jackkuo commited on
Commit
1dbfd07
·
verified ·
1 Parent(s): e54c585

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. -dE4T4oBgHgl3EQfDwsm/content/2301.04871v1.pdf +3 -0
  2. -dE4T4oBgHgl3EQfDwsm/vector_store/index.pkl +3 -0
  3. .gitattributes +84 -0
  4. 1NAyT4oBgHgl3EQfofhG/content/2301.00507v1.pdf +3 -0
  5. 1NAyT4oBgHgl3EQfofhG/vector_store/index.pkl +3 -0
  6. 2dAzT4oBgHgl3EQfDvol/content/2301.00980v1.pdf +3 -0
  7. 2dAzT4oBgHgl3EQfDvol/vector_store/index.pkl +3 -0
  8. 2tFQT4oBgHgl3EQfGDUx/content/2301.13243v1.pdf +3 -0
  9. 2tFQT4oBgHgl3EQfGDUx/vector_store/index.faiss +3 -0
  10. 49FAT4oBgHgl3EQfFRw-/content/tmp_files/2301.08426v1.pdf.txt +1916 -0
  11. 49FAT4oBgHgl3EQfFRw-/content/tmp_files/load_file.txt +0 -0
  12. 4dFAT4oBgHgl3EQflx3j/content/tmp_files/2301.08620v1.pdf.txt +1060 -0
  13. 4dFAT4oBgHgl3EQflx3j/content/tmp_files/load_file.txt +0 -0
  14. 4tE4T4oBgHgl3EQfbgyP/content/tmp_files/2301.05074v1.pdf.txt +351 -0
  15. 4tE4T4oBgHgl3EQfbgyP/content/tmp_files/load_file.txt +273 -0
  16. 59FKT4oBgHgl3EQf-y48/content/2301.11959v1.pdf +3 -0
  17. 59FKT4oBgHgl3EQf-y48/vector_store/index.faiss +3 -0
  18. 59FKT4oBgHgl3EQf-y48/vector_store/index.pkl +3 -0
  19. 5NAzT4oBgHgl3EQfEPrI/content/tmp_files/2301.00991v1.pdf.txt +1821 -0
  20. 5NAzT4oBgHgl3EQfEPrI/content/tmp_files/load_file.txt +0 -0
  21. 5dAyT4oBgHgl3EQfQPaq/content/tmp_files/2301.00042v1.pdf.txt +0 -0
  22. 5dAyT4oBgHgl3EQfQPaq/content/tmp_files/load_file.txt +0 -0
  23. 5dFAT4oBgHgl3EQfmh3P/content/tmp_files/2301.08624v1.pdf.txt +1431 -0
  24. 5dFAT4oBgHgl3EQfmh3P/content/tmp_files/load_file.txt +0 -0
  25. 5tE2T4oBgHgl3EQfkQe0/vector_store/index.pkl +3 -0
  26. 7dE2T4oBgHgl3EQfPQbU/content/2301.03758v1.pdf +3 -0
  27. 7dE2T4oBgHgl3EQfPQbU/vector_store/index.pkl +3 -0
  28. 9tAyT4oBgHgl3EQf3Pnc/content/tmp_files/2301.00767v1.pdf.txt +1836 -0
  29. 9tAyT4oBgHgl3EQf3Pnc/content/tmp_files/load_file.txt +0 -0
  30. A9E4T4oBgHgl3EQf5A6T/content/2301.05319v1.pdf +3 -0
  31. A9E4T4oBgHgl3EQf5A6T/vector_store/index.faiss +3 -0
  32. A9E4T4oBgHgl3EQf5A6T/vector_store/index.pkl +3 -0
  33. BdAzT4oBgHgl3EQf___2/content/2301.01958v1.pdf +3 -0
  34. BdAzT4oBgHgl3EQf___2/vector_store/index.faiss +3 -0
  35. BdAzT4oBgHgl3EQf___2/vector_store/index.pkl +3 -0
  36. CNE2T4oBgHgl3EQfRwe0/content/2301.03785v1.pdf +3 -0
  37. CNE2T4oBgHgl3EQfRwe0/vector_store/index.pkl +3 -0
  38. CdE2T4oBgHgl3EQf9AmF/vector_store/index.faiss +3 -0
  39. DtE1T4oBgHgl3EQfWQTV/content/tmp_files/2301.03113v1.pdf.txt +2486 -0
  40. DtE1T4oBgHgl3EQfWQTV/content/tmp_files/load_file.txt +0 -0
  41. F9E0T4oBgHgl3EQfRAC9/content/2301.02202v1.pdf +3 -0
  42. F9E0T4oBgHgl3EQfRAC9/vector_store/index.faiss +3 -0
  43. FtAyT4oBgHgl3EQf5Poe/content/2301.00799v1.pdf +3 -0
  44. FtE4T4oBgHgl3EQfHAzF/content/2301.04900v1.pdf +3 -0
  45. FtE4T4oBgHgl3EQfHAzF/vector_store/index.faiss +3 -0
  46. FtE4T4oBgHgl3EQfHAzF/vector_store/index.pkl +3 -0
  47. HNAyT4oBgHgl3EQfS_eb/content/2301.00097v1.pdf +3 -0
  48. HNAyT4oBgHgl3EQfS_eb/vector_store/index.faiss +3 -0
  49. HNAyT4oBgHgl3EQfS_eb/vector_store/index.pkl +3 -0
  50. HdAyT4oBgHgl3EQfffgY/content/tmp_files/2301.00339v1.pdf.txt +922 -0
-dE4T4oBgHgl3EQfDwsm/content/2301.04871v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e8b6f1def5a202979203791c8fd4a1293f29f54abd6c4ad57aff640038c7db5c
3
+ size 426096
-dE4T4oBgHgl3EQfDwsm/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b6e6eeeeac62fe14354fb1a255af153e3c649b98d6ce03d4ad6e2da3fd47b5a1
3
+ size 139634
.gitattributes CHANGED
@@ -2050,3 +2050,87 @@ PNFOT4oBgHgl3EQf4TQo/content/2301.12949v1.pdf filter=lfs diff=lfs merge=lfs -tex
2050
  s9AzT4oBgHgl3EQfPfs9/content/2301.01183v1.pdf filter=lfs diff=lfs merge=lfs -text
2051
  m9E3T4oBgHgl3EQfKgnW/content/2301.04355v1.pdf filter=lfs diff=lfs merge=lfs -text
2052
  m9E3T4oBgHgl3EQfKgnW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
2050
  s9AzT4oBgHgl3EQfPfs9/content/2301.01183v1.pdf filter=lfs diff=lfs merge=lfs -text
2051
  m9E3T4oBgHgl3EQfKgnW/content/2301.04355v1.pdf filter=lfs diff=lfs merge=lfs -text
2052
  m9E3T4oBgHgl3EQfKgnW/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2053
+ d9E1T4oBgHgl3EQfeAT4/content/2301.03203v1.pdf filter=lfs diff=lfs merge=lfs -text
2054
+ 2tFQT4oBgHgl3EQfGDUx/content/2301.13243v1.pdf filter=lfs diff=lfs merge=lfs -text
2055
+ htE3T4oBgHgl3EQf4Quq/content/2301.04771v1.pdf filter=lfs diff=lfs merge=lfs -text
2056
+ z9AzT4oBgHgl3EQfRPsg/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2057
+ 2tFQT4oBgHgl3EQfGDUx/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2058
+ F9E0T4oBgHgl3EQfRAC9/content/2301.02202v1.pdf filter=lfs diff=lfs merge=lfs -text
2059
+ KtAyT4oBgHgl3EQf6Prq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2060
+ OdE2T4oBgHgl3EQfrAj4/content/2301.04046v1.pdf filter=lfs diff=lfs merge=lfs -text
2061
+ LdAyT4oBgHgl3EQf6fqP/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2062
+ UdE0T4oBgHgl3EQflgEz/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2063
+ X9E5T4oBgHgl3EQfdQ8b/content/2301.05609v1.pdf filter=lfs diff=lfs merge=lfs -text
2064
+ pNE3T4oBgHgl3EQf7wtN/content/2301.04801v1.pdf filter=lfs diff=lfs merge=lfs -text
2065
+ CdE2T4oBgHgl3EQf9AmF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2066
+ BdAzT4oBgHgl3EQf___2/content/2301.01958v1.pdf filter=lfs diff=lfs merge=lfs -text
2067
+ ZNE5T4oBgHgl3EQfdw-l/content/2301.05614v1.pdf filter=lfs diff=lfs merge=lfs -text
2068
+ ytAzT4oBgHgl3EQfCvqr/content/2301.00965v1.pdf filter=lfs diff=lfs merge=lfs -text
2069
+ OdE2T4oBgHgl3EQfrAj4/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2070
+ v9AzT4oBgHgl3EQfsf3v/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2071
+ btFPT4oBgHgl3EQfBDTK/content/2301.12984v1.pdf filter=lfs diff=lfs merge=lfs -text
2072
+ ddE1T4oBgHgl3EQfLQO1/content/2301.02975v1.pdf filter=lfs diff=lfs merge=lfs -text
2073
+ vdFPT4oBgHgl3EQfOTSJ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2074
+ btAyT4oBgHgl3EQf-PpJ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2075
+ pNE3T4oBgHgl3EQf7wtN/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2076
+ X9E5T4oBgHgl3EQfdQ8b/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2077
+ ttE1T4oBgHgl3EQf3wUi/content/2301.03492v1.pdf filter=lfs diff=lfs merge=lfs -text
2078
+ y9AyT4oBgHgl3EQfbPc2/content/2301.00257v1.pdf filter=lfs diff=lfs merge=lfs -text
2079
+ WtE2T4oBgHgl3EQfDga8/content/2301.03626v1.pdf filter=lfs diff=lfs merge=lfs -text
2080
+ pdE0T4oBgHgl3EQfqgHp/content/2301.02555v1.pdf filter=lfs diff=lfs merge=lfs -text
2081
+ UtE1T4oBgHgl3EQfawTU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2082
+ S9FKT4oBgHgl3EQfkC7A/content/2301.11848v1.pdf filter=lfs diff=lfs merge=lfs -text
2083
+ HNAyT4oBgHgl3EQfS_eb/content/2301.00097v1.pdf filter=lfs diff=lfs merge=lfs -text
2084
+ btAyT4oBgHgl3EQf-PpJ/content/2301.00888v1.pdf filter=lfs diff=lfs merge=lfs -text
2085
+ y9AyT4oBgHgl3EQfbPc2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2086
+ oNE0T4oBgHgl3EQfqQFw/content/2301.02550v1.pdf filter=lfs diff=lfs merge=lfs -text
2087
+ L9FLT4oBgHgl3EQfMi8T/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2088
+ lNE2T4oBgHgl3EQfdwfJ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2089
+ S9FKT4oBgHgl3EQfkC7A/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2090
+ ltE5T4oBgHgl3EQfHQ5_/content/2301.05438v1.pdf filter=lfs diff=lfs merge=lfs -text
2091
+ F9E0T4oBgHgl3EQfRAC9/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2092
+ c9FJT4oBgHgl3EQfRiy-/content/2301.11496v1.pdf filter=lfs diff=lfs merge=lfs -text
2093
+ fdE5T4oBgHgl3EQfhQ8n/content/2301.05639v1.pdf filter=lfs diff=lfs merge=lfs -text
2094
+ fdE5T4oBgHgl3EQfhQ8n/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2095
+ s9E2T4oBgHgl3EQf1wgV/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2096
+ ltE5T4oBgHgl3EQfHQ5_/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2097
+ ZNE5T4oBgHgl3EQfdw-l/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2098
+ pNAzT4oBgHgl3EQfOfvU/content/2301.01168v1.pdf filter=lfs diff=lfs merge=lfs -text
2099
+ ttE1T4oBgHgl3EQf3wUi/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2100
+ 59FKT4oBgHgl3EQf-y48/content/2301.11959v1.pdf filter=lfs diff=lfs merge=lfs -text
2101
+ oNE0T4oBgHgl3EQfqQFw/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2102
+ itE2T4oBgHgl3EQfIAZX/content/2301.03674v1.pdf filter=lfs diff=lfs merge=lfs -text
2103
+ 59FKT4oBgHgl3EQf-y48/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2104
+ UtE1T4oBgHgl3EQfawTU/content/2301.03166v1.pdf filter=lfs diff=lfs merge=lfs -text
2105
+ HNAyT4oBgHgl3EQfS_eb/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2106
+ FtAyT4oBgHgl3EQf5Poe/content/2301.00799v1.pdf filter=lfs diff=lfs merge=lfs -text
2107
+ BdAzT4oBgHgl3EQf___2/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2108
+ CNE2T4oBgHgl3EQfRwe0/content/2301.03785v1.pdf filter=lfs diff=lfs merge=lfs -text
2109
+ pdE0T4oBgHgl3EQfqgHp/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2110
+ 2dAzT4oBgHgl3EQfDvol/content/2301.00980v1.pdf filter=lfs diff=lfs merge=lfs -text
2111
+ VNE0T4oBgHgl3EQf2wJn/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2112
+ c9FJT4oBgHgl3EQfRiy-/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2113
+ mNE1T4oBgHgl3EQfOAOw/content/2301.03010v1.pdf filter=lfs diff=lfs merge=lfs -text
2114
+ jNAyT4oBgHgl3EQfx_lt/content/2301.00676v1.pdf filter=lfs diff=lfs merge=lfs -text
2115
+ A9E4T4oBgHgl3EQf5A6T/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2116
+ ytAzT4oBgHgl3EQfCvqr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2117
+ XNE2T4oBgHgl3EQfYgch/content/2301.03854v1.pdf filter=lfs diff=lfs merge=lfs -text
2118
+ lNE2T4oBgHgl3EQfdwfJ/content/2301.03910v1.pdf filter=lfs diff=lfs merge=lfs -text
2119
+ WtE2T4oBgHgl3EQfDga8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2120
+ A9E4T4oBgHgl3EQf5A6T/content/2301.05319v1.pdf filter=lfs diff=lfs merge=lfs -text
2121
+ aNA0T4oBgHgl3EQfF__0/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2122
+ XNE2T4oBgHgl3EQfYgch/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2123
+ X9AyT4oBgHgl3EQf9foH/content/2301.00873v1.pdf filter=lfs diff=lfs merge=lfs -text
2124
+ btFPT4oBgHgl3EQfBDTK/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2125
+ T9E3T4oBgHgl3EQfaQqr/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2126
+ htE3T4oBgHgl3EQf4Quq/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2127
+ cNE0T4oBgHgl3EQfWQCi/content/2301.02276v1.pdf filter=lfs diff=lfs merge=lfs -text
2128
+ aNA0T4oBgHgl3EQfF__0/content/2301.02042v1.pdf filter=lfs diff=lfs merge=lfs -text
2129
+ FtE4T4oBgHgl3EQfHAzF/content/2301.04900v1.pdf filter=lfs diff=lfs merge=lfs -text
2130
+ 7dE2T4oBgHgl3EQfPQbU/content/2301.03758v1.pdf filter=lfs diff=lfs merge=lfs -text
2131
+ cdE5T4oBgHgl3EQffg9z/content/2301.05627v1.pdf filter=lfs diff=lfs merge=lfs -text
2132
+ -dE4T4oBgHgl3EQfDwsm/content/2301.04871v1.pdf filter=lfs diff=lfs merge=lfs -text
2133
+ 1NAyT4oBgHgl3EQfofhG/content/2301.00507v1.pdf filter=lfs diff=lfs merge=lfs -text
2134
+ FtE4T4oBgHgl3EQfHAzF/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2135
+ pNAzT4oBgHgl3EQfOfvU/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
2136
+ T9E3T4oBgHgl3EQfaQqr/content/2301.04505v1.pdf filter=lfs diff=lfs merge=lfs -text
1NAyT4oBgHgl3EQfofhG/content/2301.00507v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:4c488e0b9d4e943ff59f1648c5faf90e8876105f77224f5d5d67542b5ff8fcff
3
+ size 229268
1NAyT4oBgHgl3EQfofhG/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ae778cea3f10ac0093a583cd7c9e573989024a2e095889c650089865a7ce8356
3
+ size 80484
2dAzT4oBgHgl3EQfDvol/content/2301.00980v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:164ec6d21fa77ac37c4a89fb8afc5d4495825da9e71998b3e34d0fb89b0fc5f8
3
+ size 282183
2dAzT4oBgHgl3EQfDvol/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cc247f7cc828a1d9cb1c271d36da3f923500293c2e3b8e06f8f82fe0741b4fa1
3
+ size 118429
2tFQT4oBgHgl3EQfGDUx/content/2301.13243v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bd2406dc103db5bb607377b5ebac79963ba4ae695e53588d0eef0bb284c09d00
3
+ size 690989
2tFQT4oBgHgl3EQfGDUx/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5d449761694772d0bddbf3f97e729218921530a181e6307007afa6a4bb38c553
3
+ size 3080237
49FAT4oBgHgl3EQfFRw-/content/tmp_files/2301.08426v1.pdf.txt ADDED
@@ -0,0 +1,1916 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ η-pairing on bipartite and non-bipartite lattices
2
+ Yutaro Misu1, Shun Tamura2, Yukio Tanaka2 and Shintaro Hoshino1
3
+ 1Department of Physics, Saitama University, Saitama 338-8570, Japan
4
+ 2Department of Applied Physics, Nagoya University, Nagoya 464-8603, Japan
5
+ (Dated: January 23, 2023)
6
+ The η-pairing is a type of Cooper pairing state in which the phase of the superconducting order
7
+ parameter is aligned in a staggered manner, in contrast to the usual BCS superconductors with a
8
+ spatially uniform phase. In this study, we search for a characteristic η-pairing state in a triangular
9
+ lattice where a simple staggered alignment of the phase is not possible. As an example, we consider
10
+ the attractive Hubbard model on both the square and triangular lattices under strong external
11
+ Zeeman field.
12
+ Using the mean-field approximation, we have identified several η-pairing states.
13
+ Additionally, we have examined the electromagnetic stability of the pairing state by calculating the
14
+ Meissner kernel. Odd-frequency pairing plays a crucial role in achieving diamagnetic response if the
15
+ electrons experience a staggered superconducting phase during the propagation of current.
16
+ I.
17
+ INTRODUCTION
18
+ The diversity of superconducting phenomena has been
19
+ attracting continued attention.
20
+ The superconducting
21
+ state of matter is characterized by the properties of
22
+ Cooper pairs, which can be classified based on their
23
+ space-time and spin structures.
24
+ With regard to their
25
+ space structure, Cooper pairs are typically classified as
26
+ s-wave, p-wave, or d-wave pairs depending on their rel-
27
+ ative coordinate structure. As for their center-of-mass
28
+ coordinate, while it is usually assumed to be zero in
29
+ most superconductors, it is possible to consider the exis-
30
+ tence of a finite center-of-mass momentum. One example
31
+ of this is the Flude-Ferrell-Larkin-Ovchinnikov (FFLO)
32
+ state [1, 2], in which the Cooper pair has a small but finite
33
+ center-of-mass momentum under the influence of a mag-
34
+ netic field. More generally, the magnitude of the center-
35
+ of-mass momentum can be larger and of the order of the
36
+ reciprocal lattice vector ∼ π/a, where a is a lattice con-
37
+ stant. This type of pairing state is known as η-pairing,
38
+ a concept first proposed by C. N. Yang, which forms a
39
+ staggered alignment of the superconducting phase on a
40
+ bipartite lattice [3]. The spatially modulating order pa-
41
+ rameter is known also as the pair density wave, and has
42
+ been discussed in relation to cuprate superconductors [4].
43
+ The actual realization of the η-pairing has been pro-
44
+ posed for the correlated electron systems such as the at-
45
+ tractive Hubbard (AH) model with the magnetic field
46
+ [5], the single- and two-channel Kondo lattices [6, 7], the
47
+ Penson-Kolb model [8], and also the non-equilibrium sit-
48
+ uation [9–14].
49
+ Since the phase of the superconducting
50
+ order parameter can be regarded as the XY spin, the η-
51
+ pairing is analogous to an antiferromagnetic state of the
52
+ XY spin model.
53
+ Hence, the η-pairing state should be
54
+ strongly dependent on the underlying lattice structure
55
+ and we naively expect a variety of the η-pairing state
56
+ if we consider the geometrically frustrated lattice such
57
+ as the triangular lattice since the simple staggered state
58
+ cannot be realized.
59
+ In this paper, we deal with the AH model on the non-
60
+ bipartite lattice in order to search for possible new su-
61
+ perconducting states depending on the feature of the
62
+ non-bipartite lattice structure in equilibrium.
63
+ Already
64
+ in the normal state without superconductivity, it has
65
+ been pointed out that the non-bipartite lattice generates
66
+ a non-trivial state of matter. For example in the Kondo
67
+ lattice, a partial-Kondo-screening, which has a coexisting
68
+ feature of Kondo spin-singlet and antiferromagnetism, is
69
+ realized [15]. Also in the AH model at half-filling, charge-
70
+ density-wave (CDW) is suppressed due to the frustration
71
+ effect [16]. The η-pairing that appears in a photodoped
72
+ Hubbard model on the triangular lattice has been studied
73
+ recently [14]. In the equilibrium situation, the properties
74
+ of the AH model have been studied on bipartite lattices
75
+ [5], but the model on a non-bipartite lattice has not been
76
+ explored.
77
+ As shown in the rest of this paper, there are several
78
+ types of η-pairings on the triangular lattice of the AH
79
+ model under the Zeeman field.
80
+ One of the η-pairing
81
+ states is regarded as a 120◦-N´eel state.
82
+ Since the rel-
83
+ ative phase between the nearest neighbor sites is neither
84
+ parallel nor anti-parallel, the inter-atomic Josephson cur-
85
+ rent is spontaneously generated. This state can also be
86
+ regarded as a staggered flux state, where the flux is cre-
87
+ ated by the atomic-scale superconducting loop current.
88
+ While the staggered flux state has been studied so far
89
+ [17–23], the staggered flux in this paper is induced by
90
+ the Josephson effect associated with superconductivity
91
+ and has a different origin.
92
+ For the analysis of the AH model, we employ the mean-
93
+ field approximation in this paper. It has been suggested
94
+ that a simple η-pairing shows a paramagnetic Meissner
95
+ state [24]. Hence it is necessary to investigate the electro-
96
+ magnetic stability of the solution for superconductivity.
97
+ We evaluate the Meissner kernel whose sign corresponds
98
+ to the diamagnetic (minus) or paramagnetic (plus) re-
99
+ sponse of the whole system, where the physically sta-
100
+ ble state should show diamagnetism. We confirm that
101
+ if the mean-field η-pairing state has the lowest energy
102
+ compared to the other ordered states, the calculation of
103
+ the Meissner kernel shows the diamagnetic response. It
104
+ is also notable that the odd-frequency pairing amplitude,
105
+ which has an odd functional form with respect to the fre-
106
+ quency [6, 25–30], can contribute to the diamagnetism in
107
+ arXiv:2301.08426v1 [cond-mat.supr-con] 20 Jan 2023
108
+
109
+ 2
110
+ the η-pairing state. This is in contrast to the usual super-
111
+ conductivity with the uniform phase where the conven-
112
+ tional even-frequency pairing contributes to the diamag-
113
+ netism. It has been shown that the odd-frequency pairing
114
+ induced at the edge, interface or junctions [31–36] shows
115
+ a paramagnetic response [37–41]. In this paper, by con-
116
+ trast, we consider the odd-frequency pairing realized in
117
+ bulk, which shows a qualitatively different behavior.
118
+ This paper is organized as follows.
119
+ We explain the
120
+ model and method for the AH model in Sec. II, and the
121
+ Meissner kernel in Sec. III. The numerical results for the
122
+ AH model are shown in Sec. IV, and we summarize the
123
+ paper in Sec. V.
124
+ II.
125
+ ATTRACTIVE HUBBARD MODEL
126
+ A.
127
+ Hamiltonian
128
+ We consider the Hamiltonian of the AH model with
129
+ magnetic field h which induce Zeeman effect only (Zee-
130
+ man field) :
131
+ H = −t
132
+
133
+ ⟨i,j⟩σ
134
+ c†
135
+ iσcjσ + H.c. + U
136
+
137
+ i
138
+ ni↑ni↓
139
+ − µ
140
+
141
+ i
142
+ ni − h ·
143
+
144
+ i
145
+ si,
146
+ (1)
147
+ where c†
148
+ iσ and ciσ are the creation and annihilation op-
149
+ erators of the i-th site with spin σ, respectively.
150
+ The
151
+ symbol ⟨i, j⟩ represents a pair of the nearest-neighbor
152
+ sites.
153
+ Here, the parameter t is the nearest-neighbor
154
+ single-electron hopping integral. U (= −|U|) is the on-
155
+ site attractive interaction. The spin operator is defined
156
+ as si =
157
+ 1
158
+ 2
159
+
160
+ σσ′ c†
161
+ iστσσ′ciσ′, where τ is the Pauli ma-
162
+ trix, and the number operator of electrons is denoted as
163
+ ni = ni↑ + ni↓ = �
164
+ σ c†
165
+ iσciσ. The electron concentration
166
+ is controlled by adjusting the chemical potential µ.
167
+ The AH model has been successfully used to elucidate
168
+ several important and fundamental issues in supercon-
169
+ ductors [42]. The model on a bipartite lattice at half fill-
170
+ ing is theoretically mapped onto the repulsive Hubbard
171
+ model by the following partial particle-hole transforma-
172
+ tion [43]
173
+ c†
174
+ i↑ → c†
175
+ i↑, c†
176
+ i↓ → ci↓eiQ·Ri.
177
+ (2)
178
+ The reciprocal vector Q satisfies the condition eiQ·Ri =
179
+ (−1)i that takes ±1 depending on Ri belonging to A or
180
+ B sublattice on the bipartite lattice. Then, the η-pairing
181
+ appears in the region that corresponds to a ferromagnet
182
+ with transverse magnetization in the repulsive model [5].
183
+ In a mean-field theory, the phase diagram for the repul-
184
+ sive Hubbard model without the magnetic field is shown
185
+ in the left panel of Fig. 1 [44]. From this figure, we find
186
+ that the ferromagnet is located in the regime where the
187
+ repulsive interaction U > 0 is large and the electron con-
188
+ centration is not half-filled. Hence, the η-pairing phase
189
+ nc
190
+ t
191
+ |U|
192
+ m
193
+ 0
194
+ 1
195
+ 0
196
+ 1
197
+ PM
198
+ AFM
199
+ FM
200
+ FF
201
+ BCS
202
+ -pairing
203
+ η
204
+ Repulsive Hubbard (
205
+ )
206
+ U > 0
207
+ Attractive Hubbard (
208
+ )
209
+ U < 0
210
+ h = 0
211
+ nc = 1.0
212
+ Spin-polarized
213
+ normal state
214
+ FIG. 1.
215
+ Sketches of the phase diagrams for the repulsive
216
+ Hubbard model [44] (left panel) and AH model (right panel).
217
+ nc is the electron concentration and m is the magnetization.
218
+ When the interaction |U| is large, the ground state in the re-
219
+ pulsive Hubbard model is ferromagnet (FM), while the ground
220
+ state in the AH model is η-pairing.
221
+ is located in the regime where the attractive interaction
222
+ U < 0 is large and the magnetization is finite. The phase
223
+ diagram of the AH model at half filling is shown in the
224
+ right panel of Fig. 1. In principle, an attractive interac-
225
+ tion large enough to realize η-pairing could be realized in
226
+ artificial cold atom systems [45].
227
+ The Cooper pair is formed by the two electrons
228
+ with (k ↑,
229
+ − k + q ↓) where q is the center-of-mass
230
+ momentum. The FFLO state and the η-pairing are dis-
231
+ tinguished by the magnitude of |q|.
232
+ In η-pairing, the
233
+ center-of-mass momentum of the Cooper pair is the or-
234
+ der of the reciprocal lattice vector, while the momentum
235
+ of the FFLO state is much smaller and the spatial mod-
236
+ ulation is slowly-varying compared to the atomic scale.
237
+ Although the large center-of-mass momentum is usually
238
+ not energetically favorable, a strong attractive interac-
239
+ tion can make it stable.
240
+ B.
241
+ Mean-field theory
242
+ By applying the mean-field approximation, we obtain
243
+ the mean-field Hamiltonian
244
+ HMF = −t
245
+
246
+ ⟨i,j⟩σ
247
+ c†
248
+ iσcjσ + H.c. − µ
249
+
250
+ i
251
+ ni − h ·
252
+
253
+ i
254
+ si
255
+
256
+
257
+ i
258
+
259
+ vini + Hi · si − ∆ic†
260
+ i↑c†
261
+ i↓ − ���∗
262
+ i ci↓ci↑
263
+
264
+ .
265
+ (3)
266
+
267
+ 3
268
+ The order parameters are given by the self-consistent
269
+ equations
270
+ vi ≡ |U|
271
+ 2 ⟨ni⟩,
272
+ (4)
273
+ ∆i ≡ −|U|⟨ci↓ci↑⟩,
274
+ (5)
275
+ mi = 1
276
+ 2
277
+
278
+ σσ′
279
+ ⟨c†
280
+ iστσσ′ciσ′⟩,
281
+ Hi =
282
+ − 2|U|mi,
283
+ (6)
284
+ where ⟨A⟩ = Tr
285
+
286
+ Ae−HMF/T �
287
+ /Tr
288
+
289
+ e−HMF/T �
290
+ is a quan-
291
+ tum statistical average with the mean-field Hamiltonian
292
+ and T is temperature.
293
+ ∆i is the order parameter for
294
+ s-wave singlet superconductivity (pair potential).
295
+ The
296
+ phase θi ∈ [0, 2π) of the pair potential ∆i = |∆i|eiθi is
297
+ dependent on the site index and will be represented by
298
+ the arrow in a two-dimensional space. The mean-fields
299
+ for the charge and spin are given by vi and Hi, respec-
300
+ tively, at each site. The derivation of the self-consistent
301
+ equations is summarized in Appendix A. We will consider
302
+ the AH model both on the two-dimensional square and
303
+ triangular lattices.
304
+ III.
305
+ MEISSNER KERNEL FOR A GENERAL
306
+ TIGHT-BINDING LATTICE
307
+ A.
308
+ Definition
309
+ As we explained in Sec. I, it is necessary to calculate
310
+ the Meissner kernel to determine whether the mean-field
311
+ solution for η-pairing is electromagnetically stable. In the
312
+ tight-binding model, the electromagnetic field appears as
313
+ Peierls phase:
314
+ Hkin = −t
315
+
316
+ ⟨i,j⟩σ
317
+ eiAijc†
318
+ iσcjσ + H.c..
319
+ (7)
320
+ The Meissner effect is examined by the weak external or-
321
+ bital magnetic field applied perpendicular to the plane,
322
+ while the η-pairing is stabilized only under a strong Zee-
323
+ man field. In order to make these compatible, we apply
324
+ the Zeeman field parallel to the plane h = (h, 0, 0), which
325
+ does not create the orbital motion of the tight-binding
326
+ electrons.
327
+ Thus, the weak magnetic field that triggers
328
+ the Meissner effect is applied perpendicular to the plane
329
+ in addition to the in-plane magnetic field.
330
+ While the
331
+ out-of-plane Zeeman effect is also induced by the weak
332
+ additional field, it is neglected since the dominant Zee-
333
+ man field already exists by the strong in-plane magnetic
334
+ field.
335
+ Let us formulate the Meissner response kernel on a
336
+ general tight-binding model. We apply the formulation in
337
+ Refs. [46–48] to the present case with sublattice degrees
338
+ of freedom. The current density operator between two
339
+ sites is defined as
340
+ jij = ∂Hkin
341
+ ∂Aij
342
+ ˆδij
343
+ = −it
344
+
345
+ σ
346
+
347
+ c†
348
+ iσcjσeiAij − c†
349
+ jσciσe−iAij�
350
+ ˆδij,
351
+ (8)
352
+ where δij = Ri − Rj is the inter-site lattice vector be-
353
+ tween i-th and j-th sites, and hat (ˆ) symbol means a unit
354
+ vector. In the linear response theory, the current oper-
355
+ ator which appears as a response to the static magnetic
356
+ field in equilibrium is written as
357
+ jij ≃ −it
358
+
359
+ σ
360
+ (c†
361
+ iσcjσ − c†
362
+ jσciσ)ˆδij
363
+ + t
364
+
365
+ σ
366
+ (c†
367
+ iσcjσ + c†
368
+ jσciσ)ˆδijAij
369
+ ≡ jpara
370
+ ij
371
+ + jdia
372
+ ij .
373
+ (9)
374
+ The first term is called the paramagnetic term and the
375
+ second term is diamagnetic.
376
+ The Fourier-transformed
377
+ paramagnetic and diamagnetic current density operators
378
+ are written as jpara(q) and jdia(q). The linear response
379
+ kernel is then defined by ⟨jν(q)⟩ = �
380
+ µ Kνµ(q)Aµ(q),
381
+ where ν, µ = x, y is the direction. We evaluate the ker-
382
+ nel Kνµ(q → 0) ≡ Kνµ when investigating the stability
383
+ of superconductivity. This is called the Meissner kernel,
384
+ which is proportional to the superfluid density.
385
+ The Meissner kernel is separated into paramagnetic
386
+ and diamagnetic terms as Kνµ = (Kpara)νµ + (Kdia)νµ.
387
+ The paramagnetic kernel is given by
388
+ (Kpara)νµ = 1
389
+ N
390
+ � 1/T
391
+ 0
392
+ dτ⟨jpara
393
+ ν
394
+ (q = 0, τ)jpara
395
+ µ
396
+ (q = 0)⟩,
397
+ (10)
398
+ where N = �
399
+ i 1 is the number of sites. The Heisenberg
400
+ representation with the imaginary time τ is defined as
401
+ A(τ) = eHτAe−Hτ. The form of the diamagnetic kernel
402
+ is obvious from Eq. (9).
403
+ We note that if the sign of the Meissner kernel K is
404
+ negative, the superconducting state is electromagneti-
405
+ cally stable and is also called a diamagnetic Meissner
406
+ state, which expels magnetic flux. On the other hand, if
407
+ the sign is positive, the superconducting state is called
408
+ the paramagnetic Meissner state, which attracts mag-
409
+ netic flux. For a stable thermodynamic superconducting
410
+ state, the negative value of K is required.
411
+ B.
412
+ Method of evaluation
413
+ The actual evaluation of the kernels is performed based
414
+ on the wave-vector representation.
415
+ Here, the physical
416
+ quantities are described by the operator cα
417
+ kσ where α dis-
418
+ tinguishes the sublattice. Note that the Brillouin zone is
419
+
420
+ 4
421
+ folded by �
422
+ α 1 times. The diamagnetic kernel is rewrit-
423
+ ten as
424
+ (Kdia)νµ = 1
425
+ N
426
+
427
+ α,β
428
+
429
+
430
+
431
+ m−1
432
+ kαβ
433
+
434
+ νµ ⟨cα†
435
+ kσcβ
436
+ kσ⟩.
437
+ (11)
438
+ The inverse mass tensor m−1
439
+ kαβ, which reflects the char-
440
+ acteristics of the lattice shape, are given by
441
+
442
+ m−1
443
+ kαβ
444
+
445
+ νµ ≡ t
446
+
447
+ ⟨iα,jβ⟩
448
+
449
+ ˆδiαjβ
450
+
451
+ ν
452
+
453
+ ˆδiαjβ
454
+
455
+ µ e−ik·Riαjβ ,
456
+ (12)
457
+ where iα is the i-th unit cell with sublattice α.
458
+ The
459
+ symbol ⟨iα, jβ⟩ represents a pair of the nearest-neighbor
460
+ sites and Riαjβ is the vector between the unit lattice with
461
+ the i-th sublattice α and the unit lattice with the j-th
462
+ sublattice β.
463
+ The paramagnetic term has the form of a current-
464
+ current correlation function. We can calculate this term
465
+ by using the Green’s function matrix
466
+ ˇGk(τ) ≡ −⟨Tτψk(τ)ψ†
467
+ k⟩
468
+ (13)
469
+ where ψk = (cα
470
+ k↑, cα†
471
+ −k↓, · · · )T is the Nambu-spinor. Tτ is
472
+ time-ordering operator regrading τ. Each component of
473
+ the Green’s function matrix is given by the diagonal and
474
+ off-diagonal Green’s functions:
475
+ Gαβ
476
+ σσ′(k, τ) ≡ −⟨Tτcα
477
+ kσ(τ)cβ†
478
+ kσ′⟩,
479
+ (14)
480
+ ¯Gαβ
481
+ σσ′(k, τ) ≡ −⟨Tτcα†
482
+ kσ(τ)cβ
483
+ k′σ′⟩,
484
+ (15)
485
+ F αβ
486
+ σσ′(k, τ) ≡ −⟨Tτcα
487
+ kσ(τ)cβ
488
+ −kσ′⟩,
489
+ (16)
490
+ F αβ†
491
+ σσ′ (k, τ) ≡ −⟨Tτcα†
492
+ −kσ(τ)cβ†
493
+ kσ′⟩.
494
+ (17)
495
+ The anomalous part of Green’s function [Eq. (16)] is also
496
+ called the pair amplitude. The paramagnetic kernel in
497
+ Eq. (10) can be divided into the normal (G) and anoma-
498
+ lous (F) Green’s function contributions as
499
+ (Kpara)νµ = − 1
500
+ N
501
+ � � 1/T
502
+ 0
503
+ dτ (vkαβ)ν · (vkα′β′)µ ×
504
+
505
+ ¯Gαβ′
506
+ σσ′(k, τ)Gα′β
507
+ σσ′(k, τ) + ¯Gαβ′
508
+ σσ′(−k, τ)Gα′β
509
+ σσ′(−k, τ)
510
+
511
+ − 1
512
+ N
513
+ � � 1/T
514
+ 0
515
+ dτ (vkαβ)ν · (v−kα′β′)µ ×
516
+
517
+ F βα†
518
+ σ′σ (k, −τ)F α′β′
519
+ σ,σ′ (k, τ) + F βα†
520
+ σ′σ (−k, −τ)F α′β′
521
+ σ,σ′ (−k, τ)
522
+
523
+ ≡ KG
524
+ para + KF
525
+ para.
526
+ (18)
527
+ The summation � is performed over the indices which appears only in the right-hand side. The velocity vector vkαβ
528
+ is defined by
529
+ (vkαβ)ν ≡ t
530
+
531
+ ⟨iα,jβ⟩
532
+
533
+ ˆδiαjβ
534
+
535
+ ν e−ik·Riαjβ .
536
+ (19)
537
+ In order to perform the integral with respect to τ in Eq. (18), we define the Fourier-transformed Green’s function as
538
+ gk(iωn) ≡
539
+ � 1/T
540
+ 0
541
+ dτgk(τ)eiωnτ,
542
+ (20)
543
+ where gk represents one of Eqs. (14)-(17) and ωn = (2n + 1)πT is fermionic Mastubara frequency. Moreover, the
544
+ Fourier-transformed Green’s function matrix is given by using the matrix representation of mean-field Hamiltonian
545
+ Eq. (3) as
546
+ ˇGk(iωn) =
547
+
548
+ iωnˇ1 − ˇHMF
549
+ k
550
+ �−1 = ˇUk
551
+
552
+ iωnˇ1 − ˇΛk
553
+ �−1 ˇU †
554
+ k,
555
+ (21)
556
+ where ˇΛk and ˇUk are, respectively, a diagonal eigenvalue matrix and a unitary matrix satisfying ˇU † ˇHMF
557
+ k
558
+ ˇU = ˇΛk =
559
+ diag(λk1, λk2, . . .). From Eq. (21), Kpara can be calculated as
560
+ (Kpara)νµ = − 1
561
+ N
562
+ � �
563
+ (vkαβ)ν · (vkα′β′)µ Uβ′σ′,ασ
564
+ kp
565
+ Uα′σ,βσ′
566
+ kp′
567
+ + (vkαβ)ν · (v−kα′β′)µ Uβσ′,ασ
568
+ kp
569
+ Uα′σ,β′σ′
570
+ kp′
571
+ � f (λkp) − f (λkp′)
572
+ λkp − λkp′
573
+ + c.c.
574
+ (22)
575
+ where f(λkp) =
576
+ 1
577
+ eλkp/T +1 is the Fermi-Dirac distribution function and we have defined the coefficient Uασ,βσ′
578
+ kp
579
+
580
+ � ˇUk
581
+
582
+ ασ,p
583
+
584
+ ˇU †
585
+ k
586
+
587
+ p,βσ′.
588
+ The anomalous part of Eq. (18) KF
589
+ para is further de-
590
+ composed into the contributions KEFP and KOFP from
591
+
592
+ 5
593
+ the even-frequency pair (EFP) and odd-frequency pair
594
+ (OFP) amplitudes defined by
595
+ F EFP(k, iωn) ≡ F(k, iωn) + F(k, −iωn)
596
+ 2
597
+ ,
598
+ (23)
599
+ F OFP(k, iωn) ≡ F(k, iωn) − F(k, −iωn)
600
+ 2
601
+ .
602
+ (24)
603
+ Then, we obtain KEFP and KOFP by using Eqs. (23) and
604
+ (24) as
605
+ KEFP,OFP
606
+ νµ
607
+ = − 1
608
+ 2N
609
+
610
+ k
611
+
612
+ αβα′β′
613
+ (vkαβ)ν · (v−kα′β′)µ
614
+ ×
615
+
616
+ σσ′
617
+
618
+ pp′
619
+ Uβσ′,ασ
620
+ kp
621
+ Uα′σ,βσ′
622
+ kp′
623
+ ×
624
+ �f (λkp) − f (λkp′)
625
+ λkp − λkp′
626
+ ∓ f (λkp) − f (−λkp′)
627
+ λkp + λkp′
628
+
629
+ + c.c.,
630
+ (25)
631
+ where the minus (−) sign in the square bracket is taken
632
+ for EFP contribution and the plus (+) for OFP pairing.
633
+ These quantities are numerically calculated as shown in
634
+ the next section. Note that the cross term of the EFP
635
+ and OFP terms of Green’s functions vanishes after the
636
+ summation with respect to the Matsubara frequency.
637
+ C.
638
+ Paramagnetic Meissner response of a simple
639
+ η-pairing state
640
+ Before we show the results of the AH model, let us show
641
+ that a simple η-pairing state leads to the paramagnetic
642
+ response which would not arise from thermodynamically
643
+ stable states [24, 49]. We consider the simple bipartite
644
+ lattice with staggered ordering vector Q. The anomalous
645
+ contribution to the Meissner kernel may be written as [49]
646
+ KF
647
+ para,xx = −T
648
+
649
+ nkk′σσ′
650
+ vx
651
+ kvx
652
+ k′F ∗
653
+ σ′σ(k′, k, iωn)Fσσ′(k, k′, iωn).
654
+ (26)
655
+ This contribution must be negative (diamagnetic re-
656
+ sponse) in order to dominate over the paramagnetic con-
657
+ tribution. For a purely η-pairing state, we assume the
658
+ relation Fσσ′(k, k′) = Fσσ′(k)δk′,−k−Q, and obtain
659
+ KF
660
+ para,xx = −T
661
+
662
+ nkσσ′
663
+ (vx
664
+ k)2F ∗
665
+ σ′σ(k, iωn)Fσσ′(k, iωn), (27)
666
+ where we have used vx
667
+ −k−Q = vx
668
+ k valid for square lat-
669
+ tice, which is in contrast to the relation vx
670
+ −k = −vx
671
+ k
672
+ for the uniform pairing with additional minus sign [24].
673
+ We separate the spin-singlet and triplet parts as Fσσ′ =
674
+ Fsiτ y
675
+ σσ′ + Ft · (τiτ y)σσ′, and then obtain
676
+ KF
677
+ para,xx = 2T
678
+
679
+ nk
680
+ (vx
681
+ k)2�
682
+ |Fs(k, iωn)|2 − |Ft(k, iωn)|2�
683
+ .
684
+ (28)
685
+ If we consider the simple η-pairing with only spin-singlet
686
+ part (Ft = 0), it leads to the paramagnetic response
687
+ (positive).
688
+ Thus, a simple s-wave spin-singlet η-pairing is unlikely
689
+ realized as a stable state. On the other hand, in the AH
690
+ model with magnetic field, the spin-triplet pair contribu-
691
+ tion is substantially generated by the Zeeman field, which
692
+ plays an important role for the diamagnetic response as
693
+ shown below.
694
+ IV.
695
+ NUMERICAL RESULT FOR AH MODEL
696
+ A.
697
+ Square lattice
698
+ 1.
699
+ Prerequisites
700
+ Let us begin with the analysis of the AH model on
701
+ the square lattice. We consider the two-sublattice struc-
702
+ ture to describe the staggered ordered phase such as a
703
+ η-pairing. While the superconducting states in the at-
704
+ tractive model are interpreted in terms of the magnetic
705
+ phases of the repulsive model by the particle-hole trans-
706
+ formation in Eq. (2), the response functions such as the
707
+ Meissner kernel are specific to the attractive model and
708
+ have not been explored.
709
+ In the following, we choose the band width W = 1
710
+ as the unit of energy.
711
+ We fix the value of the attrac-
712
+ tive interaction U = −1.375. The electron concentration
713
+ is fixed as nc = 1, and the temperature is taken to be
714
+ T = 1.0 × 10−3 unless otherwise specified. We will in-
715
+ vestigate the change of the Meissner kernel for η-pairing
716
+ as a function of magnetic field strength h = |h|. In this
717
+ paper, the mean-field solutions are calculated using the
718
+ 60 × 60 mesh in k-space. The result of the Meissner ker-
719
+ nel for η-pairings is calculated with the mesh 300 × 300.
720
+ We also checked that the behaviors remain qualitatively
721
+ unchanged when these numbers are increased. The self-
722
+ consistent equations in Eqs. (4)-(6) are computed by
723
+ using an iterative method.
724
+ In the following subsec-
725
+ tion IV A 2, we restrict ourselves to the analysis of two-
726
+ sublattice mean-field solutions, and in IV A 3, we exam-
727
+ ine the solutions when the two-sublattice constraint is
728
+ relaxed.
729
+ 2.
730
+ Two-sublattice solution
731
+ Before investigating the electromagnetic stability, we
732
+ clarify the regime where the η-pairing becomes the
733
+ ground state. In this paper, we assume that the inter-
734
+ nal energy in Eq. (1) is approximately equal to the free
735
+ energy in the low temperature region. The upper panel
736
+ of Fig. 2 shows the internal energy of several ordered
737
+ states measured from the normal-state energy as a func-
738
+ tion of the Zeeman field h. Here, the η-pairing solution
739
+ is obtained by solving the self-consistent equation with
740
+ imposing the constraint of the staggered phase of the pair
741
+
742
+ 6
743
+ 0.0 0.25 0.5 0.75 1.0 1.25 1.5 1.75 2.0 2.25 2.5
744
+ h
745
+ −3.0
746
+ −2.5
747
+ −2.0
748
+ −1.5
749
+ −1.0
750
+ −0.5
751
+ 0.0
752
+ Ei − Enormal
753
+ BCS
754
+ CDW
755
+ Normal
756
+ η-pairing
757
+ 0.0 0.25 0.5 0.75 1.0 1.25 1.5 1.75 2.0 2.25 2.5
758
+ 0.00
759
+ 0.04
760
+ 0.08
761
+ D0
762
+ FIG. 2.
763
+ (Upper panel) Magnetic-field dependence of the
764
+ internal energy for each state measured from the normal state
765
+ in the square lattice model. (Lower plane) Density of state
766
+ (DOS) at zero energy D0 for each state.
767
+ −1.5
768
+ −1.0
769
+ −0.5
770
+ 0.0
771
+ 0.5
772
+ 1.0
773
+ 1.5
774
+ ω
775
+ 0.0
776
+ 0.1
777
+ 0.2
778
+ D(ω)
779
+ h = 1.25
780
+ h = 1.375
781
+ h = 1.5
782
+ FIG. 3. Density of states for the η-pairing around magnetic
783
+ filed h = 1.375 in the square lattice model.
784
+ Here D(ω) is
785
+ normalized as
786
+
787
+ dωD(ω) = 1.
788
+ amplitude. A constraint is also used for the calculation
789
+ of the other types of order parameters. Our calculations
790
+ have not found any ordered states other than the types
791
+ shown in Fig. 2 even when a random initial condition is
792
+ employed.
793
+ We determine the thermodynamically stable ground
794
+ state by comparing the internal energies. In low magnetic
795
+ fields, BCS and CDW are degenerated ground states. On
796
+ the other hand, we find that the η-pairing becomes the
797
+ ground state in the magnetic field located in 1.063 < h <
798
+ 1.875. The η-pairing solution itself is found in the wider
799
+ regime although the internal energy is not the lowest one.
800
+ It has been known that the attractive Hubbard model
801
+ under a magnetic field also shows the FFLO state [50],
802
+ but this possibility cannot be considered when we take
803
+ the two-sublattice condition. This point will be revisited
804
+ in the next subsection where the two-sublattice condition
805
+ is relaxed.
806
+ The lower panel of Fig. 2 shows the density of
807
+ state (DOS) at the Fermi level for each state. The re-
808
+ sult indicates that there is no energy gap in the η-pairing
809
+ state, in contrast to the conventional BCS pairing state.
810
+ There exists the regime where the DOS at the Fermi
811
+ level for η-pairing is larger than that of normal metal
812
+ (1.25 ≲ h ≲ 1.5). This is due to the van-Hove singular-
813
+ ity of the square lattice model as shown in FIG. 3. We
814
+ also perform the calculation for the cubic lattice where
815
+ the van-Hove singularity is absent at zero energy and con-
816
+ firm in this case that the DOS is smaller than the normal
817
+ state (see Appendix B).
818
+ The stability of the η-pairing depends upon the mag-
819
+ nitude of the magnetic field as seen in the Meissner re-
820
+ sponse kernel K (= Kxx = Kyy) (green symbol) in
821
+ Fig. 4(a).
822
+ The contributions from the paramagnetic
823
+ (Kpara, positive) and diamagnetic (Kdia, negative) parts
824
+ are also separately plotted in the figure. In the regime
825
+ with h ≤ 1.125 and 1.75 ≤ h, the η-pairing is electromag-
826
+ netically unstable, while it is stable in 1.125 < h < 1.75.
827
+ In Fig. 4, the yellow shaded rectangle indicates the regime
828
+ where the η-pairing becomes the ground state as seen
829
+ from Fig. 2. We find a narrow region where η-pairing is
830
+ regarded as the ground state but is not an electromagnet-
831
+ ically stable state around h = 1.125. From these results,
832
+ we see that the η-pairing is not necessarily electromag-
833
+ netically stable even if it becomes the ground state in
834
+ a two-sublattice calculation. As we shall see later, the
835
+ simple η-pairing in this narrow regime does not necessar-
836
+ ily exist if we relax the two-sublattice condition of the
837
+ mean-field solution.
838
+ We also show in Fig. 4(a) the contributions from the
839
+ even- and odd-frequency pairs defined in Eqs. (23) and
840
+ (24). The negative sign of the kernel, which means the re-
841
+ sponse is diamagnetic, is partly due to the odd-frequency
842
+ component of the pair amplitude, (KOFP < 0).
843
+ This
844
+ is in contrast to the FFLO state whose Meissner ker-
845
+ nel is also negative due to the even-frequency component
846
+ [51]. Hence, it implies that the mechanism of the dia-
847
+ magnetism is different between the FFLO and η-pairing
848
+ states.
849
+ In
850
+ addition
851
+ to
852
+ the
853
+ Meissner
854
+ kernel,
855
+ we
856
+ calcu-
857
+ late the local pair amplitudes which are shown in
858
+ FIG. 4(b).
859
+ Here the left- and right-panels represent
860
+ the spin-triplet and spin-singlet components of the lo-
861
+ cal pair amplitude, respectively. The triplet component
862
+
863
+ σσ′(τ µiτ y)σσ′Fσσ′(iωn) with µ = x has a finite imagi-
864
+ nary part and zero real part, which represents the odd-
865
+ frequency pair. The other µ = y, z components are zero.
866
+ On the other hand, the singlet component has a finite real
867
+ part and zero imaginary part and is the even-frequency
868
+ pair. We can see that the maximum value of the spin-
869
+ triplet component of the pair amplitude is largest at the
870
+ magnetic field h = 1.375, where the magnitude of KOFP
871
+ is largest. It is also notable that the magnitude of the
872
+ odd-frequency pair amplitude correlates with the magni-
873
+ tude of DOS at zero energy as seen by comparing Figs. 3
874
+ and 4.
875
+ We comment on the singular behavior of KOFP at the
876
+ magnetic field h = 1.375, although it does not affect the
877
+ total Meissner kernel K. This anomalous feature is re-
878
+ lated to the van Hove singularity of the DOS at zero
879
+ energy as shown in FIG. 3, which shows a sharp peak at
880
+ the Fermi level.
881
+
882
+ 7
883
+ 0.0
884
+ 0.5
885
+ 1.0
886
+ 1.5
887
+ 2.0
888
+ 2.5
889
+ h
890
+ -1.0
891
+ -0.5
892
+ 0.0
893
+ 0.5
894
+ 1.0
895
+ K
896
+ Kdia
897
+ Kpara
898
+ K
899
+ KEFP
900
+ KOFP
901
+ (a)
902
+ (b)
903
+ <latexit sha1_base64="hwzoaSF0Y+Oi/TJGH/A
904
+ 8l7Sl9vw=">AD0HichVO5TsNAEH3BnOEIR4NEg4iQKFC0QZxdEA0lVwCJIGSbTbKL9kbFIQioEW08A
905
+ +IH+EHKPgEagoaCmY35lIUM5bt2TfvjWd2x1bgiEgy9pLqMrp7ev6B9KDQ8MjmdGx8f3Ir4c2L9q+4e
906
+ HlhlxR3i8KIV0+GEQctO1H5g1TZU/OCMh5HwvT15HvBj16x4oixsUxK0U2qejGZjmbnfysZNFbFv+
907
+ WKqEk7hw0YdLjg8SPIdmIjoOkIeDAFhx7gLCRP6DhHE2nS1onFiWESWqNnhVZHMerRWuWMtNqmrzh0h6
908
+ Scxix7Zg/sjT2xR/bKPjrmutA5VC3n9LZaWh6cZG4md9/Vbn0lqj+qBJrlihjVdcqPZAI6oLW+s7KxW
909
+ nQr0Jila13qKYRbiTsEuK5SbG/3Y+39ZTZ2WFdtktKpPq/FPFYpbI18m8n6fX1LNEa1djSbx1M429Kz5
910
+ xA4SuV8d/+am9ayvKVv6nux2Z38hl1/OLW4vZgvrV62p78cUZjBHk72CAjaxhSJlLuMWd7g3doyGcWlct
911
+ 6hdqfhPmcAfM24+AbMryxg=</latexit>}Eq. (25)
912
+ °3
913
+ °2
914
+ °1
915
+ 0
916
+ 1
917
+ 2
918
+ 3
919
+ !n
920
+ 0.0
921
+ 0.6
922
+ 1.2
923
+ 1.8
924
+ 2.4
925
+ 3.0
926
+ 3.6
927
+ 4.2
928
+ 4.8
929
+ 5.4
930
+ 6.0
931
+ 6.6
932
+ Re[F " #(i!n) ° F # "(i!n)]/
933
+ p
934
+ 2
935
+ 2.0
936
+ 1.875
937
+ 1.75
938
+ 1.625
939
+ 1.5
940
+ 1.375
941
+ 1.25
942
+ 1.125
943
+ 1.0
944
+ 0.875
945
+ 0.75
946
+ 0.625
947
+ 0.0
948
+ 0.5
949
+ 1.0
950
+ 1.5
951
+ 2.0
952
+ 2.5
953
+ h
954
+ -1.0
955
+ -0.5
956
+ 0.0
957
+ 0.5
958
+ 1.0
959
+ K
960
+ Kdia
961
+ Kpara
962
+ K
963
+ KEFP
964
+ KOFP
965
+ OFP
966
+ EFP
967
+ °3
968
+ °2
969
+ °1
970
+ 0
971
+ 1
972
+ 2
973
+ 3
974
+ !n
975
+ 0.0
976
+ 0.6
977
+ 1.2
978
+ 1.8
979
+ 2.4
980
+ 3.0
981
+ 3.6
982
+ 4.2
983
+ 4.8
984
+ 5.4
985
+ 6.0
986
+ 6.6
987
+ Im[F # #(i!n) ° F " "(i!n)]/
988
+ p
989
+ 2
990
+ FIG. 4.
991
+ (a) Magnetic field dependence of the Meissner ker-
992
+ nel K(= Kxx = Kyy) for the η-pairing on the square lattice.
993
+ The yellow shaded rectangle indicates the range where the
994
+ η-pairing becomes the ground state in two-sublattice calcula-
995
+ tion. The number of the wavenumber k is taken as 300×300.
996
+ (b) Matsubara frequency dependence of the local pair ampli-
997
+ tude at several magnetic fields. The left panel represents the
998
+ imaginary part of [F↓↓(iωn) − F↑↑(iωn)] /
999
+
1000
+ 2, and the right
1001
+ panel represents the real part of [F↑↓(iωn) − F↓↑(iωn)] /
1002
+
1003
+ 2.
1004
+ The values of the pair amplitudes are shifted by 0.6 at each
1005
+ magnetic field for visual clarity, and the gray-dotted lines are
1006
+ the zero axes for each magnetic field.
1007
+ 3.
1008
+ Beyond two-sublattice
1009
+ In order to clarify the stable ordered state where the
1010
+ Meissner kernel is positive (paramagnetic), we investi-
1011
+ gate mean-field solutions on finite-sized lattice where the
1012
+ two-sublattice condition is not imposed.
1013
+ We have nu-
1014
+ merically solved the Eqs. (4)-(6) self-consistently by us-
1015
+ ing the mean-field solutions of the η-pairing obtained for
1016
+ two-sublattice as an initial condition.
1017
+ Figure 5 shows the spatial distribution of the phase of
1018
+ the gap function when the number of sites is 8 × 8. At
1019
+ h = 0.5 in (a), where the η-pairing is not a ground state,
1020
+ the uniform BCS pairing state is realized as expected.
1021
+ With increasing the magnetic field, the longer-periodicity
1022
+ structures are found as shown in Figs. 5(b), (c) and (d).
1023
+ At h = 1.375 in (c), where the η-pairing solution has the
1024
+ lowest energy and the electromagnetic response is well
1025
+ diamagnetic, we obtain the staggered alignment of the
1026
+ (a) h = 0.5
1027
+ (d) h = 1.875
1028
+ (c) h = 1.375
1029
+ (b) h = 1.125
1030
+ FIG. 5.
1031
+ Spatial distribution of the phase of the supercon-
1032
+ ducting order parameter at several magnetic fields. The cal-
1033
+ culation is performed on the finite-sized lattice (8 × 8) with
1034
+ open boundary condition. Small black dots are lattice points
1035
+ and red arrows indicate the phase of the pair potential for
1036
+ each lattice point.
1037
+ phases. When the parameters are close to the edges of
1038
+ the yellow-highlighted region in Fig. 4, the complex struc-
1039
+ tures are formed as shown in (b) and (d). The behavior
1040
+ in (b) is interpreted as due to the competing effect where
1041
+ the simple uniform and staggered phases are energetically
1042
+ close to each other.
1043
+ We also investigate the case with the other choice of pa-
1044
+ rameters: U = −1.25 and h = 1.25. In this case, we find
1045
+ the staggered flux state where the phase of pair poten-
1046
+ tial is characterized by 90◦-N´eel ordering as in Fig. 6(a).
1047
+ This ordered state cannot be described in the mean-field
1048
+ theory with two sublattices.
1049
+ Owing to a non-colinear
1050
+ 90◦-N´eel ordering vector, the spontaneous clockwise or
1051
+ counterclockwise loop currents arise by the inter-atomic
1052
+ Josephson effect. The current density is calculated by
1053
+ jij = −it
1054
+
1055
+ σ
1056
+ ⟨c†
1057
+ iσcjσ − c†
1058
+ jσciσ⟩
1059
+ (29)
1060
+ which is identical to the expression of the paramagnetic
1061
+ current in the linear response theory. We can also evalu-
1062
+ ate the flux for each plaquette, which is define by
1063
+ Φ =
1064
+
1065
+ (i,j)∈plaquette
1066
+ jij
1067
+ (30)
1068
+ This expression is similar to the flux
1069
+
1070
+ C
1071
+ j ·ds =
1072
+
1073
+ S
1074
+ b·dS
1075
+ (j = ∇ × b) defined in a continuum system, where b is
1076
+ a flux density. The flux is aligned in a staggered manner
1077
+
1078
+ 8
1079
+ (a)
1080
+ (b)
1081
+ Current
1082
+ Magnetic flux
1083
+ FIG. 6. (a) Spatial distribution of the phase of the supercon-
1084
+ ducting order parameter for the η-pairing with 90◦-N´eel state
1085
+ on the finite-sized lattice under open boundary conditions.
1086
+ (b) Spatial distributions of the spontaneous loop current and
1087
+ the flux defined on each plaquette. The color of vectors dis-
1088
+ plays the magnitude of current, and the color of dots in each
1089
+ plaquette indicates the value of the magnetic flux defined in
1090
+ Eq. (30).
1091
+ on a dual lattice as indicated in Fig. 6(b). The staggered
1092
+ flux originating from the normal part has been studied
1093
+ before [20–23], while the staggered flux shown in Fig. 6(b)
1094
+ has a different origin: it arises from the superconductiv-
1095
+ ity associated with the off-diagonal part in the Nambu
1096
+ representation.
1097
+ We also comment on a feedback effect to the electro-
1098
+ magnetic field from the supercurrent.
1099
+ Since the char-
1100
+ acteristic length scale for the magnetic field in layered
1101
+ superconductor becomes long [52], each magnetic flux on
1102
+ the plaquette is smeared out with this length. Hence we
1103
+ expect that the net magnetic field is not created from the
1104
+ staggered superconducting flux.
1105
+ B.
1106
+ Triangular lattice
1107
+ 1.
1108
+ Mean-field solution
1109
+ Now we search for the η-pairing reflecting the charac-
1110
+ teristics of a geometrically frustrated triangular lattice
1111
+ at the half-filling (nc = 1.0). We choose the parameters
1112
+ U = −1.83 and T = 1.0 × 10−3. We consider the cases of
1113
+ two- and three-sublattice structures. For a usual antifer-
1114
+ romagnet, the typical ordered state in the two-sublattice
1115
+ case has a stripe pattern, while in the three-sublattice
1116
+ case we expect a 120◦-N´eel state. Below we study the
1117
+ superconducting η-pairing phases within the mean-field
1118
+ theory.
1119
+ We have found the four types of superconducting states
1120
+ reflecting the characteristics of the triangular lattice,
1121
+ which are referred to as the η-pairing I, II, III, and IV.
1122
+ The schematic pictures for these four states are shown
1123
+ in Fig. 7(a), where the arrow indicates the phase of the
1124
+ superconducting order parameter at each site. We make
1125
+ a few general remarks: the three-sublattice structure is
1126
+ assumed for I, II, III, while the two sublattice is employed
1127
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1128
+ 0.0
1129
+ 0.5
1130
+ 1.0
1131
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1132
+ 0.0
1133
+ 0.5
1134
+ 1.0
1135
+ 1.5
1136
+ ni, mi
1137
+ nA
1138
+ nB
1139
+ nC
1140
+ mA
1141
+ mB
1142
+ mC
1143
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1144
+ 0.0
1145
+ 0.5
1146
+ 1.0
1147
+ ni, mi
1148
+ nA
1149
+ nB
1150
+ mA
1151
+ mB
1152
+ (a)
1153
+ (b)
1154
+ <latexit sha1_base64="HLHSkuiSo7OABq7I/GuoPhNC6Lg=">AD5XichVNa9tAEH20tRxmsRJCR6MTWFHhKzLmT3hx6SW8pqe2AbYykbOTF+kJaBxth6LnQW8m19Njkj/QP9NCf0HMOufTQ2bXzYyVEZJm37w3mtkdWaErYsn
1155
+ Yn0zWHi0+Di3lF9+srK6VljfqMdBP7J5zQ7cIDq2zJi7wuc1KaTLj8OIm57l8obVe6/ijTMexSLwP8lhyNue6fjiVNimJKhT2GxFXvKh1Y1D0+bJdrnCvVF91CmUWJlpK846lYlTwsQOg/VMCy2cICNPjxw+JDkuzAR09VEBQwhYW0khEXkCR3nGCFP2j6xODFMQnv0dGjVnKA+rVXOWKt+opLd0TKIl6y3+wnu2K/2CX7y/7NzZXoHKqWIb2tsZaHnbUvz46uH1R59Jbo3qlSa5Y4xZ6uVDtoUZUF7bWz1cqjkO9CYp2td6imEW4m7JLiuWlxqc735rpab7SoV02Ce3q0xo8UIXi
1156
+ 9siXqbz75dWc0xrT6NpPLWzAz1rAbHDVO5Nx/e5eT3r75S9uZ3sWaf+ulx5W975uFOq7n8eT30Oz/ECr2iyd1HFAQ5Ro8wJfuACl4ZjfDW+GedjajYz+VOeYsqM7/8B8nDTJg=</latexit>IV
1157
+ <latexit sha1_base64="0lzRl8Ev1iYodM/0b/A8BMLCw=">AD5XichVNb9NAEH2paSmhtAmoEhKXqFGlHm
1158
+ i0qQot1S9kFsQzYeURJHtbp1V/CV7g1JZkTgjcau4Io6QP8If4MBP4MyBSw+d3YR+KIo7lu3ZN+NZ3bHVuiKWDL2O7NkPFhebj6KPt47cn6Ri7/tBEHw8jmdTtwg6hlmTF3hc/rUkiXt8KIm57l8qY1OFbx5gcexSLwT+R5yLue6fji
1159
+ TNimJKiX2+xEXlLt9OPQtHmyWypzb1wd93JFVmLaCvNOeYUMbNakM90MEpAtgYwgOHD0m+CxMxXW2UwRAS1kVCWESe0HGOMbKkHRKLE8MkdEBPh1btGerTWuWMtdqmr7h0R6QsYJv9Yt/ZX/aTdgfdrkwV6JzqFrO6W1NtTzsbXx6/v7
1160
+ fvSqP3hL9G1VqzRJnONS1Cqo91Ijqwtb6xUrFcag3QdG+1lsUswh3U3ZJsbzU+N3OX871tFjp0C6bhPb1aY3uqUJxB+TLVN7t80urOa1p9E0ntrZkZ61gNhKvd/x7e5WT3rb5S9up7seaexVyq/Lu2/2y9Wj5Op34VL7CFHZrsA1TwF
1161
+ jXUKXOCb/iBieEYn40L48uUupSZ/SnPcMeMr1fF9NMZ</latexit>II
1162
+ <latexit sha1_base64="+wPFmdUeKb1/4PbXkIuITbQNFGw=">AD9HichVO7TuNAFD3BPEJ4BWiQaBABiQKiCe
1163
+ LZUDHQgCSARFthmSUfySPUGgKBI130C32mKFhGjZL9gfoOATt6ChoI7k/CMYq5l+8651zfO3NtBY6IJGOPiS6ju6e3L9mfGhgcGh5Jj47tR34tHnB9h0/PLTMiDvC4wUpMPg5CbruXwA6u6oeIHZzyMhO/tyYuAH7tm2ROnwjYl
1164
+ QaX0TDF061vFShSYNq8vZHPcbXxdNkrpDMsybVPtTq7lZNCybX80UQRJ/BhowYXHB4k+Q5MRHQdIQeGgLBj1AkLyRM6ztFAirQ1YnFimIRW6Vm1VEL9WitckZabdNXHLpDUk5hlj2w3+w/+8tu2D/23DFXedQtVzQ2pqeVAauZrYfp
1165
+ W5dJbovKuiq1Z4hRrulZBtQcaUV3YWt9ZqThl6k1QtKL1FsUswp2YXVIsNzb+ufP5tp46K8u0yahFX1a59UobhV8mUs7+P5xdUc0drVaBxP7ey5njWf2Es97Xj9yUnvV1Zctvk93u7C9mcyvZpZ2lTP7HZXPqk5jENOZosleRxya2U
1166
+ aDMV7jDPf4YZ8a18dP41aR2JVp/yjg+mXH7AkDw2R4=</latexit>III
1167
+ <latexit sha1_base64="1D3cNDco74HVKDqoxdioDUzCYmY=">AD1HichVPLSsNAFD01Pmp960ZwIxbBhZSp+N
1168
+ wpbnSnaKtgRZI4tmPzIplKpQqCuHEhbvUPxB/xB1z4Ca5duHhnWl9URpvSHLn3HNu7p25sQJHRJKxl0Sb0d7R2ZXsTvX09vUPDA4N5yO/Eto8Z/uOH+5aZsQd4fGcFNLhu0HITdy+I5VXlXxnRMeRsL3tuVpwPds+iJI2GbkqB8IXRr
1169
+ 6+cHg2mWYdrGm51sw0mjYRv+UKAg7hw0YFLjg8SPIdmIjo2kMWDAFh+6gRFpIndJzjHCnSVojFiWESWqZnkVZ7DdSjtcoZabVNX3HoDk5jkn2zB7YG3tij+yVfbTMVdM5VC2n9LbqWh4cDFyPbr3/q3LpLVH6UcXWLHGERV2roNoDjag
1170
+ ubK1vrVScIvUmKFrSeotiFuFOzC4plhsb/9v5dFNPrZVF2mWT0JI+reo/VShumXwZy/t9fnE1R7R2NRrHUztb1bPmEzuI5X51/Jub0rO+pGzue7KbnfxMJjufmd2cTS+vXNSnPokxTGCKJnsBy1jDBnKU+Ri3uMO9kTfOjEvjqk5tSzT+l
1171
+ BH8MePmE+ykzOM=</latexit>I
1172
+ A
1173
+ B
1174
+ C
1175
+ <latexit sha1_base64="pw/0hoI9HJeFkpOwH0i+6Zr/+zU=">AD1nichVM7TwJBEB
1176
+ 4H4gPRBsTGyMxsTBkMT47lMYSo+glYMzducCGe+VuMRCsTEmVsZW/4Dxj/gHLPwJ1hY2Fs4up0Ix1zudvab79ub2Z3VXZP5nJD3SFQZGR0bj03EJ6emZxKzybkT36l7Bi0Yjul4q
1177
+ 751GQ2LXDGTaq6HtUs3aSnei0n4qeX1POZYx/zpkvPLK1iszIzNI6QWvKs1n7uqH0+myJpIm2p38kETgoCyzvJSAlKcAEOGFAHCyjYwNE3QMfnyJkgICL2Bm0EPQYzJOoQ1x1NaRZ
1178
+ GhIVrDbwVnxQC1cS7W9KXawL+Y+HqoXIV8kaeySd5JS/kg3wPXKsl1xC5NHUO1rqnifuFo6+hqosHDlU/1WhOXMow47MlWHurkREFYbUD1YKTgVrYxitSr2OMR1xM2SXBMsKjfdWvt
1179
+ ZX02BlBXdZQ7QqT6sxJAvBraHPQ3nd5xeWs49zS6JhPLGzDdlrDrLdUO5vxd3cuOz1XWGbf53d75yspzNb6Y3DjVR27rT9TFYhGVYxc7ehiwcQB4KsqMf4BGeFW5Um6U2w41Ggluyj
1180
+ z0mHL/AygEzY=</latexit>BCS
1181
+ <latexit sha1_base64="0lzRl8Ev1iYodM/0b/A8BMLCw=">AD5XichVNb9NAEH
1182
+ 2paSmhtAmoEhKXqFGlHmi0qQot1S9kFsQzYeURJHtbp1V/CV7g1JZkTgjcau4Io6QP8If4MBP4MyBSw+d3YR+KIo7lu3ZN+NZ3bHVuiKWDL2O7NkPFhebj6KPt47cn6Ri7/tBEHw8
1183
+ jmdTtwg6hlmTF3hc/rUkiXt8KIm57l8qY1OFbx5gcexSLwT+R5yLue6fjiTNimJKiX2+xEXlLt9OPQtHmyWypzb1wd93JFVmLaCvNOeYUMbNakM90MEpAtgYwgOHD0m+CxMxXW2UwR
1184
+ AS1kVCWESe0HGOMbKkHRKLE8MkdEBPh1btGerTWuWMtdqmr7h0R6QsYJv9Yt/ZX/aTdgfdrkwV6JzqFrO6W1NtTzsbXx6/v7fvSqP3hL9G1VqzRJnONS1Cqo91Ijqwtb6xUrFcag3Qd
1185
+ G+1lsUswh3U3ZJsbzU+N3OX871tFjp0C6bhPb1aY3uqUJxB+TLVN7t80urOa1p9E0ntrZkZ61gNhKvd/x7e5WT3rb5S9up7seaexVyq/Lu2/2y9Wj5Op34VL7CFHZrsA1TwFjXUKX
1186
+ OCb/iBieEYn40L48uUupSZ/SnPcMeMr1fF9NMZ</latexit>II
1187
+ <latexit sha1_base64="1D3cNDco74HVKDqoxdioDUzCYmY=">AD1HichVPLSsNAFD
1188
+ 01Pmp960ZwIxbBhZSp+NwpbnSnaKtgRZI4tmPzIplKpQqCuHEhbvUPxB/xB1z4Ca5duHhnWl9URpvSHLn3HNu7p25sQJHRJKxl0Sb0d7R2ZXsTvX09vUPDA4N5yO/Eto8Z/uOH+5aZs
1189
+ Qd4fGcFNLhu0HITdy+I5VXlXxnRMeRsL3tuVpwPds+iJI2GbkqB8IXRr6+cHg2mWYdrGm51sw0mjYRv+UKAg7hw0YFLjg8SPIdmIjo2kMWDAFh+6gRFpIndJzjHCnSVojFiWESWq
1190
+ ZnkVZ7DdSjtcoZabVNX3HoDk5jkn2zB7YG3tij+yVfbTMVdM5VC2n9LbqWh4cDFyPbr3/q3LpLVH6UcXWLHGERV2roNoDjagubK1vrVScIvUmKFrSeotiFuFOzC4plhsb/9v5dFNPrZ
1191
+ VF2mWT0JI+reo/VShumXwZy/t9fnE1R7R2NRrHUztb1bPmEzuI5X51/Jub0rO+pGzue7KbnfxMJjufmd2cTS+vXNSnPokxTGCKJnsBy1jDBnKU+Ri3uMO9kTfOjEvjqk5tSzT+lBH8Me
1192
+ PmE+ykzOM=</latexit>I
1193
+ <latexit sha1_base64="1D3cNDco74HVKDqoxdioDUzCYmY=">AD1HichVPLSsNAFD01Pmp960ZwIxbBhZSp+NwpbnSnaKtgRZI4tmPzIplKpQqCuHEhbvUPxB/xB1z4Ca5duHh
1194
+ nWl9URpvSHLn3HNu7p25sQJHRJKxl0Sb0d7R2ZXsTvX09vUPDA4N5yO/Eto8Z/uOH+5aZsQd4fGcFNLhu0HITdy+I5VXlXxnRMeRsL3tuVpwPds+iJI2GbkqB8IXRr6+cHg2mWYdrGm51sw0mjYRv+UKAg7hw0YFLjg8SPIdmIjo2kMWDAFh+6gRFpIndJzjHCnSVojFiWESWqZnkVZ7DdSjtcoZabVNX3HoDk5jkn2zB7YG3tij+yVfbTMVdM5VC2n9LbqWh4cDFyPbr3/
1195
+ q3LpLVH6UcXWLHGERV2roNoDjagubK1vrVScIvUmKFrSeotiFuFOzC4plhsb/9v5dFNPrZVF2mWT0JI+reo/VShumXwZy/t9fnE1R7R2NRrHUztb1bPmEzuI5X51/Jub0rO+pGzue7KbnfxMJjufmd2cTS+vXNSnPokxTGCKJnsBy1jDBnKU+Ri3uMO9kTfOjEvjqk5tSzT+lBH8MePmE+ykzOM=</latexit>I
1196
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1197
+ h
1198
+ °0.05
1199
+ 0.00
1200
+ 0.05
1201
+ Ei ° E¥°pairing I
1202
+ <latexit sha1_base64="HLHSkuiSo7OABq7I/GuoPhNC6Lg=">AD5XichVNa9tAEH20tRx
1203
+ msRJCR6MTWFHhKzLmT3hx6SW8pqe2AbYykbOTF+kJaBxth6LnQW8m19Njkj/QP9NCf0HMOufTQ2bXzYyVEZJm37w3mtkdWaErYsnYn0zWHi0+Di3lF9+srK6VljfqMdBP7J5zQ7cIDq2zJi7wuc1
1204
+ KaTLj8OIm57l8obVe6/ijTMexSLwP8lhyNue6fjiVNimJKhT2GxFXvKh1Y1D0+bJdrnCvVF91CmUWJlpK846lYlTwsQOg/VMCy2cICNPjxw+JDkuzAR09VEBQwhYW0khEXkCR3nGCFP2j6xODFMQnv0
1205
+ dGjVnKA+rVXOWKt+opLd0TKIl6y3+wnu2K/2CX7y/7NzZXoHKqWIb2tsZaHnbUvz46uH1R59Jbo3qlSa5Y4xZ6uVDtoUZUF7bWz1cqjkO9CYp2td6imEW4m7JLiuWlxqc735rpab7SoV02Ce3q0xo
1206
+ 8UIXi9siXqbz75dWc0xrT6NpPLWzAz1rAbHDVO5Nx/e5eT3r75S9uZ3sWaf+ulx5W975uFOq7n8eT30Oz/ECr2iyd1HFAQ5Ro8wJfuACl4ZjfDW+GedjajYz+VOeYsqM7/8B8nDTJg=</latexit>IV
1207
+ 0.0
1208
+ 1.8
1209
+ 3.6
1210
+ 5.4
1211
+ 7.2
1212
+ 9.0
1213
+ 10.8
1214
+ 12.6
1215
+ 14.4
1216
+ 16.2
1217
+ 18.0
1218
+ 19.8
1219
+ 21.6
1220
+ 23.4
1221
+ °3
1222
+ °2
1223
+ °1
1224
+ 0
1225
+ Ei ° Enormal
1226
+ BCS
1227
+ normal
1228
+ ¥-pairing I
1229
+ ¥-pairing IV
1230
+ ¥-pairing III
1231
+ ¥-pairing II
1232
+ (c)
1233
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1234
+ h
1235
+ °0.05
1236
+ 0.00
1237
+ 0.05
1238
+ Ei ° E¥°pairing I
1239
+ 0.0
1240
+ 1.8
1241
+ 3.6
1242
+ 5.4
1243
+ 7.2
1244
+ 9.0
1245
+ 10.8
1246
+ 12.6
1247
+ 14.4
1248
+ 16.2
1249
+ 18.0
1250
+ 19.8
1251
+ 21.6
1252
+ 23.4
1253
+ °3
1254
+ °2
1255
+ °1
1256
+ 0
1257
+ Ei ° Enormal
1258
+ BCS
1259
+ normal
1260
+ ¥-pairing I
1261
+ ¥-pairing IV
1262
+ ¥-pairing III
1263
+ ¥-pairing II
1264
+ -pairing II
1265
+ η
1266
+ -pairing IV
1267
+ η
1268
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1269
+ h
1270
+ °0.05
1271
+ 0.00
1272
+ 0.05
1273
+ Ei ° E¥°pairing I
1274
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1275
+ 0.0
1276
+ 0.5
1277
+ 1.0
1278
+ 1.5
1279
+ ni, mi
1280
+ nA
1281
+ nB
1282
+ nC
1283
+ mA
1284
+ mB
1285
+ mC
1286
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1287
+ 0.0
1288
+ 0.5
1289
+ 1.0
1290
+ 1.5
1291
+ ni, mi
1292
+ nA
1293
+ nB
1294
+ nC
1295
+ mA
1296
+ mB
1297
+ mC
1298
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1299
+ 0.0
1300
+ 0.5
1301
+ 1.0
1302
+ ni, mx
1303
+ i
1304
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1305
+ 0.0
1306
+ 0.5
1307
+ 1.0
1308
+ ni, mx
1309
+ i
1310
+ 0.0 0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1311
+ 0.0
1312
+ 0.5
1313
+ 1.0
1314
+ ni, mx
1315
+ i
1316
+ x
1317
+ y
1318
+ FIG. 7.
1319
+ (a) Schematics for the four η-pairings in the tri-
1320
+ angular lattice model. The arrows indicate the phase of the
1321
+ pair potential. The size of the circles shows the amount of
1322
+ the electron density for each sublattice. (b) Magnetic field
1323
+ dependence of the internal energies measured from the nor-
1324
+ mal state (upper panel). The lower panel shows the inter-
1325
+ nal energy measured from the η-pairing I. (c) Magnetic field
1326
+ dependence of the number of electrons and magnetization on
1327
+ each sublattice for the η-pairing II (upper panel) and IV (lower
1328
+ panel).
1329
+ for IV. The type-I has a non-colinear structure, and in the
1330
+ other η-pairings the vectors are aligned in a colinear man-
1331
+ ner. We also note that CDW accompanies the η-pairings
1332
+ II and III, where the number of local filling is indicated
1333
+ by the size of the filled circle symbols in Fig. 7(a).
1334
+ Figure 7(b) shows the internal energy of the ordered
1335
+ states measured from the normal state (Upper panel) and
1336
+ from the η-pairing I (Lower panel). From the lower panel
1337
+ of Fig. 7(b), we can identify the ground state. With in-
1338
+ creasing the magnetic field, the ground state changes as
1339
+ BCS → η-pairing II→ η-pairing I → η-pairing IV→ η-
1340
+ pairing I → normal. Figure 7(c) shows the particle den-
1341
+
1342
+ 9
1343
+ (a)
1344
+ (b)
1345
+ Iloop
1346
+ h
1347
+ 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1348
+ h
1349
+ -0.2
1350
+ -0.1
1351
+ 0.0
1352
+ 0.1
1353
+ Iloop
1354
+ FIG. 8. (a) Schematic picture of the staggered flux state on
1355
+ the triangular lattice. The straight arrows display the phase
1356
+ of the pair potential at each site, and the circle arrows indicate
1357
+ the staggered loop current. (b) Magnetic field dependence of
1358
+ the magnitude of loop current. The yellow shaded rectangle
1359
+ indicates the range where the η-pairing I becomes the ground
1360
+ state.
1361
+ sity and x-direction magnetization mx
1362
+ i of each sublattice
1363
+ for η-pairing II (Upper panel) and η-pairing IV (Lower
1364
+ panel). The values of my
1365
+ i and mz
1366
+ i are zero because the
1367
+ Zeeman field h is applied along the x-direction. Below,
1368
+ we explain the characteristic features for each η-pairing
1369
+ state.
1370
+ η-pairing-I state.— The η-pairing I has 120◦ N´eel or-
1371
+ dering vector (Green pentagon in Fig. 7(b)). The spon-
1372
+ taneous supercurrent appears in this non-colinear state
1373
+ as schematically shown in Fig. 8(a). This superconduct-
1374
+ ing state forms a staggered flux state, where the flux is
1375
+ aligned on a honeycomb dual lattice, which is similar to
1376
+ the η-pairing with 90◦-N´eel ordering vector on the square
1377
+ lattice shown in Fig. 6(b). Figure 8(b) displays the val-
1378
+ ues of spontaneous loop current density as a function of
1379
+ the magnetic field.
1380
+ η-pairing-II state.— The η-pairing II has the struc-
1381
+ ture with up-up-down colinear phases plus CDW (Red
1382
+ hexagon in Fig. 7(b)). There is the relation nA = nB <
1383
+ nC for the electron filling at each sublattice shown in
1384
+ Fig. 7(c).
1385
+ We note that this site-dependent feature is
1386
+ characteristic for the II (and IV) state. The phases of the
1387
+ pair potential at A and B sublattices are “ferromagnetic”,
1388
+ while the phase at C sublattice is “antiferromagnetic”.
1389
+ The resulting ordered state is regarded as the emergence
1390
+ of the honeycomb lattice formed by equivalent A and B
1391
+ sublattices.
1392
+ η-pairing-III state.— This is the η-pairing with a stag-
1393
+ gered ordering vector and CDW (Magenta square in
1394
+ Fig. 7(b)).
1395
+ The order parameter ∆ at C sublattice is
1396
+ zero, but the others (A,B) are finite. The electron-rich
1397
+ sublattices A and B form a simple bipartite η-pairing
1398
+ state on an emergent honeycomb lattice. Since this state
1399
+ does not become a ground state anywhere for the present
1400
+ choice of U = −1.83, we do not further investigate this
1401
+ state in the following.
1402
+ η-pairing-IV state.— This is the η-pairing with a sim-
1403
+ ple stripe alignment (Cyan rhombus in Fig. 7(b)). This
1404
+ η-pairing is accompanied by CDW around h = 1.9 shown
1405
+ 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1406
+ h
1407
+ °1.5
1408
+ °1.0
1409
+ °0.5
1410
+ 0.0
1411
+ 0.5
1412
+ 1.0
1413
+ 1.5
1414
+ Kxx, Kyy
1415
+ (a) -pairing Ⅰ
1416
+ η
1417
+ Eq. (25)
1418
+ 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1419
+ h
1420
+ -1.5
1421
+ -1.0
1422
+ -0.5
1423
+ 0.0
1424
+ 0.5
1425
+ 1.0
1426
+ 1.5
1427
+ Kxx, Kyy
1428
+ (b) -pairing Ⅱ
1429
+ η
1430
+ 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1431
+ h
1432
+ °1.5
1433
+ °1.0
1434
+ °0.5
1435
+ 0.0
1436
+ 0.5
1437
+ 1.0
1438
+ 1.5
1439
+ Kyy
1440
+ 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1441
+ h
1442
+ °1.5
1443
+ °1.0
1444
+ °0.5
1445
+ 0.0
1446
+ 0.5
1447
+ 1.0
1448
+ 1.5
1449
+ Kxx
1450
+ (c1) -pairing Ⅳ
1451
+ η
1452
+ (c2) -pairing Ⅳ
1453
+ η
1454
+ 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0 2.2 2.4 2.6
1455
+ h
1456
+ °1.5
1457
+ °1.0
1458
+ °0.5
1459
+ 0.0
1460
+ 0.5
1461
+ 1.0
1462
+ 1.5
1463
+ Kyy
1464
+ 0.0
1465
+ 0.5
1466
+ 1.0
1467
+ 1.5
1468
+ 2.0
1469
+ 2.5
1470
+ h
1471
+ -1.0
1472
+ -0.5
1473
+ 0.0
1474
+ 0.5
1475
+ 1.0
1476
+ K
1477
+ Kdia
1478
+ Kpara
1479
+ K
1480
+ KEFP
1481
+ KOFP
1482
+ 0.0
1483
+ 0.5
1484
+ 1.0
1485
+ 1.5
1486
+ 2.0
1487
+ 2.5
1488
+ h
1489
+ -1.0
1490
+ -0.5
1491
+ 0.0
1492
+ 0.5
1493
+ 1.0
1494
+ K
1495
+ Kdia
1496
+ Kpara
1497
+ K
1498
+ KEFP
1499
+ KOFP
1500
+ 0.0
1501
+ 0.5
1502
+ 1.0
1503
+ 1.5
1504
+ 2.0
1505
+ 2.5
1506
+ h
1507
+ -1.0
1508
+ -0.5
1509
+ 0.0
1510
+ 0.5
1511
+ 1.0
1512
+ K
1513
+ Kdia
1514
+ Kpara
1515
+ K
1516
+ KEFP
1517
+ KOFP
1518
+ <latexit sha1_base64="hwzoaSF0Y+Oi/TJGH
1519
+ /A8l7Sl9vw=">AD0HichVO5TsNAEH3BnOEIR4NEg4iQKFC0QZxdEA0lVwCJIGSbTbKL9kbFIQio
1520
+ EW08A+IH+EHKPgEagoaCmY35lIUM5bt2TfvjWd2x1bgiEgy9pLqMrp7ev6B9KDQ8MjmdGx8f3Ir4c
1521
+ 2L9q+4eHlhlxR3i8KIV0+GEQctO1H5g1TZU/OCMh5HwvT15HvBj16x4oixsUxK0U2qejGZjmb
1522
+ nfysZNFbFv+WKqEk7hw0YdLjg8SPIdmIjoOkIeDAFhx7gLCRP6DhHE2nS1onFiWESWqNnhVZHMer
1523
+ RWuWMtNqmrzh0h6Scxix7Zg/sjT2xR/bKPjrmutA5VC3n9LZaWh6cZG4md9/Vbn0lqj+qBJrlihjV
1524
+ dcqPZAI6oLW+s7KxWnQr0Jila13qKYRbiTsEuK5SbG/3Y+39ZTZ2WFdtktKpPq/FPFYpbI18m8n
1525
+ 6fX1LNEa1djSbx1M429Kz5xA4SuV8d/+am9ayvKVv6nux2Z38hl1/OLW4vZgvrV62p78cUZjBHk72C
1526
+ AjaxhSJlLuMWd7g3doyGcWlct6hdqfhPmcAfM24+AbMryxg=</latexit>}
1527
+ FIG. 9. Magnetic field dependence of the Meissner kernels
1528
+ Kxx and Kyy for the η-pairings I, II, IV on the triangular lat-
1529
+ tice. The yellow shaded rectangle indicates the regime where
1530
+ each η-pairing becomes the ground state. The symbols are
1531
+ the same as those in Fig. 4(a). For the η-pairing IV, Kxx and
1532
+ Kyy are separately plotted in (c1) and (c2).
1533
+ in Fig. 7(c). As shown below, this stripe phase show an
1534
+ anisotropic behavior in linear response coefficients, while
1535
+ the other η-pairing states are isotropic.
1536
+ 2.
1537
+ Meissner response
1538
+ Now we discuss the Meissner response. Figure 9(a,b,c)
1539
+ shows the Meissner kernels Kxx, Kyy for the η-pairing I,
1540
+ II and IV. The yellow-highlighted parts indicate the re-
1541
+ gion where each η-pairing becomes the ground state as
1542
+ identified from Fig. 7(b).
1543
+ The result for the η-pairing
1544
+ III is not shown because it does not become a ground
1545
+ state at U = −1.83. We confirm that the Meissner re-
1546
+ sponse is basically diamagnetic if the η-pairing becomes
1547
+ the ground state as shown in Figs. 9(a,b,c). Thus the en-
1548
+ ergetic stability and diamagnetic response are reasonably
1549
+ correlated. In the following, we discuss the properties of
1550
+ the Meissner kernel for each state.
1551
+ The Meissner kernels for both η-pairing I and η-pairing
1552
+ II shown in Figs. 9(a) and (b) satisfy the relation Kxx =
1553
+ Kyy, which means an isotropic linear response. For the η-
1554
+ pairing I, the Meissner kernel becomes positive in the re-
1555
+ gions h < 1.2, 1.95 < h < 2.12, while the kernel becomes
1556
+ negative in the ground state region (Fig. 9(a)). Although
1557
+ the local current density is finite for the η-pairing I state,
1558
+ it does not affect the expression of the Meissner kernel in
1559
+ Eq. (10) since the total current j(q = 0) is zero.
1560
+ Next we disucuss the η-pairing IV state. The Meiss-
1561
+
1562
+ 10
1563
+ ner kernel jumps at h = 1.8 due to the emergence of
1564
+ the CDW order parameter as shown in Fig. 9(c1,c2). It
1565
+ is notable that the η-pairing IV with the stripe pattern
1566
+ shows a difference between x and y directions as shown
1567
+ in Figs. 9(c1,c2), respectively. This characteristic behav-
1568
+ ior can be intuitively understood from Fig. 7(a), where
1569
+ the current along the x-axis flows with experiencing a
1570
+ staggered pair potential, whereas the current in the y-
1571
+ direction feels an uniform pair potential. In the Meissner
1572
+ response, Kxx shows a characteristic behavior of the η-
1573
+ pairing, while Kyy is qualitatively the same as the kernel
1574
+ of BCS. Thus, as shown in Fig. 9(c1), the diamagnetic
1575
+ response in the x-axis direction is related to to the odd-
1576
+ frequency pair, whereas the diamagnetic response in the
1577
+ y-axis direction, shown in Fig. 9(c2), is related to even-
1578
+ frequency pair.
1579
+ V.
1580
+ SUMMARY AND OUTLOOK
1581
+ We have studied the square and the triangular lattice
1582
+ of the attractive Hubbard model by using the mean-field
1583
+ theory.
1584
+ Several types of η-pairing have been found in
1585
+ the triangular lattice where a simple bipartite pattern
1586
+ is not allowed.
1587
+ Using the formulation of the Meissner
1588
+ kernel for a general tight-binding lattice, we have inves-
1589
+ tigated the electromagnetic stability of η-pairings. We
1590
+ have confirmed that the electromagnetic stability of the
1591
+ η-pairing correlates with the internal energy. In a narrow
1592
+ parameter range, we also find that the η-pairing state can
1593
+ show an unphysical paramagnetic response if we assume
1594
+ the two or three sublattice structure in the mean-field
1595
+ calculation.
1596
+ In this case, another solution with longer
1597
+ periodicity needs to be sought.
1598
+ When the current path experiences the staggered
1599
+ phase of the superconducting order parameter, the odd-
1600
+ frequency component of the pair amplitude contributes
1601
+ to the diamagnetic response. This is in contrast to the
1602
+ conventional BCS case in which the even-frequency com-
1603
+ ponent of the pair amplitude contributes to the diamag-
1604
+ netism.
1605
+ We have further clarified that one of the η-
1606
+ pairing states on the triangular lattice has a stripe pat-
1607
+ tern and shows an anisotropic Meissner response. In this
1608
+ case, the odd-frequency pair contributes diamagnetically
1609
+ or paramagnetically depending on the direction of cur-
1610
+ rent.
1611
+ We comment on some issues which are not explored in
1612
+ this paper. We expect that the η-pairing without a simple
1613
+ staggered phase will appear on pyrochlore, kagome and
1614
+ quasicrystalline lattice, whose phase-alignment could be
1615
+ qualitatively different from the triangular lattice. In ad-
1616
+ dition, there is another model that shows η-pairing in
1617
+ equilibrium. A two-channel Kondo lattice (TCKL) is an
1618
+ example of a model in which η-pairing appears even in
1619
+ the absence of a Zeeman field [24]. Our preliminary cal-
1620
+ culation for the TCKL shows a number of ordered states
1621
+ which have similar energies.
1622
+ These additional studies
1623
+ provide more insight into the exotic superconductivity
1624
+ (a)
1625
+ (b)
1626
+ (c)
1627
+ °1
1628
+ 0
1629
+ 1
1630
+ !n
1631
+ 0.0
1632
+ 0.6
1633
+ 1.2
1634
+ 1.8
1635
+ 2.4
1636
+ 3.0
1637
+ 3.6
1638
+ 4.2
1639
+ 4.8
1640
+ 5.4
1641
+ 6.0
1642
+ Re[F " #(i!n) ° F # "(i!n)]/
1643
+ p
1644
+ 2
1645
+ h=1.417
1646
+ h=1.375
1647
+ h=1.333
1648
+ h=1.25
1649
+ h=1.167
1650
+ h=1.083
1651
+ h=1.0
1652
+ h=0.917
1653
+ h=0.833
1654
+ h=0.75
1655
+ h=0.667
1656
+ °0.2°0.1 0.0
1657
+ 0.1
1658
+ 0.2
1659
+ !n
1660
+ 0.0
1661
+ 0.6
1662
+ 1.2
1663
+ 1.8
1664
+ 2.4
1665
+ 3.0
1666
+ 3.6
1667
+ 4.2
1668
+ 4.8
1669
+ 5.4
1670
+ 6.0
1671
+ Re[F " #(i!n) ° F # "(i!n)]/
1672
+ p
1673
+ 2
1674
+ 1.417
1675
+ 1.375
1676
+ 1.333
1677
+ 1.25
1678
+ 1.167
1679
+ 1.083
1680
+ 1.0
1681
+ 0.917
1682
+ 0.833
1683
+ 0.75
1684
+ 0.667
1685
+ °1.0 °0.5
1686
+ 0.0
1687
+ 0.5
1688
+ 1.0
1689
+ !
1690
+ 0.0
1691
+ 0.2
1692
+ 0.4
1693
+ 0.6
1694
+ 0.8
1695
+ 1.0
1696
+ 1.2
1697
+ 1.4
1698
+ 1.6
1699
+ 1.8
1700
+ 2.0
1701
+ D¥°pairing ° Dnormal
1702
+ °0.2°0.1 0.0
1703
+ 0.1
1704
+ 0.2
1705
+ !n
1706
+ 0.0
1707
+ 0.6
1708
+ 1.2
1709
+ 1.8
1710
+ 2.4
1711
+ 3.0
1712
+ 3.6
1713
+ 4.2
1714
+ 4.8
1715
+ 5.4
1716
+ 6.0
1717
+ Im[F # #(i!n) ° F " "(i!n)]/
1718
+ p
1719
+ 2
1720
+ FIG. 10. (a) The difference between the DOSs of the η-pairing
1721
+ and normal states in the cubic lattice model. The values of
1722
+ the DOS are shifted by 0.2 for each magnetic field, and the
1723
+ gray dotted lines are the zero axes for each magnetic field.
1724
+ We also show the Matsubara frequency dependence of (b) the
1725
+ imaginary part of [F↓↓(iωn) − F↑↑(iωn)] /
1726
+
1727
+ 2 and (c) the real
1728
+ part of [F↑↓(iωn) − F↓↑(iωn)] /
1729
+
1730
+ 2 for each magnetic field. The
1731
+ values of the pair amplitudes are shifted by 0.6.
1732
+ characteristic for the η-pairing.
1733
+ ACKNOWLEDGEMENT
1734
+ This work was supported by KAKENHI Grants No.
1735
+ 18H01176, No. 19H01842, and No. 21K03459.
1736
+ Appendix A: Self-consistent equations in mean-field
1737
+ theory
1738
+ We derive self-consistent equations for the general in-
1739
+ teracting Hamiltonian. Let us begin with the Hamilto-
1740
+ nian
1741
+ H =
1742
+
1743
+ 12
1744
+ ε12c†
1745
+ 1c2 +
1746
+
1747
+ 1234
1748
+ U1234c†
1749
+ 1c†
1750
+ 2c4c3
1751
+ (A1)
1752
+ where site-spin indices are written as 1 = (i1, σ1). The
1753
+ mean-field Hamiltonian is introduced as
1754
+ HMF =
1755
+
1756
+ 12
1757
+
1758
+ E12c†
1759
+ 1c2 + ∆12c†
1760
+ 1c†
1761
+ 2 + ∆∗
1762
+ 12c2c1
1763
+
1764
+ .
1765
+ (A2)
1766
+ We assume ⟨H ⟩ = ⟨HMF⟩ where the statistical average
1767
+ is taken with HMF. Then the self-consistent equation is
1768
+ obtained as
1769
+ E12 = ∂⟨H ⟩
1770
+ ∂⟨c†
1771
+ 1c2⟩
1772
+ = ε12 +
1773
+
1774
+ 34
1775
+ (U1324 + U3142 − U1342 − U3124)⟨c†
1776
+ 3c4⟩
1777
+ (A3)
1778
+ ∆12 = ∂⟨H ⟩
1779
+ ∂⟨c†
1780
+ 1c†
1781
+ 2⟩
1782
+ =
1783
+
1784
+ 34
1785
+ U1234⟨c4c3⟩
1786
+ (A4)
1787
+
1788
+ 11
1789
+ where the Wick’s theorem is used for the derivation. Al-
1790
+ though the variational principle for the free energy also
1791
+ gives the same equation, the above formalism gives a sim-
1792
+ ple procedure to derive the self-consistent equations.
1793
+ Appendix B: Attractive Hubbard model on Cubic
1794
+ lattice
1795
+ We analyze the η-pairing on the cubic lattice, whose
1796
+ DOS does not have a van Hove singularity near zero en-
1797
+ ergy. Here we choose the parameter U = −1.375 and
1798
+ the electron concentration is half-filled. As a result, the
1799
+ DOS for the η-pairing around zero energy for each mag-
1800
+ netic filed on the cubic lattice is smaller than the DOS of
1801
+ the normal state as shown in Fig. 10(a). For reference,
1802
+ we also show in Figs.
1803
+ 10(b) and (c) the pair amplitude
1804
+ similar to Fig. 4(b) in the main text. In addition, the
1805
+ odd-frequency pair amplitude increases when DOS near
1806
+ zero energy is enhanced as seen from Figs. 10(a) and (b).
1807
+ [1] P. Fulde and R. A. Ferrell, Phys. Rev. 135, A550 (1964).
1808
+ [2] A. I. Larkin and Y. N. Ovchinnikov, Zh. Eksp. Teor. Fiz.
1809
+ 47, 1136 (1964).
1810
+ [3] C. N. Yang, Phys. Rev. Lett. 63, 2144 (1989).
1811
+ [4] For a review, see, D.F. Agterberg, J.C.S. Davis, S.D.
1812
+ Edkins, E. Fradkin, D.J. Van Harlingen, S.A. Kivelson,
1813
+ P.A. Lee, L. Radzihovsky, J.M. Tranquada, and Y. Wang,
1814
+ Ann. Rev. Condens. Matter Phys., 11, 231 (2020).
1815
+ [5] R. R. P. Singh and R. T. Scalettar, Phys. Rev. Lett. 66,
1816
+ 3203 (1991).
1817
+ [6] P. Coleman, E. Miranda, and A. Tsvelik, Phys. Rev. Lett.
1818
+ 70, 2960 (1993).
1819
+ [7] S. Hoshino and Y. Kuramoto, Phys. Rev. Lett. 112,
1820
+ 167204 (2014).
1821
+ [8] W. R. Czart, K. J. Kapcia, R. Micnas, S. Robaszkiewicz,
1822
+ Physica A: Statistical Mechanics and its Applications.
1823
+ 585, 126403 (2022)
1824
+ [9] T. Kaneko, T. Shirakawa, S. Sorella, and S. Yunoki,
1825
+ Phys. Rev. Lett. 122, 077002 (2019).
1826
+ [10] P. Werner, J. Li, D. Golez and M. Eckstein, Phys. Rev.
1827
+ B 100, 155130 (2019).
1828
+ [11] J. Li, D. Golez, P. Werner, and M. Eckstein, Phys. Rev.
1829
+ B 102, 165136 (2020).
1830
+ [12] M. Nakagawa,
1831
+ N. Tsuji,
1832
+ N. Kawakami,
1833
+ M. Ueda,
1834
+ arXiv:2103.13624 (2021).
1835
+ [13] X. M. Yang and Z. Song, Phys. Rev. B 105, 195132
1836
+ (2022).
1837
+ [14] L. Jiajun, M. M¨uller, A. J. Kim, A. M. L¨auchli, and P.
1838
+ Werner, arXiv:2202.10176 (2022).
1839
+ [15] Y. Motome, K. Nakamikawa, Y. Yamaji, and M. Uda-
1840
+ gawa, Phys. Rev. Lett. 105, 036403 (2010).
1841
+ [16] R. R. dos Santos Phys. Rev. B 48, 3976 (1993).
1842
+ [17] I. Affleck and J. B. Marston, Phys. Rev. B 37, 3774
1843
+ (1988).
1844
+ [18] S. Chakravarty, R. B. Laughlin, D. K. Morr, and C.
1845
+ Nayak, Phys. Rev. B 63, 094503 (2001).
1846
+ [19] D. K. Morr, Phys. Rev. Lett. 89, 106401 (2002).
1847
+ [20] S. Zhou and Z. Wang, Phys. Rev. B 70, 020501(R)
1848
+ (2004).
1849
+ [21] H. Yokoyama, S. Tamura, and M. Ogata, J. Phys. Soc.
1850
+ Jpn. 85, 124707 (2016).
1851
+ [22] K. Kobayashi, H. Yokoyama, and Y. Toga, J. Phys.:
1852
+ Conf. Ser. 1054, 012016 (2018).
1853
+ [23] S. Fukuda, K. Yamazaki, H. Tsuchiura, and M. Ogata,
1854
+ J. Phys.: Conf. Ser. 1293, 012026 (2019).
1855
+ [24] S. Hoshino, Phys. Rev. B 90, 115154 (2014).
1856
+ [25] V.L. Berezinskii, ZhETF Pis Red. 20, 628 (1974), [JETP
1857
+ Lett. 20, 287 (1974)].
1858
+ [26] T. R. Kirkpatrick and D. Belitz, Phys. Rev. Lett. 66,
1859
+ 1533 (1991).
1860
+ [27] A. Balatsky and E. Abrahams, Phys. Rev. B 45, 13125
1861
+ (1992).
1862
+ [28] Y. Tanaka, M. Sato, and N. Nagaosa, J. Phys. Soc. Jpn.
1863
+ 81, 011013 (2012).
1864
+ [29] J. Linder and A.V. Balatsky, Rev. Mod. Phys. 91, 045005
1865
+ (2019).
1866
+ [30] J. Cayao, C. Triola and M. Black-Schaffer, Eur. Phys. J.:
1867
+ Spec. Top. 229, 545 (2020)
1868
+ [31] H. Walter, W. Prusseit, R. Semerad, H. Kinder, W. Ass-
1869
+ mann, H. Huber, H. Burkhardt, D. Rainer, and J. A.
1870
+ Sauls, Phys. Rev. Lett. 80, 3598 (1998).
1871
+ [32] Y. Tanaka, Y. Asano, A. A. Golubov, and S. Kashiwaya,
1872
+ Phys. Rev. B 72, 140503 (2005).
1873
+ [33] F. S. Bergeret, A. F. Volkov, and K. B. Efetov, Rev. Mod.
1874
+ Phys. 77, 1321 (2005).
1875
+ [34] Ya. V. Fominov, Y. Tanaka, Y. Asano, and M. Eschrig,
1876
+ Phys. Rev. B 91, 144514 (2015)
1877
+ [35] Y. Tanaka and A. A. Golubov, Phys. Rev. Lett. 98,
1878
+ 037003 (2007)
1879
+ [36] Y. Tanaka, Y. Tanuma, and A. A. Golubov, Phys. Rev.
1880
+ B 76, 054522 (2007)
1881
+ [37] S. Higashitani, J. Phys. Soc. Jpn. 66, 2556 (1997).
1882
+ [38] T. Yokoyama, Y. Tanaka, and N. Nagaosa, Phys. Rev.
1883
+ Lett. 106, 246601 (2011).
1884
+ [39] S.-I. Suzuki and Y. Asano, Phys. Rev. B 91, 214510
1885
+ (2015).
1886
+ [40] A. Di Bernardo, Z. Salman, X. L. Wang, M. Amado, M.
1887
+ Egilmez, M. G. Flokstra, A. Suter, S. L. Lee, J. H. Zhao,
1888
+ T. Prokscha, E. Morenzoni, M. G. Blamire, J. Linder,
1889
+ and J. W. A. Robinson, Phys. Rev. X 5, 041021 (2015).
1890
+ [41] J. A. Krieger, A. Pertsova, S. R. Giblin, M. Dbeli, T.
1891
+ Prokscha, C. W. Schneider, A. Suter, T. Hesjedal, A. V.
1892
+ Balatsky, and Z. Salman, Phys. Rev. Lett. 125, 026802
1893
+ (2020).
1894
+ [42] R. Micnas, J. Ranninger, and S. Robaszkiewicz, Rev.
1895
+ Mod. Phys. 62, 113 (1990).
1896
+ [43] H. Shiba, Prog. Theor. Phys. 48, 2171 (1972).
1897
+
1898
+ 12
1899
+ [44] Y. Claveau, B. Arnaud, S. D. Matteo, Eur. J. Phys. 35,
1900
+ 035023 (2014).
1901
+ [45] I. Bloch, J. Dalibard, and W. Zwerger, Rev. Mod. Phys.
1902
+ 80, 885 (2008).
1903
+ [46] D.J. Scalapino, S. R. White, and S. C. Zhang, Phys. Rev.
1904
+ Lett. 68, 2830 (1992).
1905
+ [47] D. J. Scalapino, S. R. White, and S. C. Zhang, Phys.
1906
+ Rev. B 47, 7995 (1993).
1907
+ [48] T. Kostyrko, R. Micnas, and K. A. Chao, Phys. Rev. B
1908
+ 49, 6158 (1994).
1909
+ [49] S. Hoshino, K. Yada, and Y. Tanaka, Phys. Rev. B 93,
1910
+ 224511 (2016).
1911
+ [50] A. Tsuruta, S. Hyodo, and K. Miyake, J. Phys. Soc. Jpn.
1912
+ 83, 063706 (2014).
1913
+ [51] D. Chakraborty and A. M. Black-Schaffer, Phys. Rev. B
1914
+ 106, 024511 (2022).
1915
+ [52] J. Pearl, App. Phys. Lett. 5, 65 (1964).
1916
+
49FAT4oBgHgl3EQfFRw-/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4dFAT4oBgHgl3EQflx3j/content/tmp_files/2301.08620v1.pdf.txt ADDED
@@ -0,0 +1,1060 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Adjoint-based Identification of Sound Sources for
2
+ Sound Reinforcement and Source Localization
3
+ Mathias Lemke and Lewin Stein
4
+ Institut f¨ur Str¨omungsmechanik und Technische Akustik,
5
+ Technische Universit¨at Berlin, Germany
6
7
+ Abstract. The identification of sound sources is a common problem in
8
+ acoustics. Different parameters are sought, among these are signal and
9
+ position of the sources. We present an adjoint-based approach for sound
10
+ source identification, which employs computational aeroacoustic tech-
11
+ niques. Two different applications are presented as a proof-of-concept:
12
+ optimization of a sound reinforcement setup and the localization of (mov-
13
+ ing) sound sources.
14
+ Keywords: Computational Aeroacoustics, Adjoint Equations, Source
15
+ Identification, Sound Reinforcement, Source Localization
16
+ 1
17
+ Introduction
18
+ A common issue in acoustics is the identification of fixed or moving sound
19
+ sources. In general, several parameters have to be determined; among these are
20
+ the source signal and the position of the sources. This general problem occurs
21
+ in many applications, from environmental to industrial acoustics.
22
+ In this contribution, we discuss an adjoint-based approach for sound source
23
+ identification. The time-domain method is based on the (adjoint) Euler equa-
24
+ tions, which are solved by means of computational aeroacoustic techniques (CAA).
25
+ The approach allows considering complex base flows, such as non-homogeneous
26
+ base flow, thermal stratification as well as complex geometries.
27
+ Adjoint-based methods have been used in the field of fluid mechanics for
28
+ decades. They have proven to be an effective approach for the analysis of flow
29
+ configurations and determining optimal model parameters in various applications
30
+ [7]. Adjoint-based techniques are used to optimize flow configurations by means
31
+ of geometry modifications [9] or for active flow control applications [1]. They are
32
+ applied for the analysis and optimization of reactive flow configurations [13,12]
33
+ and data assimilation applications [23,14,8]. Furthermore, they are employed in
34
+ the field of aeroacoustics [4,20] and sound reinforcement applications [15,21].
35
+ Here, we restrict ourselves to two applications from the areas of sound re-
36
+ inforcement and sound source localization with generic setups as a proof-of-
37
+ concept.
38
+ In the context of sound reinforcement, line arrays are used for the synthesis of
39
+ sound fields. The identification of the geometric arrangement and the electronic
40
+ arXiv:2301.08620v1 [cs.SD] 20 Jan 2023
41
+
42
+ 2
43
+ Mathias Lemke et al.
44
+ drive of the loudspeaker cabinets to optimally (re-)produce a sound field is an
45
+ ill-posed, inverse problem. Typically frequency domain approaches are employed
46
+ [3,22].
47
+ For the localization of moving and non-moving sound sources, usually, micro-
48
+ phone array methods like beam-forming are used. Depending on the specific task,
49
+ different algorithms, working in the time domain or in the frequency domain,
50
+ are applied. See [16] for a recent overview.
51
+ The manuscript is organized as follows: In Sec. 2, the adjoint approach is in-
52
+ troduced, and the adjoint Euler equations are derived. After a short description
53
+ of the numerical implementation in Sec. 3, the derived framework is employed for
54
+ an application in the context of sound reinforcement in Sec. 4. The applicability
55
+ of the approach for localization of sound sources is discussed in Sec. 5.
56
+ 2
57
+ Adjoint Approach
58
+ 2.1
59
+ General Adjoint Equations
60
+ Adjoint equations can be derived in different ways, e.g., the continuous or the
61
+ discrete approach. Despite different discretizations, the approaches are consistent
62
+ and applicable, see [7] for a discussion. In addition, automatic differentiation
63
+ techniques are used to create adjoint codes from existing simulation programs.
64
+ Recently, a mode-based approach to derive adjoint operators was presented [19]
65
+ as an enhancement of a direct operator construction method [12].
66
+ Here, the adjoint equations are introduced in a discrete manner. A matrix-
67
+ vector notation is used, in which the vector space is the full solution in space
68
+ and time. The section is based on [7,11].
69
+ In general, the adjoint equations arise by a scalar-valued objective function
70
+ J, which is defined by the user and encodes the target of the analysis, e.g., an
71
+ optimization. It is given by the scalar product between a weight vector g and a
72
+ system state vector q
73
+ J = gTq.
74
+ (1)
75
+ The system state q is the solution of the governing system
76
+ Aq = s
77
+ (2)
78
+ with A as governing operator and s as right-hand side forcing. In order to opti-
79
+ mize J by means of s in terms of a brute-force approach, the governing equation
80
+ has to be solved for all possible s.
81
+ Instead, to reduce the computational effort, the adjoint equation can be used
82
+ ATq∗ = g,
83
+ (3)
84
+ with the adjoint variable q∗.
85
+ With
86
+ J = gTq =
87
+
88
+ ATq∗�T q = q∗TAq = q∗Ts
89
+ (4)
90
+
91
+ Adjoint Sound
92
+ 3
93
+ a formulation is found, which enables the computation of the objective J without
94
+ solving the governing system for every possible s. With the solution of the adjoint
95
+ equation, the objective can be calculated by a scalar product. Thus, the adjoint
96
+ approach enables efficient computation of gradients for J with respect to s.
97
+ 2.2
98
+ Adjoint Euler equations for Acoustic Applications
99
+ The section is based on [11,21]. The objective function J is defined in space and
100
+ time with dΩ = dxidt in the whole computational domain:
101
+ J = 1
102
+ 2
103
+ �� �
104
+ q − qtarget�2 dΩ.
105
+ (5)
106
+ The variable q contains the full state q = [ϱ, uj, p] of the system governed by the
107
+ Euler equations. Therein, ϱ denotes the density, uj the velocity in the direction
108
+ xj, and p the pressure.
109
+ For the following aeroacoustic analyses the evaluation of the objective func-
110
+ tion is restricted to the pressure, resulting in
111
+ J = 1
112
+ 2
113
+ �� �
114
+ p − ptarget�2 σ dΩ.
115
+ (6)
116
+ The additional weight σ(xi, t) defines where and when the objective is evalu-
117
+ ated. In general, the objective function has to be supplemented by a regular-
118
+ ization term, which is omitted here for the sake of clarity. The target ptarget is
119
+ application-specific. For optimization tasks, as presented in Sec. 4, it is defined
120
+ corresponding to a desired sound field, e.g., optimal listening experience for the
121
+ auditorium of an open-air concert. For the source localization application pre-
122
+ sented in Sec. 5, the target pressure is defined by microphone measurements.
123
+ The microphone positions are included by means of the weight function σ. In
124
+ both cases, a minimum of J is desired.
125
+ This minimum is to be achieved under the constraint that the Euler equa-
126
+ tions
127
+ ∂t
128
+
129
+
130
+ ϱ
131
+ ϱuj
132
+ p
133
+ γ−1
134
+
135
+ � + ∂xi
136
+
137
+
138
+ ϱui
139
+ ϱuiuj + pδij
140
+ uipγ
141
+ γ−1
142
+
143
+ � − ui∂xi
144
+
145
+
146
+ 0
147
+ 0
148
+ p
149
+
150
+ � =
151
+
152
+
153
+ 0
154
+ 0
155
+ sp
156
+
157
+ � ,
158
+ with γ as heat capacity ratio, are fulfilled. The summation convention applies.
159
+ For details on the formulation, in particular, the reformulation of the energy
160
+ equation in terms of pressure, see [13].
161
+ To ease the derivation, the above system of partial differential equations is
162
+ abbreviated by
163
+ E(q) = s.
164
+ (7)
165
+ The terms s = [0, 0, sp] on the right side of the Euler equations character-
166
+ ize monopole sound sources, which allow controlling the system state, respec-
167
+ tively, the solution of the equations. In general, also mass and momentum source
168
+
169
+ 4
170
+ Mathias Lemke et al.
171
+ terms could be considered. The overall goal is to obtain a solution of the Euler
172
+ equations, which reduces the objective (6) by adapting s. An optimization of s
173
+ corresponds to an optimization of the loudspeakers’ output signals.
174
+ To use the adjoint approach for optimizing s, the objective function (6) and
175
+ the governing system (7) have to be linearized. This results in
176
+ δJ =
177
+ �� �
178
+ q − qtarget�
179
+ σ
180
+
181
+ ��
182
+
183
+ =g
184
+ δpdΩ,
185
+ (8)
186
+ and
187
+ Elinδq = δs.
188
+ (9)
189
+ The weight g = (q − qtarget)σ encodes the difference between the current numer-
190
+ ical solution and the target field. Here, it is evaluated only in terms of pressure,
191
+ as discussed above. Combining the linearized system and the objective in a La-
192
+ grangian manner leads to
193
+ δJ = gTδq − q∗T (Elinδq − δs)
194
+
195
+ ��
196
+
197
+ =0
198
+ (10)
199
+ = q∗Tδs + δqT �
200
+ g − ET
201
+ linq∗�
202
+ .
203
+ Please note, the spatial and temporal integrals are not shown for the sake of
204
+ simplicity.
205
+ The desired adjoint equation E∗ = ET
206
+ lin results from demanding
207
+ g − ET
208
+ linq∗ = 0,
209
+ (11)
210
+ with q∗ = [ϱ∗, u∗
211
+ j, p∗] as adjoint state variable.
212
+ For a detailed derivation of the adjoint Euler equations see [11]. They are
213
+ given by
214
+ ∂tq∗ = ˜A
215
+
216
+ −(Bi)T∂xiq∗ − ∂xi(Ci)Tq∗ + ˜Ci∂xic − g
217
+
218
+ (12)
219
+ with ˜A =
220
+
221
+ AT�−1 and ˜Ci as resorting
222
+ q∗
223
+ αδCi
224
+ αβ∂xicβ = q∗
225
+ αδqκ
226
+ ∂Ci
227
+ αβ
228
+ ∂qκ
229
+ ∂xicβ
230
+ (13)
231
+ abbreviated as δqκ ˜Ci
232
+ κβ∂xicβ. The matrices A, Bi and Ci are given in the ap-
233
+ pendix.
234
+ Finally, the change of the objective function is given by
235
+ δJ = q∗Tδs.
236
+ (14)
237
+ Thus, the solution of the adjoint equation can be interpreted as gradient of J
238
+ with respect to the source terms s
239
+ ∇sJ = q∗.
240
+ (15)
241
+ Initial and boundary conditions of the adjoint Euler equations as well as the
242
+ derivation of the adjoint compressible Navier-Stokes equations are discussed in
243
+ [11].
244
+
245
+ Adjoint Sound
246
+ 5
247
+ sources
248
+ initial guess
249
+ s0=0
250
+ solution
251
+ Euler equations
252
+ N(q, sn) 
253
+ target
254
+ qtarget
255
+ solution adjoint
256
+ Euler equations
257
+ N*(q,q*,Δ q)
258
+ gradient
259
+ q*
260
+ sources
261
+ update sn+1
262
+ Δ q = q ­ qtarget
263
+ optimal
264
+ s
265
+ source
266
+ positions
267
+ p
268
+ convergence
269
+ loop 1
270
+ Fig. 1. Iterative procedure for the determination of an optimal s. Computationally
271
+ intensive steps are marked in gray. The first gradient provides information on (optimal)
272
+ source positions, see Sec. 5 for a detailed discussion.
273
+ 2.3
274
+ Iterative Process
275
+ The adjoint-based gradient is employed in an iterative manner. First, the Euler
276
+ equations (7) are solved forward in time, usually with s0 = 0. Subsequently,
277
+ the adjoint equations (12) are calculated backward in time, deploying the direct
278
+ solution and g. Based on the adjoint solution, the gradient ∇sJ is determined
279
+ and used to update the source distribution sn by means of a steepest gradient
280
+ approach:
281
+ sn+1 = sn + α∇sJ,
282
+ (16)
283
+ with α denoting an appropriate step size and n the iteration number. The gradi-
284
+ ent is calculated for the whole computing region and the entire simulation time.
285
+ For the determination of sound sources with a known position, the gradient is
286
+ evaluated only there. The procedure is repeated, using the current sn, until a
287
+ suitable convergence criterion is reached. Typically, for acoustic problems, con-
288
+ vergence is reached within or less 20 loops.
289
+ The identification of global optima is not ensured as the proposed technique
290
+ optimizes to local extrema only. The computational costs of the approach are
291
+ independent of the number of sources and their arrangement. However, they
292
+ depend on the size and resolution of the computational domain in space and
293
+ time, defined by the considered frequency range. The computational problem is
294
+ fully parallelizable.
295
+ 2.4
296
+ Source Localization
297
+ In particular, when s0 = 0 holds, the first adjoint solution contains information
298
+ on the position of the sources. By the pointwise summation of the absolute
299
+ adjoint sensitivities p∗ in the spatial domain over all computed time steps
300
+ ¯p =
301
+ tn=end
302
+
303
+ tn=0
304
+ |p∗|,
305
+ (17)
306
+
307
+ 6
308
+ Mathias Lemke et al.
309
+ the positions featuring maximum impact on the objective function can be iden-
310
+ tified by means of maxima of ¯p. These correspond to the most likely (monopole)
311
+ source locations. Thus, the adjoint solution allows the localization of sound
312
+ sources, see Sec. 5. A subsequent iterative adaptation of the sources can be
313
+ interpreted as adjoint-based monopole synthesis.
314
+ 3
315
+ Adjoint CAA framework
316
+ The set of governing equations (7) is implemented by means of a new MPI-
317
+ parallelized Fortran program. The discretization is realized by a finite difference
318
+ time domain approach (FDTD). For the spatial derivatives, a compact scheme
319
+ of 6th order is employed [10]. The corresponding linear system of equations is
320
+ solved by BLAS routines using an LU-decomposition. For the time-wise inte-
321
+ gration, the standard explicit Runge-Kutta-scheme of fourth-order is used.
322
+ To ensure stability, a compact filter is employed [5]. Boundaries are treated by
323
+ characteristic boundary conditions [18]. The MPI implementation is realized by
324
+ collective communication via all2all v. The parallelization strategy is found to
325
+ be efficient for the governing equations (7), see Fig. 2, and comparable to other
326
+ implementations using collective communication, e.g. [17].
327
+ Thus, the code is prepared to handle large scale problems, e.g., open-air festi-
328
+ val sites in the context of sound reinforcement applications or source localization
329
+ for vehicle aeroacoustics in wind tunnels. However, the examples presented in
330
+ the following are computed using a single workstation or a few cluster nodes.
331
+ Fig. 2. (Left) Strong scaling behaviour. The overall number of grid points is kept
332
+ constant while increasing the number of MPI processes. Nearly linear scaling is found.
333
+ (Right) Weak scaling behaviour. The number of grid points on each process is kept
334
+ constant while increasing the number of MPI processes. An admissible reduction of the
335
+ parallelization efficiency is found.
336
+ The adjoint equations are solved using the same discretization. A detailed
337
+ discussion on the adjoint initial- and characteristic boundary conditions can be
338
+ found in [11].
339
+
340
+ 8
341
+ speedup
342
+ 6
343
+ 4
344
+ caa
345
+ 2
346
+ --ideal
347
+ 400
348
+ 1200
349
+ 2000
350
+ 2800
351
+ 3600
352
+ MPl processesefficiency
353
+ 0.9
354
+ 0.8
355
+ caa
356
+ .--ideal
357
+ 0.7
358
+ 40
359
+ 80
360
+ 160
361
+ 320
362
+ 640
363
+ 1280 2560
364
+ MPl processesAdjoint Sound
365
+ 7
366
+ 4
367
+ Application I: Sound Reinforcement
368
+ This section presents a test case regarding the optimization of sound reinforce-
369
+ ment setups. The overall goal is to identify optimal drives (amplitude and phase)
370
+ for given loudspeakers in order to synthesise a desired sound field. The loudspeak-
371
+ ers are approximated by means of monopole sources, which is feasible for low
372
+ frequencies.
373
+ The spatial domain under consideration is 1.6 × 1.6 × 1.6 m3. The domain
374
+ is resolved by 197 × 197 × 99 equidistantly distributed points. The time step,
375
+ and by this, the sampling rate, is given by 48 kHz, corresponding to a CFL-
376
+ condition smaller than 1. The computational time span considered is 31.25 ms.
377
+ The reference values for density and pressure correspond to a speed of sound
378
+ of 343 m/s. All boundaries are treated as non-reflecting. In addition, a sponge
379
+ layer is applied at all boundaries.
380
+ For the test case reference signals for five sources, located in a curved ar-
381
+ rangement in the center x1-x2 plane, are predefined. The signals are charac-
382
+ terised by different amplitudes and phase delays resulting in a steered sound
383
+ field, see Fig. 3 (left). In order to investigate the frequency band 1-3 kHz, a
384
+ corresponding logarithmic sine-sweep is specified as the reference signal. Using
385
+ this setup, a reference sound field is computed by a Complex Directivity Point
386
+ Source (CDPS) algorithm [2]. The resulting reference sound field serves as the
387
+ target for the adjoint-based framework, with the aim to identify the reference
388
+ signals (amplitudes and phases) based on the reference target sound field only.
389
+ After 15 iterative loops of the adjoint framework, the objective function is
390
+ reduced to nearly 3% with respect to the initial solution with s = 0, see Fig. 3
391
+ (right). The general features of the target reference sound field are captured, see
392
+ Fig. 4. A detailed spectral analysis of the occurring deviations at two selected
393
+ microphone positions, presented in Fig. 4, show amplitude deviations less than
394
+ 1 dB within the confidence interval from 1.3 to 2.7 kHz. The normalized phase
395
+ derivations, with respect to 2π, are in the limits of -0.07 to 0.07.
396
+ A discussion on how to derive optimal electronic drives from the adjoint-
397
+ based signals s is given in [21]. Therein, the capability of the approach to consider
398
+ complex base flows by means of wind and temperature stratification is shown.
399
+ 5
400
+ Application II: Source Localization
401
+ In this section, the localization of fixed and moving sound sources is shown. Two
402
+ generic setups serve as a proof of concept. For the first setup with four stationary
403
+ sound sources and the second setup with a moving source, it is shown that the
404
+ adjoint-based approach is able to identify the sources and track their path in
405
+ case of moving.
406
+ In both cases, the measurements are provided by a reference computation
407
+ with predefined sound sources. Synthetic microphone signals are extracted from
408
+ this reference solution. A spatially discrete planar array with 64 microphones is
409
+ used. The general setup is based on the array benchmark test case B7 provided
410
+
411
+ 8
412
+ Mathias Lemke et al.
413
+ Fig. 3. (Left) Sound reinforcement setup including a selected time step of the CDPS-
414
+ based reference sound field shown at the center x1-x2 plane of the computational do-
415
+ main. The five monopole speakers in a curved arrangement are denoted by (*). Different
416
+ driving functions (in amplitude and phase) for the speaker result in a steered sound
417
+ field. The area/volume marked by the dashed line corresponds to the spatial weight σ
418
+ in the objective function. Please note, the employed CDPS technique for computing
419
+ the reference sound field does not provide reliable solutions near the source positions;
420
+ therefore, p′
421
+ ref is discontinuous for x1 = [0.32, 0.62] m. (Right) Progress of the objective
422
+ function with a logarithmic y-axis. Convergence is reached. The objective is reduced
423
+ by nearly two orders of magnitude with respect to the initial guess s = 0.
424
+ Fig. 4. Reference target (left) and resulting optimized (right) sound field at t = 15.63
425
+ ms for the center x1-x2 plane. The general features of the reference field are (re-)
426
+ captured. The influence of the employed sponge layer in the adjoint-based sound field
427
+ is visible. The dashed line encodes the spatial weight σ within the objective function.
428
+ The marked positions correspond to synthetic microphone positions x1,2 = [1.1, 1.1]
429
+ and x1,2 = [0.8, 0.8] which are used for spectral analysis, see text for details.
430
+
431
+ 1.5
432
+ 0.8
433
+ 米‘
434
+ speaker
435
+ 0.6
436
+ 0.4
437
+ a
438
+ m
439
+ 0.
440
+ 8
441
+ 0
442
+ d-
443
+ 0.5
444
+ 0.P
445
+ -0.4
446
+ 0.5
447
+ 1
448
+ 1.5
449
+ X, /m1
450
+ 0.5
451
+ 0.25
452
+ r/
453
+ 0.1
454
+ 0.05
455
+ 0.02
456
+ 5
457
+ 10
458
+ 15
459
+ iteration1.5
460
+ 0.5
461
+ 1
462
+ a
463
+ P
464
+ 0
465
+ +
466
+ ref
467
+ p
468
+ 0.5
469
+ -0.5
470
+ 0.5
471
+ 1
472
+ 1.5
473
+ X, / m1.5
474
+ 0.5
475
+ 1
476
+ a
477
+ P
478
+ 0
479
+ +
480
+ opt
481
+ 2
482
+ p
483
+ 0.5
484
+ -0.5
485
+ 0.5
486
+ 1
487
+ 1.5Adjoint Sound
488
+ 9
489
+ Fig. 5. (Left) Normalized amplitude difference between resulting optimized and refer-
490
+ ence target sound field at selected microphone positions, see Fig. 4. (Right) Normalized
491
+ phase difference between resulting optimized and reference target sound field at the
492
+ selected microphone positions.
493
+ by the Brandenburg university of technology, see [6]. Modifications are discussed
494
+ below. An example in which experimental data are used is shown in [11].
495
+ The spatial domain under consideration is 1.7 × 1.7 × 1.25 m3. The domain
496
+ is resolved by 240 × 240 × 176 equidistantly distributed points. The time step,
497
+ and by this, the sampling rate of the microphone measurements, is given by
498
+ 53.33 kHz, corresponding to a CFL-condition smaller than 1. In both cases, no
499
+ base flow is considered. The reference values for density and pressure correspond
500
+ to a speed of sound of 343 m/s. The spiral-like microphone array is located at
501
+ x3 = 0 m and centered in the corresponding plane. The spatial distribution of
502
+ the microphones is described in more detail in [6]. All boundaries are treated as
503
+ non-reflecting. In addition, a sponge layer is applied at all boundaries.
504
+ 5.1
505
+ Four sources
506
+ As in the array benchmark test case B7 four monopole sources are located in
507
+ the x1-x2-plane at x3 = 0.75 m, see Fig. 6 (left). For the reference computation,
508
+ the original benchmark source signals are replaced by incoherent random sig-
509
+ nals, frequency-band limited between 750 and 2500 Hz, see Fig. 6 (right). The
510
+ computational time span is 14.06 ms.
511
+ Using a corresponding reference forcing s = �
512
+ i si a simulation of the Euler
513
+ equations (7) is carried out. From the results, discrete microphone signals are
514
+ extracted, see Fig. 7 (left), which are the result of the superposition of all sources
515
+ and the associated signals.
516
+ The 64 signals are encoded in the objective function J (6) using the spatial
517
+ weight σ. To avoid an unstable discrete forcing of the adjoint equations, σ is
518
+ chosen as Gauss-distribution with a half-width of 2∆x for each microphone
519
+ position. After determining the solution of the direct equations with an initial
520
+ guess for s = 0, here, constant environmental conditions for all time steps, the
521
+
522
+ mic 1
523
+ B
524
+ 0.4
525
+ mic 2
526
+ ta
527
+ 0.2
528
+ p
529
+ opt
530
+ 0
531
+ -0.2
532
+ -0.4
533
+ -0.6
534
+ 1500
535
+ 2000
536
+ 2500
537
+ f /Hz0.1
538
+ mic 1
539
+ mic 2
540
+
541
+ 0.05
542
+ tar
543
+ 0
544
+ opt
545
+ -0.05
546
+ -0.1
547
+ 1500
548
+ 2000
549
+ 2500
550
+ f / Hz10
551
+ Mathias Lemke et al.
552
+ Fig. 6. (Left) Acoustic setup for source localization of four sources (*) by 64 micro-
553
+ phones (o) located in the planes x3 = 0.75 m respectively x3 = 0 m. (Right) Normalized
554
+ signals si of the four reference sources, shown for the whole computational time.
555
+ adjoint equations are solved backwards in time. From the resulting gradient, the
556
+ source positions can be derived, as discussed before. That way, the reference
557
+ source positions are identified, see Fig. 7 (right).
558
+ Fig. 7. (Left) Captured pressure signal at the center microphone in the array. The
559
+ initial silence results from the distance between the sources and the array. (Right) Re-
560
+ sulting pointwise summation of the absolute adjoint sensitivities p∗ (17). The reference
561
+ source positions (∗) are recovered.
562
+ Please note, the analysis is based on the first adjoint-based gradient only.
563
+ The required computational time for the analysis is less than 15 min on a 16
564
+ core workstation. Iterative optimization of s might improve the results.
565
+ 5.2
566
+ Single moving source
567
+ Again, the aforementioned test case B7 from [6] serves as a base for the following
568
+ test setup. The planar microphone array is located in the same plane (x3 = 0) but
569
+
570
+
571
+
572
+ 0.5
573
+
574
+
575
+ 8
576
+ 00
577
+ 0
578
+ 8
579
+ 0
580
+ 0
581
+ 0
582
+ 0
583
+ 00
584
+ 00
585
+ 00
586
+ 00
587
+ 0
588
+ 0
589
+ 0
590
+ 0
591
+ 0
592
+ 00
593
+ 0
594
+ 0.
595
+ 00
596
+ 00
597
+ 0
598
+ 0
599
+ 0
600
+ 00
601
+ 8
602
+ 0.5
603
+ 0.5
604
+ 0
605
+ 0
606
+ -0.5
607
+ -0.5
608
+ ×2 /m
609
+ X, / mS
610
+ (normalized)
611
+ 0.5
612
+ S
613
+ 2
614
+ S
615
+ 1
616
+ 3
617
+ .
618
+ S
619
+ 0
620
+ 4
621
+ ..
622
+ : i
623
+ 11
624
+ -0.5
625
+ 11
626
+ S
627
+ II
628
+ .....
629
+ 11
630
+
631
+ -1
632
+ 2
633
+ 6
634
+ 10
635
+ 14
636
+ t/ mscenter mic
637
+ 0.1
638
+ a
639
+ P
640
+ 8
641
+ d-(
642
+ p
643
+ -0.1
644
+ 2
645
+ 6
646
+ 10
647
+ 14
648
+ t/msref. sources
649
+ 0.5
650
+ 0.8
651
+ (normalized)
652
+ 0.6
653
+
654
+
655
+ 0
656
+ *
657
+
658
+ 0.4
659
+ p
660
+ -0.5
661
+ 0.2
662
+ -0.5
663
+ 0
664
+ 0.5
665
+ / mAdjoint Sound
666
+ 11
667
+ scaled by a factor of 0.8, resulting in smaller distances between the microphones.
668
+ The incoherent sources are replaced by a single source with a harmonic 2 kHz
669
+ reference signal. The source is moving in the x1-x2-plane, see Fig. 8 (left). The
670
+ movement is described by an acceleration and deceleration, taking place along
671
+ the x1 axis. It starts at the beginning of the computational time and ends with
672
+ the simulation after 8.44 ms. The highest speed of the movement is reached
673
+ midway.
674
+ Again a reference solution provides synthetic microphone signals, which are
675
+ encoded in the objective function. Using constant environmental conditions as
676
+ solution of the direct equations (s0 = 0), the adjoint equations are solved. Eval-
677
+ uation of the adjoint sensitivity p∗ over time at the reference source position
678
+ provides information of the reference signal, see Fig. 8 (right). The phase of
679
+ the reference signal is determined with very good agreement. The amplitude
680
+ shows deviations at the beginning and end of the simulation. The influence of
681
+ the directional characteristic of the used microphone array is presumed.
682
+ Fig. 8. (Left) Acoustic setup for source localization of a single moving source (*) by
683
+ means of 64 microphones (o) located in the planes x3 = 0.75 m, respectively x3 = 0
684
+ m. The movement of the source is visualized by it waypoints, chosen with a constant
685
+ time interval. (Right) Normalized adjoint-based sensitivity p∗ at the reference source
686
+ positions over time in comparison to the reference forcing. See text for a detailed
687
+ discussion.
688
+ Besides, the identification of the source signal also its position might be
689
+ tracked. In Fig. 9 the adjoint-based sensitivity p∗ is shown for the plane x3 = 0.75
690
+ m for different time steps. Occurring maxima give rise to the actual sound source
691
+ position, besides its signal.
692
+ Again, the analysis is based on the first adjoint-based gradient only. The
693
+ required computational time for the analysis is less than 10 min on 8 cluster
694
+ nodes with 8 cores each.
695
+
696
+ m
697
+ 0.5
698
+ 0
699
+ 0
700
+ CD
701
+ 0
702
+ 000
703
+ 00
704
+ 0
705
+ 00
706
+ 0
707
+ 8
708
+ 0
709
+ 00
710
+ 0.5
711
+ 0.5
712
+ 0
713
+ 0
714
+ -0.5
715
+ -0.5
716
+ m
717
+ m
718
+ 25 二 1
719
+ I
720
+ 0.5
721
+ (normalized)
722
+ ?
723
+ P-0.5
724
+ adjoint-based
725
+ 4
726
+ --- reference
727
+ -
728
+ 1!
729
+ 2
730
+ 4
731
+ 6
732
+ 8
733
+ t/ms12
734
+ Mathias Lemke et al.
735
+ Fig. 9. Normalized adjoint-based sensitivity p∗ at the plane x3 = 0.75 for different
736
+ time steps. The reference source location is marked by (*) in a white circle. In the
737
+ inset, the normalized reference signal is shown.
738
+
739
+ t= 3.88125 / ms
740
+ 0.5
741
+ 0.5
742
+ (normalized)
743
+ m
744
+ 0
745
+ 0
746
+ +
747
+ p
748
+ -0.5
749
+ -0.5
750
+ /
751
+
752
+ 3.5
753
+ 4
754
+ 4.5
755
+ t / ms
756
+ -0.5
757
+ 0
758
+ 0.5
759
+ , / mt= 3.99375/ ms
760
+ 0.5
761
+ 0.5
762
+ (normalized)
763
+ m
764
+ 0
765
+ 0
766
+ /
767
+ +
768
+
769
+ p
770
+ -0.5
771
+ -0.5
772
+ 3.5
773
+ 4
774
+ 4.5
775
+ t / ms
776
+ -0.5
777
+ 0
778
+ 0.5
779
+ X, / mt= 4.12500 / ms
780
+ 0.5
781
+ 0.5
782
+ (normalized)
783
+ m
784
+ 0
785
+ 0
786
+ /
787
+ *
788
+
789
+ p
790
+ -0.5
791
+ -0.5
792
+ 3.5
793
+ 4
794
+ 4.5
795
+ t / ms
796
+ -0.5
797
+ 0
798
+ 0.5
799
+ _ / mt= 4.25625 / ms
800
+ 0.5
801
+ 0.5
802
+ (normalized)
803
+ m
804
+ 0
805
+ 0
806
+ /
807
+ p
808
+ -0.5
809
+ -0.5
810
+ 3.6
811
+ 44.4
812
+ 4.8
813
+ t / ms
814
+ -0.5
815
+ 0
816
+ 0.5
817
+ _ /mAdjoint Sound
818
+ 13
819
+ 6
820
+ Summary
821
+ An adjoint-based framework for the identification of sound sources is presented.
822
+ It is shown that the approach is able to determine (optimal) source signals and
823
+ to track moving sources.
824
+ By design, the time-domain approach allows the consideration of base flows,
825
+ such as velocity profiles and temperature stratification, and complex geometries,
826
+ which will be the focus of the upcoming work. The first results that take into
827
+ account a complex base flow in the context of sound reinforcement are shown in
828
+ [21].
829
+ Acknowledgments
830
+ The authors gratefully acknowledge financial support by the Deutsche Forschungs-
831
+ gemeinschaft (DFG) within the project LE 3888/2-1.
832
+ We thank Florian Straube (Audio Communication Group, TU Berlin) for
833
+ defining the target sound field for the sound reinforcement test case.
834
+ References
835
+ 1. A. Carnarius, F. Thiele, E. ¨Ozkaya, A. Nemili, and N. Gauger. Optimal control of
836
+ unsteady flows using a discrete and a continuous adjoint approach. In D. H¨omberg
837
+ and F. Tr¨oltzsch, editors, System Modeling and Optimization, volume 391 of IFIP
838
+ Advances in Information and Communication Technology, pages 318–327. Springer
839
+ Berlin Heidelberg, 2013.
840
+ 2. S. Feistel. Modeling the radiation of modern sound reinforcement systems in high
841
+ resolution, volume 19. Logos Verlag Berlin GmbH, 2014.
842
+ 3. S. Feistel, M. Sempf, K. K¨ohler, and H. Schmalle. Adapting loudspeaker array
843
+ radiation to the venue using numerical optimization of FIR filters. In Proc. of the
844
+ 135th Audio Eng. Soc. Conv., New York, number #8937, 2013.
845
+ 4. J. B. Freund. Adjoint-based optimization for understanding and suppressing jet
846
+ noise. Journal of Sound and Vibration, 330(17):4114 – 4122, 2011.
847
+ 5. D. V. Gaitonde and M. R. Visbal. Pade-type higher-order boundary filters for the
848
+ navier-stokes equations. AIAA Journal, 38:2103–2112, Nov. 2000.
849
+ 6. T. Geyer. https://www.b-tu.de/fg-akustik/lehre/aktuelles/arraybenchmark. last
850
+ seen 12. Dec. 2019.
851
+ 7. M. Giles and N. Pierce. An introduction to the adjoint approach to design. Flow,
852
+ Turbulence and Combustion, 65:393–415, 2000.
853
+ 8. J. Gray, M. Lemke, J. Reiss, C. Paschereit, J. Sesterhenn, and J. Moeck. A compact
854
+ shock-focusing geometry for detonation initiation: Experiments and adjoint-based
855
+ variational data assimilation. Combustion and Flame, 183:144 – 156, 2017.
856
+ 9. A. Jameson. Optimum aerodynamic design using cfd and control theory. AIAA
857
+ paper, 1729:124–131, 1995.
858
+ 10. S. K. Lele. Compact finite difference schemes with spectral-like resolution. Journal
859
+ of Computational Physics, 103(1):16 – 42, 1992.
860
+ 11. M. Lemke. Adjoint based data assimilation in compressible flows with application to
861
+ pressure determination from PIV data. PhD thesis, Technische Universit¨at Berlin,
862
+ 2015.
863
+
864
+ 14
865
+ Mathias Lemke et al.
866
+ 12. M. Lemke, L. Cai, J. Reiss, H. Pitsch, and J. Sesterhenn. Adjoint-based sensitiv-
867
+ ity analysis of quantities of interest of complex combustion models. Combustion
868
+ Theory and Modelling, 23(1):180–196, 2019.
869
+ 13. M. Lemke, J. Reiss, and J. Sesterhenn.
870
+ Adjoint based optimisation of reactive
871
+ compressible flows. Combustion and Flame, 161(10):2552 – 2564, 2014.
872
+ 14. M. Lemke and J. Sesterhenn.
873
+ Adjoint-based pressure determination from PIV
874
+ data in compressible flows — validation and assessment based on synthetic data.
875
+ European Journal of Mechanics - B/Fluids, 58:29 – 38, 2016.
876
+ 15. M. Lemke, F. Straube, F. Schultz, J. Sesterhenn, and S. Weinzierl. Adjoint-based
877
+ time domain sound reinforcement. In Audio Engineering Society Conference: 2017
878
+ AES International Conference on Sound Reinforcement – Open Air Venues, Aug
879
+ 2017. featured in Ramsey, F. (2017): ’Sound Reinforcement in the Open Air.’ In:
880
+ J. Audio Eng. Soc., vol. 65, no. 12, pp. 1051 - 1055 (December).
881
+ 16. R. Merino-Mart´ınez, P. Sijtsma, M. Snellen, T. Ahlefeldt, J. Antoni, C. J. Bahr,
882
+ D. Blacodon, D. Ernst, A. Finez, S. Funke, T. F. Geyer, S. Haxter, G. Herold,
883
+ X. Huang, W. M. Humphreys, Q. Lecl`ere, A. Malgoezar, U. Michel, T. Padois,
884
+ A. Pereira, C. Picard, E. Sarradj, H. Siller, D. G. Simons, and C. Spehr. A review
885
+ of acoustic imaging methods using phased microphone arrays. CEAS Aeronautical
886
+ Journal, 10(1):197–230, Mar 2019.
887
+ 17. D. Pekurovsky. P3dfft: A framework for parallel computations of fourier transforms
888
+ in three dimensions. SIAM Journal on Scientific Computing, 34(4):C192–C209,
889
+ 2012.
890
+ 18. T. Poinsot and S. Lele. Boundary conditions for direct simulations of compressible
891
+ viscous flows. Journal Computational Physics, 101:104–129, 1992.
892
+ 19. J. Reiss, M. Lemke, and J. Sesterhenn. Mode-based derivation of adjoint equations
893
+ - a lazy man’s approach. on ArXiv, 2018.
894
+ 20. J. Schulze, P. Schmid, and J. Sesterhenn.
895
+ Iterative optimization based on an
896
+ objective functional in frequency-space with application to jet-noise cancellation.
897
+ Journal of Computational Physics, 230(15):6075 – 6098, 2011.
898
+ 21. L. Stein, F. Straube, J. Sesterhenn, S. Weinzierl, and M. Lemke. Adjoint-based
899
+ optimization of sound reinforcement including non-uniform flow. The Journal of
900
+ the Acoustical Society of America, 146(3):1774–1785, 2019.
901
+ 22. A. Thompson and J. Luzarraga. Drive granularity for straight and curved loud-
902
+ speaker arrays. Proc. of the Inst. of Acoustics, 35(2):210–218, 2013.
903
+ 23. Y. Yang, C. Robinson, D. Heitz, and E. M´emin. Enhanced ensemble-based 4dvar
904
+ scheme for data assimilation. Computers & Fluids, 115:201 – 210, 2015.
905
+ A
906
+ Appendix
907
+ A.1
908
+ Adjoint equations
909
+ As stated above, linearization of the governing Euler equations with respect to
910
+ all state variables by q = q0 + δq results in
911
+ ∂tAδq + ∂xiBiδq + Ci∂xiδq + δCi∂xic = δs.
912
+ (18)
913
+ Again, the summation convention applies. The corresponding linearization ma-
914
+ trices are
915
+
916
+ Adjoint Sound
917
+ 15
918
+ A =
919
+
920
+ �����
921
+ 1 0 0 0
922
+ 0
923
+ u1 ρ 0 0
924
+ 0
925
+ u2 0 ρ 0
926
+ 0
927
+ u3 0 0 ρ
928
+ 0
929
+ 0 0 0 0
930
+ 1
931
+ γ−1
932
+
933
+ �����
934
+ ,
935
+ B1 =
936
+
937
+ �����
938
+ u1
939
+ ρ
940
+ 0
941
+ 0
942
+ 0
943
+ u2
944
+ 1
945
+ 2ρu1
946
+ 0
947
+ 0
948
+ 1
949
+ u1u2 ρu2 ρu1
950
+ 0
951
+ 0
952
+ u1u3 ρu3
953
+ 0 ρu1
954
+ 0
955
+ 0
956
+ γp
957
+ γ−1
958
+ 0
959
+ 0
960
+ γu1
961
+ γ−1
962
+
963
+ �����
964
+ ,
965
+ B2 =
966
+
967
+ �����
968
+ u2
969
+ 0
970
+ ρ
971
+ 0
972
+ 0
973
+ u1u2 ρu2 ρu1
974
+ 0
975
+ 0
976
+ u2
977
+ 2
978
+ 0 2ρu2
979
+ 0
980
+ 1
981
+ u2u3
982
+ 0
983
+ ρu3 ρu2
984
+ 0
985
+ 0
986
+ 0
987
+ γp
988
+ γ−1
989
+ 0
990
+ γu2
991
+ γ−1
992
+
993
+ �����
994
+ ,
995
+ B3 =
996
+
997
+ �����
998
+ u3
999
+ 0
1000
+ 0
1001
+ ρ
1002
+ 0
1003
+ u1u3 ρu3
1004
+ 0
1005
+ ρu1
1006
+ 0
1007
+ u2u3
1008
+ 0 ρu3 ρu2
1009
+ 0
1010
+ u2
1011
+ 3
1012
+ 0
1013
+ 0 2ρu3
1014
+ 1
1015
+ 0
1016
+ 0
1017
+ 0
1018
+ γp
1019
+ γ−1
1020
+ γu3
1021
+ γ−1
1022
+
1023
+ �����
1024
+ ,
1025
+ Ci =
1026
+
1027
+ �����
1028
+ 0 0 0 0
1029
+ 0
1030
+ 0 0 0 0
1031
+ 0
1032
+ 0 0 0 0
1033
+ 0
1034
+ 0 0 0 0
1035
+ 0
1036
+ 0 0 0 0 −ui
1037
+
1038
+ �����
1039
+ ,
1040
+ δCi =
1041
+
1042
+ �����
1043
+ 0 0 0 0
1044
+ 0
1045
+ 0 0 0 0
1046
+ 0
1047
+ 0 0 0 0
1048
+ 0
1049
+ 0 0 0 0
1050
+ 0
1051
+ 0 0 0 0 −δui
1052
+
1053
+ �����
1054
+ .
1055
+ The full adjoint Navier-Stokes equations, in particular, the friction terms,
1056
+ are derived and discussed in [11]. The two-dimensional adjoint Euler equations
1057
+ can be found in [15].
1058
+ status: draft for review
1059
+ last modified: January 23, 2023 by (ML)
1060
+
4dFAT4oBgHgl3EQflx3j/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4tE4T4oBgHgl3EQfbgyP/content/tmp_files/2301.05074v1.pdf.txt ADDED
@@ -0,0 +1,351 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Identification of light leptons and pions in the electromagnetic calorimeter of Belle II
2
+ Anja Novosela,b, Abtin Narimani Charanc, Luka ˇSanteljb,a, Torben Ferberd, Peter Kriˇzanb,a, Boˇstjan Golobe,a
3
+ aJoˇzef Stefan Institute, Ljubljana, Slovenia
4
+ bFaculty of Mathematics and Physics, University of Ljubljana, Ljubljana, Slovenia
5
+ cDeutsches Elektronen-Synchrotron (DESY), Hamburg, Germany
6
+ dKarlsruhe Institute of Technology (KIT) , Karlsruhe, Germany
7
+ eUniversity of Nova Gorica, Nova Gorica, Slovenia
8
+ Abstract
9
+ The paper discusses new method for electron/pion and muon/pion separation in the Belle II detector at transverse momenta below
10
+ 0.7 GeV/c, which is essential for efficient measurements of semi-leptonic decays of B mesons with tau lepton in the final state. The
11
+ method is based on the analysis of patterns in the electromagnetic calorimeter by using a Convolutional Neural Network (CNN).
12
+ Keywords: Electromagnetic calorimeter, Particle identification, Convolutional Neural Network
13
+ 1. Introduction
14
+ Searches for New Physics at the intensity frontier are based
15
+ on very precise measurements of rare processes within the Stan-
16
+ dard Model. Of particular interest, because of persistent hints of
17
+ Lepton Flavour Universality (LFU) violation, are semi-leptonic
18
+ decays of B mesons, e.g. decays mediated by the b → cτ+ντ
19
+ transitions with a tau lepton in the final state and decays in-
20
+ volving b → sµ+µ− and b → se+e− transitions. In decays with
21
+ tau lepton in the final state, the tau lepton must be reconstructed
22
+ from its long-lived decay products, for example from the decays
23
+ τ− → µ−¯νµντ or τ− → e−¯νeντ. In the Belle II experiment [1, 2],
24
+ the momentum spectrum of light leptons from tau decays is
25
+ rather soft, a sizable fraction being below 0.7 GeV/c. One of
26
+ the crucial steps in the analysis of these decays is identifying
27
+ low momenta light leptons (e or µ) from hadronic background
28
+ (mostly π). The simplest baseline feature for separating elec-
29
+ trons from other charged particles (muons and pions) is E/p,
30
+ the ratio between the energy measured in the electromagnetic
31
+ calorimeter and the reconstructed momentum of topologically
32
+ matched charged track. This variable provides an excellent sep-
33
+ aration for particles with p > 1 GeV/c, but due to increased en-
34
+ ergy losses from bremsstrahlung for low momentum electrons,
35
+ the separation is less distinct [3]. Muons are identified in the
36
+ KL and muon system. However, its efficiency is very poor for
37
+ low momentum muons that are out of acceptance of the ded-
38
+ icated sub-detector. Other sub-detectors designed for particle
39
+ identification, the time of propagation detector and the aerogel
40
+ ring-imaging Cherenkov detector, are not able to provide effi-
41
+ cient µ/π separation in this momentum range because at low
42
+ momenta multiple scattering in the material of the detector as
43
+ well as the material in front of it blurs the pattern considerably.
44
+ Our main goal is to improve the identification of low momen-
45
+ tum leptons using the information of energy deposition in the
46
+ electromagnetic calorimeter in a form of images. As a classifier
47
+ we are using a Convolutional Neural Network (CNN), a power-
48
+ ful machine learning technique designed for working with two-
49
+ dimensional images. Using CNN on the images allows us to ac-
50
+ cess the information on the shape of the energy deposition with-
51
+ out depending on cluster reconstruction or track-cluster match-
52
+ ing.
53
+ In what follows, we will describe the electromagnetic
54
+ calorimeter of Belle II, discuss the analysis of simulated pion,
55
+ muon and electron patterns in the electromagnetic calorimeter,
56
+ and present the results.
57
+ 2. Electromagnetic calorimeter of Belle II
58
+ The Belle II detector is a large-solid-angle magnetic spec-
59
+ trometer designed to reconstruct the products of collisions pro-
60
+ duced by the SuperKEKB collider. The detector consists of
61
+ several sub-detectors arranged around the interaction point in
62
+ cylindrical geometry: the innermost Vertex Detector (VXD)
63
+ used for reconstructing decay vertices, a combination of the
64
+ Pixel Detector (PXD) and Silicon Vertex Detector (SVD); the
65
+ Central Drift Chamber (CDC) is the main tracking system; the
66
+ Time of Propagation (TOP) detector in the barrel region and
67
+ the Aerogel Ring-Imaging Cherenkov detector (ARICH) in the
68
+ forward endcap region are used for hadron identification; the
69
+ Electromagnetic Calorimeter (ECL) is used to measure the en-
70
+ ergy of photons and electrons and the outermost K-Long and
71
+ Muon (KLM) detector detects muons and neutral K0
72
+ L mesons
73
+ [1].
74
+ The sub-detector relevant for this work is the ECL, more
75
+ specifically its central barrel region barrel region which con-
76
+ sists of 6624 CsI(Tl) scintillation crystals, covering the po-
77
+ lar angle region 32.2◦ < θ < 128.7◦ with respect to the
78
+ beam axis. A solenoid surrounding the calorimeter generates
79
+ a uniform 1.5 T magnetic field filling its inner volume [2].
80
+ We are mainly interested in the transverse momentum range
81
+ 0.28 < pT < 0.7 GeV/c, where the minimal pT threshold en-
82
+ sures the tracks are within the ECL barrel region acceptance.
83
+ Preprint submitted to Nucl. Instr. Meth. A
84
+ January 13, 2023
85
+ arXiv:2301.05074v1 [hep-ex] 12 Jan 2023
86
+
87
+ Currently, two methods for the particle identification in the ECL
88
+ are available. The first method relies exclusively on the ratio
89
+ of the energy deposited by a charged particle in the ECL and
90
+ the reconstructed momentum of topologically matched charged
91
+ track, E/p. While for electrons this variable enables powerful
92
+ discrimination, as electrons completely deposit their energy in
93
+ the ECL, the µ/π separation is strongly limited, especially for
94
+ low-momentum particles with a broader E/p distribution as can
95
+ be seen on Fig. 1. The second method uses Boosted Decision
96
+ Trees (BDT) with several expert-engineered observables char-
97
+ acterising the shower shape in the ECL [4].
98
+ 0.0
99
+ 0.2
100
+ 0.4
101
+ 0.6
102
+ 0.8
103
+ 1.0
104
+ 1.2
105
+ E/p [c]
106
+ 0
107
+ 2
108
+ 4
109
+ 6
110
+ 8
111
+ Events (normalised / (0.02 c))
112
+ Belle II Simulation, ECL barrel, 0.28
113
+ pT < 0.7 GeV/c
114
+ e
115
+ 0.0
116
+ 0.2
117
+ 0.4
118
+ 0.6
119
+ 0.8
120
+ 1.0
121
+ 1.2
122
+ E/p [c]
123
+ 0
124
+ 1
125
+ 2
126
+ 3
127
+ 4
128
+ 5
129
+ Events (normalised / (0.02 c))
130
+ Belle II Simulation, ECL barrel, 0.28
131
+ pT < 0.7 GeV/c
132
+ Figure 1: Distribution of E/p for simulated single particle candidates: e
133
+ (green), µ (red) and π (blue) for 0.28 ≤ pT < 0.7 GeV/c in the ECL barrel
134
+ region.
135
+ 3. Analysis of the patterns in the electromagnetic calorime-
136
+ ter
137
+ Our proposed method to improve the identification of low-
138
+ momentum leptons is to exploit the specific patterns in the spa-
139
+ tial distribution of energy deposition in the ECL crystals us-
140
+ ing a Convolutional Neural Network (CNN)1. The images are
141
+ consistent with the 11 x 11 neighbouring crystals around the
142
+ entry point of the extrapolated track into the ECL, where each
143
+ pixel corresponds to an individual ECL crystal and pixel inten-
144
+ sity to the energy deposited by charged particle in the crystal.
145
+ Examples of the obtained images are shown on Fig. 2. While
146
+ electrons generate electromagnetic showers depositing the ma-
147
+ jority of their energy in the ECL, the dominant interaction in
148
+ CsI(Tl) for muons and pions in the aforementioned transverse-
149
+ momentum range is ionization. Besides, pions can strongly in-
150
+ teract with nuclei producing less localized images compared to
151
+ muons [5].
152
+ Energy [GeV]
153
+ 0.00
154
+ 0.02
155
+ 0.04
156
+ 0.06
157
+ 0.08
158
+ 0.10
159
+ 0.00
160
+ 0.02
161
+ 0.04
162
+ 0.06
163
+ 0.08
164
+ 0.10
165
+ 0.00
166
+ 0.02
167
+ 0.04
168
+ 0.06
169
+ 0.08
170
+ 0.10
171
+ Belle II Simulation, ECL barrel, 0.28
172
+ pT < 0.7 GeV/c
173
+ Figure 2: Examples of simulated energy depositions and the average over 80000
174
+ images for e (left), µ (middle) and π (right).
175
+ For each binary classification we generated 1.5 × 106 events
176
+ using the Belle II Analysis Software Framework [6], where the
177
+ 1CNN is built using TensorFlow software available from tensorflow.org.
178
+ data set consists of the same number of signal (e or µ) and back-
179
+ ground (π) events with uniformly distributed transverse mo-
180
+ menta, polar angle and azimuthal angle. The two data sets were
181
+ split on the train-validation-test set as 70 − 10 − 20% and we
182
+ use the same CNN architecture for e/π and µ/π case. As an
183
+ input to the convolutional layers we use 11 x 11 images. Before
184
+ fully connected layers we add the information about pT and θID,
185
+ where the later represents an integer number corresponding to
186
+ the location of the ECL crystal and is in the network imple-
187
+ mented as an embedding. To perform a binary classification,
188
+ we have 1 neuron in the output layer with a sigmoid activation
189
+ function that outputs the signal probability that the image was
190
+ produced by a lepton.
191
+ 4. Performance
192
+ To validate the performance of a binary classifier we use
193
+ a Receiver Operating Characteristic (ROC) curve by plotting
194
+ true positive rate (µ or e efficiency) against the false positive
195
+ rate (π mis-ID rate). As the reference for the existing ECL
196
+ information, we use the log-likelihood difference, a powerful
197
+ discriminator between the competing hypotheses, defined as
198
+ ∆LLECL = log LECL
199
+ e,µ
200
+ − log LECL
201
+ π
202
+ based only on E/p [3] and
203
+ BDT ECL using the shower-shape information from the ECL,
204
+ thoroughly described in [4]. The ROC curves obtained by these
205
+ three methods are shown on Fig. 3 for e/π and on Fig. 4 for µ/π
206
+ classification.
207
+ 0.0
208
+ 0.2
209
+ 0.4
210
+ 0.6
211
+ 0.8
212
+ 1.0
213
+ mis-ID rate
214
+ 0.0
215
+ 0.2
216
+ 0.4
217
+ 0.6
218
+ 0.8
219
+ 1.0
220
+ e efficiency
221
+ Belle II Simulation, ECL barrel, 0.28
222
+ pT < 0.5 GeV/c
223
+ LLECL (AUC: 89.34)
224
+ BDT ECL (AUC: 94.12)
225
+ CNN (AUC: 99.35)
226
+ 0.0
227
+ 0.1
228
+ 0.6
229
+ 0.7
230
+ 0.8
231
+ 0.9
232
+ 1.0
233
+ 0.0
234
+ 0.2
235
+ 0.4
236
+ 0.6
237
+ 0.8
238
+ 1.0
239
+ mis-ID rate
240
+ 0.0
241
+ 0.2
242
+ 0.4
243
+ 0.6
244
+ 0.8
245
+ 1.0
246
+ e efficiency
247
+ Belle II Simulation, ECL barrel, 0.5
248
+ pT < 0.7 GeV/c
249
+ LLECL (AUC: 98.58)
250
+ BDT ECL (AUC: 99.25)
251
+ CNN (AUC: 99.86)
252
+ 0.0
253
+ 0.1
254
+ 0.6
255
+ 0.7
256
+ 0.8
257
+ 0.9
258
+ 1.0
259
+ Figure 3: The performance of three different classifiers for e/π based on only
260
+ ECL information: ∆LLECL, BDT ECL, and ∆LLCNN.
261
+ 2
262
+
263
+ 0.0
264
+ 0.2
265
+ 0.4
266
+ 0.6
267
+ 0.8
268
+ 1.0
269
+ mis-ID rate
270
+ 0.0
271
+ 0.2
272
+ 0.4
273
+ 0.6
274
+ 0.8
275
+ 1.0
276
+ efficiency
277
+ Belle II Simulation, ECL barrel, 0.28
278
+ pT < 0.5 GeV/c
279
+ LLECL (AUC: 69.02)
280
+ BDT ECL (AUC: 86.50)
281
+ CNN (AUC: 93.56)
282
+ 0.0
283
+ 0.1
284
+ 0.0
285
+ 0.2
286
+ 0.4
287
+ 0.6
288
+ 0.8
289
+ 1.0
290
+ 0.0
291
+ 0.2
292
+ 0.4
293
+ 0.6
294
+ 0.8
295
+ 1.0
296
+ mis-ID rate
297
+ 0.0
298
+ 0.2
299
+ 0.4
300
+ 0.6
301
+ 0.8
302
+ 1.0
303
+ efficiency
304
+ Belle II Simulation, ECL barrel, 0.5
305
+ pT < 0.7 GeV/c
306
+ LLECL (AUC: 69.65)
307
+ BDT ECL (AUC: 79.89)
308
+ CNN (AUC: 84.94)
309
+ 0.0
310
+ 0.1
311
+ 0.0
312
+ 0.2
313
+ 0.4
314
+ 0.6
315
+ 0.8
316
+ 1.0
317
+ Figure 4: The performance of three different classifiers for µ/π based on only
318
+ ECL information: ∆LLECL, BDT ECL, and ∆LLCNN.
319
+ Looking at the shapes of ROC curves and the Area Under the
320
+ Curve (AUC) values, it is evident that the CNN outperforms
321
+ the existing classifiers, ∆LLECL and BDT ECL for both e/π and
322
+ µ/π. The performance of the CNN drops with increasing mo-
323
+ mentum as the path in the ECL gets shorter and the specific
324
+ patterns in the images become less evident.
325
+ 5. Summary and outlook
326
+ We can conclude there is more information in the ECL that is
327
+ currently used for particle identification. We saw that the sep-
328
+ aration between low-momentum light leptons and pions can be
329
+ improved using a CNN on the ECL images. The newly pro-
330
+ posed method looks very promising and worthwhile to be fur-
331
+ ther developed. A comparison of the method presented in this
332
+ article to a novel BDT-based analysis is a subject of a forthcom-
333
+ ing publication [7].
334
+ 6. Acknowledgements
335
+ We thank Anˇze Zupanc for his support with ideas and ad-
336
+ vice in the early stages of the project. This work was supported
337
+ by the following funding sources: European Research Coun-
338
+ cil, Horizon 2020 ERC-Advanced Grant No. 884719; BMBF,
339
+ DFG, HGF (Germany); Slovenian Research Agency research
340
+ grants No. J1-9124, J1-4358 and P1-0135 (Slovenia).
341
+ References
342
+ [1] T. Abe et al., KEK Report 2010-1 (2010)
343
+ [2] I. Adachi et al., Nucl. Instrum. Meth. A 907 (2018)
344
+ [3] E. Kou et al., PTEP, Volume 2019, Issue 12, 123C01 (2019)
345
+ [4] M. Milesi, J. Tan, P. Urquijo, EPJ Web of Conferences 245, 06023 (2020)
346
+ [5] S. Longo, J. M. Roney et al., Nucl. Instrum. Meth. A 982 (2020)
347
+ [6] T. Kuhr, C. Pulvermacher, M. Ritter et al., Comput Softw Big Sci 3, 1
348
+ (2019)
349
+ [7] M. Milesi et al., in preparation for Nucl. Instrum. Meth. A
350
+ 3
351
+
4tE4T4oBgHgl3EQfbgyP/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,273 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf,len=272
2
+ page_content='Identification of light leptons and pions in the electromagnetic calorimeter of Belle II Anja Novosela,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
3
+ page_content='b,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
4
+ page_content=' Abtin Narimani Charanc,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
5
+ page_content=' Luka ˇSanteljb,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
6
+ page_content='a,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
7
+ page_content=' Torben Ferberd,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
8
+ page_content=' Peter Kriˇzanb,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
9
+ page_content='a,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
10
+ page_content=' Boˇstjan Golobe,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
11
+ page_content='a aJoˇzef Stefan Institute,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
12
+ page_content=' Ljubljana,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
13
+ page_content=' Slovenia bFaculty of Mathematics and Physics,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
14
+ page_content=' University of Ljubljana,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
15
+ page_content=' Ljubljana,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
16
+ page_content=' Slovenia cDeutsches Elektronen-Synchrotron (DESY),' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
17
+ page_content=' Hamburg,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
18
+ page_content=' Germany dKarlsruhe Institute of Technology (KIT) ,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
19
+ page_content=' Karlsruhe,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
20
+ page_content=' Germany eUniversity of Nova Gorica,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
21
+ page_content=' Nova Gorica,' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
22
+ page_content=' Slovenia Abstract The paper discusses new method for electron/pion and muon/pion separation in the Belle II detector at transverse momenta below 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
23
+ page_content='7 GeV/c, which is essential for efficient measurements of semi-leptonic decays of B mesons with tau lepton in the final state.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
24
+ page_content=' The method is based on the analysis of patterns in the electromagnetic calorimeter by using a Convolutional Neural Network (CNN).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
25
+ page_content=' Keywords: Electromagnetic calorimeter, Particle identification, Convolutional Neural Network 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
26
+ page_content=' Introduction Searches for New Physics at the intensity frontier are based on very precise measurements of rare processes within the Stan- dard Model.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
27
+ page_content=' Of particular interest, because of persistent hints of Lepton Flavour Universality (LFU) violation, are semi-leptonic decays of B mesons, e.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
28
+ page_content='g.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
29
+ page_content=' decays mediated by the b → cτ+ντ transitions with a tau lepton in the final state and decays in- volving b → sµ+µ− and b → se+e− transitions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
30
+ page_content=' In decays with tau lepton in the final state, the tau lepton must be reconstructed from its long-lived decay products, for example from the decays τ− → µ−¯νµντ or τ− → e−¯νeντ.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
31
+ page_content=' In the Belle II experiment [1, 2], the momentum spectrum of light leptons from tau decays is rather soft, a sizable fraction being below 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
32
+ page_content='7 GeV/c.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
33
+ page_content=' One of the crucial steps in the analysis of these decays is identifying low momenta light leptons (e or µ) from hadronic background (mostly π).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
34
+ page_content=' The simplest baseline feature for separating elec- trons from other charged particles (muons and pions) is E/p, the ratio between the energy measured in the electromagnetic calorimeter and the reconstructed momentum of topologically matched charged track.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
35
+ page_content=' This variable provides an excellent sep- aration for particles with p > 1 GeV/c, but due to increased en- ergy losses from bremsstrahlung for low momentum electrons, the separation is less distinct [3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
36
+ page_content=' Muons are identified in the KL and muon system.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
37
+ page_content=' However, its efficiency is very poor for low momentum muons that are out of acceptance of the ded- icated sub-detector.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
38
+ page_content=' Other sub-detectors designed for particle identification, the time of propagation detector and the aerogel ring-imaging Cherenkov detector, are not able to provide effi- cient µ/π separation in this momentum range because at low momenta multiple scattering in the material of the detector as well as the material in front of it blurs the pattern considerably.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
39
+ page_content=' Our main goal is to improve the identification of low momen- tum leptons using the information of energy deposition in the electromagnetic calorimeter in a form of images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
40
+ page_content=' As a classifier we are using a Convolutional Neural Network (CNN), a power- ful machine learning technique designed for working with two- dimensional images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
41
+ page_content=' Using CNN on the images allows us to ac- cess the information on the shape of the energy deposition with- out depending on cluster reconstruction or track-cluster match- ing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
42
+ page_content=' In what follows, we will describe the electromagnetic calorimeter of Belle II, discuss the analysis of simulated pion, muon and electron patterns in the electromagnetic calorimeter, and present the results.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
43
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
44
+ page_content=' Electromagnetic calorimeter of Belle II The Belle II detector is a large-solid-angle magnetic spec- trometer designed to reconstruct the products of collisions pro- duced by the SuperKEKB collider.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
45
+ page_content=' The detector consists of several sub-detectors arranged around the interaction point in cylindrical geometry: the innermost Vertex Detector (VXD) used for reconstructing decay vertices, a combination of the Pixel Detector (PXD) and Silicon Vertex Detector (SVD);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
46
+ page_content=' the Central Drift Chamber (CDC) is the main tracking system;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
47
+ page_content=' the Time of Propagation (TOP) detector in the barrel region and the Aerogel Ring-Imaging Cherenkov detector (ARICH) in the forward endcap region are used for hadron identification;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
48
+ page_content=' the Electromagnetic Calorimeter (ECL) is used to measure the en- ergy of photons and electrons and the outermost K-Long and Muon (KLM) detector detects muons and neutral K0 L mesons [1].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
49
+ page_content=' The sub-detector relevant for this work is the ECL, more specifically its central barrel region barrel region which con- sists of 6624 CsI(Tl) scintillation crystals, covering the po- lar angle region 32.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
50
+ page_content='2◦ < θ < 128.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
51
+ page_content='7◦ with respect to the beam axis.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
52
+ page_content=' A solenoid surrounding the calorimeter generates a uniform 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
53
+ page_content='5 T magnetic field filling its inner volume [2].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
54
+ page_content=' We are mainly interested in the transverse momentum range 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
55
+ page_content='28 < pT < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
56
+ page_content='7 GeV/c, where the minimal pT threshold en- sures the tracks are within the ECL barrel region acceptance.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
57
+ page_content=' Preprint submitted to Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
58
+ page_content=' Instr.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
59
+ page_content=' Meth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
60
+ page_content=' A January 13, 2023 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
61
+ page_content='05074v1 [hep-ex] 12 Jan 2023 Currently, two methods for the particle identification in the ECL are available.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
62
+ page_content=' The first method relies exclusively on the ratio of the energy deposited by a charged particle in the ECL and the reconstructed momentum of topologically matched charged track, E/p.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
63
+ page_content=' While for electrons this variable enables powerful discrimination, as electrons completely deposit their energy in the ECL, the µ/π separation is strongly limited, especially for low-momentum particles with a broader E/p distribution as can be seen on Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
64
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
65
+ page_content=' The second method uses Boosted Decision Trees (BDT) with several expert-engineered observables char- acterising the shower shape in the ECL [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
66
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
67
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
68
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
69
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
70
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
71
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
72
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
73
+ page_content='2 E/p [c] 0 2 4 6 8 Events (normalised / (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
74
+ page_content='02 c)) Belle II Simulation, ECL barrel, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
75
+ page_content='28 pT < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
76
+ page_content='7 GeV/c e 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
77
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
78
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
79
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
80
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
81
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
82
+ page_content='0 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
83
+ page_content='2 E/p [c] 0 1 2 3 4 5 Events (normalised / (0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
84
+ page_content='02 c)) Belle II Simulation, ECL barrel, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
85
+ page_content='28 pT < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
86
+ page_content='7 GeV/c Figure 1: Distribution of E/p for simulated single particle candidates: e (green), µ (red) and π (blue) for 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
87
+ page_content='28 ≤ pT < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
88
+ page_content='7 GeV/c in the ECL barrel region.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
89
+ page_content=' 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
90
+ page_content=' Analysis of the patterns in the electromagnetic calorime- ter Our proposed method to improve the identification of low- momentum leptons is to exploit the specific patterns in the spa- tial distribution of energy deposition in the ECL crystals us- ing a Convolutional Neural Network (CNN)1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
91
+ page_content=' The images are consistent with the 11 x 11 neighbouring crystals around the entry point of the extrapolated track into the ECL, where each pixel corresponds to an individual ECL crystal and pixel inten- sity to the energy deposited by charged particle in the crystal.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
92
+ page_content=' Examples of the obtained images are shown on Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
93
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
94
+ page_content=' While electrons generate electromagnetic showers depositing the ma- jority of their energy in the ECL, the dominant interaction in CsI(Tl) for muons and pions in the aforementioned transverse- momentum range is ionization.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
95
+ page_content=' Besides, pions can strongly in- teract with nuclei producing less localized images compared to muons [5].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
96
+ page_content=' Energy [GeV] 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
97
+ page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
98
+ page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
99
+ page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
100
+ page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
101
+ page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
102
+ page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
103
+ page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
104
+ page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
105
+ page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
106
+ page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
107
+ page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
108
+ page_content='10 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
109
+ page_content='00 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
110
+ page_content='02 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
111
+ page_content='04 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
112
+ page_content='06 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
113
+ page_content='08 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
114
+ page_content='10 Belle II Simulation, ECL barrel, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
115
+ page_content='28 pT < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
116
+ page_content='7 GeV/c Figure 2: Examples of simulated energy depositions and the average over 80000 images for e (left), µ (middle) and π (right).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
117
+ page_content=' For each binary classification we generated 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
118
+ page_content='5 × 106 events using the Belle II Analysis Software Framework [6], where the 1CNN is built using TensorFlow software available from tensorflow.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
119
+ page_content='org.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
120
+ page_content=' data set consists of the same number of signal (e or µ) and back- ground (π) events with uniformly distributed transverse mo- menta, polar angle and azimuthal angle.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
121
+ page_content=' The two data sets were split on the train-validation-test set as 70 − 10 − 20% and we use the same CNN architecture for e/π and µ/π case.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
122
+ page_content=' As an input to the convolutional layers we use 11 x 11 images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
123
+ page_content=' Before fully connected layers we add the information about pT and θID, where the later represents an integer number corresponding to the location of the ECL crystal and is in the network imple- mented as an embedding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
124
+ page_content=' To perform a binary classification, we have 1 neuron in the output layer with a sigmoid activation function that outputs the signal probability that the image was produced by a lepton.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
125
+ page_content=' 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
126
+ page_content=' Performance To validate the performance of a binary classifier we use a Receiver Operating Characteristic (ROC) curve by plotting true positive rate (µ or e efficiency) against the false positive rate (π mis-ID rate).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
127
+ page_content=' As the reference for the existing ECL information, we use the log-likelihood difference, a powerful discriminator between the competing hypotheses, defined as ∆LLECL = log LECL e,µ − log LECL π based only on E/p [3] and BDT ECL using the shower-shape information from the ECL, thoroughly described in [4].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
128
+ page_content=' The ROC curves obtained by these three methods are shown on Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
129
+ page_content=' 3 for e/π and on Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
130
+ page_content=' 4 for µ/π classification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
131
+ page_content=' 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
132
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
133
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
134
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
135
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
136
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
137
+ page_content='0 mis-ID rate 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
138
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
139
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
140
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
141
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
142
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
143
+ page_content='0 e efficiency Belle II Simulation, ECL barrel, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
144
+ page_content='28 pT < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
145
+ page_content='5 GeV/c LLECL (AUC: 89.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
146
+ page_content='34) BDT ECL (AUC: 94.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
147
+ page_content='12) CNN (AUC: 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
148
+ page_content='35) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
149
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
150
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
151
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
152
+ page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
153
+ page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
154
+ page_content='9 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
155
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
156
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
157
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
158
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
159
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
160
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
161
+ page_content='0 mis-ID rate 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
162
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
163
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
164
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
165
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
166
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
167
+ page_content='0 e efficiency Belle II Simulation, ECL barrel, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
168
+ page_content='5 pT < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
169
+ page_content='7 GeV/c LLECL (AUC: 98.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
170
+ page_content='58) BDT ECL (AUC: 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
171
+ page_content='25) CNN (AUC: 99.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
172
+ page_content='86) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
173
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
174
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
175
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
176
+ page_content='7 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
177
+ page_content='8 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
178
+ page_content='9 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
179
+ page_content='0 Figure 3: The performance of three different classifiers for e/π based on only ECL information: ∆LLECL, BDT ECL, and ∆LLCNN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
180
+ page_content=' 2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
181
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
182
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
183
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
184
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
185
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
186
+ page_content='0 mis-ID rate 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
187
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
188
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
189
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
190
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
191
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
192
+ page_content='0 efficiency Belle II Simulation, ECL barrel, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
193
+ page_content='28 pT < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
194
+ page_content='5 GeV/c LLECL (AUC: 69.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
195
+ page_content='02) BDT ECL (AUC: 86.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
196
+ page_content='50) CNN (AUC: 93.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
197
+ page_content='56) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
198
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
199
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
200
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
201
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
202
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
203
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
204
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
205
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
206
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
207
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
208
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
209
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
210
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
211
+ page_content='0 mis-ID rate 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
212
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
213
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
214
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
215
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
216
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
217
+ page_content='0 efficiency Belle II Simulation, ECL barrel, 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
218
+ page_content='5 pT < 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
219
+ page_content='7 GeV/c LLECL (AUC: 69.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
220
+ page_content='65) BDT ECL (AUC: 79.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
221
+ page_content='89) CNN (AUC: 84.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
222
+ page_content='94) 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
223
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
224
+ page_content='1 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
225
+ page_content='0 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
226
+ page_content='2 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
227
+ page_content='4 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
228
+ page_content='6 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
229
+ page_content='8 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
230
+ page_content='0 Figure 4: The performance of three different classifiers for µ/π based on only ECL information: ∆LLECL, BDT ECL, and ∆LLCNN.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
231
+ page_content=' Looking at the shapes of ROC curves and the Area Under the Curve (AUC) values, it is evident that the CNN outperforms the existing classifiers, ∆LLECL and BDT ECL for both e/π and µ/π.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
232
+ page_content=' The performance of the CNN drops with increasing mo- mentum as the path in the ECL gets shorter and the specific patterns in the images become less evident.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
233
+ page_content=' 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
234
+ page_content=' Summary and outlook We can conclude there is more information in the ECL that is currently used for particle identification.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
235
+ page_content=' We saw that the sep- aration between low-momentum light leptons and pions can be improved using a CNN on the ECL images.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
236
+ page_content=' The newly pro- posed method looks very promising and worthwhile to be fur- ther developed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
237
+ page_content=' A comparison of the method presented in this article to a novel BDT-based analysis is a subject of a forthcom- ing publication [7].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
238
+ page_content=' 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
239
+ page_content=' Acknowledgements We thank Anˇze Zupanc for his support with ideas and ad- vice in the early stages of the project.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
240
+ page_content=' This work was supported by the following funding sources: European Research Coun- cil, Horizon 2020 ERC-Advanced Grant No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
241
+ page_content=' 884719;' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
242
+ page_content=' BMBF, DFG, HGF (Germany);' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
243
+ page_content=' Slovenian Research Agency research grants No.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
244
+ page_content=' J1-9124, J1-4358 and P1-0135 (Slovenia).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
245
+ page_content=' References [1] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
246
+ page_content=' Abe et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
247
+ page_content=', KEK Report 2010-1 (2010) [2] I.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
248
+ page_content=' Adachi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
249
+ page_content=', Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
250
+ page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
251
+ page_content=' Meth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
252
+ page_content=' A 907 (2018) [3] E.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
253
+ page_content=' Kou et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
254
+ page_content=', PTEP, Volume 2019, Issue 12, 123C01 (2019) [4] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
255
+ page_content=' Milesi, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
256
+ page_content=' Tan, P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
257
+ page_content=' Urquijo, EPJ Web of Conferences 245, 06023 (2020) [5] S.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
258
+ page_content=' Longo, J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
259
+ page_content=' M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
260
+ page_content=' Roney et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
261
+ page_content=', Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
262
+ page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
263
+ page_content=' Meth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
264
+ page_content=' A 982 (2020) [6] T.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
265
+ page_content=' Kuhr, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
266
+ page_content=' Pulvermacher, M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
267
+ page_content=' Ritter et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
268
+ page_content=', Comput Softw Big Sci 3, 1 (2019) [7] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
269
+ page_content=' Milesi et al.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
270
+ page_content=', in preparation for Nucl.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
271
+ page_content=' Instrum.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
272
+ page_content=' Meth.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
273
+ page_content=' A 3' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/4tE4T4oBgHgl3EQfbgyP/content/2301.05074v1.pdf'}
59FKT4oBgHgl3EQf-y48/content/2301.11959v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:e2e1dae6b272ef9f8334d1c8b18be33af5ffc0dab3b26ad751b93b590f19dfb4
3
+ size 324157
59FKT4oBgHgl3EQf-y48/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:650ae78b74b7b55fab783f55fbe9125d134508d6198160848666a13f7146613a
3
+ size 3145773
59FKT4oBgHgl3EQf-y48/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:71a2aed0c6421367c97016241cbe17a1e599dcd255f64095ff900417af1df870
3
+ size 134762
5NAzT4oBgHgl3EQfEPrI/content/tmp_files/2301.00991v1.pdf.txt ADDED
@@ -0,0 +1,1821 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ MNRAS 000, 1–14 (2021)
2
+ Preprint 4 January 2023
3
+ Compiled using MNRAS LATEX style file v3.0
4
+ Multi-wavelength study of TeV blazar 1ES 1218+304 using
5
+ gamma-ray, X-ray and optical observations
6
+ Rishank Diwan,1⋆ Raj Prince,2 Aditi Agarwal,3 Debanjan Bose,4† Pratik Majumdar,5
7
+ Aykut Özdönmez,6 Sunil Chandra,7,8 Rukaiya Khatoon,8 Ergün Ege,9
8
+ 1Laboratory for Space Research, The University of Hong Kong, 405B Cyberport 4, 100 Cyberport Road, Cyberport, Hong Kong
9
+ 2Center for Theoretical Physics, Polish Academy of Sciences, Al. Lotników 32/46, 02-668 Warsaw, Poland
10
+ 3 Raman Research Institute, C. V. Raman Avenue, Sadashivanagar, Bengaluru - 560080, India
11
+ 4 S. N. Bose National Centre for Basic Sciences, Block-JD, Sector-III, Salt Lake, Kolkata-700106
12
+ 5 Saha Institute of Nuclear Physics, a CI of Homi Bhabha National Institute, Kolkata 700064, West Bengal, India
13
+ 6 Ataturk University, Faculty of Science, Department of Astronomy and Space Science, 25240, Yakutiye, Erzurum
14
+ 7 South African Astronomical Observatory, Observatory Road, Observatory, Cape Town 7925, South Africa
15
+ 8 Center for Space Research, North-West University, Potchefstroom, 2520, South Africa
16
+ 9 Istanbul University, Faculty of Science, Department of Astronomy and Space Sciences, 34116, Beyazıt, Istanbul, Turkey
17
+ Accepted XXX. Received YYY; in original form ZZZ
18
+ ABSTRACT
19
+ We report the multi-wavelength study for a high-synchrotron-peaked BL Lac 1ES 1218+304 using near-simultaneous
20
+ data obtained during the period from January 1, 2018, to May 31, 2021 (MJD 58119-59365) from various instruments
21
+ including Fermi-LAT, Swift-XRT, AstroSat, and optical from Swift-UVOT & TUBITAK observatory in Turkey. The
22
+ source was reported to be flaring in TeV γ-ray during 2019 but no significant variation in Fermi-LAT is observed. A
23
+ minute scale variability is seen in SXT light curve suggesting a compact emission region for their variability. However,
24
+ Hour’s scale variability is observed in the γ-ray light curve. A "softer-when-brighter" trend is observed in γ-ray and an
25
+ opposite trend is seen in X-ray suggesting both emissions are produced via two different processes as expected from an
26
+ HBL source. We have chosen the two epochs in January 2019 to study and compare their physical parameters. A joint
27
+ fit of SXT and LAXPC provides a great constraint on the synchrotron peak roughly estimated to be ∼2.68×1017 Hz.
28
+ A clear shift in the synchrotron peak is observed from 1017−18 to 1020 Hz revealing its extreme nature or behaving like
29
+ an EHBL-type source. The optical observation provides color-index variation as "blue-when-brighter". The broadband
30
+ SED is fitted with a single-zone SSC model and their parameters are discussed in the context of a TeV blazar and
31
+ possible mechanism behind the broadband emission.
32
+ Key words:
33
+ galaxies: active – galaxies: jets – gamma-rays: galaxies – radiation mechanisms: non-thermal – BL
34
+ Lacertae objects: individual: 1ES 1218+304
35
+ 1 INTRODUCTION
36
+ Active galactic nuclei (AGN) host a supermassive black hole
37
+ (SMBH) at the center which accretes matter from the sur-
38
+ rounding. The matters are in Keplerian orbit and fall into
39
+ the SMBH via an accretion disk. The mechanism proposed
40
+ in Blandford & Znajek (1977) suggests that the magnetic
41
+ field lines from the accretion disk get twisted and collimated
42
+ due to the high spin of SMBH and eject the matter through
43
+ a bipolar jet perpendicular to the accretion disk plane. Later,
44
+ the AGNs were classified based on how they are viewed
45
+ commonly known as the AGN unification scheme (Urry &
46
+ Padovani 1995). Blazars are a subclass of active galactic nu-
47
+ clei that have their relativistic jet pointed to the observer.
48
+ ⋆ E-mail: [email protected]
49
+ † E-mail: [email protected]
50
+ They are characterized by rapid variability from hours to
51
+ days’ timescales across all wavelengths, high polarization, and
52
+ superluminal jet speeds. Blazars can be further subdivided
53
+ into two classes: flat spectrum radio quasars (FSRQs) and
54
+ BL Lacertae (BL Lac) objects. The broad-band continuum
55
+ spectra of blazars are dominated by non-thermal emission.
56
+ The spectral energy distribution of blazars is characterized
57
+ by a double hump structure: the first hump is generally at-
58
+ tributed to the synchrotron radiation in the radio to X-ray
59
+ bands whereas there is intense debate about the origin of
60
+ the second hump. The commonly accepted emission mech-
61
+ anism is via inverse Compton scattering of the low-energy
62
+ photons by high-energy electrons in the system from GeV
63
+ to TeV energies. There are alternative scenarios proposed
64
+ by several authors which involve hadronic interactions pro-
65
+ ducing neutral pions. These pions decay to generate photons
66
+ in the GeV-TeV energies (Mannheim 1993; Aharonian 2000;
67
+ © 2021 The Authors
68
+ arXiv:2301.00991v1 [astro-ph.HE] 3 Jan 2023
69
+
70
+ 2
71
+ R. Diwan et al.
72
+ Böttcher et al. 2013). The BL Lac-type sources are further
73
+ subdivided into three main classes depending on the position
74
+ of their low-energy peak. If the synchrotron peak is observed
75
+ at < 1014Hz, those BL Lacs are called low-frequency peaked
76
+ BL Lacs (LBLs). If the synchrotron peak is observed be-
77
+ tween 1014Hz and 1015Hz, then they are called intermediate-
78
+ frequency peaked BL Lacs (IBLs). Finally, BL Lacs with syn-
79
+ chrotron peak ≥ 1015Hz is called high-frequency peaked BL
80
+ Lacs (HBLs). There is also a newly defined class of ultra-
81
+ high-frequency peaked BL Lacs (UHBLs) with the spectral
82
+ peak of the second bump (high energy peak) in the SED lo-
83
+ cated at an energy of 1 TeV or above. These blazars are also
84
+ known as "extreme blazars" or EHBLs. (Abdo et al. 2010).
85
+ Multiwavelength observation of blazars is a very important
86
+ tool for investigating the various properties of the blazars and
87
+ the jet. For example, the shortest variability timescale allows
88
+ one to put strong constraints on the size of the emission re-
89
+ gion of the blazar. The location of the emission region along
90
+ the jet axis is another challenging problem in blazar physics.
91
+ Many studies have been done in the past to locate the emis-
92
+ sion region, in some cases, it has been found that the emission
93
+ happens very close to the SMBH within the broad-line region
94
+ (BLR) (Prince 2020; Prince et al. 2021). However, in some
95
+ studies, it has been proposed to be at higher distances be-
96
+ yond the broad-line region (Cao & Wang 2013; Nalewajko
97
+ et al. 2014; Barat et al. 2022). The break or curvature in the
98
+ γ-ray spectrum above 10-20 GeV suggests the emission region
99
+ within the BLR as the BLR is opaque to high energy pho-
100
+ tons above 10 GeV ( Liu & Bai 2006). The cross-correlation
101
+ studies among the various wavebands are another way to lo-
102
+ cate the emission region along the jet axis. In many studies,
103
+ it has been reported that simultaneous broadband emissions
104
+ generally have a co-spatial origin. However, in some cases, a
105
+ significant time lag has been reported strongly suggesting the
106
+ different locations for the different emissions (Prince 2019).
107
+ In the first case scenario, one zone emission model is favored
108
+ to explain the broadband SED, and in the later case, the
109
+ multi-zone emission model is preferred (Prince et al. 2019).
110
+ The production of high-energy γ-rays in blazar suggests an
111
+ acceleration of charged particles to very high energy and
112
+ many models have been proposed to explain the acceleration.
113
+ The most accepted mechanisms are the diffusive shock accel-
114
+ eration (Schlickeiser 1989a,b) and the magnetic re-connection
115
+ (Shukla & Mannheim 2020). In many studies shock accelera-
116
+ tion has been favored which also demands the emission region
117
+ close to the SMBH within the BLR because the shocks are
118
+ produced and are strong at the base of the jet. On the other
119
+ hand, the magnetic reconnection happens due to external per-
120
+ turbation and hence demands the jet to be less collimated i.e.
121
+ the emission region is farther from the base.
122
+ In this paper, we report on a multiwavelength study of the
123
+ TeV blazar 1ES1218+304 to understand the broadband prop-
124
+ erties of the source. It is located at a redshift, z = 0.182 with
125
+ R.A. = 12 21 26.3 (hh mm ss), Dec = +30 11 29 (dd mm ss).
126
+ It has been observed in TeV energy with VERITAS (Fortin
127
+ 2008, Acciari et al. 2009) and MAGIC (Albert et al. 2006,
128
+ Lombardi et al. 2011) and are part of TeV Catalog1.
129
+ The paper is arranged in the following way. We discuss the
130
+ multiwavelength observations and the data analysis proce-
131
+ 1 http://tevcat.uchicago.edu/
132
+ dures from different instruments used in this study in Section
133
+ 2. In section 3, we have discussed the results from Astrosat
134
+ alone and the broadband light curves and spectral energy dis-
135
+ tributions at length. In Section 4 we summarise and discussed
136
+ the important findings in the context of blazar physics and
137
+ eventually conclude our work in Section 5.
138
+ 2 MULTIWAVELENGTH OBSERVATIONS,
139
+ DATA ANALYSIS AND DATA REDUCTION
140
+ The following section describes the data analysis technique
141
+ used to generate a multi-waveband light curve. In the sub-
142
+ sections, we provide a description of the data analysis tech-
143
+ nique of γ-ray data collected from Fermi-Lat. X-ray, and
144
+ UV-optical data were collected from Swift-XRT and Swift-
145
+ UVOT. Also, soft X-ray and hard X-ray data were collected
146
+ from AstroSat-SXT and AstroSat-LAXPC, respectively and
147
+ Optical Data from TUBITAK National Observatory.
148
+ 2.1 Fermi-LAT γ-ray Observatory
149
+ Large Area Telescope (LAT) is a gamma-ray telescope placed
150
+ on Fermi gamma-ray space observatory2 which was launched
151
+ in 2008. It has a working energy range of 20 MeV to 1
152
+ TeV with a field of view of 2.4 Sr (Atwood et al. 2009).
153
+ The orbital period of the telescope is around ∼ 96 mins
154
+ in each hemisphere and covers the entire sky in total ∼ 3
155
+ hr. Blazar 1ES 1218+304 is continuously being monitored
156
+ since 2008. In this study, we have analyzed the data from
157
+ 1st January 2018 - 31st May 2021 when the source was
158
+ reported to be flaring in gamma-ray (January 2019). The
159
+ analysis was performed using Fermipy v0.17.43(Wood et al.
160
+ 2021) and the standard Fermi tools software (Fermitools
161
+ v1.2.23)4 between 0.3-300 GeV. A 15◦ circular region was
162
+ chosen around the source to extract the photon events with
163
+ evclass=128 and evtype=3 and the time intervals were re-
164
+ stricted using ‘(DATA_QUAL>0)&&(LAT_CONFIG==1)’
165
+ as recommended by the Fermi-LAT team in the fermitools
166
+ documentation. The source model file was generated using
167
+ the Fermi 4FGL catalog (Abdollahi et al. 2020) and the back-
168
+ ground gamma-ray emission was taken care of by using the
169
+ gll_iem_V07.fits file along with the isotropic background
170
+ emission by using the iso_P8R3_SOURCE_V2_v1.txt file. In
171
+ addition, the zenith angle cut was chosen as 90◦ to reduce the
172
+ contamination from the Earth limb’s γ-ray. The source and
173
+ background were modeled by the binned Likelihood method.
174
+ Initially, the spectral parameters of all the sources were kept
175
+ free to optimize the γ-ray emission from them. Eventually,
176
+ we generated the γ-ray light curves for 7, 15, and 30 days
177
+ of binning for our scientific purpose. To extract lightcurve
178
+ and perform spectral fitting normalization of the sources only
179
+ within 2◦ of ROI were kept free, and the rest of the param-
180
+ eters and other source models were frozen, except that of
181
+ Source of Interest, in this case, blazar 1ES 1218+304 and a
182
+ high flux source 4FGL J1217.9+3007, with an offset of 0.753◦
183
+ from 1ES 1218+304, which constitutes to 10 parameters for
184
+ 2 https://fermi.gsfc.nasa.gov/
185
+ 3 Fermipy webpage
186
+ 4 Fermtools Github page
187
+ MNRAS 000, 1–14 (2021)
188
+
189
+ Multi-wavelength study of 1ES 1218+304
190
+ 3
191
+ likelihood analysis. PowerLaw model was used for the source
192
+ as given below:
193
+ dN(E)
194
+ dE
195
+ = No ×
196
+ � E
197
+ Eo
198
+ �−α
199
+ (1)
200
+ where Eo and No are the scale factor and the prefactor, re-
201
+ spectively provided in the 4FGL catalog and α is the spectral
202
+ index.
203
+ 2.2 AstroSat
204
+ On January 03, 2019 MAGIC reported a gamma-ray activ-
205
+ ity and detection of very high energy γ ray from blazar 1ES
206
+ 1218+304 (Mirzoyan 2019). Later, VERITAS also detected a
207
+ γ-ray flare from this source (Mukherjee & VERITAS Collab-
208
+ oration 2019). Following these two events, we proposed a tar-
209
+ get of opportunity proposal in India’s first space-based multi-
210
+ wavelength observatory, AstroSat5. Observations were car-
211
+ ried out from 17th to 20th January with a soft-Xray telescope
212
+ (SXT) and large area X-ray proportional counter (LAXPC).
213
+ 2.2.1 SXT
214
+ The SXT working energy range is 0.3-7.0 keV and the ob-
215
+ servation was performed with photon counting mode (PC).
216
+ The level-1 data was downloaded from the webpage and fur-
217
+ ther reduction was performed with the latest SXT pipeline,
218
+ sxtpipeline1.4b (Release Date: 2019-01-04). It produces
219
+ the cleaned level-2 data products which were used for fur-
220
+ ther analysis (Singh et al. 2016, Singh et al. 2017). The ob-
221
+ servations were done in various orbits and therefore it was
222
+ merged together with the help of SXTEVTMERGERTOOL. The
223
+ X-ray light curve is extracted using XSELECT with a circular
224
+ region of 16′ centered on the source. The energy selection
225
+ of 0.3-7.0 keV was applied in XSELECT itself using the chan-
226
+ nel filtering through pha_cutoff filter. The source spectrum
227
+ was extracted for 0.3-7.0 keV energy range and the back-
228
+ ground spectrum file was used provided by the AstroSat
229
+ SkyBkg_comb_EL3p5_Cl_Rd16p0_v01.pha. The spectrum was
230
+ grouped in GRPPHA in order to have good photon statistics in
231
+ each bin. The ancillary response file (arf) was generated using
232
+ sxtARFModule and the RMF file (sxt_pc_mat_g0to12.rmf)
233
+ was provided by the SXT-POC (Payload Operation Cen-
234
+ ter) team. Eventually, the X-ray spectra from 0.3-7.0 KeV
235
+ with proper background and response files were loaded in
236
+ XSPEC and fitted with the simple absorbed power-law and
237
+ log-parabola spectral models with the correction of ISM ab-
238
+ sorption model at NH = 1.91×1020 cm−2 (HI4PI Collabora-
239
+ tion et al. 2016).
240
+ 2.2.2 LAXPC
241
+ LAXPC works in the hard X-ray energy range from 3.0-80.0
242
+ keV (Yadav et al. 2016) consisting of three identical detec-
243
+ tors namely LAXPC10, LAXPC20, and LAXPC30. Unfor-
244
+ tunately, LAXPC 10 was operating at a lower gain during
245
+ the time of observation period. Also, the LAXPC30 detec-
246
+ tor has a gain instability issue caused by substantial gas
247
+ 5 https://www.isro.gov.in/AstroSat.html
248
+ leakage. Therefore, we used only LAXPC20 for the analy-
249
+ sis, and the corresponding results are presented here. The
250
+ Level-1 data were processed using the LaxpcSoft package
251
+ available in AstroSat Science Support Cell (ASSC)6. We
252
+ generated the Level-2 combined event file using the com-
253
+ mand laxpc_make_event. During the data processing, a
254
+ good time interval was applied to exclude the time inter-
255
+ vals corresponding to the Earth occultation periods, SAA
256
+ passage, and standard elevation angle screening criteria
257
+ by using the laxpc_make_stdgti tool. Finally, the tools
258
+ laxpc_make_spectra and laxpc_make_lightcurve were used
259
+ to produce the spectra and lightcurve of the source, using the
260
+ gti file. We restricted the spectra to the energy range of
261
+ 4-20 keV since the background dominates the spectra above
262
+ this energy. In the spectral analysis, a 3% systematic un-
263
+ certainty was added to the data. The obtained lightcurve is
264
+ not background subtracted, therefore we estimated the back-
265
+ ground following the faint source routine (Misra et al. 2021).
266
+ However, due to insignificant variations observed in the ex-
267
+ tracted lightcurve from LAXPC20, we did not use them in
268
+ our study.
269
+ 2.3 The Neil Gehrels Swift Observatory
270
+ Simultaneous to AstroSat, blazar 1ES 1218+304 was also ob-
271
+ served in X-ray with Swift-XRT and in optical-UV by Swift-
272
+ UVOT telescopes7. It provides a unique opportunity to have
273
+ simultaneous broadband light curves and spectrum which is
274
+ important to decipher the cause behind the flare and the
275
+ broadband emission.
276
+ 2.3.1 XRT
277
+ X-ray telescope (XRT) works in an energy range between 0.3-
278
+ 10.0 keV. Multiple observations were done during this period
279
+ with an average of 2ks exposure. We have analyzed the data
280
+ following the standard Swift xrtpipeline and the details can
281
+ be found on Swift webpage8. The cleaned event files were pro-
282
+ duced and a circular region of 10” was chosen for the source
283
+ and background around the source and away from the source.
284
+ Tool XSELECT was used to extract the source light curve and
285
+ the spectrum. The spectrum was binned by using the tool
286
+ GRPPHA to have a sufficient number of counts in each bin. A
287
+ proper ancillary response file (ARF) and the redistribution
288
+ matrix files (RMF) were used to model the X-ray spectra in
289
+ XSPEC. A simple unabsorbed power law was used to fit the X-
290
+ ray 0.3-10.0 keV spectra and extract the X-ray flux. The soft
291
+ X-ray (below 1 keV) is prone to go through interstellar ab-
292
+ sorption in Milky-way and hence a correction is applied with
293
+ NH = 1.91×1020 cm−2 (HI4PI Collaboration et al. 2016).
294
+ 2.3.2 UVOT
295
+ Having an ultraviolet-optical telescope has the advantage of
296
+ getting simultaneous observations to X-ray. UVOT has six
297
+ filters namely U, B, and V in optical and W1, M2, and W2
298
+ in the ultraviolet band. The image files were opened in DS9
299
+ 6 http://astrosat-ssc.iucaa.in
300
+ 7 https://swift.gsfc.nasa.gov/
301
+ 8 https://www.swift.ac.uk/analysis/xrt/
302
+ MNRAS 000, 1–14 (2021)
303
+
304
+ 4
305
+ R. Diwan et al.
306
+ Table 1. Best fit spectral parameters of 1ES 1218+304 from SXT observations of 17-20 January 2019. X-ray flux is presented in the unit
307
+ (erg cm−2 s−1). The spectrum is fitted with both the power-law and log-parabola models. In the last row, we show the joint fit of the
308
+ SXT and LAXPC spectrum. We also added a 3% systematic in the fit as suggested by the AstroSat team. The parameters are compared
309
+ for free and fixed NH (HI4PI Collaboration et al. 2016) values. The overall fit provide better fit with free NH.
310
+ Model
311
+ Parameters
312
+ Value
313
+ Power-law
314
+ Fixed nH
315
+ Free nH
316
+ TBabs
317
+ NH(1022cm−2)
318
+ 0.0191
319
+ 0.057±0.005
320
+ Index
321
+ Γ
322
+ 1.95±0.01
323
+ 2.11±0.02
324
+ Flux
325
+ F0.3−10.0 keV
326
+ (1.427 ± 0.004) × 10−10
327
+ (1.474 ± 0.006) × 10−10
328
+ χ2/dof
329
+ 777/434
330
+ 595.75/433
331
+ Logparabola
332
+ TBabs
333
+ NH(1022cm−2)
334
+ 0.0191
335
+ 0.075±0.014
336
+ Index
337
+ α
338
+ 1.90±0.02
339
+ 2.21±0.08
340
+ β
341
+ 0.28±0.04
342
+ 0.15±0.11
343
+ Flux
344
+ F0.3−10.0 keV
345
+ (1.300 ± 0.009) × 10−10
346
+ (1.585 ± 0.037) × 10−10
347
+ χ2/dof
348
+ 642.28/433
349
+ 590.55/432
350
+ Logparabola
351
+ joint fit
352
+ SXT + LAXPC
353
+ TBabs
354
+ NH(1022cm−2)
355
+ 0.0191
356
+ 0.042±0.010
357
+ Index
358
+ α
359
+ 1.85±0.02
360
+ 1.98±0.06
361
+ β
362
+ 0.33±0.03
363
+ 0.22±0.06
364
+ Norm
365
+ 0.0262±0.0002
366
+ 0.0281 ± 0.0009
367
+ Constant factor
368
+ -
369
+ 0.96±0.04
370
+ 0.96±0.04
371
+ χ2/dof
372
+ 601.16/402
373
+ 587.72/401
374
+ software and the source and background region of 5" and 10"
375
+ were selected around the source and away from the source,
376
+ respectively. The task UVOTSOURCE has been used to get the
377
+ magnitudes which were later corrected for galactic reddening,
378
+ E(B-V)=0.0176 (Schlafly & Finkbeiner 2011) and converted
379
+ into the fluxes using zero points and the conversion factor
380
+ (Giommi et al. 2006).
381
+ 2.4 Optical
382
+ The optical observations of our source were performed in the
383
+ Johnson BVRI bands using the three ground-based facilities
384
+ in Turkey, namely, 0.6m RC robotic (T60) and the 1.0m RC
385
+ (T100) telescopes at TUBITAK National Observatory, and
386
+ 0.5m RC telescope at Ataturk University in Turkey. Techni-
387
+ cal details of these telescopes are explained in Agarwal et al.
388
+ (2022). The standard data reduction of all CCD frames, i.e.
389
+ the bias subtraction, twilight flat-fielding, and cosmic-ray re-
390
+ moval, was done as mentioned in (Agarwal et al. 2019a).
391
+ 2.5 Archival
392
+ We have used the archival optical data from ASAS-SN (All-
393
+ Sky Automated Survey for Supernovae) (Shappee et al. 2014;
394
+ Kochanek et al. 2017).We have also used long-term high flux
395
+ observation in UV/Optical range from NASA/IPAC Extra-
396
+ galactic Database (NED)9 for providing the reference points
397
+ in our SED analysis. We have also extracted the NuSTAR
398
+ SED data points from (Sahakyan 2020) and plotted them
399
+ alongside our SED analysis.
400
+ 9 https://ned.ipac.caltech.edu/
401
+ 3 RESULTS
402
+ In this section, we provide the main results of our work using
403
+ the above broadband observations. We have explained various
404
+ characteristics of broadband light curves and spectral energy
405
+ distributions.
406
+ 3.1 Astrosat results
407
+ Astrosat observations in SXT and LAXPC were done dur-
408
+ ing 17-20 January 2019 after two weeks of TeV detection.
409
+ We have produced the SXT light curve and the spectrum
410
+ as shown in Figure 1 and Figure 2 for 0.3-7.0 keV energy
411
+ band. The source appears to be variable on a short-time
412
+ scale and the corresponding fractional variability and vari-
413
+ ability time is estimated in section 3.2. A spectrum is ex-
414
+ tracted in the energy range of 0.3-7 keV and fitted with the
415
+ power law and log-parabola models. The best-fit parame-
416
+ ters are presented in Table 1. We started with a power-law
417
+ with fixed hydrogen column density, NH = 0.0191×1020 cm−2
418
+ and ended up getting χ2/dof = 777/434 with photon spec-
419
+ tral index, Γ = 1.95±0.01 and 0.3-7 keV flux, F0.3−7keV =
420
+ (14.27±0.04)×10−11 ergs/cm2/s. Next, we keep NH as a free
421
+ parameter and the best fit value is estimated as 0.057±0.005
422
+ in units of 1020 cm−2. The χ2/dof has improved to 595.75/433
423
+ and the spectral index was found to be 2.11±0.02 with almost
424
+ the same 0.3-7 keV flux. We repeat the same procedure with
425
+ the log parabola model and with both the cases of fixed and
426
+ free NH and it gives a better fit than the power law. With
427
+ the free NH parameter we achieved a better fit with χ2/dof
428
+ = 590.55/432 compared to the power-law case. The best-fit
429
+ spectral index is 2.21±0.08 a bit softer than the power-law
430
+ index. The details about the other parameters are provided
431
+ in Table 1.
432
+ MNRAS 000, 1–14 (2021)
433
+
434
+ Multi-wavelength study of 1ES 1218+304
435
+ 5
436
+ 0
437
+ 20000
438
+ 40000
439
+ 60000
440
+ 80000
441
+ 100000 120000
442
+ Time(s)
443
+ 1.6
444
+ 1.7
445
+ 1.8
446
+ 1.9
447
+ 2.0
448
+ 2.1
449
+ 2.2
450
+ 2.3
451
+ Counts/sec
452
+ SXT 0.3-7.0 keV
453
+ Figure 1. AstroSat-SXT light curve for energy 0.3-7.0 keV. The
454
+ bin size is taken as 856 sec.
455
+ We could not get a good light curve in LAXPC but ex-
456
+ tracted the spectrum from 4-20 keV. The SXT and LAXPC
457
+ spectra are jointly fitted with Power law and Log-parabola
458
+ models. In the case of the Power-law, we get the χ2/dof
459
+ = 948.46/403 and 623.25/402 for fixed and free NH val-
460
+ ues. In both cases, the reduced-χ2 is much higher than
461
+ the case of Log-parabola (Table 1) and hence not pur-
462
+ sued further. For the joint fit, we used the total model as
463
+ constant*tbabs*logpar. The constant factor is fixed at 1.0
464
+ for data group 1 and kept as a free parameter for data group
465
+ 2. The best fit value for the constant factor is 0.96±0.04 for
466
+ both fixed and free NH. The overall reduced-χ2 is improved
467
+ when the NH is free and it is estimated as 4.2±1.0 (×1020
468
+ cm−2), almost two times higher than the fixed NH value. Fig-
469
+ ure 3 shows the best fit plot with a log-parabola model. We
470
+ found that the spectral index, α, and the curvature parame-
471
+ ter, β are a bit different during fixed and free NH. The math-
472
+ ematical representation of the log-parabolic model is given
473
+ as,
474
+ F(E) = K(E/E1)(−α+βlog(E/E1))ph cm−2 s−1 keV,
475
+ (2)
476
+ where K is the normalization and the E1 is the reference
477
+ energy fixed at 1 keV. Using the best-fit parameters of the
478
+ log-parabola model we can estimate the location of the syn-
479
+ chrotron peak, which is given as Ep = E1 10(2−α)/2β keV.
480
+ For α=1.98 and β=0.22, the Ep is estimated as 1.11 keV or
481
+ 2.68×1017 Hz. The peak of the synchrotron emission is mostly
482
+ constrained by the X-ray as shown in Figure 3 which peaks
483
+ at ∼ 2.68×1017 Hz.
484
+ 3.2 Broadband Light curves
485
+ We have collected the γ-ray data between 2018 to 2021. The
486
+ source was found to be in a flaring state in γ-ray during Jan
487
+ 2019. Simultaneous observation in Swift-XRT and UVOT
488
+ also confirms the flaring behavior in X-ray as well as in
489
+ optical-UV. On 02 January 2019 source was reported to be
490
+ flaring in very high energy gamma-ray by MAGIC (Mirzoyan
491
+ 2019) which was followed by VERITAS (Mukherjee &
492
+ VERITAS Collaboration 2019) and observation was done on
493
+ 4, 5, and 6 January 2019 show high flux state above 100 GeV
494
+ and the corresponding period is marked by light pink color
495
+ in Figure 4. We identify this period as Flare A. In X-ray
496
+ 10−3
497
+ 0.01
498
+ 0.1
499
+ 1
500
+ normalized counts s−1 keV−1
501
+ 1
502
+ 0.5
503
+ 2
504
+ 5
505
+ 0.5
506
+ 1
507
+ 1.5
508
+ 2
509
+ 2.5
510
+ ratio
511
+ Energy (keV)
512
+ Figure 2. The 0.3 - 7.0 keV energy spectrum of 1ES 1218+304
513
+ fitted with Logparabola spectral model with free galactic absorp-
514
+ tion. The SXT data were taken during the period 17-20 January
515
+ 2019.
516
+ 10−10
517
+ 2×10−11
518
+ 5×10−11
519
+ ν Fν (ergs cm−2 s−1)
520
+ 1017
521
+ 1018
522
+ 2×1017
523
+ 5×1017
524
+ 2×1018
525
+ 1
526
+ 1.5
527
+ 2
528
+ ratio
529
+ Energy (Hz)
530
+ Figure 3. The joint SXT (red) and LAXPC (blue) spectra are
531
+ modeled together. The SXT energy range is taken as 0.3 - 7.0
532
+ keV and LAXPC is taken from 3.0-20.0 keV. The joint spectra are
533
+ fitted with a log parabola spectral model. Both spectra were taken
534
+ simultaneously during the period of 17-20 January 2019.
535
+ and optical source was reported to be historically bright
536
+ with flux around ∼ 2×10−10 erg cm−2 s−1 in X-ray and
537
+ with R band flux 2.35±0.05 mJy (Ramazani et al. 2019).
538
+ We also proposed this source in India’s first space mission,
539
+ AstroSat for broadband observation. Our observation was
540
+ done between 17-20 January 2019. This period is marked
541
+ as a vertical green line in Figure 4 and identified as Flare
542
+ B. The first two panels of Figure 4 represent the long-term
543
+ γ-ray (GeV) light curve and corresponding photon spectral
544
+ index. The source is not very bright in Fermi-LAT but a
545
+ clear variability in the flux is seen. Panel 3 & 4 represent the
546
+ long-term Swift-XRT light curve and corresponding photon
547
+ spectral index. A clear X-ray brightening during Jan 2019 is
548
+ observed. During this period, we do not have many optical
549
+ observations (panel 5), and hence it’s difficult to comment
550
+ on the flux level. However, in UV (W1, M2, W2) bands
551
+ (panel 6) high flux state is observed corresponding to TeV
552
+ and X-ray activity. In panel 7, we show the archival optical
553
+ data from ASAS-SN, and no short time scale variability
554
+ MNRAS 000, 1–14 (2021)
555
+
556
+ 6
557
+ R. Diwan et al.
558
+ is seen. We also have optical data from the ground-based
559
+ observatory (panel 5) which covers the last part of the light
560
+ curve showing a nice variation from a high flux state to a low
561
+ flux state, suggesting a long-term variation in optical bands.
562
+ 3.3 Variability Study
563
+ In general, blazar shows significant variability during the flar-
564
+ ing period. The properties of these flares can depend on var-
565
+ ious factors like particle injection, particle acceleration, and
566
+ energy dissipation in the jets of the blazars. To study this in-
567
+ trinsic property we calculate the Fractional Variability Am-
568
+ plitude (Fvar) from the multi-wavelength light curve of the
569
+ source. The relation given in (Vaughan et al. 2003) is used to
570
+ determine the fractional variability (Fvar)
571
+ Fvar =
572
+
573
+ S2 − E2
574
+ F 2
575
+ (3)
576
+ err(Fvar) =
577
+
578
+
579
+
580
+
581
+ ��
582
+ 1
583
+ 2N
584
+ E2
585
+ F 2Fvar
586
+ �2
587
+ +
588
+ ��
589
+ E2
590
+ N
591
+ 1
592
+ F
593
+ �2
594
+ (4)
595
+ where S2 is the variance of the light curve, F is the aver-
596
+ age flux, E2 is the mean of the squared error in the flux
597
+ measurements and N is the number of flux points in a light
598
+ curve. We have estimated the Fvar for all the light curves
599
+ and the corresponding values are tabulated in Table 2. We
600
+ found that the source is more variable in UV followed by X-
601
+ ray and gamma-ray. We also plot the Fvar with respect to
602
+ the corresponding frequency in Figure 5. A similar behavior
603
+ is also seen for another TeV blazar 1ES 1727+502 for one of
604
+ the states (Prince et al. 2022). In past studies, it has also
605
+ been argued that the variability pattern resembles the shape
606
+ of the broadband SED seen in blazar if the source is observed
607
+ from radio to very high energy gamma-ray. One of the best
608
+ examples is Mrk 421 which is also a TeV source, where the
609
+ variability pattern during its two flaring states resembles the
610
+ blazar SED (Aleksić et al. 2015a,b). A long-term study, using
611
+ 10 yrs data, is done on 1ES 1218+304 by Singh et al. (2019)
612
+ using the multi-wavelength data from radio to γ-ray and the
613
+ Fvar estimated on long-term period is different from what we
614
+ have found in our study. Singh et al. (2019) have found that
615
+ source is more variable in radio at 15 GHz followed by X-ray
616
+ and then optical-UV and γ-ray.
617
+ The timescale of variability is yet another important pa-
618
+ rameter that sets the bound on the size of the emission re-
619
+ gion. Doubling/Halving timescales are calculated for all time
620
+ bins from MJD 58119 to 59365 for the 7-day binned γ-ray
621
+ light curve. The formula used is:
622
+ F(t2) = F(t1) × 2(t2−t1)/Td
623
+ (5)
624
+ Here F(t1) and F(t2) are the fluxes measured at time t1
625
+ and t2, respectively. Td is the flux doubling/halving time
626
+ scale. The fastest doubling/halving time (Tf) in γ-ray was
627
+ found to be 0.396 days. The value for tvar can be given by
628
+ tvar = ln(2)×Tf which is 0.275 days or 6.6 hours. The hour’s
629
+ scale variability is very common in blazar suggesting a com-
630
+ pact emitting region close to the central supermassive black
631
+ hole.
632
+ Waveband
633
+ Fvar
634
+ err(Fvar)
635
+ Fermi γ-ray
636
+ 0.2601
637
+ 0.0964
638
+ AstroSat-SXT X-ray
639
+ 0.0421
640
+ 0.0058
641
+ Swift X-ray
642
+ 0.5074
643
+ 0.01513
644
+ W1
645
+ 0.9448
646
+ 0.0006
647
+ W2
648
+ 0.6805
649
+ 0.0005
650
+ M2
651
+ 0.9448
652
+ 0.0007
653
+ U
654
+ 0.0242
655
+ 3.3185E-05
656
+ V
657
+ 0.0147
658
+ 0.0002
659
+ B
660
+ 0.0171
661
+ 0.0002
662
+ R
663
+ 0.0144
664
+ 6.5188E-05
665
+ I
666
+ 0.0120
667
+ 8.2755E-05
668
+ Table 2.
669
+ Fractional variability amplitude (Fvar) parameter for
670
+ the blazar 1ES 1218+304 from optical to HE γ-rays using observa-
671
+ tions during January 1, 2018 - May 31, 2021 (MJD 58119-59365)
672
+ with different instruments.
673
+ Using the same equation we also calculate the time-scale vari-
674
+ ability for the 856 sec binned AstroSat SXT light curve shown
675
+ in Figure 1. The flux doubling/halving time is estimated as
676
+ Tf = 1848.645 sec and the tvar is 1281.29 sec (1.2 ksec) or
677
+ 21.35 minutes. A similar flux variability time of 1.1 ksec is
678
+ also estimated for Mrk 421 in SXT light curve by Chatter-
679
+ jee et al. (2021). Considering the fact that 1ES 1218+304
680
+ is a high synchrotron peaked blazar the X-ray will explain
681
+ the synchrotron emission. As argued by many authors that
682
+ the variability time can be associated with the characteristic
683
+ time scale in the system. Here, we consider that the X-ray
684
+ variability timescale can be linked with the radiation cooling
685
+ time scale due to synchrotron only. Under this assumption
686
+ the cooling time can be the fast X-ray variability time and
687
+ can be defined as (Rybicki & Lightman 1979),
688
+ tcool ≃ 7.74 × 108 (1 + z)
689
+ δ
690
+ B−2γ−1 sec.
691
+ (6)
692
+ Where, B is the strength of the magnetic field in Gauss and
693
+ tcool is the synchrotron cooling timescale in seconds. Follow-
694
+ ing Rybicki & Lightman (1979), We can also derive the char-
695
+ acteristic frequency of the electron population responsible for
696
+ the synchrotron emission at the peak frequency,
697
+ νch,e = 4.2 × 106
698
+ δ
699
+ (1 + z)Bγ2 Hz.
700
+ (7)
701
+ Using the above two equations, we eliminate the γ since it
702
+ changes with different states and derives a single equation
703
+ given as,
704
+ B3δ ≃ 2.5(1 + z)(νch,e/1018)−1τ −2
705
+ d .
706
+ (8)
707
+ Using the above equation we derive the magnetic field
708
+ strength for Doppler factor, δ, =30 and variability time scale
709
+ of 1.2 ksec and it is found to be 0.1 G. The strength of the
710
+ magnetic field derived from the broadband SED modeling is
711
+ a factor lower than this estimated value. This discrepancy
712
+ could be because of the many assumptions made in deriving
713
+ the eqn (7) or due to the degeneracy in the SED modeling.
714
+ 3.4 Flux-Index Correlation
715
+ We computed flux-index correlation for the γ-ray and X-ray
716
+ data to study index hardening/softening. The flux vs index
717
+ plot is shown in Figure 6 with γ-ray on the upper panel and
718
+ MNRAS 000, 1–14 (2021)
719
+
720
+ Multi-wavelength study of 1ES 1218+304
721
+ 7
722
+ 0
723
+ 1
724
+ 2
725
+ 3
726
+ 4
727
+ 5
728
+ Flux0.3
729
+ 300 GeV
730
+ 1.0
731
+ 1.5
732
+ 2.0
733
+ 2.5
734
+ Index
735
+ 0.5
736
+ 1.0
737
+ 1.5
738
+ 2.0
739
+ Flux0.3
740
+ 10 KeV
741
+ 1.5
742
+ 2.0
743
+ 2.5
744
+ 3.0
745
+ Index
746
+ 15.0
747
+ 15.5
748
+ 16.0
749
+ 16.5
750
+ 17.0
751
+ Optical (mag)
752
+ U
753
+ B
754
+ V
755
+ R
756
+ I
757
+ 15.5
758
+ 16.0
759
+ 16.5
760
+ 17.0
761
+ 17.5
762
+ UV (mag)
763
+ W1
764
+ M2
765
+ W2
766
+ 58200
767
+ 58400
768
+ 58600
769
+ 58800
770
+ 59000
771
+ 59200
772
+ MJD
773
+ 14
774
+ 15
775
+ 16
776
+ 17
777
+ Optical (mag)
778
+ ASAS-SN
779
+ Figure 4. Multi-wavelength light curve of 1ES 1218+304 from January 2018 to May 2021. 7-day binned γ-ray flux are presented in units
780
+ of 10−8 ph cm−2 s−1, and X-ray fluxes are in units of 10−10 erg cm−2 s−1. The vertical red line represents the Flare period from 5-7
781
+ January 2019 and the vertical green line represents the Flare period from 15-20 January 2019. This period also includes the data from
782
+ AstroSat for the period 17-20 January 2019. We identify these periods as Flare A and Flare B.
783
+ X-ray on the lower panel. In the case of γ-ray, we have taken
784
+ data points with TS≥16. We also observe a positive corre-
785
+ lation between the flux and index, with Pearson correlation
786
+ coefficient, R = 0.644 and p-value ≈ 0. The trend follows
787
+ the linear function with slope = 0.212. In contrast to the
788
+ above plot, X-ray data shows an inverse trend i.e; a negative
789
+ correlation between flux and index, with Pearson correlation
790
+ coefficient, R = -0.748 and p-value ≈ 0. It can also be fit-
791
+ ted by a linear function with a slope = -0.423. This plot
792
+ shows two contrasting trends, we can see the ’harder-when-
793
+ brighter’ trend in the X-ray energy range and the ’softer-
794
+ when-brighter’ trend in the γ-ray energy range. A similar
795
+ trend is also observed for one of the TeV blazar 1ES 1727+502
796
+ (Prince et al. 2022). One of the possible explanations for hav-
797
+ ing different trends in X-ray and gamma-ray is that they are
798
+ produced via two different processes. For BL Lac-type sources
799
+ such as 1ES 1218+304, it is well-known that the X-rays are
800
+ produced by the synchrotron process and γ-rays are produced
801
+ via the inverse-Compton process. A long-term study done by
802
+ Singh et al. (2019) also found a mild harder-when-brighter
803
+ MNRAS 000, 1–14 (2021)
804
+
805
+ 8
806
+ R. Diwan et al.
807
+ 1016
808
+ 1018
809
+ 1020
810
+ 1022
811
+ 1024
812
+ 1026
813
+ Frequency (Hz)
814
+ 0.0
815
+ 0.2
816
+ 0.4
817
+ 0.6
818
+ 0.8
819
+ Fractional Variability amplitude
820
+ Gamma-ray
821
+ SWIFT X-ray
822
+ Optical
823
+ SWIFT-UV
824
+ AstroSat SXT
825
+ Figure 5. Fractional variability for various wavebands is plotted
826
+ with respect to their frequency.
827
+ 0
828
+ 1
829
+ 2
830
+ 3
831
+ 4
832
+ 5
833
+ 6
834
+ 7
835
+ Photon Flux (10
836
+ 8 ph cm
837
+ 2 sec
838
+ 1)
839
+ 1.0
840
+ 1.5
841
+ 2.0
842
+ 2.5
843
+ 3.0
844
+ Index
845
+ -ray
846
+ r= 0.644, p-value= 1.04×10
847
+ 11
848
+ 0.25
849
+ 0.50
850
+ 0.75
851
+ 1.00
852
+ 1.25
853
+ 1.50
854
+ 1.75
855
+ 2.00
856
+ Flux_(0.3-10 KeV) (10
857
+ 10 erg cm
858
+ 2 sec
859
+ 1)
860
+ 1.6
861
+ 1.8
862
+ 2.0
863
+ 2.2
864
+ 2.4
865
+ 2.6
866
+ 2.8
867
+ 3.0
868
+ Index
869
+ X-ray
870
+ r= -0.748, p-value= 1.139×10
871
+ 5
872
+ Figure 6. Scatter plot for the correlation between flux and index of
873
+ the blazar 1ES 1218+304. The top plot represents the 7-day binned
874
+ Fermi-Lat data. The slope is positive and the Person correlation
875
+ coefficient is 0.644. The bottom plot represents Swift-XRT data
876
+ for Flux (0.3-10 KeV) vs Photon Index. The slope is negative and
877
+ the Pearson correlation coefficient is -0.748, it follows an inverse
878
+ trend as the γ-ray data. The orange line is a linear fit for reference.
879
+ trend in X-rays using almost 10 yrs of data. The average
880
+ spectral index is estimated as 1.99±0.16 which is consistent
881
+ with our estimated value as ∼2.0. These results are also con-
882
+ sistent with the long-term study done by Wierzcholska &
883
+ Wagner (2016) where they found the average photon spec-
884
+ tral index as ∼2.0±0.01 for different values of galactic ab-
885
+ sorption taken from different models. A recent study done by
886
+ Sahakyan (2020) estimated the average photon spectral index
887
+ ≥2 for the period considering from 2008 to 2020. The spec-
888
+ tra can be even harder during the bright state as 1.60±0.05
889
+ which is consistent with our result (see Figure 6).
890
+ 103
891
+ 104
892
+ 105
893
+ Energy (MeV)
894
+ 10
895
+ 6
896
+ 10
897
+ 5
898
+ 10
899
+ 4
900
+ E2 dN
901
+ dE [MeV cm
902
+ 2 s
903
+ 1]
904
+ Likelihood Fit
905
+ 5-7 Jan
906
+ 15-20 Jan
907
+ Total Time Period
908
+ Figure 7. The γ-ray SED extracted for both the period and fit-
909
+ ted with power-law using the Likelihood fit method. The fitting
910
+ parameters are discussed in the corresponding Section 3.5.
911
+ 3.5 Fermi-LAT γ-ray spectral fitting
912
+ The process for data extraction and fitting is provided in
913
+ subsection 2.1. We have used the fermipy to extract the γ-
914
+ ray SED for the two periods (5-7 and 15-20 January 2019).
915
+ The SEDs are then fitted with a simple power law spectral
916
+ model. We noticed that the spectra are very hard and still
917
+ increasing with energy suggesting the involvement of high-
918
+ energy particles in their production. The fitted parameters
919
+ are given in Table 3 and the spectral index for period A
920
+ (Γ=1.55±0.23) and B (Γ=1.54±0.19) are much harder than
921
+ the average power law index, (Γ=1.75±0.03) for the total pe-
922
+ riod. The harder spectra suggest that the IC peak is even at
923
+ higher energy which is clearly seen in broadband SED model-
924
+ ing. A study by Costamante et al. (2018) also shows a harder
925
+ gamma-ray spectrum for many TeV blazar. A harder gamma-
926
+ ray spectrum is also seen in another TeV extreme blazar. In-
927
+ cluding the TeV data in broadband SED Aguilar-Ruiz et al.
928
+ (2022) modeled the SED for six such sources with a two-
929
+ zone emission model. Few new EHBL types sources are also
930
+ discovered with the MAGIC telescope and the Fermi-LAT
931
+ gamma-ray spectra were found to be very hard for all the
932
+ sources suggesting an extreme location of the second SED
933
+ peak above 100 GeV energy range (Acciari et al. 2020). A
934
+ long-term gamma-ray spectral index was also estimated for
935
+ 1ES 1218+304 by Singh et al. (2019) and they found it to
936
+ be harder with 1.67±0.05, similar to our estimated value. Sa-
937
+ hakyan (2020) also estimated the γ-ray spectra averaged over
938
+ ∼11.7 years which found to be 1.71±0.02 mostly consistent
939
+ with above discussed results. These values are also consistent
940
+ with the long-term average photon spectral index reported in
941
+ the recent 4FGL catalog.
942
+ 3.6 Color-Magnitude Variations
943
+ The color-magnitude relation helps us understand the differ-
944
+ ent variability scenarios of the blazar. Fluctuations in optical
945
+ flux are often followed by spectral changes. Therefore study-
946
+ ing the color-magnitude (CM) relationship can further shed
947
+ light on the dominant emission mechanisms in the blazar.
948
+ To obtain a better understanding of the CM relation for our
949
+ source, we fit a linear plot (CI = m V +c) between the color
950
+ MNRAS 000, 1–14 (2021)
951
+
952
+ Multi-wavelength study of 1ES 1218+304
953
+ 9
954
+ Parameter
955
+ Flare A
956
+ Flare B
957
+ Whole Time Period
958
+ Units
959
+ Spectral Index (α)
960
+ -1.547 ± 0.230
961
+ -1.540 ± 0.191
962
+ -1.745 ± 0.030
963
+ -
964
+ Flux (F0.3−300GeV )
965
+ 3.306
966
+ 3.063
967
+ 1.310
968
+ 10−8× photon(s) cm−2 s−1
969
+ Prefactor (N0)
970
+ 9.538 ± 3.633
971
+ 8.902 ± 2.796
972
+ 2.966 ± 0.122
973
+ 10−13× photon(s) cm−2 s−1 MeV−1
974
+ TS
975
+ 43.497
976
+ 48.297
977
+ 2913.496
978
+ -
979
+ Table 3. Best fit spectral parameters of 1ES 1218+304 from Fermi-Lat observations using equation 1 for two flaring periods 58488-58490
980
+ MJD (Flare A), 58498-58503 MJD (Flare B) and whole time period MJD 58119-59365.
981
+ 15.6
982
+ 15.8
983
+ 16.0
984
+ 16.2
985
+ 16.4
986
+ 16.6
987
+ (B+V)/2
988
+ 0.25
989
+ 0.50
990
+ 0.75
991
+ 1.00
992
+ 1.25
993
+ 1.50
994
+ 1.75
995
+ 2.00
996
+ Color Indices
997
+ B-V + 1.3
998
+ B-I
999
+ R-I + 0.2
1000
+ V-R
1001
+ Figure 8. Colour magnitude plot for 1ES 1218+304. The various
1002
+ color indices are plotted against (B+V)/2.
1003
+ indices (CI) and (B+V)/2 magnitude. We then estimate the
1004
+ fit values, i.e., slope (m), constant (c), along with the corre-
1005
+ lation coefficient (r) and the respective null hypothesis prob-
1006
+ ability (p) using two methods, Pearson and Spearman, as
1007
+ listed in Table 4. The generated CM plots are shown in Fig-
1008
+ ure 8. Offsets of 1.3 and 0.2 are used for (B-V) and (R-I).
1009
+ A positive slope with p < 0.05 implies a bluer-when-brighter
1010
+ (BWB) trend or a redder-when-fainter trend (Agarwal et al.
1011
+ 2021) while a negative slope indicates a redder-when-brighter
1012
+ trend (RWB). As evident from Table 4, a significant BWB is
1013
+ dominant during our observation period for all possible color
1014
+ indices, namely; (B-V), (B-I), (R-I), and (V-R). Blazars, in
1015
+ general, display BWB from their quasi-simultaneous optical
1016
+ observations (Ghosh et al. 2000; Agarwal et al. 2015; Gupta
1017
+ et al. 2016a).
1018
+ The BWB trend can be attributed to the process of elec-
1019
+ tron acceleration to higher energies at the shock front, fol-
1020
+ lowed by losing energy by radiative cooling while propagat-
1021
+ ing away (Kirk et al. 1998). On the other hand, the opposite
1022
+ trend of redder when brighter is observed more commonly
1023
+ in FSRQs due to the contribution of bluer thermal emission
1024
+ from the accretion disc (Villata et al. 2006). In addition to
1025
+ BWB and RWB trends, other optical studies have revealed
1026
+ cycle or loop-like trends (Agarwal et al. 2021), a mixed trend
1027
+ where BWB is dominant during higher state while RWB dur-
1028
+ ing the fainter state, or a stable-when-brighter (SWB) which
1029
+ is no significant color-magnitude correlation in the data at
1030
+ any timescale (Gupta et al. 2016b; Isler et al. 2017; Negi
1031
+ et al. 2022; Agarwal et al. 2022). However, due to the lack
1032
+ of simultaneous observations for a larger sample of blazars,
1033
+ color-magnitude trends are still a topic of debate.
1034
+ 3.7 Broadband SED modeling
1035
+ The broadband SED modeling in blazar is used to un-
1036
+ derstand the simultaneous multi-wavelength emission from
1037
+ the source along with the possible physical mechanism re-
1038
+ sponsible for broadband flaring event. Simultaneous multi-
1039
+ wavelength SEDs were generated for two time periods, which
1040
+ overlapped with proposed flaring periods. The model fit-
1041
+ ting was done using a publicly available code JetSet10 (Tra-
1042
+ macere et al. 2009, 2011, 2020; Massaro, E. et al. 2006).
1043
+ Broadband emission of BL Lac sources like 1ES 1218+304 is
1044
+ better explained by the one-zone Synchrotron-Self Compton
1045
+ (SSC) model. Leptonic models assume that relativistic lep-
1046
+ tons (mostly electrons and positrons) interact with the mag-
1047
+ netic field in the emission region and produce synchrotron
1048
+ photons in the frequency region of radio to soft-X-ray or the
1049
+ first hump of the SED. The emission in the frequency region
1050
+ of X-ray to γ-ray or the second hump of the SED is pro-
1051
+ duced by inverse Compton (IC) scattering of a photon popu-
1052
+ lation further classified into synchrotron-self Compton (SSC)
1053
+ or external Compton (EC) categories based on the source
1054
+ of the seed photons. In the case of SSC models (Ghisellini
1055
+ 1993; Maraschi et al. 1992) relativistic electrons up-scatter
1056
+ the same synchrotron photons which they have produced in
1057
+ the magnetic field. The model assumes a spherically sym-
1058
+ metric blob of radius (R) in the emission region, surrounded
1059
+ by relativistic particles accelerated by the magnetic field (B).
1060
+ The blob makes an angle θ with the observer and moves along
1061
+ the jet with the bulk Lorentz factor Γ, affecting emission re-
1062
+ gion by the beaming factor δ = 1/Γ(1 − β cos θ). The blob
1063
+ is filled with a relativistic population of electrons following
1064
+ an empirical lepton distribution relation and the power law
1065
+ with an exponential cut-off (PLEC) distribution of particles
1066
+ is assumed:
1067
+ Ne(γ) = N0γ−αexp(−γ/γcut)
1068
+ (9)
1069
+ where γcut is the highest energy cut-off in the electron spec-
1070
+ trum. We see that the optical/UV measurements are higher
1071
+ than the non-thermal emission from the jet predicted by
1072
+ the SSC model. We also see high flux points in UV/optical
1073
+ range from the long-term observation of 1ES 1218+304, from
1074
+ NASA/IPAC Extragalactic Database (NED)11. These obser-
1075
+ vations suggest that the stellar emission from the host galaxy
1076
+ of the source is dominant at optical/UV frequencies. In order
1077
+ to accurately account for this emission due to the host galaxy,
1078
+ we have added the host galaxy component during modeling
1079
+ the SED using JetSet. Modeling of blazar 1ES 1218+304 is
1080
+ based on the SSC model in reference to equation 9. Results
1081
+ 10 https://jetset.readthedocs.io/en/latest/
1082
+ 11 https://ned.ipac.caltech.edu/
1083
+ MNRAS 000, 1–14 (2021)
1084
+
1085
+ 10
1086
+ R. Diwan et al.
1087
+ Colour
1088
+ In-
1089
+ dices
1090
+ Slope
1091
+ Intercept
1092
+ Pearson
1093
+ Coeffi-
1094
+ cient
1095
+ Pearson
1096
+ P-value
1097
+ Spearman
1098
+ Coeffi-
1099
+ cient
1100
+ Spearman
1101
+ P-value
1102
+ (B-V)
1103
+ 0.216
1104
+ ±
1105
+ 0.024
1106
+ −3.152
1107
+ ±
1108
+ 0.390
1109
+ 0.752
1110
+ 7.88E-
1111
+ 13
1112
+ 0.774
1113
+ 6.33E-
1114
+ 14
1115
+ (B-I)
1116
+ 0.446
1117
+ ±
1118
+ 0.031
1119
+ −6.002
1120
+ ±
1121
+ 0.506
1122
+ 0.893
1123
+ 1.15E-
1124
+ 19
1125
+ 0.928
1126
+ 6.06E-
1127
+ 24
1128
+ (R-I)
1129
+ 0.156
1130
+ ±
1131
+ 0.019
1132
+ −1.982
1133
+ ±
1134
+ 0.317
1135
+ 0.550
1136
+ 1.67E-
1137
+ 05
1138
+ 0.734
1139
+ 2.65E-
1140
+ 10
1141
+ (V-R)
1142
+ 0.085
1143
+ ±
1144
+ 0.018
1145
+ −1.070
1146
+ ±
1147
+ 0.292
1148
+ 0.745
1149
+ 1.52E-
1150
+ 10
1151
+ 0.787
1152
+ 2.77E-
1153
+ 12
1154
+ Table 4. Colour magnitude fitting and correlations coefficient.
1155
+ 2
1156
+ 0
1157
+ 2
1158
+ 4
1159
+ 6
1160
+ 8
1161
+ 10
1162
+ 12
1163
+ 14
1164
+ log(E) (eV)
1165
+ 12
1166
+ 14
1167
+ 16
1168
+ 18
1169
+ 20
1170
+ 22
1171
+ 24
1172
+ 26
1173
+ 28
1174
+ log( ) (Hz)
1175
+ 14
1176
+ 13
1177
+ 12
1178
+ 11
1179
+ 10
1180
+ 9
1181
+ 8
1182
+ log( F ) (erg cm
1183
+ 2 s
1184
+ 1)
1185
+ -Sync
1186
+ -SSC
1187
+ host_galaxy
1188
+ Total SED
1189
+ FERMI
1190
+ SWIFT UVOT
1191
+ SWIFT XRAY
1192
+ archived
1193
+ Nustar
1194
+ Figure 9. Broadband SED Modelling for 5-7 January 2019 (Flare
1195
+ A). Optical data are fitted with the host galaxy template available
1196
+ in JetSet. Archival NuSTAR data are also plotted in cyan color
1197
+ which does not match with the current state X-ray spectral shape.
1198
+ Due to the hard X-ray spectral index, the synchrotron peak is
1199
+ shifted to higher energy (∼1020 Hz) compared to the synchrotron
1200
+ peak location (1017−18 Hz) during 15-20 January as constrained
1201
+ by AstroSat observation in Figure 3 and also visible in Figure 10.
1202
+ for the SSC model are shown in Figure 9 and Figure 10 for
1203
+ Flare A and Flare B. The model parameters are given in table
1204
+ 5.
1205
+ 3.7.1 The constraint on Doppler factor
1206
+ We can calculate the minimum value of the Doppler factor
1207
+ using the detection of high-energy photons from the source.
1208
+ This calculation assumes the optical depth, τγγ(Eh), of the
1209
+ highest energy photon, Eh, to γγ interaction is 1. The formula
1210
+ for calculating the minimum value of the Doppler factor is
1211
+ δmin =
1212
+ �σtd2
1213
+ l (1 + z)2fϵEh
1214
+ 4tvarmec4
1215
+ �1/6
1216
+ (10)
1217
+ where σt is the Thomson scattering cross-section for the elec-
1218
+ tron (6.65 × 10−25cm2), dl is the luminosity distance of the
1219
+ source, fϵ is the X-ray flux in 0.3-10 KeV energy range, Eh
1220
+ is the highest energy photon, tvar is the observed variability
1221
+ time. For 1ES 1218+304, z=0.182, dl is 924 Mpc and tvar is
1222
+ 0.275 days. Using the value of highest energy photon Eh =
1223
+ 162.822 GeV for Flare A and 278.132 GeV for Flare B, and
1224
+ fϵ = 1.94 × 10−10 for Flare A and 1.55 × 10−10 for Flare B,
1225
+ 2.5
1226
+ 0.0
1227
+ 2.5
1228
+ 5.0
1229
+ 7.5
1230
+ 10.0
1231
+ 12.5
1232
+ log(E) (eV)
1233
+ 12
1234
+ 14
1235
+ 16
1236
+ 18
1237
+ 20
1238
+ 22
1239
+ 24
1240
+ 26
1241
+ 28
1242
+ log( ) (Hz)
1243
+ 14
1244
+ 13
1245
+ 12
1246
+ 11
1247
+ 10
1248
+ 9
1249
+ log( F ) (erg cm
1250
+ 2 s
1251
+ 1)
1252
+ -Sync
1253
+ -SSC
1254
+ host_galaxy
1255
+ Total SED
1256
+ FERMI
1257
+ SWIFT UVOT
1258
+ archived
1259
+ Nustar
1260
+ AstroSat-SXT
1261
+ SWIFT XRAY
1262
+ Figure 10. The plot is the same as Figure 8 but for 15-20 January
1263
+ 2019 (Flare B). Here also the archival NuSTAR spectrum does
1264
+ not match the current state X-ray spectral shape which suggests
1265
+ that the NuSTAR spectrum was taken in low-flux states. Here the
1266
+ synchrotron peak is decided by both the XRT and SXT spectra
1267
+ plotted on top of each other which peaks at roughly ∼2.68×1017
1268
+ Hz as estimated in section 3.1 using AstroSat data.
1269
+ we get the δmin value to be 13.725 for Flare A and 14.455 for
1270
+ Flare B.
1271
+ 3.7.2 The size of emission region
1272
+ The information on the size and location of the emission re-
1273
+ gion is very important for performing the SED modeling. The
1274
+ variability time scale estimated from the γ-ray light curve is
1275
+ used to estimate the size of the emission region. The radius
1276
+ R can be estimated by using the equation,
1277
+ R = cδmintvar/(1 + z),
1278
+ (11)
1279
+ where R is estimated to be 8.27 − 8.71 × 1015cm, using the
1280
+ δmin calculated in the previous section, and tvar is calculated
1281
+ in section 3.3. During SED modeling we have used the values
1282
+ 1.06 × 1016 cm for Flare A and 1.40 × 1016 cm for Flare B.
1283
+ The location of the emission region along the jet axis from
1284
+ the supermassive black hole can also be estimated from the
1285
+ variability time assuming a spherical emission region by using
1286
+ the expression d ∼ 2cΓ2tvar/(1+z). Using the Lorentz factor,
1287
+ Γ = δmin and tvar = 0.275 days and z = 0.182, the location is
1288
+ estimated to be, d ∼ 2×1017 cm. To optimize the broadband
1289
+ SED modeling, we have fixed the location of the emission
1290
+ region to 1.0 × 1017 cm along the jet axis.
1291
+ MNRAS 000, 1–14 (2021)
1292
+
1293
+ Multi-wavelength study of 1ES 1218+304
1294
+ 11
1295
+ Sr. No.
1296
+ Model Parameters
1297
+ Unit
1298
+ Flare A
1299
+ Flare B
1300
+ 5-7 Jan
1301
+ 15-20 Jan
1302
+ 1.
1303
+ γmin
1304
+ -
1305
+ 88.342
1306
+ 5.9990
1307
+ 2.
1308
+ γmax
1309
+ -
1310
+ 6.3346 × 107
1311
+ 6.2115 × 107
1312
+ 3.
1313
+ γcut
1314
+ -
1315
+ 2.8153 × 107
1316
+ 6.2216 × 105
1317
+ 4.
1318
+ RH
1319
+ 1017cm
1320
+ 1.0
1321
+ 1.0
1322
+ 5.
1323
+ R
1324
+ 1016cm
1325
+ 1.0658
1326
+ 1.4
1327
+ 6.
1328
+ α
1329
+ -
1330
+ 1.482500
1331
+ 1.530156
1332
+ 7.
1333
+ N
1334
+ cm−3
1335
+ 85.34312
1336
+ 37.58231
1337
+ 8.
1338
+ B
1339
+ G
1340
+ 2.7378 × 10−3
1341
+ 1.3035 × 10−2
1342
+ 9.
1343
+ z
1344
+ -
1345
+ 0.182
1346
+ 0.182
1347
+ 10.
1348
+ δ
1349
+ -
1350
+ 15.97827
1351
+ 30.30340
1352
+ 11.
1353
+ Ue
1354
+ erg cm−3
1355
+ 3.470401
1356
+ 4.179746 × 10−2
1357
+ 12.
1358
+ UB
1359
+ erg cm−3
1360
+ 2.982449 × 10−7
1361
+ 6.760266 × 10−6
1362
+ 13.
1363
+ Pe
1364
+ erg s−1
1365
+ 9.460334 × 1045
1366
+ 7.081457 × 1044
1367
+ 14.
1368
+ PB
1369
+ erg s−1
1370
+ 8.130172 × 1038
1371
+ 1.145346 × 1041
1372
+ 15.
1373
+ Pjet
1374
+ erg s−1
1375
+ 1.060629 × 1046
1376
+ 7.370064 × 1044
1377
+ 16.
1378
+ Reduced Chi-Squared
1379
+ -
1380
+ 1.079990
1381
+ 2.707362
1382
+ Host Galaxy
1383
+ 17.
1384
+ nuFnu_p_host
1385
+ erg cm−2 s−1
1386
+ -10.373
1387
+ -10.373
1388
+ 18.
1389
+ nu_scale
1390
+ Hz
1391
+ 0.496
1392
+ 0.493
1393
+ Table 5. [1-3] Minimum, maximum and cut Lorentz factor of injected electron spectrum [4] The position of the region [5] The size of
1394
+ emission region [6] Spectral Index [7] Particle density [8] Magnetic field [9] Red Shift [10] Doppler factor [11] Electron energy density [12]
1395
+ Magnetic field energy density [13] Jet power in electrons [14] Jet power in magnetic field [15] Total jet power
1396
+ 3.7.3 Jet Power
1397
+ We have estimated the power carried by individual compo-
1398
+ nents (leptons, protons, and magnetic fields) and the total
1399
+ jet power. The total power of the jet was estimated using
1400
+ Pjet = πR2Γ2c(U ′
1401
+ e + U ′
1402
+ p + U ′
1403
+ B)
1404
+ (12)
1405
+ Here Γ is the bulk Lorentz factor. U ′
1406
+ e, U ′
1407
+ p, U ′
1408
+ B are the energy
1409
+ densities of electrons-positrons, cold protons and the mag-
1410
+ netic field respectively in the co-moving jet’s frame (primed
1411
+ quantities are in the co-moving jet frame while unprimed
1412
+ quantities are in the observer frame). The power in leptons
1413
+ is given by
1414
+ Pe = 3Γ2c
1415
+ 4R
1416
+ � Emin
1417
+ Emax
1418
+ EQ(E)dE
1419
+ (13)
1420
+ where Q(E) is the injected particle spectrum. The integration
1421
+ limits, Emin and Emax are calculated by multiplying the min-
1422
+ imum and maximum Lorentz factor (γmin and γmax) of the
1423
+ electrons with the rest-mass energy of the electron respec-
1424
+ tively. The power in the magnetic field is calculated using
1425
+ PB = R2Γ2cB2
1426
+ 8
1427
+ (14)
1428
+ where B is the magnetic field strength obtained from the
1429
+ SED modeling. The energy densities for electron-positron and
1430
+ magnetic field for both Flare events were returned by our
1431
+ model. The energy density for cold proton was not estimated
1432
+ as it was too small. We calculated Pe, PB which are the power
1433
+ carried by the leptons and the magnetic field respectively. The
1434
+ total power Pjet ≈ Pe + PB along with the power of the in-
1435
+ dividual components has been mentioned in Table 5. The jet
1436
+ is dominated by the lepton’s power and its value decreases
1437
+ for the second flare period. The luminosities have been com-
1438
+ puted for a pure electron/positron jet since the proton con-
1439
+ tent is not well known, and can be considered as the lower
1440
+ limit. The absolute jet power Ljet ≃ 1×1046ergs−1 for Flare
1441
+ A and is below the Eddington luminosity for a 5.6 × 108M⊙
1442
+ black hole mass (LEdd = 7.3 × 1046ergs−1) estimated from
1443
+ the properties of the host galaxy in the optical band (Rüger
1444
+ et al. 2010). For Flare B, Ljet ≃ 7.37 × 1044ergs−1 is signifi-
1445
+ cantly below the LEdd.
1446
+ 3.7.4 Broadband emission during flaring states
1447
+ We choose two flaring periods during the month of January
1448
+ 2019, MJD 58488-58490 (5-7 January 2019, Fig 9) and MJD
1449
+ 58498-58503 (15-20 January 2019, Fig 10) were modeled with
1450
+ a one-zone leptonic scenario. The modeled parameters are
1451
+ mentioned in Table 5. The model parameters inferred from
1452
+ this fitting suggest that Flare A had more activity compared
1453
+ to Flare B. Although the γmax and α are almost the same for
1454
+ both the flares inferring that there was very little variability
1455
+ in VHE γ-ray band, we see from Table 5 that γmin, γcut have
1456
+ significantly higher values for Flare A compared to Flare B,
1457
+ which may be due to the flaring seen in the X-ray band. The
1458
+ magnetic field (B) for Flare A (2.73×10−3) is also less than
1459
+ that of Flare B (1.30×10−2). During the fitting of SED, we
1460
+ kept RH and δ as free parameters. We find that the value of
1461
+ RH is close to the value we calculate using equation 11. We
1462
+ also calculate the minimum doppler factor δmin between the
1463
+ range (13.725-14.455), but during the SED modeling, we find
1464
+ that for Flare A δ = 15.98 and for Flare B it is much higher δ
1465
+ = 30.30 then the calculated value. It suggests that variation
1466
+ in δ could be one of the reasons for different flux states.
1467
+ During these flares, the optical-UV emission is dominated
1468
+ MNRAS 000, 1–14 (2021)
1469
+
1470
+ 12
1471
+ R. Diwan et al.
1472
+ by thermal emission from the host galaxy and hence has been
1473
+ modeled using the host galaxy model using JetSet. It is also
1474
+ seen that the X-ray data is better explained by synchrotron
1475
+ radiation of electrons. The SSC component of SED model-
1476
+ ing dominates above 1020 Hz (∼ 1 MeV) and it is useful in
1477
+ describing the data up to the VHE γ-ray band.
1478
+ 4 SUMMARY AND DISCUSSIONS
1479
+ In our work, we present the multi-wavelength study of HBL
1480
+ blazar 1ES 1218+304 from 1st January 2018 to 31st March
1481
+ 2021 (58119-59365), which also include the high flux event in
1482
+ VHE γ-rays detected by both MAGIC and VERITAS obser-
1483
+ vatories during January 2019. This high flux rate was also
1484
+ seen in Swift-XRT and UVOT instruments. Hence we di-
1485
+ vided our SED analysis into two flaring periods 5-7 Jan-
1486
+ uary 2019 and 15-20 January 2019 for simultaneous multi-
1487
+ wavelength observation of 1ES 1218+304. The fastest vari-
1488
+ ability timescale was found to be 0.275 days from analyzing
1489
+ the γ-ray light curve, constraining the size of the emission
1490
+ region to 8.27 − 8.71 × 1015 cm, which came out to be higher
1491
+ than previous modeling results (Rüger et al. 2010, Sahakyan
1492
+ 2020, Singh et al. 2019) but comparable to SED modeled
1493
+ results in our case, see Table 5. The location of the emis-
1494
+ sion region is estimated to be d ∼ 2 × 1017cm was similar
1495
+ to that used for SED modeling. The highest energy photon
1496
+ detected was 278.132 GeV which arrived during Flare B. We
1497
+ can also see the ’harder-when-brighter’ trend in the X-ray en-
1498
+ ergy range and the ’softer-when-brighter’ trend in the γ-ray
1499
+ energy range.
1500
+ The broadband SED modeling of the source was repro-
1501
+ duced by a leptonic simple one-zone SSC model with the
1502
+ electron energy distribution described by a Power-law with
1503
+ an exponential cut-off (PLEC) function. Parameters like the
1504
+ magnetic field, injected electron spectrum, and minimum and
1505
+ maximum energy of injected electrons have been optimized
1506
+ to get a good fit to the SEDs data points. So this study sug-
1507
+ gests that a single-zone model can also be good enough to
1508
+ explain the multi-waveband emissions from 1ES 1218+304.
1509
+ The optical and UV emissions from the source are found to
1510
+ be dominated by the stellar thermal emissions from the host
1511
+ galaxy and can be modeled using the JetSet code by a simple
1512
+ blackbody approximation (Rüger et al. 2010).
1513
+ Costamante et al. (2018) argued that the broadband SED
1514
+ modeling in hard-TeV blazar can be explained by the one-
1515
+ zone SSC model at the expense of extreme electron ener-
1516
+ gies with very low radiative efficiency. The maximum elec-
1517
+ tron Lorentz factor estimated in their modeling for all the six
1518
+ sources is orders of 107 which is consistent with our results
1519
+ for 1ES 1218+304. The other modeling parameters such as
1520
+ the size of the emission region, magnetic field strength, and
1521
+ the magnetization parameters (UB/Ue) are very similar to
1522
+ our SED modeling result for 1ES 1218+304. In our case, the
1523
+ UB/Ue = 10−4 - 10−6 and in Costamante et al. (2018) it order
1524
+ of 10−2 - 10−5. Similar results were also obtained by Kauf-
1525
+ mann et al. (2011) where they model the broadband SED of
1526
+ extreme TeV source 1ES 0229+200. The magnetic field and
1527
+ the magnetization parameter (10−5) are consistent with our
1528
+ results for 1ES 1218+304. But their model requires a narrow
1529
+ electron energy distribution with γmin ∼ 105 to γmax ∼ 107
1530
+ rather than the broad energy range obtained in our study,
1531
+ Costamante et al. (2018), and Acciari et al. (2020).
1532
+ Acciari et al. (2020) have observed ten new TeV sources
1533
+ with MAGIC from 2010 to 2017 for a total period of 262
1534
+ hours and the simultaneous X-ray observations confirm that
1535
+ out of 10, 8 sources are of extreme nature. Their γ-SED
1536
+ was found to be very hard between 1.4 to 1.9. Blazar 1ES
1537
+ 1218+304 is also an extreme TeV blazar and in our study, the
1538
+ gamma-ray SED is found to be 1.5 consistent with the above
1539
+ TeV sources. They have modeled all the sources with a sin-
1540
+ gle zone conical-jet SSC model. Additionally, they also used
1541
+ the proton-synchrotron and a leptonic scenario with a struc-
1542
+ tured jet. They also argue that all the model provides a good
1543
+ fit to the broadband SED but the individual parameters in
1544
+ each model differ substantially. Comparing their SSC model
1545
+ results to our SSC modeling the maximum electron energy is
1546
+ consistent. The electron spectral index in our case is harder
1547
+ than their results and also the magnetic field in our case is
1548
+ much smaller. The estimated Lorentz factor is more or less
1549
+ consistent with the Γ used for all the sources in their study.
1550
+ In their recent work Aguilar-Ruiz et al. (2022) have modeled
1551
+ the six well-known extreme BL Lac sources with a lepto-
1552
+ hadronic two-zone emission model to explain the broadband
1553
+ SED. In another study, Zech & Lemoine (2021) have shown
1554
+ that the broadband SED of extreme BL Lac sources can be
1555
+ explained by considering the co-acceleration of electrons and
1556
+ protons on internal or recollimation shocks inside the rela-
1557
+ tivistic jet. Sahakyan (2020) has modeled the average state
1558
+ of 1ES 1218+304 with one-zone SSC model. The parameter
1559
+ estimated in their study is mostly consistent with ours. How-
1560
+ ever, our study focuses on the smaller period including two
1561
+ flaring events. During the flaring event (15-20 Jan) the mag-
1562
+ netic field and the magnetization parameters are estimated
1563
+ as 1.30×10−2 Gauss and ∼10−4 which is comparable to the
1564
+ value for the same parameters estimated by modeling the av-
1565
+ erage state of the source in Sahakyan (2020). However, the
1566
+ Doppler factor required in Sahakyan (2020) is much higher
1567
+ than the Doppler factor needed to fit the flaring state in our
1568
+ case. Singh et al. (2019) also modeled the average broadband
1569
+ SED collected for almost 10 years with a one-zone SSC model.
1570
+ The required γmin, γmax and Doppler factor are consistent
1571
+ with our result but the size of the emission region is one order
1572
+ of magnitude smaller than ours, and also the magnetic field
1573
+ estimated in their model is much higher than what we found.
1574
+ The difference in some of the parameters could be because
1575
+ they modeled the average SED and in our case, we are more
1576
+ focused on a short period of time. The optical-UV SED is
1577
+ mostly off to the general trend of broadband SED of blazar
1578
+ and hence in both cases is fitted with a host-galaxy contri-
1579
+ bution. Singh et al. (2019) used a specific model to fit the
1580
+ host-galaxy and estimated the black hole mass of the source,
1581
+ however, in JetSet we can not include a specific model, and
1582
+ hence host-galaxy is fitted as a free parameter.
1583
+ The above discussion suggests that the known extreme BL
1584
+ Lac sources are very less in number and need careful attention
1585
+ and more broadband study to exactly quantify their nature
1586
+ and the physical emission mechanism.
1587
+ MNRAS 000, 1–14 (2021)
1588
+
1589
+ Multi-wavelength study of 1ES 1218+304
1590
+ 13
1591
+ 5 CONCLUSIONS
1592
+ In this work, we present the long-term study of the blazar
1593
+ 1ES 1218+304 using 3.5 years of near-simultaneous multi-
1594
+ wavelength data from Fermi-LAT, SWIFT-XRT, SWIFT-
1595
+ UVOT, AstroSat, and TUBITAK observations taken between
1596
+ January 1, 2018, and March 31, 2021. This study explores the
1597
+ broadband temporal and spectral behavior of the source dur-
1598
+ ing flaring states. The main results of our study are provided
1599
+ below:
1600
+ • During the month of January 2019, VHE γ-rays detected
1601
+ by both MAGIC and VERITAS observatory. This high flux
1602
+ state was also seen in Fermi, Swift-XRT, and UVOT instru-
1603
+ ments. The fractional variability estimated across the wave-
1604
+ bands suggests that UV is more variable followed by X-ray,
1605
+ γ-ray, and optical.
1606
+ • The fast flux variability in γ-ray is calculated to be
1607
+ 0.275 days, the size of the emission region is estimated to
1608
+ be ∼8×1015 cm, and the emission region is located at a dis-
1609
+ tance of ∼ 2 × 1017 cm. A "harder-when-brighter" trend was
1610
+ seen in X-ray whereas a "softer-when-brighter" trend was in
1611
+ γ-ray. The γ-ray emission from 1ES 1218+304 can also be
1612
+ described by a power law with a spectral index of ∼ 1.745.
1613
+ • The Astrosat SXT light curve reveals a minute scale of
1614
+ variability of the order of 20 minutes and the X-ray spectrum
1615
+ is well fitted with both power-law and the log parabola mod-
1616
+ els. However, the LP provides a better fit. A joint fit with the
1617
+ LAXPC spectrum provides a great constrain on the location
1618
+ of synchrotron peak roughly around 2.68×1017Hz.
1619
+ • As seen in many other TeV blazars, a shift in syn-
1620
+ chrotron peak is observed from one state to another state
1621
+ from ∼1017−18 Hz to ∼1020 suggesting an extreme nature of
1622
+ the source.
1623
+ • The broadband SED modeling of the source is repro-
1624
+ duced by a one-zone leptonic SSC model with the electron
1625
+ energy distribution described by a Power-law with an expo-
1626
+ nential cut-off (PLEC) function. We also find that the Opti-
1627
+ cal/UV emissions from the source are dominated by the stel-
1628
+ lar thermal emissions from the host galaxy which are modeled
1629
+ by a simple blackbody approximation (Rüger et al. 2010) us-
1630
+ ing JetSet. The JetSet code uses an approximation of the host
1631
+ galaxy model to help fit the SED modeling. We need more
1632
+ precise and dedicated observation in the UV/Optical band
1633
+ for a better understanding of the host galaxy.
1634
+ • 1ES 1218+304 is also an important source for obser-
1635
+ vations within the upcoming high-energy ground-based tele-
1636
+ scopes like CTA (Cherenkov Telescope Array)12 observatory
1637
+ to establish the link beyond the GeV energy range, in the
1638
+ realm of TeV γ-ray emission and MeV-GeV emission mea-
1639
+ sured from the Fermi-LAT and its extreme blazar behavior.
1640
+ ACKNOWLEDGEMENTS
1641
+ D. Bose acknowledges the support of Ramanujan Fellowship-
1642
+ SB/S2/RJN-038/2017. R. Prince is grateful for the support of
1643
+ the Polish Funding Agency National Science Centre, project
1644
+ 2017/26/A/ST9/-00756 (MAESTRO 9) and MNiSW grant
1645
+ DIR/WK/2018/12. This work made use of Fermi telescope
1646
+ 12 https://www.cta-observatory.org
1647
+ data and the Fermitool package obtained through the Fermi
1648
+ Science Support Center (FSSC) provided by NASA. This
1649
+ work also made use of publicly available packages JetSet, Fer-
1650
+ mipy, and PSRESP. This publication uses the data from the
1651
+ AstroSat mission of the Indian Space Research Organisation
1652
+ (ISRO), archived at the Indian Space Science Data Centre
1653
+ (ISSDC). This work has used the data from the Soft X-ray
1654
+ Telescope (SXT) developed at TIFR, Mumbai, and the SXT
1655
+ POC at TIFR is thanked for verifying and releasing the data
1656
+ via the ISSDC data archive and providing the necessary soft-
1657
+ ware tools. We thank the LAXPC Payload Operation Center
1658
+ (POC) at TIFR, Mumbai for providing the necessary soft-
1659
+ ware tools. We have also made use of the software provided
1660
+ by the High Energy Astrophysics Science Archive Research
1661
+ Center (HEASARC), which is a service of the Astrophysics
1662
+ Science Division at NASA/GSFC.
1663
+ DATA AVAILABILITY
1664
+ For this work, we have used data from the Fermi-LAT, Swift-
1665
+ XRT, Swift-UVOT, and AstroSat which are available in the
1666
+ public domain. We have also used optical data collected by
1667
+ the TUBITAK telescope. This optical data was given to us
1668
+ on request. Details are given in Section 2.
1669
+ REFERENCES
1670
+ Abdo A. A., et al., 2010, The Astrophysical Journal, 716, 30
1671
+ Abdollahi S., et al., 2020, The Astrophysical Journal Supplement
1672
+ Series, 247, 33
1673
+ Abhir J., Joseph J., Patel S. R., Bose D., 2021a, MNRAS, 501,
1674
+ 2504
1675
+ Abhir J., Prince R., Joseph J., Bose D., Gupta N., 2021b, ApJ,
1676
+ 915, 26
1677
+ Acciari V. A., et al., 2009, ApJ, 695, 1370
1678
+ Acciari V. A., et al., 2020, ApJS, 247, 16
1679
+ Agarwal A., et al., 2015, MNRAS, 451, 3882
1680
+ Agarwal A., et al., 2019a, MNRAS, 488, 4093
1681
+ Agarwal A., et al., 2019b, Monthly Notices of the Royal Astronom-
1682
+ ical Society, 488, 4093
1683
+ Agarwal A., et al., 2021, A&A, 645, A137
1684
+ Agarwal A., Pandey A., Özdönmez A., Ege E., Kumar Das A.,
1685
+ Karakulak V., 2022, ApJ, 933, 42
1686
+ Aguilar-Ruiz E., Fraija N., Galván-Gámez A., Benítez E., 2022,
1687
+ MNRAS, 512, 1557
1688
+ Aharonian F. A., 2000, New Astron., 5, 377
1689
+ Albert J., et al., 2006, ApJ, 642, L119
1690
+ Aleksić J., et al., 2015a, A&A, 576, A126
1691
+ Aleksić J., et al., 2015b, A&A, 578, A22
1692
+ Atwood W. B., et al., 2009, ApJ, 697, 1071
1693
+ Barat S., Chatterjee R., Mitra K., 2022, Monthly Notices of the
1694
+ Royal Astronomical Society, 515, 1655
1695
+ Blandford R. D., Znajek R. L., 1977, MNRAS, 179, 433
1696
+ Bose D., Chitnis V. R., Majumdar P., Acharya B. S., 2022, The
1697
+ European Physical Journal Special Topics, 231, 3
1698
+ Böttcher M., Reimer A., Sweeney K., Prakash A., 2013, ApJ, 768,
1699
+ 54
1700
+ Cao G., Wang J.-C., 2013, Monthly Notices of the Royal Astro-
1701
+ nomical Society, 436, 2170
1702
+ Chatterjee R., et al., 2021, arXiv e-prints, p. arXiv:2102.00919
1703
+ Costamante L., Bonnoli G., Tavecchio F., Ghisellini G., Taglia-
1704
+ ferri G., Khangulyan D., 2018, Monthly Notices of the Royal
1705
+ Astronomical Society, 477, 4257
1706
+ MNRAS 000, 1–14 (2021)
1707
+
1708
+ 14
1709
+ R. Diwan et al.
1710
+ Feng
1711
+ Q.,
1712
+ VERITAS
1713
+ Collaboration
1714
+ 2022,
1715
+ in
1716
+ 37th
1717
+ Interna-
1718
+ tional Cosmic Ray Conference. p. 802 (arXiv:2108.05333),
1719
+ doi:10.22323/1.395.0802
1720
+ Fortin P., 2008, in Aharonian F. A., Hofmann W., Rieger F.,
1721
+ eds, American Institute of Physics Conference Series Vol. 1085,
1722
+ American Institute of Physics Conference Series. pp 565–568
1723
+ (arXiv:0810.0301), doi:10.1063/1.3076735
1724
+ Ghisellini G., 1993, Advances in Space Research, 13, 587
1725
+ Ghosh K. K., Ramsey B. D., Sadun A. C., Soundararajaperumal
1726
+ S., 2000, ApJS, 127, 11
1727
+ Giommi P., et al., 2006, A&A, 456, 911
1728
+ Gupta A. C., et al., 2016a, MNRAS, 458, 1127
1729
+ Gupta A. C., et al., 2016b, Monthly Notices of the Royal Astro-
1730
+ nomical Society, 458, 1127
1731
+ HI4PI Collaboration et al., 2016, A&A, 594, A116
1732
+ Isler J. C., Urry C. M., Coppi P., Bailyn C., Brady M., MacPherson
1733
+ E., Buxton M., Hasan I., 2017, ApJ, 844, 107
1734
+ Kaufmann S., Wagner S. J., Tibolla O., Hauser M., 2011, A&A,
1735
+ 534, A130
1736
+ Kirk J. G., Rieger F. M., Mastichiadis A., 1998, A&A, 333, 452
1737
+ Kochanek C. S., et al., 2017, PASP, 129, 104502
1738
+ Liu H. T., Bai J. M., 2006, The Astrophysical Journal, 653, 1089
1739
+ Lombardi S., Lindfors E., Becerra Gonzalez J., Colin P., Sitarek
1740
+ J., Stamerra A., 2011, arXiv e-prints, p. arXiv:1110.6786
1741
+ Mannheim K., 1993, A&A, 269, 67
1742
+ Maraschi L., Ghisellini G., Celotti A., 1992, ApJ, 397, L5
1743
+ Massaro, E. Tramacere, A. Perri, M. Giommi, P. Tosti, G. 2006,
1744
+ A&A, 448, 861
1745
+ Mirzoyan R., 2019, The Astronomer’s Telegram, 12354, 1
1746
+ Misra R., Roy J., Yadav J. S., 2021, Journal of Astrophysics and
1747
+ Astronomy, 42, 55
1748
+ Mukherjee R., VERITAS Collaboration 2019, The Astronomer’s
1749
+ Telegram, 12360, 1
1750
+ Nalewajko K., Begelman M. C., Sikora M., 2014, The Astrophysi-
1751
+ cal Journal, 789, 161
1752
+ Negi V., Joshi R., Chand K., Chand H., Wiita P., Ho L. C., Singh
1753
+ R. S., 2022, MNRAS, 510, 1791
1754
+ Prince R., 2019, ApJ, 871, 101
1755
+ Prince R., 2020, The Astrophysical Journal, 890, 164
1756
+ Prince R., Majumdar P., Gupta N., 2017, The Astrophysical Jour-
1757
+ nal, 844, 62
1758
+ Prince R., Gupta N., Nalewajko K., 2019, ApJ, 883, 137
1759
+ Prince R., Khatoon R., Stalin C. S., 2021, MNRAS, 502, 5245
1760
+ Prince R., Khatoon R., Majumdar P., Czerny B., Gupta N., 2022,
1761
+ Monthly Notices of the Royal Astronomical Society, 515, 2633
1762
+ Priya S., Prince R., Agarwal A., Bose D., Özdönmez A., Ege E.,
1763
+ 2022, Monthly Notices of the Royal Astronomical Society, 513,
1764
+ 2239
1765
+ Ramazani V. F., Bonneli G., Cerruti M., 2019, The Astronomer’s
1766
+ Telegram, 12365, 1
1767
+ Rybicki G. B., Lightman A. P., 1979, Radiative processes in astro-
1768
+ physics
1769
+ Rüger M., Spanier F., Mannheim K., 2010, Monthly Notices of the
1770
+ Royal Astronomical Society, 401, 973
1771
+ Sahakyan N., 2020, MNRAS, 496, 5518
1772
+ Schlafly E. F., Finkbeiner D. P., 2011, The Astrophysical Journal,
1773
+ 737, 103
1774
+ Schlickeiser R., 1989a, ApJ, 336, 243
1775
+ Schlickeiser R., 1989b, ApJ, 336, 264
1776
+ Shappee B. J., et al., 2014, ApJ, 788, 48
1777
+ Shukla A., Mannheim K., 2020, Nature Communications, 11, 4176
1778
+ Singh K. P., et al., 2016, in den Herder J.-W. A., Takahashi T.,
1779
+ Bautz M., eds, Society of Photo-Optical Instrumentation Engi-
1780
+ neers (SPIE) Conference Series Vol. 9905, Space Telescopes and
1781
+ Instrumentation 2016: Ultraviolet to Gamma Ray. p. 99051E,
1782
+ doi:10.1117/12.2235309
1783
+ Singh K. P., et al., 2017, Journal of Astrophysics and Astronomy,
1784
+ 38, 29
1785
+ Singh K. K., Bisschoff B., van Soelen B., Tolamatti A., Marais
1786
+ J. P., Meintjes P. J., 2019, Monthly Notices of the Royal As-
1787
+ tronomical Society, 489, 5076
1788
+ Sun S.-S., Li H.-L., Yang X., Lü J., Xu D.-W., Wang J., 2021,
1789
+ Research in Astronomy and Astrophysics, 21, 197
1790
+ Tramacere A., 2020, JetSeT: Numerical modeling and SED fit-
1791
+ ting tool for relativistic jets, Astrophysics Source Code Library,
1792
+ record ascl:2009.001 (ascl:2009.001)
1793
+ Tramacere A., Giommi P., Perri M., Verrecchia F., Tosti G., 2009,
1794
+ A&A, 501, 879
1795
+ Tramacere A., Massaro E., Taylor A. M., 2011, ApJ, 739, 66
1796
+ Urry C. M., Padovani P., 1995, PASP, 107, 803
1797
+ Vaughan S., Edelson R., Warwick R. S., Uttley P., 2003, MNRAS,
1798
+ 345, 1271
1799
+ Villata M., et al., 2006, A&A, 453, 817
1800
+ Wierzcholska A., Wagner S. J., 2016, Monthly Notices of the Royal
1801
+ Astronomical Society, 458, 56
1802
+ Wood M., Caputo R., Charles E., Di Mauro M., Magill J.,
1803
+ Perkins J. S., Fermi-LAT Collaboration 2021, in 35th In-
1804
+ ternational
1805
+ Cosmic
1806
+ Ray
1807
+ Conference
1808
+ (ICRC2017).
1809
+ p.
1810
+ 824
1811
+ (arXiv:1707.09551), doi:10.22323/1.301.0824
1812
+ Yadav J. S., et al., 2016, in den Herder J.-W. A., Takahashi T.,
1813
+ Bautz M., eds, Society of Photo-Optical Instrumentation Engi-
1814
+ neers (SPIE) Conference Series Vol. 9905, Space Telescopes and
1815
+ Instrumentation 2016: Ultraviolet to Gamma Ray. p. 99051D,
1816
+ doi:10.1117/12.2231857
1817
+ Zech A., Lemoine M., 2021, A&A, 654, A96
1818
+ This paper has been typeset from a TEX/LATEX file prepared by
1819
+ the author.
1820
+ MNRAS 000, 1–14 (2021)
1821
+
5NAzT4oBgHgl3EQfEPrI/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5dAyT4oBgHgl3EQfQPaq/content/tmp_files/2301.00042v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
5dAyT4oBgHgl3EQfQPaq/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5dFAT4oBgHgl3EQfmh3P/content/tmp_files/2301.08624v1.pdf.txt ADDED
@@ -0,0 +1,1431 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.08624v1 [math.AP] 20 Jan 2023
2
+ ALMOST MINIMIZERS TO A TRANSMISSION PROBLEM
3
+ FOR (p, q)-LAPLACIAN
4
+ SUNGHAN KIM AND HENRIK SHAHGHOLIAN
5
+ Abstract. This paper concerns almost minimizers of the functional
6
+ J(v, Ω) =
7
+ ˆ
8
+
9
+
10
+ |Dv+|p + |Dv−|q�
11
+ dx,
12
+ where 1 < p ̸= q < ∞ and Ω is a bounded domain of Rn, n ≥ 1. We
13
+ prove the universal H¨older regularity of local (1 + ε)-minimizers, when
14
+ ε is universally small. Moreover, we prove almost Lipschitz regularity
15
+ of the local (1 + ε)-minimizers, when |p − q| ≪ 1 and ε ≪ 1.
16
+ Contents
17
+ 1.
18
+ Introduction
19
+ 1
20
+ 2.
21
+ Technical Tools
22
+ 4
23
+ 3.
24
+ H¨older regularity
25
+ 10
26
+ 4.
27
+ Almost Lipschitz regularity
28
+ 14
29
+ Declarations
30
+ 18
31
+ References
32
+ 18
33
+ 1. Introduction
34
+ In this paper, we study regularity properties of almost minimizers to the
35
+ functional
36
+ (1.1)
37
+ J(u, Ω) ≡ Jp,q(u, Ω) :=
38
+ ˆ
39
+
40
+ (|Du+|p + |Du−|q) dx,
41
+ where Ω ⊂ Rn is a bounded domain and 1 < p, q < ∞.
42
+ Our primary
43
+ goal is to prove a universal H¨older estimate for the almost minimizers. We
44
+ shall also study various scenarios, on the relation between p and q, to see
45
+ if the regularity can be improved. In particular, we aim at proving almost
46
+ Lipschitz regularity provided that p and q are close to each other.
47
+ The notion of local K-minimizers is given as follows.
48
+ H. Shahgholian was supported in part by Swedish Research Council. This project
49
+ was finalized during the program Geometric aspects of nonlinear PDE at Institute Mittag
50
+ Leffler, Stockholm.
51
+ 1
52
+
53
+ 2
54
+ SUNGHAN KIM AND HENRIK SHAHGHOLIAN
55
+ Definition 1.1 (Local K-minimizers). Let K ≥ 1 be a constant. We shall
56
+ call u ∈ W 1,p∧q
57
+ loc
58
+ (Ω) a local K-minimizer of the functional J, if for any cube
59
+ Q ⊂ Ω, J(u, Q) < ∞, and
60
+ (1.2)
61
+ J(u, Q) ≤ KJ(v, Q),
62
+ for any v ∈ u + W 1,p∧q
63
+ 0
64
+ (Q) such that J(v, Q) < ∞.
65
+ In the course of this paper, we shall be interested in the case K = 1 + ε,
66
+ for some small ε > 0. We remark that our analysis does not change, as
67
+ one replaces cubes with balls in the above definition. However, it is worth
68
+ mentioning that the notion with cubes is in general not equivalent to hat
69
+ with balls, unless K = 1, and local K-minimizers with cubes are known to
70
+ be less restrictive; see [Giu03, Example 6.5].
71
+ In the framework of standard functionals (i.e., those without break across
72
+ some level set), the universal H¨older regularity is established for quasi-
73
+ minimzers (those with K > 1 any, and Q in (1.2) replaced with spt(u − v)),
74
+ as the essential arguments for the proof of the H¨older regularity for exact
75
+ minimizers remain unchanged upon the extension; see [Giu03]. In contrast,
76
+ thanks to the particular break across the zero-level set in Jp,q, many impor-
77
+ tant steps in the proof of [CKS21, Theorem 1.2] for the H¨older regularity of
78
+ exact minimizers to our functional Jp,q are destroyed when applied to quasi-
79
+ minimzers. Still, we were able to extend the argument to (1+ε)-minimizers,
80
+ when ε is universally small.
81
+ Theorem 1.2. There are constants ε > 0 and σ ∈ (0, 1), depending only on
82
+ n, p+, and p−, such that if u ∈ W 1,p+∧p−(Q2) is a local (1 + ε)-minimizer
83
+ of Jp+,p−, then u± ∈ C0,σ±
84
+ loc (Q1) with σ+ = σ, σ− = 1 − (1 − σ)p−
85
+ p+ , and
86
+ [u±]C0,σ±(Q1) ≤ c
87
+ �ˆ
88
+ Q2
89
+ ((u+)p+ + (u−)p−) dx
90
+ � 1
91
+ p± ,
92
+ where c depends only on n, p+, and p−.
93
+ We remark that the above theorem also shows the exact relation between
94
+ the H¨older exponents for each phase; this was not contained in the authors
95
+ earlier collaboration [CKS21, Theorem 1.2] with M. Colombo. Our proof
96
+ involves a careful extension of the main ingredients for [CKS21, Theorem
97
+ 1.2] to local (1 + ε)-minimizers, and a compactness argument.
98
+ A key feature of local (1 + ε)-minimizers, ε ≥ 0, for the functional Jp,q
99
+ is that the positive and negative phase scales differently from each other.
100
+ Namely if u is a local (1+ε)-minimizer in Q2, then one needs ∥u+∥X compa-
101
+ rable with ∥u−∥q/p
102
+ X , with X = Lp(Q1) or L∞(Q1). As for the case of the local
103
+ minimizers, i.e., ε = 0, the comparability was proved by a Harnack inequal-
104
+ ity argument [CKS21, Lemma 3.7, Corollary 3.8], which played an essential
105
+ role in the proof of their universal H¨older regularity [CKS21, Theorem 1.2].
106
+ The main difference, which also amounts to the challenges here, for the
107
+ case of local (1+ε)-minimizers, ε > 0, is the lack of such a Harnack inequality
108
+
109
+ 3
110
+ argument. More fundamentally, local (1 + ε)-minimizers do not possess the
111
+ subsolution properties as opposed to local minimizers (see [CKS21, Lemma
112
+ 3.4]). One of the consequences is that the basic estimates for one phase,
113
+ such as the Cacciopoli inequality (Lemma 2.2) and the comparison lemma
114
+ (Lemma 3.1) for local (1+ε)-minimizers, involve an additional ε-factor of the
115
+ other phase. Hence, our main task here is to effectively control the additional
116
+ ε-term, which amounts to some technical difficulties. It is worthwhile to
117
+ mention that the absence of the Harnack inequality argument is overcome
118
+ by a careful compactness argument, by which both phases, although scaled
119
+ differently, survive at the limit. The latter part is new, to the best of the
120
+ authors’ knowledge, and can be applied to a wider range of problems.
121
+ Our second result is about the almost Lipschitz regularity for local (1+ε)-
122
+ minimizers for the functional Jp,q, when |p − q| ≪ 1 and ε ≪ 1.
123
+ Theorem 1.3. Let 1 < p+ < ∞ and σ ∈ (0, 1) be given.
124
+ Then there
125
+ exist ε, δ > 0, depending only on n, p+ and σ, such that for any p− ∈
126
+ (p+−δ, p+ +δ) and any local (1+ε)-minimizer u ∈ W 1,p+∧p−(Q2) of Jp+,p−,
127
+ one has u± ∈ C0,σ±(Q1), with σ+ = σ, σ− = 1 − (1 − σ)p−
128
+ p+ , and
129
+ [u]C0,σ±(Q1) ≤ c
130
+ �ˆ
131
+ Q2
132
+ ((u+)p± + (u−)p−) dx
133
+ � 1
134
+ p± ,
135
+ where c depends only on n, p+ and σ.
136
+ A similar statement is proved in [AT15] for uniformly elliptic function-
137
+ als when governing conductivity matrices are close with each other; [AT15]
138
+ however considers local minimizers (i.e., ε = 0) only. Our problem is philo-
139
+ sophically the same, as the limit case is clean, thus possess better regularity.
140
+ On the technical level, our argument is needs slight more care than that
141
+ of [AT15, Theorem 7.1], as the proof for the growth of the functional Jp,q
142
+ changes as (p, q) varies. Moreover, one needs to make sure that the argument
143
+ works well regardless of the relation between p (or q) and the dimension n.
144
+ These are all rigorously treated in Sect. 4.
145
+ Recently, free boundaries for almost minimizers are investigated in various
146
+ settings, see e.g., [DET19], [DS20], and [DJS22] to mention a few. There
147
+ is a possibility of extending the approach with viscosity solutions employed
148
+ in [DS20], but it is beyond the scope of this paper. It would be already
149
+ interesting to extend the result for the clean case, p = q.
150
+ In [CKS21], the authors analyze the free boundary of local minimizers for
151
+ Jp,q, using the measure ∆pu+, which is nonnegative and supported on the
152
+ free boundary, ∂{u > 0}(=∂{u < 0}). This is mainly due to the subsolu-
153
+ tion property of u+, which is no longer valid for almost minimizers. The
154
+ same issue appears in the case of the two-phase Alt-Caffarelli functional
155
+ (see [DET19, Section 4]), which is resolved by the NTA property of the free
156
+ boundary and a clever use of barriers. The NTA property was obtained
157
+ there by the use of the ACF monotonicity formula, which is absent in our
158
+
159
+ 4
160
+ SUNGHAN KIM AND HENRIK SHAHGHOLIAN
161
+ regime. The construction of the barriers and the comparison with the al-
162
+ most minimizers require some regularity of the free boundary, which in the
163
+ case of [DET19] was the NTA property. However, in our problem, none of
164
+ these seems to be analogously carried out. For this reason, we leave out the
165
+ analysis of the free boundary for our almost minimizers to the interested
166
+ reader.
167
+ The paper is organized as follows. In Section 2, we collect some technical
168
+ tools to prepare the proof of Theorem 1.2. In Section 3, we prove Theorem
169
+ 1.2. In Section 4, we prove Theorem 1.3.
170
+ We follow the standard notation and terminology. In particular, n denotes
171
+ the dimension of the underlying space, and there is no restriction other than
172
+ n ≥ 1. By Qr(x0), we denote the cube centered at x0 with side-length r,
173
+ i.e., Qr(x0) := {x ∈ Rn : |xi − x0i| < r, 1 ≤ i ≤ n}. For simplicity, we set
174
+ Qr := Qr(0). Given a set A ⊂ Rn, by |A| we denote the Lebesgue measure
175
+ of A. The function spaces C0,σ and W 1,p are standard H¨older and Sobolev
176
+ spaces, and C0,σ
177
+ loc , W 1,p
178
+ loc are their local versions.
179
+ 2. Technical Tools
180
+ In this section, we shall present and verify some technical tools, most of
181
+ which generalize those appeared in [CKS21, Sect. 4–5]. The main goal of
182
+ this section is to prove the following proposition, which roughly tells us that
183
+ negative values cannot penetrate the interior if a local (1 + ε)-minimizer
184
+ attains large positive values in most of the domain.
185
+ Let us remark that
186
+ this proposition corresponds to [CKS21, Proposition 5.2] for the case of
187
+ minimizers.
188
+ The main difference here is that (1 + ε)-minimizers do not
189
+ possess in general the subsolution properties. Here we exploit the techniques
190
+ to circumvent this issue. Unless stated otherwise, the constant c throughout
191
+ this section is a positive constant that may differ at each occurrence, and
192
+ will depend at most on n, p, and q. Moreover, the parameter ε will be a
193
+ small constant, whose smallness is determined solely by n, p, and q.
194
+ Proposition 2.1. There exist ε > 0 and µ > 0, depending only on n, p, and
195
+ q, such that if u ∈ W 1,p∧q(Q1) is a local (1 + ε)-minimizer of the functional
196
+ J, satisfyingˆ
197
+ Q1
198
+ ((u+)p + (u−)q) dx ≤ 1,
199
+ |{u ≤ 1/2} ∩ Q1| ≤ ε,
200
+ then u > 0 a.e. in Qµ.
201
+ The proof for this proposition will be postponed to the end of this section.
202
+ Let us begin with the Cacciopoli-type inequality.
203
+ Lemma 2.2. Let u ∈ W 1,p∧q(Q2) be a local (1 + ε)-minimizer of the func-
204
+ tional J. There exists ¯ε ∈ (0, 1), depending only on n, p, and q, such that if
205
+ ε ≤ ¯ε, then
206
+ (2.1)
207
+ ˆ
208
+ Q1
209
+ |Du+|p dx ≤ c
210
+ ˆ
211
+ Q2
212
+ ((u+)p + ε(u−)q) dx,
213
+
214
+ 5
215
+ where c depends only on n, p, and q.
216
+ Proof. Fix r, R with 1 < r < R < 2, and choose any s, t with r < s < t < R.
217
+ Let η ∈ C1
218
+ c (Qt) be a cutoff function such that η ≡ 1 in Qs, |Dη| ≤
219
+ 2c
220
+ t−s in
221
+ Qt, and spt(η) ⊂ Q(t+s)/2. Set w := (1 − η)u+ − u− ∈ W 1,p∧q(Qt). Since
222
+ w+ = (1 − η)u+, w− = u−, and spt(u − w) ⊂ spt(η) ⊂ Q(t+s)/2, we derive
223
+ from the (1 + ε)-minimizerslity of u for Jp,q in Qt that
224
+ ˆ
225
+ Qr
226
+ |Du+|p dx ≤ (1 + ε)
227
+ ˆ
228
+ Qt
229
+ |D((1 − η)u+)|p dx + ε
230
+ ˆ
231
+ Qt
232
+ |Du−|q dx.
233
+ Applying H¨older’s inequality and Young’s inequality, and then using spt(η) ⊂
234
+ Q(t+s)/2 and |Dη| ≤ c/(t − s), we deduce that
235
+ ˆ
236
+ Qs
237
+ |Du+|p dx ≤ c
238
+ ˆ
239
+ Qt
240
+ � (u+)p
241
+ (t − s)p + ε|Du−|q
242
+
243
+ dx + cε
244
+ ˆ
245
+ Qt
246
+ |Du+|p dx.
247
+ Since this part is by now standard, we omit the details. Note that the last
248
+ display holds for all s, t, r < s < t < R. Hence, choosing ε small enough such
249
+ that cε < 1
250
+ 2, we can employ the standard iteration lemma [Giu03, Lemma
251
+ 6.1] to derive that
252
+ (2.2)
253
+ ˆ
254
+ Qr
255
+ |Du+|p dx ≤ c
256
+ ˆ
257
+ QR
258
+ � (u+)p
259
+ (R − r)p + ε|Du−|q
260
+
261
+ dx.
262
+ Now replace QR in the right-hand side with Q(R+r)/2, and then apply
263
+ the same argument above to (−u) with Qr replaced with Q(R+r)/2; note
264
+ that (−u) is a local (1 + ε)-minimizer of Jq,p in place of Jp,q. Then we may
265
+ proceed as follows,
266
+ ˆ
267
+ Qr
268
+ |Du+|p dx ≤ c
269
+ ˆ
270
+ Q(R+r)/2
271
+ � (u+)p
272
+ (R − r)p + ε|Du−|q
273
+
274
+ dx
275
+ ≤ c
276
+ ˆ
277
+ QR
278
+ � (u+)p
279
+ (R − r)p + cε (u−)q
280
+ (R − r)q
281
+
282
+ dx + c2ε2
283
+ ˆ
284
+ QR
285
+ |Du+|p dx.
286
+ Recall that r, R were any numbers between 1 and 2. Hence, taking ε smaller
287
+ if necessary such that c2ε2 < 1
288
+ 2, we can make use of the iteration lemma
289
+ once again to arrive at (2.1).
290
+
291
+ Remark 2.3. In what follows, we shall always assume that ε < ¯ε, with ¯ε
292
+ as in Lemma 2.2.
293
+ Let us remark that the above Cacciopoli inequality is too weak to bring
294
+ forth a local L∞-estimate. Besides, local quasi-minimizers are not neces-
295
+ sarily bounded, even for functionals under standard growth condition (of
296
+ course, only if p ≤ n). Nevertheless, with the aid of the Cacciopoli inequal-
297
+ ity above, we shall observe that the blowup rate of local (1 + ε)-minimizers
298
+ can be made arbitrarily small, for small ε, in case p ≤ n.
299
+
300
+ 6
301
+ SUNGHAN KIM AND HENRIK SHAHGHOLIAN
302
+ Lemma 2.4. Let u ∈ W 1,p∧q(Q1) be a local (1 + ε)-minimizer of the func-
303
+ tional J. Suppose that
304
+ ∥u+∥Lp(Q1) ≤ 1,
305
+ sup
306
+ r∈(0,1)
307
+ ∥u−∥Lq(Qr)
308
+ r1− p
309
+ q ∥u+∥
310
+ p
311
+ q
312
+ Lp(Qr)
313
+ ≤ κ,
314
+ for some constant κ > 0. Then for any δ > 0, there exists a positive constant
315
+ εκ,δ, depending only on n, p, q, κ and δ, such that if ε ≤ εκ,δ, then
316
+ sup
317
+ r∈(0,1)
318
+ 1
319
+ rn−δp
320
+ ˆ
321
+ Qr
322
+ (u+)p dx ≤ cκ,δ,
323
+ where cκ,δ depends only on n, p, q, Λ, δ and κ.
324
+ Proof. We remark that the conclusion is trivial for p > n, due to the Sobolev
325
+ embedding theorem. Henceforth, we shall assume that 1 < p ≤ n.
326
+ Let κ and δ be arbitrary positive constants, and suppose the conclusion
327
+ of the lemma is false. Then for each j = 1, 2, · · · , one can find some positive
328
+ constant εj ց 0, and a local (1 + εj)-minimizer uj ∈ W 1,p∧q(Q1) of the
329
+ functional J, such that
330
+ ∥u+
331
+ j ∥Lp(Q1) ≤ 1,
332
+ sup
333
+ r∈(0,1)
334
+ ∥u−
335
+ j ∥Lq(Qr)
336
+ r1− p
337
+ q ∥u+
338
+ j ∥
339
+ p
340
+ q
341
+ Lp(Qr)
342
+ ≤ κ,
343
+ but
344
+ Sj =
345
+ sup
346
+ rj≤r≤1
347
+ 1
348
+ rn−δp
349
+ ˆ
350
+ Qr
351
+ (u+
352
+ j )p dx → ∞,
353
+ for some constant rj ∈ (0, 1). In order to have Sj → ∞ to be compatible
354
+ with ∥u+
355
+ j ∥Lp(Q1) = 1, we must have rj → 0.
356
+ Consider an auxiliary function vj : Qr−1
357
+ j
358
+ → R, defined by
359
+ vj(y) =
360
+ u+
361
+ j (rjy)
362
+ r
363
+ − n
364
+ p
365
+ j
366
+ ∥u+
367
+ j ∥Lp(Qrj )
368
+
369
+ u−
370
+ j (rjy)
371
+ r
372
+ 1− p
373
+ q − n
374
+ q
375
+ j
376
+ ∥u+
377
+ j ∥
378
+ p
379
+ q
380
+ Lp(Qrj )
381
+ .
382
+ One easily verifies that vj ∈ W 1,p∧q(Qr−1
383
+ j ) is a local (1 + εj)-minimizer of
384
+ the functional J, and
385
+ (2.3)
386
+ sup
387
+ 1≤R≤r−1
388
+ j
389
+ 1
390
+ Rn−δp
391
+ ˆ
392
+ QR
393
+ (v+
394
+ j )p dy = 1,
395
+ where the supremum is attained at R = 1, and
396
+ (2.4)
397
+ sup
398
+ 1≤R≤r−1
399
+ j
400
+ 1
401
+ Rn+q−(1+δ)p
402
+ ˆ
403
+ QR
404
+ (v−
405
+ j )q dy ≤ κq.
406
+ Due to Lemma 2.2, along with (2.3) and (2.4),
407
+ (2.5)
408
+ ˆ
409
+ QR
410
+ (|Dv+
411
+ j |p + |Dv−
412
+ j |q) dx ≤ cRn−(1+δ)p,
413
+
414
+ 7
415
+ where c depends only on n, p and q, whenever 2Rrj ≤ 1. By the Sobolev em-
416
+ bedding theory, there exists a function v ∈ W 1,p∧q
417
+ loc
418
+ (Rn) with v+ ∈ W 1,p
419
+ loc (Rn)
420
+ and v− ∈ W 1,q
421
+ loc (Rn) such that v+
422
+ j → v+ and v−
423
+ j → v−
424
+ j weakly in W 1,p
425
+ loc (Rn)
426
+ and respectively W 1,q
427
+ loc (Rn), after extracting a subsequence if necessary; we
428
+ shall denote this subsequence by vj, for brevity. The weak convergence im-
429
+ plies that v ∈ W 1,p∧q(BR) is a minimizer of the functional J. Since v+
430
+ j → v+
431
+ strongly in Lp(BR) and v−
432
+ j → v− strongly in Lq(BR), letting j → ∞ in (2.3)
433
+ yields that
434
+ (2.6)
435
+ sup
436
+ R≥1
437
+ 1
438
+ Rn−δp
439
+ ˆ
440
+ QR
441
+ (v+)p dy = 1.
442
+ However, since v is a minimizer of the functional J, by [CKS21, Lemma
443
+ 3.4], v+ is a weak p-subsolution. As a result, the local L∞-estimates [Giu03,
444
+ Theorem 7.3] applies to v+, which along with (2.6) yields
445
+ ∥v+∥L∞(QR) ≤ c
446
+ Rδ .
447
+ Hence, letting R → ∞ yields that v+ = 0 a.e. in Rn. This yields a contra-
448
+ diction against (2.6).
449
+
450
+ We also have a growth estimate for the p-th Dirichlet energy of the positive
451
+ phase. The idea is the same as in [CKS21, Lemma 4.5], which is based on
452
+ some approximation by positive p-harmonic functions of the positive phase
453
+ of local quasi-minimizers, in terms of the size of the negative phase.
454
+ Lemma 2.5. Let u ∈ W 1,p∧q
455
+ loc
456
+ (Q2) be a local (1 + ε)-minimizer of the func-
457
+ tional J, and v ∈ u+ + W 1,p
458
+ 0 (Q1) be the p-harmonic function. Then
459
+ 0 ≤
460
+ ˆ
461
+ Q1
462
+ (|Du+|p − |Dv|p) dx ≤ c
463
+ ˆ
464
+ Q2
465
+ ((u−)q + ε|Du+|p) dx,
466
+ and
467
+ ˆ
468
+ Qr
469
+ |Du+|p dx ≤ c
470
+ ˆ
471
+ Q1
472
+ ((rn + ε)|Du+|p + (u−)q) dx,
473
+ ∀r ∈ (0, 1),
474
+ where c depends only on n, p and q.
475
+ Proof. The proof is essentially the same as that of [CKS21, Lemma 4.5].
476
+ The additional term ε
477
+ ´
478
+ Q2 |Du+|p dx appears due to the different Cacciopoli
479
+ inequality; more exactly, we use (2.2) with u replaced with −u. We shall
480
+ not repeat this argument here.
481
+
482
+ The following lemma corresponds to [CKS21, Lemma 4.8]. The key in-
483
+ gredient of the proof there is the Poincar´e inequality, and Lemma 2.5, which
484
+ corresponds to [CKS21, Lemma 4.5]. As noted above, Lemma 2.5 differs
485
+ from [CKS21, Lemma 4.5] by the additional term, ε
486
+ ´
487
+ Q2 |Du+|p dx. How-
488
+ ever, this does not make any difference in the proof of the lemma below.
489
+ Thus, we shall skip the proof.
490
+
491
+ 8
492
+ SUNGHAN KIM AND HENRIK SHAHGHOLIAN
493
+ Lemma 2.6 (Essentially due to [CKS21, Lemma 4.8]). Let u ∈ W 1,p∧q(Q4)
494
+ be a local 2-minimizer for the functional J, satisfying
495
+ ˆ
496
+ Q4
497
+ (u+)p dx = 1,
498
+ ˆ
499
+ Q4
500
+ ((u−)q + |Du+|p) dx ≤ ε,
501
+ for some ε > 0. Then
502
+ |{u ≤ 1/2} ∩ Q1| ≤ cε,
503
+ where c depends only on n, p and q.
504
+ Let us prove Proposition 2.1 with additional assumptions that ∥u−∥Lq(Q1)
505
+ and ∥Du+∥Lp(Q!) are sufficiently small. The proof follows the idea of that
506
+ of [CKS21, Lemma 5.5], with some modifications addressing the lack of
507
+ subsolution properties of each phase.
508
+ Lemma 2.7. There exists ε > 0, depending only on n, p and q, such that if
509
+ u ∈ W 1,p∧q(Q4) is a local (1 + ε)-minimizer of the functional J, satisfying
510
+ ˆ
511
+ Q4
512
+ (u+)p dx = 1,
513
+ ˆ
514
+ Q4
515
+ ((u−)q + |Du+|p) dx ≤ ε,
516
+ then u > 0 a.e. in Q1.
517
+ Proof. Let us consider the case q < n first. Following the proof of [CKS21,
518
+ Lemma 4.3], we obtain that for σ ∈ (0, 1),
519
+ (2.7)
520
+ ˆ
521
+ Qr
522
+ �(u−)q
523
+ rq
524
+ + |Du+|p
525
+
526
+ dx ≤ cεr−(1−σ)p
527
+ ˆ
528
+ Qr
529
+ (u+)p dx,
530
+ ∀r ∈ (0, 1),
531
+ where c depends only on n, p, q and σ. The proof is essentially the same,
532
+ as Lemma 2.5 and 2.6 replace [CKS21, Lemma 3.5–3.7], which are the key
533
+ ingredients of the proof there; moreover Lemma 2.2 replaces the usual Cac-
534
+ ciopoli inequality for weak q-subsolutions. These lemmas have additional
535
+ ε-term, which arise from the (1 + ε)-local minimizerslity of u, but this does
536
+ not contribute any major difference from the proof for [CKS21, Lemma 4.3].
537
+ Hence, we shall omit the details.
538
+ We observe that due to (2.7) (as well as the assumption
539
+ ´
540
+ Q4(u+)p dx = 1),
541
+ the hypothesis of Lemma 2.4 is satisfied (with κ = 1 > εrσp). Thus, choosing
542
+ ε ≤ εδ with εδ as in Lemma 2.4 with δ < σ, we deduce
543
+ (2.8)
544
+ ˆ
545
+ Qr
546
+ (u+)p dx ≤ cr−δp,
547
+ ∀r ∈ (0, 1).
548
+ Inserting (2.8) into (2.7) yields that
549
+ (2.9)
550
+ ˆ
551
+ Qr
552
+ |Du+|p dx ≤ cεr−(1−(σ−δ))p,
553
+ ∀r ∈ (0, 1);
554
+ now c depends only on n, p, q, σ and δ. Let us remark that this step does
555
+ not appear for the case of minimizers [CKS21, Lemma 4.3] because for the
556
+ latter case we can use the subsolution property [CKS21, Lemma 3.4] for u+
557
+ to obtain its local boundedness.
558
+
559
+ 9
560
+ The growth estimate in (2.9) is obtained by choosing ε sufficiently small.
561
+ Taking ε even smaller if necessary, we may repeat the above argument
562
+ around any point z ∈ Q1, and obtain
563
+ ˆ
564
+ Qr(z)
565
+ |Du+|p dx ≤ cεr−(1−(σ−δ))p,
566
+ ∀r ∈ (0, 1), ∀z ∈ Q1,
567
+ possibly with a larger constant c. Therefore, by Morrey’s lemma, we deduce
568
+ that u+ ∈ C0,σ−δ(Q1) and
569
+ (2.10)
570
+ [u+]C0,σ−δ(Q1) ≤ cε
571
+ 1
572
+ p .
573
+ Finally, by Lemma 2.6, |{u ≤ 1
574
+ 2} ∩ Q1| ≤ cε. Hence, with cε ≤ 2−2n−1, we
575
+ have |{u > 1
576
+ 2} ∩ Q1| > 0, which now implies via (2.10) that
577
+ inf
578
+ Q1 u+ ≥ 1
579
+ 2 − cε
580
+ 1
581
+ p > 0,
582
+ provided that we choose ε even smaller. Note that the smallness condition
583
+ for ε at this stage can be determined solely by n, p and q, by for instance
584
+ selecting σ = 1
585
+ 2 and δ = 1
586
+ 4. This finishes the proof for the case q < n.
587
+ The case for q ≥ n can be treated similarly, following the proof of [CKS21,
588
+ Lemma 4.3]; we omit the details.
589
+
590
+ We are ready to prove Proposition 2.1.
591
+ Proof of Proposition 2.1. Let ¯ε be as in Lemma 2.7, and suppose that cε ≤ ¯ε.
592
+ Using |{u ≤ 1
593
+ 2} ∩ Q1| ≤ ε, we may follow the proof of [CKS21, Proposition
594
+ 4.2] to find a constant ρ, depending only on n, p and q, such that
595
+ (2.11)
596
+ ˆ
597
+ Q4ρ
598
+ �(u−)q
599
+ ρq
600
+ + |Du+|p
601
+
602
+ dx ≤ cερq−p
603
+ ˆ
604
+ Q4ρ
605
+ (u+)p dx.
606
+ Therefore, defining uρ : Q4 → R by
607
+ uρ(x) =
608
+ u+(ρx)
609
+ (4ρ)− n
610
+ p ∥u+∥Lp(Q4ρ)
611
+
612
+ u−(ρx)
613
+ 4− n
614
+ q ρ1− p
615
+ q − n
616
+ q ∥u+��
617
+ p
618
+ q
619
+ Lp(Q4ρ)
620
+ ,
621
+ we see that uρ ∈ W 1,p∧q(Q4) is a local (1 + ε)-minimizer of the functional
622
+ J, such that
623
+ ˆ
624
+ Q4
625
+ (u+
626
+ ρ )p dx = 1,
627
+ ˆ
628
+ Q4
629
+ ((u−
630
+ ρ )q + |Du+
631
+ ρ |p) dx ≤ cε.
632
+ Since cε ≤ ¯ε, with ¯ε as in Lemma 2.6, we obtain
633
+ uρ > 0
634
+ a.e. in Q1.
635
+ Rescaling back, we obtain that u > 0 a.e. in Q4ρ as desired.
636
+
637
+
638
+ 10
639
+ SUNGHAN KIM AND HENRIK SHAHGHOLIAN
640
+ 3. H¨older regularity
641
+ In this section, we study the universal H¨older regularity of local (1 + ε)-
642
+ minimizers for the functional Jp,q, and prove our first main result, Theorem
643
+ 1.2. Let us begin with a lemma that tells us how each phase of local mini-
644
+ mizers for the functional Jp,q should scale relatively to one another.
645
+ Lemma 3.1. Let u ∈ W 1,p∧q(Q1) be a local minimizer of the functional J,
646
+ such that ∥u+∥Lp(Q1) = 1 and u(0) = 0. If ∥u+∥Lp(Q1/2) ≥ β for some β > 0,
647
+ then ∥u−∥Lq(Q1) ≥ cβ, for some positive constant cβ depending only on n,
648
+ p, q and β.
649
+ Proof. Let β be any constant, with 0 < β < 1. Assume by way of contradic-
650
+ tion that there exists a minimizer uj ∈ W 1,p∧q(Q1) of the functional J, such
651
+ that ∥u+
652
+ j ∥Lp(Q1) = 1, ∥u+
653
+ j ∥Lp(Q1/2) ≥ β, uj(0) = 0 but ∥u−
654
+ j ∥Lq(Q1) ≤ 1
655
+ j . By
656
+ [CKS21, Theorem 1.1], uj ∈ C0,σ(Q1/2) and ∥u+
657
+ j ∥C0,σ(Q1/2) ≤ c∥u+
658
+ j ∥Lp(Q1) ≤
659
+ c, and similarly, ∥u−
660
+ j ∥C0,σ(Q1/2) ≤ c
661
+ j, where both c and σ depend only on n, p
662
+ and q. This together with the Cacciopoli inequality (Lemma 2.2 with ε = 0)
663
+ implies that u+
664
+ j → u0 weakly in W 1,p(Q1/2) and uniformly in Q1/2, while
665
+ u−
666
+ j → 0 weakly in W 1,q(Q1/2) and uniformly in Q1/2, for some nonnegative
667
+ function u0 ∈ W 1,p(Q1/2). The uniform convergence along with uj(0) = 0
668
+ implies that u0(0) = 0. In addition, passing to the limit in ∥u+
669
+ j ∥Lp(Q1/2) ≥ β
670
+ ensures that ∥u0∥Lp(Q1/2) ≥ β. However, the weak convergence of the gradi-
671
+ ent of uj implies that u0 is also a minimizer of the functional J. As u0 ≥ 0
672
+ in Q1/2, u0 is a p-harmonic function, but then it violates the minimizer
673
+ principle, as ∥u0∥Lp(Q1/2) ≥ β > 0.
674
+
675
+ Lemma 3.2. Let u ∈ W 1,p∧q(Q1) be a local minimizer of the functional J,
676
+ such that
677
+ ∥u+∥Lp(Q1) ≤ 1,
678
+ u(0) = 0,
679
+ sup
680
+ 0<r<1
681
+ 1
682
+ rn+σ−q
683
+ ˆ
684
+ Qr
685
+ (u−)q dx ≤ c−,
686
+ for some constants c− > 0 and σ− ∈ (0, 1]. Then with σ+ = 1 − (1 − σ−) q
687
+ p,
688
+ sup
689
+ 0<r<1
690
+ 1
691
+ rn+σ+p
692
+ ˆ
693
+ Qr
694
+ (u+)p dx ≤ c+,
695
+ where c+ depends only on n, p, q, σ− and c−.
696
+ Proof. Let c−, σ− be given, and set σ+ as in the statement. Suppose that
697
+ the conclusion of this lemma is false. Then for each j ∈ N, one can find a
698
+ minimizer uj ∈ W 1,p∧q(Q1) for the functional J, such that
699
+ (3.1)
700
+ ˆ
701
+ Q1
702
+ (u+
703
+ j )p dx ≤ 1,
704
+ uj(0) = 0,
705
+ sup
706
+ 0<r<1
707
+ 1
708
+ rn+σ−q
709
+ ˆ
710
+ Qr
711
+ (u−
712
+ j )q dx ≤ c−,
713
+ but
714
+ (3.2)
715
+ Sj :=
716
+ sup
717
+ rj
718
+ 2 ≤r≤1
719
+ 1
720
+ rn+σ+p
721
+ ˆ
722
+ Qr
723
+ (u+
724
+ j )p dx → ∞
725
+
726
+ 11
727
+ where the supremum is achieved at r = 1
728
+ 2rj; since ∥u+
729
+ j ∥Lp(Q1) ≤ 1, we must
730
+ have rj → 0. Define
731
+ vj(y) :=
732
+ u+
733
+ j (rjy)
734
+ r
735
+ − n
736
+ p
737
+ j
738
+ ∥u+
739
+ j ∥Lp(Qrj )
740
+
741
+ u−
742
+ j (rjy)
743
+ r
744
+ 1− p
745
+ q − n
746
+ q
747
+ j
748
+ ∥u+
749
+ j ∥
750
+ p
751
+ q
752
+ Lp(Qrj )
753
+ .
754
+ Then vj is a local minimizer of the functional J, such that by (3.1) and (3.2),
755
+ ∥v+
756
+ j ∥Lp(Q1) = 1, ∥v+
757
+ j ∥Lp(Q1/2) ≥ 2−σ+ and vj(0) = 0. Therefore, Lemma 3.1
758
+ yields that ∥v−
759
+ j ∥Lq(Q1) ≥ cσ+. This implies that
760
+ (3.3)
761
+ 1
762
+ rn
763
+ j
764
+ ˆ
765
+ Qrj
766
+ (u−
767
+ j )q dx ≥ cq
768
+ σ+rq−p
769
+ j
770
+ ˆ
771
+ Qrj
772
+ (u+
773
+ j )p dx ≥
774
+ S
775
+ q
776
+ p
777
+ j cq
778
+ σ+
779
+ 2σ+q rq−p+σ+p
780
+ j
781
+ .
782
+ Putting (3.1) and (3.3) together, and recalling that σ+ = 1 − (1 − σ−) q
783
+ p,
784
+ cq
785
+ σ− ≥
786
+ S
787
+ q
788
+ p
789
+ j cq
790
+ σ+
791
+ 2σ+q ,
792
+ a contradiction to the assumption that Sj → ∞.
793
+
794
+ Thanks to the above lemma, we can prove Theorem 1.2 for minimizers of
795
+ the functional J.
796
+ Proof of Theorem 1.2 for minimizers. It suffices to consider the case p > q,
797
+ and
798
+ ˆ
799
+ Q1
800
+ ((u+)p + (u+)q) dx = 1.
801
+ By [CKS21, Theorem 1.1], we already know that u ∈ C0,σ(Q1) and that
802
+ [u]C0,σ(Q1) ≤ c, where both c > 0 and σ ∈ (0, 1) depend only on n, p and q.
803
+ Hence, if u(z) = 0 at some z ∈ Q1/2, then
804
+ sup
805
+ 0<r< 1
806
+ 2
807
+ 1
808
+ rn+σq
809
+ ˆ
810
+ Qr(z)
811
+ (u−)q dx ≤ c,
812
+ which along with Lemma 3.2 implies that
813
+ sup
814
+ 0<r< 1
815
+ 2
816
+ 1
817
+ rn+p−q+σq
818
+ ˆ
819
+ Qr(z)
820
+ (u+)p dx ≤ c,
821
+ where the constant c in both displays depends only on n, p and q. Since
822
+ p > q, 1 − (1 − σ) q
823
+ p > σ > 0. Now setting σ− = σ and σ+ = 1 − (1 − σ) q
824
+ p,
825
+ we immediately verify the relation required between σ+ and σ−. Since the
826
+ above growth estimates hold uniformly around all z ∈ {u = 0} ∩ Q1, and
827
+ since ∆pu = 0 in {u > 0}∩Q1 and ∆qu = 0 in {u < 0}∩Q1, one may arrive
828
+ at the conclusion via some standard manipulation. We skip the detail.
829
+
830
+
831
+ 12
832
+ SUNGHAN KIM AND HENRIK SHAHGHOLIAN
833
+ Given a measurable function u : Ω → R, define D+(u), D−(u) and Γ(u)
834
+ by the subset of Ω as follows:
835
+ D+(u) = {z ∈ Ω : u > 0 a.e. in some Qr(z) ⊂ Ω},
836
+ D−(u) = D+(−u),
837
+ and
838
+ Γ(u) = Ω \ (D+(u) ∪ D−(u)).
839
+ By definition, both D+(u) and D−(u) are open and hence Γ(u) is closed
840
+ (relative to the topology of Ω). Moreover, z ∈ Γ(u) if and only if |{u ≥
841
+ 0} ∩ Qr(z)||{u ≤ 0} ∩ Qr(z)| > 0 for any cube Qr(z) ⊂ Ω.
842
+ With Proposition 2.1 at hand, we shall obtain, as a contraposition along
843
+ with Lemma 3.4 below, that if a local (1 + ε)-minimizer vanishes (in an ap-
844
+ propriate Lebesgue sense) at certain point in the interior, then each phase
845
+ exhibits certain universal H¨older growth. More exactly, we assert the fol-
846
+ lowing.
847
+ Proposition 3.3. There exists a constant ¯σ ∈ (0, 1), depending only on
848
+ n, p, and q, for which the following holds: for each σ ∈ (0, ¯σ), one can
849
+ find a constant εσ ∈ (0, 1), depending only on n, p, q, and σ, such that if
850
+ u ∈ W 1,p∧q(Q1) is a local (1 + εσ)-minimizer of the functional J satisfying
851
+ ˆ
852
+ Q1
853
+ ((u+)p + (u−)q) dx ≤ 1,
854
+ 0 ∈ Γ(u),
855
+ then with σ+ = σ and σ− = 1 − (1 − σ)p
856
+ q, one has
857
+ sup
858
+ 0<r<1
859
+
860
+ 1
861
+ rσ+p
862
+ ˆ
863
+ Qr
864
+ (u+)p dx +
865
+ 1
866
+ rσ−q
867
+ ˆ
868
+ Qr
869
+ (u−)q dx
870
+
871
+ ≤ cσ,
872
+ where cσ depends only on n, p, q, and σ.
873
+ The following lemma will play a key role (together with Proposition 2.1).
874
+ Lemma 3.4. There exists a constant ¯σ ∈ (0, 1), depending only on n, p,
875
+ and q, for which the following holds: for each σ ∈ (0, ¯σ) and each τ ∈ (0, 1
876
+ 2],
877
+ one can find εσ,τ ∈ (0, 1), depending only on n, p, q, σ, and τ, such that if
878
+ u ∈ W 1,p∧q(Q1) is a local (1+εσ+,τ)-minimizer of the functional J satisfying,
879
+ (3.4)
880
+ ˆ
881
+ Q1
882
+ ((u+)p + (u−)q) dx = 1,
883
+ |E+(u, Qr)|
884
+ |Qr|
885
+ ∧ |E−(u, Qr)|
886
+ |Qr|
887
+ ≥ τ,
888
+ for some r ∈ (0, 1), where
889
+ E+(u, Qr) =
890
+
891
+ u ≤ 1
892
+ 2rΛ(u, Qr)
893
+ 1
894
+ p
895
+
896
+ ,
897
+ E−(u, Qr) =
898
+
899
+ u ≥ −1
900
+ 2rΛ(u, Qr)
901
+ 1
902
+ q
903
+
904
+ ,
905
+ Λ(u, Qr) =
906
+ ˆ
907
+ Qr
908
+ �(u+)p
909
+ rp
910
+ + (u−)q
911
+ rq
912
+
913
+ dx,
914
+
915
+ 13
916
+ then with σ+ = σ and σ− = 1 − (1 − σ)p
917
+ q, one has
918
+ sup
919
+ r≤ρ≤1
920
+
921
+ 1
922
+ ρσ+p
923
+ ˆ
924
+
925
+ (u+)p dx +
926
+ 1
927
+ ρσ−q
928
+ ˆ
929
+
930
+ (u−)q dx
931
+
932
+ ≤ cσ,τ,
933
+ where cσ,τ depends on the same parameters that determine εσ,τ.
934
+ Proof. Let ¯σ be determined later, and fix τ ∈ (0, 1
935
+ 2], σ ∈ (0, ¯σ), and set σ±
936
+ as in the stastement. Suppose by way of contradiction that for each j ∈ N,
937
+ we can find some positive constant εj → 0, some local (1 + εj)-minimizer
938
+ uj ∈ W 1,p∧q(Q1) of the functional J, and a radius rj ∈ (0, 1) such that
939
+ (3.5)
940
+ ˆ
941
+ Q1
942
+ ((u+
943
+ j )p + (u−
944
+ j )q) dx ≤ 1,
945
+ |E+(uj, Qrj)|
946
+ |Qrj|
947
+ ∧ |E−(uj, Qrj)|
948
+ |Qrj|
949
+ ≥ τ, ,
950
+ but
951
+ (3.6)
952
+ Sj =
953
+ sup
954
+ rj≤r≤1
955
+
956
+ 1
957
+ rσ+p
958
+ ˆ
959
+ Qr
960
+ (u+
961
+ j )p dx +
962
+ 1
963
+ rσ−q
964
+ ˆ
965
+ Qr
966
+ (u−
967
+ j )q dx
968
+
969
+ → ∞,
970
+ with the supremum achieved at level r = rj. In order for (3.6) to be com-
971
+ patible with the first equality in (3.5), we must have rj → 0.
972
+ Define vj : Qr−1
973
+ j
974
+ → R by
975
+ vj(y) =
976
+ u+
977
+ j (rjy)
978
+ S
979
+ 1
980
+ p
981
+ j rσ+
982
+ j
983
+
984
+ u−
985
+ j (rjy)
986
+ S
987
+ 1
988
+ q
989
+ j rσ−
990
+ j
991
+ .
992
+ By the way that it is rescaled, vj is a local (1+εj)-minimizer of the functional
993
+ J in Q1/rj. Moreover, by (3.5) along with the relation Sjrσ+p
994
+ j
995
+ = Λjrp
996
+ j and
997
+ Sjrσ−q
998
+ j
999
+ = Λjrq
1000
+ j, where Λj = Λ(uj, Qrj),
1001
+ (3.7)
1002
+ ����
1003
+
1004
+ |vj| ≤ 1
1005
+ 2
1006
+
1007
+ ∩ Q1
1008
+ ���� ≥ τ,
1009
+ and by (3.6),
1010
+ (3.8)
1011
+ sup
1012
+ 1≤R≤r−1
1013
+ j
1014
+
1015
+ 1
1016
+ Rσ+p
1017
+ ˆ
1018
+ QR
1019
+ (v+
1020
+ j )p dy +
1021
+ 1
1022
+ Rσ−q
1023
+ ˆ
1024
+ QR
1025
+ (v−
1026
+ j )q dy
1027
+
1028
+ = 1,
1029
+ where the supremum is achieved at R = 1.
1030
+ Thanks to (3.7) and (3.8), one can argue analogously in the proof of
1031
+ Lemma 2.4 to obtain a minimizer v ∈ W 1,p∧q
1032
+ loc
1033
+ (Rn) of the functional J, with
1034
+ v+ ∈ W 1,p
1035
+ loc (Rn) and v− ∈ W 1,q
1036
+ loc (Rn) such that
1037
+ (3.9)
1038
+ ����
1039
+
1040
+ |v| ≤ 1
1041
+ 2
1042
+
1043
+ ∩ Q1
1044
+ ���� ≥ τ,
1045
+ and
1046
+ (3.10)
1047
+ sup
1048
+ R≥1
1049
+
1050
+ 1
1051
+ Rσ+p
1052
+ ˆ
1053
+ QR
1054
+ (v+)p dy +
1055
+ 1
1056
+ Rσ−q
1057
+ ˆ
1058
+ QR
1059
+ (v−)q dy
1060
+
1061
+ = 1,
1062
+
1063
+ 14
1064
+ SUNGHAN KIM AND HENRIK SHAHGHOLIAN
1065
+ where the supremum is achieved at R = 1. In particular, the latter obser-
1066
+ vation indicates that v is nontrivial.
1067
+ At this point, we choose ¯σ as the positive exponent for Theorem 1.2 for
1068
+ minimizers; let us remind the readers that the statement for minimizers is
1069
+ proved right after the proof of Lemma 3.2. Set ¯σ+ := ¯σ and ¯σ− := 1 − (1 −
1070
+ ¯σ) q
1071
+ p. As v is a local minimizer of the functional J in Q2R, v+ ∈ C0,¯σ+(QR),
1072
+ v− ∈ C0,¯σ−(QR) and then by (3.10), we derive that
1073
+ [v+]p
1074
+ C0,¯σ+(QR) + [v−]q
1075
+ C0,¯σ−(QR) ≤
1076
+ c
1077
+ R(¯σ+−σ+)p +
1078
+ c
1079
+ R(¯σ−−σ−)q ,
1080
+ for any R > 1. As σ+ = σ < ¯σ+ and σ− = 1 − (1 − σ) q
1081
+ p < ¯σ−, sending
1082
+ R → ∞ implies that both v+ and v− must be constant. Then by (3.9),
1083
+ |v| ≤ 1
1084
+ 2 everywhere in Q1, whence
1085
+ ´
1086
+ Q1((v+)p + (v+)q) dx ≤ 2−p + 2−q < 1, a
1087
+ contradiction to the observation that the supremum in (3.10) is attained at
1088
+ R = 1.
1089
+
1090
+ We are ready to prove Proposition 3.3
1091
+ Proof of Proposition 3.3. As 0 ∈ Γ(u), there are three cases to consider: (i)
1092
+ |{u > 0} ∩ Qρ||{u < 0} ∩ Qρ| > 0 for all ρ ∈ (0, 1), (ii) u ≥ 0 a.e. in Qρ
1093
+ for some small ρ > 0, and (iii) u ≤ 0 a.e. in Qρ for some small ρ > 0. The
1094
+ last two cases are symmetric, and in those cases u becomes a local (1 + ε)-
1095
+ minimizer for the functional Jp,p, or Jq,q depending on its sign. Thus, the
1096
+ growth estimate follows easily, once we establish the estimate for the first
1097
+ case. We leave out this part as an exercise for the reader.
1098
+ Henceforth, let us assume that the first case holds. Let (ε, τ, µ) be the
1099
+ triple of constants from Proposition 2.1 that are determined solely by n, p
1100
+ and q. Fix any r ∈ (0, 1). Since |{u > 0} ∩ Qµr| · |{u < 0} ∩ Qµr| > 0,
1101
+ as a contraposition (applied to both u and −u, after suitable rescaling), we
1102
+ obtain that
1103
+ (3.11)
1104
+ |E+(u, Qr)|
1105
+ |Qr|
1106
+ ∧ |E−(u, Qr)|
1107
+ |Qr|
1108
+ ≥ τ,
1109
+ with E+(u, Qr) and E−(u, Qr) defined as in Lemma 3.4. As τ being a con-
1110
+ stant depending only on n, p and q, the conclusion of this proposition follows
1111
+ immediately from Lemma 3.4; this final step introduces another condition
1112
+ on the size of ε, which through the dependence of τ would be determined
1113
+ again solely by n, p, q, and σ.
1114
+
1115
+ 4. Almost Lipschitz regularity
1116
+ Here we prove almost Lipschitz regularity of almost minimizers to J =
1117
+ Jp,q, when p and q are close. Our proof is based on the compactness argu-
1118
+ ment. The basic ingredient is the universal H¨older estimate for local mini-
1119
+ mizers of the functional Jp,q, see [CKS21, Theorem 1.3]. Although it is not
1120
+ specified in the statement, one can observe from the higher integrability of
1121
+ each phase that the H¨older regularity is uniform when p (or q) is close to n.
1122
+
1123
+ 15
1124
+ We record this fact as a lemma below, as the proof of [CKS21, Theorem 1.3]
1125
+ makes use of the local boundedness and the Harnack inequality for weak p-
1126
+ harmonic functions, and the constants involved in the latter assertions may
1127
+ vary as p → n.
1128
+ Lemma 4.1. Let u ∈ W 1,p+∧p−(Q2) be a local minimizer of Jp+,p−. There
1129
+ exists ¯δ > 0, depending only on n, such that if |n − p±| ≤ ¯δ, then
1130
+ [u±]C0,¯σ(Q1) ≤ ¯c∥u±∥Lp±(Q2),
1131
+ where ¯σ ∈ (0, 1) and ¯c > 1 depend only on n.
1132
+ Proof. Since u is a local minimizer (instead of (1 + ε)-minimizer) of Jp+,p−,
1133
+ u± is a weak p±-subsolution in Q2, according to [CKS21, Lemma 3.4]. Hence,
1134
+ by [GG82, Corollary 4.2], there exist constants ¯δ > 0 and ¯γ ∈ (0, 1), both
1135
+ depending only on n, such that if |p± − n| < ¯δ, then u± ∈ W 1,p±+¯δ(Q1) ⊂
1136
+ W 1,n+¯γ¯δ(Q1). Now setting ¯σ := 1 −
1137
+ n
1138
+ n+¯γ¯δ, it follows from the Sobolev em-
1139
+ bedding, the higher integrability and the Cacciopoli inequality for weak
1140
+ p±-subsolutions that
1141
+ [u±]C0,¯σ(Q1) ≤ c1(n)
1142
+ �ˆ
1143
+ Q1
1144
+ |Du±|n+¯γ¯δ dx
1145
+
1146
+ 1
1147
+ n+¯γ¯δ
1148
+ ≤ c1(n)c2(n, p±)
1149
+ �ˆ
1150
+ Q3/2
1151
+ |Du±|p± dx
1152
+ � 1
1153
+
1154
+ ≤ c1(n)c2(n, p±)c3(n, p±)
1155
+ �ˆ
1156
+ Q2
1157
+ (u±)p± dx
1158
+ � 1
1159
+ p± .
1160
+ Note that c2(n, p±), and c3(n, p±) are constants from the higher integrabil-
1161
+ ity and respectively the Cacciopoli inequality, and these are all uniformly
1162
+ bounded by a constant c(n), as p → p±. Hence, our proof is finished.
1163
+
1164
+ Let us first verify the uniform growth of order σ at free boundary points
1165
+ for minimizers. We prove it by compactness.
1166
+ Lemma 4.2. Let u ∈ W 1,p∧q(Q1) be a local minimizer of Jp,q such that
1167
+ (4.1)
1168
+ ˆ
1169
+ Q1
1170
+ ((u+)p + (u−)q) dx ≤ 1,
1171
+ u(0) = 0.
1172
+ Then for any σ ∈ (0, 1), there exists δ > 0, depending only on n, p, and σ,
1173
+ such that if |p − q| < δ, then with σ+ = σ and σ− = 1 − (1 − σ)p
1174
+ q,
1175
+ 1
1176
+ rn+σ+p
1177
+ ˆ
1178
+ Qr
1179
+ (u+)p dx +
1180
+ 1
1181
+ rn+σ−q
1182
+ ˆ
1183
+ Qr
1184
+ (u−)q dx ≤ c,
1185
+ ∀r ∈ (0, 1),
1186
+ where c > 1 depends only on n, p, and σ.
1187
+ Proof. Let σ > 0 and p ∈ (1, ∞) be given. Suppose that the conclusion of
1188
+ this lemma does not hold. Then for each j = 1, 2, · · · , there must exist an
1189
+
1190
+ 16
1191
+ SUNGHAN KIM AND HENRIK SHAHGHOLIAN
1192
+ exponent qj > 1 with |qj − p| ց 0, a local minimizer uj ∈ W 1,p∧qj(Q1) of
1193
+ the functional Jp,qj, and a scale rj ∈ (0, 1), such that
1194
+ (4.2)
1195
+ ˆ
1196
+ Q1
1197
+ ((u+
1198
+ j )p + (u−
1199
+ j )qj) dx ≤ 1,
1200
+ uj(0) = 0,
1201
+ but with σ+ = σ and σj,− = 1 − (1 − σ) p
1202
+ qj → σ,
1203
+ (4.3)
1204
+ Sj :=
1205
+ sup
1206
+ rj≤r≤1
1207
+
1208
+ 1
1209
+ rσ+p
1210
+ ˆ
1211
+ Qr
1212
+ dx +
1213
+ 1
1214
+ rσj,−qj
1215
+ ˆ
1216
+ Qr
1217
+ (u−
1218
+ j )qj
1219
+
1220
+ dx ր ∞.
1221
+ To have the first inequality in (4.2) and (4.3) to be compatible, we must have
1222
+ rj ց 0 up to a subsequence. As in the proof of Lemma 3.4, we consider the
1223
+ rescaling
1224
+ vj(y) :=
1225
+ u+
1226
+ j (rjy)
1227
+ S
1228
+ 1
1229
+ p
1230
+ j rσ+
1231
+ j
1232
+
1233
+ u−
1234
+ j (rjy)
1235
+ S
1236
+ 1
1237
+ qj
1238
+ j rσj,−
1239
+ j
1240
+ .
1241
+ Then vj is a minimizer of Jp,qj in Q1/rj and that
1242
+ (4.4)
1243
+ sup
1244
+ 1≤R≤ 1
1245
+ rj
1246
+
1247
+ 1
1248
+ Rσ+p
1249
+ ˆ
1250
+ QR
1251
+ (v+
1252
+ j )p dx +
1253
+ 1
1254
+ Rσj,−qj
1255
+ ˆ
1256
+ QR
1257
+ (v−
1258
+ j )qj dx
1259
+
1260
+ = 1.
1261
+ Then by [CKS21, Theorem 1.2], we have
1262
+ (4.5)
1263
+ sup
1264
+ j
1265
+ ∥vj∥C0,¯σ(QR) < ∞,
1266
+ where both c > 1 and ¯σ ∈ (0, 1) depend only on n and p; see Lemma
1267
+ 4.1 for the stability of ¯σ and c for the case p = n. Moreover, by [CKS21,
1268
+ Lemma 3.4], v+
1269
+ j (and v−
1270
+ j ) is a weak p-(resp. qj-)subsolution, so the higher
1271
+ integrability [GG82, Theorem 4.1] applies. Utilizing |qj−p| ց 0, there exists
1272
+ η > 0, depending only on n and p, such that
1273
+ (4.6)
1274
+ sup
1275
+ j
1276
+ ˆ
1277
+ QR
1278
+ |Dvj|p+η dx < ∞.
1279
+ Also observe from (4.2) that
1280
+ (4.7)
1281
+ vj(0) = 0.
1282
+ By (4.5) and (4.6), we can extract a subsequence of {vj}∞
1283
+ j=1 along which
1284
+ vj → v weakly in W 1,p+η
1285
+ loc
1286
+ (Rn) and locally uniformly in Rn, for some v ∈
1287
+ W 1,p+η
1288
+ loc
1289
+ ∩ C0,σ
1290
+ loc (Rn). Let us continue to denote this subsequence by {vj}∞
1291
+ j=1.
1292
+ The uniform convergence along with (4.7) implies that
1293
+ (4.8)
1294
+ v(0) = 0.
1295
+ We claim that v is a (weak) p-harmonic function in Rn.
1296
+ For any large j, we have qj ∈ (p − η, p + η). By (4.6) and the compact
1297
+ embedding, vj → w strongly in W 1,p
1298
+ loc (Rn). Now fix R ≥ 1, and let ϕ ∈
1299
+ W 1,p+η
1300
+ 0
1301
+ (QR) be arbitrary. Then since |qj − p| ց 0, |Dv−
1302
+ j |qj → |Dv−|p and
1303
+
1304
+ 17
1305
+ |D(vj+ϕ)−|qj → |D(v+ϕ)|p a.e. in QR. Then by the dominated convergence
1306
+ theorem and the minimizerslity of Jp,qj(vj, QR),
1307
+ (4.9)
1308
+ ˆ
1309
+ QR
1310
+ |Dv|p dx = lim
1311
+ k→∞
1312
+ ˆ
1313
+ QR
1314
+ (|Dv+
1315
+ j |p + |Dv−
1316
+ j |qj) dx
1317
+ ≤ lim
1318
+ k→∞
1319
+ ˆ
1320
+ QR
1321
+ (|D(vj + ϕ)+|p + |D(vj + ϕ)−|qj) dx
1322
+ =
1323
+ ˆ
1324
+ QR
1325
+ |D(v + ϕ)|p dx.
1326
+ Thus, v minimizes Jp,p(·, QR) over all variations v+ϕ with ϕ ∈ W 1,p+η
1327
+ 0
1328
+ (QR).
1329
+ This suffices to guarantee v to be (weak) p-harmonic in QR, see [Lin19].
1330
+ Since R was any number larger than 1, the claim is now verified.
1331
+ Now letting k → ∞ in (4.4) and using qj → p, we obtain
1332
+ (4.10)
1333
+ sup
1334
+ R≥1
1335
+ 1
1336
+ Rσp
1337
+ ˆ
1338
+ QR
1339
+ |v|p dx = 1.
1340
+ By the interior Lipschitz estimate for p-harmonic functions,
1341
+ (4.11)
1342
+ [v]C0,1(QR) ≤
1343
+ c
1344
+ R1−σ ,
1345
+ for some c independent of R. Taking R → ∞ in (4.11), we derive that v is
1346
+ constant in Rn, which together with (4.8) implies v ≡ 0. This is yields a
1347
+ contradiction against (4.10), and the proof is finished.
1348
+
1349
+ Next we extend the above lemma to local (1 + ε)-minimizers.
1350
+ Lemma 4.3. For any σ ∈ (0, 1), there exists ε, δ > 0, depending only on n,
1351
+ p, and σ, such that for any q ∈ (1, ∞) with |p − q| < δ, and any local local
1352
+ (1 + ε)-minimizer u ∈ W 1,p∧q(Q1) satisfying (4.1), one has, with σ+ = σ
1353
+ and σ− = 1 − (1 − σ)p
1354
+ q, that
1355
+ 1
1356
+ rn+σ+p
1357
+ ˆ
1358
+ Qr
1359
+ (u+)p dx +
1360
+ 1
1361
+ rn+σ−q
1362
+ ˆ
1363
+ Qr
1364
+ (u−)q dx ≤ c,
1365
+ ∀r ∈ (0, 1),
1366
+ where c > 1 depends only on n, p, and σ.
1367
+ Proof. As already observed in the proof of Proposition 3.3, the assumption
1368
+ u(0) = 0 implies (3.11) for every r ∈ (0, 1). Hence, the assumption (4.1)
1369
+ implies (3.4). The rest of the proof is the same with that of Lemma 3.4. More
1370
+ exactly, given σ ∈ (0, 1) and p > 1, we first choose δ > 0 sufficiently small
1371
+ such that Lemma 4.2 holds with 1+σ
1372
+ 2
1373
+ in place of σ, for all local minimizers
1374
+ for functional Jp,q for any q ∈ (1, ∞) with |p − q| < δ. Then we can take
1375
+ ε > 0 small enough such that Lemma 3.4 holds with τ as in (3.11), σ+ = σ
1376
+ and σ− = 1 − (1 − σ)p
1377
+ q, ¯σ+ = 1+σ
1378
+ 2
1379
+ > σ = σ−, and ¯σ− = 1 − (1−σ
1380
+ 2 )p
1381
+ q >
1382
+ 1 − (1 − σ)p
1383
+ q = σ−. We skip the details.
1384
+
1385
+ We are ready to prove the almost Lipschitz regularity for almost mini-
1386
+ mizers, when |p − q| ≪ 1.
1387
+
1388
+ 18
1389
+ SUNGHAN KIM AND HENRIK SHAHGHOLIAN
1390
+ Proof of Theorem 1.3. With the same (and simpler) compactness argument,
1391
+ we can also prove that local (1 + ε)-minimizers for Jp,p(w) ≡
1392
+ ´
1393
+ |Dw|p dx is
1394
+ of class C0,σ, for any σ ∈ (0, 1) and every ε ∈ (0, εσ), since p-harmonic
1395
+ functions are of class C1,α ⊂ C0,1. Moreover, we can obtain a uniform C0,σ-
1396
+ estimates, with this compactness argument, and the smallness constant εσ
1397
+ depends only on n, p, and σ. Thus, the passage from Lemma 4.3 to Theorem
1398
+ 1.3 is standard. We shall not present the obvious details here.
1399
+
1400
+ Declarations
1401
+ Data availability statement: All data needed are contained in the man-
1402
+ uscript.
1403
+ Funding and/or Conflicts of interests/Competing interests: The
1404
+ authors declare that there are no financial, competing or conflict of interests.
1405
+ References
1406
+ [AT15]
1407
+ M. D. Amaral and E. V. Teixeira, Free transmission problems, Comm. Math.
1408
+ Phys. 337 (2015), 1465–1489.
1409
+ [CKS21] M. Colombo, S. Kim and H. Shahgholian, A transmission problem for (p, q)-
1410
+ Laplacian, to appear in Comm. in Partial Differential Equations.
1411
+ [DET19] G. David, M. Engelstein, and T. Toro, Free boundary regularity for almost min-
1412
+ imizers, Adv. Math. 350 (2019), 1109–1192.
1413
+ [DS20]
1414
+ D. De Silva and O. Savin, Almost minimizers of the one-phase free boundary
1415
+ problem, Comm. Partial Differential Equations 45 (2020), 913–930.
1416
+ [DJS22] D. De Silva, S. Jeon and H. Shahgholian, Almost minimizers for a singular system
1417
+ with free boundary, J. Differential Equations 336 (2022), 167–203.
1418
+ [GG82]
1419
+ M. Giaquinta and E. Giusti, On the regularity of the minimizers of variational
1420
+ integrals, Acta Math. 148 (1982), 31–46.
1421
+ [Giu03]
1422
+ E. Giusti, Direct methods in the Calculus of Variations, World Scientific, 2003.
1423
+ [Lin19]
1424
+ P. Lindqvist, Notes on the Stationary p-Laplace Equation, Springer International
1425
+ Publishing, 2019.
1426
+ Department of Mathematics, Uppsala University, S-751 06 Uppsala, Sweden
1427
+ Email address: [email protected]
1428
+ Department of Mathematics, Royal Institute of Technology, 100 44 Stock-
1429
+ holm, Sweden
1430
+ Email address: [email protected]
1431
+
5dFAT4oBgHgl3EQfmh3P/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
5tE2T4oBgHgl3EQfkQe0/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:42a4626b4d8333095542c66b1e0e1bbd9cbdc68b8da115cfacfe3728bfe8a23e
3
+ size 125871
7dE2T4oBgHgl3EQfPQbU/content/2301.03758v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7b9d62c27b115c8bdcd4f61cc184573b0bc7eca30bc814233cf92f90eab0903c
3
+ size 1434593
7dE2T4oBgHgl3EQfPQbU/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:65b52441d57070e7e763f73a96251f78087280dba9c3ad7f2d06d98d496f39bd
3
+ size 197780
9tAyT4oBgHgl3EQf3Pnc/content/tmp_files/2301.00767v1.pdf.txt ADDED
@@ -0,0 +1,1836 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
2
+ 1
3
+ A Survey on Federated Recommendation Systems
4
+ Zehua Sun∗, Yonghui Xu∗, Yong Liu, Wei He, Yali Jiang, Fangzhao Wu, Lizhen Cui†
5
+ Abstract—Federated learning has recently been applied to
6
+ recommendation systems to protect user privacy. In federated
7
+ learning settings, recommendation systems can train recom-
8
+ mendation models only collecting the intermediate parameters
9
+ instead of the real user data, which greatly enhances the user
10
+ privacy. Beside, federated recommendation systems enable to
11
+ collaborate with other data platforms to improve recommended
12
+ model performance while meeting the regulation and privacy
13
+ constraints. However, federated recommendation systems faces
14
+ many new challenges such as privacy, security, heterogeneity
15
+ and communication costs. While significant research has been
16
+ conducted in these areas, gaps in the surveying literature still
17
+ exist. In this survey, we—(1) summarize some common privacy
18
+ mechanisms used in federated recommendation systems and
19
+ discuss the advantages and limitations of each mechanism; (2)
20
+ review some robust aggregation strategies and several novel at-
21
+ tacks against security; (3) summarize some approaches to address
22
+ heterogeneity and communication costs problems; (4)introduce
23
+ some open source platforms that can be used to build federated
24
+ recommendation systems; (5) present some prospective research
25
+ directions in the future. This survey can guide researchers and
26
+ practitioners understand the research progress in these areas.
27
+ Index Terms—Recommendation Systems, Federated Learning,
28
+ Privacy, Security, Heterogeneity, Communication costs.
29
+ I. INTRODUCTION
30
+ I
31
+ N recent years, recommendation systems have been widely
32
+ used to model user interests so as to solve information over-
33
+ load problems in many real-world fields, e.g., e-commerce [1]
34
+ [2], news [3] [4] and healthcare [5] [6]. To further improve the
35
+ recommendation performance, such systems usually collect as
36
+ much data as possible, including a lot of private information of
37
+ users, such as user attributes, user behaviors, social relations,
38
+ and context information.
39
+ Although these recommendation systems have achieved
40
+ remarkable results in terms of accuracy, most of them require a
41
+ central server to store collected user data, which exist potential
42
+ privacy leakage risks because user data could be sold to
43
+ a third party without user consent, or stolen by motivated
44
+ attackers. In addition, due to privacy concerns and regulation
45
+ restrictions, it becomes more difficult to integrate data from
46
+ other platforms to improve recommendation performance. For
47
+ example, regulations such as General Data Protection Reg-
48
+ ulation (GDPR) [7] set strict rules on collecting user data
49
+ and sharing data between different platforms, which may lead
50
+ to insufficient data for recommendation systems and further
51
+ affects the recommendation performance.
52
+ Zehua Sun, Yonghui Xu, Wei He, Yali Jiang and Lizhen Cui are with Joint
53
+ SDU-NTU Centre for Artificial Intelligence Research (C-FAIR) & Software
54
+ School, Shandong University.
55
+ Yong Liu are with Alibaba-NTU Singapore Joint Research Institute,
56
+ Nanyang Technological University, Singapore.
57
+ Fangzhao Wu are with Microsoft Research Asia, China.
58
+ ∗Zehua Sun and Yonghui Xu are Co-First authors.
59
+ †Corresponding author: [email protected].
60
+ Federated learning is a privacy-preserving distributed learn-
61
+ ing scheme proposed by Google [8], which enables par-
62
+ ticipants to collaboratively train a machine learning model
63
+ by sharing intermediate parameters (e.g., model parameters,
64
+ gradients) to the central server instead of their real data.
65
+ Therefore, combining federated learning with recommendation
66
+ systems becomes a promising solution for privacy-preserving
67
+ recommendation systems. In this paper, we term it federated
68
+ recommendation system (FedRS).
69
+ A. Challenges
70
+ While FedRS avoid direct exposure of real user data and
71
+ provides a privacy-aware paradigm for model training, there
72
+ are still some core challenges that need to be addressed.
73
+ Challenge 1: Privacy concerns. Privacy protection is often
74
+ the major goal of FedRS. In FedRS, each participant jointly
75
+ trains a global recommendation model by sharing interme-
76
+ diate parameters instead of their real data, which makes an
77
+ important step towards privacy-preserving recommendation
78
+ systems. However, a curious sever can still infer some sensitive
79
+ information (e.g., user behavior, ratings) from the intermediate
80
+ parameters [9] [10].
81
+ Challenge 2: Security attacks. In FedRS, participants may
82
+ be malicious. They can attack the security of FedRS by
83
+ poisoning the local training samples or the intermediate pa-
84
+ rameters uploaded. As a result, attackers can increase/decrease
85
+ the exposure ratio of specific items [12] or degrade the
86
+ overall performance of the recommendation model [11]. In
87
+ addition, some attackers try to use well-designed constraints to
88
+ approximate the patterns of benign participants, which further
89
+ increases the difficulty of defense and detection [55].
90
+ Challenge 3: Heterogeneity. FedRS also faces the problem
91
+ of system, statistical and privacy heterogeneity. System hetero-
92
+ geneity means that the storage, computing, and communication
93
+ capabilities of clients usually vary greatly, clients with limited
94
+ capability may become stragglers and affect training efficiency.
95
+ Statistical heterogeneity means that data in different clients
96
+ is often not independent and identically distributed (Non-
97
+ IID), which significantly affects global model convergence
98
+ and personalization of recommendation results. Privacy het-
99
+ erogeneity means that users and information usually have
100
+ different privacy constraints, thus using the same privacy
101
+ budgets for them will bring unnecessary loss of accuracy and
102
+ efficiency.
103
+ Challenge 4: Communication costs. To achieve satisfac-
104
+ tory recommendation performance, clients need to commu-
105
+ nicate with the central server for multiple rounds. However,
106
+ the real-world recommendation systems are usually built on
107
+ complex deep learning models and millions of intermediate
108
+ parameters needs to be communicated [13]. Therefore, clients
109
+ arXiv:2301.00767v1 [cs.IR] 27 Dec 2022
110
+
111
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
112
+ 2
113
+ Fig. 1: Communication architecture of FedRS.
114
+ may be hard to afford severe communication costs, which lim-
115
+ its the application of FedRS in large-scale industrial scenarios.
116
+ B. Related Surveys
117
+ There are many surveys that have focused on recommenda-
118
+ tion systems or federated learning. For example, Adomavicius
119
+ et al. [14] provide a detailed categorization of recommenda-
120
+ tion methods and introduce various limitations of each method.
121
+ Yang et al. [15] give the definition of federated learning
122
+ and discuss its architectures and applications. And Li et al.
123
+ [16] summarize the unique characteristics and challenges of
124
+ federated learning. However the existing surveys usually treat
125
+ recommendation systems and federated learning separately,
126
+ and few work surveyed specific problems in FedRS [17].
127
+ Yang et al. [17] categorize FedRS from the aspect of the
128
+ federated learning and discuss the algorithm-level and system-
129
+ level challenges for FedRS. However, they do not provide
130
+ comprehensive methods to address privacy, security, hetero-
131
+ geneity, and communication costs challenges.
132
+ C. Our Contribution
133
+ Compared with the previous surveys, this paper makes
134
+ the following contributions: (1) We provide a comprehensive
135
+ overview of FedRS from the perspectives of definition, com-
136
+ munication architectures and categorization. (2) We summarize
137
+ the state-of-the-art studies of FedRS in terms of privacy,
138
+ security, heterogeneity and communication costs areas. (3) We
139
+ introduce some open source platforms for FedRS, which can
140
+ help engineers and researchers develop algorithms and deploy
141
+ applications of FedRS. (4) We discuss the promising future
142
+ directions for FedRS.
143
+ The rest of the paper is organized as follow: Section II
144
+ discusses the overview of FedRS. Section III-Section VI sum-
145
+ marize the state-of-the-art studies of FedRS from the aspects
146
+ of privacy, security, heterogeneity and communication costs.
147
+ Section VII introduces the existing open source platforms.
148
+ Section VIII presents some prospective research directions.
149
+ Finally, Section IX concludes this survey.
150
+ II. OVERVIEW OF FEDERATED RECOMMENDATION
151
+ SYSTEMS
152
+ A. Definition
153
+ FedRS is a technology that provides recommendation ser-
154
+ vices in a privacy preserving way. To protect user privacy, the
155
+ participants in FedRS collaboratively train the recommenda-
156
+ tion model by exchanging intermediate parameters instead of
157
+ sharing their own real data. In ideal case, the performance of
158
+ recommendation model trained in FedRS should be closed to
159
+ the performance of the recommendation model trained in the
160
+ data centralized setting, which can be formalized as:
161
+ |VF ED − VSUM| < δ.
162
+ (1)
163
+ where VF ED is the recommendation model performance in
164
+ FedRS , VSUM is the recommendation model performance
165
+ in traditional recommendation systems for centralized data
166
+ storage, and δ is a small positive numbers.
167
+ B. Communication Architecture
168
+ In FedRS, the data of participants is stored locally, and
169
+ the intermediate parameters are communicated between the
170
+ server and participants. There are two major communication
171
+ architectures used in the study of FedRS, including client-
172
+ server architecture and peer-peer architecture.
173
+ Client-Server Architecture. Client-server architecture is
174
+ the most common communication architecture used in FedRS,
175
+ as shown in Fig. 1(a), which relies on a trusted central server
176
+ to perform initialization and model aggregation tasks. In each
177
+ round, the server distributes the current global recommenda-
178
+ tion model to some selected clients. Then the selected clients
179
+ use the received model and their own data for local training,
180
+ and send the updated intermediate parameters (e.g., model
181
+ parameters, gradients) to the server for global aggregation. The
182
+
183
+ Server
184
+ ① Initialization
185
+ ① Initialization
186
+
187
+
188
+ ② Download model
189
+
190
+ ② Local update
191
+ Participant 1
192
+ ③ Local update
193
+ ③ Send parameters
194
+
195
+ @ Send parameters
196
+ @ Aggregation
197
+ 4
198
+ 4
199
+
200
+ 2)
201
+ ? Aggregation
202
+
203
+
204
+ 3
205
+ 3
206
+ 3
207
+
208
+
209
+
210
+
211
+ Participant 1
212
+ Participant 2
213
+ Participant N
214
+ Participant 2
215
+ Participant N
216
+ (a) Client-Server ahictecture
217
+ (b) Peer-Peer ahictectureIEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
218
+ 3
219
+ Fig. 2: Categorization of federated recommendation systems.
220
+ client-server architecture requires a central server to aggregate
221
+ the intermediate parameters uploaded by the clients. Thus,
222
+ once the server has a single point of failure, the entire training
223
+ process will be seriously affected [18]. In addition, the curious
224
+ server may infer the clients’ privacy information through the
225
+ intermediate parameters, leaving potential privacy concerns
226
+ [10].
227
+ Peer-Peer Architecture. Considering the single point of
228
+ failure problem for client-server architecture in FedRS, Hegeds
229
+ et al. [19] design a peer-peer communication architecture
230
+ with no central server involved in the communication process,
231
+ which is shown in Fig. 1(b). During each communication
232
+ round, each participant broadcasts the updated intermediate
233
+ parameters to some random online neighbors in the peer to
234
+ peer network, and aggregates received parameters into its
235
+ own global model. In this architecture, the single point of
236
+ failure and privacy issues associated with a central server
237
+ can be avoided. However, the aggregation process occurs on
238
+ each client, which greatly increases the communication and
239
+ computation overhead for clients [20].
240
+ C. Categorization
241
+ In FedRS, the participants are responsible for the local
242
+ training process as the data owners. They can be different
243
+ mobile devices or data platforms. Considering the unique
244
+ properties for different types of participants, FedRS usually
245
+ have different application scenarios and designs. Besides, there
246
+ are also some differences between different recommendation
247
+ models in the federation process. Thus, we summarize the
248
+ current FedRS and categorize them from the perspectives of
249
+ participant type and recommendation model. Fig. 2 shows the
250
+ summary of the categorization of FedRS.
251
+ 1) Participant Type: Based on the type of participants,
252
+ FedRS can be categorized into cross-device FedRS and cross-
253
+ platform FedRS.
254
+ Cross-device FedRS. In cross-device FedRS, different mo-
255
+ bile devices are usually treated as participants [21] [22].
256
+ The typical application of cross-device FedRS is to build a
257
+ personal recommendation model for users without collecting
258
+ their local data. In this way, users can enjoy recommend
259
+ service while protecting their private information. The number
260
+ of participants in cross-device FedRS is relative large and each
261
+ participant keeps a small amount of data. Considering the
262
+ limited computation and communication abilities for mobile
263
+ devices, cross-device FedRS cannot handle very complex
264
+ training tasks. Besides, due to the power and the network
265
+ status, the mobile devices may drop out of the training process.
266
+ Thus, the major challenges for cross-device FedRS are how
267
+ to improve the efficiency and deal with straggler problem of
268
+ devices during training process.
269
+ Cross-platform FedRS. In cross-platform FedRS, different
270
+ data platforms are usually treated as participants who want
271
+ to collaborate to improve recommendation performance while
272
+ meeting regulation and privacy constraints [23] [24] [25].
273
+ For example, In order to improve the recommendation per-
274
+ formance, recommendation systems often integrate data from
275
+ multiple platforms (e.g., e-commercial platforms , social plat-
276
+ forms). However, due to the privacy and regulation concerns,
277
+ the different data platforms are often unable to directly share
278
+ their data with each other. In this scenario, cross-platform
279
+ FedRS can be used to collaboratively train recommendation
280
+ models between different data platforms without directly ex-
281
+ changing their users’ data. Compared to cross-device FedRS,
282
+ the number of participants in cross-platform FedRS is rela-
283
+ tively small, and each participant owns relative large amount of
284
+ data. An important challenge for cross-platform FedRS is how
285
+ to design a fair incentive mechanism to measure contributions
286
+ and benefits of different data platforms. Besides, it is hard
287
+ to find a trusted server to manage training process in cross-
288
+ platform FedRS, so a peer to peer communication architecture
289
+ can be a good choice in this case.
290
+ 2) Recommendation Model:
291
+ According to the different
292
+ recommendation models used in FedRS, FedRS can be cat-
293
+ egorized into matrix factorization model based FedRS, deep
294
+ learning model based FedRS and meta learning model FedRS.
295
+ Matrix factorization model based FedRS. Matrix fac-
296
+ torization [26] is the most common model used in FedRS,
297
+ which formulates the user-item interaction or rating matrix
298
+ R ∈ RN×M as a linear combination of user profile matrix
299
+ U ∈ RN×K and item profile matrix V ∈ RM×K:
300
+ R = UV T .
301
+ (2)
302
+ then uses the learned model to recommendation new items to
303
+ the user according to the predicted value. In matrix factoriza-
304
+ tion model based FedRS, the user factor vectors are stored and
305
+ updated locally on the clients, and only the item factor vectors
306
+ [27] or the gradients of item factor vectors [21] [22] [10]
307
+ [28] [29] are uploaded to the server for aggregation. Matrix
308
+ factorization model based FedRS can simply and effectively
309
+ capture user tastes with the interaction and rating information
310
+ between users and items. However it still has many limitations
311
+ such as sparsity (the number of ratings to be predicted is much
312
+ smaller than the known ratings) and cold-start (new users and
313
+ new items lacks ratings information) problems [14].
314
+ Deep learning model based FedRS. To learn more com-
315
+ plex representations of users and items and improve the
316
+ recommendation performance, deep learning technology has
317
+ been widely used in recommendation systems. However, as
318
+ privacy regulations get stricter, it becomes more difficult for
319
+ recommendation systems to collect enough user data to build
320
+ a high performance deep learning model. To make the full
321
+
322
+ Cross-DeviceFedRS
323
+ Participant Type
324
+ Cross-PlatformFedRS
325
+ Federated
326
+ Recommendation
327
+ System
328
+ Matrix Factorization Mode
329
+ Based FedRS
330
+ Recommendation
331
+ Deep Learning Model
332
+ Model
333
+ Based FedRS
334
+ Meta Learning Model
335
+ Based FedRSIEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
336
+ 4
337
+ use of user data while meeting privacy regulations, many ef-
338
+ fective deep learning model based FedRS have been proposed
339
+ [30] [31] [32]. Considering different model structures, deep
340
+ learning model based FedRS usually adopt different model
341
+ update and intermediate parameter transmit processes. For
342
+ examples, Perifanis et al. [30] propose a federated neural
343
+ collaborative filtering (FedNCF) framework based on NCF
344
+ [33]. In FedNCF, the clients locally update the network
345
+ weights as well as the user and item profiles, then upload
346
+ the item profile and network weights after masking to the
347
+ server for aggregation. Wu et al. [31] propose a federated
348
+ graph neural network (FedGNN) framework based on GNN.
349
+ In FedGNN, the clients locally train GNN models and update
350
+ the user/item embeddings from their local sub-graph, then send
351
+ the perturbed gradients of GNN model and item embedding to
352
+ the central server for aggregation. Besides, Huang et al. [34]
353
+ propose a federated multi-view recommendation framework
354
+ based on Deep Structured Semantic Model (DSSM [35]). In
355
+ FL-MV-DSSM, each view i locally trains the user and item
356
+ sub-models based on their own user data and local shared item
357
+ data, then send the perturbed gradients of both user and item
358
+ sub-models to server for aggregation. Although deep learning
359
+ model based FedRS achieve outstanding performance in terms
360
+ of accuracy, the massive model parameters of deep learning
361
+ models bring huge computation and communication overhead
362
+ to the clients, which presents a serious challenge for real
363
+ industrial recommendation scenarios.
364
+ Meta learning model based FedRS. The most of existing
365
+ federated recommendation studies are built on the assump-
366
+ tion that data distributed on each client is independent and
367
+ identically (IID). However, learning a unified federated rec-
368
+ ommendation model often performs poorly when handling the
369
+ Non-IID and highly personalized data on clients. Meta learning
370
+ model can quickly adapt to new tasks while maintaining good
371
+ generalization ability [36], which makes it particularly suitable
372
+ for FedRS. In meta learning model based FedRS, the server
373
+ aggregates the intermediate parameters uploaded by clients to
374
+ learn a model parameter initialization, and the clients fine-tune
375
+ the initialed model parameters in local training phase to fit to
376
+ their local data [37] [38]. In this way, meta learning model
377
+ based FedRS can adapt the clients’ local data to provide more
378
+ personalized recommendations. Although the performance of
379
+ meta learning model based FedRS are generally better than
380
+ learning a unified global model, the private information leak-
381
+ age can still occur during the learning process of model
382
+ parameter initialization [37].
383
+ III. PRIVACY OF FEDERATED RECOMMENDATION
384
+ SYSTEMS
385
+ In the model training process of FedRS, the user data is
386
+ stored locally and only the intermediate parameters are up-
387
+ loaded to a server, which can further protect user privacy while
388
+ keeping recommendation performance. Nevertheless, several
389
+ research works show that the central server can still infer
390
+ some sensitive information based on intermediate parameters.
391
+ For examples, a curious server can identify items the user
392
+ has interacted with according to the non-zero gradients sent
393
+ by the client [31]. Besides, the server can also infer the user
394
+ ratings as long as obtaining the user uploaded gradients in two
395
+ consecutive rounds [10]. To further protect privacy of FedRS,
396
+ many studies have incorporated other privacy protection mech-
397
+ anisms into the FedRS, including pseudo items, homomorphic
398
+ encryption, secret sharing and differential privacy. This section
399
+ introduces the application of each privacy mechanism used in
400
+ FedRS, and compare their advantages and limitations.
401
+ A. Pseudo Items
402
+ To prevent the server from inferring the set of items that
403
+ users have interacted with based on non-zero gradients, some
404
+ studies utilize pseudo items to protect user interaction behav-
405
+ iors in FedRS. The key idea of pseudo items is that the clients
406
+ not only upload gradients of items that have been interacted
407
+ with but also upload gradients of some sampled items that
408
+ have not been with.
409
+ For example, Lin et at. [22] propose a federated recom-
410
+ mendation framework for explicit feedback scenario named
411
+ FedRec, in which they design an effective hybrid filling strat-
412
+ egy to generated virtual ratings of unrated items by following
413
+ equation:
414
+ r
415
+
416
+ ui =
417
+
418
+
419
+
420
+ �m
421
+ k=1 yukruk
422
+ �m
423
+ k=1 yuk
424
+ , t < Tpredict
425
+ ˆrui, t ≥ Tpredict
426
+ (3)
427
+ where t denotes the number of current training iteration,
428
+ and Tpredict denotes the iteration number when chooses the
429
+ average value or predict value as virtual rating value to a
430
+ sampled item i. However, the hybrid filling strategy in FedRec
431
+ introduces extra noise to the recommendation model, which in-
432
+ evitably affects the model performance. To tackle this problem,
433
+ Feng et at. [39] design a lossless version of FedRec named
434
+ FedRec++. FedRec++ divides clients into ordinary clients and
435
+ denoising clients. The denosing clients collect noisy gradients
436
+ from ordinary clients and send the summation of the noisy
437
+ gradients to server to eliminate the gradient noise.
438
+ Although pseudo items can effectively protect user interac-
439
+ tion behaviors in FedRS, it does not modify the gradients of
440
+ rated items. The curious server can still infer user ratings on
441
+ the gradients uploaded by users [10].
442
+ B. Homomorphic Encryption
443
+ To further protect the user ratings in FedRS, many studies
444
+ attempt to encrypt intermediate parameters before uploading
445
+ them to the server. Homomorphic encryption mechanism al-
446
+ lows mathematical operation on encrypted data [40], so it
447
+ is well suited for the intermediate parameters upload and
448
+ aggregation processes in FedRS.
449
+ For example, Chai et at. [10] propose a secure feder-
450
+ ated matrix factorization framework named FedMF, in which
451
+ clients use Paillier homomorphic encryption mechanism [41]
452
+ to encrypt the gradients of item embedding matrix before
453
+ uploading them to the server, and the server aggregates
454
+ gradients on the cipher-text. Due to the characteristics of
455
+ homomorphic encryption, FedMF can achieve the same rec-
456
+ ommendation accuracy as the traditional matrix factorization.
457
+
458
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
459
+ 5
460
+ TABLE I: Comparison between different privacy mechanism.
461
+ Privacy Mechanisms
462
+ Ref
463
+ Main Protect Object
464
+ Accuracy Loss
465
+ Communication/Computation Costs
466
+ Pseudo Items
467
+ [22] [39] [31] [44] [45]
468
+ Interaction Behaviors
469
+
470
+ Low Costs
471
+ Homomorphic Encryption
472
+ [10]
473
+ Ratings
474
+
475
+ High Computation Costs
476
+ [31]
477
+ High-order Graph
478
+ [42]
479
+ Social Features
480
+ Secret Sharing
481
+ [29] [45]
482
+ Ratings
483
+
484
+ High Communication Costs
485
+ Local Differential Privacy
486
+ [27] [31] [44]
487
+ Ratings
488
+
489
+ Low Costs
490
+ However, FedMF causes serious computation overheads since
491
+ all computation operations are performed on the ciphertext
492
+ and most of system’s time is spent on server updates. Besides,
493
+ FedMF assumes that all participants are honest and will not
494
+ leak the secret key to the server, which is hard to guarantee
495
+ in reality.
496
+ Besides, many studies also utilize homomorphic encryption
497
+ mechanism to integrate private information from other par-
498
+ ticipants to improve recommendation accuracy [31] [42]. For
499
+ examples, Wu et al. [31] use homomorphic encryption mecha-
500
+ nism to find the anonymous neighbors of users to expanse local
501
+ user-item graph. And Perifanis et al. [42] use Cheon-Kim-
502
+ Kim-Song (CKKS) fully homomorphic encryption mechanism
503
+ [43] to incorporate learned parameters between user’s friends
504
+ after the global model is generated.
505
+ Homomorphic encryption mechanism based FedRS can
506
+ effectively protect user ratings while maintaining recommen-
507
+ dation accuracy. Besides, it can prevent privacy leaks when
508
+ integrating information from other participants. However, ho-
509
+ momorphic encryption brings huge computation costs during
510
+ operation process. And it is also a serious challenge to keep
511
+ the secret key not be obtained by the server or other malicious
512
+ participants.
513
+ C. Secret Sharing
514
+ As another encryption mechanism used in FedRS, secret
515
+ sharing mechanism breaks intermediate parameters up into
516
+ multiple pieces, and distributes the pieces among participants,
517
+ so that only when all pieces are collected can reconstruct the
518
+ intermediate parameters.
519
+ For example, Ying [29] proposes a secret sharing based
520
+ federated matrix factorization framework named ShareMF.
521
+ The participants divide the item matrix gradients gplain into
522
+ several random numbers that meet:
523
+ gplain = gsub1 + gsub2 + ... + gsubt.
524
+ (4)
525
+ Each participant keeps one of the random numbers and send
526
+ the rest to t − 1 sampled participants, then uploads the sum
527
+ of received and kept numbers as hybrid gradients to the
528
+ server for aggregation. ShareMF protects the user ratings and
529
+ interaction behaviors from being inferred by the server, but
530
+ the rated items can still be leaked to other participants who
531
+ received the split numbers. To tackle this problem, Lin et al.
532
+ [45] combine secret sharing and pseudo items mechanisms to
533
+ provide stronger privacy guarantee.
534
+ Secret sharing mechanism based FedRS can protect user
535
+ ratings while maintaining recommendation accuracy, and have
536
+ lower computation costs compared to homomorphic encryp-
537
+ tion based FedRS. But the exchange process of pieces between
538
+ participants greatly increases the communication costs.
539
+ D. Local Differential Privacy
540
+ Considering the huge computation or communication costs
541
+ caused by encryption based mechanisms, many studies try
542
+ to use perturbation based mechanisms to adapt to large-scale
543
+ FedRS for the industrial scenarios. Local differential privacy
544
+ (LDP) mechanism allows to statistical computations while
545
+ guaranteeing each individual participant’s privacynoise [46]
546
+ [47], which can be used to perturb the intermediate parameters
547
+ in FedRS.
548
+ For example, Dolui et al. [27] propose a federated matrix
549
+ factorization framework, which applies differential privacy
550
+ on item embedding matrix before sending it to server for
551
+ weighted average. However, the server can still infer which
552
+ items the user has rated just by comparing the changes in
553
+ item embedding matrix.
554
+ In order to achieve a more comprehensive privacy protection
555
+ during model training process, Wu et al. [31] combines
556
+ pseudo items and LDP mechanisms to protect both user
557
+ interaction behaviors and ratings in FedGNN. Firstly, to protect
558
+ user interaction behaviors in FedGNN, the clients randomly
559
+ sample N items that they have not interacted with, then
560
+ generate the virtual gradients of item embeddings by using
561
+ a same Gaussian distribution as the real embedding gradients.
562
+ Secondly, to protect user ratings in FedGNN, the clients apply
563
+ a LDP module to clip the gradients according to their L2-norm
564
+ with a threshold δ and perturb the gradients by adding zero-
565
+ mean Laplacian noise. The LDP module of FedGNN can be
566
+ formulated as follow:
567
+ gi = clip(gi, δ) + Laplace(0, λ).
568
+ (5)
569
+ where λ is the Laplacian noise strength. However, the gradi-
570
+ ent magnitude of different parameters varies during training
571
+ process, thus it is usually not appropriate to perturb gradients
572
+ at different magnitudes with a constant noise strength. So Liu
573
+
574
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
575
+ 6
576
+ et al. [44] propose to add dynamic noise according to the
577
+ gradients, which can be formulated as follow:
578
+ gi = clip(gi, δ) + Laplace(0, λ · mean(gi)).
579
+ (6)
580
+ Local differential privacy mechanism doesn’t bring heavy
581
+ computation and communication overhead to FedRS, but the
582
+ additional noise inevitably affects the performance of the
583
+ recommendation model. Thus, in the actual application sce-
584
+ nario, we must consider the trade-off between the privacy and
585
+ recommendation accuracy.
586
+ E. Comparison
587
+ To protect stronger privacy guarantee, many privacy mech-
588
+ anisms (i.e., pseudo items, homomorphic encryption, differ-
589
+ ential privacy privacy and secret sharing) have been widely
590
+ used in FedRS, and the comparison between these mechanisms
591
+ is shown in Table I. Firstly, the main protect objects of
592
+ these mechanisms are different: pseudo items mechanism is
593
+ to protect user interaction behaviors, and the rest mechanisms
594
+ is to protect user ratings. Besides, homomorphic encryption
595
+ can aslo integrate data from other paritcipants in a privacy-
596
+ preserving way. Secondly, homomorphic encryption and secret
597
+ sharing are both encryption-based mechanisms, and they can
598
+ protect privacy while keeping accuracy. However, the high
599
+ computation cost of homomorphic encryption limits the appli-
600
+ cation in large-scale industrial scenarios. Although the secret
601
+ sharing mechanism reduces the computation costs, the commu-
602
+ nication costs increase greatly. Pseudo items and differential
603
+ privacy mechanisms protect privacy by adding random noise,
604
+ which has low computation costs and don’t bring additional
605
+ communication costs. But the addition of random noise will
606
+ inevitably affect model performance to a certain extent.
607
+ IV. SECURITY OF FEDERATED RECOMMENDATION
608
+ SYSTEMS
609
+ Apart from privacy leakage problems, traditional recom-
610
+ mendation systems for centralized data storage are also vul-
611
+ nerable to poisoning attacks (shilling attacks) [48] [49] [50]
612
+ [51] [52] [53]. Attackers can poison recommendation systems
613
+ and make recommendations as their desires by injecting well-
614
+ crafted data into the training dataset. But most of these
615
+ poisoning attacks assume that the attackers have full prior
616
+ knowledge of entire training datasets. Such assumption may
617
+ be not valid for FedRS since the data in FedRS is distributed
618
+ and stored locally for each participant. Thus, FedRS provides
619
+ a stronger security guarantee than traditional recommendation
620
+ systems. However, the latest studies indicate that attackers can
621
+ still conduct poisoning attacks on FedRS with limited prior
622
+ knowledge [12] [11] [54] [55]. In this section, we summarize
623
+ some novel poisoning attacks against FedRS and provide some
624
+ defense methods.
625
+ A. Poisoning Attacks
626
+ According to the goal of attacks, the poisoning attacks
627
+ against FedRS can be categorized into targeted attacks and
628
+ untargeted attacks as shown in Table II.
629
+ 1) Target Poisoning Attacks: The goal of target attacks
630
+ on FedRS is to increase or decrease the exposure chance of
631
+ specific items, which are usually driven by financial profit.
632
+ For example, Zhang et al. [12] propose a poisoning attack
633
+ for item promotion (PipAttack) against FedRS by utilizing
634
+ popularity bias. To boost the rank score of target items,
635
+ PipAttack use popularity bias to align target items with popular
636
+ items in the embedding space. Besides, to avoid damaging
637
+ recommendation accuracy and be detected, PipAttack designs
638
+ a distance constraint to keep modified gradients uploaded by
639
+ malicious clients closed to normal ones.
640
+ In order to further reduce the degradation of recommenda-
641
+ tion accuracy caused by targeted poisoning attacks, and the
642
+ proportion of malicious clients needed to ensure the attack
643
+ effectiveness, Rong [54] propose a model poisoning attack
644
+ against FedRS (FedRecAttack), which makes use of a small
645
+ proportion of public interactions to approximate the user
646
+ feature matrix, then uses it to generate poisoned gradients.
647
+ Both PipAttack and FedRecAttack rely on some prior
648
+ knowledge. For example, PipAttack assumes the attacker is
649
+ available for popularity information, and FedRecAttack as-
650
+ sumes the attacker can get public interactions. So the attack
651
+ effectiveness is greatly reduced in the absence of prior knowl-
652
+ edge, which makes both attacks not generic in all FedRS. To
653
+ make attackers conduct effective poisoning attacks to FedRS
654
+ without the prior knowledge, Rong et al. [55] design two
655
+ methods (i.e., random approximation and hard user mining) for
656
+ malicious clients to generate poisoned gradients. In particular,
657
+ random approximation (A-ra) uses Gaussian distribution to
658
+ approximate normal users’ embedding vectors, and hard user
659
+ mining (A-hum) uses gradient descent to optimize users’
660
+ embedding vectors obtained by A-ra to mine hard users. In this
661
+ way, A-hum can still effectively attack FedRS with extremely
662
+ small proportion of malicious users.
663
+ 2) Untarget Poisoning Attacks: The goal of untarget attacks
664
+ on FedRS is to degrade the overall performance of recom-
665
+ mendation model, which are usually conducted by competing
666
+ companies. For example, Wu et al. [11] propose an untargeted
667
+ poisoning attack to FedRS named FedAttack, which uses glob-
668
+ ally hard sampling technique [62] to subvert model training
669
+ process. More specifically, after inferring user’s interest from
670
+ local user profiles, the malicious clients select candidate items
671
+ that best match the user’s interest as negative samples, and
672
+ select candidate items that least match the user’s interest as
673
+ positive samples. FedAttack only modifies training samples,
674
+ and the malicious clients are also similar to normal clients
675
+ with different interests, thus FedAttack can effectively damage
676
+ the performance of FedRS even under defense.
677
+ B. Defense Methods
678
+ To reduce the influence of poisoning attacks on FedRS,
679
+ many defense methods have been proposed in the literature,
680
+ which can be classified into robust aggregation and anomaly
681
+ detection.
682
+ 1) Robust Aggregation: The goal of robust aggregation
683
+ is to guarantee global model convergence when up to 50%
684
+ of participants are malicious [63], which selects statistically
685
+
686
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
687
+ 7
688
+ TABLE II: Representative works on the security of FedRS. RA refers to robust aggregation and AD refers to anomaly
689
+ detection.
690
+ Works
691
+ Ref
692
+ Attack Type
693
+ Poison Object
694
+ Defense Type
695
+ Goal
696
+ Target
697
+ Untarget
698
+ Model
699
+ Data
700
+ RA
701
+ AD
702
+ PipAttack
703
+ [12]
704
+
705
+
706
+ Increase/decrease popularity of target items.
707
+ FedRecAttack
708
+ [54]
709
+
710
+
711
+ Increase/decrease popularity of target items.
712
+ A-ra/A-hum
713
+ [55]
714
+
715
+
716
+ Increase/decrease popularity of target items.
717
+ FedAttack
718
+ [11]
719
+
720
+
721
+ Degrade the overall performance of FedRS.
722
+ Median
723
+ [56]
724
+
725
+ Guarantee global model convergence.
726
+ Trimmed-Mean
727
+ [56]
728
+
729
+ Guarantee global model convergence.
730
+ (Multi-)Krum
731
+ [57]
732
+
733
+ Guarantee global model convergence.
734
+ Bulyan
735
+ [58]
736
+
737
+ Guarantee global model convergence.
738
+ Norm-Bounding
739
+ [59]
740
+
741
+ Guarantee global model convergence.
742
+ A-FRS
743
+ [60]
744
+
745
+ Guarantee global model convergence.
746
+ FSAD
747
+ [61]
748
+
749
+ Identify and filter poisoned parameters.
750
+ more robust values rather than the mean values of uploaded
751
+ intermediate parameters for aggregation.
752
+ Median [56] selects the median value of each updated
753
+ model parameter independently as aggregated global model
754
+ parameter, which can represent the centre of the distribution
755
+ better. Specifically, the server ranks each i − th parameter of
756
+ n local model update, and uses the median value as i − th
757
+ parameter of global model.
758
+ Trimmed-Mean [56] removes the maximum and minimum
759
+ values of each updated model parameter independently, and
760
+ then takes the mean value as aggregated global model param-
761
+ eter. Specifically, the server ranks each i − th parameter of n
762
+ local model update, remove β smallest and β largest values,
763
+ and uses the mean value of remained n−2β as i−th parameter
764
+ of global model. In this way, Trimmed-Mean can effectively
765
+ reduce the impact of outliers.
766
+ Krum and Multi-Krum [57]. Krum selects a local model
767
+ that is the closest to the others as global model. Multi-Krum
768
+ selects multiple local models by using Krum, then aggregates
769
+ them into a global model. In this way, even if the selected
770
+ parameter vectors are uploaded by malicious clients, their
771
+ impact is still limited because they are similar to other local
772
+ parameters uploaded by normal clients.
773
+ Bulyan [58] is a combination of Krum and Trimmed-Mean,
774
+ which iteratively selects m local model parameter vectors
775
+ through Krum, and then performs Trimmed-Mean on these
776
+ m parameter vectors for aggregation. With high dimensional
777
+ and highly non-convex loss function, Bulyan can still converge
778
+ to effectual models.
779
+ Norm-Bounding [59] clips the received local parameters to
780
+ a fixed threshold, then aggregates them to update the global
781
+ model. Norm-Bounding can limit the contribution of each
782
+ local model updates so as to mitigate the affect of poisoned
783
+ parameters on the aggregated model.
784
+ A-FRS
785
+ [60]
786
+ utilizes
787
+ gradient-based
788
+ Krum
789
+ instead
790
+ of
791
+ model parameter-based Krum to filter malicious clients in
792
+ momentum-based FedRS. A-FRS theoretically guarantees that
793
+ if the selected gradient is closed to the normal gradient, the
794
+ momentum and model parameters will also be close to the
795
+ normal momentum and model parameters.
796
+ Although these robust aggregation strategies provide conver-
797
+ gence guarantees to some extent, most of them (i.e., Bulyan,
798
+ Krum, Median and Trimmed-mean) greatly degrade the per-
799
+ formance of FedRS. Besides, some noval attacks(i.e., PipAt-
800
+ tack, FedAttack) [12] [11] utilize well-designed constraints
801
+ to approximate the patterns of normal users and circumvent
802
+ defenses, which further increases the difficulty of defense.
803
+ 2) Anomaly Detection: The purpose of anomaly detection
804
+ strategy is to identify the poisoned model parameters uploaded
805
+ by malicious clients and filter them during the global model
806
+ aggregation process. For example, Jiang et al. [61] propose
807
+ an anomaly detection strategy named federated shilling attack
808
+ detector (FSAD) to detect poisoned gradients in federated
809
+ collaborative filtering scenarios. FSAD extracts 4 novel fea-
810
+ tures according to the gradients uploaded by clients, then uses
811
+ the gradient-based features to train a semi-supervised bayes
812
+ classifier so as to identify and filter the poisoned gradients.
813
+ However, in FedRS, the interests of different users vary widely,
814
+ thus the parameters they uploaded are usually quite different,
815
+ which increases the difficulty of anomaly detection [54].
816
+ V. HETEROGENEITY OF FEDERATED RECOMMENDATION
817
+ SYSTEMS
818
+ Compared with traditional recommendation systems, Fe-
819
+ dRS face more severe challenges in terms of heterogeneity,
820
+ which are mainly reflected in system heterogeneity, statistical
821
+ heterogeneity and model heterogeneity, as shown in Fig. 3.
822
+
823
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
824
+ 8
825
+ Fig. 3: Heterogeneity of federated recommendation systems.
826
+ System heterogeneity refers to client devices have signif-
827
+ icantly different storage, computation, and communication
828
+ capabilities. Devices with limited capabilities greatly affects
829
+ training efficiency, and further reduces the accuracy of the
830
+ global recommendation model. [64]; Statistical heterogeneity
831
+ refers to the data collected by different clients is usually
832
+ not independent and identically distributed (non-IID). As a
833
+ result, simply training a single global model is difficult to
834
+ generalize to all clients, which affects the personalization of
835
+ recommendations [65]; Privacy heterogeneity means that the
836
+ privacy constraints of different users and information vary
837
+ greatly, so simply treating them with the same privacy budgets
838
+ will carry unnecessary costs [66]. This section introduces some
839
+ effective approaches to address the heterogeneity of FedRS.
840
+ A. System Heterogeneity
841
+ In FedRS, the hardware configuration, network bandwidth
842
+ and battery capacity of participating clients varies greatly,
843
+ which results in diverse computing capability, communication
844
+ speed, and storage capability [16]. During the training process,
845
+ the clients with limited capacity could become stragglers, and
846
+ even drop out of current training due to network failure, low
847
+ battery and other problems [18]. The system heterogeneity
848
+ significantly delays the training process of FedRS, further
849
+ reducing the recommendation accuracy of the global model. To
850
+ make the training process compatible with different hardware
851
+ structures and tolerate the straggling and exit issues of clients,
852
+ the most common methods are asynchronous communication
853
+ [67] [18] and clients selection [68].
854
+ Asynchronous
855
+ communication.
856
+ Considering
857
+ the
858
+ syn-
859
+ chronous communication based federated learning must wait
860
+ for straggler devices during aggregation process, many asyn-
861
+ chronous communication strategies are presented to improve
862
+ training efficiency. For examples, FedSA [67] proposes a
863
+ semi-asynchronous communication method, where the server
864
+ aggregates the local models based on their arrival order of
865
+ each round. FedAsync [18] uses a weighted average strategy
866
+ to aggregate the local models based on staleness, which assigns
867
+ less weight to delayed feedback in update process.
868
+ Clients selection. Client selection approach selects clients
869
+ for updates based on resource constraints so that the server can
870
+ aggregate as many local updates as possible at the same time.
871
+ For example, in FedCS [68], the server sends a resource re-
872
+ quest to each client so as to get their resource information, then
873
+ estimates the required time of model distribution, updating
874
+ and uploading processes based on the resource information.
875
+ According to the estimated time, the server determine which
876
+ clients can participant in training process.
877
+ B. Statistical Heterogeneity
878
+ Most of the existing federated recommendation studies
879
+ are built on the assumption that data in each participant is
880
+ independent and identically distributed (IID). However, the
881
+ data distribution of each client usually varies greatly, hence
882
+ training a consistent global model is difficult to generalized
883
+ to all clients under non-IID data and inevitably neglects
884
+ the personalization of clients [66]. To address the statistical
885
+ heterogeneity problem of FedRS, many effective strategies
886
+ have been proposed, which are mainly based on meta learning
887
+ [38] [69] and clustering [70] [71].
888
+ Meta learning. As known as “learning to learn”, meta
889
+ learning technology aims to quickly adapt the global model
890
+ learned by other tasks to a new task by using only a few
891
+ number of samples [36]. The rapid adaptation and good
892
+ generalization abilities makes it particularly well-suited for
893
+ building personalized federated recommendation models. For
894
+ examples, FedMeta [38] uses Model-Agnostic Meta-Learning
895
+ (MAML) [73] algorithm to learn a well-initialized model that
896
+ can be quickly adapted to clients, and effectively improve the
897
+ personalization and convergence of FedRS. However, FedMeta
898
+
899
+ Privacy
900
+ Heterogenity
901
+ 8
902
+ Private
903
+ Public
904
+ Private
905
+ Public
906
+ 8
907
+ user
908
+ item
909
+ attributes
910
+ Statistical
911
+ Heterogenity
912
+ battery
913
+ Data Distribution
914
+ Data Distribution
915
+ l
916
+ 4/5G
917
+ Wi-Fi
918
+ System
919
+ Heterogenity
920
+ Participant 2
921
+ Participant 2IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
922
+ 9
923
+ needs to compute the second-order gradients, which greatly
924
+ increases computation costs. Besides, the data split process
925
+ also brings a huger challenge for clients with limited samples.
926
+ Based on FedMeta, Wang et al. [69] propose a new meta
927
+ learning algorithm called Reptile which applies the approx-
928
+ imate first-order derivatives for the meta-learning updates,
929
+ which greatly reduces the computation overloads of clients.
930
+ Moreover, Reptile doesn’t need a data split process, which
931
+ makes it also suitable for clients with limited samples.
932
+ Clustering. The core idea of clustering is training person-
933
+ alized models jointly with the same group of homogeneous
934
+ clients. For examples, Jie et al. [70] uses historical parameter
935
+ clustering technology to realize personalized federated recom-
936
+ mendation, in which the server aggregates local parameters to
937
+ generate global model parameters and clusters the local pa-
938
+ rameters to generate clustering parameters for different client
939
+ groups. Then the clients combine the clustering parameters
940
+ with the global parameters to learn personalized models. Luo
941
+ et al. [71] propose a personalized federated recommendation
942
+ framework named PerFedRec, which constructs a collaborative
943
+ graph and integrates attribute information so as to jointly learn
944
+ the user representations by federated GNN. Based on the
945
+ learned user representations, clients are clustered into different
946
+ groups. And each cluster learns a cluster-level recommen-
947
+ dation model. At last, each client can obtain a personalized
948
+ model by merging the global recommendation model, the
949
+ cluster-level recommendation model, and the fine-tuned local
950
+ recommendation model. Although clustering based approaches
951
+ can alleviate statistical heterogeneity, the clustering and com-
952
+ bination process greatly increase the computation costs.
953
+ C. Privacy Heterogeneity
954
+ In reality, the privacy restrictions of different participants
955
+ and information vary greatly, thereby using the same high level
956
+ of privacy budget for all participants and information is unnec-
957
+ essary, which even increases the computation/communication
958
+ costs and degrades the model performance.
959
+ Heterogeneous user privacy. In order to adapt the privacy
960
+ needs for different users, Anelli et al. [72] present a user
961
+ controlled federated recommendation framework named Fed-
962
+ eRank. FedeRank introduces a probability factor π ∈ [0, 1] to
963
+ control the proportion of interacted item updates and masks
964
+ the remain interacted item update by setting them to zero.
965
+ In this way, FedeRank allows users decide the proportion of
966
+ data they want to share by themselves, which addresses the
967
+ heterogeneity of user privacy.
968
+ Heterogeneous information privacy. In order to adapt the
969
+ privacy needs of different information components, HPFL [66]
970
+ designs a differentiated component aggregation strategy. To
971
+ obtain the global public information components, the server
972
+ directly weighted aggregates the local public components with
973
+ same properties. And to obtain the global privacy information
974
+ components, the user and item representations are kept locally,
975
+ and the server only aggregates the local drafts without the need
976
+ to align the presentations. With the differentiated component
977
+ aggregation strategy, HPFL can safely aggregate components
978
+ with heterogeneous privacy constraints in user modeling sce-
979
+ narios.
980
+ VI. COMMUNICATION COSTS OF FEDERATED
981
+ RECOMMENDATION SYSTEMS
982
+ To achieve satisfactory recommendation performance, Fe-
983
+ dRS requires multiple communications between server and
984
+ clients. However, the real-world recommendation systems are
985
+ usually conducted by complexity deep learning models with
986
+ large model size [74], and millions of parameters needs to
987
+ be updated and communicated [13], which brings severe
988
+ communication overload to resource limited clients and further
989
+ affects the application of FedRS in large-scale industrial sce-
990
+ narios. This section summarizes some optimization methods to
991
+ reduce communication costs of FedRS, which can be classified
992
+ into importance-based updating [75] [20] [76] [77], model
993
+ compression [78] [79], active sampling [80] and one shot
994
+ learning [81].
995
+ A. Importance-based Model Updating
996
+ Importance-based model updating selects importance parts
997
+ of the global model instead of the whole model to update and
998
+ communicate, which can effectively reduce the communicated
999
+ parameter size in each round.
1000
+ For examples, Qin et al. [75] propose a federated frame-
1001
+ work named PPRSF, which uses 4-layers hierarchical structure
1002
+ for reducing communication costs, including the recall layer,
1003
+ ranking layer, re-ranking layer and service layer. In the recall
1004
+ layer, the server roughly sorts the large inventory by using
1005
+ public user data, and recalls relatively small number of items
1006
+ for each client. In this way, the clients only need to update and
1007
+ communicate the candidate item embeddings, which greatly
1008
+ reduces the communication costs between server and clients,
1009
+ and the computation costs in the local model training and
1010
+ inference phases. However, the recall layer of PPRSF need
1011
+ to get some public information of users, which raises certain
1012
+ difficulty and privacy concerns.
1013
+ Yi et al. [20] propose an efficient federated news recom-
1014
+ mendation framework called Efficient-FedRec, which breaks
1015
+ the news recommendation model into a small user model and
1016
+ a big news model. Each client only requests the user model and
1017
+ a few news representations involved in their local click history
1018
+ for local training, which greatly reduces the communication
1019
+ and computation overhead. To further protect specific user
1020
+ click history against the server, they transmit the union news
1021
+ representations set involved in a group of user click history
1022
+ by using a secure aggregation protocol [82].
1023
+ Besides, Khan et al. [76] propose a multi-arm bandit
1024
+ method (FCF-BTS) to select part of the global model that
1025
+ contains a smaller payload to all clients. The rewards of
1026
+ selection process is guided by Bayesian Thompson Sampling
1027
+ (BTS) [83] approach with Gaussian priors. Experiments show
1028
+ that FCF-BTS can reduce 90% model payload for highly
1029
+ sparse datasets. Besides, the selection process occurs in the
1030
+ server side, thus avoiding additional computation costs on the
1031
+ clients. But FCF-BTS causes 4% - 8% loss in recommendation
1032
+ accuracy.
1033
+ To achieve a better balance between recommendation ac-
1034
+ curacy and efficiency, Ai et al. [77] propose an all-MLP
1035
+
1036
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
1037
+ 10
1038
+ network that uses a Fourier sub-layer to replace the self-
1039
+ attention sub-layer in a Transformer encoder so as to filter
1040
+ noise data components unrelated to the user’s real interests,
1041
+ and adapts an adaptive model pruning technique to discard
1042
+ the noise model components that doesn’t contribute to model
1043
+ performance. Experiments show that all-MLP network can
1044
+ significantly reduce communication and computation costs,
1045
+ and accelerates the model convergence.
1046
+ Importance-based model updating strategies can greatly
1047
+ reduce communication and computation costs at the same time,
1048
+ but only selecting the important parts for updating inevitably
1049
+ reduces the recommendation performance.
1050
+ B. Model Compression
1051
+ Model Compression is a well-known technology in dis-
1052
+ tributed learning [84], which compresses the communicated
1053
+ parameters per round to be more compact.
1054
+ For examples, Konen et al. [78] propose two methods
1055
+ (i.e., structured updates and sketched updates) to decrease the
1056
+ uplink communication costs under federated learning settings.
1057
+ Structured updates method directly learns updates from a
1058
+ pre-specified structure parameterized using fewer variables.
1059
+ Sketched updates method compresses the full local update
1060
+ using a lossy compression way before sending it to server.
1061
+ These two strategies can reduce the communication costs by
1062
+ 2 orders of magnitude.
1063
+ To reduce the uplink communication costs in deep learning
1064
+ based FedRS, JointRec [79] combines low-rank matrix factor-
1065
+ ization [85] and 8-bit probabilistic quantization [86] methods
1066
+ to compress weight update. Supposing the weight update ma-
1067
+ trix of client n is Ha×b
1068
+ n
1069
+ , a ≤ b, low-rank matrix factorization
1070
+ decomposes Ha×b
1071
+ n
1072
+ into two matrices: Ha×b
1073
+ n
1074
+ = U a×k
1075
+ n
1076
+ V k×b
1077
+ n
1078
+ ,
1079
+ where k = b/N and N is a positive number that influences the
1080
+ compression performance. And 8-bit probabilistic quantization
1081
+ method transforms the position of matrix value into 8-bit value
1082
+ before send it to server. Experiments demonstrate that JointRec
1083
+ can realize 12.83× larger compression ratio while maintaining
1084
+ recommendation performance.
1085
+ Model compression methods achieve significant results in
1086
+ reducing the uplink communication costs. However, the re-
1087
+ duction of communication cost sacrifices the computation
1088
+ resources of the clients, so it’s necessary to consider the trade-
1089
+ off between computation and communication costs when using
1090
+ model compression.
1091
+ C. Client Sampling
1092
+ In traditional federated learning frameworks [8], the server
1093
+ randomly selects clients to participate in the training process
1094
+ and simply aggregates the local models by average, which
1095
+ requires a large number of communications to realize satis-
1096
+ factory accuracy. Client sampling utilizes efficient sampling
1097
+ strategies so as to improve the training efficiency and reduce
1098
+ the communication rounds.
1099
+ For example, Muhammad et al. [80] propose an effective
1100
+ sampling strategy named FedFast to speed up the training
1101
+ efficiency of federated recommendation models while keeping
1102
+ more accuracy. FadFast consists of two efficient components:
1103
+ ActvSAMP and ActvAGG. ActvSAMP uses K-means algo-
1104
+ rithm to cluster users based on their profile, and samples
1105
+ clients in equal proportions from each cluster. And ActvAGG
1106
+ propagates local updates to the other clients in the same
1107
+ cluster. In this way, the learning process for these similar
1108
+ users is greatly accelerated and overall efficiency of the FedRS
1109
+ is consequently improved. Experiments show that FedFast
1110
+ reduces communication rounds by 94% compared to FedAvg
1111
+ [8]. However, FedFast is faced with the cold start problem
1112
+ because it requires a number of users and items for training.
1113
+ Besides, FedFast needs to retrain the model to support new
1114
+ users and items.
1115
+ D. One Shot Federated Learning
1116
+ The goal of one shot federated learning mechanism is to
1117
+ reduce communication rounds of FedRS [87] [88], which lim-
1118
+ its communication to a single round to aggregate knowledge
1119
+ of local models. For example, Eren et al. [81] implement
1120
+ an one-shot federated learning framework for cross-platform
1121
+ FedRS named FedSPLIT. FedSPLIT aggregates model through
1122
+ knowledge distillation [89], which can generate client specific
1123
+ recommendation results with just a single pair of communica-
1124
+ tion rounds between the server and clients after a small initial
1125
+ communication. Experiments show that FedSPLIT realizes
1126
+ similar root-mean-square error (RMSE) compared with multi-
1127
+ round communication scenarios, but it is not applicable to the
1128
+ scenario where the participant is a individual user.
1129
+ VII. OPEN SOURCE PLATFORMS
1130
+ This section introduces five open source platforms that can
1131
+ be used to build FedRS: Federated AI Technology Enabler
1132
+ (Fate)1, Tensorflow Federated (TFF)2, Pysyft3, PaddleFL4, and
1133
+ FederatedScope5. The comparison among some existing open
1134
+ source platforms is shown in Table III.
1135
+ A. Federated AI Technology Enabler
1136
+ Federated AI Technology Enabler (Fate) [90] is the first
1137
+ open source platform for federated learning around the world,
1138
+ which aims to enable companies and organizations to collab-
1139
+ orate on data while keeping data privacy and security. Fate
1140
+ supports various machine learning algorithms under federated
1141
+ learning settings, including logistic regression, XGBOOST,
1142
+ deep learning and transfer learning. Besides, Fate integrates
1143
+ homomorphic encryption, differential privacy and secret shar-
1144
+ ing mechanisms to protect privacy against the curious server.
1145
+ The structure of FATE consists of seven major modules:
1146
+ FederatedML, EggRoll, FATE-FLow, FATE-Board, FATE-
1147
+ Serving, KubeFATE and FATE-cloud. FederatedML imple-
1148
+ ments privacy-preserving federated machine learning algo-
1149
+ rithms; EggRoll manages the distributed computation frame-
1150
+ work; FATE-FLow coordinates the execution of the algorithm
1151
+ 1https://github.com/FederatedAI/FATE
1152
+ 2https://github.com/tensorflow/federated
1153
+ 3https://github.com/OpenMined/PySyft
1154
+ 4https://github.com/PaddlePaddle/PaddleFL
1155
+ 5https://github.com/alibaba/FederatedScope
1156
+
1157
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
1158
+ 11
1159
+ components; FATE-Board provides visualization for building
1160
+ and evaluating models; FATE-Serving provides online infer-
1161
+ ence for the users; KubeFATE helps deploy Fate platform by
1162
+ using cloud native technologies; FATE-cloud provide cross-
1163
+ cloud deployment and management services.
1164
+ Fate provides a federated recommendation module (Federat-
1165
+ edRec) to solve the recommendation problems of rate predic-
1166
+ tion and item ranking tasks. FederatedRec implements many
1167
+ common recommendation algorithms under federated learning
1168
+ settings, including factorization machine, matrix factorization,
1169
+ SVD, SVD++ and generalized matrix factorization.
1170
+ B. Tensorflow Federated
1171
+ Tensorflow Federated (TFF) [91] is a lightweight system
1172
+ developed by Google, which provides the building blocks to
1173
+ enables developers to implement own federated models based
1174
+ on TensorFlow. Besides, developers can plug any existing
1175
+ Keras model into TFF with just a few lines of code. To
1176
+ enhancing privacy guarantees for federated learning, TFF
1177
+ integrates differential privacy mechanism.
1178
+ The interfaces of TFF are organized in two layers API (i.e.,
1179
+ Federated Learning API and Federated Core API). Federated
1180
+ Learning API implements high-level interfaces for developers
1181
+ to make training and evaluation process of federated learning.
1182
+ Federated Core API provides lower-level interfaces to express
1183
+ novel federated learning algorithms by using TensorFlow and
1184
+ distributed communication operators.
1185
+ Based on TFF, Singhal et al. [92] implements a model-
1186
+ agnostic framework for fast partial local federated learning,
1187
+ which is suitable for large-scale collaborative filtering recom-
1188
+ mendation scenarios.
1189
+ C. Pysyft
1190
+ PySyft [93] is developed by Open-Mined, which also pro-
1191
+ vides the building blocks for developers to implement own
1192
+ federated recommendation algorithms. Compared with TFF,
1193
+ PySyft can work with both Tensorflow and Pytorch. For
1194
+ privacy protection, PySyft can flexibly and simply integrate
1195
+ homomorphic encryption, differential privacy and secret shar-
1196
+ ing mechanisms so as to defend against the honest-but-curious
1197
+ server and participants. However, Pysyft doesn’t disclose the
1198
+ detailed interface design or system architecture.
1199
+ D. PaddleFL
1200
+ PaddleFL [94] is an open source federated learning platform
1201
+ developed by Baidu, which integrates both differential privacy
1202
+ and secret sharing mechanisms to provide privacy guarantees.
1203
+ PaddleFL contains two major components: Data Parallel and
1204
+ Federated Learning with MPC (PFM). Data Parallel is respon-
1205
+ sible for defining, distributing and training a federated learning
1206
+ task. PFM implements secure multi-party computation to
1207
+ ensure training and inference security.
1208
+ PaddleFL provides many federated recommendation algo-
1209
+ rithms that can be used directly. For example, PaddleFL
1210
+ implements a classical session-based recommendation model
1211
+ Gru4rec [95] under the federated learning settings and provide
1212
+ simulated experiments on real world dataset. But the simulated
1213
+ experiment suppose all datasets in different organizations are
1214
+ homogeneous, which is only satisfied under ideal case. In
1215
+ addition, PaddleFL also provides a strategy to train a Click-
1216
+ Through-Rate(CTR) model by using FedAvg [8] algorithm.
1217
+ E. FederatedScope
1218
+ FederatedScope [96], developed by Alibaba, is a flexible
1219
+ federated learning platform for heterogeneity. FederatedScope
1220
+ employs an event-driven architecture to support asynchronous
1221
+ training, and coordinate participants with personalized be-
1222
+ haviors and multiple goals into federated learning scenarios.
1223
+ FederatedScope can easily support different machine learning
1224
+ libraries such as Tensorflow and Pytorch. Besides, Federat-
1225
+ edScope enables various kinds of plug-in components and
1226
+ operations thar can be used for efficient further development.
1227
+ For privacy protection plug-ins, FederatedScope integrates ho-
1228
+ momorphic encryption, differential privacy and secret sharing
1229
+ mechanisms to enhance privacy guarantees. In the federated
1230
+ recommendation scenario, FederatedScope has built in matrix
1231
+ factorization models, datasets (Netflix and MovieLen) and
1232
+ trainer under different federated learning settings.
1233
+ VIII. FUTURE DIRECTIONS
1234
+ This section presents and discusses many prospective re-
1235
+ search directions in the future. Although some directions have
1236
+ been covered in above sections, we believe they are necessary
1237
+ for FedRS, and need to be further researched.
1238
+ Decentralized FedRS. Most of current FedRS are based on
1239
+ client-server communication architecture, which faces single-
1240
+ point-of-failure and privacy issues caused by the central server
1241
+ [97]. While much work has been devoted to decentralized
1242
+ federated learning [98] [99], few decentralized FedRS have
1243
+ been studied. A feasible solution is to replace client-server
1244
+ communication architecture with peer-peer communication
1245
+ architecture to achieve fully decentralized federated recom-
1246
+ mendation. Hegeds et al. [19] propose a fully decentralized
1247
+ matrix factorization framework based on gossip learning [100],
1248
+ where each participant sends their copy of the global recom-
1249
+ mendation model to random online neighbors in the peer to
1250
+ peer network.
1251
+ Incentive mechanisms in FedRS. FedRS collaborate with
1252
+ multiple participants to train a global recommendation model,
1253
+ and the recommendation performance of global model is
1254
+ highly dependent on the quantity and quality of data provided
1255
+ by the participants. Therefore, it is significant to design an
1256
+ appropriate incentive mechanism to inspire participants to
1257
+ contribute their own data and participate in collaborative
1258
+ training, especially in the cross-organization federated recom-
1259
+ mendation scenarios. The incentive mechanisms must be able
1260
+ to measure the clients’ contribution to the global model fairly
1261
+ and efficiently.
1262
+ Privacy of serving phase. Although many studies have
1263
+ combined different privacy mechanisms to protect user privacy
1264
+ in the training phase of FedRS, the privacy protection for
1265
+ the serving phase is still underexplored. To prevent user
1266
+ recommendation results from leaking, most of the current
1267
+
1268
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
1269
+ 12
1270
+ TABLE III: The comparison among some existing open source platforms.
1271
+ Platforms
1272
+ Fate
1273
+ TFF
1274
+ Pysyft
1275
+ PaddleFL
1276
+ FederatedScope
1277
+ Publisher
1278
+ WeBank
1279
+ Google
1280
+ OpenMined
1281
+ Baidu
1282
+ Alibaba
1283
+ Audience
1284
+ Academia
1285
+
1286
+
1287
+
1288
+
1289
+
1290
+ Industry
1291
+
1292
+
1293
+ Models
1294
+ Neural Network
1295
+
1296
+
1297
+
1298
+
1299
+
1300
+ Tree Model
1301
+
1302
+
1303
+ Linear Model
1304
+
1305
+
1306
+
1307
+
1308
+
1309
+ Privacy
1310
+ Homomorphic encryption
1311
+
1312
+
1313
+
1314
+ Differential Privacy
1315
+
1316
+
1317
+
1318
+
1319
+
1320
+ Secret Sharing
1321
+
1322
+
1323
+
1324
+ Libraries
1325
+ Tensorflow
1326
+
1327
+
1328
+
1329
+ Pytorch
1330
+
1331
+
1332
+ studies assume local serving, where the server sends the entire
1333
+ set of candidate items to clients, and clients generate rec-
1334
+ ommendation results locally [10] [21]. However, such design
1335
+ brings enormous communication, computation and memory
1336
+ costs for clients since there are usually millions of items in
1337
+ real-world recommendation systems. Another feasible solution
1338
+ is online serving, where clients send encrypted or noised user
1339
+ embedding to the server to recall top-N candidate items, then
1340
+ clients generate personalized recommendation results based
1341
+ one these candidate items [101]. Nevertheless, there is a risk
1342
+ of privacy leakage associated with online serving, because
1343
+ recalled items are known to the server.
1344
+ Cold start problem in FedRS. The cold start problem
1345
+ means that recommendation systems cannot generate satisfac-
1346
+ tory recommendation results for new users with little history
1347
+ interactions. In federated settings, the user data is stored
1348
+ locally, so it is more difficult to integrate other auxiliary
1349
+ information (e.g., social relationships) to alleviate the cold
1350
+ start problem. Therefore, it is a challenging and prospective
1351
+ research direction to address the cold start problem while
1352
+ ensuring user privacy.
1353
+ Secure FedRS. In the real world, the participants in the
1354
+ FedRS are likely to be untrustworthy. Therefore, participants
1355
+ may upload poisoned intermediate parameters to affect rec-
1356
+ ommendation results or destroy recommendation performance.
1357
+ Although some robust aggregation strategies [57] and detec-
1358
+ tion methods [61] have been proposed to defense poisoning
1359
+ attacks in federated learning settings, most of them does not
1360
+ work well in FedRS. One one hand, some strategies such
1361
+ as Krum, Median and Trimmed-mean degrade the recom-
1362
+ mendation performance to a certain extend. One the other
1363
+ hand, some novel attacks [11] use well-designed constraints to
1364
+ mimic the patterns of normal users, extremely increasing the
1365
+ difficulty to be detected and defensed. Currently, there is still
1366
+ no effective defense methods against these poisoning attacks
1367
+ while maintaining recommendation accuracy.
1368
+ IX. CONCLUSION
1369
+ A lot of effort has been devoted to federated recommen-
1370
+ dation systems. A comprehensive survey is significant and
1371
+ meaningful. This survey summarizes the latest studies from
1372
+ aspects of the privacy, security, heterogeneity and commu-
1373
+ nication costs. Based on these aspects, we also make a
1374
+ detailed comparison among the existing designs and solutions.
1375
+ Moreover, we present many prospective research directions to
1376
+ promote development in this field. FedRS will be a promising
1377
+ field with huge potential opportunities, which requires more
1378
+ efforts to develop.
1379
+ ACKNOWLEDGMENTS
1380
+ This research is partially supported by the National Key
1381
+ R&D Program of China No.2021YFF0900800, the NSFC
1382
+ No.91846205, the Shandong Provincial Key Research and De-
1383
+ velopment Program (Major Scientific and Technological Inno-
1384
+ vation Project) (No.2021CXGC010108), the Shandong Provin-
1385
+ cial Natural Science Foundation (No.ZR202111180007), the
1386
+ Fundamental Research Funds of Shandong University, and
1387
+ the Special Fund for Science and Technology of Guangdong
1388
+ Province under Grant (2021S0053).
1389
+ REFERENCES
1390
+ [1] B. Sarwar, G. Karypis, J. Konstan, and J. Riedl, “Analysis of recom-
1391
+ mendation algorithms for e-commerce,” in Proceedings of the 2nd ACM
1392
+ Conference on Electronic Commerce, pp. 158–167, 2000.
1393
+ [2] J. B. Schafer, J. A. Konstan, and J. Riedl, “E-commerce recommenda-
1394
+ tion applications,” Data mining and knowledge discovery, vol. 5, no. 1,
1395
+ pp. 115–153, 2001.
1396
+ [3] G. Zheng, F. Zhang, Z. Zheng, Y. Xiang, N. J. Yuan, X. Xie, and
1397
+ Z. Li, “Drn: A deep reinforcement learning framework for news rec-
1398
+ ommendation,” in Proceedings of the 2018 world wide web conference,
1399
+ pp. 167–176, 2018.
1400
+ [4] J. Liu, P. Dolan, and E. R. Pedersen, “Personalized news recommenda-
1401
+ tion based on click behavior,” in Proceedings of the 15th international
1402
+ conference on Intelligent user interfaces, pp. 31–40, 2010.
1403
+ [5] W. Yue, Z. Wang, J. Zhang, and X. Liu, “An overview of recom-
1404
+ mendation techniques and their applications in healthcare,” IEEE/CAA
1405
+ Journal of Automatica Sinica, vol. 8, no. 4, pp. 701–717, 2021.
1406
+
1407
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
1408
+ 13
1409
+ [6] J. Kim, D. Lee, and K.-Y. Chung, “Item recommendation based on
1410
+ context-aware model for personalized u-healthcare service,” Multime-
1411
+ dia Tools and Applications, vol. 71, no. 2, pp. 855–872, 2014.
1412
+ [7] J. P. Albrecht, “How the gdpr will change the world,” Eur. Data Prot.
1413
+ L. Rev., vol. 2, p. 287, 2016.
1414
+ [8] B. McMahan, E. Moore, D. Ramage, S. Hampson, and B. A. y Arcas,
1415
+ “Communication-efficient learning of deep networks from decentral-
1416
+ ized data,” in Artificial intelligence and statistics, pp. 1273–1282,
1417
+ PMLR, 2017.
1418
+ [9] L. Zhu, Z. Liu, and S. Han, “Deep leakage from gradients,” Advances
1419
+ in neural information processing systems, vol. 32, 2019.
1420
+ [10] D. Chai, L. Wang, K. Chen, and Q. Yang, “Secure federated matrix
1421
+ factorization,” Intelligent Systems, IEEE, vol. PP, no. 99, pp. 1–1, 2020.
1422
+ [11] C. Wu, F. Wu, T. Qi, Y. Huang, and X. Xie, “Fedattack: Effective
1423
+ and covert poisoning attack on federated recommendation via hard
1424
+ sampling,” in Proceedings of the 28th ACM SIGKDD Conference on
1425
+ Knowledge Discovery and Data Mining, KDD ’22, (New York, NY,
1426
+ USA), p. 4164–4172, Association for Computing Machinery, 2022.
1427
+ [12] S. Zhang, H. Yin, T. Chen, Z. Huang, Q. V. H. Nguyen, and L. Cui,
1428
+ “Pipattack: Poisoning federated recommender systems for manipulating
1429
+ item promotion,” in Proceedings of the Fifteenth ACM International
1430
+ Conference on Web Search and Data Mining, pp. 1415–1423, 2022.
1431
+ [13] C.-L. Liao and S.-J. Lee, “A clustering based approach to improving
1432
+ the efficiency of collaborative filtering recommendation,” Electronic
1433
+ Commerce Research and Applications, vol. 18, pp. 1–9, 2016.
1434
+ [14] G. Adomavicius and A. Tuzhilin, “Toward the next generation of
1435
+ recommender systems: a survey of the state-of-the-art and possible
1436
+ extensions,” IEEE Transactions on Knowledge and Data Engineering,
1437
+ vol. 17, no. 6, pp. 734–749, 2005.
1438
+ [15] Q. Yang, Y. Liu, T. Chen, and Y. Tong, “Federated machine learning:
1439
+ Concept and applications,” ACM Transactions on Intelligent Systems
1440
+ and Technology, vol. 10, no. 2, pp. 1–19, 2019.
1441
+ [16] T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, “Federated learning:
1442
+ Challenges, methods, and future directions,” IEEE Signal Processing
1443
+ Magazine, vol. 37, no. 3, pp. 50–60, 2020.
1444
+ [17] L. Yang, B. Tan, V. W. Zheng, K. Chen, and Q. Yang, “Federated rec-
1445
+ ommendation systems,” in Federated Learning, pp. 225–239, Springer,
1446
+ 2020.
1447
+ [18] C. Xie, S. Koyejo, and I. Gupta, “Asynchronous federated optimiza-
1448
+ tion,” arXiv preprint arXiv:1903.03934, 2019.
1449
+ [19] I. Heged˝us, G. Danner, and M. Jelasity, “Decentralized recommenda-
1450
+ tion based on matrix factorization: a comparison of gossip and fed-
1451
+ erated learning,” in Joint European Conference on Machine Learning
1452
+ and Knowledge Discovery in Databases, pp. 317–332, Springer, 2019.
1453
+ [20] J. Yi, F. Wu, C. Wu, R. Liu, G. Sun, and X. Xie, “Efficient-fedrec:
1454
+ Efficient federated learning framework for privacy-preserving news
1455
+ recommendation,” arXiv preprint arXiv:2109.05446, 2021.
1456
+ [21] M. Ammad-Ud-Din, E. Ivannikova, S. A. Khan, W. Oyomno, Q. Fu,
1457
+ K. E. Tan, and A. Flanagan, “Federated collaborative filtering
1458
+ for privacy-preserving personalized recommendation system,” arXiv
1459
+ preprint arXiv:1901.09888, 2019.
1460
+ [22] G. Lin, F. Liang, W. Pan, and Z. Ming, “Fedrec: Federated recom-
1461
+ mendation with explicit feedback,” Intelligent Systems, IEEE, vol. PP,
1462
+ no. 99, pp. 1–1, 2020.
1463
+ [23] C. Chen, L. Li, B. Wu, C. Hong, L. Wang, and J. Zhou, “Se-
1464
+ cure social recommendation based on secret sharing,” arXiv preprint
1465
+ arXiv:2002.02088, 2020.
1466
+ [24] WuChuhan, WuFangzhao, LyuLingjuan, HuangYongfeng, and XieX-
1467
+ ing, “Fedctr: Federated native ad ctr prediction with cross platform
1468
+ user behavior data,” ACM Transactions on Intelligent Systems and
1469
+ Technology (TIST), 2021.
1470
+ [25] S. Kalloori and S. Klingler, “Horizontal cross-silo federated recom-
1471
+ mender systems,” in Fifteenth ACM Conference on Recommender
1472
+ Systems, pp. 680–684, 2021.
1473
+ [26] Koren, Yehuda, Bell, Robert, Volinsky, and Chris, “Matrix factorization
1474
+ techniques for recommender systems.,” Computer, vol. 42, no. 8,
1475
+ pp. 30–37, 2009.
1476
+ [27] K. Dolui, I. Cuba Gyllensten, D. Lowet, S. Michiels, H. Hallez,
1477
+ and D. Hughes, “Towards privacy-preserving mobile applications with
1478
+ federated learning: The case of matrix factorization (poster),” in
1479
+ Proceedings of the 17th Annual International Conference on Mobile
1480
+ Systems, Applications, and Services, pp. 624–625, 2019.
1481
+ [28] J. Hua, C. Xia, and S. Zhong, “Differentially private matrix factoriza-
1482
+ tion,” in Proceedings of the 24th International Conference on Artificial
1483
+ Intelligence, IJCAI’15, p. 1763–1770, AAAI Press, 2015.
1484
+ [29] S. Ying, “Shared mf: A privacy-preserving recommendation system,”
1485
+ arXiv preprint arXiv:2008.07759, 2020.
1486
+ [30] V. Perifanis and P. S. Efraimidis, “Federated neural collaborative
1487
+ filtering,” Knowledge-Based Systems, vol. 242, p. 108441, 2022.
1488
+ [31] C. Wu, F. Wu, Y. Cao, Y. Huang, and X. Xie, “Fedgnn: Federated
1489
+ graph neural network for privacy-preserving recommendation,” arXiv
1490
+ preprint arXiv:2102.04925, 2021.
1491
+ [32] M. Imran, H. Yin, T. Chen, N. Q. V. Hung, A. Zhou, and K. Zheng,
1492
+ “Refrs: Resource-efficient federated recommender system for dynamic
1493
+ and diversified user preferences,” ACM Trans. Inf. Syst., aug 2022. Just
1494
+ Accepted.
1495
+ [33] X. He, L. Liao, H. Zhang, L. Nie, X. Hu, and T.-S. Chua, “Neural
1496
+ collaborative filtering,” in Proceedings of the 26th international con-
1497
+ ference on world wide web, pp. 173–182, 2017.
1498
+ [34] M. Huang, H. Li, B. Bai, C. Wang, K. Bai, and F. Wang, “A
1499
+ federated multi-view deep learning framework for privacy-preserving
1500
+ recommendations,” arXiv preprint arXiv:2008.10808, 2020.
1501
+ [35] P.-S. Huang, X. He, J. Gao, L. Deng, A. Acero, and L. Heck, “Learning
1502
+ deep structured semantic models for web search using clickthrough
1503
+ data,” in Proceedings of the 22nd ACM international conference on
1504
+ Information & Knowledge Management, pp. 2333–2338, 2013.
1505
+ [36] W.-Y.
1506
+ Chen,
1507
+ Y.-C.
1508
+ Liu,
1509
+ Z.
1510
+ Kira,
1511
+ Y.-C.
1512
+ F.
1513
+ Wang,
1514
+ and
1515
+ J.-B.
1516
+ Huang, “A closer look at few-shot classification,” arXiv preprint
1517
+ arXiv:1904.04232, 2019.
1518
+ [37] A. Nichol, J. Achiam, and J. Schulman, “On first-order meta-learning
1519
+ algorithms,” arXiv preprint arXiv:1803.02999, 2018.
1520
+ [38] F. Chen, M. Luo, Z. Dong, Z. Li, and X. He, “Federated meta-learning
1521
+ with fast convergence and efficient communication,” arXiv preprint
1522
+ arXiv:1802.07876, 2018.
1523
+ [39] F. Liang, W. Pan, and Z. Ming, “Fedrec++: Lossless federated rec-
1524
+ ommendation with explicit feedback,” in Proceedings of the AAAI
1525
+ conference on artificial intelligence, vol. 35, pp. 4224–4231, 2021.
1526
+ [40] A. Abbas, A. Hidayet, U. A. Selcuk, and C. Mauro, “A survey on
1527
+ homomorphic encryption schemes: Theory and implementation,” Acm
1528
+ Computing Surveys, vol. 51, no. 4, pp. 1–35, 2017.
1529
+ [41] P. Paillier, “Public-key cryptosystems based on composite degree
1530
+ residuosity classes,” in International conference on the theory and
1531
+ applications of cryptographic techniques, pp. 223–238, Springer, 1999.
1532
+ [42] V. Perifanis, G. Drosatos, G. Stamatelatos, and P. S. Efraimidis,
1533
+ “Fedpoirec: Privacy preserving federated poi recommendation with
1534
+ social influence,” arXiv preprint arXiv:2112.11134, 2021.
1535
+ [43] J. H. Cheon, A. Kim, M. Kim, and Y. Song, “Homomorphic encryption
1536
+ for arithmetic of approximate numbers,” in International conference
1537
+ on the theory and application of cryptology and information security,
1538
+ pp. 409–437, Springer, 2017.
1539
+ [44] Z. Liu, L. Yang, Z. Fan, H. Peng, and P. S. Yu, “Federated social
1540
+ recommendation with graph neural network,” ACM Transactions on
1541
+ Intelligent Systems and Technology (TIST), vol. 13, no. 4, pp. 1–24,
1542
+ 2022.
1543
+ [45] Z. Lin, W. Pan, and Z. Ming, “Fr-fmss: federated recommendation
1544
+ via fake marks and secret sharing,” in Fifteenth ACM Conference on
1545
+ Recommender Systems, pp. 668–673, 2021.
1546
+ [46] C. Dwork, “Calibrating noise to sensitivity in private data analysis,”
1547
+ Lecture Notes in Computer Science, vol. 3876, no. 8, pp. 265–284,
1548
+ 2012.
1549
+ [47] M. Hardt and K. Talwar, “On the geometry of differential privacy,”
1550
+ in Proceedings of the forty-second ACM symposium on Theory of
1551
+ computing, pp. 705–714, 2010.
1552
+ [48] B. Li, Y. Wang, A. Singh, and Y. Vorobeychik, “Data poisoning
1553
+ attacks on factorization-based collaborative filtering,” Advances in
1554
+ neural information processing systems, vol. 29, 2016.
1555
+ [49] M. Welling and Y. W. Teh, “Bayesian learning via stochastic gradient
1556
+ langevin dynamics,” in Proceedings of the 28th international confer-
1557
+ ence on machine learning (ICML-11), pp. 681–688, 2011.
1558
+ [50] M. Fang, G. Yang, N. Z. Gong, and J. Liu, “Poisoning attacks to
1559
+ graph-based recommender systems,” in Proceedings of the 34th annual
1560
+ computer security applications conference, pp. 381–392, 2018.
1561
+ [51] H. Huang, J. Mu, N. Z. Gong, Q. Li, B. Liu, and M. Xu, “Data
1562
+ poisoning attacks to deep learning based recommender systems,” arXiv
1563
+ preprint arXiv:2101.02644, 2021.
1564
+ [52] H. Zhang, Y. Li, B. Ding, and J. Gao, “Practical data poisoning
1565
+ attack against next-item recommendation,” in Proceedings of The Web
1566
+ Conference 2020, pp. 2458–2464, 2020.
1567
+ [53] V. Mnih, K. Kavukcuoglu, D. Silver, A. Graves, I. Antonoglou,
1568
+ D. Wierstra, and M. Riedmiller, “Playing atari with deep reinforcement
1569
+ learning,” arXiv preprint arXiv:1312.5602, 2013.
1570
+ [54] D. Rong, S. Ye, R. Zhao, H. N. Yuen, J. Chen, and Q. He, “Fedrecat-
1571
+ tack: Model poisoning attack to federated recommendation,” arXiv
1572
+ preprint arXiv:2204.01499, 2022.
1573
+
1574
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
1575
+ 14
1576
+ [55] D. Rong, Q. He, and J. Chen, “Poisoning deep learning based
1577
+ recommender model in federated learning scenarios,” arXiv preprint
1578
+ arXiv:2204.13594, 2022.
1579
+ [56] D. Yin, Y. Chen, R. Kannan, and P. Bartlett, “Byzantine-robust dis-
1580
+ tributed learning: Towards optimal statistical rates,” in International
1581
+ Conference on Machine Learning, pp. 5650–5659, PMLR, 2018.
1582
+ [57] P. Blanchard, E. M. El Mhamdi, R. Guerraoui, and J. Stainer, “Ma-
1583
+ chine learning with adversaries: Byzantine tolerant gradient descent,”
1584
+ Advances in Neural Information Processing Systems, vol. 30, 2017.
1585
+ [58] R. Guerraoui, S. Rouault, et al., “The hidden vulnerability of distributed
1586
+ learning in byzantium,” in International Conference on Machine Learn-
1587
+ ing, pp. 3521–3530, PMLR, 2018.
1588
+ [59] Z. Sun, P. Kairouz, A. T. Suresh, and H. B. McMahan, “Can you really
1589
+ backdoor federated learning?,” arXiv preprint arXiv:1911.07963, 2019.
1590
+ [60] C. Chen, J. Zhang, A. K. Tung, M. Kankanhalli, and G. Chen, “Robust
1591
+ federated recommendation system,” arXiv preprint arXiv:2006.08259,
1592
+ 2020.
1593
+ [61] Y. Jiang, Y. Zhou, D. Wu, C. Li, and Y. Wang, “On the detection of
1594
+ shilling attacks in federated collaborative filtering,” in 2020 Interna-
1595
+ tional Symposium on Reliable Distributed Systems (SRDS), pp. 185–
1596
+ 194, 2020.
1597
+ [62] Y. Kalantidis, M. B. Sariyildiz, N. Pion, P. Weinzaepfel, and D. Larlus,
1598
+ “Hard negative mixing for contrastive learning,” Advances in Neural
1599
+ Information Processing Systems, vol. 33, pp. 21798–21809, 2020.
1600
+ [63] L. Lyu, H. Yu, X. Ma, C. Chen, L. Sun, J. Zhao, Q. Yang, and
1601
+ S. Y. Philip, “Privacy and robustness in federated learning: Attacks
1602
+ and defenses,” IEEE Transactions on Neural Networks and Learning
1603
+ Systems, 2022.
1604
+ [64] P. Kairouz, H. B. McMahan, B. Avent, A. Bellet, M. Bennis, A. N.
1605
+ Bhagoji, K. Bonawitz, Z. Charles, G. Cormode, R. Cummings, et al.,
1606
+ “Advances and open problems in federated learning,” Foundations and
1607
+ Trends® in Machine Learning, vol. 14, no. 1–2, pp. 1–210, 2021.
1608
+ [65] Z. Jie, S. Chen, J. Lai, M. Arif, and Z. He, “Personalized federated
1609
+ recommendation system with historical parameter clustering,” Journal
1610
+ of Ambient Intelligence and Humanized Computing, pp. 1–11.
1611
+ [66] J. Wu, Q. Liu, Z. Huang, Y. Ning, H. Wang, E. Chen, J. Yi, and
1612
+ B. Zhou, “Hierarchical personalized federated learning for user model-
1613
+ ing,” in Proceedings of the Web Conference 2021, pp. 957–968, 2021.
1614
+ [67] Q. Ma, Y. Xu, H. Xu, Z. Jiang, L. Huang, and H. Huang, “Fedsa:
1615
+ A semi-asynchronous federated learning mechanism in heterogeneous
1616
+ edge computing,” IEEE Journal on Selected Areas in Communications,
1617
+ vol. 39, no. 12, pp. 3654–3672, 2021.
1618
+ [68] T. Nishio and R. Yonetani, “Client selection for federated learning
1619
+ with heterogeneous resources in mobile edge,” in ICC 2019-2019 IEEE
1620
+ international conference on communications (ICC), pp. 1–7, IEEE,
1621
+ 2019.
1622
+ [69] Q. Wang, H. Yin, T. Chen, J. Yu, A. Zhou, and X. Zhang, “Fast-
1623
+ adapting and privacy-preserving federated recommender system,” The
1624
+ VLDB Journal, vol. 31, no. 5, pp. 877–896, 2022.
1625
+ [70] Z. Jie, S. Chen, J. Lai, M. Arif, and Z. He, “Personalized federated
1626
+ recommendation system with historical parameter clustering,” Journal
1627
+ of Ambient Intelligence and Humanized Computing, pp. 1–11, 2022.
1628
+ [71] S. Luo, Y. Xiao, and L. Song, “Personalized federated recommen-
1629
+ dation via joint representation learning, user clustering, and model
1630
+ adaptation,” in Proceedings of the 31st ACM International Conference
1631
+ on Information and Knowledge Management, (New York, NY, USA),
1632
+ p. 4289–4293, Association for Computing Machinery, 2022.
1633
+ [72] V. W. Anelli, Y. Deldjoo, T. D. Noia, A. Ferrara, and F. Narducci,
1634
+ “Federank: User controlled feedback with federated recommender
1635
+ systems,” in European Conference on Information Retrieval, pp. 32–47,
1636
+ Springer, 2021.
1637
+ [73] C. Finn, P. Abbeel, and S. Levine, “Model-agnostic meta-learning
1638
+ for fast adaptation of deep networks,” in International conference on
1639
+ machine learning, pp. 1126–1135, PMLR, 2017.
1640
+ [74] B. Acun, M. Murphy, X. Wang, J. Nie, C.-J. Wu, and K. Hazelwood,
1641
+ “Understanding training efficiency of deep learning recommendation
1642
+ models at scale,” in 2021 IEEE International Symposium on High-
1643
+ Performance Computer Architecture (HPCA), pp. 802–814, IEEE,
1644
+ 2021.
1645
+ [75] J. Qin, B. Liu, and J. Qian, “A novel privacy-preserved recommender
1646
+ system framework based on federated learning,” in 2021 The 4th
1647
+ International Conference on Software Engineering and Information
1648
+ Management, pp. 82–88, 2021.
1649
+ [76] F. K. Khan, A. Flanagan, K. E. Tan, Z. Alamgir, and M. Ammad-
1650
+ Ud-Din, “A payload optimization method for federated recommender
1651
+ systems,” in Fifteenth ACM Conference on Recommender Systems,
1652
+ pp. 432–442, 2021.
1653
+ [77] Z. Ai, G. Wu, B. Li, Y. Wang, and C. Chen, “Fourier enhanced mlp
1654
+ with adaptive model pruning for efficient federated recommendation,”
1655
+ in International Conference on Knowledge Science, Engineering and
1656
+ Management, pp. 356–368, Springer, 2022.
1657
+ [78] J. Koneˇcn`y, H. B. McMahan, F. X. Yu, P. Richt´arik, A. T. Suresh, and
1658
+ D. Bacon, “Federated learning: Strategies for improving communica-
1659
+ tion efficiency,” arXiv preprint arXiv:1610.05492, 2016.
1660
+ [79] Sijing, Duan, Deyu, Zhang, Yanbo, Wang, Lingxiang, Li, Yaoxue, and
1661
+ Zhang, “Jointrec: A deep-learning-based joint cloud video recommen-
1662
+ dation framework for mobile iot,” IEEE Internet of Things Journal,
1663
+ vol. PP, no. 99, pp. 1–1, 2019.
1664
+ [80] K. Muhammad, Q. Wang, D. O’Reilly-Morgan, E. Tragos, B. Smyth,
1665
+ N. Hurley, J. Geraci, and A. Lawlor, “Fedfast: Going beyond average
1666
+ for faster training of federated recommender systems,” in Proceedings
1667
+ of the 26th ACM SIGKDD International Conference on Knowledge
1668
+ Discovery & Data Mining, pp. 1234–1242, 2020.
1669
+ [81] M. E. Eren, L. E. Richards, M. Bhattarai, R. Yus, C. Nicholas,
1670
+ and B. S. Alexandrov, “Fedsplit: One-shot federated recommendation
1671
+ system based on non-negative joint matrix factorization and knowledge
1672
+ distillation,” arXiv preprint arXiv:2205.02359, 2022.
1673
+ [82] K. Bonawitz, V. Ivanov, B. Kreuter, A. Marcedone, H. B. McMahan,
1674
+ S. Patel, D. Ramage, A. Segal, and K. Seth, “Practical secure aggre-
1675
+ gation for privacy-preserving machine learning,” in proceedings of the
1676
+ 2017 ACM SIGSAC Conference on Computer and Communications
1677
+ Security, pp. 1175–1191, 2017.
1678
+ [83] W. R. Thompson, “On the likelihood that one unknown probability
1679
+ exceeds another in view of the evidence of two samples,” Biometrika,
1680
+ vol. 25, no. 3-4, pp. 285–294, 1933.
1681
+ [84] H. Wang, S. Sievert, S. Liu, Z. Charles, D. Papailiopoulos, and
1682
+ S. Wright, “Atomo: Communication-efficient learning via atomic
1683
+ sparsification,” Advances in Neural Information Processing Systems,
1684
+ vol. 31, 2018.
1685
+ [85] Y. Gong, L. Liu, M. Yang, and L. Bourdev, “Compressing deep
1686
+ convolutional networks using vector quantization,” arXiv preprint
1687
+ arXiv:1412.6115, 2014.
1688
+ [86] Y. Lin, S. Han, H. Mao, Y. Wang, and W. J. Dally, “Deep gradient
1689
+ compression: Reducing the communication bandwidth for distributed
1690
+ training,” arXiv preprint arXiv:1712.01887, 2017.
1691
+ [87] N. Guha, A. Talwalkar, and V. Smith, “One-shot federated learning,”
1692
+ arXiv preprint arXiv:1902.11175, 2019.
1693
+ [88] A. Kasturi, A. R. Ellore, and C. Hota, “Fusion learning: A one shot
1694
+ federated learning,” in International Conference on Computational
1695
+ Science, pp. 424–436, Springer, 2020.
1696
+ [89] Q. Li, B. He, and D. Song, “Practical one-shot federated learning for
1697
+ cross-silo setting,” arXiv preprint arXiv:2010.01017, 2020.
1698
+ [90] Y. Liu, T. Fan, T. Chen, Q. Xu, and Q. Yang, “Fate: An industrial grade
1699
+ platform for collaborative learning with data protection.,” J. Mach.
1700
+ Learn. Res., vol. 22, no. 226, pp. 1–6, 2021.
1701
+ [91] K. Bonawitz, H. Eichner, W. Grieskamp, D. Huba, A. Ingerman,
1702
+ V. Ivanov, C. Kiddon, J. Koneˇcn`y, S. Mazzocchi, B. McMahan, et al.,
1703
+ “Towards federated learning at scale: System design,” Proceedings of
1704
+ Machine Learning and Systems, vol. 1, pp. 374–388, 2019.
1705
+ [92] K. Singhal, H. Sidahmed, Z. Garrett, S. Wu, J. Rush, and S. Prakash,
1706
+ “Federated reconstruction: Partially local federated learning,” Advances
1707
+ in Neural Information Processing Systems, vol. 34, pp. 11220–11232,
1708
+ 2021.
1709
+ [93] A. Ziller, A. Trask, A. Lopardo, B. Szymkow, B. Wagner, E. Bluemke,
1710
+ J.-M. Nounahon, J. Passerat-Palmbach, K. Prakash, N. Rose, et al.,
1711
+ “Pysyft: A library for easy federated learning,” in Federated Learning
1712
+ Systems, pp. 111–139, Springer, 2021.
1713
+ [94] “Paddlefl.” https://github.com/PaddlePaddle/PaddleFL.
1714
+ [95] B. Hidasi, A. Karatzoglou, L. Baltrunas, and D. Tikk, “Session-
1715
+ based recommendations with recurrent neural networks,” arXiv preprint
1716
+ arXiv:1511.06939, 2015.
1717
+ [96] Y. Xie, Z. Wang, D. Chen, D. Gao, L. Yao, W. Kuang, Y. Li,
1718
+ B. Ding, and J. Zhou, “Federatedscope: A comprehensive and flexi-
1719
+ ble federated learning platform via message passing,” arXiv preprint
1720
+ arXiv:2204.05011, 2022.
1721
+ [97] L. Lyu, J. Yu, K. Nandakumar, Y. Li, X. Ma, J. Jin, H. Yu, and K. S. Ng,
1722
+ “Towards fair and privacy-preserving federated deep models,” IEEE
1723
+ Transactions on Parallel and Distributed Systems, vol. 31, no. 11,
1724
+ pp. 2524–2541, 2020.
1725
+ [98] L. Lyu, Y. Li, K. Nandakumar, J. Yu, and X. Ma, “How to democra-
1726
+ tise and protect ai: Fair and differentially private decentralised deep
1727
+ learning,” IEEE Transactions on Dependable and Secure Computing,
1728
+ 2020.
1729
+
1730
+ IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, VOL. 14, NO. 8, DECEMBER 2022
1731
+ 15
1732
+ [99] A. G. Roy, S. Siddiqui, S. P¨olsterl, N. Navab, and C. Wachinger,
1733
+ “Braintorrent: A peer-to-peer environment for decentralized federated
1734
+ learning,” arXiv preprint arXiv:1905.06731, 2019.
1735
+ [100] R. Orm´andi, I. Heged˝us, and M. Jelasity, “Gossip learning with linear
1736
+ models on fully distributed data,” Concurrency and Computation:
1737
+ Practice and Experience, vol. 25, no. 4, pp. 556–571, 2013.
1738
+ [101] T. Qi, F. Wu, C. Wu, Y. Huang, and X. Xie, “Uni-FedRec: A
1739
+ unified privacy-preserving news recommendation framework for model
1740
+ training and online serving,” in Findings of the Association for Compu-
1741
+ tational Linguistics: EMNLP 2021, (Punta Cana, Dominican Republic),
1742
+ pp. 1438–1448, Association for Computational Linguistics, Nov. 2021.
1743
+ Zehua Sun is currently pursuing his master’s degree
1744
+ in the School of Software of Shandong University.
1745
+ He received his bachelor’s degree in software engi-
1746
+ neering from the School of Software of Shandong
1747
+ University in 2017. His research interests include
1748
+ federated learning, recommendation systems and
1749
+ data mining.
1750
+ Yonghui Xu is a full professor at Joint SDU-NTU
1751
+ Centre for Artificial Intelligence Research (C-FAIR),
1752
+ Shandong University. Before that, he was a research
1753
+ fellow in the Joint NTU-UBC Research Centre of
1754
+ Excellence in Active Living for the Elderly (LILY),
1755
+ Nanyang Technological University, Singapore. He
1756
+ received his Ph.D. from the School of Computer Sci-
1757
+ ence and Engineering at South China University of
1758
+ Technology in 2017 and BS from the Department of
1759
+ Mathematics and Information Science Engineering
1760
+ at Henan University of China in 2011. His research
1761
+ areas include various topics in Trustworthy AI, knowledge graphs, expert
1762
+ systems and their applications in e-commerce and healthcare. He has been
1763
+ invited as reviewer of top journals and leading international conferences, such
1764
+ as, TKDE, TNNLS, IEEE Transactions on Cybernetics, Knowledge-Based
1765
+ System, TKDD, IJCAI and AAAI.
1766
+ Yong Liu is a Senior Research Scientist at Alibaba-
1767
+ NTU Singapore Joint Research Institute, Nanyang
1768
+ Technological University (NTU). He was a Data
1769
+ Scientist at NTUC Enterprise, and a Research Sci-
1770
+ entist at Institute for Infocomm Research (I2R),
1771
+ A*STAR, Singapore. He received his Ph.D. degree
1772
+ in Computer Engineering from NTU in 2016 and
1773
+ B.S. degree in Electronic Science and Technology
1774
+ from University of Science and Technology of China
1775
+ (USTC) in 2008. His research interests include rec-
1776
+ ommendation systems, natural language processing,
1777
+ and knowledge graph. He has been invited as a PC member of major
1778
+ conferences such as KDD, SIGIR, ACL, IJCAI, AAAI, and reviewer for
1779
+ IEEE/ACM transactions.
1780
+ Wei He is a associate professor at Shandong univer-
1781
+ sity. He received bachelor and master degrees from
1782
+ computer science department of shandong university
1783
+ in 1994 and 1999 respectively, and received Ph.d.
1784
+ from engineering of shandong university in 2009.
1785
+ He won the progress first prize in science and
1786
+ technology of shandong province and the progress
1787
+ second prize in science and technology of shandong
1788
+ province, and excellent achievement in computer
1789
+ application. He has published more than 20 papers
1790
+ in the computer journal, journal of software of
1791
+ domestic and international journals conference. More papers were recorded
1792
+ by SCI, EI.
1793
+ Yali Jiang is currently a Lecturer in the School
1794
+ of Software, Shandong University. She received her
1795
+ B.Sc., M.Sc. and Ph.D. degrees from Shandong
1796
+ University in 1999, 2002 and 2011, respectively.
1797
+ She is engaged in information security and cryp-
1798
+ tography research, her main research areas are pub-
1799
+ lic key security authentication system and lattice
1800
+ based cryptographic algorithm design and analysis,
1801
+ including cloud computing security, big data privacy
1802
+ protection, IoT security, etc. She has participated
1803
+ in the National 863 Program, Shandong Provincial
1804
+ Excellent Young and Middle-aged Research Award Fund, Shandong Provincial
1805
+ Natural Science Foundation and joint research projects of enterprises.
1806
+ Fangzhao Wu is a Principal Researcher at Microsoft
1807
+ Research Asia, President of AAAI2022 and senior
1808
+ member of China Computer Society. He received
1809
+ the Ph.D. and B.S. degrees both from Electronic
1810
+ Engineering Department of Tsinghua University in
1811
+ 2017 and 2012 respectively. He published more than
1812
+ 100 academic papers and was cited nearly 3000
1813
+ times He has won NLPCC2019 Excellent Paper
1814
+ Award, WSDM 2019 Outstanding PC and AAAI
1815
+ 2021 Best SPC. His research mainly focuses on
1816
+ responsible AI, privacy protection, natural language
1817
+ processing, and recommender systems. The research results have been applied
1818
+ in Microsoft News, Bing Ads and other Microsoft products.
1819
+ LiZhen Cui (IET Fellow, IEEE Senior Member)
1820
+ is the Dean at School of Software, Shandong Uni-
1821
+ versity. He is the Co-Director of Joint SDU-NTU
1822
+ Centre for Artificial Intelligence Research (C-FAIR)
1823
+ and Research Center of Software & Data Engi-
1824
+ neering, Shandong University. He is the Associate
1825
+ Director of National Engineering Laboratory for E-
1826
+ Commerce Technologies. He is a Professor with
1827
+ the School of Software and the Joint SDU-NTU
1828
+ Centre for Artificial Intelligence Research (C-FAIR),
1829
+ Shandong University, and also a Visiting Professor
1830
+ with Nanyang Technological University, Singapore. He was a Visiting Scholar
1831
+ with Georgia Tech, Atlanta, GA, USA. He received his bachelor’s, M.Sc.,
1832
+ and Ph.D. degrees from Shandong University, Jinan, China, in 1999, 2002
1833
+ and 2005, respectively. He has authored or coauthored over 200 articles in
1834
+ journals and refereed conference proceedings. His research interests include
1835
+ big data management and analysis and AI theory and application.
1836
+
9tAyT4oBgHgl3EQf3Pnc/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
A9E4T4oBgHgl3EQf5A6T/content/2301.05319v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8f085db6a6fdb04425956d4a65bb469a5008b897614b24dda717ec7490aef79c
3
+ size 3061011
A9E4T4oBgHgl3EQf5A6T/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6fc529eb096f60b87e64f3c56109d00e43957803232a1bbb33fabbaa75099bbd
3
+ size 7667757
A9E4T4oBgHgl3EQf5A6T/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:8980010c87d88f987f5e355cc0f76ad294953134f9ac08122c65076db351f311
3
+ size 264462
BdAzT4oBgHgl3EQf___2/content/2301.01958v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c113ca248d6a3af1e9d36ff6e3601102d3525a54893e182ca588a12e309d7e99
3
+ size 246572
BdAzT4oBgHgl3EQf___2/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:b3facbee4b19396f7927c8c2bca84a6e1dc663817f49c6487596898f71bb6871
3
+ size 3342381
BdAzT4oBgHgl3EQf___2/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:ab59193166bf6b1b48aa57efaf42fe2d9b784b5edfddf0ffc848a96d8f1b42d7
3
+ size 133895
CNE2T4oBgHgl3EQfRwe0/content/2301.03785v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:be1b9aecc0aa2e4c282f4fe3bd9069ecb4d444374dda1a58c6d1d971967ebba9
3
+ size 1083406
CNE2T4oBgHgl3EQfRwe0/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:1391b0fd478e7cb77f3b8509dada2ad233a37bff93dcabc49d4942d299741619
3
+ size 170031
CdE2T4oBgHgl3EQf9AmF/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:87b0c3ccf1119773e0b093c101b48dfb087a656a5f4a56633db56ff9cee55827
3
+ size 6225965
DtE1T4oBgHgl3EQfWQTV/content/tmp_files/2301.03113v1.pdf.txt ADDED
@@ -0,0 +1,2486 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03113v1 [math.OC] 8 Jan 2023
2
+ Accelerated Randomized Block-Coordinate Algorithms for
3
+ Co-coercive Equations and Applications
4
+ Quoc Tran-Dinh
5
+ Department of Statistics and Operations Research
6
+ The University of North Carolina at Chapel Hill
7
+ 318 Hanes Hall, UNC-Chapel Hill, NC 27599-3260.
8
+ Email: [email protected].
9
+ July 2022
10
+ Abstract
11
+ In this paper, we develop an accelerated randomized block-coordinate algorithm to
12
+ approximate a solution of a co-coercive equation. Such an equation plays a central role
13
+ in optimization and related fields and covers many mathematical models as special cases,
14
+ including convex optimization, convex-concave minimax, and variational inequality prob-
15
+ lems. Our algorithm relies on a recent Nesterov’s accelerated interpretation of the Halpern
16
+ fixed-point iteration in [48].
17
+ We establish that the new algorithm achieves O
18
+
19
+ 1/k2�
20
+ -
21
+ convergence rate on E
22
+
23
+ ∥Gxk∥2�
24
+ through the last-iterate, where G is the underlying co-
25
+ coercive operator, E [·] is the expectation, and k is the iteration counter. This rate is signif-
26
+ icantly faster than O (1/k) rates in standard forward or gradient-based methods from the
27
+ literature. We also prove o
28
+
29
+ 1/k2�
30
+ rates on both E
31
+
32
+ ∥Gxk∥2�
33
+ and E
34
+
35
+ ∥xk+1 − xk∥2�
36
+ . Next,
37
+ we apply our method to derive two accelerated randomized block coordinate variants
38
+ of the forward-backward splitting and Douglas-Rachford splitting schemes, respectively
39
+ for solving a monotone inclusion involving the sum of two operators. As a byproduct,
40
+ these variants also have faster convergence rates than their non-accelerated counterparts.
41
+ Finally, we apply our scheme to a finite-sum monotone inclusion that has various appli-
42
+ cations in machine learning and statistical learning, including federated learning. As a
43
+ result, we obtain a novel federated learning-type algorithm with fast and provable con-
44
+ vergence rates.
45
+ 1
46
+ Introduction
47
+ Monotone inclusion provides a powerful tool to model several problems in optimization,
48
+ nonlinear analysis, mechanics, and machine learning, among many other areas, see, e.g.,
49
+ [5, 9, 17, 41, 44, 45, 46]. Though it is a classical mathematical tool [5, 28, 45, 46], there
50
+ has been a notable research surge of this topic in the last few years due to new applications
51
+ in modern machine learning and data science. Methods for solving monotone inclusions often
52
+ generalize existing optimization algorithms, and exploit structures of the underlying operators
53
+ 1
54
+
55
+ such as splitting property. Classical methods include gradient or forward, extragradient, past-
56
+ extragradient, proximal-point, forward-backward splitting, forward-backward-forward split-
57
+ ting, Douglas-Rachford splitting, projective splitting methods, and their variants, see, e.g.,
58
+ [5, 12, 14, 28, 17, 31, 42, 52]. However, developing accelerated [block-]coordinate methods
59
+ with fast convergence rates for lare-scale monotone inclusions is still a challenging task.
60
+ In this paper, we focus on a very basic model of monotone inclusions, which is called a
61
+ co-coercive equation of the form:
62
+ Find x⋆ ∈ Rp such that:
63
+ Gx⋆ = 0,
64
+ (CE)
65
+ where G : Rp → Rp is a co-coercive operator (see Section 2 for definition). For our convenience,
66
+ we assume that the solution set zer(G) := G−1(0) = {x⋆ ∈ Rp : Gx⋆ = 0} of (CE) is nonempty.
67
+ The co-coercive equation (CE) though looks simple, it is equivalent to the problem of
68
+ finding a fixed-point x⋆ of a nonexpansive operator T := I − G, i.e. x⋆ = Tx⋆, where I is the
69
+ identity operator (see [5]). Therefore, it covers many fundamental problems in different fields
70
+ by appropriately reformulating them into special cases of (CE), or equivalently, fixed-point
71
+ problems (see, e.g., [13, 40] and also Sections 4 and 5 below).
72
+ Motivation and related work. We are interested in the case that G in (CE) lives in a
73
+ high-dimensional space Rp such that operating on full-dimensional vectors x of Rp is expensive
74
+ or even prohibited. Such models are ubiquitous in large-scale modern machine learning and
75
+ data science applications [8, 23, 47]. One common approach to tackle these models is block-
76
+ coordinate methods, which iteratively update one or a small number of blocks of the model
77
+ parameters instead of the full parameter vector. Such an approach is though very classical
78
+ [4, 38], it has attracted a huge attention in recent years in optimization, monotone inclusions,
79
+ and fixed-point problems, see, e.g., [6, 11, 24, 36, 37, 40, 43, 53]. However, developing efficient
80
+ variants of the block-coordinate method to solve co-coercive equation (CE) remains largely
81
+ elusive. Most existing works focus on special cases of (CE) such as optimization, convex-
82
+ concave minimax, and supervised learning models, see e.g., [6, 24, 37, 36, 43, 53].
83
+ Our goal in this paper is to advance a recent development of accelerated methods and
84
+ apply it to randomized [block-]coordinate schemes. Unlike non-accelerated algorithms, it has
85
+ been recognized that [2, 54] generalizing accelerated methods from convex minimization to
86
+ monotone inclusions is not straightforward. Recent attempt on designing accelerated methods
87
+ for monotone inclusions and variational inequality (VIPs) has been made, see, e.g., in [2, 10,
88
+ 20, 30, 50].
89
+ These algorithms often achieve a faster convergence rate than their classical
90
+ counterparts on the gradient norm or some appropriate operator residual norms. Typical
91
+ rates on the square of a residual norm are usually O
92
+
93
+ 1/k2�
94
+ (or faster, o
95
+
96
+ 1/k2�
97
+ ) compared
98
+ to O (1/k) (or o (1/k)) in non-accelerated methods, where k is the iteration counter. The
99
+ O
100
+
101
+ 1/k2�
102
+ rate matches the convergence rate lower bound in different settings, see [21, 35, 39]
103
+ for some concrete examples.
104
+ As mentioned earlier, since the problem of approximating a
105
+ solution of (CE) can be reformulated equivalently to a fixed-point problem of a non-expansive
106
+ operator [5], theory and solution methods from one field can be applied to another and vice
107
+ versa. Due to its generality, (CE) can cover many common applications in scientific computing
108
+ as discussed, e.g., in [40, 46]. For instance, it can be customized to handle linear systems,
109
+ [composite] smooth and nonsmooth convex optimization, feasibility problems, decentralized
110
+ 2
111
+
112
+ optimization, federated learning, among others. To avoid repetition, we do not present these
113
+ applications in this paper, but refer to [40, 46] for more details on how to reformulate them
114
+ into a fixed-point problem, or equivalently, a co-coercive equation of the form (CE).
115
+ Motivated by applications in high-dimensional spaces, we aim at developing an accelerated
116
+ randomized block-coordinate method to solve (CE).
117
+ Our basic mathematical tool is the
118
+ Halpern fixed-point iteration from [19] for solving (CE) and its recent development in, e.g., [16,
119
+ 25, 27, 54]. Our central idea is to represent the accelerated Halpern fixed-point method into
120
+ a two-step iterative scheme (in Nesterov’s accelerated sense) using two consecutive iterates as
121
+ discussed in [48]. Then, we combine this resulting scheme and a randomized block-coordinate
122
+ strategy to derive a novel randomized block-coordinate algorithm for solving (CE).
123
+ Contribution. Our concrete contribution can be summarized as follows. Firstly, we pro-
124
+ pose a new accelerated randomized block-coordinate algorithm to solve (CE) which achieves a
125
+ O
126
+
127
+ 1/k2�
128
+ last-iterate convergence rate, or even a o
129
+
130
+ 1/k2�
131
+ -rate on E
132
+
133
+ ∥Gxk∥2�
134
+ . Our algorithm
135
+ is very simple to implement and significantly different from existing methods. To the best
136
+ of our knowledge, this is the first randomized block-coordinate algorithm for (CE) achieving
137
+ o
138
+
139
+ 1/k2�
140
+ -fast convergence rates. Next, we utilize a change of variable to develop a practical
141
+ variant of our method, which can avoid full-dimensional operations on the iterates. Alter-
142
+ natively, we apply our algorithm to the forward-backward splitting and Douglas-Rachford
143
+ splitting methods to obtain new accelerated randomized block-coordinate variants for solving
144
+ monotone inclusions involving the sum of two maximally monotone operators. As a byprod-
145
+ uct of our convergence analysis, these variants also achieve faster convergence rates than their
146
+ classical counterparts. Finally, we apply our method to tackle a class of finite-sum mono-
147
+ tone inclusions which forms the basis of many supervised machine learning tasks, including
148
+ federated learning [22, 26, 32, 33]. It leads to a new federated learning-type algorithm with
149
+ O
150
+
151
+ 1/k2�
152
+ and o
153
+
154
+ 1/k2�
155
+ - convergence rates for a general class of finite-sum monotone inclusions.
156
+ Let us highlight the following points of our contribution and discuss its limitation. Firstly,
157
+ one of the most related works to our method is [40], which extends the asynchronous ran-
158
+ domized block-coordinate method to (CE). Though their method is asynchronous, it is non-
159
+ accelerated, and therefore, in our context, achieves O (1/k) and at most o (1/k) convergence
160
+ rates on the squared norm of the residual mapping. Note that the form of our algorithm is also
161
+ different from [40], while achieving O
162
+
163
+ 1/k2�
164
+ and o
165
+
166
+ 1/k2�
167
+ faster rates. Unfortunately, asyn-
168
+ chronous variants of our method remain open. Secondly, unlike methods for convex problems,
169
+ convergence analysis of algorithms for monotone inclusions, including (CE) is fundamentally
170
+ different, including the construction of a potential or Lyapunov function. Moreover, it remains
171
+ unclear if some recent techniques, e.g., in [16, 25, 27, 54] can be extended to [randomized
172
+ block-] coordinate variants. In this paper, we follow a different approach compared to those,
173
+ including convergence analysis technique. Thirdly, our randomized block-coordinate variants
174
+ for splitting schemes in Section 4 are also very different from the ones in [11] since their
175
+ methods rely on standard splitting methods. However, as a limitation of our new forward-
176
+ backward splitting method, it still requires a co-coercive assumption of one operator. Finally,
177
+ our application to a finite-sum monotone inclusion in Section 5 is new compared to [13] since
178
+ our problem setting is more general than that of [13], and our scheme relies on an accelerated
179
+ Douglas-Rachford splitting scheme instead of a forward-type method as in [13].
180
+ 3
181
+
182
+ Paper organization. The rest of this paper is organized as follows. In Section 2 we
183
+ briefly review some background related to (CE) and recall some preliminary results used in
184
+ this paper. Our main result is in Section 3, where we develop a new algorithm and establish its
185
+ convergence rate guarantees. We also show how to apply our method to fixed-point problems
186
+ and derive its practical variant. Section 4 presents two applications of our method to the
187
+ forward-backward and Douglas-Rachford splitting schemes for solving monotone inclusions.
188
+ Section 5 is an application of our method to a general finite-sum monotone inclusion which
189
+ potentially has many applications in machine learning and networks. We close this paper
190
+ with some concluding remarks.
191
+ 2
192
+ Background and Preliminary Results
193
+ We first review some background on monotone operators and related concepts. Then, we
194
+ recall the Halpern fixed-point iteration from [19] and its relation to Nesterov’s accelerated
195
+ methods.
196
+ 2.1
197
+ Monotone operators and related concepts
198
+ We work with a finite dimensional space Rp equipped with the standard inner product ⟨·, ·⟩ and
199
+ Euclidean norm ∥ · ∥. For a set-valued mapping G : Rp ⇒ 2Rp, dom(G) = {x ∈ Rp : Gx ̸= ∅}
200
+ denotes its domain, graph(G) = {(x, y) ∈ Rp × Rp : y ∈ Gx} denotes its graph, where 2Rp is
201
+ the set of all subsets of Rp. The inverse of G is defined by G−1y := {x ∈ Rp : y ∈ Gx}. For
202
+ x = [x1, · · · , xn] ∈ Rp, we define a weighted norm ∥x∥w :=
203
+ ��n
204
+ i=1 wi∥xi∥2�1/2, where xi is
205
+ the i-the block of x and wi > 0 is a given weight (i = 1, · · · , n).
206
+ Monotonicity. For a set-valued mapping G : Rp ⇒ 2Rp, we say that G is monotone if
207
+ ⟨u − v, x − y⟩ ≥ 0 for all x, y ∈ dom(G), u ∈ Gx, and v ∈ Gy. G is said to be µG-strongly
208
+ monotone (or sometimes called coercive) if ⟨u − v, x − y⟩ ≥ µG∥x − y∥2 for all x, y ∈ dom(G),
209
+ u ∈ Gx, and v ∈ Gy, where µG > 0 is called a strong monotonicity parameter. If G is single-
210
+ valued, then these conditions reduce to ⟨Gx−Gy, x−y⟩ ≥ 0 and ⟨Gx−Gy, x−y⟩ ≥ µG∥x−y∥2
211
+ for all x, y ∈ dom(G), respectively. We say that G is maximally monotone if graph(G) is not
212
+ properly contained in the graph of any other monotone operator. Note that G is maximally
213
+ monotone, then αG is also maximally monotone for any α > 0, and if G and H are maximally
214
+ monotone, and dom(F) ∩ int (dom(H)) ̸= ∅, then G + H is maximally monotone.
215
+ Lipschitz continuity and co-coerciveness. A single-valued operator G is said to be
216
+ L-Lipschitz continuous if ∥Gx − Gy∥ ≤ L∥x − y∥ for all x, y ∈ dom(G), where L ≥ 0 is a
217
+ Lipschitz constant. If L = 1, then we say that G is nonexpansive, while if L ∈ [0, 1), then we
218
+ say that G is L-contractive, and L is its contraction factor. We say that G is 1
219
+ L-co-coercive if
220
+ ⟨Gx−Gy, x−y⟩ ≥ 1
221
+ L∥Gx−Gy∥2 for all x, y ∈ dom(G). If L = 1, then we say that G is firmly
222
+ nonexpansive. If G is 1
223
+ L-cocoercive, then it is also monotone and L-Lipschitz continuous (by
224
+ using the Cauchy-Schwarz inequality), but the reverse statement is not true in general.
225
+ Resolvent operator. The operator JGx := {y ∈ Rp : x ∈ y + Gy} is called the resolvent
226
+ of G, often denoted by JGx = (I+G)−1x, where I is the identity mapping. Clearly, evaluating
227
+ JG requires solving a strongly monotone inclusion 0 ∈ y−x+Gy. If G is monotone, then JG is
228
+ singled-valued, and if G is maximally monotone then JG is singled-valued and dom(JG) = Rp.
229
+ If G is monotone, then JG is firmly nonexpansive [5, Proposition 23.10].
230
+ 4
231
+
232
+ 2.2
233
+ The Halpern fixed-point iteration and its variants
234
+ Let us recall the following Halpern fixed-point iteration from [19] for approximating a fixed-
235
+ point x⋆ of a non-expansive operator T : Rp → Rp (i.e. x⋆ = Tx⋆):
236
+ xk+1 := βkx0 + (1 − βk)Txk,
237
+ where
238
+ βk :=
239
+ 1
240
+ k+2.
241
+ (1)
242
+ As proven in [27], this scheme achieves ∥xk−Txk∥2 = O
243
+ � 1
244
+ k2
245
+
246
+ rate guarantee, which is optimal.
247
+ Now, for a given operator G : Rp → Rp, G is 1
248
+ L-co-coercive if and only if T := I − 2
249
+ LG is
250
+ nonexpansive [5, Proposition 4.11]. Therefore, the Halpern fixed-point method (1) applying
251
+ to approximate a solution x⋆ of the co-coercive equation Gx⋆ = 0 can be written as
252
+ xk+1 := βkx0 + (1 − βk)
253
+
254
+ xk − 2
255
+ LGxk�
256
+ = βkx0 + (1 − βk)xk − ηkGxk,
257
+ (2)
258
+ where ηk := 2(1−βk)
259
+ L
260
+ . As shown in [16], this scheme also achieves an optimal convergence rate,
261
+ i.e. ∥Gxk∥2 = O
262
+
263
+ 1/k2�
264
+ . Clearly, (1) and (2) are equivalent.
265
+ Next, it has been shown in [48] that if we eliminate x0 in (2) using two consecutive updates
266
+ xk and xk+1, then we obtain the following scheme:
267
+ xk+1 := xk + θk(xk − xk−1) −
268
+
269
+ ηkGxk − γkGxk−1�
270
+ ,
271
+ (3)
272
+ where θk := βk(1−βk)
273
+ βk−1
274
+ and γk := βkηk−1
275
+ βk−1 .
276
+ Finally, if we additionally introduce yk+1 := xk − αkGxk, then we can equivalently trans-
277
+ form (3) into the following form (see [48] for details):
278
+
279
+ yk+1 := xk − αkGxk,
280
+ xk+1 := yk+1 + θk(yk+1 − yk) + νk(xk − yk+1),
281
+ (4)
282
+ where αk :=
283
+ ηk
284
+ 1−βk and νk :=
285
+ βk
286
+ βk−1.
287
+ The scheme (4) shows a connection between the Halpern-type method [19] and Nesterov’s
288
+ accelerated algorithms [2, 29, 34, 35]. Compared to Nesterov’s accelerated methods for solving
289
+ smooth convex optimization problems, (4) has an additional correction term νk(xk −yk+1). It
290
+ is also related to Ravine’s method as shown in [3]. Note that, both (3) and (4) can be applied
291
+ to proximal-point, forward-backward splitting, Douglas-Rachford splitting, and three-operator
292
+ splitting schemes for solving monotone inclusions, variational inequality, and convex-concave
293
+ saddle-point problems, see, e.g., [2, 7, 20, 30, 48] for more details.
294
+ 3
295
+ Accelerated Randomized Block-Coordinate Algorithms
296
+ In this section, we develop a new randomized block-coordinate variant of (3) to solve (CE).
297
+ We assume that the variable x of (CE) is decomposed into n-blocks as x = [x1, x2, · · · , xn]
298
+ (1 ≤ n ≤ p), where xi ∈ Rpi for i ∈ [n] := {1, 2, · · · , n}. For the operator G, we denote
299
+ [Gx]i as the i-the block coordinate of Gx such that Gx = [[Gx]1, · · · , [Gx]n]. We also denote
300
+ G[i]x = [0, · · · , 0, [Gx]i, 0, · · · , 0] so that only the i-th block is computed, while others are
301
+ zero.
302
+ Throughout this paper, we assume that G in (CE) satisfies the following assumption.
303
+ 5
304
+
305
+ Assumption 3.1. The operator G in (CE) is L−1-block-coordinate-wise co-coercive, i.e. for
306
+ any x, y ∈ dom(G), there exist Li ∈ [0, +∞) (∀i ∈ [n]) such that
307
+ ⟨Gx − Gy, x − y⟩ ≥
308
+ n
309
+
310
+ i=1
311
+ 1
312
+ Li ∥[Gx]i − [Gy]i∥2 ≡ ∥Gx − Gy∥2
313
+ L−1,
314
+ (CP)
315
+ where L−1 := ( 1
316
+ L1 , · · · , 1
317
+ Ln ). Moreover, dom(G) = Rp and zer(G) := {x⋆ ∈ Rp : Gx⋆ = 0} ̸= ∅.
318
+ Clearly, Assumption 3.1 extends the standard co-coerciveness [5] of a monotone operator
319
+ to block-coordinate-wise settings, and therefore, it is still very common. Moreover, due to
320
+ the equivalence between the co-coercive equation (CE) and the fixed-point problem as we
321
+ mentioned earlier, our setting appears to be sufficiently general to cover many applications.
322
+ Since we will develop randomized methods operating on blocks xi of x for some i ∈ [n],
323
+ we introduce the following probability model for selecting block coordinates of x. Let ik be a
324
+ random variable on [n] := {1, 2, · · · , n} that satisfies the following probability distribution:
325
+ Prob (ik = i) = pi,
326
+ for all i ∈ [n],
327
+ (5)
328
+ where pi > 0 for all i ∈ [n] and �n
329
+ i=1 pi = 1. We also denote pmin := mini∈[n] pi > 0. If
330
+ pi =
331
+ 1
332
+ n, then ik is a uniformly random variable. Otherwise, we also cover non-uniformly
333
+ randomized block-coordinate methods.
334
+ To define convergence guarantees of our methods, we denote Fk to be the smallest σ-
335
+ algebra generated by the random set {x0, x1, · · · , xk} collecting all iterate vectors up to the
336
+ k-the iteration of our algorithm. We also use Ek [X] := Eik [X | Fk] to denote the conditional
337
+ expectation of X taken overall the randomness generated by the random variable ik ∈ [n]
338
+ (and therefore xk) conditioned on Fk, and E [·] for the total expectation.
339
+ 3.1
340
+ Accelerated RBC Method and Convergence Analysis: Main Result
341
+ Inspired by our expression (3), we propose the following Accelerated Randomized Block-
342
+ Coordinate (ARBC) scheme for solving (CE).
343
+ Starting from x0 ∈ Rp, we set x−1 := x0,
344
+ and at each iteration k ≥ 0, randomly generate ik ∈ [n] following the probability law (5) and
345
+ update:
346
+ xk+1 := xk + θk(xk − xk−1) −
347
+ ψ
348
+ pik
349
+
350
+ ηkG[ik]xk − γkG[ik]xk−1�
351
+ ,
352
+ (ARBC)
353
+ where θk > 0, ψ > 0, ηk > 0, and γk ≥ 0 are given parameters, which will be determined later,
354
+ and G[i]xk = [0, · · · , 0, [Gxk]i, 0, · · · , 0] such that [Gxk]i is the i-the block of Gxk (i ∈ [n]).
355
+ The scheme (ARBC) requires two block-coordinate evaluations [Gxk]ik and [Gxk−1]ik of
356
+ G at the two consecutive iterates xk and xk−1, respectively. Clearly, it is different from ex-
357
+ isting randomized [block]-coordinate methods in the literature, including methods for convex
358
+ optimization [6, 18, 24, 36, 37, 43, 53]. However, due to the extrapolation term θk(xk −xk−1),
359
+ (ARBC) still requires full vector update at each iteration. This is unavoidable in accelerated
360
+ methods as in [18, 36, 37]. We will further discuss this point in Subsection 3.2.
361
+ To establish the convergence of (ARBC), we introduce the following potential function:
362
+ Vk := 2ψtkηk−1
363
+
364
+ ⟨Gxk−1, xk−1 − x⋆⟩ − �n
365
+ i=1
366
+ 1
367
+ Li ∥[Gxk−1]i∥2�
368
+ + ∥xk−1 − x⋆ + tk(xk − xk−1)∥2 + µk∥xk−1 − x⋆∥2,
369
+ (6)
370
+ 6
371
+
372
+ where x⋆ ∈ zer(G), and tk > 0 and µk ≥ 0 are given parameters, which will be determined
373
+ later. It is obvious that under Assumption 3.1, {xk} is well-defined, and we have Vk ≥ 0 for
374
+ all k ≥ 0 regardless the choice of xk−1 and xk. We first prove the following key result.
375
+ Lemma 3.1. Suppose that Assumption 3.1 holds for (CE). Let {xk} be generated by (ARBC)
376
+ and Vk be defined by (6). Suppose further that the parameters in (ARBC) and (6) satisfy
377
+
378
+
379
+
380
+
381
+
382
+
383
+
384
+
385
+
386
+ tkηk−1 ≥
387
+
388
+ 1 −
389
+ 1
390
+ tk−µk
391
+
392
+ tk+1ηk,
393
+ θk
394
+ := tk−µk−1
395
+ tk+1
396
+ ,
397
+ γk
398
+ :=
399
+ tk+1θk
400
+ tk+1θk+1 · ηk.
401
+ (7)
402
+ Then, the following inequality holds:
403
+ Vk − Ek
404
+
405
+ Vk+1�
406
+ ≥ µk(2tk − µk − 1)∥xk − xk−1∥2 − (µk+1 − µk)∥xk − x⋆∥2
407
+ + �n
408
+ i=1
409
+ ψtk+1[2pi(tk+1θk+1)−ψLitk+1ηk]
410
+ ηkLipi
411
+ ��ηk[Gxk]i − γk[Gxk−1]i
412
+ ��2.
413
+ (8)
414
+ Proof. First of all, let us introduce dk := ηkGxk − γkGxk−1. Then, from (ARBC), we have
415
+ xk+1 − xk = θk(xk − xk−1) −
416
+ ψ
417
+ pik dk
418
+ [ik]. Hence we can expand the second term of (6) as
419
+ T[1]
420
+ :=
421
+ ∥xk + tk+1(xk+1 − xk) − x⋆∥2
422
+ (ARBC)
423
+ =
424
+ ∥xk − x⋆ + tk+1θk(xk − xk−1) − ψtk+1p−1
425
+ ik dk
426
+ [ik]∥2
427
+ =
428
+ ∥xk − x⋆∥2 + t2
429
+ k+1θ2
430
+ k∥xk − xk−1∥2 + ψ2t2
431
+ k+1∥p−1
432
+ ik dk
433
+ [ik]∥2 − 2ψtk+1⟨p−1
434
+ ik dk
435
+ [ik], xk − x⋆⟩
436
+ + 2tk+1θk⟨xk − xk−1, xk − x⋆⟩ − 2ψt2
437
+ k+1θk⟨p−1
438
+ ik dk
439
+ [ik], xk − xk−1⟩.
440
+ Alternatively, we can also expand
441
+ ∥xk−1 + tk(xk − xk−1) − x⋆∥2 = ∥xk − x⋆ + (tk − 1)(xk − xk−1)∥2
442
+ = ∥xk − x⋆∥2 + 2(tk − 1)⟨xk − xk−1, xk − x⋆⟩
443
+ + (tk − 1)2∥xk − xk−1∥2.
444
+ Moreover, we also have the following elementary expression
445
+ µk∥xk−1 − x⋆∥2 − µk+1∥xk − x⋆∥2 = µk∥xk − xk−1∥2 − 2µk⟨xk − xk−1, xk − x⋆⟩
446
+ − (µk+1 − µk)∥xk − x⋆∥2.
447
+ Now, let us consider the following function:
448
+ Qk := ∥xk−1 + tk(xk − xk−1) − x⋆∥2 + µk∥xk−1 − x⋆∥2.
449
+ (9)
450
+ Then, combining the last three expressions, and using the definition (9) of Qk, we have
451
+ Qk − Qk+1 =
452
+
453
+ (tk − 1)2 − θ2
454
+ kt2
455
+ k+1 + µk
456
+
457
+ ∥xk − xk−1∥2 − ψ2t2
458
+ k+1∥p−1
459
+ ik dk
460
+ [ik]∥2
461
+ + 2 (tk − 1 − θktk+1 − µk) ⟨xk − x⋆, xk − xk−1⟩ − (µk+1 − µk)∥xk − x⋆∥2
462
+ + 2ψtk+1⟨p−1
463
+ ik dk
464
+ [ik], xk − x⋆⟩ + 2ψt2
465
+ k+1θk⟨p−1
466
+ ik dk
467
+ [ik], xk − xk−1⟩.
468
+ (10)
469
+ 7
470
+
471
+ Next, using the fact that dk
472
+ [ik] = [0, · · · , 0, dk
473
+ ik, 0, · · · , 0] and (5), we can easily show that
474
+ Ek
475
+
476
+ ∥p−1
477
+ ik dk
478
+ [ik]∥2�
479
+ = �n
480
+ i=1 p−1
481
+ i ∥dk
482
+ i ∥2,
483
+ Ek
484
+
485
+ ⟨p−1
486
+ ik dk
487
+ [ik], xk − x⋆⟩
488
+
489
+ = �n
490
+ i=1⟨dk
491
+ i , xk
492
+ i − x⋆
493
+ i ⟩,
494
+ Ek
495
+
496
+ ⟨p−1
497
+ ik dk
498
+ [ik], xk − xk−1⟩
499
+
500
+ = �n
501
+ i=1⟨dk
502
+ i , xk
503
+ i − xk−1
504
+ i
505
+ ⟩.
506
+ (11)
507
+ Taking conditional expectation Ek [·] both sides of (10) and then using (11) and dk = ηkGxk −
508
+ γkGxk−1 into the resulting expression, and rearranging it, we can derive
509
+ Qk − Ek
510
+
511
+ Qk+1�
512
+ =
513
+
514
+ (tk − 1)2 − θ2
515
+ kt2
516
+ k+1 + µk
517
+
518
+ ∥xk − xk−1∥2 − (µk+1 − µk)∥xk − x⋆∥2
519
+ + 2 (tk − 1 − θktk+1 − µk) ⟨xk − x⋆, xk − xk−1⟩
520
+ + 2ψtk+1ηk
521
+ �n
522
+ i=1⟨[Gxk]i, xk
523
+ i − x⋆
524
+ i ⟩ − 2ψtk+1γk
525
+ �n
526
+ i=1⟨[Gxk−1]i, xk−1
527
+ i
528
+ − x⋆
529
+ i ⟩
530
+ − ψ2t2
531
+ k+1
532
+ �n
533
+ i=1
534
+ 1
535
+ pi ∥ηk[Gxk]i − γk[Gxk−1]i∥2
536
+ + 2ψt2
537
+ k+1θkηk
538
+ �n
539
+ i=1⟨[Gxk]i − [Gxk−1]i, xk
540
+ i − xk−1
541
+ i
542
+
543
+ + 2ψtk+1 [tk+1θk(ηk − γk) − γk] �n
544
+ i=1⟨[Gxk−1]i, xk
545
+ i − xk−1
546
+ i
547
+ ⟩.
548
+ Utilizing the condition (CP) of G as
549
+ �n
550
+ i=1⟨[Gxk]i − [Gxk−1]i, xk
551
+ i − xk−1
552
+ i
553
+ ⟩ ≥ �n
554
+ i=1
555
+ 1
556
+ Li ∥[Gxk]i − [Gxk−1]i∥2,
557
+ into the last expression, we arrive at
558
+ Qk − Ek
559
+
560
+ Qk+1�
561
+
562
+
563
+ (tk − 1)2 − θ2
564
+ kt2
565
+ k+1 + µk
566
+
567
+ ∥xk − xk−1∥2 − (µk+1 − µk)∥xk − x⋆∥2
568
+ + 2
569
+
570
+ tk − 1 − θktk+1 − µk
571
+
572
+ ⟨xk − x⋆, xk − xk−1⟩ + 2ψtk+1ηk⟨Gxk, xk − x⋆⟩
573
+ − 2ψtk+1γk⟨Gxk−1, xk−1 − x⋆⟩ − ψ2t2
574
+ k+1
575
+ �n
576
+ i=1
577
+ 1
578
+ pi ∥ηk[Gxk]i − γk[Gxk−1]i∥2
579
+ + 2ψt2
580
+ k+1θkηk
581
+ �n
582
+ i=1
583
+ 1
584
+ Li ∥[Gxk]i − [Gxk−1]i∥2
585
+ + 2ψtk+1
586
+
587
+ tk+1θk(ηk − γk) − γk
588
+
589
+ ⟨Gxk−1, xk − xk−1⟩.
590
+ Rearranging this inequality, we get
591
+ Qk − Ek
592
+
593
+ Qk+1�
594
+
595
+
596
+ (tk − 1)2 − θ2
597
+ kt2
598
+ k+1 + µk
599
+
600
+ ∥xk − xk−1∥2 − (µk+1 − µk)∥xk − x⋆∥2
601
+ + 2
602
+
603
+ tk − 1 − θktk+1 − µk
604
+
605
+ ⟨xk − x⋆, xk − xk−1⟩
606
+ + ψtk+1
607
+ �n
608
+ i=1
609
+
610
+ 2(tk+1θkηk−γk)
611
+ Li
612
+ − ψtk+1γ2
613
+ k
614
+ pi
615
+
616
+ ∥[Gxk−1]i∥2
617
+ − 2ψt2
618
+ k+1ηk
619
+ �n
620
+ i=1
621
+
622
+ 2θk
623
+ Li − ψγk
624
+ pi
625
+
626
+ ⟨[Gxk]i, [Gxk−1]i⟩
627
+ + ψtk+1ηk
628
+ �n
629
+ i=1
630
+
631
+ 2(tk+1θk+1)
632
+ Li
633
+ − ψtk+1ηk
634
+ pi
635
+
636
+ ∥[Gxk]i∥2
637
+ + 2ψtk+1ηk
638
+
639
+ ⟨Gxk, xk − x⋆⟩ − �n
640
+ i=1
641
+ 1
642
+ Li ∥[Gxk]i∥2�
643
+ − 2ψtk+1γk
644
+
645
+ ⟨Gxk−1, xk−1 − x⋆⟩ − �n
646
+ i=1
647
+ 1
648
+ Li ∥[Gxk−1]i∥2�
649
+ + 2ψtk+1
650
+
651
+ tk+1θk(ηk − γk) − γk
652
+
653
+ ⟨Gxk−1, xk − xk−1⟩.
654
+ (12)
655
+ 8
656
+
657
+ Let us first impose the following condition as in the third line of (7):
658
+ tk+1θk(ηk − γk) − γk = 0
659
+
660
+ γk :=
661
+ tk+1θk
662
+ tk+1θk+1 · ηk.
663
+ (13)
664
+ This condition leads to
665
+
666
+
667
+
668
+
669
+
670
+
671
+
672
+
673
+
674
+
675
+ ��
676
+ Ak
677
+ i := ψtk+1
678
+
679
+ 2(tk+1θkηk−γk)
680
+ Li
681
+ − ψtk+1γ2
682
+ k
683
+ pi
684
+
685
+ = ψtk+1ηk[2pi(tk+1θk+1)−ψLitk+1ηk]
686
+ Lipi
687
+ ·
688
+ t2
689
+ k+1θ2
690
+ k
691
+ (tk+1θk+1)2 ,
692
+ Bk
693
+ i := ψt2
694
+ k+1ηk
695
+
696
+ 2θk
697
+ Li − ψγk
698
+ pi
699
+
700
+ = ψtk+1ηk[2pi(tk+1θk+1)−ψLitk+1ηk]
701
+ Lipi(tk+1θk+1)
702
+ ·
703
+ tk+1θk
704
+ (tk+1θk+1),
705
+ Ck
706
+ i := ψtk+1ηk
707
+
708
+ 2(tk+1θk+1)
709
+ Li
710
+ − ψtk+1ηk
711
+ pi
712
+
713
+ = ψtk+1ηk[2pi(tk+1θk+1)−ψLitk+1ηk]
714
+ Lipi
715
+ .
716
+ Therefore, using these three coefficients Ak
717
+ i , Bk
718
+ i , and Ck
719
+ i , we can show that
720
+ T [i]
721
+ [2] := ψtk+1
722
+
723
+ 2(tk+1θkηk−γk)
724
+ Li
725
+ − ψtk+1γ2
726
+ k
727
+ pi
728
+
729
+ ∥[Gxk−1]i∥2
730
+ − 2ψt2
731
+ k+1ηk
732
+
733
+ 2θk
734
+ Li − ψγk
735
+ pi
736
+
737
+ ⟨[Gxk]i, [Gxk−1]i⟩
738
+ + ψtk+1ηk
739
+
740
+ 2(tk+1θk+1)
741
+ Li
742
+ − ψtk+1ηk
743
+ pi
744
+
745
+ ∥[Gxk]i∥2
746
+ =
747
+ ψtk+1ηk
748
+
749
+ 2pi(tk+1θk+1)−ψLitk+1ηk
750
+
751
+ Lipi
752
+ ��[Gxk]i −
753
+ tk+1θk
754
+ tk+1θk+1[Gxk−1]i
755
+ ��2.
756
+ In this case, we can simplify (12) as
757
+ Qk − Ek
758
+
759
+ Qk+1�
760
+
761
+
762
+ (tk − 1)2 − θ2
763
+ kt2
764
+ k+1 + µk
765
+
766
+ ∥xk − xk−1∥2 − (µk+1 − µk)∥xk − x⋆∥2
767
+ + 2
768
+
769
+ tk − 1 − θktk+1 − µk
770
+
771
+ ⟨xk − x⋆, xk − xk−1⟩
772
+ + 2ψtk+1ηk
773
+
774
+ ⟨Gxk, xk − x⋆⟩ − �n
775
+ i=1
776
+ 1
777
+ Li ∥[Gxk]i∥2�
778
+ − 2ψtk+1γk
779
+
780
+ ⟨Gxk−1, xk−1 − x⋆⟩ − �n
781
+ i=1
782
+ 1
783
+ Li ∥[Gxk−1]i∥2�
784
+ + �n
785
+ i=1
786
+ ψtk+1ηk[2pi(tk+1θk+1)−ψLitk+1ηk]
787
+ Lipi
788
+ ��[Gxk]i −
789
+ tk+1θk
790
+ tk+1θk+1[Gxk−1]i
791
+ ��2.
792
+ (14)
793
+ Let us impose the following two conditions:
794
+ tk − µk − 1 = θktk+1
795
+ and
796
+ tkηk−1 ≥ tk+1γk.
797
+ (15)
798
+ The first equality leads to the choice of θk as in (7), i.e. θk := tk−µk−1
799
+ tk+1
800
+ .
801
+ Next, let us check the second condition of (15). Using (13) and tk+1θk = tk − µk − 1 from
802
+ (15), the second condition of (15) is equivalent to
803
+ tkηk−1 ≥ tk+1ηk
804
+
805
+ 1 −
806
+ 1
807
+ tk−µk
808
+
809
+ ,
810
+ which is the first line of (7). Hence, the second condition of (15) holds.
811
+ Finally, by (15), we can easily show that
812
+ T[3] := µk + (tk − 1)2 − θ2
813
+ kt2
814
+ k+1 = (tk − 1)tk − (tk − µk)tk+1θk = µk(2tk − µk − 1).
815
+ Using this expression, (CP), the conditions in (15),
816
+ tk+1θk
817
+ tk+1θk+1 = γk
818
+ ηk from (13), and ηk − γk =
819
+ ηk
820
+ tk+1θk+1 into (14), and then using the definition of Vk from (6) for the resulting inequality,
821
+ we obtain (8).
822
+ 9
823
+
824
+ Now, we are ready to prove the convergence of (ARBC) in the following theorem.
825
+ Theorem 3.1. Suppose that Assumption 3.1 holds for (CE).
826
+ Let {xk} be generated by
827
+ (ARBC) and Vk be defined by (6). For given ω > 3 and 0 < ψ < min
828
+
829
+ 2pi
830
+ Li : i ∈ [n]
831
+
832
+ , we
833
+ update
834
+ µk := 1,
835
+ tk := k+2ω+1
836
+ ω
837
+ ,
838
+ θk := tk−2
839
+ tk+1 ,
840
+ ηk := tk−1
841
+ tk+1 ,
842
+ and
843
+ γk := tk−2
844
+ tk+1 = θk.
845
+ (16)
846
+ Then, we obtain the following bounds:
847
+ �+∞
848
+ k=0(k + 2ω + 2)2E
849
+
850
+ ∥ηkGxk − γkGxk−1∥2�
851
+
852
+ ω2
853
+ ψC V0,
854
+ �+∞
855
+ k=0(k + ω + 1)E
856
+
857
+ ∥xk − xk−1∥2�
858
+ ≤ 2
859
+ ωV0,
860
+ �+∞
861
+ k=0(k + ω)E
862
+
863
+ ∥Gxk−1∥2�
864
+
865
+ 16
866
+ ψ2ωV0 +
867
+ 8C0
868
+ ψ2(ω−3),
869
+ �+∞
870
+ k=1(k + 1)2E
871
+
872
+ ∥Gxk − Gxk−1∥2�
873
+ ≤ C0,
874
+ (17)
875
+ where C := min
876
+ i∈[n]
877
+
878
+ 2
879
+ Li − ψ
880
+ pi
881
+
882
+ > 0 and C0 :=
883
+ ψ2ω2(ω−1)2
884
+ (ω+1)2
885
+ ∥Gx0∥2 +
886
+
887
+ 8(ω−1)
888
+ ω
889
+ + ψω2(1−pmin)
890
+ pminC
891
+
892
+ V0.
893
+ Moreover, the following statements also hold:
894
+
895
+ E
896
+
897
+ ∥xk+1 − xk∥2�
898
+ = O
899
+ � 1
900
+ k2
901
+
902
+ and
903
+ E
904
+
905
+ ∥xk+1 − xk∥2�
906
+ = o
907
+ � 1
908
+ k2
909
+
910
+ ,
911
+ E
912
+
913
+ ∥Gxk∥2�
914
+ = O
915
+ � 1
916
+ k2
917
+
918
+ and
919
+ E
920
+
921
+ ∥Gxk∥2�
922
+ = o
923
+ � 1
924
+ k2
925
+
926
+ .
927
+ (18)
928
+ Theorem 3.1 establishes convergence rates of (ARBC) on two main criteria E
929
+
930
+ ∥Gxk∥2�
931
+ and E
932
+
933
+ ∥xk+1 − xk∥2�
934
+ , among other side results as stated in (17). However, the statement (18)
935
+ does not show the independence of the rates on the number of blocks n. As we can observe
936
+ from our proof below that these convergence rates depend on
937
+ 1
938
+ ψ2 , where ψ is a given stepsize in
939
+ Theorem 3.1. If we choose pi = 1
940
+ n, i.e. uniformly random, and assume that Li = L for i ∈ [n],
941
+ then ψ is proportional to 1
942
+ n, leading to E
943
+
944
+ ∥xk+1 − xk∥2�
945
+ = O
946
+
947
+ n2
948
+ k2
949
+
950
+ and E
951
+
952
+ ∥Gxk∥2�
953
+ = O
954
+
955
+ n2
956
+ k2
957
+
958
+ .
959
+ The dependence of the convergence rates on n2 has been observed in Nesterov’s accelerated
960
+ methods for convex optimization, see, e.g. [1, 18, 36]. In (18), we state both Big-O and
961
+ small-o convergence rates where Big-O rates are often proved when k ≤ O (n), while small-o
962
+ rates are achieved when k is sufficiently large.
963
+ The proof of Theorem 3.1. Firstly, we fix µk := 1 for all k ≥ 0 and since θk is updated by
964
+ θk := tk−µk−1
965
+ tk+1
966
+ = tk−2
967
+ tk+1 as in (7), if we choose ηk := tk−µk
968
+ tk+1
969
+ = tk−1
970
+ tk+1 , then the first condition
971
+ of (7) reduces to 1 ≤ tk−1−1
972
+ tk−2 , which holds if tk−1 − tk + 1 ≥ 0. Let us choose tk := k+2ω+1
973
+ ω
974
+ for some ω > 3.
975
+ Clearly, we have tk−1 − tk + 1 =
976
+ ω−1
977
+ ω
978
+ > 0.
979
+ Moreover, we also have
980
+ γk = tk+1θkηk
981
+ tk+1θk+1 = tk−2
982
+ tk+1 = θk as shown in (16).
983
+ Next, under the choice of parameters as above, (8) reduces to
984
+ Vk − Ek
985
+
986
+ Vk+1�
987
+ ≥ �n
988
+ i=1
989
+ ψt2
990
+ k+1
991
+ Lipi (2pi − ψLi) ∥ηk[Gxk]i − γk[Gxk−1]i∥2
992
+ + 2(tk − 1)∥xk − xk−1∥2.
993
+ 10
994
+
995
+ Taking full expectation this inequality and using tk = k+2ω+1
996
+ ω
997
+ and tk−2
998
+ tk−1 ≥
999
+ 1
1000
+ ω+1, we obtain
1001
+ E
1002
+
1003
+ Vk�
1004
+ − E
1005
+
1006
+ Vk+1�
1007
+ ≥ �n
1008
+ i=1
1009
+ ψ(k+2ω+2)2
1010
+ Lipiω2
1011
+ (2pi − ψLi) E
1012
+
1013
+ ∥ηk[Gxk]i − γk[Gxk−1]i∥2�
1014
+ + 2(k+ω+1)
1015
+ ω
1016
+ E
1017
+
1018
+ ∥xk − xk−1∥2�
1019
+ .
1020
+ (19)
1021
+ Since E
1022
+
1023
+ Vk�
1024
+ ≥ 0, summing up (20) from k := 0 to k := K ≥ 0, we obtain
1025
+ �K−1
1026
+ k=0
1027
+ ψ(k+2ω+2)2
1028
+ ω2
1029
+ �n
1030
+ i=1
1031
+
1032
+ 2
1033
+ Li − ψ
1034
+ pi
1035
+
1036
+ E
1037
+
1038
+ ∥ηk[Gxk]i − γk[Gxk−1]i∥2�
1039
+ ≤ E
1040
+
1041
+ V0�
1042
+ ,
1043
+ �K−1
1044
+ k=0 (k + ω + 1)E
1045
+
1046
+ ∥xk − xk−1∥2�
1047
+ ≤ 2
1048
+ ωE
1049
+
1050
+ V0�
1051
+ .
1052
+ (20)
1053
+ This implies the first two lines of (17) after taking the limit as K → +∞ and noting that
1054
+ E [V0] = V0 due to the certainty of x0 and x−1.
1055
+ Next, let us define the following full vector ¯xk+1 as
1056
+ ¯xk+1 := xk + θk(xk − xk−1) − ψ
1057
+
1058
+ ηkGxk − γkGxk−1�
1059
+ = zk − ψdk,
1060
+ (21)
1061
+ where zk := xk +θk(xk −xk−1) and dk := ηkGxk −γkGxk−1 ≡ ηkGxk −θkGxk−1. Then, from
1062
+ (ARBC), we have xk+1 = zk −
1063
+ ψ
1064
+ pik dk
1065
+ [ik]. Therefore, for any uk independent of ik, we have
1066
+ Ek
1067
+
1068
+ ∥xk+1 − uk∥2�
1069
+ = ∥zk − uk∥2 − 2ψEk
1070
+
1071
+ ⟨p−1
1072
+ ik dk
1073
+ [ik], zk − uk⟩
1074
+
1075
+ + ψ2Ek
1076
+
1077
+ ∥p−1
1078
+ ik dk
1079
+ [ik]∥2�
1080
+ = ∥zk − uk∥2 − 2ψ⟨dk, zk − uk⟩ + ψ2 �n
1081
+ i=1
1082
+ 1
1083
+ pi ∥dk
1084
+ i ∥2
1085
+ = ∥zk − ψdk − uk∥2 + ψ2 �n
1086
+ i=1
1087
+
1088
+ 1
1089
+ pi − 1
1090
+
1091
+ ∥dk
1092
+ i ∥2
1093
+ = ∥¯xk+1 − uk∥2 + ψ2 �n
1094
+ i=1
1095
+
1096
+ 1
1097
+ pi − 1
1098
+
1099
+ ∥dk
1100
+ i ∥2.
1101
+ (22)
1102
+ Now, from (21), we have
1103
+ ¯xk+1 − xk + ψηkGxk =
1104
+ θk
1105
+ ηk−1 (xk − xk−1 + ψηk−1Gxk−1) +
1106
+
1107
+ 1 −
1108
+ θk
1109
+ ηk−1
1110
+
1111
+ · θk(1−ηk−1)
1112
+ ηk−1−θk (xk−1 − xk).
1113
+ Note also that since ω > 1, we have 0 <
1114
+ θk
1115
+ ηk−1 =
1116
+ tk−2
1117
+ tk−1−1 =
1118
+ k+1
1119
+ k+ω ≤ 1. Moreover, using the
1120
+ update rule (16), we can easily show that θk(1−ηk−1)
1121
+ ηk−1−θk
1122
+ = (ω+1)(k+1)
1123
+ ωk+2ω2−1 ≤ ω+1
1124
+ ω
1125
+ ≤ 2 for all k ≥ 0.
1126
+ Hence, by convexity of ∥ · ∥2, we have
1127
+ ∥¯xk+1 − xk + ψηkGxk∥2 ≤
1128
+ θk
1129
+ ηk−1∥xk − xk−1 + ψηk−1Gxk−1∥2 + 4(ω−1)
1130
+ k+ω ∥xk − xk−1∥2.
1131
+ Substituting uk := xk − ψηkGxk into (22) and combining the result with the last inequality
1132
+ and using max{ 1
1133
+ pi − 1 : i ∈ [n]} = 1−pmin
1134
+ pmin , we can show that
1135
+ Ek
1136
+
1137
+ ∥xk+1 − xk + ψηkGxk∥2�
1138
+
1139
+ θk
1140
+ ηk−1 ∥xk − xk−1 + ψηk−1Gxk−1∥2 + 4(ω−1)
1141
+ k+ω ∥xk − xk−1∥2
1142
+ + ψ2(1−pmin)
1143
+ pmin
1144
+ ∥ηkGxk − θkGxk−1∥2.
1145
+ Taking full expectation of both sides of this inequality, we arrive at
1146
+ E
1147
+
1148
+ ∥xk+1 − xk + ψηkGxk∥2�
1149
+
1150
+ θk
1151
+ ηk−1 E
1152
+
1153
+ ∥xk − xk−1 + ψηk−1Gxk−1∥2�
1154
+ + 4(ω−1)
1155
+ k+ω E
1156
+
1157
+ ∥xk − xk−1∥2�
1158
+ + ψ2(1−pmin)
1159
+ pmin
1160
+ E
1161
+
1162
+ ∥ηkGxk − θkGxk−1∥2�
1163
+ .
1164
+ 11
1165
+
1166
+ Multiplying this inequality by (k + ω)2 and rearranging the result, we obtain
1167
+ (k + ω)2E
1168
+
1169
+ ∥xk+1 − xk + ψηkGxk∥2�
1170
+ ≤ (k + ω − 1)2E
1171
+
1172
+ ∥xk − xk−1 + ψηk−1Gxk−1∥2�
1173
+ − [(ω − 3)(k + ω) + 1] E
1174
+
1175
+ ∥xk − xk−1 + ψηk−1Gxk−1∥2�
1176
+ + 4(ω − 1)(k + ω)E
1177
+
1178
+ ∥xk − xk−1∥2�
1179
+ + ψ2(1−pmin)
1180
+ pmin
1181
+ (k + ω)2E
1182
+
1183
+ ∥ηkGxk − θkGxk−1∥2�
1184
+ .
1185
+ This inequality also implies that limk→∞(k+ω)2E
1186
+
1187
+ ∥xk+1 − xk + ψηkGxk∥2�
1188
+ exists. Summing
1189
+ up this inequality from k := 0 to k := K − 1, then using the first and second lines of (17) and
1190
+ x−1 := x0, we get
1191
+ (K + ω − 1)2E
1192
+
1193
+ ∥xK − xK−1 + ψηK−1GxK−1∥2�
1194
+ ≤ ψ2η2
1195
+ −1(ω − 1)2E
1196
+
1197
+ ∥Gx0∥2�
1198
+ +
1199
+
1200
+ 8(ω−1)
1201
+ ω
1202
+ + ψω2(1−pmin)
1203
+ pminC
1204
+
1205
+ E
1206
+
1207
+ V0�
1208
+ .
1209
+ (23)
1210
+ Alternatively, we also have
1211
+ �K−1
1212
+ k=0 (k + ω)E
1213
+
1214
+ ∥xk − xk−1 + ψηk−1Gxk−1∥2�
1215
+ ≤ E[C0]
1216
+ ω−3 ,
1217
+ where C0 := ψ2η2
1218
+ −1(ω − 1)2E
1219
+
1220
+ ∥Gx0∥2�
1221
+ +
1222
+
1223
+ 8(ω−1)
1224
+ ω
1225
+ + ψω2(1−pmin)
1226
+ pminC
1227
+
1228
+ E
1229
+
1230
+ V0�
1231
+ . Since E
1232
+
1233
+ V0�
1234
+ = V0,
1235
+ E
1236
+
1237
+ ∥Gx0∥2�
1238
+ = ∥Gx0∥2, and η−1 = η0 =
1239
+ ω
1240
+ ω+1, we obtain C0 as in Theorem 3.1. The last
1241
+ inequality and the existence of limk→∞(k + ω + 1)2E
1242
+
1243
+ ∥xk+1 − xk + ψηkGxk∥2�
1244
+ imply
1245
+ limk→∞(k + ω + 1)2E
1246
+
1247
+ ∥xk+1 − xk + ψηkGxk∥2�
1248
+ = 0.
1249
+ (24)
1250
+ Next, noting that ηk ≥
1251
+ k+ω+1
1252
+ k+2ω+2 ≥ 1
1253
+ 2, we can show that
1254
+ ψ2
1255
+ 4 ∥Gxk−1∥2 ≤ ψ2η2
1256
+ k−1∥Gxk−1∥2 ≤ 2∥xk − xk−1∥2 + 2∥xk − xk−1 + ψηk−1Gxk−1∥2.
1257
+ (25)
1258
+ Therefore, we can easily obtain
1259
+ �K−1
1260
+ k=0 (k + ω)E
1261
+
1262
+ ∥Gxk−1∥2�
1263
+
1264
+ 16
1265
+ ψ2ωE
1266
+
1267
+ V0�
1268
+ +
1269
+ 8E[C0]
1270
+ ψ2(ω−3).
1271
+ (26)
1272
+ This proves the third line of (17).
1273
+ Now, from xk+1 := xk + θk(xk − xk−1) − ψp−1
1274
+ ik dk
1275
+ [ik] of (ARBC), we have
1276
+ ∥xk+1 − xk∥2 = θ2
1277
+ k∥xk − xk−1∥2 − 2ψθk⟨p−1
1278
+ ik dk
1279
+ [ik], xk − xk−1⟩ + ψ2∥p−1
1280
+ ik dk
1281
+ [ik]∥2.
1282
+ Taking conditional expectation Ek [·] of this expression and using (11) and θk = γk, we have
1283
+ Ek
1284
+
1285
+ ∥xk+1 − xk∥2�
1286
+ = θ2
1287
+ k∥xk − xk−1∥2 − 2ψθk⟨dk, xk − xk−1⟩ + ψ2 �n
1288
+ i=1
1289
+ 1
1290
+ pi ∥dk
1291
+ i ∥2
1292
+ = θ2
1293
+ k∥xk − xk−1∥2 + ψ2 �n
1294
+ i=1
1295
+ 1
1296
+ pi ∥ηk[Gxk]i − θk[Gxk−1]i∥2
1297
+ − 2ψθ2
1298
+ k⟨Gxk − Gxk−1, xk − xk−1⟩ − 2ψθk(ηk − θk)⟨Gxk, xk − xk−1⟩.
1299
+ 12
1300
+
1301
+ Utilizing (CP) and the Young inequality into the last expression, we can show that
1302
+ Ek
1303
+
1304
+ ∥xk+1 − xk∥2�
1305
+
1306
+
1307
+ θ2
1308
+ k + 2θk(ηk − θk)
1309
+
1310
+ ∥xk − xk−1∥2 + ψ2θk(ηk−θk)
1311
+ 2
1312
+ ∥Gxk∥2
1313
+ − 2ψθ2
1314
+ k
1315
+ �n
1316
+ i=1
1317
+ 1
1318
+ Li ∥[Gxk]i − [Gxk−1]i∥2
1319
+ + ψ2 �n
1320
+ i=1
1321
+ 1
1322
+ pi ∥ηk[Gxk]i − θk[Gxk−1]i∥2.
1323
+ Multiplying this inequality by ω2t2
1324
+ k+1 = (k + 2ω + 2)2 and noting that ω2t2
1325
+ k+1[θ2
1326
+ k + 2θk(ηk −
1327
+ θk)] = ω2t2
1328
+ k−2ω(k+2ω+1) and ω2t2
1329
+ k+1θk(ηk−θk) = ω(k+1), and then taking full expectation
1330
+ of the resulting inequality, we obtain
1331
+ ω2t2
1332
+ k+1E
1333
+
1334
+ ∥xk+1 − xk∥2�
1335
+ ≤ ω2t2
1336
+ kE
1337
+
1338
+ ∥xk − xk−1∥2�
1339
+ − 2ω(k + 2ω + 1)E
1340
+
1341
+ ∥xk − xk−1∥2�
1342
+ +
1343
+ ψ2ω2t2
1344
+ k+1
1345
+ pmin
1346
+ E
1347
+
1348
+ ∥ηkGxk − θkGxk−1∥2�
1349
+ + ψ2ω(k+1)
1350
+ 2
1351
+ E
1352
+
1353
+ ∥Gxk∥2�
1354
+ − 2ψ(k+1)2
1355
+ Lmax
1356
+ E
1357
+
1358
+ ∥Gxk − Gxk−1∥2�
1359
+ ,
1360
+ where Lmax := max{Li : i ∈ [n]}. This inequality leads to
1361
+ T[3] := (k + 2ω + 2)2E
1362
+
1363
+ ∥xk+1 − xk∥2�
1364
+ + 2ω(k + 2ω + 1)E
1365
+
1366
+ ∥xk − xk−1∥2�
1367
+ + 2ψ(k+1)2
1368
+ Lmax
1369
+ E
1370
+
1371
+ ∥Gxk − Gxk−1∥2�
1372
+ ≤ (k + 2ω + 1)2E
1373
+
1374
+ ∥xk − xk−1∥2�
1375
+ +
1376
+ ψ2
1377
+ pmin(k + 2ω + 2)2E
1378
+
1379
+ ∥ηkGxk − θkGxk−1∥2�
1380
+ + ψ2ω(k+1)
1381
+ 2
1382
+ ∥Gxk∥2.
1383
+ Utilizing this inequality, (26), and the second line of (17), we can conclude that limk→∞(k +
1384
+ 2ω + 2)2E
1385
+
1386
+ ∥xk+1 − xk∥2�
1387
+ exists. Summing up the inequality T[3] from k := 0 to k := K − 1
1388
+ and noting that 4ω2 ≥ (4ω − 1)ω and x0 = x−1, we obtain
1389
+ (K + 2ω + 1)2 E
1390
+
1391
+ ∥xK − xK−1∥2�
1392
+ + 2ω �K−1
1393
+ k=0 (k + 2ω + 1)E
1394
+
1395
+ ∥xk − xk−1∥2�
1396
+ +
1397
+
1398
+ Lmax
1399
+ �K−1
1400
+ k=0 (k + 1)2E
1401
+
1402
+ ∥Gxk − Gxk−1∥2�
1403
+
1404
+ ψ2
1405
+ pmin
1406
+ �K−1
1407
+ k=0 (k + 2ω + 2)2∥ηkGxk − θkGxk−1∥2
1408
+ + ψ2ω
1409
+ 2
1410
+ �K−1
1411
+ k=0 (k + 1)E
1412
+
1413
+ ∥Gxk∥2�
1414
+ (17),(26)
1415
+
1416
+
1417
+ ψω2
1418
+ pminC + 8
1419
+
1420
+ E
1421
+
1422
+ V0�
1423
+ + 4ωE[C0]
1424
+ (ω−3) .
1425
+ (27)
1426
+ This inequality shows that E
1427
+
1428
+ ∥xk+1 − xk∥2�
1429
+ = O
1430
+
1431
+ 1/k2�
1432
+ as in (18). Combining the existence
1433
+ of limk→∞(k + 2ω + 2)2E
1434
+
1435
+ ∥xk+1 − xk∥2�
1436
+ and �k
1437
+ k=0(k + ω + 1)E
1438
+
1439
+ ∥xk − xk−1∥2�
1440
+ < +∞, we
1441
+ obtain limk→∞(k + 2ω + 2)2E
1442
+
1443
+ ∥xk+1 − xk∥
1444
+ �2 = 0, which proves the o-rate in (18).
1445
+ Finally, from (23), (25), and (27), we have
1446
+ (k + ω)2E
1447
+
1448
+ ∥Gxk∥2�
1449
+ (25)
1450
+
1451
+ 8(k+ω)2
1452
+ ψ2
1453
+ E
1454
+
1455
+ ∥xk+1 − xk∥2�
1456
+ + 8(k+ω)2
1457
+ ψ2
1458
+ E
1459
+
1460
+ ∥xk+1 − xk + ψηkGxk∥2�
1461
+ (23),(27)
1462
+
1463
+ 8
1464
+ ψ2
1465
+
1466
+ ψω2
1467
+ pminC + 8(ω−1)
1468
+ ω
1469
+ + ψω2(1−pmin)
1470
+ pminC
1471
+ + 8
1472
+
1473
+ E
1474
+
1475
+ V0�
1476
+ + 32ωE[C0]
1477
+ ψ2(ω−3) .
1478
+ This inequality shows that E
1479
+
1480
+ ∥Gxk∥2�
1481
+ = O
1482
+
1483
+ 1/k2�
1484
+ . The o-rate E
1485
+
1486
+ ∥Gxk∥2�
1487
+ = o
1488
+ � 1
1489
+ k2
1490
+
1491
+ immedi-
1492
+ ately follows from the first line of this inequality, the first line of (18), and (24).
1493
+ 13
1494
+
1495
+ Application to fixed-point problems.
1496
+ Let us apply (ARBC) to approximate a fixed-
1497
+ point x⋆ of a nonexpansive operator T : Rp → Rp, i.e. x⋆ = Tx⋆. As mentioned earlier, if we
1498
+ define G := I − T, then G is firmly nonexpansive, or equivalently, 1-co-coercive. Moreover,
1499
+ x⋆ is a fixed-point of T iff Gx⋆ = 0.
1500
+ Therefore, we can apply (ARBC) to solve Gx⋆ =
1501
+ 0. For simplicity of presentation, we assume that ik is generated uniformly randomly, i.e.
1502
+ Prob (ik = i) = 1
1503
+ n for all i ∈ [n]. In this case, (ARBC) reduces to
1504
+ xk+1
1505
+ i
1506
+ :=
1507
+
1508
+ xk
1509
+ i + ˆηkxk
1510
+ i − ˆγkxk−1
1511
+ i
1512
+ + ˆψ
1513
+
1514
+ ηk[Txk]ik) − γk[Txk−1]ik
1515
+
1516
+ , if i = ik,
1517
+ xk
1518
+ i + θk(xk
1519
+ i − xk−1
1520
+ i
1521
+ ),
1522
+ otherwise,
1523
+ (28)
1524
+ where ˆψ := nψ, ˆηk := θk − ˆψηk, and ˆγk := θk − ˆψγk. Clearly, our new scheme (28) is different
1525
+ from existing methods for approximating a fixed-point x⋆ of a non-expansive operator T. The
1526
+ convergence rates of the residual E
1527
+
1528
+ ∥xk − Txk∥2�
1529
+ and E
1530
+
1531
+ ∥xk+1 − xk∥2�
1532
+ of (28) are guaranteed
1533
+ by Theorem 3.1. However, we omit them here to avoid repetition.
1534
+ 3.2
1535
+ Practical variant of ARBC
1536
+ Let us derive an alternative form of (ARBC) so that it is easier to implement in practice. First,
1537
+ from (ARBC), we have xk+1 − xk = θk(xk − xk−1) −
1538
+ ψ
1539
+ pik dk
1540
+ [ik], where dk := ηkGxk − γkGxk−1.
1541
+ Let us assume that θk =
1542
+ τk+1
1543
+ τk
1544
+ for a given positive sequence {τk}.
1545
+ This relation leads to
1546
+ τk+1 = τkθk. Moreover, we can write (ARBC) as
1547
+ 1
1548
+ τk+1(xk+1 − xk) = 1
1549
+ τk (xk − xk−1) −
1550
+ ψ
1551
+ pik τk+1dk
1552
+ [ik].
1553
+ Now, if we introduce wk := 1
1554
+ τk (xk − xk−1), then (ARBC) can be rewritten as
1555
+ xk := xk−1 + τkwk
1556
+ and
1557
+ wk+1 := wk −
1558
+ ψ
1559
+ pik τk+1dk
1560
+ [ik].
1561
+ By induction, we can show that xk = x0 + �k
1562
+ i=1 τiwi. Let us express this representation as
1563
+ xk = x0 − τ1(w2 − w1) − (τ1 + τ2)(w3 − w2) − (τ1 + τ2 + τ3)(w4 − w3)
1564
+ − · · · − (τ1 + · · · + τk−1)(wk − wk−1) + (τ1 + · · · + τk−1 + τk)wk.
1565
+ Therefore, if we define ck := ��k
1566
+ i=1 τi with a convention that c0 := 0, and ∆wk := wk+1 − wk,
1567
+ then we can write xk as
1568
+ xk = x0 − �k−1
1569
+ i=1 ci∆wi + ckwk.
1570
+ If we introduce zk := x0 − �k−1
1571
+ i=1 ci∆wi, then we get zk = zk−1 − ck−1∆wk−1 with z0 := x0,
1572
+ and hence xk = zk + ckwk. Therefore, we can summarize our derivation above as
1573
+
1574
+
1575
+
1576
+
1577
+
1578
+
1579
+
1580
+
1581
+
1582
+ wk+1 := wk −
1583
+ ψ
1584
+ pikτk+1 dk
1585
+ ik,
1586
+ zk+1
1587
+ := zk − ck∆wk = zk +
1588
+ ckψ
1589
+ pikτk+1 dk
1590
+ ik
1591
+ xk+1
1592
+ = zk+1 + ck+1wk+1.
1593
+ 14
1594
+
1595
+ Eliminating xk and xk−1 from the last scheme, we can write (ARBC) equivalently to
1596
+
1597
+
1598
+
1599
+
1600
+
1601
+
1602
+
1603
+
1604
+
1605
+
1606
+
1607
+
1608
+
1609
+
1610
+
1611
+
1612
+
1613
+
1614
+
1615
+ dk
1616
+ i
1617
+ := ηk[G(zk + ckwk)]i − γk[G(zk−1 + ck−1wk−1)]i,
1618
+ if i = ik,
1619
+ wk+1
1620
+ i
1621
+ :=
1622
+ � wk
1623
+ i −
1624
+ ψ
1625
+ piτk+1dk
1626
+ i , if i = ik,
1627
+ wk
1628
+ i ,
1629
+ otherwise,
1630
+ zk+1
1631
+ i
1632
+ :=
1633
+ � zk
1634
+ i +
1635
+ ψck
1636
+ piτk+1 dk
1637
+ i , if i = ik,
1638
+ zk
1639
+ i ,
1640
+ otherwise.
1641
+ (29)
1642
+ Here, x0 ∈ Rp is given, z0 = z−1 := x0, and w0 = w−1 := 0. Moreover, the parameters τk
1643
+ and ck are respectively updated as
1644
+ τk+1 := τkθk
1645
+ and
1646
+ ck := ck−1 + τk,
1647
+ (30)
1648
+ where c0 = c−1 := 0 and τ0 := 1.
1649
+ The scheme (29) is though different from accelerated randomized block-coordinate meth-
1650
+ ods for convex optimization such as [1, 18, 36, 49], it has some common features as those
1651
+ methods such as the block-coordinate evaluations of G at zk + ckwk and zk−1 + ck−1wk−1,
1652
+ respectively. One notable property of (29) is that it does not require full dimensional updates
1653
+ of wk and zk. Note that one can also extend our method (ARBC) (or equivalently, (29)) to up-
1654
+ date multiple blocks by randomly choosing a subset Sk ⊂ [n] such that Prob (i ∈ Sk) = pi > 0
1655
+ for i ∈ [n].
1656
+ 4
1657
+ Applications to Monotone Inclusions
1658
+ In this section, we derive two variants of (ARBC) to approximate a solution of the following
1659
+ monotone inclusion involving the sum of two monotone operators:
1660
+ Find x⋆ ∈ Rp such that:
1661
+ 0 ∈ Ax⋆ + Bx⋆,
1662
+ (MI)
1663
+ where A, B : Rp ⇒ Rp are maximally monotone operators. Moreover, we assume that Ax =
1664
+ [A1x1, A2x2, · · · , Anxn] is a separable operator compounded by n independent blocks.
1665
+ We apply (ARBC) to two common methods for solving (MI): the forward-backward split-
1666
+ ting (FBS) and the Douglas-Rachford (splitting (DRS) schemes.
1667
+ 4.1
1668
+ ARBC Forward-Backward Splitting Method
1669
+ Let us first reformulate (MI) equivalently to (CE) by using the following forward-backward
1670
+ (FB) residual mapping:
1671
+ Gβx := β−1(x − JβA(x − βBx)),
1672
+ (31)
1673
+ where β > 0 is given and JβA := (I + βA)−1 is the resolvent of βA. As shown in [48], if B
1674
+ is 1
1675
+ L-co-coercive and 0 < β < 4
1676
+ L, then Gβ(·) defined by (31) is β(4−βL)
1677
+ 4
1678
+ -co-coercive. Moreover,
1679
+ x⋆ ∈ zer(A + B) is a solution of (MI) iff Gβx⋆ = 0. The latter is exactly a special case of
1680
+ (CE). If dom(B) = Rp, then Gβ satisfies Assumption 3.1 with Li = β(4−βL)
1681
+ 4
1682
+ for i ∈ [n]. Note
1683
+ that we can extend our results to the case B is L−1-block coordinate-wise co-coercive as in
1684
+ (CP). However, we omit this extension here.
1685
+ 15
1686
+
1687
+ Our goal is to specify (ARBC) to solve Gβx⋆ = 0. In this case, we obtain the following
1688
+ variant of (ARBC):
1689
+ xk+1 := xk + θk(xk − xk−1) −
1690
+ ψ
1691
+ pik
1692
+
1693
+ ηkGβ
1694
+ [ik]xk − γkGβ
1695
+ [ik]xk−1�
1696
+ ,
1697
+ where θk, ψ, ηk, and γk are updated as in (ARBC). Clearly, by taking into account the
1698
+ separable structure of A and using (31), we can explicitly write the block-coordinate of Gβx
1699
+ as
1700
+ [Gβx]i = 1
1701
+ β(xi − JβAi(xi − β[Bx]i)).
1702
+ Combining the last two expressions, we can write the new variant of (ARBC) as follows:
1703
+
1704
+
1705
+
1706
+
1707
+
1708
+
1709
+
1710
+
1711
+
1712
+
1713
+
1714
+
1715
+
1716
+
1717
+
1718
+ ˆdk−1
1719
+ i
1720
+ := xk−1
1721
+ i
1722
+ − JβAi(xk−1
1723
+ i
1724
+ − β[Bxk−1]i),
1725
+ if i = ik,
1726
+ dk
1727
+ i
1728
+ := xk
1729
+ i − JβAi(xk
1730
+ i − β[Bxk]i),
1731
+ if i = ik,
1732
+ xk+1
1733
+ i
1734
+ :=
1735
+
1736
+
1737
+
1738
+ xk
1739
+ i + θk(xk
1740
+ i − xk−1
1741
+ i
1742
+ ) −
1743
+ ψ
1744
+ βpi
1745
+
1746
+ ηkdk
1747
+ i − γk ˆdk−1
1748
+ i
1749
+
1750
+ , if i = ik,
1751
+ xk
1752
+ i + θk(xk
1753
+ i − xk−1
1754
+ i
1755
+ ),
1756
+ otherwise,
1757
+ (32)
1758
+ where x0 ∈ Rp is a given initial point, x−1 := x0, and ik ∈ [n] is randomly generated based
1759
+ on the probability law (5), i.e. Prob (i = ik) = pi for i ∈ [n].
1760
+ The scheme (32) requires two block-coordinate evaluations [Bxk−1]i and [Bxk]i of B and
1761
+ two evaluations of JβAi at each iteration k. Therefore, it essentially costs as twice as existing
1762
+ standard block-coordinate FBS methods. However, its convergence rate is significantly faster
1763
+ than those standard block-coordinate FBS methods, typically O
1764
+
1765
+ 1/k2�
1766
+ compared to O (1/k).
1767
+ Finally, we specify Theorem 3.1 (without proof) to obtain convergence results of (32).
1768
+ Corollary 4.1. Let B be 1
1769
+ L-co-coercive on Rp, A be maximally monotone, and zer(A+B) ̸= ∅
1770
+ in (MI). Let {xk} be generated by (32) using pi :=
1771
+ 1
1772
+ n (∀i ∈ [n]). For given ω > 3 and
1773
+ 0 < β < 4
1774
+ L, we choose 0 < ψ <
1775
+ 8
1776
+ nβ(4−βL) and update θk, ηk, and γk as in (16). Then, both
1777
+ quantities E
1778
+
1779
+ ∥Gβxk∥2�
1780
+ and E
1781
+
1782
+ ∥xk+1 − xk∥2�
1783
+ simultaneously achieve O
1784
+
1785
+ 1/k2�
1786
+ and o
1787
+
1788
+ 1/k2�
1789
+ convergence rates.
1790
+ In fact, if {xk} is generated by (32), then the bounds in (17) of Theorem 3.1 still hold for
1791
+ {xk} and Gβxk defined by (31). However, we only state the convergence rates in Corollary
1792
+ 4.1.
1793
+ 4.2
1794
+ ARBC Douglas-Rachford Splitting Method
1795
+ We consider the case B in (MI) is just maximally monotone. In this case, we consider the DR
1796
+ residual mapping of (MI) defined as follows (see also [48]):
1797
+ Eβu := 1
1798
+ β (JβBu − JβA(2JβBu − u)) ,
1799
+ (33)
1800
+ where β > 0 is given, and JβA and JβB are the resolvents of βA and βB, respectively. As
1801
+ shown in [48], Eβ(·) is β-co-coercive and dom(Eβ) = Rp. Moreover, x⋆ ∈ zer(A + B) is a
1802
+ solution of (MI) if and only if there exists u⋆ ∈ Rp such that Eβu⋆ = 0 and x⋆ = JβBu⋆.
1803
+ 16
1804
+
1805
+ Now, if we directly apply (ARBC) to solve Eβu⋆ = 0, then by exploiting the separable
1806
+ structure of A, we obtain the following scheme for solving (MI):
1807
+
1808
+
1809
+
1810
+
1811
+
1812
+
1813
+
1814
+
1815
+
1816
+
1817
+
1818
+
1819
+
1820
+
1821
+
1822
+
1823
+
1824
+
1825
+
1826
+
1827
+
1828
+
1829
+
1830
+
1831
+
1832
+ ˆvk−1
1833
+ i
1834
+ := [JβBuk−1]i,
1835
+ if i = ik,
1836
+ vk
1837
+ i
1838
+ := [JβBuk]i,
1839
+ if i = ik,
1840
+ ˆdk−1
1841
+ i
1842
+ := ˆvk−1
1843
+ i
1844
+ − JβAi(2ˆvk−1
1845
+ i
1846
+ − uk−1
1847
+ i
1848
+ ),
1849
+ if i = ik,
1850
+ dk
1851
+ i
1852
+ := vk
1853
+ i − JβAi(2vk
1854
+ i − uk
1855
+ i ),
1856
+ if i = ik,
1857
+ uk+1
1858
+ i
1859
+ :=
1860
+
1861
+
1862
+
1863
+ uk
1864
+ i + θk(uk
1865
+ i − uk−1
1866
+ i
1867
+ ) − ψ
1868
+ pi
1869
+
1870
+ ηkdk
1871
+ i − γk ˆdk−1
1872
+ i
1873
+
1874
+ , if i = ik,
1875
+ uk
1876
+ i + θk(uk
1877
+ i − uk−1
1878
+ i
1879
+ ),
1880
+ otherwise,
1881
+ (34)
1882
+ where u0 ∈ Rp is given, u−1 := u0, and ik ∈ [n] is randomly generated based on (5).
1883
+ Unlike (32), which operates directly on the sequence
1884
+
1885
+ xk�
1886
+ , (34) generates an intermediate
1887
+ sequence {uk}. To recover an approximate solution xk of (MI), we can compute xk := JβBuk
1888
+ at the end of the algorithm. Again, our new scheme (34) is very different from existing ones
1889
+ in the literature, including [11]. Note that (34) requires two block-coordinate evaluations
1890
+ [JβBxk]i and [JβBxk−1]i of JβB, and two evaluations of JβAi at each iteration k. Hence, its
1891
+ per-iteration complexity costs as twice as the method in [11]. However, we believe that the
1892
+ convergence rate of (34) is significantly faster than the one in [11].
1893
+ Finally, similar to Corollary 4.1, we specify Theorem 3.1 to obtain convergence of (34).
1894
+ Corollary 4.2. Assume that zer(A + B) ̸= ∅ and both A and B in (MI) are maximally
1895
+ monotone. Let {uk} be generated by (34) using pi := 1
1896
+ n for all i ∈ [n]. For given ω > 3,
1897
+ β > 0, and 0 < ψ < 2β
1898
+ n , we update θk, ηk, and γk as in (16). Then, both E
1899
+
1900
+ ∥Eβuk∥2�
1901
+ and E
1902
+
1903
+ ∥uk+1 − uk∥2�
1904
+ simultaneously achieve O
1905
+
1906
+ 1/k2�
1907
+ and o
1908
+
1909
+ 1/k2�
1910
+ convergence rates. If, in
1911
+ addition, B is single-valued and xk := JβBuk, then both E
1912
+
1913
+ ∥Gβxk∥2�
1914
+ and E
1915
+
1916
+ ∥xk+1 − xk∥2�
1917
+ simultaneously achieve O
1918
+
1919
+ 1/k2�
1920
+ and o
1921
+
1922
+ 1/k2�
1923
+ convergence rates, where Gβxk is given by (31).
1924
+ This corollary is a direct consequence of Theorem 3.1, and we omit its proof. The last
1925
+ conclusion of Corollary 4.2 can easily be obtained by using the relation between Eβu and Gβu
1926
+ as stated in [48, Lemma 2].
1927
+ 5
1928
+ Application to Finite-Sum Monotone Inclusions
1929
+ Many machine learning applications and optimization models over networks, including fed-
1930
+ erated learning, can be formulated into the following finite-sum monotone inclusion [13, 40]:
1931
+ Find x⋆ ∈ dom(A) ∩ dom(B) such that
1932
+ 0 ∈ 1
1933
+ n
1934
+ n
1935
+
1936
+ i=1
1937
+ Aix⋆ + Bx⋆ ≡ Ax⋆ + Bx⋆,
1938
+ (35)
1939
+ where Ai : Rp ⇒ Rp (∀i ∈ [n]) are maximally monotone and B : Rp ⇒ Rp is also maximally
1940
+ monotone. Here, we also assume that zer(A + B) ̸= ∅. Note that A := 1
1941
+ n
1942
+ �n
1943
+ i=1 Ai in (35) is
1944
+ the average of a finite-sum operator, and it is different from the block separable operator in
1945
+ (MI). Therefore, we cannot directly apply the methods in Section 4 to solve (35).
1946
+ 17
1947
+
1948
+ One important special case of (35) is the optimality condition of the following finite-sum
1949
+ convex minimization problem which is ubiquitous in machine learning and statistical learning:
1950
+ min
1951
+ x∈Rp
1952
+
1953
+ F(x) := 1
1954
+ n
1955
+ n
1956
+
1957
+ i=1
1958
+ fi(x) + g(x)
1959
+
1960
+ ,
1961
+ (36)
1962
+ where fi : Rp → R ∪ {+∞} and g : Rp → R ∪ {+∞} are proper, closed, and convex. The
1963
+ optimality condition of (36) can be written as 0 ∈ 1
1964
+ n
1965
+ �n
1966
+ i=1 ∂fi(x⋆) + ∂g(x⋆), which is covered
1967
+ by (35) by setting Ai := ∂fi and B := ∂g.
1968
+ To develop a new variant of (ARBC) for solving (35), we first reformulate (35) into (MI)
1969
+ by duplicating the variable x as x := [x1, x2, · · · , xn], where xi ∈ Rp for all i ∈ [n]. Then, we
1970
+ can reformulate (35) into the following monotone inclusion:
1971
+ 0 ∈ Ax⋆ + Bx⋆ + ∂δL(x⋆), where Ax := [A1x1, · · · , Anxn],
1972
+ Bx := [nBx1, 0, · · · , 0], (37)
1973
+ and ∂δL is the subdifferential of the indicator of the linear subspace L := {x = [x1, · · · , xn] ∈
1974
+ Rnp : xi = x1, ∀i ∈ [n]}. It is obvious to show that x⋆ is a solution of (35) if and only if
1975
+ x⋆ = [x⋆, · · · , x⋆] solves (37), see, e.g., [51]. Moreover, A and B in (37) are separable.
1976
+ Let us apply the ARBC DR splitting scheme (34) to solve (37). Then we use the interpre-
1977
+ tation in Subsection 3.2 to obtain a practical variant. Here, we view A as A and B + ∂δL as
1978
+ B in (MI). Let us first compute the resolvent of β(B + ∂δL) at uk. This requires solving
1979
+
1980
+ 0 ∈ nβBu1 + βs1 + u1 − uk
1981
+ 1,
1982
+ 0 = βsi + ui − uk
1983
+ i ,
1984
+ i = 2, · · · , n,
1985
+ (38)
1986
+ where s := [s1, · · · , sn] ∈ ∂δL(u) ≡ L⊥ := {s := [s1, · · · , sn] : �n
1987
+ i=1 si = 0}. The last line of
1988
+ (38) leads to ui = uk
1989
+ i − βzi if ui = u1 for i = 2, · · · , n. Therefore, we obtain
1990
+ (n − 1)u1 =
1991
+ n
1992
+
1993
+ i=2
1994
+ uk
1995
+ i − β
1996
+ n
1997
+
1998
+ i=2
1999
+ si =
2000
+ n
2001
+
2002
+ i=2
2003
+ uk
2004
+ i − β
2005
+ n
2006
+
2007
+ i=1
2008
+ si + βs1 =
2009
+ n
2010
+
2011
+ i=2
2012
+ uk
2013
+ i + βs1,
2014
+ due to the fact that �n
2015
+ i=1 si = 0. This equation implies that u1 + βs1 = nu1 − �n
2016
+ i=2 uk
2017
+ i . Sub-
2018
+ stituting this expression into the first line of (38), we get 0 ∈ nβBu1+nu1−�n
2019
+ i=1 uk
2020
+ i , or equiv-
2021
+ alently, 0 ∈ βBu1 + u1 − 1
2022
+ n
2023
+ �n
2024
+ i=1 uk
2025
+ i . Solving this inclusion, we obtain u1 = JβB
2026
+ � 1
2027
+ n
2028
+ �n
2029
+ i=1 uk
2030
+ i
2031
+
2032
+ .
2033
+ Let us defined ˆuk := JβB
2034
+ � 1
2035
+ n
2036
+ �n
2037
+ i=1 uk
2038
+ i
2039
+
2040
+ . Then, we have Jβ(B+∂δL)uk = [ˆuk, · · · , ˆuk]. Conse-
2041
+ quently, for any i ∈ [n], we obtain [Jβ(B+∂δL)uk]i = ˆuk.
2042
+ Next, we use the trick in Subsection 3.2 to eliminate uk
2043
+ i in (34). Since uk
2044
+ i = zk
2045
+ i + ckwk
2046
+ i ,
2047
+ we have ¯uk := 1
2048
+ n
2049
+ �n
2050
+ i=1 uk
2051
+ i = 1
2052
+ n
2053
+ �n
2054
+ i=1(zk
2055
+ i + ckwk
2056
+ i ) = ¯zk + ck ¯wk, where ¯zk := 1
2057
+ n
2058
+ �n
2059
+ i=1 zk
2060
+ i and
2061
+ ¯wk := 1
2062
+ n
2063
+ �n
2064
+ i=1 wk
2065
+ i . However, at each iteration k, only wk
2066
+ ik and zk
2067
+ ik are updated, we have
2068
+
2069
+ ¯zk+1 := 1
2070
+ n
2071
+ �n
2072
+ i=1 zk+1
2073
+ i
2074
+ = 1
2075
+ n
2076
+ �n
2077
+ i=1 zk
2078
+ i + 1
2079
+ n(zk+1
2080
+ ik
2081
+ − zk
2082
+ ik) = ¯zk + 1
2083
+ n∆zk+1
2084
+ ik
2085
+ ,
2086
+ ¯wk+1 := 1
2087
+ n
2088
+ �n
2089
+ i=1 wk+1
2090
+ i
2091
+ = 1
2092
+ n
2093
+ �n
2094
+ i=1 wk
2095
+ i + 1
2096
+ n(wk+1
2097
+ ik
2098
+ − wk
2099
+ ik) = ¯wk + 1
2100
+ n∆wk+1
2101
+ ik
2102
+ ,
2103
+ where ∆zk+1
2104
+ ik
2105
+ := zk+1
2106
+ ik
2107
+ − zk
2108
+ ik and ∆wk+1
2109
+ ik
2110
+ := wk+1
2111
+ ik
2112
+ − wk
2113
+ ik.
2114
+ Now, we are ready to specify (34) to solve (37) as in Algorithm 1.
2115
+ 18
2116
+
2117
+ Algorithm 1 (Accelerated Federated Douglas-Rachford Algorithm (AccFedDR))
2118
+ 1: Initialization: Input an initial point u0 ∈ Rp and set c0 := c−1 := 0 and τ0 := 1.
2119
+ 2:
2120
+ Initialize each user i with z0
2121
+ i = z−1
2122
+ i
2123
+ := u0 and w0
2124
+ i = w−1
2125
+ i
2126
+ = 0 for i ∈ [n].
2127
+ 3:
2128
+ Initialize sever with ˆu0 = ˆu−1 := u0, ¯z0 := 0, and ¯w0 := 0.
2129
+ 4: For k := 0, · · · , kmax do
2130
+ 5:
2131
+ Sample an active user ik ∈ [n] following the probability law (5).
2132
+ 6:
2133
+ [Communication] Server sends ˆuk and ˆuk−1 to user ik.
2134
+ 7:
2135
+ [Local update] User ik updates its iterates wk+1
2136
+ ik
2137
+ and zk+1
2138
+ ik
2139
+ as
2140
+
2141
+
2142
+
2143
+
2144
+
2145
+
2146
+
2147
+
2148
+
2149
+
2150
+
2151
+
2152
+
2153
+
2154
+
2155
+ ˆdk−1
2156
+ ik
2157
+ := ˆuk−1 − JβAik (2ˆuk−1 − zk−1
2158
+ ik
2159
+ − ck−1wk−1
2160
+ ik
2161
+ ),
2162
+ dk
2163
+ ik
2164
+ := ˆuk − JβAik (2ˆuk − zk
2165
+ ik − ckwk
2166
+ ik),
2167
+ wk+1
2168
+ ik
2169
+ := wk
2170
+ ik −
2171
+ ψ
2172
+ pik τk+1 (ηkdk
2173
+ ik − γk ˆdk−1
2174
+ ik
2175
+ ),
2176
+ zk+1
2177
+ ik
2178
+ := zk
2179
+ ik +
2180
+ ψck
2181
+ pikτk+1 (ηkdk
2182
+ ik − γk ˆdk−1
2183
+ ik
2184
+ ).
2185
+ (39)
2186
+ 8:
2187
+ [Communication] User ik sends ∆wk+1
2188
+ ik
2189
+ := wk+1
2190
+ ik
2191
+ −wk
2192
+ ik and ∆zk+1
2193
+ ik
2194
+ := zk+1
2195
+ ik
2196
+ −zk
2197
+ ik to server.
2198
+ 9:
2199
+ [Server update] Server updates
2200
+ ¯wk+1 := ¯wk + 1
2201
+ n∆wk+1
2202
+ ik
2203
+ ,
2204
+ ¯zk+1 := ¯zk + 1
2205
+ n∆zk+1
2206
+ ik
2207
+ , and ˆuk+1 := JβB(¯zk+1 + ck+1 ¯wk+1).
2208
+ 10: End For
2209
+ Let us abbreviate Algorithm 1 by AccFedDR. Note that the parameters are updated as in
2210
+ (16) and (30). Clearly, AccFedDR is still synchronous, but it only requires the participation
2211
+ of one user ik at each communication round k. This scheme is also similar to SAGA [15] and
2212
+ a SAGA variant for co-coercive equations in [13]. However, our AccFedDR can solve a more
2213
+ general class of problems described by (35), where A is not necessarily co-coercive as in [13].
2214
+ This algorithm can also be applied to federated learning, see, e.g., [22, 26, 32, 33].
2215
+ To prove convergence of Algorithm 1, let us define the following residual operator:
2216
+
2217
+ ˆu
2218
+ := JβB
2219
+ � 1
2220
+ n
2221
+ �n
2222
+ i=1 ui
2223
+
2224
+ ,
2225
+ Eβu := 1
2226
+ β[ˆu − JβA1(2ˆu − u1), · · · , ˆu − JβAn(2ˆu − un)].
2227
+ (40)
2228
+ One can easily show that if Eβu⋆ = 0, then ˆu⋆ = JβB
2229
+ � 1
2230
+ n
2231
+ �n
2232
+ i=1 u⋆
2233
+ i
2234
+
2235
+ solves (35). Now, we can
2236
+ specify the convergence of AccFedDR as a consequence of Theorem 3.1.
2237
+ Corollary 5.1. Let Ai (i ∈ [n]) and B in (35) be maximally monotone and zer(A + B) ̸= ∅.
2238
+ Let {wk
2239
+ i } and {zk
2240
+ i } be generated by AccFedDR. Let uk := [uk
2241
+ 1, · · · , uk
2242
+ n] with uk
2243
+ i := zk
2244
+ i + ckwk
2245
+ i
2246
+ for all i ∈ [n] and Eβu be defined by (40). For given ω > 3, β > 0, and 0 < ψ < 2βpmin, we
2247
+ update θk, ηk, and γk as in (16). Then, we obtain the following bounds:
2248
+ �+∞
2249
+ k=0(k + ω + 1)E
2250
+
2251
+ ∥Eβuk−1∥2�
2252
+ < +∞,
2253
+ �+∞
2254
+ k=0(k + ω)E
2255
+
2256
+ ∥uk − uk−1∥2�
2257
+ < +∞,
2258
+ �+∞
2259
+ k=0(k + 1)2E
2260
+
2261
+ ∥Eβuk − Eβuk−1∥2�
2262
+ < +∞.
2263
+ (41)
2264
+ 19
2265
+
2266
+ Moreover, the following statements also hold:
2267
+
2268
+ E
2269
+
2270
+ ∥uk+1 − uk∥2�
2271
+ = O
2272
+ � 1
2273
+ k2
2274
+
2275
+ and
2276
+ E
2277
+
2278
+ ∥uk+1 − uk∥2�
2279
+ = o
2280
+ � 1
2281
+ k2
2282
+
2283
+ ,
2284
+ E
2285
+
2286
+ ∥Eβuk∥2�
2287
+ = O
2288
+ � 1
2289
+ k2
2290
+
2291
+ and
2292
+ E
2293
+
2294
+ ∥Eβuk∥2�
2295
+ = o
2296
+ � 1
2297
+ k2
2298
+
2299
+ .
2300
+ (42)
2301
+ Note that Corollary 5.1 only shows convergence on {uk}. To form an approximate solution
2302
+ ¯xk of (35), we simply compute ¯xk := JβB
2303
+ � 1
2304
+ n
2305
+ �n
2306
+ i=1 uk
2307
+ i
2308
+
2309
+ . Clearly, we can also easily show that
2310
+ E
2311
+
2312
+ ∥¯xk − ¯xk−1∥2�
2313
+ = O
2314
+ � 1
2315
+ k2
2316
+
2317
+ and E
2318
+
2319
+ ∥¯xk − ¯xk−1∥2�
2320
+ = o
2321
+ � 1
2322
+ k2
2323
+
2324
+ by the nonexpansiveness of JβB.
2325
+ Remark 5.1. Since our model (35) is more general than that of [13], our AccFedDR al-
2326
+ gorithm developed in this section can be applied to solve special cases as discussed in [13].
2327
+ However, we omit the details of these applications here to avoid repetition.
2328
+ 6
2329
+ Concluding Remarks
2330
+ We have developed a novel accelerated randomized block-coordinate method for solving a co-
2331
+ coercive equation of the form (CE). The new algorithm achieves O
2332
+
2333
+ 1/k2�
2334
+ and even o
2335
+
2336
+ 1/k2�
2337
+ convergence rates on the squared norm of the underlying operator G and some other quantities
2338
+ in expectation. We have also derived a practical variant and investigated three applications
2339
+ of our method for more general problems to cope with broader classes of applications. Several
2340
+ research questions remain open to us. Firstly, how to develop an accelerated randomized block-
2341
+ coordinate method for (CE) under weaker assumptions: monotone and Lipschitz continuous?
2342
+ For example, how to extend our method to extra-anchored gradient schemes [54] or their
2343
+ variants [25, 50]? Secondly, how to extend such a type of methods to (MI) without the co-
2344
+ coerciveness of B? Thirdly, how to develop asynchronous variants of our method, including
2345
+ the variant of Algorithm 1. In addition, several practical and implementation aspects of our
2346
+ methods as well as numerical verification are still left out in this paper.
2347
+ We leave these
2348
+ research questions for our future research.
2349
+ References
2350
+ [1] A. Alacaoglu, Q. Tran-Dinh, O. Fercoq, and V. Cevher.
2351
+ Smooth Primal-Dual Coor-
2352
+ dinate Descent Algorithms for Nonsmooth Convex Optimization. Advances in Neural
2353
+ Information Processing Systems (NIPS), pages 1–9, 2017.
2354
+ [2] H. Attouch and A. Cabot.
2355
+ Convergence of a relaxed inertial proximal algorithm for
2356
+ maximally monotone operators. Math. Program., 184(1):243–287, 2020.
2357
+ [3] H. Attouch and J. Fadili. From the Ravine method to the Nesterov method and vice
2358
+ versa: a dynamical system perspective. arXiv preprint arXiv:2201.11643, 2022.
2359
+ [4] A Auslender. Méthodes numériques pour la décomposition et la minimisation de fonctions
2360
+ non différentiables. Numerische Mathematik, 18(3):213–223, 1971.
2361
+ [5] H. H. Bauschke and P. Combettes. Convex analysis and monotone operators theory in
2362
+ Hilbert spaces. Springer-Verlag, 2nd edition, 2017.
2363
+ 20
2364
+
2365
+ [6] Amir Beck, Edouard Pauwels, and Shoham Sabach. The cyclic block conditional gradient
2366
+ method for convex optimization problems. SIAM Journal on Optimization, 25(4):2024–
2367
+ 2049, 2015.
2368
+ [7] R. I. Bot, E. R. Csetnek, and D. K. Nguyen. Fast OGDA in continuous and discrete
2369
+ time. arXiv preprint arXiv:2203.10947, 2022.
2370
+ [8] L. Bottou, F. E. Curtis, and J. Nocedal. Optimization Methods for Large-Scale Machine
2371
+ Learning. SIAM Rev., 60(2):223–311, 2018.
2372
+ [9] R. S. Burachik and A. Iusem.
2373
+ Set-Valued Mappings and Enlargements of Monotone
2374
+ Operators. New York: Springer, 2008.
2375
+ [10] Y. Chen, G. Lan, and Y. Ouyang. Accelerated schemes for a class of variational inequal-
2376
+ ities. Math. Program., 165(1):113–149, 2017.
2377
+ [11] P. L. Combettes and J.-C. Pesquet. Stochastic quasi-Fejér block-coordinate fixed point
2378
+ iterations with random sweeping. SIAM J. Optim., 25(2):1221–1248, 2015.
2379
+ [12] P. L. Combettes and V. R. Wajs. Signal recovery by proximal forward-backward splitting.
2380
+ Multiscale Model. Simul., 4:1168–1200, 2005.
2381
+ [13] D. Davis. Variance reduction for root-finding problems. Math. Program., pages 1–36,
2382
+ 2022.
2383
+ [14] D. Davis and W. Yin. A three-operator splitting scheme and its optimization applications.
2384
+ Set-valued and Variational Analysis, 25(4):829–858, 2017.
2385
+ [15] A. Defazio, F. Bach, and S. Lacoste-Julien. SAGA: A fast incremental gradient method
2386
+ with support for non-strongly convex composite objectives. In Advances in Neural Infor-
2387
+ mation Processing Systems (NIPS), pages 1646–1654, 2014.
2388
+ [16] J. Diakonikolas. Halpern iteration for near-optimal and parameter-free monotone inclu-
2389
+ sion and strong solutions to variational inequalities. In Conference on Learning Theory,
2390
+ pages 1428–1451. PMLR, 2020.
2391
+ [17] F. Facchinei and J.-S. Pang. Finite-dimensional variational inequalities and complemen-
2392
+ tarity problems, volume 1-2. Springer-Verlag, 2003.
2393
+ [18] Olivier Fercoq and Peter Richtárik. Accelerated, parallel, and proximal coordinate de-
2394
+ scent. SIAM J. Optim., 25(4):1997–2023, 2015.
2395
+ [19] B. Halpern. Fixed points of nonexpanding maps. Bull. Am. Math. Soc., 73(6):957–961,
2396
+ 1967.
2397
+ [20] D. Kim. Accelerated proximal point method for maximally monotone operators. Math.
2398
+ Program., pages 1–31, 2021.
2399
+ [21] D. Kim and J. A. Fessler. Optimized first-order methods for smooth convex minimization.
2400
+ Math. Program., 159(1-2):81–107, 2016.
2401
+ 21
2402
+
2403
+ [22] J. Konečn`y, H. B. McMahan, D. Ramage, and P. Richtárik. Federated optimization:
2404
+ Distributed machine learning for on-device intelligence. arXiv preprint arXiv:1610.02527,
2405
+ 2016.
2406
+ [23] G. Lan. First-order and Stochastic Optimization Methods for Machine Learning. Springer,
2407
+ 2020.
2408
+ [24] P. Latafat, A. Themelis, and P. Patrinos. Block-coordinate and incremental aggregated
2409
+ proximal gradient methods for nonsmooth nonconvex problems. Math. Program., pages
2410
+ 1–30, 2019.
2411
+ [25] S. Lee and D. Kim.
2412
+ Fast extra gradient methods for smooth structured nonconvex-
2413
+ nonconcave minimax problems. Thirty-fifth Conference on Neural Information Processing
2414
+ Systems (NeurIPs2021), 2021.
2415
+ [26] T. Li, A. K. Sahu, A. Talwalkar, and V. Smith. Federated learning: Challenges, methods,
2416
+ and future directions. IEEE Signal Processing Magazine, 37(3):50–60, 2020.
2417
+ [27] F. Lieder.
2418
+ On the convergence rate of the halpern-iteration.
2419
+ Optimization Letters,
2420
+ 15(2):405–418, 2021.
2421
+ [28] P. L. Lions and B. Mercier. Splitting algorithms for the sum of two nonlinear operators.
2422
+ SIAM J. Num. Anal., 16:964–979, 1979.
2423
+ [29] P.-E. Maingé.
2424
+ Accelerated proximal algorithms with a correction term for monotone
2425
+ inclusions. Applied Mathematics & Optimization, 84(2):2027–2061, 2021.
2426
+ [30] P. E. Maingé. Fast convergence of generalized forward-backward algorithms for structured
2427
+ monotone inclusions. arXiv preprint arXiv:2107.10107, 2021.
2428
+ [31] Y. Malitsky. Projected reflected gradient methods for monotone variational inequalities.
2429
+ SIAM J. Optim., 25(1):502–520, 2015.
2430
+ [32] B. McMahan and D. Ramage. Federated learning: Collaborative machine learning with-
2431
+ out centralized training data, Jul 2017.
2432
+ [33] H Brendan McMahan et al. Advances and open problems in federated learning. Founda-
2433
+ tions and Trends® in Machine Learning, 14(1), 2021.
2434
+ [34] Y. Nesterov. A method for unconstrained convex minimization problem with the rate of
2435
+ convergence O(1/k2). Doklady AN SSSR, 269:543–547, 1983. Translated as Soviet Math.
2436
+ Dokl.
2437
+ [35] Y. Nesterov. Introductory lectures on convex optimization: A basic course, volume 87 of
2438
+ Applied Optimization. Kluwer Academic Publishers, 2004.
2439
+ [36] Y. Nesterov. Efficiency of coordinate descent methods on huge-scale optimization prob-
2440
+ lems. SIAM J. Optim., 22(2):341–362, 2012.
2441
+ 22
2442
+
2443
+ [37] Y. Nesterov and S. U. Stich. Efficiency of the accelerated coordinate descent method on
2444
+ structured optimization problems. SIAM J. Optim., 27(1):110–123, 2017.
2445
+ [38] James M. Ortega and Werner C. Rheinboldt. Iterative solution of nonlinear equations
2446
+ in several variables. Society for Industrial and Applied Mathematics, Philadelphia, PA,
2447
+ USA, 2000.
2448
+ [39] Y. Ouyang and Y. Xu.
2449
+ Lower complexity bounds of first-order methods for convex-
2450
+ concave bilinear saddle-point problems. Math. Program., online first:1–35, 2019.
2451
+ [40] Z. Peng, Y. Xu, M. Yan, and W. Yin. ARock: an algorithmic framework for asynchronous
2452
+ parallel coordinate updates. SIAM J. Scientific Comput., 38(5):2851–2879, 2016.
2453
+ [41] R. R. Phelps. Convex functions, monotone operators and differentiability, volume 1364.
2454
+ Springer, 2009.
2455
+ [42] L. D. Popov. A modification of the Arrow-Hurwicz method for search of saddle points.
2456
+ Math. notes of the Academy of Sciences of the USSR, 28(5):845–848, 1980.
2457
+ [43] P. Richtárik and M. Takáč. Parallel coordinate descent methods for big data optimization.
2458
+ Math. Program., 156(1-2):433–484, 2016.
2459
+ [44] R. Rockafellar and R. Wets. Variational Analysis, volume 317. Springer, 2004.
2460
+ [45] R.T. Rockafellar. Monotone operators and the proximal point algorithm. SIAM J. Con-
2461
+ trol Optim., 14:877–898, 1976.
2462
+ [46] E. K. Ryu and S. Boyd. Primer on monotone operator methods. Appl. Comput. Math,
2463
+ 15(1):3–43, 2016.
2464
+ [47] S. Sra, S. Nowozin, and S. J. Wright. Optimization for Machine Learning. MIT Press,
2465
+ 2012.
2466
+ [48] Q. Tran-Dinh.
2467
+ The connection between Nesterov’s accelerated methods and Halpern
2468
+ fixed-point iterations. arXiv preprint arXiv:2203.04869, 2022.
2469
+ [49] Q. Tran-Dinh and D. Liu. A new randomized primal-dual algorithm for convex opti-
2470
+ mization with optimal last iterate rates. Optimization Methods & Software), pages 1–34
2471
+ (online first), 2022.
2472
+ [50] Q. Tran-Dinh and Y. Luo. Halpern-type accelerated and splitting algorithms for mono-
2473
+ tone inclusions. arXiv preprint arXiv:2110.08150, 2021.
2474
+ [51] Q. Tran-Dinh, N. H. Pham, D. T. Phan, and L. M. Nguyen. FedDR–Randomized Douglas-
2475
+ Rachford splitting algorithms for nonconvex federated composite optimization. NeurIPs
2476
+ 2021, pages 1–39, 2021.
2477
+ [52] P. Tseng. A modified forward-backward splitting method for maximal monotone map-
2478
+ pings. SIAM J. Control and Optim., 38(2):431–446, 2000.
2479
+ 23
2480
+
2481
+ [53] Stephen J Wright. Coordinate descent algorithms. Math. Program., 151(1):3–34, 2015.
2482
+ [54] T. Yoon and E. K. Ryu. Accelerated algorithms for smooth convex-concave minimax
2483
+ problems with O(1/k2) rate on squared gradient norm. In International Conference on
2484
+ Machine Learning, pages 12098–12109. PMLR, 2021.
2485
+ 24
2486
+
DtE1T4oBgHgl3EQfWQTV/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9E0T4oBgHgl3EQfRAC9/content/2301.02202v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:bdd9441cf249974b9220d4dda39fe253b35cf9c03b1dee8c366096df18e9ce20
3
+ size 332266
F9E0T4oBgHgl3EQfRAC9/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:7da9a43235801a91bd657c3cb1b407d1c102eff096c221c5eae438bed127da56
3
+ size 6094893
FtAyT4oBgHgl3EQf5Poe/content/2301.00799v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:84b57f93518ac1f71e3c0703d901f6e5ffd40dc31c9685786803b660a24dfe70
3
+ size 19787039
FtE4T4oBgHgl3EQfHAzF/content/2301.04900v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:f5f14bc182a4cbdc8757e2615277d4c2e36f1f90884419022895ab9812986477
3
+ size 612773
FtE4T4oBgHgl3EQfHAzF/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:27cee23da7a79174d6a40286a3867b8e4871027a9e94a124f4572bee00baa2b0
3
+ size 1900589
FtE4T4oBgHgl3EQfHAzF/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:856b674a68de0c40fb8cfc98322173cc2ee614aeba0dd8c1fcde2316a906dd7c
3
+ size 70418
HNAyT4oBgHgl3EQfS_eb/content/2301.00097v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:62e98c92ffff72f951a1cf3996d31dce900acf5ed455cc0d1e71f57600fff39b
3
+ size 225234
HNAyT4oBgHgl3EQfS_eb/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:367629a771feb0d14f6657af48dbc1ed8e59503264f627f0bc13a11ee1098af0
3
+ size 3342381
HNAyT4oBgHgl3EQfS_eb/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d598f9afe6cb2ece2fa94bf8c081db1c37a3ed1e30aea87eefc95d60221ee398
3
+ size 131391
HdAyT4oBgHgl3EQfffgY/content/tmp_files/2301.00339v1.pdf.txt ADDED
@@ -0,0 +1,922 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.00339v1 [cond-mat.mtrl-sci] 1 Jan 2023
2
+ The Origin of Two-dimensional Electron Gas in Zn1−xMgxO/ZnO Heterostructures
3
+ Xiang-Hong Chen,1 Dong-Yu Hou,1 Zhi-Xin Hu,2 Kuang-Hong Gao,1, ∗ and Zhi-Qing Li1, †
4
+ 1Tianjin Key Laboratory of Low Dimensional Materials Physics and Preparing Technology,
5
+ Department of Physics, Tianjin University, Tianjin 300354, China
6
+ 2Center for Joint Quantum Studies and Department of Physics, Tianjin University, Tianjin 300354, China
7
+ (Dated: January 3, 2023)
8
+ Although the two-dimensional electron gas (2DEG) in (001) Zn1−xMgxO/ZnO heterostructures
9
+ has been discovered for about twenty years, the origin of the 2DEG is still inconclusive. In the
10
+ present letter, the formation mechanisms of 2DEG near the interfaces of (001) Zn1−xMgxO/ZnO
11
+ heterostructures were investigated via the first-principles calculations method. It is found that the
12
+ polarity discontinuity near the interface can neither lead to the formation of 2DEG in devices with
13
+ thick Zn1−xMgxO layers nor in devices with thin Zn1−xMgxO layers. For the heterostructure with
14
+ thick Zn1−xMgxO layers, the oxygen vacancies near the interface introduce a defect band in the
15
+ band gap, and the top of the defect band overlaps with the bottom of the conduction band, leading
16
+ to the formation of the 2DEG near the interface of the device. For the heterostructure with thin
17
+ Zn1−xMgxO layers, the absorption of hydrogen atoms, oxygen atoms, or OH groups on the surface
18
+ of Zn1−xMgxO film plays a key role for the formation of 2DEG in the device. Our results manifest
19
+ the sources of 2DEGs in Zn1−xMgxO/ZnO heterostructures on the electronic structure level.
20
+ Since
21
+ the
22
+ discovery
23
+ of
24
+ two-dimensional
25
+ electron
26
+ gas (2DEG) at the interface of LaAlO3/SrTiO3 het-
27
+ erojunction [1],
28
+ 2DEG has been found at various
29
+ oxide heterostructures, such as Zn1−xMgxO/ZnO [2–
30
+ 4],
31
+ Al2O3/SrTiO3
32
+ [5,
33
+ 6],
34
+ EuO/KTaO3
35
+ [7],
36
+ (AlxGa1−x)2O3/Ga2O3
37
+ [8]
38
+ and
39
+ LaAlO3/KTaO3
40
+ [9].
41
+ The 2DEG at oxide heterostructures not only provides
42
+ a platform for fundamental research, but also promotes
43
+ the development of novel all-oxide electronic devices.
44
+ Among these oxide heterostructures, Zn1−xMgxO/ZnO
45
+ heterostructures
46
+ are
47
+ particularly
48
+ attractive
49
+ due
50
+ to
51
+ their ultra-high Hall mobility (up to 106 cm2V−1s−1
52
+ at low temperature [10]).
53
+ However, the origin of the
54
+ 2DEG at the Zn1−xMgxO/ZnO interface is still unclear.
55
+ Researchers only empirically attribute it to the polar
56
+ discontinuity [11–14]: since Zn1−xMgxO (0 < x < 0.6)
57
+ and ZnO have different spontaneous polarization, the
58
+ polarization at the
59
+ interface is
60
+ discontinuous after
61
+ they form heterojunctions.
62
+ This discontinuity causes
63
+ a large number of bound charges to be generated at
64
+ the heterointerface, creating a built-in electric field
65
+ throughout the
66
+ heterostructure.
67
+ This field drives
68
+ electrons toward the interface to form 2DEG. In con-
69
+ trast, some researchers believe that the 2DEG at the
70
+ Zn1−xMgxO/ZnO interface originates from the donor on
71
+ the Zn1−xMgxO surface [15, 16]. Experimentally, 2DEG
72
+ can also be formed when the thickness of Zn1−xMgxO
73
+ layer
74
+ is
75
+ greater
76
+ than
77
+ 300 nm
78
+ in
79
+ Zn1−xMgxO/ZnO
80
+ heterostructures [17–20].
81
+ There would be no internal
82
+ potential gradient in the aforementioned heterostructure
83
+ with thick Zn1−xMgxO layer, and the contribution of
84
+ surface donors to 2DEG could also be negligible [21, 22].
85
+ Thus the formation of 2DEG in this case cannot be
86
+ explained by the mechanisms mentioned above.
87
+ On
88
+ ∗ Corresponding author, e-mail: [email protected]
89
+ † Corresponding author, e-mail: [email protected]
90
+ the whole, the origin of 2DEG at Zn1−xMgxO/ZnO
91
+ heterointerface needs to be further studied. In this letter,
92
+ the origin of 2DEG at Zn1−xMgxO/ZnO heterointerface
93
+ is studied from the perspective of microscopic electronic
94
+ structures by first-principles calculations. Interestingly,
95
+ it is found that the polar discontinuity mechanism is
96
+ not responsible for the formation of the 2DEG. For the
97
+ heterostructures with thick Zn1−xMgxO layers, 2DEG
98
+ mainly arises from oxygen vacancies, while the 2DEG
99
+ originates from surface adsorption for heterostructures
100
+ with thin Zn1−xMgxO layers.
101
+ Considering
102
+ that
103
+ the
104
+ 2DEG
105
+ can
106
+ be
107
+ formed
108
+ in
109
+ Zn1−xMgxO/ZnO
110
+ heterostructures
111
+ with
112
+ both
113
+ thick
114
+ (∼100 to 500 nm) [23–27] and thin Zn1−xMgxO layers
115
+ (∼10 to 30 nm) [14–16] experimentally, we construct the
116
+ configurations as follows.
117
+ For Zn1−xMgxO/ZnO het-
118
+ erostructures with thick Zn1−xMgxO layers, we passi-
119
+ vated the oxygen terminal of ZnO slab and the Zn-Mg
120
+ terminal of Zn1−xMgxO slab by pseudo-H atoms with
121
+ fractional charges. ZnO slab with passivated oxygen ter-
122
+ minal can be used to simulate ZnO substrate, and the
123
+ charge of H is taken as 0.48e with e being the elementary
124
+ charge [21]. The charge of the pseudo-H atoms in the
125
+ passivated Zn-Mg terminal is taken as 1.52e [21]. After
126
+ passivation, the pseudo-H atoms not only saturate the
127
+ surface dangling bonds but also make the passivated sur-
128
+ face and the adjacent atomic layers exhibit bulk prop-
129
+ erties [21, 23]. In this case, the Zn1−xMgxO and ZnO
130
+ slabs can be treated as semi-infinite thick films.
131
+ Con-
132
+ sidering the Mg content x can be as high as 0.60 in
133
+ Zn1−xMgxO/ZnO heterostructures experimentally [24],
134
+ we set the Mg content x as 0.25 and 0.50, respectively.
135
+ For each doping level, the Mg ions are uniformly doped
136
+ into the ZnO film, which together with the ZnO sub-
137
+ strate forms a heterostructure with a clear interface.
138
+ For the Zn1−xMgxO/ZnO heterostructures with thin
139
+ Zn1−xMgxO layers, the difference in the configuration is
140
+ that there is no pseudo-H atom at the Zn-Mg terminal.
141
+
142
+ 2
143
+ Generally, the unpassivated Zn1−xMgxO (001) surface
144
+ is unstable and the surface adsorption or reconstruction
145
+ is inevitable [25–31]. Thus, the surface adsorption and
146
+ defects are considered to simulate the Zn1−xMgxO/ZnO
147
+ heterostructures with thin Zn1−xMgxO layers [26]. As
148
+ an example, in Fig. 1(a) we give the structure diagram
149
+ of a Zn1−xMgxO/ZnO heterostructure with two surfaces
150
+ passivated by pseudo-H atoms. The heterostructure con-
151
+ tains a 2×2 in-plane (001) Zn0.75Mg0.25O/ZnO supercell
152
+ and 18 Zn-Mg-O layers and 18 Zn-O layers. A 15-˚A-thick
153
+ vacuum layer is added along the [001] direction to prevent
154
+ any unintentional interactions between the slabs. From
155
+ the interface to surface, the atomic layers on the ZnO side
156
+ are labeled as L¯1, L¯2, · · · , L ¯17, and L ¯18, while the atomic
157
+ layers on the Zn0.75Mg0.25O side are labeled as L1, L2,
158
+ · · · , L17, and L18, respectively. The top view of Fig. 1(a)
159
+ along the [001] direction is shown in Fig. 1(b).
160
+ Three
161
+ adsorption sites named On-top, Fcc-hollow, and Hcp-
162
+ hollow, are indicated by the arrows. The positions of zinc
163
+ atoms in each layer are numbered as 1, 2, 3, and 4, respec-
164
+ tively. For the Mg doping level x = 0.25 case, the zinc
165
+ atoms at position 1 are substituted by magnesium atoms
166
+ in the odd layers, while the zinc atoms at position 3 are
167
+ replaced in the even layers. For the x = 0.50 situation,
168
+ the zinc atoms at positions 2 and 4 are replaced by mag-
169
+ nesium atoms in each layer. All calculations are carried
170
+ out in framework of density functional theory using the
171
+ Viennaab initio Simulation Package (VASP) [32]. The
172
+ in-plane lattice constants of Zn1−xMgxO/ZnO (x = 0.25
173
+ and 0.50) heterostructures are fixed to those of ZnO dur-
174
+ ing the calculations.
175
+ FIG.
176
+ 1.
177
+ (a)
178
+ Schematic
179
+ geometrical
180
+ structure
181
+ of
182
+ Zn1−xMgxO/ZnO
183
+ (x=0.25
184
+ and
185
+ 0.50)
186
+ heterostructure
187
+ with two pseudo-H-passivated surfaces.
188
+ (b) The top view
189
+ of the heterostructure along the [001] direction.
190
+ Here the
191
+ “On-top, Fcc-hollow, and Hcp-hollow” are the adsorption
192
+ sites for exotic atoms or groups.
193
+ Figure
194
+ 2(a)
195
+ shows
196
+ the
197
+ band
198
+ structure
199
+ of
200
+ Zn0.75Mg0.25O/ZnO heterostructure shown in Fig. 1(a)
201
+ (i.e., the heterostructure has 18 Zn-O and 18 Zn-Mg-O
202
+ -1
203
+ 0
204
+ 1
205
+ 2
206
+ 3
207
+ 4
208
+ 0
209
+ 20
210
+ 40
211
+ 60
212
+ 80
213
+ 100
214
+ -6
215
+ -4
216
+ -2
217
+ 0
218
+ 2
219
+ 4
220
+ 6
221
+
222
+
223
+ Energy (eV)
224
+ M
225
+ K
226
+ (a)
227
+ (b)
228
+ L18
229
+ Planar average
230
+ Macroscopic average
231
+ L2
232
+
233
+
234
+ Electrostatic potential (eV)
235
+ Distance along the [001] (�
236
+ )
237
+ L18
238
+ L4
239
+ Interface
240
+ ZnO
241
+ Zn
242
+ 0. 75
243
+ Mg
244
+ 0. 25
245
+ O
246
+ FIG.
247
+ 2.
248
+ (a)
249
+ The
250
+ energy
251
+ band
252
+ structure
253
+ of
254
+ the
255
+ Zn0.75Mg0.25O/ZnO heterostructure without oxygen vacan-
256
+ cies and with two pseudo-H-atoms-passivated surfaces.
257
+ (b)
258
+ The plane average (solid curve) and macroscopic average
259
+ (dash-dot curve) electrostatic potential (seen by electron)
260
+ across the Zn0.75Mg0.25O/ZnO heterostructure along the [001]
261
+ direction.
262
+ layers and two pseudo-H-atoms-passivated surfaces).
263
+ Clearly, the valence band maximum (VBM) and the con-
264
+ duction band minimum (CBM) are both located at the Γ
265
+ point, and the Fermi level lies in the band gap. Thus the
266
+ energy band of the Zn0.75Mg0.25O/ZnO heterostructure
267
+ exhibits direct-gap semiconductor characteristics (the
268
+ calculated band gap is 1.45 eV) and no 2DEG is formed
269
+ at the interface. For the x = 0.50 case, the band struc-
270
+ ture is similar to that of the x = 0.25 and the calculated
271
+ bad gap is 1.56 eV. Therefore, 2DEG cannot appear near
272
+ the interfaces of the perfect Zn1−xMgxO/ZnO (x = 0.25
273
+ and 0.50) heterostructures (without defects) with thick
274
+ Zn1−xMgxO layers. We also calculated the electrostatic
275
+ potential distribution for the above heterostructures,
276
+ and Fig. 2(b) presents the results for the x = 0.25 case
277
+ as an example.
278
+ There is a conspicuous bulge in the
279
+ macroscopic average potential curve near the interface
280
+ (from the L¯4 Zn-O layer to the L2 Zn-Mg-O layer). In
281
+ the atomic layers away from the interface, e.g., the Zn-O
282
+ layers from L¯4 to L ¯18 or Zn-Mg-O layers from L2 to
283
+ L18, the average potential almost retains a constant.
284
+ Thus, a potential barrier rather than a quantum well
285
+ is formed near the interface of the Zn0.75Mg0.25O/ZnO
286
+ heterostructure.
287
+ Similar phenomena are also observed
288
+ in the macroscopic average potential curve of the
289
+ Zn0.5Mg0.5O/ZnO
290
+ heterostructure.
291
+ This
292
+ potential
293
+ barrier should be caused by the polar discontinuity at
294
+ the interface, which could induce a localized polarization
295
+ field near the interface.
296
+ The polarization field cannot
297
+ cause the bottom of the conduction band to overlap
298
+ with the top of the valence band as in the case of
299
+ LaAlO3/SrTiO3 heterostructures [33]. Thus, the polar
300
+ discontinuity alone cannot explain the observed 2DEG
301
+ near the interface of Zn1−xMgxO/ZnO heterostructure
302
+ with thick Zn1−xMgxO layers.
303
+ Then,
304
+ why
305
+ the
306
+ 2DEGs
307
+ can
308
+ be
309
+ formed
310
+ in
311
+ Zn1−xMgxO/ZnO
312
+ heterostructures
313
+ with
314
+ thick
315
+
316
+ wollod-qoH
317
+ ECC-JOJJOM
318
+ OU-tob
319
+ (p) Lob AIGM sJoua e [ool]q!lGcrIo
320
+ U
321
+ M
322
+ ·H
323
+ T18
324
+ r18
325
+ SUO
326
+ (B)3
327
+ -0.5
328
+ -0.4
329
+ -0.3
330
+ -0.2
331
+ -0.1
332
+ -0.4
333
+ -0.2
334
+ 0.0
335
+ 0.2
336
+ 0.4
337
+
338
+
339
+ Formation energy (eV)
340
+ Zn O
341
+ Zn
342
+ 0.75
343
+ Mg
344
+ 0.25
345
+ O
346
+ In t erface
347
+ (a)
348
+ L1
349
+ L6
350
+ L12
351
+ L12
352
+ L6
353
+ L1
354
+ L1
355
+ L6
356
+ L12
357
+ L12
358
+ L6
359
+ L1
360
+ Formation energy (eV)
361
+
362
+ In t erface
363
+ Zn O
364
+ Zn
365
+ 0.5
366
+ Mg
367
+ 0.5
368
+ O
369
+ (b)
370
+ FIG. 3. Formation energies of oxygen vacancies at different
371
+ atomic layers in Zn1−xMgxO/ZnO heterostructures with two
372
+ pseudo-H-passivated surfaces. (a) For the x = 0.25, and (b)
373
+ for the x = 0.50 heterostructures.
374
+ Zn1−xMgxO layers?
375
+ It should be noticed that as
376
+ intrinsic defects in ZnO and Zn1−xMgxO films, oxygen
377
+ vacancies are inevitable during device fabrication and
378
+ could play crucial roles for the formation of 2DEG in
379
+ Zn1−xMgxO/ZnO heterostructures [34–37]. Next, we in-
380
+ vestigate the effect of oxygen vacancies on the electronic
381
+ structures of Zn1−xMgxO/ZnO (x = 0.25 and 0.50)
382
+ heterostructures with thick Zn1−xMgxO layers.
383
+ First,
384
+ we calculate the formation energy of oxygen vacancies
385
+ (Ef) in each atomic layer of the above heterostructures.
386
+ In the oxygen-rich limit, Ef can be written as [38]
387
+ Ef = E(VO) − (E0 − 0.5EO2),
388
+ (1)
389
+ where E(VO) and E0 are the calculated total energies of
390
+ the Zn1−xMgxO/ZnO (x = 0.25 and 0.50) heterostruc-
391
+ tures with and without oxygen vacancies, and EO2 is the
392
+ calculated total energy of the single O2 molecule. For
393
+ the configuration in Fig. 1, each in-plane supercell con-
394
+ tains four oxygen atoms, whose positions are labeled as
395
+ a, b, c, and d, respectively. The oxygen atoms at d po-
396
+ sition are removed in a certain fixed layer to create oxy-
397
+ gen vacancies in the calculations.
398
+ Figure 3 shows the
399
+ formation energies of the oxygen vacancies in each layer
400
+ of the Zn0.75Mg0.25O/ZnO and Zn0.5Mg0.5O/ZnO het-
401
+ erostructures with 18 Zn-O and 18 Zn-Mg-O layers, and
402
+ two pseudo-H-passivated surfaces. Inspection of Fig. 3
403
+ indicates that the overall variation trends of the Ef vs
404
+ layer number curves for the two heterostructures are sim-
405
+ ilar.
406
+ Thus we only discuss the variation of Ef in the
407
+ Zn0.75Mg0.25O/ZnO heterostructure. On the ZnO side,
408
+ the value Ef keeps as a constant in the first two layers,
409
+ and then sharply increases with increasing layer number,
410
+ reaches its maximum at L¯4, then decreases with further
411
+ increasing layer number, and tends to be saturated as the
412
+ layer number is greater than 9. On the Zn0.75Mg0.25O
413
+ side, the values of Ef near the interface (L1 to L6 Zn-
414
+ Mg-O layers) vary between −0.3 eV and −0.1 eV, while
415
+ those for the layers with layer number being greater than
416
+ 6 are almost fixed at −0.1 eV. Obviously, the oxygen va-
417
+ cancies can be easily formed on the ZnO side, especially
418
+ in the first two Zn-O layers near the interface.
419
+ Considering the variation trends in electronic struc-
420
+ tures with VO position for the x = 0.25 and 0.50 het-
421
+ erostructures with two pseudo-H passivated surfaces are
422
+ also similar, we only present and discuss the results ob-
423
+ tained from the x = 0.25 ones.
424
+ We first discuss the
425
+ case that oxygen vacancies are located at the most eas-
426
+ ily formed position (L¯1 layer). Figure 4(a) presents the
427
+ band structure of this configuration. From this figure,
428
+ one can see that the oxygen vacancies in the L¯1 Zn-O
429
+ layer introduce a defect band in the band gap and the
430
+ top of the defect band is higher than the Fermi level.
431
+ At the same time, the Fermi level enters into the bot-
432
+ tom of the conduction band, i.e., the conduction band
433
+ overlaps with the defect band. Thus, part of the elec-
434
+ trons in the defect band would be transferred into the
435
+ conduction band and become conduction electrons. Fig-
436
+ ure 4(b) shows the partial density of states (DOS) pro-
437
+ jected onto atomic planes for the x = 0.25 heterostruc-
438
+ ture with oxygen vacancies in the L¯1 Zn-O layer and two
439
+ pseudo-H passivated surfaces. Clearly, only in L¯2 , L¯1,
440
+ and L1 layers the DOS near the Fermi level is nonzero,
441
+ i.e., the conduction electrons are concentrated in the two
442
+ Zn-O layers and one Zn-Mg-O layer near the interface.
443
+ These three layers occupy a space with thickness ∼8.4 ˚A,
444
+ which indicates that the 2DEG is formed near the in-
445
+ terface of the heterostructure. From the orbital DOS of
446
+ L¯2 to L1 layers, it is found that these conduction elec-
447
+ trons are mainly composed of Zn-4s and O-2p orbitals
448
+ (not shown). In addition, it is found that when the oxy-
449
+ gen vacancies are located in the L¯2 and L¯3 Zn-O lay-
450
+ ers and the L1 to L6 Zn-Mg-O layers, their band struc-
451
+ FIG. 4. (a) The band structure of Zn0.75Mg0.25O/ZnO het-
452
+ erostructure with oxygen vacancies in the L¯1 Zn-O layer.
453
+ (b) The partial DOS projected onto atomic planes for
454
+ the Zn0.75Mg0.25O/ZnO heterostructure with oxygen vacan-
455
+ cies in the L¯1 Zn-O layer.
456
+ (c) The band structure of
457
+ Zn0.75Mg0.25O/ZnO heterostructure with oxygen vacancies in
458
+ the L ¯15 Zn-O layer.
459
+ (d) The partial DOS projected onto
460
+ atomic planes for the Zn0.75Mg0.25O/ZnO heterostructure
461
+ with oxygen vacancies in the L ¯15 Zn-O layer.
462
+
463
+  K
464
+ I
465
+ M
466
+ D02 (e)G)
467
+ 0
468
+ 0
469
+ (C)
470
+ S
471
+ (b)
472
+ L
473
+ M
474
+ L
475
+ -3
476
+ 3
477
+ 5
478
+ EUGL& (GA)
479
+ EUGLS (GA)
480
+ 0
481
+ 0
482
+ (g)
483
+ (d)
484
+ r18
485
+ II
486
+ I184
487
+ tures are similar to that in Fig. 4(a). However, the band
488
+ structures of the heterostructures would reveal semicon-
489
+ ductor characteristics when the oxygen vacancies are far
490
+ from the interface (i.e., behind the L¯3 Zn-O layer and
491
+ L6 Zn-Mg-O layer).
492
+ We take the Zn0.75Mg0.25O/ZnO
493
+ heterostructure with oxygen vacancies in the L ¯15 Zn-O
494
+ layer as an example. Figure 4(c) shows the band struc-
495
+ ture of this configuration. The oxygen vacancies in the
496
+ L ¯15 Zn-O layer also introduce a defect band in the gap,
497
+ while the top of the defect band is located at 0.11 eV be-
498
+ low the bottom of the conduction band. The Fermi level
499
+ lies between the conduction band and the defect band.
500
+ Therefore, the introduction of oxygen vacancies in the
501
+ L ¯15 Zn-O layer cannot induce 2DEG at the interface of
502
+ the heterostructure. Figure 4(d) shows the partial DOS
503
+ projected onto atomic planes for the Zn0.75Mg0.25O/ZnO
504
+ heterostructure with oxygen vacancies in the L ¯15 Zn-O
505
+ layer. From this figure, one can see that the defect band
506
+ of the oxygen vacancies is in fact composed of a large
507
+ number of deep energy levels as far as the energy band
508
+ of the inner atomic layer is concerned. These deep lev-
509
+ els cannot overlap with the conduction band even if the
510
+ bottom conduction band of the Zn-O layer near the in-
511
+ terface is lower than that of the inner Zn-O layer. On
512
+ the contrary, the defect levels of the oxygen vacancies
513
+ near the interface layers are so shallow that the bottom
514
+ of the conduction band overlaps with the top of the de-
515
+ fect band [see Fig. 4(b)]. This is why 2DEG exists only
516
+ when the oxygen vacancies are located near the interface
517
+ of the heterostructure. On the other hand, the defect
518
+ band formed by oxygen vacancies of inner Zn-O layers
519
+ could enhance the conductivity of the heterostructure:
520
+ the device will exhibit a thermal-activated form conduc-
521
+ tance with activation energy Ea, where Ea is about half
522
+ of the energy difference between the bottom of conduc-
523
+ tion band and the top of the defect band. Summarizing
524
+ the results mentioned above, one can readily conclude
525
+ that the oxygen vacancies near the interface are the ori-
526
+ gin of the 2DEGs in Zn1−xMgxO/ZnO (x = 0.25 and
527
+ 0.50) heterostructures with thick Zn1−xMgxO layers.
528
+ Now,
529
+ we
530
+ study
531
+ the
532
+ origin
533
+ of
534
+ 2DEGs
535
+ in
536
+ Zn1−xMgxO/ZnO (x
537
+ =
538
+ 0.25 and 0.50) heterostruc-
539
+ tures when the Zn1−xMgxO films are very thin. In this
540
+ situation, we calculate the electronic structures of the
541
+ heterostructures with 42 Zn-O and 18 Zn-Mg-O layers,
542
+ in which the surface of the Zn1−xMgxO film is no longer
543
+ passivated.
544
+ The reason for choosing 42 Zn-O layers
545
+ (instead of 18 layers) is to obtain the distribution range
546
+ of 2DEG on the ZnO side.
547
+ Since the results obtained
548
+ from the x = 0.25 and 0.50 heterostructures are also
549
+ similar, we only present and discuss the results for the
550
+ x = 0.25 heterostructure. Figure 5(a) shows the electro-
551
+ static potential of Zn0.75Mg0.25O/ZnO heterostructure
552
+ (with 42 Zn-O and 18 Zn-Mg-O layers) in which only
553
+ the surface of ZnO film is passivated by pseudo-H
554
+ atoms.
555
+ Obviously, the macroscopic average potential
556
+ on the ZnO side is insensitive to the position, while it
557
+ decreases with increasing distance to the interface on
558
+ 0
559
+ 40
560
+ 80
561
+ 120
562
+ 160
563
+ -10
564
+ -5
565
+ 0
566
+ 5
567
+ 10
568
+ 0
569
+ 40
570
+ 80
571
+ 120
572
+ 160
573
+ -10
574
+ -5
575
+ 0
576
+ 5
577
+ 10
578
+ Interface
579
+
580
+
581
+ Electrostatic potential (eV)
582
+ Distance along the [001] direction (�)
583
+ ZnO
584
+ Zn
585
+ 0 .7 5
586
+ Mg
587
+ 0 .2 5
588
+ O
589
+ (a)
590
+ Macroscopic-Average
591
+ Planar-Average
592
+ Electrostatic potential (eV)
593
+
594
+ Interface
595
+ ZnO
596
+ Zn
597
+ 0 .7 5
598
+ Mg
599
+ 0 .2 5
600
+ O
601
+ L10
602
+ L18
603
+ (b)
604
+ FIG. 5. (a) The plane average (solid curve) and macroscopic
605
+ average (dash-dot curve) electrostatic potential (seen by elec-
606
+ tron) along [001] direction for the Zn0.75Mg0.25O/ZnO het-
607
+ erostructure, in which only the surface of ZnO film is pas-
608
+ sivated by pseudo-H atoms.
609
+ (b) The plane average (solid
610
+ curve) and macroscopic average (dash-dot curve) electro-
611
+ static potential (seen by electron) along [001] direction of the
612
+ Zn0.75Mg0.25O/ZnO heterostructure with a Zn0.75Mg0.25O
613
+ surface of H-atom adsorption.
614
+ the Zn0.75Mg0.25O side.
615
+ A macroscopic field perpen-
616
+ dicular to the surface with the magnitude of 0.06 V/˚A
617
+ is obtained by linear fitting the macroscopic average
618
+ electrostatic potential.
619
+ This kind of field or potential
620
+ would lead to an instability of the (001) polar (so-called
621
+ Tasker type III) surface [29, 39]. In the light of recent
622
+ experimental and theoretical results, the polar oxide
623
+ surfaces can be stabilized via charge transfer between the
624
+ upper and lower surfaces [25, 26], adsorption of external
625
+ atoms [25–29], and stoichiometry variations [25–28].
626
+ For Zn1−xMgxO/ZnO heterostructures, we consider the
627
+ effects of adsorption (hydrogen atoms, OH groups, and
628
+ oxygen atoms) and stoichiometry variations (defects) on
629
+ the electronic structures of Zn1−xMgxO/ZnO (x = 0.25
630
+ and 0.50) heterostructures.
631
+ Through structural relax-
632
+ ations, it is found that the hydrogen atoms prefer to
633
+ be adsorbed atop the zinc atom (On-top site), while
634
+ the preferred adsorption sites for the OH groups and
635
+ oxygen atoms are the Fcc-hollow sites [see Fig. 1(b)].
636
+ Our results are consistent with those in Refs. [25–27].
637
+ For the 2 × 2 in-plane (001) Zn1−xMgxO supercell, the
638
+ numbers of the On-top and Fcc-hollow sites are both 4.
639
+ In our calculations, the coverages of hydrogen atoms,
640
+ OH groups, and oxygen atoms adsorbed on the surface
641
+ of Zn1−xMgxO are 50%, 50%, and, 25%, respectively,
642
+ while the concentration of vacancies on the Zn or Mg
643
+ sites is 25% [25–27].
644
+ Specifically, for the x = 0.25
645
+ heterostructure, the absorption sites of the hydrogen
646
+ atoms are set on the top of the zinc atoms at positions
647
+ 1 and 4 [see Fig. 1(b)]; the adsorption sites for the OH
648
+ groups are set at Fcc-hollow positions located at the
649
+ top of the arrow and the position of the black dot; the
650
+ Fcc-hollow position at the top of the arrow is also set
651
+ as the adsorption site of oxygen atoms; the Zn vacancies
652
+ are obtained via removing the zinc atoms located at
653
+
654
+ 5
655
+ H
656
+ ads
657
+ L42
658
+ ZnO
659
+ Zn
660
+ 0. 75
661
+ Mg
662
+ 0. 25
663
+ O
664
+ L10
665
+ L12
666
+
667
+
668
+ Energy (eV)
669
+ (a)
670
+ (b)
671
+ ZnO
672
+ Zn
673
+ 0. 75
674
+ Mg
675
+ 0. 25
676
+ O
677
+ L1
678
+ L42
679
+ H
680
+ pass
681
+ L10
682
+ L15
683
+ L1
684
+
685
+ DOS (states/eV)
686
+
687
+ Energy (eV)
688
+ FIG. 6. The partial DOS projected onto the atomic layers for
689
+ the Zn0.75Mg0.25O/ZnO heterostructures with surfaces of (a)
690
+ H-atom absorption, and (b) O-atom absorption.
691
+ position 1.
692
+ Figure
693
+ 5(b)
694
+ shows
695
+ the
696
+ electrostatic
697
+ potential
698
+ of
699
+ Zn0.75Mg0.25O/ZnO
700
+ heterostructures
701
+ with
702
+ hydrogen
703
+ atoms adsorbed on the Zn0.75Mg0.25O surface (and with
704
+ 42 Zn-O and 18 Zn-Mg-O layers). The results for the
705
+ Zn0.75Mg0.25O surface with oxygen atoms adsorption,
706
+ OH groups adsorption, and Zn or Mg vacancies are simi-
707
+ lar to that shown in Fig. 5(b). The macroscopic average
708
+ potential on the ZnO side remains nearly a constant af-
709
+ ter adsorption of hydrogen atoms. On the Zn0.75Mg0.25O
710
+ side, the macroscopic average potential is almost insensi-
711
+ tive to the position from L1 to L9 layers, and then slightly
712
+ increases with increasing distance to the interface. An
713
+ electrostatic field (with magnitude of ∼0.038 V/˚A) being
714
+ opposite to that shown in Fig 5(b) exists between L10
715
+ and L18 layers.
716
+ Thus surface adsorption or metal ion
717
+ vacancies could really stabilize the polar surfaces of the
718
+ Zn1−xMgxO/ZnO (x = 0.25 and 0.50) heterostructures.
719
+ The electronic structures of the Zn1−xMgxO/ZnO
720
+ (x = 0.25 and 0.50) heterostructures with exotic-atoms-
721
+ adsorbed surfaces or with surfaces having metal ion va-
722
+ cancies, have been also calculated.
723
+ It is found that
724
+ the electronic structures of the heterostructures reveal
725
+ semiconductor characteristics when the surface contains
726
+ metal ion vacancies, while the electronic structure ex-
727
+ hibits metallic characteristics as the hydrogen, oxygen
728
+ atoms, and OH groups are adsorbed on the surface, re-
729
+ spectively.
730
+ Figure 6(a) show the partial DOS decom-
731
+ posed to the atomic layers for the Zn0.75Mg0.25O/ZnO
732
+ heterostructures (42 Zn-O and 18 Zn-Mg-O layers) with
733
+ hydrogen atoms adsorption.
734
+ For the oxygen-atom- or
735
+ OH-groups-adsorption case, the partial DOS plot is sim-
736
+ ilar to that in Fig. 6(a). Clearly, the adsorption of hy-
737
+ drogen atoms on the surface introduces defect states in
738
+ the gap. Although polarization field distributed in the
739
+ L10 to L18 Zn-Mg-O layers has significantly lifted up
740
+ the top of the valence band, the valence band is still far
741
+ from overlapping with the conduction band. However,
742
+ the defect states introduced by hydrogen atoms are lo-
743
+ cated near the Fermi level, and partially higher than the
744
+ Fermi level. As a result, the defect band overlaps with
745
+ the conduction band, which renders the heterostructure
746
+ to exhibit metallic characteristics in electronic structures.
747
+ Inspection of Fig. 6(a) also indicates that the conduction
748
+ electrons are distributed from L ¯12 to L10 layers, i.e., in
749
+ the range of ∼5.53 nm near the interface. Thus, the het-
750
+ erostructure would reveal 2D or quasi-2D behaviors in
751
+ transport properties. We also calculated the electronic
752
+ structures of the Zn1−xMgxO/ZnO (x = 0.25 and 0.50)
753
+ heterostructures with oxygen vacancies and surfaces ad-
754
+ sorbed with exotic atoms. It is found that the introduc-
755
+ tion of an oxygen vacancy in a certain atomic layer of the
756
+ 2×2 in-plane supercell would also produce a defect band
757
+ in the gap. However, the defect band does not overlap
758
+ with the conduction band, i.e., the introduction of oxygen
759
+ vacancies does not change the ultimate properties of the
760
+ heterostructures. As an example, in Fig. 6(b) we give the
761
+ partial DOS projected onto the atomic layers for the H-
762
+ adsorbed Zn0.75Mg0.25O/ZnO heterostructure (with 42
763
+ Zn-O and 18 Zn-Mg-O layers) with oxygen vacancies in
764
+ L¯1. Comparing the partial DOS of the heterostructure
765
+ without oxygen vacancies [Fig. 6(a)], one can see that
766
+ oxygen vacancies in L¯1 introduce an extra defect band,
767
+ whose maximum is located at 0.15 eV below the bottom
768
+ of the conduction band.
769
+ In this situation, the 2DEG
770
+ distributes from L ¯15 to L10 layers (∼6.53 nm) and still
771
+ originates from the adsorption of hydrogen atoms. The
772
+ electronic structure of the heterostructures with oxygen-
773
+ atoms-adsorbed or OH-groups-adsorbed surface is simi-
774
+ lar to that for the H-adsorbed heterostructure. In ad-
775
+ dition, the introduction of oxygen vacancies in Zn-O
776
+ layer near the interface does not change the semicon-
777
+ ductor characteristic of the electronic structure for the
778
+ heterostructure with metal ion vacancies in the surface
779
+ of Zn1−xMgxO film. Thus, for Zn0.75Mg0.25O/ZnO het-
780
+ erostructure with thin Zn1−xMgxO film, the adsorption
781
+ of hydrogen atoms, oxygen atoms, or OH groups on the
782
+ surface of Zn1−xMgxO layer is responsible for the forma-
783
+ tion of 2DEG near the interface.
784
+ In summary, to explore the origin of 2DEGs in
785
+ Zn1−xMgxO/ZnO heterostructures, we constructed the
786
+ Zn1−xMgxO/ZnO (x
787
+ =
788
+ 0.25 and 0.50) heterostruc-
789
+ tures with different surfaces and investigated their elec-
790
+ tronic structures by first-principles calculations.
791
+ It is
792
+ found that the polarity discontinuity near the interface
793
+ can neither lead to the formation of 2DEGs in devices
794
+ with thick Zn1−xMgxO layers nor in devices with thin
795
+ Zn1−xMgxO layers. For the heterostructures with thick
796
+ Zn1−xMgxO layers, the oxygen vacancies near the inter-
797
+ face are the source of the 2DEGs. For the heterostruc-
798
+ tures with thin Zn1−xMgxO layers, adsorption of hydro-
799
+ gen atoms, oxygen atoms, or OH groups on the surface
800
+ of Zn1−xMgxO films can not only stabilize the polar sur-
801
+ face of Zn1−xMgxO layer, but also cause the formation
802
+
803
+ -J
804
+ -1
805
+ 03
806
+ -56
807
+ of 2DEGs near the interfaces of the devices.
808
+ The calculation was conducted on the CJQS-HPC plat-
809
+ form at Tianjin University. This work is supported by the
810
+ National Natural Science Foundation of China through
811
+ Grants No. 12174282.
812
+ [1] A. Ohtomo and H. Y. Hwang, Nature 427, 423 (2004).
813
+ [2] K. Koike, K. Hama, I. Nakashima, G. Takada, M. Ozaki,
814
+ K. Ogata, S. Sasa, M. Inoue, and M. Yano, Jpn. J. Appl.
815
+ Phys 43 L1372 (2004)
816
+ [3] A. Tsukazaki, A. Ohtomo, T. Kita, Y. Ohno, H. Ohno,
817
+ and M. Kawasaki, Science 315, 1388 (2007).
818
+ [4] A. Tsukazaki, S. Akasaka, K. Nakahara, Y. Ohno, H.
819
+ Ohno, D. Maryenko, A. Ohtomo, and M. Kawasaki, Nat.
820
+ Mater. 9, 889 (2010).
821
+ [5] S. W. Lee, J. Heo, and R. G. Gordon, Nanoscale 5, 8940
822
+ (2013).
823
+ [6] P. Sch¨utz, F. Pfaff, P. Scheiderer, Y. Z. Chen, N. Pryds,
824
+ M. Gorgoi, M. Sing and R. Claessen, Phys. Rev. B 91,
825
+ 165118 (2015).
826
+ [7] H. Zhang, Y. Yun, X. Zhang, H. Zhang, Y. Ma, X. Yan,
827
+ F. Wang, G. Li, R. Li, T. Khan, Y. Chen, W. Liu, F. Hu,
828
+ B. Liu, B. Shen, W. Han, and J. Sun, Phys. Rev. Lett.
829
+ 121, 116803 (2018).
830
+ [8] Y. Zhang, A. Neal, Z. Xia, C. Joishi, J. M. Johnson, Y.
831
+ Zheng, S. Bajaj, M. Brenner, D. Dorsey, K. Chabak, G.
832
+ Jessen, J. Hwang, S. Mou, J. P. Heremans, and S. Rajan,
833
+ Appl. Phys. Lett. 112, 173502 (2018).
834
+ [9] Z. Chen, Y. Liu, H. Zhang, Z. Liu, H. Tian, Y. Sun, M.
835
+ Zhang, Y. Zhou, J. Sun, and Y. Xie, Science 372, 721
836
+ (2021).
837
+ [10] J. Falson, Y. Kozuka, M. Uchida, J. H. Smet, T. Arima,
838
+ A. Tsukazaki, and M. Kawasaki, Sci. Rep. 6, 26598
839
+ (2016).
840
+ [11] H. A. Chin, I. C. Cheng, C. I. Huang, Y. R. Wu, W. S.
841
+ Lu, W. L. Lee, J. Z. Chen, K. C. Chiu, and T. S. Lin, J.
842
+ Appl. Phys. 108, 054503 (2010).
843
+ [12] J. Ye, S. Ter Lim, M. Bosman, S. Gu, Y. Zheng, H. H.
844
+ Tan, C. Jagadish, X. Sun, and K. L. Teo, Sci. Rep 2, 533
845
+ (2012).
846
+ [13] T. Makino, Y. Segawa, A. Tsukazaki, H. Saito, S.
847
+ Takeyama, S. Akasaka, K. Nakahara, and M. Kawasaki,
848
+ Phys. Rev. B 87, 085312 (2013).
849
+ [14] H. Tampo, H. Shibata, K. Maejima, A. Yamada, K. Mat-
850
+ subara, P. Fons, S. Kashiwaya, S. Niki, Y. Chiba, T.
851
+ Wakamatsu, and H. Kanie, Appl. Phys. Lett. 93, 202104
852
+ (2008).
853
+ [15] H. Tampo, H. Shibata, K. Maejima, T. W. Chiu, H. Itoh,
854
+ A. Yamada, K. Matsubara, P. Fons, Y. Chiba, T. Waka-
855
+ matsu, Y. Takeshita, H. Kanie, and S. Niki, Appl. Phys.
856
+ Lett. 94, 242107 (2009).
857
+ [16] J. D. Ye, S. Pannirselvam, S. T. Lim, J. F. Bi, X. W. Sun,
858
+ G. Q. Lo, and K. L. Teo, Appl. Phys. Lett. 97, 111908
859
+ (2010).
860
+ [17] J. Falson, D. Maryenko, Y. Kozuka, A. Tsukazaki, and
861
+ M. Kawasaki, Appl. Phys. Express 4, 091101 (2011).
862
+ [18] J. D. Hwang, C. C. Yang, and C. M. Chu, ACS Appl.
863
+ Mater. Interfaces 9, 23904 (2017).
864
+ [19] K. Imasaka, J. Falson, Y. Kozuka, A. Tsukazaki, and M.
865
+ Kawasaki, Appl. Phys. Lett. 104, 242112 (2014).
866
+ [20] S. Akasaka, A. Tsukazaki, K. Nakahara, A. Ohtomo, and
867
+ M. Kawasaki, Jpn. J. Appl. Phys. 50, 080215 (2011).
868
+ [21] S. H. Yoo, M. Todorova, D. Wickramaratne, L. Weston,
869
+ C. G. V. de Walle, and J. Neugebauer, Npj Comput.
870
+ Mater. 7, 58, (2021).
871
+ [22] K. A. Brown, S. He, D. J. Eichelsdoerfer, M. Huang, I.
872
+ Levy, H. lee, S. Ryu, P. Irvin, J. Mendez-Arroyo, C. A.
873
+ Mirkin, and J. Levy, Nat. Commun. 5, 5019 (2014).
874
+ [23] X. Huang, E. Lindgren, and J. R. Chelikowsky, Phys.
875
+ Rev. B 71, 165328 (2005).
876
+ [24] H. Tampo, H. Shibata, K. Maejima, A. Yamada, K. Mat-
877
+ subara, P. Fons, S. Niki, T. Tainaka, Y. Chiba, and H.
878
+ Kanie, Appl. Phys. Lett. 91, 261907 (2007).
879
+ [25] G. Kresse, O. Dulub, and U. Diebold, Phys. Rev. Lett.
880
+ 68, 245409 (2003).
881
+ [26] O. Dulub, U. Diebold and G. Kresse, Phys. Rev. Lett.
882
+ 90, 016102 (2003).
883
+ [27] M. Valtiner, M. Todorova, G. Grundmeier, and J. Neuge-
884
+ bauer, Phys. Rev. Lett. 103, 065502 (2009).
885
+ [28] J. Goniakowski, F. Finocchi, and C. Noguera, Rep. Prog.
886
+ Phys. 71, 016501 (2008).
887
+ [29] J. V. Lauritsen, S. Porsgaard, M. K. Rasmussen, M. C.
888
+ R. Jensen, R. Bechstein, K. Meinander, B. S. Clausen,
889
+ S. Helveg, R. Wahl, G. Kresse, and F. Besenbacher, ACS
890
+ Nano 5, 5987 (2011).
891
+ [30] B. Meyer, Phys. Rev. B 69, 045416 (2004).
892
+ [31] A. Calzolari, M. Bazzani, and A. Catellani, Surf. Sci.
893
+ 607, 181 (2013).
894
+ [32] In the calculations, the generalized gradient approxi-
895
+ mation (GGA) parametrized by Perdew-Burk-Ernzerhof
896
+ plus the on-site coulomb interaction approach (GGA+U)
897
+ was used for the exchange-correlation functional. The
898
+ Hubbard interaction parameter U is taken as 8.5 eV
899
+ (7.4 eV) for Zn 3d (O 2p) orbitals. For the bulk ZnO,
900
+ the band gaps calculated by GGA+U and GGA methods
901
+ are 2.48 eV and 0.72 eV, respectively. The former is more
902
+ close to the experimental value (3.37 eV). The plane-wave
903
+ cutoff energy was set as 500 eV and a Brillouin zone with
904
+ 4×4×1 Monkhorst-Pack k-point grids was employed. The
905
+ structure relation was finished until the residual force was
906
+ smaller than 0.03 eV/˚A. To remove the undesired elec-
907
+ trostatic interaction between periodic cells along the z
908
+ direction, the dipole correction is applied.
909
+ [33] J. Lee and A. A. Demkov, Phys. Rev. B 78, 193104 (2008)
910
+ [34] L. Liu, Z. Mei, A. Tang, A. Azarov, A. Kuznetsov, Q. K.
911
+ Xue, and X. Du, Phys. Rev. B 93, 235305 (2016).
912
+ [35] F. Oba, A. Togo, I. Tanaka, J. Paier, and G. Kresse,
913
+ Phys. Rev. B 77, 245202 (2008).
914
+ [36] S. J. Clark, J. Robertson, S. Lany, and A. Zunger, Phys.
915
+ Rev. B 81, 115311 (2010).
916
+ [37] A. Alkauskas and A. Pasquarello, Phys. Rev. B 84,
917
+ 125206 (2011).
918
+ [38] Y. Li, S. N. Phattalung, S. Limpijumnong, J. Kim, and
919
+ J. Yu, Phys. Rev. B 84, 245307 (2011).
920
+ [39] P. W. Tasker, J. Phys. C: Solid State Phys. 12, 4977
921
+ (1979).
922
+