with a Learning Management System~(LMS) and web-based IDE to facilitate conceptual and practical programming questions in an interactive but controlled environment. We describe how we implemented it for a major first-year undergraduate programming course (approx.~500 students), and reflect on the experiences and comments of both the instructors and students. Overall, we found our BYOD solution to be a reasonable compromise between our goal of aligning programming assessments with course pedagogies and our goal of ensuring the security and integrity of the exam. Furthermore, while technology is clearly key to our solution, we learnt that policies and support mechanisms are equally important considerations to ensure the success of BYOD programming exams. This paper is a revised and extended version of a short article featured in the pedagogy newsletter of the authors' institution~\cite{Kurniawan-Lee-Poskitt19a}. \section{Related Work}\label{sec:related_work} In general, instructors are aware of the need to align their assessments, learning objectives, and pedagogies~\cite{Biggs96a}. Many studies report that practical exams for programming help to achieve this and a number of other benefits. First, they allow students to demonstrate their programming skills in a setting that is close to how they typically code day-to-day~\cite{Carrasquel85a, Bennedsen-Caspersen07a}. Second, the grading of student answers can often be carried out by automated assessment tools, enabling feedback to be provided in a shorter time compared to manual marking~\cite{Daly-Waldron04a,Stephenson18a}. Third, students are reported to be positive about having access to a compiler, as it enables their code to be tested and syntax errors to be caught~\cite{Stephenson18a,Zilles-et_al15a}. Finally, having practical exams allows data on students' answers to be collected for further analysis of errors that students make~\cite{English02a}. Several studies have described the implementation of practical end-of-course exams for programming, including two that did so using computer laboratories in a single sitting. Stephenson~\cite{Stephenson18a} describes how a programming exam was administered for 109 students, each of whom were allowed full internet access, but with communication between them deterred by having the invigilators provide close supervision. Students were given the option of using their own laptop or the lab computers, with most students opting for the latter. Exam answers that did not pass all the test cases in the autograder were manually graded. Daly and Waldron~\cite{Daly-Waldron04a} reported a programming exam administered to almost 400 students simultaneously using a dedicated computer laboratory. Automated grading was also used. In their implementation, special student accounts that blocked internet access and had reduced privileges were used to prevent plagiarism (an approach also taken by English~\cite{English02a}). Students were, however, allowed to bring along a pre-prepared `cheat sheet' to the laboratory. Another approach described by some studies is to conduct such programming exams during regular timetabled lab sessions, thus requiring multiple sittings. Califf and Goodwin~\cite{Califf02a} conducted their final exam in 14 sittings over four days, requiring several versions of the exam question to be written. Instead of a final exam, other studies describe assessing students using regular lab exams scheduled over the duration of the course~\cite{Jacobson00a, Barros03a}. There can be many variations in the conduct of laboratory-based programming exams. Cutts et al.~\cite{Cutts-et_al06a}, for example, describe how such exams were run in seven different UK universities. Dedicated computer laboratories require significant investment, and are not practical for exams with large numbers of students. Running exams on students' own laptops, commonly termed as `bring-your-own-device electronic exams' or `BYOD (e-)exams', is another solution. Hillier and Fluck~\cite{Hillier-Fluck17a} describe how a secure and standard operating system environment can be provided by giving each student a Linux USB stick to boot up their computer. Ribeiro and Amaral~\cite{Ribeiro-Amaral18a} required students to install the open source Safe Exam Browser~\cite{SafeExamBrowser} software to restrict network access in their multiple-choice exam. Seow and Soong~\cite{Seow-Soong14a} also administered a multiple-choice BYOD exam, but over two sittings for more than 600 students, and with a prior mock test in which students were able to download the lockdown browser and familiarise themselves with the procedures. Note that neither of these exam formats involved practical programming. ExamSoft~\cite{ExamSoft} and Respondus LockDown Browser~\cite{Respondus} are alternative and commercially available lockdown browsers. Dawson~\cite{Dawson16a} points out some ways to hack such systems and suggests some mitigation strategies, some of which include not distributing exam papers on USB devices, making examinations open book, and making past-year exam papers available to students. Rajala et al.~\cite{Rajala-et_al16a} developed an in-house examination platform and used it to conduct practical programming exams in Java, with around 100 students at each sitting. On top of a feature to compile and run Java code, the platform also allowed other types of questions to be asked in an exam, such as multiple-choice ones or Parson's Puzzles~\cite{Parsons-Haden06a}. Internet access was restricted via a firewall. It was reported that the exam was ``done supervised in a lecture hall or computer lab'', thus it is unclear whether exams were conducted solely on a BYOD basis or whether lab computers were used too. \section{Context}\label{sec:context} The motivation for designing a BYOD solution came directly from ``Digital World''~\cite{DigitalWorld}, our institution's course on computational thinking and programming using Python. In the following, we present an overview of the course, how the students are assessed, and the limitations of its previous exam formats that we set out to overcome. Digital World is a compulsory introductory programming course taken by \emph{every} first-year undergraduate at the Singapore University of Technology and Design, regardless of the subject they later choose to major in. The course uses elements of the flipped classroom paradigm, requiring students to complete a set of short readings and a corresponding quiz on our LMS before the first class of each week. During class hours, students are given a weekly problem set, containing programming problems that instructors may use as the basis of their lessons, and homework problems that are left to the students to tackle on their own or with their peers. Solutions to these problems are submitted to Vocareum~\cite{Vocareum}, which automatically grades students' solutions according to a variety of test cases. As well as a submission platform, Vocareum is a web-based IDE that students can use to write, run, and debug Python programs. During the term, students are assessed at multiple junctures via quizzes, homework, and group projects. Nonetheless, a significant portion (50\%) of their final grade is derived from their performance in a mid-term and final exam. Both of these exams are split into two parts: Part~A consists of short, traditional questions that aim to test their understanding of programming \emph{concepts}, whereas Part~B uses practical programming exercises to test whether students can put those concepts into \emph{practice}. Given the large number of students (approx.~500) and limited lab space at our institution, our online exams required a BYOD solution from the outset, which has evolved significantly over the many iterations of the course. In the mid-term exam of the very first run of the course, students were allowed completely unrestricted use of the internet---similar to Stephenson~\cite{Stephenson18a}. This simplified the setup of the exam, with students able to use their own devices and programming environments without any additional steps. However, despite the presence of invigilators, this unrestricted format unfortunately facilitated some cheating, with some students using file sharing platforms to send solutions to each other. This was detected after the exam when a plagiarism detector was run on the submission platform. In subsequent exams, it was decided that internet access would be restricted to websites on a whitelist, such as the submission platform itself. Unfortunately, this still presented two major problems. First, for technical reasons, students who were already connected to the router \emph{before} whitelisting was applied would still retain unrestricted access afterwards. Students were required by policy to reset their connections or laptops prior to exams, but there was no straightforward way of checking whether students actually complied with this. Second, it was still possible for students to circumvent our restrictions by connecting to mobile hotspots with hidden SSIDs. This was very difficult for invigilators to check in an exam setting without being highly intrusive. A better BYOD format was required that balanced the benefits with the need for security. \section{Solution}\label{sec:solution} \begin{figure}[!t] \centering \includegraphics[width=0.75\linewidth]{aspects_final.pdf} \caption{Components of a secure BYOD programming exam} \label{fig:aspects} \end{figure} In designing a secure BYOD programming exam solution, we identified three interdependent components (Figure~\ref{fig:aspects}) that needed to be addressed. What \emph{technology} do we need to secure our students' devices? What \emph{policies} are needed to safeguard exams? And finally, how will we support the \emph{people} running the exams? In the 2019 iteration of Digital World, we designed and implemented a comprehensive BYOD solution that addressed all three components. In terms of technology, we introduced the use of a lockdown browser to secure students' laptops while providing controlled access to our LMS, Vocareum, and some additional web-based IDEs. Complementing this technology, we developed policies to ensure a consistent standard of invigilation across examination rooms, and systematic procedures to be followed for different kinds of system failures. Finally, we designed briefing sessions for our invigilators, and benefited from the real-time technical support of both an in-house team (for the lockdown browser and LMS) and remote engineers (for Vocareum). \hspace{1cm} \noindent\textbf{Technology.} Our technological solution makes use of Safe Exam Browser~(SEB)~\cite{SafeExamBrowser}, a lockdown browser that temporarily turns students' laptops into secure workstations, limiting their access to unauthorised websites, applications, or system functions. For our exams, we configure SEB to block access to all sites other than those on a whitelist, which consists only of our LMS, Vocareum, and some additional web-based IDEs provided as backup options for students to program in. In our LMS (Blackboard Learn), students answer conceptual questions (Part A), typically structured in formats supporting automated grading, e.g.~multiple choice, multiple answers, matching, ordering, fill in the blank, true/false. Testing specific programming concepts (and not just problem solving) is an approach recommended by Zingaro et al.~\cite{Zingaro-et_al12a}. With Vocareum~\cite{Vocareum}, students interactively develop, test, and submit solutions to practical programming exercises (Part B) in a controlled environment. The platform is familiar to students as it is also used for submitting solutions to problem sheets from our weekly classes. Furthermore, as for these classes, we configure the Vocareum workspace with several executable test cases for each question so that students can quickly check the progress of their solutions. SEB is the key technological element that allows our LMS and Vocareum to be used safely. Apart from blocking software on students' laptops and non-whitelisted websites, as an added safeguard, SEB provides a `browser exam key' feature that can be used to ensure that submission platforms will only work when accessed \emph{within} SEB. For each exam, a unique (secret) hash key can be generated and provided to external platforms so that they can verify that students are indeed using the lockdown browser. While Vocareum implemented this feature for us, Blackboard Learn does not yet support it (although it does so for the Respondus LockDown Browser~\cite{Respondus}). This meant that we had to develop additional policies (which we discuss later) in order to ensure that the LMS part of the exam is not accessible outside of the exam venue. \begin{figure}[!t] \centering \includegraphics[width=\linewidth]{technology_overview.pdf} \caption{Overview of the technology in our BYOD exam} \label{fig:schematics} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=0.9\linewidth]{edim_setup.png} \caption{Contents of the Exam Folder in our LMS} \label{fig:lms} \end{figure} Figure \ref{fig:schematics} provides an overview of how students interact with these technologies during an exam. First, students launch SEB by opening a `config file' specific to the exam that is provided by an instructor. This is configured to launch the homepage of our LMS. After logging in, students can access an Exam Folder (Figure~\ref{fig:lms}) from about 15 minutes before the exam up until about 15 minutes after the end. Once the exam starts, they can click an internal link to launch Part A, consisting of conceptual questions in Blackboard's native `Test'. They can also click an external link to launch the Vocareum platform for attempting and submitting Part B on practical programming. Students can switch between these two parts at their convenience, or even return to the Exam Folder to access additional documentation and links to alternative web-based IDEs. In the Vocareum IDE (Figure~\ref{fig:vocareum}), we provide students with some `starter code' (i.e.~a template). Students can test their code by clicking the \textsc{Run} button, which executes all of the built-in test cases provided by the instructors, displaying their output in the terminal. Vocareum also provides a \textsc{Build} button, but since Python does not require compilation, we re-purpose the button to simply run the code without built-in test cases, i.e.~allowing students to write their own tests without the instructors' tests cluttering up the terminal (students can also write tests directly in the terminal). We inform students beforehand on the use of this button and put instructive comments into the starter code (Figure~\ref{fig:vocareum}). Once satisfied, students submit their solutions using the \textsc{Submit} button. In our exams, we configure Vocareum to allow an unlimited number of submissions, and grade only the latest submission that is received. To encourage timely submissions, strict penalties are imposed for students who submit after the exam: 50\% if within 5 minutes, and 100\% thereafter. After the exam, grading is conducted within the LMS and Vocareum, with the latter allowing instructors to run the students' submissions and quickly assess their correctness. Parts of the grading can be automated (e.g.~based on test cases), but all submissions are manually checked before the final grade is confirmed. We also still run a plagiarism detection tool in Vocareum to mitigate the risk of any potential flaws in the invigilation of the exam or SEB~\cite{Sogaard16a}. \begin{figure}[!t] \centering \includegraphics[width=1\linewidth]{vocareum_ide_cropped.pdf} \caption{Vocareum web-based IDE and submission platform} \label{fig:vocareum} \end{figure} \hspace{1cm} \noindent\textbf{Policies.} To mitigate the main technological limitation---that Blackboard Learn does not yet support SEB's browser keys---as well as other cheating possibilities, we devised and put in place the following policies as safeguards. First, students are told to arrive at the exam venue early and launch the SEB config file. At this stage, students must wait to enter a \emph{settings password} to activate it, which is provided only 15 minutes before the start of the exam. The questions on our LMS and Vocareum are protected by a separate \emph{test password}, which is provided to students only after the invigilators have verified that all students have launched SEB. The test password is changed 15 minutes after the exam begins and is then known only to the invigilators, preventing students who leave the exam venue (e.g.~for the bathroom) from sharing it with other people, and thus preventing the exam from being accessed remotely. \begin{figure*}[!t] \centering \includegraphics[width=0.9\linewidth]{exam-timeline-new2.pdf} \caption{Timeline (not proportional) of the key events in our BYOD programming exams} \label{fig:exam-timeline} \end{figure*} \begin{table*}[t] \caption{Examples of policy documents for invigilators to follow} \label{tbl:policy} \small\begin{tabular}{l|l|l|l} \textbf{Policy Name} & \textbf{Severity} & \textbf{Systems Affected} & \textbf{Policy Contains} \\ \hline Normal sequence of invigilation & --- & --- & venue, timing, contact person, what to do at what time (Fig.~\ref{fig:exam-timeline}) \\ Student forgets their LMS password & Low & LMS & steps to recover password, rules on time extension \\ Student forgets their Vocareum password & Low & Vocareum & steps to recover password, rules on time extension \\ Students cannot run SEB & Medium & SEB, LMS, Vocareum & steps for backup laptop or alternative exam mode (paper) \\ Vocareum is very slow & High & Vocareum & steps to use alternative online IDE, submission using LMS \\ LMS is not accessible & High & LMS, Vocareum & steps for alternative exam mode (paper), contact tech support \\ Total network breakdown & High & LMS, Vocareum & steps to exit SEB and use alternative exam mode (paper) \end{tabular} \end{table*} To help eliminate the possibility that students access Blackboard Learn questions outside of SEB, we make use of the browser's \emph{exit password} feature. The exit password is required to close SEB, and is communicated only after the invigilators have verified that all solutions have been submitted. Note that in situations where a laptop is forced to restart, SEB will automatically restart too. Even if it fails to do so, students would still need the (changed) test password to access the LMS and Vocareum, thus alerting invigilators to the case. Figure~\ref{fig:exam-timeline} summarises the overall process of running the exam. Given the different possible points of failure (SEB, LMS, Vocareum, WiFi, students' laptops), we systematically designed procedures for handling all combinations of failures. These involve backup submission platforms, backup IDEs, backup laptops, and in the case of total network failure, manual submission of answers on paper and USB sticks. Some examples of these different cases are summarised in Table \ref{tbl:policy}. \hspace{1cm} \noindent\textbf{People.} Finally, it is critical to consider the people involved in running our BYOD solution, especially when exams are run simultaneously across multiple classrooms (as in Digital World). To ensure a consistent experience, invigilators are briefed together in a training session, with special attention given to procedures such as those in Table~\ref{tbl:policy}. Furthermore, our institution's Educational Technology team strongly supports us by conducting mock exams, testing the software, developing/updating policies, and by providing technical assistance to invigilators and students during exams. Finally, we are also fortunate that Vocareum is willing to provide real-time support during our exams to ensure that technical issues related to their platform can be solved immediately. \section{Reflections}\label{sec:reflections} In this section, we reflect on how effective our BYOD format was for the 2019 iteration of Digital World. We report on its advantages and disadvantages from three different perspectives. First, our own, as co-designers of the BYOD exam solution; second, those of our co-instructors who helped to run the exams; and third, those of our students, who were ultimately the ones subjected to it. Finally, we present our overall judgement as to whether the solution achieved our goals, and whether its benefits outweighed its drawbacks. \hspace{1cm} \noindent\textbf{Our Reflections.} Our first use of the BYOD solution was in a one-hour quiz taken by the entire cohort of students a few weeks before the mid-term. Despite conducting a mock test one week before this quiz, we ran into some difficulties that led to several improvements for subsequent exams. First, with several hundred students using the platform at the same time, Vocareum was not able to cope with the computational load, leading to several students being unable to submit or test their answers. We worked with Vocareum to address the root cause of the issue, and took steps to reassure students of this. We also devised new policies to mitigate any future technical issues with Vocareum, in particular, using Blackboard's native `Assignment' and `Journal' features as a backup means of submission. There were a small number of students who were not able to launch SEB at all during the quiz. They were provided with backup laptops during the test, and our Educational Technology department investigated afterwards. The most frequent reason for the problem was that the wrong version of SEB had been installed. We found that, despite organising a mock test, several students still struggled with SEB in the first quiz. To resolve this, we started providing `dummy' SEB config files before the subsequent exams, which students could use to test the interface and practice programming within its restrictions. We observed that this improvement increased the students' confidence and familiarity with the exam environment. Related to this issue, the University of Tasmania (UTAS) reports that for their Linux USB BYOD exams, students are required to test the exam environment beforehand at an organised workshop or on their own~\cite{UTAS}. To take part in the exam, students must prove that they completed the testing by producing a certificate that is issued upon its completion. In future iterations of our course, we will consider whether or not to introduce a similar policy to minimise disruption caused by unfamiliarity. In subsequent exams and quizzes, our BYOD solution appeared to work smoothly, aside from a few isolated cases which were managed by invigilators and Educational Technology staff according to our policies (an example of how the components of Figure~\ref{fig:aspects} are interdependent). One additional issue that arose, however, was related to the security of websites and tools launched by SEB. While SEB provided secure access to Vocareum, it did not prevent Vocareum from circumventing the restrictions. We discovered, for example, that it was possible for students to use the Vocareum terminal (see the bottom of Figure~\ref{fig:vocareum}) to make external connections. Fortunately, Vocareum responded quickly by providing an option to run our assessments on an `Exam Server' that did not allow any internet access. Our lesson here is to always challenge our assumptions about the external tools enabled for use within SEB, and to work with vendors to make sure that they are properly secured. An alternative solution would have been to provide offline IDEs via SEB and a virtual desktop infrastructure (as in some lab-based ETH~Z\"{u}rich exams~\cite{Halbherr-et_al14a,Luethi-et_al19a}), where we would have full control, but also the time-consuming task of ensuring that the virtual machines are properly secured. Hillier and Fluck \cite{Hillier-Fluck13a} mentioned clear user guides as a key requirement for BYOD exam formats. For their USB BYOD exam, the guides written for the various stakeholders are provided online \cite{TransformingExams}. In our course, we prepared slides to be shown during the exam containing the steps and passwords. Moreover, after our first quiz, we also communicated to students our procedures and written policies in case of failure. We believe that together, these documents provided to students meet the requirement of clear user guides. In future iterations of our course, our documentation will continue to be revised for better clarity, and we will aim to communicate our procedures to students more clearly in advance of the exams. \noindent\textbf{Instructor Reflections.} We elicited a mix of positive and negative views from the instructor team, including a more critical viewpoint (paraphrased): \emph{``Just to handle some dishonest students, we are inconveniencing the majority of honest students in their exam, and I think this is no good. Why do we have to give pain to the majority of honest students just for some dishonest ones?''} While agreeing that it was good for students to be able to complete their programming exams on their own devices, this faculty member felt that our BYOD format involved too much inconvenience, and prevented students from using their day-to-day offline IDEs (e.g.~Spyder). The majority of other instructors, however, felt that it was important to implement measures to prevent cheating, in order to reassure the honest students that the exam was being conducted fairly. It was also argued that eliminating the possibility to cheat helps remove the temptation to do it in the first place, especially for students who are struggling under heavy workloads. Still, the discussion led us to reflect that we should always seek to minimise the disruption to students in setting up these safeguards. Allowing students to practice with SEB before the exam is one such way for us to achieve this. A feature of the exam format that instructors particular liked (over, e.g.~pen and paper exams) was the fact that Vocareum allowed them to complete grading faster by having the code ready to run, along with the results of some built-in test cases to indicate the likely quality of code. Note, however, that instructors manually inspected all submissions, to ensure that students did not simply hardcode return values for the given test cases. (Some always try!) \hspace{1cm} \noindent\textbf{Student Reflections.} To gain some viewpoints of the students, we conducted an informal online survey with 13 of them who were reachable over the summer vacation. Using open-ended questions, the students were asked about the positive and negative aspects of the exams, whether they preferred a BYOD or pen and paper format, and if they had any suggestions for improvement. In terms of the positive aspects, there was a very clear message from the survey responses: \begin{center} \noindent\fbox{% \parbox{0.76\linewidth}{% \small\emph{The students were positive about being able to use their own laptops, as they were familiar and comfortable with them.} } } \end{center} \noindent Some also mentioned that they can type faster on their own laptops, and need not worry about getting used to the idiosyncrasies of other computers. All of them preferred BYOD exams, because it is possible for them to test and debug their code in the same way as practiced during regular lessons. A few responses highlighted that debugging is an important skill and that paper exams would not allow such a skill to be tested. Several remarks also mentioned that BYOD exams were more realistic, with one student writing: \emph{``nobody outside actually programs on pen and paper''}. Some negative responses tended to focus on Vocareum, with some students remarking on its slow performance during the first quiz. Fortunately, we did not see any major complaints about the other assessments, as Vocareum were able to rectify the issue for subsequent exams. Moreover, Vocareum is simply an external component of our BYOD exam and any issues can be addressed independently: they are not related to the use of lockdown browsers. Two remarks addressed the user experience of SEB, mentioning that it is difficult to switch between tabs. This affirms that it is necessary to allow students time to familiarise themselves with SEB on their own. A minority of remarks cited the preparation steps, such as installing the lockdown browser and downloading new config files for every exam, as a negative. Surprisingly, none of the students in the survey complained about the exam procedures themselves (such as the use of several passwords), and no suggestions for improvement were made about them. Some instructors were worried that the procedures and policies might create a negative experience during the exam. A particular concern was the incompatibility of lockdown browsers with password managers, which are often used by our students. This incompatibility meant students had to memorise or write down their personal LMS and Vocareum credentials (often long and random) for use in the exam. This problem is made worse by an IT policy at our institution that locks students' university accounts after three failed login attempts---a possible source of anxiety for examinees. However, from the students that were surveyed, none of them mentioned this issue at all. It is possible that it was minimised by our frequent reminders to memorise or write down their passwords, and also by the provided `dummy' SEB config files (in which they would have seen the issue first-hand). Furthermore, by requiring students to come 30 minutes early, our trained invigilators were able to solve isolated cases before the exam started. \hspace{1cm} \noindent\textbf{Overall Judgement.} Taking all viewpoints into account, we felt that the effort required to design and implement this BYOD solution was worth the results it provided us with. First, as instructors it provides us with confidence in the integrity of all submissions received. Second, for students, it gives them the convenience of using their own devices and familiar programming environments (all while remaining controlled). Finally, the convenience of being able to use technology in the grading process (fully automated in the LMS; partially automated in Vocareum) allows for instructors to optimise their time and for students to receive feedback faster. \section{Conclusion}\label{sec:conclusion} In this article, we have described a BYOD exam solution for conceptual and practical programming questions, combining technologies such as lockdown browsers, LMSs, and web-based IDEs. We reflected on our implementation of this format in a major undergraduate programming course, finding that students were positive about being able to use their own devices, and were accepting of the exam procedures necessary to facilitate this. We learnt that technology is just one of the key components necessary for a secure BYOD programming exam, and that developing proper policies, safeguards, and training is equally important. With all these considerations in place, our experience has shown us that (despite some initial difficulties) our BYOD exam format is a viable compromise solution that balances our aim for pedagogically-aligned assessments with the need to prevent cheating and plagiarism. \begin{acks} First, we would like to thank the Educational Technology team at SUTD (especially Magnus Bengtsson and Kristy Chan Hui Ling) for their consistent and strong support in helping to develop this BYOD solution. Second, we would like to thank the instructors and students of Digital World for their patience, support, and feedback as we implemented these changes to the exams. We would especially like to thank those students who responded to our informal survey during their break. Finally, we would like to express our gratitude to the anonymous SIGCSE referees for their helpful suggestions. \end{acks} \bibliographystyle{ACM-Reference-Format} \balance
\section{Introduction} Throughout this article $X$ denotes a complex Banach space and $BL(X)$ is the Banach algebra of all bounded linear operators on $X$. Define $\mathcal{I}:= \{zI: z\in \mathbb{C}\}$, where $I$ is the identity operator in $BL(X)$. \begin{definition} Let $A\in BL(X)$. The spectrum of $A$ is denoted by $\sigma(A)$ and is defined as \[ \sigma(A):= \{z\in \mathbb{C}: A-zI \ \ \mbox{is not invertible}\}. \] \end{definition} The spectrum of an operator in $BL(X)$ is generalized in many ways for various applications. The pseudospectrum and the condition pseudospectrum are two important generalizations of the spectrum of an operator. \begin{definition} Let $A\in BL(X)$ and $\epsilon> 0$. The $\epsilon$-pseudospectrum of $A$ is denoted by $\Lambda_{\epsilon}(A)$ and is defined as \[ \Lambda_{\epsilon}(A):= \sigma(A)\cup \left\{z\in \mathbb{C}: \|(A-zI)^{-1}\|\geq \epsilon^{-1}\right\}. \] \end{definition} Hence $\sigma(A)\subseteq \Lambda_\epsilon(A)$ for each $\epsilon> 0$ and $\displaystyle \bigcap_{\epsilon>0}\Lambda_\epsilon(A)= \sigma(A)$. For more properties and various applications of the pseudospectrum one may refer to \cite{tre}. \begin{definition} Let $A\in BL(X)$ and $0<\epsilon<1$. The $\epsilon$-condition pseudospectrum of $A$ is denoted by $\sigma_{\epsilon}(A)$ and is defined as \[ \sigma_{\epsilon}(A):= \sigma(A)\cup \left\{z\in \mathbb{C}: \|A-zI\|\|(A-zI)^{-1}\|\geq \epsilon^{-1}\right\}. \] \end{definition} Hence $\sigma(A)\subseteq \sigma_\epsilon(A)$ for each $0<\epsilon< 1$, $\displaystyle \bigcap_{0<\epsilon<1}\sigma_\epsilon(A)= \sigma(A)$ and $\sigma_1(A)= \mathbb{C}$. The condition pseudospectrum was introduced in \cite{kul} and in the same article it is called condition spectrum. Compare to several other generalizations of the spectrum, the condition pseudospectrum is proved to be algebraically close to the spectrum. Hence the condition pseudospectrum is useful to study the perturbation analysis of operators of $BL(X)$. For more properties of the condition pseudospectrum one may refer to \cite{amm, kri, kri1, lui, kul, suk}. Let $A\in BL(X)$. Consider the linear operator equation $Ax-zx= y$ where $x,y\in X$ and $z\in \mathbb{C}$. The purpose of the article is to characterize the perturbation of the solution $x$ corresponding to the following perturbations from the pseudospectrum and the condition pseudospectrum of $A$. \begin{enumerate} \item the perturbation of $y$ \item the perturbation of $A$ \item the perturbation of both $A$ and $y$ \end{enumerate} The following is an outline of the article. In section 2, we consider certain linear operator equations $Ax-zx= y$ to illustrate that the perturbation of the solution $x$ corresponding to the perturbation of $y$, perturbation of $A$ and perturbation of both $A, y$ depends on the pseudospectrum and the condition pseudospectrum of the operator $A$. In section 3, an upper bound and lower bound is found for the relative perturbation of the solution $x$ corresponding to the relative perturbation of $y$ from the condition pseudospectrum of $A$ (Theorem \ref{perturbation1}). An upper bound is found for the relative perturbation of the solution $x$ corresponding to the relative perturbation of the operator $A$ from the pseudospectrum of $A$ (Theorem \ref{perturbation2}) and the condition pseudospectrum of $A$ (Theorem \ref{perturbation3}). An upper bound is found for the relative perturbation of the solution $x$ corresponding to the relative perturbation of both $A$ and $y$ from the condition pseudospectrum of $A$ ( Theorem \ref{perturbation4}). Certain examples are also given to illustrate the results. In section 4, a relation connecting the pseudospectrum and the condition pseudospectrum of an operator in $BL(X)$ is given as set inclusions. The distance to instability of an operator in $BL(X)$ is also characterized from the condition pseudospectrum of the operator. In section 5, the distance to singularity of an invertible operator in $BL(X)$ is characterized from the condition pseudospectrum of the operator. \section{Preliminaries} Let $A\in BL(X)$. Consider the the linear operator equation \[ Ax-zx= y \] where $x, y \in X$ and $z\in \mathbb{C}$. The following example finds the perturbation of the solution $x$ corresponding to various perturbations of $y$. We claim that the perturbation of the solution depends on the quantity $\|A-zI\|\|(A-zI)^{-1}\|$ and hence the perturbation of the solution may characterized from the condition pseudospectrum of the operator $A$. \begin{example} Consider the linear systems defined by \[ Ax_1-x_1= y \ \ \textnormal{and} \ \ Bx_2-x_2= y \] where $A= \begin{bmatrix} 1.1&0\\0&2 \end{bmatrix} $, $B= \begin{bmatrix} 1.1&10\\ 0&2 \end{bmatrix} $ and $y= \begin{bmatrix} 1\\1 \end{bmatrix} $. Let $\delta y$ be a small perturbation on $y$ and $\delta x_1, \delta x_2$ be the corresponding perturbations of the solution $x_1, x_2$ respectively. Then \[ (A-I)(x_1+\delta x_1)= y+ \delta y \ \ \textnormal {and} \ \ (B-I)(x_2+ \delta x_2)= y+ \delta y. \] The following table gives the perturbations of the solutions for various values of $\delta y$. \begin{center} \begin{tabular}{|c|c|c|c|c|} \hline $\delta y$& $\delta x_1$& $\frac{\|\delta x_1\|}{\|x_1\|}$& $\delta x_2$&$\frac{\|\delta x_2\|}{\|x_2\|}$\\ \hline \hline $[0.01, 0.01]^T$&$[0.1,0.01]^T$&0.01&$[-0.9,0.01]^T$&0.01\\ \hline $[0.01, 0.02]^T$&$[0.1,0.02]^T$&0.0101474&$[-1.9,0.02]^T$&0.0211109\\ \hline $[0.02, 0.01]^T$&$[0.2,0.01]^T$&0.0199256&$[-0.8,0.01]^T$&0.008889\\ \hline $[0.02, 0.02]^T$&$[0.2,0.02]^T$&0.02&$[-1.8,0.02]^T$&0.02\\ \hline $[0.03, -0.03]^T$&$[0.3,-0.03]^T$&0.03&$[3.3,-0.03]^T$&0.0366659\\ \hline $[0.04, -0.04]^T$&$[0.4,-0.04]^T$&0.04&$[4.4,-0.04]^T$&0.0488879\\ \hline $[0.05, -0.05]^T$&$[0.5,-0.05]^T$&0.05&$[5.5,-0.05]^T$&0.0611098\\ \hline $[0.06, -0.06]^T$&$[0.6,-0.06]^T$&0.06&$[6.6,-0.06]^T$&0.0733318\\ \hline \end{tabular} \end{center} \end{example} \begin{center} \begin{figure}[h] \begin{tabular}{cc} \includegraphics[width=85mm]{Fig1.png}& \includegraphics[width=85mm]{Fig2.png}\\ \includegraphics[width=85mm]{Fig3.png}& \includegraphics[width=85mm]{Fig4.png} \end{tabular} \caption{} \end{figure} \end{center} In Figure 1, the $\epsilon$-condition pseudospectrum of $A$ and $B$ are found for $\epsilon= 0.1, 0.15, 0.2$ and $0.25$. For $z\in \mathbb{C}$ and $A\in BL(X)$ define \[ \kappa(z,A):= \sup\{0<\epsilon<1: z\notin \sigma_\epsilon(A)\}. \] Then $\kappa(z,B)\leq \kappa(z,A)$ for every $z\in \mathbb{C}$ and $\sigma_\epsilon(A)\subseteq \sigma_\epsilon(B)$ for each $0< \epsilon< 1$. The following example finds the perturbation of the solution $x$ corresponding to various perturbations of $A$. We claim that the perturbation of the solution depends on the quantity $\|(A-zI)^{-1}\|$ and hence the perturbation of the solution may characterized from the pseudospectrum of the operator $A$. \begin{example} Consider the linear systems defined by \[ Ax_1-2x_1= y \ \ \textnormal{and} \ \ Bx_2-2x_2= y \] where $A= \begin{bmatrix} 1&0&-1\\0&2.1&1\\0&0&3 \end{bmatrix} $, $B= \begin{bmatrix} 1&10&10\\ 0&2.1&10\\ 0&0&3 \end{bmatrix} $ and $y= \begin{bmatrix} 1\\1\\1 \end{bmatrix} $. Let $\Delta A, \Delta B$ be small perturbations on $A, B$ and $\delta x_1, \delta x_2$ be the corresponding perturbations of the solution $x_1, x_2$ respectively. Then \[ (A-2I+\Delta A)(x_1+\delta x_1)= y \ \ \textnormal{and} \ \ (B-2I+\Delta B)(x_2+ \delta x_2)= y. \] The following table gives the perturbation of the solution $x$ corresponding to various perturbations of $A$ and $B$. Choose $\Delta A= \Delta B= \begin{bmatrix} \epsilon_1&0&0\\ 0&\epsilon_2&0\\ 0&0&0 \end{bmatrix} $. \begin{center} \begin{tabular}{|c|c|c|c|c|} \hline $\Delta A= \Delta B$& $\delta x_1$& $\frac{\|\delta x_1\|}{\|x_1\|}$& $\delta x_2$&$\frac{\|\delta x_2\|}{\|x_2\|}$\\ \hline \hline $\epsilon_1= 0.01, \epsilon_2= 0.01$&$[-0.02020202,0,0]^T$&0.0090346&$[73.64463,8.18182,0]^T$&0.0827413 \\ \hline $\epsilon_1= 0.02, \epsilon_2= 0.02$&$[-0.04081633,0,0]^T$&0.0182536&$[134.87755,15,0]^T$&0.1515397\\ \hline $\epsilon_1= 0.03, \epsilon_2= 0.03$&$[-0.06185567,0,0]^T$&0.0276626&$[186.55908,20.76923,0]^T$&0.2096085\\ \hline $\epsilon_1= 0.04, \epsilon_2= 0.04$&$[-0.08333333,0,0]^T$&0.0372677&$[230.73214,25.71428,0]^T$&0.2592425\\ \hline $\epsilon_1= 0.05, \epsilon_2= 0.05$&$[-0.10526316,0,0]^T$&0.0470751&$[268.89473,30,0]^T$&0.302125\\ \hline $\epsilon_1= 0.06, \epsilon_2= 0.06$&$[-0.12765957,0,0]^T$&0.0570910&$[302.170212,33.75,0]^T$&0.339517\\ \hline $\epsilon_1= 0.07, \epsilon_2= 0.07$&$[-0.15053763,0,0]^T$&0.0673224&$[ 331.41745, 37.05882,0]^T$&0.3723843\\ \hline \end{tabular} \end{center} \end{example} \begin{center} \begin{figure}[h] \begin{tabular}{cc} \includegraphics[width=85mm]{figure1.png}& \includegraphics[width=85mm]{figure2.png}\\ \includegraphics[width=85mm]{figure3.png}& \includegraphics[width=85mm]{figure4.png} \end{tabular} \caption{} \end{figure} \end{center} In Figure 2, the $\epsilon$-pseudospectrum of $A$ and $B$ are found for $\epsilon= 0.2, 0.3, 0.4$ and $0.5$. For $z\in \mathbb{C}$ and $A\in BL(X)$ define \[ \kappa_1(z,A):= \sup\{\epsilon>0: z\notin \Lambda_\epsilon(A)\}. \] Then $\kappa_1(z,B)\leq \kappa_1(z,A)$ for every $z\in \mathbb{C}$ and $\Lambda_\epsilon(A)\subseteq \Lambda_\epsilon(B)$ for each $\epsilon>0$. The following example finds the perturbation of the solution $x$ corresponding to various perturbations of $A, y$. We claim that the perturbation of the solution depends on the quantity $\|A-zI\|\|(A-zI)^{-1}\|$ and hence the perturbation of the solution may characterized from the condition pseudospectrum of the operator $A$. \begin{example} Consider the linear systems defined by \[ Ax_1-3x_1= y \ \ \textnormal{and} \ \ Bx_2-3x_2= y \] where $A= \begin{bmatrix} 1&0&-1\\0&2&1\\0&0&3.1 \end{bmatrix} $, $B= \begin{bmatrix} 1&10&10\\ 0&2&10\\ 0&0&3.1 \end{bmatrix} $ and $y= \begin{bmatrix} 1\\1\\1 \end{bmatrix} $. Let $\Delta A, \Delta B$ be a small perturbations on $A, B$ respectively and $\delta y$ be a small perturbation on $y$. Further let $\delta x_1, \delta x_2$ be the corresponding perturbations of the solution $x_1, x_2$. Then \[ (A-3I+\Delta A)(x_1+\delta x_1)= y+ \delta y \ \ \textnormal{and} \ \ (B-3I+\Delta B)(x_2+ \delta x_2)= y+\delta y. \] The following table gives the perturbation of the solution $x$ corresponding to various perturbations of $A, B$ and $\delta y$. Choose $\Delta A= \Delta B= \begin{bmatrix} 0&0&0\\ 0&\epsilon_1&0\\ 0&0&\epsilon_2 \end{bmatrix} $. \begin{center} \begin{tabular}{|c|c|c|c|} \hline $\Delta A= \Delta B$&$\delta y$& $\delta x_1$& $\delta x_2$\\ \hline \hline $\epsilon_1= 0.01, \epsilon_2= 0.01$&$[0.01,0.01,0.01]^T$&$[0.404,-0.745,-0.818]^T$&$[-40.468,-7.274, -0.818]^T$ \\ \hline $\epsilon_1= 0.02, \epsilon_2= 0.02$&$[0.02,0.02,0.02]^T$&$[0.74,-1.367,-1.5]^T$&$[-74.040,-13.306,-1.5]^T$\\ \hline $\epsilon_1= 0.03, \epsilon_2= 0.03$&$[0.03,0.03,0.03]^T$&$[1.023,-1.893,-2.076]^T$&$[-102.302,-18.380,-2.076]^T$\\ \hline $\epsilon_1= 0.04, \epsilon_2= 0.04$&$[0.04,0.04,0.04]^T$&$[1.265,-2.345,-2.571]^T$&$[-126.389,-22.702,-2.571]^T$\\ \hline $\epsilon_1= 0.05, \epsilon_2= 0.05$&$[0.05,0.05,0.05]^T$&$[1.475,-2.736,-3]^T$&$[-147.130,-26.421,-3]^T$\\ \hline $\epsilon_1= 0.06, \epsilon_2= 0.06$&$[0.06,0.06,0.06]^T$&$[1.657,-3.079,-3.375]^T$&$[-165.149,-29.648,-3.375]^T$\\ \hline $\epsilon_1= 0.07, \epsilon_2= 0.07$&$[0.07,0.07,0.07]^T$&$[1.817,-3.382,-3.705]^T$&$[-180.923,-32.471,-3.705]^T$\\ \hline \end{tabular} \end{center} \end{example} \begin{center} \begin{figure}[h] \begin{tabular}{cc} \includegraphics[width=85mm]{Figure_1.png}& \includegraphics[width=85mm] {Figure_2.png}\\ \includegraphics[width=85mm]{Figure_3.png}& \includegraphics[width=85mm] {Figure_4.png} \end{tabular} \caption{} \end{figure} \end{center} In Figure 3, the $\epsilon$-condition pseudospectrum of $A$ and $B$ are found for $\epsilon= 0.1, 0.15, 0.2$ and $0.25$. Then $\kappa(z,B)\leq \kappa(z,A)$ for every $z\in \mathbb{C}$ and $\sigma_\epsilon(A)\subseteq \sigma_\epsilon(B)$ for each $0< \epsilon< 1$. \section{The stability of linear operator equations} \subsection{Perturbation of $y$} Let $A\in BL(X)$ and $Ax-zx= y$ where $x, y\in X$ and $z\in \mathbb{C}$. The following theorem finds an upper bound and lower bound for the relative perturbations of the solution $x$ from the condition pseudospectrum of $A$. \begin{theorem}\label{perturbation1} Let $A\in BL(X)$ and $Ax-zx= y$ where $x, y\in X$ and $z\notin \sigma(A)$. Further let $\delta x$ be the perturbation of the solution $x$ corresponding to a perturbation $\delta y$ of $y$. Then \[ \kappa(z,A) \, \frac{\|\delta y\|}{\|y\|}\leq \frac{\|\delta x\|}{\|x\|} \leq \frac{1}{\kappa(z,A)}\frac{\|\delta y\|}{\|y\|} \] where $\displaystyle \kappa(z,A):= \sup\{0<\epsilon<1: z\notin \sigma_\epsilon(A)\}.$ \end{theorem} \begin{proof} We have \[ (A-zI)(x+ \delta x)= y+ \delta y. \] Since $z\notin \sigma(A)$, \begin{eqnarray}\label{eqn1} \|x\|\leq \|(A-zI)^{-1}\| \|y\| \ \ \mbox{and} \ \ \|y\|\leq \|A-zI\|\|x\|. \end{eqnarray} Also \begin{eqnarray}\label{eqn2} \|\delta y\|\leq \|A-zI\| \|\delta x\| \ \ \mbox{and} \ \ \|\delta x\|\leq \|(A-zI)^{-1}\|\|\delta y\|. \end{eqnarray} From (\ref{eqn1}) and (\ref{eqn2}) it follows that \[ \frac{1}{\|(A-zI)\| \|(A-zI)^{-1}\|} \frac{\|\delta y\|}{\|y\|}\leq \frac{\|\delta x\|}{\|x\|} \leq \|A-zI\|\|(A-zI)^{-1}\|\frac{\|\delta y\|}{\|y\|}. \] If $z\notin \sigma_\epsilon(A)$ for some $0<\epsilon<1$, then \[ \epsilon \, \frac{\|\delta y\|}{\|y\|}< \frac{\|\delta x\|}{\|x\|}< \frac{1}{\epsilon}\frac{\|\delta y\|}{\|y\|}. \] Define $\displaystyle \kappa(z,A):= \sup\{0<\epsilon<1: z\notin \sigma_\epsilon(A)\}.$ Then \[ \kappa(z,A) \, \frac{\|\delta y\|}{\|y\|}\leq \frac{\|\delta x\|}{\|x\|} \leq \frac{1}{\kappa(z,A)}\frac{\|\delta y\|}{\|y\|}. \] \end{proof} \begin{example} Consider the operator equation $Ax-zx= y$ defined by \[ A= \begin{bmatrix} 0&1&&&\\ \frac{1}{4}&0&1&&\\ &\ddots&\ddots&\ddots&\\ &&\frac{1}{4}&0&1\\ &&&\frac{1}{4}&0\\ \end{bmatrix}_{10\times 10} \mbox{and} \ \ \ \ y= \begin{bmatrix}. 1\\1\\\vdots\\1\\1 \end{bmatrix}_{10\times 1}. \] The following table gives the relative perturbation of the solution $x$ for various values of $z$ and for $\delta y= \begin{bmatrix}0.1&0&0&0&0&0&0&0&0&0\end{bmatrix}^{T}$. The table also gives the upper bound and lower bound for the relative perturbation of the solution found from the condition pseudospectrum of $A$. \vspace{0.3 cm} \begin{center} \begin{tabular}{|c|c|c|c|c|} \hline$z$&$\frac{\|\delta x\|}{\|x\|}$&$\kappa(z,A)$&$\kappa(z,A) \frac{\|\delta y\|}{\|y\|}$&$\frac{1}{\kappa(z,A)}\frac{\|\delta y\|}{\|y\|}$\\ \hline \hline $2$&0.01451478&0.25562528&0.00808358&0.12370754\\ \hline $2+i$&0.01916041&0.34480349&0.01090364&0.09171245\\ \hline $3-i$&0.02157139&0.22394260&0.00708168&0.14120929\\ \hline $1-i$&0.02192375&0.22394260&0.00708168&0.14120929\\ \hline $2-i$&0.01916041&0.34480349&0.01090364&0.09171245\\ \hline $3+3i$&0.02634769&0.62518073&0.01976995&0.05058181\\ \hline $4i$&0.03238426&0.69642891&0.02202301&0.04540704\\ \hline \end{tabular} \end{center} \end{example} \subsection{Perturbation of $A$} Let $A\in BL(X)$ and $Ax-zx= y$ where $x, y\in X$ and $z\in \mathbb{C}$. The following theorem finds an upper bound for $\frac{\|\delta x\|}{\|x\|}, \frac{\|\delta x\|}{\|x+\delta x\|}$ from the pseudospectrum of $A+\Delta A$, $A$ respectively. \begin{theorem}\label{perturbation2} Let $A\in BL(X)$ and $Ax-zx= y$ where $x, y\in X$ and $z\notin \sigma(A)$. Further let $\delta x$ be the perturbation of the solution $x$ corresponding to the perturbation $\Delta A$ of $A$. Then \begin{enumerate} \item $\frac{\|\delta x\|}{\|x\|}\leq \frac{\|\Delta A\|}{\kappa_1(z,A+\Delta A)}$. \item $\frac{\|\delta x\|}{\|x+\delta x\|}\leq \frac{\|\Delta A\|}{\kappa_1(z,A)}$. \end{enumerate} where $\displaystyle \kappa_1(z,A):= \sup\{\epsilon>0: z\notin \Lambda_\epsilon(A)\}.$ \end{theorem} \begin{proof} \begin{enumerate} \item We have $(A-zI+ \Delta A)(x+ \delta x)= y.$ Then \[ (A-zI)\delta x+ \Delta A(x+ \delta x)= 0. \] If $z\notin \Lambda_\epsilon(A+\Delta A)$ for some $\epsilon>0$. Then $\|\delta x\|\leq \|(A+\Delta A-zI)^{-1}\|\|\Delta A\|\|x\|$ and $\frac{\|\delta x\|}{\|x\|}< \frac{\|\Delta A\|}{\epsilon}.$ Define $\displaystyle \kappa_1(z,A+\Delta A):= \sup\{\epsilon>0: z\notin \Lambda_\epsilon(A+\Delta A)\}.$ Then \[ \frac{\|\delta x\|}{\|x\|}\leq \frac{\|\Delta A\|}{\kappa_1(z,A+\Delta A)}. \] \item If $z\notin \Lambda_\epsilon(A)$ for some $\epsilon>0$. Then $\|\delta x\|\leq \|(A-zI)^{-1}\|\|\Delta A\|\|x+\delta x\|$ and $\frac{\|\delta x\|}{\|x+\delta x\|}< \frac{\|\Delta A\|}{\epsilon}.$ Define $\displaystyle \kappa_1(z,A):= \sup\{\epsilon>0: z\notin \Lambda_\epsilon(A)\}.$ Then \[ \frac{\|\delta x\|}{\|x+\delta x\|}\leq \frac{\|\Delta A\|}{\kappa_1(z,A)}. \] \end{enumerate} \end{proof} \begin{lemma}\label{lem4} Let $A\in BL(X)$. Then for every $z\in \mathbb{C}$ \[ \sup\{\|A-\lambda I\|: \lambda\in \sigma(A)\}\leq \|A-zI\|. \] \end{lemma} \begin{proof} If $\lambda\in \sigma(A)$ and $z\in \mathbb{C}$. Then $\lambda- z\in \sigma(A-zI)$ and $|\lambda- z|\leq \|A-zI\|$. Also \[ \|A-\lambda I\|= \|A-zI+zI-\lambda I\|\leq \|A-zI\|+ |\lambda-z|\leq 2\|A-zI\|. \] \end{proof} The following theorem finds an upper bound for $\frac{\|\delta x\|}{\|x\|}, \frac{\|\delta x\|}{\|x+\delta x\|}$ from the condition pseudospectrum of $A+\Delta A, A$ respectively. \begin{theorem}\label{perturbation3} Let $A\in BL(X)$ and $Ax-zx= y$ where $x, y\in X$ and $z\notin \sigma(A)$. Further let $\delta x$ be a perturbation of the solution $x$ corresponding to the perturbation $\Delta A$ of $A$. Define $\displaystyle \kappa(z,A):= \sup\{0<\epsilon<1: z\notin \sigma_\epsilon(A)\}.$ Then \begin{enumerate} \item $\frac{\|\delta x\|}{\|x\|}\leq \frac{2\|\Delta A\|}{M_1 \, \kappa(z,A+\Delta A)}$ where $M_1:= \sup\{\|A+\Delta A- \lambda I\|: \lambda\in \sigma(A+\Delta A)\}$. \item $\frac{\|\delta x\|}{\|x+\delta x\|}\leq \frac{2\|\Delta A\|}{M_2 \, \kappa(z,A)}$ where $M_2:= \sup\{\|A- \lambda I\|: \lambda\in \sigma(A)\}$. \end{enumerate} \end{theorem} \begin{proof} \begin{enumerate} \item We have $(A-zI+ \Delta A)(x+ \delta x)= y$ and \[ (A-zI)\delta x+ \Delta A(x+ \delta x)= 0. \] If $z\notin \sigma_\epsilon(A+\Delta A)$ for some $0<\epsilon<1$. Then \[\|\delta x\|\leq \frac{\|A+\Delta A-zI\|\|(A+\Delta A-zI)^{-1}\|\|\Delta A\|\|x\|}{\|A+\Delta A-zI\|}.\] From Lemma \ref{lem4}, \[ \frac{\|\delta x\|}{\|x\|}\leq \frac{2\|\Delta A\|}{M_1 \, \epsilon} \] where $M_1= \sup\{\|A+\Delta A- \lambda I\|: \lambda\in \sigma(A+\Delta A)\}$. Hence \[ \frac{\|\delta x\|}{\|x\|}\leq \frac{2\|\Delta A\|}{M_1 \, \kappa(z,A+\Delta A)} \] where $\kappa(z,A+\Delta A)$ is defined above. \item If $z\notin \sigma_\epsilon(A)$ for some $0<\epsilon<1$. Then \[ \|\delta x\|\leq \frac{\|A-zI\|\|(A-zI)^{-1}\|\|\Delta A\|\|x+\delta x\|}{\|A-zI\|}. \] From Lemma \ref{lem4}, \[ \frac{\|\delta x\|}{\|x+\delta x\|}\leq \frac{2\|\Delta A\|}{M_2 \ \epsilon} \] where $M_2= \max\{\|A- \lambda I\|: \lambda\in \sigma(A)\}$. Hence \[ \frac{\|\delta x\|}{\|x+\delta x\|}\leq \frac{2\|\Delta A\|}{M_2 \, \kappa(z,A)} \] where $\kappa(z,A)$ is defined above. \end{enumerate} \end{proof} \begin{example} Consider the operator equation $Ax-zx= y$ defined by $A= \begin{bmatrix}1&-6&7&-9\\1&-5&0&0\\0&1&-5&0\\0&0&1&-5\end{bmatrix}$ and $y= \begin{bmatrix}1&1&1&1\end{bmatrix}^T$. Let $\Delta A= \begin{bmatrix} -0.01&0&0&0\\0&-0.01&0&0\\0&0&0&0\\0&0&0&0\end{bmatrix}$ be a small perturbation on $A$. Then \[ \sigma(A)= \{0.00964896, -3.72221248, -5.14371824+1.17699479\, i, -5.14371824-1.17699479\; i \}, \] \[ \sigma(A+\Delta A)= \{-2.40617352\times e^{-5}, -3.726616, -5.14667997+1.17985088\, i, -5.14667997-1.17985088\, i\}. \] The following table gives the estimates of $\frac{\|\delta x\|}{\|x+\delta x\|}$ for various values of $z$. The table also gives the upper bound for $\frac{\|\delta x\|}{\|x+\delta x\|}$ found from the pseudospectrum and condition pseudospectrum of $A$. \begin{center} \begin{tabular}{|c|c|c|c|} \hline $z$&$\frac{\|\delta x\|}{\|x+\delta x\|}$&$ \frac{\|\Delta A\|}{\kappa_1(z,A)}$&$ \frac{2\|\Delta A\|}{M_2 \, \kappa(z,A)}$\\ \hline\hline $0$&1.00250311&3.20374633&6.28729589\\ \hline $0.001+0.001i$&1.11144480&3.54979202&6.96656727\\ \hline $0.1$&0.11116547&0.33536750&0.65971972\\ \hline $-3.5$&0.01890969&0.10268623&0.19736876\\ \hline $-5+i$&0.02005952&0.06879138&0.13682253\\ \hline $1+i$&0.00711180&0.01821627&0.03689838\\ \hline $10+10i$&0.00039271&0.00096510&0.00324741\\ \hline \end{tabular} \end{center} The following table gives the estimates of the relative perturbation of the solution $x$ for various values of $z$. The table also gives the upper bound for $\frac{\|\delta x\|}{\|x\|}$ found from the pseudospectrum and condition pseudospectrum of $A$. \begin{center} \begin{tabular}{|c|c|c|c|} \hline $z$&$\frac{\|\delta x\|}{\|x\|}$&$\frac{\|\Delta A\|}{\kappa_1(z,A+\Delta A)}$&$\frac{2\|\Delta A\|}{M_1 \ \kappa(z,A+\Delta A)}$\\ \hline\hline $0$&400.49840503&1283.50359817&2519.32007747\\ \hline $0.001+0.001i$&6.73531833&21.57230484&42.34410702\\ \hline $0.1$&0.10005389&0.30265747&0.59548750\\ \hline $-3.5$&0.01856115&0.10081974&0.19377512\\ \hline $-5+i$&0.01989405&0.06762120&0.13448096\\ \hline $1+i$&0.00707485&0.01811715&0.03670612\\ \hline $10+10i$&0.00039262&0.00096463&0.00324679\\ \hline \end{tabular} \end{center} \end{example} \subsection{Perturbation of both $A$ and $y$} Let $A\in BL(X)$ and $Ax-zx= y$ where $x, y\in X$ and $z\in \mathbb{C}$. The following theorem finds an upper bound for the relative perturbations of the solution $x$ corresponding to a perturbation of both $A$ and $y$ from the condition pseudospectrum of $A$. \begin{theorem}\label{perturbation4} Let $Ax-zx= y$ where $A\in BL(X)$, $x, y\in X$ and $z\notin \sigma(A)$. Further let $\delta x$ be the perturbation of the solution $x$ corresponding to the perturbation $\Delta A, \delta y$ on $A, y$ respectively. Then \[ \frac{\|\delta x\|}{\|x\|}\leq \frac{1}{\kappa(z,A)[1-\|(A-zI)^{-1}\Delta A\|]}\left(\frac{\|\delta y\|}{\|y\|}+ \frac{\|\Delta A\|}{\|A-zI\|}\right) \] where $\displaystyle \kappa(z,A):= \sup\{0<\epsilon<1: z\notin \sigma_\epsilon(A)\}.$ \end{theorem} \begin{proof} We have \[ (A-zI+ \Delta A)(x+\delta x)= y+ \delta y. \] From Theorem 7.12 of \cite{book1}, \[ \frac{\|\delta x\|}{\|x\|}\leq \frac{\|A-zI\|\|(A-zI)^{-1}\|}{1-\|(A-zI)^{-1}\Delta A\|}\left(\frac{\|\delta y\|}{\|y\|}+ \frac{\|\Delta A\|}{\|A-zI\|}\right). \] Suppose $z\notin \sigma_\epsilon(A)$ for some $0<\epsilon<1$. Then \[ \frac{\|\delta x\|}{\|x\|}< \frac{1}{\epsilon[1-\|(A-zI)^{-1}\Delta A\|]}\left(\frac{\|\delta y\|}{\|y\|}+ \frac{\|\Delta A\|}{\|A-zI\|}\right). \] Hence \[ \frac{\|\delta x\|}{\|x\|}\leq \frac{1}{\kappa(z,A)[1-\|(A-zI)^{-1}\Delta A\|]}\left(\frac{\|\delta y\|}{\|y\|}+ \frac{\|\Delta A\|}{\|A-zI\|}\right) \] where $\displaystyle \kappa(z,A):= \sup\{0<\epsilon<1: z\notin \sigma_\epsilon(A)\}.$ \end{proof} The following table gives the estimates of the relative perturbation of the solution $x$ for various values of $z$. The table also gives the upper bound for $\frac{\|\delta x\|}{\|x\|}$ found from the condition pseudospectrum of $A$. \begin{example} Consider the operator equation $Ax-zx= y$ defined by $A= \begin{bmatrix}0&1&2&3&4&5\\1&0&1&2&3&4\\2&1&0&1&2&3\\3&2&1&0&1&2\\ 4&3&2&1&0&1\\ 5&4&3&2&1&0\end{bmatrix}$ and $y= \begin{bmatrix}1\\2\\3\\4\\5\\6\end{bmatrix}^T$. Let $\Delta A= \begin{bmatrix} -0.01&0&0&0&0&0\\0&-0.01&0&0&0&0\\0&0&0&0&0&0\\0&0&0&0&0&0\\0&0&0&0&0&0\\0&0&0&0&0&0\\\end{bmatrix}$, $\delta y= \begin{bmatrix}0.01\\0.02\\0.03\\0.04\\0\\0\end{bmatrix}$ be small perturbations on $A$, $y$ respectively. Then \begin{center} \begin{tabular}{|c|c|c|} \hline $z$& $\frac{\|\delta x\|}{\|x\|}$& $ \frac{1}{\kappa(z,A)[1-\|(A-zI)^{-1}\Delta A\|]}\left(\frac{\|\delta y\|}{\|y\|}+ \frac{\|\Delta A\|}{\|A-zI\|}\right)$\\ \hline \hline 0&0.0268467778225&0.150444148229\\ \hline 0.2&0.0222940217983&0.107632701309\\ \hline 0.4&0.0193775211883&0.0832300065481\\ \hline 0.6&0.0173217152417&0.0674667943276\\ \hline -0.1&0.0302644475105&0.186762288147\\ \hline -0.3&0.0422038073974&0.353665883561\\ \hline -0.5&0.0572957745312&2.62816178085\\ \hline \end{tabular} \end{center} \end{example} \section{Characterization of the distance to instability of an operator from the condition pseudospectrum} \begin{definition} Let $A\in BL(X)$. Then $A$ is said to be stable if \[ \sigma(A)\cap \{z: \mbox{Re}\,z> 0\}= \emptyset. \] \end{definition} \begin{definition} Let $A\in BL(X)$. The distance to instability of $A$ is denoted by $d_1(A)$ and is defined as \begin{eqnarray*} d_1(A)&:=& \min\{\|E\|: A+E \ \mbox{is not stable}\},\\ &=& \min\{\|E\|: \sigma(A+E)\cap \{z: \mbox{Re}\, z >0\}\neq \emptyset\}. \end{eqnarray*} \end{definition} The following lemmas find the relation connecting the pseudospectrum and the condition pseudospectrum of an operation $A\in BL(X)$. \begin{lemma}\label{lem2} Let $A\in BL(X)$ and $\epsilon> 0$. Then $\displaystyle \Lambda_\epsilon(A)\subseteq \sigma_{\frac{2\epsilon}{M(A)}}(A)$ where $M(A):= \sup\{\|A-\lambda I\|: \lambda\in \sigma(A)\}$. \end{lemma} \begin{proof} Suppose $z\in \Lambda_\epsilon(A)$ for some $\epsilon>0$. Then $\displaystyle \|(A-zI)^{-1}\|\geq \frac{1}{\epsilon}$ and \[ \|A-zI\| \|(A-zI)^{-1}\|\geq \frac{\|A-zI\|}{\epsilon}. \] From Lemma \ref{lem4}, \[ \|A-zI\| \|(A-zI)^{-1}\|\geq \frac{M(A)}{2\epsilon} \] where $M(A)$ is defined above. Hence $\displaystyle z\in \sigma_{\frac{2\epsilon}{M(A)}}(A)$. \end{proof} \begin{lemma}\label{lem3} Let $A\in BL(X)$ and $\epsilon> 0$. Then $\sigma_{\frac{\epsilon}{\epsilon+2\|A\|}}(A)\subseteq \Lambda_\epsilon(A).$ \end{lemma} \begin{proof} Suppose $\displaystyle z\in \sigma_{\frac{\epsilon}{\epsilon+2\|A\|}}(A)$ for some $\epsilon>0$. Then \[ \|A-zI\| \|(A-zI)^{-1}\|\geq \frac{\epsilon+2\|A\|}{\epsilon}. \] \[ \|(A-zI)^{-1}\|\geq \frac{\epsilon+2\|A\|}{\epsilon\|A-zI\|}\geq \frac{\epsilon+2\|A\|}{\epsilon(|z|+\|A\|)}. \] Since $\displaystyle |z|\leq \frac{1+\frac{\epsilon}{\epsilon+2\|A\|}}{1- \frac{\epsilon}{\epsilon+2\|A\|}}\|A\|$ (Theorem 2.9 of \cite{kul}), we have \[ \|(A-zI)^{-1}\|\geq \frac{\epsilon+2\|A\|}{\epsilon\left(\frac{1+\frac{\epsilon}{\epsilon+2\|A\|}}{1- \frac{\epsilon}{\epsilon+2\|A\|}}\|A\|+\|A\|\right)}= \frac{1}{\epsilon}. \] \end{proof} The following theorem finds an upper bound and lower bound to the distance to singularity of an operator $A\in BL(X)$ from the condition pseudospectrum of $A$. \begin{theorem} Let $A\in BL(X)$. Define $M(A):= \sup\{\|A-\lambda I\|: \lambda\in \sigma(A)\}$, then \[ d_1(A)\geq \max\left\{\epsilon>0: \sigma_{\frac{2\epsilon}{M(A)}}(A)\cap \{z: \textnormal{Re}\, z>0\}= \emptyset \right\}, \] \[ d_1(A)\leq \max\left\{\epsilon>0: \sigma_{\frac{\epsilon}{\epsilon+2\|A\|}}(A) \cap \{z: \textnormal{Re}\, z>0\}= \emptyset\right\}. \] \end{theorem} \begin{proof} From the definition of the pseudospectrum and $d_1(A)$ we have \begin{eqnarray*} d_1(A)&=& \min\{\epsilon>0: \Lambda_\epsilon(A)\cap \{z: \mbox{Re}\, z>0\} \neq \emptyset\}\\ &=& \max\{\epsilon>0: \Lambda_\epsilon(A)\cap \{z: \mbox{Re}\, z>0\}= \emptyset\}. \end{eqnarray*} From Lemma \ref{lem2} and Lemma \ref{lem3}, for $\epsilon>0$, \[ \sigma_{\frac{\epsilon}{\epsilon+2\|A\|}}(A)\subseteq \Lambda_\epsilon(A)\subseteq \sigma_{\frac{2\epsilon}{M(A)}}(A). \] Hence \[ \sigma_{\frac{2\epsilon}{M(A)}}(A)\cap \{z: \mbox{Re}\, z>0\}= \emptyset \ \ \ \Longrightarrow \ \ \ \Lambda_\epsilon(A) \cap \{z: \mbox{Re}\, z>0\}= \emptyset, \] and \[ \Lambda_\epsilon(A) \cap \{z: \mbox{Re}\, z>0\}= \emptyset \ \ \ \Longrightarrow \ \ \ \sigma_{\frac{\epsilon}{\epsilon+2\|A\|}}(A) \cap \{z: \mbox{Re}\, z>0\}= \emptyset. \] \end{proof} \section{Characterization of the distance to singularity of an operator from the condition pseudospectrum} \begin{definition} Let $A\in BL(X)$. The distance to singularity of $A$ is denoted by $d_2(A)$ and is defined as \[ d_2(A):= \min\{\|E\|: A+E \ \mbox{is singular}\}. \] \end{definition} The following is an equivalent definition of the pseudospectrum of an operator in $BL(X)$ \cite{tre}. \begin{definition}\label{eqn3} Let $A\in BL(X)$ and $\epsilon>0$. Then \[ \Lambda_\epsilon(A)= \{z: z\in \sigma(A+E), \|E\|\leq \epsilon\}. \] \end{definition} \begin{lemma}\label{lem1} Let $A\in BL(X)$ and $\epsilon>0$. Then $0\notin \Lambda_\epsilon(A)$ if and only if $0\notin \sigma_{\frac{\epsilon}{\|A\|}}(A)$. \end{lemma} \begin{proof} Suppose $0\notin \Lambda_\epsilon(A)$ for some $\epsilon> 0$. Then $0\notin \sigma(A)$ and $\|A^{-1}\|<\frac{1}{\epsilon}$. Hence $\|A\|\neq 0$ and $\|A\|\|A^{-1}\|<\frac{\|A\|}{\epsilon}$. Thus $0\notin \sigma_{\frac{\epsilon}{\|A\|}}(A)$. The proof of the reverse inclusion is quite similar. \end{proof} The following theorem characterizes the distance to singularity of an operator $A\in BL(X)$ from the condition pseudospectrum of $A$. \begin{theorem} Let $A\in BL(X)\smallsetminus \mathcal{I}$. Then \[ d_2(A)= \max\left\{\epsilon> 0: 0\notin \sigma_\frac{\epsilon}{\|A\|}(A)\right\}. \] \end{theorem} \begin{proof} From the definition of $d_2(A)$ we have \[ d_2(A)= \min\{\|E\|: 0\in \sigma(A+E)\}. \] From Definition \ref{eqn3}, \begin{eqnarray*} d_2(A)&=& \min\{\epsilon>0: 0\in \Lambda_\epsilon(A)\},\\ &=& \max\{\epsilon>0: 0\notin \Lambda_\epsilon(A)\}. \end{eqnarray*} From Lemma \ref{lem1}, \begin{eqnarray*} d_2(A)&=& \max\left\{\epsilon> 0: 0\notin \sigma_\frac{\epsilon}{\|A\|}(A)\right\}. \end{eqnarray*} \end{proof} \bibliographystyle{amsplain}
\section{Introduction} Graph theory is a rich source of interesting computational problems. Consider the following classical decision problems regarding a graph $G$ with weighted edges: \begin{itemize} \item determine if $G$ has a spanning tree with cost $\leq k$, \item determine if $G$ has a path from $u$ to $v$ in $G$ with cost $\leq k$, \item determine if $G$ has a flow from $u$ to $v$ in $G$ with value $\geq k$. \end{itemize} These three questions can be answered efficiently, as there are algorithms for finding the minimal spanning tree (Prim's algorithm), shortest path (Dijkstra), or maximal flow (Ford--Fulkerson). On the other hand, determining if $G$ has a Hamiltonian path, or if $G$ has a $k$-clique are NP-complete decision problems, see \cite{Karp1972}. Introducing additional restrictions on a problem with an efficient solution may make the problem NP-complete. For example, the problem of determining if a bipartite graph $(X,Y)$ has a perfect matching can be done in polynomial time. D.~Plaisted consider the following variant, which he shows is NP-complete. \begin{problem}[See \cite{Plaisted1980}] Given a bipartite graph $(X,Y)$ and partitions $\mathcal{X}$, $\mathcal{Y}$ of $X$ and $Y$, respectively, determine if there is a perfect matching such that there are no two edges $\{x,y\}$, $\{x',y'\}$ such that $x,x'$ are in the same block of $\mathcal{X}$ and $y,y'$ are in the same block of $\mathcal{Y}$. \end{problem} \bigskip In this note, we show that the following decision problems are NP-complete. \begin{problem}[Vector-valued shortest path]\label{prob:vecPath} Let $G = (V,E)$ be a graph and let $w:E \to \mathbb{Z}^N_{\geq 0}$ be a vector-valued weight on the edges. For a path $P = (v_1,v_2, \dotsc, v_\ell)$, let $w(P)$ be the vector $\sum_i w(v_i,v_{i+1})$. Let $u,v$ be vertices of $G$ and let $k \in \mathbb{R}$. \begin{displayquote} Determine if there is a path $P$ in $G$ from $u$ to $v$ such that $|w(P)|\leq k$. \end{displayquote} \end{problem} \begin{problem}[Restricted spanning tree]\label{prob:spanningTree} Let $G = (V,E)$ be a graph and $w:E \to \mathbb{Z}_{\geq 0}$. Let $F \subseteq E^2$ be a set of \emph{forbidden pairs} of edges, and let $k \in \mathbb{Z}$. \begin{displayquote} Determine if there is a spanning tree $T \subseteq E$ of $G$ such there is no pair of edges of $T$ in $F$, with cost $\leq k$. \end{displayquote} \end{problem} \begin{problem}[All-or-nothing flow]\label{prob:Flow} Let $N=(G,s,t,c)$ be a network with source $s$, sink $t$ and capacity $c$. Furthermore, let $A$ be a subset of the edges of $G$. A flow $f$ on $N$ is $A$-\emph{valid} if for all $(x,y) \in A$ we have either $ f(x,y) = c(x,y) \text{ or } f(x,y) = 0$. \begin{displayquote} Determine if $N$ has an $A$-valid flow $f$ with $|f|\geq k$. \end{displayquote} \end{problem} \subsection*{Acknowledgements} This note was part of the requirements for a course in mathematical communication. These proofs may serve as examples for students taking classes in graph theory or complexity theory. \subsection{Preliminaries on complexity theory} We assume that the reader is familiar with basic graph theory terminology. For a background on graph theory, we refer to \cite{Diestel2017}. The expression ``NP'' refers to the class of decision problems solvable by a \emph{non-deterministic Turing machine} in \emph{polynomial time}. It was shown by S.~Cook in 1971 \cite{Cook1971} that any such decision problem can be reduced to the so called \defin{$3$-SAT problem}. This means that a problem which can be solved by a non-deterministic Turing machine, can be phrased as an instances of $3$-SAT. Furthermore, this translation can be carried out in polynomial time (polynomial in the size of the input). \begin{problem}[3-SAT] Let $E$ be a boolean expression, given as a conjunction of clauses, where each clause involves exactly three distinct literals. A literal is either a boolean variable, or its negation. Determine if $E$ is satisfiable. \end{problem} For example, $ E = (x\vee y \vee \neg z) \wedge (\neg x\vee \neg y \vee \neg z) \wedge (x\vee \neg y \vee z) $ is such a conjunction, and the assignment $x,z=\mathtt{true}$, $y=\mathtt{false}$ shows that $E$ can be satisfied. A problem class $C$ is said to be \defin{NP-complete} if any $3$-SAT problem can be reduced (in polynomial time) to an instance in $C$. In 1972, R.~Karp presented a list of 21 NP-complete problems \cite{Karp1972} from various areas of mathematics, thus highlighting the ubiquity of this notion. To this date, Karp's list have been extended with a large variety of decision problems, and we shall now extend this list even further. \section{NP-complete variants of decision problems} To prove that the problems listed in the introduction are NP-complete, we shall describe reductions from $3$-SAT. We use the boolean expression \begin{equation}\label{eq:booleanB} B= (x \vee y \vee z) \wedge (\overline{x} \vee z \vee w) \wedge (\overline{x} \vee \overline{y} \vee w) \wedge (y \vee \overline{z} \vee \overline{w}) \end{equation} for all our examples illustrating the reductions. \subsection{Restricted spanning trees} Given in instance of a $3$-SAT problem $B$ with $C$ clauses, we construct a graph $G$ as in \eqref{eq:rst} as follows. The graph $G=G(B)$ has one \emph{top vertex}, one \emph{bottom vertex}, and $(3+1)\cdot C$ auxiliary vertices. The weights of all edges is $1$, except edges marked $\ast$, which has some fixed large weight $M$. The three edges in each small ``block'' of $4$ vertices have been labeled according to a corresponding clause in $B$. The forbidden set $F$ consists of all pairs of edges, $(a,\overline{a})$, where $a$ is a variable appearing in $B$. \begin{equation}\label{eq:rst} \begin{tikzpicture}[xscale=0.8,yscale=0.8] \tikzset{vertNode/.style={circle,draw,minimum size=0.1cm,inner sep=0pt}} \node[vertNode] (top) at ( 6.5, 1) {}; \node[vertNode] (bot) at ( 6.5, -2) {}; \begin{scope}[shift={(0,0)}] \node[vertNode] (v1a) at ( 1, 0) {}; \node[vertNode] (v1b) at ( 2, 0) {}; \node[vertNode] (v1c) at ( 3, 0) {}; \node[vertNode] (v1out) at ( 2, -1) {}; \end{scope} \begin{scope}[shift={(3,0)}] \node[vertNode] (v2a) at ( 1, 0) {}; \node[vertNode] (v2b) at ( 2, 0) {}; \node[vertNode] (v2c) at ( 3, 0) {}; \node[vertNode] (v2out) at ( 2, -1) {}; \end{scope} \begin{scope}[shift={(6,0)}] \node[vertNode] (v3a) at ( 1, 0) {}; \node[vertNode] (v3b) at ( 2, 0) {}; \node[vertNode] (v3c) at ( 3, 0) {}; \node[vertNode] (v3out) at ( 2, -1) {}; \end{scope} \begin{scope}[shift={(9,0)}] \node[vertNode] (v4a) at ( 1, 0) {}; \node[vertNode] (v4b) at ( 2, 0) {}; \node[vertNode] (v4c) at ( 3, 0) {}; \node[vertNode] (v4out) at ( 2, -1) {}; \end{scope} \draw[-] (v1out) to node[midway] {$x$} (v1a); \draw[-] (v1out) to node[midway] {$y$} (v1b); \draw[-] (v1out) to node[midway] {$z$} (v1c); \draw[-] (v2out) to node[midway] {$\overline{x}$} (v2a); \draw[-] (v2out) to node[midway] {$z$} (v2b); \draw[-] (v2out) to node[midway] {$w$} (v2c); \draw[-] (v3out) to node[midway] {$\overline{x}$} (v3a); \draw[-] (v3out) to node[midway] {$\overline{y}$} (v3b); \draw[-] (v3out) to node[midway] {$w$} (v3c); \draw[-] (v4out) to node[midway] {$y$} (v4a); \draw[-] (v4out) to node[midway] {$\overline{z}$} (v4b); \draw[-] (v4out) to node[midway] {$\overline{w}$} (v4c); \draw[-] (top) to node[midway] {} (v1a); \draw[-] (top) to node[midway] {} (v1b); \draw[-] (top) to node[midway] {} (v1c); \draw[-] (top) to node[midway] {} (v2a); \draw[-] (top) to node[midway] {} (v2b); \draw[-] (top) to node[midway] {} (v2c); \draw[-] (top) to node[midway] {} (v3a); \draw[-] (top) to node[midway] {} (v3b); \draw[-] (top) to node[midway] {} (v3c); \draw[-] (top) to node[midway] {} (v4a); \draw[-] (top) to node[midway] {} (v4b); \draw[-] (top) to node[midway] {} (v4c); \draw[thick,-] (bot) to node[midway] {$\ast$} (v1out); \draw[thick,-] (bot) to node[midway] {$\ast$} (v2out); \draw[thick,-] (bot) to node[midway] {$\ast$} (v3out); \draw[thick,-] (bot) to node[midway] {$\ast$} (v4out); \draw[-] (top) to node[midway] {} (bot); \end{tikzpicture} \end{equation} In order for $G(B)$ to have a spanning tree which does not use any expensive (marked with $\ast$) edge, we must be able to reach the $C$ vertices in the third layer, via some path from the top vertex. This can only be done if and only if there is a truth-assignment of the boolean variables which makes $B$ true. For the example in \eqref{eq:rst}, the assignment $x=\mathtt{false}$, $y=\mathtt{true}$, $z=\mathtt{true}$, $w=\mathtt{false}$ makes $B$ true, and there is a cheap minimal spanning tree, not using any $\ast$-edges: \[ \begin{tikzpicture}[xscale=0.8,yscale=0.8] \tikzset{vertNode/.style={circle,draw,minimum size=0.1cm,inner sep=0pt}} \node[vertNode] (top) at ( 6.5, 1) {}; \node[vertNode] (bot) at ( 6.5, -2) {}; \begin{scope}[shift={(0,0)}] \node[vertNode] (v1a) at ( 1, 0) {}; \node[vertNode] (v1b) at ( 2, 0) {}; \node[vertNode] (v1c) at ( 3, 0) {}; \node[vertNode] (v1out) at ( 2, -1) {}; \end{scope} \begin{scope}[shift={(3,0)}] \node[vertNode] (v2a) at ( 1, 0) {}; \node[vertNode] (v2b) at ( 2, 0) {}; \node[vertNode] (v2c) at ( 3, 0) {}; \node[vertNode] (v2out) at ( 2, -1) {}; \end{scope} \begin{scope}[shift={(6,0)}] \node[vertNode] (v3a) at ( 1, 0) {}; \node[vertNode] (v3b) at ( 2, 0) {}; \node[vertNode] (v3c) at ( 3, 0) {}; \node[vertNode] (v3out) at ( 2, -1) {}; \end{scope} \begin{scope}[shift={(9,0)}] \node[vertNode] (v4a) at ( 1, 0) {}; \node[vertNode] (v4b) at ( 2, 0) {}; \node[vertNode] (v4c) at ( 3, 0) {}; \node[vertNode] (v4out) at ( 2, -1) {}; \end{scope} \draw[-] (v1out) to node[midway] {$y$} (v1b); \draw[-] (v2out) to node[midway] {$\overline{x}$} (v2a); \draw[-] (v3out) to node[midway] {$\overline{x}$} (v3a); \draw[-] (v4out) to node[midway] {$\overline{w}$} (v4c); \draw[-] (top) to node[midway] {} (v1a); \draw[-] (top) to node[midway] {} (v1b); \draw[-] (top) to node[midway] {} (v1c); \draw[-] (top) to node[midway] {} (v2a); \draw[-] (top) to node[midway] {} (v2b); \draw[-] (top) to node[midway] {} (v2c); \draw[-] (top) to node[midway] {} (v3a); \draw[-] (top) to node[midway] {} (v3b); \draw[-] (top) to node[midway] {} (v3c); \draw[-] (top) to node[midway] {} (v4a); \draw[-] (top) to node[midway] {} (v4b); \draw[-] (top) to node[midway] {} (v4c); \draw[-] (top) to node[midway] {} (bot); \end{tikzpicture} \] By picking $M>4C+1$, the question \begin{displayquote} Does $G(B)$ has a good spanning tree with cost $\leq M$ with no forbidden pairs in $F$? \end{displayquote} is true if and only if $B$ has an assignment of variables that makes $B$ true. We have thus showed that the restricted spanning tree problem is at least as hard as $3$-SAT. Note that if we are given a spanning tree $T$ and a set $F$, and a number $k$, we can easily check (in polynomial time) that $T$ is indeed a spanning tree, no pair of edges in $F$ appear in $T$, and the total cost does not exceed $k$. It follows that our decision problem is NP-complete. \subsection{All-or-nothing maximal flow} For the next decision problem we use a construction which is similar to that of the restricted spanning tree problem. Given a boolean expression $B$ with $C$ clauses and $V$ variables, we construct a network $(G,s,t,c)$ as follows, see the figure in \cref{eq:flowExample}. There is a top vertex $s$, the source, and a bottom vertex $t$, the sink. The source is connected to $V$ vertices, $w_1,\dotsc,w_V$ positioned at level $2$. Each $w_i$ is connected to two vertices on level $3$, labeled $x_i$ and $\overline{x}_i$. These ``literal'' vertices are all connected to the vertex $l$, as well as the corresponding vertices in the $C$ clauses. The dashed edges describe the elements in $A$. We have the following capacities: \begin{itemize} \item Any edge starting from the top $s$ has capacity $C$. \item The edge $(l,t)$ has capacity $VC-C$. \item All other edges ending at $t$ has capacity $1$. \item The edges in $A$ has capacity $C$. \item All the other edges are given a large capacity, say $VC$. \end{itemize} \begin{equation}\label{eq:flowExample} \begin{tikzpicture}[xscale=0.8,yscale=0.8] \tikzset{vertNode/.style={circle,draw,minimum size=0.4cm,inner sep=0pt}} \tikzset{invisible/.style={minimum width=0mm,inner sep=0mm,outer sep=0mm}} \node[vertNode] (top) at ( 8, 4) {s}; \node[vertNode] (bot) at ( 8, -3) {t}; \node[vertNode] (exess) at ( 8, 0) {l}; \begin{scope}[shift={(5.5,3)}] \node[vertNode] (xc) at ( 1, 0) {}; \node[vertNode] (yc) at ( 2, 0) {}; \node[vertNode] (zc) at ( 3, 0) {}; \node[vertNode] (wc) at ( 4, 0) {}; \end{scope} \begin{scope}[shift={(3.5,2)}] \node[vertNode] (xx) at ( 1, 0) {$x$}; \node[vertNode] (xxb)at ( 2, 0) {$\bar{x}$}; \node[vertNode] (yy) at ( 3, 0) {$y$}; \node[vertNode] (yyb)at ( 4, 0) {$\bar{y}$}; \node[vertNode] (zz) at ( 5, 0) {$z$}; \node[vertNode] (zzb)at ( 6, 0) {$\bar{z}$}; \node[vertNode] (ww) at ( 7, 0) {$w$}; \node[vertNode] (wwb)at ( 8, 0) {$\bar{w}$}; \end{scope} \begin{scope}[shift={(0,0)}] \node[vertNode] (v1a) at ( 1, 0) {}; \node[vertNode] (v1b) at ( 2, 0) {}; \node[vertNode] (v1c) at ( 3, 0) {}; \node[vertNode] (v1out) at ( 2, -2) {}; \end{scope} \begin{scope}[shift={(3,0)}] \node[vertNode] (v2a) at ( 1, 0) {}; \node[vertNode] (v2b) at ( 2, 0) {}; \node[vertNode] (v2c) at ( 3, 0) {}; \node[vertNode] (v2out) at ( 2, -2) {}; \end{scope} \begin{scope}[shift={(9,0)}] \node[vertNode] (v3a) at ( 1, 0) {}; \node[vertNode] (v3b) at ( 2, 0) {}; \node[vertNode] (v3c) at ( 3, 0) {}; \node[vertNode] (v3out) at ( 2, -2) {}; \end{scope} \begin{scope}[shift={(12,0)}] \node[vertNode] (v4a) at ( 1, 0) {}; \node[vertNode] (v4b) at ( 2, 0) {}; \node[vertNode] (v4c) at ( 3, 0) {}; \node[vertNode] (v4out) at ( 2, -2) {}; \end{scope} \draw[-] (v1out) to node[midway] {$x$} (v1a); \draw[-] (v1out) to node[midway] {$y$} (v1b); \draw[-] (v1out) to node[midway] {$z$} (v1c); \draw[-] (v2out) to node[midway] {$\overline{x}$} (v2a); \draw[-] (v2out) to node[midway] {$z$} (v2b); \draw[-] (v2out) to node[midway] {$w$} (v2c); \draw[-] (v3out) to node[midway] {$\overline{x}$} (v3a); \draw[-] (v3out) to node[midway] {$\overline{y}$} (v3b); \draw[-] (v3out) to node[midway] {$w$} (v3c); \draw[-] (v4out) to node[midway] {$y$} (v4a); \draw[-] (v4out) to node[midway] {$\overline{z}$} (v4b); \draw[-] (v4out) to node[midway] {$\overline{w}$} (v4c); \draw[-] (top) to node[midway] {} (xc); \draw[-] (top) to node[midway] {} (yc); \draw[-] (top) to node[midway] {} (zc); \draw[-] (top) to node[midway] {} (wc); \draw[dashed] (xc) to node[midway] {} (xx); \draw[dashed] (xc) to node[midway] {} (xxb); \draw[dashed] (yc) to node[midway] {} (yy); \draw[dashed] (yc) to node[midway] {} (yyb); \draw[dashed] (zc) to node[midway] {} (zz); \draw[dashed] (zc) to node[midway] {} (zzb); \draw[dashed] (wc) to node[midway] {} (ww); \draw[dashed] (wc) to node[midway] {} (wwb); \draw (exess) to node[midway] {} (xx); \draw (exess) to node[midway] {} (xxb); \draw (exess) to node[midway] {} (yy); \draw (exess) to node[midway] {} (yyb); \draw (exess) to node[midway] {} (zz); \draw (exess) to node[midway] {} (zzb); \draw (exess) to node[midway] {} (ww); \draw (exess) to node[midway] {} (wwb); \draw[-] (xx) to node[midway] {} (v1a); \draw[-] (yy) to node[midway] {} (v1b); \draw[-] (zz) to node[midway] {} (v1c); \draw[-] (xxb) to node[midway] {} (v2a); \draw[-] (zz) to node[midway] {} (v2b); \draw[-] (ww) to node[midway] {} (v2c); \draw[-] (xxb) to node[midway] {} (v3a); \draw[-] (yyb) to node[midway] {} (v3b); \draw[-] (ww) to node[midway] {} (v3c); \draw[-] (yy) to node[midway] {} (v4a); \draw[-] (zzb) to node[midway] {} (v4b); \draw[-] (wwb) to node[midway] {} (v4c); \draw[thick,-] (bot) to node[midway] {1} (v1out); \draw[thick,-] (bot) to node[midway] {1} (v2out); \draw[thick,-] (bot) to node[midway] {1} (v3out); \draw[thick,-] (bot) to node[midway] {1} (v4out); \draw[thick,-] (exess) to node[left] {$ $} (bot); \end{tikzpicture} \end{equation} By construction, the restrictions imposed by $A$ imply that at most one of vertices $x$ and $\bar{x}$ has a non-zero flow (of size exactly $C$) leaving the vertex. The edges leaving $s$ have total capacity $VC$, so this is an upper bound on the maximal flow in the network. Furthermore, the flow $VC$ can only be obtained if all edges flowing into $t$ are saturated, as the total capacity of the edges adjacent to $t$ is also $VC$. Hence, a maximal flow can exist only if every clause has some flow entering it (meaning at least one of the variables in the clause is true). Hence, a maximal flow can only be obtained if the boolean expression is satisfiable. On the other hand, if there is a way to satisfy $B$, then we can find an edge in each clause (labeled with a literal being true) with flow $1$, and let the remaining flow go via vertex $l$. Hence, our network has a maximal flow with value $VC$ if and only if $B$ is satisfiable. \subsection{Vector-valued path} Given a boolean expression $B$ corresponding to an instance of $3$-SAT with $C$ clauses and $V$ variables, we construct a weighted graph $G$ on $4V+5C$ vertices as follows. For each clause $c_i$, we have the vertices $\{a^i,w^i_1,w^i_2,w^i_3,b^i\}$, and edges $(a^i,w^i_j)$, $(w^i_j,b^i)$ for $j=1,2,3$. We also have the edges $(b^{i-1},a^{i})$ for all $i=2,\dotsc,C$. This part of the graph is the \defin{clause subgraph}. Furthermore, for each variable $x_i$, there are vertices $\{u_{in}^i,u^i,\overline{u}^i,u_{out}^i\}$, and edges $(u_{in}^i,u^i)$, $(u^i,u_{out}^i)$, $(u_{in}^i,\overline{u}^i)$, $(\overline{u}^i,u_{out}^i)$ as well as the edges $(u_{out}^{i-1},u_{in}^{i})$ for all $i=2,\dotsc,V$. This part of the graph is the \defin{variable subgraph}. Finally, we have an edge $(u^V_{out},a^1)$ connecting the two subgraphs. We shall now assign vector-valued weights with values in the $2V$-dimensional vector space $\mathbb{N}^V \oplus \mathbb{N}^V$. We let $\mathbf{e}_i$ denote the $i$th unit vector in the first set of coordinates, and $\overline{\mathbf{e}}_i$ the $i$th unit vector in the second set of coordinates. The $V$ edges $(u^i_{in},u^i)$ and $(u^i_{in},\overline{u}^i)$ are given the weights $M \mathbf{e}_i$ and $M \overline{\mathbf{e}}_i$, respectively, where $M \gg 0$ is to be determined later. The edge $(a^i,v^i_j)$ is given weight $\mathbf{e}_\ell$ (or $\overline{\mathbf{e}})$ if $x_\ell$ (or $\overline{x}_\ell$) is the variable at position $j$ in clause $i$, and the remaining edges in the graph are assigned weight $0$ in every coordinate. We shall now argue that $B$ is satisfiable if and only if the question \begin{displayquote} Is there is a path $P$ from $u^1_{in}$ to $b^C$ with cost at most $\sqrt{VM^2 + C^3}$? \end{displayquote} has a positive answer. \begin{figure}[!ht] \[ \begin{tikzpicture}[xscale=1.2,yscale=1.2] \tikzset{vertNode/.style={circle,draw,minimum size=0.1cm,inner sep=0pt}} \begin{scope}[shift={(0,2)}] \node[vertNode] (w1a) at ( 0, -0.5) {}; \node[vertNode] (w1b) at ( 0, 0.5) {}; \node[vertNode] (w1in) at (-0.5, 0) {}; \node[vertNode] (w1out) at ( 0.5, 0) {}; \end{scope} \begin{scope}[shift={(2,2)}] \node[vertNode] (w2a) at ( 0, -0.5) {}; \node[vertNode] (w2b) at ( 0, 0.5) {}; \node[vertNode] (w2in) at (-0.5, 0) {}; \node[vertNode] (w2out) at ( 0.5, 0) {}; \end{scope} \begin{scope}[shift={(4,2)}] \node[vertNode] (w3a) at ( 0, -0.5) {}; \node[vertNode] (w3b) at ( 0, 0.5) {}; \node[vertNode] (w3in) at (-0.5, 0) {}; \node[vertNode] (w3out) at ( 0.5, 0) {}; \end{scope} \begin{scope}[shift={(6,2)}] \node[vertNode] (w4a) at ( 0, -0.5) {}; \node[vertNode] (w4b) at ( 0, 0.5) {}; \node[vertNode] (w4in) at (-0.5, 0) {}; \node[vertNode] (w4out) at ( 0.5, 0) {$ $}; \end{scope} \draw[-] (w1in) -- (w1a) -- (w1out); \draw[-] (w1in) -- (w1b) -- (w1out); \draw[-] (w2in) -- (w2a) -- (w2out); \draw[-] (w2in) -- (w2b) -- (w2out); \draw[-] (w3in) -- (w3a) -- (w3out); \draw[-] (w3in) -- (w3b) -- (w3out); \draw[-] (w4in) -- (w4a) -- (w4out); \draw[-] (w4in) -- (w4b) -- (w4out); \draw[-] (w1out) to (w2in); \draw[-] (w2out) to (w3in); \draw[-] (w3out) to (w4in); \draw (w4out) to node[midway] {$x$} (w4a); \draw (w4out) to node[midway] {$\overline x$} (w4b); \draw (w3out) to node[midway] {$y$} (w3a); \draw (w3out) to node[midway] {$\overline y$} (w3b); \draw (w2out) to node[midway] {$z$} (w2a); \draw (w2out) to node[midway] {$\overline z$} (w2b); \draw (w1out) to node[midway] {$w$} (w1a); \draw (w1out) to node[midway] {$\overline w$} (w1b); \begin{scope}[shift={(0,0)}] \node[vertNode] (v1a) at ( 0, -1) {}; \node[vertNode] (v1b) at ( 0, 0) {}; \node[vertNode] (v1c) at ( 0, 1) {}; \node[vertNode] (v1in) at (-1, 0) {}; \node[vertNode] (v1out) at ( 1, 0) {}; \end{scope} \begin{scope}[shift={(2.5,0)}] \node[vertNode] (v2a) at ( 0, -1) {}; \node[vertNode] (v2b) at ( 0, 0) {}; \node[vertNode] (v2c) at ( 0, 1) {}; \node[vertNode] (v2in) at (-1, 0) {}; \node[vertNode] (v2out) at ( 1, 0) {}; \end{scope} \begin{scope}[shift={(5,0)}] \node[vertNode] (v3a) at ( 0, -1) {}; \node[vertNode] (v3b) at ( 0, 0) {}; \node[vertNode] (v3c) at ( 0, 1) {}; \node[vertNode] (v3in) at (-1, 0) {}; \node[vertNode] (v3out) at ( 1, 0) {}; \end{scope} \begin{scope}[shift={(7.5,0)}] \node[vertNode] (v4a) at ( 0, -1) {}; \node[vertNode] (v4b) at ( 0, 0) {}; \node[vertNode] (v4c) at ( 0, 1) {}; \node[vertNode] (v4in) at (-1, 0) {}; \node[vertNode] (v4out) at ( 1, 0) {$ $}; \end{scope} \draw[-] (w1in) to (v1in); \draw[-] (v1a) to (v1out); \draw[-] (v1b) to (v1out); \draw[-] (v1c) to (v1out); \draw[-] (v2a) to (v2out); \draw[-] (v2b) to (v2out); \draw[-] (v2c) to (v2out); \draw[-] (v3a) to (v3out); \draw[-] (v3b) to (v3out); \draw[-] (v3c) to (v3out); \draw[-] (v4a) to (v4out); \draw[-] (v4b) to (v4out); \draw[-] (v4c) to (v4out); \draw[-] (v1in) to node[midway] {$x$} (v1a); \draw[-] (v1in) to node[midway] {$y$} (v1b); \draw[-] (v1in) to node[midway] {$z$} (v1c); \draw[-] (v2in) to node[midway] {$\overline{x}$} (v2a); \draw[-] (v2in) to node[midway] {$z$} (v2b); \draw[-] (v2in) to node[midway] {$w$} (v2c); \draw[-] (v3in) to node[midway] {$\overline{x}$} (v3a); \draw[-] (v3in) to node[midway] {$\overline{y}$} (v3b); \draw[-] (v3in) to node[midway] {$w$} (v3c); \draw[-] (v4in) to node[midway] {$y$} (v4a); \draw[-] (v4in) to node[midway] {$\overline{z}$} (v4b); \draw[-] (v4in) to node[midway] {$\overline{w}$} (v4c); \draw[-] (v1out) to (v2in); \draw[-] (v2out) to (v3in); \draw[-] (v3out) to (v4in); \end{tikzpicture} \] \caption{ Only the labeled edges have non-zero weight. The path goes from the upper-rightmost vertex ($u^1_{in}$) to the lower right-most vertex ($b^C$). }\label{fig:shortestPath} \end{figure} Any shortest path $P$ from $u^1_{in}$ to $b^C$ must use exactly one of the edges with weight $M\mathbf{e}_i$ or $M\overline{\mathbf{e}}_i$, so at least half of the $2V$ available coordinates are non-zero in the cost of $P$. Let us call these edges (and corresponding coordinates) in $P$ \defin{large edges}. If there are no other edges in the path using the large coordinates, the total cost squared is less than \begin{equation} VM^2 + C^3, \tag{Satisfiable-upper-bound} \end{equation} as the maximal value in any of the remaining coordinates is $C$, and there are at most $C$ such coordinates. Suppose now that there is some additional edge using a large coordinate $\mathbf{e}_i$ in $P$. Then the total cost squared is at least \[ (M+1)^2 + (V-1)M^2 > VM^2 + 2M, \tag{Unsatisfiable-lower-bound} \] the first term is the contribution from coordinate $\mathbf{e}_i$, and there is a contribution from the $V-1$ remaining large coordinates $M$. By choosing $M > \frac12 C^3$, we have that $VM^2 + 2M > VM^2 + C^3 $, so there is a path with cost not exceeding $\sqrt{VM^2 + C^3}$ if and only if we can avoid having additional edges with non-zero value at a large coordinate. Such a path can be found if and only if the corresponding $3$-SAT problem is satisfiable. \begin{question} In the above setting, the length of the vector is allowed to depend on $V$, the number of variables. What if the length is a fixed constant instead? Is the problem still in NP? \end{question} \bibliographystyle{alphaurl}
\section{Introduction} \label{sec:intro} Almost 25 years after the first discovery of a planet orbiting a main sequence star \cite{Mayor:1995eh}, there are nowadays more than 4000 known planets in more than 3000 known planetary systems\footnote{See, e.g., \url{http://www.exoplanet.eu/catalog/} on the Internet.}. Different detection techniques such as radial velocity, transit photometry and timing, pulsar timing, microlensing, astrometry \cite{perryman,book018}, sensitive to specific physical properties of the planetary systems, have been developed and used so far. In general, it is fruitful to combine different and complementary approaches to obtain a knowledge that is as extensive and complete as possible of the key physical and orbital features of the planetary systems of interest. The large number of confirmed and potential exoplanets, besides giving us the possibility of improving our understanding of planets formation, provides a potentially viable opportunity of testing fundamental laws of physics, such as gravity models, outside our Solar System. Actually, General Relativity (GR) is the best available model of the gravitational interaction: its predictions were verified with great accuracy during last century even though challenges to the Einsteinian paradigm come from cosmological observations \cite{2014arXiv1409.7871W,2016Univ....2...23D}. Moreover, besides the issues deriving from the observation of the Universe at very large scales, it is a well known fact that GR is not renormalizable and it cannot be reconciled with a quantum framework \citep{Stelle:1976gc,2016Univ....2...24L}: this ultimately implies that our current model of gravitational interactions stands apart from the Standard Model of particle physics. As a consequence, there are strong motivations suggesting that GR is just a suitable limit of a more general theory of gravity we still do not know. A description of various modified gravity models can be found, e.g., in the review papers \cite{Tsujikawa:2010zza,2012PhR...513....1C,Berti:2015itd}. However, due to the reliability of Einstein's theory, it is manifest that any model of modified gravity should be in agreement with the known tests of GR: every extended theory of gravity is expected to reproduce GR in a suitable weak-field limit. As a consequence, modified gravity models must have correct Newtonian and post-Newtonian limits and, up to intermediate scales, the deviations from the GR predictions can be considered as perturbations described by specific model-dependent parameters, whose values can be constrained by observations. Here, we suggest that transiting exoplanets, thanks to the continuous improvement in the high precision measurements performed, could provide the opportunity of testing modified models of gravity outside the Solar System; for other works dealing with alternative theories of gravity and exoplanets, see, e.g., \cite{2010OAJ.....3..167I,2017PhLB..769..485V}. This is quite similar to what happened to pulsars systems, which have become celestial laboratories for theories of gravity \cite{Stairs2003,kramer2006tests}. {Actually, a recent work by {\citet{Blanchet:2019zxv}} suggests that the general relativistic orbital precession could be detected by observing the exoplanet HD 80606b.} In transiting exoplanets, the time span $T_\mathrm{exp}$ characterizing the orbital revolution, generically dubbed as `orbital period', which is actually measured is the time interval $T_\mathrm{tra}$ between two consecutive passages at the positions in the orbit, called transit centres, which minimize the sky-projected distance $r_\mathrm{sky}$ of the planet from the star \cite{Winn010}. From a theoretical point of view, it is unclear how $T_\mathrm{exp}$ can be mathematically modelled when post-Keplerian (pK) dynamical effects (star's oblateness $J_2^\star$, possible $\mathrm{N}$-body disturbances due to other planets in the system, general relativity, modified models of gravity, etc.) are at work in the system at hand. Possible choices are as follows \cite{2016MNRAS.460.2445I}. The draconitic period $T_\mathrm{dra}$ is defined for a perturbed path as the time span between two successive instants when the real position of the test particle coincides with the ascending node position on the corresponding osculating orbit. The anomalistic period $T_\mathrm{ano}$ can be defined as the time interval between two successive instants when the real position of the test particle coincides with the pericentre position on the corresponding orbit. The sidereal period $T_\mathrm{sid}$ is the time interval between two successive instants when the real position of the test particle lies on a given reference direction in the sky. The latter may be, e.g., the one from which the longitudes are reckoned, i.e. the $x$ axis in the coordinate systems which are usually tied to the plane of the sky. In a purely Keplerian case, $T_\mathrm{dra},\,T_\mathrm{ano},\,T_\mathrm{sid}$ are degenerate, being identical to the unperturbed Keplerian period. If some pK disturbing accelerations are present, the degeneration is generally broken \cite{2016MNRAS.460.2445I}. Here, using the approach described in \cite{SSS}, we consider pK disturbing accelerations starting from a general stationary and spherically symmetric spacetime which can be thought of a solution of the field equation of modified gravity model, describing the gravitational field around a point-like mass, which will be the model of an exoplanetary system. In particular, we will focus on the perturbations of the Newtonian potential falling off as the square or the cube of the distance from the central mass, and we will work out the expressions of $T_\mathrm{dra},\,T_\mathrm{ano},\,T_\mathrm{sid}$. This paper is organised as follows: in Section \ref{sec:geo} we obtain the perturbing acceleration, while in Section \ref{sec:periods} we calculate the perturbations of the anomalistic, draconitic and sidereal periods. Conclusion are drawn in Section \ref{sec:conc}. \section{The perturbing acceleration} \label{sec:geo} We assume that the gravitational field of a point mass in a generic modified model of gravity is described by the following static and spherically symmetric metric\footnote{If not otherwise stated, as in (\ref{ano2}) to (\ref{sid3}) below, we use units such that the speed of light in vacuum $c$ and the Newtonian gravitational constant $G$ are set equal to 1; bold face letters like ${\mathbf{x}}$ refer to spatial vectors while Latin indices refer to spatial components.} \begin{equation} (ds)^{2}=\left[1+\phi(r)\right](dt)^{2}- \left[1+\psi(r)\right]\left[(dx)^{2}+(dy)^{2}+(dz)^{2}\right], \label{eq:metrica01} \end{equation} where $r=\sqrt{x^{2}+y^{2}+z^{2}}$, and $\phi(r),\ \psi(r)$ are functions depending on the mass $M$ of the source, which is the host star in our case, and, possibly, on other parameters of the theory. We suppose that the effects of the the modified model can be considered as perturbations of the known GR solution, i.e. the Schwarzschild spacetime. This amounts to saying that $\phi(r)$ and $\psi(r)$ must approach their GR values: in other words we suppose that in a suitable limit, the metric takes the form \begin{eqnarray} \phi(r) & = & \phi_\mathrm{GR}(r)+\phi_\mathrm{mod}(r), \label{eq:defar1} \\ \psi(r) & = & \psi_\mathrm{GR}(r)+\psi_\mathrm{mod}(r), \label{eq:defbr1} \end{eqnarray} where the GR values are given by $\phi_\mathrm{GR}(r)=-2M/r+2M^{2}/r^{2}$, $\psi_\mathrm{GR}(r)=2M/r$ and the perturbations $\phi_\mathrm{mod}(r), \psi_\mathrm{mod}(r)$ due to the modified gravity model are such that $\phi_\mathrm{mod}(r) \ll \phi_\mathrm{GR}(r)$, $\psi_\mathrm{mod}(r) \ll \psi_\mathrm{GR}(r)$. In order to obtain the perturbing pK acceleration, we proceed as follows. First, we assume that in the given theory, the matter is minimally and universally coupled, so that test particles follow geodesics of the metric (\ref{eq:metrica01}). Then, we consider the (post-Newtonian) equation of motion of a test particle (see \cite{1991ercm.book.....B}) \begin{equation} \ddot x^{i}=-\frac 1 2 h_{00,i}- \frac 1 2 h_{ik}h_{00,k}+h_{00,k}\dot x^{k} \dot x^{i}+ \left(h_{ik,m}-\frac 1 2 h_{km,i} \right)\dot x^{k} \dot x ^{m}, \label{eq:geod1} \end{equation} where ``dot'' stands for derivative with respect to the coordinate time. Since in our notation it is $h_{00}=\phi(r)$ and $h_{ij}=\psi(r)\delta_{ij}$, we can write the perturbing acceleration $\vb{A}$ in the form \begin{equation} \vb{A}=-\frac 1 2 \left \{\Phi(r) \left[1+\psi_\mathrm{mod}(r) \right]+\Psi(r)v^{2} \right \} \hb x+ \left[\Phi(r)+\Psi(r) \right]\left(\hb x \cdot \vb v \right) \vb v, \label{eq:acc1} \end{equation} where we set $\vb x= \left\{x,y,z \right\}$, $\vb v=\left\{\dot x, \dot y, \dot z \right\}$, $\hb x= \vb x/|\vb x|$, and\footnote{{Notice that in Eq. (\ref{eq:acc1}) we neglected cross-terms deriving from the product of GR and modified gravity potentials.}} \begin{equation} \Phi(r) \doteq \frac{d \phi_\mathrm{mod}(r)}{dr}, \quad \quad \Psi(r) \doteq \frac{d \psi_\mathrm{mod}(r)}{dr}. \label{eq:defAB1} \end{equation} Since we are interested in the lowest order effects on planetary motion of $\phi_\mathrm{mod}(r)$ and $\psi_\mathrm{mod}(r)$, we may also neglect the non linear terms (i.e. non linear perturbations with respect to flat spacetime). To this end, we start by noticing that to Newtonian order, it is $v^{2} \simeq \phi_\mathrm{GR}(r) \simeq M/r$. As a consequence, in (\ref{eq:acc1}) we may neglect the terms proportional to $v^{2}$ and to $\left(\hb x \cdot \vb v \right) \vb v$ (which is also proportional to the orbital eccentricity) and also the term $\Phi(r) \psi_\mathrm{mod}(r)$. In summary, in the weak-field and slow-motion limit the perturbing pK acceleration that we are going to consider is purely radial and is given by \begin{equation} \vb{A}=-\frac{1}{2} \Phi(r) \hb x \doteq A_{r} \hb x. \label{eq:acc3} \end{equation} We consider two kinds of quite generic perturbations, in the form of power laws. Given a constant $\alpha^{\ton{N}}$, which is a parameter deriving from the modified gravity model, the perturbations that we focus on are in the form: \begin{equation} \phi_\mathrm{mod}(r)=\frac{\alpha^{\ton{N}}}{r^{N}}, \quad N >1, \label{eq:pertneg} \end{equation} According to our definition (\ref{eq:acc3}), we have to following pK perturbing acceleration: \begin{equation} A_{r}=\frac{1}{2} \alpha^{\ton{N}} N \frac{1}{r^{N+1}}, \label{eq:Wpos} \end{equation} We notice that, for a logarithmic perturbation in the form $\phi_\mathrm{mod}(r)=\beta \log (r/r_{0})$, it is $A_{r}=-\frac 1 2 \frac{\beta}{r}$, which can be dealt with as in the case (\ref{eq:Wpos}) above. {In particular, we will consider below the cases $N=2,3$.} \section{The anomalistic, draconitic and sidereal periods} \label{sec:periods} As we said before, in the purely Keplerian case the anomalistic, draconitic and sidereal periods $T_\mathrm{dra},\,T_\mathrm{ano},\,T_\mathrm{sid}$ are degenerate, since they coincide with unperturbed Keplerian period $T_\mathrm{K}=2\,\uppi\sqrt{a^3/\mu}$, where $a$ is the semimajor axis and $\mu\doteq GM$ is the gravitational parameter of the host star of mass $M$. As shown in \cite{2016MNRAS.460.2445I}, when some pK perturbing accelerations are present, the degeneration is generally broken. Since, at present, it is unclear which out of the aforementioned three temporal intervals is actually measured in transiting exoplanets, we will analytically calculate the pK corrections to all of them induced by the radial accelerations $A_r$ of (\ref{eq:Wpos}) for $N=2,\,3$, assumed as small perturbations of the Newtonian monopole. In the following, we will adopt the approach used in \cite{2016MNRAS.460.2445I} to deal with some standard classical and general relativistic pK accelerations. According to \cite{2016MNRAS.460.2445I}, it seems that the measured period $T_\mathrm{exp}$ should be $T_\mathrm{dra}$ for circular orbits, being possibly $T_\mathrm{ano}$ for nonzero values of the eccentricity $e$. It turns out that, while it is possible to analytically work out $T_\mathrm{ano}$ without recurring to any simplifying assumptions in $e$, only approximate expressions to the lowest orders in $e$ can be obtained for $T_\mathrm{dra},\,T_\mathrm{sid}$. For the anomalistic period, the pK corrections $\Delta T_\mathrm{ano}$ to $T_\mathrm{K}$ due to (\ref{eq:Wpos}) for $N=2,\,3$ are \begin{align} \Delta T_\mathrm{ano} \lb{ano2} & = \rp{3\,\uppi\,\alpha^{\ton{2}}\,\sqrt{a}\,\ton{1+e\cos f_0}^2}{\mu^{3/2}\,\ton{1-e^2}^2},\, N=2, \\ \nonumber \\ \Delta T_\mathrm{ano} \lb{ano3} & = \rp{3\,\uppi\,\alpha^{\ton{3}}\,\ton{1+e\cos f_0}^3}{\sqrt{a\,\mu^3}\,\ton{1-e^2}^3},\, N=3, \end{align} while for the draconitic and sideral periods, the corrections $\Delta T_\mathrm{dra},\,\Delta T_\mathrm{sid}$ to the Keplerian period are \begin{align} \Delta T_\mathrm{dra} \lb{dra2} & \simeq \rp{4\,\uppi\,\alpha^{\ton{2}}\,\sqrt{a}\,\ton{1 + 3\,e\,\cos\omega\,\cos u_0}}{\mu^{3/2}}+\mathcal{O}\ton{e^2},\, N=2, \\ \nonumber \\ \Delta T_\mathrm{dra} \lb{dra3} & \simeq \rp{6\,\uppi\,\alpha^{\ton{3}}\,\ton{1 + 3\,e\,\cos\omega\,\cos u_0}}{\sqrt{a\,\mu^3}}+\mathcal{O}\ton{e^2},\, N=3, \end{align} and \begin{align} \Delta T_\mathrm{sid} \lb{sid2} & \simeq \rp{4\,\uppi\,\alpha^{\ton{2}}\,\sqrt{a}\,\ton{1 + 3\,e\,\cos\varpi\,\cos l_0}}{\mu^{3/2}}+\mathcal{O}\ton{e^2},\, N=2, \\ \nonumber \\ \Delta T_\mathrm{sid} \lb{sid3} & \simeq \rp{6\,\uppi\,\alpha^{\ton{3}}\,\ton{1 + 3\,e\,\cos\varpi\,\cos l_0}}{\sqrt{a\,\mu^3}}+\mathcal{O}\ton{e^2},\, N=3, \end{align} respectively. In (\ref{ano2}) to (\ref{sid3}), $f_0$ is the initial value of the true anomaly $f$, $\omega$ is the argument of periastron, $u_0$ is the initial value of the argument of latitude $u\doteq f+\omega$, $\varpi\doteq \Omega+\omega$ is the longitude of periastron, $\Omega$ is the longitude of the ascending node, and $l_0$ is the initial value of the true longitude $l\doteq f + \varpi$. Note also that $\qua{\alpha^{\ton{2}}} = \mathrm{L}^4\,\mathrm{T}^{-2}$, while $\qua{\alpha^{\ton{3}}} = \mathrm{L}^5\,\mathrm{T}^{-2}$. From Eqs. (\ref{ano2})-(\ref{sid3}) we see that the three periods are degenerate also for circular orbits $e=0$. In this case, if we set \begin{equation} T_\mathrm{ano}=T_\mathrm{K}+ \Delta T_\mathrm{ano}, \label{eq:totano} \end{equation} \begin{equation} T_\mathrm{dra}=T_\mathrm{K}+ \Delta T_\mathrm{dra}, \label{eq:totdra} \end{equation} \begin{equation} T_\mathrm{sid}=T_\mathrm{K}+ \Delta T_\mathrm{sid}, \label{eq:totsid} \end{equation} we may estimate the relative impact of the perturbation of the Keplerian period: \begin{equation} \frac{T_\mathrm{ano}-T_\mathrm{K}}{T_\mathrm{K}}= \frac{3\alpha^{\ton{2}}}{2\mu a}, \, N=2 \label{eq:devano2} \end{equation} \begin{equation} \frac{T_\mathrm{ano}-T_\mathrm{K}}{T_\mathrm{K}}= \frac{3\alpha^{\ton{3}}}{2\mu a^{2}}, \, N=3 \label{eq:devano3} \end{equation} \begin{equation} \frac{T_\mathrm{dra}-T_\mathrm{K}}{T_\mathrm{K}}= \frac{2\alpha^{\ton{2}}}{\mu a}, \, N=2 \label{eq:devdra2} \end{equation} \begin{equation} \frac{T_\mathrm{dra}-T_\mathrm{K}}{T_\mathrm{K}}= \frac{2\alpha^{\ton{3}}}{\mu a^{2}}, \, N=3 \label{eq:devdra3} \end{equation} \begin{equation} \frac{T_\mathrm{sid}-T_\mathrm{K}}{T_\mathrm{K}}= \frac{2\alpha^{\ton{2}}}{\mu a}, \, N=2 \label{eq:devsid2} \end{equation} \begin{equation} \frac{T_\mathrm{sid}-T_\mathrm{K}}{T_\mathrm{K}}= \frac{2\alpha^{\ton{3}}}{\mu a^{2}}, \, N=3 \label{eq:devsid3} \end{equation} From the above results, it is evident that the impact of the perturbation is more important for exoplanets orbiting in small orbits around a low-mass hosting star. Moreover, in this ideal case, it is possible to build the quantities \begin{equation} \left(\frac{T_\mathrm{exp}-T_\mathrm{K}}{T_\mathrm{K}} \right)\mu a\,\,\, \mathrm{for}\,\,\ N=2 \label{eq:un1N2} \end{equation} \begin{equation} \left(\frac{T_\mathrm{exp}-T_\mathrm{K}}{T_\mathrm{K}} \right)\mu a^{2}\,\,\, \mathrm{for}\,\,\ N=3 \label{eq:un1N3} \end{equation} which do not depend on the planetary system but on the modified gravity model only. {For comparison, the lowest post-Newtonian corrections, as calculated in \cite{2016MNRAS.460.2445I}, lead to relative perturbations of the orbital period in the form \begin{equation} \frac{T_\mathrm{exp}-T_\mathrm{K}}{T_\mathrm{K}} \simeq \frac{R_{S}}{a} \label{eq:pk1pn} \end{equation} where $R_{S}$ is the Schwarzschild radius of the hosting star.} {Using the exoplanet catalogue\footnote{See, again \url{http://www.exoplanet.eu/catalog/} on the Internet.} we may evaluate the above quantities to obtain preliminary estimates for the model parameters $\alpha^{\ton{2}}, \alpha^{\ton{3}}$. Accordingly, if we consider the exoplanet Kepler-77b \citep{2013A&A...557A..74G}, $a=0.04501$ AU, $M=0.95\, M_{\mathrm{Sun}}$ and supposing that $T_\mathrm{exp}-T_\mathrm{K}$ is of the order of the orbital period error amounting to $\sigma_{T_\mathrm{exp}}=2.3\times 10^{-7}\,\mathrm{d}=0.02\,\mathrm{s}$, we obtain as upper limit $|\alpha^{\ton{2}}|\leq 10^{22}\, \mathrm{{m^{4}}\,{s^{-2}}}$. Similarly, if we consider the exoplanet WASP-12b \citep{2006PASP..118.1407P}, characterized by $a=0.0234$ AU, $M=1.434\, M_{\mathrm{Sun}}$, $\sigma_{T_\mathrm{exp}}=1.44\times 10^{-7}\,\mathrm{d}=0.01\,\mathrm{s}$, we obtain $|\alpha^{\ton{3}}|\leq 10^{32}\, \mathrm{{m^{5}}\,{s^{-2}}}$.} {We may compare the above estimates to those obtained in \citet{Iorio:2018fam}, where data records of the Earth's artificial satellites of the LAGEOS family were used. Taking into account the different parameterisation of the perturbing accelerations, the constraints for the $K_{2}, K_{3}$ parameters used in \citet{Iorio:2018fam}, since $\left|\alpha^{\ton 2}\right|=2 \left|K_{2}\right|$ and $\left|\alpha^{\ton 3}\right|= 6 \left|K_{3}\right|$, imply $\left|\alpha^{\ton{2}}\right|\leq 4.2\times 10^6\, \mathrm{{m^{4}}\,{s^{-2}}}$ and $\left|\alpha^{\ton{3}}\right|\leq 10^{13}\, \mathrm{{m^{5}}\,{s^{-2}}}$. Hence, we see that the preliminary constraints obtained from exoplanets are worse. {It is important to point out that, in general, a comparison is actually meaningful only for those cases where the theory parameter $\alpha^{(N)}$ does not depend on the characteristics of the planetary system (mass, charge of host star) but on the gravity model only. This is the case, for instance of a $f(T)$ gravity model, which has extensively been studied by \citet{Iorio:2012cm,Xie:2013vua, Ruggiero:2015oka} by looking at the supplementary advances of the perihelia of some planets of our Solar system: in this model a perturbation in the form (\ref{eq:Wpos}) with $N=2$ arises.} In particular, if we consider our results, we may constrain the theory parameter $\alpha$ used in those works. Since it is $\left|\alpha^{\ton 2}\right|= 32 c^{2}\left|\alpha\right|$, we obtain $\left|\alpha\right| \leq 9.5\times 10^3\, \mathrm{m^{2}}$. It is interesting to notice that, if, on the one hand, this bound is worse than those obtained by \citet{Xie:2013vua} ($\left|\alpha\right| \leq 1.2 \times 10^2\, \mathrm{m^{2}}$) and \citet{Ruggiero:2015oka} ($\left|\alpha\right| \leq 2.3 \times 10^1\, \mathrm{m^{2}}$) by about $\simeq 2-3$ orders of magnitude, on the other hand, it is better than, or at least comparable to, that obtained by \citet{Iorio:2012cm} ($\left|\alpha\right| \leq 1.8 \times 10^4\, \mathrm{m^{2}}$).} \section{Conclusions} \label{sec:conc} By analytically calculating the corrections to the anomalistic, draconitic and sideral periods due to the perturbations of the Newtonian potential falling off as the square or the cube of the distance from the central mass, we have preliminarily laid the groundwork for testing such modified models of gravity also in planetary scenarios other than our solar system with the aim of the increasing amount of data available from transiting exoplanets. While in the purely Keplerian case the aforementioned periods are degenerate, pK accelerations break the degeneracy and give rise to different expressions that we have analytically obtained. We remark that, such perturbations, are quite general and may derive from different modified gravity models, as discussed in \cite{Iorio:2018fam}. {For those gravity models where the theory parameters are independent of the characteristics of the planetary system, such as the mass of the host star, our results show that the impact of these corrections is more important for planets orbiting in small orbits around low-mass stars.} However, it is important to emphasize that our results are just intended to yield preliminary insights on the potential of the method proposed in constraining the modified models of gravity considered if and when actual dynamical modeling will reach the experimental accuracy level, and to design sensitivity analyses. They should not be regarded as actual tests since, in this case, the data of the exoplanets of interest should be reprocessed with ad-hoc modified dynamical models including also the standard pK features of motion and the alternative model(s) one is interested in. Indeed, the values of the currently available orbital and physical parameters which should be inserted in (\ref{ano2}) to (\ref{sid3}) come from purely Keplerian data analyses. As such, they are unavoidably a priori \virg{imprinted} by all the unmodelled pK dynamics, standard {(such as, for instance, terms in the form (\ref{eq:pk1pn}))} and exotic, thus making the resulting values of the corrections $\Delta T$ of (\ref{ano2}) to (\ref{sid3}) purely indicative of the potentiality of the method. As pointed out in \cite{2016MNRAS.460.2445I}, it would be important to find some exoplanetary systems for which it is possible to measure independently measured two different orbital periods identifiable with some of the ones examined here. Indeed, their difference $\delta T $ would cancel out the common Keplerian component $T_\mathrm{K}$, which is a major source of systematic error because of the lingering uncertainty on the stellar mass, leaving just a pK correction. On the other hand, even in this case, some competing classical and general relativistic pK terms may still enter $\delta T$, depending on the system's orbital geometry \cite{2016MNRAS.460.2445I}. A possible solution would be, at least in principle, a generalization of the method proposed in a different context \cite{1990grg..conf..313S} by setting up suitable linear combinations of as many different periods as possible for the same planet and/or of more planets belonging to the same extrasolar system in order to disentangle, by construction, $\alpha^{\ton{N}}$ from the other standard classical and relativistic pK corrections.
\section{Introduction} Given a Hamiltonian $L$ with $N$-degrees of freedom, the procedure of extension allows the construction of Hamiltonians $H$ with $(N+1)$ degrees of freedom admitting as first integrals $L$ itself, with all its possible constants of motion, and a characteristic first integral dependent on a rational parameter $k$. We gave several examples of extension of natural Hamiltonians on Riemannian and pseudo-Riemannian manifolds in \cite{CDRPol,CDRfi,CDRgen,CDRsuext,CDRraz,TTWcdr,CDRpw}, including anisotropic, Harmonic oscillators, three-body Calogero and Tremblay-Turbiner-Winternitz systems. In all these examples, $L$ and $H$ are natural Hamiltonians and the characteristic first integral is polynomial in the momenta of some degree depending on $k$. However, the procedure of extension do not make any assumption on $L$ other than it is a regular function on some cotangent bundle $T^*M$. Until now, we always considered $L$ as a natural Hamiltonian, in such a way that the extended Hamiltonian is itself natural. In this work, we apply the Extension Procedure on functions $L$ which are no longer quadratic in the momenta and, consequently, the extended Hamiltonian is not a natural one. The construction of an extended Hamiltonian requires the determination of a certain function $G$ well defined on all $T^*M$, up to some lower-dimensional subset of singular points. The extended Hamiltonian is a polynomial in $p_u$, $L$, while its characteristic first integral is a polynomial in $p_u$, $L$, $G$ and $X_LG$, the derivative of $G$ with respect to the Hamiltonian vector field of $L$, so that its global definition depends ultimately on $G$ and $X_LG$. Therefore, our analysis is focused on the determination of the function $G$ in the different cases, and on the study of its global behaviour on $T^*M$. Since this work is intended as a preliminary study of the possible applications of the extension procedure to non-natural Hamiltonians, we do not pretend here to obtain complete and general results, but we focus on some meaningful examples only. In Sec. 2 we recall the fundamentals of the theory of extended Hamiltonians. In Sec. 3 we consider extensions of functions quartic in the momenta and we find examples of extended Hamiltonians in analogy with the quadratic Hamiltonian case. The analysis becomes more subtle in Sec. 4, when we try to extend functions which are not polynomial in the momenta, as the case of the two point-vortices Hamiltonian. Here the global definition of the extended Hamiltonian and its characteristic first integral becomes an issue in some cases, so that the extension is possible only for some values of the constant of motion $L$, while in other cases the extension is always possible. We conclude in Sec. 5 with some examples where we are unable to find any properly globally defined extended Hamiltonian. \section{Extensions of Hamiltonian systems}\label{ex} Let $L(q^i,p_i)$ be a Hamiltonian with $N$ degrees of freedom, that is defined on the cotangent bundle $T^*M$ of an $N$-dimensional manifold $M$. We say that $L$ {\em admits extensions}, if there exists $(c,c_0)\in \mathbb R^2 - \{(0,0)\}$ such that there exists a non null solution $G(q^i,p_i)$ of \begin{equation}\label{e1} X_L^2(G)=-2(cL+c_0)G, \end{equation} where $X_L$ is the Hamiltonian vector field of $L$. If $L$ admits extensions, then, for any $\gamma(u)$ solution of the ODE \begin{equation}\label{eqgam} \gamma'+c\gamma^2+C=0, \end{equation} depending on the arbitrary constant parameter $C$, we say that any Hamiltonian $H(u,q^i,p_u,p_i)$ with $N+1$ degrees of freedom of the form \begin{equation}\label{Hest} H=\frac{1}{2} p_u^2-k^2\gamma'L+ k^2c_0\gamma^2 +\frac{\Omega}{\gamma^2}, \qquad k=\frac mn,\, m,n\in \mathbb{N}-\{0\}, \ \Omega\in\mathbb{R} \end{equation} is an {\em extension of $L$}. Extensions of Hamiltonians where introduced in \cite{CDRfi} and studied because they admit polynomial in the momenta first integrals generated via a recursive algorithm. Moreover, the degree of the first integrals is related with the choice of $m,n$. Indeed, for any $m,n\in \mathbb N-\{0\}$, let us consider the operator \begin{equation}\label{Umn} U_{m,n}=p_u+\frac m{n^2}\gamma X_L. \end{equation} \begin{prop}\cite{CDRraz} For $\Omega=0$, the Hamiltonian (\ref{Hest}) is in involution with the function \begin{equation}\label{mn_int} K_{m,n}=U_{m,n}^m(G_n)=\left(p_u+\frac{m}{n^2} \gamma(u) X_L\right)^m(G_n), \end{equation} where $G_n$ is the $n$-th term of the recursion \begin{equation}\label{rec} G_1=G, \qquad G_{n+1}=X_L(G)\,G_n+\frac{1}{n}G\,X_L(G_n), \end{equation} starting from any solution $G$ of (\ref{e1}). \end{prop} For $\Omega\neq 0$, the recursive construction of a first integral is more complicated: we construct the following function, depending on two strictly positive integers $s,r$ \begin{equation} \label{ee2} \bar K_{2s,r}=\left(U_{2s,r}^2+2\Omega \gamma^{-2}\right)^s(G_r), \end{equation} where the operator $U^2_{2s,r}$ is defined {according to (\ref{Umn})} as $$ U^2_{2s,r}=\left( p_u+\frac{2s}{r^2} \gamma(u) X_L \right)^2, $$ and $G_r$ is, as in (\ref{mn_int}), the $r$-th term of the recursion (\ref{rec}), with $G_1=G$ solution of (\ref{e1}). For $\Omega=0$ the functions (\ref{ee2}) reduce to (\ref{mn_int}) and thus can be computed also when the first of the indices is odd. \begin{teo}\cite{TTWcdr} \label{t2} For any $\Omega\in \mathbb{R}$, the Hamiltonian (\ref{Hest}) satisfies, for $m=2s$, \begin{equation}\label{cp} \{H,\bar K_{m,n}\}=0, \end{equation} for $m=2s+1$, \begin{equation} \label{cd} \{H ,\bar K_{2m,2n}\}=0. \end{equation} \end{teo} We call $K$ and $\bar{K}$, of the form (\ref{mn_int}) and (\ref{ee2}) respectively, \emph{ characteristic first integrals} of the corresponding extensions. It is proved in \cite{CDRfi,TTWcdr} that the characteristic first integrals $K$ or $\bar K$ are functionally independent from $H$, $L$, and from any first integral $I(p_i,q^i)$ of $L$. This means that the extensions of (maximally) superintegrable Hamiltonians are (maximally) superintegrable Hamiltonians with one additional degree of freedom (see also \cite{CDRsuext}). In particular, any extension of a one-dimensional Hamiltonian is maximally superintegrable. The explicit expression of the characteristic first integrals is given as follows \cite{CDRraz,TTWcdr}. For $r\leq m$, we have \begin{equation}\label{EEcal} U_{m,n}^r(G_n)= P_{m,n,r}G_n+D_{m,n,r}X_{L}(G_n), \end{equation} with $$ P_{m,n,r}=\sum_{ j=0}^{[r/2]}\binom{r}{2 j}\, \left(\frac mn \gamma \right)^{2 j}p_u^{r-2 j}(-2)^j(cL+c_0)^ j, $$ $$ D_{m,n,r}=\frac 1{n}\sum_{ j=0}^{[(r-1)/2]}\binom{r}{2 j+1}\, \left(\frac mn \gamma \right)^{2 j+1}p_u^{r-2 j-1}(-2)^j(cL+c_0)^ j, \quad m>1, $$ where $[\cdot]$ denotes the integer part and $D_{1,n,1}=\frac 1{n^2} \gamma$. The expansion of the first integral (\ref{ee2}) is \begin{equation*} \bar K_{2m,n}=\sum_{j=0} ^{m}\binom{m}{j}\left(\frac {2\Omega}{\gamma^2}\right)^jU_{2m,n}^{2(m-j)}(G_n), \end{equation*} with $U^0_{2m,n}(G_n)=G_n$, and \begin{equation}\label{Gn_alt} G_n=\sum_{k=0}^{\left[\frac{n-1}{2}\right]} \binom{n}{2k+1}(-2(cL+c_0))^k G^{2k+1}(X_L G)^{n-2k-1}. \end{equation} \begin{rmk} \rm In \cite{CDRgen} it is proven that the ODE (\ref{eqgam}) defining $\gamma$ is a necessary condition in order to get a characteristic first integral of the form (\ref{mn_int}) or (\ref{ee2}). According to the value of $c$ and $C$, the explicit form of $\gamma(u)$ is given (up to constant translations of $u$) by \begin{equation}\label{fgam} \gamma= \left\{ \begin{array}{lc} -C u & c=0 \\ \frac{1}{T_\kappa (cu)}=\frac{C_\kappa (cu) }{S_\kappa (cu)} & c\neq 0 \end{array} \right. \end{equation} where $\kappa=C/c$ is the ratio of the constant parameters appearing in (\ref{eqgam}) and $T_\kappa$, $S_\kappa$ and $C_\kappa$ are the trigonometric tagged functions (see also \cite{CDRraz} for a summary of their properties) $$ S_\kappa(x)=\left\{\begin{array}{ll} \frac{\sin\sqrt{\kappa}x}{\sqrt{\kappa}} & \kappa>0 \\ x & \kappa=0 \\ \frac{\sinh\sqrt{|\kappa|}x}{\sqrt{|\kappa|}} & \kappa<0 \end{array}\right. \qquad C_\kappa(x)=\left\{\begin{array}{ll} \cos\sqrt{\kappa}x & \kappa>0 \\ 1 & \kappa=0 \\ \cosh\sqrt{|\kappa|}x & \kappa<0 \end{array}\right. $$ $$ T_\kappa(x)=\frac {S_\kappa(x)}{C_\kappa(x)}. $$ Therefore, we have \begin{equation}\label{fgamp} \gamma'= \left\{ \begin{array}{lc} -C & c=0 \\ \frac{-c}{S_\kappa ^2 (cu)} & c\neq 0 . \end{array} \right. \end{equation} \end{rmk} \begin{rmk} \rm The global definition of the characteristic first integral of the extended Hamiltonian is ultimately determined by the definition of $G$ and its derivative $X_L G$. When these objects are globally defined, then also the characteristic first integral is. \end{rmk} From the brief exposition given above it is clear that the extensions of a function $L$ on $T^*M$ are completely determined once a solution $G$ of (\ref{e1}) is known, provided it is regular and well defined on $T^*M$. The fundamental step for the application of the extension procedure is therefore the determination of $G$. In all existing examples of extended Hamiltonians the function $L$ is always a quadratic polynomial in the momenta. The examples include the anisotropic harmonic oscillators, the Tremblay-Turbiner-Winternitz and the Post-Winternitz systems. For several of these systems there exist a quantization theory, based on the Kuru-Negro factorization in shift and ladder operators, adapted to Hamiltonians which are extended Hamiltonians \cite{CRsl}. In order to generalise the extension procedure to non-natural Hamiltonians, we focus our research here on the determination of functions $G$ solution of (\ref{e1}), leaving for other works a deeper analysis of the resulting extended systems. We consider below some examples of non-natural Hamiltonians, or natural Hamiltonians in a non-canonical symplectic or Poisson structure. Since the forms of the extended Hamiltonian and of the characteristic first integral are completely determined once known $L$ and $G$, we are solely concerned with the determination and analysis of $G$ and $X_LG$. \section{Extensions of Quartic Hamiltonians} Hamiltonians of degree four in the momenta are considered in \cite{FC}. These Hamiltonians are written in Andoyer projective variables and allow a unified representation of several mechanical systems, such as harmonic oscillator, Kepler system and rigid body dynamics, corresponding to different choices of parameters. We consider here some toy model of Hamiltonians of degree up to four in the momenta. \begin{enumerate} \item Let us assume \begin{equation} L=p^4+f_1(q)p^3+f_2(q)p^2+f_3(q)p+V(q). \end{equation} The exension of $L$ is possible if global solutions $G$ of \begin{equation}\label{LE1} X_L^2 G=-2(cL+c_0)G, \end{equation} are known. If we assume $G(q)$, then the function $$ G=C_1q+C_2, $$ is a solution of (\ref{LE1}) if $L$ is in the form \begin{eqnarray}\label{sq} L=\frac {\left(16C_1 p^2+8C_1fp+2cC_1q^2+4cC_2q+C_1f^2+8C_1C_3\right)^2}{256\,C_1^2}-\frac {c_0}c, \end{eqnarray} where $C_i$ are real constants and $f(q)$ is an arbitrary function. Hence, we have that this system admits the most general extension, with $c$ positive or negative. \item We consider now \begin{equation} L=p^4+f(q)p^2+V(q), \end{equation} If we assume $G=g(q)p$ and solve the coefficients of the monomials in $p$ in (\ref{e1}) equal to zero, we obtain two solutions, one \begin{eqnarray} V&=& \frac 1{4}(\frac 1{16}q^2c+\frac 1{8C_1}cC_2q-\frac 12\frac{C_3}{C_1(C_1q+C_2)^2}+C_4)^2-\frac {c_0}c,\cr g&=& C_1q+C_2, \cr f&=& \frac 1{16}q^2c+\frac 1{8C_1}cC_2q-\frac 12\frac{C_3}{C_1(C_1q+C_2)^2}+C_4, \end{eqnarray} that, substituted in $L$, gives, by assuming $c\neq 0$, \begin{eqnarray}\label{psq} L&=&\frac 1{1024C_1^2(C_1q+C_2)^4}\left(32p^2(C_1^3q^2+2C_1^2C_2q +C_1C_2^2)+C_1^3cq^4\right.\cr &+&\left.4C_1^2C_2cq^3+16C_1^3C_4q^2+5C_1C_2^2cq^2+(32C_1^2C_2C_4+2C_2^3c)q\right.\cr &+&\left.16C_1C_2^2C_4-8C_3\right)^2-\frac {c_0}c, \end{eqnarray} and the other, holding for $c\neq 0$ also \begin{eqnarray} V &=& \frac 1{(C_1q+C_2)^4}\left(C_4-\frac 1{1024cC_1^3}q(-C_1^7c^3q^7-8C_1^6C_2c^3q^6\right.\cr &-& 28C_1^5C_2^2c^3q^5-56C_1^4C_2^3c^3q^4+(-70C_1^3C_2^4c^3+1024c_0C_1^7\cr &-& 32C_1^5C_3c^2)q^3+(4096c_0C_1^6C_2-128C_1^4C_2C_3c^2-56C_1^2C_2^5c^3)q^2\cr &+&(-28C_1C_2^6c^3+6144c_0C_1^5C_2^2-192C_1^3C_2^2C_3c^2)q-8C_2^7c^3\cr &+&\left.4096c_0C_1^4C_2^3-128C_1^2C_2^3C_3c^2)\right),\cr g&=& C_1q+C_2,\cr f&=& \frac 1{16C_1^2}(C_1q+C_2)^2c+\frac {C_3}{(C_1q+C_2)^2}, \end{eqnarray} where the $C_i$ are constants. It is interesting to remark that in the last case $L$ is not in general a perfect square plus a constant, as in (\ref{sq}) and (\ref{psq}). \item We assume now \begin{equation} L=\left(p_1^2+\frac 1{(q^1)^2}p_2^2+V(q^1,q^2) \right)^2, \end{equation} that is the square of a natural Hamiltonian on $\mathbb E^2$, and search for functions $V$ allowing the existence of non-trivial solutions $G$ of (\ref{e1}). Again, by assuming $G(q^1,q^2)$ and collecting the terms in $(p_1,p_2)$ in (\ref{e1}), the requirement that the coefficients of the momenta are identically zero, after assuming $c_0=0$, gives the following solution \begin{eqnarray} G&=& \left(\sin(q^2)C_2+\cos(q^2)C_3\right)q^1+C_1,\cr V&=&-\frac c8 \frac{(C_3\sin(q^2)-C_2\cos(q^2))^2(2\tan(q^2)C_2C_3-C_2^2+C_3^2)}{C_3^2(\tan(q^2)C_3-C_2)^2} (q^1)^2\cr &+&\frac c4\frac{(C_3\sin(q^2)-C_2\cos(q^2))C_1}{C_3(\tan(q^2)C_3-C_2)}q^1\cr &+&F\left((\sin(q^2)C_3-\cos(q^2)C_2)q^1\right), \end{eqnarray} where $F$ is an arbitrary function. \end{enumerate} In all the examples above all the elements of the extension procedure are polynomial in the momenta, therefore, the extended Hamiltonian and its characteristic first integral are globally defined in the same way as for the natural Hamiltonian case. \section{Extensions of the Two Point-Vortices Hamiltonian} The dynamics of two point-vortices $z_j=x_j+iy_j$ of intensity $k_j$, $j=1, 2$, in a plane $(x,y)$ is described, in canonical coordinates $(Y_i=k_iy_i,X_i=x_i)$, by the Hamiltonian $$ L=-\alpha k_1k_2\ln \left((X_1-X_2)^2+\left(\frac{Y_1}{k_1}-\frac{Y_2}{k_2}\right)^2\right), $$ where $\alpha=\frac 1{8\pi}$ and $k_i$ are real numbers \cite{TT}. If $k_2\neq -k_1$, the functions $( k_1z_1+k_2z_2, L)$ are independent first integrals of the system (three real functions). If $k_2=-k_1$, the functions above give only two real independent first integrals. The coordinate transformation $$ \tilde X_1=(X_1-X_2)/2,\quad \tilde X_2=(X_1+X_2)/2,\quad \tilde Y_1=Y_1-Y_2, \quad \tilde Y_2=Y_1+Y_2, $$ is canonical and transforms $L$ into $$ L=-\alpha k_1k_2\ln \left(4\tilde X_1^2+\left(\frac {\tilde Y_1 +\tilde Y_2}{2k_1} +\frac {\tilde Y_1 -\tilde Y_2}{2k_2} \right)^2\right). $$ The exension of $L$ is possible if global solutions $G$ of (\ref{e1}) are known. We consider below two cases \begin{enumerate} \item If $k_1=k_2=k>0$ the Hamiltonian becomes $$ L=-\alpha k^2 \ln \left(4\tilde X_1^2+\frac {\tilde Y_1^2}{k^2}\right). $$ For $c=0$, $G$ in this case can be computed by using Maple, obtaining \begin{eqnarray} G= \left(\frac {\tilde Y_1+2ik\tilde X_1}{\sqrt{Q_1}}\right)^{\frac{Q_1\sqrt{2c_0}}{4\alpha k^3} } F_1 + \left(\frac {\tilde Y_1+2ik\tilde X_1}{\sqrt{Q_1}}\right)^{-\frac{Q_1\sqrt{2c_0}}{4\alpha k^3} } F_2, \end{eqnarray} where $Q_1=k^2e^{-\frac{L}{\alpha k^2}}=4\tilde X_1^2+\frac {\tilde Y_1^2}{k^2}$ and $F_i$ are arbitrary functions of $L$. The function $G$ is not single-valued in general, but it is, for example, when $\frac{Q_1\sqrt{2c_0}}{4\alpha k^3}$ is an integer. Let us consider now $X_LG$, since $Q_1$ depends on the canonical coordinates through $L$ only, $Q_1$ and the exponents in $G$ behave as constants under the differential operator $X_L$, hence, the exponents in it remain integer if they are integer in $G$ and $X_LG$ is well defined on $T^*M$. Therefore, both $H$ and its characteristic first integral are globally well defined for integer values of $\frac{Q_1\sqrt{2c_0}}{4\alpha k^3} $. We have in this case an example in which the possibility of finding an extension depends on the parameters of the system and, in particular, on the values of the constant of motion $L$. \item If $k_2=-k_1=-k$, $k>0$ the Hamiltonian is $$ L=\alpha k^2 \ln \left(4\tilde X_1^2+ \frac{\tilde Y_2^2}{k^2}\right). $$ For $c=0$, the solution $G$ is obtained by Maple as \begin{eqnarray} G= F_1\sin \left(\frac{\sqrt{2c_0}Q_2 \tilde X_2}{2\alpha k^2 \tilde Y_2}\right) + F_2 \cos \left(\frac{\sqrt{2c_0}Q_2 \tilde X_2}{2\alpha k^2 \tilde Y_2}\right), \end{eqnarray} where $Q_2=k^2e^{\frac{L}{\alpha k^2}}$ and $F_i$ are arbitrary first integrals of $L$. It is evident that the function $G$ above, real or complex, is always globally defined, as well as $X_LG$, up to lower-dimensional sets, and this makes possible the effective extension of the Hamiltonian $L$. We observe that in this case the extended Hamiltonian has four independent constants of motion. \end{enumerate} \section{Hamiltonians with no known extension} The procedure of extension can be applied in any Poisson manifold, not only in symplectic manifolds with canonical symplectic structure, as in the examples above. Indeed, if $\pi$ is the symplectic form or the Poisson bivector determining the Hamiltonian structure of the system of Hamiltonian $L$ in coordinates $(x^1, \ldots,x^n)$, then the symplectic or Poisson structure of the extended manifold in coordinates $(u,p_u,x^1, \ldots,x^n)$ is given by $$ \Pi=\left(\begin{array}{cc|c} 0 & 1 & 0 \\ -1 & 0 & \\ \hline 0 & & \pi \end{array} \right). $$ We recall that the Hamiltonian vector field of $L$ on Poisson manifolds with Poisson vector $\pi$ is $\pi dL$. We consider below two cases of Hamiltonian systems for which we are unable to find extended Hamiltonians. The obstruction to the extension lies in both cases in the non-global definition of the known solutions of (\ref{e1}). \subsection{The Lotka-Volterra system} It is well known that the Lotka-Volterra prey-predator system \begin{eqnarray} \dot x=a x-b x y\\ \dot y=d xy -gy, \end{eqnarray} where $a,b,d,g$ are real constants, can be put in Hamiltonian form (see \cite{Nu}), for example with Poisson bivector \begin{equation} \pi=\left ( \begin{matrix} 0 & A \cr -A & 0 \end{matrix} \right),\quad A=-x^{1+g}y^{1+a}e^{-by-dx}, \end{equation} and Hamiltonian \begin{equation} L=x^{-g}y^{-a}e^{dx+by}. \end{equation} Since the manifold is symplectic, there is only one degree of freedom, and the existence of the Hamiltonian itself makes the system superintegrable. The equation (\ref{e1}) with $c=0$ admits solution $G$ of the form \begin{equation} G=F_1(L) e^{-B} +F_2(L) e^B, \end{equation} where $$ B=-\frac{\sqrt{-2c_0}}a\int{\left[t\left(W \left( -\frac ba t^{-\frac ga}x^{\frac ga}ye^{\frac{d(t-x)-by}a}\right)+1\right)\right]^{-1}dt}, $$ and $W$ is the Lambert W function, defined by $$ z=W(z)e^{W(z)}, \quad z\in \mathbb C. $$ If we put $F_1=\frac 12 \left(\alpha+\frac \beta i\right)$, $F_2=\frac 12 \left(\alpha-\frac \beta i\right)$, where $\alpha$ and $\beta $ are real constants, then $$ G=\alpha \cos B - \beta \sin B. $$ However, the Lambert W function is multi-valued in $\mathbb C-\{0\}$, even if its variable is real (in this case, it is defined only for $z\geq-1/e $ and double-valued for $-1/e<z<0$). Therefore, such a $G$ cannot provide a globally defined first integral and does not determine an extension of $L$. By comparison, the Hamiltonian of the one-dimensional harmonic oscillator admits iterated extensions with $c=0$ and $c_0$ always equal to the elastic parameter of the first oscillator. One obtains in this way the $n$-dimensional, $n\in \mathbb N$, anisotropic oscillator with parameters having rational ratios, and therefore always superintegrable \cite{CDRraz}. This is not the case for the Lotka-Volterra system, where the periods of the closed trajectories in $x,y$ are not all equal, as happens for the harmonic oscillators. \subsection{The Euler system} It is well known that the Euler rigid-body system is described by the Hamiltonian $$ L=\frac 12\left(\frac {m_1^2}{I_1}+\frac {m_2^2}{I_2}+\frac {m_3^2}{I_3}\right), $$ on the Poisson manifold of coordinates $(m_1,m_2,m_3)$ and Poisson bivector $$ \pi=\left(\begin{matrix}0 & -m_3 & m_2 \cr m_3 & 0 &-m_1 \cr -m_2 & m_1 & 0 \end{matrix} \right). $$ The $(m_i)$ are the components of the angular momentum in the moving frame and they are conjugate momenta of the three components of the principal axes along one fixed direction. A Casimir of $\pi$ is $$ M=m_1^2+m_2^2+m_3^2. $$ The system has two functionally independent constants of the motion: $L$ and one of the components of the angular momentum in the fixed frame. A solution of equation (\ref{e1}) can be found by using the Kuru-Negro \cite{CRsl} ansatz \begin{equation}\label{KN} X_L G=\pm \sqrt{-2(cL+c_0)}G, \end{equation} whose solutions are solutions of the equation (\ref{e1}) too. A solution of (\ref{KN}) is \begin{eqnarray} G=f e^{\left[\mp \frac{I_1I_2I_3}{\sqrt{I_2(I_1-I_3)}}\sqrt{\frac{-2(cL+c_0)}{X_2}}F\left(m_1\sqrt{\frac{I_2(I_1-I_3)}{X_1}},\sqrt{\frac{I_3(I_1-I_2)X_1}{I_2(I_1-I_3)X_2} }\right)\right]}, \end{eqnarray} where $f$ is an arbitrary function of the first integrals $L$ and $M$, \begin{eqnarray} X_1=I_1I_2(M-2I_3L),\\ X_2=I_1I_3(2I_2L-M), \end{eqnarray} and $F(\phi,k)$ is the incomplete elliptic integral of first kind $$ F(\phi,k)=\int_0^\phi \frac {d\theta}{\sqrt{1-k^2\sin ^2 \theta}}, $$ which is a multiple valued function, being the inverse of Jacobi's sinus amplitudinis $sn$ function. The function $G$, possibly complex valued and with singular sets of lower dimension, depends essentially on $m_1$, since all other arguments in it are either constants or first integrals. Since our function $G$ is not single-valued, we cannot in this case build an extended Hamiltonian from $L$. \section{Conclusions} By the examples discussed in this article we see that extended Hamiltonians can be obtained also from non-natural Hamiltonians $L$ and not only from the natural ones. The case when $L$ is quartic in the momenta is very much similar to the quadratic cases studied elsewhere, and the extension procedure does not encounter new problems. For the two point-vortices Hamiltonian, we have that global solutions of (\ref{e1}) can be obtained in correspondence of particular choices of parameters in $L$. In the remaining examples, we are unable to obtain globally defined solutions of (\ref{e1}) and we cannot build extensions in these cases. In future works, the extended Hamiltonians obtained here could be studied in more details, while the search for global solutions for the cases of Lotka-Volterra and of the rigid body, or for the reasons of their non-existence, could be undertaken. \ \ {\bf Conflict of Interest}: the authors declare that they have no conflicts of interest.
\section{Introduction} As autonomous agents become commonplace, the challenging task of developing control policies for communication between agents must be addressed. For a stationary point-to-point transmitter-receiver pair under an average power constraint, the total transmittable data is unbounded as time tends to infinity, regardless of distance. In contrast, we show that if the nodes move away from each other at a constant speed, then the maximum transmittable data is bounded even as time tends to infinity. Without loss of generality we consider one stationary and one mobile node. This bound is of relevance for aerial communications, where channel gain is dominated by path loss exponents and typically high speeds result in rapid growth in distances. Examples include unmanned aerial vehicles (UAVs) or spacecraft. We consider dynamic deployment scenarios (e.g.\ \cite{faqir2018energy,zeng2017energy,wu2019fundamental,zeng2016throughput}) where UAVs, spacecraft, or other agents are transmitting while moving, and are interested in characterising the total data transfer as a function of mobility dynamics and design parameters, such as transmit power. We do not consider transmitter power control as a function of distance as this is challenging to implement in practice, especially at higher speeds. Linear constant speed trajectories, as considered in \cite{faqir2018energy,zeng2017energy}, have practical importance for fixed-wing aircraft, since minimum propulsion energy operation occurs at a constant velocity, and result in structured time-varying communication channels. For dense UAV deployment scenarios with random mobility, works such as \cite{yuan2018capacity} determine capacity bounds and outage probabilities. Even for a simple linear trajectory in 3D space, the expression for total transmittable data formulated in Section~\ref{sec:problemDef} is non-trivial to evaluate due to the structure of the argument of the logarithm. We instead derive closed-form expressions for specific cases. In Section~\ref{sec:OneDimension} we derive a bound for total transmittable data in 1D and show the bound to be tight for reasonable parameter values. In Section~\ref{sec:alpha2} we consider arbitrary linear agent trajectories deriving an expression for total data transmission, assuming ideal free space path loss. \section{Problem Definition}\label{sec:problemDef} The Shannon capacity is an information-theoretic limit on the achievable communication rate for reliable transmission across a noisy channel. The corresponding limit on the total amount of transmittable data over time $T$ is \begin{equation}\label{eq:Shannon_integral} D_T := B\int_0^T \ln\left(1 + \operatorname{SNR}(t)\right)\mathrm{d}t, \end{equation} where $B$ is the bandwidth and $\operatorname{SNR}(\cdot)$ the time-varying signal-to-noise ratio at the receiver. $D_T$ is measured in nats (natural units of information). Neglecting fast-fading dynamics, the channel gain is dominated by line-of-sight fading, typical of aerial channels \cite{faqir2018energy}. Then, the $\operatorname{SNR}$ is \begin{equation} \label{eq:SNR} \operatorname{SNR}(P,t) = \frac{P G}{\sigma^2}\left(\frac{d_0}{d(t)}\right)^\alpha, \end{equation} where $\sigma^2$ is the receiver noise power, $\alpha\geq2$ (but typically not much greater than $2$) is the path loss exponent, and $d(\cdot)$ is the time-varying distance between transmitter and receiver, satisfying $d(t)>d_0,\forall t\in\mathbb{R}^+,$ for reference distance~$d_0$. $P$ is the average transmission power in Watts and $G$ is a unitless antenna parameter representing gain and path loss at the distance $d_0$. For simplicity we define $S:=PG\sigma^{-2}$. Consider wireless transmission between a stationary node at the origin and a mobile transmitter at constant longitudinal displacement $z_0\geq 0$. The transmitter follows a linear trajectory at constant speed $v$. At time $t \in [0,T]$ the lateral position of the transmitter relative to the receiver is \begin{equation} \label{eq:UAV_position} x(t) = x_0 + vt, \end{equation} and $x_0$ the initial lateral position. The distance is \begin{equation} \label{eq:distance} d(t) = \sqrt{z_0^2 + (x_0 + vt)^2}. \end{equation} Simplifying the distance operator through removing the $\sqrt{(\cdot)}$, either by assuming $z_0=0$ (Section~\ref{sec:OneDimension}) or setting $\alpha=2$ (Section~\ref{sec:alpha2}), allows us to determine closed-form expressions for the total amount of data that can be reliably communicated in these special cases. \section{Characterization for general $\alpha$ in 1D}\label{sec:OneDimension} We find the total data transfer in a one-dimensional setting, where $z_0=0$, and hence $d(t)=x_0+vt$, as a function of $B$, $v$, $S$ and $\alpha$. The restriction $z_0=0$ simplifies the analysis and arises in the context of a mobile UAV communicating with a static aerial base station at the same altitude. \begin{theorem} \label{th:one_dimension} The total transmittable data as the interval length $T\rightarrow \infty$ for $z_0=0$, $x_0= d_0$ and $v>0$, i.e. \begin{equation} \label{eq:int_inf_1D} D_{\infty,1} := \lim_{T\rightarrow \infty} B \int_0^T \ln\left(1 + S\left(\frac{d_0}{d_0 + vt}\right)^\alpha\right) \mathrm{d}t, \end{equation} is finite and given by \begin{equation} \label{eq:D_inf_1D} \begin{split} D_{\infty,1} = \frac{B d_0}{v} \Bigg(& \pi\sqrt[\alpha]{S} \csc\left(\frac{\pi}{\alpha}\right) - \ln(1+S) + \\ &\alpha \sum_{n=1}^\infty \left\{\frac{(-1)^{n+1}}{S^n(\alpha n + 1)}\right\} - \alpha \Bigg), \end{split} \end{equation} where the sum is positive and convergent for $S>1$. \end{theorem} See Appendix~\ref{app:A} for the proof. Restricting $S>1$ implies that the transmit signal power, before undergoing any channel attenuation, is greater than the receiver noise power. In practice we find it reasonable to assume $S\gg1$. Since the sum is monotonically decreasing in both $S$ and $\alpha$, we may determine a lower bound $\tilde{D}_{\infty,1}$ on $D_{\infty,1}$. \begin{corollary} \label{co:approximation} A lower bound for $D_{\infty,1}$ is given by \begin{equation} \label{eq:D_inf_1D_approx} \begin{split} \tilde{D}_{\infty,1} := \frac{B d_0}{v} \left(\pi\sqrt[\alpha]{S} \csc\left(\frac{\pi}{\alpha}\right) - \ln(1+S) - \alpha \right), \end{split} \end{equation} where the error $e_{\infty,1}$ between $D_{\infty,1}$ and the bound $\tilde{D}_{\infty,1}$, \begin{equation} \label{eq:ApproxError} e_{\infty,1} := D_{\infty,1} - \tilde{D}_{\infty,1} = \frac{B d_0}{v}\sum_{n=1}^\infty \left\{\frac{(-1)^{n+1}}{S^n(\alpha n + 1)}\right\}, \end{equation} is bounded as \begin{equation} \label{eq:D_inf_1D_approx_error} e_{\infty,1} \leq \frac{B d_0 \alpha}{v} \left( 1 - \sqrt{S}\atan\left(\frac{1}{\sqrt{S}}\right)\right) \leq \frac{B d_0 \alpha}{v} \left( 1 - \frac{\pi}{4}\right). \end{equation} Furthermore, $e_{\infty,1} \rightarrow 0$ as $S \rightarrow \infty$. \end{corollary} See Appendix~\ref{app:B} for a proof. Fig.~\ref{fig:1DApproxError} compares $\tilde{D}_{\infty,1}$ and $D_{\infty,1}$ for the parameters shown in Table~\ref{tab:Params} and a range of~$S$\footnote{For the sake of relatability all data is plotted in MB, not nats.}. Setting $P=1$\,mW results in $S=10^5$. The corresponding error is shown in Fig.~\ref{fig:1DApproxError_2} as $e_{\infty,1} = 3.33\times 10^{-6}$\,MB$=0.278$\,nats. Fig.~\ref{fig:1DApproxError_2} also shows that $e_{\infty,1}=\frac{B d_0 \alpha}{v} \left( 1 - \frac{\pi}{4}\right) = 1.5\times10^{-3}$\,MB when $S=1$, but decreases rapidly as $S$ increases. \input{Table1.tex} \begin{figure}[t] \vspace{-0.6cm} \centering \subfloat[Comparison of $D_{\infty,1}$ and $\tilde{D}_{\infty,1}$]{% \includegraphics[width=0.5\columnwidth]{1DApproxError_small}% \label{fig:1DApproxError_1}% } \subfloat[Comparison of $e_{\infty,1}$ with bound]{% \includegraphics[width=0.5\columnwidth]{1DApproxError_small_2}% \label{fig:1DApproxError_2}% } \caption{Comparison of $D_{\infty,1}$, $\tilde{D}_{\infty,1}$.} \label{fig:1DApproxError} \end{figure} Fig.~\ref{fig:Power_Velocity_Figure} shows $D_{\infty,1}$ as a function of speed $v\in[1,100]$ and power $P\in[10^{-3},100]$, calculated using \eqref{eq:D_inf_1D}. We approximate the infinite sum by the first $100$ terms. Since $e_{\infty,1}$ is monotonically decreasing in $P$ and $v$, the maximum approximation error corresponds to data point $(P,v)=(10^{-3},1)$ and is $e_{\infty,1}=0.333$\,nats. Although controlling node mobility is outside of the scope of this paper, Fig.~\ref{fig:Power_Velocity_Figure} shows the set $\{(P,v) \mid D_{\infty,1} = M\}$ of admissible powers and velocities that successfully transmit $M$\,bits of data. $(P,v)$ may then be chosen from this set to achieve alternative operating points, such as energy efficiency \cite{faqir2018energy}. Since many transmitters operate at a single, or finite set of power levels, $v$ may often be found as an explicit function of $(P,M)$. \begin{figure}[b] \centering \includegraphics[width=0.9\columnwidth]{Throughput_speed_power} \caption[TODO]{$D_{\infty,1}$ as a function of speed $v$ and transmit power $P$ in the 1D case ($z_0=0$) for parameters from Table~\ref{tab:Params}.} \label{fig:Power_Velocity_Figure} \end{figure} For comparison, the red and blue lines show $D_{\infty,1}$ calculated from the Matlab quadrature function \texttt{integral} of \eqref{eq:Shannon_integral} for infinite $T$. Fig.~\ref{fig:FiniteTimePlot} shows $D_T/D_{\infty,1}$ as a function of both time and position for a range of speeds. $D_T$ converges faster to $D_{\infty,1}$ with increasing $v$. Even for a moderately slow speed of $v=5$\,m/s, over $80\%$ of the data is transmitted within one hour. For the AWGN case here, with fixed power and speed, any SNR type constraint can be directly converted to a maximum allowable distance between the transmitter and receiver. Similarly, if constraints on node endurance (e.g.\ finite energy) are functions of velocity, one may quantitatively investigate how limiting endurance is, compared to the bound $D_{\infty,1}$. Fig.~\ref{fig:FiniteTimePlot} shows a decreasing marginal gain in transmitted data as endurance increases. \begin{figure}[tb] \centering \includegraphics[width=\columnwidth]{FiniteTime} \caption[TODO]{Finite-time data $D_T$ as a proportion of the bound $D_{\infty,1}$ in the 1-D case for a range of speeds $v$ in m/s.} \label{fig:FiniteTimePlot} \end{figure} \section{Characterization for $\alpha=2$} \label{sec:alpha2} We now consider the specific, but not unrealistic case of $\alpha=2$, corresponding to ideal free space. The maximum transmittable data over time $T$ simplifies to \begin{equation}\label{eq:DFiniteTime} D_T = B \int_0^T \ln\left(1 + \frac{S d_0^2}{z_0^2 + x(t)^2}\right)\mathrm{d}t. \end{equation} \begin{theorem} \label{th:alpha2} The total transmittable data as $T\rightarrow\infty$ for a UAV with starting position $x_0\geq d_0$, $v>0$ and $\alpha=2$, i.e. \begin{equation} \label{eq:int_inf_alpha2} D_{\infty,2} := \lim_{T\rightarrow \infty} B \int_0^T \ln\left(1 + \frac{S d_0^2}{z_0^2 + x(t)^2}\right)\mathrm{d}t, \end{equation} for trajectory \eqref{eq:UAV_position} is finite and given by \begin{equation} \begin{split} \label{eq:D_infty_2} D_{\infty,2} &= \frac{B}{v} \Bigg[ -x_0\ln \left( 1 + S\right) + \pi\left(\sqrt{\epsilon}-z_0\right)\\ &-2 \left(\sqrt{\epsilon}\atan\left(\frac{x_0}{\sqrt{\epsilon}}\right) -x_0\atan\left(\frac{x_0}{z_0}\right)\right) \Bigg]. \end{split} \end{equation} where $\epsilon := z_0^2 + Sd_0^2$. \end{theorem} The proof is in Appendix~\ref{app:C}. Fig.~\ref{fig:z0} shows how $D_{\infty,2}$ varies with displacement $z_0$. In the straightforward case of $\alpha=2, \ z_0=0$ a simpler expression follows. \begin{figure}[tb] \centering \includegraphics[width=\columnwidth]{z0_Fig} \caption[TODO]{$D_{\infty,2}$ as a function of altitude $z_0$.} \label{fig:z0} \end{figure} \begin{corollary} In the 1-D case ($z_0=0$), with $x_0 = d_0$ and $v>0$, \begin{equation} D_{\infty,3} := \lim_{T\rightarrow \infty} B \int_0^T \ln\left(1 + \frac{S d_0^2}{x(t)^2}\right)\mathrm{d}t, \end{equation} the maximal transmittable data as $T\rightarrow \infty$ is \begin{equation} D_{\infty,3} = \frac{Bd_0}{v}\Bigg[ 2\sqrt{S}\left(\frac{\pi}{2} - \atan\left(\frac{1}{\sqrt{S}}\right)\right) - \ln\left(1+S\right)\Bigg]. \end{equation} \end{corollary} \begin{proof} The proof follows by setting $z_0=0,\ x_0=d_0$ in \eqref{eq:D_infty_2} or by setting $\alpha=2$ in \eqref{eq:D_inf_1D} and noting (e.g. using \cite[p. 422]{knopp1990theory}) \begin{equation} \sum_{n=1}^\infty \left\{\frac{(-1)^{n+1}}{S^n(2n+1)}\right\} = 1 - \sqrt{S}\atan\left(\frac{1}{\sqrt{S}}\right). \end{equation} \end{proof} \section{Conclusions} We have considered the amount of data that can be reliably transmitted between a stationary and a mobile agent on a straight trajectory. We have shown that, as opposed to static channels, the maximum transmittable data is bounded, even as time tends to infinity. For certain special cases of path loss and mobility profiles, we have been able to derive closed-form expressions for these bounds. These bounds have been verified through simulations and may be used for design/specification of mobile communication channels subject to data transmission constraints. \appendices \section{Proof of Theorem~\ref{th:one_dimension}} \label{app:A} Note, e.g. from \cite[p. 212]{knopp1990theory}, the identity \begin{equation} \label{eq:identity_log1} \ln(1+z) = \begin{cases} \sum_{n=1}^\infty \frac{(-1)^{n+1}z^n}{n},& \text{if } |z| < 1, z \in \mathbb{R},\\ \ln(z) + \sum_{n=1}^\infty \frac{(-1)^{n+1}}{nz^n},& \text{if } |z| \geq 1, z \in \mathbb{R}, \end{cases} \end{equation} and \begin{equation} \label{eq:identity_csc} \text{csc}(z) = \frac{1}{z} + 2z \sum_{n=1}^\infty \frac{(-1)^n}{z^2 - (\pi n)^2} \quad ; \frac{z}{\pi} \not \in \mathbb{Z}, z \in \mathbb{R}. \end{equation} Starting with \eqref{eq:int_inf_1D}, we use the known affine trajectory $x(t) = x_0 + vt$ to change the variable of integration, resulting in \begin{equation*} D_{\infty,1} = \lim_{T\rightarrow \infty}\frac{B}{v} \underbrace{\int_{d_0}^{x_T} \ln\left(1 + S\left(\frac{d_0}{x}\right)^\alpha\right) \mathrm{d}x}_{:=D_a}, \end{equation*} where $x_T := x(T)$. Define $\gamma := Sd_0^\alpha$. Ignoring the limits for now, and in accordance with identity \eqref{eq:identity_log1}, \begin{align*} D_a &= \int_{d_0}^{\sqrt[\alpha]{\gamma}} \ln\left(1 + \frac{\gamma}{x^\alpha}\right)\mathrm{d}x + \int_{\sqrt[\alpha]{\gamma}}^{x_T} \ln\left(1 + \frac{\gamma}{x^\alpha}\right)\mathrm{d}x \\ D_a &= \underbrace{\int_{d_0}^{\sqrt[\alpha]{\gamma}} \ln\left(\frac{\gamma}{x^\alpha}\right) + \sumn \frac{\onen}{n}\left(\frac{x^\alpha}{\gamma}\right)^n \mathrm{d}x}_{:=D_{a1}} \\ & + \underbrace{\int_{\sqrt[\alpha]{\gamma}}^{x_T} \sumn \frac{\onen}{n}\left(\frac{\gamma}{x^\alpha}\right)^n \mathrm{d}x}_{:= D_{a2}}, \end{align*} where the domain of integration has been split at $\gamma x^{-\alpha}=1$. Considering just $D_{a1}$, we are able to switch the order of integration and summation, because the infinite sum is absolutely and uniformly convergent on the domain of integration, as may be shown through the Weierstrass M-test \cite[Theorem~7.10]{rudin1964principles}. Therefore, \begin{align*} D_{a1} &= \left[ x \left( \ln\left(\frac{\gamma}{x^\alpha}\right) + \alpha\right) + \sumn \frac{\onen}{n}\left(\frac{x^{\alpha n + 1}}{\gamma^n (\alpha n + 1)}\right) \right]_{x_0}^{\sqrt[\alpha]{S}} \\ &= d_0 \left[ \alpha \sqrt[\alpha]{S} - \alpha - \ln(S) + \sumn \frac{\onen}{n(\alpha n + 1)}\left(\sqrt[\alpha]{S} - \frac{1}{S^n}\right)\right]. \end{align*} The order of integration and summation may similarly be swapped in $D_{a2}$, resulting in \begin{align*} D_{a2} &= \sumn \frac{\onen}{n(1-\alpha n)} \left[x\left(\frac{\gamma}{x^\alpha}\right)^n\right]_{\sqrt[\alpha]{\gamma}}^{x_T} \\ &= \sumn \frac{\onen}{n(1-\alpha n)} \left(x_T\left(\frac{\gamma}{x_T^\alpha}\right)^n - \sqrt[\alpha]{S}d_0\right). \end{align*} The term $D_{a1}$ does not change with $x_T$, and the limit \begin{equation*} \lim_{x_T\rightarrow\infty} D_{a2} = -\sumn \frac{\onen}{n(1-\alpha n)} \left(\sqrt[\alpha]{S}d_0\right). \end{equation*} Therefore, the total transmittable data \begin{equation*} \begin{split} D_{\infty,1} &= \frac{B d_0}{v} \Bigg[ \alpha \sqrt[\alpha]{S} - \alpha - \ln(S) \\& + \sumn \frac{\onen}{n(\alpha n + 1)}\left(\sqrt[\alpha]{S} - \frac{1}{S^n}\right) - \sqrt[\alpha]{S}\sumn \frac{\onen}{n(1-\alpha n)}\Bigg]. \end{split} \end{equation*} Noting that, \begin{equation} (n (\alpha n + 1))^{-1} - (n (1-\alpha n))^{-1} = -2\alpha(1-(\alpha n)^2)^{-1}, \end{equation} we may rewrite the infinite sums in $D_{\infty,1}$, resulting in \begin{equation*} \begin{split} D_{\infty,1} &= \frac{B d_0}{v} \Bigg[ \alpha \sqrt[\alpha]{S} - \alpha \underbrace{- \ln(S) - \sumn\frac{\onen}{n S^n}}_{-\ln(1+S)} \\ & + \alpha \sumn \frac{\onen}{(\alpha n + 1)S^n} - \underbrace{2\alpha\sqrt[\alpha]{S} \sumn \frac{\onen}{1-(\alpha n)^2}}_{-\left(\pi\sqrt[\alpha]{S}\csc\left(\frac{\pi}{\alpha}\right)-\alpha\sqrt[\alpha]{S}\right)} \Bigg], \end{split} \end{equation*} where the transformation in the first line follows from \eqref{eq:identity_log1}. Restricting $S >1$, the transformation in the second line follows from \eqref{eq:identity_csc}. Since $\alpha\geq2$, the restriction of the domain of \eqref{eq:identity_csc} to $\frac{z}{\pi} \not \in \mathbb{Z}$ is not prohibitive. Finally, \begin{equation} D_{\infty,1} = \frac{B d_0}{v} \Bigg[ \pi\sqrt[\alpha]{S} \csc\left(\frac{\pi}{\alpha}\right) - \ln(1+S) + \alpha \sumn \left\{\frac{\onen}{S^n(\alpha n + 1)}\right\} - \alpha \Bigg]. \end{equation} \section{Proof of Corollary~\ref{co:approximation}}\label{app:B} Simply ignoring the infinite sum results in \eqref{eq:D_inf_1D_approx}. The infinite sum in \eqref{eq:D_inf_1D} is bounded for $S>1$ if $\alpha\geq2$ and is monotonically decreasing in both $\alpha$ and $S$. Therefore, \begin{align*} \sumn \left\{\frac{\onen}{S^n(\alpha n + 1)}\right\} \leq \sumn & \left\{\frac{\onen}{S^n(2 n + 1)}\right\}= \\ &1 - \sqrt{S}\atan\left(\frac{1}{\sqrt{S}}\right) \leq 1 - \frac{\pi}{4}, \end{align*} where the infinite sum is evaluated noting that \cite[p. 422]{knopp1990theory} \begin{align*} \atan(z) &= -\sum_{n=0}^\infty (-1)^{n+1}\frac{z^{2n+1}}{2n+1}, z \in \mathbb{R}. \end{align*} Therefore, \begin{equation*} D_{\infty,1} - \tilde{D}_{\infty,1} \leq \frac{B d_0 \alpha}{v} \left( 1 - \sqrt{S}\atan\left(\frac{1}{\sqrt{S}}\right)\right) \leq \frac{B d_0 \alpha}{v} \left( 1 - \frac{\pi}{4}\right). \end{equation*} Since $\lim_{S\rightarrow \infty} \sqrt{S}\atan\left(\frac{1}{\sqrt{S}}\right)=1$, the error $e_{\infty,1}\rightarrow 0$ as $S\rightarrow \infty$. \section{Proof of Theorem~\ref{th:alpha2}}\label{app:C} Note that, using integration by parts, \begin{equation}\label{eq:identity_log2} \int_c^b \ln(z^2 + a)\mathrm{d}z= \left[z\left(\ln(z^2+a) - 2\right) + 2\sqrt{a}\atan\left(\frac{z}{\sqrt{b}}\right) \right]_c^b. \end{equation} We begin by rewriting \eqref{eq:int_inf_alpha2} as \begin{equation} D_{\infty,2} = \lim_{x_T\rightarrow \infty} B \int_{x_0}^{x_T} \ln\left((z_0^2 + S d_0^2) + x^2\right) - \ln\left(z_0^2 + x^2\right)\mathrm{d}x. \end{equation} Integrating the first logarithm, using $\epsilon=z_0^2+Sd_0^2$ and \eqref{eq:identity_log2}, \begin{align*} \int_{x_0}^{x_T} \ln&\left((z_0^2 + S d_0^2) + x^2\right) \mathrm{d}x = 2(x_0-x_T) + x_t\ln(x_T^2+\epsilon) \\ & \ - x_0\ln(x_0^2+\epsilon) + 2\sqrt{\epsilon}\left(\atan\left(\frac{x_T}{\sqrt{\epsilon}}\right) - \atan\left(\frac{x_0}{\sqrt{\epsilon}}\right)\right). \end{align*} Similarly, the second logarithm is integrated as \begin{align*} \int_{x_0}^{x_T} \ln & \left(z_0^2 + x^2\right)\mathrm{d}x = 2(x_0-x_T) + x_T\ln(x_T^2+z_0^2) \\ & - x_0\ln(x_0^2+z_0^2) + 2z_0\left(\atan\left(\frac{x_T}{z_0}\right) - \atan\left(\frac{x_0}{z_0}\right)\right). \end{align*} Therefore, \begin{align*} D_{\infty,2} =& \lim_{x_T\rightarrow \infty} \frac{B}{v} \Bigg[ x_T\ln\left(\frac{x_T^2+\epsilon}{x_T^2+z_0^2}\right) + x_0\ln\left(\frac{x_0^2+z_0^2}{x_0^2+\epsilon}\right) \\ & + 2\sqrt{\epsilon}\left(\atan\left(\frac{x_T}{\sqrt{\epsilon}}\right) - \atan\left(\frac{x_0}{\sqrt{\epsilon}}\right)\right) \\ &+ 2z_0\left(\atan\left(\frac{x_T}{z_0}\right) - \atan\left(\frac{x_0}{z_0}\right)\right) \Bigg] \\ =& \frac{B}{v}\Bigg[ x_0\ln\left(1 + S\right) + \pi\left(\sqrt{z_0^2+Sd_0^2}-z_0\right) \\ &- 2\left(\sqrt{z_0^2+Sd_0^2}\atan\left(\frac{x_0}{\sqrt{z_0^2+Sd_0^2}}\right) - z_0\atan\left(\frac{x_0}{z_0}\right) \right) \Bigg].\\ \end{align*} \section{Introduction} Networks of autonomous agents are becoming ubiquitous, motivating the challenging task of developing control policies for communication across these networks. The aim is usually to maximize the data transmission rate, or to reliably transfer a minimum amount of data subject to network constraints. For a stationary transmitter-receiver pair under an average transmit power constraint, the total amount of data that can be transmitted is unbounded as transmission time tends to $\infty$. We show that, in contrast, if the transmitter is moving at a constant speed, then the maximum amount of data that can be transmitted is bounded. This bound is of particular relevance to networks of aerial vehicles, where distances may quickly grow large and channel gain is dominated by path loss dynamics \section{Problem Definition} The Shannon capacity is a communication-theoretic limit on the achievable data rate for reliable transmission across a noisy channel. The corresponding upper bound on the total transmittable data over time~$T$ is \begin{equation} \label{Shannon_Integral} D_T := B\int_0^T \ln \left( 1 + \mathrm{SNR}(t) \right) \mathrm{d}t~~\mathrm{bits}, \end{equation} where $B$ is the bandwidth and $\mathrm{SNR}(t)$ is the time-varying signal-to-noise ratio at the receiver, and $D_T$ is measured in nats (natural unit of information) per second. Consider transmission over a wireless channel between a stationary ground node positioned at teh origin and a UAV transmitter at constant altitude $z_0\geq0$. The UAV follows a linear trajectory at constant speed $v$. At time $t$ the lateral position of the UAV, relative to the receiver, is given as \begin{equation} x(t) = x_0 + vt, \end{equation} where $x_0$ corresponds to initial position. Neglecting fast-fading dynamics, the channel gain is dominated by line-of-sight (LoS) fading, typical of aerial inter-UAV channels. The SNR at the receiver may be modelled as \begin{equation} SNR(t) = \frac{P G}{\sigma^2}\left(\frac{d_0}{d(t)}\right)^{2\alpha} \end{equation} where $\sigma^2$ is the noise power at the receiver, $\alpha>1$ (but typically close to $1$ for LoS applications) is the path loss exponent, $d_0$ the reference distance satisfying $d_0 \leq d(t), \forall t\in\mathbb{R}_+$, where \begin{equation} d(t) = \sqrt{z_0^2 + x(t)^2}, \end{equation} is the time-varying distance between transmitter and receiver. $P$ is the transmission power, assumed constant, and $G$ is a unitless antenna parameter representing gain and path loss at reference distance $d_0$. \section{Characterization for general $\alpha$} \begin{table}[] \centering \label{tab:01} \caption[TODO]{Table of constant simulation parameters.} \begin{tabular}{|l|l|l|l|} \hline $B$(Hz) & $\sigma^{2}$(W) & $d_0$(m) & $G$ \\ \hline $10^5$ & $10^{-8}$ & $1$ & $1$ \\ \hline \end{tabular} \end{table} \begin{figure}[t!] \centering \includegraphics[width=0.5\columnwidth]{Images/Throughput_alpha_z0} \caption[TODO]{Maximum transmittable data $R_\infty$ as a function of altitude $z_0$ and path loss exponent $\alpha$ for parameters from Table~\ref{tab:01}} \label{fig:Throughput_doubleAxis} \end{figure} \begin{figure}[t!] \centering \includegraphics[width=0.5\columnwidth]{Images/Throughput_speed_power} \caption[TODO]{Maximum transmittable data $R_\infty$ as a function of UAV speed $v$ and transmit power $P$ for parameters from Table~\ref{tab:01}} \label{fig:Rate_Time_Plots} \end{figure} \begin{equation} \begin{split} R_\infty = \frac{B d_0}{v} \Bigg( \sqrt[\alpha]{S}\pi \text{csc}(\frac{\pi}{\alpha}) + \alpha\sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{\alpha n + 1} \frac{1}{S^n} \right\} - \ln(1+S) - \alpha \Bigg) \end{split} \end{equation} \section{Characterization for $\alpha=2$} For the specific, but not unrealistic, case of $\alpha=2$ corresponding to ideal free space communication, the maximum transmittable data over time $T$ of \begin{equation} R_T = B \int_0^T \ln\left(1 + \frac{P G \sigma^{-2}d_0^2}{z_0^2+x(t)^2}\right) \mathrm{d}t. \end{equation} Assuming straight line flight $x(t) = x_0 + vt$ and noting $\mathrm{d}x = v\mathrm{d}t$, we may integrate over the UAV path instead of time resulting in a maximum transmittable data of \begin{equation} R_\infty = \lim_{T\rightarrow \infty} \frac{B}{v} \int_{x_0}^{x_0+vT} \ln\left(1 + \frac{P\sigma^{-2}}{z_0^2 + x^2}\right) \mathrm{d}x. \end{equation} \begin{theorem}\label{th:01} The total transmittable data as interval $T\rightarrow \infty$ for a UAV with starting position $x_0\geq0$ and $v>0$ is upper bounded by, \begin{equation} \label{eq:maxData_z0} \begin{split} R_\infty &= \frac{B}{v}\Bigg[- x_0\ln\left(1 + \frac{P\sigma^{-2}}{x_0^2 + z_0^2}\right) - \\ &2\sqrt{z_0^2+P\sigma^{-2}}\left( \atan\left(\frac{x_0}{\sqrt{z_0^2+P\sigma^{-2}}}\right) + \atan\left(\frac{x_0}{z_0}\right)\right)\Bigg]. \end{split} \end{equation} \end{theorem} \begin{proof} See Appendix A. \end{proof} \begin{corollary} In the simplest one dimensional case of $z_0=0$, $x_0\geq d_0$ and $v>0$ then the maximal transmittable data as $T\rightarrow \infty$ is bounded by \begin{equation} R_\infty^0 = - x_0\ln\left(1 + \frac{P\sigma^{-2}}{x_0^2}\right) + 2\sqrt{P\sigma^{-2}}\left( \frac{\pi}{2} - \atan\left(\frac{x_0}{\sqrt{P\sigma^{-2}}}\right) \right). \end{equation} \end{corollary} \begin{proof} Follows immediately by setting $z_0=0$ in \eqref{eq:maxData_z0}. \end{proof} \section{Conclusions} \newpage \section{Appendix A} Proof of Theorem~\ref{th:01}. The maximum transmittable data $R_\infty$ to be evaluated is \begin{equation} R_\infty = \lim_{T\rightarrow \infty} \frac{B}{v} \int_{x_0}^{x_0+vT} \ln\left(1 + \frac{P\sigma^{-2}}{z_0^2 + x^2}\right) \mathrm{d}x. \end{equation} Splitting the logarithm results in \begin{equation} R_\infty = \lim_{T\rightarrow \infty} \frac{B}{v} \left( \underbrace{\int_{x_0}^{x_T} \ln\left(z_0^2 + x^2 + P\sigma^{-2}\right) \mathrm{d}x }_{R_1} - \underbrace{\int_{x_0}^{x_T} \ln\left(z_0^2 + x^2\right) \mathrm{d}x}_{R_2} \right). \end{equation} Substituting $\gamma=z_0^2 + P\sigma^{-2}$ and noting the identity, \begin{equation} \label{eq:identity} \int \ln(a^2 + b)\mathrm{d}a = a\left(\ln(a^2+b)-2\right) + 2\sqrt{b}\atan\left(\frac{a}{\sqrt{b}}\right), \end{equation} $R_1$ is evaluated as \begin{align} R_1 &= \int_{x_0}^{x_T} \ln\left(x^2 + \gamma \right) \mathrm{d}x, \\ &= \left[ x\left(\ln(x^2+\gamma)-2\right) + 2\sqrt{\gamma}\atan\left(\frac{x}{\sqrt{\gamma}}\right) \right]_{x_0}^{x_T}, \\ &= 2(x_0-x_T) + x_T\ln(x_T^2+\gamma) - x_0\ln(x_0^2+\gamma) + \\ & 2\sqrt{\gamma}\left(\atan\left(\frac{x_T}{\sqrt{\gamma}}\right) - \atan\left(\frac{x_0}{\sqrt{\gamma}}\right)\right). \end{align} Similarly, using identity \eqref{eq:identity} $R_2$ is evaluated as, \begin{align} R_2 &= \int_{x_0}^{x_T} \ln\left(z_0^2 + x^2\right) \mathrm{d}x, \\ &= \left[x\left(\ln(x^2+z_0^2)-2\right) + 2\sqrt{z_0^2}\atan\left(\frac{x}{\sqrt{z_0^2}}\right)\right]_{x_0}^{x_T}, \\ &= 2(x_0-x_T) + x_T\ln(x_T^2+z_0^2) - x_0\ln(x_0^2+z_0^2) + \\ & 2\sqrt{z_0^2} \left( \atan\left(\frac{x_T}{\sqrt{z_0^2}}\right) - \atan\left(\frac{x_0}{\sqrt{z_0^2}}\right) \right). \end{align} Therefore, $R_T = \frac{B}{v} (R_1-R_2)$ where, \begin{align} R_1-R_2 &= x_T\ln(x_T^2+\gamma) - x_0\ln(x_0^2+\gamma) + \\ & 2\sqrt{\gamma}\left(\atan\left(\frac{x_T}{\sqrt{\gamma}}\right) - \atan\left(\frac{x_0}{\sqrt{\gamma}}\right)\right) - \\ & \Bigg( x_T\ln(x_T^2+z_0^2) - x_0\ln(x_0^2+z_0^2) + \\ &2z_0 \left( \atan\left(\frac{x_T}{z_0}\right) - \atan\left(\frac{x_0}{z_0}\right) \right) \Bigg). \end{align} Finally, taking the limit $R_\infty = \lim_{x_T\rightarrow \infty} R_T$ yields \begin{align} R_\infty &= \frac{B}{v}\Bigg[] - x_0\ln(x_0^2+\gamma) + x_0\ln(x_0^2 + z_0^2) + \\ & 2\sqrt{\gamma}\left(\frac{\pi}{2} - \atan\left(\frac{x_0}{\sqrt{\gamma}}\right) - \frac{\pi}{2} - \atan\left(\frac{x_0}{z_0}\right)\right) \Bigg]\\ &= \frac{B}{v}\Bigg[- x_0\ln\left(1 + \frac{P\sigma^{-2}}{x_0^2 + z_0^2}\right) - \\ & 2\sqrt{z_0^2+P\sigma^{-2}}\left( \atan\left(\frac{x_0}{\sqrt{z_0^2+P\sigma^{-2}}}\right) + \atan\left(\frac{x_0}{z_0}\right)\right)\Bigg]. \end{align} \section{Appendix B} \noindent Note the identity, \begin{equation} \ln(1+z) = \begin{cases} \sum_{n=1}^\infty \frac{(-1)^{n+1}z^n}{n},& \text{if } |z| < 1,\\ \ln(z) + \sum_{n=1}^\infty \frac{(-1)^{n+1}}{nz^n},& \text{if } |z| \geq 1. \end{cases} \end{equation} \noindent Using this identity, $R_\infty$ may be written as \begin{align} R_\infty &= \lim_{x_T\rightarrow \infty} \frac{B}{v} \int_{d_0}^{x_T} \ln \Bigg(1 + \left(\frac{\tilde{S}d_0}{x}\right)^\alpha \Bigg)\mathrm{d}x, \\ &= \lim_{x_T\rightarrow \infty} \frac{B}{v} \Bigg[ \int_{d_0}^{x_1} \ln \Bigg(1 + \left(\frac{\tilde{S}d_0}{x}\right)^\alpha \Bigg)\mathrm{d}x + \int_{x_1}^{x_T} \ln \Bigg(1 + \left(\frac{\tilde{S}d_0}{x}\right)^\alpha \Bigg)\mathrm{d}x \Bigg], \\ &= \lim_{x_T\rightarrow \infty} \frac{B}{v} \Bigg[ \int_{d_0}^{x_1} \alpha\ln\left(\frac{\tilde{S}d_0}{x}\right) + \sum_{n=1}^\infty \frac{(-1)^{n+1}}{n}\left(\frac{\tilde{S}d_0}{x}\right)^{\alpha n}\mathrm{d}x + \int_{x_1}^{x_T}\sum_{n=1}^\infty \frac{(-1)^{n+1}}{n}\left(\frac{\tilde{S}d_0}{x}\right)^{\alpha n} \mathrm{d}x \Bigg], \\ &= \frac{B}{v} \Bigg[ \underbrace{\int_{d_0}^{x_1} \alpha\ln\left(\frac{\tilde{S}d_0}{x}\right) + \sum_{n=1}^\infty \frac{(-1)^{n+1}}{n}\left(\frac{\tilde{S}d_0}{x}\right)^{\alpha n}\mathrm{d}x}_{R_{\infty,1}} + \lim_{x_T\rightarrow \infty} \underbrace{ \int_{x_1}^{x_T}\sum_{n=1}^\infty \frac{(-1)^{n+1}}{n}\left(\frac{\tilde{S}d_0}{x}\right)^{\alpha n} \mathrm{d}x}_{R_{\infty,2}} \Bigg], \end{align} \\where $x_1 = \tilde{S}^{1/\alpha}d_0$. \noindent Considering just $R_{\infty,1}$, \begin{align} R_{\infty,1} &= \int_{d_0}^{x_1} \alpha\ln\left(\frac{\tilde{S}d_0}{x}\right) + \sum_{n=1}^\infty \frac{(-1)^{n+1}}{n}\left(\frac{\tilde{S}d_0}{x}\right)^{\alpha n}\mathrm{d}x \\ &= \alpha d_0 \sqrt[\alpha]{S} - d_0\ln(S) - \alpha d_0 + \sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{n(\alpha n + 1)} \left[ \sqrt[\alpha]{S} d_0 - \frac{d_0}{S^n}\right] \right\}.\\ \end{align} \noindent Considering just $R_{\infty,2}$ \begin{align} R_{\infty,2} &= \lim_{x_T\rightarrow \infty} \int_{x_1}^{x_T}\sum_{n=1}^\infty \frac{(-1)^{n+1}}{n}\left(\frac{\tilde{S}d_0}{x}\right)^{\alpha n} \mathrm{d}x \\ &= \lim_{x_T\rightarrow \infty} \sum_{n=1}^\infty \frac{(-1)^{n+1}}{n(1-\alpha n)} \left[ (Sd_0^\alpha)^n \frac{x_T}{x_T^{\alpha n}} - \sqrt[\alpha]{S}d_0\right] \\ &= \sum_{n=1}^\infty \frac{(-1)^{n+1}}{n(\alpha n-1)} \sqrt[\alpha]{S}d_0 .\\ \end{align} \noindent Combining the above summations results in \begin{align} R_{\infty,1}+R_{\infty,2} &= \alpha d_0 \sqrt[\alpha]{S} - d_0\ln(S) - \alpha d_0 + \sqrt[\alpha]{S} d_0 \underbrace{\sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{n(\alpha n + 1)} + \frac{(-1)^{n+1}}{n(\alpha n-1)} \right\}}_{R_\text{tmp}} - \sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{n(\alpha n + 1)} \frac{d_0}{S^n} \right\}. \end{align} \noindent Noting that \begin{align} \frac{1}{n(\alpha n + 1)} + \frac{1}{n(\alpha n-1)} = \frac{1}{n} - \frac{\alpha}{\alpha n + 1} - \frac{1}{n} + \frac{\alpha}{\alpha n - 1} = \frac{2\alpha}{(\alpha n)^2-1}, \end{align} we may rewrite \begin{align} R_\text{temp} &= 2\alpha\sum_{n=1}^\infty \frac{(-1)^{n+1}}{(\alpha n)^2 -1} \\ &= \frac{2\alpha}{\alpha^2}\sum_{n=1}^\infty \frac{(-1)^{n+1}}{n^2 -\frac{1}{\alpha^2}} \\ &= \alpha\frac{2 \pi^2}{\alpha^2}\sum_{n=1}^\infty \frac{(-1)^{n+1}}{(\pi n)^2 -\frac{\pi^2}{\alpha^2}} \\ \end{align} \noindent Further noting the identity \begin{align} \text{csc}(z) &= \frac{1}{z} + 2z \sum_{n=1}^\infty \frac{(-1)^n}{z^2 - (\pi n)^2} \quad ; \frac{z}{\pi} \not \in \mathbb{Z} \\ &= \frac{1}{z} + 2z \sum_{n=1}^\infty \frac{(-1)^{n+1}}{ (\pi n)^2 - z^2} \\ & \rightarrow 2z \sum_{n=1}^\infty \frac{(-1)^{n+1}}{ (\pi n)^2 - z^2} = \text{csc}(z) - \frac{1}{z}. \end{align} \noindent Letting $z = \frac{\pi}{\alpha}$ results in \begin{align} R_\text{temp} &= \pi \frac{2 \pi}{\alpha}\sum_{n=1}^\infty \frac{(-1)^{n+1}}{(\pi n)^2 -\frac{\pi^2}{\alpha^2}} \\ &= \pi \text{csc}(\frac{\pi}{\alpha}) - {\alpha}, \end{align} \noindent From which \begin{align} R_{\infty,1}+R_{\infty,2} &= \alpha d_0 \sqrt[\alpha]{S} - d_0\ln(S) - \alpha d_0 + \sqrt[\alpha]{S} d_0\left(\pi \text{csc}(\frac{\pi}{\alpha}) - {\alpha}\right) - \sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{n(\alpha n + 1)} \frac{d_0}{S^n} \right\} \\ &= - d_0\ln(S) - \alpha d_0 + \sqrt[\alpha]{S} d_0\pi \text{csc}(\frac{\pi}{\alpha}) - \sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{n(\alpha n + 1)} \frac{d_0}{S^n} \right\} \\ &= - d_0\ln(S) - \alpha d_0 + \sqrt[\alpha]{S} d_0\pi \text{csc}(\frac{\pi}{\alpha}) - d_0 \sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{n} \frac{1}{S^n} \right\}+ d_0 \alpha\sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{\alpha n + 1} \frac{1}{S^n} \right\} \\ &= - d_0\ln(1+S) - \alpha d_0 + \sqrt[\alpha]{S} d_0\pi \text{csc}(\frac{\pi}{\alpha}) + d_0 \alpha\sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{\alpha n + 1} \frac{1}{S^n} \right\}. \\ \end{align} The sum is convergent if $|S|>1$, and in practice $S \gg 1$. The sum is also decreasing as a function of $\alpha$ so may be upper bounded when $\alpha = 2$. The sum is upper bounded by \begin{align} \sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{\alpha n + 1} \frac{1}{S^n} \right\} &\leq \\ \sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{2 n + 1} \frac{1}{S^n} \right\} &= \\ 1 - \sqrt{S}\text{atan}\left(\frac{1}{\sqrt{S}}\right) \leq 1-\frac{\pi}{4}, \end{align} and decreases as a function of the transmit SNR $S$. \noindent Therefore the maximum amount of data is equal to \begin{equation} R_\infty = \frac{B d_0}{v} \left( \sqrt[\alpha]{S}\pi \text{csc}(\frac{\pi}{\alpha}) + \alpha\sum_{n=1}^{\infty} \left\{ \frac{(-1)^{n+1}}{\alpha n + 1} \frac{1}{S^n} \right\} - \ln(1+S) - \alpha \right). \end{equation} \noindent Simply ignoring the convergent infinite sum results in an estimate \begin{equation} \tilde{R}_\infty = \frac{B d_0}{v} \left( \sqrt[\alpha]{S}\pi \text{csc}(\frac{\pi}{\alpha}) - \ln(1+S) - \alpha \right), \end{equation} where \begin{equation} R_\infty - \tilde{R}_\infty \leq \frac{B d_0 \alpha}{v}\left(1-\frac{\pi}{4}\right) \end{equation} \end{document} \section*{Reviewer \thereviewer}} \newenvironment{point} {\refstepcounter{point} \bigskip \noindent {\textbf{Reviewer~Point~\thepoint} } ---\ } {\par } \newcommand{\shortpoint}[1]{\refstepcounter{point} \bigskip \noindent {\textbf{Reviewer~Point~\thepoint} } ---~#1\par } \newenvironment{reply} {\medskip \noindent \begin{sf}\textbf{Reply}:\ } {\medskip \end{sf}} \newcommand{\shortreply}[2][]{\medskip \noindent \begin{sf}\textbf{Reply}:\ #2 \ifthenelse{\equal{#1}{}}{}{ \hfill \footnotesize (#1)}% \medskip \end{sf}} \begin{document} \section*{Response to the reviewers} We thank the reviewers for their critical assessment of our work. In the following we address their concerns point by point. \reviewersection \begin{point} The communication time of UAV is usually limited by its endurance, and hence it is not reasonable for considering the case as time goes to infinity. \label{pt:11} \end{point} \begin{reply} We thank the reviewer for their comments. The reviewer is right that in the case of the UAVs the limiting factor is indeed often endurance -- potentially due to battery limitations. As may be seen in Figure~3, we do consider data transmission over finite time as well. Figure~3 shows the ratio of total transmitted data in finite time $T$, $D_T$, to the bound $D_{\infty,1}$, for a range of speeds. We have also extended the content in Section~III to note that if we can express node endurance as a function of its' speed, then we may quantitatively investigate how much of a restriction the UAV endurance is compared to the theoretical bound $D_{\infty,1}$. Furthermore, we would like to note that the scope of this research is not limited to UAVs. In the case of space crafts or space probes, for example, endurance is often not the limiting factor and this bound may indeed be of more practical interest. We acknowledge that the majority of the original draft lent heavily on UAVs as a prime example, as this is an area of interest for us. We have attempted to rewrite the analysis sections in a more general fashion in the revised version. \end{reply} \begin{point} It is quite expected that the total amount of transmittable data is limited as the distance increases, since the received power decays very fast with distance. \label{pt:12} \end{point} \begin{reply} Two stationary nodes which are an arbitrarily large finite distance apart can reliably communicate at a non-zero average rate. Therefore, as time time tends to infinity, an infinite amount of data can be sent from the transmitter to the receiver. We show that this is \emph{not} the case for mobile nodes, regardless of how close together they start and how slowly they are moving apart. While this is not counter intuitive in hindsight, it is not quite obvious either. Moreover, one of our key contributions is to determine expressions for an upper bound on this finite amount of data that can be transmitted in different circumstances. \end{reply} \begin{point} It is not clear why power control cannot be performed. It would be interesting if the authors could add some reasonable power control. \label{pt:13} \end{point} \begin{reply} From a practical point of view, at the range of speeds considered it is unreasonable to assume continuous power allocation as a function of the distance. Instead, we could consider block power allocations over a finite set of power levels $\mathcal{P} = \{p_1,\hdots,p_n\}$, where $p_i > p_j, \forall i < j$, subject to an average power constraint. It is not difficult to see that the transmitter will start using the highest power level, and will gradually go down to the next highest level, so on, so forth. Denote by $T_i$ the open time interval when power level $p_i$ is being used, satisfying $\cup_i \overline{T}_i = [0,T]$, where $\overline{\cdot}$ denotes set closure. The average power constraint dictates \begin{equation}\label{eq:avgPow} \frac{1}{T}\sum_{i=1}^n \norm{T_i} p_i \leq P_\text{avg}. \end{equation} The total data transmitted in time $T$ then becomes, \begin{equation}\label{eq:PowAll_DT} D_T = B \sum_{i=1}^n \int_{T_i} \ln\left(1 + p_i\frac{G\sigma^{-2}d_0^2}{z_0^2 + x(t)^2}\right)\mathrm{d}t. \end{equation} The power allocation problem seeks to determine $T_i$ and $p_i$ to maximize $D_t$. However, in our opinion the type of asymptotic analysis considered in this work --- letting transmission time tend to infinity --- does not really make sense with average power constraints. As $T$ goes to infinity, the maximum length of time that each power level can be used would also tend to infinity. As such, although we have considered adding an analysis in response to this reviewers comment, we feel that it will not add any substantial conclusions to our existing results. \end{reply} \reviewersection \begin{point} When $z_0=0$, the assumption that the channel gain is dominated by LoS is unreasonable. For ground channel, fading can’t be neglected, thus resulting to the conclusion in section III failed to achieve. \label{pt:21} \end{point} \begin{reply} We thank the reviewer for their comments. It is true that for ground channels we may not reasonably assume that channel gain is dominated by line of sight. However, the case where $z_0=0$ is not restrictive to only ground channels. We may instead consider a stationary aerial base station or hovering UAV communicating with a mobile node at the same altitude. In line with our response to Point~\ref{pt:11}, we would like to emphasize again that although UAV's are the example of choice in this paper, the scope of this research is not limited to UAVs. For example, even two space probes moving linearly away from each other may be considered as moving in one dimension. \end{reply} \begin{point} One of advantages of UAV is fully controllable mobility, while in this work a linear trajectory at constant speed is assumed, which is too simple and little significance. \label{pt:22} \end{point} \begin{reply} Controlling mobility is outside of the scope of this paper. However, we should note that path planning algorithms often generate a composition of straight line or loiter (circular) trajectories, so it is not necessarily unreasonable to assume the UAV is moving in a linear trajectory for a significant amount of time. In Section~III we have also added a note that Figure~2 may be interpreted as showing the set of admissible transmission powers and velocities $(P,v)$ for communicating a given amount of data $M$ as $\{(P,v) | D_{\infty,1}=M\}$. Actual values of $(P,v)$ may then be chosen to achieve particular control objectives, such as energy efficiency. Furthermore, if transmitters only operate at a single, or finite set of power levels, then $v$ may be found as an explicit function of $(P,M)$. In addition, although linear trajectories may be overly restrictive we note that when $P$ is not variable, constant speed flight is often the most energy efficient for aerial vehicles such as fixed wing aircraft. Even for hover-crafts, whose bodies have not been aerodynamically designed to maximize lift, non-zero speeds are often more energy efficient. \end{reply} \begin{point} It is more interesting to derive how the variation of the altitude or path loss exponent affects the achievable total amount of transmittable data or asymptotic performance. \label{pt.23} \end{point} \begin{reply} Please note that each of the derived expressions is indeed a function of the path loss. In the case of two dimensions, our expressions for total transmittable data are also functions of altitude. In fact, the variation in data transfer with altitude is shown in Figure 4. \end{reply} \reviewersection \begin{point} The author assumes that the trajectory of the UAV is linear. Since the velocity is a vector, does the author's hypothesis mean that the UAV is always moving away from the static base station? If so, in the case of limited transmission power, it is reasonable that reliable transmission is limited! \label{pt.31} \end{point} \begin{reply} We thank the reviewer for this point, and their further comments. This is correct. Please see our response to Point~\ref{pt:12} of Reviewer 1. It is reasonable to expect that reliable transmission is limited, and we do not contradict this claim. One of our key contributions is to obtain expressions for a bound on this quantity in different circumstances. \end{reply} \begin{point} In order to better reflect the importance of motivation and work of the paper, more content about the existing theoretical background and conclusions of mobile agent or UAV communication should be added in introduction. \label{pt.32} \end{point} \begin{reply} Unfortunately we have extremely limited space in this letter for a detailed background and analysis of mobility issues and solutions related to mobile/UAV communications. We have however added one additional citation, which details the capacity and outage analysis of (potentially dense) networks of UAVs moving in random trajectories. This citation is in contrast to our current work and the other included references, which predominately analyse sparse UAV deployment scenarios with fixed UAV paths. We hope this may steer the interested reader in the right direction. \end{reply} \begin{point} The authors can add some analysis of the transmission characteristics of UAVs flying randomly in an area around static base stations for comparison with one-way far-from-flight scenarios. \label{pt.33} \end{point} \begin{reply} Although this may be an interesting dimension to explore, unfortunately it is outside of the scope of this work, and we do not have space to introduce this additional movement model and the corresponding analysis. However, based on the reviewers suggestion, we have added an additional citation in the introduction concerning capacity analysis of UAVs with random trajectories, which we hope can allow the interested reader to further engage with these scenarios. \end{reply} \begin{point} The description of Figure 1 seems to be confused. For example, when p = 1mW, S = 105, the corresponding error rate is 3.33 x 10-6nats, but this information does not seem to be obtained from Figure 1. Please describe the detailed analysis process. \label{pt.34} \end{point} \begin{reply} We have changed both of the plots in Figure~1 to log-log axis. This has allowed us to show the behaviour of the plotted functions for a larger range of $S$. Key features of the plots are still clear to the reader, such as the deviation between $D_{\infty,1}$ and $\tilde{D}_{\infty,1}$ for small values of $S$ values. The error corresponding to $p=1$\,mW may now be read from the graph. In making these changes we realized that the numerical values of the error presented in Section~III did not correspond to the parameter values in Table~I, but rather to a previous iteration of values we were testing. We have made the appropriate changes to these values. To make the process clearer to the reader we have included an explicit expression (8) for $e_{\infty,1}$ as a function of $v$ and $S$. \end{reply} \begin{point} In Section III, Paragraph 4, the sentence “The maximum error $\epsilon_{\infty,1}=0.962$ corresponds to the data point $(P,v)=(10^{-3}, 1)$” can’t been seen in Figure 1 or Figure 2. Please describe the detailed analysis process. \label{pt.35} \end{point} \begin{reply} For the same reason as our response to Point~\ref{pt.34} the numerical values have been updated to $\epsilon_{\infty,1}=0.333$\,nats. Unfortunately Figure~1 is plotted assuming a speed of $v=5$\,m/s, so the maximum error corresponding to the data points shown in Figure~2 cannot be read from this graph. Instead we have tried to make it clearer to the reader how this error was calculated by including an explicit expression for $\epsilon_{\infty,1}$ in (8) and including a more detailed expression of how $\epsilon_{\infty,1}=0.333$\,nats was obtained. \end{reply} \begin{point} The English writing of this work could be further improved. The authors should polish the whole work in the revised version. For example, in Section III, Paragraph 4, “for parameters from Tabel I ” should be “from parameters in Tabel I ” \label{pt.36} \end{point} \begin{reply} We have changed this particular example. We have also gone through the rest of the paper and made changes where we thought appropriate. \end{reply} \end{document}
\section*{Introduction} The Galois group of a univariate polynomial exposes its internal symmetry and controls its solvability by radicals. More generally, families of polynomial systems (and of geometric problems) have Galois groups~\cite{Harris} which expose their internal symmetry. We describe how to solve a polynomial system using numerical homotopy continuation~\cite{Morgan,SW05} by exploiting the structure of a family to which it belongs. A family of polynomial systems (geometric problems) is represented as a branched cover of algebraic varieties $\pi\colon X\to Z$ where $Z$ parameterizes the family and the fiber over $z\in Z$ consists of complex solutions to the corresponding instance. Removing the branch locus gives a covering space whose monodromy group is a Galois group~\cite{Harris} of a field extension. Pirola and Schlesinger~\cite{PirolaSchlesinger} observed that the Galois group acts imprimitively if and only if after replacing $Z$ by a Zariski open subset $V$, the branched cover factors as a composition \begin{equation}\label{Eq:decomposition} \pi^{-1}(V)\ \longrightarrow\ Y\ \longrightarrow\ V \end{equation} of nontrivial branched covers, in which case $\pi$ is decomposable. Am\'endola et al.~\cite{AmendolaRodriguez} explained how to use an explicit decomposition to compute fibers $\pi^{-1}(z)$ using monodromy~\cite{DHJLLS}. They showed how several examples in the literature involve a decomposable branched cover. In particular, Robert's cognates in kinematics and label swapping in algebraic statistics are used to illustrate the utility of decomposability. Examples like these span several disciplines and serve as a primary motivation for our study. For these examples, the variety $Y$ and intermediate maps were determined using invariant theory as there was a finite group acting as automorphisms of $\pi\colon X\to Z$. In general, it is nontrivial to determine a decomposition~\eqref{Eq:decomposition} of a branched cover $\pi\colon X\to Z$ with imprimitive Galois group, especially when the cover admits only the trivial automorphism. Esterov~\cite{Esterov} determined which systems of sparse polynomials have an imprimitive Galois group. One goal was to classify those which are solvable by radicals. He identified two simple structures which imply that the system is decomposable. In these cases, the decomposition is transparent. He also showed that the Galois group is full symmetric when neither structure occurs. We use Esterov's classification to give a recursive numerical homotopy continuation algorithm for solving decomposable sparse systems. The first such structure is when a polynomial system is composed with a monomial map, such as $g(x^3)=0$. To solve this, first solve $g(y)=0$ and then extract third roots of each solution. The second structure is when the system is triangular, such as \[ f(x,y)\ =\ g(y)\ =\ 0\,. \] To solve this, first solve $g(y)=0$ and then for each solution $y^*$, solve $f(x,y^*)=0$. The goal of the paper is to recognize and exploit these structures for solving polynomial systems, where by \demph{solve}, we mean, ``Find all isolated solutions over the complex numbers with nonzero coordinates." In general, Esterov's classification leads to a sequence of branched covers, each corresponding to a sparse system with symmetric monodromy or to a monomial map. Our algorithm identifies this structure and uses it to recursively solve a decomposable system. We give some examples which demonstrate that, despite its overhead, this algorithm is a significant improvement over a direct use of the polyhedral homotopy~\cite{HuberSturmfels,V99}. Throughout this paper we assume each polynomial of a system is prescribed by a finite sum of terms, which consist of a monomial multiplied by a coefficient. We use the terminology \demph{sparse polynomial system} when the monomials of each finite sum are known. A polynomial system presented as a straight-line program would not be considered sparse, although it could theoretically be translated into one. We develop algorithms for solving sparse polynomial systems, which is in comparison to the monodromy methods proposed in \cite{AmendolaRodriguez} where there is no sparsity requirement. Sparsity is important for us because we use the monomial support to identify triangular and lacunary structure. We say \demph{general sparse polynomial system}, when the coefficients appearing in the sparse system are general. By the Bernstein-Kushnirenko Theorem~\cite{Bernstein,Kushnirenko}, the number of complex isolated solutions to a general sparse system of equations depends only on the convex hulls of the exponent vectors of the monomials. When the system supported on the vertices is decomposable, we propose using it as a start system in a homotopy to solve the original system. This is similar in spirit to the B\'ezout or total degree homotopy~\cite{Garcia79}. In Section~\ref{S:BCGGDP} we present some general background on Galois groups of branched covers and explain the relation between decompositions of the branched cover and imprimitivity of the Galois group, finishing with a discussion of how to obtain an explicit decomposition. We specialize to decomposable sparse systems in Section~\ref{S:DSS}, where we explain Esterov's classification and describe how to compute the corresponding decompositions. We present our algorithms for solving sparse decomposable systems in Section~\ref{S:Algorithm}, and give an application to furnish start systems for homotopies. Section~\ref{S:computations} gives timings and information on the performance of our algorithm. \section{Branched covers, Galois groups, and decomposable projections} \label{S:BCGGDP} We sketch some mathematical background, first explaining how Galois groups arise from branched covers and the relationship between imprimitive Galois groups and decompositions of the branched cover. We then discuss how to compute a decomposition when the Galois group is imprimitive. \subsection{Galois groups} Let $\pi\colon X\to Z$ be a dominant map ($\pi(X)$ is dense in $Z$) of irreducible complex algebraic varieties of the same dimension. Such a map is a \demph{branched cover}. There exists a number $d$ and a nonempty Zariski open (in particular, dense, open, and path-connected) subset $U\subset Z$ such that for each $z\in U$, $\pi^{-1}(z)$ consists of $d$ points. The branched cover is \demph{trivial} when $d=1$. We define two subgroups of the symmetric group $S_d$ which are well-defined up to conjugacy. We may further assume that the map $\pi^{-1}(U)\to U$ is a degree $d$ covering space. This covering space has a monodromy group which acts on a fiber $\pi^{-1}(z)$ for $z\in U$ as follows~\cite[Ch.~13]{Munkres}. Given a loop $\gamma$ in $U$ based at $z$, the lifts of $\gamma$ give $d$ paths in $X$ connecting points of $\pi^{-1}(z)$, and thus a permutation of $\pi^{-1}(z)$. The collection of all such monodromy permutations forms the \demph{monodromy group} of $\pi$, which acts transitively because $\pi^{-1}(U)$ is connected as $X$ is irreducible. Second, as $\pi\colon X \to Z$ is dominant, the field ${\mathbb C}(Z)$ of rational functions on $Z$ is a subfield of ${\mathbb C}(X)$, the field of rational functions on $X$. Since $\pi$ has degree $d$, ${\mathbb C}(X)$ is a degree $d$ extension of ${\mathbb C}(Z)$. If \defcolor{$K$} is the Galois closure of ${\mathbb C}(X)/{\mathbb C}(Z)$, then the \demph{Galois group} \defcolor{$G_\pi$} of the branched cover $\pi\colon X\to Z$ is the Galois group of $K/{\mathbb C}(Z)$. Harris~\cite{Harris} gave a modern proof that the Galois group equals the monodromy group, but this idea goes back at least to Hermite~\cite{Hermite}. We recall some terminology concerning permutation groups~\cite{Wielandt}. Suppose that $G\subset S_d$ is a permutation group acting transitively on the set $\defcolor{[d]}:=\{1,2,\dotsc,d\}$. A \demph{block} of $G$ is a subset $B\subset [d]$ such that for every $g\in G$, either $gB=B$ or $gB\cap B=\emptyset$. The subsets $\emptyset$, $[d]$, and every singleton are blocks of every permutation group. If these trivial blocks are the only blocks, then $G$ is \demph{primitive} and otherwise it is \demph{imprimitive}. When $G$ is imprimitive, we have a factorization $d=ab$ with $1<a,b<d$ and there is a bijection $[a]\times[b]\leftrightarrow[d]$ such that $G$ preserves the projection $[a]\times[b]\to [b]$. That is, the fibers $\{[a]\times\{i\}\mid i\in [b]\}$ are blocks of $G$, its action on this set of blocks gives a homomorphism $G\to S_b$ with transitive image, and the kernel acts transitively on each fiber $[a]\times\{i\}$. In particular, $G$ is a subgroup of the wreath product $S_a\wr S_b = (S_a)^b\rtimes S_b$, where $S_b$ acts on $(S_a)^b$ by permuting factors. We observe a second characterization of imprimitive permutation groups $G$. Since $G$ acts transitively, if $H\subset G$ is the stabilizer of a point $c\in[d]$, then $H$ has index $d$ in $G$ and we may identify $[d]$ with the cosets $G/H$. If $B$ is a nontrivial block of $G$ containing $c$, then its stabilizer $L$ is a proper subgroup of $G$ that strictly contains $H$. Furthermore, using the map $G/H \to G/L$, we see that $G$ is imprimitive if and only if the stabilizer of the point $eH\in G/H$ is not a maximal subgroup. \subsection{Decomposable branched covers} A branched cover $\pi\colon X\to Z$ is \demph{decomposable} if there is a nonempty Zariski open subset $V\subset Z$ over which $\pi$ factors \begin{equation}\label{Eq:Ndecomposition} \pi^{-1}(V)\ \xrightarrow{\; \varphi\;}\ Y\ \xrightarrow{\; \psi\;}\ V\,, \end{equation} with $\varphi$ and $\psi$ both nontrivial branched covers. The fibers of $\varphi$ over points of $\psi^{-1}(v)$ are blocks of the action of $G_\pi$ on $\pi^{-1}(v)$, which implies that $G_\pi$ is imprimitive. Pirola and Schlesinger~\cite{PirolaSchlesinger} observed that decomposability of $\pi$ is equivalent to imprimitivity of $G_\pi$. We give a proof, as we discuss the problem of computing a decomposition. \begin{proposition}\label{P:DecomposableIsImprimitive} A branched cover is decomposable if and only if its Galois group is~imprimitive. \end{proposition} \begin{proof} We need only to prove the reverse direction. As above, let ${\mathbb C}(Z)$, ${\mathbb C}(X)$, and $K$ be the function fields of $Z$, $X$, and the Galois closure of ${\mathbb C}(X)/{\mathbb C}(Z)$, respectively, and let $G_\pi$ be the Galois group of $K/{\mathbb C}(Z)$. Let $H$ be the subgroup of $G_\pi$ such that ${\mathbb C}(X)=K^H$, the fixed field of $H$. The set of Galois conjugates of ${\mathbb C}(X)$ forms the orbit $G_\pi/H$, and the number of conjugates is the degree of the branched cover $X\to Z$. If $G_\pi$ acts imprimitively, then the stabilizer $L$ of a nontrivial block $B$ containing ${\mathbb C}(X)$ is a proper subgroup properly containing $H$. Thus its fixed field $\defcolor{M}:=K^L$, which is the intersection of the conjugates of ${\mathbb C}(X)$ in the block $B$, is an intermediate field between ${\mathbb C}(Z)$ and ${\mathbb C}(X)$. For any variety $Y'$ with function field $M$, there will be Zariski open subsets $Y$ of $Y'$ and $V$ of $Z$ such that~\eqref{Eq:Ndecomposition} holds. Indeed, the inclusions of function fields ${\mathbb C}(Z)\subset M\subset{\mathbb C}(X)$ give dominant rational maps $X\dasharrow Y'\dasharrow Z$. Replacing the varieties $X$, $Y'$, and $Z$ by Zariski open subsets, we may assume that these are regular maps, hence branched covers. Finally, we may replace $Z$ by a nonempty Zariski open subset $V$ contained in the image of $X$ under the composition and let $Y$ be the inverse image of $V$ in $Y'$. \end{proof} While imprimitivity is equivalent to decomposability, the proof does not address how to compute the variety $Y$ of~\eqref{Eq:Ndecomposition}. One way is as follows. Replace $Z$ and $X$ by affine open subsets, if necessary, and let $y_1,\dotsc,y_m\in{\mathbb C}[X]$ be regular functions on $X$ that generate $M$ over ${\mathbb C}(Z)$. Let $x_1,\dotsc,x_m$ be indeterminates and let $I\subset{\mathbb C}(Z)[x_1,\dotsc,x_m]$ be the kernel of the map ${\mathbb C}(Z)[x_1,\dotsc,x_m]\to {\mathbb C}(X)$ given by $x_i\mapsto y_i$. This is the zero-dimensional ideal of algebraic relations satisfied by $y_1,\dotsc,y_m$. Replacing $Z$ by a Zariski open subset of affine space if necessary, we may choose generators $g_1,\dotsc,g_r$ of $I$ that lie in ${\mathbb C}[Z][x_1,\dotsc,x_m]$---their coefficients are regular functions on $Z$. There is an open subset $V\subset Z$ such that the ideal $I$ defines an irreducible variety $\defcolor{Y}\subset V\times{\mathbb C}^m$ whose projection to $V$ is a branched cover and whose function field is $M$. Replacing $X$ by $\pi^{-1}(V)$, we obtain the desired decomposition, with the map $\pi^{-1}(V)\to Y$ given by the functions $y_1,\dotsc,y_m$. This does not address the practicality of computing $Y$, but it does indicate an approach. Given the subgroup $L$ of $G_\pi$ and a set of generators of ${\mathbb C}[X]$ over ${\mathbb C}[Z]$, if we apply the Reynolds averaging operator~\cite{DerksenKemper} for $L$ to monomials in the generators, we obtain the desired generators $y_1,\dotsc,y_m$ of $M$. One problem is that elements of $G_\pi$ may not act on $X$, so their action on elements of ${\mathbb C}[X]$ may be hard to describe. There is an exception to this. If $L\neq H$ normalizes $H$ in $G$ and $\pi\colon X\to Z$ is a covering space, then $\defcolor{\Gamma}:=L/H$ acts freely on $X$, preserving the fibers---it is a group of deck transformations of $X\to Z$~\cite[Ch~13]{Munkres}. When $\Gamma$ acts on the original branched cover, $Y=X/\Gamma$ is the desired space, and both $Y$ and the map $X\to Y$ may be computed by applying the Reynolds operator for $\Gamma$ to generators of ${\mathbb C}[X]$. The examples given in~\cite[\S~5]{AmendolaRodriguez} are of this form, and the authors use this approach to compute the decomposition~\eqref{Eq:Ndecomposition}. \begin{example}\label{Ex:NoMaximal} Not all imprimitive groups have the property that the normalizer $L$ of a point stabilizer $H$ properly contains $H$. Consider the wreath product $G:=S_3\wr S_3$, which acts imprimitively on the nine-element set $[3]\times[3]$. The stabilizer of the point $(3,3)$ is the subgroup $H=((S_3)^2\times S_2)\rtimes S_2$, where $S_2\subset S_3$ is the stabilizer of $\{3\}$. Then $H$ is its own normalizer in $G$, as $S_2$ is its own normalizer in $S_3$.\hfill$\diamond$ \end{example} All imprimitive Galois groups in the Schubert calculus constructed in~\cite[\S~3]{GIVIX} and in~\cite{SWY} have the stabilizer $H$ of ${\mathbb C}(X)$ equal to its normalizer. For these, the decomposition of the branched cover follows from a deep structural understanding of the corresponding Schubert problem. There remain many Schubert problems whose Galois group is expected to be imprimitive, yet we do not know a decomposition~\eqref{Eq:Ndecomposition} of the corresponding branched cover. The structure of imprimitivity/decomposability found in~\cite{GIVIX,SWY} was not initially apparent, and further study was needed to determine a decomposition. In contrast, a consequence of Esterov's study of Galois groups of sparse polynomial systems is that decomposability is transparent and may be deduced by inspection and computing the decomposition~\eqref{Eq:Ndecomposition} is algorithmic. This is explained in the following section. \section{Decomposable Sparse Systems}\label{S:DSS} We discuss sparse systems of (Laurent) polynomials and interpret them as branched covers. Then we state the Bernstein-Kushnirenko Theorem for their numbers of complex isolated solutions, and give the relation between integer linear algebra and maps of algebraic tori. We then present Esterov's criteria for imprimitivity, and show how these criteria lead to decompositions of the corresponding branched cover. \subsection{Sparse Polynomial Systems} Let $\defcolor{{\mathbb C}^\times}:={\mathbb C}{\smallsetminus}\{0\}$ be the multiplicative group of nonzero complex numbers and \defcolor{$({\mathbb C}^\times)^n$} be the $n$-dimensional complex torus. For each $\alpha = (\alpha_1,\dotsc,\alpha_n)\in{\mathbb Z}^n$, the \demph{(Laurent) monomial} with exponent $\alpha$, \[ \defcolor{x^\alpha}\ :=\ x_1^{\alpha_1} x_2^{\alpha_2}\dotsb x_n^{\alpha_n}\,, \] is a character (multiplicative map) $x^\alpha\colon ({\mathbb C}^\times)^n\to{\mathbb C}^\times$. A finite linear combination \begin{equation}\label{Eq:sparsePolynomial} f\ =\ \sum c_\alpha x^\alpha\qquad c_\alpha\in{\mathbb C} \end{equation} of monomials is a \demph{(Laurent) polynomial}, which is a function $f\colon ({\mathbb C}^\times)^n\to{\mathbb C}$. The class of sparse polynomial systems pertains to those systems whose monomial structure for each equation is pre-determined. Our polynomial systems naturally occur in a family of sparse polynomial systems determined only by the monomials appearing in each equation of the system. For a nonempty finite set ${\mathcal A}\subset{\mathbb Z}^n$, the set of polynomials~\eqref{Eq:sparsePolynomial} satisfying $c_\alpha\neq 0 \Rightarrow \alpha\in{\mathcal A}$ is the vector space \defcolor{${\mathbb C}^{\mathcal A}$} of polynomials of \demph{support} ${\mathcal A}$. Given a collection $\defcolor{{\calA_\bullet}}:=({\mathcal A}_1,\dotsc,{\mathcal A}_n)$ of nonempty finite subsets of ${\mathbb Z}^n$, write $\defcolor{{\mathbb C}^{\calA_\bullet}}:={\mathbb C}^{{\mathcal A}_1}\times\dotsb\times{\mathbb C}^{{\mathcal A}_n}$ for the vector space of $n$-tuples $F=(f_1,\dotsc,f_n)$ of polynomials, where $f_i$ has support ${\mathcal A}_i$, for each $i$. An element $F\in{\mathbb C}^{\calA_\bullet}$ is a list of coefficients of these polynomials, which corresponds to a system of polynomial equations \[ f_1(x_1,\dotsc,x_n)\ =\ f_2(x_1,\dotsc,x_n)\ =\ \dotsb\ =\ f_n(x_1,\dotsc,x_n)\ =\ 0\,, \] written $F(x) = 0$. Such a system of polynomial equations is called a \demph{sparse polynomial system} of \demph{support ${\calA_\bullet}$}. Its set of solutions in $({\mathbb C}^\times)^n$ is \defcolor{${\mathcal V}(F)$}. Given supports ${\calA_\bullet}=({\mathcal A}_1,\dotsc,{\mathcal A}_n)$, consider the incidence variety \[ \defcolor{X_{{\calA_\bullet}}}\ :=\ \left\{(F,x)\in{\mathbb C}^{{\calA_\bullet}}\times({\mathbb C}^\times)^n \mid F(x) = 0 \right\}. \] equipped with projections $\defcolor{\pi}\colon X_{{\calA_\bullet}}\to{\mathbb C}^{{\calA_\bullet}}$ and $\defcolor{p}\colon X_{{\calA_\bullet}}\to({\mathbb C}^\times)^n$. For any point $x\in({\mathbb C}^\times)^n$, the fiber $p^{-1}(x)$ is a vector subspace of ${\mathbb C}^{{\calA_\bullet}}$ of codimension $n$. Indeed, for each $i=1,\dotsc,n$, the condition that $f_i(x)=0$ is a linear equation in the coefficients ${\mathbb C}^{{\mathcal A}_i}$ of $f_i$, and these $n$ linear equations are independent. Thus $X_{{\calA_\bullet}}$ is irreducible of dimension \[ \dim({\mathbb C}^\times)^n + \dim{\mathbb C}^{{\calA_\bullet}} - n\ =\ \dim{\mathbb C}^{{\calA_\bullet}}\,. \] For $F\in{\mathbb C}^{{\calA_\bullet}}$, the fiber $\pi^{-1}(F)$ is the set ${\mathcal V}(F)$ of solutions in $({\mathbb C}^\times)^n$ to $F(x)=0$. The image of $X_{{\calA_\bullet}}$ under $\pi$ either lies in a proper subvariety \defcolor{$Z$} of ${\mathbb C}^{{\calA_\bullet}}$ or it is dense in ${\mathbb C}^{{\calA_\bullet}}$. In the first case, there is a Zariski open subset $\defcolor{U}:={\mathbb C}^{{\calA_\bullet}}\smallsetminus Z$ consisting of polynomial systems $F(x)=0$ with no solution. In the second case, $\pi\colon X_{{\calA_\bullet}}\to{\mathbb C}^{{\calA_\bullet}}$ is a branched cover, so there is a positive integer $d$ and a Zariski open subset $U\subset{\mathbb C}^{{\calA_\bullet}}$ consisting of polynomial systems $F(x)=0$ with $d$ isolated solutions. Both cases are determined by the polyhedral geometry of the supports ${\calA_\bullet}$ through the Bernstein-Kushnirenko Theorem. For convex sets $K_1,\dotsc,K_n\subset{\mathbb R}^n$ and nonnegative real numbers, $t_1,\dotsc,t_n\in{\mathbb R}_{\geq0}$, Minkowski proved that the volume of the Minkowski sum \[ t_1K_1+\dotsb+t_nK_n\ :=\ \{ t_1 x_1+\dotsb + t_nx_x \mid x_i\in K_i\} \] is a homogeneous polynomial of degree $n$ in $t_1,\dotsc,t_n$. Its coefficient of $t_1\dotsb t_n$ is the \defcolor{mixed volume} of $K_1,\dotsc,K_n$. For ${\calA_\bullet}=({\mathcal A}_1,\dotsc,{\mathcal A}_n)$, let \defcolor{${\rm MV}({\calA_\bullet})$} be the mixed volume of ${\rm conv}({\mathcal A}_1),\dotsc,{\rm conv}({\mathcal A}_n)$, where \defcolor{${\rm conv}({\mathcal A}_i)$} is the convex hull of ${\mathcal A}_i$. This is described in more detail in~\cite[Sect.~IV.3]{Ewald}. We give the Bernstein-Kushnirenko Theorem~\cite{Bernstein,Kushnirenko}. \begin{proposition}\label{prop:BKK} Let $F(x)=0$ be a system of polynomials with support ${\calA_\bullet}$. The number of complex isolated solutions in $({\mathbb C}^\times)^n$ to $F(x)=0$ is at most ${\rm MV}({\calA_\bullet})$. There is a Zariski open subset $U\subset{\mathbb C}^{{\calA_\bullet}}$ consisting of systems with exactly ${\rm MV}({\calA_\bullet})$ solutions. \end{proposition} Thus $\pi\colon X_{{\calA_\bullet}}\to{\mathbb C}^{{\calA_\bullet}}$ is a branched cover if and only if ${\rm MV}({\calA_\bullet})\neq 0$, which was determined by Minkowski as follows. For a nonempty subset $I\subseteq\defcolor{[n]}:=\{1,\dotsc,n\}$, write $\defcolor{{\mathcal A}_I}:=({\mathcal A}_i\mid i\in I)$ and \defcolor{${\mathbb Z}{\mathcal A}_I$} be the affine span of the supports in ${\mathcal A}_I$. This is the free abelian group generated by differences $\alpha-\beta$ for $\alpha,\beta\in {\mathcal A}_i$ for some $i\in I$. Then ${\rm MV}({\calA_\bullet}) = 0$ if and only if there exists a nonempty subset $I\subseteq[n]$ such that $|I|$ exceeds ${\rm rank}({\mathbb Z}{\mathcal A}_I)$. In particular, ${\rm MV}({\calA_\bullet})\neq 0$ implies that $\defcolor{{\mathbb Z}{\calA_\bullet}}={\mathbb Z}{\mathcal A}_{[n]}$ has full rank $n$. The branched cover $\pi\colon X_{{\calA_\bullet}}\to{\mathbb C}^{{\calA_\bullet}}$ is nontrivial when ${\rm MV}({\calA_\bullet})>1$. Given supports ${\calA_\bullet}$ with ${\rm MV}({\calA_\bullet})\neq 0$, let \defcolor{$G_{\calA_\bullet}$} be the Galois group of the branched cover $X_{{\calA_\bullet}}\to{\mathbb C}^{{\calA_\bullet}}$. \subsection{Integer linear algebra and coordinate changes}\label{SS:CoordinateChanges} As a monomial $x^\beta$ for $\beta\in{\mathbb Z}^n$ is invertible on $({\mathbb C}^\times)^n$, polynomials $f$ and $x^\beta f$ have the same sets of zeroes. If ${\mathcal A}$ is the support of $f$, then the support of $x^\beta f$ is $\beta+{\mathcal A}$, the translation of ${\mathcal A}$ by $\beta$. Thus translating the supports of sparse polynomials by integer vectors does not change any assertions about their zeroes in $({\mathbb C}^\times)^n$. Similarly, ${\mathbb Z}{\mathcal A}={\mathbb Z}(\beta+{\mathcal A})$. Consequently, we will henceforth assume that ${\bf{0}}\in{\mathcal A}$, for then ${\mathbb Z}{\mathcal A}$ will be the ${\mathbb Z}$-linear span of ${\mathcal A}$. We identify the set ${\rm Hom}(({\mathbb C}^\times)^n,{\mathbb C}^\times)$ of characters on $({\mathbb C}^\times)^n$ with the free abelian group ${\mathbb Z}^n$. A group homomorphism $\Phi\colon({\mathbb C}^\times)^m\to({\mathbb C}^\times)^k$ is determined by $k$ characters of $({\mathbb C}^\times)^m$, equivalently by a homomorphism (linear map) $\varphi\colon{\mathbb Z}^k\to{\mathbb Z}^m$ of free abelian groups---$\varphi$ is also the map pulling a character of $({\mathbb C}^\times)^k$ back along $\Phi$. In particular, an invertible map $\Phi\colon({\mathbb C}^\times)^n\to({\mathbb C}^\times)^n$ (a monomial change of coordinates) pulls back to an invertible map $\varphi\colon{\mathbb Z}^n\to{\mathbb Z}^n$, identifying ${\rm GL}(n,{\mathbb Z})$ with the group of possible monomial coordinate changes. We will write $\Phi=\varphi^*$ and $\varphi=\Phi^*$ for these. If $\Phi(x)=(x^{\alpha_1},\dotsc,x^{\alpha_n})$, then the map $\varphi=\Phi^*\colon{\mathbb Z}^n\xrightarrow{\,\sim\,}{\mathbb Z}^n$ sends the $i$-th standard basis vector $e_i$ to $\alpha_i$ and is represented by the invertible matrix $A$ whose $i$-th column is $\alpha_i$. When the integer span of $\alpha_1,\dotsc,\alpha_n$ is ${\mathbb Z}^n$, the map $\varphi = \Phi^*$ is invertible. Suppose that $f$ is a polynomial on $({\mathbb C}^\times)^n$ with support ${\mathcal A}$. Given a homomorphism $\Phi\colon({\mathbb C}^\times)^m\to({\mathbb C}^\times)^n$, the composition $f(\Phi(z))$ for $z\in({\mathbb C}^\times)^m$ is a polynomial with support $\varphi({\mathcal A})$, where the coefficient of $z^\beta$ is the sum of coefficients of $x^\alpha$ for $\alpha\in \varphi^{-1}(\beta)\cap{\mathcal A}$. \subsection{Decompositions of Sparse Polynomial Systems}\label{SS:Decompositions} We describe two properties that a collection ${\calA_\bullet}$ of supports may have, lacunary and (strictly) triangular, and then recall Esterov's theorem about the Galois group $G_{\calA_\bullet}$. We then present explicit decompositions of the projection $\pi\colon X_{{\calA_\bullet}}\to {\mathbb C}^{{\calA_\bullet}}$ when ${\calA_\bullet}$ is lacunary and when ${\calA_\bullet}$ is triangular. These form the basis for our algorithms. Let ${\calA_\bullet}=({\mathcal A}_1,\dotsc,{\mathcal A}_n)$ be a collection of supports. Assume that ${\rm MV}({\calA_\bullet})>1$. We say that ${\calA_\bullet}$ is \demph{lacunary} if the affine span ${\mathbb Z}{\calA_\bullet}\neq{\mathbb Z}^n$ (it has rank $n$ as ${\rm MV}({\calA_\bullet})\neq 0$). We say that ${\calA_\bullet}$ is \demph{triangular} if there is a nonempty proper subset $\emptyset\neq I\subsetneq[n]$ such that ${\rm rank}({\mathbb Z}{\mathcal A}_I)=|I|$. As we explain in Section~\ref{S:SNF}, we may change coordinates and assume that ${\mathbb Z}{\mathcal A}_I\subset{\mathbb Z}^{|I|}$ so that ${\rm MV}({\mathcal A}_I)$ is defined using ${\rm conv}({\mathcal A}_i)\subset{\mathbb R}^{|I|}$ for $i\in I$. A system ${\calA_\bullet}$ of triangular supports is \demph{strictly triangular} if for some $\emptyset\neq I\subsetneq[n]$ with ${\rm rank}({\mathbb Z}{\mathcal A}_I)=|I|$, we have $1<{\rm MV}({\mathcal A}_I)<{\rm MV}({\calA_\bullet})$. It is elementary that if ${\calA_\bullet}$ is either lacunary or strictly triangular, then the branched cover $X_{\calA_\bullet}\to{\mathbb C}^{\calA_\bullet}$ is decomposable and therefore $G_{\calA_\bullet}$ is an imprimitive permutation group. We show this explicitly in Sections \ref{SSS:Lacunary} and \ref{SSS:triangular}. \begin{proposition}[Esterov~\cite{Esterov}] Let ${\calA_\bullet}$ be a collection of supports with ${\rm MV}({\calA_\bullet})\neq 0$. The Galois group $G_{\calA_\bullet}$ is equal to the symmetric group $S_{{\rm MV}({\calA_\bullet})}$ if and only if ${\calA_\bullet}$ is neither lacunary nor strictly triangular. \end{proposition} \subsubsection{Lacunary support}\label{SSS:Lacunary} Let us begin with an example when $n=2$. We represent vectors by the columns of a matrix. Let \[ {\mathcal A}_1\ :=\ \left(\begin{matrix} 0&0&3&6&12\\0&4&3&6&0 \end{matrix}\right) \qquad\mbox{and}\qquad {\mathcal A}_2\ :=\ \left(\begin{matrix} 0&3&6&9&9\\0&7&2&1&5 \end{matrix}\right) \] be supports in ${\mathbb Z}^2$. Then ${\mathbb Z}{\calA_\bullet}$ has index 12 in ${\mathbb Z}^2$ as the map $\varphi(a,b)^T=(3a,4b-a)^T$ is an isomorphism $\varphi\colon{\mathbb Z}^2\xrightarrow{\,\sim\,}{\mathbb Z}{\calA_\bullet}$, and $\det(\begin{smallmatrix}3&0\\-1&4\end{smallmatrix})=12$. If we set $\defcolor{{\mathcal B}_i}:=\varphi^{-1}({\mathcal A}_i)$, then \[ {\mathcal B}_1\ :=\ \left(\begin{matrix} 0&0&1&2&4\\0&1&1&2&1 \end{matrix}\right) \qquad\mbox{and}\qquad {\mathcal B}_2\ :=\ \left(\begin{matrix} 0&1&2&3&3\\0&2&1&1&2 \end{matrix}\right)\ . \] We display ${\mathcal A}_1$, ${\mathcal A}_2$, ${\mathcal B}_1$, and ${\mathcal B}_2$ below. \[ \begin{picture}(136,93)(0,-11) \put(0,0){\includegraphics{figures/LA1}} \put(52,-11){${\mathcal A}_1$} \end{picture} \quad \begin{picture}(100,93)(0,-11) \put(0,0){\includegraphics{figures/LA2}} \put(43,-11){${\mathcal A}_2$} \end{picture} \qquad \begin{picture}(73,66)(0,-11) \put(0,0){\includegraphics{figures/LB1}} \put(32,-11){${\mathcal B}_1$} \end{picture} \quad \begin{picture}(60,66)(0,-11) \put(0,0){\includegraphics{figures/LB2}} \put(26,-11){${\mathcal B}_2$} \end{picture} \] Then the map $\Phi:=\varphi^*\colon({\mathbb C}^\times)^2\twoheadrightarrow({\mathbb C}^\times)^2$ is given by $\Phi(x,y)=(x^3y^{-1},y^4)=(z,w)$. If \begin{align*} f_1\ &=\ 1+2y^4+4x^3y^3+8x^6y^6+16x^{12}\\ f_2\ &=\ 3+5x^3y^7+7x^6y^2+11x^9y+13x^9y^5\ , \end{align*} which is a polynomial system with support ${\calA_\bullet}$, then $f_i=g_i\circ\Phi$, where \begin{align*} g_1\ &=\ 1+2w+4zw+8z^2w^2+16z^4w\\ g_2\ &=\ 3+5zw^2+7z^2w+11z^3w+13z^3w^2\,, \end{align*} is a polynomial system with support ${\calB_\bullet}$. Thus the branched cover $X_{{\calA_\bullet}}\to{\mathbb C}^{{\calA_\bullet}}$ factors $X_{{\calA_\bullet}}\to X_{{\calB_\bullet}}\to{\mathbb C}^{{\calB_\bullet}}={\mathbb C}^{{\calA_\bullet}}$ with the map $X_{{\calA_\bullet}}\to X_{{\calB_\bullet}}$ induced by $\Phi$. This implies that $G_{{\calA_\bullet}}\subset ({\mathbb Z}/12{\mathbb Z})^{10}\rtimes S_{10}$, as ${\mathbb Z}^2/{\mathbb Z}{\calA_\bullet}\simeq{\mathbb Z}/12{\mathbb Z}$, ${\calB_\bullet}$ is neither lacunary nor triangular, and ${\rm MV}({\calB_\bullet})=10$. We generalize this example. Suppose that ${\calA_\bullet}=({\mathcal A}_1,\dotsc,{\mathcal A}_n)$ is lacunary. Then ${\mathbb Z}{\calA_\bullet}$ has rank $n$ but ${\mathbb Z}{\calA_\bullet}\neq{\mathbb Z}^n$. Let $\varphi\colon{\mathbb Z}^n\xrightarrow{\,\sim\,}{\mathbb Z}{\calA_\bullet}$ be an isomorphism. Then the corresponding map $\Phi=\varphi^*\colon({\mathbb C}^\times)^n\to({\mathbb C}^\times)^n$ is a surjection with kernel ${\rm Hom}({\mathbb Z}^n/{\mathbb Z}{\calA_\bullet},{\mathbb C}^\times)$. For each $i=1,\dotsc,n$, set $\defcolor{{\mathcal B}_i}:=\varphi^{-1}({\mathcal A}_i)$. Then ${\calB_\bullet}=({\mathcal B}_1,\dotsc,{\mathcal B}_n)$ is a collection of supports with ${\mathbb Z}{\calB_\bullet}={\mathbb Z}^n$. Since $\varphi$ is a bijection, we identify ${\mathbb C}^{{\mathcal B}_i}$ with ${\mathbb C}^{{\mathcal A}_i}$ and ${\mathbb C}^{{\calB_\bullet}}$ with ${\mathbb C}^{{\calA_\bullet}}$. Given a system $F(x)=0$ with $F\in{\mathbb C}^{{\calA_\bullet}}$, $\iota(F)(x)=0$ with $\defcolor{\iota(F)}\in{\mathbb C}^{{\calB_\bullet}}$ is the corresponding system with support ${\calB_\bullet}$. \begin{lemma}\label{L:Lacunary} Suppose that ${\calA_\bullet}$ is lacunary, $\varphi\colon{\mathbb Z}^n\xrightarrow{\,\sim\,}{\mathbb Z}{\calA_\bullet}$ is an isomorphism with corresponding surjection $\Phi\colon({\mathbb C}^\times)^n\to({\mathbb C}^\times)^n$. Let ${\calB_\bullet}:=\varphi^{-1}({\calA_\bullet})$ and suppose that ${\rm MV}({\calB_\bullet})>1$. Then the branched cover $X_{\calA_\bullet}\to{\mathbb C}^{\calA_\bullet}$ is decomposable and $X_{\calA_\bullet}\to X_{\calB_\bullet}\to{\mathbb C}^{\calA_\bullet}={\mathbb C}^{\calB_\bullet}$ is a nontrivial decomposition of branched covers induced by the map $\Phi$. \end{lemma} \begin{proof} If $g$ is a polynomial with support ${\mathcal B}\subset{\mathbb Z}^n$, then the composition $g\circ\Phi$ is a polynomial with support $\varphi({\mathcal B})$, with the coefficient of $x^\beta$ in $g$ equal to the coefficient of $x^{\varphi(\beta)}$ in $g\circ\Phi$. Since $\varphi({\mathcal B}_i)={\mathcal A}_i$, this gives the natural identifications $\iota\colon{\mathbb C}^{{\mathcal A}_i}\xrightarrow{\,\sim\,}{\mathbb C}^{{\mathcal B}_i}$ and $\iota\colon{\mathbb C}^{\calA_\bullet}\xrightarrow{\,\sim\,}{\mathbb C}^{\calB_\bullet}$ mentioned before the lemma. Under this identification, we have $\iota(f)(\Phi(x))=f(x)$. Since ${\rm MV}({\calB_\bullet})>1$, the branched cover $X_{\calB_\bullet}\to{\mathbb C}^{\calB_\bullet}$ is nontrivial. The identification $\iota\colon{\mathbb C}^{\calA_\bullet}\to{\mathbb C}^{\calB_\bullet}$ extends to a commutative diagram \begin{equation}\label{Eq:Lacunary} \raisebox{-25pt}{\begin{picture}(97,58)(-4,0) \put(35,52){\small$\iota\times\Phi$} \put(0,45){$X_{\calA_\bullet}$} \put(24,49){\vector(1,0){47}} \put(73,45){$X_{\calB_\bullet}$} \put(5,40){\vector(0,-1){27}} \put(78,40){\vector(0,-1){27}} \put(-4,25){\small$\pi$} \put(80,25){\small$\pi$} \put(45,7){\small$\iota$} \put(0,0){${\mathbb C}^{\calA_\bullet}$} \put(25,4){\vector(1,0){45}} \put(73, 0){${\mathbb C}^{\calB_\bullet}$} \end{picture}}\ \end{equation} Here, $\iota\times\Phi$ is the restriction of the map $\iota\times\Phi\colon {\mathbb C}^{\calA_\bullet}\times({\mathbb C}^\times)^n \to {\mathbb C}^{\calB_\bullet}\times({\mathbb C}^\times)^n$ to $X_{\calA_\bullet}$. The map $\iota\times\Phi\colon X_{\calA_\bullet}\to X_{\calB_\bullet}$ is a map of branched covers with $\ker\Phi$ acting freely on the fibers. If we restrict the diagram~\eqref{Eq:Lacunary} to the open subset $V$ of ${\mathbb C}^{\calB_\bullet}$ over which $X_{\calB_\bullet}\to{\mathbb C}^{\calB_\bullet}$ is a covering space, we obtain a composition of covering spaces with $\ker\Phi$ acting as deck transformations on ${\pi^{-1}(V)}\subset X_{\calA_\bullet}$. Thus $X_{\calA_\bullet}\to{\mathbb C}^{\calA_\bullet}$ is decomposable. \end{proof} \subsubsection{Triangular support}\label{SSS:triangular} This requires more discussion before we can state the analog of Lemma~\ref{L:Lacunary}. Let us begin with an example when $n=3$. Suppose that \[ {\mathcal A}_1\ =\ {\mathcal A}_2\ =\ {\mathcal A}\ =\ \begin{pmatrix} 0&1&1&1&2&2&2&3\\ 0&0&1&2&0&1&2&1\\ 0&1&2&3&2&3&4&4\end{pmatrix} \quad\mbox{and}\quad {\mathcal A}_3\ =\ \begin{pmatrix} 0&0&0&0&1&1\\ 0&0&0&1&0&1\\ 0&2&4&5&3&4\end{pmatrix} \] The span ${\mathbb Z}{\mathcal A}$ of the first two supports is isomorphic to ${\mathbb Z}^2$, with $\varphi(a,b)^T\mapsto(a,b,a+b)^T$ an isomorphism $\varphi\colon{\mathbb Z}^2\xrightarrow{\,\sim\,}{\mathbb Z}{\calA_\bullet}$. Set $\defcolor{{\mathcal B}}:=\varphi^{-1}({\mathcal A})$. We display ${\mathcal A}$, ${\mathcal A}_3$, and ${\mathcal B}$ in the horizontal plane together on the left below, and ${\mathcal B}$ on the right. \[ \begin{picture}(125,118)(-9,0) \put(0,0){\includegraphics{figures/3DSupport}} \put(1,109){$z$} \put(32,2){$x$} \put(108,71){$y$} \put(-9,69){${\mathcal A}_3$} \put(60,17){${\mathcal B}$} \put(79,90){${\mathcal A}$} \end{picture} \qquad \begin{picture}(82,54)(-12,0) \put(0,0){\includegraphics{figures/3DcalA}} \put(32,32){${\mathcal B}$} \end{picture} \] Consider the polynomial system $F=(f_1,f_2,f_3)\in{\mathbb C}[x,y,z]$ with support ${\calA_\bullet}$, \begin{align*} f_1 &=\ 1 + 2xz+3xyz^2+4xy^2z^3+5x^2z^2+6x^2yz^3+7x^2y^2z^4+8x^3yz^4\\ f_2 &=\ 2 + 3xz+5xyz^2+7xy^2z^3+11x^2z^2+13x^2yz^3+17x^2y^2z^4+19x^3yz^4\\ f_3 &=\ 1 + 3z^2 + 9 z^4 + 27 yz^5 + 81 xz^3 + 243 xyz^4\,. \end{align*} Let $\Phi\colon({\mathbb C}^\times)^3\to({\mathbb C}^\times)^2$ be given by $\Phi(x,y,z)=(xz,yz)=(u,v)$. If \begin{align*} g_1 &=\ 1 + 2u+3uv+4uv^2+ 5u^2+ 6u^2v+ 7u^2v^2+ 8u^3v\\ g_2 &=\ 2 + 3u+5uv+7uv^2+11u^2+13u^2v+17u^2v^2+19u^3v\,, \end{align*} then $f_i=g_i\circ\Phi$ for $i=1,2$. To compute ${\mathcal V}(F)$, we first may compute ${\mathcal V}(g_1,g_2)$ which consists of eight points. For each solution $(u_0,v_0)\in {\mathcal V}(g_1,g_2)$, we may identify the fiber $\Phi^{-1}(u_0,v_0)$ with ${\mathbb C}^\times$ by $z\mapsto (u_0z^{-1},v_0z^{-1},z)$. Then the restriction of $f_3$ to this fiber is \[ 1 + (3 + 81 u_0 + 243 u_0v_0)z^2 + (9 + 27 v_0 )z^4\,, \] which is a lacunary univariate polynomial with support $\{0,2,4\}$, and has four solutions (counted with multiplicity) when $v_0\neq -1/3$. This example generalizes to all triangular systems. Suppose that ${\calA_\bullet}=({\mathcal A}_1,\dotsc,{\mathcal A}_n)$ is triangular. Let $\emptyset\neq I\subsetneq[n]$ be a proper subset witnessing the triangularity, so that ${\rm rank}({\mathbb Z}{\mathcal A}_I)=|I|$. Set $\defcolor{J}:=[n]\smallsetminus I$. Let \[ \defcolor{{\mathbb Z}^I}\ :=\ {\mathbb Q}{\mathcal A}_I\cap{\mathbb Z}^n\ =\ \{ v\in{\mathbb Z}^n\mid \exists m\in{\mathbb N}\mbox{ with }mv\in{\mathbb Z}{\mathcal A}_I\}\,, \] be the saturation of ${\mathbb Z}{\mathcal A}_I$, which is a free abelian group of rank $|I|$. As it is saturated, $\defcolor{{\mathbb Z}_J}:={\mathbb Z}^n/{\mathbb Z}^I$ is free abelian of rank $n-|I|=|J|$. Applying ${\rm Hom}(\bullet,{\mathbb C}^\times)$ to the short exact sequence ${\mathbb Z}^I\hookrightarrow {\mathbb Z}^n\twoheadrightarrow{\mathbb Z}_J$ gives the short exact sequence of tori (whose characters are ${\mathbb Z}_J$, ${\mathbb Z}^n$, and ${\mathbb Z}^I$) with indicated maps, \begin{equation} \label{Eq:Triangular} ({\mathbb C}^\times)^{|J|}\simeq\defcolor{{\mathbb T}_J}:={\rm Hom}({\mathbb Z}_J,{\mathbb C}^\times)\ \ensuremath{\lhook\joinrel\relbar\joinrel\relbar\joinrel\rightarrow}\ ({\mathbb C}^\times)^n\ \stackrel{\Phi}{\ensuremath{\relbar\joinrel\relbar\joinrel\twoheadrightarrow}}\ \defcolor{{\mathbb T}^I}:={\rm Hom}({\mathbb Z}^I,{\mathbb C}^\times)\simeq({\mathbb C}^\times)^{|I|}\,. \end{equation} A polynomial $f$ with support in ${\mathbb Z}^I$ determines polynomial functions on $({\mathbb C}^\times)^n$ and on ${\mathbb T}^I$ with the first the pullback of the second. Let $f$ be a polynomial on $({\mathbb C}^\times)^n$ with support ${\mathcal A}\subset{\mathbb Z}^n$. Then its restriction to a fiber $\Phi^{-1}(y_0)$ of $\Phi$ is a regular function $\overline{f}$ on the fiber, which is a coset of ${\mathbb T}_J$. Choosing an identification of ${\mathbb T}_J\simeq\Phi^{-1}(y_0)$, we obtain a polynomial \defcolor{$\overline{f}$} on ${\mathbb T}_J$ whose support is the image \defcolor{$\overline{{\mathcal A}}$} of ${\mathcal A}$ in ${\mathbb Z}_J={\mathbb Z}^n/{\mathbb Z}^I$. This polynomial $\overline{f}$ depends upon the identification of the fiber with ${\mathbb T}_J$. Let $\defcolor{\overline{{\mathcal A}_J}}$ be the image in ${\mathbb Z}_J$ of the collection ${\mathcal A}_J$ of supports. Then we have the product formula (see~\cite[Lem.~6]{ThSt} or~\cite[Thm.~1.10]{Esterov}) \begin{equation}\label{Eq:MVproduct} {\rm MV}({\calA_\bullet})\ =\ {\rm MV}({\mathcal A}_I)\cdot{\rm MV}(\overline{{\mathcal A}_J})\,. \end{equation} Since ${\calA_\bullet} = {\mathcal A}_I\sqcup{\mathcal A}_J$, we have the identification ${\mathbb C}^{\calA_\bullet}={\mathbb C}^{{\mathcal A}_I}\oplus{\mathbb C}^{{\mathcal A}_J}$. Suppose that $F(x)=0$ is a polynomial system with support ${\calA_\bullet}$. Write $\defcolor{F_I}\in{\mathbb C}^{{\mathcal A}_I}$ for its restriction to the indices in $I$, and the same for $F_J$. We have the diagram \begin{equation}\label{Eq:Triangular_Decomposition} \raisebox{-25pt}{\begin{picture}(97,60)(-4,0) \put(32,52){\small$p_I\times\Phi$} \put(0,45){$X_{\calA_\bullet}$} \put(24,49){\vector(1,0){47}} \put(73,45){$X_{{\mathcal A}_I}$} \put(5,40){\vector(0,-1){27}} \put(78,40){\vector(0,-1){27}} \put(-4,25){\small$\pi$} \put(80,25){\small$\pi$} \put(44,8){\small$p_I$} \put(0,0){${\mathbb C}^{\calA_\bullet}$} \put(25,4){\vector(1,0){45}} \put(73, 0){${\mathbb C}^{{\mathcal A}_I}$} \end{picture}}\ . \end{equation} Here, $p_I\times\Phi$ is the restriction of the map $p_I\times\Phi\colon{\mathbb C}^{\calA_\bullet}\times({\mathbb C}^\times)^n\to {\mathbb C}^{{\mathcal A}_I}\times{\mathbb T}^I$ to $X_{\calA_\bullet}$. Let $\defcolor{V_{\calA_\bullet}}\subset{\mathbb C}^{\calA_\bullet}$ be the maximal Zariski open subset over which $X_{\calA_\bullet}$ is a covering space. This is the set of polynomial systems $F(x)=0$ with support ${\calA_\bullet}$ which have exactly ${\rm MV}({\calA_\bullet})$ solutions in $({\mathbb C}^\times)^n$. Similarly, let $\defcolor{V_{{\mathcal A}_I}}\subset{\mathbb C}^{{\mathcal A}_I}$ be the maximal Zariski open subset where $X_{{\mathcal A}_I}\to{\mathbb C}^{{\mathcal A}_I}$ is a covering space. We will show that under the projection ${\mathbb C}^{{\calA_\bullet}}\to{\mathbb C}^{{\mathcal A}_I}$, the image of $V_{\calA_\bullet}$ is a subset of $V_{{\mathcal A}_I}$. Define $\defcolor{Y_{{\calA_\bullet}}}\to V_{\calA_\bullet}$ to be the restriction of $X_{\calA_\bullet}\to{\mathbb C}^{{\calA_\bullet}}$ to the Zariski open set $V_{\calA_\bullet}$. Also define $\defcolor{Y_{{\mathcal A}_I}}\to V_{\calA_\bullet}$ to be the pullback of $X_{{\mathcal A}_I}\to{\mathbb C}^{{\mathcal A}_I}$ along the map $V_{\calA_\bullet}\to V_{{\mathcal A}_I}$. Write $\Phi\colon Y_{\calA_\bullet}\to Y_{{\mathcal A}_I}$ for the map induced by $\Phi$. \begin{lemma}\label{L:Triangular} Suppose that ${\calA_\bullet}$ is a triangular set of supports in ${\mathbb Z}^n$ witnessed by $I\subsetneq[n]$. Then $Y_{\calA_\bullet}\to Y_{{\mathcal A}_I}\to V_{{\calA_\bullet}}$ a composition of covering spaces. If $1<{\rm MV}({\mathcal A}_I)<{\rm MV}({\calA_\bullet})$, then this decomposition is nontrivial, so that $X_{\calA_\bullet}\to{\mathbb C}^{\calA_\bullet}$ is decomposable. Furthermore, each fiber of the map $Y_{\calA_\bullet}\to Y_{{\mathcal A}_I}$ may be identified with the set of solutions to a polynomial system with support $\overline{{\mathcal A}_J}$. \end{lemma} \begin{proof} Let $F\in V_{{\calA_\bullet}}$. Then its number of solutions is $\#{\mathcal V}(F)={\rm MV}({\calA_\bullet})$. If $x\in{\mathcal V}(F)$, then $\Phi(x)\in{\mathbb T}^I$ is a solution to $f_i=0$ for $i\in I$. Thus $\Phi({\mathcal V}(F))\subset{\mathcal V}(F_I)$, the latter being the solutions to $F_I(x)=0$ on ${\mathbb T}^I$. For any $y\in{\mathcal V}(F_I)$, if we choose an identification ${\mathbb T}_J \simeq\Phi^{-1}(y)$ of the fiber, then the restriction of $F$ to $\Phi^{-1}(y)$ is the system $\defcolor{\overline{F_J}}=\{\overline{f_j}\mid j\in J\}$. By the Bernstein-Kushnirenko Theorem, this has at most ${\rm MV}(\overline{{\mathcal A}_J})$ solutions. By the product formula~\eqref{Eq:MVproduct} and our assumption on $\#{\mathcal V}(F)$, we conclude that the system $F_I(x)=0$ has ${\rm MV}({\mathcal A}_I)$ solutions, and for each $y\in{\mathcal V}(F_I)$, the system $\overline{F_J}$ has ${\rm MV}(\overline{{\mathcal A}_J})$ solutions. In particular, this implies that the image of $V_{{\calA_\bullet}}$ in ${\mathbb C}^{{\mathcal A}_I}$ is a subset of $V_{{\mathcal A}_I}$. As $V_{{\calA_\bullet}}$ is open and dense in ${\mathbb C}^{\calA_\bullet}$, its image contains an open dense subset. This proves the assertion that $Y_{\calA_\bullet}\to Y_{{\mathcal A}_I}\to V_{{\calA_\bullet}}$ is a decomposition of covering spaces. We have already shown that each fiber of the map $Y_{\calA_\bullet}\to Y_{{\mathcal A}_I}$ is a polynomial system with support $\overline{{\mathcal A}_J}$ with exactly ${\rm MV}(\overline{{\mathcal A}_J})$ solutions. Thus when $1<{\rm MV}({\mathcal A}_I)<{\rm MV}({\calA_\bullet})$, we have ${\rm MV}(\overline{{\mathcal A}_J})>1$, which shows that this decomposition is nontrivial. \end{proof} \subsection{Computing the Decompositions}\label{S:SNF} We show how to compute the decompositions of $X_{\calA_\bullet}\to{\mathbb C}^{{\calA_\bullet}}$ from Section~\ref{SS:Decompositions} when ${\calA_\bullet}$ is either lacunary or strictly triangular. Let ${\mathcal A}=\{0,\alpha_1,\dotsc,\alpha_m\}\subset{\mathbb Z}^n$ be a collection of integer vectors. The subgroup ${\mathbb Z}{\mathcal A}\subset{\mathbb Z}^n$ that it generates is the image of a ${\mathbb Z}$-linear map ${\mathbb Z}^m\to{\mathbb Z}^n$ and is represented by a $n\times m$ integer matrix \defcolor{$A$} whose columns are the vectors $a_i$. Suppose that ${\mathbb Z}{\mathcal A}$ has rank $k$. A \demph{Smith normal form} of $A$ is a factorization into integer matrices \begin{equation}\label{Eq:SNF} A\ =\ PDQ\,, \end{equation} where $P\in{\rm GL}_n({\mathbb Z})$ and $Q\in{\rm GL}_m({\mathbb Z})$ are invertible, and $D$ is the rectangular matrix whose only nonzero entries are $d_1,\dotsc,d_k$ along the diagonal of its principal $k\times k$ submatrix. These are the \demph{invariant factors} of $A$ and they satisfy $d_1|d_2|d_3|\dotsb|d_k$. The subgroup ${\mathbb Z}{\mathcal A}\subset{\mathbb Z}^n$ has a basis given by the columns of the matrix $PD$. If we apply the coordinate change $P^{-1}$ to ${\mathbb Z}^n$, then ${\mathbb Z}{\mathcal A}$ becomes the subset of the coordinate space ${\mathbb Z}^k\oplus{\boldsymbol 0}^{n-k}$ given by $d_1{\mathbb Z}\oplus d_2{\mathbb Z}\oplus\dotsb\oplus d_k{\mathbb Z}\oplus{\boldsymbol 0}^{n-k}$. Let us consider a Smith normal form~\eqref{Eq:SNF} when ${\mathcal A}$ is the collection of vectors in ${\calA_\bullet}$ and ${\rm MV}({\calA_\bullet})>0$. Then $d_n> 0$ as ${\mathbb Z}{\calA_\bullet}$ has rank $n$, and ${\calA_\bullet}$ is lacunary when $d_n> 1$. In this case, an identification $\varphi\colon{\mathbb Z}^n\xrightarrow{\,\sim\,}{\mathbb Z}{\mathcal A}$ is given by $PD_n$, where \defcolor{$D_n$} is the principal $n\times n$ submatrix of $D$. Recall from~\S~\ref{SS:CoordinateChanges} that the corresponding surjection $\varphi^*=\Phi\colon({\mathbb C}^\times)^n\to({\mathbb C}^\times)^n$ has kernel ${\rm Hom}({\mathbb Z}^n/{\mathbb Z}{\calA_\bullet},{\mathbb C}^\times)$. Let $\defcolor{\psi}:=P^{-1}$. Then $\psi\circ\varphi=D_n$, so that if we set $\defcolor{\Psi}:=\psi^*$, then $\Phi\circ\Psi\colon({\mathbb C}^\times)^n\to({\mathbb C}^\times)^n$ is diagonal, \begin{equation}\label{Eq:diagonal} \Phi\circ\Psi(x_1,\dotsc,x_n)\ =\ (x_1^{d_1},\dotsc,x_n^{d_n})\,. \end{equation} Let $y=(y_1,\dotsc,y_n)\in({\mathbb C}^\times)^n$. If we set $\defcolor{\rho_i}:=|y_i|$ and $\defcolor{\zeta_i}:=\arg(y_i)$ so that $y_i=\rho_i e^{\sqrt{-1}\zeta_i}$, then $(\Phi\circ\Psi)^{-1}(y)$ is the set \begin{equation}\label{Eq:PhiInv} \left\{ \left(\rho_1^{1/d_1}e^{\sqrt{-1}\theta_1}\,,\,\dotsc\,,\,\rho_n^{1/d_n}e^{\sqrt{-1}\theta_n}\right) \,\middle\vert\, \theta_i = \tfrac{\zeta_i{+}2\pi j}{d_i}\mbox{ for } j=0,\dotsc,d_i{-}1\right\}.\vspace{3pt} \end{equation} % This ends the discussion of lacunary sparse polynomial systems. Suppose that ${\calA_\bullet}$ is triangular, and let us use the notation of \S~\ref{SSS:triangular}. We suppose that $I=[k]=\{1,\dotsc,k\}$ and $J=\{k{+}1,\dotsc,n\}$. Given a polynomial $f$ on $({\mathbb C}^\times)^n$, its restriction $\overline{f}$ to a fiber of $\Phi\colon({\mathbb C}^\times)^n\to{\mathbb T}^I$ is a regular function on the fiber, which is isomorphic to ${\mathbb T}_J$. To represent $\overline{f}$ as a polynomial on ${\mathbb T}_J$ depends on the choice of a point in that fiber. Indeed, suppose that $f=\sum_{\alpha\in{\mathcal A}}c_\alpha x^\alpha$. Let $y\in{\mathbb T}^I$ and $y_0\in\Phi^{-1}(y)$ be a point in the fiber above $y$, so that ${\mathbb T}_J\ni z\mapsto y_0z\in\Phi^{-1}(y)$ parameterizes $\Phi^{-1}(y)$. If we write \defcolor{$\overline{\alpha}$} for the image of $\alpha\in{\mathbb Z}^n$ in ${\mathbb Z}_J={\mathbb Z}^n/{\mathbb Z}^I$, then \begin{equation}\label{Eq:substituteFibre} \overline{f}(z)\ =\ \sum_{\alpha\in{\mathcal A}} c_\alpha (y_0z)^\alpha\ =\ \sum_{\beta\in\overline{{\mathcal A}}} z^\beta \ \biggl(\,\sum_{\alpha\in{\mathcal A}\ \mbox{\scriptsize with}\ \overline{\alpha}=\beta} c_\alpha y_0^\alpha\biggr)\,. \end{equation} A uniform choice of a point in each fiber is given by a splitting ${\mathbb T}^I\hookrightarrow({\mathbb C}^\times)^n$ of the map $\Phi\colon({\mathbb C}^\times)^n\twoheadrightarrow{\mathbb T}^I$. This gives an identification $({\mathbb C}^\times)^n={\mathbb T}^I\times{\mathbb T}_J$. Then points $y\in{\mathbb T}^I$ are canonical representatives of cosets of ${\mathbb T}_J$. As $k=|I|$, we may further fix isomorphisms ${\mathbb T}^I\simeq({\mathbb C}^\times)^k$ giving ${\mathbb Z}^I\simeq{\mathbb Z}^k$ and ${\mathbb T}_J\simeq({\mathbb C}^\times)^{n-k}$ giving ${\mathbb Z}_J\simeq{\mathbb Z}^{n-k}$. Suppose now that ${\mathcal A}={\mathcal A}_I$, and we compute a decomposition~\eqref{Eq:SNF}. Since ${\mathbb Z}{\mathcal A}_I$ has rank $k$, the diagonal matrix $D$ has $k$ nonzero invariant factors. The saturation $L$ of ${\mathbb Z}{\mathcal A}_I$ is the image of $PI_k$, where $I_k$ is the $n\times n$ matrix whose only nonzero entries are in its principal $k\times k$ submatrix, which forms an identity matrix. Then $\varphi=PI_k$ and $\Phi=\varphi^*$. Applying the coordinate change $\defcolor{\psi}:=P^{-1}$ to ${\mathbb Z}^n$ identifies this saturation as the coordinate plane ${\mathbb Z}^k\oplus{\boldsymbol 0}^{n-k}$ and the free abelian group ${\mathbb Z}{\mathcal A}_I$ as $d_1{\mathbb Z}\oplus d_2{\mathbb Z}\oplus\dotsb\oplus d_k{\mathbb Z}\oplus{\boldsymbol 0}^{n-k}$. As in Section~\ref{SSS:triangular}, this identifies ${\mathbb Z}/L$ with the complementary coordinate plane, ${\boldsymbol 0}^k\oplus{\mathbb Z}^{n-k}$. Setting $\defcolor{\Psi}:=\psi^*$ , the composition $\Phi\circ\Psi$ is the projection to the first $k$ coordinates, \begin{equation}\label{Eq:projection} \Phi\circ\Psi\;\colon\; ({\mathbb C}^\times)^n\ \ensuremath{\relbar\joinrel\relbar\joinrel\twoheadrightarrow}\ ({\mathbb C}^\times)^k \end{equation} and we identify ${\mathbb T}_J=1^k\times ({\mathbb C}^\times)^{n-k}$ and ${\mathbb T}^I=({\mathbb C}^\times)^k\times 1^{n-k}$. \section{Algorithms for Solving Sparse Decomposable Systems}\label{S:Algorithm} We describe algorithms for solving sparse decomposable systems, and suggest an application of these algorithms to computing a start system to solve general systems (not necessarily decomposable) of sparse polynomials. They are based on numerical homotopy continuation~\cite{Morgan}. By ``solve a system of polynomials'', we mean compute numerical approximations to the complex isolated solutions which may then be refined using Newton iterations. The expected numbers of isolated solutions to the systems we consider are mixed volumes as explained in the Bernstein-Kushnirenko Theorem. In principle, as the systems are square and we know the expected number of isolated solutions, Smale's $\alpha$-theory~\cite{Smale} enables approximations to solutions to be certified as approximate solutions in that Newton iterations converge quadratically to solutions, as explained in~\cite{HS12}. Let ${\calA_\bullet}$ be a collection of supports with ${\rm MV}({\calA_\bullet})>0$, so that $\pi\colon X_{\calA_\bullet}\to{\mathbb C}^{\calA_\bullet}$ is a branched cover and let $F \in {\mathbb C}^{\calA_\bullet}$. A \demph{start system} for ${\calA_\bullet}$ is a pair $(G,{\mathcal V}(G))$ where $G\in{\mathbb C}^{\calA_\bullet}$ and ${\mathcal V}(G)$ consists of ${\rm MV}({\calA_\bullet})$ distinct points. The convex combination of systems \begin{equation}\label{Eq:parameter} \defcolor{H(t)}\ =\ tF + (1-t)G\qquad\mbox{for }t\ \in\ {\mathbb C}\,, \end{equation} is a straight-line homotopy. Then ${\mathcal V}(H(t))\subset({\mathbb C}^\times)^{\calA_\bullet}\times{\mathbb C}$ defines a curve $C$. Forgetting the $x$-coordinates gives a dominant map $C\to{\mathbb C}$. Restricting to points above $t\in[0,1]$ gives a family of arcs on $C$. Starting with the points of ${\mathcal V}(G)$ at $t=0$, path-tracking along these arcs using $H(t)$ will give isolated solutions to ${\mathcal V}(F)$ at $t=1$ when $F$ is a regular value of $\pi$. This is an instance of a \demph{(parameter) homotopy}~\cite{LSY89,MS89}. If $F$ is not a regular value but ${\mathcal V}(F)$ is still finite, then ${\mathcal V}(F)$ may be computed using endgames~\cite{BHS11,HV98}. Problems of numerically tracking solutions are treated in \cite{Morgan,SW05}. \subsection{Solving decomposable sparse systems}\label{ss:sdss} We describe algorithms that use Esterov's conditions to solve a decomposable sparse polynomial system. In each, we let \defcolor{$\texttt{SOLVE}$} be an arbitrary algorithm for solving a polynomial system. We assume that it is known that the system $F(x)=0$ to be solved is general given its support ${\calA_\bullet}$ in that it has ${\rm MV}({\calA_\bullet})$ solutions in $({\mathbb C}^\times)^n$. If not, then one instead solves a polynomial system with support $A_\bullet$ whose coefficients are random complex numbers. With probability one, this system is generic and one may use a homotopy together with endgames to compute the isolated solutions to ${\mathcal V}(F)$. Our main algorithm (Algorithm~\ref{alg:SDS}) takes a sparse system and checks Esterov's criteria for decomposability. If the system is decomposable, the algorithm calls Algorithm~\ref{alg:Lacunary} (if lacunary) or Algorithm~\ref{alg:Triangular} (if triangular), and in each of these algorithms calls to the solver $\texttt{SOLVE}$ are assumed to be recursive calls back to Algorithm~\ref{alg:SDS}. If the polynomial system is indecomposable, then Algorithm~\ref{alg:SDS} calls a black box solver $\defcolor{\texttt{BLACKBOX}}$. Recall from Section~\ref{SS:CoordinateChanges} the relation between the linear map $\varphi=\Phi^*$ and the group homomorphism $\Phi=\varphi^*$. Furthermore, recall the identification $\iota$ in \eqref{Eq:Lacunary}. \begin{algorithm}[SolveLacunary]\ \label{alg:Lacunary} {\bf Input:} A general polynomial system $F(x)=0$ whose support ${\calA_\bullet}$ is lacunary. {\bf Output:} All isolated solutions ${\mathcal V}(F)\subset ({\mathbb C}^\times)^n$. {\bf Do:} \begin{enumerate} \item Compute a Smith normal form \eqref{Eq:SNF} of ${\calA_\bullet}$, giving $\varphi=PD_n$, $\Phi=\varphi^*$, $\psi = P^{-1}$, and $\Psi=\psi^*$, so that $\Phi\circ\Psi$ is diagonal~\eqref{Eq:diagonal}. \item Use $\texttt{SOLVE}$ to compute isolated solutions of $\iota(F)(x)=0$ in $({\mathbb C}^\times)^n$. \item Using the formula~\eqref{Eq:PhiInv} to compute $(\Phi\circ\Psi)^{-1}(y)$ for $y\in{\mathcal V}(\iota(F))$, return \[ \{ \Psi(w) \mid w\in \bigcup_{y \in{\mathcal V}(\iota(F))} (\Phi\circ\Psi)^{-1}(y)\}\,. \] \end{enumerate} \end{algorithm} \begin{proof}[Proof of Correctness.] By Lemma~\ref{L:Lacunary}, ${\mathcal V}(F)=\Phi^{-1}({\mathcal V}(\iota(F)))$. We apply $\Psi$ to points of $(\Phi\circ\Psi)^{-1}(y)$ for $y\in{\mathcal V}(\iota(F))$ to obtain points of ${\mathcal V}(F)$ in their original coordinates. \end{proof} Recall the notation ${F_I}\in{\mathbb C}^{{\mathcal A}_I}$ used in \eqref{Eq:Triangular_Decomposition}. \begin{algorithm}[SolveTriangular]\ \label{alg:Triangular} {\bf Input:} A general polynomial system $F(x)=0$ whose support ${\calA_\bullet}$ is triangular, witnessed by $0<k<n$ such that ${\rm rank}({\mathbb Z}{\mathcal A}_{[k]})=k$. {\bf Output:} All isolated solutions to ${\mathcal V}(F)\subset({\mathbb C}^\times)^n$. {\bf Do:} \begin{enumerate} \item Compute a Smith normal form \eqref{Eq:SNF} of ${\mathcal A}_{[k]}$, giving $\varphi=PI_k$, $\Phi=\varphi^*$, $\psi = P^{-1}$, and $\Psi=\psi^*$, so that $\Phi\circ\Psi$ is the projection~\eqref{Eq:projection}. \item Use $\texttt{SOLVE}$ to compute isolated solutions to $F_{[k]}(x)=0$ in $({\mathbb C}^\times)^k$. \item Choose $y_0\in{\mathcal V}(F_{[k]})$. Use $\texttt{SOLVE}$ to compute the points of the fiber $(\Phi\circ\Psi)^{-1}(y_0)$ in $Y_{{\calA_\bullet}}$, which are ${\mathcal V}(\overline{F_J})\subset\{y_0\}\times({\mathbb C}^\times)^{n-k}$, where $\overline{F_J}(x)=0$ has support $\overline{{\mathcal A}_J}$ and $J:=[n]\smallsetminus[k]$. \item For each $y\in{\mathcal V}(F_{[k]})$ use a homotopy~\eqref{Eq:parameter} with start system ${\mathcal V}(\overline{F_J})$ to compute $(\Phi\circ\Psi)^{-1}(y)$ and return \[ \{ \Psi(w) \mid w\in \bigcup_{y \in{\mathcal V}(F_{[k]})} (\Phi\circ\Psi)^{-1}(y)\}\,. \] \end{enumerate} \end{algorithm} \begin{proof}[Proof of Correctness.] By Lemma~\ref{L:Triangular}, every solution $x\in{\mathcal V}(F)$ lies over a solution $y=\Phi(x)$ to $F_{[k]}(x)=0$ in $({\mathbb C}^\times)^k$. As explained in Section~\ref{S:SNF}, the map $\Phi\circ\Psi$ is a coordinate projection and $(\Phi\circ\Psi)^{-1}(y)={\mathcal V}(\overline{F_J})$. Here, $\overline{F_J}=(\overline{f_{k+1}},\dotsc,\overline{f_n})$ where $\overline{f_j}$ has support $\overline{{\mathcal A}_j}$ and is computed using~\eqref{Eq:substituteFibre}. We apply $\Psi$ to convert these points to the original coordinates. \end{proof} The previous two algorithms handle decomposable systems that are lacunary or triangular. We now state our main algorithm and later illustrate it in detail for a decomposable support ${\calA_\bullet}$ in Example~\ref{Ex:computation1}. We remark that our methods can be used as a preprocessing step for a black box solver. \begin{algorithm}[SolveDecomposable]\ \label{alg:SDS} {\bf Input:} A generic polynomial system $F(x)=0$ with support ${\calA_\bullet}$. {\bf Output:} All isolated solutions to ${\mathcal V}(F)\subset ({\mathbb C}^\times)^n$. {\bf Do:} \begin{enumerate} \item Compute a Smith normal form $PDQ$~\eqref{Eq:SNF} of ${\calA_\bullet}$.\newline {\bf if} $d_n>1$, then {\bf return} SolveLacunary$(F)$.\newline {\bf if} $d_n=1$, then {\bf for all} $\emptyset\neq I\subsetneq [n]$ compute a Smith normal form $PD_IQ$~\eqref{Eq:SNF} of ${\mathcal A}_I$. \item \quad \quad {\bf if} ${\rm rank}(D_I)=|I|$ for some $I$, reorder so that $I=[k]$ and \quad \quad \quad {\bf return} SolveTriangular$(F,k)$. \item \quad \quad {\bf else} neither of Esterov's conditions hold and {\bf return} $\texttt{BLACKBOX}(F)$. \end{enumerate} \end{algorithm} \begin{proof}[Proof of Correctness.] First note that if the algorithm halts, then it returns the isolated solutions of $F(x)=0$. Halting is clear in Case (3), but the other cases involve recursive calls back to Algorithm~\ref{alg:SDS}. In Case (1), SolveLacunary will call Algorithm~\ref{alg:SDS} on a system $\iota(F)(x)=0$ whose mixed volume is less than ${\rm MV}({\calA_\bullet})$. In Case (2), SolveTriangular will call Algorithm~\ref{alg:SDS} on systems $F_{[k]}(x)=0$ and $\overline{F_J}(x)=0$, each involving fewer variables than $F(x)=0$. Thus, in each recursive call back to Algorithm~\ref{alg:SDS}, either the mixed volume or the number of variables decreases, which proves that the algorithm halts. \end{proof} \subsection{Start Systems} The B\'ezout homotopy~\cite{Garcia79} is a well-known homotopy for solving a system $F=(f_1,\dotsc,f_n)=0$ where each $f_i$ is a general polynomial of degree $d_i$. In it, the start system is $G=(x_1^{d_1}-z_1,\dotsc,x_n^{d_n}-z_n)$, and ${\mathcal V}(G)=\Phi^{-1}(z)$, where $\Phi$ is the diagonal map~\eqref{Eq:diagonal} and $\Phi^{-1}(z)$ is determined by inspection from~\eqref{Eq:PhiInv}. This start system is a highly decomposable sparse polynomial system consisting of supports which are subsets of the original support of $F(x)=0$, but have the same mixed volume. We propose a generalization, in which Algorithm~\ref{alg:SDS} is used to compute a start system. \begin{example}\label{Ex:start} Suppose that we have supports ${\mathcal A}_1={\mathcal A}_2={\mathcal A}$, which are given by the columns of the matrix $(\begin{smallmatrix}0&0&1&1&2&3&3&3&4&5&5&6\\0&2&0&1&3&0&1&4&2&3&4&4\end{smallmatrix})$. Then ${\rm MV}({\mathcal A}_1,{\mathcal A}_2)={\rm vol}({\rm conv}({\mathcal A}))=30$. Let ${\mathcal B}_1={\mathcal B}_2=(\begin{smallmatrix}0&0&3&3&6\\0&2&0&4&4\end{smallmatrix})$\vspace{1pt} be the set of vertices of ${\rm conv}({\mathcal A})$. Given a general $F\in{\mathbb C}^{\calA_\bullet}$, let $G\in{\mathbb C}^{\calB_\bullet}\subset{\mathbb C}^{\calA_\bullet}$ be obtained from $F$ by restriction to the monomials in ${\mathcal B}$. (That is, we set coefficients of monomials $x^\alpha$ in $F$ to zero if $\alpha\not\in{\mathcal B}$.) Then ${\calB_\bullet}$ is lacunary with the map $\Phi(x_1,x_2)=(x_1^3,x_2^2)$, and $\iota(G)$ has five solutions, say $(z_i,w_i)\in \mathbb{C}^2$ for $i=1,2,..,5$. The left, center, and right figures give the support of the polynomials appearing in the systems $F=0$, $G=0$, and $\iota(G)=0$ respectively. (The blue and red dots correspond to monomials with a nonzero coefficient.) \[ \includegraphics{figures/bigAdot}\quad\quad \includegraphics{figures/bigAdot2}\quad\quad \includegraphics{figures/bigAdot3} \] We may use Algorithm~\ref{alg:SDS} (more specifically, Algorithm~\ref{alg:Lacunary}) to compute ${\mathcal V}(G)$. \newcommand{\sqrt[\leftroot{-1}\uproot{2}\scriptstyle 3]{z_i}}{\sqrt[\leftroot{-1}\uproot{2}\scriptstyle 3]{z_i}} \newcommand{\sqrt{w_i}}{\sqrt{w_i}} The thirty solutions to $G=0$ are \[ (\sqrt[\leftroot{-1}\uproot{2}\scriptstyle 3]{z_i},\sqrt{w_i}),\;(\eta \sqrt[\leftroot{-1}\uproot{2}\scriptstyle 3]{z_i},\sqrt{w_i}),\;( \eta^2 \sqrt[\leftroot{-1}\uproot{2}\scriptstyle 3]{z_i},\sqrt{w_i}),\; (\sqrt[\leftroot{-1}\uproot{2}\scriptstyle 3]{z_i},-\sqrt{w_i}),\; ( \eta \sqrt[\leftroot{-1}\uproot{2}\scriptstyle 3]{z_i},-\sqrt{w_i}),\;(\eta^2 \sqrt[\leftroot{-1}\uproot{2}\scriptstyle 3]{z_i},-\sqrt{w_i}) \] for $i=1,2,..,5$ and where $\eta$ is a primitive third root of unity. We compute the isolated solutions of $F(x)=0$ using the homotopy % \begin{equation}\label{Eq:SLH} H(t)\ =\ t F\ +\ (1-t)G \end{equation} with start system $G=H(0)$ and tracking from the thirty solutions ${\mathcal V}(G)$ at $t=0$. \hfill$\diamond$ \end{example} Example~\ref{Ex:start} motivates our final algorithm. For a finite set ${\mathcal A}\subset{\mathbb Z}^n$, let $\defcolor{v({\mathcal A})}\subset{\mathcal A}$ be the subset of vertices of ${\rm conv}({\mathcal A})$. For a collection ${\calA_\bullet}=({\mathcal A}_1,\dotsc,{\mathcal A}_n)$ of supports, let $\defcolor{v({\calA_\bullet})}:=(v({\mathcal A}_1),\dotsc,v({\mathcal A}_n))$. Note that if $G \in {\mathbb C}^{v({\calA_\bullet})}$ is a regular value of the branched cover $\pi|_{X_{v({\calA_\bullet})}}\colon X_{v({\calA_\bullet})} \to {\mathbb C}^{v({\calA_\bullet})}$ then $G$ is also a regular value of $\pi\colon X_{\calA_\bullet} \to {\mathbb C}^{\calA_\bullet}$. As such, $G(x)=0$ may be taken as a start system for the homotopy~\eqref{Eq:SLH} and may be used to compute ${\mathcal V}(F)$ for any $F\in{\mathbb C}^{{\calA_\bullet}}$ with ${\mathcal V}(F)$ finite. The benefit of this approach, as seen in Example~\ref{Ex:start}, is that $\pi|_{X_{v({\calA_\bullet})}}$ is more likely than $\pi$ to be lacunary. \begin{algorithm}[Decomposable Start System]\ \label{alg:SDSS} {\bf Input:} A set ${\calA_\bullet}$ of supports. {\bf Output:} A start system $(G,{\mathcal V}(G))$ for ${\calA_\bullet}$. {\bf Do:} \begin{enumerate} \item Choose a general system $G\in{\mathbb C}^{v({\calA_\bullet})}$. \item Compute ${\mathcal V}(G)$ using Algorithm~\ref{alg:SDS}. \item {\bf return} the pair $(G,{\mathcal V}(G))$. \end{enumerate} \end{algorithm} \begin{proof}[Proof of Correctness.] As $G\in{\mathbb C}^{v({\calA_\bullet})}$ is general, it has ${\rm MV}(v({\calA_\bullet}))$ solutions. Since for each $i$, ${\rm conv}({\mathcal A}_i)={\rm conv}(v({\mathcal A}_i))$, we have ${\rm MV}(v({\calA_\bullet}))={\rm MV}({\calA_\bullet})$. Finally, ${\mathbb C}^{v({\calA_\bullet})}$ is the subspace of ${\mathbb C}^{{\calA_\bullet}}$ where the coefficients of nonextreme monomials in each polynomial are zero. Thus $G\in{\mathbb C}^{{\calA_\bullet}}$, which shows that $(G,{\mathcal V}(G))$ is a start system for ${\calA_\bullet}$. \end{proof} \begin{remark}\label{R:more} The B\'ezout homotopy motivated the idea behind Algorithm~\ref{alg:SDSS}. However, if we apply Algorithm~\ref{alg:SDSS} to the system of supports ${\calA_\bullet}$, where ${\mathcal A}_i$ is all monomials of degree at most $d_i$, then we will not get the start system for the B\'ezout homotopy. For example, when $n=2$, $d_1=2$, and $d_2=3$, the supports are as shown. \[ \begin{picture}(39,51)(0,-12) \put(0,0){\includegraphics{figures/Bez1}} \put(12,-11){${\mathcal A}_1$} \end{picture} \qquad \begin{picture}(51,63)(0,-12) \put(0,0){\includegraphics{figures/Bez2}} \put(18,-11){${\mathcal A}_2$} \end{picture}\qquad \begin{picture}(39,51)(0,-12) \put(0,0){\includegraphics{figures/Bez3}} \put(6,-11){$v({\mathcal A}_1)$} \end{picture} \qquad \begin{picture}(51,63)(0,-12) \put(0,0){\includegraphics{figures/Bez4}} \put(11,-11){$v({\mathcal A}_2)$} \end{picture}\qquad \begin{picture}(39,30)(0,-12) \put(0,0){\includegraphics{figures/Bez5}} \put(13,-11){${\mathcal B}_1$} \end{picture} \qquad \begin{picture}(18,63)(0,-12) \put(0,0){\includegraphics{figures/Bez6}} \put(3,-11){${\mathcal B}_2$} \end{picture} \] Here, ${\mathcal B}_1$ and ${\mathcal B}_2$ are the supports of the start system for the B\'ezout homotopy. We leave open the challenge of finding a simple, general method to replace each set ${\mathcal A}_i$ by a subset ${\mathcal B}_i$ of $v({\mathcal A}_i)$, so that ${\rm MV}({\calA_\bullet})={\rm MV}({\calB_\bullet})$ and $\pi\colon X_{{\calB_\bullet}} \to {\mathbb C}^{\calB_\bullet}$ is decomposable. A possible first step would be to refine the methods of~\cite{Chen}. This may lead to a simpler start system for a homotopy to solve general systems with support ${\calA_\bullet}$. \hfill$\diamond$ \end{remark} \section{A computational experiment}\label{S:computations} We explored the computational cost of using Algorithm~\ref{alg:SDS} to solve sparse decomposable systems, comparing timings to PHCPack~\cite{V99,PHC_M2} on a family of related systems. Let ${\mathcal A}_1=(\begin{smallmatrix}0&1&2&0&1\\0&0&0&1&1\end{smallmatrix})$, ${\mathcal A}_2=(\begin{smallmatrix}1&0&1&2&1\\0&1&1&1&2\end{smallmatrix})$, ${\mathcal B}_1=(\begin{smallmatrix}0&2&0&2\\0&0&1&3\end{smallmatrix})$, and ${\mathcal B}_2=(\begin{smallmatrix}0&1&2&0&2&0\\0&0&0&1&1&2\end{smallmatrix})$. We display these supports and their convex hulls below. \[ {\mathcal A}_1\ \raisebox{-11pt}{\includegraphics{figures/calA1}}\qquad {\mathcal A}_2\ \raisebox{-18.5pt}{\includegraphics{figures/calA2}}\qquad\qquad {\mathcal B}_1\ \raisebox{-26pt}{\includegraphics{figures/calB1}}\qquad {\mathcal B}_2\ \raisebox{-18.5pt}{\includegraphics{figures/calB2}} \] Let $\defcolor{{\mathcal C}}:=\{0,1\}^5$ be the vertices of the five-dimensional cube. We construct sparse decomposable systems from $\defcolor{{\calA_\bullet}}:=({\mathcal A}_1,{\mathcal A}_2)$, $\defcolor{{\calB_\bullet}}:=({\mathcal B}_1,{\mathcal B}_2)$, and ${\mathcal C}$ as follows. Choose two injections $\defcolor{\imath},\defcolor{\jmath}\colon{\mathbb Z}^2\to{\mathbb Z}^5$ such that $\imath({\mathbb Z}^2)\cap\jmath({\mathbb Z}^2)=\{0\}$. For example, choose four linearly independent vectors $\imath_1,\imath_2,\jmath_1,\jmath_2\in{\mathbb Z}^5$, and define $\imath(a,b)=a\imath_1+b\imath_2$, and the same for $\jmath$. Let us set \[ \defcolor{{\mathcal A}(\imath,\jmath)}\ :=\ \bigl(\imath({\mathcal A}_1)\,,\,\imath({\mathcal A}_2)\,,\ \jmath({\mathcal B}_1)\,,\,\jmath({\mathcal B}_2)\,,\ {\mathcal C}\bigr)\,. \] \begin{example}\label{Ex:computation1} We now illustrate Algorithm~\ref{alg:SDS} in detail on ${\mathcal A}(\imath,\jmath)$ by considering the case when $\imath_1,\imath_2,\jmath_1,\jmath_2$ are the first four standard unit vectors $e_1,\ldots,e_4$. Suppose $F = (f_1,f_2,g_1,g_2,h)=0$ is a system of polynomials $\mathbb{C}[x_1,x_2,y_1,y_2,z]$ with support $\mathcal A(e_1,e_2,e_3,e_4)$. We use superscripts to distinguish different calls of the same algorithm. When \texttt{SolveDecomposable}$^{(1)}(F)$ is called, it first checks if $F$ is lacunary (it is not as ${\mathbb Z}{\mathcal C}={\mathbb Z}^5$), and then recognizes that $F$ is triangular witnessed by $(f_1,f_2)$. As such, it calls \texttt{SolveTriangular}$^{(1)}(F,2)$ which computes the ${\rm MV}({\calA_\bullet})=5$ solutions $p_1,\ldots,p_5$ to ${\mathcal V}(f_1,f_2)$ with PHCPack, our choice of \texttt{BLACKBOX}. As its penultimate task, \texttt{SolveTriangular}$^{(1)}$ computes a fiber of the first solution $p_1$ by performing the substitution $(x_1,x_2)=p_1$ in $g_1,g_2$ and $h$, and recursively calls \texttt{SolveDecomposable}$^{(2)}$ on the system $(g_1(p_1,y,z),g_2(p_1,y,z),h(p_1,y,z))\in{\mathbb C}[y_1,y_2,z]$. This system is recognized to be triangular witnessed by $(g_1,g_2)$ and \texttt{SolveTriangular}$^{(2)}(g_1,g_2)$ computes the ${\rm MV}({\calB_\bullet})=10$ solutions $q_1,\ldots,q_{10}$ using PHCPack. Next, \texttt{SolveTriangular}$^{(2)}$ computes a fiber above $q_1$ by performing the substitution $y=(y_1,y_2)=q_1$ in $h(p_1,y,z)$ producing the univariate polynomial $h(p_1,q_1,z)$ of degree $1$ which has solution $(p_1,q_1,z_1)$. Finally, \texttt{SolveTriangular}$^{(2)}$ performs a homotopy from $q_1$ to $q_i$ to populate the fibers above each $q_i$. Thus \texttt{SolveTriangular}$^{(1)}$ populates the fiber above $p_1$ consisting of $10 \cdot 1=10$ solutions. As its final step, \texttt{SolveTriangular}$^{(1)}$ uses homotopies to take $p_1$ to $p_i$ to populate all fibers producing all $5 \cdot 10 = 50$ solutions, ${\mathcal V}(F)$.\hfill$\diamond$ \end{example} The overhead of this algorithm includes computing Smith normal forms and the search for subsets witnessing triangularity. Additionally, it often requires more path-tracking than a direct use of PHCPack. Nonetheless, the overhead seems to be nominal, and compared to the paths tracked in PHCPack, the paths tracked in our algorithm either involve fewer variables or polynomials of smaller degree. For example, in Example \ref{Ex:computation1}, our algorithm called PHCPack to solve two sparse polynomial systems with $5$ and $10$ solutions respectively. A homotopy was called $10-1=9$ times on a system with $1$ solution, then a different homotopy was called $5-1=4$ times on a system with $10$ solutions. In total, $5+10+9+40=64$ individual paths were tracked. In contrast, a direct use of PHCPack involves tracking exactly ${\rm MV}(\mathcal A(e_1,e_2,e_3,e_4)) = 50$ paths, albeit in a higher dimensional space. For more general $\imath$ and $\jmath$, the recursive structure of our computation is similar to Example~\ref{Ex:computation1}. Some notable differences include \begin{enumerate} \item $\imath({\calA_\bullet})$ or $\jmath({\calB_\bullet})$ may be lacunary which induces further decompositions. \item Monomial changes must be computed as $\imath({\calA_\bullet})$ or $\jmath({\calB_\bullet})$ could involve all variables. \item For most $\imath,\jmath$ the univariate polynomial obtained from $h$ has degree $5$ and is solved by computing eigenvalues of its companion matrix. \end{enumerate} For example, if we choose $e_1-e_2, e_2-e_3,e_3-e_4, e_4-e_5$ for $\imath_1,\imath_2,\jmath_1,\jmath_2$, then again, no system encountered in the algorithm is lacunary, but the univariate polynomial obtained from $h$ has support $\{0,1,2,3,4,5\}$, so that ${\rm MV}({\mathcal A}(\imath,\jmath))=250$. In our computational experiment, we produced $10962$ instances of $\mathcal A(\imath,\jmath)$ and solved each instance using our implementation of Algorithm \ref{alg:SDS} as well as with PHCPack. Due to ill-conditioning and heuristic choices of tolerances, some computations failed to produce all solutions. Such occurrences are not included in the data displayed below. We give a scatter plot of the elapsed timings in Figure \ref{fig:scatter} with respect to the mixed volume of the system. Figure \ref{fig:boxplots} displays box plots of the timings of each algorithm grouped by sizes of mixed volumes. The boxes range from the first quartile $q_1$ to the third quartile $q_3$ of the group data with whiskers extending to the smallest and largest data points which are not outliers. Outliers are the data points which are smaller than $q_1-1.5I$ or larger than $q_3+1.5I$ where $I$ is the length of the interquartile range $(q_1,q_3)$. \begin{figure}[htb!] \begin{center} {\includegraphics[scale=.26]{figures/scatter.png}} \end{center} \caption{Scatter plot of timings} \label{fig:scatter} \end{figure} \begin{figure}[htb!] \begin{center} {\includegraphics[scale=.26]{figures/box.png}} \end{center} \caption{Box plot of timings} \label{fig:boxplots} \end{figure} A more detailed account of these computations, along with our implementation in Macaulay2, may be found at the website for this paper~\cite{ThomasWebsite}. \def$'${$'$} \providecommand{\bysame}{\leavevmode\hbox to3em{\hrulefill}\thinspace} \providecommand{\MR}{\relax\ifhmode\unskip\space\fi MR } \providecommand{\MRhref}[2]{% \href{http://www.ams.org/mathscinet-getitem?mr=#1}{#2} } \providecommand{\href}[2]{#2}
\section{Introduction} \medskip Let $A=(a_1,\ldots,a_n)$ be an arbitrary sequence of real numbers. Let $A_\uparrow=(a_{(1)},\ldots,a_{(n)})$ denote the sequence obtained from $A$ by arranging its elements in the non-decreasing order: $a_{(1)}\le a_{(2)}\le\ldots\le a_{(n)}.$ Given two sequences $A=(a_1,\ldots,a_n)$ and $B=(b_1,\ldots,b_n),$ we say that {\em $A$ majorizes $B$}, and write $A\prec^w B$ if the following conditions are fulfilled: $$ a_{(1)}+\ldots+a_{(k)}\ge b_{(1)}+\ldots+b_{(k)}, \,\, k=1,\ldots,n. $$ \noindent{\bf Remark.} Note that in \cite{HLP} and \cite{MO} this condition is called a {\it weak majorization}. The main theorem in the theory of majorization is the majorization (or Karamata) inequality (see details in \cite{HLP,MO}). Here, we shall consider its ``weak'' version. \medskip \noindent{\bf Theorem (The majorization theorem).} { \it Let $f(x)$ be a convex decreasing function, and let $A = (a_1, \ldots, a_n)$, $B = (b_1, \ldots, b_n)$ be two sequences. Then if $A\prec^w B$, we have $$ f(a_1)+\ldots+f(a_n)\le f(b_1)+\ldots+f(b_n). \eqno (1.1) $$ Moreover, $A\prec^w B$ if and only if for all convex decreasing functions $g$ we have $$ g(a_1)+\ldots+g(a_n)\le g(b_1)+\ldots+g(b_n). $$ Provided $f(x)$ is strictly convex, the inequality $(1.1)$ turns into equality if and only if we have $A_\uparrow = B_\uparrow$. } \medskip Let $P$ be a set of sequences of length $n$. {\em We say that $A\in P$ is an $M$-set if for any $B\in P$ either $A\prec^w B$ or $A$ and $B$ are incomparable.} Let $M(P)$ denote the set of all $M$-sets in $P$. Suppose that $f(x)$ be a strictly convex decreasing function, and define $$E_f(A):=f(a_1)+\ldots+f(a_n), \; A=(a_1,\ldots,a_n).$$ Then the majorization theorem readily implies that if $E_f$ achieves its minimum at some $A\in P$, then $A\in M(P)$. \medskip Let $S$ be a set and $\rho:S\times S\to {\Bbb R}$ be a symmetric function. Let $X$ be a subset of $S$ of cardinality $m$ (or, shortly, an $m$-subset). Denote by $R_\rho(X)$ the set of values of $\rho(a,b)$ over all unordered pairs $(a,b)$ of elements in $X$. Then we have the following generalization of the majorization theorem (Theorem 2.1): \medskip \noindent{\bf Theorem.} { \it Let $X$ and $Y$ be two $m$-subsets of $S$. Suppose $R_\rho(X)\prec^w R_\rho(Y)$. Then for every convex decreasing function $f$ we have $E_f(X)\le E_f(Y)$. } \medskip Now, let us put $P=\{R_\rho(X)\}$, where $X\subset S$ is an $m$-subset. Then we define $M(S,\rho,m)=M(P)$ and discuss its properties further in Section 2. Our main interest is the case when $S$ is the standard unit sphere ${\Bbb S}^{n-1}$ in ${\Bbb R}^{n}$. In particular, we prove that on the unit circle ${\Bbb S}^1$ with angular distance $\rho=\varphi$, the $M$-sets are vertex sets of regular polygons (Theorem \ref{T32}). We also show that $M({\Bbb S}^{n-1},\rho,n+1)$ consists of vertices of regular simplices, for $\rho$ being the standard Euclidean distance squared (Theorem \ref{Tsimplex}), and describe some small $M$-sets, and some are left as open problems, depending on the ``distance fucntional'' $\rho$. In Section 6 we define spherical $f$-design and study their properties. Then we discuss possible relations between the notions of $f$-designs and $M$-sets (Theorem \ref{T42}), $\tau$-designs, and two-distance sets. \medskip \section{$M$-sets and minimums of potential energy} Let $S$ be an arbitrary set, and $\rho: S\times S\to D\subset {\Bbb R}$ be any symmetric function. Then for a given convex decreasing function $f:D\to {\mathbb R}$ and for every finite subset $X=\{x_1,\ldots x_m\} \subset S$ we define the potential energy $E_f(X)$ of $X$ with respect to $f$ as $$ E_f(X):=\sum\limits_{1\le i<j\le m}{f(\rho(x_i,x_j))}. $$ In this paper we consider the following minimum energy problem. \medskip \noindent{\bf Generalized Thomson's Problem.} {\it For $S,\rho, f$ and $m$ given, find all $X\in S^m=S\times...\times S$ such that $E_f(X)$ is the minimum of $E_f$ over the set of all $m$-subsets of S.} \medskip Let $R_\rho(X)$ denote the set of all $\rho(x_i, x_j)$, where $1\le i<j\le m$, i.e. $$ R_\rho(X):=\{\rho(x_1,x_2)\ldots,\rho(x_1,x_m),\ldots,\rho(x_{m-1},x_m)\}. $$ Then the majorization theorem implies \begin{thm}\label{MajI} Let $X$ and $Y$ be two $m$-subsets of $S$. Suppose $R_\rho(X)\prec^w R_\rho(Y)$. Then for every decreasing and convex function $f$ we have $E_f(X)\le E_f(Y)$. \end{thm} Note that $\prec^w$ defines a partial order on $S^m$. Let $X$ and $Y$ be two $m$-subsets of $S$, such that $R_\rho(X)\ne R_\rho(Y)$. Then we have one of three following cases: either $R_\rho(X)\prec^w R_\rho(Y)$, or $R_\rho(Y)\prec^w R_\rho(X)$, or $R_\rho(X)$ and $R_\rho(Y)$ are incomparable. Now we define the maximal subsets of the poset $(S^m, \prec^w)$. \begin{defn} \label{def21} We say that $X\in S^m$ is an {$M$-set in $S$ with respect to $\rho$} if for any $Y\in S^m$ we have that either $R_\rho(X)\prec^w R_\rho(Y)$, or $R_\rho(X)$ and $R_\rho(Y)$ are incomparable. Let $M(S,\rho,m)$ denote the set of all $M$--sets in $S$ of cardinality $m$. \end{defn} \begin{defn} \label{def22} Let $f:D\to {\Bbb R}$ be a convex decreasing function. Let $V_f=\inf_{Y\in S^m}{E_f(Y)}$. Let $M_f(S,\rho,m)$ denote the set of all $X\in S^m$ such that $E_f(X) = V_f$. \end{defn} \begin{thm} \label{T2} Let $S$ be a compact topological space and $\rho: S\times S\to D\subset {\Bbb R}$ be a symmetric continuous function. Let $f: D\to {\Bbb R}$ be a strictly convex decreasing function. Then $M_f(S,\rho,m)$ is non-empty and $M_f(S,\rho,m)\subseteq M(S,\rho,m)$. \end{thm} \begin{proof} Since $S$ is compact, there is $X\in S^m$ such that $E_f(X)=V_f$, i.e. $M_f(S,\rho,m)\ne\emptyset$. The majorization theorem yields that for all $Y\in S^m$ we have either $R_\rho(X)\prec^w R_\rho(Y)$ or $R_\rho(X)$ and $R_\rho(Y)$ are incomparable. Indeed, if $X,Y\in M_f(S,\rho,m)$ while $R_\rho(X)$ and $R_\rho(Y)$ are comparable, then $R_\rho(X)=R_\rho(Y)$. This means that $X$ is an $M$--set. \end{proof} \noindent{\bf Remark.} I am very grateful to one of the reviewers who pointed out an inaccuracy in the previous version of the manuscript. Namely, if we do not require $f$ be strictly convex, then the following counterexample shows that Theorem \ref{T2} cannot hold. Let $S= \mathbb S^1$, $\rho=\varphi$, where $\varphi$ is the angular (geodesic) distance, and $f(t) = -t$. Clearly, $f$ is convex and decreasing, though not \textit{strictly} convex. It is easy to see that $M_f({\Bbb S}^1,\varphi,m)$, for $m$ even, contains all centrally symmetric sets $X$ in $\mathbb S^1$. However, $M({\Bbb S}^1,\varphi,m)$ consists of the vertices of regular $m$--gons inscribed in $\mathbb{S}^1$, see Theorem \ref{T32}. Obviously, $M_f({\Bbb S}^1,\varphi,m)\nsubseteq M({\Bbb S}^1,\varphi,m)$. \begin{thm} \label{T_3} Let $\rho:S\times S\to D\subset {\Bbb R}$ be a symmetric function and $h: D\to {\Bbb R}$ be a convex increasing function. Then $M(S,\rho,m)\subseteq M(S,h(\rho),m).$ \end{thm} \begin{proof} Assume the contrary. Then there exist $X\in M(S,\rho,m)$ and $Y\subset S, |Y|=m,$ such that $$R_{h(\rho)}(Y)\prec^w R_{h(\rho)}(X).$$ Note that $f=-h^{-1}$ is a convex decreasing function, and the majorization theorem yields $$R_{\rho}(Y)\prec^w R_{\rho}(X).$$ The latter contradicts our assumption that $X\in M(S,\rho,m)$. \end{proof} \medskip In this paper we consider the case when $S$ is the standard unit sphere ${\mathbb S}^{n-1}$ in ${\Bbb R}^{n}$. There are two natural distances on $\mathbb{S}^{n-1}$: the Euclidean distance $r$ and the angular distance $\varphi$. Here $r(x,y)$ denotes the Euclidian distance $||x-y||$ between two points $x, y\in {\Bbb S}^{n-1}$, while $\varphi(x,y)$ denotes the angular distance in ${\Bbb S}^{n-1}$, i.e. $\varphi(x,y)=2\arcsin(||x-y||/2)$. \begin{defn} For $s\in{\mathbb R}$ define the function $$ r_s(x,y):=\left\{ \begin{array}{l} r^s(x,y), \; \text{ if } s>0;\\ \log{r(x,y)}, \; \text{ if } s=0;\\ -r^s(x,y), \; \text{ if } s<0. \end{array} \right. $$ \end{defn} \begin{cor} \label{cor22} The following inclusions hold: \begin{itemize} \item[(i)] $M({\Bbb S}^{n-1},r_s,m)\subseteq M({\Bbb S}^{n-1},r_t,m)$, for all $t\ge s$; \item[(ii)] $M({\Bbb S}^{n-1},r_s,m)\subseteq M({\Bbb S}^{n-1},\varphi,m)$, for all $s\in(-\infty, 1].$ \end{itemize} \end{cor} \begin{proof} Let $h(x)=x^{t/s},\;x>0$. Then $h(x)$ is a convex increasing function for all $t>s>0$. Since $r_t=h(r_s)$, Theorem \ref{T_3} implies (i) for $s>0$. The functions $h(x)=e^{sx}$, $s>0, x>0$, and $h(x)=\log(-x)/s$, $s<0, x<0$, prove the inclusions $$M({\Bbb S}^{n-1},r_0,m)\subseteq M({\Bbb S}^{n-1},r_s,m), \; s>0, \; \mbox{ and } \; M({\Bbb S}^{n-1},r_s,m)\subseteq M({\Bbb S}^{n-1},r_0,m), \; s<0.$$ The remaining case $s<t<0$ in (i) follows from the fact that $h(x)=(-x)^{s/t},\; x<0,$ is a convex increasing function in $x$. It is clear that $h(x)=\arcsin(x/2), x\in [0,2],$ is a convex increasing function in $x$. Then Theorem \ref{T_3} also yields (ii). \end{proof} Let $X=\{p_1,\ldots,p_m\}$ be an $m$--subset of ${\Bbb S}^{n-1}$ that consists of distinct points. Then the {\em Riesz $t$-energy} of $X$ is given by $$ E_t(X):= \sum\limits_{i< j}{\frac{1}{||p_i-p_j||^t}}, \text{ for } t>0, \text{ and } E_0(X):= \sum\limits_{i< j}{\log\left(\frac{1}{||p_i-p_j||}\right)}. \eqno (2.1) $$ Note that for $t=0$ minimizing $E_t$ is equivalent to maximizing $\prod\limits_{i\ne j}{||p_i-p_j||}$), which is Smale's $7^{\rm th}$ problem \cite{Sm}. For $t=1$ we obtain the Thomson problem, and for $t\to\infty$ the minimum Riesz energy problem transforms into the Tammes problem. \medskip Theorem \ref{T2} and Corollary \ref{cor22} yield: \begin{cor} \label{cor3.1} Let $t\ge0$. If $X\subset{\Bbb S}^{n-1}$ gives the minimum of $E_t$ in the set of all $m$-subsets of\, ${\Bbb S}^{n-1}$, then $X\in M({\Bbb S}^{n-1},r_s,m)$ for all $s> -t$. \end{cor} \section{Minima of majorizations} Let $f$ be a convex function on ${\mathbb R}$. Let $x_1,\ldots,x_n$ be a sequence of real numbers and $\bar x:=(x_1+\ldots+x_n)/n$. The {\em Jensen inequality} states that $$ f(\bar x)\le \frac{{f(x_1)+...+f(x_n)}}{n}. $$ If $ y\ge \bar x$, then it is easy to see that we have $$(y,\ldots,y)\prec^w (x_1,\ldots,x_n). \eqno (3.1) $$ Then the majorization theorem yields Jensen's inequality for a convex decreasing $f$: $$ f(y)\le \frac{{f(x_1)+...+f(x_n)}}{n}. $$ \medskip In this section we extend the above inequality. First, we define a sequence $Y(T):=(y_1,\ldots,y_m)$ for any sequence of $m$ real numbers $T$, as follows. \begin{defn} Let $T=(T_1,\ldots,T_m)$, with $T_1\le\ldots\le T_m$. Let $$y_1(T):=\min\limits_{k=1,\ldots,m}{\frac{T_k}{k}},$$ $$y_2(T):=\min\limits_{k\ge2}{\frac{T_k-y_1(T)}{k-1}},$$ $$\ldots$$ $$y_m(T):=T_m-y_1(T)-\ldots-y_{m-1}(T),$$ $$Y(T):=(y_1(T),\ldots,y_m(T)).$$ \end{defn} Let a sequence $A=(a_1,\ldots,a_m)$ be such that $$ a_{(1)}+\ldots+a_{(i)}\le T_i, \; \mbox{ for all } i=1,\ldots,m, $$ and $P(T_1,\ldots,T_m)$ denote the set of all such sequences. \begin{lemma}\label{max_element} If $T_1\le\ldots\le T_m$ and $A\in P(T_1,\ldots,T_m)$, then $Y(T_1,\ldots,T_m)\prec^w A$, i.e. $Y(T_1,\ldots,T_m)$ is the only maximum element in $P(T_1,\ldots,T_m)$. \end{lemma} \begin{proof} Let $A\in P(T_1,\ldots,T_n)$. A proof immediately follows from the following inequalities: $$a_{(1)}\le \frac{T_k}{k} \; \mbox{ for all } k=1,\ldots,m $$ and $$a_{(i)}\le \frac{T_k-a_{(1)}-\ldots-a_{(i-1)}}{k-i+1} \; \mbox{ for all } k\ge i > 1. $$ \end{proof} \noindent{\bf Notation}. Given $S$, $\rho$, $n$, and $X\subset S$ with $|X|=n$, let $m:=n(n-1)/2$, and $$Q_\rho(X):=(R_\rho(X))_\uparrow, \quad (q_1,\ldots,q_m):=Q_\rho(X), \quad S_k^\rho(X):=q_1+\ldots+q_k, \quad k=1,\ldots,m.$$ \medskip Note that Lemma \ref{max_element}, Theorem \ref{MajI} and (3.1) combined yield the following theorem. \begin{thm} \label{Tmin} Let $S$ be a set and $\rho:S\times S\to D\subset{\Bbb R}$ be a symmetric function. Let $T=(T_1,\ldots,T_m)$, where $m=n(n-1)/2$, be a sequence of real numbers with $T_1\le\ldots\le T_m$ such that all $y_i(T)\in D$. Suppose that $X\subset S$ with $|X|=n$ satisfies $$ S_k^\rho(X)\le T_k, \; k=1,\ldots,m. $$ Then $Y(T)\prec^w R_\rho(X)$, and for every convex decreasing function $f:D\to{\Bbb R}$ we have $$E_f(X)\ge f(y_1(T))+\ldots+f(y_m(T)).$$ In particular, if there is $y\in D$ such that $T_k=ky$, for all $k=1,...,m$, then $y_k(T)=y$, for all $k=1,...,m$, and we have $E_f(X)\ge mf(y)$. \end{thm} \noindent{\bf Remark.} In the latter case, the inequality $E_f(X)\ge mf(y)$ is just Jensen's inequality. \medskip Now let us consider the case of the unit circle $S={\mathbb S}^1$ with angular distance $\rho=\varphi$. \begin{thm}\label{T32} Up to isometry, there exists a unique $M$-set of cardinality $n$ in the unit circle ${\Bbb S}^1$ with $\rho=\varphi$: the vertices of a regular $n$-gon inscribed in ${\Bbb S}^1$. In other words, $M({\Bbb S}^1,\varphi,n)$ consists of the vertices of regular polygons. \end{thm} \begin{proof} Let $X=\{p_1,\ldots,p_n\}\subset{\Bbb S}^1$ and $p_{n+i}:=p_i$ for all integer $i>0.$ We obviously have $$ \sum\limits_{i=1}^n\varphi(p_i,p_{i+1})\le2\pi,$$ where the equality holds only if $|\angle{p_iOp_{i+1}}|=\varphi(p_i,p_{i+1})$ for all $i$. Moreover, we have $$ \sum\limits_{i=1}^n\varphi(p_i,p_{i+k})\le 2\pi k, \quad k=1,2,..,\lfloor n/2\rfloor.$$ Then $(3.1)$ yields $$ \pi_{n,k}:=(2\pi k/n,\ldots,2\pi k/n)\prec^w R_k:=(\varphi(p_1,p_{k+1}),\ldots,\varphi(p_n,p_{k})). $$ It is not hard to see that these inequalities yield $$R_\varphi(\Pi_n)=\pi_{n,1}\cup \ldots\cup\pi_{n,\ell}\prec^w R_1\cup\ldots\cup R_\ell= R_\varphi(X),$$ where $\ell=\lfloor n/2\rfloor$ and $\Pi_n$ is the set of vertices of a regular $n$-gon in ${\Bbb S}^1$. \end{proof} This theorem implies that $M({\Bbb S}^1,r_1,n)$ consists of the vertices of regular polygons. However, the set $M({\Bbb S}^1,r_2,n), n\ge 4,$ is much larger. In fact (see Section 5), $M({\Bbb S}^1,r_2,4)$ consists of the vertices of quadrilaterals with side lengths $2\pi-3\alpha$, $\alpha$, $\alpha$, $\alpha$ (in the angular measure), where $\pi/2\le \alpha \le 2\pi/3$. \medskip \section{Optimal simplices and constrained $(n+k)$-sets} First we show that Jensen's inequality for $(n+1)$-sets on $ {\Bbb S}^{n-1}$ yields optimality of regular simplices. \begin{thm}\label{Tsimplex} Let $s\le2$. Then $M({\Bbb S}^{n-1},r_s,n+1)$ consists of regular simplices. \end{thm} \begin{proof} Let $X=\{p_1,\ldots,p_{m}\}\subset {\Bbb S}^{n-1}$ and $t_{i,j}:= p_i\cdot p_j$. Then $$ \sum\limits_{i,j}{t_{i,j}}= \displaystyle{\left\| \sum_{i=1}^m p_i \right\|^2 } \ge 0. \eqno (4.1) $$ Since $t_{i,i}=p_i\cdot p_i=1$, we have $$ \sum\limits_{i\ne j}{t_{i,j}}\ge -m. $$ It is easy to see that $r_2(x,y)=||x-y||^2=2-2x\cdot y, \; x,y\in {\Bbb S}^{n-1}$. Then $$ \sum\limits_{i<j}{r_2(p_i,p_j)}= \sum\limits_{i<j}{(2-2t_{i,j})}\le m^2. $$ Therefore, by (3.1) we have $$ (a_m,\ldots,a_m) \prec^w R_{r_2}(X), \; \text{ for } a_m:=\frac{2m}{m-1}. $$ Note that for $m=n+1$, the side lengths of a regular $n$-simplex are equal to $\sqrt{a_m}$. This completes the proof. \end{proof} \noindent{\bf An open problem.} The set $M_n^S:=M({\Bbb S}^{n-1},\varphi,n+1)$, $n\ge3$, is not as simple to describe as in the case $\rho=r_2$. For example, consider the case $n=3$. Let us define a two-parametric family of tetrahedra $ABCD$ in ${\Bbb S}^2$. Let the opposite edges $AC$ and $BD$ of $ABCD$ be of equal length and the angle between them be $\theta$. Let $X$ be the midpoint of $AC$ and $Y$ be the midpoint of $BD$. Suppose that $X$, $Y$ and $O$, which is the center of ${\Bbb S}^2$, are collinear. Then $ABCD$ is uniquely (up to isometry) defined by the parameters $a=|OX|=|OY|$ and $\theta$. Let $\Delta_{a,\theta}$ denote such a tetrahedron $ABCD$. Note that $\Delta_{0,\pi/2}$ is a square inscribed into the unit circle, while $\Delta_{1/\sqrt{3},\pi/2}$ is a regular tetrahedron. \textit{We conjecture that $M_3^S$ consists of the vertices of all tetrahedra $\Delta_{a,\theta}$, for $a\in [0,1/\sqrt{3}]$ and $0<\theta\le\pi/2$.} \textit{More generally, it is an interesting problem to find $M_n^S$ for all $n$.} \medskip Now let us apply Theorem \ref{Tsimplex} to $P\subset {\Bbb S}^{n-1}$, with $n+2\le |P| \le 2n$. Davenport and Haj\'os \cite{DH}, and, independently, Rankin \cite{Rankin} proved that if $P$ is a subset of ${\mathbb S}^{n-1}$ with $|P|\ge n+2$, then the minimum distance between the points in $P$ is at most $\sqrt{2}$. For the case $|P|=2n$, Rankin proved that $P$ is a regular cross-polytope. Later on, Wlodzimierz Kuperberg \cite{kuperberg2007} extended this theorem. \medskip \noindent {\bf Kuperberg's theorem.} {\em Let $P$ be a ($n + k)$-point subset of the unit $n$-ball\, ${\mathbb B}^n$ with $2\le k \le n$ such that the minimum distance between points in $P$ is at least $\sqrt{2}$. Then: \begin{itemize} \item[(1)] every point of $P$ lies on the boundary of\, ${\mathbb B}^n$; \item[~] and \item[(2)] ${\Bbb R}^n$ splits into the orthogonal product $\prod_{i=1}^k{L_i}$ of nondegenerate linear subspaces $L_i$ such that for $S_i:=P\cap L_i$ we have $|S_i|=d_i+1$ and $\mathop{\rm rank}\nolimits(S_i)=d_i$ $(i = 1, 2, . . . , k)$, where $d_i:= \dim{L_i}$. \end{itemize} } \medskip With this above fact in mind, let us extend Definition \ref{def21}. Let $S\subset{\mathbb R}^n$ and $\rho:S\times S\to {\Bbb R}$ be a symmetric function. Then, let $\Omega=\Omega(S,\rho,q_0,m)$ denote the set of all $X\subset S$ of cardinality $m$, such that for all distinct points $x,y\in X$ we have $||x-y||\ge q_0$. Finally, let $M(S,\rho,q_0,m)$ denote the set of all $X$ in $\Omega$ such that for any $Y\in\Omega$ either $R_\rho(X)\prec^w R_\rho(Y)$, or $X$ and $Y$ are incomparable. \begin{thm}\label{th42} Let $2\le k\le n$ and $s\le2$. Then $M({\Bbb B}^{n},r_s,\sqrt{2},n+k) =M({\Bbb S}^{n-1},r_s,\sqrt{2},n+k)$ and this set consists of $k$ mutuallu orthogonal regular $d_i$-simplices $S_i$, such that all $d_i\ge 1$ and $d_1+...+d_k=n$. \end{thm} \begin{proof} By Kuperberg's theorem, we obtain that if $P\in M({\Bbb B}^{n},r_s,\sqrt{2},n+k)$, then (1) $P\subset{\Bbb S}^{n-1}$ and (2) $P$ consists of mutually orthogonal $d_i$-simplices $S_i$. By Theorem \ref{Tsimplex}, all $S_i$ have to be regular. \end{proof} \noindent{\bf Remarks.} \begin{enumerate} \item From Rankin's theorem \cite{Rankin} it follows that $\Omega({\Bbb S}^{n-1},r_s,\sqrt{2},2n)$ contains only regular cross-polytopes. However, if $2\le k<n-1$ then $\Omega({\Bbb S}^{n-1},r_s,\sqrt{2},n+k)$ contains infinitely many non-isometric point sets $P$ of several combinatorial types. For instance, if $k=2$ and $n=4$ then the respective dimensions $(d_1,d_2)$, as defined in the statement of Kuperberg's theorem, can be $(1,3)$ or $(2,2)$. \item An interesting open problem is to find $M({\Bbb S}^{n-1},r_s,n+k)$. Even for the case $k=2$, $n=3$ this seems a rather complicated task, see the discussion in Section 5.3. \item Recently, in our joint paper with Peter Dragnev \cite{DM}, we enumerated and classified all stationary logarithmic configurations of $n+2$ points in ${\Bbb S}^{n-1}$. In particular, we showed that the logarithmic energy attains its relative minima at configurations that consist of two mutually orthogonal regular simplices. Actually, these configurations are the same as in Theorem \ref{th42} for $k=2$. Now, let $k\in[2,n]$. Then, our conjecture is that the logarithmic energy of $n+k$ points in ${\Bbb S}^{n-1}$ attains its relative minima at configurations that consist of $k$ mutually orthogonal regular simplices. So far this conjecture remains open for $k = 3,...,n-1$. \end{enumerate} \section{Spherical $M$-sets of small cardinality} In this section we consider spherical $M$-sets of cardinality $m\le5$. Clearly, for any $S$ and $\rho$ the case $m=2$ is trivial: $M(S,\rho,2)$ consists of pairs $(x,y)$ such that $\rho(x,y)$ attains its maximum on $S\times S$. However, the structure of $M$-sets for $m>2$ is not so simple. \subsection{Spherical three-point $M$-sets} Theorems \ref{T32} and \ref{Tsimplex} yield that $M({\Bbb S}^1,\varphi,3)$ and $M({\Bbb S}^1,r_2,3)$ contain only the vertices of regular triangles. Let us now investigate $M({\Bbb S}^1,r_s,3)$ for all $s$. Consider the equation $$ (1-t)^z+2^{z-1}(1-t^2)^z=\left(\frac{3}{2}\right)^{z+1}, \; z=\frac{s}{2}. \eqno (5.1) $$ For all $s$, this equation has a solution $t=-1/2$. It can be shown that if $$4> s\ge s_0:=\log_{4/3}{(9/4)}\approx 2.8188,$$ then (5.1) has one more solution $t_s\in(-1,-1/2)$. Note that $$ t_{s_0}=-1, \quad t_4=-1/2, $$ and $t_s$ is increasing on the interval $[s_0,4]$ as a function of $s$. \begin{thm} \label{T51}The following cases hold for $M:=M({\Bbb S}^1,r_s,3)$: \begin{enumerate} \item if $s\le\log_{4/3}{(9/4)}$, then $M$ contains only vertices of regular triangles; \item if \, $\log_{4/3}{(9/4)}<s<4$, then $M$ consists of the vertices of regular triangles and triangles with angular side lengths $\alpha$, $\alpha$, $2\pi-2\alpha$, where $\alpha\in(\arccos(t_s),\pi]$; \item if $s\ge 4$, then $M$ consists of the vertices of regular triangles and triangles with angular side lengths $\alpha$, $\alpha$, $2\pi-2\alpha$, $\alpha\in[2\pi/3,\pi]$. \end{enumerate} \end{thm} \begin{proof} Suppose that we have a triangle $T$ inscribed in the unit circle ${\mathbb S}^1$ with angles $u_1, u_2, u_3$ and (Euclidean) side lengths $x_1,x_2,x_3$, where $u_1+u_2+u_3=\pi$. Moreover, we assume that $u_1\ge u_2\ge u_3$. First, let us show that if $T$ is an $M$-set with $\rho=r_s$, then $u_1=u_2$. Indeed, fix $u_3$ so that $x_3=\sqrt{2-2\cos{2u_3}}$ is also fixed. Then we have to maximize the function $$F(u_1,u_2):=x_1^s+x_2^s$$ subject to $u_1+u_2=\pi-u_3$. If $u_3=0$, then we obviously have $u_1=u_2=\pi/2$. Assume that $u_3>0$. By the law of sines we get $$x_1=c\sin{u_1}, \quad x_2=c\sin{u_2}, \quad c:=\frac{x_3}{\sin{u_3}}.$$ Then $$ F(u_1,u_2)=c^s(\sin^s{u_1}+\sin^s{u_2}). $$ The method of Lagrange multipliers gives the equality $\sin{u_1}=\sin{u_2}$ that under our constraints yields $u_1=u_2$. Now, for $T$, we have that $u_1=u_2=u$ and $u_3=\pi-2u$. Therefore, $$f_s(t):=(x_1^s+x_2^s+x_3^s)/2^{z+1}=(1-t)^z+2^{z-1}(1-t^2)^z , \quad t:=\cos{2u}. $$ Note that (5.1) is the equation $f_s(t)=f_s(-1/2)$. Since $u\in[\pi/3,\pi/2]$, we have $t\in[-1,-1/2]$. It not hard to see that $f_s(t)\le f_s(-1/2)$ for $0<s\le\log_{4/3}{(9/4)}$ and all $t$; if \, $\log_{4/3}{(9/4)}<s<4$, then $f_s(t)\le f_s(-1/2)$ for $t\in[t_s,-1/2]$; and if $s\ge4$ and $t\in[-1,-1/2)$, then $f_s(t)> f_s(-1/2)$. These observations complete the proof. \end{proof} \subsection{Spherical four-point $M$-sets} Theorem \ref{T32} yields that $M({\Bbb S}^1,\varphi,4)$ contains only vertices of squares. This fact together with Corollary \ref{cor22}(ii) imply that $M({\Bbb S}^1,r_s,4)$ for $s\le 1$ also contains only vertices of squares. An interesting open problem is to describe $M({\Bbb S}^1,r_s,4)$ for all $s$. Let us mention that it can be proven that $M({\Bbb S}^1,r_2,4)$ consists of the vertices of quadrilaterals inscribed into the unit circle with angular side lengths $\alpha$, $\alpha$, $\alpha$, $2\pi-3\alpha$, where $\pi/2\le \alpha \le 2\pi/3$. \medskip Theorem \ref{Tsimplex} yields that $M({\Bbb S}^2,r_s,4)$, with $s\le 2$, contains only vertices of regular tetrahedra. Another interesting problem is to describe what we have for the case $s>2$. \subsection{Spherical five-point $M$-sets} From Theorem \ref{T32} we obtain that the sets $M({\Bbb S}^1,\varphi,5)$ and $M({\Bbb S}^1,r_s,5)$ for $s\le 1$ contain only vertices of regular pentagons. The {\em triangular bi-pyramid} (or TBP, for short) is the configuration of $5$ points in ${\Bbb S}^2$ placed as follows: one point at the North pole, another one at the South pole, while the remaining three are arranged in an equilateral triangle on the equator. Theorem \ref{th42} yields that $M({\Bbb S}^2,r_s,\sqrt{2},5)$, $s\le2$, contains only the TBP. Moreover, the same result holds for $M({\Bbb S}^2,\varphi,\sqrt{2},5)$. Indeed, from Kuperberg's theorem it follows that $P$ consists of a 1-dimensional simplex $S_1$ that is a pair of antipodal points in ${\Bbb S}^2$, say the North and South poles, and a triangle $S_2$ on the equator. By Theorem \ref{T32} this triangle has to be regular, i.e. $P$ is the TBP. The last known case is $M({\Bbb S}^3,r_s,5)$ with $s\le 2$ that contains only vertices of regular 4-simplices. This follows from Theorem \ref{Tsimplex}. It is an interesting open problem to find $M({\Bbb S}^2,r_s,5)$. By Corollary \ref{cor3.1} the global minimizer of the Riesz potential $E_t$ of 5 points lies in $M({\Bbb S}^2,r_s,5)$ for all $s>-t$. Then a solution to this problem for some $s$ can help to find minimizers of $E_t$ for all $t>-s$. It is proved that the TBP is the minimizer of $E_t$ for $t=0$ \cite{DLT}, for $t=1,2$ \cite{Sch}, and for $t<15.048$ \cite{Sch2}. Note that the TBP is not the global minimizer for $E_t$ when $t>15.04081$ \cite{MKS}. \section{Spherical $f$-designs} In this section we define and study spherical $f$-designs. In particular, we discuss possible relations between $f$-designs and $M$-sets, $\tau$-designs, and two-distance sets. Moreover, we extend Theorem \ref{Tsimplex} about the optimality of simplices, proving Theorem \ref{T42} below. Since $f$-designs are extremal spherical configurations, we believe that there are more connections between them and $M$-sets. \subsection{Definition of $f$-design} Since a long time {\em Delsarte's method} (also known in coding theory as the {\em Linear Programming Bound}) has been widely used for finding cardinality bounds for codes (see \cite[Chap. 9,13]{CS} and \cite{DGS,Kab, lev98}). This approach for energy bounds was first applied by Yudin \cite{Y92}, then by Cohn and Kumar \cite{CK07}, and recently in \cite{BDHSS}. In our case, this method relies on the positive semidefinite property of Gegenabauer polynomials $G_k^{(n)}(t)$ that can be defined via the following recurrence formula: $$G_0^{(n)}=1,\;\; G_1^{(n)}=t,\; \ldots,\; G_k^{(n)}=\frac {(2k+n-4)\,t\,G_{k-1}^{(n)}-(k-1)\,G_{k-2}^{(n)}} {k+n-3.}.$$ Alternatively, $\{G_k^{(n)}\}_k$ can be defined as a family of orthogonal polynomials on the interval $[-1,1]$, with respect to the weight function $\rho(t)=(1-t^2)^{(n-3)/2}$. Let $P=\{p_1,\ldots,p_m\}$ be a finite subset of ${\mathbb S}^{n-1}$, in other words, $P$ is a finite set of unit vectors. We define the $k$-th moment of $P$ as $$ M_k(P):=\sum\limits_{i=1}^m\sum\limits_{j=1}^m {{G_k^{(n)}(t_{i,j})}}, \text{ where } t_{i,j}:=p_i\cdot p_j=\cos(\varphi(p_i,p_j)). $$ It is well--known that Gegenabauer polynomials are {\em positive definite}. A real function $f$ on $[-1,1]$ is called positive definite (p.d.) in ${\mathbb S}^{n-1}$ if for every finite subset $P=\{p_1,\ldots,p_m\}$ in ${\mathbb S}^{n-1}$ the matrix $\bigl(f(t_{i,j})\bigr)^m_{i,j=1}$ is positive semidefinite. The p.d. property of Gegenabauer polynomials yields that $$ M_k(P)\ge0 \; \mbox{ for all } \; k=1,2,... \eqno (6.1) $$ Since $G_1^{(n)}(t)=t$, then the inequality (6.1) for $k=1$ gives (4.1). \medskip Let $f$ be a function on $[-1,1]$ such that its Gegenbauer series $\sum_{k=0}^\infty{f_kG_k^{(n)}}$ is well--defined. Throughout this section we assume that this series converges uniformly to $f$ on the whole interval $[-1,1]$. Then we can write $$ f(t)=\sum\limits_{k=0}^\infty {f_kG_k^{(n)}(t)} \; \mbox{ for all } \; t\in [-1,1]. $$ Note that $f$ is p.d. if and only if all its \textit{Gegenbauer coefficients} are non--negative: $f_k\ge0$. It is easy to see that for any $P=\{p_1,\ldots,p_m\}$ in ${\mathbb S}^{n-1}$ we have $$ S_f(P):=\sum\limits_{i=1}^m\sum\limits_{j=1}^m {{f(t_{i,j})}}=\sum\limits_{k=0}^\infty{f_kM_k(P)}. \eqno (6.2) $$ \begin{defn} \label{def61} Let $P=\{p_1,\ldots,p_m\}$ be a finite subset of the unit sphere ${\mathbb S}^{n-1}$. Let $D(P)$ denote the set of all inner products that occur between distinct $p_i$'s in $P$. For a given function $f(t)=\sum_k {f_k\,G_k^{(n)}(t)}$, we say that $P$ is an {\em $f$-design} if it satisfies the following properties: \begin{enumerate} \item for all $k>0$ with $f_k\ne0$, we have that $M_k(P) = 0$; \item $D(P)\subset Z_f$, where $Z_f$ denotes the set of all $t\in [-1,1)$ such that $f(t)=0$. \end{enumerate} For a given $f$ we say that an $f$-design is {\em of degree} $d$ if $f$ is a polynomial of degree $d$. \end{defn} \noindent{\bf Remark.} Property (1) in the above definition is related to linear programming slackness conditions and the concept of harmonic indices \cite{AY,BOT,BDK, DGS, DS, Zhu17}. Let $K$ be a subset of ${\mathbb N}$. A subset $P\subset{\mathbb S}^{n-1}$ is called a {\em spherical design of harmonic index $K$} if for all $k\in K$ we have $M_k(P)=0$. Property (2) in the above definition is related to the concept of annihilating polynomial from \cite{lev98}. Below we show that (2) yields a tight property of harmonic indices. Note that for some $P$ several degrees are possible. For instance, the cross--polytope is the second degree design with $f(t) = t(t + 1)$. However, it is an $f$--design of degree 3 with all $f(t) = (at + b)t(t + 1))$, where $ab\ne0$, see Proposition \ref{prop62}. \subsection {Delsarte's bound and $f$-designs} Let $T$ be a subset of the interval $[-1,1)$. A set of points $P$ in ${\mathbb S}^{n-1}$ of cardinality $m$ is called a $T$-{\it spherical code} if for every pair $(x,y)$ of distinct points in $P$ the inner product $x\cdot y\in T$. We wish to maximize the cardinality $m$ over all $T$-spherical codes of fixed dimension $n$. The {\em Delsarte} (or {\em linear programing}) bound relates this maximization problem to a minimization problem for certain real function $f$ as follows (see \cite{DGS,Kab,{lev98}}): \medskip \noindent {\em Let $T\subset [-1,1)$. Let $f$ be a function on $[-1,1]$ with all $f_k\ge0$ such that $f(t)\le0$ for all $t\in T$. Then for every $T$-spherical code of cardinality $m$ we have that $$ mf_0\le f(1) \eqno (6.3) $$ } There are several known examples of $P$ and $T$ when the inequality (6.3) turns into equality, see \cite{CS,DGS,Kab,{lev98}}. Now we consider $f$--designs that imply the equality $mf_0=f(1)$. \begin{lemma} \label{lem61} Let $f(t)=\sum_k {f_k\,G_k^{(n)}(t)}$ be a function on $[-1,1]$. \begin{enumerate} \item If $P\subset{\mathbb S}^{n-1}$ is such that $D(P)\subset Z_f$, then $S_f(P) = |P|\, f(1)$. \item If there is an $f$-design in ${\mathbb S}^{n-1}$ of cardinality $m$, then $f(1) = m f_0.$ \end{enumerate} \end{lemma} \begin{proof} 1. Let $P=\{p_1,\ldots,p_m\}\subset{\mathbb S}^{n-1}$ with $D(P)\subset Z_f$. Then $f(t_{i,j})=0$ for all $i\ne j$ and we have $$S_f(P)=mf(1). \eqno (6.4)$$ 2. Let $P$ be an $f$-design. Since $f_kM_k(P)=0$ for all $k>0$ we have $$S_f(P)= \sum_k{f_kM_k(P)} = f_0M_0(P) = f_0m^2.$$ Thus, $$f(1)=mf_0. \eqno (6.5)$$ \end{proof} Now we derive some conditions for $P$ to be an $f$-design. \begin{thm} \label{t62} Let $f(t)=\sum_k {f_k\,G_k^{(n)}(t)}$ be a function with all $f_k\ge0$. Let $P\subset{\mathbb S}^{n-1}$ with $|P|=m$ be such that $D(P)\subset Z_f$. Then $P$ is an $f$-design if and only if\, $f(1)=mf_0$. \end{thm} \begin{proof} If $P=\{p_1,\ldots,p_m\}$ is an $f$-design then by Lemma \ref{lem61} we have $f(1)=mf_0$. Suppose $f(1)=mf_0$. Since $D(P)\subset Z_f$, by (6.4) we have $S_f(P)=mf(1)$. Moreover, by assumption, $f_k\ge0$ for all $k$. Then Delsarte's bound (6.3) yields: $$mf(1)=S_f(P)=\sum_k{f_kM_k(P)}\ge m^2f_0.$$ From (6.1) it follows that $f_kM_k(P)\ge0$, for all $k$. Then the equality $f(1)=mf_0$ holds only if $f_kM_k(P)=0$, for all $k>0$. This is exactly Property (1) in Definition 6.1. \end{proof} \subsection {Spherical $f$-designs and $M$-sets} Now we show that there is a simple connection between $f$-designs and $M$-sets. \begin{thm} \label{T42} Let $f(t)=\sum_k {f_k\,G_k^{(n)}(t)}$ be a function on $[-1,1]$ with all $f_k\ge0$. Then any $f$-design in ${\mathbb S}^{n-1}$ is an $M$-set with $\rho(x,y)=-f(x\cdot y)$. \end{thm} \begin{proof} Let $\rho(x,y):=-f(x\cdot y)$, where $x,y\in {\mathbb S}^{n-1}.$ For $Y=\{y_1,\ldots,y_m\}\subset{\mathbb S}^{n-1}$ define $$ G_f(Y):=\sum\limits_{i<j}{\rho(y_i,y_j)}. $$ If $P=\{p_1,\ldots,p_m\}$ is an $f$-design then the following equalities hold: $$ f(1)=mf_0, \quad \rho(p_i,p_j)=0, \; \forall \; i\ne j, \quad G_f(P)=0. $$ It is easy to see that for an arbitrary $Y\subset{\mathbb S}^{n-1}$, $|Y|=m$, (6.1) implies $$ S_f(Y)=\sum_k{f_kM_k(Y)}\ge f_0m^2. $$ Thus $$ G_f(Y)=\frac{mf(1)-S_f(Y)}{2}=\frac{f_0m^2-S_f(Y)}{2}\le0. $$ Finally, by (3.1) we have $$ R_\rho(P)=(0,\ldots.0)\prec^w R_\rho(Y). $$ This completes the proof. \end{proof} \noindent{\bf Open problem.} Consider $f$ as in Theorem 6.2 with all $f_k\ge0$ and $f(1) = m f_0$. Then Theorems \ref{t62} and \ref{T42} yield that if $D(P)\subset Z_f$, then $P$ is an $f$-design and $P\in M({\Bbb S}^{n-1},-f,m)$. It is easy to prove that if $Y\in M({\Bbb S}^{n-1},-f,m)$, then $D(Y)\subset Z_f$. {\em Is it true that $Y$ is always isomorphic to $P$?} There are several cases when the answer is positive (see \cite{BS}). \subsection {Spherical $\tau$- and $f$-designs} A spherical $\tau$-design $P$ is a set of points in $\mathbb{S}^{n-1}$ such that \begin{eqnarray*} \frac{1}{\mu(\mathbb{S}^{n-1})} \int_{\mathbb{S}^{n-1}} F(x) d\mu(x)= \frac{1}{m} \sum_{x \in P} F(x), \text{ with } m=|P|, \end{eqnarray*} ($\mu(x)$ is the surface area measure) holds for all polynomials $F(x) $ of total degree at most $\tau$. Equivalently, {\em $P$ is a $\tau$-design if and only if $M_k(P)=0$ for all $k=1,2,\ldots,\tau$} (see \cite{DGS,lev98}). \medskip The following proposition directly follows from the definition of $f$- and $\tau$-designs. \begin{prop}\label{prop62} If $P\subset{\mathbb S}^{n-1}$ is a $\tau$-design and $|D(P)|\le \tau$, then $P$ is an $f$-design of degree $\tau$ with $$ f(t)=g(t)\prod\limits_{x\in D(P)}(t-x), \quad \deg{g}\le \tau-|D(P)|. $$ \end{prop} There are many examples of spherical $f$-designs. Let $C$ be the set of vertices of a regular cross-polytope. Then $D(C)=\{0,-1\}$ and $C$ is a spherical 3-design. If $f(t):=(at+b)\,t(t+1)$, $a, b\in{\mathbb R}, $ then Proposition \ref{prop62} yields that $C$ is an $f$-design of degree 3. This example can be extended for universally optimal configurations. Note that all known universally optimal spherical configurations $P$ are $\tau$-designs with $\tau>|D(P)|$ \cite{CK07}. Therefore, if $f$ is the same as in Proposition \ref{prop62}, then $P$ is an $f$-design. \medskip However, the set of $f$-designs is much larger than the set of universally optimal configurations. Let $P$ be the set of vertices of a regular 24-cell $P$ in ${\mathbb S}^3$. It is known that $P$ is not universally optimal \cite{cohn07a}. In this case $P$ is a 5-design and $D(P)=\{\pm1/2, 0, -1\}$. Thus, if $$f(t):=(at+b)\,(t^2-1/4)(t^2+t),$$ then $P$ is an $f$-design for all real $a$ and $b$. \subsection {Spherical two-distance sets and $f$-designs} A finite collection $P$ of unit vectors in ${\mathbb R}^{n}$ is called a {\em spherical two-distance set} if there are two real numbers $a$ and $b$ such that the inner product of each pair of distinct vectors from $P$ takes value either $a$ or $b$. In particular, if the inner products in $P$ satisfy the condition $a=-b,$ then $P$ is a {\em set of equiangular lines}. In this subsection we discuss $f$-designs that are two-distance sets. Let $P$ be an $f$-design of degree 2. Then $|D(P)|\le |Z_f|\le2$, i.e. $P$ is a two-distance set. \begin{prop} Let $f(t)=(t-a)(t-b)$, where $a,b\in [-1,1)$ and $a+b\ne 0$. Then $P$ in ${\mathbb S}^{n-1}$ is an $f$-design if and only if $P$ is a two-distance 2-design. \end{prop} \begin{proof} We have $$ f(t)=t^2-(a+b)t+ab=\frac{n-1}{n}G_2^{(n)}-(a+b)\,G_1^{(n)}+ab+1/n=f_2G_2^{(n)}+f_1G_1^{(n)}+f_0. $$ Let $P$ be an $f$-design. Since $f_1\ne0$ and $f_2\ne0$, $P$ is a 2-design. If $P$ is a two-distance 2-design with inner products $a$ and $b$ then, by Proposition \ref{prop62}, $P$ is an $f$-design. \end{proof} Actually, all two-distance 2-designs can be obtained from strongly regular graphs as shown in \cite[Theorem 1.2]{BOGY}. This gives a characterization of $f$-designs of degree 2 with $a+b\ne0$. The case $a=-b$ when $f$--designs become sets of equiangular lines is also very interesting. Note that the connection between these sets and strongly regular graphs is well--known \cite{DGS}. If $a=-b$, we get $f(t)=t^2-a^2$ and then $f_0=1/n-a^2$, $f_1=0$, $f_2=1-1/n$. In this case Delsarte's bound (6.3) becomes $$ m\le\frac{f(1)}{f_0}=\frac{n(1-a^2)}{1-na^2}. $$ For sets of equiangular lines this inequality is known as the {\em relative bound} as opposed to the {\em absolute} (or {\em Gerzon}) bound (see \cite{LeS} and a recent improvement in \cite{glaz16}): $$ m\le\frac{n(n+1)}{2}. \eqno (6.5) $$ We have that a set $P$ in ${\mathbb S}^{n-1}$ with $|P|=m$ is an $f$-design, where $f(t)=t^2-a^2$, if and only if $D(P)=\{a,-a\}$ and $m(1-na^2)=n(1-a^2).$ There are several known particular cases. However, the problem of classification of these designs is yet unsolved. \medskip Now let $f(t):=g(t)(t-a)(t-b)$. We would like to find all $P$ in ${\mathbb S}^{n-1}$ with $|P|=m$ and $D(P)=\{a,b\}$ that are $f$-designs. Consider the case $a+b\ge0$. (For the case $a+b<0$, see \cite{mus09a,glaz16}.) In \cite{mus09a} we proved that if $a+b\ge0$, then the absolute bound (6.5) holds. Moreover, this bound is tight: for all $n\ge7$ there are {\em maximal}, i.e. with $m=n(n+1)/2$, two-distance sets. Let the unit vectors $e_1,\ldots,e_{n+1}$ form an orthogonal basis of ${\Bbb R}^{n+1}$. Let $V_n$ be the set of points $e_i+e_j, \; 1\le i<j\le n+1.$ Since $V_n$ lies in the hyperplane $\sum^{n+1}_{k=1} {x_k}=2$, we see that it represents a spherical two-distance set in ${\Bbb R}^n$. The cardinality of $V_n$ is $n(n+1)/2$. Let us rescale $V_n$ such that its points lie on the unit sphere ${\mathbb S}^{n-1}$. Let $\Lambda_n$ denote the resulting set. It is not hard to determine the respective distances $a$ and $b$: $$ a=\frac{n-3}{2(n-1)}\,, \quad b=\frac{-2}{n-1},\, \quad a+b=\frac{n-7}{2(n-1)}. $$ We see that for $n>7$, $|\Lambda_n|$ attains the upper bound for two-distance sets with $a+b>0$. In fact, $\Lambda_n$ is a maximal $f$-design of degree 2. The following questions seems interesting: {\em Are there other maximal $f$-designs with $a+b>0$ of degree} $d\ge2$? As noted above, there is a correspondence between $f$-designs of degree $2$ and strongly regular graphs. Actually, every graph $G$ can be embedded as a spherical two-distance set (see \cite{mus2dist}). This raises the following question: {\em Which graphs are embeddable as $f$-designs?} \medskip \medskip \noindent{\bf Acknowledgments.} I wish to thank Eiichi Bannai, Alexander Barg, Peter Boyvalenkov and Alexander Kolpakov for helpful discussions and useful comments. \medskip
\section{Introduction} \label{section: Introduction} \input{Text/Introduction/Introduction} \section{Basics of the program} \label{section: Basics of the program} \input{Text/Basics_of_the_program/Basics_of_the_program} \subsection{Package of the program} \label{subsection: Package of the program} \input{Text/Basics_of_the_program/Package_of_the_program/Package_of_the_program} \subsection{Input of the program} \label{subsection: Input of the program} \input{Text/Basics_of_the_program/Input_of_the_program/Input_of_the_program} \subsection{Algorithm of the program} \label{subsection: Algorithm of the program} \input{Text/Basics_of_the_program/Algorithm_of_the_program/Algorithm_of_the_program} \subsection{Execution of the program} \label{subsection: Execution of the program} \input{Text/Basics_of_the_program/Execution_of_the_program/Execution_of_the_program} \subsection{Performance of the program} \label{subsection: Performance of the program} \input{Text/Basics_of_the_program/Performance_of_the_program/Performance_of_the_program} \subsection{Output of the program} \label{subsection: Output of the program} \input{Text/Basics_of_the_program/Output_of_the_program/Output_of_the_program} \subsection{Validation of the program} \label{subsection: Validation of the program} \input{Text/Basics_of_the_program/Validation_of_the_program/Validation_of_the_program} \section{Component analysis} \label{section: Component analysis} \input{Text/Component_analysis/Component_analysis} \subsection{Decay trees} \label{subsection: Component analysis --- decay trees} \input{Text/Component_analysis/Decay_trees/Decay_trees} \subsection{Decay initial-final states} \label{subsection: Component analysis --- decay initial-final states} \input{Text/Component_analysis/Decay_initial-final_states/Decay_initial-final_states} \subsection{Decay branches of particles} \label{subsection: Component analysis --- decay branches of particles} \input{Text/Component_analysis/Decay_branches_of_particles/Decay_branches_of_particles} \subsection{Inclusive decay branches} \label{subsection: Component analysis --- inclusive decay branches} \input{Text/Component_analysis/Inclusive_decay_branches/Inclusive_decay_branches} \subsection{Essential topology tags} \label{subsection: Component analysis --- Essential topology tags} \input{Text/Component_analysis/Essential_topology_tags/Essential_topology_tags} \section{Signal identification} \label{section: Signal identification} \input{Text/Signal_identification/Signal_identification} \subsection{Decay trees} \label{subsection: Signal identification --- decay trees} \input{Text/Signal_identification/Decay_trees/Decay_trees} \subsection{Decay initial-final states} \label{subsection: Signal identification --- decay initial-final states} \input{Text/Signal_identification/Decay_initial-final_states/Decay_initial-final_states} \subsection{Particles} \label{subsection: Signal identification --- particles} \input{Text/Signal_identification/Particles/Particles} \subsection{Decay branches} \label{subsection: Signal identification --- decay branches} \input{Text/Signal_identification/Decay_branches/Decay_branches} \subsection{Essential topology tags} \label{subsection: Signal identification --- Essential topology tags} \input{Text/Signal_identification/Essential_topology_tags/Essential_topology_tags} \section{Common settings} \label{section: Common settings} \input{Text/Common_settings/Common_settings} \subsection{Settings on input entries} \label{subsection: Settings on input entries} \input{Text/Common_settings/Settings_on_input_entries/Settings_on_input_entries} \subsection{Setting on input decay branches} \label{subsection: Setting on input decay branches} \input{Text/Common_settings/Setting_on_input_decay_branches/Setting_on_input_decay_branches} \subsection{Setting on charge conjugation} \label{subsection: Setting on charge conjugation} \input{Text/Common_settings/Setting_on_charge_conjugation/Setting_on_charge_conjugation} \subsection{Setting on initial state particles} \label{subsection: Setting on initial state particles} \input{Text/Common_settings/Setting_on_initial_state_particles/Setting_on_initial_state_particles} \clearpage \section{Summary} \label{section: Summary} \input{Text/Summary/Summary} \section*{Acknowledgements} \input{Acknowledgements/Acknowledgements} \section*{References} \input{References/References} \end{document}
\section{Introduction} Individual single photon avalanche diodes (SPADs) have long been the workhorse of many quantum optics experiments~\cite{Migdall_book,Hadfield2009}. This is due largely to their single photon level sensitivity, and also to the Geiger mode operation which allows for straightforward methods of single photon discrimination and counting, provided the detector operates in the photon-starved regime. Furthermore, precise timing electronics results in an impulse response function (IRF) that can be as short as 20 ps~\cite{Cova_avalanche_1996}, which is ideal for measuring temporal correlations between multiple photons whilst reducing the influence of background radiation and dark counts. These properties make SPADs one of the leading technologies for measuring photon-photon correlations and entanglement. Arrays of SPADs, or SPAD cameras, fabricated with standard CMOS technology, have been produced in recent years and are now commercially available (e.g. from Photon Force, Micro Photon Devices). The maturity of the technology has enabled the production of compact arrays~\cite{Rochas2003,Rochas2003b}, as well as the reduction of the cost per device through bulk manufacturing processes~\cite{Bruschini2019}. Thus far, imaging devices based on SPADs have demonstrated their capabilities in fluorescence lifetime imaging~\cite{Li2010,Henderson2018,Bruschini2019}, LiDAR~\cite{Bronzi2014,Finlayson2018,Lindner2018,Henderson2019}, non-line-of-sight imaging~\cite{Gariepy2016,NLOS2020}, imaging through strongly scattering media~\cite{Lyons2019b} \BN{and time-resolved correlation measurements~\cite{Lubin2019,Unternahrer2016}}. However, SPAD cameras have yet to make their mark due to their overall efficiency and resolution; the fill-factor of the earliest available SPAD cameras was on the order of a few percent~\cite{Gariepy2015,Bruschini2019} which, despite the quantum efficiency of the single SPAD pixels being on par with commercial single element SPADs, equates to a large overall loss. This high loss is particularly detrimental to the detection of quantum states formed of multiple photons as it scales with the power of the photon number. CCD based single photon cameras have therefore been typically preferred for quantum imaging applications, where one of the routine tasks involves measuring spatial correlations between photons to build an image. This in turn is a result of the photon source of choice that is usually spontaneous parametric down-conversion (SPDC) in non-linear crystals, where a pump photon is converted with a given probability, into a pair photons. The governing law for this process is momentum conservation that ensures correlations between the photons in the pair~\cite{Jost1998, Abouraddy2001}. These correlations can be exploited for ghost imaging~\cite{Pittman1995,Moreau2019}, imaging at enhanced spatial resolution~\cite{Xu2015,Toninelli2019}, \BN{quantum-enhanced target detection~\cite{Zhang2020} } and to distil an image encoded in quantum states in the presence of classical background radiation~\cite{Defienne2019, Gregory2019}. \BN{We note that recently, Ianzano \textit{et al.} have demonstrated the measurement of polarisation entanglement using a camera~\cite{Ianzano2020}, owing to its high-temporal resolution (1.5 ns). However, this demonstration did not take full advantage of the spatial resolution of the camera to measure the spatial correlations in the photon pairs; these were spatially filtered using single-mode fibres before being measured with the camera. While this ensured mode-matching and spatial indistinguishability that are necessary for polarisation entanglement, the approach comes at the cost of reducing the number of modes to only one, insufficient for imaging, and limits the dimensionality of entanglement to two. } A quantity of particular interest in quantum imaging is the spatial bi-photon joint probability distribution (JPD) describing the correlations between photon pairs. The reconstruction of the JPD can be achieved through statistical averaging over a large number of intensity images~\cite{reichert_massively_2018} -- typically on the order of $10^6$ to $10^7$ images -- of identically prepared photon pairs. Given that CCD-based detectors provide frame rates on the order of $100$ frames/s, the total acquisition time can vary from a few hours to over a day. Such long acquisition times constitute a hindrance to the widespread adoption of quantum imaging schemes for practical applications. In the following, we show the reconstruction of the JPD in both position and momentum using a commercially available SPAD camera (SPC3, Micro Photon Devices). Correlation measurements in position and momentum space are averaged over a total of $10^7$ images, amounting to an acquisition time of 140 s. These measurements are of a quality that allows to demonstrate spatial entanglement through violation of an Einstein-Podolsky-Rosen (EPR) criterion~\cite{Einstein1935, howell_realization_2004} with a confidence of $227$ sigmas. We show an experimental study into the confidence of the violation as a function of the number of individual single-bit frames used for the calculation, highlighting the benefit of the high-frame rate enabled by the SPAD camera for fast characterisation of entanglement correlations. \BN{From our measurements in complementary position and momentum bases, we certify high-dimensional entanglement in up to $48$ dimensions. To this end, we used a robust method of entanglement certification developed by Bavaresco \textit{et al.} to compute the lower bound of the fidelity of the measured state with respect to a maximally entangled one in order to estimate its dimensionality~\cite{Bavaresco2018}}. The short acquisition times required to reconstruct the bi-photon JPD \BN{and certify high-dimensional entanglement} pave the way for the implementation of quantum imaging \BN{and information processing} schemes in real-time. Indeed, we note that faster sensors, with frame rates up to 800 kframes/s, have been demonstrated~\cite{Gasparini2018} and that this work represents only the tip of the iceberg for the potential use of SPAD cameras within the field of quantum optics. \section{Results} \noindent\textbf{} Figure~\ref{Figure1} shows the experimental apparatus used to measure spatial correlations between photon pairs. Spatially entangled photon pairs are produced via spontaneous parametric down-conversion (SPDC) in a 0.5 mm long $\beta$-barium borate (BBO) crystal, cut for type-I phase matching. The crystal is pumped by a $347$ nm pulsed laser with a repetition rate of 100 MHz (pulse length of 10 ns), an average power of $50$ mW and is spatially filtered and collimated (not shown) to a beam diameter of $0.7$ mm ($1/e^2$). Spectral filters block the pump beam and select near-degenerate photon pairs at $694 \pm 5$ nm. \BN{Photon pairs are detected using an MPD-SPC3 single-photon avalanche diode (SPAD) camera with an array of $32 \times 64$ pixels, a fill factor of 80\% and a 150 $\mu$m pixel pitch. The quantum efficiency at 694 nm is around 9\% and the dark count rate is 0.14 count per pixel per second. The SPAD camera has a nominal speed of $96$ kframes/s and is operated at its minimum exposure time (10 ns) and dead-time (50 ns). Our photon flux over the full array was 22.5 mega-counts per second}. \BN{To measure momentum correlations, we used a $4f$-telescope to image the Fourier plane of the BBO crystal surface onto the SPAD camera (FF-configuration), as shown in Fig.~\ref{Figure1}a. Figure~\ref{Figure1}b shows the configuration used to measure position correlations of photons pairs at the surface of the BBO crystal (NF-configuration); the output surface of the crystal is imaged onto the SPAD camera using a $4f$-telescope. } \begin{figure}[htbp] \centering\includegraphics[width=1 \columnwidth]{Figure1.pdf} \caption{\label{Figure1} \textbf{Experimental scheme.} Spatially-entangled photon pairs are produced by spontaneous parametric down-conversion (SPDC) in a $\beta$-barium borate (BBO) using a $347$~nm pulsed pump laser with a repetition rate of 100~MHz. Spectral filters (SF) select near-degenerate photon pairs at $694 \pm 5$~nm. \textbf{a,} A three-lens system composed of $f_1=35$~mm, $f_2=100$~mm and $f_3=200$~mm, maps photon momenta onto pixels of a single-photon avalanche diode (SPAD) camera by Fourier imaging the crystal. This configuration is named FF-configuration. \textbf{b,} position correlations are measured with two lenses, $f_1=35$~mm and $f_4=300$~mm, image the output surface of the BBO crystal onto the SPAD camera. This configuration is named NF-configuration.} \end{figure} \begin{figure}[htbp] \centering\includegraphics[width=1 \columnwidth]{Figure2.pdf} \caption{\label{Figure2} \textbf{Measurement of momentum correlations.} \textbf{a,} Intensity distribution of the SPDC light measured in the FF-configuration. \textbf{b} and \textbf{c}, Conditional probability distributions $\Gamma(\vec{k}|\vec{A})$ and $\Gamma(\vec{k}|\vec{B})$ relative to two arbitrarily chosen positions $\vec{A}$ and $\vec{B}$ on the sensor, respectively. We measured an SNR of 320 (\textbf{b}) and 258 (\textbf{c}). \textbf{d}, Projection of the joint probability distribution (JPD) along the sum coordinates $\vec{k_1}+\vec{k_2}$. A measured momentum correlation width of $\Delta\vec{k} = 1.0666(7)\times 10^{-3} $ rad.$\mu\text{m}^{-1}$ is obtained using a Gaussian fit (see Methods). Spatial coordinates are in pixels and the analysis was performed on a total of $10^7$ images.} \end{figure} \begin{figure}[htbp] \centering\includegraphics[width=1 \columnwidth]{Figure3.pdf} \caption{\label{Figure3} \textbf{Measurement of position correlations.} \textbf{a,} Intensity distribution of the SPDC light in the NF-configuration. \textbf{b,} Projection of joint probability distribution along the minus-coordinates $\vec{r_1}-\vec{r_2}$. A measured position correlation width $\Delta\vec{r} = 4.3(2)$ $\mu\text{m}$ was obtained using a Gaussian fit (see Methods). Spatial coordinates are in pixels and the analysis was performed on a total of $10^7$ images.} \end{figure} \ \\ \noindent\textbf{Measuring EPR entanglement.} We demonstrate the presence of spatial entanglement in SPDC light by violating the Einstein-Podolsky-Rosen (EPR) criterion~\cite{howell_realization_2004} \begin{equation} \Delta\vec{r}\cdot\Delta\vec{k} > \frac{1}{2}, \label{eq: EPR} \end{equation} where $\Delta\vec{r} = \Delta(\vec{r_1}-\vec{r_2})$ and $\Delta\vec{k} = \Delta(\vec{k_1}+\vec{k_2})$ are, respectively, measures of the correlation strength in position and momentum for a pair of photons labelled $1$ and $2$. Violation of a related EPR criterion has been achieved previously both in the case of scanning single-point detectors~\cite{howell_realization_2004} and by full-field imaging using an electron-multiplying CCD (EMCCD) cameras~\cite{moreau_realization_2012, Edgar2012}. To determine the strength of the transverse position and momentum correlations, we measure the spatial JPD of photon pairs in the two configurations described in Fig.~\ref{Figure1} using the SPAD camera. For a given pair of pixels located at positions $\vec{r_i}$ and $\vec{r_j}$ of the sensor, an element of the JPD denoted $\Gamma(\vec{r_i},\vec{r_j})$ represents the joint probability of detecting photon $\vec{i}$ of a pair at pixel $\vec{r_i}$ and photon $\vec{j}$ at pixel $\vec{r_j}$. $\Gamma(\vec{r_i},\vec{r_j})$ is calculated from a set of $N$ frames using the formula~\cite{defienne_general_2018-2} \begin{equation} \label{eq: JPD intensity} \Gamma(\vec{r_i},\vec{r_j}) = \frac{1}{N} \sum_{l=1}^N I_l(\vec{r_i})I_l(\vec{r_j}) - \frac{1}{N^2} \sum_{m,n=1}^{N} I_m(\vec{r_i})I_{n}(\vec{r_j}), \end{equation} where $I_l(\vec{r_i}) \in \{0,1\}$ is a binary value returned by the SPAD camera at pixel $\vec{r_i}$ in the $l^{th}$ frame. The first term is an average value of the coincidence detection of photons belonging to either the same entangled pair (genuine coincidence) or different entangled pairs (accidental coincidence). Since multiple photon pairs can be detected during the time of an exposure, the contribution of accidental coincidences is generally greater than the genuine ones. The second term is an average value of accidental coincidences. Therefore, a subtraction between these two terms leaves only an average value of genuine coincidences that is $\Gamma(\vec{r_i},\vec{r_j})$ (see Methods). \BN{Note that, while subtracting the accidental coincidences is important for our approach to work, this process also has the drawback of increasing the noise in the reconstructed JPD.} \ \\ \noindent\textbf{Reconstruction of bi-photon correlations.} Figure~\ref{Figure2} shows results of JPD measurements performed in the FF-configuration to study momentum correlations. Figure~\ref{Figure2}a shows the direct intensity image reconstructed from the sum of $10^7$ frames, which corresponds to a total acquisition time of 140 s. This image represents the probability of detecting a photon with a given momentum $\vec{k}=(k_x,k_y)$, with no information about the relative position of photons within the same pair (i.e. it is the marginal probability distribution). The JPD $\Gamma(\vec{k_1},\vec{k_2})$ is computed from this set of frames using Eq.~\ref{eq: JPD intensity} and is visualized using conditional projections. For example, Fig.s~\ref{Figure2}b and \ref{Figure2}c show the conditional spatial distributions $\Gamma(\vec{k}|\vec{A})$ and $\Gamma(\vec{k}|\vec{B})$ of two photons measured by the sensor in coincidence and with high signal-to-noise ratio (SNR), with one-photon detected at arbitrarily chosen positions $\vec{A}$ and $\vec{B}$, respectively. Due to momentum conservation in the SPDC process, the signal and idler photons are measured at $\pi$ radians in the transverse plane at the center of the marginal distribution. The centrosymmetry of momentum correlations is characterised by the presence of an intense peak of coincidences in the sum-coordinate projection of the JPD shown in Fig.~\ref{Figure2}d. The height of the peak corresponds to the sum of coincidences measured in all pairs of symmetric pixels, while its width gives the strength of the correlation, i.e., the momentum correlation width $\Delta\vec{k}$. Accounting for the effective magnification of our optical system, we measured $\Delta\vec{k} = 1.0666(7)\times 10^{-2} $ rad.$\mu\text{m}^{-1}$ using a Gaussian fitting model. \BN{This model follows from the double-Gaussian approximation applied to the two-photon wavefunction of photon pairs produced by SPDC in a thin crystal~\cite{Fedorov2009,Schneeloch2016} used in many experimental studies~\cite{moreau_realization_2012, Edgar2012,howell_realization_2004,reichert_massively_2018} (see Methods).} We repeated the above analysis in the NF-configuration shown in Fig.~\ref{Figure1}b to extract the position correlation width $\Delta\vec{r}$. The photons in entangled pairs are position correlated, i.e., they are born at the same position in the crystal and are expected to arrive at the SPAD sensor at the same position. Figures~\ref{Figure3}a and b show, respectively, the direct intensity image and the projection of the JPD along the minus-coordinate reconstructed from a set of $10^7$ frames. A coincidence peak is observed at the center of the minus-coordinate projection that demonstrates strong position correlation between photon pairs. The central pixel in the minus-coordinate projection has been set to zero because the SPAD camera does not resolve the number of photons detected per pixel and therefore cannot measure photon coincidences at the same pixel. Accounting for the optical magnification, we measured a position correlation width $\Delta\vec{r} = 4.3(2)\ \mu$m by fitting with a Gaussian model (see Methods). The measured values of transverse position and momentum correlations width violate the EPR criterion in Eq.~(\ref{eq: EPR}): $\Delta\vec{r}\cdot \Delta\vec{k} = 4.6(2)\times10^{-2}<1/2$, thus demonstrating the presence of spatial entanglement. This violation has a confidence level of $C=227$ using the following definition: \begin{equation} \label{equconfidence} C=\frac{|1/2-\Delta\vec{r}\cdot \Delta\vec{k} |}{\sigma} \end{equation} where $\sigma = 10^{-3}$ is the uncertainty on the product $\Delta\vec{r}\cdot \Delta\vec{k}$. \BN{In both position and momentum space, we observe that the correlation width is at most, as large as a single pixel on the SPAD camera. On one hand, this is due to the relatively large 150 $\mu$m pixel pitch that is for comparison, over 10x larger than that of the EMCCD iXon 888 from Andor technologies. On the other hand, The magnification of our optical system was not large enough to spread the correlation width over more pixels. The implication is that the true correlation width as given by the crystal is necessarily smaller than what we measured (see Methods). However, a more accurate and precise measurement of the correlation width will only lead to a tighter EPR violation. Note that this can now be realised with state-of-the-art SPAD sensors that boast megapixel-arrays and 2.2 $\mu$m pixel pitch \cite{Morimoto2020_1,Morimoto2020_2}} \ \\ \begin{figure}[t] \centering\includegraphics[width=1 \columnwidth]{Figure4.pdf} \caption{\label{Figure4} \textbf{Confidence level analysis}. \textbf{a,} $C$ values measured for different total number of frames $N$ (black crosses) together with a theoretical model of the form $0.047 \sqrt{N}$ (blue dashed line). \textbf{b-d}, Sum-coordinate projections of the JPD measured in the FF-configuration using \textbf{(b)} $2 \times 10^3$ frames, \textbf{(c)} $10^4$ frames and \textbf{(d)} $10^7$ frames. \textbf{e-g}, Minus-coordinate projection of the JPD measured in the NF configuration using \textbf{(e)} $2 \times 10^3$ frames, \textbf{(f)} $10^4$ frames and \textbf{(g)} $10^7$ frames.} \end{figure} \noindent\textbf{Confidence level analysis.} As detailed in the Methods section, $\sigma$ is calculated from the standard deviation of the noise surrounding the coincidence peaks in the sum- and minus-coordinates projections of the JPD. For a fixed exposure time and a constant source intensity, $\sigma$ depends only on the number of frames acquired to compute the JPD~\cite{reichert_optimizing_2018-3}. Figure~\ref{Figure4}a shows that the measured values of $C$ for different total number of frames $N$ (black crosses) are found to scale as $\sqrt{N}$ (blue dashed curve, see Methods). In particular, confident EPR violation ($C>5$) is not achieved for $N<2\times10^4$. Figures~\ref{Figure4}b-g show examples of sum- and minus-coordinate projections obtained for a total number of frames $N=2\times10^3$ (Figs \ref{Figure4}b and \ref{Figure4}e), $N=10^4$ (Figs. \ref{Figure4}c and \ref{Figure4}f) and $N=10^7$ (Figs. \ref{Figure4}d and \ref{Figure4}g). \BN{We clearly observe a decrease of the noise in the projection images with increasing number of frames. Indeed, the average over a larger $N$ in Eq.~\eqref{eq: JPD intensity} enables to obtain a better estimation of the accidental term, such that its subtraction yields a more precise JPD. Consequently, after subtraction of the accidentals, the signal-to-noise ratio of the JPD increases with the total number of frames, as does our confidence in the EPR violation. However, we observed that the position-correlation signal appears noisier than its momentum counterpart. This is because we do not detect a significant part of our signal originating from two photons incident on the same pixel. Given that our SPAD camera cannot resolve photon number, we measure the weaker correlation signal from photons incident on adjacent pixels, owing to the relatively high 80\% fill-factor.}\\ \begin{figure}[t] \centering\includegraphics[width=1 \columnwidth]{Figure5.pdf} \caption{\label{Figure5} \BN{\textbf{Entanglement certification measurements}. In \textbf{a} near-field and \textbf{b} far-field configurations, we select the same square grid of 14$\times$14 = 196 pixels, with a spacing of 1 pixel (grid of black squares). \textbf{c} and \textbf{d} show the measured correlations between all the pixels in the grid, with each pixel labelling the spatial coordinates of photon: $\ket{m}$ in the near-field (position) and $\ket{\tilde{p}}$ in the far-field (momentum). We calculated a lower bound $\tilde{F} = 0.252(9)$ of the fidelity with respect to a $d$~=~196 maximally entangled state, leading to a certified entanglement dimensionality of 48. Spatial coordinates are in pixels and the analysis was performed on a total of $10^7$ images.}} \end{figure} \BN{\noindent\textbf{Certification of high-dimensional entanglement.} Measurements in two mutually unbiased bases (MUB) allow the use of a recently developed entanglement witness for certifying high-dimensional entanglement~\cite{Bavaresco2018}. In this respect, discrete position and momentum basis can be used as two MUBs and are accessible in our experimental setup using the NF- and FF-configurations~\cite{Erker2017}. As shown in Figures~\ref{Figure5}a and b, we then select $d=196$ pixels uniformly distributed over a central region in a grid of $14 \times 14$ pixels in both configurations. Modes associated with the chosen pixels are denoted $\{ \ket{m}\}_{m \in [\![0;d-1]\!]}$ (discrete position basis) and $\{ \ket{\tilde{p}}_{p \in [\![0;d-1]\!]} \}$ (discrete momentum basis). To certify entanglement dimensionality of the generated state $\rho$, correlation measurements are performed in the two MUBs to compute a lower bound for the fidelity of the state $\rho$ with respect to a maximally entangled target state $\ket{\Phi} = \frac{1}{\sqrt{d}} \sum_{m=0}^{d-1} \ket{mm}$. From the correlation matrices measured in Figs.~\ref{Figure5}.c and d, we obtained a lower bound value of the fidelity: $\tilde{F}(\rho,\Phi) =0.252(9)$ (see Methods). The entanglement dimensionality $d_{ent}$ that is certifiable with this method is the maximal $r$ such that \begin{equation} \label{fidelitybound} \tilde{F}(\rho,\Phi) > \frac{r-1}{d}, \end{equation} allowing us to certify $d_{ent} = 48$ dimensions. Finally, it is essential to note that the total acquisition time for performing all the measurements (i.e. in the two MUBs) and certifying the entanglement dimension was only $140$ seconds. As a comparison, one day was required to certify a similar amount of dimensions of entanglement ($55$) using a state-of-the-art single-outcome projective measurement technique~\cite{Valencia2020}, representing a speed improvement of approximately $500 \times$ with our method.}\ \section{Discussion} We have used a SPAD camera to characterise \BN{and quantify high-dimensional entanglement between photon pairs}. By measuring position and momentum correlations using $10^7$ intensity images, we showed a violation of an EPR criterion by 227 sigmas for an acquisition time of 140 s. While EPR violation has been demonstrated by acquiring very few frames with a highly-sensitive EMCCD camera~\cite{lantz_einstein-podolsky-rosen_2015}, quantum imaging approaches based on correlation measurements between spatially entangled photon pairs require the measurement of a large number of frames~\cite{reichert_massively_2018, Toninelli2019,Gregory2019, Defienne2019, defienne_adaptive_2018-1, defienne_entanglement-enabled_2019}, typically on the order of $10^6-10^7$. This is to ensure high enough SNR on the conditional projections to reconstruct the image by exploiting photon-pair correlations. Using an EMCCD for example, the reconstruction of the spatial JPD is performed at a frame rate of the order of $100$ frames/s, amounting to a total acquisition time of many hours. Our ability to reduce the JPD measurement time by a factor of 1000$\times$ will allow quantum imaging proof-of-principle experiments to evolve towards practical applications. \BN{Furthermore, we have certified high-dimensional entanglement up to $48$ dimensions in just 140 seconds, a significant development in quantum information processing with high-dimensional quantum states. While certifying high-dimensional entanglement is now routinely performed using single-outcome projective measurement techniques~\cite{Bavaresco2018, Schneeloch2019, Valencia2019, Valencia2020}, these approaches are tedious and prohibitively time-consuming. Our SPAD-camera-based technique outperforms these approaches in term of speed and scalability, with a demonstrated speed-up by more than a factor $500 \times$ and the potential access to up to $4\times10^6$ two-photon modes ($(32\times64)^2$) in parallel, indicating a key role to be played in future quantum information processing systems based on high-dimensional entanglement. Finally, a natural combination with recently developed spatial mode sorting devices~\cite{Fontaine2019,Brandt2020} holds promise for exploring high-dimensional entanglement in other types of spatial mode bases, including those carrying orbital angular momentum.} \section{Methods} \noindent \textbf{Details on $\Gamma$ reconstruction.} Equation~\ref{eq: JPD intensity} enables the reconstruction of the spatial JPD from a finite number of frames $N$ acquired with the SPAD camera. This equation is derived from a theoretical model of photon pair detection detailed in~\cite{defienne_general_2018-2}. In this work, a link is established between the JPD and the measured frames at the limit $N \rightarrow + \infty$: \begin{equation} \label{equtotal} \Gamma(\vec{r_i},\vec{r_j}) = A \ln \left(1+\frac{\langle I(\vec{r_i}) I(\vec{r_j}) \rangle-\langle I(\vec{r_i}) \rangle \langle I(\vec{r_j}) \rangle}{(1-\langle I(\vec{r_i}) \rangle)(1-\langle I(\vec{r_i}) \rangle)}\right), \end{equation} where $A$ is a constant coefficient that depends on both the quantum efficiency of the sensor and the power of the pump laser, and \begin{eqnarray} \langle I(\vec{r_i}) I(\vec{r_j}) \rangle &=& \lim_{N \rightarrow + \infty} \frac{1}{N} \sum_{l=1}^{N} I_l(\vec{r_i}) I_l(\vec{r_j}), \\ \langle I(\vec{r_i}) \rangle &=& \lim_{N \rightarrow + \infty} \frac{1}{N} \sum_{l=1}^{N} I_l(\vec{r_i}). \end{eqnarray} Equation~\ref{equtotal} is obtained under hypotheses~\cite{defienne_general_2018-2} that are all verified in our work, including that (i) the quantum efficiency is the same for all pixels of the sensor and (ii) the number of pairs produced by SPDC during the time an exposure follows a Poisson distribution~\cite{larchuk_statistics_1995}. Moreover, in our experiment the probability of detecting a photon per pixel per frame is much lower than one ($\langle I(\vec{r}) \rangle \ll 1$), which allows us to express Eq.~\ref{equtotal} as follows: \begin{equation} \label{equ3} \Gamma(\vec{r_i},\vec{r_j}) \approx \langle I(\vec{r_i}) I(\vec{r_j}) \rangle-\langle I(\vec{r_i}) \rangle \langle I(\vec{r_j}) \rangle. \end{equation} In the practical case where only a finite number of frames $N$ is measured, the first term on the right-hand side in Eq.~\ref{equ3} is estimated by multiplying pixel values within the same frame: \begin{equation} \label{equ4} \langle I(\vec{r_i}) I(\vec{r_j}) \rangle \approx \frac{1}{N}\sum_{l=1}^N I_l(\vec{r_i}) I_l(\vec{r_j}). \end{equation} The second term on the right-hand side in Eq.~\ref{equ3} is estimated by multiplying the averaged intensity values: \begin{equation} \label{equ5} \langle I(\vec{r_i}) \rangle \langle I(\vec{r_j})\rangle \approx \frac{1}{N^2}\sum_{m,n=1}^{N} I_m(\vec{r_i}) I_{n}(\vec{r_j}). \end{equation} Combining Eqs.~\ref{equ3},~\ref{equ4} and \ref{equ5} finally leads to Eq~\ref{eq: JPD intensity}. \\\\ \noindent \textbf{$\Delta\vec{r}$ and $\Delta\vec{k}$ measurements and uncertainties.} Transverse position and momentum correlation widths, $\Delta\vec{r}$ and $\Delta\vec{k}$, are estimated by fitting the sum- and minus-coordinate projections of the JPD measured in FF- and NF-configurations by a Gaussian model~\cite{moreau_realization_2012,Edgar2012} of the form $f(r)=$ $a\exp(-r^2/2\Delta^2)$, where $a$ is a fitting parameter and $\Delta$ is the desired correlation width value ($\Delta\vec{r}$ or $\Delta\vec{k}$). Note that, in the case of the position correlation width measurement, the central point of the minus-coordinate projection is excluded from the fitted data. The presence of noise in the sum- and minus-coordinate images induce uncertainties on values $\Delta\vec{r}$ and $\Delta\vec{k}$ returned by the fitting process. The standard deviation of the noise $\Sigma$ is measured in an area composed of $40 \times 40$ pixels surrounding the central peak of coincidence. \BN{The link between the correlation width uncertainty $\delta_\Delta$ ($\delta_\Delta = \delta_{\Delta\vec{r}}$ or $\delta_{\Delta\vec{k}}$) and $\Sigma$ is given by calculating the value of $grad[f]$ a the position $r = \Delta$: \begin{equation} \left| \frac{df}{dr}(r=\Delta) \right| = \frac{a}{\Delta \sqrt{e}}. \label{derivative} \end{equation} and expanding it at the first order in $r$: \begin{equation} \delta f = \frac{a}{\Delta \sqrt{e}} \delta r. \label{deltaDelta} \end{equation} In our case, the variations $\delta f$ and $\delta r$ identify to the uncertainty quantities $\Sigma$ and $\delta_\Delta$, respectively, which finally leads to: \begin{equation} \delta_\Delta = \frac{\Sigma \sqrt{e}\Delta}{a}. \label{deltaDelta} \end{equation} } All correlation width values and uncertainties are expressed in the coordinate system of the crystal, after taking into consideration the magnifications introduced by the imaging systems detailed in Fig.~\ref{Figure1}.\\\\ \noindent \textbf{Variation of the confidence level $C$ with the number of images $N$.} As defined in Eq.~\ref{equconfidence}, the confidence levels $C$ depends on both $\Delta\vec{r}\cdot\Delta\vec{k}$ and its uncertainty $\sigma$. For a given non-linear crystal and a stationary pump, $\Delta\vec{r}\cdot\Delta\vec{k}$ is constant while $\sigma$ depends on the quality of our measurement, including the total number of acquired frames $N$. To establish the theoretical link between $C$ and $N$, we first relate $\sigma$ to the uncertainties in position and momentum correlation widths ($\delta_{\Delta\vec{r}}$ and $\delta_{\Delta\vec{k}}$) by error propagation: \begin{equation} \sigma= \Delta\vec{r}\cdot\Delta\vec{k} \sqrt{\left(\frac{\delta_{\Delta\vec{r}}}{\Delta\vec{r}} \right)^2+\left(\frac{\delta_{\Delta\vec{k}}}{\Delta\vec{k}}\right)^2}. \end{equation} Then, we replace $\delta_{\Delta\vec{k}}$ and $\delta_{\Delta\vec{r}}$ using Eq.~\ref{deltaDelta} to show that $\sigma \propto \Sigma$. Finally, we use the fact that Reichert \textit{et al.}. have shown that $\Sigma \propto 1/ \sqrt{N}$ for a constant average pump power and a fixed exposure time~\cite{reichert_optimizing_2018-3}. Thus, we conclude that $C \propto \sqrt{N}.$ As shown in Fig.~\ref{Figure4}, this theoretical model fits successfully with the experimental data $(R^2 =0.998)$.\\\\ \noindent \BN{\textbf{Effect of pixelation on the Gaussian fit.} As shown in Figures~\ref{Figure2} and~\ref{Figure3}, the correlation widths of the photon pairs produced in our experiment are on the order of the pixel size. This pixelation effect introduces uncertainties on the Gaussian fits and the extracted values of the correlation widths. While this error is difficult to quantify, it is essential to note it can only lead to an overestimation of the correlation width values. In the limiting case where the correlation width is much smaller than the size of a pixel (i.e. the correlation image has only one non-zero pixel surrounded by zeros), the Gaussian fit will always return a value that is approximately equal to $20\%$ of the pixel size. Therefore, the confidence value calculated from the correlation width values is a lower bound of the more accurate value that would be measured using a SPAD with more pixels. As a result, the pixelation effect cannot change our conclusion on the presence of entanglement. Simulations of the pixelation effect are provided in the supplementary document.\\\\ \noindent \textbf{Discrete position and momentum basis.} In our experiment, we use discrete photonic transverse position and momentum bases given by a set pixels defined on the SPAD camera, which we refer to as the discrete position basis $\{ \ket{m}\}_{m \in [\![1;d]\!]}$ and discrete momentum basis $ \{ \ket{\tilde{p}} \} _{p \in [\![1;d]\!]} $. Our approach is based on the protocol proposed by Erker \textit{et al.}~\cite{Erker2017} where these bases are used as two mutually unbiased bases (MUBs) to certify high-dimensional entanglement. More precisely, they are linked according to: \begin{equation} \ket{\tilde{p}} = \frac{1}{\sqrt{d}} \sum_{m=0}^{d-1} \omega^{km} \ket{m} \end{equation} where $\omega = e^{2 \pi i / d}$. Experimentally, these bases are accessed using simple optics i.e. lenses to image or Fourier-image the output of the non-linear crystal producing the photon pairs. A subset of pixels is then selected in the illuminated areas of the sensor to optimise coincidence signals measured. In our case, we selected 196 pixels evenly separated from each other by $1$ pixel and located on a square grid of $14 \times 14$ pixels at the center of the sensor. The only difference between the scheme proposed by Eker \textit{et al.}. and our work is that only one image is produced on the camera in our case, against two in their proposal using a collinear beam splitter. This setup prevents us from accessing the coincidence rate at the same pixel (e.g. same spatial modes) as already pointed out in Figure~\ref{Figure3}. Rather, the coincidence rate of photon pairs in the same pixel is inferred by measuring the coincidence rate between each pixel and its neighbour. This inference leads to a lower value of the intra-pixel coincidence rate in the NF-configuration. This approximation therefore underestimates the actual entanglement witness value.\\\\ \noindent \textbf{Derivation of the dimensionality witness.} To certify the presence of high-dimensional entanglement in the measured state $\rho$, we employ a recently developed witness that uses correlations in at two MUBs~\cite{Bavaresco2018}. In our experiment, the two MUBs are the discrete position basis $\{ \ket{m}\}_{m \in [\![1;d]\!]}$ and discrete momentum basis $ \{ \ket{\tilde{p}} \} _{p \in [\![1;d]\!]}$ (see previous methods section). Using only coincidence measurements in these two bases, one can determine a lower bound for the fidelity $F(\rho,\Phi)$ of the state $\rho$ to a pure bipartite maximally entangled target state $\ket{\Phi}$. Since the fidelity to a target entangled state also provides information about the dimensionality of entanglement, we use this bound for certifying the dimension of entanglement of the state produced in our experiment. We consider a maximally entangled target state written as: \begin{equation} \ket{\Phi} = \frac{1}{\sqrt{d}}\sum_{m=0}^{d-1} \ket{mm} \end{equation} with $d=196$. The fidelity $F(\rho,\Phi)$ of the state $\rho$ to the target state $\ket{\Phi}$ is defined as: \begin{eqnarray} \label{fidelity} F(\rho,\Phi) &&= \mbox{Tr} \left(\ket{\Phi} \bra{\Phi} \rho \right) \nonumber \\ &&= \sum_{m,n=0}^{d-1} \brakket{mm}{\rho}{nn} \nonumber \\ && = F_1(\rho,\Phi)+F_2(\rho,\Phi) \end{eqnarray} where \begin{eqnarray} F_1(\rho,\Phi) &=& \sum_{m=0}^{d-1} \brakket{mm}{\rho}{mm} \label{F1} \\ F_2(\rho,\Phi) &=& \sum_{m\neq n}^{d-1} \brakket{mm}{\rho}{nn} \label{F2} \end{eqnarray} The entanglement dimensionality can be deduced from the fidelity taking into account that for any state $\rho$ of Schmidt number $r \leq d$, the fidelity of Eq.~\eqref{fidelity} is bound by: \begin{equation} \label{fidelity} F(\rho,\Phi) \leq B_r(\Phi) = \frac{r}{d} \end{equation} Hence, any state with $F(\rho,\Phi) > B_r(\Phi)$ must have an entanglement dimensionality of at least $r+1$. Our goal is therefore to obtain a lower bound on the fidelity as large as possible for the target state whose Schmidt rank is as close as possible to the local dimension $d$. To achieve this experimentally, the method described in~\cite{Bavaresco2018} works the following way:\\ \noindent Step 1: Matrix elements $ \{ \brakket{mn}{\rho}{mn} \}_{m,n}$ are calculated from the coincidence counts $\{N_{mn}\}_{mn}$ measured in the discrete position basis via: \begin{equation} \brakket{mn}{\rho}{mn} = \frac{N_{mn}}{\sum_{k,l}N_{kl}} \end{equation} These elements are shown in the matrix in Figure~\ref{Figure5}.d. They enable to calculate directly the term $F_1(\rho,\Phi) = 0.00170 (1)$ from the definition, Eq~\eqref{F1}.\\ \noindent Step 2: Matrix elements $ \{ \brakket{\tilde{p} \tilde{v}}{\rho}{\tilde{p} \tilde{v}} \}_{p,v}$ are calculated from the coincidence counts $\{\tilde{N}_{pv}\}_{pv}$ measured in the discrete momentum basis via: \begin{equation} \brakket{\tilde{p} \tilde{v}}{\rho}{\tilde{p} \tilde{v}} = \frac{\tilde{N}_{pv}}{\sum_{k,l}\tilde{N}_{kl}} \end{equation} These elements are shown in the matrix in Figure~\ref{Figure5}.c. These matrix elements, together those of the discrete position basis, allow us to bound the fidelity term $F_2(\rho,\Phi)$. This lower bound $\tilde{F}_2(\rho,\Phi) = 0.250(9)$ is calculated via: \begin{eqnarray} &&\tilde{F}_2(\rho,\Phi) = \sum_{p=0}^{d-1} \brakket{\tilde{p} \tilde{p}}{\rho}{\tilde{p} \tilde{p}} - \frac{1}{d} - \nonumber \\ && \sum_{\substack{m \neq n',m \neq n \\ n \neq n',n' \neq m' }} \gamma_{mnm'n'} \sqrt{\brakket{mn}{\rho}{mn} \brakket{m'n'}{\rho}{m'n'} } \label{f2tilde} \end{eqnarray} where the prefactor $\gamma_{mnm'n'}$ is given by \begin{equation} \gamma_{mnm'n'} = \left\{ \begin{array}{ll} 0 & \mbox{if } (m-m'-n+n') \mbox{ mod } d\neq0 \\ \frac{1}{d} & \mbox{otherwise.} \end{array} \right. \end{equation} A derivation of Eq.~\eqref{f2tilde} can be found in the Methods section of~\cite{Bavaresco2018}.\\ \noindent Step 3: A lower bound on entanglement is calculated as $\tilde{F}(\rho,\Phi) = F_1(\rho,\Phi)+\tilde{F}_2(\rho,\Phi) =0.252(9) \leq F(\rho,\Phi)$. This lower bound value is finally compared to the certification bound $B_r(\Phi)$ as \begin{equation} B_r(\Phi) < \tilde{F}(\rho,\Phi) \leq B_{r+1}(\Phi) \end{equation} thus certifying entanglement in $r+1$ dimensions. In our experiment we found, accounting for errors, $r=47$ and hence certified entanglement in $d_{ent}=48$ dimensions.}\\ \BN{\noindent{\textit{Assumptions:}} Using this approach, we note that no assumptions are directly made about the underlying quantum state $\rho$. However, an assumption is made about our measurement process. Indeed, by using Eq.~\eqref{eq: JPD intensity} to measure the JPD of photon pairs, we effectively perform a subtraction of accidental counts. Correcting for accidental coincidence is acceptable in our experiment since we trust our measurement devices and the final goal is only to assess the presence of entanglement and its dimension. However, such an assumption would not be acceptable in an adversarial scenario such as quantum key distribution as it is likely to compromise the security of the protocol. Furthermore, this assumption cannot be used if one wants to perform a loophole-free non-locality tests, because it is likely to violate the fair-sampling assumption.} \\ \section{Data availability} The experimental data and codes that support the findings presented here are available from the corresponding authors upon reasonable request.
\section{Introduction} \lettrine[]{M}{ACHINE} type communication (MTC) is one of the disruptive technologies promised by 5G and beyond networks. MTC transmissions are uplink-dominant and usually have low data rates. Envisioning future internet of things (IoT) networks where a massive number of sensors haphazardly deployed, will require novel approaches to quickly collect the sensed data. In most practical sensor applications (e.g., environmental monitoring), individual sensor measurements are not much of an interest but an aggregated function of them is~\cite{1632656}. Recently, over-the-air computation (AirComp) paradigm is developed as a promising approach to support fast data aggregation~\cite{8371243}. AirComp can compute a class of nomographic functions (e.g., arithmetic mean, weighted sum, geometric mean and Euclidean norm) by coherent and simultaneous transmissions of sensors, and by exploiting the superposition property of the wireless channel~\cite{8708985}. Meanwhile, employing low-power and self-sustainable sensor devices are critical to support massive IoT applications. Ambient backscatter communication technology is a promising candidate for self-sustainable wireless communication systems in which there is no external power supply. By utilizing an existing radio frequency (RF) signal, this technology can support low-power sensor-type devices~\cite{8368232}. Unmanned aerial vehicles (UAVs) have the potential to provide wireless connectivity to remote locations, and thus, they received increasing attention from the research community as well as the industry~\cite{8807380}. In the context of backscatter sensor networks, UAVs can act not only as data aggregators but also RF signal emitters enabling fast data aggregation and energy transfer at remote locations~\cite{8761125}. In this work, we aim to take advantage of the mobility of the UAVs to improve data aggregation from a large scale backscatter sensor network through a novel implementation of AirComp. Note that a key challenge in AirComp is the accurate power alignment to alleviate the detrimental effects of the channel attenuation. This is performed by precoding at the transmitters; however, optimal precoding requires accurate estimation of the channel gains between the sensor nodes and the UAV. In a network with a large number of {\em backscatter} nodes, the implementation of conventional channel sensing methods such as pilot transmissions and channel estimation, are difficult if not impossible. Hence, in this work, we leverage the mobility of UAV in order to sample the sum channel gains from a number of different locations in a specified region of interest. Specifically, a {\em sample-then-map} mechanism is proposed, wherein UAV performs two fly-overs. In the first round of fly-over, UAV transmits a reference RF signal and backscatter nodes reflect it unaltered to the UAV. This is repeated at a number of different locations in the region of interest. These measurements provide the UAV sum bidirectional channel gains at these locations. In the second round, the UAV transmits again a reference RF signal, but this time backscatter nodes return their actual sensor measurements. The sensors are oblivious to the channel state and transmit sensor data without precoding. The UAV uses sum gains obtained in the first round to linearly combine sensor measurements in the second round by minimizing the mean square error (MSE) of the aggregated sensor data. Our results demonstrate that under realistic channel conditions, with a network of 20 sensor nodes, MSE of the proposed scheme is below -2dB, when UAV samples the network at over 4 different locations. To the best of our knowledge, this is the first attempt to utilize UAV mobility as an enabler to improve AirComp performance without requiring computation and communication expensive precoding in backscatter sensor networks. In ~\cite{8708985,8468002}, the authors aim at developing multiple-input-multiple-output (MIMO) AirComp such that the objective is to find the optimal beamforming design for compensating the nonuniform fading. More recently, in~\cite{8644497}, a multi-antenna UAV-enabled AirComp is studied where UAV acts both as a data collector and wireless power transmitter. The objective was to jointly design an optimal power allocation, energy beamforming and AirComp equalization to minimize the MSE. However, the mobility of the UAV was not taken into account in improving the MSE performance. \begin{figure}[!t] \centerline{\includegraphics[width=73mm,height=42.3mm,scale=1]{Farajzadeh_WCL2019-1587_fig1}} \caption{System Model.} \label{sysmodel} \end{figure} \section{System Model} We consider a wireless sensor network with $N$ backscatter devices distributed independently and uniformly randomly over a circular target area with radius $R_{cov}$ as given in Fig.~\ref{sysmodel}. Each node is equipped with a single sensor measuring an environmental parameter such as temperature, humidity, atmospheric pressure, etc. The node is equipped with an RF antenna receiving RF signal, and then, emitting a modulated backscatter signal. The UAV has a collocated bi-static reader and acts both as a data collector and a carrier emitter. UAV employs two separate antennas for transmission and reception operating at different frequency bands to avoid self-interference. UAV follows a given and fixed two-dimensional (2D) flight path at an altitude of $H$ meters, and a finite number, $K$, of stop-over positions, $\{(x_k,y_k)\}_{k=1}^K$, over each of which it hovers for a finite duration of time. In a basic backscatter channel, there are two links: {\em Forward} (power-up) link from the UAV to a sensor node, and {\em backscatter} link from the sensor to the UAV. Most air-to-ground channel measurements and statistical models focus on large-scale statistics such as mean path-loss~\cite{8411465}. In this work, we also assume that there is no obstruction between the ground sensors and the UAV, and thus, the channels between the sensors and the UAV are assumed to be independent and identically distributed (iid) free-space path-loss channels. At stop-over location, $k$, UAV broadcasts a carrier signal $S(t)$, with power $P$ over the forward channel, i.e., $S(t)=\mathfrak{Re}\{\sqrt{P}e^{j(2\pi f t)}\}$ where $f$ is the carrier frequency. Let $B(t)$ be the received signal at sensor $i$, i.e., $B_i(t)=\mathfrak{Re}\{\frac{g_0\sqrt{P}e^{j(2\pi ft)}}{D_i(k)}+n(t)\}$, where $g_0$ is the channel gain at a reference distance $1$ m \cite{8379427} and $D_i(k)=\sqrt{H^2+(x_k-x_i)^2+(y_k-y_i)^2}$ is the distance between the sensor $i$ with $(x_i,y_i)$ as its coordinate, and UAV when it is at location $k$. Moreover, $n(t)$ is the additive white noise. The received power at sensor $i$ is $P_{B_i}^k=\frac{g_0^2P}{D_i^2(k)}$. Each sensor node reflects a portion of the receiver signal over the backscatter channel. At the UAV, the received signal from sensor $i$ is $Z_i(t)=\mathfrak{Re}\{\frac{g_0\sqrt{\zeta_i P}e^{j(2\pi f t)}}{D_i^2(k)}+n(t)\}$, where $\zeta_i$ is the backscatter reflection coefficient. The received power is $P_{Z_i}^k=\left(\frac{g_0^2\sqrt{P\zeta_i}}{D_i^2(k)}\right)^2$. In the rest of the letter, we drop the letter $t$ to avoid any confusion. Hence, the overall channel power gain between the sensor $i$ and UAV when UAV is at stop-over location $k$, is $h_i(k)=\frac{g_0^2}{D^2_i(k)}$, where $i=1,\dots,N$. \section{Over-the-Air Functional Computation} \subsection{Overview} In this work, our proposed method is suitable for a polynomial function of observations as the target nomographic function: \vspace{-0.5cm} \begin{align}\label{target} {d}^*=\sum_{i=1}^N w_id_i^{v_i}, \end{align} where $w_{(.)}$ and $v_{(.)}$, are positive constants. In conventional applications of AirComp~\cite{8371243}, the coherent combination of multiple received data in the nomographic function is ensured by precoding the individual transmissions amplified with a gain that is reciprocal of instantaneous channel gain of the respective transmitter. Due to implementation and computation limitations of backscatter devices, we assume that sensors transmit plain signals without performing any precoding. Instead, we utilize the mobility of the UAV as a form of providing channel diversity. Specifically, our proposed AirComp method has two phases. In the first phase, UAV collects reference signals from multiple stop-over locations. Note that a reference signal collected by the UAV is the sum aggregate of backscatter reflections from all sensor nodes and provides sum channel gains at the respective locations. In the second phase, UAV visits the same locations, but this time each node backscatters their measured sensor value. The UAV is tasked to combine the measurements made in the second phase by assigning a linear coefficient to each measurement based on its sum channel gain observations from the first phase. \vspace{-0.2cm} \subsection{Mobility-assisted AirComp} \subsubsection{Sampling Phase} In the first phase, UAV takes $K$ noisy samples at a number of predefined locations $\{(x_k,y_k)\}_{k=1}^K$, with a pilot signal, i.e., all backscatter sensors simultaneously transmit a unit value. Hence, at sample location $k$, UAV receives $ \sum_{i=1}^N\mathfrak{Re}\{\frac{g_0\sqrt{\zeta_i P}e^{j(2\pi f t)}}{D_i^2(k)}+n^\prime(t)\}$, from which it determines the sum channel gain at location $k$ as $\sum_{i=1}^N g_i(k)+n^\prime_k$, where $g_i(k) = \sqrt{\zeta_i P} h_i(k)$, and $n^{\prime}_k$ is a Gaussian distributed sampling noise with zero-mean and variance $\sigma_{n^{\prime}_k}^2$. \subsubsection{Computation Phase} In the second phase, UAV again collects $K$ samples from the same set of locations $\{(x_k,y_k)\}_{k=1}^K$, but this time each sensor $i$ transmits its sensor observation $d_i$, $i=1,\dots,N$. Let sensor data be generated according to a Gaussian source with $d_i\sim \mathcal{N}(\mu_{d_i},\sigma_{d_i}^2)$. After simultaneous transmissions, the received signal at the UAV is $ \sum_{i=1}^N\mathfrak{Re}\{\frac{g_0\sqrt{\zeta_i d_i P}e^{j(2\pi f t)}}{D_i^2(k)}+n(t)\}$, where the aggregated sensor data measurements is given as: \vspace{-0.1cm} \begin{align}\label{est} \Bar{d}_k=\sum_{i=1}^{N}g_i(k)d_i+n_k,\: \forall k=1,\dots,K. \end{align} Based on the aggregated data measurements, the UAV obtains an estimated function $\hat{d}$, i.e., $ \hat{d}=f(\Bar{d}_1,\Bar{d}_2,\dots,\Bar{d}_K),$ where $f$ is a mapping used to compensate for the lack of channel precoding. In this work, we consider $f$ as a linear combination of observations such that \vspace{-0.4cm} \begin{align}\label{estimated} \hat{d}=\sum_{k=1}^K\beta_k\Bar{d}_k, \end{align} where $\beta_k, k=1,\dots,K$, are non-negative constants. Note that $\beta_k$ is basically the power coefficient assigned to the backscatter nodes by the UAV at sampling round $k$. Hence, at each round, the same power coefficient is aligned to the sensors. \vspace{-0.2cm} \section{Problem Formulation and Solution} We measure the computation error of our mobility assisted AirComp method by the MSE defined as \vspace{-0.1cm} \begin{align} &\mathbf{MSE}\big(\hat{d},{d}^*\big)=\mathbf{E}\big[\big(\hat{d}-d^*\big)^2\big]\nonumber\\ &=\sum_{i=1}^N\sigma_{d_i}^2\big(\sum_{k=1}^K\beta_k\mathbf{E}[g_i(k)]\big)^2+\sigma_{d_i}^2\sum_{k=1}^K\beta_k^2\mathbf{Var}(g_i(k))\nonumber\\ &+\mu_{d_i}^2\sum_{k=1}^K\beta_k^2\mathbf{Var}(g_i(k))-2\big(w_i\mathbf{E}[d_i^{v_i+1}]\sum_{k=1}^K\beta_k\mathbf{E}[g_i(k)]\nonumber\\ &+\mu_{d_i}(\sum_{k=1}^K\beta_k\mathbf{E}[g_i(k)])(\sum_{j\neq i}^N w_j\mathbf{E}[d_j^{v_j}])\big)+w_i\mathbf{Var}(d_i^{v_i})\nonumber\\&+(\sum_{i=1}^Nw_i\mathbf{E}[d_i^{v_i}])^2+\sum_{k=1}^K\beta_k^2\sigma_{n_k}^2, \end{align} where $\mathbf{E}[.]$ and $\mathbf{Var}(.)$ are expectation and variance operators, respectively. The expectations are over the random locations of sensor nodes and their random observations. Note that since $d_{(.)}$ is a Gaussian source, for any values of $v_i$, $i=1,\dots,N$, the corresponding moments can be calculated accordingly. Hence, considering any polynomial target function, the problem formulation is the same and the power alignment can be applied; however, for each target function, the power coefficient $\beta_k$ takes a unique and different value. For instance, for the case $v_i=2$, the target function becomes the sum of weighted squared sensor observations and the MSE can be simplified such that $\mathbf{E}[d_{(.)}^2]{=}\mu_{d_{(.)}}^2{+}\sigma_{d_{(.)}}^2$, $\mathbf{E}[d_{(.)}^3]{=}\mu_{d_{(.)}}^3{+}3\mu_{d_{(.)}}\sigma_{d_{(.)}}^2$, and $\mathbf{Var}(d_{(.)}^2){=}2\sigma_{(.)}^2(\mu_{(.)}^2{+}\sigma_{(.)}^2)$. Our objective is to minimize MSE by choosing coefficients $\beta_k$ for a given UAV trajectory plan $\{(x_k,y_k)\}_{k=1}^K$. Thus, the optimization problem can be formulated as \vspace{-0.2cm} \begin{subequations} \begin{align}\label{opt1} &\operatorname*{min}_{\substack{\{ \beta_k\}^{K}_{k=1}}} \mathbf{MSE}\big(\hat{d},{d}^*\big)\\ & \text{s.t.} \sum_{k=1}^K\beta_k\leq \beta_0,\label{const2} \end{align} \end{subequations} where constraint \eqref{const2} represents the limited receiver power. \vspace{-0.3cm} \subsection{Special Case} Note that the problem \eqref{opt1}-\eqref{const2} is not amenable to a closed form solution, since additional statistical information about sensor locations is required and this is usually not available \cite{8741612}. Moreover, when the power coefficients are equally aligned to backscatter devices, i.e., $\beta_1\:{=}\:\dots\:{=}\:\beta_K\:{=}\:\beta$, the problem can be shown to be convex and an optimal solution can be calculated according to Theorem~\ref{Theo1}. \begin{thm}\label{Theo1} For $\beta_1\:{=}\:\dots\:{=}\:\beta_K\:{=}\:\beta$, the optimal solution of \eqref{opt1}-\eqref{const2} is \vspace{-0.2cm} \begin{align}\label{beta} &\beta^*=\nonumber\\&\frac{\sum_{i=1}^N\sum_{k=1}^K\mathbf{E}[g_i(k)]\big (w_i\mathbf{E}[d_i^{v_i+1}]{+}\mu_{d_i}\sum_{j\neq i}^Nw_j\mathbf{E}[d_j^{v_j}]\big)}{\sum_{i=1}^N\sigma_{d_i}^2(\sum_{k=1}^K\mathbf{E}[g_i(k)])^2{+}\big(\sigma_{d_i}^2+\mu_{d_i}^2\big)\sum_{k=1}^K\mathbf{Var}(g_i(k))}, \end{align} \vspace{-0.5cm} \end{thm} \proof See Appendix.\\ Even under this assumption, due to the involvement of statistical operations, the MSE expression is too complicated to draw insights. To resolve this issue, in the following we propose a heuristic method to resort to approximate channel power gains. \vspace{-0.6cm} \subsection{Heuristic Approach} Note that channel gains are based on free-space path-loss model. The distance between the UAV and each node lays in the interval of $H{\leq} D_{(.)}{\leq} H\sqrt{1+(\frac{2R_{cov}}{H})^2}$. At high altitudes when $H\:{>}\:4R_{cov}$, it can be shown that $H{\leq} D_{(.)}{\leq} H\sqrt{1+\epsilon^2}$, $\epsilon{<}1$. Hence, the difference between the path-loss values is less than $5$\%. Due to the relatively high altitude of the UAV compared to the girth of the area of coverage, the contributions from each sensor node in the initial sampling phase can be considered approximately the same, i.e., if $\sum_{i=1}^N g_i(k)+n^\prime_k=\alpha_k$, then the channel gain of each sensor node $i$ at location $k$ can be approximated as $g_i(k)\approx\frac{\alpha_k}{N}$, for all $i,k$. Consequently, with this approximation, one can show that \eqref{opt1}-\eqref{const2} is convex with respect to $\beta_k$, $k=1,\dots,K$, and use the first order Karush Kuhn Tucker conditions to obtain a sub-optimal solution as \vspace{-0.2cm} \begin{align} &\beta_k=\nonumber\\&\frac{\sum_{i=1}^N (w_i\mathbf{E}[d_i^{v_i+1}]{+}\mu_{d_i}\sum_{j\neq i}^N w_j \mathbf{E}[d_j^{v_j}]){-}\sum_{k^\prime\neq k}^K\beta_{k^\prime}\frac{\alpha_{k^\prime}}{N}\sum_{i=1}^N\sigma_{d_i}^2}{\frac{\alpha_k}{N}\sum_{i=1}^N\sigma_{d_i}^2+\frac{N\sigma_{n_k}^2}{\alpha_k}}. \label{beta_heur} \end{align} This implies that at sampling round $k$ in the computation phase, power coefficient $\beta_k$ is aligned to all nodes by UAV. Note that \eqref{beta_heur} has multiple solutions. Hence, we further suppose that $\sum_{k^\prime\neq k}\beta_{k^\prime}\alpha_{k^\prime}=(K-1)\beta_k\alpha_k$, which roughly means that each individual sampling phase contribution is the same, and it leads to the following unique $\beta_k$ values. \vspace{-0.17cm} \begin{align} \beta_k=\frac{\sum_{i=1}^Nw_i\mathbf{E}[d_i^{v_i+1}]+\mu_{d_i}\sum_{j\neq i}^N w_j \mathbf{E}[d_j^{v_j}]}{\frac{\alpha_k}{N}\sum_{i=1}^N\sigma_{d_i}^2+\frac{N\sigma_{n_k}^2}{\alpha_k}+(K-1)\frac{\alpha_k}{N}\sum_{i=1}^N\sigma_{d_i}^2}. \end{align} Moreover, if $\beta_1=\dots=\beta_K=\beta$, then we have \vspace{-0.17cm} \begin{align} \beta =\frac{\sum_{i=1}^Nw_i\mathbf{E}[d_i^{v_i+1}]+\mu_{d_i}\sum_{j\neq i}^N w_j \mathbf{E}[d_j^{v_j}]}{\frac{1}{N}\sum_{k=1}^K\alpha_k\sum_{i=1}^N\sigma_{d_i}^2+\frac{N\sum_{k=1}^K\sigma_{n_k}^2}{\sum_{k=1}^K\alpha_k}}. \end{align} \vspace{-0.5cm} \section{Numerical Results} In this section, we evaluate the MSE performance with respect to the number of samples $K$ in which the UAV takes, considering three different target functions: 1) The sum of observations, i.e., $w_i\:{=}\:1,\:v_i\:{=}\:1$; 2) The sum of equally-weighted squared observations, i.e., $w_i\:{=}\:1,\:v_i\:{=}\:2$; 3) The sum of unequally-weighted cubed observations, i.e., $w_i\in\{1,2,\dots,N\}$, $v_i\:{=}\:3$. Moreover, we also examine the MSE performance with respect to the number of backscatter sensors $N$ served by the UAV. We assume that UAV moves within the field of interest on a fixed and predefined 2D path along the diameter of the field. The network parameters considered in these experiments are $P\:{=}\:30$ dBm, $\sigma_{n}^2\:{=}\:-70$ dBm, $H\:{=}\:50$ m, $R_{cov}\:{=}\:10$ m, $K\:{=}\:5$, $N\:{=}\:20$, and $\zeta_{(.)}\:{=}\:0.99$. Moreover, since backscatter systems mainly operate at $f\:{=}\:868$ MHz, we consider $g_0\:{=}\:0.0275$ ($g_0\:{=}\:\frac{c}{4\pi f}$). In Fig.~\ref{fig1}, the MSE performance is plotted with respect to $N$. For comparison purposes, we use a mapping function that takes average of all sensor measurements without weighing them with respect to their locations. Fig.~\ref{fig1} illustrates that when the linear mapping coefficients $\beta_k$, $k=1,\dots,K,$ are not chosen carefully, i.e., $\beta_1\:{=}\:\dots\:{=}\:\beta_K$, due to loss of power coefficient alignment, there is around $10$ and $1$ dB reduction in the MSE value compared to the benchmark case and linear weighted mapping case, respectively. Moreover, we observe that increasing the number of sampling locations do not always improve the MSE for target functions when it is increased beyond a certain point. It is also observed that the MSE decreases when higher order polynomial functions are considered as target function due to the degraded performance of proposed linear mapping function in compensating the channel. For example, when the sum of unequally-weighted cubed observation is considered, there is up to $5$ dB reduction in MSE compared to the case that the sum of unity-weighted observations is considered.\\ \indent In Fig.~\ref{fig2}, we examine the performance of the MSE with respect to the number of backscatter sensors $K$ considering three different target functions as aforementioned. It can be seen that as the number of backscatter sensors increases, there is always more than $5$ dB difference in MSE performance over the benchmark case. Moreover, the rate of increase in MSE is almost the same for both of cases where linear mapping coefficients are considered to be equal or chosen individually. \vspace{-0.5cm} \section{Conclusion} In this letter, we introduced the idea of using mobility as a diversity mechanism to improve the performance of AirComp systems when channel gains cannot be measured. Our approach is especially suitable for large-scale backscatter sensor networks served by a UAV flying over a predetermined path. Our numerical results demonstrate that our proposed mobility assisted AirComp improves over conventional AirComp significantly in terms of target MSE. As a future work, we will consider joint optimization of UAV location, backscattering reflection coefficient selection, and linear sampling coefficient selection policies. Another direction is to aim to find an optimal channel-inversion function $f(\cdot)$ such that MSE is minimized. \vspace{-0.3cm}
\section{Introduction} Secure distributed storage schemes, e.g.,~\cite{garay2000secure,rawat2016centralized,bitar2018staircase,yu2018lagrange,huang2016communication}, often rely on the idea of secret sharing as introduced in~\cite{shamir1979share,blakley1979safeguarding}. Hence, there is a fundamental lower bound on the required storage space necessary to securely store information in a distributed manner. Specifically, in any secret sharing scheme, the total amount of information that needs to be stored must at least be equal to the entropy of the secret times the number of participants, see e.g., \cite{beimel2011secret}, and it is thus impossible to reduce the storage space without any changes to the model assumptions To this end, we propose to determine the optimal cost reduction, in terms of storage space, that can be obtained in exchange of tolerating a \emph{controlled amount} of reduced privacy. This idea is closely related to non-perfect secret sharing \cite{farras2016recent,yoshida2018optimal} with a non-linear access function that generalize traditional ramp secret sharing \cite{yamamoto1986secret,yoshida2007secure,blakley1984security}. Unfortunately, for large secrets, as required for data storage, no low-complexity coding scheme is known to implement non-perfect secret sharing. Note that in the absence of a privacy constraint, for the related problems of perfect secret sharing and secure distributed storage, XOR-based coding schemes have been proposed in~\cite{wang2014efficient} and \cite{huang2016secure,huang2017secure}, respectively. We aim to fill this void in this paper and focus on a setting where a file $F$ needs to be stored at $T$ servers. The data is intended to be recoverable from these $T$ servers, and needs to remain private from any $T-1$ colluding servers. Here, privacy is quantified in terms of mutual information between the data and all the information available at the $T-1$ colluding servers. To be concrete, consider the example of three servers, i.e., $T=3$, where the mutual information between the data of any two servers and the file $F$ must not exceed $L \triangleq \frac{1}{4}H(F)$. Assuming that $F$ is a sequence of uniformly distributed bits, we split $F$ in four parts $(F_1,F_2,F_3,F_4)$ of equal length (for simplicity we assume here that $|F|$ is a multiple of four), and we store in the three servers the shares \begin{align*} M_1 & \triangleq (F_1 \lVert K_1 \lVert F_2 \oplus K_2 \oplus K_4 ),\\ M_2 & \triangleq (K_2 \lVert K_3 \lVert F_3 \oplus K_1 \oplus K_5 ), \\ M_3 & \triangleq (K_4 \lVert K_5 \lVert F_4 \oplus K_3), \end{align*} where $(K_1,K_2,K_3,K_4,K_5)$ are five sequences of uniformly distributed bits with size $|F|/4$, $\oplus$ denotes the XOR operation, and $\Vert$ denotes concatenation. We remark that all the four parts $(F_1,F_2,F_3,F_4)$ are either stored in clear or encrypted through a one-time pad. By inspection, one easily sees in this example that $F$ can be recovered from $(M_1,M_2,M_3)$ and any two shares leak at most $\frac{1}{4}H(F)$ bits about $F$. As it will be shown in the following, the size of the shares is optimal as well as the amount of local randomness, i.e., the length of $(K_1,K_2,K_3,K_4,K_5)$. Our main contribution is the design of a low-complexity coding scheme for this problem with arbitrary parameters $L$ and $T$ that solely relies on XOR operations and that is asymptotically (with file size) optimal in terms of data storage and the required amount of local randomness at the encoder. The remainder of the paper is organized as follows. We formalize the problem in Section \ref{secs} and state our main results in Section \ref{secres}. Our coding scheme is presented in Section \ref{sec:CS}. We present the proofs of our results in the appendix. Finally, we provide concluding remarks in Section \ref{secconcl}. \section{Problem statement} \label{secs} Notation: For $a,b \in \mathbb{R}$, define $\llbracket a,b \rrbracket \triangleq [\lfloor a \rfloor , \lceil b \rceil ] \cap \mathbb{N}$ and $[a]^+\triangleq\max(0,a)$. Let $\oplus$ denote the XOR operator.\\ Consider $T \geq 2$ servers and define $\mathcal{T} \triangleq \llbracket 1,T\rrbracket$. Consider a file $F$ which is a sequence of $|F|$ bits uniformly distributed over $\{0,1\}^{|F|}$. \begin{defn} A $(\lambda,\rho)$ coding scheme consists of \begin{itemize} \item A stochastic encoder $e : \{ 0,1\}^{|F|} \times \{ 0,1\}^{\rho} \to \{ 0,1\}^{\lambda T}, (F,R) \mapsto (M_t)_{t \in \mathcal{T}}$, which takes as input the file $F$ to store and a sequence $R$ of $\rho \in \mathbb{N}$ bits uniformly distributed over $\{ 0,1\}^{\rho}$ and independent of $F$, and outputs $T$ sequences (referred to as shares in the following) $(M_t)_{t \in \mathcal{T}}$ of length $\lambda \in \mathbb{N}$, where $M_t$ is stored in Server $t \in \mathcal{T}$. \item A decoder $d : \{ 0,1\}^{\lambda T} \to \{ 0,1\}^{|F|}, (M_t)_{t \in \mathcal{T}} \mapsto \widehat{F}$, which takes as input all the $T$ sequences stored at the servers, and outputs an estimate $\widehat{F}$ of the file $F$. \end{itemize} \end{defn} \begin{defn} For $\alpha \in [0,1]$, a $(\lambda,\rho)$ coding scheme is said to be $\alpha$-private if \begin{align} H(F|M_{\mathcal{T}}) & = 0, \text{ (Decodability)} \label{eqreq1} \\ \lim_{|F| \to \infty } \frac{I(F;M_{\mathcal{S}})}{H(F)} &\leq \alpha, \forall \mathcal{S} \subsetneq \mathcal{T}, \text{ (Privacy)} \label{eqreq2} \end{align} where we have used the notation $M_{\mathcal{S}} \triangleq (M_t)_{t \in \mathcal{S}}$, $\forall \mathcal{S} \subsetneq \mathcal{T}$. \end{defn} The objective is to design $\alpha$-private $(\lambda,\rho)$ coding schemes with minimal storage size requirement, i.e., minimal $\lambda$, and minimal amount of local randomness requirement at the encoder, i.e., minimal $\rho$. In the following, one can assume \begin{align} \label{assumption1} \alpha < 1 - 1/T. \end{align} Indeed, if $\alpha \geq 1- 1/T$, i.e., $\alpha \geq \frac{T-1}{T}$, then the privacy constraint is trivially satisfied if one splits the file in $T$ parts of size $H(F)/T$ and store one part in each server. \section{Main results} \label{secres} \begin{thm}[Minimal storage size requirement] \label{thconverse} For any $\alpha$-private $(\lambda,\rho)$ coding scheme, we have \begin{align*} \lim_{|F| \to \infty} \frac{\lambda}{H(F)} \geq (1-\alpha). \end{align*} \end{thm} \begin{thm}[Minimal local randomness requirement] \label{thconverse2} For any $\alpha$-private $(\lambda,\rho)$ coding scheme, we have \begin{align*} \lim_{|F| \to \infty} \frac{\rho}{H(F)} \geq [T(1-\alpha) -1]^+. \end{align*} \end{thm} \begin{thm}[Achievability] \label{th_achiev} Assume that $\alpha = 0$ or $\alpha = \frac{l}{k} $, for some $k,l\in\mathbb{N}^*$ with $k$ and $l$ coprime, and $\alpha \in [0,1-1/T[$. By density of $\mathbb{Q}$ in $\mathbb{R}$, such an $\alpha$ can be chosen arbitrarily close to any point in $[0,1]$. The coding scheme in Section \ref{sec:CS} is an $\alpha$-private $(\lambda,\rho)$ coding scheme with \begin{align} \lim_{|F| \to \infty} \frac{\lambda}{H(F)} &= (1-\alpha), \label{eqL}\\ \lim_{|F| \to \infty} \frac{\rho}{H(F)}& = [T(1-\alpha) -1]^+. \label{eqR} \end{align} \end{thm} \section{Coding scheme} \label{sec:CS} Consider $\alpha \in [0,1-1/T[$ such that $\alpha =0$ or $\alpha = \frac{l}{k}$, for some $k,l\in\mathbb{N}^*$ with $k$ and $l$ coprime. \subsection{Preliminaries} \begin{itemize} \item There exists $q \in \mathbb{N}$, $r \in \llbracket 0,T-2 \rrbracket$ such that \begin{align} \label{div1} l = q(T-1) + r, \end{align and one can assume \begin{align} \label{assumption2} qT+r < k. \end{align} Otherwise, if $qT+r = k$ (one has a similar argument if $qT+r > k$), then one can split the file $F$ in $k$ parts of equal size and store $q+1$ parts of $F$ in the first $r$ servers and $q$ parts of $F$ in the remaining servers. The privacy constraint is satisfied by \eqref{div1} because any $T-1$ servers have at most $q(T-1)+r=l$ parts of $F$, and \eqref{eqreq2} holds. \item Note that $T(k-l)-k =(T-1)k -lT> 0$ by \eqref{assumption1}, and there exists $u \in \mathbb{N}$, $v \in \llbracket 0,T-1 \rrbracket$ such that \begin{align} \label{div2} T(k-l)-k = u T + v. \end{align} \end{itemize} We emphasize that $l$, $k$, and $T$ are the only parameters of the coding scheme; $q$, $r$, $u$, and $v$ are obtained as sole functions of $l$, $k$, and~$T$. \subsection{Coding Scheme} \noindent{}\textbf{Step 1}. Divide the file in $k$ parts $(F_i)_{i \in \llbracket 1 , k \rrbracket}$ (if necessary, add $\beta$ zeros to $F$, where $\beta$ is the smallest integer in $\llbracket 1 , k-1 \rrbracket$ such that $(H(F)+ \beta)/k \in \mathbb{N}$. For convenience, we write $F_{i:j} \triangleq (F_{i'})_{i' \in \llbracket i , j \rrbracket}$ for $i,j \in \llbracket 1 , k\rrbracket$.\\ \textbf{Step 2}. Generate $N_{\textup{keys}} \triangleq T(k-l)-k$ ($>0$ by~\eqref{div2}) keys $(K_i)_{i \in \llbracket 1, N_{\textup{keys}} \rrbracket}$ each uniformly distributed over $\{0,1\}^{(H(F)+ \beta)/k}$ and independent of all other random variables. For convenience, we write $K_{i:j} \triangleq (K_{i'})_{i' \in \llbracket i , j \rrbracket}$ for $i,j \in \llbracket 1 , N_{\textup{keys}}\rrbracket$. \\ \textbf{Step 3}. We now describe how to design the shares $M_{\mathcal{T}}$. Each share $M_t$, stored in Server $t\in \mathcal{T}$, is a vector of $(k-l)$ sequences (labeled from $1$ to $k-l$) of size $(H(F)+ \beta)/k$. For convenience, for $t\in \mathcal{T}$, and $i,j \in \llbracket 1 , k-l\rrbracket$ such that $i\leq j$, we write $M_t[i:j]$ to designate the sequences of $M_t$ labeled from $i$ to $j$, and $M_t[i]$ to designate the sequence of $M_t$ labeled by $i$. For $t \in \mathcal{T}$, the $k-l$ components of the vector $M_t$ are of one of the following types. \begin{itemize} \item An unencrypted part of $F$, i.e., an element of $\{F_i :i \in \llbracket 1 , k \rrbracket \}$. \item A key, i.e., an element of $\{ K_i : i \in \llbracket 1, N_{\textup{keys}} \rrbracket \}$; \item An encrypted part of $F$, obtained by XORing a part of $F$ with one or several keys. \end{itemize} To precisely describe how the shares $M_{\mathcal{T}}$ are chosen we distinguish two cases. \textbf{Case 1}. Assume that $r+v < T$. The unencrypted parts of $F$ and keys are assigned according to Algorithms \ref{alg1}, \ref{alg2}, respectively. The encrypted parts of $F$ are defined and assigned according to Algorithm \ref{alg3}. Note that we have the following. \begin{itemize} \item For $t \in \llbracket 1, r \rrbracket$, $M_t$ consists of $k-l$ sequences: $q+1$ unencrypted parts of $F$, $u$ keys, and \begin{align} \label{eqx} x \triangleq k-l -q -1-u \end{align} encrypted parts of $F$. \item For $t \in \llbracket r+1, T-v \rrbracket$, $M_t$ consists of $k-l$ sequences: $q$ unencrypted parts of $F$, $u$ keys, and $x+1$ encrypted parts of $F$. \item For $t \in \llbracket T-v +1, T \rrbracket$, $M_t$ consists of $k-l$ sequences: $q$ unencrypted parts of $F$, $u+1$ keys, and $x$ encrypted parts of $F$. \end{itemize} \textbf{Case 2}. Assume that $r+v \geq T$. The unencrypted parts of $F$ and keys are assigned according to Algorithms \ref{alg1}, \ref{alg2b}, respectively. The encrypted parts of $F$ are defined and assigned according to Algorithm \ref{alg3b}. Note that we have the following. \begin{itemize} \item For $t \in \llbracket 1, T-v \rrbracket$, $M_t$ consists of $k-l$ sequences: $q+1$ unencrypted parts of $F$, $u$ keys, and $x$ encrypted parts of~$F$. \item For $t \in \llbracket T-v+1, r \rrbracket$, $M_t$ consists of $k-l$ sequences: $q+1$ unencrypted parts of $F$, $u+1$ keys, and $x-1$ encrypted parts of $F$. \item For $t \in \llbracket r+1,T \rrbracket$, $M_t$ consists of $k-l$ sequences: $q$ unencrypted parts of $F$, $u+1$ keys, and $x$ encrypted parts of $F$. \end{itemize} \begin{rem} In both cases, the first $N_{\textup{Plain}} \triangleq qT + r$ parts $(F_i)_{i \in \llbracket 1 , qT + r \rrbracket}$ are stored unencrypted in the servers, and the $N_{\textup{Encrypted}} \triangleq k - r - Tq$ ($>0$ by \eqref{assumption2}) remaining parts $(F_i)_{i \in \llbracket qT + r + 1, k \rrbracket}$ are first encrypted using the keys $(K_i)_{i \in \llbracket 1, T(k-l)-k \rrbracket}$ before being stored in the servers. \end{rem} \begin{rem} In Case 1, we have $x\geq 0$, otherwise $k-r-Tq =N_{\textup{Encrypted}} = (r+v)x + (T-r-v)(x+1)<0$, which contradicts~\eqref{assumption2}. In Case 2, we also have have $x\geq 0$, otherwise $k-r-Tq =N_{\textup{Encrypted}} = (T-v+T-r)x + (r -T +v)(x-1)<0$, which again contradicts~\eqref{assumption2}. \end{rem} \begin{algorithm} \caption{Assignment of unencrypted parts} \label{alg1} \begin{algorithmic}[1] \REQUIRE File $F$ \FOR{$t \in \mathcal{T}$} \STATE $M_t [1:q] \triangleq F_{(t-1)q+1:tq}$ \IF{$t \leq r$} \STATE $M_t [q+1] \triangleq F_{Tq+t}$ \ENDIF \ENDFOR \end{algorithmic} \end{algorithm} \begin{algorithm} \caption{Assignment of keys when $r+v < T$} \label{alg2} \begin{algorithmic}[1] \ENSURE Keys $(K_i)_{i \in \llbracket 1, N_{\textup{keys}} \rrbracket}$ \FOR{$t \in \mathcal{T}$} \IF{$t \leq r$} \STATE $M_t [q+2:q+1+u] \triangleq K_{u(t-1)+1:ut}$ \ELSIF{$r < t \leq T - v$} \STATE $M_t [q+1:q+u] \triangleq K_{u(t-1)+1:ut}$ \ELSIF{$ t > T - v $} \STATE $M_t [q+1:q+u] \triangleq K_{u(t-1)+1:ut}$ \STATE $M_t [q+u+1] \triangleq K_{Tu + t - (T-v)}$ \ENDIF \STATE Define\\$\mathcal{I}_t \triangleq \{ j \in \llbracket 1,N_{\textup{keys}} \rrbracket : \exists i \in \llbracket 1, l-k \rrbracket, M_t[i]=K_j \}$ \ENDFOR \end{algorithmic} \end{algorithm} \begin{algorithm} \caption{Assignment of keys when $r+v \geq T$} \label{alg2b} \begin{algorithmic}[1] \ENSURE Keys $(K_i)_{i \in \llbracket 1, N_{\textup{keys}} \rrbracket}$ \FOR{$t \in \mathcal{T}$} \IF{$t \leq T-v$} \STATE $M_t [q+2:q+1+u] \triangleq K_{u(t-1)+1:ut}$ \ELSIF{$T-v < t \leq r$} \STATE $M_t [q+2:q+u+2]$\\ $\triangleq K_{u(T-v)+(u+1)(t- T +v -1)+1:u(T-v)+(u+1)(t- T +v)}$ \ELSIF{$ t > r $} \STATE $M_t [q+1:q+u+1]$ \\ $\triangleq K_{u(T-v)+ (u+1)(t-T+v-1) + 1:u(T-v)+ (u+1)(t-T+v)}$ \ENDIF \STATE Define\\$\mathcal{I}_t \triangleq \{ j \in \llbracket 1,N_{\textup{keys}} \rrbracket : \exists i \in \llbracket 1, l-k \rrbracket, M_t[i]=K_j \}$ \ENDFOR \end{algorithmic} \end{algorithm} \begin{algorithm} \caption{Creation and assignment of encrypted parts when $r+v < T$} \label{alg3} \begin{algorithmic}[1] \ENSURE File $F$ and keys $(K_i)_{i \in \llbracket 1, N_{\textup{keys}} \rrbracket}$ \FOR{$i \in \llbracket 1, x +1 \rrbracket$} \FOR{$t \in \mathcal{T}$} \IF{$t \leq r$} \STATE $j \triangleq N_{\textup{Plain}} + (t-1)x+ i$ \STATE $z \triangleq \begin{cases} q+u+1+i & \text{if }i \neq x+1 \\ \emptyset & \text{if }i = x+1 \end{cases}$ \ELSIF{$r < t \leq T - v$} \STATE $j\triangleq N_{\textup{Plain}} + rx + (t-r-1) (x+1)+ i$ \STATE $z\triangleq q+u+i$ \ELSIF{$ t > T - v $} \STATE $j\triangleq N_{\textup{Plain}} + rx + (x+1)(T-v-r) + (t -T+v-1)x+ i$ \STATE $z\triangleq \begin{cases} q+u+1+i & \text{if }i \neq x+1 \\ \emptyset & \text{if }i = x+1 \end{cases}$ \ENDIF \STATE For~$t'\in \mathcal{T} \backslash \{t\}$, choose the key $K_{a}$ with the smallest $a \in \mathcal{I}_{t'}$, which has not previously been chosen in this algorithm, among the keys stored in Server $t'$, and define $\kappa_{t'} \triangleq K_{a}$. If this is not possible, then define $\kappa_{t'} = \mathbf{0}$. \STATE If $z \neq \emptyset$, then define $M_t[z] \triangleq F_{j} \oplus \bigoplus_{t'\in \mathcal{T} \backslash \{t\}} \kappa_{t'}$ \ENDFOR \ENDFOR \end{algorithmic} \end{algorithm} \begin{algorithm} \caption{Creation and assignment of encrypted parts when $r+v \geq T$} \label{alg3b} \begin{algorithmic}[1] \REQUIRE File $F$ \FOR{$i \in \llbracket 1, x \rrbracket$} \FOR{$t \in \mathcal{T}$} \IF{$t \leq T-v$} \STATE $j\triangleq N_{\textup{Plain}} + (t-1)x+ i$ \STATE $z \triangleq q+u+1+i$ \ELSIF{$T-v <t \leq r$} \STATE $j\triangleq N_{\textup{Plain}} + (T-v)x + (t-T+v-1) (x-1)+ i$ \STATE $z\triangleq \begin{cases}q+u+2+i & \text{if }i \neq x \\ \emptyset & \text{if }i = x \end{cases}$ \ELSIF{$ t > r$} \STATE $j\triangleq N_{\textup{Plain}} + (T-v)x + (r -T - v)(x-1) + (t -r-1)x+ i$ \STATE $z\triangleq q+u+1+i$ \ENDIF \IF{$z \neq \emptyset$} \STATE For~$t'\in \mathcal{T} \backslash \{t\}$, choose the key $K_{a}$ with the smallest $a \in \mathcal{I}_{t'}$, which has not previously been chosen in this algorithm, and define $\kappa_{t'} \triangleq K_{a}$. If this is not possible, then define $\kappa_{t'} = \mathbf{0}$. \STATE Define $M_t[z] \triangleq F_{j} \oplus \bigoplus_{t'\in \mathcal{T} \backslash \{t\}} \kappa_{t'}$ \ENDIF \ENDFOR \ENDFOR \end{algorithmic} \end{algorithm} \subsection{Examples} \begin{ex} [$T=3$, $\alpha= \frac{3}{10}$] Write $F=(F_i)_{i \in \llbracket 1 , 10 \rrbracket}$. We have $(l,k) \triangleq (3,10)$. By \eqref{div1}, we have $(q,r) = (1,1)$ and by~\eqref{div2}, we have $(u,v) = (3,2)$. We have $r+v =T$, so we are in Case 2. Moreover, $N_{\textup{Keys}} = 11$, $N_{\textup{Plain}} = 4$, $N_{\textup{Encrypted}} = 6$, $x=2$. After running Algorithms \ref{alg1} and \ref{alg2b}, we have \begin{align*} M_1 &\triangleq (F_1 \lVert F_4 \lVert K_1 \lVert K_2 \lVert K_3 \lVert M_1[6] \lVert M_1[7] ),\\ M_2 &\triangleq (F_2 \lVert K_4 \lVert K_5 \lVert K_6 \lVert K_7 \lVert M_2[6] \lVert M_2[7] ),\\ M_3 &\triangleq (F_3 \lVert K_8 \lVert K_9 \lVert K_{10} \lVert K_{11}\lVert M_3[6] \lVert M_3[7]). \end{align*} After running Algorithm \ref{alg3b}, we obtain the encrypted parts of the file $F$ as \begin{align*} M_1[6] &\triangleq F_5 \oplus K_4 \oplus K_8, \\ M_1[7] &\triangleq F_6 \oplus K_6 \oplus K_{10} ,\\ M_2[6] &\triangleq F_7 \oplus K_1 \oplus K_9, \\ M_2[7] &\triangleq F_8 \oplus K_3 \oplus K_{11},\\ M_3[6] &\triangleq F_9 \oplus K_2 \oplus K_5,\\ M_3[7] &\triangleq F_{10} \oplus K_7 . \end{align*} \end{ex} \begin{ex} [$T=5$, $\alpha = \frac{7}{11}$] We have $(l,k) \triangleq (7,11)$. By \eqref{div1}, we have $(q,r) = (1,3)$ and by \eqref{div2}, we have $(u,v) = (1,4)$. We have $r+v > T$, so we are in Case 2. Moreover, $N_{\textup{Keys}} = 9$, $N_{\textup{Plain}} = 8$, $N_{\textup{Encrypted}} = 3$, $x=1$. After running Algorithms \ref{alg1} and \ref{alg2b} we have \begin{align*} M_1 & \triangleq (F_1 \lVert F_6 \lVert K_1 \lVert M_1[4] ),\\ M_2 & \triangleq (F_2 \lVert F_7 \lVert K_{2} \lVert K_{3} ), \\ M_3 & \triangleq (F_3 \lVert F_8 \lVert K_4 \lVert K_{5}),\\ M_4 & \triangleq (F_4 \lVert K_6 \lVert K_{7} \lVert M_4[4]), \\ M_5 & \triangleq (F_5 \lVert K_8 \lVert K_9 \lVert M_5[4] ). \end{align*} After running Algorithm \ref{alg3b} the encrypted parts of $F$ are \begin{align*} M_1[4] &\triangleq F_{9} \oplus K_2 \oplus K_4 \oplus K_6 \oplus K_8, \\ M_4[4] &\triangleq F_{10}\oplus K_1 \oplus K_3 \oplus K_{5} \oplus K_{9} ,\\ M_5[4] &\triangleq F_{11} \oplus K_{7}. \end{align*} \end{ex} \begin{ex} [$T=3$, $\alpha=\frac{5}{17}$] We have $(l,k) \triangleq (5,17)$. By \eqref{div1}, we have $(q,r) = (2,1)$ and by \eqref{div2}, we have $(u,v) = (6,1)$. We have $r+v < T$, so we are in Case~1. Moreover, $N_{\textup{Keys}} = 19$, $N_{\textup{Plain}} = 7$, $N_{\textup{Encrypted}} = 10$, $x=3$. After running Algorithms~\ref{alg1} and \ref{alg2}, we have \begin{align*} M_1 \triangleq &(F_1 \lVert F_2 \lVert F_7 \lVert K_1 \lVert K_2 \lVert K_3 \lVert K_4 \lVert K_5 \lVert K_6 \\ & \phantom{-----------}\lVert M_1[10] \lVert M_1[11] \lVert M_1[12] ),\\ M_2 \triangleq & (F_3 \lVert F_4 \lVert K_7 \lVert K_8 \lVert K_9 \lVert K_{10} \lVert K_{11} \lVert K_{12} \\ &\phantom{------lll-}\lVert M_2[9] \lVert M_2[10] \lVert M_2[11] \lVert M_2[12] ),\\ M_3 \triangleq &(F_5 \lVert F_6 \lVert K_{13} \lVert K_{14} \lVert K_{15} \lVert K_{16} \lVert K_{17} \lVert K_{18} \lVert K_{19} \\ & \phantom{-----------}\lVert M_3[10] \lVert M_3[11] \lVert M_3[12]). \end{align*} After running Algorithm \ref{alg3}, the encrypted parts of $F$ are obtained as follows: \begin{align*} M_1[10] &\triangleq F_8 \oplus K_7 \oplus K_{13},\\ M_1[11] &\triangleq F_9 \oplus K_9 \oplus K_{15},\\ M_1[12] &\triangleq F_{10} \oplus K_{11} \oplus K_{ 17}, \\ M_2[9] &\triangleq F_{11} \oplus K_1 \oplus K_{14}, \\ M_2[10] &\triangleq F_{12} \oplus K_3 \oplus K_{16}, \\ M_2[11] &\triangleq F_{13} \oplus K_{5} \oplus K_{18}, \\ M_2[12] &\triangleq F_{14} \oplus K_{19}, \\ M_3[10] &\triangleq F_{15} \oplus K_2 \oplus K_8, \\ M_3[11] &\triangleq F_{16} \oplus K_4 \oplus K_{10}, \\ M_3[12] &\triangleq F_{17} \oplus K_6 \oplus K_{12}. \end{align*} \end{ex} \vspace{2ex} \section{Concluding remarks} \label{secconcl} We have studied the problem of storing a file in $T$ servers such that the privacy leakage generated by $T-1$ colluding servers with respect to the content of the file is bounded. The main contribution of this paper is a coding scheme for this problem that (i) achieves the asymptotically (with the file size) optimal storage space at the servers, (ii) uses the optimal amount of local randomness at the encoder, (iii) solely relies on XOR operations and is thus suited to handle large amount of data with low-complexity. Generalization of our XOR-based coding scheme to a threshold access structure, i.e., when decodability in \eqref{eqreq1} and the privacy constraint in \eqref{eqreq2} are replaced by \begin{align*} H(F|M_{\mathcal{A}}) & = 0, \forall \mathcal{A} \subset \mathcal{T} \text{ s.t. } |\mathcal{A}|\geq t, \\ \lim_{|F| \to \infty} \frac{I(F;M_{\mathcal{U}})}{H(F)} &\leq \alpha, \forall \mathcal{U} \subset \mathcal{T} \text{ s.t. } |\mathcal{U}| \leq t-1 \end{align*} for some $t \in \llbracket 1, T-1 \rrbracket$, is under investigation. \appendices \section{Proof of Theorem \ref{thconverse}} \noindent{}Let $\mathcal{S} \subsetneq \mathcal{T}$. For any $\alpha$-private $(\lambda,\rho)$ coding scheme, we have \begin{align*} \lambda &\geq H(M_t) \displaybreak[0]\\ & \geq I(F;M_t|M_{\mathcal{T} \backslash \{ t\}}) \displaybreak[0]\\ & = H(F|M_{\mathcal{T} \backslash \{ t\}}) - H(F|M_{\mathcal{T}}) \\ & \stackrel{(a)}{=} H(F|M_{\mathcal{T} \backslash \{ t\}}) \\ & = H(F) - I(F;M_{\mathcal{T} \backslash \{ t\}}) \\ & \stackrel{(b)}{\geq}H(F) - H(F)(\alpha + o(1)) \\ & = (1-\alpha)H(F) + o(H(F)), \end{align*} where $(a)$ holds by \eqref{eqreq1}, $(b)$ holds by \eqref{eqreq2}. \section{Proof of Theorem \ref{thconverse2}} For any $\alpha$-private $(\lambda,\rho)$ coding scheme, we have \begin{align*} \rho + H(F) & \stackrel{(a)}{=} H(R) + H(F)\\ & \stackrel{(b)}{=} H(RF) \\ &\stackrel{(c)}{\geq} H(M_{\mathcal{T}}) \\ & \stackrel{(d)}{=} \sum_{t\in\mathcal{T}} H(M_t | M_{1:t-1}) \\ & \stackrel{(e)}{\geq} \sum_{t\in\mathcal{T}} H(M_t | M_{\mathcal{T}\backslash \{ t\}}) \\ & \geq \sum_{t\in\mathcal{T}} I(M_t;F | M_{\mathcal{T}\backslash \{ t\}}) \\ & \stackrel{(f)}{\geq} \sum_{t\in\mathcal{T}} [(1-\alpha)H(F) + o(H(F))] \\ & = T (1-\alpha)H(F) + o(H(F)), \end{align*} where $(a)$ holds by uniformity of $R$, $(b)$ holds by independence between $F$ and $R$, $(c)$ holds because $M_{\mathcal{T}}$is a deterministic function of $(R,F)$, $(d)$ holds by the chain rule, $(e)$ holds because conditioning reduces entropy, $(f)$ holds by the proof of Theorem \ref{thconverse}. \section{Proof of Theorem \ref{th_achiev}} \label{seca} We will use the following definition in our analysis of the coding scheme of Section \ref{sec:CS}. \begin{defn} Consider an encrypted part $E_t$ of $F$ stored in Server $t \in\mathcal{T}$ as in Line 14 of Algorithm \ref{alg3}, or Line 15 of Algorithm \ref{alg3b}. One can write $E_t$ as $ {E}_t = F_{j} \oplus \bigoplus_{t'\in \mathcal{T} \backslash \{t\}} \kappa_{t'}$, where $j\in \llbracket 1, k \rrbracket$ and for $t'\in \mathcal{T} \backslash \{t\}$, $\kappa_{t'} \in \{K_i : i \in \mathcal{I}_{t'}\} \cup \{ \mathbf{0}\}$. The encrypted part $E_t$ is said to be protected by a key of Server $t' \in \mathcal{T}$, if there exists $i \in \mathcal{I}_{t'}$ such that $\kappa_{t'} = K_i$, i.e., if $\kappa_{t'} \neq \mathbf{0}$. \end{defn} By construction, it is straightforward to verify that the storage size in \eqref{eqL} and the required amount of local randomness at the encoder in~\eqref{eqR} are satisfied. Next, we prove decodability~\eqref{eqreq1} and privacy \eqref{eqreq2}. \emph{Decodability}: \eqref{eqreq1} holds because all the parts $(F_i)_{i \in \llbracket 1 , k \rrbracket}$ of $F$ are stored in $M_{\mathcal{T}}$: $N_{\textup{Plain}}$ parts are unencrypted and the $N_{\textup{Encrypted}}$ encrypted parts can be decrypted from modulo-2 addition with keys that are all stored in $M_{\mathcal{T}}$. \emph{Privacy}: It is sufficient to prove that the privacy constraint in \eqref{eqreq2} holds for all the subsets of $\mathcal{T}$ with size $T-1$, since $I(F;M_{\mathcal{S}'}) \leq I(F;M_{\mathcal{S}})$ if $\mathcal{S}' \subseteq \mathcal{S} \subseteq \mathcal{T}$. We will thus prove that \eqref{eqreq2} holds for the sets $\mathcal{S}_t \triangleq \mathcal{T} \backslash \{ t\}$, $t\in\mathcal{T}$. We first define $K_{\mathcal{S}_t}$, $F_{\mathcal{S}_t}$, and $E_{\mathcal{S}_t}$ as all the keys, unencrypted parts of $F$, and encrypted parts of $F$, respectively, stored in the servers whose indices are in $\mathcal{S}_t$. We next consider two cases. \subsection{Case 1. $r+v < T$} Remark that \begin{align} &(r-1)x + (T-v-r)(x+1) + vx \nonumber\\ \nonumber & = (T-1)x +T-v-r \\ \nonumber & \stackrel{(a)}{=} (T-1)(k-l-q-1-u) + T-v-r \\ & \stackrel{(b)}{=} 1+u, \label{eqdif} \end{align} where $(a)$ holds by \eqref{eqx}, $(b)$ holds by \eqref{div1} and \eqref{div2}. We next consider three cases depending on the value of $t \in \mathcal{T}$. \begin{itemize} \item Assume $t \leq r$. We have \begin{align} &I(M_{\mathcal{S}_t}; F) \nonumber \\ & = I(K_{\mathcal{S}_t}F_{\mathcal{S}_t}E_{\mathcal{S}_t}; F) \nonumber \\ \nonumber & \stackrel{(a)}{=} I(K_{\mathcal{S}_t}F_{\mathcal{S}_t} F_j (F_{s(i)} \oplus K_i )_{i \in \mathcal{I}_t}; F) \\ \nonumber & = I(K_{\mathcal{S}_t}F_{\mathcal{S}_t} F_j; F) + I((F_{s(i)} \oplus K_i )_{i \in \mathcal{I}_t}; F|K_{\mathcal{S}_t}F_{\mathcal{S}_t} F_j) \\ \nonumber & \stackrel{(b)}{=} I(F_{\mathcal{S}_t} F_j; F) + I((F_{s(i)} \oplus K_i )_{i \in \mathcal{I}_t}; F|K_{\mathcal{S}_t}F_{\mathcal{S}_t} F_j) \\ \nonumber & \stackrel{(c)}{\leq} I(F_{\mathcal{S}_t} F_j; F) + I((F_{s(i)} \oplus K_i )_{i \in \mathcal{I}_t}; (F_{s(i)} )_{i \in \mathcal{I}_t}) \\ \nonumber & \stackrel{(d)}{\leq} l (H(F)+ \beta)/k + \textstyle\sum_{i \in \mathcal{I}_t} I(F_{s(i)} \oplus K_i ; F_{s(i)} ) \\ & \stackrel{(e)}{=} \alpha (H(F)+ \beta), \label{eqproof} \end{align} where $(a)$ holds for some $j \in \llbracket N_{\textup{Plain}}+1,k \rrbracket$ and $(s(i))_{i \in \mathcal{I}_t} \in \llbracket N_{\textup{Plain}}+1,k \rrbracket^{|\mathcal{I}_t|} $ as follows. Note indeed that Server $t$ stores $|\mathcal{I}_t|=u$ keys and all the other servers store $(r-1)x + (T-v-r)(x+1) + vx = u+1$ (by \eqref{eqdif}) encrypted parts of $F$, hence, considering the encrypted parts $E_{\mathcal{S}_t}$ of all the servers in $\mathcal{S}_t$, all \emph{but one} are protected by a key of Server~$t$ by Line 14 of Algorithm \ref{alg3}. $(b)$ holds because $K_{\mathcal{S}_t}$ is independent of $F$, $(c)$ holds by the chain rule and because $(K_{\mathcal{S}_t},(F_{i})_{i \in \llbracket 1 , k\rrbracket \backslash \{ s(i) : i \in \mathcal{I}_t \}})$ is independent from $(F_{s(i)},F_{s(i)} \oplus K_i )_{i \in \mathcal{I}_t}$, $(d)$ holds because $F_{\mathcal{S}_t}$ contains $(r-1)(q+1) + (T-r)q = l-1$ (by~\eqref{div1}) parts of $F$, $(e)$ holds by the one-time pad \cite{stinson2005cryptography}. \item Assume $ r+1 \leq t \leq T-v $. We have \begin{align*} &I(M_{\mathcal{S}_t}; F) \\ & = I(K_{\mathcal{S}_t}F_{\mathcal{S}_t}E_{\mathcal{S}_t}; F) \displaybreak[0] \\ & \stackrel{(a)}{=} I(K_{\mathcal{S}_t}F_{\mathcal{S}_t} (F_{s(i)} \oplus K_i )_{i \in \mathcal{I}_t}; F) \\ & \stackrel{(b)}{\leq} \alpha (H(F)+ \beta), \end{align*} where $(a)$ holds for some $(s(i))_{i \in \mathcal{I}_t} \in \llbracket N_{\textup{Plain}}+1,k \rrbracket^{|\mathcal{I}_t|} $ as follows. Note indeed that Server $t$ stores $|\mathcal{I}_t|=u$ keys, and all the other servers store $rx + (T-v-r-1)(x+1) + vx = u$ (by \eqref{eqdif}) encrypted parts of $F$. Hence, all the encrypted parts $E_{\mathcal{S}_t}$ of all the servers in $\mathcal{S}_t$ are protected by a key of Server~$t$ by Line 14 of Algorithm \ref{alg3}. $(b)$ holds similar to \eqref{eqproof} because $F_{\mathcal{S}_t}$ contains $r(q+1) + (T-r-1)q = l$ (by \eqref{div1}) parts of $F$. \item Assume $t \geq T-v +1$. The proof of \eqref{eqproof} is identical to Subcase ii by remarking that (i) Server $t$ stores $|\mathcal{I}_t|=u+1$ keys, and all the other servers store $rx + (T-v-r)(x+1) + (v-1)x = u+1$ (by~\eqref{eqdif}) encrypted parts of $F$, and (ii) $F_{\mathcal{S}_t}$ contains $r(q+1) + (T-r-1)q = l$ (by \eqref{div1}) parts of $F$. \end{itemize} \subsection{Case 2. $r+v \geq T$} Remark that \begin{align} &(T-v-1)x + (r-T+v)(x-1) + (T-r)x \nonumber \\ &= (r-1)x + (T-v-r)(x+1) + vx \nonumber \\ & = 1+u, \label{eqdif2} \end{align} where the last equality holds by \eqref{eqdif}. We next consider three cases depending on the value of $t \in \mathcal{T}$. \begin{itemize} \item Assume $t \leq T-v$. We have \begin{align} &I(M_{\mathcal{S}_t}; F) \nonumber \\ & = I(K_{\mathcal{S}_t}F_{\mathcal{S}_t}E_{\mathcal{S}_t}; F) \nonumber \\ \nonumber & \stackrel{(a)}{=} I(K_{\mathcal{S}_t}F_{\mathcal{S}_t} F_j (F_{s(i)} \oplus K_i )_{i \in \mathcal{I}_t}; F) \\ & \stackrel{(b)}{\leq} \alpha (H(F)+ \beta), \label{eqproof2} \end{align} where $(a)$ holds for some $j \in \llbracket N_{\textup{Plain}}+1,k \rrbracket$ and $(s(i))_{i \in \mathcal{I}_t} \in \llbracket N_{\textup{Plain}}+1,k \rrbracket^{|\mathcal{I}_t|} $ as follows. Note indeed that Server $t$ stores $|\mathcal{I}_t|=u$ keys and all the other servers store $(T-v-1)x + (r-T+v)(x-1) + (T-r)x = u+1$ (by \eqref{eqdif2}) encrypted parts of $F$, hence, considering the encrypted parts $E_{\mathcal{S}_t}$ of all the servers in $\mathcal{S}_t$, all \emph{but one} are protected by a key of Server~$t$ by Line 15 of Algorithm~\ref{alg3b}. $(b)$ holds similar to \eqref{eqproof} because $F_{\mathcal{S}_t}$ contains $(r-1)(q+1) + (T-r)q = l-1$ (by \eqref{div1}) parts of $F$. \item Assume $ r < t \leq T-v $. We have \begin{align*} &I(M_{\mathcal{S}_t}; F) \\ & = I(K_{\mathcal{S}_t}F_{\mathcal{S}_t}E_{\mathcal{S}_t}; F) \\ & \stackrel{(a)}{=} I(K_{\mathcal{S}_t}F_{\mathcal{S}_t} F_j (F_{s(i)} \oplus K_i )_{i \in \mathcal{I}_t}; F) \\ & \stackrel{(b)}{\leq} \alpha (H(F)+ \beta), \end{align*} where $(a)$ holds for some $j \in \llbracket N_{\textup{Plain}}+1,k \rrbracket$ and $(s(i))_{i \in \mathcal{I}_t} \in \llbracket N_{\textup{Plain}}+1,k \rrbracket^{|\mathcal{I}_t|} $ as follows. Note indeed that Server $t$ stores $|\mathcal{I}_t|=u+1$ keys, and all the other servers store $(T-v)x + (r-T+v-1)(x-1) + (T-r)x = u+2$ (by \eqref{eqdif2}) encrypted parts of $F$, hence, considering the encrypted parts $E_{\mathcal{S}_t}$ of all the servers in $\mathcal{S}_t$, all \emph{but one} are protected by a key of Server~$t$ by Line~15 of Algorithm~\ref{alg3b}. $(b)$ holds similar to \eqref{eqproof} because $F_{\mathcal{S}_t}$ contains $(r-1)(q+1) + (T-r)q = l-1$ (by \eqref{div1}) parts of $F$. \item Assume $t \geq T-v +1$. We have \begin{align*} &I(M_{\mathcal{S}_t}; F) \\ & = I(K_{\mathcal{S}_t}F_{\mathcal{S}_t}E_{\mathcal{S}_t}; F) \\ & \stackrel{(a)}{=} I(K_{\mathcal{S}_t}F_{\mathcal{S}_t} (F_{s(i)} \oplus K_i )_{i \in \mathcal{I}_t}; F) \\ & \stackrel{(b)}{\leq} \alpha (H(F)+ \beta), \end{align*} where $(a)$ holds for some $(s(i))_{i \in \mathcal{I}_t} \in \llbracket N_{\textup{Plain}}+1,k \rrbracket^{|\mathcal{I}_t|} $ as follows. Note indeed that Server $t$ stores $|\mathcal{I}_t|=u+1$ keys, and all the other servers store $(T-v)x + (r-T+v)(x-1) + (T-r-1)x = 1+u$ (by \eqref{eqdif2}) encrypted parts of $F$. Hence, all the encrypted parts $E_{\mathcal{S}_t}$ of all the servers in $\mathcal{S}_t$ are protected by a key of Server~$t$ by Line~15 of Algorithm \ref{alg3b}. $(b)$ holds similar to \eqref{eqproof} because $F_{\mathcal{S}_t}$ contains $r(q+1) + (T-r-1)q = l$ (by \eqref{div1}) parts of $F$. \end{itemize} \bibliographystyle{IEEEtran}
\section{Introduction}\label{sec:introduction} Epistemic logic programs (ELPs) \cite{lpnmr:GelfondP91}, also referred to as the language of Epistemic Specifications \cite{aaai:Gelfond91}, have received renewed attention in the research community as of late. ELPs are an extension of the language of Answer Set Programming (ASP) \cite{cacm:BrewkaET11,ki:SchaubW18} with epistemic operators. \citeauthor{aaai:Gelfond91} (\citeyear{aaai:Gelfond91}) introduced the operators $\mathbf{K}$ and $\mathbf{M}$ in order to represent the concepts of \emph{known to be true} and \emph{may be true}, and defined an initial semantics. Several improvements to the semantics have since been proposed in the literature \cite{lpnmr:Gelfond11,% birthday:Truszczynski11,logcom:KahlWBGZ15,ijcai:CerroHS15}. \citeauthor{ai:ShenE16} (\citeyear{ai:ShenE16}) realized that these two operators can be represented via a single negation-type operator that they called \emph{epistemic negation}, denoted $\mathbf{not}\,$, and gave a new semantics based on this operator. \citeauthor{iclp:Morak19} (\citeyear{iclp:Morak19}) proposed a novel characterization of the central construct of the ELP semantics: the \emph{world view}. While a recent analysis \cite{lpnmr:CabalarFC19} has shown that this semantics still does not eliminate all existing flaws, we will make use of it in this paper, since no clear ``winner'' semantics has as of yet emerged, and our approach should be equally applicable to other existing semantics that have been proposed. Evaluating ELPs is a computationally hard task. The central decision problem, checking whether an ELP has a world view, is \SIGMA{3}{P}-complete, and problems even higher on the polynomial hierarchy exist \cite{ai:ShenE16,iclp:Morak19}. In order to deal with this high complexity efficiently, we propose to use a method from the field of parameterized complexity, namely, investigate how the runtime behaves when looking at different structural parameters of the problem. For standard ASP, this topic has received considerable interest, \cite{tocl:LoncT03,ai:GottlobPW10,ai:FichteS15,ecai:BliemOW16,amai:FichteKW19,lpnmr:FichteH19}. However, the parameterized complexity of epistemic ASP has remained largely unexplored so far. From the ASP case, we see strong evidence that this will be the case for ELPs as well. In this paper, we will investigate, in particular, whether ELPs can be solved efficiently if their treewidth (i.e., a measure for the tree-likeness of graphs) is bounded. It turns out that this question can be answered in the affirmative: the main decision problems become tractable. In practice, a dynamic programming algorithm on tree decompositions can be used to exploit this directly, similarly to what was successfully proposed for ASP and QBF solvers \cite{lpnmr:FichteHMW17,% ijcai:BliemMMW17,cp:FichteHZ19,fi:CharwatW19}. However, we also aim to investigate a more interesting angle. Many ELP solvers today work by making (up to exponentially many) calls to an underlying ASP solving system in order to check world view existence. Being able to find a bound on the number of these ASP solver calls would be very useful. Using so-called epistemic (primal) graphs of ELPs that focus on epistemically negated literals only, we can again employ treewidth to establish such bounds. This novel use of structural decomposition intuitively works well in some interesting cases including instances of the scholarship eligibility (SE)\footnote{Problem SE was a prime motivator for ELPs~\cite{aaai:Gelfond91}.} benchmark set, as provided with the system ``EP-ASP''~\cite{ijcai:SonLKL17}. Using the epistemic primal graph representation, these instances naturally decompose into their individual sub-problems, that is, one sub-instance of the SE problem for each student within the original instance. \medskip\noindent\textbf{Contributions.} Our contributions are summarized below: \begin{itemize} % \item We investigate the complexity of the ELP world view existence problem when parameterized by the treewidth of the ELP instance. We establish that this problem is fixed-parameter tractable in this setting, and, in fact, can be solved in linear time if the treewidth is bounded from above by a constant. The same holds for the even more complex problem of world view formula evaluation. \item Then, we propose a novel graph representation of ELPs, namely, the epistemic primal graph and show how this can be exploited to bound the number of calls to an underlying ASP solver in a classical ELP solver setting. It turns out that the number of calls is bounded in case the epistemic primal graph has bounded treewidth. % \item Finally, we provide a full dynamic programming algorithm that could be used in practice to directly exploit the tractability result above. We also show that % the worst-case runtime of this algoritm % cannot be significantly improved under reasonable complexity-theoretic assumptions. % \end{itemize} \section{Preliminaries}\label{sec:preliminaries} \smallskip\noindent\textbf{Answer Set Programming (ASP).} A \emph{ground logic program} with nested negation (also called answer set program, ASP program, or, simply, logic program) is a pair $\mathscr{P} = (\mathcal{A}, \mathcal{R})$, where $\mathcal{A}$ is a set of propositional (i.e., ground) atoms and $\mathcal{R}$ is a set of rules of the form % $a_1\vee \cdots \vee a_l \leftarrow a_{l+1}, \ldots, a_m, \neg \ell_1, \ldots, \neg \ell_n$, % where the comma symbol stands for conjunction, $0 \leq l \leq m$, $0 \leq n$, $a_i \in \mathcal{A}$ for all $1 \leq i \leq m$, and each $\ell_i$ is a \emph{literal}, that is, either an atom $a$ or its (default) negation $\neg a$ for any atom $a \in \mathcal{A}$.\footnote{In this case, we say that it is a literal \emph{over} $\mathcal{A}$.} Note that, therefore, doubly negated atoms may occur. We will sometimes refer to such rules as \emph{standard rules}. Each rule $r \in \mathcal{R}$ consists of a \emph{head} $\head{r} = \{ a_1,\ldots,a_l \}$ and a \emph{body} $\body{r} = \{a_{l+1},\ldots,a_m, \neg \ell_1, \ldots, \neg \ell_n \}$, and is alternatively denoted by $\head{r}\leftarrow \body{r}$. The \emph{positive} body is given by $\pbody{r} = \{ a_{l+1}, \ldots, a_m \}$. Sometimes, we add a set of rules $\mathcal{R}'$ to a logic program $\mathscr{P} = (\mathcal{A}, \mathcal{R})$. By some abuse of notation, let $\mathscr{P} \cup \mathcal{R}'$ denote the logic program $(\mathcal{A} \cup \mathcal{A}', \mathcal{R}\cup \mathcal{R}')$, where $\mathcal{A}'$ is the set of atoms occurring in the rules of $\mathcal{R}'$. An \emph{interpretation} $I$ (over $\mathcal{A}$) is a set of atoms, that is, $I \subseteq \mathcal{A}$. A literal $\ell$ is true in an interpretation $I \subseteq \mathcal{A}$, denoted $I \models \ell$, iff $a \in I$ and $\ell = a$ , or $a \not\in I$ and $\ell = \neg a$; otherwise $\ell$ is false in $I$, denoted $I \not\models \ell$. Finally, for some literal $\ell$, we define that $I \models \neg \ell$ if $I \not\models \ell$. This notation naturally extends to sets of literals. An interpretation $M$ is called a \emph{model} of $r$, denoted $M \models r$, if, whenever $M \models \body{r}$, it holds that $M \models \head{r}$. We denote the set of models of $r$ by $\mods{r}$; the models of a logic program $\mathscr{P}= (\mathcal{A},\mathcal{R})$ are given by $\mods{\mathscr{P}} = \bigcap_{r \in \mathcal{R}} \mods{r}$. We also write $I \models r$ (resp.\ $I \models \mathscr{P}$) if $I \in \mods{r}$ (resp.\ $I \in \mods{\mathscr{P}}$). The GL-reduct of a logic program $\mathscr{P} = (\mathcal{A}, \mathcal{R})$ with respect to an interpretation $I$ is given by $\mathscr{P}^I=(\mathcal{A}, \mathcal{R}^I)$ with $\mathcal{R}^I = \{ \head{r} \leftarrow \pbody{r} \mid r \in \mathcal{R}, \forall (\neg \ell) \in \body{r} : I \not\models \ell \}$. \begin{definition}[\cite{iclp:GelfondL88,ngc:GelfondL91,amai:LifschitzTT99}] \label{def:answerset} % $M \subseteq \mathcal{A}$ is an \emph{answer set} of a logic program $\mathscr{P}$ if (1) $M \in \mods{\mathscr{P}}$ and (2) there is no subset $M' \subset M$ such that $M' \in \mods{\mathscr{P}^M}$. % \end{definition} The set of answer sets of a logic program $\mathscr{P}$ is denoted by $\answersets{\mathscr{P}}$. The \emph{consistency problem} of ASP, that is, to decide whether for a given logic program $\mathscr{P}$ it holds that $\answersets{\mathscr{P}} \neq \emptyset$, is \SIGMA{P}{2}-complete~\cite{amai:EiterG95}, and remains so also in the case where doubly negated atoms are allowed in rule bodies~\cite{tplp:PearceTW09}. \smallskip\noindent\textbf{Epistemic Logic Programs.} An \emph{epistemic literal} is a formula $\mathbf{not}\, \ell$, where $\ell$ is a literal and $\mathbf{not}\,$ is the epistemic negation operator. A \emph{ground epistemic logic program (ELP)} is a pair $\Pi = (\mathcal{A}, \mathcal{R})$, where $\mathcal{A}$ is a set of atoms and $\mathcal{R}$ is a set of \emph{ELP rules}, which are implications of the form % $a_1\vee \cdots \vee a_k \leftarrow \ell_1, \ldots, \ell_m, \xi_1, \ldots, \xi_j, \neg \xi_{j + 1},$ $\ldots, \neg \xi_{n}$, % where each $a_i$ is an atom from $\mathcal{A}$, each $\ell_i$ is a literal over $\mathcal{A}$, and each $\xi_i$ is an \emph{epistemic literal} of the form $\mathbf{not}\, \ell$, where $\ell$ is a literal over $\mathcal{A}$. Similarly to logic programs, let $\head{r} = \{ a_1, \ldots, a_k \}$, and let $\body{r} = \{ \ell_1, \ldots, \ell_m, \xi_1, \ldots, \xi_j, \neg \xi_{j+1}, \ldots, \neg \xi_{n} \}$. Further, $\atomof{r} \subseteq \mathcal{A}$ denotes the set of atoms ocurring in ELP rule $r$, and $\elitof{r} \subseteq \atomof{r}$ denotes the set of atoms used in epistemic literals of $r$. These notions naturally extend to sets of rules. In order to define the semantics of an ELP, we will use the approach by \citeauthor{iclp:Morak19} \cite{iclp:Morak19}, which follows the semantics defined in \cite{ai:ShenE16}, but uses a different formal representation. Note that, however, our results can be adapted to other ``reduct-based'' semantics, by changing the definition of the reduct appropriately. Given an ELP $\Pi = (\mathcal{A}, \mathcal{R})$, a \emph{candidate world interpretation (CWI)} $I$ for $\Pi$ is a consistent subset $I \subseteq \mathcal{L}$, where $\mathcal{L}$ is the set of all literals that can be built from atoms in $\mathcal{A}$. Note that a CWI $I$ naturally gives rise to a three-valued truth assignment to all the atoms in $\mathcal{A}$; hence, we will sometimes treat a CWI $I$ as a triple of disjoint sets $\langle I^P, I^N, I^U \rangle$, where $I^P = \{ a \mid a \in I \cap \mathcal{A} \}$, $I^N = \{ a \mid \neg a \in I \}$ and $I^U = (\mathcal{A} \setminus I^P) \setminus I^N$, with the intended meaning that atoms in $I^P$, $I^N$, and $I^U$ are ``always true,'' ``always false,'' and ``unknown,'' respectively. With the above definition in mind, we now define when a CWI is compatible with a given set of interpretations. \begin{definition}\label{def:compat} % Let $\mathcal{I}$ be a set of interpretations over a set of atoms $\mathcal{A}$. Then, a CWI $I$ is \emph{compatible} with $\mathcal{I}$ iff we have: % \begin{enumerate} % \item\label{def:compat:1} $\mathcal{I} \neq \emptyset$; % \item\label{def:compat:2} for each atom $a \in I^P$, it holds that for each $J \in \mathcal{I}$, $a \in J$; % \item\label{def:compat:3} for each atom $a \in I^N$, we have for each $J \in \mathcal{I}$, $a \not\in J$; % \item\label{def:compat:4} for each atom $a \in I^U$, it holds that there are $J, J' \in \mathcal{I}$, such that $a \in J$, but $a \not\in J'$. % \end{enumerate} % \end{definition} The \emph{epistemic reduct} \cite{ai:ShenE16,iclp:Morak19} of program $\Pi = (\mathcal{A}, \mathcal{R})$ w.r.t.\ a CWI $I$, denoted $\Pi^I$, is defined as $\Pi^I = (\mathcal{A}, \{ r^I \mid r \in \mathcal{R} \})$ where $r^I$ denotes rule $r$ where each epistemic literal $\mathbf{not}\, \ell$ is replaced by $\neg \ell$ if $\ell \in I$, and by $\top$ otherwise. Note that, hence, $\Pi^I$ is a plain logic program with all occurrences of epistemic negation removed.\footnote{In fact, $\Pi^I$ may contain triple-negated atoms $\neg\neg\neg a$. According to \cite{amai:LifschitzTT99}, such formulas are equivalent to simple negated atoms $\neg a$, and we treat them as such.} Now, a CWI $I$ is a \emph{candidate world view (CWV)} of $\Pi$ iff $I$ is compatible with the set~$\answersets{\Pi^I}$ of answer sets. The set of CWVs of an ELP $\Pi$ is denoted $\cwvs{\Pi}$. Following the principle of knowledge minimization, furthermore $I$ is a \emph{world view (WV)} iff it is a CWV and there is no proper subset $J \subset I$ such that $J \in \cwvs{\Pi}$. The set of WVs of an ELP $\Pi$ is denoted $\wvs{\Pi}$. One of the main reasoning tasks regarding ELPs is the \emph{world view existence problem}, that is, given an ELP $\Pi$, decide whether $\wvs{\Pi} \neq \emptyset$ (or, equivalently, whether $\cwvs{\Pi} \neq \emptyset$). This problem is known to be \SIGMA{3}{P}-complete \cite{ai:ShenE16,iclp:Morak19}. Another interesting reasoning task is deciding, given an ELP $\Pi = (\mathcal{A}, \mathcal{R})$ and an arbitrary propositional formula $\phi$ over $\mathcal{A}$, whether $\phi$ holds in some WV, that is, whether there exists $W \in \wvs{\Pi}$ such that $W \models \phi$. This \emph{formula evaluation problem} is even harder, namely \SIGMA{4}{P}-complete \cite{ai:ShenE16}. \smallskip\noindent\textbf{Tree Decompositions and Treewidth.} We assume that graphs are undirected, simple, and free of self-loops. Let $G = (V, E)$ be a graph, $T$ a rooted tree, and $\chi$ a labeling function that maps every node $t$ of $T$ to a subset $\chi(t) \subseteq V$ called the \emph{bag} of $t$. The pair $\mathcal{T} = (T, \chi)$ is called a \emph{tree decomposition (TD)} \cite{jct:RobertsonS84} of $G$ iff (i) for each $v \in V$, there exists a $t$ in $T$, such that $v \in \chi(t)$; (ii) for each $\{v, w\} \in E$, there exists $t$ in $T$, such that $\{v, w\} \subseteq \chi(t)$; and (iii) for each $r, s, t$ of $T$, such that $s$ lies on the unique path from $r$ to $t$, we have $\chi(r) \cap \chi(t) \subseteq \chi(s)$. For a node~$t$ of~$T$, we say that $\type(t)$ is $\textsf{leaf}$ if $t$ has no children and~$\chi(t)=\emptyset$; $\textsf{join}$ if $t$ has children~$t'$ and $t''$ with $t'\neq t''$ and $\chi(t) = \chi(t') = \chi(t'')$; $\textsf{intr}$ (``introduce'') if $t$ has a single child~$t'$, $\chi(t') \subseteq \chi(t)$ and $|\chi(t)| = |\chi(t')| + 1$; $\textsf{rem}$ (``removal'') if $t$ has a single child~$t'$, $\chi(t') \supseteq \chi(t)$ and $|\chi(t')| = |\chi(t)| + 1$. If for every node $t\in T$, % $\type(t) \in \{ \textsf{leaf}, \textsf{join}, \textsf{intr}, \textsf{rem}\}$, then $(T,\chi)$ is called \emph{nice}. The \emph{width} of a TD is defined as the cardinality of its largest bag minus one. The \emph{treewidth} of a graph $G$, denoted by $\tw{G}$, is the minimum width over all TDs of $G$. Note that if $G$ is a tree, then $\tw{G} = 1$. \smallskip\noindent\textbf{Monadic Second Order Logic and Courcelle's Theorem.} Monadic Second Order logic (MSO) extends First Order logic (FO) with set variables that range over sets of domain elements. Atomic MSO-formulas over a signature $\sigma$ are either (1) atoms over some predicate in $\sigma$; (2) equality atoms; or (3) atoms of the form $x \in S$, where $x$ is a FO variable, and $S$ is a set variable. MSO-formulas are closed under FO operators. It is convenient to use symbols like $\not\in$, $\subseteq$, $\subset$, $\cap$, or $\cup$, with the obvious meanings as abbreviations for the corresponding MSO (sub-)formulas. A $\sigma$-structure $\mathfrak{A}$ is a set of atoms over predicates in $\sigma$. Let $\domof{\mathfrak{A}}$ denote its domain. In order to exploit the structural information, we need to define how logical structures can be represented as graphs, and how their treewidth is then defined: Given a structure $\mathfrak{A}$ over some logical signature $\sigma$ of arity at most two (sufficent for us), we say that the treewidth of $\mathfrak{A}$ equals $\tw{G_\mathfrak{A}}$, where $G_\mathfrak{A} = (V, E)$ is a graph with $V = \domof{\mathfrak{A}}$ and edge $\{a, b\} \in E$ iff $r(a, b) \in \mathfrak{A}$, where $r$ is some relation in $\sigma$. MSO formulas over structures of bounded treewidth are important in the context of parameterized complexity in order to establish running time bounds, as the following landmark theorem by \citeauthor{iandc:Courcelle90} shows: \begin{theorem}[\cite{iandc:Courcelle90}]\label{thm:courcelle} % Let $\phi$ be a fixed MSO formula over signature $\sigma$ and let $\mathfrak{A}$ be a $\sigma$-structure with $\tw{\mathfrak{A}} \leqslant k$, for some integer $k$. Then, evaluating $\phi$ over $\mathfrak{A}$ can be done in time $O(f(k) \cdot |\mathfrak{A}|)$, for some function $f$ not depending on $|\mathfrak{A}|$. % \end{theorem} Problems with a parameter $k$ that can be solved in time $O(f(k) \cdot n^c)$, where~$c$ is a constant and $f$ only depends on $k$, are called \emph{fixed-parameter tractable (FPT)} \cite{mcs:DowneyF99}. \section{An MSO Encoding for ELPs}\label{sec:msoencoding} The main objective in this section is to investigate how the semantics of ELPs can be encoded in terms of an MSO formula and thereby investigate, from a theoretical perspective, the time complexity of evaluating ELPs, specifically looking at tree-like instances. Now, our goal will be to offer a fixed MSO encoding to exploit Theorem~\ref{thm:courcelle}, in the spirit of \cite{ai:GottlobPW10}, which is able to solve the world view existence problem for an ELP by evaluating it over a suitable logical structure representing the ELP. In order to begin the construction of this, we first need to fix the signature over which our MSO encoding will be expressed. To this end, let signature\smallskip\\ $\sigma = \{ \relation{atom}, \relation{rule}, \relation{h}, \relation{b}, \relation{b^\neg}, \relation{b^\mathbf{not}\,}, \relation{b^{\mathbf{not}\, \neg}}, \relation{b^{\neg \mathbf{not}\,}}, \relation{b^{\neg \mathbf{not}\, \neg}} \}, $\smallskip\\ where $\fullatom{atom}{a}$ and $\fullatom{rule}{r}$ represent the fact that domain elements $a$ and $r$ are an atom and a rule, respectively; where $\fullatom{h}{a, r}$ represents that atom $a$ appears in the head of rule $r$; and where $b^\square(a, r)$, with $\square \in \{ \epsilon, \neg, \mathbf{not}\,, \neg \mathbf{not}\,,$ $\mathbf{not}\, \neg, \neg \mathbf{not}\, \neg \}$ and $\epsilon$ the empty word, represents that fact that the sub-formula $\square a$, for atom $a$, appears in the body of rule $r$. Next we construct the~encoding. \begin{lemma}\label{lem:msoencoding} % Consider the signature $\sigma$ above. WV existence can be expressed by means of a fixed MSO formula over $\sigma$. % \end{lemma} \begin{proof} % Recall that, in order to check the existence of a WV, it suffices to check the existence of a CWV (since WVs are simply subset-minimal CWVs). We will construct an MSO formula $\fullatom{cwv}{\variables{P}, \variables{N}, \variables{U}}$ with the intended meaning that it evaluates to true iff the input set variables $\variables{P}$, $\variables{N}$, and $\variables{U}$ represent a CWV $W$ with $W^P = \variables{P}$, $W^N = \variables{N}$, and $W^U = \variables{U}$. To this end, our formula will be of the following form:\smallskip\\ $ \fullatom{cwv}{\variables{P}, \variables{N}, \variables{U}} \equiv \fullatom{cwi}{\variables{P}, \variables{N}, \variables{U}} \wedge \bigwedge_{i=1}^4 \fullatom{chk_i}{\variables{P}, \variables{N}, \variables{U}} $\smallskip\\ where $\relation{cwi}$ ensures that $\variables{P}$, $\variables{N}$, and $\variables{U}$ indeed encode a valid CWI (i.e., a three-partition of the set of atoms stored in $\relation{atom}$), and $\relation{chk_i}$ verifies that Condition~$i$ of Definition~\ref{def:compat} holds. We will now give the construction of these checks. First, the check for a valid CWI is expressed as follows:\medskip\\ % % $\fullatom{cwi}{\variables{P}, \variables{N}, \variables{U}} \equiv \forall \variable{X} \left(\fullatom{atom}{\variable{X}} \Leftrightarrow \variable{X} \in \variables{P} \cup \variables{N} \cup \variables{U}\right) \wedge$ \\ % $\neg \exists \variable{X} \left((\variable{X} \in \variables{P} \cap \variables{N}) \vee (\variable{X} \in \variables{N} \cap \variables{U}) \vee (\variable{X} \in \variables{P} \cap \variables{U}) \right)$\medskip\\ % % The four remaining checks have a similar structure: % \noindent\begin{align*} \fullatom{chk_{\ref{def:compat:1}}}{\variables{P}, \variables{N}, \variables{U}} \equiv\ & \exists \variables{X}\, \fullatom{as}{\variables{X}, \variables{P}, \variables{N}, \variables{U}};\\[.1ex] % \fullatom{chk_{\ref{def:compat:2}}}{\variables{P}, \variables{N}, \variables{U}} \equiv\ & \forall \variable{X} \left( \variable{X} \in \variables{P} \Rightarrow \right.\\[-.25em % % & \left. \forall \variables{X} \left( \fullatom{as}{\variables{X}, \variables{P}, \variables{N}, \variables{U}} \Rightarrow \variable{X} \in \variables{X} \right) \right);\end{align*} % \noindent\begin{align* % \fullatom{chk_{\ref{def:compat:3}}}{\variables{P}, \variables{N}, \variables{U}} \equiv\ & \forall \variable{X} \left( \variable{X} \in \variables{N} \Rightarrow \right.\\[-.25em] % & \left.\forall \variables{X} \left( \fullatom{as}{\variables{X}, \variables{P}, \variables{N}, \variables{U}} \Rightarrow \variable{X} \not\in \variables{X} \right) \right);\\[.1ex] % \fullatom{chk_{\ref{def:compat:4}}}{\variables{P}, \variables{N}, \variables{U}} \equiv\ & \forall \variable{X} \left( \variable{X} \in \variables{U} \Rightarrow \right.\\[-.25em] % & \left. \left( \exists \variables{X} \left( \fullatom{as}{\variables{X}, \variables{P}, \variables{N}, \variables{U}} \wedge \variable{X} \in \variables{X} \right) \wedge \right. \right.\\[-.25em] % & \left. \left. \exists \variables{X} \left( \fullatom{as}{\variables{X}, \variables{P}, \variables{N}, \variables{U}} \wedge \variable{X} \not\in \variables{X} \right) \right) \right). % \end{align*} % The four checks encode precisely the conditions of Definition~\ref{def:compat}, where $\fullatom{as}{\variables{X}, \variables{P}, \variables{N}, \variables{U}}$ is a sub-formula, to be defined below, that expresses that $\variables{X}$ is an answer set of the epistemic reduct w.r.t.\ the CWI represented by the sets $\variables{P}$, $\variables{N}$, and $\variables{U}$. For example, $\relation{chk_{\ref{def:compat:3}}}$ encodes that for each atom $\variable{X}$ that is set to ``always false'' in the CWI (i.e., $\variable{X} \in \variables{N}$), it must hold that for every stable model $\variables{X}$ of the epistemic reduct, $\variable{X}$ must not be true in that stable model (i.e., $\variable{X} \not\in \variables{X}$). It now remains to define the sub-formula for checking answer sets. This construction is based on the one presented in \cite[Theorem~3.5]{ai:GottlobPW10}, but adapted to take the computation of the epistemic reduct into account. Firstly, a set of atoms $M$ is an answer set if it is a model and no proper subset of $M$ is a model of the GL-reduct w.r.t.\ $M$. This is expressed as follows (note that any model $M$ is also a model of its GL-reduct):\medskip\\ % % \makebox[1em]{}$\fullatom{as}{\variables{X}, \variables{P}, \variables{N}, \variables{U}} \equiv \fullatom{gl}{\variables{X}, \variables{X}, \variables{P}, \variables{N}, \variables{U}}$\\ % \makebox[5em]{}$\wedge \forall \variables{Y} \left( \variables{Y} \subset \variables{X} \Rightarrow \neg \fullatom{gl}{\variables{X}, \variables{Y}, \variables{P}, \variables{N}, \variables{U}} \right).$\smallskip\\ % % The intuitive meaning of $\fullatom{gl}{\variables{X}, \variables{Y}, \variables{P}, \variables{N}, \variables{U}}$ is that it should hold iff $\variables{Y}$ is a model of the GL-reduct w.r.t.\ $\variables{X}$ of the epistemic reduct w.r.t.\ the CWI represented by $\variables{P}$, $\variables{N}$, and $\variables{U}$: % \begin{multline*} % \fullatom{gl}{\variables{X}, \variables{Y}, \variables{P}, \variables{N}, \variables{U}} \equiv \forall \variable{R} \left( \fullatom{rule}{\variable{R}} \Rightarrow \exists \variable{Z} \left(\right.\right.\\[-.25em] % \left.\left.(\fullatom{h}{\variable{Z}, \variable{R}} \wedge \variable{Z} \in \variables{Y})\right.\right.\\[-.25em] % \left.\left.\vee (\fullatom{b}{\variable{Z}, \variable{R}} \wedge \variable{Z} \not\in \variables{Y}) \vee (\fullatom{b^\neg}{\variable{Z}, \variable{R}} \wedge \variable{Z} \in \variables{X}))\right.\right.\\[-.25em] % \left.\left.\vee (\fullatom{b^\mathbf{not}\,}{\variable{Z}, \variable{R}} \wedge \variable{Z} \in \variables{P} \wedge \variable{Z} \in \variables{X})\right.\right.\\[-.25em] % \left.\left.\vee (\fullatom{b^{\mathbf{not}\,\neg}}{\variable{Z}, \variable{R}} \wedge \variable{Z} \in \variables{N} \wedge \variable{Z} \not\in \variables{X})\right.\right.\\[-.25em] % \left.\left.\vee (\fullatom{b^{\neg\mathbf{not}\,}}{\variable{Z}, \variable{R}} \wedge \left((\variable{Z} \in \variables{N} \cup \variables{U}) \vee (\variable{Z} \in \variables{P} \wedge \variable{Z} \not\in \variables{X}))\right)\right.\right.\\[-.25em] % \hspace{-.5em}\left.\left. \vee (\fullatom{b^{\neg\mathbf{not}\,\neg}}{\variable{Z}, \variable{R}} \wedge \left((\variable{Z} \in \variables{P} \cup \variables{U}) \vee (\variable{Z} \in \variables{N} \wedge \variable{Z} \in \variables{X}))\right)\right)\right % \end{multline*} % Note that the definition of the $\relation{gl}$-relation is such that it precisely mirrors the definition of both the epistemic reduct and the GL-reduct. It amounts to checking that every rule in the GL-reduct is satisfied, and amounts to a large case distinction, dealing with all seven cases of how atoms can appear in a rule (that is, either in the head, or nested under six combinations of default and epistemic negation in the body). For example, in line three, the first disjunct says that rule $\variable{R}$ is satisfied if there is an atom $\variable{Z}$ in the positive body, but this atom is not present in the reduct model $\variables{Y}$ (satisfying rule $\variable{R}$ by not satisfying the body). Line four treats the case of an epistemically negated atom $\variable{Z}$ in the body. Such a rule is satisfied iff $\variable{Z}$ is set to ``always true'' in the CWI (since otherwise the epistemic literal is replaced by $\top$ in the epistemic reduct, and the rule cannot be satisfied solely by this body element in this case), and $\variable{Z}$ is false in the original model $\variables{X}$ (since in the epistemic reduct, the epistemic negation turns into default negation in this case, and default-negated atoms are evaluated over the original model $\variables{X}$). This completes our MSO encoding. Correctness follows by construction, as explained above. In order to solve the WV existence problem via this encoding, we simply have to quantify the relevant set variables:\smallskip\\ \makebox[.1\textwidth]{}$\phi = \exists \variables{P} \exists \variables{N} \exists \variables{U}\, \fullatom{cwv}{\variables{P}, \variables{N}, \variables{U}}.$\smallskip\\ Evaluating this formula over a $\sigma$-structure $\mathfrak{P}$ that represents an ELP $\Pi$, we get that $\Pi$ has a CWV iff $\mathfrak{P} \models \phi$ % \end{proof} With the above reduction in mind, lets take a closer look at what worst-case solving time guarantees we can give for solving ELPs, in particular w.r.t.\ structural properties. Let $\Pi = (\mathcal{A}, \mathcal{R})$ be an ELP, and let $\mathfrak{P}$ be the $\sigma$-structure that represents it. Recall that $\tw{\mathfrak{P}} = \tw{G_\mathfrak{P}}$. In our case, $G_\mathfrak{P}$ coincides with the so-called \emph{incidence graph} of the ELP $\Pi$, a graph representation that is well-known and studied in the literature for a wide range of logic-based formalisms, and, in particular, for ASP \cite{ijcai:JaklPW09,lpnmr:FichteHMW17}. The incidence graph of an ELP $\Pi$ is the graph $G = (V, E)$ with $V = \mathcal{A} \cup \mathcal{R}$ and $\{a, r\} \in E$ iff atom $a \in \mathcal{A}$ occurs in rule $r \in \mathcal{R}$ in $\Pi$. It is not difficult to verify that the $\sigma$-structure $\mathfrak{P}$, when represented as a graph, mirrors the incidence graph of $\Pi$ precisely. From this correspondence, Theorem~\ref{thm:courcelle}, and Lemma~\ref{lem:msoencoding}, we thus obtain the following, fundamental parameterized complexity result: \begin{theorem}\label{thm:elpfpt} % Let $\Pi$ be an ELP, let $G$ be its incidence graph, and let $\tw{G} \leqslant k$, for some integer $k$. Then, checking whether $\cwvs{\Pi} \neq \emptyset$ can be done in time $O(f(k) \cdot |\Pi|)$, for some function $f$ that does not depend on $|\Pi|$. % \end{theorem} Using a simple extension of the MSO construction in the proof of Lemma~\ref{lem:msoencoding}, we can state a similar result for the formula evaluation problem. The MSO formula\medskip\\ % $\exists \variables{P} \exists \variables{N} \exists \variables{U}\, \fullatom{cwv}{\variables{P}, \variables{N}, \variables{U}} \wedge \fullatom{entails}{\variables{P}, \variables{N}, \variables{U}, \phi}$ \\ % $\wedge \neg \left( \exists \variables{P}' \exists \variables{N}' \exists \variables{U}'\, (\variables{P}' \subset \variables{P} \vee \variables{N}' \subset \variables{N}) \wedge \fullatom{cwv}{\variables{P}', \variables{N}', \variables{U}'} \right)$\smallskip\\ % checks whether there is at least one WV that satisfies formula $\phi$, where the atom $\fullatom{entails}{\variables{P}, \variables{N}, \variables{U}, \phi}$ encodes the check that the WV represented by $\variables{P}$, $\variables{N}$, and $\variables{U}$ cautiously entails formula $\phi$, a straightforward model-checking construction left to the interested reader. We obtain the following by the same argument as the one for Theorem~\ref{thm:elpfpt}: \begin{theorem}\label{thm:elpentailmentfpt} % Let $\Pi$, $G$, and $k$ be as in Theorem~\ref{thm:elpfpt}, and let $\phi$ be a propositional formula. Then, checking whether $\Pi$ has a WV that cautiously entails $\phi$ can be done in time $O(f(k) \cdot |\Pi|)$, for some function $f$ that does not depend on $|\Pi|$. % \end{theorem} From the above theorems we immediately obtain the fact that ELPs of bounded treewidth can be solved in linear time in the size of the ELP. We will investigate how to exploit this result and pinpoint function $f(k)$ in the next two sections. \section{Bounding Calls to Standard ASP Solvers}\label{sec:torso} Before providing a concrete algorithm for the FPT result in Theorem~\ref{thm:elpfpt} we will investigate a more abstract approach. Many ELP solvers today make use of standard ASP solvers to check the compatibility of a CWI with the set of answer sets of its epistemic reduct. However, the number of calls to such an ASP solver can be at worst exponential. In this section, we will propose an algorithm that makes use of the structural relationships between the epistemic literals in an ELP in order to control the number of ASP solver calls needed and give finer-grained worst-case bounds on this number. In the next section, we will then extend these concepts to a full dynamic programming algorithm that exploits the result in Theorem~\ref{thm:elpfpt}. We first need to define the structural relationship between atoms occurring in epistemic literals in an ELP. To this end, let $\Pi = (\mathcal{A}, \mathcal{R})$ be an ELP. Then, the \emph{primal graph}~$\GP_\Pi = (V, E)$ of~$\Pi$ is a graph with $V = \mathcal{A}$ and $\{a,b\} \in E$ iff atoms $a$ and $b$ with $a\neq b$ appear together in a rule in $\mathcal{R}$, that is, iff $\exists r \in \mathcal{R} : \{ a, b \} \subseteq \atomof{r}$. Two vertices~$a,b$ in the primal graph are \emph{non-epistemically connected} iff there is a path $\langle a, v_1, \ldots, v_n, b \rangle$ with $n \geq 0$ in $\GP_\Pi$, such that each vertex $v_i$, $1 \leq i \leq n$, belongs to the set $\mathcal{A} \setminus \elitof{\Pi}$. Now, the \emph{epistemic primal graph}~$\EP_\Pi = (V, E)$ of~$\Pi$ is a graph with the vertex set $V = \elitof{\Pi}$ being the set of atoms appearing in epistemic literals in $\Pi$, and an edge $\{a, b\} \in E$ iff $a \neq b$ and vertices $a, b$ are non-epistemically connected in $\GP_\Pi$. Intuitively, two atoms from $\elitof{\Pi}$ form an edge in $\EP_\Pi$ iff they are connected in $\GP_\Pi$ via atoms that \emph{do not} appear in epistemic literals. The concept of epistemic primal graph is inspired by the notion of the \emph{torso graph}~\cite{stacs:GanianRS17}, which is used in parameterized complexity to decompose certain abstraction graphs. \begin{example}\label{ex:running2} % \label{ex:running1} % Consider the classic \emph{scholarship eligibility problem} encoding, first investigated by \citeauthor{aaai:Gelfond91} \cite{aaai:Gelfond91}: \smallskip\\ % % $\fullatom{eligible}{\variable{X}} \gets \fullatom{highGPA}{\variable{X}}$\\ % $\fullatom{ineligible}{\variable{X}} \gets \fullatom{lowGPA}{\variable{X}}$\\ % $\bot \gets \fullatom{eligible}{\variable{X}}, \fullatom{ineligible}{\variable{X}}$\\ % $\fullatom{interview}{\variable{X}} \gets \mathbf{not}\, \fullatom{eligible}{\variable{X}}, \mathbf{not}\, \fullatom{ineligible}{\variable{X}}$.\smallskip % Now, assume the above abstract (non-ground) program is instantiated with two students (assume that it is copied twice and $\constant{mike}$ and $\constant{mark}$ are substituted for $\variable{X}$), and that we add the following rules, resulting in ELP~$\Pi$:\smallskip\\ % % $\fullatom{lowGPA}{\constant{mike}} \vee \fullatom{highGPA}{\constant{mike}}$\\ % $\fullatom{lowGPA}{\constant{mark}} \vee \fullatom{highGPA}{\constant{mark}}$\smallskip\\%\smallskip % % Epistemic primal graph~$\EP_\Pi$ contains only four nodes: $\fullatom{eligible}{\constant{mike}}$, $\fullatom{ineligible}{\constant{mike}}$, and the same two for $\constant{mark}$. Further, $\EP_\Pi$ does not have any edges except an edge between the two $\constant{mike}$-atoms, and the same for $\constant{mark}$. Since $\EP_\Pi$ forms a forest, the treewidth of $\EP_\Pi$ is $1$. % \end{example} While the epistemic primal graph does not directly provide new complexity results, it will allow us to give firm guarantees on the number of ASP solver calls needed. As a side-effect, this algorithm is conceptually simpler than the one of the next section, but prepares ideas for later. Algorithms that solve problems of bounded treewidth typically proceed by \emph{dynamic programming (DP)}, bottom-up, along a TD where at each node~$t$ of the TD information is gathered~\cite{jal:BodlaenderK96} in a table~$\tab{t}$. A \emph{table}~$\tab{t}$ is a set of rows, where a \emph{row}~in $\tab{t}$ is a fixed-length sequence of elements. Tables are derived by an algorithm executed in each bag, called \emph{bag algorithm}, which determine the actual content and meaning of the rows. Then, the DP approach~$\algo{DP}_\algo{B}$ for an epistemic logic program~$\Pi$ and a given bag algorithm~$\algo{B}$ performs the following steps: \begin{enumerate \item Construct graph representation~$G$ of~$\Pi$ that is used by~$\algo{B}$. \item Heuristically compute a (nice) TD~$\mathcal{T}=(T,\chi)$~of~$G$. \item\label{step:dp} Execute~$\algo{B}$ for every node~$t$ in TD $\mathcal{T}$ in post-order. As input, $\algo{B}$ takes a node~$t$, a bag~$\chi(t)$, a \emph{solving program} (depending on~$\chi(t)$ and~$\algo{B}$), which is the part of~$\Pi$ currently visible in $t$, and the tables computed at children of~$t$. Bag algorithm~$\algo{B}$ outputs a table~$\tab{t}$. \item Print the result by interpreting the table for root~$n$ of~$T$. \end{enumerate} Next, we define a bag algorithm~\algo{EPRIM} for the epistemic primal graph representation of~$\Pi$. To this end, let~$\Pi = (\mathcal{A}, \mathcal{R})$ be the given input epistemic program, $\mathcal{T} = (T, \chi)$ be a nice TD of~$\EP_\Pi$, $t$ be a node of~$\mathcal{T}$, and~$\prec$ be any arbitrary total ordering among the nodes in~$\mathcal{T}$. To ease notation, for some set~$X\subseteq\elitof{\mathcal{R}}$, let $\connvert{X}$ be the set of vertices (i.e., atoms) from $\GP_\Pi$ that lie on a path that non-epistemically connects any two vertices $a$ and $b$ in $X$.\footnote{Note that we may have that $a = b$, and hence, $\connvert{\{ a \}}$ contains all those vertices from $\mathcal{A} \setminus \elitof{\Pi}$ connected to atom $a$.} We now define the \emph{induced bag rules} for node $t$ of $\mathcal{T}$, denoted by $\mathcal{R}_t^{\EP}$, as follows. For every rule $r \in \mathcal{R}$, $r$ is \emph{compatible} with node $t$ of $\mathcal{T}$ iff (a) $\atomof{r} \cap\connvert{\elitof{\mathcal{R}}} \subseteq \connvert{\chi(t)}$, and (b) $\chi(t)$ is subset-maximal among all nodes of $\mathcal{T}$. Now, $r \in \mathcal{R}_t^{\EP}$ iff $t$ is the $\prec$-minimal node among all nodes~$t'$ in $\mathcal{T}$ with~$\type(t')=\textsf{intr}$ compatible with $r$. The \emph{induced bag program} for node $t$ is the ELP $\Pi_t^{\EP} = (\atomof{\mathcal{R}_t^{\EP}}, \mathcal{R}_t^{\EP})$. Observe that any set of vertices that form a clique within $\EP_\Pi$ will appear together in some node $t$ of $\mathcal{T}$. Note that for each node $t$ of $\mathcal{T}$ that has not a non-subset-maximal bag, or has one, but is not $\prec$-minimal for any compatible~$r\in\mathcal{R}$, the induced bag program is empty. Therefore, we have that for each rule~$r \in \mathcal{R}$ there is exactly one node $t$ of $\mathcal{T}$ where~$r \in \mathcal{R}_t^{\EP}$, and, even more stringent, that each atom $a \in \atomof{r} \setminus \elitof{r}$ appears only in the induced bag program of $t$, but not in any other node. The bag algorithm~\algo{EPRIM} uses the induced bag program as its solving program, and, following the argument above, can check all rules containing atoms from $\mathcal{A} \setminus \elitof{\Pi}$ in a single node. Hence, during its traversal of the tree decomposition, it does not need to store anything about these atoms. Instead, every row computed as part of a table by \algo{EPRIM} for a node~$t$, called an \emph{epistemic row}, is of the form~$\langle I \rangle$, where~$I \subseteq 2^{\{a, \neg a \mid a \in \chi(t) \}}$ is a \emph{partial CWI} (that is, a CWI restricted to and defined w.r.t.\ $\chi(t)$)\footnote{This also means that $J^P$, $J^N$, and $J^U$ are defined w.r.t.\ $\chi(t)$.}. For easy identification, the CWI part of the rows in our algorithms will always be printed using an orange color. Listing~\ref{alg:eprim} presents algorithm~\algo{EPRIM}. For the ease of presentation, it deals with nice TDs only, but can be generalized to arbitrary TDs, requiring a more involved case distinction. Intuitively, since for each leaf node~$t$ we have~$\chi(t)=\emptyset$, bag algorithm~\algo{EPRIM} ensures in Line~\ref{row:leaf} that~$\tab{t}$ consists only of the empty epistemic row. Then, when an atom~$a$ appears in bag~$\chi(t)$ for a node~$t$, but does not occur in child bags, CWI~$J$, with either~$a\in J^P$, $a\in J^N$, or~$a\in J^U$, is computed in Line~\ref{line:introduce}. Further, if the solving program with rules ~$\mathcal{R}_t^{\EP}$ is not empty, i.e., $t$ is the unique node responsible for evaluating all the rules in~$\mathcal{R}_t^{\EP}$, the four conditions of Definition~\ref{def:compat} are checked in Line~\ref{line:compat}. Note that these checks can be performed by calling a black-box ASP solvers a limited number of times for each row in~$t$: {\center\includegraphics[width=.6\textwidth]{eprim.pdf}} \begin{proposition}\label{prop:rowaspcalls} % To compute a row in a table of \algo{EPRIM}, an ASP solver needs to be called at most~$2+2 \cdot |{\chi(t)}|$ times. % \end{proposition} On an abstract level, bag algorithm~\algo{EPRIM} hence provides a method for solving epistimic logic programs~$\Pi$ by means of plain ASP solvers based on the structure of the epistemic literals of~$\Pi$. Whenever an epistemic atom~$a$ is removed in node~$t$, indicating that~$a$ does not occur in any ancestor bag of~$t$, information about the ``role'' of $a$ in any CWI is not needed anymore. Finally, for join nodes, Line~\ref{line:join} ensures that the CWIs in~$\chi(t)$ coincide with the ones that both child bags have in common. The last step is the evaluation of the root node. If in the root a non-empty table is computed by \algo{EPRIM}, then the input ELP $\Pi$ has a CWV. \begin{example}\label{ex:running3} % The epistemic primal graph from Example~\ref{ex:running2} is a ``best case''-scenario for using our TD-based approach: the TD naturally separates the ELP into one part each for the two students, and algorithm \algo{EPRIM} would evaluate the two completely separately, which is exactly what intuition would tell us to do. However, standard ELP solvers seem to struggle in this setting when the number of students increases; cf.\ e.g.\ \cite{ijcai:BichlerMW18}. % \end{example} From Proposition~\ref{prop:rowaspcalls}, and the facts that there are only linearly many TD nodes in the size of the input ELP $\Pi$, and that the number of rows per tree node is at most exponential in the treewidth of $\EP_\Pi$, we obtain the following statement: \begin{theorem}\label{thm:aspcalls} % Given an input ELP $\Pi$ of size $n$, algorithm $\algo{DP}_\algo{EPRIM}$ described above makes at most $\bigO{2^k \cdot n}$ calls to an underlying ASP solver, where $k = \tw{\EP_\Pi}$. % \end{theorem} Correctness of the algorithm presented above can be established along the same lines as for established TD-based dynamic programming algorithms for ASP \cite{ijcai:JaklPW09,lpnmr:FichteHMW17}. A more formal correctness argument will be given in the next section. \section{A Full Dynamic Programming Algorithm}\label{sec:dynamicprogramming} In this section, we will extend the \algo{EPRIM} algorithm in such a way that it no longer relies on an underlying ASP solver, but solves an ELP completely on its own, using dynamic programming. This new algorithm, \algo{PRIM}, will operate on the primal graph, instead of on the epistemic primal graph, and makes use of features of the entire ELP structure. Recall that the primal graph is defined on all atoms of an ELP, instead of just on the ones appearing in epistemic literals. As a result, we need to define a different solving program for TD nodes. To this end, for the remainder of the section, assume we are a given ELP $\Pi = (\mathcal{A}, \mathcal{R})$ to solve. Further, let $\mathcal{T} = (T, \chi)$ be a nice TD of the primal graph~$\GP_\Pi$ of $\Pi$, and $t$ a node of $\mathcal{T}$. Then, the \emph{bag rules} for~$t$, denoted $\mathcal{R}_t$ are defined as the set $\{r \mid r \in \mathcal{R}, \atomof{r} \subseteq \chi(t) \}$, that is, all the rules of~$\Pi$ that are completely ``covered'' by~$\chi(t)$. Further, the \emph{bag program} of~$t$ is defined as $\Pi_t = (\mathcal{A} \cap \chi(t), \mathcal{R}_t)$. In order to define \algo{PRIM}, we need to define what a row of a table for a TD node $t$ looks like. Since \algo{PRIM}, in contrast to \algo{EPRIM}, now also needs to compute the answer sets underlying a CWV, we start with the following, preliminary definition. Let $M \subseteq \chi(t)$ be an interpretation and $\mathcal{C} \subseteq 2^{\chi(t)}$ a set of interpretations w.r.t.\ $\chi(t)$. Then, we refer to a tuple~$\langle M, \mathcal{C} \rangle$ as an \emph{answer set tuple}. This construct, proposed in ~\cite{lpnmr:FichteHMW17}, directly follows the definition of answer sets as in Definition~\ref{def:answerset}, namely, (1) set $M$, called a \emph{witness}, is used for storing (parts of) an answer set candidate of some ASP program, and (2) set~$\mathcal{C}$, called \emph{counterwitnesses}, holds a set of (partial) models of the GL-reduct w.r.t.\ $M$ that are potential subsets of $M$, and hence may be counter-examples to $M$ being extendable to an answer set. An answer set tuple with an empty set of counterwitnesses is referred to as \emph{proving answer set tuple}, which, vaguely speaking, proves that $M$ can be indeed extended to an answer set of some ASP program, which the tuple was constructed for. Answer set tuples are used by algorithm~\algo{PRIM} in order to ``transport'' information---in the form of parts of models restricted to the respective bags---of already evaluated rules of the ASP program from the leaves towards the root during TD traversal. With this definition in mind, we are now ready to define a row for node~$t$ used in algorithm~\algo{PRIM}. Such a row, called \emph{primal row}, is of the form~$\langle \tuplecolor{orange!55!red}{I}, \tuplecolor{blue!45!black}{\mathcal{M}}, \tuplecolor{red!62!black}{\mathcal{K}}, \tuplecolor{green!62!black}{\mathcal{S}} \rangle$, where~$I$ (printed in orange) corresponds to a CWI restricted to~$\chi(t)$ as in \algo{EPRIM}, and sets~$\mathcal{M}, \mathcal{K}, \mathcal{S}$ consist of answer set tuples, where $\mathcal{M}$ (printed in blue) represents a set of possible witness answer sets for Condition~\ref{def:compat:1} of Definition~\ref{def:compat}, $\mathcal{K}$ represents possible witnesses for disproving Conditions~\ref{def:compat:2} and~\ref{def:compat:3}, and $\mathcal{S}$ represents possible witnesses for guaranteeing Condition~\ref{def:compat:4}. In the root node~$n$ of the TD, a specific primal row~$\vec{u} \in \tab{n}$ is required in table~$\tab{n}$ to answer the question of WV existence of $\Pi$ positively, and~\algo{PRIM} is designed to maintain primal rows accordingly. The set~$\mathcal{M}$ of answer set tuples in $\vec{u}$ is used for ensuring Condition (1) of Definition~\ref{def:compat}, where a proving answer set tuple in~$\mathcal{M}$ gives rise to an answer set of some ASP program~$\Pi^{I'}$ of some extension~$I'\supseteq I$ of~$I$. For ensuring Conditions (2) and (3), the set~$\mathcal{K}$ in~$\vec{u}$ shall not contain any proving program tuples, i.e., proving program tuples of~$\mathcal{K}$ are required to vanish (get ``killed'') during the TD traversal, otherwise Conditions (2) or (3) would be violated. Finally, $\mathcal{S}$ in~$\vec{u}$ serves to establish Condition (4), where no non-proving answer set tuple is allowed, that is, each answer set tuple needs to ``survive''. \begin{definition}\label{def:proving} % A primal row~$\langle I, \mathcal{M}, \mathcal{K}, \mathcal{S} \rangle$ is \emph{proving} if (1) there is a~$\langle M, \mathcal{C} \rangle \in \mathcal{M}$ with~$\mathcal{C} = \emptyset$, (2) there is no~$\langle M, \mathcal{C} \rangle \in \mathcal{K}$ with~$\mathcal{C} = \emptyset$, and (3) there is no~$\langle M, \mathcal{C} \rangle \in \mathcal{S}$ with~$\mathcal{C} \neq \emptyset$. % \end{definition} {\center\includegraphics[width=.6\textwidth]{prim.pdf}} Algorithm~\algo{PRIM} is designed to ensure existence of such a proving primal row in~$\tab{n}$ of root node~$n$ of the TD, iff a WV exists. \algo{PRIM} uses the following constructs, assuming an answer set tuple~$\langle M, \mathcal{C} \rangle$, an atom~$a \in \mathcal{A}$, and a program~$\mathscr{P}$. For updating an answer set tuple, we let $\updtCand(M, \mathcal{C}, \mathscr{P}) {\,=\,} \{\langle M, \mathcal{C} \cap \mods{\mathscr{P}^M} \rangle \mid M \models \mathscr{P} \}$. When some atom~$a$ is introduced in an $\textsf{intr}$-type node, we need to distinguish between $a$ already being in the interpretation, or not. We define $\intrCand(a, M, \mathcal{C}, \mathscr{P}) = \updtCand(\MAIR{M}{a}, \bigcup_{C \in \mathcal{C}} \{ M, C, \MAIR{C}{a} \}, \mathscr{P}) \cup \updtCand(M, \mathcal{C}, \mathscr{P})$, which is generalized to sets~$\mathcal{M}$ of answer set tuples as follows: $\updtCands(a, \mathcal{M}, \mathscr{P}) {\,=\,} \bigcup_{\langle M, \mathcal{C} \rangle \in \mathcal{M}} \intrCand(a, M, \mathcal{C}, \mathscr{P})$. Finally, to obtain good runtime bounds later and at the same time still ensure Condition (4) of Definition~\ref{def:compat} using a set~$\mathcal{S}$ of answer set tuples, we need to find, for each answer set tuple in~$\mathcal{S}$, exactly one ``succeeding'' answer set tuple among the set~$\mathcal{M}$ of answer set tuples. We formalize this by defining $\survivalSets(a, \mathcal{M}, \mathcal{C}, \mathscr{P}) = \{ \mathcal{S}' \mid \mathcal{S}' \subseteq \mathcal{M}, |\mathcal{S}'| = |\mathcal{S}|, \text{ for every } \langle M, \mathcal{C} \rangle \in \mathcal{S} : \intrCand(a, $ $M, \mathcal{C}, \mathscr{P}) \cap \mathcal{S}' \neq \emptyset \}$. Bag algorithm~\algo{PRIM}, as presented in Listing~\ref{alg:prim}, again distinguishes between different types of tree nodes during the post-order traversal of $\mathcal{T}$. For leafs, Line~\ref{line:leafp} returns the primal row consisting of the empty CWI, where the second component~$\mathcal{M}$ contains only the proving answer set tuple~$\langle \emptyset, \emptyset \rangle$ (since~$\emptyset$ is the smallest model of the empty program), and~$\mathcal{K}, \mathcal{S}$ are both empty as there is no need to remove or create answer set tuples, respectively. If an atom~$a \not\in \elitof{\Pi}$ is introduced, Line~\ref{line:IntrUpdt} updates~$\mathcal{M}$ and $\mathcal{K}$. Line~\ref{line:IntrSucc} ensures that each answer set tuple in~$\mathcal{S}$ has at least one succeeding answer set tuple in every primal row of table~$\tab{t}$. If an atom~$a \in \elitof{\Pi}$ is introduced, the sets~$\mathcal{M}$, $\mathcal{K}$, and~$\mathcal{S}$ are similarly updated in Line~\ref{line:IntrUpdtE}, but the three cases (true, false, and unknown) need to be considered when adding $a$ to $I$. Conditions (2) and (3) are handled in Line~\ref{line:Condition23}, where answer set tuples in~$\mathcal{M}$ that violate these two conditions (for $a \in J^P$, and $a \in J^N$, respectively) are added to~$\mathcal{K}$. For Condition (4), Line~\ref{line:Condition4} ensures that if~$a\in J^N$, there is both a succeeding answer set tuple where~$a$ is set to true, and one where it is false. If an atom~$a$ is removed, $a$ is removed from the primal rows in Line~\ref{line:removeE}, since we have processed every part of~$\Pi$ where~$a$ occurs. Finally, for join nodes, we combine only ``compatible'' primal rows in Line~\ref{line:joinE}. In particular, Line~\ref{line:joinSurvive} ensures that no answer set tuple is lost in~$\mathcal{S}_1$ or~$\mathcal{S}_2$ of the child primal rows. In the following, we briefly mention correctness and runtime bounds for bag algorithms~\algo{PRIM} and~\algo{EPRIM}. \begin{theorem}[Correctness]\label{thm:primcorrectness} % Let $\Pi$ be an ELP~$\Pi$, and $\mathcal{T} = (T, \chi)$ a TD of $\GP_\Pi$. % Then there is a proving row in table~$\tab{n}$ obtained by $\algo{DP}_\algo{PRIM}$ for root~$n$ of~$\mathcal{T}$ iff there is a WV for~$\Pi$. % \end{theorem} \noindent Then, correctness of~$\algo{DP}_{\algo{EPRIM}}$, cf., Sec.~\ref{sec:torso}, is a special case. \begin{corollary}[Correctness of $\algo{DP}_\algo{EPRIM}$] % Let $\Pi$ be an ELP~$\Pi$ and $\mathcal{T} = (T, \chi)$ a TD of~$\EP_\Pi$. % Then there is a row in table $\tab{n}$ for root~$n$ obtained by~$\algo{DP}_\algo{EPRIM}$ iff there is a WV for~$\Pi$. % \end{corollary} \begin{proof}[Proof (Idea)] % $\mathcal{T}$ can be turned into a TD $\mathcal{T}'$ of~$\GP_\Pi$ by adding to each~$\chi(t)$ the set $\mathcal{A}$, where~$(\Pi_t^{\EP})=(\mathcal{A}, \cdot)$. % $\algo{DP}_\algo{EPRIM}$ on~$\mathcal{T}$ is, therefore, just a simplification of $\algo{DP}_\algo{PRIM}$ on~$\mathcal{T}'$. % \end{proof} \begin{theorem}[Runtime] % $\algo{DP}_\algo{PRIM}$ runs in time~$2^{2^{2^{\mathcal{O}(k)}}}\cdot|\mathcal{A}|$ for epistemic program~$\Pi=(\mathcal{A},\mathcal{R})$, and treewidth~$k$ of~$\GP_\Pi$. % \end{theorem} Indeed, under reasonable assumptions in computational complexity, that is, the \emph{exponential time hypothesis (ETH)}~\cite{jcss:ImpagliazzoPZ01}, one cannot significantly improve~$\algo{DP}_\algo{PRIM}$ since~$\algo{DP}_\algo{PRIM}$ is ETH-tight. \begin{proposition}[cf.\ \cite{soda:FichteHP20}, Theorem~19] % Let $\Pi = (\mathcal{A}, \cdot)$ be an epistemic logic program with $\GP_\Pi$ of treewidth~$k$. % Then, unless ETH fails, WV existence for~$\Pi$ cannot be decided in time~$2^{2^{{2^{o(k)}}}}\cdot2^{o(|\mathcal{A}|)}$. % \end{proposition} \section{Conclusions}\label{sec:conclusions} This work provides the first parameterized complexity analysis of ELP solving w.r.t.\ treewidth. Tree decompositions (TDs) have been successfully used in the \emph{selp} ELP solver \cite{ijcai:BichlerMW18}, but for a different purpose, namely that ELPs are rewritten into non-ground ASP programs with long rules, which are then split up using \emph{rule decomposition} \cite{tplp:BichlerMW16}. Our approach partitions an ELP according to a TD, and then solves the entire ELP by evaluating these parts in turn. Note that this is different from (ELP) splitting~\cite{lpnmr:CabalarFC19,iclp:LifschitzT94}. For future work, we aim to extend our DP algorithm to the formula evaluation problem, which, viz.\ Theorem~\ref{thm:elpentailmentfpt}, should work in a similar fashion to our existing algorithms, given a suitable graph representation. Furthermore, we would like to apply our approach to other ELP semantics; cf.\ \cite{aaai:Gelfond91,lpnmr:Gelfond11,logcom:KahlWBGZ15}. There, we do not anticipate large obstacles, since most semantics are reduct-based, and the reduct is an easily exchangeable part in our algorithms. \section*{Acknowledgements} M.\ Hecher and S.\ Woltran were supported by the Austrian Science Fund (FWF) under grants Y698 and P32830. Final version of this document will be available under AAAI proceedings. \bibliographystyle{abbrvnat}
\section*{Supplement}% \setcounter{table}{0} \renewcommand{\thetable}{S\arabic{table}}% \setcounter{figure}{0} \renewcommand{\thefigure}{S\arabic{figure}}% } \usepackage{setspace}% \journal{\textbf{ }} \begin{document} \begin{frontmatter} \title{Towards the Next Generation of Retinal Neuroprosthesis: Visual Computation with Spikes} \author[pku,pchen]{Zhaofei Yu} \author[uk]{Jian K. Liu \corref{cor1}} \cortext[cor1]{Corresponding author. } \ead{<EMAIL> } \author[pku,pchen]{Shanshan Jia} \author[pku,pchen]{Yichen Zhang} \author[pku,pchen]{Yajing Zheng} \author[pku,pchen]{Yonghong Tian} \author[pku,pchen]{Tiejun Huang} \address[pku]{National Engineering Laboratory for Video Technology, School of Electronics Engineering and Computer Science, Peking University, Beijing, China} \address[pchen]{Peng Cheng Laboratory, Shenzhen, China} \address[uk]{ Centre for Systems Neuroscience, Department of Neuroscience, Psychology and Behaviour, University of Leicester, Leicester, UK} \begin{abstract} Neuroprosthesis, as one type of precision medicine device, is aiming for manipulating neuronal signals of the brain in a closed-loop fashion, together with receiving stimulus from the environment and controlling some part of our brain/body. In terms of vision, incoming information can be processed by the brain in millisecond interval. The retina computes visual scenes and then sends its output as neuronal spikes to the cortex for further computation. Therefore, the neuronal signal of interest for retinal neuroprosthesis is spike. Closed-loop computation in neuroprosthesis includes two stages: encoding stimulus to neuronal signal, and decoding it into stimulus. Here we review some of the recent progress about visual computation models that use spikes for analyzing natural scenes, including static images and dynamic movies. We hypothesize that for a better understanding of computational principles in the retina, one needs a hypercircuit view of the retina, in which different functional network motifs revealed in the cortex neuronal network should be taken into consideration for the retina. Different building blocks of the retina, including a diversity of cell types and synaptic connections, either chemical synapses or electrical synapses (gap junctions), make the retina an ideal neuronal network to adapt the computational techniques developed in artificial intelligence for modeling of encoding/decoding visual scenes. Altogether, one needs a systems approach of visual computation with spikes to advance the next generation of retinal neuroprosthesis as an artificial visual system. \end{abstract} \begin{keyword} Visual Coding \sep Retina \sep Neuroprosthesis \sep Brain-machine Interface \sep Artificial Intelligence \sep Deep Learning \sep Spiking Neural Network \sep Probabilistic Graphical Model \end{keyword} \end{frontmatter} \section{Introduction} The concept of precision medicine has been proposed for a few years. Mostly, it has been referred to customize healthcare to individual patient. Nowadays, the advancements of artificial intelligence techniques, including both hardware and software/algorithm, make the process of healthcare more precise for each individual patient such that the communication between healthcare device/service and patient is specifically designed and justified. Neuroprosthesis is such a precise medicine device. As a way of therapy besides traditional pharmacological treatment, it usually has a direct interaction with neuronal activity, in particular, neuronal spikes, for each individual brain~\cite{chapin1999real,taylor2002direct,musallam2004cognitive,moritz2008direct,velliste2008cortical,gilja2012high,hochberg2012reach,collinger2013high,shanechi2017rapid}. It consists of a series of devices that could substitute some part of our body and/or brain, such as motor, sensory and cognitive modality that has been damaged. As the brain is the central hub to control and exchange information used by our motor, sensory and cognitive behavior, the performance of neuroprosthesis has to rely on how to better analyze the neuronal signal used by neuroprosthesis. Therefore, besides the development of neuroprosthesis hardware, better algorithms are the core feature of neuroprosthesis for better performance~\cite{gilja2012high,Nirenberg2012, seeber2016history}. Motor neuroprosthesis has a long history with intensive studies, in particular with the recent techniques where cortical neuronal spikes can be well recorded and used to control neuroprosthesis~\cite{gilja2012high}. In term of sensory neuroprosthesis, cochlear implants are severed as the most widely used neuroprosthesis, and have a fair good performance for helping hearing loss, although there are many remaining questions about how to improve its performance in a noisy environment and its effect on neuronal activity of downstream auditory cortex~\cite{seeber2016history, johnson2017representations}. However, in contrast to the intensive computational modeling of cochlear implants~\cite{seeber2016history}, retinal neuroprosthesis is much less well studied, and has a much worse performance for restoring the eyesight, although a few types of retinal neuroprosthesis are being used in clinical trials~\cite{yue2016retinal, ha2016towards}. The retina consists of three layers of neurons with photoreceptors, bipolar cells, and ganglion cells together with inhibitory horizontal and amacrine cells in between. Photoreceptors receive the incoming light signal encoded natural environment and transform it into the electrical activity that is modulated by horizontal cells. Then these activities are sent to bipolar cells and amacrine cells to further processing. In the end, all of these signals go to the output side of the retina, where retinal ganglion cells, as the only output neurons, produce a sequence of action potentials or spikes, which are transmitted via the optic nerve to various downstream brain regions. Essentially, all the visual information about our environment, both in space and time, is encoded by these spatiotemporal patterns of spikes from ganglion cells. Many types of eye diseases are caused by neuronal degeneration of photoreceptors, whereas the outputs of the retina, ganglion cells, remain healthy. One type of therapy would be to develop an advanced retinal prosthesis to directly stimulate ganglion cells with an array of electrodes. Retinal neuroprosthesis also has a relatively long history of research~\cite{shepherd2013visual}. However, much effort is dedicated to material design of retinal neuroprosthesis hardware~\cite{yue2016retinal,ha2016towards, shepherd2013visual, ghezzi2015retinal,tang2018nanowire, goetz2016electronic}. Recently, it has been suggested that employing better neural coding algorithms were able to improve the performance of retinal neuroprosthesis~\cite{Nirenberg2012}, where it was shown that on top of neuroprosthesis, reconstruction of visual scenes can be significantly improved by adding an encoder converting input images into spiking codes used by retinal ganglion cells, then using these codes to drive transducers, such as electrodes, optogenetic stimulators, or other components for vision restoration. Therefore, one needs better computational models to advance the performance of retinal neuroprosthesis. Comparing to other neuroprostheses where stimulus signals are relatively simple, retinal neuroprostheses deal with dynamical visual scenes in space and time with higher order correlations. Low performance is mainly due to a major difficulty that there is no clear understanding of how ganglion cells encode rich visual scenes. Much of our knowledge has been documented through experiments with simple artificial stimuli, such as white noise images, bars, and gratings, etc. It remains unclear how our retina processes complex natural images with its neuronal underpinnings. In recent years, artificial intelligence has seen remarkable progress in analyzing complex visual scenes, including natural images and movies. Thus, now it is possible to develop novel functional artificial intelligence models to study the encoding and decoding of natural scenes by analyzing retinal ganglion cell spiking responses. In this paper, we review some of the recent progress on this topic. Most of the studies on visual coding can be roughly classified into two streams. The first and traditional stream can be named as feature-based modeling approach, where visual features or filters can be aligned with some biophysical properties, such as receptive field, of the retinal neurons. The second and relative new stream can be named as sampling-based modeling approach, where statistics of visual scenes, such as pixels, are formulated by some probabilistic models. We review some of the core ideas emerged from both approaches for analysis of visual scenes with the utility of neural spikes with the aim for the next generation of retinal neuroprosthesis where computational modelling plays an essential role. The organization of this review is as follows. Sec.~\ref{retina} gives an introduction of the biological underpinnings of the retina with a focus on its inner neuronal circuit. We emphasize that the retinal circuit carries out rich computations that are beyond the dynamics of single cells of the retina. In Sec.~\ref{computing}, in contrast to the view that the retina is a simple neural network, we hypothesize that the retina is highly complex and comparable to some aspects of the cortex with different network motifs for specialized computations to extract visual feature. In particular, we outline three views of the retinal neuronal circuit as feedforward, recurrent and winner-take-all network structures. For each of these three viewpoints, we provide some evidence and recent results that fit into the proposed framework. In Sec.~\ref{coding}, feature-based modeling approach is discussed, where the models of encoding and decoding visual scenes based on feature extraction by the retina are reviewed. For encoding, we first summarize biophysical models that directly analyze and fit neuronal spikes to obtain some neuronal properties such as receptive field of the neuron. Then we review some encoding models based on artificial neural networks (ANNs) that use recent state-of-the-art machine learning techniques to address complex natural scenes. For decoding, however, one has to rely on statistical and machine learning models aiming for reconstruction of visual scenes from neuronal spikes. We review some of these decoders with an emphasis on how they can be used for retinal neuroprosthesis to get a better performance for both static images and dynamical videos. In Sec.~\ref{net}, sampling-based modeling approach is discussed, where we give an overview of the retinal circuitry in which visual computation can be implemented by probabilistic graph models and spiking neuronal networks, such that different functional networks can conduct visual computations observed in the retina. We first introduce the basis of neural computation with spikes. Some modeling frameworks about neuronal spikes and spiking neural networks (SNNs) are discussed with a sampling perspective. We then propose that studying of the retinal computation should go beyond the classical description of dynamics of neurons and neural networks by taking into account probabilistic inference. We review some of the recent results about how to implement probabilistic inference with SNNs. Traditionally, these approaches are applied to theoretical studies of the visual cortex. Here we demonstrate that how one can use these similar computational approaches for the retinal computation. Finally, Sec.\ref{summary} concludes the paper with discussion for some possible research directions in the future. \section{ Visual computation in neuronal circuit of the retina }\label{retina} \begin{figure*}[t] \begin{center} \includegraphics[width=1.5\columnwidth]{Figure_retina_detail.png} \end{center} \caption{Illustration of the retinal neuronal circuit. Visual scenes are converted by photoreceptors at the first layer, where rods encode the dim light, and cones encode color. Then the signals, after modulated by horizontal cells, send to bipolar cells at the second layer. The outputs are sent to the third layer consisted of amacrine cells and ganglion cells for further processing. Final signals of the retina are the spikes of ganglion cells transferred to the cortex. Besides chemical synapses between cells, massive gap junctions exist between different and same types of cells, e.g. ganglion-ganglion cells. } \label{fig:retina} \end{figure*} Fig.~\ref{fig:retina} shows a typical setup of the retinal neuronal circuit. Roughly, there are three layers of networks consisted of a few types of neurons. Following the information flow of optical visual scenes, photoreceptors convert the light with a wide spectrum of intensities, from dim to bright, and colors, from red, green to blue, into electrical signals that are then modulated by inhibitory horizontal cells. Next, these signals are transferred to excitatory bipolar cells that carry out complex computations. The outputs of bipolar cells are mostly viewed as graded signals, however, the recent evidence suggests that bipolar cells could generate some fast spiking events~\cite{Baden2011}. Then, inhibitory amacrine cells modulate these outputs in different ways to make computations more efficient, specific and diverse~\cite{Jadzinsky2013}. At the final stage of the retina, the signals pass to the ganglion cells for final processing. In the end, ganglion cells send their spikes to the thalamus and cortex for higher cognition. Each type of neuron in the retina has a large variation of morphology, for example, it has been suggested that in the mouse retina, there are about 14 types of bipolar cells~\cite{euler2014retinal, franke2017inhibition}, 40 types of amacrine cells~\cite{helmstaedter2013connectomic}, and 30 types of ganglion cells~\cite{Baden2016}. Besides neurons, one unique feature of any neuronal circuitry is the connections between neurons. Typically, connections between neurons in the retina are formed by various types of chemical synapses. However, there are a massive number of electrical synaptic connections, or gap junctions, between different types of cells and within the same type of cells~\cite{bloomfield2009diverse, grimes2018parallel, Brien2018plasticity, rivlin2018flexible}. It remains unclear what is the functional role of these gap junctions~\cite{bloomfield2009diverse}. We hypothesize that gap junctions have a functional role of recurrent connections to enhance visual computation in the retina, which will be discussed in later sections. In the field of the retinal research, most of the studies are based on the traditional view that neurons in the retina have static receptive fields that are considered as spatiotemporal filters to extract local features from visual scenes. We also know that the retina has many levels of complexities in the information processing, from photoreceptors, bipolar cells, to ganglion cells. In addition, the functional role of modulation of inhibitory horizontal and amacrine cells are still unclear~\cite{Jadzinsky2013, demb2015functional}. Perhaps, the only relative well-understood example is the computation of direction selectivity in the retina~\cite{briggman2011wiring, wei2011organization, zhang2017establishing,mauss2017visual}. The retinal ganglion cells are the only output of the retina, but their activities are tightly coupled and highly interactive with the rest of the retina. These interactions not only make the retinal circuitry complicated in its structure, but also make the underlying computation much richer for visual processing. Therefore, the retina should be considered smarter than what scientists believed~\cite{Gollisch_2010}. These observations lead us to rethink the functional and structural properties of the retina. Given such a complexity of neurons and neuronal circuits in the retina, we propose that the computations of visual scenes carried by the retina need to go beyond the view that the retina is just like a feedforward network making the information go through. Like the cortical cortex, the retina also has lateral inhibition and recurrent connections (e.g. gap junctions), which make the retina inherit various motifs of neural networks for specific computation of extracting different features of visual scenes, just like the visual processing occurred in the visual cortex~\cite{navlakha2017network,douglas2004neuronal,braganza2018circuit}. It should be noted that compared to the visual cortex, the detailed understanding of computation and function of the retina for visual processing has just emerged in recent several decades. Nowadays, the retinal computation of visual scenes by its neurons and neuronal circuits is also refined at many different levels, for details, see recent reviews on neuroscience advancements on the retina~\cite{Jadzinsky2013, euler2014retinal, bloomfield2009diverse, grimes2018parallel, Brien2018plasticity, rivlin2018flexible, demb2015functional, Gollisch_2010}. \section{Computational framework for the retina}\label{computing} \begin{figure*}[t] \begin{center} \includegraphics[width=0.7\textwidth]{Figure_retina_3net.png} \end{center} \caption{ Illustration of different computational network motifs. (A) Part of retinal circuity shows different network motif as feedforward, recurrent and winner-take-all (WTA) subnetwork. (B) Abstract representation of different types of neural networks used by modeling, where stimulus is first represented by the activities of afferent neurons, and then feed into a network of excitatory and/or inhibitory neurons for computation. Shadowed networks indicate the same motifs. (C) Abstract computation specifically used by certain typical ANNs, such as convolutional neural networks (ConvNNs), Markov random fields (MRFs) and hidden Markov models (HMMs). Note ANNs can use one or mixed computational network motifs shown in (B). } \label{fig:3net} \end{figure*} Different pieces of neuroscience experimental evidence from the retinal circuit seems to be hard to unify from the viewpoint of biology~\cite{werblin2011retinal}. Here we instead hypothesize that one has to study the computation carried out by the retinal circuit with a combination of diverse neural network structure motifs. Such an as-yet-to-emerge computational framework could benefit our understanding of visual computation by utilizing emerged machine learning techniques in recent years~\cite{Lecun2015Deep}. When looking at the complete overview of the retinal neuronal circuitry as in Fig.~\ref{fig:retina}, it seems rather complicated. After extracting some features of network structures, there are some simple network motifs emerged. Here we only focus on three types of network structures: feedforward, recurrent and winner-take-all networks as illustrated in Fig.~\ref{fig:3net}, and hypothesize that they play different functional roles in visual computation of the retina. However, the retina is more than a hybrid of these three network motifs, but consists of multiple types of networks to form a hypercircuit~\cite{werblin2011retinal}, where more computational features can be extracted with the advancement of experimental and computational techniques. Such a hypercircuit view provides the biological basis for a potential unified framework of the retinal computation, although how these different networks work together more efficiently for visual computation is still an open question. \subsection{Feedforward network} Feedforward network is the most classical view of the retina as the direction of the visual information flow as in Fig.~\ref{fig:3net}(A-B). Feedforward information flow of the light goes through the retina by three major types of cells, photoreceptors, bipolar cells and ganglion cells. The other two types of inhibitory cells play a modulation role, which has been ignored simply in this viewpoint. The biological basis of this view can be seen from the fovea where excitatory cells play a major role, but inhibitions are little~\cite{sinha2017cellular}. In the fovea, there is a direct cascade processing from photoreceptors, to bipolar cells, and then ganglion cells as outputs. The advantage of feedforward network has been demonstrated by the advancement of ANNs in recent years, in particular, some breakthroughs have been made in the framework of deep convolutional neural networks (CNNs)~\cite{Lecun2015Deep}. A simple CNN with three layers as in the retina is shown in Fig.~\ref{fig:3net}(C), where a convolutional filter plays a role of the receptive field of retinal cell. A cascade processing of visual inputs is computed by the receptive field of each individual neuron in the retina. The pooling of computation from the previous layer passes to a neuron in the next layer. Recent studies highlight the similarity between the structure of CNNs and retinal neural circuitry~\cite{yan2017revealing, maheswaranathan2018deep}, which will be discussed in later sections. \subsection{Recurrent network} Recurrent network has been seen as a major type in the cortical cortex. The dynamics of recurrent network~\cite{Brunel2000a, Liu2009a, liu2011learning}, together with the diversity of synaptic dynamics and plasticities~\cite{zampini2016mechanisms,Bi2001}, are important for understanding the brain's function. Here we hypothesize that recurrent connections are also important for the retina. The formation of recurrent connections in the retina is mainly produced by a massive number of gap junctions as in Fig.~\ref{fig:3net}(A). Unlike chemical synapses, gap junctions are bidirectional or symmetric. Within and between all types of cells in the retina, gap junctions are used to form short connections between neighboring cells. However, the functional role of these gap junctions remains unclear~\cite{bloomfield2009diverse}. From the computational viewpoint, recurrent connections formed by gap junctions make the retinal circuit like a probabilistic graphical model (PGM) of undirected Markov random field (MRF) as in Fig.~\ref{fig:3net}(B-C). PGM provides a powerful formalism for multivariate statistical modeling by combining graph theory and probability theory~\cite{koller2009probabilistic}. It has been widely used in computer vision and computational neuroscience. In contrast to MRF, there is another type of PGM that is mainly referred to Bayesian network, in which the connections have a direction between nodes. Fig.~\ref{fig:3net}(C) shows one type of Bayesian network, termed hidden Markov model (HMM). In recent years, much effort has been dedicated to implement these PGMs by SNNs, which setup an insightful connection between artificial machine computation by PGMs and neural computation observed in the brain, as well as visual computation in the retina. \subsection{Winner-take-all network} Finally, we hypothesize that the retinal circuit has a computational network unit as winner-take-all (WTA) motif. In the cortical cortex, WTA circuit has been suggested as a powerful computational network motif to implement normalization~\cite{carandini2012normalization}, visual attention~\cite{itti1998model}, classification~\cite{roy2017online}, and others~\cite{kappel2014stdp}. In the retina, there are two types of inhibitory neurons sitting in the first two layers. Horizontal cells target photoreceptors and relay the light information to bipolar cells. Amacrine cells modulate the signals between bipolar cell terminals and ganglion cell dendrites. In both types of cells, there are some specific subtypes that are wide-filed or polyaxonal such that they spread action potentials over a long distance greater than 1 mm~\cite{werblin2011retinal}. From the computational viewpoint, this hypercircuit feature of the retina plays a similar functional role as a WTA network motif. The recent study shows that MRF can be implemented by a network of WTA circuit, which suggest that the WTA could be the minimal unit of probabilistic inference for visual computation~\cite{yu2018winner}. \subsection{Rich computation with network motifs} Above we briefly reviewed the retinal circuitry and pointed out three basic neural network motifs that play a role as units for complex computations conducted in the retina. However, there are more different network motifs suggested in cortical microcircuits~\cite{braganza2018circuit}, and these motifs are also suggested to involved in the retinal computation to form the retinal hypecircuit~\cite{werblin2011retinal}. Such a hypercircuit view of the retina makes most of the methods, which are developed for studying visual processing in the cortex, transfer to investigate the retinal computation that embed rich dynamics beyond the traditional view of the retina~\cite{Gollisch_2010}. In particular, quite a few visual functions have been found to be implemented by some certain types of network mechanisms in the retina, see Ref.~\cite{Gollisch_2010} for a detailed discussion. Recent computational advancements in the field of ANN make many breakthroughs on visual tasks. For instance, deep CNN is a hierarchical network modeling of visual computation from the retina to inferior temporal part of the cortex~\cite{Yamins2016Using}. These feature-based models take advantages of the receptive field to capture visual features. However, CNN models suffer a few disadvantages for visual computation, for instance, the architecture of CNN is largely lacking design principles, which may be enhanced by biological neural networks in the brain, including the retina~\cite{Marblestone_2016}. On the other hands, it has been suggested that one needs a hierarchical Bayesian inference framework to understand visual computation~\cite{lee2003hierarchical}. In such a sampling-based modeling approach, statistical computation of visual scenes can be formulated by various types of probabilistic models, where different types of network motifs can implement certain computations~\cite{maass2016searching}. Not only in higher part of the cortex, but also in the visual cortex, there are numerous computational techniques in Bayesian models suitable for visual processing of the retina~\cite{lee2003hierarchical}. However, these two approaches are not completely separate, and in fact, there are more close interactions between them~\cite{Marblestone_2016}. We will explain these ideas by using the retina as a model system in below sections: feature-based approach will be discussed in Sec.\ref{coding}, and sampling-based approach will be discussed in Sec.\ref{net}. \section{Encoding and decoding models of the retina}\label{coding} Neural coding is one of the central questions for systems neuroscience~\cite{Knill2004,Simoncelli2001Natural, wu2006complete}. In particular, for visual coding, it is to understand how visual scenes are represented by neuronal spiking activities, and in turn, how to decode neuronal spiking activities to represent the given visual information. The retina serves as a useful system to study these questions. \begin{figure*}[t] \begin{center} \includegraphics[width=14cm]{Figure_cnn.png} \end{center} \caption{ Encoding visual scenes by simplified biophysical model with CNN approach. (A) Simplification of a retinal circuitry to a biophysical model. (Top) Feedforward network represented as part of retina circuitry receiving incoming visual scenes and sending out spike trains from ganglion cells. (Middle) Minimal network with one ganglion cell and five bipolar cells. (Bottom) Biophysical model with five subunits representing five bipolar cells, where each has a linear filter as the receptive field, and a nonlinearity. The outputs of five subunits are pooled and rectified by another output nonlinearity. The final output can be sampled to give a spike train. (B) Representative CNN model trained with images as input and spikes as output. Here there are two convolutional layers and one dense layer. (C) After training, the CNN model shows the same receptive field as the biophysical model for modeled ganglion cell. (D) Convolutional filters after training resemble the receptive fields used by the biophysical model of bipolar cells in (A). (A) is adapted from Ref.~\cite{jia2018neural}. (B-D) are adapted from Ref.~\cite{yan2017revealing, yan2018revealing}. } \label{fig:cn} \end{figure*} \subsection{Biophysical encoding model} For understanding the encoding principles of the retina, quite a few models are developed based on biophysical properties of neurons and neuronal circuits in the retina, which have been reviewed recently~\cite{meyer2017models}. Here we briefly review some approaches. The starting point for looking at retinal neuronal computation is to find the receptive fields (RFs) of neurons. The classical approach to mapping the neuronal RF is to patch a single cell and then vary the size of a light spot to obtain the RF structure as a difference-of-Gaussian filter with center excitation and surround inhibition. Later on, a systematic experimental method was developed by using multielectrode array to record a population of retinal ganglion cells, in which one can manipulate light stimulation with various types of optical images, including simple bars, spots, gratings, white noise, and complex well-controlled images and movies. In particular, one can analyze the spike trains of individual neurons when recording a large population at one time with white noise stimulus. A simple reverse correlation technique, termed spike-triggered average (STA)~\cite{Chichilnisky2001a}, can obtain the RF of every recorded ganglion cell. An extension of STA to covariance analysis, termed spike-triggered covariance, serves as a powerful tool for analyzing the 2nd order dynamics of the retinal neurons~\cite{Schwartz2006,Liu_2015}. With the receptive field mapped from each neuron, a simple and useful analysis is based on a linear-nonlinear (LN) model to simulate the cascade processing of light information. There are two stages in the LN model~\cite{sahani2003linear,machens2004linearity}. The first stage is a linear spatiotemporal filter encoding the way of integrating inputs, which represents the sensitive area of the cell, i.e., the characteristic of the receptive field. The second stage is a nonlinear transformation to convert the output of the linear filter to a firing rate. Both properties of the LN model can be easily estimated from the spikes with white noise stimulus~\cite{Liu_2015}. Otherwise, for complicated stimulus signals rather than white noise, one has to use other methods, such as maximum likelihood estimation~\cite{sahani2003linear} and maximally informative dimensions~\cite{Sharpee2004}, to estimate the model components when there are enough data. Until now, quite a few models are developed to refine the building blocks of LN model to advance the model to be more powerful, such as linear-nonlinear Poisson model~\cite{Schwartz2006}, where after nonlinear operation, a Poisson process is used to determine whether a spike would be generated; generalized linear model~\cite{Pillow2008Spatio}, where several more components are included, such as a spike history filter for adaptation, and a coupling filter for influence of nearby neurons. Recently, the models with a few components of subunits to mimic upstream nonlinear components are emphasized, such as nonlinear input model~\cite{McFarland2013}, where a few upstream nonlinear filters are included with the assumption that the input of the neuron is correlated; spike-triggered covariance model~\cite{paninski2003convergence, Rust2005, Liu_2015}, where covariance of spike-triggered ensemble is analyzed with eigenvector analysis to obtain a sequences of filters as a combination of some parts of receptive field; 2-layer linear-nonlinear network model~\cite{maheswaranathan2018inferring}, where a cascade process is implemented by 2-layer LN models; spike-triggered non-negative matrix factorization (STNMF) model~\cite{Liu2017}, where the orthogonality constraint used in spike-triggered covariance is relaxed to obtain a sets of non-orthogonal subunits shown as the bipolar cells in the retina. It has been further shown that STNMF can recover various biophysical properties of upstream bipolar cells, including spatial receptive fields, temporal filters, transferring nonlinearities, synaptic connection weights from bipolar cells to ganglion cell. In addition, a subset of spikes contributed by each bipolar cell can also be teased apart from the whole spike train of one ganglion cell~\cite{jia2018neural}. \begin{figure*}[t] \begin{center} \includegraphics[width=\textwidth]{Figure_movie_cnn2.eps} \end{center} \caption{ Decoding visual scenes from neuronal spikes. (Top) Workflow of decoding visual scenes. Here a salamander swimming video was presented to a salamander retina to get a population of ganglion cells fired with a sequence of spikes. A population of spike trains is used to train a decoder, spike-image decoder, to reconstruct the same video. Receptive fields of ganglion cells are mapped onto the image. Each colored circle is an outline of receptive field. (Bottom) Spike-image decoder is an end-to-end decoder with two stages: spike-image converter used to map a population of spikes to a pixel-level preliminary image, and image-image autoencoder for mapping every pixel to the target pixels in the desired images. Note that there is no unique architecture of spike-image decoder, and the state-of-art model could be adopted and optimized. Exact preliminary images depend on the loss functions used for training. Details of the decoding process can be found in Ref.~\cite{zhang2019reconstruction} and online (see Sec.~\ref{data}). } \label{fig:decoder} \end{figure*} \subsection{ANN-based encoding model} In recent years, ANNs, such as deep CNNs and probabilistic graph models, make some breakthroughs for numerous practical tasks related to system identification of visual information~\cite{Lecun2015Deep}. For instance, with a large set of visual images collected and well-labeled by specific tags, ANNs can outperform the human-level performance for object recognition and classification~\cite{Lecun2015Deep}. Various techniques have been developed to visualize the features of images learned by CNN. However, end-to-end learning of complex natural images makes CNN not very interpretable for the underlying network structure components~\cite{Zeiler2014Visualizing,Smith_2016}. Inspired by experimental observation in neuroscience~\cite{Hassabis2017,Marblestone_2016}, a typical deep CNN has a hierarchical architecture with many layers~\cite{Lecun2010Convolutional}. Out of these layers, there are some layers having a bank of convolutional filters, such that each convolutional filter is served as a feature detector to extract important property of images~\cite{Simonyan2014Very,Krizhevsky2012ImageNet}. Therefore, after training with a large set of images, these convolutional filters play a functional role as neurons in our retina and other visual systems to encode complex statistical properties of natural images~\cite{Simoncelli2001Natural}. The shapes of these filters are sparse and localized, and like receptive fields of visual neurons. Therefore, it is not trivial to use similar the ANN-based approache to investigate the central question of neuronal coding in neuroscience~\cite{Kriegeskorte2015,Yamins2016Using}. In particular, for visual coding, it has been widely accepted that the ventral visual pathway in the brain is a path starting from the retina, lateral geniculate nucleus, then layered visual cortex to reach inferior temporal part of the cortex. This visual pathway has been suggested as the ``what pathway'' for recognition and identification of visual objects. When CNN is used to model experimental neuroscience data recorded in neurons of inferior temporal cortex in monkeys, neuronal response can be predicted very well~\cite{Yamins2013Hierarchical,Yamins_2014,Khaligh-Razavi2014, Yamins2016Using}. Therefore, it is possible to relate the biological underpinnings of visual processing in the brain with those network structure components used in CNN. However, it is not straightforward to interpret this relationship since the pathway from the retina to inferior temporal cortex is complicated~\cite{Yamins2016Using}. One possible and easier way is to use CNN to model the early visual system of the brain, in particular, the retina as introduced above, in which neuronal organization is relatively simple. Indeed, a few studies take this approach by using CNNs and their variations to earlier visual systems in the brain, such as the retina~\cite{yan2017revealing,maheswaranathan2018deep,Batty2017, vance2018bioinspired, yan2018revealing}, V1~\cite{vintch2015convolutional, Antolik2016, kindel2017using,cadena2017deep,Klindt2017}, and V2~\cite{rowekamp2017cross}. Most of these studies are driven by the goal that the better performance of neural response can be archived by using either feedforward and recurrent neural networks (or both). These new approaches increase the complexity level of system identification, compared to conventional linear/nonlinear models~\cite{McFarland2013}. Some of these studies also try to look into the detail of network component after learning to see if and how it is comparable to the biological structure of neuronal networks~\cite{yan2017revealing, maheswaranathan2018deep, Klindt2017}. Fig.~\ref{fig:cn} shows a typical setup of CNN modeling approach for the retina. To understand the fine structure of the receptive field in the retinal circuit, this is important to understand the filters leaned by CNNs. In contrast to the studies where a population of retinal ganglion cells are used~\cite{maheswaranathan2018deep,Klindt2017, mcintosh2016deep}, one can simplify the model from a complicated retinal circuit to a simple network model as in Fig.~\ref{fig:cn}(A), which makes the modeling easier to refine the structure components at the single cell level of the retina. Indeed, it is found that CNNs can learn their internal structure components to match the biological neurons of the retina~\cite{maheswaranathan2018deep, yan2018revealing}, as illustrated in Fig.~\ref{fig:cn} (D). Given that the retina has a relatively clear and simple circuit, and the eyes have (almost) no feedback connection from the cortical cortex, it is a suitable model system as a feedforward neural network, similar to the principle of CNN. Certainly, the contribution from the inhibitory neurons, such as horizontal cells and amacrine cells, play a role for the function of the retina. In this sense, the potential neural networks with lateral inhibition and/or recurrent units are desirable~\cite{Batty2017,mcintosh2016deep}. \subsection{Decoding visual scenes from retinal spikes} From the viewpoint of retinal neuroprosthesis, an ideal encoder model is able to deliver precise stimulation to electrodes with given visual scenes. For this, one has to close the loop to find an ideal decoder model that can readout and reconstruct stimulus of visual scenes from neuronal responses. Reconstruction of visual scenes has been studied over many years. The neuronal signals of interest can be fMRI human brain activities~\cite{thirion2006inverse,naselaris2009bayesian,nishimoto2011reconstructing,wen2017neural}, neuronal spikes in the retina~\cite{marre2015high,Parthasarathy2017,botella2018nonlinear,gollisch2008rapid} and lateral geniculate nucleus~\cite{Stanley1999}, neuronal calcium imaging data in V1~\cite{garasto2018visual}. However, the decoding performance of current methods is rather low for natural scenes, either static natural images or dynamical movies. One particularly interesting example of the movies reconstructed from fMRI data can be found from Ref.~\cite{nishimoto2011reconstructing}. For the retinal neuroprosthesis, one would expect to decode visual scenes by using spiking responses of a population of ganglion cells. Decoding of visual scenes is possible when there are enough retinal ganglion cells available as shown in a recent study with simulated retinal ganglion cells~\cite{Parthasarathy2017}. However, it is unclear whether one can use experimental data to achieve this aim. One can name this decoding approach as a spike-image decoder that performs an end-to-end training process from neuronal spikes to visual scenes. Recently, we developed such a decoder with a model of deep learning neural network that can achieve a much better resolution than previous studies for reconstructing natural visual scenes, including both static images and dynamic videos, from spike trains of a population of retinal ganglion cells recorded simultaneously~\cite{zhang2019reconstruction}. The workflow of the spike-image decoder is illustrated in Fig.~\ref{fig:decoder}. With a setup of multi-electrode array, a large population of the retinal ganglion cells can be recorded simultaneously, and their spikes can be extracted. Then, a spike-image converter is used to map spikes of every ganglion cell to images at the pixel level. After that, one can apply autoencoder deep learning neural network to transfer/enhance spike-based images to original stimulus images. Essentially, this approach has two stages with one as spike-image converter and the other as image-image autoencoder. Most of the previous studies focused on the first stage, which is the traditional decoder to be optimized by some statistical models and/or ANN-based models in either linear or nonlinear fashion~\cite{thirion2006inverse, naselaris2009bayesian, nishimoto2011reconstructing, wen2017neural, marre2015high,Parthasarathy2017, botella2018nonlinear, gollisch2008rapid, Stanley1999}. A recent study trained a separate CNN autoencoder as the second stage to enhance the quality of images~\cite{Parthasarathy2017}. Instead, we found a better quality can be achieved by the end-to-end training process with both stages of spike-to-image converter and image-to-image autoencoder together. However, the detailed architecture of networks used in these two stages could be optimized to an even better quality with other possible deep learning neural networks. \begin{figure*}[t] \begin{center} \includegraphics[width=13cm]{Figure_pr.eps} \end{center} \caption{ Implementation of noise reduction computation with the retinal photoreceptors, probabilistic graph model and spiking neural network. (A) A network of rod photoreceptors connected by gap junctions. (B) A graph of Markov random field (MRF) represented by a network of spiking neurons with subnetworks as winner-take-all (WTA) circuits. Each variable of MRF is represented by one WTA neural network. (C) Noisy images can be denoised by photoreceptor network, then enhanced by CNN. (D) Noisy images can be denoised by MRF implemented by a recurrent spiking neuron network without enhancement. (A) and (C) are adapted from Ref.~\cite{yue2018simple}. (B) is adapted from Ref.~\cite{yu2018winner}. (D) is adapted from Ref.~\cite{zheng2019probabilistic}. } \label{fig:pr} \end{figure*} \section{Modeling the retina with SNNs and PGMs }\label{net} SNNs are thought as the third generation of ANN models, which use neuronal spikes for computation as in the brain~\cite{maass1997networks}. Together with neuronal and synaptic states, the importance of spike timing is also considered in SNNs. It has been proved that SNNs are computationally more powerful than other ANNs with the same number of neurons~\cite{maass1997networks}. In recent years, SNNs have been widely studied in a number of research areas~\cite{ghosh2009spiking, paugam2012computing,jonke2016solving}. In particular, recent studies show that SNNs can be combined with a deep architecture of multiple layers to obtain the similar or better performance as ANNs~\cite{tavanaei2018deep,hu2018spiking, qi2018jointly, xu2018csnn, xiao2018spike}. In addition, the spiking feature of SNNs is particularly important for the next generation of neuromorphic computer chips~\cite{esser2016convolutional,davies2018loihi}. The computational capability of a single neuron is limited. However, when a population of neurons are connected together to form a network, their computational ability can be greatly expanded. In terms of the language of graphs~\cite{maass1996lower}, a SNN can be denoted as a graph $G=(V, E)$, of which $V$ represents the set of neurons and $E \subset V \times V$ represents the set of synapses. Given this equivalence between graphs and neural networks, a different approach termed probabilistic graphical models (PGMs), has also been intensively studied over recent years. The idea of PGM is in that, traditionally, both ANNs and SNNs are doing modeling as a deterministic dynamical system, which has been demonstrated by the classical Hodgkin-–Huxley model~\cite{hodgkin1952quantitative}. However, the computational principles used in the brain seem to go beyond this viewpoint \cite{maass2016searching}. There is an increasing volume of neuroscience evidence that humans and monkeys (other animals as well) can represent probabilities and implement probabilistic computation~\cite{meyniel2015confidence, ernst2002humans,kording2004bayesian}, and the viewpoint of the probabilistic brain is increasingly recognized~\cite{Pouget2013Probabilistic}. Therefore, the network of spiking neurons has been used to implement probabilistic inference at the neural circuit level~\cite{Pouget2013Probabilistic}. The combination of SNNs with probabilistic computation shows an increasing research interest for both understanding the principles of brain computation and solving practical problems with these brain-inspired principles. Traditionally, probabilistic inference studied in the framework of PGM is a combination model of probability theory and graph theory. The core idea of PGMs is taking advantage of a graph to represent the joint distribution among a set of variables, of which each node corresponds to a variable and each edge corresponds to a direct probabilistic interaction between two variables. With the benefit of a graph structure, a complex distribution over a high-dimensional space can be factorized into a product of low-dimensional local potential functions. PGMs can be divided into directed graphical models, such as Bayesian network, and undirected graphical models, such as Markov random fields. Bayesian networks can represent causality between variables, so they are often used to model the process of cognition and perception. While Markov random fields can represent a joint distribution by a product of local potential functions. Implementing PGMs by SNNs is to explain how neuronal spikes can implement probabilistic inference. Inference in SNNs includes two main questions. 1.) Probabilistic coding: how neural activities of a single cell or a population of cells (like membrane potential and spikes) encode probability distribution. 2.) Probabilistic inference: how the dynamics of a network of spiking neurons approximate the inference with probabilistic coding. Obviously, probabilistic coding is the precondition of probabilistic inference. According to the way of expressing probability, probabilistic codes can be divided into three basic types: 1) those that encode the probability of each variable in each state, such as probability code~\cite{anastasio2000using}, log-probability code~\cite{rao2004bayesian,rao2004hierarchical}, and log-likelihood ratio code~\cite{gold2002banburismus,deneve2008bayesian}, 2) those that encode the parameters of a distribution, such as probabilistic population code that takes advantage of neural variability~\cite{milton2011noisy,fisher2004small,ringach2009spontaneous}, that is, neural activities in response to a constant stimulus have a large variability, which suggests that population activities of neurons can encode distributions automatically, 3) those that consider neural activities as sampling from a distribution~\cite{hoyer2003interpreting, fiser2010statistically}, which has been suggested by numerous experiments~\cite{bonawitz2014probabilistic,denison2013rational,gopnik2012reconstructing,bonawitz2012children}. According to these coding principles, there are different ways to implement inference with a network of neurons: 1) implementing inference with neural dynamics that has equations similar to the inference equations of some probabilistic graphical models over the time course~\cite{rao2004bayesian, rao2004hierarchical, deneve2008bayesian, beck2007exact,yu2017neural, ott2006neurodynamics}. This approach is mainly suitable for small-scale SNNs; 2) inference with neural variational approximations that is suitable to describe the dynamics of a large-scale SNN directly \cite{yu2018winner,lee2003hierarchical, george2006belief,george2009towards, steimer2009belief, litvak2009cortical,friston2009free,friston2010free,friston2017graphical,friston2017active}; 3) inference with probabilistic population coding and some neural plausible operations, including summation, multiplication, linear combination and normalization~\cite{ma2006bayesian, beck2008probabilistic, ma2013towards,beck2011marginalization,yu2016sampling}; 4) inference with neural sampling over time where the noise, such as stochastic neural response found in experimental observations~\cite{yang2007probabilistic,gold2007neural}, is the key for neural sampling and inference~\cite{pecevski2011probabilistic, buesing2011neural, habenschuss2013stochastic, legenstein2014ensembles, maass2014noise}. Similarly, one can do the sampling by using a large number of neurons to sample from a distribution at the same time~\cite{ yu2016sampling, shi2009neural, shi2010exemplar, yu2018implementation}, as it is found that the states of neurons in some areas of the brain follow special distributions~\cite{coppola1998unequal, furmanski2000oblique}. Although the above studies are mostly conducted in an abstract way for neural computation of the cortex, including the visual cortex. Here we suggest that these computational techniques can be transferred to study the retinal computation. Fig.~\ref{fig:pr} shows some examples in the retina where there is a similarity at the network level between a network of photoreceptors connected by gap junctions (Fig.~\ref{fig:pr}(A)), a Markov random field model (Fig.~\ref{fig:pr}(B)), and an implementation of MRF by a network of spiking neurons consisted of clusters of winner-take-all microcircuits (Fig.~\ref{fig:pr}(B)). As illustrated in Fig.~\ref{fig:3net}, massive gap junctions play a functional role of recurrent connections between retinal neurons. A recent study shows that a network of rod photoreceptors with gap junctions can denoise images that can be further enhanced by an additional CNN as in Fig.~\ref{fig:pr}(C). It is found that this CNN with photoreceptors included, comparing to other traditional CNNs, can achieve state-of-the-art performance for denoising~\cite{yue2018simple}. Similarly, PGM has also been used to denoise images~\cite{bishop2006pattern}. Recently, it is shown that PGMs can be implemented by SNNs for various types of computations~\cite{ yu2018winner, yu2018implementation, yu2018unification, Yu_2016, guo2017hierarchical, yu2018emergent}, thus, when using SNNs for denoising, similar performance can be achieved~\cite{zheng2019probabilistic}, as illustrated in Fig.~\ref{fig:pr}(D). Probabilistic graphical models have been intensively studied and used for visual coding, but mostly for the cortical process~\cite{lee2003hierarchical}. Here these results suggest that one can study visual computation in the retina by combing several approaches into a systematical framework, including classical PGMs, nontrivial retinal circuit structures, in particular, gap junctions, and recent efforts about the implementation of PGMs by SNNs. Future work is needed to study this framework with more inspirations from the rich network structure of the retina, including recurrent neural network, winner-take-all circuit, and feedforward neural network, even other ubiquitous motifs of cortical microcircuits~\cite{braganza2018circuit}. \section*{ Discussion } \label{summary} Neuroprosthesis is a promising medical device within the framework of precision medicine. With directly talking to the brain of each individual patient, neuroprosthesis needs to be advanced with better computational algorithms for neuronal signal, besides better hardware designs. For the computational capability of the retinal neuroprosthesis, the major difficulty is in that one has to track the complexity of spatiotemporal visual scenes. In contrast to other neuroprostheses, where incoming signals are in a low dimensional space, such as moving trajectory of body arms/legs in 3D space, or auditory signal in a 1D frequency space, our visual scenes are more complex with information in a spatiotemporal fashion. Recent advancements of computer vision make some breakthroughs for analyzing these complex natural scenes, which make a wave of artificial intelligence up to a high attitude than ever before. On the other hand, with experimental advancements in neuroscience, one can collect a large population of neurons simultaneously. In particular, in the retina, a population of spike trains from hundreds of retinal ganglion cells can be obtained with well-controlled visual scenes, such as images and movies~\cite{Onken_2016}. The newest technique can record several thousands of neurons simultaneously~\cite{portelli2016rank, maccione2014following,hilgen2017pan}. This opens the gate for studying the encoding and decoding of visual scenes by using enough spikes to achieve a superb resolution. Out of the current approaches for retinal neuroprosthesis, the implants with electrodes are the mainstream and have been used in clinical trials. However, there are very limited computational models embedded into the retinal prosthesis~\cite{Nirenberg2012, yue2016retinal, yan2018embedded}. With an encoder embedded, it is possible to process incoming visual scenes to better trigger ganglion cells~\cite{Nirenberg2012, yue2016retinal}. The benefit of decoding models is to justify the spiking patterns produced by the targeted downstream neurons. Ideally, electrical stimulation should be able to close to those desired patterns of retinal neural activity in a prosthesis. To compare the similarity between spiking patterns, the traditional way focuses on how to compute the distance between two spike trains in general~\cite{victor2005spike, rossum2001novel}, and in the context of the retinal prosthesis~\cite{shah2017learning}. Another way of doing this is to using decoding models for the purpose of better performance of neuroprosthesis~\cite{li2014decoding, Parthasarathy2017, Nirenberg2012}. Ideally, similar to the other neuroprostheses, where a closed-loop device can be employed to decode neuronal signal to control stimulus, the signal delivered by a retinal prosthesis should be able to reconstruct the original stimuli, i.e., dynamic visual scenes projected into the retina. Thus, one can use a decoding model to reconstruct visual scenes from the spiking patterns of the retinal ganglion cells~\cite{Nirenberg2012, Parthasarathy2017}. Such a direct measure of the precision of spiking patterns with the given decoding model could play a functional role of controlling electrical stimulation patterns generated by the retinal neuroprosthesis, which is the goal of a better and adjustable neuroprosthesis. Here we only focused on the computational modelling issue of one type of retinal neuroprosthsis with electrodes embedded. Certainly, for retinal neuroprosthsis, as an engineering system, there are many parallel difficult issues, such as advanced materials, power designing, communication efficiency, and other related hardware issues, which have been covered by many well-written reviews~\cite{ghezzi2015retinal, goetz2016electronic, yue2016retinal, shepherd2013visual}. One should note that there are different types of visual implants, including those with light retinal stimulation such as optogenetics and chemical photoswitches, as well as implants in other parts, beyond the retina, of the brain. The computational issues raised in this paper are also relevant to the general visual prosthesis. Besides these artificial visual implants, another line of researches focuses on retinal repair by biological manipulation of stem cells, such as induced pluripotent stem cells~\cite{al2014retinal,borooah2013using,mandai2017autologous}, where understanding the computational mechanisms of biological neurons and neuronal circuits is more relevant to encoding visual scenes. For which, the potential decoding models may need more efforts to include the biological principles found in the retina~\cite{Gollisch_2010}. Taken together with all these advancements of neuroscience experiment and prosthesis engineering, now it is time to advance our understanding of visual coding by using the retinal spiking data and ANN-based models to get better computational algorithms for improving the performance of retinal neuroprosthesis. Here we reviewed some of the recent progress on developing novel functional artificial intelligence models for visual computation. Feature-based modelling approach, such as deep CNN, has made significant progresses on analysis of complex visual scenes. For some particular visual tasks, these models can outperform the human~\cite{Lecun2015Deep}. However, the efficiency, generalization ability, and adaption or transfer learning between different tasks, of well-trained models are still far from human performance~\cite{Marblestone_2016}. Sampling-based modelling with neuronal spikes emerges as a new approach, which takes advantage of many factors of the neuronal system of the brain~\cite{maass2016searching}, such as noise at the level of single neurons and synapses~\cite{maass2014noise, buesing2011neural, kappel2014stdp}. With the generic benefit of pixel representation of visual scenes, sampling models can be naturally used for various types of visual computations~\cite{bishop2006pattern}. However, the efficiency of learning algorithms of sampling model is still far from the flexibility of the neuron system of the brain~\cite{yu2016camkii}. Nevertheless, these two approaches could be combined by utilizing both advantages of feature and sampling for visual computation. For this, one needs to consider the retina as a neuronal network where visual computation can be done by different functional network structures. The future work is needed to combine various network motifs into a hybrid network, in which different visual information can be extracted, processed, and computed. Such hybrid or hypercircuit networks have been explored only in very recent years so far, in particular, WTA network motif has been shown as a functional module in more complex hypercircuit network model for various types of computations~\cite{kappel2014stdp, yu2018winner, jonke2016solving, rutishauser2018solving}. One expects that there will be more studies align this line in future. The modelling framework mentioned in this paper is not limited to the application of the retina, but could be used to other visual systems in the brain, and to other artificial visual systems. The main feature of these algorithms is to make use of neural spikes. Advancements of recent artificial intelligence computing align with the development of the next generation of neuromorphic chips and devices, where the new data format is processed as spikes or events~\cite{dong2017spike, bi2018spike, lichtsteiner2008128, li2017cifar10, orchard2015converting}. Therefore, the methods can be applied for neuromorphic visual cameras with spike or event signals as well. One can use these computational retinal models to simulate a population of spikes for encoding and decoding of any given visual scenes, including static natural images, dynamic videos, even real-time videos captured by standard frame-based camera~\cite{zhang2019reconstruction}. Taken neuromorphic hardware and event/spiking computing algorithm together, the next generation of computational vision can develop a better system for artificial vision beyond the purpose of retinal neuroprosthesis. Therefore, we believe that rich interactions between artificial intelligence, computer vision, meromorphic computing, neuroscience, bioengineering, and medicine, will be important for advancing our understanding of the brain, and developing the next generation of retinal neuroprosthesis for artificial vision system. The algorithm part of the artificial eye, including encoding and decoding models of natural visual scenes, will be in particular crucial for such a systems-level approach. \section*{Data availability} \label{data} Data presented in Fig.~\ref{fig:decoder} are publicly available online: Retinal experimental data demonstrated are available at dx.doi.org/10.5061/dryad.4ch10. Reconstruction examples are available at https://sites.google.com/site/jiankliu. \section*{References} \bibliographystyle{elsarticle-num}
\section{Introduction} The Rashba spin-orbit interaction\cite{rashba1960ei,bychkov1984oscillatory,bychkov1984properties} due to the broken inversion symmetry and the atomic spin-orbit coupling (SOC) can result in the momentum-dependent spin splitting of the electron states, which can be used as an effective way for spin manipulation. Rashba effect plays key roles in quantum wells\cite{nestoklon2008electric}, two dimensional (2D) electron gases (2DEG)\cite{lesne2016highly}, and thin films based on traditional III-V semiconductors\cite{PhysRevLett.78.1335}. After intensive investigations, one can tailor the Rashba coupling by electric field and strain, and design artificial microstructures for wide applications. External electric field can be used to modulate the magnitude of Rashba spin splitting in LaAlO$_3$/SrTiO$_3$ (LAO/STO) interface\cite{PhysRevLett.104.126803} and InSe multilayer \cite{premasiri2018tuning}. The Rashba spin splitting can be effectively tuned by varying the interlayer distance in graphene/As-I van der Waals heterostructure\cite{yu2018tunable} and adjusting the halogen doping concentration in doped PtSe$_2$ monolayer\cite{absor2018strong}. It is very interesting to manipulate the Rashba spin-orbit coupling by applying strain, as were done in 2D LaOBiS$_2$\cite{liu2013tunable}, binary alloyed hexagonal nanosheets\cite{zhu2018huge}, 2D heterostructures\cite{zhang2018rashba}, and BiSb monolayer\cite{singh2017giant}. Recently, a 2DEG was observed at KTaO$_3$ (KTO) (100) surface\cite{king2012subband,santander2012orbital}, but the Rashba spin splitting of the 2DEG was not resolved from the angle-resolved photoemission (ARPES) spectrum\cite{king2012subband}. For another 2DEG at an amorphous-LAO/KTO interface, an experimental analysis of the weak anti-localization effect resulted in a Rashba coupling constant 0.1 eV \AA{}, and a 50-fold enhanced Hall mobility of charge carriers with Rashba SOC was achieved\cite{zhang2019hui}. Surprisingly, hysteretic magnetoresistance up to 25 K and anomalous Hall effect up to 70 K were observed at an EuO/KTO interface\cite{zhang2018high}. Theoretically, the magnitude of Rashba spin splitting in KTO surface was studied by applying external electric fields in a symmetrical slab model\cite{PhysRevLett.112.086802}. It is a challenge, however, to avoid the possible background noise or short circuit in the measurement especially for nanospintronic devices because such external electric fields usually need a power supply\cite{zhu2018piezotronic}. It is interesting to investigate the effects of in-plane strain fields on the strength of Rashba spin splitting for KTO surfaces. Actually, strain (stress) is a wonderful approach to manipulate the crystal structures of KTO and thus control their electronic structures and functional properties. Recent studies have demonstrated that the strain can affect the formation and migration of oxygen vacancies in KTO\cite{xi2017strain} and drive electron-hole interchanging of the two opposite surface 2D carrier gases in KTO ultrathin film\cite{Zhang2018Strain}. Here, through first-principles calculations and further analyses, we investigate the in-plane strain dependencies of the structural features, intrinsic electrostatic potentials, band edges, carrier concentrations, carrier effective masses, and Rashba parameters of the KTO slabs. We show that the Rashba spin splitting of ultrathin KTO films can be controlled by applying biaxial stress and thus giant Rashba-like spin splitting can be obtained by applying compressive biaxial stress. In addition, we explore circular photogalvanic currents due to the giant Rashba-like spin splitting in the ultrathin KTO films. More detailed results will be presented in the following. \begin{figure*} \centering \includegraphics[width=0.9\textwidth]{Fig1} \caption{\label{Fig1} (a) Side view of the optimized atomic structure of the KTO ultrathin film (slab) at $\varepsilon_{s}$ = 0\%. (b-m) Band structures of the KTO ultrathin film at different strain values: $\varepsilon_{s}$ = 0\%, -1\%, -2\%, -3\%, -4\%, -5\%, 1\%, 2\%, 3\%, 4\%, 5\%, and 6\%. The K, Ta, and O atoms are shown by the purple, yellow, and red balls, respectively. The Fermi level $E_{f}$ is at the zero energy. } \end{figure*} \section{Computation method } Our first-principles calculation is performed using the projector-augmented wave method within the density-functional theory\cite{hohenberg1964inhomogeneous,kohn1965self}, as implemented in the Vienna Ab initio Simulation Package (VASP)\cite{kresse1999ultrasoft,blochl1994projector}. To describe the exchange-correlation energy, we used the general gradient approximation (GGA) with the Perdew-Burke-Ernkzerhof for solids (PBEsol) parametrization\cite{perdew1996generalized,perdew2008restoring}. The on-site Coulomb interaction in 5d states of transition-metal ions is corrected by the DFT+$U$ (where $U$ is the Hubbard energy) method\cite{anisimov1997first}. The effective value $U_{eff} = 3$ eV is employed for Ta 5d states in this work, as it is well established that such a value is appropriate to describe these strongly-correlated states\cite{Zhang2018Strain}. An Monkhorst-Pack k-point grid of $4\times4\times1$ is used for reciprocal space integration, and the plane wave energy cutoff is set to 500 eV. Our convergence standard requires that the Hellmann-Feynman force on each atom is less than 0.01 eV/{\AA} and the absolute total energy difference between two successive consistent loops is smaller than $1\times10^{-5}$ eV. A fully converged electronic structure is used for further calculation including SOC. A 20 {\AA} thick vacuum layer is used in the KTO-slab geometry. Additional calculations with vacuum layer of 30\AA{} and dipole corrections\cite{DFTPolar} are made for confirmation. When a biaxial stress is applied, the in-plane strain is defined as $\varepsilon_{s}$=($a-a_{0}$)/$a_{0}$ $\times100\%$, where $a_{0}$ is the experimental lattice constant of bulk KTO without strain ($a_{0} = 3.989$ {\AA}\cite{peng2014measurement}) and $a$ is the in-plane lattice constant of strained KTO slab. Given an in-plane strain value, the out-of-plane lattice and all the internal atomic positions are allowed to relax sufficiently during optimization. \section{RESULTS AND DISCUSSION } \subsection{KTO slab under biaxial stress} We construct a KTO slab model to describe the KTO ultrathin film under different biaxial stresses. The slab consists of $m=12$ KTO unit cells along the vertical [001] axis. Fig. \ref{Fig1}(a) shows the optimized structure of the KTO slab at the in-plane strain $\varepsilon_{s}$ = 0\% (zero stress). We study the strained KTO slabs with the in-plane strain $\varepsilon_{s}$ ranging from -5\% (compressive) to +8\% (tensile). With a given in-plane strain, the system is fully optimized, with the out-of-plane strain being determined by requiring that the out-of-plane stress is zero, and thus we can determine the in-plane stress. Actually, this is a system with biaxial stress. With the condition that the out-of-plane stress is zero, however, the in-plane stress is determined by the in-plane strain. Therefore, for convenience, we shall use the in-plane strain $\varepsilon_{s}$ to characterize the strained slabs in the following. It is confirmed that the dipole correction has little effect in these results. In Fig. \ref{Fig1}(b-m), we plot the representative electronic band structures along M ($\pi$,$\pi$)$\rightarrow$ $\Gamma$ (0,0) $\rightarrow$ X (0,$\pi$) of the optimized KTO slabs for $\varepsilon_{s}$ = 0\%, -1\%, -2\%, -3\%, -4\%, -5\%, 1\%, 2\%, 3\%, 4\%, 5\%, and 6\%, respectively. Here, SOC is taken into account, and the k vector is in units of 1/$a$, where $a$ is the calculated lattice constant of the strained KTO slab. From Fig. \ref{Fig1}(g,f,e), it is clear that the KTO slab is insulating for $\varepsilon_{s}$ = -5\%, -4\%, and -3\%. There is a critical strain $\varepsilon_{s}$ = -2\%, as shown in Fig. \ref{Fig1}(d). When $\varepsilon_{s}$ becomes larger than -2\%, the KTO slab is metallic. Therefore, there is a strain-driven insulator-to-metal phase transition at $\varepsilon_{s}$ = -2\%. For the metallic state, there are electron carriers near the $\Gamma$ point and hole carriers near the M point, and they form a 2DEG at the TaO$_2$-terminated surface and a 2D hole gas (2DHG) at the KO-terminated surface. It should be pointed out that the electron concentration in the 2DEG is equivalent to the hole concentration in the 2DHG\cite{Zhang2018Strain}. \begin{figure} \centering \includegraphics[width=0.45\textwidth]{Fig2} \caption{\label{Fig2} The monolayer-resolved intra-monolayer bucklings (a), displacements of cations (Ta, K) with respect to the nearest O anions (b), inter-monolayer spacings (c) of the KTO slab at the different $\varepsilon_{s}$ values. } \end{figure} \begin{figure} \centering \includegraphics[width=0.36\textwidth]{Fig3} \caption{\label{Fig3} (a) The monolayer-resolved plane-averaged electrostatic potentials of the KTO slab for strain $\varepsilon_{s}$ = -5\%, -3\%, 0\%, and 4\%, respectively. (b) The internal electric field ($E_{int}$) as a function of the strain $\varepsilon_{s}$.} \end{figure} To show the stress-driven structural features, we present in Fig. 2 the monolayer-resolved intra-monolayer ionic bucklings (defined as the maximal cation-anion out-of-plane difference within the monolayer), out-of-plane cation displacements with respect to the centers of the nearest O anions, and inter-monolayer spacings of the slab under the in-plane strain values between -5\% and 6\%. It is clear that the surfaces make big changes with respect to the internal region in the three aspects, and in the internal region the three aspects are made nearly independent of monolayers at strong tensile strains. It is interesting that all the three values monotonically decrease with tensile strain, but increase with compressive strain. When the compressive in-plane strain becomes strong, the bucklings of the surface monolayers are substantially enhanced, and the displacements become nearly the same value $d_1$ for all the KO monolayers or $d_2$ for all the TaO$_2$ monolayers, with $d_2>d_1$. By combining the buckling and spacing values, it is visible that the two surface single-unit-cells are a little separated from the main body. Furthermore, we plot in Fig. 3(a) the plane-averaged electrostatic potentials for $\varepsilon_{s}$ = -5\%, -3\%, 0, and 4\% as representative strain values. It is clear that the maximal (or minimal) value increases from the left to right hand side in the cases of $\varepsilon_{s}$ = -3\%, 0, and 4\%, but remains the same for $\varepsilon_{s}$ = -5\%. The internal electric field $E_{int}$ can be estimated from the slope of the plane-averaged electrostatic potential shown in Fig. 3(a)\cite{choe2018band}. The calculated results as a function of $\varepsilon_{s}$ are presented in Fig. 3(b). The internal electric field at the unstrained KTO slab is 7.1$\times 10^{-2}$ V/{\AA}, comparable with a previous study\cite{stengel2009berry}. It is clear that $E_{int}$ slowly decreases with tensile strain, and accelerates with compressive strain, nearly reaching zero at $\varepsilon_{s}$ = -5\%. It is expected that the out-of-plane cation displacements with respect to the neighboring O atoms counteract the out-of-plane polarity of the KTO slab, which originates from the oppositely charged (TaO$_{2}$)+ and (KO)- monolayers. When the compressive strain reaches $\varepsilon_{s}$ = -5\%, corresponding to the in-plane lattice constant 3.789 {\AA}, the potential slope is almost diminished by the increasing polarization due to displacements. The large changes in $E_{int}$ caused by strong compressive strains will change the energy bands. \subsection{Energy band parameters} \begin{figure} \centering \includegraphics[width=0.48\textwidth]{Fig4} \caption{\label{Fig4} The band structures around $\Gamma$ point of the KTO slab with (black) and without (red) SOC for $\varepsilon_{s}$ =-4\%, 0\%, and 5\% are magnified in (a), (b) and (c), respectively. The inset of (b) shows the definition of $E_{R}$ and $k_{R}$ used for estimating the Rashba parameters. The lowest and second lowest $d_{xy}$ bands are labeled by E$_{1}$ and E$_{2}$.} \end{figure} \begin{figure} \centering \includegraphics[width=0.4\textwidth]{Fig5} \caption{\label{Fig5} The strain $\varepsilon_{s}$ dependencies of the energy positions of the E$_{1}$ and E$_{2}$ bands (a), the corresponding electron effective masses $m^\star$ (b), the 2DEG concentration $n$ (c), and the Rashba spin splitting energy $E_R$ and k-vector offset $k_R$ (d). The E$_{1}$ and E$_{2}$ bands are defined in Fig. 2.} \end{figure} To elucidate the band edges and electron concentrations for the strained KTO slab, we present in Fig. 4 (red lines) the magnified electron band structures without SOC of the KTO slab near the $\Gamma$ point for $\varepsilon_{s}$ = -4\%, 0\%, and 5\%. In the absence of SOC, the quantum confinement reduces the initial cubic symmetry of the Ta $t_{2g}$ orbitals in the bulk perovskite. The triple degeneracy (excluding spin) of the $t_{2g}$ bands at the $\Gamma$ point is lifted, splitting the $d_{xy}$ from $d_{xz}$/$d_{yz}$. When the inversion symmetry breaking is taken into account, the Ta atomic SOC further splits the $d_{xz}$/$d_{yz}$ bands into the upper part and the lower one, except for the time-reversal invariant momenta: $\Gamma$, X, and M. For the $\varepsilon_{s}$ = 0\% case shown in Fig. 4(b), only the lowest $d_{xy}$ band is partially occupied and the band minimum (at the zone center) lies 0.089 eV below $E_{f}$. The corresponding electron concentration of the 2DEG is $2.67\times 10^{13} $cm$^{-2}$, which is an order of magnitude smaller than $2\times$ 10$^{14}$cm$^{-2}$ of the 2DEG formed at an experimental KTO surface from the ARPES measurements\cite{king2012subband}. This difference can be interpreted by the low formation energy for the oxygen vacancies at the KTO surface\cite{king2012subband,wadehra2017electronic}, which allows much more electrons in the 2DEG. For the $\varepsilon_{s}$ = 5\% case shown in Fig. 4(c), the minima of the occupied lowest and second lowest $d_{xy}$ states (at the $\Gamma$ point) are 0.182 and 0.027 eV below $E_{f}$, in which the summed electron concentration is 6.98 $\times 10^{13}$cm$^{-2}$, larger than that in the unstrained system. For the $\varepsilon_{s}$ = -4\% case shown in Fig. 4(a), the lowest $d_{xy}$ band lies 0.31 eV above the $E_{f}$, which means that there are no carriers, in contrast with those of the $\varepsilon_{s}$ = 0\% and 5\% cases. It is obvious that there are some Rashba-like spin splitting in the conduction bands of the KTO slab for the $\varepsilon_{s}$ between -5\% and 8\%. To further investigate the Rashba effects, we also present in Fig. 4 the magnified electron band structures with SOC of the KTO slab near the $\Gamma$ point (black lines) for $\varepsilon_{s}$ = -4\%, 0\%, and 5\%. To better describe the properties of the lowest and second lowest $d_{xy}$ conduction bands at the $\Gamma$ point respectively defined by $E_{1}$ and $E_{2}$ in Fig. 4(c), the band edge positions, electron effective masses, and 2DEG concentrations of the $E_{1}$ and $E_{2}$ bands as functions of $\varepsilon_{s}$ are calculated and shown in Fig. 5. In Fig. 5(a), as $\varepsilon_{s}$ changing from -5\% to 4\%, the band edge positions of E$_{1}$ and E$_{2}$ decrease rapidly for large compressive strain, but they change slowly for tensile strain. As $\varepsilon_{s}$ varying from 5\% to 8\%, the band edge positions of $E_{1}$ and $E_{2}$ are almost unchanged. It should be noted that the bottom of the conduction band is less affected by the tensile strain, while it is significantly changed by the compressive strain. In detail, the band edge of the $E_{1}$ band is below $E_{f}$ for $\varepsilon_{s} \geq $-1\%, and that of $E_{2}$ becomes below $E_{f}$ for $\varepsilon_{s} \geq$ 1\%. In Fig. 5(b), the effective mass ($m^*$) is evaluated from a second-order fit of the band energies using $m^* = \frac{\hbar^2}{d^2E(k)/dk^2}$\cite{xia2018universality}. Remarkably, the values of $m^*_1$ for $E_{1}$ and $m^*_2$ for $E_{2}$ in the unstrained KTO system are 0.35 and 0.32 $m_{e}$ ($m_{e}$ is the mass of the free electron), respectively, which are both in excellent agreement with 0.30 $m_{e}$ for the KTO surface 2DEG measured by ARPES\cite{king2012subband}. When the strain changing from $\varepsilon_{s}$ = -5\% to 8\%, $m^*_1$ and $m^*_2$ increase, with $m^*_2$ being always smaller than $m^*_1$. Under $\varepsilon_{s}$ = 8\%, $m^*_1$ and $m^*_2$ reach the maximum values 0.38 and 0.37 $m_{e}$, respectively, which are still smaller than $\sim$ 0.5 and 0.6 m$_{e}$ recently determined for a surface 2DEG on STO\cite{meevasana2011creation}. This suggests that developing high-mobility oxide electronics by KTO is better than by STO. Fig. 5(c) shows the relationship between $\varepsilon_{s}$ and the carrier concentrations. For $\varepsilon_{s} \leq -2\%$, the $E_{1}$ and $E_{2}$ bands are empty and the KTO film is insulating, which is consistent with the critical strain of insulator-metal transition shown in Fig. 1. The carrier concentrations $n_1$ and $n_2$ for the $E_{1}$ and $E_{2}$ bands have the maximum values at the $\varepsilon_{s} = 5\%$ and $4\%$, respectively, and the total 2DEG concentration $n$ of the E$_{1}$ + E$_{2}$ bands reaches the maximum values of 7.06 $\times 10^{13}$cm$^{-2}$ at $\varepsilon_{s}$ = 4\%. This indicates that the conductivity of the 2DEG formed at the surface can be effectively modulated by the in-plane strain. In addition, we summarize in Table I the energy differences ($E_{R1}$) between the first Rashba band minimum and the Fermi level [and valence band edge ($E_t$)] and the spin-orbit splitting energy $\Delta E_{R1}$ between the lowest and the second lowest Rashba doublets, as defined in Fig. 4. {\renewcommand\arraystretch{1.5} \begin{table} \caption{\label{Table1} The three band parameters [$E_{R1}$, $E_{t}$, and $\Delta E_{R1}$ (eV)] and the two Rashba parameters [$E_{R}$ (meV) and $k_{R}$ (\AA{}$^{-1}$)] of the KTO ultrathin film at different strains. } \begin{ruledtabular} \begin{tabular}{cccccc} strain & $E_{R1}$ & $E_{t}$ & $\Delta E_{R1}$ & $E_{R}$ & $k_{R}$\\ \hline $\varepsilon_{s}=5\%$ & 0.188 & 0.822 & 0.339 & 6.6 & 0.046 \\ $\varepsilon_{s}=0\%$ & 0.466 & 1.144 & 0.298 & 8.6 & 0.054 \\ $\varepsilon_{s}=-1\%$ & 0.603 & 1.282 & 0.309 & 20. & 0.096 \\ $\varepsilon_{s}=-2\%$ & 0.810 & 1.516 & 0.309 & 33. & 0.151 \\ $\varepsilon_{s}=-3\%$ & 1.161 & 1.947 & 0.314 & 51. & 0.154 \\ $\varepsilon_{s}=-4\%$ & 1.618 & 2.652 & 0.325 & 90. & 0.24 \\ $\varepsilon_{s}=-5\%$ & 2.228 & 4.136 & 0.093 & 140 & 0.21 \end{tabular} \end{ruledtabular} \end{table} } \subsection{Rashba spin splitting} Since the KTO slab obeys the $C_{4v}$ point group symmetry, the symmetry-allowed linear spin-momentum coupling can be expressed as\cite{bychkov1984properties} $H_{R}=\alpha_{R}(k_{x}\sigma_{y}-k_{y}\sigma_{x})$. According to the linear Rashba model, the dispersion due to the Rashba spin splitting can be described by \begin{eqnarray} E=\frac{\hbar^2}{2m^*}(k\pm k_{R})^2-E_{R}, \label{eq:one} \end{eqnarray} where $k$ is the magnitude of the electron wave vector, $m^*$ is the electron effective mass, $E_{R}=\hbar^2k_R^2/2m^*$ is the Rashba spin splitting energy, and $k_{R}$ is the momentum offset. The in-plane spin polarizations of the "+" and "-" eigenstates are oppositely aligned and normal to the electron wave vector. In the isotropic case, the Rashba coupling constant can be estimated by $\alpha_{R}$ = $2E_{R}/k_{R}$, and $\alpha_{R}$ depends on the strength of SOC and inversion asymmetry\cite{zhong2015giant}. For the KTO slab, the lowest Rashba spin split bands near the $\Gamma$ point are similar to those defined by Eq. (1), and we present $E_{R}$ and $k_{R}$ in Fig. 5(d) for different in-plane strains. The calculated values of $E_{R}$ and $k_{R}$ are summarized in Table I for $\varepsilon_{s}$ = 5\%, 0\%, -1\%, -2\%, -3\%, -4\%, and -5\%. In Fig. 5(d), $E_{R}$ and $k_{R}$ increase drastically with the compressive strain increasing, but they are both almost unchanged for increasing tensile strain. In Table I, noticeably, $E_{R}$ and $k_{R}$ are 140 (90) meV and 0.21 (0.24) {\AA}$^{-1}$ for the KTO slab at $\varepsilon_{s}= -5$\% (-4\%). It is clear that compressive in-plane strain can enhance the Rashba spin splitting energy $E_{R}$. Because $E_{int}$ is near zero at $\varepsilon_{s} = -5.0$\%, $E_{int}$ becomes negative when $\varepsilon_{s}< -5.0$\%, as shown in Fig. 3, and consequently the conduction bands are reconstructed, which leads to smaller $E_{R}$ or substantial deformation of the Rashba bands. Actually, this means that the maximal $E_{R}$ is reached at $\varepsilon_{s}$ = -5\%. For comparison, we summarize the $E_{R}$, $k_{R}$, and $\alpha_R$ values of some typical Rashba systems in Table II. For brevity, we can take $E_{R}$ as the key parameter to characterize such Rashba systems. $E_{R}$ can reach 100 meV for BiTeI van der Waals bulk \cite{ishizaka2011giant}, or 190 meV for $\alpha$-GeTe(111) film \cite{krempasky2016disentangling}. In contrast, for perovskite oxides, the previous maximal $E_{R}$ is 15 meV for KTaO$_3$/BaHfO$_3$ interface \cite{kim2016strongly}. It is clear that our strategy is very efficient to promote the Rashba spin splitting energy in perovskite oxides because our maximal $E_{R}$ value reaches 140 meV at $\varepsilon_{s}$ = -5\%. {\renewcommand\arraystretch{1.5} \begin{table} \caption{\label{Table2} Rashba splitting energy $E_{R}$ (meV), k-vector offset $k_{R}$ ({\AA}$^{-1}$), and Rashba coupling constant $\alpha_{R}$ (eV~{\AA}) of typical 2D materials (monolayer and van der Waals multilayers), sp semiconductors, and perovskite oxides.} \begin{ruledtabular} \begin{tabular}{cccc} system & $E_{R}$ & $k_{R}$ & $\alpha_{R}$\\ \hline GaSe/MoSe$_2$ van der Waals HS \cite{zhang2018rashba} & 31 & 0.13 & 0.49 \\ BiTeI monolayer ($\varepsilon_{s}=6\%$) \cite{ma2014emergence} & 55.7 & 0.054 & 2.05 \\ BiTeI van der Waals bulk \cite{ishizaka2011giant} & 100 & 0.052 & 3.8 \\ \hline InAlAs/InGaAs interface \cite{PhysRevLett.78.1335} & $<$1.0 & 0.028 & 0.07 \\ GeTe(111)/InP(111) interface \cite{meng2017ferroelectric} & 5.403 & 0.010 & 1.08 \\ $\alpha$-GeTe(111) film \cite{krempasky2016disentangling} & 190 & 0.13 & 4.2 \\ \hline BiAlO$_3$ bulk crystal \cite{da2016rashba} & 7.34 & 0.038 & 0.39 \\ LaAlO$_3$/SrTiO$_3$ interface \cite{PhysRevLett.104.126803} & $<$5.0 & & 0.01$\sim$0.05 \\ KTaO$_3$/BaHfO$_3$ interface \cite{kim2016strongly} & 15 & & 0.3 \\ KTaO$_3$ film ($\varepsilon_{s}=-5\%$) & 140 & 0.21 & 1.3 \\ \end{tabular} \end{ruledtabular} \end{table} } \subsection{Heterostructures and photogalvanic effect} For real applications, the KTO surfaces could be capped with STO overlayers, and/or KTO films should be grown on good substrates. For this purpose, we study KTO/STO superlattices for the two STO/KTO interfaces. For (STO)$_{4}$/(KTO)$_{12}$ superlattice with $a_{\parallel} = a_{STO}$ and $a_{KTO}$, the bottom of the conduction bands and the lowest of the Rashba spin splitting band are respectively arising from the Ta $d_{xy}$ and Ta $d_{xz}$/$d_{yz}$ states for the TaO$_{2}$ monolayer at the SrO/TaO$_{2}$ interface, and top of valence bands are derived from the O p states for the TiO$_{2}$ monolayer at the TiO$_{2}$/KO interface. This indicates that the band gap in all the superlattices is formed between two spatially separated bands, and the carriers at the valence band can not be excited by the circularly polarized light to the conduction band. This implies that capping (making the interface) can diminish the carriers in the bare surface. The metallic interfaces can be obtained by generating carriers through experimentally applying gate voltage at room temperature\cite{thiel2006tunable}. We also study STO/KTO/Si trilayer to simulate capped KTO films on Si substrate. Furthermore, the STO capping affects the Rashba spin splitting in the bare TaO$_2$-terminated surfaces of KTO films. For the in-plane strains of -3\%, -4\%, and -5\%, our calculations show that the maximal Rashba spin splitting energies are 25, 95, and 190 meV, respectively, and the corresponding k vector offsets are 0.12, 0.19, and 0.24 {\AA}$^{-1}$. For STO/KTO/Si trilayer, the lattice mismatch is 3.6\% for STO/KTO on Si substrate, and then $\varepsilon_{s}$ is $-3.6\%$ and the Rashba spin splitting energy is 51 meV, with the k vector offset being 0.16 {\AA}$^{-1}$. It is clear that the Rashba effects are still very strong after capping layers and/or substrates are added. \begin{figure} \centering \includegraphics[width=0.4\textwidth]{Fig6} \caption{\label{Fig6} Schematic for CPGE: photon energy for transition from the valence band edge ($E_t$) or from the conduction band edge ($E^\prime_{R1}$) to the Rashba bands (a); the two permitted transitions (only two $k_x$ values, $k^{\pm}_{x}$, for a given $k_y$) from the conduction band edge through circularly polarized light with $\sigma_+$ (red) or $\sigma_-$ (purple) (b), and the similar transitions from the valence band edge (c); and the strain dependence of the needed photon energies $E^\prime_{R1}$ and $E_t$ (d).} \end{figure} Because of the giant Rashba spin splitting, the KTO ultrathin films can be used for achieving circular photogavalnic effect (CPGE) to generate spin-polarized photocurrents\cite{ganichev2001conversion,moayed2017towards}. For the right-handed (left-handed) circularly polarized light, its photon has the angular momentum of +1 (-1), labeled by $\sigma_{+}$ ($\sigma_{-}$), and the selection rule for necessary transitions is that the allowed z-component change of the total angular momentum is $\Delta J_m=$+1 (-1). The valence band edge, originating from the $J=3/2$ states, has $J_m=\pm 3/2$, and the conduction band edge, from the $d_{xy}$ states of $l_m=2$ and $-2$, consists of $J_m=\pm 3/2$ and $\pm 5/2$ states. Because the $d_{yz}$/$d_{xz}$ bands have $l_m=1$ and $-1$, the Rashba split bands consist of $J_m=\pm 3/2$ and $\pm 1/2$ states. Therefore, for achieving the CPGE, the electrons can transit from the valence band top (with photon energy $E_t$) or the filled conduction band edge ($E^\prime_{R1}$) to the $d_{yz}$/$d_{xz}$-based bands with giant Rashba spin plitting as the final states, as shown in Fig. 6(a). When the electron concentration is small, $E^\prime_{R1}$ is a little lower than $E_{R1}$. For generating a net spin-polarized photocurrent, both circularly-polarized light and the Rashba split bands are necessary\cite{ganichev2001conversion}. Upon illumination with a circularly polarized light with photon energy $\hbar\omega$ and given helicity, the energy and angular momentum conservations require that the transition happens only at the two asymmetrical k values: $k^{+}_{x}$ and $k^{-}_{x}$\cite{ganichev2001conversion}. This makes the average electron velocity in the excited state become nonzero and the contributions of $k^{\pm}_{x}$ photoelectrons to the current do not cancel each other\cite{ganichev2001conversion}. Changing the photon helicity from +1 to -1 inverts the current because the "center-of-mass" for this transition is shifted in the opposite direction. This results in the generation of the spin polarized CPGE current of the Rashba split d$_{yz}$/d$_{xz}$ bands, as shown in Figs. 6(b,c). The photon energies needed for the CPGE from the valence band edge ($E_t$) and the conduction band edge ($E^\prime_{R1}$) are shown in Fig. 6(d). In principle\cite{ganichev2001conversion,zhang2015generation,yuan2014generation}, it can be described by $j = \gamma \cdot$ \^{e}$E^{2}P_{circ}$, where $\gamma$ is the second-rank pseudotensor, $E$ is the amplitude of the electric field of the light, \^{e} is the unit vector pointing in the direction of the light propagation and $P_{circ}$ is the helicity of the light beam, and for the $C_{4v}$ point group, the pseudotensor $\gamma$ has non-zero element, which results in a non-zero CPGE current\cite{moayed2017towards,vajna2012higher,golub2017photocurrent}. \section{Conclusion} In summary, through the first-principles calculations, we have systematically investigated the effect of the biaxial stress on the Rashba spin splitting of the KTO slabs for modelling strained KTO ultrathin films. The calculated results reveal that the Rashba spin splitting energy $E_R$ increases with the compressive stress increasing, which is in reasonable agreement with the recently experimental measurement, and $E_R$ becomes giant when the compressive in-plane strain approaches $\epsilon_s=-5$\%. The largest $E_R$ is 140 meV and the corresponding k vector offset is $k_R=0.21$ {\AA}$^{-1}$, which implies that Rashba coupling constant is approximately 1.3 eV {\AA}. Compared to other systems, this $E_R$ is the next largest, only smaller than that in $\alpha$-GeTe(111) film \cite{krempasky2016disentangling}. In contrast, the Rashba splitting changes little under tensile in-plane strain. To elucidate the mechanism, we investigate the strain-dependent structural parameters and electrostatic potentials in the strained KTO slab. For the unstrained KTO slab, there is a strong intrinsic electric field $e_0$ due to the out-of-plane alternate alignment of negative KO and positive TaO$_2$ monolayers. When compressive biaxial stress is applied, there is out-of-plane displacements of cations with respect to the neighboring anions driven by the compressive in-plane strain $\epsilon_s$ and tensile out-of-plane strain, and in addition the ionic displacements cause an out-of-plane electric field $e_d$ antiparallel to $e_0$. Our calculated results show that $e_d$ increases with $\epsilon_s$, reaching the maximum nearly at $\epsilon_s=-5$\%. Consequently, we can attribute the enhanced giant Rashba spin splitting energy to the strong intrinsic out-of-plane electric field $e_d$ due to the large compressive biaxial stress. Furthermore, our calculations show that the Rashba spin splitting can remain giant in the presence of STO capping and/or Si substrate. We also show that in addition to interesting quantum spintronic transports, such giant Rashba effect can be used to generate spin-polarized photocurrents in terms of the circular photogalvanic effect. Therefore, these giant Rashba phenomena may open a new door to promising spintronic and optoelectronic applications based on oxide thin films and heterostructures. \begin{acknowledgments} This work is supported by the Nature Science Foundation of China (Nos.11574366 and 11974393), by the Strategic Priority Research Program of the Chinese Academy of Sciences (Grant No.XDB07000000), and by the Department of Science and Technology of China (Grant No.2016YFA0300701). The calculations were performed in the Milky Way \#2 supercomputer system at the National Supercomputer Center of Guangzhou, Guangzhou, China. \end{acknowledgments}
\section{Mitigation ROC Plots}\label{sec:mitigation_roc} This appendix contains plots of the results as discussed in Section \ref{sec:mitigation}. Figure~\ref{fig:individual_ar-fpr_def} contains per-user scatter plots of AR and FPR for all biometric modalities and algorithms. For the same classifiers, Figure~\ref{fig:all_beta_def} illustrates the ROC curves for classifiers trained with the inclusion of beta distributed noise only. Finally, Figure~\ref{fig:all_betarand_def} displays the ROC curves for all classifiers of touch and face datasets with the inclusion of both beta distributed noise and raw input vectors as an additional mitigation strategy against the the raw inputs, which were unfazed by the beta noise. A summary of changes in FRR, FPR, AR and RAR of both Figure~\ref{fig:all_beta_def} and \ref{fig:all_betarand_def} have been provided earlier in Table~\ref{tab:summary_ar} and \ref{tab:summary_rar} of Section~\ref{sec:mitigation}. \begin{figure*}[htbp] \centering \subfloat[Gait\label{fig:gait_ind_def}]{% \includegraphics[width=0.23\linewidth]{images/gait_defencerand_arind-crop.pdf}} \hspace*{0.7\fill} \subfloat[Touch\label{fig:touch_ind_def}]{% \includegraphics[width=0.23\linewidth]{images/touch_defencerand_arind-crop.pdf}} \hspace*{0.7\fill} \subfloat[Face\label{fig:face_ind_def}]{% \includegraphics[width=0.23\linewidth]{images/face_defencerand_arind-crop.pdf}} \hspace*{0.7\fill} \subfloat[Voice\label{fig:voice_ind_def}]{% \includegraphics[width=0.23\linewidth]{images/voice_defencerand_arind-crop.pdf}} \vspace{-0.2cm} \\ \caption{Individual user scatter of AR and FPR after the addition of beta distributed noise. A substantial proportion of users now exhibit an AR close to zero, or below the AR = FPR. Unfortunately, this defense mechanism did not completely minimize the AR of LINSVM for the Face authenticator. Nor did this defense protect two outlying users in the RNDF voice authenticator.} \label{fig:individual_ar-fpr_def} \vspace{-0.2cm} \end{figure*} \vfill \begin{figure*}[htbp] \centering \subfloat[Gait Average ROC in the presence of Beta Noise\label{fig:gait_beta_def}]{% \includegraphics[width=0.88\linewidth]{images/gait_betadefence_roc-crop.pdf}}\\ \subfloat[Touch Average ROC in the presence of Beta Noise\label{fig:touch_beta_def}]{% \includegraphics[width=0.88\linewidth]{images/touch_betadefence_roc-crop.pdf}}\\ \subfloat[Face Average ROC in the presence of Beta Noise\label{fig:face_beta_def}]{% \includegraphics[width=0.88\linewidth]{images/face_betadefence_roc-crop.pdf}}\\ \subfloat[Voice Average ROC in the presence of Beta Noise\label{fig:voice_beta_def}]{% \includegraphics[width=0.88\linewidth]{images/voice_betadefence_roc-crop.pdf}} \caption{Beta-noise mitigation of AR, with additive negative training noise sampled from a symmetric beta distribution around the mean of the user's features. The EER is marked on the diagrams as a vertical line. It is noted the plots with RAR curves the additional Beta-noise is not sufficient in mitigating RAR attacks.} \label{fig:all_beta_def} \end{figure*} \section{DNN Estimator configuration.} \label{sec:dnn_config} All models were trained for 5000 steps, with batch size of 50, with the Adagrad optimizer. \blue{The exact layer configuration of the \texttt{DNNEstimator}~\cite{tensorflow-estimators} used can be found on our project page (\url{https://imathatguy.github.io/Acceptance-Region/}).} \section{Evaluation on Biometric Systems} \label{sec:realscheme} To evaluate the issue of acceptance region on real-world biometric systems, we chose four different modalities: gait, touch, face and voice. The last two modalities are used as examples of user authentication at the point of entry into a secured system, whilst gait and touch are often used in continuous authentication systems~\cite{barbello2016continuous}. We first describe the four biometric datasets, followed by our evaluation methodology, the machine learning algorithms used, and finally our results and observations. \subsection{The Biometric Datasets} \label{sub:datasets} \subsubsection{Activity Type (Gait) Dataset} The activity type dataset \cite{anguita2013public}, which we will refer to as the ``gait'' dataset, was collected for human activity recognition. Specifically its aim is to provide a dataset for determining if a user is sitting, laying down, walking, running, walking upstairs or downstairs, etc. However, as the dataset retains the unique identifiers for users per biometric record, we re-purpose the dataset for authentication. This dataset contains 30 users, with an average of $343 \pm 35$ ($\text{mean} \pm \text{SD}$) biometric samples per user, there is an equal number of activity type samples for each user. For the purpose of authentication, we do not isolate a specific type of activity. Instead, we include them as values of an additional feature. The activity type feature increases the total number of features to 562. We will refer to these features as \emph{engineered} features as they are manually defined (e.g., by an expert) as opposed to \emph{latent} features extracted from a pre-trained neural network for the face and voice datasets. \subsubsection{Touch Dataset} The UMDAA-02 Touch Dataset \cite{mahbub2016active} is a challenge dataset to provide data for researchers to perform baseline evaluations of new touch-based authentication systems. Data was collected from 35 users, with an average of $3667 \pm 3012$ swipes per user. This dataset was collected by lending mobile devices to the participants over a prolonged period of time. The uncontrolled nature of the collection produces a dataset that accurately reflects swipe interactions with constant and regular use of the device. This dataset contains every touch interaction performed by the user including taps. In a pre-processing step we only consider sequences with more than 5 data points as swipes. Additionally, we set four binary features to indicate the direction of the swipe, determined from the dominant vertical and horizontal displacement. We retained all other features in \cite{mahbub2016active} bar inter-stroke time, as we wished to treat each swipe independently, without chronological order. We substitute this feature with half-time of the stroke. This produces a total of 27 engineered touch features. \subsubsection{Face Dataset} \label{subsub:face-dataset} FaceNet~\cite{schroff2015facenet} proposes a system based on neural networks that can effectively learn embeddings (feature vectors) that represent uniquely identifiable facial information from images. Unlike engineered features, these embeddings may not be directly explainable as they are automatically extracted by the underlying neural network. This neural network can be trained from any dataset containing labeled faces of individuals. There are many sources from which we can obtain face datasets, CASIA-WebFace~\cite{yi2014learning}, VGGFace2~\cite{cao2018vggface2} and Labeled Faces in the Wild (LFW)~\cite{LFWTechUpdate} are examples of such datasets. However, with a pre-trained model, we can conserve the time and resources required to re-train the network. The source code for FaceNet~\cite{facenet-source} contains two pretrained models available for public use (at the time of writing): one trained on CASIA-WebFace, and another trained on VGGFace2. We opt to use a model pre-trained on VGGFace2\footnote{(20180402-114759) is the identifier of pre-trained model used.} , while retaining CASIA-WebFace as our dataset for classifier training. We choose to use different datasets for the training of the embeddings and the classifiers to simulate the exposure of the model to never before seen data. Our face dataset is a subset of CASIA-WebFace containing only the top 100 identities with the largest number of face images (producing $447 \pm 103$ images per individual). This model produces 512 latent features from input images of pixel size 160x160 which have been centered and aligned. Recall that face alignment involves finding a bounding box on the face on an image, before cropping and resizing to the requested dimensions. \subsubsection{Speaker Verification (Utterances) VoxCeleb~\cite{nagrani2017voxceleb}, and VoxCeleb2~\cite{chung2018voxceleb2} are corpuses of spoken recordings by celebrities in online media. These recordings are text-independent, i.e., the phrase uttered by the user is not pre-determined. Text-independent speaker verification schemes depart from text-dependent verification schemes in which the individual is bound to repeat a pre-determined speech content. Thus, the task of text-independent verification (or identification) is to distinguish how the user speaks as an individual, instead of how the user utters a specific phrase. The former objective is an arguably harder task. Despite the increased difficulty, researchers have trained neural networks to convert speaker utterances into a set of latent features representing how individuals speak. These works have also released their models to the public, increasing the accessibility of speaker verification to developers. We opt to use the pre-trained model of VoxCeleb~\cite{nagrani2017voxceleb}, with utterances from VoxCeleb2~\cite{chung2018voxceleb2}. From VoxCeleb2, we only use the test portion of the dataset, which contains 118 Users with an average of $406 \pm 87$ utterances. VoxCeleb was trained as a Siamese neural network~\cite{siamese-bromley} for one-shot comparison between two audio samples. A Siamese network consists of two identical branches that produce two equal size outputs from two independent inputs for distance comparison. To fit the pre-trained model into our evaluation of ML-based models, we extract embeddings from one of the twin networks and disregard the second branch. The 1024-length embedding is then used as the feature vector within our evaluation. \subsection{Evaluation Methodology} \label{sub:eval-method} In our creation of biometric models for each user, we seek to obtain the baseline performance of the model with respect to the ability of negative user samples gaining access (i.e. FPR), and the measured Acceptance Region (AR). We use the following methodology to evaluate these metrics for each dataset and each classification algorithm. \begin{enumerate}[leftmargin=5mm] \item We min-max normalize each extracted feature over the entire dataset between 0 and 1. \item We partition the dataset into a $(70\%, 30\%)$ split for training and testing sets, respectively. \item For both training and testing samples, we further sample an equal number of negative samples from every other user such that the total number of negative samples are approximately equal to the number of samples from the target user, representing the positive class, i.e., the positive and negative classes are balanced. \item Using the balanced training set from step 3, we train a two-class classifier defining the target user set as the positive class, and all remaining users as negative. \item We test the trained model using the balanced testing set from step 3. This establishes the FRR and FPR of the system. \item We uniformly sample one million vectors from $\mathbb{I}_n$, where $n$ is the dimension of the extracted features. Testing the set of vectors against the model measures the acceptance region (AR). \item We record the confidence values of the test prediction for the user's positive test samples, other users' negative test samples, and the uniformly sampled vectors. These confidence values produce ROC curves for FRR, FPR and AR. \item Repeat steps 3-7 by iterating through every user in the dataset as the target user. \end{enumerate} \begin{remark} \label{rem:monte-carlo} In general, the decision regions (accept and reject in the case of authentication) learned by the classifiers can be quite complex~\cite{region-dnn}. Hence, it is difficult to determine them analytically, despite the availability of learned model parameters. We instead use a Monte Carlo method by sampling random feature vectors from $\mathbb{I}_n$ where each feature value is sampled uniformly at random from $\mathbb{I}$. With enough samples (one million used in our experiments, \blue{ and averaged over 50 repetitions}), the fraction of random samples accepted by the classifier serves as an estimate of the acceptance region as defined by Eq.~\ref{eq:ar} due to the law of large numbers. \end{remark} \blue{ \begin{remark} Our evaluation of the biometric systems is using the mock attacker model (samples from the negative class modelled as belonging to an attacker) as it is commonly used~\cite{eberz2017evaluating}. We acknowledge that there are other attack models such as excluding the data of the attacker from the training set~\cite{eberz2017evaluating}. Having the attacker data included in the training dataset, as in the mock attacker model, yields better EER. On the other hand, it is also likely to lower the AR of the system, due to increased variance in the negative training dataset. Thus, the use of this model does not inflate our results. \end{remark} } \blue{ \begin{remark} \label{rem:balanced} We have used balanced datasets in our experiments, i.e., the number of positive and negative samples being the same. It is true that a balanced dataset is not ideal for minimizing AR; more negative samples may reduce the acceptance region. However, an unbalanced dataset, e.g., more negative samples than positive samples, may be biased towards the negative class, resulting in misleadingly high accuracy~\cite{eberz2017evaluating, sugrim2019robust}. A balanced dataset yields the best EER without being biased towards the positive or negative class. \end{remark} } \subsection{Machine Learning Classifiers} Our initial hypothesis (Section~\ref{sec:attack_def}) stipulates that AR is related to the training data distribution, and not necessarily to any weakness of the classifiers learning from the data. To demonstrate this distinction, we elected four different machine learning algorithms: Support Vector Machines (SVM) with a linear kernel (LinSVM), SVM with a radial basis function kernel (RBFSVM), Random Forests (RNDF) and Deep Neural Networks (DNN). Briefly, SVM uses the training data to construct a decision boundary that maximizes the distance between the closest points of different classes (known as support vectors). The shape of this boundary is dictated by the kernel used; we test both a linear and a radial kernel. Random Forests is an aggregation of multiple decision tree learners formally known as an ensemble method. Multiple learners in the aggregation are created through bagging, whereby the training dataset is split into multiple subsets, each subset training a distinct decision tree. The decisions from the multiple models are then aggregated to produce the random forest's final decision. DNNs are a class of machine learning models that contain hidden layers between an input and an output layer; each layer containing neurons that activate as a function of previous layers. Specifically we implement a convolutional neural network with hidden layers leading to a final layer of our two classes, accept and reject. All four of these machine learning models are trained as supervised learners. As such, we provide the ground truth labels to the model during training. The linear SVM was trained with $C=10^4$, and default values included within Scikit-learn's Python library for the remaining parameters \cite{scikit-learn}. For radial SVM we also used $C=10^4$ while keeping the remaining parameters as default. The Random Forests classifier was configured with 100 estimators. DNNs were trained with TensorFlow Estimators~\cite{tensorflow-estimators} with a varying number of internal layers depending on the dataset. The exact configurations are noted in Appendix~\ref{sec:dnn_config}. \begin{remark} We reiterate that our trained models are reconstructions of past works. However, we endeavor that our models recreate error rates similar to the originally reported values on the same dataset. On Mahbub et al.'s touch dataset~\cite{mahbub2016active}, the authors achieved 0.22 EER with a RNDF classifier, by averaging 16 swipes for a single authentication session. We are able to achieve a comparable EER of 0.21 on RNDF without averaging. For face authentication, we evaluate a subset of CASIA-Webface, consequently there is no direct comparison. The original Facenet accuracy in verifying pairs of LFW~\cite{LFWTechUpdate} faces is 98.87\%~\cite{schroff2015facenet}, but our adoption of model-based authentication is closer to~\cite{explainable-AI}, unfortunately the authors have fixed a threshold for 0 FPR without reporting their TPR. Nagrani, Chung and Zisserman's voice authenticator~\cite{nagrani2017voxceleb} reports an EER of 0.078 on a neural network. Our classifiers achieve EERs of 0.03, 0.02, 0.04 and 0.12, which are within range of this benchmark. Our gait authenticator is the exception, it has not been evaluated for authentication with it's mixture of activity types. However, a review of gait authentication schemes can be found at~\cite{sprager2015inertial}. \end{remark} \subsection{Acceptance Region: Feature Vector API} In this section, we evaluate the acceptance region (AR) by comparing it against FPR for all 16 authentication configurations (four datasets and four classifiers). In particular, we display ROC curves showing the trade-off between FPR and FRR against the acceptance region (AR) curve as the model thresholds are varied. These results are averaged over all users. While this gives an average picture of the disparity between AR and FPR, it does not highlight that for some users AR may be substantially higher than FPR, and vice versa. In such a case, the average AR might be misleading. Thus, we also show scattered plots showing per-user AR and FPR, where the FPR is evaluated at EER. The per-user results have been averaged over 50 repetitions to remove any bias resulting from the sampled/generated vectors. The individual user AR versus FPR scatter plots are shown in Figure~\ref{fig:all_ind}, and the (average) AR curves against the ROC curves are shown in Figure~\ref{fig:all_roc}. \begin{remark} EER is computed in a best effort manner, with only 100 discretized threshold values, to mitigate the storage demands of the 1M uniformly random vectors measuring AR. Unfortunately, there are some instances whereby the FRR and FPR do not match exactly, as the threshold step induces a large change in both FRR and FPR. Only 1/16 classifiers exhibit an FPR-FRR discrepancy greater than 1\%. \end{remark} \begin{figure}[t] \centering \subfloat[Gait\label{fig:gait_ind}]{% \includegraphics[width=0.46\linewidth]{images/gait_proba_ind-crop.pdf}} \hfill \subfloat[Touch\label{fig:touch_ind}]{% \includegraphics[width=0.46\linewidth]{images/touch_proba_ind-crop.pdf}} \vspace{-0.3cm} \\ \subfloat[Face\label{fig:face_ind}]{% \includegraphics[width=0.46\linewidth]{images/face_proba_ind-crop.pdf}} \hfill \subfloat[Voice\label{fig:voice_ind}]{% \includegraphics[width=0.46\linewidth]{images/voice_proba_ind-crop.pdf}} \vspace{-0.2cm} \\ \caption{Individual user scatter of AR and FPR. In a majority of configurations, there is no clear relationship between AR and FPR, with the exception of the RBFSVM and DNN classifiers for face and voice authentication. \vspace{-1mm} } \label{fig:all_ind} \end{figure} \begin{figure*} \centering \subfloat[Gait Average ROC\label{fig:gait_roc}]{% \includegraphics[width=1.0\linewidth]{images/gait_proba_roc-crop.pdf}}\\ \subfloat[Touch Average ROC\label{fig:touch_roc}]{% \includegraphics[width=1.0\linewidth]{images/touch_proba_rand_roc-crop.pdf}}\\ \subfloat[Face Average ROC\label{fig:face_roc}]{% \includegraphics[width=1.0\linewidth]{images/face_proba_rand_roc-crop.pdf}}\\ \subfloat[Voice Average ROC\label{fig:voice_roc}]{% \includegraphics[width=1.0\linewidth]{images/voice_proba_roc-crop.pdf}} \caption{ROC curve versus the AR and RAR curves for all configurations. The EER is shown as a dotted vertical blue line. The FRR, FPR, AR and RAR values shown in the legend are evaluated at EER (FPR = FRR). The RAR is only evaluated on the Touch and Face datasets.} \label{fig:all_roc} \end{figure*} \subsubsection{Gait Authentication} \label{sec:classify_gait} Figure~\ref{fig:gait_ind} shows AR against FPR of every user in the activity type (gait) dataset. Recall that in this figure FPR is evaluated at EER. The dotted straight line is the line where AR equals FPR (or ERR). We note that there is a significant proportion of users for which AR is greater than FPR, even when the latter is reasonably low. For instance, in some cases AR is close to 1.0 when the FPR is around 0.2. Thus, a random input attack on systems trained for these target users will be successful at a rate significantly higher than what is suggested by FPR. We also note that the two SVM classifiers have higher instances of users for whom AR surpasses FPR. Figure~\ref{fig:gait_roc} shows the AR curve averaged across all users against the FPR and FRR curves for all four classifiers. We can see that AR is higher than the ERR (represented by the dotted vertical line) for the two SVM classifiers. For the remaining two classifiers, AR is lower than EER. However, by looking at the AR curve for RNDF, we see that the AR curve is well above the FPR curve when $\text{FRR} \le 0.3$. This can be specially problematic if the threshold is set so as to minimize false rejection at the expense of false positives. We also note that the AR curve for DNN closely follows the FPR curve, which may suggest that the AR is not as problematic for this classifier. However, by looking at Figure~\ref{fig:gait_ind}, we see that this is misleading since for some users the AR is significantly higher than FPR, making them vulnerable to random input attacks. Also, note that the AR generally decreases as the threshold is changed at the expense of FRR. However, except for RNDF, the AR for the other three classifiers is significantly higher than zero even for FRR values close to 1. \subsubsection{Touch (Swipe) Authentication} \label{sec:classify_touch} The touch authenticator has the highest EER of all four biometric modalities. Very few users attained an EER lower than 0.2 as seen in Figure~\ref{fig:touch_ind}. This is mainly because we consider the setting where the classification decision is being made after each input sample. Previous work has shown EER to improve if the decision is made on an average vector of a few samples some work~\cite{unobservable, touchalytics, chauhan2017behaviocog}. Nevertheless, since our focus is on AR, we stick to the per-sample decision setting. Figure~\ref{fig:touch_ind} shows that more than half of the users have ARs larger than FPR, and in some cases where the FPR is fairly low (say 0.2), the AR is higher than 0.5. Unlike gait authentication where RNDF classifier had ARs less than FPR for the majority of the users, all four algorithms for touch authentication display high vulnerability to the AR based random input attack. When viewing average results in Figure~\ref{fig:touch_roc}, we observe the average AR curve to be very `flat' for both SVM classifiers and DNN. This indicates that AR for these classifier remains mostly unchanged even if the threshold is moved closer to the extremes. RNDF once again is the exception, with the AR curve approaching 0 as the threshold is increased. \subsubsection{Face Authentication} \label{sec:classify_face} Figure~\ref{fig:face_ind} shows that AR is either lower or comparable to FPR for RBFSVM and DNN. Thus, the FPR serves as a good measure of AR in these systems. However, AR for most users is significantly higher than FPR for LinSVM and RNDF. This is true even though the EER of these systems is comparable to the other two as seen in Figure~\ref{fig:face_roc}. For LINSVM, we have an average AR of 0.15 compared to an EER of 0.05. For RNDF, the situation is worse with the AR reaching 0.78 against an EER of 0.03. We also note that while the AR is equal to FPR for DNN, its value of 0.10 is still worrisome to be resistant to random input attack. The relatively high FPR for DNN as compared to RBFSVM is likely due to a limited set of training data available in training the neural network. \subsubsection{Voice Authentication} \label{sec:classify_speech} Figure~\ref{fig:voice_ind} shows that once again LinSVM and RNDF have a significant proportion of users with AR higher than FPR, whereas for both RBFSVM and DNN the AR of users is comparable to FPR. Looking at the average ARs in Figure~\ref{fig:voice_roc}, we see that interestingly RNDF exhibits an average AR of 0.01 well below the ERR of 0.04. The average suppresses the fact that there is one user in the system with an AR close to 1.0 even with an EER of approximately 0.1, and two other users with an AR of 0.5 and 0.3 for which the EER is significantly below 0.1. Thus these specific users are more susceptible to the random input attack. Only LinSVM has an average AR (0.08) higher than EER (0.03). The average AR of DNN is lower than EER (0.11), but it is still significantly high (0.08). For RBFSVM we have an average AR close to 0. \subsection*{Observations} In almost every configuration, we can observe that the average AR is either higher than the FPR or at best comparable to it. Furthermore, for some users the AR is higher than FPR even though the average over all users may not reflect this trend. This demonstrates that an attacker with no prior knowledge of the system can launch an attack against it via the feature vector API. Moreover, for both the linear and radial SVM kernels, and some instances of the DNN classifier, we observe a relatively flat AR curve as the threshold is varied, unlike the gradual convergence to 1 experienced by the FPR and FRR curves. These classifiers thus have a substantial acceptance region that accept samples as positives irrespective of the threshold. Random Forests is the only classifier where the AR curve shows significant drop as the threshold is varied. Random forests sub-divide the training dataset in a process called bagging, where each sub-division is used to train one tree within the forest. With different subsets of data, different training data points will be closer to different empty regions in feature space, thus producing varied predictions. Because the prediction confidence of RNDF is computed from the proportion of trees agreeing with a prediction, the lack of consensus within the ensemble of trees for the empty space may be the reason for the non-flat AR curve. \subsection{Acceptance Rate: Raw Input API} \label{sub:rar-results} The results from the feature vector API are not necessarily reflective of the success rate of a random input attack via the raw input API. One reason for this is that the feature vectors extracted from raw inputs may or may not span the entire feature space, and as a consequence the entire acceptance region. For this reason, we use the term \emph{raw acceptance rate} (RAR) to evaluate the probability of successfully finding an accepting sample via raw random inputs. To evaluate RAR, we select the touch and face biometric datasets. The raw input of the touch authenticator is a time-series, whereas for the face authentication system it is an image. \subsubsection{Raw Touch Inputs} We used a continuous auto-regressive process (CAR)~\cite{timesynth-source} to generate random timeseries. We opted for CAR due to the extremely high likelihood of time-series values having a dependence on previous values. This time-series was then min-max scaled to approximate sensor bounds. For example the \texttt{x}-position has a maximum and minimum value of 1980 and 0 respectively, as dictated by the number of pixels on a smartphone screen. Both the duration and length of the time-series were randomly sampled from reasonable bounds: 0.5 to 2.0 seconds and 30 to 200 data-points, respectively. The time-series was subsequently parsed by the same feature extraction process as a legitimate time-series, and the outputs scaled on a feature min-max scale previously fit on real user data. In total we generate 100,000 time-series\blue{, which are used to measure RAR over 50 repetitions of the experiment.} The results of our experiments are shown in Figure~\ref{fig:touch_roc}, with the curve labeled RAR showing the raw acceptance rate as the threshold of each of the classifiers is changed. As we can see, the RAR is large and comparable to AR. This seems to indicate that the region spanned by random inputs covers the acceptance region. However, on closer examination, this happens to be false. The average volume covered by the true positive region for the touch dataset (cf. Section~\ref{sec:attack_def}) is less than $1.289 \times 10^{-4} \pm 5.462 \times 10^{-4}$, yet the volume occupied by the feature vectors extracted from raw inputs is less than $2.609 \times 10^{-6}$. This is significantly smaller than the AR for all four classifiers. We will return to this observation shortly. \subsubsection{Raw Face Inputs} We generated 100,000 images of size 160x160 pixels, with uniformly sampled RGB values. Feature embeddings were then extracted from the generated images with the pre-trained Facenet model (cf. Section~\ref{subsub:face-dataset}). This set of 100,000 raw input vectors, was parsed by a min-max scaler fitted to real user data. We did not align the noisy images, as there is no facial information within the image to align. Note that alignment is normally used in face authentication to detect facial boundaries within an image. \blue{Again, we aggregate results over 50 repetitions to remove any potential biases.} The results from these raw inputs are shown in Figure~\ref{fig:face_roc}. We note that the RAR curve behaves much more similarly to the FPR curve, than what was previously observed for raw touch inputs. Also, in the particular example of RBFSVM, we obtain an RAR of 0.09 which is significantly higher than the AR (0.01) at the equal error rate. We again computed the true positive region and found that the average is $6.562 \times 10^{-94} \pm 6.521 \times 10^{-93}$. However, the volume covered by the raw inputs (after feature extraction) is only $4.670 \times 10^{-390}$, which is negligible compared to the ARs (0.15, 0.01, 0.78 and 0.10 for all four classifiers). Additional analysis shows that only one other user's feature space overlapped with the space of raw inputs, with an overlapped area of $8.317 \times 10^{-407}$, many orders of magnitude smaller than both the positive users and the raw feature space itself. \ \subsection*{Observations} The threat of a random input attack via raw random inputs is also high, and in some cases greater than the FPR. However, the region spanned by the feature vectors from these raw inputs is exponentially small and hence does not span the acceptance region. Furthermore, the region also does not coincide with any true positive region. This implies that raw inputs may result in high raw acceptance rate due to the fact that the training data does not have representative vectors in the region spanned by raw inputs. We shall return to this observation when we discuss mitigation strategies in Section~\ref{sec:mitigation}. \subsection*{Abstract} \IEEEoverridecommandlockouts \makeatletter\def\@IEEEpubidpullup{6.5\baselineskip}\makeatother \IEEEpubid{\parbox{\columnwidth}{ Network and Distributed Systems Security (NDSS) Symposium 2020\\ 23-26 February 2020, San Diego, CA, USA\\ ISBN 1-891562-61-4\\ https://dx.doi.org/10.14722/ndss.2020.24210\\ www.ndss-symposium.org } \hspace{\columnsep}\makebox[\columnwidth]{}} \maketitle \begin{abstract} We assess the security of machine learning based biometric authentication systems against an attacker who submits uniform random inputs, either as feature vectors or raw inputs, in order to find an \emph{accepting sample} of a target user. The average false positive rate (FPR) of the system, i.e., the rate at which an impostor is incorrectly accepted as the legitimate user, may be interpreted as a measure of the success probability of such an attack. However, we show that the success rate is often higher than the FPR. In particular, for one reconstructed biometric system with an average FPR of 0.03, the success rate was as high as 0.78. This has implications for the security of the system, as an attacker with only the knowledge of the length of the feature space can impersonate the user with less than 2 attempts on average. We provide detailed analysis of why the attack is successful, and validate our results using four different biometric modalities and four different machine learning classifiers. Finally, we propose mitigation techniques that render such attacks ineffective, with little to no effect on the accuracy of the system. \end{abstract} \section{Introduction} Consider a machine learning model trained on some user's data accessible as a black-box API for biometric authentication. Given an input (a biometric sample), the model outputs a binary decision, i.e., accept or reject, as its prediction for whether the input belongs to the target user or not. Now imagine an attacker with access to the same API who has never observed the target user's inputs. The goal of the attacker is to impersonate the user by finding an \emph{accepting sample} (input). What is the success probability of such an attacker? Biometric authentication systems are generally based on either physiological biometrics such as fingerprints~\cite{maltoni2009handbook}, face~\cite{yi2014learning, schroff2015facenet}, and voice~\cite{nagrani2017voxceleb, chung2018voxceleb2}), or behavioral biometrics such as touch~\cite{mahbub2016active} and gait~\cite{xu2017keh}, the latter category generally used for continuous and implicit authentication of users. These systems are mostly based on machine learning: a binary classifier is trained on the target user's data (positive class) and a subset of data from other users (negative class). This process is used to validate the performance of the machine learning classifier and hence the biometric system~\cite{chauhan2017behaviocog, xu2017keh, curran2017one, huang2018breathlive, liu2018vocal, chen2017your, song2016eyeveri, chauhan2017breathprint, ho2017mini, crawford2017authentication}. The resulting proportion of negative samples (other users' data) successfully gaining access (when they should have been rejected) produces the false positive rate (FPR, also referred as False Acceptance Rate). The target user's model is also verified for their own samples, establishing the false reject rate (FRR). The parameters of the model can be adjusted to obtain the equal error rate (EER) at which point the FPR equals FRR. Returning to our question, the FPR seems to be a good indicator of the success probability of finding an accepting sample. However, this implicitly assumes that the adversary is a human who submits samples using the same human computer interface as other users, e.g., a smartphone camera in case of face recognition. When the model is accessible via an API the adversary has more freedom in choosing its probing samples. This may happen when the biometric service is hosted on the cloud (online setting) or within a secure enclave on the user's device (local setting). In particular, the attacker is free to sample uniform random inputs. It has previously been stated that the success probability of such an attack is exponentially small~\cite{pagnin2014leakage} or it can be derived from the FPR of the system~\cite{martinez-hill, vulnerable-face}.\footnote{We note that these observations are made for \emph{distance-based} authentication algorithms and not machine-learning model based algorithms. See Sections \ref{sec:distance_classifier} and \ref{sec:related} for more details.} In this paper, we show that uniform random inputs are accepted by biometric systems with a probability that is often higher and independent of the FPR. Moreover, this applies to the setting where the API to the biometric system can be queried using feature vectors after processing raw input as well as at the raw input level. A simple toy example with a single feature can illustrate the reason for the efficacy of the attack. Suppose the feature is normalized within the interval $[0, 1]$. All of target user's samples (the positive class) lie in the interval $[0, 0.5)$ and the other users' samples (the negative class) lie in the interval $(0.5, 1]$. A ``classifier'' decides the decision boundary of $0.5$, resulting in identically zero FRR and FPR. However, a random sample has a 50\% chance of being accepted by the biometric system.\footnote{This example is an oversimplification. In practice the training data is almost never nicely separated between the two classes. Also, in higher dimensions one expects exponentially small volume covered by samples from the positive and negative classes as is explained in Section~\ref{sec:attack_def}.} The success of the attack shows that the FPR and FRR, metrics used for reporting the accuracy of the classifier, cannot alone be used as proxies for assessing the security of the biometric authentication system. \noindent Our main contributions are as follows: \begin{itemize}[leftmargin=5mm] \item We theoretically and experimentally show that in machine learning-based biometric authentication systems, the \emph{acceptance region}, defined as the region in feature space where the feature vectors are accepted by the classifier, is significantly larger than the true positive region, i.e., the region where the target users samples lie. Moreover, this is true even in higher dimensions, where the true positive region tends to be exponentially small~\cite{data-science}. \item As a consequence of the above, we show that an attacker who has access to a biometric system via a black-box feature vector API, can find an accepting sample by simply generating random inputs, at a rate which in many cases is higher than implicated by the FPR. For instance, the success probability of the attack is as high as 0.78 for one of the systems whose EER is only 0.03. The attack requires minimum knowledge of the system: the attacker only needs to know the length of the input feature vector, and permissible range of each feature value (if not normalized). \item We show that the success rate of a random input attack can also be higher than FPR if the attacker can only access the API at the raw input level (before feature extraction). For instance, on one system with an EER of 0.05, the success rate was 0.12. We show that the exponentially small region spanned by these raw random inputs rarely overlaps with the true positive region of any user in the system, owing to the success probability of the attack. Once again the attack only requires minimum knowledge of the system, i.e., the range of values taken by each raw input. \item To analyze real-world applicability of the attack, we reconstruct four biometric authentication schemes. Two of them are physiological, i.e., face recognition~\cite{schroff2015facenet} and voice authentication~\cite{nagrani2017voxceleb}. The other two use behavioral traits, i.e., gait authentication~\cite{gafurov2006biometric}, and touch (swipes) authentication~\cite{mahbub2016active, touchalytics}. For each of these modalities, we use four different classifiers to construct the corresponding biometric system. The classifiers are linear support vector machines (SVM), radial SVM, random forests, and deep neural networks. For each of these systems, we ensure that our implementation has comparable performance to the reference. \item Our experimental evaluations show that the average acceptance region is higher than the EER in 9 out of 16 authentication configurations (classifier-modality pairs), and only one in the remaining 7 has the (measured) average acceptance region of zero. Moreover, for some users this discrepancy is even higher. For example, in one user model (voice authentication using random forests) the success rate of the random (feature) input is 0.55, when the model's EER is only 0.03, consistent with the system average EER of 0.03. \item We propose mitigation techniques for both the random feature vector and raw input attacks. For the former, we propose the inclusion of beta-distributed noise in the training data, which ``tightens'' the acceptance region around the true positive region. For the latter, we add feature vectors extracted from a sample of raw inputs in the training data. Both strategies have minimal impact on the FPR and TPR of the system. The mitigation strategy renders the acceptance region to virtually 0 for 6 of the 16 authentication configurations, and for 15 out of 16, makes it lower than FPR. \blue{For reproducibility, we have made our codebase public.\footnote{\blue{Our code is available at: \url{https://imathatguy.github.io/Acceptance-Region}}}} \end{itemize} We note that a key difference in the use of machine learning in biometric authentication as compared to its use in other areas (e.g., predicting likelihood of diseases through a healthcare dataset) is that the system should only output its decision: accept or reject~\cite{garcia2018explainable}, and not the detailed confidence values, i.e., confidence of the accept or reject decision. This makes our setting different from \emph{membership inference} attacks where it is assumed that the model returns a prediction vector, where each element is the confidence (probability) that the associated class is the likely label of the input sample~\cite{shokri2017membership, salem2018ml}. In other words, less information is leaked in biometric authentication. Confidence vectors can potentially allow an adversary to find an \emph{accepting sample} by using a hill climbing approach~\cite{martinez-hill}, for instance. \section{Background and Threat Model} \label{sec:background} \subsection{Biometric Authentication Systems} The use of machine learning for authentication is a binary classification problem.\footnote{We note that sometimes a \emph{discrimination model}~\cite{xu-soups} may also be considered where the goal is to identify the test sample as belonging to one of $n$ users registered in the system. Our focus is on the authentication model. \blue{Also, see Section~\ref{sec:discussion}.}} The positive class is the target user class, and the negative class is the class of one or more other users. The target user's data for training is obtained during the registration or enrollment phase. For the negative class, the usual process is to use the data of a subset of other users enrolled in the system \cite{han2003personal, chauhan2017behaviocog, xu2017keh, curran2017one, huang2018breathlive, liu2018vocal, chen2017your, song2016eyeveri, chauhan2017breathprint, ho2017mini, crawford2017authentication}. Following best machine learning practice, the data (from both classes) is split into a training and test set. The model is learned over the training set, and the performance of the classifier, its misclassification rate, is evaluated on the test set. A raw biometric sample is usually processed to extract relevant features such as fingerprint minutiae or frequency energy components of speech. This defines the feature space for classification. As noted earlier, the security of the biometric system is evaluated via the misclassification rates of the underlying classifier. Two types of error can arise. A type 1 error is when a positive sample (target user sample) has been erroneously classified as negative, which forms the false reject rate (FRR). Type 2 error occurs when a negative sample (from other users) has been misclassified as a positive sample, resulting in the false positive rate (FPR). By tuning the parameters of the classifier, an equal error rate (EER) can be determined which is the rate at which FRR equals FPR. One can also evaluate the performance of the classifier through the receiver operator characteristic (ROC) curve, which shows the full relationship between FRR and FPR as the classifier parameters are varied. Once a biometric system is set up, i.e., classifier trained, the system takes as input a biometric sample and outputs accept or reject. In a continuous authentication setting, where the user is continually being authenticated in the background, the biometric system requires a continuous stream of user raw inputs. It has been shown that in continuous authentication systems the performance improves if the decisions is made on the \emph{average} feature vector from a set of feature vectors~\cite{unobservable, touchalytics, chauhan2016gesture}. \subsection{Biometric API: The Setting} We consider the setting where the biometric system can be accessed via an API. More specifically, the API can be queried by submitting a biometric sample. The response is a binary accept/reject decision.\footnote{For continuous authentication systems, we assume that the decision is returned after a fixed number of one or more biometric samples.} The biometric system could be \emph{local}, in which case the system is implemented in a secure enclave (a trusted computing module), or \emph{cloud-based} (online), in which the decision part of the system resides in a remote server. We consider two types of APIs. The first type requires raw biometric samples, e.g., the input image in case of face recognition. The second type accepts a feature vector, implying that the feature extraction phase is carried out before the API query. This might be desirable for the following reasons. \begin{itemize}[leftmargin=5mm] \item Often the raw input is rather large. For instance, in case of face recognition, without compression, an image will need every pixel's RGB information to be sent to the server for feature extraction and authentication. In the case of an image of pixel size $60 \times 60$, this would require approximately 10.8 KB of data. If the feature extraction was offloaded to the user device, it would produce a 512 length feature embedding, which can take as little as 512 bytes. This also applies to continuous authentication which inherently requires a continual stream of user raw inputs. But often decisions are only made on an \emph{average} of a set of feature vectors~\cite{unobservable, touchalytics, chauhan2016gesture}. In such systems, only sending the resultant extracted average feature vector to the cloud also reduces communication cost. \item Recent studies have shown that raw sensory inputs can often be used to track users~\cite{das2016tracking}. Thus, they convey more information than what is simply required for authentication. In this sense, extracting features at the client side serves as an \emph{information minimization} mechanism, only sending the relevant information (extracted feature vectors) to the server to minimize privacy loss. \item Since the machine learning algorithm only compares samples in the feature space, only the feature representation of the template is stored in the system. In this case, it makes sense to do feature extraction prior to querying the system. \end{itemize} From now onwards, when referring to a biometric API we shall assume the \emph{feature vector} based API as the default. We shall explicitly state when the discourse changes to raw inputs. Figure~\ref{fig:ar-diagram} illustrates the two APIs. \subsection{Threat Model and Assumptions} We consider an adversary who has access to the API to a biometric system trained with the data of a target user whom the adversary wishes to impersonate. More specifically, the adversary wishes to find an \emph{accepting sample}, i.e., a feature vector for which the system returns ``accept.'' In the case of the raw input API, the adversary is assumed to be in search for a raw input that results in an accepting sample after feature extraction. We assume that the adversary has the means to bypass the end user interface, e.g., touchscreen or phone camera, and can thus \emph{programmatically} submit input samples. There are a number of ways in which this is possible. In the online setting, a mis-configured API may provide the adversary access to the authentication pipeline. In the local setting, if the feature extractor is contained within a secure environment, raw sensory information must be passed to this protected feature extraction process. To achieve this an attacker may construct their own samples through OS utilities. An example is the Monkey Runner~\cite{monkeyrunner} on Android, a tool allowing developers to run a sequence of predefined inputs for product development and testing. Additionally, prior work~\cite{shwartz2017shattered} has shown the possibility of compromising the hardware contained within a mobile device, e.g., a compromised digitizer can inject additional touch events. Outside of literature, it is difficult to know the exact implementation of real-world systems. However, taking face recognition as an example, we believe our system architecture is similar to real world facial authentication schemes, drawing parallels to pending patent US15/864,232 \cite{son2018face}. Additionally there are API services dedicated to hosting different components of the facial recognition pipeline. Clarifai, for example, hosts machine learning models dedicated to the extraction of {face embeddings} within an uploaded image~\cite{clarifai-face}. A developer could then use any number of Machine Learning as a Service (MLaaS) providers to perform the final authentication step, without needing to pay premiums associated with an end-to-end facial recognition product. \noindent We make the following assumptions about the biometric API. \begin{itemize}[leftmargin=5mm] \item The input feature length, i.e., the number of features used by the model, is public knowledge. \item Each feature in the feature space is min-max normalized. Thus, each feature takes value in the real interval $[0, 1]$. This is merely for convenience of analysis. Absent this, the attacker can still assume plausible universal bounds for all features in the feature space. \item The attacker knows the identifier related to the user, e.g., the username, he/she wishes to impersonate. \end{itemize} Beyond this we do not assume the attacker to have any knowledge of the underlying biometric system including the biometric modality, the classifier being used, the target user's past samples, or any other dataset which would allow the attacker to infer population distribution of the feature space of the given modality. \begin{figure}[th!] \centering \includegraphics[width=0.80\columnwidth]{ar-diagram.pdf} \vspace{-4mm} \caption{The threat model and the two types of biometric API.} \label{fig:ar-diagram} \end{figure} \section{Acceptance Region and Proposed Attack} \label{sec:attack_def} \subsection{Motivation and Attack Overview} Given a feature space, machine learning classifiers learn the region where feature vectors are classified as positive features and the region where vectors are classified as negative features. We call the former, the acceptance region and the latter the rejection region. Even though the acceptance region is learnt through the data from the target user, it does not necessarily tightly surround the region covered by the target user's samples. Leaving aside the fact that this is desirable so as to not make the model ``overfitted'' to the training data, this implies that even vectors that do not follow the distribution of the target user's samples, may be accepted. In fact these vectors may bare no resemblance to any positive or negative samples from the dataset. Consider a toy example, where the feature space consists of only two vectors. The two-dimensional plane in Figure~\ref{fig:toy_example} shows the distribution of the positive and negative samples in the training and testing datasets. A linear classifier may learn the acceptance and rejection regions split via the decision boundary shown in the figure. This decision boundary divides the two dimensional feature space in half. Even though there is a small overlap between the positive and negative classes, when evaluated against the negative and positive samples from the dataset there would be an acceptably low false positive rate. However if we construct a vector by uniformly sampling the two features from the interval $[0, 1]$, with probability $1/2$ it will be an accepting sample. If this model could be queried through an API, an attacker is expected to find an accepting sample in two attempts. Arguably, such a system is insecure. \begin{figure}[th!] \centering \includegraphics[width=0.70\columnwidth]{half_example_new-crop.pdf} \vspace{-0.3cm} \caption{Example feature space separation by a linear boundary between two classes. This demonstrates low FPR and FRR of test sample classification, yet allows approximately 50\% of the feature space to be accepted as positive. } \label{fig:toy_example} \end{figure} Figure~\ref{fig:toy_example} illustrates that the acceptance region can be larger than the region covered by the target user's samples. However, in the same example, the area covered by the target user's samples is also quite high, e.g., the convex hull of the samples. As we discuss next, in higher dimensions, the area covered by the positive and negative examples is expected to be concentrated in an exponentially small region~\cite{data-science}. However, the acceptance region does not necessarily follow the same trend. \subsection{Acceptance Region} \label{sec:attack_area} \descr{Notations.} Let $\mathbb{I} \coloneqq [0, 1]$ denote the unit interval $[0, 1]$, and let $\mathbb{I}^n \coloneqq [0, 1]^n$ denote the $n$-dimensional unit cube with one vertex at the origin. The unit cube represents the feature space with each (min-max normalized) feature taking values in $\mathbb{I}$. Let $f$ denote a model, i.e., an output of a machine learning algorithm (classifier) trained on a dataset $D = \{ (\mathbf{x}_i, y_i) \}_{i \in [m]}$, where each $\mathbf{x}_i$ is a feature vector and $y_i \in \{+1, -1\}$ its label. The label $+1$ indicates the positive class (target user) and $-1$ the negative class (one or more other users of the authentication system). We may denote a positive example in $\mathbf{x} \in D$ by $\mathbf{x}^+$, and any negative example by $\mathbf{x}^-$. The model $f$ takes feature vectors $\mathbf{x} \in \mathbb{I}^n$ as input and outputs a \emph{predicted} label $\hat{y} \in \{+1, -1\}$. \descr{Definitions.} \emph{Acceptance region} of a model $f$ is defined as \begin{equation} A_f \coloneqq \{ \mathbf{x} \in \mathbb{I}^n : f(\mathbf{x}) = +1 \}, \end{equation} The $n$-dimensional volume of $A_f$ is denoted $\text{Vol}_n(A_f)$. The definition of acceptance region is analogous to the notion of decision regions in decision theory~\cite[\S 1.5]{bishop-pattern}. We will often misuse the word acceptance region to mean both the region or the volume covered by the region where there is no fear of ambiguity. Let FRR and FPR be evaluated on the training dataset $D$.\footnote{In practice, the FRR and FPR are evaluated against a subset of $D$ called a holdout or testing dataset.} Let $\mathbf{x} \sample{\$} \mathbb{I}^n$ denote sampling a feature vector $\mathbf{x}$ uniformly at random from $\mathbb{I}^n$. In a \emph{random input attack}, the adversary samples $\mathbf{x} \sample{\$} \mathbb{I}^n$ and gives it as input to $f$. The attack is successful if $f(\mathbf{x}) = + 1$. The success probability of a random guess is defined as \begin{equation} \label{eq:ar} \Pr [ f(\mathbf{x}) = + 1 : \mathbf{x} \sample{\$} \mathbb{I}^n ]. \end{equation} Since the $n$-volume of the unit cube is 1, we immediately see that the above probability is exactly $\text{Vol}_n(A_f)$. Thus, we shall use the volume of the acceptance region as a direct measure of the success probability of random guess. Finally, we define the \emph{rejection region} as $\mathbb{I}^n - A_f$. It follows that the volume of the rejection region is $1 - \text{Vol}_n(A_f)$. \descr{Existence Results.} Our first observation is that even if the FPR of a model is zero, its acceptance region can still be non-zero. Note that this is not evident from the fact that there are positive examples in the training dataset $D$: the dataset is finite and there are infinite number of vectors in $\mathbb{I}^n$, and hence the probability of picking these finite positive examples is zero. \begin{proposition} There exists a dataset $D$ and a classifier with output $f$ such that $\text{FRR} = \text{FPR} = 0$, and $\text{Vol}_n(A_f) > 0$. \end{proposition} \begin{proof} Assume a dataset $D$ that is linearly separable. This means that there exists a hyperplane denoted $H(\mathbf{x})$ such that for any positive example $\mathbf{x}^+ \in D$, we have $H(\mathbf{x}^+) > 0$ and for any negative example in $D$ we have $H(\mathbf{x}^-) < 0$. Consider the perceptron as an example of a classifier which constructs a linear model: $f_{\mathbf{w}, b} (\mathbf{x}) = + 1$ if $\langle \mathbf{w}, \mathbf{x} \rangle + b > 0$, and $-1$ otherwise. Since the data is linearly separable, the perceptron convergence theorem states that the perceptron learning algorithm will find a solution, i.e., a separating hyperplane~\cite{rosenblatt}. Intersecting this hyperplane $\langle \mathbf{w}, \mathbf{x} \rangle + b = 0$ with the unit cube creates two sectors. The sector where $f_{\mathbf{w}, b} (\mathbf{x}) = + 1$ is exactly the acceptance region $A_{f_{\mathbf{w}, b}}$. The $n$-volume of $A_{f_{\mathbf{w}, b}}$ cannot be zero, since otherwise it is one of the sides of the unit cube with dimension less than $n$, implying that all points $\langle \mathbf{w}, \mathbf{x} \rangle + b > 0$ lie outside the unit cube. A contradiction, since $\text{FRR} = 0$ (there is at least one positive example). \end{proof} A non-zero acceptance region is not necessarily a threat. Of practical concern is a \emph{non-negligible} volume. Indeed, the volume may be negligible requiring a large number of queries to $f$ before an \emph{accepting sample} is produced. The following result shows that there are cases in which the acceptance region can be non-negligible. \begin{proposition} \label{prop:ar-half} There exists a dataset $D$ and a classifier with output $f$ such that $\text{FRR} = \text{FPR} = 0$, and $\text{Vol}_n(A_f) \ge 1/2$. \end{proposition} \begin{proof} Consider again the perceptron as an example of a classifier. Let $D$ be a dataset such that for all positive examples $\mathbf{x}^+$, we have $x^+_1 > 0.5$, and for all negative examples $x^-_1 < 0.5$. The rest of the features may take any value in $\mathbb{I}$. The resulting data is linearly separable by the ($n-1$ dimensional) hyperplane $x_1 - 0.5 = 0$. Initialize the perceptron learning algorithm with $w_1 = 1$, $w_i = 0$ for all $2 \le i \le n$, and $b = -0.5$. The algorithm then trivially stops with this hyperplane. Clearly, with this hyperplane, we have $\text{FRR} = 0$, $\text{FPR} = 0$, and the acceptance region is 1/2. \end{proof} The above examples illustrate the high probability of success of the random input attack due to non-negligible acceptance region. However, the example used is contrived. In practice, datasets with a ``nice'' distribution as above are seldom encountered, and the model is more likely to exhibit non-zero generalization error (a tradeoff between FRR and FPR). Also, in practice, more sophisticated classifiers such as the support vector machine or deep neural networks are used instead of the perceptron. However, we shall demonstrate that the issue persists in real datasets and classifiers used in practice. We remark that we are interested in the case when $\text{Vol}_n(A_f) > \text{FPR}$, since arguably it is misleading to use the FPR as a measure of security of such an authentication system. This could happen even when the FPR is non-zero. When and why would this case occur? We explain this in the following. \descr{Real Data and High Dimensions.} We first discretize the feature space. For a given positive integer $B$, let $\mathbb{I}_B$ denote the binned (or discrete) version of the interval $\mathbb{I}$ partitioned into $B$ equally sized bins. Clearly, each bin is of width $1/B$. Let $\mathbb{I}_B^n$ denote the discretized feature space. Given a set of feature values from $\mathbb{I}$, we say that a bin in $\mathbb{I}_B$ is \emph{filled} if there are $> \epsilon_n$ feature values falling in that bin, where $\epsilon_n$ is a cutoff to filter outliers. The number of filled bins is denoted by $\alpha$. Clearly $\alpha \le B$. See Figure~\ref{fig:bins}. \begin{figure}[th!] \centering \vspace{-1mm} \resizebox{0.55\columnwidth}{!}{% \begingroup% \makeatletter% \providecommand\rotatebox[2]{#2}% \ifx\svgwidth\undefined% \setlength{\unitlength}{203.66368408bp}% \ifx\svgscale\undefined% \relax% \else% \setlength{\unitlength}{\unitlength * \real{\svgscale}}% \fi% \else% \setlength{\unitlength}{\svgwidth}% \fi% \global\let\svgwidth\undefined% \global\let\svgscale\undefined% \makeatother% \begin{picture}(1,0.34838103)% \put(0,0){\includegraphics[width=\unitlength,page=1]{images/bins.pdf}}% \put(0.04596194,0.01451667){\color[rgb]{0,0,0}\makebox(0,0)[lb]{\smash{\textbf{0}}}}% \put(0.78498776,0.01154079){\color[rgb]{0,0,0}\makebox(0,0)[lb]{\smash{\textbf{1}}}}% \put(0.88676664,0.09652185){\color[rgb]{0,0,0}\makebox(0,0)[lb]{\smash{\textbf{$\epsilon_n = 2$}}}}% \put(0.03075977,0.07302251){\color[rgb]{0,0,0}\rotatebox{90}{\makebox(0,0)[lb]{\smash{\textbf{Frequency}}}}}% \put(0.38841542,0.00059937){\color[rgb]{0,0,0}\makebox(0,0)[lb]{\smash{\textbf{Bins}}}}% \end{picture}% \endgroup% } \vspace{-3.5mm} \caption{The binned version $\mathbb{I}_B$ of the unit interval $\mathbb{I}$. Each bin is of width $1/B$ ($B$ not specified). The number of filled bins is $\alpha = 3$, with a cut-off of $\epsilon_n = 2$.} \label{fig:bins} \end{figure} For the $i$th feature, let $\alpha_i^{+}$ denote the number of bins filled by all positive examples in $D$. We define: \[ R^+ \coloneqq \frac{1}{B^n}\prod_{i = 1}^n \alpha^+_i \] as the \emph{volume of the true positive region}. We define $\alpha_i^{-}$ and $R^-$ analogously as the volume of the true negative region. Let $c \in [0, 1]$ be a constant. If each of the $\alpha_i^{+}$'s is at most $cB$, then we see that $R^+ = c^{-n}$. For instance, if $c \le 1/2$, then $R^+ \le 2^{-n}$. In other words, the volume of the region spanned by the user's own samples is exponentially small as compared to the volume of the unit cube. In practice, the user's data is expected to be normally distributed across each feature, implying that the $\alpha_i^{+}$'s are much smaller than $B/2$, which makes the above volume a loose upper bound. The same is true of the $\alpha_i^{-}$'s. Figure~\ref{fig:alpha-hist} shows the filled bins from one of the features in the Face Dataset (see Section~\ref{sub:datasets}). For the same dataset, the average true positive region is $5.781 \times 10^{-98}$ (with a standard deviation of $\pm 2.074 \times 10^{-96}$) and the average true negative region is $1.302 \times 10^{-55}$ (with a standard deviation of $\pm 2.172 \times 10^{-54}$) computed over 10,000 iterations considering a 80\% sample of the target user's data, and a balanced sample of other users.\footnote{We compute the true positive and negative region by only considering the minimum and maximum feature values covered by each user for each feature with binning equal to the floating point precision of the system. Thus, this is a conservative estimate of the true positive region.} We thus expect a random vector from $\mathbb{I}^n$ to be outside the region spanned by the target user with overwhelming probability. Thus, if a classifier defines an acceptance region tightly surrounding the target user's data, the volume of the acceptance region will be negligible, and hence the random input attack will not be a threat. However, as we shall show in the next sections, this is not the case in practice. \descr{Factors Effecting Acceptance Region.} We list a few factors which effect the volume of the acceptance region. \begin{itemize}[leftmargin=5mm] \item One reason for a high acceptance region is that the classifier is not penalized for classifying \emph{empty space} in the feature space as either positive or negative. For instance, consider Figure~\ref{fig:alpha-hist}. There is significant empty space for the feature depicted in the figure: none of the positive or negative samples have the projected feature value in this space. A classifier is generally trained with an objective to minimize the misclassification rate or a loss function (where, for instance, there is an asymmetrical penalty between true positives and false positives)~\cite{bishop-pattern}. These functions take input from the dataset $D$. Thus, empty regions in the feature space which do not have examples in $D$ can be classified as either of the two classes without being penalized during training, resulting in a non-negligible acceptance region. \item The acceptance region is also expected to be big if there is high variance in the feature values taken by the positive examples. In this case, the $\alpha^{+}_i$'s will be much closer to $B$, resulting in a non-negligible volume $R^+$. \item On the other hand, the acceptance region is likely to be small if the variances of the feature values in the negative examples are high. The classifier, in order to minimize the FPR, will then increase the region where samples are rejected, which would in turn make the acceptance region closer in volume to the true positive region. \end{itemize} \begin{figure}[th!] \centering \includegraphics[width=0.75\columnwidth]{alpha-hist2_new-crop.pdf} \vspace{-3mm} \caption{The histogram of feature values of one of the features in the Face Dataset (cf. \S~\ref{sub:datasets}). Here we have $B = 100$. The number of filled bins for the target user is $\alpha_i^+ = 35$ (with 400 samples), and for the negative class (10 users; same number of total samples) it is $\alpha_i^- = 50$. A total of $24$ bins are not filled by any of the two classes, implying that (approximately) $0.24$ of the region for this feature is empty.} \label{fig:alpha-hist} \vspace{-4mm} \end{figure} We empirically verify these observations in Section~\ref{sec:synthetic}. The last observation also hints at a possible method to tighten the acceptance region around the region spanned by the target user: generate random noise around the target user's vectors and treat it as belonging to the negative class. We demonstrate the effectiveness of this method in Section~\ref{sec:mitigation}. Jumping ahead, if the noise is generated from an appropriate distribution, this will have minimal impact on the FRR and FPR of the model. \input{biometric.tex} \input{synthetic.tex} \input{mitigation.tex} \section{Discussion} \label{sec:discussion} \begin{itemize}[leftmargin=5mm] \item Our work proposes an additional criterion to assess the security of biometric systems, namely their resilience to random inputs. The work has implications for biometric template protection~\cite{biometric-template}, where a target template resides on a remote server and the attacker's goal is to steal the template. In such a setting, obtaining an accepting sample may be enough for an attacker, as it serves as an approximation to the biometric template. Our work shows that the attacker might be able to find an approximation to the template via random input attacks if the system AR is not tested. Conversely, once the AR is reduced below FPR (e.g., via adding beta distributed noise), then one can safely use FPR as the baseline probability of success of finding an approximation. \item We have assumed that the input to the classifier, in particular the length of the input is publicly known. In practice, this may not be the case. For instance, in face recognition, a captured image would be of a set size unknown to the attacker. Likewise, the number of features in the (latent) feature space may also be unknown. However, we do not consider this as a serious limitation, as the input length is rarely considered sensitive so as to be kept secret. In any case, the security of the system should not be reliant on keeping this information secret following Kerckhoffs's well known principle. \item We note that there are various detection mechanisms that protect the front-end of biometric systems. For example, spoofing detection \cite{marcel2014handbook} is an active area in detecting speaker style transfer \cite{wang2017tacotron}. Detection of replay attacks is also leveraged to ensure the raw captured biometric is not reused, for example audio recordings \cite{kinnunen2017asvspoof}. There is also liveliness detection, which seeks to determine if the biometric that is presented is characteristic of a real person and not a recreation, e.g., face masks remain relatively static and unmoving compared to a real face \cite{tan2010face}. Our attack surface applies once the front-end has been bypassed. Our mitigation measures can thus be used in conjunction with these detection mechanisms to thwart random input attacks. \blue{Being generic, our mitigation measures also work for systems which do not have defense measures similar to liveness detection.} \item Once an accepting sample via the feature vector API has been found, it may be possible to obtain an input that results in this sample (after feature extraction), as demonstrated by Garcia et al. with the training of an auto-encoder for both feature extraction and the regeneration of the input image~\cite{garcia2018explainable}. \item \blue{In this work, we have focused on authentication as a binary classification problem, largely because of its widespread use in biometric authentication~\cite{chauhan2017behaviocog, curran2017one, huang2018breathlive, liu2018vocal, chen2017your, song2016eyeveri, chauhan2017breathprint, ho2017mini, crawford2017authentication, xu-soups}. However, authentication has also been framed as a one-class classification problem~\cite{one-class-face, xu-soups} or as multi-class classification~\cite{xu-soups}, e.g., in a discrimination model, as noted earlier. In one-class classification, only samples from the target user are used to create the template, and the goal is to detect outliers. If this is achieved in a manner similar to distance-based classifiers, then as we have seen in Section~\ref{sec:distance_classifier}, and as previously indicated in~\cite{pagnin2014leakage}, the AR is expected to be small. In the multi-class setting, each of the $n$ users is treated as a different class. This increase in classes is expected to proportionally lower the AR. However, whether this behavior is observed on real world data requires additional experimentation. We remark that as observed in Section~\ref{sub:eff-var}, AR is highly dependent on the relative variance of the positive user and the negative user features. This may lead to the possibility of larger AR for some of the users, consequently leading to higher risk of attack for these users. We leave thorough investigation of the one-class and multi-class settings as future work.} \end{itemize} \section{Related Work} \label{sec:related} There are several mentions of attacks similar to the random input attack discussed in this paper. Pagnin et al.~\cite{pagnin2014leakage} define a \emph{blind brute-force attack} on biometric systems where the attacker submits random inputs to find an accepting sample. The inputs are $n$-element vectors whose elements are integers in the set $\{0, 1, \ldots, q - 1\}$. The authors conclude that the probability of success of this attack is exponential in $n$, assuming that the authentication is done via a distance function (discarding any vector outside the ball of radius determined by the system threshold). They concluded that blind brute force attack is not effective in recovering an accepting sample. While this may apply to distance-based matching, the same conclusion cannot be made about machine learning based algorithms whose decision functions are more involved. Indeed, we have shown that the acceptance region for machine learning classifiers is not exponentially small. It has also been argued that the success rate of random input attacks can be determined by the false positive rate (FPR), at least in the case of fingerprint and face authentication~\cite{martinez-hill, vulnerable-face}. We have shown that for sophisticated machine learning classifiers this conclusion is not true, and random input attacks in many instances success at a rate higher than FPR. A more involved method is hill-climbing~\cite{soutar-hill, martinez-hill} which seeks an accepting sample via exploiting the confidence scores returned by the matching algorithm. The authentication systems considered in this paper do not return confidence scores. Serwadda and Phoha~\cite{serwadda2013kids} use a robotic finger and population statistics of touch behavior on smartphones to launch a physical attack on touch-based biometric authentication systems. Their attack reduces the accuracy of the system by increasing the EER. In contrast, our work does not assume any knowledge of population biometric statistics, e.g., population distribution of feature space. It is an interesting area of work to investigate whether a robotic finger can be programmed to generate raw inputs used in our attack. Garcia et al.~\cite{garcia2018explainable} use explainable-AI techniques~\cite{explainable-AI} to construct queries (feature vectors) to find an accepting sample in machine learning based biometric authentication systems. On a system with 0 FPR, they show that their attack is successful in breaching the system with up to 93\% success rate. However, their attack is more involved: it requires the construction of a seed dataset containing representative accepting and rejecting samples of a user set chosen by the adversary. This dataset trains a neural network as a substitute to the classifier of the authentication system. The adversary then uses explainable AI techniques to obtain an accepting sample of a target user (not in the seed dataset) in as few queries as possible, by updating the substitute network. The authors also report a random feature vector attack, however, the attack is only successful on one out of 16 victims. The random feature vector is constructed by sampling each feature value via a normal distribution (distribution parameters not stated), unlike the uniform distribution in our case. We also note that they propose including images with randomly perturbed pixels as a counter-measure to defend against the aforementioned random input attack. This is different from our proposed beta-distributed noise mitigation technique, as it is agnostic to the underlying biometric modality. The frog-boiling attack~\cite{chan2011frog, huang2011adversarial} studies the impact of gradual variations in training data samples to manipulate the classifier decision boundary. In this work we do not consider the adversary with access to the training process, nor do we evaluate models with an iterative update process. If this threat model is considered for the problem addressed in this paper, then an adversary may seek to maximize the acceptance region of a model by gradually poisoning the training dataset. As we have demonstrated in Section~\ref{sec:synthetic}, the relative variance between the user's data and population dataset directly impacts AR. Thus the manipulation of a user's training samples to be more varied would be effective in increasing the AR. Likewise, in our mitigation technique, we have shown that beta-distributed noise is effective in the minimization of AR. However an adversary might poison the training data by labeling beta noise as positive samples resulting in a maximization of the acceptance region to near 100\% of the feature space. Our work is different from another line of work that targets machine learning models in general. For instance, the work in~\cite{papernot-practical} shows an \blue{\emph{evasion attack} where the adversary, through only blackbox access to a neural network, forces the classifier to misclassify an input by slightly perturbing the input even though the perturbed sample is perceptually similar to the original sample, e.g., noisy images.} The attack can be applicable to the authentication setting as well. However, it relies on the confidence values (probability vectors) returned by the classifier, which is not the case in authentication. Similarly, the work in~\cite{tramer2016stealing} shows how to steal a machine learning model, i.e., retrieve its undisclosed parameters, which only returns class labels (accept/reject decision in the case of authentication). They describe several techniques including the Lowd and Meek attack~\cite{lowd-meek} to retrieve a model sufficiently similar to the target model. The machine learning models considered in their attack are for applications different from authentication where one expects to find an accepting sample with negligible probability. \blue{There are also proposals to defend against the above mentioned evasion attacks. The goal is to make the classifiers \emph{robust} against adversarial inputs in the sense that classification is constant within a ball of certain radius around each input~\cite{madry2017towards, cohen2019certified}. Madry et al.~\cite{madry2017towards} propose a theoretical framework which formalizes defense against adversarial attacks by including adversarially perturbed samples in the loss function of DNNs. They show that it is possible to train DNNs robust against a wide range of adversarial input attacks. Cao and Gong~\cite{cao2017mitigating} propose another defense where given a test input, random points within a hypercube surrounding the input are sampled, and the majority label returned by the already trained DNN is assigned to the test input. Randomized smoothing~\cite{cohen2019certified} creates a separate classifier from any classifier such that its prediction within a Gaussian noise region (ball) around any input is constant, and consequently less likely to produce an erroneous prediction. We note that in evasion attacks there is a notion of \emph{nearness}, i.e., the adversary is given an input and seeks to add a small amount of noise such that the resultant erroneously labelled input is close to the original input. In contrast, in our case the random input need not be close to the target user's samples or even follow the same distribution. Furthermore, we have shown that even a conservative estimate of the true positive region is negligible in comparison to the entirety of the feature space (Section~\ref{sec:attack_area}). Thus, it is unclear whether such defenses apply to uniform random inputs, as opposed to random perturbations of inputs.} Membership inference attacks \cite{shokri2017membership, salem2018ml} attempt to determine if a record obtained by an adversary was part of the original training data of the model. Whilst this attack does not compromise the security of the model, it breaches the privacy of the individual records. These attacks create a \emph{shadow model}~\cite{shokri2017membership} to mimic the behavior of the target model. Salem et al.~\cite{salem2018ml} construct a shadow model using only positive class samples and negative noise generated via uniformly random feature vectors. However it is hypothesized that these random samples belong to non-members, i.e., the negative class~\cite[\S V.B]{salem2018ml}. We have shown that a large portion of these random inputs may \blue{also belong to the positive class.} \blue{Finally, we point to other works in literature analyzing the security of biometric authentication systems. Sugrim et al.~\cite{sugrim2019robust} survey and evaluate a range of performance metrics used in biometric authentication schemes. They seek to motivate scheme designers to leverage robust metrics to provide a complete description of the system, including a proposal of the new metric: Frequency Count Score (FCS). The FCS metric shows a distribution of scores of legitimate and unauthorized users, identifying the overlap between the two distributions which helps to select the appropriate threshold for the classification decision. The FCS, however, is dependent on the negative class or samples of other users, which does not include random inputs. The work in~\cite{sugrim2019recruit} investigates the accuracy of authentication systems reported on a small number of participants when evaluated over an increasing number of users. The authors suggest that performance limits of a system with a small number of participants should be evaluated iteratively by increasing the participant count until a the performance degrades below a tolerable limit. } \section{Conclusion} It is important to assess the security of biometric authentication systems against random input attacks akin to the security of passwords against random guess attacks. We have demonstrated that without intentionally including random inputs as part of the training process of the underlying machine learning algorithm, the authentication system is likely to be susceptible to random input attacks at a rate higher than indicated by EER. Absent any other detection mechanism, e.g., liveliness detection, this renders the system vulnerable. The mitigation measures proposed in this paper can be adopted to defend against such attacks. \section{Acknowledgments} This research was funded by the Optus Macquarie University Cybersecurity Hub, Data61 CSIRO and an Australian Government Research Training Program (RTP) Scholarship. We would like to thank the anonymous reviewers and our shepherd Kevin Butler for their feedback to improve the paper. \begin{figure*}[!ht] \centering \subfloat[Touch Average ROC in the presence of Beta Noise\label{fig:touch_betarand_def}]{% \includegraphics[width=0.87\linewidth]{images/touch_betaranddefence_roc-crop.pdf}}\\[-0.2pt] \subfloat[Face Average ROC in the presence of Beta Noise\label{fig:face_betarand_def}]{% \includegraphics[width=0.87\linewidth]{images/face_betaranddefence_roc-crop.pdf}}\\ \vspace{-0.2cm} \caption{Beta-noise mitigation of AR, with additional negative samples from the RAR feature set. The EER is marked on the diagrams as a vertical line. Addition RAR vectors were included as it was previously observed that beta noise is sufficient in mitigating AR attacks, but not the RAR attack.} \label{fig:all_betarand_def} \vspace{-0.2cm} \end{figure*} \bibliographystyle{IEEEtran} \section{Mitigation} \label{sec:mitigation} In the previous section, we validated that higher variance in the samples in the negative class as compared to the variance of samples from the target user class reduces AR. The data from the negative class is obtained from real user samples, and therefore scheme designers cannot control the variance. However, this gives us a simple idea to minimize AR: generate noise vectors around the target user's vectors and treat it as part of the negative class for training the model. This will result in the tightening of the acceptance region around the true positive region. We remark that the noise generated is independent of the negative training samples. \subsection{The Beta Distribution} More specifically, we generate additional negative training samples by sampling noisy vectors where each feature value is sampled from a beta distribution. We generate samples equal to the number of samples in the positive class. Thus creating a dataset with a third of the samples as positive, another third as negative samples from other users, and finally the remaining third of feature vectors treated as negative samples from the beta distribution dependent on the positive user. The procedure is as follows. For the $i$th feature, let $\mu_i$ denote the mean value for the given target user. We use the beta distribution with parameters $\alpha_i = | 0.5 - \mu_i| + 0.5$ and $\beta_i = 0.5$. We denote the resulting beta distribution by $\mathcal{B}e(\alpha_i, \beta_i)$. Then a noisy sample $\mathbf{x}$ is constructed by sampling its $i$th element $x_i$ from the distribution $ \mathcal{B}e(\alpha_i, \beta_i)$ if $\mu_i \le 0.5$, and from $1 - \mathcal{B}e(\alpha_i, \beta_i)$ otherwise. The two cases ensure that we add symmetric noise as the mean moves over to either side of $0.5$. \descr{Results on AR.} In Table \ref{tab:summary_ar}, we show the resulting FPR and AR after the addition of beta noise at the equal error rate. The detailed ROC curves are shown in Figure~\ref{fig:all_beta_def} in Appendix~\ref{sec:mitigation_roc}. In every configuration (classifier-dataset pairs), we see a significant decrease in AR. The AR is now lower than FPR in every configuration. In 14 out of 16 cases, the AR is $\le 0.04$. The two exceptions are LinSVM (with face and voice datasets). We further see that in 13 out of 16 instances the FPR either remains unchanged or improves! The 3 instances where the FPR degrades are LinSVM with face and face datasets both by $+0.015$, and DNN with Touch where the difference is $+0.05$. Thus, adding beta distributed noise does indeed decrease the AR with minimal impact on FPR. This agrees with our postulate that high AR was likely due to loose decision boundaries drawn by the classifier, and the addition of beta noise tightens this around the true positive region. Figure \ref{fig:individual_ar-fpr_def} in Appendix~\ref{sec:mitigation_roc} displays individual user FPRs and ARs. \descr{Results on RAR.} Interestingly, beta distributed noise only marginally reduces the raw acceptance rate as can be seen in Table~\ref{tab:summary_rar} (columns labeled $\beta$-RAR). The reason for this lies in the volume of the region spanned by random raw inputs. We previously saw in Section~\ref{sub:rar-results} that it was (a) exponentially small and (b) many orders of magnitude smaller than the true positive region. Thus, it is unlikely that beta distributed noise will lie in this region to aid the model to label them as negative samples. Consequently we sought another means to mitigate this attack surface. \subsection{Feature Vectors from Raw Inputs as Negative Samples} Our mitigation strategy to reduce RAR is to include a subset of raw input vectors in the training process, whose cardinality is equal to the number of positive user samples in the training dataset. The training dataset now contains 1/4th each of raw input vectors, beta-noise, positive samples, and samples from other users. \descr{Results on AR and RAR.} Table~\ref{tab:summary_rar} shows that the mitigation strategy reduces the RAR to less than or equal to 0.03 in all instances (columns labeled RAR). The resulting FPR is marginally higher than the FPR from only beta-distributed noise in some cases (Table~\ref{tab:summary_ar}). Thus, the inclusion of beta-distributed noise in conjunction with subset of raw inputs in the training data reduces both AR and RAR with minimal impact on FPR and FRR. \section{Synthetic Dataset} \label{sec:synthetic} \begin{figure*}[th!] \centering \includegraphics[width=1.0\textwidth]{images/isolate_user_variance-crop.pdf} \vspace{-0.65cm} \caption{A comparison between FPR, AR, four different ML architectures. Trained on synthetic data of 50 features of 50 user, of increasing variance within features for a singular user, repeated 50 times. Note how the system level AR and FPR remains unchanging, despite the isolated user's AR increasing substantially.} \label{fig:isolate_userv} \vspace{-0.10cm} \end{figure*} \begin{figure*}[th!] \centering \includegraphics[width=1.0\textwidth]{images/isolate_other_variance-crop.pdf} \vspace{-0.65cm} \caption{A comparison between FPR, AR, four different ML architectures. Trained on synthetic data of 50 features of 50 user, of increasing variance within features of all other users except a singular user, repeated 50 times. The x-axis denotes the relative SD of the population compared with the isolated user.} \label{fig:isolate_otherv} \vspace{-0.05cm} \end{figure*} The analysis in the previous section was limited in the sense that we could not isolate the reasons behind the discrepancy between AR and FPR. Indeed, we saw that for some configurations (dataset-classifier pairs), the AR curve nicely followed the FPR curve, e.g., the face dataset and DNN (Figure~\ref{fig:face_ind}), where as for others this was not the case. In order to better understand the factors effecting AR, in this section we attempt to empirically verify the hypothesized factors effecting the acceptance region outlined in Section~\ref{sec:attack_def}. Namely, high feature variance in a target user's samples is likely to increase AR, and low feature variance in the user samples in the negative class is expected to result in high AR. In both these cases, we expect to achieve a reasonably low EER, but AR may still be significantly greater than FPR. Moreover, if these factors are indeed true, we expect to see similar behavior across all classifiers. To test this we create a synthetic model of a biometric dataset. \subsection{Simulating a Biometric Dataset} Let $\mathcal{N}(\mu, \sigma^2)$, denote the normal distribution with mean $\mu$ and standard deviation $\sigma$. We assume each feature to be normally distributed across all users with slight variations in mean and standard deviation across all features and users. More specifically, our methodology for generating the synthetic dataset is as follows. \begin{enumerate}[leftmargin=5mm] \item We model the mean of all $n$ features taking values in the unit interval $\mathbb{I}$ as a normally distributed random variable $\mathcal{N}(\mu_{\text{mn}}, \sigma^2_{\text{mn}}) = \mathcal{N}(0.5, 0.1^2)$. Similarly we model the standard deviation of all $n$ features as another normally distributed random variable $\mathcal{N}(\mu_{\text{var}}, \sigma^2_{\text{var}}) = \mathcal{N}(0.1, 0.07^2)$. \item For each feature $i \in [n]$, we first sample $\mu_i \leftarrow \mathcal{N}(\mu_{\text{mn}}, \sigma^2_{\text{mn}})$ and $\sigma_i \leftarrow \mathcal{N}(\mu_{\text{var}}, \sigma^2_{\text{var}})$. The resulting normal distribution $\mathcal{N}(\mu_{i}, \sigma^2_{i}) $ serves as the population distribution of the mean of the feature $i$. \item For each user $u$, we sample the mean $\mu_{u, i} \leftarrow \mathcal{N}(\mu_{i}, \sigma^2_{i})$. The variance $\sigma^2_{u, i}$ is chosen as the control variable. User $u$'s samples for the $i$th feature are generated as i.i.d. random variables $\mathcal{N}(\mu_{u, i}, \sigma^2_{u, i})$, which serves as user $u$'s distribution for the $i$th feature. \end{enumerate} We evaluate the same four types of ML architectures, LinSVM, RBFSVM, RNDF and DNN. Due to the large number of potential configurations we evaluate the model performance at a fixed threshold of 0.5. For the experiments we choose 50 (synthetic) users, with 50 features in the feature space. Each experimental run is repeated 50 times \blue{to reduce any potential biases arising from the random process.} \blue{ \begin{figure*}[th!] \centering \includegraphics[width=1.0\textwidth]{images/synth_cosine_roc-crop.pdf} \vspace{-0.7cm} \caption{\blue{ROC Curves versus the AR curve for different ML architectures, including a cosine similarity distance-based classifier. Trained on synthetic data of 50 features of 50 user, with fixed mean and variance for features of all users, repeated 50 times.}} \label{fig:cosine_results} \vspace{-0.1cm} \end{figure*} \begin{figure*}[th!] \centering \includegraphics[width=1.0\textwidth]{images/synthetic_vary_nusers-crop.pdf} \vspace{-0.6cm} \caption{\blue{A comparison between FPR and AR of four different ML architectures. Trained on synthetic data of 50 features per user, with a variable number of users, repeated 50 times.}} \label{fig:vary_users} \vspace{-0.2cm} \end{figure*} } \subsection{Effects of Feature Variance on Acceptance Region} \label{sub:eff-var} \subsubsection{Variable Isolated User Variance and Fixed Population Variance} We first treat one out of the 50 users as an outlier, whcih we call the \emph{isolated} user. The variance $\sigma^2_{u, i}$ is fixed at $(0.2)^2$ for all other users $u$ and for all features $i \in [n]$. We vary the variance $\sigma_{u_\text{tgt}, i}$ of the isolated user $u_\text{tgt}$ from 0.05 to 0.35 in increments of 0.05. Figure~\ref{fig:isolate_userv} plots the user's standard deviation $(\sigma_{u_\text{tgt}, i})$ relative to the fixed population standard deviation $(\sigma_{u, i})$ of 0.2. It is clear the overall AR, FRR and FPR of the users is not affected by changing feature variance of a single user, despite the isolated user's samples included as part of training and testing data of other users. Conversely, when viewing the AR, FRR and FPR of the isolated user, we observe a slight increase in FRR and FPR as the relative variance increases. This is due to the positive samples being spread out due to increased variance in the isolated user's samples. However, this is accompanied by a substantially large increase in the acceptance region of this user, approaching 1, i.e., the entire feature space. Furthermore, this trend is visible for all four classifiers. \subsubsection{Fixed Isolated User Variance and Variable Population Variance} In this experiment, we fix the variance $\sigma^2_{u_\text{tgt}, i}$ of the isolated user ($u_\text{tgt}$) at $(0.2)^2$. The $\sigma^2_{u, i}$ of the remaining population is sampled from a normal distribution $\sigma_{u, i} \leftarrow \mathcal{N}(\mu_{i}, \sigma^2_{i})$. Where $\mu_{i}$ and $\sigma_{i}$ is sampled from the following distributions $\mathcal{N}(\mu_{\text{mn}}, \sigma^2_{\text{mn}}) = \mathcal{N}(\mu_{\text{mn}}, 0.05^2)$ and $\mathcal{N}(\mu_{\text{var}}, \sigma^2_{\text{var}}) = \mathcal{N}(0.03, 0.02^2)$, respectively. $\mu_{\text{mn}}$ is varied between 0.05 and 0.35 in increments on 0.05 This sampling permits a small amount of variation between features. The results are shown in Figure \ref{fig:isolate_otherv}. Inspecting the average AR, FRR and FPR of the system, it is evident there is a continual increase of all 3 metrics as the relative variance increases. This increase is expected as the majority of users' feature values have high variance, presenting an increasingly difficult problem for the machine learner to reduce misclassification errors. However, in all four classifiers the average AR curve is either comparable or lower than the FPR curve as the relative variance increases. For the isolated user, we see that when the relative variance of all other users is lower than this user (to the left), the AR is significantly higher even though the FPR and FRR are minimal in all four classifiers. This shows that less variance in the population samples will result in a high AR, as the classifier need not tighten AR around the true positive region, due to lack of high variance negative samples. On the other hand, AR of the isolated user decreases as the relative variance of the population increases. \blue{ \subsection{On Distance Based Classifiers} \label{sec:distance_classifier} } \blue{ As noted earlier, it has been stated that random inputs are ineffective against distance-based classification algorithms~\cite{pagnin2014leakage}. This is in contrast to the machine learning based algorithms evaluated in this paper. We take a brief interlude to experimentally evaluate this claim on the cosine similarity distance-based classifier. We sample 50 features with means distributed as $\mathcal{N}(\mu_{\text{mn}}, \sigma^2_{\text{mn}}) = \mathcal{N}(0.2, 0.05^2)$ and variance distributed as $\mathcal{N}(\mu_{\text{var}}, \sigma^2_{\text{var}}) = \mathcal{N}(0.03, 0.02^2)$. Cosine similarity is computed between two vectors of the same length. As our positive training data contains more than one training sample, we use the average of these samples as the representative template of the user~\cite{chauhan2016gesture}. We use a fixed number of 50 users, with the experiment repeated 50 times. Recall that our evaluation at each threshold is best-effort; we use 1,000 threshold bins for the evaluation of the cosine similarity classifier, since the FRR and FPR rapidly change over a small range of thresholds. Figure~\ref{fig:cosine_results} displays three classical machine learning algorithms of linear SVM, radial SVM, and random forests, alongside a distance-based cosine similarity classifier. It is clear from the figure, that the AR is near zero for cosine similarity, unlike the other classifiers using the same synthetic dataset. This, however, comes at the cost of higher EER. This suggests that distance-based classifiers are effective in minimizing the AR of model, but at the expense of accuracy of the system. We leave further investigation of distance-based classifiers as future work. \subsection{Effects of Increasing Synthetic Users} \label{sec:vary_users} The real-world datasets used in Section~\ref{sec:realscheme} have a variable number of users. Our binary classification task aggregates negative user samples into a negative class, resulting in distributions and variances of the negative class which depend on the number of users in the datasets. Thus, in this test we investigate the impact on TPR, FPR and AR by varying the number of users in the dataset. We use the synthetic dataset configured in the same manner as in Section~\ref{sec:distance_classifier}. We increase the number of users within the synthetic dataset, from 25 to 150, in increments of 25. Note that the split between positive and negative samples is still balanced (see Remark~\ref{rem:balanced}). In Figure \ref{fig:vary_users}, we observe that with the addition of more users, there is a slight increase in the FPR. This is expected as the likelihood of user features being similar between any two users will increase with more users in the population. As the training of the classifier uses samples from other users as a negative class, the increased number of negative users slightly lowers the AR of the classifier, with an increased variation of the negative training set (from additional users) covering more of the feature space. However, both these changes are relatively minor despite the multi-fold increase in the number of users. Thus, the AR of the classifiers remains relatively stable with an increasing number of users. } \section{Mitigation ROC Plots}\label{sec:mitigation_roc} This appendix contains plots of the results as discussed in Section \ref{sec:mitigation}. Figure~\ref{fig:individual_ar-fpr_def} contains per-user scatter plots of AR and FPR for all biometric modalities and algorithms. For the same classifiers, Figure~\ref{fig:all_beta_def} illustrates the ROC curves for classifiers trained with the inclusion of beta distributed noise only. Finally, Figure~\ref{fig:all_betarand_def} displays the ROC curves for all classifiers of touch and face datasets with the inclusion of both beta distributed noise and raw input vectors as an additional mitigation strategy against the the raw inputs, which were unfazed by the beta noise. A summary of changes in FRR, FPR, AR and RAR of both Figure~\ref{fig:all_beta_def} and \ref{fig:all_betarand_def} have been provided earlier in Table~\ref{tab:summary_ar} and \ref{tab:summary_rar} of Section~\ref{sec:mitigation}. \begin{figure*}[htbp] \centering \subfloat[Gait\label{fig:gait_ind_def}]{% \includegraphics[width=0.23\linewidth]{images/gait_defencerand_arind-crop.pdf}} \hspace*{0.7\fill} \subfloat[Touch\label{fig:touch_ind_def}]{% \includegraphics[width=0.23\linewidth]{images/touch_defencerand_arind-crop.pdf}} \hspace*{0.7\fill} \subfloat[Face\label{fig:face_ind_def}]{% \includegraphics[width=0.23\linewidth]{images/face_defencerand_arind-crop.pdf}} \hspace*{0.7\fill} \subfloat[Voice\label{fig:voice_ind_def}]{% \includegraphics[width=0.23\linewidth]{images/voice_defencerand_arind-crop.pdf}} \vspace{-0.2cm} \\ \caption{Individual user scatter of AR and FPR after the addition of beta distributed noise. A substantial proportion of users now exhibit an AR close to zero, or below the AR = FPR. Unfortunately, this defense mechanism did not completely minimize the AR of LINSVM for the Face authenticator. Nor did this defense protect two outlying users in the RNDF voice authenticator.} \label{fig:individual_ar-fpr_def} \vspace{-0.2cm} \end{figure*} \vfill \begin{figure*}[htbp] \centering \subfloat[Gait Average ROC in the presence of Beta Noise\label{fig:gait_beta_def}]{% \includegraphics[width=0.88\linewidth]{images/gait_betadefence_roc-crop.pdf}}\\ \subfloat[Touch Average ROC in the presence of Beta Noise\label{fig:touch_beta_def}]{% \includegraphics[width=0.88\linewidth]{images/touch_betadefence_roc-crop.pdf}}\\ \subfloat[Face Average ROC in the presence of Beta Noise\label{fig:face_beta_def}]{% \includegraphics[width=0.88\linewidth]{images/face_betadefence_roc-crop.pdf}}\\ \subfloat[Voice Average ROC in the presence of Beta Noise\label{fig:voice_beta_def}]{% \includegraphics[width=0.88\linewidth]{images/voice_betadefence_roc-crop.pdf}} \caption{Beta-noise mitigation of AR, with additive negative training noise sampled from a symmetric beta distribution around the mean of the user's features. The EER is marked on the diagrams as a vertical line. It is noted the plots with RAR curves the additional Beta-noise is not sufficient in mitigating RAR attacks.} \label{fig:all_beta_def} \end{figure*} \section{DNN Estimator configuration.} \label{sec:dnn_config} All models were trained for 5000 steps, with batch size of 50, with the Adagrad optimizer. \blue{The exact layer configuration of the \texttt{DNNEstimator}~\cite{tensorflow-estimators} used can be found on our project page (\url{https://imathatguy.github.io/Acceptance-Region/}).} \section{Evaluation on Biometric Systems} \label{sec:realscheme} To evaluate the issue of acceptance region on real-world biometric systems, we chose four different modalities: gait, touch, face and voice. The last two modalities are used as examples of user authentication at the point of entry into a secured system, whilst gait and touch are often used in continuous authentication systems~\cite{barbello2016continuous}. We first describe the four biometric datasets, followed by our evaluation methodology, the machine learning algorithms used, and finally our results and observations. \subsection{The Biometric Datasets} \label{sub:datasets} \subsubsection{Activity Type (Gait) Dataset} The activity type dataset \cite{anguita2013public}, which we will refer to as the ``gait'' dataset, was collected for human activity recognition. Specifically its aim is to provide a dataset for determining if a user is sitting, laying down, walking, running, walking upstairs or downstairs, etc. However, as the dataset retains the unique identifiers for users per biometric record, we re-purpose the dataset for authentication. This dataset contains 30 users, with an average of $343 \pm 35$ ($\text{mean} \pm \text{SD}$) biometric samples per user, there is an equal number of activity type samples for each user. For the purpose of authentication, we do not isolate a specific type of activity. Instead, we include them as values of an additional feature. The activity type feature increases the total number of features to 562. We will refer to these features as \emph{engineered} features as they are manually defined (e.g., by an expert) as opposed to \emph{latent} features extracted from a pre-trained neural network for the face and voice datasets. \subsubsection{Touch Dataset} The UMDAA-02 Touch Dataset \cite{mahbub2016active} is a challenge dataset to provide data for researchers to perform baseline evaluations of new touch-based authentication systems. Data was collected from 35 users, with an average of $3667 \pm 3012$ swipes per user. This dataset was collected by lending mobile devices to the participants over a prolonged period of time. The uncontrolled nature of the collection produces a dataset that accurately reflects swipe interactions with constant and regular use of the device. This dataset contains every touch interaction performed by the user including taps. In a pre-processing step we only consider sequences with more than 5 data points as swipes. Additionally, we set four binary features to indicate the direction of the swipe, determined from the dominant vertical and horizontal displacement. We retained all other features in \cite{mahbub2016active} bar inter-stroke time, as we wished to treat each swipe independently, without chronological order. We substitute this feature with half-time of the stroke. This produces a total of 27 engineered touch features. \subsubsection{Face Dataset} \label{subsub:face-dataset} FaceNet~\cite{schroff2015facenet} proposes a system based on neural networks that can effectively learn embeddings (feature vectors) that represent uniquely identifiable facial information from images. Unlike engineered features, these embeddings may not be directly explainable as they are automatically extracted by the underlying neural network. This neural network can be trained from any dataset containing labeled faces of individuals. There are many sources from which we can obtain face datasets, CASIA-WebFace~\cite{yi2014learning}, VGGFace2~\cite{cao2018vggface2} and Labeled Faces in the Wild (LFW)~\cite{LFWTechUpdate} are examples of such datasets. However, with a pre-trained model, we can conserve the time and resources required to re-train the network. The source code for FaceNet~\cite{facenet-source} contains two pretrained models available for public use (at the time of writing): one trained on CASIA-WebFace, and another trained on VGGFace2. We opt to use a model pre-trained on VGGFace2\footnote{(20180402-114759) is the identifier of pre-trained model used.} , while retaining CASIA-WebFace as our dataset for classifier training. We choose to use different datasets for the training of the embeddings and the classifiers to simulate the exposure of the model to never before seen data. Our face dataset is a subset of CASIA-WebFace containing only the top 100 identities with the largest number of face images (producing $447 \pm 103$ images per individual). This model produces 512 latent features from input images of pixel size 160x160 which have been centered and aligned. Recall that face alignment involves finding a bounding box on the face on an image, before cropping and resizing to the requested dimensions. \subsubsection{Speaker Verification (Utterances) VoxCeleb~\cite{nagrani2017voxceleb}, and VoxCeleb2~\cite{chung2018voxceleb2} are corpuses of spoken recordings by celebrities in online media. These recordings are text-independent, i.e., the phrase uttered by the user is not pre-determined. Text-independent speaker verification schemes depart from text-dependent verification schemes in which the individual is bound to repeat a pre-determined speech content. Thus, the task of text-independent verification (or identification) is to distinguish how the user speaks as an individual, instead of how the user utters a specific phrase. The former objective is an arguably harder task. Despite the increased difficulty, researchers have trained neural networks to convert speaker utterances into a set of latent features representing how individuals speak. These works have also released their models to the public, increasing the accessibility of speaker verification to developers. We opt to use the pre-trained model of VoxCeleb~\cite{nagrani2017voxceleb}, with utterances from VoxCeleb2~\cite{chung2018voxceleb2}. From VoxCeleb2, we only use the test portion of the dataset, which contains 118 Users with an average of $406 \pm 87$ utterances. VoxCeleb was trained as a Siamese neural network~\cite{siamese-bromley} for one-shot comparison between two audio samples. A Siamese network consists of two identical branches that produce two equal size outputs from two independent inputs for distance comparison. To fit the pre-trained model into our evaluation of ML-based models, we extract embeddings from one of the twin networks and disregard the second branch. The 1024-length embedding is then used as the feature vector within our evaluation. \subsection{Evaluation Methodology} \label{sub:eval-method} In our creation of biometric models for each user, we seek to obtain the baseline performance of the model with respect to the ability of negative user samples gaining access (i.e. FPR), and the measured Acceptance Region (AR). We use the following methodology to evaluate these metrics for each dataset and each classification algorithm. \begin{enumerate}[leftmargin=5mm] \item We min-max normalize each extracted feature over the entire dataset between 0 and 1. \item We partition the dataset into a $(70\%, 30\%)$ split for training and testing sets, respectively. \item For both training and testing samples, we further sample an equal number of negative samples from every other user such that the total number of negative samples are approximately equal to the number of samples from the target user, representing the positive class, i.e., the positive and negative classes are balanced. \item Using the balanced training set from step 3, we train a two-class classifier defining the target user set as the positive class, and all remaining users as negative. \item We test the trained model using the balanced testing set from step 3. This establishes the FRR and FPR of the system. \item We uniformly sample one million vectors from $\mathbb{I}_n$, where $n$ is the dimension of the extracted features. Testing the set of vectors against the model measures the acceptance region (AR). \item We record the confidence values of the test prediction for the user's positive test samples, other users' negative test samples, and the uniformly sampled vectors. These confidence values produce ROC curves for FRR, FPR and AR. \item Repeat steps 3-7 by iterating through every user in the dataset as the target user. \end{enumerate} \begin{remark} \label{rem:monte-carlo} In general, the decision regions (accept and reject in the case of authentication) learned by the classifiers can be quite complex~\cite{region-dnn}. Hence, it is difficult to determine them analytically, despite the availability of learned model parameters. We instead use a Monte Carlo method by sampling random feature vectors from $\mathbb{I}_n$ where each feature value is sampled uniformly at random from $\mathbb{I}$. With enough samples (one million used in our experiments, \blue{ and averaged over 50 repetitions}), the fraction of random samples accepted by the classifier serves as an estimate of the acceptance region as defined by Eq.~\ref{eq:ar} due to the law of large numbers. \end{remark} \blue{ \begin{remark} Our evaluation of the biometric systems is using the mock attacker model (samples from the negative class modelled as belonging to an attacker) as it is commonly used~\cite{eberz2017evaluating}. We acknowledge that there are other attack models such as excluding the data of the attacker from the training set~\cite{eberz2017evaluating}. Having the attacker data included in the training dataset, as in the mock attacker model, yields better EER. On the other hand, it is also likely to lower the AR of the system, due to increased variance in the negative training dataset. Thus, the use of this model does not inflate our results. \end{remark} } \blue{ \begin{remark} \label{rem:balanced} We have used balanced datasets in our experiments, i.e., the number of positive and negative samples being the same. It is true that a balanced dataset is not ideal for minimizing AR; more negative samples may reduce the acceptance region. However, an unbalanced dataset, e.g., more negative samples than positive samples, may be biased towards the negative class, resulting in misleadingly high accuracy~\cite{eberz2017evaluating, sugrim2019robust}. A balanced dataset yields the best EER without being biased towards the positive or negative class. \end{remark} } \subsection{Machine Learning Classifiers} Our initial hypothesis (Section~\ref{sec:attack_def}) stipulates that AR is related to the training data distribution, and not necessarily to any weakness of the classifiers learning from the data. To demonstrate this distinction, we elected four different machine learning algorithms: Support Vector Machines (SVM) with a linear kernel (LinSVM), SVM with a radial basis function kernel (RBFSVM), Random Forests (RNDF) and Deep Neural Networks (DNN). Briefly, SVM uses the training data to construct a decision boundary that maximizes the distance between the closest points of different classes (known as support vectors). The shape of this boundary is dictated by the kernel used; we test both a linear and a radial kernel. Random Forests is an aggregation of multiple decision tree learners formally known as an ensemble method. Multiple learners in the aggregation are created through bagging, whereby the training dataset is split into multiple subsets, each subset training a distinct decision tree. The decisions from the multiple models are then aggregated to produce the random forest's final decision. DNNs are a class of machine learning models that contain hidden layers between an input and an output layer; each layer containing neurons that activate as a function of previous layers. Specifically we implement a convolutional neural network with hidden layers leading to a final layer of our two classes, accept and reject. All four of these machine learning models are trained as supervised learners. As such, we provide the ground truth labels to the model during training. The linear SVM was trained with $C=10^4$, and default values included within Scikit-learn's Python library for the remaining parameters \cite{scikit-learn}. For radial SVM we also used $C=10^4$ while keeping the remaining parameters as default. The Random Forests classifier was configured with 100 estimators. DNNs were trained with TensorFlow Estimators~\cite{tensorflow-estimators} with a varying number of internal layers depending on the dataset. The exact configurations are noted in Appendix~\ref{sec:dnn_config}. \begin{remark} We reiterate that our trained models are reconstructions of past works. However, we endeavor that our models recreate error rates similar to the originally reported values on the same dataset. On Mahbub et al.'s touch dataset~\cite{mahbub2016active}, the authors achieved 0.22 EER with a RNDF classifier, by averaging 16 swipes for a single authentication session. We are able to achieve a comparable EER of 0.21 on RNDF without averaging. For face authentication, we evaluate a subset of CASIA-Webface, consequently there is no direct comparison. The original Facenet accuracy in verifying pairs of LFW~\cite{LFWTechUpdate} faces is 98.87\%~\cite{schroff2015facenet}, but our adoption of model-based authentication is closer to~\cite{explainable-AI}, unfortunately the authors have fixed a threshold for 0 FPR without reporting their TPR. Nagrani, Chung and Zisserman's voice authenticator~\cite{nagrani2017voxceleb} reports an EER of 0.078 on a neural network. Our classifiers achieve EERs of 0.03, 0.02, 0.04 and 0.12, which are within range of this benchmark. Our gait authenticator is the exception, it has not been evaluated for authentication with it's mixture of activity types. However, a review of gait authentication schemes can be found at~\cite{sprager2015inertial}. \end{remark} \subsection{Acceptance Region: Feature Vector API} In this section, we evaluate the acceptance region (AR) by comparing it against FPR for all 16 authentication configurations (four datasets and four classifiers). In particular, we display ROC curves showing the trade-off between FPR and FRR against the acceptance region (AR) curve as the model thresholds are varied. These results are averaged over all users. While this gives an average picture of the disparity between AR and FPR, it does not highlight that for some users AR may be substantially higher than FPR, and vice versa. In such a case, the average AR might be misleading. Thus, we also show scattered plots showing per-user AR and FPR, where the FPR is evaluated at EER. The per-user results have been averaged over 50 repetitions to remove any bias resulting from the sampled/generated vectors. The individual user AR versus FPR scatter plots are shown in Figure~\ref{fig:all_ind}, and the (average) AR curves against the ROC curves are shown in Figure~\ref{fig:all_roc}. \begin{remark} EER is computed in a best effort manner, with only 100 discretized threshold values, to mitigate the storage demands of the 1M uniformly random vectors measuring AR. Unfortunately, there are some instances whereby the FRR and FPR do not match exactly, as the threshold step induces a large change in both FRR and FPR. Only 1/16 classifiers exhibit an FPR-FRR discrepancy greater than 1\%. \end{remark} \begin{figure}[t] \centering \subfloat[Gait\label{fig:gait_ind}]{% \includegraphics[width=0.46\linewidth]{images/gait_proba_ind-crop.pdf}} \hfill \subfloat[Touch\label{fig:touch_ind}]{% \includegraphics[width=0.46\linewidth]{images/touch_proba_ind-crop.pdf}} \vspace{-0.3cm} \\ \subfloat[Face\label{fig:face_ind}]{% \includegraphics[width=0.46\linewidth]{images/face_proba_ind-crop.pdf}} \hfill \subfloat[Voice\label{fig:voice_ind}]{% \includegraphics[width=0.46\linewidth]{images/voice_proba_ind-crop.pdf}} \vspace{-0.2cm} \\ \caption{Individual user scatter of AR and FPR. In a majority of configurations, there is no clear relationship between AR and FPR, with the exception of the RBFSVM and DNN classifiers for face and voice authentication. \vspace{-1mm} } \label{fig:all_ind} \end{figure} \begin{figure*} \centering \subfloat[Gait Average ROC\label{fig:gait_roc}]{% \includegraphics[width=1.0\linewidth]{images/gait_proba_roc-crop.pdf}}\\ \subfloat[Touch Average ROC\label{fig:touch_roc}]{% \includegraphics[width=1.0\linewidth]{images/touch_proba_rand_roc-crop.pdf}}\\ \subfloat[Face Average ROC\label{fig:face_roc}]{% \includegraphics[width=1.0\linewidth]{images/face_proba_rand_roc-crop.pdf}}\\ \subfloat[Voice Average ROC\label{fig:voice_roc}]{% \includegraphics[width=1.0\linewidth]{images/voice_proba_roc-crop.pdf}} \caption{ROC curve versus the AR and RAR curves for all configurations. The EER is shown as a dotted vertical blue line. The FRR, FPR, AR and RAR values shown in the legend are evaluated at EER (FPR = FRR). The RAR is only evaluated on the Touch and Face datasets.} \label{fig:all_roc} \end{figure*} \subsubsection{Gait Authentication} \label{sec:classify_gait} Figure~\ref{fig:gait_ind} shows AR against FPR of every user in the activity type (gait) dataset. Recall that in this figure FPR is evaluated at EER. The dotted straight line is the line where AR equals FPR (or ERR). We note that there is a significant proportion of users for which AR is greater than FPR, even when the latter is reasonably low. For instance, in some cases AR is close to 1.0 when the FPR is around 0.2. Thus, a random input attack on systems trained for these target users will be successful at a rate significantly higher than what is suggested by FPR. We also note that the two SVM classifiers have higher instances of users for whom AR surpasses FPR. Figure~\ref{fig:gait_roc} shows the AR curve averaged across all users against the FPR and FRR curves for all four classifiers. We can see that AR is higher than the ERR (represented by the dotted vertical line) for the two SVM classifiers. For the remaining two classifiers, AR is lower than EER. However, by looking at the AR curve for RNDF, we see that the AR curve is well above the FPR curve when $\text{FRR} \le 0.3$. This can be specially problematic if the threshold is set so as to minimize false rejection at the expense of false positives. We also note that the AR curve for DNN closely follows the FPR curve, which may suggest that the AR is not as problematic for this classifier. However, by looking at Figure~\ref{fig:gait_ind}, we see that this is misleading since for some users the AR is significantly higher than FPR, making them vulnerable to random input attacks. Also, note that the AR generally decreases as the threshold is changed at the expense of FRR. However, except for RNDF, the AR for the other three classifiers is significantly higher than zero even for FRR values close to 1. \subsubsection{Touch (Swipe) Authentication} \label{sec:classify_touch} The touch authenticator has the highest EER of all four biometric modalities. Very few users attained an EER lower than 0.2 as seen in Figure~\ref{fig:touch_ind}. This is mainly because we consider the setting where the classification decision is being made after each input sample. Previous work has shown EER to improve if the decision is made on an average vector of a few samples some work~\cite{unobservable, touchalytics, chauhan2017behaviocog}. Nevertheless, since our focus is on AR, we stick to the per-sample decision setting. Figure~\ref{fig:touch_ind} shows that more than half of the users have ARs larger than FPR, and in some cases where the FPR is fairly low (say 0.2), the AR is higher than 0.5. Unlike gait authentication where RNDF classifier had ARs less than FPR for the majority of the users, all four algorithms for touch authentication display high vulnerability to the AR based random input attack. When viewing average results in Figure~\ref{fig:touch_roc}, we observe the average AR curve to be very `flat' for both SVM classifiers and DNN. This indicates that AR for these classifier remains mostly unchanged even if the threshold is moved closer to the extremes. RNDF once again is the exception, with the AR curve approaching 0 as the threshold is increased. \subsubsection{Face Authentication} \label{sec:classify_face} Figure~\ref{fig:face_ind} shows that AR is either lower or comparable to FPR for RBFSVM and DNN. Thus, the FPR serves as a good measure of AR in these systems. However, AR for most users is significantly higher than FPR for LinSVM and RNDF. This is true even though the EER of these systems is comparable to the other two as seen in Figure~\ref{fig:face_roc}. For LINSVM, we have an average AR of 0.15 compared to an EER of 0.05. For RNDF, the situation is worse with the AR reaching 0.78 against an EER of 0.03. We also note that while the AR is equal to FPR for DNN, its value of 0.10 is still worrisome to be resistant to random input attack. The relatively high FPR for DNN as compared to RBFSVM is likely due to a limited set of training data available in training the neural network. \subsubsection{Voice Authentication} \label{sec:classify_speech} Figure~\ref{fig:voice_ind} shows that once again LinSVM and RNDF have a significant proportion of users with AR higher than FPR, whereas for both RBFSVM and DNN the AR of users is comparable to FPR. Looking at the average ARs in Figure~\ref{fig:voice_roc}, we see that interestingly RNDF exhibits an average AR of 0.01 well below the ERR of 0.04. The average suppresses the fact that there is one user in the system with an AR close to 1.0 even with an EER of approximately 0.1, and two other users with an AR of 0.5 and 0.3 for which the EER is significantly below 0.1. Thus these specific users are more susceptible to the random input attack. Only LinSVM has an average AR (0.08) higher than EER (0.03). The average AR of DNN is lower than EER (0.11), but it is still significantly high (0.08). For RBFSVM we have an average AR close to 0. \subsection*{Observations} In almost every configuration, we can observe that the average AR is either higher than the FPR or at best comparable to it. Furthermore, for some users the AR is higher than FPR even though the average over all users may not reflect this trend. This demonstrates that an attacker with no prior knowledge of the system can launch an attack against it via the feature vector API. Moreover, for both the linear and radial SVM kernels, and some instances of the DNN classifier, we observe a relatively flat AR curve as the threshold is varied, unlike the gradual convergence to 1 experienced by the FPR and FRR curves. These classifiers thus have a substantial acceptance region that accept samples as positives irrespective of the threshold. Random Forests is the only classifier where the AR curve shows significant drop as the threshold is varied. Random forests sub-divide the training dataset in a process called bagging, where each sub-division is used to train one tree within the forest. With different subsets of data, different training data points will be closer to different empty regions in feature space, thus producing varied predictions. Because the prediction confidence of RNDF is computed from the proportion of trees agreeing with a prediction, the lack of consensus within the ensemble of trees for the empty space may be the reason for the non-flat AR curve. \subsection{Acceptance Rate: Raw Input API} \label{sub:rar-results} The results from the feature vector API are not necessarily reflective of the success rate of a random input attack via the raw input API. One reason for this is that the feature vectors extracted from raw inputs may or may not span the entire feature space, and as a consequence the entire acceptance region. For this reason, we use the term \emph{raw acceptance rate} (RAR) to evaluate the probability of successfully finding an accepting sample via raw random inputs. To evaluate RAR, we select the touch and face biometric datasets. The raw input of the touch authenticator is a time-series, whereas for the face authentication system it is an image. \subsubsection{Raw Touch Inputs} We used a continuous auto-regressive process (CAR)~\cite{timesynth-source} to generate random timeseries. We opted for CAR due to the extremely high likelihood of time-series values having a dependence on previous values. This time-series was then min-max scaled to approximate sensor bounds. For example the \texttt{x}-position has a maximum and minimum value of 1980 and 0 respectively, as dictated by the number of pixels on a smartphone screen. Both the duration and length of the time-series were randomly sampled from reasonable bounds: 0.5 to 2.0 seconds and 30 to 200 data-points, respectively. The time-series was subsequently parsed by the same feature extraction process as a legitimate time-series, and the outputs scaled on a feature min-max scale previously fit on real user data. In total we generate 100,000 time-series\blue{, which are used to measure RAR over 50 repetitions of the experiment.} The results of our experiments are shown in Figure~\ref{fig:touch_roc}, with the curve labeled RAR showing the raw acceptance rate as the threshold of each of the classifiers is changed. As we can see, the RAR is large and comparable to AR. This seems to indicate that the region spanned by random inputs covers the acceptance region. However, on closer examination, this happens to be false. The average volume covered by the true positive region for the touch dataset (cf. Section~\ref{sec:attack_def}) is less than $1.289 \times 10^{-4} \pm 5.462 \times 10^{-4}$, yet the volume occupied by the feature vectors extracted from raw inputs is less than $2.609 \times 10^{-6}$. This is significantly smaller than the AR for all four classifiers. We will return to this observation shortly. \subsubsection{Raw Face Inputs} We generated 100,000 images of size 160x160 pixels, with uniformly sampled RGB values. Feature embeddings were then extracted from the generated images with the pre-trained Facenet model (cf. Section~\ref{subsub:face-dataset}). This set of 100,000 raw input vectors, was parsed by a min-max scaler fitted to real user data. We did not align the noisy images, as there is no facial information within the image to align. Note that alignment is normally used in face authentication to detect facial boundaries within an image. \blue{Again, we aggregate results over 50 repetitions to remove any potential biases.} The results from these raw inputs are shown in Figure~\ref{fig:face_roc}. We note that the RAR curve behaves much more similarly to the FPR curve, than what was previously observed for raw touch inputs. Also, in the particular example of RBFSVM, we obtain an RAR of 0.09 which is significantly higher than the AR (0.01) at the equal error rate. We again computed the true positive region and found that the average is $6.562 \times 10^{-94} \pm 6.521 \times 10^{-93}$. However, the volume covered by the raw inputs (after feature extraction) is only $4.670 \times 10^{-390}$, which is negligible compared to the ARs (0.15, 0.01, 0.78 and 0.10 for all four classifiers). Additional analysis shows that only one other user's feature space overlapped with the space of raw inputs, with an overlapped area of $8.317 \times 10^{-407}$, many orders of magnitude smaller than both the positive users and the raw feature space itself. \ \subsection*{Observations} The threat of a random input attack via raw random inputs is also high, and in some cases greater than the FPR. However, the region spanned by the feature vectors from these raw inputs is exponentially small and hence does not span the acceptance region. Furthermore, the region also does not coincide with any true positive region. This implies that raw inputs may result in high raw acceptance rate due to the fact that the training data does not have representative vectors in the region spanned by raw inputs. We shall return to this observation when we discuss mitigation strategies in Section~\ref{sec:mitigation}. \subsection*{Abstract} \IEEEoverridecommandlockouts \makeatletter\def\@IEEEpubidpullup{6.5\baselineskip}\makeatother \IEEEpubid{\parbox{\columnwidth}{ Network and Distributed Systems Security (NDSS) Symposium 2020\\ 23-26 February 2020, San Diego, CA, USA\\ ISBN 1-891562-61-4\\ https://dx.doi.org/10.14722/ndss.2020.24210\\ www.ndss-symposium.org } \hspace{\columnsep}\makebox[\columnwidth]{}} \maketitle \begin{abstract} We assess the security of machine learning based biometric authentication systems against an attacker who submits uniform random inputs, either as feature vectors or raw inputs, in order to find an \emph{accepting sample} of a target user. The average false positive rate (FPR) of the system, i.e., the rate at which an impostor is incorrectly accepted as the legitimate user, may be interpreted as a measure of the success probability of such an attack. However, we show that the success rate is often higher than the FPR. In particular, for one reconstructed biometric system with an average FPR of 0.03, the success rate was as high as 0.78. This has implications for the security of the system, as an attacker with only the knowledge of the length of the feature space can impersonate the user with less than 2 attempts on average. We provide detailed analysis of why the attack is successful, and validate our results using four different biometric modalities and four different machine learning classifiers. Finally, we propose mitigation techniques that render such attacks ineffective, with little to no effect on the accuracy of the system. \end{abstract} \section{Introduction} Consider a machine learning model trained on some user's data accessible as a black-box API for biometric authentication. Given an input (a biometric sample), the model outputs a binary decision, i.e., accept or reject, as its prediction for whether the input belongs to the target user or not. Now imagine an attacker with access to the same API who has never observed the target user's inputs. The goal of the attacker is to impersonate the user by finding an \emph{accepting sample} (input). What is the success probability of such an attacker? Biometric authentication systems are generally based on either physiological biometrics such as fingerprints~\cite{maltoni2009handbook}, face~\cite{yi2014learning, schroff2015facenet}, and voice~\cite{nagrani2017voxceleb, chung2018voxceleb2}), or behavioral biometrics such as touch~\cite{mahbub2016active} and gait~\cite{xu2017keh}, the latter category generally used for continuous and implicit authentication of users. These systems are mostly based on machine learning: a binary classifier is trained on the target user's data (positive class) and a subset of data from other users (negative class). This process is used to validate the performance of the machine learning classifier and hence the biometric system~\cite{chauhan2017behaviocog, xu2017keh, curran2017one, huang2018breathlive, liu2018vocal, chen2017your, song2016eyeveri, chauhan2017breathprint, ho2017mini, crawford2017authentication}. The resulting proportion of negative samples (other users' data) successfully gaining access (when they should have been rejected) produces the false positive rate (FPR, also referred as False Acceptance Rate). The target user's model is also verified for their own samples, establishing the false reject rate (FRR). The parameters of the model can be adjusted to obtain the equal error rate (EER) at which point the FPR equals FRR. Returning to our question, the FPR seems to be a good indicator of the success probability of finding an accepting sample. However, this implicitly assumes that the adversary is a human who submits samples using the same human computer interface as other users, e.g., a smartphone camera in case of face recognition. When the model is accessible via an API the adversary has more freedom in choosing its probing samples. This may happen when the biometric service is hosted on the cloud (online setting) or within a secure enclave on the user's device (local setting). In particular, the attacker is free to sample uniform random inputs. It has previously been stated that the success probability of such an attack is exponentially small~\cite{pagnin2014leakage} or it can be derived from the FPR of the system~\cite{martinez-hill, vulnerable-face}.\footnote{We note that these observations are made for \emph{distance-based} authentication algorithms and not machine-learning model based algorithms. See Sections \ref{sec:distance_classifier} and \ref{sec:related} for more details.} In this paper, we show that uniform random inputs are accepted by biometric systems with a probability that is often higher and independent of the FPR. Moreover, this applies to the setting where the API to the biometric system can be queried using feature vectors after processing raw input as well as at the raw input level. A simple toy example with a single feature can illustrate the reason for the efficacy of the attack. Suppose the feature is normalized within the interval $[0, 1]$. All of target user's samples (the positive class) lie in the interval $[0, 0.5)$ and the other users' samples (the negative class) lie in the interval $(0.5, 1]$. A ``classifier'' decides the decision boundary of $0.5$, resulting in identically zero FRR and FPR. However, a random sample has a 50\% chance of being accepted by the biometric system.\footnote{This example is an oversimplification. In practice the training data is almost never nicely separated between the two classes. Also, in higher dimensions one expects exponentially small volume covered by samples from the positive and negative classes as is explained in Section~\ref{sec:attack_def}.} The success of the attack shows that the FPR and FRR, metrics used for reporting the accuracy of the classifier, cannot alone be used as proxies for assessing the security of the biometric authentication system. \noindent Our main contributions are as follows: \begin{itemize}[leftmargin=5mm] \item We theoretically and experimentally show that in machine learning-based biometric authentication systems, the \emph{acceptance region}, defined as the region in feature space where the feature vectors are accepted by the classifier, is significantly larger than the true positive region, i.e., the region where the target users samples lie. Moreover, this is true even in higher dimensions, where the true positive region tends to be exponentially small~\cite{data-science}. \item As a consequence of the above, we show that an attacker who has access to a biometric system via a black-box feature vector API, can find an accepting sample by simply generating random inputs, at a rate which in many cases is higher than implicated by the FPR. For instance, the success probability of the attack is as high as 0.78 for one of the systems whose EER is only 0.03. The attack requires minimum knowledge of the system: the attacker only needs to know the length of the input feature vector, and permissible range of each feature value (if not normalized). \item We show that the success rate of a random input attack can also be higher than FPR if the attacker can only access the API at the raw input level (before feature extraction). For instance, on one system with an EER of 0.05, the success rate was 0.12. We show that the exponentially small region spanned by these raw random inputs rarely overlaps with the true positive region of any user in the system, owing to the success probability of the attack. Once again the attack only requires minimum knowledge of the system, i.e., the range of values taken by each raw input. \item To analyze real-world applicability of the attack, we reconstruct four biometric authentication schemes. Two of them are physiological, i.e., face recognition~\cite{schroff2015facenet} and voice authentication~\cite{nagrani2017voxceleb}. The other two use behavioral traits, i.e., gait authentication~\cite{gafurov2006biometric}, and touch (swipes) authentication~\cite{mahbub2016active, touchalytics}. For each of these modalities, we use four different classifiers to construct the corresponding biometric system. The classifiers are linear support vector machines (SVM), radial SVM, random forests, and deep neural networks. For each of these systems, we ensure that our implementation has comparable performance to the reference. \item Our experimental evaluations show that the average acceptance region is higher than the EER in 9 out of 16 authentication configurations (classifier-modality pairs), and only one in the remaining 7 has the (measured) average acceptance region of zero. Moreover, for some users this discrepancy is even higher. For example, in one user model (voice authentication using random forests) the success rate of the random (feature) input is 0.55, when the model's EER is only 0.03, consistent with the system average EER of 0.03. \item We propose mitigation techniques for both the random feature vector and raw input attacks. For the former, we propose the inclusion of beta-distributed noise in the training data, which ``tightens'' the acceptance region around the true positive region. For the latter, we add feature vectors extracted from a sample of raw inputs in the training data. Both strategies have minimal impact on the FPR and TPR of the system. The mitigation strategy renders the acceptance region to virtually 0 for 6 of the 16 authentication configurations, and for 15 out of 16, makes it lower than FPR. \blue{For reproducibility, we have made our codebase public.\footnote{\blue{Our code is available at: \url{https://imathatguy.github.io/Acceptance-Region}}}} \end{itemize} We note that a key difference in the use of machine learning in biometric authentication as compared to its use in other areas (e.g., predicting likelihood of diseases through a healthcare dataset) is that the system should only output its decision: accept or reject~\cite{garcia2018explainable}, and not the detailed confidence values, i.e., confidence of the accept or reject decision. This makes our setting different from \emph{membership inference} attacks where it is assumed that the model returns a prediction vector, where each element is the confidence (probability) that the associated class is the likely label of the input sample~\cite{shokri2017membership, salem2018ml}. In other words, less information is leaked in biometric authentication. Confidence vectors can potentially allow an adversary to find an \emph{accepting sample} by using a hill climbing approach~\cite{martinez-hill}, for instance. \section{Background and Threat Model} \label{sec:background} \subsection{Biometric Authentication Systems} The use of machine learning for authentication is a binary classification problem.\footnote{We note that sometimes a \emph{discrimination model}~\cite{xu-soups} may also be considered where the goal is to identify the test sample as belonging to one of $n$ users registered in the system. Our focus is on the authentication model. \blue{Also, see Section~\ref{sec:discussion}.}} The positive class is the target user class, and the negative class is the class of one or more other users. The target user's data for training is obtained during the registration or enrollment phase. For the negative class, the usual process is to use the data of a subset of other users enrolled in the system \cite{han2003personal, chauhan2017behaviocog, xu2017keh, curran2017one, huang2018breathlive, liu2018vocal, chen2017your, song2016eyeveri, chauhan2017breathprint, ho2017mini, crawford2017authentication}. Following best machine learning practice, the data (from both classes) is split into a training and test set. The model is learned over the training set, and the performance of the classifier, its misclassification rate, is evaluated on the test set. A raw biometric sample is usually processed to extract relevant features such as fingerprint minutiae or frequency energy components of speech. This defines the feature space for classification. As noted earlier, the security of the biometric system is evaluated via the misclassification rates of the underlying classifier. Two types of error can arise. A type 1 error is when a positive sample (target user sample) has been erroneously classified as negative, which forms the false reject rate (FRR). Type 2 error occurs when a negative sample (from other users) has been misclassified as a positive sample, resulting in the false positive rate (FPR). By tuning the parameters of the classifier, an equal error rate (EER) can be determined which is the rate at which FRR equals FPR. One can also evaluate the performance of the classifier through the receiver operator characteristic (ROC) curve, which shows the full relationship between FRR and FPR as the classifier parameters are varied. Once a biometric system is set up, i.e., classifier trained, the system takes as input a biometric sample and outputs accept or reject. In a continuous authentication setting, where the user is continually being authenticated in the background, the biometric system requires a continuous stream of user raw inputs. It has been shown that in continuous authentication systems the performance improves if the decisions is made on the \emph{average} feature vector from a set of feature vectors~\cite{unobservable, touchalytics, chauhan2016gesture}. \subsection{Biometric API: The Setting} We consider the setting where the biometric system can be accessed via an API. More specifically, the API can be queried by submitting a biometric sample. The response is a binary accept/reject decision.\footnote{For continuous authentication systems, we assume that the decision is returned after a fixed number of one or more biometric samples.} The biometric system could be \emph{local}, in which case the system is implemented in a secure enclave (a trusted computing module), or \emph{cloud-based} (online), in which the decision part of the system resides in a remote server. We consider two types of APIs. The first type requires raw biometric samples, e.g., the input image in case of face recognition. The second type accepts a feature vector, implying that the feature extraction phase is carried out before the API query. This might be desirable for the following reasons. \begin{itemize}[leftmargin=5mm] \item Often the raw input is rather large. For instance, in case of face recognition, without compression, an image will need every pixel's RGB information to be sent to the server for feature extraction and authentication. In the case of an image of pixel size $60 \times 60$, this would require approximately 10.8 KB of data. If the feature extraction was offloaded to the user device, it would produce a 512 length feature embedding, which can take as little as 512 bytes. This also applies to continuous authentication which inherently requires a continual stream of user raw inputs. But often decisions are only made on an \emph{average} of a set of feature vectors~\cite{unobservable, touchalytics, chauhan2016gesture}. In such systems, only sending the resultant extracted average feature vector to the cloud also reduces communication cost. \item Recent studies have shown that raw sensory inputs can often be used to track users~\cite{das2016tracking}. Thus, they convey more information than what is simply required for authentication. In this sense, extracting features at the client side serves as an \emph{information minimization} mechanism, only sending the relevant information (extracted feature vectors) to the server to minimize privacy loss. \item Since the machine learning algorithm only compares samples in the feature space, only the feature representation of the template is stored in the system. In this case, it makes sense to do feature extraction prior to querying the system. \end{itemize} From now onwards, when referring to a biometric API we shall assume the \emph{feature vector} based API as the default. We shall explicitly state when the discourse changes to raw inputs. Figure~\ref{fig:ar-diagram} illustrates the two APIs. \subsection{Threat Model and Assumptions} We consider an adversary who has access to the API to a biometric system trained with the data of a target user whom the adversary wishes to impersonate. More specifically, the adversary wishes to find an \emph{accepting sample}, i.e., a feature vector for which the system returns ``accept.'' In the case of the raw input API, the adversary is assumed to be in search for a raw input that results in an accepting sample after feature extraction. We assume that the adversary has the means to bypass the end user interface, e.g., touchscreen or phone camera, and can thus \emph{programmatically} submit input samples. There are a number of ways in which this is possible. In the online setting, a mis-configured API may provide the adversary access to the authentication pipeline. In the local setting, if the feature extractor is contained within a secure environment, raw sensory information must be passed to this protected feature extraction process. To achieve this an attacker may construct their own samples through OS utilities. An example is the Monkey Runner~\cite{monkeyrunner} on Android, a tool allowing developers to run a sequence of predefined inputs for product development and testing. Additionally, prior work~\cite{shwartz2017shattered} has shown the possibility of compromising the hardware contained within a mobile device, e.g., a compromised digitizer can inject additional touch events. Outside of literature, it is difficult to know the exact implementation of real-world systems. However, taking face recognition as an example, we believe our system architecture is similar to real world facial authentication schemes, drawing parallels to pending patent US15/864,232 \cite{son2018face}. Additionally there are API services dedicated to hosting different components of the facial recognition pipeline. Clarifai, for example, hosts machine learning models dedicated to the extraction of {face embeddings} within an uploaded image~\cite{clarifai-face}. A developer could then use any number of Machine Learning as a Service (MLaaS) providers to perform the final authentication step, without needing to pay premiums associated with an end-to-end facial recognition product. \noindent We make the following assumptions about the biometric API. \begin{itemize}[leftmargin=5mm] \item The input feature length, i.e., the number of features used by the model, is public knowledge. \item Each feature in the feature space is min-max normalized. Thus, each feature takes value in the real interval $[0, 1]$. This is merely for convenience of analysis. Absent this, the attacker can still assume plausible universal bounds for all features in the feature space. \item The attacker knows the identifier related to the user, e.g., the username, he/she wishes to impersonate. \end{itemize} Beyond this we do not assume the attacker to have any knowledge of the underlying biometric system including the biometric modality, the classifier being used, the target user's past samples, or any other dataset which would allow the attacker to infer population distribution of the feature space of the given modality. \begin{figure}[th!] \centering \includegraphics[width=0.80\columnwidth]{ar-diagram.pdf} \vspace{-4mm} \caption{The threat model and the two types of biometric API.} \label{fig:ar-diagram} \end{figure} \section{Acceptance Region and Proposed Attack} \label{sec:attack_def} \subsection{Motivation and Attack Overview} Given a feature space, machine learning classifiers learn the region where feature vectors are classified as positive features and the region where vectors are classified as negative features. We call the former, the acceptance region and the latter the rejection region. Even though the acceptance region is learnt through the data from the target user, it does not necessarily tightly surround the region covered by the target user's samples. Leaving aside the fact that this is desirable so as to not make the model ``overfitted'' to the training data, this implies that even vectors that do not follow the distribution of the target user's samples, may be accepted. In fact these vectors may bare no resemblance to any positive or negative samples from the dataset. Consider a toy example, where the feature space consists of only two vectors. The two-dimensional plane in Figure~\ref{fig:toy_example} shows the distribution of the positive and negative samples in the training and testing datasets. A linear classifier may learn the acceptance and rejection regions split via the decision boundary shown in the figure. This decision boundary divides the two dimensional feature space in half. Even though there is a small overlap between the positive and negative classes, when evaluated against the negative and positive samples from the dataset there would be an acceptably low false positive rate. However if we construct a vector by uniformly sampling the two features from the interval $[0, 1]$, with probability $1/2$ it will be an accepting sample. If this model could be queried through an API, an attacker is expected to find an accepting sample in two attempts. Arguably, such a system is insecure. \begin{figure}[th!] \centering \includegraphics[width=0.70\columnwidth]{half_example_new-crop.pdf} \vspace{-0.3cm} \caption{Example feature space separation by a linear boundary between two classes. This demonstrates low FPR and FRR of test sample classification, yet allows approximately 50\% of the feature space to be accepted as positive. } \label{fig:toy_example} \end{figure} Figure~\ref{fig:toy_example} illustrates that the acceptance region can be larger than the region covered by the target user's samples. However, in the same example, the area covered by the target user's samples is also quite high, e.g., the convex hull of the samples. As we discuss next, in higher dimensions, the area covered by the positive and negative examples is expected to be concentrated in an exponentially small region~\cite{data-science}. However, the acceptance region does not necessarily follow the same trend. \subsection{Acceptance Region} \label{sec:attack_area} \descr{Notations.} Let $\mathbb{I} \coloneqq [0, 1]$ denote the unit interval $[0, 1]$, and let $\mathbb{I}^n \coloneqq [0, 1]^n$ denote the $n$-dimensional unit cube with one vertex at the origin. The unit cube represents the feature space with each (min-max normalized) feature taking values in $\mathbb{I}$. Let $f$ denote a model, i.e., an output of a machine learning algorithm (classifier) trained on a dataset $D = \{ (\mathbf{x}_i, y_i) \}_{i \in [m]}$, where each $\mathbf{x}_i$ is a feature vector and $y_i \in \{+1, -1\}$ its label. The label $+1$ indicates the positive class (target user) and $-1$ the negative class (one or more other users of the authentication system). We may denote a positive example in $\mathbf{x} \in D$ by $\mathbf{x}^+$, and any negative example by $\mathbf{x}^-$. The model $f$ takes feature vectors $\mathbf{x} \in \mathbb{I}^n$ as input and outputs a \emph{predicted} label $\hat{y} \in \{+1, -1\}$. \descr{Definitions.} \emph{Acceptance region} of a model $f$ is defined as \begin{equation} A_f \coloneqq \{ \mathbf{x} \in \mathbb{I}^n : f(\mathbf{x}) = +1 \}, \end{equation} The $n$-dimensional volume of $A_f$ is denoted $\text{Vol}_n(A_f)$. The definition of acceptance region is analogous to the notion of decision regions in decision theory~\cite[\S 1.5]{bishop-pattern}. We will often misuse the word acceptance region to mean both the region or the volume covered by the region where there is no fear of ambiguity. Let FRR and FPR be evaluated on the training dataset $D$.\footnote{In practice, the FRR and FPR are evaluated against a subset of $D$ called a holdout or testing dataset.} Let $\mathbf{x} \sample{\$} \mathbb{I}^n$ denote sampling a feature vector $\mathbf{x}$ uniformly at random from $\mathbb{I}^n$. In a \emph{random input attack}, the adversary samples $\mathbf{x} \sample{\$} \mathbb{I}^n$ and gives it as input to $f$. The attack is successful if $f(\mathbf{x}) = + 1$. The success probability of a random guess is defined as \begin{equation} \label{eq:ar} \Pr [ f(\mathbf{x}) = + 1 : \mathbf{x} \sample{\$} \mathbb{I}^n ]. \end{equation} Since the $n$-volume of the unit cube is 1, we immediately see that the above probability is exactly $\text{Vol}_n(A_f)$. Thus, we shall use the volume of the acceptance region as a direct measure of the success probability of random guess. Finally, we define the \emph{rejection region} as $\mathbb{I}^n - A_f$. It follows that the volume of the rejection region is $1 - \text{Vol}_n(A_f)$. \descr{Existence Results.} Our first observation is that even if the FPR of a model is zero, its acceptance region can still be non-zero. Note that this is not evident from the fact that there are positive examples in the training dataset $D$: the dataset is finite and there are infinite number of vectors in $\mathbb{I}^n$, and hence the probability of picking these finite positive examples is zero. \begin{proposition} There exists a dataset $D$ and a classifier with output $f$ such that $\text{FRR} = \text{FPR} = 0$, and $\text{Vol}_n(A_f) > 0$. \end{proposition} \begin{proof} Assume a dataset $D$ that is linearly separable. This means that there exists a hyperplane denoted $H(\mathbf{x})$ such that for any positive example $\mathbf{x}^+ \in D$, we have $H(\mathbf{x}^+) > 0$ and for any negative example in $D$ we have $H(\mathbf{x}^-) < 0$. Consider the perceptron as an example of a classifier which constructs a linear model: $f_{\mathbf{w}, b} (\mathbf{x}) = + 1$ if $\langle \mathbf{w}, \mathbf{x} \rangle + b > 0$, and $-1$ otherwise. Since the data is linearly separable, the perceptron convergence theorem states that the perceptron learning algorithm will find a solution, i.e., a separating hyperplane~\cite{rosenblatt}. Intersecting this hyperplane $\langle \mathbf{w}, \mathbf{x} \rangle + b = 0$ with the unit cube creates two sectors. The sector where $f_{\mathbf{w}, b} (\mathbf{x}) = + 1$ is exactly the acceptance region $A_{f_{\mathbf{w}, b}}$. The $n$-volume of $A_{f_{\mathbf{w}, b}}$ cannot be zero, since otherwise it is one of the sides of the unit cube with dimension less than $n$, implying that all points $\langle \mathbf{w}, \mathbf{x} \rangle + b > 0$ lie outside the unit cube. A contradiction, since $\text{FRR} = 0$ (there is at least one positive example). \end{proof} A non-zero acceptance region is not necessarily a threat. Of practical concern is a \emph{non-negligible} volume. Indeed, the volume may be negligible requiring a large number of queries to $f$ before an \emph{accepting sample} is produced. The following result shows that there are cases in which the acceptance region can be non-negligible. \begin{proposition} \label{prop:ar-half} There exists a dataset $D$ and a classifier with output $f$ such that $\text{FRR} = \text{FPR} = 0$, and $\text{Vol}_n(A_f) \ge 1/2$. \end{proposition} \begin{proof} Consider again the perceptron as an example of a classifier. Let $D$ be a dataset such that for all positive examples $\mathbf{x}^+$, we have $x^+_1 > 0.5$, and for all negative examples $x^-_1 < 0.5$. The rest of the features may take any value in $\mathbb{I}$. The resulting data is linearly separable by the ($n-1$ dimensional) hyperplane $x_1 - 0.5 = 0$. Initialize the perceptron learning algorithm with $w_1 = 1$, $w_i = 0$ for all $2 \le i \le n$, and $b = -0.5$. The algorithm then trivially stops with this hyperplane. Clearly, with this hyperplane, we have $\text{FRR} = 0$, $\text{FPR} = 0$, and the acceptance region is 1/2. \end{proof} The above examples illustrate the high probability of success of the random input attack due to non-negligible acceptance region. However, the example used is contrived. In practice, datasets with a ``nice'' distribution as above are seldom encountered, and the model is more likely to exhibit non-zero generalization error (a tradeoff between FRR and FPR). Also, in practice, more sophisticated classifiers such as the support vector machine or deep neural networks are used instead of the perceptron. However, we shall demonstrate that the issue persists in real datasets and classifiers used in practice. We remark that we are interested in the case when $\text{Vol}_n(A_f) > \text{FPR}$, since arguably it is misleading to use the FPR as a measure of security of such an authentication system. This could happen even when the FPR is non-zero. When and why would this case occur? We explain this in the following. \descr{Real Data and High Dimensions.} We first discretize the feature space. For a given positive integer $B$, let $\mathbb{I}_B$ denote the binned (or discrete) version of the interval $\mathbb{I}$ partitioned into $B$ equally sized bins. Clearly, each bin is of width $1/B$. Let $\mathbb{I}_B^n$ denote the discretized feature space. Given a set of feature values from $\mathbb{I}$, we say that a bin in $\mathbb{I}_B$ is \emph{filled} if there are $> \epsilon_n$ feature values falling in that bin, where $\epsilon_n$ is a cutoff to filter outliers. The number of filled bins is denoted by $\alpha$. Clearly $\alpha \le B$. See Figure~\ref{fig:bins}. \begin{figure}[th!] \centering \vspace{-1mm} \resizebox{0.55\columnwidth}{!}{% \begingroup% \makeatletter% \providecommand\rotatebox[2]{#2}% \ifx\svgwidth\undefined% \setlength{\unitlength}{203.66368408bp}% \ifx\svgscale\undefined% \relax% \else% \setlength{\unitlength}{\unitlength * \real{\svgscale}}% \fi% \else% \setlength{\unitlength}{\svgwidth}% \fi% \global\let\svgwidth\undefined% \global\let\svgscale\undefined% \makeatother% \begin{picture}(1,0.34838103)% \put(0,0){\includegraphics[width=\unitlength,page=1]{images/bins.pdf}}% \put(0.04596194,0.01451667){\color[rgb]{0,0,0}\makebox(0,0)[lb]{\smash{\textbf{0}}}}% \put(0.78498776,0.01154079){\color[rgb]{0,0,0}\makebox(0,0)[lb]{\smash{\textbf{1}}}}% \put(0.88676664,0.09652185){\color[rgb]{0,0,0}\makebox(0,0)[lb]{\smash{\textbf{$\epsilon_n = 2$}}}}% \put(0.03075977,0.07302251){\color[rgb]{0,0,0}\rotatebox{90}{\makebox(0,0)[lb]{\smash{\textbf{Frequency}}}}}% \put(0.38841542,0.00059937){\color[rgb]{0,0,0}\makebox(0,0)[lb]{\smash{\textbf{Bins}}}}% \end{picture}% \endgroup% } \vspace{-3.5mm} \caption{The binned version $\mathbb{I}_B$ of the unit interval $\mathbb{I}$. Each bin is of width $1/B$ ($B$ not specified). The number of filled bins is $\alpha = 3$, with a cut-off of $\epsilon_n = 2$.} \label{fig:bins} \end{figure} For the $i$th feature, let $\alpha_i^{+}$ denote the number of bins filled by all positive examples in $D$. We define: \[ R^+ \coloneqq \frac{1}{B^n}\prod_{i = 1}^n \alpha^+_i \] as the \emph{volume of the true positive region}. We define $\alpha_i^{-}$ and $R^-$ analogously as the volume of the true negative region. Let $c \in [0, 1]$ be a constant. If each of the $\alpha_i^{+}$'s is at most $cB$, then we see that $R^+ = c^{-n}$. For instance, if $c \le 1/2$, then $R^+ \le 2^{-n}$. In other words, the volume of the region spanned by the user's own samples is exponentially small as compared to the volume of the unit cube. In practice, the user's data is expected to be normally distributed across each feature, implying that the $\alpha_i^{+}$'s are much smaller than $B/2$, which makes the above volume a loose upper bound. The same is true of the $\alpha_i^{-}$'s. Figure~\ref{fig:alpha-hist} shows the filled bins from one of the features in the Face Dataset (see Section~\ref{sub:datasets}). For the same dataset, the average true positive region is $5.781 \times 10^{-98}$ (with a standard deviation of $\pm 2.074 \times 10^{-96}$) and the average true negative region is $1.302 \times 10^{-55}$ (with a standard deviation of $\pm 2.172 \times 10^{-54}$) computed over 10,000 iterations considering a 80\% sample of the target user's data, and a balanced sample of other users.\footnote{We compute the true positive and negative region by only considering the minimum and maximum feature values covered by each user for each feature with binning equal to the floating point precision of the system. Thus, this is a conservative estimate of the true positive region.} We thus expect a random vector from $\mathbb{I}^n$ to be outside the region spanned by the target user with overwhelming probability. Thus, if a classifier defines an acceptance region tightly surrounding the target user's data, the volume of the acceptance region will be negligible, and hence the random input attack will not be a threat. However, as we shall show in the next sections, this is not the case in practice. \descr{Factors Effecting Acceptance Region.} We list a few factors which effect the volume of the acceptance region. \begin{itemize}[leftmargin=5mm] \item One reason for a high acceptance region is that the classifier is not penalized for classifying \emph{empty space} in the feature space as either positive or negative. For instance, consider Figure~\ref{fig:alpha-hist}. There is significant empty space for the feature depicted in the figure: none of the positive or negative samples have the projected feature value in this space. A classifier is generally trained with an objective to minimize the misclassification rate or a loss function (where, for instance, there is an asymmetrical penalty between true positives and false positives)~\cite{bishop-pattern}. These functions take input from the dataset $D$. Thus, empty regions in the feature space which do not have examples in $D$ can be classified as either of the two classes without being penalized during training, resulting in a non-negligible acceptance region. \item The acceptance region is also expected to be big if there is high variance in the feature values taken by the positive examples. In this case, the $\alpha^{+}_i$'s will be much closer to $B$, resulting in a non-negligible volume $R^+$. \item On the other hand, the acceptance region is likely to be small if the variances of the feature values in the negative examples are high. The classifier, in order to minimize the FPR, will then increase the region where samples are rejected, which would in turn make the acceptance region closer in volume to the true positive region. \end{itemize} \begin{figure}[th!] \centering \includegraphics[width=0.75\columnwidth]{alpha-hist2_new-crop.pdf} \vspace{-3mm} \caption{The histogram of feature values of one of the features in the Face Dataset (cf. \S~\ref{sub:datasets}). Here we have $B = 100$. The number of filled bins for the target user is $\alpha_i^+ = 35$ (with 400 samples), and for the negative class (10 users; same number of total samples) it is $\alpha_i^- = 50$. A total of $24$ bins are not filled by any of the two classes, implying that (approximately) $0.24$ of the region for this feature is empty.} \label{fig:alpha-hist} \vspace{-4mm} \end{figure} We empirically verify these observations in Section~\ref{sec:synthetic}. The last observation also hints at a possible method to tighten the acceptance region around the region spanned by the target user: generate random noise around the target user's vectors and treat it as belonging to the negative class. We demonstrate the effectiveness of this method in Section~\ref{sec:mitigation}. Jumping ahead, if the noise is generated from an appropriate distribution, this will have minimal impact on the FRR and FPR of the model. \input{biometric.tex} \input{synthetic.tex} \input{mitigation.tex} \section{Discussion} \label{sec:discussion} \begin{itemize}[leftmargin=5mm] \item Our work proposes an additional criterion to assess the security of biometric systems, namely their resilience to random inputs. The work has implications for biometric template protection~\cite{biometric-template}, where a target template resides on a remote server and the attacker's goal is to steal the template. In such a setting, obtaining an accepting sample may be enough for an attacker, as it serves as an approximation to the biometric template. Our work shows that the attacker might be able to find an approximation to the template via random input attacks if the system AR is not tested. Conversely, once the AR is reduced below FPR (e.g., via adding beta distributed noise), then one can safely use FPR as the baseline probability of success of finding an approximation. \item We have assumed that the input to the classifier, in particular the length of the input is publicly known. In practice, this may not be the case. For instance, in face recognition, a captured image would be of a set size unknown to the attacker. Likewise, the number of features in the (latent) feature space may also be unknown. However, we do not consider this as a serious limitation, as the input length is rarely considered sensitive so as to be kept secret. In any case, the security of the system should not be reliant on keeping this information secret following Kerckhoffs's well known principle. \item We note that there are various detection mechanisms that protect the front-end of biometric systems. For example, spoofing detection \cite{marcel2014handbook} is an active area in detecting speaker style transfer \cite{wang2017tacotron}. Detection of replay attacks is also leveraged to ensure the raw captured biometric is not reused, for example audio recordings \cite{kinnunen2017asvspoof}. There is also liveliness detection, which seeks to determine if the biometric that is presented is characteristic of a real person and not a recreation, e.g., face masks remain relatively static and unmoving compared to a real face \cite{tan2010face}. Our attack surface applies once the front-end has been bypassed. Our mitigation measures can thus be used in conjunction with these detection mechanisms to thwart random input attacks. \blue{Being generic, our mitigation measures also work for systems which do not have defense measures similar to liveness detection.} \item Once an accepting sample via the feature vector API has been found, it may be possible to obtain an input that results in this sample (after feature extraction), as demonstrated by Garcia et al. with the training of an auto-encoder for both feature extraction and the regeneration of the input image~\cite{garcia2018explainable}. \item \blue{In this work, we have focused on authentication as a binary classification problem, largely because of its widespread use in biometric authentication~\cite{chauhan2017behaviocog, curran2017one, huang2018breathlive, liu2018vocal, chen2017your, song2016eyeveri, chauhan2017breathprint, ho2017mini, crawford2017authentication, xu-soups}. However, authentication has also been framed as a one-class classification problem~\cite{one-class-face, xu-soups} or as multi-class classification~\cite{xu-soups}, e.g., in a discrimination model, as noted earlier. In one-class classification, only samples from the target user are used to create the template, and the goal is to detect outliers. If this is achieved in a manner similar to distance-based classifiers, then as we have seen in Section~\ref{sec:distance_classifier}, and as previously indicated in~\cite{pagnin2014leakage}, the AR is expected to be small. In the multi-class setting, each of the $n$ users is treated as a different class. This increase in classes is expected to proportionally lower the AR. However, whether this behavior is observed on real world data requires additional experimentation. We remark that as observed in Section~\ref{sub:eff-var}, AR is highly dependent on the relative variance of the positive user and the negative user features. This may lead to the possibility of larger AR for some of the users, consequently leading to higher risk of attack for these users. We leave thorough investigation of the one-class and multi-class settings as future work.} \end{itemize} \section{Related Work} \label{sec:related} There are several mentions of attacks similar to the random input attack discussed in this paper. Pagnin et al.~\cite{pagnin2014leakage} define a \emph{blind brute-force attack} on biometric systems where the attacker submits random inputs to find an accepting sample. The inputs are $n$-element vectors whose elements are integers in the set $\{0, 1, \ldots, q - 1\}$. The authors conclude that the probability of success of this attack is exponential in $n$, assuming that the authentication is done via a distance function (discarding any vector outside the ball of radius determined by the system threshold). They concluded that blind brute force attack is not effective in recovering an accepting sample. While this may apply to distance-based matching, the same conclusion cannot be made about machine learning based algorithms whose decision functions are more involved. Indeed, we have shown that the acceptance region for machine learning classifiers is not exponentially small. It has also been argued that the success rate of random input attacks can be determined by the false positive rate (FPR), at least in the case of fingerprint and face authentication~\cite{martinez-hill, vulnerable-face}. We have shown that for sophisticated machine learning classifiers this conclusion is not true, and random input attacks in many instances success at a rate higher than FPR. A more involved method is hill-climbing~\cite{soutar-hill, martinez-hill} which seeks an accepting sample via exploiting the confidence scores returned by the matching algorithm. The authentication systems considered in this paper do not return confidence scores. Serwadda and Phoha~\cite{serwadda2013kids} use a robotic finger and population statistics of touch behavior on smartphones to launch a physical attack on touch-based biometric authentication systems. Their attack reduces the accuracy of the system by increasing the EER. In contrast, our work does not assume any knowledge of population biometric statistics, e.g., population distribution of feature space. It is an interesting area of work to investigate whether a robotic finger can be programmed to generate raw inputs used in our attack. Garcia et al.~\cite{garcia2018explainable} use explainable-AI techniques~\cite{explainable-AI} to construct queries (feature vectors) to find an accepting sample in machine learning based biometric authentication systems. On a system with 0 FPR, they show that their attack is successful in breaching the system with up to 93\% success rate. However, their attack is more involved: it requires the construction of a seed dataset containing representative accepting and rejecting samples of a user set chosen by the adversary. This dataset trains a neural network as a substitute to the classifier of the authentication system. The adversary then uses explainable AI techniques to obtain an accepting sample of a target user (not in the seed dataset) in as few queries as possible, by updating the substitute network. The authors also report a random feature vector attack, however, the attack is only successful on one out of 16 victims. The random feature vector is constructed by sampling each feature value via a normal distribution (distribution parameters not stated), unlike the uniform distribution in our case. We also note that they propose including images with randomly perturbed pixels as a counter-measure to defend against the aforementioned random input attack. This is different from our proposed beta-distributed noise mitigation technique, as it is agnostic to the underlying biometric modality. The frog-boiling attack~\cite{chan2011frog, huang2011adversarial} studies the impact of gradual variations in training data samples to manipulate the classifier decision boundary. In this work we do not consider the adversary with access to the training process, nor do we evaluate models with an iterative update process. If this threat model is considered for the problem addressed in this paper, then an adversary may seek to maximize the acceptance region of a model by gradually poisoning the training dataset. As we have demonstrated in Section~\ref{sec:synthetic}, the relative variance between the user's data and population dataset directly impacts AR. Thus the manipulation of a user's training samples to be more varied would be effective in increasing the AR. Likewise, in our mitigation technique, we have shown that beta-distributed noise is effective in the minimization of AR. However an adversary might poison the training data by labeling beta noise as positive samples resulting in a maximization of the acceptance region to near 100\% of the feature space. Our work is different from another line of work that targets machine learning models in general. For instance, the work in~\cite{papernot-practical} shows an \blue{\emph{evasion attack} where the adversary, through only blackbox access to a neural network, forces the classifier to misclassify an input by slightly perturbing the input even though the perturbed sample is perceptually similar to the original sample, e.g., noisy images.} The attack can be applicable to the authentication setting as well. However, it relies on the confidence values (probability vectors) returned by the classifier, which is not the case in authentication. Similarly, the work in~\cite{tramer2016stealing} shows how to steal a machine learning model, i.e., retrieve its undisclosed parameters, which only returns class labels (accept/reject decision in the case of authentication). They describe several techniques including the Lowd and Meek attack~\cite{lowd-meek} to retrieve a model sufficiently similar to the target model. The machine learning models considered in their attack are for applications different from authentication where one expects to find an accepting sample with negligible probability. \blue{There are also proposals to defend against the above mentioned evasion attacks. The goal is to make the classifiers \emph{robust} against adversarial inputs in the sense that classification is constant within a ball of certain radius around each input~\cite{madry2017towards, cohen2019certified}. Madry et al.~\cite{madry2017towards} propose a theoretical framework which formalizes defense against adversarial attacks by including adversarially perturbed samples in the loss function of DNNs. They show that it is possible to train DNNs robust against a wide range of adversarial input attacks. Cao and Gong~\cite{cao2017mitigating} propose another defense where given a test input, random points within a hypercube surrounding the input are sampled, and the majority label returned by the already trained DNN is assigned to the test input. Randomized smoothing~\cite{cohen2019certified} creates a separate classifier from any classifier such that its prediction within a Gaussian noise region (ball) around any input is constant, and consequently less likely to produce an erroneous prediction. We note that in evasion attacks there is a notion of \emph{nearness}, i.e., the adversary is given an input and seeks to add a small amount of noise such that the resultant erroneously labelled input is close to the original input. In contrast, in our case the random input need not be close to the target user's samples or even follow the same distribution. Furthermore, we have shown that even a conservative estimate of the true positive region is negligible in comparison to the entirety of the feature space (Section~\ref{sec:attack_area}). Thus, it is unclear whether such defenses apply to uniform random inputs, as opposed to random perturbations of inputs.} Membership inference attacks \cite{shokri2017membership, salem2018ml} attempt to determine if a record obtained by an adversary was part of the original training data of the model. Whilst this attack does not compromise the security of the model, it breaches the privacy of the individual records. These attacks create a \emph{shadow model}~\cite{shokri2017membership} to mimic the behavior of the target model. Salem et al.~\cite{salem2018ml} construct a shadow model using only positive class samples and negative noise generated via uniformly random feature vectors. However it is hypothesized that these random samples belong to non-members, i.e., the negative class~\cite[\S V.B]{salem2018ml}. We have shown that a large portion of these random inputs may \blue{also belong to the positive class.} \blue{Finally, we point to other works in literature analyzing the security of biometric authentication systems. Sugrim et al.~\cite{sugrim2019robust} survey and evaluate a range of performance metrics used in biometric authentication schemes. They seek to motivate scheme designers to leverage robust metrics to provide a complete description of the system, including a proposal of the new metric: Frequency Count Score (FCS). The FCS metric shows a distribution of scores of legitimate and unauthorized users, identifying the overlap between the two distributions which helps to select the appropriate threshold for the classification decision. The FCS, however, is dependent on the negative class or samples of other users, which does not include random inputs. The work in~\cite{sugrim2019recruit} investigates the accuracy of authentication systems reported on a small number of participants when evaluated over an increasing number of users. The authors suggest that performance limits of a system with a small number of participants should be evaluated iteratively by increasing the participant count until a the performance degrades below a tolerable limit. } \section{Conclusion} It is important to assess the security of biometric authentication systems against random input attacks akin to the security of passwords against random guess attacks. We have demonstrated that without intentionally including random inputs as part of the training process of the underlying machine learning algorithm, the authentication system is likely to be susceptible to random input attacks at a rate higher than indicated by EER. Absent any other detection mechanism, e.g., liveliness detection, this renders the system vulnerable. The mitigation measures proposed in this paper can be adopted to defend against such attacks. \section{Acknowledgments} This research was funded by the Optus Macquarie University Cybersecurity Hub, Data61 CSIRO and an Australian Government Research Training Program (RTP) Scholarship. We would like to thank the anonymous reviewers and our shepherd Kevin Butler for their feedback to improve the paper. \begin{figure*}[!ht] \centering \subfloat[Touch Average ROC in the presence of Beta Noise\label{fig:touch_betarand_def}]{% \includegraphics[width=0.87\linewidth]{images/touch_betaranddefence_roc-crop.pdf}}\\[-0.2pt] \subfloat[Face Average ROC in the presence of Beta Noise\label{fig:face_betarand_def}]{% \includegraphics[width=0.87\linewidth]{images/face_betaranddefence_roc-crop.pdf}}\\ \vspace{-0.2cm} \caption{Beta-noise mitigation of AR, with additional negative samples from the RAR feature set. The EER is marked on the diagrams as a vertical line. Addition RAR vectors were included as it was previously observed that beta noise is sufficient in mitigating AR attacks, but not the RAR attack.} \label{fig:all_betarand_def} \vspace{-0.2cm} \end{figure*} \bibliographystyle{IEEEtran} \section{Mitigation} \label{sec:mitigation} In the previous section, we validated that higher variance in the samples in the negative class as compared to the variance of samples from the target user class reduces AR. The data from the negative class is obtained from real user samples, and therefore scheme designers cannot control the variance. However, this gives us a simple idea to minimize AR: generate noise vectors around the target user's vectors and treat it as part of the negative class for training the model. This will result in the tightening of the acceptance region around the true positive region. We remark that the noise generated is independent of the negative training samples. \subsection{The Beta Distribution} More specifically, we generate additional negative training samples by sampling noisy vectors where each feature value is sampled from a beta distribution. We generate samples equal to the number of samples in the positive class. Thus creating a dataset with a third of the samples as positive, another third as negative samples from other users, and finally the remaining third of feature vectors treated as negative samples from the beta distribution dependent on the positive user. The procedure is as follows. For the $i$th feature, let $\mu_i$ denote the mean value for the given target user. We use the beta distribution with parameters $\alpha_i = | 0.5 - \mu_i| + 0.5$ and $\beta_i = 0.5$. We denote the resulting beta distribution by $\mathcal{B}e(\alpha_i, \beta_i)$. Then a noisy sample $\mathbf{x}$ is constructed by sampling its $i$th element $x_i$ from the distribution $ \mathcal{B}e(\alpha_i, \beta_i)$ if $\mu_i \le 0.5$, and from $1 - \mathcal{B}e(\alpha_i, \beta_i)$ otherwise. The two cases ensure that we add symmetric noise as the mean moves over to either side of $0.5$. \descr{Results on AR.} In Table \ref{tab:summary_ar}, we show the resulting FPR and AR after the addition of beta noise at the equal error rate. The detailed ROC curves are shown in Figure~\ref{fig:all_beta_def} in Appendix~\ref{sec:mitigation_roc}. In every configuration (classifier-dataset pairs), we see a significant decrease in AR. The AR is now lower than FPR in every configuration. In 14 out of 16 cases, the AR is $\le 0.04$. The two exceptions are LinSVM (with face and voice datasets). We further see that in 13 out of 16 instances the FPR either remains unchanged or improves! The 3 instances where the FPR degrades are LinSVM with face and face datasets both by $+0.015$, and DNN with Touch where the difference is $+0.05$. Thus, adding beta distributed noise does indeed decrease the AR with minimal impact on FPR. This agrees with our postulate that high AR was likely due to loose decision boundaries drawn by the classifier, and the addition of beta noise tightens this around the true positive region. Figure \ref{fig:individual_ar-fpr_def} in Appendix~\ref{sec:mitigation_roc} displays individual user FPRs and ARs. \descr{Results on RAR.} Interestingly, beta distributed noise only marginally reduces the raw acceptance rate as can be seen in Table~\ref{tab:summary_rar} (columns labeled $\beta$-RAR). The reason for this lies in the volume of the region spanned by random raw inputs. We previously saw in Section~\ref{sub:rar-results} that it was (a) exponentially small and (b) many orders of magnitude smaller than the true positive region. Thus, it is unlikely that beta distributed noise will lie in this region to aid the model to label them as negative samples. Consequently we sought another means to mitigate this attack surface. \subsection{Feature Vectors from Raw Inputs as Negative Samples} Our mitigation strategy to reduce RAR is to include a subset of raw input vectors in the training process, whose cardinality is equal to the number of positive user samples in the training dataset. The training dataset now contains 1/4th each of raw input vectors, beta-noise, positive samples, and samples from other users. \descr{Results on AR and RAR.} Table~\ref{tab:summary_rar} shows that the mitigation strategy reduces the RAR to less than or equal to 0.03 in all instances (columns labeled RAR). The resulting FPR is marginally higher than the FPR from only beta-distributed noise in some cases (Table~\ref{tab:summary_ar}). Thus, the inclusion of beta-distributed noise in conjunction with subset of raw inputs in the training data reduces both AR and RAR with minimal impact on FPR and FRR. \section{Synthetic Dataset} \label{sec:synthetic} \begin{figure*}[th!] \centering \includegraphics[width=1.0\textwidth]{images/isolate_user_variance-crop.pdf} \vspace{-0.65cm} \caption{A comparison between FPR, AR, four different ML architectures. Trained on synthetic data of 50 features of 50 user, of increasing variance within features for a singular user, repeated 50 times. Note how the system level AR and FPR remains unchanging, despite the isolated user's AR increasing substantially.} \label{fig:isolate_userv} \vspace{-0.10cm} \end{figure*} \begin{figure*}[th!] \centering \includegraphics[width=1.0\textwidth]{images/isolate_other_variance-crop.pdf} \vspace{-0.65cm} \caption{A comparison between FPR, AR, four different ML architectures. Trained on synthetic data of 50 features of 50 user, of increasing variance within features of all other users except a singular user, repeated 50 times. The x-axis denotes the relative SD of the population compared with the isolated user.} \label{fig:isolate_otherv} \vspace{-0.05cm} \end{figure*} The analysis in the previous section was limited in the sense that we could not isolate the reasons behind the discrepancy between AR and FPR. Indeed, we saw that for some configurations (dataset-classifier pairs), the AR curve nicely followed the FPR curve, e.g., the face dataset and DNN (Figure~\ref{fig:face_ind}), where as for others this was not the case. In order to better understand the factors effecting AR, in this section we attempt to empirically verify the hypothesized factors effecting the acceptance region outlined in Section~\ref{sec:attack_def}. Namely, high feature variance in a target user's samples is likely to increase AR, and low feature variance in the user samples in the negative class is expected to result in high AR. In both these cases, we expect to achieve a reasonably low EER, but AR may still be significantly greater than FPR. Moreover, if these factors are indeed true, we expect to see similar behavior across all classifiers. To test this we create a synthetic model of a biometric dataset. \subsection{Simulating a Biometric Dataset} Let $\mathcal{N}(\mu, \sigma^2)$, denote the normal distribution with mean $\mu$ and standard deviation $\sigma$. We assume each feature to be normally distributed across all users with slight variations in mean and standard deviation across all features and users. More specifically, our methodology for generating the synthetic dataset is as follows. \begin{enumerate}[leftmargin=5mm] \item We model the mean of all $n$ features taking values in the unit interval $\mathbb{I}$ as a normally distributed random variable $\mathcal{N}(\mu_{\text{mn}}, \sigma^2_{\text{mn}}) = \mathcal{N}(0.5, 0.1^2)$. Similarly we model the standard deviation of all $n$ features as another normally distributed random variable $\mathcal{N}(\mu_{\text{var}}, \sigma^2_{\text{var}}) = \mathcal{N}(0.1, 0.07^2)$. \item For each feature $i \in [n]$, we first sample $\mu_i \leftarrow \mathcal{N}(\mu_{\text{mn}}, \sigma^2_{\text{mn}})$ and $\sigma_i \leftarrow \mathcal{N}(\mu_{\text{var}}, \sigma^2_{\text{var}})$. The resulting normal distribution $\mathcal{N}(\mu_{i}, \sigma^2_{i}) $ serves as the population distribution of the mean of the feature $i$. \item For each user $u$, we sample the mean $\mu_{u, i} \leftarrow \mathcal{N}(\mu_{i}, \sigma^2_{i})$. The variance $\sigma^2_{u, i}$ is chosen as the control variable. User $u$'s samples for the $i$th feature are generated as i.i.d. random variables $\mathcal{N}(\mu_{u, i}, \sigma^2_{u, i})$, which serves as user $u$'s distribution for the $i$th feature. \end{enumerate} We evaluate the same four types of ML architectures, LinSVM, RBFSVM, RNDF and DNN. Due to the large number of potential configurations we evaluate the model performance at a fixed threshold of 0.5. For the experiments we choose 50 (synthetic) users, with 50 features in the feature space. Each experimental run is repeated 50 times \blue{to reduce any potential biases arising from the random process.} \blue{ \begin{figure*}[th!] \centering \includegraphics[width=1.0\textwidth]{images/synth_cosine_roc-crop.pdf} \vspace{-0.7cm} \caption{\blue{ROC Curves versus the AR curve for different ML architectures, including a cosine similarity distance-based classifier. Trained on synthetic data of 50 features of 50 user, with fixed mean and variance for features of all users, repeated 50 times.}} \label{fig:cosine_results} \vspace{-0.1cm} \end{figure*} \begin{figure*}[th!] \centering \includegraphics[width=1.0\textwidth]{images/synthetic_vary_nusers-crop.pdf} \vspace{-0.6cm} \caption{\blue{A comparison between FPR and AR of four different ML architectures. Trained on synthetic data of 50 features per user, with a variable number of users, repeated 50 times.}} \label{fig:vary_users} \vspace{-0.2cm} \end{figure*} } \subsection{Effects of Feature Variance on Acceptance Region} \label{sub:eff-var} \subsubsection{Variable Isolated User Variance and Fixed Population Variance} We first treat one out of the 50 users as an outlier, whcih we call the \emph{isolated} user. The variance $\sigma^2_{u, i}$ is fixed at $(0.2)^2$ for all other users $u$ and for all features $i \in [n]$. We vary the variance $\sigma_{u_\text{tgt}, i}$ of the isolated user $u_\text{tgt}$ from 0.05 to 0.35 in increments of 0.05. Figure~\ref{fig:isolate_userv} plots the user's standard deviation $(\sigma_{u_\text{tgt}, i})$ relative to the fixed population standard deviation $(\sigma_{u, i})$ of 0.2. It is clear the overall AR, FRR and FPR of the users is not affected by changing feature variance of a single user, despite the isolated user's samples included as part of training and testing data of other users. Conversely, when viewing the AR, FRR and FPR of the isolated user, we observe a slight increase in FRR and FPR as the relative variance increases. This is due to the positive samples being spread out due to increased variance in the isolated user's samples. However, this is accompanied by a substantially large increase in the acceptance region of this user, approaching 1, i.e., the entire feature space. Furthermore, this trend is visible for all four classifiers. \subsubsection{Fixed Isolated User Variance and Variable Population Variance} In this experiment, we fix the variance $\sigma^2_{u_\text{tgt}, i}$ of the isolated user ($u_\text{tgt}$) at $(0.2)^2$. The $\sigma^2_{u, i}$ of the remaining population is sampled from a normal distribution $\sigma_{u, i} \leftarrow \mathcal{N}(\mu_{i}, \sigma^2_{i})$. Where $\mu_{i}$ and $\sigma_{i}$ is sampled from the following distributions $\mathcal{N}(\mu_{\text{mn}}, \sigma^2_{\text{mn}}) = \mathcal{N}(\mu_{\text{mn}}, 0.05^2)$ and $\mathcal{N}(\mu_{\text{var}}, \sigma^2_{\text{var}}) = \mathcal{N}(0.03, 0.02^2)$, respectively. $\mu_{\text{mn}}$ is varied between 0.05 and 0.35 in increments on 0.05 This sampling permits a small amount of variation between features. The results are shown in Figure \ref{fig:isolate_otherv}. Inspecting the average AR, FRR and FPR of the system, it is evident there is a continual increase of all 3 metrics as the relative variance increases. This increase is expected as the majority of users' feature values have high variance, presenting an increasingly difficult problem for the machine learner to reduce misclassification errors. However, in all four classifiers the average AR curve is either comparable or lower than the FPR curve as the relative variance increases. For the isolated user, we see that when the relative variance of all other users is lower than this user (to the left), the AR is significantly higher even though the FPR and FRR are minimal in all four classifiers. This shows that less variance in the population samples will result in a high AR, as the classifier need not tighten AR around the true positive region, due to lack of high variance negative samples. On the other hand, AR of the isolated user decreases as the relative variance of the population increases. \blue{ \subsection{On Distance Based Classifiers} \label{sec:distance_classifier} } \blue{ As noted earlier, it has been stated that random inputs are ineffective against distance-based classification algorithms~\cite{pagnin2014leakage}. This is in contrast to the machine learning based algorithms evaluated in this paper. We take a brief interlude to experimentally evaluate this claim on the cosine similarity distance-based classifier. We sample 50 features with means distributed as $\mathcal{N}(\mu_{\text{mn}}, \sigma^2_{\text{mn}}) = \mathcal{N}(0.2, 0.05^2)$ and variance distributed as $\mathcal{N}(\mu_{\text{var}}, \sigma^2_{\text{var}}) = \mathcal{N}(0.03, 0.02^2)$. Cosine similarity is computed between two vectors of the same length. As our positive training data contains more than one training sample, we use the average of these samples as the representative template of the user~\cite{chauhan2016gesture}. We use a fixed number of 50 users, with the experiment repeated 50 times. Recall that our evaluation at each threshold is best-effort; we use 1,000 threshold bins for the evaluation of the cosine similarity classifier, since the FRR and FPR rapidly change over a small range of thresholds. Figure~\ref{fig:cosine_results} displays three classical machine learning algorithms of linear SVM, radial SVM, and random forests, alongside a distance-based cosine similarity classifier. It is clear from the figure, that the AR is near zero for cosine similarity, unlike the other classifiers using the same synthetic dataset. This, however, comes at the cost of higher EER. This suggests that distance-based classifiers are effective in minimizing the AR of model, but at the expense of accuracy of the system. We leave further investigation of distance-based classifiers as future work. \subsection{Effects of Increasing Synthetic Users} \label{sec:vary_users} The real-world datasets used in Section~\ref{sec:realscheme} have a variable number of users. Our binary classification task aggregates negative user samples into a negative class, resulting in distributions and variances of the negative class which depend on the number of users in the datasets. Thus, in this test we investigate the impact on TPR, FPR and AR by varying the number of users in the dataset. We use the synthetic dataset configured in the same manner as in Section~\ref{sec:distance_classifier}. We increase the number of users within the synthetic dataset, from 25 to 150, in increments of 25. Note that the split between positive and negative samples is still balanced (see Remark~\ref{rem:balanced}). In Figure \ref{fig:vary_users}, we observe that with the addition of more users, there is a slight increase in the FPR. This is expected as the likelihood of user features being similar between any two users will increase with more users in the population. As the training of the classifier uses samples from other users as a negative class, the increased number of negative users slightly lowers the AR of the classifier, with an increased variation of the negative training set (from additional users) covering more of the feature space. However, both these changes are relatively minor despite the multi-fold increase in the number of users. Thus, the AR of the classifiers remains relatively stable with an increasing number of users. }
\section{Introduction}\label{intro} Active matter is composed of non-equilibrium entities capable of converting autonomously the energy of their surroundings into directed motion or into mechanical work~\cite{bechinger2016}. This definition encompasses a broad variety of systems such as locomotive animals, motile microorganisms, microtubules and actin filaments in the cytoskeleton of eukaryotic cells, biomolecular motors, active colloids and nanomotors~\cite{ramaswamy2010}. In particular, one type of active systems that has been the subject of intensive research in recent years are the so-called microswimmers. These are micron- or submicron-sized particles that propel themselves through fluid environments at vanishing Reynolds numbers ~\cite{elgeti2015}. Most microswimmers exhibit patterns of locomotion characterized by a persistent ballistic motion at sufficiently short time scales, whereas its swimming direction is not fixed but strongly affected by random changes in the particle orientation~\cite{bechinger2016,taktikos2013}. Such orientational changes can be caused by, e.g., stochastic polymorphic transformations during the run-and-tumble dynamics of flagellated bacteria~\cite{darnton2007}, or due to thermal fluctuations from the surrounding fluid, as those observed for self-propelled colloids~\cite{howse2007}. For time scales much larger than the typical reorientation time (\emph{persistence time}), the randomization of the microswimmer orientation often leads to an effective diffusive behavior with a diffusion coefficient higher than expected under thermal equilibrium conditions \cite{howse2007,saragosti2012,cates2013}. One of the most-widely studied models of active motion of microswimmers is the so-called active Brownian particle (ABP). It consists of a disc or a sphere moving with a prescribed swimming velocity, where the direction of self-propulsion is determined by a well-defined orientation vector that changes with time by rotational diffusion~\cite{tenhagen2011,pototsky2012,redner2013,bialke2013,sevilla2014,sevilla2015,basu2018}. Both the translational and the angular motion of the ABP are overdamped and the inverse of the rotational diffusion coefficient sets the reorientation time above which the fluctuations of particle orientation become decorrelated. Despite its simplicity, the ABP model captures the main dynamical features of many active colloidal systems \cite{kurzthaler2018}. For instance, it exhibits a swimming-persistence length, determined by the product of the propulsion speed and the rotational diffusion time, whereas a translational diffusion coefficient that depends quadratically on the swimming velocity emerges in the long-time limit. Such a behavior is consistent with an exponential decay of the swimming-velocity autocorrelation function, as experimentally measured in several active colloidal suspensions~\cite{howse2007,bregulla2015,gomezsolano2017}. Furthermore, the ABP model is also the basis for the theoretical investigation of intricate phenomena in active matter, such as self-propelled motion in presence of external potentials~\cite{solon2015,vachier2019,woillez2019}, external flows~\cite{tenhagenpre2011,zoettl2012,li2017}, under geometrical confinement~\cite{hu2017,duzgun2018,wagner2019,caprini2019}, as well as collective phenomena of self-propelled particles, e.g. dynamical clustering and motility-induced phase separation \cite{cates2013,redner2013,bialke2013,wysocki2014,stenhammar2014,richard2016}. Moreover, the ABP model has allowed the analysis of stochastic thermodynamics and symmetry properties of extreme fluctuations in active systems~\cite{speck2016,pietzonka2016,falasco2016,gaspard2017,shankar2018}. In this paper, we investigate the active motion of self-propelled particles whose orientation is driven by long-ranged correlated noise. While most of the Langevin models of active particles consider the effect of thermal fluctuations by means of delta-correlated Gaussian noises, only a few works have addressed the role of long-lived correlations in the rotational motion~\cite{hu2017,peruani2007,gosh2015,debnath2016,narinder2018,sevilla2019}. In fact, memory effects caused by colored noise are a common feature of the orientational motion of active particles in complex media~\cite{narinder2018,gomezsolano2016,lozano2018,lozano2019,saad2019,narinder2019}. In particular, our work is motivated by the occurrence of anomalous diffusion in several examples of soft matter systems, where spatial heterogeneities lead to a non-linear monotonic growth with time of the mean-square displacement \cite{chepizhko2013}. For instance, anomalous diffusion arises in the translational motion of granules within the cytoplasm~\cite{tolic2004}, colloidal beads in entangled actin filament networks~\cite{wong2004} or wormlike micelles~\cite{jeon2013}, and vacuoles in highly motile amoeboid cells~\cite{thapa2019}. Moreover, there is direct evidence of anomalous \emph{rotational} diffusion in the orientational dynamics of single molecules of polymer melts near the glass transition~\cite{deschenes2001}, the rotational subdiffusion of proteins~\cite{cote2010} and the angular fluctuations of spherical colloidal probes suspended in polymer solutions \cite{andabloreyes2005,gutierrezsosa2018}. Among the distinct approaches to describe anomalous diffusion~\cite{oliveira2019}, here we focus on fractional Brownian noise~\cite{qian2003} in order to capture the effect of long-ranged temporal correlations in the directional changes of a self-propelled particle. The paper is organized as follows. In Section \ref{Sect:Model} we present a model that describes the two-dimensional (2D) motion of a self-propelled particle subject to fractional rotational Brownian noise. The Fokker-Planck equation for the one-particle probability density, and the explicit solution for the angular density are shown in Section~\ref{Sect:FP}. Then, in Section~\ref{Sect:AD} we derive the analytical expressions for the swimming-velocity autocorrelation function and the corresponding mean-squared displacement. In the same Section we analyze the different time scales that arise due to the persistent or antipersistent nature of the rotational noise, as well as the emergence of an active diffusion coefficient in the asymptotic limit. Finally, in Section~\ref{Sect:Conc} we summarize the main results of our work and make some further remarks. \section{Model of active motion with fractional rotational Brownian noise}\label{Sect:Model} \subsection{\label{subSect:LangevinEquation}Langevin equation} We consider a particle that self-propels and rotates in a two-dimensional domain with swimming velocity $\boldsymbol{v}_{s}(t) = v_{s}(t)\hat{\boldsymbol{v}}(t)$, where $\hat{\boldsymbol{v}}(t)=\left[ \cos \varphi (t),\sin \varphi (t)\right]$ is a unit vector defined by the angle $\varphi (t)$ between the direction of swimming and the horizontal axis of a given Cartesian reference frame, whereas $v_{s}(t)$ is the swimming speed. Generally, an active particle is subject to the fluctuations of a possibly complex surrounding fluid, and also to strongly correlated active fluctuations that originate from the particle's internal mechanisms that result in self-propulsion (see for instance Ref. \cite{figueroa2018}). In many cases of interest, these two kinds of fluctuations are strongly coupled by hydrodynamic effects, by the particular mechanism of self-propulsion (as in Janus particles), or by both of them. In this paper, we address the case for which thermal fluctuations are weakly coupled to active ones, and their statistical properties are assumed to be independent of each other. The thermal velocity fluctuations $\boldsymbol{\xi }_{T}(t)$ affect the translational part of motion and are characterized by a fixed temperature $T$. These are modeled as white noise, i.e., $\langle \boldsymbol{\xi }_{T}(t)\rangle =\boldsymbol{0}$ and $\langle \xi _{i,T}(t)\xi _{j,T}(s)\rangle =2D_T\delta (t-s)\delta_{i,j}$, where the subscripts $i,j$ denote the Cartesian components $x$, $y$, of a two-dimensional vector and $D_T$ the diffusion constant given by $k_{B}T \mu$, with $\mu$ the particle mobility. On the other hand, strongly correlated active fluctuations, $\xi _{R}(t)$, which originate from the internal mechanism of self-propulsion that gives rise to persistent motion, drive the angular velocity of the particle orientation. Such active fluctuations are modeled as a colored Gaussian noise with vanishing mean, $\langle \xi_{R}(t)\rangle =0$, and autocorrelation function $\langle \xi _{R}(t)\xi _{R}(s)\rangle =\omega(t,s)$. In this way, the overdamped dynamics of this active particle is described by the following Langevin equations \numparts \begin{eqnarray}\label{modelo} \frac{d{}}{dt}\boldsymbol{x}(t)& = &v_{s}(t)\,\hat{\boldsymbol{v}}(t)+\boldsymbol{ \xi}_{T}(t), \label{LangevinPosition} \\ \frac{d}{dt}\varphi(t)&= &\xi_{R}(t), \label{LangevinDirection} \end{eqnarray} \endnumparts where $\boldsymbol{x}(t)$ denotes the particle position in two dimensions at time $t$, given in Cartesian coordinates by the vector $\boldsymbol{x}(t)=[x(t),y(t)]$. In the following, we restrict our analysis to the case for which the swimming speed remains constant over time, $v_s(t) = v_0$ , and where active angular fluctuations are a stochastic stationary process, i.e. they satisfy $\omega(t,s)=\omega(t-s)$. In particular, we investigate the situation for which $\xi_{R}(t)$ corresponds to a continuous-time \emph{fractional Gaussian noise} \cite{qian2003}, which endows the rotational motion with persistent or antipersistent correlations. Specifically, the autocorrelation function of $\xi_{R}(t)$ is given by \begin{equation}\label{fGnoise} \omega(t-s) =2HD_{H}\vert t-s\vert^{2H-1}\left[\frac{2H-1}{\vert t-s\vert}+2 \delta(t-s)\right]. \end{equation} In Eq.~(\ref{fGnoise}), $0 < H < 1$ stands for the so-called Hurst exponent that characterizes the long-ranged time correlation of the active fluctuations, while $D_{H}$ (with units of [time]$^{-2H}$) depicts their amplitude. Such a long-ranged autocorrelation function models long-term memory effects of a variety of stochastic phenomena that have stationary increments and exhibit self-similarity, i.e., processes for which their probability density distribution is invariant under changes of scale \cite{kou2004}. These processes generalize the standard Brownian motion by means of a power-law decay that takes into account the effect of previous values of the noise at time $s \le t$ on the current one at $t$. For $0 < H < \frac{1}{2}$, the stochastic process $\xi _{R}(t)$ is negatively correlated (anticorrelated\footnote{Broadly speaking, this means that the particle changes its direction of motion from clockwise to counter-clockwise in an stochastic manner.}) and describes an \emph{antipersistent} orientational dynamics, whereas for $\frac{1}{2} < H < 1$, the motion is positively correlated (\emph{persistent}), i.e. if $t \neq s$, then $\omega(t-s) < 0$ or $\omega(t-s) > 0$, respectively. These two distinct behaviors have deep consequences in the pattern of motion of the active particle, as it will be unveiled in the following sections. The specific value $H = \frac{1}{2}$ corresponds to the case of Gaussian white noise, $\omega(t-s) = 2 D_{1/2} \delta(t-s)$. Furthermore, the process $\varphi(t) = \int_0^t \xi_{R}(t') dt'$ is a continuous-time \emph{fractional Brownian motion} with zero mean, i.e. $\langle \varphi(t) \rangle = 0$, and autocorrelation function \begin{equation}\label{fGmotion} \langle \varphi(t) \varphi(s) \rangle =D_{H}\left( |t|^{2H} + |s|^{2H} - |t-s|^{2H} \right), \end{equation} where the brakets denote an ensemble average over different realization of the fractional Brownian noise $\xi_{R}(t)$. Eq. (\ref{fGmotion}) yields the following expression for the mean-squared angular displacement \begin{equation}\label{msdfGmotion} \langle \varphi(t)^2 \rangle = 2D_H t^{2H}, \end{equation} where $t \ge 0$ and $\varphi$ is defined in the unrestricted domain $(-\infty,\infty)$. Eq.~(\ref{msdfGmotion}) reduces to the case of rotational Brownian diffusion for $H = \frac{1}{2}$, whereas the values $0 < H < \frac{1}{2}$ and $\frac{1}{2}< H < 1$ correspond to rotational subdiffusion and superdiffusion, respectively. \begin{figure*} \includegraphics[width=\textwidth]{Fig1.eps} \caption{(a) Examples of the stochastic time evolution of the angle $\varphi(t)$ obtained from numerical simulations of fractional Brownian motion for different values of the Hurst exponent $H$. From bottom to top: $H = 0.1, 0.3, 0.5, 0.7, 0.9$. (b) Corresponding mean-squared angular displacements $\left\langle \Delta\varphi(t)^{2}\right\rangle$. The symbols correspond to the numerical results obtained from the simulated trajectories in (a) whereas the solid lines are computed from Equation~(\ref{msdfGmotion}). The resulting 2D trajectories of the particle position $(x,y)$ are plotted for (c) $H = 0.1$, (d) $H=0.3$, (e) $H = 0.5$, (f) $H = 0.7$, and (g) $H = 0.9$. All trajectories start at $[x(0)=0, y(0) = 0]$. (h) Expanded view of the active trajectory in (b), showing the loops resulting from the superdiffusive angular motion for $H = 0.9$. The arrows represent the instantaneous orientation $\hat{\boldsymbol{v}}(t) = [\cos \varphi(t), \sin \varphi(t)]$ at different times $t$.} \label{fig:trajectories} \end{figure*} \subsection{Numerical analysis} In order to gain insight into the statistics of active particles subject to fractional rotational Brownian motion, we have simulated stochastic trajectories evolving according to Eqs.~(\ref{LangevinPosition})-(\ref{LangevinDirection}) for different values of $H$. To this end, fractional Brownian motion with autocorrelation function given by (\ref{fGmotion}), is generated using the circulant embedding method of the covariance matrix \cite{dietrich1997}, whereas the 2D particle position is solved by means of an Euler-Cromer scheme with time step $10^{-3}D_H^{-\frac{1}{2H}}$. In the numerical results presented throughout the paper, velocities, times cales, length scales, and translational diffusion coefficients are normalized by $v_0$, $\tau_{H}\equiv D_H^{-\frac{1}{2H}}$, $\ell_{H}\equiv v_0 D_H^{-\frac{1}{2H}}$, and $\mathcal{D}_{H}\equiv v_0^2 D_H^{-\frac{1}{2H}}$, respectively. In particular, $\tau_{1/2} \equiv D_{1/2}^{-1}$ and $\ell_{1/2} \equiv v_0 D_{1/2}^{-1}$ correspond to the rotational diffusion time and the swimming-persistence length for active Brownian motion driven by rotational diffusion ($H = \frac{1}{2}$), respectively. In Fig.~\ref{fig:trajectories}(a), we show some examples of the temporal evolution of the angle $\varphi(t)$, in the extended domain $(-\infty,\infty)$, for different values of the Hurst exponent over the time interval $0 \le t \le 10^{4}\, D_H^{-\frac{1}{2H}}$. The corresponding mean-squared angular displacements are plotted in Fig.~\ref{fig:trajectories}(b), thus showing agreement with the expression given in Eq.~(\ref{msdfGmotion}). 2D trajectories of the active particle position $[x(t),y(t)]$, resulting from the fractional rotational Brownian motion, are shown in Figs.~\ref{fig:trajectories}(c)-(h). For the sake of simplicity and in order to better appreciate the separate effect of fractional rotational Brownian noise on the 2D active motion, here we focus on the case without translational fluctuations, i.e., $D_{T}=0$. We want to clarify this is not an approximation, but rather a consequence of the separate dynamics given by Eqs.~(\ref{LangevinPosition})-(\ref{LangevinDirection}), as is shown in the next Section \ref{Sect:FP}. For $0<H<\frac{1}{2}$, the anti-persistence of the stochastic rotational dynamics leads to a highly persistent translational motion, as seen in Figs.~\ref{fig:trajectories}(c) and \ref{fig:trajectories}(d) for $H=0.1$ and $0.3$ respectively. This translates into actual persistence lengths much larger than the one expected for $\delta$-correlated rotational diffusion, $\ell_{1/2}$. This effect vanishes for $H=\frac{1}{2}$, for which the rotational dynamics results in diffusive translational motion with an effective active diffusion coefficient $D_{1/2}^{\mathrm{eff}} = \frac{1}{2} \mathcal{D}_{1/2} = \frac{1}{2}v_0^2 D_{1/2}^{-1}$. Then, for observation times much larger than $\tau_{1/2}=D_{1/2}^{-1}$, the swimming persistence is lost and the particle performs an effective memoryless random walk, as is seen in Fig.~\ref{fig:trajectories}(e). Similarly, for $\frac{1}{2}<H<1$, an \emph{active random walk} also emerges at time scales much larger than $D_H^{-\frac{1}{2H}}$, as shown in Figs~\ref{fig:trajectories}(f) and~\ref{fig:trajectories}(g) for $H = 0.7$ and $H=0.9$, respectively. However, a close inspection of the active trajectories reveals that the short-time motion is qualitatively distinct from the active Brownian motion for $H = 0.5$: looped trajectories are formed as $H$ increases and become more conspicuous as $H$ approaches the value 1, see Fig.~\ref{fig:trajectories}(g) for $H = 0.9$. We point out the different nature of such looped trajectories from the ones developed by chiral self-propelled particles driven by a constant torque~\cite{loewen2016} or by biased orientational fluctuations, for which the sense of rotation remains fixed over time. Instead, the trajectories obtained in this paper resemble the stochastic circular orbits that emerge in active colloids moving in viscoelastic fluids~\cite{narinder2018} and the meandering and chaotic motion predicted for self-phoretic particles at large P\'eclet numbers~\cite{hu2019}. \section{Statistics of active motion}\label{Sect:FP} \begin{figure*} \includegraphics[width=\textwidth]{Fig_2.eps} \caption{Profiles of the probability density function of the particle orientation angle $\phi$, as given in Eq. (\ref{eq:angdistr}) for the initial angular distribution $P(\phi',0) = \delta(\phi')$, for different values of $H$: (a) $H = 0.1$ (subdiffusive regime), (b) $H = 0.5$ (diffusive regime), (c) $H = 0.9$ (superdiffusive regime), at different times. From sharper to flatter curves: $t = 0.01 D_H^{-\frac{1}{2H}}$ (thick solid line), $t = 0.1 D_H^{-\frac{1}{2H}}$ (dotted line), $t = D_H^{-\frac{1}{2H}}$ (dashed line), $t = 10 D_H^{-\frac{1}{2H}}$ (dotted-dashed line) and $t = 100 D_H^{-\frac{1}{2H}}$ (thin solid line).}\label{fig:pdfangle} \end{figure*} \subsection{Fokker-Planck equation} The Fokker-Planck equation for the one-particle probability density $p({\boldsymbol{x}},\varphi ;t)\equiv \langle \delta [{\boldsymbol{x}% }-{\boldsymbol{x}}(t)]\delta [\varphi -\varphi (t)]\rangle$ that corresponds to the Langevin equations (\ref{modelo}), can be derived by standard methods, see for instance \cite{sevilla2014,sevilla2015}. By taking the derivative with respect to time $t$, we get \begin{eqnarray}\label{eq:derivFP} \frac{\partial}{\partial t} p({\boldsymbol{x}},\varphi;t) & = & - v_0 \hat{\boldsymbol{v}} \cdot \nabla p({\boldsymbol{x}},\varphi;t) \nonumber\\ & & - \nabla \cdot \langle \boldsymbol{ \xi}_{T}(t) \delta[\boldsymbol{x} - \boldsymbol{x}(t)] \delta[\varphi - \varphi(t)]\rangle \nonumber\\ & & - \frac{\partial}{\partial \varphi} \langle \xi_R(t) \delta[\boldsymbol{x} - \boldsymbol{x}(t)] \delta[\varphi - \varphi(t)]\rangle, \end{eqnarray} where $\nabla = \left(\frac{\partial}{\partial x}, \frac{\partial}{\partial y} \right)$ and the brackets stand for an average over realizations of both the translational and rotational noises, $\boldsymbol{\xi}_{T}(t)$ and $\xi_R(t)$, respectively. The second and the third terms on the right-hand side of Eq.~(\ref{eq:derivFP}), namely, the mean value of the product of the functional $\delta[\boldsymbol{x} - \boldsymbol{x}(t)] \delta[\varphi - \varphi(t)]$ with the Gaussian noises $\boldsymbol{ \xi}_{T}(t)$ and $\xi_R(t)$, respectively, can be evaluated by applying the Furutsu-Novikov theorem~\cite{furutsu1963,novikov1965}. A straightforward calculation leads to the Fokker-Planck equation for the Langevin model (\ref{modelo}) \begin{equation}\label{eq:FPfGn} \frac{\partial }{\partial t}p({\boldsymbol{x}},\varphi ;t)+v_{0}\hat{ \boldsymbol{v}} \cdot \nabla p({\boldsymbol{x}},\varphi;t)= \\ D_{T}\nabla^{2}p({\boldsymbol{x}},\varphi ;t) +\Omega(t)\frac{\partial^{2}}{\partial\varphi^{2}}p({\boldsymbol{x}},\varphi;t), \end{equation} where $\Omega(t)=\int_{0}^{t}ds\, \omega(s)$ for an arbitrary stationary correlation function $\omega(t)$ of the rotational noise $\xi_R(t)$. We point out that although the process $\varphi(t)$ is not strictly Markovian, its Gaussian nature allows the representation of the associated Fokker-Planck equation for the probability density $p({\boldsymbol{x}},\varphi ;t)$ as a time-dependent Markov process~\cite{haenggi1982}. In the case of fractional Gaussian noise, the correlation function given in Eq.~(\ref{fGnoise}) leads to \begin{equation}\label{eq:intcorrfGnoise} \Omega(t)=2HD_{H}t^{2H-1}. \end{equation} Note that the parameter $\Omega(t)$ given by Eq.~(\ref{eq:intcorrfGnoise}) plays the role of a time-dependent rotational diffusion coefficient in the Fokker-Planck equation (\ref{eq:FPfGn}), where a Brownian-like rotational diffusion coefficient, $\Omega(t) = D_{1/2}$, is recovered for $H = \frac{1}{2}$. We point out here that the net diffusion of a free active particle described by Eq. (\ref{eq:FPfGn}) can be split into the actively-induced free diffusion due to orientational fluctuations, and the free diffusion induced by thermal fluctuations. By writing \begin{equation} p(\boldsymbol{x},\varphi,t)=\int d^{2}x^{\prime}G(\boldsymbol{x}-\boldsymbol{x}^{\prime};t)p_{a}(\boldsymbol{x}^{\prime},\varphi,t), \end{equation} where $G(\boldsymbol{x};t)$ is the bivariate Gaussian distribution that solves the diffusion equation $\partial_{t}G(\boldsymbol{x};t)=D_{T}\nabla^{2}G(\boldsymbol{x};t),$ it can be shown that the diffusion induced by the orientational fluctuations is described by \begin{equation} \frac{\partial }{\partial t}p_{a}({\boldsymbol{x}},\varphi ;t)+v_{0}\hat{ \boldsymbol{v}} \cdot \nabla p_{a}({\boldsymbol{x}},\varphi;t)=\Omega(t)\frac{\partial^{2}}{\partial\varphi^{2}}p_{a}({\boldsymbol{x}},\varphi;t), \label{eq:ActiveFPfGn} \end{equation} where $p_{a}(\boldsymbol{x},\varphi;t)$ gives the probability density of finding a particle at $\boldsymbol{x}$, moving in the direction $\varphi$ at time $t$, due to self-propulsion only. Notice that~(\ref{eq:ActiveFPfGn}) can be obtained from Eq.~(\ref{eq:FPfGn}) by simply putting $D_{T}=0$. \subsection{Angular probability density function}\label{subsect:angPDF} By integrating Eq.~(\ref{eq:FPfGn}) with respect to $\boldsymbol{x}$ over the entire two-dimensional spatial domain, we find the Fokker-Planck equation for the probability density of the angle $\varphi$ at time $t$, i.e., for $P(\varphi,t) = \int_{-\infty}^{\infty} \int_{-\infty}^{\infty} dx\,dy\, p_{a}(\boldsymbol{x},\varphi;t)$ \begin{equation}\label{eq:FPangle} \frac{\partial}{\partial t}P(\varphi,t) = \Omega(t)\frac{\partial^2}{\partial \varphi^2}P(\varphi,t). \end{equation} This corresponds to the diffusion equation with time-dependent rotational diffusion coefficient $\Omega(t)$. The periodicity of $P(\varphi,t)$ with respect to the variable $\varphi$ is imposed by requiring that $P(\varphi,t)=P(\varphi+2\pi,t)$. We restrict the domain of description for the particle orientation by introducing the new angle $\phi$, which is defined in the interval $(-\pi,\pi]$. Then, the probability density that a single active particle transits from moving along the direction $\phi^{\prime}$ at time $t^{\prime}$ to move along the direction $\varphi$ in the time interval $t-t^{\prime}$, $\mathcal{P}(\phi,t-t^{\prime}\vert\phi^{\prime})$, is given by the solution of Eq.~(\ref{eq:FPangle}) for time $t \ge t^{\prime}$. Given the initial condition $\mathcal{P}(\phi, 0\vert\phi^{\prime}) = \delta(\phi-\phi^{\prime})$, such a solution is found by writing $P(\phi,t)$ as a Fourier series $\sum_{n}c_{n}(t-t^{\prime},\phi^{\prime})e^{in\phi}$, where the coefficients $c(t-t^{\prime},\phi^{\prime})$ of such expansion are explicitly determined from Eq. (\ref{eq:FPangle}) and the initial condition, namely \begin{eqnarray}\label{eq:solFPangle} \mathcal{P}(\phi,t-t^{\prime}\vert\phi^{\prime})&=&\frac {1}{2\pi} \sum_{n=-\infty}^{\infty} e^{in(\phi-\phi^{\prime})}e^{- n^2 \overline{\Omega}(t-t^{\prime})},\\ & = & \frac{1}{2\pi} \left(1+2\sum_{n=1}^{\infty} \cos[n(\phi-\phi^{\prime})] e^{-n^2 \overline{\Omega}(t-t^{\prime})} \right),\nonumber \end{eqnarray} where $\overline{\Omega}(t-t^{\prime})=\int_{0}^{t-t^{\prime}} ds\, \Omega(s)$ for an arbitrary autocorrelation function of the rotational noise $\xi_R(t)$. Eq.~(\ref{eq:solFPangle}) is the well-known Gaussian distribution \emph{wrapped} around the circle, and can be written in terms of the Jacobi theta function $\vartheta_{3}(z,q)=\sum_{n=-\infty}^{\infty}q^{n^{2}}e^{2inz}=1+2\sum_{n=1}^{\infty}q^{n^{2}}\cos2nz$ \cite{abramowitzBook}, i.e., \begin{equation} \mathcal{P}\left(\phi,t\vert\phi^{\prime}\right)= \frac{1}{2\pi}\vartheta_{3}\left(\frac{\phi-\phi^{\prime}}{2},e^{-\overline{\Omega}(t)}\right). \end{equation} By use of the Poisson summation formula \cite{guinand1941,applebaum2016}, $\mathcal{P}\left(\phi,t\vert\phi^{\prime}\right)$ can be rewritten as the equivalent Gaussian distribution wrapped around the circle \begin{eqnarray} \mathcal{P}\left(\phi,t\vert\phi^{\prime}\right)&=&{\sqrt{\frac{1}{4\pi \overline{\Omega}(t)}}\sum_{n=-\infty}^{\infty}\exp\left\{-\frac{[2\pi n-(\phi-\phi^{\prime})]^{2}}{4\overline{\Omega}(t)}\right\},}\nonumber\\ &=&\sqrt{\frac{1}{4\pi \overline{\Omega}(t)}}\exp\left[-\frac{(\phi-\phi^{\prime})^{2}}{4\overline{\Omega}(t)}\right] \vartheta_{3}\left(\frac{\pi(\phi-\phi^{\prime})}{2 i\overline{\Omega}(t)},e^{-\frac{\pi^2}{\overline{\Omega}(t)}}\right), \end{eqnarray} from which the Gaussian distribution appears explicitly as a factor. Notice that, in a short time interval $t$, $\mathcal{P}(\phi,t\vert\phi^{\prime})$ peaks sharply around $\phi^{\prime}$, meaning that the transition from the direction of motion $\phi^{\prime}$ to the new one $\phi$, occurs more frequently in the forward direction, i.e., around the direction of motion $\phi^{\prime}$. As the duration $t$ of the time interval of the transition becomes larger, the peak is smoothed out, thus converging to a uniform transition distribution in the asymptotic limit $t\rightarrow\infty$. The mean value of quantities of the form $f(\phi-\phi^{\prime})$, defined by \begin{equation}\label{eq:meantrans} \langle f(\phi-\phi^{\prime})\rangle_{t}=\int_{0}^{2\pi}d\phi\int_{0}^{2\pi}d\phi^{\prime}f(\phi-\phi^{\prime})\mathcal{P}(\phi,t\vert\phi^{\prime})P(\phi^{\prime},0), \end{equation} is of special interest. In particular, it can be shown from (\ref{eq:solFPangle}) and (\ref{eq:meantrans}) that \begin{equation} \left\langle e^{in(\phi-\phi^{\prime})}\right\rangle_{t}=e^{-n^{2}\overline{\Omega}(t)} \end{equation} or equivalently \numparts \begin{eqnarray} \left\langle \cos n\left[\phi-\phi^{\prime}\right]\right\rangle_{t}&=e^{-n^{2}\overline{\Omega}(t)},\\ \left\langle \sin n\left[\phi-\phi^{\prime}\right]\right\rangle_{t}&=0, \end{eqnarray} \endnumparts which give the contributions to the moment expansion of $\mathcal{P}(\phi,t\vert\phi^{\prime})$ when this is written as \begin{equation} \mathcal{P}(\phi,t\vert\phi^{\prime})=\frac{1}{2\pi}\sum_{n=-\infty}^{\infty}e^{in(\phi-\phi^{\prime})}\left\langle e^{in(\phi-\phi^{\prime})}\right\rangle_{t}. \end{equation} The probability density $P(\phi,t)$, independent of the initial angle $\phi^{\prime}$, is obtained from $\mathcal{P}(\phi,t\vert\phi^{\prime})$ as \begin{equation} P(\phi,t)=\int_{0}^{2\pi}d\phi^{\prime}\mathcal{P}(\phi,t\vert\phi^{\prime})P(\phi^{\prime},0) \end{equation} where $P(\phi^{\prime},0)$ denotes the initial distribution of the particle direction of motion. In the case of fractional Gaussian noise with autocorrelation given by Eq.~(\ref{fGnoise}), Eq.~(\ref{eq:intcorrfGnoise}) leads to \begin{equation}\label{eq:intintcorrfGnoise} \overline{\Omega}(t) = D_Ht^{2H}, \end{equation} which corresponds to half the variance of the fluctuations of $\varphi$, see Eq.~(\ref{msdfGmotion}), thus yielding \begin{eqnarray}\label{eq:angdistr} P(\phi,t) & = & \frac {1}{2\pi} \vartheta_3 \left(\frac{\phi}{2},e^{-D_Ht^{2H}}\right),\nonumber\\ & = & \frac{e^{ -\frac{\phi^2}{4D_H t^{2H}}}}{\sqrt{4\pi D_H t^{2H}}}\vartheta_3 \left( \frac{\pi \phi}{2iD_H t^{2H}}, e^{-\frac{\pi^2}{D_Ht^{2H}}} \right), \end{eqnarray} for the initial angular distribution $P(\phi^{\prime},0)=\delta(\phi^{\prime})$. The angular probability density given by Eq.~(\ref{eq:angdistr}) retains a Gaussian-like shape at sufficiently short time scales $\bigl(t \ll D_H^{-\frac{1}{2H}}\bigr)$, then it spreads over the entire interval $0 \le \phi < 2\pi$ as $t$ increases, i.e., it is wrapped around the circle, and converges to the uniform distribution $P(\phi,t) = \frac{1}{2\pi}$ at $t \gg D_H^{-\frac{1}{2H}}$ for all $0 < H < 1$. However, depending on the specific value of $H$, different profiles of $P(\phi,t)$ are observed at a given time $t > 0$, for the same initial condition $P(\phi,0) = \delta(\phi)$. This is illustrated in Figs.~\ref{fig:pdfangle}(a),~\ref{fig:pdfangle}(b) and~\ref{fig:pdfangle}(c) where we plot the angular density $P(\phi,t)$ for different values of the Hurst exponent, $H = 0.1$ (antipersistent orientational dynamics), 0.5 (Brownian orientational dynamics), and 0.9 (persistent orientational dynamics), respectively, at different times $t = 0.01D_H^{-\frac{1}{2H}},0.1D_H^{-\frac{1}{2H}},D_H^{-\frac{1}{2H}},10D_H^{-\frac{1}{2H}},100D_H^{-\frac{1}{2H}}$. For antipersistent rotational noise [$H < \frac{1}{2}$, see Fig.~\ref{fig:pdfangle}(a) for $H=0.1$], $P(\phi,t)$ broadens quickly over the full angular domain $(-\pi,\pi]$ during $0 < t < D_H^{-\frac{1}{2H}}$ but markedly preserves a peak around $\phi=0$ [see thick solid, dotted and dashed lines in Fig.~\ref{fig:pdfangle}(a) for $t = 0.01D_H^{-\frac{1}{2H}},0.1D_H^{-\frac{1}{2H}}$, and $D_H^{-\frac{1}{2H}}$ respectively]. This indicates that in this time regime, the particle direction of motion scatters more frequently in the forward direction even when any change of the orientation is probable (\emph{rectification of motion}), thereby causing a highly correlated motion. In contrast, $P(\phi,t)$ converges very slowly to the uniform angular density $(2\pi)^{-1}$ for time intervals $t > D_H^{-\frac{1}{2H}}$, retaining a smooth peak at $\phi=0$ [see Fig.~\ref{fig:pdfangle}(a) for $H = 0.1$ at $t = 10D_H^{-\frac{1}{2H}},100D_H^{-\frac{1}{2H}}$, dotted-dashed and thin solid lines, respectively], thus leading to a strong persistence of translational motion, as shown in Fig.~\ref{fig:trajectories}(c). The opposite trend is observed for persistent fractional noise ($H > \frac{1}{2}$). For instance, in Fig.~\ref{fig:pdfangle}(c) we show that, for $H = 0.9$, the initial delta peak $\delta(\phi)$ at $t = 0$ broadens rather slowly during $0 < t < D_H^{-\frac{1}{2H}}$. As a result, the particle retains its direction of motion, whose persistence causes the translational looped trajectories shown in Fig. \ref{fig:trajectories}(g)-(h). On the other hand, a very fast convergence to the steady-state uniform value $ (2\pi)^{-1}$ occurs for time intervals $t > D_H^{-\frac{1}{2H}}$. For such a large value of $H$, the typical time scale needed to observe such a convergence is $t \sim 10 D_H^{-\frac{1}{2H}}$, see dotted-dashed line in Fig.~\ref{fig:pdfangle}(c). Only for the specific time interval $t = D_H^{-\frac{1}{2H}}$, the angular density profile is the same for all values of the Hurst exponent, and is given by $P\left(\phi,D_H^{-\frac{1}{2H}}\right) = \frac{1}{2\pi} \vartheta_3 \left( \frac{\phi}{2},e^{-1} \right)$, see dashed lines in Figs.~\ref{fig:pdfangle}(a)-(c). We point out that the convergence of $P(\phi,t)$ to a uniform angular distribution suggests that an active particle with fractional rotational Brownian motion must exhibit active, but normal, diffusion at sufficiently long time scales, for both persistent and antipersistent rotational noise, as explicitly shown in Section~\ref{Sect:AD}. \section{Active diffusion}\label{Sect:AD} \subsection{Velocity autocorrelation function} \begin{figure}[t] \includegraphics[width=0.8\textwidth]{Fig3.eps} \caption{(a) Velocity autocorrelation function computed from Equation (\ref{eq:velcorr}), for different values of $H$: $0.1$ (dashed line), $0.3$ (dotted line), $0.5$ (thick solid line), $0.7$ (dotted-dashed line), and $0.9$ (thin solid line). Inset: expanded view for $0 \le t \le 1$. (b) Velocity autocorrelation function computed from simulated active trajectories with fractional rotational Brownian motion for the same values of $H$ as in (a), plotted with same line style.}\label{fig:velautocorr} \end{figure} We now compute the autocorrelation function of the swimming velocity, i.e., $\langle \boldsymbol{v}_{s}(s) \cdot \boldsymbol{v}_{s}(s') \rangle = v_0^2 \langle \hat{\boldsymbol{v}}(s) \cdot \hat{\boldsymbol{v}}(s')\rangle$, where the orientational correlation function can be expressed in terms of the angular coordinate $\phi$ as \begin{equation}\label{eq:orientcorr} \langle \hat{\boldsymbol{v}}(s) \cdot \hat{\boldsymbol{v}}(s')\rangle = \left\langle \cos [ \phi(s) - \phi(s')] \right\rangle, \end{equation} which is equivalent to $\langle \cos [\phi - \phi'] \rangle_{s-s^{\prime}}$ for $s\ge s^{\prime}$. Therefore, Eq.~(\ref{eq:orientcorr}) can be explicitly computed by means of \begin{equation}\label{eq:angcorr} \langle \hat{\boldsymbol{v}}(s) \cdot \hat{\boldsymbol{v}}(s')\rangle = \int_0^{2\pi} \int_0^{2\pi} d\phi \, d\phi'\, \cos(\phi - \phi')\mathcal{P}(\phi,s-s'|\phi')P(\phi',s'), \end{equation} where $\mathcal{P}(\phi,s-s'|\phi')$ is the transition probability density from $\phi'$ at time $s'$ to $\phi$ at time $s$, as was introduced in Sect. \ref{subsect:angPDF}, whereas $P(\phi',s')$ is the angular probability density at time $s' \ge 0$ given by (\ref{eq:angdistr}). For $s \ge s' \gg D_H^{-\frac{1}{2H}}$, $\langle \hat{\boldsymbol{v}}(s) \cdot \hat{\boldsymbol{v}}(s')\rangle$ becomes stationary, where $P(\phi',s') \rightarrow (2\pi)^{-1}$, while $\mathcal{P}(\phi,s-s'|\phi') = P(\phi-\phi',s-s')$. Using the expressions given in Eqs.~(\ref{eq:solFPangle}), (\ref{eq:intintcorrfGnoise}) and~(\ref{eq:angcorr}), we find that the velocity autocorrelation function is given explicitly by \begin{equation}\label{eq:velcorr} \langle \boldsymbol{v}_{s}(s) \cdot \boldsymbol{v}_{s}(s') \rangle = v_0^2 \exp \left[-D_H (s-s')^{2H} \right]. \end{equation} Eq.~(\ref{eq:velcorr}) corresponds to: a \emph{stretched exponential} when $0 < H < \frac{1}{2}$ describing a highly correlated motion; a \emph{pure exponential} if $H = \frac{1}{2}$ describing Brownian correlations of the direction of motion; and a \emph{compressed exponential} when $\frac{1}{2} < H < 1$ that describes short-ranged correlations of the direction of motion. In Fig.~\ref{fig:velautocorr}(a) we plot the autocorrelation function of the swimming velocity given by Eq.~(\ref{eq:velcorr}), $\langle \boldsymbol{v}_{s}(t) \cdot \boldsymbol{v}_{s}(0) \rangle = \langle \boldsymbol{v}_{s}(s'+t) \cdot \boldsymbol{v}_{s}(s') \rangle$, as a function of the time lag $t = s - s'$ for different values of $H$. We check that they perfectly agree with the numerical results shown in Fig.~\ref{fig:velautocorr}(b). In addition, we find that, regardless of $H$, the velocity autocorrelation attains the value $v_0^2e^{-1}$ at $t = D_H^{-\frac{1}{2H}}$. Nevertheless, for other values of $t$, different regimes are observed depending on $H$. For instance, for $0 < H < \frac{1}{2}$, $\langle \boldsymbol{v}_{s}(t) \cdot \boldsymbol{v}_{s}(0) \rangle$ decays sharply from $v_0^2$ to $v_0^2 e^{-1}$ for $0 \le t < D_H^{-\frac{1}{2H}}$, as highlighted in the insets of Figs.~\ref{fig:velautocorr}(a) and \ref{fig:velautocorr}(b), followed by a very slow decrease for $t \ge D_H^{-\frac{1}{2H}}$. On the other hand, for $H=\frac{1}{2}$ we find that a purely exponential decay is recovered, i.e., $\langle \boldsymbol{v}_{s}(t) \cdot \boldsymbol{v}_{s}(0) \rangle = v_0^2 \exp(-D_{1/2} t)$, for which the particle orientation is driven by Gaussian white noise with rotational diffusion coefficient $D_{1/2}$ and decorrelation time set by $\tau_{1/2} = D_{1/2}^{-1}$. Finally, for $\frac{1}{2} < H < 1$ (persistent rotational noise) the velocity autocorrelation function decreases more slowly in time for $0 \le t < D_H^{-\frac{1}{2H}}$, whereas it quickly goes to 0 for $t \ge D_H^{-\frac{1}{2H}}$. In particular, as $H \rightarrow 1$, the velocity autocorrelation approaches a Gaussian decay, i.e., $v_0^2\exp(-D_1 t^2)$. Consequently, for $\frac{1}{2} \le H < 1$, the typical decorrelation time of the swimming velocity is $\lesssim D_H^{-\frac{1}{2H}}$, whereas for $0 < H < \frac{1}{2}$, long-range temporal correlations of the particle orientation lead to a rather high persistence of the swimming velocity. \begin{figure*} \includegraphics[width=0.9\textwidth]{Fig4.eps} \caption{(a) Translational mean-squared displacement given by Eq. (\ref{eq:msdtrans}), for different values of the Hurst exponent: $H = 0.1$ (thick solid line), $H = 0.3$ (dashed line), $H = 0.5$ (dotted line), $H = 0.7$ (dashed-dotted line), and $H = 0.9$ (thin solid line). The top-left and bottom-right insets show a linear-linear representation of the main plot at short and long time scales, respectively. (b) Translational mean-squared displacements obtained from simulated trajectories. Same color code and same line style as in Fig. \ref{fig:MSD2dtrans}(a). (c) Long-time behavior of the translational mean square displacements for an active particle driven by antipersistent rotational fractional noise. From top to botton; $H = 0.1, 0.125, 0.15, 0.2, 0.25$. The colored symbols correspond to the curves obtained from numerical simulations, whereas the black solid lines represent the analytical expression given by Eq.~(\ref{eq:msdtrans}). The triangles ($\triangleright$) depict the corresponding location of the effective rotational time, $\tau_H^{\mathrm{eff}}$, above which active diffusion emerges. Inset: translational mean-squared displacement for $H=0.1$. The triangles ($\triangleleft$) and ($\triangleright$) indicate the location of the persistence time $\tau_H$ and the effective rotational time $\tau_H^{\mathrm{eff}}$, respectively, which define the time interval $[\tau_H,\tau_H^{\mathrm{eff}}]$ in which anomalous diffusion is observed. (d) Active diffusion coefficient (solid line, left axis) and effective rotational diffusion time (dashed line, right axis), as a function of $H$. The horizontal solid and dashed lines represent the limit values as $H \rightarrow 1$, $D^{\mathrm{eff}}_H = \frac{\sqrt{\pi}}{4}$ and $\tau_H^{\mathrm{eff}} = \frac{1}{\sqrt{\pi}}$, respectively, whereas the squares are numerical values of $D_H^{\mathrm{eff}}$ computed from simulations. The vertical dotted line separates the two distinct regimes of active motion: I) long-range correlations of the swimming velocity, and II) fast decay of the swimming-velocity autocorrelation function.} \label{fig:MSD2dtrans} \end{figure*} \subsection{Mean-squared displacement} The translational mean-squared displacement of the particle position, $\boldsymbol{x} = (x,y)$, can determined by employing the relation \begin{eqnarray \langle |{\boldsymbol{x}}(t)|^2 \rangle & = & \int_0^t \int_0^t ds \, ds' \left\langle \frac{d}{ds}\boldsymbol{x}(s) \cdot \frac{d}{ds'}\boldsymbol{x}(s') \right\rangle, \label{eq:msd2Dtrans} \label{eq:transmsd2D} \nonumber\\ & = & \int_0^t \int_0^t ds \, ds' \langle \boldsymbol{\xi}_{T}(s) \cdot \boldsymbol{\xi}_{T}(s') \rangle + \int_0^t \int_0^t ds \, ds' \langle \boldsymbol{v}_{s}(s) \cdot \boldsymbol{v}_{s}(s') \rangle. \label{eq:transmsd2Dcomponents} \end{eqnarray} The first term on the right hand-side of Eq.~(\ref{eq:transmsd2Dcomponents}), which will be denoted by $\langle |{\boldsymbol{x}}(t)|^2 \rangle_p$, represents the \emph{passive} component of the mean-squared displacement due to translational velocity fluctuations, $\boldsymbol{\xi}_T(t)$. Since we assume that $\boldsymbol{\xi}_T(t)$ is delta-correlated in the model (\ref{modelo}), this yields trivially the diffusive contribution \begin{equation}\label{eq:passmsdtrans} \langle |{\boldsymbol{x}}(t)|^2 \rangle_p = 4D_T t. \end{equation} On the other hand, the second term on the right hand-side of Eq.~(\ref{eq:transmsd2Dcomponents}), which will be denoted by $\langle |{\boldsymbol{x}}(t)|^2 \rangle_a$, originates from the orientational changes in the swimming velocity driven by fractional rotational Brownian noise and can be rewritten as \begin{equation}\label{eq:transmsd2Dact} \langle |{\boldsymbol{x}}(t)|^2 \rangle_a = 2v_{0}^{2}\int_0^t ds\int_0^s ds' \langle\cos(\phi-\phi^{\prime})\rangle_{s-s^{\prime}}. \end{equation} Henceforth, we focus on the nontrivial \emph{active} contribution to the translational mean-squared displacement, i.e., $\langle |{\boldsymbol{x}}(t)|^2 \rangle_a = \langle |{\boldsymbol{x}}(t)|^2 \rangle - \langle |{\boldsymbol{x}}(t)|^2 \rangle_p$. Thus, from Eqs.~(\ref{eq:velcorr}) and~(\ref{eq:transmsd2Dact}), we can derive in a straightforward manner the general expression for this active component for all $0 < H < 1$, namely \begin{eqnarray} \langle |{\boldsymbol{x}}(t)|^2 \rangle_a &= &2v_{0}^{2}\int_0^t ds\int_0^s ds'e^{-D_{H}{s^{\prime}}^{2H}}\nonumber\\ &= &v_0^2 t^2 \sum_{k = 0}^{\infty} \frac{\bigl(-D_H t^{2H}\bigr)^k}{k!(1+k H)(1+2k H)}\label{eq:msdtrans1}. \end{eqnarray} Eq.~(\ref{eq:msdtrans1}) can be rewritten as \begin{equation}\label{eq:msdtrans} \langle |{\boldsymbol{x}}(t)|^2 \rangle_a = \frac{v_0^2}{H D_H^{\frac{1}{H}}}\left[ \gamma\left(\frac{1}{2H},D_H t^{2H}\right)D_H^{\frac{1}{2H}}t - \gamma\left(\frac{1}{H},D_Ht^{2H}\right) \right], \end{equation} where $\gamma(\nu,z) = \int_0^z t^{\nu - 1} e^{-t} dt$ is the lower incomplete gamma function~\cite{abramowitzBook}. In Figs.~\ref{fig:MSD2dtrans}(a) and~\ref{fig:MSD2dtrans}(b), we plot some exemplary mean-squared displacements for different $H$, computed by means of Eq.~(\ref{eq:msdtrans}) and from the simulated trajectories, respectively. We verify that the analytic expression (\ref{eq:msdtrans}) for arbitrary $H$ agrees very well with the numerical results. An apparent expression can be readily derived from Eq.~(\ref{eq:msdtrans1}) for the particular case $H = \frac{1}{2n}$, where $n = 1,2,\ldots$. In such a case, the mean-squared displacement can be expressed as the following finite sum \begin{eqnarray}\label{eq:msdtrans2n} \langle |{\boldsymbol{x}}(t)|^2 \rangle_a & = & \frac{2n v_0^2}{D_{{1}/{2n}}^{2n}}\left\{ (n-1)!\left[ 1 - e^{-D_{{1}/{2n}}t^{\frac{1}{n}}} \sum_{k=0}^{n-1}\frac{D^k_{{1}/{2n}}t^{\frac{k}{n}}}{k!} \right] D_{{1}/{2n}}^n t \right. \nonumber\\ &&\left.+ (2n-1)!\left[e^{-D_{{1}/{2n}}t^{\frac{1}{n}}}\sum_{k=0}^{2n-1}\frac{D^k_{{1}/{2n}}t^{\frac{k}{n}}}{k!} -1 \right] \right\}. \end{eqnarray} For $n = 1$, i.e. $H = \frac{1}{2}$, we recover the well-known expression of persistent Brownian motion with rotational diffusion coefficient $D_{1/2}$ \begin{equation}\label{eq:msdABM} \langle |{\boldsymbol{x}}(t)|^2 \rangle_a =\frac{2v_{0}^{2}}{D_{1/2}^{2}}\left(D_{1/2}t+e^{-D_{1/2}t}-1\right), \end{equation} whereas for $n = 2$, i.e., $H = \frac{1}{4}$ (antipersistent rotational noise), we get \begin{equation}\label{eq:msdtransH0_25} \langle |{\boldsymbol{x}}(t)|^2 \rangle_a = \frac{4v_0^2}{D_{1/4}^{4}}\left[2e^{-D_{1/4}\sqrt{t}}\left( 3 + 3D_{1/4} \sqrt{t} + D_{1/4}^2 t \right)+ D_{1/4}^2 t - 6 \right]. \end{equation} From Eq.~(\ref{eq:msdtrans1}), it can be easily seen that in the limit of fully antipersistent rotational noise, $H \rightarrow 0$, the mean-squared displacement is ballistic at all times, i.e., \begin{equation}\label{eq:fullpersist} \langle |{\boldsymbol{x}}(t)|^2 \rangle_a \rightarrow \frac{1}{e} v_0^2 t^2. \end{equation} Eq.~(\ref{eq:fullpersist}) represents the limit of infinite persistence of self-propelled motion, characterized by a constant value of the velocity autocorrelation function~$ \langle \boldsymbol{v}_{s}(s) \cdot \boldsymbol{v}_{s}(s') \rangle \rightarrow v_0^2 / e$ for all $s > s'$, and an effective swimming speed $v_0/\sqrt{e}$. The other extreme limit corresponds to fully persistent rotational fractional Brownian noise, $H \rightarrow 1$, for which we find \begin{equation}\label{eq:msdtransH1} \langle |{\boldsymbol{x}}(t)|^2 \rangle_a \rightarrow \frac{v_0^2}{D_1}\left[ \sqrt{\pi}\, {\mathrm{erf}}\left({D_1}^{\frac{1}{2}} t\right) D_1^{\frac{1}{2}}t + e^{-D_1 t^2} -1 \right], \end{equation} where $\mathrm{erf}(z) = \frac{2}{\sqrt{\pi}}\int_{0}^{z} dt e^{-t^2}$ is the error function. Note that, in this case, the velocity autocorrelation approaches the Gaussian decay $\langle \boldsymbol{v}_{s}(s) \cdot \boldsymbol{v}_{s}(s') \rangle \rightarrow v_0^2\exp \left[-D_1 (s-s')^2 \right]$. In the long-time regime $D_{1}^{1/2}t\gg1$, ${\mathrm{erf}}({D_1}^{\frac{1}{2}} t)\approx1$ and hence the linear dependence $\sqrt{\pi/D_{1}}v_{0}^{2}\,t$ is obtained. For all values of $0 < H < 1$, two important limiting cases are observed. First, since $\gamma(\nu,z) \rightarrow \nu^{-1}z^{\nu}$ as $z \rightarrow 0$, then for $t \ll D_H^{-\frac{1}{2H}}$ \begin{equation}\label{eq;shortmsd} \langle |{\boldsymbol{x}}(t)|^2 \rangle_a \approx v_0^2 t^2. \end{equation} This limit corresponds to the characteristic ballistic behavior, which is expected to happen due to the persistence of the swimming velocity ${\boldsymbol{v}}_s(t)$ at sufficiently short time scales. However, at intermediate time scales two qualitatively distinct regimes can be distinguished depending on the behavior of the mean-squared displacement with respect to the value of $H$: \begin{itemize} \item[I)] First, for $H < 0 < \frac{1}{2}$ the short-time ballistic regime is rapidly hindered at $t \lesssim D_H^{-\frac{1}{2H}}$ by the antipersistence of the rotational noise. This results in an intermediate \emph{anomalous} regime where $\langle |{\boldsymbol{x}}(t)|^2 \rangle_a$ grows with time $t$ slower than $\sim t^2$ but faster than $\sim t$ over a broad temporal interval up to several times $D_H^{-\frac{1}{2H}}$, as shown in Figs.~\ref{fig:MSD2dtrans}(a) and~\ref{fig:MSD2dtrans}(b) for $H = 0.1,0.3$, and in Fig.~\ref{fig:MSD2dtrans}(c) for $H = 0.1,0.125,0.15,0.2$. This is also consistent with the long-range temporal correlations of the swimming velocity, which persist even for time scales comparatively larger than $D_H^{-\frac{1}{2H}}$, as shown in Fig.~\ref{fig:velautocorr}. \item[II)] On the other hand, for $\frac{1}{2}\le H <1$, the persistence of the rotational noise allows to fully preserve the ballistic behavior up to time scales $t \approx D_H^{-\frac{1}{2H}}$, see Figs.~\ref{fig:MSD2dtrans}(a) and~\ref{fig:MSD2dtrans}(b) for $H =0.5,0.7,0.9$. For $t \gtrsim D_H^{-\frac{1}{2H}}$, $\langle |{\boldsymbol{x}}(t)|^2 \rangle_a$ reaches quickly a diffusive behavior, caused by the complete decorrelation of the particle orientation, as verified in Fig.~\ref{fig:velautocorr}. Note that in this case, the resulting slope of linear behavior of the mean-squared displacement varies very weakly with $H$, as observed in the bottom-right insets of Figs.~\ref{fig:MSD2dtrans}(a) and~\ref{fig:MSD2dtrans}(b). \end{itemize} Furthermore, the second important limit is obtained at sufficiently long-time scales ($t \gg D_H^{-\frac{1}{2H}}$), for which we find \begin{equation}\label{eq:actdiff} \langle |{\boldsymbol{x}}(t)|^2 \rangle_a \approx \frac{v_0^2}{H D_H^{\frac{1}{2H}}}\Gamma\left( \frac{1}{2H} \right) t, \end{equation} where $\Gamma(\nu) = \int_0^{\infty} t^{\nu - 1} e^{-t}dt$ is the complete gamma function. Remarkably, Eq.~(\ref{eq:actdiff}) reveals that active diffusion emerges in the long-time limit for all values of the Hurst exponent, $0 < H < 1$: $\langle |{\boldsymbol{x}}(t)|^2 \rangle_a \approx 4D_H^{\mathrm{eff}} t$, where the resulting active diffusion coefficient is \begin{eqnarray}\label{eq:effdiffcoeff} D^{\mathrm{eff}}_H & = & \frac{v_0^2}{4 H D_H^{\frac{1}{2H}}}\Gamma\left( \frac{1}{2H} \right),\nonumber\\ & = & \frac{1}{4H} \Gamma\left( \frac{1}{2H} \right) \mathcal{D}_H. \end{eqnarray} Indeed, in Fig.~\ref{fig:MSD2dtrans}(c), we show that, even for regime I ($0<H<\frac{1}{2}$), for which an anomalous growth of the mean-squared displacement occurs at intermediate time scales, a diffusive behavior is reached at sufficiently long time scales. In such a case, the slope of the long-time linear behavior of $\langle |{\boldsymbol{x}}(t)|^2 \rangle_a$ becomes very sensitive to small variations of the Hurst exponent: the smaller the value of $H$, the larger the resulting active diffusion coefficient, as illustrated in Fig.~\ref{fig:MSD2dtrans}(c). By performing a linear fit of the long-time behavior of mean-squared displacements obtained from the simulated trajectories, we compute the numerical values of $D_H^{\mathrm{eff}}$, which are plotted as squares in Fig. ~\ref{fig:MSD2dtrans}(d). For comparison, we also plot as a solid line the dependence of $D_H^{\mathrm{eff}}$ on $H$ given by Eq. (\ref{eq:effdiffcoeff}), thereby showing a very good agreement with the numerical results. Once again, two distinct behaviors of $D^{\mathrm{eff}}_H$ are observed as a function of $H$, which coincide with the existence of the two different regimes (I and II) previously identified. For regime I, the active diffusion coefficient exhibits a sharp monotonic increase with decreasing $H$, and diverges as $H \rightarrow 0$. In addition, it approaches the value $D_{1/2}^{\mathrm{eff}} = \frac{1}{2} \mathcal{D}_{1/2} = \frac{1}{2}v_0^2 D_{1/2}^{-1}$ as $H \rightarrow \frac{1}{2}$. On the other hand, for regime II, $D^{\mathrm{eff}}_H$ varies very weakly with $H$: starting from $D_{1/2}^{\mathrm{eff}}$ it decreases monotonically as $H$ increases and converges to the value $D^{\mathrm{eff}}_1 = \frac{\sqrt{\pi}}{4} \mathcal{D}_{1} = \frac{v_0^2}{4}\sqrt{\frac{\pi}{D_1}}$ as $H \rightarrow 1$. The previous results suggest that two relevant time scales are necessary to describe active motion driven by fractional rotational Brownian noise. The first is the natural time scale \begin{equation}\label{eq:persisttime} \tau_H \equiv D_H^{-\frac{1}{2H}}, \end{equation} which represents a \emph{persistence time} over which the active particle is able to keep on average a constant swimming velocity despite the angular fluctuations. On the contrary, a second time scale, which will be denoted by $\tau_H^{\mathrm{eff}}$, represents the time needed for the particle orientation to become completely decorrelated and uniformly distributed over $[0,2\pi)$. Therefore, $\tau_H^{\mathrm{eff}}$ can be interpreted as an \emph{effective rotational time}, similar to $\tau_{1/2} = D_{1/2}^{-1}$ defined for active Brownian motion ($H=0.5$) as the time scale at which the autocorrelation function of the particle orientation decays to $1/e$. In fact, for this particular value of the Hurst exponent, both time scales coincide: $\tau_{1/2} = \tau_{1/2}^{\mathrm{eff}}$. However, for $H \neq 1/2$, it is expected that $\tau_{H}^{\mathrm{eff}}$ could be different from $\tau_H$ due to the non-exponential decay of the velocity autocorrelation function. In order to determine $\tau_H^{\mathrm{eff}}$, we realize that a diffusive behavior of $\langle |{\boldsymbol{x}}(t)|^2 \rangle_a$ must be observed for $t \gtrsim \tau_H^{\mathrm{eff}}$. Thus, taking into account that $\gamma(\nu,z) \rightarrow \Gamma(\nu)$ as $z \rightarrow \infty$, by applying the condition $\Gamma \left(\frac{1}{2H} \right) D_H^{\frac{1}{2H}}t \gg \Gamma\left( \frac{1}{H} \right)$ to Eq.~(\ref{eq:msdtrans}) we find \begin{eqnarray}\label{eq:rottime} \tau_H^{\mathrm{eff}} & = & \frac{\Gamma\left(\frac{1}{H}\right)}{\Gamma \left( \frac{1}{2H} \right)} D_H^{-\frac{1}{2H}},\nonumber\\ & = & \frac{\Gamma\left(\frac{1}{H}\right)}{\Gamma \left( \frac{1}{2H} \right)} \tau_H. \end{eqnarray} Indeed, for $H = \frac{1}{2}$, Eq.~(\ref{eq:rottime}) reduces to the well known expression $\tau_{1/2}^{\mathrm{eff}} = D_{1/2}^{-1} = \tau_{1/2}$ for pure rotational Brownian noise in two dimensions. In Fig.~\ref{fig:MSD2dtrans}(d) we show as a dashed line the dependence of $\tau_H^{\mathrm{eff}}$ on $H$ given by Eq.~(\ref{eq:rottime}). For regime I, $\tau_H^{\mathrm{eff}}$ exhibits a very pronounced increase as $H$ decreases, and diverges as $H \rightarrow 0$. It should be noted that, in the case of antipersistent rotational noise, the increase of $\tau_H^{\mathrm{eff}}$ on $H$ is much more pronounced than that of $D_H^{\mathrm{eff}}$, as shown in Fig.~\ref{fig:MSD2dtrans}(d). For instance, for $H = 0.1$, $\tau_{0.1}^{\mathrm{eff}} = 15120 \,\tau_{0.1}$, whereas $D_{0.1}^{\mathrm{eff}} = 60 \,\mathcal{D}_{0.1}$. In Fig.~\ref{fig:MSD2dtrans}(c) we represent as triangles the location of $\tau_H^{\mathrm{eff}}$ on the mean-squared displacement curves , $\langle |{\boldsymbol{x}}(t)|^2 \rangle_a$ vs. $t$, for different $0 < H < \frac{1}{2}$. We verify that active diffusion emerges if the elapsed time $t$ is only slightly larger than the values of $\tau_H^{\mathrm{eff}}$ determined by means of Eq.~(\ref{eq:rottime}). Note that the separation between the persistence time and the effective rotational time opens a time interval $[\tau_H,\tau_H^{\mathrm{eff}}]$ over which the active motion is neither ballistic nor diffusive, as illustrated in the inset of Fig.~\ref{fig:MSD2dtrans}(c). The length of this interval where anomalous active motion occurs broadens as $H$ decreases, as illustrated in Fig.~\ref{fig:MSD2dtrans}(c) for different values of $0 < H < \frac{1}{2}$. The opposite behavior is observed for regime II: with increasing $H$, $\tau_H^{\mathrm{eff}}$ decreases monotonically from the value $\tau_{1/2}^{\mathrm{eff}} = D_{1/2}^{-1}$ at $H = 1/2$, thus becoming smaller than $\tau_H$. In this case, the dependence of $\tau_H^{\mathrm{eff}}$ on $H$ is much less pronounced than in I, where the limiting value as $H \rightarrow 1$ is $\tau_1^{\mathrm{eff}} = \tau_{1}/\sqrt{\pi} = {1}/{\sqrt{\pi D_1}}$. Note that in this regime the time interval for the possible appearance of anomalous active motion, $[\tau_H^{\mathrm{eff}},\tau_H]$, is quite narrow. In fact, the maximum relative difference between $\tau_H$ and $\tau_H^{\mathrm{eff}}$ is $(\tau_H - \tau_H^{\mathrm{eff}}) / \tau_H \approx 0.44$ as $H \rightarrow 1$. This implies that a rather abrupt transition from ballistic to active diffusion must occur in this regime at $t \approx D_H^{-\frac{1}{2H}}$, as verified in Figs.~\ref{fig:MSD2dtrans}(a) and~\ref{fig:MSD2dtrans}(b). \section{Summary and final remarks}\label{Sect:Conc} In this paper, we have investigated a two-dimensional model for a overdamped self-propelled particle moving at constant swimming speed, whose orientation is driven by fractional Brownian noise. The resulting dynamics of the swimming direction of the particle has deep consequences on its translational pattern of motion. Remarkably, for positively correlated rotational noise, circular-like motion can be observed even in the absence of external elements that break the rotational symmetry, as found for active colloids swimming in viscoelastic media~\cite{narinder2018} or at large P\'eclet number~\cite{hu2019}. We have derived the corresponding Fokker-Planck equations, as well as the solution for the probability density function of the particle orientation for arbitrary values of the Hurst exponent $H$ of the fractional rotational noise. This in turn has allowed us to find analytical expressions for the swimming-velocity autocorrelation function and the translational mean-squared displacement, which reduce for $H = 0.5$ to the widely-known expressions of the conventional ABP model. By analyzing the behavior of the derived quantities for different values of the Hurst exponent, we have identified two distinct regimes of active motion, marked by the influence of either the antipersistence or the persistence of the rotational noise. We have demonstrated that active diffusion effectively emerges in the asymptotic long-time limit regardless of the nature of the rotational noise. Moreover, we have provided an analytical expression for the active diffusion coefficient as a function of $H$, and checked that our results are in excellent agreement with numerical simulations of active trajectories evolving according to the proposed model. One remarkable finding of our work is the emergence of an $H$-dependent time scale which plays the role of an effective rotational-diffusive time, even though the orientational dynamics of the particle is not exponentially correlated if $H \neq 0.5$. The existence of such a time scale, in addition to the well-known persistence time, sets an interval over which the active motion exhibits anomalous diffusion. This is markedly apparent for antipersistent rotational noise with small Hurst exponent. In such a case, there exists a broad time interval characterized by long-range temporal correlations of the swimming velocity and an anomalous grow of the mean-squared displacement. To our knowledge, our work is the first investigation of the effects of non-exponential orientational correlations in the motion of self-propelled particles. Thus, we expect that the results presented here will contribute to a better understanding of active motion in complex media with anomalous rotational diffusion, such as those found in many biological systems. Further steps of our work could also address the effect of retarded memory effects in the rotational friction~\cite{sandev2014,rodriguez2015}, which could also modify the active diffusive behavior that emerges in the asymptotic limit. One more possible aspect to investigate is the influence of geometrical confinements, as it is known that rotational memory can significantly modify, e.g., the rectification of active particles in asymmetric periodic channels \cite{hu2017}. \section*{Acknowledgements} J.R.G.-S. acknowledges support from DGAPA-UNAM PAPIIT Grant No. IA103320. F.J.S. acknowledges support from DGAPA-UNAM PAPIIT-114717 and PAPIIT-IN110120. \section*{References}
\section{Introduction} The Schwinger process signals the instability of the vacuum against particle (pair) creation in an external field. The pair ($e^+ e^-$) production rate $\propto \exp\{- a E_{crit} / E \}$, $a = \pi$ \cite{Sauter:1931zz,Heisenberg:1935qt,Schwinger:1951nm}, in a spatio-temporally homogeneous electric field of strength $E$ is exceedingly small due to the large value of the (critical) Sauter-Schwinger field strength $E_{crit} = 1.3 \times 10^{18}$ V/m and therefore escaped a direct experimental verification until now. Much hope was therefore put on the progressing laser technology which however delivers even at present and near-future "ultrahigh intensities" far too low field strengths \cite{DiPiazza:2011tq,Tajima}. Many efforts on the theory side attempted to find field configurations which enhance the Schwinger type pair production. To cite a few entries of the fairly extended literature, which documents the ongoing enormous interest in that topic, we mention dynamical assistance \cite{Torgrimsson:2017cyb,Torgrimsson:2017pzs,Fey:2011if,Dunne:2009gi, Schutzhold:2008pz,Aleksandrov:2016lxd,Aleksandrov:2018uqb,Orthaber:2011cm, Otto:2016xpn,Panferov:2015yda,Otto:2015gla,Otto:2014ssa,Otto:2016fdo}, double assistance effects \cite{Torgrimsson:2016ant,Otto:2018jbs}, multi-beam configurations \cite{Bulanov:2010ei} and their embedding into optimization procedures \cite{Kohlfurst:2012rb,Hebenstreit:2014lra}. In essence, these attempts envisage a reduction of the factor $a$ in the above exponent, which is in general a complicated function of the external parameters. Despite such a "practical goal", these investigations aim at understanding the QED as a pillar of the Standard Model in the non-perturbative, high-intensity regime. Given the seminal meaning of the Schwinger process as paradigm for related processes, e.g.\ particle production in cosmology \cite{Birrell_Davies} and at black hole horizons as Hawking radiation \cite{Hawking:1974sw}, up to the disputed Unruh radiation \cite{Unruh:1976db,Crispino:2007eb,Narozhny:2004xx}, various authors considered analog processes, e.g.\ in condensed matter physics \cite{Linder:2015fba,Dreisow:2012sx} and in wave guides \cite{Lang:2018tpj} etc., which display also the monomonial, genuinely non-perturbative dependence on an external field parameter. Still within QED, one can search for more easily accessible processes which have the prototypical non-perturbative dependence $\propto \exp\{- a E_{crit} / E \}$. For instance, the LUXE collaboration \cite{Hartin:2018sha,Altarelli:2019zea,Abramowicz:2019gvx} envisages to exploit the non-linear Breit-Wheeler process which is known to behave as $\propto \exp\{- a_{n\ell BW} E_{crit} / E \}$ in the tunneling regime with $a_{n\ell BW} = 4 m / 3 \omega'$, where $\omega'$ is the energy of a probe photon traversing a strong laser pulse. LUXE is planed as next-generation follow-up of the seminal SLAC experiment E-144 \cite{Burke:1997ew}, which operated in the multi-photon regime, by "Measuring the Boiling Point of the Vacuum of Quantum Electrodynamics" \cite{Hartin:2018sha} via the non-linear Breit-Wheeler process since $\omega' \gg m$ reduces the exponential suppression, i.e.\ it makes the above quantity $a_{n\ell BW}$ small when using probe photon energies $\omega'$ much larger than the electron mass $m$, thus compensating the large value of $E_{crit} /E$ at presently attainable facilities. Note furthermore that the trident process shows also an exponential behavior under certain conditions \cite{Dinu:2017uoj,Dinu:2019wdw}, as originally elaborated in \cite{Baier:1972vc,Ritus:1972nf}. Here, we point out that the non-linear Compton process has a similar non--perturbative exponential field strength dependence under certain side conditions. The key is the suppression of the low harmonics which facilitate the Thomson limit and display a polynomial dependence. What is then left is the otherwise exponentially suppressed contribution. The analogy to the non-linear Breit-Wheeler process is not surprising since it is the crossing channel of the non-linear Compton process in the Furry picture. The crucial difference is in the final-state phase spaces. This is most clearly evident in the perturbative, weak-field limit, where the Breit-Wheeler process is a threshold process, while the Compton process without side conditions has no threshold (see \cite{LL,Harvey:2009ry} for the physical regions in the Mandelstam plane). We introduce here as side condition a cut-off which is related to exit channel kinematics. This in fact enforces the exponential behavior. Our brief note is organized as follows. In section \ref{sect:2}, we outline the definition of a Lorentz invariant cut-off in the non-linear Compton scattering. In section \ref{sect:3}, the restriction of the physically accessible regions in the Mandelstam plane is discussed. The cut-off facilitates a clear signature of multi-photon effects in the total cross section in the weak-field regime (section \ref{sect:4}). The moderately strong-field regime is considered in section \ref{sect:5}, where we compare the exact numerical results with some approximation formula to evidence the exponential dependence of the cross section. The discussion section \ref{sect:6} contains a comparison with laser pulses and outlines of how the cut-off is realized by photon observables in the exit channel. We summarize in section \ref{sect:7}. \section{Non-linear Compton scattering with cut-off}\label{sect:2} We consider here a monochromatic laser field in plane wave approximation for circular polarization. The non-linear Compton (n$\ell$C\,) cross section with cut-off $c$ reads \begin{equation} \label{sigma} \sigma = \frac{ \alpha^2 \pi}{a_0^2} \frac{1}{k \cdot p} \, F (a_0, k\cdot p, c), \quad F (a_0, k \cdot p, c) = \sum_{n = 1}^\infty \int_{c}^{y_n} dx \, \frac{1}{(1+x)^2} \, F_n(z_n), \end{equation} where \begin{equation} \label{F} F_n (z_n) = - 4 J_n(z_n)^2 + \left(2 + \frac{x^2}{1+x} \right) a_0^2 [J_{n+1}(z_n)^2 + J_{n-1}(z_n)^2 - 2 J_n(z_n)^2] \end{equation} for $c \le y_n$ and $F_n = 0$ elsewhere. The Lorentz and gauge invariant quantity $a_0$ is the classical non-linearity parameter characterizing solely the laser beam, and $\alpha$ stands for the fine-structure constant. The arguments of the Bessel functions $J_n$ read explicitly $z_n(x, y_n, a_0) = 2 n a_0 \frac{1}{y_n}\sqrt{\frac{x (y_n - x)}{1 + a_0^2}}$, where the two invariants $x = k \cdot k' / k \cdot p'$ and $y_n = 2 n \frac{k \cdot p}{m_*^2}$ with $0 \le x \le y_n$ enter. For $c = 0$, one recovers the text book formulas, e.g.\ in \cite{LL,Harvey:2009ry}, where the effective mass $m_*^2 = m^2 (1 + a_0^2)$ and the (quasi-) momentum balance as well as the relation to asymptotic four-momenta ($p/p'$ for $in/out$-electrons and $k/k'$ for $in/out$-photons) are discussed in detail. The only but decisive difference is the introduction of the cut-off $c$ in (\ref{sigma}) which pushes the lower limit of the $x$ integration to higher values, i.e.\ it is aimed at suppressing the lower harmonics. \section{Kinematics in the Mandelstam plane}\label{sect:3} \begin{figure}[tb!] \includegraphics[width=0.77\columnwidth]{Mandelstam.pdf} \put(-182,33){\rotatebox{-40}{{\large $\bm{x > 1}$}}} \vspace*{-3mm} \caption{(Color online) Mandelstam plane with physical regions of n$\ell$C\, process (I, red area), n$\ell$BW\, process (II, upper gray area) and the mirrored Compton I (III, left gray area). Arrows indicate the directions of positive variables $\hat s$, $\hat t$ and $\hat u$, and a few coordinate values are provided too. Bullets depict thresholds. Harmonics of n$\ell$C\, are parallel to (and may coincide with) the blue lines in region I, which become restricted to the dark-red region (labeled by ``$x > 1$") below the boundary $x = 1$ (in yellow) and above the hyperbola $\hat s \hat u = 1$ (in green) when imposing the cut-off $c = 1$ which facilitates the threshold at coordinates $\hat s = 2$, $\hat t = - \frac12$, $\hat u = \frac12$. In region II, the harmonics of n$\ell$BW\, are parallel to (and may coincide with) the horizontal green lines. \label{Fig:M}} \end{figure} The meaning of the cut-off $c$ can be visualized in a covariant manner by inspecting the Mandelstam plane. Defining the invariants $s_n = (q+ nk)^2$, $t_n = (k' - nk)^2$, $u_n =(q' - nk)^2$ for harmonics $n = 1, 2, 3 \cdots$, the physical regions I - III in scaled triangular coordinates $\hat s = s / m_*^2$, $\hat t = t / m_*^2$, $\hat u = u / m_*^2$ with $\hat s + \hat t + \hat u = 2$ refer to processes related by crossing symmetry on amplitude level: I (red area in Fig.~\ref{Fig:M}) for n$\ell$C\, process, $e^- + n \gamma \to {e^-}' + \gamma'$ or $q + nk = q' + k'$ with quasi-momenta $q$ and $q'$, II (upper gray area) for non-linear Breit-Wheeler (n$\ell$BW\,) pair production, $\gamma' + n\gamma \to e^+ + e^-$ or $k' + n k = q_{e^+} + q_{e^-}$, and III (left gray area) as mirror of I, e.g.\ $e^+ + n \gamma \to {e^+}' + \gamma'$. In I, the harmonics $\hat s_n = const$ are parallel lines (in blue in Fig.~\ref{Fig:M}), limited by $\hat t = 0$ (on-axis forward scattering, where $x =0$) and by the hyperbola $\hat s \hat u = 1$ (on-axis backscattering), i.e.\ the physical interval of each harmonic is given by $0 \le \hat t \le 2 - \hat s_n - \hat s_n^{-1}$, which is another way of expressing the above quoted restriction $0\le x \le y_n$. The scaled invariant-energy squared of the first harmonic is $\hat s_1 = 1 + \Delta \hat s $ (measured from the bullet at the top of I in direction of the $\hat s$ coordinate, indicated by the arrow, as shown for the other coordinates too) and the spacing of adjacent harmonics is $\Delta \hat s=\hat s_{n+1} - \hat s_n = 2 k \cdot p / m_*^2$. Considering an optical laser (we use the frequency $\omega = 1$~eV as representative value) colliding head-on with an electron beam, as available (i) in HZDR (40 MeV \cite{Jochmann:2013toa}) or planned (ii) at ELI (600 MeV \cite{Turcu:2016dxm}) and (iii) at LUXE (17.5 GeV \cite{Altarelli:2019zea}) for instance, one has (i) $\Delta \hat s \approx 6.5 \times 10^{-3} /(1+a_0^2)$, (ii) $9.6 \times 10^{-2} /(1+ a_0^2)$ and (iii) $2.8 \times 10^{-1} /(1+ a_0^2)$ in the red region displayed in Fig.~\ref{Fig:M}. Instead of displaying so many narrow parallel lines representing the harmonics, we depict only a few representative proxies of them at $\hat s = \frac32, 2, \frac52, 3$ etc.\ as blue lines. In contrast to the perturbative, weak-field limits of the linear processes, $n = 1, a_0 \to 0$, the physical regions I - III of the non-linear processes are mapped out by the discrete harmonics $n = 1 \cdots \infty$. The cut-off $c = 1$ in (\ref{sigma}) restricts the region I to the dark-red area, limited by a section of the hyperbola $\hat s \hat u = 1$ and the line $x \equiv k \cdot k' / k \cdot p' = \hat t_n /(1 - \hat s_n - \hat t_n) \ge c$. This excludes the low harmonics $\hat s_n < 2$ and restricts the admissible $\hat t$ intervals of the harmonics $\hat s_n \ge 2$ to $\frac12 (1 -\hat s_n) \ge \hat t \ge 2 - \hat s_n - \hat s_n^{-1}$. For the above quoted numbers, harmonics with $n > (1+ a_0^2) / 2 p \cdot k$ are in the admissible region. In such a way, a non-trivial threshold is introduced, depicted by the blue bullet at the tip of the dark-red area at coordinates $\hat s = 2$, $\hat t = - \frac12$ and $\hat u = \frac12$. Imagine now that we keep the laser frequency $\omega = \vert \vec k \vert$ but lower the electron energy $p_0$, i.e.\ the values of $\hat s_n$ would become gradually smaller. Then, a certain number of harmonics drop out the admissible area as they pass the threshold by moving to the left-above: less and less harmonics contribute to the n$\ell$C\, process by (i) imposing a threshold by the cut-off $c > 0$ and/or (ii) diminishing $\hat s_1$ (and all other $\hat s_n$). \section{Multi-photon regime, $\mathbf{a_0 < 1}$}\label{sect:4} \begin{figure}[tb!] \includegraphics[width=0.49\columnwidth]{totCS2_kn.pdf} \includegraphics[width=0.49\columnwidth]{totCS1_kn.pdf} \put(-410,120){$a_0 = 0.01$} \put(-170,120){$a_0 = 0.1$} \vspace*{-3mm} \caption{(Color online) Scaled cross section of n$\ell$C\, (\ref{sigma}) with cut-off values $c= 1$ (blue curves) and $c = 2$ (orange curves) for $a_0 = 0.01$ (left panel) and $a_0 = 0.1$ (right panel). The dashed curves depict separately the harmonic $n = 2$. Note the use of the variables $\tilde s \equiv 2 p \cdot k / m^2 = (s_1 - m_*^2) / m^2$ (bottom abscissa) or $\chi = a_0 \tilde s / 2$ (top abscissa); accordingly, the harmonic thresholds are at $\tilde s = c (1 +a_0^2) /n$. For comparison, the Klein-Nishina cross section is depicted by a dotted curve, and the Thomson cross section is marked by a circle. Upon increasing the value of $a_0$, more and more harmonics are lifted, and at $a_0 = 1$ (not displayed) already a multitude of harmonics adds up to generate smooth distributions in the sub-threshold region, i.e.\ below $\tilde s = 1$ (2) for $c =1$ (2). These distributions are discussed as functions of $1 / \chi$, instead of $\tilde s$ or $\chi$, in section \ref{sect:5} below. \label{Fig:mpC}} \end{figure} To highlight this channel closing effect with invariant variables we exhibit in Fig.~\ref{Fig:mpC} the n$\ell$C\, cross section (\ref{sigma}) as a function of $\tilde s \equiv 2 k \cdot p / m^2$ for $a_0 = 0.01$ and 0.1 for two cut-off values, $c = 1$ and 2. The figure unravels clearly the multi-photon effects which look completely the same as known from n$\ell$BW\,, see figure 3 in \cite{Nousch:2012xe} (complementary approaches to multi-photon effects are considered in \cite{Titov:2019kdk}). Thus, the channel closing effect is exactly analog to sub-threshold n$\ell$BW\, pair production in region II \cite{Titov:2012rd}. There, the threshold $\hat t = 4$ (depicted as bullet at bottom of the green top parabola $\hat s \hat u = 1$ in Fig.~\ref{Fig:M}) limits the physically admissible region: only harmonics with $\hat t_n \ge 4$ contribute. The notion "sub-threshold" means $\hat t_{n=1} < 4$. Similar to the n$\ell$C\, process, we have displayed in Fig.~\ref{Fig:M} only two possible proxies (horizontal green lines) of two harmonics of n$\ell$BW\, in the region II. Note that, in considering n$\ell$BW\, pair production {\it per se}, one changes usually the coordinate names $\hat t_n \to \hat s_n$ etc.\ according to the crossing symmetry relations \cite{LL}. \section{Non-perturbative regime, $\mathbf{a_0 \gtrsim 1}$}\label{sect:5} After enforcing a non-trivial threshold in n$\ell$C\, process by the cut-off $c > 0$, one expects a further similarity to the n$\ell$BW\, in the region $a_0 > 1$ despite different phase spaces. As shown originally in \cite{HReiss,Ritus,Nikishov_Ritus}, in the tunneling regime $a_0 \lesssim 1/\sqrt{\kappa} \gg 1$, the n$\ell$BW\, pair creation rate scales as $\propto \kappa \exp\{- 8 / 3 \kappa\}$, where $\kappa = a_0 k \cdot k' / m^2$ (here, $k$ and $k'$ are the $in$ four-momenta of the laser and probe photons). In head-on collisions, $\kappa = 2 \frac{\omega'}{m} \frac{E}{E_{crit}}$ since $a_0 = \frac{m}{\omega} \frac{E}{E_{crit}}$. That yields the Schwinger type dependence $\propto \exp\{- a_{n \ell BW} E_{crit} / E\}$ with $a_{n\ell BW} = \frac 43 \frac{m}{\omega'}$. The large ratio $E_{crit} / E$ can be compensated by a small ratio $m / \omega'$, thus making the pair creation rate accessible in present day experiments by using hard probe photons with $\omega' \gg m$, in contrast to the plain Schwinger rate, even with assistance effects. As emphasized in \cite{Hartin:2018sha}, such a Schwinger type rate of n$\ell$BW\, is found numerically already for $a_0 \gtrsim 1$ and $\kappa \lesssim 1$. Quite in contrast to n$\ell$BW\,, the n$\ell$C\, cross section without cut-off displays a polynomial dependence on the invariant Ritus variable\footnote{ The Ritus variable $\chi$ is a measure of the field strength $E/E_{crit}$ in the rest frame of the electron; $\chi$ encodes the energy of the laser + electron beams as well as the laser intensity. The high-energy limit and the high-intensity limit do not commute albeit they yield both a high-$\chi$ asymptotic \cite{Podszus:2018hnz,Ilderton:2019kqp}.} $\chi \equiv a_0 k \cdot p / m^2 = a_0 (s_1 - m_*^2) /2 m^2$ \cite{Ritus}. However, imposing the cut-off $c > 0$, thus suppressing the low harmonics in (\ref{sigma}) by a threshold, turns the behavior to an exponential one. In fact, evaluating (\ref{sigma}) numerically, one obtains the solid curves in Fig.~\ref{Fig:3} for $c = 1$ (left panel) and 2 (right panel). Since at $1/\chi < 1$ the curves display an $a_0$ dependence, we have employed scaling factors. Without the latter ones, the curves at $1 / \chi > 1$ are nearly perfectly on top of each other, i.e.\ independent of $a_0$. To quantify the $1 / \chi$ dependence we depict for a comparison the dashed/dotted curves based on \begin{equation} \label{exp} F_\infty(\chi, c) = \sqrt\frac32 \frac{\chi}{\pi} f(c) \, {\rm erfc} \left( \sqrt{\displaystyle\frac{2 c}{3 \chi}} \right) + {\cal O}(\chi^{2/3}) \stackrel{c \gg \chi}{\longrightarrow} \left( \frac{\chi}{\pi} \right)^{3/2} f(c) \exp\left\{ - \displaystyle\frac{2 c}{3 \chi} \right\} + \cdots, \end{equation} where $f(c) = (5 + 7 c +5 c^2)/(1+c)^3$ and ``erfc" stands for the complementary error function. \begin{figure}[tb!] \includegraphics[width=0.49\columnwidth]{totCSinv_c1_ccf_withFPA.pdf} \includegraphics[width=0.49\columnwidth]{totCSinv_c2_ccf_withFPA.pdf} \vspace*{-4mm} \caption{(Color online) Normalized cross section $m^2 \sigma(\chi) a_0 / (\alpha^2 \pi) = F(\chi)/\chi $ of n$\ell$C\, from (\ref{sigma}) as a function of $1 / \chi$ (solid curves) with cut-off values $c= 1$ (left panel) and $c = 2$ (right panel). The dashed (dotted) curves exhibit the approximation (\ref{exp}) with erfc (exp). For $a_0 = 1$, 2 and 4 from top to bottom with scaling factors as indicated. The red bullets mark results of QED calculations with bandwidth and ponderomotive effects for $a_0 = 1$ (see sub-section \ref{bandwidth}). Fits of these data by $m^2 \sigma(\chi) \propto \exp\{- 2c_{fit}^c/3\chi \}$ within the interval $1/\chi = (1, 5]$ deliver $c_{fit}^{c=1} = 1.27$ and $c_{fit}^{c=2} = 2.59$. \label{Fig:3}} \end{figure} One avenue to (\ref{exp}) is to start with (\ref{sigma}) in the limit $a_0\to \infty$ with side condition $(1 -z_n^2 / n^2) a_0^2 = const$ and then to convert the sum via the Euler-Maclaurin formula into an integral, $F_\infty (\chi, c) = - \frac{4}{3 \pi} \int_c^\infty dx \, f(x) x^{-2/3} Ai' (z(x))$ with $z(x) = (x/\chi)^{2/3}$. Under the condition $c \gg \chi$, the derivative of the Airy function, $Ai'$, can be replaced by its asymptotic representation and the integral can be executed upon a shift of the variable $x$ and a suitable Taylor expansion. Surprisingly, the small-$\chi$ leading-order term $\propto \exp \{ - 2 c / 3 \chi \}$ in (\ref{exp}) numerically approximates (\ref{sigma}) fairly well in the non-asymptotic region, $a_0 \gtrsim 1$ and $\chi < 1$, irrespectively of the assumptions made in the sketched derivation. As a consequence, the n$\ell$C\, cross section also displays a Schwinger type dependence $\sigma(c > 0) \propto \exp\{ - a_{n \ell C} E_{crit}/E \}$ for suitable values of the cut-off $c > 0$, in general with $a_{n \ell C}(c, a_0, s_1)$. That is, the paradigmatic transmonomial behavior \cite{Aniceto:2018bis} is provided not only for pair creation but shows up also in high-harmonics Compton scattering on the level of ``total" cross section, which actually means integration over a fraction of the $out$-phase space. \section{Discussion}\label{sect:6} \subsection{Imposing the cut-off: kinematics} The cut-off $c > 0 $ in (\ref{sigma}) looks quite innocent, but in practice it may become challenging. To illustrate that feature let us employ laboratory observables: $\nu \equiv \omega /m (= 2 \times 10^{-6}$ for optical lasers), $p_0 / m = \cosh \zeta$ the Lorentz factor of the $in$-electron, $\nu' \equiv \omega' /m$ for the normalized energy of the $out$-photon in direction $\Theta'$ such that $\Theta' = 0$ and $\Theta' = \pi$ mean on-axis forward scattering and on-axis backscattering, respectively. Adopting the notation in \cite{Harvey:2009ry} we recall the relation \begin{equation} \label{x_eq} x = \frac{(1 - \cos \Theta') \nu'}{e^\zeta -(1 - \cos \Theta') \nu'}. \end{equation} The admissible intervals for a harmonic $n$ are for head-on collisions $0 \le x \le y_n \equiv 2 n \nu e^\zeta / (1 + a_0^2)$, $n \nu \le \nu_n' \le n\nu /(1 + 2 \kappa_n e^{-\zeta}) $ for $2 \kappa_n \equiv 2 n \nu - e^{\zeta} + (1 + a_0^2) e^{-\zeta} < 0$ or $ n \nu /(1 + 2 \kappa_n e^{-\zeta}) \le \nu_n' \le n \nu $ for $\kappa_n > 0$, and $0 \le \Theta' \le \pi$. One has also to recall the well known n$\ell$C\, kinematic relation $\nu' (n, \Theta'; a_0, \nu, \zeta) = n \nu /\left[1 + \kappa_n e^{- \zeta} (1 - \cos \Theta') \right]$, e.g.\ in relating the $x$ and $\Theta'$ coordinates: a point at $x = \xi y_n$ corresponds to $(\pi - \Theta')^2 \approx 4 \frac{1-\xi}{\xi} (1 + a_0^2) e^{-2 \zeta}$, independent of the harmonic number. This highlights the preference of backscattering in the relativistic regime, since a significant fraction of events with $x \to y_n$ is seen at $\Theta' \to \pi$. These relations evidence that one has to reject events with too low values of $\nu'$ or select sufficiently high harmonics to realize the request $x \ge c$, see left panel of Fig.~\ref{Fig:nu_prime} for on-axis backscattering. The meaning of these curves is that the realization of $x \ge c$ requires in general $\nu' (n, \Theta'; a_0, \nu, \zeta) \ge \nu'(x, \Theta'; \zeta)$ either as a function of $n$ (left panel, for $\Theta' = \pi$) or as a function of $\Theta'$ (right panel, for selected harmonics), where (\ref{x_eq}) determines the $\nu$ independent function $\nu'(x,\Theta'; \zeta)$. These relations are exhibited also in the right panel of Fig.~\ref{Fig:nu_prime}, where the light-blue region depicts the range wherein $x \ge c = 1$ is fulfilled. In the preferred backward direction $\Theta' \to \pi$, the curves $\nu'(x,\Theta'; \zeta)$ (black dashed) are nearly horizontal, with the benefit that only an energy-resolved measurement is necessary to select the wanted range $x \ge c$ by imposing a veto for all events with $e^{2 \zeta} ( 1 - \cos(\pi - \Theta')) > 20$, for instance. At smaller angles $\Theta'$, i.e.\ going further to the right -- beyond the region displayed in the right panel of Fig.~\ref{Fig:nu_prime} -- the curves $\nu'(x,\Theta'; \zeta)$ bend up, which would require also an angular-resolved measurement. However, the contributions of the very high harmonics are exceedingly small in that phase space region and can be neglected. Altogether, a cross section measurement in backward direction and above the threshold value $e^{ \zeta} \nu' \ge 0.25$ facilitates the cut-off $c = 1$ for the LUXE kinematics. \begin{figure}[t] \includegraphics[width=0.55\columnwidth]{nu_prime_vs_n_a01_all.pdf} \includegraphics[width=0.44\columnwidth]{nu_prime_vs_cth_scaled.pdf} \vspace*{-15mm} \caption{(Color online) Left panel: The scaled $out$-photon energy $\nu'$ as a function of the harmonic number $n$ for three kinematic situations referring to the entrance channels at LUXE (left, in blue), ELI (middle, in green), and HZDR (right, in red). For $a_0 = 0.01$ (dashed), 1 (solid) and 2 (dotted) and on-axis backscattering. The curves connect smoothly the values of $\nu'$ at the discrete harmonic numbers $n$. Selecting the $out$-channel with $x \ge c$ means accepting only events in the light-blue region if $c = 1$ is chosen. Right panel: The scaled $out$-photon energy as a function of the angle $\Theta'$ for the harmonics $n = 7$, (black thin), 10 (blue dotted), 20 (red solid), 50 (green dashed) and 100 (black thin) (LUXE parameters). Note the relation $1 - \cos (\pi -\Theta') \approx\frac12 \vartheta'^2$ for backscattering, where $\vartheta' = \pi - \Theta'$ measures the angle of the $out$-photon relative to the $in$-electron direction. The seemingly horizontal dashed lines $e^{- \zeta} \nu' = \frac{x}{1+x} \frac{1}{1 - \cos \Theta'}$ are depicted for three values of the invariant quantity $x =0.1$, 1 and $\infty$, and the light-blue region is again for admissible events if $c = 1$ is chosen. The harmonic $n = 7$ does never enter the light-blue region. \label{Fig:nu_prime}} \end{figure} \subsection{Dead cone} \begin{figure}[tb] \includegraphics[width=0.48\columnwidth]{totCS_vs_scaled_cth.pdf} \includegraphics[width=0.45\columnwidth]{new_contour_nu_prime_woLabel.pdf} \vspace*{-3mm} \caption{(Color online) Left panel: Angular differential cross sections $m^2 d \sigma_n / d \cos \Theta' = \frac{\alpha^2 \pi}{a_0^2} \frac{m^2}{k \cdot p} \frac{e^\zeta}{n \nu (1 - \cos \Theta')^2} \frac{x^2}{(1+x)^2} F_n(z_n)$ with $x$ and $z_n$ to be viewed as functions of $\Theta'$ (cf.\ \cite{Harvey:2009ry}) for the harmonics $n = 1 \cdots 20$ (in steps of 1) and $20 \cdots 100$ (in steps of 10). The harmonics $n = 10$ (blue dotted), 20 (read solid) and 50 (green dashed) are depicted in color code and line style as in Fig.~\ref{Fig:nu_prime}-right; the other harmonics (black solid) are partially labeled. The black dashed curve -- to be continued by the harmonic $n = 8$ -- limits the admissible range (in light-blue) where $x \ge c = 1$ is fulfilled. Right panel: Angular differential cross sections $m^2 d \sigma_n / d \cos \Theta'$ (see color code on r.h.s.) over the scaled $\nu'$ - $\Theta'$ plane. Low-order harmonics are clearly separated for monochromatic lasers (but are smeared out for pulses, see below). The gray lines connect points of equal values (given by the numbers in the boxes) of $m^2 d \sigma_n / d \cos \Theta'$ on adjacent harmonics. Contributions smaller than $10^{-15}$ are not displayed. Both panels are for the LUXE kinematics with $\nu = 2 \times 10^{-6}$, $e^\zeta = 7 \times 10^4$ and $a_0 = 1$. \label{fig:6}} \end{figure} In addition to this purely kinematic relations one has to account for the dynamics, in particular the dead cone effect which is special for circularly polarized lasers according to (\ref{sigma}): Ignoring for the moment being the cut-off, the harmonics $n > 1$ are (multiply) peaked within the interval $0 < x < y_n$ and drop smoothly towards zero at the boundaries $x \to 0$ and $x \to y_n$. Transforming to the laboratory frame, the angular differential cross sections $d \sigma_n / d \cos \Theta'$ of selected harmonics $n > 1$ are peaked as exhibited in Fig.~\ref{fig:6}-left. Only the $n = 1$ harmonic remains non-zero for $\Theta' \to \pi$. The dropping of $d \sigma_n / d \cos \Theta' \vert_{n > 1}$ at the left side is the dead cone effect. The dropping at the right side refers to the suppression of forward scattering, i.e.\ at $\Theta' \to 0$. The black dashed curve connects the points of intersections of the curves $\nu' (n, \Theta'; a_0, \nu, \zeta)$ and $\nu' (x=1, \Theta'; \zeta)$, which can be read off in Fig.~\ref{Fig:nu_prime}-right for $n = 10$, 20, 50 and 100. For $n < 8$, there are no such intersections and, as a consequence, the harmonic $n = 8$ -- left-beyond the dashed curve -- limits the admissible region $x \ge c = 1$ which is highlighted in light-blue, as in Fig.~\ref{Fig:nu_prime}. As advertised above, the contributions of the high harmonics at $e^{2 \zeta} ( 1 - \cos(\pi - \Theta')) > 20$ are exceedingly small, thus substantiating our claim that imposing a frequency threshold is enough for a measurement of $\sigma(c = 1)$, at least for the here employed LUXE kinematics. This is evidenced in Fig.~\ref{fig:6}-right, where some proxy of a contour plot (gray lines) of the angular differential cross sections $m^2 d \sigma_n / d \cos \Theta'$ is exhibited over the scaled $\nu'$ - $\Theta'$ plane. [The harmonics $n$ have only support on the curves $\nu' (n, \Theta'; a_0, \nu, \zeta)$ (see Fig.~\ref{Fig:nu_prime}-right for several values of $n$), and the colored pixels encode the values of $m^2 d \sigma_n / d \cos \Theta'$. The gray lines connect points of equal strengths on adjacent harmonics, thus serving as contour lines despite the discrete occupancy in $\nu'$ direction.] The experimental challenge is therefore the precise setting of a frequency threshold to select $x \ge c$ events out of a large background. \subsection{Bandwidth effects and ponderomotive broadening}\label{bandwidth} \begin{figure}[tb!] \includegraphics[width=0.49\columnwidth]{totCS_a0m2.pdf} \includegraphics[width=0.49\columnwidth]{totCS_a0m1.pdf} \put(-395,140){$c = 1$} \put(-155,140){$c = 1$} \put(-395,130){$a_0 = 0.01$} \put(-155,130){$a_0 = 0.1$} \vspace*{-6mm} \caption{(Color online) Same as in Fig.~\ref{Fig:mpC} but for laser pulses with envelope shape $g(\phi) = 1/\cosh(\phi/N \pi)$. $N =1$ (red curves) represents ultra-short pulses and $N = 10$ (green curves marked by dots) is among currently available short pulses. Blue curves are as in Fig.~\ref{Fig:mpC} for the monochromatic case. For the cut-off value $c = 1$ and $a_0 = 0.01$ (left panel) and 0.1 (right panel). \label{Fig:mpC_FPA}} \end{figure} While (\ref{sigma}) is for monochromatic laser beams with the four-potential $\vec A(\phi) = g(\phi) \left[ \vec a_1 \cos \phi + \vec a_2 \sin \phi \right]$ of the e.m.\ field with invariant phase $\phi$ and obeying $g(\phi) = 1$, $\vec a_1 \vec a_2 = 0$, $\vec a_1{}^2 = \vec a_2{}^2$, one has to check whether laser pulses\footnote{ The Fourier-zero mode of the non-linear phase can not be longer absorbed in a redefinition of the electron momentum as quasi-momentum \cite{Narozhnyi:1996qf}, which is a key quantity in the monochromatic laser beam model (\ref{sigma}), but an expansion into harmonics is still possible for smooth, long pulses \cite{Narozhnyi:1996qf,Heinzl:2020ynb} (cf.\ \cite{SeiptDaniel:2012tua} for a discussion of these issues and a compendium of one- and two-photon emission off electrons in laser pulses).} are well approximated when focusing on total cross sections. In Fig.~\ref{Fig:mpC_FPA}, the cross section as a function of $\tilde s$ is exhibited, for $a_0 = 0.01$ and 0.1 as in Fig.~\ref{Fig:mpC}, however, for short and ultra-short pulses. The QED calculations are based on equations (40, 42) in \cite{Titov:2019kdk} (version v1) with $u \ge c$ to impose the cut-off. The pulse shape envelope is here especially $g(\phi) = 1 /\cosh (\phi / N \pi)$, where $N$ characterizes the number of oscillations of the field. This envelope $g(\phi)$ does have neither an extended flat-top section nor narrow ramping sections. The former property makes it quite different to a near-monochromatic beam with broad flat-top envelope and may be considered as representing a ``worst case" in that respect. The related bandwidth effects and longitudinal ponderomotive broadening are fully included in the QED calculation of one-photon emission in \cite{Titov:2019kdk}. For short pulses, these effects smoothen the step like shape of the total cross sections, as known from n$\ell$BW\, \cite{Nousch:2012xe}. In particular, for the ultra-short pulse with $N = 1$ (red curves), the combined strong bandwidth effect and ponderomotive broadening overwrite completely the multi-photon effects; the cross section is stark enhanced in the sub-threshold region. However, for sufficiently long pulses with $N \ge 10$, i.e.\ a pulse duration of $> 30$ fs for optical laser pulses, even without pronounced temporal flat-top profile, the essential dependencies of the cross section model with cut-off (\ref{sigma}) are recovered, see green curves marked by dots in Fig.~\ref{Fig:mpC_FPA} for $a_0 = 0.01$ and 0.1 and red curves marked by bullets in Fig.~\ref{Fig:3} for $a_0 = 1$. Since the normalization of cross sections in pulses is special (cf.\ \cite{Titov:2019kdk,Titov:2014usa}), let us focus on slopes at $a_0= 1$. As noted in the caption of Fig.~\ref{Fig:3}, the slope parameters $c_{fit}^c$ of the pulse model with $N = 10$ are about 25\% larger than the ones of the monochromatic model (\ref{sigma}). Despite these differences, the ratio is still $1 : 2$. Such a cut-off dependence can be experimentally tested in the analysis of a given data set after data taking, e.g.\ at a suitable value of $\chi$. (A comprehensive theoretical study of the $a_0 > 1$ dependence must be postponed because our present numerical implementation restricts us to $a_0 \le 1$.) Turning to details of differential observables, the model (\ref{sigma}) is in general a less useful guide. In fact, keeping the above pulse shape parameterization by $g(\phi) = 1/ \cosh(\phi/N \pi)$, the differential cross section $d \sigma / d \omega' \vert_{\Theta'}$, e.g.\ for $e^{2 \zeta} (1 - \cos(\pi - \Theta')) = 3$ (that is for $\Theta'$ at about the maximum of the angular differential cross section in Fig.~\ref{fig:6}-left), does hardly recover the harmonic structures which can be deduced from the right panels of Figs.~\ref{Fig:nu_prime} and \ref{fig:6}, even for longer pulses, see left panel in Fig.~\ref{fig:broadening}. Instead of clearly recognizable peaks at $\omega' = m \nu'(n, \Theta'; a_0, \nu, \zeta)$, the spectrum in Fig.~\ref{fig:broadening}-left displays some complexity which is further obscured by increasing gradually the parameter $N$. This feature is known since some time, cf.\ \cite{Narozhnyi:1996qf,Titov:2014usa,Seipt:2010ya} for instance. Bandwidth effects and ponderomotive broadening have been identified as responsible, together with interferences. To highlight the impact of the former ones it is instructive to cast the above n$\ell$C\, kinematic relation $\nu' (n, \Theta'; a_0, \nu, \zeta)$ in the form \begin{equation} \label{eq:broadening} 2 e^{- \zeta} \nu' = \frac{1}{1 + \frac{e^{-\zeta}}{2 n \nu \mu} (1 + a_0^2 (\phi)) + e^{2 \zeta} (1 - \cos(\pi - \Theta')) \frac{e^{- \zeta}}{4 n \nu \mu} \left[ 1 - \frac{2 n \nu \mu}{e^\zeta} - e^{-2 \zeta} (1 + a_0^2 (\phi)) \right] } , \end{equation} where $a_0 (\phi)$ puts emphasis on the longitudinal ponderomotive broadening by the variation of the intensity in the course of a pulse, $0 < a_0(\phi) \le a_0$, and $\mu \ne 1$ accounts for the bandwidth effects, i.e.\ there is a distribution of laser frequencies around the central frequency $\nu$. These effects are seen best in very backward kinematics, where $e^{2 \zeta} (1 - \cos(\pi - \Theta')) \to 0$: The support of harmonic $n$ is in the interval $\left( 1 + \frac{e^{-\zeta}}{2 n \nu \mu} (1 + a_0^2) \right)^{-1} \le 2 e^{- \zeta} \nu' \le \left( 1 + \frac{e^{-\zeta}}{2 n \nu \mu} \right)^{-1}$ and depends additionally on the frequency spread parameterized by $\mu$. The net effect is blowing up the curves $\nu'(n, \Theta')$ in the right panels of Figs.~\ref{Fig:nu_prime} and \ref{fig:6} to overlapping bands (not displayed), already either for $a_0 \ge 1$ or $0.5 < \mu < 2$ separately. Both effects, $a_0(\phi)$ and $\mu \ne 1$, can be separated only in certain asymptotic regions \cite{Titov:2014usa}. Besides rich sub-structures within the broadened and overlapping harmonic support regions, QED calculations for laser pulses exhibit complicated interference patterns over the $\omega'$-$\Theta'$ plane depending on the actual pulse envelope shape $g(\phi)$ and its parameters, see figure 1 in \cite{Seipt:2011dx} for an example. \begin{figure}[tb] \includegraphics[width=0.47\columnwidth]{FigCs_diff-eps-converted-to \quad \includegraphics[width=0.47\columnwidth]{FigCs_diff_AV-eps-converted-to \vspace*{-3mm} \caption{(Color online) Left panel: The differential spectrum $d \sigma / d \omega' \vert_{\Theta'}$ as a function of $\omega'$ at polar angle $\Theta'$ determined by $e^{2 \zeta} (1 - \cos (\pi - \Theta')) = 3$ for the $1/\cosh (\phi/ N \pi)$ pulse envelope with $N = 10$ (blue curve). The corresponding QED calculation is as in figure 5 of \cite{Titov:2014usa} but for the LUXE kinematic parameters used in Fig.~\ref{fig:6}. Red pluses mark the peak positions in the monochromatic model (\ref{sigma}). Right panel: The same as in the left panel but with locally averaged cross section (blue bullets) over the intervals $\omega' (\ell - 0.5) \cdots \omega'(\ell + 0.5)$ for the internal auxiliary variable $\ell = 1, 2, 3 \cdots$ (cf.\ equation (16) in \cite{Titov:2014usa}). The legends adopt the nomenclature in \cite{Titov:2014usa}: IPA stands for the monochromatic laser beam and FPA denotes the laser pulse model. \label{fig:broadening} } \end{figure} Nevertheless, the model (\ref{sigma}) can provide a useful guide for the gross shape of the locally averaged spectrum. Averaging the differential cross section, exhibited in Fig.~\ref{fig:broadening}-left by the blue curve, over the intervals $\omega' (\ell - 0.5,\Theta') \cdots \omega'(\ell + 0.5, \Theta')$ for $\ell = 1, 2, 3 \cdots$\footnote{\nopagebreak The continuous variable $\ell$ is an internal auxiliary quantity which replaces the harmonic number $n$ in the case of a pulse with smoothly varying envelope (cf.\ equations (16, 17) in \cite{Titov:2014usa}).} leads to the spectral shape displayed by blue bullets in the right panel of Fig.~\ref{fig:broadening}. Within a factor of two, both spectral shapes -- the one based on the monochromatic model (\ref{sigma}) and the one with $1 / \cosh$ pulse envelope -- agree over six orders of magnitude. The displacement of pair-wise related red crosses and blue bullets in the right panel of Fig.~\ref{fig:broadening} can be attributed to the frequency difference in (\ref{eq:broadening}) for $\nu' (a_0)$ and $\nu'(a_0=0)$ at the same value of $n$ when ignoring the bandwidth effect. If one wishes to recover the clear harmonic structures exhibited in Fig.~\ref{fig:6}-right, one has to employ suitable laser pulse shapes, e.g.\ with extended flat-top profiles (see figure 6 in \cite{Seipt:2010ya}) or frequency chirping \cite{Seipt:2014yga} etc. Nevertheless, we argue that these details, which shape the differential spectra, have a sub-leading impact on the phase space integrated cross section, and the prediction in Fig.~\ref{Fig:3} is essentially robust within the range uncovered by our pulsed QED calculations (red curves marked by bullets) and the model (\ref{sigma}) (red solid curves). In addition to such effects, there is transverse broadening w.r.t.\ to multiple photon emission: The incoming electron may suffer a (or many) transverse kick(s) due to soft-photon emission prior to hard-photon emission, thus not being longer subject of a head-on collision. Since for the above LUXE kinematics our focus is on the hard-photon tail, e.g.\ with $\omega' > \frac12 p_0$ for $c = 1$, we do not expect a significant impact of the leakage of low harmonics into this region and multiple photon emission and radiation reaction as well. For a proper quantitative account, the simulation tools developed in view of the recent experiments \cite{Poder:2018ifi,Cole:2017zca} should be employed in dedicated analyses and compared with analog QED calculations. \section{summary}\label{sect:7} In summary we point out that the non-linear Compton process obeys a field strength dependence $\propto {\cal P} \exp\{- a_{n\ell C} E_{crit} /E\}$, similar to the Schwinger process of ``vacuum break down", when imposing a suitable cut-off $c$ which suppresses the low harmonics. We focus on the slope coefficient $a_{n \ell C} =\frac23 c m /(p_0 + \sqrt{p_0^2 -m^2)}$ by a comparison with some approximation formula which displays a dependence $\propto \exp\{ - 2 c / 3 \chi \}$ already in the non-asymptotic region. Albeit the Compton process does not have such an obvious tunneling regime as the pair production processes, its formal similarity with the non-linear Breit-Wheeler process provides evidence \cite{Ritus,Dinu:2018efz} for selected {\sl differential} contributions with an exponential field dependence. The here introduced cut-off acts as a threshold and enforces a large gap between $in$- and $out$-Zel'dovich levels (which suffer some broadening in laser pulses) or, equivalently, a large light-cone momentum-transfer from the $in$-electron to the $out$-photon; it makes the otherwise hidden exponential contributions visible in the {\sl ``total"} cross section, which actually refers to a fraction of the $out$-phase space. This opens another avenue towards a measurement of the boiling point of the vacuum, complementary to plans of the LUXE collaboration by utilizing the non-linear Breit-Wheeler pair production \cite{Hartin:2018sha}. While fort the latter one a high-energy photon beam is vital, our approach requires either a moderately high-energy ($p_0$) electron beam and the selection of very high harmonics or a high-energy electron beam and the selection of moderately high harmonics. The experimental challenge is anyway the isolation of the high harmonics region characterized by the $out$-photon kinematics. The present considerations apply primarily to a plane-wave, monochromatic laser beam, i.e.\ a long flat-top pulse duration, with circular polarization. Selected examples of one-photon emission in laser pulses, based on Furry picture QED calculations of the cross section, support such a clear-cut approach. Nevertheless, necessary obvious extensions should take into account general laser polarizations as well as further bandwidth effects, ponderomotive broadening and multiple photon emissions in finite-duration pulses and their detailed temporal structures together with a larger range of the laser intensity parameter $a_0$. Planned follow-up work is devoted to energy- and angular-differential spectra and suitable realizations of the crucial cut-off implementation in non-perfect head-on collisions. {\bf Acknowledgments:} The authors gratefully acknowledge the collaboration with D. Seipt, T. Nousch, T. Heinzl, and useful discussions with A. Ilderton, K. Krajewska, M. Marklund, C. M\"uller, S.~Rykovanov, R. Sch\"utzhold and G. Torgrimsson. A. Ringwald is thanked for explanations w.r.t.\ LUXE. The work is supported by R.~Sauerbrey and T.~E.~Cowan w.r.t.\ the study of fundamental QED processes for HIBEF.
\section{Introduction} In the game of Sim, two players, P1 and P2, compete on a complete graph of six vertices ($K_6$). Each of the players has a colour, say red for P1 and blue for P2. The players alternate turns, starting with P1, claiming one of the previously uncoloured edges of the $K_6$ and colouring it in their colour. The first player to be forced to form a triangle of their own colour loses. The game of Sim was first introduced by Simmons in 1969 \cite{Simmons}, and has since then attracted a lot of attention. A technical report by Slany \cite{Slany} provides detailed information about Sim and other Ramsey games, as well as further references to literature on Sim. For more information on this and other mis\`ere-type games, see \cite{Leader}. It is well known that any two edge-colouring of $K_6$ must contain a monochromatic triangle (as the Ramsey number R(3,3) equals 6). Thus, it is impossible for the game of Sim to end in a tie. Consequently, one of the two players must possesses a winning strategy, ie. a strategy that enables the player to win no matter what moves their opponent makes. Computer searches have shown that it is the second player who possesses a winning strategy for the game of Sim \cite{Simmons}. Mead, Rosa and Huang \cite{Mead} have provided an explicit winning strategy, remarking however that `a simpler (in terms of the rules to be followed) winning strategy is still desirable'. In this paper, we present a different, rather simpler, winning strategy for the game of Sim. \section{Some Definitions} Before describing the strategy, we need to introduce some terminology. Firstly, by a position of a game after $k$ moves, we mean a subgraph of $K_6$ with $k$ coloured edges, each either red or blue. Given a position, we can partition the edges of $K_6$ as $E(K_6) = R \cup B \cup N,$ where $R$ is the set of red edges (edges that have already been claimed by P1), $B$ is the set of blue edges (edges that have already been claimed by P2) and $N$ is the set of all uncoloured edges. By a \textit{P1-allowed move} we mean an uncoloured edge such that colouring it red would not complete a monochromatic triangle. That is, any move that does not lead to an immediate loss for P1 is a P1-allowed move. A \textit{P2-allowed move} is defined analogously. Moreover, we will say that a set X of uncoloured edges is a \textit{P1-allowed set} if $X \cup R$ does not contain any triangles. Again, we define a \textit{P2-allowed set} in the analogous way. Given a position P, We define a \textit{mini-board} of P to be a complete subgraph of the $K_6$ such that: \begin{enumerate}[label=(\roman*), nosep] \item M contains all the coloured edges and at least one P2-allowed move \item M is minimal with respect to the above condition, that is, no proper subgraph $K \subset M$ satisfies (i). \end{enumerate} Clearly, a mini-board exists whenever the position has at least one P2-allowed move. Note that the mini-board, whenever it exists, is unique up to isomorphism. \begin{figure}[H] \center \label{fig2} \includegraphics[width = 0.8\textwidth]{fig2_2} \caption{Example of a position together with the two (isomorphic) mini-boards. The black edges are representing uncoloured edges. Note that the subgraph spanned by the vertices $\{1,2,3,4\}$ is \textit{not} a mini-board, as the edge $13$ is not a P2-allowed move.} \end{figure} Finally, given a mini-board M, we will say that a set of edges $X \subset E(K_6)$ is a \textit{P1-allowed set on M} if $X \subset E(M)$ and it is a P1-allowed set. By a \textit{maximum P1-allowed set on M} we will mean a P1-allowed set on M of maximum size among all the P1-allowed sets on M. As always, we define \textit{P2-allowed set on M} and \textit{maximum P2-allowed set on M} in a similar way. \begin{figure}[H] \center \label{fig1} \includegraphics[width = 0.8\textwidth]{fig1_2} \caption{For the above position (to the left) and the mini-board M (to the right), we have that the set $\{35, 45 \}$ is a P2-allowed set, but not a P1-allowed set. One can check that there is precisely one maximum P2-allowed set on M, namely $\{15, 35, 45\}$}. \todo{Fix this caption} \end{figure} \section{The strategy} We are now ready to define the winning strategy for P2: \\ Whenever it is P2's turn, they should fix an arbitrary mini-board M of the current position. They should then pick a move according to the following rules: \begin{enumerate} \item Consider only P2-allowed moves on M. \item Pick the move(s) belonging the the greatest number of maximum P2-allowed sets on M. \item Pick the move(s) belonging the the greatest number of maximum P1-allowed sets on M. \end{enumerate} The rules should be interpreted in a hierarchical order as follows: P2 should start by applying Rule 1. If this does not determine their move uniquely, then Rule 2 should be applied as a `tie-breaker' to distinguish between the moves satisfying Rule 1. If this still does not determine their move, then Rule 3 should be applied as a further tie-breaker. If the move is still not determined uniquely, then P2 may pick arbitrarily among the moves which are left after applying all three rules. This strategy does not necessarily determine the move uniquely up to isomorphism. However, if there is more than one move left after applying all the rules, then any of the remaining moves will lead to a win for P2. An exhaustive computer search shows that this strategy is indeed winning for P2. \section{Acknowledgements} Many thanks go to Professor Imre Leader, my research supervisor, for his valuable support. I was provided financial support by the SRIM bursary grant from University of Cambridge, for which I am also grateful. \bibliographystyle{acm}
\section{Acknowledgments} We thank Xi Kong for the helpful discussion. \textbf{Funding:} This work was supported by the National Key R$\&$D Program of China (Grants Nos. 2018YFA0306600, 2016YFB0501603 and 2017YFA0305000), the NNSFC (Nos. 11761131011 and 11775209), the Chinese Academy of Sciences (Grants Nos. GJJSTD20170001, QYZDY-SSW-SLH004 and QYZDB-SSW-SLH005), and Anhui Initiative in Quantum Information Technologies (Grant No. AHY050000). X.R. and F.S. thank the Youth Innovation Promotion Association of Chinese Academy of Sciences for the support. Q.D.J. acknowledges support from the European Research Council (Grant No. 742104) and Swedish Research Council (Contract No. 335-2014-7424).
\section{Introduction} With the rapid development of the Internet of Things (IoT) applications, timely status updates have become increasingly critical in many areas, such as telesurgery and self-driving cars \cite{b1}. However, the conventional performance metrics, e.g., throughput and delay, cannot properly characterize the timeliness of the status updates \cite{b2}. For example, throughput can be maximized by generating and transmitting the status updates as frequent as possible. However, excessive update rates may lead to network congestion, which makes the updates suffer from long transmission delay. Such long delay can be reduced by lowing the update rate. However, reducing the rate of updates overmuch can also make the monitor receive undesired outdated status updates. Motivated by this, age of information (AoI), defined as the time elapsed since the generation of the latest received status update, has been recently introduced to quantify the information freshness from the perspective of the receiver that monitors a remote process \cite{b3}. Unlike conventional metrics, AoI is related to both the transmission delay and the update generation rate \cite{b4}. As a result, AoI is a more comprehensive evaluation criterion for information freshness. Since the AoI concept was first proposed to characterize the information freshness in a vehicular status update system \cite{b5}, extensive work focusing on the analysis and optimization of AoI has appeared. Most of the existing work is concerned with the AoI of single-hop wireless networks \cite{b6,b7, b8, b9, b10, b11, b12, b13}. On the other hand, the AoI performance in multi-hop networks has also been studied in \cite{b14, b15, b16, b17}. However, all the above work overlooked the direct link between the source and the destination. Therefore, the updates from the source can only be transmitted to the destination via the relay. As far as we know, there is no existing work that designs and optimizes the average AoI of a cooperative status update system with the existence of a direct link. Such a design is indeed non-trivial. This is because delivering the status updates via the direct link will have shorter transmission time at the cost of a higher error probability, while the delivery of status updates through the two-hop relay link could be more reliable at the cost of longer transmission time. Motivated by this gap, in this paper we consider a three-node cooperative status update system, where a source timely reports randomly generated status updates to its destination with the help of a relay. We concentrate on designing and analyzing an age-oriented opportunistic relaying (AoR) protocol to reduce the AoI of the considered system. By carefully observing the AoI evolution process, we first define some necessary time intervals to mathematically express the average AoI of the proposed protocol. By representing these time-interval definitions in terms of key system parameters, including the generation probability of the status updates and the transmission success probabilities of three links, we then attain a closed-form expression of the average AoI for the proposed AoR protocol. Given reasonable values of the transmission success probabilities, we further minimize the average AoI by optimizing the status generation probability at the source. Simulation results are then provided to validate the theoretical analysis. Furthermore, the simulation results demonstrate that the average AoI of the proposed AoR protocol is smaller than that of the non-cooperative system, especially when the source-destination link has bad channel conditions. \section{System Model and Protocol Description} We consider a three-node cooperative status update system, in which the source (S) wants to send randomly generated status updates to a designated destination (D) as timely as possible with the help of a relay (R). There is a direct link between S and D. The transmission of the status updates can either go through the direct link or the S-R-D link. To quantify the timeliness of the status updates, we adopt a recently proposed metric, termed AoI, which is defined as the time elapsed since the generation of the last successfully received status update. It is assumed that the considered system is time slotted and the transmission of each status update by S/R takes exactly one time slot, whose length is normalized to one without loss of generality. All the channels suffer from block fading, i.e., the channels responses remain unchanged within one time slot but vary independently from one time slot to another. \subsection{Protocol Description} We now propose an AoR protocol for the considered system. S transmits a newly generated status update to D. If the status update is successfully received by D, then an acknowledgement (ACK) packet is sent back to S to discard the status update at the end of the current time slot. Otherwise, either S or R retransmits the status update to reduce the average AoI. Specifically, if R successfully receives the status update, then R feeds back an ACK to inform S to discard the status update, and transmits the status update to D by itself in the following time slot(s). Note that the channel gain of the R-D link is generally better than that of the S-D link. Retransmitting the same status update packets by R instead of S can reduce the AoI. If R fails to receive the status update, then S keeps retransmitting until either D or R succeeds in receiving the said status update. To ensure that fresh status updates can be transmitted timely, we enforce S to preempt the retransmissions from R in case of a new status update arrival. Hence, if R has a status update to retransmit, it first senses the state of S at the beginning of one time slot. If S with a new status update transmits, then R discards its current status packet and attempts to decode the new one sent by S. Otherwise, R keeps retransmitting the update until the successful reception at D or the preemption by S. For simplicity, we assume that both the time for sensing and transmitting an ACK packet are negligible. It is worth mentioning that in the conventional cooperation protocols that are designed mainly from a physical layer perspective, normally allocate dedicated channel resources for R to facilitate the cooperation \cite{b18}. However, if the transmission success probability of the S-D link is large, it is apparent that transmitting more status updates through the S-D link reduces the AoI. Therefore, conventional cooperation protocols become sub-optimal from the perspective of minimizing the AoI. We note that a novel cooperation protocol, where R utilizes the silence periods of S terminals to enable cooperation, was proposed in \cite{b19} to improve the cooperative system performance. However, the design in \cite{b19} focused on the throughout maximization rather than AoI minimization. As far as we know, the AoR protocol is the first effort towards the design and analysis for the considered system from the perspective of AoI. \begin{figure}[tbp] \centerline{\includegraphics[height=5.8cm]{"AoI_2"}} \vspace{-0.7 em} \caption{Sample staircase path of the AoI evolution. We use $S\!\rightarrow\! D$, $S\!\rightarrow\! R$, $R\!\rightarrow\! D$ and Failure to denote the successful transmission through the S-D link, the successful transmission through the S-R link, the successful transmission through the R-D link and the failed transmission, respectively.} \vspace{-1.2 em} \label{fig:two-hoop-relay-model-1} \end{figure} \subsection{AoI Definition} We follow \cite{b6}, \cite{b8} and adopt a Bernoulli process to model the stochastic arrivals at S. Particularly, a new status update is generated with probability $p$ at the beginning of each time slot. We denote $t_i$ as the generation time of the $i$th update at S. Taking into account channel fading, we define by $P_{1}$, $P_{2}$, and $P_{3}$ to denote the transmission success probabilities through the S-D link, S-R link and R-D link, respectively. Due to the transmission error and the aforementioned preemption, the status updates generated at S may not always be successfully received by D. Hence, we further denote $t'_{k}$ as the arrival time of the $k$th status update successfully received by D. We denote $U(t)$ as the generation time of the most recently received status update at D until time slot $t$. The AoI at time slot $t$ can then be defined as \vspace{-0.1cm} \begin{equation} \Delta(t) = t - U(t). \vspace{-0.1cm} \end{equation} For the ease of understanding the AoI evolution, we illustrate an example staircase path for 10 consecutive time slots with an initial value of one in Fig. 1. Note that we also define some time intervals in Fig. 1 to facilitate the calculation of the AoI, which will be explained one by one in the following. We denote by $N_{k}$ the index of the most recently generated update at S before $t'_{k}$, i.e., \begin{equation} N_{k}=\max\{i\!\mid\!t_{i} < t'_{k}\}, \end{equation} and denote by $N'_{k}$ the index of the first generated update at S since the last successfully received update at D, i.e., \begin{equation} N'_{k}=\min\{i\!\mid\!t_{i} > t'_{k-1}\}. \end{equation} We further define $S_{k}$ as the service time of the $k$th successfully received update at D, given by \begin{equation} S_{k} = t'_{k} - t_{N_{k}}. \end{equation} In addition, $W_{k}$ is defined as the waiting time starting from the arrival of the $(k-1)$th successfully received update at D until the generation of the first status update at S after $t'_{k-1}$, which is given by \begin{equation} W_{k}=t_{N'_{k}}-t'_{k-1}. \end{equation} We define $T_{k}$ as the time duration between the generation time of the first status update after $t'_{k-1}$ and the arrival time of the $k$th successfully received update at D, which is given by \begin{equation} T_{k}=t'_{k}-t_{N'_{k}}, \end{equation} and $Z_{k}$ is defined as interdeparture time between two consecutive successfully received status updates at D, given by \begin{equation} Z_{k}=t'_{k}-t'_{k-1}. \end{equation} In the following section, we shall analyze the average AoI of the proposed AoR protocol for the considered cooperative status update system. \section{Analysis and Optimization of Average AoI} In this section, we first express the average AoI by the defined time intervals given in Section II. By representing these time-interval definitions in terms of key system parameters, (i.e., $p$, $P_{1}$, $P_{2}$ and $P_{3}$), we then manage to attain a closed-form expression of the average AoI for the proposed AoR protocol. Given reasonable value sets of $P_{1}$, $P_{2}$ and $P_{3}$, we further minimize the average AoI by optimizing the status generation probability $p$. \subsection{Analysis of Average AoI} \vspace{-0.04cm} We define $X_{t}$ as the number of successfully received updates at D till time $t$ and it can be expressed as \vspace{-0.075cm} \begin{equation} X_{t} = \max\{k\!\mid\!t'_{k} <t\}. \vspace{-0.075cm} \end{equation} \noindent As depicted in Fig. 1, the average AoI can be expressed by the area under the AoI curve, i.e., $Q_{k}$, and mathematically we have \vspace{-0.02cm} \begin{equation} \bar{\Delta}=\lim\limits_{t \to \infty }{\frac{X_{t}}{t}\frac{1}{X_{t}}\sum_{k=1}^{X_{t}}Q_{k}}=\frac{\mathbb{E}[Q_{k}]}{\mathbb{E}[Z_{k}]}. \end{equation} \vspace{-0.31cm} \noindent For further simplification, we represent $Q_{k}$ in terms of the time intervals defined in Section II and it can be expressed as \vspace{-0.13cm} \begin{equation} \begin{aligned} Q_{k} &=S_{k-1}+(S_{k-1}+1)+\cdots+(S_{k-1}+Z_{k}-1)\\ &= S_{k-1}Z_{k}+\frac{Z_{k}^2-Z_{k}}{2}. \end{aligned} \vspace{-0.09cm} \end{equation} \noindent By substituting (10) into (9), we can express the average AoI as \vspace{-0.05cm} \begin{equation} \bar{\Delta}=\frac{\mathbb{E}[S_{k-1}Z_{k}]}{\mathbb{E}[Z_{k}]}+\frac{\mathbb{E}\Big[Z_{k}^2\Big]}{2\mathbb{E}[Z_{k}]}-\frac{1}{2}. \vspace{-0.05cm} \end{equation} In order to further simplify (11), we have the following lemma. \textit{\underline{Lemma} 1:} The service time of the $(k-1)$th successfully received update at D is independent of the interdeparture time between the $(k-1)$th and the $k$th successfully received updates at D such that: \vspace{-0.1cm} \begin{equation} \mathbb{E}[S_{k-1}Z_{k}]=\mathbb{E}[S_{k-1}]\mathbb{E}[Z_{k}]. \end{equation} \vspace{-0.13cm} The lemma can be proved by following a similar process as that for \cite[Lemma 1]{b6} By applying Lemma 1, the expression of the average AoI can be simplified as \vspace{-0.22cm} \begin{equation} \bar{\Delta}=\mathbb{E}[S_{k-1}]+\frac{\mathbb{E}\Big[Z_{k}^2\Big]}{2\mathbb{E}[Z_{k}]}-\frac{1}{2}. \end{equation} \vspace{-0.1cm} To obtain the average AoI, we now derive the terms $\mathbb{E}[S_{k-1}]$, $\mathbb{E}[Z_{k}]$ and $\mathbb{E}[Z_{k}^2]$ one by one in the following. We start with the expectation of the service time, i.e., $\mathbb{E}[S_{k-1}]$. In the considered system, there are two types of status updates that can be successfully received by D without being preempted. One are these packets that are successfully received by D through the direct link, and the other are these packets that are successfully delivered through the two-hop S-R-D link. Therefore, $\mathbb{E}[S_{k-1}]$ can be expressed as a weighted sum of the average service time of each type. For the first type of successful updates, the probability that the update is successfully received after $l$ times of transmission by S can be expressed as \vspace{-0.12cm} \begin{equation} P_{l} = (1-p)^{l-1}(1-P_{2})^{l-1}(1-P_{1})^{l-1}P_{1}. \vspace{-0.15cm} \end{equation} The corresponding expectation of the service time can be calculated by \begin{equation} \mathbb{E}_{l}=\frac{\sum_{l=1}^{\infty}P_{l}\cdot l}{\sum_{l=1}^{\infty}P_{l}}. \end{equation} Similarly, for the second type of successful status update, the expectation of its service time can be expressed by \begin{equation} \mathbb{E}_{mn}=\frac{\sum_{n=1}^{\infty}\sum_{m=1}^{\infty}P_{mn}\cdot(m+n)}{\sum_{n=1}^{\infty}\sum_{m=1}^{\infty}P_{mn}}, \end{equation} \noindent where $m$ and $n$ denote the number of transmission times via the S-R link and the R-D link, respectively. $P_{mn}$ is the probability that the update is successfully received by D after transmitting $(m+n)$ times, which can be expressed as \begin{equation} \resizebox{.98\hsize}{!}{$P_{mn} \!=\! (1-p)^{m-1}(1-P_{2})^{m-1}(1-P_{1})^{m}P_{2}(1-p)^{n}(1-P_{3})^{n-1}P_{3}$}. \end{equation} Since the above two types of updates make up all the updates that can be successfully received by D, the expectation of the service time of the considered system can be evaluated as \begin{equation} \resizebox{.8\hsize}{!}{$\begin{aligned} \mathbb{E}[S_{k-1}]=&\ \mathbb{E}_{l}\cdot\frac{\sum_{l=1}^{\infty}P_{l}}{\sum_{l=1}^{\infty}P_{l}+\sum_{n=1}^{\infty}\!\sum_{m=1}^{\infty}\!P_{mn}}\\ &\,+ \mathbb{E}_{mn}\cdot\frac{\sum_{n=1}^{\infty}\!\sum_{m=1}^{\infty}\!P_{mn}}{\sum_{l=1}^{\infty}P_{l}+\sum_{n=1}^{\infty}\!\sum_{m=1}^{\infty}\!P_{mn}}, \end{aligned} $} \end{equation} \noindent which follows according to the law of total probability. By applying the finite sum equations given in \cite[Eqs. (0.112) and (0.113)]{b20}, we can further simplify (18) to \begin{equation} \mathbb{E}[S_{k-1}]=\frac{1}{1-\beta}+\frac{1}{1-\alpha}\cdot\frac{\gamma}{P_{1}(1-\alpha)+\gamma}, \end{equation} where $\alpha=(1-p)(1-P_{3})$, $\beta=(1-p)(1-P_{1})(1-P_{2})$ and $\gamma=P_{2}P_{3}(1-p)(1-P_{1})$. Based on (5), (6) and (7), we have $Z_{k}=W_{k}+T_{k}$. Therefore, the expectation of the interdeparture time can be written as $\mathbb{E}[Z_{k}]=\mathbb{E}[W_{k}]+\mathbb{E}[T_{k}]$. Recall that S can preempt the transmission of R when there is a new arrival. This indicates that the waiting time $W_{k}$ only depends on the generation probability $p$. Since the status updates are generated according to a Bernoulli process, $W_{k}$ follows a geometric distribution with parameter $p$ and its expectation can be readily given by $\mathbb{E}[W_{k}]=(1-p)/p$. We then move to the calculation of term $\mathbb{E}[T_{k}]$. Note that $T_{k}$ behaves differently for the following four possible cases: 1) The update is successfully received by D through the S-D link without being preempted; 2) The update is successfully received by D through the S-R-D link without being preempted; 3) The update is preempted by a new update before being successfully received by either R or D, and the new update may be preempted by multiple new updates; 4) The update is preempted by a new update generated at S after being successfully received by R, and the new update may be preempted by multiple new updates at S. We note that the number of preemptions can approach infinity in the third and fourth cases, which generally makes the expectation of $T_{k}$ difficult to derive mathematically. To tackle this issue, we resort to the recursive method applied in \cite{b6},\cite{b21} and evaluate the expectation of $T_{k}$ as (20) at the top of the next page. \begin{figure*} \begin{equation} \resizebox{.79\hsize}{!}{$\begin{aligned} \mathbb{E}[T_{k}]=&\ \sum_{l=1}^{\infty}P_{l}\cdot l + \sum_{n=1}^{\infty}\sum_{m=1}^{\infty}P_{mn}\cdot (m+n) + \sum_{l=1}^{\infty}(1-P_{1})^{l}(1-P_{2})^{l}(1-p)^{l-1}p\cdot \big(l+\mathbb{E}\big[T'_{k}\big]\big)\\ &\,+\sum_{m=1}^{\infty}\sum_{n=0}^{\infty}\Big[(1-P_{1})^{m}(1-P_{2})^{m-1}P_{2}(1-p)^{m-1} \times(1-p)^{n}(1-P_{3})^{n}p\cdot \big(m+n+\mathbb{E}\big[T'_{k}\big]\big)\!\Big]\\ \end{aligned}$} \end{equation} \noindent\rule[0.05\baselineskip]{\textwidth}{0.5pt} \vspace{-1cm} \end{figure*} Note that the four terms on the right hand side of (20) correspond to the above four cases, respectively, and $T'_{k}$ is the time duration between the preemption time (i.e., the generation time of the second status update after $t'_{k-1}$) and the arrival time of the $k$th successfully received update at D. As $T_{k}$ is defined as the time duration between the generation time of the first status update after $t'_{k-1}$ and the arrival time of the $k$th successfully received update at D, following the idea of recursion, we have $\mathbb{E}[T_{k}]=\mathbb{E}\big[T'_{k}\big]$. After some manipulations by applying \cite[Eqs. (0.112) and (0.113)]{b20}, we have \vspace{-0.2cm} \begin{equation} \mathbb{E}[T_{k}]=\frac{(1-\alpha)+\beta\cdot P'_{2}}{P_{1}(1-\alpha)+\gamma}, \vspace{-0.1cm} \end{equation} where $P'_{2} = P_{2}/(1-P_{2})$. By combining $\mathbb{E}[W_{k}]=(1-p)/p$ and (21), we now attain a closed-form expression for the term $\mathbb{E}[Z_{k}]$, given by \vspace{-0.1cm} \begin{equation} \begin{aligned} \mathbb{E}[Z_{k}]=\mathbb{E}[W_{k}]+\mathbb{E}[T_{k}]=\frac{(1-\alpha)(1-\beta)}{p\big[P_{1}(1-\alpha)+\gamma\big]}. \end{aligned} \vspace{-0.1cm} \end{equation} Finally, we work on the expectation of $Z_{k}^{2}$, which can be expressed as \vspace{-0.05cm} \begin{equation} \begin{aligned} \mathbb{E}\Big[Z_{k}^{2}\Big]=\mathbb{E}\Big[(W_{k}+T_{k})^2\Big]=\mathbb{E}\Big[W_{k}^{2}\Big]+2\mathbb{E}[W_{k} T_{k}]+\mathbb{E}\Big[T_{k}^{2}\Big]. \end{aligned} \end{equation} It is readily to find that $W_{k}$ and $T_{k}$ are independent. Thus, we have $\mathbb{E}[W_{k}T_{k}]=\mathbb{E}[W_{k}]\mathbb{E}[T_{k}]$. As $W_{k}$ follows a geometric distribution with parameter $p$, we have $\mathbb{E}[W_{k}^2]=(p^2-3p+2)/p^2$. In order to evaluate $\mathbb{E}[Z_{k}^2]$, the only remaining task is to calculate $\mathbb{E}[T_{k}^2]$. Similar to (20), the expectation of $T_{k}^2$ can be evaluated as (24) at the top of the next page. \begin{figure*} \begin{equation} \resizebox{.9\hsize}{!}{$\begin{aligned} \mathbb{E}\Big[T_{k}^{2}\Big]\!=\!\!&\ \sum_{l=1}^{\infty}P_{l}\!\cdot\! l^2 \!+\! \sum_{n=1}^{\infty}\!\sum_{m=1}^{\infty}\!P_{mn}\!\cdot\! (m^2\!+\!2mn\!+\!n^2) \!+\!\sum_{l=1}^{\infty}\!\bigg[\!(1\!-\!P_{1})^{l}(1\!-\!P_{2})^{l}(1\!-\!p)^{l-1}p \!\cdot\!\Big(l^2\!+\!2l\mathbb{E}\big[T_{k}\big]\!+\!\mathbb{E}\Big[T_{k}^{2}\Big]\Big)\!\bigg]\\ &\,\!+\! \sum_{m=1}^{\infty}\!\sum_{n=0}^{\infty}\!\bigg[\!(1\!-\!P_{1})^{m}(1\!-\!P_{2})^{m-1}P_{2}(1\!-\!p)^{m-1} (1\!-\!p)^{n}(1\!-\!P_{3})^{n}p \!\cdot\! \Big(\!m^2\!+\!n^2\!+\!\mathbb{E}\Big[T_{k}^{2}\Big]\! +\!2mn\!+\!2m\mathbb{E}[T_{k}]\!+\!2n\mathbb{E}[T_{k}]\!\Big)\!\bigg] \end{aligned}$} \end{equation} \noindent\rule[0\baselineskip]{\textwidth}{0.5pt} \vspace{-0.95cm} \end{figure*} Similar to the process of obtaining (21) from (20), we can rewrite $\mathbb{E}[T_{k}^2]$ as \vspace{-0.15cm} \begin{equation} \resizebox{.95\hsize}{!}{$\begin{aligned} \mathbb{E}\Big[T_{k}^2\Big]\!= &\,\frac{1}{(1-\alpha)(1-\beta)-(1-\alpha)\beta\cdot p'-\beta\cdot p'\cdot P'_{2}}\\ &\times\!\frac{1}{(1-\alpha)(1-\beta)}\\ &\times\!\bigg\{(1-\alpha)^2(1+\beta)+(3-\alpha-\beta-\alpha\beta)\beta\cdot P'_{2}\\ &\qquad\!\!+2\mathbb{E}[T_{K}]\!\cdot\!\Big[(1\!-\!\alpha)^2\beta\!\cdot \!p'\!+\!(1\!-\!\alpha\beta)\beta\!\cdot\! p'\!\cdot\! P'_{2} \Big]\bigg\}, \end{aligned}$} \end{equation} where $p'=p/(1-p)$. By substituting the terms derived in (19), (22), (23) and (25) into (13), we can obtain the exact closed-form expression of the average AoI for the proposed AoR protocol, given by \vspace{-0.1cm} \begin{equation} \bar{\Delta}\!=\!\frac{\big[1\!-\!(1\!-\!p)(1\!-\!P_{3})\big]\!\cdot\! \big[1\!-\!(1\!-\!p)(1\!-\!P_{1})(1\!-\!P_{2})\big]}{p\!\cdot\!\big[pP_{1}\!+\!(1\!-\!p)P_{3}\!-\!(1\!-\!p)(1\!-\!P_{1})(1\!-\!P_{2})P_{3}\big]}. \end{equation} \subsection{Optimization of Average AoI} In this subsection, given reasonable value sets of $P_{1}$, $P_{2}$ and $P_{3}$, we will minimize the average AoI by optimizing the generation probability $p$ at S. By assuming that $0<P_{1}<P_{2}<1$ and $0<P_{1}<P_{3}<1$, the optimal generation probability $p$ that minimizes the average AoI is presented in the following theorem. \textit{\underline{Theorem} 1:} The optimal generation probability that minimizes the average AoI is given by: \begin{equation} p=\left\{ \begin{aligned} &\frac{-\!\psi\!+\!\sqrt{\psi^2\!-\!4\chi \omega}}{2\chi},\\ &\quad \mathrm{if} \ 0<P_{1}<\frac{P_{2}\!+\!P_{2}P_{3}\!-\!\sqrt{(P_{2}\!-\!P_{2}P_{3})^2\!+\!4P_{2}P_{3}}}{2(P_{2}\!-\!1)},\\ &1, \\ &\quad \mathrm{if} \ \frac{P_{2}\!+\!P_{2}P_{3}\!-\!\sqrt{(P_{2}\!-\!P_{2}P_{3})^2\!+\!4P_{2}P_{3}}}{2(P_{2}\!-\!1)}<P_{1}<1, \end{aligned} \right. \end{equation} \noindent where $\chi\!=\!P_{2}P_{3}(1\!-\!P_{2}P_{3})\!-\!P_{1}^2(1\!-\!P_{2})(1\!-\!P_{3})^2\!-\!P_{1}P_{2}P_{3}^2(1\!-\!P_{2})(2\!-\!P_{1})\!-\!P_{1}P_{2}(1\!-\!P_{3})$, $\psi\!=\!-2P_{3}(P_{1}\!+\!P_{2}\!-\!P_{1}P_{2})(P_{1}\!-\!P_{1}P_{3}\!-\!P_{2}P_{3}\!+\!P_{1}P_{2}P_{3})$ and $\psi^2\!-\!4\chi \omega\!=\!4P_{2}P_{3}^2(P_{3}\!-\!P_{1})(1\!-\!P_{1})(P_{1}\!+\!P_{2}\!-\!P_{1}P_{2})^2$. Proof: See Appendix A. \textit{\underline{Remark} 1:} For the second case in Theorem 1, the average AoI is minimized by setting $p=1$ and it is given by \begin{equation} \bar\Delta_{min}=\frac{1}{P_{1}}. \end{equation} Note that in the considered system, the minimum possible time required for a successful status update through the S-D link is one time slot, while that through the S-R-D link is at least two time slots. Therefore, when the transmission success probability of the S-D link (i.e., $P_{1}$) is relatively large, having more status updates successfully delivered through the S-D link is beneficial to reduce the average AoI. If the generation probability of the updates is 1, S always has a new status update to transmit (i.e., the generate-at-will model \cite{b22}), which means that the updates successfully received by R in the previous time slot is always preempted. As a result, all the successfully received status updates by D can only come from the S-D link, which will minimize the average AoI. On the other hand, for the first case in Theorem 1, the transmission success probability of the S-D link is relatively small compared to the second case. Hence, the updates successfully delivered through the S-R-D link also have a significant contribution on minimizing the average AoI. As mentioned above, if the generation probability is 1, the updates can only be successfully delivered to D through the S-D link. Obviously, this is not optimal for minimizing the average AoI in this case, which means that $p=1$ should not be the optimal status generation probability to minimize the average AoI. \section{Simulation Results and Discussions} In this section, we present simulation results to validate our analytical results, and demonstrate the superiority of the considered cooperative status update system over its non-cooperative counterpart in terms of achieving lower average AoI. For the non-cooperative status update system, we plot its average AoI curves according to the result given in \cite[Eqs. (35)]{b6}. Each curve presented in the section is averaged over $10^7$ time slots. We first study the average AoI of both cooperative and non-cooperative systems against the the transmission success probability of the S-D link (i.e., $P_{1}$), as shown in Fig. 2, for two different generation probabilities of the status updates. In both cases, we assume that the transmission success probabilities of the S-R link and the R-D link are $P_{2}\!\!=\!\!P_{3}\!\!=\!\!0.8$. It can be observed that in both cases, the performance of the considered cooperative status update system is obviously superior to that of the non-cooperative system, especially when $P_{1}$ is small. Specifically, when $p\!=\!0.5$ (or $p\!=\!0.9$), the considered cooperative system has a significant performance improvements over the non-cooperative system for the case $P_{1}\!<\!0.5$ (or $P_{1}\!<\!0.3$), respectively. This is because when the S-D link has bad channel conditions, the generated updates at S can be transmitted to D via R in our system while those in the non-cooperative system can only be retransmitted via the direct link. However, we can also observe that the AoI performance gain decreases as $P_{1}$ increases, and approaches 1 when $P_1$ is close to 0.8 (i.e., equal to $P_{2}$ and $P_{3}$). The rationality behind this is that when $P_{1}$ is large, most of the successfully received updates at D are transmitted via the S-D link. Therefore, R is not much helpful in reducing the average AoI. We also note that when $P_{1}$ is less than 0.27, a lower generation probability, i.e., $p\!=\!0.5$, results in a better AoI performance. On the contrary, the AoI performance of a higher generation probability, i.e., $p\!=\!0.9$, is always better when $P_{1}$ is greater than 0.27. Motivated by this interesting observation, we explore the relationship between the generation probability and the average AoI in the following. We now investigate the average AoI against the generation probability $p$ by fixing the transmission success probabilities of the S-R link and the R-D link as $P_{2}\!=\!P_{3}\!=\!0.8$. As depicted in Fig. 3, we also consider two cases with the transmission success probability of the S-D link being 0.25 and 0.5, respectively. In the first case of $P_{1}=0.25$, it is apparent that the average AoI first decreases and then increases as the generation probability increases. This is because if the S-D link has bad channel conditions, the updates successfully delivered to D by R have a significant contribution on minimizing the average AoI. However, as S can preempt the transmission of R whenever there is a new arrival, if the updates are generated too frequently, the updates at R will be always preempted by S and cannot be transmitted to D to effectively reduce the AoI. Therefore, too high generation probabilities in turn increase the average AoI. We can also find that the average AoI when $p=0.5$ is smaller than that when $p=0.9$, which confirms our mentioned observation when $P_{1}$ is less than 0.27 in Fig. 2. In the second case of $P_{1}=0.5$, the average AoI always decreases as the generation probability increases. The monotone decreasing property demonstrates our mentioned phenomenon when $P_{1}$ is greater than 0.27 in Fig. 2. It is also worth mentioning that the optimal generation probabilities to minimize the average AoI in the case of $P_{1}\!=\!0.25$ and $P_{1}\!=\!0.5$ are $p=0.6770$ and $p=1$, respectively, which is consistent with the results calculated by using the formula in Theorem 1. \begin{figure}[tbp] \centering{\includegraphics[height=5.8cm]{"new_new_new_Figure_1"}} \vspace{-0.3cm} \caption{Average AoI of the considered cooperative system and the non-cooperative system versus the transmission success probability $P_{1}$ for different generation probabilities.} \vspace{-0.3 cm} \label{fig:two-hoop-relay-model-1} \end{figure} \begin{figure}[tbp] \centering{\includegraphics[height=5.8cm]{"new_new_new_Figure_2"}} \vspace{-0.2 cm} \caption{Average AoI of the considered cooperative system and the non-coopertive system versus the generation probability $p$ for different transmission success probabilities, i.e., $(P_{1}, P_{2}, P_{3})$.} \vspace{-0.6 cm} \label{fig:two-hoop-relay-model-1} \end{figure} \vspace{-0.2 cm} \section{Conclusions} \vspace{-0.15cm} In this paper, we proposed an age-oriented opportunistic relaying (AoR) protocol to reduce the age of information (AoI) of a cooperative status update system, where the source timely reports randomly generated status updates to the destination with the help of a relay. By analyzing the evolution of AoI, we derived a closed-form expression of the average AoI of the proposed AoR protocol as a function of the generation probability of the status updates and the transmission success probability of each link. Given reasonable assumptions about the transmission success probabilities, we further figured out the optimal generation probability of the status updates that minimizes the average AoI. Simulation results validated our theoretical analysis and demonstrated the superiority of the proposed AoR protocol over the non-cooperative system in terms of minimizing the average AoI, especially when the source-destination link is not as good as the other two links. \section*{Appendix} \textit{A. Proof of Theorem 1} Recall that $\bar{\Delta}=\frac{[1-(1-p)(1-P_{3})]\cdot [1-(1-p)(1-P_{1})(1-P_{2})]}{p[pP_{1}+(1-p)P_{3}-(1-p)(1-P_{1})(1-P_{2})P_{3}]}$. To proceed, we derive the first-order derivative of $\bar\Delta$ with respect to (w.r.t) $p$. After some algebra manipulations, we have \begin{equation} \frac{\partial \bar{\Delta}}{\partial p}=\frac{\chi \cdot p^2+ \psi \cdot p+\omega}{p^2\!\cdot\!\big[pP_{1}\!+\!(1\!-\!p)P_{3}\!-\!(1\!-\!p)(1\!-\!P_{1})(1\!-\!P_{2}P_{3})\big]^2}, \end{equation} where \begin{subequations} \begin{equation} \resizebox{.99\hsize}{!}{$\begin{aligned} \chi\!= \!-&(P_{1}^2P_{2}^2P_{3}^2\!-\!2P_{1}^2P_{2}P_{3}^2\!+\!2P_{1}^2P_{2}P_{3}\!-\!P_{1}^2P_{2}\!+\!P_{1}^2P_{3}^2\! -\!2P_{1}^2P_{3}\!\\ &\,+\!P_{1}^2\! -\!2P_{1}P_{2}^2P_{3}^2\!+\!2P_{1}P_{2}P_{3}^2\!-\!P_{1}P_{2}P_{3}\!+\!P_{1}P_{2}\!+\!P_{2}^2P_{3}^2\!-\!P_{2}P_{3}), \end{aligned}$} \end{equation} \begin{equation} \resizebox{.91\hsize}{!}{$\begin{aligned} \psi\!=\, &2P_{1}^2P_{2}^2P_{3}^2\!-\!4P_{1}^2P_{2}P_{3}^2\!+\!2P_{1}^2P_{2}P_{3}\!+\!2P_{1}^2P_{3}^2\! -\!2P_{1}^2P_{3}\!\\ &\qquad\qquad\qquad-\!4P_{1}P_{2}^2P_{3}^2\!+\!4P_{1}P_{2}P_{3}^2\!-\!2P_{1}P_{2}P_{3}\!+\!2P_{2}^2P_{3}^2, \end{aligned}$} \end{equation} \begin{equation} \resizebox{.99\hsize}{!}{$\begin{aligned} \omega\!=\!-(P_{1}^2P_{2}^2P_{3}^2\!-\!2P_{1}^2P_{2}P_{3}^2\!+\!P_{1}^2P_{3}^2 \!-\!2P_{1}P_{2}^2P_{3}^2\!+\!2P_{1}P_{2}P_{3}^2\!+\!P_{2}^2P_{3}^2), \end{aligned}$} \end{equation} \end{subequations} are defined for the notation simplicity. After a careful observation on the right hand side (RHS) of (29), we can deduce that the sign of $\frac{\partial \bar{\Delta}}{\partial p}$ is only determined by the numerator \begin{equation} \kappa(p) = \chi \!\cdot\! p^2+\psi \!\cdot\! p+\omega, \end{equation} since the denominator is always large than zero. To determine the monotonicity of the function $\bar\Delta$, we need to investigate the properties of the quadratic function $\kappa(p)$ on the feasible set of $p$ (i.e., [0, 1]). Firstly, after some algebra manipulations, we note that \begin{subequations} \begin{equation} \omega=-P_{3}^2\Big[P_{1}^2(P_{2}-1)^2+P_{2}\big(P_{2}+2P_{1}(1-P_{2})\big)\Big], \end{equation} \begin{equation} \psi^2-4\chi \omega=4P_{3}^2P_{2}(P_{3}-P_{1})(1-P_{1})(P_{1}+P_{2}-P_{1}P_{2})^2. \end{equation} \end{subequations} As $0<P_{1}<P_{2}<1$ and $0<P_{1}<P_{3}<1$, we have that $\omega<0$ and $\psi^2-4\chi \omega>0$. This means that the curve of $\kappa(p)$ always intersects the Y-axis at the negative half of the Y-axis and it always has two roots on the X-axis, which can be given by \begin{subequations} \begin{equation} x_{1}=\frac{-\psi -\sqrt{\psi ^2-4\chi \omega}}{2\chi}, \end{equation} \begin{equation} x_{2}=\frac{-\psi +\sqrt{\psi ^2-4\chi \omega}}{2\chi}, \end{equation} \end{subequations} where $x_{2}>x_{1}$. To further characterize the shapes of the function $\kappa(p)$, we now investigate $\chi$ and $\psi$ for the following four possible cases: 1) When $\chi>0$ and $\psi>0$, we always have $x_{1}<0$ and $x_{2}>0$. Since $p$ is in the range of $[0, 1]$, we have two sub-cases: (a) $x_{2}<1$ and (b) $x_{2}>1$. We draw the possible shapes of $\kappa(p)$ versus $p$ for the sub-case (a) and sub-case (b) in Fig. 4 (a) and Fig. 4 (b), respectively. From Fig. 4 (a), we can see that in the sub-case (a), $\kappa(p)<0$ holds for $p\in[0, x_{2}]$, and $\kappa(p)>0$ holds for $p\in(x_{2}, 1]$. This means that the function $\bar\Delta$ is decreasing for $p\in[0, x_{2}]$ and is increasing for $p\in(x_{2}, 1]$. As a result, the minimum value of $\bar\Delta$ is achieved at $p=x_{2}$. From Fig. 4 (b), we can see that in the sub-case (b), $\kappa(p)<0$ holds for $p\in[0, 1]$. Therefore, the function $\bar\Delta$ is always decreasing for $p\in[0, 1]$, which indicates that the value of $\bar\Delta$ is minimized at $p=1$. 2) When $\chi>0$ and $\psi<0$, we always have $x_{1}<0$ and $x_{2}>0$. Since $p$ is in the range of $[0,1]$, we also have two sub-cases: (a) $x_{2}<1$ and (b) $x_{2}>1$. The possible shapes of $\kappa(p)$ versus $p$ for the sub-case (a) and sub-case (b) are depicted as Fig. 5 (a) and Fig. 5 (b), respectively. Similar to case 1), we can prove that the minimum value of $\bar\Delta$ is achieved by setting $p=x_{2}$ and $p=1$ for the case $x_{2}<1$ and $x_{2}>1$, respectively. 3) When $\chi<0$ and $\psi<0$, we always have $x_{1}<x_{2}<0$. Therefore, there only exists one possible shape of $\kappa(p)$ versus $p$ in this case, which is depicted as Fig. 6. From Fig. 6, it is straightforward to see that $\kappa(0)<0$ holds for $p\in [0, 1]$. This means that the function $\bar\Delta$ is always decreasing for $p\in [0, 1]$ in this case. As a result, the minimum value of $\bar\Delta$ is achieved at $p=1$. 4) When $\chi<0$ and $\psi>0$, we always have $x_{2}>x_{1}>0$. Therefore, the possible shapes of $\kappa(p)$ versus $p$ can be depicted as Fig. 7. According to (30b), after some algebra manipulations, $\psi$ can be rewritten as \begin{equation} \psi\!=-2P_{3}(P_{1}\!+\!P_{2}\!-\!P_{1}P_{2})(P_{1}\!-\!P_{1}P_{3}\!-\!P_{2}P_{3}\!+\!P_{1}P_{2}P_{3}). \end{equation} As $\psi>0$, $0<P_{1}<P_{2}<1$ and $0<P_{1}<P_{3}<1$, we thus have $P_{1}-P_{1}P_{3}-P_{2}P_{3}+P_{1}P_{2}P_{3}<0$, which can be rewritten as \begin{equation} P_{1}<\frac{P_{2}P_{3}}{1-P_{3}+P_{2}P_{3}}. \end{equation} To further validate this case, we investigate the value of $-\chi$ under the constraint of (35). We rewrite $-\chi$ as a quadratic function of $P_{1}$, which can be expressed as \begin{equation} -\chi(P_{1})=\lambda P_{1}^2+\mu P_{1}+\xi, \end{equation} where \begin{subequations} \begin{equation} \lambda = P_{2}^2P_{3}^2-2P_{2}P_{3}^2+2P_{2}P_{3}-P_{2}+P_{3}^2-2P_{3}+1, \end{equation} \begin{equation} \mu=2P_{2}P_{3}^2(1-P_{2})+P_{2}(1-P_{3}), \end{equation} \begin{equation} \xi= P_{2}P_{3}(P_{2}P_{3}-1), \end{equation} \end{subequations} are defined for the simplicity of notations. As $0<P_{1}<P_{2}<1$ and $0<P_{1}<P_{3}<1$, according to (37b) and (37c), we have $\mu>0$ and $\xi<0$. In addition, if we set $P_{1}=1$, after some manipulations, we can attain that $-\chi({P_{1}})=(P_{3}-1)^2>0$. Similarly, if we substitute $P_{1}=\frac{P_{2}P_{3}}{1-P_{3}+P_{2}P_{3}}$ into the expression of $-\chi(P_{1})$, we can have $-\chi (P_{1})=\frac{P_{2}P_{3}(P_{2}-1)(P_{3}-1)^2}{(P_{2}P_{3}-P_{3}+1)^2}<0$. Based on the above analysis, we can draw the possible shapes of $-\chi(P_{1})$ versus $P_{1}$ for $\lambda>0$ and $\lambda<0$ in Fig. 8 (a) and Fig. 8 (b), respectively. Note that in these figures, we also show the possible positions of the point with X-coordinate being $\frac{P_{2}P_{3}}{1-P_{3}+P_{2}P_{3}}$. \begin{figure}[htbp] \centering \subfigure[When $x_{2}<1$]{\includegraphics[height=2.8cm]{"appendix_1_1"}} \qquad \subfigure[When $x_{2}>1$]{\includegraphics[height=2.8cm]{"appendix_2_2"}} \caption{Possible shapes for the function $\kappa(p)$ versus $p$ when $\chi>0$ and $\psi>0$.} \label{Fig. 4} \end{figure} \begin{figure}[htbp] \centering \subfigure[When $x_{2}<1$]{\includegraphics[height=2.8cm]{"appendix_3_3"}} \qquad \subfigure[When $x_{2}>1$]{\includegraphics[height=2.8cm]{"appendix_4_4"}} \caption{Possible shapes for the function $\kappa(p)$ versus $p$ when $\chi>0$ and $\psi<0$.} \label{Fig. 4} \end{figure} \begin{figure}[tbp] \centerline{\includegraphics[height=5cm]{"appendix_5_5"}} \vspace{-0.7 em} \caption{Possible shapes for the function $\kappa(p)$ versus $p$ when $\chi<0$ and $\psi<0$.} \label{fig:two-hoop-relay-model-1} \end{figure} \begin{figure}[htbp] \centering \subfigure[When $x_{2}<1$]{\includegraphics[height=2.8cm]{"appendix_6_6"}} \qquad \subfigure[When $x_{2}>1$]{\includegraphics[height=2.8cm]{"appendix_7_7"}} \caption{Possible shapes for the function $\kappa(p)$ versus $p$ when $\chi<0$ and $\psi>0$.} \label{Fig. 4} \end{figure} \begin{figure}[htbp] \centering \subfigure[When $\lambda>0$]{\includegraphics[height=2.6cm]{"appendix_9_9"}} \qquad \subfigure[When $\lambda<0$]{\includegraphics[height=2.6cm]{"appendix_8_8"}} \caption{Possible shapes for the function $-\chi(P_{1})$ versus $P_{1}$.} \label{Fig. 4} \end{figure} From Fig. 8 (a) and Fig. 8 (b), we can see that if $P_{1}<\frac{P_{2}P_{3}}{1-P_{3}+P_{2}P_{3}}$ and $0<P_{1}<1$, $-\chi<0$ always holds. This means that we always have $\chi>0$ if $\psi>0$. This is contrary to the initial assumptions of this case (i.e., $\chi<0$ and $\psi>0$). Therefore, the case 4) is not valid. In conclusion, we can find that in all of the possible case 1), case 2) and case 3), the minimum value of $\bar\Delta$ is achieved by setting $p=x_{2}$ and $p=1$ when $x_{2}<1$ and $x_{2}>1$, respectively. Therefore, based on (30a), (30b), (30c) and (33b), after some algebra manipulations, the optimal $p$ that minimizes $\bar\Delta$ can be given by (27). This completes the proof of Theorem 1.
\section{Introduction} Controllability of a dynamic system is a fundamental notion in control theory~\cite{kalman1963mathematical}. For multi-agent networks, controllability is closely related to the graph-theoretic properties of the underlying network~\cite{tanner2004controllability,rahmani2009controllability,liu2011controllability}. The controllability of multi-agent networks under nearest-neighbor interactions has initially been examined in \cite{tanner2004controllability}, where it was shown that network connectivity can have adverse effects on controllability. The influence of network symmetry of leader-following networks on its controllability has been reported in \cite{rahmani2009controllability}. \textbf{}Graph node partitions were subsequently employed to characterize the upper bounds on the dimension of the controllable subspace of multi-agent networks \cite{zhang2013upper,aguilar2017almost,egerstedt2012interacting}; analogous lower bounds have also been derived using distance partitions \cite{zhang2013upper,yazicioglu2012tight}. Due to the difficulty in analyzing controllability of general networks, controllability for special classes of networks has been an active area of research~\cite{aguilar2014graph,parlangeli2011reachability,ji2012leaders,chapman2014controllability,notarstefano2013controllability,hao2019controllability}. Recently, controllability of multi-agent system on signed networks (where cooperative and competitive interactions coexist) has also received attention. For instance, a graph-theoretic characterization of the upper bound on the dimension of the controllable subspace for signed networks has been proposed using generalized equitable partition in \cite{sun2017controllability}. In \cite{she2018topological}, sufficient conditions on the controllability of signed path, cycle and tree networks have been derived. The controllability problem on certain classes of signed networks is also studied in \cite{guan2018controllability}; a comprehensive review on network controllability has been provided in~\cite{chen2019controllability}. In the meantime, existing works on network controllability are mainly concerned with networks with scalar weighted edges; such network models are restrictive in characterizing interdependence amongst subsets of the underlying node states~\cite{sun2018dimensional}. Matrix-weighted networks are a natural extension of scalar-valued networks; they have been examined in scenarios such as graph effective resistance (motivated by distributed estimation and control) \cite{barooah2006graph,tuna2017observability}, logical inter-dependency of multiple topics in opinion evolution \cite{friedkin2016network,ye2018continuous}, bearing-based formation control \cite{zhao2015translational}, as well as the array of coupled LC oscillators \cite{tuna2019synchronization}. More recently, consensus and synchronization problems on matrix-weighted networks have been examined in~\cite{trinh2018matrix,tuna2016synchronization,pan2018bipartite,su2019bipartite}. Consensus protocol plays a vital role in cooperative control of multi-agent networks, ensuring asymptotic alignment on the states of the agents required for accomplishing a global task via local interactions~\cite{mesbahi2010graph,olfati2004consensus,ren2005consensus,chung2018survey}. In this letter, we examine the controllability of multi-agent systems governed by consensus dynamics on matrix-weighted networks. Although the matrix-weighted setup is a natural extension of scalar-weighted networks, extending network controllability to the former case is non-trivial. An essential distinction in this direction is that the rank of the weighting matrix can range from zero up to its dimension. In this note, we show how the definiteness of weight matrices influences the dimension of the controllable subspace for the corresponding network. Moreover, graph theoretic lower and upper bounds on the dimension of the controllable subspace of the influenced consensus are provided--this is achieved by exploiting the distance partition and almost equitable partition of matrix-weighted networks, extending results for scalar-weighted networks. The remainder of this paper is organized as follows. The preliminary notions used in the paper are introduced in \S 2. The problem formulation is discussed in \S 3 followed by the characterization of lower and upper bounds of the dimension of the controllable subspace in \S 4 and \S 5, respectively. The structure of uncontrollable input matrix is further discussed in \S 6. Examples are provided in \S 7 followed by concluding remarks in \S 8. \section{Preliminaries} Let $\mathbb{R}$ and $\mathbb{N}$ be the set of real and natural numbers, respectively. Denote $\underline{n}=\left\{ 1,2,\ldots,n\right\} $ for an $n\in\mathbb{N}$. A symmetric matrix $M\in\mathbb{R}^{n\times n}$ is positive definite, denoted by $M\succ0$, if $\boldsymbol{z}^{T}M\boldsymbol{z}>0$ for all nonzero $\boldsymbol{z}\in\mathbb{\mathbb{R}}^{n}$, and is positive semi-definite, denoted by $M\succeq0$, if $\boldsymbol{z}^{T}M\boldsymbol{z}\ge0$ for all $\boldsymbol{z}\in\mathbb{\mathbb{R}}^{n}$. The image and rank of a matrix $M$ are denoted by $\text{{\bf img}}(M)$ and $\text{{\bf rank}}(M)$, respectively. Denote by $\text{{\bf dim}}(\cdot)$ as the dimension of a vector space (or subspace) and $\text{{\bf diag}}\left\{ \cdot\right\} $ as the (block) diagonal matrix comprised from its arguments. For a block matrix $Z$ with $n\in\mathbb{N}$ row partitions and $m\in\mathbb{N}$ column partitions, we denote by $(Z)_{ij}$ as the matrix block on the $i$th row and $j$th column in $Z$, where $i\in\underline{n}$ and $j\in\underline{m}$. Denote by $\text{{\bf row}}_{i}(Z)$ as $[(Z)_{i1},(Z)_{i2},\ldots,(Z)_{in}].$ Let $\text{{\bf gcd}}\left\{ k_{1},k_{2},\cdots,k_{m}\right\} $ signify the greatest common divisor of a set of integers $k_{1},k_{2},\cdots,k_{m}\in\mathbb{N}$. The $d\times d$ zero matrix and identity matrix are denoted by $\boldsymbol{0}_{d\times d}$ and $I_{d\times d}$, respectively. \section{Problem Formulation} Consider a multi-agent network consisting of $n\in\mathbb{N}$ agents where the state of an agent $i\in\underline{n}$ is denoted by the vector $\boldsymbol{x}_{i}(t)\in\mathbb{R}^{d}$ with $d\in\mathbb{N}$. The state of the multi-agent network is denoted by $\boldsymbol{x}(t)=[\boldsymbol{x}_{1}^{T}(t),\boldsymbol{x}_{2}^{T}(t),\ldots,\boldsymbol{x}_{n}^{T}(t)]^{T}\in\mathbb{R}^{dn}$. The interaction topology of the network is characterized by a matrix-weighted graph $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$. The node and edge sets of $\mathcal{G}$ are denoted by $\mathcal{V}=\left\{ v_{1},v_{2},\ldots,v_{n}\right\} $ and $\mathcal{E}\subseteq\mathcal{V}\times\mathcal{V}$, respectively. The weight on the edge $(v_{i},v_{j})\in\mathcal{E}$ in $\mathcal{G}$ is a symmetric matrix $A_{ij}\in\mathbb{R}^{d\times d}$ such that $A_{ij}\succeq0$ or $A_{ij}\succ0$ and $A_{ij}=\boldsymbol{0}_{d\times d}$ if $(v_{i},v_{j})\not\in\mathcal{E}$. Thereby, the matrix-valued adjacency matrix $A=[A_{ij}]\in\mathbb{R}^{dn\times dn}$ is a block matrix such that the matrix block located in the $i$th row and $j$th column is $A_{ij}$. We shall assume that $A_{ij}=A_{ji}$ for all $v_{i}\not\not=v_{j}\in\mathcal{V}$ and $A_{ii}=\boldsymbol{0}_{d\times d}$ for all $v_{i}\in\mathcal{V}$. The neighbor set of an agent $v_{i}\in\mathcal{V}$ is denoted by $\mathcal{N}_{i}=\left\{ v_{j}\in\mathcal{V}\,|\,(v_{i},v_{j})\in\mathcal{E}\right\} $. The consensus protocol for each agent in a matrix-weighted network now assumes the form, \begin{equation} \dot{\boldsymbol{x}}_{i}(t)=-\sum_{j\in\mathcal{N}_{i}}A_{ij}(\boldsymbol{x}_{i}(t)-\boldsymbol{x}_{j}(t)),i\in\mathcal{V}.\label{equ:matrix-consensus-protocol} \end{equation} Denote by $D=\text{{\bf diag}}\left\{ D_{1},D_{2},\cdots,D_{n}\right\} \in\mathbb{R}^{dn}$ as the matrix-valued degree matrix of $\mathcal{G}$, where $D_{i}=\sum_{j\in\mathcal{N}_{i}}A_{ij}\in\mathbb{R}^{d\times d}$. The matrix-valued Laplacian is defined as $L=D-A$. Controllability of a networked system examines whether the state of its nodes can be steered from any initial state to an arbitrary desired state in a finite time by manipulating some of the nodes, referred to as the leader nodes. Let $\boldsymbol{u}=[\boldsymbol{u}_{1}^{\top},\boldsymbol{u}_{2}^{\top},\ldots,\boldsymbol{u}_{m}^{\top}]^{\top}\in\mathbb{R}^{dm}$ be the control input exerted on the leader nodes, where $\boldsymbol{u}_{j}\in\mathbb{R}^{d}$ and $j\in\underline{m}$. Denote by $B=[B_{il}]\in\mathbb{R}^{dn\times dm}$ as the matrix-weighted input matrix where $B_{il}\in\left\{ \boldsymbol{0}_{d\times d},I_{d\times d}\right\} $. The set of leaders and ``followers" can now be defined as $\mathcal{V}_{\text{leader}}=\left\{ i\in\mathcal{V}\thinspace|\thinspace B_{il}=I_{d\times d}\right\} $ and $\mathcal{V}_{\text{follower}}=\mathcal{V}\setminus\mathcal{V}_{\text{leader}}$, respectively. As such, the leader-following multi-agent system on\textbf{ }matrix-weighted networks can be characterized by a linear time-invariant system, \begin{equation} \dot{\boldsymbol{x}}(t)=-L\boldsymbol{x}(t)+B\boldsymbol{u}(t).\label{eq:controlled-matrix-consensus-overall} \end{equation} Hence, the network \eqref{eq:controlled-matrix-consensus-overall} is controllable from the leader set $\mathcal{V}_{\text{leader}}$ if and only if the associated controllability matrix, \begin{equation} \mathcal{K}(L,B)=\left[B \; -LB \; L^{2}B \; \cdots \; (-L)^{dn-1}B\right], \end{equation} has a full row rank, i.e., $\text{{\bf rank}}(\mathcal{K}(L,B))=dn$. \begin{defn} The controllable subspace of the system \eqref{eq:controlled-matrix-consensus-overall} is defined as the range space of $\mathcal{K}(L,B)$, namely, \begin{equation} \langle L|B\rangle=\text{{\bf img}}(B)+L\text{{\bf img}}(B)+\cdots+L^{dn-1}\text{{\bf img}}(B), \end{equation} where the summation is with respect to subspace addition. \end{defn} In our subsequent discussion, we provide graph-theoretic lower and upper bounds on the dimension of the controllable subspace $\langle L|B\rangle$. \section{Lower Bound on the Dimension of the Controllability Subspace} In this section, we examine the lower bound on the dimension of $\langle L|B\rangle$; first, let us introduce the necessary graph-theoretic concepts. \begin{defn} For a matrix-weighted network $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$, a node partition $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} $ is a collection of subsets $\mathcal{V}_{i}\subset\mathcal{V}$ such that $\mathcal{V}=\mathcal{V}_{1}\cup\mathcal{V}_{2}\cup\cdots\cup\mathcal{V}_{s}$ and $\mathcal{V}_{1}\cap\mathcal{V}_{2}\cap\cdots\cap\mathcal{V}_{s}=\emptyset$, where $i\in\underline{s}$ and $s\in\mathbb{N}$. The matrix-weighted characteristic matrix $P(\pi)=\text{[\ensuremath{P_{ij}}(\ensuremath{\pi})]}\in\mathbb{R}^{dn\times ds}$ of a node partition $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} $ is now defined as, \[ P_{ij}(\pi)=\begin{cases} I_{d\times d}, & v_{i}\in\mathcal{V}_{j}\\ \boldsymbol{0}_{d\times d}, & v_{i}\notin\mathcal{V}_{j} \end{cases}. \] \end{defn} For any $\mathcal{Q}\subseteq\mathcal{V}$, denote by $\delta_{|\mathcal{V}|,\mathcal{Q}}$ as a block matrix with $|\mathcal{V}|$ row partitions and one column partition such that the $q$th $d\times d$ block in $\delta_{|\mathcal{V}|,\mathcal{Q}}$ is $I_{d\times d}$, and all the remaining blocks are $\boldsymbol{0}_{d\times d}$, where $v_{q}\in\mathcal{Q}$. \begin{example} Consider a $5$-node matrix-weighted network with a node partition $\pi=\left\{ \{1\},\{2,3\},\{4,5\}\right\} $ and the dimension of weight matrices on edges is $d=2$. Then \[ P(\pi)=[\delta_{5,\left\{ 1\right\} },\thinspace\delta_{5,\left\{ 2,3\right\} },\thinspace\delta_{5,\left\{ 4,5\right\} }]. \] \end{example} A path in a matrix-weighted network $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ is a sequence of edges of the form $$\mathcal{P}_{v_{i_{1}},v_{i_{p}}}=(v_{i_{1}},v_{i_{2}}),(v_{i_{2}},v_{i_{3}}),\ldots,(v_{i_{p-1}},v_{i_{p}}),$$ where nodes $v_{i_{1}},v_{i_{2}},\ldots,v_{i_{p}}\in\mathcal{V}$ are all distinct and it is said that $v_{i_{p}}$ is reachable from $v_{i_{1}}$; a path $\mathcal{P}_{v_{i_{1}},v_{i_{p}}}$ turns to a cycle if $v_{i_{1}}=v_{i_{p}}$. The network $\mathcal{G}$ is connected if any two distinct nodes in $\mathcal{G}$ are reachable from each other. A tree is a connected graph with $n$ nodes and $n-1$ edges where $n\in\mathbb{N}$. All networks discussed in this paper are assumed to be connected. The shortest path between two nodes $v_{i},v_{j}\in\mathcal{V}$ is a path that contains the least number of the edges; the number of the edges on this shortest path is referred to as the distance between nodes $v_{i}$ and $v_{j}$, denoted by $\text{{\bf dist}}(v_{i},v_{j})$. The diameter of $\mathcal{G}$ is then defined as, \[ \text{{\bf diam}}(\mathcal{G})={\displaystyle \max_{v_{i},v_{j}\in\mathcal{V}}}\text{{\bf dist}}(v_{i},v_{j}). \] An edge $(v_{i},v_{j})\in\mathcal{E}$ is positive definite or positive semi-definite if its weight matrix $A_{ij}$ is positive definite or positive semi-definite. \begin{defn}[Positive definite path] A positive definite path in a matrix-weighted network $\mathcal{G}$ is a path for which every edge has a positive definite weight. \end{defn} In the subsequent discussion, we will characterize a lower bound on the dimension of the controllable subspace of \eqref{eq:controlled-matrix-consensus-overall} for acyclic networks, followed by cycle and complete networks. In particular, we examine the influence of the positive definiteness of weight matrices on $\text{{\bf dim}}(\langle L|B\rangle)$. \begin{defn}[Distance partition] \label{def: distance-partition} Let $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ be a matrix-weighted network. The distance partition relative to an agent $v_{i}\in\mathcal{V}$ consists of the subsets, \[ \mathcal{C}_{r}=\left\{ v_{j}\in\mathcal{V}\thinspace|\thinspace\text{{\bf dist}}(v_{i},v_{j})=r\right\}, \] where $0\leq r\leq\text{{\bf diam}}(\mathcal{G})$. \end{defn} \begin{thm} \label{thm:2}Let $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ be a matrix-weighted tree network whose dimension of the weight matrix is $d\in\mathbb{N}$. Let $v_{l}\in\mathcal{V}$ be the leader agent and denote the distance partition relative to $v_{l}$ as $\pi_{D}(v_{l})=\left\{ \mathcal{C}_{0},\mathcal{C}_{1},\ldots,\mathcal{C}_{r}\right\}$, where $0\leq r\leq\text{{\bf diam}}(\mathcal{G})$. If there exists an agent $v_{i}$ in $\mathcal{C}_{r}$ such that the path $\mathcal{P}_{v_{l},v_{i}}$ is positive definite, then \textup{$\text{{\bf dim}}(\langle L|B\rangle)\geq d\thinspace|\pi_{D}(v_{l})|$.} \end{thm} \begin{IEEEproof} The adopted line of reasoning is similar to that presented in~\cite{zhang2011controllability} for the scalar-weights. Without loss of generality, let $v_{1}$ be the leader agent. Denote the distance partition relative to $v_{1}$ as $\pi_{D}(v_{1})=\left\{ \mathcal{C}_{0},\mathcal{C}_{1},\ldots,\mathcal{C}_{r}\right\} $. Specifically, \begin{align*} \mathcal{C}_{0} & =v_{1},\\ \mathcal{C}_{q} & =\left\{ v_{i}\thinspace|\thinspace v_{i}\in\mathcal{V},\text{{\bf dist}}(v_{i},v_{1})=q\right\} \\ & =\left\{ v_{1}^{(q)},v_{2}^{(q)},\cdots,v_{|\mathcal{C}_{q}|}^{(q)}\right\} ,q\in\underline{r}. \end{align*} According to Definition \ref{def: distance-partition}, there does not exist agents in $\mathcal{C}_{i}$ with a neighbor in $\mathcal{C}_{j}$ if $|i-j|>1$, where $i,j\in\underline{r}$. Then the matrix-weighted Laplacian of $\mathcal{G}$ admits the form, \[ L=\left[\begin{array}{cccccc} L_{00} & L_{01} & \boldsymbol{0} & \cdots & \boldsymbol{0} & \boldsymbol{0}\\ L_{10} & L_{11} & L_{12} & \cdots & \boldsymbol{0} & \boldsymbol{0}\\ \boldsymbol{0} & L_{21} & L_{22} & \cdots & \boldsymbol{0} & \boldsymbol{0}\\ \vdots & \vdots & \vdots & \ddots & \vdots & \vdots\\ \boldsymbol{0} & \boldsymbol{0} & \boldsymbol{0} & \cdots & L_{r-1,r-1} & L_{r-1,r}\\ \boldsymbol{0} & \boldsymbol{0} & \boldsymbol{0} & \cdots & L_{r,r-1} & L_{r,r} \end{array}\right], \] where $L_{kl}\in\mathbb{R}^{d\thinspace|\mathcal{C}_{k}|\times d\thinspace|\mathcal{C}_{l}|}$ for all $0\leq k,l\leq r$ and $\boldsymbol{0}$'s are zero matrices with proper dimensions. Let $E=[\begin{array}{cccc} B & LB & \cdots & L^{r}B\end{array}]$ be a block matrix with $r+1$ row partitions and $r+1$ column partitions. Note that as agent $v_{1}$ is the leader, $B=[\begin{array}{cccc} I_{d\times d} & 0_{d\times d} & \cdots & 0_{d\times d}\end{array}]^{\top}$ and, \begin{eqnarray*} E & = & \left[\begin{array}{cccc} E_{00} & E_{01} & \cdots & E_{0,r}\\ E_{10} & E_{11} & \cdots & E_{1,r}\\ \vdots & \vdots & \ddots & \vdots\\ E_{r,0} & E_{r,1} & \cdots & E_{r,r} \end{array}\right], \end{eqnarray*} where $E_{00}=I_{d\times d}$, $E_{qq}$ is a block matrix with $|\mathcal{C}_{q}|$ row partitions and $1$ column partition where $q\in\underline{r}$ and $E_{pq}$ with $p>q$ are matrices with proper size and all elements equal to $0$ where $p\in\underline{r}$. In particular, we are interested in those blocks located in $q$th row and $q$th column in $E$ since they are crucial in determining $\text{{\bf rank}}(E)$. Denote the block in $s$th row block in $E_{qq}$ as $E_{qq}^{(s)}$, where $s\in\left\{ 1,2,\cdots,|\mathcal{C}_{q}|\right\} $ and $q\in\underline{r}$; then \[ E_{qq}^{(s)}=\underset{(i,j)\in\ensuremath{\mathcal{P}}_{v_{1},v_{s}^{(q)}}}{\prod}A_{ij}. \] By our standing assumption, there exists one node in $\mathcal{C}_{r}$ such that the path between this node and $v_{l}$ are positive definite. As the product of positive definite matrices has full rank, one has $\text{{\bf rank}}(E_{qq})=d$ for all $q\in\underline{r}$. Hence, \[ \text{{\bf rank}}(E)=d\thinspace|\pi_{D}(v_{1})|, \] completing the proof. \end{IEEEproof} \begin{cor}[Path network] Let $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ be a path network in the form of $$\mathcal{P}_{v_{i_{1}},v_{i_{p}}}=(v_{i_{1}},v_{i_{2}}),(v_{i_{2}},v_{i_{3}}),\ldots,(v_{i_{p-1}},v_{i_{p}}),$$ where nodes $v_{i_{1}},v_{i_{2}},\ldots,v_{i_{p}}\in\mathcal{V}$. Then $\mathcal{G}$ is controllable from $v_{i_{1}}$ (or $v_{i_{p}}$) if and only if the path $\mathcal{P}_{v_{i_{1}},v_{i_{p}}}$ is positive definite. \end{cor} \begin{cor}[Cycle network] Let $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ be a matrix-weighted cycle with dimension of the weight matrix as $d\in\mathbb{N}$. Let $v_{l}\in\mathcal{V}$ be a leader agent and denote the distance partition relative to $v_{l}$ as $\pi_{D}(v_{l})=\left\{ \mathcal{C}_{0},\mathcal{C}_{1},\ldots,\mathcal{C}_{r}\right\}$, where, \[ r=\begin{cases} \frac{|\mathcal{V}|}{2}, & |\mathcal{V}|\thinspace\text{is even};\\ \frac{|\mathcal{V}|-1}{2}, & |\mathcal{V}|\thinspace\text{is odd}. \end{cases} \] If there exists an agent $v_{i}$ in $\mathcal{C}_{r}$ such that the shortest path between $v_{i}$ and $v_{l}$ are positive definite, then \textup{ \[ \text{{\bf dim}}(\langle L|B\rangle)\geq\begin{cases} d\thinspace\frac{|\mathcal{V}|}{2}+1, & |\mathcal{V}|\thinspace\text{is even};\\ d\thinspace\frac{|\mathcal{V}|+1}{2}, & |\mathcal{V}|\thinspace\text{is odd}. \end{cases} \] } \end{cor} \begin{cor}[Complete network] Let $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ be a matrix-weighted complete network with the dimension of the weight matrix as $d\in\mathbb{N}$. Let $v_{l}\in\mathcal{V}$ be a leader agent and denote the distance partition relative to $v_{l}$ as $\pi_{D}(v_{l})=\left\{ \mathcal{C}_{0},\mathcal{C}_{1}\right\} $. If there exists an agent $v_{i}$ in $\mathcal{C}_{1}$ such that the path $\mathcal{P}_{v_{l},v_{i}}$ is positive definite, then \textup{$\text{{\bf dim}}(\langle L|B\rangle)\geq d$.} \end{cor} Note that from Theorem \ref{thm:2}, the rank of weight matrices influences the lower bound on the dimension of the controllable subspace of \eqref{eq:controlled-matrix-consensus-overall}; this is distinct from the scalar-weighted case. As such, the semi-definiteness of weight matrices plays an important role in the controllability of matrix weighted networks. \section{Upper Bound on the Dimension of the Controllability Subspace} We now proceed to examine graph-theoretic characterizations of the upper bound of the controllable subspace of system \eqref{eq:controlled-matrix-consensus-overall} in terms of the almost equitable partition. For a given subset $\mathcal{Q}\in\mathcal{V}$ in a matrix-weighted network $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ and an agent $v_{i}\in\mathcal{V}$, denote the matrix-valued degree of $v_{i}$ relative to $\mathcal{Q}$ as, \[ D(v_{i},\mathcal{Q})=\sum_{v_{j}\in\mathcal{Q}}A_{ij}. \] \begin{defn} \label{def:AEP}An $s-$partition $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} $ of a matrix-weighted network $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ is an almost equitable partition if for $\forall i\not=j\in\underline{s}$ and $\forall v,w\in\mathcal{V}_{i}$ one has $D(v,\mathcal{V}_{j})=D(w,\mathcal{V}_{j})$. \end{defn} According to Definition \ref{def:AEP}, if an $s-$partition, $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} $ is an almost equitable partition, then one can denote $D(\mathcal{V}_{i},\mathcal{V}_{j})=D(v,\mathcal{V}_{j})$ for $\forall v\in\mathcal{V}_{i}$. Next, we proceed to define the quotient graph of a matrix-weighted network based on the almost equitable partition. \begin{defn} For a given almost equitable partition $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} $ of a matrix-weighted network $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$, the quotient graph of $\mathcal{G}$ over $\pi$ is a matrix-weighted network denoted by $\mathcal{G}/\pi$ with the node set, \[ \mathcal{V}(\mathcal{G}/\pi)=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} , \] whose edge set is, \[ \mathcal{E}(\mathcal{G}/\pi)=\left\{ (\mathcal{V}_{i},\mathcal{V}_{j})\thinspace|\thinspace D(\mathcal{V}_{i},\mathcal{V}_{j})\neq\boldsymbol{0}_{d\times d}\right\} , \] and the weight on edge $(\mathcal{V}_{i},\mathcal{V}_{j})$ is $D(\mathcal{V}_{i},\mathcal{V}_{j})$ for $i\not=j\in\underline{s}$. \end{defn} Note that the condition $D(\mathcal{V}_{i},\mathcal{V}_{j})=D(\mathcal{V}_{j},\mathcal{V}_{i})$ does not necessary hold; as such, the quotient graph $\mathcal{G}/\pi$ can be directed. The following result provides the relationship between the $L-$invariant subspace and the almost equitable partition of matrix-weighted networks. \begin{lem} \label{thm:L-invariant theorem}Let $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ be a matrix-weighted network with the dimension of edge weight $d\in\mathbb{N}$, $L$ be the matrix-valued Laplacian of $\mathcal{G}$, $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} $ be a $s-$partition of $\mathcal{V}(\mathcal{G})$ and $P(\pi)$ be the characteristic matrix of $\pi$. Then $\pi$ is an almost equitable partition of $\mathcal{G}$ if and only if $\text{{\bf img}}(P(\pi))$ is $L-$invariant, i.e., there exists a matrix $L^{\pi}\in\mathbb{R}^{ds\times ds}$ such that $LP(\pi)=P(\pi)L^{\pi}.$ \end{lem} \begin{IEEEproof} (Necessity) Define the matrix $L^{\pi}\in\mathbb{R}^{ds\times ds}$ as \[ (L^{\pi})_{ij}=\begin{cases} {\displaystyle \sum_{\mathcal{V}_{j}\in\mathcal{V}(\mathcal{G}/\pi)}}D(\mathcal{V}_{i},\mathcal{V}_{j}), & i=j;\\ -D(\mathcal{V}_{i},\mathcal{V}_{j}), & i\neq j. \end{cases} \] Suppose that $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} $ is an almost equitable partition of the matrix-weighted network $\mathcal{G}$ and $v_{p}\in\mathcal{V}_{k}$, where $p\in\underline{n}$ and $k\in\underline{s}$. On one hand, the $p$-th block row of $LP(\pi)$ can be characterized by, \begin{align*} (LP(\pi))_{p} & =[-\sum_{j\in\mathcal{V}_{1}\cap\mathcal{N}_{\mathcal{G}}(v_{p})}A_{pj},-\sum_{j\in\mathcal{V}_{2}\cap\mathcal{N}_{\mathcal{G}}(v_{p})}A_{pj},\ldots,\\ & D_{p}-\sum_{j\in\mathcal{V}_{k}\cap N_{\mathcal{G}}(v_{p})}A_{pj},-\sum_{j\in\mathcal{V}_{k+1}\cap N_{\mathcal{G}}(v_{p})}A_{pj},\\ & \ldots,-\sum_{j\in\mathcal{V}_{s}\cap N_{\mathcal{G}}(v_{p})}A_{pj}]. \end{align*} On the other hand, the entries in the $p$-th block row of $P(\pi)L^{\pi}$ are, \begin{align*} (P(\pi)L^{\pi})_{p} & =[-D(\mathcal{V}_{k},\mathcal{V}_{1}),\ldots,-D(\mathcal{V}_{k},\mathcal{V}_{k-1}),\sum_{r\neq k}D(\mathcal{V}_{k},\mathcal{V}_{r}),\\ & -D(\mathcal{V}_{k},\mathcal{V}_{k+1}),\ldots,-D(\mathcal{V}_{k},\mathcal{V}_{s})]. \end{align*} According to Definition \ref{def:AEP}, we have \[ \sum_{j\in\mathcal{V}_{r}\cap\mathcal{N}_{\mathcal{G}}(p)}A_{pj}=D(\mathcal{V}_{k},\mathcal{V}_{r}), \] and \[ D_{p}-\sum_{j\in\mathcal{V}_{k}\cap N_{\mathcal{G}}(p)}A_{pj}=\sum_{r\neq k}D(\mathcal{V}_{k},\mathcal{V}_{r}). \] Then \[ \text{{\bf row}}_{p}(LP(\pi))=\text{{\bf row}}_{p}(P(\pi)L^{\pi}), \] which implies that $LP(\pi)=P(\pi)L^{\pi}.$ (Sufficiency) Suppose that $\pi$ is an $s-$partition of the matrix-weighted network $\mathcal{G}$ satisfying $LP(\pi)=P(\pi)L^{\pi}$. Then each column in $LP(\pi)$ is the linear combination of the columns in $P(\pi)$. For each block column of $LP(\pi)$, the matrix blocks corresponding to the agents belonging to the same subset in $\pi$ are identical. Therefore one has, \[ (LP(\pi))_{ij}=-\sum_{r\in\mathcal{V}_{j}\cap N_{\mathcal{G}}(i)}A_{ir},\forall i\neq j, \] and for any $k$ in the same subset as $i$, \[ (LP(\pi))_{kj}=-\sum_{r\in\mathcal{V}_{j}\cap N_{\mathcal{G}}(k)}A_{kr}. \] Note that $(LP(\pi))_{ij}=(LP(\pi))_{kj}$ implies that, \[ \sum_{r\in\mathcal{V}_{j}\cap N_{\mathcal{G}}(i)}A_{ir}=\sum_{r\in\mathcal{V}_{j}\cap N_{\mathcal{G}}(k)}A_{kr}, \] for any $k$ in the same subset as $i$. Therefore, $\pi$ is an almost equitable partition. \end{IEEEproof} Lemma \ref{thm:L-invariant theorem} has the following immediate consequence. \begin{thm} \label{thm:the upper bound}Let $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ be a matrix-weighted network with the dimension of edge weight $d\in\mathbb{N}$. Suppose that $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} $ is an almost equitable partition of $\mathcal{G}$ with the characteristic matrix $P(\pi)$ where $1\leq s<n$. Denote $B=[b_{1},b_{2},\cdots,b_{m}]\in\mathbb{R}^{dn\times dm}$ as the input matrix where $b_{i}\in\left\{ \boldsymbol{0}_{d\times d},I_{d\times d}\right\} ^{n}$, the matrix blocks in $b_{i}$ corresponding to the agents belonging to the same subset in $\pi$ are the same and $i\in\underline{m}$. Then, (1) $\langle L|B\rangle\subseteq\text{{\bf img}}(P(\pi))$, (2) $\text{{\bf dim}}(\langle L|B\rangle)\leq ds$, and (3) the pair $(L,B)$ is uncontrollable. \end{thm} \begin{IEEEproof} Since the matrix blocks in $b_{i}$ corresponding to the agents belonging to the same subset in $\pi$ are the same where $i\in\underline{m}$, then $\text{{\bf img}}(B)\subseteq\text{{\bf img}}(P(\pi))$. In the meantime, $\text{{\bf img}}(P(\pi))$ is $L-$invariant according to Lemma \ref{thm:L-invariant theorem}; thus we have, \begin{align*} \langle L|B\rangle & =\text{{\bf img}}(B)+L\text{{\bf img}}(B)+\cdots+L^{dn-1}\text{{\bf img}}(B)\\ & \subseteq\text{{\bf img}}(P(\pi))+L\text{{\bf img}}(P(\pi))\cdots+L^{dn-1}\text{{\bf img}}(P(\pi))\\ & =\text{{\bf img}}(P(\pi)), \end{align*} implying $\text{{\bf dim}}(\langle L|B\rangle)\leq ds$. Since $1\leq ds<dn$, the pair $(L,B)$ is uncontrollable. \end{IEEEproof} \section{On Uncontrollable Input Matrix} Note from that Theorem \ref{thm:the upper bound} provides an upper bound on the controllable subspace using the range space of the characteristic matrix of the almost equitable partition. It is shown that $\text{{\bf img}}(B)\subseteq\text{{\bf img}}(P(\pi))$ can directly lead to the uncontrollability of the network when the almost equitable partition $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} $ is non-trivial. However, is there any other leader selections that induces the uncontrollability of $(L,B)$? In the following discussions, we proceed to provide the structure of the uncontrollable matrix $B$. \begin{thm} \label{thm:choose of uncontrollable b}Let $\mathcal{G}=(\mathcal{V},\mathcal{E},A)$ be a matrix-weighted network with the dimension of edge weight $d\in\mathbb{N}$. Suppose that $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2},\ldots,\mathcal{V}_{s}\right\} $ is an almost equitable partition of $\mathcal{G}$ with the characteristic matrix $P(\pi)=[P_{1},P_{2},\cdots,P_{s}]$, where $P_{1},P_{2},\ldots,P_{s}\in\mathbb{R}^{dn\times d}$ and $1\leq s<n$. Let $\pi$ be reducible and $q_{j}=\frac{|\mathcal{V}_{j}|}{{\bf gcd}(\pi)}$ where $j=\underline{s}.$ Let $B\in\left\{ 0_{d\times d},I_{d\times d}\right\} ^{n}$ be such that \begin{equation} \boldsymbol{p}_{j1}^{\top}\boldsymbol{b}_{1}=\boldsymbol{p}_{j2}^{\top}\boldsymbol{b}_{2}=\cdots=\boldsymbol{p}_{jd}^{\top}\boldsymbol{b}_{d}=cq_{j},\label{eq:the condition} \end{equation} where $c$ is an integer such that $1\leq c\leq{\bf gcd}(\pi)-1$, $\boldsymbol{p}_{j1},\boldsymbol{p}_{j2},\ldots,\boldsymbol{p}_{jd}\in\mathbb{R}^{dn\times1}$ and $\boldsymbol{b}_{1,}\boldsymbol{b}_{2},\ldots,\boldsymbol{b}_{d}\in\mathbb{R}^{dn\times1}$ are columns of matrices $P_{j}$ and $B$, respectively. Then $(L,B)$ is uncontrollable. \end{thm} \begin{IEEEproof} Since $\text{{\bf img}}(P(\pi))$ is $L-$invariant, there exists an eigenvector $\boldsymbol{w}\in\text{{\bf img}}(P(\pi))$ of $L$ satisfying $\boldsymbol{w}\notin\text{{\bf span}}\{\boldsymbol{1}_{n}\otimes I_{d}\}$ and $\boldsymbol{w}^{\top}\boldsymbol{1}_{dn}=0.$ Note that $\{\boldsymbol{p}_{11},\cdots,\boldsymbol{p}_{1d},\boldsymbol{p}_{21},\cdots,\boldsymbol{p}_{2d},\cdots,\boldsymbol{p}_{s1},\cdots,\boldsymbol{p}_{sd}\}$ forms a basis of $\text{{\bf img}}(P(\pi))$; as such, \[ \boldsymbol{w}=\sum_{j=1}^{s}\sum_{t=1}^{d}\alpha_{jt}\boldsymbol{p}_{jt} \] for some $\alpha_{jt}$'s. Due to the fact that \begin{align*} \boldsymbol{w}^{\top}(\boldsymbol{1}_{n}\otimes I_{d}) & =\left(\sum_{j=1}^{s}\alpha_{j1}|\mathcal{V}_{j}|,\cdots,\sum_{j=1}^{s}\alpha_{jd}|\mathcal{V}_{j}|\right)\\ & =[0,\cdots,0]\in\mathbb{R}^{1\times dn}, \end{align*} if we choose $B=[\boldsymbol{b}_{1},\cdots,\boldsymbol{b}_{d}]$ satisfying \eqref{eq:the condition}, then we have \begin{align*} \boldsymbol{w}^{\top}\boldsymbol{b}_{k} & =\left(\sum_{j=1}^{s}\sum_{t=1}^{d}\alpha_{jt}\boldsymbol{p}_{jt}^{\top}\right)\boldsymbol{b}_{k}=\left(\sum_{j=1}^{s}\alpha_{jk}\boldsymbol{p}_{jk}^{\top}\right)\boldsymbol{b}_{k}\\ & =\sum_{j=1}^{s}\alpha_{jk}cq_{j}=\sum_{j=1}^{s}\alpha_{jk}c\frac{|\mathcal{V}_{j}|}{\text{{\bf gcd}}(\pi)}\\ & =\frac{c}{\text{{\bf gcd}}(\pi)}\sum_{j=1}^{s}\alpha_{jk}|\mathcal{V}_{j}|=0, \end{align*} for any $k\in\underline{d}$. Therefore, $(L,B)$ is uncontrollable. \end{IEEEproof} \section{Examples} We now provide examples to demonstrate the results discussed in the paper. The first example underscores that the semi-definiteness of edge weights can have an adverse effect on the controllability of matrix-weighted networks; this was examined in Theorem \ref{thm:2}. \begin{example} \label{exa:1}Consider the matrix-weighted path network in Figure \ref{fig:example-network}. Choose agent $1$ as the leader and set the weight matrices on edges as, \[ A_{12}=\left[\begin{array}{cc} 1 & 1\\ 1 & 2 \end{array}\right],A_{23}=\left[\begin{array}{cc} 1 & 0\\ 0 & 2 \end{array}\right], \] \[ A_{34}=\left[\begin{array}{cc} 2 & 1\\ 1 & 2 \end{array}\right],A_{45}=\left[\begin{array}{cc} 1 & 2\\ 2 & 5 \end{array}\right]; \] note that the weight matrices are all positive definite. \begin{figure}[tbh] \begin{centering} \begin{tikzpicture}[scale=0.7] \node (n1) at (-4,0) [circle,fill=black!20,draw] {1}; \node (n2) at (-2,0) [circle,fill=black!20,draw] {2}; \node (n3) at (0,0) [circle,fill=black!20,draw] {3}; \node (n4) at (2,0) [circle,fill=black!20,draw] {4}; \node (n5) at (4,0) [circle,fill=black!20,draw] {5}; \draw[-, thick, color=black!50] (n1) -- (n2); \draw[-, thick, color=black!50] (n2) -- (n3); \draw[-, thick, color=black!50] (n3) -- (n4); \draw[-, thick, color=black!50] (n4) -- (n5); \end{tikzpicture} \par\end{centering} \caption{\textcolor{black}{A matrix-weighted path }network\textcolor{black}{{} with $5$ nodes.}} \label{fig:example-network} \end{figure} The matrix-valued Laplacian $L$ and the matrix-weighted input matrix can now be written as, \begin{footnotesize} \[ L=\left[\begin{array}{cccccccccc} 1 & 1 & -1 & -1 & 0 & 0 & 0 & 0 & 0 & 0\\ 1 & 2 & -1 & -2 & 0 & 0 & 0 & 0 & 0 & 0\\ -1 & -1 & 2 & 1 & -1 & 0 & 0 & 0 & 0 & 0\\ -1 & -2 & 1 & 4 & 0 & -2 & 0 & 0 & 0 & 0\\ 0 & 0 & -1 & 0 & 3 & 1 & -2 & -1 & 0 & 0\\ 0 & 0 & 0 & -2 & 1 & 4 & -1 & -2 & 0 & 0\\ 0 & 0 & 0 & 0 & -2 & -1 & 3 & 3 & -1 & -2\\ 0 & 0 & 0 & 0 & -1 & -2 & 3 & 7 & -2 & -5\\ 0 & 0 & 0 & 0 & 0 & 0 & -1 & -2 & 1 & 2\\ 0 & 0 & 0 & 0 & 0 & 0 & -2 & -5 & 2 & 5 \end{array}\right], \] \end{footnotesize}and $B=[\delta_{10,\left\{ 1\right\} },\thinspace\delta_{10,\left\{ 2\right\} }].$ The dimension of the controllable subspace $\langle L|B\rangle$ in this example is $10$ and therefore $(L,B)$ is controllable. We proceed to replace the weight matrix between agent $2$ and agent $3$ by a positive semi-definite matrix \[ A_{23}=\left[\begin{array}{cc} 1 & 1\\ 1 & 1 \end{array}\right]. \] In this case, the dimension of the controllable subspace $\langle L|B\rangle$ becomes $9$, implying that $(L,B)$ is uncontrollable. \end{example} The next example illustrates the results presented in the Theorem \ref{thm:choose of uncontrollable b}. \begin{example} \label{exa:2}Consider the matrix-weighted network in Figure \ref{fig:example-network-2}. The weight matrices are chosen as, \[ A_{16}=A_{25}=A_{14}=A_{23}=\left[\begin{array}{cc} 1 & 1\\ 1 & 2 \end{array}\right], \] \end{example} \[ A_{12}=A_{34}=A_{45}=A_{56}=\left[\begin{array}{cc} 1 & 1\\ 1 & 1 \end{array}\right]. \] \begin{figure}[tbh] \begin{centering} \begin{tikzpicture}[scale=0.8] \node (n1) at (-1,1) [circle,fill=black!20,draw] {1}; \node (n2) at (1,1) [circle,fill=black!20,draw] {2}; \node (n3) at (2,0) [circle,fill=black!20,draw] {3}; \node (n4) at (1,-1) [circle,fill=black!20,draw] {4}; \node (n5) at (-1,-1) [circle,fill=black!20,draw] {5}; \node (n6) at (-2,0) [circle,fill=black!20,draw] {6}; \draw[-, thick, color=black!50] (n1) -- (n2); \draw[-, thick, color=black!50] (n2) -- (n3); \draw[-, thick, color=black!50] (n3) -- (n4); \draw[-, thick, color=black!50] (n4) -- (n5); \draw[-, thick, color=black!50] (n1) -- (n6); \draw[-, thick, color=black!50] (n1) -- (n4); \draw[-, thick, color=black!50] (n2) -- (n5); \draw[-, thick, color=black!50] (n5) -- (n6); \end{tikzpicture} \par\end{centering} \caption{\textcolor{black}{A matrix-weighted network with $5$ nodes.}} \label{fig:example-network-2} \end{figure} Note that the network in Figure \ref{fig:example-network-2} has an almost equitable partition $\pi=\left\{ \mathcal{V}_{1},\mathcal{V}_{2}\right\}$, where $\mathcal{V}_{1}=\{1,2\}$ and $\mathcal{V}_{2}=\{3,4,5,6\}$. The characteristic matrix $P(\pi)=[P_{1},P_{2}]$ has entries $P_{1}=[\delta_{6,\left\{ 1,2\right\} }]$ and $P_{2}=[\delta_{6,\left\{ 3,4,5,6\right\} }]$. Since $\text{{\bf gcd}}(\pi)=2$, $q_{1}=1$, $q_{2}=2$. Choose the input matrix as, \[ B=[\delta_{6,\left\{ 1,3,6\right\} }], \] that satisfies $\boldsymbol{p}_{11}^{\top}\boldsymbol{b}_{1}=\boldsymbol{p}_{12}^{\top}\boldsymbol{b}_{2}=1$ and $\boldsymbol{p}_{21}^{\top}\boldsymbol{b}_{1}=\boldsymbol{p}_{22}^{\top}\boldsymbol{b}_{2}=2$. Then $\text{{\bf rank}}(\mathcal{K}(L,B))=9$, implying that the $(L,B)$ in this example is uncontrollable, which is consistent with Theorem \ref{thm:choose of uncontrollable b}. \section{Conclusion} This paper examines the controllability problem of multi-agent system on matrix-weighed networks. Both lower and upper bounds on the dimension of the controllable subspace--associated with controlled consensus dynamics on matrix-weighted networks--is provided from a graph-theoretic perspective. The structure of an uncontrollable input matrix is further investigated. Examples are then provided to demonstrate the theoretical results. In our further work, we will examine the graph-theoretic characterizations of lower/upper bound of controllable subspace of matrix-weighted networks allowing both positive (semi-)definite and negative (semi-)definite weight matrices. \bibliographystyle{IEEEtran}
\section{Introduction} In 2003, Rodriguez-Villegas \cite{rv-b-2003} conjectured the following four supercongruences associated to certain elliptic curves: \begin{align*} \sum_{k=0}^{p-1}\frac{{2k\choose k}^2}{16^k}\equiv \left(\frac{-1}{p}\right) \pmod{p^2},\quad \sum_{k=0}^{p-1}\frac{{2k\choose k}{3k\choose k}}{27^k}\equiv \left(\frac{-3}{p}\right) \pmod{p^2},\\ \sum_{k=0}^{p-1}\frac{{2k\choose k}{4k\choose 2k}}{64^k}\equiv \left(\frac{-2}{p}\right) \pmod{p^2},\quad \sum_{k=0}^{p-1}\frac{{3k\choose k}{6k\choose 3k}}{432^k}\equiv \left(\frac{-1}{p}\right) \pmod{p^2}, \end{align*} where $p\ge 5$ is a prime and $\left(\frac{\cdot}{p}\right)$ denotes the Legendre symbol. These four supercongruences were first proved by Mortenson \cite{mortenson-jnt-2003,mortenson-tams-2003} by using the Gross-Koblitz formula. Guo, Pan and Zhang \cite{gpz-jnt-2017} established some interesting $q$-analogues of the above four supercongruences. For more $q$-analogues of congruences, one can refer to \cite{gl-jdea-2018,gs-ca-2019,gs-rm-2019}. Let $E_n$ be the $n$th Euler number. In 2016, Z.-H. Sun \cite{sunzh-ijnt-2016} proved that for any prime $p\ge 5$, \begin{align*} \sum_{k=0}^{p-1}\frac{{4k\choose 2k}{2k\choose k}}{(2k+1)64^k} \equiv (-1)^{\frac{p-1}{2}}-3p^2E_{p-3}\pmod{p^3}, \end{align*} which was originally conjectured by Z.-W. Sun \cite{sunzw-scm-2011}. Note that ${4k\choose 2k}/(2k+1)$ is the $2k$th Catalan number. Mao and Z.-W. Sun \cite{ms-rj-2019} showed that for any prime $p\ge 5$, \begin{align} \sum_{k=0}^{(p-1)/2}\frac{{4k\choose 2k}{2k\choose k}}{(2k+1)64^k}\equiv (-1)^{\frac{p-1}{2}}2^{p-1}\pmod{p^2}.\label{new-7} \end{align} Z.-W. Sun \cite[Conjecture 11]{sunzw-2019} also conjectured an extension of \eqref{new-7} as follows. \begin{conj}[Sun, 2019] For any prime $p\ge 5$, we have \begin{align} \sum_{k=0}^{(p-1)/2}\frac{{4k\choose 2k}{2k\choose k}}{(2k+1)64^k} \equiv (-1)^{\frac{p-1}{2}}\left(2^{p-1}-(2^{p-1}-1)^2\right)\pmod{p^3}.\label{a-3} \end{align} \end{conj} The main purpose of the paper is to prove \eqref{a-3}. Our proof is based on hypergeometric series identities and symbolic summation method. Before proving \eqref{a-3}, we need the following two key results. \begin{thm}\label{t-1} For any prime $p\ge 5$, we have \begin{align} &\sum_{k=0}^{(p-1)/2}\frac{{2k\choose k}}{(2k-1)^2 4^k}\equiv (-1)^{\frac{p-1}{2}}\left(2^{p-1}-q_p(2)\right)\pmod{p^2},\label{a-1}\\[10pt] &\sum_{k=0}^{(p-1)/2}\frac{{2k\choose k}^2}{(2k-1)^3 16^k}\equiv 2-2q_p(2)-p\left(q_p(2)^2-4q_p(2)+3\right)\pmod{p^2},\label{a-2} \end{align} where $q_p(2)$ is the Fermat quotient $(2^{p-1}-1)/p$. \end{thm} \begin{thm}\label{t-2} The supercongruence \eqref{a-3} is true. \end{thm} We shall prove Theorems \ref{t-1} and \ref{t-2} in Sections 2 and 3, respectively. \section{Proof of Theorem \ref{t-1}} \begin{lem} For any integer $n\ge 2$, we have \begin{align} \sum_{k=0}^n\frac{(-n)_k (n-1)_k}{(1)_k\left(\frac{1}{2}\right)_k}=\frac{(-1)^{n-1}}{2n-1},\label{b-1}\\[10pt] \sum_{k=0}^n\frac{(-n)_k (n-1)_k \left(-\frac{1}{2}\right)_k}{(1)_k^2\left(\frac{1}{2}\right)_k} =\frac{4n(n-1)}{2n-1},\label{b-2} \end{align} where $(a)_0=1$ and $(a)_k=a(a+1)\cdots (a+k-1)$ for $k\ge 1$. \end{lem} {\noindent \it Proof.} Recall Gauss's theorem \cite[(1.7.6), page 28]{slater-b-1966}: \begin{align} \pFq{2}{1}{a&b}{&c}{1}=\frac{\Gamma(c)\Gamma(c-a-b)}{\Gamma(c-a)\Gamma(c-b)},\label{new-3} \end{align} provided that $\Re(c-a-b)>0$. Letting $a=-n, b=n-1$ and $c=\frac{1}{2}$ in \eqref{new-3} gives \begin{align*} \pFq{2}{1}{-n&n-1}{&\frac{1}{2}}{1}=\frac{\Gamma\left(\frac{1}{2}\right)\Gamma\left(\frac{3}{2}\right)} {\Gamma\left(\frac{1}{2}+n\right)\Gamma\left(\frac{3}{2}-n\right)}=\frac{(-1)^{n-1}}{2n-1}, \end{align*} which is \eqref{b-1}. Also, we have the following transformation formula of hypergeometric series \cite[(2.5.11), page 76]{slater-b-1966}: \begin{align} &\pFq{3}{2}{a&b&-n}{&e&f}{1}=\frac{(e-a)_n (f-a)_n}{(e)_n(f)_n}\notag\\[10pt] &\times\pFq{3}{2}{1-s&a&-n}{&1+a-e-n&1+a-f-n}{1},\label{new-4} \end{align} where $s=e+f-a-b+n$. Letting $a=n-1,b=-\frac{1}{2},e=x$ and $f=\frac{3}{2}-x$ in \eqref{new-4} yields \begin{align} &\pFq{3}{2}{n-1&-\frac{1}{2}&-n}{&x&\frac{3}{2}-x}{1}=\frac{(x+1-n)_n \left(\frac{5}{2}-x-n\right)_n}{(x)_n\left(\frac{3}{2}-x\right)_n}\notag\\[10pt] &\times\pFq{3}{2}{-2&n-1&-n}{&-x&x-\frac{3}{2}}{1}.\label{new-5} \end{align} Furthermore, we can evaluate the terminating hypergeometric series on the right-hand side of \eqref{new-5}: \begin{align*} &\pFq{3}{2}{-2&n-1&-n}{&-x&x-\frac{3}{2}}{1}\\[10pt] &=\frac{4x^4-12x^3+(-8n^2+8n+11)x^2+(12n^2-12n-3)x+4n(n-1)(n^2-n-1)}{x(x-1)(2x-1)(2x-3)}. \end{align*} It follows that \begin{align} &\pFq{3}{2}{n-1&-\frac{1}{2}&-n}{&x&\frac{3}{2}-x}{1}=\frac{(x+1-n)_n \left(\frac{5}{2}-x-n\right)_n}{(x)_n\left(\frac{3}{2}-x\right)_n}\notag\\[10pt] &\times\frac{4x^4-12x^3+(-8n^2+8n+11)x^2+(12n^2-12n-3)x+4n(n-1)(n^2-n-1)}{x(x-1)(2x-1)(2x-3)}.\label{new-6} \end{align} Letting $x\to 1$ on both sides of \eqref{new-6} and noting that \begin{align*} &\lim_{x\to 1}\frac{4x^4-12x^3+(-8n^2+8n+11)x^2+(12n^2-12n-3)x+4n(n-1)(n^2-n-1)}{x(2x-1)(2x-3)}\\ &=-4n^2(n-1)^2, \end{align*} and \begin{align*} \lim_{x\to 1}\frac{(x+1-n)_n \left(\frac{5}{2}-x-n\right)_n}{(x-1)(x)_n\left(\frac{3}{2}-x\right)_n} =-\frac{1}{n(n-1)(2n-1)}, \end{align*} we arrive at \begin{align*} \pFq{3}{2}{n-1&-\frac{1}{2}&-n}{&1&\frac{1}{2}}{1}=\frac{4n(n-1)}{2n-1}, \end{align*} which proves \eqref{b-2}. \qed {\noindent \it Proof of \eqref{a-1}.} We can rewrite \eqref{b-1} as \begin{align} \sum_{k=0}^{n-1}\frac{(-n)_k (n-1)_k}{(1)_k\left(\frac{1}{2}\right)_k}&=\frac{(-1)^{n-1}}{2n-1} -\frac{(-n)_n (n-1)_n}{(1)_n\left(\frac{1}{2}\right)_n}\notag\\[10pt] &=\frac{(-1)^{n-1}}{2n-1}\left(1+4^{n-1}(2n-2)\right)\notag\\[10pt] &=(-1)^{n-1}\left(2^{2n-2}-\frac{2^{2n-2}-1}{2n-1}\right).\label{b-3} \end{align} Letting $n=\frac{p+1}{2}$ in \eqref{b-3} gives \begin{align*} \sum_{k=0}^{(p-1)/2}\frac{\left(\frac{-1-p}{2}\right)_k \left(\frac{-1+p}{2}\right)_k} {(1)_k \left(\frac{1}{2}\right)_k}=(-1)^{\frac{p-1}{2}}\left(2^{p-1}-q_p(2)\right). \end{align*} Since for $0\le k \le \frac{p-1}{2}$, \begin{align} \left(\frac{-1-p}{2}\right)_k \left(\frac{-1+p}{2}\right)_k\equiv \left(-\frac{1}{2}\right)_k^2\pmod{p^2},\label{b-4} \end{align} we have \begin{align} \sum_{k=0}^{(p-1)/2}\frac{ \left(-\frac{1}{2}\right)_k^2} {(1)_k \left(\frac{1}{2}\right)_k}\equiv (-1)^{\frac{p-1}{2}}\left(2^{p-1}-q_p(2)\right)\pmod{p^2}.\label{b-5} \end{align} Note that \begin{align} &\frac{\left(\frac{1}{2}\right)_k}{(1)_k}=\frac{{2k\choose k}}{4^k},\label{b-6}\\[10pt] &\frac{\left(-\frac{1}{2}\right)_k}{\left(\frac{1}{2}\right)_k}=\frac{1}{1-2k}.\label{b-7} \end{align} Then the proof of \eqref{a-1} follows from \eqref{b-5}--\eqref{b-7}. \qed {\noindent \it Proof of \eqref{a-2}.} We can rewrite \eqref{b-2} as \begin{align} \sum_{k=0}^{n-1}\frac{(-n)_k (n-1)_k \left(-\frac{1}{2}\right)_k}{(1)_k^2\left(\frac{1}{2}\right)_k} &=\frac{4n(n-1)}{2n-1}-\frac{(-n)_n (n-1)_n \left(-\frac{1}{2}\right)_n}{(1)_n^2\left(\frac{1}{2}\right)_n}\notag\\[10pt] &=\frac{1}{2n-1}\left(4n(n-1)+(-1)^n{2n-2\choose n}\right).\label{b-8} \end{align} Letting $n=\frac{p+1}{2}$ in \eqref{b-8} and using \eqref{b-4}, we obtain \begin{align*} \sum_{k=0}^{(p-1)/2}\frac{\left(-\frac{1}{2}\right)_k^3}{(1)_k^2\left(\frac{1}{2}\right)_k} \equiv \frac{1}{p}\left(p^2-1+(-1)^{\frac{p+1}{2}}{p-1\choose \frac{p+1}{2}}\right)\pmod{p^2}. \end{align*} For $0\le k\le p-1$, we have \begin{align} {p-1\choose k}&\equiv (-1)^k\left(1-p\sum_{i=1}^k\frac{1}{i}+p^2\sum_{1\le i<j\le k}\frac{1}{ij}\right)\pmod{p^3}\notag\\[10pt] &=(-1)^k\left(1-pH_k+\frac{p^2}{2}\left(H_k^2-H_k^{(2)}\right)\right),\label{new-1} \end{align} where \begin{align*} H_k^{(r)}=\sum_{j=1}^k\frac{1}{j^r}, \end{align*} with the convention that $H_k=H_k^{(1)}$. It follows that \begin{align} \sum_{k=0}^{(p-1)/2}\frac{\left(-\frac{1}{2}\right)_k^3}{(1)_k^2\left(\frac{1}{2}\right)_k} &\equiv \frac{p}{2}\left(H_{\frac{p+1}{2}}^2-H_{\frac{p+1}{2}}^{(2)}+2\right)-H_{\frac{p+1}{2}}\notag\\ &=\frac{p}{2}\left(H_{\frac{p-1}{2}}^2+4H_{\frac{p-1}{2}}-H_{\frac{p-1}{2}}^{(2)}+6\right)-H_{\frac{p-1}{2}}-2 \pmod{p^2}.\label{b-9} \end{align} By \cite[(41)]{lehmer-am-1938} and \cite[Lemma 2.4]{sunzw-scm-2011}, we have \begin{align} H_{\frac{p-1}{2}}\equiv -2q_p(2)+pq_p(2)^2\pmod{p^2},\label{b-10} \end{align} and \begin{align} H_{\frac{p-1}{2}}^{(2)}\equiv 0\pmod{p}.\label{b-11} \end{align} Substituting \eqref{b-10} and \eqref{b-11} into \eqref{b-9} gives \begin{align} \sum_{k=0}^{(p-1)/2}\frac{\left(-\frac{1}{2}\right)_k^3}{(1)_k^2\left(\frac{1}{2}\right)_k}\label{b-12} \equiv 2q_p(2)-2+p\left(q_p(2)^2-4q_p(2)+3\right)\pmod{p^2}. \end{align} Finally, applying \eqref{b-6} and \eqref{b-7} to the left-hand side of \eqref{b-12}, we reach \begin{align*} \sum_{k=0}^{(p-1)/2}\frac{{2k\choose k}^2}{(2k-1)^3 16^k}\equiv 2-2q_p(2)-p\left(q_p(2)^2-4q_p(2)+3\right)\pmod{p^2}, \end{align*} as desired. \qed \section{Proof of Theorem \ref{t-2}} \begin{lem} For any non-negative integer $n$, we have \begin{align} &\sum_{k=0}^n\frac{\left(-n\right)_k\left(n+1\right)_k\left(\frac{1}{4}\right)_k \left(\frac{3}{4}\right)_k} {(1)_k^2\left(\frac{1}{2}\right)_k\left(\frac{3}{2}\right)_k}=\frac{{2n\choose n}}{4^n},\label{c-1} \end{align} and \begin{align} &\sum_{k=0}^n\frac{\left(-n\right)_k\left(n+1\right)_k\left(\frac{1}{4}\right)_k \left(\frac{3}{4}\right)_k} {(1)_k^2\left(\frac{1}{2}\right)_k\left(\frac{3}{2}\right)_k}\sum_{j=1}^k\frac{1}{(2j-1)^2}\notag\\[10pt] &=-\frac{{2n\choose n}}{4^n}\left(3+\sum_{k=1}^n\frac{1}{(2k-1)^2}\right)+\frac{2}{2n+1}\sum_{k=0}^n \frac{{2k\choose k}}{(2k-1)^2 4^k}\notag\\[10pt] &-\frac{4^n}{(2n+1){2n\choose n}}\sum_{k=0}^n \frac{{2k\choose k}^2}{(2k-1)^3 16^k}.\label{c-2} \end{align} \end{lem} {\noindent \it Proof.} Recall that (see \cite[(2.4.2.2), page 65]{slater-b-1966}) \begin{align} \pFq{4}{3}{d&1+f-g&\frac{f}{2}&\frac{f+1}{2}}{&1+f&\frac{1+f+d-g}{2}&1+\frac{f+d-g}{2}}{1} =\frac{\Gamma(g-f)\Gamma(g-d)}{\Gamma(g)\Gamma(g-f-d)}.\label{new-2} \end{align} Letting $d=-n,f=\frac{1}{2}$ and $g=-n+\frac{1}{2}$ in \eqref{new-2}, we obtain \begin{align*} \pFq{4}{3}{-n&n+1&\frac{1}{4}&\frac{3}{4}}{&1&\frac{1}{2}&\frac{3}{2}}{1} =\frac{\Gamma(-n)\Gamma\left(\frac{1}{2}\right)}{\Gamma\left(-n+\frac{1}{2}\right)\Gamma(0)} =\frac{{2n\choose n}}{4^n}, \end{align*} which is \eqref{c-1}. On the other hand, \eqref{c-2} can be discovered and proved by symbolic summation package {\tt Sigma} due to Schneider \cite{schneider-slc-2007}. One can refer to \cite{liu-jsc-2019} for the same approach to finding and proving identities of this type. \qed {\noindent \it Proof of \eqref{a-3}.} Recall that (see \cite[(4.4)]{liu-jmaa-2019}) \begin{align} \left(\frac{1+p}{2}\right)_k\left(\frac{1-p}{2}\right)_k \equiv \left(\frac{1}{2}\right)_k^2\left(1-p^2\sum_{j=1}^k\frac{1}{(2j-1)^2}\right) \pmod{p^4}.\label{c-3} \end{align} Letting $n=\frac{p-1}{2}$ in \eqref{c-1} and using \eqref{c-3}, we obtain \begin{align} \sum_{k=0}^{(p-1)/2}\frac{\left(\frac{1}{2}\right)_k\left(\frac{1}{4}\right)_k \left(\frac{3}{4}\right)_k}{(1)_k^2\left(\frac{3}{2}\right)_k} &\equiv \frac{1}{2^{p-1}}{p-1\choose \frac{p-1}{2}}\notag\\ &+p^2\sum_{k=0}^{(p-1)/2}\frac{\left(\frac{1}{2}\right)_k\left(\frac{1}{4}\right)_k \left(\frac{3}{4}\right)_k}{(1)_k^2\left(\frac{3}{2}\right)_k}\sum_{j=1}^k\frac{1}{(2j-1)^2} \pmod{p^4},\label{c-4} \end{align} where we have utilized the fact $\left(\frac{1}{4}\right)_k \left(\frac{3}{4}\right)_k/\left(\frac{3}{2}\right)_k \in \mathbb{Z}_p$ for $0\le k\le \frac{p-1}{2}$. From \eqref{c-3}, we deduce that \begin{align} \left(\frac{1+p}{2}\right)_k\left(\frac{1-p}{2}\right)_k \equiv \left(\frac{1}{2}\right)_k^2\pmod{p^2}.\label{c-5} \end{align} Letting $n=\frac{p-1}{2}$ in \eqref{c-2} and using \eqref{c-5} gives \begin{align} &\sum_{k=0}^{(p-1)/2}\frac{\left(\frac{1}{2}\right)_k\left(\frac{1}{4}\right)_k \left(\frac{3}{4}\right)_k}{(1)_k^2\left(\frac{3}{2}\right)_k}\sum_{j=1}^k\frac{1}{(2j-1)^2}\notag\\[10pt] &\equiv -\frac{1}{2^{p-1}}{p-1\choose \frac{p-1}{2}}\left(3+\sum_{k=1}^{(p-1)/2}\frac{1}{(2k-1)^2}\right)+\frac{2}{p}\sum_{k=0}^{(p-1)/2} \frac{{2k\choose k}}{(2k-1)^2 4^k}\notag\notag\\[10pt] &-\frac{2^{p-1}}{p{p-1\choose \frac{p-1}{2}}}\sum_{k=0}^{(p-1)/2} \frac{{2k\choose k}^2}{(2k-1)^3 16^k}\pmod{p^2}.\label{c-6} \end{align} Substituting \eqref{c-6} into \eqref{c-4} yields \begin{align} \sum_{k=0}^{(p-1)/2}\frac{\left(\frac{1}{2}\right)_k\left(\frac{1}{4}\right)_k \left(\frac{3}{4}\right)_k}{(1)_k^2\left(\frac{3}{2}\right)_k} &\equiv \frac{1}{2^{p-1}}{p-1\choose \frac{p-1}{2}} -\frac{p^2}{2^{p-1}}{p-1\choose \frac{p-1}{2}}\left(3+\sum_{k=1}^{(p-1)/2}\frac{1}{(2k-1)^2}\right)\notag\\[10pt] &+2p\sum_{k=0}^{(p-1)/2}\frac{{2k\choose k}}{(2k-1)^2 4^k} -\frac{2^{p-1}p}{{p-1\choose \frac{p-1}{2}}}\sum_{k=0}^{(p-1)/2} \frac{{2k\choose k}^2}{(2k-1)^3 16^k}\pmod{p^4}.\label{c-7} \end{align} Furthermore, by \eqref{new-1}, \eqref{b-10} and \eqref{b-11} we have \begin{align} {p-1\choose \frac{p-1}{2}}&\equiv (-1)^{\frac{p-1}{2}}\left(1-pH_{\frac{p-1}{2}}+\frac{p^2}{2}\left(H_{\frac{p-1}{2}}^2-H_{\frac{p-1}{2}}^{(2)}\right)\right)\notag\\ &\equiv (-1)^{\frac{p-1}{2}}\left(1+2pq_p(2)+p^2q_p(2)^2\right)\pmod{p^3}.\label{c-8} \end{align} By \eqref{b-11} and the Wolstenholme's theorem \cite[page 114]{hw-b-2008}, we have \begin{align} \sum_{k=1}^{(p-1)/2}\frac{1}{(2k-1)^2}=H_{p-1}^{(2)}-\frac{1}{4}H_{\frac{p-1}{2}}^{(2)} \equiv 0\pmod{p}.\label{c-9} \end{align} Setting $2^{p-1}=a$ and $q_p(2)=(a-1)/p$, and then substituting \eqref{a-1}, \eqref{a-2}, \eqref{c-8} and \eqref{c-9} into \eqref{c-7}, we arrive at \begin{align*} \sum_{k=0}^{(p-1)/2}\frac{\left(\frac{1}{2}\right)_k\left(\frac{1}{4}\right)_k \left(\frac{3}{4}\right)_k}{(1)_k^2\left(\frac{3}{2}\right)_k} &\equiv (-1)^{\frac{p-1}{2}}\left(\frac{a^3-2a^2+4a-2}{2a-1}+\frac{3(a-1)^2p^2}{a(2a-1)}\right)\pmod{p^3}\\ &=(-1)^{\frac{p-1}{2}}\left(a-(a-1)^2+\frac{3(a-1)^3}{2a-1}+\frac{3(a-1)^2p^2}{a(2a-1)}\right). \end{align*} By the Fermat's little theorem, we have $a-1\equiv 0\pmod{p}$, and so \begin{align} \sum_{k=0}^{(p-1)/2}\frac{\left(\frac{1}{2}\right)_k\left(\frac{1}{4}\right)_k \left(\frac{3}{4}\right)_k}{(1)_k^2\left(\frac{3}{2}\right)_k}\equiv (-1)^{\frac{p-1}{2}}\left(a-(a-1)^2\right)\pmod{p^3}.\label{c-10} \end{align} Note that \begin{align} &\frac{\left(\frac{1}{4}\right)_k\left(\frac{3}{4}\right)_k}{(1)_k^2}=\frac{{4k\choose 2k}{2k\choose k}}{64^k},\label{c-11}\\[10pt] &\frac{\left(\frac{1}{2}\right)_k}{\left(\frac{3}{2}\right)_k}=\frac{1}{2k+1}.\label{c-12} \end{align} Then the proof of \eqref{a-3} follows from \eqref{c-10}--\eqref{c-12}. \qed \vskip 5mm \noindent{\bf Acknowledgments.} This work was supported by the National Natural Science Foundation of China (grant 11801417).
\section{Introduction}\label{Introduction} Molecular chirality has played a crucial role in the enantio-selective biological and chemical processes~\cite{Book_UMeierhenrich}, homo-chirality of life~\cite{Satio_Chiral_Review_RevModPhys.85.603}, and even fundamental physics~\cite{MQuck_PVED_Angew1989}. It has attracted considerable interests to realize enantioseparation and enantiodiscrimination not only in chemistry~\cite{Book_ChiralAnalysis} but also in atomic, molecular, and optical physics~\cite{CY_Con1,CY_Con2,Shapiro_Con,EFishman_Con,Ye_PRR_Con,PBrumer_Con,PKral_PRL_Con,Xia,WZJ_Detection,Patterson_Detection,DPatterson_Detection2,Patterson_Detection3,Patterson_Detection4,Patterson_Detection5,Buhmann_Detection1,Buhmann_Sep,Koch_Detec,KKLehmann_arXiv,YY_Chen,CY_ACStark,Lobsiger,Shubert,Delta,Shapiro_PopulationTransfer_PhysRevLett.87.183002,Shapiro_OpticalSwitch_PhysRevLett.90.033001,YLi_PauseScheme_PhysRevA.77.015403,Jia_2010_OpticalPause,Effective_two_level_Model,Vitan_Shortcut_PhysRevLett.122.173202,YLi_SpatialSepatation_PhysRevLett.99.130403,LiXuan_SpatialSeparation,DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective,QuantumControl,Koch_Principles_JCP,Diastereomer,Exp_supersonic,Exp_Cooling_Supersonic}. Among these, solely optical (or microwave) methods with the framework of cyclic three-level ($\Delta$-type) system (CTLS)~\cite{Liu_CyclicThreeLevel,YL_CQED,Jia_CQED} based on electronic-dipole transitions, have caught the attention to realize enantioseparation~\cite{Xia,Shapiro_PopulationTransfer_PhysRevLett.87.183002,Shapiro_OpticalSwitch_PhysRevLett.90.033001,YLi_PauseScheme_PhysRevA.77.015403,Jia_2010_OpticalPause,Effective_two_level_Model,Vitan_Shortcut_PhysRevLett.122.173202,YLi_SpatialSepatation_PhysRevLett.99.130403,LiXuan_SpatialSeparation,DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective,QuantumControl,Koch_Principles_JCP,Exp_supersonic,Exp_Cooling_Supersonic} as well as enantiodiscrimination~\cite{WZJ_Detection,Patterson_Detection,DPatterson_Detection2,Patterson_Detection3,YY_Chen,CY_ACStark,Lobsiger,Shubert,Delta,Patterson_Detection4,Patterson_Detection5,KKLehmann_arXiv,Grabow} \textcolor{black}{and enantioconversion~\cite{CY_Con1,CY_Con2,Shapiro_Con,EFishman_Con,Ye_PRR_Con,PBrumer_Con,PKral_PRL_Con}}. \textcolor{black}{The CTLS of chiral molecules is special since the electric-dipole transition moments for the three transitions are proportional to the projections of the electric-dipole transition moment onto the three inertial axes {of gaseous chiral molecules}, respectively. It {is} well known that their product changes sign for the enantiomers \cite{Y_RealSingleLoop_PhysRevA.98.063401,Grabow,DPatterson_Detection2}. This inherent symmetry of the system can be mapped on the coupling strengths in the CTLS of chiral molecules~\cite{Delta,Shapiro_PopulationTransfer_PhysRevLett.87.183002,Shapiro_OpticalSwitch_PhysRevLett.90.033001,YLi_PauseScheme_PhysRevA.77.015403,Jia_2010_OpticalPause,Effective_two_level_Model,Vitan_Shortcut_PhysRevLett.122.173202,YLi_SpatialSepatation_PhysRevLett.99.130403,LiXuan_SpatialSeparation,DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective,QuantumControl,WZJ_Detection,Patterson_Detection,DPatterson_Detection2,Patterson_Detection3,YY_Chen,CY_ACStark,KKLehmann,KKLehmann2,Koch_Principles_JCP,Lobsiger,Shubert,Delta,Exp_supersonic,Exp_Cooling_Supersonic,Patterson_Detection4,Patterson_Detection5,KKLehmann_arXiv,Xia,Grabow}, i.e., the product of the three coupling strengths changes sign for the enantiomers.} Using this feature, one can achieve the enantiomeric-specific state transfer~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective,Exp_supersonic,Xia,Exp_Cooling_Supersonic} (also named as inner-state enantioseparation~\cite{Effective_two_level_Model,YLi_PauseScheme_PhysRevA.77.015403,Jia_2010_OpticalPause,Effective_two_level_Model}), {i.e., for an initial racemic chiral mixture, finally the populations in certain energy levels (e.g. the ground states) will be different for the enantiomers.} Based on the CTLS via optical methods such as {adiabatical processes}~\cite{Shapiro_PopulationTransfer_PhysRevLett.87.183002,Shapiro_OpticalSwitch_PhysRevLett.90.033001}, a dynamic operation of ultrashort pulses~\cite{YLi_PauseScheme_PhysRevA.77.015403,Jia_2010_OpticalPause,Effective_two_level_Model}, and shortcuts-to-adiabaticity operations~\cite{Vitan_Shortcut_PhysRevLett.122.173202,QuantumControl}, in principle the perfect enantiomeric-specific state transfer with {100\% enantiomeric excess} can be achieved with {the two enantiomers} occupying different-energy levels. Furthermore, the left- and right-handed molecules in {different-energy levels} can be spatially separated by a variety of energy-dependent \textcolor{black}{processes}~\cite{Shapiro_OpticalSwitch_PhysRevLett.90.033001,Shapiro_PopulationTransfer_PhysRevLett.87.183002,Vitan_Shortcut_PhysRevLett.122.173202}. In addition, based on the similar CTLS, one can also achieve directly the spatial enantioseparation by mean of the chiral generalized Stern-Gerlach effect~\cite{YLi_SpatialSepatation_PhysRevLett.99.130403,LiXuan_SpatialSeparation}, that is, {the two enantiomers} move along different spatial trajectories. Recently, breakthrough experiments~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective, Exp_supersonic,Exp_Cooling_Supersonic} have reported the enantiomeric-specific state transfer for gaseous chiral molecules with the similar ideas proposed in Refs.~\cite{YLi_PauseScheme_PhysRevA.77.015403,Jia_2010_OpticalPause}. However, the obtained enantiomeric enrichment is {only about 6\%}~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective,Exp_supersonic,Exp_Cooling_Supersonic}. One of the important factors limiting the obtained enantiomeric enrichment is that {each of the three selected rotational states in the CTLS may have multiple degenerated magnetic sub-levels. That means the considered CTLS will be of multi loops. Thus,} the ability of enantiomeric-specific state transfer will be suppressed~\cite{DPatteson_exp_PhysRevLett.118.123002,Horberger_rotation}. Later on, it was pointed out in the theoretical work~\cite{Y_RealSingleLoop_PhysRevA.98.063401,Koch_Principles_JCP} {that} the real single-loop CTLS of \textcolor{black}{gaseous chiral molecules of asymmetric top} can be constructed by appropriately choosing three optical (microwave) fields. Another important factor limiting the obtained enantiomeric enrichment is the thermal population on the three levels of CTLS. In those experiments~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective,Exp_supersonic,Exp_Cooling_Supersonic}, the CTLS consists of only rotational transitions, whose transition frequencies are usually at microwave wavelengths. Thus, the populations in the three levels will approximately have the same order of magnitude at the typical effective rotational temperature $\sim$10\,K~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective,Exp_supersonic,Exp_Cooling_Supersonic} according to the Boltzmann distribution. This will bring an adverse {influence} on {the efficiency of enantiomeric-specific state transfer based on the CTLS}. \textcolor{black}{In this paper, we aim to evade the adverse {influence} of the thermal population on the enantiomeric-specific state transfer. {For this purpose, we re-construct the desired CTLS of (gaseous) chiral molecules by choosing the ground state and other two excited states to have different vibrational sub-levels. Then the transition frequencies between the ground state of the desired CTLS and the two excited states are much larger than that of the previous ones as used in the experiments~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective, Exp_supersonic,Exp_Cooling_Supersonic}, where all the three states have the same vibrational sub-level. Thus, in the desired CTLS, approximately only the ground state is occupied and the adverse {influence} of the thermal population on the enantiomeric-specific state transfer can be evaded. We use the 1,2-propanediol as an example to demonstrate our idea. Specifically, the vibrational sub-level of the ground state (the two excited states) in the desired CTLS is chosen to be the ground state (first excited state) of the vibrational degree of freedom corresponding to OH-stretch.} The transition frequency between the two chosen vibrational {sub-levels is about $2\pi \times 100.9500$\,THz~\cite{Propanediol_Vib}. It is indeed that} almost only the ground state in the desired CTLS is thermally occupied initially in a wide range of temperature ($0-300$\,K). Thus, the {influence} of the thermal population on the enantiomeric-specific state transfer is evaded.} The structure of this paper is organized as following. In Sec.~\ref{EnantiomerTransfer}, we describe the optical method of the \textcolor{black}{enantiomeric-specific state transfer} based on a dynamic operation of ultrashort pulses. In Sec.~\ref{ro-vibrationalStates}, we investigate the influence of finite temperature on the \textcolor{black}{enantiomeric-specific state transfer}, and compare the obtained state-specific enantiomeric enrichment via ro-vibrational transitions with that in the same vibrational case {via purely rotational transitions}. Finally, we summarize the conclusions in Sec.~\ref{Conclution}. \section{dynamic operation of ultrashort pulses}\label{EnantiomerTransfer} We now consider the CTLS of a chiral molecule coupled with three classical electromagnetic (optical or microwave) fields as shown in Fig.~\ref{fig:Structure-Pulse}(a). Then the Hamiltonian for the system in the interaction picture with respect to $H_{0}^{Q}=\sum_{n}\hbar\omega_{n}\vert n\rangle_{Q}{}_{Q}\langle n\vert$ reads \begin{equation} H^{Q}(t)=\sum_{m>n=1}^{3}\hbar\Omega_{nm}^{Q}(t)e^{i\Delta_{mn}t}\vert n\rangle_{Q}{}_{Q}\langle m\vert+\mathrm{H.c}.,\label{eq:General_Hamiltonian} \end{equation} where $\hbar\omega_{n}$ is the eigen-energy of state (level) $\vert n\rangle_Q$ with $Q=L$ ($Q=R$) denoting the left-handed (right-handed) chiral molecule. The detuning for the transition $\left\vert m\right\rangle _{Q}\rightarrow\left\vert n\right\rangle _{Q}$ is defined as $\Delta_{mn}=\nu_{mn}-\omega_{m}+\omega_{n}$, where $\nu_{mn}$ is the frequency of the classical electromagnetic field coupling to the corresponding transition with the coupling strength (also called Rabi frequency) $\Omega_{mn}^{Q}(t)$. We can specify the chirality-dependence of our model via choosing the coupling strengths of the left- and right-handed molecules as~\cite{Shapiro_OpticalSwitch_PhysRevLett.90.033001,Shapiro_PopulationTransfer_PhysRevLett.87.183002,CY_ACStark,YLi_PauseScheme_PhysRevA.77.015403} $\Omega_{mn}^{L}(t)=\Omega_{mn}(t)$, $\Omega_{13}^{R}(t)=-\Omega_{13}(t)$, $\Omega_{12}^{R}(t)=\Omega_{12}(t)$, and $\Omega_{23}^{R}(t)=\Omega_{23}(t)$. \textcolor{black} That is, the overall phase in the CTLS differs with $\pi$ for the two enantiomers: $\phi_R = \phi_L + \pi$, as seen in Fig.~\ref{fig:Structure-Pulse}(a).} \begin{figure} \centering{}\includegraphics[scale=0.4]{StructurePulse} \caption{(Color online) (a) Model of CTLSs for left- and right-handed molecules. The three-level system is resonantly coupled to the three classical fields with coupling strengths $\pm\Omega_{13}$, $\Omega_{12}$, and $\Omega_{23}$, respectively. \textcolor{black}{{The overall phase is depicted along the circle arrow with $ \phi_L $ and $ \phi_R $ for left- and right-handed molecules, respectively. They satisfy $\phi_R=\phi_L+\pi$}.} (b) Schematic representation of ultrashort optical pulses to achieve perfect \textcolor{black}{enantiomeric-specific state transfer} with the molecule initially prepared in the ground state, e.g. $\vert1\rangle_{Q}$. The related coupling strengths satisfy $\int_{t_{0}}^{t_{A}}\Omega_{13}(t)\ dt=\pi/4=\int_{t_{A}}^{t_{B}}\Omega_{0}(t)\ dt/2=-\int_{t_{B}}^{t_{C}}\Omega_{13}(t)\ dt$ with $\Omega_{23}(t)=\vert\Omega_{23}(t)\vert=-i\Omega_{12}(t)=\Omega_{0}(t)/\sqrt{2}$. \label{fig:Structure-Pulse}} \end{figure} In the following, we will briefly give the protocol of dynamic operation of ultrashort pulses~\cite{YLi_PauseScheme_PhysRevA.77.015403} for the enantiomeric-specific state transfer, which is very similar to that of current experiments~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective,Exp_supersonic, Exp_Cooling_Supersonic}. As depicted in Fig.~\ref{fig:Structure-Pulse}(b), this protocol consists of three steps. In each step, the transitions of interest $ \ket{m}_Q\rightarrow\ket{n}_Q $ are driven resonantly, i.e. $\Delta_{mn}=0$. In step A, only the pump pulse $\Omega_{13}(t)$ is turned on. The corresponding Hamiltonian reads $H_{A}^{Q}(t)=\hbar\Omega_{13}^{Q}(t)(\vert1\rangle_{Q}{}_{Q}\langle3\vert+\mathrm{H.c.)}$ by assuming coupling strength $ \Omega_{13}^{Q}$. By controlling the pulse to make it satisfy $\int_{t_{0}}^{t_{A}}\Omega_{13}(t)\,dt=\pi/4$, a general state (density matrix) $\rho_{0}^{Q}$ at time $t_{0}$ will evolve to $\rho_{A}^{Q}=U_{A}^{Q}\rho_{0}^{Q}U_{A}^{Q\dagger}$ at time $t_{A}$ according to the unitary evolution operator $U_{A}^{Q}=\exp(-i\int_{t_{0}}^{t_{A}}H_{A}^{Q}\,dt/\hbar)$. In the basis \{$\vert1\rangle_{Q}$, $\vert2\rangle_{Q}$, $\vert3\rangle_{Q}$\}, the unitary evolution operators $U_{A}^{Q}$ are \begin{equation} U_{A}^{L}=\left(\begin{array}{ccc} \frac{1}{\sqrt{2}} & 0 & -\frac{i}{\sqrt{2}}\\ 0 & 1 & 0\\ -\frac{i}{\sqrt{2}} & 0 & \frac{1}{\sqrt{2}} \end{array}\right),\ U_{A}^{R}=\left(\begin{array}{ccc} \frac{1}{\sqrt{2}} & 0 & \frac{i}{\sqrt{2}}\\ 0 & 1 & 0\\ \frac{i}{\sqrt{2}} & 0 & \frac{1}{\sqrt{2}} \end{array}\right).\label{eq:Translation_Operators} \end{equation} In step B, we turn off the pump pulse $\Omega_{13}$ [i.e. $\Omega_{13}(t)=0$] and introduce two ultrashort pulses $\Omega_{12}(t)$ and $\Omega_{23}(t)$ with $\Omega_{23}(t)=\vert\Omega_{23}(t)\vert=-i\Omega_{12}(t)\equiv\Omega_{0}(t)/\sqrt{2}$. The Hamiltonian for this step reads $H_{B}^{Q}(t)=\hbar\Omega_{0}(t)(\vert D\rangle_{Q}{}_{Q}\langle2\vert+\mathrm{H.c.})$ with $\vert D\rangle_{Q}=(i\vert1\rangle_{Q}+\vert3\rangle_{Q})/\sqrt{2}$. Under the condition $\int_{t_{A}}^{t_{B}}\Omega_{0}(t)\,dt=\pi/2$, the state will go to $\rho_{B}^{Q}=U_{B}^{Q}\rho_{A}^{Q}U_{B}^{Q\dagger}$ with the unitary evolution operators \begin{equation} U_{B}^{L}=U_{B}^{R}=\left(\begin{array}{ccc} \frac{1}{2} & \frac{1}{\sqrt{2}} & -\frac{i}{2}\\ -\frac{1}{\sqrt{2}} & 0 & -\frac{i}{\sqrt{2}}\\ \frac{i}{2} & -\frac{i}{\sqrt{2}} & \frac{1}{2} \end{array}\right) \end{equation} in the basis \{$\vert1\rangle_{Q}$, $\vert2\rangle_{Q}$, $\vert3\rangle_{Q}$\}. The step C is realized by taking $\Omega_{12}(t)=\Omega_{23}(t)=0$ and re-turning on the pump pulse $\Omega_{13}(t)$. The pump pulse $\Omega_{13}(t)$ fulfills $\int_{t_{B}}^{t_{C}}\Omega_{13}(t)\,dt=-\pi/4$ [or equivalently $(k+3/4)\pi$ with integer $ k $]. Then, the final state reads $\rho_{C}^{Q}=U_{C}^{Q}\rho_{B}^{Q}U_{C}^{Q\dagger}$ with the unitary evolution operators \begin{equation} U_{C}^{L}=\left(\begin{array}{ccc} \frac{1}{\sqrt{2}} & 0 & \frac{i}{\sqrt{2}}\\ 0 & 1 & 0\\ \frac{i}{\sqrt{2}} & 0 & \frac{1}{\sqrt{2}} \end{array}\right),U_{C}^{R}=\left(\begin{array}{ccc} \frac{1}{\sqrt{2}} & 0 & -\frac{i}{\sqrt{2}}\\ 0 & 1 & 0\\ -\frac{i}{\sqrt{2}} & 0 & \frac{1}{\sqrt{2}} \end{array}\right). \end{equation} With the above three operational steps, the initial state $\rho_{0}^{Q}$ will go to the final one $\rho_{C}^{Q}=U_{Q}\rho_{0}^{Q}U_{Q}^{\dagger}$ with the total unitary evolution operator $U_{Q}=U_{C}^{Q}U_{B}^{Q}U_{A}^{Q}$ given as \begin{equation} U_{L}=\left(\begin{array}{ccc} 1 & 0 & 0\\ 0 & 0 & -i\\ 0 & -i & 0 \end{array}\right),\ U_{R}=\left(\begin{array}{ccc} 0 & 1 & 0\\ -1 & 0 & 0\\ 0 & 0 & 1 \end{array}\right).\label{eq:Left_Handed_Rotation} \end{equation} This indicates that the two enantiomers will suffer different evolutions even when their initial states have the same form. Specially, $U_{L}$ will exchange the populations of left-handed molecules in states $\left|2\right\rangle _{L}$ and $\left|3\right\rangle _{L}$, while $U_{R}$ will exchange the populations of right-handed molecules in states $\left|1\right\rangle _{R}$ and $\left|2\right\rangle _{R}$. When the above protocol is applied to the chiral mixture composed of chiral molecules in the two ground states $ \left|1\right\rangle _{Q} $, the perfect enantiomeric-specific state transfer is achieved according to Eq.~(\ref{eq:Left_Handed_Rotation}), since the {initial} state $\left|1\right\rangle _{L}$ will evolve back to itself and the {initial} state $\left|1\right\rangle _{R}$ in the meanwhile will be transferred to $ \left|2\right\rangle _{R} $. After that, the left- and right-handed molecules in {different-energy} states can be further spatially separated by a variety of energy-dependent processes~\cite{Shapiro_OpticalSwitch_PhysRevLett.90.033001,Shapiro_PopulationTransfer_PhysRevLett.87.183002,Vitan_Shortcut_PhysRevLett.122.173202}. \section{Transition Between Different Ro-vibrational States} \label{ro-vibrationalStates} As discussed in the above section, the perfect enantiomeric-specific state transfer can be achieved if the left- and right-handed molecules has been initially prepared in the ground state $ \ket{1}_Q $ of the CLTS. \textcolor{black}{In experiments, the effective rotational temperature of chiral mixture is usually cooled to be $\sim$10\,K with recent \textcolor{black}{technologies}, such as buffer gas cooling~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective,Exp_Cooling_Supersonic} {and} supersonic expansions~\cite{Exp_supersonic,Exp_Cooling_Supersonic}.} The initial thermal population in each state of the CTLS based on purely rotational transitions will have the same order of magnitude. This will bring an adverse {influence} \textcolor{black}{on} achieving perfect enantiomeric-specific state transfer~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective,Exp_supersonic,Exp_Cooling_Supersonic}. Now, we investigate the thermal population influence {on} the enantiomeric-specific state transfer based on {the desired} CTLS of chiral molecules at finite temperature. For the gaseous molecules, the rotational and vibrational degrees of freedom should be taken into account~\cite{Horberger_rotation} by adopting the ro-vibrational state~\cite{Horberger_rotation,Koch_Principles_JCP} \begin{equation} \left\vert \psi\right\rangle =\left\vert \psi_{\mathrm{vib}}\right\rangle \vert\psi_{\mathrm{rot}}\rangle\label{state}, \end{equation} \textcolor{black}{with the product form of the vibrational state $\vert\psi_{\mathrm{vib}}\rangle$ and the rotational state $\vert\psi_{\mathrm{rot}}\rangle$. Here, {we have taken the rigid-rotor approximation~\cite{BooK_AngularMomentum}, which means the coupling between vibrational and rotational states under field-free conditions can be neglected. This assumption is available for some kinds of chiral molecules, but is not available for some others. In this paper, our discussions focus only on the case where the rigid-rotor approximation is available.}} \subsection{Enantiomeric-specific state transfer at presence of thermal population}\label{ro-vibrationalStates_SSET} In realistic experiments using buffer gas cooling~\cite{DPatteson_exp_PhysRevLett.118.123002,Patterson_Detection,DPatterson_Detection2,Patterson_Detection3,Patterson_Detection4,Patterson_Detection5}, the vibrational relaxation cross sections of molecule-buff gas are usually smaller than rotational ones. This indicates the effective vibrational temperature $T_{\mathrm{vib}}$ of chiral molecules is typically higher than the effective {rotational} temperature $T_{\mathrm{rot}}$ \cite{DPatterson_Cooling_MolPhys,DPatterson_Cooling_PRA,Koch_Cooling_arXiv}. Accordingly, we assume that the effective rotational temperature to be $T_{\mathrm{rot}}\sim$10\,K and the effective vibrational temperature $ T_{\mathrm{vib}}=300$\,K. For the three-level system, the initial thermal population in the ro-vibrational state $\left\vert n\right\rangle _{Q}$ with the eigen-energy $\hbar\omega_{n}=\hbar(\omega_{n,\mathrm{vib}}+\omega_{n,\mathrm{rot}})$ has the Boltzmann-distribution form \begin{equation} p_{n}=\frac{1}{Z}\mathcal{P}_{n,\mathrm{vib}}\mathcal{P}_{n,\mathrm{rot}}.\label{eq:Boltzmann_Distribution} \end{equation} Here, the factor $\mathcal{P}_{n,\mathrm{vib}}$ ($\mathcal{P}_{n,\mathrm{rot}}$) is defined as $\mathcal{P}_{n,\mathrm{vib}}=\exp(-\hbar\omega_{n,\mathrm{vib}}/k_{B}T_{\mathrm{vib}})$ {[}$\mathcal{P}_{n,\mathrm{rot}}=\exp(-\hbar\omega_{n,\mathrm{rot}}/k_{\mathrm{B}}T_{\mathrm{rot}})${]} with the vibrational (rotational) eigen-energy $\hbar\omega_{n,\mathrm{vib}}$ ($\hbar\omega_{n,\mathrm{rot}}$), and $Z=\sum_{n=1}^{3}\mathcal{P}_{n,\mathrm{vib}}\mathcal{P}_{n,\mathrm{rot}}$ \textcolor{black}{is} the partition function. The initial state \textcolor{black}{of the CTLS for enantiomers} reads \begin{equation} \rho_{\mathrm{0}}^{Q}=p_{1}\left\vert 1\right\rangle _{QQ}\left\langle 1\right\vert +p_{2}\left\vert 2\right\rangle _{QQ}\left\langle 2\right\vert +p_{3}\left\vert 3\right\rangle _{QQ}\left\langle 3\right\vert, \end{equation} with $p_1+p_2+p_3=1$. By means of the dynamic operation of ultrashort pulses as discussed in the above section, the states $\rho_{0}^{L,R}$ for enantiomers will evolve differently under the different evolution operators $U_{L,R}$. Then the final state for the left-handed molecules is given as \begin{align} \rho_{C}^{L} & =p_{1}\left\vert 1\right\rangle _{LL}\left\langle 1\right\vert +p_{3}\left\vert 2\right\rangle _{LL}\left\langle 2\right\vert +p_{2}\left\vert 3\right\rangle _{LL}\left\langle 3\right\vert ,\label{eq:Final_L} \end{align} and the final state for the right-handed molecules will go to \begin{equation} \rho_{C}^{R}=p_{2}\left\vert 1\right\rangle _{RR}\left\langle 1\right\vert +p_{1}\left\vert 2\right\rangle _{RR}\left\langle 2\right\vert +p_{3}\left\vert 3\right\rangle _{RR}\left\langle 3\right\vert .\label{eq:Final_R} \end{equation} By comparing Eq.~(\ref{eq:Final_L}) with Eq.~(\ref{eq:Final_R}), there are different populations in energy-degenerated states $\left\vert n\right\rangle _{L}$ and $\left\vert n\right\rangle _{R}$ $ (n=1,2,3) $. Then, the (imperfect) enantiomeric-specific state transfer has been achieved. Specially, we now focus on the populations in \textcolor{black}{the state $\left\vert 2\right\rangle $ by introducing the} enantiomeric excess~\cite{Book_ChiralAnalysis,CY_ACStark,YY_Chen} \begin{align} \begin{split} \epsilon&=\left|\frac{\rho_{C,2}^L-\rho_{C,2}^R}{\rho_{C,2}^L+\rho_{C,2}^R}\right|=\left|\frac{p_3-p_1}{p_3+p_1}\right|,\\ &=\left|1-\frac{2}{1+\frac{\mathcal{P}_{1,\mathrm{vib}}}{\mathcal{P}_{3,\mathrm{vib}}}\times\frac{\mathcal{P}_{\mathrm{1,rot}}}{\mathcal{P}_{\mathrm{3,rot}}}}\right|\label{eq:Enantiomeric_Excess-1}, \end{split} \end{align} with $ \rho_{C,2}^{Q}={}_{Q}\langle2\vert\rho_{C}^{Q}\left\vert 2\right\rangle _{Q} $. It gives the excess of one enantiomer over the other in the state $\left\vert 2\right\rangle $. The perfect enantiomeric-specific state transfer is achieved, when the state $ \ket{2} $ is occupied by enantio-pure molecules with $\epsilon=100\% $. For the selected three states of the CTLS with same vibrational state $(\omega_{1,\mathrm{vib}}=\omega_{2,\mathrm{vib}}=\omega_{3,\mathrm{vib}})$, $\epsilon$ will be only dependent on the rotational transition frequency $(\omega_{3,\mathrm{rot}}-\omega_{1,\mathrm{rot}})$. If we choose different vibrational states with $\omega_{1,\mathrm{vib}}\neq\omega_{3,\mathrm{vib}}$, the ratio $(\mathcal{P}_{1,\mathrm{vib}}/\mathcal{P}_{3,\mathrm{vib}})$, which is usually much larger than 1, will bring an enormously contribution to get a much higher $\epsilon$. This offers the \textcolor{black}{possibility} of evading the thermal population influence \textcolor{black}{on} enantiomeric-specific state transfer by introducing ro-vibrational transitions in the CTLS. \subsection{Examples of 1,2-propanediol} Particularly, we will demonstrate the above idea \textcolor{black}{by using chiral molecules of 1,2-propanediol as an example}. \textcolor{black}{Such molecules {have been considered in the experimental works of enantiomeric-specific state transfer~\cite{DPatteson_exp_PhysRevLett.118.123002} and} enantiodiscrimination~\cite{Patterson_Detection,Patterson_Detection3}.} The rotational constants for 1,2-propanediol molecules are $A/2\pi=8.5244$\,GHz, $B/2\pi=3.6354$\,GHz, and $C/2\pi=2.7887$ GHz \cite{Propanediol_R}. The corresponding three ro-vibrational states are selected as $\vert1\rangle=\vert g\rangle\vert J_{\tau M}=0_{00}\rangle$, $\left\vert 2\right\rangle =\left\vert e\right\rangle \left\vert 1_{01}\right\rangle $, and $\left\vert 3\right\rangle =\left\vert e\right\rangle \left\vert 1_{10}\right\rangle $~\cite{Y_RealSingleLoop_PhysRevA.98.063401,Koch_Principles_JCP}, where $\vert g\rangle$ and $\left\vert e\right\rangle $ are, respectively, the vibrational lowest and first-excited states for the motion of OH-stretch with the transition frequency $\omega_{\mathrm{vib}}/2\pi=100.9500$\,THz~\cite{Propanediol_Vib}. Here, we have adopted the $\left\vert J_{\tau M}\right\rangle $ nomenclature to designate the rotational states of asymmetric-top molecules. $J$ is the total angular momentum, $\tau$ runs from $-J$ to $J$ in unit step in order of ascending energy, and $M$ is the magnetic quantum number \cite{BooK_AngularMomentum} corresponding to the degenerated magnetic sub-levels. Figure~\ref{fig:Structure_Pop}(a) displays the CTLS of 1,2-propanediol for the case of ro-vibrational transitions. The corresponding initial thermal population with different rotational temperature $ T_\mathrm{rot} $ for each selected state of the CTLS is numerically shown in Fig.~\ref{fig:Structure_Pop}(c) at the effective vibrational temperature $T_{\mathrm{vib}}=300$\,K according to Eq.~(\ref{eq:Boltzmann_Distribution}). As the vibrational transition frequency of OH-stretch is about $2\pi\times100.9500$\,THz, there will be little initial thermal occupation for the excited states even at high rotational temperature (e.g. $ T_{\mathrm{rot}}=300 $\,K). In other words, among the selected three states $ \ket{1} $, $ \ket{2} $, and $ \ket{3} $ in the CTLS, we can assume that \textcolor{black}{initially} only the ground state $ \ket{1} $ is thermally populated. \begin{figure}[h] \centering \includegraphics[scale=0.23]{StrucPops} \caption{(Color online) The CTLS of 1,2-propanediol for (a) the case of ro-vibrational transitions among $\vert1\rangle=\vert g\rangle\vert J_{\tau M}=0_{00}\rangle$, $\vert2\rangle=\vert e\rangle\vert1_{01}\rangle$, and $\vert3\rangle=\vert e\rangle\vert1_{10}\rangle$; (b) the case of purely rotational transitions among $\vert1\rangle=\vert g\rangle\vert 0_{00}\rangle$, $\vert2\rangle=\vert g\rangle\vert1_{01}\rangle$, and $\vert3\rangle=\vert g\rangle\vert1_{10}\rangle$. Here, $\vert g\rangle$ and $\left\vert e\right\rangle $ are, respectively, the vibrational lowest and first-excited states for the vibrational motion of OH-stretch with the corresponding vibrational transition frequency $\omega_{\mathrm{vib}}/2\pi=100.9500$\,THz. By choosing three special polarized electromagnetic fields, the real single loop CTLS come true~\cite{Y_RealSingleLoop_PhysRevA.98.063401,Koch_Principles_JCP}. Panels (c) and (d) show the thermal populations of the three levels in the CTLS versus the effective rotational temperature with the effective vibrational temperature $T_{\mathrm{vib}}=300$\,K according to the cases (a) and (b), respectively. \label{fig:Structure_Pop}} \end{figure} As a comparison, we consider the case \textcolor{black}{of purely rotational transitions in the CTLS }with the same vibrational state $\left\vert \psi_{\mathrm{vib}}\right\rangle =\left\vert g\right\rangle $. The rotational transitions among $\vert1\rangle=\vert g\rangle\vert 0_{00}\rangle$, $\vert2\rangle=\vert g\rangle\vert1_{01}\rangle$, and $\vert3\rangle=\vert g\rangle\vert1_{10}\rangle$ \textcolor{black}{of the CTLS are displayed by Fig.~\ref{fig:Structure_Pop}(b), and the corresponding thermal populations are shown in Fig.~\ref{fig:Structure_Pop}(d).} As expected, the excited states $\left\vert 2\right\rangle =\vert g\rangle\vert1_{01}\rangle$ and $\left\vert 3\right\rangle =\vert g\rangle\vert1_{10}\rangle$ have a considerable population at the typical rotational temperature $T_{\mathrm{rot}}= 10$\,K in experiments. \begin{figure}[H] \centering \includegraphics[scale=0.3]{EE} \caption{(Color online) The enantiomeric excess \textcolor{black}{for the case of ro-vibrational transitions {(red dashed line)} or purely rotational transitions {(blue solid line)}} as a function of rotational temperature $T_{\mathrm{rot}}$ with vibrational temperature $T_{\mathrm{vib}}=300$\,K. \textcolor{black}{ The other parameters} are the same as those in Fig.~\ref{fig:Structure_Pop}. \label{fig:Enantiomeric_Excess}} \end{figure} For the racemic mixture of chiral molecules, the initial thermal populations \textcolor{black}{in the states $ \ket{n}_L $ and $ \ket{n}_R $ will be the same}. According to the method of the dynamic operation of ultrashort pulses as discussed in Sec.~\ref{ro-vibrationalStates_SSET}, the enantiomeric-specific state transfer can be realized. Specifically, we give the enantiomeric excess $\epsilon$ to depict the obtained state-specific enantiomeric enrichment. The enantiomeric excess $\epsilon$ as a function of rotational temperature $T_{\mathrm{rot}}$ with vibrational temperature $ T_{\mathrm{vib}}=300 $\,K is shown in Fig.~\ref{fig:Enantiomeric_Excess}. {It shows the enantiomeric excess $\epsilon$ is nearly $100\%$ (see the blue solid line in Fig.~\ref{fig:Enantiomeric_Excess}) for the case of ro-vibrational transitions \textcolor{black} with the effective rotational temperature $ T_\mathrm{rot} $ in a wide temperature range, even at $ 300 $\,K. However, for the case of purely rotational transitions, $\epsilon$ will rapidly decrease when $ T_{\mathrm{rot}}\gtrsim 0.1 $\,K (see the red dashed line in Fig.~\ref{fig:Enantiomeric_Excess}). For instance, at $T_{\mathrm{rot}}=10$\,K, which is near to} the cooled rotational temperature achieved in {the} experiment {for the chiral molecules of 1,2-propanediol~\cite{DPatteson_exp_PhysRevLett.118.123002}}, $\epsilon$ is only {about $2\%$}. \subsection{{Ratio of pure enantiomers to the chiral mixture}} Based on the chiral-molecule CTLS composed of ro-vibrational transitions instead of purely rotational ones, \textcolor{black}{we have shown above that} the thermal population influence \textcolor{black}{on} enantiomeric-specific state transfer is negligible. In the realistic case, \textcolor{black}{besides the selected three states (i.e., $\vert1\rangle=\vert g\rangle\vert 0_{00}\rangle$, $\left\vert 2\right\rangle =\left\vert e\right\rangle \left\vert 1_{01}\right\rangle $, and $\left\vert 3\right\rangle =\left\vert e\right\rangle \left\vert 1_{10}\right\rangle $) in the desired CTLS}, the other states out of the CTLS will also be thermally occupied. For the left- or right-handed molecules, we can introduce $P_{n}$ ($ n=1,2,3 $) to describe the proportion of state $\vert n\rangle$ to the related total population as \begin{equation} P_{n}=\frac{1}{Z_{\mathrm{tot}}}\mathcal{P}_{n,\mathrm{vib}}\mathcal{P}_{n,\mathrm{rot}}, \end{equation} \textcolor{black}{where $ Z_{\mathrm{tot}}=\sum_{j}\mathcal{P}_{j,\mathrm{vib}}\mathcal{P}_{j,\mathrm{rot}} $ is the total partition function \textcolor{black}{with $j$ summing for all the states $\ket{v}\ket{J_{\tau_M}}$.} Here $\ket{v}$ represents the vibrational ground state $\ket{g}$, vibrational first excited state $\ket{e}$, and vibrational higher-energy excited ones. } \textcolor{black}{The proportions $ P_n $ of the selected ro-vibrational states $\vert 1 \rangle$, $\vert 2 \rangle$, and $\vert 3 \rangle$ are shown in Fig.~\ref{fig:PY-Times}(a). When $ T_\mathrm{rot}\le 0.1$\,K, $ P_1 $ approximates to 1 and $ P_{2,3} $ approximates to 0, which means most molecules are in the ground state of the CTLS. {Then, after a single operation of enantiomeric-specific state transfer as given in Sec.~\ref{ro-vibrationalStates_SSET}, most right-handed molecules will occupy $ \ket{2}_R $, while the left-handed molecules will be approximately not populated in $ \ket{2}_L $. Moreover, via the energy-dependent spatially separated processes~\cite{Shapiro_OpticalSwitch_PhysRevLett.90.033001,Shapiro_PopulationTransfer_PhysRevLett.87.183002,Vitan_Shortcut_PhysRevLett.122.173202}, the pure enantiomers with nearly all the right-handed molecules can be obtained from the chiral mixture. When $ T_\mathrm{rot}> 0.1$\,K, the total proportions in the CTLS $ (P_1+ P_2 +P_3 \simeq P_1 $) decrease rapidly with the increase of the temperature. For an example, at $ T_\mathrm{rot}=10 $\,K, $ P_1 \simeq 0.1\% $ ($ P_2+P_3\simeq0 $). Then, only 0.1\% pure enantiomers with right-handed molecules can be obtained.} } \begin{figure}[H] \centering{}\includegraphics[scale=0.3]{ProportionPercent}\caption{(Color online) (a) The proportion for the selected three states $\vert1\rangle$ {(black dashed line), $\vert2\rangle$ (red solid line), and $\vert3\rangle$ (blue dotted line) when all of the other vibrational and rotational states out of the CTLS are considered}; (b) The \textcolor{black}{ratio of pure enantiomers} to the racemic mixture at different rotational temperature $T_{\mathrm{rot}}$. The other parameters are the same as those in Fig.~\ref{fig:Structure_Pop}. \label{fig:PY-Times}} \end{figure} \textcolor{black}{It is clearly that the ratio of the obtained pure enantiomers to the chiral mixture, $\eta$, is determined by the initial population in $ \ket{1}_R $. Specifically, we have} \begin{equation} \mathcal{\eta}=\frac{1}{2}P_1, \end{equation} where the factor $ 1/2 $ results from the fact that the racemic mixture consists of equal amounts of left- and right-handed molecules. \textcolor{black}{Accordingly, we show {in Fig.~\ref{fig:PY-Times}(b) the ratio $ \eta $ at different rotational temperature $T_{\mathrm{rot}}$.} When the rotational temperature $T_{\mathrm{rot}}> $0.1\,K, the ratio $ \eta $ will decrease rapidly. In order to get more pure enantiomers from the chiral mixture, the rotational temperature should be further lowered and/or the \textcolor{black}{processes }of the enantiomeric-specific state transfer as well as the subsequent spatial separation should be repeated.} \section{Conclusion\label{Conclution}} In conclusion, we have theoretically explored the thermal population influence \textcolor{black}{on} the enantiomeric-specific state transfer based on the CTLS of chiral molecules by considering the ro-vibrational transitions rather than purely rotational transitions. Correspondingly, two infrared pulses and one microwave pulse are used to respectively couple with the ro-vibrational and rotational transitions. {This scheme was first proposed for enantiomeric-specific state transfer in Ref.~\cite{Koch_Principles_JCP}. Besides the promising features of this scheme emphasized in Ref.~\cite{Koch_Principles_JCP},} we have thoroughly discussed its advantage in evading thermal population influence \textcolor{black}{on the} enantiomeric-specific state transfer over {the three-microwave-pulses scheme} by coupling purely rotational transitions with the example of 1,2-propanediol. The adverse {influence} of thermal population in \textcolor{black}{other methods of } enantioseparation~\cite{Jia_2010_OpticalPause,Effective_two_level_Model, Vitan_Shortcut_PhysRevLett.122.173202,YLi_SpatialSepatation_PhysRevLett.99.130403, LiXuan_SpatialSeparation,Koch_Principles_JCP,QuantumControl} and enantiodiscrimination~\cite{WZJ_Detection,Patterson_Detection,DPatterson_Detection2, Patterson_Detection3,YY_Chen,CY_ACStark,Lobsiger,Shubert,Delta} based on the CTLS can also be evaded by adopting our similar idea. Usually, the ro-vibrational transition momenta corresponding to infrared pulses are typically smaller than the rotational transition momenta corresponding to microwave pulses. Since the intensity of experimental available \textcolor{black}{infrared} pulse will be much stronger than that of microwave pulse, the magnitude of the coupling strengths of these three transitions in our scheme can be comparable~\cite{Koch_Principles_JCP,Diastereomer}. \textcolor{black}{It is worth noting that {the operation time of enantiomeric-specific state transfer based on the CTLS} can be about $ 700 $~ns in experiments~\cite{DPatteson_exp_PhysRevLett.118.123002}. {That means such a method} is implementable comparing with the relaxation time $ 6~\mu $s~\cite{DPatteson_exp_PhysRevLett.118.123002}}. In addition, the precise control of relative phases of the three fields plays an important role for enantiomeric-specific {state} transfer, which has been realized experimentally in the three-microwave-pulses scheme~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective, Exp_supersonic,Exp_Cooling_Supersonic}. As for the scheme {by considering the ro-vibrational transitions}, it had been theoretically proposed in Ref.~\cite{Koch_Principles_JCP} that the precise control of relative phases of the three fields may be realized by phase-locking two infrared pulses to a common reference standard (e.g., frequency comb) controlled by a microwave reference pulse. Moreover, the polarizations of the three \textcolor{black}{electromagnetic }pulses can not \textcolor{black}{be} in the same plane when the molecular rotations are considered~\cite{Y_RealSingleLoop_PhysRevA.98.063401,Koch_Principles_JCP}. This will bring the phase-matching problem in realistic cases and eventually reduce the achieved enantiomeric enrichment greatly~\cite{KKLehmann2}. In experiments~\cite{DPatteson_exp_PhysRevLett.118.123002,Exp_Coherent_Enantiomer_Selective, Exp_supersonic,Exp_Cooling_Supersonic}, phase-matching condition is approximately satisfied, when the length scale of the practical excitation volumes is much smaller than the largest wavelength of three applied fields driving the chiral molecules~\cite{KKLehmann2}. Considering this, {our} scheme with the largest wavelength in the micreowave region has the advantage over the three-infrared-pulses scheme which can be also used to evade thermal population influence in enantiomeric-specific state transfer. \section*{ACKNOWLEDGMENTS} This work was supported by the National Key R\&D Program of China grant (2016YFA0301200), the Science Challenge Project (under Grant No. TZ2018003) and the Natural Science Foundation of China (under Grants No. 11774024, No. 11534002, No. U1930402, and No. 11947206). \bibliographystyle{apsrev4-1}
\section{Introduction} The natural image matting is one of the important tasks in computer vision. It has a variety of applications in image or video editing, compositing and film post-production \cite{wang2008image,aksoy2017designing,lutz2018alphagan,xu2017deep,samplenet}. Matting has received significant interest from the research community and been extensively studied in the past decade. Alpha matting refers to the problem that separating a foreground object from the background and estimating transitions between them. The result of image matting is a prediction of alpha matte which represents the opacity of a foreground at each pixel. \begin{figure}[t] \centering \includegraphics[width = 0.95\columnwidth]{10261offset.pdf} \caption{The visualization of our guided contextual attention map. Top row from left to right, the image, trimap and ground-truth. Second row, the alpha matte prediction, attention offset map from first GCA block in the encoder, offset from GCA block in the decoder.} \label{fig:offset} \end{figure} Mathematically, the natural image $ I $ is defined as a convex combination of foreground image $ F $ and background image $ B $ at each pixel $ i $ as: \begin{equation} I_i = \alpha_iF_i + (1-\alpha_i)B_i, \quad \alpha_i \in [0,1], \label{eq:matting} \end{equation} where $ \alpha_i $ is the alpha value at pixel $ i $ that denotes the opacity of the foreground object. If $ \alpha_i $ is not $ 0 $ or $ 1 $, then the image at pixel $ i $ is mixed. Since the foreground color $ F_i $, background color $ B_i $ and the alpha value $ \alpha_i $ are left unknown, the expression of alpha matting is ill-defined. Thus, most of the previous hand-crafted algorithms impose a strong inductive bias to the matting problem. One of the basic idea widely adopted in both affinity-based and sampling-based algorithms is to borrow information from the image patches with similar appearance. Affinity-based methods \cite{levin2008closed,chen2013knn,aksoy2017designing} borrow the opacity information from known patches with the similar appearance to unknown ones. Sampling-based approaches \cite{wang2007optimized,gastal2010shared,he2011global,feng2016cluster} borrow a pair of samples from the foreground and background to estimate the alpha value at each pixel in the unknown region based on some specific assumption. One obstacle of the previous affinity-based and sampling-based methods is that they cannot handle the situation that there are only background and unknown areas in the trimap. It is because that these methods have to make use of both foreground and background information to estimate the alpha matte. Benefiting from the Adobe Image Matting dataset \cite{xu2017deep}, more learning-based image matting methods \cite{xu2017deep,lutz2018alphagan,lu2019indices,samplenet} has emerged in recent years. Most of learning-based approaches use network prior as the inductive bias and predict alpha mattes directly. Moreover, SampleNet \cite{samplenet} proposed to leverage deep inpainting methods to generate foreground and background pixels in the unknown region rather than select from the image. It provides a combination of the learning-based and sampling-based approach. In this paper, we propose a novel image matting method based on the opacity propagation in a neural network. The information propagation has been widely adopted within the neural network framework in recent years, from natural language processing \cite{vaswani2017attention,yang2019xlnet}, data mining \cite{kipf2016semi,velivckovic2017graph} to computer vision \cite{yu2018generative,wang2018non}. SampleNet Matting \cite{samplenet} indirectly leveraged the contextual information for foreground and background inpainting. In contrast, our proposed method conducts information flow from the image context to unknown pixels directly. We devise a guided contextual attention module, which mimic the affinity-based propagation in a fully convolutional network. In this module, the low-level image features are used as a guidance and we perform the alpha feature transmission based on the guidance. We show an example of our guided contextual attention map in Figure \ref{fig:offset} and more details in the section of results. In the guided contextual attention module, features from two distinct network branches are leveraged together. The information of both known and unknown patches are transmitted to feature patches in the unknown region with similar appearance. \begin{figure*}[t] \centering \includegraphics[width = 0.9\textwidth]{10261arch1.pdf} \caption{Overview of our proposed guided contextual attention matting framework. The baseline model shares the same architecture without GCA blocks and image feature block. Original image and trimap are the inputs of alpha feature. Image feature block and GCA blocks only takes the original merged image as input. The blue arrows denote alpha feature flow and yellow arrows denote low-level image feature flow. GCA: guided contextual attention; SN: spectral normalization; BN: batch normalization; $ \times N $: replicate $ N $ times.} \label{fig:arch} \end{figure*} Our proposed method can be viewed from two different perspectives. On one hand, the guided contextual attention can be elucidated as an affinity-based method for alpha matte value transmission with a network prior. Unknown patches share high-level alpha features with each other under the guidance of similarity between low-level image features. On the other hand, the proposed approach can also be seen as a guided inpainting task. In this aspect, image matting task is treated as an inpainting task on the alpha image under the guidance of input image. The unknown region is analogous to the holes to be filled in image inpainting. Unlike inpainting methods which borrows pixels from background of the same image, image matting borrows pixel value $ 0 $ or $ 1 $ from the known area in the alpha matte image under the guidance of original RGB image to fill in the unknown region. \section{Related Work} In general, natural image matting methods can be classified into three categories: sampling-based methods, propagation methods and learning-based methods. Sampling-based methods \cite{wang2007optimized,gastal2010shared,he2011global,feng2016cluster} solve combination equation \eqref{eq:matting} by sampling colors from foreground and background regions for each pixel in the unknown region. The pair of foreground and background samples are selected under different metrics and assumptions. Then the initial alpha matte value is calculated by the combination equation. Robust Matting \cite{wang2007optimized} selected samples along the boundaries with confidence. The matting function was optimized by a Random Walk. Shared Matting \cite{gastal2010shared} selected the best pairs of samples for a set of neighbor pixels and reduced much of redundant computation cost. In Global Matting \cite{he2011global}, all samples available in image were utilized to estimate the alpha matte. The sampling was achieve by a randomized patch match algorithm. More recently, CSC Matting \cite{feng2016cluster} collected a set of more representative samples by sparse coding to avoid missing out true sample pairs. Propagation methods \cite{levin2008closed,chen2013knn,aksoy2017designing}, which are also known as affinity-based methods, estimate alpha mattes by propagating the alpha value from foreground and background to each pixel in the unknown area. The Closed-form Matting \cite{levin2008closed} is one of the most prevailing algorithm in propagation-based methods. It solved the cost function under the constraint of local smoothness. KNN Matting \cite{chen2013knn} collected matching nonlocal neighborhoods globally by K nearest neighbors. Moreover, the Information-flow Matting \cite{aksoy2017designing} proposed a color-mixture flow which combined the local and nonlocal affinities of colors and spatial smoothness. Due to the tremendous success of deep convolutional neural networks, learning-based methods achieve a dominate position in recent natural image matting \cite{cho2016natural,xu2017deep,lutz2018alphagan,lu2019indices,samplenet}. DCNN Matting \cite{cho2016natural} is the first method that introduced a deep neural network into image matting task. It made use of the network to learn a combination of results from different previous methods. Deep Matting \cite{xu2017deep} proposed a fully neural network model with a large-scale dataset for learning-based matting methods, which was one of the most significant work in deep image matting. Following Deep Matting, AlphaGan \cite{lutz2018alphagan} explored the deep image matting within a generative adversarial framework. More subsequent work like SampleNet Matting \cite{samplenet} and IndexNet \cite{lu2019indices} with different architectures also yielded appealing alpha matte estimations. \section{Baseline Network for Deep Image Matting} Our proposed model uses the guided contextual attention module and a customized U-Net \cite{ronneberger2015u} architecture to perform deep natural image matting. We first construct our customized U-Net baseline for matting, then introduce the proposed guided contextual attention (GCA) module. \subsection{Baseline Structure} The U-Net \cite{ronneberger2015u} like architecture are prevailing in recent matting tasks \cite{lutz2018alphagan,samplenet,lu2019indices} as well as image segmentation \cite{long2015fully}, image-to-image translation \cite{isola2017image} and image inpainting \cite{liu2018image}. Our baseline model shares almost the same network architecture with guided contextual attention framework in Figure \ref{fig:arch}. The only difference is that the baseline model replaces GCA blocks with identity layers and has no image feature block. The input to this baseline network is a cropped image patch and a 3-channel one-hot trimap which are concatenated as a 6-channel input. The output is corresponding estimated alpha matte. The baseline structure is built as an encoder-decoder network with stacked residual blocks \cite{he2016deep}. Since the low-level features play a crucial role in retaining the detailed texture information in alpha mattes, in our customized baseline model, the decoder combines encoder features just before upsampling blocks instead of after each upsampling block. Such a design can avoid more convolutions on the encoder features, which are supposed to provide lower-level feature. We also use a two layer short cut block to align channels of encoder features for feature fusion. Moreover, in contrast to the typical U-Net structure which only combines different middle-level features, we directly forward the original input to the last convolutional layer through a short cut block instead. These features do not share any computation with the stem. Hence, this short cut branch only focuses on detailed textures and gradients. In addition to the widely used batch normalization \cite{ioffe2015batch}, we introduce the spectral normalization \cite{miyato2018spectral} to each convolutional layer to add a constraint on Lipschitz constant of the network and stable the training, which is prevalent in image generation tasks \cite{brock2018large,zhang2018self}. \subsection{Loss Function} Our network only leverages one alpha prediction loss. The alpha prediction loss is defined as an absolute difference between predicted and ground-truth alpha matte averaged over the unknown area: \begin{equation} \mathcal{L} = \frac{1}{|\mathcal{U}|} \sum_{i\in \mathcal{U}}|\hat{\alpha_i}-\alpha_i|, \end{equation} where $ \mathcal{U} $ indicates the region labeled as unknown in the trimap, $ \hat{\alpha_i}$ and $\alpha_i $ denote the predicted and ground-truth value of alpha matte as position $ i $. There are some losses proposed in prior work for the deep image matting tasks, like compositional loss \cite{xu2017deep}, gradient loss \cite{samplenet} and Gabor loss \cite{li2019inductive}. Compositional loss used in Deep Matting \cite{xu2017deep} is the absolute difference between the original input image and predicted image composited by the ground-truth foreground, background and the predicted alpha mattes. The gradient loss calculates the averaged absolute difference between the gradient magnitude of predicted and ground-truth alpha mattes in the unknown region. Gabor loss proposed in \cite{li2019inductive} substitutes the gradient operator with a bundle of Gabor filters and aims to have a more comprehensive supervision on textures and gradients than gradient loss. We delve into these losses to reveal whether involving different losses can benefit the alpha matte estimation in our baseline model. We provide an ablation study on Composition-1k testing set \cite{xu2017deep} in Table \ref{tab:ablation}. As Table \ref{tab:ablation} shows, the use of compositional loss does not bring any notable difference under MSE and Gradient error, and both errors increase when we incorporate the gradient loss and alpha prediction loss. Although the adoption of Gabor loss can reduce the Gradient error to some degree, it also slightly increases the MSE. Consequently, we only opt for the alpha prediction loss in our model. \begin{table}[t] \caption{Ablation study on data augmentation and different loss functions with baseline structure. The quantitative results are tested on Composition-1k testing set. Aug: data augmentation; Rec: alpha prediction loss; Comp: compositional loss; GradL: gradient loss; Gabor: Gabor loss.} \centering \small \begin{tabular}{ccccc|cc} \toprule Aug&Rec&Comp&GradL&Gabor& MSE & Grad\\% & SAD &Conn \midrule \checkmark&\checkmark&&& & 0.0106 & 21.53 \\ \checkmark&\checkmark&\checkmark&&& 0.0107 & 21.85\\% & 40.85 & 38.73 \checkmark&\checkmark&&\checkmark& & 0.0108 & 22.51\\ \checkmark&\checkmark&&&\checkmark & 0.0109 & 20.66\\ &\checkmark&&& & 0.0146 & 32.01 \\%& 51.15& 51.52 \bottomrule \end{tabular} \label{tab:ablation} \end{table} \subsection{Data Augmentation} Since the most dominant image matting dataset proposed by \citeauthor{xu2017deep} only contains 431 foreground objects for training. We treat the data augmentation as a necessity of our baseline model. We introduce a sequence of data augmentation. Firstly, following the data augmentation in \cite{samplenet}, we randomly select two foreground object images with a probability of 0.5 and combine them to obtain a new foreground object as well as a new alpha image. Subsequently, the foreground object and alpha image will be resized to $ 640 \times640 $ images with a probability of 0.25. In this way, the network can nearly see the whole foreground image instead of a cropped snippet. Then, a random affine transformation are applied to the foreground image and the corresponding alpha image. We define a random rotation, scaling, shearing as well as the vertical and horizontal flipping in this affine transformation. Afterwards, trimaps are generated by a dilation and an erosion on alpha images with random number of pixels ranging from 5 to 29. With the trimap obtained, we randomly crop one $ 512\times512 $ patch from each foreground image, corresponding alpha and trimap respectively. All of the cropped patches are centered on an unknown region. The foreground images are then converted to HSV space, and different jitters are imposed to the hue, saturation and value. Finally, we randomly select one background image from MS COCO dataset \cite{lin2014microsoft} for each foreground patch and composite them to get the input image. To demonstrate the effectiveness of data augmentation, we conduct an experiment with minimal data augmentation. In this case, only two necessary operations, image cropping and trimap dilation are retained. More augmentations like random image resize and flipping, which are widely used in most of previous deep image matting methods \cite{xu2017deep,lutz2018alphagan,samplenet,lu2019indices}, are not included in this experiment. We treat this experiment setting as no data augmentation. The experimental results are also listed in Table \ref{tab:ablation}. We can see that without additional augmentation, our baseline model already achieves comparable performance with Deep Matting. \section{Guided Contextual Attention Module} The guided contextual attention module contains two kinds of components, an image feature extractor block for low-level image feature and one or more guided contextual attention blocks for information propagation. \begin{figure}[t] \centering \includegraphics[width = 0.95\columnwidth]{10261block.pdf} \caption{The illustration of the guided contextual attention block. Computation is implemented as a convolution or a deconvolution. Two additional $ 1\times1 $ convolutional layers for adaptation are not shown in this figure to keep neat. One is applied to the input image feature before extracting patches, and the other one is applied to the result of propagation before the element-wise summation.} \label{fig:gca} \end{figure} \subsection{Low-level Image Feature} Most of the affinity-based approaches have a basic inductive bias that local regions with almost identical appearance should have similar opacity. This inductive bias allows the alpha value propagates from the known region of a trimap to the unknown region based on affinity graph, which can often yields impressive alpha matte prediction. Motivated by this, we define two different feature flows in our framework (Figure \ref{fig:arch}): alpha feature flow (blue arrows) and image feature flow (yellow arrows). Alpha features are generated from the 6-channel input which is a concatenation of original image and trimap. The final alpha matte can be predicted directly from alpha features. Low-level image features contrast with the high-level alpha features. These features are generated only from the input image by a sequence of three convolutional layer with stride 2, which are analogous to the local color statistics in conventional affinity-based methods. In other words, the alpha feature contains opacity information and low-level image feature contains appearance information. Given both opacity and appearance information, we can build an affinity graph and carry out opacity propagation as affinity-based methods. Specifically, we utilize the low-level image feature to guide the information flow on alpha features. \subsection{Guided Contextual Attention} Inspired by the contextual attention for image inpainting proposed in \cite{yu2018generative}, we introduce our guided contextual attention block. As shown in Figure \ref{fig:gca}, the guided contextual attention leverages both the image feature and alpha feature. Firstly, the image feature are divided into known part and unknown part and $ 3\times3 $ patches are extracted from the whole image feature. Each feature patch represents the appearance information at a specific position. We reshape the patches as convolutional kernels. In order to measure the correlation between an unknown region patch $ U_{x,y} $ centered on $ (x,y)$ and an image feature patch $ I_{x', y'} $ centered on $ (x',y') $ , the similarity is defined as the normalized inner product: \begin{equation} s_{(x,y), (x',y')} = \begin{cases} \lambda \quad &(x,y)=(x',y');\\ \langle \frac{U_{x, y}}{\|U_{x, y}\|},\frac{I_{x', y'}}{\|I_{x', y'}\|}\rangle \quad &\mathrm{otherwise}, \end{cases} \end{equation} where $ U_{x, y}\in\mathcal{U}$ is also an element of the image feature patch set $ \mathcal{I} $, i.e. $ \mathcal{U} \subseteq \mathcal{I} $. The constant $ \lambda $ is a punishment hyperparameter that we use $ -10^4 $ in our model, which can avoid a large correlation between each unknown patch and itself. In implementation, this similarity is computed by a convolution between unknown region features and kernels reshaped from image feature patches. Given the correlation, we carry out a scaled softmax along $ (x',y') $ dimension to attain the guided attention score for each patch as following, \begin{equation} a_{(x,y), (x',y')} = \mathrm{softmax}(w(\mathcal{U}, \mathcal{K}, x',y')s_{(x,y), (x',y')}), \end{equation} \begin{equation} w(\mathcal{U}, \mathcal{K}, x',y') = \begin{cases} \mathrm{clamp}(\sqrt{\frac{|\mathcal{U}|}{|\mathcal{K}|}}) \quad I_{x',y'} \in \mathcal{U};\\ \mathrm{clamp}(\sqrt{\frac{|\mathcal{K}|}{|\mathcal{U}|}}) \quad I_{x',y'} \in \mathcal{K}, \end{cases} \label{eq:weight} \end{equation} \begin{equation} \mathrm{clamp}(\phi) = \mathrm{min}(\mathrm{max}(\phi, 0.1), 10), \end{equation} in which $ w(\cdot) $ is a weight function and $ \mathcal{K} = \mathcal{I}-\mathcal{U}$ is the set of image feature patches from known region. As distinct from image inpainting task, the area of unknown region in a trimap is not under control. In many input trimaps, there are overwhelming unknown region and scarcely any known pixel. Thus, typically it is not feasible that only propagate the opacity information from the known region to unknown part. In our guided contextual attention, we let the unknown part borrow features from both known patches and unknown ones. Different weights are assigned to known and unknown patches based on the area of each region as the weight function defined in Eq. \eqref{eq:weight}. If the area of known region is larger, the known patches can convey more accurate appearance information which exposes the difference between foreground and background, hence we weigh known patches with a larger weight. Whereas, if the unknown region has an overwhelming area, the known patches only provide some local appearance information, which may harm the opacity propagation. Then a small weight is assigned to known patches. When we get guided attention scores from image features, we do the propagation on alpha features based on the affinity graph defined by guided attention. Analogous to image features, patches are extracted and reshaped as filter kernels from alpha features. The information propagation is implemented as a deconvolution between guided attention scores and reshaped alpha feature patches. This deconvolution yields a reconstruction of alpha features in the unknown area and the values of overlapped pixels in the deconvolution are averaged. Finally, we combine the input alpha features and the propagation result by an element-wise summation. This element-wise summation works as a residual connection which can stable the training. \begin{table}[t] \caption{The quantitative results on Composition-1k testing set. Best results are emphasized in bold. (- indicates not given in the original paper.)} \small \centering \begin{tabular}{lcccc} \toprule Methods & MSE & SAD & Grad &Conn\\ \midrule Learning Based Matting& 0.048&113.9 &91.6 &122.2\\ Closed-Form Matting &0.091& 168.1 &126.9& 167.9\\ KNN Matting& 0.103& 175.4& 124.1 &176.4\\ Deep Matting & 0.014&50.4& 31.0& 50.8\\ IndexNet Matting & 0.013&45.8& 25.9& 43.7\\ SampleNet Matting& 0.0099 &40.35& -& -\\ \midrule Baseline & 0.0106& 40.62 & 21.53 & 38.43\\ Ours &\textbf{0.0091}& \textbf{35.28}& \textbf{16.92} & \textbf{32.53}\\ \bottomrule \end{tabular} \label{tab:adobe} \end{table} \begin{figure*}[t] \centering \includegraphics[width = 0.95\textwidth]{10261adobe.pdf} \caption{The visual comparison results on Adobe Composition-1k. From left to right, the original image, trimap, ground-truth, Deep Matting \cite{xu2017deep}, IndexNet Matting \cite{lu2019indices}, baseline and ours. } \label{fig:adobe} \end{figure*} \subsection{Network with Guided Contextual Attention} Most of the affinity-based matting methods result in a closed-form solution based on the graph Laplacian \cite{levin2008closed,lee2011nonlocal,chen2013knn}. The closed-form solution can be seen as a fixed point of the propagation or a limitation of infinite propagation iterations \cite{zhou2004learning}. Motivated by this, we stick two guided contextual attention blocks to the encoder and decoder symmetrically in our stem. It aims to propagate more times in our model and take full advantage of the opacity information flow. When we compute the guided contextual attention on higher-resolution features, more detailed appearance information will be attended. However, on the other hand, the computational complexity of the attention block is $ O(c(hw)^2) $, where $ c, h, w $ are the channels, height and width of the feature map respectively. Therefore, we append two guided contextual attention blocks to the stage with $ 64\times64 $ feature maps. The network of our GCA Matting is trained for $ 200,000 $ iterations with a batch size of 40 in total on the Adobe Image Matting dataset \cite{xu2017deep}. We perform optimization using Adam optimizer \cite{kingma2014adam} with $ \beta_1=0.5 $ and $ \beta_2=0.999 $. The learning rate is initialized to $ 4\times 10^{-4} $. Warmup and cosine decay \cite{loshchilov2016sgdr,goyal2017accurate,he2019bag} are applied to the learning rate. \section{Results} In this section we report the evaluation results of our proposed model on two datasets, the Composition-1k testing set and alphamatting.com dataset. Both quantitative and qualitative results are shown in this section. We evaluate the quantitative results under the Sum of Absolute Differences (SAD), Mean Squared Error (MSE), Gradient error (Grad) and Connectivity error (Conn) proposed by \cite{rhemann2009perceptually}. \subsection{Composition-1k Testing Dataset} \begin{table*}[t] \caption{Our scores in the alpha matting benchmark, S, L and U denote the three trimap types, small, large and user, included in the benchmark. (Bold numbers indicate scores which rank the 1st place in the benchmark at the time of submission)} \scriptsize \centering \begin{tabular}{@{\;}l|@{}C{30pt}@{}|*{2}{@{}C{18pt}}@{}C{18pt}@{}*{8}{|@{}C{14pt}@{}C{14pt}@{}C{14pt}@{}}} \toprule \multirow{2}{*}{Gradient Error} & \multicolumn{4}{c|}{Average Rank}&\multicolumn{3}{c|}{Troll}&\multicolumn{3}{c|}{Doll}&\multicolumn{3}{c|}{Donkey}&\multicolumn{3}{c|}{Elephant}&\multicolumn{3}{c|}{Plant}&\multicolumn{3}{c|}{Pineapple}&\multicolumn{3}{c|}{Plastic bag}&\multicolumn{3}{c}{Net}\\ & Overall&S&L&U&S&L&U&S&L&U&S&L&U&S&L&U&S&L&U&S&L&U&S&L&U&S&L&U\\ \midrule Ours& \textbf{5.2}& 5& 4& 6.5& 0.1 & \textbf{0.1} & 0.2 & 0.1 & 0.1 & 0.3 & 0.2 & 0.2 & 0.2 & 0.2 & 0.2 & \textbf{0.3} & 1.3 & 1.6 & 1.9 & 0.7 & 0.8 & 1.4 & \textbf{0.6} & \textbf{0.7} & \textbf{0.6} & 0.4 & 0.4 & 0.4 \\ SampleNet Matting & 7.2& 3.6 &4.4 &13.6&\textbf{0.1} & 0.1 & 0.2 & 0.1 & 0.1 & 0.2 & 0.2 & 0.3 & 0.3 & 0.1 & 0.2 & 0.5 & 1.1 & 1.5 & 2.7 & 0.6 & 0.9 & 1 & 0.8 & 0.9 & 0.9 & 0.4 & 0.4 & 0.4\\ IndexNet Matting&10.3& 8.6& 8.8& 13.6& 0.2 & 0.2 & 0.2 & 0.1 & 0.1 & 0.3 & 0.2 & 0.2 & \textbf{0.2} & 0.2 & 0.2 & 0.4 & 1.7 & 1.9 & 2.5 & 1 & 1.1 & 1.3 & 1.1 & 1.2 & 1.2 & 0.4 & 0.5 & 0.5 \\ AlphaGAN&14.9& 13.6& 12.5& 18.5& 0.2 & 0.2 & 0.2 & 0.2 & 0.2 & 0.3 & 0.2 & 0.3 & 0.3 & 0.2 & 0.2 & 0.4 & 1.8 & 2.4 & 2.7 & 1.1 & 1.4 & 1.5 & 0.9 & 1.1 & 1 & 0.5 & 0.5 & 0.6\\ Deep Matting&15.6& 12& 12.3& 22.5& 0.4 & 0.4 & 0.5 & 0.2 & 0.2 & \textbf{0.2} & \textbf{0.1} & \textbf{0.1} & 0.2 & 0.2 & 0.2 & 0.6 & 1.3 & 1.5 & 2.4 & 0.8 & 0.9 & 1.3 & 0.7 & 0.8 & 1.1 & 0.4 & 0.5 & 0.5 \\ Information-flow matting& 18.3& 21.5& 16.5& 16.8& 0.2 & 0.2 & 0.2 & 0.2 & 0.2 & 0.4 & 0.4 & 0.4 & 0.4 & 0.3 & 0.4 & 0.4 & 1.7 & 1.8 & 2.2 & 0.9 & 1.3 & 1.3 & 1.5 & 1.4 & 0.8 & 0.5 & 0.6 & 0.5 \\ \bottomrule \multicolumn{29}{c}{}\\ \end{tabular} \label{tab:alphamatting} \end{table*} \begin{figure*}[t] \centering \includegraphics[width = \textwidth]{10261alphamatting.pdf} \caption{The alpha matte predictions of the test images from alphamatting.com benchmark. From left to right, the original image, trimap, Information-flow Matting \cite{aksoy2017designing} , Deep Matting \cite{xu2017deep}, AlphaGAN \cite{lutz2018alphagan}, IndexNet Matting \cite{lu2019indices}, SampleNet Matting \cite{samplenet} and ours. } \label{fig:alphamatting} \end{figure*} The Composition-1k testing dataset proposed in \cite{xu2017deep} contains 1000 testing images which are composed from 50 foreground objects and 1000 different background images from Pascal VOC dataset \cite{everingham2015pascal}. We compare our approach and the baseline model with three state-of-the-art deep image matting methods: Deep Matting \cite{xu2017deep}, IndexNet Matting \cite{lu2019indices} and SampleNet Matting \cite{samplenet}, as well as three conventional hand-crafted algorithms: Learning Based Matting \cite{zheng2009learning}, Closed-Form Matting \cite{levin2008closed} and KNN Matting \cite{chen2013knn}. The quantitative results are shown in Table \ref{tab:adobe}. Our method outperforms all of the state-of-the-art approaches. In addition, our baseline model also get better results than some of the top performing methods. The effectiveness of the proposed guided contextual attention can be validated by the results displayed in Table \ref{tab:adobe}. Some qualitative results are given in Figure \ref{fig:adobe}. The results of Deep Matting and IndexNet Matting are generated by source codes and pretrained models provided in \cite{lu2019indices}. As displayed in Figure \ref{fig:adobe}, our approach achieves better performance on different foreground objects, especially in the semitransparent regions. Advantages are more obvious with a larger unknown region. This good performance profits from the information flow between feature patches with similar appearance features. Additionally, our proposed method can evaluate each image in Composition-1k testing dataset as a whole on a single Nvidia GTX 1080 with 8GB memory. Since we take each image as a whole in our network without scaling, the guided contextual attention blocks are applied to feature maps with a much higher resolution than $ 64\times 64 $ in training phase. This results in a better performance in the detailed texture. \subsection{Alphamatting.com Benchmark dataset} The alphamatting.com benchmark dataset \cite{rhemann2009perceptually} has eight different images. For each testing image, there are three corresponding trimaps, namely, "small", "large" and "user". The methods on the benchmark are ranked by the averaged rank over 24 alpha matte estimations in terms of four different metrics. We evaluate our method on the the alphamatting.com benchmark, and show the scores in Table \ref{tab:alphamatting}. Some top approaches in the benchmark are also displayed for comparison. As displayed in Table \ref{tab:alphamatting}, GCA Matting ranks the first place under the Gradient Error metric in the benchmark. The evaluation results of our method under the "large" and "user" trimaps are much better than the other top approaches. The image matting becomes more difficult as the trimap has a larger unknown region. Therefore, we can say that our approach is more robust to changes in the area of unknown region. Additionally, our approach has almost the same overall ranks with the SampleNet under the MSE metric. Generally, the proposed GCA Matting is one of the top performing method on this benchmark dataset. We provide some of the visual examples in Figure \ref{fig:alphamatting}. The results of our method and some top algorithms on "Elephant" and "Plastic bag" are displayed to demonstrate the good performance of our approach. For example, in the test image "Plastic bag", most of the previous methods make a mistake at the iron wire. However, our method learns from the contextual information in the surrounding background patches and predicts these pixels correctly. \subsection{Visualization of Attention Map} We visualize the attention map learned in the guided contextual attention block by demonstrating the pixel position with the largest attention score. Unlike the offset map widely used in optical flow estimation \cite{FlowNet,LiteFlowNet,PWC-Net} and image inpainting \cite{yu2018generative} which indicates the relative displacement of each pixel, our attention map demonstrates the absolute position of the corresponding pixel with highest attention activation. From this attention map, we can easily identify where the opacity information is propagated from for each feature pixel. As we can see in Figure \ref{fig:offset}, there is no information flow in the known region and feature patches in the unknown region tend to borrow information from the patches with similar appearance. Figure \ref{fig:offset} reveals where our GCA blocks attend to physically in the input image. Since there is an adaption convolutional layer in the guided contextual attention block before patch extraction on image features, attention maps from two attention blocks are not identical. The weights of known and unknown part are shown in the top-left corner of the attention map. From the attention offset map in Figure \ref{fig:offset}, we can easily recognize the car in the sieve. The light pink patches at the center of the sieve indicate that these features are propagated from the left part of the car. While blue patches show the features which are borrowed from the right-hand side road. These propagated features will assist in the identification of foreground and background in ensuing convolutional layers. \section{Conclusions} In this paper, we propose to solve the image matting problem by opacity information propagation in an end-to-end neural network. Consequently, a guided contextual attention module is introduced to imitate the affinity-based propagation method by a fully convolutional manner. In the proposed attention module, the opacity information is transmitted between alpha features under the guidance of appearance information. The evaluation results on both Composition-1k testing dataset and alphamatting.com dataset show the superiority of our proposed method. \section{Acknowledgement} This paper is supported by NSFC (No.61772330, 61533012, 61876109), the advanced research project (No.61403120201), Shanghai authentication key Lab. (2017XCWZK01), Technology Committee the interdisciplinary Program of Shanghai Jiao Tong University (YG2015MS43). We also would like to thank the help and support from Versa. {\small \bibliographystyle{aaai}
\section{Introduction} The use of millimeter wave (mmWave) frequencies in access points (APs) becomes a trend in the emerging fifth generation network \cite{andrews2014will,di2015stochastic,jia2016impact,andrews2017modeling,bai2015coverage,rappaport2013millimeter}. Despite the large available bandwidth in mmWave frequencies, the small wavelength experiences a high path loss and a severe penetration loss, which limits the coverage of a single mmWave AP \cite{rappaport2015wideband}. To achieve the same size of network coverage as the sub-6GHz network, the ultra-dense deployment of APs appears to be the solution for mmWave network \cite{jia2016impact,bai2015coverage,alammouri2018sinr}. Note that the topology of sub-6GHz network is relatively simple, where all the APs are connected to the Internet backhaul and each cell is covered by one AP in the network \cite{andrews2011tractable}. However, owing to its ultra-density, only a small portion of APs in the mmWave network have direct access to the Internet backhaul. Other mmWave APs are used as relays to extend the coverage for the network, as shown in Fig.\ref{Figure: sub-tier structure} \cite{jia2016impact}. Accordingly, the topology of mmWave AP network varies with different multihop transmission protocols, which lead to different network performances. Several aspects of the ultra-dense mmWave AP network have been studied. In \cite{andrews2017modeling}, the mmWave modeling was comprehensively studied. The hybrid precoding for mmWave network was proposed in \cite{alkhateeb2015limited}. In \cite{jia2016impact}, the optimal intensity of the ultra-dense mmWave AP network was derived under the impact of blockage. The SINR coverage probability and rate analysis for mmWave networks were presented in \cite{di2015stochastic,bai2015coverage}. We remark that all the previous work assumed mmWave APs to be uniformly distributed in the mmWave network. Such an assumption has been validated for the sub-6GHz network \cite{andrews2011tractable}. However, the ultra-density of mmWave APs results in a complicated and flexible network topology, which cannot be captured by simply applying a uniformly distributed spatial model. We approach the topology of ultra-dense mmWave AP network by introducing the tiered model, rather than modeling the network as a whole. In the tiered mmWave AP network, the backhaul-connected APs are considered as the $0^{\text{th}}$ tier. Other AP tiers in the mmWave network are used as relay, which extend the coverage of backhaul-connected APs to the whole network. Note that the spatial distribution of backhaul-connected APs is determined by the infrastructure. However, the AP locations in other tiers are decided by the topological structures of previous tiers and the transmission protocol. Consequently, the topology of mmWave AP network has large flexibility and is dependent on the transmission protocol. Our key contribution is to analyze the performance of ultra-dense mmWave AP network with considering the impact of transmission protocol. Specifically, we analyze how the hybrid precoding scheme affects the performance of ultra-dense mmWave AP network. Note that the implementation of hybrid precoding combines the analog beamforming and baseband spatial multiplexing \cite{alkhateeb2015limited}. In this paper, we focus on the impact of spatial multiplexing on the performance of mmWave AP networks. In section II, we first introduce the tiered structure for the mmWave APs. We then derive the topology of mmWave AP network concerning the different spatial multiplexing gains in Section III. The performance analysis is provided in section IV, where we characterize the latency, the coverage probability and the throughput for the mmWave AP network. \section{Tiered Model of mmWave APs} \begin{figure*} \vspace*{-20pt} \centering \begin{minipage}{1\columnwidth} \raggedleft \subfloat[{\scriptsize } \label{Figure: Sub-teri1}]{% \includegraphics[width=0.25\linewidth]{figs/ISIT_Sub-tiers1.pdf}} \subfloat[{\scriptsize }\label{Figure: Sub-teri2}]{% \includegraphics[width=0.25\linewidth]{figs/ISIT_Sub-tiers2.pdf}} \subfloat[{\scriptsize } \label{Figure: Sub-teri3}]{% \includegraphics[width=0.25\linewidth]{figs/ISIT_Sub-tiers3.pdf}} \subfloat[{\scriptsize }\label{Figure: Sub-teri4}]{% \includegraphics[width=0.25\linewidth]{figs/ISIT_Sub-tiers4.pdf}} \end{minipage} \caption{The mmWave AP network with multihop transmission protocol: (a) the whole AP network including backhaul-connect APs (tier 0) at blue squares, relay APs with hop count 1 (tier 1) at yellow dots, relay APs with hop count 2 (tier 2) at green dots; (b) transmission hop 1 from tier 0 to tier 1; (c) a subset of tier 1 (highlight in red circle) scheduled to transmit at hop 2; (d) transmission hop 2 from tier 1 to tier 2.} \label{Figure: sub-tier structure} \vspace*{-15pt} \end{figure*} The mmWave APs have an inherently tiered structure due to the multihop protocol operated in the network, as shown in Fig.\ref{Figure: sub-tier structure}. Therefore, instead of modeling the whole network, we model the spatial distribution of mmWave APs for each transmission hop. The APs directly connected to the backhaul are defined as the $0^{\text{th}}$ tier. The other mmWave APs are used as relay, which can be further divided into multiple tiers with respect to 'the distance' to the $0^{\text{th}}$ tier. In the mmWave AP network, we measure the distance of an AP to tier 0 by the number of relays between the AP and tier $0$, which is termed as hop count. Based on the hop count, the $i^{\text{th}}$ AP tier or tier $i$ is defined as the subset of mmWave APs with hop count equal to $i$. Consider a mmWave AP network of density $\Lambda_{\text{A}}$, where the transmission protocol contains $M$ hops. It follows that mmWave APs can be divided into $M+1$ tiers, namely one backhaul-connected tier and $M$ relay tiers. The locations of mmWave APs in tier $i$ are modeled by the point process $\Phi_i = \{x_1,x_2,\cdots\}$, $x_j \in \mathbb{R}^2$. We then define the sequence of point processes $\{\Phi_i\}_{i=0}^M$ as the topology of the mmWave AP network. Note that the locations of backhaul-connected mmWave APs are restricted by the network infrastructure. Thus, we model tier 0 by a homogeneous Poison point process (PPP) $\Phi_0$ with intensity $\Lambda_0$. Unlike tier 0, the spatial distribution of $\Phi_{i+1}$ is determined by the point process $\Phi_i$ and the transmission protocol applied in the mmWave AP network. Denote $\phi_i$ as the subset of $\Phi_i$, where $\phi_i$ consists of the APs which are scheduled to transmit at hop $i+1$. For the $i+1^{\text{th}}$ transmission hop, the AP located at $x \in \phi_i$ transmits to a cluster of points $\mathcal{B}_i^x =\{y_1,y_2,\cdots\}$, where $\mathcal{B}_i^x$ is centered at $x$. It follows that tier $i+1$ can be expressed as $\Phi_{i+1} = \bigcup_{x\in \phi_i}\, {\mathcal{B}_i^x}$. Here, the points of $\mathcal{B}_i^x$ are assumed to be independently and identically distributed (i.i.d.) around the cluster center $x$. \section{Topology of mmWave AP network} Assume that the hybrid precoding is implemented at the mmWave APs, which consists of analog beamforming and spatial multiplexing. Note that analog beamforming is mandatory for a mmWave AP to combat the high path loss. However, spatial multiplexing is required only when the mmWave AP needs to support multiple data streams. \begin{defn}{\textbf{Spatial Multiplexing Gain.}} The spatial multiplexing gain for a mmWave AP is defined as the number of data streams supported by the AP. \end{defn} Assume the mmWave AP to be equipped with $K$ RF chains. Then the spatial multiplexing gain of the mmWave AP is upper bounded by $K$. Let all the transmitters of the same hop employ the identical hybrid precoding process. It follows that all APs in $\phi_i$ have the same spatial multiplexing gain, which is denoted by $k_i$. Next, we characterize the topology of mmWave AP network with respect to the spatial multiplexing gain $k_i$. \subsection{Topology with Spatial Multiplexing Disabled} Given that the spatial multiplexing is disabled, we then have $k_i = 1, \forall i$. It implies that for each $x \in \phi_i$, the cluster $\mathcal{B}_i^x$ contains only one point $y \in \Phi_{i+1}$, where the probability density function (PDF) of $y$ conditioning on $x$ is denoted by $f_i(y|x)$. Assume that the mmWave APs in $\phi_i$ transmit at the same power. Let each AP of tier $i+1$ be deployed to receive the maximum average power from $\phi_i$. Given that $\phi_i$ is a PPP, we then derive the conditional PDF $f_i(y|x)$. \begin{lem} In a multihop mmWave AP network, assume $x \in \phi_i$ and $y \in \Phi_{i+1}$ to be a pair of transmitter and receiver at the $i+1^{\text{th}}$ hop. If $\phi_i$ is a PPP with intensity $\lambda_i$, then $y$ is isotropically distributed around $x$ with the conditional PDF: \begin{eqnarray} f_i(y|x) &= & f_{\text{L}}(y|x) e^{-2 \pi {\lambda_i} \int_{0}^{|y-x|^{\alpha_{\text{L}}/\alpha_{\text{N}}}}P_{\text{N}}(r)r \, \text{d}r} \;\;+ \; f_{\text{N}}(y|x)e^{-2 \pi {\lambda_i} \int_{0}^{|y-x|^{\alpha_{\text{N}}/\alpha_{\text{L}}}}P_{\text{L}}(r)r \, \text{d}r}, \label{eq: probability of connecting to distance z} \end{eqnarray} where \begin{eqnarray} f_{\text{L}}(y|x) = 2 \pi |y-x| {\lambda_i} P_{\text{L}}(|y-x|) e^{-2 \pi {\lambda_i} \int_{0}^{|y-x|}P_{\text{L}}(r)rdr} \; , \nonumber\\ f_{\text{N}}(y|x) = 2 \pi |y-x| {\lambda_i} P_{\text{N}}(|y-x|) e^{-2 \pi {\lambda_i} \int_{0}^{|y-x|}P_{\text{N}}(r)rdr}. \nonumber \end{eqnarray} Here, the constant $\alpha_{\text{L}}$ and $\alpha_{\text{N}}$ represent the path loss exponent for line-of-sight (LOS) and non-line-of-sight (NLOS) mmWave link, respectively. $P_{\text{L}}(r)$ refers to the probability with that a mmWave link of length $r$ is LOS. It follows the NLOS probability $P_{\text{N}}(r) = 1 - P_{\text{L}}(r)$. \label{Lemma - sub-tier with ki=1} \end{lem} \begin{proof} We start to derive the PDF of the distance from $y \in \Phi_{i+1}$ to its nearest LOS AP in $\phi_{i}$. Without loss of generality, let $y$ be the origin of the coordinate system. Denote the disc of radius $z$ centered at the origin as $\mathcal{D}^z_o$. Following the network model, the APs in $\phi_{i}$ which are LOS to the origin form an inhomogeneous PPP $\phi_\text{iL}$ with density $\lambda_{\text{iL}}(z) = \lambda_{\text{i}} P_{\text{L}}(z)$. Thus the null probability of $\phi_{\text{iL}}$ in $\mathcal{D}^z_o$ is given by $\mathbb{P}(\phi_{\text{iL}} \cap \mathcal{D}^z_o=\emptyset) = e^{-2\pi \int_{0}^{z} {x \lambda_{\text{iL}}(r)} \text{d}r}$. The PDF of $z$ for $\phi_{\text{iL}}$ can then be derived as \begin{equation} f_{\text{L}}(z) = \frac{\text{d} (1 - \mathbb{P}(\phi_{\text{iL}} \cap \mathcal{D}^z_o=\emptyset)) }{\text{d} z } = 2 \pi z \lambda_i P_{\text{L}}(z) e^{-2 \pi \lambda_i \int_{0}^{z}P_{\text{L}}(r)rdr}. \label{proofeq: f_L(z)} \end{equation} The PDF of $z$ for NLOS APs in $\phi_{i}$ i.e. $\phi_{\text{iN}}$ can be obtained by the same steps, where \begin{equation} f_{\text{N}}(z) = \frac{\text{d} (1 - \mathbb{P}(\phi_{\text{iN}} \cap \mathcal{D}^z_o=\emptyset)) }{\text{d} z } = 2 \pi z \lambda_i P_{\text{N}}(z) e^{-2 \pi \lambda_i \int_{0}^{z}P_{\text{N}}(r)rdr}. \label{proofeq: f_N(z)} \end{equation} Following the Bayes' rule, we have $\mathbb{P}\left( x_0 \in \phi_{\text{iL}} \;\boldsymbol{|}\; |x_0| = z \right) \propto {f( |x_0| = z \; \boldsymbol{|} \; x_0\in\phi_{\text{iL}}) \mathbb{P}(x_0 \in \phi_{\text{iL}})}$ and $\mathbb{P}\left( x_0 \in \phi_{\text{iN}} \;\boldsymbol{|}\; |x_0| = z \right) = {f( |x_0| \propto z \; \boldsymbol{|} \; x_0\in\phi_{\text{iN}}) \mathbb{P}(x_0 \in \phi_{\text{iN}})}$. The deductions of $\mathbb{P}(x_0 \in \phi_{\text{iL}})$ and $\mathbb{P}(x_0 \in \phi_{\text{iN}})$ follow the similar steps in \cite[Theorem 2]{bai2015coverage}. In \cite[Theorem 3]{bai2015coverage}, $f( |x_0| = z \; \boldsymbol{|} \; x_0\in\phi_{\text{iL}}) $ and $f( |x_0| = z \; \boldsymbol{|} \; x_0\in\phi_{\text{iN}}) $ are derived as a function of $f_\text{L}(z)$ in (\ref{proofeq: f_L(z)}) and $f_\text{N}(z)$ in (\ref{proofeq: f_N(z)}). \end{proof} Lemma \ref{Lemma - sub-tier with ki=1} implies that each point $y \in \Phi_{i+1}$ can be considered as the isotropic displacement of some point $x \in \phi_i$, where the distance between $y$ and $x$ follows the PDF $f_i(y|x)$ in (\ref{eq: probability of connecting to distance z}). It follows from \cite{haenggi2012stochastic} that if $\phi_i$ is a homogeneous PPP, then $\Phi_{i+1}$ is a PPP with the same intensity of $\phi_{i}$. Consider a mmWave AP network of density $\Lambda_{\text{A}}$, where all APs are scheduled to transmit to the following tier i.e. $\phi_i = \Phi_i$, $\forall i$. By repeatedly using the displacement property of the PPP \cite{haenggi2012stochastic}, the topology of mmWave AP network can then be written as $\{\Phi_i\}_{i=0}^M$, where $\Phi_{i}$ is a homogeneous PPP of intensity $\Lambda_0$, $\forall i$. It follows that the total number of transmission hops $M = \frac{\Lambda_{\text{A}}}{\Lambda_0}-1$. Note that $\bigcup_{i=0}^M \Phi_i$ is the superposition of $M+1$ homogeneous PPPs, thus is also a homogeneous PPP. It implies that the mmWave APs are uniformly distributed in the network if the spatial multiplexing at APs is disabled by the transmission protocol. \begin{figure} \vspace*{-15pt} \centering \subfloat[{\scriptsize The total number of transmission hops equal to $M = 12$. The spatial multiplexing gain for each hop $k_i = 1$.} \label{Figure: AP topology with ki = 1}]{% \includegraphics[width=0.48\linewidth]{figs/Topology_PPP.pdf}} \hfill \subfloat[{\scriptsize The total number of transmission hops equal to $M = 2$. The spatial multiplexing gain for each hop $k_i = 6$.}\label{Figure: AP topology with ki = 6}]{% \includegraphics[width=0.48\linewidth]{figs/Topology_PCP.pdf}} \caption{The spatial distribution of mmWave APs in the network with spatial multiplexing disabled (left) and enabled (right).} \label{Figure: AP topology} \vspace*{-15pt} \end{figure} \subsection{Topology with Spatial Multiplexing Enabled} By enabling the spatial multiplexing of APs in $\phi_i$, the cluster $\mathcal{B}_i^x, x\in\phi_{i}$ becomes a sequence of i.i.d. points $\{y_1,\cdots,y_{k_i}\}$ with the PDF $f_i(y_j|x)$. Following Lemma \ref{Lemma - sub-tier with ki=1}, if $\phi_i$ is a PPP of intensity $\lambda_i$, then $y_j$ is isotropically located around $x$ with $f_i(y_j|x)$ in (\ref{eq: probability of connecting to distance z}). We remark that the location distribution of $y_j$ only depends on $x$, which is irrelevant to the size of $\mathcal{B}_i^x$. For tier $i+1$, the mmWave APs are spatially distributed following the point process $\Phi_{i+1} = \bigcup_{x\in \phi_i}\;\mathcal{B}_i^x$. Given that $\phi_i$ is a PPP of intensity $\lambda_i$, we then have that $\Phi_{i+1}$ is a Poisson cluster process (PCP), more specifically, a Neyman-Scott process with intensity $\Lambda_{i+1} = k_i \lambda_i$ \cite{haenggi2012stochastic}. Note that $\Phi_{i}$ is a collection of clusters $\mathcal{B}_{i-1}^x$ with size $k_{i-1}$. Let $\phi_i$ be generated by taking one point from each cluster $\mathcal{B}_{i-1}^x, x\in\phi_{i-1}$. It follows from Lemma \ref{Lemma - sub-tier with ki=1} that if $\phi_{i-1}$ is a PPP, then $\phi_{i}$ is a PPP, where $\phi_{i}$ and $\phi_{i-1}$ are of the same intensity. Note that $\Phi_0$ represents the transmitters at hop 1, which is a PPP of intensity $\Lambda_0$. Therefore, each $\phi_{i}$ is a PPP with intensity $\Lambda_0$. It follows that $\Phi_{i+1}$ is a Neyman-Scott point process with intensity $ k_i\Lambda_0$ for all $i$. In Fig.\ref{Figure: AP topology with ki = 6}, we illustrate the spatial distribution of mmWave APs with spatial multiplexing enabled. Note that the mmWave AP networks in Fig.\ref{Figure: AP topology with ki = 1} and Fig.\ref{Figure: AP topology with ki = 6} are of the same density $\Lambda_{\text{A}}$. Moreover, tier 0 is assumed to be identical for the two AP networks. However, the spatial multiplexing is disabled in Fig.\ref{Figure: AP topology with ki = 1}. It can be observed from Fig.\ref{Figure: AP topology} that given $k_i = 1, \forall i$, the mmWave relays are uniformly distributed in the area. By enabling the spatial multiplexing, the locations of mmWave relays become clustering. Such a clustering pattern is consistent with the distribution of Neyman-Scott point process. \section{Performance of mmWave AP Network} To characterize the impact of spatial multiplexing on the throughput, we first derive the latency and coverage probability for the mmWave AP network. Note that the latency of mmWave AP network indicates the delay of packet transmission. While the reliability of packet transmission can be captured by the coverage probability. \subsection{Network Latency} In a mmWave AP network, tier $0$ is always the source tier for a packet, whereas the destination of the packet can be a mmWave AP in any tier. Note that the delay of a packet depends on the hop count from the source AP to the destination AP. Accordingly, the worst-case delay of a packet is equivalent to the maximum hop count of APs in the network. It follows that the latency of a mmWave AP network can be defined as the total number of transmission hops $M$ in the network. \begin{thm} For a mmWave AP network of density $\Lambda_{\text{A}}$, the latency $M$ is bounded by \begin{equation} \frac{\Lambda_{\text{A}}}{K\Lambda_0} - \frac{1}{K} \leq M \leq \frac{\Lambda_{\text{A}}}{\Lambda_0} - 1, \end{equation} where $\Lambda_0$ is the intensity of tier 0. Each mmWave AP is equipped with $K$ RF chains, thus $K$ represents the maximum spatial multiplexing gain for each transmission hop. \label{thm: network latency} \end{thm} \begin{proof} The network latency $M$ satisfies $\sum_{i=1}^{M} \Lambda_{i} = \Lambda_{\text{A}} - \Lambda_0$. Note that $ \Lambda_0 \leq \Lambda_{i} \leq K\Lambda_0$, the result immediately follows. \end{proof} Theorem \ref{thm: network latency} demonstrates that the latency of mmWave AP network decreases linearly with the increase of spatial multiplexing gain. Note that the network latency reaches its upper bound when the spatial multiplexing is disabled. By setting the spatial multiplexing gain to $K$ for each transmission hop, the minimum latency of mmWave AP network can be achieved. \subsection{Coverage probability} To calculate the coverage probability for tier $i+1$, we need to first derive the signal-to-interference-noise ratio (SINR) for APs in $\Phi_{i+1}$. Note that $\phi_{i}$ and $\Phi_{i+1}$ represent the transmitters and receivers of the $i+1^{\text{th}}$ transmission hop, respectively. At hop $i+1$, the hybrid precoding is employed by two stages \cite{andrews2017modeling}. In the first stage, the mmWave AP located at $x \in \phi_{i}$ assigns a unique analog beam to each AP in $\mathcal{B}_i^x$. Denote $\theta_{\text{A}}$ as the main lobe width of the analog beam, where the beamforming gains within and outside the main lobe are denoted by $G_{\text{A}}$ and $g_{\text{A}}$, respectively. We use $\mathbb{G}(k_i)$ to denote the transceiver beamforming gain between two APs. It follows that $\mathbb{G}(k_i)$ equals to $G_{\text{A}}^2$, $G_{\text{A}}g_{\text{A}}$ and $g_{\text{A}}^2$ with probabilities $\left( \frac{\theta_{\text{A}}k_i}{2\pi} \right)^2$, $\frac{\theta_{\text{A}}k_i}{\pi} \left( 1 - \frac{\theta_{\text{A}}k_i}{2\pi} \right) $ and $ \left( 1 - \frac{\theta_{\text{A}}k_i}{2\pi} \right)^2$, respectively. In the second stage of hybrid precoding, the spatial multiplexing is performed in the baseband, where the AP at $x \in \phi_{i}$ transmits a different data stream for each $y \in \mathcal{B}_i^x$ as well as cancels the inter-stream interference. Let a randomly selected AP at $y \in \Phi_{i+1}$ be the origin of the coordinate system, where $y$ belongs to the cluster $\mathcal{B}_i^x$. It follows that the coordinate of $x$ is translated to $x_0 = x - y$. The SINR of the AP at the origin can then be expressed as \begin{eqnarray} \text{SINR}(k_i) \triangleq \frac{h_0 G_{\text{A}}^2 \ell(|x_0|)}{\sigma^2 + \mathcal{I}_i(k_i)} = \frac{h_0 G_{\text{A}}^2 \ell(|x_0|)}{\sigma^2 + \sum_{x_b\in\phi_{i}\setminus\{x_0\}}h_b\mathbb{G}_b(k_i)\ell(|x_b|)}, \label{def: SINR distribution} \end{eqnarray} where $h_b$ represents the channel fading from $x_b$ to the origin; $\mathbb{G}_b(k_i)$ is the transceiver beamforming gain between $x_b$ and the origin; $\sigma^2$ denotes the noise power; $\ell(\cdot)$ denotes the path loss of the mmWave link \cite{andrews2017modeling} \begin{equation} \ell(r) = \left\lbrace \begin{split} & \beta r^{-\alpha_{\text{L}}}, \text{with probability}\;P_{\text{L}}(r)\\ & \beta r^{-\alpha_{\text{N}}}, \text{with probability}\;P_{\text{N}}(r) \end{split}, \right. \label{eq: path loss model} \end{equation} where $\beta$ is a constant representing the intercept of path loss model \cite{andrews2017modeling}; the LOS probability $P_{\text{L}}(r)$ and NLOS probability $P_{\text{N}}(r)$ are introduced in Lemma \ref{Lemma - sub-tier with ki=1}. As discussed in Section III, $\phi_{i}$ is formed by taking one point from each cluster of $\Phi_{i}$. Thus, $\phi_{i}$ is always a PPP with intensity $\Lambda_0$ regardless of the intensity of $\Phi_{i}$. It means that the SINR distribution in (\ref{def: SINR distribution}) depends only on $k_i$ and $\tau$. Based on (\ref{def: SINR distribution}), the coverage probability of tier $i+1$ is defined as \begin{equation} \mathcal{C}(\tau,k_i) \triangleq \mathbb{P}(\text{SINR}(k_i)>\tau) \label{def: P_cov} \end{equation} with that the AP in tier $i+1$ has a SINR larger than the threshold $\tau$. To calculate the coverage probability, we first provide the characteristic function of the interference at the origin. Given that the AP at the origin is connected to a LOS AP located at $x_0$, the characteristic function can be written as \begin{eqnarray} \mathcal{L}_{\mathcal{I}_\text{L}}(s,k_i) &= & \exp \left( - 2\pi {\Lambda_0} \int_{|x_0|}^{\infty} \left[ 1-\mathcal{G}_{\text{L}}(s,r,k_i) \right] P_{\text{L}}(r)r \; \text{d}r \right) \nonumber\\ &&\;\;\times \exp \left( - 2\pi {\Lambda_0} \int_{|x_0|^{\alpha_{\text{L}}/ \alpha_{\text{N}}}}^{\infty} \left[ 1-\mathcal{G}_{\text{N}}(s,r,k_i) \right] P_{\text{N}}(r)r \; \text{d}r \right), \label{eq: Laplace transform of LOS} \end{eqnarray} where $s$ is the value on that the characteristic function is evaluated and $\mathcal{G}_{\text{L}}(s,r,k_i) = \mathbb{E}_{h,\mathbb{G}} \left[ e^{- s \beta h \mathbb{G}(k_i) r^{-\alpha_{\text{L}}}} \right]$. If the AP at $x_0$ is in the NLOS state, the characteristic function of the interference is given as \begin{eqnarray} \mathcal{L}_{\mathcal{I}_\text{N}}(s, k_i) &=& \exp \left( - 2\pi {\Lambda_0} \int_{|x_0|}^{\infty} \left[ 1-\mathcal{G}_{\text{N}}(s,r,k_i) \right] P_{\text{N}}(r)r \; \text{d}r \right) \nonumber\\ &&\;\;\times \exp \left( - 2\pi {\Lambda_0} \int_{{|x_0|}^{\alpha_{\text{N}}/ \alpha_{\text{L}}}}^{\infty} \left[ 1-\mathcal{G}_{\text{L}}(s,r,k_i) \right] P_{\text{L}}(r)r \; \text{d}r \right) \label{eq: Laplace transform of NLOS} \end{eqnarray} \label{lem: Laplace Transform} with $\mathcal{G}_{\text{N}}(s,r,k_i) = \mathbb{E}_{h,\mathbb{G}} \left[ e^{- s \beta h \mathbb{G}(k_i) r^{-\alpha_{\text{N}}}} \right]$. Next, we show the main result on the coverage probability of tier $i+1$ for a mmWave AP network. \begin{thm} In a mmWave network, the coverage probability of a randomly selected AP in tier $i+1$ is given by \begin{eqnarray} \mathcal{C}(\tau,k_i) &= &\int\limits_{r>0} \frac{ f_{\text{L}}(r) f_{\text{N}}(r^{\alpha_{\text{L}}/\alpha_{\text{N}}})} {2\pi r^{\alpha_{\text{L}}/\alpha_{\text{N}}} {\Lambda_0} P_{\text{N}}(r^{\alpha_{\text{L}}/\alpha_{\text{N}}})} \mathcal{C}_{\text{L}}(\tau,r,k_i) \; \text{d} r \nonumber\\ &&\quad + \int\limits_{r>0} \frac{ f_{\text{L}}(r^{\alpha_{\text{N}}/\alpha_{\text{L}}}) f_{\text{N}}(r)} {2\pi r^{\alpha_{\text{N}}/\alpha_{\text{L}}} {\Lambda_0} P_{\text{L}}(r^{\alpha_{\text{N}}/\alpha_{\text{L}}})} \mathcal{C}_{\text{N}}(\tau,r,k_i) \; \text{d} r, \label{eq: SINR interms of conditional SINR} \end{eqnarray} where $k_i$ is the spatial multiplexing gain at hop $i$; $f_{\text{L}}(\cdot)$ and $f_{\text{N}}(\cdot)$ are the PDF of distance distributions given in (\ref{eq: probability of connecting to distance z}). Assume that channel follows the Rayleigh fading model, then \begin{align} \mathcal{C}_{\text{L}}(\tau,r,k_i) &= \exp \left( - {\frac{r^{\alpha_{\text{L}}}\tau \sigma^2}{G_{\text{A}}^2 \beta}} \right) \mathcal{L}_{\mathcal{I}_\text{L}} \left( \frac{r^{\alpha_{\text{L}}}\tau}{G_{\text{A}}^2 \beta}, k_i \right), \nonumber\\ \mathcal{C}_{\text{N}}(\tau,r,k_i) &= \exp \left( - {\frac{r^{\alpha_{\text{N}}}\tau \sigma^2}{G_{\text{A}}^2 \beta}} \right) \mathcal{L}_{\mathcal{I}_\text{N}} \left( {\frac{r^{\alpha_N}\tau}{G_{\text{A}}^2\beta}}, k_i \right). \nonumber \end{align} \label{thm: SINR coverage probability} \vspace*{-10pt} \end{thm} \begin{proof} For the AP of $\Phi_{i+1}$ at the origin, the SINR coverage probability can be written as \begin{equation} \mathcal{C}(\tau,k_i) \triangleq \mathbb{P}(\text{SINR}(k_i)>\tau) = \mathbb{E}_{r}\left[\mathcal{C} (\tau,k_i,r)\right], \nonumber \end{equation} where $\mathcal{C} (\tau,k_i,r) \triangleq \mathbb{P}(\text{SINR}(k_i)>\tau\; \boldsymbol{|} \; |x_0| = r)$ is the conditional SINR coverage probability. According to the LOS AP or NLOS AP at $x_0$, $\mathcal{C} (\tau,k_i,r)$ can be further expanded as \begin{eqnarray} \mathcal{C} (\tau,k_i,r) =\mathbb{P}\left( x_0 \in \phi_{\text{iL}} \;\boldsymbol{|}\; |x_0| = r \right) \mathcal{C}_{\text{L}} (\tau,k_i,r) + \mathbb{P}\left( x_0 \in \phi_{\text{iN}} \; \boldsymbol{|}\; |x_0| = r \right) \mathcal{C}_{\text{N}} (\tau,k_i,r), \nonumber \end{eqnarray} where \begin{eqnarray} \mathcal{C}_{\text{L}} (\tau,k_i,r)&\triangleq& \mathbb{P}\left( \text{SINR} > \tau \; \boldsymbol{|} \; |x_0| = r, x_0\in\phi_{\text{iL}} \right) = \mathbb{P}\left(h_0 > \frac{\tau(\sigma^2 + \mathcal{I}_\text{L})}{G_{\text{A}}G_{\text{U}} \beta r^{-\alpha_{\text{L}}}} \right) \nonumber \end{eqnarray} and \begin{eqnarray} \mathcal{C}_{\text{N}} (\tau,k_i,r)&\triangleq& \mathbb{P}\left( \text{SINR} > \tau \; \boldsymbol{|} \; |x_0| = r, x_0\in\phi_{\text{iN}} \right) = \mathbb{P}\left( h_0 > \frac{\tau(\sigma^2 + \mathcal{I}_\text{N})}{G_{\text{A}}G_{\text{U}} \beta r^{-\alpha_{\text{N}}}} \right). \nonumber \end{eqnarray} The conditional probabilities $\mathcal{C}_{\text{L}} (\tau,k_i,r)$ and $\mathcal{C}_{\text{N}} (\tau,k_i,r)$ can be expressed as a function of the characteristic functions in (\ref{eq: Laplace transform of LOS}) and (\ref{eq: Laplace transform of NLOS}) \cite{haenggi2012stochastic}. The details in deriving the characteristic function is shown in \cite{andrews2011tractable}. In Lemma \ref{Lemma - sub-tier with ki=1}, we prove the expressions of conditional probabilities \begin{eqnarray} \mathbb{P}\left( x_0 \in \phi_{\text{iL}} \;\boldsymbol{|}\; |x_0| = r \right) = f_{\text{L}}(r) e^{-2 \pi {\lambda_i} \int_{0}^{r^{\alpha_{\text{L}}/\alpha_{\text{N}}}}P_{\text{N}}(z)z \, \text{d}z} \end{eqnarray} and \begin{equation} \mathbb{P}\left( x_0 \in \phi_{\text{iN}} \;\boldsymbol{|}\; |x_0| = r \right) = f_{\text{N}}(r)e^{-2 \pi {\lambda_i} \int_{0}^{r^{\alpha_{\text{N}}/\alpha_{\text{L}}}}P_{\text{L}}(z)z \, \text{d}z}, \end{equation} where $f_\text{L}(\cdot)$ and $f_\text{N}(\cdot)$ are also given in Lemma \ref{Lemma - sub-tier with ki=1}. The coverage probability $\mathcal{C}(\tau,k_i)$ then follows. \end{proof} In Fig.\ref{Figure: SINR coverage probability of sub-tier i+1}, we numerically evaluate (\ref{eq: SINR interms of conditional SINR}) by showing $\mathcal{C}(\tau, k_i)$ with respect to $k_i$. The main lobe width of the analog beam is set as $\theta_{\text{A}} = 30^\circ$ with the main lobe gain $G_{\text{A}} = 20$dB and side lobe gain $g_{\text{A}} = 0$dB. The noise power is assumed to be negligible. Each mmWave AP is assumed to be equipped with $K = 12$ RF chains, which indicates the spatial multiplexing gain $k_i \leq 12$. In Section III, we show that $\phi_{i}, \forall i$, is of the same intensity as tier 0. Here, $\Lambda_0$ is represented by the inter-AP distance $r_0 =\sqrt{ 1/\pi \Lambda_0}$ \cite{bai2015coverage}. For the path loss model, we use $\beta = 1$, $\alpha_{\text{L}} = 2$ and $\alpha_{\text{N}} = 4$ \cite{rappaport2013millimeter}. It can be observed from Fig.\ref{Figure: SINR coverage probability of sub-tier i+1} that given the SINR threshold $\tau$, the decrease of coverage probability $\mathcal{C}(\tau, k_i)$ is close to linear with the increase of $k_i$. The other observation is that $\phi_{i}$ with $r_0= 100$m and $r_0 = 200$m results in the similar coverage probability of tier $i+1$. Since a higher density of transmitters results in higher power of desired signal, but leads to higher strength of interference. \begin{figure} \vspace{-0.1cm} \begin{minipage}[t]{0.47\textwidth} \centering \includegraphics[width=\linewidth]{figs/AP_Rayleigh_SIR.pdf} \caption{The coverage probability $\mathcal{C}(\tau, k_i)$ with different spatial multiplexing gain $k_i$. The intensity $\Lambda_0$ is measured by inter-APs distance $r_0$, where $r_0 = \sqrt{\frac{1}{\pi {\Lambda_0}}}$. Here, $\theta_{\text{A}} = 30^{\circ}$, $G_{\text{A}} = 20$dB and $g_{\text{A}} = 0$dB.} \label{Figure: SINR coverage probability of sub-tier i+1} \end{minipage} % \hfill \begin{minipage}[t]{0.47\textwidth} \includegraphics[width=\linewidth]{figs/AP_Rayleigh_Throughput.pdf} \caption{Network throughput with different spatial multiplexing gain $k$. The intensity $\Lambda_0$ is denoted by $r_0 = \sqrt{\frac{1}{\pi {\Lambda_0}}}$. Here, $\theta_{\text{A}} = 30^{\circ}$, $G_{\text{A}} = 20$dB and $g_{\text{A}} = 0$dB.} \label{Figure: network throughput} \end{minipage} \vspace{-20pt} \end{figure} \subsection{Network Throughput} For a mmWave AP network, we define the throughput as the aggregate data rate of all relay tiers i.e. $\bigcup_{i=1}^M {\Phi_{i}}$. Consider the network, where each transmission hop follows the same protocol. It follows that $k_i = k, \forall i$. Consequently, the coverage probability of each tier is equal to $\mathcal{C}(\tau, k)$. Assume that each AP in the network is assigned with the same bandwidth. We then derive the network throughput with respect to spatial multiplexing gain. \begin{thm} Consider a mmWave AP network of density $\Lambda_{\text{A}}$, where the distribution of backhaul-connected APs follows a homogeneous PPP with intensity $\Lambda_0$. Assume that each hop follows the identical transmission protocol with the spatial multiplexing gain $k$, the network throughput is then given by \begin{align} \mathbb{T}(k) &\triangleq \frac{W(\Lambda_{\text{A}} - \Lambda_0)\mathcal{C}(\tau, k)\log_2(1+\tau)}{M}\nonumber\\ &=Wk\Lambda_0\mathcal{C}(\tau, k)\log_2(1+\tau), \end{align} where $\tau$ is the SINR threshold; $M = (\Lambda_{\text{A}} - \Lambda_0)/k\Lambda_0$ is the network latency; $W$ denotes the bandwidth of each AP; the coverage probability $\mathcal{C}(\tau, k)$ is given in (\ref{eq: SINR interms of conditional SINR}). \label{thm: network throughput} \end{thm} \begin{proof} By combining Theorem \ref{thm: network latency} and \ref{thm: SINR coverage probability}, the result immediately follows. \end{proof} We remark that the throughput of a mmWave AP network $\mathbb{T}(k)$ is dependent on the intensity of backhaul-connected APs i.e. $\Lambda_0$. However, $\mathbb{T}(k)$ is independent of $\Lambda_{\text{A}}$. In Fig.\ref{Figure: network throughput}, we show the network throughput derived in Theorem \ref{thm: network throughput}. The parameters used in Fig.\ref{Figure: SINR coverage probability of sub-tier i+1} and Fig.\ref{Figure: network throughput} are the same. For a fixed intensity $\Lambda_0$, Fig.\ref{Figure: network throughput} demonstrates the trade-off between the latency and coverage probability when choosing the spatial multiplexing gain $k$. It can be observed from Fig.\ref{Figure: network throughput} that the network throughput is not monotonically varying with the spatial multiplexing gain. As the network latency can be improved by increasing $k$, whereas the degradation of coverage probability is considerable as $k$ increases. Moreover, the optimal spatial multiplexing gain is different depending on the SINR threshold. When the SINR threshold is low, the latency dominates the network throughput. Consequently, the higher spatial multiplexing gain corresponds to the higher throughput. In the region of the high SINR threshold, the coverage probability becomes the major challenge of network performance. Therefore, the smaller spatial multiplexing gain results in the higher throughput for the mmWave AP network. By comparing the throughputs of networks with different $\Lambda_0$, Fig.\ref{Figure: network throughput} then illustrates that the ultra-dense mmWave AP network can benefit from the densification of tier 0. \section{Conclusion} We proposed to incorporate the multihop transmission protocol in modeling the ultra-dense mmWave AP network. Moreover, we exploited the spatial distributions of mmWave APs with different transmission protocols. Our analysis indicated that the mmWave AP network can be modeled by a PPP if spatial multiplexing is disabled. However, the topology of mmWave AP network is a collection of Neyman-Scott processes when the spatial multiplexing is enabled. We then analyzed the performance for mmWave AP networks with different topologies. We showed that the uniform distribution of mmWave APs experiences the largest latency but has the highest coverage probability. Moreover, the latency of mmWave AP network decreases as the spatial multiplexing gain increases, while the coverage probability drops with the increase of spatial multiplexing gain. The numerical results showed the optimal spatial multiplexing gain to maximize the throughput of the ultra-dense mmWave AP network. \small \bibliographystyle{IEEEtran}
\section{Introduction} Many scientific questions aim to find the causal relationships between variables rather than only find the correlations. While the most effective measure for identifying the causal relationships is controlled experimentation, such experiments are often too costly, unethical, or technically impossible to conduct. Therefore, the development of methods to identify causal relationships from observational data is important.\\ Many algorithms that have been developed for constructing causal graphs assume that there are no latent confounders (e.g., PC~\cite{Spirtes91}, GES~\cite{chickering2002}, and LiNGAM~\cite{shimizu2006}). They do not work effectively if this assumption is not satisfied. Conversely, FCI~\cite{fci} is an algorithm that presents the pairs of variables that have latent confounders. However, since FCI infers causal relations on the basis of the conditional independence in the joint distribution, it cannot distinguish between the two graphs that entail exactly the same sets of conditional independence. Therefore, to understand the causal relationships of variables where latent confounders exist, we need a new method that satisfies the following criteria: (1) the method should accurately (without being biased by latent confounders) identify the causal directions between the observed variables that are not affected by latent confounders, and (2) it should present variables whose relationships are affected by latent confounders.\\ Compared to the constraint-based causal discovery methods (e.g., PC~\cite{Spirtes91} and FCI~\cite{fci}), causal functional model-based approaches~\cite{hoyer2009,Mooij:2009,yamada2010,shimizu2011,peters2014} can identify the entire causal model under proper assumptions. They represent an effect $Y$ as a function of direct cause $X$. They infer that variable $X$ is the cause of variable $Y$ when $X$ is independent of the residual obtained by the regression of $Y$ on $X$ but not independent of $Y$.\\ Most of the existing methods based on causal functional models identify the causal structure of multiple observed variables that form a directed acyclic graph (DAG) under the assumption that there is no latent confounder. They assume that the data generation model is acyclic, and that the external effects of all the observed variables are mutually independent. Such models are called additive noise models (ANMs). Their methods discover the causal structures by the following two steps: (1) identifying the causal order of variables and (2) eliminating unnecessary edges. DirectLiNGAM~\cite{shimizu2011}, which is a variant of LiNGAM~\cite{shimizu2006}, performs regression and independence testing to identify the causal order of multiple variables. DirectLiNGAM finds a {\it root} (a variable that is not affected by other variables) by performing regression and independence testing of each pair of variables. If a variable is exogenous to the other variables, then it is regarded as a root. Thereafter, DirectLiNGAM removes the effect of the root from the other variables and finds the next root in the remaining variables. DirectLiNGAM determines the causal order of variables according to the order of identified roots. RESIT~\cite{peters2014}, a method extended from Mooij et al.~\cite{Mooij:2009} identifies the causal order of variables in a similar manner by performing an iterative procedure. In each step, RESIT finds a {\it sink} (a variable that is not a cause of the other variables). A variable is regarded as a sink when it is endogenous to the other variables. RESIT disregards the identified sinks and finds the next sink in each step. Thus, RESIT finds a causal order of variables. DirectLiNGAM and RESIT then construct a complete DAG, in which each variable pair is connected with the directed edge based on the identified causal order. Thereafter, DirectLiNGAM eliminates unnecessary edges using AdaptiveLasso~\cite{zou}. RESIT eliminates each edge $X\rightarrow Y$ if $X$ is independent of the residual obtained by the regression of $Y$ on $Z/\{X \}$ where $Z$ is the set of causes of $Y$ in the complete DAG.\par Causal functional model-based methods effectively discover the causal structures of observed variables generated by an additive noise model when there is no latent confounder. However, the results obtained by these methods are likely disturbed when there are latent confounders because they cannot find a causal function between variables affected by the same latent confounders. Furthermore, the causal functional model-based approaches have not been used to show variables that are affected by the same latent confounder, as FCI does. \par This paper proposes a causal functional model-based method called repetitive causal discovery (RCD) to discover the causal structures of the observed variables that are affected by latent confounders. RCD is aimed at producing causal graphs where a bi-directed arrow indicates the pair of variables that have the same latent confounders, and a directed arrow indicates the direct causal direction between two variables that do not have the same latent confounder. It assumes that the data generation model is linear and acyclic, and that external influences are non-Gaussian. Many causal functional model-based approaches discover causal relations by identifying the causal order of variables and eliminating unnecessary edges. However, RCD discovers the relationships by finding the direct or indirect causes ({\it ancestors}) of each variable, distinguishing direct causes ({\it parents}) from indirect causes, and identifying the pairs of variables that have the same latent confounders. \par Our contributions can be summarized as follows: \begin{itemize} \item We developed a causal functional model-based method that can present variable pairs affected by the same latent confounders. \item The method can also identify the causal direction of variable pairs that are not affected by latent confounders. \item The results of experimental validation using simulated data and real-world data confirmed that RCD is effective in identifying latent confounders and causal directions between observed variables. \end{itemize} A briefer version of this work without detailed proofs can be found in \cite{maeda20a}. \section{Problem definition} \label{section:problem} \subsection{Data generation process} \label{section:datageneration} This study aims to analyze the causal relations of observed variables confounded by unobserved variables. We assume that the relationship between each pair of (observed or unobserved) variables is linear, and that the external influence of each (observed or unobserved) variable is non-Gaussian. In addition, we assume that (observed or unobserved) data are generated from a process represented graphically by a directed acyclic graph (DAG). The generation model is formulated using Equation~\ref{equation:lingamco}. \begin{equation} \label{equation:lingamco} x_{i} = \sum_j b_{ij}x_{j} + \sum_k \lambda_{ik}f_{k}+e_{i} \end{equation} where \begin{math}x_{i}\end{math} denotes an observed variable, \begin{math} b_{ij} \end{math} is the causal strength from \begin{math}x_{j}\end{math} to \begin{math}x_{i}\end{math}, \begin{math} f_{k}\end{math} denotes a latent confounder, \begin{math}\lambda_{ik}\end{math} denotes the causal strength from \begin{math}f_{k}\end{math} to \begin{math} x_{i}\end{math}, and \begin{math} e_{i} \end{math} is an external effect. The external effect \begin{math}e_{i}\end{math} and the latent confounder \begin{math}f_{k}\end{math} are assumed to follow non-Gaussian continuous-valued distributions with zero mean and nonzero variance and are mutually independent. The zero/nonzero pattern of \begin{math}b_{ij}\end{math} and \begin{math}\lambda_{ik}\end{math} corresponds to the absence/existence pattern of directed edges. Without loss of generality~\cite{HOYER2008362}, latent confounders \begin{math}f_{k}\end{math} are assumed to be mutually independent. In a matrix form, the model is described as Equation~\ref{equation:lingamcoma}: \begin{equation} \label{equation:lingamcoma} {\bf x} = {\bf Bx} + {\bf \Lambda f} + {\bf e} \end{equation} where the connection strength matrices \begin{math}{\bf B}\end{math} and \begin{math}{\bf \Lambda}\end{math} collect \begin{math}b_{ij}\end{math} and \begin{math}\lambda_{ik}\end{math}, and the vectors \begin{math}{\bf x}\end{math}, \begin{math}{\bf f}\end{math} and \begin{math}{\bf e}\end{math} collect \begin{math}x_{i}\end{math}, \begin{math}f_{k}\end{math} and \begin{math}e_{i}\end{math}. \subsection{Research goals} This study has two goals. First, we extract the pairs of observed variables that are affected by the same latent confounders. This is formulated by \begin{math}{\bf C}\end{math} whose element \begin{math}c_{ij}\end{math} is defined by Equation~\ref{equation:confounderdef}: \begin{equation} \label{equation:confounderdef} c_{ij} = \begin{cases} 0 & (\text{if } \forall k, \lambda_{ik}=0 \lor \lambda_{jk}= 0) \\ 1 & (\text{otherwise}) \end{cases} \end{equation} Element \begin{math}c_{ij}\end{math} equals 0 when there is no latent confounder affecting variables \begin{math}x_{i}\end{math} and \begin{math}x_{j}\end{math}. Element \begin{math}c_{ij}\end{math} equals 1 when variables \begin{math}x_{i}\end{math} and \begin{math}x_{j}\end{math} are affected by the same latent confounders.\\ The second goal is to estimate the absence/existence of the causal relations between the observed variables that do not have the same latent confounder. This is defined by a matrix \begin{math}{\bf P}\end{math} whose element \begin{math}p_{ij}\end{math} is expressed by Equation~\ref{equation:causalrelationdef}: \begin{equation} \label{equation:causalrelationdef} p_{ij} = \begin{cases} 0 & (\text{if } b_{ij} = 0 \text{ or } c_{ij} = 1) \\ 1 & (\text{otherwise}) \end{cases} \end{equation} $p_{ij}=0$ when $c_{ij}=1$ because we do not aim to identify the causal direction between the observed variables that are affected by the same latent confounders.\par Finally, RCD produces a causal graph where a bi-directed arrow indicates the pair of variables that have the same latent confounders, and a directed arrow indicates the causal direction of a pair of variables that are not affected by the same latent confounder. For example, assume that using the data generation model shown in Figure~\ref{figure:intro}-(a), our final goal is to draw a causal diagram shown in Figure~\ref{figure:intro}-(b), where variables $f_1$ and $f_2$ are latent confounders, and variables A--H are observed variables. \begin{figure}[t] \centering \includegraphics[width=8.0cm]{intro.pdf} \caption{(a) Data generation model ($f_1$ and $f_2$ are latent confounders). (b) Causal graph that RCD produces. A bi-directed arrow indicates that two variables are affected by the same latent confounders.} \label{figure:intro} \end{figure} \section{Proposed Method} \label{section:proposedmethod} \subsection{The framework} RCD involves three steps: (1) It extracts a set of {\it ancestors} of each variable. {\it Ancestor} is a direct or indirect cause. In this paper, $M_i$ denotes the set of ancestors of $x_i$. $M_i$ is initialized as $M_i = \emptyset$. RCD repeats the inference of causal directions between variables and updates $M$. When inferring the causal directions between observed variables, RCD removes the effect of the already identified common ancestors. Causal direction between variables $x_i$ and $x_j$ can be identified when the set of identified common causes (i.e. $M_i \cap M_j$) satisfies the back-door criterion~\cite{Pearl1993, pearl2000} to $x_i$ and $x_j$. The repetition of causal inference is stopped when $M$ no longer changes. (2) RCD extracts {\it parents} (direct causes) from $M$. When $x_j$ is an ancestor but not a parent of $x_i$, the causal effect of $x_{j}$ on $x_i$ is mediated through $M_i \setminus \{x_k \}$. RCD distinguishes direct causes from indirect causes by inferring conditional independence. (3) RCD finds the pairs of variables that are affected by the same latent confounders by extracting the pairs of variables that remain correlated but whose causal direction is not identified. \subsection{Finding ancestors of each variable} RCD repeats the inference of causal directions between a given number of variables to extract the ancestors of each observed variable. We introduce Lemmas 1 and 2, by which the ancestors of each variable can be identified when there is no latent confounder. Then, we extend them to Lemma 3 by which RCD extracts the ancestors of each observed variable for the case that latent confounders exist. We first quote Darmois-Skitovitch theorem (Theorem~\ref{theo:darmo}) proved in \cite{Darmois,Skitovitch} because it is used to prove the lemmas. \begin{theo} \label{theo:darmo} Define two random variables $y_1$ and $y_2$ as linear combinations of independent random variables $s_{i} (i=1, \cdots, q)$: $Y_1=\sum_{i=1}^{q} \alpha_i s_i$, $Y_2=\sum_{i=1}^{q} \beta_i s_i$. Then, if $y_1$ and $y_2$ are independent, all variables $s_j$ for which $\alpha_{j}\beta_{j}\neq 0$ are Gaussian. In other words, if there exists a non-Gaussian $s_j$ for which $\alpha_j \beta_j \neq 0$, $y_1$ and $y_2$ are dependent. \end{theo} \begin{lem} Assume that there are variables $x_i$ and $x_j$, and their causal relation is linear, and their external influences $e_i$ and $e_j$ are non-Gaussian and mutually independent. Let $r_i^{(j)}$ denote the residual obtained by the linear regression of $x_i$ on $x_j$ and $r_j^{(i)}$ denote the residual obtained by the linear regression of $x_j$ on $x_i$. The causal relation between variables $x_i$ and $x_{j}$ is determined as follows: (1) If $x_i$ and $x_j$ are not linearly correlated, then there is no causal effect between $x_i$ and $x_j$. (2) If $x_i$ and $x_j$ are linearly correlated and $x_{j}$ is independent of residual $r_i^{(j)}$, then $x_{j}$ is an ancestor of $x_{i}$. (3) If $x_i$ and $x_j$ are linearly correlated and $x_{j}$ is dependent on $r_i^{(j)}$ and $x_{i}$ is dependent on $r_j^{(i)}$, then $x_i$ and $x_{j}$ have a common ancestor. (4) There is no case that $x_i$ and $x_j$ are linearly correlated and $x_{j}$ is independent of $r_i^{(j)}$ and $x_{i}$ is independent of $r_j^{(i)}$. \end{lem} \begin{proof} The causal relationship between two variables $x_i$ and $x_j$ can be classified into the following four cases: (Case 1) There is no common cause of the two variables, and there is no causal effect between them; (Case 2) There is no common cause of the two variables, and one variable is a cause of the other variable; (Case 3) There are common causes of the two variables, and there is no causal effect between them; (Case 4) There are common causes of the two variables, and one variable is a cause of the other variable. Cases 1, 2, 3, and 4 are modeled by Equations \ref{equation:model1-1}, \ref{equation:model1-2}, \ref{equation:model1-3}, and \ref{equation:model1-4}, respectively: \begin{alignat}{4} &x_i = e_i, \ \ \ \ \ & x_j &= e_j\label{equation:model1-1}\\ &x_i = b_{ij} x_j + e_i, \ \ \ \ \ & x_j &= e_j\label{equation:model1-2}\\ &x_i = c_i + e_i, \ \ \ \ \ & x_j &= c_j + e_j\label{equation:model1-3}\\ &x_i = b_{ij} x_j + c_i + e_i, \ \ \ \ \ & x_j &= c_j + e_j\label{equation:model1-4} \end{alignat} where $e_i$ and $e_j$ are the non-Gaussian external effects that are mutually independent, $b_{ij}$ is the non-zero causal strength from $x_j$ to $x_i$, and $c_i$ and $c_j$ are the linear combinations of the common causes of $x_i$ and $x_j$. The linear combinations of the common causes $c_i$ and $c_j$ are linearly correlated and are independent of $e_i$ and $e_j$. We investigate the following three points for each case: (1) whether $x_i$ and $x_j$ are linearly correlated, (2) whether $x_j$ is independent of $r_i^{(j)}$, and (3) whether $x_i$ is independent of $r_j^{(i)}$.\\ \noindent \underline{\bf Case 1:} Variables $x_i$ and $x_j$ are mutually independent because of Equation~\ref{equation:model1-1}. Therefore, $x_i$ and $x_j$ are not linearly correlated. Let $\alpha$ denote the coefficient of $x_j$ when $x_i$ is regressed on $x_j$. Since $x_i$ and $x_j$ are mutually independent, $\alpha=0$. Then, \begin{align} \label{equation:case2-1} r_i^{(j)} &= x_i - \alpha x_j\nonumber\\ &=x_i \end{align} Therefore, $x_j$ is independent of $r_i^{(j)}$ because $x_i$ and $x_j$ are mutually independent. Similarly, $x_i$ is independent of $r_j^{(i)}$.\\ \noindent \underline{\bf Case 2:} Variables $x_i$ and $x_j$ are linearly correlated because $x_i=b_{ij} x_j + e_i$. Let $\alpha$ denote the coefficient of $x_j$ when $x_i$ is regressed on $x_j$. Then, $\alpha = b_{ij}$ because $b_{ij}x_j$ is the only term on the right side of equation $x_i=b_{ij}x_j+e_i$ that covaries with $x_j$. Then, we have $r_i^{(j)}$: \begin{align} \label{equation:case2-2} r_i^{(j)} &= x_i - \alpha x_j \nonumber \\ &=b_{ij} x_j + e_i - \alpha x_j \nonumber \\ &=e_{i} \end{align} Then, $x_j$ is independent of $r_i^{(j)}$ because $x_j$ is independent of $e_i$. Let $\beta$ denote the coefficient of $x_i$ when $x_j$ is regressed on $x_i$. Since $x_i$ and $x_j$ are linearly correlated, $\beta \neq 0$. Then, we have $r_j^{(i)}$: \begin{align} \label{equation:case2-3} r_j^{(i)} &= x_j - \beta x_i \nonumber \\ &=x_j - \beta \left(b_{ij} x_j + e_i \right)\nonumber \\ &= \left( 1- b_{ij}\beta \right)x_j - \beta e_{i}\nonumber \\ &= \left( 1- b_{ij}\beta \right)e_j - \beta e_{i} \end{align} Then, $x_i$ is not independent of $r_j^{(i)}$ because of the term $-\beta e_{i}$ in Equation~\ref{equation:case2-3} and Theorem~\ref{theo:darmo}.\\ \noindent \underline{\bf Case 3:} Since $c_i$ and $c_j$ are linearly correlated, $x_i$ and $x_j$ are linearly correlated. Let $\alpha$ denote the coefficient of $x_j$ when $x_i$ is regressed on $x_j$. Since $x_i$ and $x_j$ are linearly correlated, $\alpha \neq 0$. Then, we have $r_i^{(j)}$: \begin{align} \label{equation:case2-5} r_i^{(j)} &= x_i - \alpha x_j \nonumber \\ &=c_i + e_i - \alpha \left(c_j + e_j\right)\nonumber \\ &= c_i + e_i - \alpha c_j - \alpha e_j \end{align} Then, $x_j$ is not independent of $r_i^{(j)}$ because of the term $-\alpha e_j$ in Equation~\ref{equation:case2-5} and Theorem~\ref{theo:darmo}. Similarly, $x_i$ is not independent of $r_j^{(i)}$.\\ \noindent \underline{\bf Case 4:} Since $c_i$ and $c_j$ are linearly correlated, $x_i$ and $x_j$ are linearly correlated. Let $\alpha$ denote the coefficient of $x_j$ when $x_i$ is regressed on $x_j$. Then, $\alpha \neq b_{ij}$ because $x_j$ covaries with terms $b_{ij}x_j$ and $c_i$ on the right side of equation $x_i = b_{ij} x_j + c_i + e_i$. We have $r_i^{(j)}$: \begin{align} \label{equation:case2-6} r_i^{(j)} &= x_i - \alpha x_j \nonumber \\ &=b_{ij} x_j + c_i + e_i- \alpha \left(c_j + e_j\right)\nonumber \\ &= b_{ij} \left(c_j + e_j\right) + c_i + e_i- \alpha \left(c_j + e_j\right)\nonumber\\ &= \left( b_{ij} - \alpha \right) c_j + \left( b_{ij} - \alpha \right) e_j+ c_i + e_i \end{align} Then, $x_j$ is not independent of $r_i^{(j)}$ because of the term $\left( b_{ij} - \alpha \right) e_j$ in Equation~\ref{equation:case2-5} and Theorem~\ref{theo:darmo}. Let $\beta$ denote the coefficient of $x_i$ when $x_j$ is regressed on $x_i$. Since $x_i$ and $x_j$ are linearly correlated, $\beta \neq 0$. Then, we have $r_j^{(i)}$: \begin{align} \label{equation:case2-7} r_j^{(i)} &= x_j - \beta x_i \nonumber \\ &=x_j - \beta \left(b_{ij} x_j + c_i + e_i \right)\nonumber \\ &= \left( 1- b_{ij}\beta \right)x_j - \beta c_{i} - \beta e_{i}\nonumber \\ &= \left( 1- b_{ij}\beta \right)(c_j + e_j) - \beta c_{i} - \beta e_{i} \end{align} Then, $x_i$ is not independent of $r_j^{(i)}$ because of the term $-\beta e_{i}$ in Equation~\ref{equation:case2-7} and Theorem~\ref{theo:darmo}. These cases can be summarized as follows: (Case 1) $x_i$ and $x_j$ are not linearly correlated; (Case 2) $x_i$ and $x_j$ are linearly correlated, $x_j$ is independent of $r_i^{(j)}$, and $x_i$ is not independent of $r_j^{(i)}$ when the causal direction is $x_i \leftarrow x_j$; (Cases 3 and 4) $x_i$ and $x_j$ are linearly correlated, $x_j$ is not independent of $r_i^{(j)}$, and $x_i$ is not independent of $r_j^{(i)}$. Lemma 1-(1) assumes that $x_i$ and $x_j$ are not linearly correlated. This assumption only corresponds to Case 1. Therefore, there is no causal effect between $x_i$ and $x_j$. Lemma 1-(2) assumes that $x_i$ and $x_j$ are linearly correlated, and $x_j$ is independent of $r_i^{(j)}$. This assumption only corresponds to Case 2. Therefore, $x_j$ is an ancestor of $x_i$. Lemma 1-(3) assumes that $x_i$ and $x_j$ are linearly correlated, $x_j$ is not independent of $r_i^{(j)}$, and $x_i$ is not independent of $r_j^{(i)}$. This corresponds to Case 3 or Case 4. Therefore, $x_i$ and $x_j$ have common ancestors. According to Lemma 1-(4), there is no case among Cases 1--4 where $x_i$ and $x_j$ are linearly correlated, $x_j$ is independent of $r_i^{(j)}$, and $x_i$ is independent of $r_j^{(i)}$. \end{proof} It is necessary to remove the effect of common causes to infer the causal directions between variables. When the set of the identified common causes of variables $x_i$ and $x_j$ satisfies the back-door criterion, the causal direction between $x_i$ and $x_j$ can be identified. The back-door criterion~\cite{Pearl1993, pearl2000} is defined as follows: \begin{defn} A set of variables $Z$ satisfies the back-door criterion relative to an ordered pair of variables ($x_i$, $x_j$) in a DAG $G$ if no node in $Z$ is a descendant of $x_i$, and $Z$ blocks every path between $x_i$ and $x_j$ that contains an arrow into $x_i$. \end{defn} Lemma 1 is generalized to Lemma 2 to incorporate the process of removing the effects of the identified common causes. Lemma 2 can also be used to determine whether the identified common causes are sufficient to detect the causal direction between the two variables. \begin{lem} Let $H_{ij}$ denote the set of common ancestors of $x_i$ and $x_j$. Let $y_i$ and $y_j$ denote the residuals when $x_{i}$ and $x_j$ are regressed on $H_{ij}$, respectively. Let $r_i^{(j)}$ and $r_j^{(i)}$ denote the residual obtained by the linear regression of $y_i$ on $y_j$, and $y_j$ on $y_i$, respectively. The causality and the existence of the confounders are determined by the following criteria: (1) If $y_i$ and $y_j$ are not linearly correlated, then there is no causal effect between $x_i$ and $x_j$. (2) If $y_i$ and $y_j$ are linearly correlated and $y_{j}$ is independent of the residual $r_i^{(j)}$, then $x_{j}$ is an ancestor of $x_{i}$. (3) If $y_i$ and $y_j$ are linearly correlated and $y_{j}$ is dependent on $r_i^{(j)}$ and $y_{i}$ is dependent on $r_j^{(i)}$, then $x_i$ and $x_{j}$ have a common ancestor other than $H_{ij}$, and $H_{ij}$ does not satisfy the back-door criterion to $(x_i, x_j)$ or $(x_j, x_i)$. (4) There is no case that $y_i$ and $y_j$ are linearly correlated and $y_{j}$ is independent of $r_i^{(j)}$ and $y_{i}$ is independent of $r_j^{(i)}$. \end{lem} \begin{proof} When Lemma 1 is applied to $y_i$ and $y_j$, Lemma 2 is derived. \end{proof} \begin{figure}[t] \centering \includegraphics[width=6.5cm]{confounder.pdf} \caption{(a) Variables $A$, $B$, and $C$ are the causes of variable $D$, and they have a common cause, $f_1$. (b) $A$ and $B$ are the causes of $D$, but $C$ is not.} \label{figure:confounder} \end{figure} Next, we consider the case that there are latent confounders. In Lemma 2, the direction between two variables is inferred by regression and independence tests. However, if there are two paths from latent confounder $f_k$ to $x_i$, and $x_j$ is only on one of the paths, then $M_i \cap M_j$ cannot satisfy the back-door criterion. For example, in Figure~\ref{figure:confounder}-(a), variables A, B, and C are the causes of variable D, and the causes are also affected by the same latent confounder $f_1$. The causal direction between $A$ and $D$ cannot be inferred only by inferring the causality between them because the effect of $f_1$ is mediated through $B$ and $C$ to $D$. Therefore, $A$, $B$, and $C$ are the causes of $D$ when they are independent of the residual obtained by the multiple regression of $D$ on $\{ A, B, C \}$. However, it is necessary to confirm that variables in each proper subset of $\{A, B, C\}$ are not independent of the residual obtained by the regression of $D$ on the proper subset (i.e., no proper subset of $\{A, B, C\}$ satisfies the back-door criterion). For example, in Figure~\ref{figure:confounder}-(b), $C$ is not a cause of $D$, but $A$, $B$, and $C$ are all independent of the residual obtained by the multiple regression of $D$ on $\{ A, B, C \}$. $C$ should not be regarded as a cause of $D$ because $A$ and $B$ are also independent of the residual when $D$ is regressed on $\{A, B\}$. This example is generalized and formulated by Lemma 3: \begin{lem} Let $X$ denote the set of all observed variables. Let $U$ denote a subset of $X$ that contains $x_i$ (i.e., $U \subseteq X$ and $x_i \in U$). Let $M$ denote the sequence of $M_j$ where $M_j$ is a set of ancestors of $x_j$. For each $x_j\in U$, let $y_j$ denote the residual obtained by the multiple linear regression of $x_j$ on the common ancestors of $U$, where the set of common ancestors of $U$ is $\bigcap_{x_j\in U}M_j$. We define $f(x_i, U, M)$ as a function that returns 1 when each $y_j\in\{y_j \mid x_j \in U\setminus x_i \}$ is independent of the residual obtained by the multiple linear regression of $y_i$ on $\{y_j \mid j \neq i\}$; otherwise it returns 0. If $f(x_i, V, M)=0$ for each $V \subset U$ and $f(x_i, U, M)=1$, then each $x_j \in U$ is an ancestor of $x_j$. \end{lem} \begin{proof} We prove Lemma 3 by contradiction. Assume that $x_j \in U \setminus \{x_i\}$ is not an ancestor of $x_i$, even though $f(x_i, V, M)=0$ for each $V \subset U$, and $f(x_i, U, M)=1$. Let $D_j$ denote the set that consists of the descendants of $x_j$ and $x_j$ itself. Then, \begin{equation*} \label{equation:a3-1} x_{i} = \sum_{x_m\notin D_j} b_{im}x_{m} + \sum_n \lambda_{in}f_{n}+e_{i} \end{equation*} Let $H_U$ denote the set of common causes of $U$ (i.e. $H_U = \bigcap_{x_j\in U}M_j$). Let $\alpha_k$ denote the coefficient of $x_k\in H_U$ when $x_i$ is regressed on $H_U$. Then, \begin{equation*} \label{equation:a3-2} y_i = x_i -\sum_{x_k\in H_{U}} \alpha_k x_{k} \end{equation*} Let $s_i^{U}$ denote the residual obtained by the multiple regression of $y_i$ on $\{y_j \mid x_j \in U\setminus x_i \}$, and let $\beta_k$ denote the coefficient of $y_k$ obtained by the multiple regression of $y_i$ on $y_k\in\{y_k \mid x_k \in U\setminus \{x_i\} \}$. Then, we have $s_i^U$: \begin{align} \label{equation:a3-3} s_i^U &= y_i - \sum_{x_k \in U\setminus \{x_i\}}\beta_k y_k \nonumber\\ &= y_i - \beta_j y_j - \sum_{x_k \in U\setminus \{x_i, x_j\}}\beta_k y_k\nonumber\\ &=x_i -\sum_{x_k\in H_{U}} \alpha_k x_{k}- \beta_j y_j - \sum_{x_k \in U\setminus \{x_i, x_j\}}\beta_k y_k\nonumber \\ &=\sum_{x_m\notin D_j} b_{im}x_{m} + \sum_n \lambda_{in}f_{n}+e_{i}-\sum_{x_k\in H_{U}} \alpha_k x_{k}- \beta_j y_j - \sum_{x_k \in U\setminus \{x_i, x_j\}}\beta_k y_k \end{align} There is no term that includes $e_j$, the external effect of $y_j$, other than $-\beta_j y_j$ in Equation~\ref{equation:a3-3}. External effect $e_j$ is independent of the other terms in Equation~\ref{equation:a3-3}. Since $y_j$ is independent of $s_i^U$, $\beta_j=0$ by Theorem~\ref{theo:darmo}. Therefore, we have $s_i^U$ as follows: \begin{align} \label{equation:a3-4} s_i^U &= y_i - \sum_{x_k \in U\setminus \{x_i,x_j\}}\beta_k y_k \end{align} Every $y_k \in U\setminus\{x_i,x_j\}$ is independent of $s_i^U$. This means $f(x_i, U\setminus \{x_j\}, M)=1$, and it contradicts the assumption; that is, $f(x_i, V, M)=0$ for each $V \subset U$. \end{proof} We describe the procedure and the implementation of how RCD extracts the ancestors of each observed variable in Algorithm~\ref{algo:ancestoralgorithm}. The output of the algorithm is sequence $M=\{M_i \}$, where $M_i$ is the set of identified ancestors of $x_i$. Argument $\alpha_C$ is the alpha level for the p-value of the Pearson's correlation. If the p-value of two variables is smaller than $\alpha_{\text{C}}$, then we estimate that the variables are linearly correlated. Argument $\alpha_{\text{I}}$ is the alpha level for the p-value of the Hilbert-Schmidt independence criterion (HSIC)~\cite{NIPS2007_3201}. If the p-value of the HSIC of two variables is greater than $\alpha_{\text{I}}$, then we estimate that the variables are mutually independent. Argument $\alpha_S$ is the alpha level to test whether a variable is generated from a non-Gaussian process using the Shapiro-Wilk test~\cite{shapiro1965}. Argument $n$ is the maximum number of explanatory variables used in multiple linear regression for identifying causal directions; i.e., the maximum number of $(|U|-1)$ in Lemma 3. In practice, this should be set to a small number when the number of samples is smaller than the number of variables. RCD does not perform multiple regression analysis of more than $n$ explanatory variables.\par RCD initializes $M_i$ to be an empty set for each $x_i \in X$. RCD repeats the inference between the variables in each $U \subset X$ that has $(l+1)$ elements. Number $l$ is initialized to $1$. If there is no change in $M$, $l$ is increased by 1. If there is a change in $M$, $l$ is set to $1$. When $l$ exceeds $n$, the repetition ends. Variable $changed$ has information about whether there is a change in $M$ within an iteration.\par In line 16 of Algorithm~\ref{algo:ancestoralgorithm}, RCD confirms that there is no identified ancestor of $x_i$ in $U$ by checking that $M_i\cap U=\emptyset$. This confirms that $f(x_i, V, M)=0$ for each $V \subset U$ in Lemma 3. In lines 17--24, RCD checks whether $f(x_i, U, M)=1$ in Lemma 3. When $f(x_i, U, M)=1$ is satisfied, $x_i$ is put into $S$. $S$ is a set of candidates for a {\it sink} (a variable that is not a cause of the others) in $U$. It is necessary to test whether there is only one {\it sink} in $U$ because two variables may be misinterpreted as causes of each other when the alpha level for the independence test ($\alpha_{\text I}$) is too small.\par We use least squares regression for removing the effect of common causes in line 12 of Algorithm~\ref{algo:ancestoralgorithm}, but we use a variant of multiple linear regression called multilinear HSIC regression (MLHSICR) to examine the causal directions between variables in $U$ in line 20 of Algorithm~\ref{algo:ancestoralgorithm} when $l \geq 2$. Coefficients obtained by multiple linear regression using the ordinary least squares method with linearly correlated explanatory variables often differ from true values due to estimation errors. Thus, the relationship between the explanatory variables and the residual may be misinterpreted to be dependent in the case that explanatory variables are affected by the same latent confounders. To avoid such failure, we use MLHSICR defined as follows: \begin{defn} Let variable $x_i$ denote an explanatory variable, ${\bf x}$ denote a vector that collects explanatory variables $x_i$, and $y$ denote a response variable. MLHSICR models the relationship $y={\boldsymbol \lambda}^{\top}{\bf x}$ by the coefficient vector $\boldsymbol{\lambda}$ in the following equation: \begin{equation} \label{eq:hsic} {\boldsymbol \lambda} = \mathop{\rm argmin}\limits_{\boldsymbol \lambda}\sum_i \reallywidehat{\text{HSIC}}(x_i,y - {\boldsymbol \lambda}^{\top}{\bf x}) \end{equation} where ${\reallywidehat{\text{HSIC}}}(a, b)$ denotes the Hilbert-Schmidt independence criterion of $a$ and $b$. \end{defn} Mooij et al.~\cite{Mooij:2009} have developed a method to estimate the nonlinear causal function between variables by minimizing the HSIC between the explanatory variables and the residual. RCD estimates ${\boldsymbol \lambda}$ by minimizing the sum of the HSICs in Equation~\ref{eq:hsic} using the L-BFGS method~\cite{Liu1989}, similar to Mooij et al.~\cite{Mooij:2009}. L-BFGS is a quasi-Newton method, and RCD sets the coefficients obtained by the least squares method to the initial value of ${\boldsymbol \lambda}$. \begin{algorithm} \scriptsize \SetKwProg{init}{initialization}{}{} \DontPrintSemicolon \KwIn{$X$: the set of observed variables, $\alpha_{\text{C}}$: the alpha level for Pearson's correlation, $\alpha_{\text{I}}$: the alpha level for independence test, $\alpha_{\text{S}}$: the alpha level for Shapiro-Wilk test, $n$: the maximum number of explanatory variables} \KwOut{$M$: the sequence $\{ M_i\}$ where $M_{i}$ is a set of ancestors of $x_i$.} \SetKwBlock{Begin}{function}{end function} \Begin($\text{extractAncestors} {(} X, \alpha_{\text{C}}, \alpha_{\text{I}}, \alpha_{\text{S}}, n {)}$) { \init{}{ \ForEach{$i$}{ $M_i \leftarrow \emptyset$\; } $l \leftarrow 1$\; } \While{$l \leq n$}{ $changed \leftarrow$ FALSE\; \ForEach{$U \subseteq X; (|U|=l+1)$}{ $H_U \leftarrow \bigcap_{x_j\in U}M_j$\; $S \leftarrow \emptyset$\; \ForEach{$x_j \in U$}{ $y_j \leftarrow$ the residual obtained by regression of $x_j$ on $H_U$\; $t_j \leftarrow$ the p-value of Shapiro-Wilk test of $y_j$\; } \If{$\forall t_{k} < \alpha_{\text{S}}$}{ \ForEach{$x_i \in U$}{ \If{$M_i \cap U = \emptyset$}{ \ForEach{$x_{j} \in U \setminus \{x_i\}$}{ $c_{ij} \leftarrow$ the p-value of linear correlation between $y_i $ and $y_{j}$\; } \If{$\forall c_{ij} < \alpha_{\text{C}}$}{ $s_i^{U} \leftarrow$ the residual obtained by regression of $y_i$ on $\{y_j | x_j \in U\setminus \{x_i\} \}$\; \ForEach{$x_{j} \in U \setminus \{x_i\}$}{ $h_{ij} \leftarrow$ the p-value of the HSIC between $s_i^{U}$ and $y_{j}$\; } \If{$\forall h_{ij} > \alpha_{\text{I}}$}{ $S \leftarrow S\cup \{x_i\}$\; } } } } \If{$|S|=1$}{ \ForEach{$x_{i} \in S$}{ $M_{i} \leftarrow M_{i} \cup (U\setminus \{x_i \})$\; } $changed \leftarrow$ TRUE\; } } } \uIf{$changed=\rm{TRUE}$}{ $l \leftarrow 1$\; }\Else{ $l \leftarrow l + 1$\; } } \Return{$M$} } \caption{Extract ancestors of each variable}\label{algo:ancestoralgorithm} \end{algorithm} \subsection{Finding parents of each variable} When $x_j$ is an ancestor but not a parent of $x_i$, the effect of $x_j$ on $x_i$ is mediated through $M_i \setminus \{ x_j \}$. Therefore, $x_j \mathop{\perp\!\!\!\perp} x_i \mid M_i \setminus \{ x_j \}$. \cite{zhang2017} proposed a method to test the conditional independence using unconditional independence testing in Theorem~\ref{theo:zhang} (proved by them): \begin{theo} \label{theo:zhang} If $x_i$ and $x_j$ are neither directly connected nor unconditionally independent, then there must exist a set of variables $Z$ and two functions $f$ and $g$ such that $x_i-f(Z)\mathop{\perp\!\!\!\perp} x_j-g(Z)$, and $x_i-f(Z)\mathop{\perp\!\!\!\perp} Z$ or $x_j-g(Z)\mathop{\perp\!\!\!\perp} Z$. \end{theo} In our case, $x_j \mathop{\perp\!\!\!\perp} x_i \mid (M_i \setminus \{ x_j \}) \Leftrightarrow x_j - f(M_i \setminus \{ x_j \}) \mathop{\perp\!\!\!\perp} x_i - g(M_i \setminus \{ x_j \})$, where $f$ and $g$ are multiple linear regression functions of $x_j$ on $M_i \setminus \{ x_j \}$ and $x_i$ on $M_i \setminus \{ x_j \}$, respectively. Since $(M_i \setminus \{ x_j \})\cap M_j= M_i \cap M_j$, we can assume that $x_j \mathop{\perp\!\!\!\perp} x_i \mid (M_i \setminus \{ x_j \}) \Leftrightarrow x_j - h(M_i \cap M_j) \mathop{\perp\!\!\!\perp} x_i - g(M_i \setminus \{ x_j \})$ where $h$ is a multiple linear regression function of $x_j$ on $(M_i \cap M_j)$. Based on Theorem~\ref{theo:zhang}, RCD uses Lemma 4 to distinguish the parents from the ancestors. We proved Lemma 4 without using Theorem~\ref{theo:zhang}. \begin{lem} Assume that $x_j \in M_i$; that is, $x_j$ is an ancestor of $x_i$. Let $z_i$ denote the residual obtained by the multiple regression of $x_i$ on $M_i \setminus \{ x_j \}$. Let $w_{j}$ denote the residual obtained by the multiple regression of $x_j$ on $(M_i \cap M_j)$. If $z_{i}$ and $w_{j}$ are linearly correlated, then $x_j$ is a parent of $x_i$; otherwise, $x_j$ is not a parent of $x_i$. \end{lem} \begin{proof} Variable $x_{i}$ and $x_j$ are formulated as follows: \begin{equation} \label{equation:4-1} x_{i} = \sum_{x_m\in M_i} b_{im}x_{m} + \sum_n \lambda_{in}f_{n}+e_{i} \end{equation} \begin{equation} \label{equation:4-2} x_{j} = \sum_{x_m\in M_j} b_{jm}x_{m} + \sum_n \lambda_{jn}f_{n}+e_{j} \end{equation} Let $\alpha_k$ denote the coefficient of $x_k\in (M_i\setminus \{x_j \} )$ when $x_i$ is regressed on $M_i\setminus \{x_j \}$. Then, \begin{align} \label{equation:4-3} z_i &= x_i -\sum_{x_k\in (M_i\setminus \{x_j \})} \alpha_k x_{k}\nonumber\\ &=\sum_{x_m\in M_i} b_{im}x_{m} + \sum_n \lambda_{in}f_{n}+e_{i} -\sum_{x_k\in (M_i\setminus \{x_j \})} \alpha_k x_{k}\nonumber\\ &=b_{ij}x_j+\sum_{x_m\in (M_i\setminus \{x_j \})} b_{im}x_{m} + \sum_n \lambda_{in}f_{n}+e_{i} -\sum_{x_k\in (M_i\setminus \{x_j \})} \alpha_k x_{k}\nonumber\\ &=b_{ij}\left( \sum_{x_m\in M_j} b_{jm}x_{m} + \sum_n \lambda_{jn}f_{n}+e_{j} \right)+\sum_{x_m\in (M_i\setminus \{x_j \})} b_{im}x_{m} + \sum_n \lambda_{in}f_{n}+e_{i}\nonumber\\ &\ \ \ \ \ -\sum_{x_k\in (M_i\setminus \{x_j \})} \alpha_k x_{k}\nonumber\\ &=b_{ij}\left( \sum_{x_m\in (M_j\setminus M_i)} b_{jm}x_{m} + \sum_{x_m\in (M_i\cap M_j)} b_{jm}x_{m} + \sum_n \lambda_{jn}f_{n}+e_{j} \right)+\sum_{x_m\in (M_i\setminus \{x_j \})} b_{im}x_{m} \nonumber\\ &\ \ \ \ \ + \sum_n \lambda_{in}f_{n}+e_{i} -\sum_{x_k\in (M_i\setminus \{x_j \})} \alpha_k x_{k}\nonumber\\ &=b_{ij}\left( \sum_{x_m\in (M_j\setminus M_i)} b_{jm}x_{m} + \sum_n \lambda_{jn}f_{n}+e_{j} \right) + b_{ij}\sum_{x_m\in (M_i\cap M_j)} b_{jm}x_{m}+\sum_{x_m\in (M_i\setminus \{x_j \})} b_{im}x_{m} \nonumber\\ &\ \ \ \ \ + \sum_n \lambda_{in}f_{n}+e_{i} -\sum_{x_k\in (M_i\setminus \{x_j \})} \alpha_k x_{k}\nonumber\\ &=b_{ij}\left( \sum_{x_m\in (M_j\setminus M_i)} b_{jm}x_{m} + \sum_n \lambda_{jn}f_{n}+ e_{j}\right) + \sum_n \lambda_{in}f_{n}+e_{i} \end{align} Let $\beta_k$ denote the coefficient of $x_k\in (M_i \cap M_j )$ when $x_j$ is regressed on $M_i \cap M_j$. Then, \begin{align} \label{equation:4-4} w_j &= x_j -\sum_{x_k\in (M_i \cap M_j)} \beta_k x_{k}\nonumber\\ &=\left(\sum_{x_m\in M_j} b_{jm}x_{m} + \sum_n \lambda_{jn}f_{n}+e_{j}\right) -\sum_{x_k\in (M_i \cap M_j)} \beta_k x_{k}\nonumber\\ &=\left(\sum_{x_m\in (M_j\setminus M_i)} b_{jm}x_{m} + \sum_{x_m\in (M_j\cap M_i)} b_{jm}x_{m} + \sum_n \lambda_{jn}f_{n}+e_{j}\right) -\sum_{x_k\in (M_i \cap M_j)} \beta_k x_{k}\nonumber\\ &= \sum_{x_m\in (M_j\setminus M_i)} b_{jm}x_{m} + \sum_n \lambda_{jn}f_{n}+ e_{j} \end{align} From Equations~\ref{equation:4-3}, and \ref{equation:4-4}, \begin{equation} \label{equation:4-5} z_i = b_{ij} w_j + \sum_n \lambda_{in}f_{n}+e_{i} \end{equation} Since $x_i$ and $x_j$ do not have the same latent confounder: \begin{equation} \label{equation:4-6} \forall n, (\lambda_{in} = 0)\lor (\lambda_{jn} = 0) \end{equation} From Equations~\ref{equation:4-4}, \ref{equation:4-5}, and \ref{equation:4-6}, $z_i$ and $w_i$ are linearly correlated when $b_{ij}\neq 0$. It means that $x_j$ is a parent (direct cause) of $x_i$. When $b_{ij}= 0$, $z_i$ and $w_i$ are not linearly correlated. It means that $x_j$ is not a parent of $x_i$. \end{proof} \subsection{Identifying pairs of variables that have the same latent confounders} RCD infers that two variables are affected by the same latent confounders when those two variables are linearly correlated even after removing the effects of all the parents. RCD identifies the pairs of variables affected by the same latent confounders by using Lemma 5. \begin{lem} Let $M_i$ and $M_j$ respectively denote the sets of ancestors of $x_i$ and $x_j$, and $P_i$ and $P_j$ respectively denote the sets of parents of $x_i$ and $x_j$. Assume that $x_i \notin M_j$ and $x_j \notin M_i$. Let $y_i$ denote the residual obtained by the multiple regression of $x_i$ on $P_i$, and $y_j$ denote the residual obtained by the multiple regression of $x_j$ on $P_j$. If $y_i$ and $y_j$ are linearly correlated, then $x_i$ and $x_j$ have the same latent confounders. \end{lem} \begin{proof} Variable $x_{i}$ and $x_j$ are formulated as follows: \begin{equation} \label{equation:5-1} x_{i} = \sum_{x_m\in P_i} b_{im}x_{m} + \sum_n \lambda_{in}f_{n}+e_{i}\nonumber \end{equation} \begin{equation} \label{equation:5-2} x_{j} = \sum_{x_m\in P_j} b_{jm}x_{m} + \sum_n \lambda_{jn}f_{n}+e_{j}\nonumber \end{equation} Let $\alpha_k$ denote the coefficient of $x_k\in P_i$ when $x_i$ is regressed on $P_i$. Then, \begin{align} y_i &= x_i - \sum_{x_k\in P_i} \alpha_k x_{k}\nonumber\\ &= \sum_{x_m\in P_i} b_{im}x_{m} + \sum_n \lambda_{in}f_{n}+e_{i} - \sum_{x_k\in P_i} \alpha_k x_{k}\nonumber\\ &= \sum_n \lambda_{in}f_{n}+e_{i}\nonumber \end{align} Let $\beta_k$ denote the coefficient of $x_k\in P_j$ when $x_j$ is regressed on $P_j$. Then, \begin{align} y_j &= x_j -\sum_{x_k\in P_j} \beta_k x_{k}\nonumber\\ &= \sum_{x_m\in P_j} b_{jm}x_{m} + \sum_n \lambda_{jn}f_{n}+e_{j} - \sum_{x_k\in P_j} \beta_k x_{k}\nonumber\\ &= \sum_n \lambda_{jn}f_{n}+e_{j}\nonumber \end{align} Variables $e_i$ and $e_i$ are independent of each other. If we assume that $x_i$ and $x_j$ do not have the same latent confounder, then, \begin{equation} \forall n, (\lambda_{in} = 0)\lor (\lambda_{jn} = 0)\nonumber \end{equation} Then, $y_i$ and $y_j$ are mutually independent. However, this contradicts the assumption of Lemma 5 that $y_i$ and $y_j$ are linearly correlated. Therefore, $x_i$ and $x_j$ have the same latent confounders. \end{proof} \section{Performance evaluation} \label{section:evaluation} We evaluated the performance of RCD relative to the existing methods in terms of how accurately it finds the pairs of variables that are affected by the same latent confounders and how accurately it infers the causal directions of the pairs of variables that are not affected by the same latent confounder. In regard to the latent confounders, we compared RCD with FCI~\cite{fci}, RFCI~\cite{colombo2012}, and GFCI~\cite{ogarrio2016}. In addition to these three methods, we compared RCD with PC~\cite{Spirtes91}, GES~\cite{chickering2002}, DirectLiNGAM~\cite{shimizu2011}, and RESIT~\cite{peters2014} to evaluate the accuracy of causal directions. In the following sections, DirectLiNGAM is called LiNGAM for simplicity. \subsection{Performance on simulated structures} \begin{figure*}[h] \centering \includegraphics[width=12.0cm]{simulationresult.pdf} \caption{Performance evaluation on causal graphs using simulated data: The vertical red lines indicate the median values of the results. The evaluation of the latent confounders corresponds to the evaluation of bi-directed arrows. The evaluation of causality corresponds to the evaluation of directed arrows.} \label{figure:simulationresult} \end{figure*} We performed 100 experiments to evaluate RCD relative to the existing methods. We prepared 300 sets of samples for each experiment. The data of each experiment were generated as follows: The data generation process was modeled the same as Equation~\ref{equation:lingamco}. The number of observed variables $x_i$ was set to 20 and the number of latent confounders $f_k$ was set to 4. Let $X$ and $Y$ denote the stochastic variables, and assume that $Y\sim N(0.0,0.5)$ and $X=Y^3$. We used the random samples of $X$ for $e_i$ and $f_k$ because $X$ is non-Gaussian. The number of causal arrows between the observed variables is 40, and the start point and the end point of each causal arrow were randomly selected. We randomly drew two causal arrows from each latent confounder to the observed variables. Let $Z$ denote a stochastic variable that comes from a uniform distribution on $[-1.0,-0.5]$ and $[0.5,1.0]$. We used the random samples of $Z$ for $b_{ij}$ and $\lambda_{ik}$. \par We evaluated (1) how accurately each method infers the pairs of variables that are affected by the same latent confounders (called the evaluation of latent confounders), and (2) how accurately each method infers causality between the observed variables that are not affected by the same latent confounder (called the evaluation of causality). The evaluation of latent confounders corresponds to the evaluation of bi-directed arrows in a causal graph, and the evaluation of causality corresponds to the evaluation of directed arrows. We used precision, recall, and F-measure as evaluation measures. In regard to the evaluation of latent confounders, true positive (TP) is the number of true bi-directed arrows that are correctly inferred. In regard to causality, TP is the number of true directed arrows that a method correctly infers in terms of their positions and directions. Precision is TP divided by the number of estimations, and recall is TP divided by the number of all true arrows. F-measure is defined as $\text{F-measure} = 2 \cdot \text{precision} \cdot \text{recall} / (\text{precision} + \text{recall})$.\par The arguments of RCD, that is, $\alpha_{\text{C}}$ (alpha level for Pearson's correlation), $\alpha_{\text{I}}$ (alpha level for independence), $\alpha_{\text{S}}$ (alpha level for the Shapiro-Wilk test), and $n$ (maximum number of explanatory variables for multiple linear regression) were set as $\alpha_C=0.01, \alpha_I=0.01, \alpha_S=0.01,$ and $n=2$.\par In regard to the types of edges, FCI, RFCI, and GFCI produce partial ancestral graphs (PAGs) that include six types of edges: $\rightarrow$ (directed), $\leftrightarrow$ (bi-directed), $\hbox{$\circ$}\kern-1.5pt\hbox{$\rightarrow$}$ (partially directed), $\hbox{$\circ$}\kern-1.5pt\hbox{$-$}\kern-1.5pt\hbox{$\circ$}$ (nondirected), and $\hbox{$\circ$}\kern-1.5pt\hbox{$-$}$ (partially undirected). In the evaluation, we only used the directed and bi-directed edges. PC, GES, LiNGAM, and RESIT produce causal graphs only with the directed edges; thus, we did not evaluate those methods in terms of latent confounders.\par The box plots in Figure~\ref{figure:simulationresult} display the results. The vertical red lines indicate the median values. Note that some median values are the same as the upper or lower quartiles. For example, the median and the upper quartile of the recalls of RCD in the results of latent confounders are the same. It means that the results between the median and the upper quartile are the same. In regard to the evaluation of latent confounders, the precision, recall, and F-measure values are almost the same for RCD, FCI, RFCI, and GFCI, but the medians of precision, recall, and F-measure values of RCD are the highest among them. In regard to causality, RCD scores the highest medians of the precision and F-measure values among all the methods, and the median of recall for RCD is the second highest next to RESIT.\par The results suggest that RCD does not greatly improve the performance metrics compared to the existing methods. However, there is no other method that has the highest or the second highest performance for each metric. FCI, RFCI, and GFCI perform as well as RCD in terms of finding the pairs of variables that are affected by the same latent confounders, but they do not perform well in terms of the recall of causality. In addition, no other method performs well in terms of both precision and recall of causality. RCD can successfully find the pairs of variables that are affected by the same latent confounders and identify the causal direction between variables that are not affected by the same latent confounder. \subsection{Performance on real-world structures} Causal structures in the real-world are often very complex. Therefore, RCD likely produces a causal graph where each pair of observed variables is connected with a bi-directed arrow. The result of identifying latent confounders is affected by the threshold of the p-value for the independence test, $\alpha_I$. If $\alpha_I$ is too large or too small, then all the variable pairs are likely concluded to have the same latent confounders. Therefore, we need to find the most appropriate value of $\alpha_I$. We increased $k$ from 1 to 25 and set $\alpha_I$ as $\alpha_I = 0.1^{k}$ and repeated the process. We adopted a result that has the smallest number of pairs of variables with the same latent confounders.\par \begin{figure}[t] \centering \includegraphics[width=7.0cm]{socio.pdf} \caption{Variables and causal relations in the General Social Survey data set used for the evaluation.} \label{figure:socio} \end{figure} \begin{table*}[t] \footnotesize \caption{The results of the application to sociological data.} \label{table:socioresult} \begin{center} \begin{tabular}{|c|c|c|c|c|c|c|}\hline & \multicolumn{3}{|c|}{Bidirected arrows (Latent confounders)} & \multicolumn{3}{|c|}{Directed arrows (Causality)} \\\cline{2-7} Method & \# of estimation & \# of successes & Precision & \# of estimation & \# of successes & Precision\\\hline RCD & 4 & 4 & 1.0 & 5 & 4 & 0.8 \\ FCI & 3 & 3 & 1.0 & 3 & 1 & 0.3 \\ RFCI & 3 & 3 & 1.0 & 3 & 1 & 0.3 \\ GFCI & 0 & 0 & 0.0 & 0 & 0 & 0.0 \\ PC & - & - & - & 2 & 1 & 0.5 \\ GES & - & - & - & 2 & 1 & 0.5 \\ RESIT & - & - & - & 12 & 4 & 0.3 \\ LiNGAM & - & - & - & 5 & 4 & 0.8 \\\hline \end{tabular} \end{center} \end{table*} We analyzed the General Social Survey data set, taken from a sociological data repository.\footnote{http://www.norc.org/GSS+Website/} The data have been used for the evaluation of DirectLiNGAM in Shimizu et al.~\cite{shimizu2011}. The sample size is 1380. The variables and the possible directions are shown in Figure~\ref{figure:socio}. The directions were determined based on the domain knowledge in Duncan et al.~\cite{duncan1972} and temporal orders.\par We evaluated the directed arrows (causality) in the causal graphs produced by RCD and the existing methods, based on the directed arrows in Figure~\ref{figure:socio}. In addition, we evaluated the bi-directed arrows in causal graphs produced by the methods as accurate inference if they exist in Figure~\ref{figure:socio} as directed arrows.\par The results are listed in Table~\ref{table:socioresult}. In regard to bi-directed arrows (latent confounders), the number of successful inferences by RCD is the highest, and the precisions of RCD, FCI, and RFCI are all 1.0. In regard to the directed arrows (causality), the numbers of the successful arrows of RCD, RESIT, and LiNGAM are the highest. The precisions of RCD and LiNGAM are also the highest. The causal graph produced by RCD is shown in Figure~\ref{figure:sociorcd}. The dashed arrow $x_3 \leftarrow x_5$ is the incorrect inference, but the others are correct.\par RCD performs the best among the existing methods in terms of both identifying the pairs of variables that are affected by the same latent confounders and identifying the causal direction of the pairs of variables that are not affected by the same latent confounder. \begin{figure}[t] \centering \includegraphics[width=7.0cm]{socio_rcd.pdf} \caption{Causal graph produced by RCD: The dashed arrow, $x_3 \leftarrow x_5$ is incorrect inference, but the other arrows are reasonable based on Figure~\ref{figure:socio}} \label{figure:sociorcd} \end{figure} \section{Conclusion} \label{section:conclusion} We developed a method called repetitive causal discovery (RCD) that produces a causal graph where a directed arrow indicates the causal direction between the observed variables, and a bi-directed arrow indicates a pair of variables have the same confounder. RCD produces a causal graph by (1) finding the ancestors of each variable, (2) distinguishing the parents from the indirect causes, and (3) identifying the pairs of variables that have the same latent confounders. We confirmed that RCD effectively analyzes data confounded by unobserved variables through validations using simulated and real-world data.\par In this paper, we did not discuss the utilization of prior knowledge. However, it is possible to make use of prior knowledge of causal relations in practical applications of RCD. In this study, information about the ancestors of each variable was initialized to be an empty set. If we have prior knowledge about causal relations, the information about the ancestors of each variable that RCD retains can be set according to the prior knowledge.\par There is still room for improvement in the RCD method. The optimal settings of the arguments of RCD and the extension of RCD for nonlinear causal relations will be investigated in future studies. \section{Acknowledgments} We thank Dr. Samuel Y. Wang for his useful comments on a previous version of our algorithm proposed in \cite{maeda20a}. Takashi Nicholas Maeda has been partially supported by Grant-in-Aid for Scientific Research (C) from Japan Society for the Promotion of Science (JSPS) \#20K19872. Shohei Shimizu has been partially supported by ONRG NICOP N62909-17-1-2034 and Grant-in-Aid for Scientific Research (C) from Japan Society for the Promotion of Science (JSPS) \#16K00045 and \#20K11708. \section*{References}
\section{Introduction} \label{sec:introduction} Supervised learning is the most considered approach for dealing with classification tasks. This paradigm is based on a \emph{sufficiently representative} training set to learn a classification model. This level of representativeness is usually defined by two criteria: on the one hand, the training samples must be varied, which allows the algorithm to generalize instead of memorizing; on the other hand, the application of the trained model is assumed to be carried out on samples that come from the same distribution as those of the training set~\cite{DudaHS01}. Building a training set fulfilling these conditions is not always straightforward. Although obtaining samples might be easy, assigning their correct labels is costly. This is why there are efforts to alleviate the aforementioned requirements. However, while the conflict between memorization and generalization has been well studied, and there exist established mechanisms to deal with it such as regularization or data augmentation~\cite{Goodfellow-et-al-2016}, learning a model that is able to correctly classify samples from a different target distribution remains open to further research. This problem is generally called \emph{transfer learning} (TL) \cite{shao2014transfer}, and when the classification labels do not vary in the target distribution it is usually referred to as \emph{domain adaptation} (DA) \cite{WANG2018135}. Within the context of supervised learning, deep learning represents an important breakthrough \cite{lecun2015deep}. This term refers to the latest generation of artificial neural networks, for which novel mechanisms have been developed that allow training deeper networks, i.e., with many layers. These deep neural networks represent the state of the art in many classification tasks, and have managed to break the existing glass ceiling in many traditionally complex tasks. In turn, deep learning often requires a large amount of data, which makes the study of DA even more interesting. As we will review in the next section, there are several alternatives to attempt DA, both general strategies and using deep neural networks. In this work we take a different avenue and study an incremental approach. We propose to use an existing DA algorithm for deep learning to classify those samples of the target domain for which the model is confident. Assuming the assigned labels as ground truth, the model is retrained. This added knowledge allows the network to refine its behavior to correctly classify other samples of the target set. This incremental process is repeated until the entire target set is completely annotated. We will show that this incremental approach achieves noticeable improvements with respect to the underlying DA algorithm. In addition, it is competitive on different benchmarks compared to other state-of-the-art DA algorithms. The rest of the paper is structured as follows: we outline in Section 2 the existing literature about DA, with special emphasis to that based on deep neural networks; we present in Section 3 the proposed incremental methodology, as well as the underlying DA model that we consider in this work; we describe our experimental setting in Section 4, while the results are reported in Section 5; finally, the work is concluded in Section 6. \section{Background} \label{sec:background} Since the beginning of machine learning research, there exists the idea of exploiting a model beyond its use over unknown samples of the source distribution. In the literature we can find two main topics that pursue this objective: the aforementioned TL and DA strategies. In TL, some knowledge of the model is used to solve a different classification task. For example, a pre-trained DNN model can be used as initialization \cite{SimonyanZ14a,HeZRS16} or its feature extraction process can be considered as the basis of another classification model \cite{yosinski2014transferable}. As a special case of TL, the DA challenge typically assumes that the classification task of the target distribution is the same (i.e., the set of labels is equal). In this work we focus on the latter case. In a DA scenario, we can also distinguish between semi-supervised and unsupervised approaches. While semi-supervised DA considers that some labeled samples of the target distribution are available \cite{6774431,yao2015semi,Saito2019}, unsupervised DA works with just unlabeled samples \cite{tpami_kouw}. We will revisit in this section unsupervised DA techniques, as it is the case of the proposed approach. Performing unsupervised DA is still considered an open problem from both theoretical and practical perspectives \cite{BousmalisSDEK17}. Most approaches consider that the key is to build a good feature representation that becomes invariant to the domain \cite{Ben-David2006}. A good example is the \emph{Domain Adaptation Neural Network} (DANN) proposed by Ganin et al. \cite{Ganin2016DANN}, which simultaneously learns domain-invariant features from both source and target data and discriminative features from the source domain. Following this line of research, many approaches have been proposed more recently: \emph{Virtual Adversarial Domain Adaptation} (VADA) proposed by Shu et al. \cite{shu2018a} added a penalty term to the loss function to penalize class boundaries that cross high-density feature regions. The \emph{Deep Reconstruction-Classification Networks} (DRCN) \cite{Ghifary2016} consists of a neural network that forces a common representation of both the source and target domains by sample reconstruction, while learning the classification task from the source samples. The \emph{Domain Separation Networks} (DSN) proposed by Bousmalis et al. \cite{Bousmalis2016} are trained to map input representations onto both a domain-specific subspace and a domain-independent subspace, in order to improve the way that the domain-invariant features are learned. Haeusser et al. \cite{Haeusser2017} proposed \emph{Associative Domain Adaptation} (ADA), which is another domain-invariant feature learning approach that reinforces associations between source and target representations in an embedding space with neural networks. The \emph{Adversarial Discriminative Domain Adaptation} (ADDA) strategy \cite{Tzeng2017} follows the idea of Generative Adversarial Networks, along with discriminative modeling and untied weight sharing to learn domain-invariant features, while keeping a useful representation for the discriminative task. \emph{Drop to Adapt} (DTA) \cite{Lee2019} makes use of adversarial dropout to enforce discriminative domain-invariant features. Damodaran et al. \cite{Damodaran2018} proposed the \emph{Deep Joint Distribution Optimal Transport} (DeepJDOT) approach, which learns both the classifier and aligned data representations between the source and target domain following a single neural framework with a loss functions based on the Optimal Transport theory \cite{optimal-transport}. A different strategy to DA consists in learning how to transform features from one domain to another. Following this idea, the \emph{Subspace Alignment} (SA) method \cite{Fernando2013SA} seeks to represent the source and target domains using subspaces modelled by eigenvectors. Then, it solves an optimization problem to align the source subspace with the target one. Also, Sun and Saenko proposed the \emph{Deep Correlation Alignment} (D-CORAL) approach \cite{Baochen2016CORAL}, which consists of a neural network that learns a nonlinear transformation to align correlations of layer activations from the source and target distributions. While the methods outlined above seek for new ways to achieve the desired characteristics of a proper DA method, our proposed approach takes a different avenue. Specifically, we build upon the existing DANN approach, and we propose novel ways to improve its ability to adapt to the target domain by performing the adaptation incrementally. \section{Methodology} \label{sec:method} \subsection{Preliminaries} Let $X$ be the input space and $Y$ be the output or \emph{label} space. A classification task assumes that there exist a function $f : X \rightarrow Y$ that assigns a label to each possible sample of the input space. For supervised learning, the goal is to learn a hypothesis function $h$ that models the unknown function $f$ with the least possible error. We refer to $h$ as label classifier. Quite often, the approach is to estimate a posterior probability $P(Y|X)$ so that the label classifier follows a \emph{maximum a posteriori} decision such that $h(x) = \arg\max_{y \in Y} P(x|y)$. This is the case with neural networks. In the DA scenario, there exist two distributions over $X \times Y$: $D_S$ and $D_T$, which are referred to as \emph{source domain} and \emph{target domain}, respectively. We focus on the case of unsupervised domain adaptation, for which DA is only provided with a labeled source set $S=\left \lbrace \left ( x_i,y_i\right )\right \rbrace _{i=1}^n\thicksim (D_S)^n$ and a completely unlabeled target domain $T=\left \lbrace \left (x_i\right )\right \rbrace _{i=1}^{n'}\thicksim (D_T)^{n'}$. The goal of a DA algorithm is to build a label classifier for $D_{T}$ by using the information provided in both $S$ and $T$. \subsection{Domain Adaptation Neural Network} Given its importance in the context of our work, we further describe here the operation of DANN, which will be considered as the backbone for our incremental approach. DANN is based on the \emph{theory of learning from different domains} discussed by \cite{BenDavid2006,BenDavid2010}. This suggests that the transfer of the knowledge gained from one domain to another must be based on learning features that do not allow to discriminate between the two domains (source and target) of the samples to be classified. For this, DANN learns a classification model from features that do not encode information about the domain of the sample to be classified, thus generalizing the knowledge from a source labeled domain to a target unlabeled domain. More specifically, the proposed neural architecture includes a \emph{feature extractor} module ($G_f$) and a \emph{label classifier} ($G_y$), which together build a standard feed-forward neural network that can be trained to classify an input sample $x$ into one of the possible categories of the output space $Y$. The last layer of the label classifier $G_y$ uses a ``softmax'' activation, which models the posterior probability $P(x \mid y),\, \forall y \in Y$ of a given input $x \in X$. DANN adds a new \emph{domain classifier} module ($G_d$) to the neural network, that classifies the domain to which the input sample $x$ belongs. This classifier is built as a binary logistic regressor that models the probability that an input sample $x$ comes from the source distribution ($d_i = 0$ if $x \sim{\cal D}_S$) or the target distribution ($d_i = 1$ if $x \sim{\cal D}_T$), where $d_i$ denotes a binary variable that indicates the domain of the sample. The unsupervised adaptation to a target domain is achieved as follows: the domain classifier $G_d$ is connected to the feature extractor $G_f$ (which is shared with the label classifier $G_y$) through the so-called \emph{gradient reversal layer} (GRL). This layer does nothing at prediction. However, while learning through back-propagation, it multiplies the gradient by a certain negative constant ($\lambda$). In other words, the GRL receives the gradient from the subsequent layer and multiplies it by $-\lambda$, therefore changing its sign before passing it to the preceding layer. The idea of this operation is to force $G_f$ to learn generic features that do not allow discriminating the domain. In addition, since this training is carried out simultaneously with the training of $G_y$ (label classifier), the features must be adequate for discriminating the categories to classify, yet unbiased with respect to the input domain. According to the DA theory, this should cause $G_y$ to be able to correctly classify input samples regardless of their domain, given that the features from $G_f$ are forced to be invariant. The DANN training simultaneously updates all modules, providing samples for both $G_y$ and $G_d$. This can be done by using conventional mechanisms such as Stochastic Gradient Descent, from batches that include half of the examples from each domain. During the training process, the learning of $G_f$ pursues a trade-off between appropriate features for the classification ($G_y$) and inappropriate features for discriminating the domain of the input sample ($G_d$). The hyper-parameter $\lambda$ allows tuning this trade-off. The training is performed until the result converges to a saddle point, which can be found as a stationary point in the gradient update defined by the following equation: \begin{equation} \theta_f \leftarrow \theta_f - \mu \left( \frac{\partial {\cal L}_y}{\partial \theta_f} - \lambda \frac{\partial {\cal L}_d}{\partial \theta_f} \right) \label{eq:dann_loss} \end{equation} \noindent where $\theta_f$ denotes the weights of $G_f$, $\mu$ denotes the learning rate, and ${\cal L}_y$ and ${\cal L}_d$ represent the loss functions for the label classifier and the domain classifier, respectively. A graphical overview of the DANN architecture is depicted in Fig. \ref{fig:dann_scheme}. \begin{figure*}[ht] \centering \includegraphics[width=.8\linewidth]{fig_DANN_scheme.pdf} \caption{Graphical overview of the DANN architecture, consisting of three blocks: feature extractor ($G_f$), label classifier ($G_y$), and domain classifier ($G_d$). The GRL circle denotes the gradient reversal layer that multiplies the gradient by a negative factor.} \label{fig:dann_scheme} \end{figure*} \subsection{Incremental DANN} Our main contribution within the context of DA is to propose an incremental approach to DANN (iDANN). This strategy is explained below. Once the DANN model is trained as explained in the previous section, we can use both the feature extractor $G_f$ and the label classifier $G_y$ to predict the category of samples from both the target domain and the source domain ($G_y(G_f(x))$). The ``softmax'' activation used at the output of this classifier returns the posterior probability that the network considers $x$ to belong to any of the classes of the output space $Y$. Our main assumption is that we can use the subset of samples from the target domain for which $G_y$ is more confident, and then add them to the source labeled domain assuming the prediction as ground truth. These samples are thereafter considered as samples of the source domain completely. Afterwards, we can retrain the DANN network to fine-tune its weights using the new training set. This process is repeated iteratively, moving the labeled samples with greater confidence from the target domain to the source domain after each iteration. We stop when there are no more samples to move from the target domain. The intuitive idea behind our approach is that by adding target domain information to the source (labeled) domain, the DANN learns new domain-invariant features that better fit the eventual classification task, thereby becoming more accurate for other target domain samples. In each iteration, however, the task increases its complexity because it deals first with the simplest samples to classify (for which the DANN is more confident), leaving those that have more dissimilar features in the unlabeled target set. When the DANN is retrained with labeled samples that include target domain information, the domain classifier $G_d$ needs to be more specific. This forces the feature extraction module $G_f$ to forget the features that differentiate more complex samples from the target domain. We formalize the process in Algorithm \ref{alg:idann}, where $e$ and $b$ represents the number of epochs and the batch size considered, respectively, $\iEpochs$ denotes the number of epochs for the incremental stage of the algorithm, $\iSize$ indicates the size of the subset of target domain samples to select in each iteration, and $\beta$ is a constant that allows us to modify this size after each iteration. \begin{algorithm}[ht] \caption{Incremental DANN (iDANN)} \label{alg:idann} \SetAlgoLined \SetKwInOut{KwIn}{Input} \SetKwInOut{KwOut}{Output} \KwIn{ $S \leftarrow \{( x_i,y_i) \sim {\cal D}_S \}$ \\ $T \leftarrow \{(x_i) \sim {\cal D}_T \}$ \\ $e, \iEpochs, b, \iSize, \lambda, \beta \leftarrow \text{Initial hyper-parameters values}$ \\ } \KwOut{$G_f, G_y, \text{CNN}$} \While{$T \neq \emptyset$}{ $G_f, G_y \leftarrow \text{Fit DANN with } \{S, T, e, b, \lambda\}$ \\ $\hat{B}_{\iSize} \leftarrow \text{\texttt{selection\_policy}} (G_f, G_y, T, \iSize)$ \\ $S \leftarrow S \cup \hat{B}_{\iSize}$ \\ $T \leftarrow T \backslash \hat{B}_{\iSize}$ \\ $e \leftarrow \iEpochs$ \\ $\iSize \leftarrow \beta \iSize$ \\ } $\hat{T} \leftarrow \{ ( x_i,y_i) \, \mid \, x_i \sim {\cal D}_T, y_i = G_y( G_f( x_i ) ) \} $ \\ $\text{Fit CNN with } \{ \hat{T}, e, b \}$ \\ \end{algorithm} In this algorithm, the samples of the target domain ($\hat{B}$) are classified using the label classifier $G_y$, and then it proceeds to select a subset $\hat{B}_{\iSize}$ of size $\iSize$ to be moved from the target domain to the source domain. For this purpose, two selection criteria are proposed, which are described in the next section. Once the iterative stage of the algorithm ends, the label classifier $G_y$ is used to classify the entire original target domain (see line 9 of Algorithm \ref{alg:idann}). This labeled target set is used to then train a neural network from scratch, which is therefore specialized in classifying target domain samples (more details in Section \ref{sec:separated_cnn}). \subsection{Selection policies} Below we describe in detail the two proposed policies to select samples during the iterative stage of Algorithm~\ref{alg:idann} (\texttt{selection\_policy}). One policy is directly based on the confidence level that the network provides to the prediction, while the other is based on geometric properties of the learned feature space. \subsubsection{Confidence policy \label{sec:prob_policy}} As mentioned above, the output of the label classifier $G_y$ uses a softmax activation. Let $L$ denote the number of labels. Then, the standard softmax function $\sigma : \mathbb{R}^L \to \mathbb{R}^L$ is defined by Equation \ref{eq:softmax}. \begin{equation} \sigma(\mathbf{z})_i = \frac{e^{z_i}}{\sum_{j=1}^L e^{z_j}} \text{ for } i = 1, \dotsc, L \text{ and } \mathbf{z} = (z_1, \dotsc, z_L) \in \mathbb{R}^L \label{eq:softmax} \end{equation} This function normalizes an $L$-dimensional vector $\mathbf{z}$ of unbounded real values into another $L$-dimensional vector $\sigma(\mathbf{z})$, for which values range between $[0,1]$ and add up to $1$. This can be interpreted as a posterior probability over the different possible labels \cite{Bridle1990softmax}. In order to turn these probabilities into the predicted class label, we simply take the argmax-index position of this output vector, following a \emph{Maximum a Posteriori} probability criterion. Taking advantage of this interpretation, the first policy for selecting samples to move from the target domain to the source is based on the probability provided by the label classifier $G_y$, which can be seen as a measure of confidence in such classification. With this criterion, we will keep the maximum predicted probability value for each sample of the target set among the possible labels. Then, we will order all samples based on this value---from highest to lowest---in order to select the first $\iSize$ samples to build the subset $\hat{B}_{\iSize}$. Algorithm \ref{alg:prob_policy} presents the algorithmic description of this process, where $G^{p}_y$ refers to the probabilistic output of the label classifier after the softmax activation, before applying argmax to select a label. The function \textit{sortr} is used to sort the set in decreasing order. \begin{algorithm}[ht] \caption{Confidence policy} \label{alg:prob_policy} \SetAlgoLined \SetKwInOut{KwIn}{Input} \SetKwInOut{KwOut}{Output} \KwIn{ $T \leftarrow \{(x_i) \sim {\cal D}_T \}$ \\ $G_f, G_y \leftarrow \text{Feature extractor and label classifier}$ \\ $\iSize \leftarrow \text{Size of the selected samples subset}$ \\ } \KwOut{$\hat{B}_{\iSize}$} $\hat{B} \leftarrow G^{p}_y( G_f( T ) )$ \\ $\hat{B}_{\iSize} \leftarrow \{\emptyset\}$ \\ \ForEach{$(x_i,y_i) \in \textit{sortr}( \hat{B} )$}{ $\hat{B}_{\iSize} \leftarrow \hat{B}_{\iSize} \cup (x_i,y_i)$ \\ \If{$|\hat{B}_{\iSize}| = \iSize$}{ break \\ } } \end{algorithm} Figure \ref{fig:policy1_prob} shows an example of a set of probabilities obtained after predicting the target samples with DANN. The figure on the left shows the maximum probability values obtained for the classification of each sample---without sorting---while in the figure on the right the sorted set is shown, where the threshold $\iSize$ has been highlighted. \begin{figure*}[ht] \centering \includegraphics[width=.48\linewidth]{fig_prob_policy} \includegraphics[width=.48\linewidth]{fig_prob_policy_sort} \caption{Example of probabilities obtained with DANN. Left: maximum probability of each sample. Right: ordered set of maximum probabilities, where the threshold $\iSize$ has been highlighted. } \label{fig:policy1_prob} \end{figure*} \subsubsection{$k$NN policy \label{sec:knn_policy}} As in the previous case, once the network has been trained, we use the label classifier $G_y$ to predict the labels of the whole target domain and then we sort them based on the confidence given by the network. However, in this case, instead of directly selecting a subset of samples according to this confidence, we will also evaluate the geometric properties of the feature space. This is performed following the $k$-nearest neighbor rule. We first obtain the feature set $F_S$ from the source set $S$ (using $G_f(S)$). We then proceed to iterate the target set samples sorted by their level of confidence. Given a target sample, if the label of the $k$-nearest samples of the source domain matches the label assigned by the label classifier $G_y$, then we will select the prototype. Otherwise, we will discard it. Therefore, samples are selected based on both the confidence provided by the DANN in their label and the extent they match the distribution of the source domain. Algorithm \ref{alg:knn_policy} describes this process algorithmically. The $kNN (q, F_S, k) $ function receives as parameters the query sample $q$, the set $F_S$ and the value $k$ to be used, and yields the predicted label $l$ and the number of samples $m$ within its $k$-nearest neighbors from $S$ that have the same label. \begin{algorithm}[ht] \caption{$k$NN policy} \label{alg:knn_policy} \SetAlgoLined \SetKwInOut{KwIn}{Input} \SetKwInOut{KwOut}{Output} \KwIn{ $S \leftarrow \{( x_i,y_i) \sim {\cal D}_S \}$ \\ $T \leftarrow \{(x_i) \sim {\cal D}_T \}$ \\ $G_f, G_y \leftarrow \text{Feature extractor and label classifier}$ \\ $\iSize \leftarrow \text{Size of the selected samples subset}$ \\ $k \leftarrow \text{Number of neighbors to consider}$ \\ } \KwOut{$\hat{B}_{\iSize}$} $F_S \leftarrow G_f( S )$ \\ $\hat{B} \leftarrow G^{p}_y( G_f( T ) )$ \\ $\hat{B}_{\iSize} \leftarrow \{\emptyset\}$ \\ \ForEach{$(x_i,y_i) \in \textit{sortr}( \hat{B} )$}{ $f^{(i)}_{T} \leftarrow G_f( x_i )$ \\ $l, m \leftarrow kNN(f^{(i)}_{T}, F_S, k)$ \\ \If{$y_i = l \textbf{ and } m = k$}{ $\hat{B}_{\iSize} \leftarrow \hat{B}_{\iSize} \cup (x_i,y_i)$ \\ \If{$|\hat{B}_{\iSize}| = \iSize$}{ break \\ } } } \end{algorithm} The idea of this policy is to select the samples of the target domain whose features are within the cluster of the source domain for the same class. An illustrative example of this condition is shown in Fig.~\ref{fig:knn_policy} with $k = 5$. The example shows two labels of the source domain as green circles and blue squares. The red stars denote the target domain examples that are being evaluated to determine if they are selected. For instance, the star on the left would be selected if, and only if, the network classified it as a green circle, since its 5-nearest neighbors are green circles. Similarly, the star on the right would be selected if, and only if, the network classified it as a blue square. However, the central star would always be discarded because its 5-neighbors belong to two different classes. If we increase $k$, the red star of the left would still be selected (if labeled as green circle) because it is located in the middle of the cluster. However, the red start of the right is closer to label boundaries, and so it would eventually be discarded. \begin{figure*}[ht] \centering \includegraphics[width=.5\linewidth]{fig_knn_example.pdf} \caption{Example of sample selection using the kNN policy with $k = 5$. Green circles and blue squares represent samples of two different classes from the source domain. Red stars represent the samples of the target domain that are evaluated to determine whether they are chosen.} \label{fig:knn_policy} \end{figure*} \subsection{Training a CNN with the new labeled target set \label{sec:separated_cnn}} As described in Algorithm \ref{alg:idann}, once the iterative stage of the iDANN algorithm is completed, we use the label classifier $G_y$ to annotate the entire original target set $T$ from scratch. Then, a new CNN is trained by conventional means considering the same neural architecture of $G_y(G_f(\cdot))$. This allows us to eventually get a neural network that is directly specialized in the classification of the target domain. However, we assume that some part of the iterative annotation of the target set will contain noise at the label level. To mitigate the possible efects of this noise, we consider \emph{label smoothing} \cite{Szegedy2016}. This is an efficient and theoretically-grounded strategy for dealing with label noise, which also makes the model less prone to overfitting. Compared to classical one-hot output representation, label smoothing changes the construction of the true probability to \begin{equation} y'_i = (1 - \epsilon) y_i + \frac{\epsilon}{L}, \label{eq:label_smooth} \end{equation} where $\epsilon$ is a small constant (or smoothing parameter) and $L$ is the total number of classes. Hence, instead of minimizing cross-entropy with hard targets (0 or 1), it considers soft targets. \section{Experimental setup} \label{sec:setup} \subsection{Datasets} The proposed approach will be evaluated with two different classification tasks, that are common in the DA literature. The first one is that of digit classification, for which we consider the following datasets: \begin{itemize} \item MNIST \cite{LeCun1998mnist}: this collection contains $28\times 28$ images representing isolated handwritten digits. % \item MNIST-M \cite{Ganin2016DANN}: this dataset was synthetically generated by merging MNIST samples with random color patches from BSDS500~\cite{Arbelaez2011BSDS500}. % \item Street View House Numbers (SVHN) \cite{Netzer2011SVHN}: it consists of images obtained from house numbers from Google Street View. It represents a real-world challenge of digit recognition in natural scenes, for which several digits might appear in the same image and only the central one must be classified. \item Synthetic Numbers \cite{Ganin2016DANN}: images of digits generated using Windows{\texttrademark} fonts, with varying position, orientation, color and resolution. \end{itemize} In addition, we also evaluate our approach for traffic sign classification with the following datasets: \begin{itemize} \item German Traffic Sign Recognition Benchmark (GTSRB) \cite{Stallkamp2012GTSRB}: this dataset contains images of traffic signs obtained from the real world in different sizes, positions, and lighting conditions, as well as including occlusions. \item Synthetic Signs \cite{Moiseev2013SynthSigns}: this dataset was synthetically generated by taking common street signs from Wikipedia and applying several transformations. It tries to simulate images from GTSRB although there are significant differences between them. \end{itemize} Table \ref{tab:datasets} summarizes the information of our evaluation corpora, including the domain to which they belong, the number of labels, the image resolution, the number of samples, and the type of image indicating whether they are in color or grayscale format. Figure \ref{fig:datasets} shows some random examples from each of these datasets. \begin{table}[ht] \caption{Description of the datasets used in the experimentation.} \label{tab:datasets} \centering \begin{adjustbox}{width=\textwidth, keepaspectratio} \begin{tabular}{ccccccc} \toprule \textbf{Set} & \textbf{\# labels} & \textbf{Domain} & \textbf{Resolution (px)} & \textbf{Gray/Color} & \textbf{\# samples} & \\ \hline \multirow{4}{*}{Numbers} & \multirow{4}{*}{10} & MNIST & $28\times28$ & Gray & 65,000 \\ & & MNIST-M & $28\times28$ & Color & 65,000 \\ & & SVHN & $32\times32$ & Color & 99,289 \\ & & Syn. Numbers & $32\times32$ & Color & 488,953 \\ \hline \multirow{2}{*}{\begin{tabular}[c]{@{}c@{}}Traffic\\signs\end{tabular}} & \multirow{2}{*}{43} & GTSRB & $[25\times25, 225\times243]$ & Color & 51,839 \\ & & Syn. Signs & $40\times40$ & Color & 100,000 \\ \bottomrule \end{tabular} \end{adjustbox} \end{table} \newcommand{.2}{.2} \newcommand{0.8cm}{0.8cm} \begin{figure}[ht] \centering \subfloat[MNIST]{ \includegraphics[width=.2\linewidth]{fig_dataset_mnist.png} \label{fig:dataset_mnist} } \hspace{0.8cm} \subfloat[MNIST-M]{ \includegraphics[width=.2\linewidth]{fig_dataset_mnist_m.png} \label{fig:dataset_mnist_m} } \hspace{0.8cm} \subfloat[SVHN]{ \includegraphics[width=.2\linewidth]{fig_dataset_svhn.png} \label{fig:dataset_svhn} } \\ \subfloat[Syn. Numbers]{ \includegraphics[width=.2\linewidth]{fig_dataset_syn_numbers.png} \label{fig:dataset_syn_numbers} } \hspace{0.8cm} \subfloat[GTSRB]{ \includegraphics[width=.2\linewidth]{fig_dataset_gtsrb.png} \label{fig:dataset_gtsrb} } \hspace{0.8cm} \subfloat[Syn. Signs]{ \includegraphics[width=.2\linewidth]{fig_dataset_syn_signs.png} \label{fig:dataset_syn_signs} } \caption{Random examples from the datasets used in experimentation.} \label{fig:datasets} \end{figure} The images of each classification task were rescaled to the same size: the digits to $28 \times 28$ pixels, and the traffic signs to $40 \times 40$ pixels. Concerning the pre-processing of the input data, the images were normalized within the range $[0,1]$. The train and test partitions were those proposed by the authors of each dataset, in order to ensure a fair comparison with the results obtained in the literature. \subsection{CNN architectures} To evaluate the proposed methodology, the same three CNN architectures used in the original DANN paper have been tested. Table \ref{tab:topologies} reports a summary of these architectures. As the authors pointed out, these topologies are not necessarily optimal and better adaptation performance might be attained if they were tweaked. However, we chose to keep the same configuration to make a fairer comparison. As the activation function, a Rectifier Linear Unit (ReLU) was used for each convolution layer and fully-connected layer, except for the the output layers. $L$ neurons with softmax activation were used as output of the label classifier. For the output of the domain classifier, a single neuron with a logistic (sigmoid) activation function was used to discriminate between two possible categories (source domain or target domain). Model 1 was used for all the experiments with digit datasets, except those using SVHN. This topology is inspired by the classical LeNet-5 architecture \cite{LeCun1998mnist}. Model 2 was used to evaluate the experiments with digits that include SVHN. This architecture is inspired by \cite{Srivastava2014}. Finally, Model 3 was used for the experiments with traffic sings. In this case, the single-CNN baseline obtained from \cite{Ciresan2012} was used. \begin{table}[ht] \caption{CNN network configurations considered. Notation: $Conv(f,w,h)$ stands for a layer with $f$ convolution operators with a kernel of size $w\times h$ pixels, $MaxPool(w,h)$ stands for the max-pooling operator of dimensions $w\times h$ pixels---with a $2\times2$ in all cases---and $FC(n)$ represents a fully-connected layer of $n$ neurons. In the output layer of the label classifier a fully-connected layer of $L$ neurons with softmax activation is added, where $L$ denotes the number of categories of the dataset at issue.} \label{tab:topologies} \centering \begin{adjustbox}{width=\textwidth, keepaspectratio} \begin{tabular}{c|lll|l|l} \toprule & \multicolumn{3}{c|}{\textbf{Feature extractor}} & & \\ \textbf{Model} & \multicolumn{1}{c}{\textbf{Layer 1}} & \multicolumn{1}{c}{\textbf{Layer 2}} & \multicolumn{1}{c|}{\textbf{Layer 3}} & \multicolumn{1}{c|}{\textbf{Label classifier}} & \multicolumn{1}{c}{\textbf{Domain classifier}} \\ \hline 1 & \begin{tabular}[c]{@{}l@{}}Conv(32, 5, 5)\\MaxPool(2, 2)\end{tabular} & \begin{tabular}[c]{@{}l@{}}Conv(48, 5, 5)\\MaxPool(2, 2)\end{tabular} & & \begin{tabular}[c]{@{}l@{}}FC(100)\\FC(100)\\FC(L)\end{tabular} & \begin{tabular}[c]{@{}l@{}}FC(100)\\FC(1)\end{tabular} \\ \hline 2 & \begin{tabular}[c]{@{}l@{}}Conv(64, 5, 5)\\MaxPool(3, 3)\end{tabular} & \begin{tabular}[c]{@{}l@{}}Conv(64, 5, 5)\\MaxPool(3, 3)\end{tabular} & \begin{tabular}[c]{@{}l@{}}Conv(128, 5, 5)\end{tabular} & \begin{tabular}[c]{@{}l@{}}FC(3072)\\FC(2048)\\FC(L)\end{tabular} & \begin{tabular}[c]{@{}l@{}}FC(1024)\\FC(1024)\\FC(1)\end{tabular} \\ \hline 3 & \begin{tabular}[c]{@{}l@{}}Conv(96, 5, 5)\\MaxPool(2, 2)\end{tabular} & \begin{tabular}[c]{@{}l@{}}Conv(144, 3, 3)\\MaxPool(2, 2)\end{tabular} & \begin{tabular}[c]{@{}l@{}}Conv(256, 5, 5)\\MaxPool(2, 2)\end{tabular} & \begin{tabular}[c]{@{}l@{}}FC(512)\\FC(L)\end{tabular} & \begin{tabular}[c]{@{}l@{}}FC(1024)\\FC(1024)\\FC(1)\end{tabular} \\ \bottomrule \end{tabular} \end{adjustbox} \end{table} \subsection{Training stage} \label{subsec:training} To ensure a fair comparison with the original DANN algorithm, we set the same training configuration: Stochastic Gradient Descent with a learning rate of $0.01$, decay of $10^{-6}$, and momentum of $0.9$, as well as the same number of epochs ($300$). For the iterative stage of iDANN, we set $\iEpochs$ to $25$. This value was determined empirically. We observed that it allowed the network weights to be tuned with the new knowledge without taking too long to perform a new iteration. In each training iteration, the greater improvement occurs in the first epochs, after which the accuracy of the label classifier is stabilized. Concerning the size of the subset to select from the target set ($\iSize$), we decided to consider a percentage of the remaining samples rather than a fixed value. Initially, we set it to $5 \%$, and it was increased after each iteration by $150 \%$ ($\beta=1.5$) until all target domain samples are selected. This value was also obtained empirically, by observing better results and more stable training if few samples are added in the first iterations. Different values for both the batch size $b$ and $\lambda$ are evaluated, as will be reported in the experimentation section. \section{Results} \label{sec:experiments} In this section we evaluate the proposed method using the datasets, topologies, and settings described in Section \ref {sec:setup}. We first study the different hyper-parameterization, as well as the two prototype selection policies proposed. Next we show the performance results obtained over the datasets and, finally, we compare with other state-of-the-art methods. \subsection{Hyper-parameters evaluation} In this section, we start by analyzing the influence of the batch size and the value of $\lambda$ on the performance of the method, as these hyper-parameters are those that affect the training stage the most. For this, we consider the batch sizes of $\{16, 32, 64, 128, 256, 512\}$ and $\lambda$ of $\{10^{-1}, 10^{-2}, 10^{-3}, 10^{-4} \}$. This means that each result comes from a total of 336 experiments (14 combinations of dataset pairs $\times$ 6 batch values $\times$ 4 values of $\lambda$). The rest of hyper-parameters are set as indicated in Section \ref{subsec:training}, that is: $e = 300$ (as in the original DANN paper), $\iEpochs = 25$, and $\iSize = 5 \%$, which were empirically determined to favor stable training and obtain good results. In addition, we evaluate the results using only the prototype selection policy based on network's confidence, as next section will be devoted to comparing the two proposed policies with the best hyper-parameters found. As we are dealing with an unsupervised method, we mainly focus on analyzing the trend when modifying these parameters. Table \ref{tab:gs-results} shows the results of this experiment, where each figure represents the average of the 14 possible combinations of source and target domain of the datasets considered and all the iterations performed by the iDANN algorithm. The first thing to remark is that some of the hyper-parameter combinations evaluated in these experiments do not converge ($h = 32/64$, $\lambda = 10^1$ for traffic signs). This could be detected automatically, since the accuracy is abruptly reduced to a value approximately equal to a random guess, for both the training set and evaluation set and for both the source and the target domain. However, these results have been kept in order to observe the general trend of the method and how these parameters affect it. It can also be observed that the best performance is achieved with $\lambda = 10^{-2}$ in the two types of corpora, while a batch size of $64$ and $32$ are better for the digits and traffic signs, respectively. On average, better results are reported with low $\lambda$ values and batch sizes between $32$ and $256$. When $\lambda$ is greater (e.g., $10^{-1}$), the training becomes highly unstable, especially if combined with small batch sizes. \begin{table}[ht] \caption{Influence of hyper-parameter setting on the performance (accuracy, in \%) of the iDANN algorithm. Figures report classification accuracy over the target set, averaging with the respective datasets and iterations of the algorithm.} \label{tab:gs-results} \centering \scriptsize \begin{tabular}{clcccclcccc} \toprule & & \multicolumn{4}{c}{\textbf{Numbers}} & & \multicolumn{4}{c}{\textbf{Traffic signs}} \\ \cline{3-6} \cline{8-11} & & \multicolumn{4}{c}{$\boldsymbol{\lambda}$} & & \multicolumn{4}{c}{$\boldsymbol{\lambda}$} \\ \cline{3-6} \cline{8-11} \textbf{Batch} & & $\boldsymbol{10^{-4}}$ & $\boldsymbol{10^{-3}}$ & $\boldsymbol{10^{-2}}$ & $\boldsymbol{10^{-1}}$ & & $\boldsymbol{10^{-4}}$ & $\boldsymbol{10^{-3}}$ & $\boldsymbol{10^{-2}}$ & $\boldsymbol{10^{-1}}$ \\ \cline{1-1} \cline{3-6} \cline{8-11} \textbf{16} & & 58.74 & 56.21 & 58.65 & 47.54 & & 89.67 & 88.65 & 90.08 & 48.16 \\ \textbf{32} & & 66.13 & 65.82 & 61.67 & 49.78 & & 93.58 & 93.63 & \textbf{94.50} & 24.02 \\ \textbf{64} & & 65.26 & 66.41 & \textbf{66.82} & 62.54 & & 91.27 & 91.16 & 91.67 & 31.41 \\ \textbf{128} & & 64.23 & 66.04 & 66.79 & 52.89 & & 88.56 & 89.36 & 89.60 & 66.78 \\ \textbf{256} & & 64.55 & 63.94 & 64.24 & 59.36 & & 87.34 & 87.73 & 88.67 & 91.39 \\ \textbf{512} & & 62.55 & 62.61 & 62.75 & 50.67 & & 84.34 & 84.45 & 84.09 & 84.60 \\ \bottomrule \end{tabular} \end{table} Next, we analyze the influence of these parameters with respect to the iteration of the iDANN algorithm. Table \ref{tab:it-increment} shows the average result obtained by grouping all combinations of datasets (numbers and traffic signs) and hyper-parameters considered. As in the previous analysis, better results are also observed for low $\lambda$ values and batch sizes between $32$ and $256$ (see column `Avg.'). In this case, it can also be seen that low $\lambda$ values are more appropriate in the first iterations, whereas greater $\lambda$ values are more appropriate in the last iterations. It might happen that a more stable way of proceeding (low $\lambda$) is preferred in the first iterations, even at the cost of being less aggressive in the domain adaptation. Therefore, we propose to start with a low $\lambda$ and increase its value gradually ($+10^{- 4}$ after each epoch). Additionally, it is observed that each iteration of the algorithm leads to a better result than the previous one (except for $\lambda \ge 10^{-1}$), yielding the higher leap in the first iterations and reducing this difference towards the last iterations. Including all cases, the results improve by $5.19 \%$ between the first and the last iteration, on average. If we ignore those settings that do not converge, the average improvement obtained increases to $10.29 \%$. \begin{table}[ht] \caption{Influence of hyper-parameter setting on the performance of the iDANN algorithm with respect to number of iterations. Figures report classification accuracy over the target set, averaging with the respective datasets.} \label{tab:it-increment} \centering \scriptsize \begin{tabular}{cccccccccccc} \toprule & & \multicolumn{9}{c}{\textbf{Iterations}} & \\ \cline{3-11} $\boldsymbol{\lambda}$ & \textbf{Batch} & \textbf{1} & \textbf{2} & \textbf{3} & \textbf{4} & \textbf{5} & \textbf{6} & \textbf{7} & \textbf{8} & \textbf{9} & \textbf{Avg.} \\ \hline \multirow{6}{*}{$\boldsymbol{10^{-4}}$ } & 16 & 58.46 & 59.71 & 61.46 & 62.81 & 63.91 & 64.86 & 65.39 & 65.78 & 66.04 & 63.16 \\ & 32 & 65.20 & 67.85 & 69.37 & 69.91 & 70.73 & 71.14 & 71.89 & 72.11 & \textbf{72.24} & \textbf{70.05} \\ & 64 & 63.88 & 67.11 & 68.33 & 68.75 & 69.35 & 70.30 & 70.71 & 71.13 & 71.22 & 68.97 \\ & 128 & 62.67 & 65.52 & 67.09 & 67.68 & 68.19 & 68.84 & 69.46 & 69.88 & 70.06 & 67.71 \\ & 256 & 62.82 & 65.20 & 66.92 & 67.83 & 68.65 & 68.84 & 69.57 & 70.09 & 70.34 & 67.81 \\ & 512 & 61.51 & 63.28 & 64.32 & 65.45 & 65.97 & 66.93 & 67.60 & 67.87 & 68.03 & 65.66 \\ \hline \multirow{6}{*}{$\boldsymbol{10^{-3}}$ } & 16 & 56.65 & 57.70 & 59.65 & 60.72 & 61.43 & 62.25 & 62.75 & 63.15 & 63.31 & 60.85 \\ & 32 & 63.95 & 67.42 & 68.68 & 69.93 & 70.59 & 71.26 & 71.79 & 72.19 & 72.33 & 69.79 \\ & 64 & 64.66 & 67.39 & 68.78 & 69.89 & 70.41 & 71.32 & 72.06 & 72.44 & \textbf{72.57} & \textbf{69.95} \\ & 128 & 63.75 & 66.59 & 68.61 & 69.07 & 69.93 & 70.82 & 71.44 & 72.00 & 72.14 & 69.37 \\ & 256 & 62.38 & 65.08 & 66.67 & 67.44 & 67.69 & 68.52 & 69.10 & 69.49 & 69.71 & 67.34 \\ & 512 & 61.36 & 63.46 & 64.72 & 65.48 & 66.25 & 66.96 & 67.42 & 67.84 & 68.08 & 65.73 \\ \hline \multirow{6}{*}{$\boldsymbol{10^{-2}}$ } & 16 & 56.73 & 61.57 & 63.37 & 65.13 & 65.81 & 66.31 & 62.94 & 63.13 & 63.26 & 63.14 \\ & 32 & 62.07 & 64.75 & 66.01 & 66.68 & 67.46 & 67.78 & 68.23 & 68.47 & 68.80 & 66.69 \\ & 64 & 64.78 & 67.77 & 69.44 & 70.20 & 71.21 & 71.92 & 72.35 & 72.74 & \textbf{72.95} & \textbf{70.37} \\ & 128 & 64.49 & 67.27 & 69.02 & 69.75 & 70.71 & 71.58 & 72.00 & 72.72 & 72.87 & 70.05 \\ & 256 & 63.16 & 65.55 & 66.75 & 67.49 & 68.32 & 68.76 & 69.51 & 69.81 & 70.21 & 67.73 \\ & 512 & 61.61 & 63.49 & 64.82 & 65.57 & 66.10 & 66.81 & 67.52 & 68.01 & 68.28 & 65.80 \\ \hline \multirow{6}{*}{$\boldsymbol{10^{-1}}$ } & 16 & 46.48 & 50.71 & 52.12 & 53.35 & 53.78 & 42.41 & 42.98 & 43.35 & 43.52 & 47.63 \\ & 32 & 50.09 & 53.07 & 47.66 & 42.61 & 43.12 & 44.06 & 44.39 & 44.91 & 44.96 & 46.10 \\ & 64 & 61.64 & 64.02 & 64.24 & 54.01 & 54.48 & 55.44 & 55.96 & 56.47 & 56.59 & 58.09 \\ & 128 & 55.72 & 57.10 & 57.16 & 57.01 & 52.95 & 53.15 & 53.63 & 53.50 & 53.69 & 54.88 \\ & 256 & 60.13 & 62.26 & 62.60 & 63.53 & 64.25 & 64.93 & 65.57 & 66.04 & \textbf{66.14} & \textbf{63.94} \\ & 512 & 53.54 & 54.39 & 54.63 & 55.01 & 55.69 & 56.04 & 56.57 & 56.84 & 56.95 & 55.52 \\ \hline \multicolumn{2}{c}{\textbf{Average}} & 60.32 & 62.84 & 63.85 & 63.97 & 64.46 & 64.63 & 65.03 & 65.42 & \textbf{65.59} & -- \\ \bottomrule \end{tabular} \end{table} \subsection{Model analysis} We now evaluate the effect of the incremental training process on the domain adaptation approach. Figure \ref{fig:plot_training} shows the evolution of the accuracy obtained over the target test set during the training process for the case Syn Numbers $\rightarrow$ MNIST-M combination of datasets, with a batch size of 64 and $\lambda = 10^{-2}$. The training epochs are represented with the horizontal axis, while the iterations (i.e., when new training samples are added) are highlighted with blue lines and marked above. It can be observed that in the first iteration (spanning 300 epochs), the accuracy slowly improves until around 150 epochs, after which becomes stable. In the subsequent iterations, the accuracy further improves, especially during iterations 2, 3 and 4. Then, the performance increase is gradually reduced until it is hardly noticeable. \begin{figure*}[ht] \centering \includegraphics[width=.6\linewidth]{plot_training_1} \caption{Accuracy curve with respect to training epochs and iterations of the incremental approach.} \label{fig:plot_training} \end{figure*} To provide further analysis, we also examine the representation space learned by the network in each of these iterations, using the same combination of datasets and training parameters. We use the t-Distributed Stochastic Neighbor Embedding (t-SNE)~\cite{vanDerMaaten2008tsne} projection to visualize the samples according to their representation by the last hidden layer of the label predictor. Figure \ref{fig:tsne} shows a visualization of the features learned after each of the iterations, where the red color represents the target domain, the blue color represents the source domain, and the green color represents the set $ \hat{B}_{\iSize}$ (selected samples) using the confidence policy. This representation reveals $10$ well-defined clusters---the 10 possible classes of the datasets considered for this analysis---around an additional central cluster. This central cluster groups the samples of the target domain (red color) whose representation does not correspond to any of the existing classes yet. This cluster would therefore correspond to target samples whose representation has not been correctly mapped onto any of the source domain classes. Iteratively, the method is selecting samples (green points) of the target domain and moving them to the source domain. In the first iterations---until the 6th one, approximately---the method selects only samples that are well located in one of the source domain clusters (that is, those samples for which the network is more confident). Due to this process, the size of the central cluster is reduced. It is important to emphasize that this cluster becomes smaller although no samples out of it are selected, which indicates that the network is learning to better map those samples because of the selected samples of previous iterations. Towards the last iterations, the method begins to select the most complex samples that are still in this additional cluster. In Fig.~\ref{fig:tsne}(*) (which is the same as the Fig. \ref{fig:tsne}(9) but highlighting each class with a different color), the additional cluster of target samples still appears without being mapped, yet with a very small size. This cluster contains almost all the classification errors, having mapped only some isolated prototypes to the actual class clusters incorrectly. \begin{figure*}[ht] \centering \includegraphics[width=1\linewidth]{fig_tsne} \caption{t-SNE representation of the feature space of the neural network (from the last hidden layer) with respect to the iteration of the approach. The red color represents the target domain, the blue color represents the source domain, and the green color represents the set $\hat{B}_{\iSize}$. Last representation (*) depicts each sample according to its actual category by using different colors.} \label{fig:tsne} \end{figure*} \subsection{kNN policy} We compare in this section the two policies proposed for selecting the set of target prototypes $\hat{B}_{\iSize}$ to be added to the source domain. To this end, we evaluate whether the label assigned to each of these prototypes is correct. In this case, we make use of the ground-truth of the target domain just for the sake of analysis. We show in Fig. \ref{fig:result_knn} a dotted line with the performance of the confidence policy, which may serve as a baseline here, and eight results for the kNN policy with varying $k$ values. As in the previous experiments, the reported figures are obtained for all combinations of datasets and hyper-parameters considered. It is observed that, as the number of iterations of the algorithm increases, the accuracy of the additional labels assigned to the selected prototypes decreases. However, the kNN policy generally obtains better results from the first iteration, obtaining on average (for all iterations) an improvement of 6.36~\% with respect to confidence policy. This improvement is significantly greater in the last iterations, obtaining an increase up to 24.85~\% between the result of the confidence policy and the best result obtained with kNN policy. The role of the parameter $k$ is also illustrated in Fig. \ref{fig:result_knn}, where better results are attained as $k$ is increased. It is shown that the impact of this parameter is more noticeable in the last iterations, where a difference of up to 8.91~\% is obtained between $k = 3$ and $k = 150$. \begin{figure*}[ht] \centering \includegraphics[width=.7\linewidth]{plot_knn} \caption{ Accuracy of the labels assigned to the selected prototypes set ($\hat{B}_{\iSize}$) from the target domain according to the selection policy. } \label{fig:result_knn} \end{figure*} Because the kNN selection policy worked better, this policy was used in all following experiments. \subsection{Accuracy on target} In this section, we evaluate the final result obtained through the proposed iDANN method with the best combination of hyper-parameters previously obtained for each of the dataset pairs. We will compare this result with that obtained by the original DANN method in order to check the goodness of the incremental approach. Table \ref{tab:results} reports the results of the experiment, where rows indicate the dataset pairs (source and target) and columns represent the DA method. Concerning iDANN, we report two results: the accuracy of the labels assigned during the iterative process itself (1), as well as the accuracy using the CNN trained from scratch using only the target samples (once all the target samples have been assigned a label). In addition to DANN and iDANN methods, we have also added the results obtained with the neural networks trained just with the source set (`CNN Src.'), as well as the results obtained with the neural neural networks directly trained with the target set (`CNN Tgt.'). The former serves as baseline, to better assess the impact of the domain-adaptation mechanisms, while the second represents the upper bound of accuracy. The first thing to remark is that the worst results obtained by the baseline (`CNN Src.') come from the combinations of single-digit datasets (MNIST, MNIST-M) as source and complex digit datasets (SVHN, Syn Numbers) as target. Furthermore, the best results from the baseline are reported for combinations where the source and target are similar (MNIST-M $\rightarrow$ MNIST, SVHN $\rightarrow$ Syn Numbers). The original DANN method outperforms the results obtained by using the baseline network (`CNN Src.') by 10.7~\%, on average, obtaining the most significant improvement for the combinations of Syn Numbers $\rightarrow$ MNIST (improving by 29.31~\%). It is also noticeable the impact of DANN when the dataset pair consists of similar tasks with the most complex one as target, such as MNIST $\rightarrow$ MNIST-M---improvement of 23~\%---or Syn Signs $\rightarrow$ GTSRB---improvement of 15.49~\%. These results for DANN have been obtained using our own implementation, following the details given in the original paper. We observed that the accuracy matches approximately that reported by the authors (for the 4 combinations they considered), and so we assume that our implementation is correct. We can therefore faithfully report the performance in all source-target combinations of our experiments. Concerning the labels assigned during the proposed incremental approach iDANN (${D_T}\text{Acc.}^{(1)}$), the first thing to note is its improvement with respect to the underlying DANN method, which is around 16~\%, on average. In the best case, this improvement reaches values around 33~\%, 35~\% and 36~\% for the Syn Numbers $\rightarrow$ MNIST-M, MNIST-M $\rightarrow$ Syn Numbers, and MNIST $\rightarrow$ Syn Numbers pairs, respectively. This confirms the goodness of our strategy, which uses the same domain adaptation method in a novel way. Finally, if the CNN is trained from scratch with the target labels that have been automatically assigned by the iDANN ($D_T \text{Acc.}^{(2)}$), it can further improve the results up to 1.64~\%, on average, and up to 5.5~\% in the best case (MNIST-M $\rightarrow$ Syn Numbers). It should be noted that in some specific combinations, this approach slightly outperforms the CNN trained with the correct target labels (for example, MNIST-M $\rightarrow$ MNIST or Syn Numbers $\rightarrow$ SVHN). It might happen that the incorrectly assigned labels of the iDANN process act as a regularizer that alleviates some overfitting. \begin{table}[ht] \caption{Accuracy (\%) over the the target dataset for different strategies: `CNN Src.' indicates a neural network trained only with source samples; `DANN' denotes the original DANN strategy; `iDANN' yields two results from the incremental strategy: $D_T\text{Acc.}^{(1)}$ refers to the accuracy of the labels assigned to the target samples during the iterative process, while $D_T\text{Acc.}^{(2)}$ refers to the classification after training a new CNN from scratch using the labels assigned to the target samples; and `CNN Tgt.' denotes a CNN trained using the ground truth of the target samples.} \label{tab:results} \centering \begin{adjustbox}{width=\textwidth, keepaspectratio} \begin{tabular}{c|c|c|c|cc|c} \toprule \multirow{2}{*}{\textbf{Source}} & \multirow{2}{*}{\textbf{Target}} & \textbf{CNN Src.} & \textbf{DANN} & \multicolumn{2}{c|}{\textbf{iDANN}} & \textbf{CNN Tgt.} \\ \cline{3-7} & & $\boldsymbol{D_T}$ \textbf{Acc.} & $\boldsymbol{D_T}$ \textbf{Acc.} & $\boldsymbol{D_T} \textbf{Acc.}^{(1)}$ & $\boldsymbol{D_T} \textbf{Acc.}^{(2)}$ & $\boldsymbol{D_T}$ \textbf{Acc.} \\ \hline \multirow{3}{*}{MNIST} & MNIST-M & 55.71 & 78.70 & 96.09 & 96.67 & 97.34 \\ & SVHN & 16.26 & 31.32 & 35.83 & 36.49 & 90.93 \\ & Syn Numbers & 32.14 & 44.66 & 80.79 & 84.82 & 99.34 \\ \hline \multirow{3}{*}{MNIST-M} & MNIST & 97.95 & 98.65 & 99.04 & 99.59 & 98.94 \\ & SVHN & 32.91 & 41.41 & 61.87 & 61.89 & 90.93 \\ & Syn Numbers & 46.34 & 54.02 & 89.49 & 94.99 & 99.34 \\ \hline \multirow{3}{*}{SVHN} & MNIST & 59.04 & 67.08 & 82.72 & 84.50 & 98.94 \\ & MNIST-M & 43.49 & 47.42 & 66.40 & 67.62 & 97.34 \\ & Syn Numbers & 88.42 & 89.56 & 96.43 & 98.10 & 99.34 \\ \hline \multirow{3}{*}{Syn Numbers} & MNIST & 60.04 & 89.35 & 98.13 & 99.35 & 98.94 \\ & MNIST-M & 41.84 & 54.38 & 87.10 & 90.26 & 97.34 \\ & SVHN & 85.16 & 87.24 & 91.42 & 91.95 & 90.93 \\ \hline GTSRB & Syn signs & 76.39 & 86.22 & 98.28 & 98.57 & 99.74 \\ \hline Syn signs & GTSRB & 69.79 & 85.28 & 96.31 & 98.00 & 97.89 \\ \hline \hline \multicolumn{2}{c|}{Average} & 57.53 & 68.23 & 84.28 & 85.91 & 96.95 \\ \bottomrule \end{tabular} \end{adjustbox} \end{table} \subsection{Comparison with the state of the art \label{sec:comparison}} To conclude the results section, we present below a comparison with other domain adaptation strategies from the state of the art. In these works, not all possible combinations of source-target pairs are considered but a few combinations of them. We show in Table \ref{tab:comparison} the results reported in the literature\footnote{Unlike the results of the previous section, the DANN values of Table \ref{tab:comparison} are those reported in the original paper \cite{Ganin2016DANN}.}, along with the results obtained by our proposal (iDANN). A brief description of the competing methods was provided in Section \ref{sec:background}. Readers are referred to the corresponding references for details. These results reveal that our method yields the best performance in 5 out of 7 source-target pairs. The performance of iDANN is especially remarkable in the case of MNIST $\rightarrow$ Syn Num, where the improvement reaches around 30~\% compared to the literature. For the case in which our proposal does not attain the best result, we observe a dissimilar performance: it is still very competitive for the MNIST $\rightarrow$ SVHN pair, whereas it is outperformed for the SVHN $\rightarrow$ MNIST pair. When all the results are good, the improvement is relative, but when there is enough margin, the improvement is quite remarkable (as in the case of MNIST $\rightarrow$ Syn Num). \begin{table}[ht] \caption{Comparison of accuracy (\%) between state-of-the-art DA approaches and iDANN. The first two rows denote the source and target dataset, respectively. The best result for each combination (column) is highlighted in bold typeface. Empty cells indicate that the result is not reported in the literature.} \label{tab:comparison} \centering \begin{adjustbox}{width=\textwidth, keepaspectratio} \begin{tabular}{lccclcclcc} \toprule & \multicolumn{3}{c}{\textbf{MNIST}} & & \multicolumn{2}{c}{\textbf{SVHN}} & & \multicolumn{2}{c}{\textbf{Syn Num}} \\ \cline{2-4} \cline{6-7} \cline{9-10} \textbf{Methods} & \textbf{MNIST-M} & \textbf{SVHN} & \textbf{Syn Num} & & \textbf{MNIST} & \textbf{Syn Num} & & \textbf{MNIST} & \textbf{SVHN} \\ \midrule SA \cite{Fernando2013SA} & 56.9 & -- & -- & & 59.32 & -- & & -- & 86.44 \\ DRCN \cite{Ghifary2016} & -- & \textbf{40.05}& -- & & 81.97 & -- & & -- & -- \\ DSN \cite{Bousmalis2016} & 83.2 & -- & -- & & 82.7 & -- & & -- & 91.2 \\ DANN \cite{Ganin2016DANN} & 76.66 & 12.4 & 22.9 & & 73.85 & 96.9 & & 87.6 & 91.09 \\ D-CORAL \cite{Baochen2016CORAL} & -- & 35 & 55.8 & & 76.3 & 95.5 & & 89.9 & 78.8 \\ ADDA \cite{Tzeng2017} & -- & -- & -- & & 76 & -- & & -- & -- \\ ADA \cite{Haeusser2017} & -- & 12.9 & 34.8 & & 96.3 & 95.5 & & 97.1 & 88.1 \\ VADA \cite{shu2018a} & -- & 18.6 & 45.9 & & 92.9 & 96.8 & & 96.2 & 85.3 \\ DeepJDOT \cite{Damodaran2018} & 92.4 & -- & -- & & 96.7 & -- & & -- & -- \\ DTA \cite{Lee2019} & -- & -- & -- & & \textbf{99.4} & -- & & -- & -- \\ \midrule iDANN & \textbf{96.67} & 36.49 & \textbf{84.82} & & 84.50 & \textbf{98.10} & & \textbf{99.35} & \textbf{91.95} \\ \bottomrule \end{tabular} \end{adjustbox} \end{table} Furthermore, it should be noted that many of the compared methods propose specific CNN architecture for each combination of datasets and/or focus on optimizing the result for a particular combination, such as DTA or DeepJDOT. In our case, we utilized the topologies proposed in the original DANN paper, so it could be assumed that if we pursue a specific architecture adapted to each of the source-target pairs, our results will probably improve. \section{Conclusions and Future Work} \label{sec:conclusions} This paper proposes an incremental strategy to the problem of domain adaptation with artificial neural networks. Our approach is built upon an existing domain adaptation approach, combined with a heuristic that, in each iteration, decides which prototypes of the target set can be added to the training set by considering the label provided by the neural network. To this end, two selection policies have been proposed: one directly based on the confidence given by the network to the prediction and another based on geometric properties of the learned feature space. We observed that the latter reported a better performance, especially in the last iterations of the algorithm. In addition, we consider a final stage in which the labeled target set is used to train a new neural network with label smoothing. Our experiments were performed on various corpora and using several configurations of the neural network. From the results, we conclude that the incremental approach outperforms the underlying DANN model, as well as other state-of-the-art methods. It is interesting to note that, in some cases, the iDANN approach improves the result obtained with the CNN trained directly with the ground-truth data of the target set, which could indicate that the incremental process also serves as a regularizer that leads to greater robustness. Furthermore, unlike the classic DANN, our approach improves results when domains are similar and helps keeping the accuracy for the source domain. We also observed a greater training stability and less dependence on the hyper-parameters set. As future work, a primary objective would be to establish a well-principled stop criterion that allows us to detect when the prediction over the target samples is not reliable. In addition, we want to extend the experiments to other types of input types (such as sequences), as well as to study the behavior of the incremental strategy when the underlying DA method is different---given that there currently exist several architectures for this challenge. Note that our incremental approach is independent of the underlying DA model considered, and so it could be adopted as a generic strategy that might improve to the same extent as the underlying DA algorithm improves. Other avenues to further explore this proposal is to evaluate more neural network architectures, as well as adding data augmentation to the learning process. \bibliographystyle{model5-names} \bibliographystyle{elsarticle-num}
\section{Tight-Binding Band Calculations} To simulate the band structure of K12442 system, we adopted the bilayer five-orbital tight-binding model with the interlayer hopping term \begin{equation} \begin{split} H_{interlayer}=&2t_2^{xz,yz}\sin{kx}\sin{ky}(c^{+}_{1,xz}c_{2,yz}+c^{+}_{1,yz}c_{2,xz}+c^{+}_{2,xz}c_{1,yz}+c^{+}_{2,yz}c_{1,xz})\\&+(t_0^{xy}+2t_2^{xy}\cos{kx}\cos{ky})(c^{+}_{1,xy}c_{2,xy}+c^{+}_{2,xy}c_{1,xy}) \end{split} \end{equation} where $c^{+}_{1,xz}$ is the creation operator of the orbit $d_{xz}$ in layer 1, the rest operators are in the same way; $t_2^{xz,yz}=20\,meV$; $t_0^{xy}=-14\,meV$; $t_2^{xy}=15\,meV$. \setlength{\parindent}{2em} From equation (1), it is clear that, for the $\alpha$ and $\beta$ bands comprising of d$_{xz}$ and d$_{yz}$ orbitals, the band splitting is proportional to $\sin{kx}\sin{ky}$. This explains why the splitting of the $\alpha$ band is smaller than that of the $\beta$ band because the $\alpha$ Fermi surface has a smaller radius. \section{Superconducting Order Parameters in Considering Interlayer Pairing} \setlength{\parindent}{2em} Here, we first consider the order parameter of $\beta$ band in the single FeAs layer. The major orbit composition of $\beta$ band is given as: \begin{equation} \psi_{\beta}(k)=e^{i\alpha(k)}(\cos\theta\psi_{xz}(k)-\sin\theta\psi_{yz}(k)) \end{equation} where $\alpha(k)$ is the gauge of the $\beta$ band; $\psi_{xz}$ and $\psi_{yz}$ represent wave functions of the $d_{xz}$ and $d_{yz}$ orbitals; $\theta=arctan\frac{k_x}{k_y}$. Obviously, the absolute value of the intraband order parameter in $\beta$ band is \begin{equation} \Delta_{\beta}(k)=(\cos\theta)^2\Delta_{xz}(k)+(\sin\theta)^2\Delta_{yz}(k)-\sin\theta\cos\theta\Delta_{xz,yz}(k) \end{equation} where $\Delta_{xz}$ and $\Delta_{yz}$ are the order parameters of the $d_{xz}$ and $d_{yz}$ orbitals, respectively; $\Delta_{xz,yz}(k)$ is the order parameter of the interorbital pairs, given as: \begin{equation} \Delta_{xz,yz}(k)=<\psi_{xz}(k)\psi_{yz}(-k)+\psi_{xz}(-k)\psi_{yz}(k)> \end{equation} \setlength{\parindent}{2em} Now, we consider the intraorbital order parameter of $\beta1$ band and $\beta2$ band in K12442 system. In a familiar way, the main orbital composition of $\beta1$ and $\beta2$ bands can be calculated based on the above tight binding model: \begin{equation} \begin{split} \psi_{\beta1}(k)=\frac{\sqrt{2}}{2}e^{i\alpha_1(k)}(\cos\theta\psi_{1,xz}(k)-\sin\theta\psi_{1,yz}(k)+\cos\theta\psi_{2,xz}(k)-\sin\theta\psi_{2,yz}(k))\\ \psi_{\beta2}(k)=\frac{\sqrt{2}}{2}e^{i\alpha_2(k)}(\cos\theta\psi_{1,xz}(k)-\sin\theta\psi_{1,yz}(k)-\cos\theta\psi_{2,xz}(k)+\sin\theta\psi_{2,yz}(k)) \end{split} \end{equation} where $\alpha_1(k)$ and $\alpha_2(k)$ are the gauge of $\beta1$ and $\beta2$ bands, respectively; $\psi_{1,xz}(k)$ represents the wave function of $d_{xz}$ in layer 1, the rest $\psi$s are in a familiar way; $\theta=arctan\frac{k_x}{k_y}$. Based on the above equations, we obtain the absolute value of the order parameter in $\beta1$ and $\beta2$ bands: \begin{equation} \begin{split} \Delta_{\beta1}(k)=\Delta_{\beta}(k)+\Delta_{interlayer}(k)\\ \Delta_{\beta2}(k)=\Delta_{\beta}(k)-\Delta_{interlayer}(k) \end{split} \end{equation} where the $\Delta_{interlayer}(k)$ is the order parameter of the superconducting pairs between the two different layers: \begin{equation} \begin{split} \Delta_{interlayer}(k)=&(\cos\theta)^2<\psi_{1,xz}(k)\psi_{2,xz}(-k)+\psi_{1,xz}(-k)\psi_{2,xz}(k)>+\\&(\sin\theta)^2<\psi_{1,yz}(k)\psi_{2,yz}(-k)+\psi_{1,yz}(-k)\psi_{2,yz}(k)>-\\&\sin\theta\cos\theta<\psi_{1,xz}(k)\psi_{2,yz}(-k)+\psi_{1,xz}(-k)\psi_{2,yz}(k)+\\&\psi_{2,xz}(k)\psi_{1,yz}(-k)+\psi_{2,xz}(-k)\psi_{1,yz}(k)> \end{split} \end{equation} \end{document}
\section{Introduction} \label{sect.z21} For many decades graphs have been used as a tool to study a large class of $C^*$-algebras. In \cite{KPRR}, Kumjian, Pask, Raeburn and Renault defined the graph groupoid of a countable row--finite directed graph with no sinks, and showed that the $C^*$-algebra of this groupoid coincided with a universal $C^*$-algebra generated by partial isometries satisfying relations naturally generalizing those given in \cite{Cu}. More recently several people have worked on generalizing these results to arbitrary directed graphs, higher-rank graphs, and ultra--graphs. In the early 2000s, Tomforde introduced ultra--graph $C^*$-algebras. Bates and Pask, in \cite{BP1} introduced a new class of $C^*$-algebras called $C^*$-algebras of labeled graphs. Later, in a series of papers (along with Carlsen) they provided some classification of these algebras including computation of $K$-theory. More recently, Jeong, Kang and Kim, in \cite{JKK}, among other interesting results, they provided a characterization for labeled graph $C^*$-algebra to be an AF algebra. A directed graph $E = (E^0, E^1,~~ s,~~ r)$ consists of a countable set $E^0$ of vertices and $E^1$ of edges, and maps $s,r: E^1 \rightarrow E^0$ identifying the source (origin) and the range (terminus) of each edge. The graph is row--finite if each vertex emits at most finitely many edges. A vertex is a sink if it is not a source of any edge. A path is a sequence of edges $e_1e_2\ldots e_n$ with $r(e_i) = s(e_{i+1})$ for each $i = 1,2,\ldots , n-1$. An infinite path is a sequence $e_1e_2\ldots$ of edges with $r(e_i)=s(e_{i+1})$ for each $i$. For a finite path $p=e_1e_2 \ldots e_n$, we define $s(p): =s(e_1)$ and $r(p):= r(e_n)$. For an infinite path $p=e_1e_2 \ldots$, we define $s(p):=s(e_1)$. We use the following notations: $E^*:=\bigcup_{n=0}^\infty E^n,$ where $E^n$ := $\{p:p \text{ is a path of length } n\}.$ $E^{**}~~ :=~~ E^* \cup E^\infty$, where $E^\infty$ is the set of infinite paths. Several works have been done on labeled graph $C^*$-algebras with the restriction that the graph has no sinks. In this paper, we will present results on these algebras when the graph may have sinks. The paper is organized as follows. In section 2, we develop some terminology for labeled graphs. Then, in section 3, we briefly describe labeled graph $C^*$-algebras. In section 4, after building the tools needed, we provide the theorems that characterize ideals of labeled graph $C^*$-algebras and finally describe the $C^*$-algebras for finite graphs with no loops or cycles. \section{Preliminaries}\label{preliminaries} Let $E = (E^0, ~E^1, ~s, ~r)$ be a directed graph and let $\mathcal{A}$ be an alphabet. A labeling is a function $\mathcal{L} : E^1 \longrightarrow \mathcal{A}$. Without loss of generality, we will assume that $\mathcal{A} = \mathcal{L}(E^1)$. The pair $(E,~\mathcal{L})$ is called a labeled graph. Given a labeled graph $(E, ~\mathcal{L}$), we extend the labeling function $\mathcal{L}$ canonically to the sets $E^*$ and $E^\infty$ as follows. Using $\mathcal{A}^n$ for the set of words of size $n$, $\mathcal{L}$ is defined from $E^n$ into $\mathcal{A}^n$ as $\mathcal{L}(e_1e_2\ldots e_n) = \mathcal{L}(e_1)\mathcal{L}(e_2)\ldots \mathcal{L}(e_n)$. Similarly, for $p = e_1e_2\ldots \in E^\infty$, $\mathcal{L}(p) = \mathcal{L}(e_1)\mathcal{L}(e_2)\ldots \in \mathcal{A}^\infty$. Following tradition, we use $\mathcal{L}^*(E):=\bigcup_{n=1}^\infty \mathcal{L}(E^n)$, and $\mathcal{L}^\infty(E) := \mathcal{L}(E^\infty)$. For a word $\alpha = a_1a_2\ldots a_n \in \mathcal{L}^n(E)$, we write $$s(\alpha) := \{s(p):p\in E^n,~ \mathcal{L}(p) = \alpha\}$$ and $$r(\alpha) := \{r(p):p\in E^n,~ \mathcal{L}(p) = \alpha\}.$$ Similarly for $\alpha = a_1a_2\ldots \in \mathcal{L}^\infty(E)$, $$s(\alpha) := \{s(p):p\in E^\infty,~ \mathcal{L}(p) = \alpha\}.$$ Each of these sets is a subset of $E^0$. The use of $s$ and $r$ for an edge/path verses a label/word should be clear from the context. A labeled graph $(E,~\mathcal{L})$ is said to be left--resolving if for each $v\in E^0$, the function $\mathcal{L}:r^{-1}(v) \rightarrow \mathcal{A}$ is injective. In other words, no two edges pointing to the same vertex are labeled the same. Let $\mathcal{B}$ be a non-empty subset of $2^{E^0}$. Given a set $A \in \mathcal{B}$ we write $\mathcal{L}(AE^1)$ for the set $\{\mathcal{L}(e): e \in E^1 \text{ and } s(a) \in A\}$. For a set $A \in \mathcal{B}$ and a word $\alpha \in \mathcal{L}^n(E)$ we define the relative range of $\alpha$ with respect to $A$ as $$r(A,\alpha):= \{r(p): \mathcal{L}(p) = \alpha \text{ and } s(p)\in A\}.$$ We say $\mathcal{B}$ is closed under relative ranges if $r(A,\alpha) \in \mathcal{B}$ for any $A\in\mathcal{B}$ and any $\alpha \in \mathcal{L}^n(E)$. $\mathcal{B}$ is said to be \textbf{\textit{accommodating}} if \begin{enumerate} \item $r(\alpha)\in \mathcal{B}$ for each $\alpha \in \mathcal{L}^*(E)$ \item $\mathcal{B}$ is closed under relative ranges \item $\mathcal{B}$ is closed under finite intersections and unions. \end{enumerate} If $\mathcal{B}$ is accommodating for $(E, \mathcal{L})$, the triple $(E,\mathcal{L}, \mathcal{B})$ is called a labelled space. For trivial reasons, we will assume that $\mathcal{B} \neq \{\emptyset\}$ A labeled space $(E,\mathcal{L}, \mathcal{B})$ is called \textit{\textbf{weakly left--resolving}} if for any $A,~B \in \mathcal{B}$ and any $\alpha \in \mathcal{L}^*(E)$ $$r(A \cap B, \alpha) = r(A,\alpha) \cap r(B,\alpha).$$ We say $(E,\mathcal{L}, \mathcal{B})$ is \textit{\textbf{non--degenerate}} if $\mathcal{B}$ is closed under relative complements. A \textit{\textbf{normal}} labeled space is accommodating and non--degenerate. \section{Labeled Graph $C^*$-algebras}\label{preliminaries2} Let $(E,\mathcal{L}, \mathcal{B})$ be a weakly left--resolving labeled space. A representation of $(E,\mathcal{L}, \mathcal{B})$ in a $C^*$-algebra consists of projections $\{p_A : A \in \mathcal{B} \}$, and partial isometries $\{ s_a : a \in \mathcal{A}\}$, satisfying: \begin{enumerate} \item For any $A,~B \in \mathcal{B}$, $p_Ap_B = p_{A\cap B}$, and $p_{A\cup B} = p_A+p_B-p_{A\cap B}$. \item For any $a,~b \in \mathcal{A}$, $s_a^*s_b = p_{r(a)}\delta_{a,b}$. \item For any $a \in \mathcal{A}$ and $A \in \mathcal{B}$, $s_a^*p_A = p_{r(A,a)}s_a^*$. \item For $A \in \mathcal{B}$ with $\mathcal{L}(AE^1)$ finite and $A$ does not contain a sink, we have $$p_A = \sum_{a \in \mathcal{L}(AE^1)}s_ap_{r(A,a)}s_a^*.$$ \end{enumerate} The \textit{labeled graph $C^*$-algebra} is the $C^*$-algebra generated by a universal representation of $(E,\mathcal{L}, \mathcal{B})$. For a word $\mu = a_1 \cdots a_n,$ we write $s_\mu$ to mean $s_{a_1} \cdots s_{a_n}$. \begin{remark} Given $A\in \mathcal{B}$. If $a,~b \in \mathcal{L}(AE^1),$ then $s_ap_{r(A,a)}s_a^*\cdot s_bp_{r(A,b)}s_b^* = \delta_{a,b}s_ap_{r(A,a)}s_a^*$. Moreover, $p_As_ap_{r(A,a)}s_a^* = s_ap_{r(A,a)}p_{r(A,a)}s_a^*=s_ap_{r(A,a)}s_a^*$. Therefore, for any finite subset $\mathcal{S}$ of $\mathcal{L}(AE^1)$ we have $$p_A \geq \sum_{a \in \mathcal{S}}s_ap_{r(A,a)}s_a^*.$$ \end{remark} The result of the following lemma is similar to results obtained for graph $C^*$-algebras and other related algebras (see \cite[Lemma 1.1]{KPR} or \cite{E2}). One easily checks from the relations that $s_\mu^* s_\mu = p_{r(\mu)}$ and that $s_\nu^* s_\mu = 0$ unless one of $\mu$, $\nu$ extends the other. In fact, \begin{lemma} \label{lemma33.BES} Let $\mu,~\nu \in \mathcal{L}^*(E)$. Then \begin{displaymath} \begin{array}{ll} s_\mu^*s_\nu & = \left\{\begin{array}{ll} p_{r(\mu)} & \textrm{if $\nu = \mu$}\\ p_{r(\mu)}s_\gamma & \textrm{if $\nu = \mu\gamma$}\\ s_\gamma^*p_{r(\nu)} & \textrm{if $\mu = \nu\gamma$}\\ 0 & \text{otherwise} \end{array} \right. \\ \end{array} \end{displaymath} This, in turn, gives us: \begin{displaymath} \begin{array}{ll} s_\mu^*s_\nu & = \left\{\begin{array}{ll} p_{r(\mu)} & \textrm{if $\nu = \mu$}\\ s_\gamma p_{r(\nu)} & \textrm{if $\nu = \mu\gamma$}\\ p_{r(\mu)}s_\gamma^* & \textrm{if $\mu = \nu\gamma$}\\ 0 & \text{otherwise.} \end{array} \right. \\ \end{array} \end{displaymath} \end{lemma} \begin{proof} If $\mu = \nu,$ then $s_\mu^*s_\nu = s_\mu^*s_\mu = p_{r(\mu)}$. If $\nu = \mu\gamma$, then $s_\mu^*s_\nu = s_\mu^*s_{\mu\gamma}= s_\mu^*s_\mu s_\gamma = p_{r(\mu)}s_\gamma = s_\gamma p_{r(r(\mu),\gamma)} = s_\gamma p_{r(\mu\gamma)} = s_\gamma p_{r(\nu)}$. If $\mu = \nu\gamma$, then $s_\mu^*s_\nu = s_{\nu\gamma}^*s_\nu = (s_\nu s_\gamma)^*s_\nu = s_\gamma^*s_\nu^*s_\nu = s_\gamma^*p_{r(\nu)} = p_{r(\nu\gamma)}s_\gamma^* = p_{r(\mu)}s_\gamma^*$. Lastly, suppose $\mu = a_1a_2\ldots a_m$, $\nu = b_1b_2 \ldots b_n$, and neither $\mu$ nor $\nu$ extends the other. This means $a_k \neq b_k$ for some $k \leq \min\{m,~n\}$. We will assume that $k$ is the smallest such index, that is, $a_i = b_i$ for $i \leq k-1$, but $a_k \neq b_k$. Then \begin{align*} s_\mu^*s_\nu & = (s_{a_1a_2\ldots a_{k-1}a_k \ldots a_m})^*s_{b_1b_2\ldots b_{k-1}b_k\ldots b_n}\\ & = (s_{a_k \ldots a_m})^*(s_{a_1a_2\ldots a_{k-1}})^*s_{b_1b_2\ldots b_{k-1}}s_{b_k\ldots b_n}\\ & = (s_{a_k \ldots a_m})^*p_{r(b_1b_2\ldots b_{k-1})}s_{b_k\ldots b_n}, \text{ since } a_i = b_i, \text{ for } i < k\\ & = (s_{a_k \ldots a_m})^*s_{b_k\ldots b_n}p_{r(b_1b_2\ldots a_n)}\\ & = s_{a_m}^* \ldots s_{a_k}^*s_{b_k}\ldots s_{b_n}p_{r(b_1b_2\ldots a_n)}\\ & = 0 \text{ because } a_k \neq b_k. \end{align*} \end{proof} Using $\epsilon$ to denote the empty word, and $\mathcal{L}^{\#}(E)$ to denote $\mathcal{L}(E^*) \cup \{\epsilon\}$, we find that \[ C^*(E,\mathcal{L},\mathcal{B}) = \overline{\text{span}} \{s_\mu p_A s_\nu^* : \mu,\;\nu \in \mathcal{L}^{\#}(E) \text{ and } A\in\mathcal{B} \}. \] Here we use $s_\epsilon$ to mean the unit element of the multiplier algebra of $C^*(E,\mathcal{L},\mathcal{B})$. In \cite{JKP}, they provided the a definition of ``hereditary" subset of $\mathcal{B}$. We will restate it here; note that $E$ may contain sinks. \begin{definition} \label{heredirary} For a subset $\mathcal{H}$ of $\mathcal{B}$ we say that $\mathcal{H}$ is hereditary if it satisfies the following: \begin{enumerate} \item for any $A\in \mathcal{H}$ and for any $\alpha \in \mathcal{L}^*(E),$ we have that $r(A,\alpha) \in \mathcal{H}$. \item $A \cup B \in \mathcal{H}$ whenever $A,B \in \mathcal{H}$. \item If $A \in \mathcal{H}$ and $B\in \mathcal{B}$ with $B \subseteq A,$ then $B \in \mathcal{H}$. \end{enumerate} \end{definition} Notice that, in addition to being closed under finite unions, $\mathcal{H}$ is closed under arbitrary intersections. Moreover, when $(E,\mathcal{L}, \mathcal{B})$ is normal, if $A\in \mathcal{H}$ and $B \in \mathcal{B},$ then $A \setminus B \in \mathcal{H}$. In the discussions to follow, we will assume that $\mathcal{H}$ does not contain the empty set. Thus, we modify (1) of Definition \ref{heredirary} to: $r(A, \alpha) \in \mathcal{H}$, whenever $r(A, \alpha)$ is non--empty. \section{Main results} We start with a proposition on sub-algebras of $C^*(E,\mathcal{L}, \mathcal{B})$. This is an important result on its own, and we will be using it to build the $C^*$-algebras of labeled graphs when the graphs are finite graphs with no loops or cycles. \begin{proposition} \label{Morita.eq} Let $(E,\mathcal{L}, \mathcal{B})$ be a labeled space and let $\mathcal{H}$ be a hereditary subset of $\mathcal{B}$. Suppose also that $\forall a \in \mathcal{A},$ either $s(a)\in \mathcal{H}$ or $\forall A \in \mathcal{H}$ $s(a) \cap A = \emptyset$. Then $$I := \overline{span}\{s_\alpha p_A s_\beta^*:\alpha,\beta \in \mathcal{L}^{\#}(E), A \in \mathcal{H}\}$$ is an ideal of $C^*(E,\mathcal{L}, \mathcal{B})$ which is Morita equivalent to \begin{align*} \mathcal{C} := \overline{span} \{ & s_\alpha p_A s_\beta^*: s(\alpha) \in\mathcal{H} \text{ or } \alpha = \epsilon, \\ & s(\beta) \in \mathcal{H} \text{ or } \beta = \epsilon, \text{ and } A\in \mathcal{H} \}. \end{align*} \end{proposition} \begin{proof} Let $A\in \mathcal{H},~B \in \mathcal{B}$, and let $\alpha,~\beta,~\mu,~\nu \in \mathcal{L}^{\#}(E)$. Then $s_\alpha p_A s_\beta^* s_\mu p_B s_\nu^*$ is either zero or is of the form $s_{\alpha'} p_C s_{\nu'},$ where $C \subseteq A$ or $C \subseteq r(A,\gamma)$, for some $\gamma \in \mathcal{L}^*(E)$; either way, $C \in \mathcal{H}$. Moreover $\alpha'$ extends $\alpha$ and $\nu'$ extends $\nu$ (or they are equal). Thus $I$ is an ideal. Using a similar argument we see that $$\mathcal{X} := \overline{span} \{s_\alpha p_A s_\beta^*: s(\alpha) \in \mathcal{H} \text{ or } \alpha = \epsilon, \beta \in \mathcal{L}^{\#}(E)\}$$ is a right ideal of $C^*(E,\mathcal{L}, \mathcal{B})$. To show that $\mathcal{C}$ is an algebra, let $s_\alpha p_A s_\beta^*, s_\mu p_B s_\nu^* \in \mathcal{C}$ then the product $(s_\alpha p_A s_\beta^*) (s_\mu p_B s_\nu^*)$ is zero unless $\beta$ or $\mu$ extends the other. In that case, say $\beta = \mu\gamma$ then $s_\alpha p_A s_\beta^* s_\mu p_B s_\nu^*=s_\alpha p_A s_{\mu\gamma}^* s_\mu p_B s_\nu^* = s_\alpha p_A s_\gamma^* p_{r(\mu)} p_B s_\nu^* = s_\alpha p_A p_{r(\beta)} p_{r(B,\gamma)}s_\gamma^*s_\nu^* = s_\alpha p_A p_{r(\beta)} p_{r(B,\gamma)}s_{\nu\gamma}^* = s_\alpha p_{A \cap r(\beta) \cap r(B,\gamma)}s_{\nu\gamma}^*$. Now, either $\nu = \epsilon$ or $s(\nu\gamma) \subseteq s(\nu) \in \mathcal{H} \Rightarrow s(\nu\gamma) \in \mathcal{H}$. In the case $\nu = \epsilon$, looking at $p_{r(B,\gamma)}$, either the product is zero or $B \cap s(\gamma) \neq \emptyset$ which implies that $s(\gamma) \in \mathcal{H}$. Therefore $(s_\alpha p_A s_\beta^*)(s_\mu p_B s_\nu^*) \in \mathcal{C}$. To show that $\mathcal{X}\CX^* = \mathcal{C}$, take $s_\alpha p_A s_\beta^*, s_\mu p_B s_\nu^* \in \mathcal{X}$. Then $s_\alpha p_A s_\beta^*\cdot (s_\mu p_B s_\nu^*)^* = s_\alpha p_A s_\beta^*\cdot s_\nu p_B s_\mu^*$. This is zero unless $\beta$ or $\nu$ extends the other. In that case, say $\beta = \nu\gamma$, then $s_\alpha p_A s_\beta^*\cdot (s_\mu p_B s_\nu^*)^* = s_\alpha p_A p_{r(\nu)} s_\gamma^* p_B s_\mu^* = s_\alpha p_A p_{r(\nu)} p_{r(B,\gamma)} s_\gamma^* s_\mu^* = s_\alpha p_{A \cap r(\nu) \cap r(B,\gamma)} s_{\mu \gamma}^*$. But $s(\mu \gamma) \subseteq s(\mu) \in \mathcal{H} \Rightarrow s(\mu \gamma) \in \mathcal{H}$, thus $s_\alpha p_{A \cap r(\nu) \cap r(B,\gamma)} s_{\mu \gamma}^* \in \mathcal{C}$. So $\mathcal{X}\CX^* \subseteq \mathcal{C}$. If $s_\alpha p_A s_\beta^* \in \mathcal{C}$, then $s_\alpha p_A s_\beta^* = (s_\alpha p_A s_\epsilon^*)(s_\beta p_A s_\epsilon^*)^* \in \mathcal{X}\CX^*$. That is, $\mathcal{C} \subseteq \mathcal{X}\CX^*$. Therefore, $\mathcal{X}\CX^* = \mathcal{C}$. Similarly, $\mathcal{X}^*\mathcal{X} = I$ \end{proof} \begin{definition} Let $(E,\mathcal{L}, \mathcal{B})$ be any labeled space. We call a non empty element $A$ of $\mathcal{B}$ a minimal sinks set if $A \subseteq E^0_{sink}$ and for any $B \in \mathcal{B}$ either $A \subseteq B$ or $A \cap B = \emptyset$. \end{definition} \begin{corollary} \label{Morita.corollary} For a labeled space $(E,\mathcal{L}, \mathcal{B})$, let $A\in\mathcal{B}$ be a minimal sinks set. Then, $$I_A = \overline{span}\{s_\alpha p_As_\beta^* : \alpha, \beta \in \mathcal{L}^{\#}(E)\}$$ is a closed two sided ideal of $C^*(E,\mathcal{L}, \mathcal{B}),$ which is isomorphic to $\mathcal{K}(\ell^2(\mathcal{L}^*(A)))$, where $\mathcal{L}^*(A) := \{\alpha: \alpha \in \mathcal{L}^*(E) \text{ and } r(\alpha) \supseteq A, \text{ or } \alpha = \epsilon\}$. \end{corollary} \begin{proof} Notice that the singleton set $\mathcal{H} = \{A\}$ is hereditary, thus $I_A$ is a two sided ideal. If $\alpha, \beta, \mu, \nu \in \mathcal{L}^{\#}(E)$, using Lemma \ref{lemma33.BES}, \begin{displaymath} \begin{array}{ll} s_\alpha p_As_\beta^*\cdot s_\mu p_As_\nu^* & = \left\{\begin{array}{ll} s_\alpha p_A p_{r(\beta)} p_A s_\nu^* & \textrm{if $\beta = \mu$}\\ s_\alpha p_A s_\gamma p_{r(\beta)} p_A s_\nu^* & \textrm{if $\beta = \mu\gamma$}\\ s_\alpha p_A p_{r(\mu)}s_\gamma^* p_A s_\nu^* & \textrm{if $\mu = \beta\gamma$}\\ 0 & \text{otherwise.} \end{array} \right. \\ \end{array} \end{displaymath} However, $s_\alpha p_A p_{r(\beta)} p_A s_\nu^* = s_\alpha p_{A \cap r(\beta)} s_\nu^* = s_\alpha p_A s_\nu^*$, if $r(\alpha), r(\beta), r(\nu) \supseteq A$; otherwise $s_\alpha p_A p_{r(\beta)} p_A s_\nu^* = 0$.\\ $s_\alpha p_A s_\gamma p_{r(\beta)} p_A s_\nu^* = s_\alpha s_\gamma p_{r(A, \gamma)} p_{r(\beta)} p_A s_\nu^* = 0$, since $A \subseteq E^0_{sink}$. Similarly, $s_\alpha p_A p_{r(\mu)}s_\gamma^* p_A s_\nu^* = s_\alpha p_A p_{r(\mu)} p_{r(A, \gamma)} s_\gamma^* s_\nu^* = 0$.\\ Thus, $\{s_\alpha p_As_\beta^*:r(\alpha), r(\beta) \supseteq A,~\alpha = \epsilon, \text{ or } \beta = \epsilon\}$ forms a set of matrix units. Therefore, $I_A \cong \mathcal{K}(\ell^2(\mathcal{L}^*(A)))$. \end{proof} We take a short pause to look at a couple of examples; one labeled graph with two labeled spaces. \begin{eg} Consider the labeled graph: $$\xymatrix{{u} \ar@(ur,ul)_{a}[] \ar [r]^a & {v}}$$ Let $\mathcal{B}_1 = \{ \{u, v\}, \emptyset \}$. $(E, \mathcal{L}, \mathcal{B}_1)$ is a normal labeled space. Recall that $p_A s_\alpha = s_\alpha p_{r(A,\alpha)}$ and $s_\alpha^* p_A = p_{r(A,\alpha)}s_\alpha^*$. In this case, for $A = \{u, v\}$ and any word $\alpha =aa\ldots a$, since $r(A,\alpha) = A$, we get $p_A s_\alpha = s_\alpha p_A$ and $s_\alpha^* p_A = p_As_\alpha^*$. Therefore, if $n > m$, $s_a^n p_A (s_a^*)^m = s_a^n (s_a^*)^m p_A = s_a^{n-m} p_{r(a^m)}p_A = s_a^{n-m}p_A$. If $n = m$, $s_a^n p_A (s_a^*)^m = s_a^n (s_a^*)^m p_A = p_A$. And if $n < m$, $s_a^n p_A (s_a^*)^m = p_A s_a^n (s_a^*)^m = p_A p_{r(a^n)}(s_a^*)^{m-n} = p_A (s_a^*)^{m-n}$. Therefore, $C^*(E,\mathcal{L},\mathcal{B}_1) = \overline{span}\{s_a^k p_A,~ p_A,~ p_A(s_a^*)^k:k\in \mathbb{N}\} \cong C(\mathbb{T}).$ In this example, $E^0_{sink} \notin \mathcal{B}_1$. Now, let $\mathcal{B}_2 = \{ \{u\}, \{v\}, \{u, v\}, \emptyset \}$. $(E, \mathcal{L}, \mathcal{B}_2)$ is also a normal labeled space. For $A = \{v\}$, $I_A = \overline{span}\{s_\alpha p_As_\beta^* : \alpha, \beta \in \mathcal{L}^{\#}(E)\} = \overline{span}\{s_a^n p_A(s_a^*)^m : n, m \in \mathbb{N} \cup \{0\}\} \cong \mathcal{K}(\ell^2(\mathbb{N}))$ is an ideal of $C^*(E, \mathcal{L}, \mathcal{B}_2)$. Since $p_{\{u,v\}} = p_{\{u\}} + p_{\{v\}}$, the $C^*$-algebra is generated by $\{s_a^np_{\{u\}}(s_a^*)^m, s_a^np_{\{v\}}(s_a^*)^m : n.m \in \mathbb{N} \cup \{0\}\}$. For $n,m,k,l \in \mathbb{N} \cup \{0\},$ we will compute $s_a^np_{\{u\}}(s_a^*)^m\cdot s_a^kp_{\{u\}}(s_a^*)^l$. If $m = k$, \begin{align*} s_a^np_{\{u\}}(s_a^*)^m\cdot s_a^kp_{\{u\}}(s_a^*)^l & = s_a^np_{\{u\}}p_{r(a^m)}p_{\{u\}}(s_a^*)^l\\ & = s_a^np_{\{u\}}p_{\{u,v\}}p_{\{u\}}(s_a^*)^l\\ & = s_a^np_{\{u\}}(s_a^*)^l. \end{align*} If $m > k$, \begin{align*} s_a^np_{\{u\}}(s_a^*)^m\cdot s_a^kp_{\{u\}}(s_a^*)^l & = s_a^np_{\{u\}}p_{\{u,v\}}p_{r(\{u\},a^{m-k})}(s_a^*)^{m-k}(s_a^*)^l\\ & = s_a^np_{\{u\}}(s_a^*)^{l+m-k}. \end{align*} Similarly, (taking the adjoint), if $m < k$, $s_a^np_{\{u\}}(s_a^*)^m\cdot s_a^kp_{\{v\}}(s_a^*)^l = s_a^{n+k-m}p_{\{u\}}(s_a^*)^l$.\\ Thus, $\{s_a^np_{\{u\}}(s_a^*)^m\}$ is a set of matrix units. Therefore, $\overline{span}\{s_a^np_{\{u\}}(s_a^*)^m : n, m \in \mathbb{N} \cup \{0\}\} \cong \mathcal{K}(\ell^2(\mathbb{N}))$. Next we will compute $s_a^np_{\{u\}}(s_a^*)^m\cdot s_a^kp_{\{v\}}(s_a^*)^l$.\\ If $m = k$, $s_a^np_{\{u\}}(s_a^*)^m\cdot s_a^kp_{\{v\}}(s_a^*)^l = s_a^np_{\{u\}}p_{\{u,v\}}p_{\{v\}}(s_a^*)^l = 0$.\\ If $m > k$, \begin{align*} s_a^np_{\{u\}}(s_a^*)^m\cdot s_a^kp_{\{v\}}(s_a^*)^l & = s_a^np_{\{u\}}p_{\{u,v\}}p_{r(\{v\},a^{m-k})}(s_a^*)^{m-k}(s_a^*)^l\\ & = 0,\text{ since } p_{r(\{v\},a^{m-k})} = 0. \end{align*} Similarly, if $m < k$, $s_a^np_{\{u\}}(s_a^*)^m\cdot s_a^kp_{\{v\}}(s_a^*)^l = 0$.\\ This gives us \begin{align*} C^*(E, \mathcal{L}, \mathcal{B}_2) & \cong \overline{span}\{s_a^np_{\{u\}}(s_a^*)^m\} \oplus \overline{span}\{s_a^np_{\{v\}}(s_a^*)^m\}\\ & \cong \mathcal{K}(\ell^2(\mathbb{N})) \oplus \mathcal{K}(\ell^2(\mathbb{N})). \end{align*} \end{eg} Next we will write out the $C^*$-algebra of a finite labeled graph when the graph has no loops or cycles. This characterization is similar to \cite[Corollary 2.3]{KPR} for a finite directed graph with no loops. In the proposition, we will assume that $E^0_{sink} \in \mathcal{B}$ and that $(E,\mathcal{L}, \mathcal{B})$ is normal. Afterwards, with the help of examples, we will see the significance of these assumptions. \begin{proposition} \label{direct.sum} Let $E$ be a finite graph with no loops (or cycles). Suppose also that $E^0_{sink} \in \mathcal{B}$, where $(E,\mathcal{L}, \mathcal{B})$ is a normal labeled space. For each $x \in E^0_{sink}$ compute $A_x = \cap_{x\in A}A$. Let $\mathcal{V}=\{A_x:x\in E^0_{sink}\}$ . Then $$C^*(E,\mathcal{L}, \mathcal{B}) \cong \bigoplus_{V \in \mathcal{V}}\mathcal{M}_{n_V+1}(\mathbb{C}),$$ where $n_V = $ the number of words $\alpha$ with $V \subseteq r(\alpha)$. \end{proposition} \begin{proof} When $x \in E^0_{sink}$ then $A_x = \cap_{x\in A}A$ is a finite intersection of elements of $\mathcal{B}$, hence is in $\mathcal{B}$, moreover $A_x \subseteq E^0_{sink}$. The collection $\mathcal{V}=\{A_x:x\in E^0_{sink}\}$ is a finite collection of mutually disjoint members of $\mathcal{B}$. Also, if $V \in \mathcal{V}$ and $B \in \mathcal{B}$ either $V \subseteq B$ or $V \cap B = \emptyset$. Then by Corollary \ref{Morita.corollary}, each $V \ \in \mathcal{V}$ gives us an ideal $I_V$ of $C^*(E,\mathcal{L}, \mathcal{B})$. Now, let $\alpha,~ \beta \in \mathcal{L}^{\#}(E)$ and $A \in \mathcal{B}$. Write $A = A_1 \cup C_1$, where $C_1 = A\cap E^0_{sink}$ and $A_1 = A \setminus C_1$. \\ Then $s_\alpha p_A s_\beta^* =s_\alpha p_{A_1} s_\beta^* +s_\alpha p_{C_1} s_\beta^*$. Notice that $C_1$ is a disjoint union of elements of $\mathcal{V}$, thus $s_\alpha p_{C_1} s_\beta^* = \sum_{V \in \mathcal{V}, V \subseteq C_1}s_\alpha p_V s_\beta^*$.\\ \\ \\ Moreover $s_\alpha p_{A_1} s_\beta^* = \sum_{a \in \mathcal{L}(A_1E^1)}s_{\alpha a} p_{r(A_1,a)}s_{\beta a}^*= \sum_{a \in \mathcal{L}(AE^1)}s_{\alpha a} p_{r(A,a)}s_{\beta a}^*$.\\ \\ For each $a\in \mathcal{L}^*(AE^1)$ write $r(A,a) = A_2 \cup C_2$, where $C_2 = r(A,a)\cap E^0_{sink}$ and $A_2 = r(A,a) \setminus C_2$. Then $s_{\alpha a} p_{r(A,a)} s_{\beta a} = s_{\alpha a} p_{A_2} s_{\beta a} +s_{\alpha a} p_{C_2} s_{\beta }^*$. This implies $s_{\alpha a} p_{A_2} s_{\beta a} = \sum_{ab \in \mathcal{L}(AE^2)}s_{\alpha ab} p_{r(A,ab)}s_{\beta ab}^*$, and $s_{\alpha a} p_{C_2} s_{\beta a}^* = \sum_{V \in \mathcal{V}, V \subseteq C_2}s_{\alpha a} p_V s_{\beta a}^*$. \\ Since $E$ is a finite graph with no loops, repeating this process will eventually give us $s_\alpha p_A s_\beta^*$ as a sum of elements of the form $s_{\alpha \gamma} p_V s_{\beta \gamma}^*$ where $V \in \mathcal{V}$. For each $V \in \mathcal{V}$ there are $n_V$ distinct words $\alpha$ in $\mathcal{L}^*(E)$ with $r(\alpha) \supseteq V$, adding 1 for the empty word $\epsilon$, we get that $I_V \cong \mathcal{M}_{n_v+1}(\mathbb{C})$. For $U, V \in \mathcal{V}$, $s_\alpha p_U s_\beta^* \cdot s_\mu p_V s_\nu^* = 0$ unless $U = V$, hence the direct sum. \end{proof} In the next, rather trivial, example we, once again, see the significance of having $E^0_{sink}$ in $\mathcal{B}$. \begin{eg} Consider the labeled graph: $$\xymatrix{ & v \\ u \ar[r]_{a} \ar[ur]^{a} & w \ar[r]_{b} & x}$$ Notice that $r(a) = \{v,w\},~ r(ab) = \{x\}$, and $E^0_{sink} = \{v,x\}$. The smallest normal labeled space $(E, \mathcal{L}, \mathcal{B}_1)$ containing these sets has $\mathcal{B}_1 = \{\{v,w\}, \{x\}, \{v, w, x\}, \{w\}, \{v\}, \emptyset\}$. Using Proposition \ref{direct.sum}, we get $C^*(E, \mathcal{L}, \mathcal{B}_1) = \mathcal{M}_2(\mathbb{C}) \oplus \mathcal{M}_3(\mathbb{C})$. On the other hand, if $\mathcal{B}_2 \cong \{\{x\}, \{v,w\},\{v,w,x\}, \emptyset\}$, which still makes a normal labeled space, it is not difficult to see that $C^*(E, \mathcal{L}, \mathcal{B}_2) \cong \mathcal{M}_3(\mathbb{C})$. \end{eg} \begin{eg} Consider the labeled graph: $$\xymatrix{ & v \ar[dr]^{b} \\ u \ar[r]_{a} & w \ar[r]_{b} & x}$$ Notice that $r(a) = \{w\},~ r(ab) = \{x\}$, and $E^0_{sink} = \{x\}$. Consider $\mathcal{B} = \{\{v,w\}, \{w\}, \{x\}, \emptyset\}$, $(E,\mathcal{L}, \mathcal{B})$ is a labeled space (not normal). It is not difficult to see that $C^*(E, \mathcal{L}, \mathcal{B}) = \mathcal{M}_3(\mathbb{C})$. If we attempt to make this space normal by adding $\{v\}$ into $\mathcal{B}$, the resulting set would not make $(E,\mathcal{L}, \mathcal{B})$ weakly left--resolving. \end{eg} \begin{remark} The next natural question would be ``can one normalize a labeled space?" More precisely, given a labeled space $(E,\mathcal{L},\mathcal{B}_1)$ is there a normal labeled space $(E,\mathcal{L}, \mathcal{B}_2)$ such that $C^*(E,\mathcal{L},\mathcal{B}_1) \cong C^*(E,\mathcal{L},\mathcal{B}_2)$? \end{remark}
\section{Introduction} \label{Introduction} The last 10 years have seen the ever increasing use of social media platforms and e-commerce systems, such as Tiktok, Amazon or Netflix. Massive amounts of clicking \& purchase interactions, and other user feedback are created explicitly or implicitly in such systems. For example, regular users on Tiktok may watch hundreds to thousands of micro-videos per week given that the average playing time of each video is less than 20 seconds \cite{yuan2020future}. A large body of research has clearly shown that these interaction sequences can be used to model the item preferences of the users \cite{qu2020cmnrec,yuan2019simple,kang2018self,yuan2020future,yuan2016lambdafm,guo2019dynamic}. Deep neural network models, such as GRURec~\cite{ hidasi2015session} and NextItNet ~\cite{yuan2019simple}, have achieved remarkable results in modeling sequential user-item interactions and generating personalized recommendations. However, most of the past work has been focused on the task of recommending items on the same platform, from where the data came from. Few of these methods exploit this data to learn a universal user representation that could then be used for a different downstream task, such as for instance the cold-start user problem on a different recommendation platform or the prediction of a user profile. In this work, we deal with the task of adapting a singe user representation model for multiple downstream tasks. In particular, we attempt to use deep neural network models, pre-trained in an unsupervised (self-supervised) manner on a source domain with rich sequential user-item interactions, for a variety of tasks on target domains, where users are cold or new. To do so, we need to tackle the following issues: (1) construct a highly effective and general pre-training model that is capable of modeling and representing very long-range user-item interaction sequences without supervision. (2) develop a fine-tuning architecture that can transfer pre-trained user representations to downstream tasks. Existing recommender systems literature is unclear on whether unsupervised learned user representations are useful in different domains where the same users are involved but where they have little supervised labeled data. (3) introduce an adaptation method that enables the fine-tuning architecture to share most of the parameters across all tasks. Although fine-tuning a separate model for each task often performs better, we believe there are important reasons for reusing parameters between tasks. Particularly for resource-limited devices, applying several different neural networks for each task with the same input is computationally expensive and memory intensive~\cite{mudrakarta2018k,stickland2019bert}. Even for the large-scale web applications, practitioners need to avoid maintaining a separate large model for every user~\cite{stickland2019bert}, especially when there are a large number of tasks. To tackle the third issue, two transfer techniques have been widely used ~\cite{yosinski2014transferable}: (1) fine-tuning an additional output layer to project transferred knowledge from a source domain to a target domain, and (2) fine-tuning the last (few) hidden layers along with the output layer. In fact, we find that fine-tuning only the output layer often performs poorly in the recommendation scenario; fine-tuning the last few layers properly sometimes offers promising performance, but requires much manual effort since the number of layers to be tuned highly depends on the pre-trained model and target task. Thus far, there is no consensus on how to choose the number, which in practice often relies on an inefficient hyper-parameter search. In addition, fine-tuning the last few layers does not realize our goal to share most parameters of the pre-trained model. To achieve the first two goals, we propose a two-stage training procedure. First, in order to learn a universal user representation, we employ sequential neural networks as our pre-trained model and train them with users' historical clicking or purchase sequences. Sequential models can be trained without manually labeled data using self-supervision which is essentially trained by predicting the next item on the sequence. Moreover sequential data is much easier to collect from online systems. In this paper, we choose NextItNet-style~\cite{yuan2019simple,yuan2020future} neural networks as the base models considering that they achieve state-of-the-art performance when modeling very long-range sequential user-item interactions~\cite{wang2019towards}. Subsequently, we can adapt the pre-trained model to downstream tasks using supervised objectives. By doing so, we obtain an NLP~\cite{radford2018improving, houlsby2019parameter} or computer vision (CV)~\cite{yosinski2014transferable,rosenfeld2018incremental}-like transfer learning framework. To achieve the third goal that enables a high degree of parameter sharing for fine-tuning models between domains, we borrow an idea from the learning-to-learn method, analogous to~\cite{bertinetto2016learning}. The core idea of learning-to-learn is that the parameters of deep neural networks can be predicted from another \cite{rebuffi2017learning,bertinetto2016learning}; moreover, ~\cite{denil2013predicting} demonstrated that it is possible to predict more than 95\% parameters of a network in a layer given the remaining 5\%. Taken inspiration from these works, we are interested in exploring whether these findings hold for the transfer learning tasks in the recommender system (RS) domain. In addition, unlike above works, we are more interested in exploring the idea of parameter adaptation rather than prediction. Specifically, we propose a separate grafting neural network, termed as model patch, which adapts the parameters of each convolutional layer in the pre-trained model to a target task. Each model patch consists of less than 10\% of the parameters of the original convolutional layer. By inserting such model patches into the pre-trained models, our fine-tuning networks are not only able to keep all pre-trained parameters unchanged, but also successfully induce them for problems of downstream tasks without a significant drop in performance. We name the proposed model PeterRec, where `Peter' stands for \underline{p}arameter \underline{e}fficient \underline{t}ransf\underline{er} learning. The contributions of this paper are listed as follows: \begin{itemize} \item We propose a universal user representational learning architecture, a method that can be used to achieve NLP or CV-like transfer learning for various downstream tasks. More importantly, we are the first to demonstrate that self-supervised learned user representations can be used to infer user profiles, such as for instance the gender, age, preferences and life status (e.g., single, married or parenting). It is conceivable that the inferred user profiles by PeterRec can help improve the quality of many public and commercial services, but also raises concerns of privacy protection. \item We propose a simple yet very effective grafting network, i.e., model patch, which allows pre-trained weights to remain unaltered and shared for various downstream tasks. \item We propose two alternative ways to inject the model patches into pre-trained models, namely serial and parallel insertion. \item We perform extensive ablation analysis on five different tasks during fine-tuning, and report many insightful findings, which could be directions for future research in the RS domain. \item We have released a high-quality dataset used for transfer learning research. To our best knowledge, this is the first large-scale recommendation dataset that can be used for both transfer \& multi-domain learning. We hope our datasets can provide a benchmark to facilitate the research of transfer and multi-domain learning in the RS domain. \end{itemize} \section{Related Work} PeterRec tackles two research questions: (1) training an effective and efficient base model, and (2) transferring the learned user representations from the base model to downstream tasks with a high degree of parameter sharing. Since we choose the sequential recommendation models to perform this upstream task, we briefly review related literature. Then we recapitalize work in transfer learning and user representation adaptation. \subsection{Sequential Recommendation Models} A sequential recommendation (SR) model takes in a sequence (session) of user-item interactions, and taking sequentially each item of the sequence as input aims to predict the next one(s) that the user likes. SR have demonstrated obvious accuracy gains compared to traditional content or context-based recommendations when modeling users sequential actions~\cite{kang2018self}. Another merit of SR is that sequential models do not necessarily require user profile information since user representations can be implicitly reflected by their past sequential behaviors. Amongst these models, researchers have paid special attention to three lines of work: RNN-based \cite{hidasi2015session}, CNN-based~\cite{tang2018caser,yuan2019simple,yuan2020future}, and pure attention-based~\cite{kang2018self} sequential models. In general, typical RNN models strictly rely on sequential dependencies during training, and thus, cannot take full advantage of modern computing architectures, such as GPUs or TPU~\cite{yuan2019simple}. CNN and attention-based recommendation models do not have such a problems since the entire sequence can be observed during training and thus can be fully parallel. One well-known obstacle that prevents CNN from being a strong sequential model is the limited receptive field due to its small kernel size (e.g., 3 $\times$ 3). This issue has been cleverly approached by introducing the dilated convolutional operation, which enables an exponentially increased receptive field with unchanged kernel~\cite{yuan2019simple,yuan2020future}. By contrast, self-attention based sequential models, such as SASRec~\cite{kang2018self} may have time complexity and memory issues since they grow quadratically with the sequence length. Thereby, we choose dilated convolution-based sequential neural network to build the pre-trained model by investigating both causal (i.e., NextItNet~\cite{yuan2019simple}) and non-causal (i.e., the bidirectional encoder of GRec~\cite{yuan2020future}) convolutions in this paper. \subsection{Transfer Learning \& Domain Adaptation} Transfer learning (TL) has recently become a research hotspot in many application fields of machine learning~\cite{devlin2018bert,rebuffi2018efficient,houlsby2019parameter,radford2018improving}. TL refers to methods that exploit knowledge gained in a source domain where a vast amount of training data is available, to improve a different but related problem in a target domain where only little labeled data can be obtained. Unlike much early work that concentrated on shallow classifiers (or predictors), e.g., matrix factorization in recommender systems~\cite{zhao2018learning}, recent TL research has shifted to using large \& deep neural network as classifiers, which has yielded significantly better accuracy~\cite{ni2018perceive,chen2019icient,hu2018mtnet,yuan2019darec}. However, this also brought up new challenges: (1) how to perform efficient transfer learning for resource-limited applications? (2) how to avoid overfitting problems for large neural network models when training examples are scarce in the target domain? To our knowledge, these types of research have not been explored in the existing recommendation literature. In fact, we are even not sure whether it is possible to learn an effective user representation by \textit{only} using their past behaviors (i.e., no user profiles \& no other item features), and whether such representations can be transferred to improve the downstream tasks. Closely related to this work, ~\cite{ni2018perceive} recently introduced a DUPN model, which represents deep user perception network. DUPN is also capable of learning general user representations for multi-task purpose. But we find there are several key differences from this work. First, DUPN has to be pre-trained by a multi-task learning objective, i.e., more than one training loss. It showed that the learned user representations performed much worse if there are no auxiliary losses and data. By contrast, PeterRec is pre-trained by one single loss but can be adapted to multiple domains or tasks. To this end, we define the task in this paper as a multi-domain learning problem~\cite{rebuffi2018efficient}, which distinguishes from the multi-task learning in DUPN. Second, DUPN performs pre-training by relying on many additional features, such as user profiles and item features. It requires expensive human efforts in feature engineering, and it is also unclear whether the user representation work or not without these features. Third, DUPN does not consider efficient transfer learning issue since it only investigates fine-tuning all pre-trained parameters and the final classification layer. By contrast, PeterRec fine-tunes a small fraction of injected parameters, but obtains comparable or better results than fine-tuning all parameters. CoNet~\cite{hu2018conet} is another cross-domain recommendation model using neural networks as the base model. To enable knowledge transfer, CoNet jointly trains two objective functions, among which one represents the source network and the other the target. One interesting conclusion was made by the authors of CoNet is that the pre-training and fine-tuning paradigm in their paper does not work well according to the empirical observations. In fact, neither CoNet nor DUPN provides evidence that fine-tuning with a pre-trained network performs better than fine-tuning from scratch, which, beyond doubt, is the fundamental assumption for TL in recommender systems. By contrast, in this paper, we clearly demonstrate that the proposed PeterRec notably improves the accuracy of downstream recommendation tasks by fine-tuning on the pre-trained model relative to training from scratch. \section{PeterRec} The training procedure of PeterRec consists of two stages. The first stage is learning a high-capacity user representation model on datasets with plenty of user sequential user-item interactions. Then there is a supervised fine-tuning stage, where the pre-trained representation is adapted to the downstream task with supervised labels. In particular, we attempt to share the majority of parameters. \subsection{Notation} \begin{figure}[t] \centering \small \includegraphics[width=0.49\textwidth]{./image/peterrec.pdf} \caption{\small Illustration of parameters in PeterRec. $x_i^u$denote an itemID in the input sequence of user $u$. [TCL] is a special token representing the classification symbol.} \label{overviewpeter} \end{figure} We begin with some basic notations. Suppose that we are given two domains: a source domain $\mathcal{S}$ and target domain $\mathcal{T}$. For example, $\mathcal{S}$ can be news or video recommendation where a large number of user interactions are often available, and $\mathcal{T}$ can be a different prediction task where user labels are usually very limited. In more detail, a user label in this paper can be an item he prefers in $\mathcal{T}$, an age bracket he belongs to, or the marital status he is in. Let $\mathcal{U}$ (of size $|\mathcal{U}|$) be the set of users shared in both domains. Each instance in $\mathcal{S}$ (of size $|\mathcal{S}|$) consists of a userID $u \in \mathcal{U}$, and the unsupervised interaction sequence $\bm{\mathrm{x}}^u=\{x_1^u, ..., x_n^u \}$ ($x_i^u \in \mathcal{X}$), i.e., $(u,\bm{\mathrm{x}}^u) \in \mathcal{S}$, where $x_t^u$ denotes the $t$-th interacted item of $u$ and $ \mathcal{X}$ (of size $|\mathcal{X}|$) is the set of items in $\mathcal{S}$. Correspondingly, each instance in $\mathcal{T}$ (of size $|\mathcal{T}|$) consists of a userID $u$, along with the supervised label $y \in \mathcal{Y}$, i.e., $(u,y) \in \mathcal{T}$. Note if $u$ has $g$ different labels, then there will be $g$ instances for $u$ in $\mathcal{T}$. We also show the parameters in the pre-trained and fine-tuned models in Figure~\ref{overviewpeter}. $\mathcal{H}(\widetilde{\Theta})$ is the pretrained network, where $\widetilde{\Theta}$ include parameters of the embedding and convolutional layers; $w(\hat{\Theta})$ and $\pi(\nu)$ represent the classification layers for pre-training and fine-tuning, respectively; and $\mathcal{\widetilde{H}}(\widetilde{\Theta}; \vartheta)$ is the fine-tuning network with pre-trained $\widetilde{\Theta}$ and re-learned model patch parameters $\vartheta$. $\mathcal{H}(\widetilde{\Theta})$ and $\mathcal{\widetilde{H}}(\widetilde{\Theta}; \vartheta)$ share the same network architecture except the injected model patches (explained later). \subsection{User Representation Pre-training} \label{UserRepL} {\textbf{Pre-training Objectives.}} Following NextItNet~\cite{yuan2019simple}, we model the user interaction dependencies in the sequence by a left-to-right chain rule factorization, aka an autoregressive~\cite{bengio2000modeling} method. Mathematically, the joint probability $p(\bm{\mathrm{x}}^u;\Theta)$ of each user sequence is represented by the product of the conditional distributions over the items, as shown in Figure~\ref{overviewpeter} (a): \begin{equation} \small \label{l2r} p(\bm{\mathrm{x}}^u;\Theta)=\prod_{i=1}^{n}p(x_i^u|x_1^u,..,x_{i-1}^u;\Theta) \end{equation} where the value $p(x_i^u|x_1^u,...,x_{i-1}^u; \Theta)$ is the probability of the $i$-th interacted item $x_i^u$ conditioned on all its previous interactions $\{x_1^u,...,x_{i-1}^u\}$, $\Theta$ is the parameters of pre-trained model including network parameters $\widetilde{\Theta}$ and the classification layer parameters $\widehat{\Theta }$. With such a formulation, the interaction dependencies in $\bm{\mathrm{x}}^u$ can be explicitly modeled, which is more powerful than existing pre-training approaches (e.g., DUPN) that simply treat the item sequence $\bm{\mathrm{x}}^u$ as common feature vectors. To the best of our knowledge, PeterRec is the first TL model in the recommender system domain that is pre-trained by unsupervised autoregressive approach. Even though user-item interactions come in the form of sequence data, the sequential dependency may not be strictly held in terms of user preference, particularly for recommendations. This has been verified in~\cite{yuan2020future}, which introduced GRec that estimates the target interaction by considering both past and future interactions. As such, we introduce an alternative pre-training objective by taking account of two-side contexts. Specifically, we randomly mask a certain percentage of items (e.g., 30\%) of $\bm{\mathrm{x}}^u$ by filling in the mask symbols (e.g., ``\_\_'') in the sequence, and then predict the items at these masked position by directly adding a softmax layer on the encoder of GRec. Formally, let $\bm{\mathrm{x}}^u_\triangle=\{x_{\triangle_1 }^u,...,x_{\triangle_m }^u\}$ ($1 \leq m < t$) be the masked interactions, and $\tilde{\bm{\mathrm{x}}}^u$ is the sequence of $\bm{\mathrm{x}}^u$ by replacing items in $\bm{\mathrm{x}}^u_\triangle$ with ``\_\_'', the probability of $p(\bm{\mathrm{x}}^u_\triangle)$ is given as: \begin{equation} \small \label{bid} p(\bm{\mathrm{x}}^u_\triangle;\Theta)=\prod_{i=1}^{m}p(x^u_{\triangle_i}|{\tilde{\bm{\mathrm{x}}}^u;\Theta}) \end{equation} To maximize $p(\bm{\mathrm{x}}^u;\Theta)$ or $p(\bm{\mathrm{x}}^u_\triangle;\Theta)$, it is equivalent to minimize the cross-entropy (CE) loss $L(\mathcal{S};\Theta)=-\sum_{(u,\bm{\mathrm{x}}^u)\in \mathcal S}\log p(\bm{\mathrm{x}}^u;\Theta)$ and $G(\mathcal{S};\Theta)=-\sum_{(u,\bm{\mathrm{x}}^u)\in \mathcal S} \log p(\bm{\mathrm{x}}^u_\triangle;\Theta)$, respectively. It is worth mentioning that while similar pre-training objectives have been applied in the NLP~\cite{devlin2018bert} and computer vision~\cite{su2019vl} domains recently, the effectiveness of them remains completely unknown in recommender systems. Hence, in this paper instead of proposing a new pre-training objective function, we are primarily interested in showing readers what types of item recommendation models can be applied to user representation learning, and how to adapt them for pre-training \& fine-tuning so as to bridge the gap between different domains. {\textbf{Petrained Network Architectures.}} The main architecture ingredients of the pre-trained model are a stack of dilated convolutional (DC)~\cite{yuan2019simple,yuan2020future} layers with exponentially increased dilations and a repeatable pattern, e.g., $\{1, 2,4,8,16, 32,1, 2,4,8,16,32,...,32\}$. Every two DC layers are connected by a shortcut connection, called residual block~\cite{he2016deep}. Each DC layer in the block is followed\footnote{\scriptsize Note there is no standard regarding the orders of the DC layer, the normalization and non-linear layer. } by a layer normalization and non-linear activation layer, as illustrated in Figure~\ref{modelpatch}~(a). Following~\cite{yuan2019simple} and ~\cite{yuan2020future}, the pre-trained network should be built by causal and non-causal CNNs for objective fuctions of Eq.~(\ref{l2r}) and Eq.~(\ref{bid}), respectively. Concretely, the residual block with the DC operations is formalized as follows: \begin{equation} \small \begin{aligned} \mathcal{H}_{DC}(\bm{\mathit{E}})= \left\{\begin{matrix} \bm{\mathit{E}}+\mathcal{F}_{cauCNN}(\bm{\mathit{E}})& optimized \ by \quad Eq.~(1) \\ \bm{\mathit{E}}+\mathcal{F}_{non\_cauCNN}(\bm{\mathit{E}})& optimized \ by \quad Eq.~(2) \end{matrix}\right. \end{aligned} \end{equation} where $\bm{\mathit{E}}$ $ \in \mathbb{R}^{n\times k}$ and $\mathcal{H}_{DC}(\bm{\mathit{E}})\in \mathbb{R}^{n\times k }$ are the input and output matrices of layers considered, $k$ is the embedding dimension, $\bm{\mathit{E}}+\mathcal{F}$ is a shortcut connection by element-wise addition, and $\mathcal{F}_{cauCNN}(\bm{\mathit{E}})$ \& $\mathcal{F}_{non\_cauCNN}(\bm{\mathit{E}})$ are the residual mappings as follows \begin{equation} \label{caus} \small \begin{aligned} \mathcal{F}_{cauCNN}(\bm{\mathit{E}})&=\sigma(\mathcal {LN}_2(\psi_2 (\sigma(\mathcal {LN}_1(\psi_1 (\bm{\mathit{E}})))))) \\ \mathcal{F}_{non\_cauCNN}(\bm{\mathit{E}})&=\sigma(\mathcal {LN}_2(\phi_2 (\sigma(\mathcal {LN}_1(\phi_1 (\bm{\mathit{E}})))))) \end{aligned} \end{equation} where $\psi$ and $\phi$ represent causal (e.g., Figure~\ref{finetunearch} (a) \& (b) and non-causal (e.g., (c) \& (d)) convolution operations, respectively, and the biases are omitted for shortening notations. $\mathcal {LN}$ and $\sigma$ represent layer normalization~\cite{ba2016layer} and ReLU~\cite{nair2010rectified}, respectively. \begin{figure*}[t] \centering \small \includegraphics[width=1.0\textwidth]{./image/finetune_all.pdf} \caption{\small The fine-tuning architecture of PeterRec illustrated with one residual block. Each layer of (green) neurons corresponds to a DC layer in Figure~\ref{modelpatch}. The normalization layer, ReLU layers and model patches are not depicted here for clearity. (a)(b) and (c)(d) are causal and non-causal convolutions, respectively. FNN is the feedforward neural network for classification with parameter $\nu$. (a)(c) and (d) are suggested fine-tuning architectures. (b) is not correct since no information can be obtained by causal convolution if [TCL] is inserted at the beginning. } \label{finetunearch} \end{figure*} \subsection{ User Representations Adapting} \label{Adapting} After the above pre-training process, we can adapt the learned representations to specific downstream tasks. The primary goal here is to develop a fine-tuning framework that works well in multiple-domain settings by introducing only a small fraction of domain-specific parameters, and attain a high-degree of parameter sharing between domains. Specifically, the architecture of fine-tuning PeterRec contains three components as shown in Figure~\ref{overviewpeter} (b): all except the classification layer of the pre-trained model (parameterized by $\widetilde{\Theta}$), the new classification layer (parameterized by $\nu$) for the corresponding downstream task, and the model patches (parameterized by $ \vartheta$) that are inserted in the pre-trained residual blocks. In the following, we first present the overall fine-tuning framework. Then, we describe the details of the grafting patch structure and show how to inject it into the pre-trained model. {\textbf{Fine-tuning Framework.}} Let assume that the model patches have been inserted and initialized in the pre-trained model. The overall architectures of PeterRec are illustrated in Figure~\ref{finetunearch}. As a running example, we describe in detail the fine-tuning procedures using the causal CNN network, as shown in (a). For each instance $(u,y)$ in $\mathcal{T}$, we first add a [TCL] token at the end position of user sequence $u$, and achieve the new input, i.e., $\bm{\mathrm{x}}^u=\{x_1^u, ..., x_n^u, \text{[TCL]} \} $. Then, we feed this input sequence to the fine-tuning neural network. By performing a series of causal CNN operations on the embedding of $\bm{\mathrm{x}}^u$, we obtain the last hidden layer matrix. Afterwards, a linear classification layer is placed on top of the final hidden vector of the [TCL] token, denoted by $\bm{h}_{n} \in \mathbb{R}^{ k}$. Finally, we are able to achieve the scores $\bm{o} \in \mathbb{R}^{|\mathcal{Y}|}$ with respect to all labels in $\mathcal{Y}$, and the probability to predict $y$. \begin{equation} \small \begin{aligned} \bm{o}&=\bm{h}_n\bm{W}+\bm{b}\\ p(y|u)&=p(y|\bm{\mathrm{x}}^u)=softmax(\bm{o}_y)\\ \end{aligned} \end{equation} where $\bm{W} \in \mathbb{R}^{k \times |\mathcal{Y}|} $ and $\bm{b} \in \mathbb{R}^{|\mathcal{Y}|} $ are the projection matrix and bias term. In terms of the pre-trained model by non-causal CNNs, PeterRec can simply add [TCL]s at the start and the end positions of $\bm{\mathrm{x}}^u$, as shown in Figure~\ref{finetunearch}~(c), i.e., $\bm{\mathrm{x}}^u=\{\text{[TCL]}, x_1^u, ..., x_n^u, \text{[TCL]} \}$, and accordingly \begin{equation} \small \begin{aligned} \bm{o}=(\bm{h}_0+\bm{h}_n) \bm{W}+\bm{b} \end{aligned} \end{equation} Alternatively, PeterRec can use the sum of all hidden vectors of $\bm{h}$ without adding any [TCL] for both causal and non-causal CNNs, e.g., Figure~\ref{finetunearch}~(d). \begin{equation} \small \begin{aligned} \!\! \!\!\!\! \bm{o}=(\sum_{i=1}^{n}\bm{h}_i )\bm{W}+\bm{b} \end{aligned} \end{equation} Throughout this paper, we will use Figure~\ref{finetunearch} (a) for causal CNN and (c) for non-causal CNN in our experiments. As for the fine-tuning objective functions of PeterRec, we adopt the pairwise ranking loss (BPR)~\cite{rendle2009bpr,lei2020estimation} for top-$N$ item recommendation task and the CE loss for the user profile classification tasks. \begin{equation} \label{lossfunctions} \small \begin{aligned} R_{BPR}(\mathcal{T};\tilde{\Theta};\nu;\vartheta)&=-\sum_{(u,y) \in \mathcal{T}}\log \delta (\bm{o}_y-\bm{o}_{y^\_}) \\ R_{CE}(\mathcal{T};\tilde{\Theta};\nu;\vartheta)&=-\sum_{(u,y) \in \mathcal{T}}\log p(y|u) \end{aligned} \end{equation} where $\delta$ is the logistic sigmoid function, and $y^\_$ is a false label randomly sampled from $\mathcal{Y}\backslash y$ following~\cite{rendle2009bpr}. Note that in~\cite{yuan2016lambdafm,yuan2018fbgd}, authors showed that a properly developed dynamic negative sampler usually performed better than the random one if $|\mathcal{Y}|$ is huge. However, this is beyond the scope of this paper, and we leave it as future investigation. Eq.(\ref{lossfunctions}) can be then optimized by SGD or its variants such as Adam~\cite{kingma2014adam}. For each downstream task, PeterRec only updates $\vartheta $ and $\nu$ (including $\bm{W}$ \& $\bm{b}$) by freezing pre-trained parameters $\widetilde{\Theta}$. \begin{figure*}[h] \centering \small \includegraphics[width=1.0\textwidth]{./image/mp.pdf} \caption{\small Model patch (MP) and insertion methods. (a) is the original pre-trained residual block; (b) (c) (d) (e) are the fine-tuned residual blocks with inserted MPs; and (f) is the MP block. $+$ is the addition operation. $1\times 3$ is the kernel size of dilated convolutional layer. } \label{modelpatch} \end{figure*} \textbf{Model Patch Structure.} The model patch is a parametric neural network, which adapts the pre-trained DC residual blocks to corresponding tasks, similar to grafting for plants. Our work is motivated and inspired by recent learning-to-learn approaches in~\cite{denil2013predicting,rebuffi2018efficient,mudrakarta2018k} which show that it is possible to predict up to 95\% of the model parameters given only the remaining 5\%. Instead of predicting parameters, we aim to demonstrate how to modify the pre-trained network to obtain better accuracy in related but very different tasks by training only few parameters. The structure of the model patch neural network is shown in Figure~\ref{modelpatch}~(f). We construct it using a simple residual network (ResNet) architecture with two $1\times 1$ convolutional layers considering its strong learning capacity in the literature~\cite{ he2016deep}. To minimize the number of parameters, we propose a bottlenet architecture~\cite{yuan2020future}. Specifically, the model patch consists of a projection-down layer, an activation function, a projection-up layer, and a shortcut connection, where the projection-down layer projects the original $k$ dimensional channels to $d$ ($d \ll k$, e.g., $k=8d$)\footnote{\scriptsize Throughout this paper, we used $k=8d$, though we did not find that $k=16d$ degraded accuracy.} by $1\times 1 \times k \times d $ convolutional operations $\phi_{down}$, and the projection-up layer is to project it back to its original dimension by $1\times 1 \times d\times k $ convolutional operations $\phi_{up}$. Formally, given its input tensor $\bm{\mathit{\widetilde{E}}} $, the output of the model patch can be expressed as: \begin{equation} \begin{aligned} \mathcal{H}_{MP}(\bm{\mathit{\widetilde{E}}})=\bm{\mathit{\widetilde{E}}}+\phi_{up}(\sigma (\phi_{down}(\bm{\mathit{\widetilde{E}}}))) \end{aligned} \end{equation} Suppose that the kernel size of the original dilated convolutions is $1\times3$, the total number of the parameters of each DC layer is $3* k^2=192 d^2$, while the number of the patched neural network is $2*k*f=16 d^2$, which is less than 10\% parameters of the original DC network. Note that parameters of biases and layer normalization are not taken into account since the numbers are much smaller than that of the DC layer. Note that using other similar structures to construct the model patch may also perform well, such as in~\cite{xie2017aggregated}, but it generally needs to meet three requirements: (1) to have a much smaller scale compared with the original convolutional neural network; (2) to guarantee that the pre-trained parameters are left unchanged during fine-tuning; and (3) to attain good accuracy. {\textbf{Insertion Methods.}} Having developed the model patch architecture, the next question is how to inject it into the current DC block. We introduce two ways for insertion, namely serial \& parallel mode patches, as shown in Figure~\ref{modelpatch} (b) (c) (d) and~(e). First, we give the formal mathematical formulations of the fine-tuning block (by using causal CNNs as an example) as follows: \begin{equation} \small \begin{aligned} \mathcal{\widetilde{H}}_{DC}(\bm{\mathit{E}})=\bm{\mathit{E}}+\mathcal{\widetilde{F}}_{cauCNN}(\bm{\mathit{E}}) \end{aligned} \end{equation} where $\mathcal{\widetilde{F}}_{cauCNN}$, short for $\mathcal{\widetilde{F}}$ below, is \begin{equation} \label{caus} \small \begin{aligned} \mathcal{\widetilde{F}}= \left\{\begin{matrix} \sigma(\mathcal {LN}_2(\mathcal{H}_{MP2}(\psi_2 (\sigma(\mathcal {LN}_1(\mathcal{H}_{MP1}(\psi_1 (\bm{\mathit{E}}))))))) )& Figure~\ref{modelpatch}~(b) \\ \mathcal{H}_{MP}(\sigma(\mathcal {LN}_2(\psi_2 (\sigma(\mathcal {LN}_1(\psi_1 (\bm{\mathit{E}})))))) )& Figure~\ref{modelpatch}~(c) \\ \sigma(\mathcal {LN}_2(\mathcal{H}_{MP2}(\bm{\mathit{\widetilde{E}}})+ \psi_2(\bm{\mathit{\widetilde{E}}})), & Figure~\ref{modelpatch}~(d) \\ where \ \bm{\mathit{\widetilde{E}}}=\sigma(\mathcal {LN}_1(\mathcal{H}_{MP1}(\bm{\mathit{E}})+\psi_1 (\bm{\mathit{E}})))))&\\ \mathcal{H}_{MP2}(\bm{\mathit{\widetilde{E}}})+\sigma(\mathcal {LN}_2(\psi_2 (\bm{\mathit{\widetilde{E}}}))), & Figure~\ref{modelpatch}~(e)\\ where \ \bm{\mathit{\widetilde{E}}} =\mathcal{H}_{MP1}(\bm{\mathit{E}})+\sigma(\mathcal {LN}_1(\psi_1 (\bm{\mathit{E}}))) & \end{matrix}\right. \end{aligned} \end{equation} In fact, as shown in Figure~\ref{modelpatch}, we only suggest architectures of (b) (c) and (d) as (e) usually converges and performs significantly worse as evidenced and explained in Section~\ref{rq4}. Here, we give several empirical principles on how to insert this model. \begin{itemize} \item For the serial insertion, the inserted positions are very flexible so that one can inject the grafting patches either before or after layer normalization, as shown in (b) and (c). \item For the serial insertion, the number of patches for each DC residual block is very flexible so that one can inject either one or two patches. It gives almost the same results if $k$ in (c) is two times larger than that in (b). \item For parallel insertion, PeterRec is sensitive to the inserted positions, as shown in (d) and (e). Specifically, the model patch that is injected before layer normalization (i.e., (d)) performs better than that between layer normalization and activation function, which performs largely better than that after activation function (i.e., (e) ) . \item For parallel insertion, PeterRec with two patches inserted in the DC block usually performs slightly better than that with only one patch. \end{itemize} In practice, both the serial and parallel insertions with a proper design can yield comparable results with fine-tuning the entire model. Let us give a quantitative analysis regarding the number of tuned parameters. Assuming that PeterRec utilizes 500,000 items from a source domain, 1024 embedding \& hidden dimensions, 20 residual blocks (i.e., 40 layers), and 1000 class labels to be predicted in the target domain, the overall parameters are $500,000 * 1024+1024*1024*3 \ (\text{here 3 is the kernel size} ) \ *40+1024*1000 \approx 639$ million, the number of tuned parameters for $\vartheta$ and $\nu$ is $2*1024*1024/8*40 \approx 10$ million and $1024*1000 \approx 1$ million, respectively, which in total takes less than 1.7\% of the number of all parameters. Note that (1) the number of parameters $\nu$ can never be shared due to the difference of the output space in the target task, and it depends on the specific downstream task. It may be large if the task is an item recommendation task and may be very small if the task is user modeling (E.g., for gender estimation, it is $1024*2 =2048$); (2) Though there are several ways to compress the input embedding and output classification layers, which can lead to really large compression rates~\cite{sun2020generic,anderson2020superbloom}, we do not describe them in detail as this is clearly beyond the scope of our paper. \section{Experiments} \label{EXPERIMENTS} In our experiments, we answer the following research questions: \begin{enumerate} \item \textbf{RQ1:} Is the self-supervised learned user representation really helpful for the downstream tasks? To our best knowledge, as a fundamental research question for transfer learning in the recommender system domain, this has never been verified before. \item \textbf{RQ2:} How does PeterRec perform with the proposed model patch compared with fine-tuning the last layer and the entire model? \item \textbf{RQ3:} What types of user profiles can be estimated by PeterRec? Does PeterRec work well when users are cold or new in the target domain. \item \textbf{RQ4:} Are there any other interesting insights we can draw by the ablation analysis of PeterRec? \end{enumerate} \subsection{Experimental Settings} \begin{table} \centering \caption{\small Number of instances. Each instance in $\mathcal{S}$ and $\mathcal{T}$ represents $(u,\bm{\mathrm{x}}^u)$ and $(u,y)$ pairs, respectively. The number of source items $|\mathcal{X}|$=$ 191K$, $645K$, $645K$, $645K$, $645K$ ($K=1000$), and the number of target labels $|\mathcal{Y}|$=$20K$, $ 17K$, $2$, $8$, $6$ for the five dataset from left to right in the below table. $M=1000K$.} \small \label{datasets} \setlength{\tabcolsep}{2.1mm} \begin{threeparttable} \begin{tabular}{c|c|c|c|c|c} \toprule \small Domain & \small ColdRec-1& \small ColdRec-2 & \small GenEst& \small AgeEst& \small LifeEst\\ \midrule $\mathcal{S}$ &$1.65M$ &$1.55M$ &-& -&-\\ \midrule $\mathcal{T}$ & $3.80M$ & $2.95M$ & $1.55M$& $1.55M$&$ 1.08M$\\ \bottomrule \end{tabular} \end{threeparttable} \end{table} {\textbf{Datasets.}} We conduct experiments on several large-scale industrial datasets collected by the Platform and Content Group of Tencent\footnote{\scriptsize\url{https://www.tencent.com/en-us/}}. \textbf{1. ColdRec-1 dataset}: This contains both source and target datasets. The source dataset is the news recommendation data collected from QQ Browser\footnote{\scriptsize\url{https://browser.qq.com}} recommender system from 19th to 21st, June, 2019. Each interaction denotes a positive feedback (e.g., full-play or thumb-up) by a user at certain time. For each user, we construct the sequence using his recent 50 watching interactions by the chronological order. For users that have less than 50 interactions, we simply pad with zero in the beginning of the sequence following common practice~\cite{yuan2019simple}. The target dataset is collected from Kandian\footnote{\scriptsize\url{https://sdi.3g.qq.com/v/2019111020060911550}} recommender system in the same month where an interaction can be be a piece of news, a video or an advertisement. All users in Kandian are cold with at most 3 interactions (i.e., $g \leq 3$) and half of them have only one interaction. All users in the target dataset have corresponding records in the source dataset. \textbf{2. ColdRec-2 dataset}: It has similar characteristics with ColdRec-1. The source dataset contains recent 100 watching interactions of each user, including both news and videos. The users in the target dataset have at most 5 interactions (i.e., $g \leq 5$). \textbf{3. GenEst dataset}: It has only a target dataset since all users are from the source dataset of ColdRec-2. Each instance in GenEst is a user and his gender (male or female) label ($g=1$) obtained by the registration information. \textbf{4. AgeEst dataset}: Similar to GenEst, each instance in AgeEst is a user and his age bracket label ($g=1$) --- one class represents 10 years. \textbf{5. LifeEst dataset}: Similar to GenEst, each instance in LifeEst is a user and his life status label ($g=1$), e.g., single, married, pregnancy or parenting. Table \ref{datasets} summarizes other statistics of evaluated datasets. \noindent{\textbf{Evaluation Protocols.}} To evaluate the performance of PeterRec in the downstream tasks, we randomly split the target dataset into training (70\%), validation (3\%) and testing (27\%) sets. We use two popular top-$5$ metrics --- MRR@$5$ (Mean Reciprocal Rank)~\cite{yuan2018fbgd} and HR@$5$ (Hit Ratio)~\cite{he2017neural, he2020lightgcn} --- for the cold-start recommendation datasets (i.e. ColdRecs), and the classification accuracy (denoted by Acc, where Acc = number of correct predictions$/$total number of predictions) for the other three datasets. Note that to speed up the experiments of item recommendation tasks, we follow the common strategy in~\cite{he2017neural} by randomly sampling 99 negative examples for the true example, and evaluate top-$5$ accuracy among the 100 items. \begin{figure*} \small \centering \subfigure[\scriptsize Cold-Rec1 (one epoch: $50*b$ ) ]{\label{yahoo-alpha}\includegraphics[width=0.19\textwidth]{./image/bertimage/peterzero-coldrec1.pdf}} \subfigure[\scriptsize Cold-Rec2 (one epoch: $50*b$) ]{\label{yahoo-alpha}\includegraphics[width=0.19\textwidth]{./image/bertimage/peterzero-coldrec2.pdf}} \subfigure[\scriptsize GenEst (one epoch : $5*b$) ]{\label{yahoo-alpha}\includegraphics[width=0.19\textwidth]{./image/bertimage/peterzero-gender.pdf}} \subfigure[\scriptsize AgeEst (one epoch: $50*b$) ]{\label{yahoo-alphazero}\includegraphics[width=0.19\textwidth]{./image/bertimage/peterzero-age.pdf}} \subfigure[\scriptsize LifeEst ( one epoch: $5*b$ ) ]{\label{yahoo-alpha}\includegraphics[width=0.2\textwidth]{./image/bertimage/peterzero-lifestatus.pdf}} \caption{\small Impact of pre-training --- PeterRec (not converged) vs. PeterZero (fully converged) with the causal CNN. $b$ is batch size. Note that since PeterZero converges much faster (and worse) in the first several epoches, here we only show the results of PeterRec for these beginning epoches for a better comparison. The converged results are given in Table~\ref{finezeroandfineall}. } \label{impactofpre-training} \end{figure*} \noindent{\textbf{Compared Methods.}} We compare PeterRec with the following baselines to answer the proposed research questions. \begin{itemize} \item To answer \textbf{RQ1}, we compare PeterRec in two cases: well-pre-trained and no-pre-trained settings. We refer to PeterRec with randomly initialized weights as PeterZero. \item To answer \textbf{RQ2}, we compare PeterRec with three baselines which initialize their weights using pre-trained parameters: (1) fine-tuning only the linear classification layer that is designed for the target task, i.e., treating the pre-trained model as a feature extractor, referred to as FineCLS; (2) fine-tuning the last CNN layer, along with the linear classification layer of the target task, referred to as FineLast; (3) fine-tuning all parameters, including both the pre-trained component (again, excluding its softmax layer) and the linear classication layer for the new task, referred to as FineAll. \item To answer \textbf{RQ3}, we compare PeterRec with an intuitive baseline, which performs classification based on the largest number of labels in $\mathcal{T}$, referred to as LabelCS. For cold-start user recommendation, we compare it with two powerful baseline NeuFM~\cite{hexiagnan2017neuralf} and DeepFM~\cite{guo2017deepfm}. For a fair comparison, we slightly change NeuFM and DeepFM by treating interacted items in $\mathcal{S}$ as features and target items as softmax labels, which has no negative effect on the performance~\cite{rendle2020neural}. In adition, we also present a multi-task learning (referred to as MTL) baseline by adapting DUPN~\cite{ni2018perceive} to our dataset, which jointly learns the objective functions of both source and target domains instead of using the two-stage pre-training and fine-tuning schemes of PeterRec. \item To answer \textbf{RQ4}, we compare PeterRec by using different settings, e.g., using caus\underline{al} and n\underline{on}-causal CNNs, referred to as PeterRecal and PeterRecon, respectively. \end{itemize} \begin{table} \centering \caption{\small Impacts of pre-training --- FineZero vs. FineAll (with the causal CNN architectures). Without special mention, in the following we only report ColdRec-1 with HR@5 and ColdRec-2 with MRR@5 for demonstration. } \small \label{finezeroandfineall} \setlength{\tabcolsep}{2.2mm} \begin{threeparttable} \begin{tabular}{c|c|c|c|c|c} \toprule \small Model & \small ColdRec-1& \small ColdRec-2 & \small GenEst& \small AgeEst& \small LifeEst\\ \midrule FineZero &0.304 &0.290 &0.900& 0.703& 0.596\\ \midrule FineAll &0.349 & 0.333 & 0.903& 0.710 & 0.610\\ \midrule PeterRec &0.348 & 0.334 & 0.903& 0.708& 0.610\\ \bottomrule \end{tabular} \end{threeparttable} \end{table} \begin{table} \centering \caption{\small Performance comparison (with the non-causal CNN architectures). The number of fine-tuned parameters ($\vartheta $ and $\nu$) of PeterRec accounts for 9.4\%, 2.7\%, 0.16\%, 0.16\%, 0.16\% of FineAll on the five datasets from left to right. } \small \label{performcmp} \setlength{\tabcolsep}{2.2mm} \begin{threeparttable} \begin{tabular}{c|c|c|c|c|c} \toprule \small Model & \small ColdRec-1& \small ColdRec-2 & \small GenEst& \small AgeEst& \small LifeEst\\ \midrule FineCLS &0.295 &0.293 &0.900& 0.679& 0.606\\ \midrule FineLast &0.330 & 0.310 & 0.902& 0.682 & 0.608\\ \midrule FineAll & 0.352& 0.338 & 0.905& 0.714& 0.615\\ \midrule PeterRec& 0.351& 0.339 & 0.906& 0.714& 0.615\\ \bottomrule \end{tabular} \end{threeparttable} \end{table} \noindent{\textbf{Hyper-parameter Details.}} All models were trained on GPUs (Tesla P40) using Tensorflow. All reported results use an embedding \& hidden dimension of $k$=256. The learning rates for Adam~\cite{kingma2014adam} with $\eta$ = 0.001 to 0.0001 show consistent trends. For fair comparison, we use $\eta$ = 0.001 for all compared models on the first two datasets and $\eta$ = 0.0001 on the other three datasets. All models including causal and non-causal CNNs use dilation $\{1,2,4,8,1,2,4,8,1,2,4,8,1,2,4,8\}$ (16 layers or 8 residual blocks) following NextItNet~\cite{yuan2019simple}. Batch size $b$ and kernel size are set to 512 and 3 respectively for all models. As for the pre-trained model, we use 90\% of the dataset in $\mathcal{S}$ for training, and the remaining for validation. Different from fine-tuning, the measures for pre-training (i.e., MRR@5) are calculated based on the rank in the whole item pool following~\cite{yuan2019simple}. We use $\eta$ = 0.001 for all pre-trained models. Batch size is set to 32 and 128 for causal and non-causal CNNs due to the consideration of memory limitation. The masked percentage for non-causal CNNs is 30\%. Other parameters are kept the same as mentioned above. \subsection{RQ1.} \label{RQ1} Since PeterRec has a variety of variants with different circumstances (e.g., causal and non-causal versions, different insert methods (see Figure~\ref{modelpatch}), and different fine-tuning architectures (see Figure~\ref{finetunearch})), presenting all results on all the five datasets is redundant and space unacceptable. Hence, in what follows, we report parts of the results with respect to some variants of PeterRec (on some datasets or metrics) considering that their behaviors are consistent. To answer RQ1, we report the results in Figure~\ref{impactofpre-training} \& Table ~\ref{finezeroandfineall}. For all compared models, we use the causal CNN architecture. For PeterRec, we use the serial insertion in Figure~\ref{modelpatch} (c). First, we observe that PeterRec outperforms PeterZero with large improvements on all the five datasets. Since PeterRec and PeterZero use exactly the same network architectures and hyper-parameters, we can draw the conclusion that the self-supervised pre-trained user representation is of great importance in improving the accuracy of downstream tasks. To further verify it, we also report results of FineAll and FineZero in Table ~\ref{finezeroandfineall}. Similarly, FineAll largely exceeds FineZero (i.e., FineAll with random initialization) on all datasets. The same conclusion also applies to FineCLS and FineLast with their random initialization variants. \begin{figure} \small \centering \subfigure[\scriptsize Cold-Rec2 (one epoch: $500*b$) ]{\label{yahoo-alphazero}\includegraphics[width=0.235\textwidth]{./image/bertimage/peterRQ2-coldrec2.pdf}} \subfigure[\scriptsize AgeEst ( one epoch: $500*b$ ) ]{\label{yahoo-alpha}\includegraphics[width=0.235\textwidth]{./image/bertimage/peterRQ2-coldrec.pdf}} \caption{\small Convergence behaviors of PeterRec and baselines (with the non-causal CNN). FineLast1 and FineLast2 denote FineLasts that optimize only the last one and two CNN layers (including the corresponding layer normalizations), respectively. All models here have fully converged. The number of parameters to be re-learned: FineAll$\gg$ FineLast2$>$ PeterRec$ \approx $FineLast1$>$FineCLS.} \label{convergencebeh} \end{figure} \subsection{RQ2.} To answer RQ2, we report the results in Table~\ref{performcmp}. We use the non-causal CNN architecture for all models and parallel insertion for PeterRec. First, we observe that with the same pre-training model, FineCLS and FineLast perform much worse than FineAll, which demonstrates that fine-tuning the entire model benefits more than tuning only the last (few) layers. Second, we observe that PeterRec achieves similar results with FineAll, which suggests that fine-tuning the proposed model patch (MP) is as effective as fine-tuning the entire model. By contrast, PeterRec retains most pre-trained parameters (i.e., $\tilde{\Theta}$) unchanged for any downstream task, whereas FineAll requires a large separate set of parameters to be re-trained and saved for each task, and thus is not efficient for resource-limited applications and multi-domain learning settings. Moreover, fine-tuning all parameters may easily cause the overfitting (see Figure~\ref{convergencebeh} (b) and Figure~\ref{convergewithlimiteddata}) problems. To clearly see the convergence behaviors of these models, we also plot their results on the ColdRec and AgeEst datasets in Figure~\ref{convergencebeh}. \begin{table} \centering \caption{\small Results regarding user profile prediction. } \small \label{CLScom} \setlength{\tabcolsep}{5mm} \begin{threeparttable} \begin{tabular}{c|c|c|c} \toprule \small Model & \small GenEst& \small AgeEst& \small LifeEst\\ \midrule LabelCS &0.725 &0.392 & 0.446\\ \midrule MTL & 0.899& 0.706& 0.599\\ \midrule PeterRec & 0.906& 0.714& 0.615\\ \bottomrule \end{tabular} \end{threeparttable} \end{table} \begin{table} \centering \caption{\small Top-5 Accuracy in the cold user scenario. } \small \label{coldusercomp} \setlength{\tabcolsep}{3.9mm} \begin{threeparttable} \begin{tabular}{c|c|c|c|c} \toprule \small Data & \small NeuFM& \small DeepFM& \small MTL & \small PeterRec\\ \midrule ColdRec-1 &0.335 &0.326& 0.337&0.351\\ \midrule ColdRec-2 & 0.321& 0.317 &0.319 &0.339\\ \bottomrule \end{tabular} \end{threeparttable} \end{table} \subsection{RQ3.} \vspace{0.05in} To answer RQ3, we demonstrate the results in Table~\ref{CLScom} and~\ref{coldusercomp}. Clearly, PeterRec notably outperforms LabelCS, which demonstrates its the effectiveness in estimating user profiles. Meanwhile, PeterRec yields better top-$5$ accuracy than NeuFM, DeepFM and MTL in the cold-user item recommendation task. Particularly, PeterRec outperforms MTL in all tasks, which implies that the proposed two-stage pre-training \& fine-tuning paradigm is more powerful than the joint training in MTL. We argue this is because the optimal parameters learned for two objectives in MTL does not gurantee optimal performance for fine-tuning. Meanwhile, PeterRec is able to take advantage of all training examples in the upstream task, while these baseline models only leverage traing examples that have the same users involved in the target task. Compared with these baselines, PeterRec is memory-efficient since it only maintains a small set of model patch parameters for a new task while others have to store all parameters for each task. In addition, the training speed of MTL is several times slower than PeterRec due to the expensive pre-training objective functions. If there are a large number of sub-tasks, PeterRec will always be a better choice considering its high degree of parameter sharing. To the best of our knowledge, PeterRec is the first model that considers the memory-efficiency issue for multi-domain recommendations. \begin{table} \centering \caption{\small PeterRecal vs. PeterRecon. The results of the first and last two columns are ColdRec-1 and AgeEst datasets, respectively. } \small \label{prefinecompare} \setlength{\tabcolsep}{2.05mm} \begin{threeparttable} \begin{tabular}{c|c|c||c|c} \toprule \small Model & \small PeterRecal& \small PeterRecon & \small PeterRecal& \small PeterRecon\\ \midrule Pretaining &0.023 & 0.020 & 0.045 & 0.043\\ \midrule Fine-tuning &0.348 &0.351 &0.708&0.714 \\ \bottomrule \end{tabular} \end{threeparttable} \end{table} \begin{table} \centering \caption{\small Performance of different insertions in Figure~\ref{modelpatch} on AgeEst. } \small \label{insertionmethod} \setlength{\tabcolsep}{4.8mm} \begin{threeparttable} \begin{tabular}{c|c|c|c|c} \toprule \small Model & \small (b) & \small (c) & \small (d) & \small \ (e)\\ \midrule PeterRecal & 0.708 &0.708 &0.708&0.675 \\ \midrule PeterRecon &0.710 &0.710 & 0.714&0.685\\ \bottomrule \end{tabular} \end{threeparttable} \end{table} \begin{figure} \small \centering \subfigure[\scriptsize 5 \% of training data (one epoch: $500*b$) ]{\label{yahoo-alphazero}\includegraphics[width=0.235\textwidth]{./image/bertimage/peterrec-lifestatus-5percentage}} \subfigure[\scriptsize 10 \% of training data (one epoch: $500*b$) ]{\label{yahoo-alpha}\includegraphics[width=0.235\textwidth]{./image/bertimage/peterrec-lifestatus-10percentage}} \caption{\small Convergence behaviors of PeterRec and FineAll on LifeEst using much less training data. The improvements of PeterRec relative to FineAll is around 1.5\% and 1.7\% on (a) and (b) respectively in terms of the optimal performance.} \label{convergewithlimiteddata} \end{figure} \subsection{RQ4.} \label{rq4} This subsection offers several insightful findings: (1) By contrasting PeterRecal and PeterRecon in Table~\ref{prefinecompare}, we can draw the conclusion that better pre-training models for sequential recommendation may not necessarily lead to better transfer-learning accuracy. This is probably because PeterRecon takes two-side contexts into consideration~\cite{yuan2020future}, which is more effective than the sequential patterns learned by PeterRecal for these downstream tasks. However, for the same model, better pre-training models usually lead to better fine-tuning performance. Such results are simply omitted due to limited space. (2) By comparing results in Table~\ref{insertionmethod}, we observe that for parallel insertion, the MP has to be inserted before the normalization layer. We argue that the parallelly inserted MP in Figure~\ref{modelpatch} (e) may break up the addition operation in the original residual block architecture (see FIgure~\ref{modelpatch} (a)) since MP in (e) introduces two additional summation operations, including the sum in MP and sum with the ReLU layer. (3) In practice, it is usually very expensive to collect a large amount of user profile data, hence we present the results with limited training examples in Figure~\ref{convergewithlimiteddata}. As clearly shown, with limited training data, PeterRec performs better than FineAll, and more importantly, PeterRec is very stable during fine-tuning since only a fraction of parameters are learned. By contrast, FineAll has a severe overfitting issue, which cannot be solved by regularization or dropout techniques. \section{Conclusions} In this paper, we have shown that (1) it is possible to learn universal user representations by modeling only unsupervised user sequential behaviors; and (2) it is also possible to adapt the learned representations for a variety of downstream tasks. By introducing the grafting model patch, PeterRec allows all pre-trained parameters unchanged during fine-tuning, enabling efficent \& effective adaption to multiple domains with only a small set of re-learned parameters for a new task. We have evaluated several alternative designs of PeterRec, and made insightful observations by extensive ablation studies. By releasing both high-quality datasets and codes, we hope PeterRec serves as a benchmark for transfer learning in the recommender system domain. We believe PeteRec can be applied in more domains aside from tasks in this paper. For example, if we have the video watch behaviors of a teenager, we may know whether he has depression or propensity for violence by PeterRec without resorting to much feature engineering and human-labeled data. This can remind parents taking measures in advance to keep their children free from such issues. For future work, we may explore PeteRec with more tasks. \section*{Acknowledgement} This work is partly supported by the National Natural Science Foundation of China (61972372, U19A2079). \bibliographystyle{ACM-Reference-Format}
\section{Introduction} Two-layer shallow-water equations (SWE) are widely used to simulate geophysical flows in stratified conditions. Some examples of a two-layer configuration include exchange flows in sea straits \citep{castro2001q,castro2004numerical}, highly stratified estuaries \citep{krvavica2017numerical,krvavica2016salt}, as well as various types of gravity currents \citep{la2012two,adduce2011gravity}, such as mudflows \citep{canestrelli2012mass}, debris flows \citep{pelanti2008roe,majd2014lhllc}, submarine avalanches \citep{fernandez2008new,luca2009two,pitman2005two}, and pyroclastic flows \citep{doyle2011two}. Although such processes can be described more accurately by 3D Navier-Stokes equations, two-layer shallow water models make a popular alternative because of their simplicity and a significantly lower computational cost. Two-layer SWEs are mathematically defined as hyperbolic systems of coupled conservation laws with source terms, or so-called balance laws \citep{castro2001q}. These equations are challenging to solve numerically because of the layer coupling and non-conservative source terms accounting for the variable geometry, friction, or entrainment. Over the last two decades, a numerical resolution of two-layer SWE has been an object of intense research \citep{castro2001q,castro2004numerical,kurganov2009central,castro2010some,murillo2010exner,bouchut2010robust,fernandez2011intermediate,lee2011fast,canestrelli2012restoration,chiapolino2018models}. A popular choice for numerical resolution of two-layer SWEs are finite volume methods (FVM), and among them a family of path-conserving schemes \citep{toumi1992weak,bermudez1994upwind,castro2001q,pares2004well,pares2006numerical}. Implementation of the path-conservative schemes involves a numerical viscosity matrix, which is usually derived from some or all eigenvalues of a corresponding Jacobian of the flux matrix. The choice of the numerical viscosity matrix determines the numerical diffusion and accuracy of the scheme. Since analytical expressions for eigenvalues of two-layer SWE systems were considered unavailable until recently \cite{castro2004numerical,pelanti2008roe,abgrall2009two,fernandez2011intermediate,sarno2017some}, either approximate expressions \cite{schijf1953theoretical,abgrall2009two} or numerical algorithms were used instead. Unfortunately, numerical algorithms, such as root-finding and eigensolver methods, make schemes computationally (too) demanding. For example, several studies evaluating the efficiency of first-order schemes in solving two-layer flows \cite{castro2010some,castro2012class,fernandez2011intermediate}, find Roe schemes, which are based on all eigenvalues, to be the most accurate, but far less efficient then some other first-order schemes, mainly because of excessive computational costs when performing a full spectral decomposition by a numerical eigensolver. Recently, a new solution \cite{krvavica2018analytical} to the efficiency problem for the Roe scheme was proposed. This new approach introduced a semi-analytical implementation of the Roe scheme based on simple closed-form solutions for the eigenvalues and eigenvectors \cite{krvavica2018analytical}. New scheme, named A-Roe, was found to be much faster than the numerical implementation of the Roe scheme, while producing equally accurate results \cite{krvavica2018analytical}. An additional advantage is that closed-form solutions enable a direct and accurate prediction of complex eigenvalues and implementation of a corrective algorithm for the loss of hyperbolicity \cite{krvavica2018analytical}. Our previous paper \cite{krvavica2018analytical} evaluated the performance of the A-Roe scheme based on analytical expressions for eigenvalues and eigenvectors, and compared its efficiency to Lax-Friedrichs (LF) and GFORCE scheme, as well as the Polynomial Viscosity Matrix redefinition of the Roe scheme (PVM-Roe) \cite{castro2012class} and Intermediate Field CaPturing scheme (IFCP) \cite{fernandez2011intermediate}. The former two do not use any eigenvalue information, whereas the latter two use all four eigenvalues \cite{castro2010some,castro2012class, fernandez2011intermediate}. In the case of PVM-Roe and IFCP schemes, the classical implementation based on approximated eigenvalues was considered. Furthermore, our previous paper \cite{krvavica2018analytical} focused on overall advantages of using analytical eigenvalues; primarily, increased computational speed and hyperbolicity correction algorithm. The present study is a natural continuation of the previous paper \cite{krvavica2018analytical}. One evident question emerged from the main conclusions of the previous paper - if analytical expressions for the eigenstructure significantly improved the efficiency of the Roe scheme, what effect will they have on the performance of other first-order schemes that are also based on some or all eigenvalues? Clearly, the efficiency of those numerical schemes should be re-evaluated. The main aim of this study is to investigated the sensitivity of several other numerical schemes, namely PVM-2U \cite{castro2012class} and IFCP \cite{fernandez2011intermediate}, on the choice of eigenvalues and to evaluate potential benefits of using analytical eigenvalues instead of recommended approximated expressions. For this purpose, the accuracy and computational speed of recently proposed closed-form eigenvalue solutions are carefully compared against two available alternatives - the numerical eigensolvers and approximated expressions for eigenvalues. Next, the sensitivity of numerical schemes to the choice of an eigenvalue solver is assessed. And finally, the overall computational efficiency of Roe, IFCP, and PVM-2U schemes with different eigenvalues is evaluated by performing several numerical tests which consider different density differences between the layers and different channel geometries. Some significant remarks on the implementation of numerical schemes, which increase their efficiency, are also presented. \section{Two layer shallow-water flow: Theory, eigenvalues, and numerical schemes} \subsection{Governing system of equations} A one-dimensional (1D) two-layer shallow-water flow in prismatic channels with rectangular cross-sections of constant width is considered for all tests. The governing system of equations written in a general vector form is repeated here in a more compact form for context and reproducibility \citep{castro2001q}: \begin{equation} \pdt{\bb{w}} + \pdx{\bb{f}(\bb{w})} = \bb{B}(\bb{w})\pdx{\bb{w}} + \bb{g}(\bb{w}), \label{eq:consys1} \end{equation} where $x$ refers to the axis of the channel and $t$ is time. The vector of conserved quantities $\bb{w}$ is defined as: \begin{equation} \bb{w} = \begin{Bmatrix} h_{1} \quad q_{1} \quad h_{2} \quad q_{2} \end{Bmatrix}^T, \quad \end{equation} where $h_j$ is the layer thickness (or depth), $q_j=h_j u_j$ is the layer flow rate per unit width, and index $j=1,2$ denotes the respective upper and lower layer. The flux vector $\bb{f(w)}$ is: \begin{equation} \bb{f}(\bb{w}) = \begin{Bmatrix} q_{1} \quad \tfrac{q^{2}_{1}}{h_{1}} + \tfrac{g}{2}h^{2}_{1} \quad q_{2} \quad \tfrac{q^{2}_{2}}{h_{2}} + \tfrac{g}{2}h^{2}_{2} \end{Bmatrix}^T, \end{equation} where $g$ is acceleration of gravity. Matrix $\bb{B(w)}$ is a result of coupling the two-layer system, defined as \citep{castro2001q}: \begin{equation} \bb{B}(\bb{w}) = \begin{bmatrix} 0 & 0 & 0 & 0 \\ 0 & 0 & -c_1^2 & 0 \\ 0 & 0 & 0 & 0 \\ -rc_2^2 & 0 & 0 & 0 \end{bmatrix}, \end{equation} where $r=\rho_1/\rho_2 < 1$ is the ratio between the upper layer density $\rho_1$ and the lower layer density $\rho_2$, and $c_j^2=gh_j$ is propagation celerity of internal and external perturbations (waves), for $j=1,2$. Finally, the bathymetry source term $\bb{g(w)}$ is defined as follows \citep{castro2001q}: \begin{equation} \bb{g}(\bb{w}) = \begin{Bmatrix} 0 \quad -gh_1\frac{\textrm{d}b}{\textrm{d}x} \quad 0 \quad -gh_2\frac{\textrm{d}b}{\textrm{d}x} \end{Bmatrix}^T, \end{equation} where $b$ is the bed elevation. \subsection{Eigenvalues} The system given by Eq.~(\ref{eq:consys1}) can be rewritten in the following quasi-linear form \cite{castro2001q}: \begin{equation} \frac{\partial \mathbf{w}}{\partial t} + \boldsymbol{\mathcal{A}}(\mathbf{w})\frac{\partial \mathbf{w}}{\partial x} = \mathbf{g}(\mathbf{w}), \label{eq:consys2} \end{equation} where \begin{equation} \boldsymbol{\mathcal{A}(\mathbf{w}}) = \frac{\partial \mathbf{f(w)}}{\partial \mathbf{w}} - \mathbf{B}(\mathbf{w}) = \mathbf{J}(\mathbf{w}) - \mathbf{B}(\mathbf{w}) \label{eq:AJB} \end{equation} is the pseudo-Jacobian matrix that contains the flux gradient terms as well as the coupling terms: \begin{equation} \boldsymbol{\mathcal{A}(\mathbf{w})} = \begin{bmatrix} 0 & 1 & 0 & 0 \\ c_1^2 - u_1^2 & 2u_1 & c_1^2 & 0 \\ 0 & 0 & 0 & 1 \\ rc_2^2 & 0 & c_2^2 - u_2^2 & 2u_2. \end{bmatrix} \label{eq:A} \end{equation} The four eigenvalues of $\boldsymbol{\mathcal{A}(\mathbf{w})}$ define the propagation speeds of barotropic (external) and baroclinic (internal) perturbations. In most geophysical flows, one of two external eigenvalues is negative $\lambda_{ext}^{-} < 0$, while the other is positive $\lambda_{ext}^{+} > 0$ \cite{abgrall2009two}. Eigenvalues can be computed using numerical solvers, approximated expressions or analytical solutions. \subsubsection{Numerical eigenvalues} Eigenvalues and eigenvectors of $\boldsymbol{\mathcal{A}(\mathbf{w})}$ can be numerically obtained by solving the following equation: \begin{equation} \boldsymbol{\mathcal{A}} \bb{K} = \bb{K} \boldsymbol{\Lambda}. \label{eq:eigendecomposition} \end{equation} where $ \boldsymbol{\Lambda}$ is a $4\times 4$ diagonal matrix whose coefficient are the eigenvalues $\lambda_k, k=1,..,4$, and $\bb{K}$ is matrix whose columns are the corresponding right eigenvectors. Usually a QR algorithm is used for this purpose \cite{lapack}. \subsubsection{Approximated eigenvalues} The following approximation derived under the assumption of $r\approx 1$ and $u_1\approx u_2$ are usually used for computing the internal and external eigenvalues \citep{schijf1953theoretical}: \begin{equation} \lambda_{ext}^{\pm} = U_1 \pm \sqrt{g(h_1+h_2)} \label{eq:eig_ext} \end{equation} \begin{equation} \lambda_{int}^{\pm} = U_2 \pm \sqrt{g(1-r) \frac{h_1 h_2}{h_1 + h_2} \left[ 1 - \frac{(u_1 - u_2)^2}{g(1-r)(h_1 + h_2)}\right]}, \label{eq:eig_int} \end{equation} with \begin{equation} U_1 = \frac{h_1 u_1 + h_2 u_2}{h_1 + h_2} \quad \textrm{and} \quad U_2 = \frac{h_1 u_2 + h_2 u_1}{h_1 + h_2}. \end{equation} Note that Eqs.~(\ref{eq:eig_ext}) and (\ref{eq:eig_int}) are valid only when dealing with two layers of similar densities ($r = \rho_1/\rho_2 \approx 1$) and when velocities in both layers are comparable ($u_1\approx u_2$). Those conditions are found in some stratified flows in nature, such as exchange flows through sea straits \citep{castro2004numerical,chakir2009roe} or some cases of highly stratified estuaries \cite{krvavica2016salt}. However, for geophysical flows characterized by a larger relative density difference, such as granular, debris or mud flows, the approximated values may significantly deviate from exact values and cannot accurately predict a possible hyperbolicity loss \cite{abgrall2009two,sarno2017some,krvavica2018analytical}. \subsubsection{Analytical eigenvalues} Recently, a simple closed-form approach for computing real roots of the characteristic quartic Eq.~(\ref{eq:polynomial}) was proposed \cite{krvavica2018analytical}. The solutions are based on Ferrari's formulas \citep{abramowitz1972}, they consist of eight simple evaluations, and are repeated here for consistency and clarity. A detailed derivation of these equations is available in \cite{krvavica2018analytical}. The proposed closed-form solutions to eigenvalues are given in terms of coefficients $a, b, c$ and $d$ of a characteristic polynomial of matrix $\boldsymbol{\mathcal{A}(\mathbf{w})}$ \cite{krvavica2018analytical}: \begin{equation} p(\lambda) = \lambda^4 + a\lambda^3 + b\lambda^2 + c\lambda + d \label{eq:polynomial} \end{equation} with: \begin{equation} a = -2 \left( u_1 + u_2 \right), \\ \label{eq:a} \end{equation} \begin{equation} b = u_1^2 - c_1^2 + 4u_1u_2 + u_2^2 - c_2^2, \label{eq:b} \end{equation} \begin{equation} c = - 2u_2 \left(u_1^2 - c_1^2 \right) - 2u_1 \left( u_2^2 - c_2^2 \right) , \label{eq:c} \end{equation} \begin{equation} d = \left( u_1^2 - c_1^2 \right) \left( u_2^2 - c_2^2 \right) - rc_1^2c_2^2 . \label{eq:d} \end{equation} Real eigenvalues are then computed by the following expressions \cite{krvavica2018analytical}: \begin{equation} \lambda_{ext}^{\pm} = \lambda_{4,1} = - \frac{a}{4} \pm \frac{ \sqrt{Z} + \sqrt{- A - Z \mp \frac{B}{\sqrt{Z}} } }{2} , \label{eq:solution1} \end{equation} \begin{equation} \lambda_{int}^{\pm} = \lambda_{3,2} = - \frac{a}{4} \pm \frac{ \sqrt{Z} - \sqrt{- A - Z \mp \frac{B}{\sqrt{Z}} } }{2} . \label{eq:solution2} \end{equation} where \begin{equation} Z = \frac{1}{3} \left( 2 \sqrt{\Delta_0} \cos \frac{\phi}{3} - A \right), \label{eq:Zcoeff} \end{equation} \begin{equation} \phi = \arccos \left( \frac{\Delta_1}{2 \Delta_0 \sqrt{\Delta_0}}\right), \label{eq:S_cubic} \end{equation} with \begin{equation} A = 2b - \frac{3a^2}{4}, \label{eq:Acoeff} \end{equation} \begin{equation} B = 2c - ab + \frac{a^3}{4} . \label{eq:Bcoeff} \end{equation} and \begin{equation} \Delta_0 = b^2 + 12d - 3ac, \label{eq:D0} \end{equation} \begin{equation} \Delta_1 = 27a^2d - 9abc + 2b^3 - 72bd + 27c^2. \label{eq:D1} \end{equation} Note, that it is possible to combine these equations into a single explicit solution in terms of conserved variables, but the resulting formula would certainly be too extensive to be presented in a journal format, and probably not optimized to be implemented in a computational algorithm. However, an example of such expanded formulation is available \cite{wikipedia}. \subsubsection{Nature of eigenvalues} Since the relative density difference $r$ has a major influence on internal eigenvalues, they are usually smaller than the external ones. Therefore, the following indexing and order of eigenvalues will be used herein: \begin{equation} \lambda_1 = \lambda_{ext}^{-}, \quad \lambda_2 = \lambda_{int}^{-}, \quad \lambda_3 = \lambda_{int}^{+}, \quad \lambda_4 = \lambda_{ext}^{+} \end{equation} It is worth mentioning that the external eigenvalues $\lambda_{ext}^{\pm}$ are always real \cite{ovsyannikov1979two,abgrall2009two}; however, at sufficiently large relative velocities $\Delta u = \lvert u_1 - u_2 \rvert$, as well as for very low or very high relative densities $r$, the internal eigenvalues $\lambda_{int}^{\pm}$ may become complex and the governing system loses its hyperbolic character \cite{ovsyannikov1979two,castro2011numerical}. Although analytical expressions given by Eqs. (\ref{eq:solution1}) and (\ref{eq:solution2}) are valid only for real roots, a simple hyperbolicity correction algorithm can be incorporated, which verifies whether the term in Eq.~(\ref{eq:S_cubic}) satisfies the condition $\abs{\frac{\Delta_1}{2 \Delta_0 \sqrt{\Delta_0}}} < 1$, and if not, iteratively corrects the velocities until a hyperbolic state is recovered. This algorithm is not a subject of the current study, but its description and details are available in \cite{krvavica2018analytical}. \subsection{Numerical schemes} A class of path-conservative schemes are considered here to approximate the governing equations for two-layer shallow water flow \citep{pares2006numerical}. A first order accurate path-conservative scheme for Eq.~(\ref{eq:consys2}) may be written as follows \citep{pares2006numerical}: \begin{equation} \bb{w}_i^{n+1} = \bb{w}_i^n - \frac{\Delta t}{\Delta x} \left(\bb{D}_{i-1/2}^{+} + \bb{D}_{i+1/2}^{-} \right) \label{eq:pathcons} \end{equation} where $\Delta x$ and $\Delta t$ are the respective spatial and time increment (considered constant here for simplicity), $\bb{w}_i^n$ denotes the approximate cell-averaged values of the exact solution obtained by the numerical scheme at cell $I_i = [x_{i-1/2}, x_{i+1/2}]$ in time $t^n = n\Delta t$, and matrices $\bb{D}_{i+1/2}^{\pm}$ are continuous functions of conserved variables $\bb{D}^{\pm} \left( \bb{w}_i^n, \bb{w}_{i+1}^n \right)$. For the governing system of equations, a generalized numerical scheme based on Roe linearisation \cite{toumi1992weak} may be written by Eq.~(\ref{eq:pathcons}), with: \begin{equation} \begin{aligned} \bb{D}_{i+1/2}^{\pm} =& \dfrac{1}{2} \Big[ \bb{f}(\bb{w}_{i+1}^n) - \bb{f}(\bb{w}_i^n) + \bb{B}_{i+1/2}(\bb{w}_{i+1}^n - \bb{w}_i^n) - \bb{g}_{i+1/2} \\ & \pm \bb{Q}_{i+1/2} \left( \bb{w}_{i+1}^n - \bb{w}_i^n - \bs{\mathcal{A}}_{i+1/2}^{-1} \bb{g}_{i+1/2}\right) \Big] \end{aligned} \label{eq:any_scheme} \end{equation} where $\boldsymbol{Q}_{i+1/2}$ is a numerical viscosity matrix that determines the numerical diffusivity of the results, and whose choice depends on a particular scheme \cite{fernandez2011intermediate}. Matrices and vectors $\bb{B}_{i+1/2}$, $\bb{A}_{i+1/2}$, and $\bb{g}_{i+1/2}$ correspond to $\bb{B}(\bb{w}_{i+1}^n, \bb{w}_i^n)$, $\bb{A}(\bb{w}_{i+1}^n, \bb{w}_i^n)$, and $\bb{g}(\bb{w}_{i+1}^n, \bb{w}_i^n)$, respectively, evaluated at the cell interface after a suitable Roe linearization is performed (see \cite{castro2001q} and \cite{krvavica2018analytical} for details). The viscosity matrix in Roe schemes coincides with the absolute pseudo-Jacobian matrix \citep{castro2001q}: \begin{equation} \boldsymbol{Q}_{i+1/2} = \lvert \boldsymbol{\mathcal{A}}_{i+1/2} \rvert \label{eq:Q_Roe} \end{equation} and the absolute value of $\boldsymbol{\mathcal{A}}_{i+1/2}$ can be directly obtained from: \begin{equation} \lvert \boldsymbol{\mathcal{A}}_{i+1/2} \rvert = \bb{K}_{i+1/2} \lvert \boldsymbol{\Lambda}_{i+1/2} \rvert \bb{K}_{i+1/2}^{-1}. \label{eq:A_abs} \end{equation} where $\lvert \boldsymbol{\Lambda}_{i+1/2} \rvert$ is a $4\times 4$ diagonal matrix whose coefficient are the absolute eigenvalues $\lvert \lambda_k \rvert, k=1,..,4$. When analytical eigenvalues are unavailable, Roe schemes require either approximation of eigenvalues and corresponding eigenvectors or a numerical decomposition to obtain the eigenstructure of matrix $\boldsymbol{\mathcal{A}}_{i+1/2}$. The latter is computational expensive, while the former is less accurate. In both cases, an additional re-composition of the viscosity matrix from eigenstructure is required (see Eq.~(\ref{eq:A_abs})), which imposes an additional computational cost. This drawback has motivated a development of numerical schemes in which the viscosity matrix $\boldsymbol{Q}_{i+1/2} $ is directly approximated from pseudo-Jacobian matrix. One possible way to construct such a scheme is to approximate the viscosity matrix by a polynomial function. Those class of methods are called Polynomial Viscosity Matrix (PVM) \cite{castro2012class}. PVM methods define the viscosity matrix through a general polynomial evaluation of the pseudo-Jacobian matrix, given by: \begin{equation} \boldsymbol{Q}_{i+1/2} = p_l \left( \mathcal{A}_{i+1/2} \right) \end{equation} where $p_l(x)$ is a polynomial of degree $l$ \begin{equation} p_l(x) = \sum_{j=0}^{l} \alpha_j x^j \end{equation} The main advantage of PVM schemes is that a full spectral decomposition is not required. In \cite{castro2012class} several different PVM schemes were presented and tested, some of them were derived from other popular Riemann solvers redefined under the PVM formulation, and some of them were newly proposed. In our previous paper \cite{krvavica2018analytical} we chose a PVM redefinition of the Roe scheme (PVM-Roe) that is based on all four eigenvalues, and here we choose a scheme called PVM-2U that is based only on two external eigenvalues. In \cite{castro2012class}, PVM-2U proved to be the most efficient throughout their numerical tests and is, therefore, selected here for further analysis and comparison regarding the effects of the eigenvalue solvers. The viscosity matrix of PVM-2U may be computed as \cite{castro2012class}: \begin{equation} \boldsymbol{Q}_{i+1/2} = \alpha_0 \bb{Id} + \alpha_1 \boldsymbol{\mathcal{A}}_{i+1/2} + \alpha_2 \boldsymbol{\mathcal{A}}_{i+1/2}^2, \label{eq:PVM2_Q} \end{equation} where coefficients $\alpha_k$, $k=0,1,2$ are derived from two external eigenvalues (for more details see \cite{castro2012class}). A similar scheme called Intermediate Field Capturing Parabola (IFCP) \cite{fernandez2011intermediate} was also derived from the family of PVM schemes. In contrast to PVM-2U, the IFCP scheme uses both internal and external eigenvalue information, and should be more accurate than PVM-2U with a minor increase in the computational cost. The IFCP scheme is also defined by Eq.~(\ref{eq:PVM2_Q}), where $\alpha_k$, $k=0,1,2$ are derived from two external and one internal eigenvalues (for more details see \cite{fernandez2011intermediate}). It should be emphasized that all three schemes considered in this study (Roe, PVM-2U, IFCP) are well balanced for water at rest solutions and linearly stable under the CFL condition \cite{castro2001q,castro2012class}: \begin{equation} \frac{\Delta t}{\Delta x} \max \abs{\lambda_{j,i+1/2}} = \gamma \leq 1 \end{equation} Regardless of a particular scheme, the eigenvalues may be computed either by a numerical decomposition, analytical (closed-form) or approximated expressions. In most published studies \cite{fernandez2011intermediate,castro2012class}, approximated expressions are recommended for both schemes from the PVM family when dealing with two-layer SWEs, as a more efficient choice in comparison to numerical eigensolvers. This study examines the benefits of using the analytical solutions instead. \subsection{Remarks about the implementation of the schemes} \label{sec:remarks} There are some modifications of numerical schemes that can be made to optimize the algorithms and improve their computational performance. The first optimization deals with the Roe scheme and re-composition of the viscosity matrix given by Eq.~(\ref{eq:A_abs}). Although analytical closed-form solutions to $\bb{K}^{-1}$ are available in the Appendix of \cite{krvavica2018analytical}, it is computationally faster to rewrite Eq.~(\ref{eq:A_abs}) as \begin{equation} \bb{K}_{i+1/2}^T \abs{\bs{\mathcal{A}}_{i+1/2}}^T = (\bb{K}_{i+1/2} \vert \boldsymbol{\Lambda}_{i+1/2} \vert)^T , \label{eq:Aabs_T} \end{equation} which corresponds to a general matrix equation $\bb{Ax}=\bb{B}$, solve it numerically for $ \abs{\bs{\mathcal{A}}_{i+1/2}}^T$ (for example, by a LAPACK routine \textit{gesv} \citep{lapack}), and then transpose it. This is about 2-3 times faster than finding the inverse of $\bb{K}_{i+1/2}$ and performing matrix multiplication to obtain the viscosity matrix as written in Eq.~(\ref{eq:A_abs}). A second optimization is available for the family of PVM schemes. Using Eq.~(\ref{eq:AJB}) and the usual Roe linearization of the pseudo-Jacobian matrix: \begin{equation} \bb{J}(\bb{w}_{i+1}, \bb{w}_i) \cdot \left(\bb{w}_{i+1} - \bb{w}_i\right) = \bb{f}(\bb{w}_{i+1}) - \bb{f}(\bb{w}_{i}) \end{equation} term $\bb{Q}_{i+1/2} \left( \bb{w}_{i+1}^n - \bb{w}_i^n \right)$ given in Eq.~(\ref{eq:any_scheme}) may be replaced by: \begin{equation} \bb{C}_{i+1/2} \left[ \bb{f}(\bb{w}_{i+1}^n) - \bb{f}(\bb{w}_i^n) - \bb{B}_{i+1/2}(\bb{w}_{i+1}^n - \bb{w}_i^n) \right] \\ \label{eq:optimal_scheme} \end{equation} where $\bb{C}_{i+1/2} = \bb{Q}_{i+1/2} \bs{\mathcal{A}}_{i+1/2}^{-1}$ lowers the order of a viscosity matrix by one, and is already needed for the source term discretization. In other words, full viscosity matrix $\bb{Q}_{i+1/2}$ is not required for the family of PVM schemes; instead, only $\bb{C}_{i+1/2}$ is computed. For both PVM-2U and IFCP, $\bb{C}_{i+1/2}$ is defined as: \begin{equation} \bb{C}_{i+1/2} = \alpha_0 \bs{\mathcal{A}}_{i+1/2}^{-1} + \alpha_1 \bb{Id} + \alpha_2 \boldsymbol{\mathcal{A}}_{i+1/2}, \label{eq:PVM2_C} \end{equation} In this way, computation of the square of $\bs{\mathcal{A}}_{i+1/2}$ (see Eq.~(\ref{eq:PVM2_Q})) is avoided. \section{Results} Several numerical tests are presented to evaluate the efficiency of Roe, IFCP, and PVM-2U schemes with different eigenvalue solvers. First, the accuracy and computational speed of numerical, analytical and approximated eigenvalue solvers is analysed. Next, the performance of numerical schemes in computing the numerical viscosity matrix is examined, as well as their sensitivity to the choice of eigenvalues. Finally, five numerical tests are given to analyse the overall efficiency of different numerical schemes in computing two-layer shallow-water flows. In particular, three eigensolver algorithms are examined: \begin{itemize} \item N-Eig uses a numerical eigenvalue solver which decomposes a general square matrix into a diagonal matrix $\bs{\Lambda}$ whose elements are eigenvalues, and matrix $\bb{K}$ whose columns are right eigenvectors. This algorithm is implemented in Python using Numpy function \texttt{numpy.linalg.eig} which is based on the \texttt{geev} LAPACK routines written in FORTRAN \cite{lapack}. \item A-Eig is an analytical eigenvalue solver based on a closed-form solution to the roots of the characteristic quartic given by Eqs.~(\ref{eq:solution1}) and (\ref{eq:solution2}) \item E-Eig only estimates eigenvalues based on the approximations given by Eqs.~(\ref{eq:eig_ext}) and (\ref{eq:eig_int}) \end{itemize} By combining different eigensolvers with Roe, IFCP, and PVM-2U schemes, the following numerical algorithms for computing the viscosity matrix and solving two-layer SWEs are chosen for the efficiency analysis: N-Roe, A-Roe, E-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 schemes. The accuracy of algorithms and schemes are evaluated by using either absolute error AE, relative bias error RBE, or root relative square error RRSE, defined respectively as: \begin{equation} AE_{\Phi} = \lvert \Phi - \Phi^{ref} \rvert \label{eq:AE} \end{equation} \begin{equation} RBE_{\Phi} = \frac{\Phi - \Phi^{ref}}{\Phi^{ref}} \label{eq:BE} \end{equation} \begin{equation} RRSE_{\Phi} = \frac{\sqrt{\sum_{n=1}^{M} \left[ \Phi(x_n, t_{end}) - \Phi^{ref}(x_n, t_{end}) \right]^2}}{\sqrt{\sum_{n=1}^{M} \Phi^{ref}(x_n, t_{end})^2}}, \label{eq:RRSE} \end{equation} where $\Phi$ is the evaluated parameter (e.g. eigenvalue $\lambda$, numerical flux $f$, depth $h$ or velocity $u$), $\Phi^{ref}$ are the corresponding reference values, and $M$ is a number of spatial points. All numerical algorithms have been implemented in Python 3.6 and vectorized using the Numpy package. The tests have been performed on 64-bit Windows 10 machine with Intel Core i7-3770 3.4 GHz processor. All algorithms for computing the eigenstructure and viscosity matrix are freely available on Github \cite{krvavica2019github}. \subsection{Computing eigenvalues: Accuracy and computational speed} This test examines the accuracy and computational speed (CPU time) of corresponding three different algorithms for computing eigenvalues N-Eig, A-Eig, and E-Eig. Although eigenvalues computed by the numerical eigensolver are not \textit{exact}, their errors are of the order of round-off errors. Therefore, the numerical results are used as a reference when evaluating the accuracy of analytical and approximated eigenvalues. Since the main idea is to evaluate algorithms for solving eigenvalues as a integral part of Roe, IFCP and PVM-2U schemes for two-layer SWEs, physically realistic flow parameters (which always produce real eigenvalues) are chosen for this test. Therefore, a large set of parameters ($N=10^6$) is randomly generated from a given range: $ 1.0 < h_{1,2} < 2.0$ m and $ -0.3 < u_{1,2} < 0.3$ m s$^{-1}$. Different density ratios are selected, namely $r = 0.98, 0.9, 0.7, 0.5,$ and $0.3$, with $g$ set to $9.8$ m s$^{-2}$. Fig.~\ref{fig:eig_errors} illustrates the statistical representation of the absolute errors of A-Eig and E-Eig algorithms computed by Eq.~(\ref{eq:AE}) for one million sets of independent flow parameters. The average error of the analytic solver is around $10^{-15}$ and the maximum errors are below $10^{-14}$ which is close to a round-off error of the numerical eigensolver. In other words, both these solvers produce almost identical results. The average errors of the approximated expressions are more noticeable, and they increase with density difference. For $r=0.98$, average errors are around $10^{-3}$, whereas for $r=0.3$, average errors are larger than $10^{-1}$. This is expected, since eigenvalue approximations are derived under the assumption of $r\approx1$ and $u_1 \approx u_2$, and become less accurate as parameters deviate from these assumptions. To examine the lack of accuracy of the eigenvalues approximations, Fig.~\ref{fig:eig_bias} illustrates the relative bias errors of individual eigenvalues for small $r$. It seems that the eigenvalue approximations always overestimate external eigenvalues, and underestimate the internal ones. Contrary to approximated expressions given by Eq.~\ref{eq:eig_ext} that suggest how $r$ only affects the internal eigenvalues, it is clear from this analysis that $r$ equally affects external and internal eigenvalues. \begin{figure}[htbp] \center \includegraphics[width=6cm]{Analytic_eigen_error} \hfill \includegraphics[width=6cm]{Approx_eigen_error} \caption{Boxplot of the absolute errors when computing eigenvalues by: A) the analytical closed-form solutions (A-Eig) and B) eigenvalue approximations (E-Eig). Boxes denote the interquartile range and median value, while whiskers denote min and max values.} \label{fig:eig_errors} \end{figure} \begin{figure}[htbp] \center \includegraphics[width=6cm]{Approx_eigen_error_5} \hfill \includegraphics[width=6cm]{Approx_eigen_error_3} \caption{Boxplot of the relative bias errors when using approximated eigenvalues E-Eig for: A) $r=0.5$ and B) $r=0.3$. Boxes denote the interquartile range and median value, while whiskers denote min and max values.} \label{fig:eig_bias} \end{figure} Table~\ref{tab:eig_cpu} shows the computational speed of three eigenvalue algorithms. The fastest algorithm is the E-Eig (based on approximated eigenvalues) that needed 0.11 s, followed by the analytical solver A-Eig with 0.29 s, and finally the numerical solver N-Eig with 4.14 s. Notice that both approximated and closed-form eigenvalue solvers are one order of magnitude faster than the numerical solver. These results are in agreement with \cite{krvavica2018analytical} and suggest that the prevailing opinion in the scientific community about the "computational complexity" of the analytical solver is not justified. Although A-Eig needs double the time of E-Eig, it is considerably more accurate, as shown in Fig.~\ref{fig:eig_errors}. \begin{table}[htbp] \small \centering \caption{CPU times when computing one million sets of eigenvalues by numerical N-Eig, analytical A-Eig, and approximated E-Eig eigenvalue solvers (best of 5 runs).} \begin{tabular}{clll} \hline Eigensolver & N-Eig & A-Eig & E-Eig \\ \hline CPU time (ms) & 4136.5 & 286.8 & 109.7 \\ \hline \end{tabular}% \label{tab:eig_cpu}% \end{table}% \subsection{Computing numerical viscosity matrix: Accuracy and computational speed} The next test examines the accuracy and the computational speed of different implementations of Roe, IFCP, and PVM-2U schemes. The implementation differs in the choice of a particular eigenvalue algorithm, presented in the previous subsection. The main goal is to investigate how do eigenvalue algorithms affect the efficiency of Roe, IFCP, and PVM-2U schemes when computing the corresponding numerical viscosity matrix, and to analyse their sensitivity to a particular choice of the eigenvalue solver. Same as in the previous example, physically realistic flow parameters are chosen. One million sets of parameters are randomly generated from a given range: $ 1.0 < h_{1,2} < 2.0$ m and $ -0.3 < u_{1,2} < 0.3$ m s$^{-1}$. Different density ratios are selected, namely $r = 0.98, 0.9, 0.7, 0.5,$ and $0.3$, with $g$ set to $9.8$ m s$^{-2}$. Note that Roe schemes compute $\bb{Q}$, whereas IFCP and PVM-2U schemes compute only $\bb{C}$, which is additionally multiplied by $\bb{A}$ for comparison. The errors are estimated by a relative bias error given by Eq.~(\ref{eq:BE}), with N-Roe being the reference value. Fig.~\ref{fig:f_errors} illustrates the statistical representation of relative bias errors for one million sets of independent flow parameters. Results obtained by A-Roe (Fig.~\ref{fig:f_errors}a) and E-Roe (Fig.~\ref{fig:f_errors}b) schemes correspond to the accuracy of the eigenvalue solvers they use. The average error of the A-Roe method is of the order $10^{-15}$ and the maximum errors are always below $10^{-14}$. On the other hand, the average errors of the E-Roe scheme are much higher and increase with density difference. They amount to $10^{-2}$ for $r=0.98$ and just under $1.0$ for $r=0.3$. Note that both positive and negative errors are observed, although in the case of E-Roe the positive errors (overestimation of the viscosity matrix) are more dominant. \begin{figure}[htbp] \center \includegraphics[width=6cm]{ARoe_flux_error} \hfill \includegraphics[width=6cm]{ERoe_flux_error} \vfill \includegraphics[width=6cm]{AIFCP_flux_error} \hfill \includegraphics[width=6cm]{EIFCP_flux_error} \vfill \includegraphics[width=6cm]{APVM2_flux_error} \hfill \includegraphics[width=6cm]{EPVM2_flux_error} \caption{Boxplot of relative bias errors in computing one million numerical viscosity matrices by: a) A-Roe, b) E-Roe, c) A-IFCP, d) E-IFCP, e) A-PVM2, f) E-PVM2. Boxes denote the interquartile range and median value, while whiskers denote min and max values.} \label{fig:f_errors} \end{figure} The errors of IFCP and PVM-2U schemes are much higher than the A-Roe method, and comparable to E-Roe scheme. Between the two, PVM-2U (Fig.~\ref{fig:f_errors}e,f) is one order of magnitude less accurate than the IFCP scheme (Fig.~\ref{fig:f_errors}c,d). This emphasizes the importance of using both external and internal eigenvalue information. For A-IFCP schemes relative error is always under $10^{-2}$, whereas for E-IFCP the relative error grows with decreasing $r$. It is interesting to note that E-IFCP, in contrast to E-Roe, underestimates the viscosity matrix. In PVM-2U scheme, the differences between the analytical and approximated eigenvalues are negligible, although the errors generated by approximated eigenvalues are somewhat higher for smaller values of $r$. It is interesting to note that the errors for $r<0.7$ are lower in IFCP and PVM-2U schemes (Fig.~\ref{fig:f_errors}d,f) than in the E-Roe scheme (Fig.~\ref{fig:f_errors}b). This is surprising, considering that they both use the same approximated eigenvalue solver, but the Roe scheme uses all eigenvalues, in contrast to IFCP which uses external and one internal eigenavalues, and PVM-2U which only uses minimum and maximum eigenvalues. It seems that the error produced by the E-Eig is somehow compensated by an approximation of the viscosity matrix in PVM-2U schemes. Considering the errors they produce, Roe schemes are very sensitive to the choice of eigenvalues, IFCP schemes are to some degree affected by the eigenvalues, whereas PVM-2U schemes are nearly unaffected by this choice. The computational time of the schemes are shown in Tab.~\ref{tab:f_erros}. As expected, the slowest scheme is N-Roe due to numerical eigen-decomposition. E-PVM2 and E-IFCP schemes are equally the fastest, followed by A-IFCP and A-PVM2. E-Roe and A-Roe are about 4-5 times faster than N-Roe, and about 35\% slower than corresponding IFCP and PVM-2U schemes. When schemes based on A-Eig are computed, they are 0.14 - 0.19 s slower in comparison to the same schemes with E-Eig, which corresponds to the overhead due to analytical eigenstructure solver. Note that the computation of eigenvectors takes as much or even more time than the computation of eigenvalues. This is important because PVM-2U schemes do not require computation of eigenvectors, only eigenvalues. The overall overhead from computing the analytical eigenvalues in comparison to approximated ones is only 8-13\%, depending on the scheme. For N-Roe scheme, the eigendecomposition comprises over 80\% of the total CPU time, whereas for A-Roe and E-Roe schemes, the computation of eigenvalues and eigenvectors comprises only 20-26\% of the total CPU time. On the other hand, for IFCP and PVM-2U schemes, computation of approximated eigenvalues comprises about 8\% of CPU time, and computational of closed-form eigenvalues about 18\%. Therefore, the majority of time is used for computing viscosity matrices and not eigenvalues. \begin{table}[htbp] \small \centering \caption{Total CPU time (including time required only for eigenvalues $\bs{\Lambda}$ and eigenvectors $\bb{K}$) when computing one million numerical viscosity matrices by N-Roe, A-Roe, E-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2. (best of 5 runs)} \begin{tabular}{clllllll} \hline Scheme & N-Roe & A-Roe & E-Roe & A-IFCP & E-IFCP & A-PVM2 & E-PVM2 \\ \hline $\bs{\Lambda}$ (s) & 4.13 & 0.29 & 0.11 & 0.29 & 0.11 & 0.29 & 0.11 \\ $\bb{K}$ (s) & 3.38 & 0.28 & 0.27 & - & - & - & - \\ Total (s) & 9.50 & 2.11 & 1.93 & 1.58 & 1.41 & 1.57 & 1.38 \\ \hline \end{tabular}% \label{tab:f_erros}% \end{table}% \subsection{Numerical test I: Steady flow over smooth non-flat bed with zero flow rate} Since all considered schemes (N-Roe, A-Roe, E-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2) are theoretically stable only for exact eigenvalues \cite{castro2001q,fernandez2011intermediate}, the well-balance properties of these schemes with differently computed eigenvalues should be verified in practice. The first numerical test is designed to test the well-balanced properties of the schemes when simulating water at rest in a channel with smooth non-flat bed. To do so, the spatial domain is set to [0, 1], and a bed function is defined by a single bump: \begin{equation} b(x) = \begin{cases} \dfrac{\cos \left( \pi (x-0.5) / 0.1 \right) + 1}{4} \textrm{ m}, \quad \textrm{if } 0.4 < x < 0.6 \textrm{ m} \\ 0.0 \textrm{ m}, \quad \textrm{otherwise} \end{cases} \end{equation} The initial condition is given by: \begin{equation} h_1(x,0) = 0.4 \textrm{ m}, \quad h_2(x,0) = 0.6 \textrm{ m} - b(x) \end{equation} \begin{equation} u_1(x,0) = u_2(x,0) = 0 \textrm{ m s}^{-1} \end{equation} Non-reflective conditions are imposed at the boundaries, and the relative density ratio is set to $r=0.98$. A single grid density of $\Delta x$ = 1/100 m and a fixed time step $\Delta t=0.002$ s is chosen. Figure \ref{fig:Results_Test00} shows the interface profile and the lower layer velocities obtained by N-Roe, A-Roe, E-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 numerical schemes at $t=0.1$ s with $\Delta x = 1/100$ m. All schemes satisfy the well-balance properties for water at rest (the velocities are close to the order of computational precision), except E-Roe, where noticeable spurious oscillations appear at $0.4<x<0.6$ m. Similar results were obtained for other choices of $r$ and $\Delta x$. Clearly, these oscillations appear because of eigenvalue approximations, and therefore the E-Roe scheme is excluded from further tests. IFCP and PVM-2U schemes, however, are not prone to spurious oscillations, even when eigenvalues are approximated. Original studies that proposed these methods \cite{fernandez2011intermediate,castro2012class} do not provide any theoretical proof of the stability of IFCP and PVM-2U schemes for approximated eigenvalues, but they do confirm that no stability issues were observed in their extensive tests. \begin{figure}[htbp] \center \includegraphics[width=6cm]{Fig_Well_balance_test_zoom1} \hfill \includegraphics[width=6cm]{Fig_Well_balance_test_zoom2} \caption{Test I: Computed interface and lower layer velocity obtained by N-Roe, A-Roe, E-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 scheme at $t=0.1$ s with $\Delta x = 1/100$ m} \label{fig:Results_Test00} \end{figure} \subsection{Numerical test II: Internal collision of two dam breaks with $r$=0.98} This test investigates the performance of numerical schemes when simulating a two-layer flow through a rectangular channel with a flat bottom topography. The flow structure is defined by two internal dam-breaks which eventually collide and produce a superimposed wave. A small density difference between the layers is considered, namely $r=0.98$. The spatial domain is set to [0, 100], and the initial condition is given by: \begin{equation} h_1(x,0) = \begin{cases} 0.8 \textrm{ m}, \quad \textrm{if } 40 < x < 60 \textrm{ m} \\ 0.2 \textrm{ m}, \quad \textrm{otherwise} \end{cases} \quad h_2(x,0) = 1.0 m - h_1(x, 0) \end{equation} \begin{equation} u_1(x,0) = u_2(x,0) = 0 \textrm{ m s}^{-1} \end{equation} Non-reflective conditions are imposed at the boundaries. Several mesh sizes are considered, namely $\Delta x$ = 1, 1/2, 1/4, and 1/8 m. A variable time step $\Delta t$ is evaluated at each step to satisfy $CFL = 0.9$. The reference solution is computed using the A-Roe scheme and a dense grid with $\Delta x$ = 1/16 m. Figure \ref{fig:Results_Test3} shows the temporal evolution of the interface and free-surface profiles for the reference solution. Solutions obtained by other methods are not illustrated, because they are almost undistinguishable at this scale. Therefore, a detail of solutions for the interface depth and lower layer velocity are shown in Fig.~\ref{fig:Details_Test3} where N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 numerical schemes are compared against the reference solution at $t=25$ s with $\Delta x = 1/2$ m. The results indicate that Roe and IFCP schemes are equally accurate, whereas PVM-2U schemes produce noticeably more diffused results. The implementation of the eigenvalue solver has no apparent influence on the accuracy of the results. This is expected, since approximated eigenvalues exhibit negligible errors for $r=0.98$. \begin{figure}[htbp] \center \includegraphics[width=12cm]{Fig_Test01_r098_solutions} \caption{Test II: Temporal evolution of the interface and surface profile (the reference solution)} \label{fig:Results_Test3} \end{figure} \begin{figure}[htbp] \center \includegraphics[width=6cm]{Fig_Test01_r098_zoom1} \hfill \includegraphics[width=6cm]{Fig_Test01_r098_zoom2} \caption{Test II: A detail of the interface depth and lower layer velocity obtained by N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 scheme, compared to the reference solution at $t=25$ s with $\Delta x = 0.5$ m} \label{fig:Details_Test3} \end{figure} A CPU time vs. relative root square error $E_{\Phi}$ is presented in Fig. \ref{fig:Efficiency_Test3}. The results suggest that the E-IFCP is the most efficient scheme, closely followed by A-IFCP and then A-Roe. In this test, the A-PVM2 and E-PVM2 are the least efficient schemes, even less than N-Roe. For all schemes, the differences in accuracy between the analytical and approximated eigenvalue solvers are insignificant. Approximated eigenvalues produce almost equal results as analytical ones, but need slightly less computational time. This can be explained by satisfactory accuracy of approximated eigenvalues for $r$ values close to one. \begin{figure}[htbp] \center \includegraphics[width=6cm]{Fig_Test01_r098_Err_h} \hfill \includegraphics[width=6cm]{Fig_Test01_r098_Err_u} \caption{Test II: CPU time vs error for N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 scheme, compared to the reference solution} \label{fig:Efficiency_Test3} \end{figure} \subsection{Numerical test III: Internal dam break over a sill with $r$=0.98} This test considers an internal dam-break over uneven bottom, which results in a transition from subcritical to supercritical flow. A small density difference between the layers is considered, namely $r=0.98$. The spatial domain is set to [0, 10], and the bottom topography is defined by a 0.5 m high sill located in the center of the channel, given by the function: \begin{equation} b(x) = 0.5 \exp \left( - (x-5)^2 \right). \end{equation} The initial condition is given by: \begin{equation} h_1(x,0) = \begin{cases} 0.2 \textrm{ m}, \quad \textrm{if } x < 5 \textrm{ m} \\ 0.8 \textrm{ m}, \quad \textrm{otherwise} \end{cases} \quad h_2(x,0) = 1.5 m - b(x) - h_1(x, 0) \end{equation} \begin{equation} u_1(x,0) = u_2(x,0) = 0 \textrm{ m s}^{-1} \end{equation} Non-reflective conditions are imposed at the boundaries. Several mesh sizes are considered, namely $\Delta x$ = 1/10, 1/20, 1/40, and 1/80 m. A variable time step $\Delta t$ is evaluated at each step to satisfy $CFL = 0.9$. The reference solution is computed using the A-Roe scheme and a dense grid with $\Delta x$ = 1/160 m. Figure \ref{fig:Results_Test4} shows the temporal evolution of the interface and free-surface profiles for the reference solution. A detail of solutions for the interface depth and lower layer velocity are shown in Fig.~\ref{fig:Details_Test4} where N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 numerical schemes are compared against the reference solution at $t=15$ s with $\Delta x = 1/20$ m. The results indicate that Roe and IFCP schemes are equally accurate, whereas PVM-2U schemes produce noticeably more diffused results. Same as in the previous case, the implementation of the eigenvalue solver has no apparent influence on the accuracy of the results, since approximated eigenvalues exhibit negligible errors for $r=0.98$. \begin{figure}[htbp] \center \includegraphics[width=12cm]{Fig_Test02_r098_solutions} \caption{Test III: Temporal evolution of the interface and surface profile (the reference solution)} \label{fig:Results_Test4} \end{figure} \begin{figure}[htbp] \center \includegraphics[width=6cm]{Fig_Test02_r098_zoom1} \hfill \includegraphics[width=6cm]{Fig_Test02_r098_zoom2} \caption{Test III: A detail of the interface depth and lower layer velocity obtained by N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 scheme, compared to the reference solution at $t=15$ s with $\Delta x = 0.05$ m} \label{fig:Details_Test4} \end{figure} A CPU time vs. relative root square error $E_{\Phi}$ is presented in Fig. \ref{fig:Efficiency_Test4}. The results are very similar to the previous test case, shown in Fig. \ref{fig:Efficiency_Test3}. The E-IFCP is the most efficient scheme, closely followed by A-IFCP and then A-Roe. The A-PVM2 and E-PVM2 are the least efficient schemes. The differences in efficiency between the analytical and approximated eigenvalue solvers are insignificant for IFCP and PVM-2U schemes. \begin{figure}[htbp] \center \includegraphics[width=6cm]{Fig_Test02_r098_Err_h} \hfill \includegraphics[width=6cm]{Fig_Test02_r098_Err_u} \caption{Test III: CPU time vs error for N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 scheme, compared to the reference solution} \label{fig:Efficiency_Test4} \end{figure} \subsection{Numerical test IV: Internal dam break with $r$=0.4} A two-layer flow through a rectangular channel with a flat bottom topography is considered again. In contrast to a similar internal dam-break scenario presented in \cite{krvavica2018analytical}, here we consider a much larger density difference between the layers, namely $r=0.4$. The spatial domain is set to [0, 50], and the initial condition is given by: \begin{equation} h_1(x, 0) = \begin{cases} 0.2 \textrm{ m}, \quad \textrm{if } x < 25 \textrm{ m} \\ 0.8 \textrm{ m}, \quad \textrm{otherwise} \end{cases} \quad h_2(x,0) = 1.0 m - h_1(x, 0) \end{equation} \begin{equation} u_1(x,0) = u_2(x,0) = 0 \textrm{ m s}^{-1} \end{equation} Non-reflective conditions are imposed at the boundaries. Several mesh sizes are considered, namely $\Delta x$ = 1/2, 1/4, 1/8, and 1/16 m. A variable time step $\Delta t$ is evaluated at each step to satisfy $CFL = 0.9$. The reference solution is computed using the A-Roe scheme and a dense grid with $\Delta x$ = 1/32 m. Figure \ref{fig:Results_Test2} shows the temporal evolution of the interface and free-surface profiles for the reference solution. A detail of solutions for the interface depth and lower layer velocity are shown in Fig.~\ref{fig:Details_Test2} where N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 numerical schemes are compared against the reference solution at $t=5$ s with $\Delta x = 1/4$ m. The results indicate that all Roe and IFCP schemes are equally accurate, whereas PVM-2U schemes produce more diffused results. Analytical eigenvalues show slightly more accurate values in comparison to the approximated ones, which can be expected since the approximations are derived for $r \approx 1$, which is not the case here. \begin{figure}[htbp] \center \includegraphics[width=12cm]{Fig_Test00_r04_solutions} \caption{Test IV: Temporal evolution of the interface and surface profile (the reference solution)} \label{fig:Results_Test2} \end{figure} \begin{figure}[htbp] \center \includegraphics[width=6cm]{Fig_Test00_r04_zoom1} \hfill \includegraphics[width=6cm]{Fig_Test00_r04_zoom2} \caption{Test IV: A detail of the interface depth and lower layer velocity obtained by N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 scheme, compared to the reference solution at $t=5$ s with $\Delta x = 0.25$ m} \label{fig:Details_Test2} \end{figure} A CPU time vs. relative root square error $E_{\Phi}$ is presented in Fig. \ref{fig:Efficiency_Test2}. In general, the results show that the A-IFCP, E-IFCP and A-Roe are the most efficient schemes. N-Roe and PVM-2U are noticeably less efficient. The differences in efficiency between the analytical and approximated eigenvalue solvers are not significant, but analytical eigensolvers seem to have a slight advantage over the approximated eigenvalues. Analytical eigenvalues produce more accurate results with a minor increase in the computational cost. \begin{figure}[htbp] \center \includegraphics[width=6cm]{Fig_Test00_r04_Err_h} \hfill \includegraphics[width=6cm]{Fig_Test00_r04_Err_u} \caption{Test IV: CPU time vs error for N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 scheme, compared to the reference solution} \label{fig:Efficiency_Test2} \end{figure} \subsection{Numerical test V: Internal column collapse on a slope with $r$=0.4} This test presents a lower-layer column collapse on a sloped bottom. Again a larger density difference between the layers is considered, namely $r=0.4$. The spatial domain is set to [0, 40], and the initial condition is given by: \begin{equation} h_1(x, 0) = \begin{cases} 0.2 \textrm{ m}, \quad \textrm{if } x < 25 \textrm{ m} \\ 0.8 \textrm{ m}, \quad \textrm{otherwise} \end{cases} \quad h_2(x,0) = 1.0 m - h_1(x, 0) \end{equation} \begin{equation} u_1(x,0) = u_2(x,0) = 0 \textrm{ m s}^{-1} \end{equation} Non-reflective conditions are imposed at the boundaries. Several mesh sizes are considered, namely $\Delta x$ = 2/5, 1/5, 1/10, and 1/20 m. A variable time step $\Delta t$ is evaluated at each step to satisfy $CFL = 0.9$. The reference solution is computed using the A-Roe scheme and a dense grid with $\Delta x$ = 1/40 m. Figure \ref{fig:Results_Test5} shows the temporal evolution of the interface and free-surface profiles for the reference solution. A detail of solutions for the interface depth and lower layer velocity are shown in Fig.~\ref{fig:Details_Test5} where N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 numerical schemes are compared against the reference solution at $t=5$ s with $\Delta x = 1/5$ m. The results indicate that all Roe and IFCP schemes are equally accurate, whereas PVM-2U schemes produce more diffused results. As in the previous example, analytical eigenvalues show slightly more accurate values in comparison to the approximated ones. \begin{figure}[htbp] \center \includegraphics[width=12cm]{Fig_Test03b_r04_solutions} \caption{Test V: Temporal evolution of the interface and surface profile (the reference solution)} \label{fig:Results_Test5} \end{figure} \begin{figure}[htbp] \center \includegraphics[width=6cm]{Fig_Test03b_r04_zoom1} \hfill \includegraphics[width=6cm]{Fig_Test03b_r04_zoom2} \caption{Test V: A detail of the interface depth and lower layer velocity obtained by N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 scheme, compared to the reference solution at $t=5$ s with $\Delta x = 0.2$ m} \label{fig:Details_Test5} \end{figure} A CPU time vs. relative root square error $E_{\Phi}$ is presented in Fig. \ref{fig:Efficiency_Test2}. Similar to the previous test, E-IFCP and A-IFCP are the most efficient schemes, closely followed by A-Roe scheme. Both PVM-2U schemes and N-Roe are noticeably less efficient. The differences in efficiency between the analytical and approximated eigenvalue solvers are not significant. For IFCP scheme they seems to be almost identical, but for PVM-2U scheme, the analytical implementation is more efficient. \begin{figure}[htbp] \center \includegraphics[width=6cm]{Fig_Test03b_r04_Err_h} \hfill \includegraphics[width=6cm]{Fig_Test03b_r04_Err_u} \caption{Test V: CPU time vs error for N-Roe, A-Roe, A-IFCP, E-IFCP, A-PVM2, and E-PVM2 scheme, compared to the reference solution} \label{fig:Efficiency_Test5} \end{figure} \section{Discussion and Conclusion} This study re-evaluated the efficiency of Roe, IFCP, and PVM-2U schemes for two-layer shallow water systems with different solutions for eigenvalues. For this purpose, numerical, approximated, and recently-proposed analytical solutions for the eigenstructure were considered, combined with Roe, PVM-2U and IFCP numerical schemes. The choice of eigenvalues in numerical schemes for two-layer SWE models were evaluated in three stages. First analysis focused only on the accuracy and computational time of different eigenvalue solvers. Numerical and analytical eigenvalue solvers produce almost identical results. Approximated expressions, on the other hand, are less accurate, and the errors grow with density difference between the layers. This increase in errors appears because approximate solutions deviate from the initial assumption that the density ratio is close to one. Regarding the computational time, analytical and approximated expressions are one order of magnitude faster than the numerical solver, with approximate expressions being two times faster than analytical ones. This additionally confirms our previous study \cite{krvavica2018analytical} where analytical expressions were found to be equally accurate but one order of magnitude faster than numerical solvers (approximated expressions were not considered in the previous study). The second analysis shifted the focus from eigensolvers to the numerical viscosity matrix, which was computed using different numerical schemes in combination with different eigenvalue solvers. The results revealed that the Roe method is highly sensitive to the choice of eigenvalues, IFCP method is somewhat sensitive, and PVM-2U method shows very little sensitivity to the choice of eigenvalue. In general, Roe method is the most accurate, followed by IFCP, and then PVM-2U method. This is expected since IFCP approximates the viscosity matrix using four eigenvalues, and PVM-2U using only two eigenvalues. Also, all schemes are more accurate when analytical eigenvalues are used in comparison to approximated values. It is interesting that the Roe method with approximated eigenvalues is the least accurate method overall for large density differences. The computational time needed to obtain the numerical viscosity matrix is the longest for Roe scheme with numerical eigensolver. Other combinations of numerical schemes and eigensolvers are several times faster, and very close to each other. The rankings from the fastest to the slowest combination are: PVM-2U scheme with approximated eigenvalues, IFCP with approximated eigenvalues, PVM-2U with analytical eigenvalues, IFCP with analytical eigenvalues, Roe with approximated eigenvalues, and finally Roe with analytical eigenvalues. It is important to note that only 10-20\% of total time needed to construct the viscosity matrix is spent on computing the eigenvalues. In the third analysis several numerical tests were performed to investigate the overall performance of different numerical schemes in combination with different eigenvalue solvers. A total of five tests were designed to evaluate more realistic scenarios, including different density ratios between the layers and various channel geometries. The results revealed that the Roe scheme with approximated eigenvalues is not well-balanced, and should not be considered in two-layer modelling. Remaining four test showed that IFCP (with approximated and analytical eigenvalues) and Roe scheme (with analytical eigenvalues) are very close in performance, with IFCP being slightly better. PVM-2U was noticeably less efficient, regardless of the choice for the eigensolver. These findings instil more confidence into findings from out previous study \cite{krvavica2018analytical} that showed how Roe method with analytical eigenvalues is very close to IFCP scheme with approximated eigenvalues. Note that the previous study did not considered the modifications to the numerical schemes presented in Section \ref{sec:remarks}, which may improve their computational speed. Also note that the conclusions from the previous study were based only on two numerical examples with the same (small) density difference between the layers and used a fixed time step. Furthermore, the previous study did not evaluate the impact of implementing analytical eigenvalues into PVM and IFCP schemes. Also, the PVM-2U is considered in the present study, whereas \cite{krvavica2018analytical} evaluated PVM-Roe which is a redefinition of the Roe scheme under the PVM paradigm. PVM-2U, on the other hand, is a new PVM method based on two external eigenvalues. Overall, when modelling layers of smaller density difference, it seems that approximated eigenvalues are a more efficient choice for IFCP and PVM-2U schemes. For larger density differences, however, the analytical eigenvalues are as efficient. It should be emphasized that analytical eigenvalues are more precise and can help with an accurate prediction of hyperbolicity losses for all density ratios, without producing any overhead in computational time. The extension of all three considered schemes (Roe, IFCP, PVM-2U) to a higher order is straightforward, following a general approach presented in \cite{castro2006high}. An extension to a two-dimensional case is also possible following the procedure from \cite{castro2009high}. A high order extension of the family of PVM methods is similar to the Roe method \cite{castro2012class}. For example, Castro et al. \cite{castro2012ifcp} presented the extension of IFCP method to solve a two-layer Savage-Hutter type model and simulate tsunamis generated by landslides. Since the eigenvalues affect only the viscosity matrix, the extension of each considered scheme to a higher order is the same regardless of the eigenvalue solver. On the other hand, some impact of the eigenvalues on the efficiency of higher order methods is expected and should be further analysed. Although the efficiency of analytical solutions to the eigenstructure have been assessed here for two-layer shallow-water flows, these closed-form solutions to eigenvalues expressed in coefficient of a characteristic quartic, can directly be applied to some other non-conservative hyperbolic systems defined by four coupled partial differential equations, such as two-phase granular flows. \section*{Acknowledgements} This work has been fully supported by the University of Rijeka under the project number 17.06.2.1.02 (River-Sea Interaction in the Context of Climate Change). \small \bibliographystyle{elsarticle-harv}
\section{Introduction and Main Results} An important physical problem in fluid mechanics is to study the flows in nozzles. Given an infinitely long nozzle $\tilde{\Omega}$, a natural problem is to investigate the well-posedness theory for the steady Navier-Stokes system \be \label{NS1} \left\{ \ba & ( \Bu \cdot \nabla )\Bu - \Delta \Bu + \nabla p = 0,\,\,\,\,\text{in}\,\, \tilde{\Omega} \\ & {\rm div}~\Bu = 0,\,\,\,\, \text{in}\,\,\tilde\Omega, \ea \right. \ee supplemented with the no slip conditions, i.e., \begin{equation}\label{BC1} \Bu=0\,\,\,\,\text{on}\,\,\partial\tilde\Omega, \end{equation} where $\Bu=(u^x, u^y, u^z)$ denotes the velocity field of the flows. If $\tilde\Omega$ is a straight cylinder of the form $\Sigma\times \mathbb{R}$ where $\Sigma$ is a smooth two dimensional domain, then there exists a solution $\Bu =(0, 0, u^z(x,y))$ satisfying \eqref{NS1} and \eqref{BC1}. The solution is called the Poiseuille flow and is uniquely determined by the flow flux $\Phi$ defined by \be\label{fluxBC} \Phi= \int_{\Sigma} u^z(x,y) \, dS. \ee In particular, if the straight cylinder is a pipe, i.e., $\Sigma$ is the unit disk $B_1(0)$, then the associated Poiseuille flows $\bBU = \bar{U}(r) \Be_z$ have the explicit form as follows, \be \label{HPflow} \bar{U}(r) = \frac{2\Phi}{\pi}(1-r^2) \ \ \ \ \text{with}\,\, r=\sqrt{x^2+y^2}, \ee which are also called Hagen-Poiseuille flows. Given an infinitely long nozzle $\tilde\Omega$ tending to a straight cylinder $\Omega$ at far fields, the problem on the well-posedness theory for \eqref{NS1}-\eqref{BC1} together with the condition that the velocity field converges to the Posieuille flows in $\Omega$, is called Leray's problem nowadays and it was first addressed by Leray (\cite{Leray}) in 1933. The first significant contribution to the solvability of Leray's problem is due to Amick \cite{Amick1, Amick2}, who reduced the proof of existence to the resolution of a well-known variational problem related to the stability of the Poiseuille flow in a straight cylinder. However, Amick left out the investigation of uniqueness and existence of the solutions with large flux. A rich and detailed analysis of the problem is due to Ladyzhenskaya and Solonnikov \cite{LS}. However, the asymptotic far field behavior of the solutions obtained in \cite{LS} is not very clear. Therefore, in order to get a complete resolution for Leray's problem, the key issue is to study the asymptotic behavior for the solutions of the steady Navier-Stokes equations in infinitely long nozzles. The asymptotic behavior for steady Navier-Stokes system in a nozzle was studied extensively in the literature, see \cite{Horgan, HW, LS, AP,Pileckas} and references therein. A classical and straightforward way to prove the asymptotic behavior for steady solutions of Navier-Stokes system is to derive a differential inequality for the localized energy \cite{Horgan}. This approach was later refined in \cite{HW, LS, AP,Pileckas} and the book by Galdi \cite{Galdi}, etc. The asymptotic behavior obtained via this method is also only for the solutions of steady Navier-Stokes system with small fluxes. A significant open problem posed in \cite[p. 19]{Galdi} is the global well-posedness for Leray's problem in a general nozzle when the flux $\Phi$ is large. Another approach to prove the convergence to Poiseuille flows of steady solutions for Navier-Stokes system is the blowup technique. In fact, with the aid of the compactness obtained in \cite{LS}, global well-posedness for the Leray's problem in a general nozzle tending to a straight cylinder could be established even when the flux $\Phi$ is large, provided that we can prove global uniqueness or some Liouville type theorem for Poiseuille flows in the straight cylinder. In order to study the global uniqueness of Poiseuille flows in a straight cylinder, an important step is to prove the uniqueness in a bounded set in a suitable metric space. The uniqueness of Hagen-Poiseuille flows in a uniformly small neighborhood (independent of the size of the flux) was obtained in \cite{WXX1}. More precisely, suppose that $\Omega=B_1(0)\times \mathbb{R}$ is a pipe and $\BF=(F^x, F^y, F^z)$ is external force, does the problem \be \label{NS} \left\{ \ba & ( \Bu \cdot \nabla )\Bu - \Delta \Bu + \nabla p = \BF,\,\,\,\,\text{in}\,\, {\Omega}, \\ & {\rm div}~\Bu = 0,\,\,\,\, \text{in}\,\, \Omega, \ea \right. \ee supplemented with no-slip boundary condition \be \label{noslipBC} \Bu = 0 \ \ \ \ \mbox{on}\ \partial \Omega \ee and the flux constraint \be\label{fluxBC} \int_{B_1(0)} u^z(x, y, z) \, dx dy = \Phi \ee have a unique solution in the neighborhood of the Hagen-Poiseuille flows when the external force is small? The uniform nonlinear structural stability of Hagen-Poiseuille flows was established in \cite{WXX1} in the axisymmetric setting. It was proved in \cite{WXX1} that the problem \eqref{NS}-\eqref{fluxBC} has a unique axisymmetric solution $\Bu$ satisfying \be \label{thmuniformnonlinear2} \|\Bu - \bBU \|_{H^{\frac53} (\Omega)} \leq C \|\BF\|_{L^2(\Omega)} \ee and \be \label{thmuniformnonlinear3} \|\Bu - \bBU \|_{H^2(\Omega)} \leq C (1 + \Phi^{\frac14}) \|\BF\|_{L^2(\Omega)}. \ee when the $L^2-$norm of $\BF$ is smaller than a uniform constant independent of the flux $\Phi$. The main goal of this paper contains two parts. The first one is to show the existence and uniqueness of strong solutions for the problem \eqref{NS}-\eqref{fluxBC}, when $\BF$ is large in the case that the flux is large. The second goal in this paper is to investigate the convergence rate of steady solutions of Navier-Stokes system in a pipe which have finite $H^2$ distance to the Hagen-Poiseuille flows, even when the flows have large fluxes. Our first main result is stated as follows. \bt \label{mainresult1} Assume that $\BF \in L^2(\Omega)$ and $\BF = \BF(r, z)$ is axisymmetric. There exists a constant $\Phi_0\geq 1$, such that if \be \label{assump1} \Phi \geq \Phi_0\ \ \ \ \ \mbox{and}\ \ \ \ \|\BF\|_{L^2(\Omega)} \leq \Phi^{\frac{1}{96}}, \ee then the problem \eqref{NS}--\eqref{fluxBC} admits a unique axisymmetric solution $\Bu$ satisfying \be \label{estuH2} \|\Bu - \bBU \|_{H^{\frac{19}{12}}(\Omega)} \leq C_0 \Phi^{\frac{1}{96}} \ \ \ \ \mbox{and}\ \ \ \ \|u^r\|_{L^2(\Omega)} \leq \Phi^{-\frac{15}{32}}, \ee where $C_0$ is a constant independent of $\Phi$ and $\BF$. Moreover, the solution $\Bu$ satisfies that \be \label{estuH3} \|\Bu - \bBU \|_{H^2(\Omega)} \leq C \Phi^{\frac{7}{24}}. \ee \et We have the following remarks on Theorem \ref{mainresult1}. \begin{remark} The crucial point of Theorem \ref{mainresult1} is that the external force $\BF$ can be very large when the flux of the flow is large. \end{remark} \begin{remark} If $\Phi$ is sufficiently large, $\BF =0$ and $\|\Bu - \bBU \|_{H^{\frac{19}{12}}(\Omega)} \leq \Phi^{\frac{1}{96}}$, then $\Bu \equiv \bBU$. It means that $\bBU$ is the unique solution in a bounded set with large radius $\Phi^{\frac{1}{96}}$. This can be regarded as a step to get Liouville type theorem for steady Navier-Stokes system in a pipe. \end{remark} In case that $\BF$ has additional structure at far fields, we have the following asymptotic behavior of solutions of Navier-Stokes system in a pipe. \bt \label{mainresult2} Assume that $\BF \in H^1(\Omega)$ and $\BF = \BF(r, z)$ is axisymmetric. There exists a constant $\alpha_0$ depending only on $\Phi$, such that if $\BF = \BF(r, z)$ satisfies \be \label{condF1} \|e^{\alpha |z|} \BF\|_{L^2 (\Omega)} < + \infty, \ee with some $\alpha \in (0 , \, \alpha_0)$, and $\Bu$ is an axisymmetric solution to the problem \eqref{NS}--\eqref{fluxBC}, satisfying \be \label{condu1} \|\Bu - \bBU\|_{H^2(\Omega)} < + \infty, \ee then one has \begin{equation} \|e^{\alpha z} (\Bu-\bBU)\|_{H^2(\Omega\cap \{z\geq 0\})}+ \|e^{-\alpha z} (\Bu-\bBU)\|_{H^2(\Omega\cap \{z\leq 0\})} < + \infty. \end{equation} \et There are a few remarks in order. \begin{remark} The key point of Theorem \ref{mainresult2} is that there is neither smallness assumption on the flux $\Phi$ nor the smallness on the deviation of $\Bu$ with $\bBU$. \end{remark} \begin{remark} It follows from \eqref{thmuniformnonlinear3} and \eqref{estuH3} that the solutions obtained in \cite{WXX1} and Theorem \ref{mainresult1} satisfy the condition \eqref{condu1}. Hence if $\BF$ in \cite{WXX1} and Theorem \ref{mainresult1} also satisfies \eqref{condF1}, then the associated solutions must converge to Hagen-Poiseuille flows exponentially fast. \end{remark} \begin{remark} If $\BF$ decays to zero with an algebraic rate, i.e., $\BF$ satisfies \be \label{condF2} \| z^k \BF\|_{L^2 (\Omega)} < + \infty, \ee with some $k\in \mathbb{N}$, then under the condition \eqref{condu1}, using the same idea of the proof for Theorem \ref{mainresult2} yields that the axisymmetric solution $\Bu$ of the problem \eqref{NS}--\eqref{fluxBC} converges to the Hagen-Poiseuille flows with the same algebraic rates, i.e., $\Bu$ satisfies \begin{equation} \| z^k (\Bu-\bBU)\|_{H^2(\Omega)} < + \infty. \end{equation} \end{remark} \begin{remark} The same asymptotic behavior also holds for the axisymmetric flows in semi-infinite pipes. \end{remark} The structure of this paper is as follows. In Section 2, we introduce the stream function formulation for the linearized problem of axisymmetric Navier-Stokes system and recall the existence results obtained in \cite{WXX1}. Some good estimates for the derivatives in the axial direction of the stream function and the swirl velocity are established in Section \ref{someestimates}. These are the key ingredients to get the existence and uniqueness of large solutions when $\BF$ is large. The existence of solutions for the nonlinear problem is obtained via standard iteration in Section \ref{secnonlinear} . Section \ref{sec-asymp} devotes to the study on the convergence rates of the flows at far fields, where the key observation is that $\Bu-\bBU$ must be small at far fields when the condition \eqref{condu1} holds so that the estimate for the linearized problem can be used. Some important inequalities are collected in Appendix \ref{Appendix}. \section{Stream function formulation and existence results}\label{Linear} To get the existence of the Navier-Stokes equations, we start from the following linearized system around Hagen-Poiseuille flows, \be \label{2-0-1} \left\{ \ba &\bBU \cdot \nabla \Bv + \Bv \cdot \nabla \bBU - \Delta \Bv + \nabla P = \BF, \ \ \ \mbox{in}\ \Omega, \\ & {\rm div}~\Bv = 0,\ \ \ \mbox{in}\ \Omega, \ea \right. \ee supplemented with no-slip boundary conditions and the flux constraint, \be \label{BC} \Bv = 0\ \ \ \mbox{on}\ \partial \Omega,\quad \int_{B_1(0)} v^z(\cdot, \cdot, z)\, dS = 0\ \ \ \text{for any}\,\, z \in \mathbb{R}. \ee \subsection{Stream function formulation}\label{sec-stream} In terms of the cylindrical coordinates, an axisymmetric solution $\Bv$ can be written as \be \nonumber \Bv = v^r (r, z) \Be_r + v^z (r, z) \Be_z +v^\theta (r, z) \Be_\theta. \ee Then the linearized equation for the Navier-Stokes system \eqref{NS} around Hagen-Poiseuille flows can be written as \be \label{2-0-1-1} \left\{ \ba & \bar U(r) \frac{\partial v^r}{\partial z} + \frac{\partial P}{\partial r} -\left[ \frac{1}{r} \frac{\partial}{\partial r}\left( r \frac{\partial v^r}{\partial r} \right) + \frac{\partial^2 v^r}{\partial z^2} - \frac{v^r}{r^2} \right] = F^r \ \ \ \mbox{in}\ D ,\\ & v^r \frac{\partial \bar U }{\partial r} + \bar U(r) \frac{\partial v^z}{\partial z} + \frac{\partial P}{\partial z} - \left[ \frac{1}{r} \frac{\partial }{\partial r} \left( r \frac{\partial v^z}{\partial r}\right) + \frac{\partial^2 v^z}{\partial z^2} \right] = F^z \ \ \mbox{in}\ D , \\ & \partial_r v^r + \partial_z v^z + \frac{v^r}{r} =0\ \ \ \mbox{in}\ D \ea \right. \ee and \be \label{vswirl} \bar U(r) \partial_z v^\theta - \left[ \frac{1}{r} \frac{\partial }{\partial r} \left( r \frac{\partial v^\theta}{\partial r}\right) + \frac{\partial^2 v^\theta}{\partial z^2} - \frac{v^\theta}{r^2} \right] = F^\theta \ \ \ \mbox{in}\ \ D. \ee Here $F^r$, $F^z$, and $F^\theta$ are the radial, axial, and azimuthal component of $\BF$, respectively, and $D=\{(r, z): r\in (0, 1), z\in \mathbb{R}\}$. The no-slip boundary conditions and the flux constraint \eqref{BC} become \be \label{BC-1} v^r(1, z) = v^z(1, z) = 0,\quad \int_0^1 r v^z(r, z)\, dr = 0, \ee and \begin{equation}\label{BC-swirl} v^\theta (1, z) = 0. \end{equation} It follows from the third equation in \eqref{2-0-1-1} that there exists a stream function $\psi(r, z)$ satisfying \be \label{2-0-4} v^r = \partial_z \psi \ \ \text{and} \ \ v^z = - \frac{\partial_r (r \psi) }{r}. \ee The azimuthal vorticities of $\Bv$ and $\BF$ are defined as \be \nonumber \omega^\theta= \partial_z v^r - \partial_r v^z= \frac{\partial }{\partial r} \left( \frac1r \frac{\partial }{\partial r} (r \psi) \right) + \partial_z^2 \psi \ \ \ \ \mbox{and}\ \ \ \ f= \partial_z F^r - \partial_r F^z, \ee respectively. It follows from the first two equations in \eqref{2-0-1-1} that \be \label{2-0-2} \bar U(r) \partial_z \omega^\theta - \left(\partial_r^2 + \partial_z^2 + \frac{1}{r} \partial_r \right)\omega^\theta + \frac{\omega^\theta}{r^2} = f. \ee Denote \be \nonumber \mathcal{L} = \frac{\partial}{\partial r} \left( \frac1r \frac{\partial}{\partial r}(r \cdot) \right) = \frac{\partial^2}{\partial r^2} + \frac1r \frac{\partial}{\partial r} - \frac{1}{r^2}. \ee Hence $\omega^\theta = (\mathcal{L} + \partial_z^2) \psi$ and $\psi$ satisfies the following fourth order equation, \be \label{2-0-4-1} \bar U(r) \partial_z( \mathcal{L} + \partial_z^2) \psi - ( \mathcal{L} + \partial_z^2)^2 \psi = f. \ee Next, we derive the boundary conditions for $\psi$. As discussed in \cite{Liu-Wang}, in order to get classical solutions, some compatibility conditions at the axis should be imposed. Assume that $\Bv$ and the vorticity $\Bo$ are continuous so that $v^r(0, z)$ and $\omega^\theta(0, z)$ should vanish. This implies \be \nonumber \partial_z \psi(0, z) = (\mathcal{L} + \partial_z^2)\psi (0, z) = 0. \ee Without loss of generality, one can assume that $\psi(0, z) = 0$. Hence, the following compatibility condition holds at the axis, \be \label{2-0-4-2} \psi(0, z) = \mathcal{L} \psi(0, z) = 0. \ee On the other hand, it follows from \eqref{BC-1} that \be \nonumber \int_0^1 \partial_r (r \psi ) (r, z)\, dr =- \int_0^1 r v^z \, dr = 0. \ee This, together with \eqref{2-0-4-2}, gives \be \label{2-0-4-3} \psi(1, z) = \lim_{r\rightarrow 0+ } ( r \psi) (r, z) = 0. \ee Moreover, according to the homogeneous boundary conditions for $\Bv$, one has \be \nonumber \frac{\partial}{\partial r}(r \psi) |_{r=1} = r v^z |_{r=1} = 0. \ee This, together with \eqref{2-0-4-3}, implies \be \label{2-0-4-4} \frac{\partial \psi}{\partial r}(1, z) = 0. \ee Meanwhile, if $\Bv$ is continuous, then the compatibility conditions for $\Bv$ obtained in \cite{Liu-Wang} implies $v^\theta (0, z) = 0$. Hence $v^\theta$ satisfies the following problem \be \label{swirlsystem} \left\{ \ba & \bar U(r) \partial_z v^\theta - \left[ \frac{1}{r} \frac{\partial }{\partial r} \left( r \frac{\partial v^\theta}{\partial r}\right) + \frac{\partial^2 v^\theta}{\partial z^2} - \frac{v^\theta}{r^2} \right] = F^\theta \ \ \ \mbox{in}\ \ D, \\ & v^\theta(1, z)= v^\theta(0, z) = 0. \ea \right. \ee Now let us introduce some notations and recall the existence results for $\psi$ and $\Bv^\theta$ obtained in \cite{WXX1}. For a given function $g(r, z)$, define its Fourier transform with respect to $z$ variable by \be \nonumber \hat{g}(r, \xi) = \int_{\mathbb{R}^1} g(r, z) e^{-i \xi z} dz. \ee $\Re g$ and $\Im g$ denote the real and imaginary part of a function or a number $g$, respectively. \begin{definition}\label{def1} Define a function space $C_*^\infty(D)$ as follows \be \nonumber C_*^\infty(D ) = \left\{ \varphi(r, z) \left| \ba & \ \varphi \in C_c^\infty([0, 1] \times \mathbb{R} ), \ \varphi(1, z) = \frac{\partial \varphi}{\partial r}(1, z) =0, \\ &\ \ \ \mbox{and}\ \lim_{r\rightarrow 0+ } \mathcal{L}^k \varphi(r, z) = \lim_{r \rightarrow 0+ } \frac{\partial}{\partial r} ( r \mathcal{L}^k \varphi ) (r, z) = 0, \ k \in \mathbb{N} \ea \right. \right\}. \ee The $H_r^3(D)$-norm and $H_r^4(D)$-norm are defined as follows, \be \label{5-100} \ba \| \varphi\|_{H_r^3(D)} : = & \int_{-\infty}^{+\infty} \int_0^1 \left[ \left| \frac{\partial}{\partial r }( r \mathcal{L} \hat{\varphi}) \right|^2 \frac1r + \xi^2 |\mathcal{L} \hat{\varphi} |^2 r + \xi^4 \left| \frac{\partial}{\partial r} (r \hat{\varphi} ) \right|^2 \frac1r + \xi^6 |\hat{\varphi} |^2 r \right] \, dr \\ &\ \ + \int_{-\infty}^{+\infty} \int_0^1 \left[ |\mathcal{L} \hat{\varphi} |^2 r + \xi^2 \left| \frac{\partial}{\partial r} ( r \hat{\varphi}) \right|^2 \frac{1}{r} + \xi^4 |\hat{\varphi}|^2 r \right] \, dr \\ &\ \ + \int_{-\infty}^{+\infty} \int_0^1 \left[ \left| \frac{\partial}{\partial r} (r \hat{\varphi}) \right|^2 \frac1r + \xi^2 |\hat{\varphi}|^2 r + |\hat{\varphi}|^2 r \right] \, dr . \ea \ee $H_*^3(D)$ denotes the closure of $C_*^\infty(D)$ under the $H_r^3(D)$-norm. Furthermore, $L_r^2(D)$ is the completion of $C^\infty(D)$ under the $L_r^2(D)$-norm defined as follows \be \nonumber \ \|f\|_{L_r^2(D )}^2 = \int_{-\infty}^{+\infty} \int_0^1 |f|^2 r \, dr dz . \ee \end{definition} The existence of solutions for the problems \eqref{2-0-4-1}--\eqref{2-0-4-4} and \eqref{swirlsystem} has been established in \cite{WXX1}. \begin{pro} \label{existence-stream} \cite[Theorem 1.1]{WXX1} Assume that $\BF^* = F^r \Be_r + F^z \Be_z \in L^2 (\Omega)$ and $\BF^*$ is axisymmetric. There exists a unique solution $\psi \in H_*^3(D) $ to the linear system \eqref{2-0-4-1}--\eqref{2-0-4-4}, and a positive constant $C_1$ independent of $\BF^* $ and $\Phi$, such that \begin{equation}\nonumber \| \Bv^* \|_{H^{\frac53}(\Omega)} \leq C_1 \|\BF^*\|_{L^2(\Omega)}, \end{equation} and \be \nonumber \|\Bv^* \|_{H^2(\Omega)} \leq C_1 (1 + \Phi^{\frac14} ) \|\BF^* \|_{L^2(\Omega)}, \ee where $\Bv^* = v^r \Be_r + v^z \Be_z = \partial_z \psi \Be_r - \frac{\partial_r (r\psi)}{r} \Be_z . $ \end{pro} \begin{pro}\label{existence-swirl}\cite[Proposition 4.6]{WXX1} Assume that $\BF^\theta = F^\theta \Be_\theta \in L^2(\Omega)$ and $\BF^\theta = \BF^\theta (r, z)$ is axisymmetric. There exist a unique solution $v^\theta $ to the linear problem \eqref{swirlsystem} and a positive constant $C_2$ independent of $F^\theta$ and $\Phi$, such that \be \nonumber \|\Bv^\theta \|_{H^2(\Omega)} \leq C_2 \|\BF^\theta \|_{L^2(\Omega)}, \ee where $\Bv^\theta = v^\theta \Be_\theta.$ \end{pro} \section{Some Refined estimates for solutions of Linearized problem}\label{someestimates} Propositions \ref{existence-stream}-\ref{existence-swirl} provide some uniform estimates for $\psi$ and $\Bv^\theta$. They are the key ingredients to get the existence and uniqueness of solutions of the steady Navier-Stokes system, when $\BF$ is uniformly small\cite{WXX1}. In this section, we give some refined estimates, especially for the $z$-derivatives of $\psi$ and $\Bv^\theta$, which yield the existence of large solutions of steady Navier-Stokes system even when the external force is large. These estimates also show the stabilizing effect of the linearized convection term when $\Phi$ is large. We take the Fourier transform with respect to $z$ for the equation \eqref{2-0-4-1} . For every fixed $\xi$, $\hat{\psi}$ satisfies \be \label{2-0-8} i\xi \bar{U}(r) ( \mathcal{L} - \xi^2) \hat{\psi} - ( \mathcal{L} - \xi^2 )^2 \hat{\psi} = \hat{f}= i \xi \widehat{F^r} - \frac{d}{dr} \widehat{F^z}. \ee Furthermore, the boundary conditions \eqref{2-0-4-2}-\eqref{2-0-4-4} can be written as \be \label{FBC} \hat{\psi}(0) = \hat{\psi} (1) = \hat{\psi}^{\prime} (1) = \mathcal{L} \hat{\psi}(0) = 0. \ee First, let us recall the a priori estimates obtained in \cite{WXX1} which hold for every $\xi \in \mathbb{R}$. \begin{pro}\label{propcase0}\cite[Section 6]{WXX1} Let $\hat{\psi}(r, \xi)$ be a smooth solution of the problem \eqref{2-0-8}--\eqref{FBC}. Then it holds \be \int_0^1 |\mathcal{L} \hat{\psi}|^2 r \, dr + \xi^2 \int_0^1 \left| \frac{d}{dr} (r \hat{\psi} ) \right|^2 \frac1r \, dr + \xi^4 \int_0^1 |\hat{\psi}|^2 r \, dr \leq C \int_0^1 ( |F^r|^2 + |F^z|^2 ) r \, dr. \ee \end{pro} The next two propositions give some further estimates for $\psi$, especially the $z$-derivatives of $\psi$. \begin{pro} \label{further-estimate-1} Assume that $\BF^r = F^r \Be_r \in L^2(\Omega)$, the solution $\psi$ of the problem \be \label{4-11} \left\{ \ba & \bar{U}(r) \partial_z (\mathcal{L} + \partial_z^2) \psi - (\mathcal{L} + \partial_z^2 )^2 \psi = \partial_z F^r, \\ & \psi(0) = \psi(1) = \frac{\partial}{\partial r } \psi(1) = \mathcal{L} \psi (0) = 0, \ea \right. \ee satisfies \be \nonumber \|\Bv^* \|_{L^2(\Omega)} \leq C \Phi^{-\frac23} \|\BF^r\|_{L^2(\Omega)} \ \ \ \ \mbox{and}\ \ \ \ \|\Bv^*\|_{H^{\frac{19}{12}}(\Omega)} \leq C \Phi^{-\frac{1}{30}} \|\BF^r\|_{L^2(\Omega)}. \ee \end{pro} \begin{proof} Taking the Fourier transform with respect to $z$ for the system \eqref{4-11} yields that for every fixed $\xi$, $\hat{\psi}(r, \xi)$ satisfies \be \label{4-12} i \xi \bar{U}(r) (\mathcal{L}- \xi^2) \hat{\psi} - ( \mathcal{L} - \xi^2)^2 \hat{\psi}= i \xi \widehat{F^r}. \ee Multiplying \eqref{4-12} by $r\overline{\hat{\psi}}$ and integrating the resulting equation over $[0, 1]$ give \be \nonumber \int_0^1 i \xi \bar{U} (r) (\mathcal{L}- \xi^2) \hat{\psi } \overline{\hat{\psi}} r \, dr - \int_0^1 (\mathcal{L} - \xi^2 )^2 \hat{\psi} \overline{\hat{\psi}} r \, dr = i \xi \int_0^1 \widehat{F^r} \overline{\hat{\psi}} r \, dr. \ee It follows from the direct computations and integration by parts that one has \be \label{4-14} \xi \int_0^1 \frac{\bar{U}(r) }{r } \left| \frac{d}{dr} (r \hat{\psi} ) \right|^2 \, dr + \xi^3 \int_0^1 \bar{U}(r) |\hat{\psi}|^2 r \, dr = -\Re \int_0^1 \xi \widehat{F^r} \overline{\hat{\psi}} r\, dr. \ee This, together with together with Lemma \ref{lemmaHLP}, gives \be \nonumber \ba \Phi \int_0^1 \left| \frac{d}{dr} ( r \hat{\psi}) \right|^2 \frac{1- r^2}{r} \, dr & \leq C \int_0^1 |\what{F^r} | |\hat{\psi}| r \, dr \\ & \leq C \left( \int_0^1 |\what{F^r} |^2 r \, dr \right)^{\frac12} \left( \int_0^1 \left| \frac{d}{dr} ( r \hat{\psi}) \right|^2 \frac{1- r^2}{r} \, dr \right)^{\frac12}. \ea \ee Hence, we have \be \label{4-16} \int_0^1 \left| \frac{d}{dr} ( r \hat{\psi}) \right|^2 \frac{1- r^2}{r} \, dr \leq C \Phi^{-2} \int_0^1 |\what{F^r}|^2 r \, dr. \ee It follows from \ref{weightinequality}, Lemma \ref{lemma1}, and Proposition \ref{propcase0} that \be \label{4-17} \ba \int_0^1 \left| \frac{d}{dr} (r \hat{\psi}) \right|^2 \frac1r \, dr & \leq C \left( \int_0^1 \left| \frac{d}{dr} ( r \hat{\psi}) \right|^2 \frac{1- r^2}{r} \, dr \right)^{\frac23} \left( \int_0^1 |\mathcal{L} \hat{\psi} |^2 r \, dr \right)^{\frac13} \\ & \leq C \Phi^{-\frac43} \int_0^1 |\what{F^r}|^2 r \, dr. \ea \ee This implies \be \label{4-18} \|v^z \|_{L^2(\Omega)}^2 = \int_{-\infty}^{+\infty} \int_0^1 \left| \frac{d}{dr} (r \hat{\psi} ) \right|^2 \frac1r \, dr d\xi \leq C \Phi^{-\frac43} \|\BF^r \|_{L^2(\Omega)}^2. \ee Similarly, the equality \eqref{4-14}, together with Lemma \ref{lemmaHLP}, gives \be \label{4-19} \ba \Phi \xi^2 \int_0^1 (1 - r^2) |\hat{\psi}|^2 r \, dr & \leq C \left( \int_0^1 |\what{F^r} |^2 r \, dr \right)^{\frac12} \left( \int_0^1 \left| \frac{d}{dr} (r \hat{\psi} ) \right|^2 \frac{1-r^2}{r} \, dr \right)^{\frac12} \\ & \leq C \Phi^{-2} \int_0^1 |\what{F^r} |^2 r \, dr. \ea \ee It follows from Lemma \ref{weightinequality}, Lemma \ref{lemma1}, and Proposition \ref{propcase0} again that one has \be \label{4-20} \ba \xi^2 \int_0^1 |\hat{\psi}|^2 r \, dr & \leq C \left( \xi^2 \int_0^1 (1 - r^2) |\hat{\psi}|^2 r \, dr \right)^{\frac23} \left( \xi^2 \int_0^1 \left| \frac{d}{dr} (r \hat{\psi} ) \right|^2 \frac1r \, dr \right)^{\frac13} \\ & \leq C \Phi^{-\frac43} \int_0^1 |\what{F^r}|^2 r \, dr . \ea \ee This implies \be \label{4-21} \|v^r \|_{L^2(\Omega)}^2 = \int_{-\infty}^{+\infty} \int_0^1 \xi^2 |\hat{\psi}|^2 r \, dr d\xi \leq C \Phi^{-\frac43} \|\BF^r\|_{L^2(\Omega)}^2. \ee By the interpolation between $L^2(\Omega)$ and $H^{\frac53}(\Omega)$, one has \be \label{4-22} \|\Bv^*\|_{H^{\frac{19}{12}} (\Omega)} \leq C \|\Bv^*\|_{L^2(\Omega)}^{\frac{1}{20}} \|\Bv^*\|_{H^{\frac53}(\Omega)}^{\frac{19}{20}} \leq C \Phi^{-\frac{1}{30}} \|\BF^r\|_{L^2(\Omega)}. \ee This finishes the proof of Proposition \ref{further-estimate-1}. \end{proof} Next, we study the case when $\BF$ has only axial component. \begin{pro} \label{further-estimate-2} Assume that $\BF^z = F^z \Be_z \in L^2(\Omega)$, the solution $\psi$ of the following problem \be \label{4-31} \left\{ \ba & \bar{U}(r) \partial_z (\mathcal{L} + \partial_z^2) \psi - (\mathcal{L} + \partial_z^2 )^2 \psi = - \partial_r F^z , \\ & \psi(0) = \psi(1) = \frac{\partial}{\partial r } \psi(1) = \mathcal{L} \psi (0) = 0, \ea \right. \ee satisfies \be \nonumber \|\Bv^r \|_{L^2(\Omega)} \leq C \Phi^{-\frac12} \|\BF^z\|_{L^2(\Omega)} \ \ \ \ \mbox{and}\ \ \ \ \|\Bv^r \|_{H^{\frac{19}{12}}(\Omega)} \leq C \Phi^{-\frac{1}{40}} \|\BF^z\|_{L^2(\Omega)}, \ee where $\Bv^r = v^r \Be_r = \partial_z \psi \Be_r$. \end{pro} \begin{proof} Taking the Fourier transform with respect to $z$ for the system \eqref{4-31} yields that for fixed $\xi $, $\hat{\psi}(r, \xi)$ satisfies \be \label{4-32} i \xi \bar{U}(r) (\mathcal{L}- \xi^2) \hat{\psi} - ( \mathcal{L} - \xi^2) \hat{\psi}= -\frac{d}{dr} \widehat{F^z}. \ee Multiplying \eqref{4-32} by $r\overline{\hat{\psi}}$ and integrating the resulting equation over $[0, 1]$ give \be \label{4-33} \xi \int_0^1 \frac{\bar{U}(r) }{r } \left| \frac{d}{dr} (r \hat{\psi} ) \right|^2 \, dr + \xi^3 \int_0^1 \bar{U}(r) |\hat{\psi}|^2 r \, dr = \Im \int_0^1 \widehat{F^z} \frac{d}{dr} ( r \overline{\hat{\psi}} ) \, dr. \ee This, together with Proposition \ref{propcase0}, implies \be \label{4-34} \Phi \xi^2 \int_0^1 \left| \frac{d}{dr}(r \hat{\psi} ) \right|^2 \frac{1- r^2}{r} \, dr \leq C |\xi| \int_0^1 |\widehat{F^z}| \left| \frac{d}{dr}(r \hat{\psi}) \right| \, dr \leq C \int_0^1 |\what{F^z}|^2 r \, dr. \ee Applying Lemma \ref{lemmaHLP} yields \be \label{4-35} \xi^2 \int_0^1 |\hat{\psi}|^2 r \, dr \leq C \xi^2 \int_0^1 \left| \frac{d}{dr} (r \hat{\psi} ) \right|^2 \frac{1-r^2}{r} \, dr \leq C \Phi^{-1} \int_0^1 |\widehat{F^z}|^2 r \, dr . \ee Therefore, one has \be \label{4-36} \| \Bv^r\|_{L^2(\Omega)} \leq C \Phi^{-\frac12} \|\BF^z\|_{L^2(\Omega)}. \ee It follows from the interpolation and Proposition \ref{existence-stream} that one has \be \label{4-37} \|\Bv^r\|_{H^{\frac{19}{12}}(\Omega)} \leq C \Phi^{-\frac{1}{40}} \|\BF^z \|_{L^2(\Omega)}. \ee This finishes the proof of Proposition \ref{further-estimate-2}. \end{proof} Now we are in position to analyze $v^\theta$. Taking the Fourier transform with respect to $z$ for the problem \eqref{swirlsystem} gives \be \label{swirl-Fourier} \left\{ \ba & i \xi \bar{U}(r) \what{v^\theta} - ( \mathcal{L} - \xi^2) \what{v^\theta} = \what{F^\theta}, \\ & \what{v^\theta}(1 ) = \what{v^\theta}(0) = 0 . \ea \right. \ee Let us first recall the uniform estimate for $v^\theta$ obtained in \cite{WXX1}. \begin{pro}\label{uniform-swirl}\cite[Proposition 3.1]{WXX1} Assume that $\what{v^\theta}$ is a smooth solution to the problem \eqref{swirl-Fourier}. For every fixed $\xi$, it holds that \be \label{swirl-uniform} \int_0^1 |\mathcal{L} \what{v^\theta}|^2 r \, dr + \xi^2 \int_0^1 \left| \frac{d}{dr} (r \what{v^\theta}) \right|^2 \frac1r \, dr + \xi^4 \int_0^1 |\what{v^\theta}|^2 r \, dr \leq C \int_0^1 |\what{F^\theta}|^2 r \, dr . \ee \end{pro} The next two propositions give some further estimates for $v^\theta$. \begin{pro}\label{further-estimate-3} Assume that $\BF^\theta = F^\theta \Be_\theta \in L^2(\Omega)$. The solution $v^\theta$ to the linear problem \eqref{swirlsystem} satisfies that \be \nonumber \|\partial_z \Bv^\theta \|_{L^2(\Omega)} \leq C \Phi^{-\frac13} \|\BF^\theta\|_{L^2(\Omega)}. \ee \end{pro} \begin{proof} Multiplying the equation in \eqref{swirl-Fourier} by $r \overline{\what{v^\theta}}$ and integrating the resulting equation over $[0, 1]$ yield \be \label{4-52} \int_0^1 i \xi \bar{U}(r) | \what{v^\theta} |^2 r \, dr + \int_0^1 \left| \frac{d}{dr} ( r \what{v^\theta}) \right|^2 \frac1r \, dr + \xi^2 \int_0^1 | \what{v^\theta} |^2 r \, dr = \int_0^1 \what{F^\theta} \overline{\what{v^\theta}} r \, dr. \ee It follows from H\"older inequality, Lemma \ref{lemma1}, and \eqref{4-52} that one has \be \label{4-53} \int_0^1 \left| \frac{d}{dr} ( r \what{v^\theta}) \right|^2 \frac1r \, dr + \xi^2 \int_0^1 | \what{v^\theta} |^2 r \, dr \leq \int_0^1 |\what{F^\theta}|^2 r \, dr \ee and \be \label{4-54} \Phi |\xi| \int_0^1 (1 - r^2) | \what{v^\theta} |^2 r \, dr \leq C \int_0^1 |\what{F^\theta}| |\what{v^\theta}| r \, dr . \ee The equality \eqref{4-54}, together with \eqref{swirl-uniform}, gives \be \label{4-56} \ba |\xi|^3 \int_0^1 (1 - r^2) |\widehat{v^\theta}|^2 r \, dr & \leq C \Phi^{-1} \left( \int_0^1 |\widehat{F^\theta}|^2 r \, dr \right)^{\frac12} \left( \xi^4 \int_0^1 |\widehat{v^\theta}|^2 r \, dr \right)^{\frac12} \\ & \leq C \Phi^{-1} \int_0^1 |\widehat{F^\theta}|^2 r \, dr. \ea \ee By Lemma \ref{weightinequality} and \eqref{4-53}, one has \be \label{4-56} \ba |\xi|^2 \int_0^1 (1 - r^2) |\widehat{v^\theta}|^2 r \, dr & \leq C \left( |\xi|^3 \int_0^1 (1 - r^2) |\widehat{v^\theta}|^2 r \, dr \right)^{\frac23} \left( \int_0^1 \left| \frac{d}{dr} ( r \widehat{v^\theta}) \right|^2 \frac1r \, dr \right)^{\frac13} \\ & \leq C \Phi^{-\frac23} \int_0^1 |\widehat{F^\theta}|^2 r \, dr . \ea \ee This implies \be \label{4-57} \|\partial_z \Bv^\theta\|_{L^2(\Omega)} \leq C \Phi^{-\frac13} \| \BF^\theta\|_{L^2(\Omega)}. \ee Hence the proof of Proposition \ref{further-estimate-3} is completed. \end{proof} \begin{pro}\label{further-estimate-4} Assume that $\BG^\theta = G^\theta \Be_{\theta} \in H^1(\Omega)$. The solution $v^\theta$ to the following linear problem \be \label{4-61} \left\{ \ba & \bar U(r) \partial_z v^\theta - \left[ \frac{1}{r} \frac{\partial }{\partial r} \left( r \frac{\partial v^\theta}{\partial r}\right) + \frac{\partial^2 v^\theta}{\partial z^2} - \frac{v^\theta}{r^2} \right] = \partial_z G^\theta \ \ \ \mbox{in}\ \ D, \\ & v^\theta(1, z)= v^\theta(0, z) = 0, \ea \right. \ee satisfies \be \nonumber \|\Bv^\theta\|_{L^2(\Omega)} \leq C \Phi^{-\frac13} \|\BG^\theta\|_{L^2(\Omega)} \ee and \be \nonumber \|\Bv^\theta \|_{H^{\frac{19}{12}} (\Omega)} \leq C \Phi^{-\frac{5}{72}} \|\partial_z \BG^\theta \|_{L^2(\Omega)}^{\frac{19}{24}} \|\BG^\theta \|_{L^2(\Omega)}^{\frac{5}{24}}. \ee \end{pro} \begin{proof} Similar computations as that in the proof of Proposition \ref{further-estimate-3} yield \be \label{4-62} \int_0^1 i \xi \bar{U}(r) |\what{v^\theta}|^2 r \, dr + \int_0^1 \left| \frac{d}{dr}( r \what{v^\theta} ) \right|^2 \frac1r \, dr + \xi^2 \int_0^1 |\what{v^\theta}|^2 r \, dr = i \xi \int_0^1 \what{G^\theta} \overline{\what{v^\theta}} r \, dr . \ee It follows from H\"older inequality and Lemma \ref{lemma1} that one has \be \label{4-63} \int_0^1 \left| \frac{d}{dr} (r \what{v^\theta}) \right|^2 \frac1r \, dr + \xi^2 \int_0^1 |\what{v^\theta}|^2 r \, dr \leq C \int_0^1 |\what{G^\theta}|^2 r \, dr \ee and \be \label{4-64} \Phi \int_0^1 (1 - r^2) |\what{v^\theta}|^2 r \, dr \leq C \int_0^1 |\what{G^\theta}|^2 r \, dr. \ee Hence, it holds that \be \label{4-65} \ba \int_0^1 |\what{v^\theta}|^2 r \, dr & \leq C \left( \int_0^1 (1 - r^2) |\what{v^\theta} |^2 r \, dr \right)^{\frac23} \left( \int_0^1 \left| \frac{d}{dr} ( r \what{v^\theta} ) \right|^2 \frac1r \, dr \right)^{\frac13} \\ & \leq C \Phi^{-\frac23} \int_0^1 |\what{G^\theta}|^2 r \, dr . \ea \ee This implies \be \label{4-66} \| \Bv^\theta \|_{L^2(\Omega)} \leq C \Phi^{-\frac13} \|\BG^\theta\|_{L^2(\Omega)}. \ee By the interpolation and Proposition \ref{existence-swirl}, one has \be \label{4-67} \ba \|\Bv^\theta \|_{H^{\frac{19}{12}}(\Omega)} & \leq C \|\Bv^\theta\|_{L^2(\Omega)}^{\frac{5}{24}} \|\Bv^\theta\|_{H^2(\Omega)}^{\frac{19}{24}} \leq C \Phi^{-\frac{5}{72}} \|\BG^\theta \|_{L^2(\Omega)}^{\frac{5}{24}} \|\partial_z \BG^\theta\|_{L^2(\Omega)}^{\frac{19}{24}}. \ea \ee Hence the proof of Proposition \ref{further-estimate-4} is finished. \end{proof} \section{Existence and Uniqueness of solutions for nonlinear problem}\label{secnonlinear} In this section, we prove the existence and uniqueness of strong axisymmetric solution of the nonlinear problem \eqref{NS}-\eqref{fluxBC}, in particular, when $\BF$ and $\Phi$ are large. The stream function $\psi$ satisfies the following equation \be \label{ap-40} \ba & \bar{U}(r) \partial_z (\mathcal{L} + \partial_z^2) \psi - (\mathcal{L} + \partial_z^2)^2 \psi \\ = & \partial_z F^r - \partial_r F^z - \partial_r (v^r \omega^\theta) - \partial_z (v^z \omega^\theta) + \partial_z \left[ \frac{\left( v^\theta \right)^2 }{r} \right] , \ea\ee supplemented with the boundary condition, \be \label{ap-41} \psi(0, z) = \psi(1, z) = \partial_r \psi(1, z) = \mathcal{L}\psi(0, z)= 0 . \ee Here $\omega^\theta = -\partial_r v^z + \partial_z v^r = ( \mathcal{L} + \partial_z^2) \psi$. The swirl velocity $\Bv^\theta = v^\theta \Be_\theta $ satisfies the equation \be \label{ap-42} \bar{U}(r) \partial_z \Bv^\theta - \Delta \Bv^\theta = \BF^\theta - ( v^r \partial_r + v^z \partial_z ) \Bv^\theta - \frac{v^r}{r} \Bv^\theta \ee supplemented with the homogeneous boundary condition \be \label{ap-43} \Bv^\theta = 0\ \ \ \mbox{on}\ \partial \Omega. \ee \begin{proof}[Proof of Theorem \ref{mainresult1}] We divide the proof into three steps. {\it Step 1. Iteration scheme.} The existence of solutions is proved via an iteration method. Let $\BF^* = F^r \Be_r + F^z \Be_z$. For any given $\BF = \left( \BF^* , \BF^\theta \right) \in L^2 (\Omega) \times L^2(\Omega)$, there exists a unique solution $(\psi, \Bv^\theta)$ to the combined linear problem \eqref{vswirl}, \eqref{BC-swirl}, and \eqref{2-0-4-1}--\eqref{2-0-4-4}, and we denote this solution by $ \mathcal{T} \BF$. Let \be \nonumber \BPsi_0 = \mathcal{T} \BmcF, \quad \BPsi_n=(\psi_n , \Bv_n^\theta), \ee and \be \label{ap-50} \BPsi_{n+1} = \BPsi_0 + \mathcal{T} (\BF^*_n , \BF^\theta_n) \ee with \be \BF^*_n = \left[ - v_n^z \omega_n^\theta + \frac{(v_n^\theta)^2 }{r} \right]\Be_r + v_n^r \omega_n^\theta \Be_z ,\ \ \ \ \BF^\theta_n = -(v_n^r \partial_r + v_n^z \partial_z) \Bv^\theta_n - \frac{v_n^r}{r} \Bv_n^\theta, \ee where \be \nonumber v_i^r = \partial_z \psi_i , \ \ \ \ v_i^z = -\frac{\partial_r(r \psi_i)}{r} ,\ \ \ \ v_i^\theta = \Bv_i^\theta \cdot \Be_\theta,\ \ \ \ \ \omega_i^\theta = - \partial_r v_i^z + \partial_z v_i^r, \ \ \ i \in \mathbb{N}. \ee Set \be \nonumber S = \left\{ (\psi, \Bv^\theta) \in H_*^3(D) \times H^2(\Omega) \left| \ba & \|\Bv^*\|_{H^{\frac{19}{12}} (\Omega)} \leq 2 C_1 \Phi^{\frac{1}{96}}, \ \ \ \|\Bv^r \|_{L^2(\Omega)} \leq \Phi^{-\frac{15}{32}} \\ & \|\Bv^\theta \|_{H^{\frac{19}{12}}(\Omega)}\leq 2C_2 \Phi^{\frac{1}{96}}, \ \|\partial_z \Bv^\theta\|_{L^2(\Omega)} \leq \Phi^{-\frac{5}{16}} \ea \right. \right\}. \ee Here $C_1$ and $C_2$ are the two constants indicated in Propositions \ref{existence-stream}-\ref{existence-swirl}. Under the assumption that $\|\BF\|_{L^2(\Omega)} \leq \Phi^{\frac{1}{96}}$, according to Propositions \ref{existence-stream}-\ref{existence-swirl}, Propositions \ref{further-estimate-1}-\ref{further-estimate-3}, one has $\BPsi_0 \in S$, when $\Phi$ is large enough. Assume that $\BPsi_n \in S $, our aim is to prove $\BPsi_{n+1} \in S $. {\it Step 2. Estimate for the velocity field and existence.} Denote $\Bv^*_i = v_i^r \Be_r + v_i^z \Be_z $. It follows from Sobolev embedding inequalities that the estimates \be \label{ap-51} \ba & \|v_n^r \omega_n^\theta \|_{L^2(\Omega) } \leq C \|v_n^r \|_{L^{12}(\Omega)} \|\omega_n^\theta \|_{L^{\frac{12}{5}}(\Omega)} \leq C \|\Bv_n^r\|_{L^2(\Omega)}^{\frac16} \|\Bv_n^r\|_{L^\infty(\Omega)}^{\frac56} \|\Bv^*_n\|_{H^{\frac{19}{12}}(\Omega)} \\ \leq & C \|\Bv_n^r\|_{L^2(\Omega)}^{\frac16}\|\Bv^*_n\|_{H^{\frac{19}{12}}(\Omega)}^{\frac{11}{6}} \leq C \Phi^{-\frac{15}{32} \cdot \frac{1}{6}} \Phi^{ \frac{1}{96} \cdot \frac{11}{6}} \ea \ee and \be \label{ap51-1} \| v_n^z \omega_n^\theta \|_{L^2(\Omega)} \leq \|v_n^z \|_{L^\infty(\Omega)} \| \omega_n^\theta\|_{L^2(\Omega)} \leq C \|\Bv^*_n\|_{H^{\frac{19}{12}}(\Omega)}^2 \leq C \Phi^{\frac{1}{48}} \ee hold. Moreover, one has \be \label{ap51-2} \left\| v_n^\theta \frac{v_n^\theta}{r} \right \|_{L^2(\Omega)} \leq C \|\Bv_n^\theta\|_{L^\infty(\Omega)} \left\| \frac{\Bv_n^\theta}{r} \right\|_{L^2(\Omega)} \leq C \|\Bv_n^\theta \|_{H^{\frac{19}{12}} (\Omega) } \|\Bv_n^\theta \|_{H^1(\Omega)} \leq C \Phi^{\frac{1}{48}}. \ee Similarly, using Sobolev embedding inequalities gives \be \label{ap-54} \ba & \| v_n^r \partial_r \Bv_n^\theta\|_{L^2(\Omega)} \leq C \|v_n^r\|_{L^\infty(\Omega)} \|\partial_r \Bv_n^\theta\|_{L^2(\Omega)} \leq C \|v_n^r\|_{L^2(\Omega)}^{\frac{1}{19}} \|\Bv^*\|_{H^{\frac{19}{12}}(\Omega)}^{\frac{18}{19} } \|\Bv_n^\theta \|_{H^1(\Omega)} \\ \leq & C \Phi^{-\frac{15}{32} \cdot \frac{1}{19}} \Phi^{\frac{1}{96} \cdot \frac{37}{19}} \ea \ee and \be \label{ap-55} \ba & \| v_n^z \partial_z \Bv_n^\theta \|_{L^2(\Omega)} \leq \|v_n^z \|_{L^\infty(\Omega)} \| \partial_z \Bv_n^\theta\|_{L^2(\Omega)} \leq C \|\Bv^*_n \|_{H^{\frac{19}{12}}(\Omega)} \|\partial_z \Bv_n^\theta\|_{L^2(\Omega)} \leq C \Phi^{\frac{1}{96}} \Phi^{-\frac{5}{16}}. \ea \ee Furthermore, it holds that \be \label{ap-56} \left \|v_n^r \frac{\Bv_n^\theta}{r} \right \|_{L^2(\Omega)} \leq C \|v_n^r \|_{L^\infty(\Omega)} \left\| \frac{\Bv_n^\theta }{r} \right\|_{L^2(\Omega)} \leq C \Phi^{-\frac{15}{32}\cdot \frac{1}{19}} \Phi^{\frac{1}{96} \cdot \frac{37}{19}} . \ee Combining the estimates \eqref{ap-51}--\eqref{ap-56} and applying Propositions \ref{existence-stream}-\ref{existence-swirl}, \ref{further-estimate-1} yield \be \label{ap-58} \| \Bv^*_{n+1} \|_{H^{\frac{19}{12}} (\Omega)} \leq C_1 \Phi^{\frac{1}{96}} + C_3 \left( \Phi^{-\frac{15}{32}\cdot \frac{1}{6}} \Phi^{ \frac{1}{96} \cdot \frac{11}{6}} + \Phi^{-\frac{1}{30}}\Phi^{\frac{1}{48}} \right) \ee and \be \label{ap-59} \|\Bv_{n+1}^\theta \|_{H^{\frac{19}{12}}(\Omega)} \leq C_2 \Phi^{\frac{1}{96}} + C_4 \left( \Phi^{-\frac{15}{32}\cdot \frac{1}{19}} \Phi^{\frac{1}{96} \cdot \frac{37}{19}} + \Phi^{\frac{1}{96}} \Phi^{-\frac{5}{16}} \right). \ee Moreover, it follows from Propositions \ref{further-estimate-1}--\ref{further-estimate-3} that one has \be \label{ap-60} \|\Bv_{n+1}^r\|_{L^2(\Omega) } \leq C_5 \max \left\{ \Phi^{-\frac12}, \ \Phi^{-\frac23} \right\} \left( \Phi^{\frac{1}{96}} + \Phi^{-\frac{15}{32} \cdot \frac{1}{6}} \Phi^{ \frac{1}{96} \cdot \frac{11}{6}} + \Phi^{-\frac{1}{30}}\Phi^{\frac{1}{48}} \right) \ee and \be \label{ap-61} \| \partial_z \Bv_{n+1}^\theta \|_{L^2(\Omega)} \leq C_6 \Phi^{-\frac13} \left( \Phi^{\frac{1}{96}} + \Phi^{-\frac{15}{32} \cdot \frac{1}{19}} \Phi^{\frac{1}{96} \cdot \frac{37}{19}} + \Phi^{\frac{1}{96}} \Phi^{-\frac{5}{16}} \right). \ee Choose a constant $\Phi_0$ large enough such that \be \nonumber C_3 \left( \Phi_0^{-\frac{15}{32}\cdot \frac{1}{6}} \Phi_0^{ \frac{1}{96} \cdot \frac{11}{6}} + \Phi_0^{-\frac{1}{30}}\Phi_0^{\frac{1}{48}} \right)< C_1\Phi_0^{\frac{1}{96}}, \ \ \ \ C_4 \left( \Phi_0^{-\frac{15}{32}\cdot \frac{1}{19}} \Phi_0^{\frac{1}{96} \cdot \frac{37}{19}} + \Phi_0^{\frac{1}{96}} \Phi_0^{-\frac{5}{16}} \right) < C_2 \Phi_0^{\frac{1}{96}}, \ee and \be \nonumber C_5 \Phi_0^{-\frac12} \left( \Phi_0^{\frac{1}{96}} + \Phi_0^{-\frac{15}{32} \cdot \frac{1}{6}} \Phi_0^{ \frac{1}{96} \cdot \frac{11}{6}} + \Phi_0^{-\frac{1}{30}}\Phi_0^{\frac{1}{48}} \right) < \Phi_0^{-\frac{15}{32}}, \ee \be \nonumber C_6 \Phi_0^{-\frac13} \left( \Phi_0^{\frac{1}{96}} + \Phi_0^{-\frac{15}{32} \cdot \frac{1}{19}} \Phi_0^{\frac{1}{96} \cdot \frac{37}{19}} + \Phi_0^{\frac{1}{96}} \Phi_0^{-\frac{5}{16}} \right) < \Phi_0^{-\frac{5}{16}}. \ee When $\Phi \geq \Phi_0$, the estimates \eqref{ap-58}--\eqref{ap-61} imply that $(\psi_{n+1}, \Bv_{n+1}^\theta) \in S $. By mathematical induction, $\BPsi_n\in S $ for every $n \in \mathbb{N}$. Note that $\Bv_n = \Bv_n^* + \Bv_n^\theta $. The above estimates show that \be \label{ap-71} \|\Bv_n\|_{H^{\frac{19}{12} }(\Omega)} \leq C_0 \Phi^{\frac{1}{96}}\ \ \ \, \text{for every}\,\, n \in \mathbb{N}. \ee Since $\{ \Bv_{n} \}$ is uniformly bounded in $H^{\frac{19}{12}}(\Omega)$, there exists a vector-valued function $\Bv \in H^{\frac{19}{12}}(\Omega)$ such that $ \Bv_{n} \rightharpoonup \Bv $ in $H^{\frac{19}{12}}(\Omega)$ and \be \nonumber \|\Bv \|_{H^2(\Omega)} \leq C_0 \Phi^{\frac{1}{96}}. \ee Meanwhile, as proved in \cite{WXX1}, the equation \eqref{ap-50} implies that \be \label{ap-72} {\rm curl}~\left( (\bBU \cdot \nabla ) \Bv_{n+1} + ( \Bv_{n+1} \cdot \nabla ) \bBU - \Delta \Bv_{n+1} + (\Bv_{n} \cdot \nabla ) \Bv_{n} - \BF \right) = 0. \ee Taking the limit of the equation \eqref{ap-72} yields \be \label{ap-74} {\rm curl}~\left( (\bBU \cdot \nabla ) \Bv + ( \Bv \cdot \nabla ) \bBU - \Delta \Bv + (\Bv \cdot \nabla ) \Bv - \BF \right) = 0. \ee Hence, there exists a function $P$ with $\nabla P \in L^2(\Omega)$, satisfying \be \label{ap-73} (\bBU \cdot \nabla ) \Bv + ( \Bv \cdot \nabla ) \bBU - \Delta \Bv + (\Bv \cdot \nabla ) \Bv + \nabla P = \BF. \ee Moreover, according to the regularity estimates in Propositions \ref{existence-stream}-\eqref{existence-swirl}, it holds that \be \label{ap-74} \ba & \|\Bv\|_{H^2(\Omega)} \leq C (1 + \Phi^{\frac14} ) \|\BF\|_{L^2(\Omega)} + C (1 + \Phi^{\frac14}) \|(\Bv \cdot \nabla )\Bv\|_{L^2(\Omega)} \\ \leq & C \Phi^{\frac14} \Phi^{\frac{1}{96}} + C \Phi^{\frac14} \|\Bv\|_{H^{\frac{19}{12}} (\Omega)}^2 \leq C \Phi^{\frac{7}{24}}. \ea \ee Let $\Bu = \Bv + \bBU$. Then $\Bu$ is a solution of the problem \eqref{NS}-\eqref{fluxBC}. {\it Step 3. Uniqueness.} Suppose there are two axisymmetric solutions $\Bu$ and $\tilde{\Bu}$ of the problem \eqref{NS}--\eqref{fluxBC}, satisfying \be \label{ap-77} \|\Bu - \bBU \|_{H^{\frac{19}{12}}(\Omega)} \leq C_0 \Phi^{\frac{1}{96}}, \ \ \ \|\tilde{\Bu} - \bBU\|_{H^{\frac{19}{12}}(\Omega)} \leq C_0 \Phi^{\frac{1}{96}}, \ee and \be \label{ap-78} \|\tilde{\Bu}^r \|_{L^2(\Omega)} \leq \Phi^{-\frac{15}{32}}. \ee Let \be \nonumber \Bv = \Bu - \bBU= v^r \Be_r + v^\theta \Be_\theta + v^z \Be_z, \ \ \ \ \tilde{\Bv} = \tilde{\Bu}- \bBU= \tilde{v}^r \Be_r + \tilde{v}^\theta \Be_\theta + \tilde{v}^z \Be_z . \ee Suppose that $\psi$ and $\tilde{\psi}$ are the stream functions associated with the vector fields $\Bv$ and $\tilde{\Bv}$, respectively. Then $\psi- \tilde{\psi}$ satisfies the following equation, \be \nonumber \ba & \bar{U}(r) \partial_z (\mathcal{L} + \partial_z^2)(\psi - \tilde{\psi} ) - (\mathcal{L} + \partial_z^2)^2 (\psi -\tilde{\psi}) \\ = & - \partial_r (v^r \omega^\theta - \tilde{v}^r \tilde{\omega}^\theta ) - \partial_z (v^z \omega^\theta - \tilde{v}^z \tilde{\omega}^\theta) + 2 \partial_z \left( \frac{v^\theta}{r} v^\theta - \frac{\tilde{v}^\theta}{r} \tilde{v}^\theta \right). \ea \ee It follows from Sobolev's embedding inequalities that one has \be \label{ap-81}\ba & \|v^r \omega^\theta - \tilde{v}^r \tilde{\omega}^\theta \|_{L^2(\Omega)} \leq \| v^r - \tilde{v}^r \|_{L^6(\Omega)} \|\omega^\theta\|_{L^3(\Omega)} + \| \tilde{v}^r \|_{L^6(\Omega)} \| \omega^\theta - \tilde{\omega}^\theta \|_{L^3(\Omega)} \\ \leq & C \|\Bv^r- \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)} \|\Bv^* \|_{H^{\frac{19}{12}} (\Omega)} + C \|\tilde{\Bv}^r \|_{L^2(\Omega)}^{\frac13} \|\tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)}^{\frac23} \|\Bv^* - \tilde{\Bv}^* \|_{H^{\frac{19}{12}} (\Omega)} \\ \leq & C \|\Bv^r- \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)} \Phi^{\frac{1}{96} } + C \|\Bv^* - \tilde{\Bv}^*\|_{H^{\frac{19}{12}}(\Omega)} \Phi^{-\frac{15}{32}\cdot \frac13+ \frac{1}{96} \cdot \frac23 } \ea \ee and \be \label{ap-82} \ba & \|v^z \omega^\theta - \tilde{v}^z \tilde{\omega}^\theta \|_{L^2(\Omega)} \leq C \|v^z - \tilde{v}^z \|_{L^6(\Omega)} \|\omega^\theta\|_{L^3(\Omega)} + C \|\tilde{v}^z \|_{L^6(\Omega)} \|\omega^\theta - \tilde{\omega}^\theta\|_{L^3(\Omega)} \\ \leq & C \|\Bv^* - \tilde{\Bv}^* \|_{H^{\frac{19}{12}} (\Omega)} \left( \|\Bv^* \|_{H^{\frac{19}{12}} (\Omega)} + \| \tilde{\Bv}^* \|_{H^{\frac{19}{12}} (\Omega)} \right) \leq C \|\Bv^* - \tilde{\Bv}^* \|_{H^{\frac{19}{12}} (\Omega)} \Phi^{\frac{1}{96}}. \ea \ee Similarly, it holds that \be \label{ap-83} \ba & \left\| \frac{v^\theta}{r} v^\theta - \frac{\tilde{v}^\theta}{r} \tilde{v}^\theta \right\|_{L^2(\Omega)} \leq C \| \Bv^\theta - \tilde{\Bv}^\theta\|_{H^{\frac{19}{12}}(\Omega)} \left( \|\Bv^\theta \|_{H^{\frac{19}{12}}(\Omega)} + \| \tilde{\Bv}^\theta \|_{H^{\frac{19}{12} } (\Omega)} \right) \\ \leq & C \| \Bv^\theta - \tilde{\Bv}^\theta\|_{H^{\frac{19}{12}}(\Omega)} \Phi^{\frac{1}{96} }. \ea \ee Combining the above estimates \eqref{ap-81}--\eqref{ap-83}, it follows from Propositions \ref{further-estimate-1}--\ref{further-estimate-2} that one has \be \label{ap-85} \ba \Phi^{\frac{1}{80}} \|\Bv^r - \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)} \leq C \Phi^{\frac{1}{80}} \Phi^{-\frac{1}{40}} & \left[ \Phi^{\frac{1}{96}} \|\Bv^r- \tilde{\Bv}^r\|_{H^{\frac{19}{12}} (\Omega)} + \Phi^{-\frac{43}{96} \cdot \frac13} \|\Bv^* - \tilde{\Bv}^* \|_{H^{\frac{19}{12}} (\Omega)} \right. \\ & \left. \ \ \ \ + \Phi^{\frac{1}{96}} \|\Bv^* - \tilde{\Bv}^* \|_{H^{\frac{19}{12}} (\Omega)} + \Phi^{\frac{1}{96}} \|\Bv^\theta- \tilde{\Bv}^\theta \|_{H^{\frac{19}{12} } (\Omega)} \right] \ea \ee and \be \label{ap-86} \ba \|\Bv^z - \tilde{\Bv}^z \|_{H^{\frac{19}{12}} (\Omega)} \leq & C \Phi^{\frac{1}{96}- \frac{1}{80}} \Phi^{\frac{1}{80} } \|\Bv^r - \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)} + C \Phi^{-\frac{43}{96} \cdot \frac13} \|\Bv^* - \tilde{\Bv}^* \|_{H^{\frac{19}{12}} (\Omega)} \\ &\ \ + C \Phi^{-\frac{1}{30}} \Phi^{\frac{1}{96} } \left[ \|\Bv^* - \tilde{\Bv}^* \|_{H^{\frac{19}{12}} (\Omega)} + \|\Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12} } (\Omega)} \right]. \ea \ee On the other hand, $\Bv^\theta - \tilde{\Bv}^\theta$ satisfies \be \nonumber \ba & \bar{U}(r) \partial_z (\Bv^\theta - \tilde{\Bv}^\theta) - \Delta (\Bv^\theta - \tilde{\Bv}^\theta)\\ = & - \left( v^r \partial_r \Bv^\theta - \tilde{v}^r \partial_r \tilde{\Bv}^\theta \right) - 2 \left( v^r \frac{\Bv^\theta}{r} - \tilde{v}^r \frac{\tilde{\Bv}^\theta }{r} \right) -\left( \partial_r v^r \Bv^\theta - \partial_r \tilde{v}^r \tilde{\Bv}^\theta \right) - \partial_z \left( v^z \Bv^\theta - \tilde{v}^z \tilde{\Bv}^\theta \right). \ea \ee It follows from Sobolev's embedding inequalities that one has \be \label{ap-87} \ba & \| v^r \partial_r \Bv^\theta - \tilde{v}^r \partial_r \tilde{\Bv}^\theta \|_{L^2(\Omega)} \leq \|v^r - \tilde{v}^r \|_{L^\infty(\Omega)} \|\partial_r \Bv^\theta \|_{L^2(\Omega)} + \|\tilde{v}^r \|_{L^\infty(\Omega)} \|\partial_r {\Bv}^\theta - \partial_r \tilde{v}^\theta \|_{L^2(\Omega) }\\ \leq & C \Phi^{\frac{1}{96}} \|\Bv^r - \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)} + C \|\tilde{\Bv}^r\|_{L^2(\Omega)}^{\frac{1}{19}} \|\tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)}^{\frac{18}{19}} \|\Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12} } (\Omega)} \\ \leq & C \Phi^{\frac{1}{96}- \frac{1}{80} } \Phi^{\frac{1}{80}} \|\Bv^r - \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)} + C \Phi^{-\frac{15}{32} \cdot \frac{1}{19}} \Phi^{\frac{1}{96} \cdot \frac{18}{19} } \|\Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12} } (\Omega)}. \ea \ee The similar computations give \be \label{ap-88} \left\| v^r \frac{\Bv^\theta}{r} - \tilde{v}^r \frac{\tilde{\Bv}^\theta}{r} \right\|_{L^2(\Omega)} \leq C \Phi^{\frac{1}{96}- \frac{1}{80} } \Phi^{\frac{1}{80}} \|\Bv^r - \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)} + C \Phi^{-\frac{15}{32} \cdot \frac{1}{19}} \Phi^{\frac{1}{96} \cdot \frac{18}{19} } \|\Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12} } (\Omega)} \ee and \be \label{ap-89} \ba & \| \partial_r v^r \Bv^\theta - \partial_r \tilde{v}^r \tilde{\Bv}^\theta\|_{L^2(\Omega)} \\ \leq & C \|\partial_r v^r - \partial_r \tilde{v}^r \|_{L^2(\Omega)} \|\Bv^\theta \|_{L^\infty(\Omega)} + C \|\partial_r \tilde{v}^r\|_{L^2(\Omega)} \|\Bv^\theta - \tilde{\Bv}^\theta \|_{L^\infty(\Omega)} \\ \leq & C \|\Bv^r - \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)} \|\Bv^\theta \|_{H^{\frac{19}{12}} (\Omega)} + C \|\tilde{\Bv}^r \|_{L^2(\Omega)}^{\frac{7}{19}} \| \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)}^{\frac{12}{19} } \|\Bv^\theta - \tilde{\Bv}^\theta \|_{L^\infty(\Omega)}\\ \leq & C \Phi^{\frac{1}{96}- \frac{1}{80} } \Phi^{\frac{1}{80} }\|\Bv^r - \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)} + C \Phi^{-\frac{15}{32} \cdot \frac{7}{19} + \frac{1}{96} \cdot \frac{12}{19} } \|\Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12}}(\Omega)} . \ea \ee Moreover, \be \label{ap-90} \ba & \| v^z \Bv^\theta - \tilde{v}^z \tilde{\Bv}^\theta \|_{L^2(\Omega) } \leq C \| \Bv^z - \tilde{\Bv}^z \|_{H^{\frac{19}{12}} (\Omega)} \|\Bv^\theta \|_{H^{\frac{19}{12}} (\Omega)} + C \|\tilde{\Bv}^z \|_{H^{\frac{19}{12}} (\Omega)} \| \Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12}} (\Omega)} \\ \leq & C \Phi^{\frac{1}{96}} \left( \| \Bv^z - \tilde{\Bv}^z \|_{H^{\frac{19}{12}} (\Omega)} + \| \Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12}} (\Omega)} \right), \ea \ee and \be \label{ap-91} \ba & \|\partial_z (v^z \Bv^\theta ) - \partial_z (\tilde{v}^z \tilde{\Bv}^\theta ) \|_{L^2(\Omega)} \\ \leq & C \Phi^{\frac{1}{96}} \left( \| \Bv^z - \tilde{\Bv}^z \|_{H^{\frac{19}{12}} (\Omega)} + \| \Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12}} (\Omega)} \right). \ea \ee Combining the estimates \eqref{ap-87}--\eqref{ap-91}, it follows from Propositions \ref{further-estimate-3}--\ref{further-estimate-4} that \be \label{ap-92} \ba \|\Bv^\theta - \tilde{\Bv}^\theta\|_{H^{\frac{19}{12}} (\Omega)} \leq & C \Phi^{\frac{1}{96}- \frac{1}{80} } \Phi^{\frac{1}{80}} \|\Bv^r - \tilde{\Bv}^r \|_{H^{\frac{19}{12}} (\Omega)} + C \Phi^{-\frac{15}{32} \cdot \frac{1}{19}} \Phi^{\frac{1}{96} \cdot \frac{18}{19} } \|\Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12} } (\Omega)} \\ & \ + C \Phi^{-\frac{101}{608}} \|\Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12}}(\Omega)} + C \Phi^{-\frac{17}{288}} \left( \|\Bv^z - \tilde{\Bv}^z \|_{H^{\frac{19}{12}}(\Omega)} + \|\Bv^\theta - \tilde{\Bv}^\theta \|_{H^{\frac{19}{12}}(\Omega)} \right). \ea \ee Combining the three estimates \eqref{ap-85}--\eqref{ap-86} and \eqref{ap-92} together gives the uniqueness of the solution when $\Phi$ is large enough. Thus the proof of Theorem \ref{mainresult1} is finished. \end{proof} \section{Asymptotic Behavior}\label{sec-asymp} In this section, we investigate the asymptotic behavior of solutions to \eqref{NS}--\eqref{fluxBC} and prove Theorem \ref{mainresult2}. The proof consists of two steps. In the first step, the asymptotic behavior of the solution which is a small perturbation of Hagen-Poiseuille flow is established. In the second step, the smallness requirement is removed since the solution be a small perturbation of Hagen-Poiseuille flow at far fields when the condition \eqref{condu1} is satisfied. Before giving the detailed proof of Theorem \ref{mainresult2}, we first state the uniform estimate of $\psi$ for the linear problem \eqref{2-0-4-1}--\eqref{2-0-4-4} when $f\in L_r^2(D)$. \begin{pro} \label{uniformestimate} Assume that $f(r, z) \in L_r^2(D)$, the solution $\psi$ obtained in Proposition \ref{existence-stream} belongs to $H_*^3(D)$ and satisfies \be \label{5-101} \|\Bv^*\|_{H^{\frac53}(\Omega)} \leq C \|f\|_{L_r^2(D)}, \ \ \ \ \ \ \ \|\Bv^*\|_{H^{2}(\Omega)} \leq C (1 + \Phi^{\frac14} ) \|f\|_{L_r^2(D)} \ee where the constant $C$ is independent of $\Phi$. \end{pro} \begin{proof} Let $F(r, z) = - \int_r^1 f(r, z) \, dz.$ Hence, $f(r, z) = \partial_r F(r, z)$. Moreover, for every $(r, z) \in D$, by H\"older inequality, \be \nonumber |F(r , z) | \leq \left( \int_0^1 |f(s, z)|^2 s \, ds \right)^{\frac12} | \ln r|^{\frac12}, \ee which implies that \be \nonumber \|F\|_{L_r^2(D)}^2 \leq C \int_{-\infty}^{+\infty} \int_0^1 |f|^2 s \, ds \cdot \int_0^1 |\ln r| r \, dr \leq C \|f\|_{L_r^2(D)}^2. \ee This, together with the regularity estimates in Proposition \ref{existence-stream}, finishes the proof of Proposition \ref{uniformestimate}. \end{proof} The following lemma on the estimate between the stream function and the velocity field is needed in the proof of Theorem \ref{mainresult2}. \begin{lemma}\label{newlemma} Assume that $\Bv^* = v^r \Be_r + v^z \Be_z \in H^2(\Omega)$ and $\Bv^*$ is axisymmetric. Let $\psi \in H_*^3(D)$ be the corresponding stream function of the velocity field $\Bv^*$. It holds that \be \label{5-105} \|\mathcal{L} \psi \|_{L_r^2(D)} + \|\partial_z^2 \psi \|_{L_r^2(D)} + \left\| \frac{1}{r} \frac{\partial}{\partial r}(r \psi ) \right\|_{L_r^2(D)} + \|\partial_z \psi \|_{L_r^2(D)} + \|\psi \|_{L_r^2(D)} \leq C \|\Bv^*\|_{H^1(\Omega)} \ee and \be \label{5-106} \| \psi \Be_r\|_{H^2(\Omega)} \leq C \|\Bv^*\|_{H^1(\Omega)}. \ee \end{lemma} \begin{proof} Recall that the stream function $\psi$ of the vector field $\Bv^*$ satisfies \be \label{5-107} (\mathcal{L} + \partial_z^2) \psi = \partial_z v^r - \partial_r v^z \ \ \ \ \mbox{in}\ D. \ee Multiplying \eqref{5-107} by $(\mathcal{L} + \partial_z^2) \psi r $ and integrating over $D$, integration by parts gives \be \label{5-108} \ba & \int_{-\infty}^{+\infty} \int_0^1 \left[ |\mathcal{L} \psi |^2 r + 2 |\partial_r \partial_z (r \psi )|^2 \frac1r + |\partial_z^2 \psi |^2 r \right] \, dr dz \\ \leq & C \int_{-\infty}^{+\infty} \int_0^1 |\partial_z v^r - \partial_r v^z |^2 r \, dr dz \leq C \|\Bv^*\|_{H^1(\Omega)}^2 . \ea \ee Furthermore, by Lemma \ref{lemma1} and \eqref{5-108}, one has \be \label{5-109} \ba & \left\| \frac{1}{r} \frac{\partial}{\partial r}(r \psi ) \right\|_{L_r^2(D)} + \|\partial_z \psi \|_{L_r^2(D)} + \|\psi \|_{L_r^2(D)} \\ \leq & C \|\mathcal{L} \psi \|_{L_r^2(D)} + C \left\| \frac1r \frac{\partial^2}{\partial r \partial z} (r \psi ) \right\|_{L_r^2(D)} \leq C \|\Bv^*\|_{H^1(\Omega)}. \ea \ee The straightforward computations yield \be \nonumber \left\{ \ba & \Delta (\psi \Be_r ) = (\mathcal{L} + \partial_z^2) \psi \Be_r , \ \ \ \mbox{in}\ \Omega, \\ & \psi = 0,\ \ \ \ \mbox{on}\ \partial \Omega. \ea \right. \ee It follows from the regularity theory for elliptic equations \cite{GT} and \eqref{5-108} that one has \be \label{5-111} \|\psi \Be_r\|_{H^2(\Omega)} \leq C \| (\mathcal{L} + \partial_z^2) \psi \Be_r \|_{L^2(\Omega)} \leq C \|\Bv^*\|_{H^1(\Omega)}. \ee The proof of Lemma \ref{newlemma} is completed. \end{proof} \begin{pro} \label{mainresult3} Assume that $\BF \in L^2(\Omega)$, $\BF= \BF(r, z)$ is axisymmetric, and $\Bu \in H^2(\Omega)$ is an axisymmetric solution to the problem \eqref{NS}--\eqref{fluxBC}. There exist a constant $\epsilon_0$, independent of $\BF$ and $\Phi$, and a constant $\alpha_0(\leq 1)$ depending on $\Phi$, such that if \be \label{condition5} \|e^{\alpha |z|} \BF\|_{L^2(\Omega)} < + \infty\ \ \ \ \ee {with some} $\alpha \in (0, \alpha_0)$ and \be \label{condition5-1} \|\Bu - \bBU\|_{H^{\frac53}(\Omega)} \leq \epsilon_0, \ee then the solution $\Bu$ satisfies \be \label{asy0} \|e^{\alpha |z| } ( \Bu - \bBU) \|_{H^{\frac53}(\Omega)} \leq C \|e^{\alpha |z| }\BF\|_{L^2(\Omega)}. \ee Here $C$ is a uniform constant independent of $\BF$ and $\Phi$. \end{pro} \begin{proof} Let $\Bv = \Bu - \bBU$ and $\psi$ be the stream function associated with the vector field $\Bv$. Then $(\psi, \Bv^\theta)$ satisfies the problem \eqref{ap-40}--\eqref{ap-43}. Multiplying \eqref{ap-40} and \eqref{ap-42} by $e^{\alpha z}$ gives \be \label{asy1} \ba & \bar{U}(r) \partial_z (\mathcal{L} + \partial_z^2) (e^{\alpha z} \psi) - (\mathcal{L} + \partial_z^2)^2 (e^{\alpha z} \psi) \\ = & \partial_z(e^{\alpha z} F^r) - \partial_r (e^{\alpha z} F^z ) - \partial_r \left[ v^r (\mathcal{L} + \partial_z^2) (e^{\alpha z} \psi ) \right]- \partial_z \left[ v^z (\mathcal{L} + \partial_z^2) (e^{\alpha z}\psi ) \right] \\ & + \partial_z \left[ \frac{v^\theta}{r} (e^{\alpha z} v^\theta) \right] + \bar{U}(r) \left[\alpha \mathcal{L} ( e^{\alpha z} \psi ) + \alpha^3 e^{\alpha z} \psi - 3\alpha^2 \partial_z (e^{\alpha z} \psi) + 3\alpha \partial_z^2 (e^{\alpha z} \psi )\right]\\ & - \partial_z \left[ 4\alpha \partial_z^2 (e^{\alpha z}\psi) - 6 \alpha^2 \partial_z (e^{\alpha z}\psi) + 4\alpha^3 (e^{\alpha z } \psi) \right] + \alpha^4 e^{\alpha z}\psi \\ &- \left[ 4\alpha \mathcal{L} \partial_z (e^{\alpha z} \psi)- 2 \alpha^2 \mathcal{L} (e^{\alpha z}\psi) \right] - \alpha e^{\alpha z} F^r \\ & + \partial_r \left\{ v^r \left[ 2 \alpha \partial_z (e^{\alpha z} \psi ) - \alpha^2 e^{\alpha z}\psi \right] \right\} + \partial_z \left\{ v^z \left[ 2 \alpha \partial_z (e^{\alpha z} \psi ) - \alpha^2 e^{\alpha z} \psi \right] \right\}\\ & + \alpha v^z (\mathcal{L} + \partial_z^2) (e^{\alpha z} \psi ) - \alpha v^z \left[ 2\alpha \partial_z (e^{\alpha z} \psi ) - \alpha^2 e^{\alpha z} \psi \right] - \alpha \frac{v^\theta}{r} (e^{\alpha z} v^\theta) , \ea \ee and \be \label{asy2} \ba & \bar{U} (r) \partial_z(e^{\alpha z} \Bv^\theta) - \Delta ( e^{\alpha z} \Bv^\theta) =e^{\alpha z} \BF^\theta - (\Bv^* \cdot \nabla) (e^{\alpha z} \Bv^\theta) - \frac{v^r}{r} (e^{\alpha z} \Bv^\theta) \\[2mm] &\quad \quad \ \ \ \ + \bar{ U}(r) \alpha e^{\alpha z} \Bv^\theta - 2 \alpha \partial_z(e^{\alpha z} \Bv^\theta) +\alpha^2 e^{\alpha z} \Bv^\theta + v^z \alpha e^{\alpha z} \Bv^\theta. \ea \ee Denote \be \nonumber v_\alpha^r = \partial_z (e^{\alpha z} \psi),\ \ \ v_\alpha^z = -\frac{\partial_r (r e^{\alpha z} \psi )}{r},\ \ \ \Bv_\alpha^* = v_\alpha^r \Be_r + v_\alpha^z \Be_z,\ \ \Bv_\alpha^\theta = e^{\alpha z} v^\theta \Be_\theta. \ee Regarding the terms on the right hand of \eqref{asy1}, by Sobolev embedding inequalities and Lemma \ref{newlemma}, one has \be \label{asy5} \ba & \| v^r ( \mathcal{L} + \partial_z^2) (e^{\alpha z} \psi ) \|_{L_r^2(D)} \leq C \|v^r \|_{L^\infty(\Omega)} \|(\mathcal{L} + \partial_z^2) (e^{\alpha z} \psi ) \|_{L_r^2(D)} \\ \leq & C \|\Bv\|_{H^{\frac53}(\Omega)} \|\Bv_\alpha^* \|_{H^1(\Omega)} \leq C \|\Bv\|_{H^{\frac53} (\Omega) } \|\Bv_\alpha^* \|_{H^{\frac53}(\Omega)} \ea \ee and \be \label{asy6} \ba & \| v^z ( \mathcal{L} + \partial_z^2) (e^{\alpha z} \psi ) \|_{L_r^2(D)} \leq C \|v^z \|_{L^\infty(\Omega)} \|(\mathcal{L} + \partial_z^2) (e^{\alpha z} \psi ) \|_{L_r^2(D)} \\ \leq & C \|\Bv\|_{H^{\frac53}(\Omega)} \|\Bv_\alpha^* \|_{H^1(\Omega)} \leq C \|\Bv\|_{H^{\frac53} (\Omega) } \|\Bv_\alpha^* \|_{H^{\frac53}(\Omega)} . \ea \ee Similarly, one has \be \label{asy6-1} \ba & \left\| \frac{v^\theta}{r} e^{\alpha z} v^\theta \right\|_{L_r^2(D)} \leq \left\| \frac{v^\theta }{r} \right\|_{L^2(\Omega)} \|e^{\alpha z} v^\theta \|_{L^{\infty} (\Omega)} \leq C \|\Bv \|_{H^{\frac53} (\Omega)} \|\Bv_\alpha^\theta \|_{H^{\frac53}(\Omega)} . \ea \ee Note that \be \label{asy7} \ba & \| \bar{U}(r) \left[\alpha \mathcal{L} ( e^{\alpha z} \psi ) + \alpha^3 e^{\alpha z} \psi - 3\alpha^2 \partial_z (e^{\alpha z} \psi) + 3\alpha \partial_z^2 (e^{\alpha z} \psi )\right] \|_{L_r^2(D)} \\ \leq & C \Phi |\alpha| \| \Bv_\alpha^* \|_{H^1(\Omega)} \leq C \Phi |\alpha| \| \Bv_\alpha^* \|_{H^{\frac53}(\Omega)}. \ea \ee and \be \label{asy8} \ba & \| 4\alpha \partial_z^2 (e^{\alpha z}\psi) - 6 \alpha^2 \partial_z (e^{\alpha z}\psi) + 4\alpha^3 (e^{\alpha z } \psi) \|_{L_r^2(D)} + \| \alpha^4 e^{\alpha z}\psi \|_{L_r^2(D) } \\ &\quad + \| 4 \alpha \mathcal{L} (e^{\alpha z} \psi ) \|_{L_r^2(D)} + \|2\alpha^2 \mathcal{L} (e^{\alpha z} \psi ) \|_{L_r^2(D)}\\ \leq & C |\alpha | \| \Bv_\alpha^* \|_{H^1(\Omega)} + C |\alpha| \| \Bv_\alpha^* \|_{H^{\frac53}(\Omega)} \leq C |\alpha| \| \Bv_\alpha^* \|_{H^{\frac53}(\Omega)}. \ea \ee Furthermore, it holds that \be \label{asy10} \ba &\| v^r \left[ 2\alpha \partial_z (e^{\alpha z} \psi ) - \alpha^2 e^{\alpha z} \psi \right] \|_{L_r^2(D)} + \| v^z \left[ 2\alpha \partial_z (e^{\alpha z} \psi ) - \alpha^2 e^{\alpha z} \psi \right] \|_{L_r^2(D)}\\ &\quad +\| \alpha v^z (\mathcal{L} + \partial_z^2) (e^{\alpha z} \psi ) - \alpha v^z \left[ 2\alpha \partial_z (e^{\alpha z} \psi ) - \alpha^2 e^{\alpha z} \psi \right] \|_{L_r^2(D)}\\ \leq & C |\alpha | \|v^r \|_{L^\infty(\Omega)} \| \Bv_\alpha^* \|_{H^{\frac53}(\Omega)} + C |\alpha | \|\Bv\|_{H^{\frac53} (\Omega)} \| \Bv_\alpha^* \|_{H^{\frac53}(\Omega)}\\ \leq & C |\alpha | \|\Bv\|_{H^{\frac53} (\Omega)} \| \Bv_\alpha^* \|_{H^{\frac53}(\Omega)}. \ea \ee Similar to \eqref{asy6-1}, one has \be \label{asy10-3} \left\| \alpha \frac{v^\theta}{r} (e^{\alpha z} v^\theta) \right\|_{L_r^2(D)} \leq C |\alpha | \|\Bv\|_{H^{\frac53} (\Omega)} \| \Bv_\alpha^\theta \|_{H^{\frac53}(\Omega)}. \ee It follows from the Sobolev embedding inequalities that one has \be \label{asy15} \| ( \Bv^* \cdot \nabla ) (e^{\alpha z} \Bv^\theta ) \|_{L^2(\Omega)} \leq C \|\Bv^* \|_{L^\infty(\Omega)} \|e^{\alpha z} \Bv^\theta \|_{H^1(\Omega)} \leq C \|\Bv\|_{H^{\frac53} (\Omega)} \| \Bv_\alpha^\theta \|_{H^{\frac53}(\Omega)} \ee and \be \label{asy16} \left\| \frac{v^r}{r} (e^{\alpha z} \Bv^\theta ) \right\|_{L^2(\Omega)} \leq C \|\partial_r v^r + \partial_z v^z \|_{L^3(\Omega)} \|e^{\alpha z} \Bv^\theta \|_{L^6(\Omega)} \leq C \|\Bv\|_{H^{\frac53} (\Omega)} \| \Bv_\alpha^\theta \|_{H^{\frac53}(\Omega)}. \ee Furthermore, it holds that \be \label{asy17} \| -2 \alpha \partial_z (e^{\alpha z} \Bv^\theta ) + \alpha^2 e^{\alpha z} \Bv^\theta \|_{L^2(\Omega)} \leq C |\alpha | \| \Bv_\alpha^\theta\|_{H^{\frac53}(\Omega)} \ee and \be \label{asy18} \ba & \|\bar{U}(r) \alpha e^{\alpha z} \Bv^\theta \|_{L^2(\Omega)} + \|v^z \alpha e^{\alpha z} \Bv^\theta \|_{L^2(\Omega)} \\ \leq & C |\alpha| \Phi \|e^{\alpha z} \Bv^\theta \|_{H^{\frac53}(\Omega)} + C |\alpha| \|v^z\|_{L^\infty(\Omega)} \|e^{\alpha z} \Bv^\theta \|_{H^{\frac53}(\Omega)}\\ \leq & C |\alpha| \left( \Phi + \|\Bv\|_{H^{\frac53} (\Omega)} \right) \| \Bv^\theta_\alpha \|_{H^{\frac53}(\Omega)}. \ea \ee Hence, collecting the estimates \eqref{asy5}--\eqref{asy18} and applying Propositions \ref{existence-stream}-\ref{existence-swirl}, Proposition \ref{uniformestimate} yield \be \label{asy19} \ba & \| \Bv_\alpha^* \|_{H^{\frac53} (\Omega) } + \| \Bv^\theta_\alpha \|_{H^{\frac53}(\Omega)} \\ \leq & C \|e^{\alpha z} \BF\|_{L^2(\Omega)} + C_7 \|\Bv \|_{H^{\frac53}(\Omega)} \left( \|\Bv_\alpha^*\|_{H^{\frac53}(\Omega)} + \|\Bv^\theta_\alpha\|_{H^{\frac53}(\Omega)} \right) \\ &\ \ \ + C_8 |\alpha| \left(\Phi + 1 + \|\Bv\|_{H^{\frac53}(\Omega)}\right) \left( \|\Bv_\alpha^*\|_{H^{\frac53}(\Omega)} + \|\Bv^\theta_\alpha\|_{H^{\frac53}(\Omega)} \right) . \ea \ee Choose a small constant $\epsilon_0$ such that $ C_7 \epsilon_0 \leq \frac14. $ If $\Bu$ and $\alpha $ satisfy \be \nonumber \|\Bv\|_{H^{\frac53}(\Omega) } = \|\Bu - \bBU \|_{H^{\frac53}(\Omega)} \leq \epsilon_0\ \ \ \ \mbox{and}\ \ \ |\alpha| \leq \alpha_0 \leq \frac{1}{2C_8 (1+ \Phi+ \epsilon_0) }, \ee then the inequality \eqref{asy19} implies that \be \label{asy20} \| \Bv_\alpha^* \|_{H^{\frac53} (\Omega)} + \|\Bv_\alpha^\theta\|_{H^{\frac53}(\Omega)} \leq C \|e^{\alpha z}\BF\|_{L^2(\Omega)}. \ee Note that \be \nonumber e^{\alpha z} v^r = \partial_z(e^{\alpha z} \psi) - \alpha e^{\alpha z}\psi = v_\alpha^r - \alpha e^{\alpha z}\psi \ \ \ \mbox{and}\ \ \ e^{\alpha z} v^z = - \frac{\partial_r ( r e^{\alpha z} \psi)}{\partial r}= v_\alpha^z. \ee Decompose $e^{\alpha z} \Bv^*$ into two parts as follows \be \nonumber e^{\alpha z}\Bv^* = \Bv_\alpha^* - \alpha e^{\alpha z}\psi \Be_r. \ee It follows from Lemma \ref{newlemma} that one has \be \label{asy21} \|e^{\alpha z} \psi \Be_r\|_{H^{\frac53}(\Omega)} \leq \|e^{\alpha z} \psi \Be_r\|_{H^2(\Omega)} \leq C \|\Bv_\alpha^* \|_{H^1(\Omega)} \leq C \|\Bv_\alpha^*\|_{H^{\frac53}(\Omega)}. \ee This, together with \eqref{asy20}, implies \be \|e^{\alpha z } ( \Bu - \bBU) \|_{H^{\frac53}(\Omega\cap \{z\geq 0\})} \leq C \|e^{\alpha |z| }\BF\|_{L^2(\Omega)}. \ee Similarly, one has \be \|e^{-\alpha z } ( \Bu - \bBU) \|_{H^{\frac53}(\Omega\cap \{z\leq 0\})} \leq C \|e^{\alpha |z| }\BF\|_{L^2(\Omega)}. \ee Hence the proof the proof of Proposition \ref{mainresult3} is completed. \end{proof} Next, we remove the smallness requirement for $\Bu - \bBU $ in Proposition \ref{mainresult3}. The key observation is that $\|\Bu-\bBU\|_{H^2(\Omega_L)}$ with $\Omega_L=B_1(0)\times (L, \infty)$ is sufficiently small for sufficiently large $L$, provided that $\|\Bu-\bBU\|_{H^2(\Omega)}$ is bounded. This implies that $\Bu$ satisfies the assumptions of Proposition \ref{mainresult3} in the domain $\Omega_L$, and hence Theorem \ref{mainresult2} can be proved in the similar way. \begin{proof}[Proof of Theorem \ref{mainresult2}] Let $\Bv = \Bu - \bBU$ and $\psi$ be the corresponding stream function. Let $L$ be a positive constant to be determined. Denote $\Omega_{L} = B_1(0) \times (L, +\infty)$. Choose a smooth cut-off function $\eta(z)$ satisfying \be \nonumber \eta(z)= \left\{ \begin{array}{l} 0,\ \ \ z\leq L,\\ 1, \ \ \ z\geq L + 1. \end{array} \right. \ee Note that $(\psi, \Bv^\theta)$ is a solution to the problem \eqref{ap-40}--\eqref{ap-43}. Multiplying \eqref{ap-40} by $\eta(z)$ yields \be \label{asy-87} \ba & \bar{U}(r) \partial_z (\mathcal{L} + \partial_z^2)(\eta \psi ) - (\mathcal{L} + \partial_z^2)^2 (\eta \psi) \\ = & \partial_z (\eta F^r + \tilde{F}^r) - \partial_r (\eta F^z + \tilde{F}^z ) + \tilde{f} - \partial_r \left[ v^r (\mathcal{L} + \partial_z^2) (\eta \psi) \right] \\ &\ \ \ \ \ \ - \partial_z \left[ v^r( \mathcal{L} + \partial_z^2)(\eta \psi) \right] + \partial_z \left[ \frac{v^\theta}{r} \eta v^\theta \right], \ea \ee where \be \nonumber \ba \tilde{F}^r = & \bar{U}(r) \left[ 2 \eta^{\prime}(z) \partial_z \psi + \eta^{\prime \prime}(z) \psi \right] - 4 \eta^{\prime}(z) \mathcal{L} \psi - 4 \eta^{\prime}(z) \partial_z^2 \psi + 2 v^z \eta^{\prime}(z) \partial_z \psi + v^z \eta^{\prime \prime}(z) \psi , \ea \ee \be \nonumber \tilde{F}^z = - \left[ 2v^r \eta^{\prime}(z) \partial_z \psi + v^r \eta^{\prime \prime} (z) \psi \right] , \ee and \be \nonumber \ba \tilde{f} = & - \eta^{\prime} (z) F^r + \bar{U}(r) \eta^{\prime}(z) ( \mathcal{L} + \partial_z^2) \psi + 2\eta^{\prime \prime}(z) \mathcal{L} \psi - \left[ \eta^{(4)}(z) \psi + 4\eta^{(3)}(z) \partial_z \psi + 2 \eta^{\prime \prime}(z) \partial_z^2 \psi \right] \\ &\ \ \ \ + v^z \eta^{\prime}(z) (\mathcal{L} + \partial_z^2)\psi - \frac{v^\theta}{r} \eta^{\prime}(z) v^\theta . \ea \ee Similarly, one has \be \label{asy-88} \bar{U}(r) \partial_z(\eta \Bv^\theta) - \Delta (\eta \Bv^\theta) = \eta \BF^\theta + \tilde{\BF}^\theta - (v^r \partial_r + v^z \partial_z )(\eta \Bv^\theta) - \frac{v^r}{r} (\eta \Bv^\theta ), \ee where \be \nonumber \tilde{\BF}^\theta = \bar{U}(r) \eta^{\prime}(z) \Bv^\theta - \left[ 2 \eta^{\prime}(z) \partial_z \Bv^\theta + \eta^{\prime \prime} (z) \Bv^\theta \right] + v^z \eta^{\prime}(z) \Bv^\theta. \ee Denote \be \nonumber v_{\alpha, \eta}^r = \partial_z (e^{\alpha z} \eta \psi ) , \ \ \ v_{\alpha, \eta}^z = - \frac{\partial_r (r e^{\alpha z} \eta \psi )}{r}, \,\, \text{and}\,\, \Bv_{\alpha, \eta}^{*}= v_{\alpha, \eta}\Be_r + v_{\alpha, \eta}\Be_z. \ee It follows from the same lines as in the proof of Proposition \ref{mainresult3} that one has \be \la{asy-89} \ba & \| \Bv^*_{\alpha, \eta} \|_{H^{2}(\Omega)} + \|e^{\alpha z} (\eta \Bv^\theta) \|_{H^{2}(\Omega)} \\ \leq & C (1+\Phi^{\frac14}) ( \| e^{\alpha z} \eta \BF\|_{L^2(\Omega)} + \|e^{\alpha z} \tilde{F}^r \|_{L^2_r(D)} + \| e^{\alpha z} \tilde{F}^z \|_{L_r^2(D)} + \| e^{\alpha z} \tilde{f}\|_{L_r^2(D)}) \\ &\ \ \ \ + C_9 (1 + \Phi^{\frac14}) \| \Bv \|_{H^{\frac53}(\Omega_L)} \left( \| \Bv^*_{\alpha, \eta} \|_{H^{2}(\Omega)} + \|e^{\alpha z} (\eta \Bv^\theta) \|_{H^{2}(\Omega)} \right) \\ &\ \ \ \ \ \ + C_{10} (1 + \Phi^{\frac14} ) |\alpha| \left( \Phi + 1 + \| \Bv \|_{H^{\frac53}(\Omega_L)} \right) \left( \| \Bv^*_{\alpha, \eta} \|_{H^{2}(\Omega)} + \|e^{\alpha z} (\eta \Bv^\theta) \|_{H^{2}(\Omega)} \right). \ea \ee Since $\|\Bv \|_{H^{\frac53}(\Omega)} < + \infty$, there exists an $L$ large enough such that \be \nonumber \|\Bv \|_{H^{\frac53}(\Omega_{L})} \leq \min \left\{ \frac{1}{4C_9(1 + \Phi^{\frac14} ) }, \ 1 \right \}. \ee Choose an $\alpha_0>0$ small enough such that \be \nonumber C_{10} (1 + \Phi^{\frac14} ) ( \Phi+ 2) \alpha_0 \leq \frac14. \ee For every $\alpha \in ( 0, \alpha_0)$, it holds that \be \nonumber \ba & \|\Bv_{\alpha, \eta}^* \|_{H^{2}(\Omega)} + \|e^{\alpha z} (\eta \Bv^\theta) \|_{H^{2}(\Omega)} \\ \leq & C (1 + \Phi^{\frac14} ) \left( \|e^{\alpha z} \tilde{F}^r\|_{L^2_r(D)} + \|e^{\alpha z} \tilde{F}^z \|_{L_r^2(D)} + \|e^{\alpha z} \tilde{f} \|_{L^2_r(D)} + \| e^{\alpha z} \tilde{\BF}^\theta \|_{L^2(\Omega)} \right) \\ & \ \ \ \ + C (1 + \Phi^{\frac14} ) \|e^{\alpha z} \eta \BF \|_{L^2(\Omega)}. \ea \ee Note that $ \supp \tilde{F}^r$, $\supp \tilde{F}^z$, $\supp \tilde{f}$, $\supp \tilde{\BF}^\theta \subseteq \overline{B_1^2(0)} \times [L, L+ 1]$, then \be \| e^{\alpha z} \tilde{F}^r \|_{L_r^2(D)} + \|e^{\alpha z} \tilde{F}^z \|_{L_r^2(D)} + \|e^{\alpha z} \tilde{f} \|_{L_r^2(D)} + \|e^{\alpha z} \tilde{\BF}^\theta \|_{L^2(\Omega)} \leq C (1 + \Phi) \| \Bv \|_{H^1(\Omega)}. \ee Hence, one has \be \label{asy-93} \|\Bv_{\alpha, \eta}^* \|_{H^{2}(\Omega)} + \|e^{\alpha z} (\eta \Bv^\theta) \|_{H^{2}(\Omega)} < + \infty. \ee Similar to the proof of Proposition \ref{mainresult3}, one can rewrite $e^{\alpha z} \eta \Bv^*$ as follows, \be \nonumber e^{\alpha z} \eta \Bv^* = \Bv_{\alpha, \eta }^* - \left( \alpha e^{\alpha z} \eta \psi + e^{\alpha z} \eta^{\prime} (z) \psi \right)\Be_r. \ee Thus it follows from Lemma \ref{newlemma} that one has \be \label{asy-95} \|( \alpha e^{\alpha z} \eta \psi ) \Be_r \|_{H^2(\Omega )} + \| e^{\alpha z} \eta^{\prime} (z) \psi \Be_r \|_{H^2(\Omega)} \leq C \| \Bv_{\alpha, \eta}^* \|_{H^1(\Omega)} + C \|\Bv\|_{H^1(\Omega)} < + \infty. \ee This, together with \eqref{asy-93}, completes the proof of Theorem \ref{mainresult2}. \end{proof}
\section{Introduction} Designing electronic components that can sustain harsh environmental conditions in space and military applications has been an important field of research for many decades \cite{Gouker13,Wong11}. Prolonged bombardment of heavy-ions, protons, neutrons and other particles on electronic equipment and circuits can result in permanent damage or soft errors that cause temporary failures \cite{Hopkinson:00,Mahatme:15}. When high-energy neutrons (present in terrestrial cosmic radiations) or alpha particles (that originate from impurities in the packaging materials) strike a sensitive node in a CMOS circuit, they generate a dense local track of additional electron-hole pairs in the substrate. This additional charge is collected by the drain of an OFF transistor and can result in a transient voltage pulse \cite{Hosseinabady:2006}. Because these events are somewhat rare, typical models assume these events can be analyzed in isolation as a \revSecond{Single Event Transient} (SET), but as technology scales multiple event transients are also becoming relevant. A transient event can be altered as it propagates along a path through combinational circuit. In particular, an event may be masked due to three techniques, i.e. logical masking, electrical masking, and temporal masking. In addition, the event may be attenuated or propagated and can result in an early or late edge or a dynamic hazard \cite{Hosseinabady:2006}. When the transient is finally latched, a \revSecond{Single Event Upset} (SEU) is created. Traditionally transients that effect memory elements were considered more significant than those that strike combinational logic, but as technology has scaled, strikes in the combinational logic are also becoming important~\cite{Wong2014}. To circumvent the effects of these types of radiation, numerous \revSecond{Radiation Hardened by Design} (RHBD) techniques have been proposed in the literature, the most common being the \revSecond{Triple Modular Redundancy} (TMR)~\cite{TMR}, \revSecond{Guarded Dual Modular Redundancy} (GDMR)~\cite{Mekie2016}, gate sizing~\cite{Zhou:2006,Rao2006,Zivanov06,Sabet2017}, and \revSecond{Glitch Filtering} (GF)~\cite{Bhuva03,Naseer:2005,bala:2005}. RHBD cell libraries have also been developed for both asynchronous and synchronous designs~ \cite{Calligaro:2008,David:2009}. One study demonstrated the benefits of using asynchronous bundled-data latch-based design techniques to reduce the area, delay, and power penalty associated with a RHBD cell library ~\cite{David:2009}. However, radiation-hardened libraries are cumbersome to design, typically generations behind state-of-the-art unhardened versions, and relatively expensive in terms to cell area, power consumption, and cell delay. This paper explores the possibility of building an efficient SET-resilient technique that uses standard cell libraries and pays a performance penalty only when \revSecond{an} SET occurs. The proposed approach is inspired by an asynchronous bundled-data template that is timing-resilient~\cite{Peter:2015}, exhibiting high performance when no timing errors occur and gracefully slowing down in the presence of timing errors. However, unlike timing-resilient designs that can assume that the timing of signals is governed by a notion of worst-case delay, SET-resilient circuits must account for the fact that SETs can occur at any time. This means the existing timing resilient design cannot be simply adopted and new SET-aware asynchronous protocols and circuits must be developed. Our proposed template that achieves this goal is called SERAD which refers to \emph{s}oft \emph{e}rror \emph{r}esilient \emph{a}synchronous \emph{d}esign using a bundled data protocol. Like its timing-resilient cousin, it uses standard single-rail combinational logic and error-detecting latches~\cite{Bowman:2009}. However, its handshaking protocol and control logic are completely redesigned to use a combination of temporal and spatial redundancy to mitigate SETs. The use of single-rail combinational logic yields an area and power efficient design, and the novel error-detecting logic and control structure makes it performance efficient as it delays the pipeline only when \revSecond{an} SET occurs. Given that soft-errors are quite rare~\cite{anand:2011}, the average performance of SERAD is thus essentially the same as its non-SET-resilient counterpart. \begin{figure*}[htb] \centering \vspace*{2em} \begin{subfigure}[b]{0.5\textwidth} \centering \includegraphics[width=0.8\textwidth]{figure1a_syn.pdf} \caption{Synchronous template} \label{fig:sync template} \end{subfigure}\\ \vspace*{1em} \begin{subfigure}[b]{0.45\textwidth} \centering \includegraphics[width=\textwidth]{figure1b_tmr.pdf} \caption{TMR template} \label{fig:tmr template} \end{subfigure}% \begin{subfigure}[b]{0.45\textwidth} \centering \includegraphics[width=\textwidth]{figure1c_glitch.pdf} \caption{Glitch-filter template} \label{fig:gf template} \end{subfigure} \vspace*{1em} \caption{Block diagram of original flop-based circuit and two well-known SET-resilient variants.} \label{fig:Variants} \end{figure*} \bigskip The remainder of this paper is organized as follows. Section~\ref{sec:related} describes related research to make synchronous and asynchronous techniques resilient to soft errors. Section~\ref{sec:SERAD Template} then presents a detailed description of the proposed SERAD template describing how it combines spatial and temporal redundancy to ensure SET resilience. Section~\ref{sec:exp_results} presents our experimental results that consist of analog and digital simulations that validate SERAD's SET resilience as well as a case study on an open-core MIPS-like \rev{processor} that quantifies SERAD's relative area, frequency, and power compared to alternative approaches. Finally, Section~\ref{sec:conclusions} summarizes the paper and describes opportunities for future work. \section{Related Work} \label{sec:related} The gold standard approach to making a \rev{typical synchronous system} shown in Fig.~\ref{fig:Variants}(a) resilient to soft-errors is TMR. As illustrated in Fig.~\ref{fig:Variants}(b), this uses three copies of the combinational logic and \revSecond{flip-flops (FFs)} and an additional voting structure to pick the answer common to at least two copies. When applied to a large system, this approach is complicated by the need to re-synchronize the blocks after an event occurs. Eaton et al. addressed this issue by applying this concept to the design of \revSecond{FFs} that sample the data at three distinct time steps, each separated from the next by at least the maximum \revSecond{SET} pulse width \cite{Eaton2002}. This is reliable but has high area, performance, and power penalties. Dual-mode and dual-rail versions use two copies of the logic followed by a Muller C-element that waits until both copies agree before firing \cite{Eaton2002,Mekie2016} and are also costly. Alternatively, gates and storage elements can be sized to minimize the risk of soft-errors \cite{Zivanov06,Rao2006,Sabet2017}. Unfortunately, the increase in size needed for the gates is technology dependent and expected to grow as technologies scales. In addition, numerous researchers have focused on making storage elements and memory arrays SET-tolerant, the \rev{latter} using error-detecting codes \cite{Calin:1996, Kobayashi:2014, Mitra2006}. Our template leverages these techniques as well. Other researchers have proposed to add glitch filters to the output of combinational logic blocks and thereby mask SETs before they can be latched \cite{Bhuva03,Naseer:2005}, as illustrated in Fig.~\ref{fig:Variants}(c). However, the glitch filter effectively increases the latency of the combinational logic and does not combat a late edge that can be caused by \revSecond{an} SET. Therefore to use this approach the clock period must be increased by at least two times that of the maximum width of an SET. Several experimental efforts have reported glitch widths between 10s of pico-seconds to over 1ns \cite{Eaton:2004}, suggesting that the performance penalties can be impractical for high-speed designs. An important point to be made is that in all these schemes the performance penalty is uniform \rev{in that it increases the critical path of the design, thereby decreasing its maximum clock frequency.} \rev{Therefore, for designs with little timing slack, the performance penalty will exist} in every cycle of operation independent of whether a soft-error occurs or not. There \rev{have} also been several works that have tried to leverage asynchronous design as a basis for radiation hardening. They can be divided into two domains - one domain is based on using dual-rail (DR) or quasi-delay-insensitive (QDI) logic and the other is based on bundled-data design. The former covers works based on many existing asynchronous templates, including weak-conditioned half-buffers~\cite{Pontes:2013}, dual-rail minterms~\cite{Monnet:2005}, pre-charged half-buffers~\cite{Jang:2005}, null-convention logic~\cite{Kuang:2010,Di:2007}, and others~\cite{Friesenbichler:2009}. In each case, the researchers add circuitry to traditional DR/QDI circuit templates to make them more resilient to soft-errors. However, the base circuitry often requires at least two times more transistors than standard single-rail synchronous logic~\cite{Proteus2011}, incurring large penalties in silicon area and leakage current when compared to standard synchronous design. Moreover, the \rev{return-to-zero} nature of these templates often implies higher switching activities than synchronous single-rail counterparts which results in higher dynamic power. While these asynchronous design styles are attractive because they require few timing assumptions to ensure correctness and can thus work in harsh environments, their costs may be prohibitive for many applications. In contrast, bundled-data asynchronous circuits use standard combinational logic and sequential elements. They differ from their synchronous counterparts only in that instead of \revThird{a} global clock, asynchronous circuits are used to generate local clock trees. The result is a design which is similar (if not better) in area and power consumption than synchronous designs but require timing assumptions to ensure correctness. Delay lines are needed as part of the asynchronous circuits to ensure setup and hold constraints are satisfied. As these can be difficult to design optimally they are often made to be post-silicon programmable. The sequential elements can be latch or \revSecond{FF} based, latch-based typically being more flexible and lower power \cite{David:2009}. Making these designs radiation \revThird{hardened} has often focused on the unique aspects of the asynchronous nature - the asynchronous control logic~\cite{Naqvi:2014,Danilov:2016}. One of the simplest approach is dual-modular redundancy with guard-gates~\cite{Almukhaizim:2009}. This doubles the size of the control logic, but given the control logic is a small fraction of the overall chip area, the penalties are quite manageable. SETs in the combinational logic, however, must be handled through a combination of gate-sizing, spatial redundancy, or temporal redundancy, similar to other synchronous designs. SERAD is also based on bundled-data but is, to the best of our knowledge, the first to be inspired by a timing-resilient form of bundled-data design. \begin{figure}[!t] \centering \includegraphics[width=0.48\textwidth]{figure2_template.pdf} \caption{Block diagram of proposed SERAD template} \label{fig:SERAD_template} \end{figure} \section{SERAD Template} \label{sec:SERAD Template} The proposed SERAD template, illustrated in Fig.~\ref{fig:SERAD_template}, uses single-rail combinational logic, error detecting logic (EDL), delay lines, DICE latches, and a novel SERAD controller. SERAD mitigates SETs that originate in the sequential elements of the pipeline, i.e, latches, using DICE latches. SERAD prevents SETs that originate in the combinational logic from propagating from one pipeline stage to the next using a special form of temporal redundancy. Any SET which appears at the input of a pipeline latch when it is transparent is identified as an error by the EDL and is mitigated by stalling the pipeline until the data is re-sampled. In particular, the SERAD controllers communicate with each other using a \textit{soft error resilient handshaking protocol} that can ensure any SET of width less than a predefined value $\sigma$ is mitigated. Before explaining this protocol in detail, however, we first describe the delay notations critical to a SERAD design. \begin{itemize} \item $\tau$: Maximum pulse width of \revSecond{an} SET that will be detected and mitigated. It is chosen such that the probability of occurrence of \revSecond{an} SET of width greater than $\tau$ in the given technology is negligible. \item $\phi$: Minimum pulse-width required by the DICE latch to correctly sample data. \item $\sigma$: Maximum($\phi$,$\tau$) \item $\Delta$: Worst case delay of the combinational logic or critical path delay including the propagation delay through one DICE latch. \item $\delta$ = $\Delta - \sigma$. This defines the required delay of the delay line between controllers, as illustrated in Fig.~\ref{fig:SERAD_template}, ignoring the overhead of the EDL and control circuit which will be discussed in Section~\ref{sec:timing}. \item $y$: Time required to close and re-open a DICE latch \end{itemize} \begin{figure}[!t] \centering \includegraphics[width=\linewidth]{figure3.pdf} \caption{Timing diagram of the proposed SERAD template} \label{fig:timing} \vspace{-1em} \end{figure} \subsection{Soft Error Resilient Handshaking Protocol} \label{sec:spec-handshaking} Fig.~\ref{fig:timing} illustrates the expected behavior of the \emph{CLK} signals associated with two instructions flowing through a four-stage SERAD pipeline. Instruction~1 launches from Stage 1. \revSecond{An} SET that occurs in the combinational logic path between Stage 1 and Stage 2 is detected at the Stage 2 latch. The rising edge of Stage 3's \emph{CLK} signal is nominally scheduled to occur $\delta$ time units after Stage 2's \emph{CLK} closes for the first time, shown as the dotted gray region. However, because of the occurrence of \revSecond{an} SET, the Stage 2's latch closes and re-opens, giving Instruction~1 a total of $(\delta+(2*\sigma)+y)$ time to pass from Stage 2 to Stage 3, where $y$ is the time taken to close the latch, sample the error, and reopen the latch. \rev{Subsequently,} instruction~2 does not suffer a timing violation in Stage 2, which allows Stage 3's \emph{CLK} signal to rise $\delta$ time units after Stage 2's \emph{CLK} falls. Note that if the data at the input of the latch is stable when the \emph{CLK} is high as well as during the subsequent hold time of the latch, then the latched data is error free. This interval is precisely when the EDL checks for an error and is defined as the \textit{SET Filtering Window (SFW)}. Its length is $\sigma$ plus the hold time of the DICE latch, where $\sigma$, as indicated above, is the maximum of $\phi$ and $\tau$. \revThird{This ensures} that the SFW is large enough to safely catch the SETs. The fact that the error detection window also includes the latches' hold time is unique to SET-resilient design and is motivated in Section \ref{sec:metastability}. \begin{comment} \begin{figure}[!h] \centering \includegraphics[width=\linewidth]{figures/protocol.png} \caption{Soft-error resilient handshaking protocol} \label{fig:shp} \end{figure} An example of the soft-error resilient handshaking protocol that achieves this SET resilience using two-phase signaling is shown in Fig.~\ref{fig:shp}. \end{comment} \subsection{SERAD Controller Design} \label{sec:controller} The SERAD controller is based on the single-rail controller shown in Fig.~\ref{fig:src} and is illustrated in Fig.~\ref{fig:drc}. It is designed using a combination of GDMR~\cite{Joycee:2018} and gate sizing~\cite{Zhou:2006} techniques and we call it \revThird{a} sized GDMR SERAD controller. \begin{comment} \rev{The controller in Fig.~\ref{fig:src} is reset using \emph{rst} signal which we have manually inserted in the design. We have used the same signal for SERAD controller in Fig.~\ref{fig:drc}.} \end{comment} The SETs on the internal nodes of the controller are mitigated via spacial redundancy and guard gates while the SETs on the output nodes are mitigated using gate-sizing. In particular, the feedback loops in the single-rail controller are cut and the resultant combinational logic is duplicated to introduce spatial redundancy. Each pair of redundant outputs is passed through a sized guard gate. The guard gates are sized such that any SET on the output node with a pulse width less than or equal to $\sigma$ is mitigated. Similarly, any SET of pulse width less than or equal to $\sigma$ on the internal or input nodes is filtered out by the guard gates. For this work, we have used \revThird{the} gate-sizing technique proposed by Zhou \emph{et al} in \cite{Zhou:2006}. In this work, the authors \revThird{calculate} the width of an inverter to remove the effect of SET \revThird{by reducing its amplitude}. For a given LET (linear energy transfer) value, the equivalent amount of charge ($Q$) that can \revThird{be} deposited is first computed. Needless to say, $Q$ is process dependent. The design is sized (i.e. the width is increased) to increase the node capacitance until the resulting SET pulse is sufficiently attenuated in amplitude~\cite{Zhou:2006}. We have implemented the gate-sizing algorithm proposed in ~\cite{Zhou:2006} to size the guard-gate for radiation hardening. We note here that our sized guard gate is about $10\times$ \revThird{larger than a minimum sized guard gate}. Further, sizing the guard gate also motivates the preceding circuits to be appropriately sized. We observe that the latency of the controller with sized guard gate is $6\%$ larger than the controller with minimum sized guard gates. \begin{figure}[!t] \centering \includegraphics[width=\linewidth]{figure4_serad_normal.pdf} \caption{SERAD single-rail controller on which sized GDMR controller is based.} \label{fig:src} \vspace{-1em} \end{figure} \begin{figure}[!t] \centering \includegraphics[width=\linewidth]{figure5_serad_gdmr1.pdf} \caption{Sized GDMR SERAD controller} \label{fig:drc} \vspace{-1em} \end{figure} \begin{figure*}[!t] \centering \includegraphics[width=0.7\linewidth]{figure6_burst_mode.pdf} \caption{Burst-mode state machine of single-rail SERAD controller} \label{fig:bmm} \end{figure*} The single-rail controller is implemented as a burst-mode state machine~\cite{Hazard-free_asyncFSM:1995} and synthesized using the 3D tool~\cite{3DSynthesis:1992}.\footnote{\rev{Note that the reset signal \emph{rst} is added to the specification to ensure that the state machine initializes properly.}} \rev{We then implemented the GDMR SERAD controller by duplicating the single rail controllers, and combining their outputs through the sized guard gates.} The \rev{non-reset} input signals to the first rail of the controller are \emph{ L.req1, R.ack1, Err} and \emph{Corr} and the output signals are \emph{CLK, L.ack1} and \emph{R.req1}. The input signals to the second rail of the controller are \emph{ L.req2, R.ack2, Err} and \emph{Corr} and the output signals are \emph{CLK, L.ack2} and \emph{R.req2}. The output rails are independent but the input signals to the \rev{two} rails are dependent. Most of the inputs are driven by the output of neighbouring controllers which are error-free as the final output nodes are sized. The exception is the signals \emph{Err} and \emph{Corr} that are driven from \rev{the} SERAD EDL which is discussed in Section \ref{sec:EDL}. Fig.~\ref{fig:bmm} shows the burst-mode state machine specification for a single-rail controller of a normal pipeline stage. The behavior of the machine can be summarized as follows. \begin{itemize} \item On deactivating reset signal, the controller sends an acknowledgement to the previous stage (moving from state 0 to state 1). \item On receiving a request from previous stage and acknowledgement from next stage, the controller sets the clock signal high, waits for the EDL error signal to reset, and waits for \revThird{the} done signal to go high via the illustrated asymmetric delay line (moving from \revThird{state} 1 to 2 to 3). \item As soon as the done signal goes high, the clock is driven low and the controller waits to receive the error information (in state 4). \item If \emph{Err} goes high, indicating the occurrence of \revThird{an} SET, the clock is driven high and the controller loops back to state 3. \item If \emph{Corr} goes high, the controller sends a request to the next stage and an acknowledgement to the previous stage, signaling that the latched data is error free (state 6). \end{itemize} Due to the two-phase nature of the machine the states \revThird{1-5} are replicated in states \revThird{6-9} with the alternate signal transitions. Note that the controller for \revThird{other} pipeline stages \revThird{is} similar, but \revSecond{is} designed to generate an output request after reset (an initial token on reset). \revSecond{This type of controller is called a {\em token controller} \cite{Beerel:2010} and generates} the needed initial state to the system, avoiding deadlock right after reset. \rev{The synthesized logic expressions of the single-rail controller are given below.} \revSecond{The 3D synthesis tool analyzes the state space of the specification and guarantees that these expressions are free of static and dynamic hazards. In some cases, this synthesis process requires the introduction of state variables, such as the signal $z$ below. Each expression effectively describes the next state expression of one output signal that can be implemented with combinational logic but in many cases these output signals must be fedback as inputs to the controller. } \rev{ \begin{eqnarray*} Rreq &=& rst .(\overline{Corr} . \overline{Lack} + Done . \overline{Lack} + z.\overline{Lack} \\ && + z. Corr . \overline{Done}) \\ Lack &=& rst .(\overline{Corr} . Lack + Done .Lack + \overline{z}. Lack \\ & & + \overline{z}. Corr . \overline{Done} ) \\ clk &=& rst .(Err. \overline{Done} + clk. \overline{Done} + z. \overline{Lreq}. \overline{Rack} \\ & & +~~ Lreq. Rack. \overline{Done}.\overline{z}) \\ z &=& rst .(Done . Lack + z. Corr + \overline{z}. Lack \\ & & +~~ z. \overline{clk}. \overline{Err}) \end{eqnarray*}}% \revSecond{Note that some delays were added to the controller feedback wires to avoid essential hazards. In addition, other delays were added to some of the primary outputs to avoid violations of the fundamental mode assumption \cite{Nowick:1995}}. \begin{figure}[!t] \centering \includegraphics[width=0.98\linewidth]{figure7_edl.pdf} \caption{Block diagram of SERAD error detecting logic} \label{fig:edl} \vspace{-1em} \end{figure} \subsection{SERAD Error Detection Logic} \label{sec:EDL} As illustrated in Fig.~\ref{fig:edl}, the EDL consists of transition detectors, asymmetric C-elements, and a Q-Flop~\cite{Rosenberger:1988}. For our design, we implemented the EDL using Transition Detecting Time Borrowing (TDTB) latches proposed in~\cite{Bowman:2009}. The input to the DICE latch, \emph{Data}, is fed to a transition detector consisting of an XOR gate and delay element $\delta_p$. The asymmetric C-element remembers errors detected by the transition detector during the high phase of either \emph{CLK} or \emph{Sample\_bar}. The \revSecond{outputs} of the C-elements are ORed together and sampled by a Q-flop. The Q-flop produces dual-rail outputs \emph{Err} and \emph{Corr} which are both initially 0. After \emph{Sample} raises, the Q-flop samples its input. If its input is 1, i.e., if there was \revSecond{an} SET, it raises \emph{Err}; Otherwise it raises \emph{Corr}. It resets both outputs when \emph{Sample} falls. There are two small delay lines, typically made of a chain of inverters, that help ensure setup/hold conditions of the Q-flop are generally met. In particular, \emph{Sample} is a sufficiently delayed inverted version of \emph{CLK} that ensures that the C-element's output propagates to the Q-flop before \emph{Sample} goes high, thereby adhering to the Q-flop's setup time. \emph{Sample\_bar} is used as an input to the C-element to ensure the C-element output resets only after the Q-flop samples the data, thereby adhering to the Q-flop's hold time. The explicit constraints on these delays are further explained in Section \ref{sec:timing}. Notice that if there is \revSecond{an} SET on any of the nodes within the EDL, the EDL may produce a false-alarm that causes the controller to re-sample the latches inputs. It is important to recognize that this causes a degradation in performance but no logical error. For this reason most of the EDL need not \revSecond{to} have the overhead of being made SET tolerant. In particular, only the Q-flop in the EDL is sized so that its outputs are immune to radiation strikes, guaranteeing that even in the presence of an SET, \emph{Corr} and \emph{Err} can never both be high and the asynchronous control logic has clean inputs. We also note that more recent EDL designs can be adopted that reduce the overhead of error detection \cite{kim2016450mv,Hua:2016}. In particular, \cite{Hua:2016} proposed implementing multi-bit transition-detectors that significantly reduce the amortized area and power overheads. \subsection{Metastability Analysis} \label{sec:metastability} There are two sources of metastability that must be considered in this design, in the error-detection logic and in the data path latches. First, metastability can occur in the EDL logic because of an internal SEU in the C-element or a race between its inputs. Fortunately, the Q-flop contains a special metastability filter~\cite{Rosenberger:1988} which guarantees that the Q-Flop outputs will remain zero until any internal metastability is resolved. Secondly, metastability can occur in the datapath. Under normal operation, the circuit is timed to ensure that the inputs of the latches satisfy the setup and hold time that is relative to the falling edge of the CLK. However, \revSecond{an} SET may violate this condition causing a latch to go into metastability. For this reason the SFW is set to the time period for which the clock is high {\em plus} the hold time of the latch. Consequently, any SET that causes a latch to go into metastability will be detected and mitigated by re-opening and closing the latch, essentially re-sampling the data. This is in contrast to its timing-resilient inspiration \cite{Peter:2015} which, relying on worst-case timing analysis, does not re-sample the data but instead mitigates timing violations only by slowing down downstream pipeline stages. Notice also that the circuitry that detects \revSecond{an} SET can invariably experience metastability if the SET occurs at the very beginning or end of the SFW. The benefit of the Q-flop is that it isolates the controllers from the metastability and, on average, resolves any metastability very quickly. The SERAD controller simply stalls until one of the dual-rail error signals \revSecond{is} asserted (which happens only after \rev{metastability} is resolved). In contrast, the only approach to resolve this synchronously that we are aware of requires waiting a worst-case delay of one to two clock cycles for metastability to resolve with a reasonable mean-time-between-failures. Unfortunately, one cannot decide whether to stall a pipeline one to two clock cycles after the potential metastability event occurs. For this reason most timing resilient synchronous designs either have ignored metastability \cite{Fojtik:2012Ra}, resulting in poor mean-time-between-failure \cite{beer2014metastability}, or have relied on flush-and-replay logic in which the entire pipeline is flushed of data and replayed (e.g., \cite{Das:2009}). Consequently, although some synchronous timing resilient schemes are also resilient to some SETs (as suggested in, for example, \cite{ARM}), none provide as comprehensive resilience as SERAD. \begin{figure*}[tbh] \centering \includegraphics[width=\linewidth]{figure8_set_sim.pdf} \caption{Verilog simulations showing (a) the resiliency of SERAD controllers to SETs; (b) SETs at the dual rail input of controllers; (c) the working of SERAD during SETs; (d) the working of SERAD during consecutive SETs.} \label{fig:sim} \vspace{-1em} \end{figure*} \subsection{Timing Constraints} \label{sec:timing} This section explains the timing constraints associated with SERAD. To simplify this discussion we denote the delay components of the error detecting logic as follows. \begin{itemize} \item The propagation delay of the XOR gate i.e., from \emph{D} to \emph{X} of the EDL, is denoted $\delta_{xor-pd}$. \item The output pulse width of the XOR gate is denoted $\delta_{X-pw}$. \item The C-element's rising and falling propagation delays are denoted $\delta_{C-pullup}$ and $\delta_{C-pulldown}$, respectively. For simplicity, we assume these delays are larger than the C-element's minimum pulse width requirements. \item The propagation delay of the OR tree between the C-elements and Q-Flop is denoted $\delta_{or-tree}$. \item The Q-Flop's setup and hold times are denoted $\delta_{Q-setup}$ and $\delta_{Q-hold}$, respectively. \end{itemize} The output pulse of XOR gate should be sufficient wide so that it is captured by the C-element. This constraint can be approximated as \begin{equation} \delta_{X-pw} \ge \delta_{C-pullup} \end{equation} As illustrated in Fig.~\ref{fig:edl}, a small compensation delay $\delta_{comp}$ exists between the \emph{CLK} and \emph{Y} signals. It is implemented with an asymmetric delay line for which $\delta_{comp-r}$ denotes the delay after a rising input and $\delta_{comp-f}$ denotes the delay after a falling input. Using this delay line, the path delays from \emph{CLK} to the rising transition of \emph{Y} and the delay from data to \emph{X} are matched. This ensures that the C-element registers the change in \emph{Data} as soon as the associated latches go transparent and remains sensitized until after the hold time of the latches expires. Assuming an ideal clock-tree, the constraints the delay line must adhere to are as follows. \begin{equation} \delta_{comp-r} = \delta_{xor-pd} + \delta_{X-pw} \end{equation} \begin{equation} \delta_{comp-f} = \delta_{xor-pd} + \delta_{X-pw} + \delta_{DICE-hold} \end{equation} The Q-flop also has setup and hold constraints that should be observed (in the absence of metastability) to optimize performance. \subsubsection{Setup Constraint} The Q-flop samples its input value when \emph{Sample} goes high. As discussed earlier, to properly catch all desired SETs, \emph{Sample} should go high only after the completion of \revThird{the} hold period of \revThird{the latches}, i.e. when \emph{Y} goes low, and the error signal propagates to the Q-flop inputs. \begin{equation} \delta_{Su} \ge \delta_{C-pullup} + \delta_{or-tree} + \delta_{Q-setup} \end{equation} $\delta_{Su}$ is the lower bound of the falling delay of the delay line between \emph{Sample} and \emph{Y}. \subsubsection{Hold Constraint} The Q-flop input should be stable for its own hold time after the positive edge of sample. \begin{equation} \delta_{Q-hold} \le \delta_{H} + \delta_{C-pulldown} + \delta_{or-tree}, \end{equation} where $\delta_{H}$ is the minimum rising delay of the delay line between \emph{Sample} and \emph{Sample\_bar}. Fortunately, this constraint is easily met given reasonable physical design. It is thus not required during synthesis but must be verified during the final post-physical-design sign-off procedure. The EDL and controller delays also impose a lower bound on the non-overlap period $\delta_{no}$ between the two clocks of consecutive pipeline stages, as follows: \begin{equation} \delta_{no} \geq \delta_{comp-r} + \delta_{Su} + \delta_{Q-pd} + \delta_{ctrl}, \end{equation} where $\delta_{Q-pd}$ is the \emph{Sample} to \emph{Corr} delay of the Q-flop and $\delta_{ctrl}$ is the control logic delay from the \emph{Corr} signal of one pipeline stage to the rising edge of the \emph{CLK} signal of the next pipeline stage. If the worst-case delay of the combinational logic $\Delta$ is smaller than $\delta_{no} + \sigma$, this control overhead dictates the minimum cycle time of the design. Otherwise, the control overhead can be completely hidden by using a smaller delay line $\delta$ between pipeline stages. \section{Experimental Results} \label{sec:exp_results} \revSecond{ The proposed radiation-hardened design template was tested and evaluated using both digital and analog test benches.} \revThird{ The digital test benches used the Verilog digital simulator QuestaSim to demonstrate correct logical behavior of the template despite the presence of SETs. For these simulations, digital SETs were forcibly injected in the design.} \revThird{ Spice-like analog simulation within the Cadence Virtuoso tool suite were used to demonstrate the effectiveness of gate sizing and the impact of SETs that occur in the EDL. For these analog simulations SETs were modeled using double exponential current pulses whose specification were obtained using TCAD simulations.} \subsection{Verilog Simulations} \textbf{Case I:} Fig.~\ref{fig:sim}(a) shows \revSecond{an} SET in the controller \revSecond{that} will not propagate to the final outputs. An internal node (\emph{n31}) has \revSecond{an} SET which caused the output of one rail \emph{clk1} to have an error but the final output \emph{CLK} is error-free because the error is filtered by the sized guard gate. \textbf{Case II:} Fig.~\ref{fig:sim}(b) shows that \revSecond{an} SET at the input of the dual-rail controllers does not result in error at any of the final outputs. In particular, it shows \revSecond{that} \revSecond{an} SET at input \emph{R.ack1} does not cause an error in any of the outputs, \emph{CLK, R.req1, R.req2, L.ack1} and \emph{L.ack2}. \textbf{Case III:} Fig.~\ref{fig:sim}(c) shows what happens when \revSecond{an} SET in the combinational logic propagates to the input of the latch when clock is high. The clock (CLK), \revSecond{which re-samples the data, is closed and reopened,} marked as ``re-sampling" in Fig.~\ref{fig:sim}(c). Fig.~\ref{fig:sim}(d) shows an interesting sub-case when two SETs happens at the input of latch in consecutive cycles. Here, SERAD re-samples the data twice before it samples the correct data. \begin{figure*}[!h] \centering \includegraphics[width=\linewidth]{figure9_sim_cad.pdf} \caption{\rev{Spice simulations showing (a) resiliency of a sized guard-gate to \revThird{an SET} in the SERAD controller; (b) resiliency of a sized Q-flip when \revThird{a} particle strike occurs at one of the \revThird{outputs} of \revThird{a} Q-flop (\emph{Err}); (c) False error at the output of \revThird{a} sized Q-flop when \revThird{a} particle strike occurs at the input of the Q-flop.}} \label{fig:sim1} \vspace{-1em} \end{figure*} \subsection{Spice Simulations} \textbf{Case IV:} A particle strike occurs at the controller output. \revThird{The} output does not show a glitch \revThird{because} the guard gates are \revThird{properly} sized. In particular, the simulations of the sized guard gate in Fig.~\ref{fig:sim1}(a) \revSecond{show} two cases: (i) Case-A shows the double-exponential SET current pulse~\cite{bala:2005} applied at the output of the sized guard-gate which does not propagate. (ii) Case-B indicates \revSecond{an} SET at the input of the guard-gate which also does not affect the output. \textbf{Case V:} Fig.~\ref{fig:sim1}(b) illustrates the case when a particle strike occurs at one of the \revSecond{outputs} of \revSecond{the} Q-flop (\emph{Err}). Since the Q-flop is \revThird{properly sized, the output of the Q-flop does not glitch.} \textbf{\rev{Case VI:}} Fig.~\ref{fig:sim1}(c) illustrates \revSecond{that} a soft-error in the EDL logic can be latched by Q-flop and lead to a false error. \revThird{This happens when an SET occurs in the error detecting logic that is detected by the Q-flop which consequently asserts its \emph{Err} signal. The controller conservatively interprets this as an indication of an SET in the combinational logic.} The controller \revThird{thus unnecessarily} re-samples ``stable" data. We have also simulated the SERAD design under PVT variations, consisting of three process corners (FF, SS, TT), 10\% voltage variations, and temperature ranging from $-40^\circ C$ to $+70^\circ C$. We found process variations causes controller delay to vary by about 8\% around TT and that across all corners SET pulse widths vary by about 2.6\%. We observed that the SERAD controllers and EDL have sufficient margins to remain effective against \revThird{SETs} even under PVT variations. \subsection{Plasma Case Study} \revSecond{We also functionally validated the proposed template within an application in a radhard processor. In particular, we used} a 3-stage Plasma~\cite{Plasma} processor, an OpenCore MIPS CPU, synthesized using a leading commercial synthesis tool and the NCSU 45nm open-source cell library. We compare our post-synthesized SERAD Plasma processor with three other variants: \begin{itemize} \item Sync Plasma: An unhardened synchronous implementation of Plasma processor used as a comparison baseline. \item Glitch-Filter Plasma: A radiation-hardened synchronous implementation of Plasma where glitch-filtering~\cite{bala:2005} is used to mitigate glitches in the datapath. This technique has less area and power overhead than triple modular redundancy at the expense of a performance penalty equal to twice the delay of a worst-case SET pulse. \item TMR Plasma: A radiation-hardened synchronous implementation of Plasma using the conventional technique of triple modular redundancy~\cite{TMR}. This technique incurs large area and power overheads but does not incur a significant performance penalty. \end{itemize} Power consumption is calculated at 286 MHz (the maximum frequency achievable by all four compared variants) using the signal activity obtained from running the ``count" \rev{and ``pi"} programs that are included in the Plasma open-source distribution.\footnote{\rev{The ``count" program performs $\sum_{i=1}^\infty 3^i$ and displays each term in the series in its word form and the ``pi" program numerically computes the value of $\pi$.} The ``Coremark" program contains implementations of the following algorithms: list processing (find and sort), matrix manipulation (common matrix operations), state machine processing to determine if an input stream contains valid numbers), and a CRC (cyclic redundancy check). } More specifically, a combination of Python and TCL scripts were used to convert the original synchronous design into the radiation hardened variants. Custom cells were made for the guard gate and DICE \revSecond{FFs} and latches. The glitch filter version requires an SET filter~\cite{bala:2005} at the input of each \revSecond{FF} and all \revSecond{FFs} are replaced with DICE \revSecond{FFs} with SET filters in this design. For the TMR version, the combinational logic and FFs are triplicated and voters are added to each triplet of FFs. Similarly, the synchronous Plasma design is converted into a SERAD design using a semi-automated CAD flow similar to the \rev{timing-resilient so-called "Blade"} flow presented in~\cite{Peter:2015}. \rev{The Blade flow involves automatically synthesizing the RTL to gates using standard \revSecond{FFs} and using a custom TCL script to replace the FFs with two-phase master-slave latches, re-time the slave latches, replace timing-critical latches with error-detecting latches, and automatically add the EDL and Blade controllers to manage the local clocks. Our SERAD flow is different in that all latches are replaced with DICE latches (rather than only the timing-critical latches) and that the added EDL and SERAD controllers (described in Sections \ref{sec:controller} \& \ref{sec:EDL}) are different than those used for Blade \cite{Peter:2015}.} \rev{As with the Blade flow, the SERAD} flow is applicable to any RTL synchronous specification\rev{.} Table~\ref{tab:table1} shows the \rev{\emph{maximum}} performance \rev{and associated area} \rev{of} the four variants of Plasma using the synchronous design as a baseline. According to Table~\ref{tab:table1}, the area of SERAD Plasma design is 80\% higher than the baseline but comparable to the Glitch-Filter Plasma and less than half of the TMR design. This is because the added relative cost of the error detecting logic (EDL) and control logic are not large, and the total cost of DICE latches is not significantly more than that of the DICE FFs (despite having two-times more latches than FFs). Notice that the Glitch-Filter Plasma has the highest performance degradation due to the additional delay of twice of maximum SET pulse width ~\cite{Hosseinabady:2006}. It is important to emphasize that this cost is fixed and thus is more prominent for high-frequency designs. \begin{table}[h] \scriptsize\addtolength{\tabcolsep}{-0.3pt} \centering \begin{tabular}{|l|c|c|c|c|c|} \hline \multirow{2}{*}{Design type} & Max. & \multicolumn{4}{|c|}{Area}\\ \cline{3-6} & Freq. & Comb & Seq & Total & Incr. (\%)\\ \hline \bfseries{SERAD Plasma} & \bfseries{333} & \bfseries{55784} & \bfseries{25000} & \bfseries{80784} & \bfseries{80.6}\\ \hline Sync Plasma~\cite{Plasma} & 340 & 33083 & 11656 & 44739 & 0\\ \hline Glitch-Filter Plasma~\cite{bala:2005} & 286 & 57867 & 23439 & 81306 & 81.7\\ \hline TMR Plasma~\cite{TMR} & 329 & 143679 & 34969 & 178648 & 299 \\ \hline \end{tabular} \caption{Maximum frequency (MHz) and area ($\mu m^2$) comparison of the four design variants} \label{tab:table1} \end{table} \begin{table}[h] \scriptsize\addtolength{\tabcolsep}{3pt} \centering \begin{tabular}{|l|c|c|c|c|} \hline Design type & Comb & Seq & Total & Incr. (\%)\\ \hline \bfseries{SERAD Plasma} & \bfseries{2.57} & \bfseries{4.17} & \bfseries{6.74} & \bfseries{-23.7}\\ \hline Sync Plasma~\cite{Plasma} & 2.12 & 6.71 & 8.83 & 0 \\ \hline Glitch-Filter Plasma~\cite{bala:2005} & 2.97 & 10.2 & 13.2 & 49.5 \\ \hline TMR Plasma~\cite{TMR}& 7.69 & 18.34 & 26 & 194.4 \\ \hline \end{tabular} \caption{Power (mW) comparison of the four design variants \revSecond{with a 286MHz clock running} the ``count" program} \label{tab:table2} \end{table} \begin{table}[h] \scriptsize\addtolength{\tabcolsep}{3pt} \centering \begin{tabular}{|l|c|c|c|c|} \hline Design type & Comb & Seq & Total & Incr. (\%)\\ \hline \bfseries{SERAD Plasma} & \bfseries{2.54} & \bfseries{4.82} & \bfseries{7.36} & \bfseries{-25.1}\\ \hline Sync Plasma~\cite{Plasma} & 2.93 & 6.88 & 9.82 & 0 \\ \hline Glitch-Filter Plasma~\cite{bala:2005} & 4.91 & 10.46 & 15.37 & 56.5 \\ \hline TMR Plasma~\cite{TMR}& 11.26 & 18.64 & 29.9 & 204.5 \\ \hline \end{tabular} \caption{Power (mW) comparison of the four design variants \revSecond{with a 286MHz clock running} the ``pi" program} \label{tab:table3} \end{table} \begin{comment} \begin{table}[h] \captionsetup{labelfont={color=red}} \scriptsize\addtolength{\tabcolsep}{3pt} \centering {\color{red} \begin{tabular}{|l|c|c|c|c|} \hline Design type & Comb & Seq & Total & Incr. (\%)\\ \hline \bfseries{SERAD Plasma} & \bfseries{0.63} & \bfseries{4.45} & \bfseries{5.08} & \bfseries{}\\ \hline Sync Plasma~\cite{Plasma} & & & & 0 \\ \hline Glitch-Filter Plasma~\cite{bala:2005} & 2.9 & 6.55 & 9.45 & \\ \hline TMR Plasma~\cite{TMR}& 4.2 & 15.89 & 20.1 & \\ \hline \end{tabular}} \caption{\revSecond{Power (mW) comparison of the four design variants with a 286MHz clock running the ``CoreMark" program for 1 ms runtime}} \label{tab:table4} \end{table} \end{comment} \begin{table}[h] \scriptsize\addtolength{\tabcolsep}{3pt} \centering \begin{tabular}{|l|c|c|c|c|} \hline Design type & Comb & Seq & Total & Incr. (\%)\\ \hline \bfseries{SERAD Plasma} & \bfseries{2.59} & \bfseries{4.74} & \bfseries{7.34} & \bfseries{-12.8}\\ \hline Sync Plasma~\cite{Plasma} & 2.26 & 6.16 & 8.42 & 0 \\ \hline Glitch-Filter Plasma~\cite{bala:2005} & 3.05 & 6.58 & 9.63 & 14.3 \\ \hline TMR Plasma~\cite{TMR}& 8.26 & 18.43 & 26.69 & 216.9 \\ \hline \end{tabular} \caption{\revSecond{Power (mW) comparison of the four design variants with a 286MHz clock running the ``CoreMark" program}} \label{tab:table4} \end{table} \begin{comment} \begin{table}[bt] \scriptsize\addtolength{\tabcolsep}{3pt} \centering \begin{tabular}{|l|c|c|c|c|} \hline Design type & Comb & Seq & Total \\ \hline \bfseries{SERAD Plasma} & \bfseries{2.91} & \bfseries{5.40} & \bfseries{8.31} \\ \hline Sync Plasma~\cite{Plasma} & 3.45 & 8.17 & 11.63 \\ \hline Glitch-Filter Plasma~\cite{bala:2005} & 4.91 & 10.46 & 15.37 \\ \hline TMR Plasma~\cite{TMR}& 12.82 & 21.41 & 34.24 \\ \hline \end{tabular} \caption{\rev{Energy (uJ) for each design operated at its maximum frequency shown in Table 1.} } \label{tab:table4} \end{table} \end{comment} \rev{Table~\ref{tab:table2}, Table~\ref{tab:table3}}, \revSecond{and Table~\ref{tab:table4}} \revSecond{compare} the power consumption among the four design variants at the clock frequency of 286MHz using ``count," ``pi", \revSecond{and ``CoreMark"} programs, respectively.\footnote{\revSecond{Because the four variants compute exactly the same operation across every cycle, running all variants at the same frequency also provides a direct and fair comparison of energy consumption.}} Interestingly, the SERAD design is comparable to unhardened baseline in terms of performance and, somewhat counter-intuitively, is estimated to consume lower power. In particular, as detailed in \revSecond{the three power comparison tables, SERAD consumes relatively low sequential power.} This is a result of three factors. First, compared to the default FF design in the unhardened version, there is no local buffer in a DICE latch, which reduces clock switching power. The impact of this is particularly significant in this case study because of the relatively low switching activity on the data signals. Interestingly, this type of cell design has been independently proposed in error-detecting latch-based designs because the removed local clock buffers can be more efficiently compensated during physical design by properly adjusting the clock tree \cite{kim2016450mv}. Second, the input capacitance of the clock pin in the default FF is larger than in the DICE latch. In our library, the input capacitance is 8fF for the FF versus 5fF for the DICE latch. Lastly, the latch-based design yields lower switching activity at the sequential elements by eliminating unnecessary glitches. For our particular experiment, the data pin of the DICE latches has an average activity factor of 2.0\% compared to \revSecond{3.7\%} for the data pin of FFs in the unhardened design. \revSecond{In addition, we also note that the increase in area is due largely to the error detection logic which in normal operation does not switch.} This further explains why despite being larger, we see lower power consumption than the other three variants (operating at the same frequency). However, we do see about $5.9\times$ increase in the leakage power as compared to sync Plasma. \revSecond{In particular, the fraction of total power due to leakage in our SERAD design grew to 22.6\%.} This is due to the fact we are significant larger in size and because our DICE latches have not been optimized for leakage. While this power analysis comparison is promising, it is also important to recognize that these results do not take into account the power of the clock tree that is designed during and accounted for after physical design. In particular, two-phase latch-based designs require two clock trees which may present an additional power overhead. Such latch-based designs, however, have built-in hold margins and thus require fewer hold buffers (also added during physical design) than their FF-based counterparts. The combined impact of these effects is process, cell-library, and design dependent. \rev{ Given efficient clock tree synthesis for asynchronous designs is an on-going research and engineering challenge (see e.g., \cite{gimenez2018static}) we have estimated this overhead by place-and-routing synchronous \revSecond{FF} and two-phased latch-based Plasma designs and found the clock tree power increased by 12\% representing approximately a 2\% increase in overall power.} Lastly, it is important to note that these results do not take into account the ability of the asynchronous design to track process, voltage, and temperature variations. Because the delay of the control circuits is generally positively correlated with the delay of the combinational logic, smaller margins are needed in the delay lines than in synchronous clock periods. Although difficult to quantify, this leads to increased performance and/or increased yield \cite{Cortadella:2016,Zhang:2017}, the degree of which is dependent on the relative amount of local versus global variation, whether speed binning is employed, and whether chips are allowed to vary in performance due to transient voltage or temperature variations. \section{Conclusions} \label{sec:conclusions} This paper presents a design template for soft-error resilient asynchronous bundled-data design called SERAD that uses a novel combination of space and temporal redundancy to become resilient to SETs. The SERAD design template has been validated in a 45nm technology using a combination of Spice and Verilog simulations. The resulting area, performance, and power of the design template has been evaluated on an open-core MIPS-like processor. Compared with the unhardened synchronous version, the post-synthesis SERAD design is 81\% larger, exhibits negligible performance degradation, and is estimated to consume lower power. It consumes less than half of the area of the TMR design and is significantly faster than the glitch-filtering-based design, making it a promising approach for radiation hardening. There are two areas of future work that can improve the benefits of SERAD and expand its applicability. First, we can improve the performance of SERAD by leveraging its inherent timing-resilience by modifying its control to also recover from uncommonly long combinational delays. \revSecond{In particular, if the latch transparency window is started early, near-critical combinational delays will be detected as errors. They will trigger the error detecting logic and be mitigated via re-sampling.} This should cost negligible area but lead to significant further performance improvements over unhardened synchronous designs. Second, we propose to design radiation-hardened asynchronous-synchronous clock domain crossing modules that can surround a SERAD design, enabling it as a drop-in replacement for latency-insensitive synchronous modules. \begin{comment} \section*{Acknowledgment} \end{comment} \revSecond{ \section*{Acknowledgements} We would like to acknowledge the help of Dr. Dylan Hand in porting the CoreMark program to Plasma. This work is supported in part by a grant received from the Ministry of Electronics and Information Technology (MEITY), Government of India for a Special Manpower Development Project for Chips to System Design (SMDP-C2SD) and by a grant received from the Science and Engineering research board (SERB) grant CRG/2018/005013 . } \input{bib.tex} \begin{IEEEbiography} [{\includegraphics[width=1in, height=1.25in, clip, keepaspectratio]{./authors_pictures/authorAparna_Aketi.jpg}}] {\textbf{Sai Aparna Aketi}} received her B.Tech degree in Electrical Engineering at Indian Institute of Technology Gandhinagar in 2018. This work was started when Aparna Aketi was interning at the University of Southern California as part of IUSSTF-Viterbi Program in 2017. She is currently pursing her doctoral degree under the guidance of Prof. Kaushik Roy at Centre for Brain Inspired Computing (C-BRIC), Purdue University. Her current research interests include a variety of topics in explainable, robust and energy-efficient deep learning. \end{IEEEbiography} \vspace{-1.5em} \begin{IEEEbiography} [{\includegraphics[width=1in, height=1.25in, clip, keepaspectratio]{./authors_pictures/authorSmriti_Gupta.jpg}}] {\textbf{Smriti Gupta}} received her B.Tech degree in Electronics \& Communication Engineering from Institute of Engineering \& Technology Lucknow, India in 2016 and her M.Tech degree in Electrical Engineering from Indian Institute of Technology Gandhinagar in 2018. She is currently working as a Senior Engineer in MediaTek Bangalore, India. Her interests include high performance and low power VLSI designs. \end{IEEEbiography} \vspace{-1.5em} \begin{IEEEbiography} [{\includegraphics[width=1in, height=1.25in, clip, keepaspectratio]{./authors_pictures/authorhuimei_cheng.jpg}}] {\textbf{Huimei Cheng}} Huimei Cheng is a Ph.D. student in Ming Hsieh Department of Electrical and Computer Engineering at the University of Southern California. She received her B.S. degree at Nanjing University of Information \& Technology (China) in 2014, and her M.S. degree from USC in 2016. Upon graduation, she worked at Synopsys in R\&D Prime Time team conducting research on pessimism reduction in crosstalk. She is a student member of IEEE. Her research interests include a variety of topics in CAD and asynchronous VLSI design. \end{IEEEbiography} \vspace{-1.5em} \begin{IEEEbiography} [{\includegraphics[width=1in, height=1.25in, clip, keepaspectratio]{./authors_pictures/authorJoycee_Mekie.jpg}}] {\textbf{Joycee Mekie}} received her Ph.D. degreee in Electrical Engineering from IIT Bombay in 2009, and received her Bachelors and Masters in Electrical Engineering from M. S. University of Baroda in 1997 and 1999, respectively. She joined as Assistant Professor in the Electrical Engineering Department at IIT Gandhinagar in 2009. She is a recipient of the prestigious Young Faculty Research Fellowship (YFRF) from Ministry of Electronics and Information Technology under the Visvesvaraya PhD scheme. She has served on the technical program committee of several conferences, including ASYNC and VLSID, and is the reviewer for several journals, including TCASI, TCASII and TCAD. Her research interests include Approximate computing, Circuits for space applications, Asynchronous systems, Energy-efficient memory design, Computer architecture and Network-on-chip architectures. \end{IEEEbiography} \vspace{-1.5em} \begin{IEEEbiography} [{\includegraphics[width=1in, height=1.25in, clip, keepaspectratio]{./authors_pictures/authorpeter_beerel.jpg}}] {\textbf{Peter A. Beerel}} received his B.S.E. degree in Electrical Engineering from Princeton University, Princeton, NJ, in 1989 and his M.S. and Ph.D. degrees in Electrical Engineering from Stanford University, Stanford, CA, in 1991 and 1994, respectively. Professor Beerel is currently a Full Professor and Associate Chair of the Computer Engineering Division of the Ming Hsieh Electrical and Computer Engineering Department at the University of Southern California. He co-founded TimeLess Design Automation to commercialize an asynchronous ASIC flow in 2008 and sold the company in 2010 to Fulcrum Microsystems which was bought by Intel in 2011. His interests include a variety of topics in CAD, VLSI, and Machine Learning. He is a Senior Member of the IEEE. \end{IEEEbiography} \end{document}
\section{Introduction} Nowadays it is hard to imagine a life without e-mail communication, particularly in business area. The growth of e-mail's popularity is accounted for low cost and high effectiveness of exchanging messages. The same factors contribute to the increasing amount of spam. According to a report by Kaspersky~\cite{ref_securelist}, the average percentage of spam in the global mail traffic in Q1-Q2 2019 was 57.64\%, up 1.67 p.p. compared to the previous reporting period. The largest share of spam was recorded in May ($58.71\%$). In Q2 2019, Kaspersky alone detected more than 43 million of malicious email attachments and about 130 million phishing attacks. Statistics show that spam campaigns are a serious threat these days. A large amount of spam in the mailbox causes a decrease in performance, wastage of storage space and inconvenience when using e-mail. Moreover, spam messages can carry malicious content, phishing and fraud schemes, which can harm both casual users and business around the world. Anti-spam software companies aim to protect users against malicious mail, and, crucially, ensure the delivery of all legitimate messages to them. Otherwise, even one misclassified message, for example, from a business conversation, can lead to significant reputation risks. To reach a low false positive rate, anti-spam decisions must be very reliable, which obviously reduces detection rate. To solve this problem, commercial anti-spam products delay potential spam messages to recheck them after a certain time to improve the reliability of the anti-spam solution. The Axway Inc. in~\cite{ref_patent} described delay technique in e-mail filtering system, which provides a store and the transmission path of quarantined data. This mechanism was established reliable and now its different modifications are used in many companies such as Cisco, Barracuda and others. In this paper, we describe a novel approach to quarantine messages. Our work focuses on applying Deep Learning~\cite{ref_dl} techniques on MIME (Multipurpose Internet Mail Extensions)~\cite{ref_mime} headers to classify potential spam. Unlike most research papers, our solution does not process body content of a message. The proposed architecture has three inputs: a char sequence of Message-Id, a sequence of headers and X-Mailer. For extracting information from sequential data, we use one-dimensional convolutional neural network (CNN). This method was applied on characters to text classification~\cite{ref_clcn}. It has been shown that this approach can be competitive to traditional solutions for example with a simple long-short term memory net (LSTM)~\cite{ref_lstm}. Moreover, CNNs do not depend on the computations of the previous states unlike LSTM. This fact affects model performance, which is extremely important in real-time services. We evaluated our approach on a large-scale dataset. In the experiments, we showed that combination of our proposed model and traditional spam filters improves in classification rates. \section{Related Work} Cybercriminals continue to look for new ways to spread spam and improve previous techniques. Traditional signature approaches are becoming less effective compared to previous years. The reasons are poor generalization ability and the need to use human resources to find new attacks and develop signatures to block them. Machine learning techniques have recently become very effective to fight spam. Most research papers propose different methods to handle body content of a message.~\cite{ref_pois_attacks} suggested a defence strategy against poisoning attacks, when spammers enrich messages with legitimate words to defeat filters. They showed that bagging ensembles could be very promising in this task. In~\cite{ref_Dhamani} authors applied deep learning and transfer learning techniques to detect different attacks such as phishing, social engineering, propaganda and others.~\cite{ref_pois_attacks} demonstrated a phishing content classifier based on a recurrent neural network. There are also related works that use non-content features for spam detection.~\cite{ref_Zhang} noted that message headers are a powerful source of features for spam filtering. The experiments showed that using only features from headers could achieve comparable or better performance than where using body content. In~\cite{ref_Qaroush} and~\cite{ref_Hu} authors proposed hand-crafted methods to extract features from e-mail headers, and evaluated performance of various machine learning classifiers using a prepared corpus. Publicly available benchmark datasets on e-mail spam highlighted in~\cite{ref_Bhowmick} are not regularly updated thus do not reflect actual threats. Publication of real email collections is almost impossible since this data is associated with numerous confidential and legal restrictions. Moreover, available datasets can be highly biased because they contain conversations between a small group of users. For example, the popular Enron corpus~\cite{ref_Enron} is deemed to be in the public domain as the result of an investigation after the company's collapse and contains only communications between Enron employees. These factors complicate research in this area and the adaptation of the proposed methods in the real world. \section{Method} In this section, we introduce the design of DQ. We describe three main parts of the new technology. First, we focus on backend logic, which is responsible for message transactions and the system-customer relationship. Then we illustrate preprocessing of message headers. Finally, we show design of model for spam classification. \subsection{Backend logic} According to Figure \ref{fig:f1} messages in origin-based scheme are processed by complicated system of spam filters before delivered to user. Moreover, spam filters are regularly updated because statistical properties of spam campaigns change over time. Indeed, this approach can be used and potentially provides high detection rate. In real life, most missed spam is detected shortly after updating filters. Unfortunately, the considered scheme delivers these messages to users because spam decisions are made once when a message is received. To solve this problem we implemented DQ, illustrated on Figure \ref{fig:f2}. DQ is a cloud technology, which provides request-response logic with an installed anti-spam service on user's machines. The main objective of DQ is classification of potential spam. After a messages passed through filters, the service sends a request to DQ with message headers and waits for a response. Meanwhile, DQ handles input data and returns \textit{true} if message should be delayed or \textit{false} otherwise. Of course, in real life organization of this communication to process the big data that accumulates from different user nodes is not a trivial task. We do not go deep into implementation details and focus on logic of the technology. As shown on Figure \ref{fig:f2}, suspicious mail is put in the Quarantine folder for a while, others are delivered to user. When the time is over, quarantined messages pass through filters again. It should be noted that DQ only receives required headers and returns the quarantine decision, all delayed mail in Quarantine folder is located on the user PC. The proposed scheme allows to gain the time to update filters and double-check suspicious messages to improve the reliability of the anti-spam solution. Moreover, this implementation provides a low-cost way to update the model that is extremely important to adapt to new spam tactics or changing mail transfer protocols. \begin{figure*}[htp] \subfloat[Origin-based ]{\label{fig:f1} \includegraphics[width=.4\textwidth]{backend_2_2.png}} ~ \subfloat[DQ implementation]{\label{fig:f2} \includegraphics[width=.525\textwidth]{backend_1_1.png}} \caption{Backend of spam-filtering systems} \centering \end{figure*} \subsection{Headers preprocessing} It is well known that the feature selection plays a big role in model performance. The e-mail provides a large amount of information about a sender and content of the message. Some of this data can be absolutely useless and add unwanted noise that can be a reason of lower model performance. Our solution is based on non-content classification. Due to this fact, we are able to transfer data to cloud service and collect this type of information using simpler way than in content-based case. Another important aspect is the ability to quickly extract features from message. As far as DQ is a real-time service, performance is very important to ensure email communication without delay. At the moment, the model takes: Message-ID, a sequence of message headers (HeaderSeq) and X-mailer. To bypass protection systems and spread malicious mail, spammers often use their own Mail User Agent (MUA). MUAs are responsible for preparing email messages for transferring to a Mail Transfer Agent (MTA). One of the MUA tasks is to create and fill correct MIME headers. Some of attackers ignore it and can use random content for headers. Others try to fake headers to make them look like real ones. We focus on Message-ID and HeaderSeq for several reasons. Firstly, these features have non-trivial structure. Secondly, the form of Message-Id and the order of headers in HeaderSeq can vary depending on the type of MUA, which creates a tight connection between features. These facts make compromising more difficult, which helps the model to detect spam. We also added X-mailer to define MUA. Below we describe features and their representation for the classifier. \subsubsection{The Message-ID} provides an identifier for messages and looks like a sequence of US-ASCII characters between an angle bracket pair. For example: $$\langle \textit{<EMAIL>} \rangle$$ Message-ID consists of two parts splitted by @. The left part of the Message-ID is a hash that has a specific structure for different MUAs. The right part is a domain. The Message-ID is transformed to a tensor size $l$, where each row vector is a char embedding. For encoding, we build a vocabulary that maps US-ASCII chars (without special characters) to trainable embeddings. In addition, we added two symbols $<EOS>$ for the end of a string and $<UNK>$ for unknown characters. In case the length of Message-ID is greater than $l$, the first $l$-characters are taken. In case length of Message-ID is less than $l$, the sequence is filled with $<EOS>$ to the length $l$. \subsubsection{The HeaderSeq} is a sequence of MIME headers in the message. The order of headers can vary depending on the type of MUA. The encoding of HeaderSeq has the same scheme as the Message-ID. The only difference is that we operate with header names, not characters. For example: $$\textit{subject:from:to:date:message-id:content-type:}$$ is a possible HeaderSeq. The final representation is a tensor with fixed shape where each row is an encoded header. The number of rows was estimated from statistics as a 95-percentile of HeaderSeq length. \subsubsection{The X-Mailer} is the name of a MUA. Before encoding, we preprocess the X-Mailer to get information only about the type of MUA. For an actual e-mail program, we drop information about version and release. For example: $$\textit{Microsoft Windows Live Mail 14.0.8117.416}$$ is transformed to \textit{Microsoft}. This helps significantly reduce the size of the feature space. We also conducted experiments that used the name and version of MUA, but this did not increase performance. For an unknown e-mail program, we created a special category. The encoding is done by using \textit{one-hot encoding}. \subsection{Classifier design} In this section, we describe the architecture of the spam classifier. Despite the fact that DQ does not block messages, we cannot delay all of them for re-checking, because this significantly increase the delivery of an e-mail. Moreover, to ensure that e-mail work without delays, DQ has a time limit for the response. If the time is over, the message is delivered to the user without applying DQ. For these reasons, we have a trade-off between model complexity and computation time. Figure \ref{fig:architecture} demonstrates the model architecture. Following~\cite{ref_clcn}, for Message-ID and HeaderSeq we applied a temporal CNN to extract features from sequential data. This kind of CNN applies convolutional filters along one dimension and capture all units from others. Also we used the one-dimensional version of the max-pooling module applied in~\cite{ref_max_pooling}. \begin{figure} \includegraphics[width=\textwidth]{q3_paper.png} \caption{Architecture of spam classifier} \label{fig:architecture} \end{figure} For the Message-ID we designed a subnet with four temporal convolution layers with a fixed number of filters for each of them. We applied relu as activation function. Initially we use a layer with biggest filter size to extract information from longer subsequences. After the first and last layers, we inserted a temporal max-pooling layer to ensure stability of training. In the HeaderSeq branch, we used two layers: a temporal convolution layer and a temporal max-pooling layer. The shallow architecture is the result of a small length of HeaderSeq. The outputs from the convolutional nets are concatenated with the encoded X-Mailer to a one-dimensional tensor as illustrated in Figure \ref{fig:architecture}. Finally, we added two fully connected layers and inserted a dropout~\cite{ref_dropout} between them for regularization. We used sigmoid activation to obtain the probability of spam for model's output. \section{Experiments} In many research papers it is stated that a CNN usually requires large-scale datasets to work and achieve competitve performance in difference areas. Unfortunately, public datasets for spam classification are fairly small and do not show actual threats because they are not regularly updated. In this work, we used a collection that consists of metadata from tens of millions of real-time e-mail scans. We split the data into training and test datasets by timestamp to avoid leaking information from the future into the past. We sampled $120$ million objects for training and $40$ million objects for testing. In both datasets, the proportion of spam is about $40$ percent. We optimized weights of the model using SGD with momentum of $0.9$ to minimize the cross-entropy loss. We initialized the model weights using a Gaussian distribution and trained all layers together throughout nine epochs and halve the learning rate every three epochs. \begin{figure} \includegraphics[width=0.6\textwidth]{pr.jpg} \centering \caption{Precision-recall curve computed on the test dataset} \label{fig:pr_curve} \end{figure} We show the PR-curve in Figure \ref{fig:pr_curve} to demonstrate the model performance on the test data. As mentioned earlier, a classifier should have high precision to deliver legitimate e-mail messages without delay. We defined a probability threshold for which the precision is equal $0.998$ and the recall is $0.823$. We tested the DQ with this classifier in the course of 4 weeks in the real world. Our internal tests showed that the proposed technology detects up to $30\%$ of previously missed spam. \section{Results} This article proposes a non-content-based classification approach to delay potential spam messages in real time. On the one hand, we demonstrated a novel feature set and way to handle it for a spam classification task. On the other hand, we show that this method is well-suited for enterprise solutions because it has a simple update scheme, high performance and a low false positive rate. Furthermore, combining this technology with resource-intensive checks that require additional time for verification/response (such as a Whois requests, in-depth content verification, etc), we can get a fast and cost-effective system for detecting spam messages.
\section{Introduction}\label{sintro} The present paper is the third in our series of papers on representation theory of simple Lie pseudoalgebras, the first two of which are \cite{BDK1} and \cite{BDK2}. As in these papers, we will work over an algebraically closed field $\kk$ of characteristic $0$. Unless otherwise specified, all vector spaces, linear maps and tensor products will be considered over $\kk$. Recall that a \emph{Lie pseudoalgebra} is a (left) module $ L $ over a cocommutative Hopf algebra $ H $, endowed with a pseudobracket \[ L \otimes L \rightarrow (H \otimes H) \otimes_H L, \qquad a \otimes b \mapsto [a \ast b], \] which is an $ H $-bilinear map of $ H $-modules, satisfying some analogs of the skew-symmetry and Jacobi identity of a Lie algebra bracket (see \cite{BD}, \cite{BDK}, or \eqref{psss} and \eqref{psjac} in Section \ref{slieps} of the present paper). In the case when $ H = \kk$, this notion coincides with that of a Lie algebra. Furthermore, any Lie algebra $ \mathfrak{g} $ gives rises to a Lie pseudoalgebra $ \operatorname{Cur} \mathfrak{g} = H \otimes \mathfrak{g} $ over $ H $ with pseudobracket \[ [(1 \otimes a) \ast (1 \otimes b)] = (1 \otimes 1) \otimes_H [a,b], \] extended to the whole $ \operatorname{Cur} \mathfrak{g} $ by $H$-bilinearity. In the case where $ H = \kk [\partial], $ the algebra of polynomials in an indeterminate $ \partial $ with the comultiplication $ \Delta (\partial) = \partial \otimes 1 + 1 \otimes \partial, $ the notion of a Lie pseudoalgebra coincides with that of a \emph{Lie conformal algebra} \cite{K}. The main result of \cite{DK} states that in this case any finite (i.e., finitely generated over $ H = \kk [\partial] $) simple Lie pseudoalgebra is isomorphic to either $ \operatorname{Cur} \mathfrak{g} $ with simple finite-dimensional $ \mathfrak{g} $, or to the Virasoro pseudoalgebra $ \Vir = \kk [\partial ] \ell, $ where \[ [\ell \ast \ell] = (1 \otimes \partial - \partial \otimes 1 ) \otimes_{\kk [\partial]} \ell. \] In \cite{BDK}, we generalized this result to the case where $ H = U ({\mathfrak d}), $ where $ {\mathfrak d} $ is a finite-dimensional Lie algebra. The generalization of the Virasoro pseudoalgebra is the Lie pseudoalgebra $ W ({\mathfrak d}) = H \otimes {\mathfrak d}$ with the pseudobracket \begin{align*} [ (1 \otimes a) \ast (1 \otimes b)] &= (1 \otimes 1) \otimes_H (1 \otimes [a,b]) \\ &\quad+ (b \otimes 1) \otimes_H (1 \otimes a) - (1 \otimes a) \otimes_H (1 \otimes b). \end{align*} The main result of \cite{BDK} is that all non-zero subalgebras of the Lie pseudoalgebra $ W ({\mathfrak d}) $ are simple and non-isomorphic, and along with $ \Cur \mathfrak{g}, $ where $ \mathfrak{g} $ is a simple finite-dimensional Lie algebra, they provide a complete list of finitely generated over $ H $ simple Lie pseudoalgebras. Furthermore, in \cite{BDK} we gave a description of all subalgebras of $ W ({\mathfrak d}). $ Namely, a complete list consists of the ``primitive'' series: the special Lie pseudoalgebras $ S({\mathfrak d}, \chi), $ the Hamiltonian Lie pseudoalgebras $ H({\mathfrak d}, \chi, \omega) $, the contact Lie pseudoalgebras $ K({\mathfrak d}, \theta), $ and their ``current'' extensions. The geometric meaning of the data $ \chi, \omega, $ and $ \theta $ is as follows: $ \chi \in \mathfrak{d}^\ast $ is a closed $1$-form (= trace-form), i.e., $ (d \chi )(a\wedge b) := \chi ([a,b]) =0$; $\omega \in \bigwedge^2 \mathfrak{d}^* $ is a conformally symplectic form, i.e., it is non-degenerate and \[ d\omega + \chi \wedge \omega = 0; \] finally, $ \theta \in \mathfrak{d}^* $ is a contact 1-form (cf.\ \cite{BDK2}). This explains why representation theory of the $ K $ and $ H $ type Lie pseudoalgebras is intimately related to the constructions in contact and conformally symplectic geometry of \cite{Ru} and \cite{E}. For every Lie pseudoalgebra $ L $, we have a functor \cite{BDK} \[ Y \mapsto \mathcal{A}_Y L : = Y \otimes_H L \] that assigns a Lie algebra $ \mathcal{A}_Y L $ to any commutative associative algebra $ Y $ equipped with compatible left and right actions of the Hopf algebra $ H. $ The Lie algebra bracket on $ \mathcal{A}_Y L $ is given by \[ [x \otimes_H a, y \otimes_H b] = \sum_{i} (xf_i)(yg_i) \otimes_H c_i, \quad \text{if}\quad [a \ast b] = \sum_i (f_i \otimes g_i) \otimes_H c_i. \] The main tool in the study of Lie pseudoalgebras and their representations is the \emph{annihilation algebra $ \mathcal{A}_X L $}, where $ X = H^\ast $ is the commutative associative algebra dual to the coalgebra $ H. $ In particular, a module over a Lie pseudoalgebra $ L $ is the same as a ``conformal'' module over the extended annihilation Lie algebra $ {\mathfrak d} \sd \mathcal{A}_X L $ (see \cite{BDK1} and Proposition \ref{preplal2} below). Note that $ X \simeq \mathcal{O}_M := \kk [[t^1, \dots, t^M ]]$ where $ M = \dim {\mathfrak d}. $ We define a topology on $ \mathcal{O}_M $ with a fundamental system of neighborhoods of 0 given by the powers of the maximal ideal $ (t^1, \ldots, t^M) $. Then the annihilation algebra of the Lie pseudoalgebra $ W({\mathfrak d}) $ is isomorphic to the \emph{Lie--Cartan algebra $ W_M $} of continuous derivations of $ \mathcal{O}_M $ (see \cite{BDK1} and Section \ref{subwd} below). Similar isomorphisms hold for $S$- and $K$-type Lie pseudoalgebras \cite{BDK1}, \cite{BDK2}. However the annihilation algebra of $ H({\mathfrak d}, \chi, \omega) $ is isomorphic to the Lie algebra structure $ P_M $ on $ \mathcal{O}_M, \ M = 2N, $ given by \[ [f,g] = \sum_{i = 1}^{N} \Bigl( \frac{\partial f}{\partial t^i} \frac{\partial g}{\partial t^{N+i}} - \frac{\partial f}{\partial t^{N+i}} \frac{\partial g}{\partial t^i} \Bigr), \] so that $ P_M / \kk 1 $ is isomorphic to the Hamiltonian Lie--Cartan algebra $ H_{2N} $ of vector fields annihilating the standard symplectic form $ \sum_{i = 1}^{N} dt^i \wedge dt^{N+i} $. This explains the name and notation $ H $ of the corresponding Lie pseudoalgebra. We hope that the reader will not confuse this $ H $ with the Hopf algebra $ H = U (\mathfrak{d}) $. In \cite{BDK1}, we constructed all \emph{finite} (i.e., finitely generated over $ H = U({\mathfrak d}) $) irreducible modules over the Lie pseudoalgebras $ W({\mathfrak d}) $ and $ S({\mathfrak d}, \chi) $. The simplest non-zero module over $ W({\mathfrak d}) $ is $ \Omega^0 ({\mathfrak d}) = H $, with the action given by \begin{equation}\label{e1.1} (f \otimes a) \ast g = -(f \otimes ga) \otimes_H 1, \qquad f,g \in H,\; a \in {\mathfrak d}. \end{equation} A generalization of this construction, called a tensor $ W({\mathfrak d}) $-module, is as follows \cite{BDK1}. First, given a Lie algebra $ \mathfrak{g} $, define the semidirect sum $ W ({\mathfrak d}) \ltimes \Cur \mathfrak{g} $ as a direct sum of $ H $-modules, for which $ W({\mathfrak d}) $ is a subalgebra and $ \Cur \mathfrak{g} $ is an ideal, with the following pseudobracket between them: \[ \left[(f \otimes a) \ast (g \otimes b) \right] = -(f \otimes ga) \otimes_H (1 \otimes b) , \qquad f, g \in H, \; a \in {\mathfrak d}, \; b \in \mathfrak{g} . \] Given a finite-dimensional $ \mathfrak{g} $-module $ V_0 $, we construct a representation of the Lie pseudoalgebra $ W({\mathfrak d}) \sd \Cur \mathfrak{g} $ in $ V = H \otimes V_0 $ by (cf.\ \eqref{e1.1}): \begin{equation}\label{e1.2} \bigl( (f \otimes a) \oplus (g \otimes b) \bigr) \ast (h \otimes v) = -(f \otimes ha) \otimes_H (1 \otimes v) + (g \otimes h) \otimes_H (1 \otimes bv), \end{equation} where $ f, g, h \in H$, $a \in {\mathfrak d}$, $b \in \mathfrak{g}$, $v \in V_0 $. Next, we define an embedding of $ W({\mathfrak d}) $ in $ W({\mathfrak d}) \ltimes \Cur ({\mathfrak d} \oplus \gl\,\dd) $ by \begin{equation}\label{e1.3} 1 \otimes \partial_i \mapsto (1 \otimes \partial_i) \oplus \Bigl( (1 \otimes \partial_i ) \oplus (1 \otimes \operatorname{ad} \partial_i + \sum_j \partial_j \otimes e^j_i) \Bigr), \end{equation} where $ \{\partial_i\} $ is a basis of $ {\mathfrak d} $ and $ \{e^j_i\} $ is a basis of $\gl\,\dd$, defined by $ e^j_i (\partial_k) = \delta^j_k \partial_i $. Composing this embedding with the action \eqref{e1.2} of $ W({\mathfrak d})\ltimes \Cur ({\mathfrak d} \oplus \gl\,\dd) $, we obtain a $ W({\mathfrak d}) $-module $ V = H \otimes V_0 $ for each $ ({\mathfrak d} \oplus \gl\,\dd) $-module $ V_0 $. This module is called a \emph{tensor $ W({\mathfrak d}) $-module} and is denoted $ \mathcal{T} (V_0) $. The main result of \cite{BDK1} states that any finite irreducible $ W({\mathfrak d}) $-module is a unique quotient of a tensor module $ \mathcal{T} (V_0) $ for some finite-dimensional irreducible $ ({\mathfrak d} \oplus \operatorname{gl} {\mathfrak d}) $-module $ V_0 $. Furthermore, it describes all cases where $ \mathcal{T} (V_0) $ are not irreducible, and provides an explicit construction of their irreducible quotients, called the \emph{degenerate $ W({\mathfrak d}) $-modules}. Namely, we prove in \cite{BDK1} that all degenerate $ W({\mathfrak d}) $-modules occur as images of the differential ${\mathrm{d}} $ in the \emph{$ \Pi $-twisted pseudo de Rham complex} of $ W({\mathfrak d}) $-modules \begin{equation}\label{e1.4} 0 \rightarrow \Omega^0_\Pi ({\mathfrak d}) \overset{{\mathrm{d}}}{\rightarrow} \Omega^1_\Pi \overset{{\mathrm{d}}}{\rightarrow} \cdots \overset{{\mathrm{d}}}{\rightarrow} \Omega^{\dim {\mathfrak d}}_\Pi ({\mathfrak d}). \end{equation} Here $ \Pi $ is a finite-dimensional irreducible $ {\mathfrak d} $-module and $ \Omega^n_\Pi ({\mathfrak d}) = \mathcal{T} (\Pi \otimes \bigwedge^n {\mathfrak d}^\ast) $ is the space of pseudo $ n $-forms. In the present paper, we construct all finite irreducible modules over the Hamiltonian Lie pseudoalgebra $ H({\mathfrak d}, \chi, \omega). $ This Lie pseudoalgebra is constructed as follows. Choose a basis $ \{ \partial_i \}^{2N}_{i =1} $ of $ \mathfrak{d}, $ and the dual basis $ \{ \partial^i \}^{2N}_{i =1} $ with respect to the (non-degenerate) bilinear form $ \omega $ on $ \mathfrak{d}, $ so that $ \omega (\partial^i \wedge \partial_j) = \delta^i_j . $ Let \begin{equation}\label{e1.5} r = \sum_{i = 1}^{2N} \partial_i \otimes \partial^i= - \sum_{i=1}^{2N}\partial^i \otimes \partial_i = \sum_{i,j = 1}^{2N} r^{ij} \partial_i \otimes \partial_j , \end{equation} and define $ s \in \mathfrak{d} $ by \[ \chi (a) = \omega (s \wedge a), \qquad a \in \mathfrak{d}. \] Let, as before, $ H = U (\mathfrak{d}) $ and consider the free $ H $-module rank $1$, $ He $, equipped with the pseudobracket given by \begin{equation}\label{e1.6} [e \ast e] = (r + s \otimes 1 - 1 \otimes s) \otimes_H e, \end{equation} and extended to $ He $ by bilinearity. This is a simple Lie pseudoalgebra, denoted by $ H(\mathfrak{d}, \chi, \omega). $ There is a unique pseudoalgebra embedding of $ H ({\mathfrak d}, \chi, \omega) $ in $ W ({\mathfrak d}) = H \otimes {\mathfrak d}, $ defined by \cite{BDK} \[ e \mapsto -r + 1 \otimes s. \] We will denote again by $ e $ its image in $ W({\mathfrak d}). $ Let $\sp\,\dd$ be the symplectic subalgebra of the Lie algebra $\gl\,\dd$, defined by the skewsymmetric bilinear form $ \omega. $ Let $ \{e^i_j\} \subset \End {\mathfrak d} $ be the basis of matrix units in the basis $ \{\partial_i\} $ of $ {\mathfrak d}, $ and let $ e^{ij} = \sum_k r^{ik} e^j_k $ be another basis of $ \End {\mathfrak d} $, where the $ r^{ik} $ are defined by \eqref{e1.5}. Then the elements \[ f^{ij} = -\frac{1}{2} (e^{ij} + e^{ji}), \qquad 1 \leq i \leq j \leq 2N, \] form a basis of $\sp\,\dd.$ It is important to highlight that repeating the same strategy as in primitive Lie pseudoalgebras of type $W, S, K$ is not straightforward, as in type $H$ there are several issues that force novel and more irregular behaviour. \begin{itemize} \item The annihilation algebra ${\mathcal{P}}$ of $H(\dd,\chi,\om)$ is a graded Lie algebra with a nontrivial one-dimensional center. The above embedding of $H(\dd,\chi,\om)$ inside $\Wd$ does not induce a corresponding embedding of annihilation algebras, since central elements from ${\mathcal{P}}$ lie in its kernel; as a consequence, a complete family of tensor modules for $H(\dd,\chi,\om)$ cannot be obtained by restriction from tensor modules for $\Wd$, as one will only obtain modules where central elements act trivially. \item Constructing tensor modules as induced modules does not yield, as with primitive pseudoalgebras of other types, a corresponding grading, but only a filtration. Indeed, even though the annihilation algebra is graded , central elements lie in degree $-2$, whereas Schur's Lemma forces them to act via scalar multiplication which, if homogeneous, should have degree $0$. \item The proof of existence of a unique maximal submodule in degenerate tensor modules fails, as it relies on a grading. In principle, nonconstant singular vectors (i.e., of positive degree in the filtration) may generate elements of lower degree and they indeed do so in explicit examples. \item Finally, nonconstant singular vectors in degenerate $H(\dd,\chi,\om)$-tensor modules split in multiple isotypical $\sp\,\dd$-components. This hints towards a more complicated structure of the lattice of their submodules and the possibility, which indeed occurs, that an irreducible quotient of each tensor module contains more non-isomorphic $\sp\,\dd$-summands of singular vectors. \end{itemize} All issues, but the last one, disappear if one only focuses on $H(\dd,\chi,\om)$-modules with a trivial action of the center, i.e., when the action of ${\mathcal{P}} \simeq P_{2N}$ factors through ${\mathcal{H}} \simeq H_{2N}$, and the usual strategy may be employed. In such case, writing down the action of $ e $ in a tensor $ W ({\mathfrak d}) $-module $ \mathcal{T} (V_0), $ where $ V_0 $ is a $ {\mathfrak d} \oplus \gl\,\dd$-module, and suitably twisting by $ \chi, $ we obtain a formula for the $ H({\mathfrak d}, \chi, \omega) $-module $ \mathcal{T} (V_0) = H \otimes V_0, $ where now $ V_0 $ is a $ {\mathfrak{d}} \oplus \sp\,\dd$-module. Explicitly, we have for $ v \in V_0 = \kk \otimes V_0 \subset \mathcal{T} (V_0)$: \begin{equation}\label{e1.7} \begin{aligned} e \ast v = \sum_{k=1}^{2N} (\bar{\partial}_k \otimes \partial^k) \otimes_H v & - \sum_{k=1}^{2N} (\bar{\partial}_k \otimes 1) \otimes_H (\partial^k + \ad^{\mathfrak{sp}} \partial^k ) v \\ & + \sum_{i,j = 1}^{2N} (\bar{\partial}_i \bar{\partial}_j \otimes 1) \otimes_H f^{ij} \\ \end{aligned} \end{equation} where $ \bar{\partial}_i = \partial_i - \chi (\partial_i), $ and $ \ad^{\mathfrak{sp}} \partial^k $ is the image of $ \operatorname{ad} \partial^k + \partial^k \otimes \chi $ under the projection $\gl\,\dd \rightarrow \sp\,\dd $ defined by $ e^{ij} \mapsto - f^{ij}. $ Theorem \ref{irrfacttens} of the present paper, analogous to those in \cite{BDK1} and \cite{BDK2}, implies that every finite irreducible $H({\mathfrak d}, \chi, \omega) $-module, with a trivial action of the center of ${\mathcal{P}}$, is a quotient of the tensor module $ \mathcal{T} (V_0), $ where $ V_0 $ is a finite-dimensional irreducible $ {\mathfrak d} \oplus \sp\,\dd$-module. We describe all cases where the $ H ({\mathfrak d}, \chi, \omega) $-modules $ \mathcal{T} (V_0) $ are not irreducible and give an explicit construction of their irreducible quotients, called {\em degenerate} $H({\mathfrak d}, \chi, \omega)$-modules. It turns out that, in analogy with the contact case \cite{BDK2}, all of the above non-trivial degenerate $H(\dd,\chi,\om) $-modules appear as images of composition of two maps (not one as in the contact case) in a certain complex of $H(\dd,\chi,\om)$-modules, which we call the \emph{twisted conformally symplectic pseudo de Rham complex}. This complex is constructed in Section \ref{stdrm} by a certain reduction of the pseudo de Rham complex \eqref{e1.4} (see Theorem \ref{tmodhd} and \thref{exactderhamnontrivial}). The idea of this construction is similar to Eastwood's reduction of the de Rham complex on a conformally symplectic manifold \cite{E}. The structure of the lattice of submodules of members of the twisted conformally symplectic pseudo de Rham complex requires a detailed study of singular vectors. This is carried out in Section \ref{sksing} and \ref{ssubmtm}. Let us now proceed to the case of $H(\dd,\chi,\om)$-modules with a nontrivial action of central elements in the annihilation algebra ${\mathcal{P}}$. Since this is a central extension of the corresponding simple Lie-Cartan algebra $H_{2N}$, an important role in representation theory of the Lie pseudoalgebra $H(\dd,\chi,\om)$ is played by the extension ${\mathfrak{d}}'={\mathfrak{d}}+\kk c$ of the Lie algebra ${\mathfrak{d}}$ by a $1$-dimensional abelian ideal $\kk c$, with brackets: $$[\partial,c]'=\chi(\partial) c, \qquad [\partial_1,\partial_2]'=[\partial_1,\partial_2]+\omega(\partial_1 \wedge \partial_2)c, \qquad \mbox{where } \partial,\partial_1,\partial_2\in {\mathfrak{d}}.$$ One may easily check that the central elements in ${\mathcal{P}}$ may only act by a nontrivial scalar when $\chi = 0$ and $\omega = {\mathrm{d}}\zeta$ is exact. Lie algebras with a non-degenerate exact $2$-form are known as {\em Frobenius Lie algebras} (the simplest example being the non-abelian $2$-dimensional Lie algebra). The central extension ${\mathfrak{d}}'$ then splits as a direct sum ${\mathfrak{d}}^\zeta \oplus \kk c$, where ${\mathfrak{d}}^\zeta$ is a Lie subalgebra isomorphic to ${\mathfrak{d}}$ which is a complement to the central ideal $\kk c$. In this case, the definition of tensor modules $\T(V_0)$ must be modified as follows: \begin{equation}\label{e1.7bis} \begin{aligned} e \ast v = \sum_{k=1}^{2N} (\bar{\partial}_k \otimes \partial^k) \otimes_H v & - \sum_{k=1}^{2N} (\bar{\partial}_k \otimes 1) \otimes_H (\partial^k + \ad^{\mathfrak{sp}} \partial^k ) v \\ & + \sum_{i,j = 1}^{2N} (\bar{\partial}_i \bar{\partial}_j \otimes 1) \otimes_H f^{ij} v + (1 \otimes 1) \otimes_H cv, \\ \end{aligned} \end{equation} where $c \in \kk$ provides the scalar action of the center of ${\mathcal{P}}$. Once again Theorem \ref{irrfacttens} shows that every finite irreducible non-trivial $H(\dd,0, \di \zeta)$-module is a quotient of $\T(V_0)$, where $V_0$ is a finite-dimensional ${\mathfrak{d}}' \oplus \sp\,\dd$-module. The complex of degenerate $H(\dd,0, \di \zeta)$-modules is now constructed by hand, by using the canonical maps between tensor modules whose existence is due to the presence of nonconstant singular vectors. The resulting complex is \eqref{splitexactcomplex}. The pathological behaviour we anticipated indeed occurs. Namely: \begin{itemize} \item each $\VPiprimen, 1 \leq n \leq N,$ contains {\bf two} maximal submodules; \item each $\im\DIn, 0 \leq n \leq N,$ contains {\bf two} distinct non-isomorphic ${\mathfrak{d}}'\oplus\sp\,\dd$-summands of singular vectors, hence it is a quotient of two distinct degenerate tensor modules. \end{itemize} Somewhat surprisingly, one may show that the whole complex is split exact, and that each member of the complex decomposes into the direct sum of its maximal submodules, which are also irreducible: this is a special behaviour of tensor modules when $c \neq 0$, which completely falls apart when $c = 0$. Thus, every finite irreducible degenerate $H(\dd,0, \di \zeta)$-module, which has a nontrivial action as $c \neq 0$, arises as image of one differential in this complex. This complex still lacks a differential geometrical construction, so that its geometrical meaning is as yet unclear. Irreducibility of tensor modules, not appearing in the above complexes, is proved in Section \ref{sirtm} (see Theorem \ref{irrcriterion}). The resulting complete non-redundant list of finite irreducible $ H({\mathfrak d}, \chi, \omega) $-modules is given in Theorem \ref{tclass}. As a corollary of our results, we obtain a classification and description of all degenerate irreducible modules over the Hamiltonian Lie--Cartan algebra $P_{2N}, $ along with the description of the singular vectors. This result when $c = 0$ was obtained long ago in \cite{Ru2}. \section{Preliminaries on Lie pseudoalgebras}\label{sprel} In this section, we review some facts and notation that will be used throughout the paper. For a more detailed treatment, we refer to our previous works \cite{BDK, BDK1, BDK2}. \subsection{Bases and filtrations of $H$ and $H^*$}\label{sbasfil} We will denote by $H$ the universal enveloping algebra $\ue({\mathfrak{d}})$ of the Lie algebra ${\mathfrak{d}}$. Then $H$ is a Hopf algebra with a coproduct $\Delta$, antipode $S$, and counit $\varepsilon$ given by: \begin{equation}\label{des} \Delta(\partial) = \partial\tp1 +1\tp\partial \,, \quad S(\partial)=-\partial \,, \quad \varepsilon(\partial)=0 \,, \qquad \partial\in{\mathfrak{d}} \,. \end{equation} We will use the following notation (cf.\ \cite{Sw}): \begin{align} \label{de1} \Delta(h) &= h_{(1)} \tp h_{(2)} = h_{(2)} \tp h_{(1)} \,, \\ \label{de2} (\Delta\tp\id)\Delta(h) &= (\id\tp\Delta)\Delta(h) = h_{(1)} \tp h_{(2)} \tp h_{(3)} \,, \\ \label{de3} (S\tp\id)\Delta(h) &= h_{(-1)} \tp h_{(2)} \,, \qquad\quad h\in H \,. \end{align} Then the axioms of antipode and counit can be written as follows: \begin{align} \label{antip} h_{(-1)} h_{(2)} &= h_{(1)} h_{(-2)} = \varepsilon(h), \\ \label{cou} \varepsilon(h_{(1)}) h_{(2)} &= h_{(1)} \varepsilon(h_{(2)}) = h, \end{align} while the fact that $\Delta$ is a homomorphism of algebras translates as: \begin{equation} \label{deprod} (fg)_{(1)} \tp (fg)_{(2)} = f_{(1)} g_{(1)} \tp f_{(2)} g_{(2)}, \qquad f,g\in H. \end{equation} Eqs.\ \eqref{antip}, \eqref{cou} imply the following useful relations: \begin{equation} \label{cou2} h_{(-1)} h_{(2)} \tp h_{(3)} = 1\tp h = h_{(1)} h_{(-2)} \tp h_{(3)}. \end{equation} Below it will be convenient to work with a basis $\{\partial_1, \dots, \partial_{2N}\}$ of ${\mathfrak{d}}$ and the dual basis $\{x^1,\dots,x^{2N}\}$ of ${\mathfrak{d}}^*$. Denote by $c_{ij}^k$ the structure constants of ${\mathfrak{d}}$, so that \begin{equation}\label{cijk} [\partial_i,\partial_j]=\sum_{k=1}^{2N} c_{ij}^k\partial_k \,, \qquad i,j=1,\dots,2N \,. \end{equation} Note that $H$ has a basis \begin{equation}\label{dpbw} \partial^{(I)} = \partial_1^{i_1} \dotsm \partial_{2N}^{i_{2N}} / i_1! \dotsm i_{2N}! \,, \qquad I = (i_1,\dots,i_{2N}) \in\ZZ_+^{2N} \,. \end{equation} The canonical increasing filtration of $H=\ue({\mathfrak{d}})$ is given by \begin{equation}\label{filued1} \fil^n H = \Span_\kk\{ \partial^{(I)} \st |I| \le n \} \,, \qquad \text{where} \quad |I|=i_1+\cdots+i_{2N} \,. \end{equation} This filtration does not depend on the choice of basis of ${\mathfrak{d}}$, and is compatible with the Hopf algebra structure of $H$ (see, e.g., \cite[Section~2.2]{BDK} for more details). We have: $\fil^{-1} H = \{0\}$, $\fil^0 H = \kk$, and $\fil^1 H = \kk\oplus{\mathfrak{d}}$. The dual $X=H^* := \Hom_\kk(H,\kk)$ is a commutative associative algebra. We will identify ${\mathfrak{d}}^*$ as a subspace of $X$ by letting $\langle x^i, \partial_i \rangle = 1$ and $\langle x^i, \partial^{(I)} \rangle = 0$ for all other basis vectors \eqref{dpbw}. This gives rise to an isomorphism from $X$ to the algebra $\mathcal{O}_{2N} = \kk[[t^1,\dots,t^{2N}]]$ of formal power series in $2N$ indeterminates, which sends $x^i$ to $t^i$. The Lie algebra ${\mathfrak{d}}$ has left and right actions on $X$ by derivations, given by \begin{align} \label{dx1} \langle \partial x, h\rangle &= -\langle x, \partial h\rangle \,, \\ \label{dx2} \langle x \partial, h\rangle &= -\langle x, h\partial\rangle \,, \qquad \partial\in{\mathfrak{d}} \,, \; x \in X \,, \; h \in H \,, \end{align} where $\partial h$ and $h\partial$ are the products in $H$. These two actions coincide only when ${\mathfrak{d}}$ is abelian. The difference $\partial x - x \partial$ gives the coadjoint action of $\partial\in{\mathfrak{d}}$ on $x\in X$. Throughout the paper, we will be given a \emph{trace-form} $\chi\in{\mathfrak{d}}^*$, so that $\chi([\partial,\partial'])=0$ for all $\partial,\partial' \in{\mathfrak{d}}$. Then the assignment \begin{equation}\label{dbar} \partial \mapsto \bar{\partial} = \partial - \chi(\partial), \qquad \partial\in{\mathfrak{d}}, \end{equation} extends to an associative algebra automorphism $h \mapsto \bar h$ of $H$. Note that its inverse is given in the same way but with $-\chi$ in place of $\chi$. It is convenient to define another basis of $H$ by applying the bar automorphism, thus obtaining elements $\bar{\partial}^{(I)}$. It is easily verified that the corresponding bar filtration on $H$ coincides with $\{\fil^n H\}$. The following results will be useful in the rest of the paper. \begin{lemma}\label{checkbar} For any trace-form\/ $\chi\in{\mathfrak{d}}^*$ and\/ $\partial\in{\mathfrak{d}}$, we have\/ $\partial\chi = \chi\partial = -\chi(\partial)$. In particular, \begin{align}\label{echi} (x e^{-\chi}) \bar{\partial} &= (x\partial) e^{-\chi}, \\ \label{echi2} \bar{\partial} (x e^{-\chi}) &= (\partial x) e^{-\chi}, \qquad x\in X, \; \partial\in{\mathfrak{d}} . \end{align} \end{lemma} \begin{proof} The first claim follows from \eqref{dx1} and \eqref{dx2}. Then \eqref{echi} and \eqref{echi2} are derived using that the right and left actions of $\partial$ are derivations of $X$. \end{proof} \begin{lemma}\label{dualtwisted} {\rm (i)} The map\/ $h \mapsto S(\overline{S(h)})$ is the inverse to the automorphism\/ $h\mapsto \overline{h}$ of\/ $H$. {\rm (ii)} The basis\/ $\{x_I e^{-\chi}\}$ of\/ $X$ is dual to the basis\/ $\{S(\overline{S(\partial^{(I)})})\}$ of\/ $H$. \end{lemma} \begin{proof} (i) The map $h \mapsto S(\overline{S(h)})$ is indeed an automorphism, because $h\mapsto \overline{h}$ is an automorphism and $S$ is an anti-automorphism. It is easy to see that for $\partial\in{\mathfrak{d}}$, we have $S(\overline{S(\partial)}) = \partial+\chi(\partial)$, which is the inverse to the map \eqref{dbar}. To prove (ii), first observe that $\langle x, 1 \rangle = \langle x e^{-\chi}, 1\rangle$ for $x \in X$, since $\langle x, 1\rangle$ is the constant term of $x$. Then using \eqref{dx1} and \eqref{echi2}, we find \begin{equation*} \begin{split} \delta_I^{J} & = \langle x_I, \partial^{(J)}\rangle = \langle S(\partial^{(J)})x_I, 1\rangle = \langle (S(\partial^{(J)})x_I)e^{-\chi}, 1\rangle\\ & = \langle \overline{\,S(\partial^{(J)})}\,(x_I e^{-\chi}), 1\rangle =\langle x_I e^{-\chi}, S(\overline{\,S(\partial^{(J)})})\rangle, \end{split} \end{equation*} as claimed. \end{proof} We introduce a decreasing filtration of $X$ by letting $\fil_n X = (\fil^n H)^\perp$ be the set of elements from $X$ that vanish on $\fil^n H$. Then $\fil_{-1} X = X$, $X/\fil_0 X \simeq\kk$, and $\fil_0 X/\fil_1 X \simeq{\mathfrak{d}}^*$. We define a topology of $X$ by considering $\{\fil_n X\}$ as a fundamental system of neighborhoods of $0$. We will always consider $X$ with this topology, while $H$ and ${\mathfrak{d}}$ are endowed with the discrete topology. Then $X$ is linearly compact (see \cite[Chapter~6]{BDK}), and both the multiplication in $X$ and the left and right actions of ${\mathfrak{d}}$ on it are continuous. \subsection{Lie pseudoalgebras and their modules}\label{slieps} Recall from \cite[Chapter~3]{BDK} that a {\em pseudobracket\/} on a left $H$-module $L$ is an $H$-bilinear map \begin{equation}\label{psprod} L \tp L \to (H \tp H) \tp_H L \,, \quad a \tp b \mapsto [a * b] \,, \end{equation} where we use the comultiplication $\Delta\colon H \to H \tp H$ to define $(H\tp H) \tp_H L$. We extend the pseudobracket \eqref{psprod} to maps $(H^{\tp 2} \tp_H L) \tp L \to H^{\tp 3} \tp_H L$ and $L \tp (H^{\tp 2} \tp_H L) \to H^{\tp 3}\tp_H L$ by letting: \begin{align} \label{psprod1} [(h\tp_{H}a)*b] &= \sum_i \, (h \tp 1)\, (\Delta\tp\id)(g_i) \tp_H c_i \,, \\ \label{psprod2} [a*(h\tp_{H}b)] &= \sum_i \, (1 \tp h)\, (\id\tp\Delta)(g_i) \tp_H c_i \,, \intertext{where $h\in H^{\tp 2}$, $a,b\in L$, and} \label{psprod3} [a*b] &= \sum_i \, g_i \tp_H c_i \qquad\text{with \; $g_i\in H^{\tp2}$, $c_i \in L$.} \end{align} A {\em Lie pseudo\-algebra\/} is a left $H$-module equipped with a pseudobracket satisfying the following skew-commutativity and Jacobi identity axioms: \begin{align} \label{psss} [b*a] &= -(\sigma \tp_H \id)\, [a*b] \,, \\ \label{psjac} [[a*b]*c] &= [a*[b*c]] - ((\sigma \tp \id)\tp_H\id)\, [b*[a*c]] \,. \end{align} Here, $\sigma\colon H \tp H \to H \tp H$ is the permutation of factors, and the compositions $[[a*b]*c]$, $[a*[b*c]]$ are defined using \eqref{psprod1}, \eqref{psprod2}. \begin{example}\label{ecur} For a Lie algebra $\g$, the \emph{current} Lie pseudoalgebra $\Cur\g=H\tp\g$ has an action of $H$ by left multiplication on the first tensor factor and a pseudobracket \begin{equation}\label{curbr*} [(f\tp a)*(g\tp b)] = (f\tp g)\tp_H(1\tp [a,b]) \,, \end{equation} for $f,g\in H$ and $a,b\in\g$. \end{example} A {\em module\/} over a Lie pseudo\-algebra\ $L$ is a left $H$-module $V$ together with an $H$-bilinear map \begin{equation}\label{psprod4} L \tp V \to (H \tp H) \tp_H V \,, \quad a \tp v \mapsto a * v \end{equation} that satisfies ($a,b\in L$, $v\in V$): \begin{equation}\label{psrep} [a*b]*v = a*(b*v) - ((\sigma\tp\id)\tp_H\id) \, (b*(a*v)) \,. \end{equation} An $L$-module $V$ will be called {\em finite\/} if it is finitely generated as an $H$-module, and is called {\em trivial} if $a*v = 0$ for all $a \in L, v \in V$, i.e., when the pseudoaction of $L$ on $V$ is trivial. The {\em zero\/} $L$-module is the set $\{0\}$. \begin{example}\label{ecur2} For any module $V_0$ over a Lie algebra $\mathfrak{g}$, we have the $\Cur \mathfrak{g}$-module $V=H \otimes V_0$, with the action given by \begin{equation} \label{curact} (g \otimes b) * (h \otimes v) = (g \otimes h) \otimes_H (1\otimes bv)\, , \end{equation} for $g,h \in H$, $b \in \mathfrak{g}$ and $v \in V_0$. \end{example} Let $U$ and $V$ be two $L$-modules. A map $\beta\colon U\to V$ is a {\em homomorphism\/} of $L$-modules if $\beta$ is $H$-linear and satisfies \begin{equation}\label{psprod6} \bigl( (\id\tp\id)\tp_H \beta \bigr) (a*u) = a * \beta(u) \,, \qquad a\in L \,, \; u\in U \,. \end{equation} A subspace $W\subset V$ is an {\em $L$-submodule\/} if it is an $H$-submodule and $L*W \subset (H\tp H)\tp_H W$, where $L*W$ is the linear span of all elements $a*w$ with $a\in L$ and $w\in W$. A submodule $W\subset V$ is called {\em proper\/} if $W\ne V$. An $L$-module $V$ is {\em irreducible\/} (or {\em simple}) if it does not contain any non-zero proper $L$-submodules and $L*V \ne \{0\}$. \begin{remark}\label{rlmod} {\rm(i)} Let $V$ be a module over a Lie pseudo\-algebra\ $L$ and $W$ be an $H$-submodule of $V$. By \cite[Lemma 2.3]{BDK2}, for each $a\in L$, $v\in V$, we can write \begin{equation*} a*v = \sum_{I\in\ZZ_+^{2N}} (\partial^{(I)} \tp 1) \tp_H v'_I \,, \qquad v'_I \in V \,, \end{equation*} where the elements $v'_I$ are uniquely determined by $a$ and $v$. Then $W\subset V$ is an $L$-submodule iff it has the property that all $v'_I \in W$ whenever $v \in W$. {\rm(ii)} Similarly, for each $a\in L$, $v\in V$, we can write uniquely \begin{equation*} a*v = \sum_{I\in\ZZ_+^{2N}} (1 \tp \partial^{(I)}) \tp_H v''_I \,, \qquad v''_I \in V \,, \end{equation*} and $W$ is an $L$-submodule iff $v''_I \in W$ whenever $v \in W$. \end{remark} \subsection{Twisting of representations}\label{stwrep} Let $L$ be a Lie pseudo\-algebra, and $\Pi$ be a finite-dimensional ${\mathfrak{d}}$-module. In \cite[Section 4.2]{BDK1}, we introduced a covariant functor $T_\Pi$ from the category of finite $L$-modules to itself. We review it in the case when all the $L$-modules are free as $H$-modules, which will be sufficient for our purposes. For a finite $L$-module $V=H\tp V_0$, which is free over $H$, we choose a $\kk$-basis $\{ v_i \}$ of $V_0$, and write the action of $L$ on $V$ in the form \begin{equation}\label{twrep1} a*(1\tp v_i) = \sum_j\, (f_{ij} \tp g_{ij}) \tp_H (1 \tp v_j) \end{equation} where $a \in L$, $f_{ij}, g_{ij} \in H$. Then the \emph{twisting of\/ $V$ by\/ $\Pi$} is the $L$-module $T_\Pi(V) = H\tp \Pi\tp V_0$, where $H$ acts by a left multiplication on the first factor and \begin{equation}\label{twrep3} a*(1\tp u\tp v_i) = \sum_j\, \bigl( f_{ij} \tp {g_{ij}}_{(1)} \bigr) \tp_H \bigl( 1 \tp {g_{ij}}_{(-2)} u \tp v_j \bigr) \end{equation} for $a\in L$, $u\in\Pi$. By \cite[Proposition 4.2]{BDK1}, $T_\Pi(V)$ is an $L$-module and the action of $L$ on it is independent of the choice of basis of $V_0$. Given another $L$-module $V'=H\tp V'_0$ and a homomorphism $\beta\colon V\to V'$, we can write \begin{equation}\label{twrep6} \beta(1\tp v_i) = \sum_j\, h_{ij} \tp v'_j \,, \qquad h_{ij} \in H \,, \end{equation} where $\{ v'_j \}$ is a fixed $\kk$-basis of $V'_0$. Then we have a homomorphism of $L$-modules $T_\Pi(\beta)\colon T_\Pi(V)\to T_\Pi(V')$, defined by \begin{equation}\label{twrep8} T_\Pi(\beta)(1\tp u\tp v_i) = \sum_j\, {h_{ij}}_{(1)} \tp {h_{ij}}_{(-2)} u \tp v'_j \,. \end{equation} Moreover, $T_\Pi(\beta)$ is independent of the choice of bases \cite[Proposition 4.2]{BDK1}. We showed in \cite[Proposition 3.1]{BDK2} that the functor $T_\Pi$ is exact on free $H$-modules, i.e., if $V \xrightarrow{\beta} V' \xrightarrow{\beta'} V''$ is a short exact sequence of finite free $H$-modules, then the sequence $T_\Pi(V) \xrightarrow{T_\Pi(\beta)} T_\Pi(V') \xrightarrow{T_\Pi(\beta')} T_\Pi(V'')$ is exact. Another useful property of $T_\Pi$ is that the image of $T_\Pi(\beta)$ has a finite codimension in $T_\Pi(V')$, whenever the image of $\beta\colon V\to V'$ has a finite codimension. \subsection{Annihilation algebras of Lie pseudoalgebras}\label{spsanih} For a Lie pseudo\-algebra\ $L$, we let ${\mathcal{L}}={\mathcal{A}}(L)=X\tp_H L$, where as before $X=H^*$. We define a Lie bracket on ${\mathcal{L}}$ by the formula (cf.\ \cite[Eq.~(7.2)]{BDK}): \begin{equation}\label{alliebr} [x\tp_H a, y\tp_H b] = \sum_i\, (x f_i)(y g_i) \tp_H c_i \,, \quad\text{if}\quad [a*b] = \sum_i\, (f_i\tp g_i) \tp_H c_i \,. \end{equation} Then ${\mathcal{L}}$ is a Lie algebra, called the {\em annihilation algebra\/} of $L$ (see \cite[Section~7.1]{BDK}). There is an obvious left action of $H$ on ${\mathcal{L}}$ given by \begin{equation}\label{hactsonl} h(x\tp_H a) = hx\tp_H a \,, \qquad h\in H\,, \; x\in X\,, \; a\in L \,; \end{equation} in particular, the Lie algebra ${\mathfrak{d}}$ acts on ${\mathcal{L}}$ by derivations. The semidirect sum $\ti{\mathcal{L}} = {\mathfrak{d}}\ltimes{\mathcal{L}}$ is called the {\em extended annihilation algebra}. When $L$ is finite, we can define a filtration on ${\mathcal{L}}$ as follows (see \cite[Section~7.4]{BDK} for more details). We fix a finite-dimensional vector subspace $L_0$ of $L$ such that $L = HL_0$, and set \begin{equation}\label{fill} \fil_n{\mathcal{L}} = \{ x \tp_H a \in{\mathcal{L}} \st x\in\fil_n X \,, \; a\in L_0 \} \,, \qquad n\ge -1 \,. \end{equation} The subspaces $\fil_n {\mathcal{L}}$ constitute a decreasing filtration of ${\mathcal{L}}$, satisfying \begin{equation}\label{filbr} [\fil_m {\mathcal{L}}, \fil_n {\mathcal{L}}] \subset \fil_{m+n-\ell} {\mathcal{L}} \,, \qquad {\mathfrak{d}} (\fil_n {\mathcal{L}}) \subset \fil_{n-1} {\mathcal{L}} \,, \end{equation} where $\ell$ is an integer depending only on the choice of $L_0$. Notice that this filtration of ${\mathcal{L}}$ depends on the choice of $L_0$, but the induced topology does not \cite[Lemma~7.2]{BDK}. With this topology, ${\mathcal{L}}$ becomes a linearly-compact Lie algebra (see \cite{BDK}). We set ${\mathcal{L}}_n = \fil_{n+\ell} {\mathcal{L}}$, so that $[{\mathcal{L}}_m, {\mathcal{L}}_n] \subset {\mathcal{L}}_{m+n}$. In particular, ${\mathcal{L}}_0$ is a Lie algebra. We also define a decreasing filtration of $\ti{\mathcal{L}}$ by letting $\fil_{-1}\ti{\mathcal{L}}=\ti{\mathcal{L}}$, $\fil_n\ti{\mathcal{L}} = \fil_n{\mathcal{L}}$ for $n\ge0$, and we set $\ti{\mathcal{L}}_n = \fil_{n+\ell} \ti{\mathcal{L}}$. An $\ti{\mathcal{L}}$-module $V$ is called {\em conformal\/} if every $v\in V$ is annihilated by some ${\mathcal{L}}_n$; in other words, if $V$ is a topological $\ti{\mathcal{L}}$-module when endowed with the discrete topology. The next two results from \cite{BDK} play a crucial role in our study of representations (see \cite{BDK}, Propositions 9.1 and 14.2, and Lemma 14.4). \begin{proposition}\label{preplal2} Any module $V$ over the Lie pseudo\-algebra\ $L$ has a natural structure of a conformal $\ti{\mathcal{L}}$-module, given by the action of\/ ${\mathfrak{d}}$ on $V$ and by \begin{equation}\label{axm2} (x\tp_H a) \cdot v = \sum_i\, \< x, S(f_i {g_i}_{(-1)}) \> \, {g_i}_{(2)} v_i \,, \quad\text{if}\quad a*v = \sum_i\, (f_i\tp g_i) \tp_H v_i \end{equation} for $a\in L$, $x\in X$, $v\in V$. Conversely, any conformal $\ti{\mathcal{L}}$-module $V$ has a natural structure of an $L$-module, given b \begin{equation}\label{prpl2} a*v = \sum_{I\in\ZZ_+^N} \bigl( S(\partial^{(I)}) \tp1 \bigr)\tp_H \bigl( (x_I\tp_H a) \cdot v \bigr) \,. \end{equation} Moreover, $V$ is irreducible as an $L$-module iff it is irreducible as an $\ti{\mathcal{L}}$-module. \end{proposition} \begin{remark}\label{pseudoactioncheck} In the proof of \eqref{prpl2}, one only uses that $\{\partial^{(I)}\}$ and $\{x_I\}$ are dual bases of $H$ and $H^*$. Then using \leref{dualtwisted}(ii) also gives \begin{equation} a*v = \sum_{I\in\ZZ_+^N} \bigl( \overline{S(\partial^{(I)})} \tp1 \bigr)\tp_H \bigl( (x_I e^{-\chi}\tp_H a) \cdot v \bigr) \,. \end{equation} \end{remark} \begin{lemma}\label{lkey2} Let $L$ be a finite Lie pseudo\-algebra\ and $V$ be a finite $L$-module. For $n\ge -1-\ell$, let \begin{equation*}\label{kernv} \ker_n V = \{ v \in V \st {\mathcal{L}}_n \, v = 0 \}, \end{equation*} so that, for example, $\ker_{-1-\ell} V = \ker V$ and\/ $V = \bigcup \ker_n V$. Then all vector spaces\/ $\ker_n V / \ker V$ are finite dimensional. In particular, if\/ $\ker V=\{0\}$, then every vector $v\in V$ is contained in a finite-dimensional subspace invariant under~${\mathcal{L}}_0$. \end{lemma} \subsection{$\Wd$ and its annihilation algebra}\label{subwd} One of the most important Lie pseudo\-algebras\ is $\Wd=H\tp{\mathfrak{d}}$, with the Lie pseudobracket (see \cite[Section 8.1]{BDK}): \begin{equation}\label{wdbr*} \begin{split} [(f\tp a)*(g\tp b)] &= (f\tp g)\tp_H(1\tp [a,b]) \\ &- (f\tp ga)\tp_H(1\tp b) + (fb\tp g)\tp_H(1\tp a) \,, \end{split} \end{equation} for $f,g\in H$, $a,b\in{\mathfrak{d}}$. The formula \begin{equation}\label{wdac*} (f\tp a)*h = -(f\tp ha)\tp_H 1 \end{equation} defines the structure of a $\Wd$-module on $H$. We denote the annihilation algebra of $\Wd$ by \begin{equation}\label{annihw} {\mathcal{W}} = {\mathcal{A}}(\Wd) = X \tp_H (H \tp {\mathfrak{d}}) \simeq X \tp {\mathfrak{d}} \,. \end{equation} The Lie bracket in ${\mathcal{W}}$ is given by ($x,y\in X$, $a,b\in{\mathfrak{d}}$): \begin{equation}\label{Wbra} [x \tp a, y \tp b] = xy \tp [a, b] - x(ya) \tp b + (xb)y \tp a \,. \end{equation} The extended annihilation algebra of $\Wd$ is $\ti{\mathcal{W}}={\mathfrak{d}}\ltimes{\mathcal{W}}$, where \begin{equation}\label{dactw} [\partial, x \tp a] = \partial x \tp a \,, \qquad \partial,a\in{\mathfrak{d}}, \; x\in X \,. \end{equation} The Lie algebra ${\mathcal{W}}$ has a decreasing filtration \begin{equation}\label{wp} {\mathcal{W}}_n = \fil_n {\mathcal{W}} = \fil_n X\tp{\mathfrak{d}} \,, \qquad n\geq-1 \,, \end{equation} satisfying ${\mathcal{W}}_{-1}={\mathcal{W}}$ and $[{\mathcal{W}}_i, {\mathcal{W}}_j] \subset {\mathcal{W}}_{i+j}$. Note that ${\mathcal{W}}/{\mathcal{W}}_0 \simeq \kk\tp{\mathfrak{d}} \simeq {\mathfrak{d}}$ and ${\mathcal{W}}_0/{\mathcal{W}}_1 \simeq {\mathfrak{d}}^*\tp{\mathfrak{d}}$. \begin{lemma}[\cite{BDK1}]\label{cwbra} The map from\/ ${\mathcal{W}}_0/{\mathcal{W}}_1$ to\/ ${\mathfrak{d}}\tp{\mathfrak{d}}^*\simeq\gl\,\dd$, defined by \begin{equation*} x\tp a \mod {\mathcal{W}}_1 \mapsto -a \tp (x \;\mathrm{mod}\; \fil_1 X), \qquad x\in \fil_0 X, \;\; a\in{\mathfrak{d}}, \end{equation*} is a Lie algebra isomorphism. Under this isomorphism, the adjoint action of\/ ${\mathcal{W}}_0/{\mathcal{W}}_1$ on ${\mathcal{W}}/{\mathcal{W}}_0$ coincides with the standard action of\/ $\gl\,\dd$ on~${\mathfrak{d}}$. \end{lemma} The action \eqref{wdac*} of $\Wd$ on $H$ induces a corresponding action of the annihilation algebra ${\mathcal{W}}$ on $X$ given by \begin{equation}\label{xay} (x\tp a) y = -x (ya), \qquad x,y \in X, \; a\in {\mathfrak{d}}. \end{equation} Since ${\mathfrak{d}}$ acts on $X$ by continuous derivations, the Lie algebra ${\mathcal{W}}$ acts on $X$ by continuous derivations. The isomorphism $X \simeq \mathcal{O}_{2N}$ induces a Lie algebra homomorphism $\varphi$ from ${\mathcal{W}}$ to $W_{2N} = \Der\mathcal{O}_{2N}$, the Lie algebra of continuous derivations of the algebra $\mathcal{O}_{2N} = \kk[[t^1,\dots,t^{2N}]]$. In fact, $\varphi$ is an isomorphism compatible with the filtrations (see \cite[Proposition~3.1]{BDK1}). We recall that the canonical filtration of the Lie--Cartan algebra $W_{2N}$ is given explicitly by \begin{equation}\label{filpwn2} \fil_p W_{2N} = \Bigl\{ \sum_{i=1}^{2N} f_i \frac\partial{\partial t^i} \; \Big| \; f_i \in \fil_p \mathcal{O}_{2N} \Bigr\} \,, \qquad p\ge -1\,, \end{equation} where $\fil_p \mathcal{O}_{2N}$ is the $(p+1)$-st power of the maximal ideal $(t^1,\dots,t^{2N})$ of $\mathcal{O}_{2N}$. It is well known that all continuous derivations of the Lie algebra $W_{2N}$ are inner (see e.g.\ \cite[Proposition 6.4(i)]{BDK}). Hence, the same is true for ${\mathcal{W}}$. Since every non-zero $\partial\in{\mathfrak{d}}$ acts as a non-zero continuous derivation of ${\mathcal{W}}$ by \eqref{dactw}, we obtain an injective Lie algebra homomorphism $\gamma\colon{\mathfrak{d}}\injto{\mathcal{W}}$ such that the elements \begin{equation}\label{d-tilde} \ti\partial := \partial-\gamma(\partial) \in \ti{\mathcal{W}} \qquad (\partial\in{\mathfrak{d}}) \end{equation} centralize ${\mathcal{W}}$. The set $\ti{\mathfrak{d}}$ of all $\ti\partial$ is a subalgebra of $\ti{\mathcal{W}}$, which is isomorphic to ${\mathfrak{d}}$ under the map $\partial\mapsto\ti\partial$ (see \cite[Proposition 3.2]{BDK1}). Moreover, by \cite[Lemma 3.3]{BDK1}, \begin{equation}\label{tilded} \widetilde \partial = \partial + 1 \tp \partial - \ad \partial \mod {\mathcal{W}}_1, \qquad \partial \in{\mathfrak{d}} \,, \end{equation} where $\ad \partial$ is understood as an element of ${\mathfrak{gl}}\,{\mathfrak{d}} \simeq {\mathcal{W}}_0/{\mathcal{W}}_1$ via \leref{cwbra}. \section{Primitive Lie pseudoalgebras of type $H$} \label{sprim} In this section, we introduce the main objects of our study: the Lie pseudoalgebra $H(\dd,\chi,\om)$ and its annihilation Lie algebra (see \cite[Chapter~8]{BDK}). We also review the unique embedding of $H(\dd,\chi,\om)$ into the Lie pseudoalgebra $\Wd$ and the induced homomorphism of annihilation algebras. \subsection{Symplectic Lie algebra}\label{ssymlie} Let $\omega\in{\mathfrak{d}}^*\wedge{\mathfrak{d}}^*$ be a nondegenerate skew-symmetric $2$-form, so that \begin{equation}\label{cont1} \underbrace{\omega\wedge\dots\wedge\omega}_{N} \ne 0 \,, \qquad \dim{\mathfrak{d}}=2N \,. \end{equation} We set $\omega_{ij} = \omega(\partial_i \wedge \partial_j)$ and denote by $(r^{ij})$ the inverse matrix to $(\omega_{ij})$: \begin{equation}\label{cont5} \sum_{k=1}^{2N} r^{ik} \omega_{kj} = \delta^i_j \,, \qquad i,j=1,\dots,2N \,. \end{equation} We identify $\End{\mathfrak{d}}$ with ${\mathfrak{d}} \tp {\mathfrak{d}}^*$ so that the elementary matrix $e_i^j \in\End{\mathfrak{d}}$ is identified with the element $\partial_i \tp x^j \in {\mathfrak{d}} \tp {\mathfrak{d}}^*$, where $e_i^j (\partial_k) = \delta^j_k \partial_i$. Notice that $(\partial \tp x) (\partial') = \langle x, \partial'\rangle \partial$, and the composition $(\partial \tp x) \circ (\partial' \tp x')$ equals $\langle x, \partial'\rangle \partial \tp x'$. We will raise indices using the matrix $(r^{ij})$ and lower them using $(\omega_{ij})$. In particular, \begin{equation}\label{eij} e^{ij} = \partial^i \tp x^j = \sum_{k=1}^{2N} r^{ik} e_k^j \,, \end{equation} where \begin{equation}\label{cont7} \partial^i = \sum_{k=1}^{2N} r^{ik} \partial_k \,, \qquad \omega(\partial^i \wedge \partial_j) = \delta^i_j \,. \end{equation} Conversely, we have \begin{equation}\label{cont8} \partial_k = \sum_{j=1}^{2N} \omega_{kj} \partial^j \,. \end{equation} Denote by $\sp\,\dd={\mathfrak{sp}}({\mathfrak{d}},\omega)$ the Lie algebra of all $A\in\gl\,\dd$ such that $A\cdot\omega=0$, i.e., \begin{equation}\label{aom0} \omega(A\partial_i \wedge \partial_j) + \omega(\partial_i \wedge A\partial_j) = 0 \,, \qquad i,j=1,\dots,2N \,. \end{equation} The Lie algebra $\sp\,\dd$ is isomorphic to ${\mathfrak{sp}}_{2N}$ and, in particular, is simple. It is easy to see that the elements \begin{equation}\label{fij} f^{ij} = - \frac{1}{2} (e^{ij} + e^{ji}) = f^{ji} \,, \qquad 1\le i\le j\le 2N \end{equation} form a basis of $\sp\,\dd$. We will denote by $R(\lambda)$ the irreducible $\sp\,\dd$-module with highest weight $\lambda$, and by $\pi_n$ the fundamental weights of $\sp\,\dd$. For example, $R(\pi_1)\simeq{\mathfrak{d}}$ is the vector representation. We set $R(\pi_0) = \kk$ and $R(\pi_n) = \{0\}$ if $n<0$ or $n>N$. \begin{example}\label{symbas} Let us choose the basis of ${\mathfrak{d}}$ to be \emph{symplectic}, i.e., \begin{equation}\label{cont9} \omega(\partial_i \wedge \partial_{i+N}) = 1 = - \omega(\partial_{i+N} \wedge \partial_i) \,, \quad \omega(\partial_i \wedge \partial_j) = 0 \quad\text{for}\quad |i-j| \ne N \,. \end{equation} Then we have: \begin{equation}\label{cont10} \partial^i = -\partial_{i+N} \,, \quad \partial^{i+N} = \partial_i \,, \qquad 1\le i \le N \,, \end{equation} which implies \begin{equation}\label{cont11} e^{ij} = -e_{i+N}^j \,, \quad e^{i+N,j} = e_i^j \,, \qquad 1\le i \le N \,, \; 1\le j \le 2N \,. \end{equation} \end{example} \subsection{Definition of $H(\dd,\chi,\om)$}\label{subprim} Let again $\chi\in{\mathfrak{d}}^*$ be a trace form and $\omega\in{\mathfrak{d}}^*\wedge{\mathfrak{d}}^*$ be a nondegenerate skew-symmetric $2$-form on ${\mathfrak{d}}$. From now on we will assume that $\omega$ and $\chi$ satisfy the equation \begin{equation}\label{omchi3} \bigl( \omega([a_1,a_2] \wedge a_3) - \chi(a_1)\,\omega(a_2 \wedge a_3) \bigr) +\text{cyclic} = 0 \,, \qquad a_1,a_2,a_3 \in{\mathfrak{d}} \,, \end{equation} where ``cyclic'' here and further means applying the two non-trivial cyclic permutations to the indices $1,2,3$. We fix a basis $\{\partial_1,\dots,\partial_{2N}\}$ of ${\mathfrak{d}}$ as in \seref{sbasfil}, and let \begin{equation}\label{cont6} r = \sum_{i,j=1}^{2N} r^{ij} \partial_i\tp\partial_j = \sum_{i=1}^{2N} \partial_i\tp\partial^i = -\sum_{i=1}^{2N} \partial^i\tp\partial_i \end{equation} (cf.\ \eqref{cont7}). Notice that $r$ is skew-symmetric and independent of the choice of basis. We define $s\in{\mathfrak{d}}$ by the property \begin{equation}\label{chiom} \chi(a)=(\iota_s\omega)(a)=\omega(s\wedge a) \,, \qquad a\in{\mathfrak{d}} \,. \end{equation} Then \eqref{omchi3} and $\chi([{\mathfrak{d}},{\mathfrak{d}}])=0$ are equivalent to the following system of equations for $r$ and $s$ (see \cite[Lemma~8.5]{BDK}): \begin{align} \label{cybe3} [r,\Delta(s)] &= 0 \,, \\ \label{cybe4} ([r_{12}, r_{13}] + r_{12} s_3) + \text{{\rm{cyclic}}} &= 0 \,, \end{align} where we use the standard notation $r_{12}=r\tp1$, $s_3=1\tp1\tp s$, etc. It follows from \cite[Lemma 8.7]{BDK} that \begin{equation}\label{hdps1} [e * e] = (r + s \tp 1 - 1 \tp s)\tp_H e \end{equation} extends to a Lie pseudoalgebra bracket on $He$. The obtained Lie pseudo\-algebra\ is denoted $H(\dd,\chi,\om)$. There is an injective homomorphism of Lie pseudo\-algebras\ \begin{equation}\label{kd2} \iota\colon H(\dd,\chi,\om)\to\Wd \,, \qquad e \mapsto -r + 1 \tp s \,, \end{equation} where $\Wd=H\tp{\mathfrak{d}}$ is from \seref{subwd} (see \cite[Lemma 8.3]{BDK}). Moreover, this is the unique non-trivial homomorphism from $H(\dd,\chi,\om)$ to $\Wd$, by \cite[Theorem 13.7]{BDK}. {}From now on, we will often identify $H(\dd,\chi,\om)$ with its image in $\Wd$. Note that, by \eqref{cont7} and \eqref{chiom}, we have \begin{equation}\label{schi} s = \sum_{i=1}^{2N} \chi(\partial_i) \partial^i = -\sum_{i=1}^{2N} \chi(\partial^i) \partial_i \,. \end{equation} This allows us to rewrite \eqref{hdps1} in the form \begin{equation}\label{bracket} [e * e] = \sum_{i,j=1}^{2N} r^{ij} (\bar{\partial}_i \tp \bar{\partial}_j) \tp_H e = \sum_{i=1}^{2N} (\bar{\partial}_i \tp \bar{\partial}^i) \tp_H e \,, \end{equation} where $\bar{\partial}$ is given by \eqref{dbar}. Thus, \begin{equation}\label{iota} \iota(e) = -r + 1 \tp s = - \sum_{i=1}^{2N} \bar{\partial}_i \tp \partial^i = \sum_{i=1}^{2N} \bar{\partial}^i \tp \partial_i \,. \end{equation} Observe also that $\chi(s)=\omega(s\wedge s)=0$ and so $\bar s=s$. Let us consider the element \begin{equation}\label{delx} \rho = \frac{1}{2} \sum_{i,j=1}^{2N} r^{ij} [\partial_i, \partial_j] = \frac{1}{2} \sum_{i=1}^{2N} \, [\partial_i, \partial^i] \in{\mathfrak{d}} \end{equation} and the linear function \begin{equation}\label{phirho} \phi = -\chi + \iota_\rho\omega = \iota_{\rho-s}\omega \in{\mathfrak{d}}^* \,. \end{equation} Here $\iota_\rho\omega \in{\mathfrak{d}}^*$ is defined by $(\iota_\rho\omega)(a)=\omega(\rho\wedge a)$ for $a\in{\mathfrak{d}}$, and we used that $\chi=\iota_s\omega$. \begin{remark}\label{rhins} By \cite[Remark 8.5]{BDK}, the above embedding \eqref{kd2} realizes $H(\dd,\chi,\om)$ as a subalgebra of the Lie pseudoalgebra $S({\mathfrak{d}}, \phi) \subset\Wd$. Note that for $N=1$, we have $H(\dd,\chi,\om)=S({\mathfrak{d}}, \phi)=S({\mathfrak{d}},-\chi + \tr\ad)$; see \cite[Example 8.1]{BDK}. \end{remark} In order to explain why $\phi$ is a trace form on ${\mathfrak{d}}$, we will find another expression for it, which will be useful in the sequel. \begin{lemma}\label{lemphi} With the above notation \eqref{delx}, \eqref{phirho}, we have\/ $\phi = -N\chi+\tr\ad$. In particular, $\phi$ is a trace form on\/ ${\mathfrak{d}}$. \end{lemma} \begin{proof} First observe that, by \eqref{cont7}, for any linear operator $A$ on ${\mathfrak{d}}$, we have \begin{equation*} \tr A = \sum_{i=1}^{2N} \omega(A\partial^i \wedge \partial_i) = -\sum_{i=1}^{2N} \omega(A\partial_i \wedge \partial^i) \,. \end{equation*} Then, using \eqref{cont7}, \eqref{omchi3}, \eqref{chiom} and \eqref{schi}, we find for $a\in{\mathfrak{d}}$: \begin{align*} 2 \omega(\rho\wedge a) &= \sum_{i=1}^{2N} \omega([\partial_i,\partial^i] \wedge a) \\ &= -\sum_{i=1}^{2N} \Bigl( \omega([\partial^i,a] \wedge\partial_i) + \omega([a,\partial_i] \wedge\partial^i) \Bigr) \\ &\quad+ \sum_{i=1}^{2N} \Bigl( \chi(\partial_i) \omega(\partial^i \wedge a) + \chi(\partial^i) \omega(a \wedge \partial_i) + \chi(a) \omega(\partial_i \wedge \partial^i) \Bigr) \\ &= 2 \tr\ad a + 2 \omega(s\wedge a) - 2N \chi(a) \\ &= 2 \tr\ad a + (2 - 2N) \chi(a) \,. \end{align*} Therefore, $\iota_\rho\omega = (1-N)\chi + \tr \ad$, as claimed. \end{proof} \subsection{Annihilation algebra of $H(\dd,\chi,\om)$}\label{subans} We will denote by ${\mathcal{P}}$ the annihilation algebra of the Lie pseudo\-algebra\ $H(\dd,\chi,\om)$ (see \seref{spsanih} and \cite[Section~7.1]{BDK}). By definition, we have \begin{equation}\label{pahd} {\mathcal{P}} = {\mathcal{A}}(H(\dd,\chi,\om)) = X \tp_H H(\dd,\chi,\om) = X \tp_H He \,, \end{equation} which sometimes will be identified with $X$ via the map $x \tp_H he \mapsto xh$. The Lie bracket on ${\mathcal{P}}$ is given by (cf.\ \eqref{alliebr}, \eqref{bracket}): \begin{equation}\label{brap} [x,y] = \sum_{i,j=1}^{2N} r^{ij} (x\bar{\partial}_i)(y\bar{\partial}_j) = \sum_{i=1}^{2N} (x\bar{\partial}_i)(y\bar{\partial}^i) \,, \qquad x,y \in X \,. \end{equation} We define a decreasing filtration on ${\mathcal{P}}$ by \begin{equation}\label{Pfiltration} {\mathcal{P}}_n = \fil_n {\mathcal{P}} = \fil_{n+1} X \tp_H e \simeq \fil_{n+1} X \,, \qquad n\ge -2 \,, \end{equation} which is obtained as in \seref{spsanih} by choosing $L_0 = \kk e$. The canonical injection $\iota$ of the subalgebra $H(\dd,\chi,\om)$ in $\Wd$ induces a Lie algebra homomorphism $\iota_*\colon {\mathcal{P}} \to {\mathcal{W}}$, which is given explicitly by (cf.\ \eqref{iota}): \begin{equation}\label{iota2} \iota_*(x) = - \sum_{i=1}^{2N} x\bar{\partial}_i \tp \partial^i = \sum_{i=1}^{2N} x\bar{\partial}^i \tp \partial_i \,, \qquad x\in X \simeq {\mathcal{P}} \,. \end{equation} We will also denote by $\iota_*$ the corresponding Lie algebra homomorphism of extended annihilation algebras $\widetilde {\mathcal{P}} \to \widetilde {\mathcal{W}}$, defined by \eqref{iota2} and by $\iota_*(\partial)=\partial$ for $\partial\in{\mathfrak{d}}$. The map $\iota_*$ is not injective, contrary to what happens with primitive Lie pseudoalgebras of all other types. \begin{lemma}\label{lkerio} The map\/ $\iota_*\colon {\mathcal{P}} \to {\mathcal{W}}$ has a\/ $1$-dimensional kernel, which is spanned over\/ $\kk$ by\/ $\ce \equiv e^{-\chi} \tp_H e$ and is contained in the center of\/ ${\mathcal{P}}$. \end{lemma} \begin{proof} Using \eqref{iota2} and \eqref{echi}, we obtain $\iota_* ( x e^{-\chi} ) = \sum_i (x\partial^i) e^{-\chi} \tp \partial_i$. This is zero if and only if $x\partial^i = 0$ for all $i$, which only happens when $x$ lies in $\kk \subset X$. The fact that $e^{-\chi}$ is central in ${\mathcal{P}}$ follows immediately from \eqref{brap} and \eqref{echi}. \end{proof} From now on, we will denote by ${\mathcal{H}}:= \iota_* ({\mathcal{P}})$ the image of ${\mathcal{P}}$ in ${\mathcal{W}}$. It has two filtrations, induced by the filtrations of ${\mathcal{P}}$ and of ${\mathcal{W}}$, which coincide due to the next lemma. \begin{lemma}\label{lfilp} The filtrations of\/ ${\mathcal{P}}$ and\/ ${\mathcal{W}}$ are compatible, i.e., $$ {\mathcal{H}}_n:=\iota_*({\mathcal{P}}_n) = \iota_*({\mathcal{P}}) \cap {\mathcal{W}}_n \,, \qquad n\ge-2 \,. $$ Moreover, $[{\mathcal{P}}_m, {\mathcal{P}}_n] \subset {\mathcal{P}}_{m+n}$ for all\/ $m,n\in\ZZ$. \end{lemma} \begin{proof} This follows from \eqref{wp}, \eqref{brap}--\eqref{iota2} and the facts that $(\fil_{n+1} X) {\mathfrak{d}} \subset \fil_{n} X$ and $(\fil_{m} X) (\fil_{n} X) \subset \fil_{m+n+1} X$. \end{proof} By \leref{lkerio}, there is a central extension of Lie algebras \begin{equation} 0 \to \kk\ce \to {\mathcal{P}} \xrightarrow{\iota_*} {\mathcal{H}} \to 0 \,. \end{equation} Composing the isomorphism $\varphi\colon{\mathcal{W}} \to W_{2N}$ with the homomorphism $\iota_*\colon {\mathcal{P}} \to {\mathcal{W}}$, one obtains a Lie algebra homomorphism ${\mathcal{P}}\to W_{2N}$ with kernel $\kk\ce$. Its image does not necessarily coincide with the Lie--Cartan algebra $H_{2N} \subset W_{2N}$ of Hamiltonian vector fields, but it does up to a change of variables, as we will see below. Let us review the definition of $H_{2N}$ and its irreducible central extension $P_{2N}$. We have $P_{2N}=\mathcal{O}_{2N}$ with the Lie bracket \begin{equation}\label{brap2} [f,g] = \sum_{i=1}^{N} \frac{\partial f}{\partial t^i} \frac{\partial g}{\partial t^{N+i}} -\frac{\partial f}{\partial t^{N+i}} \frac{\partial g}{\partial t^i} \,, \qquad f,g\in\mathcal{O}_{2N} \end{equation} (which is known as the Poisson bracket). There is a homomorphism $P_{2N}\to W_{2N}$ given by \begin{equation}\label{brap3} f \mapsto \sum^N_{i=1} \frac{\partial f}{\partial t^i} \frac{\partial}{\partial t^{N+i}} - \frac{\partial f}{\partial t^{N+i}} \frac{\partial}{\partial t^i} \,, \end{equation} whose image is $H_{2N}$ and whose kernel is $\kk$. Note that $H_{2N}$ consists of all vector fields from $W_{2N}$ annihilating the standard symplectic form $\sum^N_{i=1} d t^i \wedge d t^{N+i}$. \begin{proposition}\label{pioh} There exists a ring automorphism\/ $\psi$ of\/ $\mathcal{O}_{2N}$, which induces a Lie algebra automorphism\/ $\psi$ of\/ $W_{2N}$, such that the image of\/ ${\mathcal{H}}$ in\/ $W_{2N}$ under the isomorphism\/ $\varphi\colon{\mathcal{W}} \to W_{2N}$ coincides with\/ $\psi(H_{2N})$. Furthermore, $\psi$ is compatible with the filtrations, and it induces the identity map on the associated graded algebras, i.e., $$ (\psi-\id) \fil_p W_{2N} \subset \fil_{p+1} W_{2N} \,, \qquad p\ge-1 \,. $$ \end{proposition} \begin{proof} The same as that of \cite[Proposition 3.6]{BDK1} and \cite[Proposition 4.1]{BDK2}. \end{proof} As a consequence of \prref{pioh}, ${\mathcal{H}}\simeq H_{2N}$ and ${\mathcal{P}}\simeq P_{2N}$. In the following, we will need certain explicit elements of ${\mathcal{H}}$. \begin{lemma}\label{lptow1} The Lie algebra homomorphism\/ $\iota_*\colon {\mathcal{P}} \to {\mathcal{W}}$ identifies the following elements{\rm:} {\rm(i)} $e^{-\chi} \tp_H e \mapsto 0$, {\rm(ii)} $x^k e^{-\chi} \tp_H e \mapsto e^{-\chi} \tp \partial^k - \displaystyle\sum_{1\le i<j\le 2N} c_{ij}^k x^j e^{-\chi} \tp\partial^i \mod {\mathcal{W}}_1$ {\rm(iii)} $x^i x^j e^{-\chi} \tp_H e \mapsto 2 f^{ij} \mod {\mathcal{W}}_1$. \end{lemma} \begin{proof} The proof is straightforward, using \eqref{iota2}. Note that $f^{ij} \in \gl\,\dd$ are understood via the identification $\gl\,\dd \simeq {\mathcal{W}}_0/{\mathcal{W}}_1$ (see \leref{cwbra}). \end{proof} \begin{corollary} We have a Lie algebra isomorphism\/ ${\mathcal{H}}_0/{\mathcal{H}}_1 \simeq \sp\,\dd$. \end{corollary} \begin{proof} The composition ${\mathcal{H}}_0 \to {\mathcal{W}}_0 \to {\mathcal{W}}_0/{\mathcal{W}}_1$ is injective on the linear span of elements $x^i x^j \tp_H e$, which generate a subalgebra isomorphic to $\sp\,\dd$. \end{proof} For future use, we introduce the following linear operators on ${\mathfrak{d}}$ $(1\le k\le 2N)$: \begin{equation}\label{adsp1} \ad^{\mathfrak{sp}}\partial^k := \ad\partial^k + \partial^k \tp \chi + \frac12 \sum_{i,j=1}^{2N} c_{ij}^k e^{ij} - \frac12 \chi(\partial^k) I \,, \end{equation} where $I$ denotes the identity operator and as before we identify ${\mathfrak{d}}\otimes{\mathfrak{d}}^*\simeq\End{\mathfrak{d}}$. Recall also that $e^{ij}$ are given by \eqref{eij}, $f^{ij}$ by \eqref{fij}, and $c_{ij}^k$ are the structure constants of ${\mathfrak{d}}$ given by \eqref{cijk}. The notation $\ad^{\mathfrak{sp}}$ is explained by the next lemma (note that it differs from the notation used in \cite{BDK2}). \begin{lemma}\label{lptow2} For every\/ $k=1,\dots,2N$, we have\/ $\ad^{\mathfrak{sp}}\partial^k \in\sp\,\dd$. Moreover, $\ad^{\mathfrak{sp}}\partial^k$ is the image of\/ $\ad\partial^k+ \partial^k \tp \chi$ under the projection\/ $\pi\colon\gl\,\dd\to\sp\,\dd$ defined by\/ $\pi(e^{ij})=-f^{ij}$. \end{lemma} \begin{proof} Denoting the operator \eqref{adsp1} by $A$, we see that \begin{equation*} A\partial_j = [\partial^k,\partial_j] + \chi(\partial_j) \partial^k - \frac12 \chi(\partial^k) \partial_j + \frac12 \sum_{i=1}^{2N} c_{ij}^k \partial^i \,. \end{equation*} Then, using \eqref{cont7} and \eqref{omchi3}, we get: \begin{align*} \omega(A &\partial_j \wedge \partial_\ell) + \omega(\partial_j \wedge A\partial_\ell) \\ &= \omega( [\partial^k,\partial_j] \wedge \partial_\ell) + \chi(\partial_j) \omega(\partial^k \wedge \partial_\ell) - \frac12 \chi(\partial^k) \omega(\partial_j \wedge \partial_\ell) + \frac12 c_{\ell j}^k \\ &+ \omega(\partial_j \wedge [\partial^k,\partial_\ell]) + \chi(\partial_\ell) \omega(\partial_j \wedge \partial^k) - \frac12 \chi(\partial^k) \omega(\partial_j \wedge \partial_\ell) - \frac12 c_{j \ell}^k \\ &= \omega( [\partial_\ell,\partial_j] \wedge \partial^k) + c_{\ell j}^k \\ &= \sum_{i=1}^{2N} c_{\ell j}^i \omega( \partial_i \wedge \partial^k) + c_{\ell j}^k \\ &= 0 \,. \end{align*} Therefore, $A\in\sp\,\dd$. Note that $\pi$ is indeed a projection, since $\pi(f^{ij})=f^{ij}$. To finish the proof, we need to show that $\pi(A-\ad\partial^k-\partial^k \tp \chi) = 0$. By \eqref{cont8}, we have \begin{equation*} I = \sum_{i=1}^{2N} \partial_i \tp x^i = \sum_{i,j=1}^{2N} \omega_{ij} e^{ji} \,, \end{equation*} which implies $\pi(I)=0$, because $\pi(e^{ij})=\pi(e^{ji})$ while $\omega_{ij} = -\omega_{ji}$. For the same reason, \begin{equation*} \pi\Bigl( \sum_{i,j=1}^{2N} c_{ij}^k e^{ij} \Bigr) = 0 \,, \end{equation*} thus completing the proof. \end{proof} Extending \eqref{adsp1} by linearity, we obtain a linear map $\ad^{\mathfrak{sp}}\colon{\mathfrak{d}}\to\sp\,\dd$, which does not depend on the choice of basis. \subsection{The normalizers $\mathcal{N}_{{\mathcal{H}}}$ and $\mathcal{N}_{{\mathcal{P}}}$}\label{snhp} Recall the filtration \eqref{Pfiltration} of the annihilation algebra ${\mathcal{P}}$ of the Lie pseudoalgebra $H(\dd,\chi,\om)$. Our next goal is to compute the normalizer of ${\mathcal{P}}_0$ inside the extended annihilation algebra $\widetilde {\mathcal{P}}$. The first step will be to find the normalizer of ${\mathcal{H}}_0 =\iota_* ({\mathcal{P}}_0)$ in $\widetilde{\mathcal{H}} = {\mathfrak{d}}\ltimes{\mathcal{H}} \subset \ti{\mathcal{W}}$. It is well known that every continuous derivation of the Lie algebra $H_{2N}$ is the sum of an inner derivation and a scalar multiple of $\ad E$, where \begin{equation}\label{euler} E := \sum_{i=1}^{2N} t^i \frac{\partial}{\partial t^i}\in \fil_0 W_{2N} \end{equation} is the Euler vector field (see e.g.\ \cite[Proposition 6.4(i)]{BDK}). Due to \prref{pioh}, the normalizer of ${\mathcal{H}}$ in ${\mathcal{W}}$ coincides with ${\mathcal{H}} + \kk \mathcal{E}$, where \begin{equation}\label{derhe} \mathcal{E} = \varphi^{-1}\psi(E) \in{\mathcal{W}}_0 \,. \end{equation} Moreover, $\psi(E) = E \mod \fil_1 W_{2N}$, and by \cite[(3.16)]{BDK1}, \begin{equation}\label{derhe2} \varphi^{-1}(E) = - \sum_{i=1}^{2N} x^i \tp \partial_i \mod {\mathcal{W}}_1 \,. \end{equation} Therefore, the image of $\mathcal{E}$ in ${\mathcal{W}}_0/{\mathcal{W}}_1 \simeq \gl\,\dd$ is the identity operator $I$ (see \leref{cwbra}). Every non-zero $\partial\in{\mathfrak{d}}$ acts as a non-zero continuous derivation of ${\mathcal{H}}$; hence, we get an injective Lie algebra homomorphism $\gamma\colon{\mathfrak{d}}\injto{\mathcal{H}} + \kk \mathcal{E}$ such that $\ti\partial = \partial-\gamma(\partial) \in\ti{\mathcal{W}}$ centralizes ${\mathcal{H}}$. Since the centralizer of ${\mathcal{H}}$ in ${\mathcal{W}}$ is trivial, the elements $\ti\partial$ coincide with those constructed from the Lie algebra ${\mathcal{W}}$ (see \eqref{d-tilde}). As before, the map $\partial\mapsto\ti\partial$ is a Lie algebra isomorphism from ${\mathfrak{d}}$ onto a subalgebra $\ti{\mathfrak{d}}$ of $\ti{\mathcal{W}}$. If we add a suitable scalar multiple of $\mathcal{E}$ to $\ti\partial$, we will obtain a unique $\widehat \partial \in \widetilde {\mathcal{H}}$ such that $\widehat \partial - \partial \in {\mathcal{H}}$ and the adjoint action of $\widehat\partial$ on ${\mathcal{H}}$ is a scalar multiple of $\mathcal{E}$. The next lemma will allow us to find $\widehat \partial$ explicitly. \begin{lemma}\label{ldtilde} For all\/ $k=1,\dots,2N$, we have{\rm:} \begin{equation* \widetilde\partial^k = \partial^k - \frac{1}{2}\chi(\partial^k) \mathcal{E} + \iota_*(x^k e^{-\chi} \otimes_H e) - \ad^{\mathfrak{sp}} \partial^k + \sum_{1 \leq i<j\leq 2N} c_{ij}^k f^{ij} \mod {\mathcal{W}}_1 \,, \end{equation*} where we use the notation \eqref{cijk}, \eqref{fij} and \eqref{adsp1}. \end{lemma} \begin{proof} Start with \eqref{tilded}: $$ \widetilde \partial^k = \partial^k + 1 \tp \partial^k - \ad \partial^k \mod {\mathcal{W}}_1 \,. $$ From \leref{lptow1}, we know that \begin{equation*} \begin{split} \iota_*(x^k e^{-\chi} \otimes_H e) & = e^{-\chi} \otimes \partial^k - \sum_{1 \leq i < j \leq 2N} c_{ij}^k x^j e^{-\chi} \otimes \partial^i \mod {\mathcal{W}}_1\\ & = 1 \otimes \partial^k - \chi \otimes \partial^k - \sum_{1 \leq i < j \leq 2N} c_{ij}^k x^j \otimes \partial^i \mod {\mathcal{W}}_1 \,. \end{split} \end{equation*} By \leref{cwbra}, $\chi \otimes \partial^k \mod {\mathcal{W}}_1$ is identified with $-\partial^k \otimes \chi \in {\mathfrak{d}}\tp{\mathfrak{d}}^* \simeq \gl\,\dd$, and $x^j \otimes \partial^i \mod {\mathcal{W}}_1$ with $-\partial^i \tp x^j = -e^{ij} \in\gl\,\dd$. Hence, $$ 1 \otimes \partial^k = \iota_*(x^k e^{-\chi} \otimes_H e) - \partial^k \otimes \chi - \sum_{1 \leq i<j \leq 2N} c_{ij}^k e^{ij} \mod {\mathcal{W}}_1\,, $$ which gives $$\widetilde\partial^k = \partial^k - \ad \partial^k + \iota_*(x^k e^{-\chi} \otimes_H e) - \partial^k \otimes \chi - \sum_{1 \leq i<j \leq 2N} c_{ij}^k e^{ij} \mod {\mathcal{W}}_1 \,.$$ Using the definition of $\ad^{\mathfrak{sp}}$ in \eqref{adsp1}, we rewrite the right-hand side as $$\partial^k + \iota_*(x^k e^{-\chi} \otimes_H e) - \ad^{\mathfrak{sp}} \partial^k - \sum_{1\leq i<j \leq 2N} c_{ij}^k e^{ij} + \frac{1}{2} \sum_{i,j = 1}^{2N} c_{ij}^k e^{ij} - \frac{1}{2} \chi(\partial^k)I\mod {\mathcal{W}}_1 \,.$$ The proof then follows from the identity $$\sum_{i,j = 1}^{2N} c_{ij}^k e^{ij} = \sum_{1 \leq i<j\leq 2N} c_{ij}^k (e^{ij} - e^{ji}),$$ the definition \eqref{fij} of $f^{ij}$, and the fact that $\mathcal{E}\mod{\mathcal{W}}_1$ identifies with $I \in \gl\,\dd$. \end{proof} \begin{corollary}\label{cdtilde} The above Lie algebra homomorphism\/ $\gamma\colon{\mathfrak{d}}\injto {\mathcal{H}} + \kk \mathcal{E}$ satisfies $$ \gamma(\partial) - \frac{1}{2}\chi(\partial) \mathcal{E} \in {\mathcal{H}} \,, \qquad \partial\in{\mathfrak{d}} \,. $$ \end{corollary} \begin{proof} Using $\gamma(\partial)=\partial-\ti\partial$ and $\sp\,\dd\simeq {\mathcal{H}}_0/{\mathcal{H}}_1\simeq ({\mathcal{H}}_0+{\mathcal{W}}_1)/{\mathcal{W}}_1$, it follows from \leref{ldtilde} that $$ \gamma(\partial) - \frac{1}{2}\chi(\partial) \mathcal{E} \in {\mathcal{H}}+{\mathcal{W}}_1 \,. $$ As the projection of $\mathcal{E}$ to ${\mathcal{W}}_0/{\mathcal{W}}_1 \simeq\gl\,\dd$ does not belong to $\sp\,\dd$, we see that $({\mathcal{H}}+{\mathcal{W}}_1) \cap ({\mathcal{H}} + \kk \mathcal{E}) = {\mathcal{H}}$. \end{proof} As a consequence of \coref{cdtilde}, \begin{equation}\label{dhat} \widehat \partial = \widetilde \partial + \frac{1}{2}\chi(\partial)\mathcal{E} \in \partial+{\mathcal{H}} \subset \widetilde {\mathcal{H}} \,, \qquad \partial\in {\mathfrak{d}} \,. \end{equation} Since $\partial\mapsto\ti\partial$ is Lie algebra isomorphism and $\chi$ is a trace-form, it follows that $\partial \mapsto \widehat \partial$ is a Lie algebra isomorphism from ${\mathfrak{d}}$ onto a subalgebra $\widehat {\mathfrak{d}}$ of $\ti{\mathcal{H}}$. The Lie algebra $\widehat {\mathfrak{d}}$ normalizes every ${\mathcal{H}}_n$, as so does $\mathcal{E}$ and $[\ti{\mathfrak{d}},{\mathcal{H}}]=\{0\}$. \begin{remark}\label{dhatsphi} Recall that $H(\dd,\chi,\om)\subset S({\mathfrak{d}}, \phi)$, where $\phi = -N\chi+\tr\ad$ (see \reref{rhins} and \leref{lemphi}). Our elements $\widehat\partial$ coincide with those for $S({\mathfrak{d}}, \phi)$ defined in \cite[(3.29)]{BDK1}, if we replace there $\chi$ by $\phi$ and $N$ by $2N=\dim{\mathfrak{d}}$. \end{remark} Now we can determine the normalizers of ${\mathcal{H}}_0$ in $\ti{\mathcal{H}}$ and of ${\mathcal{P}}_0$ in $\ti{\mathcal{P}}$. \begin{proposition} For\/ $n\geq 0$, the normalizer\/ $\mathcal{N}_{\mathcal{H}}$ of\/ ${\mathcal{H}}_n$ inside\/ $\widetilde {\mathcal{H}}$ coincides with\/ $\widehat {\mathfrak{d}} \sd {\mathcal{H}}_0$ and is independent of\/ $n$. There is a decomposition as a direct sum of vector spaces\/ $\widetilde {\mathcal{H}} = {\mathfrak{d}} \oplus \mathcal{N}_{\mathcal{H}}$. \end{proposition} \begin{proof} Both ${\mathcal{H}}_0$ and $\widehat {\mathfrak{d}}$ normalize ${\mathcal{H}}_n$. If we denote by $\mathcal{N}_{\mathcal{H}}$ the subspace $\widehat {\mathfrak{d}} + {\mathcal{H}}_0 = \widehat{\mathfrak{d}} \sd {\mathcal{H}}_0$, then we obtain a direct sum of vector spaces $\widetilde {\mathcal{H}} = {\mathfrak{d}} \oplus \mathcal{N}_{\mathcal{H}}$. Since ${\mathcal{H}}_n \subsetneqq \partial({\mathcal{H}}_n) \subset {\mathcal{H}}_{n-1}$ for all $0 \neq \partial \in {\mathfrak{d}}$, we see that no element outside $\mathcal{N}_{\mathcal{H}}$ is contained in the normalizer of ${\mathcal{H}}_n$ in $\widetilde {\mathcal{H}}$, thus proving the statement. \end{proof} Recall that the Lie algebra homomorphism $\iota_*\colon\ti{\mathcal{P}}\to\ti{\mathcal{H}}$ has a kernel $\kk\ce$, which is the center of ${\mathcal{P}}$. Hence, $\iota_*^{-1}(\widehat {\mathfrak{d}})$ is a subalgebra of $\ti{\mathcal{P}}$, as $\widehat {\mathfrak{d}}$ is a subalgebra of $\ti{\mathcal{H}}$. Since ${\mathcal{P}}_0$ is stabilized by $\iota_*^{-1}(\widehat {\mathfrak{d}})$, we have the semidirect sum \begin{equation}\label{np} \mathcal{N}_{\mathcal{P}} := \iota_*^{-1}(\mathcal{N}_{\mathcal{H}}) = \iota_*^{-1}(\widehat {\mathfrak{d}}) \sd {\mathcal{P}}_0 \,. \end{equation} \begin{proposition} For\/ $n \geq 0$, the normalizer of\/ ${\mathcal{P}}_n$ inside\/ $\widetilde {\mathcal{P}}$ coincides with\/ $\mathcal{N}_{\mathcal{P}}$ and is independent of\/ $n$. There is a decomposition as a direct sum of vector spaces\/ $\widetilde {\mathcal{P}} = {\mathfrak{d}} \oplus \mathcal{N}_{\mathcal{P}}$. \end{proposition} \begin{proof} Since it is a Lie algebra homomorphism, $\iota_*$ sends elements of $\widetilde {\mathcal{P}}$ normalizing ${\mathcal{P}}_n$ to elements of $\widetilde {\mathcal{H}}$ normalizing ${\mathcal{H}}_n$. Therefore, the normalizer of ${\mathcal{P}}_n$ inside $\widetilde {\mathcal{P}}$ is contained in $\iota_*^{-1}(\mathcal{N}_{\mathcal{H}}) = \mathcal{N}_{\mathcal{P}}$. We already know that $[{\mathcal{P}}_0, {\mathcal{P}}_n] \subset {\mathcal{P}}_n$. Moreover, from $[{\mathfrak{d}}, {\mathcal{P}}_n] \subset {\mathcal{P}}_{n-1}$ and $[{\mathcal{P}}, {\mathcal{P}}_n] \subset {\mathcal{P}}_{n-1}$ we deduce $[\iota_*^{-1}(\widehat {\mathfrak{d}}), {\mathcal{P}}_n] \subset {\mathcal{P}}_{n-1}$. Since $[\widehat {\mathfrak{d}}, {\mathcal{H}}_n] \subset {\mathcal{H}}_n$, we also obtain $[\iota_*^{-1}(\widehat {\mathfrak{d}}), {\mathcal{P}}_n] \subset {\mathcal{P}}_n + \kk\ce$. However, $\ce\not\in{\mathcal{P}}_m$ for $m \geq -1$, which implies $[\iota_*^{-1}(\widehat {\mathfrak{d}}), {\mathcal{P}}_n] \subset {\mathcal{P}}_n$ if $n\geq 0$. Finally, the fact that $\widetilde {\mathcal{P}} = {\mathfrak{d}} \oplus \mathcal{N}_{\mathcal{P}}$ is clear. \end{proof} \begin{lemma}\label{ldprime} The Lie algebra\/ $\iota_*^{-1}(\widehat{\mathfrak{d}})$ is an abelian extension of\/ $\widehat{\mathfrak{d}} \simeq {\mathfrak{d}}$ by the ideal\/ $\kk\ce$ of character\/ $\chi$ with cocycle\/ $\omega$. This means that in\/ $\iota_*^{-1}(\widehat{\mathfrak{d}}){:}$ \begin{equation}\label{abext} [\widehat \partial,\ce] = \chi(\partial)\ce \,, \qquad [\widehat \partial,\widehat \partial'] = \widehat{[\partial,\partial']} + \omega(\partial\wedge\partial')\ce \,, \qquad \partial,\partial'\in{\mathfrak{d}} \,. \end{equation} \end{lemma} \begin{proof} Let us identify elements $\widehat \partial \in \widehat{\mathfrak{d}} \subset\widetilde {\mathcal{H}}$ with their unique liftings to ${\mathfrak{d}} \sd {\mathcal{P}}_{-1} \subset\ti{\mathcal{P}}$. By \eqref{echi2}, we have in $\ti{\mathcal{P}}$: \begin{equation*} [\partial, \ce] = \partial(e^{-\chi}) = \chi(\partial) \ce \,. \end{equation*} Since $\widehat \partial-\partial\in{\mathcal{H}}$ and $[{\mathcal{H}},\ce]=0$, we get $[\widehat \partial,\ce] = \chi(\partial)\ce$. By \eqref{dhat} and \leref{ldtilde}, \begin{equation*} [\widehat \partial^i, \widehat \partial^j] \in [\partial^i + x^i e^{-\chi} + {\mathcal{P}}_0, \partial^j + x^j e^{-\chi} + {\mathcal{P}}_0] \,. \end{equation*} We are only interested in the coefficient of $\ce$ in this bracket, as we already know the result in ${\mathcal{H}}=\iota_* {\mathcal{P}}$. The only terms giving contributions in $\kk\ce$ are: \begin{equation*} [\partial^i, x^j e^{-\chi}] \,, \quad [\partial^j, x^i e^{-\chi}] \,, \quad [x^i e^{-\chi}, x^j e^{-\chi}] \,, \end{equation*} and the coefficients of $\ce$ can be found by taking images in $X/\fil_0 X \simeq \kk$. All three are easy to compute. For instance, using again \eqref{echi2}, we obtain \begin{align*} [\partial^i, x^j e^{-\chi}] &= \partial^i(x^j e^{-\chi}) = \bigl( \partial^i x^j + \chi(\partial^i) x^j \bigr) e^{-\chi} \\ & = \partial^i x^j \mod \fil_0 X = -r^{ij} \mod \fil_0 X \,, \end{align*} by \eqref{cont7} and \eqref{dx1}. Similarly, using \eqref{brap}, \eqref{echi} and \eqref{dx2}, \begin{align*} [x^i e^{-\chi}, x^j e^{-\chi}] &= \sum_{k=1}^{2N} \bigl( (x^i e^{-\chi}) \bar{\partial}_k) \bigr) \bigl( (x^j e^{-\chi}) \bar{\partial}^k \bigr) \\ &= \sum_{k=1}^{2N} (x^i \partial_k) (x^j \partial^k) e^{-2\chi} \\ &= r^{ij} \mod \fil_0 X \,. \end{align*} Adding all contributions, we obtain \begin{equation*} [\widehat \partial^i, \widehat \partial^j] = - r^{ij} \ce \mod \widehat {\mathfrak{d}} \,, \end{equation*} which gives \begin{equation*} [\widehat \partial_i, \widehat \partial_j] = \omega_{ij} \ce \mod \widehat {\mathfrak{d}} \end{equation*} after lowering indices. \end{proof} \subsection{Finite dimensional irreducible representations of $\iota_*^{-1}(\widehat{\mathfrak{d}})$}\label{sfdird} We will later parametrize irreducible representations of $H(\dd,\chi,\om)$ (also) in terms of irreducible representations of the abelian extension ${\mathfrak{d}}' := \iota_*^{-1}(\widehat {\mathfrak{d}})$. In this section we briefly recall what finite-dimensional irreducible representations of ${\mathfrak{d}}'$ look like. \begin{lemma} Let $V$ be a finite-dimensional irreducible representation of ${\mathfrak{d}}'$. Then $\ce$ acts trivially on $V$ unless $\chi = 0$ and $\omega$ is a $2$-coboundary. \end{lemma} \begin{proof} First of all, $\ce$ spans an abelian ideal of ${\mathfrak{d}}'$, hence it lies in the radical. By the Cartan-Jacobson theorem, $\ce$ must then act via scalar multiplication by some element $\lambda \in \kk$ on each finite-dimensional irreducible representation of ${\mathfrak{d}}'$. In conclusion, the only possibility for $\ce$ to act nontrivially on $V$ happens when $\chi = 0$ and $\omega$ is a $2$-coboundary. \end{proof} When $\omega$ is a $2$-coboundary, we may find a unique $1$-form ${\zeta}$ of ${\mathfrak{d}}$ such that ${\mathrm{d}} {\zeta} = \omega$. Then elements $\widehat \partial + {\zeta}(\partial)\ce, \partial \in {\mathfrak{d}},$ span a Lie subalgebra $\dd^{\bla} \subset {\mathfrak{d}}'$ isomorphic to ${\mathfrak{d}}$ which provides a splitting ${\mathfrak{d}}' = \kk \ce \oplus \dd^{\bla}$. \begin{proposition} Let $V$ be a finite-dimensional irreducible representation of ${\mathfrak{d}}'$. Then: \begin{itemize} \item either $V$ is obtained by lifting to ${\mathfrak{d}}'$ an irreducible representation of ${\mathfrak{d}} \simeq {\mathfrak{d}}'/\kk\ce$, in which case $\ce$ acts trivially on $V$; \item or $\chi = 0, \omega = {\mathrm{d}} {\zeta}$, so that ${\mathfrak{d}}'$ splits as a direct sum of Lie algebras ${\mathfrak{d}}' = \kk 1 \oplus \dd^{\bla}$, and $V$ is obtained from an irreducible representation of $\dd^{\bla} \simeq {\mathfrak{d}}$ by supplementing it with a (possibly nontrivial) scalar action of the center $\kk 1$. \end{itemize} \end{proposition} \section{Tensor modules for $H(\dd,\chi,\om)$}\label{stmhd} In our classification of irreducible finite $\Wd$-modules \cite{BDK1}, a crucial role was played by the so-called tensor modules. In this section, by restricting them to the subalgebra $H(\dd,\chi,\om)$ of $\Wd$, we obtain the notion of tensor $H(\dd,\chi,\om)$-modules. \subsection{Tensor modules for $\Wd$}\label{stwd} Let us review the construction of tensor modules for $\Wd$ from \cite{BDK1}. First, given a Lie algebra $\mathfrak{g}$, we define the semidirect sum $W ({\mathfrak{d}}) \sd \Cur \mathfrak{g}$ as a direct sum as $H$-modules, for which $W ({\mathfrak{d}})$ is a subalgebra and $\Cur \mathfrak{g}$ is an ideal, with the following pseudobracket between them: \begin{equation*} [(f \otimes a) * (g \otimes b)]=-(f \otimes ga)\otimes_H (1 \otimes b) \, , \end{equation*} for $f,g \in H$, $a \in {\mathfrak{d}}$, $b \in \mathfrak{g}$ (see \exref{ecur} and \seref{subwd}). For any finite-dimensional $\mathfrak{g}$-module $V_0$, we construct a representation of $W ({\mathfrak{d}}) \sd \Cur \mathfrak{g}$ in $V=H \otimes V_0$ by \begin{equation}\label{eq:1.6} \bigl( (f \otimes a) \oplus (g \otimes b) \bigr) * v =- (f \otimes a) \otimes_H v + (g \otimes 1) \otimes_H bv \,, \end{equation} where $f,g \in H$, $a \in {\mathfrak{d}}$, $b \in \mathfrak{g}$, $v \in V_0$. For convenience, in \eqref{eq:1.6}, we identify $v\in V_0$ with its image $1\tp v \in \kk\tp V_0 \subset V$. The action on $V_0$ is then extended to the whole $V$ by $H$-linearity. Note that \eqref{eq:1.6} combines the usual action of $\Cur\g$ on $V$ from \exref{ecur2} with the $\Wd$-action on $H$ given by \eqref{wdac*}. Next, we define an embedding of $W ({\mathfrak{d}})$ in $W ({\mathfrak{d}}) \sd \Cur ({\mathfrak{d}} \oplus {\mathfrak{gl}}\, {\mathfrak{d}})$ by \begin{equation}\label{wdgld2} 1 \otimes \partial_i \mapsto (1 \otimes \partial_i) \oplus \Bigl( (1 \otimes \partial_i) \oplus \bigl(1 \otimes \ad \partial_i+ \sum_j \partial_j \otimes e^j_i \bigr)\Bigr)\,. \end{equation} Composing this embedding with the action \eqref{eq:1.6} of $W ({\mathfrak{d}}) \sd \Cur \mathfrak{g}$ for $\mathfrak{g} = {\mathfrak{d}} \oplus {\mathfrak{gl}}\, {\mathfrak{d}}$, we obtain a $W ({\mathfrak{d}})$-module $V=H \otimes V_0$ for each $({\mathfrak{d}} \oplus {\mathfrak{gl}}\, {\mathfrak{d}})$-module $V_0$. This module is called a {\em tensor $W ({\mathfrak{d}})$-module} and is denoted $\T (V_0)$. Explicitly, the action of $\Wd$ on $\T(V_0)$ is given by \cite[Eq. (4.30)]{BDK1}: \begin{equation}\label{wdgcd3} \begin{split} (1\tp \partial_i)*v &= (1 \tp 1) \tp_H (\ad\partial_i)v + \sum_{j}\, (\partial_j \tp 1) \tp_H e_i^j v \\ &- (1 \tp \partial_i) \tp_H v + (1 \tp 1) \tp_H (\partial_i \cdot v) \,, \end{split} \end{equation} for $v \in V_0$. Here we denoted by $\partial_i \cdot v \in V_0$ the action of $\partial_i\in{\mathfrak{d}}$ on $v\in V_0$, which should be distinguished from the element $\partial_i\tp v_0\in V$. If $\Pi$ is a finite-dimensional ${\mathfrak{d}}$-module and $U$ is a finite-dimensional $\gl\,\dd$-module, their exterior tensor product $\Pi \boxtimes U$ is defined as the $({\mathfrak{d}}\oplus\gl\,\dd)$-module $\Pi \tp U$, where ${\mathfrak{d}}$ acts on the first factor and $\gl\,\dd$ acts on the second one. In this case, the tensor module $\T(\Pi \boxtimes U)$ will also be denoted as $\T(\Pi,U)$. Notice that \begin{equation}\label{tpiv0} \T(\Pi,U) = T_\Pi(\T(\kk,U)) \,, \end{equation} where $T_\Pi$ is the twisting functor from \seref{stwrep}. More generally, given two ${\mathfrak{d}}$-modules $\Pi$, $\overline{\Pi}$ and a $\gl\,\dd$-module $U$, we have \begin{equation}\label{tpiv1} T_\Pi(\T(\overline{\Pi},U)) = \T(\Pi\tp\overline{\Pi},U) \,. \end{equation} \subsection{Restriction of tensor modules from $\Wd$ to $H(\dd,\chi,\om)$}\label{subtres} We will identify $H(\dd,\chi,\om)$ as a subalgebra of $\Wd$ via the embedding \eqref{kd2}. Then $H(\dd,\chi,\om)=He$ where $e\in\Wd$ is given by \eqref{iota}. In view of \eqref{wdgld2}, we introduce the $H$-linear map (but not a homomorphism of Lie pseudo\-algebras) $\tau\colon\Wd\to\Cur\gl\,\dd$ given by \begin{equation}\label{wdgld3} \tau(h\tp\partial_i) = h\tp\ad\partial_i + \sum_{j=1}^{2N} h\partial_j \tp e_i^j \,, \qquad h\in H \,. \end{equation} Then the image of $e$ under the map \eqref{wdgld2} is $e \oplus (e \oplus \tau(e))$, where the first $e$ is considered an element of $\Wd=H\tp{\mathfrak{d}}$, while the second $e$ is in $\Cur{\mathfrak{d}}=H\tp{\mathfrak{d}}$. Recall also the notation $\bar{\partial}=\partial-\chi(\partial)$ and the linear map $\ad^{\mathfrak{sp}}\colon{\mathfrak{d}}\to\sp\,\dd$ defined by \eqref{adsp1}. Then we have the following analog of \cite[Lemma 5.1]{BDK2}. \begin{lemma}\label{leee} We have \begin{equation}\label{eee1} \begin{split} \tau(e) &= (\id\tp\ad^{\mathfrak{sp}})(e) + \frac12 s \tp I + \sum_{i,j=1}^{2N} \bar{\partial}_i\bar{\partial}_j \tp f^{ij} \\ &= -\sum_{k=1}^{2N} \bar{\partial}_k \tp \Bigl( \ad^{\mathfrak{sp}}\partial^k +\frac12 \chi(\partial^k) I \Bigr) + \sum_{i,j=1}^{2N} \bar{\partial}_i\bar{\partial}_j \tp f^{ij} \,. \end{split} \end{equation} \end{lemma} \begin{proof} First note that, by \eqref{eij}, \eqref{cont7} and \eqref{wdgld3}, \begin{equation*} \tau(h\tp\partial^i) = h\tp\ad\partial^i + \sum_{j=1}^{2N} h\partial_j \tp e^{ij} \,, \qquad h\in H \,. \end{equation*} Applying this to \eqref{iota}, we find \begin{align*} \tau(e) &= -\sum_{i=1}^{2N} \bar{\partial}_i\tp\ad\partial^i - \sum_{i,j=1}^{2N} \bar{\partial}_i\partial_j \tp e^{ij} \\ &= -\sum_{i=1}^{2N} \bar{\partial}_i\tp \Bigl( \ad\partial^i + \sum_{j=1}^{2N} \chi(\partial_j) e^{ij} \Bigr) - \sum_{i,j=1}^{2N} \bar{\partial}_i\bar{\partial}_j \tp e^{ij} \\ &= -\sum_{k=1}^{2N} \bar{\partial}_k\tp ( \ad\partial^k + \partial^k \tp \chi ) - \sum_{i,j=1}^{2N} \bar{\partial}_i\bar{\partial}_j \tp e^{ij} \,. \end{align*} Now we write \begin{align*} -\sum_{i,j=1}^{2N} &\, \bar{\partial}_i\bar{\partial}_j \tp e^{ij} = -\frac12 \sum_{i,j=1}^{2N} \bar{\partial}_i\bar{\partial}_j \tp e^{ij} - \frac12 \sum_{i,j=1}^{2N} \bar{\partial}_j\bar{\partial}_i \tp e^{ji} \\ &= -\frac12 \sum_{i,j=1}^{2N} \bar{\partial}_i\bar{\partial}_j \tp e^{ij} - \frac12 \sum_{i,j=1}^{2N} \bar{\partial}_i\bar{\partial}_j \tp e^{ji} +\frac12 \sum_{i,j=1}^{2N} [\bar{\partial}_i,\bar{\partial}_j] \tp e^{ji} \\ &= \sum_{i,j=1}^{2N} \bar{\partial}_i\bar{\partial}_j \tp f^{ij} - \frac12 \sum_{i,j=1}^{2N} [\bar{\partial}_i,\bar{\partial}_j] \tp e^{ij} \,. \end{align*} Since the map \eqref{dbar} is a Lie algebra homomorphism, we have \begin{equation*} [\bar{\partial}_i,\bar{\partial}_j] = \sum_{k=1}^{2N} c_{ij}^k \bar{\partial}_k \,. \end{equation*} Finally, from \eqref{schi}, we obtain $(\id\tp\chi)(e) = \bar s = s$. Plugging all of these in the above formula for $\tau(e)$, we derive \eqref{eee1}. \end{proof} As a consequence, we obtain the image of $e$ under the map \eqref{wdgld2}. Then, by \eqref{eq:1.6}, the action of $e$ on a tensor $W ({\mathfrak{d}})$-module $\T (V_0)$ is given explicitly by: \begin{equation}\label{eee2} \begin{split} e * v &= \sum_{k=1}^{2N} (\bar{\partial}_k \tp \partial^k) \otimes_H v -\sum_{k=1}^{2N} (\bar{\partial}_k \tp 1) \otimes_H \Bigl( \partial^k + \ad^{\mathfrak{sp}}\partial^k + \frac12 \chi(\partial^k) I \Bigr) \cdot v \\ &+ \sum_{i,j=1}^{2N} (\bar{\partial}_i\bar{\partial}_j \tp 1) \otimes_H f^{ij} v \,, \end{split} \end{equation} for $v\in V_0 \equiv \kk\tp V_0 \subset\T (V_0)$. \begin{remark}\label{nontrivialc} We already know that the unique inclusion $H(\dd,\chi,\om) \hookrightarrow \Wd$ induces a non-injective homomorphism of the corresponding annihilation algebras, its kernel being spanned over $\kk$ by the central element $\ce \in {\mathcal{P}}$. Consequently, every module obtained from a $\Wd$-tensor module by restricting it to $H(\dd,\chi,\om)$ necessarily exhibits a trivial action of $\ce$. One may provide an alternate construction which allows for nonzero scalar actions of the centre of ${\mathcal{P}}$ as follows. Assume that $\chi = 0, \omega = {\mathrm{d}} {\zeta}$. Set $H' = \ue({\mathfrak{d}}')$, $X' = (H')^*$, where ${\mathfrak{d}}'=\iota_*^{-1}(\widehat {\mathfrak{d}})$ as before. Recall that we may construct, as in \cite[Remark 8.23]{BDK}, a Lie pseudoalgebra $K(\dd',\th) = H' e'$, whose annihilation algebra we denote by ${\mathcal{K}}$. Then the canonical projection of Lie algebras $\pi: {\mathfrak{d}}' \to {\mathfrak{d}}'/\kk c\simeq {\mathfrak{d}}$ induces corresponding algebra homomorphisms $\pi_*: H' \to H$ and $\pi^*: X \to X'$ so that the map $j: {\mathcal{P}} \to {\mathcal{K}}$ defined as $${\mathcal{P}} \ni x \otimes_H e \mapsto \pi^*(x) \otimes_{H'} e' \in {\mathcal{K}}$$ is an injective Lie algebra homomorphism. As both the left and the right action of $\partial_0 = c = \ce$ are trivial on $\pi^*(X)$, one obtains that all Fourier coefficients $\pi^*(x) \otimes_{H'} \partial_0 e'$ vanish, and that the semidirect product ${\mathfrak{d}}' \sd {\mathcal{P}}$ induced from the extended annihilation algebra ${\mathfrak{d}}' \sd {\mathcal{K}}$ projects to ${\mathfrak{d}} \sd {\mathcal{P}}$. Due to the correspondence between representations of a Lie pseudoalgebra and conformal representations of the corresponding (extended) annihilation algebra, one may consider tensor modules for $K(\dd',\th)$, introduced in \cite{BDK2}, and restrict the action of ${\mathcal{K}}$ to the subalgebra ${\mathcal{P}}$. One thus obtains a representation $T$ of the semidirect product ${\mathfrak{d}}' \sd {\mathcal{P}}$, and it is not difficult to check that $T/\partial_0 T$ then admits an action of ${\mathfrak{d}} \sd {\mathcal{P}}$, thus yielding a representation of $H(\dd,\chi,\om)$ with a possibly nontrivial action of $\ce \in {\mathcal{P}}$. \end{remark} \subsection{Tensor modules for $H(\dd,\chi,\om)$ }\label{subthd} For any trace form $\varphi$ on ${\mathfrak{d}}$, the corresponding $1$-dimensional ${\mathfrak{d}}$-module $\kk_\varphi$ is spanned by an element $1_\varphi$ such that $\partial\cdot 1_\varphi = \varphi(\partial)1_\varphi$ for $\partial\in{\mathfrak{d}}$. Similarly, for any ${\mathfrak{d}}$-module $\Pi$, we may form the tensor product ${\mathfrak{d}}$-module $\Pi_\varphi := \Pi \otimes \kk_\varphi$, which is isomorphic to $\Pi$ as a vector space, but is endowed with the action \begin{equation}\label{tpiv2} \partial\cdot (u\tp 1_\varphi) = \bigl( (\partial+\varphi(\partial))\cdot u \bigr) \tp 1_\varphi \,, \qquad \partial\in{\mathfrak{d}} \,, \;\; u\in\Pi \,. \end{equation} This observation implies that, by changing the action of ${\mathfrak{d}}$ on a $({\mathfrak{d}} \oplus{\mathfrak{gl}}\,{\mathfrak{d}})$-module $V_0$, we can eliminate the term $\frac12 \chi(\partial^k) I$ in \eqref{eee2}. Furthermore, note that both $\ad^{\mathfrak{sp}}\partial^k$ and $f^{ij}$ lie in the subalgebra ${\mathfrak{sp}}\,{\mathfrak{d}}\subset{\mathfrak{gl}}\,{\mathfrak{d}}$. This motivates the following definition. \begin{definition}\label{dtmodh} Let $V_0$ be a finite-dimensional representation of ${\mathfrak{d}}'\oplus\sp\,\dd$. Then the \emph{tensor module} $\T(V_0,\lambda)$ over $H(\dd,\chi,\om)$ is defined as $\T(V_0,\lambda)=H\tp V_0$ with the action: \begin{equation}\label{eee3} \begin{split} e * v &= \sum_{k=1}^{2N} (\bar{\partial}_k \tp \partial^k) \otimes_H v -\sum_{k=1}^{2N} (\bar{\partial}_k \tp 1) \otimes_H ( \partial^k + \ad^{\mathfrak{sp}}\partial^k ) \cdot v + (1 \otimes 1) \otimes_H c. v \\ &+ \sum_{i,j=1}^{2N} (\bar{\partial}_i\bar{\partial}_j \tp 1) \otimes_H f^{ij} v \,, \qquad v\in V_0 \equiv \kk\tp V_0 \subset\T (V_0) \,. \end{split} \end{equation} For $V_0 = \Pi'\boxtimes U$, where $\Pi'$ is a finite-dimensional ${\mathfrak{d}}'$-module and $U$ is a finite-dimensional $\sp\,\dd$-module, we will write $\T(V_0)=\T(\Pi',U)$. When $V_0 = \Pi \boxtimes U$ is a ${\mathfrak{d}}\oplus \sp\,\dd$-module, we will abuse the notation and set $\T(V_0) = \T(\Pi, U):= \T(\pi^* \Pi, U)$, where $\pi^* \Pi$ is viewed as a ${\mathfrak{d}}'$-module via composition with the canonical projection $\pi: {\mathfrak{d}}' \to {\mathfrak{d}}'/\kk c \simeq {\mathfrak{d}}$. \end{definition} As usual, the action of $H(\dd,\chi,\om)=He$ on $\T(V_0)$ is determined uniquely from \eqref{eee3} and $H$-linearity. Notice that when the action of $c \in {\mathfrak{d}}'$ is trivial and $\Pi'$ gets identified with $\pi^* \Pi$ as above, \eqref{eee3} coincides with the expression from \eqref{eee2}, thus showing that $\T(V_0)$ is indeed an $H(\dd,\chi,\om)$-module. One may in principle use \reref{nontrivialc} to generalize this fact to nontrivial actions of $c$; we will instead postpone this to \seref{skten}, where it will be derived in terms of singular vectors. Using \eqref{eee2}--\eqref{eee3}, we obtain the next proposition. \begin{proposition}\label{phtm} Let\/ $\Pi$ be a finite-dimensional\/ ${\mathfrak{d}}$-module, and\/ $U$ be a finite-dimensional\/ $\gl\,\dd$-module, which is also an\/ $\sp\,\dd$-module by restriction. Suppose that\/ $I\in\gl\,\dd$ acts as\/ $k\id$ on\/ $U$ for some\/ $k\in\kk$. Then the restriction of the tensor\/ $\Wd$-module\/ $\T(\Pi,U)$ to the subalgebra\/ $H(\dd,\chi,\om)$ is isomorphic to the tensor\/ $H(\dd,\chi,\om)$-module\/ $\T(\Pi_{k\chi/2},U)$. \end{proposition} \section{Tensor modules of de Rham type}\label{stdrm} The main goal of this section is to define an important complex of $H(\dd,\chi,\om)$-modules, called the {\em conformally symplectic pseudo de Rham complex}. We start by reviewing the pseudo de Rham complex of $\Wd$-modules from \cite{BDK,BDK1}. \subsection{Forms with constant coefficients}\label{sfcc} Consider the cohomology complex of the Lie algebra ${\mathfrak{d}}$ with trivial coefficients: \begin{equation}\label{domcc} 0 \to \Omega^0 \xrightarrow{\di_0}\Omega^1\xrightarrow{\di_0} \cdots \xrightarrow{\di_0} \Omega^{2N} \to 0 \,, \qquad \dim{\mathfrak{d}}=2N \,, \end{equation} where $\Omega^n = \textstyle\bigwedge^n{\mathfrak{d}}^*$. Set $\Omega = \textstyle\bigwedge^\bullet{\mathfrak{d}}^* = \textstyle\bigoplus_{n=0}^{2N} \Omega^n$ and $\Omega^n = \{0\}$ if $n<0$ or $n>2N$. We will think of the elements of $\Omega^n$ as skew-symmetric \emph{$n$-forms}, i.e., linear maps from $\bigwedge^n {\mathfrak{d}}$ to $\kk$. The \emph{differential} $\di_0$ is given by the formula ($\al\in\Omega^n$, $a_i\in{\mathfrak{d}}$): \begin{equation}\label{d0al} \begin{split} (&\di_0\al)(a_1 \wedge \dots \wedge a_{n+1}) \\ &= \sum_{i<j} (-1)^{i+j} \al([a_i,a_j] \wedge a_1 \wedge \dots \wedge \widehat a_i \wedge \dots \wedge \widehat a_j \wedge \dots \wedge a_{n+1}) \,, \qquad n\ge1 \,, \end{split} \end{equation} and $\di_0\al = 0$ if $\al\in\Omega^0=\kk$. Here, as usual, a hat over a term means that it is omitted in the wedge product. Recall also that the \emph{wedge product} of two forms $\al\in\Omega^n$ and $\beta\in\Omega^p$ is defined by: \begin{equation}\label{wedge} \begin{split} (\al&\wedge\beta)(a_1 \wedge \dots \wedge a_{n+p}) \\ &= \frac1{n!p!} \sum_{\pi\in\symm_{n+p}} (\sgn\pi) \, \al(a_{\pi(1)} \wedge \dots \wedge a_{\pi(n)}) \, \beta(a_{\pi(n+1)} \wedge \dots \wedge a_{\pi(n+p)}) \,, \end{split} \end{equation} where $\symm_{n+p}$ denotes the symmetric group on $n+p$ letters and $\sgn\pi$ is the sign of the permutation $\pi$. The wedge product \eqref{wedge} makes $\Omega$ a $\ZZ_+$-graded associative\ commutative superalgebra with parity $p(\al)=n \mod 2\ZZ$ for $\al\in\Omega^n$: \begin{equation}\label{omasgc} \al\wedge\beta = (-1)^{p(\al)p(\beta)} \beta\wedge\al \,, \qquad (\al\wedge\beta)\wedge\gamma = \al\wedge(\beta\wedge\gamma) \,. \end{equation} The differential $\di_0$ is an odd derivation of $\Omega$\,: \begin{equation}\label{dizder} \di_0(\al\wedge\beta) = \di_0\al\wedge\beta + (-1)^{p(\al)} \al\wedge\di_0\beta \,. \end{equation} For $a\in{\mathfrak{d}}$, we have operators $\iota_a\colon\Omega^n\to\Omega^{n-1}$ defined by \begin{equation}\label{ioal} (\iota_a\al)(a_1 \wedge \dots \wedge a_{n-1}) =\al(a \wedge a_1 \wedge \dots \wedge a_{n-1}) \,, \qquad\quad a_i\in{\mathfrak{d}} \,, \end{equation} which are also odd derivations of $\Omega$. For $A\in\gl\,\dd$, denote by $A\cdot$ its action on $\Omega$\,: \begin{equation}\label{acdotal} (A\cdot\al)(a_1 \wedge \dots \wedge a_n) = \sum_{i=1}^n\, (-1)^i \al(A a_i \wedge a_1 \wedge \dots \wedge \widehat a_i \wedge \dots \wedge a_n) \,. \end{equation} Then $A\cdot$ is an even derivation of $\Omega$\,: \begin{equation}\label{acder} A\cdot(\al\wedge\beta) = (A\cdot\al)\wedge\beta + \al\wedge(A\cdot\beta) \,. \end{equation} As before, let us fix a $1$-form $\chi\in\Omega^1={\mathfrak{d}}^*$ and a nondegenerate $2$-form $\omega\in\Omega^2={\mathfrak{d}}^*\wedge{\mathfrak{d}}^*$. Then equation \eqref{omchi3} and the condition that $\chi$ is a trace form are equivalent to: \begin{equation}\label{omchi4} \di_0\chi=0 \,, \qquad \di_0\omega+\chi\wedge\omega=0 \,. \end{equation} Consider the operator $\Psi$ of wedge multiplication with $\omega$, i.e., $\Psi(\al) = \omega\wedge\al$ for $\al\in\Omega$. Denote by $I^n\subset\Omega^n$ the image of $\Psi|_{\Omega^{n-2}}$ and by $J^n\subset\Omega^n$ the kernel of $\Psi|_{\Omega^n}$. Since $\omega$ is nondegenerate, we have: \begin{equation}\label{injn} I^k=\Omega^k \;\;\text{for}\;\; k\ge N+1 \,, \qquad J^n=\{0\} \;\;\text{for}\;\; n\le N-1 \,. \end{equation} In particular, $\Psi$ gives an isomorphism $\Omega^{N-1}\to\Omega^{N+1}$. More generally, $\Psi^m$ gives an isomorphism $\Omega^{N-m}\to\Omega^{N+m}$ for $0\le m\le N$. By \cite[Lemma 6.1]{BDK2}, the composition \begin{equation}\label{injn2} J^{N+m} \injto \Omega^{N+m} \xrightarrow{\,\simeq\,} \Omega^{N-m} \surjto \Omega^{N-m}/I^{N-m} \end{equation} is an isomorphism for $0\le m\le N$. By definition, $A\cdot\omega=0$ for $A\in\sp\,\dd$. Hence, by \eqref{acder}, $A\cdot$ commutes with $\Psi$. This implies that $I^n$ and $J^n$ are $\sp\,\dd$-modules and \eqref{injn2} is an isomorphism of $\sp\,\dd$-modules. In fact, one has isomorphisms of $\sp\,\dd$-modules \begin{equation}\label{injn3} \Omega^{n}/I^{n} \simeq J^{2N-n} \simeq R(\pi_n) \,, \qquad 0\leq n \leq N \,, \end{equation} where $R(\pi_n)$ denotes the $n$-th fundamental representation of $\sp\,\dd$ and $R(\pi_0) = \kk$ (see, e.g., \cite[Lecture 17]{FH}). \subsection{Pseudo de Rham complex}\label{sdrm} Recall from \cite{BDK} the spaces of \emph{pseudoforms} \begin{equation}\label{omndd} \Omega^n({\mathfrak{d}}) = H\tp\Omega^n \,, \qquad \Omega({\mathfrak{d}}) = H\tp\Omega = \bigoplus_{n=0}^{2N} \Omega^n({\mathfrak{d}}) \,. \end{equation} These are free $H$-modules, where $H$ acts by left multiplication on the first factor. We will often identify $n$-pseudoforms $\al\in\Omega^n({\mathfrak{d}})$ with $\kk$-linear maps from $\bigwedge^n {\mathfrak{d}}^*$ to $H$. The \emph{differential} ${\mathrm{d}}\colon\Omega^n({\mathfrak{d}})\to\Omega^{n+1}({\mathfrak{d}})$ is given by ($\al\in\Omega^n({\mathfrak{d}})$, $a_i\in{\mathfrak{d}}$): \begin{equation}\label{dw} \begin{split} &\begin{split} ({\mathrm{d}} \al)&(a_1 \wedge \dots \wedge a_{n+1}) \\ &= \sum_{i<j} (-1)^{i+j} \al([a_i,a_j] \wedge a_1 \wedge \dots \wedge \widehat a_i \wedge \dots \wedge \widehat a_j \wedge \dots \wedge a_{n+1}) \\ &+ \sum_i (-1)^i \al(a_1 \wedge \dots \wedge \widehat a_i \wedge \dots \wedge a_{n+1}) \, a_i \in H \qquad\text{if}\;\; n\ge1, \end{split} \\ &({\mathrm{d}} \al)(a_1) = -\al \, a_1 \in H \qquad\text{if}\;\; \al\in\Omega^0({\mathfrak{d}})=H. \end{split} \end{equation} Notice that ${\mathrm{d}}$ is $H$-linear and ${\mathrm{d}}^2=0$. The sequence \begin{equation}\label{domd} 0 \to \Omega^0({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}} \Omega^1({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}} \cdots \xrightarrow{{\mathrm{d}}} \Omega^{2N-1}({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}} \Omega^{2N}({\mathfrak{d}}) \end{equation} is called the \emph{pseudo de Rham complex}. By \cite[Remark 8.1]{BDK}, the $n$-th cohomology of the complex $(\Omega({\mathfrak{d}}), {\mathrm{d}})$ is trivial for $n\ne 2N=\dim{\mathfrak{d}}$ and is $1$-dimensional for $n=2N$. Hence, the sequence \eqref{domd} is exact. We extend the wedge product in $\Omega$ to a product in $\Omega({\mathfrak{d}})$ by setting \begin{equation}\label{wedge*} (f\tp\al)\wedge(g\tp\beta) = (fg) \tp (\al\wedge\beta) \,, \qquad \al,\beta\in\Omega \,, \;\; f,g\in H \,. \end{equation} Then, by \cite[Lemma 6.3]{BDK2}, we have: \begin{align} \label{dider} {\mathrm{d}}(\al\wedge\beta) = \di_0\al\wedge\beta + (-1)^n \al\wedge{\mathrm{d}}\beta \,, \qquad \al\in\Omega^n \,, \;\; \beta\in\Omega \,. \end{align} In \cite{BDK,BDK1}, we introduced a $\Wd$-module structure on each $\Omega^n({\mathfrak{d}})$, so that the map ${\mathrm{d}}$ is a module homomorphism. Furthermore, $\Omega^n({\mathfrak{d}})$ is a tensor $\Wd$-module, namely $\Omega^n({\mathfrak{d}})=\T(\kk,\Omega^n)$ (see \seref{stwd}). Explicitly, if we identify the elements of $H^{\tp2} \tp_H \Omega^n({\mathfrak{d}}) \simeq H^{\tp2} \tp\Omega^n$ with $\kk$-linear maps from $\bigwedge^n {\mathfrak{d}}^*$ to $H^{\tp2}$, the action of $\Wd$ on $\Omega^n({\mathfrak{d}})$ is given by: \begin{equation}\label{fa*om} \begin{split} \bigl((f\tp a)&*\al\bigr)(a_1 \wedge \dots \wedge a_n) = - \al(a_1\wedge \dots \wedge a_n) \, (f \tp a) \\ &+ \sum_{i=1}^n (-1)^i \al(a \wedge a_1 \wedge\dots \wedge \widehat a_i \wedge \dots \wedge a_n) \, (f a_i \tp 1) \\ &+ \sum_{i=1}^n (-1)^i \al([a,a_i] \wedge a_1 \wedge\dots \wedge \widehat a_i \wedge \dots \wedge a_n) \, (f \tp 1) \in H^{\tp2} \,, \end{split} \end{equation} for $n\ge1$, $f\tp a\in\Wd$ and $\al\in\Omega^n\equiv\kk\tp\Omega^n\subset\Omega^n({\mathfrak{d}})$. For $n=0$, the action of $\Wd$ on $\Omega^0({\mathfrak{d}})=H$ coincides with the action \eqref{wdac*}. \subsection{Conformally symplectic pseudo de Rham complex for $\chi=0$}\label{sdrmh0} In this subsection, we will assume that $\chi=0$. The general case will be considered in the next subsection. Let us extend $\Psi$ by $H$-linearity to a homomorphism of $H$-modules $\Psi\colon\Omega^n({\mathfrak{d}})\to\Omega^{n+2}({\mathfrak{d}})$. Then the image of $\Psi |_{\Omega^{n-2}({\mathfrak{d}})}$ is $I^n({\mathfrak{d}}) = H\tp I^n \subset \Omega^n({\mathfrak{d}})$, and the kernel of $\Psi |_{\Omega^{n}({\mathfrak{d}})}$ is $J^n({\mathfrak{d}}) = H\tp J^n \subset \Omega^n({\mathfrak{d}})$. By \eqref{injn2}, we have isomorphisms $J^{N+m}({\mathfrak{d}}) \simeq \Omega^{N-m}({\mathfrak{d}}) / I^{N-m}({\mathfrak{d}})$ for all $0\le m\le N$. It follows from \eqref{dider} and \eqref{omchi4} with $\chi=0$ that ${\mathrm{d}}\Psi = \Psi{\mathrm{d}}$. Therefore, the complex \eqref{domd} induces complexes \begin{align} \label{domd1} 0 \to \Omega^0({\mathfrak{d}}) / I^0({\mathfrak{d}}) &\xrightarrow{{\mathrm{d}}} \Omega^1({\mathfrak{d}}) / I^1({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}} \cdots \xrightarrow{{\mathrm{d}}} \Omega^{N}({\mathfrak{d}}) / I^{N}({\mathfrak{d}}) \intertext{and} \label{domd2} J^{N}({\mathfrak{d}}) &\xrightarrow{{\mathrm{d}}} J^{N+1}({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}} \cdots \xrightarrow{{\mathrm{d}}} J^{2N}({\mathfrak{d}}) \to 0 \,. \end{align} \begin{lemma}\label{ldomd2} The sequences \eqref{domd1} and \begin{equation*} J^{N}({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}} J^{N+1}({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}} \cdots \xrightarrow{{\mathrm{d}}} J^{2N-2}({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}} J^{2N-1}({\mathfrak{d}}) \,, \qquad N\ge 3\,, \end{equation*} are exact. The cohomology of the complex \eqref{domd2} is finite dimensional. \end{lemma} \begin{proof} To show exactness at the term $\Omega^n({\mathfrak{d}}) / I^n({\mathfrak{d}})$ in \eqref{domd1} for $0\le n\le N-1$, take $\al\in\Omega^n({\mathfrak{d}})$ such that ${\mathrm{d}}\al\in I^{n+1}({\mathfrak{d}})$. This means ${\mathrm{d}}\al = \Psi\beta$ for some $\beta\in\Omega^{n-1}({\mathfrak{d}})$. Then $0 = {\mathrm{d}}^2\al = {\mathrm{d}}\Psi\beta = \Psi{\mathrm{d}}\beta$\,; hence, ${\mathrm{d}}\beta=0$, because $\Psi$ is injective on $\Omega^n({\mathfrak{d}})$ for $n\le N-1$. By the exactness of \eqref{domd}, $\beta={\mathrm{d}}\gamma$ for some $\gamma\in\Omega^{n-2}({\mathfrak{d}})$. Then ${\mathrm{d}}(\al-\Psi\gamma) = \Psi\beta - \Psi{\mathrm{d}}\gamma = 0$, which implies $\al-\Psi\gamma = {\mathrm{d}}\rho$ for some $\rho\in\Omega^{n-1}({\mathfrak{d}})$. Therefore, $\al+I^{n}({\mathfrak{d}}) = {\mathrm{d}}(\rho+I^{n-1}({\mathfrak{d}}))$ is a coboundary. To prove exactness at the term $J^n({\mathfrak{d}})$ in \eqref{domd2} for $N+1\le n\le 2N-2$, take $\al\in J^n({\mathfrak{d}})$ such that ${\mathrm{d}}\al=0$. Then $\al={\mathrm{d}}\beta$ for some $\beta\in\Omega^{n-1}({\mathfrak{d}})$, by the exactness of \eqref{domd}. We have ${\mathrm{d}}\Psi\beta = \Psi{\mathrm{d}}\beta = \Psi\al = 0$. Hence, $\Psi\beta = {\mathrm{d}}\gamma$ for some $\gamma\in\Omega^{n}({\mathfrak{d}})$, since $\Psi\beta\in\Omega^{n+1}({\mathfrak{d}})$ with $n+1\le 2N-1$ and \eqref{domd} is exact. Since $\Psi$ maps $\Omega^{n-2}({\mathfrak{d}})$ onto $\Omega^{n}({\mathfrak{d}})$ for $n\ge N+1$, we can find $\rho\in\Omega^{n-2}({\mathfrak{d}})$ such that $\Psi\rho = \gamma$. Then $\Psi(\beta-{\mathrm{d}}\rho) = \Psi\beta - {\mathrm{d}}\Psi\rho = \Psi\beta - {\mathrm{d}}\gamma = 0$. We have found an element $\beta-{\mathrm{d}}\rho \in J^{n-1}({\mathfrak{d}})$ such that ${\mathrm{d}}(\beta-{\mathrm{d}}\rho) = \al$. This completes the proof of exactness. The finite-dimensionality of the cohomology of \eqref{domd2} follows from the fact that $\dim\Omega^{2N}({\mathfrak{d}}) / {\mathrm{d}}\Omega^{2N-1}({\mathfrak{d}}) = 1$. \end{proof} Now we will construct a map $\di^{\mathrm{R}}\colon \Omega^{N}({\mathfrak{d}}) / I^{N}({\mathfrak{d}}) \to J^{N}({\mathfrak{d}})$, analogous to Rumin's map from \cite{Ru} and \cite{BDK2}. Take any $\al\in\Omega^{N}({\mathfrak{d}})$. Since the restriction of $\Psi$ gives an isomorphism $\Omega^{N-1}({\mathfrak{d}}) \to \Omega^{N+1}({\mathfrak{d}})$, we can write ${\mathrm{d}}\al = \Psi\beta$ for a unique $\beta\in\Omega^{N-1}({\mathfrak{d}})$. Then we have $0 = {\mathrm{d}}^2\al = \Psi{\mathrm{d}}\beta$\,; hence, ${\mathrm{d}}\beta \in J^{N}({\mathfrak{d}})$. We let $\di^{\mathrm{R}}\al={\mathrm{d}}\beta$. To show that $\di^{\mathrm{R}}$ is well defined, we need to check that $\di^{\mathrm{R}}\al=0$ when $\al\in I^{N}({\mathfrak{d}})$. Indeed, if $\al=\Psi\gamma$ for some $\gamma\in\Omega^{N-2}({\mathfrak{d}})$, then ${\mathrm{d}}\al = \Psi{\mathrm{d}}\gamma$, which implies $\beta={\mathrm{d}}\gamma$ and ${\mathrm{d}}\beta=0$. Connecting \eqref{domd1} and \eqref{domd2}, we obtain a sequence \begin{equation}\label{domd6} 0 \to \Omega^0({\mathfrak{d}}) / I^0({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}} \cdots \xrightarrow{{\mathrm{d}}} \Omega^{N}({\mathfrak{d}}) / I^{N}({\mathfrak{d}}) \xrightarrow{\di^{\mathrm{R}}} J^{N}({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}} \cdots \xrightarrow{{\mathrm{d}}} J^{2N}({\mathfrak{d}}) \,, \end{equation} which we will call the \emph{conformally symplectic pseudo de Rham complex} for $\chi=0$. (Since for $\chi=0$ the form $\omega$ is symplectic, one could also call this the symplectic pseudo de Rham complex.) \begin{proposition}\label{pdomd5} The sequence \eqref{domd6} is a complex, which is exact at all terms except\/ $J^{2N-1}({\mathfrak{d}})$ and\/ $J^{2N}({\mathfrak{d}})$. The map\/ $\di^{\mathrm{R}}$ is defined as follows{\rm:} take any representative\/ $\al\in\Omega^{N}({\mathfrak{d}})$ and write\/ ${\mathrm{d}}\al = \Psi\beta;$ then\/ $\di^{\mathrm{R}}\al = {\mathrm{d}}\beta$. \end{proposition} \begin{proof} We have already shown that $\di^{\mathrm{R}}$ is well defined. Next, it is clear by construction that $\di^{\mathrm{R}}{\mathrm{d}}=0$ and ${\mathrm{d}}\di^{\mathrm{R}}=0$. Due to \leref{ldomd2}, it remains only to check exactness at the terms $\Omega^{N}({\mathfrak{d}}) / I^{N}({\mathfrak{d}})$ and $J^{N}({\mathfrak{d}})$, the latter only for $N\ge 2$. Let $\al\in\Omega^{N}({\mathfrak{d}})$ be such that $\di^{\mathrm{R}}\al = 0$. Then ${\mathrm{d}}\beta = \di^{\mathrm{R}}\al = 0$\,; hence, $\beta={\mathrm{d}}\gamma$ for some $\gamma\in\Omega^{N-2}({\mathfrak{d}})$ by the exactness of \eqref{domd}. Then ${\mathrm{d}}\al=\Psi\beta={\mathrm{d}}\Psi\gamma$ implies that $\al-\Psi\gamma = {\mathrm{d}}\rho$ for some $\rho\in\Omega^{N-1}({\mathfrak{d}})$. Therefore, $\al+I^{N}({\mathfrak{d}}) = {\mathrm{d}}(\rho+I^{N-1}({\mathfrak{d}}))$. Now suppose that $N\ge2$ and $\al\in J^{N}({\mathfrak{d}})$ satisfies ${\mathrm{d}}\al = 0$. Then $\al={\mathrm{d}}\beta$ for some $\beta\in\Omega^{N-1}({\mathfrak{d}})$, again by the exactness of \eqref{domd}. We have ${\mathrm{d}}\Psi\beta=\Psi\al=0$. Since $\Psi\beta\in\Omega^{N+1}({\mathfrak{d}})$ and $N+1\le 2N-1$, there is $\gamma\in\Omega^{N}({\mathfrak{d}})$ such that $\Psi\beta={\mathrm{d}}\gamma$. Then $\di^{\mathrm{R}}\gamma={\mathrm{d}}\beta=\al$, as desired. \end{proof} Recall that, by \cite{BDK1}, $\Omega^n({\mathfrak{d}})=\T(\kk,\Omega^n)$ is a tensor $\Wd$-module (see \seref{stwd}). Since $I\in\gl\,\dd$ acts on $\Omega^n$ as $-n\id$, \prref{phtm} tells us that, considered as an $H(\dd,\chi,\om)$-module, $\Omega^n({\mathfrak{d}})$ is isomorphic to the tensor module $\T(\kk_{-n\chi/2},\Omega^n)$. Then its quotient $\Omega^{n}({\mathfrak{d}}) / I^{n}({\mathfrak{d}})$ and submodule $J^n({\mathfrak{d}})$ are also tensor $H(\dd,\chi,\om)$-modules, because $\Omega^{n}({\mathfrak{d}}) / I^{n}({\mathfrak{d}}) = H \tp (\Omega^n/I^n)$ and $J^n({\mathfrak{d}}) = H \tp J^n$. {}From \eqref{injn3}, we obtain isomorphisms of $H(\dd,\chi,\om)$-modules: \begin{align}\label{injn4} \Omega^{n}({\mathfrak{d}}) / I^{n}({\mathfrak{d}}) &\simeq \T(\kk_{-n\chi/2},R(\pi_n)) \,, \\ \label{injn4j} J^{2N-n}({\mathfrak{d}}) &\simeq \T(\kk_{-(2N-n)\chi/2},R(\pi_n)) \,, \qquad 0\leq n \leq N \,. \end{align} Furthermore, the differential ${\mathrm{d}}$ in \eqref{domd} is a homomorphism of $\Wd$-modules. Hence, ${\mathrm{d}}$ in \eqref{domd6} is a homomorphism of $H(\dd,\chi,\om)$-modules. We will prove in the next subsection that $\di^{\mathrm{R}}$ is a homomorphism too, and will generalize all these results to the case $\chi\ne0$. \subsection{Twisted conformally symplectic pseudo de Rham complex}\label{sdrmh} Now let us consider the general case, i.e., $\chi$ is not necessarily $0$. When $\chi\ne0$, the maps ${\mathrm{d}}$ and $\Psi$ no longer commute. Accordingly, we will modify the definition of $\Psi$ using the twisting functors from \seref{stwrep}. Fix a finite-dimensional ${\mathfrak{d}}$-module $\Pi$. Applying the twisting functor $T_\Pi$ to the pseudo de Rham complex \eqref{domd}, we obtain the exact complex \begin{equation}\label{domd7} 0 \to \Omega^0_\Pi({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}_\Pi} \Omega^1_\Pi({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}_\Pi} \cdots \xrightarrow{{\mathrm{d}}_\Pi} \Omega^{2N}_\Pi({\mathfrak{d}}) \,, \end{equation} where \begin{equation}\label{dipi} {\mathrm{d}}_\Pi = T_\Pi({\mathrm{d}}) \,, \qquad \Omega^n_\Pi({\mathfrak{d}}) = T_\Pi(\Omega^n({\mathfrak{d}})) = H\tp\Pi\tp\Omega^n \,. \end{equation} As before, $H$ acts on $\Omega^n_\Pi({\mathfrak{d}})$ by left multiplication on the first factor. As a $\Wd$-module, $\Omega^n_\Pi({\mathfrak{d}})=\T(\Pi,\Omega^n)$ is a tensor module. Recall that $\kk_\chi = \kk\,1_\chi$ where $\partial\cdot 1_\chi = \chi(\partial)1_\chi$ for $\partial\in{\mathfrak{d}}$, and $\Pi_\chi$ denotes the ${\mathfrak{d}}$-module $\Pi \otimes \kk_\chi$. We introduce $H$-linear maps \begin{equation}\label{psichi} \Psi_\chi\colon \Omega^n_\Pi({\mathfrak{d}}) \to \Omega^{n+2}_{\Pi_\chi}({\mathfrak{d}}) \,, \qquad h\tp u\tp\al \mapsto h\tp u\tp 1_\chi \tp (\omega\wedge\al) \,, \end{equation} where $h\in H$, $u\in\Pi$, $\al\in\Omega^n$. We claim that these maps are compatible with the differentials. \begin{lemma}\label{ldomd3} With the above notation \eqref{psichi}, we have\/ $\Psi_\chi {\mathrm{d}}_\Pi = {\mathrm{d}}_{\Pi_\chi} \Psi_\chi$. \end{lemma} \begin{proof} By $H$-linearity, it is enough to show that both sides of the desired identity are equal when applied to $1\tp u\tp\al\in\Omega^n_\Pi({\mathfrak{d}})$ for $u\in\Pi$, $\al\in\Omega^n$. Furthermore, we will assume that $\al=\iota_{\partial_i} \beta$ for some $\beta\in\Omega^{n+1}$ and $1\le i\le 2N$, as such elements span $\Omega^n$. Note that, by \cite[Lemma 5.1]{BDK1}, \begin{equation}\label{dipi2} {\mathrm{d}}\al \in \sum_{k=1}^{2N} \partial_k \tp (e^k_i \cdot\beta) + \kk\tp\Omega^{n+1} \subset \Omega^{n+1}({\mathfrak{d}}) \,. \end{equation} Then from the definition \eqref{twrep8} of $T_\Pi$, we obtain \begin{equation* {\mathrm{d}}_\Pi (1\tp u\tp\al) = \sigma_{12} (u\tp{\mathrm{d}}\al) - \sum_{k=1}^{2N} 1\tp (\partial_k\cdot u) \tp (e^k_i \cdot\beta) \,, \end{equation*} where $\sigma_{12}\colon \Pi\tp H\tp\Omega^n \to H\tp\Pi\tp\Omega^n$ is the transposition of the first two factors. (This equation can also be derived from \cite[Lemma 5.3]{BDK1}.) Hence, \begin{align*} \Psi_\chi{\mathrm{d}}_\Pi &(1\tp u\tp\al) \\ &= \sigma_{12} \bigl( (u\tp 1_\chi) \tp (\omega\wedge{\mathrm{d}}\al) \bigr) - \sum_{k=1}^{2N} 1\tp (\partial_k\cdot u) \tp 1_\chi \tp \bigl(\omega\wedge(e^k_i \cdot\beta)\bigr) \,, \end{align*} where now $\sigma_{12}\colon \Pi_\chi \tp H\tp\Omega^n \to H\tp \Pi_\chi\tp\Omega^n$. On the other hand, \begin{equation*} \Psi_\chi(1\tp u\tp\al) = 1\tp u\tp 1_\chi \tp (\omega\wedge\al) \,, \end{equation*} and by \eqref{omchi4}, \eqref{dider}, we have \begin{equation}\label{dipi3} {\mathrm{d}}(\omega\wedge\al) = \di_0\omega\wedge\al + \omega\wedge{\mathrm{d}}\al = -\chi\wedge\omega\wedge\al + \omega\wedge{\mathrm{d}}\al \,. \end{equation} This and \eqref{dipi2} imply \begin{equation*} {\mathrm{d}}(\omega\wedge\al) \in \sum_{k=1}^{2N} \partial_k \tp (\omega\wedge e^k_i \cdot\beta) + \kk\tp\Omega^{n+3} \subset \Omega^{n+3}({\mathfrak{d}}) \,. \end{equation*} Using again \eqref{twrep8} and \eqref{dipi3}, we get \begin{align*} {\mathrm{d}}_{\Pi_\chi} &(1\tp u\tp 1_\chi \tp (\omega\wedge\al)) \\ &= \sigma_{12} \bigl( (u\tp 1_\chi) \tp {\mathrm{d}}(\omega\wedge\al) \bigr) - \sum_{k=1}^{2N} 1\tp \partial_k\cdot(u\tp 1_\chi) \tp \bigl(\omega\wedge(e^k_i \cdot\beta)\bigr) \\ &= \sigma_{12} \bigl( (u\tp 1_\chi) \tp (\omega\wedge{\mathrm{d}}\al) \bigr) - \sum_{k=1}^{2N} 1\tp (\partial_k\cdot u) \tp 1_\chi \tp \bigl(\omega\wedge(e^k_i \cdot\beta)\bigr) \\ &- \sigma_{12} \bigl( (u\tp 1_\chi) \tp (\chi\wedge\omega\wedge\al) \bigr) - \sum_{k=1}^{2N} 1\tp u \tp (\partial_k\cdot 1_\chi) \tp \bigl(\omega\wedge(e^k_i \cdot\beta)\bigr) \,. \end{align*} In order to finish the proof of the lemma, we need to show that the last two terms in the right-hand side cancel. In other words, we claim that \begin{equation*} \sum_{k=1}^{2N} \chi(\partial_k) e^k_i \cdot\beta = -\chi\wedge (\iota_{\partial_i} \beta) \,, \qquad \beta\in\Omega^{n+1} \,. \end{equation*} Indeed, evaluating either side on $\partial_{j_1} \wedge\cdots\wedge \partial_{j_{n+1}}$ gives \begin{equation*} \sum_{t=1}^{n+1} (-1)^t \chi(\partial_{j_t}) \, \beta(\partial_i \wedge \partial_{j_1} \wedge\cdots\wedge \widehat{\partial_{j_t}} \wedge\cdots\wedge \partial_{j_{n+1}}) \,, \end{equation*} by using \eqref{wedge}, \eqref{ioal} and \eqref{acdotal}. \end{proof} \begin{lemma}\label{ldomd4} The maps\/ $\Psi_\chi\colon \Omega^n_\Pi({\mathfrak{d}}) \to \Omega^{n+2}_{\Pi_\chi}({\mathfrak{d}})$, defined by \eqref{psichi}, are homomorphisms of\/ $H(\dd,\chi,\om)$-modules. \end{lemma} \begin{proof} By $H$-linearity, it is enough to show that $\Psi_\chi$ commutes with the action of $e$ on $1\tp u\tp\al$, where $u\in\Pi$, $\al\in\Omega^n$ and $e\inH(\dd,\chi,\om)\subset\Wd$ is the generator \eqref{iota}. Since $\Omega^n_\Pi({\mathfrak{d}})=\T(\Pi,\Omega^n)=\T(V_0)$ is a tensor $\Wd$-module, the action of $e$ on it is given by \eqref{eee2} for $v=u\tp\al \in V_0 = \Pi\boxtimes\Omega^n$. We have: \begin{equation*} I\cdot\al=-n\al \,, \qquad I\cdot(\omega\wedge\al)=-(n+2)(\omega\wedge\al) \,, \qquad \al\in\Omega^n \,, \end{equation*} \begin{equation*} \partial\cdot(u\tp 1_\chi) = (\partial\cdot u) \tp 1_\chi +\chi(\partial) u\tp 1_\chi \,, \qquad \partial\in{\mathfrak{d}} \,, \;\; u\in\Pi \,, \end{equation*} and, by \eqref{acder}, \begin{equation*} A\cdot(\omega\wedge\al) = (A\cdot\omega) \wedge\al + \omega\wedge(A\cdot\al) = \omega\wedge(A\cdot\al) \,, \qquad A\in\sp\,\dd \,. \end{equation*} Plugging these into \eqref{eee2}, we get: \begin{align*} e* \bigl(& \Psi_\chi(1\tp u\tp\al)\bigr) -\bigl( (\id\tp\id)\tp_H \Psi_\chi \bigr) \bigl(e*(1\tp u\tp\al)\bigr) \\ &= e* \bigl( 1\tp u\tp 1_\chi \tp (\omega\wedge\al) \bigr) -\bigl( (\id\tp\id)\tp_H \Psi_\chi \bigr) \bigl(e*(1\tp u\tp\al)\bigr) \\ &=-\sum_{k=1}^{2N} (\bar{\partial}_k \tp 1) \otimes_H \Bigl( \chi(\partial^k) + \frac12 \chi(\partial^k) (-2) \Bigr) \bigl(1\tp u\tp 1_\chi \tp (\omega\wedge\al)\bigr) \\ & = 0\,. \end{align*} Therefore, $\Psi_\chi$ is an $H(\dd,\chi,\om)$-module homomorphism. \end{proof} Notice that the kernel of $\Psi_\chi\colon \Omega^n_\Pi({\mathfrak{d}}) \to \Omega^{n+2}_{\Pi_\chi}({\mathfrak{d}})$ is \begin{equation}\label{jnpi} J^n_\Pi({\mathfrak{d}}) = T_\Pi(J^n({\mathfrak{d}})) = H\tp\Pi\tp J^n \subset \Omega^n_\Pi({\mathfrak{d}}) \,, \end{equation} and the image of $\Psi_{-\chi}\colon \Omega^{n-2}_{\Pi_\chi}({\mathfrak{d}}) \to \Omega^{n}_\Pi({\mathfrak{d}})$ is \begin{equation}\label{inpi} I^n_\Pi({\mathfrak{d}}) = T_\Pi(I^n({\mathfrak{d}})) = H\tp\Pi\tp I^n \subset \Omega^n_\Pi({\mathfrak{d}}) \,. \end{equation} As a consequence of Lemmas \ref{ldomd3} and \ref{ldomd4}, we obtain complexes of $H(\dd,\chi,\om)$-modules \begin{align} \label{domdpi1} 0 \to \Omega^0_\Pi({\mathfrak{d}}) / I^0_\Pi({\mathfrak{d}}) &\xrightarrow{{\mathrm{d}}_\Pi} \Omega^1({\mathfrak{d}}_\Pi) / I^1_\Pi({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}_\Pi} \cdots \xrightarrow{{\mathrm{d}}_\Pi} \Omega^{N}_\Pi({\mathfrak{d}}) / I^{N}_\Pi({\mathfrak{d}}) \intertext{and} \label{domdpi2} J^{N}_\Pi({\mathfrak{d}}) &\xrightarrow{{\mathrm{d}}_\Pi} J^{N+1}_\Pi({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}_\Pi} \cdots \xrightarrow{{\mathrm{d}}_\Pi} J^{2N}_\Pi({\mathfrak{d}}) \,. \end{align} Note that \eqref{domdpi1} and \eqref{domdpi2} are obtained from the complexes of $H(\dd,\chi,\om)$-modules \eqref{domd1} and \eqref{domd2} by applying the twisting functor $T_\Pi$. Due to \eqref{injn4} and \eqref{injn4j}, these are tensor modules: \begin{align}\label{injn5} \Omega^{n}_\Pi({\mathfrak{d}}) / I^{n}_\Pi({\mathfrak{d}}) &\simeq \T(\Pi_{-n\chi/2},R(\pi_n)) \,, \\ \label{injn5j} J^{2N-n}_\Pi({\mathfrak{d}}) &\simeq \T(\Pi_{-(2N-n)\chi/2},R(\pi_n)) \,, \qquad 0\leq n \leq N \,. \end{align} In the next lemma, we construct a twisted analog of Rumin's map $\di^{\mathrm{R}}$. \begin{lemma}\label{ldomd5} There is a well-defined\/ $H(\dd,\chi,\om)$-module homomorphism \begin{equation*} \di^{\mathrm{R}}_\Pi\colon \Omega^{N}_\Pi({\mathfrak{d}}) / I^{N}_\Pi({\mathfrak{d}}) \to J^{N}_{\Pi_{-\chi}}({\mathfrak{d}}) \,, \end{equation*} such that\/ $\di^{\mathrm{R}}_\Pi \, {\mathrm{d}}_\Pi = 0$ and\/ ${\mathrm{d}}_{\Pi_{-\chi}} \, \di^{\mathrm{R}}_\Pi = 0$. \end{lemma} \begin{proof} Pick any $\al\in\Omega^{N}_\Pi({\mathfrak{d}})$. Since $\Psi$ gives an isomorphism $\Omega^{N-1} \simeq \Omega^{N+1}$, we can write ${\mathrm{d}}_\Pi\al = \Psi_\chi\beta$ for a unique $\beta\in\Omega^{N-1}_{\Pi_{-\chi}}({\mathfrak{d}})$. By \leref{ldomd3}, we have \begin{equation*} 0 = ({\mathrm{d}}_\Pi)^2 \al = {\mathrm{d}}_\Pi \Psi_\chi \beta = \Psi_\chi {\mathrm{d}}_{\Pi_{-\chi}} \beta \,, \end{equation*} which means that $\di^{\mathrm{R}}_\Pi\al := {\mathrm{d}}_{\Pi_{-\chi}} \beta \in J^{N}_{\Pi_{-\chi}}({\mathfrak{d}})$. To show that $\di^{\mathrm{R}}_\Pi$ is well defined, we need to check that $\di^{\mathrm{R}}_\Pi\al=0$ when $\al\in I^{N}_\Pi({\mathfrak{d}})$. Indeed, if $\al=\Psi_\chi\gamma$ for some $\gamma\in\Omega^{N-2}_{\Pi_{-\chi}}({\mathfrak{d}})$, then \begin{equation*} {\mathrm{d}}_\Pi \al = {\mathrm{d}}_\Pi \Psi_\chi \gamma = \Psi_\chi {\mathrm{d}}_{\Pi_{-\chi}} \gamma \,. \end{equation*} Hence, we can take $\beta={\mathrm{d}}_{\Pi_{-\chi}} \gamma$, and we get $\di^{\mathrm{R}}_\Pi\al = {\mathrm{d}}_{\Pi_{-\chi}} \beta=0$. The map $\di^{\mathrm{R}}_\Pi$ is a homomorphism of $H(\dd,\chi,\om)$-modules, because it is a composition of homomorphisms: \begin{equation}\label{dirupi} \di^{\mathrm{R}}_\Pi = {\mathrm{d}}_{\Pi_{-\chi}} \bigl( \Psi_\chi \big|_{\Omega^{N-1}_{\Pi_{-\chi}}({\mathfrak{d}})} \bigr)^{-1} {\mathrm{d}}_\Pi \,. \end{equation} Finally, the identities $\di^{\mathrm{R}}_\Pi \, {\mathrm{d}}_\Pi = 0$ and ${\mathrm{d}}_{\Pi_{-\chi}} \, \di^{\mathrm{R}}_\Pi = 0$ are obvious. \end{proof} Using \leref{ldomd5}, we can connect the complexes \eqref{domdpi1} and \eqref{domdpi2} to obtain the \emph{twisted conformally symplectic pseudo de Rham complex}: \begin{equation}\label{domd8} \begin{split} 0 &\to \Omega^0_\Pi({\mathfrak{d}}) / I^0_\Pi({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}^1_\Pi} \Omega^1({\mathfrak{d}}_\Pi) / I^1_\Pi({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}^2_\Pi} \cdots \xrightarrow{{\mathrm{d}}^N_\Pi} \Omega^{N}_\Pi({\mathfrak{d}}) / I^{N}_\Pi({\mathfrak{d}}) \\ &\xrightarrow{\di^{\mathrm{R}}_\Pi} J^{N}_{\Pi_{-\chi}}({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}^{N+1}_{\Pi_{-\chi}}} J^{N+1}_{\Pi_{-\chi}}({\mathfrak{d}}) \xrightarrow{{\mathrm{d}}^{N+2}_{\Pi_{-\chi}}} \cdots \xrightarrow{{\mathrm{d}}^{2N}_{\Pi_{-\chi}}} J^{2N}_{\Pi_{-\chi}}({\mathfrak{d}}) \,, \end{split} \end{equation} where we decorated the differentials with superscripts that will turn out to be convenient later. \begin{lemma}\label{ldomd6} The twisted conformally symplectic pseudo de Rham complex \eqref{domd8} is exact at all terms except for\/ $J^{2N-1}_{\Pi_{-\chi}}({\mathfrak{d}})$ and\/ $J^{2N}_{\Pi_{-\chi}}({\mathfrak{d}})$. \end{lemma} \begin{proof} Recall that the twisting functor $T_\Pi$ preserves exactness. Hence, the complexes \eqref{domd7} and \eqref{domdpi1} are exact, while \eqref{domdpi2} is exact at all terms except the last two (cf.\ \leref{ldomd2}). The rest of the proof is the same as in \prref{pdomd5}. \end{proof} We summarize the above results in the following theorem. \begin{theorem}\label{tmodhd} For every finite-dimensional\/ ${\mathfrak{d}}$-module\/ $\Pi$, we have a complex of tensor $H(\dd,\chi,\om)$-modules \begin{equation}\label{domd9} \begin{split} 0 &\to \T(\Pi,R(\pi_0)) \xrightarrow{{\mathrm{d}}^1_\Pi} \T(\Pi_{-\chi/2},R(\pi_1)) \xrightarrow{{\mathrm{d}}^2_\Pi} \cdots \xrightarrow{{\mathrm{d}}^N_\Pi} \T(\Pi_{-N\chi/2},R(\pi_N)) \\ &\xrightarrow{\di^{\mathrm{R}}_\Pi} \T(\Pi_{-(N+2)\chi/2},R(\pi_N)) \xrightarrow{{\mathrm{d}}^{N+1}_{\Pi_{-\chi}}} \T(\Pi_{-(N+3)\chi/2},R(\pi_{N-1})) \\ &\xrightarrow{{\mathrm{d}}^{N+2}_{\Pi_{-\chi}}} \cdots \xrightarrow{{\mathrm{d}}^{2N}_{\Pi_{-\chi}}} \T(\Pi_{-(2N+2)\chi/2},R(\pi_0)) \to 0 \,, \end{split} \end{equation} where\/ $\di^{\mathrm{R}}_\Pi$ is given by \eqref{dirupi}. The complex \eqref{domd9} is exact at all terms except for the last two, and its cohomology is finite dimensional. \end{theorem} \begin{proof} The only remaining statement is the finite-dimensionality of the cohomology. This follows from the fact that the cohomology of the complex \eqref{domd2} is finite dimensional and the twisting functor $T_\Pi$ preserves this property (see \seref{stwrep}). \end{proof} \section{Singular vectors and tensor modules}\label{skten} \begin{comment} \subsection{Conformal representations of $\widetilde{{\mathcal{P}}}$ *** possible modified version *** Due to \prref{preplal2}, any $H(\dd,\chi,\om)$-module has a natural structure of a conformal $\widetilde {\mathcal{P}}$-module, and vice versa. If $V$ is an irreducible non-trivial $H(\dd,\chi,\om)$-module, then each element $v \in V$ lies in some $\ker_p V$, as from \leref{lkey2}, which is finite-dimensional and stabilized by the action of $\mathcal{N}_{\mathcal{P}}$. The following lemma shows that even though the annihilation algebra of a Lie pseudoalgebra of type $H$ is (isomorphic to) a non-trivial central extension of $H_{2N}$, we may ignore in most cases the central element when dealing with its irreducible representations. \begin{lemma}\label{irredfactor} If either $\chi \neq 0$ or $\chi = 0$ but $\omega$ is not a $2$-coboundary, then the central element\/ $\ce\in{\mathcal{P}}$ acts trivially on every finite dimensional irreducible conformal representation of\/ $\mathcal{N}_{\mathcal{P}}$. \end{lemma} \begin{proof} First of all, every finite-dimensional conformal representation of $\mathcal{N}_{\mathcal{P}}$ factors through some finite-dimensional quotient $\mathcal{N}_{\mathcal{P}}/{\mathcal{P}}_m$. The element $\ce$ spans an abelian ideal of $\mathcal{N}_{\mathcal{P}}$ and is contained in its derived algebra. Indeed, if $\chi \neq 0$, then $[\widehat \partial, \ce] = \chi(\partial) \ce$ is nonzero for some $\partial \in {\mathfrak{d}}$; if instead $\chi = 0$ but $\omega$ is not a $2$-coboundary, then the corresponding central extension of ${\mathfrak{d}}$ is irreducible, hence $\ce$ is a commutator. In the above cases, $\ce$ projects to the radical of $\mathcal{N}_{\mathcal{P}}/{\mathcal{P}}_m$ and is contained in its derived Lie algebra. As a consequence, it acts as zero on each finite-dimensional irreducible representation. \end{proof} \begin{remark}\label{onlyH} As $\ce$ spans an ideal of $\widetilde {\mathcal{P}}$, elements that are killed by its action in a $\widetilde {\mathcal{P}}$-module constitute a $\widetilde {\mathcal{P}}$-submodule. When dealing with irreducible representations of $\widetilde {\mathcal{P}}$ where $\ce$ kills some nonzero vector, we may hence -- and will -- only focus on (possibly reducible) $H(\dd,\chi,\om)$-modules for which the natural $\widetilde {\mathcal{P}}$-action factors via $\widetilde {\mathcal{H}}$. \end{remark} \subsection{Conformal representations with a nontrivial action of the central element in $\widetilde{{\mathcal{P}}}$ *** possible modified version ***} Our strategy towards classifying irreducible representations of $H(\dd,\chi,\om)$, i.e., irreducible conformal representations of $\tilde {\mathcal{P}}$, is the same as in our previous papers treating the $W, S, K$ types: first show that each irreducible module arises as a quotient of a representation from a special class of modules, called tensor modules, that can be uniformly and easily described; then investigate the lattice of submodules of each tensor module, classifying their maximal submodules, hence their irreducible quotients. For primitive Lie pseudoalgebras of type $S, K$, we have built tensor modules by restricting $\Wd$-tensor modules to subalgebras $S(\dd,\chi), K(\dd,\th)\subset \Wd$; we have proceeded similarly in \seref{subtres} for the subalgebra $H(\dd,\chi,\om) \subset \Wd$. However, an essential difference needs to be highlighted: the (unique) embedding $\iota: H(\dd,\chi,\om) \hookrightarrow \Wd$ induces a non-injective homomorphism $\iota_*: {\mathcal{P}} \to {\mathcal{W}}$ of annihilation algebras so that restricting tensor modules for $\Wd$ to the subalgebra $H(\dd,\chi,\om)$, will only yield $H(\dd,\chi,\om)$-modules for which the action of $\ce \in \widetilde {\mathcal{P}}$ is trivial. When dealing with irreducible representations of $H(\dd,\chi,\om)$, we have seen above that this is always the case unless $\chi = 0$ and $\omega$ is a $2$-coboundary. Yet, there may be issues in the most general case, that require some extra work. Throughout the rest of this section, $\chi = 0$ and $\omega = {\mathrm{d}}_0 {\zeta}$ is a $2$-coboundary. Let ${\mathfrak{d}}^{\mathrm{ext}} = {\mathfrak{d}} + \kk c$ be the central extension of ${\mathfrak{d}}$ induced by $\omega$; then ${\mathfrak{d}}^{\mathrm{ext}}$ can be split into the direct sum ${\mathfrak{d}}^{\mathrm{ext}} = {\mathfrak{d}}^\gamma \oplus \kk c$, where ${\mathfrak{d}}^\gamma = \{\partial + \gamma(\partial), \partial \in {\mathfrak{d}}\}$ is a Lie subalgebra isomorphic to ${\mathfrak{d}}$. Set $H' = \ue({\mathfrak{d}}^{\mathrm{ext}}), X' = (H')^*$, whereas $H = \ue({\mathfrak{d}}), X = H^*$ as usual. The natural projection $\pi: {\mathfrak{d}}^{\mathrm{ext}} \to {\mathfrak{d}}^{\mathrm{ext}}/\kk c \simeq {\mathfrak{d}}$ induces corresponding morphisms $\pi_* : H' \to H$, $\pi^*: X \to X'$, thus realizing $X$ as a subalgebra $\pi^*(X) \subset X'$. Recall that the (unique) embedding of $H(\dd,\chi,\om) = He$ in $\Wd$ is given by $e \mapsto -r$. Set $e' = -r + 1\otimes c \in W({\mathfrak{d}}^{\mathrm{ext}})$. Then $H'e' \subset W({\mathfrak{d}}^{\mathrm{ext}})$ is a Lie pseudoalgebra isomorphic to $K({\mathfrak{d}}^{\mathrm{ext}}, \theta)$, where $\theta = \pi^* \gamma$ is a $1$-form on ${\mathfrak{d}}^{\mathrm{ext}}$ and the inclusion of $K({\mathfrak{d}}^{\mathrm{ext}}, \theta)$ in $W({\mathfrak{d}}^{\mathrm{ext}})$ induces an injective homomorphism of annihilation algebras. The key observation is that ${\mathcal{P}} \ni x \otimes_H e \mapsto \pi^*(x) \otimes_{H'} e'\in {\mathcal{K}}$ is a Lie algebra isomorphism. This fits with the description given in \cite{BDK} of the Lie bracket in $K_{2n+1}$ in terms of an odd-Poisson bracket on $X' \simeq \mathcal{O}_{2n+1}$. In order to construct tensor modules with a nontrivial action of the central element in ${\mathcal{P}}$, one may then take a tensor module of $W({\mathfrak{d}}^{\mathrm{ext}})$, restrict it to $K({\mathfrak{d}}^{\mathrm{ext}}, \theta)$, and then restrict the action of the corresponding annihilation algebra ${\mathcal{K}}$ to the subalgebra ${\mathcal{P}} \simeq \pi^*(X) \otimes_{H'} e'\subset {\mathcal{K}}$. Notice now that $c.\pi^*(X) = 0$, so that all Fourier coefficients of the element $ce'$ vanish. Similarly, the restriction of the $W({\mathfrak{d}}^{\mathrm{ext}})$-tensor module is an $H'$-module, but the action of $c \in {\mathfrak{d}}^{\mathrm{ext}}$ is via scalar multiplication by some $\lambda \in \kk$, so that the $H'$-action factors through $H'/(c-\lambda) \simeq H^\gamma \otimes \kk[c]/(c-\lambda) \simeq H^\gamma \simeq H$. It is now not difficult to see that the action of $H'e'/ce' \simeq He$ on the restricted $H'/(c-\lambda) \simeq H$-module is a pseudoaction of the Lie pseudoalgebra $H(\dd,0,\om)$. The net result of the above construction, however, is just to add a nontrivial scalar action to a preexisting pseudoaction of $H(\dd,\chi,\om)$ on a $\Wd$-tensor module, whereas all algebraic aspects, such as irreducibility, singular vectors, connecting differentials among modules in the de Rham complex etc., are left unchanged. As irreducible representations of $\widetilde {\mathcal{P}}$ are the main object of our investigation, for the sake of simplicity we may -- and will -- only focus on $H(\dd,\chi,\om)$-modules for which the natural $\widetilde {\mathcal{P}}$-action factors through $\widetilde {\mathcal{H}}$. \begin{proposition}\label{pnhconformal} The subalgebra\/ ${\mathcal{H}}_1 \subset \mathcal{N}_{\mathcal{H}}$ acts trivially on every irreducible finite-dimensional conformal\/ $\mathcal{N}_{\mathcal{H}}$-module. Irreducible finite-dimensional conformal\/ $\mathcal{N}_{\mathcal{H}}$-modules are in one-to-one correspondence with irreducible finite-dimensional modules over the Lie algebra\/ $\mathcal{N}_{\mathcal{H}}/{\mathcal{H}}_1 = \widehat {\mathfrak{d}} + {\mathcal{H}}_0/{\mathcal{H}}_1 \simeq {\mathfrak{d}} \oplus \sp\,\dd$. \end{proposition} \begin{proof} Similar to the proof of \cite[Proposition 3.4]{BDK1}. \end{proof} \end{comment} \subsection{Conformal representations of $\widetilde{{\mathcal{P}}}$}\label{confrep} Due to \prref{preplal2}, any $H(\dd,\chi,\om)$-module has a natural structure of a conformal $\widetilde {\mathcal{P}}$-module, and vice versa. If $V$ is an irreducible non-trivial $H(\dd,\chi,\om)$-module, then each element $v \in V$ lies in some $\ker_p V$, as from \leref{lkey2}, which is finite-dimensional and stabilized by the action of $\mathcal{N}_{\mathcal{P}}$. As usual, one has \begin{proposition}\label{pnhconformal} The subalgebra\/ ${\mathcal{P}}_1 \subset \mathcal{N}_{\mathcal{P}}$ acts trivially on every irreducible finite-dimensional conformal\/ $\mathcal{N}_{\mathcal{P}}$-module. Irreducible finite-dimensional conformal\/ $\mathcal{N}_{\mathcal{P}}$-modules are in one-to-one correspondence with irreducible finite-dimensional modules over the Lie algebra\/ $\mathcal{N}_{\mathcal{P}} / {\mathcal{P}}_1 = (\iota_*^{-1}(\widehat {\mathfrak{d}}) \sd {\mathcal{P}}_0)/{\mathcal{P}}_1 \simeq {\mathfrak{d}}'\oplus\sp\,\dd$. \end{proposition} \begin{proof} Similar to the proof of \cite[Proposition 3.4]{BDK1}. \end{proof} \subsection{Singular vectors} \begin{definition}\label{dhsing} A {\em singular vector\/} in $V$ is an element $v\in V$ such that ${\mathcal{P}}_1\cdot v = 0$. The space of singular vectors in $V$ will be denoted by $\sing V$, and is stabilized by the action of $\mathcal{N}_{\mathcal{P}}$, as it normalizes ${\mathcal{P}}_1$. Then $$\rho_{\sing} \colon {\mathfrak{d}}'\oplus\csp\,\dd \to {\mathfrak{gl}}(\sing V)$$ will indicate the representation obtained from the $\mathcal{N}_{\mathcal{P}}$-action on $\sing V\equiv\ker_1 V$ via the isomorphism $\mathcal{N}_{\mathcal{P}} / {\mathcal{P}}_1 \simeq {\mathfrak{d}}'\oplus\sp\,\dd$, so that \begin{equation}\label{rhosing} \rho_{\sing}(f^{ij}) v = \frac{1}{2}(x^i x^j \tp_H e)v\,, \qquad v\in \sing V \,, \end{equation} whereas ${\mathfrak{d}}'$ is generated over $\kk$ by elements $\widehat \partial, \partial \in {\mathfrak{d}},$ and $c:= \ce$ as in the proof of \leref{ldprime}. \end{definition} A vector $v\in V$ is singular if and only if \begin{equation}\label{vsingf1} e*v \in (\fil^2 H \tp \kk) \tp_H V \,, \end{equation} or equivalently \begin{equation}\label{vsingf2} e*v \in (\kk \tp \fil^2 H) \tp_H V \,. \end{equation} \begin{proposition}\label{phsing1} Let $V$ be a finite non-zero $H(\dd,\chi,\om)$-module. Then the vector space $\sing V$ is non-zero and the space $\sing V/\ker V$ is finite dimensional. \end{proposition} \begin{proof} Finite dimensionality of $\ker_n V/\ker V$ for all $n$ was stated in \leref{lkey2} above. In order to prove the other claim, we may assume without loss of generality that $\ker V = \{0\}$. As the ${\mathcal{P}}$-module $V$ is conformal, then $\ker_n V$ is non-zero for some $n\geq 0$. Note that $\ker_n V$ is killed by ${\mathcal{P}}_n$, so it is preserved by its normalizer $\mathcal{N}_{\mathcal{P}}$. Choose now an irreducible $\mathcal{N}_{\mathcal{P}}$-submodule $U \subset \ker_n V$. As $U$ is finite dimensional, \prref{pnhconformal} shows that the action of ${\mathcal{P}}_1$ on $U$ is trivial, so that $U \subset \sing V$. \end{proof} \begin{lemma}\label{singtosing} Let\/ $f\colon M \to N$ be a homomorphism of\/ $H(\dd,\chi,\om)$-modules. Then\/ $f(\sing M) \subset \sing N$. \end{lemma} \begin{proof} The proof is obvious, since $f$ commutes with the action of ${\mathcal{P}}_1$. \end{proof} \begin{lemma} Let\/ $f\colon M \to N$ be a homomorphism of\/ $H(\dd,\chi,\om)$-modules. If\/ $U \subset \sing M$ is an irreducible\/ ${\mathfrak{d}}' \oplus \sp\,\dd$-submodule, then either\/ $U \subset \ker f$ or $f|_U$ is an isomorphism. \end{lemma} \begin{proof} Follows from Schur's Lemma and the fact that $f|_U$ is a homomorphism of $\mathcal{N}_{\mathcal{P}}/{\mathcal{P}}_1$-modules. \end{proof} \begin{remark} The above lemma applies whenever $M$ is a tensor module, as such modules are generated in degree zero. See Section \ref{filtrationtm} below for the definition of the degree. \end{remark} We would like to give a description of the pseudoaction of $H(\dd,\chi,\om)$ on singular vectors in terms of $\rho_{\sing}$. However, when using \prref{preplal2}, it is better to express \eqref{prpl2} in terms of Fourier coefficients of the form $(x^i e^{-\chi}) \otimes_H e$. In order to do so, we need the following result. \begin{proposition}\label{phsing} If $v\in \sing V$, then the action of\/ $H(\dd,\chi,\om)$ on $v$ is given by \begin{equation}\label{Hactionsing} \begin{split} e * v = \sum_{i,j=1}^{2N} & \, (\bar\partial_i \bar\partial_j \tp 1) \tp_H \rho_{\sing}(f^{ij})v\\ - \sum_{k=1}^{2N} & \, (\bar\partial_k \tp 1) \tp_H \bigl(\rho_{\sing} (\partial^k + \ad^{\mathfrak{sp}} \partial^k) v - \partial^k v\bigr)\\ + \quad\,\,\,\, & \,(1 \tp 1) \tp_H \rho_{\sing} (c)v. \end{split} \end{equation}\end{proposition} \begin{proof} As ${\mathcal{P}}_1$ acts trivially on singular vectors, \reref{pseudoactioncheck} shows that the action of $e$ on a singular vector $v$ is given by the following expression \begin{equation* \begin{split} e * v = \sum_{1 \leq i<j \leq 2N} & (\overline{S(\partial_i \partial_j)} \tp 1) \tp_H (x^i x^j e^{-\chi} \tp_H e).v\\ + \sum_{i=1}^{2N} \quad\,\, & (\overline{S(\partial_i^2)} \tp 1) \tp_H \left(\frac{1}{2}(x^i)^2 e^{-\chi} \tp_H e\right).v\\ + \sum_{k=1}^{2N} \quad\,\, & (\overline{S(\partial_k)} \tp 1) \tp_H (x^k e^{-\chi} \tp_H e).v\\ + \qquad \quad & (\overline{S(1)} \otimes 1) \tp_H (e^{-\chi} \tp_H e).v. \end{split} \end{equation*} This rewrites as \begin{equation* \begin{split} e * v = \sum_{1\leq i<j\leq 2N} & ({\bar\partial}_j \bar\partial_i \tp 1) \tp_H (x^i x^j \tp_H e).v\\ + \sum_{i=1}^{2N} \quad\,\, & (\bar \partial_i^2 \tp 1) \tp_H \left(\frac{1}{2}(x^i)^2 \tp_H e\right).v\\ - \sum_{k=1}^{2N} \quad\,\, & (\bar\partial_k \tp 1) \tp_H (x^k e^{-\chi} \tp_H e).v\\ + \qquad \quad & (1 \tp 1) \tp_H (e^{-\chi} \tp_H e).v\,, \end{split} \end{equation*} where we used that $x^i x^j e^{-\chi}$ coincides with $x^i x^j$ up to higher degree terms. We may use \leref{ldtilde} to express the third summand on the right-hand side as \begin{equation* \begin{split} & \sum_{k=1}^{2N} \, (\bar\partial_k \tp 1) \tp_H (x^k e^{-\chi} \tp_H e).v \\ =& \sum_{k=1}^{2N} \, (\bar\partial_k \tp 1) \tp_H \Bigl(\rho_{\sing}(\partial^k + \ad^{\mathfrak{sp}} \partial^k)v - \partial^k v - \sum_{1\leq i<j\leq 2N} c_{ij}^k \rho_{\sing}(f^{ij}) v\Bigr) \end{split} \end{equation*} Now we rewrite the first summand in the right-hand side using \eqref{rhosing} and the fact that $2\bar \partial_j \bar \partial_i = (\bar \partial_i \bar \partial_j + \bar \partial_j \bar \partial_i) - [\bar \partial_i, \bar \partial_j]$. Then the first two summands together yield \begin{equation* \sum_{i,j=1}^{2N} (\bar\partial_i\bar\partial_j \tp 1) \tp_H (\rho_{\sing}(f^{ij})v) - \sum_{k=1}^{2N} (\bar \partial_k\tp 1)\tp_H \sum_{1\leq i<j\leq 2N} c_{ij}^k \rho_{\sing}(f^{ij})v. \end{equation*} The two summations over $i<j$ then cancel each other, giving \eqref{Hactionsing}. \end{proof} \begin{corollary}\label{chsing} Let $V$ be an $H(\dd,\chi,\om)$-module and let $R$ be a ${\mathfrak{d}}'\oplus\sp\,\dd$-submodule of\/ $\sing V$. Denote by $HR$ the $H$-submodule of\/ $V$ generated by $R$. Then $HR$ is a $H(\dd,\chi,\om)$-submodule of\/ $V$. In particular, if\/ $V$ is irreducible and $R$ is non-zero, then $V=HR$. \end{corollary} \begin{proof} By \eqref{Hactionsing}, we have $H(\dd,\chi,\om) * R \subset (H \tp H) \tp_H HR$. Then $H$-bilinearity implies that $HR$ is a $H(\dd,\chi,\om)$-submodule of $V$. \end{proof} \subsection{More tensor modules} Let $R$ be a finite-dimensional ${\mathfrak{d}}'\oplus\sp\,\dd$-module, with the action denoted as $\rho_R$. Let $V=H\tp R$ be the free $H$-module generated by $R$, where $H$ acts by a left multiplication on the first factor. Mimicking \eqref{Hactionsing}, we define a pseudoaction \begin{equation}\label{hsing1} \begin{split} e * v = \sum_{i,j=1}^{2N} & \, (\bar \partial_i \bar \partial_j \tp 1) \tp_H (1 \tp \rho_R (f^{ij})v)\\ - \sum_{k=1}^{2N} & \, (\bar \partial_k \tp 1) \tp_H \bigl(1 \tp \rho_R (\partial^k + \ad^{\mathfrak{sp}} \partial^k) v - \partial^k \tp v\bigr)\\ + \quad\,\,\,\, & \,(1 \tp 1) \tp_H (1 \tp \rho_{R} (c)v),\qquad v \in R, \end{split} \end{equation} and then extend it by $H$-bilinearity to a map $* \colon H(\dd,\chi,\om)\tp V \to (H\tp H)\tp_H V$. \begin{lemma}\label{lhsing2} Let\/ $R$ be a finite-dimensional ${\mathfrak{d}}\oplus\sp\,\dd$-module with an action $\rho_R$. Then formula \eqref{hsing1} defines a structure of a $H(\dd,\chi,\om)$-module on $V=H\tp R$. We have $\kk \tp R \subset \sing V$ and \begin{equation}\label{rhosingA} \rho_{\sing}(A)(1 \tp u) = 1 \tp \rho_R(A)u, \qquad A \in {\mathfrak{d}} \oplus \sp\,\dd, \; u \in R. \end{equation} \end{lemma} \begin{proof} It can be showed by means of a lengthy but straightforward computation. Alternatively, the identification ${\mathfrak{d}}'\oplus\sp\,\dd= \mathcal{N}_{\mathcal{P}} / {\mathcal{P}}_1$ makes $R$ into a conformal $\mathcal{N}_{\mathcal{P}}$-module with a trivial ${\mathcal{P}}_1$-action. As $\widetilde {\mathcal{P}} = {\mathfrak{d}} \oplus \mathcal{N}_{\mathcal{P}}$ as vector spaces, then the induced module $\Ind_{\mathcal{N}_{\mathcal{P}}}^{\widetilde {\mathcal{P}}} R$ is isomorphic to $\ue({\mathfrak{d}}) \tp R = H \tp R$. The $H$-module structure is then given by multiplication on the first factor, whereas the $\mathcal{N}_{\mathcal{P}}/{\mathcal{P}}_1$-action on $\kk \tp R$ is as given in \eqref{rhosingA}. Thus we have built a conformal $\widetilde {\mathcal{P}}$-module -- i.e., a $H(\dd,\chi,\om)$-module -- structure on $H\tp R$. \end{proof} \begin{definition}\label{dvmodw} {\rm(i)} Let $R$ be a finite-dimensional ${\mathfrak{d}}'\oplus\sp\,\dd$-module with an action $\rho_R$. Then the $H(\dd,\chi,\om)$-module $H\tp R$, with the action of $H(\dd,\chi,\om)$ given by \eqref{hsing1}, will be denoted as~${\mathcal{V}}(R)$. {\rm(ii)} Let $R = \Pi'\boxtimes U$, where $\Pi'$ is a finite-dimensional ${\mathfrak{d}}'$-module and $U$ is a finite-dimensional $\sp\,\dd$-module. Then the module ${\mathcal{V}}(R)$ will also be denoted as~${\mathcal{V}}(\Pi',U)$. {\rm(iii)} As before, when $R = \Pi\boxtimes U$, where $\Pi$ is a finite-dimensional ${\mathfrak{d}}$-module and $U$ is a finite-dimensional $\sp\,\dd$-module, we will abuse the notation and write ${\mathcal{V}}(R) = {\mathcal{V}}(\Pi, U):= {\mathcal{V}}(\pi^* \Pi, U)$, where $\pi^*\Pi$ is the ${\mathfrak{d}}'$-module obtained by lifting the ${\mathfrak{d}}$-action on $\Pi$ to ${\mathfrak{d}}'$ via composing with the canonical projection $\pi: {\mathfrak{d}}' \to {\mathfrak{d}}'/\kk c \simeq {\mathfrak{d}}$. \end{definition} It is possible to translate Definitions \ref{dtmodh} and \ref{dvmodw} into one another. \begin{proposition} Let\/ $R = \Pi' \boxtimes U$ be a finite-dimensional\/ ${\mathfrak{d}}'\oplus \sp\,\dd$-module and $\pi: {\mathfrak{d}}' \to {\mathfrak{d}}'/\kk c \simeq {\mathfrak{d}}$ denote the canonical projection. Then\/ ${\mathcal{V}}(\Pi', U) = \T(\Pi'_{\pi^*\phi}, U)$ and\/ $\T(\Pi', U) = {\mathcal{V}}(\Pi'_{-\pi^*\phi}, U)$, where\/ $\phi = - N\chi+\tr\ad$ and $\pi^*\phi = \phi \circ \pi$ is the corresponding trace form on ${\mathfrak{d}}'$. \end{proposition} \begin{proof} The two claims are clearly equivalent, so it suffices to prove the latter. Take the definition of $\T(\Pi', U)$ given in \eqref{eee3} and rewrite the first summand in the right-hand side as follows $$\sum_{k=1}^{2N} (\bar{\partial}_k \tp \partial^k) \otimes_H v = \sum_{k=1}^{2N} (\bar{\partial}_k \tp 1) \otimes_H \partial^k v - \sum_{k=1}^{2N} (\bar{\partial}_k (\bar{\partial}^k + \chi(\partial^k)) \tp 1 ) \tp_H v.$$ One has $$\sum_{k=1}^{2N} (\bar{\partial}_k (\bar{\partial}^k + \chi(\partial^k)) \tp 1 ) \tp_H v = \sum_{k=1}^{2N} (\bar{\partial}_k \bar{\partial}^k \tp 1) \tp_H v - \sum_{k=1}^{2N}(\bar{\partial}_k \tp 1) \tp_H \chi(\partial^k) v.$$ One may one use \eqref{delx} to rewrite the first summand as $$\sum_{k=1}^{2N} (\bar{\partial}_k \bar{\partial}^k \tp 1) \tp_H v = \sum_{k = 1}^{2N} (\bar{\partial}_k \tp 1) \tp_H \iota_\rho \omega(\partial^k)v$$ so that $$\sum_{k=1}^{2N} (\bar{\partial}_k \tp \partial^k) \otimes_H v = \sum_{k=1}^{2N} (\bar{\partial}_k \tp 1) \otimes_H \partial^k v - \sum_{k=1}^{2N} (\bar{\partial}_k \tp 1 ) \tp_H \phi(\partial^k)v.$$ Now \eqref{eee3} rewrites as \begin{equation}\label{translatettov} \begin{split} e * v = \sum_{i,j=1}^{2N} & \, (\bar \partial_i \bar \partial_j \tp 1) \tp_H (1 \tp f^{ij} \cdot v)\\ - \sum_{k=1}^{2N} & \, (\bar \partial_k \tp 1) \tp_H (1 \tp (\partial^k + \ad^{\mathfrak{sp}} \partial^k)\cdot v - \phi(\partial^k) \tp v - \partial^k \tp v)\\ + \quad\,\,\,\, & \,(1 \tp 1) \tp_H c\cdot v, \end{split} \end{equation} for all $v \in R$. \end{proof} The following statements are analogous to those proved in \cite{BDK, BDK1, BDK2}. \begin{theorem}\label{irrfacttens} Let\/ $V$ be an irreducible finite\/ $H(\dd,\chi,\om)$-module, and\/ $R$ be an irreducible\/ ${\mathfrak{d}}' \oplus \sp\,\dd$-submodule of\/ $\sing V$. Then\/ $V$ is a homomorphic image of\/ ${\mathcal{V}}(R)$. In particular, every irreducible finite\/ $H(\dd,\chi,\om)$-module is a quotient of a tensor module. \end{theorem} \begin{proof} By \eqref{Hactionsing} and \eqref{hsing1} the canonical projection ${\mathcal{V}}(R) = H \tp R \to HR$ is a homomorphism of $H(\dd,\chi,\om)$-modules. However, $HR=V$ by \coref{chsing}. \end{proof} We will now investigate how reducibility of a tensor module depends on existence of non-constant singular vectors. The picture is more involved than with primitive Lie pseudoalgebras of the other types. \begin{lemma}\label{noconstants} If $R$ is an irreducible representation of ${\mathfrak{d}}' \oplus \sp\,\dd$, then any non-zero proper $H(\dd,\chi,\om)$-submodule $M$ of ${\mathcal{V}}(R) = H \tp R$ satisfies $M \cap \fil^0 {\mathcal{V}}(R) = \{0\}$. \end{lemma} \begin{proof} Both $M$ and $\kk \tp R$ are ${\mathfrak{d}}' \oplus \sp\,\dd$-stable, and the same is true of their intersection. The claim now follows from irreducibility of $R$. \end{proof} \begin{corollary}\label{constirr} If $R$ is an irreducible ${\mathfrak{d}}' \oplus \sp\,\dd$-module and $\sing {\mathcal{V}}(R) = \fil^0 {\mathcal{V}}(R)$, then the $H(\dd,\chi,\om)$-module ${\mathcal{V}}(R)$ is irreducible. \end{corollary} \begin{proof} Assume there is a non-zero proper submodule $M$. Then $M$ must contain some non-zero singular vector. However, $M \cap \sing {\mathcal{V}}(R) = \{0\}$ by \leref{noconstants}. \end{proof} A converse to \coref{constirr} only holds for those tensor modules ${\mathcal{V}}(R)$ in which the ${\mathcal{P}}$-action factors through ${\mathcal{H}} \simeq {\mathcal{P}}/\kk c$. Recall that ${\mathcal{P}}$ is graded by the eigenspace decomposition of $\ad \mathcal{E}$, which also provides a grading for $\widetilde {\mathcal{P}}$ as $\mathcal{E}$ commutes with elements $\widehat \partial, \partial \in {\mathfrak{d}}$. If ${\mathfrak{p}}_n$ denotes the graded summand of eigenvalue $n$, then one has the semidirect sum decomposition of Lie algebras \begin{align} \mathcal{N}_{\mathcal{P}} & = {\mathfrak{d}}' \sd \prod_{j\geq 0} {\mathfrak{p}}_j\\ \intertext{and the decomposition of vector spaces} \widetilde {\mathcal{P}} & = {\mathfrak{p}}_{-1} \oplus \mathcal{N}_{\mathcal{P}}. \end{align} Notice that ${\mathfrak{p}}_{-1}$ is not a subalgebra, as the Lie bracket of suitably chosen elements yields a nonzero multiple of the central element $c = \ce \in {\mathfrak{p}}_{-2}$, which may act nontrivially on $R$. However, if the action of $c$ is trivial on $R$ then the ${\mathcal{P}}$-action factors through ${\mathcal{H}}$, and we may repeat the above argument with the Lie algebra $\widetilde{\mathcal{H}}$ so as to obtain $\widetilde {\mathcal{H}} = \h_{-1} \oplus \mathcal{N}_{\mathcal{H}}$. Then $\h_{-1}$ is a graded (abelian) Lie algebra and its universal enveloping algebra is a symmetric algebra generated in degree $-1$. Then ${\mathcal{V}}(R) = \Ind_{\mathcal{N}_{\mathcal{H}}}^{\widetilde{\mathcal{H}}} R$ is isomorphic to $S(\h_{-1})\tp R$, which can be endowed with a $-\ZZ_+$-grading by setting elements from $R$ to have degree zero, and elements from $\h_{-i}$ to have degree $-i$. A vector $v \in {\mathcal{V}}(R)$ is then {\em homogeneous} if it has a single graded component with respect to the above grading. Since $\mathcal{N}_{\mathcal{H}}/{\mathcal{H}}_1$ may be identified with the degree $0$ part $\widehat {\mathfrak{d}} \oplus \h_0 \simeq {\mathfrak{d}} \oplus \sp\,\dd$, its action on singular vectors will map homogeneous vectors to homogeneous vectors of the same degree, thus showing that homogeneous components of singular vectors are singular vectors. The above argument, used in the case where $c \in {\mathfrak{p}}_{-2}$ acts nontrivially on $R$, shows that ${\mathcal{V}}(R)$ is only $-\ZZ_+$-filtered, but certainly not graded, as the central element, which has degree $-2$, acts via a nonzero scalar multiplication so preserving the degree of vectors in the representation. \begin{remark} Let $V$ be an irreducible $H(\dd,\chi,\om)$-module on which the ${\mathcal{P}}$-action factors through ${\mathcal{H}}$. As $\mathcal{E}$ stabilizes ${\mathcal{H}}_1$ and commutes with $\h_0$, isotypic components of $\sing V$ are stabilized by the action of $\mathcal{E}$. In particular, if an isotypic component of $\sing V$ is a single ${\mathfrak{d}} \oplus \sp\,\dd$-irreducible summand, then $\mathcal{E}$ acts as multiplication by a scalar, and this summand is homogeneous. We will later see that in the framework of $H(\dd,\chi,\om)$-tensor modules there is a single exception to homogeneity of irreducible summands in $\sing V$, which happens when $\chi = 0$. \end{remark} \begin{proposition}\label{constiff} Let $R$ be an irreducible ${\mathfrak{d}}' \oplus \sp\,\dd$-module on which $c\in {\mathfrak{d}}'$ acts trivially. Then every noncostant homogeneous singular vector in ${\mathcal{V}}(R)$ is contained in a non-zero proper submodule. In particular, ${\mathcal{V}}(R)$ is irreducible if and only if $\sing {\mathcal{V}}(R) = \fil^0 {\mathcal{V}}(R)$. \end{proposition} \begin{proof} Every non-constant homogeneous singular vector $s$ is of negative degree $d<0$. Then $\ue(\widetilde {\mathcal{H}}) s = S(\h_{-1}) s$ is a non-zero $H(\dd,\chi,\om)$-submodule of ${\mathcal{V}}(R)$ lying in degrees $\leq d$, and intersects $R$ trivially, as $R$ lies in degree zero. \end{proof} \subsection{Filtration of tensor modules}\label{filtrationtm} $H(\dd,\chi,\om)$-tensor modules possess a filtration induced by the canonical increasing filtration $\{\fil^n H\}$. We may in fact define \begin{equation} \fil^n {\mathcal{V}}(R) = \fil^n H \tp R \,, \qquad n = -1, 0, \dots\, . \end{equation} As usual, $\fil^{-1} {\mathcal{V}}(R) = \{0\}$ and $\fil^0 {\mathcal{V}}(R) = \kk \tp R$, and elements lying in $\fil^{n} {\mathcal{V}}(R) \setminus \fil^{n-1} {\mathcal{V}}(R)$ are called {\em vectors of degree $n$}. The associated graded space is defined accordingly, and we have isomorphisms of vector spaces \begin{equation} \gr^n {\mathcal{V}}(R) \simeq S^n {\mathfrak{d}} \tp R \,, \end{equation} where $S^n {\mathfrak{d}}$ is the $n$-th symmetric power of the vector space ${\mathfrak{d}}$. Note that we can make ${\mathfrak{d}}$ into an $\sp\,\dd$-module via the inclusion $\sp\,\dd \subset \gl\,\dd.$ Then ${\mathfrak{d}}$ is an irreducible $\sp\,\dd$-module. In a similar way $S^n {\mathfrak{d}}$ will be understood as an $\sp\,\dd$-module. \begin{lemma}\label{lfilact} For every $p,n \geq 0$, we have: \begin{align} \label{dfp}{\mathfrak{d}} \cdot \fil^p {\mathcal{V}}(R) & = \fil^{p+1} {\mathcal{V}}(R),\\ \label{nhfp}\mathcal{N}_{\mathcal{P}} \cdot \fil^p {\mathcal{V}}(R) & \subset \fil^p {\mathcal{V}}(R),\\ \label{hfp}{\mathcal{P}} \cdot \fil^p {\mathcal{V}}(R) & \subset \fil^{p+1} {\mathcal{V}}(R),\\ \label{h1fp}{\mathcal{P}}_n \cdot \fil^p {\mathcal{V}}(R) & \subset \fil^{p-n} {\mathcal{V}}(R). \end{align} \end{lemma} \begin{proof} The proof of \eqref{dfp}-\eqref{hfp} is the same as in the case of $\Wd$ (see \cite[Lemma 6.3]{BDK1}). Similarly, \eqref{h1fp} follows using \eqref{hfp} and the fact that $[{\mathfrak{d}}, {\mathcal{P}}_n] \subset {\mathcal{P}}_{n-1}$, $[{\mathfrak{d}}, {\mathcal{P}}_1] \subset {\mathcal{P}}_0 \subset \mathcal{N}_{\mathcal{P}}$. \end{proof} As a consequence of \leref{lfilact}, we see that both $\mathcal{N}_{\mathcal{P}}$ and its quotient $\mathcal{N}_{\mathcal{P}}/{\mathcal{P}}_1 \simeq {\mathfrak{d}}' \oplus \sp\,\dd$ act on each space $\gr^p {\mathcal{V}}(R)$. \begin{lemma}\label{legraction} The action of\/ ${\mathfrak{d}}'$ and\/ ${\mathcal{P}}_0/{\mathcal{P}}_1 \simeq \sp\,\dd$ on the space\/ $\gr^p {\mathcal{V}}(R) \simeq S^p {\mathfrak{d}} \tp R$ satisfies \begin{align} \widehat \partial \cdot (f \tp u) & = f \tp \Bigl(\rho_R(\partial) u + \frac{p}{2}\chi(\partial) u\Bigr) ,\\ A \cdot (f \tp u) & = A f \tp u + f \tp \rho_R(A) u, \end{align} for\/ $A \in \sp\,\dd$, $f\in S^p {\mathfrak{d}}$, $u \in R$. \end{lemma} \begin{proof} One only needs to pay attention to the fact that, by \eqref{dhat}, the action of $\widehat \partial$ on ${\mathfrak{d}}$ is given by scalar multiplication by $\chi(\partial)/2$. \end{proof} \begin{corollary}\label{grdecomposition} Let $\Pi', U$ be irreducible representations of ${\mathfrak{d}}', \sp\,\dd$ respectively. There is an isomorphism of ${\mathfrak{d}}' \oplus {\mathcal{P}}_0/{\mathcal{P}}_1 \simeq {\mathfrak{d}}\oplus\sp\,\dd$-modules $$\gr^p {\mathcal{V}}(\Pi', U) \simeq \Pi'_{p\,\pi^*\chi/2} \boxtimes (S^p {\mathfrak{d}} \tp U).$$ In particular, when the action of ${\mathcal{P}}$ factors through the quotient ${\mathcal{H}}$ and $\Pi' = \pi^* \Pi$, one has $$\gr^p {\mathcal{V}}(\Pi, U) \simeq \Pi_{p\chi/2} \boxtimes (S^p {\mathfrak{d}} \tp U),$$ whereas, when the action of $c \in {\mathfrak{d}}'$ on $\Pi'$ is nontrivial (whence $\chi$ vanishes) one has $$\gr^p {\mathcal{V}}(\Pi', U) \simeq \Pi' \boxtimes (S^p {\mathfrak{d}} \tp U).$$ \end{corollary} \begin{proof} Follows immediately by \leref{legraction}. \end{proof} \begin{remark} Notice that when $\chi \neq 0$ one has $$\fil^p {\mathcal{V}}(\Pi, U) \simeq \bigoplus_{i=0}^p \Pi_{i\chi/2} \boxtimes (S^i {\mathfrak{d}} \tp U),$$ by complete reducibility of the $\sp\,\dd$-action, as each $\gr^i {\mathcal{V}}(\Pi, U), 0 \leq i\leq p,$ sits in distinct isotypical components. \end{remark} \begin{remark}\label{degreeone} We will later use the fact that all $H(\dd,\chi,\om)$-linear homomorphisms showing up in the twisted conformally symplectic pseudo de Rham complexes, with the exception of ${\mathrm{d}}^R_\Pi$, map constant singular vectors to vectors of degree $1$. This is due to the very definition of such maps, and the fact that the differential homomorphisms in the pseudo de Rham complex for $\Wd$ satisfy the same property. \end{remark} \section{Irreducibility of tensor modules}\label{sirtm} We have seen that all irreducible finite representations of $H(\dd,\chi,\om)$ arise as quotients of some special $H(\dd,\chi,\om)$-modules called tensor modules. A classification of irreducible $H(\dd,\chi,\om)$-modules will then follow from a description of irreducible quotients of tensor modules. \subsection{Coefficients of elements and submodules}\label{shirten} Throughout this section, $R$ will be an irreducible ${\mathfrak{d}}' \oplus \sp\,\dd$-module, with the action denoted by $\rho_R$, and ${\mathcal{V}}(R)$ the corresponding tensor module introduced in Definition \ref{dvmodw}. First, let us rewrite the expression \eqref{hsing1} for the pseudoaction of $e$ on singular vectors in a tensor module in a different fashion. Let $$\psi(u) = \sum_{i,j=1}^{2N} \partial_i \partial_j \tp \rho_R(f^{ij})u.$$ Then we have: \begin{equation}\label{hsing2} \begin{split} e * (1 \tp u) &= (1 \tp 1) \tp_H (\psi(u) - \sum_{k=1}^{2N} \partial_k \tp \rho_R(\partial^k)u)\\ &+ \text{ terms in } (1 \tp H) \tp_H ({\mathfrak{d}}\tp (\kk + \rho_R(\sp\,\dd)) u \\ &+ \kk \tp (\kk + \rho_R(\sp\,\dd + {\mathfrak{d}}')) u). \end{split} \end{equation} On the other hand, if $v \in \sing {\mathcal{V}}(R)$, then \eqref{Hactionsing} implies \begin{equation}\label{hsing3} \begin{split} e * v = \sum_{i,j=1}^{2N} (1 \tp \partial_i\partial_j) & \tp_H \rho_R(f^{ij}) v\\ + \mbox{ terms in } (1 & \tp \fil^1 H) \tp_H {\mathcal{V}}(R). \end{split} \end{equation} \begin{lemma}\label{lcoefficients} If\/ $v= \sum_I \partial^{(I)} \tp v_I$, then \begin{equation} \begin{split} e*v = \sum_I (1 \tp \partial^{(I)}) & \tp_H \psi(v_I)\\ + \text{\rm{ terms in }} (1 & \tp \partial^{(I)}H) \tp_H (\fil^1 H \tp (\kk + \rho_R(\sp\,\dd + {\mathfrak{d}}')) v_I). \end{split} \end{equation} In particular, the coefficient multiplying\/ $1 \tp \partial^{(I)}$ equals\/ $\psi(v_I)$ modulo\/ $\fil^1 {\mathcal{V}}(R)$. \end{lemma} \begin{proof} This follows from \eqref{hsing2}. \end{proof} Recall that every element $v$ of ${\mathcal{V}}(R)$ can be uniquely expressed in the form $$v = \sum_I \partial^{(I)} \tp v_I.$$ \begin{definition} The non-zero elements $v_I$ in the above expression are called {\em coefficients} of $v\in {\mathcal{V}}(R)$. For a submodule $M \subset {\mathcal{V}}(R)$, we denote by $\coef M$ the subspace of $R$ spanned over $\kk$ by all coefficients of elements from $M$. \end{definition} \begin{lemma} Let\/ $R$ be an irreducible\/ ${\mathfrak{d}}'\oplus\sp\,\dd$-module. Then, for any non-zero proper\/ $H(\dd,\chi,\om)$-submodule\/ $M$ of\/ ${\mathcal{V}}(R)$, we have\/ $\coef M = R$. \end{lemma} \begin{proof} Pick a non-zero element $v = \sum_I \partial^{(I)} \tp v_I$ contained in $M$. Then \leref{lcoefficients} shows that $M$ contains an element congruent to $\psi(v_I)$ modulo $\fil^1 {\mathcal{V}}(R)$, thus coefficients of $\psi(v_I)$ all lie in $\coef M$ for all $I$. This proves that $\rho_R(\sp\,\dd)\coef M \subset \coef M$. Similarly, one can write \begin{equation} \begin{split} e*v = \sum_I (1 \tp \partial^{(I)}) \tp_H (\psi(v_I) - \sum_{k} \partial_k \tp (\rho_R(& \partial^k)v_I)) \\ + \mbox{ terms in } (1 \tp \partial^{(I)} H) \tp_H ({\mathfrak{d}} & \tp \rho_R(\sp\,\dd + \kk))v_I\\ + \kk & \tp (\kk + \rho_R(\sp\,\dd + {\mathfrak{d}}'))v_I), \end{split} \end{equation} showing that $\rho_R(\partial^k)v_I \in \coef M$ for all $I$, $k=1, \dots, 2N$. Thus, $\rho_R({\mathfrak{d}}')\coef M \subset \coef M$, as the central element $c$ acts via multiplication by a scalar. Then $\coef M$ is a non-zero ${\mathfrak{d}}' \oplus \sp\,\dd$-submodule of $R$. Irreducibility of $R$ now gives $\coef M = R$ as soon as $M \neq 0$. \end{proof} \begin{corollary}\label{psiinm} Let $M$ be a non-zero proper $H(\dd,\chi,\om)$-submodule of ${\mathcal{V}}(R)$. Then for every $u \in R$ there is some element in $M$ coinciding with $\psi(u)$ modulo $\fil^1 {\mathcal{V}}(R)$. \end{corollary} \begin{proof} As $\coef M = R$, it is enough to prove the statement for coefficients of elements lying in $M$. In order to do so, pick $v \in M$ and proceed as in \leref{lcoefficients}. As $M$ is a $H(\dd,\chi,\om)$-submodule of ${\mathcal{V}}(R)$, the coefficient multiplying $1 \tp \partial^{(I)}$ still lies in $M$, and equals $\psi(v_I)$ modulo $\fil^1 {\mathcal{V}}(R)$. \end{proof} The following irreducibility criterion is proved as in \cite[Section 7.2]{BDK2}. \begin{theorem}\label{irrcriterion} Let\/ $R = \Pi' \boxtimes U$ be an irreducible\/ ${\mathfrak{d}}' \oplus \sp\,\dd$-module. If\/ $U$ is neither trivial nor isomorphic to one of the fundamental representations\/ $R(\pi_i)$, $i=1, \dots, N$, then the\/ $H(\dd,\chi,\om)$-tensor module\/ ${\mathcal{V}}(\Pi, U)$ is irreducible. \end{theorem} Notice that the converse certainly holds if the ${\mathcal{P}}$-action factors through ${\mathcal{H}}$: in this case, if $U$ is either trivial or a fundamental representation, then ${\mathcal{V}}(\Pi, U) = {\mathcal{V}}(\pi^* \Pi, U) = {\mathcal{V}}(\Pi', U)$ appears in a twisted conformally symplectic pseudo de Rham complex (see \thref{tmodhd}) and it is reducible, as the image or the kernel of each differential provides a non-trivial submodule. Our final goal is to extend this fact to tensor modules in which $c$ acts nontrivially and to provide a complete classification of submodules. All this will be accomplished in next section by providing a description of all singular vectors. \section{Computation of singular vectors}\label{sksing} \begin{proposition}\label{pboundeddegree} Let $v \in {\mathcal{V}}(R)$ be a singular vector contained in a non-zero proper $H(\dd,\chi,\om)$-submodule $M$, and assume that the $\sp\,\dd$-action on $R$ is non-trivial. Then $v$ is of degree at most two. \end{proposition} \begin{proof} Write $v=\sum_I \partial^{(I)} \tp v_I$. Then \leref{lcoefficients}, together with \eqref{hsing3}, show that $\psi(v_I) =0$ whenever $|I|\geq 2$. As the $\sp\,\dd$-action on $R$ is non-trivial, from $\psi(v_I) = 0$ follows $v_I=0$. \end{proof} Our next step is to describe singular vectors and submodules contained in tensor modules of the form ${\mathcal{V}}(\Pi', U)$, where $U=R(\pi_i)$ for some $i = 0, \dots, N$ and $\Pi'$ is an irreducible ${\mathfrak{d}}'$-module. Our final result states that when the ${\mathcal{P}}$-action factors through ${\mathcal{H}}$, then such a module contains singular vectors if and only if it is a twist of a module contained in the conformally symplectic pseudo de Rham complex, and that in such cases singular vectors are described in terms of the differential maps. The case where the action of ${\mathcal{P}}$ does not factor through ${\mathcal{H}}$ can then also be deduced easily. The case $U \simeq \kk$ is of a somewhat different flavor, so we treat it separately. \subsection{Singular vectors in $\VPiprimezero$}\label{shsing} First, we find all singular vectors in $\VPiprimezero$. \begin{lemma}\label{spdtrivial} A vector in $\VPiprimezero$ is singular if and only if it lies in $\fil^1 \VPiprimezero$. \end{lemma} \begin{proof} Let us first prove $\sing \V(\Pi, \kk) \subset \fil^1 \VPiprimezero$. The $\sp\,\dd$-action is trivial, so \eqref{hsing2} can be rewritten as \begin{equation}\label{spdtrivial1} \begin{split} e * (1 \tp u) & = \sum_{k=1}^{2N} (\bar \partial_k \tp 1) \tp_H (\partial^k \tp u - 1 \tp \rho_R(\partial^k)u)\\ & \qquad + (1 \tp 1) \tp_H 1 \tp \rho_R(c)u, \end{split} \end{equation} and also as \begin{equation}\label{spdtrivial2} \begin{split} e * (1 \tp u) = - \sum_{k} (1 \tp \partial_k) & \tp_H (\partial^k \tp u - 1 \tp \rho_R(\partial^k)u)\\ + \mbox{ terms in } (1 & \tp 1) \tp_H \fil^1 \VPiprimezero. \end{split} \end{equation} Let $v = \sum_I \partial^{(I)} \tp v_I$ be a singular vector in $\VPiprimezero$, and assume there is some $I$, $|I|>1$, such that $v_I \neq 0$. If $n$ is the maximal value of $|I|$ for such $I$, choose among all $I = (i_1, \dots, i_{2N})$ with $|I| = n$, one with the highest value of $i_1$. Then the coefficient multiplying $1 \tp \partial_1 \partial^{(I)}$ in $e * v$ equals $\partial^1 \tp v_I - 1 \tp \rho_R(\partial^1)v_I$. As $v$ is singular, this must vanish if $|I| >1$, a contradiction with $v_I \neq 0$. The reverse inclusion $\sing \VPiprimezero \supset \fil^1 \VPiprimezero$ is now easy. If $v \in \fil^1 \VPiprimezero$, plugging it into \eqref{spdtrivial1} and left-straightening the resulting expression only yields terms in $(\fil^2 H \tp \kk) \tp_H \VPiprimezero$. \end{proof} \begin{proposition}\label{irreduciblecnonzero} The\/ $H(\dd,\chi,\om)$-module\/ ${\mathcal{V}}(R) = \VPiprimezero$ is reducible if and only if the action of $c \in {\mathfrak{d}}'$ on $\Pi'$ is trivial. \end{proposition} \begin{proof} Let $M$ be a non-zero proper submodule of $\VPiprimezero$. We know $M$ that must contain non-constant singular vectors and that $\gr^1 \VPiprimezero \simeq \Pi'_{\pi^*\chi/2} \boxtimes {\mathfrak{d}}$ is ${\mathfrak{d}}' \oplus \sp\,\dd$-irreducible. Thus, for every choice of $\partial \in {\mathfrak{d}}, u \in 1 \tp R$, $M$ must contain some element whose degree one term is $\partial \otimes u$. Consequently, as $M\subset \VPiprimezero$ is an $H$-submodule, $M$ must be of finite codimension in $\VPiprimezero$, hence $\VPiprimezero/M$ is a torsion $H$-module. However, the action of a pseudoalgebra on torsion elements is trivial, so $e*\VPiprimezero = e*M \subset (H \tp H) \tp_H M$. Direct inspection of \eqref{spdtrivial1} now shows that $1 \tp \rho_R(c) u$ belongs to $M$ for all $u \in U$. Then, if the action of $u$ is non-trivial, $M$ must contain non-zero constant vectors, which is a contradiction. If instead the action of $c$ is trivial, then vectors $\partial \tp u - 1 \tp \rho_R(\partial)u,$ where $\partial \in {\mathfrak{d}}$, $u \in R,$ all belong to $M$, and they indeed span over $H$ a proper $H(\dd,\chi,\om)$-submodule of $\VPiprimezero$. \end{proof} \begin{remark} \prref{irreduciblecnonzero} shows, by providing a counterexample, that requiring $c\in {\mathfrak{d}}'$ to act trivially on $R$ in \prref{constiff} is a mandatory hypothesis. \end{remark} \begin{comment} \begin{remark} By \coref{grdecomposition}, we know that $\gr^1 {\mathcal{V}}(\Pi, \kk) \simeq \Pi_{\chi/2} \boxtimes R(\pi_1)$, so that $\fil^1 {\mathcal{V}}(\Pi, \kk) \simeq \fil^0 {\mathcal{V}}(\Pi, \kk) \oplus U$, where $U\simeq \Pi_{\chi/2} \boxtimes R(\pi_1)$ is an irreducible ${\mathfrak{d}} \oplus \sp\,\dd$-submodule of non-constant singular vectors. Then \prref{fil1trivial} can also be proved by noticing that ${\mathrm{d}}_{\Pi\tp\kk_{\tr\ad}}: J^{2N-1}_{\Pi\tp\kk_{\tr\ad}}({\mathfrak{d}}) \to J^{2N}_{\Pi\tp\kk_{\tr\ad}}({\mathfrak{d}})$ maps constant singular vectors in $J^{2N-1}_{\Pi\tp\kk_{\tr\ad}} \simeq {\mathcal{V}}(\Pi_{\chi/2}, R(\pi_1))$ to an irreducible ${\mathfrak{d}} \oplus \sp\,\dd$-summand, isomorphic to $\Pi_{\chi/2} \boxtimes R(\pi_1)$, of singular vectors in $J^{2N}_{\Pi\tp\kk_{\tr\ad}}({\mathfrak{d}}) \simeq {\mathcal{V}}(\Pi, \kk)$. Indeed, constant singular vectors may not be mapped to $0$, as this would force ${\mathrm{d}}_{\Pi\tp\kk_{\tr\ad}}$ to vanish; similarly, they may not be mapped to constant singular vectors as this would force ${\mathrm{d}}_{\Pi\tp\kk_{\tr\ad}}$ to be surjective. \end{remark} \end{comment} \subsection{Non-trivial submodules of $\VPiprimezero$}\label{ssubvpik} We are only interested in the case where the action of $c \in {\mathfrak{d}}'$ on $\Pi'$ is trivial, as we have seen that $\VPiprimezero$ is otherwise irreducible. We thus focus on tensor modules $\V(\Pi, \kk):= {\mathcal{V}}(\pi^*\Pi, \kk) = \VPiprimezero$, where $\Pi$ is a ${\mathfrak{d}}$-module, see \deref{dvmodw}(iii). First of all, recall that \begin{equation*} \begin{split} \Omega^{2N}_{\Pi}({\mathfrak{d}}) = J^{2N}_{\Pi}({\mathfrak{d}}) & \simeq \T(\Pi_{-N\chi}, \kk) = {\mathcal{V}}(\Pi_{-N\chi - \phi}, \kk),\\ \Omega^{2N-1}_{\Pi}({\mathfrak{d}}) = J^{2N-1}_{\Pi}({\mathfrak{d}}) & \simeq \T(\Pi_{-(2N-1)\chi/2}, R(\pi_1)) = {\mathcal{V}}(\Pi_{-(2N-1)\chi/2 - \phi}, R(\pi_1)), \end{split} \end{equation*} so that \begin{equation*} \begin{split} \V(\Pi, \kk) & \simeq J^{2N}_{\Pi_{N\chi + \phi}}({\mathfrak{d}}) = \Omega^{2N}_{\Pi_{N\chi + \phi}}({\mathfrak{d}}),\\ \V(\Pi_{\chi/2}, R(\pi_1)) & \simeq J^{2N-1}_{\Pi_{N\chi + \phi}}({\mathfrak{d}}) = \Omega^{2N-1}_{\Pi_{N\chi + \phi}}({\mathfrak{d}}). \end{split} \end{equation*} Recall (cf.\ \cite{BDK}) that the image of the de Rham differential ${\mathrm{d}}_{\Pi_{N\chi + \phi}}\colon\Omega^{2N-1}_{\Pi_{N\chi + \phi}}({\mathfrak{d}}) \to \Omega^{2N}_{\Pi_{N\chi + \phi}}({\mathfrak{d}})$ is a maximal $H$-submodule which has finite codimension as a $\kk$-vector subspace. This means that the image of the map $${\di^0_{\Pi}}^*\colon \V(\Pi_{\chi/2}, R(\pi_1)) \to \V(\Pi, \kk),$$ is a maximal $H(\dd,\chi,\om)$-submodule of $\V(\Pi, \kk)$, of finite $\kk$-codimension. Notice that ${\di^0_{\Pi}}^* \fil^0 \V(\Pi_{\chi/2}, R(\pi_1))$ is a ${\mathfrak{d}}\oplus \sp\,\dd$-submodule of $\sing \V(\Pi, \kk)$ which has a non-zero projection of $\gr^1 \V(\Pi, \kk) \simeq \Pi_{\chi/2} \boxtimes R(\pi_1)$, so that it coincides with the $({\mathfrak{d}}\oplus\sp\,\dd)$-stable complement of $\fil^0 \V(\Pi, \kk)$ in $\sing \V(\Pi, \kk)$, which is uniquely determined as it coincides with the $R(\pi_1)$-isotypical component of $\fil^1 \V(\Pi, \kk)$. \begin{comment} Moreover, the map ${\mathrm{d}}^0_\Pi$ identifies, under the above isomorphisms, with the de Rham differential ${\mathrm{d}}: \Omega^{2N-1}_{\Pi_{\tr\ad}}({\mathfrak{d}}) \to \Omega^{2N}_{\Pi_{\tr\ad}}({\mathfrak{d}})$, whose image is a maximal $H$-submodule (cf. \cite{BDK}). This shows that ${\mathrm{d}}^0_\Pi {\mathcal{V}}(\Pi_{\chi/2}, R(\pi_1))$ is a maximal $H(\dd,\chi,\om)$-submodule of ${\mathcal{V}}(\Pi, \kk)$. \end{comment} \begin{proposition} The unique non-zero proper $H(\dd,\chi,\om)-$submodule of $\V(\Pi, \kk)$ is $\dizerostar \VPione$. \end{proposition} \begin{proof} We have proved in the previous section that $$\sing \V(\Pi, \kk) =\fil^1 \V(\Pi, \kk) \simeq \fil^0 \V(\Pi, \kk) \oplus \gr^1 \V(\Pi, \kk)$$ is a direct sum of two non-isomorphic homogeneous irreducible ${\mathfrak{d}} \oplus \sp\,\dd$-submodules. If $M \subset \V(\Pi, \kk)$ is a non-zero proper submodule, then it must contain non-zero homogeneous singular vectors, which cannot be constant. Thus it contains all of ${\di^0_{\Pi}}^* \fil^0 \V(\Pi_{\chi/2}, R(\pi_1))$, which spans $\dizerostar \VPione$ over $H$. Thus $M$ contains the maximal submodule $\dizerostar \VPione$, hence it coincides with it. \end{proof} We will now separately classify singular vectors of degree one and two in tensor modules of the form $\VPiprimen$, for $n= 1, \dots, N$. \subsection{Singular vectors of degree one in $\VPiprimen, 1 \leq n \leq N$} We will proceed as follows: we will first treat the case $\VPiprimen$, where the action of $c \in {\mathfrak{d}}'$ is trivial; we will then show that the description of singular vectors of degree one stays unchanged when the action of $c$ is via multiplication by a non-zero scalar. \subsubsection{Singular vectors of degree one, graded case} Our setting is the following: $\Pi$ and $U$ are irreducible representations of ${\mathfrak{d}}$ and $\sp\,\dd$ respectively, $R = \pi^*\Pi \boxtimes U$ is a ${\mathfrak{d}}' \oplus \sp\,\dd$ module and $V = {\mathcal{V}}(R) = {\mathcal{V}}(\Pi, U)$, as in \deref{dvmodw}(iii), is a reducible $H(\dd,\chi,\om)$ tensor module. Furthermore, $U = R(\pi_n)$ for some $1 \leq n \leq N$. We are also given a non-zero proper submodule $M \subset V$. We first look for singular vectors of degree one, i.e., of the form $$S = \sum_{i=1}^{2N} \partial_i \tp s_i + 1 \tp s$$ that are contained in $M$. \begin{lemma} A non-zero singular vector of degree one contained in\/ $M\subset V$ is uniquely determined by its degree one part. \end{lemma} \begin{proof} If $s$ and $s'$ are two such vectors agreeing in degree one, then $s-s'$ is a singular vector contained in $M\cap (\kk\tp R) = \{0\}$. \end{proof} \begin{proposition}\label{psingunique} Let\/ $s, s'$ be non-zero singular vectors of degree one contained in (possibly distinct) non-zero proper submodules\/ $M, M'$ of a tensor module\/ ${\mathcal{V}}(R) = \V(\Pi, R(\pi_n))$ as above. If\/ $s = s' \mod \fil^0 {\mathcal{V}}(R)$, then\/ $s$ and\/ $s'$ coincide. \end{proposition} \begin{proof} We already know that each element in the irreducible ${\mathfrak{d}} \oplus \sp\,\dd$-submodule $\fil^0 {\mathcal{V}}(R)\simeq \Pi \boxtimes R(\pi_n)$ is a singular vector. Moreover, $\gr^1 {\mathcal{V}}(R)$ decomposes in the direct sum of (at most) three irreducible components isomorphic to $\Pi_{\chi/2} \boxtimes R(\pi_{n-1})$, $\Pi_{\chi/2} \boxtimes R(\pi_{n+1})$, and $\Pi_{\chi/2} \boxtimes R(\pi_n + \pi_1)$, respectively. As no such representation, viewed as an $\sp\,\dd$-module, has a non-zero $R(\pi_n)$-isotypical component, $\gr^1 {\mathcal{V}}(R)$ splits off canonically and uniquely as a (homogeneous) complement of $\fil^0 {\mathcal{V}}(R)$ in $\fil^1 {\mathcal{V}}(R)$. If a singular vector $s \in \fil^1 {\mathcal{V}}(R)$ has a non-zero projection to $\gr^1 {\mathcal{V}}(R)$ and is not contained in this canonical complement, then each $H(\dd,\chi,\om)$-submodule of ${\mathcal{V}}(R)$ containing $s$ will also contain constant singular vectors, and will fail to be proper. \end{proof} Recall that there are $H(\dd,\chi,\om)$-module isomorphisms \begin{equation*} \begin{split} \Omega^n_\Pi({\mathfrak{d}})/I^n_\Pi({\mathfrak{d}}) & \simeq \T(\Pi_{-n\chi/2}, R(\pi_n)) = {\mathcal{V}}(\Pi_{-\phi - n \chi/2}, R(\pi_n)),\\ J^{2N-n}_\Pi({\mathfrak{d}}) & \simeq \T(\Pi_{-(2N-n)\chi/2}, R(\pi_n)) = {\mathcal{V}}(\Pi_{-\phi -(2N-n)\chi/2}, R(\pi_n)), \end{split} \end{equation*} so that $$\V(\Pi, R(\pi_n)) \simeq \Omega^n_{\Pi_{\phi + n\chi/2}}({\mathfrak{d}})/I^n_{\Pi_{\phi + n\chi/2}}({\mathfrak{d}}) \simeq J^{2N-n}_{\Pi_{\phi + (2N-n)\chi/2}}({\mathfrak{d}}).$$ The conformally symplectic pseudo de Rham differentials \begin{equation*} \begin{split} {\di^n_{\Pi}}\colon& \Omega_{\Pi_{\phi + n\chi/2}}^{n-1}({\mathfrak{d}})/I_{\Pi_{\phi + n\chi/2}}^{n-1}({\mathfrak{d}}) \to \Omega_{\Pi_{\phi + n\chi/2}}^{n}({\mathfrak{d}})/I_{\Pi_{\phi + n\chi/2}}^{n}({\mathfrak{d}}),\\ {\di^n_{\Pi}}^*\colon& J_{\Pi_{\phi + (2N-n)\chi/2}}^{2N-n-1}({\mathfrak{d}}) \to J_{\Pi_{\phi + (2N-n)\chi/2}}^{2N-n}({\mathfrak{d}}), \end{split} \end{equation*} that we denote as in \eqref{domd8}, \eqref{domd9}, then identify to corresponding $H(\dd,\chi,\om)$-tensor module homomorphisms \begin{equation*} \begin{split} {\di^n_{\Pi}}\colon& \V(\Pi_{\chi/2}, R(\pi_{n-1})) \to \V(\Pi, R(\pi_n)),\qquad n = 1, \dots, N,\\ {\di^n_{\Pi}}^*\colon& \V(\Pi_{\chi/2}, R(\pi_{n+1})) \to \V(\Pi, R(\pi_n)),\qquad n = 0, \dots, N-1. \end{split} \end{equation*} We similarly obtain an $H(\dd,\chi,\om)$-module homomorphism $$\Di_{\Pi}\colon\V(\Pi_\chi, R(\pi_N)) \to \V(\Pi, R(\pi_N)).$$ \begin{theorem}\label{onlysymplectic} One has{\rm:} \begin{align*} \sing \fil^1 \V(\Pi, R(\pi_n)) &= \fil^0 \V(\Pi, R(\pi_n)) + {\di^n_{\Pi}} \fil^0 \V(\Pi_{\chi/2}, R(\pi_{n-1})) \\ &+ {\di^n_{\Pi}}^* \fil^0 \V(\Pi_{\chi/2}, R(\pi_{n+1})), \qquad 1 \leq n < N, \intertext{and} \sing \fil^1 \V(\Pi, R(\pi_N)) &= \fil^0 \V(\Pi, R(\pi_N)) + \di^N_{\Pi} \fil^0 \V(\Pi_{\chi/2}, R(\pi_{N-1})) . \end{align*} \end{theorem} \begin{proof} By the proof of \prref{psingunique}, the ${\mathfrak{d}} \oplus \sp\,\dd$-submodule $\fil^1 \V(\Pi, R(\pi_n))$ is isomorphic to the direct sum $$\fil^0 \V(\Pi, R(\pi_n))\,\, \oplus \,\,\Pi_{\chi/2} \boxtimes R(\pi_{n-1})\,\,\oplus \,\,\Pi_{\chi/2} \boxtimes R(\pi_{n+1})\,\,\oplus\,\,\Pi_{\chi/2} \boxtimes R(\pi_n + \pi_1),$$ where non-zero vectors in the last three summands have degree one. The $\sp\,\dd$-module $R(\pi_n + \pi_1)$ satisfies the irreducibility criterion stated in \thref{irrcriterion}, and its dimension is larger than $\dim R(\pi_n)$. We can therefore proceed as in \cite[Lemma 7.8]{BDK1} to conclude that no singular vectors of degree one will have a non-zero projection to this summand. However, by exactness of the conformally symplectic pseudo de Rham complex, the differentials ${\di^n_{\Pi}}, n>1,$ map $\fil^0 \V(\Pi_{\chi/2}, R(\pi_{n-1}))$ to non-zero (otherwise ${\di^n_{\Pi}}$ would vanish) non-constant (otherwise ${\di^n_{\Pi}}$ would be surjective) irreducible ${\mathfrak{d}} \oplus \sp\,\dd$-summands of singular vectors, isomorphic to $\Pi_{\chi/2}\boxtimes R(\pi_{n-1})$, and a similar argument applies to ${\di^n_{\Pi}}^*$. These summand must lie in $\fil^1 \V(\Pi, R(\pi_n))$, due to \reref{degreeone}. Now \prref{psingunique} shows that those are the only singular vectors of degree one, up to costant elements. \end{proof} \subsubsection{Singular vectors of degree one, non-graded case}\label{ssnongraded} Our setting is now the following: we have a $H(\dd,\chi,\om)$-tensor module $\VPiprimen, 1 \leq n \leq N,$ on which $c \in {\mathfrak{d}}'$ acts nontrivially; here $n$ is fixed once and for all. Consequently, $\chi = 0$, $\omega = {\mathrm{d}} {\zeta}$, and ${\mathfrak{d}}'$ --- as a central extension of ${\mathfrak{d}}$ --- may be trivialized as ${\mathfrak{d}}' = \dd^{\bla} \oplus \kk c$, where $\dd^{\bla}$ is spanned by elements $\partial_{{\zeta}} := \partial + {\zeta}(\partial), \partial \in {\mathfrak{d}}$. Then $\Pi'$ is isomorphic to $\Pi \boxtimes \kk_\lambda$, where $\Pi$ is the restriction of $\Pi'$ to $\dd^{\bla}$, and $\kk_\lambda$ is the $1$-dimensional representation of the abelian Lie algebra $\kk c$ on which $c$ acts via multiplication by $\lambda$. We may rewrite \eqref{hsing1} as follows \begin{equation}\label{hsinglambda} \begin{split} e * v = \sum_{i,j=1}^{2N} & \, (\partial_i \partial_j \tp 1) \tp_H (1 \tp \rho_R (f^{ij})v)\\ - \sum_{k=1}^{2N} & \, (\partial_k \tp 1) \tp_H \bigl(1 \tp \rho_R (\partial^k_{{\zeta}} + \ad^{\mathfrak{sp}} \partial^k) v - \partial^k \tp v\bigr)\\ + & ((\ell + 1) \tp 1) \tp_H (1 \tp \lambda v),\qquad v \in R, \end{split} \end{equation} where $\ell := \sum_k {\zeta}(\partial^k)\partial_k$. We now identify all $\Pi \boxtimes \kk_\lambda$ as vector spaces, and consequently all ${\mathcal{V}}(\Pi \boxtimes \kk_\lambda, R(\pi_n))$ with each other. Notice that ${\mathcal{V}}(\Pi \boxtimes \kk_0, R(\pi_n))$ is nothing but ${\mathcal{V}}(\Pi, R(\pi_n)):= {\mathcal{V}}(\pi^*\Pi, R(\pi_n))$. \begin{proposition}\label{nongradedsingular} Let $V = {\mathcal{V}}(\Pi \boxtimes \kk_\lambda, R(\pi_n))$. The intersection $\sing V \cap \fil^1 V$ is independent of $\lambda$. \end{proposition} \begin{proof} We show that each singular vector of degree at most one in ${\mathcal{V}}(\Pi \boxtimes \kk_0, R(\pi_n))$ is also a singular vector in ${\mathcal{V}}(\Pi \boxtimes \kk_\lambda, R(\pi_n))$, as the converse is completely analogous. The first two terms in the right-hand side of \eqref{hsinglambda} describe $e*v$ when $\lambda = 0$. Assume $s$ is a singular vector of degree one for ${\mathcal{V}}(\Pi \boxtimes \kk_0, R(\pi_n))$. We need to compute $e*s$ in ${\mathcal{V}}(\Pi \boxtimes \kk_\lambda, R(\pi_n))$ and check that it lies in $(\fil^2 H \tp H) \tp_H V$. However, the contribution in $e*s$ from the first two summands in the right-hand side of \eqref{hsinglambda} belongs to $(\fil^2 H \tp H) \tp_H V$ as $s$ is a singular vector for the $\lambda = 0$ case; furthermore, the third summand left-straightens to $(\fil^2 H \tp H) \tp_H V$ because $s$ is of degree one. \end{proof} \subsection{Singular vectors of degree two} Throughout this section, we will focus on an $H(\dd,\chi,\om)$-tensor module of the form ${\mathcal{V}}(R) = \VPiprimen, n = 1, \dots, N$. Recall the definition of $\psi(u)$ given in \seref{shirten}. Then, if $$S= \sum_{i,j=1}^{2N} \partial_i \partial_j \tp s^{ij} + \sum_{k=1}^{2N} \partial_k \tp s^k + 1 \tp s$$ is a vector of degree two lying in $\sing {\mathcal{V}}(R)$, one has: \begin{lemma}\label{spactiondeg2} $f^{\alpha\beta}(S) = \psi(s^{\alpha\beta}) \mod \fil^1 {\mathcal{V}}(R)$. \end{lemma} \begin{proof} Use \eqref{hsing2} to compute $e*S$ and compare it with \eqref{hsing3}. \end{proof} As we are assuming $S$ to be of degree two, some $s^{ij}$ must be non-zero. Then $\psi(s^{ij})$ is also non-zero, as the action of $\sp\,\dd$ on $R$ is non-trivial, hence $f^{ij}(S) = \psi(s^{ij}) \mod \fil^1 {\mathcal{V}}(R)$ is non-zero. This shows, in one shot, that the action of $\sp\,\dd$ on each singular vector $S$ of degree two is non-trivial, and that for some $0 \neq u\in R$ there exists a singular vector coinciding with $\psi(u)$ modulo $\fil^1 {\mathcal{V}}(R)$, as the $\sp\,\dd$-action preserves singular vectors, hence $f^{ij}(S)$ is singular too. \begin{lemma}\label{lphiproperties} If $u \in R$, let $\phi(u)$ denote a singular vector, if there exists one, coinciding with $\psi(u) \mod \fil^1 {\mathcal{V}}(R)$. Then $f^{\alpha \beta} (\phi(u))$ and $\widehat\partial (\phi(u))$ are also singular vectors, which coincide, respectively, with $\psi(f^{\alpha \beta}(u))$ and $\psi(\widehat \partial.u + \chi(\partial)u) $ modulo $\fil^1 {\mathcal{V}}(R)$. \end{lemma} \begin{proof} The claims follow from \leref{spactiondeg2} and \leref{legraction}, along with the definition of $\psi(u)$. \end{proof} \begin{lemma}\label{phiproperties} For every $u \in R$ there exists some singular vector $\phi(u)$ coinciding with $\psi(u)$ modulo $\fil^1 {\mathcal{V}}(R)$. The corresponding map $\phi: R \to \gr^2 {\mathcal{V}}(R)$ is a linear homomorphism and satisfies: \begin{align} \label{fabphi} f^{\alpha\beta}(\phi(u)) & = \phi(f^{\alpha\beta}(u)),\\ \label{fabs} f^{\alpha\beta}(S) & = \phi(s^{\alpha\beta}),\\ \label{dphi} \widehat\partial.\phi(u) & = \phi(\widehat\partial.u+ \chi(\partial)u),\\ \label{cphi} c. \phi(u) & = \phi(c.u). \end{align} Thus, $\phi$ is a well defined injective homomorphism which commutes with the $\sp\,\dd$-action. \end{lemma} \begin{proof} The space of elements $u \in R$ for which we can locate a singular vector equal to $\psi(u)$ modulo $\fil^1 {\mathcal{V}}(R)$ is non-zero and ${\mathfrak{d}}' \oplus \sp\,\dd$-stable. By irreducibility of $R$, it must be all of $R$. Injectivity follows from $\eqref{fabs}$, whereas the other properties have already been proved. \end{proof} \begin{corollary} The space of singular vectors of degree two does not contain trivial $\sp\,\dd$-summands. \end{corollary} \begin{proof} If $S$ is a homogeneous singular vector of degree two lying in a trivial summand, then $0 = f^{\alpha\beta}(S) = \phi(s^{\alpha\beta})$ for all $\alpha, \beta$. But $\phi$ is injective, hence $s^{\alpha\beta} = 0$, a contradiction with $S$ being of degree two, hence $S=0$. \end{proof} We are now ready to classify singular vectors of degree two. As before, we will first proceed with tensor modules on which the action of $c \in {\mathfrak{d}}'$ is trivial, and then extend our results to the general case. \subsubsection{Singular vectors of degree two, graded case} Our setting is now as follows: $\Pi$ is a ${\mathfrak{d}}$-module, and $\V(\Pi, R(\pi_n)):= {\mathcal{V}}(\pi^* \Pi, R(\pi_n)) = \VPiprimen$ denotes the $H(\dd,\chi,\om)$-tensor module as in \deref{dvmodw}(iii). \begin{proposition}\label{degreetwoisirreducible} Non-zero singular vectors of degree two in $\V(\Pi, R(\pi_n))$ project to a unique ${\mathfrak{d}} \oplus \sp\,\dd$-irreducible summand in $\gr^2 \V(\Pi, R(\pi_n))$, which is isomorphic to $\Pi_{\chi} \boxtimes R(\pi_n)$. Moreover, the homomorphism $\din\dinminusonestar$ maps injectively $\fil^0 \V(\Pi_\chi, R(\pi_n))$ to an irreducible summand of singular vectors of degree two in $\V(\Pi, R(\pi_n))$. In particular, the space of non-zero homogeneous singular vectors of degree two in $\V(\Pi, R(\pi_n))$ coincides with $\din\dinminusonestar \fil^0 \V(\Pi_\chi, R(\pi_n))$. \end{proposition} \begin{proof} The first claim is clear. As for the second one, an $H(\dd,\chi,\om)$-homomorphism maps singular vectors to singular vectors, and its restriction to an irreducible ${\mathfrak{d}} \oplus \sp\,\dd$-summand is either $0$ or an isomorphism. Recall that, by exactness of the conformally symplectic pseudo de Rham complex, ${\di^n_{\Pi}} {\di^{n-1}_{\Pi_{\chi/2}}}$ equals $0$, and $\ker {\di^n_{\Pi}} = \Im\,\, {\di^{n-1}_{\Pi_{\chi/2}}}$. Now, ${\di^{n-1}_{\Pi_{\chi/2}}}$ must be injective on ${\di^{n-1}_{\Pi_{\chi/2}}}^* \fil^0 \V(\Pi_\chi, R(\pi_n))$. If it were not, this homogeneous summand of degree $1$ singular vectors would have to lie in the image of ${\di^{n-1}_{\Pi_{\chi/2}}}$, hence it would be obtained by applying ${\di^{n-1}_{\Pi_{\chi/2}}}$ to constant singular vectors. However ${\di^{n-1}_{\Pi_{\chi/2}}} \fil^0 \V(\Pi_\chi, R(\pi_{n-2}))$ is isomorphic to $\Pi_{\chi} \boxtimes R(\pi_{n-2})$ as ${\mathfrak{d}} \oplus \sp\,\dd$-module, yielding a contradiction. We conclude that $\din\dinminusonestar \fil^0 \V(\Pi_\chi, R(\pi_n))$ is a homogeneous summand of degree $2$ singular vectors, which is ${\mathfrak{d}}\oplus \sp\,\dd$-isomorphic to $\Pi_\chi \boxtimes R(\pi_n)$. \end{proof} \begin{remark} Note that if $\chi=0$ a proper submodule $M$ of a tensor module ${\mathcal{V}}(R)$ can in principle contain non homogeneous singular vectors of degree two. Indeed, homogeneous singular vectors of degree zero and two span in such a case isomorphic ${\mathfrak{d}} \oplus \sp\,\dd$-submodules of ${\mathcal{V}}(R)$, so that suitable linear combinations will yield possibly non homogeneous singular vectors. We will see below that singular vectors of degree two contained in a proper submodule are always homogenous. We will show this by constructing, when $\chi = 0$, non-homogeneous automorphisms of reducible tensor modules. \end{remark} \subsubsection{Singular vectors of degree two, non-graded case}\label{lambdavectors} Our setting is as above in \seref{ssnongraded} and we identify, again, all ${\mathcal{V}}(\Pi \boxtimes \kk_\lambda, R(\pi_n))$ with each other. \begin{proposition} Let $S = \sum_{ij} \partial_i \partial_j \otimes f^{ij}(u) + \sum_k \partial_k \otimes s^k + 1 \otimes s$. Then $S$ is singular in ${\mathcal{V}}(\Pi \boxtimes \kk_0, R(\pi_n))$ if and only if $S_\lambda := S + \lambda\, \ell \otimes u$ is singular in $V = {\mathcal{V}}(\Pi \boxtimes \kk_\lambda, R(\pi_n))$. \end{proposition} \begin{proof} Proceed as in \prref{nongradedsingular}. The only two terms that do not obviously lie in $(\fil^2 H \tp H) \tp_H V$ cancel with each other modulo $(\fil^2 H \tp H) \tp_H V$. \end{proof} If $W \subset {\mathcal{V}}(R)$ is a subset of singular vectors of degree two, it makes sense to denote by $W_\lambda$ the set of all $S_\lambda$, where $S \in W$. \subsection{Classification of singular vectors} As a result of the above discussion, we obtain the following classification of singular vectors. \begin{theorem}\label{singclassification} Let $V= {\mathcal{V}}(\Pi', U)$ be a tensor module over $H(\dd,\chi,\om)$, where $\Pi' \boxtimes U$ is an irreducible ${\mathfrak{d}}' \oplus \sp\,\dd$-module in which $c\in {\mathfrak{d}}'$ acts via multiplication by $\lambda \in \kk$. When $\lambda \neq 0$, denote by $\Pi$ the unique ${\mathfrak{d}}$-module such that $\Pi' \simeq \Pi \boxtimes \kk_\lambda$ as ${\mathfrak{d}}' = \dd^{\bla} \oplus \kk c$-modules; when $\lambda = 0$, set $\Pi$ to satisfy $\Pi' = \pi^* \Pi$. \begin{itemize} \item If $U \simeq R(\pi_0) = \kk$, then $$\sing V = \fil^1 V = \fil^0 V \oplus {\di^0_{\Pi}}^* \fil^0 \V(\Pi_{\chi/2}, R(\pi_1));$$ \item if $U \simeq R(\pi_n), 1 \leq n < N,$ then \begin{equation*} \begin{split} \sing V = \fil^0 V & \oplus \,{\di^n_{\Pi}} \fil^0\V(\Pi_{\chi/2}, R(\pi_{n-1}))\\ & \oplus{\di^n_{\Pi}}^* \fil^0\V(\Pi_{\chi/2}, R(\pi_{n+1}))\\ & \oplus \left(\din\dinminusonestar \fil^0 \V(\Pi_\chi, R(\pi_n))\right)_\lambda; \end{split} \end{equation*} \item if $U \simeq R(\pi_N)$ then \begin{equation*} \begin{split} \sing V = \fil^0 V & \oplus \di^N_{\Pi} \fil^0 \V(\Pi_{\chi/2}, R(\pi_{N-1}))\\ & \oplus \left(\di^N_{\Pi} {\di^{N-1}_{\Pi}}^* \fil^0 \V(\Pi_\chi, R(\pi_N))\right)_\lambda; \end{split} \end{equation*} \item $\sing V = \fil^0 V$ in all other cases. \end{itemize} \end{theorem} \begin{remark}\label{uptomultiplication} It is not difficult to show that singular vectors of degree two may also be obtained as ${\di^n_{\Pi}}^* {\di^{n+1}_{\Pi_{\chi/2}}} \fil^0 \V(\Pi_\chi, R(\pi_n))$ in the tensor module $\V(\Pi, R(\pi_n)), 1 \leq n < N,$ and as $\Di_{\Pi} \fil^0 \V(\Pi_\chi, R(\pi_N))$ in $\V(\Pi_\chi, R(\pi_N))$. This shows that $\din\dinminusonestar$ and ${\di^n_{\Pi}}^* {\di^{n+1}_{\Pi_{\chi/2}}}$ (resp. $\diN\diNminusonestar$ and $\Di_{\Pi}$) coincide up to multiplication by a non-zero scalar. \end{remark} \section{Submodules of tensor modules, graded case}\label{ssubmtm} \begin{comment} Let us recall what we know so far. \begin{itemize} \item Explicit classification of singular vectors inside tensor modules (especially reducible ones ${\mathcal{V}}(\Pi, \pi_p)$). \item Homomorphisms $d^* d, d d^*: {\mathcal{V}}^p \to {\mathcal{V}}^p$ are non-zero if $p \neq 0, N$, and are equal up to a multiplicative constant. (this can be seen by checking what happens if the composition vanishes. Easily get a contradiction by obtaining a false inclusion of singular vectors). \item Have a list of submodules, along with their singular vectors: $d{\mathcal{V}}^{p-1}, d^*{\mathcal{V}}_{p+1} \subset {\mathcal{V}}^p$ containing both singular vectors of degree one and two; their intersection only containing singular vectors of degree two; their sum containing all singular vectors but constant ones -- can be seen because both submodules are graded ones in non-zero degrees, so is their sum; $dd^* V^p$ only containing singular vectors of degree two. \end{itemize} We want to show that $dd^* {\mathcal{V}}^p = d {\mathcal{V}}^{p-1} \cap d^* {\mathcal{V}}^{p+1}$ and that there are no other submodules. \end{comment} In this section we will show that the only non-zero proper submodules of tensor modules appearing in a twisted conformally symplectic pseudo de Rham complex are either the image of a differential or the sum/intersection of two such images. Notice that the action of ${\mathcal{P}}$ on all such modules factors through ${\mathcal{H}}$, so that it makes sense to talk of {\em homogeneous} singular vectors. Throughout this section, $\Pi$ is an irreducible finite-dimensional ${\mathfrak{d}}$-module and ${\mathcal{V}}(\Pi, U)$ denotes the $H(\dd,\chi,\om)$-tensor module ${\mathcal{V}}(\pi^* \Pi, U)$. \subsection{Automorphisms of tensor modules} Let $f\colon V \to V$ be a homomorphism of tensor modules. Then $f$ maps constant vectors in $V$, which are singular, to $\sing V$. If $f$ is non-zero, then $f|_{\fil^0 V}$ must be an isomorphism. This is typically possible only when $f$ is a multiple of the identity. However, the case of reducible tensor modules over $H(\dd,\chi,\om)$ is a remarkable exception, when $\chi=0$. \begin{theorem} Let $V = \V(\Pi, R(\pi_n))$, $1 \leq n \leq N$, be an $H(\dd,0,\om)$-module. Then each $H(\dd,0,\om)$-endomorphism of $V$ is of the form $f_{\alpha \beta} = \alpha \id_V + \beta \dinchizero\dinmochizerostar$ for some choice of $\alpha, \beta \in \kk$. The endomorphism $f_{\alpha \beta}$ is invertible if and only if $\alpha \neq 0$. \end{theorem} \begin{proof} The maps $\id_V$ and $\dinchizero\dinmochizerostar$ are commuting $H(\dd,0,\om)$-endomorphisms, and so are their linear combinations. As $\id_V$ is invertible and $\dinchizero\dinmochizerostar$ is nilpotent, the invertibility claim follows. As for showing that an $H(\dd,0,\om)$-homomorphism $f: V \to V$ is necessarily of this form, notice that if $f$ is non-zero, then it must map $\fil^0 V \simeq \Pi \boxtimes R(\pi_n)$ to an irreducible ${\mathfrak{d}} \oplus \sp\,\dd$-component of $\sing V$. However, since $\chi=0$, the constant and the degree two summands are isomorphic. Composing $f$ with projections to components of degree zero and two yields ${\mathfrak{d}} \oplus \sp\,\dd$-homomorphisms that must be scalar multiples of $\id$ and ${\mathfrak{d}}^*$ by irreducibility of $\fil^0 V$ and Schur's Lemma. \end{proof} When $\chi \neq 0$, the irreducible ${\mathfrak{d}} \oplus \sp\,\dd$-summands of $\sing V$ are pairwise non-isomorphic, hence homogeneous. When $\chi = 0$, however, non-homogeneous singular vectors only occur in some $f_{\alpha\beta}\fil^0 V,$ where $\alpha$ and $\beta$ are both non-zero. In this case, as $V$ is spanned over $H$ by its constant singular vectors, $V=f(V)$ is also $H$-spanned by $f_{\alpha\beta}\fil^0 V$, so that if $M\subset V$ is an $H(\dd,0,\om)$-submodule containing $f_{\alpha\beta}\fil^0 V, \alpha \neq 0,$ then $M = V$. This proves the following claim \begin{proposition} Every proper submodule of a tensor module $\V(\Pi, R(\pi_n)), 1 \leq n \leq N,$ contains the homogenous components of all of its singular vectors. \end{proposition} \subsection{Classification of submodules of tensor modules} Throughout this section, we will make repeated use of the standard homomorphism theorem in the following form: if $f\colon M \to N$ is a morphism of modules, and $M_0 \subset M$ is a submodule, then $$f(M_0) \simeq (M_0 + \ker f) /\ker f \simeq M_0 / (M_0 \cap \ker f).$$ \begin{lemma}\label{singimd} If $1 \leq n \leq N$, then \begin{equation*} \begin{split} \sing \, & \din\VPinminusone \\ & = {\di^n_{\Pi}} \fil^0 \V(\Pi_{\chi/2}, R(\pi_{n-1})) \oplus \din\dinminusonestar \fil^0 \V(\Pi_\chi, R(\pi_n)). \end{split} \end{equation*} \end{lemma} \begin{proof} We know that $$\sing \V(\Pi_{\chi/2}, R(\pi_{n-1})) \supset \fil^0 \V(\Pi_{\chi/2}, R(\pi_{n-1})) \oplus {\di^{n-1}_{\Pi_{\chi/2}}}^* \fil^0 \V(\Pi_\chi, R(\pi_n)).$$ Applying ${\di^n_{\Pi}}$ to both sides and using \leref{singtosing} one obtains \begin{equation*} \begin{split} \sing \, & \din\VPinminusone \\ & \supset {\di^n_{\Pi}} \fil^0 \V(\Pi_{\chi/2}, R(\pi_{n-1})) \oplus \din\dinminusonestar \fil^0 \V(\Pi_\chi, R(\pi_n)). \end{split} \end{equation*} In order to show that the above inclusion is indeed an equality, recall \thref{singclassification} and observe that $\din\VPinminusone$ is a proper submodule of $\V(\Pi, R(\pi_n))$, so it cannot contain constant singular vectors. Moreover, when $n<N$, $\din\VPinminusone$ cannot contain ${\di^n_{\Pi}}^* \fil^0 \V(\Pi_{\chi/2}, R(\pi_{n+1}))$ as this is not killed by ${\di^{n+1}_{\Pi_{-\chi/2}}}.$ \end{proof} \begin{lemma}\label{singimd*} If $0 \leq n < N$, then \begin{equation*} \begin{split} & \sing \, \dinstar\VPinplusone \\ & = {\di^n_{\Pi}}^* \fil^0 \V(\Pi_{\chi/2}, R(\pi_{n+1})) \oplus \din\dinminusonestar \fil^0 \V(\Pi_\chi, R(\pi_n)). \end{split} \end{equation*} \end{lemma} \begin{proof} Similar, using \reref{uptomultiplication}. \end{proof} \begin{lemma}\label{uniquesingularsummand} If $0<n\leq N$, then $$\sing \dindinminusonestar \VPichin = \din\dinminusonestar \fil^0 \V(\Pi_\chi, R(\pi_n)).$$ \end{lemma} \begin{proof} The homomorphism $\din\dinminusonestar$ is homogeneous of degree two, so the subspace $\sing \dindinminusonestar \VPichin$ can only contain elements of degree $\geq 2$. As $\din\dinminusonestar$ is non-zero, constant vectors are mapped non trivially to singular vectors of degree two. \end{proof} \begin{proposition}\label{dd*irr} $\dindinminusonestar \VPichin$ is irreducible for every $0<n\leq N$. \end{proposition} \begin{proof} As $\dindinminusonestar \VPichin = \din\dinminusonestar\V(\Pi_\chi, R(\pi_n))$, it is $H$-spanned by $\din\dinminusonestar \fil^0 \V(\Pi_\chi, R(\pi_n))$, which by previous lemma is an irreducible ${\mathfrak{d}}\oplus\sp\,\dd$-summand containing all singular vectors. A non-zero submodule of $\dindinminusonestar \VPichin$ must then contain all of its singular vectors, which $H$-span it. \end{proof} \begin{corollary}\label{imD} $\im \Di_{\Pi}$ is irreducible. \end{corollary} \begin{proof} As $\Di_{\Pi}$ coincides with $\diN\diNminusonestar$ up to a non-zero multiplicative constant, it follows from \prref{dd*irr}. \end{proof} \begin{proposition}\label{maximalp} If $0 < n < N$, then \begin{enumerate} \item $\din\VPinminusone \cap \dinstar\VPinplusone$ is maximal in $\din\VPinminusone$; \item $\din\VPinminusone \cap \dinstar\VPinplusone$ is maximal in $\dinstar\VPinplusone$; \item $\din\VPinminusone$ is maximal in $\din\VPinminusone + \dinstar\VPinplusone$; \item $\dinstar\VPinplusone$ is maximal in $\din\VPinminusone + \dinstar\VPinplusone$. \end{enumerate} \end{proposition} \begin{proof} One has \begin{equation*} \begin{split} \dinstar\VPinplusone /( & \din\VPinminusone \cap \dinstar\VPinplusone) = \\ (\dinstar\VPinplusone & + \din\VPinminusone)/\din\VPinminusone, \end{split} \end{equation*} by standard homomorphism properties. Moreover \begin{equation*} \begin{split} \im {\di^{n+1}_{\Pi_{-\chi/2}}} & {\di^n_{\Pi}}^*\\ & = {\di^{n+1}_{\Pi_{-\chi/2}}}( \din\VPinminusone + \dinstar\VPinplusone), \end{split} \end{equation*} and this equals \begin{equation*} \begin{split} (& \din\VPinminusone + \dinstar\VPinplusone)/\ker {\di^{n+1}_{\Pi_{-\chi/2}}}\\ & = ( \din\VPinminusone + \dinstar\VPinplusone)/\din\VPinminusone. \end{split} \end{equation*} By \prref{dd*irr}, $\im {\di^{n+1}_{\Pi_{-\chi/2}}} {\di^n_{\Pi}}^*$ is irreducible, hence so are all the above quotients, proving (2) and (3); (1) and (4) are proved similarly. \end{proof} \begin{theorem}\label{submodN} $\V(\Pi, R(\pi_n)) \varsupsetneq \din\VPinminusone \varsupsetneq \DiPi\VPichiN$ are the only non-zero submodules of $\V(\Pi, R(\pi_N))$. \end{theorem} \begin{proof} First of all, $$\DiPi\VPichiN = \ker {\di^{N-1}_{\Pi_{-\chi/2}}}^*, \qquad \ker \Di_{\Pi_{-\chi}} = \diN\VPiNminusone$$ by exactness of the conformally symplectic pseudo de Rham complex. The submodule $\DiPi\VPichiN $ is irreducible by \coref{imD} and is therefore minimal in $\V(\Pi, R(\pi_N))$. Similarly, $\Di_{\Pi_{-\chi}} \V(\Pi, R(\pi_N))$ is irreducible. We show now that $\diN\VPiNminusone$ is maximal in $\V(\Pi, R(\pi_N))$. Indeed $$\V(\Pi, R(\pi_N))/\diN\VPiNminusone = \V(\Pi, R(\pi_N))/\ker\Di_{\Pi_{-\chi}} \simeq \im \Di_{\Pi_{-\chi}},$$ which is irreducible. Finally, $\DiPi\VPichiN$ is a submodule of $\diN\VPiNminusone $ as $\Di_{\Pi}$ equals $\diN\diNminusonestar$ up to a non-zero multiplicative constant; it is indeed maximal since \begin{equation*} \begin{split} \diN\VPiNminusone& /\DiPi\VPichiN\\ & \simeq {\di^{N-1}_{\Pi_{-\chi/2}}}^* \diN\VPiNminusone\\ & = \di^{N-1}_{\Pi_{-\chi/2}}{\di^{N-2}_\Pi}^* \V(\Pi_{\chi/2}, R(\pi_{N-1})), \end{split} \end{equation*} as $\ker {\di^{N-1}_{\Pi_{-\chi/2}}}^* = \DiPi\VPichiN$. We have proved so far that the submodule $\diN\VPiNminusone$ is maximal, that $\DiPi\VPichiN= \diNdiNminusonestar \VPichiN$ is minimal, and that $\DiPi\VPichiN$ is maximal inside $\diN\VPiNminusone$. Every proper submodule contains non-constant homogeneous singular vectors, and is therefore contained in $\diN\VPiNminusone$. If it furthermore contains singular vectors of degree one, then it coincides with $\diN\VPiNminusone$, as this is generated by its singular vectors of degree one. If instead it does not contain singular vectors of degree one, then it lies between $\DiPi\VPichiN$ and $\diN\VPiNminusone$, and must then coincide with the latter by maximality. \end{proof} \begin{lemma}\label{shapeN-1} The submodule $$\di^{N-1}_{\Pi} \V(\Pi_{\chi/2}, R(\pi_{N-2})) + {\di^{N-1}_{\Pi_{\chi/2}}}^* \V(\Pi_{\chi/2}, R(\pi_{N})) \subset \V(\Pi, R(\pi_{N-1}))$$ is maximal and \begin{equation*} \begin{split} \di^{N-1}_{\Pi} &{\di^{N-2}_{\Pi_{\chi/2}}}^* \V(\Pi_\chi, R(\pi_{N-1}))\\ & = \di^{N-1}_{\Pi} \V(\Pi_{\chi/2}, R(\pi_{N-2}))) \cap {\di^{N-1}_{\Pi_{\chi/2}}}^* \V(\Pi_{\chi/2}, R(\pi_{N})). \end{split} \end{equation*} \end{lemma} \begin{proof} By \thref{submodN} we know that the quotient $$\diN\VPiNminusone/\di^{N-1}_{\Pi} {\di^{N-2}_{\Pi_{\chi/2}}}^* \V(\Pi_\chi, R(\pi_{N-1}))$$ is irreducible. However this equals \begin{equation*} \begin{split} \diN\VPiNminusone/\di^N_{\Pi}&(\im\di^{N-1}_{\Pi} +\im{\di^{N-1}_{\Pi_{\chi/2}}}^* ) \\ & = \V(\Pi_{\chi/2}, R(\pi_{N-1}))/(\im\di^{N-1}_{\Pi} +\im{\di^{N-1}_{\Pi_{\chi/2}}}^* ), \end{split} \end{equation*} thus proving the first claim. Notice now that $$\im \di^{N-1}_{\Pi} {\di^{N-2}_{\Pi_{\chi/2}}}^* = \im {\di^{N-1}_{\Pi_{\chi/2}}}^* \di^N_{\Pi_{\chi/2}}$$ is contained in $\im \di^{N-1}_{\Pi} \cap \im {\di^{N-1}_{\Pi_{\chi/2}}}^*,$ and that the quotient $$\left(\im\di^{N-1}_{\Pi} \cap \im{\di^{N-1}_{\Pi_{\chi/2}}}^* \right)/\im\di^{N-1}_{\Pi} {\di^{N-2}_{\Pi_{\chi/2}}}^*$$ injects inside \begin{equation*} \begin{split} \im {\di^{N-1}_{\Pi_{\chi/2}}}^*/&\im {\di^{N-1}_{\Pi_{\chi/2}}}^* \di^N_{\Pi_{\chi/2}} \\ = &\V(\Pi_{\chi/2}, R(\pi_{N-2}))/(\im \di^N_{\Pi_{\chi/2}} + \ker {\di^{N-1}_{\Pi_{\chi/2}}}^*)\\ = &\V(\Pi_{\chi/2}, R(\pi_{N-2}))/\im\di^N_{\Pi_{\chi/2}}, \end{split} \end{equation*} which is irreducible. Therefore $$\im \di^{N-1}_{\Pi} \cap \im {\di^{N-1}_{\Pi_{\chi/2}}}^* = \im\di^{N-1}_{\Pi} {\di^{N-2}_{\Pi_{\chi/2}}}^*,$$ since $$\im \di^{N-1}_{\Pi} \cap \im {\di^{N-1}_{\Pi_{\chi/2}}}^* \neq \im {\di^{N-1}_{\Pi_{\chi/2}}}^*.$$ \end{proof} \begin{proposition}\label{pmaximalsubmodule} If $1 \leq n < N$, then $\din\VPinminusone+\dinstar\VPinplusone$ is maximal in $\V(\Pi, R(\pi_n))$, and $$\dindinminusonestar \VPichin = \din\VPinminusone\cap\dinstar\VPinplusone.$$ \end{proposition} \begin{proof} By induction on $N-n$, the basis of induction being \leref{shapeN-1}. The quotient $$\V(\Pi, R(\pi_n))/(\din\VPinminusone+\dinstar\VPinplusone)$$ is isomorphic to $$\di^{n+1}_{\Pi_{-\chi/2}} \V(\Pi, R(\pi_n)) / \im \di^{n+1}_{\Pi_{-\chi/2}} {\di^n_{\Pi}}^*$$ which equals $$\im \di^{n+1}_{\Pi_{-\chi/2}}/(\im \di^{n+1}_{\Pi_{-\chi/2}} \cap \im {\di^{n+1}_{\Pi_{-\chi/2}}}^*$$ by inductive hypothesis. However this is irreducible by \prref{maximalp}. As for the second claim, notice that $$\dindinminusonestar \VPichin \subset \din\VPinminusone\cap\dinstar\VPinplusone$$ is irreducible by \prref{dd*irr}, and is therefore minimal. Now proceed as in previous lemma: the quotient $$(\din\VPinminusone\cap\dinstar\VPinplusone)/\dindinminusonestar \VPichin$$ injects inside \begin{equation*} \begin{split} & \dinstar\VPinplusone /\im {\di^n_{\Pi}}^* {\di^{n+1}_{\Pi_{\chi/2}}}\\ & = \V(\Pi_{\chi/2}, R(\pi_{n+1}))/(\im {\di^{n+1}_{\Pi_{\chi/2}}} + \im {\di^{n+1}_{\Pi_{\chi/2}}}^*), \end{split} \end{equation*} which is irreducible by inductive hypothesis. Thus $\din\VPinminusone \cap \dinstar\VPinplusone$ equals $\dindinminusonestar \VPichin$, otherwise $$\din\VPinminusone \cap \dinstar\VPinplusone =\dinstar\VPinplusone,$$ whence $$\dinstar\VPinplusone \subset \din\VPinminusone,$$ a contradiction. \end{proof} \begin{corollary}\label{submodulesofimd} $\din\VPinminusone \cap \dinstar\VPinplusone$ is the only non-zero submodule of both $\din\VPinminusone$ and $\dinstar\VPinplusone$. \end{corollary} \begin{proof} We have seen in \leref{singimd} and \leref{singimd*} that the only non-constant homogeneous singular vectors in both modules are contained in $$\din\dinminusonestar \fil^0 \V(\Pi_\chi, R(\pi_n))),$$ which $H$-span $\dindinminusonestar \VPichin =\din\VPinminusone \cap \dinstar\VPinplusone.$ Any proper submodule must then contain this submodule, which is however maximal in both $\din\VPinminusone$ and $\dinstar\VPinplusone$ by \prref{maximalp}. \end{proof} \begin{corollary}\label{supmodulesofimd} If $M$ is a proper submodule of $\V(\Pi, R(\pi_n))$ strictly containing either $\din\VPinminusone$ or $\dinstar\VPinplusone$ then necessarily $$M = \din\VPinminusone + \dinstar\VPinplusone.$$ \end{corollary} \begin{proof} Let us treat the case $M \supsetneq \dinstar\VPinplusone$, the other case being totally analogous. Submodules lying between $\dinstar\VPinplusone$ and $\V(\Pi, R(\pi_n))$ are in one-to-one correspondence with submodules of $$\V(\Pi, R(\pi_n))/\dinstar\VPinplusone \simeq {\di^{n-1}_{\Pi_{-\chi/2}}}^* \V(\Pi, R(\pi_n))$$ so that we may use \coref{submodulesofimd} to show that there is a single possibility for $M$, which must be $\din\VPinminusone + \dinstar\VPinplusone.$ \end{proof} \begin{proposition}\label{peitheror} A proper non-zero submodule of $\V(\Pi, R(\pi_n))$ either contains, or is contained in, either $\din\VPinminusone$ or $\dinstar\VPinplusone$. \end{proposition} \begin{proof} Assume by contradiction that there is a submodule $M$ which neither contains nor is contained in the above two submodules; in particular, $M$ intersects both modules in $\dindinminusonestar \VPichin$. Then $M + \din\VPinminusone$ (resp. $M + \dinstar\VPinplusone$ strictly contains $\din\VPinminusone$ (resp. $\dinstar\VPinplusone)$). However $$M + \din\VPinminusone = \V(\Pi, R(\pi_n)) = M + \dinstar\VPinplusone$$ cannot both hold. If so, then \begin{equation} \begin{split} M/\dindinminusonestar \VPichin = M/(M \cap \din\VPinminusone)\\ \simeq (M+\din\VPinminusone)/\din\VPinminusone\\ \simeq \V(\Pi, R(\pi_n))/\din\VPinminusone \end{split} \end{equation} and similarly \begin{equation} \begin{split} M/\dindinminusonestar \VPichin = M/(M \cap \dinstar\VPinplusone)\\ \simeq (M+\dinstar\VPinplusone)/\dinstar\VPinplusone\\ \simeq \V(\Pi, R(\pi_n))/\dinstar\VPinplusone. \end{split} \end{equation} This would force \begin{equation} \begin{split} \di^{n+1}_{\Pi_{-\chi/2}} \V(\Pi, R(\pi_n))& \simeq \V(\Pi, R(\pi_n))/\din\VPinminusone\\ & \simeq \V(\Pi, R(\pi_n))/\dinstar\VPinplusone\\ & \simeq \im {\di^{n-1}_{\Pi_{-\chi/2}}}^*, \end{split} \end{equation} which yields an easy contradiction by comparing the structure of singular vectors. Let us thus assume that $$M + \din\VPinminusone = \din\VPinminusone + \dinstar\VPinplusone,$$ as the other case is done similarly. Then $$\di^{n+1}_{\Pi_{-\chi/2}} M = \im \di^{n+1}_{\Pi_{-\chi/2}} {\di^n_{\Pi}}^*.$$ However, $\ker \di^{n+1}_{\Pi_{-\chi/2}} \cap M$ is a submodule of $\din\VPinminusone \cap M$, which contains $\din\VPinminusone \cap \dinstar\VPinplusone$. Since $M$ does not contain $\din\VPinminusone$, it must equal $\din\VPinminusone \cap \dinstar\VPinplusone$. Then \begin{equation} \begin{split} & M/(\din\VPinminusone \cap \dinstar\VPinplusone) =\\ & M/(\ker \di^{n+1}_{\Pi_{-\chi/2}} \cap M) \simeq \di^{n+1}_{\Pi_{-\chi/2}} M = \im \di^{n+1}_{\Pi_{-\chi/2}} {\di^n_{\Pi}}^*\\ & \simeq \dinstar\VPinplusone/(\ker \di^{n+1}_{\Pi_{-\chi/2}} \cap \dinstar\VPinplusone)\\ & = \dinstar\VPinplusone/(\din\VPinminusone \cap \dinstar\VPinplusone), \end{split} \end{equation} thus showing $M = \dinstar\VPinplusone$, a contradiction. \end{proof} Results of this section may be now summarized as follows: \begin{theorem} Let\/ $V={\mathcal{V}}(\Pi, U)$ be a tensor module over\/ $H(\dd,\chi,\om)$, where $\Pi$ and\/ $U$ are finite-dimensional irreducible representations of\/ ${\mathfrak{d}}$ and\/ $\sp\,\dd$, respectively. A complete list of\/ $H(\dd,\chi,\om)$-submodules of $V$ is as follows: \begin{itemize} \item $V \supset \dizerostar \VPione \supset 0$ if $U \simeq \kk$; \item $V \supset \din\VPinminusone+\dinstar\VPinplusone$ $\supset \din\VPinminusone$, $\dinstar\VPinplusone \supset \din\VPinminusone\cap\dinstar\VPinplusone \supset 0$ if $U \simeq R(\pi_n), 1 \leq n < N$; \item $V \supset \diN\VPiNminusone \supset \DiPi\VPichiN \supset 0$ if $U = R(\pi_N)$; \item $V \supset 0$ in all other cases. \end{itemize} \end{theorem} \begin{comment} \begin{proof} The case $U = R(\pi_N)$ has already been treated in \thref{submodN}. When $U$ is not of the type $R(\pi_n), 0\leq n \leq N,$ there is nothing to prove as $V$ is irreducible. When $U = \kk$, then ${{\mathrm{d}}^0_\Pi}^*{\mathcal{V}}(\Pi_{\chi/2}, R(\pi_1))$ is generated by its singular vectors and is therefore minimal. Moreover, it is of codimension one, hence it is also maximal. We are left with the case when $U=R(\pi_n), 1 \leq n < N$. Let $M$ be a proper non-zero submodule of $V$: first of all notice that $M$ contains ${\mathrm{d}}^{n}_{\Pi}{{\mathrm{d}}^{n-1}_{\Pi_{\chi/2}}}^* {\mathcal{V}}(\Pi_{\chi}, R(\pi_n))$, as homogeneous singular vectors of degree two are spanned over $H$ by each irreducible summand. If $M$ is contained in either ${\mathrm{d}}^n_{\Pi} {\mathcal{V}}(\Pi_{\chi/2}, R(\pi_{n-1}))$ or ${{\mathrm{d}}^n_{\Pi}}^* {\mathcal{V}}(\Pi_{\chi/2}, R(\pi_{n+1}))$, then there is nothing to prove, as possible submodules are listed in \coref{submodulesofimd}. We may use \coref{supmodulesofimd} if $M$ contains either ${\mathrm{d}}^n_{\Pi} {\mathcal{V}}(\Pi_{\chi/2}, R(\pi_{n-1}))$ or ${{\mathrm{d}}^n_{\Pi}}^* {\mathcal{V}}(\Pi_{\chi/2}, R(\pi_{n+1}))$. \end{proof} \end{comment} \section{Submodules of tensor modules, non-graded case}\label{ssubmtmnongr}\label{ten} Throughout this section, $\chi = 0, \omega = {\mathrm{d}} {\zeta}$, so that ${\mathfrak{d}}' = \dd^{\bla} \oplus \kk c$. Let $\Pi'$ be a finite-dimensional irreducible ${\mathfrak{d}}'$-module. We have already seen that $\sing \VPiprimen \cap \fil^1 \VPiprimen$ contains canonical irreducible ${\mathfrak{d}}' \oplus \sp\,\dd$-summands isomorphic to $\Pi' \boxtimes R(\pi_{n-1})$ and $\Pi' \boxtimes R(\pi_{n+1})$. Recall that $\VPiprimen$ was constructed as an induced module, so that we may use its universal property in order to construct $H(\dd,0, \di \zeta)$-module homomorphisms \begin{equation*} \begin{split} \DIn\colon& \VPiprimenminusone \to \VPiprimen,\qquad n = 1, \dots, N,\\ \DInstar\colon& \VPiprimenplusone \to \VPiprimen,\qquad n = 0, \dots, N-1, \end{split} \end{equation*} that are, by Schur's Lemma, only determined up to multiplication by a nonzero scalar. Notice that when the ${\mathfrak{d}}'$-module $\Pi'$ factors through a ${\mathfrak{d}}$-module $\Pi$, i.e., when $c$ acts trivially and $\Pi' = \pi^* \Pi$, then one has $\DIn = \di^n_{\Pi}, \DInstar = \di^{2N-n}_{\Pi_{\phi}}$, up to the above undetermined scalar multiple. However, throughout the rest of this section, $c$ will act via multiplication by a scalar $0 \neq \lambda \in \kk$. We also set $\DImostar = \DIzero = 0$. Then $\DInplusone \DIn = 0$, for all $0 \leq n \leq N-1$ as $\sing \VPiprimenplusone$ contains no ${\mathfrak{d}}' \oplus \sp\,\dd$-irreducible summand isomorphic to $\Pi' \boxtimes R(\pi_{n-1})$. Similarly, $\DInminusonestar \DInstar = 0$, for all $0 \leq n \leq N-1$. Recall that \begin{equation*} \begin{split} \sing \VPiprimen \cap \fil^1 \VPiprimen = \fil^0 & \VPiprimen \oplus \,\DIn \fil^0\VPiprimenminusone\\ & \oplus\DInstar \fil^0\VPiprimenplusone, \end{split} \end{equation*} when $1 \leq n \leq N-1$, whereas in the case $n = N$, the last direct summand is missing. Notice that when $1 \leq n \leq N$, $\sing \VPiprimen$ also contains an irreducible ${\mathfrak{d}}'\oplus\sp\,\dd$-summand isomorphic to $\Pi' \boxtimes R(\pi_n)$ in degree two, which is however not canonically determined as any complement to $\fil^0 \VPiprimen$ in the $\Pi'\boxtimes R(\pi_n)$-isotypical component of $\sing \VPiprimen$ will do. Recall also that, as $\lambda\neq 0$, we have no well-defined grading to chose a {\em homogeneous} canonical complement. However, we denote by $S_\lambda$ the space of singular vectors of degree two as constructed in \seref{lambdavectors} from homogeneous singular vectors. Before computing the structure of singular vectors in the $H(\dd,0, \di \zeta)$-modules $\im \DIn$, $\im \DInstar$, we need some preliminary results. \begin{lemma} Let $M \subset {\mathcal{V}}(\Pi', U)$ be a proper $H(\dd,0, \di \zeta)$-submodule. If $M$ contains a vector $v \in \fil^1 {\mathcal{V}}(\Pi', U)$, then $v$ is singular. \end{lemma} \begin{proof} We know by \eqref{h1fp} that ${\mathcal{P}}_2 \fil^1 {\mathcal{V}}(\Pi', U) = 0$. If $v$ is not singular, then ${\mathcal{P}}_1 v$ contains a non-zero constant vector, which must lie in $M$. This yields a contradiction as proper submodules do not contain non-zero constant vectors. \end{proof} \begin{remark} The above lemma follows from the general fact that a vector of minimal degree in a proper submodule is always singular. However, we do not need this generality. \end{remark} \begin{lemma}\label{decomposegrd} Let $1 \leq n \leq N-1$. The tensor product of $\sp\,\dd$-modules $S^d({\mathfrak{d}}) \otimes R(\pi_n)$ decomposes as $$R(d\pi_1 + \pi_n) \oplus R((d-1)\pi_1 + \pi_{n-1}) \oplus R((d-1)\pi_1 + \pi_{n+1}) \oplus R((d-2)\pi_1 + \pi_n)).$$ Similarly, $S^d({\mathfrak{d}}) \otimes R(\pi_N)$ decomposes as $$R(d\pi_1 + \pi_N) \oplus R((d-1)\pi_1 + \pi_{N-1}) \oplus R((d-2)\pi_1 + \pi_N)).$$ \end{lemma} \begin{proof} See, e.g, the reference tables at the end of \cite{OV}. \end{proof} Recall that the quotient ${\mathcal{P}}_0/{\mathcal{P}}_1$ acts on the space of singular vectors. However, the Lie subalgebra $\sp\,\dd \simeq {\mathfrak{p}}_0\subset {\mathcal{P}}_0$ is a section of this quotient. It acts on each $H(\dd,0, \di \zeta)$-module and extends the $\sp\,\dd$-action on singular vectors. As $\chi = 0$, and we are disregarding the ${\mathfrak{d}}'$-action, we have already seen that the $\sp\,\dd$-action on $\gr^d {\mathcal{V}}(\Pi', U)$ is isomorphic to $\Pi' \otimes (S^d {\mathfrak{d}} \otimes U)$, where we endow $\Pi'$ with a trivial ${\mathfrak{d}}$-action. Every homomorphism of $H(\dd,0, \di \zeta)$-modules is also an ${\mathfrak{p}}_0 \simeq \sp\,\dd$-module homomorphism. \begin{proposition}\label{psisingular} Let $M \subset {\mathcal{V}}(\Pi', U)$ be a proper $H(\dd,0, \di \zeta)$-submodule. If $M$ contains a vector $v \in \fil^2 {\mathcal{V}}(\Pi', U)$ such that $v \equiv \psi(u) \mod \fil^1{\mathcal{V}}(\Pi', U)$; then $v$ is singular. \end{proposition} \begin{proof} We may assume without loss of generality that the action of $\sp\,\dd$ on $U$ is non-trivial. Then chose $1 \leq n\leq N$ so that $U \simeq R(\pi_n)$. The vector $v$ lies in $\fil^1 {\mathcal{V}}(\Pi', R(\pi_n)) + S_\lambda$, which is a ${\mathfrak{p}}_0\simeq \sp\,\dd$-submodule of ${\mathcal{V}}(\Pi', R(\pi_n))$ isomorphic to $\Pi' \otimes(R(\pi_n) \oplus (R(\pi_{n-1}) \oplus R(\pi_{n+1}) \oplus R(\pi_1 + \pi_n)) \oplus R(\pi_n))$, where we set $R(\pi_{N+1}) = 0$ if $n=N$. As $M$ is a ${\mathfrak{p}}_0$-submodule of ${\mathcal{V}}(\Pi', R(\pi_n))$, it must also contain the projection of $v$ to the $R(\pi_1 + \pi_n)$-isotypical component, which only contains vectors of degree one that are non singular. By previous Lemma, this projection must vanish, hence $v$ lies in the sum of the other components, which only contain singular vectors. \end{proof} \begin{lemma} When $1 \leq n \leq N$, the $\sp\,\dd$-module $\sing \im \DIn$ decomposes as the direct sum of $\DIn \fil^0 \VPiprimenminusone$ and an irreducible summand of singular vectors of degree two. Similarly, when $1 \leq n \leq N-1$, the $\sp\,\dd$-module $\sing \im \DInstar$ decomposes as the direct sum of $\DInstar \fil^0 \VPiprimenplusone$ and an irreducible summand of singular vectors of degree two. \end{lemma} \begin{proof} We will only prove the first statement, as the other one is completely analogous. The map $\DIn: \VPiprimenminusone \to \VPiprimen$ is a homomorphism of $H(\dd,0, \di \zeta)$-modules, so it commutes with the action of ${\mathfrak{p}}_0$. We already know that \begin{equation*}\label{singvpin} \begin{split} \sing \VPiprimen = \fil^0 & \VPiprimen \oplus \DIn \fil^0 \VPiprimenminusone\\ & \oplus \DInstar \fil^0 \VPiprimenplusone \oplus S_\lambda, \end{split} \end{equation*} where the first summand in the right-hand side is $\fil^0 \VPiprimen$, the next two summands are singular vectors of degree one, and the last summand consists of singular vectors of degree two as constructed in \seref{lambdavectors} starting from homogenous vectors. The third summand does not lie in $\im \DIn$, as by \leref{decomposegrd} the irreducible representation $R(\pi_{n+1})$ does not show up as a direct summand in any $S^d {\mathfrak{d}} \otimes R(\pi_{n-1})$. In particular, $\im \DIn$ is a proper submodule of $\VPiprimen$, hence it does not contain constant vectors either. However, it contains $\DIn \fil^0 {\mathcal{V}}(\Pi', R(\pi_{n-1}))$, i.e., the second summand, by construction. If $\Pi' \boxtimes U$ is an irreducible representation of ${\mathfrak{d}}' \oplus \sp\,\dd$, and the action of $\sp\,\dd$ is not trivial, we have seen in \coref{psiinm} that every submodule $M \subset {\mathcal{V}}(\Pi', U)$ contains a vector coinciding with $\psi(u)$ modulo $\fil^1 {\mathcal{V}}(\Pi', U)$, which must be singular due to \prref{psisingular}. Thus $\im \DIn$ contains an irreducible $\sp\,\dd$-summand of degree two singular vectors. \end{proof} \begin{proposition} For each $1 \leq n \leq N-1$, the $H(\dd,0, \di \zeta)$-module $\VPiprimen$ decomposes as the direct sum of $\im \DIn$ and $\im \DInstar$. Moreover, $\im \DIn$ is an irreducible $H(\dd,0, \di \zeta)$-module for all $1 \leq n \leq N$. \end{proposition} \begin{proof} Let us treat the case $n=1$ first. We already know from \prref{irreduciblecnonzero} that $\VPiprimezero$ is an irreducible $H(\dd,0, \di \zeta)$-module. As $\DIzero$ is non-zero, it is injective by irreducibility of $\VPiprimezero$, and its image is then isomorphic to $\VPiprimezero$, hence it is irreducible. The intersection $\im \DIzero \cap \im \DIzerostar$ is an $H(\dd,0, \di \zeta)$-submodule of $\im \DIzero$, which is irreducible, and comparing singular vectors shows that $\im \DIzero$ is not contained in $\im \DIzerostar$. Thus the intersection is trivial. As for the sum $\im \DIzero + \im \DIzerostar$, it contains two irreducible summands of singular vectors of the degree two, which must be distinct as we already know the intersection to be trivial. Then $\im \DIzero + \im \DIzerostar$ contains constant vectors in $\VPiprimezero$, hence it coincides with $\VPiprimezero$. Let us now proceed by induction on $n>1$. Assume we know that $\VPiprimen = \im \DIn \oplus \im \DInstar$; then applying $\DInplusone$, we obtain $$\im \DInplusone = \DInplusone \VPiprimen =\DInplusone \DInstar \VPiprimenplusone.$$ We know that each tensor module is generated by its constant singular vectors, and the same is true of the image of a tensor module via a $H(\dd,0, \di \zeta)$-homomorphism. Consequently, $\im\DInplusone$ is spanned over $H$ by $\DInplusone \fil^0 \VPiprimen$, but also by $\DInplusone \DInstar \fil^0 \VPiprimenplusone$, as they are the two ${\mathfrak{d}}'\oplus \sp\,\dd$-irreducible summands of $\sing \im \DInplusone$. As every $H(\dd,0, \di \zeta)$-submodule of $\im \DInplusone$ must contain non-zero singular vectors, this shows that $\im \DInplusone$ has no proper non-zero submodules, i.e., it is irreducible. Once we know that $\im \DInplusone$ is $H(\dd,0, \di \zeta)$-irreducible, and $n+1 \neq N$, then we may argue as in the case $n = 1$ that $\im \DInplusone \cap \im \DInplusonestar = 0$ by irreducibility of $\im \DInplusone$ and $\VPiprimenplusone = \im \DInplusone + \im \DInplusonestar$ because it contains non-zero constant vectors. In other words, $\VPiprimenplusone = \im \DInplusone \oplus \im \DInplusonestar$. \end{proof} \begin{proposition} For each $0 \leq n \leq N-2$, the $H(\dd,0, \di \zeta)$-module $\im \DInstar$ is irreducible. \end{proposition} \begin{proof} The case $n=0$ is immediate, as $\im \DIzerostar = \V(\Pi, \kk)$. If $n>0$, we know that $\im \DInstar = \DInstar \VPiprimenplusone = \DInstar (\im \DInplusone \oplus \im \DInplusonestar). $ Thus $$\im \DInstar = \DInstar \VPiprimenplusone = \DInstar\DInplusone \VPiprimen.$$ Then we may argue, as in the proof of the previous proposition, that $\im \DInstar$ is $H$-linearly generated by each of the two ${\mathfrak{d}}'\oplus\sp\,\dd$-irreducible summands of singular vectors it contains. Thus, it is irreducible. \end{proof} We have seen above that $\im \DIN \subset \VPiprimeN$ is irreducible, and we know that its singular vectors contain a degree two summand. Let $\eta: \VPiprimeN \to \VPiprimeN$ the $H(\dd,0, \di \zeta)$-homomorphism mapping nontrivially $\fil^0 \VPiprimeN$ to this summand. Then $\im \eta$ is contained in $\im \DIN$, and coincides with it by irreducibility of $\im \DIN$. In particular, $\eta$ is not injective, as it is not injective on $\sing \VPiprimeN$. Then $\ker \eta$ is a proper $H(\dd,0, \di \zeta)$-submodule of $\VPiprimeN$, which cannot contain constant vectors. \begin{lemma} The $H(\dd,0, \di \zeta)$-submodule $\ker \eta \subset \VPiprimeN$ does not contain singular vectors of degree one. \end{lemma} \begin{proof} As $\eta$ is an $H(\dd,0, \di \zeta)$-homomorphism, it commutes with the action of ${\mathfrak{p}}_0 \simeq \sp\,\dd$, which provides a section of ${\mathcal{P}}_0/{\mathcal{P}}_1$ in ${\mathcal{P}}_0$. We have seen that $\gr^d \VPiprimeN \simeq \Pi' \otimes (S^d({\mathfrak{d}}) \otimes R(\pi_N))$ as $\sp\,\dd$-modules, where $\Pi'$ is considered as trivial. However, $$S^d({\mathfrak{d}}) \otimes R(\pi_N)\simeq R(d\pi_1 + \pi_N) \oplus R((d-1)\pi_1 + \pi_{N-1}) \oplus R((d-2)\pi_1 + \pi_N)$$ contains an irreducible summand isomorphic to $R(\pi_{N-1})$ only when $d = 1$, and this summand corresponds to singular vectors of degree one in $\VPiprimeN$. We know that singular vectors of degree one in $\VPiprimeN$ lie in the image of $\eta$; however, they can only be the image via $\eta$ of singular vectors of degree one, which therefore do not lie in $\ker \eta$. \end{proof} As $\ker \eta$ is a proper submodule of $\VPiprimeN$, it must contain nontrivial singular vectors, that can only have degree two. We will denote by $\DIR$ the $H(\dd,0, \di \zeta)$-endomorphism of $\VPiprimeN$ which maps constant singular vectors to the summand of degree two singular vectors contained in $\ker \eta$. Notice that when $\lambda = 0$, $\DIR$ coincides with $\di^{\mathrm{R}}_{\Pi_\phi}$, as usual up to a nonzero multiplicative constant. \begin{proposition} The image of $\DIR: \VPiprimeN \to \VPiprimeN$ is irreducible. Moreover, \begin{enumerate} \item $\VPiprimeN = \im \DIR \oplus \im \DIN$; \item $\ker \DIR = \im \DIN$; \item $\im \DIN \simeq \im \DINminusonestar$; \item $\im \DINminusonestar$ is $H(\dd,0, \di \zeta)$-irreducible. \end{enumerate} \end{proposition} \begin{proof} The image of $\DIR$ is contained in $\ker \eta$, so also $\sing \im \DIR \subset \sing \ker \eta$. As $\sing \ker \eta$ is ${\mathfrak{d}}' \oplus \sp\,\dd$-irreducible, the same holds for $\sing \im \DIR$. However, $\im \DIR = \DIR \VPiprimeN$ is spanned over $H$ by $\DIR \fil^0 \VPiprimeN$ so it is certainly irreducible, as any submodule must contain nontrivial singular vectors, hence all of $\DIR\fil^0 \VPiprimeN$. Let us take care of the remaining claims. \begin{enumerate} \item The direct sum decomposition clearly holds once we know that the intersection is trivial, as the sum must then contain non-zero constant vectors. However, as $\sing \im \DIR$ does not contain singular vectors of degree one, $\im \DIR \cap \im \DIN \neq 0$ would imply $\im \DIR \subsetneq \im \DIN$, which is impossible as $\im \DIN$ is irreducible. \item As $\im \DIN$ and $\im \DIR$ are non-isomorphic $H(\dd,0, \di \zeta)$-irreducibles, and the image of $\DIR$ is (tautologically) isomorphic to $\im \DIR$, then $\DIR$ must map $\im \DIN$ to $0$. \item As $\VPiprimeN = \im \DIR \oplus \im \DIN$ is the direct sum of two irreducible summands, the non-zero image of $\DINminusonestar: \VPiprimeN \to \VPiprimeNminusone$ is isomorphic to either one of the summands or to their sum. However, we know that $\sing \im \DINminusonestar$ has exactly two ${\mathfrak{d}}'\oplus\sp\,\dd$-irreducible summands, therefore $\im \DINminusonestar$ is necessarily isomorphic to $\im \DIN$. \item Follows from irreducibility of $\im \DIN$. \end{enumerate} \end{proof} We are ready to summarize the results of this Section in the following statement. \begin{theorem}\label{exactderhamnontrivial} Let $\Pi'$ denote a finite-dimensional irreducible ${\mathfrak{d}}'$-module with a nontrivial action of $c \in {\mathfrak{d}}'$. Then the complex of $H(\dd,0, \di \zeta)$-modules \begin{equation}\label{splitexactcomplex} \begin{split} 0 & \to {\mathcal{V}}(\Pi',R(\pi_0)) \xrightarrow{\DIone} {\mathcal{V}}(\Pi',R(\pi_1)) \xrightarrow{\DItwo} \cdots \xrightarrow{\DIN} {\mathcal{V}}(\Pi',R(\pi_N)) \\ &\xrightarrow{\DIR} {\mathcal{V}}(\Pi',R(\pi_N)) \xrightarrow{\DINminusonestar} {\mathcal{V}}(\Pi',R(\pi_{N-1})) \\ &\xrightarrow{\DINminustwostar} \cdots \xrightarrow{\DIzerostar} {\mathcal{V}}(\Pi',R(\pi_0)) \to 0 \,, \end{split} \end{equation} is exact and $\im \DInstar \simeq \im \DInplusone$ is irreducible for all $n$, as well as $\im \DIR$. One has $\VPiprimen = \im \DIn \oplus \im \DInstar$ when $0 \leq n \leq N-1$ and $\VPiprimeN = \im \DIN \oplus \im \DIR$. \end{theorem} \begin{proof} Exactness whenever $\DIR$ is not involved follows from the fact that $\im \DInplusone$ is irreducible, hence $\ker \DIn$ is maximal and contains $\im \DIn$. The isomorphism $\im \DInstar \simeq \im \DInplusone$ follows from the fact that $\DInplusone$ acts trivially on $\im\DIn$ and faithfully on $\im\DInstar$. Everything else has already been proved. \end{proof} \section{Classification of finite irreducible modules over $H(\dd,\chi,\om)$} \begin{theorem}\label{tclass} A complete list of non-trivial pairwise non-isomorphic irreducible finite\/ $H(\dd,\chi,\om)$-modules is as follows: \begin{itemize} \item tensor modules\/ ${\mathcal{V}}(\Pi', U)$ where\/ $\Pi' \boxtimes U$ is a finite-dimensional irreducible\/ ${\mathfrak{d}}' \oplus \sp\,\dd$-module and\/ $U$ is not isomorphic to any\/ $R(\pi_n)$, $0 \leq n \leq N$; \item $\dindinminusonestar \VPichin, 1 \leq n \leq N$, where\/ $\Pi$ is a finite-dimensional irreducible\/ ${\mathfrak{d}}$-module; \item $\im \DIn, 1 \leq n \leq N$, where $\Pi'$ is a finite-dimensional irreducible \/ ${\mathfrak{d}}'$-module with a non-trivial action of $c \in {\mathfrak{d}}'$; \item $\im \DIR$, where $\Pi'$ is a finite-dimensional irreducible \/ ${\mathfrak{d}}'$-module with a non-trivial action of $c \in {\mathfrak{d}}'$; \end{itemize} \end{theorem} \begin{proof} Irreducible $H(\dd,\chi,\om)$-modules are all obtained as quotients of a tensor module ${\mathcal{V}}(\Pi', U)$, where $\Pi' \boxtimes U$ is a finite-dimensional irreducible ${\mathfrak{d}}'\oplus \sp\,\dd$ representation, by a maximal submodule. If $U$ is not isomorphic to any $R(\pi_n), 0 \leq n \leq N$, then \thref{irrcriterion} shows that there are no non-zero submodules; the last two sections compute maximal submodules in all other cases. Indeed, when $c$ acts nontrivially on $\Pi'$, the description of irreducible modules follows from \thref{exactderhamnontrivial}. When $c$ acts trivially on $\Pi'$, then $\Pi' = \pi^* \Pi$ for some ${\mathfrak{d}}$-module $\Pi$, where $\pi: {\mathfrak{d}}' \to {\mathfrak{d}}'/\kk c \simeq {\mathfrak{d}}$ denotes the canonical projection. Henceforth, we will use the notation introduced in \deref{dvmodw}(iii). Thus the unique maximal submodule of $\V(\Pi, R(\pi_n)), 1 \leq n < N,$ is $M = \din\VPinminusone + \dinstar\VPinplusone$, which clearly lies in the kernel of the homomorphisms $$\din\dinminusonestar , \qquad{\di^n_{\Pi}}^* {\di^{n+1}_{\Pi_{\chi/2}}}$$ which map $\V(\Pi_\chi, R(\pi_n))$ to $\V(\Pi, R(\pi_n))$ and coincide up to multiplication by a non-zero scalar. As the above maps are non-zero, their kernel must coincide with $M$, hence $$\dindinminusonestar \VPichin\simeq \V(\Pi, R(\pi_n))/M$$ is the unique irreducible quotient of $\V(\Pi, R(\pi_n))$. As for $\V(\Pi, R(\pi_N))$, its unique maximal submodule is $M = \diN\VPiNminusone$, which lies in the kernel of the non-zero map $\Di_{\Pi}: \V(\Pi, R(\pi_N)) \to {\mathcal{V}}(\Pi_{-\chi}, R(\pi_N)),$ so that $$\DiPi\VPichiN \simeq \V(\Pi, R(\pi_N))/M$$ is the unique irreducible quotient of $\V(\Pi, R(\pi_N))$. Finally, the only proper non-zero submodule of $\V(\Pi, \kk)$ is $\dizerostar \VPione$, which is of finite $\kk$-codimension. Its ${\mathfrak{d}} \oplus \sp\,\dd$-irreducible quotient is thus a torsion $H$-module, which is thence endowed with a trivial pseudoaction. \begin{comment} However, the map ${{\mathrm{d}}^0_\Pi}^*$ identifies with the de Rham differential $${\mathrm{d}}_{\Pi_{\tr\ad}}: \Omega^{N-1}_{\Pi_{\tr\ad}}({\mathfrak{d}}) \to \Omega^N_{\Pi_{\tr\ad}}({\mathfrak{d}}),$$ whose cokernel is the finite-dimensional irreducible ${\mathfrak{d}}\oplus \sp\,\dd$-module $\Pi \boxtimes \kk$ endowed with a trivial pseudoaction. \end{comment} \end{proof} As representations of the Lie pseudoalgebra $H(\dd,\chi,\om)$ are in one-to-one correspondence with conformal (in the sense of the definition given in \seref{spsanih}) representations of its extended annihilation algebra ${\mathfrak{d}} \sd {\mathcal{P}}$, one may use the above results to deduce a classification of irreducible (topological, discrete) $P_{2N}$-modules and of singular vectors in Verma modules induced from irreducible ${\mathfrak{sp}}_{2N}$ representations as follows. Let ${\mathfrak{d}}$ be a $2N$-dimensional Lie algebra endowed with a Frobenius structure $\omega = {\mathrm{d}} {\zeta}$; for instance, one may choose ${\mathfrak{d}}$ to be the direct sum of $N$ copies of the non-abelian $2$-dimensional Lie algebra. The extended annihilation algebra of $H(\dd,0, \di \zeta) = {\mathfrak{d}} \sd {\mathcal{P}}$ decomposes as a direct sum of Lie algebras ${\mathfrak{d}}^{\zeta} \oplus {\mathcal{P}}$. Indeed, as $\chi = 0$, elements $\tilde{\partial}$ act on ${\mathcal{P}}$ by inner derivations, and as $\omega = {\mathrm{d}} {\zeta}$, the central extension yielding ${\mathfrak{d}}'$ may be trivialized to ${\mathfrak{d}}' = {\mathfrak{d}}^{\zeta} + \kk c$. Let $U$ be a representation of $\sp\,\dd$. Using $\sp\,\dd \simeq {\mathcal{P}}_0/{\mathcal{P}}_1$, we endow $U$ with an action of ${\mathcal{P}}_0$ and extend it to $\mathcal{N}_{\mathcal{P}}$ by letting ${\mathfrak{d}}^{\zeta}$ act trivially on $U$ and $c$ act via multiplication by a scalar $\lambda \in \kk$. Then the induced module $\Ind_{\mathcal{N}_{\mathcal{P}}}^{\tilde {\mathcal{P}}}$ is isomorphic to the tensor module ${\mathcal{V}}(\kk_\lambda, U)$, where $\kk_\lambda$ denotes the $1$-dimensional ${\mathfrak{d}}'$-module where $c$ acts as $\lambda$ and ${\mathfrak{d}}^{\zeta}$ acts trivially. Notice that elements in ${\mathfrak{d}}^{\zeta}$ act trivially on all of ${\mathcal{V}}(\kk_\lambda, U)$, so that the submodule lattice of ${\mathcal{V}}(\kk_\lambda, U)$ as a $H(\dd,0, \di \zeta)$-module only depends on its structure as a representation of ${\mathcal{P}}$. Also, when $\lambda = 0$, the action of ${\mathcal{P}}$ factors through its quotient ${\mathcal{H}}$. We thus recover an old result of Rudakov as claim $(i)$ and $(ii)$ of the following proposition. \begin{proposition}[\cite{Ru2}] \label{Rudakov} \mbox{ } \begin{itemize} \item[\textit{(i)}] Every nonconstant homogeneous singular vector in the ${\mathcal{H}}$-module $V = {\mathcal{V}}(\kk, U)$ has degree one or two. The space $S$ of such singular vectors is an $\sp\,\dd$-module and the quotient of $V$ by the ${\mathcal{H}}$-submodule generated by $S$ is an irreducible ${\mathcal{H}}$-module. All singular vectors of degree one are listed in cases (a), (b) below, while all singular vectors of degree two are listed in case (c): \begin{itemize} \item[\textrm{(a)}] $U = R(\pi_p), \qquad S = R(\pi_{p+1}), \quad 0 \leq p \leq N-1.$ \item[\textrm{(b)}] $U = R(\pi_p), \qquad S = R(\pi_{p-1}), \quad 1 \leq p \leq N.$ \item[\textrm{(c)}] $U = R(\pi_p), \qquad S = R(\pi_p), \quad 1 \leq p \leq N.$ \end{itemize} \item[\textit{(ii)}] If the $\sp\,\dd$-module $U$ is infinite-dimensional irreducible, then ${\mathcal{V}}(\kk, U)$ does not contain non-constant singular vectors. \item[\textit{(iii)}] If a ${\mathcal{H}}$-module ${\mathcal{V}}(\kk, U)$ is not irreducible, then its unique irreducible quotient is isomorphic to the topological dual of the kernel of the differential of a member of the Eastwood complex over formal power series. \end{itemize} \end{proposition} The next proposition deals with conformal representations of ${\mathcal{P}}\simeq P_{2N}$ with non-trivial action of the center. \begin{proposition} \mbox{ } \begin{itemize} \item[\textit{(i)}] Let $0 \neq \lambda \in \kk$. Every nonconstant homogeneous singular vector in the ${\mathcal{P}}$-module $V = {\mathcal{V}}(\kk_\lambda, U)$ lies in $\fil^2 {\mathcal{V}}(\kk_\lambda, U)$. The space $S$ of such singular vectors is an $\sp\,\dd$-module and each nonconstant $\sp\,\dd$-irreducible summand lying in $\fil^1 {\mathcal{V}}(\kk_\lambda, U)$ generates an irreducible ${\mathcal{P}}$-module. The description of the subspaces of singular vectors it the same as in \prref{Rudakov} $(i)$ \item[\textit{(ii)}] If the $\sp\,\dd$-module $U$ is infinite-dimensional irreducible, then ${\mathcal{V}}(\kk_\lambda, U)$ does not contain non-constant singular vectors. \item[\textit{(iii)}] If a ${\mathcal{P}}$-module ${\mathcal{V}}(\kk_\lambda, U)$ is not irreducible, then it decomposes as a direct sum of its two irreducible submodules. \end{itemize} \end{proposition} \bibliographystyle{amsalpha}