Add files using upload-large-folder tool
Browse filesThis view is limited to 50 files because it contains too many changes.
See raw diff
- .gitattributes +15 -0
- 0dE5T4oBgHgl3EQfOg4z/content/tmp_files/2301.05497v1.pdf.txt +450 -0
- 0dE5T4oBgHgl3EQfOg4z/content/tmp_files/load_file.txt +288 -0
- 0dE5T4oBgHgl3EQfOg4z/vector_store/index.pkl +3 -0
- 0tAzT4oBgHgl3EQfDPqY/content/2301.00973v1.pdf +3 -0
- 0tAzT4oBgHgl3EQfDPqY/content/tmp_files/2301.00973v1.pdf.txt +1482 -0
- 0tAzT4oBgHgl3EQfDPqY/content/tmp_files/load_file.txt +0 -0
- 0tAzT4oBgHgl3EQfDPqY/vector_store/index.pkl +3 -0
- 0tFPT4oBgHgl3EQfTjTq/content/tmp_files/2301.13054v1.pdf.txt +1564 -0
- 0tFPT4oBgHgl3EQfTjTq/vector_store/index.pkl +3 -0
- 29E2T4oBgHgl3EQfjQdC/content/tmp_files/2301.03966v1.pdf.txt +1687 -0
- 29E2T4oBgHgl3EQfjQdC/content/tmp_files/load_file.txt +0 -0
- 2tFKT4oBgHgl3EQf7y43/content/2301.11946v1.pdf +3 -0
- 2tFKT4oBgHgl3EQf7y43/content/tmp_files/2301.11946v1.pdf.txt +2027 -0
- 2tFKT4oBgHgl3EQf7y43/content/tmp_files/load_file.txt +0 -0
- 4tE1T4oBgHgl3EQf6QWC/content/tmp_files/2301.03521v1.pdf.txt +1047 -0
- 4tE1T4oBgHgl3EQf6QWC/content/tmp_files/load_file.txt +0 -0
- 7dE4T4oBgHgl3EQf2Q2c/content/tmp_files/load_file.txt +0 -0
- 7dE4T4oBgHgl3EQf2Q2c/vector_store/index.pkl +3 -0
- 89FST4oBgHgl3EQfajh_/content/tmp_files/2301.13796v1.pdf.txt +1672 -0
- 99FJT4oBgHgl3EQfpCw2/content/2301.11598v1.pdf +3 -0
- 99FJT4oBgHgl3EQfpCw2/content/tmp_files/2301.11598v1.pdf.txt +1960 -0
- 99FJT4oBgHgl3EQfpCw2/content/tmp_files/load_file.txt +0 -0
- 99FJT4oBgHgl3EQfpCw2/vector_store/index.pkl +3 -0
- 9tAyT4oBgHgl3EQfQ_bX/content/tmp_files/2301.00059v1.pdf.txt +1576 -0
- B9FQT4oBgHgl3EQfNza6/content/2301.13273v1.pdf +3 -0
- B9FQT4oBgHgl3EQfNza6/content/tmp_files/2301.13273v1.pdf.txt +0 -0
- B9FQT4oBgHgl3EQfNza6/content/tmp_files/load_file.txt +0 -0
- B9FQT4oBgHgl3EQfNza6/vector_store/index.pkl +3 -0
- BdE2T4oBgHgl3EQfRge6/content/tmp_files/2301.03782v1.pdf.txt +1366 -0
- BdE2T4oBgHgl3EQfRge6/content/tmp_files/load_file.txt +0 -0
- BdE2T4oBgHgl3EQfRge6/vector_store/index.pkl +3 -0
- BdE4T4oBgHgl3EQf5Q5A/content/2301.05321v1.pdf +3 -0
- BdE4T4oBgHgl3EQf5Q5A/content/tmp_files/2301.05321v1.pdf.txt +2198 -0
- BdE4T4oBgHgl3EQf5Q5A/content/tmp_files/load_file.txt +0 -0
- BdE4T4oBgHgl3EQf5Q5A/vector_store/index.pkl +3 -0
- BtE5T4oBgHgl3EQfTQ-D/content/tmp_files/2301.05535v1.pdf.txt +1008 -0
- BtFKT4oBgHgl3EQfXS78/content/tmp_files/2301.11794v1.pdf.txt +1249 -0
- BtFKT4oBgHgl3EQfXS78/content/tmp_files/load_file.txt +0 -0
- CNFAT4oBgHgl3EQfsx5b/content/2301.08660v1.pdf +3 -0
- CNFAT4oBgHgl3EQfsx5b/content/tmp_files/2301.08660v1.pdf.txt +1189 -0
- CNFAT4oBgHgl3EQfsx5b/content/tmp_files/load_file.txt +0 -0
- CNFAT4oBgHgl3EQfsx5b/vector_store/index.faiss +3 -0
- CNFAT4oBgHgl3EQfsx5b/vector_store/index.pkl +3 -0
- F9FKT4oBgHgl3EQfbS5P/content/tmp_files/load_file.txt +0 -0
- F9FKT4oBgHgl3EQfbS5P/vector_store/index.pkl +3 -0
- H9AyT4oBgHgl3EQfrvmy/content/tmp_files/2301.00567v1.pdf.txt +1551 -0
- H9AyT4oBgHgl3EQfrvmy/content/tmp_files/load_file.txt +0 -0
- I9FAT4oBgHgl3EQfux7Z/content/tmp_files/2301.08672v1.pdf.txt +1521 -0
- JdAyT4oBgHgl3EQffviy/content/tmp_files/2301.00347v1.pdf.txt +692 -0
.gitattributes
CHANGED
|
@@ -108,3 +108,18 @@ knowledge_base/XtAzT4oBgHgl3EQfKfuP/content/2301.01098v1.pdf filter=lfs diff=lfs
|
|
| 108 |
knowledge_base/BdE4T4oBgHgl3EQf5Q5A/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 109 |
knowledge_base/BdE4T4oBgHgl3EQf5Q5A/content/2301.05321v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 110 |
knowledge_base/KdFLT4oBgHgl3EQfLC8K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 108 |
knowledge_base/BdE4T4oBgHgl3EQf5Q5A/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 109 |
knowledge_base/BdE4T4oBgHgl3EQf5Q5A/content/2301.05321v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 110 |
knowledge_base/KdFLT4oBgHgl3EQfLC8K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 111 |
+
VNAyT4oBgHgl3EQf8vqZ/content/2301.00862v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 112 |
+
B9FQT4oBgHgl3EQfNza6/content/2301.13273v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 113 |
+
BdE4T4oBgHgl3EQf5Q5A/content/2301.05321v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 114 |
+
ytE1T4oBgHgl3EQf4AXn/content/2301.03497v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 115 |
+
zNFLT4oBgHgl3EQfni-P/content/2301.12128v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 116 |
+
jdE0T4oBgHgl3EQf7QI8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 117 |
+
CNFAT4oBgHgl3EQfsx5b/content/2301.08660v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 118 |
+
Q9FKT4oBgHgl3EQfiC5d/content/2301.11840v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 119 |
+
pNE1T4oBgHgl3EQf2AWA/content/2301.03474v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 120 |
+
KdFLT4oBgHgl3EQfLC8K/content/2301.12010v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 121 |
+
pNE1T4oBgHgl3EQf2AWA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 122 |
+
0tAzT4oBgHgl3EQfDPqY/content/2301.00973v1.pdf filter=lfs diff=lfs merge=lfs -text
|
| 123 |
+
CNFAT4oBgHgl3EQfsx5b/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 124 |
+
VNAyT4oBgHgl3EQf8vqZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
|
| 125 |
+
2tFKT4oBgHgl3EQf7y43/content/2301.11946v1.pdf filter=lfs diff=lfs merge=lfs -text
|
0dE5T4oBgHgl3EQfOg4z/content/tmp_files/2301.05497v1.pdf.txt
ADDED
|
@@ -0,0 +1,450 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
New universal partizan rulesets
|
| 2 |
+
Koki Suetsugu
|
| 3 |
+
January 2023
|
| 4 |
+
Abstract
|
| 5 |
+
Universal partizan ruleset is a ruleset in which every game value of
|
| 6 |
+
partizan games can be appear as a position. So far, generalized konane
|
| 7 |
+
and turning tiles have been proved to be universal partizan rulesets.
|
| 8 |
+
In this paper, we introduce two rulesets go on lattice and beyond the
|
| 9 |
+
door and prove that they are universal partizan rulesets by using game
|
| 10 |
+
tree preserving reduction.
|
| 11 |
+
1
|
| 12 |
+
Introduction
|
| 13 |
+
Combinatorial game theory (CGT) studies two-player perfect information games
|
| 14 |
+
with no chance moves. We say a game is under normal play convention if the
|
| 15 |
+
player who moves last is the winner and a game is partizan game if the options
|
| 16 |
+
for both players can be different in some positions. Here, we introduce some
|
| 17 |
+
definitions and theorems of CGT for later discussion. For more details of CGT,
|
| 18 |
+
see [1, 3].
|
| 19 |
+
In this theory, the two players are called Left and Right. Since the term
|
| 20 |
+
“game” is polysemous, we refer to each position as a game. The description of
|
| 21 |
+
what moves are allowed for a given position is called the ruleset.
|
| 22 |
+
A game is defined by Left and Right options recursively.
|
| 23 |
+
Definition 1.
|
| 24 |
+
• {|} is a game, which is called 0.
|
| 25 |
+
• For games GL
|
| 26 |
+
1 , GL
|
| 27 |
+
2 , . . . , GL
|
| 28 |
+
n, GR
|
| 29 |
+
1 , GR
|
| 30 |
+
2 , . . . , and GR
|
| 31 |
+
m, G = {GL
|
| 32 |
+
1 , GL
|
| 33 |
+
2 , . . . , GL
|
| 34 |
+
n |
|
| 35 |
+
GR
|
| 36 |
+
1 , GR
|
| 37 |
+
2 , . . . , GR
|
| 38 |
+
m} is also a game. GL
|
| 39 |
+
1 , GL
|
| 40 |
+
2 , . . . , GL
|
| 41 |
+
n are called left options
|
| 42 |
+
of G and GR
|
| 43 |
+
1 , GR
|
| 44 |
+
2 , . . . , GR
|
| 45 |
+
m are called right options of G.
|
| 46 |
+
Let G be the set of all games.
|
| 47 |
+
In terms of the player who has a winning strategy, G is separated into four
|
| 48 |
+
sets. Let L, R, N, and P be the set of positions in which Left, Right, the Next
|
| 49 |
+
player, and the Previous player have winning strategies, respectively.
|
| 50 |
+
The sets are called outcomes of the games. Every position belongs to exactly
|
| 51 |
+
one of the four outcomes. For a game G, let o(G) be the outcome of G. We
|
| 52 |
+
define the partial order of outcomes as L > P > R, L > N > R.
|
| 53 |
+
1
|
| 54 |
+
arXiv:2301.05497v1 [math.CO] 13 Jan 2023
|
| 55 |
+
|
| 56 |
+
The disjunctive sum of games is an important concept in Combinatorial
|
| 57 |
+
Game Theory. For games G and H, a position in which a player makes a move
|
| 58 |
+
for one or the other on their turn is called a disjunctive sum of G and H, or
|
| 59 |
+
G + H. More precisely, it is as follows:
|
| 60 |
+
Definition 2. If the game trees of G and H are isomorphic, then we say these
|
| 61 |
+
games are isomorphic or G ∼= H.
|
| 62 |
+
Definition 3. For games G ∼= {GL
|
| 63 |
+
1 , GL
|
| 64 |
+
2 . . . GL
|
| 65 |
+
n | GR
|
| 66 |
+
1 , GR
|
| 67 |
+
2 , . . . , GR
|
| 68 |
+
m} and H ∼=
|
| 69 |
+
{HL
|
| 70 |
+
1 , HL
|
| 71 |
+
2 . . . , HL
|
| 72 |
+
n′ | HR
|
| 73 |
+
1 , HR
|
| 74 |
+
2 , . . . , HR
|
| 75 |
+
m′}, G + H ∼= {G + HL
|
| 76 |
+
1 , G + HL
|
| 77 |
+
2 , . . . , G +
|
| 78 |
+
HL
|
| 79 |
+
n′, GL
|
| 80 |
+
1 + H, GL
|
| 81 |
+
2 + H, . . . , GL
|
| 82 |
+
n + H | G + HR
|
| 83 |
+
1 , G + HR
|
| 84 |
+
2 , . . . , G + HR
|
| 85 |
+
m′, GR
|
| 86 |
+
1 +
|
| 87 |
+
H, GR
|
| 88 |
+
2 + H, . . . , GR
|
| 89 |
+
m + H}.
|
| 90 |
+
We also define equality, inequality and negative of games.
|
| 91 |
+
Definition 4. If for any X, o(G + X) is the same as o(H + X), then we say
|
| 92 |
+
G = H.
|
| 93 |
+
Definition 5. If o(G+H) ≥ o(H +X) holds for any X, then we say G ≥ H. On
|
| 94 |
+
the other hand, if o(G + H) ≤ o(H + X) holds for any X, then we say G ≤ H.
|
| 95 |
+
We also say G ≷ H if G ̸≥ H and G ̸≤ H.
|
| 96 |
+
Definition 6. For a game G ∼= {GL
|
| 97 |
+
1 , GL
|
| 98 |
+
2 , . . . , GL
|
| 99 |
+
n | GR
|
| 100 |
+
1 , GR
|
| 101 |
+
2 , . . . , GR
|
| 102 |
+
m}, let −G ∼=
|
| 103 |
+
{−GR
|
| 104 |
+
1 , −GR
|
| 105 |
+
2 , −GR
|
| 106 |
+
m | −GL
|
| 107 |
+
1 , −GL
|
| 108 |
+
2 , . . . , −GL
|
| 109 |
+
n}.
|
| 110 |
+
G + (−H) is denoted by G − H.
|
| 111 |
+
It is known that (G, +, =) is an abelian group and (G, ≥, =) is a partial
|
| 112 |
+
order.
|
| 113 |
+
The question arises here, will there be a ruleset in which for any game there
|
| 114 |
+
is a position equal to the game? If the games appearing in each ruleset are
|
| 115 |
+
restricted, then perhaps we should think in a narrower framework.
|
| 116 |
+
In fact,
|
| 117 |
+
however, it is known that for every game, a position equal to the game appears
|
| 118 |
+
in some rulesets.
|
| 119 |
+
1.1
|
| 120 |
+
Universal partizan ruleset
|
| 121 |
+
Definition 7. A ruleset is universal partizan ruleset if every value in G is equal
|
| 122 |
+
to a position of the ruleset.
|
| 123 |
+
Early results showed that generalized konane and turning tiles are
|
| 124 |
+
universal partizan ruleset ([2, 4]). In this study, we will use the latter ruleset.
|
| 125 |
+
Definition 8. The ruleset of turning tiles is as follows:
|
| 126 |
+
• Square tiles are laid out. The front side is red or blue, and the back side
|
| 127 |
+
is black.
|
| 128 |
+
• Some pieces are on tiles.
|
| 129 |
+
• Each player (Left, whose color is bLue and Right, whose color is Red),
|
| 130 |
+
in his/her turn, take a piece and move the piece straight on the tiles of
|
| 131 |
+
his/her color.
|
| 132 |
+
2
|
| 133 |
+
|
| 134 |
+
• Tiles on which the piece pass over are turned over.
|
| 135 |
+
• The player who moves last is the winner.
|
| 136 |
+
Turning tiles is proved to be universal partizan ruleset even if the number
|
| 137 |
+
of pieces is restricted to be only one.
|
| 138 |
+
To distinguish this ruleset from the ruleset defined below, we will also refer
|
| 139 |
+
to it as blue-red turning tiles.
|
| 140 |
+
For games that use two colors, red and blue, corresponding to two players,
|
| 141 |
+
we often consider a variant that adds green, which can be used by both players.
|
| 142 |
+
For example, in blue-red-green hackenbush, Right can remove red or green
|
| 143 |
+
edges and Left can remove blue or green edges. From this point of view, we
|
| 144 |
+
consider a varant of turning tiles.
|
| 145 |
+
Definition 9. The ruleset of blue-red-green turning tiles is as follows:
|
| 146 |
+
• Square tiles are laid out. The front side is red, blue, or green, and the back
|
| 147 |
+
side is black.
|
| 148 |
+
• Some pieces are on tiles.
|
| 149 |
+
• Each player (Left, whose color is bLue and Right, whose color is Red),
|
| 150 |
+
in his/her turn, take a piece and move the piece straight on the tiles of
|
| 151 |
+
his/her color or of green.
|
| 152 |
+
• Tiles on which the piece pass over are turned over.
|
| 153 |
+
• The player who moves last is the winner.
|
| 154 |
+
Figure 1: Positions in blue-red turning tiles and blue-red-green turn-
|
| 155 |
+
ing tiles
|
| 156 |
+
Figure 1 is an example of positions in blue-red turning tiles and blue-
|
| 157 |
+
red-green turning tiles.
|
| 158 |
+
3
|
| 159 |
+
|
| 160 |
+
L
|
| 161 |
+
LL
|
| 162 |
+
RR
|
| 163 |
+
LL
|
| 164 |
+
RR
|
| 165 |
+
L
|
| 166 |
+
R
|
| 167 |
+
LLLG
|
| 168 |
+
R
|
| 169 |
+
GG
|
| 170 |
+
RR-
|
| 171 |
+
G
|
| 172 |
+
L
|
| 173 |
+
RR
|
| 174 |
+
R
|
| 175 |
+
R
|
| 176 |
+
G
|
| 177 |
+
R
|
| 178 |
+
G
|
| 179 |
+
R
|
| 180 |
+
L
|
| 181 |
+
L
|
| 182 |
+
R
|
| 183 |
+
L
|
| 184 |
+
R
|
| 185 |
+
R
|
| 186 |
+
R
|
| 187 |
+
R
|
| 188 |
+
RR
|
| 189 |
+
R
|
| 190 |
+
R
|
| 191 |
+
R
|
| 192 |
+
RRR
|
| 193 |
+
R
|
| 194 |
+
R
|
| 195 |
+
RR
|
| 196 |
+
R
|
| 197 |
+
G
|
| 198 |
+
G
|
| 199 |
+
RR
|
| 200 |
+
R
|
| 201 |
+
RR
|
| 202 |
+
L
|
| 203 |
+
7
|
| 204 |
+
RR
|
| 205 |
+
R
|
| 206 |
+
一
|
| 207 |
+
R
|
| 208 |
+
G
|
| 209 |
+
RR
|
| 210 |
+
G
|
| 211 |
+
R
|
| 212 |
+
R
|
| 213 |
+
P
|
| 214 |
+
L
|
| 215 |
+
R
|
| 216 |
+
G
|
| 217 |
+
G
|
| 218 |
+
L
|
| 219 |
+
R
|
| 220 |
+
R
|
| 221 |
+
LL
|
| 222 |
+
R
|
| 223 |
+
R
|
| 224 |
+
R
|
| 225 |
+
R
|
| 226 |
+
L
|
| 227 |
+
G
|
| 228 |
+
R
|
| 229 |
+
G
|
| 230 |
+
R
|
| 231 |
+
GObviously, blue-red-green turning tiles is also a universal partizan
|
| 232 |
+
ruleset because every position in blue-red turning tiles can be appear in
|
| 233 |
+
blue-red-green turning tiles.
|
| 234 |
+
As we have seen here, if two rulesets have an inclusion relation in terms of
|
| 235 |
+
the sets of positions, it can be used for proving universality of the rulesets.
|
| 236 |
+
Theorem 1. Let Γ and ∆ be rulesets and assume that Γ be a universal partizan
|
| 237 |
+
ruleset. If for every position g ∈ Γ, there is at least one position in ∆ whose
|
| 238 |
+
game value is the same as g, then ∆ is also a universal partizan ruleset.
|
| 239 |
+
Proof. This is trivial from the definition of universal partizan ruleset.
|
| 240 |
+
Corollary 1. Let Γ and ∆ be rulesets and assume that Γ be a universal partizan
|
| 241 |
+
ruleset. If for every position g ∈ Γ, there is at least one position in ∆ whose
|
| 242 |
+
game tree is the same as g, then ∆ is also a universal partizan ruleset.
|
| 243 |
+
If a ruleset is proved to be universal partizan ruleset by using Corollary 1,
|
| 244 |
+
we say that it is proved by game tree preserving reduction.
|
| 245 |
+
In the next section, we introduce two rulesets and prove that they are univer-
|
| 246 |
+
sal partizan ruleset by game tree preserving reduction. In Secton 3, we conclude
|
| 247 |
+
this study.
|
| 248 |
+
2
|
| 249 |
+
New universal partizan rulesets
|
| 250 |
+
2.1
|
| 251 |
+
Go on lattice
|
| 252 |
+
Definition 10. The rule of go on lattice is as follows:
|
| 253 |
+
• There is a lattice graph. There are pieces on some nodes. The edges are
|
| 254 |
+
colored red, blue, or dotted.
|
| 255 |
+
• A player, in his/her turn, chooses a piece and moves it straight on edges
|
| 256 |
+
colored his/her color.
|
| 257 |
+
• After a piece passed a node, every piece cannot get on or pass the node.
|
| 258 |
+
• If a player moves a piece to a node adjacent to a dotted edge, then the edge
|
| 259 |
+
changes to solid edge colored by the opponent’s color.
|
| 260 |
+
• The player who moves last is the winner.
|
| 261 |
+
Figure 2: Play of go on lattice
|
| 262 |
+
4
|
| 263 |
+
|
| 264 |
+
17
|
| 265 |
+
MFigure 2 is a play of go on lattice. We use double line for red edges for
|
| 266 |
+
monochrome printing.
|
| 267 |
+
Theorem 2. Go on lattice is a universal partizan ruleset.
|
| 268 |
+
Proof. Let f be a function from a position in turning tiles to a position in
|
| 269 |
+
go on lattice as follows:
|
| 270 |
+
Let G be a position in turning tiles. In f(G) there are as many nodes
|
| 271 |
+
as tiles in G. The tiles in G and the nodes in f(G) are arranged exactly the
|
| 272 |
+
same. For each piece on a tile in G, there is a corresponding piece on the node
|
| 273 |
+
corresponds to the tile. For any adjacent tiles A and B in G, let A′ and B′ are
|
| 274 |
+
corresponding nodes in f(G). If the color of A, and B are the same, then edge
|
| 275 |
+
between A′ and B′ is solid and the same color as A and B. If there is a piece
|
| 276 |
+
on A or B, then the edge between A′ and B′ is solid and the color is the same
|
| 277 |
+
as the other tile. Finally, if the color of A and B are different and no piece is
|
| 278 |
+
on each tile, then the edge between A′ and B′ is dotted line.
|
| 279 |
+
●
|
| 280 |
+
B
|
| 281 |
+
B
|
| 282 |
+
B
|
| 283 |
+
B
|
| 284 |
+
B
|
| 285 |
+
R
|
| 286 |
+
R
|
| 287 |
+
R
|
| 288 |
+
R
|
| 289 |
+
●
|
| 290 |
+
B
|
| 291 |
+
R
|
| 292 |
+
R
|
| 293 |
+
B
|
| 294 |
+
B
|
| 295 |
+
B
|
| 296 |
+
Figure 3: Corresponding positions in turning tiles and go on lattice
|
| 297 |
+
.
|
| 298 |
+
Figure 3 shows this corresponding. Here, the game tree of G and f(G) are
|
| 299 |
+
isomorphic. We prove that every move in one game has a corresponding move
|
| 300 |
+
in the other game.
|
| 301 |
+
Assume that in G Left can move a piece on tile A0 to
|
| 302 |
+
tile An through tiles A1, A2, . . . , An−1. Then, A1, A2, . . . , An are blue tiles. Let
|
| 303 |
+
A′
|
| 304 |
+
0, A′
|
| 305 |
+
1, . . . , A′
|
| 306 |
+
n be the corresponding nodes in f(G). Let (A′, B′) be the edge be-
|
| 307 |
+
tween A′ and B′. Then, from the definition of f, all of (A′
|
| 308 |
+
1, A′
|
| 309 |
+
2), (A′
|
| 310 |
+
2, A′
|
| 311 |
+
3), . . . , (A′
|
| 312 |
+
n−1, A′
|
| 313 |
+
n)
|
| 314 |
+
are blue edge. In addition, if A0 was a blue tile before turning, then (A′
|
| 315 |
+
0, A′
|
| 316 |
+
1)
|
| 317 |
+
is a blue edge, and if A0 was a red tile, (A′
|
| 318 |
+
0, A′
|
| 319 |
+
1) had been a dot edge and
|
| 320 |
+
after Right moved the piece to A′
|
| 321 |
+
0, it changed to a blue edge. Therefore for
|
| 322 |
+
both case, (A′
|
| 323 |
+
0, A′
|
| 324 |
+
1) is a blue edge and Left can move a piece from A′
|
| 325 |
+
0 to A′
|
| 326 |
+
n
|
| 327 |
+
through A′
|
| 328 |
+
1, A′
|
| 329 |
+
2, . . . , A′
|
| 330 |
+
n−1. Conversely, assume that in f(G), Left can move a
|
| 331 |
+
piece from A′
|
| 332 |
+
0 to A′
|
| 333 |
+
n through A′
|
| 334 |
+
1, A′
|
| 335 |
+
2, . . . , A′
|
| 336 |
+
n−1. Then, in G, all corresponding
|
| 337 |
+
tiles A1, A2, . . . , An are blue tiles. Therefore, Left can move a piece from A0 to
|
| 338 |
+
5
|
| 339 |
+
|
| 340 |
+
Figure 4: Play of beyond the door.
|
| 341 |
+
An through A1, A2, . . . , An−1 in the corresponding position in turning tiles.
|
| 342 |
+
Similar proof holds for Right’s moves.
|
| 343 |
+
Thus, from Corollary 1, go on lattice is a universal partizan ruleset.
|
| 344 |
+
2.2
|
| 345 |
+
Beyond the door
|
| 346 |
+
Definition 11. The rule of beyond the door is as follows:
|
| 347 |
+
• Square rooms are arranged in a grid pattern. There are doors between the
|
| 348 |
+
rooms. The front and back of the doors are painted red or blue. There are
|
| 349 |
+
pieces in several rooms.
|
| 350 |
+
• A player, in his/her turn, chooses a piece and moves it in a straight line.
|
| 351 |
+
When a piece moves beyond the door, the color of the piece’s side of the
|
| 352 |
+
door must be the player’s color.
|
| 353 |
+
• After a piece passed a room, every piece can not enter the room.
|
| 354 |
+
• The player who moves last is the winner.
|
| 355 |
+
Figure 4 shows a play of beyond the door. The red sides are masked for
|
| 356 |
+
monochrome printing.
|
| 357 |
+
Theorem 3. Beyond the door is a universal partizan ruleset.
|
| 358 |
+
Proof. Let f ′ be a function from a position in turning tiles to a position in
|
| 359 |
+
beyond the door as follows:
|
| 360 |
+
Let G be a position in turning tiles. In f ′(G) there are as many rooms
|
| 361 |
+
as tiles in G and the tiles in G and the rooms in f ′(G) are arranged exactly the
|
| 362 |
+
same. For each piece on a tile in G, there is a corresponding piece in the room
|
| 363 |
+
corresponding to the tile. For any adjacent tiles A and B in G, let A′ and B′
|
| 364 |
+
are corresponding rooms in f ′(G). The color of the door between A′ and B′ is
|
| 365 |
+
the same as the color of A on the B′ side, and the same as the color of B on
|
| 366 |
+
the A′ side.
|
| 367 |
+
Figure 5 shows this corresponding. Here, the game tree of G and f ′(G) are
|
| 368 |
+
isomorphic. We prove that every move in one game has a corresponding move
|
| 369 |
+
in the other game. Assume that in G Left can move a piece on tile A0 to tile
|
| 370 |
+
An through tiles A1, A2, . . . , An−1. Then, A1, A2, . . . , An are blue tiles. Let
|
| 371 |
+
A′
|
| 372 |
+
0, A′
|
| 373 |
+
1, . . . , A′
|
| 374 |
+
n be the corresponding rooms in f ′(G). Let A′ → B′ be the color
|
| 375 |
+
6
|
| 376 |
+
|
| 377 |
+
Figure 5: Corresponding positions in turning tiles and beyond the door
|
| 378 |
+
.
|
| 379 |
+
Figure 6: f and f ′ have no inverse functions.
|
| 380 |
+
of the door between A′ and B′ on the A′ side. Then, from the definition of f ′,
|
| 381 |
+
all of A′
|
| 382 |
+
0 → A′
|
| 383 |
+
1, A′
|
| 384 |
+
1 → A′
|
| 385 |
+
2, . . . , A′
|
| 386 |
+
n−1 → A′
|
| 387 |
+
n are blue. Therefore, Left can move
|
| 388 |
+
a piece from A′
|
| 389 |
+
0 to A′
|
| 390 |
+
n through A′
|
| 391 |
+
1, A′
|
| 392 |
+
2, . . . , A′
|
| 393 |
+
n−1. Conversely, assume that in
|
| 394 |
+
f(G), Left can move a piece from A′
|
| 395 |
+
0 to A′
|
| 396 |
+
n through A′
|
| 397 |
+
1, A′
|
| 398 |
+
2, . . . , A′
|
| 399 |
+
n−1. Then,
|
| 400 |
+
in G, all corresponding tiles A1, A2, . . . , An are blue tiles. Therefore, Left can
|
| 401 |
+
move a piece from A0 to An through A′
|
| 402 |
+
1, A′
|
| 403 |
+
2, . . . , A′
|
| 404 |
+
n−1 in the corresponding
|
| 405 |
+
position in turning tiles. Similar proof holds for Right’s moves.
|
| 406 |
+
Thus, from Corollary 1, beyond the door is a universal partizan ruleset.
|
| 407 |
+
Note that f and f ′ have no inverse functions. For instance, Fig. 6 shows
|
| 408 |
+
positions in go on lattice and beyond the door. No position in turning
|
| 409 |
+
tiles is mapped to these positions by f and f ′ because depending on the order
|
| 410 |
+
of moves, both Left and Right may move pieces to the same node or the same
|
| 411 |
+
room in these positions.
|
| 412 |
+
This is somewhat interesting.
|
| 413 |
+
That is, even though in some ways these
|
| 414 |
+
rulesets are more complex than turning tiles, considering what kind of values
|
| 415 |
+
7
|
| 416 |
+
|
| 417 |
+
LLLL
|
| 418 |
+
L
|
| 419 |
+
RRR
|
| 420 |
+
R
|
| 421 |
+
R
|
| 422 |
+
Rcan appear in the rulesets, all of them are the same.
|
| 423 |
+
3
|
| 424 |
+
Conclusion
|
| 425 |
+
In this paper, we proved go on lattice and beyond the door are universal
|
| 426 |
+
partizan rulesets by using game-tree preserving reduction. The method of re-
|
| 427 |
+
duction has been used primarily for proving complexity of problems. Since this
|
| 428 |
+
study shows that reduction is also effective in the proof of universality of a game,
|
| 429 |
+
we can expect that the knowledge accumulated in the study of computational
|
| 430 |
+
complexity will be utilized in the study of combinatorial game theory, and we
|
| 431 |
+
can expect further development of combinatorial game theory.
|
| 432 |
+
References
|
| 433 |
+
[1] M. H. Albert, R. J. Nowakowski, and D. Wolfe, Lessons in play: An Iintro-
|
| 434 |
+
duction to combinatorial game theory, A K Peters, Ltd. / CRC Press(2007).
|
| 435 |
+
[2] A. Carvalho, C. P. Santos: A nontrivial surjective map onto the short
|
| 436 |
+
Conway group, Games of No Chance 5 (U. Larsson, Ed.), MSRI Book
|
| 437 |
+
Series 70, Cambridge University Press, pp. 271–284(2019).
|
| 438 |
+
[3] A. N. Siegel, Combinatorial Game Theory, American Mathematical Soci-
|
| 439 |
+
ety(2013).
|
| 440 |
+
[4] K.
|
| 441 |
+
Suetsugu,
|
| 442 |
+
Discovering
|
| 443 |
+
a
|
| 444 |
+
new
|
| 445 |
+
universal
|
| 446 |
+
partizan
|
| 447 |
+
ruleset,
|
| 448 |
+
arXiv:2201.06069 [math.CO](2022).
|
| 449 |
+
8
|
| 450 |
+
|
0dE5T4oBgHgl3EQfOg4z/content/tmp_files/load_file.txt
ADDED
|
@@ -0,0 +1,288 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf,len=287
|
| 2 |
+
page_content='New universal partizan rulesets Koki Suetsugu January 2023 Abstract Universal partizan ruleset is a ruleset in which every game value of partizan games can be appear as a position.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 3 |
+
page_content=' So far, generalized konane and turning tiles have been proved to be universal partizan rulesets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 4 |
+
page_content=' In this paper, we introduce two rulesets go on lattice and beyond the door and prove that they are universal partizan rulesets by using game tree preserving reduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 5 |
+
page_content=' 1 Introduction Combinatorial game theory (CGT) studies two-player perfect information games with no chance moves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 6 |
+
page_content=' We say a game is under normal play convention if the player who moves last is the winner and a game is partizan game if the options for both players can be different in some positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 7 |
+
page_content=' Here, we introduce some definitions and theorems of CGT for later discussion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 8 |
+
page_content=' For more details of CGT, see [1, 3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 9 |
+
page_content=' In this theory, the two players are called Left and Right.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 10 |
+
page_content=' Since the term “game” is polysemous, we refer to each position as a game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 11 |
+
page_content=' The description of what moves are allowed for a given position is called the ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 12 |
+
page_content=' A game is defined by Left and Right options recursively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 13 |
+
page_content=' Definition 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 14 |
+
page_content=' {|} is a game, which is called 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 15 |
+
page_content=' For games GL 1 , GL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 16 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 17 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 18 |
+
page_content=' , GL n, GR 1 , GR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 19 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 20 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 21 |
+
page_content=' , and GR m, G = {GL 1 , GL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 22 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 23 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 24 |
+
page_content=' , GL n | GR 1 , GR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 25 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 26 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 27 |
+
page_content=' , GR m} is also a game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 28 |
+
page_content=' GL 1 , GL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 29 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 30 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 31 |
+
page_content=' , GL n are called left options of G and GR 1 , GR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 32 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 33 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 34 |
+
page_content=' , GR m are called right options of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 35 |
+
page_content=' Let G be the set of all games.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 36 |
+
page_content=' In terms of the player who has a winning strategy, G is separated into four sets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 37 |
+
page_content=' Let L, R, N, and P be the set of positions in which Left, Right, the Next player, and the Previous player have winning strategies, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 38 |
+
page_content=' The sets are called outcomes of the games.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 39 |
+
page_content=' Every position belongs to exactly one of the four outcomes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 40 |
+
page_content=' For a game G, let o(G) be the outcome of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 41 |
+
page_content=' We define the partial order of outcomes as L > P > R, L > N > R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 42 |
+
page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 43 |
+
page_content='05497v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 44 |
+
page_content='CO] 13 Jan 2023 The disjunctive sum of games is an important concept in Combinatorial Game Theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 45 |
+
page_content=' For games G and H, a position in which a player makes a move for one or the other on their turn is called a disjunctive sum of G and H, or G + H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 46 |
+
page_content=' More precisely, it is as follows: Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 47 |
+
page_content=' If the game trees of G and H are isomorphic, then we say these games are isomorphic or G ∼= H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 48 |
+
page_content=' Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 49 |
+
page_content=' For games G ∼= {GL 1 , GL 2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 50 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 51 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 52 |
+
page_content=' GL n | GR 1 , GR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 53 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 54 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 55 |
+
page_content=' , GR m} and H ∼= {HL 1 , HL 2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 56 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 57 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 58 |
+
page_content=' , HL n′ | HR 1 , HR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 59 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 60 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 61 |
+
page_content=' , HR m′}, G + H ∼= {G + HL 1 , G + HL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 62 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 63 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 64 |
+
page_content=' , G + HL n′, GL 1 + H, GL 2 + H, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 65 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 66 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 67 |
+
page_content=' , GL n + H | G + HR 1 , G + HR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 68 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 69 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 70 |
+
page_content=' , G + HR m′, GR 1 + H, GR 2 + H, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 71 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 72 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 73 |
+
page_content=' , GR m + H}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 74 |
+
page_content=' We also define equality, inequality and negative of games.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 75 |
+
page_content=' Definition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 76 |
+
page_content=' If for any X, o(G + X) is the same as o(H + X), then we say G = H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 77 |
+
page_content=' Definition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 78 |
+
page_content=' If o(G+H) ≥ o(H +X) holds for any X, then we say G ≥ H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 79 |
+
page_content=' On the other hand, if o(G + H) ≤ o(H + X) holds for any X, then we say G ≤ H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 80 |
+
page_content=' We also say G ≷ H if G ̸≥ H and G ̸≤ H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 81 |
+
page_content=' Definition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 82 |
+
page_content=' For a game G ∼= {GL 1 , GL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 83 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 84 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 85 |
+
page_content=' , GL n | GR 1 , GR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 86 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 87 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 88 |
+
page_content=' , GR m}, let −G ∼= {−GR 1 , −GR 2 , −GR m | −GL 1 , −GL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 89 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 90 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 91 |
+
page_content=' , −GL n}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 92 |
+
page_content=' G + (−H) is denoted by G − H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 93 |
+
page_content=' It is known that (G, +, =) is an abelian group and (G, ≥, =) is a partial order.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 94 |
+
page_content=' The question arises here, will there be a ruleset in which for any game there is a position equal to the game?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 95 |
+
page_content=' If the games appearing in each ruleset are restricted, then perhaps we should think in a narrower framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 96 |
+
page_content=' In fact, however, it is known that for every game, a position equal to the game appears in some rulesets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 97 |
+
page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 98 |
+
page_content='1 Universal partizan ruleset Definition 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 99 |
+
page_content=' A ruleset is universal partizan ruleset if every value in G is equal to a position of the ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 100 |
+
page_content=' Early results showed that generalized konane and turning tiles are universal partizan ruleset ([2, 4]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 101 |
+
page_content=' In this study, we will use the latter ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 102 |
+
page_content=' Definition 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 103 |
+
page_content=' The ruleset of turning tiles is as follows: Square tiles are laid out.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 104 |
+
page_content=' The front side is red or blue, and the back side is black.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 105 |
+
page_content=' Some pieces are on tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 106 |
+
page_content=' Each player (Left, whose color is bLue and Right, whose color is Red), in his/her turn, take a piece and move the piece straight on the tiles of his/her color.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 107 |
+
page_content=' 2 Tiles on which the piece pass over are turned over.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 108 |
+
page_content=' The player who moves last is the winner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 109 |
+
page_content=' Turning tiles is proved to be universal partizan ruleset even if the number of pieces is restricted to be only one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 110 |
+
page_content=' To distinguish this ruleset from the ruleset defined below, we will also refer to it as blue-red turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 111 |
+
page_content=' For games that use two colors, red and blue, corresponding to two players, we often consider a variant that adds green, which can be used by both players.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 112 |
+
page_content=' For example, in blue-red-green hackenbush, Right can remove red or green edges and Left can remove blue or green edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 113 |
+
page_content=' From this point of view, we consider a varant of turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 114 |
+
page_content=' Definition 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 115 |
+
page_content=' The ruleset of blue-red-green turning tiles is as follows: Square tiles are laid out.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 116 |
+
page_content=' The front side is red, blue, or green, and the back side is black.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 117 |
+
page_content=' Some pieces are on tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 118 |
+
page_content=' Each player (Left, whose color is bLue and Right, whose color is Red), in his/her turn, take a piece and move the piece straight on the tiles of his/her color or of green.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 119 |
+
page_content=' Tiles on which the piece pass over are turned over.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 120 |
+
page_content=' The player who moves last is the winner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 121 |
+
page_content=' Figure 1: Positions in blue-red turning tiles and blue-red-green turn- ing tiles Figure 1 is an example of positions in blue-red turning tiles and blue- red-green turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 122 |
+
page_content=' 3 L LL RR LL RR L R LLLG R GG RR- G L RR R R G R G R L L R L R R R R RR R R R RRR R R RR R G G RR R RR L 7 RR R 一 R G RR G R R P L R G G L R R LL R R R R L G R G R GObviously, blue-red-green turning tiles is also a universal partizan ruleset because every position in blue-red turning tiles can be appear in blue-red-green turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 123 |
+
page_content=' As we have seen here, if two rulesets have an inclusion relation in terms of the sets of positions, it can be used for proving universality of the rulesets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 124 |
+
page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 125 |
+
page_content=' Let Γ and ∆ be rulesets and assume that Γ be a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 126 |
+
page_content=' If for every position g ∈ Γ, there is at least one position in ∆ whose game value is the same as g, then ∆ is also a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 127 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 128 |
+
page_content=' This is trivial from the definition of universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 129 |
+
page_content=' Corollary 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 130 |
+
page_content=' Let Γ and ∆ be rulesets and assume that Γ be a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 131 |
+
page_content=' If for every position g ∈ Γ, there is at least one position in ∆ whose game tree is the same as g, then ∆ is also a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 132 |
+
page_content=' If a ruleset is proved to be universal partizan ruleset by using Corollary 1, we say that it is proved by game tree preserving reduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 133 |
+
page_content=' In the next section, we introduce two rulesets and prove that they are univer- sal partizan ruleset by game tree preserving reduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 134 |
+
page_content=' In Secton 3, we conclude this study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 135 |
+
page_content=' 2 New universal partizan rulesets 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 136 |
+
page_content='1 Go on lattice Definition 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 137 |
+
page_content=' The rule of go on lattice is as follows: There is a lattice graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 138 |
+
page_content=' There are pieces on some nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 139 |
+
page_content=' The edges are colored red, blue, or dotted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 140 |
+
page_content=' A player, in his/her turn, chooses a piece and moves it straight on edges colored his/her color.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 141 |
+
page_content=' After a piece passed a node, every piece cannot get on or pass the node.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 142 |
+
page_content=' If a player moves a piece to a node adjacent to a dotted edge, then the edge changes to solid edge colored by the opponent’s color.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 143 |
+
page_content=' The player who moves last is the winner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 144 |
+
page_content=' Figure 2: Play of go on lattice 4 17 MFigure 2 is a play of go on lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 145 |
+
page_content=' We use double line for red edges for monochrome printing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 146 |
+
page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 147 |
+
page_content=' Go on lattice is a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 148 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 149 |
+
page_content=' Let f be a function from a position in turning tiles to a position in go on lattice as follows: Let G be a position in turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 150 |
+
page_content=' In f(G) there are as many nodes as tiles in G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 151 |
+
page_content=' The tiles in G and the nodes in f(G) are arranged exactly the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 152 |
+
page_content=' For each piece on a tile in G, there is a corresponding piece on the node corresponds to the tile.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 153 |
+
page_content=' For any adjacent tiles A and B in G, let A′ and B′ are corresponding nodes in f(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 154 |
+
page_content=' If the color of A, and B are the same, then edge between A′ and B′ is solid and the same color as A and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 155 |
+
page_content=' If there is a piece on A or B, then the edge between A′ and B′ is solid and the color is the same as the other tile.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 156 |
+
page_content=' Finally, if the color of A and B are different and no piece is on each tile, then the edge between A′ and B′ is dotted line.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 157 |
+
page_content=' B B B B B R R R R B R R B B B Figure 3: Corresponding positions in turning tiles and go on lattice .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 158 |
+
page_content=' Figure 3 shows this corresponding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 159 |
+
page_content=' Here, the game tree of G and f(G) are isomorphic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 160 |
+
page_content=' We prove that every move in one game has a corresponding move in the other game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 161 |
+
page_content=' Assume that in G Left can move a piece on tile A0 to tile An through tiles A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 162 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 163 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 164 |
+
page_content=' , An−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 165 |
+
page_content=' Then, A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 166 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 167 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 168 |
+
page_content=' , An are blue tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 169 |
+
page_content=' Let A′ 0, A′ 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 170 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 171 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 172 |
+
page_content=' , A′ n be the corresponding nodes in f(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 173 |
+
page_content=' Let (A′, B′) be the edge be- tween A′ and B′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 174 |
+
page_content=' Then, from the definition of f, all of (A′ 1, A′ 2), (A′ 2, A′ 3), .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 175 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 176 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 177 |
+
page_content=' , (A′ n−1, A′ n) are blue edge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 178 |
+
page_content=' In addition, if A0 was a blue tile before turning, then (A′ 0, A′ 1) is a blue edge, and if A0 was a red tile, (A′ 0, A′ 1) had been a dot edge and after Right moved the piece to A′ 0, it changed to a blue edge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 179 |
+
page_content=' Therefore for both case, (A′ 0, A′ 1) is a blue edge and Left can move a piece from A′ 0 to A′ n through A′ 1, A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 180 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 181 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 182 |
+
page_content=' , A′ n−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 183 |
+
page_content=' Conversely, assume that in f(G), Left can move a piece from A′ 0 to A′ n through A′ 1, A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 184 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 185 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 186 |
+
page_content=' , A′ n−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 187 |
+
page_content=' Then, in G, all corresponding tiles A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 188 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 189 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 190 |
+
page_content=' , An are blue tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 191 |
+
page_content=' Therefore, Left can move a piece from A0 to 5 Figure 4: Play of beyond the door.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 192 |
+
page_content=' An through A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 193 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 194 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 195 |
+
page_content=' , An−1 in the corresponding position in turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 196 |
+
page_content=' Similar proof holds for Right’s moves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 197 |
+
page_content=' Thus, from Corollary 1, go on lattice is a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 198 |
+
page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 199 |
+
page_content='2 Beyond the door Definition 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 200 |
+
page_content=' The rule of beyond the door is as follows: Square rooms are arranged in a grid pattern.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 201 |
+
page_content=' There are doors between the rooms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 202 |
+
page_content=' The front and back of the doors are painted red or blue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 203 |
+
page_content=' There are pieces in several rooms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 204 |
+
page_content=' A player, in his/her turn, chooses a piece and moves it in a straight line.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 205 |
+
page_content=' When a piece moves beyond the door, the color of the piece’s side of the door must be the player’s color.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 206 |
+
page_content=' After a piece passed a room, every piece can not enter the room.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 207 |
+
page_content=' The player who moves last is the winner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 208 |
+
page_content=' Figure 4 shows a play of beyond the door.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 209 |
+
page_content=' The red sides are masked for monochrome printing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 210 |
+
page_content=' Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 211 |
+
page_content=' Beyond the door is a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 212 |
+
page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 213 |
+
page_content=' Let f ′ be a function from a position in turning tiles to a position in beyond the door as follows: Let G be a position in turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 214 |
+
page_content=' In f ′(G) there are as many rooms as tiles in G and the tiles in G and the rooms in f ′(G) are arranged exactly the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 215 |
+
page_content=' For each piece on a tile in G, there is a corresponding piece in the room corresponding to the tile.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 216 |
+
page_content=' For any adjacent tiles A and B in G, let A′ and B′ are corresponding rooms in f ′(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 217 |
+
page_content=' The color of the door between A′ and B′ is the same as the color of A on the B′ side, and the same as the color of B on the A′ side.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 218 |
+
page_content=' Figure 5 shows this corresponding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 219 |
+
page_content=' Here, the game tree of G and f ′(G) are isomorphic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 220 |
+
page_content=' We prove that every move in one game has a corresponding move in the other game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 221 |
+
page_content=' Assume that in G Left can move a piece on tile A0 to tile An through tiles A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 222 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 223 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 224 |
+
page_content=' , An−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 225 |
+
page_content=' Then, A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 226 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 227 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 228 |
+
page_content=' , An are blue tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 229 |
+
page_content=' Let A′ 0, A′ 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 230 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 231 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 232 |
+
page_content=' , A′ n be the corresponding rooms in f ′(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 233 |
+
page_content=' Let A′ → B′ be the color 6 Figure 5: Corresponding positions in turning tiles and beyond the door .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 234 |
+
page_content=' Figure 6: f and f ′ have no inverse functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 235 |
+
page_content=' of the door between A′ and B′ on the A′ side.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 236 |
+
page_content=' Then, from the definition of f ′, all of A′ 0 → A′ 1, A′ 1 → A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 237 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 238 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 239 |
+
page_content=' , A′ n−1 → A′ n are blue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 240 |
+
page_content=' Therefore, Left can move a piece from A′ 0 to A′ n through A′ 1, A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 241 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 242 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 243 |
+
page_content=' , A′ n−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 244 |
+
page_content=' Conversely, assume that in f(G), Left can move a piece from A′ 0 to A′ n through A′ 1, A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 245 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 246 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 247 |
+
page_content=' , A′ n−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 248 |
+
page_content=' Then, in G, all corresponding tiles A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 249 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 250 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 251 |
+
page_content=' , An are blue tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 252 |
+
page_content=' Therefore, Left can move a piece from A0 to An through A′ 1, A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 253 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 254 |
+
page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 255 |
+
page_content=' , A′ n−1 in the corresponding position in turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 256 |
+
page_content=' Similar proof holds for Right’s moves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 257 |
+
page_content=' Thus, from Corollary 1, beyond the door is a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 258 |
+
page_content=' Note that f and f ′ have no inverse functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 259 |
+
page_content=' For instance, Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 260 |
+
page_content=' 6 shows positions in go on lattice and beyond the door.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 261 |
+
page_content=' No position in turning tiles is mapped to these positions by f and f ′ because depending on the order of moves, both Left and Right may move pieces to the same node or the same room in these positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 262 |
+
page_content=' This is somewhat interesting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 263 |
+
page_content=' That is, even though in some ways these rulesets are more complex than turning tiles, considering what kind of values 7 LLLL L RRR R R Rcan appear in the rulesets, all of them are the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 264 |
+
page_content=' 3 Conclusion In this paper, we proved go on lattice and beyond the door are universal partizan rulesets by using game-tree preserving reduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 265 |
+
page_content=' The method of re- duction has been used primarily for proving complexity of problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 266 |
+
page_content=' Since this study shows that reduction is also effective in the proof of universality of a game, we can expect that the knowledge accumulated in the study of computational complexity will be utilized in the study of combinatorial game theory, and we can expect further development of combinatorial game theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 267 |
+
page_content=' References [1] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 268 |
+
page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 269 |
+
page_content=' Albert, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 270 |
+
page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 271 |
+
page_content=' Nowakowski, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 272 |
+
page_content=' Wolfe, Lessons in play: An Iintro- duction to combinatorial game theory, A K Peters, Ltd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 273 |
+
page_content=' / CRC Press(2007).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 274 |
+
page_content=' [2] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 275 |
+
page_content=' Carvalho, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 276 |
+
page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 277 |
+
page_content=' Santos: A nontrivial surjective map onto the short Conway group, Games of No Chance 5 (U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 278 |
+
page_content=' Larsson, Ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 279 |
+
page_content=' ), MSRI Book Series 70, Cambridge University Press, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 280 |
+
page_content=' 271–284(2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 281 |
+
page_content=' [3] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 282 |
+
page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 283 |
+
page_content=' Siegel, Combinatorial Game Theory, American Mathematical Soci- ety(2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 284 |
+
page_content=' [4] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 285 |
+
page_content=' Suetsugu, Discovering a new universal partizan ruleset, arXiv:2201.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 286 |
+
page_content='06069 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 287 |
+
page_content='CO](2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
| 288 |
+
page_content=' 8' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
|
0dE5T4oBgHgl3EQfOg4z/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:72e8c58554f43fd8477be187000c7f95a647b3c92aca61c26f9f96eb287a00d3
|
| 3 |
+
size 40690
|
0tAzT4oBgHgl3EQfDPqY/content/2301.00973v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:c13daab503f1b67bffffdb7c8a8381e73d08fb05ab7c1cd94ef385b4acbc2a33
|
| 3 |
+
size 5629212
|
0tAzT4oBgHgl3EQfDPqY/content/tmp_files/2301.00973v1.pdf.txt
ADDED
|
@@ -0,0 +1,1482 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2022
|
| 2 |
+
1
|
| 3 |
+
Detecting Severity of Diabetic Retinopathy from
|
| 4 |
+
Fundus Images using Ensembled Transformers
|
| 5 |
+
Chandranath Adak, Senior Member, IEEE, Tejas Karkera, Soumi Chattopadhyay, Member, IEEE, and
|
| 6 |
+
Muhammad Saqib
|
| 7 |
+
Abstract— Diabetic Retinopathy (DR) is considered one
|
| 8 |
+
of the primary concerns due to its effect on vision loss
|
| 9 |
+
among most people with diabetes globally. The severity of
|
| 10 |
+
DR is mostly comprehended manually by ophthalmologists
|
| 11 |
+
from fundus photography-based retina images. This paper
|
| 12 |
+
deals with an automated understanding of the severity
|
| 13 |
+
stages of DR. In the literature, researchers have focused on
|
| 14 |
+
this automation using traditional machine learning-based
|
| 15 |
+
algorithms and convolutional architectures. However, the
|
| 16 |
+
past works hardly focused on essential parts of the retinal
|
| 17 |
+
image to improve the model performance. In this paper,
|
| 18 |
+
we adopt transformer-based learning models to capture the
|
| 19 |
+
crucial features of retinal images to understand DR sever-
|
| 20 |
+
ity better. We work with ensembling image transformers,
|
| 21 |
+
where we adopt four models, namely ViT (Vision Trans-
|
| 22 |
+
former), BEiT (Bidirectional Encoder representation for im-
|
| 23 |
+
age Transformer), CaiT (Class-Attention in Image Trans-
|
| 24 |
+
formers), and DeiT (Data efficient image Transformers), to
|
| 25 |
+
infer the degree of DR severity from fundus photographs.
|
| 26 |
+
For experiments, we used the publicly available APTOS-
|
| 27 |
+
2019 blindness detection dataset, where the performances
|
| 28 |
+
of the transformer-based models were quite encouraging.
|
| 29 |
+
Index Terms— Blindness Detection, Diabetic Retinopa-
|
| 30 |
+
thy, Deep learning, Transformers.
|
| 31 |
+
I. INTRODUCTION
|
| 32 |
+
D
|
| 33 |
+
IABETES Mellitus, also known as diabetes, is a disorder
|
| 34 |
+
where the patient experiences increased blood sugar
|
| 35 |
+
levels over a long period. Diabetic Retinopathy (DR) is a mi-
|
| 36 |
+
crovascular complication of diabetes where the retina’s blood
|
| 37 |
+
vessels get damaged, which can lead to poor vision and even
|
| 38 |
+
blindness if untreated [1], [2]. Studies estimated that by twenty
|
| 39 |
+
years after diabetes onset, about 99% (or 60%) of patients
|
| 40 |
+
having type-I (or type-II) diabetes might have DR [1]. With
|
| 41 |
+
a worldwide presence of DR patients of about 126.6 million
|
| 42 |
+
in 2010, the current estimate is roughly around 191 million
|
| 43 |
+
by 2030 [3], [4]. However, about 56% of new DR cases can
|
| 44 |
+
be reduced by timely treatment and monitoring of the severity
|
| 45 |
+
[5]. The ophthalmologist analyzes fundus images for lesion-
|
| 46 |
+
based symptoms like microaneurysms, hard/ soft exudates, and
|
| 47 |
+
hemorrhages to understand the severity stages of DR [1], [2].
|
| 48 |
+
The positive DR is divided into the following stages [5]: (1)
|
| 49 |
+
mild: the earliest stage that can contain microaneurysms, (2)
|
| 50 |
+
C. Adak is with Dept. of CSE, IIT Patna, India-801106, T. Karkera is
|
| 51 |
+
with Atharva College of Engineering, Mumbai, India-400095, S. Chat-
|
| 52 |
+
topadhyay is with the Dept. of CSE, IIIT Guwahati, India-781015, and
|
| 53 |
+
M. Saqib is with Data61, CSIRO, Australia-2122.
|
| 54 |
+
Corresponding author: C. Adak (e-mail: [email protected])
|
| 55 |
+
negative
|
| 56 |
+
mild
|
| 57 |
+
moderate
|
| 58 |
+
severe
|
| 59 |
+
proliferative
|
| 60 |
+
Fig. 1. Fundus images with DR severity stages from APTOS-2019 [7].
|
| 61 |
+
moderate: here, the blood vessels lose the ability to blood
|
| 62 |
+
transportation, (3) severe: here, blockages in blood vessels
|
| 63 |
+
can occur and gives a signal to grow new blood vessels, (4)
|
| 64 |
+
proliferative: the advanced stage where new blood vessels start
|
| 65 |
+
growing. Fig. 1 shows some fundus images representing the
|
| 66 |
+
DR severity stages. Manual examining fundus images for DR
|
| 67 |
+
severity stage grading may bring inconsistencies due to a high
|
| 68 |
+
number of patients, less number of well-trained clinicians, long
|
| 69 |
+
diagnosing time, unclear lesions, etc. Moreover, there may be
|
| 70 |
+
disagreement among ophthalmologists in choosing the correct
|
| 71 |
+
severity grade [6]. Therefore, computer-aided techniques have
|
| 72 |
+
come into the scenario for better diagnosis and broadening the
|
| 73 |
+
prospects of early-stage detection [2].
|
| 74 |
+
Automated DR severity stage detection from fundus pho-
|
| 75 |
+
tographs has been performed for the last two and half decades.
|
| 76 |
+
Earlier, some image processing tools were used [8], [9], but
|
| 77 |
+
the machine learning-based DR became popular in the early
|
| 78 |
+
2000s. The machine learning-based techniques mostly relied
|
| 79 |
+
on hand-engineered features that were carefully extracted from
|
| 80 |
+
the fundus images and then fed to a classifier, e.g., Random
|
| 81 |
+
Forest (RF) [10], KNN (K-Nearest Neighbors) [11], SVM
|
| 82 |
+
(Support Vector Machine) [12], and ANN (Artificial Neural
|
| 83 |
+
Network) [13]. Although SVM and ANN-based models were
|
| 84 |
+
admired in the DR community, the hand-engineered feature-
|
| 85 |
+
based machine learning models require efficient prior feature
|
| 86 |
+
extraction, which may introduce errors for complex fundus
|
| 87 |
+
images [1], [2]. On the other hand, deep learning-based models
|
| 88 |
+
extract features automatically through convolution operations
|
| 89 |
+
[14], [15]. Besides, from 2012, deep learning architectures
|
| 90 |
+
rose to prominence in the computer vision community, which
|
| 91 |
+
also influenced the DR severity analysis from fundus images
|
| 92 |
+
[1]. The past deep learning-based techniques mostly employed
|
| 93 |
+
CNN (Convolutional Neural Network) [1], [16]. However,
|
| 94 |
+
the ability to give attention to certain regions/features and
|
| 95 |
+
fade the remaining portions hardly exists in classical CNNs.
|
| 96 |
+
For this reason, some contemporary methods incorporated
|
| 97 |
+
attention mechanism [17], [18]. Although multiple research
|
| 98 |
+
arXiv:2301.00973v1 [cs.CV] 3 Jan 2023
|
| 99 |
+
|
| 100 |
+
LOGO2
|
| 101 |
+
GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2022
|
| 102 |
+
works are present in the literature [1], [2] and efforts were
|
| 103 |
+
made to detect the existence of DR in the initial stages
|
| 104 |
+
of its development, still there is a room for improving the
|
| 105 |
+
performance by incorporating higher degrees of automated
|
| 106 |
+
feature extraction using better deep learning models.
|
| 107 |
+
In this paper, we employ the transformer model for leverag-
|
| 108 |
+
ing its MSA (Multi-head Self-Attention) [19] to focus on the
|
| 109 |
+
DR revealing region of the fundus image for understanding
|
| 110 |
+
the severity. Moreover, the transformer model has shown high
|
| 111 |
+
performance in recent days [19], [20]. Initially, we adopted
|
| 112 |
+
ViT (Visual Transformer) [19] for detecting DR severity due to
|
| 113 |
+
its outperformance on image classification tasks. ViT divides
|
| 114 |
+
the input image into a sequence of patches and applies
|
| 115 |
+
global attention [19]. Moreover, since standard ViT requires
|
| 116 |
+
hefty amounts of data, we also adopted some other image
|
| 117 |
+
transformer models, such as CaiT (Class-attention in image
|
| 118 |
+
Transformers) [21], DeiT (Data-efficient image Transformer)
|
| 119 |
+
[22], and BEiT (Bidirectional Encoder representation for im-
|
| 120 |
+
age Transformer) [23]. CaiT is a modified version of ViT and
|
| 121 |
+
employs specific class-attention [21]. DeiT uses knowledge
|
| 122 |
+
distillation, which transfers the knowledge from one network
|
| 123 |
+
to another and builds a teacher-student hierarchical network
|
| 124 |
+
[22]. BEiT is inspired by BERT (Bidirectional Encoder Rep-
|
| 125 |
+
resentations from Transformers) [24] to implement masking
|
| 126 |
+
of image patches and to model the same for pre-training the
|
| 127 |
+
ViT [23]. For experiments, we used the publicly available
|
| 128 |
+
APTOS-2019 blindness detection dataset [7], where the in-
|
| 129 |
+
dividual image transformers did not perform well. Therefore,
|
| 130 |
+
we ensembled the image transformers to seek better predictive
|
| 131 |
+
performance. The ensembled image transformer obtained quite
|
| 132 |
+
encouraging results for DR severity stage detection. This is
|
| 133 |
+
one of the earliest attempts to adopt and ensemble image
|
| 134 |
+
transformers for DR severity stage detection, which is the main
|
| 135 |
+
contribution of this paper.
|
| 136 |
+
The rest of the paper is organized as follows. § II discusses
|
| 137 |
+
the relevant literature about DR and § III presents the proposed
|
| 138 |
+
methodology. Then § IV analyzes and discusses the experi-
|
| 139 |
+
mental results. Finally, § V concludes this paper.
|
| 140 |
+
II. RELATED WORK
|
| 141 |
+
This section briefly presents the literature on DR severity
|
| 142 |
+
detection from fundus images. The modern grading of DR
|
| 143 |
+
severity stages can be traced in the report by ETDRS research
|
| 144 |
+
group [25]. In the past, some image processing-based (e.g.,
|
| 145 |
+
wavelet transform [8], radon transform [9]) strategies were
|
| 146 |
+
published. For the last two decades, machine learning and
|
| 147 |
+
deep learning-based approaches have shown dominance. We
|
| 148 |
+
broadly categorize the related works into (a) hand-engineered
|
| 149 |
+
feature-based models [11], [26], [27], and (b) deep feature-
|
| 150 |
+
based models [2], which are discussed below.
|
| 151 |
+
A. Hand-engineered Feature-based Models
|
| 152 |
+
The hand-engineered feature-based models mostly em-
|
| 153 |
+
ployed RF [26], KNN [28], SVM [27], ANN [29] for detecting
|
| 154 |
+
DR severity stages. Acharya et al. [26] employed a decision
|
| 155 |
+
tree with discrete wavelet/cosine transform-based features ex-
|
| 156 |
+
tracted from retinal images. Casanova et al. [10] introduced RF
|
| 157 |
+
for DR severity stage classification. In [30], RF was also used
|
| 158 |
+
to assess DR risk. KNN classifier was employed in [11] to
|
| 159 |
+
detect drusen, exudates, and cotton-wool spots for diagnosing
|
| 160 |
+
DR. Tang et al. [28] used KNN for retinal hemorrhage detec-
|
| 161 |
+
tion from fundus photographs. In [27], retinal changes due to
|
| 162 |
+
DR was detected by using SVM. Akram et al. [12] used SVM
|
| 163 |
+
and GMM (Gaussian Mixture Model) with enhanced features
|
| 164 |
+
such as shape, intensity, and statistics of the affected region
|
| 165 |
+
to identify microaneurysms for early detection of DR. ANN
|
| 166 |
+
was employed in [13] to classify lesions for detecting DR
|
| 167 |
+
severity. Osareh et al. [31] employed FCM (Fuzzy C-Means)-
|
| 168 |
+
based segmentation and GA (Genetic algorithm)-based feature
|
| 169 |
+
selection with ANN to detect exudates in DR. In [29], PSO
|
| 170 |
+
(Particle Swarm Optimization) was used for feature selection,
|
| 171 |
+
followed by ANN-based DR severity classification.
|
| 172 |
+
B. Deep Feature-based Models
|
| 173 |
+
The past deep architectures mostly used CNN for tackling
|
| 174 |
+
DR severity. For example, Yu et al. [16] used CNN for
|
| 175 |
+
detecting exudates in DR, Chudzik et al. [32] worked on
|
| 176 |
+
microaneurysm detection using CNN with transfer learning
|
| 177 |
+
and layer freezing, Gargeya and Leng [33] employed CNN-
|
| 178 |
+
based deep residual learning to identify fundus images with
|
| 179 |
+
DR. In [4], CNN was also used to identify DR severity stages
|
| 180 |
+
and some related eye diseases, e.g., glaucoma and AMD (Age-
|
| 181 |
+
related Macular Degeneration). In [34], some classical CNN
|
| 182 |
+
architectures (e.g., AlexNet, VGG Net, GoogLeNet, ResNet)
|
| 183 |
+
were employed for DR severity stage detection. Wang et al.
|
| 184 |
+
[17] proposed Zoom-in-Net that combined CNN, attention
|
| 185 |
+
mechanism, and a greedy algorithm to zoom in the region
|
| 186 |
+
of interest for handling DR. A modified DenseNet169 ar-
|
| 187 |
+
chitecture in conjunction with the attention mechanism was
|
| 188 |
+
used in [18] to extract refined features for DR severity
|
| 189 |
+
grading. In [35], a modified Xception architecture was em-
|
| 190 |
+
ployed for DR classification. TAN (Texture Attention Net-
|
| 191 |
+
work) was proposed in [36] by leveraging style (texture
|
| 192 |
+
features) and content (semantic and contextual features) re-
|
| 193 |
+
calibration mechanism. Tymchenko et al. [5] ensembled three
|
| 194 |
+
CNN architectures (EfficientNet-B4 [37], EfficientNet-B5, and
|
| 195 |
+
SE- ResNeXt50 [38]) for DR severity detection. Very recently,
|
| 196 |
+
a few transformer-based models have come out, e.g., CoT-
|
| 197 |
+
XNet [39] that combined contextual transformer and Xception
|
| 198 |
+
architecture, SSiT [40] that employed self-supervised image
|
| 199 |
+
transformers guided by saliency maps.
|
| 200 |
+
III. METHODOLOGY
|
| 201 |
+
This section first formalizes the problem statement, which
|
| 202 |
+
is then followed by the proposal of solution architecture.
|
| 203 |
+
A. Problem Formulation
|
| 204 |
+
In this work, we are given an image I captured by the
|
| 205 |
+
fundus photography, which is input to the architecture. The
|
| 206 |
+
task is to predict the severity stage of diabetic retinopathy (DR)
|
| 207 |
+
among negative, mild, moderate, severe, and proliferative,
|
| 208 |
+
from I. We formulate the task as a multi-class classification
|
| 209 |
+
problem [15]. Here, from I, features are extracted and fed to
|
| 210 |
+
|
| 211 |
+
ADAK et al.: DETECTING SEVERITY OF DIABETIC RETINOPATHY FROM FUNDUS IMAGES USING ENSEMBLED TRANSFORMERS
|
| 212 |
+
3
|
| 213 |
+
a classifier to predict the DR severity class labels Á, where
|
| 214 |
+
Á = {0, 1, 2, 3, 4} corresponds to {negative, mild, moderate,
|
| 215 |
+
severe, proliferative}, respectively.
|
| 216 |
+
B. Solution Architecture
|
| 217 |
+
For detecting the severity stage of DR from a fundus
|
| 218 |
+
photograph, we adopt image transformers, i.e., ViT (Vision
|
| 219 |
+
Transformer) [19], BEiT (Bidirectional Encoder representation
|
| 220 |
+
for image Transformer) [23], CaiT (Class-attention in image
|
| 221 |
+
Transformers) [21], and DeiT (Data efficient image Trans-
|
| 222 |
+
formers) [22], and ensemble them. However, we preprocess
|
| 223 |
+
raw fundus images before feeding them into the transformers,
|
| 224 |
+
which we discuss first.
|
| 225 |
+
1) Preprocessing: The performance of deep learning mod-
|
| 226 |
+
els is susceptible to the quality and quantity of data being
|
| 227 |
+
passed to the model. Raw data as input can barely account for
|
| 228 |
+
the best achievable performance of the model due to possible
|
| 229 |
+
pre-existing noise and inconsistency in the images. Therefore,
|
| 230 |
+
a definite flow of preprocessing is essential to train the model
|
| 231 |
+
better [15].
|
| 232 |
+
We now discuss various preprocessing and augmentation
|
| 233 |
+
techniques [15], [41] applied to the raw fundus photographs
|
| 234 |
+
for better learning. In a dataset, the fundus images may be of
|
| 235 |
+
various sizes; therefore, we resize the image I into 256 × 256
|
| 236 |
+
sized image Iz. We perform data augmentations on training set
|
| 237 |
+
(DBtr), where we use centre cropping with central_fraction =
|
| 238 |
+
0.5, horizontal/vertical flip, random rotations within a range
|
| 239 |
+
of [0o, 45o], random brightness-change with max_delta =
|
| 240 |
+
0.95, random contrast-change in the interval [0.1, 0.9]. We
|
| 241 |
+
also apply CLAHE (Contrast Limited Adaptive Histogram
|
| 242 |
+
Equalization) [42] on 30% samples of DBtr, which ensures
|
| 243 |
+
over-amplification of contrast in a smaller region instead of
|
| 244 |
+
the entire image.
|
| 245 |
+
2) Transformer Networks: Deep learning models in com-
|
| 246 |
+
puter vision tasks have long been dominated by CNN (Convo-
|
| 247 |
+
lutional Neural Network) to extract high-level feature maps by
|
| 248 |
+
passing the image through a series of convolution operations
|
| 249 |
+
before feeding into the MLP (Multi-Layer Perceptron) for clas-
|
| 250 |
+
sification [43]. In recent days, transformer models have shown
|
| 251 |
+
a substantial rise in the NLP (Natural Language Processing)
|
| 252 |
+
domain due to its higher performances [20]. In a similar quest
|
| 253 |
+
to leverage high-level performance through transformers, it
|
| 254 |
+
has been introduced in image classification and some other
|
| 255 |
+
computer vision-oriented tasks [19]. Moreover, the transformer
|
| 256 |
+
model has lesser image-specific inductive bias than CNN [19].
|
| 257 |
+
To identify the severity stages of DR from fundus images,
|
| 258 |
+
here we efficiently adopt and ensemble some image transform-
|
| 259 |
+
ers, e.g., ViT [19], BEiT [23], CaiT [21], and DeiT [22].
|
| 260 |
+
Before focusing on our ensembled transformer model, we
|
| 261 |
+
discuss the adaptation of individual image transformers for
|
| 262 |
+
our task, and start with ViT.
|
| 263 |
+
a) Vision Transformer (ViT): The ViT model adopts the idea
|
| 264 |
+
of text-based transformer models [44], where the idea is to take
|
| 265 |
+
the input image as a series of image patches instead of textual
|
| 266 |
+
words, and then extract features to feed it into an MLP [19].
|
| 267 |
+
The pictorial representation of ViT is presented in Fig. 2.
|
| 268 |
+
Here, the input image Iz is converted into a sequence of
|
| 269 |
+
Fig. 2. Workflow of ViT.
|
| 270 |
+
Fig. 3. Internal view of a transformer encoder (TE).
|
| 271 |
+
flattened patches xi
|
| 272 |
+
p (for i = 1, 2, . . . , np), each with size
|
| 273 |
+
wp × wp × cp, where cp denotes the number of channels
|
| 274 |
+
of Iz. Here, cp = 3, since Iz is an RGB fundus image. In
|
| 275 |
+
our task, Iz is of size 256 × 256, and empirically, we choose
|
| 276 |
+
wp = 64, which results np = ( 256
|
| 277 |
+
64 )2 = 16. Each patch xi
|
| 278 |
+
p is
|
| 279 |
+
flattened further and mapped to a D-dimensional latent vector
|
| 280 |
+
(i.e., patch embedding z0) through transformer layers using a
|
| 281 |
+
trainable linear projection, as below.
|
| 282 |
+
z0 = [xclass ; x1
|
| 283 |
+
p E ; x2
|
| 284 |
+
p E ; . . . ; xnp
|
| 285 |
+
p E] + Epos
|
| 286 |
+
(1)
|
| 287 |
+
where,
|
| 288 |
+
E
|
| 289 |
+
is
|
| 290 |
+
the
|
| 291 |
+
patch
|
| 292 |
+
embedding
|
| 293 |
+
projection,
|
| 294 |
+
E
|
| 295 |
+
∈
|
| 296 |
+
Rwp×wp×C×D; Epos is the position embeddings added to
|
| 297 |
+
patch embeddings to preserve the positional information of
|
| 298 |
+
patches, Epos ∈ R(np+1)×D; xclass = z0
|
| 299 |
+
0 is a learnable
|
| 300 |
+
embedding [24].
|
| 301 |
+
After mapping patch images to the embedding space with
|
| 302 |
+
positional information, we add a sequence of transformer
|
| 303 |
+
encoders [19], [45]. The internal view of a transformer encoder
|
| 304 |
+
can be seen in Fig. 3, which includes two blocks As and Fn.
|
| 305 |
+
The As and Fn contain MSA (Multi-head Self-Attention) [19]
|
| 306 |
+
and MLP [15] modules, respectively. LN (Layer Normaliza-
|
| 307 |
+
tion) [46] and residual connection [15] are employed before
|
| 308 |
+
and after each of these modules, respectively. This is shown
|
| 309 |
+
in equation 2 with general semantics. Here, the MLP module
|
| 310 |
+
comprises two layers having 4D and D neurons with GELU
|
| 311 |
+
(Gaussian Error Linear Unit) non-linear activation function
|
| 312 |
+
|
| 313 |
+
Patch + Position
|
| 314 |
+
Embedding
|
| 315 |
+
0
|
| 316 |
+
MLP Head
|
| 317 |
+
Softmax
|
| 318 |
+
*
|
| 319 |
+
Linear Projection of Flattened Patches
|
| 320 |
+
1
|
| 321 |
+
Transformer Encoder (TE)
|
| 322 |
+
2
|
| 323 |
+
3
|
| 324 |
+
dn
|
| 325 |
+
np
|
| 326 |
+
pLx
|
| 327 |
+
LN
|
| 328 |
+
MSA
|
| 329 |
+
LN
|
| 330 |
+
MLP
|
| 331 |
+
zi
|
| 332 |
+
Zt4
|
| 333 |
+
GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2022
|
| 334 |
+
similar to [19].
|
| 335 |
+
z′
|
| 336 |
+
l = MSA(LN(zl−1)) + zl−1;
|
| 337 |
+
zl = MLP(LN(z′
|
| 338 |
+
l)) + z′
|
| 339 |
+
l; l = 1, 2, . . . , L
|
| 340 |
+
(2)
|
| 341 |
+
where, L is the total number of transformer blocks. The core
|
| 342 |
+
component of the transformer encoder is MSA with h heads,
|
| 343 |
+
where each head includes SA (Scaled dot-product Attention)
|
| 344 |
+
[19], [45]. Each head i ∈ {1, 2, ..., h} of MSA calculates a
|
| 345 |
+
tuple comprising query, key, and value [19], i.e., (Qi, Ki, V i)
|
| 346 |
+
as follows.
|
| 347 |
+
Qi = XW i
|
| 348 |
+
Q ; Ki = XW i
|
| 349 |
+
K ; V i = XW i
|
| 350 |
+
V
|
| 351 |
+
(3)
|
| 352 |
+
where, X is the input embedding, and WQ, WK, WV are the
|
| 353 |
+
weight matrices used in the linear transformation. The tuple
|
| 354 |
+
(Q, K, V ) is fed to SA that computes the attention required
|
| 355 |
+
to pay to the input image patches, as below.
|
| 356 |
+
SA(Q, K, V ) = ψ
|
| 357 |
+
�QKT
|
| 358 |
+
√Dh
|
| 359 |
+
�
|
| 360 |
+
V
|
| 361 |
+
(4)
|
| 362 |
+
where, ψ is softmax function, and Dh = D/h. The outcomes
|
| 363 |
+
of SAs across all heads are concatenated in MSA, as follows.
|
| 364 |
+
MSA(Q, K, V ) = [SA1 ; SA2 ; . . . ; SAh]WL
|
| 365 |
+
(5)
|
| 366 |
+
where WL is a weight matrix.
|
| 367 |
+
After multiple transformer encoder blocks, the <class>
|
| 368 |
+
token [24] enriches with the contextual information. The state
|
| 369 |
+
of the learnable embedding at the outcome of the Transformer
|
| 370 |
+
encoder (z0
|
| 371 |
+
L) acts as the image representation y [19].
|
| 372 |
+
y = LN(z0
|
| 373 |
+
L)
|
| 374 |
+
(6)
|
| 375 |
+
Now, as shown in Fig. 2, we add an MLP head containing
|
| 376 |
+
a hidden layer with 128 neurons. To capture the non-linearity,
|
| 377 |
+
we use Mish [47] here. In the output layer, we keep five
|
| 378 |
+
neurons with softmax activation function to obtain probability
|
| 379 |
+
distribution s(j) in order to classify a fundus photograph into
|
| 380 |
+
the abovementioned five severity stages of DR.
|
| 381 |
+
b) Data efficient image Transformers (DeiT): For a lower
|
| 382 |
+
amount of training data, ViT does not generalize well. In
|
| 383 |
+
this scenario, DeiT can perform reasonably well and uses
|
| 384 |
+
lower memory [22]. DeiT adopts the ViT-specific strategy and
|
| 385 |
+
merges with the teacher-student scheme through knowledge
|
| 386 |
+
distillation [48]. The crux of DeiT is the knowledge distillation
|
| 387 |
+
mechanism, which is basically the knowledge transfer from
|
| 388 |
+
one model (teacher) to another (student) [22]. Here, we use
|
| 389 |
+
EfficientNet-B5 [37] as a teacher model that is trained apriori.
|
| 390 |
+
The student model uses a transformer, which learns from the
|
| 391 |
+
outcome of the teacher model through attention depending
|
| 392 |
+
on a distillation token [22]. In this work, we employ hard-
|
| 393 |
+
label distillation [22], where the hard decision of the teacher
|
| 394 |
+
is considered as a true label, i.e., yt = argmaxcZt(c). The
|
| 395 |
+
hard-label distillation objective is defined as follows.
|
| 396 |
+
Lhard
|
| 397 |
+
global = 0.5 LCE(ψ(Zs), y) + 0.5 LCE(ψ(Zs), yt)
|
| 398 |
+
(7)
|
| 399 |
+
where, LCE is the cross-entropy loss on ground-truth labels
|
| 400 |
+
y, ψ is the softmax function, Zs and Zt are the student and
|
| 401 |
+
teacher models’ logits, respectively. Using label smoothing,
|
| 402 |
+
Fig. 4. The distillation procedure of DeiT.
|
| 403 |
+
hard labels can be converted into soft ones [22].
|
| 404 |
+
In Fig. 4, we present the distillation procedure of DeiT.
|
| 405 |
+
Here, we add the <distillation> token to the transformer,
|
| 406 |
+
which interacts with the <class> and <patch> tokens through
|
| 407 |
+
transformer encoders. The transformer encoder used here is
|
| 408 |
+
similar to the ViT’s one, which includes As and Fn blocks as
|
| 409 |
+
shown in Fig. 3. The objective of the <distillation> token is to
|
| 410 |
+
reproduce the teacher’s predicted label instead of the ground-
|
| 411 |
+
truth label. The <distillation> and <class> tokens are learned
|
| 412 |
+
by back-propagation [15].
|
| 413 |
+
A linear classifier is used in DeiT instead of the MLP head
|
| 414 |
+
of ViT [19], [22] to work efficiently with limited computa-
|
| 415 |
+
tional resources.
|
| 416 |
+
c) Class-attention in image Transformers (CaiT): CaiT
|
| 417 |
+
usually performs better than ViT and DeiT with lesser FLOPs
|
| 418 |
+
and learning parameters [15], when we need to increase the
|
| 419 |
+
depth of the transformer [21]. CaiT is basically an upgraded
|
| 420 |
+
version of ViT, which leverages layers with specific class-
|
| 421 |
+
attention and LayerScale [21]. In Fig. 5, we show the workflow
|
| 422 |
+
of CaiT.
|
| 423 |
+
LayerScale aids CaiT to work at larger depths, where we
|
| 424 |
+
separately multiply a diagonal matrix Mλ on the outputs of
|
| 425 |
+
As and Fn blocks.
|
| 426 |
+
z′
|
| 427 |
+
l = Mλ(λl
|
| 428 |
+
1, . . . , λl
|
| 429 |
+
D) × MSA(LN(zl−1)) + zl−1;
|
| 430 |
+
zl = Mλ(λ′l
|
| 431 |
+
1, . . . , λ′l
|
| 432 |
+
D) × MLP(LN(z′
|
| 433 |
+
l)) + z′
|
| 434 |
+
l
|
| 435 |
+
(8)
|
| 436 |
+
where, λl
|
| 437 |
+
i and λ′l
|
| 438 |
+
i are learning parameters, and other symbols
|
| 439 |
+
denote the same as the above-mentioned ViT.
|
| 440 |
+
In CaiT, the transformer layers dealing with self-attention
|
| 441 |
+
Fig. 5. Workflow of CaiT.
|
| 442 |
+
|
| 443 |
+
Self-attention
|
| 444 |
+
lass-attentionO
|
| 445 |
+
口ADAK et al.: DETECTING SEVERITY OF DIABETIC RETINOPATHY FROM FUNDUS IMAGES USING ENSEMBLED TRANSFORMERS
|
| 446 |
+
5
|
| 447 |
+
among patches are separated from class-attention layers that
|
| 448 |
+
are introduced to dedicatedly extract the content of the patches
|
| 449 |
+
into a vector, which can be sent to a linear classifier [21]. The
|
| 450 |
+
<class> token is inserted in the latter stage, so that the initial
|
| 451 |
+
layers can perform the self-attention among patches devotedly.
|
| 452 |
+
In the class-attention stage, we alternatively use multi-head
|
| 453 |
+
class-attention (Ac) [21] and Fn, as shown in Fig. 5, and
|
| 454 |
+
update only the class embedding.
|
| 455 |
+
d) Bidirectional Encoder representation for image Trans-
|
| 456 |
+
former (BEiT): BEiT is a self-supervised model having its
|
| 457 |
+
root in the BERT (Bidirectional Encoder Representations from
|
| 458 |
+
Transformers) [23], [24]. In Fig. 6, we present the workflow
|
| 459 |
+
of the pre-training of BEiT.
|
| 460 |
+
The input image Iz is split into patches xi
|
| 461 |
+
p and flattened
|
| 462 |
+
into vectors, similar to the early-mentioned ViT. In BEiT, a
|
| 463 |
+
backbone transformer is engaged, for which we use ViT [19].
|
| 464 |
+
On the other hand, Iz is represented as a sequence of visual
|
| 465 |
+
tokens vt = [vt1, vt2, . . . , vtnp] obtained by a discrete VAE
|
| 466 |
+
(Variational Auto-Encoder) [49]. For visual token learning, we
|
| 467 |
+
employ a tokenizer Tφ(vt | x) to map image pixels x to tokens
|
| 468 |
+
vt, and decoder Dθ(x | vt) for reconstructing input image
|
| 469 |
+
pixels x from vt [23].
|
| 470 |
+
Here, a MIM (Masked Image Modeling) [23] task is per-
|
| 471 |
+
formed to pre-train the image transformers, where some image
|
| 472 |
+
patches are randomly masked, and the corresponding visual
|
| 473 |
+
tokens are then predicted. The masked patches are replaced
|
| 474 |
+
with a learnable embedding e[M]. We feed the corrupted image
|
| 475 |
+
patches xM = {xi
|
| 476 |
+
p : i /∈ M} �{e[M] : i ∈ M} to the
|
| 477 |
+
transformer encoder. Here, M is the set of indices of masked
|
| 478 |
+
positions.
|
| 479 |
+
The encoded representation hL
|
| 480 |
+
i
|
| 481 |
+
is the hidden vector of
|
| 482 |
+
the last transformer layer L for ith patch. For each masked
|
| 483 |
+
Fig. 6. Workflow of BEiT pre-training.
|
| 484 |
+
position, a softmax classifier ψ is used to predict the respective
|
| 485 |
+
visual token, i.e., pMIM(vt′ | xM) = ψ(WMhL
|
| 486 |
+
i + bM); where,
|
| 487 |
+
WM and bM contain learning parameters for linear transfor-
|
| 488 |
+
mation. The pre-training objective of BEiT is to maximize the
|
| 489 |
+
log-likelihood of the correct token vti given xM, as below:
|
| 490 |
+
max
|
| 491 |
+
�
|
| 492 |
+
x∈ DBtr
|
| 493 |
+
EM
|
| 494 |
+
� �
|
| 495 |
+
i∈M
|
| 496 |
+
log pMIM
|
| 497 |
+
�
|
| 498 |
+
vti | xM�
|
| 499 |
+
�
|
| 500 |
+
where, DBtr is the training dataset. The BEiT pre-training
|
| 501 |
+
can be perceived as VAE training [23], [49], where we follow
|
| 502 |
+
two stages, i.e., stage-1: minimizing loss for visual token
|
| 503 |
+
reconstruction, stage-2: modeling masked image, i.e., learning
|
| 504 |
+
prior pMIM by keeping Tφ and Dθ fixed. It can be written as
|
| 505 |
+
follows:
|
| 506 |
+
�
|
| 507 |
+
(xi,xM
|
| 508 |
+
i
|
| 509 |
+
)
|
| 510 |
+
∈ DBtr
|
| 511 |
+
�
|
| 512 |
+
�
|
| 513 |
+
�
|
| 514 |
+
�Evti∼Tφ(vt|xi) [log Dθ(xi|vti)]
|
| 515 |
+
�
|
| 516 |
+
��
|
| 517 |
+
�
|
| 518 |
+
stage-1
|
| 519 |
+
+ log pMIM
|
| 520 |
+
�
|
| 521 |
+
ˆ
|
| 522 |
+
vti|xM
|
| 523 |
+
i
|
| 524 |
+
�
|
| 525 |
+
�
|
| 526 |
+
��
|
| 527 |
+
�
|
| 528 |
+
stage-2
|
| 529 |
+
�
|
| 530 |
+
�
|
| 531 |
+
�
|
| 532 |
+
�
|
| 533 |
+
where, ˆ
|
| 534 |
+
vti = argmaxvt Tφ(vt | xi).
|
| 535 |
+
3) Ensembled Transformers: The abovementioned four im-
|
| 536 |
+
age transformers, i.e., ViT [19], DeiT [22], CaiT [21], and
|
| 537 |
+
BEiT [23] are pre-trained on the training set DBtr. We now
|
| 538 |
+
ensemble the transformers for predicting the severity stages
|
| 539 |
+
from fundus images of the test set DBt, since ensembling
|
| 540 |
+
multiple learning algorithms can achieve better performance
|
| 541 |
+
than the constituent algorithms alone [50]. The pictorial rep-
|
| 542 |
+
resentation of ensembled transformers is presented in Fig. 7.
|
| 543 |
+
For an image sample from DBt, we obtain the softmax
|
| 544 |
+
probability distribution s(j) : {P j
|
| 545 |
+
1 , P j
|
| 546 |
+
2 , . . . , P j
|
| 547 |
+
nc} over jth
|
| 548 |
+
transformer [15], for j = 1, 2, . . . , nT ; where, nc is the total
|
| 549 |
+
number of classes (severity stages), and nT is count of the
|
| 550 |
+
employed image transformers. Here, �nc
|
| 551 |
+
i=1 P j
|
| 552 |
+
i = 1, nc = 5
|
| 553 |
+
(refer to § III-A), and nT = 4 since we use four separately
|
| 554 |
+
trained distinct image transformers, as mentioned earlier.
|
| 555 |
+
We obtain the severity stages/ class_labels Á|wm and Á|mv
|
| 556 |
+
separately using two combination methods weighted mean and
|
| 557 |
+
majority voting [50], respectively.
|
| 558 |
+
Á|wm = argmaxi P µ
|
| 559 |
+
i ; for i = 1, 2, . . . , nc ;
|
| 560 |
+
P µ
|
| 561 |
+
i =
|
| 562 |
+
�nT
|
| 563 |
+
j=1 αjP j
|
| 564 |
+
i
|
| 565 |
+
�nT
|
| 566 |
+
j=1 αj
|
| 567 |
+
(9)
|
| 568 |
+
Fig. 7. Ensembled transformers.
|
| 569 |
+
|
| 570 |
+
Masked
|
| 571 |
+
Image
|
| 572 |
+
Patches
|
| 573 |
+
Original Image
|
| 574 |
+
latten
|
| 575 |
+
0
|
| 576 |
+
*
|
| 577 |
+
Tokenizer
|
| 578 |
+
L
|
| 579 |
+
1
|
| 580 |
+
BEiT Encoder
|
| 581 |
+
MIM Head
|
| 582 |
+
2
|
| 583 |
+
[M]
|
| 584 |
+
h2
|
| 585 |
+
3
|
| 586 |
+
Unused at
|
| 587 |
+
Pre-training
|
| 588 |
+
Decoder
|
| 589 |
+
Patch + Position
|
| 590 |
+
Embedding
|
| 591 |
+
Reconstructed ImageViT
|
| 592 |
+
s(1)
|
| 593 |
+
ative
|
| 594 |
+
s(2)
|
| 595 |
+
DeiT
|
| 596 |
+
Mild
|
| 597 |
+
Moderate
|
| 598 |
+
Severe
|
| 599 |
+
CaiT
|
| 600 |
+
s(3)
|
| 601 |
+
Proliferative
|
| 602 |
+
c
|
| 603 |
+
(4)
|
| 604 |
+
BEiT6
|
| 605 |
+
GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2022
|
| 606 |
+
In this task, we choose �nT
|
| 607 |
+
j=1 αj = 1.
|
| 608 |
+
Á|mv = mode
|
| 609 |
+
�
|
| 610 |
+
argmaxi(P 1
|
| 611 |
+
i ), argmaxi(P 2
|
| 612 |
+
i ), . . . , argmaxi(P nT
|
| 613 |
+
i
|
| 614 |
+
)
|
| 615 |
+
�
|
| 616 |
+
= mode
|
| 617 |
+
�
|
| 618 |
+
argmaxi(s(1)), argmaxi(s(2)), . . . , argmaxi(s(nT ))
|
| 619 |
+
�
|
| 620 |
+
;
|
| 621 |
+
for i = 1, 2, . . . , nc
|
| 622 |
+
(10)
|
| 623 |
+
In this task, we use cross-entropy as the loss function [41]
|
| 624 |
+
in the employed image transformers. The AdamW optimizer
|
| 625 |
+
is used here due to its weight decay regularization effect
|
| 626 |
+
for tackling overfitting [51]. The training details with hyper-
|
| 627 |
+
parameter tuning are mentioned in Section IV-B.
|
| 628 |
+
IV. EXPERIMENTS AND DISCUSSIONS
|
| 629 |
+
In this section, we present the employed database, followed
|
| 630 |
+
by experimental results with discussions.
|
| 631 |
+
A. Database Employed
|
| 632 |
+
For our computational experiments, we used the publicly
|
| 633 |
+
available training samples of Kaggle APTOS (Asia Pacific
|
| 634 |
+
Tele-Ophthalmology Society) 2019 Blindness Detection dataset
|
| 635 |
+
[7], i.e., APTOS-2019. This database (DB) contains fundus
|
| 636 |
+
image samples of five severity stages of DR, i.e., negative,
|
| 637 |
+
mild, moderate, severe, and proliferative. Fig. 1 shows some
|
| 638 |
+
sample images from this dataset. In DB, a total of 3662 fundus
|
| 639 |
+
images are available, which we divide into training (DBtr) and
|
| 640 |
+
testing (DBt) datasets with a ratio of 7 : 3. As a matter of fact,
|
| 641 |
+
DBtr and DBt sets are disjoint. The sample counts of different
|
| 642 |
+
severity stages/ class_labels (Á) for DBtr and DBt are shown
|
| 643 |
+
in Fig. 8 individually. Here, 49.3% samples are of negative
|
| 644 |
+
DR (Á= 0). Among positive classes, most samples are from
|
| 645 |
+
the moderate stage (Á= 2). From this figure, it can be seen
|
| 646 |
+
DB is imbalanced due to containing a different number of
|
| 647 |
+
samples corresponding to various severity stages. Therefore,
|
| 648 |
+
we augmented the data during the training of our model as
|
| 649 |
+
mentioned in § III-B.1. The data augmentation also helped in
|
| 650 |
+
reducing the overfitting issue [15].
|
| 651 |
+
Fig. 8. Count of samples in APTOS-2019 [7].
|
| 652 |
+
B. Experimental Results
|
| 653 |
+
This section discusses the performed experiments, analyzes
|
| 654 |
+
the model outcome, and compares them with major state-of-
|
| 655 |
+
the-art methods. We begin with discussing the experimental
|
| 656 |
+
settings.
|
| 657 |
+
1) Experiment Settings: We performed the experiments on
|
| 658 |
+
the TensorFlow-2 framework having Python 3.7.13 over a
|
| 659 |
+
machine with the following configurations: Intel(R) Xeon(R)
|
| 660 |
+
CPU @ 2.00GHz with 52 GB RAM and Tesla T4 16 GB
|
| 661 |
+
GPU. All the results shown here were obtained from DBt.
|
| 662 |
+
The hyper-parameters of the framework were tuned and
|
| 663 |
+
fixed during training with respect to the performance over
|
| 664 |
+
some samples of DBt employed for hyper-parameter tuning.
|
| 665 |
+
For all the image transformers used here (i.e., ViT, DeiT, CaiT,
|
| 666 |
+
and BEiT), we empirically set the following hyper-parameters:
|
| 667 |
+
transformer_layers (L) = 12, embedding_dimension (D) =
|
| 668 |
+
384, num_heads (h) = 6. The following hyper-parameters
|
| 669 |
+
were selected for AdamW [51]: initial_learning_rate = 10−3;
|
| 670 |
+
exponential decay rates for 1st and 2nd moment estimates, i.e.,
|
| 671 |
+
β1 = 0.9, β2 = 0.999; zero-denominator removal parameter
|
| 672 |
+
(ε) = 10−8; and weight_decay = 10−3/4. For model training,
|
| 673 |
+
the mini-batch size was fixed to 32.
|
| 674 |
+
2) Model Performance: In Table I, we present the per-
|
| 675 |
+
formance of our ensembled image transformer (EiT) using
|
| 676 |
+
the combination schemes weighted mean (wm) and majority
|
| 677 |
+
voting (mv), where we obtain 94.63% and 91.26% accuracy
|
| 678 |
+
from EiTwm and EiTmv, respectively. We also ensembled
|
| 679 |
+
multiple combinations of our employed transformers, and
|
| 680 |
+
present their performances in this table. Here, the wm scheme
|
| 681 |
+
performed better than mv. As evident from this table, ensem-
|
| 682 |
+
bling various types of transformers improved the performance.
|
| 683 |
+
Among single transformers (for nT = 1), CaiT performed
|
| 684 |
+
the best. For nT = 2 and nT = 3, “BEiT + CaiT” and
|
| 685 |
+
“DeiT + BEiT + CaiT” performed better than other respective
|
| 686 |
+
combinations. Overall, EiTwm attained the best accuracy here.
|
| 687 |
+
TABLE I
|
| 688 |
+
PERFORMANCE OVER VARIOUS ENSEMBLING OF TRANSFORMERS
|
| 689 |
+
nT
|
| 690 |
+
Ensembled Transformers
|
| 691 |
+
Accuracy (%)
|
| 692 |
+
Weighted
|
| 693 |
+
Majority
|
| 694 |
+
mean
|
| 695 |
+
voting
|
| 696 |
+
1
|
| 697 |
+
ViT
|
| 698 |
+
82.21
|
| 699 |
+
DeiT
|
| 700 |
+
85.65
|
| 701 |
+
BEiT
|
| 702 |
+
86.74
|
| 703 |
+
CaiT
|
| 704 |
+
86.91
|
| 705 |
+
2
|
| 706 |
+
ViT + DeiT
|
| 707 |
+
87.03
|
| 708 |
+
86.55
|
| 709 |
+
ViT + BEiT
|
| 710 |
+
87.48
|
| 711 |
+
87.03
|
| 712 |
+
ViT + CaiT
|
| 713 |
+
87.77
|
| 714 |
+
87.21
|
| 715 |
+
DeiT + BEiT
|
| 716 |
+
88.18
|
| 717 |
+
87.69
|
| 718 |
+
DeiT + CaiT
|
| 719 |
+
88.86
|
| 720 |
+
87.93
|
| 721 |
+
BEiT + CaiT
|
| 722 |
+
89.28
|
| 723 |
+
88.12
|
| 724 |
+
3
|
| 725 |
+
ViT + DeiT + BEiT
|
| 726 |
+
90.53
|
| 727 |
+
88.87
|
| 728 |
+
ViT + DeiT + CaiT
|
| 729 |
+
91.39
|
| 730 |
+
89.56
|
| 731 |
+
ViT + BEiT + CaiT
|
| 732 |
+
92.14
|
| 733 |
+
90.28
|
| 734 |
+
DeiT + BEiT + CaiT
|
| 735 |
+
93.46
|
| 736 |
+
90.91
|
| 737 |
+
4
|
| 738 |
+
ViT + DeiT + BEiT + CaiT
|
| 739 |
+
94.63
|
| 740 |
+
91.26
|
| 741 |
+
( EiT )
|
| 742 |
+
In Fig. 10 of Appendix I, we present the coarse localization
|
| 743 |
+
maps generated by Grad-CAM [52] from the employed indi-
|
| 744 |
+
vidual image transformers to highlight the crucial regions for
|
| 745 |
+
understanding the severity stages.
|
| 746 |
+
a) Various Evaluation Metrics: Besides the accuracy, in
|
| 747 |
+
Table II, we present the performance of EiT with respect to
|
| 748 |
+
some other evaluation metrics, e.g., kappa score, precision,
|
| 749 |
+
recall, F1 score, specificity, balanced accuracy [53]. Here,
|
| 750 |
+
Cohen’s quadratic weighted kappa measures the agreement
|
| 751 |
+
|
| 752 |
+
2000
|
| 753 |
+
1800
|
| 754 |
+
DBtr
|
| 755 |
+
DBt
|
| 756 |
+
1600
|
| 757 |
+
541
|
| 758 |
+
1400
|
| 759 |
+
1200
|
| 760 |
+
sampl
|
| 761 |
+
1000
|
| 762 |
+
800
|
| 763 |
+
300
|
| 764 |
+
#
|
| 765 |
+
600
|
| 766 |
+
1264
|
| 767 |
+
400
|
| 768 |
+
111
|
| 769 |
+
699
|
| 770 |
+
200
|
| 771 |
+
88
|
| 772 |
+
259
|
| 773 |
+
135
|
| 774 |
+
207
|
| 775 |
+
0
|
| 776 |
+
0
|
| 777 |
+
1
|
| 778 |
+
2
|
| 779 |
+
3
|
| 780 |
+
4
|
| 781 |
+
severity stage/ class
|
| 782 |
+
label (c)ADAK et al.: DETECTING SEVERITY OF DIABETIC RETINOPATHY FROM FUNDUS IMAGES USING ENSEMBLED TRANSFORMERS
|
| 783 |
+
7
|
| 784 |
+
between human-assigned scores (i.e., DR severity stages)
|
| 785 |
+
and the EiT-predicted scores. Precision analyzes the true
|
| 786 |
+
positive samples among the total positive predictions. Recall
|
| 787 |
+
or sensitivity finds the true positive rate. Similarly, specificity
|
| 788 |
+
computes the true negative rate. F1 score is the harmonic mean
|
| 789 |
+
of precision and recall. Since the employed DB is imbalanced,
|
| 790 |
+
we also compute the balanced accuracy, which is the arithmetic
|
| 791 |
+
mean of sensitivity and specificity. In this table, we can see
|
| 792 |
+
that for both EiTwm and EiTmv, the kappa scores are greater
|
| 793 |
+
than 0.81, which comprehends the “almost perfect agreement”
|
| 794 |
+
between the human rater and EiT [53]. Here, macro means
|
| 795 |
+
the arithmetic mean of all per class precision/ recall/ F1 score.
|
| 796 |
+
TABLE II
|
| 797 |
+
PERFORMANCE OF EiT OVER VARIOUS EVALUATION METRICS
|
| 798 |
+
Metric
|
| 799 |
+
Weighted mean
|
| 800 |
+
Majority voting
|
| 801 |
+
(EiTwm)
|
| 802 |
+
(EiTmv)
|
| 803 |
+
Accuracy (%)
|
| 804 |
+
94.63
|
| 805 |
+
91.26
|
| 806 |
+
Kappa score
|
| 807 |
+
0.92
|
| 808 |
+
0.87
|
| 809 |
+
Macro Precision (%)
|
| 810 |
+
90.55
|
| 811 |
+
84.65
|
| 812 |
+
Macro Recall (%)
|
| 813 |
+
92.88
|
| 814 |
+
88.81
|
| 815 |
+
Macro F1-score (%)
|
| 816 |
+
91.67
|
| 817 |
+
86.55
|
| 818 |
+
Macro Specificity (%)
|
| 819 |
+
98.62
|
| 820 |
+
97.74
|
| 821 |
+
Balanced Accuracy (%)
|
| 822 |
+
95.75
|
| 823 |
+
93.27
|
| 824 |
+
b) Individual Class Performance: Table III presents the
|
| 825 |
+
individual performance of EiTwm and EiTmv for detecting
|
| 826 |
+
every severity stage of DR. From this table, we can see our
|
| 827 |
+
models produced the best precision and recall for negative DR
|
| 828 |
+
(Á= 0), and the lowest for severe DR (Á= 3).
|
| 829 |
+
TABLE III
|
| 830 |
+
PERFORMANCE OF EiT ON EVERY DR SEVERITY STAGE
|
| 831 |
+
class_label (Á)
|
| 832 |
+
0
|
| 833 |
+
1
|
| 834 |
+
2
|
| 835 |
+
3
|
| 836 |
+
4
|
| 837 |
+
EiTwm
|
| 838 |
+
Precision (%)
|
| 839 |
+
98.48
|
| 840 |
+
86.67
|
| 841 |
+
95.00
|
| 842 |
+
83.61
|
| 843 |
+
89.01
|
| 844 |
+
Recall (%)
|
| 845 |
+
95.75
|
| 846 |
+
93.69
|
| 847 |
+
95.00
|
| 848 |
+
87.93
|
| 849 |
+
92.05
|
| 850 |
+
F1-score (%)
|
| 851 |
+
97.09
|
| 852 |
+
90.04
|
| 853 |
+
95.00
|
| 854 |
+
85.71
|
| 855 |
+
90.50
|
| 856 |
+
Specificity (%)
|
| 857 |
+
98.56
|
| 858 |
+
98.38
|
| 859 |
+
98.12
|
| 860 |
+
99.04
|
| 861 |
+
99.01
|
| 862 |
+
EiTmv
|
| 863 |
+
Precision (%)
|
| 864 |
+
96.74
|
| 865 |
+
79.67
|
| 866 |
+
94.14
|
| 867 |
+
70.59
|
| 868 |
+
82.11
|
| 869 |
+
Recall (%)
|
| 870 |
+
93.35
|
| 871 |
+
88.29
|
| 872 |
+
91.00
|
| 873 |
+
82.76
|
| 874 |
+
88.64
|
| 875 |
+
F1-score (%)
|
| 876 |
+
95.01
|
| 877 |
+
83.76
|
| 878 |
+
92.54
|
| 879 |
+
76.19
|
| 880 |
+
85.25
|
| 881 |
+
Specificity (%)
|
| 882 |
+
96.95
|
| 883 |
+
97.47
|
| 884 |
+
97.87
|
| 885 |
+
98.08
|
| 886 |
+
98.32
|
| 887 |
+
In each row, the best result is marked bold, second-best is italic, and lowest is underlined.
|
| 888 |
+
3) Comparison: In Table IV, we present a comparative
|
| 889 |
+
analysis with some major contemporary deep learning archi-
|
| 890 |
+
tectures, e.g., ResNet50 [54], InceptionV3 [55], MobileNetV2
|
| 891 |
+
[56], Xception [57], DenseNet169 (Farag et al. [18]), Efficient-
|
| 892 |
+
Net [37], and SE-ResNeXt50 [38]. We have also compared
|
| 893 |
+
with recently published transformer-based models, i.e., CoT-
|
| 894 |
+
XNet [39], and SSiT [40]. Comparison with some major
|
| 895 |
+
related works [5], [35], [36] can also be seen in this table.
|
| 896 |
+
Our EiTwm outperformed the major state-of-the-art methods
|
| 897 |
+
with respect to accuracy, balanced accuracy, sensitivity, and
|
| 898 |
+
specificity. Our EiTmv also performed quite well in terms of
|
| 899 |
+
balanced accuracy.
|
| 900 |
+
4) Impact of Hyper-parameters:
|
| 901 |
+
We
|
| 902 |
+
tuned
|
| 903 |
+
the
|
| 904 |
+
hyper-
|
| 905 |
+
parameters and observed their impact on the experiment.
|
| 906 |
+
a) MSA Head Count: We analyzed the performance im-
|
| 907 |
+
pact of the number of heads (h) of MSA (Multi-head Self-
|
| 908 |
+
Attention) in the transformer encoder and present in Fig. 9.
|
| 909 |
+
As evident from this figure, the performance (accuracy) of
|
| 910 |
+
TABLE IV
|
| 911 |
+
COMPARATIVE STUDY
|
| 912 |
+
Method
|
| 913 |
+
Accuracy
|
| 914 |
+
Sensitivity
|
| 915 |
+
Specificity
|
| 916 |
+
Balanced
|
| 917 |
+
(%)
|
| 918 |
+
(%)
|
| 919 |
+
(%)
|
| 920 |
+
Accuracy (%)
|
| 921 |
+
ResNet50 [54]
|
| 922 |
+
74.64
|
| 923 |
+
56.52
|
| 924 |
+
85.71
|
| 925 |
+
71.12
|
| 926 |
+
InceptionV3 [55]
|
| 927 |
+
78.72
|
| 928 |
+
63.64
|
| 929 |
+
85.37
|
| 930 |
+
74.51
|
| 931 |
+
MobileNetV2 [56]
|
| 932 |
+
79.01
|
| 933 |
+
76.47
|
| 934 |
+
84.62
|
| 935 |
+
80.55
|
| 936 |
+
Xception [57]
|
| 937 |
+
79.59
|
| 938 |
+
82.35
|
| 939 |
+
86.32
|
| 940 |
+
84.34
|
| 941 |
+
Farag et al. [18]
|
| 942 |
+
82.00
|
| 943 |
+
-
|
| 944 |
+
-
|
| 945 |
+
-
|
| 946 |
+
Kassani et al. [35]
|
| 947 |
+
83.09
|
| 948 |
+
88.24
|
| 949 |
+
87.00
|
| 950 |
+
87.62
|
| 951 |
+
TAN [36]
|
| 952 |
+
85.10
|
| 953 |
+
90.30
|
| 954 |
+
92.00
|
| 955 |
+
-
|
| 956 |
+
EfficientNet-B4 [37]
|
| 957 |
+
90.30
|
| 958 |
+
81.20
|
| 959 |
+
97.60
|
| 960 |
+
89.40
|
| 961 |
+
EfficientNet-B5 [37]
|
| 962 |
+
90.70
|
| 963 |
+
80.70
|
| 964 |
+
97.70
|
| 965 |
+
89.20
|
| 966 |
+
SE-ResNeXt50 [38]
|
| 967 |
+
92.40
|
| 968 |
+
87.10
|
| 969 |
+
98.20
|
| 970 |
+
92.65
|
| 971 |
+
Tymchenko et al. [5]
|
| 972 |
+
92.90
|
| 973 |
+
86.00
|
| 974 |
+
98.30
|
| 975 |
+
92.15
|
| 976 |
+
CoT-XNet [39]
|
| 977 |
+
84.18
|
| 978 |
+
-
|
| 979 |
+
95.74
|
| 980 |
+
-
|
| 981 |
+
SSiT [40]
|
| 982 |
+
92.97
|
| 983 |
+
-
|
| 984 |
+
-
|
| 985 |
+
-
|
| 986 |
+
EiTmv [ours]
|
| 987 |
+
91.26
|
| 988 |
+
88.81
|
| 989 |
+
97.74
|
| 990 |
+
93.28
|
| 991 |
+
EiTwm [ours]
|
| 992 |
+
94.63
|
| 993 |
+
92.88
|
| 994 |
+
98.62
|
| 995 |
+
95.75
|
| 996 |
+
In each column, the best result is marked bold, and the second-best is underlined.
|
| 997 |
+
Fig. 9. Impact of number of heads (h) in MSA on model performance.
|
| 998 |
+
both EiTmv and EiTwm increased with the increment of h
|
| 999 |
+
till h = 6, and started decreasing thereafter.
|
| 1000 |
+
b) Weights αj of EiTwm: We tuned the weights αj (refer
|
| 1001 |
+
to Eqn. 9) to see its impact on the performance of EiTwm.
|
| 1002 |
+
We obtained the best accuracy of 94.63% from EiTwm for
|
| 1003 |
+
α1 = α2 = 0.1, and α3 = α4 = 0.4. The performance of
|
| 1004 |
+
EiTwm during tuning of αj’s is shown in Table V.
|
| 1005 |
+
In Table VI, we also present the tuned αj’s that aided in
|
| 1006 |
+
obtaining the best performing ensembled transformers of Table
|
| 1007 |
+
I.
|
| 1008 |
+
5) Ablation Study: We here present the performed ablation
|
| 1009 |
+
study by ablating individual transformers. Our EiT is actually
|
| 1010 |
+
an ensembling of four different image transformers, i.e., ViT,
|
| 1011 |
+
DeiT, CaiT, and BEiT. We ablated each transformer and
|
| 1012 |
+
observed performance degradation than EiT. For example,
|
| 1013 |
+
considering the weighted mean scheme, when we ablated CaiT
|
| 1014 |
+
from EiT, the accuracy dropped by 4.1%. Similarly, ablating
|
| 1015 |
+
BEiT and CaiT deteriorated the accuracy by 7.6%. For our
|
| 1016 |
+
task, the best individual transformer (CaiT) attained 7.72%
|
| 1017 |
+
lower accuracy than EiTwm. More examples can be observed
|
| 1018 |
+
in Table I.
|
| 1019 |
+
6) Pre-training with Other Datasets: We checked the perfor-
|
| 1020 |
+
mance of our EiT model by pre-training with some other
|
| 1021 |
+
dataset. We took 1200 images of MESSIDOR [58] with
|
| 1022 |
+
adjudicated grades by [59] (say, DBM). From IDRiD [60],
|
| 1023 |
+
we also used “Disease Grading” dataset containing 516 images
|
| 1024 |
+
(say, DBI). Here, we made four training set setups from DBM,
|
| 1025 |
+
by taking 25%, 50%, 75%, and 100% of samples of DBM.
|
| 1026 |
+
|
| 1027 |
+
96
|
| 1028 |
+
94.63
|
| 1029 |
+
EiTmv
|
| 1030 |
+
94
|
| 1031 |
+
92.34
|
| 1032 |
+
91.92
|
| 1033 |
+
92
|
| 1034 |
+
91
|
| 1035 |
+
90.28
|
| 1036 |
+
90
|
| 1037 |
+
89.43
|
| 1038 |
+
88.59
|
| 1039 |
+
87.67
|
| 1040 |
+
88
|
| 1041 |
+
87
|
| 1042 |
+
86
|
| 1043 |
+
84
|
| 1044 |
+
82
|
| 1045 |
+
80
|
| 1046 |
+
6
|
| 1047 |
+
8
|
| 1048 |
+
108
|
| 1049 |
+
GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2022
|
| 1050 |
+
TABLE V
|
| 1051 |
+
PERFORMANCE OF EiTwm BY TUNING WEIGHTS αj
|
| 1052 |
+
α1
|
| 1053 |
+
α2
|
| 1054 |
+
α3
|
| 1055 |
+
α4
|
| 1056 |
+
Accuracy (%)
|
| 1057 |
+
0.25
|
| 1058 |
+
0.25
|
| 1059 |
+
0.25
|
| 1060 |
+
0.25
|
| 1061 |
+
89.53
|
| 1062 |
+
0.85
|
| 1063 |
+
0.05
|
| 1064 |
+
0.05
|
| 1065 |
+
0.05
|
| 1066 |
+
82.29
|
| 1067 |
+
0.05
|
| 1068 |
+
0.85
|
| 1069 |
+
0.05
|
| 1070 |
+
0.05
|
| 1071 |
+
85.78
|
| 1072 |
+
0.05
|
| 1073 |
+
0.05
|
| 1074 |
+
0.85
|
| 1075 |
+
0.05
|
| 1076 |
+
86.92
|
| 1077 |
+
0.05
|
| 1078 |
+
0.05
|
| 1079 |
+
0.05
|
| 1080 |
+
0.85
|
| 1081 |
+
87.05
|
| 1082 |
+
0.7
|
| 1083 |
+
0.1
|
| 1084 |
+
0.1
|
| 1085 |
+
0.1
|
| 1086 |
+
82.35
|
| 1087 |
+
0.1
|
| 1088 |
+
0.7
|
| 1089 |
+
0.1
|
| 1090 |
+
0.1
|
| 1091 |
+
85.91
|
| 1092 |
+
0.1
|
| 1093 |
+
0.1
|
| 1094 |
+
0.7
|
| 1095 |
+
0.1
|
| 1096 |
+
87.04
|
| 1097 |
+
0.1
|
| 1098 |
+
0.1
|
| 1099 |
+
0.1
|
| 1100 |
+
0.7
|
| 1101 |
+
87.20
|
| 1102 |
+
0.5
|
| 1103 |
+
0.167
|
| 1104 |
+
0.167
|
| 1105 |
+
0.166
|
| 1106 |
+
82.88
|
| 1107 |
+
0.166
|
| 1108 |
+
0.5
|
| 1109 |
+
0.167
|
| 1110 |
+
0.167
|
| 1111 |
+
86.35
|
| 1112 |
+
0.167
|
| 1113 |
+
0.166
|
| 1114 |
+
0.5
|
| 1115 |
+
0.167
|
| 1116 |
+
87.62
|
| 1117 |
+
0.167
|
| 1118 |
+
0.167
|
| 1119 |
+
0.166
|
| 1120 |
+
0.5
|
| 1121 |
+
87.74
|
| 1122 |
+
0.3
|
| 1123 |
+
0.3
|
| 1124 |
+
0.2
|
| 1125 |
+
0.2
|
| 1126 |
+
88.16
|
| 1127 |
+
0.3
|
| 1128 |
+
0.2
|
| 1129 |
+
0.3
|
| 1130 |
+
0.2
|
| 1131 |
+
89.58
|
| 1132 |
+
0.3
|
| 1133 |
+
0.2
|
| 1134 |
+
0.2
|
| 1135 |
+
0.3
|
| 1136 |
+
90.27
|
| 1137 |
+
0.2
|
| 1138 |
+
0.3
|
| 1139 |
+
0.3
|
| 1140 |
+
0.2
|
| 1141 |
+
90.85
|
| 1142 |
+
0.2
|
| 1143 |
+
0.3
|
| 1144 |
+
0.2
|
| 1145 |
+
0.3
|
| 1146 |
+
91.67
|
| 1147 |
+
0.2
|
| 1148 |
+
0.2
|
| 1149 |
+
0.3
|
| 1150 |
+
0.3
|
| 1151 |
+
92.72
|
| 1152 |
+
0.4
|
| 1153 |
+
0.4
|
| 1154 |
+
0.1
|
| 1155 |
+
0.1
|
| 1156 |
+
91.18
|
| 1157 |
+
0.4
|
| 1158 |
+
0.1
|
| 1159 |
+
0.4
|
| 1160 |
+
0.1
|
| 1161 |
+
91.49
|
| 1162 |
+
0.4
|
| 1163 |
+
0.1
|
| 1164 |
+
0.1
|
| 1165 |
+
0.4
|
| 1166 |
+
92.15
|
| 1167 |
+
0.1
|
| 1168 |
+
0.4
|
| 1169 |
+
0.4
|
| 1170 |
+
0.1
|
| 1171 |
+
92.84
|
| 1172 |
+
0.1
|
| 1173 |
+
0.4
|
| 1174 |
+
0.1
|
| 1175 |
+
0.4
|
| 1176 |
+
93.47
|
| 1177 |
+
0.1
|
| 1178 |
+
0.1
|
| 1179 |
+
0.4
|
| 1180 |
+
0.4
|
| 1181 |
+
94.63
|
| 1182 |
+
TABLE VI
|
| 1183 |
+
TUNED WEIGHTS αj FOR TRANSFORMERS ENSEMBLED WITH
|
| 1184 |
+
WEIGHTED MEAN
|
| 1185 |
+
Transformerswm
|
| 1186 |
+
α1
|
| 1187 |
+
α2
|
| 1188 |
+
α3
|
| 1189 |
+
α4
|
| 1190 |
+
ViT + DeiT
|
| 1191 |
+
0.25
|
| 1192 |
+
0.75
|
| 1193 |
+
-
|
| 1194 |
+
-
|
| 1195 |
+
ViT + BEiT
|
| 1196 |
+
0.4
|
| 1197 |
+
0.6
|
| 1198 |
+
-
|
| 1199 |
+
-
|
| 1200 |
+
ViT + CaiT
|
| 1201 |
+
0.4
|
| 1202 |
+
0.6
|
| 1203 |
+
-
|
| 1204 |
+
-
|
| 1205 |
+
DeiT + BEiT
|
| 1206 |
+
0.4
|
| 1207 |
+
0.6
|
| 1208 |
+
-
|
| 1209 |
+
-
|
| 1210 |
+
DeiT + CaiT
|
| 1211 |
+
0.3
|
| 1212 |
+
0.7
|
| 1213 |
+
-
|
| 1214 |
+
-
|
| 1215 |
+
BEiT + CaiT
|
| 1216 |
+
0.5
|
| 1217 |
+
0.5
|
| 1218 |
+
-
|
| 1219 |
+
-
|
| 1220 |
+
ViT + DeiT + BEiT
|
| 1221 |
+
0.2
|
| 1222 |
+
0.3
|
| 1223 |
+
0.5
|
| 1224 |
+
-
|
| 1225 |
+
ViT + DeiT + CaiT
|
| 1226 |
+
0.2
|
| 1227 |
+
0.3
|
| 1228 |
+
0.5
|
| 1229 |
+
-
|
| 1230 |
+
ViT + BEiT + CaiT
|
| 1231 |
+
0.2
|
| 1232 |
+
0.4
|
| 1233 |
+
0.4
|
| 1234 |
+
-
|
| 1235 |
+
DeiT + BEiT + CaiT
|
| 1236 |
+
0.3
|
| 1237 |
+
0.3
|
| 1238 |
+
0.4
|
| 1239 |
+
-
|
| 1240 |
+
ViT + DeiT + BEiT + CaiT
|
| 1241 |
+
0.1
|
| 1242 |
+
0.1
|
| 1243 |
+
0.4
|
| 1244 |
+
0.4
|
| 1245 |
+
Similarly, four training setups were generated from DBI. As
|
| 1246 |
+
mentioned in § IV-A, we divided APTOS-2019 database (DB)
|
| 1247 |
+
in training (DBtr) and test (DBt) sets with a ratio of 7 : 3. In
|
| 1248 |
+
Table VII, we present the performance of EiT on DBt, while
|
| 1249 |
+
pre-training with DBM and DBI, and training with DBtr.
|
| 1250 |
+
It can be observed that the performance of EiT improved
|
| 1251 |
+
slightly when pre-trained with more data from other datasets.
|
| 1252 |
+
TABLE VII
|
| 1253 |
+
ACCURACY (%) OF EiT WITH PRE-TRAINING
|
| 1254 |
+
Pre-training data
|
| 1255 |
+
25%
|
| 1256 |
+
50%
|
| 1257 |
+
75%
|
| 1258 |
+
100%
|
| 1259 |
+
EiTwm
|
| 1260 |
+
DBM
|
| 1261 |
+
94.71
|
| 1262 |
+
94.78
|
| 1263 |
+
94.83
|
| 1264 |
+
94.88
|
| 1265 |
+
DBI
|
| 1266 |
+
94.65
|
| 1267 |
+
94.67
|
| 1268 |
+
94.7
|
| 1269 |
+
94.79
|
| 1270 |
+
DBM + DBI
|
| 1271 |
+
94.73
|
| 1272 |
+
94.85
|
| 1273 |
+
94.98
|
| 1274 |
+
95.13
|
| 1275 |
+
N.A.
|
| 1276 |
+
94.63
|
| 1277 |
+
EiTmv
|
| 1278 |
+
DBM
|
| 1279 |
+
91.35
|
| 1280 |
+
91.48
|
| 1281 |
+
91.56
|
| 1282 |
+
91.61
|
| 1283 |
+
DBI
|
| 1284 |
+
91.27
|
| 1285 |
+
91.32
|
| 1286 |
+
91.34
|
| 1287 |
+
91.35
|
| 1288 |
+
DBM + DBI
|
| 1289 |
+
91.42
|
| 1290 |
+
91.6
|
| 1291 |
+
91.68
|
| 1292 |
+
91.75
|
| 1293 |
+
N.A.
|
| 1294 |
+
91.26
|
| 1295 |
+
N.A.: without pre-training data
|
| 1296 |
+
V. CONCLUSION
|
| 1297 |
+
In this paper, we tackle the problem of automated severity
|
| 1298 |
+
stage detection of DR from fundus images. For this purpose,
|
| 1299 |
+
we propose two ensembled image transformers, EiTwm and
|
| 1300 |
+
EiTmv, by using weighted mean and majority voting combi-
|
| 1301 |
+
nation schemes, respectively. We here adopt four transformer
|
| 1302 |
+
models, i.e., ViT, DeiT, CaiT, and BEiT. For experimentation,
|
| 1303 |
+
we employed the publicly available APTOS-2019 blindness
|
| 1304 |
+
detection dataset, on which EiTwm and EiTmv attained
|
| 1305 |
+
accuracies of 94.63% and 91.26%, respectively. Although
|
| 1306 |
+
the employed dataset was imbalanced, our models performed
|
| 1307 |
+
quite well. Our EiTwm outperformed the major state-of-the-
|
| 1308 |
+
art techniques. We also performed an ablation study and
|
| 1309 |
+
observed the importance of the ensembling over the individual
|
| 1310 |
+
transformers.
|
| 1311 |
+
In the future, we will endeavor to improve the model perfor-
|
| 1312 |
+
mance with some imbalanced learning techniques. Currently,
|
| 1313 |
+
our model does not perform any lesion segmentation, which
|
| 1314 |
+
we will also attempt to explore some implicit characteristics
|
| 1315 |
+
of fundus images due to DR.
|
| 1316 |
+
APPENDIX I
|
| 1317 |
+
QUALITATIVE VISUALIZATION
|
| 1318 |
+
As mentioned in § IV-B.2, we present the Grad-CAM maps
|
| 1319 |
+
of the employed individual image transformers in Fig. 10.
|
| 1320 |
+
negative
|
| 1321 |
+
mild
|
| 1322 |
+
moderate
|
| 1323 |
+
severe
|
| 1324 |
+
proliferative
|
| 1325 |
+
Fig. 10.
|
| 1326 |
+
Fundus images (1st row) with Grad-CAM maps for ViT, DeiT,
|
| 1327 |
+
BEiT, CaiT as shown in 2nd, 3rd, 4th, 5th rows, respectively.
|
| 1328 |
+
REFERENCES
|
| 1329 |
+
[1] S. Stolte and R. Fang, “A survey on medical image analysis in diabetic
|
| 1330 |
+
retinopathy,” Medical image analysis, vol. 64, p. 101742, 2020.
|
| 1331 |
+
[2] N. Asiri et al., “Deep learning based computer-aided diagnosis systems
|
| 1332 |
+
for diabetic retinopathy: A survey,” Artificial intelligence in medicine,
|
| 1333 |
+
vol. 99, p. 101701, 2019.
|
| 1334 |
+
[3] Y. Zheng et al., “The worldwide epidemic of diabetic retinopathy,”
|
| 1335 |
+
Indian journal of ophthalmology, vol. 60, no. 5, p. 428, 2012.
|
| 1336 |
+
[4] D. S. W. Ting et al., “Development and validation of a deep learning
|
| 1337 |
+
system for diabetic retinopathy and related eye diseases using retinal
|
| 1338 |
+
images from multiethnic populations with diabetes,” JAMA, vol. 318,
|
| 1339 |
+
no. 22, pp. 2211–2223, 2017.
|
| 1340 |
+
[5] B. Tymchenko et al., “Deep learning approach to diabetic retinopathy
|
| 1341 |
+
detection,” in ICPRAM, 2020, pp. 501–509.
|
| 1342 |
+
|
| 1343 |
+
SADAK et al.: DETECTING SEVERITY OF DIABETIC RETINOPATHY FROM FUNDUS IMAGES USING ENSEMBLED TRANSFORMERS
|
| 1344 |
+
9
|
| 1345 |
+
[6] J. Krause et al., “Grader variability and the importance of reference stan-
|
| 1346 |
+
dards for evaluating machine learning models for diabetic retinopathy,”
|
| 1347 |
+
Ophthalmology, vol. 125, no. 8, pp. 1264–1272, 2018.
|
| 1348 |
+
[7] APTOS 2019 Blindness Detection. [Online]. Available: https://www.
|
| 1349 |
+
kaggle.com/competitions/aptos2019-blindness-detection
|
| 1350 |
+
[8] G. Quellec et al., “Optimal wavelet transform for the detection of
|
| 1351 |
+
microaneurysms in retina photographs,” IEEE transactions on medical
|
| 1352 |
+
imaging, vol. 27, no. 9, pp. 1230–1241, 2008.
|
| 1353 |
+
[9] L. Giancardo et al., “Microaneurysm detection with radon transform-
|
| 1354 |
+
based classification on retina images,” in EMBS, 2011, pp. 5939–5942.
|
| 1355 |
+
[10] R. Casanova et al., “Application of random forests methods to diabetic
|
| 1356 |
+
retinopathy classification analyses,” PLOS one, vol. 9, no. 6, p. e98587,
|
| 1357 |
+
2014.
|
| 1358 |
+
[11] M. Niemeijer et al., “Automated detection and differentiation of drusen,
|
| 1359 |
+
exudates, and cotton-wool spots in digital color fundus photographs for
|
| 1360 |
+
diabetic retinopathy diagnosis,” Investigative ophthalmology & visual
|
| 1361 |
+
science, vol. 48, no. 5, pp. 2260–2267, 2007.
|
| 1362 |
+
[12] M. U. Akram et al., “Identification and classification of microaneurysms
|
| 1363 |
+
for early detection of diabetic retinopathy,” Pattern recognition, vol. 46,
|
| 1364 |
+
no. 1, pp. 107–116, 2013.
|
| 1365 |
+
[13] D. Usher et al., “Automated detection of diabetic retinopathy in digital
|
| 1366 |
+
retinal images: a tool for diabetic retinopathy screening,” Diabetic
|
| 1367 |
+
Medicine, vol. 21, no. 1, pp. 84–90, 2004.
|
| 1368 |
+
[14] J. D. Bodapati et al., “Deep convolution feature aggregation: an appli-
|
| 1369 |
+
cation to diabetic retinopathy severity level prediction,” Signal, Image
|
| 1370 |
+
and Video Processing, vol. 15, no. 5, pp. 923–930, 2021.
|
| 1371 |
+
[15] A. Zhang, Z. C. Lipton, M. Li, and A. J. Smola, “Dive into deep
|
| 1372 |
+
learning,” arXiv:2106.11342, 2021.
|
| 1373 |
+
[16] S. Yu et al., “Exudate detection for diabetic retinopathy with convolu-
|
| 1374 |
+
tional neural networks,” in EMBC, 2017, pp. 1744–1747.
|
| 1375 |
+
[17] Z. Wang et al., “Zoom-in-net: Deep mining lesions for diabetic retinopa-
|
| 1376 |
+
thy detection,” in MICCAI, 2017, pp. 267–275.
|
| 1377 |
+
[18] M. M. Farag et al., “Automatic severity classification of diabetic
|
| 1378 |
+
retinopathy based on densenet and convolutional block attention mod-
|
| 1379 |
+
ule,” IEEE Access, vol. 10, pp. 38 299–38 308, 2022.
|
| 1380 |
+
[19] A. Dosovitskiy et al., “An image is worth 16x16 words: Transformers
|
| 1381 |
+
for image recognition at scale,” arXiv:2010.11929, 2020.
|
| 1382 |
+
[20] A. M. Bra¸soveanu and R. Andonie, “Visualizing transformers for nlp:
|
| 1383 |
+
a brief survey,” in Int. Conf. on Information Visualisation (IV).
|
| 1384 |
+
IEEE,
|
| 1385 |
+
2020, pp. 270–279.
|
| 1386 |
+
[21] H. Touvron et al., “Going deeper with image transformers,” in ICCV,
|
| 1387 |
+
2021, pp. 32–42.
|
| 1388 |
+
[22] ——, “Training data-efficient image transformers & distillation through
|
| 1389 |
+
attention,” in ICML, 2021, pp. 10 347–10 357.
|
| 1390 |
+
[23] H. Bao, L. Dong, and F. Wei, “BEiT: BERT Pre-Training of Image
|
| 1391 |
+
Transformers,” in ICLR, arXiv:2106.08254, 2022.
|
| 1392 |
+
[24] J. Devlin et al., “BERT: Pre-training of Deep Bidirectional Transformers
|
| 1393 |
+
for Language Understanding,” arXiv:1810.04805, 2018.
|
| 1394 |
+
[25] “Grading diabetic retinopathy from stereoscopic color fundus pho-
|
| 1395 |
+
tographs—an extension of the modified airlie house classification: Etdrs
|
| 1396 |
+
report number 10,” Ophthalmology, vol. 98, no. 5, Supplement, pp. 786–
|
| 1397 |
+
806, 1991.
|
| 1398 |
+
[26] U. R. Acharya et al., “Automated diabetic macular edema (dme) grading
|
| 1399 |
+
system using dwt, dct features and maculopathy index,” Computers in
|
| 1400 |
+
biology and medicine, vol. 84, pp. 59–68, 2017.
|
| 1401 |
+
[27] K. M. Adal et al., “An automated system for the detection and clas-
|
| 1402 |
+
sification of retinal changes due to red lesions in longitudinal fundus
|
| 1403 |
+
images,” IEEE transactions on biomedical engineering, vol. 65, no. 6,
|
| 1404 |
+
pp. 1382–1390, 2017.
|
| 1405 |
+
[28] L. Tang et al., “Splat feature classification with application to retinal
|
| 1406 |
+
hemorrhage detection in fundus images,” IEEE Transactions on Medical
|
| 1407 |
+
Imaging, vol. 32, no. 2, pp. 364–375, 2013.
|
| 1408 |
+
[29] A. Herliana et al., “Feature selection of diabetic retinopathy disease
|
| 1409 |
+
using particle swarm optimization and neural network,” in CITSM.
|
| 1410 |
+
IEEE, 2018, pp. 1–4.
|
| 1411 |
+
[30] S. Sanromà et al., “Assessment of diabetic retinopathy risk with random
|
| 1412 |
+
forests.” in ESANN, 2016.
|
| 1413 |
+
[31] A. Osareh et al., “A computational-intelligence-based approach for
|
| 1414 |
+
detection of exudates in diabetic retinopathy images,” IEEE Transactions
|
| 1415 |
+
on Information Technology in Biomedicine, vol. 13, no. 4, pp. 535–545,
|
| 1416 |
+
2009.
|
| 1417 |
+
[32] P. Chudzik et al., “Microaneurysm detection using deep learning and
|
| 1418 |
+
interleaved freezing,” in Medical imaging 2018: image processing, vol.
|
| 1419 |
+
10574.
|
| 1420 |
+
SPIE, 2018, pp. 379–387.
|
| 1421 |
+
[33] R. Gargeya and T. Leng, “Automated identification of diabetic retinopa-
|
| 1422 |
+
thy using deep learning,” Ophthalmology, vol. 124, no. 7, pp. 962–969,
|
| 1423 |
+
2017.
|
| 1424 |
+
[34] S. Wan et al., “Deep convolutional neural networks for diabetic retinopa-
|
| 1425 |
+
thy detection by image classification,” Computers & Electrical Engineer-
|
| 1426 |
+
ing, vol. 72, pp. 274–282, 2018.
|
| 1427 |
+
[35] S. H. Kassani et al., “Diabetic retinopathy classification using a modified
|
| 1428 |
+
xception architecture,” in ISSPIT, 2019, pp. 1–6.
|
| 1429 |
+
[36] M. D. Alahmadi, “Texture attention network for diabetic retinopathy
|
| 1430 |
+
classification,” IEEE Access, vol. 10, pp. 55 522–55 532, 2022.
|
| 1431 |
+
[37] M. Tan and Q. Le, “Efficientnet: Rethinking model scaling for convo-
|
| 1432 |
+
lutional neural networks,” in ICML, 2019, pp. 6105–6114.
|
| 1433 |
+
[38] J. Hu et al., “Squeeze-and-excitation networks,” in CVPR, 2018, pp.
|
| 1434 |
+
7132–7141.
|
| 1435 |
+
[39] S. Zhao et al., “Cot-xnet: Contextual transformer with xception network
|
| 1436 |
+
for diabetic retinopathy grading,” Physics in Medicine & Biology, 2022.
|
| 1437 |
+
[40] Y. Huang et al., “Ssit: Saliency-guided self-supervised image trans-
|
| 1438 |
+
former for diabetic retinopathy grading,” arXiv:2210.10969, 2022.
|
| 1439 |
+
[41] I. Goodfellow et al., Deep learning.
|
| 1440 |
+
MIT press, 2016.
|
| 1441 |
+
[42] V. Stimper et al., “Multidimensional contrast limited adaptive histogram
|
| 1442 |
+
equalization,” IEEE Access, vol. 7, pp. 165 437–165 447, 2019.
|
| 1443 |
+
[43] D. Sarvamangala et al., “Convolutional neural networks in medical
|
| 1444 |
+
image understanding: a survey,” Evolutionary intel., pp. 1–22, 2021.
|
| 1445 |
+
[44] T. Wolf et al., “Transformers: State-of-the-Art Natural Language Pro-
|
| 1446 |
+
cessing,” in EMNLP: System Demonstrations, 2020, pp. 38–45.
|
| 1447 |
+
[45] A. Vaswani et al., “Attention is all you need,” Advances in neural
|
| 1448 |
+
information processing systems, vol. 30, 2017.
|
| 1449 |
+
[46] J. L. Ba, J. R. Kiros, and G. E. Hinton, “Layer normalization,”
|
| 1450 |
+
arXiv:1607.06450, 2016.
|
| 1451 |
+
[47] D. Misra, “Mish: A self regularized non-monotonic neural activation
|
| 1452 |
+
function,” BMVC, Paper #928, 2020.
|
| 1453 |
+
[48] G. Hinton, O. Vinyals, and J. Dean, “Distilling the Knowledge in a
|
| 1454 |
+
Neural Network,” in NIPS Deep Learning and Representation Learning
|
| 1455 |
+
Workshop, arXiv:1503.02531, 2015.
|
| 1456 |
+
[49] A. Ramesh et al., “Zero-shot text-to-image generation,” in ICML, 2021,
|
| 1457 |
+
pp. 8821–8831.
|
| 1458 |
+
[50] L. Rokach, “Ensemble-based Classifiers,” Artificial intelligence review,
|
| 1459 |
+
vol. 33, no. 1, pp. 1–39, 2010.
|
| 1460 |
+
[51] I. Loshchilov and F. Hutter, “Decoupled weight decay regularization,”
|
| 1461 |
+
ICLR, arXiv:1711.05101, 2019.
|
| 1462 |
+
[52] R. Selvaraju et al., “Grad-CAM: Visual Explanations from Deep Net-
|
| 1463 |
+
works via Gradient-based Localization,” in ICCV, 2017, pp. 618–626.
|
| 1464 |
+
[53] M. Grandini, E. Bagli, and G. Visani, “Metrics for multi-class classifi-
|
| 1465 |
+
cation: an overview,” arXiv preprint arXiv:2008.05756, 2020.
|
| 1466 |
+
[54] K. He et al., “Deep residual learning for image recognition,” in CVPR,
|
| 1467 |
+
2016, pp. 770–778.
|
| 1468 |
+
[55] C. Szegedy et al., “Rethinking the inception architecture for computer
|
| 1469 |
+
vision,” in CVPR, 2016, pp. 2818–2826.
|
| 1470 |
+
[56] M. Sandler et al., “Mobilenetv2: Inverted residuals and linear bottle-
|
| 1471 |
+
necks,” in CVPR, 2018, pp. 4510–4520.
|
| 1472 |
+
[57] F. Chollet, “Xception: Deep learning with depthwise separable convo-
|
| 1473 |
+
lutions,” in CVPR, 2017, pp. 1251–1258.
|
| 1474 |
+
[58] E. Decencière et al., “Feedback on a publicly distributed image database:
|
| 1475 |
+
the Messidor database,” Image Analysis & Stereology, vol. 33, no. 3, pp.
|
| 1476 |
+
231–234, 2014.
|
| 1477 |
+
[59] J. Krause et al., “Grader variability and the importance of reference stan-
|
| 1478 |
+
dards for evaluating machine learning models for diabetic retinopathy,”
|
| 1479 |
+
Ophthalmology, vol. 125, no. 8, pp. 1264–1272, 2018.
|
| 1480 |
+
[60] P. Porwal et al., “Indian Diabetic Retinopathy Image Dataset (IDRiD),”
|
| 1481 |
+
2018. [Online]. Available: https://dx.doi.org/10.21227/H25W98
|
| 1482 |
+
|
0tAzT4oBgHgl3EQfDPqY/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
0tAzT4oBgHgl3EQfDPqY/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:cc427607bd91fe7c63af46d8869ec43535372a3a594fd7019d44feeaa3e8c4cc
|
| 3 |
+
size 149953
|
0tFPT4oBgHgl3EQfTjTq/content/tmp_files/2301.13054v1.pdf.txt
ADDED
|
@@ -0,0 +1,1564 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.13054v1 [cs.FL] 30 Jan 2023
|
| 2 |
+
Monadic Expressions and their Derivatives
|
| 3 |
+
Samira Attou1, Ludovic Mignot2, Clément Miklarz2, and Florent Nicart2
|
| 4 |
+
1 Université Gustave Eiffel,
|
| 5 |
+
5 Boulevard Descartes — Champs s/ Marne
|
| 6 |
+
77454 Marne-la-Vallée Cedex 2
|
| 7 |
+
2 GR2IF,
|
| 8 |
+
Université de Rouen Normandie,
|
| 9 |
+
Avenue de l’Université,
|
| 10 |
+
76801 Saint-Étienne-du-Rouvray, France
|
| 11 | |
| 12 |
+
{ludovic.mignot,clement.miklarz1, florent.nicart}@univ-rouen.fr
|
| 13 |
+
Abstract. We propose another interpretation of well-known derivatives computations from regular expres-
|
| 14 |
+
sions, due to Brzozowski, Antimirov or Lombardy and Sakarovitch, in order to abstract the underlying data
|
| 15 |
+
structures (e.g. sets or linear combinations) using the notion of monad. As an example of this generalization
|
| 16 |
+
advantage, we first introduce a new derivation technique based on the graded module monad and then show an
|
| 17 |
+
application of this technique to generalize the parsing of expression with capture groups and back references.
|
| 18 |
+
We also extend operators defining expressions to any n-ary functions over value sets, such as classical operations
|
| 19 |
+
(like negation or intersection for Boolean weights) or more exotic ones (like algebraic mean for rational weights).
|
| 20 |
+
Moreover, we present how to compute a (non-necessarily finite) automaton from such an extended expression,
|
| 21 |
+
using the Colcombet and Petrisan categorical definition of automata. These category theory concepts allow us
|
| 22 |
+
to perform this construction in a unified way, whatever the underlying monad.
|
| 23 |
+
Finally, to illustrate our work, we present a Haskell implementation of these notions using advanced techniques
|
| 24 |
+
of functional programming, and we provide a web interface to manipulate concrete examples.
|
| 25 |
+
1
|
| 26 |
+
Introduction
|
| 27 |
+
This paper is an extended version of [2].
|
| 28 |
+
Regular expressions are a classical way to represent associations between words and value sets. As an example,
|
| 29 |
+
classical regular expressions denote sets of words and regular expressions with multiplicities denote formal series.
|
| 30 |
+
From a regular expression, solving the membership test (determining whether a word belongs to the denoted
|
| 31 |
+
language) or the weighting test (determining the weight of a word in the denoted formal series) can be solved,
|
| 32 |
+
following Kleene theorems [11,17] by computing a finite automaton, such as the position automaton [9,3,5,6].
|
| 33 |
+
Another family of methods to solve these tests is the family of derivative computations, that does not require the
|
| 34 |
+
construction of a whole automaton. The common point of these techniques is to transform the test for an arbitrary
|
| 35 |
+
word into the test for the empty word, which can be easily solved in a purely syntactical way (i.e. by induction over
|
| 36 |
+
the structure of expressions). Brzozowski [4] shows how to compute, from a regular expression E and a word w, a
|
| 37 |
+
regular expression dw(E) denoting the set of words w′ such that ww′ belongs to the language denoted by E. Solving
|
| 38 |
+
the membership test hence becomes the membership test for the empty word in the expression dw(E). Antimirov [1]
|
| 39 |
+
modifies this method in order to produce sets of expressions instead of expressions, i.e. defines the partial derivatives
|
| 40 |
+
∂w(E) as a set of expressions the sum of which denotes the same language as dw(E). If the number of derivatives
|
| 41 |
+
is exponential w.r.t. the length |E| of E in the worst case3, the partial derivatives produce at most a linear number
|
| 42 |
+
of expressions w.r.t. |E|. Lombardy and Sakarovitch [13] extends these methods to expressions with multiplicities.
|
| 43 |
+
Finally, Sulzmann and Lu [18] apply these derivation techniques to parse POSIX expressions.
|
| 44 |
+
It is well-known that these methods are based on a common operation, the quotient of languages. Furthermore,
|
| 45 |
+
Antimirov’s method can be interpreted as the derivation of regular expression with multiplicities in the Boolean
|
| 46 |
+
semiring. However, the Brzozowski computation does not produce the same expressions (i.e. equality over the syntax
|
| 47 |
+
trees) as the Antimirov one.
|
| 48 |
+
Main contributions: In this paper, we present a unification of these computations by applying notions of
|
| 49 |
+
category theory to the category of sets, and show how to compute categorical automata as defined in [7], by reinter-
|
| 50 |
+
preting the work started in [15]. We make use of classical monads to model well-known derivatives computations.
|
| 51 |
+
Furthermore, we deal with extended expressions in a general way: in this paper, expressions can support extended
|
| 52 |
+
3 as far as rules of associativity, commutativity and idempotence of the sum are considered, possibly infinite otherwise.
|
| 53 |
+
|
| 54 |
+
operators like complement, intersection, but also any n-ary function (algebraic mean, extrema multiplications, etc.).
|
| 55 |
+
The main difference with [15] is that we formally state the languages and series that the expressions denote in an
|
| 56 |
+
inherent way w.r.t. the underlying monads.
|
| 57 |
+
More precisely, this paper presents:
|
| 58 |
+
– an extension of expressions to any n-ary function over the value set,
|
| 59 |
+
– a monadic generalization of expressions,
|
| 60 |
+
– a solution for the membership/weight test for these expressions,
|
| 61 |
+
– a computation of categorical derivative automata,
|
| 62 |
+
– a new monad that fits with the extension to n-ary functions,
|
| 63 |
+
– an illustration implemented in Haskell using advanced functional programming,
|
| 64 |
+
– an extension to capture groups and back references expressions.
|
| 65 |
+
Motivation: The unification of derivation techniques is a goal by itself. Moreover, the formal tools used to
|
| 66 |
+
achieve this unification are also useful: Monads offer both theoretical and practical advantages. Indeed, from a
|
| 67 |
+
theoretical point of view, these structures allow the abstraction of properties and focus on the principal mechanisms
|
| 68 |
+
that allow solving the membership and weight problems. Besides, the introduction of exotic monads can also facilitate
|
| 69 |
+
the study of finiteness of derivated terms. From a practical point of view, monads are easy to implement (even in
|
| 70 |
+
some other languages than Haskell) and allow us to produce compact and safe code. Finally, we can easily combine
|
| 71 |
+
different algebraic structures or add some technical functionalities (capture groups, logging, nondeterminism, etc.)
|
| 72 |
+
thanks to notions like monad transformers [10] that we consider in this paper.
|
| 73 |
+
This paper is structured as follows. In Section 2, we gather some preliminary material, like algebraic structures
|
| 74 |
+
or category theory notions. We also introduce some functions well-known to the Haskell community that can allow
|
| 75 |
+
us to reduce the size of our equations. We then structurally define the expressions we deal with, the associated series
|
| 76 |
+
and the weight test for the empty word in Section 3. In order to extend this test to any arbitrary word, we first state
|
| 77 |
+
in Section 4 some properties required by the monads we consider. Once this so-called support is determined, we show
|
| 78 |
+
in Section 5 how to compute the derivatives. The computation of derivative automata is explained in Section 6.
|
| 79 |
+
A new monad and its associated derivatives computation is given in Section 7. An implementation is presented
|
| 80 |
+
in Section 8. Finally, we show how to (alternatively to [18]) compute derivatives of capture group expressions in
|
| 81 |
+
Section 9 and show that as far as the same operators are concerned, the derivative formulae are the same whatever
|
| 82 |
+
the underlying monad is.
|
| 83 |
+
2
|
| 84 |
+
Preliminaries
|
| 85 |
+
We denote by S → S′ the set of functions from a set S to a set S′. The notation λx → f(x) is an equivalent notation
|
| 86 |
+
for a function f.
|
| 87 |
+
A monoid is a set S endowed with an associative operation and a unit element. A semiring is a structure
|
| 88 |
+
(S, ×, +, 1, 0) such that (S, ×, 1) is a monoid, (S, +, 0) is a commutative monoid, × distributes over + and 0 is an
|
| 89 |
+
annihilator for ×. A starred semiring is a semiring with a unary function ⋆ such that
|
| 90 |
+
k⋆ = 1 + k × k⋆ = 1 + k⋆ × k.
|
| 91 |
+
A K-series over the free monoid (Σ∗, ·, ε) associated with an alphabet Σ, for a semiring K = (K, ×, +, 1, 0), is
|
| 92 |
+
a function from Σ∗ to K. The set of K-series can be endowed with the structure of semiring as follows:
|
| 93 |
+
1(w) =
|
| 94 |
+
�
|
| 95 |
+
1
|
| 96 |
+
if w = ε,
|
| 97 |
+
0
|
| 98 |
+
otherwise,
|
| 99 |
+
0(w) = 0,
|
| 100 |
+
(S1 + S2)(w) = S1(w) + S2(w),
|
| 101 |
+
(S1 × S2)(w) =
|
| 102 |
+
�
|
| 103 |
+
u·v=w
|
| 104 |
+
S1(u) × S2(v).
|
| 105 |
+
Furthermore, if S1(ε) = 0 (i.e. S1 is said to be proper), the star of S1 is the series defined by
|
| 106 |
+
(S1)⋆(ε) = 1,
|
| 107 |
+
(S1)⋆(w) =
|
| 108 |
+
�
|
| 109 |
+
n≤|w|,w=u1···un,uj̸=ε
|
| 110 |
+
S1(u1) × · · · × S1(un).
|
| 111 |
+
Finally, for any function f in Kn → K, we set:
|
| 112 |
+
(f(S1, . . . , Sn))(w) = f(S1(w), . . . , Sn(w)).
|
| 113 |
+
(1)
|
| 114 |
+
A functor 4 F associates with each set S a set F(S) and with each function f in S → S′ a function F(f) from
|
| 115 |
+
F(S) to F(S′) such that
|
| 116 |
+
F(id) = id,
|
| 117 |
+
F(f ◦ g) = F(f) ◦ F(g),
|
| 118 |
+
4 More precisely, a functor over a subcategory of the category of sets.
|
| 119 |
+
|
| 120 |
+
where id is the identity function and ◦ the classical function composition.
|
| 121 |
+
A monad5 M is a functor endowed with two (families of) functions
|
| 122 |
+
– pure, from a set S to M(S),
|
| 123 |
+
– bind, sending any function f in S → M(S′) to M(S) → M(S′),
|
| 124 |
+
such that the three following conditions are satisfied:
|
| 125 |
+
bind(f)(pure(s)) = f(s),
|
| 126 |
+
bind(pure) = id,
|
| 127 |
+
bind(g)(bind(f)(m)) = bind(λx → bind(g)(f(x)))(m).
|
| 128 |
+
Example 1. The Maybe monad associates:
|
| 129 |
+
– any set S with the set Maybe(S) = {Just(s) | s ∈ S} ∪ {Nothing}, where Just and Nothing are two syntactic
|
| 130 |
+
tokens allowing us to extend a set with one value;
|
| 131 |
+
– any function f with the function Maybe(f) defined by
|
| 132 |
+
Maybe(f)(Just(s)) = Just(f(s)),
|
| 133 |
+
Maybe(f)(Nothing) = Nothing
|
| 134 |
+
– is endowed with the functions pure and bind defined by:
|
| 135 |
+
pure(s) = Just(s),
|
| 136 |
+
bind(f)(Just(s)) = f(s),
|
| 137 |
+
bind(f)(Nothing) = Nothing.
|
| 138 |
+
Example 2. The Set monad associates:
|
| 139 |
+
– with any set S the set 2S,
|
| 140 |
+
– with any function f the function Set(f) defined by Set(f)(R) = �
|
| 141 |
+
r∈R{f(r)},
|
| 142 |
+
– is endowed with the functions pure and bind defined by:
|
| 143 |
+
pure(s) = {s},
|
| 144 |
+
bind(f)(R) =
|
| 145 |
+
�
|
| 146 |
+
r∈R
|
| 147 |
+
f(r).
|
| 148 |
+
Example 3. The LinComb(K) monad, for K = (K, ×, +, 1, 0), associates:
|
| 149 |
+
– with any set S the set of K-linear combinations of elements of S, where a linear combination is a finite (formal,
|
| 150 |
+
commutative) sum of couples (denoted by ⊞) in K × S where (k, s) ⊞ (k′, s) = (k + k′, s),
|
| 151 |
+
– with any function f the function LinComb(K)(f) defined by
|
| 152 |
+
LinComb(K)(f)(R) = ⊞
|
| 153 |
+
(k,r)∈R
|
| 154 |
+
(k, f(r)),
|
| 155 |
+
– is endowed with the functions pure and bind defined by:
|
| 156 |
+
pure(s) = (1, s),
|
| 157 |
+
bind(f)(R) = ⊞
|
| 158 |
+
(k,r)∈R
|
| 159 |
+
k ⊗ f(r),
|
| 160 |
+
where k ⊗ R = ⊞
|
| 161 |
+
(k′,r)∈R
|
| 162 |
+
(k × k′, r).
|
| 163 |
+
To compact equations, we use the following operators for any monad M:
|
| 164 |
+
f <$> s = M(f)(s),
|
| 165 |
+
m >>= f = bind(f)(m).
|
| 166 |
+
If <$> can be used to lift unary functions to the monadic level, >>= and pure can be used to lift any n-ary function
|
| 167 |
+
f in S1 × · · · × Sn → S, defining a function liftn sending S1 × · · · × Sn → S to M(S1) × · · · × M(Sn) → M(S) as
|
| 168 |
+
follows:
|
| 169 |
+
liftn(f)(m1, . . . , mn) =m1 >>= (λs1 → . . .
|
| 170 |
+
mn >>= (λsn → pure(f(s1, . . . , sn))) . . .)
|
| 171 |
+
Let us consider the set
|
| 172 |
+
1 = {⊤} with only one element. The images of this set by some previously defined monads
|
| 173 |
+
can be evaluated as value sets classically used to weight words in association with classical regular expressions. As
|
| 174 |
+
an example, Maybe(1) and Set(1) are isomorphic to the Boolean set, and any set LinComb(K)(1) can be converted
|
| 175 |
+
into the underlying set of K. This property allows us to extend in a coherent way classical expressions to monadic
|
| 176 |
+
expressions, where the type of the weights is therefore given by the ambient monad.
|
| 177 |
+
5 More precisely, a monad over a subcategory of the category of sets.
|
| 178 |
+
|
| 179 |
+
3
|
| 180 |
+
Monadic Expressions
|
| 181 |
+
As seen in the previous section, elements in M(1) can be evaluated as classical value sets for some particular
|
| 182 |
+
monads. Hence, we use these elements not only for the weights associated with words by expressions, but also for
|
| 183 |
+
the elements that act over the denoted series.
|
| 184 |
+
In the following, in addition to classical operators (+, · and ∗), we denote:
|
| 185 |
+
– the action of an element over a series by ⊙,
|
| 186 |
+
– the application of a function by itself.
|
| 187 |
+
Definition 1. Let M be a monad. An M-monadic expression E over an alphabet Σ is inductively defined as follows:
|
| 188 |
+
E = a,
|
| 189 |
+
E = ε,
|
| 190 |
+
E = ∅,
|
| 191 |
+
E = E1 + E2,
|
| 192 |
+
E = E1 · E2,
|
| 193 |
+
E = E∗
|
| 194 |
+
1,
|
| 195 |
+
E = α ⊙ E1,
|
| 196 |
+
E = E1 ⊙ α,
|
| 197 |
+
E = f (E1, . . . , En) ,
|
| 198 |
+
where a is a symbol in Σ, (E1, . . . , En) are n M-monadic expressions over Σ, α is an element of M(1) and f is a
|
| 199 |
+
function from (M(1))n to M(1).
|
| 200 |
+
We denote by Exp(Σ) the set of monadic expressions over an alphabet Σ.
|
| 201 |
+
Example 4. As an example of functions that can be used in our extension of classical operators, one can define the
|
| 202 |
+
function ExtDist(x1, x2, x3) = max(x1, x2, x3) − min(x1, x2, x3) from N3 to N.
|
| 203 |
+
Similarly to classical regular expressions, monadic expressions associate a weight with any word. Such a relation
|
| 204 |
+
can be denoted via a formal series. However, before defining this notion, in order to simplify our study, we choose
|
| 205 |
+
to only consider proper expressions. Let us first show how to characterize them by the computation of a nullability
|
| 206 |
+
value.
|
| 207 |
+
Definition 2. Let M be a monad such that the structure (M(1), +, ×, ⋆, 1, 0) is a starred semiring. The nullability
|
| 208 |
+
value of an M-monadic expression E over an alphabet Σ is the element Null(E) of M(1) inductively defined as
|
| 209 |
+
follows:
|
| 210 |
+
Null(ε) = 1,
|
| 211 |
+
Null(∅) = 0,
|
| 212 |
+
Null(a) = 0,
|
| 213 |
+
Null(E1 + E2) = Null(E1) + Null(E2),
|
| 214 |
+
Null(E1 · E2) = Null(E1) × Null(E2),
|
| 215 |
+
Null(E∗
|
| 216 |
+
1) = Null(E1)⋆,
|
| 217 |
+
Null(α ⊙ E1) = α × Null(E1),
|
| 218 |
+
Null(E1 ⊙ α) = Null(E1) × α,
|
| 219 |
+
Null(f(E1, . . . , En)) = f(Null(E1), . . . , Null(En)),
|
| 220 |
+
where a is a symbol in Σ, (E1, . . . , En) are n M-monadic expressions over Σ, α is an element of M(1) and f is a
|
| 221 |
+
function from (M(1))n to M(1).
|
| 222 |
+
When the considered semiring is not a starred one, we restrict the nullability value computation to expressions
|
| 223 |
+
where a starred subexpression admits a null nullability value. In order to compute it, let us consider the Maybe
|
| 224 |
+
monad, allowing us to elegantly deal with such a partial function.
|
| 225 |
+
Definition 3. Let M be a monad such that the structure (M(1), +, ×, 1, 0) is a semiring. The partial nullability
|
| 226 |
+
value of an M-monadic expression E over an alphabet Σ is the element PartNull(E) of Maybe(M(1)) defined as
|
| 227 |
+
follows:
|
| 228 |
+
PartNull(ε) = Just(1),
|
| 229 |
+
PartNull(∅) = Just(0),
|
| 230 |
+
PartNull(a) = Just(0),
|
| 231 |
+
PartNull(E1 + E2) = lift2(+)(PartNull(E1), PartNull(E2)),
|
| 232 |
+
PartNull(E1 · E2) = lift2(×)(PartNull(E1), PartNull(E2)),
|
| 233 |
+
PartNull(E∗
|
| 234 |
+
1) =
|
| 235 |
+
�
|
| 236 |
+
Just(1)
|
| 237 |
+
if PartNull(E1) = Just(0),
|
| 238 |
+
Nothing
|
| 239 |
+
otherwise,
|
| 240 |
+
PartNull(α ⊙ E1) = (λE → α × E) <$> PartNull(E1),
|
| 241 |
+
PartNull(E1 ⊙ α) = (λE → E × α) <$> PartNull(E1),
|
| 242 |
+
PartNull(f(E1, . . . , En)) = liftn(f)(PartNull(E1), . . . , PartNull(En)),
|
| 243 |
+
where a is a symbol in Σ, (E1, . . . , En) are n M-monadic expressions over Σ, α is an element of M(1) and f is a
|
| 244 |
+
function from (M(1))n to M(1).
|
| 245 |
+
|
| 246 |
+
An expression E is proper if its partial nullability value is not Nothing, therefore if it is a value Just(v); in this
|
| 247 |
+
case, v is its nullability value, denoted by Null(E) (by abuse).
|
| 248 |
+
Definition 4. Let M be a monad such that the structure (M(1), +, ×, 1, 0) is a semiring, and E be a M-monadic
|
| 249 |
+
proper expression over an alphabet Σ. The series S(E) associated with E is inductively defined as follows:
|
| 250 |
+
S(ε)(w) =
|
| 251 |
+
�
|
| 252 |
+
1
|
| 253 |
+
if w = ε,
|
| 254 |
+
0
|
| 255 |
+
otherwise,
|
| 256 |
+
S(∅)(w) = 0,
|
| 257 |
+
S(a)(w) =
|
| 258 |
+
�
|
| 259 |
+
1
|
| 260 |
+
if w = a,
|
| 261 |
+
0
|
| 262 |
+
otherwise,
|
| 263 |
+
S(E1 + E2) = S(E1) + S(E2),
|
| 264 |
+
S(E1 · E2) = S(E1) × S(E2),
|
| 265 |
+
S(E∗
|
| 266 |
+
1) = (S(E1))⋆,
|
| 267 |
+
S(α ⊙ E1)(w) = α × S(E1)(w),
|
| 268 |
+
S(E1 ⊙ α)(w) = S(E1)(w) × α,
|
| 269 |
+
S(f(E1, . . . , En)) = f(S(E1), . . . , S(En)),
|
| 270 |
+
where a is a symbol in Σ, (E1, . . . , En) are n M-monadic expressions over Σ, α is an element of M(1) and f is a
|
| 271 |
+
function from (M(1))n to M(1).
|
| 272 |
+
From now on, we consider the set Exp(Σ) of M-monadic expressions over Σ to be endowed with the structure of
|
| 273 |
+
a semiring, and two expressions denoting the same series to be equal. The weight associated with a word w in Σ∗
|
| 274 |
+
by E is the value weightw(E) = S(E)(w). The nullability of a proper expression is the weight it associates with ε,
|
| 275 |
+
following Definition 3 and Definition 4.
|
| 276 |
+
Proposition 1. Let M be a monad such that the structure (M(1), +, ×, 1, 0) is a semiring. Let E be an M-monadic
|
| 277 |
+
proper expression over Σ. Then:
|
| 278 |
+
Null(E) = weightε(E).
|
| 279 |
+
The previous proposition implies that the weight of the empty word can be syntactically computed (i.e. inductively
|
| 280 |
+
computed from a monadic expression). Now, let us show how to extend this computation by defining the computation
|
| 281 |
+
of derivatives for monadic expressions.
|
| 282 |
+
4
|
| 283 |
+
Monadic Supports for Expressions
|
| 284 |
+
A K-left-semimodule, for a semiring K = (K, ×, +, 1, 0), is a commutative monoid (S, ±, 0) endowed with a function
|
| 285 |
+
⊲ from K × S to S such that:
|
| 286 |
+
(k × k′) ⊲ s = k ⊲ (k′ ⊲ s),
|
| 287 |
+
(k + k′) ⊲ s = k ⊲ s ± k′ ⊲ s,
|
| 288 |
+
k ⊲ (s ± s′) = k ⊲ s ± k ⊲ s′,
|
| 289 |
+
1 ⊲ s = s,
|
| 290 |
+
0 ⊲ s = k ⊲ 0 = 0.
|
| 291 |
+
A K-right-semimodule can be defined symmetrically.
|
| 292 |
+
An operad [12,14] is a structure (O, (◦j)j∈N, id) where O is a graded set (i.e. O = �
|
| 293 |
+
n∈N On), id is an element of
|
| 294 |
+
O1, ◦j is a function defined for any three integers (i, j, k)6 with 0 < j ≤ k in Ok × Oi → Ok+i−1 such that for any
|
| 295 |
+
elements p1 ∈ Om, p2 ∈ On, p3 ∈ Op:
|
| 296 |
+
∀0 < j ≤ m, id ◦1 p1 = p1 ◦j id = p1,
|
| 297 |
+
∀0 < j ≤ m, 0 < j′ ≤ n, p1 ◦j (p2 ◦j′ p3) = (p1 ◦j p2) ◦j+j′−1 p3,
|
| 298 |
+
∀0 < j′ ≤ j ≤ m, (p1 ◦j p2) ◦j′ p3 = (p1 ◦j′ p3) ◦j+p−1 p2.
|
| 299 |
+
Combining these compositions ◦j, one can define a composition ◦ sending Ok × Oi1 × · · · × Oik to Oi1+···+ik: for
|
| 300 |
+
any element (p, q1, . . . , qk) in Ok × Ok,
|
| 301 |
+
p ◦ (q1, . . . , qk) = (· · · ((p ◦k qk) ◦k−1 qk−1 · · · ) · · · ) ◦1 q1.
|
| 302 |
+
Conversely, the composition ◦ can define the compositions ◦j using the identity element: for any two elements (p, q)
|
| 303 |
+
in Ok × Oi, for any integer 0 < j ≤ k:
|
| 304 |
+
p ◦j q = p ◦ (id, . . . , id
|
| 305 |
+
�
|
| 306 |
+
��
|
| 307 |
+
�
|
| 308 |
+
j−1 times
|
| 309 |
+
, q, id, . . . , id
|
| 310 |
+
�
|
| 311 |
+
��
|
| 312 |
+
�
|
| 313 |
+
k−j times
|
| 314 |
+
).
|
| 315 |
+
As an example, the set of n-ary functions over a set, with the identity function as unit, forms an operad.
|
| 316 |
+
A module over an operad (O, ◦, id) is a set S endowed with a function ⋇ from On × Sn to S such that
|
| 317 |
+
f ⋇ (f1 ⋇ (s1,1, . . . , s1,i1), . . . , fn ⋇ (sn,1, . . . , sn,in))
|
| 318 |
+
= (f ◦ (f1, . . . , fn)) ⋇ (s1,1, . . . , s1,i1, . . . , sn,1, . . . , sn,in).
|
| 319 |
+
6 every couple (i, k) unambiguously defines the domain and codomain of a function ◦j
|
| 320 |
+
|
| 321 |
+
The extension of the computation of derivatives could be performed for any monad. Indeed, any monad could
|
| 322 |
+
be used to define well-typed auxiliary functions that mimic the classical computations. However, some properties
|
| 323 |
+
should be satisfied in order to compute weights equivalently to Definition 4. Therefore, in the following we consider
|
| 324 |
+
a restricted kind of monads.
|
| 325 |
+
A monadic support is a structure (M, +, ×, 1, 0, ±, 0, ⋉, ⊲, ⊳, ⋇) satisfying:
|
| 326 |
+
– M is a monad,
|
| 327 |
+
– R = (M(1), +, ×, 1, 0) is a semiring,
|
| 328 |
+
– M = (M(Exp(Σ)), ±, 0) is a monoid,
|
| 329 |
+
– (M, ⋉) is a Exp(Σ)-right-semimodule,
|
| 330 |
+
– (M, ⊲) is a R-left-semimodule,
|
| 331 |
+
– (M, ⊳) is a R-right-semimodule,
|
| 332 |
+
– (M(Exp(Σ)), ⋇) is a module for the operad of the functions over M(1).
|
| 333 |
+
An expressive support is a monadic support (M, +, ×, 1, 0, ±, 0, ⋉, ⊲, ⊳, ⋇) endowed with a function toExp from
|
| 334 |
+
M(Exp(Σ)) to Exp(Σ) satisfying the following conditions:
|
| 335 |
+
weightw(toExp(m)) = m >>= weightw
|
| 336 |
+
(2)
|
| 337 |
+
toExp(m ⋉ F) = toExp(m) · F,
|
| 338 |
+
(3)
|
| 339 |
+
toExp(m ± m′) = toExp(m) + toExp(m′),
|
| 340 |
+
(4)
|
| 341 |
+
toExp(m ⊲ x) = toExp(m) ⊙ x,
|
| 342 |
+
(5)
|
| 343 |
+
toExp(x ⊳ m) = x ⊙ toExp(m),
|
| 344 |
+
(6)
|
| 345 |
+
toExp(f ⋇ (m1, . . . , mn)) = f(toExp(m1), . . . , toExp(mn)).
|
| 346 |
+
(7)
|
| 347 |
+
Let us now illustrate this notion with three expressive supports that will allow us to model well-known derivatives
|
| 348 |
+
computations.
|
| 349 |
+
Example 5 (The Maybe support).
|
| 350 |
+
toExp(Nothing) = 0,
|
| 351 |
+
toExp(Just(E)) = E,
|
| 352 |
+
Nothing + m = m,
|
| 353 |
+
m + Nothing = m,
|
| 354 |
+
Just(⊤) + Just(⊤) = Just(⊤),
|
| 355 |
+
Nothing × m = Nothing,
|
| 356 |
+
m × Nothing = Nothing,
|
| 357 |
+
Just(⊤) × Just(⊤) = Just(⊤),
|
| 358 |
+
Nothing ± m = m,
|
| 359 |
+
m ± Nothing = m,
|
| 360 |
+
Just(E) ± Just(E′) = Just(E + E′),
|
| 361 |
+
1 = Just(⊤),
|
| 362 |
+
0 = Nothing,
|
| 363 |
+
0 = Nothing,
|
| 364 |
+
m ⋉ F = (λE → E · F) <$> m,
|
| 365 |
+
m ⊲ m′ = m >>= (λx → m′),
|
| 366 |
+
m ⊳ m′ = m′ >>= (λx → m),
|
| 367 |
+
f ⋇ (m1, . . . , mn) = pure(f(toExp(m1), . . . , toExp(mn))).
|
| 368 |
+
Example 6 (The Set support).
|
| 369 |
+
toExp({E1, . . . , En}) = E1 + · · · + En,
|
| 370 |
+
+ = ∪,
|
| 371 |
+
× = ∩,
|
| 372 |
+
± = ∪,
|
| 373 |
+
1 = {⊤},
|
| 374 |
+
0 = ∅,
|
| 375 |
+
0 = ∅,
|
| 376 |
+
m ⋉ F = (λE → E · F) <$> m,
|
| 377 |
+
m ⊲ m′ = m >>= (λx → m′),
|
| 378 |
+
m ⊳ m′ = m′ >>= (λx → m),
|
| 379 |
+
f ⋇ (m1, . . . , mn) = pure(f(toExp(m1), . . . , toExp(mn))).
|
| 380 |
+
Example 7 (The LinComb(K) support).
|
| 381 |
+
toExp((k1, E1) ⊞ · · · ⊞ (kn, En)) = k1 ⊙ E1 + · · · + kn ⊙ En,
|
| 382 |
+
+ = ⊞,
|
| 383 |
+
(k, ⊤) × (k′, ⊤) = (k × k′, ⊤),
|
| 384 |
+
1 = (1, ⊤),
|
| 385 |
+
0 = (0, ⊤),
|
| 386 |
+
± = ⊞,
|
| 387 |
+
0 = (0, ⊤),
|
| 388 |
+
m ⋉ F = (λE → E · F) <$> m,
|
| 389 |
+
m ⊲ m′ = m >>= (λx → m′),
|
| 390 |
+
m ⊳ k = (λE → E ⊙ k) <$> m,
|
| 391 |
+
f ⋇ (m1, . . . , mn) = pure(f(toExp(m1), . . . , toExp(mn))).
|
| 392 |
+
|
| 393 |
+
5
|
| 394 |
+
Monadic Derivatives
|
| 395 |
+
In the following, (M, +, ×, 1, 0, ±, 0, ⋉, ⊲, ⊳, ⋇, toExp) is an expressive support.
|
| 396 |
+
Definition 5. The derivative of an M-monadic expression E over Σ w.r.t. a symbol a in Σ is the element da(E)
|
| 397 |
+
in M(Exp(Σ)) inductively defined as follows:
|
| 398 |
+
da(ε) = 0,
|
| 399 |
+
da(∅) = 0,
|
| 400 |
+
da(b) =
|
| 401 |
+
�
|
| 402 |
+
pure(ε)
|
| 403 |
+
if a = b,
|
| 404 |
+
0
|
| 405 |
+
otherwise,
|
| 406 |
+
da(E1 + E2) = da(E1) ± da(E2),
|
| 407 |
+
da(E∗
|
| 408 |
+
1) = da(E1) ⋉ E∗
|
| 409 |
+
1,
|
| 410 |
+
da(E1 · E2) = da(E1) ⋉ E2 ± Null(E1) ⊲ da(E2),
|
| 411 |
+
da(α ⊙ E1) = α ⊲ da(E1),
|
| 412 |
+
da(E1 ⊙ α) = da(E1) ⊳ α,
|
| 413 |
+
da(f(E1, . . . , En)) = f ⋇ (da(E1), . . . , da(En))
|
| 414 |
+
where b is a symbol in Σ, (E1, . . . , En) are n M-monadic expressions over Σ, α is an element of M(1) and f is a
|
| 415 |
+
function from (M(1))n to M(1).
|
| 416 |
+
The link between derivatives and series can be stated as follows, which is an alternative description of the classical
|
| 417 |
+
quotient.
|
| 418 |
+
Proposition 2. Let E be an M-monadic expression over an alphabet Σ, a be a symbol in Σ and w be a word in
|
| 419 |
+
Σ∗. Then:
|
| 420 |
+
weightaw(E) = da(E) >>= weightw.
|
| 421 |
+
Proof. Let us proceed by induction over the structure of E. All the classical cases (i.e. the function operator left
|
| 422 |
+
aside) can be proved following the classical methods ([1,4,13]). Therefore, let us consider this last case.
|
| 423 |
+
da(f(E1, . . . , En)) >>= weightw
|
| 424 |
+
= weightw(toExp(da(f(E1, . . . , En))))
|
| 425 |
+
(Eq (2))
|
| 426 |
+
= weightw(toExp(f ⋇ (da(E1), . . . , da(En)))
|
| 427 |
+
(Def 5))
|
| 428 |
+
= weightw(f(toExp(da(E1)), . . . , toExp(da(En))))
|
| 429 |
+
(Eq (7))
|
| 430 |
+
= f(weightw(toExp(da(E1))), . . . , weightw(toExp(da(En))))
|
| 431 |
+
(Def 4, Eq (1))
|
| 432 |
+
= f(da(E1) >>= weightw, . . . , da(En) >>= weightw)
|
| 433 |
+
(Eq (2))
|
| 434 |
+
= f(weightaw(E1), . . . , weightaw(En))
|
| 435 |
+
(Ind. hyp.)
|
| 436 |
+
= weightaw(f(E1, . . . , En))
|
| 437 |
+
(Def 4, Eq (1))
|
| 438 |
+
Let us define how to extend the derivative computation from symbols to words, using the monadic functions.
|
| 439 |
+
Definition 6. The derivative of an M-monadic expression E over Σ w.r.t. a word w in Σ∗ is the element dw(E)
|
| 440 |
+
in M(Exp(Σ)) inductively defined as follows:
|
| 441 |
+
dε(E) = pure(E),
|
| 442 |
+
da·v(E) = da(E) >>= dv,
|
| 443 |
+
where a is a symbol in Σ and v a word in Σ∗.
|
| 444 |
+
Finally, it can be easily shown, by induction over the length of the words, following Proposition 2, that the
|
| 445 |
+
derivatives computation can be used to define a syntactical computation of the weight of a word associated with an
|
| 446 |
+
expression.
|
| 447 |
+
Theorem 1. Let E be an M-monadic expression over an alphabet Σ and w be a word in Σ∗. Then:
|
| 448 |
+
weightw(E) = dw(E) >>= Null.
|
| 449 |
+
Notice that, restraining monadic expressions to regular ones,
|
| 450 |
+
– the Maybe support leads to the classical derivatives [4],
|
| 451 |
+
– the Set support leads to the partial derivatives [1],
|
| 452 |
+
– the LinComb support leads to the derivatives with multiplicities [13].
|
| 453 |
+
Example 8. Let us consider the function ExtDist defined in Example 4 and the LinComb(N)-monadic expression
|
| 454 |
+
E = ExtDist(a∗b∗ + b∗a∗, b∗a∗b∗, a∗b∗a∗).
|
| 455 |
+
da(E) = ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + a∗)
|
| 456 |
+
daa(E) = ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + 2 ⊙ a∗)
|
| 457 |
+
|
| 458 |
+
daaa(E) = ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + 3 ⊙ a∗)
|
| 459 |
+
daab(E) = ExtDist(b∗, b∗, b∗a∗)
|
| 460 |
+
weightaaa(E) = daaa(E) >>= Null
|
| 461 |
+
= ExtDist(1 + 1, 1, 1 + 3) = 4 − 1 = 3
|
| 462 |
+
weightaab(E) = daab(E) >>= Null = ExtDist(1, 1, 1) = 0
|
| 463 |
+
In the next section, we show how to compute the derivative automaton associated with an expression.
|
| 464 |
+
6
|
| 465 |
+
Automata Construction
|
| 466 |
+
A category C is defined by:
|
| 467 |
+
– a class ObjC of objects,
|
| 468 |
+
– for any two objects A and B, a set HomC(A, B) of morphisms,
|
| 469 |
+
– for any three objects A, B and C, an associative composition function ◦C in HomC(B, C) −→ HomC(A, B) −→
|
| 470 |
+
HomC(A, C),
|
| 471 |
+
– for any object A, an identity morphism idA in HomC(A, A), such that for any morphisms f in HomC(A, B) and
|
| 472 |
+
g in HomC(B, A), f ◦C idA = f and idA ◦C g = g.
|
| 473 |
+
Given a category C, a C-automaton is a tuple (Σ, I, Q, F, i, δ, f) where
|
| 474 |
+
– Σ is a set of symbols (the alphabet),
|
| 475 |
+
– I is the initial object, in Obj(C),
|
| 476 |
+
– Q is the state object, in Obj(C),
|
| 477 |
+
– F is the final object, in Obj(C),
|
| 478 |
+
– i is the initial morphism, in HomC(I, Q),
|
| 479 |
+
– δ is the transition function, in Σ −→ HomC(Q, Q),
|
| 480 |
+
– f is the value morphism, in HomC(Q, F).
|
| 481 |
+
The function δ can be extended as a monoid morphism from the free monoid (Σ∗, ·, ε) to the morphism monoid
|
| 482 |
+
(HomC(Q, Q), ◦C, idQ), leading to the following weight definition.
|
| 483 |
+
The weight associated by a C-automaton A = (Σ, I, Q, F, i, δ, f) with a word w in Σ∗ is the morphism weight(w)
|
| 484 |
+
in HomC(I, F) defined by
|
| 485 |
+
weight(w) = f ◦C δ(w) ◦C i.
|
| 486 |
+
If the ambient category is the category of sets, and if I =
|
| 487 |
+
1, the weight of a word is equivalently an element of
|
| 488 |
+
F. Consequently, a deterministic (complete) automaton is equivalently a Set-automaton with
|
| 489 |
+
1 as the initial object
|
| 490 |
+
and B as the final object.
|
| 491 |
+
Given a monad M, the Kleisli composition of two morphisms f ∈ HomC(A, B) and g ∈ HomC(B, C) is the
|
| 492 |
+
morphism (f >=> g)(x) = f(x) >>= g in HomC(A, C). This composition defines a category, called the Kleisli
|
| 493 |
+
category K(M) of M, where:
|
| 494 |
+
– the objects are the sets,
|
| 495 |
+
– the morphisms between two sets A and B are the functions between A and M(B),
|
| 496 |
+
– the identity is the function pure.
|
| 497 |
+
Considering these categories:
|
| 498 |
+
– a deterministic automaton is equivalently a K(Maybe)-automaton,
|
| 499 |
+
– a nondeterministic automaton is equivalently a K(Set)-automaton,
|
| 500 |
+
– a weighted automaton over a semiring K is equivalently a K(LinComb(K))-automaton,
|
| 501 |
+
all with
|
| 502 |
+
1 as both the initial object and the final object.
|
| 503 |
+
Furthermore, for a given expression E, if i = pure(E), δ(a)(E′) = da(E′) and f = Null, we can compute
|
| 504 |
+
the well-known derivative automata using the three previously defined supports, and the accessible part of these
|
| 505 |
+
automata are finite ones as far as classical expressions are concerned [4,1,13].
|
| 506 |
+
More precisely, extended expressions can lead to infinite automata, as shown in the next example.
|
| 507 |
+
|
| 508 |
+
Example 9. Considering the computations of Example 8, it can be shown that
|
| 509 |
+
dan(E) = ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + n ⊙ a∗).
|
| 510 |
+
Hence, there is not a finite number of derivated terms, that are the states in the classical derivative automaton.
|
| 511 |
+
This infinite automaton is represented in Figure 1, where the final weights of the states are represented by double
|
| 512 |
+
edges. The sink states are omitted.
|
| 513 |
+
ExtDist(a∗b∗ + b∗a∗, b∗a∗b∗, a∗b∗a∗)
|
| 514 |
+
ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + a∗)
|
| 515 |
+
ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + 2 ⊙ a∗)
|
| 516 |
+
ExtDist(b∗, b∗, b∗a∗)
|
| 517 |
+
ExtDist(0, 0, a∗)
|
| 518 |
+
ExtDist(b∗ + b∗a∗, b∗a∗b∗ + b∗, b∗a∗)
|
| 519 |
+
ExtDist(b∗ + b∗a∗, b∗a∗b∗ + 2 ⊙ b∗, b∗a∗)
|
| 520 |
+
ExtDist(a∗, a∗b∗, a∗)
|
| 521 |
+
ExtDist(0, b∗, 0)
|
| 522 |
+
ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + n ⊙ a∗)
|
| 523 |
+
ExtDist(b∗ + b∗a∗, b∗a∗b∗ + n ⊙ b∗, b∗a∗)
|
| 524 |
+
1
|
| 525 |
+
1
|
| 526 |
+
2
|
| 527 |
+
n
|
| 528 |
+
1
|
| 529 |
+
1
|
| 530 |
+
2
|
| 531 |
+
1
|
| 532 |
+
n
|
| 533 |
+
a
|
| 534 |
+
b
|
| 535 |
+
b
|
| 536 |
+
a
|
| 537 |
+
b
|
| 538 |
+
a
|
| 539 |
+
b
|
| 540 |
+
a
|
| 541 |
+
b
|
| 542 |
+
a
|
| 543 |
+
b
|
| 544 |
+
a
|
| 545 |
+
b
|
| 546 |
+
a
|
| 547 |
+
b
|
| 548 |
+
a
|
| 549 |
+
b
|
| 550 |
+
a
|
| 551 |
+
Fig. 1. The (infinite) derivative weighted automaton associated with E.
|
| 552 |
+
In the following section, let us show how to model a new monad in order to solve this problem.
|
| 553 |
+
7
|
| 554 |
+
The Graded Module Monad
|
| 555 |
+
Let us consider an operad O = (O, ◦, id) and the association sending:
|
| 556 |
+
– any set S to �
|
| 557 |
+
n∈N On × Sn,
|
| 558 |
+
– any f in S → S′ to the function g in �
|
| 559 |
+
n∈N On × Sn → �
|
| 560 |
+
n∈N On × S′n:
|
| 561 |
+
g(o, (s1, . . . , sn)) = (o, (f(s1), . . . , f(sn)))
|
| 562 |
+
It can be checked that this is a functor, denoted by GradMod(O). Moreover, it forms a monad considering the two
|
| 563 |
+
following functions:
|
| 564 |
+
pure(s) = (id, s),
|
| 565 |
+
(o, (s1, . . . , sn)) >>= f = (o ◦ (o1, . . . , on), (s1,1, . . . , s1,i1, . . . , sn,1, . . . , sn,in))
|
| 566 |
+
where f(sj) = (oj, sj,1, . . . , sj,ij). However, notice that GradMod(O)(1) cannot be easily evaluated as a value space.
|
| 567 |
+
Thus, let us compose it with another monad. As an example, let us consider a semiring K = (K, ×, +, 1, 0) and
|
| 568 |
+
the operad O of the n-ary functions over K. Hence, let us define the functor7 GradComb(O, K) that sends S to
|
| 569 |
+
GradMod(O)(LinComb(K)(S)).
|
| 570 |
+
7 it is folk knowledge that the composition of two functors is a functor.
|
| 571 |
+
|
| 572 |
+
To show that this combination is a monad, let us first define a function α sending GradComb(O, K)(S) to
|
| 573 |
+
GradMod(O)(S). It can be easily done by converting a linear combination into an operadic combination, i.e. an
|
| 574 |
+
element in GradMod(O)(S), with the following function toOp:
|
| 575 |
+
toOp((k1, s1) ⊞ · · · ⊞ (kn, sn))
|
| 576 |
+
= (λ(x1, . . . , xn) → k1 × x1 + · · · + kn × xn, (s1, . . . , sn)),
|
| 577 |
+
α(o, (L1, . . . , Ln)) = (o ◦ (o1, . . . , on), (s1,1, . . . , s1,i1, . . . , sn,1, . . . , sn,in))
|
| 578 |
+
where toOp(Lj) = (oj, (sj,1, . . . , sj,ij)).
|
| 579 |
+
Consequently, we can define the monadic functions as follows:
|
| 580 |
+
pure(s) = (id, (1, s)),
|
| 581 |
+
(o, (L1, . . . , Ln)) >>= f = α(o, (L1, . . . , Ln)) >>= f
|
| 582 |
+
where the second occurrence of >>= is the monadic function associated with the monad GradMod(O).
|
| 583 |
+
Let us finally define an expressive support for this monad:
|
| 584 |
+
toExp(o, (L1, . . . , Ln)) = o(toExp(L1), . . . , toExp(Ln)),
|
| 585 |
+
(o, (L1, . . . , Ln)) + (o′, (L′
|
| 586 |
+
1, . . . , L′
|
| 587 |
+
n′)) = (o + o′, (L1, . . . , Ln, L′
|
| 588 |
+
1, . . . , L′
|
| 589 |
+
n′))
|
| 590 |
+
(o, (L1, . . . , Ln)) × (o′, (L′
|
| 591 |
+
1, . . . , L′
|
| 592 |
+
n′)) = (o × o′, (L1, . . . , Ln, L′
|
| 593 |
+
1, . . . , L′
|
| 594 |
+
n′))
|
| 595 |
+
± = +,
|
| 596 |
+
1 = (id, (1, ⊤)),
|
| 597 |
+
0 = (id, (0, ⊤)),
|
| 598 |
+
0 = (id, (0, ⊤)),
|
| 599 |
+
m ⋉ F = pure(toExp(m) · F),
|
| 600 |
+
(o, (M1, . . . , Mk)) ⊲ (o′, (L1, . . . , Ln)) = (o(M1, . . . , Mk) × o′, (L1, . . . , Ln)),
|
| 601 |
+
(o, (L1, . . . , Ln)) ⊳ (o′, (M1, . . . , Mk)) = (o × o′(M1, . . . , Mk), (L1, . . . , Ln))
|
| 602 |
+
f ⋇ ((o1, (L1,1, . . . , L1,i1)), . . . , (on, (Ln,1, . . . , Ln,in)))
|
| 603 |
+
= (f ◦ (o1, . . . , on), (L1,1, . . . , L1,i1, . . . , Ln,1, . . . , Ln,in))
|
| 604 |
+
where (o + o′)(x1, . . . , xn+n′) = o(x1, . . . , xn) + o′(xn+1, . . . , xn+n′)
|
| 605 |
+
(o × o′)(x1, . . . , xn+n′) = o(x1, . . . , xn) × o′(xn+1, . . . , xn+n′)
|
| 606 |
+
Example 10. Let us consider that two elements in GradComb(O, K)(Exp(Σ)) are equal if they have the same image
|
| 607 |
+
by toExp. Let us consider the expression E = ExtDist(a∗b∗ + b∗a∗, b∗a∗b∗, a∗b∗a∗) of Example 8.
|
| 608 |
+
da(E) = ExtDist ⋇ ((+, (a∗b∗, a∗)), (id, a∗b∗), (+, (a∗b∗a∗, a∗)))
|
| 609 |
+
= (ExtDist ◦ (+, id, +), (a∗b∗, a∗, a∗b∗, a∗b∗a∗, a∗))
|
| 610 |
+
daa(E) = (ExtDist ◦ (+, id, + ◦ (+, id)), (a∗b∗, a∗, a∗b∗, a∗b∗a∗, a∗, a∗))
|
| 611 |
+
= (ExtDist ◦ (+, id, + ◦ (id, 2×)), (a∗b∗, a∗, a∗b∗, a∗b∗a∗, a∗))
|
| 612 |
+
daaa(E) = (ExtDist ◦ (+, id, + ◦ (id, 3×)), (a∗b∗, a∗, a∗b∗, a∗b∗a∗, a∗))
|
| 613 |
+
daab(E) = (ExtDist ◦ (+, id, +), (b∗, ∅, b∗, b∗a∗, ∅))
|
| 614 |
+
= (ExtDist, (b∗, b∗, b∗a∗))
|
| 615 |
+
weightaaa(E) = daaa(E) >>= Null
|
| 616 |
+
= ExtDist ◦ (+, id, +)(1, 1, 1, 1, 3)
|
| 617 |
+
= ExtDist(1 + 1, 1, 1 + 3) = 4 − 1 = 3
|
| 618 |
+
weightaab(E) = daab(E) >>= Null = ExtDist(1, 1, 1) = 0
|
| 619 |
+
Using this monad, the number of derivated terms, that is the number of states in the associated derivative automaton,
|
| 620 |
+
is finite. Indeed, the computations are absorbed in the transition structure. This automaton is represented in
|
| 621 |
+
Figure 2. Notice that the dashed rectangle represent the functions that are composed during the traversal associated
|
| 622 |
+
with a word. The final weights are represented by double edges. The sink states are omitted. The state b∗ is duplicated
|
| 623 |
+
to simplify the representation.
|
| 624 |
+
|
| 625 |
+
ExtDist(a∗b∗ + b∗a∗, b∗a∗b∗, a∗b∗a∗)
|
| 626 |
+
ExtDist
|
| 627 |
+
+
|
| 628 |
+
+
|
| 629 |
+
ExtDist
|
| 630 |
+
+
|
| 631 |
+
b∗a∗b∗
|
| 632 |
+
+
|
| 633 |
+
a∗b∗a∗
|
| 634 |
+
+
|
| 635 |
+
a∗b∗
|
| 636 |
+
a∗
|
| 637 |
+
b∗
|
| 638 |
+
b∗a∗
|
| 639 |
+
b∗
|
| 640 |
+
1
|
| 641 |
+
1
|
| 642 |
+
1
|
| 643 |
+
1
|
| 644 |
+
1
|
| 645 |
+
1
|
| 646 |
+
1
|
| 647 |
+
1
|
| 648 |
+
a
|
| 649 |
+
b
|
| 650 |
+
a
|
| 651 |
+
b
|
| 652 |
+
b
|
| 653 |
+
a
|
| 654 |
+
b
|
| 655 |
+
a
|
| 656 |
+
a
|
| 657 |
+
b
|
| 658 |
+
b
|
| 659 |
+
b
|
| 660 |
+
Fig. 2. The Associated Derivative Automaton of ExtDist(a∗b∗ + b∗a∗, b∗a∗b∗, a∗b∗a∗).
|
| 661 |
+
However, notice that not every monadic expression produces a finite set of derivated terms, as shown in the next
|
| 662 |
+
example.
|
| 663 |
+
Example 11. Let us consider the expression E of Example 8 and the expression F = E · c∗. It can be shown that
|
| 664 |
+
dan(F) = toExp(dan(E)) · c∗
|
| 665 |
+
= ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + n ⊙ a∗) · c∗.
|
| 666 |
+
The study of the necessary and sufficient conditions of monads that lead to a finite set of derivated terms is one
|
| 667 |
+
of the next steps of our work.
|
| 668 |
+
8
|
| 669 |
+
Haskell Implementation
|
| 670 |
+
The notions described in the previous sections have been implemented in Haskell, as follows:
|
| 671 |
+
– The notion of monad over a sub-category of sets is a typeclass using the Constraint kind to specify a sub-
|
| 672 |
+
category;
|
| 673 |
+
– n-ary functions and their operadic structures are implemented using fixed length vectors, the size of which is
|
| 674 |
+
determined at compilation using type level programming;
|
| 675 |
+
– The notion of graded module is implemented through an existential type to deal with unknown arities: Its
|
| 676 |
+
monadic structure is based on an extension of heterogeneous lists, the graded vectors, typed w.r.t. the list of
|
| 677 |
+
the arities of the elements it contains;
|
| 678 |
+
– The parser and some type level functions are based on dependently typed programming with singletons [8],
|
| 679 |
+
allowing, for example, determining the type of the monads or the arity of the functions involved at run-time;
|
| 680 |
+
– An application is available here [16] illustrating the computations:
|
| 681 |
+
• the backend uses servant to define an API;
|
| 682 |
+
|
| 683 |
+
• the frontend is defined using Reflex, a functional reactive programming engine and cross compiled in
|
| 684 |
+
JavaScript with GHCJS.
|
| 685 |
+
As an example, the monadic expression of the previous examples can be entered in the web application as the
|
| 686 |
+
input ExtDist(a*.b*+b*.a*,b*.a*.b*,a*.b*.a*).
|
| 687 |
+
9
|
| 688 |
+
Capture Groups
|
| 689 |
+
Capture groups are a standard feature of POSIX regular expressions where parenthesis are used to memorize
|
| 690 |
+
some part of the input string being matched in order to reuse either for substitution or matching. We give here
|
| 691 |
+
an equivalent definition along with derivation formulae and a monadic definition. The semantic of this definition
|
| 692 |
+
conforms to those of POSIX expressions. Precisely, when a capture group has been involved more than one time
|
| 693 |
+
due to a stared subexpression, the value of the corresponding variable corresponds to the last capture.
|
| 694 |
+
9.1
|
| 695 |
+
Syntax of Expressions with Capture Groups
|
| 696 |
+
A capture-group expression E over a symbol alphabet Σ and a variable alphabet Γ (or Σ, Γ-expression for short)
|
| 697 |
+
is inductively defined as
|
| 698 |
+
E = a,
|
| 699 |
+
E = ε,
|
| 700 |
+
E = ∅,
|
| 701 |
+
E = F + G,
|
| 702 |
+
E = F · G,
|
| 703 |
+
E = F ∗,
|
| 704 |
+
E = (F)x,
|
| 705 |
+
E = x,
|
| 706 |
+
where F and G are two Σ, Γ-expressions, a is a symbol in Σ, u is in Σ∗ and x is a variable in Γ. In the POSIX
|
| 707 |
+
syntax, capture groups are implicitly mapped with variables respectively with the order of the opening parenthesis
|
| 708 |
+
of a pair. Here, each capture group is associated explicitly to a variable by indexing the closing parenthesis with
|
| 709 |
+
the name of this variable.
|
| 710 |
+
9.2
|
| 711 |
+
Contextual Expressions and their Contextual Languages
|
| 712 |
+
In order to define the contextual language and the derivation of capture-group expressions, we need to extend the
|
| 713 |
+
syntax of the expressions in order to attach to any capture group the current part of the input string captured
|
| 714 |
+
during an execution.
|
| 715 |
+
A contextual capture-group expression E over a symbol alphabet Σ and a variable alphabet Γ (or Σ, Γ-expression
|
| 716 |
+
for short) is inductively defined as
|
| 717 |
+
E = a,
|
| 718 |
+
E = ε,
|
| 719 |
+
E = ∅,
|
| 720 |
+
E = F + G,
|
| 721 |
+
E = F · G,
|
| 722 |
+
E = F ∗,
|
| 723 |
+
E = (F)u
|
| 724 |
+
x,
|
| 725 |
+
E = x,
|
| 726 |
+
where F and G are two Σ, Γ-expressions, a is a symbol in Σ, u is in Σ∗ and x is a variable in Γ.
|
| 727 |
+
Notice that a Σ, Γ-expression is equivalent to a contextual capture-group expression where u = ε for every
|
| 728 |
+
occurrence of capture group.
|
| 729 |
+
In the following, we consider that a context is a function from Γ to Maybe(Σ∗), modelling the possibility that
|
| 730 |
+
a variable was initialized (or not) during the parsing. The set of contexts is denoted by Ctxt(Γ, Σ).
|
| 731 |
+
Using these notions of contexts, let us now explain the semantics of contextual capture-group expressions. While
|
| 732 |
+
parsing, a context is built to memorize the different affectations of words to variables. Therefore, a (contextual)
|
| 733 |
+
language associated with an expression is a set of couples built from a language and the context that was used to
|
| 734 |
+
compute it.
|
| 735 |
+
The classic atomic cases (a symbol, the empty word or the empty set) are easy to define, preserving the context.
|
| 736 |
+
Another one is the case of a variable x: the context is applied here to compute the associated word (if it exists) and
|
| 737 |
+
is preserved.
|
| 738 |
+
The recursive cases are interpreted as such:
|
| 739 |
+
– The contextual language of a sum of two expressions is the union of their contextual languages, computed
|
| 740 |
+
independently.
|
| 741 |
+
– The contextual language of a catenation of two expressions F and G is computed in three steps. First, the
|
| 742 |
+
contextual language of F is computed. Secondly, for each couple (L, ctxt) of this contextual language, the
|
| 743 |
+
function ctxt is considered as the new context to compute the contextual language of G, leading to new couples
|
| 744 |
+
(L′, ctxt′). Finally, for each of these combinations, a couple (L·L′, ctxt′) is added to form the resulting contextual
|
| 745 |
+
language.
|
| 746 |
+
|
| 747 |
+
– The contextual language of a starred expression is, classically, the infinite union of the powered contextual
|
| 748 |
+
languages, computed by iterated catenations.
|
| 749 |
+
– The contextual language of a captured expression (F)u
|
| 750 |
+
x is computed in two steps. First, the contextual language
|
| 751 |
+
of F is computed. Then, for each couple (L, ctxt) of it, a word w is chosen in L and the context ctxt must be
|
| 752 |
+
updated coherently.
|
| 753 |
+
More formally, the contextual language of a Σ, Γ-expression E associated with a context ctxt in Ctxt(Γ, Σ) is
|
| 754 |
+
the subset Lctxt(E) of 2Σ∗ × Ctxt(Γ, Σ) inductively defined as follows:
|
| 755 |
+
Lctxt(a) = {({a}, ctxt)},
|
| 756 |
+
Lctxt(ε) = {({ε}, ctxt)},
|
| 757 |
+
Lctxt(∅) = ∅,
|
| 758 |
+
Lctxt(x) =
|
| 759 |
+
�
|
| 760 |
+
∅
|
| 761 |
+
if ctxt(x) = Nothing,
|
| 762 |
+
{({w}, ctxt)}
|
| 763 |
+
otherwise if ctxt(x) = Just(w),
|
| 764 |
+
Lctxt(F + G) = Lctxt(F) ∪ Lctxt(G),
|
| 765 |
+
Lctxt(F · G) =
|
| 766 |
+
�
|
| 767 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 768 |
+
(L2,ctxt2)∈Lctxt1(G)
|
| 769 |
+
{(L1 · L2, ctxt2)},
|
| 770 |
+
Lctxt(F ∗) =
|
| 771 |
+
�
|
| 772 |
+
n∈N
|
| 773 |
+
(Lctxt(F))
|
| 774 |
+
n,
|
| 775 |
+
Lctxt((F)u
|
| 776 |
+
x) =
|
| 777 |
+
�
|
| 778 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 779 |
+
w∈L1
|
| 780 |
+
{({w}, [ctxt1]x←uw)},
|
| 781 |
+
where F and G are two Σ, Γ-expressions, a is a symbol in Σ, x is a variable in Γ, u is in Σ∗, Ln is defined, for any
|
| 782 |
+
set L of couples (language, context) by
|
| 783 |
+
Ln =
|
| 784 |
+
|
| 785 |
+
|
| 786 |
+
|
| 787 |
+
|
| 788 |
+
|
| 789 |
+
|
| 790 |
+
|
| 791 |
+
|
| 792 |
+
|
| 793 |
+
|
| 794 |
+
|
| 795 |
+
�
|
| 796 |
+
(L,ctxt)∈L
|
| 797 |
+
{({ε}, ctxt)}
|
| 798 |
+
if n = 0,
|
| 799 |
+
�
|
| 800 |
+
(L1,ctxt1)∈L,
|
| 801 |
+
(L2,ctxt2)∈Ln−1
|
| 802 |
+
{(L1 · L2, ctxt2)}
|
| 803 |
+
otherwise,
|
| 804 |
+
and [ctxt]x←w is the context defined by
|
| 805 |
+
[ctxt]x←w(y) =
|
| 806 |
+
�
|
| 807 |
+
Just(w)
|
| 808 |
+
if x = y,
|
| 809 |
+
ctxt(y)
|
| 810 |
+
otherwise.
|
| 811 |
+
The contextual language of an expression E is the set of couples obtained from an uninitialised context, where
|
| 812 |
+
nothing is associated with any variable, that is the set
|
| 813 |
+
Lλ_→Nothing(E).
|
| 814 |
+
Finally, the language denoted by an expression E is the set of words obtained by forgetting the contexts, that is the
|
| 815 |
+
set
|
| 816 |
+
�
|
| 817 |
+
(L,_)∈Lλ_→Nothing(E)
|
| 818 |
+
L.
|
| 819 |
+
Example 12. Let us consider the three following expressions over the symbol alphabet {a, b, c} and the variable
|
| 820 |
+
alphabet {x}:
|
| 821 |
+
E = E1 · E2,
|
| 822 |
+
E1 = ((a∗)xbx)∗,
|
| 823 |
+
E2 = cx.
|
| 824 |
+
The language denoted by E2 is empty, since it is computed from the empty context, where nothing is associated
|
| 825 |
+
with x. However, parsing E1 allows us to compute contexts that define word values to affect to x. Let us thus show
|
| 826 |
+
how is defined the contextual language of E1:
|
| 827 |
+
– the contextual language of (a∗)x is the set�
|
| 828 |
+
n∈N
|
| 829 |
+
{({an}, λx → Just(an))}
|
| 830 |
+
where each word an is recorded in a context;
|
| 831 |
+
– the contextual language of (a∗)xbx is the set
|
| 832 |
+
�
|
| 833 |
+
n∈N
|
| 834 |
+
{({anban}, λx → Just(an))}
|
| 835 |
+
where each word an is recorded in a context applied to evaluate the variable x;
|
| 836 |
+
– the contextual language of E1 is the union of the two following sets S1 and S2:
|
| 837 |
+
S1 = {({��}, λx → Nothing)}
|
| 838 |
+
S2 = {({anban | n ∈ N}∗ · {ambam}, λx → Just(am)) | m ∈ N}
|
| 839 |
+
where each iteration of the outermost star produces a new record for the variable x in the context; however,
|
| 840 |
+
notice that only the last one is recorded at the end of the process.
|
| 841 |
+
|
| 842 |
+
Finally, the language of E is obtained by considering the contexts obtained from the parsing of E1 to evaluate the
|
| 843 |
+
occurrence of x in E2, leading to the set�
|
| 844 |
+
m∈N
|
| 845 |
+
({anban | n ∈ N}∗ · {ambamcam}).
|
| 846 |
+
Obviously, some classical equations still hold with these computations:
|
| 847 |
+
Lemma 1. Let E, F and G be three Σ, Γ-expressions and ctxt be a context in Ctxt(Γ, Σ). The two following
|
| 848 |
+
equations hold:
|
| 849 |
+
Lctxt(E · (F + G)) = Lctxt(E · F + E · G)
|
| 850 |
+
Lctxt(F ∗) = Lctxt(ε + F · F ∗)
|
| 851 |
+
Proof. Let us proceed by equality sequences:
|
| 852 |
+
Lctxt(E · (F + G)) =
|
| 853 |
+
�
|
| 854 |
+
(L1,ctxt1)∈Lctxt(E),
|
| 855 |
+
(L2,ctxt2)∈Lctxt1 (F +G)
|
| 856 |
+
{(L1 · L2, ctxt2)}
|
| 857 |
+
=
|
| 858 |
+
�
|
| 859 |
+
(L1,ctxt1)∈Lctxt(E),
|
| 860 |
+
(L2,ctxt2)∈Lctxt1 (F )∪Lctxt1(G)
|
| 861 |
+
{(L1 · L2, ctxt2)}
|
| 862 |
+
=
|
| 863 |
+
�
|
| 864 |
+
(L1,ctxt1)∈Lctxt(E),
|
| 865 |
+
(L2,ctxt2)∈Lctxt1 (F )
|
| 866 |
+
{(L1 · L2, ctxt2)}
|
| 867 |
+
∪
|
| 868 |
+
�
|
| 869 |
+
(L1,ctxt1)∈Lctxt(E),
|
| 870 |
+
(L2,ctxt2)∈Lctxt1(G)
|
| 871 |
+
{(L1 · L2, ctxt2)}
|
| 872 |
+
= Lctxt(E · F) ∪ Lctxt(E · G)
|
| 873 |
+
= Lctxt(E · F + E · G)
|
| 874 |
+
Lctxt(F ∗) =
|
| 875 |
+
�
|
| 876 |
+
n∈N
|
| 877 |
+
(Lctxt(F))
|
| 878 |
+
n
|
| 879 |
+
= (Lctxt(F))
|
| 880 |
+
0 ∪
|
| 881 |
+
�
|
| 882 |
+
n∈N,n≥1
|
| 883 |
+
(Lctxt(F))
|
| 884 |
+
n
|
| 885 |
+
= (Lctxt(F))
|
| 886 |
+
0 ∪
|
| 887 |
+
�
|
| 888 |
+
n∈N
|
| 889 |
+
Lctxt(F) · (Lctxt(F))
|
| 890 |
+
n
|
| 891 |
+
= (Lctxt(F))
|
| 892 |
+
0 ∪ Lctxt(F) ·
|
| 893 |
+
�
|
| 894 |
+
n∈N
|
| 895 |
+
(Lctxt(F))
|
| 896 |
+
n
|
| 897 |
+
= Lctxt(ε + F · F ∗)
|
| 898 |
+
In order to solve the membership test for the contextual capture-group expressions, let us extend the classical
|
| 899 |
+
derivation method. But first, let us show how to extend the nullability predicate, needed at the end of the process.
|
| 900 |
+
9.3
|
| 901 |
+
Nullability Computation
|
| 902 |
+
The nullability predicate allows us to determine whether the empty word belongs to the language denoted by
|
| 903 |
+
an expression. As far as capture groups are concerned, a context has to be computed. Therefore, the nullability
|
| 904 |
+
predicate can be represented as a set of contexts the application of which produces a language that contains the
|
| 905 |
+
empty word.
|
| 906 |
+
As we have seen, the nullability depends on the current context. Given an expression and a context ctxt, the
|
| 907 |
+
nullability predicate is a set in 2Ctxt(Γ,Σ), computed as follows:
|
| 908 |
+
Nullctxt(ε) = {ctxt}
|
| 909 |
+
Nullctxt(∅) = ∅
|
| 910 |
+
Nullctxt(a) = ∅
|
| 911 |
+
Nullctxt(x) =
|
| 912 |
+
�
|
| 913 |
+
{ctxt}
|
| 914 |
+
if ctxt(x) = Just(ε)
|
| 915 |
+
∅
|
| 916 |
+
otherwise.
|
| 917 |
+
Nullctxt(E + F) = Nullctxt(E) ∪ Nullctxt(F)
|
| 918 |
+
Nullctxt(E · F) =
|
| 919 |
+
�
|
| 920 |
+
ctxt′∈Nullctxt(F ),
|
| 921 |
+
ctxt′′∈Nullctxt′ (G)
|
| 922 |
+
{ctxt′′}
|
| 923 |
+
Nullctxt(E∗) = {ctxt}
|
| 924 |
+
Nullctxt((E)u
|
| 925 |
+
x) =
|
| 926 |
+
�
|
| 927 |
+
ctxt′∈Nullctxt(F )
|
| 928 |
+
{[ctxt′]x←u}
|
| 929 |
+
where E and F are two Σ, Γ-expressions, a is a symbol in Σ, x is a variable in Γ and u is in Σ∗.
|
| 930 |
+
Example 13. Let us consider the three expressions of Example 12:
|
| 931 |
+
E = E1 · E2,
|
| 932 |
+
E1 = ((a∗)xbx)∗,
|
| 933 |
+
E2 = cx.
|
| 934 |
+
For any context ctxt,
|
| 935 |
+
Nullctxt(E1) = {ctxt},
|
| 936 |
+
Nullctxt(E2) = ∅,
|
| 937 |
+
Nullctxt(E) = ∅.
|
| 938 |
+
The nullability predicate allows us to determine whether there exists a couple in the contextual language of an
|
| 939 |
+
expression such that its first component contains the empty word.
|
| 940 |
+
|
| 941 |
+
Proposition 3. Let E be a Σ, Γ-expression and ctxt be a context in Ctxt(Γ, Σ). Then the two following conditions
|
| 942 |
+
are equivalent:
|
| 943 |
+
– Nullctxt(E) ̸= ∅,
|
| 944 |
+
– ∃(L, _) ∈ Lctxt(E) | ε ∈ L.
|
| 945 |
+
Proof. By induction over the structure of E:
|
| 946 |
+
– If E = a ∈ Σ or E = ∅, the property holds since Nullctxt(E) is empty and since there is no couple (L, ctxt′) in
|
| 947 |
+
Lctxt(E) with ε in L.
|
| 948 |
+
– If E = ε, the following two conditions hold,
|
| 949 |
+
Nullctxt(E) = {ctxt},
|
| 950 |
+
Lctxt(E) = {({ε}, ctxt)},
|
| 951 |
+
satisfying the stated condition.
|
| 952 |
+
– If E = F + G, the following two conditions hold:
|
| 953 |
+
Nullctxt(F + G) = Nullctxt(F) ∪ Nullctxt(G),
|
| 954 |
+
Lctxt(F + G) = Lctxt(F) ∪ Lctxt(G).
|
| 955 |
+
Since, by induction hypothesis, the following two conditions hold
|
| 956 |
+
Nullctxt(F) ̸= ∅ ⇔ ∃(L, ctxt′) ∈ Lctxt(F) | ε ∈ L,
|
| 957 |
+
Nullctxt(G) ̸= ∅ ⇔ ∃(L, ctxt′) ∈ Lctxt(G) | ε ∈ L,
|
| 958 |
+
the proposition holds.
|
| 959 |
+
– If E = F · G, the two following conditions hold:
|
| 960 |
+
Nullctxt(F · G) =
|
| 961 |
+
�
|
| 962 |
+
ctxt′∈Nullctxt(F ),
|
| 963 |
+
ctxt′′∈Nullctxt′(G),
|
| 964 |
+
{ctxt′′},
|
| 965 |
+
Lctxt(F · G) =
|
| 966 |
+
�
|
| 967 |
+
(L,ctxt′)∈Lctxt(F ),
|
| 968 |
+
(L′,ctxt′′)∈Lctxt′(G),
|
| 969 |
+
{(L · L′, ctxt′′)}.
|
| 970 |
+
Since, by induction hypothesis, the two following conditions hold,
|
| 971 |
+
Nullctxt(F) ̸= ∅ ⇔ ∃(L, ctxt′) ∈ Lctxt(F) | ε ∈ L,
|
| 972 |
+
Nullctxt′(G) ̸= ∅ ⇔ ∃(L, ctxt′′) ∈ Lctxt′(G) | ε ∈ L,
|
| 973 |
+
the proposition holds.
|
| 974 |
+
– If E = F ∗, since the two following conditions hold
|
| 975 |
+
Nullctxt(F ∗) = {ctxt},
|
| 976 |
+
Lctxt(F)
|
| 977 |
+
0 = {({ε}, ctxt)} ∈ Lctxt(F ∗),
|
| 978 |
+
the stated condition holds.
|
| 979 |
+
– If E = (F)u
|
| 980 |
+
x, both following conditions hold:
|
| 981 |
+
Nullctxt((F)u
|
| 982 |
+
x) =
|
| 983 |
+
�
|
| 984 |
+
ctxt′∈Nullctxt(F )
|
| 985 |
+
{[ctxt′]x←u},
|
| 986 |
+
Lctxt((F)u
|
| 987 |
+
x) =
|
| 988 |
+
�
|
| 989 |
+
(L,ctxt′)∈Lctxt(F ),
|
| 990 |
+
w∈L
|
| 991 |
+
{({w}, [ctxt′]x←uw)}.
|
| 992 |
+
Then, following induction hypothesis,
|
| 993 |
+
Nullctxt(F) ̸= ∅ ⇔ ∃(L, ctxt′) ∈ Lctxt(F) | ε ∈ L,
|
| 994 |
+
the stated condition holds.
|
| 995 |
+
– If E = x, both following conditions hold:
|
| 996 |
+
Nullctxt(x) =
|
| 997 |
+
�
|
| 998 |
+
{ctxt}
|
| 999 |
+
if ctxt(x) = Just(ε)
|
| 1000 |
+
∅
|
| 1001 |
+
otherwise,
|
| 1002 |
+
Lctxt(x) =
|
| 1003 |
+
�
|
| 1004 |
+
∅
|
| 1005 |
+
if ctxt(x) = Nothing,
|
| 1006 |
+
{({w}, ctxt)}
|
| 1007 |
+
otherwise if ctxt(x) = Just(w).
|
| 1008 |
+
Therefore, the proposition holds.
|
| 1009 |
+
9.4
|
| 1010 |
+
Derivation formulae
|
| 1011 |
+
Similarly to the nullability predicate, the derivation computation builds the context while parsing the expression.
|
| 1012 |
+
Therefore, the derivative of an expression with respect to a context is a set of couples (expression, context), induc-
|
| 1013 |
+
tively computed as follows, for any Σ, Γ-expression and for any context ctxt in Ctxt(Γ, Σ):
|
| 1014 |
+
dctxt
|
| 1015 |
+
a
|
| 1016 |
+
(ε) = ∅
|
| 1017 |
+
dctxt
|
| 1018 |
+
a
|
| 1019 |
+
(∅) = ∅
|
| 1020 |
+
|
| 1021 |
+
dctxt
|
| 1022 |
+
a
|
| 1023 |
+
(b) =
|
| 1024 |
+
�
|
| 1025 |
+
∅
|
| 1026 |
+
if a ̸= b,
|
| 1027 |
+
{(ε, ctxt)}
|
| 1028 |
+
otherwise,
|
| 1029 |
+
dctxt
|
| 1030 |
+
a
|
| 1031 |
+
(x) =
|
| 1032 |
+
�
|
| 1033 |
+
dctxt
|
| 1034 |
+
a
|
| 1035 |
+
(w)
|
| 1036 |
+
if ctxt(x) = Just(w)
|
| 1037 |
+
∅
|
| 1038 |
+
otherwise
|
| 1039 |
+
dctxt
|
| 1040 |
+
a
|
| 1041 |
+
(F + G) = dctxt
|
| 1042 |
+
a
|
| 1043 |
+
(F) ∪ dctxt
|
| 1044 |
+
a
|
| 1045 |
+
(G)
|
| 1046 |
+
dctxt
|
| 1047 |
+
a
|
| 1048 |
+
(F · G) =
|
| 1049 |
+
�
|
| 1050 |
+
(ctxt′,F ′)∈dctxt
|
| 1051 |
+
a
|
| 1052 |
+
(F )
|
| 1053 |
+
{(F ′ · G, ctxt′)}
|
| 1054 |
+
∪
|
| 1055 |
+
�
|
| 1056 |
+
ctxt′∈Nullctxt(F )
|
| 1057 |
+
dctxt′
|
| 1058 |
+
a
|
| 1059 |
+
(G)
|
| 1060 |
+
dctxt
|
| 1061 |
+
a
|
| 1062 |
+
(F ∗) =
|
| 1063 |
+
�
|
| 1064 |
+
(ctxt′,F ′)∈dctxt
|
| 1065 |
+
a
|
| 1066 |
+
(F )
|
| 1067 |
+
{(F ′ · F ∗, ctxt′)}
|
| 1068 |
+
dctxt
|
| 1069 |
+
a
|
| 1070 |
+
((F)u
|
| 1071 |
+
x) =
|
| 1072 |
+
�
|
| 1073 |
+
(ctxt′,F ′)∈dctxt
|
| 1074 |
+
a
|
| 1075 |
+
(F )
|
| 1076 |
+
{((F ′)u·a
|
| 1077 |
+
x , ctxt′)}
|
| 1078 |
+
where F and G are two Σ, Γ-expressions, a is a symbol in Σ, x is a variable in Γ and u is in Σ∗.
|
| 1079 |
+
Example 14. Let us consider the three expressions of Example 12:
|
| 1080 |
+
E = E1 · E2,
|
| 1081 |
+
E1 = ((a∗)xbx)∗,
|
| 1082 |
+
E2 = cx.
|
| 1083 |
+
Then, for any context ctxt,
|
| 1084 |
+
dctxt
|
| 1085 |
+
a
|
| 1086 |
+
(E) = {((a∗)a
|
| 1087 |
+
xbx((a∗)xbx)∗cx, ctxt)},
|
| 1088 |
+
dctxt
|
| 1089 |
+
b
|
| 1090 |
+
(E) = {(x((a∗)xbx)∗cx, λx → ε)},
|
| 1091 |
+
dctxt
|
| 1092 |
+
c
|
| 1093 |
+
(E) = {(x, ctxt)}.
|
| 1094 |
+
The derivation of an expression allows us to syntactically express the computation of the quotient of the language
|
| 1095 |
+
components in contextual languages, where the quotient w−1(L) is the set {w′ | ww′ ∈ L}.
|
| 1096 |
+
Proposition 4. Let E be a Σ, Γ-expression, ctxt be a context in Ctxt(Γ, Σ) and a be a symbol in Σ. Then:
|
| 1097 |
+
�
|
| 1098 |
+
(E′,ctxt′)∈dctxt
|
| 1099 |
+
a
|
| 1100 |
+
(E)
|
| 1101 |
+
Lctxt′(E′) =
|
| 1102 |
+
�
|
| 1103 |
+
(L′,ctxt′)∈Lctxt(E)
|
| 1104 |
+
{(a−1(L′), ctxt′)}
|
| 1105 |
+
Proof. By induction over the structure of E, assimilating ∅ and {(∅, ctxt)} for any context ctxt.
|
| 1106 |
+
– If E = ε or E = ∅, the property vacuously holds.
|
| 1107 |
+
– If E = b ∈ Σ,
|
| 1108 |
+
�
|
| 1109 |
+
(E′,ctxt′)∈dctxt
|
| 1110 |
+
a
|
| 1111 |
+
(b)
|
| 1112 |
+
Lctxt′(E′) =
|
| 1113 |
+
�
|
| 1114 |
+
∅
|
| 1115 |
+
if b ̸= a,
|
| 1116 |
+
{({ε}, ctxt)}
|
| 1117 |
+
otherwise,
|
| 1118 |
+
= {(a−1({b}), ctxt)} =
|
| 1119 |
+
�
|
| 1120 |
+
(L′,ctxt′)∈Lctxt(b)
|
| 1121 |
+
{(a−1(L′), ctxt′)}.
|
| 1122 |
+
– If E = F + G,�
|
| 1123 |
+
(E′,ctxt′)∈dctxt
|
| 1124 |
+
a
|
| 1125 |
+
(F +G)
|
| 1126 |
+
Lctxt′(E′) =
|
| 1127 |
+
�
|
| 1128 |
+
(E′,ctxt′)∈dctxt
|
| 1129 |
+
a
|
| 1130 |
+
(F )∪dctxt
|
| 1131 |
+
a
|
| 1132 |
+
(G)
|
| 1133 |
+
Lctxt′(E′)
|
| 1134 |
+
=
|
| 1135 |
+
�
|
| 1136 |
+
(E′,ctxt′)∈dctxt
|
| 1137 |
+
a
|
| 1138 |
+
(F )
|
| 1139 |
+
Lctxt′(E′) ∪
|
| 1140 |
+
�
|
| 1141 |
+
(E′,ctxt′)∈dctxt
|
| 1142 |
+
a
|
| 1143 |
+
(G)
|
| 1144 |
+
Lctxt′(E′)
|
| 1145 |
+
=
|
| 1146 |
+
�
|
| 1147 |
+
(L′,ctxt′)∈Lctxt(F )
|
| 1148 |
+
{(a−1(L′), ctxt′)} ∪
|
| 1149 |
+
�
|
| 1150 |
+
(L′,ctxt′)∈Lctxt(G)
|
| 1151 |
+
{(a−1(L′), ctxt′)}
|
| 1152 |
+
=
|
| 1153 |
+
�
|
| 1154 |
+
(L′,ctxt′)∈Lctxt(F )∪Lctxt(G)
|
| 1155 |
+
{(a−1(L′), ctxt′)}
|
| 1156 |
+
=
|
| 1157 |
+
�
|
| 1158 |
+
(L′,ctxt′)∈Lctxt(F +G)
|
| 1159 |
+
{(a−1(L′), ctxt′)}.
|
| 1160 |
+
– If E = F · G,
|
| 1161 |
+
�
|
| 1162 |
+
(E′,ctxt′)∈dctxt
|
| 1163 |
+
a
|
| 1164 |
+
(F ·G)
|
| 1165 |
+
Lctxt′(E′) =
|
| 1166 |
+
�
|
| 1167 |
+
(ctxt′,F ′)∈dctxt
|
| 1168 |
+
a
|
| 1169 |
+
(F )
|
| 1170 |
+
Lctxt′(F ′ · G) ∪
|
| 1171 |
+
�
|
| 1172 |
+
ctxt′∈Nullctxt(F ),
|
| 1173 |
+
(G′,ctxt′′)∈dctxt′
|
| 1174 |
+
a
|
| 1175 |
+
(G)
|
| 1176 |
+
Lctxt′′(G′)
|
| 1177 |
+
=
|
| 1178 |
+
�
|
| 1179 |
+
(ctxt′,F ′)∈dctxt
|
| 1180 |
+
a
|
| 1181 |
+
(F ),
|
| 1182 |
+
(L1,ctxt1)∈Lctxt(F ′),
|
| 1183 |
+
(L2,ctxt2)∈Lctxt1(G)
|
| 1184 |
+
{(L1 · L2, ctxt2)} ∪
|
| 1185 |
+
�
|
| 1186 |
+
ctxt′∈Nullctxt(F ),
|
| 1187 |
+
(G′,ctxt′′)∈dctxt′
|
| 1188 |
+
a
|
| 1189 |
+
(G)
|
| 1190 |
+
Lctxt′′(G′)
|
| 1191 |
+
=
|
| 1192 |
+
�
|
| 1193 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1194 |
+
(L2,ctxt2)∈Lctxt1 (G)
|
| 1195 |
+
{(a−1(L1) · L2, ctxt2)} ∪
|
| 1196 |
+
�
|
| 1197 |
+
ctxt1∈Nullctxt(F ),
|
| 1198 |
+
(L2,ctxt2)∈Lctxt1 (G)
|
| 1199 |
+
{(a−1(L2), ctxt2)}
|
| 1200 |
+
|
| 1201 |
+
=
|
| 1202 |
+
�
|
| 1203 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1204 |
+
(L2,ctxt2)∈Lctxt1 (G)
|
| 1205 |
+
{(a−1(L1) · L2, ctxt2)} ∪
|
| 1206 |
+
�
|
| 1207 |
+
∃(L,ctxt1)∈Lctxt(F )|ε∈L,
|
| 1208 |
+
(L2,ctxt2)∈Lctxt1(G)
|
| 1209 |
+
{(a−1(L2), ctxt2)}
|
| 1210 |
+
=
|
| 1211 |
+
�
|
| 1212 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1213 |
+
(L2,ctxt2)∈Lctxt1 (G)
|
| 1214 |
+
{(a−1(L1) · L2, ctxt2)} ∪
|
| 1215 |
+
�
|
| 1216 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1217 |
+
ε∈L1,
|
| 1218 |
+
(L2,ctxt2)∈Lctxt1 (G)
|
| 1219 |
+
{(a−1(L2), ctxt2)}
|
| 1220 |
+
=
|
| 1221 |
+
�
|
| 1222 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1223 |
+
(L2,ctxt2)∈Lctxt1 (G)
|
| 1224 |
+
{(a−1(L1 · L2), ctxt2)}
|
| 1225 |
+
=
|
| 1226 |
+
�
|
| 1227 |
+
(L′,ctxt′)∈Lctxt(F ·G)
|
| 1228 |
+
{(a−1(L′), ctxt′)}.
|
| 1229 |
+
– If E = F ∗,
|
| 1230 |
+
�
|
| 1231 |
+
(E′,ctxt′)∈dctxt
|
| 1232 |
+
a
|
| 1233 |
+
(F ∗)
|
| 1234 |
+
Lctxt′(E′) =
|
| 1235 |
+
�
|
| 1236 |
+
(ctxt′,F ′)∈dctxt
|
| 1237 |
+
a
|
| 1238 |
+
(F )
|
| 1239 |
+
Lctxt′(F ′ · F ∗)
|
| 1240 |
+
=
|
| 1241 |
+
�
|
| 1242 |
+
(ctxt′,F ′)∈dctxt
|
| 1243 |
+
a
|
| 1244 |
+
(F ),
|
| 1245 |
+
(L1,ctxt1)∈Lctxt(F ′),
|
| 1246 |
+
(L2,ctxt2)∈Lctxt1(F ∗)
|
| 1247 |
+
{(L1 · L2, ctxt2)}
|
| 1248 |
+
=
|
| 1249 |
+
�
|
| 1250 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1251 |
+
(L2,ctxt2)∈Lctxt1(F ∗)
|
| 1252 |
+
{(a−1(L1) · L2, ctxt2)}
|
| 1253 |
+
=
|
| 1254 |
+
�
|
| 1255 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1256 |
+
(L2,ctxt2)∈Lctxt1(F ∗)
|
| 1257 |
+
{(a−1(L1 · L2), ctxt2)}
|
| 1258 |
+
=
|
| 1259 |
+
�
|
| 1260 |
+
(L′,ctxt′)∈Lctxt(F ·F ∗)
|
| 1261 |
+
{(a−1(L′), ctxt′)}
|
| 1262 |
+
=
|
| 1263 |
+
�
|
| 1264 |
+
(L′,ctxt′)∈Lctxt(ε+F ·F ∗)
|
| 1265 |
+
{(a−1(L′), ctxt′)}
|
| 1266 |
+
=
|
| 1267 |
+
�
|
| 1268 |
+
(L′,ctxt′)∈Lctxt(F ∗)
|
| 1269 |
+
{(a−1(L′), ctxt′)}
|
| 1270 |
+
– If E = (F)u
|
| 1271 |
+
x,
|
| 1272 |
+
�
|
| 1273 |
+
(E′,ctxt′)∈dctxt
|
| 1274 |
+
a
|
| 1275 |
+
((F )u
|
| 1276 |
+
x)
|
| 1277 |
+
Lctxt′(E′) =
|
| 1278 |
+
�
|
| 1279 |
+
(ctxt′,F ′)∈dctxt
|
| 1280 |
+
a
|
| 1281 |
+
(F )
|
| 1282 |
+
Lctxt′((F ′)u·a
|
| 1283 |
+
x )
|
| 1284 |
+
=
|
| 1285 |
+
�
|
| 1286 |
+
(ctxt′,F ′)∈dctxt
|
| 1287 |
+
a
|
| 1288 |
+
(F )
|
| 1289 |
+
(L1,ctxt1)∈Lctxt′(F ′),
|
| 1290 |
+
w∈L1
|
| 1291 |
+
{({w}, [ctxt1]x←uaw)}
|
| 1292 |
+
=
|
| 1293 |
+
�
|
| 1294 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1295 |
+
w∈a−1(L1)
|
| 1296 |
+
{({w}, [ctxt1]x←uaw)}
|
| 1297 |
+
=
|
| 1298 |
+
�
|
| 1299 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1300 |
+
aw∈L1
|
| 1301 |
+
{({w}, [ctxt1]x←uaw)}
|
| 1302 |
+
=
|
| 1303 |
+
�
|
| 1304 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1305 |
+
aw∈L1
|
| 1306 |
+
{(a−1({aw}), [ctxt1]x←uaw)}
|
| 1307 |
+
=
|
| 1308 |
+
�
|
| 1309 |
+
(L1,ctxt1)∈Lctxt(F ),
|
| 1310 |
+
w∈L1
|
| 1311 |
+
{(a−1({w}), [ctxt1]x←uw)}
|
| 1312 |
+
=
|
| 1313 |
+
�
|
| 1314 |
+
(L′,ctxt′)∈Lctxt((F )u
|
| 1315 |
+
x)
|
| 1316 |
+
{(a−1(L′), ctxt′)}
|
| 1317 |
+
|
| 1318 |
+
– If E = x,
|
| 1319 |
+
�
|
| 1320 |
+
(E′,ctxt′)∈dctxt
|
| 1321 |
+
a
|
| 1322 |
+
(x)
|
| 1323 |
+
Lctxt′(E′) =
|
| 1324 |
+
|
| 1325 |
+
|
| 1326 |
+
|
| 1327 |
+
|
| 1328 |
+
|
| 1329 |
+
�
|
| 1330 |
+
(E′,ctxt′)∈dctxt
|
| 1331 |
+
a
|
| 1332 |
+
(w)
|
| 1333 |
+
Lctxt′(E′)
|
| 1334 |
+
if ctxt(x) = Just(w),
|
| 1335 |
+
∅
|
| 1336 |
+
otherwise,
|
| 1337 |
+
=
|
| 1338 |
+
|
| 1339 |
+
|
| 1340 |
+
|
| 1341 |
+
|
| 1342 |
+
|
| 1343 |
+
�
|
| 1344 |
+
(w,ctxt)∈dctxt
|
| 1345 |
+
a
|
| 1346 |
+
(aw)
|
| 1347 |
+
Lctxt(w)
|
| 1348 |
+
if ctxt(x) = Just(aw),
|
| 1349 |
+
∅
|
| 1350 |
+
otherwise,
|
| 1351 |
+
=
|
| 1352 |
+
�
|
| 1353 |
+
{({w}, ctxt)}
|
| 1354 |
+
if ctxt(x) = Just(aw),
|
| 1355 |
+
∅
|
| 1356 |
+
otherwise,
|
| 1357 |
+
=
|
| 1358 |
+
�
|
| 1359 |
+
{(a−1({aw}), ctxt)}
|
| 1360 |
+
if ctxt(x) = Just(aw),
|
| 1361 |
+
∅
|
| 1362 |
+
otherwise,
|
| 1363 |
+
=
|
| 1364 |
+
�
|
| 1365 |
+
{(a−1({w}), ctxt)}
|
| 1366 |
+
if ctxt(x) = Just(w),
|
| 1367 |
+
∅
|
| 1368 |
+
otherwise,
|
| 1369 |
+
=
|
| 1370 |
+
�
|
| 1371 |
+
(L′,ctxt′)∈Lctxt(x)
|
| 1372 |
+
{(a−1(L′), ctxt′)}
|
| 1373 |
+
The derivation w.r.t. a word is, as usual, an iterated application of the derivation w.r.t. a symbol, recursively
|
| 1374 |
+
defined as follows, for any Σ, Γ-expression E, for any context ctxt in Ctxt(Γ, Σ), for any symbol a in Σ and for
|
| 1375 |
+
any word v in Σ∗:
|
| 1376 |
+
dctxt
|
| 1377 |
+
ε
|
| 1378 |
+
(E) = {(E, ctxt)},
|
| 1379 |
+
dctxt
|
| 1380 |
+
a·v (E) =
|
| 1381 |
+
�
|
| 1382 |
+
(E′,ctxt′)∈dctxt
|
| 1383 |
+
a
|
| 1384 |
+
(E)
|
| 1385 |
+
dctxt′
|
| 1386 |
+
v
|
| 1387 |
+
(E′).
|
| 1388 |
+
Example 15. Let us consider the three expressions of Example 14:
|
| 1389 |
+
E = E1 · E2,
|
| 1390 |
+
E1 = ((a∗)xbx)∗,
|
| 1391 |
+
E2 = cx.
|
| 1392 |
+
Then, for any context ctxt,
|
| 1393 |
+
dctxt
|
| 1394 |
+
ab (E) = dctxt
|
| 1395 |
+
b
|
| 1396 |
+
((a∗)a
|
| 1397 |
+
xbx((a∗)xbx)∗cx)
|
| 1398 |
+
= {(x((a∗)xbx)∗cx, λx → a)}
|
| 1399 |
+
dctxt
|
| 1400 |
+
aba (E) = dλx→a
|
| 1401 |
+
a
|
| 1402 |
+
(x((a∗)xbx)∗cx)
|
| 1403 |
+
= {(((a∗)xbx)∗cx, λx → a)}
|
| 1404 |
+
dctxt
|
| 1405 |
+
abac(E) = dλx→a
|
| 1406 |
+
c
|
| 1407 |
+
(((a∗)xbx)∗cx)
|
| 1408 |
+
= {(x, λx → a)}
|
| 1409 |
+
dctxt
|
| 1410 |
+
abaca(E) = dλx→a
|
| 1411 |
+
a
|
| 1412 |
+
(x)
|
| 1413 |
+
= {(ε, λx → a)}
|
| 1414 |
+
Such an operation allows us to syntactically compute the quotient.
|
| 1415 |
+
Proposition 5. Let E be a Σ, Γ-expression, ctxt be a context in Ctxt(Γ, Σ) and w be a word in Σ∗. Then:
|
| 1416 |
+
�
|
| 1417 |
+
(E′,ctxt′)∈dctxt
|
| 1418 |
+
w
|
| 1419 |
+
(E)
|
| 1420 |
+
Lctxt′(E′) =
|
| 1421 |
+
�
|
| 1422 |
+
(L′,ctxt′)∈Lctxt(E)
|
| 1423 |
+
{(w−1(L′), ctxt′)}
|
| 1424 |
+
Proof. By a direct induction over the structure of words.
|
| 1425 |
+
Finally, the membership test of a word w can be performed as usual by first computing the derivation w.r.t. w, and
|
| 1426 |
+
then by determining the existence of a nullable derivative, as a direct corollary of Proposition 3 and Proposition 5.
|
| 1427 |
+
Theorem 2. Let E be a Σ, Γ-expression, ctxt be a context in Ctxt(Γ, Σ) and w be a word in Σ∗. Then the two
|
| 1428 |
+
following conditions are equivalent:
|
| 1429 |
+
– ∃(L, _) ∈ Lctxt(E) | w ∈ L,
|
| 1430 |
+
– ∃(E′, ctxt′) ∈ dctxt
|
| 1431 |
+
w
|
| 1432 |
+
(E) | Nullctxt′(E′) ̸= ∅.
|
| 1433 |
+
We have shown how to compute the derivatives and solve the membership test in a classical way. Let us show how
|
| 1434 |
+
to embed the context computation in a convenient monad, in order to generalize the definitions to other structure
|
| 1435 |
+
than sets.
|
| 1436 |
+
|
| 1437 |
+
9.5
|
| 1438 |
+
The StateT Monad Transformer
|
| 1439 |
+
Monads do not compose well in general. However, ones can consider particular combinations of these objects. Among
|
| 1440 |
+
those, well-known patterns are the monad transformers like the StateT Monad Transformer [10]. This combination
|
| 1441 |
+
allows us to mimick the use of global variables in a functional way. In our setting, it allows us to embed the context
|
| 1442 |
+
computation in an elegant way.
|
| 1443 |
+
Let S be a set and M be a monad. We denote by StateT(S, M) following the mapping:
|
| 1444 |
+
StateT(S, M)(A) = S → M(A × S).
|
| 1445 |
+
In other terms, StateT(S, M)(A) is the set of functions from S to the monadic structure M(A×S) based on couples
|
| 1446 |
+
in the cartesian product (A × S).
|
| 1447 |
+
The mapping StateT(S, M) can be equipped by a structure of functor, defined for any function f from a set A
|
| 1448 |
+
to a set B by
|
| 1449 |
+
StateT(S, M)(f)(state)(s) = M(λ(a, s) → (f(a), s))(state(s)).
|
| 1450 |
+
It can also be equipped with the structure of monad, defined for any function f from a set A to the set StateT(S, M)(B):
|
| 1451 |
+
pure(a) = λs → pure(a, s)
|
| 1452 |
+
bind(f)(state)(s) = state(s) >>= λ(a, s′) → f(a)(s′)
|
| 1453 |
+
9.6
|
| 1454 |
+
Monadic Definitions
|
| 1455 |
+
The previous definitions associated with capture-group expressions can be equivalently restated using the StateT
|
| 1456 |
+
monad transformer specialised with the Set monad.
|
| 1457 |
+
Let us first consider the following claims where M = StateT(Ctxt(Γ, Σ), Set), allowing us to bring closer M
|
| 1458 |
+
and the previous notion of monadic support:
|
| 1459 |
+
– R = (M(1), +, ×, 1, 0) is a semiring by setting:
|
| 1460 |
+
f1 + f2 = λs → f1(s) ∪ f2(s),
|
| 1461 |
+
f1 × f2 = f1 >>= λ_ → f2,
|
| 1462 |
+
1 = λs → {(⊤, s)} = pure(⊤),
|
| 1463 |
+
0 = λs → ∅,
|
| 1464 |
+
– M = (M(Exp(Σ)), ±, 0) is a monoid by setting:
|
| 1465 |
+
± = +,
|
| 1466 |
+
0 = 0,
|
| 1467 |
+
– (M, ⋉) is a Exp(Σ)-right-semimodule by setting:
|
| 1468 |
+
f ⋉ F = λs →
|
| 1469 |
+
�
|
| 1470 |
+
(E,ctxt)∈f(s)
|
| 1471 |
+
{(E · F, ctxt)},
|
| 1472 |
+
– (M, ⊲) is a R-left-semimodule by setting:
|
| 1473 |
+
f1 ⊲ f2 = f1 >>= λ_ → f2.
|
| 1474 |
+
Then, the nullable predicate formulae can be equivalently restated as an element in StateT(Ctxt(Γ, Σ), Set)(1),
|
| 1475 |
+
which is equal by definition to Ctxt(Γ, Σ) → Set(1 × Ctxt(Γ, Σ)), isomorphic to Ctxt(Γ, Σ) → Set(Ctxt(Γ, Σ)). It
|
| 1476 |
+
can inductively be computed as follows:
|
| 1477 |
+
Null(ε) = 1
|
| 1478 |
+
Null(∅) = 0
|
| 1479 |
+
Null(a) = 0
|
| 1480 |
+
Null(E + F) = Null(E) + Null(F)
|
| 1481 |
+
Null(E · F) = Null(E) × Null(F)
|
| 1482 |
+
Null(E∗) = 1
|
| 1483 |
+
Null(x)(ctxt) =
|
| 1484 |
+
�
|
| 1485 |
+
pure((⊤, ctxt))
|
| 1486 |
+
if ctxt(x) = Just(ε),
|
| 1487 |
+
∅
|
| 1488 |
+
otherwise,
|
| 1489 |
+
Null((E)u
|
| 1490 |
+
x)(ctxt) = Set(λ(⊤, ctxt′) → (⊤, [ctxt′]x←u))(Null(F)(ctxt)),
|
| 1491 |
+
where E and F are two Σ, Γ-expressions, a is a symbol in Σ, x is a variable in Γ and u is in Σ∗. Notice that
|
| 1492 |
+
these formulae are the same that the ones in Definition 2 as far as classical operators are concerned, and that these
|
| 1493 |
+
formulae can be easily generalized to other convenient monads than Set.
|
| 1494 |
+
Moreover, the derivative of an expression is an element in StateT(Ctxt(Γ, Σ), Set)(Exp(Σ, Γ)):
|
| 1495 |
+
da(ε) = 0
|
| 1496 |
+
da(∅) = 0
|
| 1497 |
+
da(b) =
|
| 1498 |
+
�
|
| 1499 |
+
0
|
| 1500 |
+
if a ̸= b,
|
| 1501 |
+
pure(ε)
|
| 1502 |
+
otherwise,
|
| 1503 |
+
da(E + F) = da(E) ± da(F)
|
| 1504 |
+
da(E · F) = da(E) ⋉ F + Null(E) ⊲ da(F)
|
| 1505 |
+
da(E∗) = da(E) ⋉ E∗
|
| 1506 |
+
da((E)u
|
| 1507 |
+
x) = StateT(Ctxt(Γ, Σ), Set)(λF → (F)ua
|
| 1508 |
+
x )(da(E))
|
| 1509 |
+
da(x)(ctxt) =
|
| 1510 |
+
�
|
| 1511 |
+
pure((w, ctxt))
|
| 1512 |
+
if ctxt(x) = Just(aw),
|
| 1513 |
+
∅
|
| 1514 |
+
otherwise,
|
| 1515 |
+
|
| 1516 |
+
where E and F are two Σ, Γ-expressions, a is a symbol in Σ, x is a variable in Γ and u is in Σ∗. Once again, notice
|
| 1517 |
+
that these formulae are the same that the ones in Definition 5 as far as classical operators are concerned, and that
|
| 1518 |
+
these formulae can be easily generalized to other convenient monads than Set.
|
| 1519 |
+
Finally, the derivation w.r.t. a word is monadically defined as in previous sections:
|
| 1520 |
+
dε(E) = pure(E),
|
| 1521 |
+
dav(E) = da(E) >>= dv,
|
| 1522 |
+
and the membership test of a word w can be equivalently rewritten as follows:
|
| 1523 |
+
(dw(E) >>= Null)(λ_ → Nothing) ̸= ∅.
|
| 1524 |
+
10
|
| 1525 |
+
Conclusion and Perspectives
|
| 1526 |
+
In this paper, we achieved the first step of our plan to unify the derivative computation over word expressions.
|
| 1527 |
+
Monads are indeed useful tools to abstract the underlying computation structures and thus may allow us to consider
|
| 1528 |
+
some other functionalities, such as capture groups via the well-known StateT monad transformer [10]. We aim to
|
| 1529 |
+
study the conditions satisfying by monads that lead to finite set of derivated terms, and to extend this method
|
| 1530 |
+
to tree expressions using enriched categories. Finally, we plan to extend monadic derivation to other underlying
|
| 1531 |
+
monads for capture groups, linear combinations for example.
|
| 1532 |
+
References
|
| 1533 |
+
1. Antimirov, V.M.: Partial derivatives of regular expressions and finite automaton constructions. Theor. Comput. Sci.
|
| 1534 |
+
155(2) (1996) 291–319
|
| 1535 |
+
2. Attou, S., Mignot, L., Miklarz, C., Nicart, F.: Monadic expressions and their derivatives. In: NCMA. Volume 367 of
|
| 1536 |
+
EPTCS (2022) 49–64
|
| 1537 |
+
3. Berry, G., Sethi, R.:
|
| 1538 |
+
From regular expressions to deterministic automata.
|
| 1539 |
+
Theoretical computer science 48 (1986)
|
| 1540 |
+
117–126
|
| 1541 |
+
4. Brzozowski, J.A.: Derivatives of regular expressions. J. ACM 11(4) (1964) 481–494
|
| 1542 |
+
5. Caron, P., Flouret, M.: From glushkov wfas to k-expressions. Fundam. Informaticae 109(1) (2011) 1–25
|
| 1543 |
+
6. Champarnaud, J., Laugerotte, É., Ouardi, F., Ziadi, D.: From regular weighted expressions to finite automata. Int. J.
|
| 1544 |
+
Found. Comput. Sci. 15(5) (2004) 687–700
|
| 1545 |
+
7. Colcombet, T., Petrisan, D.: Automata and minimization. SIGLOG News 4(2) (2017) 4–27
|
| 1546 |
+
8. Eisenberg, R.A., Weirich, S.: Dependently typed programming with singletons. In: Haskell, ACM (2012) 117–130
|
| 1547 |
+
9. Glushkov, V.M.: The abstract theory of automata. Russian Mathematical Surveys 16(5) (1961) 1
|
| 1548 |
+
10. Jones, M.P.: Functional programming with overloading and higher-order polymorphism. In: Adv. Func. Prog. Volume
|
| 1549 |
+
925 of LNCS, Springer (1995) 97–136
|
| 1550 |
+
11. Kleene, S.: Representation of events in nerve nets and finite automata. Automata Studies Ann. Math. Studies 34
|
| 1551 |
+
(1956) 3–41 Princeton U. Press.
|
| 1552 |
+
12. Loday, J.L., Vallette, B.: Algebraic operads. Volume 346. Springer Science & Business Media (2012)
|
| 1553 |
+
13. Lombardy, S., Sakarovitch, J.: Derivatives of rational expressions with multiplicity. Theor. Comput. Sci. 332(1-3) (2005)
|
| 1554 |
+
141–177
|
| 1555 |
+
14. May, J.P.: The geometry of iterated loop spaces. Volume 271. Springer (2006)
|
| 1556 |
+
15. Mignot, L.: Une proposition d’implantation des structures d’automates, d’expressions et de leurs algorithmes associés
|
| 1557 |
+
utilisant les catégories enrichies (in french).
|
| 1558 |
+
Habilitation à diriger des recherches, Université de Rouen normandie
|
| 1559 |
+
(Décembre 2020) 212 pages.
|
| 1560 |
+
16. Mignot, L.: Monadic derivatives. https://github.com/LudovicMignot/MonadicDerivatives (2022)
|
| 1561 |
+
17. Schützenberger, M.P.: On the definition of a family of automata. Inf. Control. 4(2-3) (1961) 245–270
|
| 1562 |
+
18. Sulzmann, M., Lu, K.Z.M.: POSIX regular expression parsing with derivatives. In: FLOPS. Volume 8475 of Lecture
|
| 1563 |
+
Notes in Computer Science, Springer (2014) 203–220
|
| 1564 |
+
|
0tFPT4oBgHgl3EQfTjTq/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:46a711f10f601c1825a35c4c8b3d94027a479a8a4864de43e97b9d3bcd7b1b79
|
| 3 |
+
size 159172
|
29E2T4oBgHgl3EQfjQdC/content/tmp_files/2301.03966v1.pdf.txt
ADDED
|
@@ -0,0 +1,1687 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
AdvBiom: Adversarial Attacks on Biometric
|
| 2 |
+
Matchers
|
| 3 |
+
Debayan Deb, Vishesh Mistry, Rahul Parthe
|
| 4 |
+
TECH5,
|
| 5 |
+
Troy, MI, USA
|
| 6 |
+
{debayan.deb, vishesh.mistry, rahul.parthe}@tech5-sa.com
|
| 7 |
+
Abstract
|
| 8 |
+
With the advent of deep learning models, face recognition systems have achieved
|
| 9 |
+
impressive recognition rates. The workhorses behind this success are Convolutional
|
| 10 |
+
Neural Networks (CNNs) and the availability of large training datasets. However,
|
| 11 |
+
we show that small human-imperceptible changes to face samples can evade most
|
| 12 |
+
prevailing face recognition systems. Even more alarming is the fact that the same
|
| 13 |
+
generator can be extended to other traits in the future. In this work, we present how
|
| 14 |
+
such a generator can be trained and also extended to other biometric modalities,
|
| 15 |
+
such as fingerprint recognition systems.
|
| 16 |
+
1
|
| 17 |
+
Introduction
|
| 18 |
+
The last decade has seen a massive influx of deep learning-based technologies that have tackled
|
| 19 |
+
problems which were once thought to be unsolvable. Much of this progress can be attributed to
|
| 20 |
+
Convolutional Neural Networks (CNNs) [1, 2] which are now deployed in a plethora of applications
|
| 21 |
+
ranging from cancer detection to driving autonomous vehicles. Akin to the computer vision domain,
|
| 22 |
+
the use of CNNs have completely changed the face of biometrics due to the availability of powerful
|
| 23 |
+
computing devices (GPUs, TPUs) and deep architectures capable of learning rich features [3–5].
|
| 24 |
+
Automated face recognition systems (AFR) have been proven to achieve accuracies as high as 99%
|
| 25 |
+
True Accept Rate (TAR) @ 0.1% False Accept Rate (FAR) [6], majorly owing to publicly available
|
| 26 |
+
large-scale face datasets.
|
| 27 |
+
Unfortunately, studies have shown that CNN-based networks are vulnerable to adversarial pertur-
|
| 28 |
+
bations1 [7–12]. It is not surprising that AFR systems too are not impervious to these attacks.
|
| 29 |
+
Adversarial attacks to an AFR system can be classified into two categories - (i) impersonation attack
|
| 30 |
+
where the hacker tries to perturb his face image to match it to a target victim, and (ii) obfuscation
|
| 31 |
+
attack where the hacker’s face image is perturbed to match with a random identity. Both the above at-
|
| 32 |
+
tacks involve the hacker adding targeted human-imperceptible perturbations to the face image. These
|
| 33 |
+
adversarial attacks are different from face digital manipulation that include attribute manipulation
|
| 34 |
+
and synthetic faces, and also from presentation attacks which involves the perpetrator wearing a
|
| 35 |
+
physical artifact such as a mask or replaying a photograph/video of a genuine individual which may
|
| 36 |
+
be conspicuous in scenarios where human operators are involved.
|
| 37 |
+
Let us consider, as example, the largest deployment of fingerprint recognition systems - India’s
|
| 38 |
+
Aadhaar Project [13], which currently has an enrolled gallery size of about 1.35 billion faces from
|
| 39 |
+
nearly all of its citizens. In September 2022 alone, Aadhaar received 1.3 billion authentication
|
| 40 |
+
requests2. In order to deny a citizen his/her rightful access to government benefits, healthcare, and
|
| 41 |
+
financial services, an attacker can maliciously perturb enrolled face images such that they do not
|
| 42 |
+
1Adversarial perturbations refer to altering an input image instance with small, human imperceptible changes
|
| 43 |
+
in a manner that can evade CNN models.
|
| 44 |
+
2https://bit.ly/3BzlpZJ
|
| 45 |
+
arXiv:2301.03966v1 [cs.CV] 10 Jan 2023
|
| 46 |
+
|
| 47 |
+
match to the genuine person during verification. In a typical AFR system, adversarial faces can
|
| 48 |
+
be replaced with a captured face image in order to prevent the probe face from matching to any of
|
| 49 |
+
its corresponding enrolled faces. Additionally, the attacker can compromise the entire gallery by
|
| 50 |
+
inserting adversarial faces in the enrolled gallery, where no probe face will match to the correct
|
| 51 |
+
identity’s gallery.
|
| 52 |
+
Adversarial attacks can further be categorized into two types of attacks based on how the attack vector
|
| 53 |
+
is trained and generated:
|
| 54 |
+
1. White-box attack: Attacks in which the hacker has full knowledge of the recognition system,
|
| 55 |
+
and iteratively perturbs every pixel by various optimization schemes are termed as white-box
|
| 56 |
+
attacks [14–22].
|
| 57 |
+
2. Black-box attack: With no information about the parameters of the recognition system,
|
| 58 |
+
black-box attacks are deployed by either transferring attacks learned from an available AFR
|
| 59 |
+
system [23–28], or querying the the target system for score [29–31] or decision [32, 33].
|
| 60 |
+
3. Semi-whitebox attack: Here, a white-box model is utilized only during training and then ad-
|
| 61 |
+
versarial examples are synthesized during inference without any knowledge of the deployed
|
| 62 |
+
AFR model.
|
| 63 |
+
We propose an automated adversarial synthesis method, named AdvBiom, which generates an ad-
|
| 64 |
+
versarial image for a probe image and satisfies all the above requirements. The contributions of the
|
| 65 |
+
paper are as follows:
|
| 66 |
+
1. GAN-based AdvBiom that learns to generate visually realistic adversarial face images that
|
| 67 |
+
are misclassified by state-of-the-art automated biometric systems.
|
| 68 |
+
2. Adversarial images generated via AdvBiom are model-agnostic and transferable, and achieve
|
| 69 |
+
high success rate on 5 state-of-the-art automated face recognition systems.
|
| 70 |
+
3. Visualizing regions where pixels are perturbed and analyzing the transferability of AdvBiom .
|
| 71 |
+
4. We show that AdvBiom achieves significantly higher attack success rate under current
|
| 72 |
+
defense mechanisms compared to baselines.
|
| 73 |
+
5. With the addition of the proposed Minutiae Displacement and Distortion modules, we show
|
| 74 |
+
thatAdvBiom can also be extended to successfully evade automated fingerprint recognition
|
| 75 |
+
systems.
|
| 76 |
+
2
|
| 77 |
+
Related Work
|
| 78 |
+
2.1
|
| 79 |
+
Adversarial Attacks
|
| 80 |
+
As discussed earlier, adversarial attacks are broadly classified into white-box attacks and black-box
|
| 81 |
+
attacks. A large number of white-box attacks are gradient-based where they analyze the gradients
|
| 82 |
+
during the back-propagation of an available face recognition system and perform pixel-wise per-
|
| 83 |
+
turbations to the target face image. While approaches such as FGSM [14] and PGD [17] exploit
|
| 84 |
+
the high-dimensional space of deep networks to generate adversarial attacks, C&W [18] focuses on
|
| 85 |
+
minimizing objective functions for optimal adversarial perturbations. However, the basic assump-
|
| 86 |
+
tion in white-box attacks that the target recognition system will be available is not plausible. In
|
| 87 |
+
real-life scenarios, the hacker will not have any information regarding the architecture, training and
|
| 88 |
+
deployment of the recognition system.
|
| 89 |
+
Black-box attacks can be classified into three major categories: transfer-based, score-based, and
|
| 90 |
+
decision-based attacks. Transfer-based attacks train their adversarial attack generator using readily
|
| 91 |
+
available recognition systems and then deploy the attacks onto a black-box target system. Dong et
|
| 92 |
+
al. [23] proposed the use of momentum for efficient transferability of the adversarial samples. DI2-
|
| 93 |
+
FGSM [24] suggested to increase input data diversity for improving transferability. Other approaches
|
| 94 |
+
in this category include AI-FGSM [27] and TI-FGSM [28]. Score-based attacks [29–31] query the
|
| 95 |
+
target system for scores and try to estimate its gradients. Decision-based attacks have the most
|
| 96 |
+
challenging setting wherein only the decisions from the target system are queried. Some effective
|
| 97 |
+
methods in this category include Evolutionary attack [32] and Boundary attack [33].
|
| 98 |
+
2
|
| 99 |
+
|
| 100 |
+
2.2
|
| 101 |
+
Adversarial Attacks on Face Recognition
|
| 102 |
+
Although adversarial attacks on face recognition systems have only been recently explored, there
|
| 103 |
+
has been a significant number of effective approaches for evading AFR systems. Attacks on face
|
| 104 |
+
recognition systems can be broadly categorized into physical attacks and digital attacks. Physical
|
| 105 |
+
attacks involve generating adversarial physical artifacts which are ’worn’ on a face. Sharif et
|
| 106 |
+
al. [34, 35] proposed generating adversarial eye-glass frames for attacking face recognition systems.
|
| 107 |
+
In [36], adversarial printed stickers placed on a hat were generated. However, methods [34–36] are
|
| 108 |
+
implemented in a white-box setting which is unrealistic. Additionally, Nguyen et al. [37] proposed
|
| 109 |
+
an adversarial light projection attack using an on-premise projector. Yin et al. [38] generated and
|
| 110 |
+
printed eye makeup patches to be stuck around the eyes. More recently, authors in [39] proposed an
|
| 111 |
+
adversarial mask for impersonation attacks in a black-box setting. However, all the above methods
|
| 112 |
+
suffer a major drawback of being unrealistic in an operational setting where a human operator is
|
| 113 |
+
present.
|
| 114 |
+
Digital attacks refer to manipulating and perturbing the pixels of a digital face image before being
|
| 115 |
+
passed through a face recognition system. Early works [9, 18, 10, 8, 40] focused on gradient-based
|
| 116 |
+
attacks for face recognition. However, these methods implement lp-norm perturbations to each pixel
|
| 117 |
+
resulting in decreased attack transferability, and vulnerability to denoising models. Cauli et al. [41]
|
| 118 |
+
implemented a backdoor attack where the target face recognition system’s training samples were
|
| 119 |
+
manipulated. Apart from the fact that gaining access to the target AFR’s training samples is highly
|
| 120 |
+
improbable, a thorough visual inspection of the samples can easily identify the digital artifacts. Other
|
| 121 |
+
works employ more stealthy attack approaches against face recognition models. Dong et al. [32]
|
| 122 |
+
proposed an evolutionary optimization method for generating adversarial faces in decision-based
|
| 123 |
+
black-box settings. However, they require a minimum of 1,000 queries to the target face recognition
|
| 124 |
+
system before a realistic adversarial face can be synthesized. [42] added a conditional variational
|
| 125 |
+
autoencoder and attention modules to generate adversarial faces in a transfer-based black-box setting.
|
| 126 |
+
However, they solely focused on impersonation attacks and require at least 5 image samples of the
|
| 127 |
+
target subject for training and inference. Zhong et al. [43] implemented dropout [44] to improve
|
| 128 |
+
the transferability of the adversarial examples. [38] perturbed the eye region of a face to produce
|
| 129 |
+
adversarial eyeshadow artifacts. However, the artifacts are visibly conspicuous under close inspection.
|
| 130 |
+
Deb et al. [25] used a GAN to generate minimal perturbations in salient facial regions. More recently,
|
| 131 |
+
[45] and [46] have focused on manipulating facial attributes for targeted adversarial attacks.
|
| 132 |
+
3
|
| 133 |
+
Adversarial Faces
|
| 134 |
+
3.1
|
| 135 |
+
Preliminaries
|
| 136 |
+
The goal of any attacker is to evade Automated Face Recognition (AFR) systems under either of the
|
| 137 |
+
two settings:
|
| 138 |
+
• Obfuscation Manipulate input face images in a manner such that they cannot be identified
|
| 139 |
+
as the hacker, or
|
| 140 |
+
• Impersonation Edit input face images such that they are identified as a target/desired
|
| 141 |
+
individual (victim).
|
| 142 |
+
While the manipulated face image evades the AFR system, a key requirement in a successful attack is
|
| 143 |
+
such that the input face image should appear as a legitimate face photo of the attacker. In other words,
|
| 144 |
+
the attacker desires an automated method of adding small and human-imperceptible changes to an
|
| 145 |
+
input face image such that it can evade AFR systems while appear benign to human observers. These
|
| 146 |
+
changes are denoted as adversarial perturbations and the manipulated image is hereby referred to as
|
| 147 |
+
adversarial images3. In addition, the automated method of synthesizing adversarial perturbations is
|
| 148 |
+
named as adversarial generator.
|
| 149 |
+
Formally, given an input face image, x, an adversarial generator has two requirements under the
|
| 150 |
+
obfuscation scenario:
|
| 151 |
+
• synthesize an adversarial face image, xadv = x + δ, such that AFR systems fail to match
|
| 152 |
+
xadv and x, and
|
| 153 |
+
3We interchangeably use the terms adversarial images and adversarial faces in this paper.
|
| 154 |
+
3
|
| 155 |
+
|
| 156 |
+
• limit the magnitude of perturbation ||δ||p such that xadv appears very similar to x to humans.
|
| 157 |
+
When the attack aims to impersonate a target individual, we need an image of the victim xtarget
|
| 158 |
+
where the identity of x and xtarget are different. Therefore, constraints under the impersonation
|
| 159 |
+
setting are as follows:
|
| 160 |
+
• synthesize an adversarial face image, xadv = x + δ, such that AFR systems erroneously
|
| 161 |
+
match xadv and xtarget, and
|
| 162 |
+
• limit the magnitude of perturbation ||δ||p such that xadv appears very similar to x to humans.
|
| 163 |
+
Obfuscation attempts (faces are perturbed such that they cannot be identified as the attacker) are gen-
|
| 164 |
+
erally more effective [25], computationally efficient to synthesize [14, 17], and widely adopted [47]
|
| 165 |
+
compared to impersonation attacks (perturbed faces can automatically match to a target subject).
|
| 166 |
+
Therefore, this paper focuses on crafting obfuscation attacks, however, we will still show examples
|
| 167 |
+
on synthesizing impersonation attacks.
|
| 168 |
+
3.2
|
| 169 |
+
Gradient-based Attacks
|
| 170 |
+
In white-box attacks, the attacker is assumed to have the knowledge and access to the AFR system’s
|
| 171 |
+
model and parameters. Naturally, we then expect a much better attack success rate under white-box
|
| 172 |
+
settings since the attacker can carefully craft adversarial perturbations that necessarily evade the target
|
| 173 |
+
AFR system. However, these white-box manipulations of face recognition models are impractical in
|
| 174 |
+
real-world scenarios. For instance, assuming access to an airport’s already deployed AFR system
|
| 175 |
+
may be extremely difficult.
|
| 176 |
+
Nevertheless, it is advantageous to understand prevailing white-box methods. That is, if given access
|
| 177 |
+
to a CNN-based AFR system, how could one utilize all of its model parameters to launch a successful
|
| 178 |
+
adversarial attack?
|
| 179 |
+
A common approach is to utilize gradients of the whitebox AFR models. Namely the attackers modify
|
| 180 |
+
the image in the direction of the gradient of the loss function with respect to the input image. There
|
| 181 |
+
are two prevailing approaches to perform such gradient-based attacks:
|
| 182 |
+
• one-shot attacks, in which the attacker takes a single step in the direction of the gradient,
|
| 183 |
+
and
|
| 184 |
+
• iterative attacks where instead of a single step, several steps are taken until we obtain a
|
| 185 |
+
successful adversarial pattern.
|
| 186 |
+
3.2.1
|
| 187 |
+
Fast Gradient Sign Method (FGSM)
|
| 188 |
+
This method computes an adversarial image by adding a pixel-wide perturbation of magnitude in the
|
| 189 |
+
direction of the gradient [14]. Under FGSM attack, we take a single step towards the direction of the
|
| 190 |
+
gradient, and therefore, FGSM is very efficient in terms of computation time. Formally, given an
|
| 191 |
+
input image x, we obtain an adversarial image xadv:
|
| 192 |
+
xadv = x + ϵ · sign (▽xJ (x, y))
|
| 193 |
+
where, J is the loss function used to train the AFR system (typically, softmax cross entropy loss), and
|
| 194 |
+
y is the ground truth class label of x (typically, the subject ID of the identity in x).
|
| 195 |
+
FGSM was first proposed for the object classification domain and therefore, utilizes softmax proba-
|
| 196 |
+
bilities for crafting adversarial perturbations. Therefore, the number of object classes are assumed to
|
| 197 |
+
be known during training and testing. However, face recognition systems do not utilize the softmax
|
| 198 |
+
layer for classification (as the number of identities are not fixed during deployment) instead features
|
| 199 |
+
from the last fully connected layer are used for comparing face images.
|
| 200 |
+
We first modify FGSM appropriately in order to evade AFR systems rather than object classifiers.
|
| 201 |
+
Instead of considering the softmax cross-entropy loss as J, we craft a new loss function that models
|
| 202 |
+
real-world scenario4:
|
| 203 |
+
LfeatureMatch = 1 − Ex
|
| 204 |
+
�
|
| 205 |
+
F(x) · F(xadv)
|
| 206 |
+
||F(x)|| ||F(xadv)||
|
| 207 |
+
�
|
| 208 |
+
.
|
| 209 |
+
4For brevity, we denote Ex ≡ Ex∈Pdata.
|
| 210 |
+
4
|
| 211 |
+
|
| 212 |
+
where, F is the matcher and F(x) is the feature representation of an input image x. The above feature
|
| 213 |
+
matching loss function computes the cosine distance between a pair of images and ensures that the
|
| 214 |
+
features between adversarial image xadv and input image x are as close as possible. Therefore, the
|
| 215 |
+
gradient of the above loss ensures the features do not match and hence, can be considered as an
|
| 216 |
+
obfuscation adversarial attack.
|
| 217 |
+
In Fig. 1, we show the results of launching our modified FGSM attack on a state-of-the-art AFR
|
| 218 |
+
system, namely ArcFace [3]. We see that with a single step and with minimal perturbations, the real
|
| 219 |
+
and adversarial images of Tiger Woods does not match via ArcFace while humans can easily identity
|
| 220 |
+
both images as pertaining to the same subject.
|
| 221 |
+
(a) Real Input Image
|
| 222 |
+
(b) Perturbation
|
| 223 |
+
(c) FGSM [14]
|
| 224 |
+
Figure 1: Adversarial face synthesized via FGSM [14]. A state-of-the-art face matcher, ArcFace [3], fails to
|
| 225 |
+
match the adversarial and input image. Cosine similarity score (∈ [−1, 1]) between the two images is 0.27,
|
| 226 |
+
while a score above 0.36 (threshold @ 0.1% False Accept Rate) indicates that two faces are of the same subject.
|
| 227 |
+
3.2.2
|
| 228 |
+
Projected Gradient Descent (PGD)
|
| 229 |
+
An extreme case of white-box attacks is the PGD attack [17] where we assume that the attacker also
|
| 230 |
+
has unlimited number of attempts to try and evade the deployed AFR system. Unlike FGSM, PGD is
|
| 231 |
+
an iterative attack. PGD attempts to find the perturbation δ that maximises the loss of a model on a
|
| 232 |
+
particular input while keeping the size of the perturbation smaller than a specified amount referred
|
| 233 |
+
to as ϵ. We keep iterating until such a δ is obtained. Similar to FGSM, we modify the loss function
|
| 234 |
+
of PGD to fit the requirements of AFR system by again considering LfeatureMatch as the loss. Fig.
|
| 235 |
+
2 shows the results of PGD attack on ArcFace matcher. Note that due to multiple iterations, PGD
|
| 236 |
+
attack on AFR systems is more powerful (lower cosine similarity) but also more visible to humans as
|
| 237 |
+
compared to the single-step FGSM attack.
|
| 238 |
+
(a) Real Input Image
|
| 239 |
+
(b) Perturbation
|
| 240 |
+
(c) PGD [17]
|
| 241 |
+
Figure 2: Adversarial face synthesized via PGD [17]. A state-of-the-art face matcher, ArcFace [3], fails to match
|
| 242 |
+
the adversarial and input image. Cosine similarity score (∈ [−1, 1]) between the two images is 0.12, while a
|
| 243 |
+
score above 0.36 (threshold @ 0.1% False Accept Rate) indicates that two faces are of the same subject.
|
| 244 |
+
3.3
|
| 245 |
+
Geometric Perturbations (GFLM)
|
| 246 |
+
Prior efforts in crafting adversarial faces have also tried non-linear deformations as a natural method
|
| 247 |
+
for evading AFR systems [48]. Non-linear deformations are applied by performing geometric warping
|
| 248 |
+
to the input face images.
|
| 249 |
+
Unlike traditional adversarial perturbations that basically add an adversarial perturbation δ, authors
|
| 250 |
+
in [48] propose a fast method of generating adversarial faces by altering the landmark locations of
|
| 251 |
+
the input images. The resulting adversarial faces completely lie on the manifold of natural images,
|
| 252 |
+
which makes it extremely difficult to detect any adversarial perturbations. Results of geometrically
|
| 253 |
+
warped adversarial faces are presented in 3.
|
| 254 |
+
5
|
| 255 |
+
|
| 256 |
+
(a) Real Input Image
|
| 257 |
+
(b) Perturbation
|
| 258 |
+
(c) GFLM
|
| 259 |
+
Figure 3: Adversarial face synthesized via GFLM [48]. A state-of-the-art face matcher, ArcFace [3], fails to
|
| 260 |
+
match the adversarial and input image. Cosine similarity score (∈ [−1, 1]) between the two images is 0.33,
|
| 261 |
+
while a score above 0.36 (threshold @ 0.1% False Accept Rate) indicates that two faces are of the same subject.
|
| 262 |
+
3.4
|
| 263 |
+
Attribute-based Perturbations
|
| 264 |
+
Unlike geometric-warping and gradient-based attacks that may perturb every pixel in the image, a
|
| 265 |
+
few studies propose manipulating only salient regions in faces, e.g., eyes, nose, and mouth.
|
| 266 |
+
By restricting perturbations to only semantic regions of the face, SemanticAdv [46] generates
|
| 267 |
+
adversarial examples in a more controllable fashion by editing a single semantic aspect through
|
| 268 |
+
attribute-conditioned image editing. Fig. 4 shows results from adversarial manipulating semantic
|
| 269 |
+
attributes. We can see while the attacks are indeed successful, it comes at the cost of altering the
|
| 270 |
+
perceived identity as well as leads to degraded image quality.
|
| 271 |
+
(a) Real Input Image
|
| 272 |
+
(b) Blond
|
| 273 |
+
(c) Bangs
|
| 274 |
+
(d) Mouth Open
|
| 275 |
+
(e) Eyeglasses
|
| 276 |
+
(f) Makeup
|
| 277 |
+
Figure 4: Adversarial face synthesized via manipulating semantic attributes [46]. All adversarial images (b-f)
|
| 278 |
+
fail to match with the real image (a) via ArcFace [3].
|
| 279 |
+
4
|
| 280 |
+
AdvBiom: Learning to Synthesize Adversarial Attacks
|
| 281 |
+
We find that majority of prior efforts on crafting adversarial attacks either degrade the visual quality
|
| 282 |
+
where an observant human can still visually pick out the adversarial patterns. We also identify the
|
| 283 |
+
following challenges with prior efforts:
|
| 284 |
+
• Gradient-based attacks rely on white-box settings where the entire deployed CNN-based
|
| 285 |
+
AFR system is available to the attacker to compute its gradients.
|
| 286 |
+
• Geometrically-warping faces generally do not guarantee adversarial success and greatly
|
| 287 |
+
distort the face image.
|
| 288 |
+
• Semantic attribute manipulation can also degrade visual quality and may lead to greater
|
| 289 |
+
conspicuous changes.
|
| 290 |
+
Instead, we propose to train a network to “learn" the salient regions of the face that can be perturbed
|
| 291 |
+
to evade AFR systems in a semi-whitebox setting. These leads to the following advantages over prior
|
| 292 |
+
efforts:
|
| 293 |
+
6
|
| 294 |
+
|
| 295 |
+
• Perceptual Realism Given a large enough training dataset, a network can gradually learn to
|
| 296 |
+
synthesize adversarial face images that are perceptually realistic such that a human observer
|
| 297 |
+
can identify the image as a legitimate face image.
|
| 298 |
+
• Higher Attack Success The faces can be learned to be perturbed in a manner such that they
|
| 299 |
+
cannot be identified as the hacker (obfuscation at- tack) or automatically matched to a target
|
| 300 |
+
subject (impersonation attack) by an AFR system.
|
| 301 |
+
• Controllable The amount of perturbation can also be controllable by the attacker so that
|
| 302 |
+
they can examine the success of the learning model as a function of amount of perturbation.
|
| 303 |
+
• Transferability Due to the semi-whitebox setting: once the network learns to generate the
|
| 304 |
+
perturbed instances based on a single face recognition system, attacks can be transferred to
|
| 305 |
+
any black-box AFR systems.
|
| 306 |
+
We propose an automated adversarial biometric synthesis method, named AdvBiom, which generates
|
| 307 |
+
an adversarial image for a probe face image and satisfies all the above requirements.
|
| 308 |
+
4.1
|
| 309 |
+
Methodology
|
| 310 |
+
Our goal is to synthesize a face image that visually appears to pertain to the target face, yet automatic
|
| 311 |
+
face recognition systems either incorrectly matches the synthesized image to another person or does
|
| 312 |
+
not match to target’s gallery images. AdvBiom comprises of a generator G, a discriminator D, and
|
| 313 |
+
face matcher (see Figure 5).
|
| 314 |
+
Probe
|
| 315 |
+
ℒ"#$
|
| 316 |
+
Synthesized
|
| 317 |
+
+
|
| 318 |
+
ℒ%&'()%)*
|
| 319 |
+
ℒ+',)-,./)%0(
|
| 320 |
+
Adversarial Mask
|
| 321 |
+
1
|
| 322 |
+
ℱ
|
| 323 |
+
3
|
| 324 |
+
Figure 5: Given a probe face image, AdvBiom automatically generates an adversarial mask that is then added to
|
| 325 |
+
the probe to obtain an adversarial face image.
|
| 326 |
+
Generator
|
| 327 |
+
The proposed generator takes an input face image, x ∈ X, and outputs an image, G(x).
|
| 328 |
+
The generator is conditioned on the input image x; for different input faces, we will get different
|
| 329 |
+
synthesized images.
|
| 330 |
+
Since our goal is to obtain an adversarial image that is metrically similar to the probe in the image
|
| 331 |
+
space, x, it is not desirable to perturb all the pixels in the probe image. For this reason, we treat the
|
| 332 |
+
output from the generator as an additive mask and the adversarial face is defined as x + G(x). If
|
| 333 |
+
the magnitude of the pixels in G(x) is minimal, then the adversarial image comprises mostly of the
|
| 334 |
+
probe x. Here, we denote G(x) as an “adversarial mask". In order to bound the magnitude of the
|
| 335 |
+
adversarial mask, we introduce a perturbation loss during training by minimizing the L2 norm5:
|
| 336 |
+
Lperturbation = Ex [max (ϵ, ∥G(x)∥2)]
|
| 337 |
+
(1)
|
| 338 |
+
where ϵ ∈ [0, ∞) is a hyperparameter that controls the minimum amount of perturbation allowed.
|
| 339 |
+
5For brevity, we denote Ex ≡ Ex∈X .
|
| 340 |
+
7
|
| 341 |
+
|
| 342 |
+
In order to achieve our goal of impersonating a target subject’s face or obfuscating one’s own identity,
|
| 343 |
+
we need a face matcher, F, to supervise the training of AdvBiom. For obfuscation attack, at each
|
| 344 |
+
training iteration, AdvBiom tries to minimize the cosine similarity between face embeddings of the
|
| 345 |
+
input probe x and the generated image x + G(x) via an identity loss function:
|
| 346 |
+
Lidentity = Ex[F(x, x + G(x))]
|
| 347 |
+
(2)
|
| 348 |
+
For an impersonation attack, AdvBiom maximizes the cosine similarity between the face embeddings
|
| 349 |
+
of a randomly chosen target’s probe, y, and the generated adversarial face x + G(x) via:
|
| 350 |
+
Lidentity = Ex[1 − F(y, x + G(x))]
|
| 351 |
+
(3)
|
| 352 |
+
The perturbation and identity loss functions enforce the network to learn the salient facial regions
|
| 353 |
+
that can be perturbed minimally in order to evade automatic face recognition systems.
|
| 354 |
+
Discriminator
|
| 355 |
+
Akin to previous works on GANs [49, 50], we introduce a discriminator in order
|
| 356 |
+
to encourage perceptual realism of the generated images. We use a fully-convolution network as a
|
| 357 |
+
patch-based discriminator [50]. Here, the discriminator, D, aims to distinguish between a probe, x,
|
| 358 |
+
and a generated adversarial face image x + G(x) via a GAN loss:
|
| 359 |
+
LGAN =
|
| 360 |
+
Ex [log D(x)] +
|
| 361 |
+
Ex[log(1 − D(x + G(x)))]
|
| 362 |
+
(4)
|
| 363 |
+
Finally, AdvBiom is trained in an end-to-end fashion with the following objectives:
|
| 364 |
+
min
|
| 365 |
+
D LD = −LGAN
|
| 366 |
+
(5)
|
| 367 |
+
min
|
| 368 |
+
G LG = LGAN + λiLidentity + λpLperturbation
|
| 369 |
+
(6)
|
| 370 |
+
where λi and λp are hyper-parameters controlling the relative importance of identity and perturbation
|
| 371 |
+
losses, respectively. Note that LGAN and Lperturbation encourage the generated images to be visually
|
| 372 |
+
similar to the original face images, while Lidentity optimizes for a high attack success rate. After
|
| 373 |
+
training, the generator G can generate an adversarial face image for any input image and can be tested
|
| 374 |
+
on any black-box face recognition system.
|
| 375 |
+
The overall algorithm describing the training procedure of AdvBiom can be found in Algorithm 1.
|
| 376 |
+
4.2
|
| 377 |
+
Experimental Results
|
| 378 |
+
Evaluation Metrics
|
| 379 |
+
We quantify the effectiveness of the adversarial attacks generated by Ad-
|
| 380 |
+
vBiom and other state-of-the-art baselines via (i) attack success rate and (ii) structural similarity
|
| 381 |
+
(SSIM).
|
| 382 |
+
The attack success rate for obfuscation attack is computed as,
|
| 383 |
+
Attack Success Rate = (No. of Comparisons < τ)
|
| 384 |
+
Total No. of Comparisons
|
| 385 |
+
(7)
|
| 386 |
+
where each comparison consists of a subject’s adversarial probe and an enrollment image. Here, τ
|
| 387 |
+
is a pre-determined threshold computed at, say, 0.1% FAR6. Attack success rate for impersonation
|
| 388 |
+
attack is defined as,
|
| 389 |
+
Attack Success Rate = (No. of Comparisons ≥ τ)
|
| 390 |
+
Total No. of Comparisons
|
| 391 |
+
(8)
|
| 392 |
+
Here, a comparison comprises of an adversarial image synthesized with a target’s probe and matched
|
| 393 |
+
to the target’s enrolled image. We evaluate the success rate for the impersonation setting via 10-fold
|
| 394 |
+
cross-validation where each fold consists of a randomly chosen target.
|
| 395 |
+
Similar to prior studies [42], in order to measure the similarity between the adversarial example and
|
| 396 |
+
the input face, we compute the structural similarity index (SSIM) between the images. SSIM is a
|
| 397 |
+
normalized metric between −1 (completely different image pairs) to 1 (identical image pairs).
|
| 398 |
+
6For each face matcher, we pre-compute the threshold at 0.1% FAR on all possible image pairs in LFW.
|
| 399 |
+
For e.g., threshold @ 0.1% FAR for ArcFace is 0.28.
|
| 400 |
+
8
|
| 401 |
+
|
| 402 |
+
Algorithm 1 Training AdvBiom. All experiments in this work use α = 0.0001, β1 = 0.5, β2 = 0.9,
|
| 403 |
+
λi = 10.0, λp = 1.0, m = 32.
|
| 404 |
+
We set ϵ = 3.0 (obfuscation), ϵ = 8.0 (impersonation).
|
| 405 |
+
1: Input
|
| 406 |
+
2:
|
| 407 |
+
X
|
| 408 |
+
Training Dataset
|
| 409 |
+
3:
|
| 410 |
+
F
|
| 411 |
+
Cosine similarity between an image pair obtained by biometric matcher
|
| 412 |
+
4:
|
| 413 |
+
G
|
| 414 |
+
Generator with weights Gθ
|
| 415 |
+
5:
|
| 416 |
+
D
|
| 417 |
+
Discriminator with weights Dθ
|
| 418 |
+
6:
|
| 419 |
+
m
|
| 420 |
+
Batch size
|
| 421 |
+
7:
|
| 422 |
+
α
|
| 423 |
+
Learning rate
|
| 424 |
+
8: for number of training iterations do
|
| 425 |
+
9:
|
| 426 |
+
Sample a batch of probes {x(i)}m
|
| 427 |
+
i=1 ∼ X
|
| 428 |
+
10:
|
| 429 |
+
if impersonation attack then
|
| 430 |
+
11:
|
| 431 |
+
Sample a batch of target images y(i) ∼ X
|
| 432 |
+
12:
|
| 433 |
+
δ(i) = G((x(i), y(i))
|
| 434 |
+
13:
|
| 435 |
+
else if obfuscation attack then
|
| 436 |
+
14:
|
| 437 |
+
δ(i) = G(x(i))
|
| 438 |
+
15:
|
| 439 |
+
end if
|
| 440 |
+
16:
|
| 441 |
+
x(i)
|
| 442 |
+
adv = x(i) + δ(i)
|
| 443 |
+
17:
|
| 444 |
+
Lperturbation = 1
|
| 445 |
+
m
|
| 446 |
+
��m
|
| 447 |
+
i=1 max
|
| 448 |
+
�
|
| 449 |
+
ϵ, ||δ(i)||2
|
| 450 |
+
��
|
| 451 |
+
18:
|
| 452 |
+
if impersonation attack then
|
| 453 |
+
19:
|
| 454 |
+
Lidentity = 1
|
| 455 |
+
m
|
| 456 |
+
��m
|
| 457 |
+
i=1 F
|
| 458 |
+
�
|
| 459 |
+
x(i), x(i)
|
| 460 |
+
adv
|
| 461 |
+
��
|
| 462 |
+
20:
|
| 463 |
+
else if obfuscation attack then
|
| 464 |
+
21:
|
| 465 |
+
Lidentity = 1
|
| 466 |
+
m
|
| 467 |
+
��m
|
| 468 |
+
i=1
|
| 469 |
+
�
|
| 470 |
+
1 − F
|
| 471 |
+
�
|
| 472 |
+
y(i), x(i)
|
| 473 |
+
adv
|
| 474 |
+
���
|
| 475 |
+
22:
|
| 476 |
+
end if
|
| 477 |
+
23:
|
| 478 |
+
LG
|
| 479 |
+
GAN = 1
|
| 480 |
+
m
|
| 481 |
+
��m
|
| 482 |
+
i=1 log
|
| 483 |
+
�
|
| 484 |
+
1 − D(x(i)
|
| 485 |
+
adv)
|
| 486 |
+
��
|
| 487 |
+
24:
|
| 488 |
+
LD = 1
|
| 489 |
+
m
|
| 490 |
+
�m
|
| 491 |
+
i=1
|
| 492 |
+
�
|
| 493 |
+
log
|
| 494 |
+
�
|
| 495 |
+
D(x(i))
|
| 496 |
+
�
|
| 497 |
+
+ log
|
| 498 |
+
�
|
| 499 |
+
1 − D(x(i)
|
| 500 |
+
adv)
|
| 501 |
+
��
|
| 502 |
+
25:
|
| 503 |
+
LG = LG
|
| 504 |
+
GAN + λiLidentity + λpLperturbation
|
| 505 |
+
26:
|
| 506 |
+
Gθ = Adam(▽GLG, Gθ, α, β1, β2)
|
| 507 |
+
27:
|
| 508 |
+
Dθ = Adam(▽DLD, Dθ, α, β1, β2)
|
| 509 |
+
28: end for
|
| 510 |
+
Datasets
|
| 511 |
+
We train AdvBiom on CASIA-WebFace [51] and then test on LFW [52]7.
|
| 512 |
+
• CASIA-WebFace [51] is comprised of 494,414 face images belonging to 10,575 different
|
| 513 |
+
subjects. We removed 84 subjects that are also present in LFW and the testing images in
|
| 514 |
+
this paper.
|
| 515 |
+
• LFW [52] contains 13,233 web-collected images of 5,749 different subjects. In order to
|
| 516 |
+
compute the attack success rate, we only consider subjects with at least two face images.
|
| 517 |
+
After this filtering, 9,614 face images of 1,680 subjects are available for evaluation.
|
| 518 |
+
All the testing images in this paper have no identity overlap with the training set, CASIA-
|
| 519 |
+
WebFace [51].
|
| 520 |
+
Data Preprocessing
|
| 521 |
+
All face images are passed through MTCNN face detector [53] to detect five
|
| 522 |
+
landmarks (two eyes, nose, and two mouth corners). Via similarity transformation, the face images
|
| 523 |
+
are aligned. After transformation, the images are resized to 160 × 160. Prior to training and testing,
|
| 524 |
+
each pixel in the RGB image is normalized by subtracting 127.5 and dividing by 128.
|
| 525 |
+
Experimental Settings
|
| 526 |
+
We use ADAM optimizers in Tensorflow with β1 = 0.5 and β2 = 0.9 for
|
| 527 |
+
the entire network. Each mini-batch consists of 32 face images. We train AdvBiom for 200,000 steps
|
| 528 |
+
with a fixed learning rate of 0.0001. Since our goal is to generate adversarial faces with high success
|
| 529 |
+
7Training on CASIA-WebFace and evaluating on LFW is a common approach in face recognition literature [3,
|
| 530 |
+
4]
|
| 531 |
+
9
|
| 532 |
+
|
| 533 |
+
rate, the identity loss is of utmost importance. We empirically set λi = 10.0 and λp = 1.0. We
|
| 534 |
+
train two separate models and set ϵ = 3.0 and ϵ = 8.0 for obfuscation and impersonation attacks,
|
| 535 |
+
respectively.
|
| 536 |
+
Gallery
|
| 537 |
+
Probe
|
| 538 |
+
Proposed AdvBiom
|
| 539 |
+
GFLM [48]
|
| 540 |
+
PGD [17]
|
| 541 |
+
FGSM [14]
|
| 542 |
+
0.68
|
| 543 |
+
0.14
|
| 544 |
+
0.26
|
| 545 |
+
0.27
|
| 546 |
+
0.04
|
| 547 |
+
0.38
|
| 548 |
+
0.08
|
| 549 |
+
0.12
|
| 550 |
+
0.21
|
| 551 |
+
0.02
|
| 552 |
+
(a) Obfuscation Attack
|
| 553 |
+
Target’s Gallery Target’s Probe
|
| 554 |
+
Probe
|
| 555 |
+
Proposed AdvBiom
|
| 556 |
+
A3GN [42]
|
| 557 |
+
FGSM [14]
|
| 558 |
+
0.78
|
| 559 |
+
0.10
|
| 560 |
+
0.30
|
| 561 |
+
0.29
|
| 562 |
+
0.36
|
| 563 |
+
0.80
|
| 564 |
+
0.15
|
| 565 |
+
0.34
|
| 566 |
+
0.33
|
| 567 |
+
0.42
|
| 568 |
+
(b) Impersonation Attack
|
| 569 |
+
Figure 6: Adversarial face synthesis results on LFW dataset in (a) obfuscation and (b) impersonation attack
|
| 570 |
+
settings (cosine similarity scores obtained from ArcFace [3] with threshold @ 0.1% FAR= 0.28). The proposed
|
| 571 |
+
method synthesizes adversarial faces that are seemingly inconspicuous and maintain high perceptual quality.
|
| 572 |
+
Architecture
|
| 573 |
+
Let c7s1-k be a 7 × 7 convolutional layer with k filters and stride 1. dk denotes a
|
| 574 |
+
4 × 4 convolutional layer with k filters and stride 2. Rk denotes a residual block that contains two
|
| 575 |
+
3 × 3 convolutional layers. uk denotes a 2× upsampling layer followed by a 5 × 5 convolutional
|
| 576 |
+
layer with k filters and stride 1. We apply Instance Normalization and Batch Normalization to the
|
| 577 |
+
generator and discriminator, respectively. We use Leaky ReLU with slope 0.2 in the discriminator
|
| 578 |
+
and ReLU activation in the generator. The architectures of the two modules are as follows:
|
| 579 |
+
• Generator:
|
| 580 |
+
c7s1-64,d128,d256,R256,R256,R256, u128, u64, c7s1-3
|
| 581 |
+
• Discriminator:
|
| 582 |
+
d32,d64,d128,d256,d512
|
| 583 |
+
A 1 × 1 convolutional layer with 3 filters and stride 1 is attached to the last convolutional layer of the
|
| 584 |
+
discriminator for the patch-based GAN loss LGAN.
|
| 585 |
+
We apply the tanh activation function on the last convolution layer of the generator to ensure
|
| 586 |
+
that the generated image ∈ [−1, 1]. In the paper, we denoted the output of the tanh layer as an
|
| 587 |
+
“adversarial mask”, G(x) ∈ [−1, 1] and x ∈ [−1, 1]. The final adversarial image is computed as
|
| 588 |
+
10
|
| 589 |
+
|
| 590 |
+
Obfuscation Attack
|
| 591 |
+
Proposed AdvBiom
|
| 592 |
+
GFLM [48]
|
| 593 |
+
PGD [17]
|
| 594 |
+
FGSM [14]
|
| 595 |
+
Attack Success Rate (%) @ 0.1% FAR
|
| 596 |
+
FaceNet [5]
|
| 597 |
+
99.67
|
| 598 |
+
23.34
|
| 599 |
+
99.70
|
| 600 |
+
99.96
|
| 601 |
+
SphereFace [4]
|
| 602 |
+
97.22
|
| 603 |
+
29.49
|
| 604 |
+
99.34
|
| 605 |
+
98.71
|
| 606 |
+
ArcFace [3]
|
| 607 |
+
64.53
|
| 608 |
+
03.43
|
| 609 |
+
33.25
|
| 610 |
+
35.30
|
| 611 |
+
COTS-A
|
| 612 |
+
82.98
|
| 613 |
+
08.89
|
| 614 |
+
18.74
|
| 615 |
+
32.48
|
| 616 |
+
COTS-B
|
| 617 |
+
60.71
|
| 618 |
+
05.05
|
| 619 |
+
01.49
|
| 620 |
+
18.75
|
| 621 |
+
Structural Similarity
|
| 622 |
+
0.95 ± 0.01
|
| 623 |
+
0.82 ± 0.12
|
| 624 |
+
0.29 ± 0.06
|
| 625 |
+
0.25 ± 0.06
|
| 626 |
+
Computation Time (s)
|
| 627 |
+
0.01
|
| 628 |
+
3.22
|
| 629 |
+
11.74
|
| 630 |
+
0.03
|
| 631 |
+
Impersonation Attack
|
| 632 |
+
Proposed AdvBiom
|
| 633 |
+
A3GN [42]
|
| 634 |
+
PGD [17]
|
| 635 |
+
FGSM [14]
|
| 636 |
+
Attack Success Rate (%) @ 0.1% FAR
|
| 637 |
+
FaceNet [5]
|
| 638 |
+
20.85 ± 0.40
|
| 639 |
+
05.99 ± 0.19
|
| 640 |
+
76.79 ± 0.26
|
| 641 |
+
13.04 ± 0.12
|
| 642 |
+
SphereFace [4]
|
| 643 |
+
20.19 ± 0.27
|
| 644 |
+
07.94 ± 0.19
|
| 645 |
+
09.03 ± 0.39
|
| 646 |
+
02.34 ± 0.03
|
| 647 |
+
ArcFace [3]
|
| 648 |
+
24.30 ± 0.44
|
| 649 |
+
17.14 ± 0.29
|
| 650 |
+
19.50 ± 1.95
|
| 651 |
+
08.34 ± 0.21
|
| 652 |
+
COTS-A
|
| 653 |
+
20.75 ± 0.35
|
| 654 |
+
15.01 ± 0.30
|
| 655 |
+
01.76 ± 0.10
|
| 656 |
+
01.40 ± 0.08
|
| 657 |
+
COTS-B
|
| 658 |
+
19.85 ± 0.28
|
| 659 |
+
10.23 ± 0.50
|
| 660 |
+
12.49 ± 0.24
|
| 661 |
+
04.67 ± 0.16
|
| 662 |
+
Structural Similarity
|
| 663 |
+
0.92 ± 0.02
|
| 664 |
+
0.69 ± 0.04
|
| 665 |
+
0.77 ± 0.04
|
| 666 |
+
0.48 ± 0.75
|
| 667 |
+
Computation Time (s)
|
| 668 |
+
0.01
|
| 669 |
+
0.04
|
| 670 |
+
11.74
|
| 671 |
+
0.03
|
| 672 |
+
White-box matcher (used for training)
|
| 673 |
+
Black-box matcher (never used in training)
|
| 674 |
+
Table 1: Attack success rates and structural similarities between probe and gallery images for obfus-
|
| 675 |
+
cation and impersonation attacks. Attack rates for obfuscation comprises of 484,514 comparisons and
|
| 676 |
+
the mean and standard deviation across 10-folds for impersonation reported. The mean and standard
|
| 677 |
+
deviation of the structural similarities between adversarial and probe images along with the time
|
| 678 |
+
taken to generate a single adversarial image (on a Quadro M6000 GPU) also reported.
|
| 679 |
+
xadv = 2 × clamp
|
| 680 |
+
�
|
| 681 |
+
G(x) +
|
| 682 |
+
� x+1
|
| 683 |
+
2
|
| 684 |
+
��1
|
| 685 |
+
0 − 1. This ensures G(x) can either add or subtract pixels from
|
| 686 |
+
x when G(x) ̸= 0. When G(x) → 0, then xadv → x.
|
| 687 |
+
Face Recognition Systems
|
| 688 |
+
For all our experiments, we employ 5 state-of-the-art face matchers8.
|
| 689 |
+
Three of them are publicly available, namely, FaceNet [5], SphereFace [4], and ArcFace [3]. We also
|
| 690 |
+
report our results on two commercial-off-the-shelf (COTS) face matchers, COTS-A and COTS-B9.
|
| 691 |
+
We use FaceNet [5] as the white-box face recognition model, F, during training. All the testing
|
| 692 |
+
images in this paper are generated from the same model (trained only with FaceNet) and tested on
|
| 693 |
+
different matchers.
|
| 694 |
+
4.2.1
|
| 695 |
+
Comparison with Prevailing Adversarial Face Generators
|
| 696 |
+
We compare our adversarial face synthesis method with state-of-the-art methods that have specifi-
|
| 697 |
+
cally been implemented or proposed for faces, including GFLM [48], PGD [17], FGSM [14], and
|
| 698 |
+
A3GN [42]10. In Table 1, we find that compared to the state-of-the-art, AdvBiom generates adversarial
|
| 699 |
+
faces that are similar to the probe 6.
|
| 700 |
+
Moreover, the adversarial images attain a high obfuscation attack success rate on 4 state-of-the-art
|
| 701 |
+
black-box AFR systems in both obfuscation and impersonation settings. AdvBiom learns to perturb
|
| 702 |
+
the salient regions of the face, unlike PGD [17] and FGSM [14], which alter every pixel in the
|
| 703 |
+
image. GFLM [48], on the other hand, geometrically warps the face images and thereby, results
|
| 704 |
+
in low structural similarity. In addition, the state-of-the-art matchers are robust to such geometric
|
| 705 |
+
deformation which explains the low success rate of GFLM on face matchers. A3GN, another
|
| 706 |
+
GAN-based method, however, fails to achieve a reasonable success rate in an impersonation setting.
|
| 707 |
+
8All the open-source and COTS matchers achieve 99% accuracy on LFW under LFW protocol.
|
| 708 |
+
9Both COTS-A and COTS-B utilize CNNs for face recognition. COTS-B is one of the top performers in the
|
| 709 |
+
NIST Ongoing Face Recognition Vendor Test (FRVT) [54].
|
| 710 |
+
10We train the baselines using their official implementations (detailed in the supplementary material).
|
| 711 |
+
11
|
| 712 |
+
|
| 713 |
+
4.2.2
|
| 714 |
+
Ablation Study
|
| 715 |
+
In order to analyze the importance of each module in our system, in Figure 7, we train three variants
|
| 716 |
+
of AdvBiom for comparison by removing the discriminator (D), perturbation loss Lperturbation, and
|
| 717 |
+
identity loss Lidentity, respectively.
|
| 718 |
+
Input
|
| 719 |
+
w/o D
|
| 720 |
+
w/o Lprt
|
| 721 |
+
w/o Lidt
|
| 722 |
+
with all
|
| 723 |
+
Figure 7: Variants of AdvBiom trained without the discriminator, perturbation loss, and identity loss, respectively.
|
| 724 |
+
Every component of AdvBiom is necessary.
|
| 725 |
+
The discriminator helps to ensure the visual quality of the synthesized faces are maintained. With
|
| 726 |
+
the generator alone, undesirable artifacts are introduced. Without the proposed perturbation loss,
|
| 727 |
+
perturbations in the adversarial mask are unbounded and therefore, leads to a lack in perceptual
|
| 728 |
+
quality. The identity loss is imperative in ensuring an adversarial image is obtained. Without the
|
| 729 |
+
identity loss, the synthesized image cannot evade state-of-the-art face matchers. We find that every
|
| 730 |
+
component of AdvBiom is necessary in order to obtain an adversarial face that is not only perceptually
|
| 731 |
+
realistic but can also evade state-of-the-art face matchers.
|
| 732 |
+
4.2.3
|
| 733 |
+
What is AdvBiom Learning?
|
| 734 |
+
Via Lperturbation, during training, AdvBiom learns to perturb only the salient facial regions that can
|
| 735 |
+
evade the face matcher, F (FaceNet [5] in our case). In Figure 8, AdvBiom synthesizes the adversarial
|
| 736 |
+
masks corresponding to the probes. We then threshold the mask to extract pixels with perturbation
|
| 737 |
+
magnitudes exceeding 0.40. It can be inferred that the eyebrows, eyeballs, and nose contain highly
|
| 738 |
+
discriminative information that an AFR system utilizes to identify an individual. Therefore, perturbing
|
| 739 |
+
these salient regions are enough to evade state-of-the-art face recognition systems.
|
| 740 |
+
4.2.4
|
| 741 |
+
Transferability of AdvBiom
|
| 742 |
+
In Table 1, we find that attacks synthesized by AdvBiom when trained on a white-box matcher
|
| 743 |
+
(FaceNet), can successfully evade 5 other face matchers that are not utilized during training in both
|
| 744 |
+
obfuscation and impersonation settings. In order to investigate the transferability property of AdvBiom,
|
| 745 |
+
we extract face embeddings of real images and their corresponding adversarial images, under the
|
| 746 |
+
obfuscation setting, via the white-box matcher (FaceNet) and a black-box matcher (ArcFace). In total,
|
| 747 |
+
we extract feature vectors from 1,456 face images of 10 subjects in the LFW dataset [52]. In Figure 9,
|
| 748 |
+
we plot the correlation heatmap between face features of real images, their corresponding adversarial
|
| 749 |
+
masks and adversarial images. First, we observe that face embeddings of real images extracted by
|
| 750 |
+
FaceNet and ArcFace are correlated in a similar fashion. This indicates that both matchers extract
|
| 751 |
+
features with related pairwise correlations. Consequently, perturbing salient features for FaceNet
|
| 752 |
+
can lead to high attack success rates for ArcFace as well. The similarity among the correlation
|
| 753 |
+
distributions of both matchers can also be observed when adversarial masks and adversarial images
|
| 754 |
+
are input to the matchers. That is, receptive fields for automatic face recognition systems attend to
|
| 755 |
+
similar regions in the face.
|
| 756 |
+
12
|
| 757 |
+
|
| 758 |
+
Probe
|
| 759 |
+
Adv. Mask
|
| 760 |
+
Visualization
|
| 761 |
+
Adv. Image
|
| 762 |
+
0.12
|
| 763 |
+
0.26
|
| 764 |
+
Figure 8: State-of-the-art face matchers can be evaded by slightly perturbing salient facial regions, such as
|
| 765 |
+
eyebrows, eyeballs, and nose (cosine similarity obtained via ArcFace [3]).
|
| 766 |
+
Figure 9: Correlation between face features extracted via FaceNet and ArcFace from 1,456 images belonging to
|
| 767 |
+
10 subjects.
|
| 768 |
+
To further illustrate the distributions of the embeddings of real and synthesized images, we plot
|
| 769 |
+
the 2D t-SNE visualization of the face embeddings for the 10 subjects in Figure 10. The identity
|
| 770 |
+
clusterings can be clearly observed from both real and adversarial images. In particular, the adversarial
|
| 771 |
+
counterpart of each subject forms a new cluster that draws closer to the adversarial clusterings of
|
| 772 |
+
other subjects. This shows that AdvBiom perturbs only salient pixels related to face identity while
|
| 773 |
+
maintaining a semantic meaning in the feature space, resulting in a similar manifold of synthesized
|
| 774 |
+
faces to that of real faces.
|
| 775 |
+
4.2.5
|
| 776 |
+
Controllable Perturbation
|
| 777 |
+
The perturbation loss, Lperturbation is bounded by a hyper-parameter, ϵ, i.e., the L2 norm of the
|
| 778 |
+
adversarial mask must be at least ϵ. Without this constraint, the adversarial mask becomes a blank
|
| 779 |
+
image with no changes to the probe. With ϵ, we can observe a trade-off between the attack success
|
| 780 |
+
rate and the structural similarity between the probe and synthesized adversarial face (Fig. 11). A
|
| 781 |
+
higher ϵ leads to less perturbation restriction, resulting in a higher attack success rate at the cost of a
|
| 782 |
+
lower structural similarity. For an impersonation attack, this implies that the adversarial image may
|
| 783 |
+
13
|
| 784 |
+
|
| 785 |
+
Real Image
|
| 786 |
+
Adversarial Mask
|
| 787 |
+
Adversarial Image
|
| 788 |
+
0.8
|
| 789 |
+
FaceNet
|
| 790 |
+
0.4
|
| 791 |
+
0.0
|
| 792 |
+
ArcFace
|
| 793 |
+
-0.4FaceNet
|
| 794 |
+
Real Image
|
| 795 |
+
Adversarial Image (Obfuscation)
|
| 796 |
+
ArcFace
|
| 797 |
+
Figure 10: 2D t-SNE visualization of face representations extracted via FaceNet and ArcFace from 1,456 images
|
| 798 |
+
belonging to 10 subjects.
|
| 799 |
+
contain facial features from both the hacker and the target. In our experiments, we chose ϵ = 8.0 and
|
| 800 |
+
ϵ = 3.0 for impersonation and obfuscation attacks, respectively.
|
| 801 |
+
4
|
| 802 |
+
6
|
| 803 |
+
8
|
| 804 |
+
10
|
| 805 |
+
12
|
| 806 |
+
14
|
| 807 |
+
16
|
| 808 |
+
0.81
|
| 809 |
+
0.92
|
| 810 |
+
0.95
|
| 811 |
+
0.76
|
| 812 |
+
0.69
|
| 813 |
+
5
|
| 814 |
+
13
|
| 815 |
+
21
|
| 816 |
+
39
|
| 817 |
+
52
|
| 818 |
+
60
|
| 819 |
+
66
|
| 820 |
+
Hyper-parameter (ε)
|
| 821 |
+
Success Rate (%)
|
| 822 |
+
Structural Similarity
|
| 823 |
+
ε = 4.0
|
| 824 |
+
ε = 8.0
|
| 825 |
+
ε = 10.0
|
| 826 |
+
ε = 16.0
|
| 827 |
+
Figure 11: Trade-off between attack success rate and structural similarity for impersonation attacks.
|
| 828 |
+
4.2.6
|
| 829 |
+
Attacks via AdvBiom Beyond Faces
|
| 830 |
+
We now show that the AdvBiommethod, coupled with the proposed Minutiae Displacement and
|
| 831 |
+
Distortion Modules, can be extended to effectively generate adversarial fingerprints which are visually
|
| 832 |
+
similar to corresponding probe fingerprints while evading two state-of-the-art COTS fingerprint
|
| 833 |
+
matchers as well as a deep network-based fingerprint matcher.
|
| 834 |
+
14
|
| 835 |
+
|
| 836 |
+
FS: 0.97
|
| 837 |
+
FS: 0.92
|
| 838 |
+
(a) Enrolled Mate
|
| 839 |
+
VS: 235 | FS: 0.96
|
| 840 |
+
VS: 172 | FS: 0.99
|
| 841 |
+
(b) Input Probe
|
| 842 |
+
VS: 31 | FS: 0.92
|
| 843 |
+
VS: 10 | FS: 0.92
|
| 844 |
+
(c) AdvBiom
|
| 845 |
+
VS: 134 | FS: 0.96
|
| 846 |
+
VS: 104 | FS: 0.96
|
| 847 |
+
(d) DeepFool [16]
|
| 848 |
+
VS: 139 | FS: 0.95
|
| 849 |
+
VS: 104 | FS: 0.96
|
| 850 |
+
(d) PGD [17]
|
| 851 |
+
Figure 12: Example probe and corresponding mate fingerprints along with synthesized adversarial probes. (a)
|
| 852 |
+
Two example mate fingerprints from NIST SD4 [55], and (b) the corresponding mates. Adversarial probe
|
| 853 |
+
fingerprints using different approaches are shown in: (c) proposed synthesis method, AdvBiom; (d-e) state-of-
|
| 854 |
+
the-art methods, DeepFool and PGD respectively. VeriFinger v11.0 match score (probe v. mate) - VS, and the
|
| 855 |
+
fingerprintness score (degree of similarity of a given image to a fingerprint pattern) - FS ∈ [0,1] [56], which
|
| 856 |
+
ranges from 1 (the highest) to 0 (the lowest), are given below each image. A VS of above 48 (at 0.01% FAR)
|
| 857 |
+
indicates a successful match between the probe and the mate. The proposed attack AdvBiom successfully
|
| 858 |
+
evades COTS and deep network-based matchers, while maintaining visual fingerprint perceptibility and high
|
| 859 |
+
fingerprintness scores.
|
| 860 |
+
Grosz et. al [57] showed that random minutiae position displacements and non-linear distortions
|
| 861 |
+
drastically affected the performance of COTS fingerprint matchers. AdvBiom builds upon these two
|
| 862 |
+
perturbations and when given a probe fingerprint, can synthesize an adversarial fingerprint image that
|
| 863 |
+
retains all of the original fingerprint attributes except the identity, i.e. a fingerprint recognition system
|
| 864 |
+
should not match the adversarial fingerprint to the probe fingerprint (obfuscation attack).
|
| 865 |
+
Figure 13 shows the schematic of AdvBiom conditioned for fingerprints. The following subsections
|
| 866 |
+
explain the major components of the approach in detail.
|
| 867 |
+
Minutiae Displacement Module
|
| 868 |
+
While the authors in [57] showed the effectiveness of random
|
| 869 |
+
minutiae position displacements on COTS matchers, they studied the effect of this perturbation by
|
| 870 |
+
directly modifying the minutiae template instead of the fingerprint image (pixel space). However, it
|
| 871 |
+
may be difficult to obtain the minutiae template of a given fingerprint image using COTS minutiae
|
| 872 |
+
extractors rather than the source fingerprint image itself. Thus, we propose a minutiae displacement
|
| 873 |
+
module Gdisp which, given a fingerprint image, displaces its minutiae points in random directions by
|
| 874 |
+
a predefined distance. To extract minutiae points from a fingerprint image, we employ a minutiae map
|
| 875 |
+
extractor (M) from [58]. For a fingerprint image of width w and height h, M outputs a 12 channel
|
| 876 |
+
heat map H ∈ Rh×w×12, where if H(i,j,c), value of the heat map at position (i,j) and channel c, is
|
| 877 |
+
greater than a threshold mt and is the local maximum in its 5 × 5 × 3 neighboring cube, a minutiae is
|
| 878 |
+
marked at (i,j). The minutiae direction θ is calculated by maximising the quadratic interpolation with
|
| 879 |
+
respect to:
|
| 880 |
+
f
|
| 881 |
+
�
|
| 882 |
+
(c − 1) × π
|
| 883 |
+
6
|
| 884 |
+
�
|
| 885 |
+
= H (i, j, (c − 1)%12)
|
| 886 |
+
(9)
|
| 887 |
+
f
|
| 888 |
+
�
|
| 889 |
+
c × π
|
| 890 |
+
6
|
| 891 |
+
�
|
| 892 |
+
= H(i, j, c)
|
| 893 |
+
(10)
|
| 894 |
+
f
|
| 895 |
+
�
|
| 896 |
+
(c + 1) × π
|
| 897 |
+
6
|
| 898 |
+
�
|
| 899 |
+
= H(i, j, (c + 1)%12)
|
| 900 |
+
(11)
|
| 901 |
+
Figure 14 shows a fingerprint image and its corresponding 12 channel minutiae map. Once M
|
| 902 |
+
extracts a minutiae map Hprobe from the input probe fingerprint x, we detect minutiae points by
|
| 903 |
+
applying a threshold of 0.2 on Hprobe and finding closed contours. Each detected contour, at say
|
| 904 |
+
15
|
| 905 |
+
|
| 906 |
+
𝑀𝑖𝑛𝑢𝑡𝑖𝑎𝑒 𝑀𝑎𝑝
|
| 907 |
+
Extractor (ℳ)
|
| 908 |
+
𝐷𝑖𝑠𝑐𝑟𝑖𝑚𝑖𝑛𝑎𝑡𝑜𝑟
|
| 909 |
+
(𝒟)
|
| 910 |
+
GAN Loss
|
| 911 |
+
ℒgan
|
| 912 |
+
𝑀𝑖𝑛. 𝐷𝑖𝑠𝑝𝑙𝑎𝑐𝑒𝑚𝑒𝑛𝑡
|
| 913 |
+
Module (𝒢𝑑𝑖𝑠𝑝)
|
| 914 |
+
Probe Fingerprint
|
| 915 |
+
Displaced Fingerprint
|
| 916 |
+
Original M.Map
|
| 917 |
+
𝑀𝑖𝑛𝑢𝑡𝑖𝑎𝑒 𝑃𝑖𝑥.
|
| 918 |
+
Displacement
|
| 919 |
+
Target M.Map
|
| 920 |
+
M.Map Sim Loss
|
| 921 |
+
ℒmmap_sim
|
| 922 |
+
Pixel Loss
|
| 923 |
+
ℒpixel
|
| 924 |
+
Predicted M.Map
|
| 925 |
+
M.Map Dis Loss
|
| 926 |
+
ℒmmap_dis
|
| 927 |
+
𝐷𝑖𝑠𝑡𝑜𝑟𝑡𝑖𝑜𝑛
|
| 928 |
+
Module (𝒢𝑑𝑖𝑠𝑡)
|
| 929 |
+
𝑀𝑖𝑛𝑢𝑡𝑖𝑎𝑒 𝑀𝑎𝑝
|
| 930 |
+
Extractor (ℳ)
|
| 931 |
+
Adversarial Fingerprint
|
| 932 |
+
Figure 13: Schematic of AdvBiom for generating adversarial fingerprints. Given a probe fingerprint image, it is
|
| 933 |
+
passed to Gdisp which randomly displaces its minutiae points. The distortion module (Gdist) identifies control
|
| 934 |
+
points on the displaced fingerprint and non-linearly distorts the image to output the adversarial fingerprint. The
|
| 935 |
+
solid black arrows show the forward pass of the network while the dotted black arrows show the propagation of
|
| 936 |
+
the losses.
|
| 937 |
+
location (i, j), is displaced by a predefined L1 distance d = |∆i|+|∆j|, giving us the target minutiae
|
| 938 |
+
map Htarget.
|
| 939 |
+
0
|
| 940 |
+
𝜋/6
|
| 941 |
+
𝜋/3
|
| 942 |
+
𝜋/2
|
| 943 |
+
2𝜋/3
|
| 944 |
+
5𝜋/6
|
| 945 |
+
𝜋
|
| 946 |
+
7𝜋/6
|
| 947 |
+
4𝜋/3
|
| 948 |
+
3𝜋/2
|
| 949 |
+
5𝜋/3
|
| 950 |
+
11𝜋/6
|
| 951 |
+
Figure 14: The 12 channel minutiae map of an example fingerprint image shown on the left. The minutiae points
|
| 952 |
+
(shown in red) are marked by a COTS minutiae extractor. The bright spots in each channel image indicate the
|
| 953 |
+
spatial location of minutiae points while the kth channel (k ∈ [0, 11]) indicate the contributions of minutiae
|
| 954 |
+
points to the kπ/6 orientation.
|
| 955 |
+
The minutiae displacement module Gdisp is essentially an autoencoder conditioned on the probe
|
| 956 |
+
fingerprint x and the target minutiae map Htarget. It learns to generate a displaced fingerprint xdisp
|
| 957 |
+
whose predicted minutiae map Hpred is as close as possible to the target minutiae map Htarget in the
|
| 958 |
+
pixel space. To achieve this, we have three losses that govern Gdisp:
|
| 959 |
+
Lmmap_sim = ||Htarget − Hpred||1
|
| 960 |
+
(12)
|
| 961 |
+
Lmmap_dis =
|
| 962 |
+
1
|
| 963 |
+
||Htarget − Hprobe||1
|
| 964 |
+
(13)
|
| 965 |
+
, where Lmmap_sim is the minutiae map similarity loss which minimises the distance between the
|
| 966 |
+
predicted and target minutiae map, while the minutiae map dissimilarity loss Lmmap_dis maximises
|
| 967 |
+
16
|
| 968 |
+
|
| 969 |
+
G
|
| 970 |
+
QU
|
| 971 |
+
Q
|
| 972 |
+
Q
|
| 973 |
+
QQ
|
| 974 |
+
Q
|
| 975 |
+
Gthe distance between the predicted and probe minutiae map. In figure 15, we show two example
|
| 976 |
+
probe fingerprints and their corresponding displaced fingerprints after passing through Gdisp.
|
| 977 |
+
Distortion Module
|
| 978 |
+
One of the most noteworthy conclusions from [57] was that non-linear distor-
|
| 979 |
+
tions to minutiae points was one of the most successful perturbations to lower the similarity scores
|
| 980 |
+
between perturbed and corresponding unperturbed fingerprints. Again, the non-linear distortion
|
| 981 |
+
was applied to all the minutiae points in the template and not to the image. Thus, our next step in
|
| 982 |
+
generating adversarial fingerprints consists of a distortion module Gdist which learns to distort salient
|
| 983 |
+
points in a fingerprint image.
|
| 984 |
+
The architecture of Gdist consists of an encoder conditioned on the input probe fingerprint x and the
|
| 985 |
+
target minutiae map Hprobe. The output from the encoder is a predefined number of control points11 c.
|
| 986 |
+
The non-linear distortion model proposed in [59], learned using a thin plate spline (TPS) model [60]
|
| 987 |
+
from 320 already distorted fingerprint videos, was employed to calculate the displacements of the
|
| 988 |
+
predicted control points. The hyper-parameter σ is used to indicate the extent of the distortion. The
|
| 989 |
+
control points and their displacements are then fed to a differentiable warping module [61] to get the
|
| 990 |
+
resultant adversarial fingerprint xadv.
|
| 991 |
+
To limit the magnitude of non-linear distortion and to ensure that xdisp and xadv are close to the
|
| 992 |
+
probe fingerprint x, we introduce pixel loss between the image pairs (x, xdisp) and (x, xadv):
|
| 993 |
+
Lpixel = 1
|
| 994 |
+
n
|
| 995 |
+
�
|
| 996 |
+
i,j
|
| 997 |
+
|xi,j − xdispi,j|+ 1
|
| 998 |
+
n
|
| 999 |
+
�
|
| 1000 |
+
i,j
|
| 1001 |
+
|xi,j − xadvi,j|
|
| 1002 |
+
(14)
|
| 1003 |
+
Figure 16 shows two displaced fingerprints and their corresponding output from Gdist.
|
| 1004 |
+
Discriminator
|
| 1005 |
+
In order to guide the generative modules Gdisp and Gdist to synthesize realistic
|
| 1006 |
+
fingerprint images, we introduce a fully convolutional network as a patch-based discriminator D.
|
| 1007 |
+
The job of the discriminator is to distinguish between real fingerprint images x and the generated
|
| 1008 |
+
adversarial fingerprint images xadv. This is accomplished through the GAN loss:
|
| 1009 |
+
Lgan = logD(x) + log(1 − D(xadv))
|
| 1010 |
+
(15)
|
| 1011 |
+
The proposed approach AdvBiom is trained in an end-to-end manner with respect to the following
|
| 1012 |
+
objective function:
|
| 1013 |
+
(16)
|
| 1014 |
+
L = Lgan + λmmap_simLmmap_sim + λmmap_disLmmap_dis + λpixelLpixel
|
| 1015 |
+
where the hyper-parameters λmmap_sim, λmmap_dis, and λpixel denote the relative importance of
|
| 1016 |
+
their respective losses. Once trained, AdvBiom can generate an adversarial fingerprint image for
|
| 1017 |
+
any input probe fingerprint and can be tested on any fingerprint matcher regardless of the feature
|
| 1018 |
+
extraction method (minutiae or deep-features).
|
| 1019 |
+
11Control points are points in an image to which non-linear distortion is applied.
|
| 1020 |
+
Probe Fingerprint
|
| 1021 |
+
Displaced Fingerprint
|
| 1022 |
+
Probe Fingerprint
|
| 1023 |
+
Displaced Fingerprint
|
| 1024 |
+
Figure 15: Example probe fingerprints from NIST SD4 [55] and their corresponding output from the minutiae
|
| 1025 |
+
displacement module Gdisp. The minutiae points (shown in red) are marked using a COTS minutiae extractor.
|
| 1026 |
+
17
|
| 1027 |
+
|
| 1028 |
+
Displaced Fingerprint
|
| 1029 |
+
Distorted Fingerprint
|
| 1030 |
+
Displaced Fingerprint
|
| 1031 |
+
Distorted Fingerprint
|
| 1032 |
+
Figure 16: Fingerprints in the left column are example displaced fingerprints from Gdisp. The distortion module
|
| 1033 |
+
Gdist predicts control points (marked in blue) and distorts the images based on their displacements (red arrows)
|
| 1034 |
+
using the non-linear distortion model from [59]. The resultant distorted fingerprint images are shown in the right
|
| 1035 |
+
column.
|
| 1036 |
+
Successful
|
| 1037 |
+
Attacks
|
| 1038 |
+
Failed
|
| 1039 |
+
Attacks
|
| 1040 |
+
Original
|
| 1041 |
+
Probe
|
| 1042 |
+
Adv. Probe
|
| 1043 |
+
(AdvFinge)
|
| 1044 |
+
Mate
|
| 1045 |
+
Original
|
| 1046 |
+
Probe
|
| 1047 |
+
Adv. Probe
|
| 1048 |
+
(AdvFinge)
|
| 1049 |
+
Mate
|
| 1050 |
+
VS: 36 | FS: 0.82
|
| 1051 |
+
VS: 47 | FS: 0.88
|
| 1052 |
+
VS: 109 | FS: 0.87
|
| 1053 |
+
VS: 76 | FS: 0.89
|
| 1054 |
+
(AdvBiom)
|
| 1055 |
+
(AdvBiom)
|
| 1056 |
+
Figure 17: Example successful and failed adversarial fingerprints attack using AdvBiom on NIST SD4 [55]. The
|
| 1057 |
+
VeriFinger matching scores (probe v. mate): VS, and fingerprintness [56] scores: FS, of adversarial probes are
|
| 1058 |
+
shown below their respective triplet. Note that the VeriFinger matching threshold is 48 at 0.01% FAR.
|
| 1059 |
+
Evaluation Metrics:
|
| 1060 |
+
The requirement of a good adversarial fingerprints generator is to evade
|
| 1061 |
+
fingerprint matchers while preserving fingerprint attributes and being model-agnostic. Thus, in order
|
| 1062 |
+
to quantify the performance of adversarial attacks generated by AdvBiom and other state-of-the-art
|
| 1063 |
+
baselines, we employ the following evaluation metrics:
|
| 1064 |
+
• True Accept Rate (TAR): The extent to which an adversarial attack can evade a fingerprint
|
| 1065 |
+
matcher is measured by the drop in TAR at an operational setting, say 0.01% False Accept
|
| 1066 |
+
Rate (FAR).
|
| 1067 |
+
• Fingerprintness: Soweon and Jain [56] proposed a domain-specific metric called finger-
|
| 1068 |
+
printness to measure the degree of similarity of a given image to a fingerprint pattern.
|
| 1069 |
+
Fingerprintness ranges from [0,1] where higher the score, higher the probability of the
|
| 1070 |
+
pattern in the image corresponding to a fingerprint pattern.
|
| 1071 |
+
• NFIQ 2.0: Lastly, we use NFIQ 2.0 [62] quality scores to evaluate the fingerprint quality
|
| 1072 |
+
of adversarial fingerprint images. NFIQ scores range from [0,100] where a score of 100
|
| 1073 |
+
depicts the highest fingerprint quality.
|
| 1074 |
+
Note that since non-linear distortions change the structure of the image, using the structural similarity
|
| 1075 |
+
index (SSIM) metric is inappropriate as it essentially measures the local change in structures of the
|
| 1076 |
+
image pairs.
|
| 1077 |
+
Datasets: We train AdvBiom on an internal dataset of 120,000 rolled fingerprint images. Furthermore,
|
| 1078 |
+
we evaluate the performance of the proposed fingerprint adversarial attack and other baselines on:
|
| 1079 |
+
• 2,000 fingerprint pairs from NIST SD4 [55]
|
| 1080 |
+
• 27,000 fingerprint pairs from NIST SD14 [63]
|
| 1081 |
+
18
|
| 1082 |
+
|
| 1083 |
+
111@
|
| 1084 |
+
8
|
| 1085 |
+
Q
|
| 1086 |
+
Q
|
| 1087 |
+
QQ
|
| 1088 |
+
Q
|
| 1089 |
+
de
|
| 1090 |
+
G
|
| 1091 |
+
G母
|
| 1092 |
+
Q
|
| 1093 |
+
%
|
| 1094 |
+
d
|
| 1095 |
+
TG
|
| 1096 |
+
%
|
| 1097 |
+
Q
|
| 1098 |
+
Qd
|
| 1099 |
+
Q
|
| 1100 |
+
d
|
| 1101 |
+
00
|
| 1102 |
+
&
|
| 1103 |
+
QQ
|
| 1104 |
+
%
|
| 1105 |
+
CQ
|
| 1106 |
+
d
|
| 1107 |
+
3
|
| 1108 |
+
d
|
| 1109 |
+
&
|
| 1110 |
+
QQQ
|
| 1111 |
+
@山
|
| 1112 |
+
G
|
| 1113 |
+
%Q
|
| 1114 |
+
QQ
|
| 1115 |
+
Q
|
| 1116 |
+
q Q
|
| 1117 |
+
bu
|
| 1118 |
+
G
|
| 1119 |
+
P dppdQ
|
| 1120 |
+
@
|
| 1121 |
+
d
|
| 1122 |
+
QQ-
|
| 1123 |
+
Q?
|
| 1124 |
+
&
|
| 1125 |
+
d
|
| 1126 |
+
&
|
| 1127 |
+
?
|
| 1128 |
+
de
|
| 1129 |
+
qQ
|
| 1130 |
+
&
|
| 1131 |
+
GQ QC
|
| 1132 |
+
QQ
|
| 1133 |
+
Q
|
| 1134 |
+
Q
|
| 1135 |
+
?
|
| 1136 |
+
多
|
| 1137 |
+
&
|
| 1138 |
+
G
|
| 1139 |
+
lG
|
| 1140 |
+
Q
|
| 1141 |
+
QQ
|
| 1142 |
+
%
|
| 1143 |
+
Q
|
| 1144 |
+
@
|
| 1145 |
+
G
|
| 1146 |
+
QQQQ
|
| 1147 |
+
G
|
| 1148 |
+
G20-
|
| 1149 |
+
Q
|
| 1150 |
+
Q
|
| 1151 |
+
Q
|
| 1152 |
+
q
|
| 1153 |
+
QQ
|
| 1154 |
+
G
|
| 1155 |
+
Q
|
| 1156 |
+
G8
|
| 1157 |
+
a
|
| 1158 |
+
QQ
|
| 1159 |
+
QQ
|
| 1160 |
+
cs
|
| 1161 |
+
G
|
| 1162 |
+
Q
|
| 1163 |
+
G
|
| 1164 |
+
QQ
|
| 1165 |
+
0甲Accuracy
|
| 1166 |
+
Adversarial Attacks
|
| 1167 |
+
Original
|
| 1168 |
+
Probes
|
| 1169 |
+
FGSM
|
| 1170 |
+
I-FGSM
|
| 1171 |
+
Deep
|
| 1172 |
+
Fool
|
| 1173 |
+
PGD
|
| 1174 |
+
Adv
|
| 1175 |
+
Biom
|
| 1176 |
+
TAR
|
| 1177 |
+
(%)
|
| 1178 |
+
at
|
| 1179 |
+
0.01%
|
| 1180 |
+
FAR
|
| 1181 |
+
NIST
|
| 1182 |
+
SD4
|
| 1183 |
+
VeriFinger
|
| 1184 |
+
99.05
|
| 1185 |
+
95.20
|
| 1186 |
+
98.30
|
| 1187 |
+
95.00
|
| 1188 |
+
97.60
|
| 1189 |
+
56.25
|
| 1190 |
+
Innovatrics
|
| 1191 |
+
97.00
|
| 1192 |
+
93.00
|
| 1193 |
+
95.50
|
| 1194 |
+
92.65
|
| 1195 |
+
94.75
|
| 1196 |
+
41.35
|
| 1197 |
+
DeepPrint
|
| 1198 |
+
94.55
|
| 1199 |
+
36.20
|
| 1200 |
+
64.15
|
| 1201 |
+
30.40
|
| 1202 |
+
68.75
|
| 1203 |
+
46.35
|
| 1204 |
+
NIST
|
| 1205 |
+
SD14
|
| 1206 |
+
VeriFinger
|
| 1207 |
+
99.42
|
| 1208 |
+
95.20
|
| 1209 |
+
98.30
|
| 1210 |
+
95.00
|
| 1211 |
+
97.60
|
| 1212 |
+
37.67
|
| 1213 |
+
Innovatrics
|
| 1214 |
+
98.24
|
| 1215 |
+
90.84
|
| 1216 |
+
95.68
|
| 1217 |
+
91.32
|
| 1218 |
+
94.01
|
| 1219 |
+
25.69
|
| 1220 |
+
DeepPrint
|
| 1221 |
+
96.52
|
| 1222 |
+
48.70
|
| 1223 |
+
84.48
|
| 1224 |
+
31.44
|
| 1225 |
+
64.28
|
| 1226 |
+
69.42
|
| 1227 |
+
FVC
|
| 1228 |
+
2004
|
| 1229 |
+
DB1 A
|
| 1230 |
+
VeriFinger
|
| 1231 |
+
94.89
|
| 1232 |
+
91.60
|
| 1233 |
+
91.53
|
| 1234 |
+
86.92
|
| 1235 |
+
92.69
|
| 1236 |
+
22.31
|
| 1237 |
+
Innovatrics
|
| 1238 |
+
94.15
|
| 1239 |
+
87.36
|
| 1240 |
+
85.68
|
| 1241 |
+
82.32
|
| 1242 |
+
88.75
|
| 1243 |
+
5.52
|
| 1244 |
+
DeepPrint
|
| 1245 |
+
75.36
|
| 1246 |
+
13.22
|
| 1247 |
+
33.31
|
| 1248 |
+
6.87
|
| 1249 |
+
27.39
|
| 1250 |
+
20.62
|
| 1251 |
+
Table 2: True Accept Rate (TAR) @ 0.01% FAR of AdvBiom along with state-of-the-art baselines attacks on
|
| 1252 |
+
three datasets - NIST SD4 [55], NIST SD14 [63], and FVC 2004 DB1 A [64]. 2 COTS fingerprint matchers -
|
| 1253 |
+
VeriFinger v11.0 [65] and Innovatrics v7.6.0.627 [66], and a deep network-based matcher DeepPrint [67] were
|
| 1254 |
+
employed for the evaluation. It is observed that DeepPrint, a deep network-based matcher, is susceptible to all
|
| 1255 |
+
types of adversarial attacks while VeriFinger and Innovatrics are more robust.
|
| 1256 |
+
• 558 fingerprints from DB1 A of FVC 2004 [64], consisting of 1,369 genuine pairs.
|
| 1257 |
+
Experimental Settings: AdvBiom was trained using the Adam optimizer with β1 as 0.5 and β2 as
|
| 1258 |
+
0.9. The hyper-parameters were empirically set to λmmap_sim = 0.05, λmmap_dis = 500000, and
|
| 1259 |
+
λpixel = 1000 for convergence. Based on the conclusions drawn in [57], d, c, and λ were set to
|
| 1260 |
+
20, 16, and 2.0 respectively for optimal effectiveness against fingerprint matchers while ensuring
|
| 1261 |
+
fingerprint realism. AdvBiom was trained for 16,000 steps using Tensorflow r1.14.0 on an Intel Core
|
| 1262 |
+
i7-11700F @ 2.50GHz CPU with a RTX 3070 GPU. On the same machine, AdvBiom can synthesize
|
| 1263 |
+
an adversarial fingerprint within 0.35 seconds.
|
| 1264 |
+
Fingerprint Authentication Systems: Since AdvBiom is a black-box attack, we do not require any
|
| 1265 |
+
fingerprint authentication system while training the network. However, we evaluate AdvBiom and
|
| 1266 |
+
other baseline attacks on two COTS fingerprint matchers and one deep network-based matcher:
|
| 1267 |
+
• VeriFinger v11.0 [65]
|
| 1268 |
+
• Innovatrics v7.6.0.627 [66]
|
| 1269 |
+
• DeepPrint [67]
|
| 1270 |
+
Comparison with Prevailing Fingerprint Adversarial Generators
|
| 1271 |
+
We show the performance
|
| 1272 |
+
of our method AdvBiom as compared to other state-of-the-art attacks in Table 2. We observe that
|
| 1273 |
+
the TAR of two COTS and a deep network-based fingerprint matcher for the aforementioned three
|
| 1274 |
+
datasets. It is to note that all the baseline attacks [14, 15, 17, 16] are white-box attacks and were
|
| 1275 |
+
trained using DeepPrint [67]. It is evident from Table 2 that AdvBiom is the most successful attack on
|
| 1276 |
+
COTS matchers VeriFinger and Innovatrics, and is also able to effectively evade a deep network-based
|
| 1277 |
+
fingerprint matcher, namely DeepPrint. It can also be observed that while COTS fingerprint matchers
|
| 1278 |
+
are robust to most adversarial attacks, DeepPrint is very susceptible to the same attacks since it
|
| 1279 |
+
heavily relies on the texture of the fingerprint which is majorly affected by adversarial attacks.
|
| 1280 |
+
A successful adversarial attack should not only evade fingerprint matchers but should also preserve
|
| 1281 |
+
fingerprint attributes. In order to observe the effect of adversarial attacks on fingerprint pattern
|
| 1282 |
+
in images, we plot the fingerprintness [56] distribution of 2,000 probes from NIST SD4 [55] for
|
| 1283 |
+
AdvBiom as well as for other baseline attacks. Since all the state-of-the-art baselines essentially add
|
| 1284 |
+
noise to each pixel in the image, they do not change the structure of the fingerprint and thus do not
|
| 1285 |
+
19
|
| 1286 |
+
|
| 1287 |
+
0.6
|
| 1288 |
+
0.7
|
| 1289 |
+
0.8
|
| 1290 |
+
0.9
|
| 1291 |
+
1.0
|
| 1292 |
+
Fingerprintedness Scores
|
| 1293 |
+
0
|
| 1294 |
+
2
|
| 1295 |
+
4
|
| 1296 |
+
6
|
| 1297 |
+
8
|
| 1298 |
+
10
|
| 1299 |
+
12
|
| 1300 |
+
Probability of occurence
|
| 1301 |
+
Original Probes ( = 0.91)
|
| 1302 |
+
AdvFinge ( = 0.86)
|
| 1303 |
+
FGSM ( = 0.89)
|
| 1304 |
+
I-FGSM ( = 0.91)
|
| 1305 |
+
PGD ( = 0.90)
|
| 1306 |
+
DeepFool ( = 0.90)
|
| 1307 |
+
AdvBiom
|
| 1308 |
+
Figure 18: Fingerprintness [56] distribution of 2,000
|
| 1309 |
+
probes from NIST SD4 with respect to AdvBiom and
|
| 1310 |
+
other state-of-the-art baselines attacks.
|
| 1311 |
+
0
|
| 1312 |
+
20
|
| 1313 |
+
40
|
| 1314 |
+
60
|
| 1315 |
+
80
|
| 1316 |
+
100
|
| 1317 |
+
NFIQ Score
|
| 1318 |
+
0.000
|
| 1319 |
+
0.005
|
| 1320 |
+
0.010
|
| 1321 |
+
0.015
|
| 1322 |
+
0.020
|
| 1323 |
+
0.025
|
| 1324 |
+
Probability of occurence
|
| 1325 |
+
Original Probes ( = 41.70)
|
| 1326 |
+
AdvFinge ( = 31.46)
|
| 1327 |
+
FGSM ( = 43.30)
|
| 1328 |
+
I-FGSM ( = 44.23)
|
| 1329 |
+
PGD ( = 41.28)
|
| 1330 |
+
DeepFool ( = 43.42)
|
| 1331 |
+
AdvBiom
|
| 1332 |
+
Figure 19: NFIQ 2.0 [62] quality scores distribution
|
| 1333 |
+
of 2,000 probes from NIST SD4 [55] with respect to
|
| 1334 |
+
AdvBiom and other baselines attacks.
|
| 1335 |
+
affect fingerprintness scores. AdvBiom , on the other hand, displaces minutiae points and non-linearly
|
| 1336 |
+
distorts the image, and still maintains a high mean fingerprintness score of µ = 0.86.
|
| 1337 |
+
Furthermore, we also compute the NFIQ 2.0 [62] quality scores distribution (figure 19) of the original
|
| 1338 |
+
and adversarial probes from NIST SD4 [55]. As shown in figure 12, baseline attacks tend to minutely
|
| 1339 |
+
perturb image pixels to generate adversarial fingerprints and as a result do not have much of an effect
|
| 1340 |
+
on the quality scores. AdvBiom , on the other hand, provides an optimal solution by successfully
|
| 1341 |
+
attacking fingerprint matchers while maintaining high fingerprintness and NFIQ scores.
|
| 1342 |
+
Genuine and Imposter Scores Distribution
|
| 1343 |
+
To determine the effect of adversarial fingerprint
|
| 1344 |
+
on both genuine and imposter pairs, we plot the genuine and imposter scores distribution of NIST
|
| 1345 |
+
SD4 [55] in figure 20 before and after applying AdvBiom . We computed a total of 2,000 genuine
|
| 1346 |
+
and 20,000 imposter scores for the evaluation. It can be observed that the genuine scores drastically
|
| 1347 |
+
decrease and shift to the left of the axis as their mean drops from 183.87 to 55.55 after the attack.
|
| 1348 |
+
However, the imposter scores remain unaffected with the mean imposter score changing by only 0.53.
|
| 1349 |
+
0
|
| 1350 |
+
100
|
| 1351 |
+
200
|
| 1352 |
+
300
|
| 1353 |
+
400
|
| 1354 |
+
Matching Scores
|
| 1355 |
+
0.00
|
| 1356 |
+
0.02
|
| 1357 |
+
0.04
|
| 1358 |
+
0.06
|
| 1359 |
+
0.08
|
| 1360 |
+
0.10
|
| 1361 |
+
0.12
|
| 1362 |
+
0.14
|
| 1363 |
+
Probability of Occurence
|
| 1364 |
+
Genuine Scores | Before Attack ( = 183.88)
|
| 1365 |
+
Genuine Scores | After Attack ( = 55.55)
|
| 1366 |
+
Imposter Scores | Before Attack ( = 6.00)
|
| 1367 |
+
Imposter Scores | After Attack ( = 6.52)
|
| 1368 |
+
48: Matching Threshold at 0.01% FAR
|
| 1369 |
+
(a) Using VeriFinger SDK [65]
|
| 1370 |
+
(b) Using Innovatrics SDK [66]
|
| 1371 |
+
1.00
|
| 1372 |
+
0.75
|
| 1373 |
+
0.50
|
| 1374 |
+
0.25
|
| 1375 |
+
0.00
|
| 1376 |
+
0.25
|
| 1377 |
+
0.50
|
| 1378 |
+
0.75
|
| 1379 |
+
1.00
|
| 1380 |
+
Matching Scores
|
| 1381 |
+
0.00
|
| 1382 |
+
0.02
|
| 1383 |
+
0.04
|
| 1384 |
+
0.06
|
| 1385 |
+
0.08
|
| 1386 |
+
0.10
|
| 1387 |
+
0.12
|
| 1388 |
+
Probability of Occurence
|
| 1389 |
+
Genuine Scores | Before Attack ( = 0.94)
|
| 1390 |
+
Genuine Scores | After Attack ( = 0.78)
|
| 1391 |
+
Imposter Scores | Before Attack ( = 0.10)
|
| 1392 |
+
Imposter Scores | After Attack ( = 0.09)
|
| 1393 |
+
0.837: Matching Threshold at 0.01% FAR
|
| 1394 |
+
(c) using DeepPrint [67]
|
| 1395 |
+
Figure 20: Genuine and imposter scores distribution of NIST SD4 [55] before and after the adversarial attack
|
| 1396 |
+
AdvBiom using three state-of-the-art fingerprint matchers - VeriFinger v11.0 [65], Innovatrics v7.6.0.627 [66],
|
| 1397 |
+
and DeepPrint [67]. Here, µ refers to the mean of the scores distribution. In all the three cases, the genuine
|
| 1398 |
+
scores shift towards the left while the imposter scores do not get affected by the attack.
|
| 1399 |
+
Is AdvBiom Biased Towards Certain Fingerprint Types?
|
| 1400 |
+
The generated adversarial fingerprint
|
| 1401 |
+
from AdvBiom is conditioned on the input probe fingerprint. Thus, it is essential to check if there is a
|
| 1402 |
+
relation between the amount of perturbation applied and the fingerprint type. The confusion matrix
|
| 1403 |
+
for the five fingerprint types (left loop, right loop, whorl, arch, tented arch) before and after applying
|
| 1404 |
+
AdvBiom on the 2,000 probes of NIST SD4 [55] is shown in table 3. Note that we use NIST SD4 for
|
| 1405 |
+
this evaluation since it has a uniform number of fingerprint images per each type (400 fingerprints
|
| 1406 |
+
per type). It is evident from the table that all five fingerprint types are almost equally susceptible to
|
| 1407 |
+
the attack, and thus the attack crafted AdvBiom is not biased towards a particular fingerprint type.
|
| 1408 |
+
20
|
| 1409 |
+
|
| 1410 |
+
Genuine Scores LBefore Attack (u = 590.00)
|
| 1411 |
+
Genuine Scores 1After Attack (μu = 48.72)
|
| 1412 |
+
0.6
|
| 1413 |
+
Imposter Scores /Before Attack (μu = 1.34)
|
| 1414 |
+
Imposter Scores l After Attack (μ = 1.4o)
|
| 1415 |
+
0.5
|
| 1416 |
+
Probability of Occurence
|
| 1417 |
+
40:Matching Threshold at 0.01% FAR
|
| 1418 |
+
0.4
|
| 1419 |
+
0.3
|
| 1420 |
+
0.2
|
| 1421 |
+
0.1
|
| 1422 |
+
0.0
|
| 1423 |
+
200
|
| 1424 |
+
600
|
| 1425 |
+
0
|
| 1426 |
+
400
|
| 1427 |
+
800
|
| 1428 |
+
1000
|
| 1429 |
+
Matching Scores0.012
|
| 1430 |
+
0.010
|
| 1431 |
+
0.008
|
| 1432 |
+
0.006
|
| 1433 |
+
0.004
|
| 1434 |
+
0.002
|
| 1435 |
+
0.000
|
| 1436 |
+
0
|
| 1437 |
+
200
|
| 1438 |
+
400
|
| 1439 |
+
600
|
| 1440 |
+
800
|
| 1441 |
+
1000Before Attack
|
| 1442 |
+
After Attack
|
| 1443 |
+
TAR
|
| 1444 |
+
L: 99.75%
|
| 1445 |
+
R: 99.25%
|
| 1446 |
+
W: 99.50%
|
| 1447 |
+
T: 99.25%
|
| 1448 |
+
A: 97.50%
|
| 1449 |
+
FAR
|
| 1450 |
+
L: 0%
|
| 1451 |
+
R: 0%
|
| 1452 |
+
W: 0%
|
| 1453 |
+
T: 0%
|
| 1454 |
+
A: 0%
|
| 1455 |
+
FRR
|
| 1456 |
+
L: 0.25%
|
| 1457 |
+
R: 0.75%
|
| 1458 |
+
W: 0.50%
|
| 1459 |
+
T: 0.75%
|
| 1460 |
+
A: 2.50%
|
| 1461 |
+
TRR
|
| 1462 |
+
L: 100%
|
| 1463 |
+
R: 100%
|
| 1464 |
+
W: 100%
|
| 1465 |
+
T: 100%
|
| 1466 |
+
A: 100%
|
| 1467 |
+
TAR
|
| 1468 |
+
L: 59.00%
|
| 1469 |
+
R: 56.50%
|
| 1470 |
+
W: 58.75%
|
| 1471 |
+
T: 56.00%
|
| 1472 |
+
A: 57.00%
|
| 1473 |
+
FAR
|
| 1474 |
+
L: 0%
|
| 1475 |
+
R: 0%
|
| 1476 |
+
W: 0%
|
| 1477 |
+
T: 0%
|
| 1478 |
+
A: 0%
|
| 1479 |
+
FRR
|
| 1480 |
+
L: 41.00%
|
| 1481 |
+
R: 43.50%
|
| 1482 |
+
W: 41.25%
|
| 1483 |
+
T: 44.00%
|
| 1484 |
+
A: 43.00%
|
| 1485 |
+
TRR
|
| 1486 |
+
L: 100%
|
| 1487 |
+
R: 100%
|
| 1488 |
+
W: 100%
|
| 1489 |
+
T: 100%
|
| 1490 |
+
A: 100%
|
| 1491 |
+
Table 3: Confusion matrix for five fingerprint types (left loop: L, right loop: R, whorl: W, tented arch: T, arch:
|
| 1492 |
+
A) from NIST SD4 [55] before and after the adversarial attack using AdvBiom. Here, TAR = True Accept Rate,
|
| 1493 |
+
FAR = False Accept Rate, FRR = False Reject Rate, and TRR = True Reject Rate. Note that the matching
|
| 1494 |
+
threshold was 48 at 0.01% FAR using the COTS fingerprint matcher VeriFinger. AdvBiom is not biased towards
|
| 1495 |
+
any fingerprint type.
|
| 1496 |
+
5
|
| 1497 |
+
Conclusions
|
| 1498 |
+
We show that a new method of adversarial synthesis, namely AdvBiom, that automatically generates
|
| 1499 |
+
adversarial face images with imperceptible perturbations evading state-of-the-art biometric matchers.
|
| 1500 |
+
With the help of a GAN, and the proposed perturbation and identity losses, AdvBiom learns the set
|
| 1501 |
+
of pixel locations required by face matchers for identification and only perturbs those salient facial
|
| 1502 |
+
regions (such as eyebrows and nose). Once trained, AdvBiom generates high quality and perceptually
|
| 1503 |
+
realistic adversarial examples that are benign to the human eye but can evade state-of-the-art black-
|
| 1504 |
+
box face matchers, while outperforming other state-of-the-art adversarial face methods. Beyond
|
| 1505 |
+
faces, we show for the first time that such a method with the proposed Minutiae Displacement and
|
| 1506 |
+
Distortion Modules can also evade state-of-the-art automated fingerprint recognition systems.
|
| 1507 |
+
References
|
| 1508 |
+
[1] D. E. Rumelhart and J. L. McClelland, Learning Internal Representations by Error Propagation,
|
| 1509 |
+
pp. 318–362. 1987.
|
| 1510 |
+
[2] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional
|
| 1511 |
+
neural networks,” Commun. ACM, vol. 60, p. 84–90, may 2017.
|
| 1512 |
+
[3] J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “Arcface: Additive angular margin loss for deep
|
| 1513 |
+
face recognition,” in Proceedings of the IEEE/CVF conference on computer vision and pattern
|
| 1514 |
+
recognition, pp. 4690–4699, 2019.
|
| 1515 |
+
[4] W. Liu, Y. Wen, Z. Yu, M. Li, B. Raj, and L. Song, “Sphereface: Deep hypersphere embedding
|
| 1516 |
+
for face recognition,” in Proceedings of the IEEE conference on computer vision and pattern
|
| 1517 |
+
recognition, pp. 212–220, 2017.
|
| 1518 |
+
[5] F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recogni-
|
| 1519 |
+
tion and clustering,” in Proceedings of the IEEE conference on computer vision and pattern
|
| 1520 |
+
recognition, pp. 815–823, 2015.
|
| 1521 |
+
[6] P. Grother, G. Quinn, and P. Phillips, “Report on the evaluation of 2d still-image face recognition
|
| 1522 |
+
algorithms,” 2010-06-17 2010.
|
| 1523 |
+
[7] N. Carlini and D. Wagner, “Towards evaluating the robustness of neural networks,” in 2017 ieee
|
| 1524 |
+
symposium on security and privacy (sp), pp. 39–57, Ieee, 2017.
|
| 1525 |
+
[8] Y. Dong, F. Liao, T. Pang, H. Su, J. Zhu, X. Hu, and J. Li, “Boosting adversarial attacks with
|
| 1526 |
+
momentum,” in Proceedings of the IEEE conference on computer vision and pattern recognition,
|
| 1527 |
+
pp. 9185–9193, 2018.
|
| 1528 |
+
[9] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,”
|
| 1529 |
+
arXiv preprint arXiv:1412.6572, 2014.
|
| 1530 |
+
[10] A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, “Towards deep learning models
|
| 1531 |
+
resistant to adversarial attacks,” arXiv preprint arXiv:1706.06083, 2017.
|
| 1532 |
+
21
|
| 1533 |
+
|
| 1534 |
+
[11] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus,
|
| 1535 |
+
“Intriguing properties of neural networks,” arXiv preprint arXiv:1312.6199, 2013.
|
| 1536 |
+
[12] S.-M. Moosavi-Dezfooli, A. Fawzi, O. Fawzi, and P. Frossard, “Universal adversarial pertur-
|
| 1537 |
+
bations,” in Proceedings of the IEEE conference on computer vision and pattern recognition,
|
| 1538 |
+
pp. 1765–1773, 2017.
|
| 1539 |
+
[13] UIDAI, “Unique Identification Authority of India.” https://uidai.gov.in, 2022.
|
| 1540 |
+
[14] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,”
|
| 1541 |
+
in 3rd International Conference on Learning Representations, ICLR, 2015.
|
| 1542 |
+
[15] A. Kurakin, I. J. Goodfellow, and S. Bengio, “Adversarial examples in the physical world,” in
|
| 1543 |
+
5th International Conference on Learning Representations, ICLR, 2017.
|
| 1544 |
+
[16] S. Moosavi-Dezfooli, A. Fawzi, and P. Frossard, “Deepfool: A simple and accurate method to
|
| 1545 |
+
fool deep neural networks,” in IEEE Conference on Computer Vision and Pattern Recognition,
|
| 1546 |
+
CVPR, pp. 2574–2582, IEEE Computer Society, 2016.
|
| 1547 |
+
[17] A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, “Towards deep learning models
|
| 1548 |
+
resistant to adversarial attacks,” in 6th International Conference on Learning Representations,
|
| 1549 |
+
ICLR, 2018.
|
| 1550 |
+
[18] N. Carlini and D. A. Wagner, “Towards evaluating the robustness of neural networks,” in IEEE
|
| 1551 |
+
Symposium on Security and Privacy, SP, pp. 39–57, IEEE Computer Society, 2017.
|
| 1552 |
+
[19] C. Xiao, J. Zhu, B. Li, W. He, M. Liu, and D. Song, “Spatially transformed adversarial examples,”
|
| 1553 |
+
in 6th International Conference on Learning Representations, ICLR, 2018.
|
| 1554 |
+
[20] K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao, A. Prakash, T. Kohno, and
|
| 1555 |
+
D. Song, “Robust physical-world attacks on deep learning visual classification,” in IEEE/CVF
|
| 1556 |
+
Conference on Computer Vision and Pattern Recognition, pp. 1625–1634, 2018.
|
| 1557 |
+
[21] N. Papernot, P. D. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, “The limitations
|
| 1558 |
+
of deep learning in adversarial settings,” in IEEE European Symposium on Security and Privacy,
|
| 1559 |
+
EuroS&P, pp. 372–387, IEEE, 2016.
|
| 1560 |
+
[22] A. Kurakin, I. J. Goodfellow, and S. Bengio, “Adversarial machine learning at scale,” in 5th
|
| 1561 |
+
International Conference on Learning Representations, ICLR, 2017.
|
| 1562 |
+
[23] Y. Dong, F. Liao, T. Pang, H. Su, J. Zhu, X. Hu, and J. Li, “Boosting adversarial attacks
|
| 1563 |
+
with momentum,” in IEEE Conference on Computer Vision and Pattern Recognition, CVPR,
|
| 1564 |
+
pp. 9185–9193, IEEE Computer Society, 2018.
|
| 1565 |
+
[24] C. Xie, Z. Zhang, Y. Zhou, S. Bai, J. Wang, Z. Ren, and A. L. Yuille, “Improving transferability
|
| 1566 |
+
of adversarial examples with input diversity,” in Proceedings of the IEEE/CVF Conference on
|
| 1567 |
+
Computer Vision and Pattern Recognition, pp. 2730–2739, 2019.
|
| 1568 |
+
[25] D. Deb, J. Zhang, and A. K. Jain, “Advfaces: Adversarial face synthesis,” in 2020 IEEE
|
| 1569 |
+
International Joint Conference on Biometrics (IJCB), pp. 1–10, IEEE, 2020.
|
| 1570 |
+
[26] Y. Liu, X. Chen, C. Liu, and D. Song, “Delving into transferable adversarial examples and
|
| 1571 |
+
black-box attacks,” in 5th International Conference on Learning Representations, ICLR, 2017.
|
| 1572 |
+
[27] W. Xiang, H. Su, C. Liu, Y. Guo, and S. Zheng, “Improving the robustness of adversarial attacks
|
| 1573 |
+
using an affine-invariant gradient estimator,” Available at SSRN 4095198, 2021.
|
| 1574 |
+
[28] Y. Dong, T. Pang, H. Su, and J. Zhu, “Evading defenses to transferable adversarial examples by
|
| 1575 |
+
translation-invariant attacks,” in Proceedings of the IEEE/CVF Conference on Computer Vision
|
| 1576 |
+
and Pattern Recognition, pp. 4312–4321, 2019.
|
| 1577 |
+
[29] S. Cheng, Y. Dong, T. Pang, H. Su, and J. Zhu, “Improving black-box adversarial attacks with a
|
| 1578 |
+
transfer-based prior,” Advances in neural information processing systems, vol. 32, 2019.
|
| 1579 |
+
22
|
| 1580 |
+
|
| 1581 |
+
[30] A. Ilyas, L. Engstrom, A. Athalye, and J. Lin, “Black-box adversarial attacks with limited
|
| 1582 |
+
queries and information,” in International Conference on Machine Learning, pp. 2137–2146,
|
| 1583 |
+
PMLR, 2018.
|
| 1584 |
+
[31] Y. Li, L. Li, L. Wang, T. Zhang, and B. Gong, “Nattack: Learning the distributions of adver-
|
| 1585 |
+
sarial examples for an improved black-box attack on deep neural networks,” in International
|
| 1586 |
+
Conference on Machine Learning, pp. 3866–3876, PMLR, 2019.
|
| 1587 |
+
[32] Y. Dong, H. Su, B. Wu, Z. Li, W. Liu, T. Zhang, and J. Zhu, “Efficient decision-based black-
|
| 1588 |
+
box adversarial attacks on face recognition,” in Proceedings of the IEEE/CVF Conference on
|
| 1589 |
+
Computer Vision and Pattern Recognition, pp. 7714–7722, 2019.
|
| 1590 |
+
[33] W. Brendel, J. Rauber, and M. Bethge, “Decision-based adversarial attacks: Reliable attacks
|
| 1591 |
+
against black-box machine learning models,” arXiv preprint arXiv:1712.04248, 2017.
|
| 1592 |
+
[34] M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter, “Accessorize to a crime: Real and stealthy
|
| 1593 |
+
attacks on state-of-the-art face recognition,” CCS ’16, (New York, NY, USA), p. 1528–1540,
|
| 1594 |
+
Association for Computing Machinery, 2016.
|
| 1595 |
+
[35] M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter, “A general framework for adversarial
|
| 1596 |
+
examples with objectives,” ACM Transactions on Privacy and Security (TOPS), vol. 22, no. 3,
|
| 1597 |
+
pp. 1–30, 2019.
|
| 1598 |
+
[36] S. Komkov and A. Petiushko, “Advhat: Real-world adversarial attack on arcface face id system,”
|
| 1599 |
+
in 2020 25th International Conference on Pattern Recognition (ICPR), pp. 819–826, IEEE,
|
| 1600 |
+
2021.
|
| 1601 |
+
[37] D.-L. Nguyen, S. S. Arora, Y. Wu, and H. Yang, “Adversarial light projection attacks on face
|
| 1602 |
+
recognition systems: A feasibility study,” in Proceedings of the IEEE/CVF conference on
|
| 1603 |
+
computer vision and pattern recognition workshops, pp. 814–815, 2020.
|
| 1604 |
+
[38] B. Yin, W. Wang, T. Yao, J. Guo, Z. Kong, S. Ding, J. Li, and C. Liu, “Adv-makeup: A new
|
| 1605 |
+
imperceptible and transferable attack on face recognition,” arXiv preprint arXiv:2105.03162,
|
| 1606 |
+
2021.
|
| 1607 |
+
[39] X. Liu, F. Shen, J. Zhao, and C. Nie, “Rstam: An effective black-box impersonation attack on
|
| 1608 |
+
face recognition using a mobile and compact printer,” arXiv preprint arXiv:2206.12590, 2022.
|
| 1609 |
+
[40] A. J. Bose and P. Aarabi, “Adversarial attacks on face detectors using neural net based con-
|
| 1610 |
+
strained optimization,” in 2018 IEEE 20th International Workshop on Multimedia Signal
|
| 1611 |
+
Processing (MMSP), pp. 1–6, IEEE, 2018.
|
| 1612 |
+
[41] N. Cauli, A. Ortis, and S. Battiato, “Fooling a face recognition system with a marker-free
|
| 1613 |
+
label-consistent backdoor attack,” in Image Analysis and Processing – ICIAP 2022: 21st Inter-
|
| 1614 |
+
national Conference, Lecce, Italy, May 23–27, 2022, Proceedings, Part II, (Berlin, Heidelberg),
|
| 1615 |
+
p. 176–185, Springer-Verlag, 2022.
|
| 1616 |
+
[42] L. Yang, Q. Song, and Y. Wu, “Attacks on state-of-the-art face recognition using attentional
|
| 1617 |
+
adversarial attack generative network,” Multimedia tools and applications, vol. 80, no. 1,
|
| 1618 |
+
pp. 855–875, 2021.
|
| 1619 |
+
[43] Y. Zhong and W. Deng, “Towards transferable adversarial attack against deep face recognition,”
|
| 1620 |
+
IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1452–1466, 2020.
|
| 1621 |
+
[44] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: A
|
| 1622 |
+
simple way to prevent neural networks from overfitting,” Journal of Machine Learning Research,
|
| 1623 |
+
vol. 15, no. 56, pp. 1929–1958, 2014.
|
| 1624 |
+
[45] S. Jia, B. Yin, T. Yao, S. Ding, C. Shen, X. Yang, and C. Ma, “Adv-attribute: Inconspicuous and
|
| 1625 |
+
transferable adversarial attack on face recognition,” arXiv preprint arXiv:2210.06871, 2022.
|
| 1626 |
+
[46] H. Qiu, C. Xiao, L. Yang, X. Yan, H. Lee, and B. Li, “Semanticadv: Generating adversarial
|
| 1627 |
+
examples via attribute-conditioned image editing,” in European Conference on Computer Vision,
|
| 1628 |
+
pp. 19–37, Springer, 2020.
|
| 1629 |
+
23
|
| 1630 |
+
|
| 1631 |
+
[47] S. Shan, E. Wenger, J. Zhang, H. Li, H. Zheng, and B. Y. Zhao, “Fawkes: protecting privacy
|
| 1632 |
+
against unauthorized deep learning models,” in USENIX, pp. 1589–1604, 2020.
|
| 1633 |
+
[48] A. Dabouei, S. Soleymani, J. Dawson, and N. Nasrabadi, “Fast geometrically-perturbed adver-
|
| 1634 |
+
sarial faces,” in WACV, 2019.
|
| 1635 |
+
[49] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and
|
| 1636 |
+
Y. Bengio, “Generative adversarial networks,” Communications of the ACM, vol. 63, no. 11,
|
| 1637 |
+
pp. 139–144, 2020.
|
| 1638 |
+
[50] E. L. Denton, S. Chintala, R. Fergus, et al., “Deep generative image models using a laplacian
|
| 1639 |
+
pyramid of adversarial networks,” Advances in neural information processing systems, vol. 28,
|
| 1640 |
+
2015.
|
| 1641 |
+
[51] D. Yi, Z. Lei, S. Liao, and S. Z. Li, “Learning face representation from scratch,” arXiv preprint
|
| 1642 |
+
arXiv:1411.7923, 2014.
|
| 1643 |
+
[52] G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, “Labeled faces in the wild: A database
|
| 1644 |
+
for studying face recognition in unconstrained environments,” Tech. Rep. 07-49, University of
|
| 1645 |
+
Massachusetts, Amherst, October 2007.
|
| 1646 |
+
[53] K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, “Joint face detection and alignment using multitask
|
| 1647 |
+
cascaded convolutional networks,” IEEE SPL, vol. 23, no. 10, pp. 1499–1503, 2016.
|
| 1648 |
+
[54] P. J. Grother, M. Ngan, and K. Hanaoka, “Ongoing Face Recognition Vendor Test (FRVT), Part
|
| 1649 |
+
2: Identification,” NIST Interagency Report, 2018.
|
| 1650 |
+
[55] NIST,
|
| 1651 |
+
“NIST
|
| 1652 |
+
Special
|
| 1653 |
+
Database
|
| 1654 |
+
4.”
|
| 1655 |
+
https://www.nist.gov/srd/
|
| 1656 |
+
nist-special-database-4, 2022.
|
| 1657 |
+
[56] S. Yoon and A. K. Jain, “Is there a fingerprint pattern in the image?,” in 2013 International
|
| 1658 |
+
Conference on Biometrics (ICB), pp. 1–8, 2013.
|
| 1659 |
+
[57] S. A. Grosz, J. J. Engelsma, N. G. P. Jr., and A. K. Jain, “White-box evaluation of fingerprint
|
| 1660 |
+
matchers,” CoRR, vol. abs/1909.00799, 2019.
|
| 1661 |
+
[58] K. Cao, D. Nguyen, C. Tymoszek, and A. K. Jain, “End-to-end latent fingerprint search,” IEEE
|
| 1662 |
+
Trans. Inf. Forensics Secur., vol. 15, pp. 880–894, 2020.
|
| 1663 |
+
[59] X. Si, J. Feng, J. Zhou, and Y. Luo, “Detection and rectification of distorted fingerprints,” IEEE
|
| 1664 |
+
Trans. Pattern Anal. Mach. Intell., vol. 37, no. 3, pp. 555–568, 2015.
|
| 1665 |
+
[60] F. L. Bookstein, “Principal warps: Thin-plate splines and the decomposition of deformations,”
|
| 1666 |
+
IEEE Trans. Pattern Anal. Mach. Intell., vol. 11, no. 6, pp. 567–585, 1989.
|
| 1667 |
+
[61] F. Cole, D. Belanger, D. Krishnan, A. Sarna, I. Mosseri, and W. T. Freeman, “Synthesizing
|
| 1668 |
+
normalized faces from facial identity features,” in Proceedings of the IEEE Conference on
|
| 1669 |
+
Computer Vision and Pattern Recognition (CVPR), July 2017.
|
| 1670 |
+
[62] E. Tabassi, “NFIQ 2.0: NIST Fingerprint image quality,” NISTIR 8034, 2016.
|
| 1671 |
+
[63] NIST,
|
| 1672 |
+
“NIST
|
| 1673 |
+
Special
|
| 1674 |
+
Database
|
| 1675 |
+
14.”
|
| 1676 |
+
https://www.nist.gov/srd/
|
| 1677 |
+
nist-special-database-14, 2022.
|
| 1678 |
+
[64] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, “Fvc2004: Third fingerprint
|
| 1679 |
+
verification competition,” in International conference on biometric authentication, pp. 1–7,
|
| 1680 |
+
Springer, 2004.
|
| 1681 |
+
[65] Neurotechnology, “VeriFinger SDK.” https://www.neurotechnology.com, 2022.
|
| 1682 |
+
[66] Innovatrics, “Innovatrics SDK.” https://www.innovatrics.com/innovatrics-abis/,
|
| 1683 |
+
2022.
|
| 1684 |
+
[67] J. J. Engelsma, K. Cao, and A. K. Jain, “Learning a fixed-length fingerprint representation,”
|
| 1685 |
+
IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1–1, 2019.
|
| 1686 |
+
24
|
| 1687 |
+
|
29E2T4oBgHgl3EQfjQdC/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
2tFKT4oBgHgl3EQf7y43/content/2301.11946v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:3159fafd204453ed29f98d9337d708a94b879cc82191127cd18eec840b448685
|
| 3 |
+
size 381697
|
2tFKT4oBgHgl3EQf7y43/content/tmp_files/2301.11946v1.pdf.txt
ADDED
|
@@ -0,0 +1,2027 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
On the motion of an electron through vacuum fluctuations
|
| 2 |
+
Anirudh Gundhi1, 2, ∗ and Angelo Bassi1, 2, †
|
| 3 |
+
1Department of Physics, University of Trieste, Strada Costiera 11, 34151 Trieste, Italy
|
| 4 |
+
2Istituto Nazionale di Fisica Nucleare, Trieste Section, Via Valerio 2, 34127 Trieste, Italy
|
| 5 |
+
(Dated: January 31, 2023)
|
| 6 |
+
We study the effects of the electromagnetic vacuum on the motion of a non-relativistic electron.
|
| 7 |
+
To this end, the vacuum is treated as the environment and the electron as the system within the
|
| 8 |
+
framework of open quantum systems.
|
| 9 |
+
After tracing over the environmental degrees of freedom,
|
| 10 |
+
we obtain the time evolution of the reduced density matrix of the electron in the position basis.
|
| 11 |
+
Using the master equation, in the first part of the article we derive the equation of motion for the
|
| 12 |
+
expectation value of the position operator. In the presence of an external potential, the equation
|
| 13 |
+
turns out to be the same as its classical counterpart: the Abraham-Lorentz equation. However, in
|
| 14 |
+
its absence, the dynamics is free of the runaway solution. In the second part of the article we study
|
| 15 |
+
decoherence induced by vacuum fluctuations. We show that decoherence that appears at the level
|
| 16 |
+
of the reduced density matrix does not correspond to actual irreversible loss of coherence.
|
| 17 |
+
Numerous physical phenomena such as the Casimir ef-
|
| 18 |
+
fect [1–3], the Unruh effect [4–6] and the Lamb shift [7–
|
| 19 |
+
10] are attributed to the presence of vacuum fluctuations.
|
| 20 |
+
The possibility of decoherence due to vacuum fluctua-
|
| 21 |
+
tions, as being fundamental and unavoidable, has also
|
| 22 |
+
been discussed in various works [11–18] without arriving
|
| 23 |
+
at a general consensus.
|
| 24 |
+
The interaction of an electron with the vacuum fluctu-
|
| 25 |
+
ations can be studied within the framework of open quan-
|
| 26 |
+
tum systems. We use this formalism to study two spe-
|
| 27 |
+
cific phenomena. First, we derive the equation of motion
|
| 28 |
+
(EOM) for the electron in the presence of an external po-
|
| 29 |
+
tential that provides a quantum mechanical description
|
| 30 |
+
of radiation emission by an accelerated electron.
|
| 31 |
+
Sec-
|
| 32 |
+
ond, we investigate if the interactions with the vacuum
|
| 33 |
+
fluctuations alone can lead to spatial decoherence of the
|
| 34 |
+
electron.
|
| 35 |
+
The quantum mechanical version of the classical
|
| 36 |
+
Abraham-Lorentz (AL) equation, which describes the re-
|
| 37 |
+
coil force experienced by an accelerated electron due to
|
| 38 |
+
the emission of radiation [19–22], has been previously
|
| 39 |
+
derived, for example, in [10]. Instead of the electron’s
|
| 40 |
+
position, the equation was obtained for the position op-
|
| 41 |
+
erator and it was then argued why this operator equa-
|
| 42 |
+
tion is fundamentally different from the classical one.
|
| 43 |
+
The difficulties in making a direct connection with the
|
| 44 |
+
classical dynamics were attributed to the presence of the
|
| 45 |
+
additional transverse electric field operator of the electro-
|
| 46 |
+
magnetic vacuum, which is zero classically. Similar prob-
|
| 47 |
+
lem persists concerning the interpretation of the quantum
|
| 48 |
+
Langevin equation obtained in [17] for an electron inter-
|
| 49 |
+
acting with vacuum fluctuations.
|
| 50 |
+
In our work, we use the path-integral formalism to ob-
|
| 51 |
+
tain the explicit expression of the reduced density matrix
|
| 52 |
+
in the position basis. The formalism used is adopted from
|
| 53 |
+
[23].
|
| 54 |
+
Within this framework, instead of the Langevin
|
| 55 | |
| 56 | |
| 57 |
+
equation, we derive the master equation which yields the
|
| 58 |
+
EOM for the expectation value of the position operator
|
| 59 |
+
which provides a direct correspondence with the classical
|
| 60 |
+
dynamics. In the presence of an arbitrary potential, we
|
| 61 |
+
show that the classical EOM is the same as the one ob-
|
| 62 |
+
tained from the reduced quantum dynamics. Moreover,
|
| 63 |
+
the equation that emerges after a quantum mechanical
|
| 64 |
+
treatment appears to be free of the problems associated
|
| 65 |
+
with the AL equation: the existence of the runaway so-
|
| 66 |
+
lution which leads to an exponential increase of the elec-
|
| 67 |
+
tron’s acceleration, even in the absence of an external
|
| 68 |
+
potential [19–21].
|
| 69 |
+
Concerning decoherence, we show that the loss of co-
|
| 70 |
+
herence due to vacuum fluctuations at the level of the re-
|
| 71 |
+
duced density matrix is only apparent and reversible. To
|
| 72 |
+
this end we show that by ‘switching off’ the interactions
|
| 73 |
+
with the EM field, the original coherence is restored at
|
| 74 |
+
the level of the system. Moreover, the expression for the
|
| 75 |
+
decoherence factor that we obtain differs from the ones
|
| 76 |
+
obtained in [17, 18] where the authors argue for a finite
|
| 77 |
+
loss of coherence for momentum superpositions, due to
|
| 78 |
+
vacuum fluctuations, but with different estimates for the
|
| 79 |
+
magnitude of decoherence.
|
| 80 |
+
The action. We work in the Coulomb gauge in which the
|
| 81 |
+
Lagrangian relevant for the dynamics of a non-relativistic
|
| 82 |
+
electron in the presence of an external potential and an
|
| 83 |
+
external radiation field is given by [24]
|
| 84 |
+
L(t) = 1
|
| 85 |
+
2m˙r2
|
| 86 |
+
e − V0(re) +
|
| 87 |
+
�
|
| 88 |
+
d3rLEM − ereE⊥(re) .
|
| 89 |
+
(1)
|
| 90 |
+
Here, re denotes the position of the electron, m the
|
| 91 |
+
bare mass, e the electric charge, V0(re) an arbitrary
|
| 92 |
+
bare external potential (acting only on the electron) and
|
| 93 |
+
LEM := (ϵ0/2)
|
| 94 |
+
�
|
| 95 |
+
E2
|
| 96 |
+
⊥(r) − c2B2(r)
|
| 97 |
+
��
|
| 98 |
+
in which E⊥ denotes
|
| 99 |
+
the transverse electric field, B the magnetic field, ϵ0 the
|
| 100 |
+
permittivity of free space and c the speed of light. As
|
| 101 |
+
detailed in Appendix A, Eq. (1) is obtained from the
|
| 102 |
+
general Lagrangian for electrodynamics under the non-
|
| 103 |
+
relativistic approximation.
|
| 104 |
+
Following the standard prescription, the EM field is
|
| 105 |
+
quantized by quantizing the transverse vector potential
|
| 106 |
+
arXiv:2301.11946v1 [quant-ph] 27 Jan 2023
|
| 107 |
+
|
| 108 |
+
2
|
| 109 |
+
ˆA⊥. In terms of its conjugate momentum ˆΠ (which is
|
| 110 |
+
not proportional to E⊥ due to the form of the interaction
|
| 111 |
+
term in Eq. (1), c.f. Appendix A), we define and work
|
| 112 |
+
with ˆΠE = − ˆΠ/ϵ0, since it appears repeatedly in the
|
| 113 |
+
calculations. Further, the quantized EM field is initially
|
| 114 |
+
assumed to be in its vacuum state.
|
| 115 |
+
The master equation via path integral formalism.
|
| 116 |
+
The
|
| 117 |
+
position basis representation of the full density matrix
|
| 118 |
+
within the path integral formalism is given by [23, 25]
|
| 119 |
+
⟨x′
|
| 120 |
+
f| ˆρ(t) |xf⟩ =
|
| 121 |
+
�
|
| 122 |
+
D[x, x′]e
|
| 123 |
+
i
|
| 124 |
+
ℏ (S′
|
| 125 |
+
T−ST)ρ(x′
|
| 126 |
+
i, xi, ti) .
|
| 127 |
+
(2)
|
| 128 |
+
Eq. (2) describes the density matrix at some final time t,
|
| 129 |
+
starting from an initial time ti, such that xi := x(ti),
|
| 130 |
+
x′
|
| 131 |
+
i := x′(ti), with S′
|
| 132 |
+
T := ST[x′] (and similarly ST :=
|
| 133 |
+
ST[x]) denoting the full action describing some general
|
| 134 |
+
dynamics along the x-axis. The path integral in Eq. (2)
|
| 135 |
+
is computed with the boundary conditions xf = x(t),
|
| 136 |
+
x′
|
| 137 |
+
f = x′(t), and includes the integral over xi and x′
|
| 138 |
+
i.
|
| 139 |
+
In our case, the quantized radiation field is treated as
|
| 140 |
+
the environment, initially assumed to be in its vacuum
|
| 141 |
+
state and the electron as the system. We are interested
|
| 142 |
+
in the reduced effective dynamics of the electron having
|
| 143 |
+
taken into account its interaction with the environment.
|
| 144 |
+
This is described by the reduced density matrix ˆρr which
|
| 145 |
+
is obtained after tracing over the environmental degrees
|
| 146 |
+
of freedom. After performing the trace, by assuming the
|
| 147 |
+
initial density matrix to be in the product state ˆρ(ti) =
|
| 148 |
+
ˆρS(ti) ⊗ ˆρEM(ti), ˆρr takes the form [23] (c.f. Appendix B)
|
| 149 |
+
ρr(x′
|
| 150 |
+
f, xf, t) =
|
| 151 |
+
�
|
| 152 |
+
D[x, x′]e
|
| 153 |
+
i
|
| 154 |
+
ℏ (S′
|
| 155 |
+
S−SS+SIF[x,x′])ρr(x′
|
| 156 |
+
i, xi, ti) ,
|
| 157 |
+
with, SIF = 1
|
| 158 |
+
2
|
| 159 |
+
� t
|
| 160 |
+
ti
|
| 161 |
+
dt1dt2xa(t1)Mab(t1; t2)xb(t2) .
|
| 162 |
+
(3)
|
| 163 |
+
Here, SS denotes the action corresponding to the sys-
|
| 164 |
+
tem Hamiltonian (c.f. Appendix A) and, under the Ein-
|
| 165 |
+
stein summation convention, we have introduced the vec-
|
| 166 |
+
tor notation xa(t1) = x(t1) for a = 1 and xa(t1) = x′(t1)
|
| 167 |
+
for a = 2 such that the matrix elements Mab are re-
|
| 168 |
+
lated to the two-point correlations of the canonical trans-
|
| 169 |
+
verse electric field operator ˆΠE (c.f. Appendix B). Since
|
| 170 |
+
the electron’s motion is considered to be along the x-
|
| 171 |
+
axis only, the two-point correlations involve only the x-
|
| 172 |
+
component of ˆΠE. In terms of the creation and annihi-
|
| 173 |
+
lation operators, and the x-component of the unit polar-
|
| 174 |
+
ization vector εx
|
| 175 |
+
k, it is given by [26]
|
| 176 |
+
ˆΠE(r, t) = iC
|
| 177 |
+
�
|
| 178 |
+
d3k
|
| 179 |
+
√
|
| 180 |
+
k
|
| 181 |
+
�
|
| 182 |
+
ε
|
| 183 |
+
ˆaε(k)ei(k·r−ωt)εx
|
| 184 |
+
k + c.c , (4)
|
| 185 |
+
with the constant prefactor C :=
|
| 186 |
+
�
|
| 187 |
+
ℏc/(2ϵ0(2π)3)
|
| 188 |
+
� 1
|
| 189 |
+
2 . By
|
| 190 |
+
making a change of basis to (X(t), u(t)) with X(t) =
|
| 191 |
+
(x(t) + x′(t))/2 and u(t) = x′(t) − x(t), the so-called
|
| 192 |
+
influence functional SIF [27] takes the simplified form
|
| 193 |
+
SIF[X, u](t) =
|
| 194 |
+
� t
|
| 195 |
+
ti
|
| 196 |
+
dt1dt2
|
| 197 |
+
�
|
| 198 |
+
iu(t1)N(t1; t2)u(t2)
|
| 199 |
+
2
|
| 200 |
+
+
|
| 201 |
+
u(t1)D(t1; t2)X(t2)] ,
|
| 202 |
+
(5)
|
| 203 |
+
where the noise kernel N(t1; t2) and the dissipation ker-
|
| 204 |
+
nel D(t1; t2) are defined to be
|
| 205 |
+
N(t1; t2) := e2
|
| 206 |
+
2ℏ ⟨0| {ˆΠE(t1), ˆΠE(t2)} |0⟩ ,
|
| 207 |
+
D(t1; t2) :=ie2
|
| 208 |
+
ℏ ⟨0|
|
| 209 |
+
�
|
| 210 |
+
ˆΠE(t1), ˆΠE(t2)
|
| 211 |
+
�
|
| 212 |
+
|0⟩ θ(t1 − t2) .
|
| 213 |
+
(6)
|
| 214 |
+
Here, |0⟩ is the vacuum state of the free radiation field
|
| 215 |
+
and θ(τ) is the Heaviside step function. As in [17, 18],
|
| 216 |
+
we have also used the standard non-relativistic dipole ap-
|
| 217 |
+
proximation in which one ignores the spatial dependence
|
| 218 |
+
of the EM fields. From the definitions in Eq. (6) and the
|
| 219 |
+
expression for ˆΠE in Eq. (4), the explicit expressions for
|
| 220 |
+
the noise and the dissipation kernels can be obtained.
|
| 221 |
+
It is important to note that the evaluation of the ker-
|
| 222 |
+
nels necessiates the introduction of a high frequency cut-
|
| 223 |
+
off in the calculations. This is due to the fact that the
|
| 224 |
+
expressions for the kernels, which only depend upon the
|
| 225 |
+
difference τ := t1 − t2, diverge at τ = 0. A cure is pro-
|
| 226 |
+
vided by the standard Hadamard finite part prescription
|
| 227 |
+
[23] which introduces the convergence factor e−k/kmax in-
|
| 228 |
+
side the integrals appearing in the vacuum expectation
|
| 229 |
+
values of the commutator and the anti-commutator. In
|
| 230 |
+
terms of ϵ = 1/ωmax, with ωmax = kmaxc being the high
|
| 231 |
+
frequency cut-off, the kernels read (c.f. Appendix C)
|
| 232 |
+
N(t1; t2) = N(τ) =
|
| 233 |
+
e2
|
| 234 |
+
π2ϵ0c3
|
| 235 |
+
�
|
| 236 |
+
ϵ4 − 6ϵ2τ 2 + τ 4�
|
| 237 |
+
(ϵ2 + τ 2)4
|
| 238 |
+
,
|
| 239 |
+
(7)
|
| 240 |
+
D(t1; t2) = D(τ) =
|
| 241 |
+
e2
|
| 242 |
+
3πϵ0c3 θ(τ) d3
|
| 243 |
+
dτ 3 δϵ(τ) .
|
| 244 |
+
(8)
|
| 245 |
+
The function πδϵ(τ) := ϵ/(τ 2 + ϵ2) appearing in Eq. (8)
|
| 246 |
+
behaves like a Dirac delta for τ ≫ ϵ but is non-singular
|
| 247 |
+
at τ = 0 due to the finite cut-off. We refer to Appendix C
|
| 248 |
+
for more details.
|
| 249 |
+
Following [23], starting from Eq. (3) and using the ex-
|
| 250 |
+
plicit functional form of SIF in Eq. (5), the master equa-
|
| 251 |
+
tion for the reduced density matrix can be derived. Upto
|
| 252 |
+
second order in the interactions, we obtain its expression
|
| 253 |
+
to be (c.f. Appendix B for a detailed derivation)
|
| 254 |
+
∂tˆρr(t) = − i
|
| 255 |
+
ℏ
|
| 256 |
+
�
|
| 257 |
+
ˆHs, ˆρr(t)
|
| 258 |
+
�
|
| 259 |
+
− 1
|
| 260 |
+
ℏ
|
| 261 |
+
� t−ti
|
| 262 |
+
0
|
| 263 |
+
dτN(t; t − τ) [ˆx, [ˆxHs(−τ), ˆρr(t)]]
|
| 264 |
+
+ i
|
| 265 |
+
2ℏ
|
| 266 |
+
� t−ti
|
| 267 |
+
0
|
| 268 |
+
dτD(t; t − τ) [ˆx, {ˆxHs(−τ), ˆρr(t)}] .
|
| 269 |
+
(9)
|
| 270 |
+
The first line of the master equation is the usual Liouville-
|
| 271 |
+
von Neuman evolution and involves only the system
|
| 272 |
+
Hamiltonian ˆHs. In the second and the third lines, which
|
| 273 |
+
encode the system’s interaction with the environment,
|
| 274 |
+
the operator ˆxHs(−τ) is used as a place holder for the
|
| 275 |
+
expression
|
| 276 |
+
ˆxHs(−τ) := ˆU −1
|
| 277 |
+
s
|
| 278 |
+
(t − τ; t)ˆx ˆUs(t − τ; t) ,
|
| 279 |
+
(10)
|
| 280 |
+
|
| 281 |
+
3
|
| 282 |
+
where ˆUs(t − τ; t) is the unitary operator that evolves
|
| 283 |
+
the statevector of the system from time t to t − τ via the
|
| 284 |
+
system Hamiltonian ˆHs only.
|
| 285 |
+
The operator ˆx without
|
| 286 |
+
the subscript is the usual Schr¨odinger operator such that
|
| 287 |
+
ˆxHs(0) = ˆx.
|
| 288 |
+
Note that due to the coupling between the position of
|
| 289 |
+
the electron and the transverse electric field in Eq. (1),
|
| 290 |
+
the system Hamiltonian receives an additional contribu-
|
| 291 |
+
tion such that ˆHs = ˆp2/(2m) + ˆV0(x) + ˆVEM(x), where,
|
| 292 |
+
having introduced a cut-off scale in the calculations and
|
| 293 |
+
considering the motion of the electron along the x-axis
|
| 294 |
+
only, ˆVEM(x) =
|
| 295 |
+
e2ω3
|
| 296 |
+
max
|
| 297 |
+
3π2ϵ0c3 ˆx2 (c.f. Appendix A). We point
|
| 298 |
+
out that since the master equation is valid upto second
|
| 299 |
+
order in the interactions and since the operator ˆxHs(−τ)
|
| 300 |
+
appears alongside the dissipation and the noise kernels
|
| 301 |
+
(which are already second order in e), the time evolu-
|
| 302 |
+
tion governed by ˆUs(t − τ; t) in Eq. (10) is understood
|
| 303 |
+
to involve only ˆV0 and not ˆVEM. Therefore, upto second
|
| 304 |
+
order in the interactions, ˆVEM only contributes via the
|
| 305 |
+
Liouville-von Neuman term.
|
| 306 |
+
The equation of motion. Using the master equation (9),
|
| 307 |
+
we obtain the coupled equations for the time evolution
|
| 308 |
+
of ⟨ˆx⟩ and ⟨ˆp⟩. It is interesting to compare the quantum
|
| 309 |
+
mechanical EOM with the one derived classically.
|
| 310 |
+
Within classical electrodynamics, a charged spherical
|
| 311 |
+
shell of radius R which is accelerated by an external force
|
| 312 |
+
Fext, experiences an extra recoil force (radiation reaction)
|
| 313 |
+
due to the emission of radiation. By taking the limit R →
|
| 314 |
+
0 in the equation describing its dynamics, one obtains the
|
| 315 |
+
Abraham-Lorentz formula
|
| 316 |
+
mR¨x = Fext + 2ℏα
|
| 317 |
+
3c2
|
| 318 |
+
...x ,
|
| 319 |
+
(11)
|
| 320 |
+
where mR denotes the observed renormalized mass. See
|
| 321 |
+
for example [20, 28] and the references therein for the
|
| 322 |
+
derivation of the AL formula. The triple derivative term
|
| 323 |
+
appearing in Eq. (11) can be interpreted as the friction
|
| 324 |
+
term that leads to energy loss due to radiation emission.
|
| 325 |
+
For instance, when the external potential is taken to be
|
| 326 |
+
V0(x) = (1/2)mω2
|
| 327 |
+
0x2, one has ...x ≈ −ω2
|
| 328 |
+
0 ˙x [22]. However,
|
| 329 |
+
the issue with Eq. (11) is that the same triple derivative
|
| 330 |
+
term persists even when the external potential is switched
|
| 331 |
+
off, leading to an exponentially increase of the particle’s
|
| 332 |
+
acceleration.
|
| 333 |
+
A discussion of the AL formula and the
|
| 334 |
+
problems associated with it can be found in [19–21, 28]
|
| 335 |
+
and the references therein.
|
| 336 |
+
In the case that we are considering, the rate of change
|
| 337 |
+
of the expectation values is calculated from Eq. (9). The
|
| 338 |
+
coupled differential equations for ⟨ˆx⟩ and ⟨ˆp⟩ are given
|
| 339 |
+
by (c.f. Appendix E)
|
| 340 |
+
d
|
| 341 |
+
dt⟨ˆx⟩ =Tr(ˆx ˙ˆρr) = ⟨ˆp⟩
|
| 342 |
+
m ,
|
| 343 |
+
(12)
|
| 344 |
+
d
|
| 345 |
+
dt⟨ˆp⟩ = − ⟨ ˆV0,x ⟩ + Tr
|
| 346 |
+
�
|
| 347 |
+
ˆρr(t)
|
| 348 |
+
� t−ti
|
| 349 |
+
0
|
| 350 |
+
dτD(τ)ˆxHs(−τ)
|
| 351 |
+
�
|
| 352 |
+
− 2e2ω3
|
| 353 |
+
max⟨ˆx⟩/(3π2ϵ0c3) .
|
| 354 |
+
(13)
|
| 355 |
+
While it might not be apparent at the first glance,
|
| 356 |
+
Eq. (13) is actually local in time due the form of the
|
| 357 |
+
dissipation kernel in Eq. (8). To see this explicitly, the
|
| 358 |
+
integral involving the dissipation kernel needs to be eval-
|
| 359 |
+
uated. In order to do so, we integrate by parts such that
|
| 360 |
+
the derivatives acting on δϵ (which appear in the expres-
|
| 361 |
+
sion obtained for the dissipation kernel in Eq. (8)) are
|
| 362 |
+
shifted onto the adjacent function. The integral is calcu-
|
| 363 |
+
lated explicitly in Appendix D and the following identity
|
| 364 |
+
is derived
|
| 365 |
+
� t
|
| 366 |
+
0
|
| 367 |
+
dτD(τ)f(τ) = − 2αℏ
|
| 368 |
+
3c2 f ′′′(0) − 4αℏωmax
|
| 369 |
+
3πc2
|
| 370 |
+
f ′′(0)
|
| 371 |
+
+ 2e2ω3
|
| 372 |
+
maxf(0)/(3π2ϵ0c3) .
|
| 373 |
+
(14)
|
| 374 |
+
Here, the prime denotes the derivative taken with respect
|
| 375 |
+
to τ and α = e2/(4πϵ0ℏc) the fine structure constant.
|
| 376 |
+
Using the identity (14), Eq. (13) becomes
|
| 377 |
+
d
|
| 378 |
+
dt⟨ˆp⟩ = − ⟨ ˆV0,x ⟩ − 4αℏωmax
|
| 379 |
+
3πc2
|
| 380 |
+
Tr
|
| 381 |
+
�
|
| 382 |
+
ˆρr(t) d2
|
| 383 |
+
dτ 2 ˆxHs(−τ)
|
| 384 |
+
����
|
| 385 |
+
τ=0
|
| 386 |
+
�
|
| 387 |
+
− 2αℏ
|
| 388 |
+
3c2 Tr
|
| 389 |
+
�
|
| 390 |
+
ˆρr(t) d3
|
| 391 |
+
dτ 3 ˆxHs(−τ)
|
| 392 |
+
����
|
| 393 |
+
τ=0
|
| 394 |
+
�
|
| 395 |
+
.
|
| 396 |
+
(15)
|
| 397 |
+
We see that in the EOM (15) only the original bare po-
|
| 398 |
+
tential ˆV0 remains, because the contribution coming from
|
| 399 |
+
ˆVEM in the last line of Eq. (13) is canceled by the term
|
| 400 |
+
in the last line of the integral (14), after one introduces
|
| 401 |
+
the cut-off consistently throughout the calculations. For
|
| 402 |
+
more details we refer to Appendices A and E, or Ref. [17]
|
| 403 |
+
where the same cancellation was argued for.
|
| 404 |
+
The time derivatives of ˆxHs in Eq. (15) can be easily
|
| 405 |
+
computed, since from Eq. (10) we have the relation (upto
|
| 406 |
+
leading order in the interactions)
|
| 407 |
+
d
|
| 408 |
+
dτ ˆxHs(−τ) = − i
|
| 409 |
+
ℏ
|
| 410 |
+
�
|
| 411 |
+
ˆV0(x) + ˆp2
|
| 412 |
+
2m, ˆxHs(−τ)
|
| 413 |
+
�
|
| 414 |
+
.
|
| 415 |
+
(16)
|
| 416 |
+
First we consider the situation when the external poten-
|
| 417 |
+
tial is switched off. From Eq. (16), with ˆV0(x) = 0, taking
|
| 418 |
+
another time derivative of ˆxHs we get
|
| 419 |
+
d2
|
| 420 |
+
dτ 2 ˆxHs(−τ)
|
| 421 |
+
����
|
| 422 |
+
τ=0
|
| 423 |
+
=
|
| 424 |
+
�−i
|
| 425 |
+
ℏ
|
| 426 |
+
�2 � ˆp2
|
| 427 |
+
2m,
|
| 428 |
+
� ˆp2
|
| 429 |
+
2m, ˆx
|
| 430 |
+
��
|
| 431 |
+
= 0 ,
|
| 432 |
+
(17)
|
| 433 |
+
where, in Eq. (17), we have also used the relation
|
| 434 |
+
ˆxHs(0) = ˆx. Similarly, the third derivative term appear-
|
| 435 |
+
ing in Eq. (15) also vanishes. Therefore, when ˆV0(x) = 0,
|
| 436 |
+
Eq. (15) simply reduces to
|
| 437 |
+
d
|
| 438 |
+
dt⟨ˆp⟩ = 0 .
|
| 439 |
+
(18)
|
| 440 |
+
Unlike the AL formula in Eq. (11), we see that upto sec-
|
| 441 |
+
ond order in the interactions there are no solutions which
|
| 442 |
+
allow for an exponential increase of the particle’s accel-
|
| 443 |
+
eration in the absence of an external potential.
|
| 444 |
+
Next we consider the case when the external potential
|
| 445 |
+
is switched on. When the potential does not depend ex-
|
| 446 |
+
plicitly on time, the double and triple derivative terms
|
| 447 |
+
|
| 448 |
+
4
|
| 449 |
+
in Eq. (15) yield double and triple commutators with re-
|
| 450 |
+
spect to the system Hamiltonian respectively (discarding
|
| 451 |
+
ˆVEM upto second order). Eq. (15) can then be written as
|
| 452 |
+
d
|
| 453 |
+
dt⟨ˆp⟩ =Fext + 4αℏωmax
|
| 454 |
+
3πc2
|
| 455 |
+
Tr
|
| 456 |
+
� 1
|
| 457 |
+
ℏ2 ˆρr(t)
|
| 458 |
+
�
|
| 459 |
+
ˆHs,
|
| 460 |
+
�
|
| 461 |
+
ˆHs, ˆx
|
| 462 |
+
���
|
| 463 |
+
− 2αℏ
|
| 464 |
+
3c2 Tr
|
| 465 |
+
� i
|
| 466 |
+
ℏ3 ˆρr(t)
|
| 467 |
+
�
|
| 468 |
+
ˆHs,
|
| 469 |
+
�
|
| 470 |
+
ˆHs,
|
| 471 |
+
�
|
| 472 |
+
ˆHs, ˆx
|
| 473 |
+
����
|
| 474 |
+
. (19)
|
| 475 |
+
Here, we have defined Fext := −⟨ ˆV0(x),x ⟩. Due to the
|
| 476 |
+
presence of ˆV0(x), the commutators of ˆHs with ˆx no
|
| 477 |
+
longer vanish. To simplify the equation further, we shift
|
| 478 |
+
the commutators onto the density matrix using the cyclic
|
| 479 |
+
property Tr(ˆa · [ˆb, ˆc]) = Tr([ˆa,ˆb] · ˆc) such that
|
| 480 |
+
Tr
|
| 481 |
+
�
|
| 482 |
+
ˆρr
|
| 483 |
+
�
|
| 484 |
+
ˆHs,
|
| 485 |
+
�
|
| 486 |
+
ˆHs, ˆx
|
| 487 |
+
���
|
| 488 |
+
= Tr
|
| 489 |
+
�
|
| 490 |
+
ˆx
|
| 491 |
+
�
|
| 492 |
+
ˆHs,
|
| 493 |
+
�
|
| 494 |
+
ˆHs, ˆρr
|
| 495 |
+
���
|
| 496 |
+
.
|
| 497 |
+
(20)
|
| 498 |
+
The same relationship is also obtained for the triple com-
|
| 499 |
+
mutator term, with an additional minus sign. Remem-
|
| 500 |
+
bering that the master equation is only valid upto second
|
| 501 |
+
order in the interaction, it is sufficient to evaluate the
|
| 502 |
+
trace in Eq. (19) at 0th order. This implies that within
|
| 503 |
+
the trace, the time dependence of the density matrix can
|
| 504 |
+
be evaluated only by retaining the Liouville-von Neuman
|
| 505 |
+
term in Eq. (9). The right hand side of Eq. (20) thus
|
| 506 |
+
becomes proportional to Tr(ˆx¨ˆρr). With these simplifica-
|
| 507 |
+
tions, Eq. (19) can be written as
|
| 508 |
+
mR
|
| 509 |
+
d2
|
| 510 |
+
dt2 ⟨ˆx⟩ = Fext + 2αℏ
|
| 511 |
+
3c2
|
| 512 |
+
d3
|
| 513 |
+
dt3 ⟨ˆx⟩ .
|
| 514 |
+
(21)
|
| 515 |
+
After identifying the observed electron mass with the re-
|
| 516 |
+
normalized mass mR := m + (4αℏωmax)/(3πc2), Eq. (21)
|
| 517 |
+
reduces to the Abraham-Lorentz formula (11). The same
|
| 518 |
+
result is also obtained for the general case in which the
|
| 519 |
+
bare potential ˆV0(x, t) depends explicitly on time, as
|
| 520 |
+
shown in Appendix E. We remark that the equation of
|
| 521 |
+
motion derived quantum mechanically only reduces to
|
| 522 |
+
Eq. (11) in the presence of an external potential. When
|
| 523 |
+
the external potential is switched off, the EOM reduces
|
| 524 |
+
to Eq. (18) and is therefore free of the runaway solution.
|
| 525 |
+
Decoherence. In this final part of the article, we are inter-
|
| 526 |
+
ested in assessing if the spatial superposition of a charged
|
| 527 |
+
particle at rest can be suppressed via its interaction with
|
| 528 |
+
the vacuum fluctuations alone. We begin by writing the
|
| 529 |
+
position space representation of the master equation (9)
|
| 530 |
+
relevant for decoherence
|
| 531 |
+
∂tρr =
|
| 532 |
+
�
|
| 533 |
+
−(x′ − x)2N1(t)
|
| 534 |
+
ℏ
|
| 535 |
+
�
|
| 536 |
+
ρr ,
|
| 537 |
+
(22)
|
| 538 |
+
where N1(τ) is defined to be N1(τ) :=
|
| 539 |
+
� τ
|
| 540 |
+
0 dτ ′N(τ ′) =
|
| 541 |
+
−4αℏ(τ 3 − 3τϵ2)(τ 2 +ϵ2)−3(3πc2)−1 . We have set ti = 0
|
| 542 |
+
and only retained the second term involving the noise ker-
|
| 543 |
+
nel in Eq. (9). This is because the other terms typically
|
| 544 |
+
give subdominant contributions when the question of in-
|
| 545 |
+
terest is to evaluate the rate of decay of the off-diagonal
|
| 546 |
+
elements of the density matrix at late times [23, 29]. We
|
| 547 |
+
have also used the expression of the noise kernel in Eq. (7)
|
| 548 |
+
inside the integral to obtain the expression for N1. Inte-
|
| 549 |
+
grating Eq. (22) we get
|
| 550 |
+
ρr(x′, x, t) = exp
|
| 551 |
+
�
|
| 552 |
+
−(x′ − x)2
|
| 553 |
+
ℏ
|
| 554 |
+
N2(t)
|
| 555 |
+
�
|
| 556 |
+
ρr(x′, x, 0) , (23)
|
| 557 |
+
where N2(t) :=
|
| 558 |
+
� t
|
| 559 |
+
0 dτN1(τ). The function N2(t) is in-
|
| 560 |
+
versely proportional to the coherence length lx(t) defined
|
| 561 |
+
by lx(t) := (ℏ/N2(t))
|
| 562 |
+
1
|
| 563 |
+
2 .
|
| 564 |
+
After performing the integral
|
| 565 |
+
over N1 the expression for the coherence length is ob-
|
| 566 |
+
tained to be
|
| 567 |
+
lx(t) =
|
| 568 |
+
�
|
| 569 |
+
3πc2
|
| 570 |
+
2αω2
|
| 571 |
+
max
|
| 572 |
+
· (t2 + ϵ2)2
|
| 573 |
+
t4 + 3t2ϵ2
|
| 574 |
+
t≫ϵ
|
| 575 |
+
=
|
| 576 |
+
�
|
| 577 |
+
3π
|
| 578 |
+
2α
|
| 579 |
+
1
|
| 580 |
+
kmax
|
| 581 |
+
.
|
| 582 |
+
(24)
|
| 583 |
+
We see that the coherence length approaches a constant
|
| 584 |
+
value on time scales much larger than ϵ = 1/ωmax and
|
| 585 |
+
that its value scales inversely with the UV cut-off. Taken
|
| 586 |
+
literally, if one sets kmax = 1/λdb, where λdb is the de
|
| 587 |
+
Broglie wavelength of the electron, one would arrive at
|
| 588 |
+
the conclusion that vacuum fluctuations lead to decoher-
|
| 589 |
+
ence with the coherence length of the charged particle
|
| 590 |
+
asymptotically reducing to lx ≈ 25λdb within the time
|
| 591 |
+
scales t ≈ λdb/c.
|
| 592 |
+
False Decoherence. It is clearly unsatisfactory to have
|
| 593 |
+
an observable effect scale explicitly with the UV cut-off,
|
| 594 |
+
since the precise numerical value of the cut-off is, strictly
|
| 595 |
+
speaking, arbitrary. A similar situation was encountered
|
| 596 |
+
in [30] in a different context of a harmonic oscillator cou-
|
| 597 |
+
pled to a massive scalar field. However, it was argued in
|
| 598 |
+
[30] that the reduced density matrix of the harmonic os-
|
| 599 |
+
cillator described false decoherence. In such a situation,
|
| 600 |
+
the off-diagonal elements of the density matrix are sup-
|
| 601 |
+
pressed simply because the state of the environment goes
|
| 602 |
+
into different configurations depending upon the spatial
|
| 603 |
+
location of the system. However, these changes in the
|
| 604 |
+
environmental states remain locally around the system
|
| 605 |
+
and are reversible. For the electron interacting with vac-
|
| 606 |
+
uum fluctuations, we therefore take the point of view
|
| 607 |
+
that if the reduced density matrix describes false deco-
|
| 608 |
+
herence, then after adiabatically switching off the inter-
|
| 609 |
+
actions with the environment (after having adiabatically
|
| 610 |
+
switched it on initially), the original coherence must be
|
| 611 |
+
fully restored at the level of the system.
|
| 612 |
+
To formulate the argument we consider a time depen-
|
| 613 |
+
dent coupling q(t) = −ef(t) such that f(t) = 1 for
|
| 614 |
+
most of the dynamics between the initial time t = 0
|
| 615 |
+
and the final time t = T, while f(0) = f(T) = 0.
|
| 616 |
+
The quantity relevant for decoherence is the noise kernel
|
| 617 |
+
which, under the time-dependent coupling, transforms as
|
| 618 |
+
N → ˜
|
| 619 |
+
N = f(t1)f(t2)N(t1; t2) = f(t1)f(t2)N(t1 − t2) .
|
| 620 |
+
The decoherence factor in the double commutator in
|
| 621 |
+
Eq. (9) involves replacing t2 with t1 − τ and then in-
|
| 622 |
+
tegrating over τ. Therefore, the function N1 transforms
|
| 623 |
+
as N1 → ˜
|
| 624 |
+
N1, with ˜
|
| 625 |
+
N1 given by
|
| 626 |
+
˜
|
| 627 |
+
N1(t1) = f(t1)
|
| 628 |
+
� t1
|
| 629 |
+
0
|
| 630 |
+
dτf(t1 − τ)N(τ) .
|
| 631 |
+
(25)
|
| 632 |
+
|
| 633 |
+
5
|
| 634 |
+
From the definitions of N1 and N2 we have N1 =
|
| 635 |
+
(d/dτ)N, N2 = (d/dτ)N1 and N1(0) = N2(0) = 0. Using
|
| 636 |
+
these relations and integrating by parts, Eq. (25) becomes
|
| 637 |
+
˜
|
| 638 |
+
N1(t1) =f(t1)N1(t1)f(0) + f(t1)N2(t1) ˙f(0)
|
| 639 |
+
+ f(t1)
|
| 640 |
+
� t1
|
| 641 |
+
0
|
| 642 |
+
dτN2(τ) d2
|
| 643 |
+
dτ 2 f(t1 − τ) .
|
| 644 |
+
(26)
|
| 645 |
+
In the limit ϵ → 0 (taking the UV cut-off to infinity), we
|
| 646 |
+
see from Eq. (24) that N2 looses any time dependence.
|
| 647 |
+
We can therefore bring N2 outside the integral such that
|
| 648 |
+
˜
|
| 649 |
+
N1(t1) = f(t1)N1(t1)f(0)+f(t1)N2 ˙f(0)−f(t1)N2( ˙f(0)−
|
| 650 |
+
˙f(t1)). The terms involving ˙f(0) cancel out and we get
|
| 651 |
+
˜
|
| 652 |
+
N1(t1) = f(t1)N1(t1)f(0) + f(t1)N2 ˙f(t1) .
|
| 653 |
+
(27)
|
| 654 |
+
After integrating by parts Eq. (27), in order to obtain
|
| 655 |
+
˜
|
| 656 |
+
N2(T) =
|
| 657 |
+
� T
|
| 658 |
+
0 dt1 ˜
|
| 659 |
+
N1(t1), we get
|
| 660 |
+
˜
|
| 661 |
+
N2(T) =f(0) (f(T)N2(T) − f(0)N2(0))
|
| 662 |
+
− f(0)N2
|
| 663 |
+
� T
|
| 664 |
+
0
|
| 665 |
+
dt1 ˙f + N2
|
| 666 |
+
2
|
| 667 |
+
� T
|
| 668 |
+
0
|
| 669 |
+
dt1
|
| 670 |
+
d
|
| 671 |
+
dt1
|
| 672 |
+
f 2 .
|
| 673 |
+
(28)
|
| 674 |
+
In the limit ϵ → 0, as we noted earlier, N2(t) takes a
|
| 675 |
+
constant value for any time t > 0 but is zero at t = 0
|
| 676 |
+
from the way it is defined. Therefore, after completing
|
| 677 |
+
the remaining integrals, we get
|
| 678 |
+
˜
|
| 679 |
+
N2(T) = N2
|
| 680 |
+
2
|
| 681 |
+
�
|
| 682 |
+
f 2(0) + f 2(T)
|
| 683 |
+
�
|
| 684 |
+
.
|
| 685 |
+
(29)
|
| 686 |
+
Since we assume that the interactions are switched off
|
| 687 |
+
in the very beginning and at the very end, we see that
|
| 688 |
+
˜
|
| 689 |
+
N2(T) = 0 such that Eq. (23) becomes ˜ρr(x′, x, T) =
|
| 690 |
+
ρr(x′, x, 0). Therefore, by adiabatically switching off the
|
| 691 |
+
interactions we recover the original coherence within the
|
| 692 |
+
system.
|
| 693 |
+
This is different from standard collisional decoherence
|
| 694 |
+
where, for example, one originally has ∂tρr(x′, x, t) =
|
| 695 |
+
−Λ(x′ − x)2ρr(x′, x, t) [29].
|
| 696 |
+
When in this case we
|
| 697 |
+
send
|
| 698 |
+
Λ
|
| 699 |
+
→
|
| 700 |
+
˜Λ
|
| 701 |
+
=
|
| 702 |
+
f(t)Λ,
|
| 703 |
+
we
|
| 704 |
+
get
|
| 705 |
+
˜ρr(x′, x, t)
|
| 706 |
+
=
|
| 707 |
+
exp
|
| 708 |
+
�
|
| 709 |
+
−Λ(x′ − x)2 � t
|
| 710 |
+
0 dt′f(t′)
|
| 711 |
+
�
|
| 712 |
+
ρr(x′, x, 0).
|
| 713 |
+
The density
|
| 714 |
+
matrix depends on the integral of f(t) rather than its
|
| 715 |
+
end points and we see that coherence is indeed lost ir-
|
| 716 |
+
reversibly.
|
| 717 |
+
We interpret this result to imply that the
|
| 718 |
+
vacuum fluctuations alone do not lead to irreversible loss
|
| 719 |
+
of coherence. Moreover, our results imply that the ap-
|
| 720 |
+
parent decoherence cannot be due to emission of photons
|
| 721 |
+
as otherwise one would not be able to retrieve the coher-
|
| 722 |
+
ence back into the system simply by switching off the
|
| 723 |
+
interactions with the environment at late times.
|
| 724 |
+
Discussion.
|
| 725 |
+
We formulated the interaction of a non-
|
| 726 |
+
relativistic electron with the radiation field within the
|
| 727 |
+
framework of open quantum systems and obtained the
|
| 728 |
+
master equation for the reduced electron dynamics in the
|
| 729 |
+
position basis. We showed that the classical limit of the
|
| 730 |
+
quantum dynamics is free of the problems associated with
|
| 731 |
+
the purely classical derivation of the Abraham-Lorentz
|
| 732 |
+
formula. With respect to possible decoherence induced
|
| 733 |
+
by vacuum fluctuations alone, we showed that the ap-
|
| 734 |
+
parent decoherence at the level of the reduced density
|
| 735 |
+
matrix is reversible and is an artifact of the formalism
|
| 736 |
+
used. In mathematically tracing over the environment,
|
| 737 |
+
one traces over the degrees of freedom that physically
|
| 738 |
+
surround the system being observed. These degrees of
|
| 739 |
+
freedom must be considered part of the system being ob-
|
| 740 |
+
served, rather than the environment [16, 30]. We formu-
|
| 741 |
+
lated this interpretation by showing that one restores full
|
| 742 |
+
initial coherence back into the system after switching off
|
| 743 |
+
the interactions with the environment adiabatically. The
|
| 744 |
+
formulation is fairly general and might also be used in
|
| 745 |
+
other situations to distinguish true decoherence from a
|
| 746 |
+
false one. The analysis therefore brings together various
|
| 747 |
+
works in the literature [15–18, 30] and addresses some of
|
| 748 |
+
the conflicting results.
|
| 749 |
+
Acknowledgements.
|
| 750 |
+
A.G. thanks Davide Bason and
|
| 751 |
+
Lorenzo Di Pietro for numerous discussions. We thank
|
| 752 |
+
Oliviero Angeli for cross checking some of the results ob-
|
| 753 |
+
tained in the manuscript and Lajos Di´osi for discussions
|
| 754 |
+
concerning false decoherence. A.B. acknowledges finan-
|
| 755 |
+
cial support from the EIC Pathfinder project QuCoM
|
| 756 |
+
(GA no. 101046973) and the PNRR PE National Quan-
|
| 757 |
+
tum Science and Technology Institute (PE0000023). We
|
| 758 |
+
thank the University of Trieste and INFN for financial
|
| 759 |
+
support.
|
| 760 |
+
Appendix A: The Lagrangian and the Hamiltonian formulation
|
| 761 |
+
In the Coulomb gauge, the standard Lagrangian for electrodynamics is given by [24]
|
| 762 |
+
L = 1
|
| 763 |
+
2m˙r2
|
| 764 |
+
e − V0(re) −
|
| 765 |
+
�
|
| 766 |
+
1/2
|
| 767 |
+
d3k |ρ|2
|
| 768 |
+
ϵ0k2 + ϵ0
|
| 769 |
+
2
|
| 770 |
+
�
|
| 771 |
+
d3r
|
| 772 |
+
�
|
| 773 |
+
E2
|
| 774 |
+
⊥(r) − c2B2(r)
|
| 775 |
+
�
|
| 776 |
+
+
|
| 777 |
+
�
|
| 778 |
+
d3rj(r) · A⊥(r) .
|
| 779 |
+
(A1)
|
| 780 |
+
In addition to the terms that have been described in the main article, Eq. (A1) also includes the Coulomb potential
|
| 781 |
+
between different particles. It is given by the third term in which ρ(r) denotes the charge density and the symbol
|
| 782 |
+
�
|
| 783 |
+
1/2 means that the integral is taken over half the volume in the reciprocal space. For a single particle, it reduces to
|
| 784 |
+
the particle’s Coulomb self energy ECoul. After the introduction of a suitable cut-off it takes a finite value given by
|
| 785 |
+
ECoul = αℏωmax/π [22]. The transverse vector potential is denoted by A⊥(r, t) whose negative partial time derivative
|
| 786 |
+
yields the transverse electric field E⊥(r, t) while its curl gives the magnetic field B(r, t). For an electron, the current
|
| 787 |
+
|
| 788 |
+
6
|
| 789 |
+
density is given by j(r) = −e˙rδ(r−re) and the interaction term becomes −e˙reA⊥(re, t). For a non-relativistic charged
|
| 790 |
+
particle, the time derivative can be shifted from the position of the particle onto the transverse vector potential. This
|
| 791 |
+
is because in addition to a total derivative term, a term of the form erevi∂iA⊥(r, t) appears (where vi := ˙ri). After
|
| 792 |
+
the wave expansion of A⊥, this term is seen to be negligible with respect to ere ˙A⊥(re, t) = −ereE⊥(re, t) as long as
|
| 793 |
+
ωk ≫ vk or v ≪ c. Therefore, for the non-relativistic electron, the Lagrangian relevant for the dynamics reduces to
|
| 794 |
+
L(t) ≈ 1
|
| 795 |
+
2m˙r2
|
| 796 |
+
e − V0(re) + ϵ0
|
| 797 |
+
2
|
| 798 |
+
�
|
| 799 |
+
d3r
|
| 800 |
+
�
|
| 801 |
+
E2
|
| 802 |
+
⊥(r) − c2B2(r)
|
| 803 |
+
�
|
| 804 |
+
− ereE⊥(re) .
|
| 805 |
+
(A2)
|
| 806 |
+
In Eq. (A2) the total derivative d/dt(reA⊥(re)) and the constant Coulomb self energy term have been omitted as
|
| 807 |
+
these do not affect the electron’s dynamics.
|
| 808 |
+
The Hamiltonian corresponding to the Lagrangian (A2) can now be obtained. In terms of the canonical variables
|
| 809 |
+
re, p, A⊥ and ΠE := − 1
|
| 810 |
+
ϵ0 Π, it takes the form
|
| 811 |
+
H = HS + HEM + Hint ,
|
| 812 |
+
(A3)
|
| 813 |
+
where HEM = ϵ0
|
| 814 |
+
2
|
| 815 |
+
�
|
| 816 |
+
d3r(Π2
|
| 817 |
+
E(r) + c2B2(r)) is the free field Hamiltonian of the radiation field, Hint = ereΠE(re) the
|
| 818 |
+
interaction term and HS the system Hamiltonian given by
|
| 819 |
+
HS = p2
|
| 820 |
+
2m + V0(re) + e2
|
| 821 |
+
2ϵ0
|
| 822 |
+
�
|
| 823 |
+
d3rriδ⊥
|
| 824 |
+
im(r − re)δ⊥
|
| 825 |
+
mj(r − re)rj .
|
| 826 |
+
(A4)
|
| 827 |
+
Here, the transverse Dirac delta δ⊥
|
| 828 |
+
ij(r − re), which appears due to the coupling of the position of the electron with
|
| 829 |
+
the transverse electric field, is defined to be [22]
|
| 830 |
+
δ⊥
|
| 831 |
+
ij(r − re) :=
|
| 832 |
+
1
|
| 833 |
+
(2π)3
|
| 834 |
+
�
|
| 835 |
+
d3k
|
| 836 |
+
�
|
| 837 |
+
δij − kikj
|
| 838 |
+
k2
|
| 839 |
+
�
|
| 840 |
+
eik·(r−re) .
|
| 841 |
+
(A5)
|
| 842 |
+
The form of HS calls for an identification of the full effective potential V (re) governing the dynamics of the electron
|
| 843 |
+
such that
|
| 844 |
+
V (re) := V0(re) + VEM(re) ,
|
| 845 |
+
VEM(re) = e2
|
| 846 |
+
2ϵ0
|
| 847 |
+
�
|
| 848 |
+
d3rriδ⊥
|
| 849 |
+
im(r − re)δ⊥
|
| 850 |
+
mj(r − re)rj .
|
| 851 |
+
(A6)
|
| 852 |
+
Note that the extra term VEM(re) is not added to the bare potential by hand, but arises naturally due to the reE⊥
|
| 853 |
+
coupling [17]. Although it gives a divergent contribution
|
| 854 |
+
e2
|
| 855 |
+
2ϵ0 δ⊥
|
| 856 |
+
ij(0)ri
|
| 857 |
+
erj
|
| 858 |
+
e, after regularizing the transverse delta function
|
| 859 |
+
on a minimum length scale rmin = 1/kmax, the contribution coming from this term scales as O( e2
|
| 860 |
+
2ϵ0 r2
|
| 861 |
+
ek3
|
| 862 |
+
max). To be
|
| 863 |
+
more precise, we impose the cut-off consistently throughout the calculations by introducing the convergence factor
|
| 864 |
+
e−k/kmax inside the integral in the reciprocal space (c.f. Appendix C). Using this procedure, the expression for δ⊥
|
| 865 |
+
ij(0)
|
| 866 |
+
is obtained to be
|
| 867 |
+
δ⊥
|
| 868 |
+
ij(0) =
|
| 869 |
+
1
|
| 870 |
+
(2π)3
|
| 871 |
+
�
|
| 872 |
+
dkk2e−k/kmax
|
| 873 |
+
�
|
| 874 |
+
dΩ
|
| 875 |
+
�
|
| 876 |
+
δij − kikj
|
| 877 |
+
k2
|
| 878 |
+
�
|
| 879 |
+
.
|
| 880 |
+
(A7)
|
| 881 |
+
First evaluating the angular integral, which gives a factor 8π
|
| 882 |
+
3 δij, and then the radial integral, we get
|
| 883 |
+
VEM(re) = e2ω3
|
| 884 |
+
max
|
| 885 |
+
3π2ϵ0c3 r2
|
| 886 |
+
e .
|
| 887 |
+
(A8)
|
| 888 |
+
Since the contribution of VEM(re) is canceled exactly by another term, as shown in the discussion around Eq. (15) of
|
| 889 |
+
the main text, for all practical purposes, VEM(re) has no consequences on the dynamics of the electron.
|
| 890 |
+
Appendix B: The master equation
|
| 891 |
+
The probability amplitude for a particle to be at the position xf at some final time t, starting from the position xi
|
| 892 |
+
at some initial time ti, is given by [25]
|
| 893 |
+
⟨xf| ˆU(t; ti) |xi⟩ =
|
| 894 |
+
�
|
| 895 |
+
x(t)=xf,
|
| 896 |
+
x(ti)=xi
|
| 897 |
+
D[x, p]e��� i
|
| 898 |
+
ℏ
|
| 899 |
+
� t
|
| 900 |
+
ti dt′(HT[x,p]−p ˙x) =
|
| 901 |
+
�
|
| 902 |
+
x(t)=xf,
|
| 903 |
+
x(ti)=xi
|
| 904 |
+
D[x]e
|
| 905 |
+
i
|
| 906 |
+
ℏ ST[x] ,
|
| 907 |
+
(B1)
|
| 908 |
+
|
| 909 |
+
7
|
| 910 |
+
where HT is the full Hamiltonian and ST is the corresponding action describing some general dynamics. From Eq. (B1)
|
| 911 |
+
the expression for the density matrix at time t can be written as [23]
|
| 912 |
+
⟨x′
|
| 913 |
+
f| ˆρ(t) |xf⟩ =
|
| 914 |
+
�
|
| 915 |
+
x(t)=xf,
|
| 916 |
+
x′(t)=x′
|
| 917 |
+
f
|
| 918 |
+
D[x, x′]e
|
| 919 |
+
i
|
| 920 |
+
ℏ (ST[x′]−ST[x])ρ(x′
|
| 921 |
+
i, xi, ti) ,
|
| 922 |
+
(B2)
|
| 923 |
+
where the integrals over xi and x′
|
| 924 |
+
i are included within the path integral. The expression analogous to Eq. (B1) also
|
| 925 |
+
exists for ⟨pf| ˆU(t; ti) |pi⟩ in which the boundary conditions are fixed on p(t) and the phase-space weighing function is
|
| 926 |
+
instead given by exp{ −i
|
| 927 |
+
ℏ
|
| 928 |
+
� t
|
| 929 |
+
ti dt′ (HT [x, p] + x ˙p)} such that
|
| 930 |
+
⟨pf| ˆU(t; ti) |pi⟩ =
|
| 931 |
+
�
|
| 932 |
+
p(t)=pf,
|
| 933 |
+
p(ti)=pi
|
| 934 |
+
D[x, p]e− i
|
| 935 |
+
ℏ
|
| 936 |
+
� t
|
| 937 |
+
ti dt′(HT[x,p]+x ˙p) .
|
| 938 |
+
(B3)
|
| 939 |
+
For computing the path integral over the EM field, with a slight abuse of notation, we understand exp{ i
|
| 940 |
+
ℏSEM}
|
| 941 |
+
to be simply the appropriate phase-space weighing function appearing inside the path integral with SEM :=
|
| 942 |
+
−
|
| 943 |
+
� t
|
| 944 |
+
ti dt′d3r(HEM − Π ˙A⊥) or SEM := −
|
| 945 |
+
� t
|
| 946 |
+
ti dt′d3r(HEM + A⊥ ˙Π) depending upon the basis states between which the
|
| 947 |
+
transition amplitudes are calculated. We are interested in the dynamics of the electron, having taken into account its
|
| 948 |
+
interaction with the radiation field environment. With this distinction, the total phase-space function can be written
|
| 949 |
+
as ST = SS[x] + SEM[µ] + Sint[x, ΠE], where SS denotes the system action, SEM[µ] := SEM[A⊥, ΠE] the phase-space
|
| 950 |
+
function governing the time evolution of the free radiation field in which µ denotes its phase-space degrees of freedom
|
| 951 |
+
and Sint[x, ΠE] := −e
|
| 952 |
+
� t
|
| 953 |
+
ti dt′xΠE encodes the interaction between the two. The expression for the system-environment
|
| 954 |
+
density matrix can then be written as
|
| 955 |
+
�
|
| 956 |
+
x′
|
| 957 |
+
f; Πf′
|
| 958 |
+
E
|
| 959 |
+
�� ˆρ(t)
|
| 960 |
+
��xf; Πf
|
| 961 |
+
E
|
| 962 |
+
�
|
| 963 |
+
=
|
| 964 |
+
�
|
| 965 |
+
x(t)=xf,
|
| 966 |
+
x′(t)=x′
|
| 967 |
+
f
|
| 968 |
+
D[x, x′]e
|
| 969 |
+
i
|
| 970 |
+
ℏ (SS[x′]−SS[x])ρS(x′
|
| 971 |
+
i, xi, ti)×
|
| 972 |
+
×
|
| 973 |
+
�
|
| 974 |
+
ΠE(t)=Πf
|
| 975 |
+
E,
|
| 976 |
+
Π′
|
| 977 |
+
E(t)=Πf′
|
| 978 |
+
E
|
| 979 |
+
D[µ, µ′]e
|
| 980 |
+
i
|
| 981 |
+
ℏ (SEM[µ′]+Sint[x′,Π′
|
| 982 |
+
E]−SEM[µ]−Sint[x,ΠE])ρEM(Π′
|
| 983 |
+
E(ti), ΠE(ti), ti) ,
|
| 984 |
+
(B4)
|
| 985 |
+
where
|
| 986 |
+
���Πf
|
| 987 |
+
E
|
| 988 |
+
�
|
| 989 |
+
denotes the basis state of the environment. Note that the precise choice of the environmental basis states
|
| 990 |
+
is unimportant since the reduced density matrix is obtained by tracing over the environment. In writing Eq. (B4) we
|
| 991 |
+
have also assumed the full density matrix ˆρ(ti) to be in the product state ˆρ(ti) = ˆρS(ti) ⊗ ˆρEM(ti) at the initial time
|
| 992 |
+
ti. We notice that SEM[µ] is quadratic in the environmental degrees of freedom while Sint[x, ΠE] is linear in both x
|
| 993 |
+
and ΠE. After tracing over the environment, that is integrating over ΠE(t) = Π′
|
| 994 |
+
E(t), the term in the second line of
|
| 995 |
+
Eq. (B4) yields a Gaussian in x such that [23]
|
| 996 |
+
�
|
| 997 |
+
ΠE(t)=Π′
|
| 998 |
+
E(t)
|
| 999 |
+
dΠE(t)D[µ, µ′]e
|
| 1000 |
+
i
|
| 1001 |
+
ℏ (SEM[µ′]+Sint[x′,Π′
|
| 1002 |
+
E]−SEM[µ]−Sint[x,ΠE])ρi
|
| 1003 |
+
EM = e
|
| 1004 |
+
i
|
| 1005 |
+
2ℏ
|
| 1006 |
+
��
|
| 1007 |
+
dt1dt2Mab(t1;t2)xa(t1)xb(t2) ,
|
| 1008 |
+
(B5)
|
| 1009 |
+
where ρi
|
| 1010 |
+
EM := ρEM(Π′
|
| 1011 |
+
E(ti), ΠE(ti), ti). We have also introduced the vector notation with the convention xa = x for
|
| 1012 |
+
a = 1, xa = x′ for a = 2 and xa = ηabxb with ηab = diag(−1, 1). It is the matrix elements Mab which determine the
|
| 1013 |
+
effective action of the system and contain the information about its interaction with the environment. They can be
|
| 1014 |
+
obtained by acting with ℏ
|
| 1015 |
+
i
|
| 1016 |
+
δ
|
| 1017 |
+
δxa
|
| 1018 |
+
δ
|
| 1019 |
+
δxb |xa=xb=0 (where xa and xb are set to zero after taking the derivatives) on Eq. (B5)
|
| 1020 |
+
such that
|
| 1021 |
+
M ab(t1; t2) = ie2
|
| 1022 |
+
ℏ
|
| 1023 |
+
�
|
| 1024 |
+
ΠE(t)=Π′
|
| 1025 |
+
E(t)
|
| 1026 |
+
dΠE(t)D[µ, µ′]Πa
|
| 1027 |
+
E (t1) Πb
|
| 1028 |
+
E (t2) e
|
| 1029 |
+
i
|
| 1030 |
+
ℏ (SEM[µ′]−SEM[µ])ρi
|
| 1031 |
+
EM .
|
| 1032 |
+
(B6)
|
| 1033 |
+
Here, in the light of the standard non-relativistic dipole approximation, we have ignored the spatial dependence of the
|
| 1034 |
+
canonical fields (c.f. Appendix C). Depending upon the value of the indices a and b, the matrix elements correspond
|
| 1035 |
+
to the expectation values of the time-ordered or path-ordered correlations in the Heisenberg picture [23]. For the
|
| 1036 |
+
dynamics of the non-relativistic electron that we are considering, the expression for Mab reads
|
| 1037 |
+
Mab(t1; t2) = ie2
|
| 1038 |
+
ℏ
|
| 1039 |
+
�
|
| 1040 |
+
�
|
| 1041 |
+
�
|
| 1042 |
+
˜T {ˆΠE(t1)ˆΠE(t2)}
|
| 1043 |
+
�
|
| 1044 |
+
0
|
| 1045 |
+
−
|
| 1046 |
+
�
|
| 1047 |
+
ˆΠE(t1)ˆΠE(t2)
|
| 1048 |
+
�
|
| 1049 |
+
0
|
| 1050 |
+
−
|
| 1051 |
+
�
|
| 1052 |
+
ˆΠE(t2)ˆΠE(t1)
|
| 1053 |
+
�
|
| 1054 |
+
0
|
| 1055 |
+
�
|
| 1056 |
+
T {ˆΠE(t1)ˆΠE(t2)}
|
| 1057 |
+
�
|
| 1058 |
+
0
|
| 1059 |
+
�
|
| 1060 |
+
� .
|
| 1061 |
+
(B7)
|
| 1062 |
+
|
| 1063 |
+
8
|
| 1064 |
+
The zero in the subscript denotes that the expectation values are calculated by disregarding the interaction with the
|
| 1065 |
+
system, while T and ˜T denote the time-ordered and the anti-time ordered products respectively. It is also understood
|
| 1066 |
+
that since the electron’s motion is considered to be along the x-axis, the canonical field operator that enters Mab is
|
| 1067 |
+
only the x-component given by [26]
|
| 1068 |
+
ˆΠE(r, t) = i
|
| 1069 |
+
�
|
| 1070 |
+
ℏc
|
| 1071 |
+
2ϵ0(2π)3
|
| 1072 |
+
� 1
|
| 1073 |
+
2 �
|
| 1074 |
+
d3k
|
| 1075 |
+
√
|
| 1076 |
+
k
|
| 1077 |
+
�
|
| 1078 |
+
ε
|
| 1079 |
+
ˆaε(k)ei(k·r−ωt)εx
|
| 1080 |
+
k + c.c .
|
| 1081 |
+
(B8)
|
| 1082 |
+
In our case, the initial state of the environment is taken to be the vacuum state |0⟩ of the radiation field such that
|
| 1083 |
+
⟨·⟩0 = ⟨0| · |0⟩. After tracing over the environment, the reduced density matrix of the electron is obtained from
|
| 1084 |
+
Eq. (B4) to be
|
| 1085 |
+
⟨x′
|
| 1086 |
+
f| ˆρr(t) |xf⟩ =
|
| 1087 |
+
�
|
| 1088 |
+
x(t)=xf,
|
| 1089 |
+
x′(t)=x′
|
| 1090 |
+
f
|
| 1091 |
+
D[x, x′]e
|
| 1092 |
+
i
|
| 1093 |
+
ℏ (SS[x′]−SS[x]+SIF[x,x′])ρr(x′
|
| 1094 |
+
i, xi, ti) ,
|
| 1095 |
+
(B9)
|
| 1096 |
+
where
|
| 1097 |
+
SIF[x, x′] = ie2
|
| 1098 |
+
2ℏ
|
| 1099 |
+
� t
|
| 1100 |
+
ti
|
| 1101 |
+
dt1dt2
|
| 1102 |
+
��
|
| 1103 |
+
˜T {ˆΠE(t1)ˆΠE(t2)}
|
| 1104 |
+
�
|
| 1105 |
+
0 x(t1)x(t2) −
|
| 1106 |
+
�
|
| 1107 |
+
ˆΠE(t1)ˆΠE(t2)
|
| 1108 |
+
�
|
| 1109 |
+
0 x(t1)x′(t2)
|
| 1110 |
+
−
|
| 1111 |
+
�
|
| 1112 |
+
ˆΠE(t2)ˆΠE(t1)
|
| 1113 |
+
�
|
| 1114 |
+
0 x′(t1)x(t2) +
|
| 1115 |
+
�
|
| 1116 |
+
T {ˆΠE(t1)ˆΠE(t2)}
|
| 1117 |
+
�
|
| 1118 |
+
0 x′(t1)x′(t2)
|
| 1119 |
+
�
|
| 1120 |
+
.
|
| 1121 |
+
(B10)
|
| 1122 |
+
The integral
|
| 1123 |
+
� t
|
| 1124 |
+
ti stands for both the t1 and the t2 integrals which run from ti to t.
|
| 1125 |
+
Alternatively, the influence
|
| 1126 |
+
functional SIF can be written in the matrix notation as
|
| 1127 |
+
SIF[x, x′] = 1
|
| 1128 |
+
2
|
| 1129 |
+
� t
|
| 1130 |
+
ti
|
| 1131 |
+
dt1dt2
|
| 1132 |
+
�x(t1) x′(t1)�
|
| 1133 |
+
·
|
| 1134 |
+
�
|
| 1135 |
+
M11 M12
|
| 1136 |
+
M21 M22
|
| 1137 |
+
�
|
| 1138 |
+
·
|
| 1139 |
+
�
|
| 1140 |
+
x(t2)
|
| 1141 |
+
x′(t2)
|
| 1142 |
+
�
|
| 1143 |
+
.
|
| 1144 |
+
(B11)
|
| 1145 |
+
As it is more convenient, we make a change of basis to (X , u) defined by
|
| 1146 |
+
X(t) :=(x′(t) + x(t))/2 ,
|
| 1147 |
+
u(t) = x′(t) − x(t) ,
|
| 1148 |
+
(B12)
|
| 1149 |
+
in which the influence functional transforms as
|
| 1150 |
+
SIF[X, u] = 1
|
| 1151 |
+
2
|
| 1152 |
+
� t
|
| 1153 |
+
ti
|
| 1154 |
+
dt1dt2
|
| 1155 |
+
�X(t1) u(t1)�
|
| 1156 |
+
·
|
| 1157 |
+
� ˜
|
| 1158 |
+
M11
|
| 1159 |
+
˜
|
| 1160 |
+
M12
|
| 1161 |
+
˜
|
| 1162 |
+
M21
|
| 1163 |
+
˜
|
| 1164 |
+
M22
|
| 1165 |
+
�
|
| 1166 |
+
·
|
| 1167 |
+
�
|
| 1168 |
+
X(t2)
|
| 1169 |
+
u(t2)
|
| 1170 |
+
�
|
| 1171 |
+
,
|
| 1172 |
+
(B13)
|
| 1173 |
+
where
|
| 1174 |
+
� ˜
|
| 1175 |
+
M11
|
| 1176 |
+
˜
|
| 1177 |
+
M12
|
| 1178 |
+
˜
|
| 1179 |
+
M21
|
| 1180 |
+
˜
|
| 1181 |
+
M22
|
| 1182 |
+
�
|
| 1183 |
+
=
|
| 1184 |
+
�
|
| 1185 |
+
M11 + M12 + M21 + M22
|
| 1186 |
+
1
|
| 1187 |
+
2 ((M12 − M21) + (M22 − M11))
|
| 1188 |
+
1
|
| 1189 |
+
2 (−(M12 − M21) + (M22 − M11))
|
| 1190 |
+
1
|
| 1191 |
+
4((M11 + M22) − (M12 + M21))
|
| 1192 |
+
�
|
| 1193 |
+
.
|
| 1194 |
+
(B14)
|
| 1195 |
+
From Eq. (B7) we obtain the following relations
|
| 1196 |
+
M11 + M22 = −(M12 + M21) = ie2
|
| 1197 |
+
ℏ
|
| 1198 |
+
�
|
| 1199 |
+
{ˆΠE(t1), ˆΠE(t2)}
|
| 1200 |
+
�
|
| 1201 |
+
0 ,
|
| 1202 |
+
(B15)
|
| 1203 |
+
M12 − M21 = ie2
|
| 1204 |
+
ℏ
|
| 1205 |
+
��
|
| 1206 |
+
ˆΠE(t2), ˆΠE(t1)
|
| 1207 |
+
��
|
| 1208 |
+
0 ,
|
| 1209 |
+
(B16)
|
| 1210 |
+
M22 − M11 = ie2
|
| 1211 |
+
ℏ
|
| 1212 |
+
��
|
| 1213 |
+
ˆΠE(t1), ˆΠE(t2)
|
| 1214 |
+
��
|
| 1215 |
+
0 sgn(t1 − t2) .
|
| 1216 |
+
(B17)
|
| 1217 |
+
Using these relations, ˜
|
| 1218 |
+
M takes the simplified form
|
| 1219 |
+
� ˜
|
| 1220 |
+
M11
|
| 1221 |
+
˜
|
| 1222 |
+
M12
|
| 1223 |
+
˜
|
| 1224 |
+
M21
|
| 1225 |
+
˜
|
| 1226 |
+
M22
|
| 1227 |
+
�
|
| 1228 |
+
= ie2
|
| 1229 |
+
ℏ
|
| 1230 |
+
�
|
| 1231 |
+
�
|
| 1232 |
+
0
|
| 1233 |
+
��
|
| 1234 |
+
ˆΠE(t2), ˆΠE(t1)
|
| 1235 |
+
��
|
| 1236 |
+
0 θ(t2 − t1)
|
| 1237 |
+
��
|
| 1238 |
+
ˆΠE(t1), ˆΠE(t2)
|
| 1239 |
+
��
|
| 1240 |
+
0 θ(t1 − t2)
|
| 1241 |
+
1
|
| 1242 |
+
2
|
| 1243 |
+
�
|
| 1244 |
+
{ˆΠE(t1), ˆΠE(t2)}
|
| 1245 |
+
�
|
| 1246 |
+
0
|
| 1247 |
+
�
|
| 1248 |
+
� ,
|
| 1249 |
+
(B18)
|
| 1250 |
+
where θ(t) is the Heaviside step function. Thus, in the (X, u) basis, the influence functional in Eq. (B10) takes the
|
| 1251 |
+
compact form
|
| 1252 |
+
SIF[X, u](t) =
|
| 1253 |
+
� t
|
| 1254 |
+
ti
|
| 1255 |
+
dt1dt2
|
| 1256 |
+
�
|
| 1257 |
+
iu(t1)N(t1; t2)u(t2)
|
| 1258 |
+
2
|
| 1259 |
+
+ u(t1)D(t1; t2)X(t2)
|
| 1260 |
+
�
|
| 1261 |
+
,
|
| 1262 |
+
(B19)
|
| 1263 |
+
|
| 1264 |
+
9
|
| 1265 |
+
where the noise kernel N and the dissipation kernel D are defined as
|
| 1266 |
+
N(t1; t2) := e2
|
| 1267 |
+
2ℏ
|
| 1268 |
+
�
|
| 1269 |
+
{ˆΠE(t1), ˆΠE(t2)}
|
| 1270 |
+
�
|
| 1271 |
+
0 ,
|
| 1272 |
+
D(t1; t2) :=ie2
|
| 1273 |
+
ℏ
|
| 1274 |
+
��
|
| 1275 |
+
ˆΠE(t1), ˆΠE(t2)
|
| 1276 |
+
��
|
| 1277 |
+
0 θ(t1 − t2) .
|
| 1278 |
+
(B20)
|
| 1279 |
+
Having determined the full effective action for the electron, in terms of the influence functional, we can now derive
|
| 1280 |
+
the master equation. From Eq. (B9), it can be seen that the time derivative of the reduced density matrix will have,
|
| 1281 |
+
in addition to the standard Liouville-von Neuman term, the contribution coming from the influence functional. In
|
| 1282 |
+
order to compute that we need to evaluate the rate of change of SIF. It is given by
|
| 1283 |
+
δtSIF[X, u] = u(t)
|
| 1284 |
+
� t
|
| 1285 |
+
ti
|
| 1286 |
+
dt1 (iN(t; t1)u(t1) + D(t; t1)X(t1)) .
|
| 1287 |
+
(B21)
|
| 1288 |
+
In terms of the original (x, x′) basis, the full expression for the master equation can now be written as
|
| 1289 |
+
∂tρr(x′
|
| 1290 |
+
f, xf, t) = − i
|
| 1291 |
+
ℏ ⟨x′
|
| 1292 |
+
f|
|
| 1293 |
+
�
|
| 1294 |
+
ˆHs, ˆρr
|
| 1295 |
+
�
|
| 1296 |
+
|xf⟩ + i
|
| 1297 |
+
ℏ
|
| 1298 |
+
�
|
| 1299 |
+
x(t)=xf,
|
| 1300 |
+
x′(t)=x′
|
| 1301 |
+
f
|
| 1302 |
+
D[x, x′]δtSIF[x′, x]e
|
| 1303 |
+
i
|
| 1304 |
+
ℏ (SS[x′]−SS[x]+SIF[x,x′])ρr(x′
|
| 1305 |
+
i, xi, ti)
|
| 1306 |
+
≈ − i
|
| 1307 |
+
ℏ ⟨x′
|
| 1308 |
+
f|
|
| 1309 |
+
�
|
| 1310 |
+
ˆHs, ˆρr
|
| 1311 |
+
�
|
| 1312 |
+
|xf⟩ + i
|
| 1313 |
+
ℏ
|
| 1314 |
+
�
|
| 1315 |
+
x(t)=xf,
|
| 1316 |
+
x′(t)=x′
|
| 1317 |
+
f
|
| 1318 |
+
D[x, x′]δtSIF[x′, x]e
|
| 1319 |
+
i
|
| 1320 |
+
ℏ (SS[x′]−SS[x])ρr(x′
|
| 1321 |
+
i, xi, ti)
|
| 1322 |
+
≈ − i
|
| 1323 |
+
ℏ ⟨x′
|
| 1324 |
+
f|
|
| 1325 |
+
�
|
| 1326 |
+
ˆHs, ˆρr
|
| 1327 |
+
�
|
| 1328 |
+
|xf⟩
|
| 1329 |
+
− 1
|
| 1330 |
+
ℏ(x′
|
| 1331 |
+
f − xf)
|
| 1332 |
+
� t
|
| 1333 |
+
ti
|
| 1334 |
+
dt1N(t; t1)
|
| 1335 |
+
�
|
| 1336 |
+
x(t)=xf,
|
| 1337 |
+
x′(t)=x′
|
| 1338 |
+
f
|
| 1339 |
+
D[x, x′](x′(t1) − x(t1))e
|
| 1340 |
+
i
|
| 1341 |
+
ℏ (SS[x′]−SS[x])ρr(x′
|
| 1342 |
+
i, xi, ti)
|
| 1343 |
+
+ i
|
| 1344 |
+
2ℏ(x′
|
| 1345 |
+
f − xf)
|
| 1346 |
+
� t
|
| 1347 |
+
ti
|
| 1348 |
+
dt1D(t; t1)
|
| 1349 |
+
�
|
| 1350 |
+
x(t)=xf,
|
| 1351 |
+
x′(t)=x′
|
| 1352 |
+
f
|
| 1353 |
+
D[x, x′](x′(t1) + x(t1))e
|
| 1354 |
+
i
|
| 1355 |
+
ℏ (SS[x′]−SS[x])ρr(x′
|
| 1356 |
+
i, xi, ti) .
|
| 1357 |
+
(B22)
|
| 1358 |
+
The Liouville-von Neuman evolution is governed by the system Hamiltonian ˆHs alone. For the second term on the
|
| 1359 |
+
right hand side in the second line of Eq. (B22), we have omitted SIF in the exponential. This is because SIF is second
|
| 1360 |
+
order in the coupling constant and is already present adjacent to the exponential. Since we limit our calculations to
|
| 1361 |
+
second order in the interactions, SIF can be neglected inside the exponential.
|
| 1362 |
+
To simplify the master equation further, we note that the last two lines of Eq. (B22) can be written much more
|
| 1363 |
+
compactly. This is due to the following identity [23]
|
| 1364 |
+
�
|
| 1365 |
+
x(t)=xf,
|
| 1366 |
+
x′(t)=x′
|
| 1367 |
+
f
|
| 1368 |
+
D[x, x′]x′(t1)e
|
| 1369 |
+
i
|
| 1370 |
+
ℏ (SS[x′]−SS[x])ρr(x′
|
| 1371 |
+
i, xi, ti) =
|
| 1372 |
+
=
|
| 1373 |
+
�
|
| 1374 |
+
dx′(t1) ⟨x′
|
| 1375 |
+
f| ˆUs(t; t1) |x′(t1)⟩ x′(t1) ⟨x′(t1)| ˆUs(t1; ti)ˆρr(ti) ˆU −1
|
| 1376 |
+
s
|
| 1377 |
+
(t; ti) |xf⟩
|
| 1378 |
+
= ⟨x′
|
| 1379 |
+
f| ˆUs(t; t1)ˆx ˆUs(t1; ti)ˆρr(ti) ˆU −1
|
| 1380 |
+
s
|
| 1381 |
+
(t; ti) |xf⟩ = ⟨x′
|
| 1382 |
+
f| ˆUs(t; t1)ˆx ˆUs(t1; ti) ˆU −1
|
| 1383 |
+
s
|
| 1384 |
+
(t; ti) ˆUs(t; ti)ˆρr(ti) ˆU −1
|
| 1385 |
+
s
|
| 1386 |
+
(t; ti) |xf⟩
|
| 1387 |
+
= ⟨x′
|
| 1388 |
+
f| ˆUs(t; t1)ˆx ˆU −1
|
| 1389 |
+
s
|
| 1390 |
+
(t; t1)ˆρr(t) |xf⟩ = ⟨x′
|
| 1391 |
+
f| ˆxHs(−τ)ˆρr(t) |xf⟩ ,
|
| 1392 |
+
(B23)
|
| 1393 |
+
where
|
| 1394 |
+
ˆxHs(−τ) := ˆU −1
|
| 1395 |
+
s
|
| 1396 |
+
(t − τ; t)ˆx ˆUs(t − τ; t) ,
|
| 1397 |
+
τ := t − t1 .
|
| 1398 |
+
(B24)
|
| 1399 |
+
Similarly, we also have
|
| 1400 |
+
�
|
| 1401 |
+
x(t)=xf,
|
| 1402 |
+
x′(t)=x′
|
| 1403 |
+
f
|
| 1404 |
+
D[x, x′]x(t1)e
|
| 1405 |
+
i
|
| 1406 |
+
ℏ (SS[x′]−SS[x])ρr(x′
|
| 1407 |
+
i, xi, ti) = ⟨x′
|
| 1408 |
+
f| ˆρr(t)ˆxHs(−τ) |xf⟩ .
|
| 1409 |
+
(B25)
|
| 1410 |
+
The operator ˆxHs(−τ) is understood to be simply the placeholder for the expression that appears on the right hand
|
| 1411 |
+
side of the first equality in Eq. (B24) such that
|
| 1412 |
+
ˆxHs(0) = ˆx .
|
| 1413 |
+
(B26)
|
| 1414 |
+
|
| 1415 |
+
10
|
| 1416 |
+
Here, the operator ˆx without the subscript Hs is the usual position operator in the Schr¨odinger picture. Using these
|
| 1417 |
+
relations, and replacing the t1 integral with the τ integral (t1 = t − τ), the master equation takes the compact form
|
| 1418 |
+
∂tρr(x′
|
| 1419 |
+
f, xf, t) = − i
|
| 1420 |
+
ℏ ⟨x′
|
| 1421 |
+
f|
|
| 1422 |
+
�
|
| 1423 |
+
ˆHs, ˆρr(t)
|
| 1424 |
+
�
|
| 1425 |
+
|xf⟩
|
| 1426 |
+
− 1
|
| 1427 |
+
ℏ(x′
|
| 1428 |
+
f − xf)
|
| 1429 |
+
� t−ti
|
| 1430 |
+
0
|
| 1431 |
+
dτN(t; t − τ) ⟨x′
|
| 1432 |
+
f| [ˆxHs(−τ), ˆρr(t)] |xf⟩
|
| 1433 |
+
+ i
|
| 1434 |
+
2ℏ(x′
|
| 1435 |
+
f − xf)
|
| 1436 |
+
� t−ti
|
| 1437 |
+
0
|
| 1438 |
+
dτD(t; t − τ) ⟨x′
|
| 1439 |
+
f| {ˆxHs(−τ), ˆρr(t)} |xf⟩ .
|
| 1440 |
+
(B27)
|
| 1441 |
+
The eigenvalues outside of the integrals in Eq. (B27) can be obtained by acting with the position operator ˆx such that
|
| 1442 |
+
⟨x′
|
| 1443 |
+
f| ∂tˆρr |xf⟩ = − i
|
| 1444 |
+
ℏ ⟨x′
|
| 1445 |
+
f|
|
| 1446 |
+
�
|
| 1447 |
+
ˆHs, ˆρr(t)
|
| 1448 |
+
�
|
| 1449 |
+
|xf⟩
|
| 1450 |
+
− 1
|
| 1451 |
+
ℏ
|
| 1452 |
+
� t−ti
|
| 1453 |
+
0
|
| 1454 |
+
dτN(t; t − τ) ⟨x′
|
| 1455 |
+
f| [ˆx, [ˆxHs(−τ), ˆρr(t)]] |xf⟩
|
| 1456 |
+
+ i
|
| 1457 |
+
2ℏ
|
| 1458 |
+
� t−ti
|
| 1459 |
+
0
|
| 1460 |
+
dτD(t; t − τ) ⟨x′
|
| 1461 |
+
f| [ˆx, {ˆxHs(−τ), ˆρr(t)}] |xf⟩ .
|
| 1462 |
+
(B28)
|
| 1463 |
+
The master equation in the operator form can therefore be written as
|
| 1464 |
+
∂tˆρr = − i
|
| 1465 |
+
ℏ
|
| 1466 |
+
�
|
| 1467 |
+
ˆHs, ˆρr
|
| 1468 |
+
�
|
| 1469 |
+
− 1
|
| 1470 |
+
ℏ
|
| 1471 |
+
� t−ti
|
| 1472 |
+
0
|
| 1473 |
+
dτN(t; t − τ) [ˆx, [ˆxHs(−τ), ˆρr(t)]] + i
|
| 1474 |
+
2ℏ
|
| 1475 |
+
� t−ti
|
| 1476 |
+
0
|
| 1477 |
+
dτD(t; t − τ) [ˆx, {ˆxHs(−τ), ˆρr(t)}] .
|
| 1478 |
+
(B29)
|
| 1479 |
+
Appendix C: The dissipation and the noise kernels
|
| 1480 |
+
In order to solve the master equation (B29), the kernels need to be evaluated explicitly. To achieve that, we begin
|
| 1481 |
+
with the expression for the vacuum expectation value of the correlator
|
| 1482 |
+
⟨0| ˆΠE(x(t1), t1)ˆΠE(x(t2), t2) |0⟩ =
|
| 1483 |
+
−iℏc
|
| 1484 |
+
2ϵ04π2 ˆ□
|
| 1485 |
+
�1
|
| 1486 |
+
r
|
| 1487 |
+
� ∞
|
| 1488 |
+
0
|
| 1489 |
+
dke−ikcτ �
|
| 1490 |
+
eikr − e−ikr��
|
| 1491 |
+
,
|
| 1492 |
+
(C1)
|
| 1493 |
+
where
|
| 1494 |
+
r := |x(t1) − x(t2)| ,
|
| 1495 |
+
τ := t1 − t2 ,
|
| 1496 |
+
ˆ□ := − 1
|
| 1497 |
+
c2 ∂2
|
| 1498 |
+
τ + ∂2
|
| 1499 |
+
r .
|
| 1500 |
+
(C2)
|
| 1501 |
+
Here, the right hand side of Eq. (C1) is obtained with the help of the expression of the quantized canonical transverse
|
| 1502 |
+
electric field operator in Eq. (B8). The expression in Eq. (C1) becomes convergent after resorting to the standard
|
| 1503 |
+
Hadamard finite part prescription [23], in which the convergence factor e−ωk/ωmax is introduced inside the integral
|
| 1504 |
+
(with ωk = kc).
|
| 1505 |
+
Physically, this prescription cuts off the contribution coming from the modes ωk ≫ ωmax and
|
| 1506 |
+
mathematically it is the same as using the iϵ prescription where one sends τ → τ − iϵ, with ϵ = 1/ωmax. After
|
| 1507 |
+
completing the integral by using this prescription we get
|
| 1508 |
+
⟨0| ˆΠE(1)ˆΠE(2) |0⟩ =
|
| 1509 |
+
ℏc
|
| 1510 |
+
4π2ϵ0
|
| 1511 |
+
ˆ□
|
| 1512 |
+
�
|
| 1513 |
+
1
|
| 1514 |
+
r2 − c2(τ − iϵ)2
|
| 1515 |
+
�
|
| 1516 |
+
=
|
| 1517 |
+
ℏc
|
| 1518 |
+
π2ϵ0
|
| 1519 |
+
1
|
| 1520 |
+
(r2 − c2(τ − iϵ)2)2 .
|
| 1521 |
+
(C3)
|
| 1522 |
+
For the correlator in Eq. (C3), we ignore the spatial dependence of the fields in the spirit of the non-relativistic
|
| 1523 |
+
approximation r ≪ cτ. In this limit, the correlator becomes
|
| 1524 |
+
⟨0| ˆΠE(1)ˆΠE(2) |0⟩ ≈
|
| 1525 |
+
ℏ
|
| 1526 |
+
π2ϵ0c3 (τ − iϵ)4 .
|
| 1527 |
+
(C4)
|
| 1528 |
+
Using Eq. (C4), we obtain the explicit functional form of the noise and the dissipation kernels to be
|
| 1529 |
+
N(τ) =
|
| 1530 |
+
e2
|
| 1531 |
+
π2ϵ0c3
|
| 1532 |
+
�
|
| 1533 |
+
ϵ4 − 6ϵ2τ 2 + τ 4�
|
| 1534 |
+
(ϵ2 + τ 2)4
|
| 1535 |
+
,
|
| 1536 |
+
(C5)
|
| 1537 |
+
D(τ) =
|
| 1538 |
+
8e2
|
| 1539 |
+
π2ϵ0c3
|
| 1540 |
+
ϵτ(ϵ2 − τ 2)
|
| 1541 |
+
(ϵ2 + τ 2)4 θ(τ) .
|
| 1542 |
+
(C6)
|
| 1543 |
+
|
| 1544 |
+
11
|
| 1545 |
+
With some algebraic manipulation, the dissipation kernel can be expressed more compactly as
|
| 1546 |
+
D(τ) =
|
| 1547 |
+
e2
|
| 1548 |
+
3π2ϵ0c3 θ(τ) d3
|
| 1549 |
+
dτ 3
|
| 1550 |
+
�
|
| 1551 |
+
ϵ
|
| 1552 |
+
τ 2 + ϵ2
|
| 1553 |
+
�
|
| 1554 |
+
.
|
| 1555 |
+
(C7)
|
| 1556 |
+
Noticing that
|
| 1557 |
+
ϵ
|
| 1558 |
+
τ 2 + ϵ2 = d
|
| 1559 |
+
dτ tan−1(τ/ϵ) = πδϵ(τ) ,
|
| 1560 |
+
(C8)
|
| 1561 |
+
we arrive at the expression
|
| 1562 |
+
D(τ) =
|
| 1563 |
+
e2
|
| 1564 |
+
3πϵ0c3 θ(τ) d3
|
| 1565 |
+
dτ 3 δϵ(τ) .
|
| 1566 |
+
(C9)
|
| 1567 |
+
The last equality in Eq. (C8) can be understood in the limit ϵ → 0 when the function tan−1(τ/ϵ) takes the shape of
|
| 1568 |
+
a step function. Such an expression for D would yield infinite results. For that, we keep in mind that these functions
|
| 1569 |
+
are always well behaved for a finite ϵ and that δϵ only behaves like a Dirac delta for τ ≫ ϵ.
|
| 1570 |
+
Appendix D: Integrals involving the dissipation kernel
|
| 1571 |
+
In this section we derive an identity involving the integrals of the form
|
| 1572 |
+
�
|
| 1573 |
+
dτD(τ)f(τ). To proceed, we keep in mind
|
| 1574 |
+
the situation where ϵ is small but finite so that all the derivatives of the smoothed Dirac delta are large but finite.
|
| 1575 |
+
However, for times τ ≫ ϵ, we have δϵ(τ) = δ′
|
| 1576 |
+
ϵ(τ) = δ′′
|
| 1577 |
+
ϵ (τ) = 0. In addition, since the derivative of the Dirac delta is an
|
| 1578 |
+
odd function of τ, we also have δ′
|
| 1579 |
+
ϵ(0) = 0. In computing the integral of D(τ) multiplying an arbitrary function f(τ),
|
| 1580 |
+
we shift the derivatives acting on δϵ one by one onto f(τ) by integrating by parts. Since the calculations of interest
|
| 1581 |
+
involve integrating
|
| 1582 |
+
� t
|
| 1583 |
+
0 dτD(τ)f(τ), where τ takes only non-negative values from 0 to t, the step function θ(τ) can be
|
| 1584 |
+
omitted inside the integral.
|
| 1585 |
+
The first integration by parts gives (the constant pre-factors appearing in Eq. (C9) will be plugged in at the end)
|
| 1586 |
+
� t
|
| 1587 |
+
0
|
| 1588 |
+
dτδ′′′
|
| 1589 |
+
ϵ (τ)f(τ) = −
|
| 1590 |
+
� t
|
| 1591 |
+
0
|
| 1592 |
+
dτδ′′
|
| 1593 |
+
ϵ (τ)f ′(τ) + δ′′
|
| 1594 |
+
ϵ (τ)f(τ)|t
|
| 1595 |
+
0 .
|
| 1596 |
+
(D1)
|
| 1597 |
+
Since δ′′
|
| 1598 |
+
ϵ (t) = 0, only the boundary term −δ′′
|
| 1599 |
+
ϵ (0)f(0) survives. Further,
|
| 1600 |
+
−
|
| 1601 |
+
� t
|
| 1602 |
+
0
|
| 1603 |
+
dτδ′′
|
| 1604 |
+
ϵ (τ)f ′(τ) =
|
| 1605 |
+
� t
|
| 1606 |
+
0
|
| 1607 |
+
dτδ′
|
| 1608 |
+
ϵ(τ)f ′′(τ) − δ′
|
| 1609 |
+
ϵ(τ) f ′(τ)|t
|
| 1610 |
+
0 .
|
| 1611 |
+
(D2)
|
| 1612 |
+
Since δ′
|
| 1613 |
+
ϵ(t) = δ′
|
| 1614 |
+
ϵ(0) = 0 (δ′
|
| 1615 |
+
ϵ(τ) being an odd function of τ), both the boundary terms vanish. Proceeding further we
|
| 1616 |
+
get
|
| 1617 |
+
� t
|
| 1618 |
+
0
|
| 1619 |
+
dτδ′
|
| 1620 |
+
ϵ(τ)f ′′(τ) = −
|
| 1621 |
+
� t
|
| 1622 |
+
0
|
| 1623 |
+
dτδϵ(τ)f ′′′(τ) + δϵ(τ) f ′′(τ)|t
|
| 1624 |
+
0 .
|
| 1625 |
+
(D3)
|
| 1626 |
+
As before, the boundary term at τ = t is zero and only the term −δϵ(0)f ′′(0) survives. Finally, since δϵ(τ) goes to
|
| 1627 |
+
zero much faster than a generic function f(τ) for a small ϵ, it can be treated like a Dirac delta such that
|
| 1628 |
+
−
|
| 1629 |
+
� t
|
| 1630 |
+
0
|
| 1631 |
+
dτδϵ(τ)f ′′′(τ) = −f ′′′(0)
|
| 1632 |
+
2
|
| 1633 |
+
.
|
| 1634 |
+
(D4)
|
| 1635 |
+
The factor of half comes because the integral is performed from 0 to t. Collecting the two boundary terms we get the
|
| 1636 |
+
result
|
| 1637 |
+
� t
|
| 1638 |
+
0
|
| 1639 |
+
dτδ′′′
|
| 1640 |
+
ϵ (τ)f(τ) = −f ′′′(0)
|
| 1641 |
+
2
|
| 1642 |
+
− δϵ(0)f ′′(0) − δ′′
|
| 1643 |
+
ϵ (0)f(0) .
|
| 1644 |
+
(D5)
|
| 1645 |
+
From Eq. (C8) we have δϵ(0) = 1/(πϵ) = ωmax/π and δ′′
|
| 1646 |
+
ϵ (0) = −2ω3
|
| 1647 |
+
max/π such that
|
| 1648 |
+
� t
|
| 1649 |
+
0
|
| 1650 |
+
dτD(τ)f(τ) = −2αℏ
|
| 1651 |
+
3c2 f ′′′(0) − 4αℏωmax
|
| 1652 |
+
3πc2
|
| 1653 |
+
f ′′(0) + 2e2ω3
|
| 1654 |
+
max
|
| 1655 |
+
3π2ϵ0c3 f(0) .
|
| 1656 |
+
(D6)
|
| 1657 |
+
Here, we have now plugged in the constant prefactor appearing in Eq. (C9).
|
| 1658 |
+
|
| 1659 |
+
12
|
| 1660 |
+
Appendix E: The Abraham-Lorentz equation as a classical limit
|
| 1661 |
+
The rate of change of the expectation values can be obtained with the help of the master equation (B29). For the
|
| 1662 |
+
position operator it is given by
|
| 1663 |
+
d
|
| 1664 |
+
dt⟨ˆx⟩ = Tr (ˆx∂tˆρr) = − i
|
| 1665 |
+
ℏTr
|
| 1666 |
+
�
|
| 1667 |
+
ˆx ·
|
| 1668 |
+
�
|
| 1669 |
+
ˆHs, ˆρr
|
| 1670 |
+
��
|
| 1671 |
+
+ i
|
| 1672 |
+
2ℏ
|
| 1673 |
+
� t−ti
|
| 1674 |
+
0
|
| 1675 |
+
dτD(t; t − τ)Tr (ˆx · [ˆx, {ˆxHs(−τ), ˆρr(t)}])
|
| 1676 |
+
− 1
|
| 1677 |
+
ℏ
|
| 1678 |
+
� t−ti
|
| 1679 |
+
0
|
| 1680 |
+
dτN(t; t − τ)Tr (ˆx · [ˆx, [ˆxHs(−τ), ˆρr(t)]]) .
|
| 1681 |
+
(E1)
|
| 1682 |
+
Due to the identity
|
| 1683 |
+
Tr
|
| 1684 |
+
�
|
| 1685 |
+
ˆA ·
|
| 1686 |
+
�
|
| 1687 |
+
ˆB, ˆC
|
| 1688 |
+
��
|
| 1689 |
+
= Tr
|
| 1690 |
+
��
|
| 1691 |
+
ˆA, ˆB
|
| 1692 |
+
�
|
| 1693 |
+
· ˆC
|
| 1694 |
+
�
|
| 1695 |
+
,
|
| 1696 |
+
(E2)
|
| 1697 |
+
the terms involving the dissipation and the noise kernels vanish and we get
|
| 1698 |
+
d
|
| 1699 |
+
dt⟨ˆx⟩ = − i
|
| 1700 |
+
ℏTr
|
| 1701 |
+
�
|
| 1702 |
+
ˆρr ·
|
| 1703 |
+
�
|
| 1704 |
+
ˆx, ˆHs
|
| 1705 |
+
��
|
| 1706 |
+
= ⟨ˆp⟩
|
| 1707 |
+
m .
|
| 1708 |
+
(E3)
|
| 1709 |
+
Here, we remember that the system Hamiltonian ˆHs receives a contribution from ˆVEM in addition to the bare potential
|
| 1710 |
+
ˆV0 such that (c.f. the discussion between Eqs. (A4) and (A8))
|
| 1711 |
+
ˆHs(t) = ˆp2
|
| 1712 |
+
2m + ˆV0(x, t) + e2ω3
|
| 1713 |
+
max
|
| 1714 |
+
3π2ϵ0c3 ˆx2 .
|
| 1715 |
+
(E4)
|
| 1716 |
+
Similarly, for the momentum operator we obtain the relation
|
| 1717 |
+
d
|
| 1718 |
+
dt⟨ˆp⟩ = Tr (ˆp∂tˆρr) = − i
|
| 1719 |
+
ℏTr
|
| 1720 |
+
��
|
| 1721 |
+
ˆp, ˆHs
|
| 1722 |
+
�
|
| 1723 |
+
· ˆρr
|
| 1724 |
+
�
|
| 1725 |
+
+ i
|
| 1726 |
+
2ℏ
|
| 1727 |
+
� t−ti
|
| 1728 |
+
0
|
| 1729 |
+
dτD(t; t − τ)Tr ([ˆp, ˆx] · {ˆxHs(−τ), ˆρr(t)})
|
| 1730 |
+
− 1
|
| 1731 |
+
ℏ
|
| 1732 |
+
� t−ti
|
| 1733 |
+
0
|
| 1734 |
+
dτN(t; t − τ)Tr ([ˆp, ˆx] · [ˆxHs(−τ), ˆρr(t)]) .
|
| 1735 |
+
(E5)
|
| 1736 |
+
Since [ˆx, ˆp] = iℏ1, the term involving the noise kernel vanishes and Eq. (E5) simplifies to
|
| 1737 |
+
d
|
| 1738 |
+
dt⟨ˆp⟩ = −⟨ ˆV0,x ⟩ − 2e2ω3
|
| 1739 |
+
max
|
| 1740 |
+
3π2ϵ0c3 ⟨ˆx⟩ + Tr
|
| 1741 |
+
�
|
| 1742 |
+
ˆρr(t)
|
| 1743 |
+
� t−ti
|
| 1744 |
+
0
|
| 1745 |
+
dτD(τ)ˆxHs(−τ)
|
| 1746 |
+
�
|
| 1747 |
+
.
|
| 1748 |
+
(E6)
|
| 1749 |
+
Evaluating the integral using Eq. (D6), we see that the last term in the integral gives the contribution 2e2ω3
|
| 1750 |
+
max
|
| 1751 |
+
3π2ϵ0c3 ⟨ˆx⟩ to
|
| 1752 |
+
d
|
| 1753 |
+
dt⟨ˆp⟩ in Eq. (E6) and cancels the contribution coming from ˆVEM. The EOM therefore reduces to
|
| 1754 |
+
d
|
| 1755 |
+
dt⟨ˆp⟩ = −⟨ ˆV0(x),x ⟩ − 2αℏ
|
| 1756 |
+
3c2 Tr
|
| 1757 |
+
�
|
| 1758 |
+
ˆρr(t) d3
|
| 1759 |
+
dτ 3 ˆxHs(−τ)
|
| 1760 |
+
����
|
| 1761 |
+
τ=0
|
| 1762 |
+
�
|
| 1763 |
+
− 4αℏωmax
|
| 1764 |
+
3πc2
|
| 1765 |
+
Tr
|
| 1766 |
+
�
|
| 1767 |
+
ˆρr(t) d2
|
| 1768 |
+
dτ 2 ˆxHs(−τ)
|
| 1769 |
+
����
|
| 1770 |
+
τ=0
|
| 1771 |
+
�
|
| 1772 |
+
.
|
| 1773 |
+
(E7)
|
| 1774 |
+
As shown in the main article, when ˆV0(x, t) = 0, the double and the triple derivatives acting on ˆxHs(−τ) vanish upto
|
| 1775 |
+
second order in the interactions. Here, we only focus on the general case in which the external (time-dependent)
|
| 1776 |
+
potential is switched on. To simplify the equation further, we begin by evaluating the second order derivative in
|
| 1777 |
+
Eq. (E7). From Eq. (B24) we have
|
| 1778 |
+
d2
|
| 1779 |
+
dτ 2 ˆxHs(−τ) = ˆU −1
|
| 1780 |
+
s
|
| 1781 |
+
(t − τ; t)ˆx ˆU ′′
|
| 1782 |
+
s (t − τ; t) + 2 ˆU −1′
|
| 1783 |
+
s
|
| 1784 |
+
(t − τ; t)ˆx ˆU ′
|
| 1785 |
+
s(t − τ; t) + ˆU −1′′
|
| 1786 |
+
s
|
| 1787 |
+
(t − τ; t)ˆx ˆUs(t − τ; t) ,
|
| 1788 |
+
(E8)
|
| 1789 |
+
where the prime denotes the derivative with respect to τ. From the Schr¨odinger equation
|
| 1790 |
+
ˆU ′
|
| 1791 |
+
s(t − τ; t) = i
|
| 1792 |
+
ℏ
|
| 1793 |
+
ˆHs(t − τ) ˆUs(t − τ; t) ,
|
| 1794 |
+
(E9)
|
| 1795 |
+
the derivatives acting on the unitary operator can be expressed in terms of the Hamiltonian. It is clear that taking
|
| 1796 |
+
higher derivatives of ˆUs(t − τ; t) would result in higher powers of the Hamiltonian or the partial derivative of the
|
| 1797 |
+
Hamiltonian with respect to τ, multiplied with only a single unitary operator on the very right. However, if in the
|
| 1798 |
+
|
| 1799 |
+
13
|
| 1800 |
+
end τ is set to zero, the Hamiltonian and its explicit time derivatives will be evaluated at time t, and the unitary
|
| 1801 |
+
operator on the very right disappears since ˆUs(t; t) = 1. We therefore have the following identities
|
| 1802 |
+
ˆU (′n)
|
| 1803 |
+
s
|
| 1804 |
+
(t − τ; t)
|
| 1805 |
+
���
|
| 1806 |
+
τ=0 = (−1)n
|
| 1807 |
+
� dn
|
| 1808 |
+
dtn ˆUs(t; ti)
|
| 1809 |
+
�
|
| 1810 |
+
ˆU −1
|
| 1811 |
+
s
|
| 1812 |
+
(t; ti) ,
|
| 1813 |
+
(E10)
|
| 1814 |
+
ˆU −1(′n)
|
| 1815 |
+
s
|
| 1816 |
+
(t − τ; t)
|
| 1817 |
+
���
|
| 1818 |
+
τ=0 = (−1)n ˆUs(t; ti)
|
| 1819 |
+
� dn
|
| 1820 |
+
dtn ˆU −1
|
| 1821 |
+
s
|
| 1822 |
+
(t; ti)
|
| 1823 |
+
�
|
| 1824 |
+
.
|
| 1825 |
+
(E11)
|
| 1826 |
+
The additional time parameter ti that appears in Eqs. (E10) and (E11) is only apparent.
|
| 1827 |
+
As discussed before,
|
| 1828 |
+
evaluating the time derivatives on the right hand side of Eq. (E10) would result in powers of ˆHs(t) and its derivatives
|
| 1829 |
+
evaluated at t. The remaining unitary matrix ˆUs(t; ti) would be canceled by the additional ˆU −1
|
| 1830 |
+
s
|
| 1831 |
+
(t; ti) on the very
|
| 1832 |
+
right such that ti disappears from the equation. Using Eqs. (E10) and (E11) in Eq. (E8) we get
|
| 1833 |
+
Tr
|
| 1834 |
+
�
|
| 1835 |
+
ˆρr(t) d2
|
| 1836 |
+
dτ 2 ˆxHs(−τ)
|
| 1837 |
+
����
|
| 1838 |
+
τ=0
|
| 1839 |
+
�
|
| 1840 |
+
= Tr
|
| 1841 |
+
��� d2
|
| 1842 |
+
dt2 ˆUs(t; ti)
|
| 1843 |
+
�
|
| 1844 |
+
ˆU −1
|
| 1845 |
+
s
|
| 1846 |
+
(t; ti)ˆρr(t)
|
| 1847 |
+
+2
|
| 1848 |
+
�
|
| 1849 |
+
− d
|
| 1850 |
+
dt
|
| 1851 |
+
ˆUs(t; ti)
|
| 1852 |
+
�
|
| 1853 |
+
ˆU −1
|
| 1854 |
+
s
|
| 1855 |
+
(t; ti)ˆρr(t) ˆUs(t; ti)
|
| 1856 |
+
�
|
| 1857 |
+
− d
|
| 1858 |
+
dt
|
| 1859 |
+
ˆU −1
|
| 1860 |
+
s
|
| 1861 |
+
(t; ti)
|
| 1862 |
+
�
|
| 1863 |
+
+ˆρr(t) ˆUs(t; ti)
|
| 1864 |
+
� d2
|
| 1865 |
+
dt2 ˆU −1
|
| 1866 |
+
s
|
| 1867 |
+
(t; ti)
|
| 1868 |
+
��
|
| 1869 |
+
ˆx
|
| 1870 |
+
�
|
| 1871 |
+
.
|
| 1872 |
+
(E12)
|
| 1873 |
+
Here, we have used the cyclic property within the trace to shift the unitary operators ˆUs and its derivatives on the
|
| 1874 |
+
right of ˆx in Eq. (E8) onto the very left within the trace. To proceed further we note that the terms involving the
|
| 1875 |
+
trace in Eq. (E7) are multiplied by α. It is therefore sufficient to evaluate the trace at 0th order in the interactions as
|
| 1876 |
+
the master equation is valid only upto second order in the interactions. This implies that within the trace the time
|
| 1877 |
+
dependence of the density matrix can be evaluated by keeping only the Liouville-von Neuman term such that
|
| 1878 |
+
ˆρr(t) = ˆUs(t; ti)ˆρr(ti) ˆU −1
|
| 1879 |
+
s
|
| 1880 |
+
(t; ti) .
|
| 1881 |
+
(E13)
|
| 1882 |
+
Eq. (E12) then simplifies to
|
| 1883 |
+
Tr
|
| 1884 |
+
�
|
| 1885 |
+
ˆρr(t) d2
|
| 1886 |
+
dτ 2 ˆxHs(−τ)
|
| 1887 |
+
����
|
| 1888 |
+
τ=0
|
| 1889 |
+
�
|
| 1890 |
+
= Tr
|
| 1891 |
+
��� d2
|
| 1892 |
+
dt2 ˆUs(t; ti)
|
| 1893 |
+
�
|
| 1894 |
+
ˆρr(ti) ˆU −1
|
| 1895 |
+
s
|
| 1896 |
+
(t; ti) + 2
|
| 1897 |
+
� d
|
| 1898 |
+
dt
|
| 1899 |
+
ˆUs(t; ti)
|
| 1900 |
+
�
|
| 1901 |
+
ˆρr(ti)
|
| 1902 |
+
� d
|
| 1903 |
+
dt
|
| 1904 |
+
ˆU −1
|
| 1905 |
+
s
|
| 1906 |
+
(t; ti)
|
| 1907 |
+
�
|
| 1908 |
+
+ ˆUs(t; ti)ˆρr(ti)
|
| 1909 |
+
� d2
|
| 1910 |
+
dt2 ˆU −1
|
| 1911 |
+
s
|
| 1912 |
+
(t; ti)
|
| 1913 |
+
��
|
| 1914 |
+
ˆx
|
| 1915 |
+
�
|
| 1916 |
+
= Tr
|
| 1917 |
+
� d2
|
| 1918 |
+
dt2 ˆρr(t)ˆx
|
| 1919 |
+
�
|
| 1920 |
+
.
|
| 1921 |
+
(E14)
|
| 1922 |
+
Thus, we have the relation
|
| 1923 |
+
Tr
|
| 1924 |
+
�
|
| 1925 |
+
ˆρr(t) d2
|
| 1926 |
+
dτ 2 ˆxHs(−τ)
|
| 1927 |
+
����
|
| 1928 |
+
τ=0
|
| 1929 |
+
�
|
| 1930 |
+
= Tr
|
| 1931 |
+
� d2
|
| 1932 |
+
dt2 ˆρr(t)ˆx
|
| 1933 |
+
�
|
| 1934 |
+
= d2
|
| 1935 |
+
dt2 ⟨ˆx⟩ .
|
| 1936 |
+
(E15)
|
| 1937 |
+
Similar line of reasoning also leads to the identity
|
| 1938 |
+
Tr
|
| 1939 |
+
�
|
| 1940 |
+
ˆρr(t) d3
|
| 1941 |
+
dτ 3 ˆxHs(−τ)
|
| 1942 |
+
����
|
| 1943 |
+
τ=0
|
| 1944 |
+
�
|
| 1945 |
+
= −Tr
|
| 1946 |
+
� d3
|
| 1947 |
+
dt3 ˆρr(t)ˆx
|
| 1948 |
+
�
|
| 1949 |
+
= − d3
|
| 1950 |
+
dt3 ⟨ˆx⟩ .
|
| 1951 |
+
(E16)
|
| 1952 |
+
Using Eqs. (E15) and (E16) in Eq. (E7), the EOM for the expectation value of the position operator in the presence
|
| 1953 |
+
of an external potential is obtained to be
|
| 1954 |
+
mR
|
| 1955 |
+
d2
|
| 1956 |
+
dt2 ⟨ˆx⟩ = −⟨ ˆV0(x),x ⟩ + 2αℏ
|
| 1957 |
+
3c2
|
| 1958 |
+
d3
|
| 1959 |
+
dt3 ⟨ˆx⟩ ,
|
| 1960 |
+
where
|
| 1961 |
+
mR := m + 4αℏωmax
|
| 1962 |
+
3πc2
|
| 1963 |
+
.
|
| 1964 |
+
(E17)
|
| 1965 |
+
[1] H. B. G. Casimir, Indag. Math. 10, 261 (1948).
|
| 1966 |
+
|
| 1967 |
+
14
|
| 1968 |
+
[2] N. D. Birrell and P. C. W. Davies, Quantum Fields in Curved Space, Cambridge Monographs on Mathematical Physics
|
| 1969 |
+
(Cambridge Univ. Press, Cambridge, UK, 1984).
|
| 1970 |
+
[3] L. Parker and D. Toms, Quantum Field Theory in Curved Spacetime: Quantized Fields and Gravity, Cambridge Mono-
|
| 1971 |
+
graphs on Mathematical Physics (Cambridge University Press, 2009).
|
| 1972 |
+
[4] W. G. Unruh, Phys. Rev. D 14, 870 (1976).
|
| 1973 |
+
[5] S. A. Fulling, Phys. Rev. D 7, 2850 (1973).
|
| 1974 |
+
[6] S. Takagi, Prog. Theor. Phys. Suppl. 88, 1 (1986).
|
| 1975 |
+
[7] H. A. Bethe, Phys. Rev. 72, 339 (1947).
|
| 1976 |
+
[8] W. E. Lamb and R. C. Retherford, Phys. Rev. 72, 241 (1947).
|
| 1977 |
+
[9] T. A. Welton, Phys. Rev. 74, 1157 (1948).
|
| 1978 |
+
[10] J. Dalibard, J. Dupont-Roc, and C. Cohen-Tannoudji, Journal de Physique 43, 1617 (1982).
|
| 1979 |
+
[11] E.
|
| 1980 |
+
Joos,
|
| 1981 |
+
H.
|
| 1982 |
+
Zeh,
|
| 1983 |
+
D.
|
| 1984 |
+
Giulini,
|
| 1985 |
+
C.
|
| 1986 |
+
Kiefer,
|
| 1987 |
+
J.
|
| 1988 |
+
Kupsch,
|
| 1989 |
+
and
|
| 1990 |
+
I.
|
| 1991 |
+
Stamatescu,
|
| 1992 |
+
Decoherence and the Appearance of a Classical World in Quantum Theory,
|
| 1993 |
+
Physics
|
| 1994 |
+
and
|
| 1995 |
+
astronomy
|
| 1996 |
+
online
|
| 1997 |
+
library
|
| 1998 |
+
(Springer, 2003).
|
| 1999 |
+
[12] C. Kiefer, Phys. Rev. D 46, 1658 (1992).
|
| 2000 |
+
[13] L. H. Ford, Phys. Rev. D 47, 5571 (1993).
|
| 2001 |
+
[14] G. Baym and T. Ozawa, Proceedings of the National Academy of Sciences 106, 3035 (2009).
|
| 2002 |
+
[15] E. Santos, Physics Letters A 188, 198 (1994).
|
| 2003 |
+
[16] L. Di´osi, Physics Letters A 197, 183 (1995).
|
| 2004 |
+
[17] P. M. V. B. Barone and A. O. Caldeira, Phys. Rev. A 43, 57 (1991).
|
| 2005 |
+
[18] H.-P. Breuer and F. Petruccione, in Relativistic Quantum Measurement and Decoherence, edited by H.-P. Breuer and
|
| 2006 |
+
F. Petruccione (Springer Berlin Heidelberg, Berlin, Heidelberg, 2000) pp. 31–65.
|
| 2007 |
+
[19] S. Coleman, “Classical electron theory from a modern standpoint,” in Electromagnetism: Paths to Research, edited by
|
| 2008 |
+
D. Teplitz (Springer US, Boston, MA, 1982) pp. 183–210.
|
| 2009 |
+
[20] P. Pearle, “Classical electron models,” in Electromagnetism: Paths to Research, edited by D. Teplitz (Springer US, Boston,
|
| 2010 |
+
MA, 1982) pp. 211–295.
|
| 2011 |
+
[21] D. J. Griffiths, Introduction to Electrodynamics, 4th ed. (Cambridge University Press, 2017).
|
| 2012 |
+
[22] C. Cohen-Tannoudji, J. Dupont-Roc, and G. Grynberg, “Classical electrodynamics: The fundamental equations and the
|
| 2013 |
+
dynamical variables,” in Photons and Atoms (John Wiley and Sons, Ltd, 1997) Chap. 1, pp. 5–77.
|
| 2014 |
+
[23] E. A. Calzetta and B.-L. B. Hu, Nonequilibrium Quantum Field Theory, Cambridge Monographs on Mathematical Physics
|
| 2015 |
+
(Cambridge University Press, 2008).
|
| 2016 |
+
[24] “Lagrangian and hamiltonian approach to electrodynamics, the standard lagrangian and the coulomb gauge,” in
|
| 2017 |
+
Photons and Atoms (John Wiley & Sons, Ltd, 1997) Chap. 2, pp. 79–168.
|
| 2018 |
+
[25] A. Altland and B. D. Simons, Condensed Matter Field Theory, 2nd ed. (Cambridge University Press, 2010).
|
| 2019 |
+
[26] C. Cohen-Tannoudji, J. Dupont-Roc,
|
| 2020 |
+
and G. Grynberg, “Quantum electrodynamics in the coulomb gauge,” in
|
| 2021 |
+
Photons and Atoms (John Wiley & Sons, Ltd, 1997) Chap. 3, pp. 169–252.
|
| 2022 |
+
[27] R. Feynman and F. Vernon, Annals of Physics 24, 118 (1963).
|
| 2023 |
+
[28] D. J. Griffiths, T. C. Proctor, and D. F. Schroeter, American Journal of Physics 78, 391 (2010).
|
| 2024 |
+
[29] M. A. Schlosshauer, Decoherence and the Quantum-To-Classical Transition (Springer-Verlag Berlin Heidelberg, 2007).
|
| 2025 |
+
[30] W. G. Unruh, in Relativistic Quantum Measurement and Decoherence, edited by H.-P. Breuer and F. Petruccione (Springer
|
| 2026 |
+
Berlin Heidelberg, Berlin, Heidelberg, 2000) pp. 125–140.
|
| 2027 |
+
|
2tFKT4oBgHgl3EQf7y43/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
4tE1T4oBgHgl3EQf6QWC/content/tmp_files/2301.03521v1.pdf.txt
ADDED
|
@@ -0,0 +1,1047 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.03521v1 [math.SP] 9 Jan 2023
|
| 2 |
+
GREEN’S FUNCTIONS FOR FIRST-ORDER SYSTEMS OF
|
| 3 |
+
ORDINARY DIFFERENTIAL EQUATIONS WITHOUT THE
|
| 4 |
+
UNIQUE CONTINUATION PROPERTY
|
| 5 |
+
STEVEN REDOLFI AND RUDI WEIKARD
|
| 6 |
+
Abstract. This paper is a contribution to the spectral theory associated with
|
| 7 |
+
the differential equation Ju′ + qu = wf on the real interval (a, b) when J is
|
| 8 |
+
a constant, invertible skew-Hermitian matrix and q and w are matrices whose
|
| 9 |
+
entries are distributions of order zero with q Hermitian and w non-negative.
|
| 10 |
+
Under these hypotheses it may not be possible to uniquely continue a solution
|
| 11 |
+
from one point to another, thus blunting the standard tools of spectral theory.
|
| 12 |
+
Despite this fact we are able to describe symmetric restrictions of the maximal
|
| 13 |
+
relation associated with Ju′ + qu = wf and show the existence of Green’s
|
| 14 |
+
functions for self-adjoint relations even if unique continuation of solutions fails.
|
| 15 |
+
1. Introduction
|
| 16 |
+
This paper is a contribution to the spectral theory for the differential equation
|
| 17 |
+
Ju′ + qu = wf
|
| 18 |
+
posed on the real interval (a, b) when J is a constant, invertible, and skew-Hermitian
|
| 19 |
+
n × n-matrix while the entries of the matrices q and w are distributions of order
|
| 20 |
+
zero1 with q Hermitian and w non-negative. Ghatasheh and Weikard [7] studied this
|
| 21 |
+
equation under the additional hypothesis that initial value problems have unique
|
| 22 |
+
balanced2 solutions in the space of functions of locally bounded variation.
|
| 23 |
+
The equation Ju′ + qu = wf has, of course, been investigated by many people
|
| 24 |
+
when the coefficients q and w are locally integrable. In that situation initial value
|
| 25 |
+
problems always have unique solutions. This is not necessarily the case when the
|
| 26 |
+
measures induced by q or w have discrete components. It appears that an equation
|
| 27 |
+
with measure coefficients was first considered in 1952, when Krein [8] modelled a
|
| 28 |
+
vibrating string. In 1964 Atkinson [2] suggested to unify the treatment of differen-
|
| 29 |
+
tial and difference equations by writing them as systems of integral equation where
|
| 30 |
+
integrals were to be viewed as matrix-valued Riemann-Stieltjes integrals. Atkinson
|
| 31 |
+
explained that the presence of point masses may prevent the continuation of so-
|
| 32 |
+
lutions across such points and posed a condition avoiding that problem but more
|
| 33 |
+
Date: 11. May 2022.
|
| 34 |
+
This is a preprint of an article published in Integral Equations and Operator Theory which is
|
| 35 |
+
available online at https://doi.org/10.1007/s00020-022-02703-6.
|
| 36 |
+
©2022.
|
| 37 |
+
This manuscript version is made available under the CC-BY-NC-ND 4.0 license
|
| 38 |
+
http://creativecommons.org/licenses/by-nc-nd/4.0/.
|
| 39 |
+
1Recall that distributions of order 0 are distributional derivatives of functions of locally
|
| 40 |
+
bounded variation and hence may be thought of, on compact subintervals of (a, b), as measures.
|
| 41 |
+
For simplicity we might use the word measure instead of distribution of order 0 below.
|
| 42 |
+
2A function of locally bounded variation is called balanced, if its values at any given point are
|
| 43 |
+
averages of its left- and right-hand limits at that point.
|
| 44 |
+
1
|
| 45 |
+
|
| 46 |
+
2
|
| 47 |
+
STEVEN REDOLFI AND RUDI WEIKARD
|
| 48 |
+
restrictive than the one posed in [7]. In 1999 Savchuk and Shkalikov [10] treated
|
| 49 |
+
Schr¨odinger equations with potentials in the Sobolev space W −1,2
|
| 50 |
+
loc
|
| 51 |
+
. Their paper was
|
| 52 |
+
very influential and spurred many further developments. Nevertheless, Eckhardt
|
| 53 |
+
et al. [5] showed in 2013, with the help of quasi-derivatives or, equivalently, by
|
| 54 |
+
writing the equation as a system, that a treatment without leaving the realm of
|
| 55 |
+
locally integrable coefficients is possible. In the same year Eckhardt and Teschl [6]
|
| 56 |
+
investigated 2×2-systems with diagonal measure-valued matrices q and w requiring
|
| 57 |
+
essentially Atkinson’s condition.
|
| 58 |
+
A more thorough account of the subject’s history is given in [7]. The papers
|
| 59 |
+
[5] and [6], mentioned above, may also serve as excellent sources, with perhaps
|
| 60 |
+
different emphases, of this history.
|
| 61 |
+
One feature of systems of first-order equations is that, generally, they are repre-
|
| 62 |
+
sented by linear relations rather than linear operators. There is a well-developed
|
| 63 |
+
spectral theory for linear relations initiated by Arens [1], see also Orcutt [9], and
|
| 64 |
+
Bennewitz [3]. The most important results (for our purposes) are also surveyed in
|
| 65 |
+
Appendix B of [7].
|
| 66 |
+
Existence or uniqueness of solutions of an initial value problem for Ju′+qu = wf
|
| 67 |
+
fails when, for some x ∈ (a, b), the matrices
|
| 68 |
+
B±(x, 0) = J ± 1
|
| 69 |
+
2∆q(x)
|
| 70 |
+
are not invertible. Here ∆q(x) = Q+(x)−Q−(x) when Q denotes an anti-derivative
|
| 71 |
+
of q. Equivalently, ∆q(x) = dQ({x}) where dQ is the measure (locally) generated
|
| 72 |
+
by q. Assuming the unique continuation property for solutions of Ju′ + qu = wf
|
| 73 |
+
Ghatasheh and Weikard defined maximal and minimal relations Tmax and Tmin
|
| 74 |
+
associated with the differential equation Ju′ + qu = wf and showed that Tmax
|
| 75 |
+
is the adjoint of Tmin. They characterized the self-adjoint restrictions of Tmax, if
|
| 76 |
+
any, with the aid of boundary conditions and proved that resolvents are given as
|
| 77 |
+
integral operators, i.e., the existence of a Green’s function for any such self-adjoint
|
| 78 |
+
relation T . Under even more restrictive conditions they also showed the existence
|
| 79 |
+
of a Fourier transform diagonalizing T .
|
| 80 |
+
Campbell, Nguyen, and Weikard [4] defined maximal and minimal relations and
|
| 81 |
+
showed that Tmax = T ∗
|
| 82 |
+
min without the hypothesis of unique continuation of so-
|
| 83 |
+
lutions. Our goal here is to advance their ideas. In particular, even though the
|
| 84 |
+
equation Ju′ + qu = w(λu + f) may have infinitely many linearly independent
|
| 85 |
+
solutions the deficiency indices, i.e., the number of linearly independent solutions
|
| 86 |
+
of Ju′ + qu = ±iwu of finite positive norm, is still bounded by n, the size of the
|
| 87 |
+
system. We show that symmetric restrictions of Tmax, in particular the self-adjoint
|
| 88 |
+
ones, are still given by posing boundary conditions and we show that the resolvents
|
| 89 |
+
of self-adjoint restrictions are integral operators by proving the existence of Green’s
|
| 90 |
+
functions.
|
| 91 |
+
We will not approach the problem of Fourier transforms and eigenfunction ex-
|
| 92 |
+
pansions but hope to return to it in future work.
|
| 93 |
+
The material in this paper is arranged as follows. In Section 2 we recall the
|
| 94 |
+
circumstances under which existence and uniqueness of solutions to initial value
|
| 95 |
+
problems does hold and investigate the sets of those x ∈ (a, b) and λ ∈ C giving
|
| 96 |
+
rise to trouble.
|
| 97 |
+
Then, in Section 3 we discuss the manifold of solutions of our
|
| 98 |
+
differential equation in the special case when a and b are regular endpoints. These
|
| 99 |
+
results are instrumental in Section 4 where we investigate the deficiency indices
|
| 100 |
+
|
| 101 |
+
GREEN’S FUNCTIONS
|
| 102 |
+
3
|
| 103 |
+
of the minimal relation and its symmetric extensions but without the assumption
|
| 104 |
+
that a and b are regular. Before we prove the existence of Green’s functions for
|
| 105 |
+
self-adjoint restrictions of the maximal relation in Section 6 we discuss the role
|
| 106 |
+
played by non-trivial solutions of zero norm in Section 5.
|
| 107 |
+
Let us add a few words about notation. D′0((a, b)) is the space of distributions of
|
| 108 |
+
order 0, i.e., the space of distributional derivatives of functions of locally bounded
|
| 109 |
+
variation. Any function u of locally bounded variation has left- and right-hand
|
| 110 |
+
limits denoted by u− and u+, respectively. Also, u is called balanced if u = u# =
|
| 111 |
+
(u+ + u−)/2. The space of balanced functions of bounded variation defined on
|
| 112 |
+
(a, b) is denoted by BV#((a, b)) while BV#
|
| 113 |
+
loc((a, b)) stands for the space of balanced
|
| 114 |
+
functions of locally bounded variation.
|
| 115 |
+
We use
|
| 116 |
+
1 to denote an identity matrix
|
| 117 |
+
of appropriate size and superscripts ⊤ and ∗ indicate transposition and adjoint,
|
| 118 |
+
respectively. The sum of two closed only trivially intersecting subspaces S and T of
|
| 119 |
+
some Hilbert space (i.e., their direct sum) is denoted by S ⊎ T ; if S and T are even
|
| 120 |
+
orthogonal we may use ⊕ instead of ⊎. The orthogonal complement of a subspace
|
| 121 |
+
S of a Hilbert space H is denoted by H ⊖ S or by S⊥. For c1, ..., cN ∈ Cn we
|
| 122 |
+
abbreviate the column vector (c⊤
|
| 123 |
+
1 , ..., c⊤
|
| 124 |
+
N)⊤ ∈ CnN by (c1, ..., cN)⋄.
|
| 125 |
+
2. Preliminaries
|
| 126 |
+
Throughout this paper we assume the following hypothesis to be in force.
|
| 127 |
+
Hypothesis 2.1. J is a constant, invertible and skew-Hermitian n × n-matrix.
|
| 128 |
+
Both q and w are in D′0((a, b))n×n, w is non-negative and q Hermitian.
|
| 129 |
+
Given that w is non-negative it gives rise to a positive measure on (a, b) and we
|
| 130 |
+
denote the space of functions f which satisfy
|
| 131 |
+
�
|
| 132 |
+
f ∗wf < ∞ by L2(w). This space
|
| 133 |
+
permits the semi-inner product ⟨f, g⟩ =
|
| 134 |
+
�
|
| 135 |
+
f ∗wg (note that ⟨f, f⟩ may be 0 without
|
| 136 |
+
f being 0).
|
| 137 |
+
Consider the differential equation
|
| 138 |
+
Ju′ + (q − λw)u = wf
|
| 139 |
+
(2.1)
|
| 140 |
+
where λ is a complex parameter and f an element of L2(w). The latter condition
|
| 141 |
+
guarantees that wf is in D′0((a, b))n. We will search for solutions in BV#
|
| 142 |
+
loc((a, b))n.
|
| 143 |
+
In this case each term in (2.1) is a distribution of order 0 so that it makes sense to
|
| 144 |
+
pose the equation.
|
| 145 |
+
The point a is called a regular endpoint for Ju′ + qu = wf, if there is a point
|
| 146 |
+
c ∈ (a, b) such that the left-continuous anti-derivatives Q and W of q and w are
|
| 147 |
+
of bounded variation on (a, c). In this case q and w may be thought of as finite
|
| 148 |
+
measures on (a, c). Similarly, b is called regular, if Q and W are of bounded variation
|
| 149 |
+
on (c, b). If an endpoint is not regular, it is called singular. Not surprisingly, the
|
| 150 |
+
study of our problem is less complicated when the endpoints are regular and we
|
| 151 |
+
will use this fact to our advantage.
|
| 152 |
+
Despite our earlier denigration of the existence and uniqueness theorem of so-
|
| 153 |
+
lutions of initial value problems it continues to play a crucial role. The following
|
| 154 |
+
theorem was proved in [7].
|
| 155 |
+
Theorem 2.2. Suppose r ∈ D′0((a, b))n×n, g ∈ D′0((a, b))n and that the matrices
|
| 156 |
+
1 ± ∆r(x)/2 are invertible for all x ∈ (a, b). Let x0 be a point in (a, b). Then the
|
| 157 |
+
initial value problem u′ = ru + g, u(x0) = u0 ∈ Cn has a unique balanced solution
|
| 158 |
+
u ∈ BV#
|
| 159 |
+
loc((a, b))n.
|
| 160 |
+
|
| 161 |
+
4
|
| 162 |
+
STEVEN REDOLFI AND RUDI WEIKARD
|
| 163 |
+
If a is a regular endpoint we may pose an initial condition (for u+) at a. Simi-
|
| 164 |
+
larly, if b is regular we may prescribe u−(b) as the initial condition.
|
| 165 |
+
Suppose now that u is a solution of (2.1). Treating either side of this equation
|
| 166 |
+
as a measure (restricted to a compact subset of (a, b)) evaluation at a singleton {x}
|
| 167 |
+
shows that
|
| 168 |
+
J(u+(x) − u−(x)) + ∆q−λw(x)u#(x) = ∆w(x)f(x)
|
| 169 |
+
or, equivalently,
|
| 170 |
+
B+(x, λ)u+(x) − B−(x, λ)u−(x) = ∆w(x)f(x)
|
| 171 |
+
(2.2)
|
| 172 |
+
when we define
|
| 173 |
+
B±(x, λ) = J ± 1
|
| 174 |
+
2
|
| 175 |
+
�
|
| 176 |
+
∆q(x) − λ∆w(x)
|
| 177 |
+
�
|
| 178 |
+
.
|
| 179 |
+
Note that, if B+(x, λ) is not invertible, we could be in one of the following two
|
| 180 |
+
situations: (i) a solution given on (a, x) may fail to exist on (x, b) or (ii) there
|
| 181 |
+
are infinitely many ways to continue a solution on (a, x) to (x, b). An analogous
|
| 182 |
+
statement holds, of course, if B−(x, λ) is not invertible.
|
| 183 |
+
Let us now investigate the circumstances when a pair (x, λ) gives such trouble.
|
| 184 |
+
Define the sets Λx = {λ ∈ C : det(B+(x, λ)) det(B−(x, λ)) = 0} and Ξλ = {x ∈
|
| 185 |
+
(a, b) : det(B+(x, λ)) det(B−(x, λ)) = 0}. First note, since B−(x, λ) = −B+(x, λ)∗,
|
| 186 |
+
we have that Ξλ = Ξλ and that each Λx is symmetric with respect to the real axis.
|
| 187 |
+
Also, Λx is empty unless at least one of ∆q(x) and ∆w(x) is different from 0 and
|
| 188 |
+
hence for all but countably many x. Next, we claim that Λx is finite as soon as it
|
| 189 |
+
misses one point. To see this suppose that B+(x, λ0) is invertible and that λ ̸= λ0.
|
| 190 |
+
Since
|
| 191 |
+
B+(x, λ) = (λ0 − λ)B+(x, λ0)
|
| 192 |
+
�1
|
| 193 |
+
2B+(x, λ0)−1∆w(x) − 1/(λ − λ0)
|
| 194 |
+
�
|
| 195 |
+
we see that B+(x, λ) fails to be invertible only if 1/(λ−λ0) is an eigenvalue of some
|
| 196 |
+
n × n-matrix. A similar statement holds, of course, for B− proving our claim.
|
| 197 |
+
The really bad points x, namely those where Λx = C, are thus contained in Ξ0.
|
| 198 |
+
Here we wish to remove the hypothesis Ξ0 = ∅ posed in [7]. On any subinterval of
|
| 199 |
+
(a, b) on which q gives rise to a finite measure we find that �∞
|
| 200 |
+
k=1 ∥∆q(xk)∥ must be
|
| 201 |
+
finite, when k �→ xk is a sequence of distinct points in that interval. It follows now
|
| 202 |
+
that Ξ0 is a discrete set. One shows similarly that, for any fixed complex number
|
| 203 |
+
λ the set Ξλ is discrete.
|
| 204 |
+
Lemma 2.3. Suppose [s, t] ⊂ (a, b) and (s, t)∩Ξ0 = ∅. Then we have that Λ(s,t) =
|
| 205 |
+
�
|
| 206 |
+
x∈(s,t) Λx is a discrete subset of C.
|
| 207 |
+
Proof. There are only finitely many points x in (s, t) where ∥J−1∆q(x)∥ > 1. Using
|
| 208 |
+
a Neumann series one sees that only at such points the norm of B+(x, 0)−1 can be
|
| 209 |
+
larger than 2∥J−1∥. Thus there is a positive number C such that ∥B+(x, 0)−1∥ ≤ C
|
| 210 |
+
for all x ∈ (s, t). Now suppose that B+(x, λ) is not invertible and that |λ| ≤ R.
|
| 211 |
+
Then 1/λ is an eigenvalue of 1
|
| 212 |
+
2B+(x, 0)−1∆w(x). This requires that ∥∆w(x)∥ ≥
|
| 213 |
+
2/(RC) and thus can happen only for finitely many x ∈ (s, t). Since similar argu-
|
| 214 |
+
ments work for B− the number of points in �
|
| 215 |
+
x∈(s,t) Λx which lie in a disk of radius
|
| 216 |
+
R centered at 0 must be finite.
|
| 217 |
+
□
|
| 218 |
+
We remark that, when one of the anti-derivatives of q and w is only locally of
|
| 219 |
+
bounded variation, the set �
|
| 220 |
+
x∈(a,b) Λx need not be discrete even if every Λx is finite.
|
| 221 |
+
|
| 222 |
+
GREEN’S FUNCTIONS
|
| 223 |
+
5
|
| 224 |
+
Theorem 2.4. Suppose [s, t] ⊂ (a, b) and (s, t) ∩ Ξ0 = ∅. If u0 ∈ Cn and λ ∈
|
| 225 |
+
C \ Λ(s,t), then the initial value problem Ju′ + qu = λwu, u+(s) = u0 has a unique
|
| 226 |
+
balanced solution in (s, t). Moreover, u(x, ·) for x ∈ (s, t) as well as u−(t, ·) are
|
| 227 |
+
analytic in C \ Λ(s,t) and meromorphic on C. An analogous statement holds when
|
| 228 |
+
the initial condition is posed at t.
|
| 229 |
+
Proof. The first claim is simply a consequence of Theorem 2.2. When x ∈ (s, t)
|
| 230 |
+
the analyticity of u(x, ·) in C \ Λ(s,t), which is an open set, was proved in Section
|
| 231 |
+
2.3 of [7]. If we modify q and w by setting them 0 on [t, b) we do not change the
|
| 232 |
+
solution on (s, t). The solution for the modified problem evaluated at t is analytic
|
| 233 |
+
and coincides with u−(t, ·) proving its analyticity. It remains to show that a point
|
| 234 |
+
λ0 ∈ Λ(s,t) can merely give rise to poles.
|
| 235 |
+
We know already that there are only finitely many points x in (s, t) where one of
|
| 236 |
+
B±(x, λ0) fails to be invertible. Suppose x′ and x′′ are two consecutive such points.
|
| 237 |
+
If we know the solution on (s, x′) and that u−(x′, ·) has, at worst, a pole at λ0,
|
| 238 |
+
then the solution in (x′, x′′) is determined by the initial value
|
| 239 |
+
u+(x′, λ) = B+(x′, λ)−1B−(x′, λ)u−(x′, λ)
|
| 240 |
+
which also has, at worst, a pole at λ0 since this is true for B+(x′, λ)−1. For x ∈ (s, t)
|
| 241 |
+
the claim follows now by induction. To prove that u−(t, ·) is also meromorphic we
|
| 242 |
+
proceed as before and modify q and w on [t, b).
|
| 243 |
+
□
|
| 244 |
+
3. Solving the differential equation
|
| 245 |
+
Our goal in this section is to investigate the set of solutions of the differential
|
| 246 |
+
equation Ju′ + (q − λw)u = wf on (a, b) under a strengthened hypothesis.
|
| 247 |
+
Hypothesis 3.1. In addition to Hypothesis 2.1 we ask that a and b are regular
|
| 248 |
+
endpoints for Ju′ + qu = wf.
|
| 249 |
+
Moreover, given the partition
|
| 250 |
+
a = x0 < x1 < x2 < ... < xN < xN+1 = b
|
| 251 |
+
(3.1)
|
| 252 |
+
of (a, b) we require that Ξ0 ⊂ {x1, ..., xN}. We then consider only λ for which both
|
| 253 |
+
B+(x, λ) and B−(x, λ) are invertible unless x is in {x1, ..., xN}.
|
| 254 |
+
This hypothesis is in force throughout this section but later only if explicitly
|
| 255 |
+
mentioned. We emphasize that Ξ0 is finite when a and b are regular. Also, the set
|
| 256 |
+
of permissible λ, which we call Ω0, is symmetric with respect to the real axis and
|
| 257 |
+
avoids only a discrete set.
|
| 258 |
+
On each interval (xj, xj+1) we let Uj(·, λ) be a fundamental matrix of balanced
|
| 259 |
+
solutions of the homogeneous differential equation Ju′ + (q − λw)u = 0 such that
|
| 260 |
+
limx↓xj Uj(x, λ) =
|
| 261 |
+
1. The existence of these fundamental matrices is guaranteed by
|
| 262 |
+
Theorem 2.2. The general balanced solution u of the non-homogeneous equation
|
| 263 |
+
Ju′ + (q − λw)u = wf on (xj, xj+1) satisfies, according to Lemma 3.3 in [7],
|
| 264 |
+
u−(x) = U −
|
| 265 |
+
j (x, λ)
|
| 266 |
+
�
|
| 267 |
+
cj + J−1
|
| 268 |
+
�
|
| 269 |
+
(xj,x)
|
| 270 |
+
Uj(·, λ)∗wf
|
| 271 |
+
�
|
| 272 |
+
for any cj ∈ Cn. Define
|
| 273 |
+
Uj(xj+1, λ) =
|
| 274 |
+
lim
|
| 275 |
+
x↑xj+1 Uj(x, λ)
|
| 276 |
+
and
|
| 277 |
+
Ij(f, λ) =
|
| 278 |
+
�
|
| 279 |
+
(xj,xj+1)
|
| 280 |
+
Uj(·, λ)∗wf.
|
| 281 |
+
|
| 282 |
+
6
|
| 283 |
+
STEVEN REDOLFI AND RUDI WEIKARD
|
| 284 |
+
Using u+(xj) = cj and u−(xj) = Uj−1(xj, λ)(cj−1 + J−1Ij−1(f, λ)) in equation
|
| 285 |
+
(2.2) gives
|
| 286 |
+
(−B−(xj, λ)Uj−1(xj, λ), B+(xj, λ))
|
| 287 |
+
�cj−1
|
| 288 |
+
cj
|
| 289 |
+
�
|
| 290 |
+
= ∆w(xj)f(xj) + B−(xj, λ)Uj−1(xj, λ)J−1Ij−1(f, λ).
|
| 291 |
+
We need to consider these equations for j = 1, ..., N simultaneously. This gives rise
|
| 292 |
+
to the system
|
| 293 |
+
B(λ)˜u = F0(f, λ)
|
| 294 |
+
(3.2)
|
| 295 |
+
where ˜u = (c0, ..., cN)⋄, B(λ), to be specified presently, is in CnN×n(N+1), and
|
| 296 |
+
F0(f, λ) is in CnN.
|
| 297 |
+
The two-diagonal block-matrix structure of B suggests the
|
| 298 |
+
introduction of matrices E⊤ and E⊥, which, respectively, strip the first and last
|
| 299 |
+
n components off a vector in their domain Cn(N+1). If we also define the block-
|
| 300 |
+
matrices
|
| 301 |
+
B(λ) = diag(B+(x1, λ), ..., B+(xN, λ)),
|
| 302 |
+
U(λ) = diag(U0(x1, λ), ..., UN−1(xN, λ)),
|
| 303 |
+
and J = diag(J, ..., J) and when we note that
|
| 304 |
+
B(λ)∗ = diag(−B−(x1, λ), ..., −B−(xN, λ)),
|
| 305 |
+
we obtain
|
| 306 |
+
B(λ) = B(λ)∗U(λ)E⊥ + B(λ)E⊤.
|
| 307 |
+
(3.3)
|
| 308 |
+
The vector F0(f, λ) is given by
|
| 309 |
+
F0(f, λ) = R(f) − B(λ)∗U(λ)J −1I(f, λ)
|
| 310 |
+
with R(f) = ((∆wf)(x1), ..., (∆wf)(xN))⋄ and I(f, λ) = (I0(f, λ), ..., IN−1(f, λ))⋄.
|
| 311 |
+
We now have the following theorem.
|
| 312 |
+
Theorem 3.2. The differential equation Ju′ + (q − λw)u = wf has a solution u
|
| 313 |
+
on (a, b) if and only if ˜u = (u+(x0), ..., u+(xN))⋄ is a solution of equation (3.2).
|
| 314 |
+
In particular, in the homogeneous case, where f = 0, the space of solutions has
|
| 315 |
+
dimension n(N + 1) − rk B(λ) ≥ n.
|
| 316 |
+
We note that rk B(λ) = n when N = 1 so that the space of solutions of Ju′ +
|
| 317 |
+
(q − λw)u = 0 is then exactly n-dimensional. For N = 2, however, consider the
|
| 318 |
+
example (a, b) = R, J =
|
| 319 |
+
� 0 −1
|
| 320 |
+
1
|
| 321 |
+
0
|
| 322 |
+
�
|
| 323 |
+
, q =
|
| 324 |
+
� 0 2
|
| 325 |
+
2 0
|
| 326 |
+
�
|
| 327 |
+
(δ1 − δ2), w =
|
| 328 |
+
� 2 0
|
| 329 |
+
0 0
|
| 330 |
+
�
|
| 331 |
+
(δ1 + δ2), where the
|
| 332 |
+
δk are Dirac point measures concentrated on {k}. It shows that the dimension of
|
| 333 |
+
the space of solutions of Ju′ + (q − λw)u = 0 may be strictly larger than n.
|
| 334 |
+
Next we investigate the connection between the right-hand limits of a solution u
|
| 335 |
+
of the homogeneous equation Ju′ + (q − λw)u = 0 at the points x0, ..., xN (given
|
| 336 |
+
by the vector ˜u) and the vector ˆu = (u(x1), ..., u(xN))⋄. We have ˆu = D(λ)˜u where
|
| 337 |
+
D(λ) = 1
|
| 338 |
+
2(U(λ)E⊥ + E⊤)
|
| 339 |
+
(3.4)
|
| 340 |
+
is again a two-diagonal block-matrix. If N ≥ 2 we will also introduce the matrices
|
| 341 |
+
Bm(λ) and Dm(λ) which are obtained by deleting the first and last n columns from
|
| 342 |
+
B(λ) and D(λ), respectively. If N = 1 we should think of Bm(λ) and Dm(λ) as
|
| 343 |
+
maps from the trivial vector space to Cn. Their adjoints are the map from Cn to
|
| 344 |
+
{0}. With this understanding the following results hold also for N = 1 even though
|
| 345 |
+
they then involve “matrices” with no rows or columns.
|
| 346 |
+
|
| 347 |
+
GREEN’S FUNCTIONS
|
| 348 |
+
7
|
| 349 |
+
Lemma 3.3. D(λ)∗B(λ) − B(λ)∗D(λ) = diag(−J, 0, ..., 0, J) and Dm(λ)∗B(λ) −
|
| 350 |
+
Bm(λ)∗D(λ) = 0.
|
| 351 |
+
Proof. This follows since U(λ)∗J U(λ) = J which, in turn, follows from Lemma 3.2
|
| 352 |
+
in [7].
|
| 353 |
+
□
|
| 354 |
+
Lemma 3.4. The map v �→ B(λ)v, restricted to ker D(λ), is a bijection onto
|
| 355 |
+
ker Dm(λ)∗. Similarly, the map v �→ D(λ)v, restricted to ker B(λ), is a bijection
|
| 356 |
+
onto ker Bm(λ)∗. In particular, dim ker D(λ) = dim ker Dm(λ)∗ and dim ker B(λ) =
|
| 357 |
+
dim ker Bm(λ)∗.
|
| 358 |
+
Proof. The identity Dm(λ)∗B(λ)−Bm(λ)∗D(λ) = 0 shows that B(λ) maps ker D(λ)
|
| 359 |
+
to ker Dm(λ)∗ as well as that D(λ) maps ker B(λ) to ker Bm(λ)∗.
|
| 360 |
+
If v ∈ ker B(λ) ∩ ker D(λ) one shows that E⊥v = E⊤v = 0 using the definitions
|
| 361 |
+
(3.3) and (3.4) of B and D and the fact that B(λ) − B(λ)∗ = 2J . This, of course,
|
| 362 |
+
implies that v = 0 and hence the injectivity of both B(λ)|ker D(λ) and D(λ)|ker B(λ).
|
| 363 |
+
Clearly, both D(λ) and Dm(λ)∗, having invertible matrices along their main
|
| 364 |
+
diagonal, are of full rank.
|
| 365 |
+
The rank-nullity theorem shows therefore that their
|
| 366 |
+
kernels both have dimension n. This proves surjectivity of B(λ)|ker D(λ).
|
| 367 |
+
Finally, assume that v ∈ ker Bm(λ)∗. Then v = D(λ)x for some x ∈ Cn(N+1)
|
| 368 |
+
which implies that 0 = Bm(λ)∗D(λ)x = Dm(λ)∗B(λ)x. The first part of the proof
|
| 369 |
+
shows that there is a y ∈ ker D(λ) such that B(λ)y = B(λ)x. Hence v = D(λ)(x���y)
|
| 370 |
+
where x − y ∈ ker B(λ).
|
| 371 |
+
□
|
| 372 |
+
The following theorem establishes a connection between solutions of the differ-
|
| 373 |
+
ential equation Ju′ + (q − λw)u = 0 and elements of ker Bm(λ)∗.
|
| 374 |
+
Theorem 3.5. If u is a solution of Ju′ + (q − λw)u = 0 on (a, b), then ˆu =
|
| 375 |
+
(u(x1), ..., u(xN))⋄ is in ker Bm(λ)∗.
|
| 376 |
+
If, in addition, u+(a) = u−(b) = 0, then
|
| 377 |
+
ˆu ∈ ker B(λ)∗ (a subspace of ker Bm(λ)∗).
|
| 378 |
+
Conversely, if ˆu ∈ ker Bm(λ)∗, then Ju′ + (q − λw)u = 0 has a unique solution
|
| 379 |
+
u on (a, b) such that (u(x1), ..., u(xN))⋄ = ˆu. If, indeed, ˆu ∈ ker B(λ)∗, we further
|
| 380 |
+
have u+(a) = u−(b) = 0.
|
| 381 |
+
Let us emphasize that supp u ⊂ [x1, xN] when u+(a) = u−(b) = 0.
|
| 382 |
+
Proof. If u solves Ju′ + (q − λw)u = 0, then, by Theorem 3.2, ˜u ∈ ker B(λ).
|
| 383 |
+
Lemma 3.4 shows then that ˆu = D(λ)˜u is in ker Bm(λ)∗. If u+(a) = u−(b) = 0,
|
| 384 |
+
then Lemma 3.3 gives 0 = B(λ)∗D(λ)˜u = B(λ)∗ˆu.
|
| 385 |
+
Conversely, assume that ˆu ∈ ker Bm(λ)∗ = D(λ)(ker B(λ)).
|
| 386 |
+
Then there is a
|
| 387 |
+
unique vector ˜u ∈ ker B(λ) such that ˆu = D(λ)˜u, which, in turn, defines a unique
|
| 388 |
+
solution u of Ju′+(q−λw)u = 0 such that (u(x1), ..., u(xN))⋄ = ˆu. If ˆu ∈ ker B(λ)∗,
|
| 389 |
+
then, according to Lemma 3.3, diag(−J, 0, ..., 0, J)˜u = 0 which shows that u+(a) =
|
| 390 |
+
u−(b) = 0.
|
| 391 |
+
□
|
| 392 |
+
Given an algebraic system Ax = b we know that there exist solutions only if
|
| 393 |
+
b ∈ ran A = (ker A∗)⊥. For the differential equation Ju′ + (q − λw)u = wf with
|
| 394 |
+
integrable coefficients q and w the unique continuation property for the solutions
|
| 395 |
+
gives rise to the variation of constants formula, which then guarantees the existence
|
| 396 |
+
of solutions for any non-homogeneity f (within reason). In the present situation,
|
| 397 |
+
|
| 398 |
+
8
|
| 399 |
+
STEVEN REDOLFI AND RUDI WEIKARD
|
| 400 |
+
however, the problem of existence raises its head and we now set out to give neces-
|
| 401 |
+
sary and sufficient conditions for f guaranteeing the existence of a solution in the
|
| 402 |
+
spirit of Linear Algebra.
|
| 403 |
+
Lemma 3.6. If ˜v ∈ ker B(λ) and ˆv = D(λ)˜v, then
|
| 404 |
+
˜v∗E∗
|
| 405 |
+
⊥ = −ˆv∗B(λ)∗U(λ)J −1
|
| 406 |
+
and
|
| 407 |
+
˜v∗E∗
|
| 408 |
+
⊤ = ˆv∗B(λ)J −1.
|
| 409 |
+
Moreover, if f ∈ L2(w) and Jv′ + (q − λw)v = 0, then
|
| 410 |
+
�
|
| 411 |
+
v∗wf = ˆv∗F0(f, λ) + ˆv∗B(λ)J −1˜I(f, λ) = ˆv∗F0(f, λ) + ˜v∗E∗
|
| 412 |
+
⊤˜I(f, λ)
|
| 413 |
+
where (v(x1), ..., v(xN))⋄ = ˆv = D(λ)˜v and ˜I(f, λ) = (0, ..., 0, IN(f, λ))⋄ ∈ CnN.
|
| 414 |
+
Proof. Using the definitions (3.3) and (3.4) of B and D and the identities B(λ) −
|
| 415 |
+
B(λ)∗ = 2J and U(λ)∗J U(λ) = J we obtain that B(λ)˜v = 0 implies
|
| 416 |
+
B(λ)D(λ)˜v = U(λ)∗−1J E⊥˜v
|
| 417 |
+
and
|
| 418 |
+
B(λ)∗D(λ)˜v = −J E⊤˜v.
|
| 419 |
+
Taking adjoints gives the first claim since ˆv = D(λ)˜v.
|
| 420 |
+
The second claim is an immediate consequence of this, since
|
| 421 |
+
�
|
| 422 |
+
v∗wf = ˆv∗R(f) + ˜v∗(I0(f, λ), ..., IN (f, λ))⋄
|
| 423 |
+
= ˆv∗R(f) + ˜v∗E∗
|
| 424 |
+
⊥I(f, λ) + ˜v∗E∗
|
| 425 |
+
⊤˜I(f, λ)
|
| 426 |
+
= ˆv∗R(f) − ˆv∗B(λ)∗U(λ)J −1I(f, λ) + ˆv∗B(λ)J −1˜I(f, λ)
|
| 427 |
+
= ˆv∗F0(f, λ) + ˆv∗B(λ)J −1˜I(f, λ).
|
| 428 |
+
□
|
| 429 |
+
Theorem 3.7. The differential equation Ju′ + (q − λw)u = wf has a solution on
|
| 430 |
+
(a, b) if and only if
|
| 431 |
+
�
|
| 432 |
+
v∗wf = 0 for every solution v of Jv′ + (q − λw)v = 0 which
|
| 433 |
+
vanishes at a and b.
|
| 434 |
+
Proof. By Theorem 3.2 the solution u exists if and only if the system (3.2) has a
|
| 435 |
+
solution ˜u = (u+(x0), ..., u+(xN))⋄. This, in turn, happens if and only if F0(f, λ) ∈
|
| 436 |
+
ran B(λ) = (ker B(λ)∗)⊥.
|
| 437 |
+
By Theorem 3.5 the solutions of Jv′ +(q −λw)v = 0 which vanish at a and b are
|
| 438 |
+
in one-to-one correspondence with elements of ker B(λ)∗. Since v+(xN) = 0 we have
|
| 439 |
+
˜v∗E∗
|
| 440 |
+
⊤˜I(f, λ) = 0 and then, from Lemma 3.6, we obtain ˆv∗F0(f, λ) =
|
| 441 |
+
�
|
| 442 |
+
v∗wf.
|
| 443 |
+
□
|
| 444 |
+
In the case of unique continuation of solutions the condition that v vanishes at a
|
| 445 |
+
or b implies, of course, that v = 0. Consequently, Ju′ + (q − λw)u = wf has then a
|
| 446 |
+
solution for any f ∈ L2(w). The set of all solutions is thus obtained by adding the
|
| 447 |
+
general solution of Ju′ +(q −λw)u = 0 whose dimension is n(N + 1)−rkB(λ) ≥ n.
|
| 448 |
+
Theorem 3.8. The differential equation Ju′ + (q − λw)u = wf has a solution on
|
| 449 |
+
(a, b) which vanishes at a and b if and only if
|
| 450 |
+
�
|
| 451 |
+
v∗wf = 0 for every solution v of
|
| 452 |
+
Jv′ + (q − λw)v = 0.
|
| 453 |
+
Proof. For u to vanish at a and b it is required that u+(x0) = 0 and u+(xN) =
|
| 454 |
+
−J−1IN(f, λ). The system (3.2) is therefore equivalent to
|
| 455 |
+
Bm(λ)(c1, ..., cN−1)⋄ = F0(f, λ) + B(λ)J −1˜I(f, λ).
|
| 456 |
+
The proof is now analogous to the one for Theorem 3.7.
|
| 457 |
+
□
|
| 458 |
+
|
| 459 |
+
GREEN’S FUNCTIONS
|
| 460 |
+
9
|
| 461 |
+
We conclude this section by “counting” the solutions of Ju′ + qu = λwu which
|
| 462 |
+
are not compactly supported.
|
| 463 |
+
More precisely, we will determine the dimension
|
| 464 |
+
of the quotient space of all solutions of Ju′ + qu = λwu modulo the space of
|
| 465 |
+
compactly supported solutions. Theorem 3.5 shows that the space of all solutions of
|
| 466 |
+
Ju′+qu = λwu is in one-to-one correspondence with ker Bm(λ)∗ and that the space
|
| 467 |
+
of compactly supported solutions of Ju′+qu = λwu is in one-to-one correspondence
|
| 468 |
+
with ker B(λ)∗. We therefore define
|
| 469 |
+
˜n(λ) = dim(ker Bm(λ)∗/ ker B(λ)∗) = dim ker Bm(λ)∗ − dim ker B(λ)∗.
|
| 470 |
+
Lemma 3.9. ˜n(λ) + ˜n(λ) = 2n.
|
| 471 |
+
Proof. Since rk B(λ) = rk B(λ)∗, the rank-nullity theorem implies
|
| 472 |
+
dim ker B(λ) = n(N + 1) − rk B(λ)∗ = n + dim ker B(λ)∗.
|
| 473 |
+
Hence, using also the analogous equation for λ,
|
| 474 |
+
dim ker B(λ) − dim ker B(λ)∗ + dim ker B(λ) − dim ker B(λ)∗ = 2n.
|
| 475 |
+
Lemma 3.4 gives that dim ker B(λ) = dim ker Bm(λ)∗ yielding the claim.
|
| 476 |
+
□
|
| 477 |
+
From Theorem 2.4 we know that the matrices Uj(xj+1, ·) are meromorphic on C
|
| 478 |
+
with poles at most at points in the complement of Ω0. It follows that the entries of
|
| 479 |
+
B are also meromorphic. Since the meromorphic functions on C form a field there
|
| 480 |
+
is a row-echelon matrix ˜B with meromorphic entries such that B˜u = 0 has the same
|
| 481 |
+
solutions as ˜B˜u = 0. Now define a set Ω as Ω0 without the set of all poles of ˜B as
|
| 482 |
+
well as their complex conjugates, and the set of zeros and their conjugates of any
|
| 483 |
+
of the pivots of ˜B.
|
| 484 |
+
Theorem 3.10. If λ ∈ Ω, then dim ker B(λ) = dim ker B(λ) and ˜n(λ) = n.
|
| 485 |
+
Proof. The construction of Ω entails that rk B(λ) = rk ˜B(λ) = rk B(λ) if λ ∈ Ω.
|
| 486 |
+
Since ˜n(λ) = dim ker B(λ) − dim ker B(λ)∗ = dim ker B(λ) + n − dim ker B(λ) we
|
| 487 |
+
obtain ˜n(λ) = n.
|
| 488 |
+
□
|
| 489 |
+
4. Symmetric restrictions of Tmax
|
| 490 |
+
Given a differential equation Ju′ + qu = wf we now define associated minimal
|
| 491 |
+
and maximal relations. Recall that L2(w) is the space of functions f such that
|
| 492 |
+
�
|
| 493 |
+
f ∗wf < ∞. First we define
|
| 494 |
+
Tmax = {(u, f) ∈ L2(w) × L2(w) : u ∈ BV#
|
| 495 |
+
loc((a, b))n, Ju′ + qu = wf}.
|
| 496 |
+
Subsequently we will always tacitly assume that u ∈ BV#
|
| 497 |
+
loc((a, b))n, when we use
|
| 498 |
+
u′. Next, let
|
| 499 |
+
Tmin = {(u, f) ∈ Tmax : supp u is compact in (a, b)}.
|
| 500 |
+
Note that these are spaces of pairs of functions. To employ the power of functional
|
| 501 |
+
analysis we need to realize these relations in Hilbert spaces. Therefore we introduce,
|
| 502 |
+
as usual, the space L2(w) as the quotient of L2(w) modulo the subspace of all u ∈
|
| 503 |
+
L2(w) for which ∥u∥2 =
|
| 504 |
+
�
|
| 505 |
+
u∗wu = 0. Denoting the equivalence class corresponding
|
| 506 |
+
to u by [u] we now set
|
| 507 |
+
Tmax = {([u], [f]) ∈ L2(w) × L2(w) : (u, f) ∈ Tmax}
|
| 508 |
+
|
| 509 |
+
10
|
| 510 |
+
STEVEN REDOLFI AND RUDI WEIKARD
|
| 511 |
+
and
|
| 512 |
+
Tmin = {([u], [f]) ∈ Tmax : (u, f) ∈ Tmin}.
|
| 513 |
+
Here (and elsewhere) we choose brevity over precision: whenever we have a pair
|
| 514 |
+
([u], [f]) in Tmax we choose u and f such that (u, f) ∈ Tmax.
|
| 515 |
+
Define the vector space
|
| 516 |
+
L0 = {u ∈ BV#
|
| 517 |
+
loc((a, b))n : Ju′ + qu = 0 and ∥u∥ = 0}.
|
| 518 |
+
In many cases this space is trivial and some authors restrict their attention to the
|
| 519 |
+
case where it is; this is then called the definiteness condition. However, we will
|
| 520 |
+
not do so here. Note that ∥u∥ = 0 if and only if wu is the zero distribution. The
|
| 521 |
+
significance of L0 stems from the following fact. Suppose ([u], [f]) ∈ Tmax and that
|
| 522 |
+
there are u, v ∈ [u] and f, g ∈ [f] such that Ju′ + qu = wf and Jv′ + qv = wg.
|
| 523 |
+
Then J(u − v)′ + q(u − v) = w(f − g) = 0 as well as w(u − v) = 0, i.e., u − v ∈ L0.
|
| 524 |
+
In other words, in the presence of a non-trivial space L0, the class [u] has many
|
| 525 |
+
representatives of locally bounded variation satisfying the differential equation for a
|
| 526 |
+
given class [f] (the choice of a representative of [f], on the other hand, is irrelevant).
|
| 527 |
+
In Section 5 we will describe a procedure to choose a representative of [u] in a
|
| 528 |
+
distinctive way.
|
| 529 |
+
In [4] it was proved that Tmin is symmetric, indeed that T ∗
|
| 530 |
+
min = Tmax. In this case
|
| 531 |
+
it is well-known that von Neumann’s theorem holds. Setting Dλ = {([u], λ[u]) ∈
|
| 532 |
+
Tmax} it states that
|
| 533 |
+
Tmax = Tmin ⊎ Dλ ⊎ Dλ
|
| 534 |
+
when Im λ ̸= 0. Moreover, when λ = ±i, these direct sums are even orthogonal. It
|
| 535 |
+
is also known that the dimension of Dλ does not change as λ varies in either the
|
| 536 |
+
upper or the lower half plane. The numbers n± = dim D±i are called deficiency
|
| 537 |
+
indices of Tmin and we are now setting out to investigate these.
|
| 538 |
+
If u is a solution of Ju′ +qu = λwu which is compactly supported then (u, λu) ∈
|
| 539 |
+
Tmin and ([u], λ[u]) ∈ Tmin ∩ Dλ. If λ is not real, then Tmin ∩ Dλ is trivial and it
|
| 540 |
+
follows that compactly supported solutions of Ju′ + qu = λwu do not contribute to
|
| 541 |
+
the corresponding deficiency index. We now have, as a corollary of Theorem 3.10,
|
| 542 |
+
that the deficiency indices of Tmin cannot be more than n if a and b are regular
|
| 543 |
+
endpoints. We do not state this result separately since it is included in the next
|
| 544 |
+
theorem about the general case.
|
| 545 |
+
Thus, to emphasize, we allow in the following a and b to be either regular or
|
| 546 |
+
singular endpoints. Let τk, k ∈ Z, be a strictly increasing sequence in (a, b) having
|
| 547 |
+
a and b as its only limit points and such that all points in Ξ0 are among the
|
| 548 |
+
τk. Considering now only the interval Ik = (τ−k, τk) we set xj = τ−k+j for j =
|
| 549 |
+
0, ..., N + 1 = 2k. We can then introduce the objects from Section 3. To emphasize
|
| 550 |
+
their dependence on k we will add a superscript (k) to those objects. We have then,
|
| 551 |
+
in particular, the matrices B(k), B(k)
|
| 552 |
+
m and the sets Ω(k) of permissible values of λ.
|
| 553 |
+
We now define Ω = �∞
|
| 554 |
+
k=1 Ω(k) and note that Ω is symmetric with respect to the
|
| 555 |
+
real axis and misses only countably many values from C.
|
| 556 |
+
Now fix a non-real λ ∈ Ω. If u is a solution of Ju′+qu = λwu on (a, b) we denote
|
| 557 |
+
its restriction to the interval Ik by u(k). We are interested in the quotient space Xk
|
| 558 |
+
of all solutions of Ju′ +qu = λwu on Ik modulo the compactly supported solutions.
|
| 559 |
+
If u is a solution of Ju′+qu = λwu on Ik we denote the associated equivalence class
|
| 560 |
+
in Xk by ⌊u⌋k. A compactly supported solution u of Ju′ + qu = λwu on Ik can be
|
| 561 |
+
extended by 0 to all of (a, b) yielding an element in Tmin ∩ Dλ. This implies, since
|
| 562 |
+
|
| 563 |
+
GREEN’S FUNCTIONS
|
| 564 |
+
11
|
| 565 |
+
Im λ ̸= 0, that ∥u∥2 =
|
| 566 |
+
�
|
| 567 |
+
Ik u∗wu = 0 and shows that Xk is a normed space with the
|
| 568 |
+
norm given by ∥u∥2
|
| 569 |
+
k =
|
| 570 |
+
�
|
| 571 |
+
Ik u∗wu. According to Theorem 3.5 the quotient space Xk
|
| 572 |
+
is isomorphic to ker B(k)
|
| 573 |
+
m (λ)∗/ ker B(k)(λ)∗ and, by Theorem 3.10, its dimension is
|
| 574 |
+
equal to n since λ ∈ Ω ⊂ Ω(k).
|
| 575 |
+
Theorem 4.1. The deficiency indices of Tmin are less than or equal to n.
|
| 576 |
+
Proof. Fix a non-real λ ∈ Ω. Suppose u1, ..., um are solutions of Ju′ + qu = λwu
|
| 577 |
+
such that [u1], ..., [um] are linearly independent elements of Dλ. We will show below
|
| 578 |
+
that there is an interval Ip = (τ−p, τp) such that ⌊u(p)
|
| 579 |
+
1 ⌋p, ..., ⌊u(p)
|
| 580 |
+
m ⌋p are linearly
|
| 581 |
+
independent elements of Xp. Hence m ≤ n, the dimension of Xp. Since deficiency
|
| 582 |
+
indices are constant in either half-plane they cannot be larger than n.
|
| 583 |
+
We will now prove the existence of Ip by induction. That is we prove that, for
|
| 584 |
+
every k ∈ {1, ..., m}, there is an interval Iℓk such that the restrictions of u1, ..., uk
|
| 585 |
+
to Iℓk generate linearly independent elements ⌊u(ℓk)
|
| 586 |
+
1
|
| 587 |
+
⌋ℓk, ..., ⌊u(ℓk)
|
| 588 |
+
k
|
| 589 |
+
⌋ℓk of Xℓk. Once
|
| 590 |
+
this is achieved we set p = ℓm.
|
| 591 |
+
Suppose k = 1 and let Iℓ1 be an interval such that ∥u(ℓ1)
|
| 592 |
+
1
|
| 593 |
+
∥ > 0. By what we
|
| 594 |
+
argued above we know that u(ℓ1)
|
| 595 |
+
1
|
| 596 |
+
is not compactly supported in Iℓ1 and thus gives
|
| 597 |
+
rise to a non-zero (and hence linearly independent) element of Xℓ1.
|
| 598 |
+
Now suppose we had already shown our claim for some k < m. If ⌊u(ℓk)
|
| 599 |
+
1
|
| 600 |
+
⌋ℓk, ...,
|
| 601 |
+
⌊u(ℓk)
|
| 602 |
+
k+1⌋ℓk are already linearly independent as elements of Xℓk we choose ℓk+1 = ℓk
|
| 603 |
+
and our induction step is complete. Otherwise, there are unique complex numbers
|
| 604 |
+
α1, ..., αk such that
|
| 605 |
+
∥(α1u1 + ... + αkuk + uk+1)(ℓk)∥ℓk = 0.
|
| 606 |
+
However, there must be an interval Iℓk+1 ⊃ Iℓk where
|
| 607 |
+
∥(α1u1 + ... + αkuk + uk+1)(ℓk+1)∥ℓk+1 > 0
|
| 608 |
+
on account that [u1], ..., [uk+1] are linearly independent. It follows now that, as ele-
|
| 609 |
+
ments of Xℓk+1 the vectors ⌊u(ℓk+1)
|
| 610 |
+
1
|
| 611 |
+
⌋ℓk+1, ..., ⌊u(ℓk+1)
|
| 612 |
+
k+1
|
| 613 |
+
⌋ℓk+1 are linearly independent.
|
| 614 |
+
This completes our induction step also in this case.
|
| 615 |
+
□
|
| 616 |
+
Corollary 4.2. If a and b are regular, then n+ = n−.
|
| 617 |
+
Proof. Fix a non-real λ in Ω. Since a and b are regular, the set Ξλ = Ξλ is finite.
|
| 618 |
+
Thus we may assume that it is contained in Ik = (τ−k, τk) for some appropriate k.
|
| 619 |
+
Then dim ker B(k)(λ) is the number of linearly independent solutions of Ju′ + qu =
|
| 620 |
+
λwu. Theorem 3.10 shows that Ju′ + qu = λwu has the same number of linearly
|
| 621 |
+
independent solutions. Any of these solutions has finite norm but some may have
|
| 622 |
+
norm 0. Now note, that if u is a solution of Ju′+qu = λwu of norm 0, then we have
|
| 623 |
+
wu = 0, so that u is also a solution of Ju′ + qu = λwu. Therefore n+ = n−.
|
| 624 |
+
□
|
| 625 |
+
As mentioned above, it is well-known, even in the case of relations, that von
|
| 626 |
+
Neumann’s theorem E∗ = E⊕Di⊕D−i holds when E is a closed symmetric relation
|
| 627 |
+
in H × H when H is a Hilbert space. In our case, when d = dim Di ⊕ D−i is finite,
|
| 628 |
+
as we just showed, we can use Theorem B.5 in [7] to characterize the symmetric
|
| 629 |
+
restriction of Tmax in terms of boundary conditions. We state that theorem here
|
| 630 |
+
for easy reference. The operator J appearing there is defined by J (u, f) = (f, −u)
|
| 631 |
+
for u, f ∈ H.
|
| 632 |
+
|
| 633 |
+
12
|
| 634 |
+
STEVEN REDOLFI AND RUDI WEIKARD
|
| 635 |
+
Theorem 4.3. Suppose E is a closed symmetric relation in H × H with d =
|
| 636 |
+
dim Di ⊕ D−i < ∞ and that m ≤ d/2 is a natural number or 0. If A : E∗ → Cd−m
|
| 637 |
+
is a surjective linear operator such that E ⊂ ker A and AJ A∗ has rank d−2m then
|
| 638 |
+
ker A is a closed symmetric restriction of E∗ for which the dimension of (ker A)⊖E
|
| 639 |
+
is m. Conversely, every closed symmetric restriction of E∗ is the kernel of such a
|
| 640 |
+
linear operator A. Finally, ker A is self-adjoint if and only if AJ A∗ = 0 (entailing
|
| 641 |
+
m = d/2).
|
| 642 |
+
A second ingredient for our next considerations is Lagrange’s identity (or Green’s
|
| 643 |
+
formula). If (u, f) and (v, g) are in Tmax, then v∗wf and g∗wu are finite measures.
|
| 644 |
+
Therefore v∗Ju′ + v′∗Ju = v∗wf − g∗wu is also a finite measure. Its antiderivative
|
| 645 |
+
v∗Ju is of bounded variation and thus has limits at a and b. Integration now gives
|
| 646 |
+
Lagrange’s identity
|
| 647 |
+
(v∗Ju)−(b) − (v∗Ju)+(a) = ⟨v, f⟩ − ⟨g, u⟩.
|
| 648 |
+
(4.1)
|
| 649 |
+
Note the right-hand side, and hence the left-hand side, does not change upon choos-
|
| 650 |
+
ing different representatives in place of u, f, v, or g.
|
| 651 |
+
Now, if (v, g) is an element of Di⊕D−i, then (u, f) �→ ⟨(v, g), (u, f)⟩ is a bounded
|
| 652 |
+
linear functional on Tmax. Conversely, since Tmax is a Hilbert space, a bounded
|
| 653 |
+
linear functional on Tmax is given by (u, f) �→ ⟨(v, g), (u, f)⟩ for some (v, g) ∈ Tmax.
|
| 654 |
+
When it is also known that Tmin is in the kernel of this functional, (v, g) may be
|
| 655 |
+
chosen in Di ⊕ D−i. Hence, in our situation, the operator A from Theorem 4.3
|
| 656 |
+
is given by d − m linearly independent elements in Di ⊕ D−i. Lagrange’s identity
|
| 657 |
+
implies that the entries of the matrix AJ A∗ are then given by
|
| 658 |
+
(AJ A∗)k,ℓ = ⟨(vk, gk), (gℓ, −vℓ)⟩ = (g∗
|
| 659 |
+
kJgℓ)−(b) − (g∗
|
| 660 |
+
kJgℓ)+(a).
|
| 661 |
+
(4.2)
|
| 662 |
+
Therefore we arrive at the following theorem.
|
| 663 |
+
Theorem 4.4. Let d = n+ + n− and suppose that m ≤ min{n+, n−}. If (v1, g1),
|
| 664 |
+
..., (vd−m, gd−m) are linearly independent elements of Di⊕D−i such that the matrix
|
| 665 |
+
defined in (4.2) has rank d − 2m, then
|
| 666 |
+
T = {(u, f) ∈ Tmax : (g∗
|
| 667 |
+
j Ju)−(b) − (g∗
|
| 668 |
+
j Ju)+(a) = 0 for j = 1, ..., d − m}
|
| 669 |
+
(4.3)
|
| 670 |
+
is a closed symmetric restriction of Tmax.
|
| 671 |
+
Conversely, if T is a closed symmetric restriction of Tmax and m is the dimen-
|
| 672 |
+
sion of T ⊖ Tmin, then T is given by (4.3) for appropriate elements (v1, g1), ...,
|
| 673 |
+
(vd−m, gd−m) of Di ⊕ D−i for which the matrix defined in (4.2) has rank d − 2m.
|
| 674 |
+
For self-adjoint restrictions of Tmax it is hence necessary and sufficient that n+ =
|
| 675 |
+
n− = m = d−m and that (g∗
|
| 676 |
+
kJgℓ)−(b)−(g∗
|
| 677 |
+
kJgℓ)+(a) = 0 for all 1 ≤ k, ℓ ≤ m = d/2.
|
| 678 |
+
5. The space L0
|
| 679 |
+
We mentioned earlier that the class [u] does not have a unique balanced repre-
|
| 680 |
+
sentative when ([u], [f]) ∈ Tmax, if the space L0 has non-trivial elements. In this
|
| 681 |
+
section we describe a procedure to choose a representative in a distinctive way.
|
| 682 |
+
To this end we assume, without loss of generality, that B+(τ0, 0) = B−(τ0, 0) = J
|
| 683 |
+
so that solutions of our differential equations are continuous at τ0. Define N0 =
|
| 684 |
+
{h(τ0) : h ∈ L0} and for each k ∈ N both Nk = {h+(τk) : h ∈ L0, supp h ⊂ [τk, b)}
|
| 685 |
+
and N−k = {h−(τ−k) : h ∈ L0, supp h ⊂ (a, τ−k]}. Then, for k ∈ N0, we say that a
|
| 686 |
+
function u ∈ BV#
|
| 687 |
+
loc((a, b))n satisfies condition (±k), if u±(τ±k) is perpendicular to
|
| 688 |
+
N±k (using always the upper sign or always the lower sign).
|
| 689 |
+
|
| 690 |
+
GREEN’S FUNCTIONS
|
| 691 |
+
13
|
| 692 |
+
Lemma 5.1. Suppose ([u], [f]) ∈ Tmax. Then there is a unique balanced v ∈ [u]
|
| 693 |
+
such that (v, f) ∈ Tmax and v satisfies condition (k) for every k ∈ Z.
|
| 694 |
+
Proof. First consider uniqueness. Suppose u and v are two functions satisfying the
|
| 695 |
+
given conditions. Then u − v ∈ L0 and hence (u − v)(τ0)∗t(τ0) = 0 for t = u and
|
| 696 |
+
t = v. Subtract these equations to find (u−v)(τ0) = 0, and thus u = v on (τ−1, τ1).
|
| 697 |
+
Moreover, h1 = (u − v)χ[τ1,b) and h−1 = (u − v)χ(a,τ−1] are in L0. Conditions (1)
|
| 698 |
+
and (−1) show therefore that (u−v)+(τ1) and (u−v)−(τ−1) are also 0 which proves
|
| 699 |
+
that u = v on (τ−2, τ2). Induction informs us now that u = v everywhere.
|
| 700 |
+
We now turn to existence. Pick a balanced representative u ∈ [u] such that
|
| 701 |
+
(u, f) ∈ Tmax. There is an element h0 ∈ L0 such that the orthogonal projection of
|
| 702 |
+
u(τ0) onto N0 equals h0(τ0). Thus v0 = u − h0 satisfies (v0, f) ∈ Tmax, v0 ∈ [u],
|
| 703 |
+
and condition (0).
|
| 704 |
+
Next, there is an element h1 ∈ L0 with support in [τ1, b) such that the orthogonal
|
| 705 |
+
projection of v+
|
| 706 |
+
0 (τ1) onto N1 equals h+
|
| 707 |
+
1 (τ1). We now define v1 = v0 − h1. Then
|
| 708 |
+
(v1, f) ∈ Tmax, v1 ∈ [u], and v1 satisfies condition (1). Notice that v1 = v0 on
|
| 709 |
+
(a, τ1) implying that v1 also satisfies condition (0).
|
| 710 |
+
Proceeding recursively, we may define, for each k ∈ N, functions hk ∈ L0 sup-
|
| 711 |
+
ported in [τk, b) such that vk = u−�k
|
| 712 |
+
j=0 hj satisfies conditions (0), ..., (k), vk ∈ [u],
|
| 713 |
+
and (vk, f) ∈ Tmax.
|
| 714 |
+
Since, for a fixed x ∈ [τ0, b), only finitely many of the numbers hk(x) are different
|
| 715 |
+
from 0, we find that the sequence k �→ vk converges pointwise to a function ˜v ∈ [u]
|
| 716 |
+
satisfying conditions (k) for all k ∈ N0 and (˜v, f) ∈ Tmax. We can now repeat
|
| 717 |
+
this process for negative integers starting from the function ˜v instead of u arriving
|
| 718 |
+
eventually at a function v ∈ [u] satisfying conditions (k) for all k ∈ Z and (v, f) ∈
|
| 719 |
+
Tmax.
|
| 720 |
+
□
|
| 721 |
+
We denote the operator which assigns the function v just constructed to a given
|
| 722 |
+
element ([u], [f]) ∈ Tmax by E. If Im = (τ−m, τm) we also define Em : Tmax →
|
| 723 |
+
BV#(Im)n by composing E with the restriction to the interval Im.
|
| 724 |
+
Note that
|
| 725 |
+
BV#(Im)n is a Banach space with the norm |||u|||m defined as the sum of the
|
| 726 |
+
variation of u over Im and the norm of u(τ0).
|
| 727 |
+
Theorem 5.2. The operator Em : Tmax → BV#(Im)n is bounded.
|
| 728 |
+
Proof. Due to the closed graph theorem we merely have to show that Em is a
|
| 729 |
+
closed operator. Thus assume that the sequence ([uj], [fj]) converges to ([u], [f]) in
|
| 730 |
+
Tmax and that Em([uj], [fj]) converges to v in BV#(Im)n and hence pointwise. To
|
| 731 |
+
simplify notation we assume that Em([uj], [fj])) and Em([u], [f]) are the restrictions
|
| 732 |
+
of uj and u, respectively, to the interval Im. We need to show that u = v on Im.
|
| 733 |
+
First note that u±
|
| 734 |
+
j (τ±k) ∈ N ⊥
|
| 735 |
+
±k and
|
| 736 |
+
��u±
|
| 737 |
+
j (τ±k) − v±(τ±k)
|
| 738 |
+
�� → 0 imply that v
|
| 739 |
+
satisfies conditions (±k) for each k ∈ {0, ..., m − 1}. For ℓ ∈ {−m, m − 1} and
|
| 740 |
+
x ∈ (τℓ, τℓ+1) we have
|
| 741 |
+
u−
|
| 742 |
+
j (x) = U −
|
| 743 |
+
ℓ (x)
|
| 744 |
+
�
|
| 745 |
+
u+
|
| 746 |
+
j (τℓ) + J−1
|
| 747 |
+
�
|
| 748 |
+
(τℓ,x)
|
| 749 |
+
U ∗
|
| 750 |
+
ℓ wfj
|
| 751 |
+
�
|
| 752 |
+
when Uℓ denotes the fundamental matrix of Ju′ + qu = 0 on the interval (τℓ, τℓ+1)
|
| 753 |
+
satisfying U +
|
| 754 |
+
ℓ (τℓ) =
|
| 755 |
+
1. Taking the limit as j → ∞ gives
|
| 756 |
+
v−(x) = U −
|
| 757 |
+
ℓ (x)
|
| 758 |
+
�
|
| 759 |
+
v+(τℓ) + J−1
|
| 760 |
+
�
|
| 761 |
+
(τℓ,x)
|
| 762 |
+
U ∗
|
| 763 |
+
ℓ wf
|
| 764 |
+
�
|
| 765 |
+
|
| 766 |
+
14
|
| 767 |
+
STEVEN REDOLFI AND RUDI WEIKARD
|
| 768 |
+
since the integral may be considered as a vector of scalar products which are, of
|
| 769 |
+
course, continuous. The variation of constants formula shows that v is a balanced
|
| 770 |
+
solution for Jv′ + qv = wf on (τℓ, τℓ+1). We also have
|
| 771 |
+
J(u+
|
| 772 |
+
j (τℓ) − u−
|
| 773 |
+
j (τℓ)) + ∆q(τℓ)uj(τℓ) = ∆w(τℓ)fj(τℓ).
|
| 774 |
+
(5.1)
|
| 775 |
+
The fact that [fj] converges to [f] in L2(w) implies, on account of the positivity
|
| 776 |
+
of w, that ∆w(τℓ)fj(τℓ) converges to ∆w(τℓ)f(τℓ).
|
| 777 |
+
Therefore taking a limit in
|
| 778 |
+
(5.1) shows, in conjunction with the previous observations, that Jv′ + qv = wf on
|
| 779 |
+
the interval Im. Since u satisfies the same equation we have that u − v satisfies
|
| 780 |
+
J(u − v)′ + q(u − v) = 0 on Im.
|
| 781 |
+
Next we show w(u − v) = 0 on Im. Fatou’s lemma implies
|
| 782 |
+
0 ≤
|
| 783 |
+
�
|
| 784 |
+
Im
|
| 785 |
+
(u − v)∗w(u − v) ≤ lim inf
|
| 786 |
+
j→∞
|
| 787 |
+
�
|
| 788 |
+
Im
|
| 789 |
+
(u − uj)∗w(u − uj) = 0.
|
| 790 |
+
It follows that w(u − v) = 0 on Im.
|
| 791 |
+
Finally, a variant of Lemma 5.1 shows now that u = v.
|
| 792 |
+
□
|
| 793 |
+
6. Green’s function
|
| 794 |
+
Now suppose that we have a self-adjoint restriction T of Tmax. The resolvent set
|
| 795 |
+
of T is the set of those λ for which T − λ : dom(T ) → L2(w) is bijective, i.e.,
|
| 796 |
+
̺(T ) = {λ ∈ C : ker(T − λ) = {0}, ran(T − λ) = L2(w)}
|
| 797 |
+
which is an open set. We denote its complement, the spectrum of T , by σ(T ).
|
| 798 |
+
Since T is self-adjoint, σ(T ) is a subset of R.
|
| 799 |
+
If λ ∈ ̺(T ), then the resolvent
|
| 800 |
+
Rλ = (T − λ)−1 is a bounded linear operator from L2(w) to dom(T ). We now
|
| 801 |
+
define Rλ : L2(w) → BV#
|
| 802 |
+
loc((a, b))n by
|
| 803 |
+
Rλ[f] = E((Rλ[f], λRλ[f] + [f])).
|
| 804 |
+
Thus Rλ[f] is the unique solution of Ju′ + qu = w(λu + f) in L2(w) satisfying
|
| 805 |
+
condition (k) for every k ∈ Z.
|
| 806 |
+
We will now show that Rλ is an integral operator. Its kernel G is called a Green’s
|
| 807 |
+
function for T .
|
| 808 |
+
Theorem 6.1. If T is a self-adjoint restriction of Tmax, then there exists, for given
|
| 809 |
+
x ∈ (a, b) and λ ∈ ̺(T ), a matrix G(x, ·, λ) such that the columns of G(x, ·, λ)∗ are
|
| 810 |
+
in L2(w) and
|
| 811 |
+
(Rλ[f])(x) =
|
| 812 |
+
�
|
| 813 |
+
G(x, ·, λ)wf.
|
| 814 |
+
(6.1)
|
| 815 |
+
Proof. Fix x ∈ Im and λ ∈ ̺(T ). Consider the restriction of Rλ[f] to the interval
|
| 816 |
+
Im. Since Em and Rλ are bounded operators the map [f] �→ (Rλ[f])(x) is a bounded
|
| 817 |
+
linear map from L2(w) to Cn. Hence there are elements [g1], ..., [gn] ∈ L2(w) such
|
| 818 |
+
that the k-th component of (Rλ[f])(x) equals ⟨[gk], [f]⟩. Let these be the columns
|
| 819 |
+
of the matrix-valued function G(x, ·, λ)∗. Then we obtain (6.1).
|
| 820 |
+
□
|
| 821 |
+
One wishes to complement this fairly abstract existence result by a more concrete
|
| 822 |
+
one where Green’s function is given in terms of solutions of the differential equation
|
| 823 |
+
as is done in the classical case, see, for instance, Zettl [11]. This was also achieved
|
| 824 |
+
in [7] under the assumption that Ξ0 is empty and minor generalizations of this
|
| 825 |
+
are certainly possible. Such an explicit construction of Green’s function, where
|
| 826 |
+
possible, is the cornerstone of many other results in spectral theory, in particular
|
| 827 |
+
|
| 828 |
+
GREEN’S FUNCTIONS
|
| 829 |
+
15
|
| 830 |
+
the development of a spectral transformation and more detailed information about
|
| 831 |
+
the resolvent, e.g., the compactness of the resolvent in the regular case. Due to
|
| 832 |
+
the difficulties posed by the absence of an existence and uniqueness theorem for
|
| 833 |
+
initial value problems we have, so far, not been able to obtain such a construction
|
| 834 |
+
in general. However, we hope to return to this issue in the future.
|
| 835 |
+
7. Example
|
| 836 |
+
In this section we treat an example where the matrices B±(x, λ) fail to be invert-
|
| 837 |
+
ible for infinitely many x and all λ, in other words where Ξ0 is infinite and Λx = C
|
| 838 |
+
for all x ∈ Ξ0 (recall that in [7] the hypothesis Ξ0 = ∅ was made causing each Λx
|
| 839 |
+
to be finite). The example is Ju′ + qu = wf on (a, b) = R where
|
| 840 |
+
J =
|
| 841 |
+
�
|
| 842 |
+
0
|
| 843 |
+
−1
|
| 844 |
+
1
|
| 845 |
+
0
|
| 846 |
+
�
|
| 847 |
+
, q =
|
| 848 |
+
�
|
| 849 |
+
0
|
| 850 |
+
2
|
| 851 |
+
2
|
| 852 |
+
0
|
| 853 |
+
� �
|
| 854 |
+
k∈Z
|
| 855 |
+
(δ2k − δ2k+1), and, w =
|
| 856 |
+
�
|
| 857 |
+
2
|
| 858 |
+
0
|
| 859 |
+
0
|
| 860 |
+
0
|
| 861 |
+
� �
|
| 862 |
+
k∈Z
|
| 863 |
+
δk
|
| 864 |
+
with δk denoting the Dirac point measure concentrated on {k}. Since we are seeking
|
| 865 |
+
balanced solutions we need the matrices
|
| 866 |
+
B−(2k − 1, λ) =
|
| 867 |
+
�λ
|
| 868 |
+
0
|
| 869 |
+
2
|
| 870 |
+
0
|
| 871 |
+
�
|
| 872 |
+
and
|
| 873 |
+
B+(2k − 1, λ) =
|
| 874 |
+
�−λ
|
| 875 |
+
−2
|
| 876 |
+
0
|
| 877 |
+
0
|
| 878 |
+
�
|
| 879 |
+
as well as
|
| 880 |
+
B−(2k, λ) =
|
| 881 |
+
�
|
| 882 |
+
λ
|
| 883 |
+
−2
|
| 884 |
+
0
|
| 885 |
+
0
|
| 886 |
+
�
|
| 887 |
+
and
|
| 888 |
+
B+(2k, λ) =
|
| 889 |
+
�
|
| 890 |
+
−λ
|
| 891 |
+
0
|
| 892 |
+
2
|
| 893 |
+
0
|
| 894 |
+
�
|
| 895 |
+
.
|
| 896 |
+
If x is not an integer we have B±(x, λ) = J. Note that f ∈ L2(w) if and only if
|
| 897 |
+
k �→ f1(k) is in ℓ2(Z) and any element in L2(w) is uniquely determined by these
|
| 898 |
+
values (here f1 denotes the first component of f).
|
| 899 |
+
In any interval (k, k + 1) solutions of Ju′ + qu = w(λu + f) are constant, say
|
| 900 |
+
(αk, βk)⊤. At x = 2k − 1 the equation
|
| 901 |
+
B+(2k − 1, λ)u+(2k − 1) − B−(2k − 1, λ)u−(2k − 1) = (2f1(2k − 1), 0)⊤
|
| 902 |
+
implies α2k−2 = 0 and
|
| 903 |
+
− λα2k−1 − 2β2k−1 = 2f1(2k − 1).
|
| 904 |
+
(7.1)
|
| 905 |
+
Similarly, at x = 2k we get α2k = 0 and
|
| 906 |
+
− λα2k−1 + 2β2k−1 = 2f1(2k).
|
| 907 |
+
(7.2)
|
| 908 |
+
We can now describe the space Tmax. A pair (u, f) is in Tmax if and only if the
|
| 909 |
+
sequences k �→ f1(k) and k �→ u1(k) are in ℓ2(Z), f1(2k) = −f1(2k − 1), u1(2k) =
|
| 910 |
+
u1(2k − 1), and
|
| 911 |
+
u =
|
| 912 |
+
�
|
| 913 |
+
k∈Z
|
| 914 |
+
� �2u1(2k)
|
| 915 |
+
f1(2k)
|
| 916 |
+
�
|
| 917 |
+
χ#
|
| 918 |
+
(2k−1,2k) +
|
| 919 |
+
� 0
|
| 920 |
+
β2k
|
| 921 |
+
�
|
| 922 |
+
χ#
|
| 923 |
+
(2k,2k+1)
|
| 924 |
+
�
|
| 925 |
+
with arbitrary numbers β2k. Note that ∥u∥2 = 4 �
|
| 926 |
+
k∈Z |u1(2k)|2.
|
| 927 |
+
Choosing here f = 0 shows that 0 is an eigenvalue of Tmax with infinite multi-
|
| 928 |
+
plicity. Choosing f = 0 and requiring ∥u∥ = 0 determines the space L0. Indeed,
|
| 929 |
+
L0 =
|
| 930 |
+
� �
|
| 931 |
+
k∈Z
|
| 932 |
+
�
|
| 933 |
+
0
|
| 934 |
+
β2k
|
| 935 |
+
�
|
| 936 |
+
χ#
|
| 937 |
+
(2k,2k+1) : β2k ∈ C
|
| 938 |
+
�
|
| 939 |
+
|
| 940 |
+
16
|
| 941 |
+
STEVEN REDOLFI AND RUDI WEIKARD
|
| 942 |
+
which is infinite-dimensional. We now define the sequence τ setting τ0 = 1/2 and,
|
| 943 |
+
for k ∈ N, τk = k and τ−k = 1 − k. A solution u of Ju′ + qu = w(λu + f) always
|
| 944 |
+
satisfies condition (2k + 1) and it satisfies condition (2k) exactly when β2k = 0.
|
| 945 |
+
For f = 0 equations (7.1) and (7.2) show that no non-zero λ can be an eigenvalue
|
| 946 |
+
of Tmax. In particular, the deficiency indices n± are 0, i.e., Tmax is self-adjoint. Now
|
| 947 |
+
choose λ ̸= 0 and f arbitrary in L2(w). Then
|
| 948 |
+
(Rλf)(x) = − 1
|
| 949 |
+
2λ
|
| 950 |
+
�
|
| 951 |
+
k∈Z
|
| 952 |
+
�2f1(2k − 1) + 2f1(2k)
|
| 953 |
+
λf1(2k − 1) − λf1(2k)
|
| 954 |
+
�
|
| 955 |
+
χ#
|
| 956 |
+
(2k−1,2k)(x)
|
| 957 |
+
(7.3)
|
| 958 |
+
is the unique solution of Ju′ + qu = w(λu + f) satisfying condition (k) for any
|
| 959 |
+
k ∈ Z. Since
|
| 960 |
+
∥Rλf∥2 =
|
| 961 |
+
�
|
| 962 |
+
k∈Z
|
| 963 |
+
2|(Rλf)1(k)|2 =
|
| 964 |
+
1
|
| 965 |
+
|λ|2
|
| 966 |
+
�
|
| 967 |
+
k∈Z
|
| 968 |
+
|f1(2k − 1) + f1(2k)|2
|
| 969 |
+
(7.4)
|
| 970 |
+
is finite we have that C \ {0} is the resolvent set of Tmax.
|
| 971 |
+
We now define H = {u ∈ L2(w) : u1(2k − 1) = u1(2k)} and H∞ = {f ∈ L2(w) :
|
| 972 |
+
f1(2k − 1) = −f1(2k)}. These spaces are orthogonal to each other and their direct
|
| 973 |
+
sum is L2(w). Equation (7.4) shows that ker Rλ = H∞. Moreover, we have
|
| 974 |
+
Tmax = (H × {0}) ⊕ ({0} × H∞).
|
| 975 |
+
This is an instance of a general feature for a self-adjoint linear relation T : if H is
|
| 976 |
+
the closure of the domain of T , H∞ the orthogonal complement of H, and T0 =
|
| 977 |
+
T ∩ (H × H), then T = T0 ⊕ ({0} × H∞). The former summand is then a linear
|
| 978 |
+
operator densely defined in H called the operator part of T . The latter summand
|
| 979 |
+
is called the multi-valued part of T .
|
| 980 |
+
We end this example by identifying Green’s function for our example. It may
|
| 981 |
+
be guessed by looking at equation (7.3). In any case one can check directly that
|
| 982 |
+
(Rλf)(x) =
|
| 983 |
+
�
|
| 984 |
+
G(x, ·, λ)wf. Note that the second column of G is irrelevant since
|
| 985 |
+
the second row of w is 0. When x is not integer G(x, y, λ) is given by
|
| 986 |
+
�
|
| 987 |
+
k∈Z
|
| 988 |
+
�
|
| 989 |
+
− 1
|
| 990 |
+
λ
|
| 991 |
+
�1
|
| 992 |
+
0
|
| 993 |
+
0
|
| 994 |
+
0
|
| 995 |
+
�
|
| 996 |
+
+ 1
|
| 997 |
+
2
|
| 998 |
+
� 0
|
| 999 |
+
1
|
| 1000 |
+
−1
|
| 1001 |
+
0
|
| 1002 |
+
�
|
| 1003 |
+
sgn(x − y)
|
| 1004 |
+
�
|
| 1005 |
+
χ#
|
| 1006 |
+
(2k−1,2k)(x)χ#
|
| 1007 |
+
(2k−1,2k)(y).
|
| 1008 |
+
If x is an integer we have instead
|
| 1009 |
+
G(2k − 1, y, λ) = 1
|
| 1010 |
+
2
|
| 1011 |
+
lim
|
| 1012 |
+
x↓2k−1 G(x, y, λ)
|
| 1013 |
+
and
|
| 1014 |
+
G(2k, y, λ) = 1
|
| 1015 |
+
2 lim
|
| 1016 |
+
x↑2k G(x, y, λ).
|
| 1017 |
+
References
|
| 1018 |
+
[1] Richard Arens. Operational calculus of linear relations. Pacific J. Math., 11:9–23, 1961.
|
| 1019 |
+
[2] F. V. Atkinson. Discrete and continuous boundary problems. Mathematics in Science and
|
| 1020 |
+
Engineering, Vol. 8. Academic Press, New York-London, 1964.
|
| 1021 |
+
[3] Christer Bennewitz. Symmetric relations on a Hilbert space. Pages 212–218. Lecture Notes
|
| 1022 |
+
in Math., Vol. 280, 1972.
|
| 1023 |
+
[4] Kevin Campbell, Minh Nguyen, and Rudi Weikard. On the spectral theory for first-order
|
| 1024 |
+
systems without the unique continuation property. Linear Multilinear Algebra, 69(12):2315–
|
| 1025 |
+
2323, 2021. Published online: 04 Oct 2019.
|
| 1026 |
+
[5] Jonathan Eckhardt, Fritz Gesztesy, Roger Nichols, and Gerald Teschl. Weyl-Titchmarsh the-
|
| 1027 |
+
ory for Sturm-Liouville operators with distributional potentials. Opuscula Math., 33(3):467–
|
| 1028 |
+
563, 2013.
|
| 1029 |
+
[6] Jonathan Eckhardt and Gerald Teschl. Sturm-Liouville operators with measure-valued coef-
|
| 1030 |
+
ficients. J. Anal. Math., 120:151–224, 2013.
|
| 1031 |
+
|
| 1032 |
+
GREEN’S FUNCTIONS
|
| 1033 |
+
17
|
| 1034 |
+
[7] Ahmed Ghatasheh and Rudi Weikard. Spectral theory for systems of ordinary differential
|
| 1035 |
+
equations with distributional coefficients. J. Differential Equations, 268(6):2752–2801, 2020.
|
| 1036 |
+
[8] M. G. Kre˘ın. On a generalization of investigations of Stieltjes. Doklady Akad. Nauk SSSR
|
| 1037 |
+
(N.S.), 87:881–884, 1952.
|
| 1038 |
+
[9] Bruce Call Orcutt. Canonical differential equations. PhD thesis, University of Virginia, 1969.
|
| 1039 |
+
[10] A. M. Savchuk and A. A. Shkalikov. Sturm-Liouville operators with singular potentials. Math-
|
| 1040 |
+
ematical Notes, 66(6):741–753, 1999. Translated from Mat. Zametki, Vol. 66, pp. 897–912
|
| 1041 |
+
(1999).
|
| 1042 |
+
[11] Anton Zettl. Sturm-Liouville theory, volume 121 of Mathematical Surveys and Monographs.
|
| 1043 |
+
American Mathematical Society, Providence, RI, 2005.
|
| 1044 |
+
Department of Mathematics, University of Alabama at Birmingham, Birmingham, AL
|
| 1045 |
+
35226-1170, USA
|
| 1046 |
+
Email address: [email protected], [email protected]
|
| 1047 |
+
|
4tE1T4oBgHgl3EQf6QWC/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
7dE4T4oBgHgl3EQf2Q2c/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
7dE4T4oBgHgl3EQf2Q2c/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:be8a5013faccdd81061f3c8f73f926d2610b93bff75439220031b3032a7c9b77
|
| 3 |
+
size 111673
|
89FST4oBgHgl3EQfajh_/content/tmp_files/2301.13796v1.pdf.txt
ADDED
|
@@ -0,0 +1,1672 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
1
|
| 2 |
+
Scalable Grid-Aware Dynamic Matching using
|
| 3 |
+
Deep Reinforcement Learning
|
| 4 |
+
Majid Majidi Student Member, IEEE, Deepan Muthirayan Member, IEEE, Masood Parvania Senior Member,
|
| 5 |
+
IEEE, Pramod P. Khargonekar Fellow, IEEE
|
| 6 |
+
Abstract—This paper proposes a two-level hierarchical match-
|
| 7 |
+
ing framework for Integrated Hybrid Resources (IHRs) with grid
|
| 8 |
+
constraints. An IHR is a collection of Renewable Energy Sources
|
| 9 |
+
(RES) and flexible customers within a certain power system zone,
|
| 10 |
+
endowed with an agent to match. The key idea is to pick the
|
| 11 |
+
IHR zones so that the power loss effects within the IHRs can
|
| 12 |
+
be neglected. This simplifies the overall matching problem into
|
| 13 |
+
independent IHR-level matching problems, and an upper-level
|
| 14 |
+
optimal power flow problem to meet the IHR-level upstream
|
| 15 |
+
flow requirements while respecting the grid constraints. Within
|
| 16 |
+
each IHR, the agent employs a scalable Deep Reinforcement
|
| 17 |
+
Learning algorithm to identify matching solutions such that
|
| 18 |
+
the customer’s service constraints are met. The central agent
|
| 19 |
+
then solves an optimal power flow problem with the IHRs as
|
| 20 |
+
the nodes, with their active power flow and reactive power
|
| 21 |
+
limits, and grid constraints to determine the final flows such
|
| 22 |
+
that matched power can be delivered to the extent the grid
|
| 23 |
+
constraints are satisfied. The proposed framework is implemented
|
| 24 |
+
on a test power distribution system, and multiple case studies are
|
| 25 |
+
presented to substantiate the welfare efficiency of the proposed
|
| 26 |
+
solution and the satisfaction of the grid and customers’ servicing
|
| 27 |
+
constraints.
|
| 28 |
+
Index Terms—Hierarchical dynamic matching, integrated hy-
|
| 29 |
+
brid resources, deep reinforcement learning, uncertainty.
|
| 30 |
+
I. INTRODUCTION
|
| 31 |
+
D
|
| 32 |
+
RIVEN by the advances in communication technologies
|
| 33 |
+
and supporting policies, Distributed Energy Resources
|
| 34 |
+
(DERs) and flexible loads are going to be highly penetrated in
|
| 35 |
+
power grids. Federal Energy Regulatory Commission (FERC)
|
| 36 |
+
order 2222 requires power system operators to facilitate the
|
| 37 |
+
participation of demand-side resources in the electricity mar-
|
| 38 |
+
kets, reflecting their significant potential to provide energy
|
| 39 |
+
flexibility [1]. The DERs and flexible loads, if coordinated and
|
| 40 |
+
controlled carefully, can make the grid flexible and energy-
|
| 41 |
+
efficient [2], [3]. However, a large number of DERs and
|
| 42 |
+
flexible loads might challenge the structure and capacity of
|
| 43 |
+
power distribution grids. Hence, it is essential to develop
|
| 44 |
+
intelligent energy management solutions that can manage
|
| 45 |
+
different sorts of DERs and flexible loads in a scalable manner
|
| 46 |
+
without compromising the power grid’s stability.
|
| 47 |
+
In recent years, several efforts have been made to develop
|
| 48 |
+
energy management solutions for the coordination of DERs
|
| 49 |
+
in power distribution systems. One promising solution is
|
| 50 |
+
This work is supported in part by the National Science Foundation under
|
| 51 |
+
Grant ECCS-1839429.
|
| 52 |
+
M. Majidi, and M. Parvania are with the Department of Electrical and
|
| 53 |
+
Computer Engineering, the University of Utah, Salt Lake City, UT 84112 USA
|
| 54 |
+
(e-mails: {majid.majidi, masood.parvania,}@utah.edu). Deepan Muthirayan
|
| 55 |
+
and Pramod P. Khargonekar are with the Department of Electrical Engineering
|
| 56 |
+
and Computer Science, University of California, Irvine, CA 92697 USA (e-
|
| 57 |
+
mails: {deepan.m, pramod.khargonekar,}@uci.edu).
|
| 58 |
+
matching, which is a Peer-to-Peer (P2P) solution. Unlike
|
| 59 |
+
traditional energy management solutions based on pooling re-
|
| 60 |
+
sources, matching offers optimal use of energy flexibility while
|
| 61 |
+
accounting for the energy preferences of flexible customers.
|
| 62 |
+
This is the key feature that makes matching very promising to
|
| 63 |
+
future power grids. However, developing a matching solution
|
| 64 |
+
for power grids still has several challenges: (i) the solution
|
| 65 |
+
has to be online and capable of adapting the matching strategy
|
| 66 |
+
with the state of the whole grid, (ii) it has to cope with a large
|
| 67 |
+
number of DERs and flexible loads, and (iii) it has to satisfy
|
| 68 |
+
the security constraints of the grid. Although [4], [5] propose
|
| 69 |
+
online solutions for dynamic matching, the proposed solutions
|
| 70 |
+
are heuristics and therefore can be sub-optimal. Alternatively,
|
| 71 |
+
data-driven approaches like Reinforcement Learning (RL) can
|
| 72 |
+
be used to discover high-performing dynamic matching poli-
|
| 73 |
+
cies. However, RL approaches have severe limitations when
|
| 74 |
+
it comes to learning policies for power grids with constraints
|
| 75 |
+
such as power flow limits. For instance, [6] proposes a Deep
|
| 76 |
+
Reinforcement Learning (DRL) solution for dynamic matching
|
| 77 |
+
but it fails to account for the grid constraints. Moreover, a
|
| 78 |
+
central matching structure might not be efficient or feasible
|
| 79 |
+
for managing a large number of DERs and flexible loads in
|
| 80 |
+
the power grid. Hence, an efficient learning-based hierarchical
|
| 81 |
+
matching model with Integrated Hybrid Resources (IHRs) is of
|
| 82 |
+
interest in addressing dynamic matching in power grids with
|
| 83 |
+
grid constraints.
|
| 84 |
+
IHRs present a viable solution to facilitate efficient energy
|
| 85 |
+
management and control of uncertain DERs in various appli-
|
| 86 |
+
cations [7]–[10]. In a power grid, different types of renewable
|
| 87 |
+
and non-renewable DERs and flexible can be combined and
|
| 88 |
+
operated as an IHR to supply distributed energy flexibility.
|
| 89 |
+
The key feature of an IHR is that the resources within the IHR
|
| 90 |
+
can be treated as an integrated set of resources with a single
|
| 91 |
+
interconnection point. Therefore, from a matching solution
|
| 92 |
+
point of view, each IHR can be treated as a separate matching
|
| 93 |
+
market with a single interconnection to the distribution grid.
|
| 94 |
+
This then enables the use of an RL-type algorithm to determine
|
| 95 |
+
the optimal way to manage the DERs within each IHR,
|
| 96 |
+
where the RL solution does not need to take into account
|
| 97 |
+
the grid constraints. Once the IHR-level matching results are
|
| 98 |
+
determined, a central controller can re-dispatch the IHRs using
|
| 99 |
+
a reduced-dimension Optimal Power Flow (OPF) model with
|
| 100 |
+
each IHR as a node to balance the excesses while ensuring that
|
| 101 |
+
the grid constraints across the distribution system are satisfied.
|
| 102 |
+
This paper proposes a hierarchical framework for dynamic
|
| 103 |
+
matching markets in power distribution systems composed of
|
| 104 |
+
IHRs. The schematic of the proposed framework is shown
|
| 105 |
+
in Fig. 1. An IHR consists of an agent that employs DRL
|
| 106 |
+
arXiv:2301.13796v1 [eess.SY] 31 Jan 2023
|
| 107 |
+
|
| 108 |
+
2
|
| 109 |
+
to locally match the distributed Renewable Energy Sources
|
| 110 |
+
(RES) and flexible customers in each IHR while satisfying
|
| 111 |
+
the quality of service constraints of customers, i.e., critical-
|
| 112 |
+
ity, servicing deadline, etc. Such a learning-based approach
|
| 113 |
+
allows for developing a very effective online matching pol-
|
| 114 |
+
icy, which is otherwise very difficult to design. Once the
|
| 115 |
+
IHR-level matching results are determined, each IHR agent
|
| 116 |
+
communicates the net active power flow (i.e., net active
|
| 117 |
+
power consumption/generation), as well as the reactive power
|
| 118 |
+
limits of the IHR to a central agent. The central agent then
|
| 119 |
+
formulates a reduced-dimension OPF model with the IHRs as
|
| 120 |
+
the nodes to determine the final flows (set-points) such that
|
| 121 |
+
the grid constraints are met. In this stage, the central agent
|
| 122 |
+
can curtail the IHR-level matching decisions and control the
|
| 123 |
+
reactive power flow from/into each IHR in order to make sure
|
| 124 |
+
that power flows in the grid and voltage levels across the
|
| 125 |
+
distribution nodes are not violated.
|
| 126 |
+
A. Related Works and Contributions
|
| 127 |
+
Several works in the literature have explored the control
|
| 128 |
+
and management of DERs in distribution systems. P2P energy
|
| 129 |
+
trading markets of different types are developed in [11]–
|
| 130 |
+
[20]. The authors in [12] studied the operation and benefits
|
| 131 |
+
of centralized and decentralized battery energy storage under
|
| 132 |
+
different P2P market designs. A P2P market design based
|
| 133 |
+
on bilateral contracts is proposed in [13] for energy trading
|
| 134 |
+
between multiple DERs and flexible loads, with the objective
|
| 135 |
+
of minimizing peak load in the low-voltage power distribution
|
| 136 |
+
system. A decentralized P2P optimization framework is pre-
|
| 137 |
+
sented in [14] to enable local energy sharing between DER
|
| 138 |
+
agents in the low-voltage distribution systems. A local energy
|
| 139 |
+
sharing framework is proposed for prosumers in low-voltage
|
| 140 |
+
distribution systems in [15], where the voltage regulation capa-
|
| 141 |
+
bility of the proposed energy sharing framework is highlighted.
|
| 142 |
+
An iterative sequential approach is implemented in [16] to
|
| 143 |
+
enable P2P energy and reserve sharing between prosumers in
|
| 144 |
+
power distribution systems with grid constraints. A negotiation
|
| 145 |
+
algorithm is proposed to facilitate energy sharing between
|
| 146 |
+
interconnected DER owners in [17]. The use of game theory
|
| 147 |
+
to determine the interaction strategy of DERs in P2P energy
|
| 148 |
+
sharing is investigated in [18]–[20].
|
| 149 |
+
The application of data-driven approaches to energy man-
|
| 150 |
+
agement of DERs is studied in [21]–[25]. The authors in [21]
|
| 151 |
+
implemented a multi-agent learning framework to determine
|
| 152 |
+
real-time local energy trading strategies for DER owners in
|
| 153 |
+
regional microgrids. A multi-energy sharing model based on
|
| 154 |
+
RL is proposed in [22], [23] for local heat and power sharing
|
| 155 |
+
in energy microgrids equipped with DERs. In [24], [25], the
|
| 156 |
+
authors proposed a specific price-based market framework for
|
| 157 |
+
coordinating the prosumers in the market to minimize the
|
| 158 |
+
peak load. In [26], a hierarchical energy management model
|
| 159 |
+
based on DRL is proposed for local energy management of
|
| 160 |
+
energy storage systems to improve the resilience of the power
|
| 161 |
+
distribution system.
|
| 162 |
+
Although the works reviewed here study the management
|
| 163 |
+
and coordination of DERs in distribution systems, their P2P
|
| 164 |
+
solutions address specific scenarios, and many do not account
|
| 165 |
+
for the grid constraints. Moreover, the existing hierarchical
|
| 166 |
+
energy management models for DERs in power distribution
|
| 167 |
+
systems neglect the preference and dynamic characteristics
|
| 168 |
+
of the DERs and flexible loads, which impacts the energy
|
| 169 |
+
flexibility available to the grid. In contrast, this paper develops
|
| 170 |
+
a broadly applicable online matching solution that (i) is de-
|
| 171 |
+
signed to maximize the integration of local RES and the overall
|
| 172 |
+
welfare in a very generic real-time operating scenario that can
|
| 173 |
+
be riddled with uncertainties, (ii) takes into consideration the
|
| 174 |
+
flexible loads’ servicing deadline, as well as their dynamic
|
| 175 |
+
criticality, and willingness to pay for a unit of energy, and (iii)
|
| 176 |
+
at the same time accounts for the power grid constraints. The
|
| 177 |
+
key contributions of the paper can be summarized as follows:
|
| 178 |
+
• A hierarchical dynamic matching framework for power
|
| 179 |
+
distribution systems constituted by IHRs.
|
| 180 |
+
• An efficient and scalable learning-based solution to match
|
| 181 |
+
the flexible loads and uncertain RES within each IHR
|
| 182 |
+
with no need for prior experience or expert supervision
|
| 183 |
+
or elaborate design. An independent DRL algorithm for
|
| 184 |
+
each IHR agent that matches the flexible loads and supply
|
| 185 |
+
sources to improve the utilization of RES and therefore
|
| 186 |
+
maximize the social welfare in each IHR such that the
|
| 187 |
+
quality of service constraints of the loads are satisfied
|
| 188 |
+
prior to their servicing deadline, and their dynamic will-
|
| 189 |
+
ingness to pay for a unit of energy is taken into account.
|
| 190 |
+
• An upper-level optimization model to fix the excesses or
|
| 191 |
+
imbalances within the IHRs. Once the matching results in
|
| 192 |
+
each IHR are determined, a central agent runs a reduced-
|
| 193 |
+
dimension OPF problem to fix the possible imbalances
|
| 194 |
+
within the IHRs and, at the same time, ensures the
|
| 195 |
+
power flow limits and voltage security constraints of the
|
| 196 |
+
distribution system are met.
|
| 197 |
+
The remaining of the paper is categorized as follows: Hi-
|
| 198 |
+
erarchical matching market framework is presented in Section
|
| 199 |
+
II. The proposed learning-based solution approach is explained
|
| 200 |
+
in Section III. The simulation results are presented in Section
|
| 201 |
+
IV, and the paper is concluded in Section V.
|
| 202 |
+
II. HIERARCHICAL MATCHING MARKET
|
| 203 |
+
The proposed hierarchical matching framework is composed
|
| 204 |
+
of (i) a market operator or central agent, and (ii) multiple
|
| 205 |
+
IHRs, with each IHR operating as a separate matching market
|
| 206 |
+
and the central agent acting as the coordinating agent between
|
| 207 |
+
the IHRs. In the proposed framework, the grid is divided into
|
| 208 |
+
multiple IHRs, where each IHR is an integrated unit of several
|
| 209 |
+
types of DERs that are treated as a single resource with a single
|
| 210 |
+
interconnection point to the grid. This is feasible to do when
|
| 211 |
+
the region of the grid representing the IHR is such that the
|
| 212 |
+
voltage variation within each IHR is within a small δ as [26]:
|
| 213 |
+
|Vit − Vjt| < δ,
|
| 214 |
+
∀t, ∀b, b′, ∈ Bh, ∀h ∈ H,
|
| 215 |
+
(1)
|
| 216 |
+
where H is the set of all IHRs and b, b′, ∈ Bh represent any
|
| 217 |
+
pair of buses in IHR h ∈ H. Hence, each IHR is treated as a
|
| 218 |
+
regular matching market with no power flow constraints, and
|
| 219 |
+
the rest of the grid as the upstream supply source, to balance
|
| 220 |
+
any imbalances or excesses in the IHRs.
|
| 221 |
+
|
| 222 |
+
3
|
| 223 |
+
IHR Agent
|
| 224 |
+
Matching
|
| 225 |
+
Policy
|
| 226 |
+
Matching
|
| 227 |
+
Policy
|
| 228 |
+
Matching Market
|
| 229 |
+
Constraints
|
| 230 |
+
Supply-Demand Balance
|
| 231 |
+
RES Generation Availability
|
| 232 |
+
Objective
|
| 233 |
+
Maximize Social Welfare
|
| 234 |
+
Customers Deadline
|
| 235 |
+
IHR Matching Problem
|
| 236 |
+
Active Customers
|
| 237 |
+
RES Availability
|
| 238 |
+
Customers Criticality
|
| 239 |
+
Wait
|
| 240 |
+
State
|
| 241 |
+
Match
|
| 242 |
+
Action
|
| 243 |
+
Match
|
| 244 |
+
Reward
|
| 245 |
+
Social Welfare
|
| 246 |
+
Constraints
|
| 247 |
+
Optimal Power Flow
|
| 248 |
+
Integrated Hybrid Resource
|
| 249 |
+
Objective
|
| 250 |
+
Minimize System Energy Cost
|
| 251 |
+
System-Level Power Flow Constraints
|
| 252 |
+
- Net Active Power
|
| 253 |
+
- Min & Max Reactive Power Capacity
|
| 254 |
+
Fixed Mismatches
|
| 255 |
+
Fig. 1. Structure of hierarchical dynamic matching model in power distribu-
|
| 256 |
+
tion systems using deep reinforcement learning.
|
| 257 |
+
The matching market within each IHR is an online market,
|
| 258 |
+
with customers and RES that are characterized by uncertain
|
| 259 |
+
arrivals and generation over time. In the proposed model,
|
| 260 |
+
each IHR is endowed with an agent which can adapt its
|
| 261 |
+
decision according to the state of the local IHR market, which
|
| 262 |
+
includes the history of customers and renewable generation.
|
| 263 |
+
This ensures that the decisions can be optimized with respect
|
| 264 |
+
to the underlying state and the expected future conditioned
|
| 265 |
+
on the current state. But, such state-dependent solutions are
|
| 266 |
+
difficult to characterize for an online market. Alternatively,
|
| 267 |
+
data-driven approaches like RL can be used to derive state-
|
| 268 |
+
dependent solutions for systems like electricity markets, which
|
| 269 |
+
are dynamic and uncertain. Given this, the IHR agents are
|
| 270 |
+
endowed with DRL algorithms to discover state-dependent
|
| 271 |
+
matching policies from their respective operational data.
|
| 272 |
+
The design of a DRL model for a matching market has many
|
| 273 |
+
practical limitations like scalability because of the size of the
|
| 274 |
+
action space, which can grow exponentially with the number
|
| 275 |
+
of customers, in addition to the servicing constraints that the
|
| 276 |
+
matching outputs from the DRL model are required to satisfy.
|
| 277 |
+
In this study, the scalable DRL-based solution proposed in
|
| 278 |
+
our prior work [6] is adopted as the DRL model for each
|
| 279 |
+
of the IHRs. This model is designed specifically to address
|
| 280 |
+
the scalability and convergence of DRL applied to matching
|
| 281 |
+
markets. The DRL model is discussed in the next section.
|
| 282 |
+
The central agent plays the role of managing the whole
|
| 283 |
+
grid, coordinating the upstream demand of the IHRs such
|
| 284 |
+
that the grid constraints are satisfied. At any moment, after
|
| 285 |
+
the IHR-level matching decisions are determined, the IHR
|
| 286 |
+
agents send their net active power and reactive power limits
|
| 287 |
+
to the central agent. The central agent then solves a reduced-
|
| 288 |
+
dimension OPF problem with IHR as the nodes to compute the
|
| 289 |
+
active and reactive power flows for the nodes such that the grid
|
| 290 |
+
constraints (i.e., overall power flow constraints and voltage
|
| 291 |
+
boundary limits derived from (1) are met. The voltage bound-
|
| 292 |
+
ary constraints ensure that the condition in (1) is satisfied,
|
| 293 |
+
and therefore the matched power is delivered without much
|
| 294 |
+
loss. The inclusion of the power flow constraints ensures that
|
| 295 |
+
the overall flow delivers the matched power to the extent the
|
| 296 |
+
constraints can be satisfied. Now, a single centralized market
|
| 297 |
+
can perform matching, and be adaptable to the changing
|
| 298 |
+
market condition, but it is typically hard to compute a solution
|
| 299 |
+
with DRL that satisfies stability constraints, i.e., power flow
|
| 300 |
+
constraints. This is the key benefit of the proposed hierarchical
|
| 301 |
+
approach, which uses DRL to identify state-dependent policies
|
| 302 |
+
and optimization to ensure the feasibility of the policies for
|
| 303 |
+
grid operation. The rest of the section describes the supply
|
| 304 |
+
and customer models, the market state, the matching market
|
| 305 |
+
formulation, and finally the IHR-level matching and upper-
|
| 306 |
+
level OPF problems.
|
| 307 |
+
A. Supply Model
|
| 308 |
+
Lets denote the time within a day by t. The matching market
|
| 309 |
+
comprises two sources of supply: 1) grid supply (type g),
|
| 310 |
+
which it can be drawn from its interconnection to the grid
|
| 311 |
+
and 2) RES (type s). The upstream grid supply at a time t,
|
| 312 |
+
denoted by gt ∈ R, is priced at the retail price of electricity,
|
| 313 |
+
c/kWh, while the unit cost of RES generation, rt ∈ R, is
|
| 314 |
+
assumed to be zero.
|
| 315 |
+
B. Flexible Customer Model
|
| 316 |
+
Each customer (or load) is characterized by three param-
|
| 317 |
+
eters, {ai, pi, di}, where ai ∈ N is the arrival time of the
|
| 318 |
+
customer, pi ∈ R is the load requested by the customer, and
|
| 319 |
+
di ∈ N is the servicing deadline by which the customer is
|
| 320 |
+
to be served. Moreover, each customer has a criticality rate
|
| 321 |
+
bi, at which its willingness to pay decreases from ai until di.
|
| 322 |
+
The heterogeneity of customers lies in the differing deadlines
|
| 323 |
+
and their criticality. Hence, the utility function of customer i
|
| 324 |
+
representing its willingness to pay for a unit of energy can be
|
| 325 |
+
defined as follows:
|
| 326 |
+
πi
|
| 327 |
+
t = c − bi(t − ai),
|
| 328 |
+
πi
|
| 329 |
+
t ≥ 0, ai ≤ t ≤ di,
|
| 330 |
+
bi = ϕc/(di − ai),
|
| 331 |
+
(2)
|
| 332 |
+
where ϕ ∈ [0, 1] determines the reduction rate in customers’
|
| 333 |
+
willingness to pay for a unit of energy. The utility function
|
| 334 |
+
for different values of criticality rate is shown in Fig. 2. In
|
| 335 |
+
addition to the flexible customers, the market can also have
|
| 336 |
+
non-flexible loads.
|
| 337 |
+
In Fig. 2, customer’s willingness to pay is less than or equal
|
| 338 |
+
to the grid supply price c/kWh. This is reasonable considering
|
| 339 |
+
that the grid supply is available at this price at all times. A
|
| 340 |
+
customer with ϕ = 1 will only be willing to pay zero if it
|
| 341 |
+
is served at its deadline. On the other hand, a customer with
|
| 342 |
+
ϕ = 0 can be served at any time without any change to the
|
| 343 |
+
|
| 344 |
+
4
|
| 345 |
+
πt
|
| 346 |
+
t
|
| 347 |
+
b > 0
|
| 348 |
+
a
|
| 349 |
+
d
|
| 350 |
+
c
|
| 351 |
+
πt
|
| 352 |
+
t
|
| 353 |
+
b = 0
|
| 354 |
+
a
|
| 355 |
+
d
|
| 356 |
+
c
|
| 357 |
+
flexible load c at bus i in time t, the state equation of queuing
|
| 358 |
+
system can be expressed as:
|
| 359 |
+
˙Qc
|
| 360 |
+
t,i = Ac
|
| 361 |
+
t,i − P c
|
| 362 |
+
t,i
|
| 363 |
+
(4)
|
| 364 |
+
Qc
|
| 365 |
+
t,i = Qc
|
| 366 |
+
t−∆t,i +
|
| 367 |
+
�
|
| 368 |
+
Ac
|
| 369 |
+
t,i − P c
|
| 370 |
+
t,i
|
| 371 |
+
�
|
| 372 |
+
∆t
|
| 373 |
+
(5)
|
| 374 |
+
According to the state equations expressed in In (4)-(5), the
|
| 375 |
+
flexible load queue backlog in each time interval t is equal to
|
| 376 |
+
customer i at time k by qj (k). Then, the function χk is given
|
| 377 |
+
by
|
| 378 |
+
χk(j, i, Z) = qi
|
| 379 |
+
j(k), χk(j, st, Z) = qst
|
| 380 |
+
j (k)
|
| 381 |
+
(8)
|
| 382 |
+
Given these definitions, the matching problem for the distri-
|
| 383 |
+
bution system is given by the following optimization problem
|
| 384 |
+
Fig. 2. Illustration of utility function for different values of b.
|
| 385 |
+
willingness to pay. This model captures a variety of customers
|
| 386 |
+
in the market, where customers’ willingness to pay can remain
|
| 387 |
+
fixed or decay with time and at distinct rates. As the number
|
| 388 |
+
of customers is finite in real markets, the number of customers
|
| 389 |
+
arriving on the platform at any time t, nt ∈ N, is assumed to
|
| 390 |
+
be upper bound by a constant n.
|
| 391 |
+
C. IHR Market State
|
| 392 |
+
Let zt
|
| 393 |
+
:=
|
| 394 |
+
[a⊤
|
| 395 |
+
t , p⊤
|
| 396 |
+
t , b⊤
|
| 397 |
+
t , d⊤
|
| 398 |
+
t , rt]1 be the vector of state
|
| 399 |
+
parameters, where at ∈ Nn is the vector of the arrival times of
|
| 400 |
+
the customers which arrive at time t, pt ∈ Nn is the vector of
|
| 401 |
+
their respective requested loads, bt ∈ [0, 1] is the criticality rate
|
| 402 |
+
of customer at time t, dt ∈ Nn is the vector of their respective
|
| 403 |
+
deadlines, and rt ∈ R is the amount of RES generation at time
|
| 404 |
+
t. The scenario at time t is given by
|
| 405 |
+
Z⊤
|
| 406 |
+
t = [z⊤
|
| 407 |
+
1 , z⊤
|
| 408 |
+
2 , ..., z⊤
|
| 409 |
+
t−1, z⊤
|
| 410 |
+
t ].
|
| 411 |
+
The probability that zt = z is given by the stochastic process
|
| 412 |
+
modeled by P (zt = z|Zt−1). This process is not known to
|
| 413 |
+
the market operator. Let xt := [a⊤
|
| 414 |
+
t , p⊤
|
| 415 |
+
t , b⊤
|
| 416 |
+
t , d⊤
|
| 417 |
+
t , p⊤
|
| 418 |
+
u,t, b⊤
|
| 419 |
+
u,t, rt],
|
| 420 |
+
where pu,t denotes the vector of the portion of the requested
|
| 421 |
+
load that has not been served to the customers who arrived at
|
| 422 |
+
t and expressed the criticality b⊤
|
| 423 |
+
u,t. Let denote the set of all
|
| 424 |
+
possible states at time t by Ωt and the state of the market by
|
| 425 |
+
Xt. Then Xt is given by
|
| 426 |
+
X⊤
|
| 427 |
+
t = [x⊤
|
| 428 |
+
1 , x���
|
| 429 |
+
2 , ..., x⊤
|
| 430 |
+
t−1, x⊤
|
| 431 |
+
t ].
|
| 432 |
+
Note that the state Xt depends on the scenario Zt and the
|
| 433 |
+
matching decisions till time t − 1. Given that the state of the
|
| 434 |
+
market evolves, the matching solution will have to be able to
|
| 435 |
+
adapt to the changing market state.
|
| 436 |
+
D. Matching Market for Integrated Hybrid Resources
|
| 437 |
+
This part formulates the IHR-level dynamic matching mar-
|
| 438 |
+
ket problem for a duration of T, divided into time periods
|
| 439 |
+
spaced equally at an interval ∆t. The IHR-level dynamic
|
| 440 |
+
matching market problem aims to match the load request
|
| 441 |
+
of flexible and inflexible customers to maximize the social
|
| 442 |
+
welfare in IHR h subject to satisfying the supply-demand
|
| 443 |
+
balance constraint for non-flexible loads and the quality of
|
| 444 |
+
service constraints for flexible loads arriving sequentially. Let
|
| 445 |
+
define Ah,t as the set of all active customers at time t and IHR
|
| 446 |
+
h and define Sh,t = {g, s} as the set of supply types. The IHR
|
| 447 |
+
agent, at each time, can decide to match and supply or skip the
|
| 448 |
+
load requests. Let define pi
|
| 449 |
+
h,t as the skipped and unsupplied
|
| 450 |
+
1[.]⊤ denotes the transpose operation.
|
| 451 |
+
load request of the customer i and Mh,t(j, i, Xt) ∈ R define
|
| 452 |
+
the amount of supply of type j matched to customer i at time
|
| 453 |
+
t and IHR h, at the unit cost of ch,t. The matching market
|
| 454 |
+
problem can be then stated as:
|
| 455 |
+
sup
|
| 456 |
+
T
|
| 457 |
+
�
|
| 458 |
+
t=1
|
| 459 |
+
�
|
| 460 |
+
i∈Ah,t
|
| 461 |
+
�
|
| 462 |
+
j∈Sh,t
|
| 463 |
+
(πi
|
| 464 |
+
h,t − ch,j)Mh,t(j, i, Xt), s.t.
|
| 465 |
+
(3)
|
| 466 |
+
�
|
| 467 |
+
j∈Sh,t
|
| 468 |
+
Mh,t(j, i, Xt) ≤ pi
|
| 469 |
+
h,t, ∀h ∈ H, ∀i ∈ Ah
|
| 470 |
+
t , t ̸= di
|
| 471 |
+
h,
|
| 472 |
+
(4)
|
| 473 |
+
�
|
| 474 |
+
j∈Sh,t
|
| 475 |
+
Mh,t(j, i, Xt) = pi
|
| 476 |
+
h,t, ∀h ∈ H, ∀i ∈ Ah,t, t = di
|
| 477 |
+
h, (5)
|
| 478 |
+
�
|
| 479 |
+
i∈Ah,t
|
| 480 |
+
Mh,t(r, i, Xt) ≤ rp
|
| 481 |
+
h,t, ∀h ∈ H, ∀t.
|
| 482 |
+
(6)
|
| 483 |
+
pNet
|
| 484 |
+
h,t =
|
| 485 |
+
�
|
| 486 |
+
i∈Ah,t
|
| 487 |
+
Mh,t(g, i, Xt), ∀h ∈ H, ∀t,
|
| 488 |
+
(7)
|
| 489 |
+
where the dependency of Mt on Xt accounts for the depen-
|
| 490 |
+
dency of the matching decision on the full state information in
|
| 491 |
+
each IHR. Here, the power balance constraint for the flexible
|
| 492 |
+
loads is given in (4). The power balance for the non-flexible
|
| 493 |
+
loads and the critical flexible loads at their departure (t=di
|
| 494 |
+
h)
|
| 495 |
+
is given in (5). The constraint (6) limits the matching power
|
| 496 |
+
from RES to the active power output of RES rp
|
| 497 |
+
h,t. Finally,
|
| 498 |
+
the net active power flow exchanged between the IHR and
|
| 499 |
+
upstream grid, pNet
|
| 500 |
+
h,t , is given by (7).
|
| 501 |
+
The output of the above problem is a matching policy M1:T
|
| 502 |
+
for the entire duration of a day. Because of the interdependence
|
| 503 |
+
across time, the optimal policy Mt is dependent on the load
|
| 504 |
+
arrivals and RES generation for the full day. This makes
|
| 505 |
+
the computation of the optimal policy through the above
|
| 506 |
+
approach infeasible in real-time operation. There are also no
|
| 507 |
+
known explicit characterizations for Mt. This is what makes
|
| 508 |
+
approaches like DRL very appealing, since they are general-
|
| 509 |
+
purpose methods that can be used to discover state-dependent
|
| 510 |
+
policies, such as Mt, from just operational data. Therefore, we
|
| 511 |
+
use a DRL algorithm to compute the matching decisions. The
|
| 512 |
+
proposed DRL model for a specific IHR is designed to output
|
| 513 |
+
a matching decision at any point of time depending on the
|
| 514 |
+
market state of the IHR. The DRL framework for the IHRs
|
| 515 |
+
matching is described in the next section.
|
| 516 |
+
Once the matching decisions are computed by the IHRs,
|
| 517 |
+
the agent determines the net active power flow, i.e., the active
|
| 518 |
+
power to be taken or injected from and to the upstream grid,
|
| 519 |
+
as well as the reactive power limits of its zone to the central
|
| 520 |
+
agent. The reactive power limits are utilized by the central
|
| 521 |
+
agent to adjust the nodal reactive power demands such that
|
| 522 |
+
the constraint (1) is satisfied. The reactive power limits for
|
| 523 |
+
each IHR, denoted by qNet
|
| 524 |
+
h,t
|
| 525 |
+
and qNet
|
| 526 |
+
h,t , are obtained through
|
| 527 |
+
(8)-(10):
|
| 528 |
+
rq
|
| 529 |
+
h,t=−
|
| 530 |
+
�
|
| 531 |
+
rs
|
| 532 |
+
h,t
|
| 533 |
+
2−rp
|
| 534 |
+
h,t
|
| 535 |
+
2 ,
|
| 536 |
+
rq
|
| 537 |
+
h,t=
|
| 538 |
+
�
|
| 539 |
+
rs
|
| 540 |
+
h,t
|
| 541 |
+
2−rp
|
| 542 |
+
h,t
|
| 543 |
+
2, ∀h∈H,∀t, (8)
|
| 544 |
+
qNet
|
| 545 |
+
h,t =
|
| 546 |
+
�
|
| 547 |
+
i∈Ah,t
|
| 548 |
+
qi
|
| 549 |
+
h,t − rq
|
| 550 |
+
h,t,
|
| 551 |
+
∀h ∈ H, ∀t,
|
| 552 |
+
(9)
|
| 553 |
+
qNet
|
| 554 |
+
h,t =
|
| 555 |
+
�
|
| 556 |
+
i∈Ah,t
|
| 557 |
+
qi,
|
| 558 |
+
h,t − rq
|
| 559 |
+
h,t,
|
| 560 |
+
∀h ∈ H, ∀t,
|
| 561 |
+
(10)
|
| 562 |
+
|
| 563 |
+
5
|
| 564 |
+
where rq
|
| 565 |
+
h,t, rq
|
| 566 |
+
h,t are the minimum and maximum reactive
|
| 567 |
+
power output of RES, rs
|
| 568 |
+
h,t is the available RES generation and
|
| 569 |
+
the term qi
|
| 570 |
+
h,t represents the reactive power load of the IHR,
|
| 571 |
+
determined based on the non-flexible reactive power load and
|
| 572 |
+
matched power to flexible loads.
|
| 573 |
+
E. Reduced-Dimension Optimal Power Flow
|
| 574 |
+
This section describes the reduced-dimension OPF problem
|
| 575 |
+
solved by the central agent to determine the final flows for the
|
| 576 |
+
nodes in the network to deliver the matched power to the extent
|
| 577 |
+
it does not violate the grid constraints. The agent specifically
|
| 578 |
+
solves a quadratic optimization model with the IHRs as the
|
| 579 |
+
nodes, where the constraints are the power flow constraints
|
| 580 |
+
with the active power flow demand and reactive power limits
|
| 581 |
+
of the IHRs, and the voltage limit constraints, defined based on
|
| 582 |
+
(1). The voltage limit constraints ensure that the final flows are
|
| 583 |
+
consistent with the matched power in each of the IHRs. The
|
| 584 |
+
central agent also curtails the active power flow demand by ph
|
| 585 |
+
C
|
| 586 |
+
to the extent that the flow constraints are satisfied. The central
|
| 587 |
+
agent’s objective function, which is the distribution system
|
| 588 |
+
cost, is given in (11):
|
| 589 |
+
min
|
| 590 |
+
�
|
| 591 |
+
λRT P G−
|
| 592 |
+
H
|
| 593 |
+
�
|
| 594 |
+
h=1
|
| 595 |
+
λCpC
|
| 596 |
+
h
|
| 597 |
+
�
|
| 598 |
+
,
|
| 599 |
+
(11)
|
| 600 |
+
where P G is the active power taken from the transmission
|
| 601 |
+
system at the real-time market price λRT and pC
|
| 602 |
+
h is the active
|
| 603 |
+
load request curtailment with the unit cost of λC.
|
| 604 |
+
1) Power Balance Constraints: The active and reactive
|
| 605 |
+
energy balance equations for the slack buses in the distribution
|
| 606 |
+
system are given in (12)-(13), where P1h, Q1h are the active
|
| 607 |
+
and reactive power flows from the substation bus to the IHR
|
| 608 |
+
h, V sq
|
| 609 |
+
1
|
| 610 |
+
is the squared voltage on the substation bus, g1, b1 are
|
| 611 |
+
the shunt conductance and susceptance at the substation bus
|
| 612 |
+
and L is the set of lines in the distribution grid.
|
| 613 |
+
P G =
|
| 614 |
+
�
|
| 615 |
+
1h∈L
|
| 616 |
+
P1h + g1V sq
|
| 617 |
+
1 ,
|
| 618 |
+
(12)
|
| 619 |
+
QG =
|
| 620 |
+
�
|
| 621 |
+
1h∈L
|
| 622 |
+
Q1h + b1V sq
|
| 623 |
+
1 .
|
| 624 |
+
(13)
|
| 625 |
+
The energy balance constraints for the IHR nodes are
|
| 626 |
+
presented in (14)-(15), where pNet
|
| 627 |
+
h
|
| 628 |
+
is the net active power
|
| 629 |
+
flow submitted by the IHR, Phh′′, Ph′h and Qhh′′, Qh′h are
|
| 630 |
+
the active and reactive power flows in lines hh′′ and h′h, V sq
|
| 631 |
+
h
|
| 632 |
+
is the squared voltage on IHR node h, Isq
|
| 633 |
+
h′h is the squared
|
| 634 |
+
current flow in line h′h, and rh′h, xh′h are the resistance and
|
| 635 |
+
reactance of the line h′h and gh, bh are the shunt conductance
|
| 636 |
+
and susceptance at the IHR node h. In the active power balance
|
| 637 |
+
constraint, the curtailment pC
|
| 638 |
+
h ensures that the final net active
|
| 639 |
+
power flow is consistent with the power flow constraints. Here,
|
| 640 |
+
the curtailment is only made to the extent that the constraints
|
| 641 |
+
are satisfied. The reactive power flow of the IHRs, denoted by
|
| 642 |
+
qNet
|
| 643 |
+
h
|
| 644 |
+
, is limited to the reactive power limits of IHRs in (16).
|
| 645 |
+
Phh′′ +pNet
|
| 646 |
+
h
|
| 647 |
+
−pC
|
| 648 |
+
h =
|
| 649 |
+
�
|
| 650 |
+
h′h∈L
|
| 651 |
+
(Ph′h−rh′hIsq
|
| 652 |
+
h′h)+ghV sq
|
| 653 |
+
h , ∀h∈B, (14)
|
| 654 |
+
Qhh′′ + qNet
|
| 655 |
+
h
|
| 656 |
+
=
|
| 657 |
+
�
|
| 658 |
+
h′h∈L
|
| 659 |
+
(Qh′h− xh′hIsq
|
| 660 |
+
h′h)+ bhV sq
|
| 661 |
+
h , ∀h ∈ B, (15)
|
| 662 |
+
qNet
|
| 663 |
+
h
|
| 664 |
+
≤ qNet
|
| 665 |
+
h
|
| 666 |
+
≤ qNet
|
| 667 |
+
h
|
| 668 |
+
, ∀h.
|
| 669 |
+
(16)
|
| 670 |
+
2) Voltage and Power Flow Limits: The voltage drop across
|
| 671 |
+
the grid is given by (17). The limits on the squared voltage
|
| 672 |
+
level and the limits on the current flow are given in Eq. (18)
|
| 673 |
+
and Eq. (19), where V sq
|
| 674 |
+
h , V
|
| 675 |
+
sq
|
| 676 |
+
h are the minimum and maximum
|
| 677 |
+
squared voltage boundaries, defined based on the nominal node
|
| 678 |
+
voltage and δ in (1) and I
|
| 679 |
+
sq
|
| 680 |
+
h′h is the squared current flow limit.
|
| 681 |
+
Finally, the complex power flow constraint is given in (20).
|
| 682 |
+
V sq
|
| 683 |
+
h − V sq
|
| 684 |
+
h′ = −2 (rh′hPh′h + xh′hQh′h)
|
| 685 |
+
+
|
| 686 |
+
�
|
| 687 |
+
r2
|
| 688 |
+
h′h + x2
|
| 689 |
+
h′h
|
| 690 |
+
�
|
| 691 |
+
Isq
|
| 692 |
+
h′h,
|
| 693 |
+
∀(h′h) ∈ L,
|
| 694 |
+
(17)
|
| 695 |
+
V sq
|
| 696 |
+
h ≤ V sq
|
| 697 |
+
h
|
| 698 |
+
≤ V
|
| 699 |
+
sq
|
| 700 |
+
h ,
|
| 701 |
+
∀h ∈ B,
|
| 702 |
+
(18)
|
| 703 |
+
Isq
|
| 704 |
+
h′h ≤ I
|
| 705 |
+
sq
|
| 706 |
+
h′h,
|
| 707 |
+
∀(h′h) ∈ L,
|
| 708 |
+
(19)
|
| 709 |
+
V sq
|
| 710 |
+
h,tIsq
|
| 711 |
+
h′h ≥ P 2
|
| 712 |
+
h′h + Q2
|
| 713 |
+
h′h,
|
| 714 |
+
∀(h′h) ∈ L.
|
| 715 |
+
(20)
|
| 716 |
+
Any feasible solution to the online OPF problem in (11)-
|
| 717 |
+
(20) ensures the matched power in each of the IHRs is
|
| 718 |
+
delivered to the extent the flow and voltage constraints are
|
| 719 |
+
met. In case a solution is feasible without any curtailment,
|
| 720 |
+
then the matched power will be delivered to the customers.
|
| 721 |
+
III. DEEP REINFORCEMENT LEARNING FOR IHRS
|
| 722 |
+
In the proposed hierarchical framework, each IHR agent
|
| 723 |
+
is endowed with a trainable policy that outputs a probability
|
| 724 |
+
distribution over the set of matching decisions for the flexible
|
| 725 |
+
loads and RES with the IHR. A policy gradient RL algorithm
|
| 726 |
+
is applied to train the matching policy given the load and
|
| 727 |
+
generation data for multiple instances of the market. This
|
| 728 |
+
algorithm does not require supervision or expert knowledge as
|
| 729 |
+
it measures its own performance for the training process. The
|
| 730 |
+
following subsections briefly discuss the matching policy’s
|
| 731 |
+
structure for an IHR and then the learning algorithm. Note
|
| 732 |
+
that the expectation with respect to all sources of randomness
|
| 733 |
+
is denoted by E[.]. It is implicit that all the descriptions in this
|
| 734 |
+
section are confined to a single IHR.
|
| 735 |
+
A. General Discrete Matching Policy
|
| 736 |
+
Each IHR agent in the proposed study learns an online
|
| 737 |
+
matching policy given by χ = {χ1, χ2, χ3, ..., χT }. The
|
| 738 |
+
discrete matching policy for time t, denoted by χt, indicates
|
| 739 |
+
whether a customer is to be matched to a supply or not,
|
| 740 |
+
regardless of the amount of matching. Let define Mt as the
|
| 741 |
+
space of discrete matching at time t. Each component in this
|
| 742 |
+
set m ∈ Mt, is a feasible discrete matching that specifies
|
| 743 |
+
whether a customer is matched or not (i.e., mi,k ∈ {0, 1} with
|
| 744 |
+
one indicating “matched” and zero indicating “not matched”).
|
| 745 |
+
Hence, the general matching policy χt can be given by:
|
| 746 |
+
χt : Ωt → Mt.
|
| 747 |
+
Aside from the fact that the matching problem is an
|
| 748 |
+
online decision-making procedure with a future ridden with
|
| 749 |
+
uncertainties, there are still several general challenges from
|
| 750 |
+
an RL point of view. Firstly, the action space of the matching
|
| 751 |
+
problem is large and specifically exponential in the number
|
| 752 |
+
of customers. For example, if there are m supplies and n
|
| 753 |
+
customers, then there are mn ways of matching; thus it is
|
| 754 |
+
|
| 755 |
+
6
|
| 756 |
+
exponential in the number of active customers. Secondly,
|
| 757 |
+
not all the actions from this space are feasible as supply
|
| 758 |
+
unavailability might limit the matching decisions. There might
|
| 759 |
+
also be some restrictions enforced by the customers servicing
|
| 760 |
+
constraints. Hence, some actions are infeasible, and their
|
| 761 |
+
infeasibility is state-dependent. Thirdly, RL algorithms can
|
| 762 |
+
converge to a local optimum, a general challenge that applies
|
| 763 |
+
to the matching problem. Therefore, the goal is to develop
|
| 764 |
+
a framework based on RL that is simple and efficient to
|
| 765 |
+
learn, simultaneously satisfies the action constraints, and can
|
| 766 |
+
converge to a good solution. The proposed framework in this
|
| 767 |
+
paper simplifies the output of the policy to be trained by RL
|
| 768 |
+
to just “match” or “not to match” for each active customer,
|
| 769 |
+
regardless of the supply type and action feasibility. Thus, the
|
| 770 |
+
action space of the output of the component that is trained
|
| 771 |
+
is linear in the number of active consumers. Further details
|
| 772 |
+
regarding the proposed matching policy are given below.
|
| 773 |
+
B. Proposed Matching Policy
|
| 774 |
+
The proposed discrete matching policy is characterized by
|
| 775 |
+
a learnable and fixed component [6]. The first component, de-
|
| 776 |
+
noted by µt, determines the probability of matching customers,
|
| 777 |
+
and the latter makes sure that the customers are matched before
|
| 778 |
+
their deadline. Let PMt be the space of probability measures
|
| 779 |
+
over the set Mt. Then, the policy µt can be defined:
|
| 780 |
+
µt : Ωt → PMt.
|
| 781 |
+
Let mt ∈ Mt be given by mt ∼ µt. The component of mt
|
| 782 |
+
corresponding to the customer i is defined by mi,t, where
|
| 783 |
+
mi,t ∈ {0, 1}. The output mi is input to a second function, ϕ.
|
| 784 |
+
The function ϕ matches the customers with mi,t = 1 to the
|
| 785 |
+
available RES in each IHR. When total matching implied by
|
| 786 |
+
the discrete matching is in excess of the RES, the remaining
|
| 787 |
+
customers with mi,t = 1 are matched to the grid supply. When
|
| 788 |
+
total matching implied by the discrete matching is less than the
|
| 789 |
+
available RES, the excess RES generation is assigned to the
|
| 790 |
+
remaining customers. Denote the component of ϕ that specifies
|
| 791 |
+
whether customer i is matched to supply type j by ϕj,i.
|
| 792 |
+
The output ϕj,i is input to a third function, ν, that overturns
|
| 793 |
+
the matching decision for the customers with an immediate
|
| 794 |
+
deadline and ensures that the flexible customers in IHRs are
|
| 795 |
+
served by their deadline:
|
| 796 |
+
νj,i =
|
| 797 |
+
�
|
| 798 |
+
�
|
| 799 |
+
�
|
| 800 |
+
1
|
| 801 |
+
if di = t, i is active, ϕs,i = 0 ∀s
|
| 802 |
+
and j = g,
|
| 803 |
+
ϕj,i
|
| 804 |
+
otherwise.
|
| 805 |
+
Thus, the overall discrete matching policy for time t, χt, is
|
| 806 |
+
given by:
|
| 807 |
+
χt = ν ◦ ϕ ◦ mt, mt ∼ µt.
|
| 808 |
+
(21)
|
| 809 |
+
The proposed policy is parameterized by θt, where the pa-
|
| 810 |
+
rameterization is denoted by µt(.; θt). The learning algorithm,
|
| 811 |
+
presented next, uses the observations from load and generation
|
| 812 |
+
data of the IHR and trains θt for every time step t by evaluating
|
| 813 |
+
its own performance.
|
| 814 |
+
C. Policy Gradient Learning Algorithm
|
| 815 |
+
This part describes the proposed policy gradient learning
|
| 816 |
+
algorithm. EXt∼Pt(.) is used as a shorthand for expectation
|
| 817 |
+
over Xt ∼ P(.|Xt−1, χt−1), where P(.|Xt−1, χt−1) denotes
|
| 818 |
+
the transition probability from state Xt−1 under the pol-
|
| 819 |
+
icy χt−1. Let mt:T
|
| 820 |
+
= {mt, ml+1, ..., mT } and µl:T
|
| 821 |
+
=
|
| 822 |
+
{µt, µl+1, ..., µT }. Denoting Em∼µ as a shortened form of
|
| 823 |
+
Emt+1:T ∼µt+1:T , the market welfare can be defined as:
|
| 824 |
+
V χ
|
| 825 |
+
t+(Xt+1):=Em∼µ
|
| 826 |
+
T
|
| 827 |
+
�
|
| 828 |
+
l=t+1
|
| 829 |
+
�
|
| 830 |
+
j
|
| 831 |
+
�
|
| 832 |
+
k∈At
|
| 833 |
+
(πi
|
| 834 |
+
l − cj)χt,j,i(Xt).
|
| 835 |
+
(22)
|
| 836 |
+
Let:
|
| 837 |
+
vχ
|
| 838 |
+
t :=
|
| 839 |
+
�
|
| 840 |
+
j
|
| 841 |
+
�
|
| 842 |
+
i∈At
|
| 843 |
+
(πi
|
| 844 |
+
l − cj)χt,j,i(Xt),
|
| 845 |
+
(23)
|
| 846 |
+
V χ
|
| 847 |
+
t (Xt|mt) := vχ
|
| 848 |
+
t + EXt+1∼Pt+1(.)
|
| 849 |
+
�
|
| 850 |
+
V χ
|
| 851 |
+
t+(Xt+1)
|
| 852 |
+
�
|
| 853 |
+
.
|
| 854 |
+
(24)
|
| 855 |
+
Then, from the definitions of Vχ and V χ
|
| 856 |
+
t (Xt), the gradient
|
| 857 |
+
of the value function with respect to the policy parameter θt
|
| 858 |
+
can be calculated as follows:
|
| 859 |
+
∂Vχ
|
| 860 |
+
∂θt
|
| 861 |
+
= EXt
|
| 862 |
+
�∂V χ
|
| 863 |
+
t (Xt)
|
| 864 |
+
∂θt
|
| 865 |
+
�
|
| 866 |
+
,
|
| 867 |
+
(25)
|
| 868 |
+
∂Vχ
|
| 869 |
+
∂θt
|
| 870 |
+
= EXt
|
| 871 |
+
�
|
| 872 |
+
mt∈Ht
|
| 873 |
+
∂µt(mt; θt)
|
| 874 |
+
∂θt
|
| 875 |
+
[vχ
|
| 876 |
+
t
|
| 877 |
+
+EXt+1∼Pt+1(.)V χ
|
| 878 |
+
t+(Xt+1)
|
| 879 |
+
�
|
| 880 |
+
.
|
| 881 |
+
(26)
|
| 882 |
+
The gradient of the value function with respect to the policy
|
| 883 |
+
parameter derived in (25)-(26) can be written as follows:
|
| 884 |
+
∂Vχ
|
| 885 |
+
∂θt
|
| 886 |
+
= EXt,mt∼µt
|
| 887 |
+
�∂ log µt(mt; θt)
|
| 888 |
+
∂θt
|
| 889 |
+
V χ
|
| 890 |
+
t (Xt|mt)
|
| 891 |
+
�
|
| 892 |
+
,
|
| 893 |
+
(27)
|
| 894 |
+
where an unbiased estimate of this relationship can defined as
|
| 895 |
+
follows:
|
| 896 |
+
δθ
|
| 897 |
+
t =
|
| 898 |
+
�∂ log µt(mt; θt)
|
| 899 |
+
∂θt
|
| 900 |
+
V χ
|
| 901 |
+
t (Xt|mt)
|
| 902 |
+
�
|
| 903 |
+
.
|
| 904 |
+
(28)
|
| 905 |
+
Since the term V χ
|
| 906 |
+
t (Xt|mt) is unknown, the gradient in (28)
|
| 907 |
+
is not computable. Therefore, this term is replaced with the
|
| 908 |
+
social welfare from t to T for a sample epoch under policy χ:
|
| 909 |
+
δθ
|
| 910 |
+
t,r = ∂ log µt(mt; θt)
|
| 911 |
+
∂θt
|
| 912 |
+
� T
|
| 913 |
+
�
|
| 914 |
+
l=t
|
| 915 |
+
vχ
|
| 916 |
+
l
|
| 917 |
+
�
|
| 918 |
+
,
|
| 919 |
+
(29)
|
| 920 |
+
where the gradient is computable using the data from a sample
|
| 921 |
+
epoch (Z = {Z1, Z2, ..., ZT }) and matching decisions under
|
| 922 |
+
the policy χ for the same epoch. Furthermore, the gradient
|
| 923 |
+
estimate is unbiased as
|
| 924 |
+
∂Vχ
|
| 925 |
+
∂θt
|
| 926 |
+
= E[δθ
|
| 927 |
+
t,r]. The vanilla policy
|
| 928 |
+
gradient learning algorithm learns the policy parameter θt for
|
| 929 |
+
each time step using the following stochastic gradient ascent
|
| 930 |
+
algorithm:
|
| 931 |
+
θt+1 ← θt + γθδθ
|
| 932 |
+
t,r,
|
| 933 |
+
(30)
|
| 934 |
+
where θt is updated using the computed gradient δθ
|
| 935 |
+
t,r for
|
| 936 |
+
multiple sample epochs in every update step.
|
| 937 |
+
In addition to the vanilla policy gradient learning algorithm
|
| 938 |
+
described above, the actor-critic algorithm AC−k is also
|
| 939 |
+
proposed for the dynamic matching of IHRs. This algorithm
|
| 940 |
+
learns both the matching policy µ and an approximation of
|
| 941 |
+
|
| 942 |
+
7
|
| 943 |
+
value function V χ
|
| 944 |
+
t (Xt). This function, which is also called
|
| 945 |
+
the critic function, is parameterized by φk and expressed by
|
| 946 |
+
V χ
|
| 947 |
+
k (Xk; φk). Hence, the approximate policy gradient for the
|
| 948 |
+
actor-critic algorithm AC−k can be defined as follows:
|
| 949 |
+
δθ
|
| 950 |
+
t,k = ∂ log µt(mt; θt)
|
| 951 |
+
∂θt
|
| 952 |
+
�t+k−1
|
| 953 |
+
�
|
| 954 |
+
l=t
|
| 955 |
+
vχ
|
| 956 |
+
l + V χ
|
| 957 |
+
t+k(Xt+k; φt+k)
|
| 958 |
+
�
|
| 959 |
+
,
|
| 960 |
+
(31)
|
| 961 |
+
where the policy parameters are learned using the following
|
| 962 |
+
stochastic gradient ascent algorithm in (32) and similarly the
|
| 963 |
+
parameter φk of the critic function is learned by stochastic
|
| 964 |
+
gradient descent for its least-squares error in (33).
|
| 965 |
+
θt+1 ← θt + γθδθ
|
| 966 |
+
t,k,
|
| 967 |
+
(32)
|
| 968 |
+
φk+1 ← φk − γφ
|
| 969 |
+
�
|
| 970 |
+
V χ
|
| 971 |
+
k (.; φk) −
|
| 972 |
+
T
|
| 973 |
+
�
|
| 974 |
+
l=k
|
| 975 |
+
vχ
|
| 976 |
+
l
|
| 977 |
+
�
|
| 978 |
+
.
|
| 979 |
+
(33)
|
| 980 |
+
Further details regarding the actor-critic algorithm are given
|
| 981 |
+
in Algorithm 1, where the ADAM gradient algorithm of the
|
| 982 |
+
gradient updates in (32) and (33) is implemented.
|
| 983 |
+
Algorithm 1 Actor-Critic (AC−k) Policy Gradient Learn-
|
| 984 |
+
ing Algorithm for an IHR
|
| 985 |
+
1) Initialize D = ∅, j = 0
|
| 986 |
+
2) Initialize θk ∀ k ∈ [1, ..., T]. N: number of epochs
|
| 987 |
+
3) for i = 1 : N
|
| 988 |
+
a) j = j + 1
|
| 989 |
+
b) Set Di = {{Xk, mk, vχ
|
| 990 |
+
k } ∀ k ∈ [1, ..., T]}
|
| 991 |
+
c) Include Di into D
|
| 992 |
+
d) if j == M
|
| 993 |
+
Update θk by ADAM of Eq. (32) using D
|
| 994 |
+
Update φk by ADAM of Eq. (33) using D
|
| 995 |
+
j = 0; D = ∅
|
| 996 |
+
end
|
| 997 |
+
end
|
| 998 |
+
4) end
|
| 999 |
+
The matching policy in the proposed study is trained
|
| 1000 |
+
with the Temporal Convolution Network (TCN), denoted
|
| 1001 |
+
by TCNµ. Let
|
| 1002 |
+
˜Xt denote the input sequence to the TCN
|
| 1003 |
+
at each time step, where
|
| 1004 |
+
˜X⊤
|
| 1005 |
+
t
|
| 1006 |
+
= [˜x⊤
|
| 1007 |
+
1 , ˜x⊤
|
| 1008 |
+
2 , ˜x⊤
|
| 1009 |
+
3 , ..., ˜x⊤
|
| 1010 |
+
t ], and
|
| 1011 |
+
˜xt = [a⊤
|
| 1012 |
+
t , p⊤
|
| 1013 |
+
t , b⊤
|
| 1014 |
+
t , d⊤
|
| 1015 |
+
t , p⊤
|
| 1016 |
+
u,t, b⊤
|
| 1017 |
+
u,t, rt]. The vector of matching
|
| 1018 |
+
probabilities P m
|
| 1019 |
+
µ
|
| 1020 |
+
∈ [0, 1]n×T as the output of TCN can be
|
| 1021 |
+
determined as P m
|
| 1022 |
+
µ = TCNµ( ˜Xt). The output of TCN in the
|
| 1023 |
+
proposed study is fixed and capped at the maximum number
|
| 1024 |
+
of active customers at any time, n × T. Let P m
|
| 1025 |
+
µ,i denote the
|
| 1026 |
+
probability of matching for the active customer i at time step
|
| 1027 |
+
t. Hence, the distribution µt is constructed as:
|
| 1028 |
+
P(mt,i = 1) = P m
|
| 1029 |
+
µ,i, P(mt,i = 0) = 1 − P m
|
| 1030 |
+
µ,i.
|
| 1031 |
+
IV. SIMULATIONS AND RESULTS
|
| 1032 |
+
The proposed hierarchical matching framework is imple-
|
| 1033 |
+
mented on the IEEE 33-bus test distribution system using the
|
| 1034 |
+
30-minute real-time California Independent System Operator
|
| 1035 |
+
(CAISO) load and solar generation data from January 1, 2021
|
| 1036 |
+
to September 28, 2021. The distribution system is divided
|
| 1037 |
+
into 5 IHRs, each consisting of a learning agent to control
|
| 1038 |
+
and match DERs with flexible loads. The structure of the
|
| 1039 |
+
distribution system with IHRs is shown in Fig. 3, where
|
| 1040 |
+
the electric vehicle (EV) charging stations supply charging
|
| 1041 |
+
requests of 6.6 kWh to 24 EVs in IHR 1, 30 EVs in IHR
|
| 1042 |
+
2, 8 EVs in IHR 3 and 30 EVs in each one of IHRs 4 and
|
| 1043 |
+
5. The CAISO solar power data is scaled to the inverter’s
|
| 1044 |
+
nominal capacity of 105 kW in IHR 1, 150 kW in IHR 2, 45
|
| 1045 |
+
kW in IHR 3, and 150 kW in each one of IHRs 4 and 5. The
|
| 1046 |
+
distribution system active and reactive loads are scaled to 50 %
|
| 1047 |
+
of their nominal rates, 3715 kW and 2300 kVAr, respectively.
|
| 1048 |
+
The electricity tariff is assumed to be 120 $/MWh, and the
|
| 1049 |
+
curtailment penalty for the central agent is assumed to be 500
|
| 1050 |
+
$/MWh. To validate the efficiency of the proposed hierarchical
|
| 1051 |
+
framework, the following scenarios are considered:
|
| 1052 |
+
• Scenario 1: This is a scenario where the EVs are char-
|
| 1053 |
+
acterized by earlier arrival times and longer departure
|
| 1054 |
+
times. In this scenario, waiting to match will fetch higher
|
| 1055 |
+
welfare. This scenario tests the capability of the IHR
|
| 1056 |
+
agents to learn to let the customers wait in the market
|
| 1057 |
+
and not match them immediately upon their arrival.
|
| 1058 |
+
• Scenario 2: This is a scenario where the EVs are charac-
|
| 1059 |
+
terized by moderate arrival and longer departure times. In
|
| 1060 |
+
this scenario, waiting may not result in improved welfare.
|
| 1061 |
+
Here, a strategy that partially waits and partially matches
|
| 1062 |
+
upon arrival might be needed. This scenario tests the
|
| 1063 |
+
capability of the algorithm to learn such hybrid strategies.
|
| 1064 |
+
For illustration, two matching algorithms are considered,
|
| 1065 |
+
one is the Learning Algorithm (LA) described in Section III,
|
| 1066 |
+
and the other is the standard matching heuristic, Matching on
|
| 1067 |
+
Arrival (MA). These matching algorithms are implemented in
|
| 1068 |
+
scenarios 1 and 2 under the following market models:
|
| 1069 |
+
• Centralized Model: In this model, a single agent manages
|
| 1070 |
+
the matching of the whole distribution system.
|
| 1071 |
+
• Decentralized Model: In this model, the distribution sys-
|
| 1072 |
+
tem is divided into multiple IHRs as described earlier,
|
| 1073 |
+
with each IHR employing a separate matching algorithm.
|
| 1074 |
+
The central agent solves the reduced-dimension OPF
|
| 1075 |
+
model described earlier to meet the respective IHRs flow
|
| 1076 |
+
requirements and ensure that the grid constraints are met.
|
| 1077 |
+
This model with the learning algorithm is the proposed
|
| 1078 |
+
hierarchical framework.
|
| 1079 |
+
The best hyper-parameters for the TCN model were iden-
|
| 1080 |
+
tified to be 3 for the number of blocks, 4 for the number
|
| 1081 |
+
of filters, 3 for the filter size, 0.1 for the dropout factor,
|
| 1082 |
+
and 4 for the dilation factor. Sigmoid function is utilized
|
| 1083 |
+
as the activation function for each output of TCN and the
|
| 1084 |
+
following values are considered as the parameters of the
|
| 1085 |
+
ADAM algorithm: α = [0.25, 0.99], β1 = 0.9, β2 = 0.999,
|
| 1086 |
+
ϵ = 10−8, where α is the learning rate and β1, β2 are
|
| 1087 |
+
exponential decay rates for the moment estimates. The best
|
| 1088 |
+
batch size for the LA is 20.
|
| 1089 |
+
A. Numerical Results
|
| 1090 |
+
The average social welfare achieved in scenarios 1 and 2
|
| 1091 |
+
for the centralized and decentralized models is summarized in
|
| 1092 |
+
Table I. In scenario 1, it can be seen that the MA algorithm
|
| 1093 |
+
achieves a welfare of 17.98$ and 16.17$ in both the centralized
|
| 1094 |
+
|
| 1095 |
+
8
|
| 1096 |
+
1
|
| 1097 |
+
2
|
| 1098 |
+
3
|
| 1099 |
+
4
|
| 1100 |
+
5
|
| 1101 |
+
6
|
| 1102 |
+
7
|
| 1103 |
+
8
|
| 1104 |
+
9
|
| 1105 |
+
10 11
|
| 1106 |
+
12 13
|
| 1107 |
+
14
|
| 1108 |
+
15
|
| 1109 |
+
16
|
| 1110 |
+
17
|
| 1111 |
+
18
|
| 1112 |
+
19
|
| 1113 |
+
20
|
| 1114 |
+
21
|
| 1115 |
+
22
|
| 1116 |
+
23
|
| 1117 |
+
26
|
| 1118 |
+
27 28
|
| 1119 |
+
29
|
| 1120 |
+
30
|
| 1121 |
+
31
|
| 1122 |
+
32
|
| 1123 |
+
33
|
| 1124 |
+
24
|
| 1125 |
+
25
|
| 1126 |
+
L1
|
| 1127 |
+
L2
|
| 1128 |
+
L3
|
| 1129 |
+
L4
|
| 1130 |
+
L5
|
| 1131 |
+
L6
|
| 1132 |
+
L7
|
| 1133 |
+
L8
|
| 1134 |
+
L9
|
| 1135 |
+
L10 L11
|
| 1136 |
+
L12
|
| 1137 |
+
L13
|
| 1138 |
+
L14
|
| 1139 |
+
L15
|
| 1140 |
+
L16
|
| 1141 |
+
L17
|
| 1142 |
+
L23
|
| 1143 |
+
L24
|
| 1144 |
+
L26
|
| 1145 |
+
L27 L28
|
| 1146 |
+
L29 L30
|
| 1147 |
+
L31
|
| 1148 |
+
L32
|
| 1149 |
+
L18
|
| 1150 |
+
L19
|
| 1151 |
+
L20
|
| 1152 |
+
L21
|
| 1153 |
+
L22
|
| 1154 |
+
L25
|
| 1155 |
+
IHR 4
|
| 1156 |
+
IHR 5
|
| 1157 |
+
IHR 1
|
| 1158 |
+
IHR 3
|
| 1159 |
+
IHR 2
|
| 1160 |
+
Fig. 3.
|
| 1161 |
+
Structure of the 33-bus power distribution system, divided into 5
|
| 1162 |
+
integrated hybrid resources.
|
| 1163 |
+
TABLE I
|
| 1164 |
+
AVERAGE SOCIAL WELFARE ($)
|
| 1165 |
+
Algorithm
|
| 1166 |
+
Scenario
|
| 1167 |
+
Centralized Model
|
| 1168 |
+
Decentralized Model
|
| 1169 |
+
LA
|
| 1170 |
+
Scenario1
|
| 1171 |
+
218.59
|
| 1172 |
+
232.70
|
| 1173 |
+
Scenario2
|
| 1174 |
+
866.33
|
| 1175 |
+
893.52
|
| 1176 |
+
Average
|
| 1177 |
+
542.46
|
| 1178 |
+
563.11
|
| 1179 |
+
MA
|
| 1180 |
+
Scenario1
|
| 1181 |
+
17.98
|
| 1182 |
+
16.17
|
| 1183 |
+
Scenario2
|
| 1184 |
+
742.75
|
| 1185 |
+
808.20
|
| 1186 |
+
Average
|
| 1187 |
+
380.365
|
| 1188 |
+
412.185
|
| 1189 |
+
and decentralized models, while the LA algorithm achieves
|
| 1190 |
+
a higher welfare of 218.59$ and 232.7$ in the centralized
|
| 1191 |
+
and decentralized models respectively. This shows that the LA
|
| 1192 |
+
algorithm leverages the flexibility better to match the excess
|
| 1193 |
+
RES during the middle of the day. In scenario 2, the results
|
| 1194 |
+
reveal that the optimal matching policy is not to match all
|
| 1195 |
+
the loads on their arrival but to only match the critical ones
|
| 1196 |
+
on their arrival, so as to efficiently utilize the RES that is
|
| 1197 |
+
available during the middle of the day. In this scenario, the
|
| 1198 |
+
LA algorithm is the top-performing, achieving a social welfare
|
| 1199 |
+
of 866.33$ and 893.52$ in the centralized and decentralized
|
| 1200 |
+
models, followed by the MA algorithm, which achieves a
|
| 1201 |
+
social welfare of 742.75$ and 808.2$ in the centralized and
|
| 1202 |
+
decentralized models, respectively.
|
| 1203 |
+
Comparing the performance of LA and MA algorithms in
|
| 1204 |
+
the centralized and decentralized models, it can be seen that
|
| 1205 |
+
the decentralized model with the learning algorithm is the best
|
| 1206 |
+
performing, substantiating the efficacy of our approach. Table
|
| 1207 |
+
II summarizes the social welfare achieved by LA and MA
|
| 1208 |
+
in the decentralized matching model. Comparing the social
|
| 1209 |
+
welfare, it can be found that the LA algorithm outperforms the
|
| 1210 |
+
MA algorithm in each of the IHRs, showing the superiority
|
| 1211 |
+
of the learning-based approach.
|
| 1212 |
+
TABLE II
|
| 1213 |
+
AVERAGE SOCIAL WELFARE IN THE DECENTRALIZED MODEL ($)
|
| 1214 |
+
Algorithm
|
| 1215 |
+
Model
|
| 1216 |
+
IHR1
|
| 1217 |
+
IHR2
|
| 1218 |
+
IHR3
|
| 1219 |
+
IHR4
|
| 1220 |
+
IHR5
|
| 1221 |
+
LA
|
| 1222 |
+
Scenario1
|
| 1223 |
+
41.65
|
| 1224 |
+
55.06
|
| 1225 |
+
12.3
|
| 1226 |
+
60.02
|
| 1227 |
+
63.67
|
| 1228 |
+
Scenario2
|
| 1229 |
+
184.15
|
| 1230 |
+
216.67
|
| 1231 |
+
49.47
|
| 1232 |
+
221.36
|
| 1233 |
+
221.87
|
| 1234 |
+
Average
|
| 1235 |
+
112.9
|
| 1236 |
+
135.865
|
| 1237 |
+
30.885
|
| 1238 |
+
140.69
|
| 1239 |
+
142.77
|
| 1240 |
+
MA
|
| 1241 |
+
Scenario1
|
| 1242 |
+
3.06
|
| 1243 |
+
3.89
|
| 1244 |
+
1.02
|
| 1245 |
+
4.164
|
| 1246 |
+
4.04
|
| 1247 |
+
Scenario2
|
| 1248 |
+
163.08
|
| 1249 |
+
202.4
|
| 1250 |
+
43.53
|
| 1251 |
+
199.46
|
| 1252 |
+
199.73
|
| 1253 |
+
Average
|
| 1254 |
+
83.07
|
| 1255 |
+
103.145
|
| 1256 |
+
22.275
|
| 1257 |
+
101.81
|
| 1258 |
+
101.885
|
| 1259 |
+
B. Matching Market Analysis
|
| 1260 |
+
This section analyzes the performance of the matching
|
| 1261 |
+
algorithms under the centralized and decentralized matching
|
| 1262 |
+
markets in scenarios 1 and 2.
|
| 1263 |
+
1) Scenario 1: EVs with Earlier Arrival and Longer Depar-
|
| 1264 |
+
ture Times: In this scenario, the flexible loads are character-
|
| 1265 |
+
ized by earlier arrival and longer departure (deadline) times,
|
| 1266 |
+
the RES generation is available during the middle of the day.
|
| 1267 |
+
Thus, the market operator (agent) can queue the load requests
|
| 1268 |
+
and match them to the RES available during the middle of
|
| 1269 |
+
the day. The matching by the LA and MA of IHR 2 in this
|
| 1270 |
+
scenario is shown in Fig. 4. The results clearly show that MA
|
| 1271 |
+
fails to wait to avail the RES during the middle of the day, and
|
| 1272 |
+
instead matches the loads to the grid supply. On the contrary,
|
| 1273 |
+
the LA learns to queue the non-critical loads and shift them
|
| 1274 |
+
to the periods where RES generation is available.
|
| 1275 |
+
-40
|
| 1276 |
+
-20
|
| 1277 |
+
0
|
| 1278 |
+
20
|
| 1279 |
+
40
|
| 1280 |
+
60
|
| 1281 |
+
80
|
| 1282 |
+
100
|
| 1283 |
+
1
|
| 1284 |
+
21
|
| 1285 |
+
41
|
| 1286 |
+
61
|
| 1287 |
+
81
|
| 1288 |
+
101
|
| 1289 |
+
121
|
| 1290 |
+
141
|
| 1291 |
+
161
|
| 1292 |
+
181
|
| 1293 |
+
201
|
| 1294 |
+
221
|
| 1295 |
+
Social Welfare ($)
|
| 1296 |
+
Epoch
|
| 1297 |
+
Average: LA
|
| 1298 |
+
Average: MA
|
| 1299 |
+
Actual: LA
|
| 1300 |
+
Actual: MA
|
| 1301 |
+
Fig. 4. Average and actual social welfare of LA and MA for IHR 2 under
|
| 1302 |
+
scenario 1.
|
| 1303 |
+
Figure 5 shows the matching market results for the LA of
|
| 1304 |
+
IHR 2 for a representative epoch of scenario 1. In Fig. 5,
|
| 1305 |
+
the initial load request of critical loads is supplied using the
|
| 1306 |
+
grid power, while a significant portion of non-critical loads
|
| 1307 |
+
is shifted to the middle of the day and matched to the RES
|
| 1308 |
+
generation, indicating the efficacy of the fixed and trainable
|
| 1309 |
+
components of the matching policy to match flexible loads
|
| 1310 |
+
with RES, while satisfying the quality of service constraints of
|
| 1311 |
+
the loads. This is evident in Fig. 5, where all the requested load
|
| 1312 |
+
is supplied without any curtailment and the RES generation
|
| 1313 |
+
is efficiently allocated to supply the queued flexible loads and
|
| 1314 |
+
the non-flexible loads when the flexible loads are unavailable.
|
| 1315 |
+
0
|
| 1316 |
+
30
|
| 1317 |
+
60
|
| 1318 |
+
90
|
| 1319 |
+
120
|
| 1320 |
+
150
|
| 1321 |
+
180
|
| 1322 |
+
210
|
| 1323 |
+
0
|
| 1324 |
+
2
|
| 1325 |
+
4
|
| 1326 |
+
6
|
| 1327 |
+
8
|
| 1328 |
+
10
|
| 1329 |
+
12
|
| 1330 |
+
14
|
| 1331 |
+
16
|
| 1332 |
+
18
|
| 1333 |
+
20
|
| 1334 |
+
22
|
| 1335 |
+
Matching Results (kW)
|
| 1336 |
+
Time (h)
|
| 1337 |
+
RES Generation
|
| 1338 |
+
Matched Flexible Load to RES
|
| 1339 |
+
Matched Flexible Load to Grid
|
| 1340 |
+
Curtailed Flexible Load
|
| 1341 |
+
Matched Non-Flexible Load to RES
|
| 1342 |
+
Curtailed RES Generation
|
| 1343 |
+
Requested Flexible Load
|
| 1344 |
+
Total Supplied Flexible Load
|
| 1345 |
+
Fig. 5. Matching market results for LA of IHR 2 for a representative epoch
|
| 1346 |
+
of scenario 1.
|
| 1347 |
+
|
| 1348 |
+
9
|
| 1349 |
+
The performance of the decentralized and centralized mod-
|
| 1350 |
+
els with LA is compared in Fig. 6. As shown, the centralized
|
| 1351 |
+
model obtains higher welfare in the initial epochs, but the
|
| 1352 |
+
decentralized model achieves a higher average social welfare
|
| 1353 |
+
with experience.
|
| 1354 |
+
-30
|
| 1355 |
+
0
|
| 1356 |
+
30
|
| 1357 |
+
60
|
| 1358 |
+
90
|
| 1359 |
+
120
|
| 1360 |
+
150
|
| 1361 |
+
180
|
| 1362 |
+
210
|
| 1363 |
+
240
|
| 1364 |
+
1
|
| 1365 |
+
21
|
| 1366 |
+
41
|
| 1367 |
+
61
|
| 1368 |
+
81
|
| 1369 |
+
101
|
| 1370 |
+
121
|
| 1371 |
+
141
|
| 1372 |
+
161
|
| 1373 |
+
181
|
| 1374 |
+
201
|
| 1375 |
+
221
|
| 1376 |
+
Average Social Welfare ($)
|
| 1377 |
+
Epoch
|
| 1378 |
+
IHR 1
|
| 1379 |
+
IHR 2
|
| 1380 |
+
IHR 3
|
| 1381 |
+
IHR 4
|
| 1382 |
+
IHR 5
|
| 1383 |
+
Centralized
|
| 1384 |
+
Fig. 6. Average social welfare of decentralized and centralized models with
|
| 1385 |
+
LA in scenario 1.
|
| 1386 |
+
2) Scenario 2: EVs with Moderate Arrival and Longer
|
| 1387 |
+
Departure Times: In this scenario, the flexible loads are
|
| 1388 |
+
characterized by moderate arrival and longer departure times
|
| 1389 |
+
and the RES generation is available during the middle of the
|
| 1390 |
+
day. The social welfare achieved by the LA and MA of IHR 5
|
| 1391 |
+
in this scenario is shown in Fig. 7. The results show that both
|
| 1392 |
+
the LA and MA achieve a similar performance. However, as
|
| 1393 |
+
shown, the LA is superior to the MA in that it doesn’t match
|
| 1394 |
+
all the flexible loads on their arrival. This is evident in Fig. 8,
|
| 1395 |
+
where a portion of the load request is shifted from their arrival
|
| 1396 |
+
and matched to the RES generation during the middle of the
|
| 1397 |
+
day. As in the previous scenario, the LA is able to meet the
|
| 1398 |
+
quality of service constraints of the loads and utilize the RES
|
| 1399 |
+
generation, while ensuring that the outcomes are economically
|
| 1400 |
+
efficient.
|
| 1401 |
+
25
|
| 1402 |
+
75
|
| 1403 |
+
125
|
| 1404 |
+
175
|
| 1405 |
+
225
|
| 1406 |
+
275
|
| 1407 |
+
325
|
| 1408 |
+
375
|
| 1409 |
+
1
|
| 1410 |
+
21
|
| 1411 |
+
41
|
| 1412 |
+
61
|
| 1413 |
+
81
|
| 1414 |
+
101
|
| 1415 |
+
121
|
| 1416 |
+
141
|
| 1417 |
+
161
|
| 1418 |
+
181
|
| 1419 |
+
Social Welfare ($)
|
| 1420 |
+
Epoch
|
| 1421 |
+
Average: LA
|
| 1422 |
+
Average: MA
|
| 1423 |
+
Actual: LA
|
| 1424 |
+
Actual: MA
|
| 1425 |
+
Fig. 7. Average and actual social welfare of LA and MA of IHR 5 in scenario
|
| 1426 |
+
2.
|
| 1427 |
+
C. Distribution System Constraints
|
| 1428 |
+
In the proposed hierarchical matching framework, the cen-
|
| 1429 |
+
tral agent solves a reduced-dimension OPF model with the
|
| 1430 |
+
IHRs as the nodes to deliver the IHR flow requirements while
|
| 1431 |
+
ensuring that the grid constraints are met. The agent can
|
| 1432 |
+
also curtail the flow to each IHR to the extent that the grid
|
| 1433 |
+
constraints are not violated. Figure 9 shows the voltage profiles
|
| 1434 |
+
of IHRs in the decentralized model and scenario 1.
|
| 1435 |
+
0
|
| 1436 |
+
100
|
| 1437 |
+
200
|
| 1438 |
+
300
|
| 1439 |
+
400
|
| 1440 |
+
500
|
| 1441 |
+
600
|
| 1442 |
+
0
|
| 1443 |
+
2
|
| 1444 |
+
4
|
| 1445 |
+
6
|
| 1446 |
+
8
|
| 1447 |
+
10
|
| 1448 |
+
12
|
| 1449 |
+
14
|
| 1450 |
+
16
|
| 1451 |
+
18
|
| 1452 |
+
20
|
| 1453 |
+
22
|
| 1454 |
+
Matching Results (kW)
|
| 1455 |
+
Time (h)
|
| 1456 |
+
RES Generation
|
| 1457 |
+
Matched Flexible Load to RES
|
| 1458 |
+
Matched Flexible Load to Grid
|
| 1459 |
+
Matched Non-Flexible Load to RES
|
| 1460 |
+
Curtailed Flexible Load
|
| 1461 |
+
Curtailed RES Generation
|
| 1462 |
+
Requested Flexible Load
|
| 1463 |
+
Total Supplied Flexible Load
|
| 1464 |
+
Fig. 8.
|
| 1465 |
+
Matching results for LA of IHR 5 for a representative epoch in
|
| 1466 |
+
scenario 2.
|
| 1467 |
+
12.5
|
| 1468 |
+
12.55
|
| 1469 |
+
12.6
|
| 1470 |
+
12.65
|
| 1471 |
+
12.7
|
| 1472 |
+
1
|
| 1473 |
+
5
|
| 1474 |
+
9
|
| 1475 |
+
13
|
| 1476 |
+
17
|
| 1477 |
+
21
|
| 1478 |
+
25
|
| 1479 |
+
29
|
| 1480 |
+
33
|
| 1481 |
+
37
|
| 1482 |
+
41
|
| 1483 |
+
45
|
| 1484 |
+
Voltage Level (kV)
|
| 1485 |
+
Time (h)
|
| 1486 |
+
Substation Bus
|
| 1487 |
+
IHR 1
|
| 1488 |
+
IHR 2
|
| 1489 |
+
IHR 3
|
| 1490 |
+
IHR 4
|
| 1491 |
+
IHR 5
|
| 1492 |
+
Fig. 9. Voltage profiles of IHR nodes in the decentralized model, scenario 1.
|
| 1493 |
+
In this epoch, the lower and upper voltage boundaries of
|
| 1494 |
+
IHRs are respectively V h = [12.37, 12.2, 12.05, 12.08, 12.22]
|
| 1495 |
+
and V h =[12.948, 13.11, 13.25, 13.22, 13.09]. As shown, the
|
| 1496 |
+
voltage level of all IHRs is within the safe lower-bound and
|
| 1497 |
+
upper-bound limits in all the time periods. The extent to which
|
| 1498 |
+
the matching decisions are met in each IHR depends on the
|
| 1499 |
+
power flow in the grid operation, which can be curtailed by
|
| 1500 |
+
the central agent to ensure that the grid constraints are met.
|
| 1501 |
+
Figure 10 shows the matching curtailment of different IHRs
|
| 1502 |
+
in the decentralized model and scenario 1. The results show
|
| 1503 |
+
that the initial IHR-level matching decisions are not curtailed
|
| 1504 |
+
in most of the epochs, though the matching decisions in some
|
| 1505 |
+
initial epochs are curtailed to ensure the safe operation of the
|
| 1506 |
+
power grid.
|
| 1507 |
+
0
|
| 1508 |
+
100
|
| 1509 |
+
200
|
| 1510 |
+
300
|
| 1511 |
+
400
|
| 1512 |
+
500
|
| 1513 |
+
600
|
| 1514 |
+
1
|
| 1515 |
+
21
|
| 1516 |
+
41
|
| 1517 |
+
61
|
| 1518 |
+
81
|
| 1519 |
+
101
|
| 1520 |
+
121
|
| 1521 |
+
141
|
| 1522 |
+
161
|
| 1523 |
+
181
|
| 1524 |
+
201
|
| 1525 |
+
221
|
| 1526 |
+
Load Curtailment (kWh)
|
| 1527 |
+
Epoch
|
| 1528 |
+
IHR 1
|
| 1529 |
+
IHR 2
|
| 1530 |
+
IHR 3
|
| 1531 |
+
IHR 4
|
| 1532 |
+
IHR 5
|
| 1533 |
+
Fig. 10. Matching curtailment of the central agent in the decentralized model,
|
| 1534 |
+
scenario 1.
|
| 1535 |
+
|
| 1536 |
+
10
|
| 1537 |
+
V. CONCLUSIONS
|
| 1538 |
+
This paper proposes a learning-based hierarchical frame-
|
| 1539 |
+
work for dynamic matching in power distribution systems.
|
| 1540 |
+
In the proposed framework, the power distribution system is
|
| 1541 |
+
divided into multiple IHRs, each consisting of flexible loads
|
| 1542 |
+
and RES. The IHR agents employ DRL to output an efficient
|
| 1543 |
+
and scalable online matching policy to match the available
|
| 1544 |
+
RES and active customers as the day progresses such that
|
| 1545 |
+
their quality of service constraints are not violated. Once
|
| 1546 |
+
the IHR-level matching decisions are determined, a central
|
| 1547 |
+
agent uses the net active power flow, as well as the reactive
|
| 1548 |
+
power limits of each IHR to formulate a reduced-dimension
|
| 1549 |
+
OPF model to determine the final flows such that the flow
|
| 1550 |
+
requirements of the IHRs are met and the grid constraints are
|
| 1551 |
+
not violated. The hierarchical approach offers a very effective
|
| 1552 |
+
way to combine the ability of DRL to learn state-dependent (or
|
| 1553 |
+
online) matching policies and that of optimization to ensure
|
| 1554 |
+
safe grid operation. The proposed hierarchical framework was
|
| 1555 |
+
implemented on the IEEE 33-bus test distribution system and
|
| 1556 |
+
tested on multiple scenarios with different matching algo-
|
| 1557 |
+
rithms, including the proposed learning algorithm. The results
|
| 1558 |
+
show that the hierarchical framework utilizes the flexible loads
|
| 1559 |
+
better, resulting in higher social welfare compared to the
|
| 1560 |
+
centralized approach that matches across the whole distribution
|
| 1561 |
+
system.
|
| 1562 |
+
REFERENCES
|
| 1563 |
+
[1] “Ferc
|
| 1564 |
+
order
|
| 1565 |
+
no.
|
| 1566 |
+
2222:
|
| 1567 |
+
A
|
| 1568 |
+
new
|
| 1569 |
+
day
|
| 1570 |
+
for
|
| 1571 |
+
distributed
|
| 1572 |
+
energy
|
| 1573 |
+
resources,”
|
| 1574 |
+
2020.
|
| 1575 |
+
[Online].
|
| 1576 |
+
Available:
|
| 1577 |
+
https://www.ferc.gov/media/
|
| 1578 |
+
ferc-order-no-2222-fact-sheet
|
| 1579 |
+
[2] K. Oikonomou, M. Parvania, and R. Khatami, “Deliverable energy flex-
|
| 1580 |
+
ibility scheduling for active distribution networks,” IEEE Transactions
|
| 1581 |
+
on Smart Grid, vol. 11, no. 1, pp. 655–664, 2019.
|
| 1582 |
+
[3] ——, “Coordinated deliverable energy flexibility and regulation capacity
|
| 1583 |
+
of distribution networks,” International Journal of Electrical Power &
|
| 1584 |
+
Energy Systems, vol. 123, p. 106219, 2020.
|
| 1585 |
+
[4] D. Muthirayan, M. Parvania, and P. P. Khargonekar, “Online algorithms
|
| 1586 |
+
for dynamic matching markets in power distribution systems,” IEEE
|
| 1587 |
+
Control Systems Letters, vol. 5, no. 3, pp. 995–1000, 2020.
|
| 1588 |
+
[5] M. Majidi, D. Muthirayan, M. Parvania, and P. P. Khargonekar, “Dy-
|
| 1589 |
+
namic matching in power systems using model predictive control,” in
|
| 1590 |
+
2021 North American Power Symposium (NAPS). IEEE, 2021, pp. 1–6.
|
| 1591 |
+
[6] ——, “Dynamic matching markets in power grid: Concepts and solution
|
| 1592 |
+
using deep reinforcement learning,” arXiv preprint arXiv:2104.05654,
|
| 1593 |
+
2021.
|
| 1594 |
+
[7] “Unlocking
|
| 1595 |
+
the
|
| 1596 |
+
flexibility
|
| 1597 |
+
of
|
| 1598 |
+
hybrid
|
| 1599 |
+
resources,”
|
| 1600 |
+
2022.
|
| 1601 |
+
[On-
|
| 1602 |
+
line]. Available: https://www.esig.energy/wp-content/uploads/2022/03/
|
| 1603 |
+
ESIG-Hybrid-Resources-report-2022.pdf
|
| 1604 |
+
[8] “Hybrid resources white paper,” 2021. [Online]. Available: https://www.
|
| 1605 |
+
ferc.gov/sites/default/files/2021-05/white-paper-hybrid-resources.pdf
|
| 1606 |
+
[9] M. Majidi, L. Rodriguez-Garcia, and M. Parvania, “Risk-based operation
|
| 1607 |
+
of power networks with hybrid energy systems,” in 2022 17th Interna-
|
| 1608 |
+
tional Conference on Probabilistic Methods Applied to Power Systems
|
| 1609 |
+
(PMAPS).
|
| 1610 |
+
IEEE, 2022, pp. 1–6.
|
| 1611 |
+
[10] R. Li, X. Yan, and N. Liu, “Hybrid energy sharing considering network
|
| 1612 |
+
cost for prosumers in integrated energy systems,” Applied Energy, vol.
|
| 1613 |
+
323, p. 119627, 2022.
|
| 1614 |
+
[11] W. Tushar, C. Yuen, T. K. Saha, T. Morstyn, A. C. Chapman, M. J. E.
|
| 1615 |
+
Alam, S. Hanif, and H. V. Poor, “Peer-to-peer energy systems for
|
| 1616 |
+
connected communities: A review of recent advances and emerging
|
| 1617 |
+
challenges,” Applied Energy, vol. 282, p. 116131, 2021.
|
| 1618 |
+
[12] A. L¨uth, J. M. Zepter, P. C. del Granado, and R. Egging, “Local
|
| 1619 |
+
electricity market designs for peer-to-peer trading: The role of battery
|
| 1620 |
+
flexibility,” Applied energy, vol. 229, pp. 1233–1243, 2018.
|
| 1621 |
+
[13] T. Morstyn, A. Teytelboym, and M. D. McCulloch, “Bilateral contract
|
| 1622 |
+
networks for peer-to-peer energy trading,” IEEE Transactions on Smart
|
| 1623 |
+
Grid, vol. 10, no. 2, pp. 2026–2035, 2018.
|
| 1624 |
+
[14] J. Guerrero, A. C. Chapman, and G. Verbiˇc, “Decentralized p2p energy
|
| 1625 |
+
trading under network constraints in a low-voltage network,” IEEE
|
| 1626 |
+
Transactions on Smart Grid, vol. 10, no. 5, pp. 5163–5173, 2018.
|
| 1627 |
+
[15] Y. Liu, C. Sun, A. Paudel, Y. Gao, Y. Li, H. B. Gooi, and J. Zhu, “Fully
|
| 1628 |
+
decentralized p2p energy trading in active distribution networks with
|
| 1629 |
+
voltage regulation,” IEEE Transactions on Smart Grid, 2022.
|
| 1630 |
+
[16] D. Botelho, L. de Oliveira, B. Dias, T. Soares, and C. Moraes, “In-
|
| 1631 |
+
tegrated prosumers–dso approach applied in peer-to-peer energy and
|
| 1632 |
+
reserve tradings considering network constraints,” Applied Energy, vol.
|
| 1633 |
+
317, p. 119125, 2022.
|
| 1634 |
+
[17] L. A. Soriano, M. Avila, P. Ponce, J. de Jes´us Rubio, and A. Molina,
|
| 1635 |
+
“Peer-to-peer energy trades based on multi-objective optimization,”
|
| 1636 |
+
International Journal of Electrical Power & Energy Systems, vol. 131,
|
| 1637 |
+
p. 107017, 2021.
|
| 1638 |
+
[18] W. Amin, Q. Huang, K. Umer, Z. Zhang, M. Afzal, A. A. Khan, and
|
| 1639 |
+
S. A. Ahmed, “A motivational game-theoretic approach for peer-to-peer
|
| 1640 |
+
energy trading in islanded and grid-connected microgrid,” International
|
| 1641 |
+
Journal of Electrical Power & Energy Systems, vol. 123, p. 106307,
|
| 1642 |
+
2020.
|
| 1643 |
+
[19] X. Luo, W. Shi, Y. Jiang, Y. Liu, and J. Xia, “Distributed peer-to-
|
| 1644 |
+
peer energy trading based on game theory in a community microgrid
|
| 1645 |
+
considering ownership complexity of distributed energy resources,”
|
| 1646 |
+
Journal of Cleaner Production, vol. 351, p. 131573, 2022.
|
| 1647 |
+
[20] B. Zheng, W. Wei, Y. Chen, Q. Wu, and S. Mei, “A peer-to-peer energy
|
| 1648 |
+
trading market embedded with residential shared energy storage units,”
|
| 1649 |
+
Applied Energy, vol. 308, p. 118400, 2022.
|
| 1650 |
+
[21] X. Fang, Q. Zhao, J. Wang, Y. Han, and Y. Li, “Multi-agent deep
|
| 1651 |
+
reinforcement learning for distributed energy management and strategy
|
| 1652 |
+
optimization of microgrid market,” Sustainable Cities and Society,
|
| 1653 |
+
vol. 74, p. 103163, 2021.
|
| 1654 |
+
[22] L. Li and S. Zhang, “Peer-to-peer multi-energy sharing for home
|
| 1655 |
+
microgrids: An integration of data-driven and model-driven approaches,”
|
| 1656 |
+
International Journal of Electrical Power & Energy Systems, vol. 133,
|
| 1657 |
+
p. 107243, 2021.
|
| 1658 |
+
[23] X. Wang, Y. Liu, J. Zhao, C. Liu, J. Liu, and J. Yan, “Surrogate model
|
| 1659 |
+
enabled deep reinforcement learning for hybrid energy community
|
| 1660 |
+
operation,” Applied Energy, vol. 289, p. 116722, 2021.
|
| 1661 |
+
[24] Y. Ye, Y. Tang, H. Wang, X.-P. Zhang, and G. Strbac, “A scalable
|
| 1662 |
+
privacy-preserving multi-agent deep reinforcement learning approach for
|
| 1663 |
+
large-scale peer-to-peer transactive energy trading,” IEEE Transactions
|
| 1664 |
+
on Smart Grid, 2021.
|
| 1665 |
+
[25] D. Qiu, Y. Ye, D. Papadaskalopoulos, and G. Strbac, “Scalable coordi-
|
| 1666 |
+
nated management of peer-to-peer energy trading: A multi-cluster deep
|
| 1667 |
+
reinforcement learning approach,” Applied Energy, vol. 292, p. 116940,
|
| 1668 |
+
2021.
|
| 1669 |
+
[26] M. M. Hosseini and M. Parvania, “Hierarchical intelligent operation of
|
| 1670 |
+
energy storage systems in power distribution grids,” IEEE Transactions
|
| 1671 |
+
on Sustainable Energy, 2022.
|
| 1672 |
+
|
99FJT4oBgHgl3EQfpCw2/content/2301.11598v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:3909851f657db119e0c1d90718d9b4ae49d9a8602af2ce63c86108b8784323f5
|
| 3 |
+
size 1654502
|
99FJT4oBgHgl3EQfpCw2/content/tmp_files/2301.11598v1.pdf.txt
ADDED
|
@@ -0,0 +1,1960 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.11598v1 [math.NA] 27 Jan 2023
|
| 2 |
+
Practical Sketching Algorithms for Low-Rank
|
| 3 |
+
Tucker Approximation of Large Tensors
|
| 4 |
+
Wandi Dong1, Gaohang Yu1*, Liqun Qi2,1,3 and Xiaohao Cai4
|
| 5 |
+
1Department of Mathematics, Hangzhou Dianzi University,
|
| 6 |
+
Hangzhou, 310018, China.
|
| 7 |
+
2Huawei Theory Research Lab, Hong Kong, China.
|
| 8 |
+
3Department of Applied Mathematics, Hongkong Polytechnic
|
| 9 |
+
University, Hong Kong, China.
|
| 10 |
+
4School of Electronics and Computer Science, University of
|
| 11 |
+
Southampton, Southampton, SO17 1BJ, UK.
|
| 12 |
+
*Corresponding author(s). E-mail(s): [email protected];
|
| 13 |
+
Contributing authors: [email protected];
|
| 14 | |
| 15 |
+
Abstract
|
| 16 |
+
Low-rank approximation of tensors has been widely used in high-
|
| 17 |
+
dimensional data analysis. It usually involves singular value decom-
|
| 18 |
+
position (SVD) of large-scale matrices with high computational com-
|
| 19 |
+
plexity. Sketching is an effective data compression and dimension-
|
| 20 |
+
ality reduction technique applied to the low-rank approximation of
|
| 21 |
+
large matrices. This paper presents two practical randomized algo-
|
| 22 |
+
rithms for low-rank Tucker approximation of large tensors based
|
| 23 |
+
on sketching and power scheme, with a rigorous error-bound analy-
|
| 24 |
+
sis. Numerical experiments on synthetic and real-world tensor data
|
| 25 |
+
demonstrate the competitive performance of the proposed algorithms.
|
| 26 |
+
Keywords: tensor sketching, randomized algorithm, Tucker decomposition,
|
| 27 |
+
subspace power iteration, high-dimensional data
|
| 28 |
+
MSC Classification: 68W20 , 15A18 , 15A69
|
| 29 |
+
1
|
| 30 |
+
|
| 31 |
+
2
|
| 32 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 33 |
+
1 Introduction
|
| 34 |
+
In practical applications, high-dimensional data, such as color images, hyper-
|
| 35 |
+
spectral images and videos, often exhibit a low-rank structure. Low-rank
|
| 36 |
+
approximation of tensors has become a general tool for compressing and
|
| 37 |
+
approximating high-dimensional data and has been widely used in scientific
|
| 38 |
+
computing, machine learning, signal/image processing, data mining, and many
|
| 39 |
+
other fields [1]. The classical low-rank tensor factorization models include,
|
| 40 |
+
e.g., Canonical Polyadic decomposition (CP) [2, 3], Tucker decomposition [4–
|
| 41 |
+
6], Hierarchical Tucker (HT) [7, 8], and Tensor Train decomposition (TT)
|
| 42 |
+
[9]. This paper focuses on low-rank Tucker decomposition, also known as
|
| 43 |
+
the low multilinear rank approximation of tensors. When the target rank
|
| 44 |
+
of Tucker decomposition is much smaller than the original dimensions, it
|
| 45 |
+
will have good compression performance. For a given Nth-order tensor X ∈
|
| 46 |
+
RI1×I2×...×IN , the low-rank Tucker decomposition can be formulated as the
|
| 47 |
+
following optimization problem, i.e.,
|
| 48 |
+
min
|
| 49 |
+
Y ∥X − Y∥2
|
| 50 |
+
F ,
|
| 51 |
+
(1)
|
| 52 |
+
where Y ∈ RI1×I2×...×IN , with rank(Y(n)) ≤ rn for n = 1, 2, . . ., N, Y(n) is the
|
| 53 |
+
mode-n unfolding matrix of Y, and rn is the rank of the mode-n unfolding
|
| 54 |
+
matrix of X.
|
| 55 |
+
For the Tucker approximation of higher-order tensors, the most fre-
|
| 56 |
+
quently used non-iterative algorithms are the improved algorithms for the
|
| 57 |
+
higher-order singular value decomposition (HOSVD) [5], the truncated higher-
|
| 58 |
+
order SVD (THOSVD) [10] and the sequentially truncated higher-order SVD
|
| 59 |
+
(STHOSVD) [11]. Although the results of THOSVD and STHOSVD are usu-
|
| 60 |
+
ally sub-optimal, they can use as reasonable initial solutions for iterative
|
| 61 |
+
methods such as higher-order orthogonal iteration (HOOI) [10]. However, both
|
| 62 |
+
algorithms rely directly on SVD when computing the singular vectors of inter-
|
| 63 |
+
mediate matrices, requiring large memory and high computational complexity
|
| 64 |
+
when the size of tensors is large.
|
| 65 |
+
Strikingly, randomized algorithms can reduce the communication among
|
| 66 |
+
different levels of memories and are parallelizable. In recent years, many schol-
|
| 67 |
+
ars have become increasingly interested in randomized algorithms for finding
|
| 68 |
+
approximation Tucker decomposition of large-scale data tensors [12–17, 19, 20].
|
| 69 |
+
For example, Zhou et al. [12] proposed a randomized version of the HOOI
|
| 70 |
+
algorithm for Tucker decomposition. Che and Wei [13] proposed an adaptive
|
| 71 |
+
randomized algorithm to solve the multilinear rank of tensors. Minster et al.
|
| 72 |
+
[14] designed randomized versions of the THOSVD and STHOSVD algorithms,
|
| 73 |
+
i.e., R-STHOSVD. Sun et al. [17] presented a single-pass randomized algorithm
|
| 74 |
+
to compute the low-rank Tucker approximation of tensors based on a practical
|
| 75 |
+
matrix sketching algorithm for streaming data, see also [18] for more details.
|
| 76 |
+
Regarding more randomized algorithms proposed for Tucker decomposition,
|
| 77 |
+
please refer to [15, 16, 19, 20] for a detailed review of randomized algorithms
|
| 78 |
+
|
| 79 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 80 |
+
3
|
| 81 |
+
for solving Tucker decomposition of tensors in recent years involving, e.g., ran-
|
| 82 |
+
dom projection, sampling, count-sketch, random least-squares, single-pass, and
|
| 83 |
+
multi-pass algorithms.
|
| 84 |
+
This paper presents two efficient randomized algorithms for finding the
|
| 85 |
+
low-rank Tucker approximation of tensors, i.e., Sketch-STHOSVD and sub-
|
| 86 |
+
Sketch-STHOSVD summarized in Algorithms 6 and 8, respectively. The main
|
| 87 |
+
contributions of this paper are threefold. Firstly, we propose a new one-pass
|
| 88 |
+
sketching algorithm (i.e., Algorithm 6) for low-rank Tucker approximation,
|
| 89 |
+
which can significantly improve the computational efficiency of STHOSVD.
|
| 90 |
+
Secondly, we present a new matrix sketching algorithm (i.e., Algorithm 7) by
|
| 91 |
+
combining the two-sided sketching algorithm proposed by Tropp et al. [18]
|
| 92 |
+
with subspace power iteration. Algorithm 7 can accurately and efficiently com-
|
| 93 |
+
pute the low-rank approximation of large-scale matrices. Thirdly, the proposed
|
| 94 |
+
Algorithm 8 can deliver a more accurate Tucker approximation than sim-
|
| 95 |
+
pler randomized algorithms by combining the subspace power iteration. More
|
| 96 |
+
importantly, sub-Sketch-STHOSVD can converge quickly for any data tensors
|
| 97 |
+
and independently of singular value gaps.
|
| 98 |
+
The rest of this paper is organized as follows. Section 2 briefly introduces
|
| 99 |
+
some basic notations, definitions, and tensor-matrix operations used in this
|
| 100 |
+
paper and recalls some classical algorithms, including THOSVD, STHOSVD,
|
| 101 |
+
and R-STHOSVD, for low-rank Tucker approximation. Our proposed two-
|
| 102 |
+
sided sketching algorithm for STHOSVD is given in Section 3. In Section 4,
|
| 103 |
+
we present an improved algorithm with subspace power iteration. The effec-
|
| 104 |
+
tiveness of the proposed algorithms is validated thoroughly in Section 5 by
|
| 105 |
+
numerical experiments on synthetic and real-world data tensors. We conclude
|
| 106 |
+
in Section 6.
|
| 107 |
+
2 Preliminary
|
| 108 |
+
2.1 Notations and basic operations
|
| 109 |
+
Some common symbols used in this paper are shown in the following Table 1.
|
| 110 |
+
Table 1 Common symbols used in this paper.
|
| 111 |
+
Symbols
|
| 112 |
+
Notations
|
| 113 |
+
a
|
| 114 |
+
scalar
|
| 115 |
+
A
|
| 116 |
+
matrix
|
| 117 |
+
X
|
| 118 |
+
tensor
|
| 119 |
+
X(n)
|
| 120 |
+
mode-n unfolding matrix of X
|
| 121 |
+
×n
|
| 122 |
+
mode-n product of tensor and matrix
|
| 123 |
+
In
|
| 124 |
+
identity matrix with size n × n
|
| 125 |
+
σi(A)
|
| 126 |
+
the ith largest singular value of A
|
| 127 |
+
A⊤
|
| 128 |
+
transpose of A
|
| 129 |
+
A†
|
| 130 |
+
pseudo-inverse of A
|
| 131 |
+
|
| 132 |
+
4
|
| 133 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 134 |
+
We denote an Nth-order tensor X ∈ RI1×I2×...×IN with entries given by
|
| 135 |
+
xi1,i2,...,iN, 1 ≤ in ≤ In, n = 1, 2, ..., N. The Frobenius norm of X is defined as
|
| 136 |
+
∥X∥F =
|
| 137 |
+
�
|
| 138 |
+
�
|
| 139 |
+
�
|
| 140 |
+
�
|
| 141 |
+
I1,I2,...,IN
|
| 142 |
+
�
|
| 143 |
+
i1,i2,...,iN
|
| 144 |
+
x2
|
| 145 |
+
i1,i2,...,iN .
|
| 146 |
+
The mode-n tensor-matrix multiplication is a frequently encountered operation
|
| 147 |
+
in tensor computation. The mode-n product of a tensor X ∈ RI1×I2×...×IN
|
| 148 |
+
by a matrix A ∈ RK×In (with entries ak,in) is denoted as Y = X ×n A ∈
|
| 149 |
+
RI1×...×In−1×K×In+1×...×IN, with entries
|
| 150 |
+
yi1,...,in−1,k,in+1,...,iN =
|
| 151 |
+
In
|
| 152 |
+
�
|
| 153 |
+
in=1
|
| 154 |
+
xi1,...,in−1,in,in+1,...,iNak,in.
|
| 155 |
+
The mode-n matricization of higher-order tensors is the reordering of ten-
|
| 156 |
+
sor elements into a matrix. The columns of mode-n unfolding matrix X(n) ∈
|
| 157 |
+
RIn×(�
|
| 158 |
+
N̸=n IN ) are the mode-n fibers of X. More specifically, a element
|
| 159 |
+
(i1, i2, ..., iN) of X is maps on a element (in, j) of X(n), where
|
| 160 |
+
j = 1 +
|
| 161 |
+
N
|
| 162 |
+
�
|
| 163 |
+
k=1,k̸=n
|
| 164 |
+
[(ik − 1)
|
| 165 |
+
k−1
|
| 166 |
+
�
|
| 167 |
+
m=1,m̸=n
|
| 168 |
+
Im].
|
| 169 |
+
Let the rank of mode-n unfolding matrix X(n) is rn, the integer array
|
| 170 |
+
(r1, r2, ..., rN) is Tucker-rank of Nth-order tensor X, also known as the mul-
|
| 171 |
+
tilinear rank. The Tucker decomposition of X with rank (r1, r2, ..., rN) is
|
| 172 |
+
expressed as
|
| 173 |
+
X = G ×1 U (1) ×2 U (2) . . . ×N U (N),
|
| 174 |
+
(2)
|
| 175 |
+
where G ∈ Rr1×r2×...×rN is the core tensor, and {U (n)}N
|
| 176 |
+
n=1 with U (n) ∈ RIn×rn
|
| 177 |
+
is the mode-n factor matrices. The graphical illustration of Tucker decom-
|
| 178 |
+
position for a third-order tensor shows in Figure 1. We denote an optimal
|
| 179 |
+
rank-(r1, r2, ..., rN) approximation of a tensor X as ˆ
|
| 180 |
+
Xopt, which is the optimal
|
| 181 |
+
Tucker approximation by solving the minimization problem in (1). Below we
|
| 182 |
+
Fig. 1 Tucker decomposition of a third-order tensor.
|
| 183 |
+
present the definitions of some concepts used in this paper.
|
| 184 |
+
|
| 185 |
+
B
|
| 186 |
+
9
|
| 187 |
+
3
|
| 188 |
+
2
|
| 189 |
+
ASketching Algorithms for Low-Rank Tucker Approximation
|
| 190 |
+
5
|
| 191 |
+
Definition 1 (Kronecker products) The Kronecker product of matrices A ∈ Rm×n
|
| 192 |
+
and B ∈ Rk×l is defined as
|
| 193 |
+
A ⊗ B =
|
| 194 |
+
|
| 195 |
+
|
| 196 |
+
a11B
|
| 197 |
+
a12B
|
| 198 |
+
... a1nB
|
| 199 |
+
a21B
|
| 200 |
+
a22B
|
| 201 |
+
... a2nB
|
| 202 |
+
:
|
| 203 |
+
:
|
| 204 |
+
...
|
| 205 |
+
:
|
| 206 |
+
am1B am2B ... amnB
|
| 207 |
+
|
| 208 |
+
∈ Rmk×nl.
|
| 209 |
+
The Kronecker product helps express Tucker decomposition. The Tucker
|
| 210 |
+
decomposition in (2) implies
|
| 211 |
+
X(n) = U (n)G(n)(U (N) ⊗ ... ⊗ U (n+1) ⊗ U (n−1) ⊗ ... ⊗ U (1))⊤.
|
| 212 |
+
Definition 2 (Standard normal matrix) The elements of a standard normal matrix
|
| 213 |
+
follow the real standard normal distribution (i.e., Gaussian with mean zero and
|
| 214 |
+
variance one) form an independent family of standard normal random variables.
|
| 215 |
+
Definition 3 (Standard Gaussian tensor) The elements of a standard Gaussian
|
| 216 |
+
tensor follow the standard Gaussian distribution.
|
| 217 |
+
Definition 4 (Tail energy) The jth tail energy of a matrix X is defined as
|
| 218 |
+
τ 2
|
| 219 |
+
j (X) :=
|
| 220 |
+
min
|
| 221 |
+
rank(Y )<j ∥X − Y ∥2
|
| 222 |
+
F =
|
| 223 |
+
�
|
| 224 |
+
i≥j
|
| 225 |
+
σ2
|
| 226 |
+
i (X).
|
| 227 |
+
2.2 Truncated higher-order SVD
|
| 228 |
+
Since the actual Tucker rank of large-scale higher-order tensor is hard to com-
|
| 229 |
+
pute, the truncated Tucker decomposition with a pre-determined truncation
|
| 230 |
+
(r1, r2, ..., rN) is widely used in practice. THOSVD is a popular approach to
|
| 231 |
+
computing the truncated Tucker approximation, also known as the best low
|
| 232 |
+
multilinear rank-(r1, r2, ..., rN) approximation, which reads
|
| 233 |
+
min
|
| 234 |
+
G; U(1),U(2),··· ,U(N) ∥X − G ×1 U (1) ×2 U (2) · · · ×N U (N)∥2
|
| 235 |
+
F
|
| 236 |
+
s.t.
|
| 237 |
+
U (n)⊤U (n) = Irn, n ∈ {1, 2, ..., N}.
|
| 238 |
+
Algorithm 1 THOSVD
|
| 239 |
+
Require: tensor X ∈ RI1×I2×...×IN and target rank (r1, r2, . . . , rN)
|
| 240 |
+
Ensure: Tucker approximation ˆ
|
| 241 |
+
X = G ×1 U (1) ×1 U (2) · · · ×N U (N)
|
| 242 |
+
1: for n = 1, 2, . . ., N do
|
| 243 |
+
2:
|
| 244 |
+
(U (n), ∼, ∼) ← truncatedSVD(X(n), rn)
|
| 245 |
+
3: end for
|
| 246 |
+
4: G ← X×1U (1)⊤ ×2 U (2)⊤ · · · ×N U (N)⊤
|
| 247 |
+
|
| 248 |
+
6
|
| 249 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 250 |
+
Algorithm 1 summarizes the THOSVD approach. Each mode is processed
|
| 251 |
+
individually in Algorithm 1. The low-rank factor matrices of mode-n unfolding
|
| 252 |
+
matrix X(n) are computed through the truncated SVD, i.e.,
|
| 253 |
+
X(n) =
|
| 254 |
+
�
|
| 255 |
+
U (n)
|
| 256 |
+
˜
|
| 257 |
+
U (n)
|
| 258 |
+
� �S(n)
|
| 259 |
+
˜
|
| 260 |
+
S(n)
|
| 261 |
+
� �V (n)⊤
|
| 262 |
+
˜
|
| 263 |
+
V (n)⊤
|
| 264 |
+
�
|
| 265 |
+
∼= U (n)S(n)V (n)⊤,
|
| 266 |
+
where U (n)S(n)V (n)⊤ is a rank-rn approximation of X(n), the orthogonal
|
| 267 |
+
matrix U (n) ∈ RIn×rn is the mode-n factor matrix of X in Tucker decomposi-
|
| 268 |
+
tion, S(n) ∈ Rrn×rn and V (n) ∈ RI1...In−1In+1...IN×rn. Once all factor matrices
|
| 269 |
+
have been computed, the core tensor G can be computed as
|
| 270 |
+
G = X×1U (1)⊤ ×2 U (2)⊤ · · · ×N U (N)⊤ ∈ Rr1×r2×...×rN.
|
| 271 |
+
Then, the Tucker approximation ˆ
|
| 272 |
+
X of X can be computed as
|
| 273 |
+
ˆ
|
| 274 |
+
X = G ×1 U (1) ×2 U (2) · · · ×N U (N)
|
| 275 |
+
= X ×1 (U (1)U (1)⊤) ×2 (U (2)U (2)⊤) · · · ×N (U (N)U (N)⊤).
|
| 276 |
+
With the notation ∆2
|
| 277 |
+
n(X) ≜ �In
|
| 278 |
+
i=rn+1 σ2
|
| 279 |
+
i (X(n)) and ∆2
|
| 280 |
+
n(X) ≤ ∥X − ˆ
|
| 281 |
+
Xopt∥2
|
| 282 |
+
F
|
| 283 |
+
[14], the error-bound for Algorithm 1 can be stated in the following Theorem 1.
|
| 284 |
+
Theorem 1 ([11], Theorem 5.1) Let ˆ
|
| 285 |
+
X = G ×1 U(1) ×2 U(2) · · · ×N U(N) be the
|
| 286 |
+
low multilinear rank-(r1, r2, ..., rN) approximation of a tensor X ∈ RI1×I2×...×IN by
|
| 287 |
+
THOSVD. Then
|
| 288 |
+
∥X − ˆ
|
| 289 |
+
X ∥2
|
| 290 |
+
F ≤
|
| 291 |
+
N
|
| 292 |
+
�
|
| 293 |
+
n=1
|
| 294 |
+
∥X ×n (IIn − U(n)U(n)⊤)∥2
|
| 295 |
+
F =
|
| 296 |
+
N
|
| 297 |
+
�
|
| 298 |
+
n=1
|
| 299 |
+
In
|
| 300 |
+
�
|
| 301 |
+
i=rn+1
|
| 302 |
+
σ2
|
| 303 |
+
i (X(n))
|
| 304 |
+
=
|
| 305 |
+
N
|
| 306 |
+
�
|
| 307 |
+
n=1
|
| 308 |
+
∆2
|
| 309 |
+
n(X ) ≤ N∥X − ˆ
|
| 310 |
+
Xopt∥2
|
| 311 |
+
F .
|
| 312 |
+
2.3 Sequentially truncated higher-order SVD
|
| 313 |
+
Vannieuwenhoven et al.[11] proposed one more efficient and less computation-
|
| 314 |
+
ally complex approach for computing approximate Tucker decomposition of
|
| 315 |
+
tensors, called STHOSVD. Unlike THOSVD algorithm, STHOSVD updates
|
| 316 |
+
the core tensor simultaneously whenever a factor matrix has computed.
|
| 317 |
+
Given the target rank (r1, r2, . . . , rN) and a processing order sp
|
| 318 |
+
:
|
| 319 |
+
{1, 2, ..., N}, the minimization problem (1) can be formulated as the following
|
| 320 |
+
|
| 321 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 322 |
+
7
|
| 323 |
+
optimization problem
|
| 324 |
+
min
|
| 325 |
+
U(1),··· ,U(N) ∥X − X ×1 (U (1)U (1)⊤) ×2 (U (2)U (2)⊤) · · · ×N (U (N)U (N)⊤)∥2
|
| 326 |
+
F
|
| 327 |
+
=
|
| 328 |
+
min
|
| 329 |
+
U(1),··· ,U(N)(∥X ×1 (I1 − U (1)U (1)⊤)∥2
|
| 330 |
+
F + ∥ ˆ
|
| 331 |
+
X (1) ×2 (I2 − U (2)U (2)⊤)∥2
|
| 332 |
+
F +
|
| 333 |
+
· · · + ∥ ˆ
|
| 334 |
+
X (N−1) ×N (IN − U (N)U (N)⊤)∥2
|
| 335 |
+
F )
|
| 336 |
+
= min
|
| 337 |
+
U(1)(∥X ×1 (I1 − U (1)U (1)⊤)∥2
|
| 338 |
+
F + min
|
| 339 |
+
U(2)(∥ ˆ
|
| 340 |
+
X (1) ×2 (I2 − U (2)U (2)⊤)∥2
|
| 341 |
+
F +
|
| 342 |
+
min
|
| 343 |
+
U(3)(· · · + min
|
| 344 |
+
U(N) ∥ ˆ
|
| 345 |
+
X (N−1) ×N (IN − U (N)U (N)⊤)∥2
|
| 346 |
+
F ))),
|
| 347 |
+
(3)
|
| 348 |
+
where
|
| 349 |
+
ˆ
|
| 350 |
+
X (n) = X ×1 (U (1)U (1)⊤) ×2 (U (2)U (2)⊤) · · · ×n (U (n)U (n)⊤), n =
|
| 351 |
+
1, 2, ..., N − 1, denote the intermediate approximation tensors.
|
| 352 |
+
Algorithm 2 STHOSVD
|
| 353 |
+
Require: tensor X ∈ RI1×I2×...×IN , target rank (r1, r2, . . . , rN), and process-
|
| 354 |
+
ing order sp : {i1, i2, . . . , iN}
|
| 355 |
+
Ensure: Tucker approximation ˆ
|
| 356 |
+
X = G ×1 U (1) ×2 U (2) . . . ×N U (N)
|
| 357 |
+
1: G ← X
|
| 358 |
+
2: for n = i1, i2, . . . , iN do
|
| 359 |
+
3:
|
| 360 |
+
(U (n), S(n), V (n)⊤) ← truncatedSVD(G(n), rn)
|
| 361 |
+
4:
|
| 362 |
+
G ← foldn(S(n)V (n)⊤) (% forming the updated tensor from its mode-n
|
| 363 |
+
unfolding)
|
| 364 |
+
5: end for
|
| 365 |
+
In Algorithm 2, the solution U (n) of problem (3) can be obtained via
|
| 366 |
+
truncatedSVD(G(n), rn), where G(n) is mode-n unfolding matrix of the (n−1)-
|
| 367 |
+
th intermediate core tensor G = X ×n−1
|
| 368 |
+
i=1 U (i)⊤ ∈ Rr1×r2×...×rn−1×In×...×IN,
|
| 369 |
+
i.e.,
|
| 370 |
+
G(n) =
|
| 371 |
+
�
|
| 372 |
+
U (n)
|
| 373 |
+
˜
|
| 374 |
+
U (n)
|
| 375 |
+
� �S(n)
|
| 376 |
+
˜
|
| 377 |
+
S(n)
|
| 378 |
+
� �V (n)⊤
|
| 379 |
+
˜
|
| 380 |
+
V (n)⊤
|
| 381 |
+
�
|
| 382 |
+
∼= U (n)S(n)V (n)⊤,
|
| 383 |
+
where the orthogonal matrix U (n)
|
| 384 |
+
is the mode-n factor matrix, and
|
| 385 |
+
S(n)V (n)⊤ ∈ Rrn×r1...rn−1In+1...IN is used to update the n-th intermediate core
|
| 386 |
+
tensor G. Function foldn(S(n)V (n)⊤) tensorizes matrix S(n)V (n)⊤ into ten-
|
| 387 |
+
sor G ∈ Rr1×r2×...×rn×In+1×...×IN. When the target rank rn is much smaller
|
| 388 |
+
than In, the size of the updated intermediate core tensor G is much smaller
|
| 389 |
+
than original tensor. This method can significantly improve computational
|
| 390 |
+
performance. STHOSVD algorithm possesses the following error-bound.
|
| 391 |
+
Theorem 2 ([11], Theorem 6.5) Let ˆ
|
| 392 |
+
X = G ×1 U(1) ×2 U(2) . . . ×N U(N) be the
|
| 393 |
+
low multilinear rank-(r1, r2, ..., rN) approximation of a tensor X ∈ RI1×I2×...×IN by
|
| 394 |
+
|
| 395 |
+
8
|
| 396 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 397 |
+
STHOSVD with processsing order sp : {1, 2, . . . , N}. Then
|
| 398 |
+
∥X − ˆ
|
| 399 |
+
X ∥2
|
| 400 |
+
F =
|
| 401 |
+
N
|
| 402 |
+
�
|
| 403 |
+
n=1
|
| 404 |
+
∥ ˆ
|
| 405 |
+
X (n−1) − ˆ
|
| 406 |
+
X (n)∥2
|
| 407 |
+
F ≤
|
| 408 |
+
N
|
| 409 |
+
�
|
| 410 |
+
n=1
|
| 411 |
+
∥X ×n (IIn − U(n)U(n)⊤)∥2
|
| 412 |
+
F
|
| 413 |
+
=
|
| 414 |
+
N
|
| 415 |
+
�
|
| 416 |
+
n=1
|
| 417 |
+
∆2
|
| 418 |
+
n(X ) ≤ N∥X − ˆ
|
| 419 |
+
Xopt∥2
|
| 420 |
+
F .
|
| 421 |
+
Although STHOSVD has the same error-bound as THOSVD, it is less com-
|
| 422 |
+
putationally complex and requires less storage. As shown in Section 5 for the
|
| 423 |
+
numerical experiment, the running (CPU) time of the STHOSVD algorithm
|
| 424 |
+
is significantly reduced, and the approximation error has slightly better than
|
| 425 |
+
that of THOSVD in some cases.
|
| 426 |
+
2.4 Randomized STHOSVD
|
| 427 |
+
When the dimensions of data tensors are enormous, the computational cost
|
| 428 |
+
of the classical deterministic algorithm TSVD for finding a low-rank approx-
|
| 429 |
+
imation of mode-n unfolding matrix can be expensive. Randomized low-rank
|
| 430 |
+
matrix algorithms replace original large-scale matrix with a new one through
|
| 431 |
+
a preprocessing step. The new matrix contains as much information as possi-
|
| 432 |
+
ble about the rows or columns of original data matrix. Its size is smaller than
|
| 433 |
+
original matrix, allowing the data matrix to be processed efficiently and thus
|
| 434 |
+
reducing the memory requirements for solving low-rank approximation of large
|
| 435 |
+
matrix.
|
| 436 |
+
Algorithm 3 R-SVD
|
| 437 |
+
Require: matrix A ∈ Rm×n, target rank r, and oversampling parameter p ≥ 0
|
| 438 |
+
Ensure: low-rank approximation matrix ˆA = ˆU ˆS ˆV ⊤ of A
|
| 439 |
+
1: Ω ← randn(n, r + p)
|
| 440 |
+
2: Y ← AΩ
|
| 441 |
+
3: (Q, ∼) ← thinQR(Y )
|
| 442 |
+
4: B ← Q⊤A
|
| 443 |
+
5: (U, S, V ⊤) ← thinSVD(B)
|
| 444 |
+
6: ˆU ← QU(:, 1 : r)
|
| 445 |
+
7: ˆS ← S(1 : r, 1 : r), ˆV ← V (:, 1 : r)
|
| 446 |
+
N. Halko et al. [21] proposed a randomized SVD (R-SVD) for matrices. The
|
| 447 |
+
preprocessing stage of the algorithm is performed by right multiplying original
|
| 448 |
+
data matrix A ∈ Rm×n with a random Gaussian matrix Ω ∈ Rn×r. Each
|
| 449 |
+
column of the resulting new matrix Y = AΩ ∈ Rm×r is a linear combination
|
| 450 |
+
of the columns of original data matrix. When r < n, the size of matrix Y
|
| 451 |
+
is smaller than A. The oversampling technique can improve the accuracy of
|
| 452 |
+
solutions. Subsequent computations are summarised in Algorithm 3, where
|
| 453 |
+
|
| 454 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 455 |
+
9
|
| 456 |
+
randn generates a Gaussian random matrix, thinQR produces an economy-size
|
| 457 |
+
of the QR decomposition, and thinSVD is the thin SVD decomposition. When
|
| 458 |
+
A is dense, the arithmetic cost of Algorithm 3 is O(2(r + p)mn + r2(m + n))
|
| 459 |
+
flops, where p > 0 is the oversampling parameter satisfying r+p ≤ min{m, n}.
|
| 460 |
+
Algorithm 3 is an efficient randomized algorithm for computing rank-r
|
| 461 |
+
approximations to matrices. Minster et al. [14] applied Algorithm 3 directly
|
| 462 |
+
to the STHOSVD algorithm and then presented a randomized version of
|
| 463 |
+
STHOSVD (i.e., R-STHOSVD), see Algorithm 4.
|
| 464 |
+
Algorithm 4 R-STHOSVD
|
| 465 |
+
Require: tensor X ∈ RI1×I2×...×IN , targer rank (r1, r2, . . . , rN), processing
|
| 466 |
+
order sp : {i1, i2, . . . , iN}, and oversampling parameter p ≥ 0
|
| 467 |
+
Ensure: Tucker approximation ˆ
|
| 468 |
+
X = G ×1 U (1) ×2 U (2) . . . ×N U (N)
|
| 469 |
+
1: G ← X
|
| 470 |
+
2: for n = i1, i2, . . . , iN do
|
| 471 |
+
3:
|
| 472 |
+
( ˆU, ˆS, ˆV ⊤) ← R-SVD(G(n), rn, p) (cf. Algorithm 3)
|
| 473 |
+
4:
|
| 474 |
+
U (n) ← ˆU
|
| 475 |
+
5:
|
| 476 |
+
G ← foldn( ˆS ˆV ⊤)
|
| 477 |
+
6: end for
|
| 478 |
+
3 Sketching algorithm for STHOSVD
|
| 479 |
+
A drawback of R-SVD algorithm is that when both dimensions of the inter-
|
| 480 |
+
mediate matrices are enormous, the computational cost can still be high. To
|
| 481 |
+
resolve this problem, we could resort to the two-sided sketching algorithm for
|
| 482 |
+
low-rank matrix approximation proposed by Joel A. Tropp et al. [22]. The
|
| 483 |
+
preprocessing of sketching algorithm needs two sketch matrices to contain
|
| 484 |
+
information regarding the rows and columns of input matrix A ∈ Rm×n. Thus
|
| 485 |
+
we should choose two sketch size parameters k and l, s.t. , r ≤ k ≤ min{l, n},
|
| 486 |
+
0 < l ≤ m. The random matrices Ω ∈ Rn×k and Ψ ∈ Rl×m are fixed indepen-
|
| 487 |
+
dent standard normal matrices. Then we can multiply matrix A left and right
|
| 488 |
+
respectively to obtain random sketch matrices Y ∈
|
| 489 |
+
Rm×k and W ∈ Rl×n,
|
| 490 |
+
which collect sufficient data about the input matrix to compute the low-rank
|
| 491 |
+
approximation. The dimensionality and distribution of the random sketch
|
| 492 |
+
matrices determine the approximation’s potential accuracy, with larger values
|
| 493 |
+
of k and l resulting in better approximations but also requiring more storage
|
| 494 |
+
and computational cost.
|
| 495 |
+
The sketching algorithm for low-rank approximation is given in Algorithm
|
| 496 |
+
5. Function orth(A) in Step 2 produces an orthonormal basis of A. Using
|
| 497 |
+
orthogonalization matrices will achieve smaller errors and better numerical
|
| 498 |
+
stability than directly using the randomly generated Gaussian matrices. In
|
| 499 |
+
particular, when A is dense, the arithmetic cost of Algorithm 5 is O((k +
|
| 500 |
+
l)mn + kl(m + n)) flops. Algorithm 5 is simple, practical, and possesses the
|
| 501 |
+
sub-optimal error-bound as stated in the following Theorem 3. In Theorem 3,
|
| 502 |
+
|
| 503 |
+
10
|
| 504 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 505 |
+
Algorithm 5 Sketch for low-rank approximation
|
| 506 |
+
Require: matrix A ∈ Rm×n, and sketch size parameters k, l
|
| 507 |
+
Ensure: rank-k approximation ˆA = QX of A
|
| 508 |
+
1: Ω ← randn(n, k), Ψ ← randn(l, m)
|
| 509 |
+
2: Ω ← orth(Ω), Ψ⊤ ← orth(Ψ⊤)
|
| 510 |
+
3: Y ← AΩ
|
| 511 |
+
4: W ← ΨA
|
| 512 |
+
5: (Q, ∼) ← thinQR(Y )
|
| 513 |
+
6: X ← (ΨQ)†W
|
| 514 |
+
function f(s, t) := s/(t − s − 1)(t > s + 1 > 1). The minimum in Theorem
|
| 515 |
+
3 reveals that the low rank approximation of given matrix A automatically
|
| 516 |
+
exploits the decay of tail energy.
|
| 517 |
+
Theorem 3 ([22], Theorem 4.3) Assume that the sketch size parameters satisfy
|
| 518 |
+
l > k + 1, and draw random test matrices Ω ∈ Rn×k and Ψ∈ Rl×m independently
|
| 519 |
+
forming the standard normal distribution. Then the rank-k approximation ˆA obtained
|
| 520 |
+
from Algorithm 5 satisfies
|
| 521 |
+
E ∥ A − ˆA ∥2
|
| 522 |
+
F ≤ (1 + f(k, l)) · min
|
| 523 |
+
̺<k−1(1 + f(̺, k)) · τ 2
|
| 524 |
+
̺+1(A)
|
| 525 |
+
=
|
| 526 |
+
k
|
| 527 |
+
l − k − 1 · min
|
| 528 |
+
̺<k−1
|
| 529 |
+
k
|
| 530 |
+
k − ̺ − 1 · τ 2
|
| 531 |
+
̺+1(A).
|
| 532 |
+
Using the two-sided sketching algorithm to leverage STHOSVD algorithm,
|
| 533 |
+
we propose a practical sketching algorithm for STHOSVD named Sketch-
|
| 534 |
+
STHOSVD. We summarize the procedures of Sketch-STHOSVD algorithm in
|
| 535 |
+
Algorithm 6, with its error analysis stated in Theorem 4.
|
| 536 |
+
Algorithm 6 Sketch-STHOSVD
|
| 537 |
+
Require: tensor X ∈ RI1×I2×...×IN , targer rank (r1, r2, . . . , rN), processing
|
| 538 |
+
order sp : {i1, i2, . . . , iN}, and sketch size parameters {l1, l2, ..., lN}
|
| 539 |
+
Ensure: Tucker approximation ˆ
|
| 540 |
+
X = G ×1 U (1) ×2 U (2) . . . ×N U (N)
|
| 541 |
+
1: G ← X
|
| 542 |
+
2: for n = i1, i2, . . . , iN do
|
| 543 |
+
3:
|
| 544 |
+
(Q, X) ← Sketch(G(n), rn, ln) (cf. Algorithm 5)
|
| 545 |
+
4:
|
| 546 |
+
U (n) ← Q
|
| 547 |
+
5:
|
| 548 |
+
G ← foldn(X)
|
| 549 |
+
6: end for
|
| 550 |
+
Theorem 4 Let ˆ
|
| 551 |
+
X = G ×1 U(1) ×2 U(2) . . . ×N U(N) be the Tucker approximation
|
| 552 |
+
of a tensor X ∈ RI1×I2×...×IN by the Sketch-STHOSVD algorithm (i.e., Algorithm
|
| 553 |
+
6) with target rank rn < In, n = 1, 2, ..., N, sketch size parameters {l1, l2, ..., lN} and
|
| 554 |
+
|
| 555 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 556 |
+
11
|
| 557 |
+
processing order sp : {1, 2, . . . , N}. Then
|
| 558 |
+
E{Ωj}N
|
| 559 |
+
j=1∥X − �
|
| 560 |
+
X ∥2
|
| 561 |
+
F ≤
|
| 562 |
+
N
|
| 563 |
+
�
|
| 564 |
+
n=1
|
| 565 |
+
rn
|
| 566 |
+
ln − rn − 1
|
| 567 |
+
min
|
| 568 |
+
̺n<rn−1
|
| 569 |
+
rn
|
| 570 |
+
rn − ̺n − 1∆2
|
| 571 |
+
n(X )
|
| 572 |
+
≤
|
| 573 |
+
N
|
| 574 |
+
�
|
| 575 |
+
n=1
|
| 576 |
+
rn
|
| 577 |
+
ln − rn − 1
|
| 578 |
+
min
|
| 579 |
+
̺n<rn−1
|
| 580 |
+
rn
|
| 581 |
+
rn − ̺n − 1∥X − ˆ
|
| 582 |
+
Xopt∥2
|
| 583 |
+
F .
|
| 584 |
+
Proof Combining Theorem 2 and Theorem 3, we have
|
| 585 |
+
E{Ωj}N
|
| 586 |
+
j=1∥X − �
|
| 587 |
+
X ∥2
|
| 588 |
+
F
|
| 589 |
+
=
|
| 590 |
+
N
|
| 591 |
+
�
|
| 592 |
+
n=1
|
| 593 |
+
E{Ωj}N
|
| 594 |
+
j=1∥ ˆ
|
| 595 |
+
X (n−1) − ˆ
|
| 596 |
+
X (n)∥2
|
| 597 |
+
F
|
| 598 |
+
=
|
| 599 |
+
N
|
| 600 |
+
�
|
| 601 |
+
n=1
|
| 602 |
+
E{Ωj}n−1
|
| 603 |
+
j=1
|
| 604 |
+
�
|
| 605 |
+
EΩn∥ ˆ
|
| 606 |
+
X (n−1) − ˆ
|
| 607 |
+
X (n)∥2
|
| 608 |
+
F
|
| 609 |
+
�
|
| 610 |
+
=
|
| 611 |
+
N
|
| 612 |
+
�
|
| 613 |
+
n=1
|
| 614 |
+
E{Ωj}n−1
|
| 615 |
+
j=1
|
| 616 |
+
�
|
| 617 |
+
EΩn∥G(n−1) ×n−1
|
| 618 |
+
i=1 U(i)×n(I − U(n)U(n)⊤)∥2
|
| 619 |
+
F
|
| 620 |
+
�
|
| 621 |
+
≤
|
| 622 |
+
N
|
| 623 |
+
�
|
| 624 |
+
n=1
|
| 625 |
+
E{Ωj}n−1
|
| 626 |
+
j=1
|
| 627 |
+
�
|
| 628 |
+
EΩn∥(I − U(n)U(n)⊤)Gn−1
|
| 629 |
+
n
|
| 630 |
+
)∥2
|
| 631 |
+
F
|
| 632 |
+
�
|
| 633 |
+
≤
|
| 634 |
+
N
|
| 635 |
+
�
|
| 636 |
+
n=1
|
| 637 |
+
E{Ωj}n−1
|
| 638 |
+
j=1
|
| 639 |
+
rn
|
| 640 |
+
ln − rn − 1
|
| 641 |
+
min
|
| 642 |
+
̺n<rn−1
|
| 643 |
+
rn
|
| 644 |
+
rn − ̺n − 1
|
| 645 |
+
In
|
| 646 |
+
�
|
| 647 |
+
i=rn+1
|
| 648 |
+
σ2
|
| 649 |
+
i (G(n−1)
|
| 650 |
+
(n)
|
| 651 |
+
)
|
| 652 |
+
≤
|
| 653 |
+
N
|
| 654 |
+
�
|
| 655 |
+
n=1
|
| 656 |
+
E{Ωj}n−1
|
| 657 |
+
j=1
|
| 658 |
+
rn
|
| 659 |
+
ln − rn − 1
|
| 660 |
+
min
|
| 661 |
+
̺n<rn−1
|
| 662 |
+
rn
|
| 663 |
+
rn − ̺n − 1∆2
|
| 664 |
+
n(X )
|
| 665 |
+
=
|
| 666 |
+
N
|
| 667 |
+
�
|
| 668 |
+
n=1
|
| 669 |
+
rn
|
| 670 |
+
ln − rn − 1
|
| 671 |
+
min
|
| 672 |
+
̺n<rn−1
|
| 673 |
+
rn
|
| 674 |
+
rn − ̺n − 1∆2
|
| 675 |
+
n(X )
|
| 676 |
+
≤
|
| 677 |
+
N
|
| 678 |
+
�
|
| 679 |
+
n=1
|
| 680 |
+
rn
|
| 681 |
+
ln − rn − 1
|
| 682 |
+
min
|
| 683 |
+
̺n<rn−1
|
| 684 |
+
rn
|
| 685 |
+
rn − ̺n − 1∥X − ˆ
|
| 686 |
+
Xopt∥2
|
| 687 |
+
F .
|
| 688 |
+
□
|
| 689 |
+
We assume the processing order for STHOSVD, R-STHOSVD, and Sketch-
|
| 690 |
+
STHOSVD algorithms is sp : {1, 2, ..., N}. Table 2 summarises the arithmetic
|
| 691 |
+
cost of different algorithms for the cases related to the general higher-order
|
| 692 |
+
tensor X ∈ RI1×I2×...×IN with target rank (r1, r2, . . . , rN) and the special
|
| 693 |
+
cubic tensor X ∈ RI×I×...×I with target rank (r, r, ..., r). Here the tensors are
|
| 694 |
+
dense and the target ranks rj ≪ Ij, j = 1, 2, . . ., N.
|
| 695 |
+
|
| 696 |
+
12
|
| 697 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 698 |
+
Table 2 Arithmetic cost for the algorithms THOSVD, STHOSVD, R-STHOSVD, and
|
| 699 |
+
the proposed Sketch-STHOSVD.
|
| 700 |
+
Algorithm
|
| 701 |
+
X ∈ RI1×I2×...×IN
|
| 702 |
+
X ∈ RI×I×...×I
|
| 703 |
+
THOSVD
|
| 704 |
+
O(
|
| 705 |
+
N
|
| 706 |
+
�
|
| 707 |
+
j=1
|
| 708 |
+
Ij I1:N + �N
|
| 709 |
+
j=1 r1:j Ij:N )
|
| 710 |
+
O(NIN+1 +
|
| 711 |
+
N
|
| 712 |
+
�
|
| 713 |
+
j=1
|
| 714 |
+
rj IN−j+1)
|
| 715 |
+
STHOSVD
|
| 716 |
+
O(
|
| 717 |
+
N
|
| 718 |
+
�
|
| 719 |
+
j=1
|
| 720 |
+
Ij r1:j−1Ij:N +
|
| 721 |
+
N
|
| 722 |
+
�
|
| 723 |
+
j=1
|
| 724 |
+
r1:j Ij+1:N )
|
| 725 |
+
O(
|
| 726 |
+
N
|
| 727 |
+
�
|
| 728 |
+
j=1
|
| 729 |
+
rj−1IN−j+2 + rj IN−j)
|
| 730 |
+
R-STHOSVD
|
| 731 |
+
O(
|
| 732 |
+
N
|
| 733 |
+
�
|
| 734 |
+
j=1
|
| 735 |
+
r1:jIj:N +
|
| 736 |
+
N
|
| 737 |
+
�
|
| 738 |
+
j=1
|
| 739 |
+
r1:j Ij+1:N )
|
| 740 |
+
O(
|
| 741 |
+
N
|
| 742 |
+
�
|
| 743 |
+
j=1
|
| 744 |
+
rj IN−j+1 + rj IN−j )
|
| 745 |
+
Sketch-STHOSVD
|
| 746 |
+
O(
|
| 747 |
+
N
|
| 748 |
+
�
|
| 749 |
+
j=1
|
| 750 |
+
rj lj(Ij + r1:j−1Ij+1:N ) +
|
| 751 |
+
N
|
| 752 |
+
�
|
| 753 |
+
j=1
|
| 754 |
+
r1:j Ij+1:N )
|
| 755 |
+
O(
|
| 756 |
+
N
|
| 757 |
+
�
|
| 758 |
+
j=1
|
| 759 |
+
rl(I + rj−1IN−j ) + rj IN−j )
|
| 760 |
+
4 Sketching algorithm with subspace power
|
| 761 |
+
iteration
|
| 762 |
+
When the size of original matrix is very large or the singular spectrum of
|
| 763 |
+
original matrix decays slowly, Algorithm 5 may produce a poor basis in many
|
| 764 |
+
applications. Inspired by [23], we suggest using the power iteration technique
|
| 765 |
+
to enhance the sketching algorithm by replacing A with (AA⊤)qA, where q
|
| 766 |
+
is a positive integer. According to the SVD decomposition of matrix A, i.e.,
|
| 767 |
+
A = USV ⊤, we know that (AA⊤)qA = US2q+1V ⊤. It can see that A and
|
| 768 |
+
(AA⊤)qA have the same left and right singular vectors, but the latter has a
|
| 769 |
+
faster decay rate of singular values, making its tail energy much smaller.
|
| 770 |
+
Algorithm 7 Sketching algorithm with subspace power iteration (sub-
|
| 771 |
+
Sketch)
|
| 772 |
+
Require: matrix A ∈ Rm×n, sketch size parameters k, l, and integer q > 0
|
| 773 |
+
Ensure: rank-k approximation ˆA = QX of A
|
| 774 |
+
1: Ω ← randn(n, k), Ψ ← randn(l, m)
|
| 775 |
+
2: Ω ← orth(Ω), Ψ⊤ ← orth(Ψ⊤)
|
| 776 |
+
3: Y = AΩ, W = ΨA
|
| 777 |
+
4: Q0 ← thinQR(Y )
|
| 778 |
+
5: for j = 1, . . . , q do
|
| 779 |
+
6:
|
| 780 |
+
ˆYj = A⊤Qj−1
|
| 781 |
+
7:
|
| 782 |
+
( ˆQj, ∼) ← thinQR( ˆYj)
|
| 783 |
+
8:
|
| 784 |
+
Yj = A ˆQj
|
| 785 |
+
9:
|
| 786 |
+
(Qj, ∼) ← thinQR(Yj)
|
| 787 |
+
10: end for
|
| 788 |
+
11: Q = Qq
|
| 789 |
+
12: X ← (ΨQ)†W
|
| 790 |
+
Although power iteration can improve the accuracy of Algorithm 5 to some
|
| 791 |
+
extent, it still suffers from a problem, i.e., during the execution with power
|
| 792 |
+
iteration, the rounding errors will eliminate all information about the singular
|
| 793 |
+
modes associated with the singular values. To address this issue, we propose an
|
| 794 |
+
|
| 795 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 796 |
+
13
|
| 797 |
+
improved sketching algorithm by orthonormalizing the columns of the sample
|
| 798 |
+
matrix between each application of A and A⊤, see Algorithm 7. When A is
|
| 799 |
+
dense, the arithmetic cost of Algorithm 7 is O((q + 1)(k + l)mn + kl(m + n))
|
| 800 |
+
flops. Numerical experiments show that a good approximation can achieve
|
| 801 |
+
with a choice of 1 or 2 for subspace power iteration parameter [21].
|
| 802 |
+
Algorithm 8 sub-Sketch-STHOSVD
|
| 803 |
+
Require: tensor X ∈ RI1×I2×...×IN , targer rank (r1, r2, . . . , rN), processing
|
| 804 |
+
order sp : {i1, i2, . . . , iN}, sketch size parameters {l1, l2, ..., lN}, and integer
|
| 805 |
+
q > 0
|
| 806 |
+
Ensure: Tucker approximation ˆ
|
| 807 |
+
X = G ×1 U (1) ×2 U (2) . . . ×N U (N)
|
| 808 |
+
1: G ← X
|
| 809 |
+
2: for n = i1, i2, . . . , iN do
|
| 810 |
+
3:
|
| 811 |
+
(Q, X) ← sub-Sketch(G(n), rn, ln, q) (cf. Algorithm 7)
|
| 812 |
+
4:
|
| 813 |
+
U (n) ← Q
|
| 814 |
+
5:
|
| 815 |
+
G ← foldn(X)
|
| 816 |
+
6: end for
|
| 817 |
+
Using Algorithm 7 to compute the low-rank approximations of intermedi-
|
| 818 |
+
ate matrices, we can obtain an improved sketching algorithm for STHOSVD,
|
| 819 |
+
called sub-Sketch-STHOSVD, see Algorithm 8. The error-bound for Algorithm
|
| 820 |
+
8 states in the following Theorem 5. Its proof is deferred in Appendix.
|
| 821 |
+
Theorem 5 Let ˆ
|
| 822 |
+
X = G ×1 U(1) ×2 U(2) . . . ×N U(N) be the Tucker approximation
|
| 823 |
+
of a tensor X ∈ RI1×I2×...×IN obtained by the sub-Sketch-STHOSVD algorithm
|
| 824 |
+
(i.e., Algorithm 8) with target rank rn < In, n = 1, 2, ..., N, sketch size parameters
|
| 825 |
+
{l1, l2, ..., lN} and processing order p : {1, 2, . . . , N}. Let ̟k ≡
|
| 826 |
+
σk+1
|
| 827 |
+
σk
|
| 828 |
+
denote the
|
| 829 |
+
singular value gap, then
|
| 830 |
+
E{Ωj}N
|
| 831 |
+
j=1∥X − �
|
| 832 |
+
X ∥2
|
| 833 |
+
F ≤
|
| 834 |
+
N
|
| 835 |
+
�
|
| 836 |
+
n=1
|
| 837 |
+
(1 + f(rn, ln)) ·
|
| 838 |
+
min
|
| 839 |
+
̺n<rn−1(1 + f(̺n, rn)̟r4q) · τ 2
|
| 840 |
+
̺+1(X(n))
|
| 841 |
+
≤
|
| 842 |
+
N
|
| 843 |
+
�
|
| 844 |
+
n=1
|
| 845 |
+
(1 + f(rn, ln)) ·
|
| 846 |
+
min
|
| 847 |
+
̺n<rn−1(1 + f(̺n, rn)̟r4q)∥X − ˆ
|
| 848 |
+
Xopt∥2
|
| 849 |
+
F .
|
| 850 |
+
Proof See Appendix.
|
| 851 |
+
□
|
| 852 |
+
5 Numerical experiments
|
| 853 |
+
This section conducts numerical experiments with synthetic data and
|
| 854 |
+
real-world data, including comparisons between the traditional THOSVD,
|
| 855 |
+
STHOSVD algorithms, the R-STHOSVD algorithm proposed in [14], and our
|
| 856 |
+
|
| 857 |
+
14
|
| 858 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 859 |
+
proposed algorithms Sketch-STHOSVD and sub-Sketch-STHOSVD. Regard-
|
| 860 |
+
ing the numerical settings, the oversampling parameter p = 5 is used in
|
| 861 |
+
Algorithm 3, the sketch parameters ln = rn + 2, n = 1, 2, . . ., N, are used
|
| 862 |
+
in Algorithms 6 and 8, and the power iteration parameter q = 1 is used in
|
| 863 |
+
Algorithm 8.
|
| 864 |
+
5.1 Hilbert tensor
|
| 865 |
+
Hilbert tensor is a synthetic and supersymmetric tensor, with each entry
|
| 866 |
+
defined as
|
| 867 |
+
Xi1i2...in =
|
| 868 |
+
1
|
| 869 |
+
i1 + i2 + ... + in
|
| 870 |
+
, 1 ≤ in ≤ In, n = 1, 2, ..., N.
|
| 871 |
+
In the first experiment, we set N = 5 and In = 25, n = 1, 2, . . . , N. The target
|
| 872 |
+
rank is chosen as (r, r, r, r, r), where r ∈ [1, 25]. Due to the supersymmetry of
|
| 873 |
+
the Hilbert tensor, the processing order in the algorithms does not affect the
|
| 874 |
+
final experimental results, and thus the processing order can be directly chosen
|
| 875 |
+
as sp : {1, 2, 3, 4, 5}.
|
| 876 |
+
0
|
| 877 |
+
5
|
| 878 |
+
10
|
| 879 |
+
15
|
| 880 |
+
20
|
| 881 |
+
25
|
| 882 |
+
Target rank
|
| 883 |
+
10-15
|
| 884 |
+
10-10
|
| 885 |
+
10-5
|
| 886 |
+
100
|
| 887 |
+
Relative Error
|
| 888 |
+
THOSVD
|
| 889 |
+
STHOSVD
|
| 890 |
+
R-STHOSVD
|
| 891 |
+
Sketch-STHOSVD
|
| 892 |
+
sub-Sketch-STHOSVD
|
| 893 |
+
0
|
| 894 |
+
5
|
| 895 |
+
10
|
| 896 |
+
15
|
| 897 |
+
20
|
| 898 |
+
25
|
| 899 |
+
Target rank
|
| 900 |
+
10-1
|
| 901 |
+
100
|
| 902 |
+
101
|
| 903 |
+
102
|
| 904 |
+
Running Time
|
| 905 |
+
THOSVD
|
| 906 |
+
STHOSVD
|
| 907 |
+
R-STHOSVD
|
| 908 |
+
Sketch-STHOSVD
|
| 909 |
+
sub-Sketch-STHOSVD
|
| 910 |
+
Fig. 2 Results comparison on the Hilbert tensor with a size of 25 × 25 × 25 × 25 × 25 in
|
| 911 |
+
terms of numerical error (left) and CPU time (right).
|
| 912 |
+
The results of different algorithms are given in Figure 2. It shows that our
|
| 913 |
+
proposed algorithms (i.e., Sketch-STHOSVD and sub-Sketch-STHOSVD) and
|
| 914 |
+
algorithm R-STHOSVD outperform the algorithms THOSVD and STHOSVD.
|
| 915 |
+
In particular, the error of the proposed algorithms Sketch-STHOSVD and sub-
|
| 916 |
+
Sketch-STHOSVD is comparable to R-STHOSVD (see the left plot in Figure
|
| 917 |
+
2), while they both use less CPU time than R-STHOSVD (see the right plot in
|
| 918 |
+
Figure 2). This result demonstrates the excellent performance of the proposed
|
| 919 |
+
|
| 920 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 921 |
+
15
|
| 922 |
+
algorithms and indicates that the two-sided sketching method and the subspace
|
| 923 |
+
power iteration used in our algorithms can indeed improve the performance of
|
| 924 |
+
STHOSVD algorithm.
|
| 925 |
+
For a large-scale test, we use a Hilbert tensor with a size of 500×500×500
|
| 926 |
+
and conduct experiments using ten different approximate multilinear ranks. We
|
| 927 |
+
perform the tests ten times and report the algorithms’ average running time
|
| 928 |
+
and relative error in Table 3 and Table 4, respectively. The results show that
|
| 929 |
+
the randomized algorithms can achieve higher accuracy than the deterministic
|
| 930 |
+
algorithms. The proposed Sketch-STHOSVD algorithm is the fastest, and the
|
| 931 |
+
sub-Sketch-STHOSVD algorithm achieves the highest accuracy efficiently.
|
| 932 |
+
Table 3 Results comparison in terms of the CPU time (in second) on the Hilbert tensor
|
| 933 |
+
with a size of 500 × 500 × 500 as the target rank increases.
|
| 934 |
+
Target rank
|
| 935 |
+
THOSVD
|
| 936 |
+
STHOSVD
|
| 937 |
+
R-STHOSVD
|
| 938 |
+
Sketch-STHOSVD
|
| 939 |
+
sub-Sketch-STHOSVD
|
| 940 |
+
(10,10,10)
|
| 941 |
+
17.18
|
| 942 |
+
7.49
|
| 943 |
+
0.92
|
| 944 |
+
0.86
|
| 945 |
+
0.98
|
| 946 |
+
(20,20,20)
|
| 947 |
+
23.13
|
| 948 |
+
8.87
|
| 949 |
+
1.25
|
| 950 |
+
1.05
|
| 951 |
+
1.48
|
| 952 |
+
(30,30,30)
|
| 953 |
+
24.91
|
| 954 |
+
9.35
|
| 955 |
+
1.66
|
| 956 |
+
1.53
|
| 957 |
+
2.16
|
| 958 |
+
(40,40,40)
|
| 959 |
+
28.05
|
| 960 |
+
10.41
|
| 961 |
+
1.94
|
| 962 |
+
1.44
|
| 963 |
+
2.11
|
| 964 |
+
(50,50,50)
|
| 965 |
+
29.44
|
| 966 |
+
11.39
|
| 967 |
+
2.07
|
| 968 |
+
1.67
|
| 969 |
+
2.43
|
| 970 |
+
(60,60,60)
|
| 971 |
+
30.14
|
| 972 |
+
11.07
|
| 973 |
+
2.37
|
| 974 |
+
1.90
|
| 975 |
+
2.77
|
| 976 |
+
(70,70,70)
|
| 977 |
+
29.44
|
| 978 |
+
11.18
|
| 979 |
+
2.57
|
| 980 |
+
2.10
|
| 981 |
+
3.02
|
| 982 |
+
(80,80,80)
|
| 983 |
+
29.65
|
| 984 |
+
12.30
|
| 985 |
+
3.05
|
| 986 |
+
2.54
|
| 987 |
+
3.75
|
| 988 |
+
(90,90,90)
|
| 989 |
+
31.11
|
| 990 |
+
12.80
|
| 991 |
+
3.80
|
| 992 |
+
2.80
|
| 993 |
+
4.33
|
| 994 |
+
(100,100,100)
|
| 995 |
+
32.22
|
| 996 |
+
13.51
|
| 997 |
+
4.04
|
| 998 |
+
3.07
|
| 999 |
+
4.61
|
| 1000 |
+
Table 4 Results comparison in terms of the relative error on the Hilbert tensor with a
|
| 1001 |
+
size of 500 × 500 × 500 as the target rank increases.
|
| 1002 |
+
Target rank
|
| 1003 |
+
THOSVD
|
| 1004 |
+
STHOSVD
|
| 1005 |
+
R-STHOSVD
|
| 1006 |
+
Sketch-STHOSVD
|
| 1007 |
+
sub-Sketch-STHOSVD
|
| 1008 |
+
(10,10,10)
|
| 1009 |
+
2.7354e-06
|
| 1010 |
+
2.7347e-06
|
| 1011 |
+
2.7347e-06
|
| 1012 |
+
1.1178e-05
|
| 1013 |
+
2.7568e-06
|
| 1014 |
+
(20,20,20)
|
| 1015 |
+
1.1794e-12
|
| 1016 |
+
1.1793e-12
|
| 1017 |
+
1.1794e-12
|
| 1018 |
+
7.1408e-12
|
| 1019 |
+
1.2677e-12
|
| 1020 |
+
(30,30,30)
|
| 1021 |
+
4.6574e-15
|
| 1022 |
+
3.2739e-15
|
| 1023 |
+
3.2201e-15
|
| 1024 |
+
4.0641e-15
|
| 1025 |
+
2.0182e-15
|
| 1026 |
+
(40,40,40)
|
| 1027 |
+
4.4282e-15
|
| 1028 |
+
3.4249e-15
|
| 1029 |
+
2.8212e-15
|
| 1030 |
+
2.1562e-15
|
| 1031 |
+
1.7860e-15
|
| 1032 |
+
(50,50,50)
|
| 1033 |
+
4.1628e-15
|
| 1034 |
+
3.2342e-15
|
| 1035 |
+
2.6823e-15
|
| 1036 |
+
2.3205e-15
|
| 1037 |
+
1.8625e-15
|
| 1038 |
+
(60,60,60)
|
| 1039 |
+
4.1214e-15
|
| 1040 |
+
3.1271e-15
|
| 1041 |
+
2.3652e-15
|
| 1042 |
+
2.2920e-15
|
| 1043 |
+
1.7472e-15
|
| 1044 |
+
(70,70,70)
|
| 1045 |
+
4.1085e-15
|
| 1046 |
+
3.0000e-15
|
| 1047 |
+
2.1761e-15
|
| 1048 |
+
2.0499e-15
|
| 1049 |
+
1.6370e-15
|
| 1050 |
+
(80,80,80)
|
| 1051 |
+
4.0956e-15
|
| 1052 |
+
3.1350e-15
|
| 1053 |
+
1.8382e-15
|
| 1054 |
+
1.8209e-15
|
| 1055 |
+
1.6424e-15
|
| 1056 |
+
(90,90,90)
|
| 1057 |
+
4.0792e-15
|
| 1058 |
+
3.3742e-15
|
| 1059 |
+
1.8102e-15
|
| 1060 |
+
1.7193e-15
|
| 1061 |
+
1.5264e-15
|
| 1062 |
+
(100,100,100)
|
| 1063 |
+
4.0390e-15
|
| 1064 |
+
3.0571e-15
|
| 1065 |
+
1.7323e-15
|
| 1066 |
+
1.6304e-15
|
| 1067 |
+
1.4957e-15
|
| 1068 |
+
5.2 Sparse tensor
|
| 1069 |
+
In this experiment, we test the performance of different algorithms on a sparse
|
| 1070 |
+
tensor X ∈ R200×200×200, i.e.,
|
| 1071 |
+
X =
|
| 1072 |
+
10
|
| 1073 |
+
�
|
| 1074 |
+
i=1
|
| 1075 |
+
γ
|
| 1076 |
+
i2 xi ◦ yi ◦ zi +
|
| 1077 |
+
200
|
| 1078 |
+
�
|
| 1079 |
+
i=11
|
| 1080 |
+
1
|
| 1081 |
+
i2 xi ◦ yi ◦ zi.
|
| 1082 |
+
Where xi, yi, zi ∈ Rn are sparse vectors all generated using the sprand com-
|
| 1083 |
+
mand in MATLAB with 5% nonzeros each, and γ is a user-defined parameter
|
| 1084 |
+
|
| 1085 |
+
16
|
| 1086 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 1087 |
+
20
|
| 1088 |
+
40
|
| 1089 |
+
60
|
| 1090 |
+
80
|
| 1091 |
+
100
|
| 1092 |
+
Target rank
|
| 1093 |
+
10-3
|
| 1094 |
+
10-2
|
| 1095 |
+
Relative Error
|
| 1096 |
+
THOSVD
|
| 1097 |
+
STHOSVD
|
| 1098 |
+
R-STHOSVD
|
| 1099 |
+
Sketch-STHOSVD
|
| 1100 |
+
sub-Sketch-STHOSVD
|
| 1101 |
+
20
|
| 1102 |
+
40
|
| 1103 |
+
60
|
| 1104 |
+
80
|
| 1105 |
+
100
|
| 1106 |
+
Target rank
|
| 1107 |
+
10-4
|
| 1108 |
+
10-3
|
| 1109 |
+
Relative Error
|
| 1110 |
+
THOSVD
|
| 1111 |
+
STHOSVD
|
| 1112 |
+
R-STHOSVD
|
| 1113 |
+
Sketch-STHOSVD
|
| 1114 |
+
sub-Sketch-STHOSVD
|
| 1115 |
+
20
|
| 1116 |
+
40
|
| 1117 |
+
60
|
| 1118 |
+
80
|
| 1119 |
+
100
|
| 1120 |
+
Target rank
|
| 1121 |
+
10-6
|
| 1122 |
+
10-5
|
| 1123 |
+
Relative Error
|
| 1124 |
+
THOSVD
|
| 1125 |
+
STHOSVD
|
| 1126 |
+
R-STHOSVD
|
| 1127 |
+
Sketch-STHOSVD
|
| 1128 |
+
sub-Sketch-STHOSVD
|
| 1129 |
+
20
|
| 1130 |
+
40
|
| 1131 |
+
60
|
| 1132 |
+
80
|
| 1133 |
+
100
|
| 1134 |
+
Target rank
|
| 1135 |
+
10-1
|
| 1136 |
+
100
|
| 1137 |
+
Running Time
|
| 1138 |
+
THOSVD
|
| 1139 |
+
STHOSVD
|
| 1140 |
+
R-STHOSVD
|
| 1141 |
+
Sketch-STHOSVD
|
| 1142 |
+
sub-Sketch-STHOSVD
|
| 1143 |
+
20
|
| 1144 |
+
40
|
| 1145 |
+
60
|
| 1146 |
+
80
|
| 1147 |
+
100
|
| 1148 |
+
Target rank
|
| 1149 |
+
10-1
|
| 1150 |
+
100
|
| 1151 |
+
Running Time
|
| 1152 |
+
THOSVD
|
| 1153 |
+
STHOSVD
|
| 1154 |
+
R-STHOSVD
|
| 1155 |
+
Sketch-STHOSVD
|
| 1156 |
+
sub-Sketch-STHOSVD
|
| 1157 |
+
20
|
| 1158 |
+
40
|
| 1159 |
+
60
|
| 1160 |
+
80
|
| 1161 |
+
100
|
| 1162 |
+
Target rank
|
| 1163 |
+
10-1
|
| 1164 |
+
100
|
| 1165 |
+
Running Time
|
| 1166 |
+
THOSVD
|
| 1167 |
+
STHOSVD
|
| 1168 |
+
R-STHOSVD
|
| 1169 |
+
Sketch-STHOSVD
|
| 1170 |
+
sub-Sketch-STHOSVD
|
| 1171 |
+
Fig. 3 Results comparison on a sparse tensor with a size of 200 × 200 × 200 in terms of
|
| 1172 |
+
numerical error (first row) and CPU time (second row).
|
| 1173 |
+
which determines the strength of the gap between the first ten terms and the
|
| 1174 |
+
rest terms. The target rank is chosen as (r, r, r), where r ∈ [20, 100]. The exper-
|
| 1175 |
+
imental results show in Figure 3, in which three different values γ = 2, 10, 200
|
| 1176 |
+
are tested. The increase of gap means that the tail energy will be reduced, and
|
| 1177 |
+
the accuracy of the algorithms will be improved. Our numerical experiments
|
| 1178 |
+
also verified this result.
|
| 1179 |
+
Figure 3 demonstrates the superiority of the proposed sketching algo-
|
| 1180 |
+
rithms. In particular, we see that the proposed Sketch-STHOSVD is the fastest
|
| 1181 |
+
algorithm, with a comparable error against R-STHOSVD; the proposed sub-
|
| 1182 |
+
Sketch-STHOSVD can reach the same accuracy as the STHOSVD algorithm
|
| 1183 |
+
but in much less CPU time; and the proposed sub-Sketch-STHOSVD achieves
|
| 1184 |
+
much better low-rank approximation than R-STHOSVD with similar CPU
|
| 1185 |
+
time.
|
| 1186 |
+
Now we consider the influence of noise on algorithms’ performance. Specif-
|
| 1187 |
+
ically, the sparse tensor X with noise is designed in the same manner as in
|
| 1188 |
+
|
| 1189 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 1190 |
+
17
|
| 1191 |
+
20
|
| 1192 |
+
40
|
| 1193 |
+
60
|
| 1194 |
+
80
|
| 1195 |
+
100
|
| 1196 |
+
Target rank
|
| 1197 |
+
0.19
|
| 1198 |
+
0.195
|
| 1199 |
+
0.2
|
| 1200 |
+
0.205
|
| 1201 |
+
0.21
|
| 1202 |
+
0.215
|
| 1203 |
+
0.22
|
| 1204 |
+
0.225
|
| 1205 |
+
Relative Error
|
| 1206 |
+
THOSVD
|
| 1207 |
+
STHOSVD
|
| 1208 |
+
R-STHOSVD
|
| 1209 |
+
Sketch-STHOSVD
|
| 1210 |
+
sub-Sketch-STHOSVD
|
| 1211 |
+
20
|
| 1212 |
+
40
|
| 1213 |
+
60
|
| 1214 |
+
80
|
| 1215 |
+
100
|
| 1216 |
+
Target rank
|
| 1217 |
+
0.045
|
| 1218 |
+
0.05
|
| 1219 |
+
0.055
|
| 1220 |
+
0.06
|
| 1221 |
+
Relative Error
|
| 1222 |
+
THOSVD
|
| 1223 |
+
STHOSVD
|
| 1224 |
+
R-STHOSVD
|
| 1225 |
+
Sketch-STHOSVD
|
| 1226 |
+
sub-Sketch-STHOSVD
|
| 1227 |
+
20
|
| 1228 |
+
40
|
| 1229 |
+
60
|
| 1230 |
+
80
|
| 1231 |
+
100
|
| 1232 |
+
Target rank
|
| 1233 |
+
1.45
|
| 1234 |
+
1.5
|
| 1235 |
+
1.55
|
| 1236 |
+
1.6
|
| 1237 |
+
1.65
|
| 1238 |
+
1.7
|
| 1239 |
+
1.75
|
| 1240 |
+
1.8
|
| 1241 |
+
1.85
|
| 1242 |
+
1.9
|
| 1243 |
+
1.95
|
| 1244 |
+
Relative Error
|
| 1245 |
+
10-3
|
| 1246 |
+
THOSVD
|
| 1247 |
+
STHOSVD
|
| 1248 |
+
R-STHOSVD
|
| 1249 |
+
Sketch-STHOSVD
|
| 1250 |
+
sub-Sketch-STHOSVD
|
| 1251 |
+
20
|
| 1252 |
+
40
|
| 1253 |
+
60
|
| 1254 |
+
80
|
| 1255 |
+
100
|
| 1256 |
+
Target rank
|
| 1257 |
+
10-1
|
| 1258 |
+
100
|
| 1259 |
+
Running Time
|
| 1260 |
+
THOSVD
|
| 1261 |
+
STHOSVD
|
| 1262 |
+
R-STHOSVD
|
| 1263 |
+
Sketch-STHOSVD
|
| 1264 |
+
sub-Sketch-STHOSVD
|
| 1265 |
+
20
|
| 1266 |
+
40
|
| 1267 |
+
60
|
| 1268 |
+
80
|
| 1269 |
+
100
|
| 1270 |
+
Target rank
|
| 1271 |
+
10-1
|
| 1272 |
+
100
|
| 1273 |
+
Running Time
|
| 1274 |
+
THOSVD
|
| 1275 |
+
STHOSVD
|
| 1276 |
+
R-STHOSVD
|
| 1277 |
+
Sketch-STHOSVD
|
| 1278 |
+
sub-Sketch-STHOSVD
|
| 1279 |
+
20
|
| 1280 |
+
40
|
| 1281 |
+
60
|
| 1282 |
+
80
|
| 1283 |
+
100
|
| 1284 |
+
Target rank
|
| 1285 |
+
10-1
|
| 1286 |
+
100
|
| 1287 |
+
Running Time
|
| 1288 |
+
THOSVD
|
| 1289 |
+
STHOSVD
|
| 1290 |
+
R-STHOSVD
|
| 1291 |
+
Sketch-STHOSVD
|
| 1292 |
+
sub-Sketch-STHOSVD
|
| 1293 |
+
Fig. 4 Results comparison on a 200×200×200 sparse tensor with noise in terms of numerical
|
| 1294 |
+
error (first row) and CPU time (second row).
|
| 1295 |
+
[24], i.e.,
|
| 1296 |
+
ˆ
|
| 1297 |
+
X = X + δK,
|
| 1298 |
+
where K is a standard Gaussian tensor and δ is used to control the noise
|
| 1299 |
+
level. Let δ = 10−3 and keep the rest parameters the same as the settings
|
| 1300 |
+
in the previous experiment. The relative error and running time of different
|
| 1301 |
+
algorithms are shown in Figure 4. In Figure 4, we see that noise indeed affects
|
| 1302 |
+
the accuracy of the low-rank approximation, especially when the gap is small.
|
| 1303 |
+
However, the influence of noise does not change the conclusion obtained on
|
| 1304 |
+
the case without noise. The accuracy of our sub-Sketch-STHOSVD algorithm
|
| 1305 |
+
is the highest among the randomized algorithms. As γ increases, sub-Sketch-
|
| 1306 |
+
STHOSVD can achieve almost the same accuracy as that of THOSVD and
|
| 1307 |
+
STHOSVD in a comparable CPU time against R-STHOSVD.
|
| 1308 |
+
|
| 1309 |
+
18
|
| 1310 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 1311 |
+
5.3 Real-world data tensor
|
| 1312 |
+
In this experiment, we test the performance of different algorithms on a colour
|
| 1313 |
+
image, called HDU picture1, with a size of 1200 × 1800 × 3. We also evaluate
|
| 1314 |
+
the proposed sketching algorithms on the widely used YUV Video Sequences2.
|
| 1315 |
+
Taking the ‘hall monitor’ video as an example and using the first 30 frames, a
|
| 1316 |
+
three order tensor with a size of 144 × 176 × 30 is then formed for this test.
|
| 1317 |
+
Firstly, we conduct an experiment on the HDU picture with target rank
|
| 1318 |
+
(500, 500, 3), and compare the PSNR and CPU time of different algorithms.
|
| 1319 |
+
The experimental result is shown in Figure 5, which shows that the PSNR
|
| 1320 |
+
of sub-Sketch-STHOSVD, THOSVD and STHOSVD is very similar (i.e.,
|
| 1321 |
+
∼ 40) and that sub-Sketch-STHOSVD is more efficient in terms of CPU
|
| 1322 |
+
time. R-STHOSVD and Sketch-STHOSVD are also very efficient compared to
|
| 1323 |
+
sub-Sketch-STHOSVD; however, the PSNR they achieve is 5 dB less than sub-
|
| 1324 |
+
Sketch-STHOSVD. Then we conduct separate numerical experiments on the
|
| 1325 |
+
HDU picture and the ‘hall monitor’ video clip as the target rank increases, and
|
| 1326 |
+
compare these algorithms in terms of the relative error, CPU time and PSNR,
|
| 1327 |
+
see Figure 6 and Figure 7. These experimental results again demonstrate
|
| 1328 |
+
the superiority (i.e., low error and good approximation with high efficiency)
|
| 1329 |
+
of the proposed sub-Sketch-STHOSVD algorithm in computing the Tucker
|
| 1330 |
+
decomposition approximation.
|
| 1331 |
+
Original
|
| 1332 |
+
THOSVD (2.62; 40.61)
|
| 1333 |
+
STHOSVD (1.89; 40.65)
|
| 1334 |
+
R-STHOSVD
|
| 1335 |
+
Sketch-STHOSVD
|
| 1336 |
+
sub-Sketch-STHOSVD
|
| 1337 |
+
(0.61; 34.72)
|
| 1338 |
+
(0.55; 34.63)
|
| 1339 |
+
(0.84; 39.97)
|
| 1340 |
+
Fig. 5 Results comparison on a HDU picture with a size of 1200 × 1800 × 3 in terms of
|
| 1341 |
+
PSNR (i.e., peak signal-to-noise ratio) and CPU time. The target rank is (500,500,3). The
|
| 1342 |
+
two values in e.g. (2.62; 40.61) represent the CPU time and the PSNR, respectively.
|
| 1343 |
+
In the last experiment, a larger-scale real-world tensor data is used. We
|
| 1344 |
+
choose a color image (called the LONDON picture) with a size of 4775×7155×3
|
| 1345 |
+
as the test image and consider the influence of noise. The LONDON picture
|
| 1346 |
+
1https://www.hdu.edu.cn/landscape
|
| 1347 |
+
2http://trace.eas.asu.edu/yuv/index.html
|
| 1348 |
+
|
| 1349 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 1350 |
+
19
|
| 1351 |
+
0
|
| 1352 |
+
200
|
| 1353 |
+
400
|
| 1354 |
+
600
|
| 1355 |
+
800
|
| 1356 |
+
1000
|
| 1357 |
+
Target rank
|
| 1358 |
+
-11
|
| 1359 |
+
-10
|
| 1360 |
+
-9
|
| 1361 |
+
-8
|
| 1362 |
+
-7
|
| 1363 |
+
-6
|
| 1364 |
+
-5
|
| 1365 |
+
-4
|
| 1366 |
+
Relative Error
|
| 1367 |
+
THOSVD
|
| 1368 |
+
STHOSVD
|
| 1369 |
+
R-STHOSVD
|
| 1370 |
+
Sketch-STHOSVD
|
| 1371 |
+
sub-Sketch-STHOSVD
|
| 1372 |
+
0
|
| 1373 |
+
200
|
| 1374 |
+
400
|
| 1375 |
+
600
|
| 1376 |
+
800
|
| 1377 |
+
1000
|
| 1378 |
+
Target rank
|
| 1379 |
+
0.5
|
| 1380 |
+
1
|
| 1381 |
+
1.5
|
| 1382 |
+
2
|
| 1383 |
+
2.5
|
| 1384 |
+
3
|
| 1385 |
+
3.5
|
| 1386 |
+
Running Time
|
| 1387 |
+
THOSVD
|
| 1388 |
+
STHOSVD
|
| 1389 |
+
R-STHOSVD
|
| 1390 |
+
Sketch-STHOSVD
|
| 1391 |
+
sub-Sketch-STHOSVD
|
| 1392 |
+
0
|
| 1393 |
+
200
|
| 1394 |
+
400
|
| 1395 |
+
600
|
| 1396 |
+
800
|
| 1397 |
+
1000
|
| 1398 |
+
Target rank
|
| 1399 |
+
20
|
| 1400 |
+
25
|
| 1401 |
+
30
|
| 1402 |
+
35
|
| 1403 |
+
40
|
| 1404 |
+
45
|
| 1405 |
+
50
|
| 1406 |
+
55
|
| 1407 |
+
PSNR
|
| 1408 |
+
THOSVD
|
| 1409 |
+
STHOSVD
|
| 1410 |
+
R-STHOSVD
|
| 1411 |
+
Sketch-STHOSVD
|
| 1412 |
+
sub-Sketch-STHOSVD
|
| 1413 |
+
Fig. 6 Results comparison on a HDU picture with size of 1200 × 1800 × 3 in terms of
|
| 1414 |
+
numerical error (left), CPU time (middle) and PSNR (right). The HDU picture is with target
|
| 1415 |
+
rank (r, r, 3), r ∈ [50, 1000].
|
| 1416 |
+
0
|
| 1417 |
+
20
|
| 1418 |
+
40
|
| 1419 |
+
60
|
| 1420 |
+
80
|
| 1421 |
+
100
|
| 1422 |
+
Target rank
|
| 1423 |
+
-9
|
| 1424 |
+
-8
|
| 1425 |
+
-7
|
| 1426 |
+
-6
|
| 1427 |
+
-5
|
| 1428 |
+
-4
|
| 1429 |
+
-3
|
| 1430 |
+
Relative Error
|
| 1431 |
+
THOSVD
|
| 1432 |
+
STHOSVD
|
| 1433 |
+
R-STHOSVD
|
| 1434 |
+
Sketch-STHOSVD
|
| 1435 |
+
sub-Sketch-STHOSVD
|
| 1436 |
+
0
|
| 1437 |
+
20
|
| 1438 |
+
40
|
| 1439 |
+
60
|
| 1440 |
+
80
|
| 1441 |
+
100
|
| 1442 |
+
Target rank
|
| 1443 |
+
0.005
|
| 1444 |
+
0.01
|
| 1445 |
+
0.015
|
| 1446 |
+
0.02
|
| 1447 |
+
0.025
|
| 1448 |
+
0.03
|
| 1449 |
+
0.035
|
| 1450 |
+
0.04
|
| 1451 |
+
0.045
|
| 1452 |
+
0.05
|
| 1453 |
+
0.055
|
| 1454 |
+
Running Time
|
| 1455 |
+
THOSVD
|
| 1456 |
+
STHOSVD
|
| 1457 |
+
R-STHOSVD
|
| 1458 |
+
Sketch-STHOSVD
|
| 1459 |
+
sub-Sketch-STHOSVD
|
| 1460 |
+
0
|
| 1461 |
+
20
|
| 1462 |
+
40
|
| 1463 |
+
60
|
| 1464 |
+
80
|
| 1465 |
+
100
|
| 1466 |
+
Target rank
|
| 1467 |
+
10
|
| 1468 |
+
15
|
| 1469 |
+
20
|
| 1470 |
+
25
|
| 1471 |
+
30
|
| 1472 |
+
35
|
| 1473 |
+
PSNR
|
| 1474 |
+
THOSVD
|
| 1475 |
+
STHOSVD
|
| 1476 |
+
R-STHOSVD
|
| 1477 |
+
Sketch-STHOSVD
|
| 1478 |
+
sub-Sketch-STHOSVD
|
| 1479 |
+
Fig. 7 Results comparison on the ‘hall monitor’ grey video with size of 144 × 176 × 30 in
|
| 1480 |
+
terms of numerical error (left), CPU time (middle) and PSNR (right). The ‘hall monitor’
|
| 1481 |
+
grey video is with target rank (r, r, 10), r ∈ [5, 100].
|
| 1482 |
+
with white Gaussian noise is generated using the awgn(X,SNR) built-in function
|
| 1483 |
+
in MATLAB. We set the target rank as (50,50,3) and SNR to 20. The results
|
| 1484 |
+
comparisons without and with white Gaussian noise are respectively shown in
|
| 1485 |
+
Figure 8 and Figure 9 in terms of the CPU time and PSNR. Moreover, we also
|
| 1486 |
+
test the algorithms on the LONDON picture as the target rank increases. The
|
| 1487 |
+
results regarding the relative error, the CPU time and the PSNR are reported
|
| 1488 |
+
in Tables 5, 6 and 7, respectively. On the whole, the results again show the
|
| 1489 |
+
consistent performance of the proposed methods.
|
| 1490 |
+
|
| 1491 |
+
20
|
| 1492 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 1493 |
+
Original
|
| 1494 |
+
THOSVD (154.95; 24.07)
|
| 1495 |
+
STHOSVD (49.34; 24.09)
|
| 1496 |
+
R-STHOSVD
|
| 1497 |
+
Sketch-STHOSVD
|
| 1498 |
+
sub-Sketch-STHOSVD
|
| 1499 |
+
(1.29; 21.27)
|
| 1500 |
+
(1.17; 21.09)
|
| 1501 |
+
(1.29; 23.65)
|
| 1502 |
+
Fig. 8 Results comparison on LONDON picture with a size of 4775 × 7155 × 3 in terms of
|
| 1503 |
+
CPU time and PSNR. The target rank is (50,50,3).
|
| 1504 |
+
Noisy picture(PSNR=16.92)
|
| 1505 |
+
THOSVD (160.59; 20.54)
|
| 1506 |
+
STHOSVD (50.16; 20.54)
|
| 1507 |
+
R-STHOSVD
|
| 1508 |
+
Sketch-STHOSVD
|
| 1509 |
+
sub-Sketch-STHOSVD
|
| 1510 |
+
(1,25; 19.37)
|
| 1511 |
+
(1.15; 19.25)
|
| 1512 |
+
(1.45; 20.45)
|
| 1513 |
+
Fig. 9 Results comparison on LONDON picture with a size of 4775 × 7155 × 3 and white
|
| 1514 |
+
Gaussian noise in terms of CPU time and PSNR. The target rank is (50,50,3).
|
| 1515 |
+
In summary, the numerical results show the superiority of the sub-sketch
|
| 1516 |
+
STHOSVD algorithm for large-scale tensors with or without noise. We can see
|
| 1517 |
+
that sub-Sketch-STHOSVD could achieve close approximations to that of the
|
| 1518 |
+
deterministic algorithms in a time similar to other randomized algorithms.
|
| 1519 |
+
|
| 1520 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 1521 |
+
21
|
| 1522 |
+
Table 5 Results comparison in terms of the relative error on the LONDON picture with a
|
| 1523 |
+
size of 4775 × 7155 × 3 as the target rank increases.
|
| 1524 |
+
Target rank
|
| 1525 |
+
THOSVD
|
| 1526 |
+
STHOSVD
|
| 1527 |
+
R-STHOSVD
|
| 1528 |
+
Sketch-STHOSVD
|
| 1529 |
+
sub-Sketch-STHOSVD
|
| 1530 |
+
(10,10,10)
|
| 1531 |
+
0.019037
|
| 1532 |
+
0.019025
|
| 1533 |
+
0.031000
|
| 1534 |
+
0.040006
|
| 1535 |
+
0.020756
|
| 1536 |
+
(20,20,20)
|
| 1537 |
+
0.012669
|
| 1538 |
+
0.012644
|
| 1539 |
+
0.023467
|
| 1540 |
+
0.027398
|
| 1541 |
+
0.013703
|
| 1542 |
+
(30,30,30)
|
| 1543 |
+
0.010168
|
| 1544 |
+
0.010124
|
| 1545 |
+
0.018354
|
| 1546 |
+
0.020451
|
| 1547 |
+
0.010965
|
| 1548 |
+
(40,40,40)
|
| 1549 |
+
0.008630
|
| 1550 |
+
0.008599
|
| 1551 |
+
0.015792
|
| 1552 |
+
0.017029
|
| 1553 |
+
0.009443
|
| 1554 |
+
(50,50,50)
|
| 1555 |
+
0.007576
|
| 1556 |
+
0.007532
|
| 1557 |
+
0.013917
|
| 1558 |
+
0.015333
|
| 1559 |
+
0.008286
|
| 1560 |
+
(60,60,60)
|
| 1561 |
+
0.006778
|
| 1562 |
+
0.006710
|
| 1563 |
+
0.012967
|
| 1564 |
+
0.013589
|
| 1565 |
+
0.007359
|
| 1566 |
+
(70,70,70)
|
| 1567 |
+
0.006119
|
| 1568 |
+
0.006049
|
| 1569 |
+
0.011813
|
| 1570 |
+
0.011886
|
| 1571 |
+
0.006687
|
| 1572 |
+
(80,80,80)
|
| 1573 |
+
0.005532
|
| 1574 |
+
0.005491
|
| 1575 |
+
0.010658
|
| 1576 |
+
0.011148
|
| 1577 |
+
0.006123
|
| 1578 |
+
(90,90,90)
|
| 1579 |
+
0.005076
|
| 1580 |
+
0.005023
|
| 1581 |
+
0.010018
|
| 1582 |
+
0.010378
|
| 1583 |
+
0.005602
|
| 1584 |
+
(100,100,100)
|
| 1585 |
+
0.004669
|
| 1586 |
+
0.004619
|
| 1587 |
+
0.009249
|
| 1588 |
+
0.009578
|
| 1589 |
+
0.005172
|
| 1590 |
+
Table 6 Results comparison in terms of the CPU time (in second) on the LONDON
|
| 1591 |
+
picture with a size of 4775 × 7155 × 3 as the target rank increases.
|
| 1592 |
+
Target rank
|
| 1593 |
+
THOSVD
|
| 1594 |
+
STHOSVD
|
| 1595 |
+
R-STHOSVD
|
| 1596 |
+
Sketch-STHOSVD
|
| 1597 |
+
sub-Sketch-STHOSVD
|
| 1598 |
+
(10,10,10)
|
| 1599 |
+
156.13
|
| 1600 |
+
49.22
|
| 1601 |
+
0.94
|
| 1602 |
+
0.99
|
| 1603 |
+
1.12
|
| 1604 |
+
(20,20,20)
|
| 1605 |
+
165.22
|
| 1606 |
+
77.64
|
| 1607 |
+
1.24
|
| 1608 |
+
1.48
|
| 1609 |
+
1.56
|
| 1610 |
+
(30,30,30)
|
| 1611 |
+
241.11
|
| 1612 |
+
76.57
|
| 1613 |
+
1.69
|
| 1614 |
+
1.39
|
| 1615 |
+
1.69
|
| 1616 |
+
(40,40,40)
|
| 1617 |
+
242.08
|
| 1618 |
+
74.25
|
| 1619 |
+
1.57
|
| 1620 |
+
1.45
|
| 1621 |
+
1.68
|
| 1622 |
+
(50,50,50)
|
| 1623 |
+
268.71
|
| 1624 |
+
72.85
|
| 1625 |
+
1.51
|
| 1626 |
+
1.45
|
| 1627 |
+
1.80
|
| 1628 |
+
(60,60,60)
|
| 1629 |
+
265.52
|
| 1630 |
+
77.80
|
| 1631 |
+
1.75
|
| 1632 |
+
1.51
|
| 1633 |
+
2.26
|
| 1634 |
+
(70,70,70)
|
| 1635 |
+
241.95
|
| 1636 |
+
77.82
|
| 1637 |
+
1.93
|
| 1638 |
+
1.78
|
| 1639 |
+
2.24
|
| 1640 |
+
(80,80,80)
|
| 1641 |
+
264.86
|
| 1642 |
+
73.53
|
| 1643 |
+
1.86
|
| 1644 |
+
1.74
|
| 1645 |
+
2.31
|
| 1646 |
+
(90,90,90)
|
| 1647 |
+
274.73
|
| 1648 |
+
72.67
|
| 1649 |
+
1.93
|
| 1650 |
+
1.83
|
| 1651 |
+
2.16
|
| 1652 |
+
(100,100,100)
|
| 1653 |
+
283.88
|
| 1654 |
+
86.42
|
| 1655 |
+
2.24
|
| 1656 |
+
2.20
|
| 1657 |
+
2.46
|
| 1658 |
+
Table 7 Results comparison in terms of the PSNR on the LONDON picture with a size
|
| 1659 |
+
of 4775 × 7155 × 3 as the target rank increases.
|
| 1660 |
+
Target rank
|
| 1661 |
+
THOSVD
|
| 1662 |
+
STHOSVD
|
| 1663 |
+
R-STHOSVD
|
| 1664 |
+
Sketch-STHOSVD
|
| 1665 |
+
sub-Sketch-STHOSVD
|
| 1666 |
+
(10,10,10)
|
| 1667 |
+
20.06
|
| 1668 |
+
20.07
|
| 1669 |
+
17.96
|
| 1670 |
+
16.86
|
| 1671 |
+
19.70
|
| 1672 |
+
(20,20,20)
|
| 1673 |
+
21.84
|
| 1674 |
+
21.84
|
| 1675 |
+
19.18
|
| 1676 |
+
18.51
|
| 1677 |
+
21.50
|
| 1678 |
+
(30,30,30)
|
| 1679 |
+
22.79
|
| 1680 |
+
22.81
|
| 1681 |
+
20.25
|
| 1682 |
+
19.78
|
| 1683 |
+
22.46
|
| 1684 |
+
(40,40,40)
|
| 1685 |
+
23.50
|
| 1686 |
+
23.52
|
| 1687 |
+
20.90
|
| 1688 |
+
20.57
|
| 1689 |
+
23.11
|
| 1690 |
+
(50,50,50)
|
| 1691 |
+
24.07
|
| 1692 |
+
24.09
|
| 1693 |
+
21.45
|
| 1694 |
+
21.03
|
| 1695 |
+
23.68
|
| 1696 |
+
(60,60,60)
|
| 1697 |
+
24.55
|
| 1698 |
+
24.60
|
| 1699 |
+
21.76
|
| 1700 |
+
21.55
|
| 1701 |
+
24.20
|
| 1702 |
+
(70,70,70)
|
| 1703 |
+
25.00
|
| 1704 |
+
25.05
|
| 1705 |
+
22.16
|
| 1706 |
+
22.13
|
| 1707 |
+
24.61
|
| 1708 |
+
(80,80,80)
|
| 1709 |
+
25.43
|
| 1710 |
+
25.47
|
| 1711 |
+
22.61
|
| 1712 |
+
22.41
|
| 1713 |
+
25.00
|
| 1714 |
+
(90,90,90)
|
| 1715 |
+
25.81
|
| 1716 |
+
25.85
|
| 1717 |
+
22.87
|
| 1718 |
+
22.72
|
| 1719 |
+
25.38
|
| 1720 |
+
(100,100,100)
|
| 1721 |
+
26.17
|
| 1722 |
+
26.22
|
| 1723 |
+
23.22
|
| 1724 |
+
23.07
|
| 1725 |
+
25.73
|
| 1726 |
+
6 Conclusion
|
| 1727 |
+
In this paper we proposed efficient sketching algorithms, i.e., Sketch-
|
| 1728 |
+
STHOSVD and sub-Sketch-STHOSVD, to calculate the low-rank Tucker
|
| 1729 |
+
approximation of tensors by combining the two-sided sketching technique with
|
| 1730 |
+
the STHOSVD algorithm and using the subspace power iteration. Detailed
|
| 1731 |
+
error analysis is also conducted. Numerical results on both synthetic and real-
|
| 1732 |
+
world data tensors demonstrate the competitive performance of the proposed
|
| 1733 |
+
algorithms in comparison to the state-of-the-art algorithms.
|
| 1734 |
+
Acknowledgements
|
| 1735 |
+
We would like to thank the anonymous referees for their comments and sug-
|
| 1736 |
+
gestions on our paper, which lead to great improvements of the presentation.
|
| 1737 |
+
|
| 1738 |
+
22
|
| 1739 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 1740 |
+
G. Yu’s work was supported in part by National Natural Science Foundation
|
| 1741 |
+
of China (No. 12071104) and Natural Science Foundation of Zhejiang Province
|
| 1742 |
+
(No. LD19A010002).
|
| 1743 |
+
Appendix
|
| 1744 |
+
Lemma 1 [[25], Theorem 2] Let ̺ < k − 1 be a positive natural number and Ω ∈
|
| 1745 |
+
Rk×n be a Gaussian random matrix. Suppose Q is obtained from Algorithm 7. Then
|
| 1746 |
+
∀A ∈ Rm×n, we have
|
| 1747 |
+
EΩ∥A − QQ⊤A∥2
|
| 1748 |
+
F ≤ (1 + f(̺, k)̟4q
|
| 1749 |
+
k ) · τ 2
|
| 1750 |
+
̺+1(A).
|
| 1751 |
+
(4)
|
| 1752 |
+
Lemma 2 [[22], Lemma A.3] Let A ∈ Rm×n be an input matrix and ˆA = QX
|
| 1753 |
+
be the approximation obtained from Algorithm 7. The approximation error can be
|
| 1754 |
+
decomposed as
|
| 1755 |
+
∥A − ˆA∥2
|
| 1756 |
+
F = ∥A − QQ⊤A∥2
|
| 1757 |
+
F + ∥X − Q⊤A∥2
|
| 1758 |
+
F .
|
| 1759 |
+
(5)
|
| 1760 |
+
Lemma 3 [[22], Lemma A.5] Assume Ψ ∈ Rl×n is a standard normal matrix
|
| 1761 |
+
independent from Ω. Then
|
| 1762 |
+
EΨ∥X − Q⊤A∥2
|
| 1763 |
+
F = f(k, l) · ∥A − QQ⊤A∥2
|
| 1764 |
+
F .
|
| 1765 |
+
(6)
|
| 1766 |
+
The error-bound for Algorithm 7 can be shown in Lemma 4 below.
|
| 1767 |
+
Lemma 4 Assume the sketch size parameter satisfies l > k + 1. Draw random
|
| 1768 |
+
test matrices Ω ∈ Rn×k and Ψ∈ Rl×m independently from the standard normal
|
| 1769 |
+
distribution. Then the rank-k approximation ˆA obtained from Algorithm 7 satisfies
|
| 1770 |
+
E ∥ A − ˆA ∥2
|
| 1771 |
+
F ≤ (1 + f(k, l)) · min
|
| 1772 |
+
̺<k−1(1 + f(̺, k)̟k
|
| 1773 |
+
4q) · τ 2
|
| 1774 |
+
̺+1(A).
|
| 1775 |
+
Proof Using equations (4), (5) and (6), we have
|
| 1776 |
+
E ∥ A − ˆA ∥2
|
| 1777 |
+
F = EΩ∥A − QQ⊤A∥2
|
| 1778 |
+
F + EΩEΨ∥X − Q⊤A∥2
|
| 1779 |
+
F
|
| 1780 |
+
= (1 + f(k, l)) · EΩ∥A − QQ⊤A∥2
|
| 1781 |
+
F
|
| 1782 |
+
≤ (1 + f(k, l)) · (1 + f(̺, k)̟k
|
| 1783 |
+
4q) · τ 2
|
| 1784 |
+
̺+1(A).
|
| 1785 |
+
After minimizing over eligible index ̺ < k − 1, the proof is completed.
|
| 1786 |
+
□
|
| 1787 |
+
|
| 1788 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 1789 |
+
23
|
| 1790 |
+
We are now in the position to prove Theorem 5. Combining Theorem 2
|
| 1791 |
+
and Lemma 4, we have
|
| 1792 |
+
E{Ωj}N
|
| 1793 |
+
j=1∥X − �
|
| 1794 |
+
X ∥2
|
| 1795 |
+
F
|
| 1796 |
+
=
|
| 1797 |
+
N
|
| 1798 |
+
�
|
| 1799 |
+
n=1
|
| 1800 |
+
E{Ωj}N
|
| 1801 |
+
j=1∥ ˆ
|
| 1802 |
+
X (n−1) − ˆ
|
| 1803 |
+
X (n)∥2
|
| 1804 |
+
F
|
| 1805 |
+
=
|
| 1806 |
+
N
|
| 1807 |
+
�
|
| 1808 |
+
n=1
|
| 1809 |
+
E{Ωj}n−1
|
| 1810 |
+
j=1
|
| 1811 |
+
�
|
| 1812 |
+
EΩn∥ ˆ
|
| 1813 |
+
X (n−1) − ˆ
|
| 1814 |
+
X (n)∥2
|
| 1815 |
+
F
|
| 1816 |
+
�
|
| 1817 |
+
=
|
| 1818 |
+
N
|
| 1819 |
+
�
|
| 1820 |
+
n=1
|
| 1821 |
+
E{Ωj}n−1
|
| 1822 |
+
j=1
|
| 1823 |
+
�
|
| 1824 |
+
EΩn∥G(n−1) ×n−1
|
| 1825 |
+
i=1 U (i)×n(I − U (n)U (n)⊤)∥2
|
| 1826 |
+
F
|
| 1827 |
+
�
|
| 1828 |
+
≤
|
| 1829 |
+
N
|
| 1830 |
+
�
|
| 1831 |
+
n=1
|
| 1832 |
+
E{Ωj}n−1
|
| 1833 |
+
j=1
|
| 1834 |
+
�
|
| 1835 |
+
EΩn∥(I − U (n)U (n)⊤)G(n−1)
|
| 1836 |
+
(n)
|
| 1837 |
+
)∥2
|
| 1838 |
+
F
|
| 1839 |
+
�
|
| 1840 |
+
≤
|
| 1841 |
+
N
|
| 1842 |
+
�
|
| 1843 |
+
n=1
|
| 1844 |
+
E{Ωj}n−1
|
| 1845 |
+
j=1 (1 + f(rn, ln)) ·
|
| 1846 |
+
min
|
| 1847 |
+
̺n<rn−1(1 + f(̺n, rn)̟r
|
| 1848 |
+
4q)
|
| 1849 |
+
In
|
| 1850 |
+
�
|
| 1851 |
+
i=rn+1
|
| 1852 |
+
σ2
|
| 1853 |
+
i (G(n−1)
|
| 1854 |
+
(n)
|
| 1855 |
+
)
|
| 1856 |
+
≤
|
| 1857 |
+
N
|
| 1858 |
+
�
|
| 1859 |
+
n=1
|
| 1860 |
+
E{Ωj}n−1
|
| 1861 |
+
j=1 (1 + f(rn, ln)) ·
|
| 1862 |
+
min
|
| 1863 |
+
̺n<rn−1(1 + f(̺n, rn)̟r4q)∆2
|
| 1864 |
+
n(X)
|
| 1865 |
+
=
|
| 1866 |
+
N
|
| 1867 |
+
�
|
| 1868 |
+
n=1
|
| 1869 |
+
(1 + f(rn, ln)) ·
|
| 1870 |
+
min
|
| 1871 |
+
̺n<rn−1(1 + f(̺n, rn)̟r
|
| 1872 |
+
4q)∆2
|
| 1873 |
+
n(X)
|
| 1874 |
+
≤
|
| 1875 |
+
N
|
| 1876 |
+
�
|
| 1877 |
+
n=1
|
| 1878 |
+
(1 + f(rn, ln)) ·
|
| 1879 |
+
min
|
| 1880 |
+
̺n<rn−1(1 + f(̺n, rn)̟r
|
| 1881 |
+
4q)∥X − ˆ
|
| 1882 |
+
Xopt∥2
|
| 1883 |
+
F ,
|
| 1884 |
+
which completes the proof of Theorem 5.
|
| 1885 |
+
References
|
| 1886 |
+
[1] Comon, P.: Tensors: A brief introduction. IEEE Signal Processing Maga-
|
| 1887 |
+
zine. 31(3), 44-53(2014)
|
| 1888 |
+
[2] Hitchcock, F. L.: Multiple Invariants and Generalized Rank of a P-
|
| 1889 |
+
Way Matrix or Tensor. Journal of Mathematics and Physics. 7(1-4),
|
| 1890 |
+
39-79(1928)
|
| 1891 |
+
[3] Kiers, H. A. L.: Towards a standardized notation and terminology in
|
| 1892 |
+
multiway analysis. Journal of Chemometrics Society. 14(3), 105-122(2000)
|
| 1893 |
+
[4] Tucker, L. R.: Implications of factor analysis of three-way matrices for
|
| 1894 |
+
measurement of change. Problems in measuring change. 15, 122-137(1963)
|
| 1895 |
+
|
| 1896 |
+
24
|
| 1897 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 1898 |
+
[5] Tucker, L. R.: Some mathematical notes on three-mode factor analysis.
|
| 1899 |
+
Psychometrika. 31(3), 279-311(1966)
|
| 1900 |
+
[6] De Lathauwer, L., De Moor, B., Vandewalle, J.: A multilinear singu-
|
| 1901 |
+
lar value decomposition. SIAM journal on Matrix Analysis Applications.
|
| 1902 |
+
21(4), 1253-1278(2000)
|
| 1903 |
+
[7] Hackbusch, W., K¨uhn, S.: A new scheme for the tensor representation.
|
| 1904 |
+
Journal of Fourier analysis applications. 15(5), 706-722(2009)
|
| 1905 |
+
[8] Grasedyck, L.: Hierarchical Singular Value Decomposition of Tensors.
|
| 1906 |
+
SIAM journal on Matrix Analysis Applications. 31(4), 2029-2054 (2010)
|
| 1907 |
+
[9] Oseledets, I. V.: Tensor-train decomposition. SIAM Journal on Scientific
|
| 1908 |
+
Computing. 33(5), 2295-2317(2011)
|
| 1909 |
+
[10] De Lathauwer, L., De Moor, B., Vandewalle, J.: On the best rank-1 and
|
| 1910 |
+
rank-(r1, r2,...,rn) approximation of higher-order tensors. SIAM journal
|
| 1911 |
+
on Matrix Analysis Applications. 21(4), 1324-1342(2000)
|
| 1912 |
+
[11] Vannieuwenhoven, N., Vandebril, R., Meerbergen, K.: A new truncation
|
| 1913 |
+
strategy for the higher-order singular value decomposition. SIAM Journal
|
| 1914 |
+
on Scientific Computing. 34(2), A1027-A1052(2012)
|
| 1915 |
+
[12] Zhou, G., Cichocki, A., Xie, S.: Decomposition of big tensors with low
|
| 1916 |
+
multilinear rank. arXiv preprint, arXiv:1412.1885(2014)
|
| 1917 |
+
[13] Che, M., Wei, Y.: Randomized algorithms for the approximations of
|
| 1918 |
+
Tucker and the tensor train decompositions. Advances in Computational
|
| 1919 |
+
Mathematics. 45(1), 395-428(2019)
|
| 1920 |
+
[14] Minster, R., Saibaba, A. K., Kilmer, M. E.: Randomized algorithms for
|
| 1921 |
+
low-rank tensor decompositions in the Tucker format. SIAM Journal on
|
| 1922 |
+
Mathematics of Data Science. 2(1), 189-215 (2020)
|
| 1923 |
+
[15] Che, M., Wei, Y., Yan, H.: The computation of low multilinear rank
|
| 1924 |
+
approximations of tensors via power scheme and random projection.
|
| 1925 |
+
SIAM Journal on Matrix Analysis Applications. 41(2), 605-636 (2020)
|
| 1926 |
+
[16] Che, M., Wei, Y., Yan, H.: Randomized algorithms for the low multilin-
|
| 1927 |
+
ear rank approximations of tensors. Journal of Computational Applied
|
| 1928 |
+
Mathematics. 390(2), 113380(2021)
|
| 1929 |
+
[17] Sun, Y., Guo, Y., Luo, C., Tropp, J., Udell, M.: Low-rank tucker approx-
|
| 1930 |
+
imation of a tensor from streaming data. SIAM Journal on Mathematics
|
| 1931 |
+
of Data Science. 2(4), 1123-1150(2020)
|
| 1932 |
+
|
| 1933 |
+
Sketching Algorithms for Low-Rank Tucker Approximation
|
| 1934 |
+
25
|
| 1935 |
+
[18] Tropp, J. A., Yurtsever, A., Udell, M., Cevher, V.: Streaming low-rank
|
| 1936 |
+
matrix approximation with an application to scientific simulation. SIAM
|
| 1937 |
+
Journal on Scientific Computing. 41(4), A2430-A2463(2019)
|
| 1938 |
+
[19] Malik, O. A., Becker, S.: Low-rank tucker decomposition of large tensors
|
| 1939 |
+
using tensorsketch. Advances in neural information processing systems.
|
| 1940 |
+
31, 10116-10126 (2018)
|
| 1941 |
+
[20] Ahmadi-Asl, S., Abukhovich, S., Asante-Mensah, M. G., Cichocki, A.,
|
| 1942 |
+
Phan, A. H., Tanaka, T.: Randomized algorithms for computation of
|
| 1943 |
+
Tucker decomposition and higher order SVD (HOSVD). IEEE Access. 9,
|
| 1944 |
+
28684-28706(2021)
|
| 1945 |
+
[21] Halko, N., Martinsson, P.-G., Tropp, J. A.: Finding structure with ran-
|
| 1946 |
+
domness: Probabilistic algorithms for constructing approximate matrix
|
| 1947 |
+
decompositions. SIAM review. 53(2), 217-288 (2011)
|
| 1948 |
+
[22] Tropp, J. A., Yurtsever, A., Udell, M., Cevher, V.: Practical sketching
|
| 1949 |
+
algorithms for low-rank matrix approximation. SIAM Journal on Matrix
|
| 1950 |
+
Analysis Applications. 38(4), 1454-1485(2017)
|
| 1951 |
+
[23] Rokhlin, V., Szlam, A., Tygert, M.: A randomized algorithm for princi-
|
| 1952 |
+
pal component analysis. SIAM Journal on Matrix Analysis Applications,
|
| 1953 |
+
31(3), 1100-1124(2009)
|
| 1954 |
+
[24] Xiao, C., Yang, C., Li, M.: Efficient Alternating Least Squares Algorithms
|
| 1955 |
+
for Low Multilinear Rank Approximation of Tensors. Journal of Scientific
|
| 1956 |
+
Computing. 87(3), 1-25(2021)
|
| 1957 |
+
[25] Zhang, J., Saibaba, A. K., Kilmer, M. E., Aeron, S.: A randomized tensor
|
| 1958 |
+
singular value decomposition based on the t-product. Numerical Linear
|
| 1959 |
+
Algebra with Applications. 25(5), e2179(2018)
|
| 1960 |
+
|
99FJT4oBgHgl3EQfpCw2/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
99FJT4oBgHgl3EQfpCw2/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:99160d4abd7469d43569b83852673022f7f391d8e721189d99b48392a28ab396
|
| 3 |
+
size 170524
|
9tAyT4oBgHgl3EQfQ_bX/content/tmp_files/2301.00059v1.pdf.txt
ADDED
|
@@ -0,0 +1,1576 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
1
|
| 2 |
+
|
| 3 |
+
Describing NMR chemical exchange by effective phase diffusion approach
|
| 4 |
+
Guoxing Lin*
|
| 5 |
+
Carlson School of Chemistry and Biochemistry, Clark University, Worcester, MA 01610, USA
|
| 6 |
+
|
| 7 |
+
*Email: [email protected]
|
| 8 |
+
|
| 9 |
+
Abstract
|
| 10 |
+
This paper proposes an effective phase diffusion method to analyze chemical exchange in nuclear
|
| 11 |
+
magnetic resonance (NMR). The chemical exchange involves spin jumps around different sites where the
|
| 12 |
+
spin angular frequencies vary, which leads to a random phase walk viewed from the rotating frame
|
| 13 |
+
reference. Therefore, the random walk in phase space can be treated by the effective phase diffusion
|
| 14 |
+
method. Both the coupled and uncoupled phase diffusions are considered; additionally, it includes normal
|
| 15 |
+
diffusion as well as fractional diffusion. Based on these phase diffusion equations, the line shape of NMR
|
| 16 |
+
exchange spectrum can be analyzed. By comparing these theoretical results with the conventional theory,
|
| 17 |
+
this phase diffusion approach works for fast exchange, ranging from slightly faster than intermediate
|
| 18 |
+
exchange to very fast exchange. For normal diffusion models, the theoretically predicted curves agree
|
| 19 |
+
with those predicted from traditional models in the literature, and the characteristic exchange time
|
| 20 |
+
obtained from phase diffusion with a fixed jump time is the same as that obtained from the conventional
|
| 21 |
+
model. However, the phase diffusion with a monoexponential time distribution gives a characteristic
|
| 22 |
+
exchange time constant which is half of that obtained from the traditional model. Additionally, the
|
| 23 |
+
fractional diffusion obtains a significantly different line shape than that predicted based on normal
|
| 24 |
+
diffusion.
|
| 25 |
+
Keywords: NMR, chemical exchange, Mittag-Leffler function, phase diffusion
|
| 26 |
+
|
| 27 |
+
1.
|
| 28 |
+
Introduction
|
| 29 |
+
Chemical exchange is a powerful nuclear magnetic resonance (NMR) technique to detect dynamics
|
| 30 |
+
behavior in biological and polymer systems at the atomic level [1,2,3,4]. Chemical exchange NMR
|
| 31 |
+
monitors spin jumping around different environmental sites due to changes in conformational or chemical
|
| 32 |
+
states. In chemical exchange, the angular frequency of the spin precession changes, which results in
|
| 33 |
+
observable line shape changes in the NMR spectrum. Although chemical exchange has been a established
|
| 34 |
+
tool, theoretical developments are still needed to better understand the chemical exchange NMR,
|
| 35 |
+
particularly for complex systems.
|
| 36 |
+
The characteristic exchange time could follow a complicated distribution. Many theoretical models
|
| 37 |
+
have been developed to analyze chemical exchanges in NMR [3, 5, 6]. The two-site exchange model based
|
| 38 |
+
on the modified-Bloch equation successfully interprets many NMR lines hape [5], where the jump time in
|
| 39 |
+
the exchange equation is a fixed constant. However, in a real system, the exchange time could follow a
|
| 40 |
+
distribution such as the exponential function in the Gaussian exchange model reported in [7].
|
| 41 |
+
Additionally, a complex exchange distribution could exist in complicated conformational change or
|
| 42 |
+
diffusion-induced exchange, such as Xenon diffusing in the heterogeneous system [8]. In a complex
|
| 43 |
+
system, a monoexponential time distribution may not be sufficient to explain the dynamics behavior. For
|
| 44 |
+
complicated system the time distribution function could be the Mittag-Leffler function (MLF) 𝐸𝛼 (− (
|
| 45 |
+
𝑡
|
| 46 |
+
𝜏)
|
| 47 |
+
𝛼
|
| 48 |
+
)
|
| 49 |
+
[9,10], or a stretched exponential function (SEF) exp (− (
|
| 50 |
+
𝑡
|
| 51 |
+
𝜏)
|
| 52 |
+
𝛼
|
| 53 |
+
) , where α is the time-fractional derivative
|
| 54 |
+
order, and 𝜏 is the characteristic time. The MLF 𝐸𝛼(−𝑡𝛼) = ∑
|
| 55 |
+
(−𝑡𝛼)𝑛
|
| 56 |
+
Γ(𝑛𝛼+1)
|
| 57 |
+
∞
|
| 58 |
+
𝑛=0
|
| 59 |
+
, can be reduced to a SEF
|
| 60 |
+
|
| 61 |
+
2
|
| 62 |
+
|
| 63 |
+
exp (−
|
| 64 |
+
𝑡𝛼
|
| 65 |
+
Γ(1+𝛼)) when 𝑡 is small. The SEF exp (− (
|
| 66 |
+
𝑡
|
| 67 |
+
𝜏)
|
| 68 |
+
𝛼
|
| 69 |
+
) is the same as the Kohlrausch-Williams-Watts (KWW)
|
| 70 |
+
function [11,12,13,14]], a well-known time correlation function in macromolecular systems. The Mittag-
|
| 71 |
+
Leffler function-based distribution is heavy-tailed. Mittag Leffler function has been employed to analyze
|
| 72 |
+
anomalous NMR dynamics processes such as PFG anomalous diffusion [15,16], and anomalous NMR
|
| 73 |
+
relaxation [17,18,19,20]. Currently chemical theories of NMR are still difficult to handle these complex
|
| 74 |
+
distributions.
|
| 75 |
+
A phase diffusion method is proposed in this paper to explain the NMR chemical exchange. Most
|
| 76 |
+
current methods are real space approaches, such as the modified Bloch exchange equations [3,4,6], while
|
| 77 |
+
the Gaussian exchange model is a phase space method based on evaluating the accumulated phase
|
| 78 |
+
variance for the random phase process during the exchange process. As the spin phase in the chemical
|
| 79 |
+
exchange undergoes a random walk in the rotating frame reference, an effective phase diffusion method
|
| 80 |
+
will be employed in this paper to analyze the exchange. Effective phase diffusion has been applied to
|
| 81 |
+
analyze PFG diffusion and NMR relaxation. It has advantages over the traditional methods: It can provide
|
| 82 |
+
the exact phase distribution that cannot be obtained by conventional real space theoretical method;
|
| 83 |
+
additionally, the NMR signal can be directly obtained from vector sum by Fourier transform in phase
|
| 84 |
+
space, which makes the analysis intuitive and often simplifies the solving process; furthermore, the phase
|
| 85 |
+
diffusion method could be straightforwardly applied to anomalous dynamics process based on fractional
|
| 86 |
+
diffusion [18, 21, 22, 23,24,25]. Both the normal and fractional phase diffusion are considered, where the
|
| 87 |
+
exchange time can be a simple constant or a certain type of distribution.
|
| 88 |
+
Additionally, each the individual phase jump length is proportional to the jump time and the angular
|
| 89 |
+
frequency. Because both the jump time and angular frequency fluctuate and obey certain types of
|
| 90 |
+
distributions, the distribution of phase jump length could be either strongly or weakly correlated to the
|
| 91 |
+
jump time distribution. The phase walk with weak phase time correlation can be treated by the uncoupled
|
| 92 |
+
diffusion, while the strong correlation may require coupled diffusion model [26]. The traditional
|
| 93 |
+
uncoupled diffusion has been successful in explaining many transport phenomena. However, it is
|
| 94 |
+
insufficient to account for the divergence of the second moment of Levy flight processes [26], where a
|
| 95 |
+
coupled diffusion is needed.
|
| 96 |
+
The rest of the paper is organized as follows. Section 2.1 treats the simplest normal diffusion with a
|
| 97 |
+
fixed jump time: The obtained exchange time agrees well with the traditional two-site exchange. While
|
| 98 |
+
the phase diffusion with jump time distribution is presented in Section 2.2: Firstly, the general expressions
|
| 99 |
+
for phase evolution in chemical exchange are derived in Section 2.2.1; secondly, the normal diffusion is
|
| 100 |
+
presented in Section 2.2.2, with both uncoupled and coupled diffusion, and it is found that the exchange
|
| 101 |
+
time constant is two-time faster than that of the traditional model and the fixed jump time diffusion result;
|
| 102 |
+
thirdly, the fractional diffusion with MLF based jump time distribution is derived in Section 2.2.3, where
|
| 103 |
+
the uncoupled diffusion is handled by time-fractional diffusion equation, and the coupled fractional
|
| 104 |
+
diffusion is handled by coupled random walk model [27]. The results here give additional insights into
|
| 105 |
+
the NMR chemical exchange, which could improve the analysis of NMR and magnetic resonance imaging
|
| 106 |
+
(MRI) experiments, particularly in complicated systems.
|
| 107 |
+
2. Theory
|
| 108 |
+
The chemical exchange occurs when the spin jumps among different sites where the spin precession
|
| 109 |
+
frequencies are different [1,2,5]. The precession frequencies of the spin moment are proportional to the
|
| 110 |
+
intensity of the local magnetic field, which is affected by the surrounding electron cloud and nearby spin
|
| 111 |
+
moments [2]. For simplicity, we consider only the basic exchange between two sites with equal
|
| 112 |
+
populations [3,5] in this paper, neglecting the relaxation effect. The average precession angular frequencies
|
| 113 |
+
for these two sites are arbitrarily set as 𝜔1 and 𝜔2 respectively, with 𝜔1 < 𝜔2 and
|
| 114 |
+
|
| 115 |
+
3
|
| 116 |
+
|
| 117 |
+
∆𝜔 = 𝜔2 − 𝜔1.
|
| 118 |
+
If the angular frequency of the rotating frame reference is set as
|
| 119 |
+
𝜔1+𝜔2
|
| 120 |
+
2
|
| 121 |
+
; the two sites have relative
|
| 122 |
+
angular frequencies -𝜔0 and 𝜔0, respectively, 𝜔0 =
|
| 123 |
+
𝜔2−𝜔1
|
| 124 |
+
2
|
| 125 |
+
.
|
| 126 |
+
|
| 127 |
+
The phase of spin undergoes chemical exchange during a time interval 𝜏 changes either by 𝜔0𝜏 or
|
| 128 |
+
-𝜔0𝜏 depending on the site. From the traditional exchange equations for chemical exchange, the spin
|
| 129 |
+
always jumps to a site with a different angular frequency after a time interval 𝜏. Here, the choice for
|
| 130 |
+
the next sites is assumed to be random; the next site's angular frequency could be either the same or
|
| 131 |
+
different. This assumption may be more realistic; for instance, after a time interval 𝜏, a spin may
|
| 132 |
+
successfully jump to another site or return to the original site; or in a heterogeneous system, the spin
|
| 133 |
+
moves to a similar environment with the same frequency or a different environment with a different
|
| 134 |
+
frequency. The random phase jump can be viewed as a random walk process in phase space and
|
| 135 |
+
analyzed by phase diffusion [16,17]. Both the normal and fractional phase diffusion will be
|
| 136 |
+
considered in the following.
|
| 137 |
+
2.1 Simple normal diffusion with a fixed jump time
|
| 138 |
+
If the jump time interval 𝜏 is a constant, the random phase jumps with average jump length ∆𝜙 equaling
|
| 139 |
+
−𝜔0𝜏 or 𝜔0𝜏. The effective phase diffusion constant 𝐷𝜙,𝑠 for such a simple normal diffusion can be obtained
|
| 140 |
+
by [16]
|
| 141 |
+
|
| 142 |
+
|
| 143 |
+
|
| 144 |
+
𝐷𝜙,𝑠 =
|
| 145 |
+
〈(∆𝜙)2〉
|
| 146 |
+
2𝜏
|
| 147 |
+
=
|
| 148 |
+
(𝜔0𝜏)2
|
| 149 |
+
2𝜏
|
| 150 |
+
=
|
| 151 |
+
𝜔02
|
| 152 |
+
2 τ,
|
| 153 |
+
|
| 154 |
+
|
| 155 |
+
|
| 156 |
+
(1)
|
| 157 |
+
and the normal phase diffusion equation can be described by [16,17]
|
| 158 |
+
𝑑𝑃(𝜙,𝑡)
|
| 159 |
+
𝑑𝑡
|
| 160 |
+
= 𝐷𝜙,𝑠Δ𝑃(𝜙, 𝑡),
|
| 161 |
+
|
| 162 |
+
|
| 163 |
+
|
| 164 |
+
|
| 165 |
+
( 2)
|
| 166 |
+
where 𝜙 is the phase and 𝑃(𝜙, 𝑡) is the probability density function of spin at time t with 𝜙. The solution
|
| 167 |
+
of Eq. (3) is [16]
|
| 168 |
+
𝑃(𝜙, 𝑡) =
|
| 169 |
+
1
|
| 170 |
+
√4𝜋𝐷𝜙,𝑠𝑡 𝑒𝑥𝑝 [−
|
| 171 |
+
𝜙2
|
| 172 |
+
4𝐷𝜙,𝑠𝑡].
|
| 173 |
+
|
| 174 |
+
|
| 175 |
+
(3)
|
| 176 |
+
The total magnetization 𝑀(𝑡) is obtained by
|
| 177 |
+
𝑀(𝑡) = ∫
|
| 178 |
+
𝑑𝜙
|
| 179 |
+
∞
|
| 180 |
+
−∞
|
| 181 |
+
𝑒𝑖𝜙𝑃(𝜙, 𝑡) = 𝑒𝑥𝑝(−𝐷𝜙,𝑠𝑡),
|
| 182 |
+
|
| 183 |
+
|
| 184 |
+
(4)
|
| 185 |
+
which is a time domain signal. By Fourier transform, we have the frequency domain signal
|
| 186 |
+
𝑆(𝜔) =
|
| 187 |
+
𝐷𝜙,𝑠
|
| 188 |
+
𝐷𝜙,𝑠2+𝜔2 =
|
| 189 |
+
𝜔02
|
| 190 |
+
2 τ
|
| 191 |
+
(
|
| 192 |
+
𝜔02
|
| 193 |
+
2 τ)
|
| 194 |
+
2
|
| 195 |
+
+𝜔2
|
| 196 |
+
.
|
| 197 |
+
|
| 198 |
+
|
| 199 |
+
|
| 200 |
+
(5)
|
| 201 |
+
Note that both 𝜔 and 𝜔0 are the angular frequencies in the rotating frame reference.
|
| 202 |
+
2.2 Diffusion with waiting time distribution
|
| 203 |
+
2.2.1 General expressions for phase evolution in chemical exchange
|
| 204 |
+
A more realistic exchange time should follow a certain type of time distribution function 𝜑(𝑡), which is
|
| 205 |
+
often related to the time correlation function 𝐺(𝑡) by 𝜑(𝑡) = −
|
| 206 |
+
𝑑𝐺(𝑡)
|
| 207 |
+
𝑑𝑡 . A commonly used simple time
|
| 208 |
+
correlation function is the mono exponential distribution; in contrast, in a complicated system, it can be a
|
| 209 |
+
Mittage Leffler function [20] or stretched exponential function such as the KWW function [11-14].
|
| 210 |
+
For a spin starting jumps at a time 𝑡′ from the site with frequency 𝜔𝑖,0, the probability of acquiring
|
| 211 |
+
phase 𝜔𝑖,0𝑡′+ 𝜙 at time t is
|
| 212 |
+
|
| 213 |
+
4
|
| 214 |
+
|
| 215 |
+
𝑃𝜔𝑖,0(𝜙, 𝑡) = 𝜑(𝑡′)𝑃(𝜙, 𝑡 − 𝑡′),
|
| 216 |
+
|
| 217 |
+
|
| 218 |
+
(6)
|
| 219 |
+
where the phase change 𝜔𝑖,0𝑡′ is obtained from time 0 to time 𝑡′ when the spin stays immobile at the site,
|
| 220 |
+
and 𝑃(𝜙, 𝑡 − 𝑡′) is the phase PDF resulting from the diffusion, or random walk in the phase space during
|
| 221 |
+
𝑡 − 𝑡′. Summing all possible magnetization vectors with different phase 𝜔𝑖,0𝑡′ + 𝜙, at time t, the net
|
| 222 |
+
magnetization 𝑀𝜔𝑖,0(𝑡′, 𝑡) contributed from these spins beginning to jump randomly from time 𝑡′ is
|
| 223 |
+
𝑀𝜔𝑖,0(𝑡′, 𝑡) = ∫
|
| 224 |
+
𝑑𝜙
|
| 225 |
+
∞
|
| 226 |
+
−∞
|
| 227 |
+
𝑒𝑖𝜔𝑖,0𝑡′+𝜙𝑃𝜔𝑖,0(𝜙, 𝑡 − 𝑡′) = 𝑒𝑖𝜔𝑖,0𝑡′𝜑(𝑡′)𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1 ,
|
| 228 |
+
(7)
|
| 229 |
+
where
|
| 230 |
+
𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1 = ∫
|
| 231 |
+
𝑑𝜙
|
| 232 |
+
∞
|
| 233 |
+
−∞
|
| 234 |
+
𝑒𝑖𝑘𝜙𝑃(𝜙, 𝑡 − 𝑡′).
|
| 235 |
+
|
| 236 |
+
|
| 237 |
+
(8)
|
| 238 |
+
The total magnetization from all spins in the systems at time t is
|
| 239 |
+
𝑀(𝑡) = ∫ 𝑑𝑡′
|
| 240 |
+
𝑡
|
| 241 |
+
0
|
| 242 |
+
∑ 𝑝𝑖𝑀𝜔𝑖,0(𝑡′, 𝑡)
|
| 243 |
+
𝑖
|
| 244 |
+
,
|
| 245 |
+
|
| 246 |
+
|
| 247 |
+
(9)
|
| 248 |
+
where 𝑝𝑖 is the population of spins at site i. For simplicity, only exchange with two equal population sites
|
| 249 |
+
will be considered here; let 𝜔1,0 = −𝜔0, 𝜔2,0 = 𝜔0 and all the subindexes i will be dropped out throughout
|
| 250 |
+
the rest of the paper. For a two-site system with equal populations 𝑝1 = 𝑝2 =
|
| 251 |
+
1
|
| 252 |
+
2,
|
| 253 |
+
𝑀(𝑡) = ∫ 𝑑𝑡′
|
| 254 |
+
𝑡
|
| 255 |
+
0
|
| 256 |
+
1
|
| 257 |
+
2 [𝑀−𝜔0(𝑡′, 𝑡) + 𝑀𝜔0(𝑡′, 𝑡)]
|
| 258 |
+
|
| 259 |
+
= ∫ 𝑑𝑡′
|
| 260 |
+
𝑡
|
| 261 |
+
0
|
| 262 |
+
|
| 263 |
+
1
|
| 264 |
+
2 [𝑒−𝑖𝜔0𝑡′ + 𝑒𝑖𝜔0𝑡′] 𝜑(𝑡′)𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1
|
| 265 |
+
= ∫ 𝑑𝑡′
|
| 266 |
+
𝑡
|
| 267 |
+
0
|
| 268 |
+
𝐵(𝑡′)𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1 , (10a)
|
| 269 |
+
where
|
| 270 |
+
𝐵(𝑡′) =
|
| 271 |
+
1
|
| 272 |
+
2 [𝑒−𝑖𝜔0𝑡′ + 𝑒𝑖𝜔0𝑡′]𝜑(𝑡′). (10b)
|
| 273 |
+
Eq. (10a) involves the convolution of 𝐵(𝑡′) and 𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1. In Laplace representation [25],
|
| 274 |
+
𝑀(𝑠) = 𝐵(𝑠)𝑝(𝑘, 𝑠)|𝑘=1;
|
| 275 |
+
|
| 276 |
+
|
| 277 |
+
|
| 278 |
+
(11)
|
| 279 |
+
in many cases (the coupled diffusion in the paper), the frequency domain signal can be obtained by the
|
| 280 |
+
Fourier transform of 𝑀(𝑡):
|
| 281 |
+
𝑆(𝜔) = ∫
|
| 282 |
+
𝑒𝑖𝜔𝑡𝑀(𝑡)𝑑𝑡
|
| 283 |
+
∞
|
| 284 |
+
0
|
| 285 |
+
= 𝐵(𝜔)𝑝(𝑘, 𝜔)|𝑘=1
|
| 286 |
+
|
| 287 |
+
(12)
|
| 288 |
+
2.2.2 Normal diffusion with monoexponential distribution function
|
| 289 |
+
Now, let us consider if the jump time follows a monoexponential distribution 𝜑(𝑡) described by
|
| 290 |
+
[25]
|
| 291 |
+
𝜑(𝑡) =
|
| 292 |
+
1
|
| 293 |
+
𝜏 exp (−
|
| 294 |
+
𝑡′
|
| 295 |
+
𝜏 ) ,
|
| 296 |
+
|
| 297 |
+
|
| 298 |
+
|
| 299 |
+
|
| 300 |
+
(13)
|
| 301 |
+
whose Laplace representation is
|
| 302 |
+
𝜑(𝑠) =
|
| 303 |
+
1
|
| 304 |
+
𝑠𝜏+1
|
| 305 |
+
|
| 306 |
+
|
| 307 |
+
|
| 308 |
+
|
| 309 |
+
|
| 310 |
+
(14)
|
| 311 |
+
According to Eq. (10),
|
| 312 |
+
𝐵(𝑡) =
|
| 313 |
+
1
|
| 314 |
+
2 [𝑒−𝑖𝜔0𝑡′ + 𝑒𝑖𝜔0𝑡′]
|
| 315 |
+
1
|
| 316 |
+
𝜏 exp (−
|
| 317 |
+
𝑡′
|
| 318 |
+
𝜏 ),
|
| 319 |
+
|
| 320 |
+
(15a)
|
| 321 |
+
whose Laplace representation is [25]
|
| 322 |
+
|
| 323 |
+
5
|
| 324 |
+
|
| 325 |
+
𝐵(𝑠) =
|
| 326 |
+
1
|
| 327 |
+
2 [
|
| 328 |
+
1
|
| 329 |
+
𝜏(𝑠−𝑖𝜔0)+1 +
|
| 330 |
+
1
|
| 331 |
+
𝜏(𝑠+𝑖𝜔0)+1] ≈
|
| 332 |
+
1
|
| 333 |
+
1+𝜔02𝜏2+𝜏𝑠(1−𝜔02𝜏2) =
|
| 334 |
+
1
|
| 335 |
+
1+𝜔02𝜏2
|
| 336 |
+
1+𝑠
|
| 337 |
+
𝜏(1−𝜔02𝜏2)
|
| 338 |
+
1+𝜔02𝜏2
|
| 339 |
+
.
|
| 340 |
+
(15b)
|
| 341 |
+
I.
|
| 342 |
+
Uncoupled normal diffusion
|
| 343 |
+
The spin angular frequency is often affected by a random fluctuating magnetic field, which is produced
|
| 344 |
+
by surrounding spins undergoing the thermal motion [**]; additionally, the angular frequency could be
|
| 345 |
+
affected by the electron cloud change during the exchange process; further, the chemical exchange may
|
| 346 |
+
take place because the spin moves among different domains in a heterogeneous system where the
|
| 347 |
+
frequency fluctuating around positive or negative 𝜔0 . This angular frequency can be denoted as 𝜔, and
|
| 348 |
+
the average of its absolute value is 〈|𝜔|〉 = 𝜔0. Because 𝜔 is randomly fluctuating, the individual random
|
| 349 |
+
phase jump ∆𝜙 = 𝜔��𝑗𝑢𝑚𝑝 randomly fluctuates for each jump time 𝜏𝑗𝑢𝑚𝑝; the space and time uncoupled
|
| 350 |
+
phase diffusion could be applied to treat the phase random walk, a more complicated coupled diffusion
|
| 351 |
+
will be considered in Section in subsequence. For an uncoupled diffusion,
|
| 352 |
+
〈𝜏𝑗𝑢𝑚𝑝〉 = ∫
|
| 353 |
+
𝑡
|
| 354 |
+
𝜏 exp (−
|
| 355 |
+
𝑡
|
| 356 |
+
𝜏) 𝑑𝑡 = 𝜏
|
| 357 |
+
∞
|
| 358 |
+
0
|
| 359 |
+
,
|
| 360 |
+
|
| 361 |
+
|
| 362 |
+
|
| 363 |
+
(16)
|
| 364 |
+
〈𝜏𝑗𝑢𝑚𝑝
|
| 365 |
+
2
|
| 366 |
+
〉 = ∫
|
| 367 |
+
𝑡2
|
| 368 |
+
𝜏 exp (−
|
| 369 |
+
𝑡
|
| 370 |
+
𝜏) 𝑑𝑡 = 2𝜏2
|
| 371 |
+
∞
|
| 372 |
+
0
|
| 373 |
+
.
|
| 374 |
+
|
| 375 |
+
|
| 376 |
+
|
| 377 |
+
(17)
|
| 378 |
+
The average phase jump length square 〈(∆𝜙)2〉 is
|
| 379 |
+
|
| 380 |
+
〈(∆𝜙)2〉 = 〈(|𝜔|𝜏𝑗𝑢𝑚𝑝)2〉 = 〈𝜔2〉〈𝜏𝑗𝑢𝑚𝑝
|
| 381 |
+
2
|
| 382 |
+
〉 = 𝜔0
|
| 383 |
+
22𝜏2 = 2𝜔0
|
| 384 |
+
2𝜏2.
|
| 385 |
+
|
| 386 |
+
(18)
|
| 387 |
+
Such an uncoupled random walk has an effective phase diffusion constant
|
| 388 |
+
|
| 389 |
+
𝐷𝜙 =
|
| 390 |
+
〈(∆𝜙)2〉
|
| 391 |
+
2〈𝜏𝑗𝑢𝑚𝑝〉 =
|
| 392 |
+
〈(𝜔𝜏𝑗𝑢𝑚𝑝)2〉
|
| 393 |
+
2𝜏
|
| 394 |
+
=
|
| 395 |
+
〈𝜔2〉〈𝜏𝑗𝑢𝑚𝑝
|
| 396 |
+
2
|
| 397 |
+
〉
|
| 398 |
+
2𝜏
|
| 399 |
+
=
|
| 400 |
+
𝜔022𝜏2
|
| 401 |
+
2𝜏
|
| 402 |
+
= 𝜔0
|
| 403 |
+
2𝜏.
|
| 404 |
+
|
| 405 |
+
|
| 406 |
+
(19)
|
| 407 |
+
With 𝐷𝜙 , the normal phase diffusion equation can be described by [18]
|
| 408 |
+
𝑑𝑃(𝜙,𝑡)
|
| 409 |
+
𝑑𝑡
|
| 410 |
+
= 𝐷𝜙Δ𝑃(𝜙, 𝑡).
|
| 411 |
+
|
| 412 |
+
|
| 413 |
+
|
| 414 |
+
|
| 415 |
+
(20)
|
| 416 |
+
From Eq (20), the probability density function is
|
| 417 |
+
𝑃(𝜙, 𝑡) =
|
| 418 |
+
1
|
| 419 |
+
√4𝜋𝐷𝜙𝑡 𝑒𝑥𝑝 [−
|
| 420 |
+
𝜙2
|
| 421 |
+
4𝐷𝜙𝑡].
|
| 422 |
+
|
| 423 |
+
|
| 424 |
+
(21)
|
| 425 |
+
Substituting Eq. (21) into Eq. (8), we have
|
| 426 |
+
𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1 = ∫
|
| 427 |
+
𝑑𝜙
|
| 428 |
+
∞
|
| 429 |
+
−∞
|
| 430 |
+
𝑃(𝜙, 𝑡 − 𝑡′) = 𝑒𝑥𝑝[−𝐷𝜙(𝑡 − 𝑡′)],
|
| 431 |
+
|
| 432 |
+
(22)
|
| 433 |
+
whose Laplace transform representation is
|
| 434 |
+
𝑝(𝑘, 𝑠)|𝑘=1 =
|
| 435 |
+
1
|
| 436 |
+
𝑠+𝐷𝜙.
|
| 437 |
+
|
| 438 |
+
|
| 439 |
+
|
| 440 |
+
|
| 441 |
+
|
| 442 |
+
(23)
|
| 443 |
+
Substituting Eqs. (15b) and (23) into Eq. (11) yields
|
| 444 |
+
𝑀(𝑠) = 𝐵(𝑠)𝑝(𝑘, 𝑠)|𝑘=1=
|
| 445 |
+
1
|
| 446 |
+
1+𝜔02𝜏2
|
| 447 |
+
1+𝑠
|
| 448 |
+
𝜏(1−𝜔02𝜏2)
|
| 449 |
+
1+𝜔02𝜏2
|
| 450 |
+
1
|
| 451 |
+
𝑠+𝐷𝜙.
|
| 452 |
+
|
| 453 |
+
|
| 454 |
+
(24)
|
| 455 |
+
From 𝑀(𝑠), the inverse Laplace transform gives
|
| 456 |
+
𝑀(𝑡) = ∫
|
| 457 |
+
𝑑𝑡
|
| 458 |
+
∞
|
| 459 |
+
0
|
| 460 |
+
1
|
| 461 |
+
𝜏(1−𝜔02𝜏2) exp (−
|
| 462 |
+
𝑡′
|
| 463 |
+
𝜏(1−𝜔02𝜏2)
|
| 464 |
+
1+𝜔02𝜏2
|
| 465 |
+
) 𝑒𝑥𝑝[−𝐷𝜙(𝑡 − 𝑡′)].
|
| 466 |
+
(25)
|
| 467 |
+
|
| 468 |
+
6
|
| 469 |
+
|
| 470 |
+
Eq. (25) includes the convolution of two parts, the
|
| 471 |
+
1
|
| 472 |
+
𝜏(1−𝜔02𝜏2) exp (−
|
| 473 |
+
𝑡′
|
| 474 |
+
𝜏(1−𝜔02𝜏2)
|
| 475 |
+
1+𝜔02𝜏2
|
| 476 |
+
) comes from the Fourier
|
| 477 |
+
transform of the 𝜑(𝑡), while 𝑒𝑥𝑝[−𝐷𝜙(𝑡 − 𝑡′)] results from the phase diffusion; the Frequency domain
|
| 478 |
+
signal can be obtained from the Fourier Transform of expression (25) as
|
| 479 |
+
𝑆(𝜔) =
|
| 480 |
+
1
|
| 481 |
+
1+𝜔02𝜏2
|
| 482 |
+
1+[
|
| 483 |
+
𝜏(1−𝜔02𝜏2)
|
| 484 |
+
1+𝜔02𝜏2 ]
|
| 485 |
+
2
|
| 486 |
+
𝜔2
|
| 487 |
+
|
| 488 |
+
𝐷𝜙
|
| 489 |
+
𝐷𝜙2+𝜔2.
|
| 490 |
+
|
| 491 |
+
|
| 492 |
+
(26)
|
| 493 |
+
II.
|
| 494 |
+
Coupled normal diffusion with monoexponential distribution function
|
| 495 |
+
The coupled random phase walk has a joint probability function 𝜓(𝜙, 𝑡) expressed by {25}
|
| 496 |
+
𝜓(𝜙, 𝑡) = 𝜑(𝑡)Φ(𝜙|𝑡),
|
| 497 |
+
|
| 498 |
+
|
| 499 |
+
|
| 500 |
+
|
| 501 |
+
(27)
|
| 502 |
+
where 𝜑(𝑡) is the waiting time function, and Φ(𝜙|𝑡) is the conditional probability that a phase jump length
|
| 503 |
+
𝜙 requiring time t. In Fourier-Laplace representation, the probability density function of a coupled random
|
| 504 |
+
walk has been derived in Ref. [25] as
|
| 505 |
+
𝑃(𝑘, 𝑠) =
|
| 506 |
+
Ψ(𝑘,𝑠)
|
| 507 |
+
1−𝜓(𝑘,𝑠) ,
|
| 508 |
+
|
| 509 |
+
|
| 510 |
+
|
| 511 |
+
|
| 512 |
+
(28)
|
| 513 |
+
where 𝜓(𝑘, 𝑠) is the joint probability, and Ψ(𝜙, 𝑡) is the PDF for the phase displacement of the last,
|
| 514 |
+
incomplete walk, which is [25]
|
| 515 |
+
Ψ(𝜙, 𝑡) = 𝛿( 𝜙) ∫
|
| 516 |
+
𝜑(𝑡′)𝑑𝑡′
|
| 517 |
+
∞
|
| 518 |
+
𝑡
|
| 519 |
+
,
|
| 520 |
+
|
| 521 |
+
|
| 522 |
+
|
| 523 |
+
(29a)
|
| 524 |
+
and
|
| 525 |
+
Ψ(𝑘, 𝑠) =
|
| 526 |
+
1−𝜑(𝑠)
|
| 527 |
+
𝑠
|
| 528 |
+
.
|
| 529 |
+
|
| 530 |
+
|
| 531 |
+
|
| 532 |
+
|
| 533 |
+
(29b)
|
| 534 |
+
By substituting Eq. (29b) into Eq. (28), it arrives [25]
|
| 535 |
+
𝑃(𝑘, 𝑠) =
|
| 536 |
+
Ψ(𝑘,𝑠)
|
| 537 |
+
1−𝜓(𝑘,𝑠) =
|
| 538 |
+
1−𝜑(𝑠)
|
| 539 |
+
𝑠
|
| 540 |
+
1
|
| 541 |
+
1−𝜓(𝑘,𝑠).
|
| 542 |
+
|
| 543 |
+
|
| 544 |
+
|
| 545 |
+
(30)
|
| 546 |
+
In the chemical exchange, the joint probability could be described by
|
| 547 |
+
Φ(𝜙|𝑡) =
|
| 548 |
+
1
|
| 549 |
+
2 𝛿(|𝜙| − 𝜔0𝑡),
|
| 550 |
+
|
| 551 |
+
|
| 552 |
+
|
| 553 |
+
(31a)
|
| 554 |
+
𝜓(𝜙, 𝑡) =
|
| 555 |
+
1
|
| 556 |
+
2 𝜑(𝑡)𝛿(|𝜙| − 𝜔0𝑡),
|
| 557 |
+
|
| 558 |
+
|
| 559 |
+
|
| 560 |
+
(31b)
|
| 561 |
+
and
|
| 562 |
+
𝜓(𝑘, 𝑠)=∫ 𝑒𝑖𝑘𝜙−𝑠𝑡𝜓(𝜙, 𝑡)𝑑𝜙𝑑𝑡=
|
| 563 |
+
1
|
| 564 |
+
2 [
|
| 565 |
+
1
|
| 566 |
+
𝜏(𝑠−𝑖𝑘𝜔0)+1 +
|
| 567 |
+
1
|
| 568 |
+
𝜏(𝑠+𝑖𝑘𝜔0)+1] ≈
|
| 569 |
+
1+𝜏𝑠
|
| 570 |
+
1+𝑘2𝜔02𝜏2+2𝜏𝑠.
|
| 571 |
+
|
| 572 |
+
(31c)
|
| 573 |
+
Substitute Eq. (31c) into Eq. (30), and we get
|
| 574 |
+
𝑃(𝑘, 𝑠) =
|
| 575 |
+
Ψ(𝑘,𝑠)
|
| 576 |
+
1−𝜓(𝑘,𝑠) =
|
| 577 |
+
1−𝜑(𝑠)
|
| 578 |
+
𝑠
|
| 579 |
+
1
|
| 580 |
+
1−𝜓(𝑘,𝑠) =
|
| 581 |
+
𝜏
|
| 582 |
+
1−
|
| 583 |
+
1+𝜏𝑠
|
| 584 |
+
1+𝑘2𝜔02𝜏2+2𝜏𝑠
|
| 585 |
+
.
|
| 586 |
+
|
| 587 |
+
(32)
|
| 588 |
+
and
|
| 589 |
+
|
| 590 |
+
|
| 591 |
+
|
| 592 |
+
|
| 593 |
+
|
| 594 |
+
𝑝(𝑘, 𝑠)|𝑘=1 =
|
| 595 |
+
𝜏
|
| 596 |
+
1−
|
| 597 |
+
1+𝜏𝑠
|
| 598 |
+
1+𝜔02𝜏2+2𝜏𝑠
|
| 599 |
+
.
|
| 600 |
+
|
| 601 |
+
|
| 602 |
+
|
| 603 |
+
(33)
|
| 604 |
+
|
| 605 |
+
Substituting Eqs. (15b) and (33) into Eq. (11) yields
|
| 606 |
+
|
| 607 |
+
7
|
| 608 |
+
|
| 609 |
+
|
| 610 |
+
𝑀(𝑠) =
|
| 611 |
+
1+𝜏𝑠
|
| 612 |
+
1+𝜔02𝜏2+2𝜏𝑠
|
| 613 |
+
𝜏
|
| 614 |
+
1−
|
| 615 |
+
1+𝜏𝑠
|
| 616 |
+
1+12𝜔02𝜏2+2𝜏𝑠
|
| 617 |
+
=
|
| 618 |
+
𝜏(1+𝜏𝑠)
|
| 619 |
+
𝜔02𝜏2+𝜏𝑠 ≈
|
| 620 |
+
𝜏
|
| 621 |
+
𝜏𝑠(1−𝜔02𝜏2)+𝜔02𝜏2 =
|
| 622 |
+
𝜏/𝜔02𝜏2
|
| 623 |
+
𝜏𝑠(1−𝜔02𝜏2)/𝜔02𝜏2+1
|
| 624 |
+
|
| 625 |
+
(34)
|
| 626 |
+
From 𝑀(𝑠), the inverse Laplace transform gives
|
| 627 |
+
𝑀(𝑡) =
|
| 628 |
+
1
|
| 629 |
+
1−𝜔02𝜏2 exp (−
|
| 630 |
+
𝑡
|
| 631 |
+
𝜏(1−𝜔02𝜏2)
|
| 632 |
+
𝜔02𝜏2
|
| 633 |
+
).
|
| 634 |
+
|
| 635 |
+
|
| 636 |
+
|
| 637 |
+
(35)
|
| 638 |
+
The frequency domain NMR signal can be obtained from the Fourier Transform of ���(𝑡) in Eq. (35) as
|
| 639 |
+
𝑆(𝜔) =
|
| 640 |
+
1
|
| 641 |
+
1−𝜔02𝜏2
|
| 642 |
+
𝜏(1−𝜔02𝜏2)
|
| 643 |
+
𝜔02𝜏2
|
| 644 |
+
(
|
| 645 |
+
𝜏(1−𝜔02𝜏2)
|
| 646 |
+
𝜔02𝜏2
|
| 647 |
+
)
|
| 648 |
+
2
|
| 649 |
+
𝜔2+1
|
| 650 |
+
=
|
| 651 |
+
𝜏
|
| 652 |
+
𝜏2(1−𝜔02𝜏2)2𝜔2+𝜔02𝜏2.
|
| 653 |
+
|
| 654 |
+
(36)
|
| 655 |
+
2.2.3 Fractional phase diffusion
|
| 656 |
+
For a complicated system, the time correlation function may not be a simple monoexponential function,
|
| 657 |
+
such as the Kohlrausch-Williams-Watts (KWW) function, or Mittag-Leffler function, and the
|
| 658 |
+
corresponding phase diffusion could be an anomalous diffusion [21-24]. The time fractional phase
|
| 659 |
+
diffusion will be investigated here, and the time correlation function is assumed as a MLF,
|
| 660 |
+
G(t) = 𝐸𝛼 (− (
|
| 661 |
+
𝑡
|
| 662 |
+
𝜏)
|
| 663 |
+
𝛼
|
| 664 |
+
),
|
| 665 |
+
|
| 666 |
+
|
| 667 |
+
|
| 668 |
+
|
| 669 |
+
(37)
|
| 670 |
+
and its waiting time distribution function will be a heavy-tailed time distribution [27]
|
| 671 |
+
𝜑𝑓(𝑡) = −
|
| 672 |
+
𝑑
|
| 673 |
+
𝑑𝑡 𝐸𝛼 (− (
|
| 674 |
+
𝑡
|
| 675 |
+
𝜏)
|
| 676 |
+
𝛼
|
| 677 |
+
) ,
|
| 678 |
+
|
| 679 |
+
|
| 680 |
+
|
| 681 |
+
(38)
|
| 682 |
+
whose Laplace transform is [25,27]
|
| 683 |
+
𝜑𝑓(𝑠) =
|
| 684 |
+
1
|
| 685 |
+
𝑠𝛼𝜏𝛼+1.
|
| 686 |
+
|
| 687 |
+
|
| 688 |
+
|
| 689 |
+
|
| 690 |
+
(39)
|
| 691 |
+
Based on Eqs. (10b), (38) and (39), we have
|
| 692 |
+
𝐵(𝑠) = 𝑅𝑒𝜑𝑓(𝑠 + 𝑖𝜔) = 𝑅𝑒 1
|
| 693 |
+
2 [
|
| 694 |
+
1
|
| 695 |
+
𝜏𝛼
|
| 696 |
+
𝜔0
|
| 697 |
+
𝛼 [cos (𝜋
|
| 698 |
+
2 𝛼 − 𝑠𝛼
|
| 699 |
+
𝜔0) + 𝑖 sin (𝜋
|
| 700 |
+
2 𝛼 − 𝑠𝛼
|
| 701 |
+
𝜔0)] + 1
|
| 702 |
+
𝜏𝛼
|
| 703 |
+
]
|
| 704 |
+
≈
|
| 705 |
+
𝜔0𝛼𝜏𝛼(cos𝜋
|
| 706 |
+
2𝛼+
|
| 707 |
+
1
|
| 708 |
+
𝜔0𝛼𝜏𝛼)
|
| 709 |
+
1+𝜔02𝛼𝜏2𝛼+2𝜔0𝛼𝜏𝛼cos𝜋
|
| 710 |
+
2𝛼+𝑠𝛼𝜔0𝛼−1𝜏𝛼sin𝜋
|
| 711 |
+
2𝛼
|
| 712 |
+
1−𝜔02𝛼𝜏2𝛼
|
| 713 |
+
𝜔0𝛼𝜏𝛼cos𝜋
|
| 714 |
+
2𝛼+1
|
| 715 |
+
=
|
| 716 |
+
𝑐
|
| 717 |
+
1+𝑠𝜏′ ,
|
| 718 |
+
|
| 719 |
+
|
| 720 |
+
|
| 721 |
+
|
| 722 |
+
|
| 723 |
+
|
| 724 |
+
|
| 725 |
+
|
| 726 |
+
|
| 727 |
+
|
| 728 |
+
|
| 729 |
+
(40a)
|
| 730 |
+
where
|
| 731 |
+
𝑐 =
|
| 732 |
+
𝜔0𝛼𝜏𝛼(cos𝜋
|
| 733 |
+
2𝛼+
|
| 734 |
+
1
|
| 735 |
+
𝜔0𝛼𝜏𝛼)
|
| 736 |
+
1+𝜔02𝛼𝜏2𝛼+2𝜔0𝛼𝜏𝛼cos𝜋
|
| 737 |
+
2𝛼 ,
|
| 738 |
+
|
| 739 |
+
|
| 740 |
+
|
| 741 |
+
|
| 742 |
+
|
| 743 |
+
|
| 744 |
+
(40b)
|
| 745 |
+
and
|
| 746 |
+
|
| 747 |
+
|
| 748 |
+
|
| 749 |
+
𝜏′ =
|
| 750 |
+
𝛼𝜔0𝛼−1𝜏𝛼sin𝜋
|
| 751 |
+
2𝛼
|
| 752 |
+
1−𝜔02𝛼𝜏2𝛼
|
| 753 |
+
𝜔0𝛼𝜏𝛼cos𝜋
|
| 754 |
+
2𝛼+1
|
| 755 |
+
1+𝜔02𝛼𝜏2𝛼+2𝜔0𝛼𝜏𝛼cos𝜋
|
| 756 |
+
2𝛼 .
|
| 757 |
+
|
| 758 |
+
|
| 759 |
+
|
| 760 |
+
(40c)
|
| 761 |
+
|
| 762 |
+
I.
|
| 763 |
+
Uncoupled fractional diffusion
|
| 764 |
+
|
| 765 |
+
|
| 766 |
+
For such a time distribution function, the phase diffusion constant can be calculated according to Ref. [16,
|
| 767 |
+
|
| 768 |
+
8
|
| 769 |
+
|
| 770 |
+
22,23] as
|
| 771 |
+
|
| 772 |
+
|
| 773 |
+
|
| 774 |
+
|
| 775 |
+
𝐷𝜙𝑓 =
|
| 776 |
+
〈(∆𝜙)2〉
|
| 777 |
+
2Γ(1+𝛼)𝜏𝛼.
|
| 778 |
+
|
| 779 |
+
|
| 780 |
+
|
| 781 |
+
(41a)
|
| 782 |
+
The average phase jump may be assumed as 〈(∆𝜙)2〉 = 𝜔0
|
| 783 |
+
22𝜏2, then
|
| 784 |
+
|
| 785 |
+
|
| 786 |
+
|
| 787 |
+
|
| 788 |
+
|
| 789 |
+
|
| 790 |
+
𝐷𝜙𝑓 =
|
| 791 |
+
𝜔02𝜏2−𝛼
|
| 792 |
+
Γ(1+𝛼)𝜏𝛼 .
|
| 793 |
+
|
| 794 |
+
|
| 795 |
+
|
| 796 |
+
(41b)
|
| 797 |
+
With 𝐷𝜙𝑓 , the fractional phase diffusion equation can be described by [16,17,21,23,24]
|
| 798 |
+
𝑡𝐷∗
|
| 799 |
+
𝛼𝑃𝑓 = 𝐷𝜙𝑓Δ𝑃𝑓(𝜙, 𝑡).
|
| 800 |
+
|
| 801 |
+
|
| 802 |
+
|
| 803 |
+
(42)
|
| 804 |
+
where 0 < 𝛼, 𝛽 ≤ 2, 𝐷𝑓𝑟 is the rotational diffusion coefficient, a is the spherical radius, 𝑡𝐷∗
|
| 805 |
+
𝛼 is the Caputo
|
| 806 |
+
fractional derivative defined by [22,23]
|
| 807 |
+
𝑡𝐷∗
|
| 808 |
+
𝛼𝑓(𝑡): = {
|
| 809 |
+
1
|
| 810 |
+
𝛤(𝑚−𝛼) ∫
|
| 811 |
+
𝑓(𝑚)(𝜏)𝑑𝜏
|
| 812 |
+
(𝑡−𝜏)𝛼+1−𝑚 , 𝑚 − 1 < 𝛼 < 𝑚,
|
| 813 |
+
𝑡
|
| 814 |
+
0
|
| 815 |
+
𝑑𝑚
|
| 816 |
+
𝑑𝑡𝑚 𝑓(𝑡), 𝛼 = 𝑚,
|
| 817 |
+
|
| 818 |
+
|
| 819 |
+
|
| 820 |
+
Fourier transform of Eq. (42) give [
|
| 821 |
+
𝑡𝐷∗
|
| 822 |
+
𝛼𝑝(𝑘, 𝑡) = −𝐷𝜙𝑓𝑘2𝑝(𝑘, 𝑡).
|
| 823 |
+
|
| 824 |
+
|
| 825 |
+
|
| 826 |
+
|
| 827 |
+
(43)
|
| 828 |
+
The solution of Eq. (43) is 𝑝(𝑘, 𝑡) = 𝐸𝛼[−𝐷𝜙𝑓𝑘2𝑡𝛼] [16,17], whose Laplace representation is [22,23,25]
|
| 829 |
+
|
| 830 |
+
|
| 831 |
+
|
| 832 |
+
|
| 833 |
+
|
| 834 |
+
𝑝(𝑘, 𝑠) =
|
| 835 |
+
𝑆𝛼−1
|
| 836 |
+
𝑆𝛼+𝐷𝜙𝑓𝑘2,
|
| 837 |
+
|
| 838 |
+
|
| 839 |
+
|
| 840 |
+
|
| 841 |
+
(44)
|
| 842 |
+
then
|
| 843 |
+
|
| 844 |
+
|
| 845 |
+
|
| 846 |
+
|
| 847 |
+
|
| 848 |
+
𝑝(𝑘, 𝑠)|𝑘=1 =
|
| 849 |
+
𝑆𝛼−1
|
| 850 |
+
𝑆𝛼+𝐷𝜙𝑓.
|
| 851 |
+
|
| 852 |
+
|
| 853 |
+
|
| 854 |
+
|
| 855 |
+
(45)
|
| 856 |
+
Substituting Eqs. (40) and (45) into Eq. (11), we get
|
| 857 |
+
|
| 858 |
+
𝑀(𝑠) =
|
| 859 |
+
𝑐
|
| 860 |
+
1+𝑠𝜏′
|
| 861 |
+
𝑆𝛼−1
|
| 862 |
+
𝑆𝛼+𝐷𝜙𝑓,
|
| 863 |
+
|
| 864 |
+
|
| 865 |
+
|
| 866 |
+
|
| 867 |
+
(46)
|
| 868 |
+
whose inverse Laplace transform gives
|
| 869 |
+
M(𝑡) = ∫ 𝑑𝑡′
|
| 870 |
+
𝑡
|
| 871 |
+
0
|
| 872 |
+
𝑐
|
| 873 |
+
𝜏′ exp (−
|
| 874 |
+
𝑡′
|
| 875 |
+
𝜏′)𝐸𝛼[−𝐷𝜙𝑓(𝑡 − 𝑡′)𝛼].
|
| 876 |
+
|
| 877 |
+
|
| 878 |
+
(47)
|
| 879 |
+
The NMR signal can be obtained from the Fourier transform of M(𝑡), which is
|
| 880 |
+
𝑆(𝜔) = 𝐵(𝜔) ∙ 𝐸(𝜔) =
|
| 881 |
+
𝑐
|
| 882 |
+
1+𝜏′2𝜔2 ∙
|
| 883 |
+
𝜔𝛼−1(
|
| 884 |
+
1
|
| 885 |
+
𝐷𝜙𝑓
|
| 886 |
+
) sin(𝜋
|
| 887 |
+
2𝛼)
|
| 888 |
+
𝜔2𝛼(
|
| 889 |
+
1
|
| 890 |
+
𝐷𝜙𝑓
|
| 891 |
+
)
|
| 892 |
+
2
|
| 893 |
+
+2𝜔𝛼(
|
| 894 |
+
1
|
| 895 |
+
𝐷𝜙𝑓
|
| 896 |
+
) cos(𝜋
|
| 897 |
+
2𝛼)+1
|
| 898 |
+
. (48)
|
| 899 |
+
II. Coupled fractional diffusion
|
| 900 |
+
Similarly, for the coupled normal diffusion, the joint probability could be described by [25]
|
| 901 |
+
Φ(𝜙|𝑡) =
|
| 902 |
+
1
|
| 903 |
+
2 𝛿(|𝜙| − 𝜔0𝑡),
|
| 904 |
+
|
| 905 |
+
|
| 906 |
+
|
| 907 |
+
|
| 908 |
+
(49a)
|
| 909 |
+
𝜓(𝜙, 𝑡) =
|
| 910 |
+
1
|
| 911 |
+
2 𝜑(𝑡)𝛿(|𝜙| − 𝜔0𝑡),
|
| 912 |
+
|
| 913 |
+
|
| 914 |
+
|
| 915 |
+
(49b)
|
| 916 |
+
𝜓(𝑘, 𝑠)=∫ 𝑒𝑖𝑘𝜙−𝑠𝑡𝜓(𝜙, 𝑡)𝑑𝜙𝑑𝑡=
|
| 917 |
+
1
|
| 918 |
+
2 [
|
| 919 |
+
1
|
| 920 |
+
𝜏𝛼(𝑠−𝑖𝑘𝜔0)𝛼+1 +
|
| 921 |
+
1
|
| 922 |
+
𝜏𝛼(𝑠+𝑖𝑘𝜔0)𝛼+1].
|
| 923 |
+
(49c)
|
| 924 |
+
and
|
| 925 |
+
|
| 926 |
+
9
|
| 927 |
+
|
| 928 |
+
𝜓(1, 𝑠) ≈
|
| 929 |
+
1
|
| 930 |
+
2 [
|
| 931 |
+
1
|
| 932 |
+
𝜏𝛼(𝑠−𝑖𝜔0)𝛼+1 +
|
| 933 |
+
1
|
| 934 |
+
𝜏𝛼(𝑠+𝑖𝜔0)𝛼+1].
|
| 935 |
+
|
| 936 |
+
|
| 937 |
+
|
| 938 |
+
(50)
|
| 939 |
+
Compared to Eq. (40a), it is obvious that
|
| 940 |
+
𝜓(1, 𝑠) = 𝐵(𝑠) =
|
| 941 |
+
𝑐
|
| 942 |
+
1+𝑠𝜏′ .
|
| 943 |
+
|
| 944 |
+
|
| 945 |
+
|
| 946 |
+
(51)
|
| 947 |
+
Substituted Eq. (51) into Eq. (30), we get
|
| 948 |
+
𝑝(𝑘, 𝑠)|𝑘=1 =
|
| 949 |
+
Ψ(𝑘,𝑠)
|
| 950 |
+
1−𝜓(1,𝑠) =
|
| 951 |
+
1−𝜑(𝑠)
|
| 952 |
+
𝑠
|
| 953 |
+
1
|
| 954 |
+
1−𝜓(1,𝑠)=
|
| 955 |
+
𝜏𝛼𝑠𝛼−1
|
| 956 |
+
1���
|
| 957 |
+
𝑐
|
| 958 |
+
1+𝑠𝜏′
|
| 959 |
+
.
|
| 960 |
+
|
| 961 |
+
|
| 962 |
+
(52)
|
| 963 |
+
Eq. (52) can be substituted into Eq. (11) to give
|
| 964 |
+
𝑀(𝑠) = 𝐵(𝑠)𝑝(𝑘, 𝑠)|𝑘=1 =
|
| 965 |
+
𝑐
|
| 966 |
+
1+𝑠𝜏′
|
| 967 |
+
𝜏𝛼𝑠𝛼−1
|
| 968 |
+
1−
|
| 969 |
+
𝑐
|
| 970 |
+
1+𝑠𝜏′
|
| 971 |
+
=
|
| 972 |
+
𝑐𝜏𝛼𝑠𝛼−1
|
| 973 |
+
1+𝑠𝜏′−𝑐 =
|
| 974 |
+
1
|
| 975 |
+
𝑆𝛼−1
|
| 976 |
+
𝑐𝜏𝛼
|
| 977 |
+
1+𝑠𝜏′−𝑐=
|
| 978 |
+
1
|
| 979 |
+
𝑆𝛼−1
|
| 980 |
+
𝑐𝜏𝛼
|
| 981 |
+
1−𝑐
|
| 982 |
+
1+𝑠 𝜏′
|
| 983 |
+
1−𝑐
|
| 984 |
+
,
|
| 985 |
+
|
| 986 |
+
(53)
|
| 987 |
+
whose inverse Laplace transform yields
|
| 988 |
+
𝑀(𝑡) = ∫ 𝑑𝑡′
|
| 989 |
+
1
|
| 990 |
+
Γ(1−𝛼) 𝑡′−𝛼 𝑐
|
| 991 |
+
𝑡
|
| 992 |
+
0
|
| 993 |
+
𝜏𝛼 1
|
| 994 |
+
𝜏′ exp (−
|
| 995 |
+
𝑡−𝑡′
|
| 996 |
+
𝜏′
|
| 997 |
+
1−𝑐
|
| 998 |
+
) .
|
| 999 |
+
|
| 1000 |
+
|
| 1001 |
+
(54)
|
| 1002 |
+
The Fourier transform of 𝑀(𝑡) gives NMR frequency domain signal
|
| 1003 |
+
𝑆(𝜔) = sin (
|
| 1004 |
+
𝜋
|
| 1005 |
+
2 𝛼) |𝜔|𝛼−1 𝑐𝜏𝛼
|
| 1006 |
+
𝜏′
|
| 1007 |
+
𝜏′
|
| 1008 |
+
1−𝑐
|
| 1009 |
+
1+( 𝜏′
|
| 1010 |
+
1−𝑐)
|
| 1011 |
+
2
|
| 1012 |
+
𝜔2 = sin (
|
| 1013 |
+
𝜋
|
| 1014 |
+
2 𝛼) |𝜔|𝛼−1
|
| 1015 |
+
𝑐𝜏𝛼
|
| 1016 |
+
1−𝑐
|
| 1017 |
+
1+( 𝜏′
|
| 1018 |
+
1−𝑐)
|
| 1019 |
+
2
|
| 1020 |
+
𝜔2.
|
| 1021 |
+
(55)
|
| 1022 |
+
3. Results
|
| 1023 |
+
|
| 1024 |
+
A phase diffusion equation method is proposed to describe the effect of chemical exchange on NMR
|
| 1025 |
+
spectrum, based on uncoupled and coupled normal and fractional diffusions. The exchange between two
|
| 1026 |
+
sites with equal populations is considered, and the theoretical expressions are organized in Table 1.
|
| 1027 |
+
Table 1
|
| 1028 |
+
Comparison of theoretical NMR line shape expressions from phase diffusion method to traditional results for
|
| 1029 |
+
chemical exchange between two sites with equal populations.
|
| 1030 |
+
Frequency domain signal expression from phase diffusion results:
|
| 1031 |
+
Simple phase diffusion with a constant jump time
|
| 1032 |
+
𝑆(𝜔) =
|
| 1033 |
+
𝐷𝜙,𝑠
|
| 1034 |
+
𝐷𝜙,𝑠2+𝜔2, 𝐷𝜙,𝑠 =
|
| 1035 |
+
𝜔02
|
| 1036 |
+
2 τ.
|
| 1037 |
+
Normal phase diffusion with monoexponential function
|
| 1038 |
+
Uncoupled diffusion
|
| 1039 |
+
𝑆(𝜔) =
|
| 1040 |
+
1
|
| 1041 |
+
1+𝜔02𝜏2
|
| 1042 |
+
1+[
|
| 1043 |
+
𝜏(1−𝜔02𝜏2)
|
| 1044 |
+
1+𝜔02𝜏2 ]
|
| 1045 |
+
2
|
| 1046 |
+
𝜔2
|
| 1047 |
+
𝐷𝜙
|
| 1048 |
+
𝐷𝜙2+𝜔2, 𝐷𝜙 = 𝜔0
|
| 1049 |
+
2𝜏.
|
| 1050 |
+
Coupled diffusion
|
| 1051 |
+
𝑆(𝜔) =
|
| 1052 |
+
𝜏
|
| 1053 |
+
𝜏2(1−𝜔0
|
| 1054 |
+
2𝜏2)2𝜔2+𝜔0
|
| 1055 |
+
2𝜏2.
|
| 1056 |
+
Fractional phase diffusion with heavy-tailed time distribution
|
| 1057 |
+
𝑐 =
|
| 1058 |
+
𝜔0𝛼𝜏𝛼(cos𝜋
|
| 1059 |
+
2𝛼+
|
| 1060 |
+
1
|
| 1061 |
+
𝜔0𝛼𝜏𝛼)
|
| 1062 |
+
1+𝜔0
|
| 1063 |
+
2𝛼𝜏2𝛼+2𝜔0
|
| 1064 |
+
𝛼𝜏𝛼cos𝜋
|
| 1065 |
+
2𝛼 , 𝜏′ =
|
| 1066 |
+
𝛼𝜔0𝛼−1𝜏𝛼sin𝜋
|
| 1067 |
+
2𝛼
|
| 1068 |
+
1−𝜔02𝛼𝜏2𝛼
|
| 1069 |
+
𝜔0𝛼𝜏𝛼cos𝜋
|
| 1070 |
+
2𝛼+1
|
| 1071 |
+
1+𝜔0
|
| 1072 |
+
2𝛼𝜏2𝛼+2𝜔0
|
| 1073 |
+
𝛼𝜏𝛼cos𝜋
|
| 1074 |
+
2𝛼
|
| 1075 |
+
Uncoupled diffusion
|
| 1076 |
+
𝑆(𝜔) =
|
| 1077 |
+
𝑐
|
| 1078 |
+
1+𝜏′2𝜔2 ∙
|
| 1079 |
+
𝜔𝛼−1(
|
| 1080 |
+
1
|
| 1081 |
+
𝐷𝜙𝑓) sin(𝜋
|
| 1082 |
+
2𝛼)
|
| 1083 |
+
𝜔2𝛼(
|
| 1084 |
+
1
|
| 1085 |
+
𝐷𝜙𝑓)
|
| 1086 |
+
2
|
| 1087 |
+
+2𝜔𝛼(
|
| 1088 |
+
1
|
| 1089 |
+
𝐷𝜙𝑓)cos(𝜋
|
| 1090 |
+
2𝛼)+1
|
| 1091 |
+
, 𝐷𝜙 =
|
| 1092 |
+
𝜔02𝜏2
|
| 1093 |
+
Γ(1+𝛼)𝜏𝛼
|
| 1094 |
+
Coupled diffusion
|
| 1095 |
+
𝑆(𝜔) = sin (𝜋
|
| 1096 |
+
2 𝛼) |𝜔|𝛼−1
|
| 1097 |
+
𝑐𝜏𝛼
|
| 1098 |
+
1 − 𝑐
|
| 1099 |
+
1 + ( 𝜏′
|
| 1100 |
+
1 − 𝑐)
|
| 1101 |
+
2
|
| 1102 |
+
𝜔2
|
| 1103 |
+
|
| 1104 |
+
Frequency domain signal expression from traditional method:
|
| 1105 |
+
|
| 1106 |
+
𝑆(𝜔) =
|
| 1107 |
+
𝜔02𝜏
|
| 1108 |
+
2
|
| 1109 |
+
[𝜏
|
| 1110 |
+
2(𝜔0
|
| 1111 |
+
2−𝜔2)]
|
| 1112 |
+
2
|
| 1113 |
+
+𝜔2 [3,4,5]
|
| 1114 |
+
|
| 1115 |
+
10
|
| 1116 |
+
|
| 1117 |
+
|
| 1118 |
+
|
| 1119 |
+
phasediff_tau_2overkex_kex30dw_beta_0.75_122722 - Copy
|
| 1120 |
+
Traditional
|
| 1121 |
+
Fixed_jump_time_diffusion
|
| 1122 |
+
Uncoupled_normal_diffusion
|
| 1123 |
+
Coupled_Normal_diffusion
|
| 1124 |
+
Uncoupled_fractional_diffusion
|
| 1125 |
+
Coupled_fractional_diffusion
|
| 1126 |
+
0
|
| 1127 |
+
0.01
|
| 1128 |
+
0.02
|
| 1129 |
+
0.03
|
| 1130 |
+
0.04
|
| 1131 |
+
0.05
|
| 1132 |
+
0.06
|
| 1133 |
+
0.07
|
| 1134 |
+
0.08
|
| 1135 |
+
-150
|
| 1136 |
+
-100
|
| 1137 |
+
-50
|
| 1138 |
+
0
|
| 1139 |
+
50
|
| 1140 |
+
100
|
| 1141 |
+
150
|
| 1142 |
+
/2 (Hz)
|
| 1143 |
+
S()
|
| 1144 |
+
a
|
| 1145 |
+
= 2'
|
| 1146 |
+
traditional model, fixed time diffusion
|
| 1147 |
+
' coupled and uncoupled
|
| 1148 |
+
norrmal and fractional diffusion
|
| 1149 |
+
= 2' =(15)
|
| 1150 |
+
phasediff_tau_2overkex_kex5dw_beta_0.75_122722 - Copy
|
| 1151 |
+
Traditional
|
| 1152 |
+
Fixed_jump_time_diffusion
|
| 1153 |
+
Uncoupled_normal_diffusion
|
| 1154 |
+
Coupled_Normal_diffusion
|
| 1155 |
+
Uncoupled_fractional_diffusion
|
| 1156 |
+
Coupled_fractional_diffusion
|
| 1157 |
+
0
|
| 1158 |
+
0.01
|
| 1159 |
+
0.02
|
| 1160 |
+
0.03
|
| 1161 |
+
0.04
|
| 1162 |
+
0.05
|
| 1163 |
+
-150
|
| 1164 |
+
-100
|
| 1165 |
+
-50
|
| 1166 |
+
0
|
| 1167 |
+
50
|
| 1168 |
+
100
|
| 1169 |
+
150
|
| 1170 |
+
S()
|
| 1171 |
+
/2 (Hz)
|
| 1172 |
+
= 2' =(2.5)
|
| 1173 |
+
b
|
| 1174 |
+
traditional model, fixed time diffusion
|
| 1175 |
+
' coupled and uncoupled
|
| 1176 |
+
norrmal and fractional diffusion
|
| 1177 |
+
|
| 1178 |
+
0
|
| 1179 |
+
0.005
|
| 1180 |
+
0.01
|
| 1181 |
+
0.015
|
| 1182 |
+
0.02
|
| 1183 |
+
-150
|
| 1184 |
+
-100
|
| 1185 |
+
-50
|
| 1186 |
+
0
|
| 1187 |
+
50
|
| 1188 |
+
100
|
| 1189 |
+
150
|
| 1190 |
+
phasediff_tau_2overkex_kex2dw_beta_0.75_122722 - Copy
|
| 1191 |
+
Traditional
|
| 1192 |
+
Fixed_jump_time_diffusion
|
| 1193 |
+
Uncoupled_normal_diffusion
|
| 1194 |
+
Coupled_Normal_diffusion
|
| 1195 |
+
Uncoupled_fractional_diffusion
|
| 1196 |
+
Coupled_fractional_diffusion
|
| 1197 |
+
S()
|
| 1198 |
+
/2 (Hz)
|
| 1199 |
+
c
|
| 1200 |
+
= 2' = 1
|
| 1201 |
+
0
|
| 1202 |
+
0.001
|
| 1203 |
+
0.002
|
| 1204 |
+
0.003
|
| 1205 |
+
0.004
|
| 1206 |
+
0.005
|
| 1207 |
+
0.006
|
| 1208 |
+
0.007
|
| 1209 |
+
-150
|
| 1210 |
+
-100
|
| 1211 |
+
-50
|
| 1212 |
+
0
|
| 1213 |
+
50
|
| 1214 |
+
100
|
| 1215 |
+
150
|
| 1216 |
+
phasediff_tau_2overkex_kex1dw_beta_0.75_122722 - Copy
|
| 1217 |
+
Traditional
|
| 1218 |
+
Fixed_jump_time_diffusion
|
| 1219 |
+
Uncoupled_normal_diffusion
|
| 1220 |
+
Coupled_Normal_diffusion
|
| 1221 |
+
Uncoupled_fractional_diffusion
|
| 1222 |
+
Coupled_fractional_diffusion
|
| 1223 |
+
/2 (Hz)
|
| 1224 |
+
S()
|
| 1225 |
+
d
|
| 1226 |
+
= 2' =1(0.5)
|
| 1227 |
+
|
| 1228 |
+
0
|
| 1229 |
+
0.001
|
| 1230 |
+
0.002
|
| 1231 |
+
0.003
|
| 1232 |
+
0.004
|
| 1233 |
+
0.005
|
| 1234 |
+
-150
|
| 1235 |
+
-100
|
| 1236 |
+
-50
|
| 1237 |
+
0
|
| 1238 |
+
50
|
| 1239 |
+
100
|
| 1240 |
+
150
|
| 1241 |
+
phasediff_tau_2overkex_kex0.6dw_beta_0.75_122722 - Copy
|
| 1242 |
+
Traditional
|
| 1243 |
+
Fixed_jump_time_diffusion
|
| 1244 |
+
Uncoupled_normal_diffusion
|
| 1245 |
+
Coupled_Normal_diffusion
|
| 1246 |
+
Uncoupled_fractional_diffusion
|
| 1247 |
+
Coupled_fractional_diffusion
|
| 1248 |
+
S()
|
| 1249 |
+
/2 (Hz)
|
| 1250 |
+
e
|
| 1251 |
+
= 2' = 1 (0.3)
|
| 1252 |
+
tau = 2/kex = 2/0.6 dw
|
| 1253 |
+
0
|
| 1254 |
+
0.002
|
| 1255 |
+
0.004
|
| 1256 |
+
0.006
|
| 1257 |
+
0.008
|
| 1258 |
+
0.01
|
| 1259 |
+
-150
|
| 1260 |
+
-100
|
| 1261 |
+
-50
|
| 1262 |
+
0
|
| 1263 |
+
50
|
| 1264 |
+
100
|
| 1265 |
+
150
|
| 1266 |
+
phasediff_tau_2overkex_kex0.1dw_beta_0.75_122722 - Copy
|
| 1267 |
+
Traditional
|
| 1268 |
+
Fixed_jump_time_diffusion
|
| 1269 |
+
Uncoupled_normal_diffusion
|
| 1270 |
+
Coupled_Normal_diffusion
|
| 1271 |
+
Uncoupled_fractional_diffusion
|
| 1272 |
+
Coupled_fractional_diffusion
|
| 1273 |
+
S()
|
| 1274 |
+
/2 (Hz)
|
| 1275 |
+
f
|
| 1276 |
+
= 2' =(0.05 )
|
| 1277 |
+
|
| 1278 |
+
Fig. 1 The comparison among the various theoretical results obtained from the phase diffusion models and those
|
| 1279 |
+
obtained by the traditional two-site exchange model, all equations listed in Table 1, with ∆𝜔/2𝜋 = 100 Hz, and 𝛼 = 0.75
|
| 1280 |
+
for fractional phase diffusion.
|
| 1281 |
+
|
| 1282 |
+
|
| 1283 |
+
|
| 1284 |
+
|
| 1285 |
+
|
| 1286 |
+
|
| 1287 |
+
|
| 1288 |
+
11
|
| 1289 |
+
|
| 1290 |
+
4. Discussion
|
| 1291 |
+
|
| 1292 |
+
In rotating frame reference, the spin phase in chemical exchange undergoes random phase jumps,
|
| 1293 |
+
which can be intrinsically describe by either uncoupled effective phase diffusion equation or coupled
|
| 1294 |
+
random walk.
|
| 1295 |
+
Figure 1 shows the comparison among the various theoretical results obtained from the phase diffusion
|
| 1296 |
+
models and those obtained by the traditional two-site exchange model, all equations listed in Table 1. From
|
| 1297 |
+
Figure 1, when the exchange is sufficiently fast, 𝜏 = 2𝜏′ ≤ 1/∆𝜔, the theoretical curves from diffusion with
|
| 1298 |
+
a fixed jump time, uncoupled and coupled normal diffusion almost overlap with that predicted from the
|
| 1299 |
+
traditional model. However, the exchange time constant 𝜏 for the traditional model and the fixed time
|
| 1300 |
+
diffusion is two times as 𝜏′ for the coupled and uncoupled normal diffusion with the monoexponential
|
| 1301 |
+
distribution. The difference in exchange time could be explained by the following: the effective phase
|
| 1302 |
+
diffusion constant is
|
| 1303 |
+
𝜔02
|
| 1304 |
+
2 τ for diffusion with a fixed jump time τ; in contrast, it is 𝜔0
|
| 1305 |
+
2τ for the uncoupled
|
| 1306 |
+
diffusion with a monoexponential time distribution. The two-time difference in diffusion coefficients
|
| 1307 |
+
resulted from the 〈𝜏𝑗𝑢𝑚𝑝
|
| 1308 |
+
2
|
| 1309 |
+
〉 = ∫
|
| 1310 |
+
𝑡2
|
| 1311 |
+
𝜏 exp (−
|
| 1312 |
+
𝑡
|
| 1313 |
+
𝜏) 𝑑𝑡 = 2𝜏2
|
| 1314 |
+
∞
|
| 1315 |
+
0
|
| 1316 |
+
, while in is the fixed time jump 〈𝜏𝑗𝑢𝑚𝑝
|
| 1317 |
+
2
|
| 1318 |
+
〉 = 𝜏2. The same
|
| 1319 |
+
phase diffusion coefficient 𝜔0
|
| 1320 |
+
2τ has been used in Ref. [17] to obtain NMR relaxation expressions, which
|
| 1321 |
+
replicate the traditional NMR relaxation theories; these NMR relaxation expressions have been verified by
|
| 1322 |
+
numerous experimental results; although this theoretical and experimental confirm is from relaxation
|
| 1323 |
+
NMR, it still provide a strong support to select 𝜔0
|
| 1324 |
+
2τ rather than
|
| 1325 |
+
𝜔02
|
| 1326 |
+
2 τ as a phase diffusion coefficient,
|
| 1327 |
+
considering both the exchange and relaxation are random phase walk processes. Therefore, in the analysis
|
| 1328 |
+
of NMR chemical exchange line shape, the exchange time constant could be a two-time difference
|
| 1329 |
+
depending on the employed models.
|
| 1330 |
+
Additionally, in Figure 1, the exchange line shapes in normal diffusion and fractional diffusion are
|
| 1331 |
+
significantly different. The spectrum line from coupled fractional diffusion is broader than that of
|
| 1332 |
+
uncoupled fractional diffusion, which may be reasonable because there is a more direct effect of heavy-
|
| 1333 |
+
tailed time distribution on the phase length in the coupled fractional diffusion than that of uncoupled
|
| 1334 |
+
fractional diffusion. Meanwhile, the effect of coupled and uncoupled diffusion on the NMR line shape
|
| 1335 |
+
is different in normal and fractional diffusions; the difference between the coupled and uncoupled
|
| 1336 |
+
diffusion is negligible in normal diffusion but significant in fractional diffusion.
|
| 1337 |
+
Both the theoretical curves from the coupled and uncoupled fractional phase diffusion become
|
| 1338 |
+
narrower when the fractional derivative parameter 𝛼 decreases. The overlapped curves in Figure 2 imply
|
| 1339 |
+
the fractional diffusion results reduce to the normal diffusion results when 𝛼 = 1. While, Figure 3 shows
|
| 1340 |
+
the changes in coupled and uncoupled fractional diffusion among different fractional derivative orders, 𝛼
|
| 1341 |
+
= 1, 0.9, 0.75 and 0.5. The smaller the 𝛼 is, the broader the NMR peak is. Additionally, the middle part and
|
| 1342 |
+
the end part of the fractional diffusion curves have different features: the middle part is a narrow peak,
|
| 1343 |
+
while the end parts are broad shoulders. The narrower peak could come from fast exchange time, while
|
| 1344 |
+
broader end shoulders come from slow exchange. In the view of the traditional model, this could be
|
| 1345 |
+
interpreted as a bimodal exchange. However, both the fast and slow exchange times come from the same
|
| 1346 |
+
heavy-tailed time distribution.
|
| 1347 |
+
The diffusion method proposed here shows excellent results in the fast exchange range, but it
|
| 1348 |
+
encounters challenges in slow exchange. This difficulty in slow exchange results from that the diffusion
|
| 1349 |
+
limit is not met because the experimental time window in NMR is not infinite. It requires further effort to
|
| 1350 |
+
overcome the hurdle. The current method can be combined with other anomalous diffusion models, such
|
| 1351 |
+
as the fractal derivative [28,29,30]. Further research is needed to understand and apply the models,
|
| 1352 |
+
|
| 1353 |
+
12
|
| 1354 |
+
|
| 1355 |
+
particularly the fractional diffusion model, and to extend the current method for multiple sites and unequal
|
| 1356 |
+
population exchange.
|
| 1357 |
+
|
| 1358 |
+
|
| 1359 |
+
|
| 1360 |
+
0
|
| 1361 |
+
0.002
|
| 1362 |
+
0.004
|
| 1363 |
+
0.006
|
| 1364 |
+
0.008
|
| 1365 |
+
0.01
|
| 1366 |
+
0.012
|
| 1367 |
+
-150
|
| 1368 |
+
-100
|
| 1369 |
+
-50
|
| 1370 |
+
0
|
| 1371 |
+
50
|
| 1372 |
+
100
|
| 1373 |
+
150
|
| 1374 |
+
phasediff_tau_2overkex_kex2dw_beta_1_122722 3:20:13 PM 12/29/2022
|
| 1375 |
+
Uncoupled_normal_diffusion
|
| 1376 |
+
Uncoupled_fractional_diffusion
|
| 1377 |
+
' = 1/ =
|
| 1378 |
+
S()
|
| 1379 |
+
/2 (Hz)
|
| 1380 |
+
a
|
| 1381 |
+
|
| 1382 |
+
0
|
| 1383 |
+
0.002
|
| 1384 |
+
0.004
|
| 1385 |
+
0.006
|
| 1386 |
+
0.008
|
| 1387 |
+
0.01
|
| 1388 |
+
0.012
|
| 1389 |
+
-150
|
| 1390 |
+
-100
|
| 1391 |
+
-50
|
| 1392 |
+
0
|
| 1393 |
+
50
|
| 1394 |
+
100
|
| 1395 |
+
150
|
| 1396 |
+
phasediff_tau_2overkex_kex2dw_beta_1_122722
|
| 1397 |
+
Coupled_Normal_diffusion
|
| 1398 |
+
Coupled_fractional_diffusion
|
| 1399 |
+
S()
|
| 1400 |
+
/2 (Hz)
|
| 1401 |
+
b
|
| 1402 |
+
' = 1/ =
|
| 1403 |
+
|
| 1404 |
+
|
| 1405 |
+
Fig. 2 The fractional diffusion results reduce to the normal diffusion results when 𝛼 = 1, and ∆𝜔/2𝜋 = 100 Hz.
|
| 1406 |
+
|
| 1407 |
+
0
|
| 1408 |
+
0.005
|
| 1409 |
+
0.01
|
| 1410 |
+
0.015
|
| 1411 |
+
0.02
|
| 1412 |
+
-100
|
| 1413 |
+
-50
|
| 1414 |
+
0
|
| 1415 |
+
50
|
| 1416 |
+
100
|
| 1417 |
+
Uncoupled Fractional Diffusion
|
| 1418 |
+
=
|
| 1419 |
+
=
|
| 1420 |
+
=
|
| 1421 |
+
=
|
| 1422 |
+
S()
|
| 1423 |
+
a
|
| 1424 |
+
/2 (Hz)
|
| 1425 |
+
' = 1 =
|
| 1426 |
+
' = 1/
|
| 1427 |
+
0
|
| 1428 |
+
0.005
|
| 1429 |
+
0.01
|
| 1430 |
+
0.015
|
| 1431 |
+
0.02
|
| 1432 |
+
-100
|
| 1433 |
+
-50
|
| 1434 |
+
0
|
| 1435 |
+
50
|
| 1436 |
+
100
|
| 1437 |
+
Coupled Fractional Diffusion
|
| 1438 |
+
=
|
| 1439 |
+
=
|
| 1440 |
+
=
|
| 1441 |
+
=
|
| 1442 |
+
S()
|
| 1443 |
+
b
|
| 1444 |
+
/2 (Hz)
|
| 1445 |
+
' = 1/
|
| 1446 |
+
|
| 1447 |
+
|
| 1448 |
+
Fig. 3 The changes in coupled and uncoupled fractional diffusion among different fractional derivative orders, 𝛼 = 1,
|
| 1449 |
+
0.9, 0.75 and 0.5, and ∆𝜔/2𝜋 = 100 Hz.
|
| 1450 |
+
|
| 1451 |
+
|
| 1452 |
+
|
| 1453 |
+
|
| 1454 |
+
|
| 1455 |
+
|
| 1456 |
+
13
|
| 1457 |
+
|
| 1458 |
+
5. Conclusion
|
| 1459 |
+
This paper proposes a phase diffusion method to describe the chemical exchange NMR spectrum. The
|
| 1460 |
+
major conclusions are summarized in the following:
|
| 1461 |
+
1. This method directly analyzes the spin system evolution in phase space rather than real space used
|
| 1462 |
+
by most other traditional models.
|
| 1463 |
+
2. The line shape difference between coupled and uncoupled phase diffusion is not obvious in
|
| 1464 |
+
normal diffusion but significant in fractional diffusion.
|
| 1465 |
+
3. There is a significant difference in the line shape between the normal and fractional diffusions.
|
| 1466 |
+
4. Unlike the traditional method, the exchange time constant can follow certain types of distributions.
|
| 1467 |
+
Additionally, the exchange time constant is two times faster based on the monoexponential time
|
| 1468 |
+
distribution than that obtained by the traditional model.
|
| 1469 |
+
5. The method could be extended to multiple sites and unequal population chemical exchange.
|
| 1470 |
+
Furthermore, this phase diffusion method could be combined with other phase diffusion equations
|
| 1471 |
+
in relaxation and PFG diffusion to deal with more complicated scenarios.
|
| 1472 |
+
|
| 1473 |
+
|
| 1474 |
+
|
| 1475 |
+
|
| 1476 |
+
|
| 1477 |
+
|
| 1478 |
+
|
| 1479 |
+
|
| 1480 |
+
|
| 1481 |
+
|
| 1482 |
+
|
| 1483 |
+
|
| 1484 |
+
|
| 1485 |
+
|
| 1486 |
+
|
| 1487 |
+
|
| 1488 |
+
|
| 1489 |
+
|
| 1490 |
+
|
| 1491 |
+
|
| 1492 |
+
|
| 1493 |
+
|
| 1494 |
+
|
| 1495 |
+
|
| 1496 |
+
|
| 1497 |
+
|
| 1498 |
+
|
| 1499 |
+
|
| 1500 |
+
|
| 1501 |
+
|
| 1502 |
+
|
| 1503 |
+
|
| 1504 |
+
|
| 1505 |
+
|
| 1506 |
+
14
|
| 1507 |
+
|
| 1508 |
+
References
|
| 1509 |
+
|
| 1510 |
+
1. A. Abragam, Principles of Nuclear Magnetism, Clarendon Press, Oxford, 1961.
|
| 1511 |
+
2. C. P. Slichter. Principles of magnetic resonance, Springer series in Solid‐State Sciences, Vol.
|
| 1512 |
+
1, Ed by M. Cardoua, P. Fulde and H. J. Queisser, Springer‐Verlag, Berlin (1978).
|
| 1513 |
+
3. A. G. Palmer, H. Koss, Chapter Six - Chemical Exchange, Editor(s): A. J. Wand, Methods in
|
| 1514 |
+
Enzymology, Academic Press, Volume 615, 2019, 177-236.
|
| 1515 |
+
4. J. I. Kaplan, G. Fraenkel, NMR of Chemically Exchanging Systems, Academic Press, New
|
| 1516 |
+
York, 1980.
|
| 1517 |
+
5. C. S. Johnson, Chemical rate processes and magnetic resonance, Adv. Magn. Reson. 1, 33
|
| 1518 |
+
(1965).
|
| 1519 |
+
6. N. Daffern, C. Nordyke, M. Zhang, A. G. Palmer, J. E. Straub. Dynamical Models of Chemical
|
| 1520 |
+
Exchange in Nuclear Magnetic Resonance Spectroscopy, The Biophysicist 3(1) (2022): 13-34
|
| 1521 |
+
7. J. M. Schurr, B. S. Fujimoto, R. Diaz, B. H. Robinson. 1999. Manifestations of slow site exchange
|
| 1522 |
+
processes in solution NMR: a continuous Gaussian exchange model, J. Magn. Reson. 140
|
| 1523 |
+
(1999) 404–431.
|
| 1524 |
+
8. G. Lin, A. A. Jones. A lattice model for the simulation of one and two dimensional 129Xe
|
| 1525 |
+
exchange spectra produced by translational diffusion, Solid State Nuclear Magnetic
|
| 1526 |
+
Resonance. 26(2) (2004) 87-98.
|
| 1527 |
+
9. R. Gorenflo, A.A. Kilbas, F. Mainardi, S.V. Rogosin. Mittag-Leffler Functions, Related Topics
|
| 1528 |
+
and Applications; Springer: Berlin, 2014.
|
| 1529 |
+
10. T. Sandev, Z. Tomovsky, Fractional equations and models. Theory and applications, Springer
|
| 1530 |
+
Nature Switzerland AG, Cham, Switzerland, 2019.
|
| 1531 |
+
11. R. Kohlrausch, Theorie des elektrischen Rückstandes in der Leidner Flasche, Annalen der
|
| 1532 |
+
Physik und Chemie. 91 (1854) 179–213.
|
| 1533 |
+
12. G. Williams, D. C. Watts, Non-Symmetrical Dielectric Relaxation Behavior Arising from a
|
| 1534 |
+
Simple Empirical Decay Function, Transactions of the Faraday Society 66 (1970) 80–85.
|
| 1535 |
+
13. T. R. Lutz, Y. He, M. D. Ediger, H. Cao, G. Lin, A. A. Jones, Macromolecules 36 (2003) 1724.
|
| 1536 |
+
14. E. Krygier, G. Lin, J. Mendes, G. Mukandela, D. Azar, A.A. Jones, J. A.Pathak, R. H. Colby, S.
|
| 1537 |
+
K. Kumar, G. Floudas, R. Krishnamoorti, R. Faust, Macromolecules 38 (2005), 7721.
|
| 1538 |
+
15. G. Lin, General pulsed-field gradient signal attenuation expression based on a fractional
|
| 1539 |
+
integral modified-Bloch equation, Commu Nonlinear Sci. Numer. Simul. 63 (2018) 404-420..
|
| 1540 |
+
16. G. Lin, An effective phase shift diffusion equation method for analysis of PFG normal and
|
| 1541 |
+
fractional diffusions, J. Magn. Reson. 259 (2015) 232–240.
|
| 1542 |
+
17. G. Lin, Describing NMR relaxation by effective phase diffusion equation, Communications in
|
| 1543 |
+
Nonlinear Science and Numerical Simulation. 99 (2021) 105825.
|
| 1544 |
+
18. R. L. Magin, Weiguo Li, M. P. Velasco, J. Trujillo, D. A. Reiter, A. Morgenstern, R. G. Spencer,
|
| 1545 |
+
Anomalous NMR relaxation in cartilage matrix components and native cartilage: Fractional-
|
| 1546 |
+
order models, J. Magn. Reson. 210 (2011)184-191.
|
| 1547 |
+
|
| 1548 |
+
15
|
| 1549 |
+
|
| 1550 |
+
|
| 1551 |
+
19. T. Zavada, N. Südland, R. Kimmich, T.F. Nonnenmacher, Propagator representation of
|
| 1552 |
+
anomalous diffusion: The orientational structure factor formalism in NMR, Phys. Rev. 60
|
| 1553 |
+
(1999) 1292-1298.
|
| 1554 |
+
20. G. Lin, Describe NMR relaxation by anomalous rotational or translational diffusion, Commu
|
| 1555 |
+
Nonlinear Sci. Numer. Simul. 72 (2019) 232.
|
| 1556 |
+
21. W. Wyss, J. Math. Phys. (1986) 2782-2785.
|
| 1557 |
+
22. A. I. Saichev, G.M. Zaslavsky, Fractional kinetic equations: Solutions and applications. Chaos
|
| 1558 |
+
7 (1997) 753–764.
|
| 1559 |
+
23. R. Gorenflo, F. Mainardi, Fractional Diffusion Processes: Probability Distributions and
|
| 1560 |
+
Continuous Time Random Walk, in: Lecture Notes in Physics, No 621, Springer-Verlag, Berlin,
|
| 1561 |
+
2003, pp. 148–166.
|
| 1562 |
+
24. F. Mainardi, Yu. Luchko, G. Pagnini, The fundamental solution of the space-time fractional
|
| 1563 |
+
diffusion equation, Fract. Calc. Appl. Anal. 4 (2001) 153–192.
|
| 1564 |
+
25. Y. Povstenko. Linear Fractional Diffusion-Wave Equation for Scientists and Engineers,
|
| 1565 |
+
Birkhäuser, New York, 2015.
|
| 1566 |
+
26. R. Metzler, J. Klafter, The random walk’s guide to anomalous diffusion: a fractional dynamics
|
| 1567 |
+
approach, Phys. Rep. 339 (2000) 1–77.
|
| 1568 |
+
27. G. Germano, M. Politi, E. Scalas, R. L. Schilling. Phys Rev E 2009;79:066102.
|
| 1569 |
+
28. W. Chen, Time space fabric underlying anomalous diffusion, Chaos Solitons Fractals 28 (2006)
|
| 1570 |
+
923.
|
| 1571 |
+
29. W. Chen, H. Sun, X. Zhang, D. Korošak, Anomalous diffusion modeling by fractal and
|
| 1572 |
+
fractional derivatives, Comput. Math. Appl. 5 (5) (2010) 1754–1758.
|
| 1573 |
+
30. H. Sun, M.M. Meerschaert, Y. Zhang, J. Zhu, W. Chen, A fractal Richards’ equation to capture
|
| 1574 |
+
the non-Boltzmann scaling of water transport in unsaturated media, Adv. Water Resour. 52
|
| 1575 |
+
(2013) 292–295.
|
| 1576 |
+
|
B9FQT4oBgHgl3EQfNza6/content/2301.13273v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:5c095e2eec9a0acab55a0fce87404221faff6bb1201c383ef634897691828ffd
|
| 3 |
+
size 999109
|
B9FQT4oBgHgl3EQfNza6/content/tmp_files/2301.13273v1.pdf.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
B9FQT4oBgHgl3EQfNza6/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
B9FQT4oBgHgl3EQfNza6/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:23bf556e08c24a06de86c6004ca0fa54745b612266a65149236336be39051469
|
| 3 |
+
size 309174
|
BdE2T4oBgHgl3EQfRge6/content/tmp_files/2301.03782v1.pdf.txt
ADDED
|
@@ -0,0 +1,1366 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Multiple phenotypes in HL60 leukemia cell population
|
| 2 |
+
Yue Wang1,2, Joseph X. Zhou3, Edoardo Pedrini3, Irit Rubin3, May Khalil3, Hong
|
| 3 |
+
Qian2, and Sui Huang3
|
| 4 |
+
1Department of Computational Medicine, University of California, Los Angeles,
|
| 5 |
+
California, United States of America
|
| 6 |
+
2Department of Applied Mathematics, University of Washington, Seattle,
|
| 7 |
+
Washington, United States of America
|
| 8 |
+
3Institute for Systems Biology, Seattle, Washington, United States of America
|
| 9 |
+
Abstract
|
| 10 |
+
Recent studies at individual cell resolution have revealed phenotypic heterogene-
|
| 11 |
+
ity in nominally clonal tumor cell populations. The heterogeneity affects cell growth
|
| 12 |
+
behaviors, which can result in departure from the idealized exponential growth. Here
|
| 13 |
+
we measured the stochastic time courses of growth of an ensemble of populations of
|
| 14 |
+
HL60 leukemia cells in cultures, starting with distinct initial cell numbers to capture
|
| 15 |
+
the departure from the exponential growth model in the initial growth phase. De-
|
| 16 |
+
spite being derived from the same cell clone, we observed significant variations in the
|
| 17 |
+
early growth patterns of individual cultures with statistically significant differences in
|
| 18 |
+
growth kinetics and the presence of subpopulations with different growth rates that
|
| 19 |
+
endured for many generations. Based on the hypothesis of existence of multiple inter-
|
| 20 |
+
converting subpopulations, we developed a branching process model that captures the
|
| 21 |
+
experimental observations.
|
| 22 |
+
1
|
| 23 |
+
Introduction
|
| 24 |
+
Cancer has long been considered a genetic disease caused by oncogenic mutations in so-
|
| 25 |
+
matic cells that confer a proliferation advantage. According to the clonal evolution theory,
|
| 26 |
+
accumulation of random genetic mutations produces cell clones with cancerous cell phe-
|
| 27 |
+
notype. Specifically, cells with the novel genotype(s) may display increased proliferative
|
| 28 |
+
fitness and gradually out-grow the normal cells, break down tissue homeostasis and gain
|
| 29 |
+
other cancer hallmarks [15]. In this view, a genetically distinct clone of cells dominates the
|
| 30 |
+
cancer cell population and is presumed to be uniform in terms of the phenotype of indi-
|
| 31 |
+
vidual cells within an isogenic clone. In this traditional paradigm, non-genetic phenotypic
|
| 32 |
+
variation within one clone is not taken into account.
|
| 33 |
+
1
|
| 34 |
+
arXiv:2301.03782v1 [q-bio.PE] 10 Jan 2023
|
| 35 |
+
|
| 36 |
+
With the advent of systematic single-cell resolution analysis, however, non-genetic cell
|
| 37 |
+
heterogeneity within clonal (cancer) cell populations is found to be universal [33]. This
|
| 38 |
+
feature led to the consideration of the possibility of biologically (qualitatively) distinct
|
| 39 |
+
(meta)stable cell subpopulations due to gene expression noise, representing intra-clonal
|
| 40 |
+
variability of features beyond the rapid random micro-fluctuations.
|
| 41 |
+
Hence, transitions
|
| 42 |
+
between the subpopulations, as well as heterotypic interactions among them may influence
|
| 43 |
+
cell growth, migration, drug resistance, etc. [39, 13, 9]. Thus, an emerging view is that
|
| 44 |
+
cancer is more akin to an evolving ecosystem [11] in which cells form distinct subpopulations
|
| 45 |
+
with persistent characteristic features that determine their mode of interaction, directly
|
| 46 |
+
or indirectly via competition for resources [10, 36]. However, once non-genetic dynamics
|
| 47 |
+
is considered, cell “ecology” differs fundamentally from the classic ecological system in
|
| 48 |
+
macroscopic biology: the subpopulations can reversibly switch between each other whereas
|
| 49 |
+
species in an ecological population do not convert between each other [7]. This affords
|
| 50 |
+
cancer cell populations a remarkable heterogeneity, plasticity and evolvability, which may
|
| 51 |
+
play important roles in their growth and in the development of resistance to treatment
|
| 52 |
+
[30].
|
| 53 |
+
Many new questions arise following the hypothesis that phenotypic heterogeneity and
|
| 54 |
+
transitions between phenotypes within one genetic clone are important factors in cancer.
|
| 55 |
+
Can tumors arise, as theoretical considerations indicate, because of a state conversion
|
| 56 |
+
(within one clone) to a phenotype capable of faster, more autonomous growth as opposed
|
| 57 |
+
to acquisition of a new genetic mutation that confers such a selectable phenotype [55,
|
| 58 |
+
1, 18, 34, 33, 56, 23, 41]? Is the macroscopic, apparently sudden outgrowth of a tumor
|
| 59 |
+
driven by a new fastest-growing clone (or subpopulation) taking off exponentially, or due
|
| 60 |
+
to the cell population reaching a critical mass that permits positive feedback between its
|
| 61 |
+
subpopulations that stimulates outgrowth, akin to a collectively autocatalytic set [17]?
|
| 62 |
+
Should therapy target the fastest growing subpopulations, or target the interactions and
|
| 63 |
+
interconversions of cancer cells?
|
| 64 |
+
At the core of these deliberations is the fundamental question on the mode of tumor
|
| 65 |
+
cell population growth that now must consider the influence of inherent phenotypic hetero-
|
| 66 |
+
geneity of cells and the non-genetic (hence potentially reversible) inter-conversion of cells
|
| 67 |
+
between the phenotypes that manifest various growth behaviors and the interplay between
|
| 68 |
+
these two modalities.
|
| 69 |
+
Traditionally tumor growth has been described as following an exponential growth law,
|
| 70 |
+
motivated by the notion of uniform cell division rate for each cell, i.e. a first order growth
|
| 71 |
+
kinetics [29]. But departure from the exponential model has long been noted. To better fit
|
| 72 |
+
experimental data, two major modifications have been developed, namely the Gompertz
|
| 73 |
+
model and the West law model [53]. While no one specific model can adequately describe
|
| 74 |
+
any one tumor, each model highlights certain aspects of macroscopic tumor kinetics, mainly
|
| 75 |
+
the maximum size and the change in growth rate at different stages. These models however
|
| 76 |
+
are not specifically motivated by cellular heterogeneity. Assuming non-genetic heterogene-
|
| 77 |
+
ity with transitions between the cell states, the population behavior is influenced by many
|
| 78 |
+
2
|
| 79 |
+
|
| 80 |
+
intrinsic and extrinsic factors that are both variable and unpredictable at the single-cell
|
| 81 |
+
level. Thus, unlike macroscopic population dynamics [43], tumor growth cannot be ad-
|
| 82 |
+
equately captured by a deterministic model, but a stochastic cell and population level
|
| 83 |
+
kinetic model is more realistic.
|
| 84 |
+
Using stochastic processes in modeling cell growth via clonal expansion has a long
|
| 85 |
+
history [54]. An early work is the Luria-Delbr¨uck model, which assumes cells grow deter-
|
| 86 |
+
ministically, with wildtype cells mutating and becoming (due to rare and quasi-irreversible
|
| 87 |
+
mutations) cells with a different phenotype randomly [28]. Since then, there have been
|
| 88 |
+
many further developments that incorporate stochastic elements into the model, such as
|
| 89 |
+
those proposed by Lea and Coulson [25], Koch [22], Moolgavkar and Luebeck [27], and
|
| 90 |
+
Dewanji et al. [8]. We can find various stochastic processes: Poisson processes [2], Markov
|
| 91 |
+
chains [14], and branching processes [19], or even random sums of birth-death processes [8],
|
| 92 |
+
all playing key roles in the mathematical theories of cellular clonal growth and evolution.
|
| 93 |
+
These models have been applied to clinical data on lung cancer [31], breast cancer [37],
|
| 94 |
+
and treatment of cancer [38].
|
| 95 |
+
At single-cell resolution, another cause for departure from exponential growth is the
|
| 96 |
+
presence of positive (growth promoting) cell-cell interactions (Allee effect) in the early
|
| 97 |
+
phase of population growth, such that cell density plays a role in stimulating division,
|
| 98 |
+
giving rise to the critical mass dynamics [20, 24].
|
| 99 |
+
To understand the intrinsic tumor growth behavior (change of tumor volume over time)
|
| 100 |
+
it is therefore essential to study tumor cell populations in culture which affords detailed
|
| 101 |
+
quantitative analysis of cell numbers over time, unaffected by the tumor microenvironment,
|
| 102 |
+
and to measure departure from exponential growth.
|
| 103 |
+
This paper focuses on stochastic
|
| 104 |
+
growth of clonal but phenotypically heterogeneous HL60 leukemia cells with near single-cell
|
| 105 |
+
sensitivities in the early phase of growth, that is, in sparse cultures. We and others have in
|
| 106 |
+
the past years noted that at the level of single cells, each cell behaves akin to an individual,
|
| 107 |
+
differently from another, which can be explained by the slow correlated transcriptome-wide
|
| 108 |
+
fluctuations of gene expression [4, 26]. Given the phenotypic heterogeneity and anticipated
|
| 109 |
+
functional consequences, grouping of cells is necessary. Such classification would require
|
| 110 |
+
molecular cell markers for said functional implication, but such markers are often difficult
|
| 111 |
+
to determine a priori.
|
| 112 |
+
Here, since most pertinent to cancer biology, we directly use a
|
| 113 |
+
functional marker that is of central relevance for cancer: cell division, which maps into cell
|
| 114 |
+
population growth potential — in brief “cell growth”.
|
| 115 |
+
Therefore, we monitored longitudinally the growth of cancer cell populations seeded at
|
| 116 |
+
very small numbers of cells (1, 4, or 10 cells) in statistical ensembles of microcultures (wells
|
| 117 |
+
on a plate of wells). We found evidence that clonal HL60 leukemia cell populations contain
|
| 118 |
+
subpopulations that exhibit diverse growth patterns.
|
| 119 |
+
Based on statistical analysis, we
|
| 120 |
+
propose the existence of three distinctive cell phenotypic states with respect to cell growth.
|
| 121 |
+
We show that a branching process model captures the population growth kinetics of a
|
| 122 |
+
population with distinct cell subpopulations. Our results suggest that the initial phase cell
|
| 123 |
+
growth (“take-off” of a cell culture) in the HL60 leukemic cells is predominantly driven by
|
| 124 |
+
3
|
| 125 |
+
|
| 126 |
+
the fast-growing cell subpopulation. Reseeding experiments revealed that the fast-growing
|
| 127 |
+
subpopulation could maintain its growth rate over several cell generations, even after the
|
| 128 |
+
placement in a new environment. Our observations underscore the need to not only target
|
| 129 |
+
the fast-growing cells but also the transition to them from the other cell subpopulations.
|
| 130 |
+
2
|
| 131 |
+
Results
|
| 132 |
+
2.1
|
| 133 |
+
Experiment of the cell population growth from distinct initial cell
|
| 134 |
+
numbers.
|
| 135 |
+
To expose the variability of growth kinetics as a function of initial cell density N0 (“initial
|
| 136 |
+
seed number”), HL60 cells were sorted into wells of a 384-well plate (0.084 cm2 area)
|
| 137 |
+
to obtain “statistical ensembles” of replicate microcultures (wells) of the same condition,
|
| 138 |
+
distinct only by N0. Based on prior titration experiments to determine ranges of interest
|
| 139 |
+
for N0 and statistical power, for this experiment we plated 80 wells with N0 = 10 cells
|
| 140 |
+
(N0 = 10-cell group), 80 wells with N0 = 4 cells (N0 = 4-cell group), and 80 wells with
|
| 141 |
+
N0 = 1 cell (N0 = 1-cell group). Cells were grown in the same conditions for 23 days (for
|
| 142 |
+
details of cell culture and sorting, see the Methods section). Digital images were taken
|
| 143 |
+
every 24 hours for each well from Day 4 on, and the area occupied by cells in each well
|
| 144 |
+
was determined using computational image analysis. We had previously determined that
|
| 145 |
+
one area unit equals approximately 500 cells. This is consistent and readily measurable
|
| 146 |
+
because the relatively rigid and uniformly spherical HL60 cells grow as a non-adherent
|
| 147 |
+
“packed” monolayer at the bottom of the well. Note that we are interested in the initial
|
| 148 |
+
exponential growth (and departure from it) and not in the latter phases when the culture
|
| 149 |
+
becomes saturated as has been the historical focus of analysis (see Introduction).
|
| 150 |
+
Wells that have reached at least 5 area units were considered for the characterization
|
| 151 |
+
of early phase (before plateau) growth kinetics by plotting the areas in logarithmic scale as
|
| 152 |
+
a function of time (Fig. 1). All the N0 = 10-cell wells required 3.6-4.6 days to grow from
|
| 153 |
+
5 area units to 50 area units (mean=4.05, standard deviation=0.23). For the N0 = 1-cell
|
| 154 |
+
wells, we observed a diversity of behaviors. While some of the cultures only took 3.5-5
|
| 155 |
+
days to grow from 5 area units to 50 area units, others needed 6-7.2 days (mean=5.02,
|
| 156 |
+
standard deviation=0.75). The N0 = 4-cell wells had a mean=4.50 days and standard
|
| 157 |
+
deviation=0.44 to reach that same population size.
|
| 158 |
+
To examine the exponential growth model, in Fig. 2 (left panel), we plotted the per
|
| 159 |
+
capita growth rate versus cell population size, where each point represents a well (popu-
|
| 160 |
+
lation) at a time point. As expected, as the population became crowded, the growth rate
|
| 161 |
+
decreased toward zero. But in the earlier phase, many populations in the N0 = 1-cell group
|
| 162 |
+
had a lower per capita growth rate than those in the N0 = 10-cell group, even at the same
|
| 163 |
+
population size – thus departing from the expected behavior of exponential growth. The
|
| 164 |
+
weighted Welch’s t-test showed that the difference in these growth rates was significant
|
| 165 |
+
(see the Methods section).
|
| 166 |
+
4
|
| 167 |
+
|
| 168 |
+
While qualitative differences in the behaviors of cultures with different initial seeding
|
| 169 |
+
cell numbers N0 can be expected for biological reasons (see below), in the elementary
|
| 170 |
+
exponential growth model, the difference of growth rate should disappear when populations
|
| 171 |
+
with distinct seeding numbers are aligned for the same population size that they have
|
| 172 |
+
reached as in Fig. 2. A simple possibility is that the deviations of expected growth rates
|
| 173 |
+
emanate from difference in cell-intrinsic properties.
|
| 174 |
+
Some cells grew faster, with a per
|
| 175 |
+
capita growth rate of 0.6 ∼ 0.9 (all N0 = 10-cell wells and some N0 = 1-cell wells), while
|
| 176 |
+
some cells grew slower, with a per capita growth rate of 0.3 ∼ 0.5 (some of the N0 = 1-
|
| 177 |
+
cell wells). In other words, there is intrinsic heterogeneity in the cell population that is
|
| 178 |
+
not “averaged out” in the culture with low N0, and the sampling process exposes these
|
| 179 |
+
differences between the cells that appear to be relatively stable.
|
| 180 |
+
To illustrate the inherent diversity of initial growth rates, in Fig. 3 (left panel), we
|
| 181 |
+
display the daily cell-occupied areas plotted on a linear scale starting from Day 4. All wells
|
| 182 |
+
with seed of N0 = 10 or N0 = 4 cells grew exponentially. Among the N0 = 1-cell wells,
|
| 183 |
+
14 populations died out. Four wells in the N0 = 1-cell group had more than 10 cells on
|
| 184 |
+
Day 8 but never grew exponentially, and had fewer than 1000 cells after 15 days (on Day
|
| 185 |
+
23). For these non-growing or slow-growing N0 = 1-cell wells, the per capita growth rate
|
| 186 |
+
was 0 ∼ 0.2. In comparison, all the N0 = 10-cell wells needed at most 15 days to reach
|
| 187 |
+
the carrying capacity (around 80 area units, or 40000 cells). See Table 1 for a summary of
|
| 188 |
+
the N0 = 1-cell group’s growth patterns. This behavior is not idiosyncratic to the culture
|
| 189 |
+
system because they recapitulate a pilot experiment performed in the larger scale format
|
| 190 |
+
of 96-well plates (not shown).
|
| 191 |
+
From the above experimental observations, we asserted that there might be at least
|
| 192 |
+
three stable cell growth phenotypes in a population: a fast type, whose growth rate was
|
| 193 |
+
0.6 ∼ 0.9/day for non-crowded conditions; a moderate type, whose growth rate was 0.3 ∼
|
| 194 |
+
0.5/day for non-crowded conditions; and a slow type, whose growth rate was 0 ∼ 0.2/day
|
| 195 |
+
for the non-crowded population.
|
| 196 |
+
The graphs of Fig. 3 also revealed other phenomena of growth kinetics: (1) Most
|
| 197 |
+
N0 = 4-cell wells plateaued by Day 14 to Day 17, but some lagged significantly behind.
|
| 198 |
+
(2) Similarly, four wells in the N0 = 1-cell group exhibited longer lag-times before the
|
| 199 |
+
exponential growth phase, and never reached half-maximal cell numbers by Day 23. These
|
| 200 |
+
outliers reveal intrinsic variability and were taken into account in the parameter scanning
|
| 201 |
+
(see the Methods section).
|
| 202 |
+
2.2
|
| 203 |
+
Reseeding experiments revealing the enduring intrinsic growth pat-
|
| 204 |
+
terns.
|
| 205 |
+
When a well in the N0 = 1-cell group had grown to 10 cells, population behavior was
|
| 206 |
+
still different from those in the N0 = 10-cell group at the outset. In view of the spate of
|
| 207 |
+
recent results revealing phenotypic heterogeneity, we hypothesized that the difference was
|
| 208 |
+
cell-intrinsic as opposed to being a consequence of the environment (e.g., culture medium
|
| 209 |
+
5
|
| 210 |
+
|
| 211 |
+
Growth pattern
|
| 212 |
+
Well label
|
| 213 |
+
Day 1
|
| 214 |
+
Day 8
|
| 215 |
+
Day 14
|
| 216 |
+
Day 19
|
| 217 |
+
Day 23
|
| 218 |
+
No growth,
|
| 219 |
+
extinction
|
| 220 |
+
162,167,170,176,
|
| 221 |
+
177,179,182,183,
|
| 222 |
+
186,201,234,236,
|
| 223 |
+
239,240
|
| 224 |
+
1
|
| 225 |
+
<10
|
| 226 |
+
<10
|
| 227 |
+
∼0
|
| 228 |
+
Empty
|
| 229 |
+
Slow growth,
|
| 230 |
+
no exponential
|
| 231 |
+
growth
|
| 232 |
+
165
|
| 233 |
+
1
|
| 234 |
+
89
|
| 235 |
+
∼300
|
| 236 |
+
∼350
|
| 237 |
+
∼500
|
| 238 |
+
166
|
| 239 |
+
1
|
| 240 |
+
36
|
| 241 |
+
∼110
|
| 242 |
+
∼120
|
| 243 |
+
∼150
|
| 244 |
+
178
|
| 245 |
+
1
|
| 246 |
+
43
|
| 247 |
+
∼140
|
| 248 |
+
∼170
|
| 249 |
+
∼200
|
| 250 |
+
211
|
| 251 |
+
1
|
| 252 |
+
16
|
| 253 |
+
∼90
|
| 254 |
+
∼200
|
| 255 |
+
∼400
|
| 256 |
+
Delayed
|
| 257 |
+
exponential
|
| 258 |
+
growth
|
| 259 |
+
163
|
| 260 |
+
1
|
| 261 |
+
12
|
| 262 |
+
∼130
|
| 263 |
+
∼300
|
| 264 |
+
∼5000
|
| 265 |
+
181
|
| 266 |
+
1
|
| 267 |
+
44
|
| 268 |
+
∼270
|
| 269 |
+
∼550
|
| 270 |
+
∼5500
|
| 271 |
+
193
|
| 272 |
+
1
|
| 273 |
+
25
|
| 274 |
+
∼200
|
| 275 |
+
∼800
|
| 276 |
+
∼9000
|
| 277 |
+
204
|
| 278 |
+
1
|
| 279 |
+
21
|
| 280 |
+
∼100
|
| 281 |
+
∼600
|
| 282 |
+
∼6000
|
| 283 |
+
Normal
|
| 284 |
+
exponential
|
| 285 |
+
growth
|
| 286 |
+
200 and
|
| 287 |
+
many others
|
| 288 |
+
1
|
| 289 |
+
∼130
|
| 290 |
+
∼20000
|
| 291 |
+
∼40000
|
| 292 |
+
(full)
|
| 293 |
+
∼40000
|
| 294 |
+
(full)
|
| 295 |
+
Table 1: The population of some wells in the N0 = 1-cell group in the growth experiment
|
| 296 |
+
with different initial cell numbers, where ∼ meant approximate cell number. These wells
|
| 297 |
+
illustrated different growth patterns from those wells starting with N0 = 10 or N0 = 4
|
| 298 |
+
cells. Such differences implied that cells from wells with different initial cell numbers were
|
| 299 |
+
essentially different.
|
| 300 |
+
6
|
| 301 |
+
|
| 302 |
+
Time (days) to
|
| 303 |
+
reach one half area
|
| 304 |
+
11
|
| 305 |
+
12
|
| 306 |
+
13
|
| 307 |
+
14
|
| 308 |
+
15
|
| 309 |
+
16–20
|
| 310 |
+
>20
|
| 311 |
+
Faster wells
|
| 312 |
+
26
|
| 313 |
+
2
|
| 314 |
+
1
|
| 315 |
+
2
|
| 316 |
+
1
|
| 317 |
+
0
|
| 318 |
+
0
|
| 319 |
+
Slower wells
|
| 320 |
+
0
|
| 321 |
+
0
|
| 322 |
+
0
|
| 323 |
+
1
|
| 324 |
+
1
|
| 325 |
+
25
|
| 326 |
+
5
|
| 327 |
+
Table 2: The distribution of time needed for each well to reach the “half area” population
|
| 328 |
+
size in the reseeding experiment. We reseeded equal numbers of cells that grew faster (from
|
| 329 |
+
a full well) and cells that grew slower (from a half-full well), and cultivated them under the
|
| 330 |
+
same new fresh medium environment to compare their intrinsic growth rates. The results
|
| 331 |
+
showed that faster growing cells, even reseeded, still grew faster.
|
| 332 |
+
in N0 = 1 vs N0 = 10 -cell wells).
|
| 333 |
+
To test our hypothesis and exclude differences in the culture environment as determi-
|
| 334 |
+
nants of growth behavior, we reseeded the cells that exhibited the different growth rates
|
| 335 |
+
in fresh cultures. We started with a number of N0 = 1-cell wells. After a period of almost
|
| 336 |
+
3 weeks, again some wells showed rapid proliferation, with cells covering the well, while
|
| 337 |
+
others were half full and yet others wells were almost empty. We collected cells from the full
|
| 338 |
+
and half-full wells and reseeded them into 32 wells each (at about N0 = 78 cells per well).
|
| 339 |
+
These 64 wells were monitored for another 20 days. We found that most wells reseeded
|
| 340 |
+
from the full well took around 11 days to reach the population size of a half-full well, while
|
| 341 |
+
most wells reseeded from the half-full well required around 16 ∼ 20 days to reach the same
|
| 342 |
+
half full well population size. Five wells reseeded from the half-full wells were far from even
|
| 343 |
+
reaching half full well population size by Day 20 (see Table 2). Permutation test showed
|
| 344 |
+
that this difference in growth rate was significant (see the Methods section).
|
| 345 |
+
This reseeding experiment shows that the difference in growth rate was maintained
|
| 346 |
+
over multiple generations, even after slowing down in the plateau phase (full well) and
|
| 347 |
+
was maintained when restarting a microculture at low density in fresh medium devoid of
|
| 348 |
+
secreted cell products. Therefore, it is plausible that there exists endogenous heterogeneity
|
| 349 |
+
of growth phenotypes in the clonal HL60 cell line and that these distinct growth phenotypes
|
| 350 |
+
are stable for at least 15 ∼ 20 cell generations.
|
| 351 |
+
2.3
|
| 352 |
+
Quantitative analysis of experimental results.
|
| 353 |
+
In the experiments with different initial cell numbers N0, we observed at least three patterns
|
| 354 |
+
with different growth rates, and the reseeding showed that these growth patterns were
|
| 355 |
+
endogenous to the cells. Therefore, we propose that each growth pattern discussed above
|
| 356 |
+
corresponded to a cell phenotype that dominated the population: fast, moderate, and slow.
|
| 357 |
+
In the initial seeding of cells that varies N0, the cells were randomly chosen (by FACS);
|
| 358 |
+
thus, their intrinsic growth phenotypes were randomly distributed. During growth, the
|
| 359 |
+
population of a well would be dominated by the fastest type that existed in the seeding
|
| 360 |
+
cells, thus qualitatively, we have following scenarios: (1) A well in the N0 = 10-cell group
|
| 361 |
+
7
|
| 362 |
+
|
| 363 |
+
almost certainly had at least one initial cell of fast type, and the population would be
|
| 364 |
+
dominated by fast type cells. Different wells had almost the same growth rate, reaching
|
| 365 |
+
saturation at almost the same time. (2) For an N0 = 1-cell well, if the only initial cell is of
|
| 366 |
+
the fast type, then the population has only the fast type, and the growth pattern will be
|
| 367 |
+
close to that of N0 = 10-cell wells. If the only initial cell is of the moderate type, then the
|
| 368 |
+
population could still grow exponentially, but with a slower growth rate. This explains why
|
| 369 |
+
after reaching 5 area units, many but not all N0 = 1-cell wells were slower than N0 = 10-
|
| 370 |
+
cell wells. (3) Moreover, in such an N0 = 1-cell well with a moderate type initial cell, the
|
| 371 |
+
cell might not divide quite often during the first few days due to randomness of entering
|
| 372 |
+
the cell cycle. This would lead to a considerable delay in entering the exponential growth
|
| 373 |
+
phase. (4) By contrast, for an N0 = 1-cell well with a slow type initial cell, the growth rate
|
| 374 |
+
could be too small, and the population might die out or survive without ever entering the
|
| 375 |
+
exponential growth phase in duration of the experiment. (5) Most N0 = 4-cell wells had at
|
| 376 |
+
least one fast type initial cell, and the growth pattern was the same as N0 = 10-cell wells.
|
| 377 |
+
A few N0 = 4-cell wells only had moderate and slow cells, and thus had slower growth
|
| 378 |
+
patterns.
|
| 379 |
+
The above verbal argument is shown in Fig. 4 and entails mathematical modeling with
|
| 380 |
+
the appropriate parameters that relate the relative frequency of these cell types in the
|
| 381 |
+
original population, their associated growth and transition rates to examine whether it
|
| 382 |
+
explains the data.
|
| 383 |
+
2.4
|
| 384 |
+
Branching process model.
|
| 385 |
+
To construct a quantitative dynamical model to recapitulate the growth dynamics differ-
|
| 386 |
+
ences from cell populations with distinct initial seed cell numbers N0, and three intrinsic
|
| 387 |
+
types of proliferation behaviors, we used a multi-type discrete-time branching process.
|
| 388 |
+
The traditional method of population dynamics based on ordinary differential equation
|
| 389 |
+
(ODE), which is deterministic and has continuous variables, is not suited when the cell
|
| 390 |
+
population is small as is the case for the earliest stage of proliferation from a few cells
|
| 391 |
+
being studied in our experiments. Deterministic models are also unfit because with such
|
| 392 |
+
small populations and measurements at single-cell resolution, stochasticity in cell activity
|
| 393 |
+
does not average out. The nuanced differences between individual cells cannot be captured
|
| 394 |
+
by a different deterministic mechanism of each individual cell, and the only information
|
| 395 |
+
available is the initial cell number. Thus, the unobservable nuances between cells are taken
|
| 396 |
+
care of by a stochastic model.
|
| 397 |
+
Given the small populations, our model should be purely stochastic, without determin-
|
| 398 |
+
istic growth. The focus is the concrete population size of a finite number (three) of types,
|
| 399 |
+
thus Poisson processes are not suitable. Markov chains can partially describe the propor-
|
| 400 |
+
tions under some conditions [47], but population sizes are known, not just their ratios,
|
| 401 |
+
therefore Markov chains are not necessary. Even the lifted Markov chains [48] and random
|
| 402 |
+
dynamical systems [52] are not applicable in this situation, since the population should be
|
| 403 |
+
8
|
| 404 |
+
|
| 405 |
+
non-negative. Branching processes can describe the population size of multiple types with
|
| 406 |
+
symmetric and asymmetric division, transition, and death [19]. Also, the parameters can
|
| 407 |
+
be temporally and spatially inhomogeneous, which is convenient. Therefore, we utilized
|
| 408 |
+
branching processes in our model.
|
| 409 |
+
In the branching process, each cell during each time interval independently and ran-
|
| 410 |
+
domly chooses a behavior: division, death, or stagnation in the quiescent state, whose rates
|
| 411 |
+
depend on the cell growth type. Denoting the growth rate and death rate of the fast type
|
| 412 |
+
by gF and dF respectively, and the population size of fast type cells on Day n by F(n), the
|
| 413 |
+
population at Day n + 1 is:
|
| 414 |
+
F(n + 1) =
|
| 415 |
+
F(n)
|
| 416 |
+
�
|
| 417 |
+
i=1
|
| 418 |
+
Ai,
|
| 419 |
+
where Ai for different i are independent. Ai represents the descendants of a fast type cell i
|
| 420 |
+
after one day. It equals 2 with probability gF, 0 with probability dF, and 1 with probability
|
| 421 |
+
1 − gF − dF. Therefore, given F(n), the distribution of F(n + 1) is:
|
| 422 |
+
P[F(n + 1) = N] =
|
| 423 |
+
�
|
| 424 |
+
2a+b=N
|
| 425 |
+
F(n)!
|
| 426 |
+
a!b![F(n) − a − b]!ga
|
| 427 |
+
Fd[F(n)−a−b]
|
| 428 |
+
F
|
| 429 |
+
(1 − gF − dF)b,
|
| 430 |
+
where the summation is taken for all non-negative integer pairs (a, b) with 2a + b = N.
|
| 431 |
+
Moderate and slow types evolve similarly, with their corresponding growth rates gM, gS,
|
| 432 |
+
and death rates dM, dS.
|
| 433 |
+
As shown in Fig. 2, the growth rates gF, gM, and gS should be decreasing functions of
|
| 434 |
+
the total population. In our model, we adopted a quadratic function.
|
| 435 |
+
We performed a parameter scan to show that our model could reproduce experimental
|
| 436 |
+
phenomena for a wide range of model parameters (see details in Table 3).
|
| 437 |
+
The simulation results are shown on the right panels of Figs. 1–3, in comparison with
|
| 438 |
+
the experimental data in the left. Our model qualitatively captured the growth patterns
|
| 439 |
+
of groups with different initial seeding cell numbers. For example, in Fig. 2, when wells
|
| 440 |
+
were less than half full (cell number < 20000), most wells in the N0 = 10-cell group grew
|
| 441 |
+
faster than the N0 = 1-cell group even when they had the same cell number. In Fig. 3,
|
| 442 |
+
all wells in the N0 = 10-cell group in our model grew quickly until saturation. Similar to
|
| 443 |
+
the experiment, some wells in the N0 = 1-cell group in our model never grew, while some
|
| 444 |
+
began to take off very late.
|
| 445 |
+
In our model, the high extinction rate in the N0 = 1-cell group (14/80) was explained
|
| 446 |
+
as “bad luck” at the early stage, since birth rate and death rate were close, and a cell could
|
| 447 |
+
easily die without division. Another possible explanation for such a difference in growth
|
| 448 |
+
rates was that the population would be 10 small colonies when starting from 10 initial cells,
|
| 449 |
+
while starting from 1 initial cell, the population would be 1 large colony. With the same
|
| 450 |
+
area, 10 small colonies should have a larger total perimeter, thus larger growth space and
|
| 451 |
+
larger growth rate than that of 1 large colony. However, we carefully checked the photos,
|
| 452 |
+
9
|
| 453 |
+
|
| 454 |
+
Parameters
|
| 455 |
+
Appearance of experimental phenomena
|
| 456 |
+
pF
|
| 457 |
+
pM
|
| 458 |
+
pS
|
| 459 |
+
d
|
| 460 |
+
g0
|
| 461 |
+
r
|
| 462 |
+
Feature 1
|
| 463 |
+
Feature 2
|
| 464 |
+
Feature 3
|
| 465 |
+
Feature 4
|
| 466 |
+
0.4
|
| 467 |
+
0.4
|
| 468 |
+
0.2
|
| 469 |
+
0.01
|
| 470 |
+
0.5
|
| 471 |
+
0.1
|
| 472 |
+
Yes
|
| 473 |
+
Yes
|
| 474 |
+
Yes
|
| 475 |
+
Yes
|
| 476 |
+
0.4
|
| 477 |
+
0.4
|
| 478 |
+
0.2
|
| 479 |
+
0
|
| 480 |
+
0.5
|
| 481 |
+
0.1
|
| 482 |
+
Yes
|
| 483 |
+
Yes
|
| 484 |
+
Yes
|
| 485 |
+
Yes
|
| 486 |
+
0.4
|
| 487 |
+
0.4
|
| 488 |
+
0.2
|
| 489 |
+
0.05
|
| 490 |
+
0.5
|
| 491 |
+
0.1
|
| 492 |
+
Yes
|
| 493 |
+
Yes
|
| 494 |
+
Yes
|
| 495 |
+
Yes
|
| 496 |
+
0.4
|
| 497 |
+
0.4
|
| 498 |
+
0.2
|
| 499 |
+
0.1
|
| 500 |
+
0.5
|
| 501 |
+
0.1
|
| 502 |
+
No
|
| 503 |
+
Yes
|
| 504 |
+
Yes
|
| 505 |
+
No
|
| 506 |
+
0.4
|
| 507 |
+
0.4
|
| 508 |
+
0.2
|
| 509 |
+
0.01
|
| 510 |
+
0.45
|
| 511 |
+
0.1
|
| 512 |
+
Yes
|
| 513 |
+
Yes
|
| 514 |
+
Yes
|
| 515 |
+
Yes
|
| 516 |
+
0.4
|
| 517 |
+
0.4
|
| 518 |
+
0.2
|
| 519 |
+
0.01
|
| 520 |
+
0.6
|
| 521 |
+
0.1
|
| 522 |
+
Yes
|
| 523 |
+
Yes
|
| 524 |
+
Yes
|
| 525 |
+
Yes
|
| 526 |
+
0.4
|
| 527 |
+
0.4
|
| 528 |
+
0.2
|
| 529 |
+
0.01
|
| 530 |
+
0.4
|
| 531 |
+
0.1
|
| 532 |
+
Yes
|
| 533 |
+
Yes
|
| 534 |
+
Yes
|
| 535 |
+
No
|
| 536 |
+
0.4
|
| 537 |
+
0.4
|
| 538 |
+
0.2
|
| 539 |
+
0.01
|
| 540 |
+
0.5
|
| 541 |
+
0.05
|
| 542 |
+
Yes
|
| 543 |
+
Yes
|
| 544 |
+
Yes
|
| 545 |
+
Yes
|
| 546 |
+
0.4
|
| 547 |
+
0.4
|
| 548 |
+
0.2
|
| 549 |
+
0.01
|
| 550 |
+
0.5
|
| 551 |
+
0
|
| 552 |
+
Yes
|
| 553 |
+
Yes
|
| 554 |
+
Yes
|
| 555 |
+
Yes
|
| 556 |
+
0.4
|
| 557 |
+
0.4
|
| 558 |
+
0.2
|
| 559 |
+
0.01
|
| 560 |
+
0.5
|
| 561 |
+
0.15
|
| 562 |
+
Yes
|
| 563 |
+
Yes
|
| 564 |
+
Yes
|
| 565 |
+
No
|
| 566 |
+
0.4
|
| 567 |
+
0.4
|
| 568 |
+
0.2
|
| 569 |
+
0.01
|
| 570 |
+
0.5
|
| 571 |
+
0.2
|
| 572 |
+
No
|
| 573 |
+
Yes
|
| 574 |
+
Yes
|
| 575 |
+
No
|
| 576 |
+
0.3
|
| 577 |
+
0.5
|
| 578 |
+
0.2
|
| 579 |
+
0.01
|
| 580 |
+
0.5
|
| 581 |
+
0.1
|
| 582 |
+
Yes
|
| 583 |
+
Yes
|
| 584 |
+
Yes
|
| 585 |
+
Yes
|
| 586 |
+
0.5
|
| 587 |
+
0.3
|
| 588 |
+
0.2
|
| 589 |
+
0.01
|
| 590 |
+
0.5
|
| 591 |
+
0.1
|
| 592 |
+
Yes
|
| 593 |
+
Yes
|
| 594 |
+
Yes
|
| 595 |
+
Yes
|
| 596 |
+
0.4
|
| 597 |
+
0.5
|
| 598 |
+
0.1
|
| 599 |
+
0.01
|
| 600 |
+
0.5
|
| 601 |
+
0.1
|
| 602 |
+
Yes
|
| 603 |
+
Yes
|
| 604 |
+
Yes
|
| 605 |
+
Yes
|
| 606 |
+
0.4
|
| 607 |
+
0.3
|
| 608 |
+
0.3
|
| 609 |
+
0.01
|
| 610 |
+
0.5
|
| 611 |
+
0.1
|
| 612 |
+
Yes
|
| 613 |
+
Yes
|
| 614 |
+
Yes
|
| 615 |
+
Yes
|
| 616 |
+
0.5
|
| 617 |
+
0.4
|
| 618 |
+
0.1
|
| 619 |
+
0.01
|
| 620 |
+
0.5
|
| 621 |
+
0.1
|
| 622 |
+
Yes
|
| 623 |
+
Yes
|
| 624 |
+
Yes
|
| 625 |
+
Yes
|
| 626 |
+
0.3
|
| 627 |
+
0.4
|
| 628 |
+
0.3
|
| 629 |
+
0.01
|
| 630 |
+
0.5
|
| 631 |
+
0.1
|
| 632 |
+
Yes
|
| 633 |
+
Yes
|
| 634 |
+
Yes
|
| 635 |
+
Yes
|
| 636 |
+
0.1
|
| 637 |
+
0.1
|
| 638 |
+
0.8
|
| 639 |
+
0.01
|
| 640 |
+
0.5
|
| 641 |
+
0.1
|
| 642 |
+
No
|
| 643 |
+
Yes
|
| 644 |
+
Yes
|
| 645 |
+
No
|
| 646 |
+
0.5
|
| 647 |
+
0.5
|
| 648 |
+
0
|
| 649 |
+
0.01
|
| 650 |
+
0.5
|
| 651 |
+
0.1
|
| 652 |
+
Yes
|
| 653 |
+
Yes
|
| 654 |
+
No
|
| 655 |
+
Yes
|
| 656 |
+
0
|
| 657 |
+
0.5
|
| 658 |
+
0.5
|
| 659 |
+
0.01
|
| 660 |
+
0.5
|
| 661 |
+
0.1
|
| 662 |
+
No
|
| 663 |
+
Yes
|
| 664 |
+
Yes
|
| 665 |
+
Yes
|
| 666 |
+
0.5
|
| 667 |
+
0
|
| 668 |
+
0.5
|
| 669 |
+
0.01
|
| 670 |
+
0.5
|
| 671 |
+
0.1
|
| 672 |
+
Yes
|
| 673 |
+
No
|
| 674 |
+
Yes
|
| 675 |
+
No
|
| 676 |
+
1
|
| 677 |
+
0
|
| 678 |
+
0
|
| 679 |
+
0.01
|
| 680 |
+
0.5
|
| 681 |
+
0.1
|
| 682 |
+
Yes
|
| 683 |
+
No
|
| 684 |
+
No
|
| 685 |
+
No
|
| 686 |
+
Table 3: Performance of our model with different parameters. Here we adjusted the param-
|
| 687 |
+
eters of our model in a wide range and observed whether the model could still reproduce
|
| 688 |
+
four important “features” in the experiment. This parameter scan showed that our model
|
| 689 |
+
is robust under perturbations on parameters. Here pF, pM, pS are the probabilities that an
|
| 690 |
+
initial cell is of fast, moderate, or slow type; d is the death rate; g0 is the growth factor;
|
| 691 |
+
r is the range of the random modifier. See the Methods section for explanations of these
|
| 692 |
+
parameters.
|
| 693 |
+
Feature 1, all wells in the N0 = 10-cell group were saturated; Feature 2,
|
| 694 |
+
presence of late-growing wells in the N0 = 1-cell group; Feature 3, presence of non-growing
|
| 695 |
+
wells in the N0 = 1-cell group; Feature 4, different growth rates at the same population
|
| 696 |
+
size between the N0 = 10-cell group and the N0 = 1-cell group.
|
| 697 |
+
10
|
| 698 |
+
|
| 699 |
+
and found that almost all wells produced 1 large colony with nearly the same shape, and
|
| 700 |
+
there was no significant relationship between colony perimeter and growth rate.
|
| 701 |
+
3
|
| 702 |
+
Discussion
|
| 703 |
+
As many recent single-cell level data have shown, a tumor can contain multiple distinct
|
| 704 |
+
subpopulations engaging in interconversions and interactions among them that can in-
|
| 705 |
+
fluence cancer cell proliferation, death, migration, and other features that contribute to
|
| 706 |
+
malignancy [33, 55, 1, 18, 34, 56, 20, 24, 5, 32, 6]. Presence of these two intra-population
|
| 707 |
+
behaviors can be manifest as departure from the elementary model of exponential growth
|
| 708 |
+
[35] (in the early phase of population growth, far away from carrying capacity of the culture
|
| 709 |
+
environment which is trivially non-exponential). The exponential growth model assumes
|
| 710 |
+
uniformity of cell division rates across all cells (hence a population doubling rate that is
|
| 711 |
+
proportional to a given population size N(t)) and the absence of cell-cell interactions that
|
| 712 |
+
affect cell division and death rates. Investigating the “non-genetic heterogeneity” hypoth-
|
| 713 |
+
esis of cancer cells quantitatively is therefore paramount for understanding cancer biology
|
| 714 |
+
but also for elementary principles of cell population growth.
|
| 715 |
+
As an example, here we showed that clonal cell populations of the leukemia HL60
|
| 716 |
+
cell line are heterogeneous with regard to growth behaviors of individual cells that can
|
| 717 |
+
be summarized in subpopulations characterized by a distinct intrinsic growth rates which
|
| 718 |
+
were revealed by analysis of the early population growth starting with microcultures seeded
|
| 719 |
+
with varying (low) cell number N0.
|
| 720 |
+
Since we have noted only very weak effect of cell-cell interactions on cell growth be-
|
| 721 |
+
haviors (Allee effect) in this cell line (as opposed to another cell tumor cell line in which
|
| 722 |
+
we found that departure from exponential growth could be explained by the Allee effect
|
| 723 |
+
[20]), we focused on the very presence among HL60 cells of subpopulations with distinct
|
| 724 |
+
proliferative capacity as a mechanism for the departure of the early population growth
|
| 725 |
+
curve from exponential growth.
|
| 726 |
+
The reseeding experiment demonstrated that the characteristic growth behaviors of
|
| 727 |
+
subpopulations could be inherited across cell generations and after moving to a new envi-
|
| 728 |
+
ronment (fresh culture), consistent with long-enduring endogenous properties of the cells.
|
| 729 |
+
This result might be explained by cells occupying distinct stable cell states (in a multi-
|
| 730 |
+
stable system). Thus, we introduced multiple cell types with different growth rates in our
|
| 731 |
+
stochastic model. Specifically, in a branching process model, we assumed the existence
|
| 732 |
+
of three types: fast, moderate, and slow cells. The model we built could replicate the
|
| 733 |
+
key features in the experimental data, such as different growth rates at the same popula-
|
| 734 |
+
tion size between the N0 = 10-cell group and the N0 = 1-cell group, and the presence of
|
| 735 |
+
late-growing and non-growing wells in the N0 = 1-cell group.
|
| 736 |
+
While we were able to fit the observed behaviors in which the growth rate depended not
|
| 737 |
+
only on N(t) but also on N0, the existence of the three or even more cell types still needs
|
| 738 |
+
11
|
| 739 |
+
|
| 740 |
+
to be verified experimentally. For instance, statistical cluster analysis of transcriptomes of
|
| 741 |
+
individual cells by single-cell RNA-seq [3] over the population may identify the presence
|
| 742 |
+
of transcriptomically distinct subpopulations that could be isolated (e.g., after association
|
| 743 |
+
with cell surface markers) and evaluated separately for their growth behaviors. We might
|
| 744 |
+
apply inference methods on such sequencing data to determine the gene regulatory relations
|
| 745 |
+
that lead to multiple phenotypes [50, 44], although the causal relationship might not always
|
| 746 |
+
be determined [49]. Besides, since the existence of transposons might affect the growth
|
| 747 |
+
rates, corresponding analysis should be conducted [21, 40].
|
| 748 |
+
The central assumption of coexistence of multiple subpopulations in the cell line stock
|
| 749 |
+
must be accompanied by the second assumption that there are transitions between these
|
| 750 |
+
distinct cell populations. For otherwise, in the stock population the fastest growing cell
|
| 751 |
+
would eventually outgrow the slow growing cells. Furthermore, one has to assume a steady-
|
| 752 |
+
state in which the population of slow growing cells are continuously replenished from the
|
| 753 |
+
population of fast-growing cells. Finally, we must assume that the steady-state proportions
|
| 754 |
+
of the subpopulations are such that at low seeding wells with N0 = 1 cells, there is a sizable
|
| 755 |
+
probability that a microculture receives cells from each of the (three) presumed subtypes of
|
| 756 |
+
cells. The number of wells in the ensemble of replicate microcultures for each N0- condition
|
| 757 |
+
has been sufficiently large for us to make the observations and inform the model, but a
|
| 758 |
+
larger ensemble would be required to determine with satisfactory accuracy the relative
|
| 759 |
+
proportions of the cell types in the parental stock population.
|
| 760 |
+
Transitions might also have been happening during our experiment. For example, those
|
| 761 |
+
late growing wells in the N0 = 1-cell group could be explained by such a transition: Initially,
|
| 762 |
+
only slow type cells were present, but once one of these slow growing cells switched to the
|
| 763 |
+
moderate type, an exponential growth ensued at the same rate that is intrinsic to that of
|
| 764 |
+
moderate cells.
|
| 765 |
+
If there are transitions, what is the transition rate? Our reseeding experiments are
|
| 766 |
+
compatible with a relatively slow rate for interconversion of growth behaviors in that the
|
| 767 |
+
same growth type was maintained across 30 generations. An alternative to the principle
|
| 768 |
+
of transition at a constant intrinsic to each of the types of cells may be that transition
|
| 769 |
+
is extrinsically determined. Specifically, the seeding in the “lone” condition of N0 = 1
|
| 770 |
+
may induce a dormant state, that is a transition to a slower growth mode that is then
|
| 771 |
+
maintained, on average over 30+ generations, with occasional return to the faster types
|
| 772 |
+
that account for the delayed exponential growth. The lack of experimental data might be
|
| 773 |
+
partially made up by inference methods [51].
|
| 774 |
+
This model however would bring back the notion of “environment awareness”, or the
|
| 775 |
+
principle of a “critical density” for growth implemented by cell-cell interaction (Allee effect)
|
| 776 |
+
which we had deliberately not considered (see above) since it was not necessary. We do not
|
| 777 |
+
exclude this possibility which could be experimentally tested as follows: Cultivate N0 = 1-
|
| 778 |
+
cell wells for 20 days when the delayed exponential growth has happened in some wells,
|
| 779 |
+
but then use the cells of those wells with fast-growing population (which should contain of
|
| 780 |
+
the fast type) to restart the experiment, seeded at N0 = 10, 4, 1 cells. If wells with different
|
| 781 |
+
12
|
| 782 |
+
|
| 783 |
+
seeding numbers exhibit the same growth rates, then the growth difference in the original
|
| 784 |
+
experiment is solely due to preexisting (slow interconverting) cell phenotypes. If now the
|
| 785 |
+
N0 = 1-cell wells resumes the typical slow growth, this would indicate a density induced
|
| 786 |
+
transition to the slow growth type. If cell-cell interaction needs to be taken into account,
|
| 787 |
+
certain results in developmental biology might help, since they study the emergence of
|
| 788 |
+
patterns through strong cell-cell interactions [46, 45, 42].
|
| 789 |
+
In the spirit of Occam’s razor, and given the technical difficulty in separate experiments
|
| 790 |
+
to demonstrate cell-cell interactions in HL60 cells, we were able to model the observed
|
| 791 |
+
behaviors with the simplest assumption of cell-autonomous properties, including existence
|
| 792 |
+
of multiple states (growth behaviors) and slow transitions between them but without cell
|
| 793 |
+
density dependence or interactions.
|
| 794 |
+
Taken together, we showed that one manifestation of the burgeoning awareness of ubiq-
|
| 795 |
+
uitous cell phenotype heterogeneity in an isogenic cell population is the presence of distinct
|
| 796 |
+
intrinsic types of cells that slowly interconvert among them, resulting in a stationary popu-
|
| 797 |
+
lation composition. The differing growth rates of the subtypes and their stable proportions
|
| 798 |
+
may be an elementary characteristic of a given population that by itself can account for the
|
| 799 |
+
departure of early population growth kinetics from the basic exponential growth model.
|
| 800 |
+
4
|
| 801 |
+
Methods
|
| 802 |
+
4.1
|
| 803 |
+
Setup of growth experiment with different initial cell numbers.
|
| 804 |
+
HL60 cells were maintained in IMDM wGln, 20% FBS(heat inactivated), 1% P/S at a
|
| 805 |
+
cell density between 3 × 105 and 2.5 × 106 cells/ml (GIBCO). Cells were always handled
|
| 806 |
+
and maintained under sterile conditions (tissue culture hood; 37◦C, 5% CO2, humidified
|
| 807 |
+
incubator). At the beginning of the experiment, cells were collected, washed two times in
|
| 808 |
+
PBS, and stained for vitality (Trypan blue GIBCO). The population of cells was first gated
|
| 809 |
+
for morphology and then for vitality staining. Only Trypan negative cells were sorted (BD
|
| 810 |
+
FACSAria II). The cells were sorted in a 384 well plate with IMDM wGln, 20% FBS(heat
|
| 811 |
+
inactivated), and 1% P/S (GIBCO).
|
| 812 |
+
Cell population growth was monitored using a Leica microscope (heated environmental
|
| 813 |
+
chamber and CO2 levels control) with a motorized tray. Starting from Day 4, the 384
|
| 814 |
+
well plate was placed inside the environmental chamber every 24 hours. The images were
|
| 815 |
+
acquired in a 3 × 3 grid for each well; after acquisition, the 9 fields were stitched into a
|
| 816 |
+
single image. Software ImageJ was applied to identify and estimate the area occupied by
|
| 817 |
+
“entities” in each image. The area (proportional to cell number) was used to follow the
|
| 818 |
+
cell growth.
|
| 819 |
+
13
|
| 820 |
+
|
| 821 |
+
4.2
|
| 822 |
+
Setup of reseeding experiment for growth pattern inheritance.
|
| 823 |
+
HL60 cells were cultivated for 3 weeks, and then we chose one full well and one half full
|
| 824 |
+
well. We supposed the full well was dominated by fast type cells, and the half-full well
|
| 825 |
+
was dominated by moderate type cells, which had lower growth rates. We reseeded cells
|
| 826 |
+
from these two wells and cultivated them in two 96-well (rows A-H, columns 1-12) plates.
|
| 827 |
+
In each plate, B2-B11, D2-D11, and F2-F11 wells started with 78 fast cells, while C2-C11,
|
| 828 |
+
E2-E11, and G2-G11 wells started with 78 moderate cells. Rows A, H, columns 1, 12 had
|
| 829 |
+
no cells and no media, and we found that wells in rows B, G, columns 2, 11, which were
|
| 830 |
+
the outmost non-empty wells, evaporated much faster than inner wells. Therefore, the
|
| 831 |
+
growth of cells in those wells was much slower than inner wells. Hence we only considered
|
| 832 |
+
inner wells, where D3-D10 and F3-F10 started with fast cells, C3-C10 and E3-E10 started
|
| 833 |
+
with moderate cells, namely 32 fast wells and 32 moderate wells in total.
|
| 834 |
+
During the
|
| 835 |
+
experiment, no media was added. Each day, we observed those wells to check whether
|
| 836 |
+
their areas exceeded one-half of the whole well. The experiment was terminated after 20
|
| 837 |
+
days.
|
| 838 |
+
4.3
|
| 839 |
+
Weighted Welch’s t-test.
|
| 840 |
+
The weighted Welch’s t-test is used to test the hypothesis that two populations have equal
|
| 841 |
+
mean, while sample values have different weights [12].
|
| 842 |
+
Assume for group i (i = 1, 2),
|
| 843 |
+
the sample size is Ni and the jth sample is the average of cj
|
| 844 |
+
i independent and identically
|
| 845 |
+
distributed variables. Let Xj
|
| 846 |
+
i be the observed average for the jth sample. Set ν1 = N1 − 1,
|
| 847 |
+
ν2 = N2 − 1. Define
|
| 848 |
+
¯
|
| 849 |
+
Xi
|
| 850 |
+
W = (
|
| 851 |
+
Ni
|
| 852 |
+
�
|
| 853 |
+
j=1
|
| 854 |
+
Xj
|
| 855 |
+
i cj)/(
|
| 856 |
+
Ni
|
| 857 |
+
�
|
| 858 |
+
j=1
|
| 859 |
+
)cj,
|
| 860 |
+
s2
|
| 861 |
+
i,W =
|
| 862 |
+
Ni[�Ni
|
| 863 |
+
j=1(Xj
|
| 864 |
+
i )2cj]/(�Ni
|
| 865 |
+
j=1 cj
|
| 866 |
+
i) − Ni( ¯
|
| 867 |
+
Xi
|
| 868 |
+
W )2
|
| 869 |
+
Ni − 1
|
| 870 |
+
,
|
| 871 |
+
t =
|
| 872 |
+
¯
|
| 873 |
+
X1
|
| 874 |
+
W − ¯
|
| 875 |
+
X2
|
| 876 |
+
W
|
| 877 |
+
�
|
| 878 |
+
s2
|
| 879 |
+
1,W
|
| 880 |
+
N1 +
|
| 881 |
+
s2
|
| 882 |
+
2,W
|
| 883 |
+
N2
|
| 884 |
+
,
|
| 885 |
+
ν =
|
| 886 |
+
(
|
| 887 |
+
s2
|
| 888 |
+
1,W
|
| 889 |
+
N1 +
|
| 890 |
+
s2
|
| 891 |
+
2,W
|
| 892 |
+
N2 )2
|
| 893 |
+
s4
|
| 894 |
+
1,W
|
| 895 |
+
N2
|
| 896 |
+
1 ν1 +
|
| 897 |
+
s4
|
| 898 |
+
2,W
|
| 899 |
+
N2
|
| 900 |
+
2 ν2
|
| 901 |
+
.
|
| 902 |
+
If two populations have equal mean, then t satisfies the t-distribution with degree of freedom
|
| 903 |
+
ν.
|
| 904 |
+
The weighted Welch’s t-test was applied to the growth experiment with different initial
|
| 905 |
+
cell numbers, in order to determine whether the growth rates during exponential phase
|
| 906 |
+
14
|
| 907 |
+
|
| 908 |
+
(5–50 area units) were different between groups. Here Xj
|
| 909 |
+
i corresponded to growth rate,
|
| 910 |
+
and cj
|
| 911 |
+
i corresponded to cell area. The p-value for N0 = 10-cell group vs. N0 = 4-cell group
|
| 912 |
+
was 2.12 × 10−8; the p-value for N0 = 10-cell group vs. N0 = 1-cell group was smaller than
|
| 913 |
+
10−12; the p-value for N0 = 4-cell group vs. N0 = 1-cell group was 5.35 × 10−5. Therefore,
|
| 914 |
+
the growth rate difference between any two groups was statistically significant.
|
| 915 |
+
4.4
|
| 916 |
+
Permutation Test.
|
| 917 |
+
The permutation test is a non-parametric method to test whether two samples are signifi-
|
| 918 |
+
cantly different with respect to a statistic (e.g., sample mean) [16]. It is easy to calculate
|
| 919 |
+
and fits our situation, thus we adopt this test rather than other more complicated tests,
|
| 920 |
+
such as the Mann-Whitney test.
|
| 921 |
+
For two samples {x1, · · · , xm}, {y1, · · · , yn}, consider
|
| 922 |
+
the null hypothesis: the mean of x and y are the same. For these samples, calculate the
|
| 923 |
+
mean of the first sample: µ0 =
|
| 924 |
+
1
|
| 925 |
+
m
|
| 926 |
+
� xi. Then we randomly divide these m + n samples
|
| 927 |
+
into two groups with size m and n: {x′
|
| 928 |
+
1, · · · , x′
|
| 929 |
+
m}, {y′
|
| 930 |
+
1, · · · , y′
|
| 931 |
+
n}, such that each permuta-
|
| 932 |
+
tion has equal probability. For these new samples, calculate the mean of the first sample:
|
| 933 |
+
µ′
|
| 934 |
+
0 = 1
|
| 935 |
+
m
|
| 936 |
+
� x′
|
| 937 |
+
i. Then the two-sided p-value is defined as
|
| 938 |
+
p = 2 min{P(µ0 ≤ µ′
|
| 939 |
+
0), 1 − P(µ0 ≤ µ′
|
| 940 |
+
0)}.
|
| 941 |
+
If µ0 is an extreme value in the distribution of µ′
|
| 942 |
+
0, then the two sample means are different.
|
| 943 |
+
In the reseeding experiment, the mean time of exceeding half well for the fast group
|
| 944 |
+
was 11.4375 days. For all
|
| 945 |
+
�64
|
| 946 |
+
32
|
| 947 |
+
�
|
| 948 |
+
possible result combinations, only 7 combinations had equal
|
| 949 |
+
or less mean time. Thus the p-value was 2 × 7/
|
| 950 |
+
�64
|
| 951 |
+
32
|
| 952 |
+
�
|
| 953 |
+
= 7.6 × 10−18. This indicated that the
|
| 954 |
+
growth rate difference between fast group and moderate group was significant.
|
| 955 |
+
4.5
|
| 956 |
+
Model Details.
|
| 957 |
+
The simulation time interval was half day, but we only utilized the results in full days. For
|
| 958 |
+
each initial cell, the probabilities of being fast, moderate or slow type, pF, pM, pS, were 0.4,
|
| 959 |
+
0.4, 0.2.
|
| 960 |
+
Each half day, a fast type cell had probability d to die, and probability gF to divide.
|
| 961 |
+
The division produced two fast cells, capturing the intrinsic growth behavior that is to
|
| 962 |
+
some extent inheritable. Denote the total cell number of previous day as N, then
|
| 963 |
+
gF = g0(1 − N2/C2) + δ,
|
| 964 |
+
where δ is a random variable that satisfies the uniform distribution on [−r, r], and it is a
|
| 965 |
+
constant for all cells in the same well. If gF < 0, set gF = 0. If gF > 1 − d, set gF = 1 − d.
|
| 966 |
+
In the simulation displayed, death rate d = 0.01, carrying capacity C = 40000, growth
|
| 967 |
+
factor g0 = 0.5, and the range of random modifier r = 0.1.
|
| 968 |
+
Each half day, a moderate type cell had probability d to die, and probability gM to
|
| 969 |
+
divide. The division produced two moderate cells. gM = gF/1.5.
|
| 970 |
+
15
|
| 971 |
+
|
| 972 |
+
Similarly, each half day, a slow type cell had probability d to die, and probability gS to
|
| 973 |
+
divide. The division produced two slow-growing cells. gS = gF/3.
|
| 974 |
+
4.6
|
| 975 |
+
Parameter scan.
|
| 976 |
+
Since growth is measured by the area covered by cells, we could not experimentally verify
|
| 977 |
+
most assumptions of our model, or determine the values of parameters.
|
| 978 |
+
Therefore, we
|
| 979 |
+
performed a parameter scan by evaluating the performance of our model for different sets
|
| 980 |
+
of parameters.
|
| 981 |
+
We adjusted 6 parameters: initial type probabilities pF, pM, pS, death
|
| 982 |
+
rate d, growth factor g0, and random modifier r. We checked whether these 4 features
|
| 983 |
+
observable in the experiment could be reproduced: growth of all wells in the N0 = 10-cell
|
| 984 |
+
group to saturation; existence of late-growing wells in the N0 = 1-cell group; existence of
|
| 985 |
+
non-growing wells in the N0 = 1-cell group; difference in growth rates in the N0 = 10-cell
|
| 986 |
+
group and the N0 = 1-cell group at the same population size. Table 3 shows the results
|
| 987 |
+
of the performance of simulations with the various parameter sets. Within a wide range
|
| 988 |
+
of parameters, our model is able to replicate the experimental results shown in Figs. 1–3,
|
| 989 |
+
indicating that our model is robust under perturbations.
|
| 990 |
+
Acknowledgements
|
| 991 |
+
We would like to thank Ivana Bozic, Yifei Liu, Georg Luebeck, Weili Wang, Yuting Wei
|
| 992 |
+
and Lingxue Zhu for helpful advice and discussions.
|
| 993 |
+
References
|
| 994 |
+
[1] Angelini, E., Wang, Y., Zhou, J. X., Qian, H., and Huang, S. A model for
|
| 995 |
+
the intrinsic limit of cancer therapy: Duality of treatment-induced cell death and
|
| 996 |
+
treatment-induced stemness. PLOS Comput. Biol. 18, 7 (2022), e1010319.
|
| 997 |
+
[2] Bartoszynski, R., Brown, B. W., McBride, C. M., and Thompson, J. R.
|
| 998 |
+
Some nonparametric techniques for estimating the intensity function of a cancer re-
|
| 999 |
+
lated nonstationary Poisson process. Ann. Stat. (1981), 1050–1060.
|
| 1000 |
+
[3] Bhartiya, D., Kausik, A., Singh, P., and Sharma, D. Will single-cell rnaseq
|
| 1001 |
+
decipher stem cells biology in normal and cancerous tissues?
|
| 1002 |
+
Hum. Reprod. Update
|
| 1003 |
+
27, 2 (2021), 421–421.
|
| 1004 |
+
[4] Chang, H. H., Hemberg, M., Barahona, M., Ingber, D. E., and Huang,
|
| 1005 |
+
S. Transcriptome-wide noise controls lineage choice in mammalian progenitor cells.
|
| 1006 |
+
Nature 453, 7194 (2008), 544–547.
|
| 1007 |
+
16
|
| 1008 |
+
|
| 1009 |
+
[5] Chapman, A., del Ama, L. F., Ferguson, J., Kamarashev, J., Wellbrock,
|
| 1010 |
+
C., and Hurlstone, A. Heterogeneous tumor subpopulations cooperate to drive
|
| 1011 |
+
invasion. Cell Rep. 8, 3 (2014), 688–695.
|
| 1012 |
+
[6] Chen, X., Wang, Y., Feng, T., Yi, M., Zhang, X., and Zhou, D. The overshoot
|
| 1013 |
+
and phenotypic equilibrium in characterizing cancer dynamics of reversible phenotypic
|
| 1014 |
+
plasticity. J. Theor. Biol. 390 (2016), 40–49.
|
| 1015 |
+
[7] Clark, W. H. Tumour progression and the nature of cancer. Br. J. Cancer 64, 4
|
| 1016 |
+
(1991), 631.
|
| 1017 |
+
[8] Dewanji, A., Luebeck, E. G., and Moolgavkar, S. H. A generalized Luria–
|
| 1018 |
+
Delbr¨uck model. Math. Biosci. 197, 2 (2005), 140–152.
|
| 1019 |
+
[9] Durrett, R., Foo, J., Leder, K., Mayberry, J., and Michor, F. Intratumor
|
| 1020 |
+
heterogeneity in evolutionary models of tumor progression. Genetics 188, 2 (2011),
|
| 1021 |
+
461–477.
|
| 1022 |
+
[10] Egeblad, M., Nakasone, E. S., and Werb, Z.
|
| 1023 |
+
Tumors as organs: Complex
|
| 1024 |
+
tissues that interface with the entire organism. Dev. Cell 18, 6 (2010), 884–901.
|
| 1025 |
+
[11] Gatenby, R. A., Cunningham, J. J., and Brown, J. S. Evolutionary triage gov-
|
| 1026 |
+
erns fitness in driver and passenger mutations and suggests targeting never mutations.
|
| 1027 |
+
Nat. Commun. 5 (2014), 5499.
|
| 1028 |
+
[12] Goldberg, L. R., Kercheval, A. N., and Lee, K.
|
| 1029 |
+
T-statistics for weighted
|
| 1030 |
+
means in credit risk modeling. J. Risk Finance 6, 4 (2005), 349–365.
|
| 1031 |
+
[13] Gunnarsson, E. B., De, S., Leder, K., and Foo, J. Understanding the role of
|
| 1032 |
+
phenotypic switching in cancer drug resistance. J. Theor. Biol 490 (2020), 110162.
|
| 1033 |
+
[14] Gupta, P. B., Fillmore, C. M., Jiang, G., Shapira, S. D., Tao, K., Kuper-
|
| 1034 |
+
wasser, C., and Lander, E. S. Stochastic state transitions give rise to phenotypic
|
| 1035 |
+
equilibrium in populations of cancer cells. Cell 146, 4 (2011), 633–644.
|
| 1036 |
+
[15] Hanahan, D., and Weinberg, R. A. Hallmarks of cancer: The next generation.
|
| 1037 |
+
Cell 144, 5 (2011), 646–674.
|
| 1038 |
+
[16] Hastie, T., Tibshirani, R., and Friedman, J. The Elements of Statistical Learn-
|
| 1039 |
+
ing, 2nd ed. Springer, New York, 2016.
|
| 1040 |
+
[17] Hordijk, W., Steel, M., and Dittrich, P.
|
| 1041 |
+
Autocatalytic sets and chemical
|
| 1042 |
+
organizations: modeling self-sustaining reaction networks at the origin of life. New J.
|
| 1043 |
+
Phys. 20, 1 (2018), 015011.
|
| 1044 |
+
17
|
| 1045 |
+
|
| 1046 |
+
[18] Howard, G. R., Johnson, K. E., Rodriguez Ayala, A., Yankeelov, T. E.,
|
| 1047 |
+
and Brock, A. A multi-state model of chemoresistance to characterize phenotypic
|
| 1048 |
+
dynamics in breast cancer. Sci. Rep. 8, 1 (2018), 1–11.
|
| 1049 |
+
[19] Jiang, D.-Q., Wang, Y., and Zhou, D. Phenotypic equilibrium as probabilistic
|
| 1050 |
+
convergence in multi-phenotype cell population dynamics. PLOS ONE 12, 2 (2017),
|
| 1051 |
+
e0170916.
|
| 1052 |
+
[20] Johnson, K. E., Howard, G., Mo, W., Strasser, M. K., Lima, E. A., Huang,
|
| 1053 |
+
S., and Brock, A. Cancer cell population growth kinetics at low densities deviate
|
| 1054 |
+
from the exponential growth model and suggest an Allee effect. PLOS Biol. 17, 8
|
| 1055 |
+
(2019), e3000399.
|
| 1056 |
+
[21] Kang, Y., Gu, C., Yuan, L., Wang, Y., Zhu, Y., Li, X., Luo, Q., Xiao, J.,
|
| 1057 |
+
Jiang, D., Qian, M., et al. Flexibility and symmetry of prokaryotic genome re-
|
| 1058 |
+
arrangement reveal lineage-associated core-gene-defined genome organizational frame-
|
| 1059 |
+
works. mBio 5, 6 (2014), e01867–14.
|
| 1060 |
+
[22] Koch, A. L. Mutation and growth rates from Luria-Delbr¨uck fluctuation tests. Mutat.
|
| 1061 |
+
Res. -Fund. Mol. M. 95, 2-3 (1982), 129–143.
|
| 1062 |
+
[23] Kochanowski, K., Sander, T., Link, H., Chang, J., Altschuler, S. J., and
|
| 1063 |
+
Wu, L. F. Systematic alteration of in vitro metabolic environments reveals empirical
|
| 1064 |
+
growth relationships in cancer cell phenotypes. Cell Rep. 34, 3 (2021), 108647.
|
| 1065 |
+
[24] Korolev, K. S., Xavier, J. B., and Gore, J. Turning ecology and evolution
|
| 1066 |
+
against cancer. Nat. Rev. Cancer 14, 5 (2014), 371–380.
|
| 1067 |
+
[25] Lea, D. E., and Coulson, C. A. The distribution of the numbers of mutants in
|
| 1068 |
+
bacterial populations. J. Genet. 49, 3 (1949), 264–285.
|
| 1069 |
+
[26] Li, Q., Wennborg, A., Aurell, E., Dekel, E., Zou, J.-Z., Xu, Y., Huang, S.,
|
| 1070 |
+
and Ernberg, I. Dynamics inside the cancer cell attractor reveal cell heterogeneity,
|
| 1071 |
+
limits of stability, and escape. Proc. Natl. Acad. Sci. U.S.A. 113, 10 (2016), 2672–2677.
|
| 1072 |
+
[27] Luebeck, G., and Moolgavkar, S. H. Multistage carcinogenesis and the incidence
|
| 1073 |
+
of colorectal cancer. Proc. Natl. Acad. Sci. 99, 23 (2002), 15095–15100.
|
| 1074 |
+
[28] Luria, S. E., and Delbr¨uck, M. Mutations of bacteria from virus sensitivity to
|
| 1075 |
+
virus resistance. Genetics 28, 6 (1943), 491.
|
| 1076 |
+
[29] Mackillop, W. J. The growth kinetics of human tumours. Clin. Phys. Physiol. M.
|
| 1077 |
+
11, 4A (1990), 121.
|
| 1078 |
+
[30] Meacham, C. E., and Morrison, S. J.
|
| 1079 |
+
Tumour heterogeneity and cancer cell
|
| 1080 |
+
plasticity. Nature 501, 7467 (2013), 328–337.
|
| 1081 |
+
18
|
| 1082 |
+
|
| 1083 |
+
[31] Newton, P. K., Mason, J., Bethel, K., Bazhenova, L. A., Nieva, J., and
|
| 1084 |
+
Kuhn, P.
|
| 1085 |
+
A stochastic markov chain model to describe lung cancer growth and
|
| 1086 |
+
metastasis. PLOS ONE 7, 4 (2012), e34637.
|
| 1087 |
+
[32] Niu, Y., Wang, Y., and Zhou, D. The phenotypic equilibrium of cancer cells:
|
| 1088 |
+
From average-level stability to path-wise convergence. J. Theor. Biol. 386 (2015),
|
| 1089 |
+
7–17.
|
| 1090 |
+
[33] Pisco, A. O., and Huang, S. Non-genetic cancer cell plasticity and therapy-induced
|
| 1091 |
+
stemness in tumour relapse: ‘What does not kill me strengthens me’. Br. J. Cancer
|
| 1092 |
+
112, 11 (2015), 1725–1732.
|
| 1093 |
+
[34] Sahoo, S., Mishra, A., Kaur, H., Hari, K., Muralidharan, S., Mandal, S.,
|
| 1094 |
+
and Jolly, M. K. A mechanistic model captures the emergence and implications of
|
| 1095 |
+
non-genetic heterogeneity and reversible drug resistance in ER+ breast cancer cells.
|
| 1096 |
+
NAR Cancer 3, 3 (2021), zcab027.
|
| 1097 |
+
[35] Skehan, P., and Friedman, S. J. Non-exponential growth by mammalian cells in
|
| 1098 |
+
culture. Cell Prolif. 17, 4 (1984), 335–343.
|
| 1099 |
+
[36] Sonnenschein, C., and Soto, A. M. Somatic mutation theory of carcinogenesis:
|
| 1100 |
+
Why it should be dropped and replaced. Mol. Carcinog. 29, 4 (2000), 205–211.
|
| 1101 |
+
[37] Speer, J. F., Petrosky, V. E., Retsky, M. W., and Wardwell, R. H. A
|
| 1102 |
+
stochastic numerical model of breast cancer growth that simulates clinical data. Cancer
|
| 1103 |
+
Res. 44, 9 (1984), 4124–4130.
|
| 1104 |
+
[38] Spina, S., Giorno, V., Rom´an-Rom´an, P., and Torres-Ruiz, F. A stochastic
|
| 1105 |
+
model of cancer growth subject to an intermittent treatment with combined effects:
|
| 1106 |
+
Reduction in tumor size and rise in growth rate. Bull. Math. Biol. 76, 11 (2014),
|
| 1107 |
+
2711–2736.
|
| 1108 |
+
[39] Tabassum, D. P., and Polyak, K. Tumorigenesis: It takes a village. Nat. Rev.
|
| 1109 |
+
Cancer 15, 8 (2015), 473–483.
|
| 1110 |
+
[40] Wang, Y.
|
| 1111 |
+
Algorithms for finding transposons in gene sequences.
|
| 1112 |
+
arXiv preprint
|
| 1113 |
+
arXiv:1506.02424 (2015).
|
| 1114 |
+
[41] Wang, Y. Some Problems in Stochastic Dynamics and Statistical Analysis of Single-
|
| 1115 |
+
Cell Biology of Cancer. Ph.D. thesis, University of Washington, 2018.
|
| 1116 |
+
[42] Wang, Y. Two metrics on rooted unordered trees with labels. Algorithms for Molec-
|
| 1117 |
+
ular Biology 17, 1 (2022), 1–17.
|
| 1118 |
+
19
|
| 1119 |
+
|
| 1120 |
+
[43] Wang, Y., Dessalles, R., and Chou, T. Modelling the impact of birth control
|
| 1121 |
+
policies on China’s population and age: effects of delayed births and minimum birth
|
| 1122 |
+
age constraints. Royal Society Open Science 9, 6 (2022), 211619.
|
| 1123 |
+
[44] Wang, Y., and He, S. Inference on autoregulation in gene expression. arXiv preprint
|
| 1124 |
+
arXiv:2201.03164 (2022).
|
| 1125 |
+
[45] Wang, Y., Kropp, J., and Morozova, N. Biological notion of positional informa-
|
| 1126 |
+
tion/value in morphogenesis theory. International Journal of Developmental Biology
|
| 1127 |
+
64, 10-11-12 (2020), 453–463.
|
| 1128 |
+
[46] Wang, Y., Minarsky, A., Penner, R., Soul´e, C., and Morozova, N. Model
|
| 1129 |
+
of morphogenesis. Journal of Computational Biology 27, 9 (2020), 1373–1383.
|
| 1130 |
+
[47] Wang, Y., Mistry, B. A., and Chou, T. Discrete stochastic models of selex:
|
| 1131 |
+
Aptamer capture probabilities and protocol optimization. The Journal of Chemical
|
| 1132 |
+
Physics 156, 24 (2022), 244103.
|
| 1133 |
+
[48] Wang, Y., and Qian, H. Mathematical representation of Clausius’ and Kelvin’s
|
| 1134 |
+
statements of the second law and irreversibility. Journal of Statistical Physics 179, 3
|
| 1135 |
+
(2020), 808–837.
|
| 1136 |
+
[49] Wang, Y., and Wang, L. Causal inference in degenerate systems: An impossibility
|
| 1137 |
+
result. In International Conference on Artificial Intelligence and Statistics (2020),
|
| 1138 |
+
PMLR, pp. 3383–3392.
|
| 1139 |
+
[50] Wang, Y., and Wang, Z. Inference on the structure of gene regulatory networks.
|
| 1140 |
+
Journal of Theoretical Biology 539 (2022), 111055.
|
| 1141 |
+
[51] Wang, Y., Zhang, B., Kropp, J., and Morozova, N. Inference on tissue trans-
|
| 1142 |
+
plantation experiments. Journal of Theoretical Biology 520 (2021), 110645.
|
| 1143 |
+
[52] Ye, F. X.-F., Wang, Y., and Qian, H. Stochastic dynamics: Markov chains and
|
| 1144 |
+
random transformations. Discrete & Continuous Dynamical Systems-B 21, 7 (2016),
|
| 1145 |
+
2337.
|
| 1146 |
+
[53] Yorke, E. D., Fuks, Z., Norton, L., Whitmore, W., and Ling, C. C. Model-
|
| 1147 |
+
ing the development of metastases from primary and locally recurrent tumors: Com-
|
| 1148 |
+
parison with a clinical data base for prostatic cancer.
|
| 1149 |
+
Cancer Res. 53, 13 (1993),
|
| 1150 |
+
2987–2993.
|
| 1151 |
+
[54] Zheng, Q. Progress of a half century in the study of the Luria–Delbr¨uck distribution.
|
| 1152 |
+
Math. Biosci. 162, 1 (1999), 1–32.
|
| 1153 |
+
[55] Zhou, D., Wang, Y., and Wu, B.
|
| 1154 |
+
A multi-phenotypic cancer model with cell
|
| 1155 |
+
plasticity. J. Theor. Biol. 357 (2014), 35–45.
|
| 1156 |
+
20
|
| 1157 |
+
|
| 1158 |
+
[56] Zhou, J. X., Pisco, A. O., Qian, H., and Huang, S. Nonequilibrium population
|
| 1159 |
+
dynamics of phenotype conversion of cancer cells. PLOS ONE 9, 12 (2014), e110714.
|
| 1160 |
+
21
|
| 1161 |
+
|
| 1162 |
+
Figure 1: Growth curves of the experiment (left) and simulation (right), starting from
|
| 1163 |
+
the time of reaching 5 area units (experiment) or having 2500 cells (simulation), with a
|
| 1164 |
+
logarithm scale for the y-axis. The time required for reaching 5 area units was determined
|
| 1165 |
+
by exponential extrapolation, as reliable imaging started at > 5 area units. The x-axis is
|
| 1166 |
+
the time from reaching 5 area units (experiment) or 2500 cells (simulation). Red, green,
|
| 1167 |
+
or blue curves correspond to 10, 4, or 1 initial cell(s). Although starting from the same
|
| 1168 |
+
population level, patterns are different for distinct initial cell numbers. The N0 = 1-cell
|
| 1169 |
+
group has higher diversity.
|
| 1170 |
+
22
|
| 1171 |
+
|
| 1172 |
+
experimental
|
| 1173 |
+
80
|
| 1174 |
+
cell area
|
| 1175 |
+
40
|
| 1176 |
+
20
|
| 1177 |
+
10-cell group
|
| 1178 |
+
4-cell group
|
| 1179 |
+
10
|
| 1180 |
+
1-cell group
|
| 1181 |
+
5
|
| 1182 |
+
0
|
| 1183 |
+
5
|
| 1184 |
+
10
|
| 1185 |
+
15
|
| 1186 |
+
time (day)
|
| 1187 |
+
80
|
| 1188 |
+
cell area
|
| 1189 |
+
40
|
| 1190 |
+
20simulation
|
| 1191 |
+
40000
|
| 1192 |
+
cell number
|
| 1193 |
+
20000
|
| 1194 |
+
10000
|
| 1195 |
+
5000
|
| 1196 |
+
2500
|
| 1197 |
+
0
|
| 1198 |
+
5
|
| 1199 |
+
10
|
| 1200 |
+
15
|
| 1201 |
+
time (day)
|
| 1202 |
+
40000
|
| 1203 |
+
ell number
|
| 1204 |
+
20000
|
| 1205 |
+
100005
|
| 1206 |
+
0
|
| 1207 |
+
5
|
| 1208 |
+
10
|
| 1209 |
+
15
|
| 1210 |
+
time (day)
|
| 1211 |
+
80
|
| 1212 |
+
cell area
|
| 1213 |
+
40
|
| 1214 |
+
20
|
| 1215 |
+
10
|
| 1216 |
+
5
|
| 1217 |
+
0
|
| 1218 |
+
5
|
| 1219 |
+
10
|
| 1220 |
+
15
|
| 1221 |
+
time (day)8
|
| 1222 |
+
QQQ
|
| 1223 |
+
2500
|
| 1224 |
+
0
|
| 1225 |
+
5
|
| 1226 |
+
10
|
| 1227 |
+
15
|
| 1228 |
+
time (day)
|
| 1229 |
+
40000
|
| 1230 |
+
cell number
|
| 1231 |
+
20000
|
| 1232 |
+
10000
|
| 1233 |
+
5000
|
| 1234 |
+
2500
|
| 1235 |
+
0
|
| 1236 |
+
5
|
| 1237 |
+
10
|
| 1238 |
+
15
|
| 1239 |
+
time (day)20
|
| 1240 |
+
40
|
| 1241 |
+
60
|
| 1242 |
+
80
|
| 1243 |
+
cell area
|
| 1244 |
+
0
|
| 1245 |
+
0.5
|
| 1246 |
+
1
|
| 1247 |
+
1.5
|
| 1248 |
+
growth rate
|
| 1249 |
+
experimental
|
| 1250 |
+
10-cell group
|
| 1251 |
+
4-cell group
|
| 1252 |
+
1-cell group
|
| 1253 |
+
0
|
| 1254 |
+
20
|
| 1255 |
+
40
|
| 1256 |
+
60
|
| 1257 |
+
80
|
| 1258 |
+
cell area
|
| 1259 |
+
0
|
| 1260 |
+
0.5
|
| 1261 |
+
1
|
| 1262 |
+
1.5
|
| 1263 |
+
growth rate
|
| 1264 |
+
1
|
| 1265 |
+
2
|
| 1266 |
+
3
|
| 1267 |
+
4
|
| 1268 |
+
cell number
|
| 1269 |
+
104
|
| 1270 |
+
0
|
| 1271 |
+
0.5
|
| 1272 |
+
1
|
| 1273 |
+
1.5
|
| 1274 |
+
growth rate
|
| 1275 |
+
simulation
|
| 1276 |
+
0
|
| 1277 |
+
1
|
| 1278 |
+
2
|
| 1279 |
+
3
|
| 1280 |
+
4
|
| 1281 |
+
cell number
|
| 1282 |
+
104
|
| 1283 |
+
0
|
| 1284 |
+
0.5
|
| 1285 |
+
1
|
| 1286 |
+
1.5
|
| 1287 |
+
growth rate
|
| 1288 |
+
Figure 2: Per capita growth rate (averaged within one day) vs. cell population for the
|
| 1289 |
+
experiment (left) and simulation (right). Each point represents one well in one day. Red,
|
| 1290 |
+
green, or blue points correspond to 10, 4, or 1 initial cell(s).
|
| 1291 |
+
23
|
| 1292 |
+
|
| 1293 |
+
0
|
| 1294 |
+
5
|
| 1295 |
+
10
|
| 1296 |
+
15
|
| 1297 |
+
20
|
| 1298 |
+
time (day)
|
| 1299 |
+
0
|
| 1300 |
+
20
|
| 1301 |
+
40
|
| 1302 |
+
60
|
| 1303 |
+
80
|
| 1304 |
+
cell area
|
| 1305 |
+
experimental
|
| 1306 |
+
10-cell group
|
| 1307 |
+
4-cell group
|
| 1308 |
+
1-cell group
|
| 1309 |
+
0
|
| 1310 |
+
5
|
| 1311 |
+
10
|
| 1312 |
+
15
|
| 1313 |
+
20
|
| 1314 |
+
time (day)
|
| 1315 |
+
5
|
| 1316 |
+
10
|
| 1317 |
+
20
|
| 1318 |
+
40
|
| 1319 |
+
80
|
| 1320 |
+
cell area
|
| 1321 |
+
0
|
| 1322 |
+
5
|
| 1323 |
+
10
|
| 1324 |
+
15
|
| 1325 |
+
20
|
| 1326 |
+
time (day)
|
| 1327 |
+
0
|
| 1328 |
+
1
|
| 1329 |
+
2
|
| 1330 |
+
3
|
| 1331 |
+
4
|
| 1332 |
+
cell number
|
| 1333 |
+
104
|
| 1334 |
+
simulation
|
| 1335 |
+
0
|
| 1336 |
+
5
|
| 1337 |
+
10
|
| 1338 |
+
15
|
| 1339 |
+
20
|
| 1340 |
+
time (day)
|
| 1341 |
+
2500
|
| 1342 |
+
5000
|
| 1343 |
+
10000
|
| 1344 |
+
20000
|
| 1345 |
+
40000
|
| 1346 |
+
cel number
|
| 1347 |
+
Figure 3: Growth curves of the experiments with different initial cell numbers N0 (left)
|
| 1348 |
+
and growth curves of corresponding simulation (right). Each curve describes the change in
|
| 1349 |
+
the cell population (measured by area or number) over a well along time. Red, green, or
|
| 1350 |
+
blue curves correspond to N0 = 10, 4, or 1 initial cell(s).
|
| 1351 |
+
24
|
| 1352 |
+
|
| 1353 |
+
Figure 4: Schematic illustration of the qualitative argument: Three cell types and growth
|
| 1354 |
+
patterns (three colors) with different seeding numbers. One N0 = 10-cell well will have
|
| 1355 |
+
at least one fast type cell with high probability, which will dominate the population. One
|
| 1356 |
+
N0 = 1-cell well can only have one cell type, thus in the microculture ensemble of replicate
|
| 1357 |
+
wells, three possible growth patterns for wells can be observed.
|
| 1358 |
+
25
|
| 1359 |
+
|
| 1360 |
+
fast
|
| 1361 |
+
moderate
|
| 1362 |
+
slow
|
| 1363 |
+
fast
|
| 1364 |
+
fast
|
| 1365 |
+
moderate
|
| 1366 |
+
slow
|
BdE2T4oBgHgl3EQfRge6/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
BdE2T4oBgHgl3EQfRge6/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:92a209d77bde2f71d9801d94de1e39f975e17a8eaeb69d4ad8362b722afe07a1
|
| 3 |
+
size 151696
|
BdE4T4oBgHgl3EQf5Q5A/content/2301.05321v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:6d96a590ac96bc21cd11ad454bc2ad0b2970aec2742165ec1bf0ef55d16bce30
|
| 3 |
+
size 983040
|
BdE4T4oBgHgl3EQf5Q5A/content/tmp_files/2301.05321v1.pdf.txt
ADDED
|
@@ -0,0 +1,2198 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Springer Nature 2021 LATEX template
|
| 2 |
+
Homeostatic regulation of renewing tissue cell
|
| 3 |
+
populations via crowding control: stability,
|
| 4 |
+
robustness and quasi-dedifferentiation
|
| 5 |
+
Cristina Parigini1,2,3 and Philip Greulich1,2*
|
| 6 |
+
1*School of Mathematical Sciences, University of Southampton,
|
| 7 |
+
Southampton, United Kingdom.
|
| 8 |
+
2Institute for Life Sciences, University of Southampton,
|
| 9 |
+
Southampton, United Kingdom.
|
| 10 |
+
3Te P¯unaha ¯Atea - Space Institute, University of Auckland,
|
| 11 |
+
Auckland, New Zealand.
|
| 12 |
+
*Corresponding author(s). E-mail(s): [email protected];
|
| 13 |
+
Contributing authors: [email protected];
|
| 14 |
+
Abstract
|
| 15 |
+
To maintain renewing epithelial tissues in a healthy, homeostatic state,
|
| 16 |
+
(stem) cell divisions and differentiation need to be tightly regulated.
|
| 17 |
+
Mechanisms of homeostatic control often rely on crowding control: cells
|
| 18 |
+
are able to sense the cell density in their environment (via various
|
| 19 |
+
molecular and mechanosensing pathways) and respond by adjusting
|
| 20 |
+
division, differentiation, and cell state transitions appropriately. Here
|
| 21 |
+
we determine, via a mathematically rigorous framework, which general
|
| 22 |
+
conditions for the crowding feedback regulation (i) must be minimally
|
| 23 |
+
met, and (ii) are sufficient, to allow the maintenance of homeosta-
|
| 24 |
+
sis in renewing tissues. We show that those conditions naturally allow
|
| 25 |
+
for a degree of robustness toward disruption of regulation. Further-
|
| 26 |
+
more, intrinsic to this feedback regulation is that stem cell identity is
|
| 27 |
+
established collectively by the cell population, not by individual cells,
|
| 28 |
+
which implies the possibility of ‘quasi-dedifferentiation’, in which cells
|
| 29 |
+
committed to differentiation may reacquire stem cell properties upon
|
| 30 |
+
depletion of the stem cell pool. These findings can guide future exper-
|
| 31 |
+
imental campaigns to identify specific crowding feedback mechanisms.
|
| 32 |
+
Keywords: keyword1, Keyword2, Keyword3, Keyword4
|
| 33 |
+
1
|
| 34 |
+
arXiv:2301.05321v1 [q-bio.TO] 12 Jan 2023
|
| 35 |
+
|
| 36 |
+
Springer Nature 2021 LATEX template
|
| 37 |
+
2
|
| 38 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 39 |
+
1 Introduction
|
| 40 |
+
Many adult tissues are renewing, that is, terminally differentiated cells are
|
| 41 |
+
steadily removed and replaced by new cells produced by the division of cycling
|
| 42 |
+
cells (stem cells and progenitor cells), which then differentiate. In order to
|
| 43 |
+
maintain those tissues in a healthy, homeostatic state, (stem) cell divisions
|
| 44 |
+
and differentiation must be tightly balanced. Adult stem cells are the key
|
| 45 |
+
players in maintaining and renewing such tissues due to their ability to produce
|
| 46 |
+
cells through cell division and differentiation persistently [1]. However, the
|
| 47 |
+
underlying cell-intrinsic and extrinsic factors that regulate a homeostatic state
|
| 48 |
+
are complex and not always well understood.
|
| 49 |
+
Several experimental studies have identified mechanisms and pathways that
|
| 50 |
+
regulate homeostasis. For example, cell crowding can trigger delamination and
|
| 51 |
+
thus loss of cells in Drosophila back [2], and differentiation in cultured human
|
| 52 |
+
colon, various zebrafish epiderimises, and canine kidney cells [3, 4]. On the
|
| 53 |
+
other hand, cell crowding can affect cell proliferation: overcrowding can inhibit
|
| 54 |
+
proliferation [5], whereas a reduction in the cell density, obtained, for example,
|
| 55 |
+
by stretching a tissue [6] causes an increase in proliferative activity (both
|
| 56 |
+
shown in cultured canine kidney cells). Although the mechanisms to mediate
|
| 57 |
+
this regulation are not always clear, experimental studies on mechanosensing
|
| 58 |
+
showed that cell overcrowding reduces cell motility and consequently produces
|
| 59 |
+
a compression on cells that inhibits cell proliferation [5, 7]. Another mechanism
|
| 60 |
+
utilising crowding feedback is the competition for limited growth signalling
|
| 61 |
+
factors [8]. More specifically, in the mouse germ line, cells in the niche respond
|
| 62 |
+
to a growth factor (FGF5) that promotes proliferation over differentiation,
|
| 63 |
+
which they deplete upon being exposed to it. Therefore, the more cells are
|
| 64 |
+
in the niche, the less FGF5 is available per cell, and the less proliferation (or
|
| 65 |
+
more differentiation) occurs.
|
| 66 |
+
Despite differing in the involved molecular pathways and many other
|
| 67 |
+
details, all these regulatory mechanisms are, in essence, sensing the cell den-
|
| 68 |
+
sity in their environment and responding by adjusting their propensities to
|
| 69 |
+
divide, differentiate, die, or emigrate from the tissue. This class of mechanisms,
|
| 70 |
+
for which cell fate propensities depend on the cell density, can be classified as
|
| 71 |
+
crowding feedback regulation: the cell density determines the cells’ prolifera-
|
| 72 |
+
tion and differentiation, which affects their population dynamics and thus the
|
| 73 |
+
cell density. However, the crowding response to changes in cell density cannot
|
| 74 |
+
be arbitrary in order to maintain homeostasis. It must provide a (negative)
|
| 75 |
+
feedback, in the sense that cells sense the cell density and adjust proliferation,
|
| 76 |
+
differentiation, and cell loss, such that the cell density is decreased if it is too
|
| 77 |
+
high and increased if it is too low. For simple tissues consisting of a single
|
| 78 |
+
cell type with a unique cell state, it is relatively straightforward to give the
|
| 79 |
+
conditions for crowding feedback to maintain homeostasis successfully. In this
|
| 80 |
+
case, when the cell division rate decreases with cell density and differentiation
|
| 81 |
+
and or death rate increase with cell density, a homeostatic state is maintained.
|
| 82 |
+
However, such conclusions are not as simple to make when a tissue consists of
|
| 83 |
+
a complex lineage hierarchy and a multitude of underlying cellular states. In
|
| 84 |
+
|
| 85 |
+
Springer Nature 2021 LATEX template
|
| 86 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 87 |
+
3
|
| 88 |
+
the latter, more realistic case, conditions for successful homeostatic regulation
|
| 89 |
+
– in which case we speak of crowding control – may take more complex forms.
|
| 90 |
+
Previous studies based on mathematical modelling have shed some light
|
| 91 |
+
on quantitative mechanisms for homeostatic control [9–13]. In particular, in
|
| 92 |
+
[13], a mathematical assessment of crowding feedback modelling shows that
|
| 93 |
+
a (dynamic) homeostatic state exists under reasonable biological conditions.
|
| 94 |
+
Nevertheless, the case of dynamic homeostasis considered there may not nec-
|
| 95 |
+
essarily be a steady state but could also exhibit oscillations in cell numbers
|
| 96 |
+
(as does realistically happen in the uterus during the menstrual cycle). While
|
| 97 |
+
the criterion presented in [13] provides a valid sufficient condition for dynamic
|
| 98 |
+
homeostasis, it relies on a rather abstract mathematical quantity – the domi-
|
| 99 |
+
nant eigenvalue of the dynamical matrix – that is difficult, if not impossible,
|
| 100 |
+
to measure in reality.
|
| 101 |
+
Here, we wish to generalise previous findings and seek to identify general
|
| 102 |
+
conditions for successful homeostatic control if propensities for cell division,
|
| 103 |
+
differentiation, and loss are responsive to variations in cell density. More
|
| 104 |
+
precisely, we derive conditions that must be minimally fulfilled (necessary
|
| 105 |
+
conditions) and conditions which are sufficient, to ensure that homeostasis pre-
|
| 106 |
+
vails. To identify and formulate those conditions, we note that homeostasis is
|
| 107 |
+
a property of the tissue cell population dynamics, which can be mathemati-
|
| 108 |
+
cally expressed as a dynamical system. Even if a numerically exact formulation
|
| 109 |
+
of the dynamics may not be possible, one can formulate generic yet mathe-
|
| 110 |
+
matically rigorous conditions by referring to the criteria for the existence of
|
| 111 |
+
stable steady states in the cell population dynamics of renewing tissues. We
|
| 112 |
+
will derive those conditions by mathematical, analytical means, augmented by
|
| 113 |
+
a numerical analysis testing the limits of those conditions.
|
| 114 |
+
We will also show that homeostatic control by crowding feedback possesses
|
| 115 |
+
inherent robustness to failures and perturbations of the regulatory pathways,
|
| 116 |
+
which may occur through external influences (e.g. wide-spread biochemical fac-
|
| 117 |
+
tors) and genetic mutations. Finally, we will assess the response of cells when
|
| 118 |
+
the pool of stem cells is depleted. Crucially, we find that inherent to crowd-
|
| 119 |
+
ing feedback control is that formerly committed progenitor cells reacquire
|
| 120 |
+
self-renewal capacity without substantial changes in their internal states. Ded-
|
| 121 |
+
ifferentiation has been widely reported under conditions of tissue regeneration
|
| 122 |
+
[14, 15] or when stem cells are depleted [16–19], which is usually thought to
|
| 123 |
+
involve a substantial reprogramming of the cell-intrinsic states towards a stem
|
| 124 |
+
cell type. On the other hand, our analysis suggests the possibility of “quasi”-
|
| 125 |
+
dedifferentiation, the reversion from a committed cell to a stem cell by a
|
| 126 |
+
mere quantitative adjustment of the pacing of proliferation and differentiation,
|
| 127 |
+
without a substantial qualitative change in its expression profiles.
|
| 128 |
+
|
| 129 |
+
Springer Nature 2021 LATEX template
|
| 130 |
+
4
|
| 131 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 132 |
+
2 Modelling of tissue cell dynamics under
|
| 133 |
+
crowding feedback
|
| 134 |
+
We seek to assess the conditions for homeostasis in renewing tissue cell pop-
|
| 135 |
+
ulations, that is, either a steady state of the tissue cell population (strict
|
| 136 |
+
homeostasis) or long-term, bounded oscillations or fluctuations (dynamic
|
| 137 |
+
homeostasis), which represent well-defined constraints on the dynamics of the
|
| 138 |
+
tissue cell population. To this end, we will here derive a formal, mathematical
|
| 139 |
+
representation of the tissue cell dynamics under crowding feedback.
|
| 140 |
+
The cell population is fully defined by (i) the number of cells, (ii) the
|
| 141 |
+
internal (biochemical and mechanical) states of each cell, and (iii) the spatial
|
| 142 |
+
position of cells. We assume that a cell’s behaviour can depend on the cell
|
| 143 |
+
density and the states of cells in its close cellular environment. As we examine
|
| 144 |
+
a situation close to a homeostatic state, we assume that the cell density is
|
| 145 |
+
homogeneous over the range of interaction between cells, which expands over
|
| 146 |
+
a volume V . Hence, the cell density ρ is proportional to the average number
|
| 147 |
+
of cells, ¯n, in that volume, ρ =
|
| 148 |
+
¯n
|
| 149 |
+
V . Similarly, we define the number of cells
|
| 150 |
+
in internal state i as ni, and the cell density of cells in internal state i as
|
| 151 |
+
ρi = ¯ni
|
| 152 |
+
V , where ¯ni is the expected value of ni. As we consider only the crowding
|
| 153 |
+
feedback response of cells, which only accounts for the cell densities ρi but
|
| 154 |
+
not the explicit position of cells, the spatial configuration (iii) is not relevant
|
| 155 |
+
to our considerations. Thus, the configuration of the cell population and its
|
| 156 |
+
time evolution is entirely determined by the average number of cells in each
|
| 157 |
+
state i, as a function of time t, ¯ni(t). The configuration of cell numbers ni
|
| 158 |
+
can change only through three processes: (1) cell division, whereby it must be
|
| 159 |
+
distinguished between the cell state of daughter cells, (2) the transition from
|
| 160 |
+
one cell state to another, (3) loss of a cell, through cell death or emigration
|
| 161 |
+
out of the tissue. Following the lines of Refs. [13, 20] and denoting as Xi,j,k a
|
| 162 |
+
cell in internal states i, j, k, respectively, we can formalise these events as:
|
| 163 |
+
cell division: Xi
|
| 164 |
+
λirjk
|
| 165 |
+
i
|
| 166 |
+
−−−→ Xj + Xk
|
| 167 |
+
(1)
|
| 168 |
+
cell state transition: Xi
|
| 169 |
+
ωij
|
| 170 |
+
−−→ Xj
|
| 171 |
+
(2)
|
| 172 |
+
cell loss: Xi
|
| 173 |
+
γi
|
| 174 |
+
−→ ∅ ,
|
| 175 |
+
(3)
|
| 176 |
+
where the symbols above the arrows denote the dynamical rates of the transi-
|
| 177 |
+
tions, i.e. the average frequency at which such events occur. In particular, γi
|
| 178 |
+
is the rate at which a cell in state i is lost, ωij the rate at which a cell changes
|
| 179 |
+
its state from i to j and λirjk
|
| 180 |
+
i
|
| 181 |
+
denotes the rate at which a cell i divides to pro-
|
| 182 |
+
duce two daughter cells, one in state j and one in state k (i = j, j = k, k = i
|
| 183 |
+
are possible). For later convenience, we distinguish here the overall rate of cell
|
| 184 |
+
division in state i, λi and the probability rjk
|
| 185 |
+
i
|
| 186 |
+
that such a division produces
|
| 187 |
+
daughter cells in states j and k.
|
| 188 |
+
Since we consider a situation where cells can respond to the cell densities
|
| 189 |
+
ρi via crowding feedback, all the rates and probabilities (λi, γi, ωij, rjk
|
| 190 |
+
i ) may
|
| 191 |
+
|
| 192 |
+
Springer Nature 2021 LATEX template
|
| 193 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 194 |
+
5
|
| 195 |
+
depend on the cell densities of either state j, ρj. For convenience, we discretise
|
| 196 |
+
the number of states in case the state space is a continuum and only distinguish
|
| 197 |
+
states which have substantially different propensities (λi, γi, ωij, rjk
|
| 198 |
+
i ). Without
|
| 199 |
+
loss of generality, we assume that there are m states, that is, i, j, k = 1, ..., m
|
| 200 |
+
(for a rigorous argument for the discretisation of the state space, see [13]).
|
| 201 |
+
The rates given above denote the average number of events happening per
|
| 202 |
+
time unit. Thus, we can express the total rate of change of the average (i.e.
|
| 203 |
+
expected) number of cells ¯ni(t), that is, the derivative ˙¯ni = d¯ni
|
| 204 |
+
dt , in terms of
|
| 205 |
+
the rates of those events. This defines a set of ordinary differential equations.
|
| 206 |
+
Following the lines of Refs. [13, 20], we can write ˙ni as,
|
| 207 |
+
˙¯ni =
|
| 208 |
+
��
|
| 209 |
+
j
|
| 210 |
+
ωji¯nj + λj
|
| 211 |
+
��
|
| 212 |
+
k
|
| 213 |
+
rik
|
| 214 |
+
j + rki
|
| 215 |
+
j
|
| 216 |
+
�
|
| 217 |
+
¯nj
|
| 218 |
+
�
|
| 219 |
+
− ¯ni
|
| 220 |
+
�
|
| 221 |
+
λi + γi +
|
| 222 |
+
�
|
| 223 |
+
j
|
| 224 |
+
ωij
|
| 225 |
+
�
|
| 226 |
+
,
|
| 227 |
+
(4)
|
| 228 |
+
where for convenience, we did not write the time dependence explicitly, i.e.
|
| 229 |
+
ni = ni(t), and all parameters may depend on the cell densities ρj. Since V is
|
| 230 |
+
constant, we can divide by V to equivalently express this in terms of the cell
|
| 231 |
+
state densities, ρi = ¯ni
|
| 232 |
+
V , and then write Eq. (4) compactly as,
|
| 233 |
+
d
|
| 234 |
+
dtρ(t) = A(ρ(t)) ρ(t)
|
| 235 |
+
(5)
|
| 236 |
+
where ρ = (ρ1, ρ2, ...) is the vector of cell state densities and A(ρ) is the matrix,
|
| 237 |
+
A =
|
| 238 |
+
�
|
| 239 |
+
�
|
| 240 |
+
λ1 − �
|
| 241 |
+
j̸=1 κ1j − γ1
|
| 242 |
+
κ21
|
| 243 |
+
κ31
|
| 244 |
+
· · ·
|
| 245 |
+
κ12
|
| 246 |
+
λ2 − �
|
| 247 |
+
j̸=2 κ2j − γ2 κ32
|
| 248 |
+
· · ·
|
| 249 |
+
κ1m
|
| 250 |
+
κ2m
|
| 251 |
+
· · · λm − �
|
| 252 |
+
j̸=m κmj − γm
|
| 253 |
+
�
|
| 254 |
+
� ,
|
| 255 |
+
(6)
|
| 256 |
+
in which κij = λi2rj
|
| 257 |
+
i + ωij, with rj
|
| 258 |
+
i = �
|
| 259 |
+
k(rjk
|
| 260 |
+
i
|
| 261 |
+
+ rkj
|
| 262 |
+
i )/2, is the total transition
|
| 263 |
+
rate, that combines all transitions from Xi to Xj by cell divisions and direct
|
| 264 |
+
state transitions (again, all parameters may depend on ρ, as therefore also
|
| 265 |
+
does A). We can thus generally write the elements of the matrix A, aij with
|
| 266 |
+
i, j = 1, ..., m as
|
| 267 |
+
aij =
|
| 268 |
+
� λi − γi − �
|
| 269 |
+
k̸=i κik
|
| 270 |
+
for i = j
|
| 271 |
+
κji
|
| 272 |
+
for i ̸= j
|
| 273 |
+
(7)
|
| 274 |
+
We now make the mild assumption that divisions of the form Xi → Xj+Xk
|
| 275 |
+
are effectively three events, namely, cell duplication, Xi → Xi + Xi coupled to
|
| 276 |
+
cell state changes, Xi → Xj and Xi → Xk, if j ̸= i or k ̸= i. In this view, the
|
| 277 |
+
parameters relevant for crowding feedback are the total cell state transition
|
| 278 |
+
propensities κij and the cell division rate λi, as in (6), instead of ωij and rjk
|
| 279 |
+
i .
|
| 280 |
+
These equations describe a dynamical system which, for given initial con-
|
| 281 |
+
ditions, determines the time evolution of the cell densities, ρi(t). Crucially,
|
| 282 |
+
|
| 283 |
+
Springer Nature 2021 LATEX template
|
| 284 |
+
6
|
| 285 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 286 |
+
this description allows for a rigorous mathematical definition of what a home-
|
| 287 |
+
ostatic state is, and to apply tools of dynamical systems analysis to determine
|
| 288 |
+
the circumstances under which a homeostatic state prevails. In particular, we
|
| 289 |
+
define a strict homeostatic state as a steady state of the system, (5), when the
|
| 290 |
+
cell numbers – and thus cell densities, given that V is fixed – in each state
|
| 291 |
+
do not change, mathematically expressed as dρ
|
| 292 |
+
dt = 0 (a fixed point of the sys-
|
| 293 |
+
tem). A dynamic homeostatic state is when cell densities may also oscillate
|
| 294 |
+
or fluctuate but remain bounded and thus possess a finite long-term average
|
| 295 |
+
cell population (in which case the system either approaches a steady state or
|
| 296 |
+
limit cycles – that is, oscillations – or chaotic but bounded behaviour). Based
|
| 297 |
+
on these definitions, we can now analyse under which circumstances crowd-
|
| 298 |
+
ing feedback can maintain those states, which in the case of strict homeostasis
|
| 299 |
+
requires, in addition, that the corresponding steady state is stable.
|
| 300 |
+
2.1 Cell types and lineage hierarchies
|
| 301 |
+
According to [13], cell population dynamics of the type (5) can be associated
|
| 302 |
+
with a cell state network, in which each state is a node, and the nodes are
|
| 303 |
+
connected through cell state transition (direct transitions and cell divisions).
|
| 304 |
+
Furthermore, by decomposing this network in strongly connected components
|
| 305 |
+
(SCCs), the cell fate model can be viewed as a directed acyclic network [21],
|
| 306 |
+
generally called the condensed network. Here, we follow the definitions of [13]
|
| 307 |
+
and define a cell type as an SCC of the cell state network, so that any cell states
|
| 308 |
+
connected via cyclic cell state trajectories (sequences of cell state transitions)
|
| 309 |
+
are of the same type, and the condensed network of cell types represents the
|
| 310 |
+
cell lineage hierarchy. This definition ensures that cells of the same type have
|
| 311 |
+
the same lineage potential (outgoing cell state trajectories) and that the stages
|
| 312 |
+
of the cell cycle are associated with the same cell type. In this context, we
|
| 313 |
+
will in the following also speak of differentiation when a cell state transition
|
| 314 |
+
between different cell types occurs.
|
| 315 |
+
Each cell type can be classified as self-renewing, declining or hyper-
|
| 316 |
+
proliferating, depending on the dominant eigenvalue µ (called growth parame-
|
| 317 |
+
ter) of the dynamical matrix A (from Eq. (5) ff.) reduced to that SCC. This
|
| 318 |
+
is µ = 0 for self-renewing cell types, when cell numbers of that type remain
|
| 319 |
+
constant over time, µ < 0 (µ > 0) for the declining (hyperproliferating) types
|
| 320 |
+
when cell numbers decline (increase) in the long term [13]. Importantly, for the
|
| 321 |
+
population dynamics to be strictly homeostatic, which means that a steady
|
| 322 |
+
state of model (5) exists, the cell type network must fulfil strict rules. These
|
| 323 |
+
are: (i) at least one self-renewing cell type (with µ = 0) must exist; (ii) self-
|
| 324 |
+
renewing cell types must stay at an apex of the condensed network; (iii) all
|
| 325 |
+
the other cells must be of declining types. This means that the critical task of
|
| 326 |
+
homeostatic control is to ensure that the kinetic parameters of the cell type at
|
| 327 |
+
the apex of the cell lineage hierarchy are fine-tuned to maintain exactly µ = 0.
|
| 328 |
+
Therefore, we can restrict our analysis to find conditions for the cell type
|
| 329 |
+
at the lineage hierarchy’s apex to be self-renewing, which we will do in the
|
| 330 |
+
following. Other cell types simply need that differentiation (transition towards
|
| 331 |
+
|
| 332 |
+
Springer Nature 2021 LATEX template
|
| 333 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 334 |
+
7
|
| 335 |
+
another cell type) or loss is faster than proliferation, so that they become
|
| 336 |
+
declining cell types, µ < 0, but those rates do not require fine-tuning and thus
|
| 337 |
+
trivially regulated. We note that when we consider only cell states of the type
|
| 338 |
+
at the apex of the cell lineage hierarchy, any differentiation event is – according
|
| 339 |
+
to this restricted model – a cell loss event and included as event occurring with
|
| 340 |
+
rates γi. Given that cell loss from a cell type at the lineage apex is rare, we
|
| 341 |
+
will therefore in the following also denote the rates γi simply as differentiation
|
| 342 |
+
rates.
|
| 343 |
+
3 Results
|
| 344 |
+
We will now determine necessary and sufficient conditions for the establish-
|
| 345 |
+
ment of strict and dynamical homeostasis when subject to crowding feedback,
|
| 346 |
+
which we here define through the derivatives of the dynamical parameters
|
| 347 |
+
λi, rjk
|
| 348 |
+
i , ωij, γi as a function of the cell densities. As argued before, we only need
|
| 349 |
+
to consider cell types at an apex of the cell type network, which, for home-
|
| 350 |
+
ostasis to prevail, must have a growth parameter (i.e. dominant eigenvalue of
|
| 351 |
+
matrix A in Eq. (6)) µ = 0. Furthermore, we assume that the apex cell type
|
| 352 |
+
resides in a separate stem cell niche. Therefore, the parameters only depend
|
| 353 |
+
on cell densities ρi of states associated with that cell type, i.e. we can write
|
| 354 |
+
A = A(ρ), where ρ = �
|
| 355 |
+
i∈S ρi comprises only cell states of the apex cell type
|
| 356 |
+
S. Provided that, the matrix elements are functions of ρ, and therefore also µ
|
| 357 |
+
is a function of ρ. Thus, self-renewal corresponds to a non-trivial fixed point,
|
| 358 |
+
ρ∗, of Eq. (5), restricted to cell type S, for which the dominant eigenvalue of
|
| 359 |
+
A is zero, that is µ(ρ∗) = 0 (ρ∗ = �
|
| 360 |
+
i∈S ρ∗
|
| 361 |
+
i ).
|
| 362 |
+
For convenience, we will often generally refer to parameters as αi, i =
|
| 363 |
+
1, ..., 2m + m2, where αi stands for any of the parameters, {λi, γi, κij|i, j =
|
| 364 |
+
1, ..., m}, respectively1. Hence, we study which conditions the functions αi(ρ)
|
| 365 |
+
must meet to maintain homeostasis. In particular, we study how those param-
|
| 366 |
+
eters qualitatively change with the cell density – increase or decrease – that
|
| 367 |
+
is, we study how the sign and magnitude of derivatives α′
|
| 368 |
+
i :=
|
| 369 |
+
dαi
|
| 370 |
+
dρ
|
| 371 |
+
affects
|
| 372 |
+
homeostasis.
|
| 373 |
+
A crucial property of the matrix A(ρ) is that it is always a Metzler matrix,
|
| 374 |
+
since all its off-diagonal elements, κij ≥ 0. Since the cell state network of a
|
| 375 |
+
cell type is strongly connected, we can further state that A(ρ) is irreducible.
|
| 376 |
+
Notably, for irreducible Metzler matrices holds the Perron-Frobenius theorem
|
| 377 |
+
[22], and thus A(ρ) possesses a simple, real dominant eigenvalue µ. Besides,
|
| 378 |
+
it as left and right eigenvectors associated with µ, respectively indicated as v
|
| 379 |
+
and w, which are strictly positive, that is, all their entries are vi > 0, wi > 0.
|
| 380 |
+
From this follows that the partial derivative of the dominant eigenvalue µ by
|
| 381 |
+
1More
|
| 382 |
+
precisely,
|
| 383 |
+
αi|i=1,..,m
|
| 384 |
+
:=
|
| 385 |
+
λi, αi|i=m+1,..,2m
|
| 386 |
+
:=
|
| 387 |
+
γi−m, αi|i=2m+1,..,2m+m2
|
| 388 |
+
:=
|
| 389 |
+
κ⌊(i−2m)/m⌋,i−⌊(i−2m)/m⌋m
|
| 390 |
+
|
| 391 |
+
Springer Nature 2021 LATEX template
|
| 392 |
+
8
|
| 393 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 394 |
+
the i, j-th element of A, aij = [A]ij is always positive:
|
| 395 |
+
∂µ
|
| 396 |
+
∂aij
|
| 397 |
+
= viwj
|
| 398 |
+
vw > 0
|
| 399 |
+
(8)
|
| 400 |
+
where the left equality is according to [23] and is generally valid for simple
|
| 401 |
+
eigenvalues. Here, v is assumed to be in row form, and vw thus corresponds
|
| 402 |
+
to a scalar product.
|
| 403 |
+
3.1 Sufficient condition for dynamic homeostasis
|
| 404 |
+
In [13], it was shown that a dynamic homeostatic state, where cell numbers
|
| 405 |
+
may change over time but stay bounded, is assured if, 2
|
| 406 |
+
µ′(ρ) < 0 for all ρ > 0.
|
| 407 |
+
(9)
|
| 408 |
+
This sufficient condition requires that the dominant eigenvalue of A as a func-
|
| 409 |
+
tion of the cell density, µ(ρ), is a strictly decreasing function of cell density.
|
| 410 |
+
Also, the range of this function must be sufficiently large so that it has a root,
|
| 411 |
+
i.e. a value ρ∗ with µ(ρ∗) = 0 must exist for the function µ(ρ).
|
| 412 |
+
Assuming that a non-trivial steady state, ρ∗ > 0, exists, we now translate
|
| 413 |
+
the sufficient condition for a dynamic homeostatic state, Eq. (9), into condi-
|
| 414 |
+
tions on the parameters as a function of the cell density, αi(ρ). In particular,
|
| 415 |
+
we can write,
|
| 416 |
+
µ′(ρ) =
|
| 417 |
+
�
|
| 418 |
+
ij
|
| 419 |
+
∂µ
|
| 420 |
+
∂aij
|
| 421 |
+
∂aij
|
| 422 |
+
∂ρ =
|
| 423 |
+
�
|
| 424 |
+
ij
|
| 425 |
+
viwj
|
| 426 |
+
vw a′
|
| 427 |
+
ij =
|
| 428 |
+
�
|
| 429 |
+
i
|
| 430 |
+
viwi
|
| 431 |
+
vw a′
|
| 432 |
+
ii +
|
| 433 |
+
�
|
| 434 |
+
i,j̸=i
|
| 435 |
+
viwj
|
| 436 |
+
vw a′
|
| 437 |
+
ij
|
| 438 |
+
=
|
| 439 |
+
�
|
| 440 |
+
i
|
| 441 |
+
viwi
|
| 442 |
+
vw
|
| 443 |
+
�
|
| 444 |
+
�λ′
|
| 445 |
+
i − γ′
|
| 446 |
+
i −
|
| 447 |
+
�
|
| 448 |
+
j̸=i
|
| 449 |
+
κ′
|
| 450 |
+
ij
|
| 451 |
+
�
|
| 452 |
+
� +
|
| 453 |
+
�
|
| 454 |
+
i,j̸=i
|
| 455 |
+
vjwi
|
| 456 |
+
vw κ′
|
| 457 |
+
ij ,
|
| 458 |
+
(10)
|
| 459 |
+
where we used Eq. (8) and the explicit forms of aij, the elements of the matrix
|
| 460 |
+
A according to Eq. (7). Provided that all the parameters depend on ρ, condition
|
| 461 |
+
(9) results in:
|
| 462 |
+
0 > µ′ =⇒ 0 >
|
| 463 |
+
�
|
| 464 |
+
i
|
| 465 |
+
viwi (λ′
|
| 466 |
+
i − γ′
|
| 467 |
+
i) + wi
|
| 468 |
+
�
|
| 469 |
+
j̸=i
|
| 470 |
+
(vj − vi)κ′
|
| 471 |
+
ij
|
| 472 |
+
for all ρ > 0 ,
|
| 473 |
+
(11)
|
| 474 |
+
While we cannot give an explicit general expression for the dominant eigen-
|
| 475 |
+
vectors v, w, this condition is sufficiently fulfilled if each term of the sum on
|
| 476 |
+
the right-hand side of Eq. (11) is negative. More restrictively, we have Eq. (11)
|
| 477 |
+
2In [13], this condition, defined through dependency on cell number, can be directly translated
|
| 478 |
+
into a condition on the cell density derivative if the volume is assumed as a constant.
|
| 479 |
+
|
| 480 |
+
Springer Nature 2021 LATEX template
|
| 481 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 482 |
+
9
|
| 483 |
+
sufficiently fulfilled if
|
| 484 |
+
�
|
| 485 |
+
�
|
| 486 |
+
�
|
| 487 |
+
�
|
| 488 |
+
�
|
| 489 |
+
λ′
|
| 490 |
+
i ≤ 0, γ′
|
| 491 |
+
i ≥ 0 for all i
|
| 492 |
+
λ′
|
| 493 |
+
i < 0 or γ′
|
| 494 |
+
i > 0 at for least one i
|
| 495 |
+
κ′
|
| 496 |
+
ij = 0 for all i, j
|
| 497 |
+
for ρ > 0
|
| 498 |
+
(12)
|
| 499 |
+
This means that, excluding rates that are zero, which are biologically mean-
|
| 500 |
+
ingless, if no direct state transitions within a cell type are subject to crowding
|
| 501 |
+
feedback (κ′
|
| 502 |
+
ij = 0), while all (non-zero) cell division rates depend negatively
|
| 503 |
+
on ρ (λ′
|
| 504 |
+
i < 0), and differentiation rates depend positively (γ′
|
| 505 |
+
i > 0), for all
|
| 506 |
+
attainable levels of ρ, then dynamical homeostasis is ensured.
|
| 507 |
+
Alternatively, we can rewrite Eq. (11) as
|
| 508 |
+
0 >
|
| 509 |
+
�
|
| 510 |
+
i
|
| 511 |
+
viwi
|
| 512 |
+
vw
|
| 513 |
+
�
|
| 514 |
+
�λ′
|
| 515 |
+
i − γ′
|
| 516 |
+
i −
|
| 517 |
+
�
|
| 518 |
+
j̸=i
|
| 519 |
+
κ′
|
| 520 |
+
ij +
|
| 521 |
+
�
|
| 522 |
+
j̸=i
|
| 523 |
+
vj
|
| 524 |
+
vi
|
| 525 |
+
κ′
|
| 526 |
+
ij
|
| 527 |
+
�
|
| 528 |
+
�
|
| 529 |
+
for all ρ > 0 ,
|
| 530 |
+
(13)
|
| 531 |
+
which, due to
|
| 532 |
+
vj
|
| 533 |
+
vi
|
| 534 |
+
> 0, implies another sufficient condition for dynamic
|
| 535 |
+
homeostasis:
|
| 536 |
+
�
|
| 537 |
+
�
|
| 538 |
+
�
|
| 539 |
+
�
|
| 540 |
+
�
|
| 541 |
+
λ′
|
| 542 |
+
i ≤ 0, γ′
|
| 543 |
+
i ≥ 0 for all i
|
| 544 |
+
λ′
|
| 545 |
+
i < 0 or γ′
|
| 546 |
+
i > 0 at for least one i
|
| 547 |
+
κ′
|
| 548 |
+
ij ≤ 0 with |�
|
| 549 |
+
j κ′
|
| 550 |
+
ij| ≤ γ′
|
| 551 |
+
i − λ′
|
| 552 |
+
i for all i, j
|
| 553 |
+
(14)
|
| 554 |
+
The above condition is less restrictive than Eq. (12), allowing for some non-
|
| 555 |
+
zero crowding feedback dependency of state transition rates κij, as long as the
|
| 556 |
+
crowding feedback strength of the total outgoing transition rate of each state
|
| 557 |
+
does not outweigh the feedback on proliferation and differentiation rate of that
|
| 558 |
+
state (if there is).
|
| 559 |
+
3.2 Necessary condition for strict homeostasis
|
| 560 |
+
We now consider the circumstances under which a strict homeostatic is main-
|
| 561 |
+
tained, that is, when a steady state of the cell population exists and is
|
| 562 |
+
asymptotically stable.
|
| 563 |
+
A necessary condition for the existence of a steady state ρ∗ (irrespective
|
| 564 |
+
of stability) has been given in [13], namely, that the cell type at the apex of
|
| 565 |
+
the lineage hierarchy is self-renewing, i.e. its dynamical matrix A has µ = 0.
|
| 566 |
+
µ depends on the cell density ρ of the apex cell type, since the dynamical
|
| 567 |
+
parameters αi and thus A depend on ρ. As before, it is required that µ(ρ∗)
|
| 568 |
+
has sufficient range so that a value ρ∗ with µ(ρ∗) = 0 exists. This condition is
|
| 569 |
+
fulfilled if the range of the feedback parameters αi(ρ) is sufficiently large. In
|
| 570 |
+
that case there exists an eigenvector ρ∗ with A(ρ∗)ρ∗ = 0, which can be chosen
|
| 571 |
+
by normalisation to fulfil �
|
| 572 |
+
i∈S ρ∗
|
| 573 |
+
i = ρ∗. Thus, ρ∗ is a fixed point (steady state)
|
| 574 |
+
|
| 575 |
+
Springer Nature 2021 LATEX template
|
| 576 |
+
10
|
| 577 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 578 |
+
of the cell population system (5). Hence, we need to establish what is required
|
| 579 |
+
for this state to be asymptotically stable.
|
| 580 |
+
To start with, we give the Jacobian matrix of the system (5) at the fixed
|
| 581 |
+
point ρ∗ :
|
| 582 |
+
[J]ij = ∂[A(ρ)ρ]i
|
| 583 |
+
∂ρj
|
| 584 |
+
����
|
| 585 |
+
ρ=ρ∗
|
| 586 |
+
= a∗
|
| 587 |
+
ij + ηi ,
|
| 588 |
+
(15)
|
| 589 |
+
where
|
| 590 |
+
ηi =
|
| 591 |
+
�
|
| 592 |
+
k
|
| 593 |
+
a′
|
| 594 |
+
ikρ∗
|
| 595 |
+
k .
|
| 596 |
+
(16)
|
| 597 |
+
Here and in the following, we assume the derivatives to be taken at the steady
|
| 598 |
+
state, i.e. a′
|
| 599 |
+
ij :=
|
| 600 |
+
daij
|
| 601 |
+
dρ |ρ=ρ∗. The eigenvalues of the Jacobian matrix J at ρ∗
|
| 602 |
+
determine the stability of the steady state ρ∗: it is asymptotically stable if and
|
| 603 |
+
only if the real part of all eigenvalues of J(ρ∗) is negative.
|
| 604 |
+
The Routh-Hurwitz theorem [24] states that for a polynomial to have only
|
| 605 |
+
roots with negative real part, all its coefficients must necessarily be positive.
|
| 606 |
+
Given that the eigenvalues of the Jacobian matrix J are the roots of its char-
|
| 607 |
+
acteristic polynomial, a necessary condition for ρ∗ to be asymptotically stable
|
| 608 |
+
is that the coefficients of the characteristic polynomial of J are all positive.
|
| 609 |
+
Let us start by considering a self-renewing cell type with exactly two cell
|
| 610 |
+
states being at the apex of a lineage hierarchy. This system has a 2 × 2 dynam-
|
| 611 |
+
ical matrix A and Jacobian J, whereby A is irreducible and has dominant
|
| 612 |
+
eigenvalue µA = 0. The characteristic polynomial of a generic 2×2 matrix, M,
|
| 613 |
+
is
|
| 614 |
+
P M(s) = s2 + pM
|
| 615 |
+
1 s + pM
|
| 616 |
+
0 .
|
| 617 |
+
(17)
|
| 618 |
+
with pM
|
| 619 |
+
1 = −tr(M) and pM
|
| 620 |
+
0 = det(M). In particular, since A has an eigenvalue
|
| 621 |
+
zero,
|
| 622 |
+
pA
|
| 623 |
+
0 = det(A) = a11a22 − a12a21 = 0 .
|
| 624 |
+
(18)
|
| 625 |
+
From this follows that the right and left eigenvectors to the matrix A
|
| 626 |
+
associated with the dominant eigenvalue µA = 0, w and v, are:
|
| 627 |
+
w =
|
| 628 |
+
�
|
| 629 |
+
−a22
|
| 630 |
+
a21
|
| 631 |
+
�
|
| 632 |
+
and v =
|
| 633 |
+
�
|
| 634 |
+
−a22 a12
|
| 635 |
+
�
|
| 636 |
+
.
|
| 637 |
+
(19)
|
| 638 |
+
From the Jacobian matrix J, we get equivalently,
|
| 639 |
+
pJ
|
| 640 |
+
0 = det(J) = (a21 − a22)(−a22η1 + a12η2)
|
| 641 |
+
a22
|
| 642 |
+
= vη |w|
|
| 643 |
+
a22
|
| 644 |
+
,
|
| 645 |
+
(20)
|
| 646 |
+
with the L1-norm |w| = w1 + w2 = −a22 + a213. Here we used the form of J
|
| 647 |
+
in Eq. (15) with η = (η1, η2) from (16), as well as the relations (18) and (19),
|
| 648 |
+
and we factorised the determinant.
|
| 649 |
+
3Note that aii is always negative or zero
|
| 650 |
+
|
| 651 |
+
Springer Nature 2021 LATEX template
|
| 652 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 653 |
+
11
|
| 654 |
+
From Eq. (10), we can further establish:
|
| 655 |
+
µ′ =
|
| 656 |
+
�
|
| 657 |
+
ij
|
| 658 |
+
viwj
|
| 659 |
+
vw a′
|
| 660 |
+
ij =
|
| 661 |
+
�
|
| 662 |
+
ij
|
| 663 |
+
|w|
|
| 664 |
+
ρ∗
|
| 665 |
+
viρ∗
|
| 666 |
+
j
|
| 667 |
+
vw a′
|
| 668 |
+
ij = |w|
|
| 669 |
+
ρ∗
|
| 670 |
+
vη
|
| 671 |
+
vw
|
| 672 |
+
(21)
|
| 673 |
+
= − a22pJ
|
| 674 |
+
0
|
| 675 |
+
ρ∗pJ
|
| 676 |
+
1 a22
|
| 677 |
+
.
|
| 678 |
+
(22)
|
| 679 |
+
Here, we used that ρ∗ is a dominant right eigenvector, and thus ρ∗ =
|
| 680 |
+
ρ∗
|
| 681 |
+
|w|w,
|
| 682 |
+
and furthermore we used the definition of ηi = �
|
| 683 |
+
j a′
|
| 684 |
+
ijρ∗
|
| 685 |
+
j, we substituted Eq.
|
| 686 |
+
(20), and used that vw = a2
|
| 687 |
+
22 + a12a21 = −pA
|
| 688 |
+
1 a22. Finally, we get:
|
| 689 |
+
pJ
|
| 690 |
+
0 = −µ′ρ∗pA
|
| 691 |
+
1 .
|
| 692 |
+
(23)
|
| 693 |
+
Notably, we can show that this relation also holds for higher dimensions by
|
| 694 |
+
explicitly computing the coefficients of characteristic polynomials pA,J
|
| 695 |
+
i
|
| 696 |
+
, the
|
| 697 |
+
eigenvalues and eigenvectors, and then evaluating both sides of the equation.
|
| 698 |
+
For systems with three states, this can be done analytically. For systems with
|
| 699 |
+
4,5, and 6 states we tested relation (23) numerically by generating N =1000
|
| 700 |
+
random matrices with entries chosen from a uniform distribution4. In each
|
| 701 |
+
case, this relation was fulfilled. Hence we are confident that this relation holds
|
| 702 |
+
up to 6 states, and it is reasonable to expect this to hold also for larger systems.
|
| 703 |
+
Since A has a simple dominant eigenvalue µA = 0, we can factorise one term
|
| 704 |
+
from the characteristic polynomial, P(s) = sQ(s) knowing that all roots of
|
| 705 |
+
Q(s) are negative. Applying the Routh-Hurwitz necessary condition to Q(s), it
|
| 706 |
+
follows that the coefficients of the polynomial Q, pQ
|
| 707 |
+
i > 0, where i = 1, 2, ..., n−
|
| 708 |
+
1. Thus, pA
|
| 709 |
+
1 > 0 and considering that ρ∗ > 0 by definition, then for having
|
| 710 |
+
pJ
|
| 711 |
+
0 > 0 we must require µ′ < 0. Therefore, a necessary condition for a stable,
|
| 712 |
+
strict homeostatic state is
|
| 713 |
+
0 > µ′ =⇒ 0 >
|
| 714 |
+
�
|
| 715 |
+
i
|
| 716 |
+
viwi (λ′
|
| 717 |
+
i − γ′
|
| 718 |
+
i) + wi
|
| 719 |
+
�
|
| 720 |
+
j̸=i
|
| 721 |
+
(vj − vi)κ′
|
| 722 |
+
ij
|
| 723 |
+
������
|
| 724 |
+
ρ=ρ∗
|
| 725 |
+
,
|
| 726 |
+
(24)
|
| 727 |
+
where on the right-hand side, we used Eq. (11). This condition is bound to the
|
| 728 |
+
validity of Eq. (23), that is, we can show it analytically for up to three states
|
| 729 |
+
and numerically up to 6 states. Nonetheless, we also expect this to be true for
|
| 730 |
+
larger systems.
|
| 731 |
+
One way to satisfy this necessary condition is if at ρ = ρ∗
|
| 732 |
+
�
|
| 733 |
+
�
|
| 734 |
+
�
|
| 735 |
+
�
|
| 736 |
+
�
|
| 737 |
+
�
|
| 738 |
+
i ≤ 0, γ′
|
| 739 |
+
i ≥ 0 for all i
|
| 740 |
+
λ′
|
| 741 |
+
i < 0 or γ′
|
| 742 |
+
i > 0 at for least one i
|
| 743 |
+
κ′
|
| 744 |
+
ij = 0
|
| 745 |
+
.
|
| 746 |
+
(25)
|
| 747 |
+
4The diagonal elements of the random matrix are tuned using a local optimiser (fmincon
|
| 748 |
+
function of Matab) so that the matrix has a zero dominant eigenvalue.
|
| 749 |
+
|
| 750 |
+
Springer Nature 2021 LATEX template
|
| 751 |
+
12
|
| 752 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 753 |
+
Notably, the necessary conditions (24) and (25) only differ from the suffi-
|
| 754 |
+
cient conditions for dynamic heterogeneity, Eqs. (11) and (12), by needing to
|
| 755 |
+
be fulfilled only at the steady-state cell density ρ∗, whereas to ensure dynamic
|
| 756 |
+
homeostasis, those should be valid for a sufficiently large range of ρ.
|
| 757 |
+
3.3 Sufficient condition for strict homeostasis
|
| 758 |
+
Now we assess under which circumstances a strict homeostatic state is assured
|
| 759 |
+
to prevail.
|
| 760 |
+
First of all, the necessary conditions from above need to be fulfilled. In
|
| 761 |
+
particular, the parameter functions αi(ρ) must have a sufficient range so that
|
| 762 |
+
µ(ρ) has a root, i.e. ρ∗ with µ(ρ∗) = 0 exists, from which the existence of
|
| 763 |
+
a steady state follows. The question now is whether we can find sufficient
|
| 764 |
+
conditions assuring that the fixed point ρ∗ with �
|
| 765 |
+
i ρ∗
|
| 766 |
+
i = ρ∗ is (asymptotically)
|
| 767 |
+
stable.
|
| 768 |
+
Let us define a matrix B(x), x = (x1, ..., xm) with bij(x) = [B]ij(x) =
|
| 769 |
+
a∗
|
| 770 |
+
ij +xi. Hence, B(xi = 0) = A(ρ∗) and B(xi = ηi) = J, where J, the Jacobian
|
| 771 |
+
matrix, and ηi are defined as in (15) and (16), respectively. We consider now the
|
| 772 |
+
dominant eigenvalue as function of the entries of B, µ[B] := µ({bij}|i,j=1,...,m)
|
| 773 |
+
(the square brackets are chosen to denote the difference from the function
|
| 774 |
+
µ(ρ)). For sufficiently small ηi, we can then express the dominant eigenvalue
|
| 775 |
+
of the Jacobian matrix J, µ[J], relative to the dominant eigenvalues of A∗ :=
|
| 776 |
+
A(ρ∗) as,
|
| 777 |
+
µ[J] = µ[A∗] +
|
| 778 |
+
�
|
| 779 |
+
i
|
| 780 |
+
∂µ
|
| 781 |
+
∂xi
|
| 782 |
+
|xi=0 ηi + O(η2) ,
|
| 783 |
+
(26)
|
| 784 |
+
with,
|
| 785 |
+
∂µ
|
| 786 |
+
∂xi
|
| 787 |
+
|xi=0 =
|
| 788 |
+
�
|
| 789 |
+
ij
|
| 790 |
+
∂µ
|
| 791 |
+
∂bij
|
| 792 |
+
∂bij
|
| 793 |
+
∂xi
|
| 794 |
+
|xi=0 =
|
| 795 |
+
�
|
| 796 |
+
ij
|
| 797 |
+
∂µ
|
| 798 |
+
∂aij
|
| 799 |
+
|B=A∗ ,
|
| 800 |
+
(27)
|
| 801 |
+
since for x = 0, bij = aij for all i, j. It follows that for sufficiently small5 ηi,
|
| 802 |
+
and if all ηi < 0, we have
|
| 803 |
+
µJ = µ[A∗](ρ∗) +
|
| 804 |
+
�
|
| 805 |
+
i
|
| 806 |
+
∂µB
|
| 807 |
+
∂xi
|
| 808 |
+
|xi=0ηi + O(η2
|
| 809 |
+
i ) ≈
|
| 810 |
+
�
|
| 811 |
+
i
|
| 812 |
+
∂µA
|
| 813 |
+
∂aij
|
| 814 |
+
ηi < 0
|
| 815 |
+
(28)
|
| 816 |
+
since all ∂µA
|
| 817 |
+
∂aij > 0 (according to Eq. (8)) and µA(ρ∗) = 0. Hence, since µJ < 0,
|
| 818 |
+
the steady state ρ∗ is asymptotically stable if all ηi < 0. Thus, we get a
|
| 819 |
+
sufficient condition for asymptotic stability of the steady state ρ∗:
|
| 820 |
+
0 > ηi = ρ∗
|
| 821 |
+
i (λ′
|
| 822 |
+
i − γ′
|
| 823 |
+
i) +
|
| 824 |
+
�
|
| 825 |
+
k̸=i
|
| 826 |
+
(κ′
|
| 827 |
+
kiρ∗
|
| 828 |
+
k − κ′
|
| 829 |
+
ikρ∗
|
| 830 |
+
i ) > −ϵi for all i
|
| 831 |
+
(29)
|
| 832 |
+
5That is, there exist ϵi > 0 so that this is valid for any |ηi| < ϵi
|
| 833 |
+
|
| 834 |
+
Springer Nature 2021 LATEX template
|
| 835 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 836 |
+
13
|
| 837 |
+
where ϵi > 0 is sufficiently small. As this is an asymptotically stable steady
|
| 838 |
+
state, it corresponds to a controlled strict homeostatic state. In this case,
|
| 839 |
+
even if the cell numbers are disturbed (to some degree), the cell population is
|
| 840 |
+
regulated to return to the strict homeostatic state.
|
| 841 |
+
Notably, condition (29) is fulfilled if,
|
| 842 |
+
�
|
| 843 |
+
�
|
| 844 |
+
�
|
| 845 |
+
�
|
| 846 |
+
�
|
| 847 |
+
�
|
| 848 |
+
�
|
| 849 |
+
�
|
| 850 |
+
�
|
| 851 |
+
λ′
|
| 852 |
+
i ≤ 0, γ′
|
| 853 |
+
i ≥ 0 for all i
|
| 854 |
+
λ′
|
| 855 |
+
i < 0 or γ′
|
| 856 |
+
i > 0 at for least one i
|
| 857 |
+
κ′
|
| 858 |
+
ij = 0
|
| 859 |
+
and |λ′
|
| 860 |
+
i|, |γ′
|
| 861 |
+
i|, < ϵi
|
| 862 |
+
(30)
|
| 863 |
+
Furthermore, we may soften the condition on κij to
|
| 864 |
+
κ′
|
| 865 |
+
ij
|
| 866 |
+
κ′
|
| 867 |
+
ji <
|
| 868 |
+
ρ∗
|
| 869 |
+
j
|
| 870 |
+
ρ∗
|
| 871 |
+
i to allow also
|
| 872 |
+
some degree of feedback for the κij.
|
| 873 |
+
The conditions (30) are very similar to the ones for dynamic homeostasis,
|
| 874 |
+
(12), but here these conditions only need to be fulfilled at ρ = ρ∗, whereas
|
| 875 |
+
for dynamic homeostasis they need to be fulfilled for a sufficient range of ρ.
|
| 876 |
+
Moreover, in addition to the qualitative nature of the feedback (related to
|
| 877 |
+
the signs of λ′
|
| 878 |
+
i, γ′
|
| 879 |
+
i), the ‘strength’ of the crowding feedback, i.e. the absolute
|
| 880 |
+
values of λ′
|
| 881 |
+
i, γ′
|
| 882 |
+
i must not be ‘too large’, that is, smaller than ϵi. We cannot, in
|
| 883 |
+
general and for all system sizes, give a definite value for the feedback strength
|
| 884 |
+
bound ϵi below which strict homeostasis is assured. Nevertheless, by using the
|
| 885 |
+
sufficient stability criterion based on the Routh-Hurwitz criterion [24] we can
|
| 886 |
+
identify those bounds for systems with up to three cell states, which guides
|
| 887 |
+
expectations for larger systems. The details of this criterion and the necessary
|
| 888 |
+
derivations are shown in Appendix A. There, we show that for systems with one
|
| 889 |
+
or two cell states, ϵi = ∞, which means that asymptotic stability is ensured for
|
| 890 |
+
arbitrary feedback strengths. For systems with three cell states, we can assure
|
| 891 |
+
that ϵi = ∞ if certain further conditions are met (see Eq. (A13)). Otherwise,
|
| 892 |
+
ϵi can be determined implicitly from the roots of a quadratic form (Eq. (A14)),
|
| 893 |
+
and thus stability may depend on the magnitude of the feedback. In principle,
|
| 894 |
+
such bounds can be found for larger systems too, but the algebraic complexity
|
| 895 |
+
of this process renders it unfeasible to do this in practical terms.
|
| 896 |
+
3.4 Robustness to perturbations and failures
|
| 897 |
+
Now, we wish to assess the robustness of the above crowding control mecha-
|
| 898 |
+
nism, i.e. what occurs if it is disrupted, for example, by the action of toxins,
|
| 899 |
+
other environmental cues, or by cell mutations. More precisely, we will study
|
| 900 |
+
what happens if one or more feedback pathways, here characterised as a param-
|
| 901 |
+
eter αi with α′
|
| 902 |
+
i ̸= 0 fulfilling the conditions for (dynamic or strict) homeostatic
|
| 903 |
+
control, is failing, that is, it becomes α′
|
| 904 |
+
i = 0. We will first address the case
|
| 905 |
+
of tissue-extrinsic factors, i.e. those affecting all the cells in the tissue, and
|
| 906 |
+
then the case of single-cell mutations. In the latter case, only a single cell
|
| 907 |
+
would initially show a dysregulated behaviour, yet, if this confers a proliferative
|
| 908 |
+
advantage, it can lead to hyperplasia and possibly cancer [25–27].
|
| 909 |
+
|
| 910 |
+
Springer Nature 2021 LATEX template
|
| 911 |
+
14
|
| 912 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 913 |
+
First, we note that the sufficient condition for strict homeostasis, given
|
| 914 |
+
by Eq. (30), is overly restrictive. In a tissue cell type under crowding feed-
|
| 915 |
+
back control with λ′
|
| 916 |
+
i < 0 and γ′
|
| 917 |
+
i > 0 for more than one i, there is a degree
|
| 918 |
+
of redundancy. That is, if the feedback is removed for one or more of these
|
| 919 |
+
parameters (changing to λ′
|
| 920 |
+
i = 0 and, or γ′
|
| 921 |
+
i = 0), then the sufficient condition
|
| 922 |
+
for a strict homeostatic state remains fulfilled as long as at least one λ′
|
| 923 |
+
i or
|
| 924 |
+
γ′
|
| 925 |
+
i remains non-zero. This possible redundancy confers a degree of robustness,
|
| 926 |
+
meaning that feedback pathways can be removed – setting α′
|
| 927 |
+
i = 0 – without
|
| 928 |
+
losing homeostatic control. Since the necessary conditions, Eqs. (24), are even
|
| 929 |
+
less restrictive, tissue homeostasis may even tolerate more severe disruptions
|
| 930 |
+
that reverse some feedback pathways, e.g. switching from λ′
|
| 931 |
+
i < 0 to λ′
|
| 932 |
+
i > 0,
|
| 933 |
+
as long as other terms in the sum on the right-hand side of (24) compensate
|
| 934 |
+
for this changed sign, ensuring that the sum as a whole is negative. In any
|
| 935 |
+
case, it is important to remind the underlying assumption for which a non-
|
| 936 |
+
trivial steady state exists. In case the variability of the kinetic parameters is
|
| 937 |
+
not enough to assure the condition µ(ρ∗ = 0), then the tissue will degenerate,
|
| 938 |
+
either shrinking and eventually disappearing or indefinitely growing.
|
| 939 |
+
From the above considerations, we conclude that if crowding control applies
|
| 940 |
+
to more than one parameter αi, that is, α′
|
| 941 |
+
i ̸= 0 with appropriate sign and
|
| 942 |
+
magnitude, homeostasis is potentially robust to feedback disruption. This may
|
| 943 |
+
include a simple variation of the feedback function α′
|
| 944 |
+
i but also perturbation in
|
| 945 |
+
the feedback functions shape and complete feedback failure, α′
|
| 946 |
+
i = 0.
|
| 947 |
+
An illustrative example of this situation is shown in Figure 1. Here, the time
|
| 948 |
+
evolution of the cell density is shown for a three-state cell fate model, which has
|
| 949 |
+
been computed by integration of the dynamical system (5) (the details of this
|
| 950 |
+
model are given in Appendix B as Eq. (B15) and illustrated in Figure B1). Four
|
| 951 |
+
kinetic parameters are regulated via crowding control satisfying the sufficient
|
| 952 |
+
condition for strict homeostasis, (30). Then, starting from this homeostatic
|
| 953 |
+
configuration, feedback disruption is introduced at a time equal to zero. In one
|
| 954 |
+
case (“Single failure”), a single kinetic parameter suffers a complete failure of
|
| 955 |
+
the type α′
|
| 956 |
+
i = 0. In this case, the remaining feedback functions compensate
|
| 957 |
+
for this failure, and a new homeostatic condition is achieved. Instead, in the
|
| 958 |
+
second case (“Multiple failures”), failures are applied so that three of the four
|
| 959 |
+
kinetic parameters initially regulated do not adjust with cell density6. Notably,
|
| 960 |
+
the only feedback function left satisfies the condition for asymptotic stability,
|
| 961 |
+
(30). Nevertheless, the variability of this kinetic parameter is not enough to
|
| 962 |
+
assure the existence of a steady state, since in this case, the function µ(ρ) does
|
| 963 |
+
not possess any root. Hence µ > 0 for all ρ, leading to an indefinite growth of
|
| 964 |
+
the cell population. Additional test cases are presented in Appendix B.2.
|
| 965 |
+
So far, we modelled the feedback dysregulation as acting on a global scale,
|
| 966 |
+
thus changing the whole tissue’s dynamics behaviour. This situation represents
|
| 967 |
+
a feedback mechanism affected by cell-extrinsic signals, in which any dysregu-
|
| 968 |
+
lation applies to all the cells in the same way. However, dysregulation can also
|
| 969 |
+
6Only in this example, feedback control fails upon multiple failures, while in general, multiple
|
| 970 |
+
failures may still be compensated to maintain homeostatic control.
|
| 971 |
+
|
| 972 |
+
Springer Nature 2021 LATEX template
|
| 973 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 974 |
+
15
|
| 975 |
+
-10
|
| 976 |
+
0
|
| 977 |
+
10
|
| 978 |
+
20
|
| 979 |
+
30
|
| 980 |
+
40
|
| 981 |
+
0
|
| 982 |
+
2
|
| 983 |
+
4
|
| 984 |
+
6
|
| 985 |
+
8
|
| 986 |
+
10
|
| 987 |
+
Homeostasis
|
| 988 |
+
Single failure
|
| 989 |
+
Multiple failures
|
| 990 |
+
-10
|
| 991 |
+
0
|
| 992 |
+
10
|
| 993 |
+
20
|
| 994 |
+
30
|
| 995 |
+
40
|
| 996 |
+
-0.1
|
| 997 |
+
-0.05
|
| 998 |
+
0
|
| 999 |
+
0.05
|
| 1000 |
+
0.1
|
| 1001 |
+
0.15
|
| 1002 |
+
Homeostasis
|
| 1003 |
+
Single failure
|
| 1004 |
+
Multiple failures
|
| 1005 |
+
Fig. 1
|
| 1006 |
+
Cell dynamics in terms of cell density, scaled by the steady state in the homeostatic
|
| 1007 |
+
case, as a function of time (left) and the corresponding variation of the dominant eigenvalue µ
|
| 1008 |
+
(right). Time is scaled by the inverse of ¯α = mini α∗
|
| 1009 |
+
i . The homeostatic model is perturbed at
|
| 1010 |
+
a time equal to zero to include feedback failure of the type α′
|
| 1011 |
+
i = 0. In the case where only one
|
| 1012 |
+
feedback function fails (“Single failure”), the system is able to achieve and maintain a new
|
| 1013 |
+
homeostatic state, characterised by a constant cell density and a zero dominant eigenvalue.
|
| 1014 |
+
In case more than one feedback fails (“Multiple failures”), the cell dynamics are unstable
|
| 1015 |
+
since a steady state does not exist and µ > 0 for all ρ. The cell fate model corresponds to
|
| 1016 |
+
model (B15) with parameters given in Table B1 and Table B2.
|
| 1017 |
+
act at the single-cell level, for example, when DNA mutations occur. In this
|
| 1018 |
+
case, the impact of the dysregulation is slightly different, as explained in the
|
| 1019 |
+
following.
|
| 1020 |
+
Suppose, upon disruption of crowding control in a single cell, for example,
|
| 1021 |
+
by DNA mutations, a sufficient number of crowding feedback pathways remain
|
| 1022 |
+
so that there is a steady state and the sufficient condition (30) is still fulfilled.
|
| 1023 |
+
In that case, homeostasis is retained, just as when this occurs in a tissue-wide
|
| 1024 |
+
disruption. However, if the homeostatic control of that single cell fails such that
|
| 1025 |
+
the cell becomes hyperproliferative, µ > 0, or declining, µ < 0, the tissue may
|
| 1026 |
+
still remain homeostatic. If µ < 0, the single mutated cell will be lost, upon
|
| 1027 |
+
which only a population of crowding controlled cells remain, which remain in
|
| 1028 |
+
homeostasis. If µ > 0 in a single cell, hyper-proliferation is not ensured either:
|
| 1029 |
+
while the probability for mutated cells to grow in numbers is larger than to
|
| 1030 |
+
decline, due to the low numbers, mere randomness can lead to the loss of the
|
| 1031 |
+
mutated cell with a non-zero probability, which results in the extinction of
|
| 1032 |
+
the dysregulated mutant7. In that case, the mutant cells go extinct and the
|
| 1033 |
+
tissue remains homeostatic despite the disruption of homeostatic control in
|
| 1034 |
+
the mutated cells; a stark contrast to disruption on the tissue level. Otherwise,
|
| 1035 |
+
if the mutant clone (randomly) survives, it will continue to hyper-proliferate
|
| 1036 |
+
and eventually dominate the tissue, which is thus rendered non-homeostatic.
|
| 1037 |
+
However, the tissue divergence time scale may be much longer than the case
|
| 1038 |
+
where the same dysregulation occurs in all cells.
|
| 1039 |
+
The deterministic cell population model (5) is suitable for describing the
|
| 1040 |
+
average cell numbers. Nevertheless, it fails to describe the stochastic nature of
|
| 1041 |
+
7For example, in the case of a single state with cell division rate λ and loss rate γ – a simple
|
| 1042 |
+
branching process – the probability for a mutant with µ > 0, that is, λ > γ, to establish is 1−γ/λ,
|
| 1043 |
+
which is less than certainty.
|
| 1044 |
+
|
| 1045 |
+
Springer Nature 2021 LATEX template
|
| 1046 |
+
16
|
| 1047 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1048 |
+
single-cell fate choice. Thus, assessing a single cell’s impact on tissue dynamics
|
| 1049 |
+
requires stochastic modelling. To that end, we implemented this situation as
|
| 1050 |
+
a Markov process with the same rates as the tissue cell population dynamics
|
| 1051 |
+
model8 (see Appendix B.3 for more details).
|
| 1052 |
+
In Figure 2, we show numerical simulation results of a stochastic version
|
| 1053 |
+
of the model used for previous results in Figure 1, depicted in terms of tissue
|
| 1054 |
+
cell density as a function of time. Here, two possible realisations of the same
|
| 1055 |
+
stochastic process are presented. We note that the initially homeostatic tissue
|
| 1056 |
+
results in stochastic fluctuations of the cell density, which remain, on average,
|
| 1057 |
+
constant. At a time equal to zero, a single cell in this tissue switches behaviour,
|
| 1058 |
+
presenting multiple failures which, if applied to all the cells, would determine
|
| 1059 |
+
the growth of the tissue (corresponding to Multiple failures curve in Figure 1).
|
| 1060 |
+
In one instance of the stochastic simulation, however, the mutated clone goes
|
| 1061 |
+
extinct after some time, leaving a tissue globally unaffected by the mutation.
|
| 1062 |
+
On the other hand, in another instance, the mutated clone prevails, leading to
|
| 1063 |
+
the growth of the tissue cell population. The fact that vastly different outcomes
|
| 1064 |
+
can occur with the same parameters and starting conditions demonstrates the
|
| 1065 |
+
impact of stochasticity in the case of a single-cell mutation.
|
| 1066 |
+
-10
|
| 1067 |
+
0
|
| 1068 |
+
10
|
| 1069 |
+
20
|
| 1070 |
+
30
|
| 1071 |
+
40
|
| 1072 |
+
50
|
| 1073 |
+
1
|
| 1074 |
+
1.2
|
| 1075 |
+
1.4
|
| 1076 |
+
Homeostasis
|
| 1077 |
+
Multiple Failure (instance #1)
|
| 1078 |
+
Multiple Failure (instance #2)
|
| 1079 |
+
Fig. 2
|
| 1080 |
+
Numerical simulation results of a stochastic version of the model used in Figure 1
|
| 1081 |
+
upon disruption of crowding control in a single cell, mimicking a DNA mutation. At a
|
| 1082 |
+
time equal to 0, the initially homeostatic model is disrupted with a single cell presenting
|
| 1083 |
+
multiple failures in the feedback control, as in Figure 1. Two instances of simulations run
|
| 1084 |
+
with identical parameters are presented. The rescaled cell density ρ/ρ∗ is shown as a function
|
| 1085 |
+
of the time, scaled by the inverse of ¯α = mini α∗
|
| 1086 |
+
i . Whilst the mutated cell and its progeny go
|
| 1087 |
+
extinct in one instance (#1), in the other (#2), mutated cells prevail and hyper-proliferate
|
| 1088 |
+
so that tissue homeostasis is lost. The simulation stops when the clone goes extinct or when
|
| 1089 |
+
instability is detected. Full details of the simulation are provided in Appendix B.3.
|
| 1090 |
+
3.5 Quasi-dedifferentiation
|
| 1091 |
+
In the previous section, we addressed the case where external or cell-intrinsic
|
| 1092 |
+
factors disrupt homeostatic control in self-renewing cells of a tissue. However,
|
| 1093 |
+
8While a Markov process is an approximation which not necessarily reflects the probability
|
| 1094 |
+
distribution of subsequent event times realistically, it is often sufficient to assess the qualitative
|
| 1095 |
+
behaviour of a system with low numbers, subject to random influences from the environment.
|
| 1096 |
+
|
| 1097 |
+
Springer Nature 2021 LATEX template
|
| 1098 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1099 |
+
17
|
| 1100 |
+
situations such as injury, poisoning, or cell radiation might also affect home-
|
| 1101 |
+
ostasis in other ways. An example is when stem cells are completely depleted
|
| 1102 |
+
from the tissue. In this context, many studies about tissue regeneration after
|
| 1103 |
+
injury report evidence of cell plasticity [17, 18], when committed cells regain
|
| 1104 |
+
the potential of the previously depleted stem cells. Cell dedifferentiation is just
|
| 1105 |
+
an example where differentiated cells return to an undifferentiated state as a
|
| 1106 |
+
response to tissue damage. Lineage tracing experiments confirmed this feature
|
| 1107 |
+
in vivo in several cases [16, 28–30].
|
| 1108 |
+
In the following, we assess how committed progenitor cells respond to the
|
| 1109 |
+
depletion of the stem cell pool if they are under crowding feedback control.
|
| 1110 |
+
Without loss of generality, let us consider an initially homeostatic scenario
|
| 1111 |
+
where there is a self-renewing (i.e. stem) cell type (S) – with growth param-
|
| 1112 |
+
eter µ = 0 – at the apex of a lineage hierarchy, and a committed progenitor
|
| 1113 |
+
cell type (C) – with µ < 0, but with at least one state that has a non-zero
|
| 1114 |
+
cell division rate – below type S in the hierarchy, as depicted in Figure 3.
|
| 1115 |
+
Based on this cell fate model, S-cells proliferate and differentiate into C-cells
|
| 1116 |
+
while maintaining the S-cell population. The C-cells also proliferate and dif-
|
| 1117 |
+
ferentiate into other downstream cell types which we do not explicitly consider
|
| 1118 |
+
here. C-cells do not maintain their own population; only the steady influx of
|
| 1119 |
+
new cells of that type via differentiation of S-cells into C-cells maintains the
|
| 1120 |
+
latter population (see [13]). We further assume that both S- and C-cells are
|
| 1121 |
+
under appropriate crowding control, fulfilling both the sufficient conditions for
|
| 1122 |
+
dynamic homeostasis, (12), and for stable, strict homeostasis, (30).
|
| 1123 |
+
Based on the above modelling, we can write the dynamics of the cell
|
| 1124 |
+
densities belonging to the committed progenitor type as,
|
| 1125 |
+
d
|
| 1126 |
+
dtρc = Ac(ρc)ρc + u ,
|
| 1127 |
+
(31)
|
| 1128 |
+
where ρc = (ρms+1, ρms+2, .., ρms+mc) are the cell densities in the committed
|
| 1129 |
+
C-type, with ms being the number of states of the self-renewing S-type. Ac is
|
| 1130 |
+
the dynamical matrix restricted to states in the C-type and ui = �ms
|
| 1131 |
+
j=1 κjiρj
|
| 1132 |
+
is a constant vector quantifying the influx of cells into the C-type.
|
| 1133 |
+
First, we note that the Jacobian matrix of a committed cell type, described
|
| 1134 |
+
by (31), J =
|
| 1135 |
+
�
|
| 1136 |
+
∂A(ρc)ρc
|
| 1137 |
+
∂ρj
|
| 1138 |
+
�
|
| 1139 |
+
j=ms+1,...,ms+mc
|
| 1140 |
+
, has the same form as a cell type at the
|
| 1141 |
+
apex of the hierarchy, since u does not depend on the densities ρms+1,...,ms+mc.
|
| 1142 |
+
From this follows that if C-cells are regulated by crowding control, fulfilling the
|
| 1143 |
+
conditions (30), then also the population of C-cells is stable around a steady
|
| 1144 |
+
state ρ∗
|
| 1145 |
+
c, albeit with a growth parameter µc(ρ∗
|
| 1146 |
+
c) < 09.
|
| 1147 |
+
We now consider the scenario where all stem cells are depleted at some
|
| 1148 |
+
point, as was experimentally done in [16, 18]. This would stop any replen-
|
| 1149 |
+
ishment of C-cells through differentiation of S-cells, corresponding to setting
|
| 1150 |
+
9This can be seen when multiplying the steady state condition for (31), Ac(ρs, ρc)ρc + u = 0
|
| 1151 |
+
with a positive left dominant eigenvector v, giving, µcvρ∗
|
| 1152 |
+
c + vu = 0. Since ρ∗ and v have all
|
| 1153 |
+
positive entries and u is non-negative, this equation can only be fulfilled for µc < 0.
|
| 1154 |
+
|
| 1155 |
+
Springer Nature 2021 LATEX template
|
| 1156 |
+
18
|
| 1157 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1158 |
+
Fig. 3 Sketch representative of the quasi-dedifferentiation scenario. A homeostatic system
|
| 1159 |
+
enclosed in the black box comprises two cell types: a stem cell type, S, (blue) and a com-
|
| 1160 |
+
mitted cell type, C, (green). In the unperturbed homeostatic scenario, S is self-renewing,
|
| 1161 |
+
characterised by a growth parameter at the steady state µ∗ = 0, and C is transient, with
|
| 1162 |
+
a growth parameter at the steady state µ∗ < 0. Both cell types are subject to crowding
|
| 1163 |
+
control, fulfilling both conditions (12), and (30). By removing the stem cell type XS, the
|
| 1164 |
+
committed cell type acquires self-renewing property through crowding control, effectively
|
| 1165 |
+
becoming a stem cell type (see Figure 4).
|
| 1166 |
+
u = 0 in (31). Hence we end up with the dynamics ˙ρc = A(ρc)ρc. Now, assum-
|
| 1167 |
+
ing that the function µ(ρ) has sufficient range, so that µ(ρ∗∗
|
| 1168 |
+
c ) = 0 for some
|
| 1169 |
+
ρ∗∗
|
| 1170 |
+
c , and provided that A(ρc) is under crowding control fulfilling the sufficient
|
| 1171 |
+
conditions for asymptotic stability of a steady state, then, following our argu-
|
| 1172 |
+
ments from section 3.3, the population of C-cells will attain a stable steady
|
| 1173 |
+
state. In other words, those previously committed cells become self-renewing
|
| 1174 |
+
cells. Also, since they now reside at the apex of the lineage hierarchy (given
|
| 1175 |
+
that S-cells are absent), they effectively become stem cells.
|
| 1176 |
+
Hence, under crowding control, previously committed progenitor cells
|
| 1177 |
+
(committed cells that can divide) will automatically become stem cells if the
|
| 1178 |
+
original stem cells are depleted. Commonly, such a reversion of a committed cell
|
| 1179 |
+
type to a stem cell type would be called ‘dedifferentiation’ or ‘reprogramming’.
|
| 1180 |
+
However, in this case, no genuine reversion of cell states occurs; previously
|
| 1181 |
+
committed cells do not transition back to states associated with the stem cell
|
| 1182 |
+
type. Instead, they respond by crowding feedback and adjust their dynamical
|
| 1183 |
+
rates so that µ becomes zero, hence attaining a self-renewing cell type. Cru-
|
| 1184 |
+
cially, this new stem cell type is fundamentally different to the original one
|
| 1185 |
+
and still most similar to the original committed type. We call this process
|
| 1186 |
+
quasi-dedifferentiation. The quasi-dedifferentiation follows the same reversion
|
| 1187 |
+
of proliferative potential as in ‘genuine’ dedifferentiation but without explicit
|
| 1188 |
+
reversion in the cell state trajectories.
|
| 1189 |
+
The following numerical example illustrates this situation. We focus on the
|
| 1190 |
+
cell dynamics of a single C-type regulated via crowding feedback (detail of
|
| 1191 |
+
the model are provided in Appendix B.4). The cell density as a function of
|
| 1192 |
+
the time, shown in Figure 4, is obtained by integrating the corresponding cell
|
| 1193 |
+
population model according to Eq. (5). The system is initially in a homeostatic
|
| 1194 |
+
condition, meaning that there is a constant influx of cells from some upstream
|
| 1195 |
+
self-renewing types. Such upstream types are assumed to be properly regulated
|
| 1196 |
+
such that this cell influx is constant over time. At a time equal to zero, the cell
|
| 1197 |
+
influx becomes suddenly zero, representing an instantaneous removal of all the
|
| 1198 |
+
|
| 1199 |
+
Xo-
|
| 1200 |
+
HomeostasisSpringer Nature 2021 LATEX template
|
| 1201 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1202 |
+
19
|
| 1203 |
+
-10
|
| 1204 |
+
0
|
| 1205 |
+
10
|
| 1206 |
+
20
|
| 1207 |
+
30
|
| 1208 |
+
40
|
| 1209 |
+
0
|
| 1210 |
+
0.2
|
| 1211 |
+
0.4
|
| 1212 |
+
0.6
|
| 1213 |
+
0.8
|
| 1214 |
+
1
|
| 1215 |
+
Homeostasis
|
| 1216 |
+
Quasi-dedifferentiation
|
| 1217 |
+
-10
|
| 1218 |
+
0
|
| 1219 |
+
10
|
| 1220 |
+
20
|
| 1221 |
+
30
|
| 1222 |
+
40
|
| 1223 |
+
-0.2
|
| 1224 |
+
-0.1
|
| 1225 |
+
0
|
| 1226 |
+
Homeostasis
|
| 1227 |
+
Quasi-dedifferentiation
|
| 1228 |
+
Fig. 4 Cell dynamics of an initially committed cell type C (µ < 0) upon removal of all stem
|
| 1229 |
+
cells. (Left) Cell density scaled by the steady-state density as a function of time. (Right)
|
| 1230 |
+
Corresponding variation of the dominant eigenvalue µc. Time is scaled by the inverse of
|
| 1231 |
+
¯α = mini α∗
|
| 1232 |
+
i . It is assumed that a stem cell type, S, initially resides in the lineage hierarchy
|
| 1233 |
+
above the committed cell type (as in Figure 3). S cells differentiate into C cells, which is
|
| 1234 |
+
modelled as a constant cell influx of C-cells (S is not explicitly simulated). At a time equal
|
| 1235 |
+
to zero, a sudden depletion of S cells is modelled by stopping the cell influx. After some
|
| 1236 |
+
transitory phase, the cell population stabilises around a new steady state and becomes self-
|
| 1237 |
+
renewing with µc = 0. The full description of the dynamical model, which corresponds to
|
| 1238 |
+
model (B15) with parameters given in Table B1, is reported in Appendix B.4.
|
| 1239 |
+
self-renewing cells from the tissue. A new homeostatic condition is achieved
|
| 1240 |
+
after a transitory phase thanks to the crowding feedback acting on the C-
|
| 1241 |
+
type. This example demonstrates how an initially committed cell type, i.e.
|
| 1242 |
+
with µc < 0, regulated via crowding feedback, might be able to switch, upon
|
| 1243 |
+
disruption, to a self-renewing behaviour µc = 0.
|
| 1244 |
+
4 Discussion
|
| 1245 |
+
For maintaining healthy adult tissue, the tissue cell population must be
|
| 1246 |
+
maintained in a homeostatic state. Here, we assessed one of the most com-
|
| 1247 |
+
mon generalised regulation mechanisms of homeostasis, which we refer to as
|
| 1248 |
+
crowding feedback. Based on this, progenitor cells (stem cells and committed
|
| 1249 |
+
progenitors) adjust their propensities to divide, differentiate, and die, accord-
|
| 1250 |
+
ing to the surrounding density of cells, which they sense via biochemical or
|
| 1251 |
+
mechanical signals. For this purpose, we used a generic mathematical model
|
| 1252 |
+
introduced before in Refs. [13, 20], which describes tissue cell population
|
| 1253 |
+
dynamics in the most generic way, including cell divisions, cell state transi-
|
| 1254 |
+
tions, and cell loss / differentiation. Based on this model, we rigorously define
|
| 1255 |
+
what is meant when speaking of a ‘homeostatic state’, introducing two notions:
|
| 1256 |
+
a strict homeostasis is a steady state of the tissue cell population dynamics,
|
| 1257 |
+
while dynamical homeostasis allows, in addition to strict homeostasis, for oscil-
|
| 1258 |
+
lations and fluctuations, as long as a finite long-term average cell population
|
| 1259 |
+
is maintained (such as the endometrium during the menstrual cycle).
|
| 1260 |
+
By analysing this dynamical system, we find several sufficient and necessary
|
| 1261 |
+
conditions for homeostasis. These conditions are formulated in terms of how
|
| 1262 |
+
the propensities of cell division, differentiation, and cell state changes, of cells
|
| 1263 |
+
|
| 1264 |
+
Springer Nature 2021 LATEX template
|
| 1265 |
+
20
|
| 1266 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1267 |
+
whose type is at the apex of an adult cell lineage hierarchy, may depend on
|
| 1268 |
+
their cell density. We find that when, for a wide range of cell density values,
|
| 1269 |
+
the cell division propensity of at least one state decreases with cell density or
|
| 1270 |
+
the differentiation propensity increases with it, while other propensities (e.g.
|
| 1271 |
+
of cell state transitions) are not affected by the cell density, then dynamic
|
| 1272 |
+
homeostasis prevails (12). For strict homeostasis to prevail, this only needs
|
| 1273 |
+
to be fulfilled at the steady state itself, but in addition, the magnitude of
|
| 1274 |
+
the feedback strength may not be too large (30). We can derive explicit and
|
| 1275 |
+
implicit expressions for the bound on feedback strength for systems of two
|
| 1276 |
+
and three-cell states but cannot do so for arbitrary systems. Furthermore, we
|
| 1277 |
+
find that a necessary condition for strict homeostasis is that the conditions for
|
| 1278 |
+
dynamic homeostasis are met at least at the steady state cell density.
|
| 1279 |
+
A direct consequence of the conditions we found is that they allow for a
|
| 1280 |
+
considerable degree of redundancy when more than one propensity depends
|
| 1281 |
+
appropriately on the cell density. Hence feedback pathways, that is, cell dynam-
|
| 1282 |
+
ics parameters depending on the cell density, may serve as ‘back-ups’ to each
|
| 1283 |
+
other if one fails. We demonstrate that this confers robustness to the home-
|
| 1284 |
+
ostatic system in that one or more crowding feedback pathways may fail, yet
|
| 1285 |
+
the tissue remains in homeostasis.
|
| 1286 |
+
Finally, we assess how crowding feedback regulation affects the response of
|
| 1287 |
+
committed progenitor cells to a complete depletion of all stem cells. We showed
|
| 1288 |
+
that committed cells which can divide and are under appropriate crowding
|
| 1289 |
+
feedback control (that is, meeting the sufficient conditions (12) and (30)), will
|
| 1290 |
+
necessarily, without additional mechanisms or assumptions, reacquire stem cell
|
| 1291 |
+
identity, that is, become self-renewing and are at the apex of the lineage hierar-
|
| 1292 |
+
chy. Notably, while this process resembles that of dedifferentiation, it does not
|
| 1293 |
+
involve explicit reprogramming, in that the cell state transitions are reversed.
|
| 1294 |
+
Instead, only the cell fate propensities adjust to the changing environment by
|
| 1295 |
+
balancing proliferation and differentiation as is required for self-renewal. While
|
| 1296 |
+
these are purely theoretical considerations, and such a process has not yet
|
| 1297 |
+
been experimentally found, we predict that it must necessarily occur under the
|
| 1298 |
+
appropriate conditions. This can be measured by assessing the gene expression
|
| 1299 |
+
profiles (e.g. via single-cell RNA sequencing) of cells that ‘dedifferentiate’, i.e.
|
| 1300 |
+
reacquire stemness after depletion of stem cells. Moreover, those considerations
|
| 1301 |
+
yield further, more general insights:
|
| 1302 |
+
• Stem cell identity is neither the property of individual cells nor is it strictly
|
| 1303 |
+
associated with particular cell types or states. Any cell that can divide and
|
| 1304 |
+
differentiate, committed or not, may become a stem cell under appropriate
|
| 1305 |
+
environmental control.
|
| 1306 |
+
• From the latter follows that stemness is a property determined by the
|
| 1307 |
+
environment, not the cell itself.
|
| 1308 |
+
• ‘Cell plasticity’ might need to be seen in a wider context. Usually, cell
|
| 1309 |
+
plasticity is associated with a change of a cell’s type when subjected to
|
| 1310 |
+
environmental cues, which involves a substantial remodelling of the cell’s
|
| 1311 |
+
morphology and biochemical state. However, we see that a committed cell
|
| 1312 |
+
|
| 1313 |
+
Springer Nature 2021 LATEX template
|
| 1314 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1315 |
+
21
|
| 1316 |
+
may turn into a stem cell simply by adjusting the pace of the cell cycle
|
| 1317 |
+
and differentiation processes to the environment. This may not require
|
| 1318 |
+
substantial changes in the cell’s state.
|
| 1319 |
+
This exemplifies that homeostatic control through crowding feedback is not
|
| 1320 |
+
only a way to render homeostasis stable and robust, but also to create stem
|
| 1321 |
+
cell identities as a collective property of the tissue cell population.
|
| 1322 |
+
Acknowledgments.
|
| 1323 |
+
We thank Ben MacArthur and Ruben Sanchez-Garcia
|
| 1324 |
+
for valuable discussions.
|
| 1325 |
+
Declarations
|
| 1326 |
+
PG is supported by an MRC New Investigator Award, Grant number
|
| 1327 |
+
MR/R026610/1. The code generated for numerical computations in the cur-
|
| 1328 |
+
rent study is available on Github, https://github.com/cp4u17/Feedback. No
|
| 1329 |
+
other data was generated for this work.
|
| 1330 |
+
Contributions are as follows: C.P. and P.G. conceptualised the paper, C.P.
|
| 1331 |
+
and P.G. did the mathematical analysis, C.P. did the numerical analysis, P.G.
|
| 1332 |
+
supervised the work.
|
| 1333 |
+
The authors have no competing interests to declare that are relevant to the
|
| 1334 |
+
content of this article.
|
| 1335 |
+
Appendix A
|
| 1336 |
+
Asymptotic stability assessment
|
| 1337 |
+
based on Routh-Hurwitz
|
| 1338 |
+
A.1
|
| 1339 |
+
Background
|
| 1340 |
+
In control system theory, a commonly used method for assessing the stability
|
| 1341 |
+
of a linear system is the Routh-Hurtwiz (RH) criterion [24]. It is an algebraic
|
| 1342 |
+
criterion providing a necessary and sufficient condition on the parameters of a
|
| 1343 |
+
dynamic system of arbitrary order to ensure the dynamics are asymptotically
|
| 1344 |
+
stable. In particular, the criterion defines a set of conditions on the coefficients,
|
| 1345 |
+
pi, of the characteristic polynomial, P(s), written as
|
| 1346 |
+
P(s) = sn +
|
| 1347 |
+
n
|
| 1348 |
+
�
|
| 1349 |
+
i=1
|
| 1350 |
+
pisn−i ,
|
| 1351 |
+
(A1)
|
| 1352 |
+
in which n corresponds to the dimension of the system. Note that the notation
|
| 1353 |
+
used in this section, based on that from [24], is different from that of the main
|
| 1354 |
+
text, where pi is the polynomial coefficient of ith order.
|
| 1355 |
+
A first result of the RH criterion is that a necessary condition for the
|
| 1356 |
+
dynamical system to be asymptotically stable is that all the coefficients must
|
| 1357 |
+
be positive, that is,
|
| 1358 |
+
pi > 0, for all i .
|
| 1359 |
+
(A2)
|
| 1360 |
+
|
| 1361 |
+
Springer Nature 2021 LATEX template
|
| 1362 |
+
22
|
| 1363 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1364 |
+
Additional conditions on the polynomial coefficients are added for a necessary
|
| 1365 |
+
and sufficient condition. These conditions are based on Routh’s array, written
|
| 1366 |
+
as
|
| 1367 |
+
�
|
| 1368 |
+
�����
|
| 1369 |
+
1 p2 p4 ... 0
|
| 1370 |
+
p1 p3 ...
|
| 1371 |
+
b1 b2 ...
|
| 1372 |
+
c1
|
| 1373 |
+
...
|
| 1374 |
+
�
|
| 1375 |
+
�����
|
| 1376 |
+
,
|
| 1377 |
+
(A3)
|
| 1378 |
+
in which the first two rows contain all the coefficients of the characteristic
|
| 1379 |
+
polynomial, and the following ones are recursively computed as
|
| 1380 |
+
bi = −
|
| 1381 |
+
det
|
| 1382 |
+
�
|
| 1383 |
+
1
|
| 1384 |
+
p2i
|
| 1385 |
+
p1 p2i+1
|
| 1386 |
+
�
|
| 1387 |
+
p1
|
| 1388 |
+
,
|
| 1389 |
+
(A4)
|
| 1390 |
+
ci = −
|
| 1391 |
+
det
|
| 1392 |
+
�
|
| 1393 |
+
p1 p2i+1
|
| 1394 |
+
b1
|
| 1395 |
+
bi
|
| 1396 |
+
�
|
| 1397 |
+
b1
|
| 1398 |
+
,
|
| 1399 |
+
(A5)
|
| 1400 |
+
and so on until a zero is encountered. The RH criterion states that the system is
|
| 1401 |
+
asymptotically stable if and only if the elements in the first column of Routh’s
|
| 1402 |
+
array are positive.
|
| 1403 |
+
Based on that, it can be easily shown that for a second-order polynomial,
|
| 1404 |
+
the necessary condition (A2) is also sufficient for asymptotic stability (a.s.)
|
| 1405 |
+
since b1 = p1p2, which means that
|
| 1406 |
+
The system is a. s.
|
| 1407 |
+
⇐⇒ pi > 0, for i = 1, 2 .
|
| 1408 |
+
(A6)
|
| 1409 |
+
Instead, the necessary and sufficient condition for a polynomial of order three
|
| 1410 |
+
results in
|
| 1411 |
+
The system is a. s.
|
| 1412 |
+
⇐⇒ pi > 0, for i = 1, 2, 3 and p1p2 − p3 > 0 .
|
| 1413 |
+
(A7)
|
| 1414 |
+
The same reasoning can be applied to higher-order dynamics to derive
|
| 1415 |
+
additional conditions on the coefficients pi.
|
| 1416 |
+
A.2
|
| 1417 |
+
Verification of the necessary condition for
|
| 1418 |
+
asymptotic stability
|
| 1419 |
+
The Matlab code for verifying (23) is provided in https://github.com/
|
| 1420 |
+
cp4u17/Feedback.git.
|
| 1421 |
+
The strategy used is to evaluate each term in Eq. (23) and simply compare
|
| 1422 |
+
the left and right-hand sides of the equation. We followed a symbolic approach
|
| 1423 |
+
(based on the Matlab symbolic toolbox) for an arbitrary three-state model. A
|
| 1424 |
+
numerical approach was used instead for higher-order dynamics, specifically
|
| 1425 |
+
4, 5 and 6 state cell fate models. To do so, we randomly defined the cell
|
| 1426 |
+
dynamical matrix at the steady state, A(ρ∗), and its derivative with respect
|
| 1427 |
+
|
| 1428 |
+
Springer Nature 2021 LATEX template
|
| 1429 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1430 |
+
23
|
| 1431 |
+
to ρ. Entries were chosen from a uniform distribution and, for assuring a zero
|
| 1432 |
+
dominant eigenvalue for A(ρ∗), a local optimiser (fmincon function of Matlab)
|
| 1433 |
+
was used to find appropriate diagonal elements. For each dimension of the cell
|
| 1434 |
+
fate model, we tested up to 1000 random cases.
|
| 1435 |
+
A.3
|
| 1436 |
+
Sufficient condition for asymptotic stability
|
| 1437 |
+
In this section, we will indicate with the superscripts A and J the coefficients of
|
| 1438 |
+
the characteristic polynomial expressed as Eq. (A1) respectively of the matrix
|
| 1439 |
+
of the dynamical system, Eq. (6), and those of the Jacobian matrix, Eq. (15).
|
| 1440 |
+
For a two and three-state system, the following relations can be alge-
|
| 1441 |
+
braically derived
|
| 1442 |
+
pJ
|
| 1443 |
+
1 = pA
|
| 1444 |
+
1 −
|
| 1445 |
+
�
|
| 1446 |
+
i
|
| 1447 |
+
ηi .
|
| 1448 |
+
(A8)
|
| 1449 |
+
where ηi is according to Eq. (16). Again, considering that pA
|
| 1450 |
+
1 > 0, if all ηi ≤ 0
|
| 1451 |
+
then pJ
|
| 1452 |
+
1 > 0.
|
| 1453 |
+
Hence, the above relation implies that in a two-state system, the RH cri-
|
| 1454 |
+
terion given by Eq. (A6) is fulfilled when η ≤ 0, with at least one negative
|
| 1455 |
+
component (otherwise J = A) and therefore the system is asymptotically sta-
|
| 1456 |
+
ble. We recall that asking ηi ≤ 0 without further constraints is equivalent to
|
| 1457 |
+
the previously derived condition (30) with ϵi = ∞.
|
| 1458 |
+
For applying the RH criterion to a three-state cell dynamic system, given
|
| 1459 |
+
by Eq. (A7), we need to evaluate the sign of pJ
|
| 1460 |
+
2 and then that of pJ
|
| 1461 |
+
1 pJ
|
| 1462 |
+
2 − pJ
|
| 1463 |
+
3 .
|
| 1464 |
+
To do so, we first write
|
| 1465 |
+
pJ
|
| 1466 |
+
2 = pA
|
| 1467 |
+
2 −
|
| 1468 |
+
�
|
| 1469 |
+
i
|
| 1470 |
+
fiηi ,
|
| 1471 |
+
(A9)
|
| 1472 |
+
in which fi = �
|
| 1473 |
+
j aji − Tr(A) for i = 1, 2, 3. Since the off-diagonal elements
|
| 1474 |
+
are non-negative, and the trace of A is negative, then fi > 0 for i = 1, 2, 3.
|
| 1475 |
+
That means that if all ηi ≤ 0 then pJ
|
| 1476 |
+
2 > 0. Concerning the term pJ
|
| 1477 |
+
1 pJ
|
| 1478 |
+
2 − pJ
|
| 1479 |
+
3 ,
|
| 1480 |
+
this can be written as a quadratic form in η =
|
| 1481 |
+
�
|
| 1482 |
+
η1, η2, η3
|
| 1483 |
+
�
|
| 1484 |
+
as
|
| 1485 |
+
pJ
|
| 1486 |
+
1 pJ
|
| 1487 |
+
2 − pJ
|
| 1488 |
+
3 = Q(η) = ηT AQη + bT
|
| 1489 |
+
Qη + cQ ,
|
| 1490 |
+
(A10)
|
| 1491 |
+
in which
|
| 1492 |
+
AQ =
|
| 1493 |
+
�
|
| 1494 |
+
�
|
| 1495 |
+
f1 f1 f1
|
| 1496 |
+
f2 f2 f2
|
| 1497 |
+
f3 f3 f3
|
| 1498 |
+
�
|
| 1499 |
+
� ,
|
| 1500 |
+
(A11)
|
| 1501 |
+
bQ = −pA
|
| 1502 |
+
1
|
| 1503 |
+
�
|
| 1504 |
+
�
|
| 1505 |
+
f1
|
| 1506 |
+
f2
|
| 1507 |
+
f3
|
| 1508 |
+
�
|
| 1509 |
+
� − pA
|
| 1510 |
+
2
|
| 1511 |
+
vw
|
| 1512 |
+
�
|
| 1513 |
+
�
|
| 1514 |
+
v3(w3 − w1) + v2(w2 − w1)
|
| 1515 |
+
v3(w3 − w2) + v1(w1 − w2)
|
| 1516 |
+
v2(w2 − w3) + v1(w1 − w3)
|
| 1517 |
+
�
|
| 1518 |
+
� ,
|
| 1519 |
+
(A12)
|
| 1520 |
+
and cQ = pA
|
| 1521 |
+
1 pA
|
| 1522 |
+
2 . Here, v = (v1, v2, v3) is a left dominant eigenvector and
|
| 1523 |
+
w = (w1, w2, w3) a right dominant eigenvector.
|
| 1524 |
+
We now note that the matrix AQ is semidefinite positive since two eigen-
|
| 1525 |
+
values are zero (the rows are two-fold degenerate) and one is positive, equal
|
| 1526 |
+
to Tr(AQ) = �
|
| 1527 |
+
i fi, and cQ > 0. We now distinguish two cases, depending on
|
| 1528 |
+
|
| 1529 |
+
Springer Nature 2021 LATEX template
|
| 1530 |
+
24
|
| 1531 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1532 |
+
the sign of bQ elements. First, if bQ ≤ 0, then Q(η) > 0 for any η ≤ 0. Since
|
| 1533 |
+
fi, pA
|
| 1534 |
+
1 , pA
|
| 1535 |
+
2 , vw > 0, we get a sufficient condition for bQ ≤ 0, namely,
|
| 1536 |
+
0 ≤ v3(w3 − w1) + v2(w2 − w1)
|
| 1537 |
+
(A13)
|
| 1538 |
+
0 ≤ v3(w3 − w2) + v1(w1 − w2)
|
| 1539 |
+
0 ≤ v2(w2 − w3) + v1(w1 − w3)
|
| 1540 |
+
In that case, asymptotic stability and thus crowding feedback control is assured
|
| 1541 |
+
for any η < 0, and thus the bound for feedback strength is ϵi = ∞ for i =
|
| 1542 |
+
1, 2, 3.
|
| 1543 |
+
Otherwise, if there is at least one positive element in bQ, then Q(η) > 0
|
| 1544 |
+
only if |ηi| < ϵi, where ϵ = (ϵ1, ϵ2, ϵ3) are the absolute values of the solutions
|
| 1545 |
+
to the equation Q(η) = 0, that is – given that ηi are negative – the solution to,
|
| 1546 |
+
0 = ϵT AQϵ − bT
|
| 1547 |
+
Qϵ + cQ .
|
| 1548 |
+
(A14)
|
| 1549 |
+
Importantly, we note that the elements of bQ depend uniquely on the proper-
|
| 1550 |
+
ties of the dynamical system and therefore, they can be determined without
|
| 1551 |
+
requiring the knowledge of the parameter derivatives, i.e. the specific crowding
|
| 1552 |
+
feedback dependencies.
|
| 1553 |
+
The Matlab code for verifying (A8), (A9) and (A10) is provided in
|
| 1554 |
+
https://github.com/cp4u17/Feedback.git.
|
| 1555 |
+
Appendix B
|
| 1556 |
+
Test case
|
| 1557 |
+
B.1
|
| 1558 |
+
Asymptotic stability
|
| 1559 |
+
This section reports the details of the model used for numerical examples
|
| 1560 |
+
presented in the main text. The cell dynamics correspond to the following
|
| 1561 |
+
three-state cell fate model
|
| 1562 |
+
X1
|
| 1563 |
+
λ1
|
| 1564 |
+
−→ X1 + X1,
|
| 1565 |
+
X1
|
| 1566 |
+
ω13
|
| 1567 |
+
−−→ X3,
|
| 1568 |
+
X1
|
| 1569 |
+
γ1
|
| 1570 |
+
−→ ∅
|
| 1571 |
+
X2
|
| 1572 |
+
ω21
|
| 1573 |
+
−−→ X1,
|
| 1574 |
+
X2
|
| 1575 |
+
ω23
|
| 1576 |
+
−−→ X3,
|
| 1577 |
+
X2
|
| 1578 |
+
γ2
|
| 1579 |
+
−→ ∅
|
| 1580 |
+
X3
|
| 1581 |
+
λ3
|
| 1582 |
+
−→ X3 + X3,
|
| 1583 |
+
X3
|
| 1584 |
+
ω31
|
| 1585 |
+
−−→ X1,
|
| 1586 |
+
X3
|
| 1587 |
+
ω32
|
| 1588 |
+
−−→ X2,
|
| 1589 |
+
(B15)
|
| 1590 |
+
whose network is shown in Figure B1. In such a model, for simplicity, we only
|
| 1591 |
+
consider symmetric self-renewing divisions so that κij = ωij. Also, we apply
|
| 1592 |
+
the crowding feedback to division rates, λi, and differentiation rates γi. In this
|
| 1593 |
+
way, it is straightforward to apply the sufficient condition (30) for asymptotic
|
| 1594 |
+
stability since κ′
|
| 1595 |
+
ij = 0 for all i, j.
|
| 1596 |
+
Hence, each kinetic parameter of the type αi ∈ {λj, γj}j=1,...,3 is expressed
|
| 1597 |
+
as a function of ρ, whilst those of the type αi ∈ {κjk}j,k=1,...,3 are constant. In
|
| 1598 |
+
particular, we chose a Hill function [31] where αi(ρ) = ci + kiρni/(Kni
|
| 1599 |
+
i
|
| 1600 |
+
+ ρni)
|
| 1601 |
+
in case αi is a differentiation rate, so that α′
|
| 1602 |
+
i = ∂αi/∂ρ > 0, and αi(ρ) =
|
| 1603 |
+
|
| 1604 |
+
Springer Nature 2021 LATEX template
|
| 1605 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1606 |
+
25
|
| 1607 |
+
ci +ki/(Kni
|
| 1608 |
+
i +ρ/ni) in case it is a proliferation rate, so that α′
|
| 1609 |
+
i < 0. According
|
| 1610 |
+
to (30) this choice assures that, if there is a value ρ = ρ∗ for which µ(ρ∗) = 0,
|
| 1611 |
+
this corresponds to an asymptotically stable steady state.
|
| 1612 |
+
The parameter values used in our example are reported in Table B1, and
|
| 1613 |
+
the profiles of the proliferation and differentiation rates as a function of ρ are
|
| 1614 |
+
shown in Figure B2. Based on these values, the steady state corresponds to
|
| 1615 |
+
ρ∗ = 1 (arbitrary unit). As expected, the dominant eigenvalue of the Jacobian
|
| 1616 |
+
at the steady state is negative (µJ = −1.21).
|
| 1617 |
+
To test the dynamical behaviour of the tissue cell population, we numer-
|
| 1618 |
+
ically solved the system of ODEs (5) for different initial conditions based on
|
| 1619 |
+
the explicit Runge-Kutta Dormand-Prince method (Matlab ode45 function).
|
| 1620 |
+
The results are shown in Figure B3 as the time evolution of ρ, normalised
|
| 1621 |
+
by the steady-state ρ∗, (left panels), and of the dominant eigenvalue, µ (right
|
| 1622 |
+
panels). The label H indicates an initial condition corresponding to the self-
|
| 1623 |
+
renewing state ρ∗, that is, the system is initially in homeostasis. In the
|
| 1624 |
+
simulations labelled as P− and P+, we applied perturbation in the initial
|
| 1625 |
+
state ρ∗ = (ρ∗
|
| 1626 |
+
1, ρ∗
|
| 1627 |
+
2, ρ∗
|
| 1628 |
+
3), which are, respectively,
|
| 1629 |
+
�
|
| 1630 |
+
0.8ρ∗
|
| 1631 |
+
1, 0.75ρ∗
|
| 1632 |
+
2, 0.85ρ∗
|
| 1633 |
+
3
|
| 1634 |
+
�
|
| 1635 |
+
and
|
| 1636 |
+
�
|
| 1637 |
+
1.5ρ∗
|
| 1638 |
+
1 1.1ρ∗
|
| 1639 |
+
2 1.2ρ∗
|
| 1640 |
+
3
|
| 1641 |
+
�
|
| 1642 |
+
. As expected, in all these cases, the feedback’s effect is sta-
|
| 1643 |
+
bilising the system so that it returns to the steady state upon perturbation,
|
| 1644 |
+
ρ → ρ∗, (asymptotic stability) and thus regains self-renewal property, µ → 0,
|
| 1645 |
+
over time.
|
| 1646 |
+
Fig. B1
|
| 1647 |
+
Cell state network representing a cell type composed of three states. The links
|
| 1648 |
+
represent direct transitions, ωij; symmetric divisions occur with rates λi and differentiation
|
| 1649 |
+
with rate γi, where subscripts i, j = 1, 2, 3 indicate the corresponding cell state, as per model
|
| 1650 |
+
(B15).
|
| 1651 |
+
B.2
|
| 1652 |
+
Failure of feedback function
|
| 1653 |
+
Based on the cell fate model regulated via crowding feedback described in
|
| 1654 |
+
the previous section, we assess the impact of failure in one or more feedback
|
| 1655 |
+
functions. In particular, the failure of the crowding regulation is modelled,
|
| 1656 |
+
assuming one or more kinetic parameters as a constant. Five different failure
|
| 1657 |
+
test cases are assessed. For doing so, we chose αi = (1 + C)α∗
|
| 1658 |
+
i being constant
|
| 1659 |
+
instead of depending on ρ, in which α∗ is the value at the steady state when
|
| 1660 |
+
|
| 1661 |
+
M
|
| 1662 |
+
Y1
|
| 1663 |
+
XI
|
| 1664 |
+
23
|
| 1665 |
+
1
|
| 1666 |
+
013
|
| 1667 |
+
021
|
| 1668 |
+
1
|
| 1669 |
+
031
|
| 1670 |
+
-
|
| 1671 |
+
X
|
| 1672 |
+
X2
|
| 1673 |
+
023
|
| 1674 |
+
032Springer Nature 2021 LATEX template
|
| 1675 |
+
26
|
| 1676 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1677 |
+
k
|
| 1678 |
+
K
|
| 1679 |
+
n
|
| 1680 |
+
α∗
|
| 1681 |
+
α′
|
| 1682 |
+
λ1
|
| 1683 |
+
0.74
|
| 1684 |
+
0.57
|
| 1685 |
+
2.00
|
| 1686 |
+
0.61
|
| 1687 |
+
-0.84
|
| 1688 |
+
λ3
|
| 1689 |
+
7.79
|
| 1690 |
+
2.07
|
| 1691 |
+
2.00
|
| 1692 |
+
1.53
|
| 1693 |
+
-0.56
|
| 1694 |
+
γ1
|
| 1695 |
+
3.07
|
| 1696 |
+
1.22
|
| 1697 |
+
2.00
|
| 1698 |
+
1.28
|
| 1699 |
+
1.48
|
| 1700 |
+
γ2
|
| 1701 |
+
2.28
|
| 1702 |
+
0.43
|
| 1703 |
+
2.00
|
| 1704 |
+
1.97
|
| 1705 |
+
0.61
|
| 1706 |
+
κ13
|
| 1707 |
+
–
|
| 1708 |
+
0.95
|
| 1709 |
+
0.00
|
| 1710 |
+
κ21
|
| 1711 |
+
–
|
| 1712 |
+
1.44
|
| 1713 |
+
0.00
|
| 1714 |
+
κ23
|
| 1715 |
+
–
|
| 1716 |
+
1.71
|
| 1717 |
+
0.00
|
| 1718 |
+
κ31
|
| 1719 |
+
–
|
| 1720 |
+
2.03
|
| 1721 |
+
0.00
|
| 1722 |
+
κ32
|
| 1723 |
+
–
|
| 1724 |
+
1.35
|
| 1725 |
+
0.00
|
| 1726 |
+
Table B1
|
| 1727 |
+
Values of the Hill function parameters describing the kinetic parameters in
|
| 1728 |
+
case of homeostasis regulation via crowding feedback for the cell fate model (B15). The
|
| 1729 |
+
generic kinetic parameters (represented as αi in the right columns of the table) are a
|
| 1730 |
+
function of the total cell density, ρ, and are given by γi(ρ) = c + kρn/(Kn + ρn) and
|
| 1731 |
+
λi(ρ) = c + k/(Kn + ρn) with i = 1, 2, 3. A common value c = 0.05 is assumed. State
|
| 1732 |
+
transition rates ωij, are constant and equal to κij. For such a cell fate dynamics, the steady
|
| 1733 |
+
state is ρ∗ = 1. The unit of the kinetic parameter is arbitrary and therefore omitted. Unless
|
| 1734 |
+
specified otherwise, these values apply to all the numerical examples presented in this work.
|
| 1735 |
+
0
|
| 1736 |
+
0.5
|
| 1737 |
+
1
|
| 1738 |
+
1.5
|
| 1739 |
+
2
|
| 1740 |
+
0
|
| 1741 |
+
0.5
|
| 1742 |
+
1
|
| 1743 |
+
1.5
|
| 1744 |
+
2
|
| 1745 |
+
2.5
|
| 1746 |
+
0
|
| 1747 |
+
0.5
|
| 1748 |
+
1
|
| 1749 |
+
1.5
|
| 1750 |
+
2
|
| 1751 |
+
-4
|
| 1752 |
+
-2
|
| 1753 |
+
0
|
| 1754 |
+
2
|
| 1755 |
+
4
|
| 1756 |
+
Fig. B2
|
| 1757 |
+
Proliferation and differentiation rates (left panels, with α as a generic placeholder
|
| 1758 |
+
for parameters), and their derivative with respect to ρ (right panels) as functions of cell
|
| 1759 |
+
density normalised by the steady-state ρ∗ for the cell fate model (B15) schematised in
|
| 1760 |
+
Figure B1. The profiles in the left panel correspond to Hill functions defined in Table B1.
|
| 1761 |
+
there are no failures (reported in Table B1) and C is a constant (reported in
|
| 1762 |
+
Table B2). Five test cases, indicated as F1−5, are assessed.
|
| 1763 |
+
In test case F1, only one feedback fails. Three of the four kinetic parameters
|
| 1764 |
+
fail in cases F2−4. Finally, F5 represents a case where all the feedback functions
|
| 1765 |
+
fail. The corresponding variability of the dominant eigenvalue, µ, as a function
|
| 1766 |
+
of the cell density is shown in Figure B4. It is clear that whilst F1−4 cases
|
| 1767 |
+
satisfy the sufficient condition for strict homeostasis, (30), in test cases F5,
|
| 1768 |
+
the dominant eigenvalue being constant means that there is no homeostatic
|
| 1769 |
+
regulation. Importantly, there is no steady state in test cases F2,4 since the
|
| 1770 |
+
dominant eigenvalue is always positive in one case or negative in the other.
|
| 1771 |
+
Based on these assumptions, we numerically solved the system of ODEs
|
| 1772 |
+
(5) using the explicit Runge-Kutta Dormand-Prince method (Matlab ode45
|
| 1773 |
+
function). The failure test cases start at time 0 from an initially homeostatic
|
| 1774 |
+
condition, H. The results are shown in Figure B5 as the time evolution of
|
| 1775 |
+
ρ, normalised by the homeostatic steady-state, ρ∗, (left panels), and of the
|
| 1776 |
+
|
| 1777 |
+
Springer Nature 2021 LATEX template
|
| 1778 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1779 |
+
27
|
| 1780 |
+
0
|
| 1781 |
+
5
|
| 1782 |
+
10
|
| 1783 |
+
15
|
| 1784 |
+
0.8
|
| 1785 |
+
1
|
| 1786 |
+
1.2
|
| 1787 |
+
1.4
|
| 1788 |
+
H
|
| 1789 |
+
P-
|
| 1790 |
+
P+
|
| 1791 |
+
0
|
| 1792 |
+
5
|
| 1793 |
+
10
|
| 1794 |
+
15
|
| 1795 |
+
-0.6
|
| 1796 |
+
-0.4
|
| 1797 |
+
-0.2
|
| 1798 |
+
0
|
| 1799 |
+
0.2
|
| 1800 |
+
0.4
|
| 1801 |
+
H
|
| 1802 |
+
P-
|
| 1803 |
+
P+
|
| 1804 |
+
Fig. B3
|
| 1805 |
+
Effect of perturbation of homeostasis under crowding control, when feedback
|
| 1806 |
+
parameters are according to Table B1. (Left) Cell density ρ, scaled by the steady-state ρ∗,
|
| 1807 |
+
as a function of time. (Right) Corresponding variation of the dominant eigenvalue µ. Time
|
| 1808 |
+
is scaled by the inverse of ¯α = mini α∗
|
| 1809 |
+
i . Three different initial condition are tested: H,
|
| 1810 |
+
corresponds to the steady state ρ∗ = (ρ∗
|
| 1811 |
+
1, ρ∗
|
| 1812 |
+
2, ρ∗
|
| 1813 |
+
3), P− to
|
| 1814 |
+
�0.8ρ∗
|
| 1815 |
+
1, 0.75ρ∗
|
| 1816 |
+
2, 0.85ρ∗
|
| 1817 |
+
3
|
| 1818 |
+
�
|
| 1819 |
+
and P+
|
| 1820 |
+
to
|
| 1821 |
+
�1.5ρ∗
|
| 1822 |
+
1, 1.1ρ∗
|
| 1823 |
+
1, 1.2ρ∗
|
| 1824 |
+
1
|
| 1825 |
+
�
|
| 1826 |
+
. Since the steady state is asymptotically stable, thanks to crowding
|
| 1827 |
+
control, the cell population remain in, or return to, a homeostatic state characterised by
|
| 1828 |
+
µ = 0.
|
| 1829 |
+
Parameter
|
| 1830 |
+
F1
|
| 1831 |
+
F2
|
| 1832 |
+
F3
|
| 1833 |
+
F4
|
| 1834 |
+
F5
|
| 1835 |
+
λ1
|
| 1836 |
+
+5%
|
| 1837 |
+
+5%
|
| 1838 |
+
+5%
|
| 1839 |
+
-20%
|
| 1840 |
+
-5%
|
| 1841 |
+
λ3
|
| 1842 |
+
-
|
| 1843 |
+
+5%
|
| 1844 |
+
+5%
|
| 1845 |
+
-20%
|
| 1846 |
+
-5%
|
| 1847 |
+
γ1
|
| 1848 |
+
-
|
| 1849 |
+
-5%
|
| 1850 |
+
-
|
| 1851 |
+
+20%
|
| 1852 |
+
-5%
|
| 1853 |
+
γ2
|
| 1854 |
+
-
|
| 1855 |
+
-
|
| 1856 |
+
-5%
|
| 1857 |
+
-
|
| 1858 |
+
-5%
|
| 1859 |
+
Table B2
|
| 1860 |
+
Value of the constant C in the feedback failure test cases. Whenever a failure
|
| 1861 |
+
in the feedback of one kinetic parameter α occurs, that parameter is modelled as a
|
| 1862 |
+
constant, α = (1 + C)α∗, in which the steady-state value, α∗, is reported in Table B1. Test
|
| 1863 |
+
cases F1 and F2 correspond to those presented in the main text (Figure 1).
|
| 1864 |
+
dominant eigenvalue, µ, (right panels). Note that the cases F1,2 correspond
|
| 1865 |
+
respectively to the Single failure and Multiple failures reported in the
|
| 1866 |
+
main text (Figure 1).
|
| 1867 |
+
In two cases, F1,3, despite a single or multiple feedback functions failing, a
|
| 1868 |
+
new homeostatic condition is reached after some time, where µ = 0. However,
|
| 1869 |
+
suppose a different set of feedback fails, like in F2,4, such that the dominant
|
| 1870 |
+
eigenvalue is respectively positive or negative for any ρ. In that case, no steady
|
| 1871 |
+
state can be attained, and the tissue cell population will hyper-proliferate or
|
| 1872 |
+
decline in the long term. Hence, even if the condition for asymptotic stability
|
| 1873 |
+
is met, there is no steady state. Finally, if homeostasis is not regulated at
|
| 1874 |
+
all, as in F5, then the population dynamics only depend on the value of the
|
| 1875 |
+
dominant eigenvalue (the cell dynamical model (5) turns linear). In the case
|
| 1876 |
+
shown, µ > 0 and therefore, the cell population diverges.
|
| 1877 |
+
B.3
|
| 1878 |
+
Single cell mutation scenario
|
| 1879 |
+
To assess the tissue dynamics with a single-cell mutation, as presented in the
|
| 1880 |
+
main text, we modelled the clonal dynamics, namely, the dynamics of single
|
| 1881 |
+
cells and their progeny. For doing so, we considered the model (B15) as a
|
| 1882 |
+
|
| 1883 |
+
Springer Nature 2021 LATEX template
|
| 1884 |
+
28
|
| 1885 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1886 |
+
0
|
| 1887 |
+
0.5
|
| 1888 |
+
1
|
| 1889 |
+
1.5
|
| 1890 |
+
2
|
| 1891 |
+
-2
|
| 1892 |
+
0
|
| 1893 |
+
2
|
| 1894 |
+
4
|
| 1895 |
+
H
|
| 1896 |
+
F1
|
| 1897 |
+
F2
|
| 1898 |
+
F3
|
| 1899 |
+
F4
|
| 1900 |
+
F5
|
| 1901 |
+
Fig. B4
|
| 1902 |
+
Variation of the dominant eigenvalue µ as a function of the cell density, ρ,
|
| 1903 |
+
normalised by the reference homeostatic state value, ρ∗. The curve H corresponds to the
|
| 1904 |
+
reference homeostatic model presented in Appendix B.1. The other curves, F1−5, represent
|
| 1905 |
+
different sets of feedback failure, as reported in Table B2.
|
| 1906 |
+
-10
|
| 1907 |
+
0
|
| 1908 |
+
10
|
| 1909 |
+
20
|
| 1910 |
+
30
|
| 1911 |
+
40
|
| 1912 |
+
0
|
| 1913 |
+
0.5
|
| 1914 |
+
1
|
| 1915 |
+
1.5
|
| 1916 |
+
2
|
| 1917 |
+
2.5
|
| 1918 |
+
H
|
| 1919 |
+
F1
|
| 1920 |
+
F2
|
| 1921 |
+
F3
|
| 1922 |
+
F4
|
| 1923 |
+
F5
|
| 1924 |
+
-10
|
| 1925 |
+
0
|
| 1926 |
+
10
|
| 1927 |
+
20
|
| 1928 |
+
30
|
| 1929 |
+
40
|
| 1930 |
+
-0.6
|
| 1931 |
+
-0.4
|
| 1932 |
+
-0.2
|
| 1933 |
+
0
|
| 1934 |
+
0.2
|
| 1935 |
+
H
|
| 1936 |
+
F1
|
| 1937 |
+
F2
|
| 1938 |
+
F3
|
| 1939 |
+
F4
|
| 1940 |
+
F5
|
| 1941 |
+
Fig. B5
|
| 1942 |
+
Failure of feedback control. (Left) Cell density, scaled by the steady state in the
|
| 1943 |
+
homeostatic case, as a function of time. (Right) Corresponding variation of the dominant
|
| 1944 |
+
eigenvalue µ. Time is scaled by the inverse of ¯α = mini α∗
|
| 1945 |
+
i . The homeostatic model, H, is
|
| 1946 |
+
perturbed at a time equal to zero to include the feedback failure reported in Table B2. Whilst
|
| 1947 |
+
in F1,3, the regulation is able to achieve and maintain a new homeostatic state (µ = 0),
|
| 1948 |
+
the remaining case fails to regulate the cell population, leading to an indefinite growth or
|
| 1949 |
+
shrinking of the tissue.
|
| 1950 |
+
Markov process with the same numerical rates as before, but now events are
|
| 1951 |
+
treated as stochastic. Then, we run numerical simulations using the Gillespie
|
| 1952 |
+
algorithm [32] to evaluate this model. In particular, the results presented in
|
| 1953 |
+
this work are based on 100 independent instances, where each instance is a
|
| 1954 |
+
possible realisation of the stochastic process. We chose a total cell number
|
| 1955 |
+
N0 = 5000 as the initial condition (cell density is based on unitary volume).
|
| 1956 |
+
In real tissues, the number of cells could be a few orders of magnitude larger.
|
| 1957 |
+
However, this number is sufficiently large to avoid the extinction of the process
|
| 1958 |
+
in the time scale analysed, so once rescaled, these dynamics are representative
|
| 1959 |
+
of those in the tissue. All the simulations are stopped when the mutated clone
|
| 1960 |
+
goes extinct or divergence of the dynamics is detected, defined as reaching
|
| 1961 |
+
N = 5N0.
|
| 1962 |
+
|
| 1963 |
+
Springer Nature 2021 LATEX template
|
| 1964 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 1965 |
+
29
|
| 1966 |
+
From an implementation point of view, we consider a cell fate model
|
| 1967 |
+
represented by two disconnected cell state networks to model the tissue dynam-
|
| 1968 |
+
ics, including the mutated cell. One network corresponds to the unperturbed
|
| 1969 |
+
test case H, and the other to the dysregulated one, F2 (both described in
|
| 1970 |
+
Appendix B.2). The simulation starts with N0 cells in the H network, dis-
|
| 1971 |
+
tributed in each state proportionally to the expected steady-state distribution
|
| 1972 |
+
in the tissue, and no cells in the F2 network. Thus, since the two networks
|
| 1973 |
+
are disconnected, F2 remains empty, and the simulation represents the tissue
|
| 1974 |
+
dynamics before the dysregulation. At a time equal to zero, we moved one
|
| 1975 |
+
cell from a random state in the H network to the corresponding state in the
|
| 1976 |
+
F2 one. This simulation represents the tissue dynamics, including the single
|
| 1977 |
+
mutated cell.
|
| 1978 |
+
In Figure B6 (left), all the trajectories where the mutated clones go extinct
|
| 1979 |
+
are shown. In these cases, the tissue dynamics remain globally unaffected by
|
| 1980 |
+
the mutation. Due to the stochastic nature of the process, mutant clones can
|
| 1981 |
+
go extinct even if the growth parameter is positive. That is, even in cases where
|
| 1982 |
+
divergence would be observed for the tissue-wide disruption. However, this does
|
| 1983 |
+
not occur in all the instances. The right panel of the same figure shows those
|
| 1984 |
+
instances where the mutated clone does not go extinct and eventually prevails,
|
| 1985 |
+
resulting in diverging cell population dynamics. For the chosen parameters,
|
| 1986 |
+
this divergence of the mutated clone is detected in 6% of all cases. Surprisingly,
|
| 1987 |
+
only a few clones survive despite a proliferative advantage, but this is plausible
|
| 1988 |
+
for a small fitness advantage (For example, in the case of a single state with
|
| 1989 |
+
cell division rate λ and loss rate γ – a simple branching process [33] – the
|
| 1990 |
+
probability for the a mutant with µ > 0, that is, λ > γ, to establish is 1−γ/λ,
|
| 1991 |
+
which can be very low for λ ≈ γ).
|
| 1992 |
+
In the main text (Figure 2), only one profile for each scenario is shown,
|
| 1993 |
+
respectively. They correspond to instance #24 for the homeostatic case and
|
| 1994 |
+
instance #43 for the diverging case.
|
| 1995 |
+
B.4
|
| 1996 |
+
Quasi-dedifferentiation
|
| 1997 |
+
The numerical example presented in the main text is based on the same cell
|
| 1998 |
+
fate model described in Appendix B.1. To model the dynamics of a committed
|
| 1999 |
+
cell type, we choose a constant non-negative u =
|
| 2000 |
+
�
|
| 2001 |
+
0.02 0.07 0.06
|
| 2002 |
+
�T to model
|
| 2003 |
+
for the cell influx. For such a model, the steady state, ρ∗
|
| 2004 |
+
c, is asymptotically
|
| 2005 |
+
stable.
|
| 2006 |
+
The figures presented in the main text are based on the numerical integra-
|
| 2007 |
+
tion of the system of ordinary differential equation (31). In particular, we used
|
| 2008 |
+
the explicit Runge-Kutta Dormand-Prince method (Matlab ode45 function).
|
| 2009 |
+
References
|
| 2010 |
+
[1] National Institute of Health: Stem Cell Basics (2016). https://stemcells.
|
| 2011 |
+
nih.gov/info/basics
|
| 2012 |
+
|
| 2013 |
+
Springer Nature 2021 LATEX template
|
| 2014 |
+
30
|
| 2015 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 2016 |
+
-5
|
| 2017 |
+
0
|
| 2018 |
+
5
|
| 2019 |
+
10
|
| 2020 |
+
15
|
| 2021 |
+
20
|
| 2022 |
+
0.8
|
| 2023 |
+
0.9
|
| 2024 |
+
1
|
| 2025 |
+
1.1
|
| 2026 |
+
1.2
|
| 2027 |
+
H
|
| 2028 |
+
F2
|
| 2029 |
+
0
|
| 2030 |
+
20
|
| 2031 |
+
40
|
| 2032 |
+
60
|
| 2033 |
+
80
|
| 2034 |
+
0.8
|
| 2035 |
+
0.9
|
| 2036 |
+
1
|
| 2037 |
+
1.1
|
| 2038 |
+
1.2
|
| 2039 |
+
H
|
| 2040 |
+
F2
|
| 2041 |
+
Fig. B6
|
| 2042 |
+
Results of numerical simulations of the stochastic process representing the cell
|
| 2043 |
+
dynamics, according to section B.3. The cell density, scaled by the steady state in the
|
| 2044 |
+
homeostatic case, as a function of the time is shown for 100 random instances. Each shown
|
| 2045 |
+
trajectory is the result of a different instance of the stochastic process. At a time equal to
|
| 2046 |
+
zero, the cell mutation is modelled as a switch of a single random cell from the homeostatic
|
| 2047 |
+
H cell dynamics to the F2 model assessed in Appendix B.2. On the left panel, only the
|
| 2048 |
+
trajectories for which the mutated clone goes extinct are shown. The right panel shows the
|
| 2049 |
+
trajectories in which the mutated clone prevails. Dynamics are scaled by ¯α = mini{α∗
|
| 2050 |
+
i }.
|
| 2051 |
+
[2] Marinari, E., Mehonic, A., Curran, S., Gale, J., Duke, T., Baum, B.:
|
| 2052 |
+
Live-cell delamination counterbalances epithelial growth to limit tis-
|
| 2053 |
+
sue overcrowding. Nature 484(7395), 542–545 (2012). https://doi.org/10.
|
| 2054 |
+
1038/nature10984
|
| 2055 |
+
[3] Eisenhoffer, G.T., Loftus, P.D., Yoshigi, M., Otsuna, H., Chien, C.-B.,
|
| 2056 |
+
Morcos, P.A., Rosenblatt, J.: Crowding induces live cell extrusion to main-
|
| 2057 |
+
tain homeostatic cell numbers in epithelia. Nature 484(7395), 546–549
|
| 2058 |
+
(2012). https://doi.org/10.1038/nature10999
|
| 2059 |
+
[4] Eisenhoffer, G.T., Rosenblatt, J.: Bringing balance by force: Live cell
|
| 2060 |
+
extrusion controls epithelial cell numbers. Trends in Cell Biology 23(4),
|
| 2061 |
+
185–192 (2013). https://doi.org/10.1016/j.tcb.2012.11.006
|
| 2062 |
+
[5] Puliafito, A., Hufnagel, L., Neveu, P., Streichan, S., Sigal, A., Fygenson,
|
| 2063 |
+
D.K., Shraiman, B.I.: Collective and single cell behavior in epithelial con-
|
| 2064 |
+
tact inhibition. Proceedings of the National Academy of Sciences 109(3),
|
| 2065 |
+
739–744 (2012). https://doi.org/10.1016/j.juro.2012.06.073
|
| 2066 |
+
[6] Gudipaty, S.A., Lindblom, J., Loftus, P.D., Redd, M.J., Edes, K., Davey,
|
| 2067 |
+
C.F., Krishnegowda, V., Rosenblatt, J.: Mechanical stretch triggers rapid
|
| 2068 |
+
epithelial cell division through Piezo1. Nature 543(7643), 118–121 (2017).
|
| 2069 |
+
https://doi.org/10.1038/nature21407
|
| 2070 |
+
[7] Shraiman, B.I.: Mechanical feedback as a possible regulator of tis-
|
| 2071 |
+
sue growth. Proceedings of the National Academy of Sciences 102(9),
|
| 2072 |
+
3318–3323 (2005). https://doi.org/10.1073/pnas.0404782102
|
| 2073 |
+
[8] Kitadate, Y., J¨org, D.J., Tokue, M., Maruyama, A., Ichikawa, R.,
|
| 2074 |
+
|
| 2075 |
+
Springer Nature 2021 LATEX template
|
| 2076 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 2077 |
+
31
|
| 2078 |
+
Tsuchiya, S., Segi-Nishida, E., Nakagawa, T., Uchida, A., Kimura-
|
| 2079 |
+
Yoshida, C., Mizuno, S., Sugiyama, F., Azami, T., Ema, M., Noda, C.,
|
| 2080 |
+
Kobayashi, S., Matsuo, I., Kanai, Y., Nagasawa, T., Sugimoto, Y., Taka-
|
| 2081 |
+
hashi, S., Simons, B.D., Yoshida, S.: Competition for Mitogens Regulates
|
| 2082 |
+
Spermatogenic Stem Cell Homeostasis in an Open Niche. Cell Stem Cell
|
| 2083 |
+
24(1), 79–92 (2019). https://doi.org/10.1016/j.stem.2018.11.013
|
| 2084 |
+
[9] Johnston, M.D., Edwards, C.M., Bodmer, W.F., Maini, P.K., Chapman,
|
| 2085 |
+
S.J.: Mathematical modeling of cell population dynamics in the colonic
|
| 2086 |
+
crypt and in colorectal cancer. Proceedings of the National Academy
|
| 2087 |
+
of Sciences 104(10), 4008–4013 (2007). https://doi.org/10.1073/pnas.
|
| 2088 |
+
0611179104
|
| 2089 |
+
[10] Sun, Z., Komarova, N.L.: Stochastic modeling of stem-cell dynamics with
|
| 2090 |
+
control Zheng. Math Bioscience 240(2), 231–240 (2012). https://doi.org/
|
| 2091 |
+
10.1016/j.mbs.2012.08.004
|
| 2092 |
+
[11] Bocharov, G., Quiel, J., Luzyanina, T., Alon, H., Chiglintsev, E., Cheresh-
|
| 2093 |
+
nev, V., Meier-Schellersheim, M., Paul, W.E., Grossman, Z.: Feedback
|
| 2094 |
+
regulation of proliferation vs. differentiation rates explains the depen-
|
| 2095 |
+
dence of CD4 T-cell expansion on precursor number. Proceedings of the
|
| 2096 |
+
National Academy of Sciences of the United States of America 108(8),
|
| 2097 |
+
3318–3323 (2011). https://doi.org/10.1073/pnas.1019706108
|
| 2098 |
+
[12] Greulich, P., Simons, B.D.: Dynamic heterogeneity as a strategy of
|
| 2099 |
+
stem cell self-renewal. Proceedings of the National Academy of Sciences
|
| 2100 |
+
113(27), 7509–7514 (2016). https://doi.org/10.1073/pnas.1602779113
|
| 2101 |
+
[13] Greulich, P., MacArthur, B.D., Parigini, C., S´anchez-Garc´ıa, R.J.: Uni-
|
| 2102 |
+
versal principles of lineage architecture and stem cell identity in renewing
|
| 2103 |
+
tissues. Development 148, 194399 (2021)
|
| 2104 |
+
[14] Donati, G., Rognoni, E., Hiratsuka, T., Liakath-Ali, K., Hoste, E., Kar,
|
| 2105 |
+
G., Kayikci, M., Russell, R., Kretzschmar, K., Mulder, K.W., Teich-
|
| 2106 |
+
mann, S.A., Watt, F.M.: Wounding induces dedifferentiation of epidermal
|
| 2107 |
+
Gata6+ cells and acquisition of stem cell properties. Nature Cell Biology
|
| 2108 |
+
19, 603–613 (2017). https://doi.org/10.1038/ncb3532
|
| 2109 |
+
[15] Jopling, C., Boue, S., Belmonte, J.C.I.: Dedifferentiation, transdifferenti-
|
| 2110 |
+
ation and reprogramming: three routes to regeneration. Nature Reviews
|
| 2111 |
+
Molecular Cell Biology 12, 79 (2011)
|
| 2112 |
+
[16] Tata, P.R., Mou, H., Pardo-Saganta, A., Zhao, R., Prabhu, M., Law, B.M.,
|
| 2113 |
+
Vinarsky, V., Cho, J.L., Breton, S., Sahay, A., Medoff, B.D., Rajagopal,
|
| 2114 |
+
J.: Dedifferentiation of committed epithelial cells into stem cells in vivo.
|
| 2115 |
+
Nature 503(7475), 218–223 (2013). https://doi.org/10.1038/nature12777
|
| 2116 |
+
|
| 2117 |
+
Springer Nature 2021 LATEX template
|
| 2118 |
+
32
|
| 2119 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 2120 |
+
[17] Tetteh, P.W., Farin, H.F., Clevers, H.: Plasticity within stem cell hier-
|
| 2121 |
+
archies in mammalian epithelia. Trends in Cell Biology 25(2), 100–108
|
| 2122 |
+
(2015). https://doi.org/10.1016/j.tcb.2014.09.003
|
| 2123 |
+
[18] Tetteh, P.W., Basak, O., Farin, H.F., Wiebrands, K., Kretzschmar, K.,
|
| 2124 |
+
Begthel, H., van den Born, M., Korving, J., De Sauvage, F.J., van Es, J.H.,
|
| 2125 |
+
Van Oudenaarden, A., Clevers, H.: Replacement of Lost Lgr5-Positive
|
| 2126 |
+
Stem Cells through Plasticity of Their Enterocyte-Lineage Daughters.
|
| 2127 |
+
Cell Stem Cell 18(2), 203–213 (2016). https://doi.org/10.1016/j.stem.
|
| 2128 |
+
2016.01.001
|
| 2129 |
+
[19] Murata, K., Jadhav, U., Madha, S., van Es, J., Dean, J., Cavazza, A.,
|
| 2130 |
+
Wucherpfennig, K., Michor, F., Clevers, H., Shivdasani, R.A.: Ascl2-
|
| 2131 |
+
Dependent Cell Dedifferentiation Drives Regeneration of Ablated Intesti-
|
| 2132 |
+
nal Stem Cells. Cell Stem Cell 26(3), 377–3906 (2020). https://doi.org/
|
| 2133 |
+
10.1016/j.stem.2019.12.011
|
| 2134 |
+
[20] Parigini, C., Greulich, P.: Universality of clonal dynamics poses funda-
|
| 2135 |
+
mental limits to identify stem cell self-renewal strategies. eLife 9, 1–44
|
| 2136 |
+
(2020). https://doi.org/10.7554/eLife.56532
|
| 2137 |
+
[21] Bollob´as, B.: Modern Graph Theory, 1st edn. Graduate Texts in Mathe-
|
| 2138 |
+
matics 184. Springer, New York (1998)
|
| 2139 |
+
[22] MacCluer, C.R.: The Many Proofs and Applications of Perron’s Theorem.
|
| 2140 |
+
SIAM Review 42(3), 487–498 (2000)
|
| 2141 |
+
[23] Horn,
|
| 2142 |
+
R.A.,
|
| 2143 |
+
Johnson,
|
| 2144 |
+
C.R.:
|
| 2145 |
+
Matrix
|
| 2146 |
+
Analysis,
|
| 2147 |
+
2nd
|
| 2148 |
+
edn.
|
| 2149 |
+
Cam-
|
| 2150 |
+
bridge University Press, Cambridge (1985). https://doi.org/10.1017/
|
| 2151 |
+
cbo9780511810817
|
| 2152 |
+
[24] Franklin, G.F., Powell, J.D., Emami-Naeini, A.: Feedback Control of
|
| 2153 |
+
Dynamic Systems, 7th edn. Prentice Hall Press, USA (2014)
|
| 2154 |
+
[25] Tomasetti, C., Vogelstein, B., Parmigiani, G.: Half or more of the somatic
|
| 2155 |
+
mutations in cancers of self-renewing tissues originate prior to tumor
|
| 2156 |
+
initiation. Proceedings of the National Academy of Sciences 110(6),
|
| 2157 |
+
1999–2004 (2013). https://doi.org/10.1073/pnas.1221068110
|
| 2158 |
+
[26] Colom, B., Jones, P.H.: Clonal analysis of stem cells in differentiation
|
| 2159 |
+
and disease. Current Opinion in Cell Biology 43, 14–21 (2016). https:
|
| 2160 |
+
//doi.org/10.1016/j.ceb.2016.07.002
|
| 2161 |
+
[27] Rodilla, V., Fre, S.: Cellular plasticity of mammary epithelial cells under-
|
| 2162 |
+
lies heterogeneity of breast cancer. Biomedicines 6(4), 9–12 (2018). https:
|
| 2163 |
+
//doi.org/10.3390/biomedicines6040103
|
| 2164 |
+
|
| 2165 |
+
Springer Nature 2021 LATEX template
|
| 2166 |
+
Homeostatic regulation of renewing tissue cell populations via crowding control
|
| 2167 |
+
33
|
| 2168 |
+
[28] Tata, P.R., Rajagopal, J.: Cellular plasticity: 1712 to the present day.
|
| 2169 |
+
Current Opinion in Cell Biology 43, 46–54 (2016). https://doi.org/10.
|
| 2170 |
+
1016/j.ceb.2016.07.005
|
| 2171 |
+
[29] Merrell,
|
| 2172 |
+
A.J.,
|
| 2173 |
+
Stanger,
|
| 2174 |
+
B.Z.:
|
| 2175 |
+
Adult
|
| 2176 |
+
cell
|
| 2177 |
+
plasticity
|
| 2178 |
+
in
|
| 2179 |
+
vivo:
|
| 2180 |
+
De-
|
| 2181 |
+
differentiation and transdifferentiation are back in style. Nature Reviews
|
| 2182 |
+
Molecular Cell Biology 17(7), 413–425 (2016). https://doi.org/10.1038/
|
| 2183 |
+
nrm.2016.24
|
| 2184 |
+
[30] Puri, S., Folias, A.E., Hebrok, M.: Plasticity and dedifferentiation within
|
| 2185 |
+
the pancreas: Development, homeostasis, and disease. Cell Stem Cell
|
| 2186 |
+
16(1), 18–31 (2015). https://doi.org/10.1016/j.stem.2014.11.001
|
| 2187 |
+
[31] Lei, J., Levin, S.A., Nie, Q.: Mathematical model of adult stem cell
|
| 2188 |
+
regeneration with cross-talk between genetic and epigenetic regulation.
|
| 2189 |
+
Proceedings of the National Academy of Sciences 111(10) (2014). https:
|
| 2190 |
+
//doi.org/10.1073/pnas.1324267111
|
| 2191 |
+
[32] Gillespie, D.T.: Exact stochastic simulation of coupled chemical reactions.
|
| 2192 |
+
The Journal of Physical Chemistry 81(25), 2340–2361 (1977). https://
|
| 2193 |
+
doi.org/10.1021/j100540a008
|
| 2194 |
+
[33] Haccou, P., Jagers, P., Vatutin, V.A.: Branching Processes: Varia-
|
| 2195 |
+
tion, Growth, and Extinction of Populations. Cambridge University
|
| 2196 |
+
Press, Cambridge (2005). https://doi.org/10.2277/0521832209. http://
|
| 2197 |
+
pure.iiasa.ac.at/7598/
|
| 2198 |
+
|
BdE4T4oBgHgl3EQf5Q5A/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
BdE4T4oBgHgl3EQf5Q5A/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d32a4ea40e522757e60d681544db9a465613159dea5e610cf94df6b37ad2c1d1
|
| 3 |
+
size 194487
|
BtE5T4oBgHgl3EQfTQ-D/content/tmp_files/2301.05535v1.pdf.txt
ADDED
|
@@ -0,0 +1,1008 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
|
| 2 |
+
|
| 3 |
+
|
| 4 |
+
Using the profile of publishers to predict
|
| 5 |
+
barriers across news articles
|
| 6 |
+
|
| 7 |
+
Abdul Sittar1,2[0000−0003−0280−9594] and Dunja Mladeni´c1,2[0000−0002−0360−6505]
|
| 8 |
+
1 Joˇzef Stefan Institute, Slovenia,
|
| 9 |
+
2 Joˇzef Stefan International Postgraduate School, Slovenia,
|
| 10 |
+
Jamova cesta 39
|
| 11 |
+
{abdul.sittar, dunja.mladenic}@ijs.si
|
| 12 |
+
|
| 13 |
+
Abstract. Detection of news propagation barriers, being economical,
|
| 14 |
+
cultural, political, time zonal, or geographical, is still an open research
|
| 15 |
+
issue. We present an approach to barrier detection in news spreading
|
| 16 |
+
by utilizing Wikipedia-concepts and metadata associated with each bar-
|
| 17 |
+
rier. Solving this problem can not only convey the information about the
|
| 18 |
+
coverage of an event but it can also show whether an event has been
|
| 19 |
+
able to cross a specific barrier or not. Experimental results on IPoNews
|
| 20 |
+
dataset (dataset for information spreading over the news) reveals that
|
| 21 |
+
simple classification models are able to detect barriers with high accu-
|
| 22 |
+
racy. We believe that our approach can serve to provide useful insights
|
| 23 |
+
which pave the way for the future development of a system for predicting
|
| 24 |
+
information spreading barriers over the news.
|
| 25 |
+
|
| 26 |
+
Keywords: news propagation · news spreading barriers · cultural bar-
|
| 27 |
+
rier · economical barriers · geographical barrier · political barrier · time
|
| 28 |
+
zone barrier · classification methods
|
| 29 |
+
|
| 30 |
+
1 Introduction
|
| 31 |
+
The phenomenon of event-centric news spreading due to globalization has been
|
| 32 |
+
exposed internationally [8]. International events capture attention from all cor-
|
| 33 |
+
ners of the world. News agencies play their part to bring our attentions on some
|
| 34 |
+
events and not on others. Varying nature of living styles, cultures, economic con-
|
| 35 |
+
ditions, time zone, and geographical juxtaposition of countries present a signifi-
|
| 36 |
+
cant role in process of publishing news related to different events [3, 6, 13, 19–21].
|
| 37 |
+
For example, publishing about sports events could be dependent on culture, epi-
|
| 38 |
+
demic events can reach firstly to neighboring countries due to geographic prox-
|
| 39 |
+
imity and, news on a luxury product may be relevant for economically strong
|
| 40 |
+
countries due to demand of wealthy people. We represent this differentiation
|
| 41 |
+
along with different barriers. These barriers include but are not limited to 1)
|
| 42 |
+
Economic Barrier, 2) Cultural Barrier, 3) Political Barrier, 4) Geographical Bar-
|
| 43 |
+
rier, and 5) Time Zone Barrier. Detection of the overpass of these barriers does
|
| 44 |
+
Copyright © 2021 for this paper by its authors. Use permitted under Creative
|
| 45 |
+
Commons License Attribution 4.0 International (CC BY 4.0).
|
| 46 |
+
|
| 47 |
+
2
|
| 48 |
+
A. Sittar et al.
|
| 49 |
+
|
| 50 |
+
|
| 51 |
+
not only tell us the area where the broadcasting of an event reached, but it also
|
| 52 |
+
shows us events-location relation as countries have different culture, economic
|
| 53 |
+
conditions, geographical placement on the globe, political point of view, and
|
| 54 |
+
time zone. Following are the definitions of news crossing these barriers:
|
| 55 |
+
Cultural Barrier. If we identify the coverage of specific event-centric news by
|
| 56 |
+
publishers that are surrounded by different cultures, then we can say that the
|
| 57 |
+
news related to the event crossed cultural barriers.
|
| 58 |
+
Political Barrier. If news about a specific event is disseminated from publishers
|
| 59 |
+
having different political alignment, we can say that the news related to that
|
| 60 |
+
event crossed the political barrier.
|
| 61 |
+
Geographical Barrier. We say that some news related to a specific event
|
| 62 |
+
overpasses geographical barriers if that event gets attention by publishers of
|
| 63 |
+
countries located in different geographical regions.
|
| 64 |
+
Time Zone Barrier. We can claim that event-centric news has crossed the
|
| 65 |
+
time zone barrier if it has been published by publishers located in different time
|
| 66 |
+
zones.
|
| 67 |
+
Economic Barrier. It can be asserted that a piece of event-centric news has
|
| 68 |
+
crossed economic barriers if it is published in countries having different economic
|
| 69 |
+
conditions.
|
| 70 |
+
In this paper, we propose a methodology for detection of different barriers
|
| 71 |
+
during information propagation in form of news that utilize data (IPoNews) [18]
|
| 72 |
+
related to three contrasting events (earthquake, Global warming, and FIFA world
|
| 73 |
+
cup) in different domains (natural disasters, climate changes, and sports) in 5
|
| 74 |
+
different languages: English, Slovene, Portuguese, German, and Spanish.
|
| 75 |
+
|
| 76 |
+
1.1 Contributions
|
| 77 |
+
Following are the main scientific contributions of this paper:
|
| 78 |
+
|
| 79 |
+
– A novel methodology for barrier detection in news spreading.
|
| 80 |
+
– Experimental comparison of several simple classification models that can
|
| 81 |
+
serve as a baseline.
|
| 82 |
+
|
| 83 |
+
1.2 Problem Statement
|
| 84 |
+
Observing the spreading of news on a particular event over time, we want to
|
| 85 |
+
predict whether a barrier (cultural, political, geographical, time zone, economi-
|
| 86 |
+
cal) is likely to hamper information while information propagates over the news
|
| 87 |
+
(binary classification).
|
| 88 |
+
|
| 89 |
+
2 RELATED WORK
|
| 90 |
+
|
| 91 |
+
Multiple barriers come across event-centric news specifically when the news is
|
| 92 |
+
concerned about international or national events. According to news flow theo-
|
| 93 |
+
ries, multiple determinants impact international news spreading. The economic
|
| 94 |
+
|
| 95 |
+
Using the profile of publishers to predict barriers across news articles
|
| 96 |
+
3
|
| 97 |
+
|
| 98 |
+
|
| 99 |
+
power of a country is one of the factors that influence news spreading. Moreover,
|
| 100 |
+
economic variations has different influence for different events (e.g. protests, con-
|
| 101 |
+
flicts, disasters) [15]. The magnitude of economic interactivity between countries
|
| 102 |
+
can also impact the news flow [21]. Economic growth/income level shows the eco-
|
| 103 |
+
nomic condition of a country. Multiple organizations are working on generating
|
| 104 |
+
prosperity and welfare index on yearly basis. Among them, “The Legatum Pros-
|
| 105 |
+
perity Index” and “Human Development Index” are popular 1, 2. Geographical
|
| 106 |
+
representation of entities and events has been utilized extensively in the past
|
| 107 |
+
to detect local, global, and critical events [3, 13, 19, 20]. It has been said that
|
| 108 |
+
countries with close distance share culture and language up to a certain extent
|
| 109 |
+
which can further unfold interesting facts about shared tendencies in informa-
|
| 110 |
+
tion spreading [15, 16].
|
| 111 |
+
|
| 112 |
+
News agencies tend to follow the national context in which journalists op-
|
| 113 |
+
erate. One of the related examples is the SARS epidemic study which found
|
| 114 |
+
that cross-national contextual values such as political and economic situations
|
| 115 |
+
impact the news selection [5]. It will be true to say that fake news is produced
|
| 116 |
+
based on many factors and it is surrounded by a paramount factor that is polit-
|
| 117 |
+
ical effect [11]. A great amount of work regarding fake news dwells on different
|
| 118 |
+
strategies and few studies considered political alignment to have a compelling
|
| 119 |
+
effect on news spreading [4, 12]. [12] strongly proved it to be a major strategy
|
| 120 |
+
in news agencies to control the news and change accordingly due to the involve-
|
| 121 |
+
ment of journalists and political actors. Countries that share common culture
|
| 122 |
+
are expected to have heavier news flow about between them reporting on similar
|
| 123 |
+
events [21]. Many quantitative studies found demographic, psychological, socio-
|
| 124 |
+
cultural, source, system, and content-related aspects [1]. Many models have tried
|
| 125 |
+
to explain cultural differences between societies. Hofstede’s national culture di-
|
| 126 |
+
mensions (HNCD) has been widely used and cited in different disciplines [7, 9].
|
| 127 |
+
|
| 128 |
+
News classification for different kinds of problems is a well-known topic since
|
| 129 |
+
the past and features used to classify varies depending upon the problem. [17]
|
| 130 |
+
used news content and user profile to classify the news whether it is fake or
|
| 131 |
+
not. [2] calculated TF-IDF score and Word2Vec score of most frequent words
|
| 132 |
+
and used them as features to classify into one of the five categories (state, econ-
|
| 133 |
+
omy, entertainment, international, and sports). Similarly, [14] performed part-
|
| 134 |
+
of-speech (POS) tagging at sentences level and used them as features, and built
|
| 135 |
+
supervised learning classifiers to classify news articles based on their location.
|
| 136 |
+
Mostly classifier trained to utilize popular supervised learning methods such as
|
| 137 |
+
Random Forest, Support Vector Machine (SVM), Naive Bayes, k-Nearest Neigh-
|
| 138 |
+
bour (kNN), and Decision Tree. In this work, we used the profile of each barrier
|
| 139 |
+
for each news publisher (see section 3.5) and most frequent 300 Wikipedia con-
|
| 140 |
+
cepts from the dataset that appeared in the list of news articles related to three
|
| 141 |
+
contrasting events (earthquake, Global Warming, and FIFA world cup). We also
|
| 142 |
+
|
| 143 |
+
1 http://hdr.undp.org/en/content/human-development-index-hdi
|
| 144 |
+
2 https://www.prosperity.com/
|
| 145 |
+
|
| 146 |
+
4
|
| 147 |
+
A. Sittar et al.
|
| 148 |
+
|
| 149 |
+
≥
|
| 150 |
+
|
| 151 |
+
compared the results of popular classifiers such as SVM, Random Forest, Deci-
|
| 152 |
+
sion Tree, Naive Bayes, and kNN (see Section 5.4).
|
| 153 |
+
|
| 154 |
+
3 DATA DESCRIPTION
|
| 155 |
+
|
| 156 |
+
3.1 Dataset
|
| 157 |
+
|
| 158 |
+
We utilized dataset ”A dataset for information spreading over the news (IPoNews)”
|
| 159 |
+
that consists of pairs of news articles that were labeled based on the level of their
|
| 160 |
+
similarity, as described in [18]. This dataset was collected from Event Registry,
|
| 161 |
+
a platform that identifies events by collecting related articles written in differ-
|
| 162 |
+
ent languages from tens of thousands of news sources [10]. The similarity score
|
| 163 |
+
among cross-lingual news articles was calculated using concept-based similar-
|
| 164 |
+
ity employing Wikifier service3. [18] describes the criteria when information is
|
| 165 |
+
considered to be propagated. Statistics of the data set are shown in table 3.
|
| 166 |
+
|
| 167 |
+
Table 1. Statistics about dataset
|
| 168 |
+
|
| 169 |
+
Dataset Domain
|
| 170 |
+
Event type
|
| 171 |
+
Articles per Language Total Articles
|
| 172 |
+
|
| 173 |
+
1
|
| 174 |
+
|
| 175 |
+
Sports
|
| 176 |
+
|
| 177 |
+
FIFA World Cup
|
| 178 |
+
Eng Spa Ger Slv Por
|
| 179 |
+
|
| 180 |
+
2682
|
| 181 |
+
983 762 711 10 216
|
| 182 |
+
2
|
| 183 |
+
Natural Disaster Earthquake
|
| 184 |
+
941 999 937 19 251
|
| 185 |
+
3147
|
| 186 |
+
3
|
| 187 |
+
Climate Changes Global Warming 996 298 545 8
|
| 188 |
+
97
|
| 189 |
+
1944
|
| 190 |
+
|
| 191 |
+
|
| 192 |
+
The dataset contains a list of pairs of news articles annotated with one of
|
| 193 |
+
the labels such as ”information-Propagated”, ”Unsure”, or ”Information-Not-
|
| 194 |
+
Propagated” (see Table 2). The information is considered to be propagated if the
|
| 195 |
+
cosine similarity score of the two articles in the pair is above a predefined thresh-
|
| 196 |
+
old ( 0.7 for Information-Propagated, < 0.4 for Information-not-Propagated,
|
| 197 |
+
otherwise Unsure). We restructured the original dataset to include only exam-
|
| 198 |
+
ples labeled as spreading information. In this way, we have pair of news articles
|
| 199 |
+
where we observe information spreading from one to the other. Furthermore, for
|
| 200 |
+
each example, instead of having a pair of articles, we kept only the article that
|
| 201 |
+
was published earlier. In this way, each example contains an article that spreads
|
| 202 |
+
information.
|
| 203 |
+
|
| 204 |
+
Table 2. Articles with metadata
|
| 205 |
+
|
| 206 |
+
from
|
| 207 |
+
to
|
| 208 |
+
weight Class
|
| 209 |
+
from-publisher to-publisher from-pub-uri
|
| 210 |
+
to-pub-uri
|
| 211 |
+
Por44
|
| 212 |
+
Por43
|
| 213 |
+
0.627
|
| 214 |
+
Unsure
|
| 215 |
+
ClicRBS
|
| 216 |
+
SAPO 24
|
| 217 |
+
jornald.clicrbs.com.br 24.sapo.pt
|
| 218 |
+
English881 English880 1
|
| 219 |
+
Information-Propagated
|
| 220 |
+
Sky News
|
| 221 |
+
247 Wall St.
|
| 222 |
+
news.sky.com
|
| 223 |
+
247wallst.com
|
| 224 |
+
English258 English329 0.313
|
| 225 |
+
Information-Not-Propagated Sify
|
| 226 |
+
4-traders
|
| 227 |
+
sify.com
|
| 228 |
+
4-traders.com
|
| 229 |
+
English793 English787 0.238
|
| 230 |
+
Information-Not-Propagated Bioengineer.org 7NEWS Sydney scienmag.com
|
| 231 |
+
7news.com.au
|
| 232 |
+
German237 German236 0.979
|
| 233 |
+
Information-Propagated
|
| 234 |
+
watson
|
| 235 |
+
watson
|
| 236 |
+
aargauerzeitung.ch
|
| 237 |
+
aargauerzeitung.ch
|
| 238 |
+
|
| 239 |
+
|
| 240 |
+
3 http://wikifier.org/info.html, https://github.com/abdulsittar/IPoNews
|
| 241 |
+
|
| 242 |
+
Using the profile of publishers to predict barriers across news articles
|
| 243 |
+
5
|
| 244 |
+
|
| 245 |
+
|
| 246 |
+
3.2 Statistics after restructuring the data
|
| 247 |
+
|
| 248 |
+
The original dataset describes in Section 3 contains pairs of articles along with
|
| 249 |
+
the information on whether there was the propagation of information related to a
|
| 250 |
+
specific event or not. We used only examples labeled as propagating information
|
| 251 |
+
4. Based on the available metadata for articles, we ignored articles that do not
|
| 252 |
+
have metadata information in our database (see Section 3.4). Table 3 shows the
|
| 253 |
+
statistics for each barrier after filtering the original dataset.
|
| 254 |
+
|
| 255 |
+
Table 3. Statistics about barrier
|
| 256 |
+
|
| 257 |
+
Dataset Domain
|
| 258 |
+
Event type
|
| 259 |
+
Articles for each barrier
|
| 260 |
+
|
| 261 |
+
1
|
| 262 |
+
|
| 263 |
+
Sports
|
| 264 |
+
|
| 265 |
+
FIFA World Cup
|
| 266 |
+
Time-Zone Cultural Political Geographical Economical
|
| 267 |
+
724
|
| 268 |
+
699
|
| 269 |
+
143
|
| 270 |
+
726
|
| 271 |
+
634
|
| 272 |
+
2
|
| 273 |
+
Natural Disaster Earthquake
|
| 274 |
+
1102
|
| 275 |
+
1113
|
| 276 |
+
227
|
| 277 |
+
1113
|
| 278 |
+
1010
|
| 279 |
+
3
|
| 280 |
+
Climate Changes Global Warming 586
|
| 281 |
+
445
|
| 282 |
+
108
|
| 283 |
+
487
|
| 284 |
+
463
|
| 285 |
+
|
| 286 |
+
|
| 287 |
+
|
| 288 |
+
|
| 289 |
+
3.3 Wikipedia Concepts as Features
|
| 290 |
+
|
| 291 |
+
As our dataset already mention (see Section 3) if information in news is spread-
|
| 292 |
+
ing from an article to another based on Wikipedia-concepts, we utilized the
|
| 293 |
+
most frequent (top 300) Wikipedia-concepts as features. Figure 1 portrays these
|
| 294 |
+
Wikipedia-concepts for all three events in form of word clouds.
|
| 295 |
+
|
| 296 |
+
|
| 297 |
+
|
| 298 |
+
|
| 299 |
+
|
| 300 |
+
|
| 301 |
+
|
| 302 |
+
|
| 303 |
+
Fig. 1. Word clouds of most frequent words related to earthquake, FIFA
|
| 304 |
+
World Cup and Global Warming events respectively.
|
| 305 |
+
|
| 306 |
+
|
| 307 |
+
|
| 308 |
+
|
| 309 |
+
3.4 Barriers Knowledge
|
| 310 |
+
|
| 311 |
+
Barriers knowledge refers to a database that contains metadata about each bar-
|
| 312 |
+
rier. Figure 3 shows schema of database and Table 4 presents barriers along with
|
| 313 |
+
their characteristics. Each barrier depends on one main information that is the
|
| 314 |
+
country name of the headquarter of the news publishers. Since the utilized data
|
| 315 |
+
4 https://doi.org/10.5281/zenodo.3950064
|
| 316 |
+
|
| 317 |
+
DEBpresident
|
| 318 |
+
United
|
| 319 |
+
Yor
|
| 320 |
+
Wart
|
| 321 |
+
overnmen
|
| 322 |
+
States
|
| 323 |
+
nameGermanname
|
| 324 |
+
football
|
| 325 |
+
SWar
|
| 326 |
+
ummerWorld
|
| 327 |
+
assoclation
|
| 328 |
+
Unitednationa
|
| 329 |
+
CUDFIFAASSO
|
| 330 |
+
ation
|
| 331 |
+
FIFAWorldYorKname
|
| 332 |
+
War
|
| 333 |
+
States
|
| 334 |
+
IInchEarthFranceUnited
|
| 335 |
+
United
|
| 336 |
+
New
|
| 337 |
+
Globa
|
| 338 |
+
disambiguation6
|
| 339 |
+
A. Sittar et al.
|
| 340 |
+
|
| 341 |
+
|
| 342 |
+
set already contains headquarter of publishers therefore we fetched the coun-
|
| 343 |
+
try associated with headquarters. For economical barrier, we fetched economical
|
| 344 |
+
profile for each country using “”The Legatum Prosperity Index”” 5. Cultural
|
| 345 |
+
differences among different regions were collected using Hofstede’s national cul-
|
| 346 |
+
ture dimensions (HNCD). For time zone and geographical barrier, we stored
|
| 347 |
+
general UTC-offset, latitude, and longitude. For political barrier we are using
|
| 348 |
+
the political alignment of the newspaper/magazine that we determined based on
|
| 349 |
+
Wikipedia infobox at their Wikipedia page. For instance, for Austrian newspa-
|
| 350 |
+
per ”Der Standard” we find social liberalism as political alignment (See Figure
|
| 351 |
+
2), for British newspaper ”Daily Mail” we find right-wing as political alignment,
|
| 352 |
+
for German ”Stern” magazine there is no information in its Wikipedia infobox
|
| 353 |
+
on the political alignment thus we label political alignment as unknown.
|
| 354 |
+
|
| 355 |
+
|
| 356 |
+
|
| 357 |
+
Fig. 2. Three Wikipedia infobox for three different newspapers/magazines
|
| 358 |
+
with political alignment
|
| 359 |
+
|
| 360 |
+
|
| 361 |
+
|
| 362 |
+
5 https://www.prosperity.com/
|
| 363 |
+
|
| 364 |
+
Der Standard
|
| 365 |
+
DERSTANDARD
|
| 366 |
+
Type
|
| 367 |
+
Daily newspaper
|
| 368 |
+
Owner(s)
|
| 369 |
+
Oscar Bronner
|
| 370 |
+
Publisher
|
| 371 |
+
Oscar Bronner
|
| 372 |
+
Martin Kotynek
|
| 373 |
+
Founded
|
| 374 |
+
19 October 1988: 32 years
|
| 375 |
+
ago
|
| 376 |
+
Political
|
| 377 |
+
Social liberalism
|
| 378 |
+
alignment
|
| 379 |
+
Headguarters
|
| 380 |
+
Vienna
|
| 381 |
+
Circulation
|
| 382 |
+
86,000 (2013)
|
| 383 |
+
Website
|
| 384 |
+
www.derstandard.de
|
| 385 |
+
www.derstandard.at DailyMail
|
| 386 |
+
DailumlailFREE
|
| 387 |
+
MICHELIN
|
| 388 |
+
SO MUCH
|
| 389 |
+
FOR THE
|
| 390 |
+
BONFIRE
|
| 391 |
+
OF THE
|
| 392 |
+
QUANGOS!
|
| 393 |
+
aplasticheart
|
| 394 |
+
DailyMail frontpageon 4August 2010
|
| 395 |
+
Type
|
| 396 |
+
Dailynewspaper
|
| 397 |
+
Format
|
| 398 |
+
Tabloid
|
| 399 |
+
Owner(s)
|
| 400 |
+
DailyMail and General Trust
|
| 401 |
+
Founder(s)
|
| 402 |
+
AlfredHarmsworthandHarold
|
| 403 |
+
Harmsworth
|
| 404 |
+
Publisher
|
| 405 |
+
DMGMedia
|
| 406 |
+
Editor
|
| 407 |
+
GeordieGreig
|
| 408 |
+
Founded
|
| 409 |
+
4 May1896:124 years ago
|
| 410 |
+
Political
|
| 411 |
+
Right-wing[1]2][3]
|
| 412 |
+
alignment
|
| 413 |
+
Language
|
| 414 |
+
English
|
| 415 |
+
Headquarters Northcliffe House
|
| 416 |
+
2 Derry Street
|
| 417 |
+
LondonW85TT
|
| 418 |
+
Circulation
|
| 419 |
+
1.134.184(asofFebruary
|
| 420 |
+
2020)[4]
|
| 421 |
+
ISSN
|
| 422 |
+
0307-7578
|
| 423 |
+
OCLC
|
| 424 |
+
16310567
|
| 425 |
+
number
|
| 426 |
+
Website
|
| 427 |
+
www.dailymail.co.ukStern
|
| 428 |
+
?
|
| 429 |
+
stern
|
| 430 |
+
?
|
| 431 |
+
stern
|
| 432 |
+
KRERSMID
|
| 433 |
+
Alein in turopa
|
| 434 |
+
IXABE
|
| 435 |
+
HRSECIEENE
|
| 436 |
+
Sternmagazinecoveron18February2016
|
| 437 |
+
Editor
|
| 438 |
+
FlorianGless,Anna-Beeke
|
| 439 |
+
Gretemeier
|
| 440 |
+
Categories Newsmagazine
|
| 441 |
+
FrequencyWeekly
|
| 442 |
+
Circulation390,000(2020)
|
| 443 |
+
Year
|
| 444 |
+
1948
|
| 445 |
+
founded
|
| 446 |
+
Firstissue
|
| 447 |
+
1August1948,72yearsago
|
| 448 |
+
Company
|
| 449 |
+
Gruner+Jahr
|
| 450 |
+
Country
|
| 451 |
+
Gemany
|
| 452 |
+
Basedin
|
| 453 |
+
Hamburg
|
| 454 |
+
Language
|
| 455 |
+
Geman
|
| 456 |
+
Website
|
| 457 |
+
www.stern.de
|
| 458 |
+
ISSN
|
| 459 |
+
0039-1239Using the profile of publishers to predict barriers across news articles
|
| 460 |
+
7
|
| 461 |
+
|
| 462 |
+
|
| 463 |
+
3.5 Features for Individual Barrier
|
| 464 |
+
We represented each barrier with a specific profile containing a list of features.
|
| 465 |
+
Table 4 depicts the list of features for each barrier. Economic and cultural bar-
|
| 466 |
+
riers consist of a vector of length 11 and 6 features whereas geographical, time
|
| 467 |
+
zone, and political only contain 1 or 2 features such as latitude-longitude, UTC-
|
| 468 |
+
offset, and political alignment.
|
| 469 |
+
|
| 470 |
+
|
| 471 |
+
|
| 472 |
+
Fig. 3. Database Schema for Barriers
|
| 473 |
+
|
| 474 |
+
|
| 475 |
+
|
| 476 |
+
|
| 477 |
+
3.6 Dataset Annotation
|
| 478 |
+
We queried the metadata information for each article and generated a CSV file
|
| 479 |
+
for each barrier. We annotated each article based on that meta information to be
|
| 480 |
+
used for model training and classification. For economic and cultural barriers, we
|
| 481 |
+
calculated cosine similarity between vectors of economical values and vectors of
|
| 482 |
+
cultural values. Score greater than the threshold value of 0.9 labeled as FALSE
|
| 483 |
+
otherwise TRUE. We set the lowest value as a threshold based on the fact that
|
| 484 |
+
if two countries have a little gap concerning culture or economical values then
|
| 485 |
+
there exists a barrier. For geographical barriers, we compared the latitude and
|
| 486 |
+
longitude of the country of each publisher. If a country name or lat/lat appeared
|
| 487 |
+
to be the same then we annotated it with FALSE otherwise TRUE. Lastly, for
|
| 488 |
+
|
| 489 |
+
Enterprise Conditions
|
| 490 |
+
Social Capital
|
| 491 |
+
Education
|
| 492 |
+
EconomicQuality
|
| 493 |
+
Marketaccessand
|
| 494 |
+
Individualistic cuiture
|
| 495 |
+
Living Conditions
|
| 496 |
+
Economic
|
| 497 |
+
infrastructure
|
| 498 |
+
Power distance
|
| 499 |
+
Profile
|
| 500 |
+
Governance
|
| 501 |
+
Natural Environment
|
| 502 |
+
afety
|
| 503 |
+
Fam
|
| 504 |
+
Health
|
| 505 |
+
nty
|
| 506 |
+
Cultural Value's
|
| 507 |
+
Has
|
| 508 |
+
Has
|
| 509 |
+
induigence vs
|
| 510 |
+
restraint
|
| 511 |
+
Headquarter
|
| 512 |
+
Has
|
| 513 |
+
Country
|
| 514 |
+
Has
|
| 515 |
+
Geographical
|
| 516 |
+
Values
|
| 517 |
+
(Lat/Lon)
|
| 518 |
+
Has
|
| 519 |
+
name
|
| 520 |
+
Has
|
| 521 |
+
Longitude
|
| 522 |
+
Latitude
|
| 523 |
+
Political barrier
|
| 524 |
+
Time-Zone
|
| 525 |
+
Political
|
| 526 |
+
UTC-offset
|
| 527 |
+
Alignment8
|
| 528 |
+
A. Sittar et al.
|
| 529 |
+
|
| 530 |
+
|
| 531 |
+
Table 4. Features of each barrier
|
| 532 |
+
|
| 533 |
+
Barrier
|
| 534 |
+
Features
|
| 535 |
+
|
| 536 |
+
Economic
|
| 537 |
+
Rank, Safety-Security,
|
| 538 |
+
Personal-Freedom, Governance, Social-Capital, Investment-Environment,
|
| 539 |
+
Enterprise-Conditions, Market-Infrastructure, Economic-Quality,
|
| 540 |
+
Living-Conditions, Health, Education, Natural-Environment
|
| 541 |
+
|
| 542 |
+
Cultural
|
| 543 |
+
Power-Distance,
|
| 544 |
+
Uncertainty-Avoidance-By-Individuals, Individualistic-Cultures,
|
| 545 |
+
Masculinity-Femininity, Long-Term-Orientation, Indulgence-Restraint
|
| 546 |
+
Geographical Latitude, Longitude
|
| 547 |
+
Time Zone
|
| 548 |
+
UTC-offset
|
| 549 |
+
Political
|
| 550 |
+
Political-Alignment
|
| 551 |
+
|
| 552 |
+
|
| 553 |
+
|
| 554 |
+
|
| 555 |
+
time-zone and political barriers, we followed the same process that was for the
|
| 556 |
+
geographical barrier. if political alignment or UTC-offset appeared to be the
|
| 557 |
+
same for a pair then it is annotated with FALSE otherwise TRUE. Figure 4
|
| 558 |
+
depicts the class distribution for each barrier. We can notice unbalanced class
|
| 559 |
+
distribution with majority of the examples being False. This is especially true
|
| 560 |
+
for Cultural and Political barrier with 91 percent of example being False. Thus
|
| 561 |
+
in our evaluation we rely more on F1 measure than classification accuracy.
|
| 562 |
+
|
| 563 |
+
|
| 564 |
+
|
| 565 |
+
|
| 566 |
+
|
| 567 |
+
|
| 568 |
+
|
| 569 |
+
Fig. 4. Class Distribution for Each Barrier
|
| 570 |
+
|
| 571 |
+
2000
|
| 572 |
+
True
|
| 573 |
+
2014
|
| 574 |
+
False
|
| 575 |
+
1500
|
| 576 |
+
1588
|
| 577 |
+
1599
|
| 578 |
+
1324
|
| 579 |
+
1000
|
| 580 |
+
948
|
| 581 |
+
670
|
| 582 |
+
500
|
| 583 |
+
478
|
| 584 |
+
408
|
| 585 |
+
203
|
| 586 |
+
42
|
| 587 |
+
0
|
| 588 |
+
I Barrier
|
| 589 |
+
nical
|
| 590 |
+
olitical Barrier
|
| 591 |
+
Econom
|
| 592 |
+
TimeUsing the profile of publishers to predict barriers across news articles
|
| 593 |
+
9
|
| 594 |
+
|
| 595 |
+
|
| 596 |
+
4 MATERIALS AND METHODS
|
| 597 |
+
4.1 Problem Modeling
|
| 598 |
+
For each barrier, we have a list of news articles where each article is associated
|
| 599 |
+
with 300 Wikipedia-concepts and features related to that barrier. The task is to
|
| 600 |
+
predict the status S of each barrier B.
|
| 601 |
+
S = f (C, B)
|
| 602 |
+
f is the learning function for barrier detection, C is donating here Wikipedia-
|
| 603 |
+
concepts related to an article and B is the list of features related to a specific
|
| 604 |
+
barrier (see Table 4).
|
| 605 |
+
|
| 606 |
+
4.2 Methodology
|
| 607 |
+
We utilized dataset IPoNews [18] and built a database on top of this dataset
|
| 608 |
+
that includes barrier knowledge. Figure 5 explains the overall process of model
|
| 609 |
+
construction from news articles to results generation. We created a list of in-
|
| 610 |
+
stances using the most frequent Wikipedia-concepts based on news articles and
|
| 611 |
+
joined them along with barrier knowledge. After performing the annotation (see
|
| 612 |
+
Section 3.6), we trained popular classification models and generated the results
|
| 613 |
+
on test data (see Section 5.4).
|
| 614 |
+
|
| 615 |
+
|
| 616 |
+
|
| 617 |
+
Fig. 5. Steps for Model Construction
|
| 618 |
+
|
| 619 |
+
|
| 620 |
+
|
| 621 |
+
5 EXPERIMENTAL EVALUATION
|
| 622 |
+
5.1 Baselines
|
| 623 |
+
We used the following methods as baselines for all our models.
|
| 624 |
+
– Uniform: Generates predictions uniformly at random.
|
| 625 |
+
– Stratified: Generates predictions by respecting the training set’s class dis-
|
| 626 |
+
tribution.
|
| 627 |
+
– Most Frequent: Always predicts the most frequent label in the training
|
| 628 |
+
set.
|
| 629 |
+
|
| 630 |
+
Barrier's
|
| 631 |
+
Results
|
| 632 |
+
knowledge
|
| 633 |
+
Testset
|
| 634 |
+
Newsarticles (IPoNews)
|
| 635 |
+
Metadata
|
| 636 |
+
Barriers'Annotation
|
| 637 |
+
Wikipediaconcepts
|
| 638 |
+
Model Construction
|
| 639 |
+
Trainset10
|
| 640 |
+
A. Sittar et al.
|
| 641 |
+
|
| 642 |
+
sum
|
| 643 |
+
sum
|
| 644 |
+
sum
|
| 645 |
+
sum
|
| 646 |
+
|
| 647 |
+
5.2 Classification Methods
|
| 648 |
+
|
| 649 |
+
We trained popular classification models for each barrier such as SVM, kNN,
|
| 650 |
+
Decision Tree, Random Forest, and Naive Bayes using Scikit-Learn. We applied
|
| 651 |
+
a stratified 10-fold cross-validator to split the dataset for training and testing.
|
| 652 |
+
For Random Forest, kNN, and Decision Tree, we varied the size of n-estimator,
|
| 653 |
+
value of k, and max-leafs and chosen the one with the best score on test data
|
| 654 |
+
respectively. Implementation of this methodology to barrier detection can be
|
| 655 |
+
found on GitHub 6.
|
| 656 |
+
|
| 657 |
+
5.3 Evaluation Metric
|
| 658 |
+
|
| 659 |
+
Due to imbalance in the class distribution for all barriers, we used micro averaged
|
| 660 |
+
precision and recall to evaluate our models. 7
|
| 661 |
+
– Micro-Precision: The precision of average contributions from each class is
|
| 662 |
+
calculated in micro-precision whereas the following question is answered by
|
| 663 |
+
precision: What proportion of positive predictions was correct? It is defined
|
| 664 |
+
as:
|
| 665 |
+
|
| 666 |
+
TruePositivesum
|
| 667 |
+
|
| 668 |
+
Micro − Precision = TruePositive
|
| 669 |
+
+ FalsePositive
|
| 670 |
+
– Micro-Recall: Recall of average contributions from each class is calculated
|
| 671 |
+
in micro-recall whereas the following question is answered by recall: What
|
| 672 |
+
proportion of actual positives was predicted correctly? It is defined as:
|
| 673 |
+
|
| 674 |
+
TruePositivesum
|
| 675 |
+
|
| 676 |
+
Micro − Recall = TruePositive
|
| 677 |
+
+ FalseNegative
|
| 678 |
+
|
| 679 |
+
5.4 Results and Analysis
|
| 680 |
+
|
| 681 |
+
Table 5 shows the results of all the classifiers for each barrier along with baselines.
|
| 682 |
+
Analysis of the experimental results show that overall all the machine learning
|
| 683 |
+
models outperform the three baselines. For all the barriers, we can notice Micro-
|
| 684 |
+
Recall is equal to Micro-Precision. The best performing baseline is the ”Most-
|
| 685 |
+
frequent” with Micro-F1 for economic, cultural, geographical, time zone, and
|
| 686 |
+
political barrier equal to 0.70, 0.90, 0.58, 0.70, and 0.90 respectively. The best
|
| 687 |
+
performing models on all the barriers are Decision Tree, Random Forest, and
|
| 688 |
+
kNN. Looking at Micro-F1, we can see that on the Economic and Cultural
|
| 689 |
+
barrier kNN achieved the best performance of 0.75 and 0.95 respectively. On
|
| 690 |
+
Geographical barriers, kNN and Decision Tree performed the best achieving 0.81.
|
| 691 |
+
On Time-Zone, the best performing classifier is Random Forest with Micro-F1
|
| 692 |
+
6 https://github.com/cleopatra-itn/BarrierDetection-Classification
|
| 693 |
+
7 https://peltarion.com/knowledge-center/documentation/evaluation-
|
| 694 |
+
view/classification-loss-metrics/micro-recall
|
| 695 |
+
|
| 696 |
+
Using the profile of publishers to predict barriers across news articles
|
| 697 |
+
11
|
| 698 |
+
|
| 699 |
+
|
| 700 |
+
0.83. On Political barriers, SVM, kNN, and Random Forest achieve the best
|
| 701 |
+
Micro-F1 score of 0.97.
|
| 702 |
+
In terms of classification accuracy, we can see that Random Forest outper-
|
| 703 |
+
forms the baselines as well as the other four classifiers for the first four barriers.
|
| 704 |
+
Notice that Random forest performs better than decision tree but takes more
|
| 705 |
+
time. Naive-Bayes achieves a little bit lower classification accuracy than the Deci-
|
| 706 |
+
sion Tree for the first four barriers. On the political barrier Naive-Bayes achieves
|
| 707 |
+
the best classification accuracy (0.98) but lower Micro-F1 (0.66).
|
| 708 |
+
|
| 709 |
+
6 CONCLUSIONS AND FUTURE WORK
|
| 710 |
+
|
| 711 |
+
It is highly important to detect the barriers while information propagates specif-
|
| 712 |
+
ically through the news. For journalists, marketers, and social scientists, the phe-
|
| 713 |
+
nomenon of knowing which barrier appeared most frequently for what type of
|
| 714 |
+
events, is significantly helpful to solve business and marketing problems. In this
|
| 715 |
+
regard, we proposed a simple methodology. Though its results are good enough
|
| 716 |
+
for three types of events, we would like to enhance features as well as events. We
|
| 717 |
+
used only Wikipedia-concepts and meta information to detect barriers. In the
|
| 718 |
+
future, we would like to use DMoz categories provided by Event Registry [10],
|
| 719 |
+
and transformation of the text of news articles as a feature for barrier detection.
|
| 720 |
+
Currently geographical and time zone barriers are calculated in a binary way ei-
|
| 721 |
+
ther the same or different. In the future, we would like to introduce the distance
|
| 722 |
+
between countries and between time zones as labels instead of the currently used
|
| 723 |
+
binary labeling.
|
| 724 |
+
|
| 725 |
+
7 ACKNOWLEDGMENTS
|
| 726 |
+
|
| 727 |
+
The research described in this paper was supported by the Slovenian research
|
| 728 |
+
agency under the project J2-1736 Causalify and co-financed by the Republic
|
| 729 |
+
of Slovenia and the European Union’s Horizon 2020 research and innovation
|
| 730 |
+
program under the Marie Sk-lodowska-Curie grant agreement No 812997.
|
| 731 |
+
|
| 732 |
+
12
|
| 733 |
+
A. Sittar et al.
|
| 734 |
+
|
| 735 |
+
|
| 736 |
+
|
| 737 |
+
Table 5. Classifiers’ comparison with baselines
|
| 738 |
+
|
| 739 |
+
Barrier
|
| 740 |
+
Model
|
| 741 |
+
CA Mic-Pre Mic-Rec Mic-F1
|
| 742 |
+
Economic
|
| 743 |
+
Uniform
|
| 744 |
+
0.50 0.50
|
| 745 |
+
0.49
|
| 746 |
+
0.49
|
| 747 |
+
|
| 748 |
+
Stratified
|
| 749 |
+
0.58 0.59
|
| 750 |
+
0.57
|
| 751 |
+
0.59
|
| 752 |
+
|
| 753 |
+
Most Frequent 0.70 0.70
|
| 754 |
+
0.70
|
| 755 |
+
0.70
|
| 756 |
+
|
| 757 |
+
SVM
|
| 758 |
+
0.66 0.69
|
| 759 |
+
0.69
|
| 760 |
+
0.69
|
| 761 |
+
|
| 762 |
+
kNN
|
| 763 |
+
0.70 0.75
|
| 764 |
+
0.75
|
| 765 |
+
0.75
|
| 766 |
+
|
| 767 |
+
Decision Tree
|
| 768 |
+
0.69 0.73
|
| 769 |
+
0.73
|
| 770 |
+
0.73
|
| 771 |
+
|
| 772 |
+
Random Forest 0.74 0.74
|
| 773 |
+
0.74
|
| 774 |
+
0.74
|
| 775 |
+
|
| 776 |
+
Naive Bayes
|
| 777 |
+
0.61 0.63
|
| 778 |
+
0.63
|
| 779 |
+
0.63
|
| 780 |
+
|
| 781 |
+
|
| 782 |
+
Cultural
|
| 783 |
+
Uniform
|
| 784 |
+
0.50 0.50
|
| 785 |
+
0.49
|
| 786 |
+
0.50
|
| 787 |
+
|
| 788 |
+
Stratified
|
| 789 |
+
0.83 0.83
|
| 790 |
+
0.83
|
| 791 |
+
0.83
|
| 792 |
+
|
| 793 |
+
Most Frequent 0.90 0.90
|
| 794 |
+
0.90
|
| 795 |
+
0.90
|
| 796 |
+
|
| 797 |
+
SVM
|
| 798 |
+
0.84 0.93
|
| 799 |
+
0.93
|
| 800 |
+
0.93
|
| 801 |
+
|
| 802 |
+
kNN
|
| 803 |
+
0.55 0.95
|
| 804 |
+
0.95
|
| 805 |
+
0.95
|
| 806 |
+
|
| 807 |
+
Decision Tree
|
| 808 |
+
0.90 0.94
|
| 809 |
+
0.94
|
| 810 |
+
0.94
|
| 811 |
+
|
| 812 |
+
Random Forest 0.93 0.93
|
| 813 |
+
0.93
|
| 814 |
+
0.93
|
| 815 |
+
|
| 816 |
+
Naive Bayes
|
| 817 |
+
0.83 0.51
|
| 818 |
+
0.51
|
| 819 |
+
0.51
|
| 820 |
+
|
| 821 |
+
|
| 822 |
+
Geographical Uniform
|
| 823 |
+
0.49 0.50
|
| 824 |
+
0.50
|
| 825 |
+
0.50
|
| 826 |
+
|
| 827 |
+
Stratified
|
| 828 |
+
0.50 0.51
|
| 829 |
+
0.51
|
| 830 |
+
0.51
|
| 831 |
+
|
| 832 |
+
Most Frequent 0.58 0.58
|
| 833 |
+
0.58
|
| 834 |
+
0.58
|
| 835 |
+
|
| 836 |
+
SVM
|
| 837 |
+
0.81 0.76
|
| 838 |
+
0.76
|
| 839 |
+
0.76
|
| 840 |
+
|
| 841 |
+
kNN
|
| 842 |
+
0.79 0.81
|
| 843 |
+
0.81
|
| 844 |
+
0.81
|
| 845 |
+
|
| 846 |
+
Decision Tree
|
| 847 |
+
0.78 0.81
|
| 848 |
+
0.81
|
| 849 |
+
0.81
|
| 850 |
+
|
| 851 |
+
Random Forest 0.79 0.79
|
| 852 |
+
0.79
|
| 853 |
+
0.79
|
| 854 |
+
|
| 855 |
+
Naive Bayes
|
| 856 |
+
0.76 0.79
|
| 857 |
+
0.79
|
| 858 |
+
0.79
|
| 859 |
+
|
| 860 |
+
|
| 861 |
+
Time Zone
|
| 862 |
+
Uniform
|
| 863 |
+
0.49 0.49
|
| 864 |
+
0.49
|
| 865 |
+
0.49
|
| 866 |
+
|
| 867 |
+
Stratified
|
| 868 |
+
0.59 0.58
|
| 869 |
+
0.58
|
| 870 |
+
0.58
|
| 871 |
+
|
| 872 |
+
Most Frequent 0.70 0.70
|
| 873 |
+
0.70
|
| 874 |
+
0.70
|
| 875 |
+
|
| 876 |
+
SVM
|
| 877 |
+
0.78 0.77
|
| 878 |
+
0.77
|
| 879 |
+
0.77
|
| 880 |
+
|
| 881 |
+
kNN
|
| 882 |
+
0.70 0.78
|
| 883 |
+
0.78
|
| 884 |
+
0.78
|
| 885 |
+
|
| 886 |
+
Decision Tree
|
| 887 |
+
0.80 0.81
|
| 888 |
+
0.81
|
| 889 |
+
0.81
|
| 890 |
+
|
| 891 |
+
Random Forest 0.83 0.83
|
| 892 |
+
0.83
|
| 893 |
+
0.83
|
| 894 |
+
|
| 895 |
+
Naive Bayes
|
| 896 |
+
0.72 0.64
|
| 897 |
+
0.64
|
| 898 |
+
0.64
|
| 899 |
+
|
| 900 |
+
|
| 901 |
+
Political
|
| 902 |
+
Uniform
|
| 903 |
+
0.51 0.52
|
| 904 |
+
0.50
|
| 905 |
+
0.50
|
| 906 |
+
|
| 907 |
+
Stratified
|
| 908 |
+
0.84 0.83
|
| 909 |
+
0.81
|
| 910 |
+
0.82
|
| 911 |
+
|
| 912 |
+
Most Frequent 0.90 0.90
|
| 913 |
+
0.90
|
| 914 |
+
0.90
|
| 915 |
+
|
| 916 |
+
SVM
|
| 917 |
+
0.79 0.97
|
| 918 |
+
0.97
|
| 919 |
+
0.97
|
| 920 |
+
|
| 921 |
+
kNN
|
| 922 |
+
0.62 0.97
|
| 923 |
+
0.97
|
| 924 |
+
0.97
|
| 925 |
+
|
| 926 |
+
Decision Tree
|
| 927 |
+
0.79 0.91
|
| 928 |
+
0.91
|
| 929 |
+
0.91
|
| 930 |
+
|
| 931 |
+
Random Forest 0.97 0.97
|
| 932 |
+
0.97
|
| 933 |
+
0.97
|
| 934 |
+
|
| 935 |
+
Naive Bayes
|
| 936 |
+
0.98 0.66
|
| 937 |
+
0.66
|
| 938 |
+
0.66
|
| 939 |
+
|
| 940 |
+
Using the profile of publishers to predict barriers across news articles
|
| 941 |
+
13
|
| 942 |
+
|
| 943 |
+
|
| 944 |
+
References
|
| 945 |
+
1. Al-Samarraie, H., Eldenfria, A., Dawoud, H.: The impact of personality traits on
|
| 946 |
+
users’ information-seeking behavior. Information Processing & Management 53(1),
|
| 947 |
+
237–247 (2017)
|
| 948 |
+
2. Alam, M.T., Islam, M.M.: Bard: Bangla article classification using a new compre-
|
| 949 |
+
hensive dataset. In: 2018 International Conference on Bangla Speech and Language
|
| 950 |
+
Processing (ICBSLP). pp. 1–5. IEEE (2018)
|
| 951 |
+
3. Andrews, S., Gibson, H., Domdouzis, K., Akhgar, B.: Creating corroborated cri-
|
| 952 |
+
sis reports from social media data through formal concept analysis. Journal of
|
| 953 |
+
Intelligent Information Systems 47(2), 287–312 (2016)
|
| 954 |
+
4. Bakshy, E., Messing, S., Adamic, L.A.: Exposure to ideologically diverse news and
|
| 955 |
+
opinion on facebook. Science 348(6239), 1130–1132 (2015)
|
| 956 |
+
5. Camaj, L.: Media framing through stages of a political discourse: International
|
| 957 |
+
news agencies’ coverage of kosovo’s status negotiations. International Communica-
|
| 958 |
+
tion Gazette 72(7), 635–653 (2010)
|
| 959 |
+
6. Dagon, D., Zou, C.C., Lee, W.: Modeling botnet propagation using time zones. In:
|
| 960 |
+
NDSS. vol. 6, pp. 2–13 (2006)
|
| 961 |
+
7. He, M., Lee, J.: Social culture and innovation diffusion: a theoretically founded
|
| 962 |
+
agent-based model. Journal of Evolutionary Economics pp. 1–41 (2020)
|
| 963 |
+
8. Hong, X., Yu, Z., Tang, M., Xian, Y.: Cross-lingual event-centered news clustering
|
| 964 |
+
based on elements semantic correlations of different news. Multimedia Tools and
|
| 965 |
+
Applications 76(23), 25129–25143 (2017)
|
| 966 |
+
9. Khosrowjerdi, M., Sundqvist, A., Bystr¨om, K.: Cultural patterns of information
|
| 967 |
+
source use: A global study of 47 countries. Journal of the Association for Informa-
|
| 968 |
+
tion Science and Technology 71(6), 711–724 (2020)
|
| 969 |
+
10. Leban, G., Fortuna, B., Brank, J., Grobelnik, M.: Event registry: learning about
|
| 970 |
+
world events from news. In: Proceedings of the 23rd International Conference on
|
| 971 |
+
World Wide Web. pp. 107–110 (2014)
|
| 972 |
+
11. Martens, B., Aguiar, L., Gomez-Herrera, E., Mueller-Langer, F.: The digital trans-
|
| 973 |
+
formation of news media and the rise of disinformation and fake news (2018)
|
| 974 |
+
12. Maurer, P., Beiler, M.: Networking and political alignment as strategies to con-
|
| 975 |
+
trol the news: Interaction between journalists and politicians. Journalism Studies
|
| 976 |
+
19(14), 2024–2041 (2018)
|
| 977 |
+
13. Quezada, M., Pen˜a-Araya, V., Poblete, B.: Location-aware model for news events
|
| 978 |
+
in social media. In: Proceedings of the 38th International ACM SIGIR Conference
|
| 979 |
+
on Research and Development in Information Retrieval. pp. 935–938 (2015)
|
| 980 |
+
14. Rao, V., Sachdev, J.: A machine learning approach to classify news articles based
|
| 981 |
+
on location. In: 2017 International Conference on Intelligent Sustainable Systems
|
| 982 |
+
(ICISS). pp. 863–867. IEEE (2017)
|
| 983 |
+
15. Segev, E.: Visible and invisible countries: News flow theory revised. Journalism
|
| 984 |
+
16(3), 412–428 (2015)
|
| 985 |
+
16. Segev, E., Hills, T.: When news and memory come apart: A cross-national com-
|
| 986 |
+
parison of countries’ mentions. International Communication Gazette 76(1), 67–85
|
| 987 |
+
(2014)
|
| 988 |
+
17. Shu, K., Zhou, X., Wang, S., Zafarani, R., Liu, H.: The role of user profiles for fake
|
| 989 |
+
news detection. In: Proceedings of the 2019 IEEE/ACM international conference
|
| 990 |
+
on advances in social networks analysis and mining. pp. 436–439 (2019)
|
| 991 |
+
18. Sittar, A., Mladeni´c, D., Erjavec, T.: A dataset for information spreading over the
|
| 992 |
+
news. In: Proc. of Slovenian KDD Conf. on Data Mining and Data Warehouses
|
| 993 |
+
(SiKDD) (2020)
|
| 994 |
+
|
| 995 |
+
14
|
| 996 |
+
A. Sittar et al.
|
| 997 |
+
|
| 998 |
+
|
| 999 |
+
19. Watanabe, K., Ochi, M., Okabe, M., Onai, R.: Jasmine: a real-time local-event
|
| 1000 |
+
detection system based on geolocation information propagated to microblogs. In:
|
| 1001 |
+
Proceedings of the 20th ACM international conference on Information and knowl-
|
| 1002 |
+
edge management. pp. 2541–2544 (2011)
|
| 1003 |
+
20. Wei, H., Sankaranarayanan, J., Samet, H.: Enhancing local live tweet stream to
|
| 1004 |
+
detect news. GeoInformatica pp. 1–31 (2020)
|
| 1005 |
+
21. Wu, H.D.: A brave new world for international news? exploring the determinants of
|
| 1006 |
+
the coverage of foreign news on us websites. International Communication Gazette
|
| 1007 |
+
69(6), 539–551 (2007)
|
| 1008 |
+
|
BtFKT4oBgHgl3EQfXS78/content/tmp_files/2301.11794v1.pdf.txt
ADDED
|
@@ -0,0 +1,1249 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Thermodynamic features of the 1D dilute Ising model
|
| 2 |
+
in the external magnetic field
|
| 3 |
+
A.V. Shadrina,∗, Yu.D. Panova
|
| 4 |
+
aInstitute of Natural Sciences and Mathematics, Ural Federal University, 620002, 19 Mira
|
| 5 |
+
street, Ekaterinburg, Russia
|
| 6 |
+
Abstract
|
| 7 |
+
We consider the effects of the magnetic field on the frustrated phase states of
|
| 8 |
+
the dilute Ising chain, especially, the behavior of the magnetic entropy change
|
| 9 |
+
and the isentropic dependence of the temperature on the magnetic field, which
|
| 10 |
+
are the key parameters of the magnetocaloric effect. The found temperature
|
| 11 |
+
dependences of entropy demonstrate the nonequivalence of frustrated phases in
|
| 12 |
+
the antiferromagnetic and ferromagnetic cases. In the antiferromagnetic case,
|
| 13 |
+
the nonzero magnetic field at certain parameters causes a charge ordering for
|
| 14 |
+
nonmagnetic impurities at a half-filling, while in the ferromagnetic case, the
|
| 15 |
+
magnetic field reduces the frustration of the ground state only partially. It is
|
| 16 |
+
also shown, that impurities radically change the magnetic Gr¨uneisen parameter
|
| 17 |
+
in comparison with the case of a pure Ising chain.
|
| 18 |
+
Keywords:
|
| 19 |
+
dilute Ising chain, frustrated magnets, magnetic entropy change
|
| 20 |
+
1. Introduction
|
| 21 |
+
One of the remarkable features of low-dimensional systems, such as deco-
|
| 22 |
+
rated Ising models [1–7], the anisotropic Potts chain [8], the diamond Hubbard
|
| 23 |
+
chain [9], is the presence, under certain parameters, of a frustrated ground state
|
| 24 |
+
for which the residual entropy is nonzero. Despite the absence of a real phase
|
| 25 |
+
transition at finite temperatures according to the Perron–Frobenius theorem for
|
| 26 |
+
square real matrices [10] the thermodynamic behavior near the boundaries be-
|
| 27 |
+
tween different phases of the ground state for these systems can exhibit striking
|
| 28 |
+
features. As shown in [11], if one of the phases has a nonzero residual entropy
|
| 29 |
+
that preserves continuity at the boundary with the other phase, then the ther-
|
| 30 |
+
modynamic characteristics of the system will demonstrate pseudo-transitions at
|
| 31 |
+
a finite temperature. Entropy, heat capacity, magnetization, and susceptibility
|
| 32 |
+
have similar features to the behavior of these properties at conventional phase
|
| 33 |
+
transitions, including the presence of quasicritical exponents [12].
|
| 34 |
+
∗Corresponding author
|
| 35 |
+
Email address: [email protected] (A.V. Shadrin)
|
| 36 |
+
Preprint submitted to Journal of Magnetism and Magnetic Materials
|
| 37 |
+
January 30, 2023
|
| 38 |
+
arXiv:2301.11794v1 [cond-mat.stat-mech] 27 Jan 2023
|
| 39 |
+
|
| 40 |
+
Recently, frustrated magnetic systems have also attracted the attention of
|
| 41 |
+
researchers due to the enhanced magnetocaloric effect in the vicinity of finite-
|
| 42 |
+
field transitions [13, 14]. Besides to geometric factors, the impurities are also
|
| 43 |
+
the reason for the existence of frustrations in the magnetic system. The simplest
|
| 44 |
+
example of a magnetic system that is frustrated by impurities is a diluted Ising
|
| 45 |
+
chain. The Hamiltonian of 1D diluted Ising model can be written in the following
|
| 46 |
+
form
|
| 47 |
+
H = −J
|
| 48 |
+
�
|
| 49 |
+
i
|
| 50 |
+
Sz,iSz,i+1 + V
|
| 51 |
+
�
|
| 52 |
+
i
|
| 53 |
+
P0,iP0,i+1 − h
|
| 54 |
+
�
|
| 55 |
+
i
|
| 56 |
+
Sz,i − µ
|
| 57 |
+
�
|
| 58 |
+
i
|
| 59 |
+
P0,i.
|
| 60 |
+
(1)
|
| 61 |
+
Here we use the S = 1 pseudospin operators. The states for a given lattice
|
| 62 |
+
site with the pseudospin projections Sz = ±1 correspond to the two magnetic
|
| 63 |
+
states with the conventional spin projections sz = ±1/2, while the state with
|
| 64 |
+
Sz = 0 corresponds to the charged nonmagnetic state. Sz,i is a z-projection of
|
| 65 |
+
the on-site pseudospin operator, P0,i = 1 − S2
|
| 66 |
+
z,i is the projection operator onto
|
| 67 |
+
the Sz = 0 state, J is the exchange constant, V > 0 is the inter-site correlation
|
| 68 |
+
parameter for impurities, h is an external magnetic field, and µ is a chemical
|
| 69 |
+
potential for impurities. Further we will assume that nonmagnetic impurities
|
| 70 |
+
are mobile, which corresponds to the annealed system.
|
| 71 |
+
As well known [15],
|
| 72 |
+
V = V0 + V1 − 2V01 describes the interaction for a more general case:
|
| 73 |
+
V0
|
| 74 |
+
�
|
| 75 |
+
i
|
| 76 |
+
P0,iP0,i+1 + V1
|
| 77 |
+
�
|
| 78 |
+
i
|
| 79 |
+
P1,iP1,i+1 + V01
|
| 80 |
+
�
|
| 81 |
+
i
|
| 82 |
+
�
|
| 83 |
+
P0,iP1,i+1 + P1,iP0,i+1
|
| 84 |
+
�
|
| 85 |
+
,
|
| 86 |
+
(2)
|
| 87 |
+
where P1 = S2
|
| 88 |
+
z, is the projection operator onto magnetic states. The solutions
|
| 89 |
+
and various thermodynamic properties of the 1D dilute Ising model at zero
|
| 90 |
+
external magnetic field was found in [16–20]. If h ̸= 0, then there are no explicit
|
| 91 |
+
analytical expressions for various thermodynamic functions of the model (1). It
|
| 92 |
+
is known the account of magnetic field for the S = 1 Ising chain significantly
|
| 93 |
+
expands the list of possible phase states of the system and leads to various
|
| 94 |
+
features of thermodynamic behavior [21, 22].
|
| 95 |
+
In the present paper, we consider the effects of the magnetic field on the
|
| 96 |
+
frustrated phase states of the model (1). We focused on the behavior of entropy
|
| 97 |
+
and, in particular, on the magnetic entropy change, which is the key parameter
|
| 98 |
+
of the magnetocaloric effect.
|
| 99 |
+
Also, we explore the isentropic dependence of
|
| 100 |
+
the temperature on the magnetic field. The paper is organized as follows. We
|
| 101 |
+
briefly describe the methods in section 2, and section 3 the results, including
|
| 102 |
+
the ground state phase diagram, and their discussions are given. Conclusions
|
| 103 |
+
are presented in section 4.
|
| 104 |
+
2. Methods
|
| 105 |
+
We define the transfer matrix for the model (1) as
|
| 106 |
+
τ =
|
| 107 |
+
�
|
| 108 |
+
�
|
| 109 |
+
xz
|
| 110 |
+
z1/2 t1/2
|
| 111 |
+
x−1
|
| 112 |
+
z1/2 t1/2
|
| 113 |
+
y−1t
|
| 114 |
+
z−1/2 t1/2
|
| 115 |
+
x−1
|
| 116 |
+
z−1/2 t1/2
|
| 117 |
+
xz−1
|
| 118 |
+
�
|
| 119 |
+
� ,
|
| 120 |
+
(3)
|
| 121 |
+
2
|
| 122 |
+
|
| 123 |
+
where x = eβJ, y = eβV , z = eβh, t = eβµ and β = 1/T, and we assume kB = 1.
|
| 124 |
+
From (3), we found the characteristic equation for the eigenvalues λi:
|
| 125 |
+
λ3 − λ2 �
|
| 126 |
+
ty−1 + x(z + z−1)
|
| 127 |
+
�
|
| 128 |
+
− λ
|
| 129 |
+
�
|
| 130 |
+
x2 − x−2 + t
|
| 131 |
+
�
|
| 132 |
+
xy−1 − 1
|
| 133 |
+
�
|
| 134 |
+
(z + z−1)
|
| 135 |
+
�
|
| 136 |
+
− 2t(x − x−1) − tx−2y−1 = 0.
|
| 137 |
+
(4)
|
| 138 |
+
The eigenvalues in a general case are cumbersome functions, but at h = 0 they
|
| 139 |
+
could be reduced to the known expressions [20]:
|
| 140 |
+
λ1,2
|
| 141 |
+
=
|
| 142 |
+
1
|
| 143 |
+
2
|
| 144 |
+
�
|
| 145 |
+
x + x−1 + y−1t
|
| 146 |
+
�
|
| 147 |
+
±
|
| 148 |
+
�
|
| 149 |
+
2t + 1
|
| 150 |
+
4
|
| 151 |
+
�
|
| 152 |
+
x + x−1 − y−1t
|
| 153 |
+
�2�1/2
|
| 154 |
+
,
|
| 155 |
+
λ3
|
| 156 |
+
=
|
| 157 |
+
x − x−1.
|
| 158 |
+
(5)
|
| 159 |
+
According to the Perron–Frobenius theorem [10], there is only one maximum
|
| 160 |
+
eigenvalue, λ1, and in the thermodynamic limit we obtain the grand potential
|
| 161 |
+
and the entropy in the following form:
|
| 162 |
+
Ω = Nω = −NT ln λ1,
|
| 163 |
+
S = −
|
| 164 |
+
� ∂ω
|
| 165 |
+
∂T
|
| 166 |
+
�
|
| 167 |
+
h,µ
|
| 168 |
+
= ln λ1 + T
|
| 169 |
+
λ1
|
| 170 |
+
�∂λ1
|
| 171 |
+
∂T
|
| 172 |
+
�
|
| 173 |
+
h,µ
|
| 174 |
+
.
|
| 175 |
+
(6)
|
| 176 |
+
The grand potential and entropy found depend on parameters J, V , h, µ, and
|
| 177 |
+
T. But in the present problem, it is more convenient to use the concentration n
|
| 178 |
+
of impurities as an external parameter. The dependence n(µ) can be obtained
|
| 179 |
+
from the equation
|
| 180 |
+
n = −
|
| 181 |
+
�∂ω
|
| 182 |
+
∂µ
|
| 183 |
+
�
|
| 184 |
+
T,h
|
| 185 |
+
= T
|
| 186 |
+
λ1
|
| 187 |
+
�∂λ1
|
| 188 |
+
∂µ
|
| 189 |
+
�
|
| 190 |
+
T,h
|
| 191 |
+
.
|
| 192 |
+
(7)
|
| 193 |
+
In a general case h ̸= 0, we used numerical methods to get the inverse
|
| 194 |
+
dependence µ(n) and fix the concentration of impurities n at all temperatures.
|
| 195 |
+
If h = 0, we obtain the explicit expressions [20]:
|
| 196 |
+
µ = ln
|
| 197 |
+
�
|
| 198 |
+
y
|
| 199 |
+
�
|
| 200 |
+
x + x−1� g + m
|
| 201 |
+
g − m
|
| 202 |
+
�
|
| 203 |
+
,
|
| 204 |
+
(8)
|
| 205 |
+
S = 1
|
| 206 |
+
2 ln 2 (1 + 2g)2
|
| 207 |
+
1 − 4m2
|
| 208 |
+
+ g + 2m2
|
| 209 |
+
1 + 2g
|
| 210 |
+
ln y − m ln
|
| 211 |
+
��
|
| 212 |
+
x + x−1� g + m
|
| 213 |
+
g − m
|
| 214 |
+
�
|
| 215 |
+
− (1 − 2m) (g − m)
|
| 216 |
+
�
|
| 217 |
+
x − x−1�
|
| 218 |
+
(1 + 2g) (x + x−1) ln x,
|
| 219 |
+
(9)
|
| 220 |
+
where
|
| 221 |
+
g =
|
| 222 |
+
�
|
| 223 |
+
m2 + 1
|
| 224 |
+
2
|
| 225 |
+
�1
|
| 226 |
+
4 − m2
|
| 227 |
+
�
|
| 228 |
+
y−1 �
|
| 229 |
+
x + x−1��1/2
|
| 230 |
+
,
|
| 231 |
+
(10)
|
| 232 |
+
and we introduced the deviation of the concentration of impurities from half-
|
| 233 |
+
filling, m = n − 1/2.
|
| 234 |
+
3
|
| 235 |
+
|
| 236 |
+
The knowledge of the entropy from Eqs. (6,7) gives an opportunity to explore
|
| 237 |
+
magnetocaloric properties of the dilute Ising chain for a given n. We explore the
|
| 238 |
+
magnetic entropy change, the isentropic dependencies of the temperature on the
|
| 239 |
+
magnetic field and the magnetic Gr¨uneisen parameter, which can be calculated
|
| 240 |
+
from the relation
|
| 241 |
+
Γmag = 1
|
| 242 |
+
T
|
| 243 |
+
�∂T
|
| 244 |
+
∂h
|
| 245 |
+
�
|
| 246 |
+
S,n
|
| 247 |
+
= − 1
|
| 248 |
+
T
|
| 249 |
+
(∂S/∂h)T,n
|
| 250 |
+
(∂S/∂T)h,n
|
| 251 |
+
.
|
| 252 |
+
(11)
|
| 253 |
+
The explicit expression that we use to calculate Γmag for a given n in variables
|
| 254 |
+
(T, h, µ) has the following form:
|
| 255 |
+
Γmag = − 1
|
| 256 |
+
T
|
| 257 |
+
�
|
| 258 |
+
(∂S/∂h)T,µ (∂n/∂µ)T,h − (∂S/∂µ)T,h (∂n/∂h)T,µ
|
| 259 |
+
(∂S/∂T)h,µ (∂n/∂µ)T,h − (∂S/∂µ)T,h (∂n/∂T)h,µ
|
| 260 |
+
�
|
| 261 |
+
.
|
| 262 |
+
(12)
|
| 263 |
+
3. Results
|
| 264 |
+
3.1. Phase diagram at zero temperature.
|
| 265 |
+
The phase diagram of the dilute Ising chain in longitudinal magnetic field at
|
| 266 |
+
zero temperature is shown in Fig. 1 for the J − h plane. The limiting case for
|
| 267 |
+
the Ising chain without impurities, m = −1/2, is given in Fig. 1(a). Two ground
|
| 268 |
+
states, the ferromagnetic (FM) state with magnetic moment oriented towards
|
| 269 |
+
the field, and the antiferromagnetic (AFM) state with zero magnetic moment,
|
| 270 |
+
are separated by the critical value of magnetic field |hc| = −2J at which the spin-
|
| 271 |
+
flip transition occurs. Figures 1(b) and 1(c) show the cases of a weakly diluted
|
| 272 |
+
chain, −1/2 < m < 0, and a strongly diluted chain, 0 ≤ m < 1/2, respectively.
|
| 273 |
+
Dilution with impurities leads to the appearance of two new boundary lines on
|
| 274 |
+
the J − h plane, J = V and |h| = −J − V . If J > V , the ground state is
|
| 275 |
+
represented by macroscopic FM domains (or drops) separated by macroscopic
|
| 276 |
+
impurity domains.
|
| 277 |
+
Similarly, the AFM domains arise when J < −V − |h|.
|
| 278 |
+
Schematically, this is shown in Fig. 1(b,c), where the arrows correspond to the
|
| 279 |
+
spins, and the circles correspond to the impurities. For both FM and AFM
|
| 280 |
+
phases, the entropy is zero.
|
| 281 |
+
Analysis of the ground state of the model (1) in zero magnetic field shows [19,
|
| 282 |
+
20] that phases with the nonzero residual entropy exist at |J| < V and at
|
| 283 |
+
|J| = V . For the weak exchange, when |J| < V , the spin correlation length is
|
| 284 |
+
always finite, but the impurity correlation length with the temperature lowering
|
| 285 |
+
tends to infinity at the half-filling concentration, m = 0, due to the formation of
|
| 286 |
+
charge ordering [20]. If |J| = V and h = 0, the spin correlation length and the
|
| 287 |
+
impurity correlation length are finite for all values of the impurity concentration
|
| 288 |
+
and temperature.
|
| 289 |
+
In magnetic field, if −V − |h| < J < V , the residual entropy is also not zero,
|
| 290 |
+
so the ground state is frustrated. If −1/2 < m < 0, the ground state of the
|
| 291 |
+
chain is a set of finite AFM or FM spin clusters separated by impurities. This
|
| 292 |
+
state we call frustrated ferromagnetic (FR-FM) or frustrated antiferromagnetic
|
| 293 |
+
(FR-AFM) respectively.
|
| 294 |
+
The FR-FM and FR-AFM states separated by the
|
| 295 |
+
4
|
| 296 |
+
|
| 297 |
+
J
|
| 298 |
+
J
|
| 299 |
+
J
|
| 300 |
+
h
|
| 301 |
+
h
|
| 302 |
+
h
|
| 303 |
+
V
|
| 304 |
+
V
|
| 305 |
+
-V
|
| 306 |
+
-V
|
| 307 |
+
|h|=-V-J
|
| 308 |
+
|h|=-V-J
|
| 309 |
+
|h|=-2J
|
| 310 |
+
|h|=-2J
|
| 311 |
+
0 Ј m < 0.5
|
| 312 |
+
-0.5 < m < 0
|
| 313 |
+
m = -0.5
|
| 314 |
+
(b)
|
| 315 |
+
(a)
|
| 316 |
+
(c)
|
| 317 |
+
AFM
|
| 318 |
+
AFM
|
| 319 |
+
AFM
|
| 320 |
+
FR-PM
|
| 321 |
+
FR-AFM
|
| 322 |
+
FR-FM
|
| 323 |
+
FM
|
| 324 |
+
FM
|
| 325 |
+
FM
|
| 326 |
+
0
|
| 327 |
+
0
|
| 328 |
+
0
|
| 329 |
+
Figure 1:
|
| 330 |
+
Phase diagram at zero temperature for a dilute Ising chain in a longitudinal
|
| 331 |
+
magnetic field: (a) the Ising chain without impurities, n = 0, (b) the case of a weakly diluted
|
| 332 |
+
chain, (c) the case of a strongly diluted chain.
|
| 333 |
+
5
|
| 334 |
+
|
| 335 |
+
spin-flip line, |h| = −2J, as it is shown in Fig. 1(b). In the strongly diluted
|
| 336 |
+
case, 0 ≤ m < 1/2, there are single spins separated by impurity clusters, and
|
| 337 |
+
the system exhibits a paramagnetic response, which is uniform over the entire
|
| 338 |
+
range −V −|h| < J < V . This frustrated paramagnetic (FR-PM) state is shown
|
| 339 |
+
in Fig. 1(c).
|
| 340 |
+
3.2. The magnetic entropy change.
|
| 341 |
+
Temperature dependences of the entropy S and the magnetic entropy change,
|
| 342 |
+
∆S = S(h = 0)−S(h ̸= 0), are shown in Fig. 2 for the antiferromagnetic (AFM)
|
| 343 |
+
sign of the exchange constant, J < 0, and in Fig. 3 for the ferromagnetic (FM)
|
| 344 |
+
sign, J > 0. The correlation parameter for impurities V accepted and used as
|
| 345 |
+
a positive scaling factor.
|
| 346 |
+
Fig. 2 shows the temperature dependences of the entropy for J/V = −1,
|
| 347 |
+
h = 0 in panel (a), and for J/V = −1, h/V = 0.5 in panel (b). If at h = 0 the
|
| 348 |
+
entropy monotonically depends on |m| and has a maximum at m = 0, at h ̸= 0
|
| 349 |
+
the dependence on |m| has a local minimum at m = 0. The magnetic entropy
|
| 350 |
+
change for J/V = −1 is shown in panel (c). The maximum ∆S for all m is
|
| 351 |
+
achieved at T = 0 and also has a minimum with ∆S < 0 at finite temperature
|
| 352 |
+
for small values of impurity concentrations.
|
| 353 |
+
It is worth noting that in the AFM chain, for any value of the applied
|
| 354 |
+
magnetic field, we get zero entropy at m = 0, because there is only one way to
|
| 355 |
+
minimize the energy: alternating spins and charges, and all spins are oriented
|
| 356 |
+
along the magnetic field. In a certain sense, in this case we get a kind of magneto-
|
| 357 |
+
electric effect: an external magnetic field causes a charge ordering. This also
|
| 358 |
+
gives us the maximum change in entropy at half-filling.
|
| 359 |
+
The temperature dependences of the entropy for J/V = −0, 5, h = 0 are
|
| 360 |
+
shown in Fig. 2(d), and for J/V = −0.5, h/V = 0.5 in Fig. 2(e).
|
| 361 |
+
The de-
|
| 362 |
+
pendences of S on |m| have a local minimum at m = 0 both at h = 0 and at
|
| 363 |
+
h/V = 0.5. The magnetic entropy change for J/V = −0.5 is shown in Fig. 2(f).
|
| 364 |
+
In a contrast to the previous case, the ∆S dependences show a maximum at
|
| 365 |
+
finite temperature for some m ≥ 0, and also show a minimum with ∆S < 0 at
|
| 366 |
+
finite temperature in some range for m < 0.
|
| 367 |
+
Fig. 3 shows the temperature dependences of the entropy for J/V = 1, h = 0
|
| 368 |
+
in panel (a), and for J/V = 1, h/V = 0.5 in panel (b). The magnetic entropy
|
| 369 |
+
change for J/V = 1 is shown in panel (c). Both at h = 0 and h ̸= 0 the entropy
|
| 370 |
+
monotonically depends on |m| and has a maximum at m = 0. The magnetic
|
| 371 |
+
entropy change has a maximum at finite temperature for some m < 0, and near
|
| 372 |
+
the m = 0 it also has a local minimum at a finite temperature. In the case
|
| 373 |
+
of FM, we will not get the same effect at h > 0 as for J/V = −1, because it
|
| 374 |
+
makes no sense to split the spin clusters into more than one spin in order to
|
| 375 |
+
minimize the energy. But the entropy is still slightly reduced, because there is
|
| 376 |
+
no ordering chaos for different the spin clusters: they will all be oriented by a
|
| 377 |
+
magnetic field.
|
| 378 |
+
The temperature dependences of the entropy for J/V = 0.5, h = 0 are
|
| 379 |
+
shown Fig. 3 in panel (d), and for J/V = 0.5, h/V = 0.5 in panel (e). The
|
| 380 |
+
6
|
| 381 |
+
|
| 382 |
+
-0.1
|
| 383 |
+
0.0
|
| 384 |
+
0.1
|
| 385 |
+
0.2
|
| 386 |
+
0.3
|
| 387 |
+
0.4
|
| 388 |
+
0.5
|
| 389 |
+
0.0
|
| 390 |
+
0.5
|
| 391 |
+
1.0
|
| 392 |
+
1.5
|
| 393 |
+
2.0
|
| 394 |
+
S
|
| 395 |
+
S
|
| 396 |
+
S
|
| 397 |
+
S
|
| 398 |
+
T/V
|
| 399 |
+
T/V
|
| 400 |
+
T/V
|
| 401 |
+
T/V
|
| 402 |
+
T/V
|
| 403 |
+
T/V
|
| 404 |
+
0.0
|
| 405 |
+
0.5
|
| 406 |
+
1.0
|
| 407 |
+
1.5
|
| 408 |
+
2.0
|
| 409 |
+
0.0
|
| 410 |
+
0.2
|
| 411 |
+
0.4
|
| 412 |
+
0.6
|
| 413 |
+
0.8
|
| 414 |
+
1.0
|
| 415 |
+
0.0
|
| 416 |
+
0.5
|
| 417 |
+
1.0
|
| 418 |
+
1.5
|
| 419 |
+
2.0
|
| 420 |
+
0.0
|
| 421 |
+
0.2
|
| 422 |
+
0.4
|
| 423 |
+
0.6
|
| 424 |
+
0.8
|
| 425 |
+
1.0
|
| 426 |
+
0.0
|
| 427 |
+
0.5
|
| 428 |
+
1.0
|
| 429 |
+
1.5
|
| 430 |
+
2.0
|
| 431 |
+
0.0
|
| 432 |
+
0.2
|
| 433 |
+
0.4
|
| 434 |
+
0.6
|
| 435 |
+
0.8
|
| 436 |
+
1.0
|
| 437 |
+
0.0
|
| 438 |
+
0.5
|
| 439 |
+
1.0
|
| 440 |
+
1.5
|
| 441 |
+
2.0
|
| 442 |
+
0.0
|
| 443 |
+
0.2
|
| 444 |
+
0.4
|
| 445 |
+
0.6
|
| 446 |
+
0.8
|
| 447 |
+
1.0
|
| 448 |
+
0.0
|
| 449 |
+
0.5
|
| 450 |
+
1.0
|
| 451 |
+
1.5
|
| 452 |
+
2.0
|
| 453 |
+
0.0
|
| 454 |
+
0.2
|
| 455 |
+
0.4
|
| 456 |
+
0.6
|
| 457 |
+
0.8
|
| 458 |
+
DS
|
| 459 |
+
DS
|
| 460 |
+
(a)
|
| 461 |
+
(b)
|
| 462 |
+
(c)
|
| 463 |
+
(d)
|
| 464 |
+
(e)
|
| 465 |
+
(f)
|
| 466 |
+
0.5
|
| 467 |
+
0.4
|
| 468 |
+
0.3
|
| 469 |
+
0.2
|
| 470 |
+
0.1
|
| 471 |
+
-0.5
|
| 472 |
+
-0.4
|
| 473 |
+
-0.3
|
| 474 |
+
-0.2
|
| 475 |
+
-0.1
|
| 476 |
+
0.
|
| 477 |
+
0.
|
| 478 |
+
-0.4
|
| 479 |
+
-0.5
|
| 480 |
+
-0.3
|
| 481 |
+
0.5
|
| 482 |
+
0.4
|
| 483 |
+
0.3
|
| 484 |
+
0.2
|
| 485 |
+
0.1
|
| 486 |
+
-0.1
|
| 487 |
+
0.5
|
| 488 |
+
0.5
|
| 489 |
+
0.4
|
| 490 |
+
0.4
|
| 491 |
+
0.3
|
| 492 |
+
0.3
|
| 493 |
+
0.2
|
| 494 |
+
0.2
|
| 495 |
+
0.1
|
| 496 |
+
0.1
|
| 497 |
+
-0.5
|
| 498 |
+
-0.4
|
| 499 |
+
0.
|
| 500 |
+
0.
|
| 501 |
+
-0.3
|
| 502 |
+
-0.2
|
| 503 |
+
-0.1
|
| 504 |
+
-0.2
|
| 505 |
+
-0.5
|
| 506 |
+
-0.1
|
| 507 |
+
-0.2
|
| 508 |
+
-0.3
|
| 509 |
+
-0.4
|
| 510 |
+
0.
|
| 511 |
+
-0.5
|
| 512 |
+
0.
|
| 513 |
+
-0.4
|
| 514 |
+
-0.3
|
| 515 |
+
-0.2
|
| 516 |
+
-0.1
|
| 517 |
+
0.1
|
| 518 |
+
0.2
|
| 519 |
+
0.3
|
| 520 |
+
0.4
|
| 521 |
+
0.5
|
| 522 |
+
-0.1
|
| 523 |
+
-0.2
|
| 524 |
+
-0.3
|
| 525 |
+
-0.4
|
| 526 |
+
-0.5
|
| 527 |
+
0.1
|
| 528 |
+
0.2
|
| 529 |
+
0.3
|
| 530 |
+
0.4 0.5
|
| 531 |
+
Figure 2: (color online) Temperature dependences of the entropy S and the magnetic entropy
|
| 532 |
+
change ∆S in the AFM case (J < 0). Panels (a), (b), and (c) correspond to J/V = −1;
|
| 533 |
+
(d), (e), (f) – to J/V = −0.5. Panels (a) and (d) show the entropy S at h = 0, (b) and (e)
|
| 534 |
+
– at h/V = 0.5, (c) and (f) – the magnetic entropy change ∆S = S(h = 0) − S(h = 0.5).
|
| 535 |
+
The numbers near lines correspond to the deviation of the impurity concentration n from
|
| 536 |
+
half-filling, m = n − 1/2. Solid (dashed) lines correspond to m ≤ 0 (m > 0).
|
| 537 |
+
7
|
| 538 |
+
|
| 539 |
+
S
|
| 540 |
+
S
|
| 541 |
+
S
|
| 542 |
+
S
|
| 543 |
+
T/V
|
| 544 |
+
T/V
|
| 545 |
+
T/V
|
| 546 |
+
T/V
|
| 547 |
+
T/V
|
| 548 |
+
T/V
|
| 549 |
+
0.0
|
| 550 |
+
0.2
|
| 551 |
+
0.4
|
| 552 |
+
0.6
|
| 553 |
+
0.8
|
| 554 |
+
1.0
|
| 555 |
+
0.0
|
| 556 |
+
0.5
|
| 557 |
+
1.0
|
| 558 |
+
1.5
|
| 559 |
+
2.0
|
| 560 |
+
0.0
|
| 561 |
+
0.1
|
| 562 |
+
0.2
|
| 563 |
+
0.3
|
| 564 |
+
DS
|
| 565 |
+
DS
|
| 566 |
+
0.0
|
| 567 |
+
0.5
|
| 568 |
+
1.0
|
| 569 |
+
1.5
|
| 570 |
+
2.0
|
| 571 |
+
0.0
|
| 572 |
+
0.1
|
| 573 |
+
0.2
|
| 574 |
+
0.3
|
| 575 |
+
0.4
|
| 576 |
+
0.0
|
| 577 |
+
0.5
|
| 578 |
+
1.0
|
| 579 |
+
1.5
|
| 580 |
+
2.0
|
| 581 |
+
0.0
|
| 582 |
+
0.5
|
| 583 |
+
1.0
|
| 584 |
+
1.5
|
| 585 |
+
2.0
|
| 586 |
+
0.0
|
| 587 |
+
0.2
|
| 588 |
+
0.4
|
| 589 |
+
0.6
|
| 590 |
+
0.8
|
| 591 |
+
1.0
|
| 592 |
+
0.0
|
| 593 |
+
0.5
|
| 594 |
+
1.0
|
| 595 |
+
1.5
|
| 596 |
+
2.0
|
| 597 |
+
0.0
|
| 598 |
+
0.2
|
| 599 |
+
0.4
|
| 600 |
+
0.6
|
| 601 |
+
0.8
|
| 602 |
+
1.0
|
| 603 |
+
0.0
|
| 604 |
+
0.5
|
| 605 |
+
1.0
|
| 606 |
+
1.5
|
| 607 |
+
2.0
|
| 608 |
+
0.0
|
| 609 |
+
0.2
|
| 610 |
+
0.4
|
| 611 |
+
0.6
|
| 612 |
+
0.8
|
| 613 |
+
1.0 (d)
|
| 614 |
+
(a)
|
| 615 |
+
(b)
|
| 616 |
+
(c)
|
| 617 |
+
(e)
|
| 618 |
+
(f)
|
| 619 |
+
0.5
|
| 620 |
+
0.5
|
| 621 |
+
0.4
|
| 622 |
+
0.4
|
| 623 |
+
0.3
|
| 624 |
+
0.3
|
| 625 |
+
0.2
|
| 626 |
+
0.2
|
| 627 |
+
0.1
|
| 628 |
+
0.1
|
| 629 |
+
-0.1
|
| 630 |
+
0.
|
| 631 |
+
0.
|
| 632 |
+
-0.5
|
| 633 |
+
-0.5
|
| 634 |
+
-0.4
|
| 635 |
+
-0.4
|
| 636 |
+
-0.3
|
| 637 |
+
-0.3
|
| 638 |
+
-0.2
|
| 639 |
+
-0.2
|
| 640 |
+
-0.1
|
| 641 |
+
0.5
|
| 642 |
+
0.5
|
| 643 |
+
0.4
|
| 644 |
+
0.4
|
| 645 |
+
0.3
|
| 646 |
+
0.3
|
| 647 |
+
-0.5
|
| 648 |
+
-0.5
|
| 649 |
+
-0.4
|
| 650 |
+
-0.4
|
| 651 |
+
-0.3
|
| 652 |
+
-0.3
|
| 653 |
+
0.
|
| 654 |
+
0.
|
| 655 |
+
0.2
|
| 656 |
+
0.2
|
| 657 |
+
0.1
|
| 658 |
+
0.1
|
| 659 |
+
-0.1
|
| 660 |
+
-0.1
|
| 661 |
+
-0.2
|
| 662 |
+
0.5
|
| 663 |
+
-0.5
|
| 664 |
+
0.4
|
| 665 |
+
-0.4
|
| 666 |
+
-0.3
|
| 667 |
+
-0.2
|
| 668 |
+
-0.1
|
| 669 |
+
0.
|
| 670 |
+
0.3
|
| 671 |
+
0.2
|
| 672 |
+
0.1
|
| 673 |
+
-0.5
|
| 674 |
+
-0.4
|
| 675 |
+
-0.3
|
| 676 |
+
0.
|
| 677 |
+
-0.2
|
| 678 |
+
-0.1
|
| 679 |
+
0.5
|
| 680 |
+
0.4
|
| 681 |
+
0.3
|
| 682 |
+
0.2
|
| 683 |
+
0.1
|
| 684 |
+
-0.2
|
| 685 |
+
Figure 3: (color online) Temperature dependences of the entropy S and the magnetic entropy
|
| 686 |
+
change ∆S in the FM case (J > 0). Panels (a), (b), and (c) correspond to J/V = 1; (d),
|
| 687 |
+
(e), (f) – to J/V = 0.5.
|
| 688 |
+
Panels (a) and (d) show the entropy S at h = 0, (b) and (e) –
|
| 689 |
+
at h/V = 0.5, (c) and (f) – the magnetic entropy change ∆S = S(h = 0) − S(h = 0.5).
|
| 690 |
+
The numbers near lines correspond to the deviation of the impurity concentration n from
|
| 691 |
+
half-filling, m = n − 1/2. Solid (dashed) lines correspond to m ≤ 0 (m > 0).
|
| 692 |
+
magnetic entropy change for J/V = 0.5 is shown in panel (f). Qualitatively,
|
| 693 |
+
the behavior of entropy differs from J/V = 1 case at some region near |m| = 0,
|
| 694 |
+
where the tendency to the charge ordering causes the decreasing of S. The ∆S
|
| 695 |
+
dependences also show local maxima at finite temperature in some range for
|
| 696 |
+
m < 0, and a monotonic behavior with maximal value at T = 0 for m ≥ 0. The
|
| 697 |
+
magnetic entropy change for FM case is always positive.
|
| 698 |
+
The concentration dependences of entropy at T/V = 0.05 shown in Fig. 4
|
| 699 |
+
allow estimating approximately the features of the residual entropy S0. The
|
| 700 |
+
dependences of S0 on m have the following form [20]:
|
| 701 |
+
S0 = ln
|
| 702 |
+
�1
|
| 703 |
+
2 + g0
|
| 704 |
+
�
|
| 705 |
+
+ 1
|
| 706 |
+
2 ln
|
| 707 |
+
2
|
| 708 |
+
1
|
| 709 |
+
4 − m2 − m ln g0 + m
|
| 710 |
+
g0 − m,
|
| 711 |
+
|J|/V = 1,
|
| 712 |
+
(13)
|
| 713 |
+
S0 = 1
|
| 714 |
+
2 ln
|
| 715 |
+
1
|
| 716 |
+
2 + |m|
|
| 717 |
+
1
|
| 718 |
+
2 − |m| + |m| ln
|
| 719 |
+
1
|
| 720 |
+
4 − m2
|
| 721 |
+
8m2
|
| 722 |
+
+ 1
|
| 723 |
+
2 ln 2,
|
| 724 |
+
|J|/V < 1,
|
| 725 |
+
(14)
|
| 726 |
+
where
|
| 727 |
+
g0 =
|
| 728 |
+
1
|
| 729 |
+
√
|
| 730 |
+
2
|
| 731 |
+
�1
|
| 732 |
+
4 + m2
|
| 733 |
+
�1/2
|
| 734 |
+
.
|
| 735 |
+
(15)
|
| 736 |
+
These expressions depend only on |m| and are identical for the AFM and FM
|
| 737 |
+
cases. The curves of S(h = 0) in Fig. 4(a) and (c), and in Fig. 4(b) and (d)
|
| 738 |
+
8
|
| 739 |
+
|
| 740 |
+
(d)
|
| 741 |
+
S
|
| 742 |
+
0.8
|
| 743 |
+
0.0
|
| 744 |
+
0.2
|
| 745 |
+
0.4
|
| 746 |
+
0.6
|
| 747 |
+
S
|
| 748 |
+
0.0
|
| 749 |
+
0.1
|
| 750 |
+
0.2
|
| 751 |
+
0.3
|
| 752 |
+
0.4
|
| 753 |
+
0.5
|
| 754 |
+
0.6
|
| 755 |
+
0.7
|
| 756 |
+
m
|
| 757 |
+
m
|
| 758 |
+
m
|
| 759 |
+
m
|
| 760 |
+
S
|
| 761 |
+
0.5
|
| 762 |
+
0.5
|
| 763 |
+
0.5
|
| 764 |
+
0.5
|
| 765 |
+
0.8
|
| 766 |
+
0.0
|
| 767 |
+
0.2
|
| 768 |
+
0.4
|
| 769 |
+
0.6
|
| 770 |
+
0.25
|
| 771 |
+
0.25
|
| 772 |
+
0.25
|
| 773 |
+
0.25
|
| 774 |
+
-0.25
|
| 775 |
+
-0.25
|
| 776 |
+
-0.25
|
| 777 |
+
-0.25
|
| 778 |
+
-0.5
|
| 779 |
+
-0.5
|
| 780 |
+
-0.5
|
| 781 |
+
-0.5
|
| 782 |
+
S
|
| 783 |
+
0.0
|
| 784 |
+
0.1
|
| 785 |
+
0.2
|
| 786 |
+
0.3
|
| 787 |
+
0.4
|
| 788 |
+
0.5
|
| 789 |
+
0.6
|
| 790 |
+
0.7
|
| 791 |
+
(a)
|
| 792 |
+
(c)
|
| 793 |
+
(b)
|
| 794 |
+
DS
|
| 795 |
+
DS
|
| 796 |
+
DS
|
| 797 |
+
DS
|
| 798 |
+
S(h=0)
|
| 799 |
+
S(h=0)
|
| 800 |
+
S(h=0)
|
| 801 |
+
S(h=0)
|
| 802 |
+
S(h№0)
|
| 803 |
+
S(h№0)
|
| 804 |
+
S(h№0)
|
| 805 |
+
S(h№0)
|
| 806 |
+
0.0
|
| 807 |
+
0.0
|
| 808 |
+
0.0
|
| 809 |
+
0.0
|
| 810 |
+
Figure 4: (color online) The dependence of the entropy S (solid lines) and the magnetic entropy
|
| 811 |
+
change ∆S (dashed lines) on the deviation of the impurity concentration n from half-filling,
|
| 812 |
+
m = n − 1/2, at T/V = 0.05. Panel (a) corresponds to J/V = −1, (b) – to J/V = −0.5, (c)
|
| 813 |
+
– to J/V = 1, and (d) – to J/V = 0.5.
|
| 814 |
+
confirm this property. For h ̸= 0 the concentration dependences of the residual
|
| 815 |
+
entropy become asymmetric with respect to m = 0 for AFM case, but save
|
| 816 |
+
the symmetry in FM case. The same dependence for the AFM and FM cases
|
| 817 |
+
holds only at m > 0 for |J| < V , when the ground state consists of single spins
|
| 818 |
+
separated by nonmagnetic impurities, and the sign of the exchange constant has
|
| 819 |
+
no effect.
|
| 820 |
+
3.3. The isentropic dependence of the temperature on the magnetic field.
|
| 821 |
+
Fig. 5 shows the isentropic lines in the h − T parameter plane for the fer-
|
| 822 |
+
romagnetic sign of exchange constant, J > 0.
|
| 823 |
+
For the Ising chain without
|
| 824 |
+
impurities, the isentropes slope near the critical field hc = 0 is almost vertical
|
| 825 |
+
that leads to extremely high and narrow peak of the Gr¨uneisen parameter [23],
|
| 826 |
+
which is proportional to e2J/T at h ∝ T e−2J/T . The impurities change this
|
| 827 |
+
9
|
| 828 |
+
|
| 829 |
+
h/V
|
| 830 |
+
T/ V
|
| 831 |
+
T/ V
|
| 832 |
+
T/ V
|
| 833 |
+
0.01
|
| 834 |
+
0.1
|
| 835 |
+
0.3
|
| 836 |
+
0.55
|
| 837 |
+
0.65
|
| 838 |
+
0.75
|
| 839 |
+
0.85
|
| 840 |
+
0.95
|
| 841 |
+
0.5
|
| 842 |
+
0.5
|
| 843 |
+
0.55
|
| 844 |
+
0.55
|
| 845 |
+
0.6
|
| 846 |
+
0.6
|
| 847 |
+
0.65
|
| 848 |
+
0.7
|
| 849 |
+
-3
|
| 850 |
+
10
|
| 851 |
+
-6
|
| 852 |
+
10
|
| 853 |
+
-0.4
|
| 854 |
+
-0.2
|
| 855 |
+
0.0
|
| 856 |
+
0.2
|
| 857 |
+
0.4
|
| 858 |
+
0.1
|
| 859 |
+
0.3
|
| 860 |
+
0.5
|
| 861 |
+
0.7
|
| 862 |
+
0.1
|
| 863 |
+
0.3
|
| 864 |
+
0.5
|
| 865 |
+
0.7
|
| 866 |
+
0.1
|
| 867 |
+
0.3
|
| 868 |
+
0.5
|
| 869 |
+
0.7
|
| 870 |
+
n=0
|
| 871 |
+
n=0.25
|
| 872 |
+
n=0.75
|
| 873 |
+
0.1
|
| 874 |
+
0.135
|
| 875 |
+
0.15
|
| 876 |
+
0.2
|
| 877 |
+
0.25
|
| 878 |
+
-0.4
|
| 879 |
+
-0.2
|
| 880 |
+
0.0
|
| 881 |
+
0.2
|
| 882 |
+
0.4
|
| 883 |
+
0.2
|
| 884 |
+
0.5
|
| 885 |
+
0.65
|
| 886 |
+
0.75
|
| 887 |
+
0.85
|
| 888 |
+
h/V
|
| 889 |
+
0.1
|
| 890 |
+
0.3
|
| 891 |
+
0.5
|
| 892 |
+
0.7
|
| 893 |
+
T/ V
|
| 894 |
+
0.1
|
| 895 |
+
0.3
|
| 896 |
+
0.5
|
| 897 |
+
0.7
|
| 898 |
+
T/ V
|
| 899 |
+
0.1
|
| 900 |
+
0.3
|
| 901 |
+
0.5
|
| 902 |
+
0.7
|
| 903 |
+
T/ V
|
| 904 |
+
-5
|
| 905 |
+
10
|
| 906 |
+
0.01
|
| 907 |
+
0.05
|
| 908 |
+
-8
|
| 909 |
+
10
|
| 910 |
+
-3
|
| 911 |
+
10
|
| 912 |
+
n=0
|
| 913 |
+
n=0.03
|
| 914 |
+
n=0.5
|
| 915 |
+
(a)
|
| 916 |
+
(b)
|
| 917 |
+
Figure 5:
|
| 918 |
+
The isentropic lines in the h − T parameter plane (a) for J/V = 1.3 and (b) for
|
| 919 |
+
J/V = 0.5. The value of the impurity concentration n is given in the frame. The numbers
|
| 920 |
+
next to the lines show the entropy values.
|
| 921 |
+
picture drastically: the entropy value increases by several orders of magnitude,
|
| 922 |
+
and the isentropes slope near hc = 0 remains finite.
|
| 923 |
+
The magnetic Gr¨uneisen parameter can be rewritten [24] in the scaling form
|
| 924 |
+
as
|
| 925 |
+
Γmag = −Gr
|
| 926 |
+
1
|
| 927 |
+
h − hc
|
| 928 |
+
,
|
| 929 |
+
(16)
|
| 930 |
+
where −Gr is a prefactor, and hc is a critical magnetic field. Fig. 6 shows the
|
| 931 |
+
value −Gr for hc = 0 as a function of T and h for J/V = 1.3, n = 0.03 in
|
| 932 |
+
panel (a), and for J/V = 0.5, n = 0.25 in panel (b). As can be seen, in both
|
| 933 |
+
cases, impurities lead to suppression of the singular behavior of the magnetic
|
| 934 |
+
Gr¨uneisen parameter which is observed for the Ising chain without impurities.
|
| 935 |
+
At low temperatures, in the FR-FM state, the system behaves like an ideal
|
| 936 |
+
paramagnet near h = 0 with a prefactor value −Gr = 1 [24].
|
| 937 |
+
Fig. 7 shows the isentropic lines in the h − T parameter plane for the anti-
|
| 938 |
+
ferromagnetic sign of exchange constant, J < 0. The case of a moderate value
|
| 939 |
+
of the exchange constant, J/V = −1.3, is given in panel (a). In the absence of
|
| 940 |
+
impurities, there is practically no dependence of entropy on the magnetic field.
|
| 941 |
+
Impurities lead to an increase in the entropy of the system by several orders
|
| 942 |
+
of magnitude and the appearance of two critical values of the magnetic field,
|
| 943 |
+
10
|
| 944 |
+
|
| 945 |
+
(a)
|
| 946 |
+
(b)
|
| 947 |
+
Figure 6: (color online) The prefactor of the Gr¨uneisen parameter −Gr (a) for J/V = 1.3,
|
| 948 |
+
n = 0.03, (b) for J/V = 0.5, n = 0.25.
|
| 949 |
+
|hc| = −J − V , which correspond to the transition lines from AFM to FR-AFM
|
| 950 |
+
or FR-PM states. It is worth to note, that for comparable values of |J| and
|
| 951 |
+
V , the critical field |hc| = −J − V can be much smaller than the spin-flip field
|
| 952 |
+
|hc| = −2J. The case of a small exchange constant, J/V = −0.15, is given
|
| 953 |
+
in panel (b). Without impurities, the system has two critical spin-flip fields,
|
| 954 |
+
|hc| = −2J. Impurities lead to the appearance of a critical field hc = 0. As
|
| 955 |
+
a result, there are three critical fields for a weakly diluted case, and only one
|
| 956 |
+
critical field hc = 0 for a strongly diluted case.
|
| 957 |
+
Fig. 8 shows the prefactor of the magnetic Gr¨uneisen parameter as a function
|
| 958 |
+
of T and h near the corresponding critical fields: for J/V = −1.3, n = 0.25,
|
| 959 |
+
hc/V = −1 − J/V = 0.3 in panel (a), for J/V = −0.15, n = 0.25, hc = 0 in
|
| 960 |
+
panel (b), and for J/V = −0.15, n = 0.25, hc/V = −2J/V = 0.3 in panel (c).
|
| 961 |
+
In all cases, the prefactor tends to −Gr = 1 at sufficiently low temperatures.
|
| 962 |
+
4. Conclusion
|
| 963 |
+
We examined the effects of the magnetic field on the frustrated phase states
|
| 964 |
+
of the dilute Ising chain.
|
| 965 |
+
The temperature dependences of entropy and the
|
| 966 |
+
magnetic entropy change show the nonequivalence of frustrated phases in AFM
|
| 967 |
+
and FM cases. The largest effect is achieved when |J|/V = 1. In the AFM case,
|
| 968 |
+
J/V = −1, the nonzero magnetic field causes a charge ordering for nonmagnetic
|
| 969 |
+
impurities and leads to the maximal value of the magnetic entropy change at a
|
| 970 |
+
half-filling. In the FM case, J/V = 1, the magnetic field reduces the frustration
|
| 971 |
+
of the ground state only partially. Impurities radically change the magnetic
|
| 972 |
+
Gr¨uneisen parameter in comparison with the case of a pure Ising chain. They
|
| 973 |
+
suppress the singular behavior of Γmag near h = 0 in the FM case and produce
|
| 974 |
+
the paramagnetic behavior in the FR-FM case. In the AFM case, additional
|
| 975 |
+
values of the critical magnetic field for Γmag appear, which are associated with
|
| 976 |
+
the transition line from AFM to frustrated ground state. In the FR-AFM state,
|
| 977 |
+
Γmag exhibits paramagnetic behavior at h = 0.
|
| 978 |
+
11
|
| 979 |
+
|
| 980 |
+
0.6
|
| 981 |
+
0.4
|
| 982 |
+
0.8
|
| 983 |
+
0.2
|
| 984 |
+
0.6
|
| 985 |
+
0.0
|
| 986 |
+
-0.5
|
| 987 |
+
0.4 T/ V
|
| 988 |
+
0.0
|
| 989 |
+
0.2
|
| 990 |
+
h/V
|
| 991 |
+
0.51.0
|
| 992 |
+
0.8
|
| 993 |
+
0.5
|
| 994 |
+
0.6
|
| 995 |
+
0.0
|
| 996 |
+
-0.5
|
| 997 |
+
0.4
|
| 998 |
+
T/V
|
| 999 |
+
0.0
|
| 1000 |
+
0.2
|
| 1001 |
+
h/ V
|
| 1002 |
+
0.5h/V
|
| 1003 |
+
T/ V
|
| 1004 |
+
T/ V
|
| 1005 |
+
T/ V
|
| 1006 |
+
-0.4
|
| 1007 |
+
-0.2
|
| 1008 |
+
0.0
|
| 1009 |
+
0.2
|
| 1010 |
+
0.4
|
| 1011 |
+
0.1
|
| 1012 |
+
0.1
|
| 1013 |
+
0.1
|
| 1014 |
+
0.2
|
| 1015 |
+
0.2
|
| 1016 |
+
0.2
|
| 1017 |
+
0.3
|
| 1018 |
+
0.3
|
| 1019 |
+
0.3
|
| 1020 |
+
0.4
|
| 1021 |
+
0.4
|
| 1022 |
+
0.4
|
| 1023 |
+
0.5
|
| 1024 |
+
0.1
|
| 1025 |
+
0.2
|
| 1026 |
+
0.3
|
| 1027 |
+
0.1
|
| 1028 |
+
0.2
|
| 1029 |
+
0.3
|
| 1030 |
+
0.1
|
| 1031 |
+
0.2
|
| 1032 |
+
0.3
|
| 1033 |
+
0.4
|
| 1034 |
+
0.4
|
| 1035 |
+
0.5
|
| 1036 |
+
0.5
|
| 1037 |
+
0.5
|
| 1038 |
+
0.5
|
| 1039 |
+
0.6
|
| 1040 |
+
0.6
|
| 1041 |
+
0.6
|
| 1042 |
+
0.6
|
| 1043 |
+
0.7
|
| 1044 |
+
0.8
|
| 1045 |
+
0.48
|
| 1046 |
+
0.48
|
| 1047 |
+
0.5
|
| 1048 |
+
0.5
|
| 1049 |
+
0.55
|
| 1050 |
+
0.55
|
| 1051 |
+
0.6
|
| 1052 |
+
0.6
|
| 1053 |
+
0.65
|
| 1054 |
+
n=0
|
| 1055 |
+
n=0.25
|
| 1056 |
+
n=0.75
|
| 1057 |
+
h/V
|
| 1058 |
+
T/ V
|
| 1059 |
+
T/ V
|
| 1060 |
+
T/ V
|
| 1061 |
+
-0.4
|
| 1062 |
+
-0.2
|
| 1063 |
+
0.0
|
| 1064 |
+
0.2
|
| 1065 |
+
0.4
|
| 1066 |
+
0.05
|
| 1067 |
+
0.05
|
| 1068 |
+
0.05
|
| 1069 |
+
0.1
|
| 1070 |
+
0.1
|
| 1071 |
+
0.1
|
| 1072 |
+
0.15
|
| 1073 |
+
0.15
|
| 1074 |
+
0.15
|
| 1075 |
+
0.2
|
| 1076 |
+
0.2
|
| 1077 |
+
0.2
|
| 1078 |
+
0.1
|
| 1079 |
+
0.3
|
| 1080 |
+
0.4
|
| 1081 |
+
0.4
|
| 1082 |
+
0.4
|
| 1083 |
+
0.5
|
| 1084 |
+
0.6
|
| 1085 |
+
0.1
|
| 1086 |
+
0.25
|
| 1087 |
+
0.4
|
| 1088 |
+
0.5
|
| 1089 |
+
0.5
|
| 1090 |
+
0.5
|
| 1091 |
+
0.6
|
| 1092 |
+
-13
|
| 1093 |
+
10
|
| 1094 |
+
-10
|
| 1095 |
+
10
|
| 1096 |
+
-8
|
| 1097 |
+
10
|
| 1098 |
+
-6
|
| 1099 |
+
10
|
| 1100 |
+
-5
|
| 1101 |
+
10
|
| 1102 |
+
n=0
|
| 1103 |
+
n=0.25
|
| 1104 |
+
n=0.75
|
| 1105 |
+
(a)
|
| 1106 |
+
(b)
|
| 1107 |
+
Figure 7:
|
| 1108 |
+
The isentropic lines in the h − T parameter plane (a) for J/V = −1.3 and (b) for
|
| 1109 |
+
J/V = −0.15. The value of the impurity concentration n is given in the frame. The numbers
|
| 1110 |
+
next to the lines show the entropy values.
|
| 1111 |
+
(a)
|
| 1112 |
+
(b)
|
| 1113 |
+
(c)
|
| 1114 |
+
Figure 8: (color online) The prefactor of the Gr¨uneisen parameter −Gr near the critical field
|
| 1115 |
+
(a) for J/V = −1.3, n = 0.25, hc/V = 0.3, (b) for J/V = −0.15, n = 0.25, hc = 0, (c) for
|
| 1116 |
+
J/V = −0.15, n = 0.25, hc = 0.3.
|
| 1117 |
+
12
|
| 1118 |
+
|
| 1119 |
+
1.0
|
| 1120 |
+
0.5
|
| 1121 |
+
0.20
|
| 1122 |
+
0.0
|
| 1123 |
+
0.15
|
| 1124 |
+
0.0
|
| 1125 |
+
T/V
|
| 1126 |
+
0.10
|
| 1127 |
+
0.2
|
| 1128 |
+
h/ V
|
| 1129 |
+
0.4
|
| 1130 |
+
0.051.0
|
| 1131 |
+
0.3
|
| 1132 |
+
0.5
|
| 1133 |
+
0.2
|
| 1134 |
+
0.0
|
| 1135 |
+
T/V
|
| 1136 |
+
-0.1
|
| 1137 |
+
0.1
|
| 1138 |
+
0.0
|
| 1139 |
+
h/ V
|
| 1140 |
+
0.11.0
|
| 1141 |
+
0.5
|
| 1142 |
+
0.3
|
| 1143 |
+
0.0
|
| 1144 |
+
0.2
|
| 1145 |
+
T/V
|
| 1146 |
+
0.2
|
| 1147 |
+
0.1
|
| 1148 |
+
0.3
|
| 1149 |
+
h/ V
|
| 1150 |
+
0.4
|
| 1151 |
+
0.5Acknowledgments
|
| 1152 |
+
This work was supported by the Ministry of Education and Science of the
|
| 1153 |
+
Russian Federation, project FEUZ-2020-0054.
|
| 1154 |
+
References
|
| 1155 |
+
[1] L. ˇCanov´a, J. Streˇcka, M. Jaˇsˇcur, Geometric frustration in the class of ex-
|
| 1156 |
+
actly solvable Ising–Heisenberg diamond chains, Journal of Physics: Con-
|
| 1157 |
+
densed Matter 18 (20) (2006) 4967–4984. doi:10.1088/0953-8984/18/
|
| 1158 |
+
20/020.
|
| 1159 |
+
[2] J. Torrico, M. Rojas, S. M. de Souza, O. Rojas, N. S. Ananikian, Pair-
|
| 1160 |
+
wise thermal entanglement in the ising-xyz diamond chain structure in an
|
| 1161 |
+
external magnetic field, EPL (Europhysics Letters) 108 (5) (2014) 50007.
|
| 1162 |
+
doi:10.1209/0295-5075/108/50007.
|
| 1163 |
+
[3] J. Streˇcka, Anomalous Thermodynamic Response in the Vicinity of a
|
| 1164 |
+
Pseudo-Transition of a Spin-1/2 Ising Diamond Chain, Acta Physica
|
| 1165 |
+
Polonica A 137 (5) (2020) 610–612. doi:10.12693/APhysPolA.137.610.
|
| 1166 |
+
[4] L. G´alisov´a,
|
| 1167 |
+
J. Streˇcka,
|
| 1168 |
+
Vigorous thermal excitations in a double-
|
| 1169 |
+
tetrahedral chain of localized Ising spins and mobile electrons mimic a
|
| 1170 |
+
temperature-driven first-order phase transition, Physical Review E 91 (2)
|
| 1171 |
+
(2015) 022134. doi:10.1103/PhysRevE.91.022134.
|
| 1172 |
+
[5] O. Rojas, J. Streˇcka, S. de Souza, Thermal entanglement and sharp specific-
|
| 1173 |
+
heat peak in an exactly solved spin-1/2 Ising-Heisenberg ladder with alter-
|
| 1174 |
+
nating Ising and Heisenberg inter–leg couplings, Solid State Communica-
|
| 1175 |
+
tions 246 (2016) 68–75. doi:10.1016/j.ssc.2016.08.002.
|
| 1176 |
+
[6] J. Streˇcka, R. C. Al´ecio, M. L. Lyra, O. Rojas, Spin frustration of a spin-
|
| 1177 |
+
1/2 Ising–Heisenberg three-leg tube as an indispensable ground for thermal
|
| 1178 |
+
entanglement, Journal of Magnetism and Magnetic Materials 409 (2016)
|
| 1179 |
+
124–133. doi:10.1016/j.jmmm.2016.02.095.
|
| 1180 |
+
[7] S. de Souza, O. Rojas, Quasi-phases and pseudo-transitions in one-
|
| 1181 |
+
dimensional models with nearest neighbor interactions, Solid State Com-
|
| 1182 |
+
munications 269 (2018) 131–134. doi:10.1016/j.ssc.2017.10.006.
|
| 1183 |
+
[8] Y. Panov, O. Rojas, Unconventional low-temperature features in the one-
|
| 1184 |
+
dimensional frustrated q-state potts model, Physical Review E 103 (6)
|
| 1185 |
+
(2021) 062107. doi:10.1103/PhysRevE.103.062107.
|
| 1186 |
+
[9] O. Rojas, S. M. de Souza, J. Torrico, L. M. Ver´ıssimo, M. S. S. Pereira,
|
| 1187 |
+
M. L. Lyra, Low-temperature pseudo-phase-transition in an extended hub-
|
| 1188 |
+
bard diamond chain, Physical Review E 103 (4) (2021) 042123.
|
| 1189 |
+
doi:
|
| 1190 |
+
10.1103/PhysRevE.103.042123.
|
| 1191 |
+
13
|
| 1192 |
+
|
| 1193 |
+
[10] F. Ninio, A simple proof of the Perron-Frobenius theorem for positive sym-
|
| 1194 |
+
metric matrices, Journal of Physics A: Mathematical and General 9 (8)
|
| 1195 |
+
(1976) 1281–1282. doi:10.1088/0305-4470/9/8/017.
|
| 1196 |
+
[11] O. Rojas, A Conjecture on the Relationship Between Critical Residual
|
| 1197 |
+
Entropy and Finite Temperature Pseudo-transitions of One-dimensional
|
| 1198 |
+
Models, Brazilian Journal of Physics 50 (6) (2020) 675–686. doi:10.1007/
|
| 1199 |
+
s13538-020-00773-8.
|
| 1200 |
+
[12] O. Rojas, J. Streˇcka, M. L. Lyra, S. M. de Souza, Universality and qua-
|
| 1201 |
+
sicritical exponents of one-dimensional models displaying a quasitransi-
|
| 1202 |
+
tion at finite temperatures, Physical Review E 99 (4) (2019) 042117.
|
| 1203 |
+
doi:10.1103/PhysRevE.99.042117.
|
| 1204 |
+
[13] M. E. Zhitomirsky, Enhanced magnetocaloric effect in frustrated magnets,
|
| 1205 |
+
Physical Review B 67 (10) (2003) 104421.
|
| 1206 |
+
doi:10.1103/PhysRevB.67.
|
| 1207 |
+
104421.
|
| 1208 |
+
[14] M. E. Zhitomirsky, A. Honecker, Magnetocaloric effect in one-dimensional
|
| 1209 |
+
antiferromagnets, Journal of Statistical Mechanics:
|
| 1210 |
+
Theory and Ex-
|
| 1211 |
+
periment 2004 (07) (2004) P07012.
|
| 1212 |
+
doi:10.1088/1742-5468/2004/07/
|
| 1213 |
+
P07012.
|
| 1214 |
+
[15] T. L. Hill, Statistical Mechanics: Principles and Selected Applications,
|
| 1215 |
+
Dover, New York, 1956.
|
| 1216 |
+
[16] F. Rys, A. Hintermann, Gittermodell eines ungeordneten Ferromagneten
|
| 1217 |
+
II. Exakte Losung des eindimensionalen Dodells, Helv. Phys. Acta 42 (4)
|
| 1218 |
+
(1969) 608.
|
| 1219 |
+
[17] F. Matsubara, K. Yoshimura, S. Katsura, Magnetic Properties of One-
|
| 1220 |
+
Dimensional Dilute Ising Systems. I, Canadian Journal of Physics 51 (10)
|
| 1221 |
+
(1973) 1053–1063. doi:10.1139/p73-140.
|
| 1222 |
+
[18] Y. Termonia, J. Deltour, Thermodynamic properties of one-dimensional
|
| 1223 |
+
dilute Ising systems with interacting impurities, Journal of Physics C: Solid
|
| 1224 |
+
State Physics 7 (24) (1974) 4441–4451. doi:10.1088/0022-3719/7/24/
|
| 1225 |
+
007.
|
| 1226 |
+
[19] B. Balagurov, V. Vaks, R. Zaitsev, Statistics of a One-Dimensional Model
|
| 1227 |
+
of a Solid Solution, Sov Phys Solid State 16 (8) (1974) 1498–1502.
|
| 1228 |
+
[20] Y. Panov, Local distributions of the 1D dilute Ising model, Journal of
|
| 1229 |
+
Magnetism and Magnetic Materials 514 (July) (2020) 167224.
|
| 1230 |
+
doi:10.
|
| 1231 |
+
1016/j.jmmm.2020.167224.
|
| 1232 |
+
[21] F. A. Kassan-ogly,
|
| 1233 |
+
One-dimensional ising model with next-nearest-
|
| 1234 |
+
neighbour interaction in magnetic field, Phase Transitions 74 (4) (2001)
|
| 1235 |
+
353–365. doi:10.1080/01411590108227581.
|
| 1236 |
+
14
|
| 1237 |
+
|
| 1238 |
+
[22] A. V. Zarubin, F. A. Kassan-Ogly, A. I. Proshkin, A. E. Shestakov, Frustra-
|
| 1239 |
+
tion Properties of the 1D Ising Model, Journal of Experimental and Theo-
|
| 1240 |
+
retical Physics 128 (5) (2019) 778–807. doi:10.1134/S106377611904006X.
|
| 1241 |
+
[23] G. O. Gomes, L. Squillante, A. C. Seridonio, A. Ney, R. E. Lagos,
|
| 1242 |
+
M. de Souza, Magnetic Gr¨uneisen parameter for model systems, Physical
|
| 1243 |
+
Review B 100 (5) (2019) 054446. doi:10.1103/PhysRevB.100.054446.
|
| 1244 |
+
[24] B. Wolf, A. Honecker, W. Hofstetter, U. Tutsch, M. Lang, Cooling through
|
| 1245 |
+
quantum criticality and many-body effects in condensed matter and cold
|
| 1246 |
+
gases, International Journal of Modern Physics B 28 (26) (2014) 1–35.
|
| 1247 |
+
doi:10.1142/S0217979214300175.
|
| 1248 |
+
15
|
| 1249 |
+
|
BtFKT4oBgHgl3EQfXS78/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
CNFAT4oBgHgl3EQfsx5b/content/2301.08660v1.pdf
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:27af67c791568940162b8257793e5675179fb69e7418c7739df9b9a401b1b3b6
|
| 3 |
+
size 2004952
|
CNFAT4oBgHgl3EQfsx5b/content/tmp_files/2301.08660v1.pdf.txt
ADDED
|
@@ -0,0 +1,1189 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
1
|
| 2 |
+
|
| 3 |
+
A BIG-DATA DRIVEN FRAMEWORK TO ESTIMATING VEHICLE VOLUME BASED
|
| 4 |
+
ON MOBILE DEVICE LOCATION DATA
|
| 5 |
+
|
| 6 |
+
Mofeng Yang1, Weiyu Luo2, Mohammad Ashoori3, Jina Mahmoudi4, Chenfeng Xiong5*, Jiawei
|
| 7 |
+
Lu6, Guangchen Zhao7, Saeed Saleh Namadi8, Songhua Hu9 and Aliakbar Kabiri10
|
| 8 |
+
|
| 9 |
+
|
| 10 |
+
1. Ph.D. ([email protected])
|
| 11 |
+
2. Graduate Research Assistant ([email protected])
|
| 12 |
+
3. Graduate Research Assistant ([email protected])
|
| 13 |
+
4. Ph.D., P.E., Research Scientist ([email protected])
|
| 14 |
+
5. Assistant Professor ([email protected]), *Corresponding Author
|
| 15 |
+
6. Graduate Research Assistant ([email protected])
|
| 16 |
+
7. Graduate Research Assistant ([email protected])
|
| 17 |
+
8. Graduate Research Assistant ([email protected])
|
| 18 |
+
9. Graduate Research Assistant ([email protected])
|
| 19 |
+
10. Graduate Research Assistant ([email protected])
|
| 20 |
+
|
| 21 |
+
|
| 22 |
+
1-4, 7-10: Maryland Transportation Institute (MTI), Department of Civil and Environmental
|
| 23 |
+
Engineering, 1173 Glenn Martin Hall, University of Maryland, College Park MD 20742, USA.
|
| 24 |
+
5: Department of Civil and Environmental Engineering, College of Engineering, Villanova
|
| 25 |
+
University, Villanova, PA 19085, USA
|
| 26 |
+
6. School of Sustainable Engineering and the Built Environment, Arizona State University, Tempe,
|
| 27 |
+
AZ 85281, USA
|
| 28 |
+
|
| 29 |
+
|
| 30 |
+
Words Count: 4,623 + 2 Tables (250*2) = 5,123
|
| 31 |
+
|
| 32 |
+
Submission Date: 07/31/2022
|
| 33 |
+
|
| 34 |
+
|
| 35 |
+
|
| 36 |
+
|
| 37 |
+
2
|
| 38 |
+
|
| 39 |
+
ABSTRACT
|
| 40 |
+
|
| 41 |
+
Vehicle volume serves as a critical metric and the fundamental basis for traffic signal control,
|
| 42 |
+
transportation project prioritization, road maintenance plans and more. Traditional methods of
|
| 43 |
+
quantifying vehicle volume rely on manual counting, video cameras, and loop detectors at a limited
|
| 44 |
+
number of locations. These efforts require significant labor and cost for expansions. Researchers
|
| 45 |
+
and private sector companies have also explored alternative solutions such as probe vehicle data,
|
| 46 |
+
while still suffering from a low penetration rate. In recent years, along with the technological
|
| 47 |
+
advancement in mobile sensors and mobile networks, Mobile Device Location Data (MDLD) have
|
| 48 |
+
been growing dramatically in terms of the spatiotemporal coverage of the population and its
|
| 49 |
+
mobility. This paper presents a big-data driven framework that can ingest terabytes of MDLD and
|
| 50 |
+
estimate vehicle volume at a larger geographical area with a larger sample size. The proposed
|
| 51 |
+
framework first employs a series of cloud-based computational algorithms to extract multimodal
|
| 52 |
+
trajectories and trip rosters. A scalable map matching and routing algorithm is then applied to snap
|
| 53 |
+
and route vehicle trajectories to the roadway network. The observed vehicle counts on each
|
| 54 |
+
roadway segment are weighted and calibrated against ground truth control totals, i.e., Annual
|
| 55 |
+
Vehicle-Miles of Travel (AVMT), and Annual Average Daily Traffic (AADT). The proposed
|
| 56 |
+
framework is implemented on the all-street network in the state of Maryland using MDLD for the
|
| 57 |
+
entire year of 2019. Results indicate that our proposed framework produces reliable vehicle
|
| 58 |
+
volume estimates and also demonstrate its transferability and the generalization ability.
|
| 59 |
+
|
| 60 |
+
Keywords: mobile device location data; big data analytics; vehicle volume; cloud computing; map
|
| 61 |
+
matching and routing.
|
| 62 |
+
|
| 63 |
+
|
| 64 |
+
|
| 65 |
+
|
| 66 |
+
|
| 67 |
+
3
|
| 68 |
+
|
| 69 |
+
1. INTRODUCTION
|
| 70 |
+
|
| 71 |
+
Vehicle volume measures the amount of traffic traveling through a roadway segment given a
|
| 72 |
+
specific period of time. It serves as a critical metric and the fundamental basis for various
|
| 73 |
+
transportation applications including traffic signal control, transportation project prioritization and
|
| 74 |
+
road maintenance plan. Traditional methods to quantify vehicle volume rely on manual counting,
|
| 75 |
+
video cameras, and loop detectors at a limited number of locations, a practice that requires
|
| 76 |
+
significant human labor and a high cost for expansions (1-5). Researchers and private sector
|
| 77 |
+
companies have also explored alternative solutions such as probe vehicle data, while still suffering
|
| 78 |
+
from the low penetration rate issue (6-10).
|
| 79 |
+
|
| 80 |
+
In the past two decades, along with the technological advancement in mobile sensors and mobile
|
| 81 |
+
networks, mobile device location data (MDLD) have been growing dramatically in terms of
|
| 82 |
+
coverage and size, with broader spatiotemporal coverage of the population and its mobility. A
|
| 83 |
+
series of research studies have demonstrated the usefulness of MDLD for enhancing the traditional
|
| 84 |
+
travel survey and have revealed its potential to substitute surveys (11, 12). At the same time,
|
| 85 |
+
obtaining travel statistics solely based on MDLD is also worth investigating to reduce human labor
|
| 86 |
+
and cost. However, MDLD do not include any ground truth information such as trip origins and
|
| 87 |
+
destinations, travel modes, and trip purposes, which requires computational algorithms to be
|
| 88 |
+
developed and validated against the existing travel surveys. More importantly, unlike travel
|
| 89 |
+
surveys which collect information from representative samples to obtain population-representative
|
| 90 |
+
statistics, MDLD contain all available mobile devices with uneven data quality.
|
| 91 |
+
|
| 92 |
+
This study was conducted as part of the Vulnerable Road User Density Exposure Dashboard
|
| 93 |
+
project (https://mti.umd.edu/sdi) - an interactive dashboard that utilizes MDLD to provide data
|
| 94 |
+
and insights on multimodal volume and safety risk exposure of vulnerable road users (e.g.,
|
| 95 |
+
pedestrians, bicycles) at intersections and roadway segments within Maryland. In this study, we
|
| 96 |
+
present a big-data driven framework that ingests terabytes of MDLD and estimates vehicle volume
|
| 97 |
+
for all roadway segments. First, a series of cloud-based computational algorithms are applied—
|
| 98 |
+
including but not limited to—a trip and tour identification algorithm to mine travel behavior
|
| 99 |
+
information and a travel mode imputation model that impute multimodal trajectories from MDLD.
|
| 100 |
+
A map matching and routing algorithm is then applied to snap and route vehicle trajectories to the
|
| 101 |
+
roadway network. The observed vehicle counts on each roadway segment are weighted to match
|
| 102 |
+
the Annual Vehicle Miles of Travel (AVMT) by county, urban/rural status, and functional classes.
|
| 103 |
+
Further, a random forest regression model is used to calibrate the weighted vehicle volume against
|
| 104 |
+
the Annual Average Daily Traffic (AADT) acquired from loop detectors. The proposed framework
|
| 105 |
+
is implemented on the all-street network in the state of Maryland using MDLD data for the entire
|
| 106 |
+
year of 2019.
|
| 107 |
+
|
| 108 |
+
2. LITERATURE REVIEW
|
| 109 |
+
|
| 110 |
+
2.1. Application of Mobile Device Location Data in Transportation Research
|
| 111 |
+
|
| 112 |
+
The appearance of MDLD in the transportation industry started in the 1990s. Since the mid-1990s,
|
| 113 |
+
researchers began installing Global Positioning System (GPS) data loggers in vehicles to
|
| 114 |
+
supplement travel surveys (13-15). With high-frequency in-vehicle GPS data, this approach can
|
| 115 |
+
|
| 116 |
+
4
|
| 117 |
+
|
| 118 |
+
significantly improve the accuracy of travel surveys by recording the exact origin and destination
|
| 119 |
+
as well as the departure and arrival times. However, only a small number of vehicles can be
|
| 120 |
+
sampled with this technique, a drawback limiting its capability. Similarly, the wearable GPS,
|
| 121 |
+
which was introduced in the early 2000s, allowed respondents to report non-vehicle travel modes
|
| 122 |
+
while still suffering from small sample size issues (16, 17). In the past decade, private sector
|
| 123 |
+
entities such as INRIX and RITIS also started to incorporate the probe vehicle data into their
|
| 124 |
+
commercial products (18-21). Nonetheless, the low penetration rate (i.e., 2%-10%) of the
|
| 125 |
+
commercial probe vehicle data remains the core challenge with respect to drawing the whole
|
| 126 |
+
picture of travel patterns.
|
| 127 |
+
|
| 128 |
+
As mentioned above, despite having high precision, traditional MDLD usually suffer from small-
|
| 129 |
+
sample-size issues, which significantly limits the usefulness of the data. Since mobile devices,
|
| 130 |
+
such as smartphones and tablets, have become more popular, MDLD generated from these devices
|
| 131 |
+
have a greater potential for being used in transportation applications. These new types of MDLD,
|
| 132 |
+
namely cellular data and Location-Based Service (LBS) data, offer a more extensive
|
| 133 |
+
spatiotemporal coverage and a larger sample size. The cellular data are generated through
|
| 134 |
+
communication between cellphones and cell towers (22) and can be further categorized into Call
|
| 135 |
+
Detail Record (CDR) and sightings (11). The CDR data can only capture the cell tower location,
|
| 136 |
+
whereas the sightings provide the exact latitude and longitude values. Both types of cellular data
|
| 137 |
+
have been widely applied to research topics such as travel behavior, human mobility, and social
|
| 138 |
+
networks in the past two decades (23-31). Despite the large volume of data, cellular data are limited
|
| 139 |
+
by their spatial and temporal resolution, which is determined by the density of cell towers and
|
| 140 |
+
users’ cellphone usage levels (32). On a positive note, however, cellular data require less advanced
|
| 141 |
+
phones and can raise fewer user privacy concerns. The LBS data provide the exact locations
|
| 142 |
+
generated when a mobile application updates the device’s location with the most accurate sources,
|
| 143 |
+
based on the existing location sensors such as Wi-Fi, Bluetooth, cellular tower, and GPS (11, 23-
|
| 144 |
+
25, 33, 34). Many applications have been developed using the LBS data. For instance, a recent
|
| 145 |
+
smartphone-enhanced travel survey conducted in the U.S. used a mobile application, rMove
|
| 146 |
+
developed by Resource Systems Group (RSG), to collect high-frequency location data and allow
|
| 147 |
+
the respondents to recall their trips by showing the trajectories in rMove (35-38). Additionally,
|
| 148 |
+
Airsage leveraged LBS data to develop a traffic platform that can estimate traffic flow, speed,
|
| 149 |
+
congestion and road user sociodemographic for every road and time of day (39). Further, the
|
| 150 |
+
Maryland Transportation Institute (MTI) at the University of Maryland (UMD) developed the
|
| 151 |
+
COVID-19 Impact Analysis Platform (https://data.covid.umd.edu) to provide insight on COVID-
|
| 152 |
+
19’s impact on mobility, health, economy, and society across the U.S. (40-43).
|
| 153 |
+
|
| 154 |
+
2.2. Vehicle Volume Estimation Methods
|
| 155 |
+
|
| 156 |
+
2.2.1. Estimating Vehicle Volume with Loop Detectors
|
| 157 |
+
|
| 158 |
+
Loop detectors are widely used to record traffic volumes and occupancy levels. These sensors are
|
| 159 |
+
usually buried under the pavements to detect the induction change from the presence of a vehicle.
|
| 160 |
+
Kwon et al. 2003 developed an algorithm using data from single loop detectors to estimate truck
|
| 161 |
+
traffic volumes (1). The results showed a 5.7% error compared with the ground truth highway data.
|
| 162 |
+
Loop detector data were also applied together with probe vehicle data to estimate queue length (44)
|
| 163 |
+
and vehicle volume at a city-wide scale (45). Although proven to be efficient in estimating vehicle
|
| 164 |
+
|
| 165 |
+
5
|
| 166 |
+
|
| 167 |
+
volume, the high installation and maintenance cost of loop detectors limit their capability of being
|
| 168 |
+
scaled up to cover the entire transportation network. Therefore, loop detector datasets are often
|
| 169 |
+
incomplete and mostly unavailable at minor arterials and local streets.
|
| 170 |
+
|
| 171 |
+
2.2.2. Estimating Vehicle Volume with Probe Vehicle Data
|
| 172 |
+
|
| 173 |
+
In the past two decades, MDLD have gained significant attention and have been utilized for
|
| 174 |
+
estimating various traffic characteristics including vehicle volume. With the development of
|
| 175 |
+
MDLD, estimating vehicle volume at the city scale became a reality. Probe vehicles can record
|
| 176 |
+
their trajectory data with high granularity (i.e., 1Hz). Based on the trajectory data obtained from
|
| 177 |
+
probe vehicles, a wide range of methods can be used by researchers to solve transportation
|
| 178 |
+
problems. Zhao et al. proposed novel methods to estimate queue length and vehicle volume based
|
| 179 |
+
on the probability theory without prior information about the penetration rate or queue length
|
| 180 |
+
distribution (6). Guo et al. estimated vehicle volume and queue length at signalized intersections
|
| 181 |
+
and proposed a new framework to optimize traffic signal control operations (7). Sekuła et al.
|
| 182 |
+
applied several machine learning and neural networks to estimate historical hourly vehicle volume
|
| 183 |
+
between sparsely located sensors based on the probe vehicle data (8). Shockwave theories were
|
| 184 |
+
also applied to probe vehicle data by a few studies (9, 10).
|
| 185 |
+
|
| 186 |
+
2.2.3. Estimating Vehicle Volume with Mobile Device Location Data
|
| 187 |
+
Many studies have been conducted focusing on estimating traffic flow and detecting congestion
|
| 188 |
+
using cellular data (46, 47). Xing et al. 2019 utilized CDR with Time Difference of Arrival (TDOA)
|
| 189 |
+
positioning technique in order to estimate multimodal traffic volumes on different types of urban
|
| 190 |
+
roadways by identifying three modes of travel – namely, drive alone, carpooling, and bus (48).
|
| 191 |
+
The results showed that compared with the ground truth vehicle volume obtained from License
|
| 192 |
+
Plate Recognition (LPR) cameras, the mean relative error was in the range of 17.1% to 25.7%,
|
| 193 |
+
depending on the roadway type. Despite significant advances in positioning techniques, cellular
|
| 194 |
+
data still suffers from low accuracy issues, whereas LBS data have a noticeable advantage due to
|
| 195 |
+
utilizing different sources to accurately locate the user – a feature that has resulted in an increased
|
| 196 |
+
usage of this type of data by researchers and the private sector for estimating vehicle volume. Fan
|
| 197 |
+
et al. 2019 developed a computing framework alongside a heuristic map matching algorithm to
|
| 198 |
+
estimate Vehicle Miles of Travel (VMT) and AADT for the state of Maryland using INRIX data.
|
| 199 |
+
The results showed an R2 of 0.878 when fitting the estimated AADT with the ground truth AADT
|
| 200 |
+
(49). Moreover, a number of state agencies conducted rigorous evaluations of vehicle volume
|
| 201 |
+
obtained through traditional methods as well as from MDLD obtained by private sector companies.
|
| 202 |
+
They found the latter to be a promising source for supplementing current surveys and traditional
|
| 203 |
+
methods (50).
|
| 204 |
+
3. THE BIG-DATA DRIVEN VEHICLE VOLUME ESTIMATION FRAMEWORK
|
| 205 |
+
|
| 206 |
+
3.1. Overview of the Framework
|
| 207 |
+
|
| 208 |
+
In this study, we propose a big-data driven vehicle volume estimation framework, which offers the
|
| 209 |
+
capability of efficiently estimating vehicle volume ingested from terabytes of MDLD. Figure 1
|
| 210 |
+
shows the proposed framework. The proposed framework is built on Amazon Web Services
|
| 211 |
+
(AWS). MDLD and all supporting data are stored in Simple Cloud Storage (S3). All algorithms
|
| 212 |
+
|
| 213 |
+
6
|
| 214 |
+
|
| 215 |
+
are developed based on Apache Spark, which uses Resilient Distributed Datasets (RDD), and are
|
| 216 |
+
coded in PySpark using the Elastic MapReduce (EMR) services. In the cloud environment, MDLD
|
| 217 |
+
are spliced into RDDs given the number of executors (43, 49). At the same time, all external data
|
| 218 |
+
sources (i.e., K-D Tree, network, routing engine) are broadcasted into all executors for master and
|
| 219 |
+
core nodes. The same algorithms are applied to each RDD along with the broadcasted variables,
|
| 220 |
+
and the results are aggregated and outputted into S3.
|
| 221 |
+
|
| 222 |
+
|
| 223 |
+
Figure 1. The Big-Data Driven Vehicle Volume Estimation Framework
|
| 224 |
+
|
| 225 |
+
3.2. Trip End Identification and Travel Mode Imputation
|
| 226 |
+
|
| 227 |
+
Trip is the basic unit of analysis for almost all transportation applications. However, MDLD
|
| 228 |
+
usually do not contain any trip-related information. Therefore, in this study, a trip end
|
| 229 |
+
identification algorithm is used to extract trip-level information from the MDLD, including trip
|
| 230 |
+
start location, trip end location, departure time, and arrival time. Then, a travel mode imputation
|
| 231 |
+
model is further applied to infer four travel modes–namely, the air, drive, rail, and nonmotorized
|
| 232 |
+
modes based on heuristic rules and a random forest model. Detailed descriptions of the trip end
|
| 233 |
+
identification algorithm and the travel mode imputation model can be found in the following
|
| 234 |
+
references (12, 51).
|
| 235 |
+
|
| 236 |
+
3.3. Map Matching and Routing
|
| 237 |
+
|
| 238 |
+
To ensure flexibility and scalability of our map matching and routing method across the entire
|
| 239 |
+
U.S., we extract the drivable network from OpenStreetMap (OSM) using the latest open-source
|
| 240 |
+
Python package osm2gmns. The osm2gmns package can parse roadway network data from OSM
|
| 241 |
+
and output networks to csv files in the General Modeling Network Specification (GMNS) format.
|
| 242 |
+
It provides customized and practical functions to facilitate traffic modeling. Functions include
|
| 243 |
+
complex intersection consolidation, movement generation, traffic zone creation, short link
|
| 244 |
+
|
| 245 |
+
Cloud Computing
|
| 246 |
+
aws
|
| 247 |
+
Data Source
|
| 248 |
+
Local Server Backup
|
| 249 |
+
MobileDevice
|
| 250 |
+
5
|
| 251 |
+
DATA
|
| 252 |
+
Location Data
|
| 253 |
+
S3Online Bucket
|
| 254 |
+
Geospatial Maps
|
| 255 |
+
spark
|
| 256 |
+
Smart Location
|
| 257 |
+
AnnualAverage
|
| 258 |
+
Database
|
| 259 |
+
DailyTraffic
|
| 260 |
+
Amazon EMR
|
| 261 |
+
AmazonEC2
|
| 262 |
+
DailyUpdate:1176.52to3401.80million
|
| 263 |
+
Annual VehicleMiles
|
| 264 |
+
OpenStreetMap
|
| 265 |
+
PySpark
|
| 266 |
+
points; 15.05 to 17.36 million devices.
|
| 267 |
+
ofTravel
|
| 268 |
+
Computation
|
| 269 |
+
Roadway Network
|
| 270 |
+
osm2gmns
|
| 271 |
+
WeightingandCalibration
|
| 272 |
+
ALGORITHM
|
| 273 |
+
Algorithms
|
| 274 |
+
1.Network parsing
|
| 275 |
+
RandomForestModel
|
| 276 |
+
Data Preprocessing
|
| 277 |
+
2. Missing value
|
| 278 |
+
3.ScalableacrossU.S.
|
| 279 |
+
8
|
| 280 |
+
TripEnd Identification
|
| 281 |
+
County
|
| 282 |
+
networkx
|
| 283 |
+
Urban/Rural Status
|
| 284 |
+
Travel ModeImputation
|
| 285 |
+
1.Routing engine
|
| 286 |
+
#ofLanes,Speed Limit
|
| 287 |
+
MapMatchingandRouting
|
| 288 |
+
2. Short path algorithm
|
| 289 |
+
Weighting and Calibration
|
| 290 |
+
Built Environments
|
| 291 |
+
APPLICATION
|
| 292 |
+
VulnerableUserExposureRiskDashboard
|
| 293 |
+
Decision Support
|
| 294 |
+
Mobility Tracking
|
| 295 |
+
Safety Improvement7
|
| 296 |
+
|
| 297 |
+
combination, and network visualization. More details about osm2gmns can be found here:
|
| 298 |
+
https://osm2gmns.readthedocs.io/en/latest/
|
| 299 |
+
|
| 300 |
+
To match each location sighting to our OSM network, the OSM network is firstly parsed and
|
| 301 |
+
converted into the routable formats, where roadway segments are represented by links and nodes.
|
| 302 |
+
With the network topology, we use the networkX package to build a shortest path-based routing
|
| 303 |
+
engine. We then transform the latitude and longitude of the start node and end node for each link
|
| 304 |
+
to the plane coordinate (in meters), and then calculate link direction (degree) using the arctan value
|
| 305 |
+
between the two nodes (see Figure 3 for details). The travel direction between consecutive
|
| 306 |
+
sightings is also calculated. Similar to the method for link direction calculation, the coordinates of
|
| 307 |
+
each sighting are converted to plane coordinates, then the degree is calculated using the arctan
|
| 308 |
+
value between consecutive sightings. A spatial index structure, K-Dimensional Tree (K-D Tree),
|
| 309 |
+
is built using the link geometric nodes (i.e., link nodes). Then, for each sighting, we search all link
|
| 310 |
+
nodes that are within 100 meters. The 100-meter threshold is selected to balance the algorithm
|
| 311 |
+
efficacy and the computing speed. If we increase the value, more candidate links will be considered
|
| 312 |
+
but this will require more computing resources. If we decrease the value, we might not be able to
|
| 313 |
+
find a candidate link when the observation is sparse. To validate, we calculate the distance between
|
| 314 |
+
consecutive link nodes using the Maryland OSM network as an example. Results indicate that
|
| 315 |
+
more than 95% of the link nodes are within 100 meters of their neighbors, as shown in Figure 2.
|
| 316 |
+
Therefore, using the 100-meter value as the radius for searching candidate nodes is reasonable.
|
| 317 |
+
|
| 318 |
+
|
| 319 |
+
Figure 2. Distribution of Distance between Link Nodes in the OSM Network
|
| 320 |
+
|
| 321 |
+
As the next step, for each sighting, we compare its travel direction to all candidate links. The
|
| 322 |
+
closest link with an absolute travel direction difference smaller than 30 degrees will be selected as
|
| 323 |
+
a valid matched link for the sighting. This 30-degree threshold is selected mainly to avoid the
|
| 324 |
+
sighting being matched to the link in the opposite direction. In common cases, the degree
|
| 325 |
+
difference between the travel direction and the link direction should be approximately 0. Here, we
|
| 326 |
+
use a 30-degree threshold to consider the uncertainty of location accuracy in MDLD. After the
|
| 327 |
+
matched link for each sighting is found, given the observed link sequence, the routing engine can
|
| 328 |
+
fill the gap between consecutively observed links and retrieve the complete route. Another layer
|
| 329 |
+
of reasonable checks is conducted at the routing stage. For each pair of consecutive sightings that
|
| 330 |
+
|
| 331 |
+
Distribution of Distance between Link Nodes
|
| 332 |
+
40%
|
| 333 |
+
35%
|
| 334 |
+
30%
|
| 335 |
+
25%
|
| 336 |
+
20%
|
| 337 |
+
15%
|
| 338 |
+
10%
|
| 339 |
+
5%
|
| 340 |
+
0%8
|
| 341 |
+
|
| 342 |
+
are snapped to links, the routed distance is calculated by summing the link length of all the links
|
| 343 |
+
traveled between the two sightings. Two reasonableness checks are carried out:
|
| 344 |
+
|
| 345 |
+
(1) If the routed distance is greater than the cumulative distance between the two sightings
|
| 346 |
+
snapped to links by 2,000 meters or more, we consider the route invalid.
|
| 347 |
+
(2) The travel time on these links will be calculated based on the timestamp difference between
|
| 348 |
+
the two sightings. With the routed distance and travel time, the average travel speed on
|
| 349 |
+
these links can be calculated. If the speed exceeds 50 m/s (i.e., 112 mph or 180 km/h), we
|
| 350 |
+
assume that one of the two sightings is matched to the wrong link.
|
| 351 |
+
|
| 352 |
+
If either of these two violations is observed, we apply a trial-and-error process by removing the
|
| 353 |
+
latter sighting and performing the routing using the next sighting snapped to the network until it
|
| 354 |
+
does not violate the 2,000-meter threshold or the 50 m/s threshold (52). A simple example of the
|
| 355 |
+
map matching and routing method is illustrated in Figure 3.
|
| 356 |
+
|
| 357 |
+
|
| 358 |
+
Figure 3. Example of Map Matching and Routing.
|
| 359 |
+
|
| 360 |
+
3.4. Weighting
|
| 361 |
+
|
| 362 |
+
After map matching and routing, we collect routes for all vehicle trips and aggregate them by links
|
| 363 |
+
to obtain the observed vehicle volume for each link. Afterward, we develop a link-based weighting
|
| 364 |
+
method to match the AVMT in the region. We classify each link by county, urban/rural status, and
|
| 365 |
+
functional classes and calculate the link weight using the formula below:
|
| 366 |
+
|
| 367 |
+
𝑤𝐶,𝑢,𝑓 = 𝐴𝑉𝑀𝑇𝐶,𝑢,𝑓
|
| 368 |
+
∑
|
| 369 |
+
𝑂𝐶,𝑢,𝑓,𝑖
|
| 370 |
+
𝑁𝐶
|
| 371 |
+
|
| 372 |
+
|
| 373 |
+
where 𝑤𝐶,𝑢,𝑓 represents the weight for links in county C, with urban/rural status of u, and with
|
| 374 |
+
functional class f; 𝐴𝑉𝑀𝑇𝑐,𝑢,𝑓 represent the AVMT; and 𝑂𝐶,𝑢,𝑓,𝑖 represents the observed vehicle
|
| 375 |
+
volume on link i; 𝑁𝐶 represents the total number of links in county C. For instance, if the study
|
| 376 |
+
area has 20 counties, 2 urban/rural status and 6 functional classes, then a total of 240 link-based
|
| 377 |
+
|
| 378 |
+
>TravelDirection
|
| 379 |
+
o Link Centroid
|
| 380 |
+
Observation
|
| 381 |
+
Node
|
| 382 |
+
Matched Link
|
| 383 |
+
Degree
|
| 384 |
+
CandidateLink
|
| 385 |
+
Routed Link9
|
| 386 |
+
|
| 387 |
+
weights will be generated. Subsequently, the weighted vehicle volume for each link can be
|
| 388 |
+
calculated as:
|
| 389 |
+
|
| 390 |
+
𝑉𝑐,𝑢,𝑓,𝑖 = 𝑤𝐶,𝑢,𝑓 × 𝑂𝑐,𝑢,𝑓,𝑖
|
| 391 |
+
|
| 392 |
+
where 𝑉𝑐,𝑢,𝑓,𝑖 represents the weighted vehicle volume on link i.
|
| 393 |
+
|
| 394 |
+
3.5. Volume Calibration
|
| 395 |
+
|
| 396 |
+
The weighted vehicle volume is further calibrated to match the ground truth AADT collected from
|
| 397 |
+
loop detectors at a limited number of locations. In this study, we use the random forest regression
|
| 398 |
+
to calibrate the weighted vehicle volume against the AADT to obtain the final vehicle volume.
|
| 399 |
+
During the calibration process, a 10-fold cross-validation (CV) process is used to fine-tune the
|
| 400 |
+
random forest regression hyperparameters with 90% training data. The fine-tuned models are then
|
| 401 |
+
applied to the 10% testing data.
|
| 402 |
+
|
| 403 |
+
4. CASE STUDY: THE STATE OF MARYLAND
|
| 404 |
+
|
| 405 |
+
4.1. Data
|
| 406 |
+
|
| 407 |
+
4.1.1. Mobile Device Location Data and the Study Area
|
| 408 |
+
|
| 409 |
+
This study used MDLD data obtained from Maryland Transportation Institute (MTI). MTI
|
| 410 |
+
integrated and cleaned the raw MDLD from multiple data vendors and built a national MDLD data
|
| 411 |
+
panel that consists of more than 270,000,000 Monthly Active Users (MAU) and represents
|
| 412 |
+
movements across the nation. (40-43, 51). Figure 4 shows the density of location sightings
|
| 413 |
+
covering locations within and outside of the boundaries of the state of Maryland. In this study, we
|
| 414 |
+
used all MDLD data that are observed in the state of Maryland for the entire year of 2019. The
|
| 415 |
+
MDLD is processed on a daily basis and the results are aggregated to produce an annual total result.
|
| 416 |
+
|
| 417 |
+
|
| 418 |
+
Figure 4. Mobile Device Location Data around the State of Maryland.
|
| 419 |
+
|
| 420 |
+
|
| 421 |
+
10
|
| 422 |
+
|
| 423 |
+
4.1.2. OpenStreetMap Network
|
| 424 |
+
|
| 425 |
+
Using the osm2gmns package, we extracted a total of 634,516 drivable roadway segments within
|
| 426 |
+
the state of Maryland. Information about the number of lanes and speed limits was recorded for
|
| 427 |
+
only 111,835 roadway segments (17.6%) and 84,728 roadway segments (13.4%), respectively. As
|
| 428 |
+
shown on the left-hand side in Figure 5, the missing values for the number of lanes and speed
|
| 429 |
+
limits were estimated based on the corresponding values on nearby roadways in the same county,
|
| 430 |
+
and with the same urban/rural status, and road functional classes. These two variables are further
|
| 431 |
+
used as features in the vehicle volume calibration model.
|
| 432 |
+
|
| 433 |
+
|
| 434 |
+
Figure 5. Number of Lanes and Speed Limits in OSM
|
| 435 |
+
|
| 436 |
+
4.1.3. Annual Vehicle Miles of Travel Data
|
| 437 |
+
|
| 438 |
+
We use the vehicle miles traveled data from the Maryland Department of Transportation State
|
| 439 |
+
Highway Administration (MDOT SHA) as a control total number to weight observed vehicle
|
| 440 |
+
volume. Every year, MDOT SHA publishes an annual vehicle miles of travel (AVMT) report by
|
| 441 |
+
county and functional classification for the state, county, and municipal highway systems. This
|
| 442 |
+
AVMT report features the current FHWA Functional Classification Codes (1-7) and provides
|
| 443 |
+
additional classifications (i.e., Urban, Rural, Principal Arterial and Other Freeways and
|
| 444 |
+
Expressways, and Minor Collector). As discussed in the methodology section, the weights are
|
| 445 |
+
generated based on county, urban/rural status and functional classes. Here, 23 Maryland counties
|
| 446 |
+
plus Baltimore City, urban or rural, and two function classes (highway and non-highway) are
|
| 447 |
+
considered. We map the OSM link type to the FHWA Functional Classification Codes and
|
| 448 |
+
generated the highway and non-highway classes. More specifically, “motorway”, “trunk” and
|
| 449 |
+
“ramp” are classified as highway (i.e., 1, 2 in FHWA class), and the other types are classified as
|
| 450 |
+
non-highway (i.e., 3,4,5,6,7 in FHWA class). More details about the AVMT data can be found
|
| 451 |
+
here: https://www.roads.maryland.gov/mdotsha/Pages/index.aspx?PageId=302
|
| 452 |
+
|
| 453 |
+
|
| 454 |
+
EstimatedNumberof
|
| 455 |
+
Lanes (lane)
|
| 456 |
+
1Lane
|
| 457 |
+
2Lanes
|
| 458 |
+
3or4Lanes
|
| 459 |
+
5or6Lanes
|
| 460 |
+
Morethan6Lanes
|
| 461 |
+
(a)
|
| 462 |
+
(b)
|
| 463 |
+
EstimatedSpeedLimits
|
| 464 |
+
(mph)
|
| 465 |
+
5-15
|
| 466 |
+
15-25
|
| 467 |
+
25-45
|
| 468 |
+
45-60
|
| 469 |
+
60-70
|
| 470 |
+
(c)
|
| 471 |
+
(d)11
|
| 472 |
+
|
| 473 |
+
4.1.4. Annual Average Daily Traffic Data
|
| 474 |
+
|
| 475 |
+
We use the AADT also from MDOT SHA to calibrate weighted vehicle volume against the ground
|
| 476 |
+
truth at a limited number of locations. The AADT data consists of linear and point geometric
|
| 477 |
+
features which represent the geographic locations and segments of roadway throughout the state
|
| 478 |
+
of Maryland that include traffic volume metrics such as AADT. More details about the AADT can
|
| 479 |
+
be found here:https://data.imap.maryland.gov/maps/77010abe7558425997b4fcdab02e2b64/about
|
| 480 |
+
|
| 481 |
+
4.1.5. Smart Location Database and Features for Volume Calibration
|
| 482 |
+
|
| 483 |
+
The Smart Location Database (SLD) is a nationwide geographic data resource for measuring
|
| 484 |
+
location efficiency. The SLD is produced by the U.S. Environmental Protection Agency (EPA)’s
|
| 485 |
+
Smart Growth Program. It provides more than 90 variables on land use and built environment
|
| 486 |
+
characteristics such as population and employment densities, land use diversity, urban design
|
| 487 |
+
attributes, destination accessibility, transit accessibility, and socioeconomic/sociodemographic
|
| 488 |
+
characteristics at the census block group level. Most attributes are available for every census block
|
| 489 |
+
group in the United States. In this study, we use SLD variables as features in the random forest
|
| 490 |
+
regression to calibrate weighted vehicle volume to account for the effects of the built environment.
|
| 491 |
+
The SLD variables used in this study include “TotEMP”, “Pct_AO0”, “D1A”, “D1C”, “D3AAO”,
|
| 492 |
+
“D3B”, and “D5AR”:
|
| 493 |
+
• TotEMP = total employment;
|
| 494 |
+
• Pct_AO0 = percent of zero-car households;
|
| 495 |
+
• D1A = gross residential density (housing units per acre) on unprotected land;
|
| 496 |
+
• D1C = gross employment density (jobs per acre) on unprotected land;
|
| 497 |
+
• D3AAO = network density in terms of facility miles of auto-oriented links per square
|
| 498 |
+
miles;
|
| 499 |
+
• D3B = street intersection density (weighted, auto-oriented intersections eliminated);
|
| 500 |
+
• D5AR = jobs within 45 minutes auto travel time, time decay (network travel time)
|
| 501 |
+
weighted
|
| 502 |
+
We also include urban/rural status, county code, link type, number of lanes, and speed limits as
|
| 503 |
+
features in the calibration process.
|
| 504 |
+
|
| 505 |
+
4.2. Results
|
| 506 |
+
|
| 507 |
+
4.2.1. Overall Comparison
|
| 508 |
+
|
| 509 |
+
Figure 6 shows the weighting and calibration results for both training and testing sets. The blue
|
| 510 |
+
dots represent weighted volume comparisons and the green dots represent calibrated vehicle
|
| 511 |
+
volume comparisons with MDOT SHA AADT. Figure 6 (a) and (b) compares the weighted vehicle
|
| 512 |
+
volume and calibrated vehicle volume with the MDOT SHA AADT in the training set respectively;
|
| 513 |
+
Figure 6 (c) and (d) compares the weighted vehicle volume and calibrated vehicle volume with the
|
| 514 |
+
MDOT SHA AADT in the testing set respectively. As it can be seen from Figure 6 (a), for the
|
| 515 |
+
training set, the Pearson correlation value and the Root Mean Square Error (RMSE) between the
|
| 516 |
+
weighted vehicle volume and the ground truth AADT are 0.746 and 7,912, respectively. These
|
| 517 |
+
values are improved to 0.966 and 2,996 after calibration, as shown in Figure 6 (b). Similarly, for
|
| 518 |
+
|
| 519 |
+
12
|
| 520 |
+
|
| 521 |
+
the testing set, the Pearson correlation and RMSE are improved from 0.764 and 7,548, to 0.854
|
| 522 |
+
and 5,701 respectively after calibration.
|
| 523 |
+
|
| 524 |
+
|
| 525 |
+
Figure 6. (a) Weighted Vehicle Volume in Training Set; (b) Calibrated Vehicle Volume in Training Set;
|
| 526 |
+
(c) Weighted Vehicle Volume in Testing Set; (d) Calibrated Vehicle Volume in Testing Set.
|
| 527 |
+
|
| 528 |
+
4.2.2. Vehicle Volume Validation by Link Types and Urban/Rural Status
|
| 529 |
+
|
| 530 |
+
Figure 7 and Table 1 show the calibrated vehicle volume by link types for both the training and
|
| 531 |
+
testing sets. For all link types, a good correlation (i.e., over 0.80) can be observed between the
|
| 532 |
+
calibrated vehicle volume and the ground truth AADT, except for Local Roads and Highway
|
| 533 |
+
Ramps in the testing set. The results indicate that our proposed framework can accurately estimate
|
| 534 |
+
vehicle volume on higher-level roadways (i.e., Interstate Highways and Highways, Primary Roads,
|
| 535 |
+
Secondary Roads), while concurrently maintaining high correlations for lower-level roadways (i.e.,
|
| 536 |
+
Tertiary Roads, Local Roads, Highway Ramps). The relatively weaker performance for the case
|
| 537 |
+
of lower-level roadways can be attributed to limitations in technology. The MDLD only capture
|
| 538 |
+
part of the daily trips of a device within the area with mobile network connections and higher-level
|
| 539 |
+
roadways usually have a better coverage compared to lower-level ones. This variability might also
|
| 540 |
+
result in capturing more travelers on highways and major arterials. In addition, the LBS data
|
| 541 |
+
sample is more likely to include the active travelers that make more trips and/or longer-duration
|
| 542 |
+
|
| 543 |
+
140000
|
| 544 |
+
140000
|
| 545 |
+
Corr.=0.746
|
| 546 |
+
MDOT SHA AADT (veh/day)
|
| 547 |
+
Corr.=0.966
|
| 548 |
+
120000
|
| 549 |
+
RMSE=7912
|
| 550 |
+
120000
|
| 551 |
+
RMSE=2996
|
| 552 |
+
100000
|
| 553 |
+
100000
|
| 554 |
+
80000
|
| 555 |
+
80000
|
| 556 |
+
.
|
| 557 |
+
60000
|
| 558 |
+
60000
|
| 559 |
+
40000
|
| 560 |
+
:
|
| 561 |
+
40000
|
| 562 |
+
20000
|
| 563 |
+
20000
|
| 564 |
+
0
|
| 565 |
+
0
|
| 566 |
+
0
|
| 567 |
+
20000
|
| 568 |
+
40000
|
| 569 |
+
60000
|
| 570 |
+
80000100000120000
|
| 571 |
+
140000
|
| 572 |
+
0
|
| 573 |
+
20000
|
| 574 |
+
40000
|
| 575 |
+
60000
|
| 576 |
+
80000100000120000
|
| 577 |
+
140000
|
| 578 |
+
WeightedVehicleVolume(veh/day)
|
| 579 |
+
CalibratedVehicleVolume (veh/day)
|
| 580 |
+
140000
|
| 581 |
+
140000
|
| 582 |
+
Corr.= 0.764
|
| 583 |
+
(veh/day)
|
| 584 |
+
Corr.=0.854
|
| 585 |
+
MDOT SHA AADT (veh/day)
|
| 586 |
+
120000
|
| 587 |
+
RMSE=7548
|
| 588 |
+
120000
|
| 589 |
+
RMSE=5701
|
| 590 |
+
100000
|
| 591 |
+
100000
|
| 592 |
+
MDOT SHA AADT
|
| 593 |
+
80000
|
| 594 |
+
80000
|
| 595 |
+
60000
|
| 596 |
+
60000
|
| 597 |
+
40000
|
| 598 |
+
40000
|
| 599 |
+
20000
|
| 600 |
+
20000
|
| 601 |
+
0
|
| 602 |
+
0
|
| 603 |
+
0
|
| 604 |
+
20000
|
| 605 |
+
40000
|
| 606 |
+
60000
|
| 607 |
+
80000
|
| 608 |
+
100000120000140000
|
| 609 |
+
0
|
| 610 |
+
20000
|
| 611 |
+
40000
|
| 612 |
+
60000
|
| 613 |
+
80000
|
| 614 |
+
100000
|
| 615 |
+
120000
|
| 616 |
+
140000
|
| 617 |
+
Weighted Vehicle Volume (veh/day)
|
| 618 |
+
CalibratedVehicleVolume(veh/day)13
|
| 619 |
+
|
| 620 |
+
trips, such as long-distance travel for leisure or business purposes or long-distance commute which
|
| 621 |
+
usually happen on interstate highways.
|
| 622 |
+
|
| 623 |
+
|
| 624 |
+
Figure 7. Volume Calibration Results Comparison by Link Type.
|
| 625 |
+
|
| 626 |
+
Figure 8 and Table 2 show the calibration of vehicle volume by urban/rural status for both the
|
| 627 |
+
training and testing sets. In summary, for both urban and rural roads, a good correlation (i.e., over
|
| 628 |
+
|
| 629 |
+
100000
|
| 630 |
+
100000
|
| 631 |
+
100000
|
| 632 |
+
100000
|
| 633 |
+
50000
|
| 634 |
+
50000
|
| 635 |
+
50000
|
| 636 |
+
50000
|
| 637 |
+
+0
|
| 638 |
+
-0
|
| 639 |
+
50000100000
|
| 640 |
+
0
|
| 641 |
+
50000100000
|
| 642 |
+
0
|
| 643 |
+
50000100000
|
| 644 |
+
0
|
| 645 |
+
50000100000
|
| 646 |
+
Ro
|
| 647 |
+
Road
|
| 648 |
+
60000
|
| 649 |
+
60000
|
| 650 |
+
60000
|
| 651 |
+
60000
|
| 652 |
+
40000
|
| 653 |
+
40000
|
| 654 |
+
40000
|
| 655 |
+
40000
|
| 656 |
+
20000
|
| 657 |
+
20000
|
| 658 |
+
20000
|
| 659 |
+
20000
|
| 660 |
+
0
|
| 661 |
+
0-
|
| 662 |
+
0
|
| 663 |
+
0-
|
| 664 |
+
0
|
| 665 |
+
2500050000
|
| 666 |
+
0
|
| 667 |
+
2500050000
|
| 668 |
+
0
|
| 669 |
+
2500050000
|
| 670 |
+
0
|
| 671 |
+
2500050000
|
| 672 |
+
yR
|
| 673 |
+
Roa
|
| 674 |
+
40000
|
| 675 |
+
40000
|
| 676 |
+
40000
|
| 677 |
+
40000
|
| 678 |
+
(veh/day)
|
| 679 |
+
(veh/day)
|
| 680 |
+
20000
|
| 681 |
+
20000
|
| 682 |
+
20000
|
| 683 |
+
20000
|
| 684 |
+
1
|
| 685 |
+
0
|
| 686 |
+
20000 40000
|
| 687 |
+
2000040000
|
| 688 |
+
2000040000
|
| 689 |
+
0
|
| 690 |
+
2000040000
|
| 691 |
+
MDOT SHA AADT
|
| 692 |
+
AADT
|
| 693 |
+
Ro
|
| 694 |
+
load
|
| 695 |
+
SHA
|
| 696 |
+
60000
|
| 697 |
+
60000
|
| 698 |
+
60000
|
| 699 |
+
60000
|
| 700 |
+
40000
|
| 701 |
+
40000
|
| 702 |
+
MDOT :
|
| 703 |
+
40000
|
| 704 |
+
40000
|
| 705 |
+
20000
|
| 706 |
+
20000
|
| 707 |
+
20000
|
| 708 |
+
20000
|
| 709 |
+
0.
|
| 710 |
+
0
|
| 711 |
+
50000
|
| 712 |
+
0
|
| 713 |
+
50000
|
| 714 |
+
0
|
| 715 |
+
50000
|
| 716 |
+
50000
|
| 717 |
+
Roa
|
| 718 |
+
ads
|
| 719 |
+
30000
|
| 720 |
+
30000
|
| 721 |
+
30000
|
| 722 |
+
30000
|
| 723 |
+
20000
|
| 724 |
+
20000
|
| 725 |
+
20000
|
| 726 |
+
20000
|
| 727 |
+
10000
|
| 728 |
+
10000
|
| 729 |
+
10000
|
| 730 |
+
10000
|
| 731 |
+
1
|
| 732 |
+
+0
|
| 733 |
+
20000
|
| 734 |
+
0
|
| 735 |
+
20000
|
| 736 |
+
0
|
| 737 |
+
20000
|
| 738 |
+
20000
|
| 739 |
+
Ral
|
| 740 |
+
amj
|
| 741 |
+
80000
|
| 742 |
+
80000
|
| 743 |
+
80000
|
| 744 |
+
80000
|
| 745 |
+
60000
|
| 746 |
+
60000
|
| 747 |
+
60000
|
| 748 |
+
60000
|
| 749 |
+
40000
|
| 750 |
+
40000
|
| 751 |
+
40000
|
| 752 |
+
40000
|
| 753 |
+
20000
|
| 754 |
+
20000
|
| 755 |
+
20000-
|
| 756 |
+
20000
|
| 757 |
+
:
|
| 758 |
+
0
|
| 759 |
+
0
|
| 760 |
+
0
|
| 761 |
+
50000
|
| 762 |
+
0
|
| 763 |
+
50000
|
| 764 |
+
0
|
| 765 |
+
50000
|
| 766 |
+
0
|
| 767 |
+
5000014
|
| 768 |
+
|
| 769 |
+
0.80) can be observed between the calibrated vehicle volume and the ground truth AADT, whereas
|
| 770 |
+
a higher correlation can be observed for urban roads. The relatively weaker performance in rural
|
| 771 |
+
roadways can also be attributed to the technology limitation mentioned above.
|
| 772 |
+
|
| 773 |
+
Figure 8. Volume Calibration Results Comparison by Urban/Rural Status.
|
| 774 |
+
|
| 775 |
+
Table 1. Volume Calibration Results Comparison by Link Type
|
| 776 |
+
Link Type
|
| 777 |
+
Training Set
|
| 778 |
+
Testing Set
|
| 779 |
+
Corr.
|
| 780 |
+
RMSE
|
| 781 |
+
Corr.
|
| 782 |
+
RMSE
|
| 783 |
+
Before
|
| 784 |
+
After
|
| 785 |
+
Before
|
| 786 |
+
After
|
| 787 |
+
Before
|
| 788 |
+
After
|
| 789 |
+
Before
|
| 790 |
+
After
|
| 791 |
+
All
|
| 792 |
+
0.746
|
| 793 |
+
0.966
|
| 794 |
+
7912
|
| 795 |
+
2996
|
| 796 |
+
0.764
|
| 797 |
+
0.854
|
| 798 |
+
7548
|
| 799 |
+
5701
|
| 800 |
+
Interstate Highways
|
| 801 |
+
and Highways
|
| 802 |
+
0.752
|
| 803 |
+
0.975
|
| 804 |
+
20081
|
| 805 |
+
6559
|
| 806 |
+
0.712
|
| 807 |
+
0.775
|
| 808 |
+
19633
|
| 809 |
+
15246
|
| 810 |
+
Primary Roads
|
| 811 |
+
0.699
|
| 812 |
+
0.971
|
| 813 |
+
7909
|
| 814 |
+
2695
|
| 815 |
+
0.721
|
| 816 |
+
0.846
|
| 817 |
+
8665
|
| 818 |
+
6509
|
| 819 |
+
Secondary Roads
|
| 820 |
+
0.627
|
| 821 |
+
0.960
|
| 822 |
+
4899
|
| 823 |
+
1776
|
| 824 |
+
0.617
|
| 825 |
+
0.813
|
| 826 |
+
3667
|
| 827 |
+
2667
|
| 828 |
+
Tertiary Roads
|
| 829 |
+
0.414
|
| 830 |
+
0.959
|
| 831 |
+
3486
|
| 832 |
+
994
|
| 833 |
+
0.511
|
| 834 |
+
0.869
|
| 835 |
+
3090
|
| 836 |
+
1877
|
| 837 |
+
Local Roads
|
| 838 |
+
0.374
|
| 839 |
+
0.944
|
| 840 |
+
2474
|
| 841 |
+
853
|
| 842 |
+
0.426
|
| 843 |
+
0.742
|
| 844 |
+
1701
|
| 845 |
+
1083
|
| 846 |
+
Highway Ramps
|
| 847 |
+
0.242
|
| 848 |
+
0.866
|
| 849 |
+
10426
|
| 850 |
+
4722
|
| 851 |
+
0.182
|
| 852 |
+
0.402
|
| 853 |
+
9119
|
| 854 |
+
6846
|
| 855 |
+
|
| 856 |
+
Table 2. Volume Calibration Results by Urban/Rural Status.
|
| 857 |
+
Link Type
|
| 858 |
+
Training Set
|
| 859 |
+
Testing Set
|
| 860 |
+
Corr.
|
| 861 |
+
RMSE
|
| 862 |
+
Corr.
|
| 863 |
+
RMSE
|
| 864 |
+
Before
|
| 865 |
+
After
|
| 866 |
+
Before
|
| 867 |
+
After
|
| 868 |
+
Before
|
| 869 |
+
After
|
| 870 |
+
Before
|
| 871 |
+
After
|
| 872 |
+
All
|
| 873 |
+
0.746
|
| 874 |
+
0.966
|
| 875 |
+
7912
|
| 876 |
+
2996
|
| 877 |
+
0.764
|
| 878 |
+
0.854
|
| 879 |
+
7548
|
| 880 |
+
5701
|
| 881 |
+
Rural
|
| 882 |
+
0.769
|
| 883 |
+
0.967
|
| 884 |
+
3583
|
| 885 |
+
1442
|
| 886 |
+
0.727
|
| 887 |
+
0.826
|
| 888 |
+
4810
|
| 889 |
+
4075
|
| 890 |
+
|
| 891 |
+
-
|
| 892 |
+
.
|
| 893 |
+
60000
|
| 894 |
+
60000
|
| 895 |
+
60000
|
| 896 |
+
60000
|
| 897 |
+
40000
|
| 898 |
+
(veh/day)
|
| 899 |
+
40000
|
| 900 |
+
20000
|
| 901 |
+
20000
|
| 902 |
+
20000
|
| 903 |
+
20000
|
| 904 |
+
E
|
| 905 |
+
200004000060000
|
| 906 |
+
200004000060000
|
| 907 |
+
200004000060000
|
| 908 |
+
200004000060000
|
| 909 |
+
MDOT SHA
|
| 910 |
+
125000
|
| 911 |
+
125000
|
| 912 |
+
2
|
| 913 |
+
100000
|
| 914 |
+
100000
|
| 915 |
+
100000
|
| 916 |
+
75000
|
| 917 |
+
75000
|
| 918 |
+
75000
|
| 919 |
+
50000
|
| 920 |
+
50000
|
| 921 |
+
50000
|
| 922 |
+
C
|
| 923 |
+
25000
|
| 924 |
+
25000
|
| 925 |
+
25000
|
| 926 |
+
0
|
| 927 |
+
0
|
| 928 |
+
50000
|
| 929 |
+
100000
|
| 930 |
+
50000
|
| 931 |
+
100000
|
| 932 |
+
0
|
| 933 |
+
50000
|
| 934 |
+
100000
|
| 935 |
+
50000
|
| 936 |
+
10000015
|
| 937 |
+
|
| 938 |
+
Urban
|
| 939 |
+
0.738
|
| 940 |
+
0.964
|
| 941 |
+
8913
|
| 942 |
+
3363
|
| 943 |
+
0.764
|
| 944 |
+
0.853
|
| 945 |
+
8311
|
| 946 |
+
6179
|
| 947 |
+
|
| 948 |
+
Figure 9 visualizes the calibrated vehicle volume averaged from the entire year of 2019
|
| 949 |
+
(represented as AADT) on the all-street network in the state of Maryland. It can be seen that the
|
| 950 |
+
interstate highway and the highway skeletons can be clearly identified from the map. Major
|
| 951 |
+
arterials also stand out from the map. Figure 9 (b) zooms into the Washington D.C. area, where I-
|
| 952 |
+
495, I-270, I-95 and the Baltimore/Washington Parkway are clearly seen. Figure 9(c) zooms into
|
| 953 |
+
the Baltimore area, where I-395, I-695, I-795, I-95, and I-70 are all captured. Figure 9(d) zooms
|
| 954 |
+
into Hagerstown, MD, which is a city in Washington County, MD near the border of Pennsylvania.
|
| 955 |
+
The I-70, I-81, and MD-40 are all captured, demonstrating the ability of our proposed framework
|
| 956 |
+
to produce reliable results in rural areas.
|
| 957 |
+
|
| 958 |
+
|
| 959 |
+
Figure 9. Visualization of Calibrated Vehicle Volume. (a) the State of Maryland; (b) Washington D.C.;
|
| 960 |
+
(c) Baltimore City; (d) Hagerstown, MD.
|
| 961 |
+
|
| 962 |
+
5. CONCLUSIONS AND DISCUSSIONS
|
| 963 |
+
|
| 964 |
+
This paper presents a big-data driven framework that is able to ingest terabytes of MDLD and
|
| 965 |
+
estimate vehicle volume based on MDLD. The proposed framework first employs a series of
|
| 966 |
+
cloud-based computational algorithms to extract vehicle trajectories. A map-matching and routing
|
| 967 |
+
algorithm is then applied to snap and route vehicle trajectories to the road network. The observed
|
| 968 |
+
vehicle counts on each road segment are weighted and calibrated against the control total, i.e.,
|
| 969 |
+
annual vehicle miles traveled (VMT), and data collected from real-world loop detectors. The
|
| 970 |
+
proposed framework is implemented and validated on the all-street network in the state of
|
| 971 |
+
|
| 972 |
+
(a)
|
| 973 |
+
(b)
|
| 974 |
+
Calibrated VehicleVolume
|
| 975 |
+
(AADT) (veh/day)
|
| 976 |
+
<=5,000
|
| 977 |
+
5,000-10,000
|
| 978 |
+
10,00025,000
|
| 979 |
+
25,000-50,000
|
| 980 |
+
50,000-120,000
|
| 981 |
+
(c)
|
| 982 |
+
(d)16
|
| 983 |
+
|
| 984 |
+
Maryland using MDLD data from 2019. After weighting and calibration processes, high
|
| 985 |
+
correlation and low RMSE values are observed between our vehicle volume estimates and the
|
| 986 |
+
ground truth data.
|
| 987 |
+
|
| 988 |
+
The framework proposed in this study and the study findings have practical implications. For
|
| 989 |
+
instance, estimated vehicle volume based on MDLD can be leveraged in safety risk exposure
|
| 990 |
+
analysis. In particular, the proposed estimation method can particularly be beneficial for safety
|
| 991 |
+
risk exposure and crash analysis with respect to vulnerable road users (e.g., pedestrians and
|
| 992 |
+
bicyclists). Pedestrian and bicyclist exposure data have traditionally been collected through
|
| 993 |
+
surveys or count collections at sample locations (53, 54). In addition to being costly and labor-
|
| 994 |
+
intensive, these conventional data collection methods are susceptible to subjectivity and may yield
|
| 995 |
+
inaccurate data. Consequently, high-quality and readily-available pedestrian and bicyclist
|
| 996 |
+
exposure data are considered as a limitation in safety analysis (55). As exposure data are crucial
|
| 997 |
+
for contextualization of crash analysis and prioritization of safety countermeasures (53), utilization
|
| 998 |
+
of high-quality and consistent exposure data is imperative. When it comes to safety analysis, using
|
| 999 |
+
MDLD for volume estimation—as performed in this study—provides a tremendous advantage
|
| 1000 |
+
over using data obtained from traditional volume estimation methods. This is due to the potential
|
| 1001 |
+
of the MDLD to produce more reliable exposure data. Employment of such high-fidelity exposure
|
| 1002 |
+
data (i.e., MDLD-estimated volumes) as input for safety and crash analyses can lead to more
|
| 1003 |
+
accurate results and guide data-driven, evidence-based policy decision-making to improve the
|
| 1004 |
+
safety of all road users including the most vulnerable ones.
|
| 1005 |
+
|
| 1006 |
+
ACKNOWLEDGEMENTS
|
| 1007 |
+
This study was conducted as part of a collaboration among the Maryland Department of
|
| 1008 |
+
Transportation State Highway Administration (MDOT SHA), Maryland Transportation Institute
|
| 1009 |
+
(MTI) at the University of Maryland College Park, and Shock, Trauma and Anesthesiology
|
| 1010 |
+
Research (STAR) Center at the University of Maryland Baltimore through the sponsorship from
|
| 1011 |
+
the Safety Data Initiative from the U.S. Department of Transportation (USDOT).
|
| 1012 |
+
|
| 1013 |
+
CONFLICT OF INTEREST
|
| 1014 |
+
The authors declare that they have no conflict of interest.
|
| 1015 |
+
|
| 1016 |
+
AUTHOR CONTRIBUTION STATEMENT
|
| 1017 |
+
The authors confirm contribution to the paper as follows: study conception and design: M.Y., W.L.,
|
| 1018 |
+
C.X.; data collection: M.Y., M.A., J.M., G.C., S.S.N.; analysis and interpretation of results: M.Y.,
|
| 1019 |
+
J.M., W.L.; methodology support (osm2gmns): J.L.; draft manuscript preparation: M.Y., W.L.,
|
| 1020 |
+
M.A., J.M., G.C., S.S.N., A.K..
|
| 1021 |
+
|
| 1022 |
+
REFERENCE
|
| 1023 |
+
|
| 1024 |
+
1. Kwon, J., Varaiya, P. and Skabardonis, A.. Estimation of truck traffic volume from single loop
|
| 1025 |
+
detectors with lane-to-lane speed correlation. Transportation Research Record, 1856(1),
|
| 1026 |
+
pp.106-117 (2003).
|
| 1027 |
+
2. Muñoz, L., Sun, X., Horowitz, R., and Alvarez, L.. Traffic density estimation with the cell
|
| 1028 |
+
transmission model. In American Control Conference. Proceedings of the 2003, Vol. 5. IEEE,
|
| 1029 |
+
3750–3755 (2003).
|
| 1030 |
+
|
| 1031 |
+
17
|
| 1032 |
+
|
| 1033 |
+
3. Okutani, I. and Stephanedes, Y. J.. Dynamic prediction of traffic volume through Kalman
|
| 1034 |
+
filtering theory. Transportation Research Part B: Methodological 18, 1 (1984), 1–11
|
| 1035 |
+
4. Wilkie, D., Sewall, J., and Lin, M.. Flow reconstruction for data driven traffic animation. ACM
|
| 1036 |
+
Transactions on Graphics (TOG) 32, 4 (2013), 89
|
| 1037 |
+
5. Jia, Z., C. Chen, B. Coifman, and P. Varaiya. The PeMS Algorithms for Accurate, Real-Time
|
| 1038 |
+
Estimates of g-Factors and Speeds from Single Loop Detectors. Proc., IEEE Intelligent
|
| 1039 |
+
Transportation Systems Council Annual Meeting, IEEE, Piscataway, N.J., pp. 536–541 (2001).
|
| 1040 |
+
6. Zhao, Y., Zheng, J., Wong, W., Wang, X., Meng, Y., & Liu, H. X.. Various methods for queue
|
| 1041 |
+
length and traffic volume estimation using probe vehicle trajectories. Transportation Research
|
| 1042 |
+
Part C: Emerging Technologies, 107, 70–91 (2019). https://doi.org/10.1016/j.trc.2019.07.008
|
| 1043 |
+
7. Guo, Q., Li, L., & (Jeff) Ban, X.. Urban traffic signal control with connected and automated
|
| 1044 |
+
vehicles: A survey. In Transportation Research Part C: Emerging Technologies (Vol. 101, pp.
|
| 1045 |
+
313–334) (2019). Elsevier Ltd. https://doi.org/10.1016/j.trc.2019.01.026
|
| 1046 |
+
8. Sekuła, P., Marković, N., vander Laan, Z., & Sadabadi, K. F.. Estimating historical hourly
|
| 1047 |
+
traffic volumes via machine learning and vehicle probe data: A Maryland case study.
|
| 1048 |
+
Transportation Research Part C: Emerging Technologies, 97, 147–158 (2018).
|
| 1049 |
+
https://doi.org/10.1016/j.trc.2018.10.012
|
| 1050 |
+
9. Anuar, K., & Cetin, M.. Estimating Freeway Traffic Volume Using Shockwaves and Probe
|
| 1051 |
+
Vehicle Trajectory Data. Transportation Research Procedia, 22, 183–192 (2017).
|
| 1052 |
+
https://doi.org/10.1016/j.trpro.2017.03.025
|
| 1053 |
+
10. Li, F., Tang, K., Yao, J., & Li, K.. Real-Time Queue Length Estimation for Signalized
|
| 1054 |
+
Intersections Using Vehicle Trajectory Data. Transportation Research Record, 2623(1), 49–59
|
| 1055 |
+
(2017). https://doi.org/10.3141/2623-06
|
| 1056 |
+
11. Chen, C., Ma, J., Susilo, Y., Liu, Y., & Wang, M.. The promises of big data and small data for
|
| 1057 |
+
travel behavior (aka human mobility) analysis. Transportation Research Part C: Emerging
|
| 1058 |
+
Technologies. 68, 285-299, (2016).
|
| 1059 |
+
12. Yang, M., Pan, Y., Darzi, A., Ghader, S., Xiong, C. and Zhang, L.. A data-driven travel mode
|
| 1060 |
+
share estimation framework based on mobile device location data. Transportation, pp.1-45
|
| 1061 |
+
(2021).
|
| 1062 |
+
13. Battelle. Global Positioning Systems for Personal Travel Surveys: Lexington Area Travel Data
|
| 1063 |
+
Collection Test. Final Report. FHWA, U.S. Department of Transportation, (1997).
|
| 1064 |
+
14. 2000–2001 California Statewide Household Travel Survey. Final Report. NuStats, Austin, Tex
|
| 1065 |
+
(2002).
|
| 1066 |
+
15. Kansas City Regional Travel Survey. Final Report. NuStats, Austin, Tex, (2004).
|
| 1067 |
+
16. Mid-Region Council of Governments 2013 Household Travel Survey. Final Report. Westat,
|
| 1068 |
+
Rockville, Md, (2014).
|
| 1069 |
+
17. 2014 Southern Nevada Household Travel Survey. Final Report. Westat, Rockville, Md, (2015).
|
| 1070 |
+
18. INRIX Traffic. http://www.inrix.com/, (2020).
|
| 1071 |
+
19. Haghani, Ali, Masoud Hamedi, and Kaveh Farokhi Sadabadi. I-95 Corridor coalition vehicle
|
| 1072 |
+
probe project: Validation of INRIX data. I-95 Corridor Coalition 9, (2009).
|
| 1073 |
+
20. Schrank, D., Eisele, B., & Lomax, T.. 2014 Urban mobility report: powered by Inrix Traffic
|
| 1074 |
+
Data (No. SWUTC/15/161302-1), (2015).
|
| 1075 |
+
21. Cui, Z., Ke, R., Pu, Z., & Wang, Y.. Deep bidirectional and unidirectional LSTM recurrent
|
| 1076 |
+
neural network for network-wide traffic speed prediction. arXiv preprint arXiv:1801.02143,
|
| 1077 |
+
(2018).
|
| 1078 |
+
|
| 1079 |
+
18
|
| 1080 |
+
|
| 1081 |
+
22. Horak, Ray. Telecommunications and data communications handbook. John Wiley & Sons,
|
| 1082 |
+
(2007).
|
| 1083 |
+
23. Gonzalez, M. C., Hidalgo, C. A., & Barabasi, A. L.. Understanding individual human mobility
|
| 1084 |
+
patterns. Nature, 453(7196), 779-782, (2008).
|
| 1085 |
+
24. Kang, C., Liu, Y., Ma, X., & Wu, L.. Towards estimating urban population distributions from
|
| 1086 |
+
mobile call data. Journal of Urban Technology, 19(4), 3-21, (2012).
|
| 1087 |
+
25. Kang, C., Ma, X., Tong, D., & Liu, Y.. Intra-urban human mobility patterns: An urban
|
| 1088 |
+
morphology perspective. Physica A: Statistical Mechanics and its Applications, 391(4), 1702-
|
| 1089 |
+
1717, (2012).
|
| 1090 |
+
26. Pappalardo, L., F. Simini, S. Rinzivillo, D. Pedreschi, F. Giannotti and A.-L. Barabási.
|
| 1091 |
+
Returners and Explorers Dichotomy in Human Mobility. Nature communications. Vol. 6,pp.
|
| 1092 |
+
8166. (2015).
|
| 1093 |
+
27. Song, C., T. Koren, P. Wang and A.-L. Barabási. Modelling the Scaling Properties of Human
|
| 1094 |
+
Mobility. Nature Physics. Vol. 6, No. 10, pp. 818. (2010).
|
| 1095 |
+
28. Song, C., Z. Qu, N. Blumm and A.-L. Barabási. Limits of Predictability in Human Mobility.
|
| 1096 |
+
Science. Vol. 327, No. 5968, pp. 1018-102. (2010).
|
| 1097 |
+
29. Çolak, S., A. Lima and M. C. González. Understanding Congested Travel in Urban Areas.
|
| 1098 |
+
Nature communications. Vol. 7, pp. 10793. (2016).
|
| 1099 |
+
30. Bachir, D., Khodabandelou, G., Gauthier, V., El Yacoubi, M. and Puchinger, J. Inferring
|
| 1100 |
+
dynamic origin-destination flows by transport mode using mobile phone data. Transportation
|
| 1101 |
+
Research Part C: Emerging Technologies, 101, pp.254-275. (2019).
|
| 1102 |
+
31. Fekih, M., Bellemans, T., Smoreda, Z., Bonnel, P., Furno, A. and Galland, S.. A data-driven
|
| 1103 |
+
approach for origin–destination matrix construction from cellular network signalling data: a
|
| 1104 |
+
case study of Lyon region (France). Transportation, pp.1-32. (2020).
|
| 1105 |
+
32. Landmark, A.D., Arnesen, P., Södersten, C.J. and Hjelkrem, O.A.. Mobile phone data in
|
| 1106 |
+
transportation research: methods for benchmarking against other data sources. Transportation,
|
| 1107 |
+
pp.1-23. (2021).
|
| 1108 |
+
33. Wang, F., & Chen, C.. On data processing required to derive mobility patterns from passively-
|
| 1109 |
+
generated mobile phone data. Transportation Research Part C: Emerging Technologies. 87,
|
| 1110 |
+
58-74, (2018).
|
| 1111 |
+
34. Wang, F., Wang, J., Cao, J., Chen, C., & Ban, X. J.. Extracting trips from multi-sourced data
|
| 1112 |
+
for mobility pattern analysis: An app-based data example. Transportation Research Part C:
|
| 1113 |
+
Emerging Technologies. 105, 183-202, (2019).
|
| 1114 |
+
35. Puget Sound Regional Travel Study. Report: Spring 2014 Household Travel Survey. RSG,
|
| 1115 |
+
(2014).
|
| 1116 |
+
36. In-The-Moment Travel Study. Revised Report. RSG, (2015).
|
| 1117 |
+
37. Puget Sound Regional Travel Study. Report: 2015 Household Travel Survey. RSG, (2015).
|
| 1118 |
+
38. 2017 Puget Sound Regional Travel Study. Draft Final Report. RSG, (2017).
|
| 1119 |
+
39. Airsage. https://www.airsage.com/, (2020).
|
| 1120 |
+
40. Zhang, L., Darzi, A., Ghader, S., Pack, M.L., Xiong, C., Yang, M., Sun, Q., Kabiri, A. and Hu,
|
| 1121 |
+
S..
|
| 1122 |
+
Interactive
|
| 1123 |
+
covid-19
|
| 1124 |
+
mobility
|
| 1125 |
+
impact
|
| 1126 |
+
and
|
| 1127 |
+
social
|
| 1128 |
+
distancing
|
| 1129 |
+
analysis
|
| 1130 |
+
platform. Transportation Research Record, p.03611981211043813 (2020).
|
| 1131 |
+
41. Xiong, C., Hu, S., Yang, M., Luo, W., and Zhang, L.. Mobile device data reveal the dynamics
|
| 1132 |
+
in a positive relationship between human mobility and COVID-19 infections. Proceedings of
|
| 1133 |
+
the National Academy of Sciences, 117(44), 27087-27089 (2020a).
|
| 1134 |
+
|
| 1135 |
+
19
|
| 1136 |
+
|
| 1137 |
+
42. Xiong, C., Hu, S., Yang, M., Younes, H., Luo, W., Ghader, S. and Zhang, L.. Mobile device
|
| 1138 |
+
location data reveal human mobility response to state-level stay-at-home orders during the
|
| 1139 |
+
COVID-19 pandemic in the USA. Journal of the Royal Society Interface, 17(173), p.20200344.
|
| 1140 |
+
(2020b).
|
| 1141 |
+
43. Hu, S., Xiong, C., Yang, M., Younes, H., Luo, W. and Zhang, L., 2021. A big-data driven
|
| 1142 |
+
approach to analyzing and modeling human mobility trend under non-pharmaceutical
|
| 1143 |
+
interventions during COVID-19 pandemic. Transportation Research Part C: Emerging
|
| 1144 |
+
Technologies, 124, p.102955.
|
| 1145 |
+
44. Li, J.Q., Zhou, K., Shladover, S.E. and Skabardonis, A.. Estimating queue length under
|
| 1146 |
+
connected vehicle technology: Using probe vehicle, loop detector, and fused
|
| 1147 |
+
data. Transportation research record, 2356(1), pp.17-22 (2013).
|
| 1148 |
+
45. Meng, C., Yi, X., Su, L., Gao, J. and Zheng, Y.. City-wide traffic volume inference with loop
|
| 1149 |
+
detector data and taxi trajectories. In Proceedings of the 25th ACM SIGSPATIAL International
|
| 1150 |
+
Conference on Advances in Geographic Information Systems (pp. 1-10) (2017).
|
| 1151 |
+
46. Caceres, N., Romero, L. M., Benitez, F. G. and del Castillo, J. M.. Traffic Flow Estimation
|
| 1152 |
+
Models Using Cellular Phone Data. IEEE Transactions on Intelligent Transportation Systems,
|
| 1153 |
+
vol. 13, no. 3, pp. 1430-1441 (2012). doi: 10.1109/TITS.2012.2189006
|
| 1154 |
+
47. Janecek, A., Valerio, D., Hummel, K. A., Ricciato, F. and Hlavacs, H.. The Cellular Network
|
| 1155 |
+
as a Sensor: From Mobile Phone Data to Real-Time Road Traffic Monitoring. IEEE
|
| 1156 |
+
Transactions on Intelligent Transportation Systems, vol. 16, no. 5, pp. 2551-2572, doi:
|
| 1157 |
+
10.1109/TITS.2015.2413215 (2015).
|
| 1158 |
+
48. Xing, J., Liu, Z., Wu, C., & Chen, S.. Traffic volume estimation in multimodal urban networks
|
| 1159 |
+
using cell phone location data. IEEE Intelligent Transportation Systems Magazine, 11(3), 93-
|
| 1160 |
+
104 (2019).
|
| 1161 |
+
49. Fan, J., Fu, C., Stewart, K., and Zhang, L.. Using big GPS trajectory data analytics for vehicle
|
| 1162 |
+
miles traveled estimation. Transportation research part C: emerging technologies 103 (2019):
|
| 1163 |
+
298-307.
|
| 1164 |
+
50. Codjoe, Julius, Grace Ashley, and William Saunders. Evaluating cell phone data for AADT
|
| 1165 |
+
estimation. No. FHWA/LA. 18/591, LTRC Project Number: 16-3SA, State Project Number:
|
| 1166 |
+
DOTLT1000110. Louisiana Transportation Research Center, (2018).
|
| 1167 |
+
51. Zhang, L., Ghader, S., Darzi, A., Pan, Y., Yang, M., Sun, Q., Kabiri, A. and Zhao, G.. Data
|
| 1168 |
+
analytics and modeling methods for tracking and predicting origin-destination travel trends
|
| 1169 |
+
based on mobile device data. Federal Highway Administration Exploratory Advanced
|
| 1170 |
+
Research Program (2020).
|
| 1171 |
+
52. Newson, P. and Krumm, J.. Hidden Markov map matching through noise and sparseness.
|
| 1172 |
+
In Proceedings of the 17th ACM SIGSPATIAL international conference on advances in
|
| 1173 |
+
geographic information systems (pp. 336-343) (2009).
|
| 1174 |
+
53. Sanders, R.L., Frackelton, A., Gardner, S., Schneider, R., Hintze, M. Ballpark Method for
|
| 1175 |
+
Estimating Pedestrian and Bicyclist Exposure in Seattle, Washington: Potential Option for
|
| 1176 |
+
Resource-constrained Cities in an Age of Big Data. Transportation Research Record, 2605(1),
|
| 1177 |
+
pp.32–44 (2017).
|
| 1178 |
+
54. Lee, K., and Sener, I.N. Emerging Data Mining for Pedestrian and Bicyclist Monitoring: A
|
| 1179 |
+
Literature Review Report. Safety through Disruption, National University Transportation
|
| 1180 |
+
Center (UTC) Program. (2017). https://safed.vtti.vt.edu/wp-content/uploads/2020/07/UTC-
|
| 1181 |
+
Safe-D_Emerging-Data-Mining-for-PedBike_TTI-Report_26Sep17_final.pdf. Accessed July
|
| 1182 |
+
10, 2021.
|
| 1183 |
+
|
| 1184 |
+
20
|
| 1185 |
+
|
| 1186 |
+
55. Synthesis of Methods of Estimating Pedestrian and Bicyclist Exposure to Risk at Areawide
|
| 1187 |
+
Levels and on Specific Transportation Facilities. FHWA-SA-17-041. FHWA, U.S.
|
| 1188 |
+
Department of Transportation, (2017).
|
| 1189 |
+
|
CNFAT4oBgHgl3EQfsx5b/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
CNFAT4oBgHgl3EQfsx5b/vector_store/index.faiss
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:96d0bce6dfc1b7672d9a66e83a94acadd6b37857a79fe2d91a32599af60599d6
|
| 3 |
+
size 4325421
|
CNFAT4oBgHgl3EQfsx5b/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:be96a0404281fd1420de0277849ab9072e3c08199b1709c75513f56b67a207a0
|
| 3 |
+
size 145839
|
F9FKT4oBgHgl3EQfbS5P/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
F9FKT4oBgHgl3EQfbS5P/vector_store/index.pkl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d9cff610be896d59369b5be5ff5c2b3fad8b788bba9d25d2c816c082ecb0daed
|
| 3 |
+
size 175551
|
H9AyT4oBgHgl3EQfrvmy/content/tmp_files/2301.00567v1.pdf.txt
ADDED
|
@@ -0,0 +1,1551 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
Strange Stars within Bosonic and Fermionic Admixed Dark Matter
|
| 2 |
+
Luiz L. Lopes1∗ and H. C. Das2,3†
|
| 3 |
+
1Centro Federal de Educac¸˜ao Tecnol´ogica de Minas Gerais Campus VIII; CEP 37.022-560, Varginha - MG - Brasil
|
| 4 |
+
2Institute of Physics, Sachivalaya Marg, Bhubaneswar 751005, India and
|
| 5 |
+
3Homi Bhabha National Institute, Training School Complex, Anushakti Nagar, Mumbai 400094, India
|
| 6 |
+
(Dated: January 3, 2023)
|
| 7 |
+
In this work, we study dark matter (DM) admixed strange quark stars exploring the different possibilities
|
| 8 |
+
about the nature of the DM and their effects on the macroscopic properties of strange stars, such as maximum
|
| 9 |
+
masses, radii, as well the dimensionless tidal parameter. We observe that the DM significantly affects the
|
| 10 |
+
macroscopic properties that depend on the DM mass, type, and fraction inside the star.
|
| 11 |
+
I.
|
| 12 |
+
INTRODUCTION
|
| 13 |
+
Recently, it was suggested that quarks probable appear in-
|
| 14 |
+
side the core of a massive neutron star (NS) due to a very high
|
| 15 |
+
density, where hadronic matter undergoes phase transitions to
|
| 16 |
+
a new phase of quarks and gluons [1]. Furthermore, several
|
| 17 |
+
exotic particles, such as hyperons production, dark matter ac-
|
| 18 |
+
cretions, kaon condensations, and so on, appeared primarily in
|
| 19 |
+
the core of the NS. As a result, in those regimes, the equation
|
| 20 |
+
of state (EoS) is the fundamental component that can describe
|
| 21 |
+
both micro/macroscopic properties. Another possibility is that
|
| 22 |
+
at least some of the observed pulsars are indeed stable quark
|
| 23 |
+
stars, or strange stars. Several theoretical works have pro-
|
| 24 |
+
posed the existence of strange quark stars (SQSs) [2], which
|
| 25 |
+
are made up of u, d, and s quarks in equilibrium in terms
|
| 26 |
+
of weak interactions. The Bodmen-Witten conjecture states
|
| 27 |
+
that strange quark matter (SQM) can have a lower energy per
|
| 28 |
+
baryon than pure nucleons because the exclusion principle
|
| 29 |
+
may be dominant at absolute zero pressure and temperature
|
| 30 |
+
[3, 4]. Hence, the SQM might be the true ground state of the
|
| 31 |
+
hadronic matter. Hence, it stands to reason that the SQS must
|
| 32 |
+
be more stable than the ordinary NS.
|
| 33 |
+
Various phenomenological models have been proposed to
|
| 34 |
+
explore the SQSs properties.
|
| 35 |
+
Among them, the MIT bag
|
| 36 |
+
model and Nambu-Jona-Lasinio (NJL) have been widely
|
| 37 |
+
used. In this study, we use the vector MIT (vMIT) bag model
|
| 38 |
+
to describe the quark matter interactions [5, 6]. In the MIT
|
| 39 |
+
bag model, it has been assumed that the quarks are bound
|
| 40 |
+
in a bag of finite dimensions. In contrast to their absolute
|
| 41 |
+
mass, which is very high, it is hypothesized that quarks in-
|
| 42 |
+
side the bag have a very low mass. The system is given a
|
| 43 |
+
bag constant B as a constant energy density to balance the
|
| 44 |
+
bag’s behavior and determine its size. The inward pressure
|
| 45 |
+
at the bag’s surface counterbalances the outward pressure the
|
| 46 |
+
quarks cause, which means the pressure between the true and
|
| 47 |
+
perturbative vacuum. Consequently, as B increases, the quark
|
| 48 |
+
pressure lowers, which impacts the star’s structure. The value
|
| 49 |
+
of B relies on the mass of the strange quark when u and d
|
| 50 |
+
quarks have very low masses. The values of B still need to
|
| 51 |
+
be established and are fully model-dependent. One can con-
|
| 52 |
+
strain its values with the help of observational results. For
|
| 53 | |
| 54 | |
| 55 |
+
example, in the observational limit of GW170817, the pre-
|
| 56 |
+
dicted values of B1/4 = 134.1 − 141.4 MeV with low-spin
|
| 57 |
+
prior and B1/4 = 126.1 − 141.4 MeV with high spin prior
|
| 58 |
+
for SQSs [7]. In Ref. [8], they have predicted the range of
|
| 59 |
+
B1/4 = 133.68 − 222.5 MeV for SQSs. However, in the
|
| 60 |
+
vMIT bag model [5, 6], the value of B can be obtained by
|
| 61 |
+
including the stability window, as mentioned in Refs. [3, 4].
|
| 62 |
+
Moreover, there are different phenomenological and macro-
|
| 63 |
+
scopic studies suggesting that the quark phases inside the
|
| 64 |
+
compact stars can undergo a phase transition into a color su-
|
| 65 |
+
perconducting state of 2-flavour superconducting (2SC), and
|
| 66 |
+
color-flavor locked (CFL) [9, 10]. They form Cooper pairs
|
| 67 |
+
at high density and low-temperature [11]. The gap parameter
|
| 68 |
+
(∆) determines the pairing strength of Cooper pairs influence
|
| 69 |
+
the formation of pure CFL stars [12–17] and CFL magnetars
|
| 70 |
+
[18, 19]. Recently, it has been suggested that with the proper
|
| 71 |
+
choice of ∆ and bag pressure B, the CFL stars and their EoS
|
| 72 |
+
can successfully reproduce various observational constraints
|
| 73 |
+
such as GW and NICER results [20–22]. In this study, we
|
| 74 |
+
want to explore the dark matter (DM) effects on the strange
|
| 75 |
+
stars with with and without CFL phases and try to constrain
|
| 76 |
+
the macroscopic properties with various observational data.
|
| 77 |
+
The compact objects such as NS, white dwarfs captures
|
| 78 |
+
some amount of DM inside it in their evolving time. The
|
| 79 |
+
amount of DM particles acrreted inside the star due to its im-
|
| 80 |
+
mense gravitational potential. Various theoretical predictions
|
| 81 |
+
provide us with the unknown nature of DM. Still, numerous
|
| 82 |
+
work has been fully dedicated to explaining its properties by
|
| 83 |
+
applying it to different systems such as white dwarf [23], NS
|
| 84 |
+
[24–28], and even our earth [29]. In the present study, we as-
|
| 85 |
+
sume that the SQSs might contain a certain amount of DM
|
| 86 |
+
in their life time. The types of DM particles may be either
|
| 87 |
+
bosonic or fermionic, and also the percentage of DM depends
|
| 88 |
+
on the (i) evolution time and (ii) types of accretions. How-
|
| 89 |
+
ever, the accreted DM particles interact directly or indirectly
|
| 90 |
+
with hadrons by exchanging other bosonic particles, mainly
|
| 91 |
+
depending on the model used. Here, we take different types
|
| 92 |
+
of possible scenarios for DM admixed SQS.
|
| 93 |
+
The direct detection experiments have already been estab-
|
| 94 |
+
lished, such as XENON100 [30], XENON1T[31], CDMS
|
| 95 |
+
[32], LUX [33], PANDAX-II [34] etc. to measure the scat-
|
| 96 |
+
tering cross-section of the DM and nucleons.
|
| 97 |
+
Although,
|
| 98 |
+
they provided some exclusions bound to the scattering cross-
|
| 99 |
+
section. Still, the null results provided by the experiments
|
| 100 |
+
alluded to an inconclusive nature of DM. However, the exclu-
|
| 101 |
+
sion bounds prescribed by such direct detection experiments
|
| 102 |
+
arXiv:2301.00567v1 [astro-ph.HE] 2 Jan 2023
|
| 103 |
+
|
| 104 |
+
2
|
| 105 |
+
depend on the local DM density around the solar neighbor-
|
| 106 |
+
hood, which does not affect the density of DM in the NS/SQS
|
| 107 |
+
environment. After the accretion of DM inside NS/SQS, it
|
| 108 |
+
collides with nucleons or quarks by losing its kinetic energy,
|
| 109 |
+
and eventually, it is bound inside the star. When the accre-
|
| 110 |
+
tion ends, the DM particles finally reach thermal equilibrium
|
| 111 |
+
with one another due to their internal interactions. This ex-
|
| 112 |
+
plains why NSs with admixed DM have essentially constant
|
| 113 |
+
DM particle densities [25, 27, 28, 35]. Therefore, the accreted
|
| 114 |
+
DM particles are restricted to a narrow radius area inside the
|
| 115 |
+
star. In this study, we choose two types of DM and see their
|
| 116 |
+
effects on the SQS properties with the vMIT bag model and a
|
| 117 |
+
model with superconducting phases.
|
| 118 |
+
Recently, the fastest and heaviest Galactic NS named PSR
|
| 119 |
+
J0952-0607 (black widow) in the disk of the Milky Way has
|
| 120 |
+
been detected to have mass M = 2.35 ± 0.17 M⊙ in continu-
|
| 121 |
+
ation of the pulsars PSR J0740+6620 (M = 2.08 ± 0.07 M⊙
|
| 122 |
+
[36, 37]). The simultaneous measurements of the M and R
|
| 123 |
+
for NS are done by neutron star interior composition explorer
|
| 124 |
+
(NICER) [38, 39] while the limit on the dimensionless tidal
|
| 125 |
+
deformability of Λ1.4 = 190+390
|
| 126 |
+
−120 was provided in GW170817
|
| 127 |
+
event [40]. We calculate the mass, radius, and tidal deforma-
|
| 128 |
+
bility for the DM admixed SQS and put constraints using
|
| 129 |
+
the observational results obtained from different x-ray/pulsars
|
| 130 |
+
data, GW170817 data.
|
| 131 |
+
II.
|
| 132 |
+
FORMALISM
|
| 133 |
+
A.
|
| 134 |
+
Vector MIT bag model
|
| 135 |
+
We use the thermodynamic consistent vector MIT bag
|
| 136 |
+
model introduced in Ref. [5, 6] to describe the quark matter.
|
| 137 |
+
In this model, the quark interaction is mediated by the vec-
|
| 138 |
+
tor channel V µ, analogous to the ω meson in QHD [41]. Its
|
| 139 |
+
Lagrangian reads:
|
| 140 |
+
LvMIT =
|
| 141 |
+
�
|
| 142 |
+
¯ψq
|
| 143 |
+
�
|
| 144 |
+
γµ(i∂µ − gqV Vµ) − mq
|
| 145 |
+
�
|
| 146 |
+
ψq
|
| 147 |
+
−B + 1
|
| 148 |
+
2m2
|
| 149 |
+
V V µVµ
|
| 150 |
+
�
|
| 151 |
+
Θ( ¯ψqψq),
|
| 152 |
+
(1)
|
| 153 |
+
where mq is the mass of the quark q of flavor u, d or s, ψq
|
| 154 |
+
is the Dirac quark field, B is the constant vacuum pressure,
|
| 155 |
+
and Θ( ¯ψqψq) is the Heaviside step function to assure that
|
| 156 |
+
the quarks exist only confined to the bag. Applying Euler-
|
| 157 |
+
Lagrange, we obtain the energy eigenvalue, which at T = 0
|
| 158 |
+
K, is also the chemical potential:
|
| 159 |
+
Eq = µq =
|
| 160 |
+
�
|
| 161 |
+
m2q + k2 + gqV Vµ,
|
| 162 |
+
(2)
|
| 163 |
+
now, using Fermi-Dirac statistics, we can obtain the EoS in
|
| 164 |
+
mean field approximation. The energy density of the quarks
|
| 165 |
+
is:
|
| 166 |
+
ϵq = Nc
|
| 167 |
+
π2
|
| 168 |
+
� kf
|
| 169 |
+
0
|
| 170 |
+
Eqk2d3k,
|
| 171 |
+
(3)
|
| 172 |
+
where Nc = 3 is the number of colors and kf is the Fermi
|
| 173 |
+
momentum. The contribution of the bag and the mesonic mass
|
| 174 |
+
term is obtained with the Hamiltonian: H = −⟨L⟩. The total
|
| 175 |
+
quark energy density now reads:
|
| 176 |
+
ϵ =
|
| 177 |
+
�
|
| 178 |
+
q
|
| 179 |
+
ϵq + B − 1
|
| 180 |
+
2m2
|
| 181 |
+
vV 2
|
| 182 |
+
0 .
|
| 183 |
+
(4)
|
| 184 |
+
To construct an electrically neutral, beta-stable matter, leptons
|
| 185 |
+
are added as a free Fermi gas. The pressure is obtained via the
|
| 186 |
+
relation: p = � µn − ϵ, where the sum runs over all the
|
| 187 |
+
fermions.
|
| 188 |
+
The parameters utilized in this work are the same as pre-
|
| 189 |
+
sented in Ref. [5]. We use mu = md = 4 MeV, and ms = 95
|
| 190 |
+
MeV. We also assume a universal coupling of quarks with the
|
| 191 |
+
vector meson, i.e., guV = gdV = gsV = gV , and use a value
|
| 192 |
+
of GV = 0.3 fm2 as defined below:
|
| 193 |
+
GV =
|
| 194 |
+
� gV
|
| 195 |
+
mV
|
| 196 |
+
�2
|
| 197 |
+
= 0.3 fm2.
|
| 198 |
+
(5)
|
| 199 |
+
Now, the value of GV is somewhat arbitrary. To reproduce
|
| 200 |
+
stable strange matter, the value of GV combined with the bag
|
| 201 |
+
must lie in the range known as the stability window. The sta-
|
| 202 |
+
bility window is related to the so-called Bodmer-Witten con-
|
| 203 |
+
jecture [3, 4], which states that the true ground state of the
|
| 204 |
+
strongly interacting matter is not protons and neutrons but
|
| 205 |
+
consists of strange quark matter, which in turn is composed
|
| 206 |
+
of deconfined up, down, and strange quarks. For the SQM
|
| 207 |
+
hypothesis to be accurate, the energy per baryon of the decon-
|
| 208 |
+
fined phase (for p = 0 and T = 0) is lower than the nonstrange
|
| 209 |
+
infinite baryonic matter [3–5].
|
| 210 |
+
Euds/A < 930 MeV,
|
| 211 |
+
(6)
|
| 212 |
+
at the same time, the nonstrange matter still needs to have
|
| 213 |
+
an energy per baryon higher than nonstrange infinite baryonic
|
| 214 |
+
one; otherwise, protons and neutrons would decay into u and
|
| 215 |
+
d quarks:
|
| 216 |
+
Eud/A > 930 MeV.
|
| 217 |
+
(7)
|
| 218 |
+
Therefore, both, Eqs. 6 and 7 must simultaneously satisfied.
|
| 219 |
+
For GV = 0.3 fm2 used in this work, the stability window
|
| 220 |
+
lies between 139 MeV < B1/4 < 146 MeV [5]. Here, we
|
| 221 |
+
assume the maximum allowed value: B1/4 = 146 MeV, as it
|
| 222 |
+
will produce the lower radius for the canonical star, as well the
|
| 223 |
+
lower value of the dimensionless tidal parameter Λ, while still
|
| 224 |
+
producing very massive strange quark stars, M > 2.40 M⊙.
|
| 225 |
+
B.
|
| 226 |
+
Superconducting CFL quark matter via analytical
|
| 227 |
+
approximation
|
| 228 |
+
Due to the low temperature and high densities reached in
|
| 229 |
+
the strange star interiors, the quark matter may be a color
|
| 230 |
+
superconductor, which is a degenerate Fermi gas of quarks
|
| 231 |
+
with a condensate of Cooper pairs near the Fermi surface
|
| 232 |
+
that induces color Meissner effects [11]. Among the vari-
|
| 233 |
+
ous possible configurations of superconducting matter, we can
|
| 234 |
+
cite two possibilities: The two-flavor color-superconducting
|
| 235 |
+
|
| 236 |
+
3
|
| 237 |
+
phase, where quarks with two out of three colors and two out
|
| 238 |
+
of three flavors pair in the standard BCS fashion. The flavors
|
| 239 |
+
with the most phase space near their Fermi surfaces, namely,
|
| 240 |
+
u and d, are the ones that pair, leaving the strange quark and
|
| 241 |
+
the remaining color unpaired. Such phase is expected at den-
|
| 242 |
+
sities around 2 < n/n0 < 4 [42]. Another one is the color-
|
| 243 |
+
flavor locked phase, where the up, down, and strange quarks
|
| 244 |
+
can be treated on an equal footing, and the disruptive effects
|
| 245 |
+
of the strange quark mass can be neglected. In this phase,
|
| 246 |
+
quarks of all three colors and all three flavors form conven-
|
| 247 |
+
tional spinless Cooper pairs. The CFL phase is expected at
|
| 248 |
+
n > 4n0 [42]. For additional discussion about 2SC, CFL,
|
| 249 |
+
and other color superconducting phases, see Ref. [11] and the
|
| 250 |
+
references therein.
|
| 251 |
+
The 2SC and the CFL phases were explored within the NJL
|
| 252 |
+
model in Ref. [43], while in Ref. [42], the authors show that
|
| 253 |
+
the color superconducting NJL EoS is very well fitted by an
|
| 254 |
+
analytical approximation, called constant-sound-speed (CSS)
|
| 255 |
+
parameterization, whose EoS reads [42, 44, 45]:
|
| 256 |
+
p = a(ϵ − ϵ∗),
|
| 257 |
+
n = n∗[(1 + a)p/(aϵ∗)]1/(1+a).
|
| 258 |
+
(8)
|
| 259 |
+
We have, therefore, three free parameters, the square of the
|
| 260 |
+
speed of sound (v2
|
| 261 |
+
s = a), the energy density at p = 0 (ϵ∗),
|
| 262 |
+
which plays a role similar to the bag in the MIT base models,
|
| 263 |
+
and the number density at p = 0 (n∗). In Ref. [42], the authors
|
| 264 |
+
freely vary the value of a in the range 0.2 < a < 0.8 and
|
| 265 |
+
found that - depending on the NJL parametrization - the 2SC
|
| 266 |
+
phase is well described by a < 0.33 while the CFL phase is
|
| 267 |
+
described by a > 0.35. On the other hand, Ref. [44] uses the
|
| 268 |
+
extreme case a = 1. Here we consider that the quark matter
|
| 269 |
+
is in the CFL phase and use an intermediate value, a = 0.6
|
| 270 |
+
(see the text and Fig. 4 from Ref. [42], as well Ref. [45]).
|
| 271 |
+
The value of ϵ∗ is chosen as 203 MeV/fm3 to match the value
|
| 272 |
+
coming from the vector MIT bag model. Finally, n∗ has to
|
| 273 |
+
be constrained, as we still need to reproduce strange quark
|
| 274 |
+
stars in accordance with the Bodmer-Witten conjecture. We
|
| 275 |
+
choose n∗ = 0.24 fm−3, which is very close to n0 = 0.23 fm−3
|
| 276 |
+
coming from the vector MIT. Within this value, we have E/A
|
| 277 |
+
= 906 MeV, with implies that the analytical approximation
|
| 278 |
+
of the CFL satisfies Eq. 6 and, therefore, the Bodmer-Witten
|
| 279 |
+
conjecture.
|
| 280 |
+
III.
|
| 281 |
+
RESULTS AND DISCUSSIONS
|
| 282 |
+
A.
|
| 283 |
+
Bosonic DM
|
| 284 |
+
This section briefly reviews the formalism of a bosonic DM
|
| 285 |
+
model initially proposed in Refs. [46, 47]. At very low tem-
|
| 286 |
+
peratures, all particles in a dilute Bose gas condense to the
|
| 287 |
+
same quantum ground state, forming a Bose-Einstein Con-
|
| 288 |
+
densate (BEC). Particles become correlated when their wave-
|
| 289 |
+
lengths overlap; that means the thermal wavelength is greater
|
| 290 |
+
than the mean inter-particle distance. Assuming T = 0 K
|
| 291 |
+
approximation, almost all the DM particles are in the con-
|
| 292 |
+
densate. Only binary collisions at low energy are relevant in
|
| 293 |
+
a dilute and cold gas. These collisions are characterized by
|
| 294 |
+
a single parameter, the s-wave scattering length la, indepen-
|
| 295 |
+
dently of the details of the two-body potential. Therefore, one
|
| 296 |
+
can replace the interaction potential with an effective repul-
|
| 297 |
+
sive interaction [48]:
|
| 298 |
+
V (⃗r − ⃗r′) = 4πla
|
| 299 |
+
mx
|
| 300 |
+
δ(⃗r − ⃗r′),
|
| 301 |
+
(9)
|
| 302 |
+
where mx is the mass of the bosonic DM.
|
| 303 |
+
The ground state properties of the DM are described by the
|
| 304 |
+
mean-field Gross-Pitaevskii (GP) equation, and the equation
|
| 305 |
+
of the state (EoS) has the form [27, 46, 47, 49]:
|
| 306 |
+
px = 2πla
|
| 307 |
+
m3x
|
| 308 |
+
ϵ2
|
| 309 |
+
x..
|
| 310 |
+
(10)
|
| 311 |
+
The scattering length la is assumed equal to 1 fm, as in the
|
| 312 |
+
Ref. [27, 46, 47, 49]. Moreover, the pressure strongly de-
|
| 313 |
+
pends on the bosonic DM’s mass due to the cubic dependence.
|
| 314 |
+
Therefore this parameter must be taken with care. Based on
|
| 315 |
+
the self-interaction cross-section of the DM constraint (see
|
| 316 |
+
Refs. [27, 49], the DM mass in the range 50 MeV < mx <
|
| 317 |
+
160 MeV. However, the original works from Ref. [46, 47] sug-
|
| 318 |
+
gest a mass of around 1 GeV. It is worth emphasizing that a
|
| 319 |
+
mass ten times larger imply in pressure 1000 times lower! In
|
| 320 |
+
Ref. [50], the authors use a slightly different model of bosonic
|
| 321 |
+
DM, where the self-interaction is based on a scalar quartic
|
| 322 |
+
term in the potential.
|
| 323 |
+
They use the same constraint based
|
| 324 |
+
on the self-interaction cross-section of the DM and suggest
|
| 325 |
+
a mass of 400 MeV. To explore the ambiguity relative to the
|
| 326 |
+
mass of the bosonic DM, we use here two values: 100 MeV,
|
| 327 |
+
which agrees with Ref. [27, 49] and 400 MeV, which is in
|
| 328 |
+
agreement with Ref. [50], and it is not so far from 1 GeV as
|
| 329 |
+
suggested in Ref. [46, 47]. With these settings, the pressure
|
| 330 |
+
for mx = 400 MeV is 64 times lower than for mx = 100 MeV.
|
| 331 |
+
The total EoS of the strange star is, therefore, the sum of
|
| 332 |
+
the contribution of the ordinary quark matter and the DM:
|
| 333 |
+
p = pq + px,
|
| 334 |
+
and
|
| 335 |
+
ϵ = ϵq + ϵx.
|
| 336 |
+
(11)
|
| 337 |
+
Another important quantity is the fraction of the DM. To solve
|
| 338 |
+
the TOV equations [51], we need to specify the central values
|
| 339 |
+
both for normal matter and for DM: pq(0), px(0) respectively.
|
| 340 |
+
Here, we follow Ref. [27, 49] and define:
|
| 341 |
+
fx =
|
| 342 |
+
px(0)
|
| 343 |
+
pq(0) + px(0),
|
| 344 |
+
(12)
|
| 345 |
+
and use three different values for fx = 0.05, 0.075 and 0.10.
|
| 346 |
+
As pointed out in Ref. [27, 49], these values agree with the
|
| 347 |
+
current DM constraints obtained from stars like the Sun.
|
| 348 |
+
1. Bosonic DM within vector MIT bag model
|
| 349 |
+
In Fig. 1, we plot the TOV solution for bosonic DM ad-
|
| 350 |
+
mixed strange stars with the mass of 100 MeV and 400 MeV.
|
| 351 |
+
As can be seen, for a bosonic DM mass of 100 MeV, we
|
| 352 |
+
have an increase in the maximum mass with the increase of the
|
| 353 |
+
|
| 354 |
+
4
|
| 355 |
+
1
|
| 356 |
+
1.4
|
| 357 |
+
1.8
|
| 358 |
+
2.2
|
| 359 |
+
2.6
|
| 360 |
+
10
|
| 361 |
+
10.5
|
| 362 |
+
11
|
| 363 |
+
11.5
|
| 364 |
+
12
|
| 365 |
+
12.5
|
| 366 |
+
13
|
| 367 |
+
mx = 100 MeV
|
| 368 |
+
M/M0
|
| 369 |
+
R (km)
|
| 370 |
+
fx = 0.000
|
| 371 |
+
fx = 0.050
|
| 372 |
+
fx = 0.075
|
| 373 |
+
fx = 0.100
|
| 374 |
+
1
|
| 375 |
+
1.4
|
| 376 |
+
1.8
|
| 377 |
+
2.2
|
| 378 |
+
2.6
|
| 379 |
+
10
|
| 380 |
+
10.5
|
| 381 |
+
11
|
| 382 |
+
11.5
|
| 383 |
+
12
|
| 384 |
+
12.5
|
| 385 |
+
13
|
| 386 |
+
mx = 400 MeV
|
| 387 |
+
M/M0
|
| 388 |
+
R (km)
|
| 389 |
+
fx = 0.000
|
| 390 |
+
fx = 0.050
|
| 391 |
+
fx = 0.075
|
| 392 |
+
fx = 0.100
|
| 393 |
+
FIG. 1. Mass-radius relation for bosonic DM admixed strange stars
|
| 394 |
+
with mx =100 MeV (left) and mx = 400 MeV (right).
|
| 395 |
+
fraction of DM. This result is coherent with those presented in
|
| 396 |
+
Ref. [27, 49] for the original, massless MIT. Moreover, as in
|
| 397 |
+
the case of the original massless MIT, with the massive vector
|
| 398 |
+
MIT, we also see that the presence of DM affects only massive
|
| 399 |
+
stars. Strange stars with M < 1.5 M⊙ reproduced essentially
|
| 400 |
+
the same radii. The maximum masses vary from 2.41 M⊙ for
|
| 401 |
+
pure strange stars to 2.51M⊙ for bosonic DM admixed with
|
| 402 |
+
a fraction of 0.10. This indicates that the PSR J0740+6620
|
| 403 |
+
with a gravitational mass of 2.08 ± 0.07 M⊙ [37] can indeed
|
| 404 |
+
be a stable strange star with or without admixed bosonic DM.
|
| 405 |
+
Even the possible mass of 2.35 ± 0.17 M⊙ of the black widow
|
| 406 |
+
pulsar PSR J0952-0607 [52] can be explained as bosonic DM
|
| 407 |
+
matter admixed strange star. On the other hand, the radius
|
| 408 |
+
of the canonical star is in the narrow range of 11.37 km to
|
| 409 |
+
11.40 km. In the literature, there is no consensus about the
|
| 410 |
+
true value of the radius of the canonical star. For instance, in
|
| 411 |
+
ref. [53], the constraint on the radius of the canonical star is
|
| 412 |
+
10.1 − 11.1 km, which provides a very narrow range. If this
|
| 413 |
+
is true, neither of our results can fulfill such tight constraints.
|
| 414 |
+
In Ref. [54], an upper limit of 11.9 km was provided. In this
|
| 415 |
+
case, our results are in full agreement. However, recent results
|
| 416 |
+
from the NICER x-ray telescope point that the radius of the
|
| 417 |
+
canonical star is between 11.52 km and 13.85 km [39] and
|
| 418 |
+
between 11.96 km and 14.26 km as given in Ref. [38]. In
|
| 419 |
+
these cases, our radii are too small.
|
| 420 |
+
0
|
| 421 |
+
200
|
| 422 |
+
400
|
| 423 |
+
600
|
| 424 |
+
800
|
| 425 |
+
1000
|
| 426 |
+
1.2
|
| 427 |
+
1.4
|
| 428 |
+
1.6
|
| 429 |
+
1.8
|
| 430 |
+
2
|
| 431 |
+
2.2
|
| 432 |
+
2.4
|
| 433 |
+
2.6
|
| 434 |
+
mx = 100 MeV
|
| 435 |
+
Λ
|
| 436 |
+
M/M0
|
| 437 |
+
fx = 0.000
|
| 438 |
+
fx = 0.050
|
| 439 |
+
fx = 0.075
|
| 440 |
+
fx = 0.100
|
| 441 |
+
0
|
| 442 |
+
200
|
| 443 |
+
400
|
| 444 |
+
600
|
| 445 |
+
800
|
| 446 |
+
1000
|
| 447 |
+
1.2
|
| 448 |
+
1.4
|
| 449 |
+
1.6
|
| 450 |
+
1.8
|
| 451 |
+
2
|
| 452 |
+
2.2
|
| 453 |
+
2.4
|
| 454 |
+
2.6
|
| 455 |
+
mx = 400 MeV
|
| 456 |
+
Λ
|
| 457 |
+
M/M0
|
| 458 |
+
fx = 0.000
|
| 459 |
+
fx = 0.050
|
| 460 |
+
fx = 0.075
|
| 461 |
+
fx = 0.100
|
| 462 |
+
FIG. 2. Dimensionless tidal parameter Λ for bosonic DM admixed
|
| 463 |
+
strange stars with mx = 100 MeV (top) and mx = 400 MeV (bot-
|
| 464 |
+
tom).
|
| 465 |
+
Now, we have opposite results for a mass mx = 400 MeV!
|
| 466 |
+
First, the maximum mass decrease with the increase of DM
|
| 467 |
+
fraction, dropping from 2.41 M⊙ to 2.29 M⊙ for a fraction fx
|
| 468 |
+
of 0.10. However, all values agree with the mass of the PSR
|
| 469 |
+
J0740+6620 [37] and the PSR J0952-0607 [52]. Secondly,
|
| 470 |
+
we see that even low-mass strange stars are already affected
|
| 471 |
+
by the DM and are significantly more compact. The radius
|
| 472 |
+
of the 1.4 M⊙ strange star can reach a value as low as 11.08
|
| 473 |
+
km. Therefore, this result is in agreement with both Refs. [53,
|
| 474 |
+
54]. The polytropic EoS of Eq. 10 can easily explain these
|
| 475 |
+
results. A four times higher DM matter mass produces sixty-
|
| 476 |
+
four times smaller pressure! The reduction of the pressure
|
| 477 |
+
causes the reduction of the maximum mass and increases the
|
| 478 |
+
star compression.
|
| 479 |
+
Another essential quantity and constraint is the so-called
|
| 480 |
+
dimensionless tidal deformability parameter Λ. If we put an
|
| 481 |
+
extended body in an inhomogeneous external field, it will ex-
|
| 482 |
+
perience different forces throughout its surface. The result is a
|
| 483 |
+
tidal interaction. The tidal deformability of a compact object
|
| 484 |
+
is a single parameter λ that quantifies how easily the object
|
| 485 |
+
is deformed when subjected to an external tidal field. Larger
|
| 486 |
+
tidal deformability indicates that the object is easily deformed.
|
| 487 |
+
Conversely, a compact object with a small tidal deformability
|
| 488 |
+
parameter is more compact and more difficult to deform. The
|
| 489 |
+
|
| 490 |
+
5
|
| 491 |
+
TABLE I. Macroscopic properties of bosonic DM admixed strange
|
| 492 |
+
stars
|
| 493 |
+
mx (MeV)
|
| 494 |
+
fx
|
| 495 |
+
M/M⊙ R (km) R1.4 (km) Λ1.4
|
| 496 |
+
100
|
| 497 |
+
0.000
|
| 498 |
+
2.41
|
| 499 |
+
11.86
|
| 500 |
+
11.37
|
| 501 |
+
644
|
| 502 |
+
100
|
| 503 |
+
0.050
|
| 504 |
+
2.46
|
| 505 |
+
12.01
|
| 506 |
+
11.37
|
| 507 |
+
638
|
| 508 |
+
100
|
| 509 |
+
0.075
|
| 510 |
+
2.48
|
| 511 |
+
12.06
|
| 512 |
+
11.38
|
| 513 |
+
645
|
| 514 |
+
100
|
| 515 |
+
0.100
|
| 516 |
+
2.51
|
| 517 |
+
12.08
|
| 518 |
+
11.40
|
| 519 |
+
652
|
| 520 |
+
400
|
| 521 |
+
0.000
|
| 522 |
+
2.41
|
| 523 |
+
11.86
|
| 524 |
+
11.37
|
| 525 |
+
644
|
| 526 |
+
400
|
| 527 |
+
0.050
|
| 528 |
+
2.31
|
| 529 |
+
11.42
|
| 530 |
+
11.16
|
| 531 |
+
526
|
| 532 |
+
400
|
| 533 |
+
0.075
|
| 534 |
+
2.30
|
| 535 |
+
11.38
|
| 536 |
+
11.12
|
| 537 |
+
497
|
| 538 |
+
400
|
| 539 |
+
0.100
|
| 540 |
+
2.29
|
| 541 |
+
11.31
|
| 542 |
+
11.08
|
| 543 |
+
480
|
| 544 |
+
tidal deformability is defined as:
|
| 545 |
+
Λ ≡
|
| 546 |
+
λ
|
| 547 |
+
M 5 ≡ 2k2
|
| 548 |
+
3C5 ,
|
| 549 |
+
(13)
|
| 550 |
+
where M is the compact object mass and C = GM/R is
|
| 551 |
+
its compactness. The parameter k2 is called the second (or-
|
| 552 |
+
der) Love number. Additional discussion about the theory of
|
| 553 |
+
tidal deformability and the tidal Love numbers are beyond the
|
| 554 |
+
scope of this work and can be found in Refs. [22, 40, 55–
|
| 555 |
+
59] and references therein. Nevertheless, as pointed out in
|
| 556 |
+
Refs. [22, 58], the value of yR must be corrected since strange
|
| 557 |
+
stars are self-bound and present a discontinuity at the surface.
|
| 558 |
+
Therefore we must have
|
| 559 |
+
yR → yR − 4πR3∆ϵS
|
| 560 |
+
M
|
| 561 |
+
,
|
| 562 |
+
(14)
|
| 563 |
+
where R and M are the star radius and mass, respectively,
|
| 564 |
+
and ∆ϵS is the difference between the energy density at the
|
| 565 |
+
surface (p = 0) and the star’s exterior (which implies ϵ = 0).
|
| 566 |
+
The results for the dimensionless tidal parameter are displayed
|
| 567 |
+
in Fig. 2.
|
| 568 |
+
As we can be seen, some features present in the mass-radius
|
| 569 |
+
relation are also present here. For instance, for a mass mx =
|
| 570 |
+
100 MeV, the low masses of strange stars have similar tidal
|
| 571 |
+
parameters, despite their DM fraction. The tidal parameter for
|
| 572 |
+
the canonical mass lies between 638 and 644. These values
|
| 573 |
+
are in agreement with the constraint Λ < 800 [55], but fail to
|
| 574 |
+
fulfill the constraint 70 < Λ < 580 [40].
|
| 575 |
+
In the case of mx = 400 MeV, the strange stars’ huge com-
|
| 576 |
+
pression due to an increase in the DM fraction reduces the
|
| 577 |
+
tidal parameter Λ. The tidal parameter now lies around 500.
|
| 578 |
+
This indicates that for mx = 400 MeV, we are able to explain
|
| 579 |
+
very massive neutron stars as the PSR J0952-0607 [52], and
|
| 580 |
+
simultaneously fulfills the constraints of Λ < 800 [55] and 70
|
| 581 |
+
< Λ < 580 [40]. We summarize the results of this section in
|
| 582 |
+
Tab I.
|
| 583 |
+
2. Bosonic DM within CFL quark matter
|
| 584 |
+
In order to better understand the effects of the DM in
|
| 585 |
+
strange stars, we now assume that the quark matters are in
|
| 586 |
+
1
|
| 587 |
+
1.5
|
| 588 |
+
2
|
| 589 |
+
2.5
|
| 590 |
+
3
|
| 591 |
+
10
|
| 592 |
+
11
|
| 593 |
+
12
|
| 594 |
+
13
|
| 595 |
+
14
|
| 596 |
+
mx = 100 MeV
|
| 597 |
+
M/M0
|
| 598 |
+
R (km)
|
| 599 |
+
fx = 0.000
|
| 600 |
+
fx = 0.050
|
| 601 |
+
fx = 0.075
|
| 602 |
+
fx = 0.100
|
| 603 |
+
1
|
| 604 |
+
1.5
|
| 605 |
+
2
|
| 606 |
+
2.5
|
| 607 |
+
3
|
| 608 |
+
10
|
| 609 |
+
11
|
| 610 |
+
12
|
| 611 |
+
13
|
| 612 |
+
14
|
| 613 |
+
mx = 400 MeV
|
| 614 |
+
M/M0
|
| 615 |
+
R (km)
|
| 616 |
+
fx = 0.000
|
| 617 |
+
fx = 0.050
|
| 618 |
+
fx = 0.075
|
| 619 |
+
fx = 0.100
|
| 620 |
+
FIG. 3. Mass-radius relation for bosonic DM admixed CFL strange
|
| 621 |
+
stars with mx =100 MeV (left) and mx = 400 MeV (right).
|
| 622 |
+
the CFL superconducting phase via the analytical approxima-
|
| 623 |
+
tion EoS in Eq. 8. The mass-radius relations are presented in
|
| 624 |
+
Fig. 3.
|
| 625 |
+
As can be seen, for a bosonic DM mass of 100 MeV, we
|
| 626 |
+
have an increase in the maximum mass with the increase of the
|
| 627 |
+
fraction of DM. The qualitative results for CFL superconduct-
|
| 628 |
+
ing quark stars are analogous to both the original, massless
|
| 629 |
+
MIT as showed in Ref. [27, 49], as well for the massive vector
|
| 630 |
+
MIT bag model as presented in the last section. This indicates
|
| 631 |
+
a possible model-independent behavior about the effect of the
|
| 632 |
+
bosonic DM. Moreover, as in the case of the original mass-
|
| 633 |
+
less MIT and the massive vector MIT, in the CFL phase, we
|
| 634 |
+
also see that the presence of DM affects only massive stars.
|
| 635 |
+
CFL strange stars with M < 1.8 M⊙ reproduced essentially
|
| 636 |
+
the same radii. The maximum masses vary from 2.81 M⊙ for
|
| 637 |
+
pure strange stars to 2.88M⊙ for bosonic DM admixed with a
|
| 638 |
+
fraction of 0.10. This indicates that the PSR J0740+6620 with
|
| 639 |
+
M = 2.08 ± 0.07 M⊙ [37] can be a stable CFL strange star
|
| 640 |
+
with or without admixed bosonic DM. Even the possible mass
|
| 641 |
+
of 2.35 ± 0.17 M⊙ of the pulsar PSR J0952-0607 [52] can
|
| 642 |
+
be explained as bosonic DM matter admixed strange star. On
|
| 643 |
+
the other hand, the radius of the canonical star presents almost
|
| 644 |
+
no variation and is fixed at around 11.57 km. Such a value is
|
| 645 |
+
too low to reproduce the constraint range of 10.1 − 11.1 km,
|
| 646 |
+
shown in Ref. [53] while agreeing with Ref. [54], whose upper
|
| 647 |
+
|
| 648 |
+
6
|
| 649 |
+
0
|
| 650 |
+
200
|
| 651 |
+
400
|
| 652 |
+
600
|
| 653 |
+
800
|
| 654 |
+
1000
|
| 655 |
+
1.2
|
| 656 |
+
1.4
|
| 657 |
+
1.6
|
| 658 |
+
1.8
|
| 659 |
+
2
|
| 660 |
+
2.2
|
| 661 |
+
2.4
|
| 662 |
+
2.6
|
| 663 |
+
mx = 100 MeV
|
| 664 |
+
Λ
|
| 665 |
+
M/M0
|
| 666 |
+
fx = 0.000
|
| 667 |
+
fx = 0.050
|
| 668 |
+
fx = 0.075
|
| 669 |
+
fx = 0.100
|
| 670 |
+
0
|
| 671 |
+
200
|
| 672 |
+
400
|
| 673 |
+
600
|
| 674 |
+
800
|
| 675 |
+
1000
|
| 676 |
+
1.2
|
| 677 |
+
1.4
|
| 678 |
+
1.6
|
| 679 |
+
1.8
|
| 680 |
+
2
|
| 681 |
+
2.2
|
| 682 |
+
2.4
|
| 683 |
+
2.6
|
| 684 |
+
mx = 400 MeV
|
| 685 |
+
Λ
|
| 686 |
+
M/M0
|
| 687 |
+
fx = 0.000
|
| 688 |
+
fx = 0.050
|
| 689 |
+
fx = 0.075
|
| 690 |
+
fx = 0.100
|
| 691 |
+
FIG. 4. Dimensionless tidal parameter Λ for bosonic DM admixed
|
| 692 |
+
CFL superconducting strange stars with mx = 100 MeV (top) and
|
| 693 |
+
mx = 400 MeV (bottom).
|
| 694 |
+
limit is 11.9 km. About the NICER x-ray telescope, the con-
|
| 695 |
+
straint between 11.52 km and 13.85 km pointed in Ref. [39]
|
| 696 |
+
is fulfilled, but the bound in the range between 11.96 km and
|
| 697 |
+
14.26 km (Ref. [38]) is not.
|
| 698 |
+
For a mass mx = 400 MeV, the results for CLF super-
|
| 699 |
+
conducting strange stars are analogous to the massive MIT
|
| 700 |
+
bag model discussed in the last section. The maximum mass
|
| 701 |
+
decrease with the increase of DM fraction, dropping from
|
| 702 |
+
2.81 M⊙ to 2.61 M⊙ for a fraction fx of 0.10. However, all
|
| 703 |
+
values agree with the mass of the PSR J0740+6620 [37] and
|
| 704 |
+
the black widow pulsar PSR J0952-0607 [52]. Secondly, we
|
| 705 |
+
see that even low-mass strange stars are already affected by
|
| 706 |
+
the DM and are significantly more compact. The radius of
|
| 707 |
+
the 1.4 M⊙ for fx = 0.10 is about 11.29 km. Such a low ra-
|
| 708 |
+
dius fails to fulfill both NICER constraints [38, 39], but is in
|
| 709 |
+
agreement with Capano et al. [54]. The reduction of the CFL
|
| 710 |
+
strange star and its compression can again be explained by the
|
| 711 |
+
polytropic EoS of Eq. 10. A four times higher DM matter
|
| 712 |
+
mass produces sixty-four times smaller pressure! The reduc-
|
| 713 |
+
tion of the pressure causes the reduction of the maximum mass
|
| 714 |
+
and increases the star compression.
|
| 715 |
+
We also calculate the dimensionless tidal parameter Λ for
|
| 716 |
+
the CFL superconducting strange stars. The results are pre-
|
| 717 |
+
sented in Fig. 4. As we can be seen, the results are analogous
|
| 718 |
+
TABLE II. Macroscopic properties of bosonic DM admixed CFL su-
|
| 719 |
+
perconducting strange stars
|
| 720 |
+
mx (MeV)
|
| 721 |
+
fx
|
| 722 |
+
M/M⊙ R (km) R1.4 (km) Λ1.4
|
| 723 |
+
100
|
| 724 |
+
0.000
|
| 725 |
+
2.81
|
| 726 |
+
12.89
|
| 727 |
+
11.57
|
| 728 |
+
721
|
| 729 |
+
100
|
| 730 |
+
0.050
|
| 731 |
+
2.83
|
| 732 |
+
12.84
|
| 733 |
+
11.57
|
| 734 |
+
709
|
| 735 |
+
100
|
| 736 |
+
0.075
|
| 737 |
+
2.86
|
| 738 |
+
12.96
|
| 739 |
+
11.58
|
| 740 |
+
717
|
| 741 |
+
100
|
| 742 |
+
0.100
|
| 743 |
+
2.88
|
| 744 |
+
13.00
|
| 745 |
+
11.58
|
| 746 |
+
717
|
| 747 |
+
400
|
| 748 |
+
0.000
|
| 749 |
+
2.81
|
| 750 |
+
12.89
|
| 751 |
+
11.57
|
| 752 |
+
721
|
| 753 |
+
400
|
| 754 |
+
0.050
|
| 755 |
+
2.63
|
| 756 |
+
12.30
|
| 757 |
+
11.37
|
| 758 |
+
570
|
| 759 |
+
400
|
| 760 |
+
0.075
|
| 761 |
+
2.62
|
| 762 |
+
12.22
|
| 763 |
+
11.32
|
| 764 |
+
545
|
| 765 |
+
400
|
| 766 |
+
0.100
|
| 767 |
+
2.61
|
| 768 |
+
12.13
|
| 769 |
+
11.29
|
| 770 |
+
531
|
| 771 |
+
to the vector MIT bag model. As in the case of the mass-radius
|
| 772 |
+
relation, for low mass stars there is very low variation in the
|
| 773 |
+
Λ. For instance, for a mass mx = 100 MeV, the low masses
|
| 774 |
+
strange stars have similar tidal parameters, despite their DM
|
| 775 |
+
fraction. The tidal parameter for the canonical mass lies be-
|
| 776 |
+
tween 709 and 721. These values are in agreement with the
|
| 777 |
+
constraint Λ < 800 [55], but fail to fulfill the constraint 70
|
| 778 |
+
< Λ < 580 [40].
|
| 779 |
+
In the case of mx = 400 MeV, the results for CFL super-
|
| 780 |
+
conducting strange stars are again analogous to vector MIT
|
| 781 |
+
strange stars. The stars’ huge compression as the DM fraction
|
| 782 |
+
increases reduce the tidal parameter Λ. The tidal parameter
|
| 783 |
+
now lies around 550. This indicates that for mx = 400 MeV,
|
| 784 |
+
we are able to explain very massive neutron stars as the PSR
|
| 785 |
+
J0952-0607 [52], and simultaneously fulfills the constraints
|
| 786 |
+
of Λ < 800 [55] and 70 < Λ < 580 [40]. We summarize the
|
| 787 |
+
results of this section in Tab II.
|
| 788 |
+
B.
|
| 789 |
+
Fermionic DM
|
| 790 |
+
The Lagrangian of the fermionic DM reads [22, 25, 35]:
|
| 791 |
+
LDM = ¯χ(iγµ∂µ − (mx − gHh))χ
|
| 792 |
+
+1
|
| 793 |
+
2(∂µh∂µh − m2
|
| 794 |
+
Hh2).
|
| 795 |
+
(15)
|
| 796 |
+
Here, we assume a dark fermion represented by the Dirac
|
| 797 |
+
field χ that self-interacts through the exchange of the Higgs
|
| 798 |
+
boson, whose mass is mH = 125 GeV. The coupling con-
|
| 799 |
+
stant is assumed to be gH = 0.1, which agrees with the con-
|
| 800 |
+
straints in Refs. [25, 27]. Within this prescription, the DM
|
| 801 |
+
self-interaction is very feeble and behaves as a free Fermi gas.
|
| 802 |
+
More explicitly, the strength of the interaction is:
|
| 803 |
+
GH =
|
| 804 |
+
� gH
|
| 805 |
+
mH
|
| 806 |
+
�2
|
| 807 |
+
= 2.492 × 10−8
|
| 808 |
+
fm2.
|
| 809 |
+
(16)
|
| 810 |
+
The EoS is easily obtained in mean field approximation,
|
| 811 |
+
completely analogous to the QHD model [41]. The fermionic
|
| 812 |
+
DM is assumed to be the lightest neutralino, with mx = 200
|
| 813 |
+
GeV, as done in Ref. [25, 35]. However, as pointed out in
|
| 814 |
+
Ref. [60], the lower limit for weakly interacting massive par-
|
| 815 |
+
ticles (WIMP) is 60 GeV. Therefore we also use mx = 60 GeV
|
| 816 |
+
|
| 817 |
+
7
|
| 818 |
+
1
|
| 819 |
+
1.4
|
| 820 |
+
1.8
|
| 821 |
+
2.2
|
| 822 |
+
2.6
|
| 823 |
+
6
|
| 824 |
+
7
|
| 825 |
+
8
|
| 826 |
+
9
|
| 827 |
+
10
|
| 828 |
+
11
|
| 829 |
+
12
|
| 830 |
+
13
|
| 831 |
+
mx = 200 GeV
|
| 832 |
+
M/M0
|
| 833 |
+
R (km)
|
| 834 |
+
kf = 0.00 GeV
|
| 835 |
+
kf = 0.02 GeV
|
| 836 |
+
kf = 0.04 GeV
|
| 837 |
+
kf = 0.06 GeV
|
| 838 |
+
1
|
| 839 |
+
1.4
|
| 840 |
+
1.8
|
| 841 |
+
2.2
|
| 842 |
+
2.6
|
| 843 |
+
6
|
| 844 |
+
7
|
| 845 |
+
8
|
| 846 |
+
9
|
| 847 |
+
10
|
| 848 |
+
11
|
| 849 |
+
12
|
| 850 |
+
13
|
| 851 |
+
mx = 60 GeV
|
| 852 |
+
M/M0
|
| 853 |
+
R (km)
|
| 854 |
+
kf = 0.00 GeV
|
| 855 |
+
kf = 0.02 GeV
|
| 856 |
+
kf = 0.04 GeV
|
| 857 |
+
kf = 0.06 GeV
|
| 858 |
+
FIG. 5. Mass-radius relation for fermionic DM admixed strange stars
|
| 859 |
+
with mx = 200 GeV (top) and mx = 60 GeV (bottom).
|
| 860 |
+
to better study the influence of the DM mass. As in the case
|
| 861 |
+
of the bosonic DM, we must fix the DM fraction. As we are
|
| 862 |
+
dealing here with fermionic DM, we follow ref. [25, 28, 35]
|
| 863 |
+
and use the Fermi momentum to fix the DM fraction, using
|
| 864 |
+
three different values: kDM
|
| 865 |
+
F
|
| 866 |
+
= 0.02 GeV, 0.04 GeV, and 0.06
|
| 867 |
+
GeV.
|
| 868 |
+
1. Fermionic DM within vector MIT bag model
|
| 869 |
+
We display in Fig. 5 the TOV solution for a fermionic DM
|
| 870 |
+
with a mass of 200 GeV and 60 GeV within the vector MIT
|
| 871 |
+
bag model. As can be seen, the results for fermionic DM are
|
| 872 |
+
significantly different when compared with bosonic DM. The
|
| 873 |
+
maximum masses are always reduced, and the star compres-
|
| 874 |
+
sion always increases, even for very low masses. Also, differ-
|
| 875 |
+
ent DM fractions always produce different mass-radius rela-
|
| 876 |
+
tions, affecting all the strange star families, unlike the bosonic
|
| 877 |
+
case, where we have very similar stars for different DM frac-
|
| 878 |
+
tions, which is easily understood by the different criteria of
|
| 879 |
+
the DM fraction. In the case of bosonic DM, the DM frac-
|
| 880 |
+
tion is dependent on the quark EoS via Eq. 12. In the case of
|
| 881 |
+
fermionic DM, the Fermi momentum is fixed and independent
|
| 882 |
+
of the quark EoS.
|
| 883 |
+
Qualitatively, the results for mx = 200 GeV and 60 GeV
|
| 884 |
+
TABLE III. Macroscopic properties of fermionic DM admixed
|
| 885 |
+
strange stars
|
| 886 |
+
mx (GeV) kDM
|
| 887 |
+
F
|
| 888 |
+
(GeV) M/M⊙ R (km) R1.4 (km) Λ1.4
|
| 889 |
+
200
|
| 890 |
+
0.000
|
| 891 |
+
2.41
|
| 892 |
+
11.86
|
| 893 |
+
11.37
|
| 894 |
+
644
|
| 895 |
+
200
|
| 896 |
+
0.02
|
| 897 |
+
2.37
|
| 898 |
+
11.75
|
| 899 |
+
11.22
|
| 900 |
+
586
|
| 901 |
+
200
|
| 902 |
+
0.04
|
| 903 |
+
2.16
|
| 904 |
+
10.70
|
| 905 |
+
10.39
|
| 906 |
+
346
|
| 907 |
+
200
|
| 908 |
+
0.06
|
| 909 |
+
1.80
|
| 910 |
+
8.72
|
| 911 |
+
8.95
|
| 912 |
+
108
|
| 913 |
+
60
|
| 914 |
+
0.000
|
| 915 |
+
2.41
|
| 916 |
+
11.86
|
| 917 |
+
11.37
|
| 918 |
+
644
|
| 919 |
+
60
|
| 920 |
+
0.02
|
| 921 |
+
2.40
|
| 922 |
+
11.84
|
| 923 |
+
11.30
|
| 924 |
+
625
|
| 925 |
+
60
|
| 926 |
+
0.04
|
| 927 |
+
2.33
|
| 928 |
+
11.46
|
| 929 |
+
11.05
|
| 930 |
+
524
|
| 931 |
+
60
|
| 932 |
+
0.06
|
| 933 |
+
2.16
|
| 934 |
+
11.31
|
| 935 |
+
10.42
|
| 936 |
+
351
|
| 937 |
+
are the same. Increasing the DM fraction compress the star
|
| 938 |
+
and reduces the maximum mass. Quantitatively, we see that
|
| 939 |
+
a higher DM mass has a strong influence once it has a higher
|
| 940 |
+
increase in the energy density, and at the same time, that pro-
|
| 941 |
+
duces a lower contribution to the pressure. The maximum
|
| 942 |
+
mass drops from 2.41 M⊙ for kDM
|
| 943 |
+
F
|
| 944 |
+
= 0.00 to only 1.80 M⊙
|
| 945 |
+
for kDM
|
| 946 |
+
F
|
| 947 |
+
= 0.06 GeV in the case of mx = 200 GeV and to 2.16
|
| 948 |
+
M⊙ for mx = 60 GeV. In the same sense, the radius of the
|
| 949 |
+
canonical star drops from 11.37 km for kDM
|
| 950 |
+
F
|
| 951 |
+
= 0.00 to only
|
| 952 |
+
8.95 km for kDM
|
| 953 |
+
F
|
| 954 |
+
= 0.06 GeV in the case of mx = 200 GeV,
|
| 955 |
+
and to 10.42 km for mx = 60 GeV. As can be seen, the results
|
| 956 |
+
for kDM
|
| 957 |
+
F
|
| 958 |
+
= 0.06 GeV with mx = 200 GeV can be ruled out
|
| 959 |
+
once it has a very low maximum mass in disagreement with
|
| 960 |
+
the NICER result of the PSR J0740+6620 with a gravitational
|
| 961 |
+
mass of 2.08 ± 0.07 M⊙ [37], and also a very low radius for
|
| 962 |
+
the canonical star, in disagreement even with the low limit of
|
| 963 |
+
10.1 km presented in Ref. [53].
|
| 964 |
+
We plot in Fig. 6 the dimensionless parameter Λ for
|
| 965 |
+
fermionic DM admixed strange stars with mx = 200 GeV and
|
| 966 |
+
mx = 60 GeV within the vector MIT bag model. As we can
|
| 967 |
+
see, the strong compression due to the fermionic DM contri-
|
| 968 |
+
bution reduces the tidal parameter significantly. In the case
|
| 969 |
+
with mx = 200 GeV and kDM
|
| 970 |
+
F
|
| 971 |
+
= 0.06 GeV, the tidal parame-
|
| 972 |
+
ter drops to only 108, which is six times lower than for kDM
|
| 973 |
+
F
|
| 974 |
+
=
|
| 975 |
+
0.00, although, as we pointed out before, such parametrization
|
| 976 |
+
must be ruled out.
|
| 977 |
+
As can be seen, most of the parametrizations are able to
|
| 978 |
+
fulfill the main constraints for pulsar observations, i.e., M >
|
| 979 |
+
2.01M⊙ and 70
|
| 980 |
+
<
|
| 981 |
+
Λ
|
| 982 |
+
< 580. Indeed, the presence of
|
| 983 |
+
DM improves the theoretical prediction and the observational
|
| 984 |
+
constraints, although it can be some debate about the radius of
|
| 985 |
+
the canonical star. They do not fulfill NICER results [38, 39]
|
| 986 |
+
but agree with Ref. [54].
|
| 987 |
+
It is also worth to point the existence of almost degenerate
|
| 988 |
+
results. As can be seen, for mx = 200 GeV with kDM
|
| 989 |
+
f
|
| 990 |
+
= 0.04
|
| 991 |
+
GeV, the macroscopic are essentially the same for the mx = 60
|
| 992 |
+
GeV and kDM
|
| 993 |
+
f
|
| 994 |
+
= 0.06 GeV. The main results are summarized
|
| 995 |
+
in Tab. III.
|
| 996 |
+
|
| 997 |
+
8
|
| 998 |
+
0
|
| 999 |
+
200
|
| 1000 |
+
400
|
| 1001 |
+
600
|
| 1002 |
+
800
|
| 1003 |
+
1000
|
| 1004 |
+
1.2
|
| 1005 |
+
1.4
|
| 1006 |
+
1.6
|
| 1007 |
+
1.8
|
| 1008 |
+
2
|
| 1009 |
+
2.2
|
| 1010 |
+
2.4
|
| 1011 |
+
2.6
|
| 1012 |
+
mx = 200 GeV
|
| 1013 |
+
Λ
|
| 1014 |
+
M/M0
|
| 1015 |
+
kf = 0.00 GeV
|
| 1016 |
+
kf = 0.02 GeV
|
| 1017 |
+
kf = 0.04 GeV
|
| 1018 |
+
kf = 0.06 GeV
|
| 1019 |
+
0
|
| 1020 |
+
200
|
| 1021 |
+
400
|
| 1022 |
+
600
|
| 1023 |
+
800
|
| 1024 |
+
1000
|
| 1025 |
+
1.2
|
| 1026 |
+
1.4
|
| 1027 |
+
1.6
|
| 1028 |
+
1.8
|
| 1029 |
+
2
|
| 1030 |
+
2.2
|
| 1031 |
+
2.4
|
| 1032 |
+
2.6
|
| 1033 |
+
mx = 60 GeV
|
| 1034 |
+
Λ
|
| 1035 |
+
M/M0
|
| 1036 |
+
kf = 0.00 GeV
|
| 1037 |
+
kf = 0.02 GeV
|
| 1038 |
+
kf = 0.04 GeV
|
| 1039 |
+
kf = 0.06 GeV
|
| 1040 |
+
FIG. 6. Dimensionless tidal parameter Λ for fermionic DM admixed
|
| 1041 |
+
strange stars with mx = 200 GeV (top) and mx = 60 GeV (bottom).
|
| 1042 |
+
2. Fermionic DM within CFL quark matter
|
| 1043 |
+
We now study the effect of Fermionic DM in CFL super-
|
| 1044 |
+
conducting matter described by the analytical approximation
|
| 1045 |
+
of Eq. 8.
|
| 1046 |
+
We display in Fig. 7 the TOV solution for a fermionic DM
|
| 1047 |
+
with a mass of 200 GeV and 60 GeV. As in the case of the vec-
|
| 1048 |
+
tor MIT bag model, for CFL superconducting quark matter,
|
| 1049 |
+
the results for fermionic DM are significantly different when
|
| 1050 |
+
compared with bosonic DM. And again, the qualitative effect
|
| 1051 |
+
of fermionic DM is the same for CFL as it is for the vector
|
| 1052 |
+
MIT bag model. The maximum masses are always reduced,
|
| 1053 |
+
and the star compression always increases, even for very low
|
| 1054 |
+
masses. Again, different DM fractions always produce differ-
|
| 1055 |
+
ent mass-radius relations, affecting all the strange star fami-
|
| 1056 |
+
lies.
|
| 1057 |
+
From the quantitative point of view, the maximum mass
|
| 1058 |
+
drops from 2.81 M⊙ for kDM
|
| 1059 |
+
F
|
| 1060 |
+
= 0.00 to 2.04 M⊙ for kDM
|
| 1061 |
+
F
|
| 1062 |
+
= 0.06 GeV in the case of mx = 200 GeV and to 2.49 M⊙
|
| 1063 |
+
for mx = 60 GeV. In the same sense, the radius of the canon-
|
| 1064 |
+
ical star drops from 11.57 km for kDM
|
| 1065 |
+
F
|
| 1066 |
+
= 0.00 to 9.21 km for
|
| 1067 |
+
kDM
|
| 1068 |
+
F
|
| 1069 |
+
= 0.06 GeV in the case of mx = 200 GeV, and 10.66
|
| 1070 |
+
km for mx = 60 GeV. Now, unlike the case of the vector MIT,
|
| 1071 |
+
none of the CFL superconducting strange stars can be ruled
|
| 1072 |
+
1
|
| 1073 |
+
1.5
|
| 1074 |
+
2
|
| 1075 |
+
2.5
|
| 1076 |
+
3
|
| 1077 |
+
6
|
| 1078 |
+
7
|
| 1079 |
+
8
|
| 1080 |
+
9
|
| 1081 |
+
10
|
| 1082 |
+
11
|
| 1083 |
+
12
|
| 1084 |
+
13
|
| 1085 |
+
14
|
| 1086 |
+
mx = 200 GeV
|
| 1087 |
+
M/M0
|
| 1088 |
+
R (km)
|
| 1089 |
+
kf = 0.00 GeV
|
| 1090 |
+
kf = 0.02 GeV
|
| 1091 |
+
kf = 0.04 GeV
|
| 1092 |
+
kf = 0.06 GeV
|
| 1093 |
+
1
|
| 1094 |
+
1.5
|
| 1095 |
+
2
|
| 1096 |
+
2.5
|
| 1097 |
+
3
|
| 1098 |
+
6
|
| 1099 |
+
7
|
| 1100 |
+
8
|
| 1101 |
+
9
|
| 1102 |
+
10
|
| 1103 |
+
11
|
| 1104 |
+
12
|
| 1105 |
+
13
|
| 1106 |
+
14
|
| 1107 |
+
mx = 60 GeV
|
| 1108 |
+
M/M0
|
| 1109 |
+
R (km)
|
| 1110 |
+
kf = 0.00 GeV
|
| 1111 |
+
kf = 0.02 GeV
|
| 1112 |
+
kf = 0.04 GeV
|
| 1113 |
+
kf = 0.06 GeV
|
| 1114 |
+
FIG. 7. Mass-radius relation for fermionic DM admixed CFL super-
|
| 1115 |
+
conducting strange stars with mx = 200 GeV (top) and mx = 60
|
| 1116 |
+
GeV (bottom).
|
| 1117 |
+
out in the light of the PSR J0740+6620, M
|
| 1118 |
+
= 2.08 ± 0.07
|
| 1119 |
+
M⊙ [37], although for kDM
|
| 1120 |
+
F
|
| 1121 |
+
= 0.06 GeV and mx = 200 GeV
|
| 1122 |
+
the radius of the canonical star is below the lower limit of 10.1
|
| 1123 |
+
km presented in Ref. [53].
|
| 1124 |
+
We plot in Fig. 8 the dimensionless parameter Λ for
|
| 1125 |
+
fermionic DM admixed superconducting strange stars with
|
| 1126 |
+
mx = 200 GeV and mx = 60 GeV. The results are completely
|
| 1127 |
+
analogous to the case of the vector MIT bag model; however,
|
| 1128 |
+
the value of Λ here is always higher. The compression due to
|
| 1129 |
+
the fermionic DM contribution reduces the tidal parameter. In
|
| 1130 |
+
the case with mx = 200 GeV and kDM
|
| 1131 |
+
F
|
| 1132 |
+
= 0.06 GeV, the tidal
|
| 1133 |
+
parameter drops from 721 to 151.
|
| 1134 |
+
It is also worth noting that some parametrizations can ful-
|
| 1135 |
+
fill the main constraints for pulsar observations, 70 < Λ <
|
| 1136 |
+
580, and yet produce a very high maximum mass, sometimes
|
| 1137 |
+
reaching 2.50 M⊙. The presence of DM again improves the
|
| 1138 |
+
theoretical prediction and the observational constraints, al-
|
| 1139 |
+
though it can be some debate about the radius of the canonical
|
| 1140 |
+
star. They do not fulfill NICER results [38, 39], but agree with
|
| 1141 |
+
Ref. [54]. Moreover, most parametrizations can explain even
|
| 1142 |
+
the black widow pulsar PSR J0952-0607 [52].
|
| 1143 |
+
Finally, even when we use a different model for the quark
|
| 1144 |
+
matter, the existence of almost degenerate results is still
|
| 1145 |
+
present: for mx = 200 GeV with kDM
|
| 1146 |
+
f
|
| 1147 |
+
= 0.04 GeV and mx =
|
| 1148 |
+
|
| 1149 |
+
9
|
| 1150 |
+
0
|
| 1151 |
+
200
|
| 1152 |
+
400
|
| 1153 |
+
600
|
| 1154 |
+
800
|
| 1155 |
+
1000
|
| 1156 |
+
1.2
|
| 1157 |
+
1.4
|
| 1158 |
+
1.6
|
| 1159 |
+
1.8
|
| 1160 |
+
2
|
| 1161 |
+
2.2
|
| 1162 |
+
2.4
|
| 1163 |
+
2.6
|
| 1164 |
+
mx = 200 GeV
|
| 1165 |
+
Λ
|
| 1166 |
+
M/M0
|
| 1167 |
+
kf = 0.00 GeV
|
| 1168 |
+
kf = 0.02 GeV
|
| 1169 |
+
kf = 0.04 GeV
|
| 1170 |
+
kf = 0.06 GeV
|
| 1171 |
+
0
|
| 1172 |
+
200
|
| 1173 |
+
400
|
| 1174 |
+
600
|
| 1175 |
+
800
|
| 1176 |
+
1000
|
| 1177 |
+
1.2
|
| 1178 |
+
1.4
|
| 1179 |
+
1.6
|
| 1180 |
+
1.8
|
| 1181 |
+
2
|
| 1182 |
+
2.2
|
| 1183 |
+
2.4
|
| 1184 |
+
2.6
|
| 1185 |
+
mx = 60 GeV
|
| 1186 |
+
Λ
|
| 1187 |
+
M/M0
|
| 1188 |
+
kf = 0.00 GeV
|
| 1189 |
+
kf = 0.02 GeV
|
| 1190 |
+
kf = 0.04 GeV
|
| 1191 |
+
kf = 0.06 GeV
|
| 1192 |
+
FIG. 8. Dimensionless tidal parameter Λ for fermionic DM admixed
|
| 1193 |
+
CFL strange stars with mx = 200 GeV (top) and mx = 60 GeV
|
| 1194 |
+
(bottom).
|
| 1195 |
+
TABLE IV. Macroscopic properties of fermionic DM admixed color
|
| 1196 |
+
superconducting quark stars
|
| 1197 |
+
mx (GeV) kDM
|
| 1198 |
+
F
|
| 1199 |
+
(GeV) M/M⊙ R (km) R1.4 (km) Λ1.4
|
| 1200 |
+
200
|
| 1201 |
+
0.000
|
| 1202 |
+
2.81
|
| 1203 |
+
12.89
|
| 1204 |
+
11.57
|
| 1205 |
+
721
|
| 1206 |
+
200
|
| 1207 |
+
0.02
|
| 1208 |
+
2.75
|
| 1209 |
+
12.65
|
| 1210 |
+
11.43
|
| 1211 |
+
653
|
| 1212 |
+
200
|
| 1213 |
+
0.04
|
| 1214 |
+
2.50
|
| 1215 |
+
11.50
|
| 1216 |
+
10.67
|
| 1217 |
+
421
|
| 1218 |
+
200
|
| 1219 |
+
0.06
|
| 1220 |
+
2.04
|
| 1221 |
+
9.38
|
| 1222 |
+
9.21
|
| 1223 |
+
151
|
| 1224 |
+
60
|
| 1225 |
+
0.000
|
| 1226 |
+
2.81
|
| 1227 |
+
12.89
|
| 1228 |
+
11.57
|
| 1229 |
+
721
|
| 1230 |
+
60
|
| 1231 |
+
0.02
|
| 1232 |
+
2.78
|
| 1233 |
+
12.75
|
| 1234 |
+
11.53
|
| 1235 |
+
694
|
| 1236 |
+
60
|
| 1237 |
+
0.04
|
| 1238 |
+
2.69
|
| 1239 |
+
12.45
|
| 1240 |
+
11.28
|
| 1241 |
+
610
|
| 1242 |
+
60
|
| 1243 |
+
0.06
|
| 1244 |
+
2.49
|
| 1245 |
+
11.53
|
| 1246 |
+
10.66
|
| 1247 |
+
422
|
| 1248 |
+
60 GeV with kDM
|
| 1249 |
+
f
|
| 1250 |
+
= 0.06 GeV. The main results are summa-
|
| 1251 |
+
rized in Tab. IV.
|
| 1252 |
+
3. Fermionic DM with a vector channel
|
| 1253 |
+
Now we study if the presence of a dark, repulsive vector
|
| 1254 |
+
channel affects the macroscopic properties of the fermionic
|
| 1255 |
+
DM admixed strange stars. The new Lagrangian is the La-
|
| 1256 |
+
grangian in Eq. 15 plus the repulsive channel and the respec-
|
| 1257 |
+
tive meson mass, and reads [28]:
|
| 1258 |
+
LVDM = gξ ¯χ(γµξµ)χ + 1
|
| 1259 |
+
2m2
|
| 1260 |
+
ξξµξµ − 1
|
| 1261 |
+
4V µνVµν.
|
| 1262 |
+
(17)
|
| 1263 |
+
The Lagrangian of Eq. 17 is analogous to the ω contribution
|
| 1264 |
+
to the QHD Lagrangian [5, 41]. Indeed, the junction of Eq. 15
|
| 1265 |
+
and Eq. 17 makes this model of DM fully analogous to the
|
| 1266 |
+
original σ −ω model of the QHD [41]. The coupling constant
|
| 1267 |
+
gξ = 0.1 is fixed, and it is equal to the gH, while the mass of
|
| 1268 |
+
the vector of the dark meson is assumed to be 34 MeV, follow-
|
| 1269 |
+
ing Ref. [28]. As the mass of the dark vector meson is 3000
|
| 1270 |
+
times smaller than the mass of the Higgs boson, the repulsive
|
| 1271 |
+
channel is much stronger than the attractive one. Indeed, we
|
| 1272 |
+
have
|
| 1273 |
+
Gξ =
|
| 1274 |
+
� gξ
|
| 1275 |
+
mξ
|
| 1276 |
+
�2
|
| 1277 |
+
= 0.337
|
| 1278 |
+
fm2,
|
| 1279 |
+
(18)
|
| 1280 |
+
which is stronger than the quark repulsion and millions of
|
| 1281 |
+
times higher than the DM scalar coupling (Eq. 16). Never-
|
| 1282 |
+
theless, despite the strong self-repulsion of the fermionic DM,
|
| 1283 |
+
the numerical results are barely affected by the repulsive chan-
|
| 1284 |
+
nel. For the vector MIT bag model, the only noticeable dif-
|
| 1285 |
+
ference appears for mx = 200 GeV and kDM
|
| 1286 |
+
F
|
| 1287 |
+
= 0.04 GeV. In
|
| 1288 |
+
this case, the maximum mass increase from 2.16 M⊙ to 2.17
|
| 1289 |
+
M⊙. The radius of the canonical star also grows from 11.39
|
| 1290 |
+
km to 11.46 km. The tidal parameter Λ1.4 also increases from
|
| 1291 |
+
346 to 358. It is worth noticing that all these variations are far
|
| 1292 |
+
beyond the precision with which experimental measurements
|
| 1293 |
+
are made. All the other parametrizations present even lower
|
| 1294 |
+
(or none) differences. Herefore, we do not provide any figures
|
| 1295 |
+
in this section since they would be visually indistinguishable
|
| 1296 |
+
from those in the last paragraph. We only display the main
|
| 1297 |
+
results in Tab. V. In the case of CFL superconducting quark
|
| 1298 |
+
matter, the differences are even smaller!
|
| 1299 |
+
The nature of the vector coupling can explain why the
|
| 1300 |
+
differences are so small. The vector mesons couple to the
|
| 1301 |
+
number density, and we are dealing with a very low-density
|
| 1302 |
+
regime. Indeed, even kDM
|
| 1303 |
+
F
|
| 1304 |
+
= 0.06 GeV implies a number den-
|
| 1305 |
+
sity is around 9.6 × 10−4 fm−3. Of course, we could increase
|
| 1306 |
+
the repulsion of the dark vector boson, but we believe this
|
| 1307 |
+
would be very unrealistic since DM was proposed to explain
|
| 1308 |
+
higher attraction in galaxy curves [61].
|
| 1309 |
+
IV.
|
| 1310 |
+
CONCLUSIONS
|
| 1311 |
+
In this work, we calculate the properties for the DM ad-
|
| 1312 |
+
mixed for strange quark stars. We use two different mod-
|
| 1313 |
+
els for the quark model: the vector MIT bag model, as pre-
|
| 1314 |
+
sented in Refs. [5, 6] and the CFL color superconducting
|
| 1315 |
+
quark matter via an analytical approximation, as discussed
|
| 1316 |
+
in Refs. [42, 44, 45]; and two different kinds of dark mat-
|
| 1317 |
+
ter: a bosonic as discussed in Refs. [27, 46, 47, 49] and for
|
| 1318 |
+
fermionic [22, 25, 35]. For each kind of DM, we use two
|
| 1319 |
+
different mass values, and the strange stars always agree with
|
| 1320 |
+
the Bodmer-Witten conjecture [3, 4]. Our main conclusions
|
| 1321 |
+
can be summarized as follows:
|
| 1322 |
+
|
| 1323 |
+
10
|
| 1324 |
+
TABLE V. Macroscopic properties of dark vector boson fermionic
|
| 1325 |
+
DM admixed strange stars within the vector MIT bag model. The
|
| 1326 |
+
only significant differences are for kDM
|
| 1327 |
+
F
|
| 1328 |
+
= 0.04 GeV
|
| 1329 |
+
mx (GeV) kDM
|
| 1330 |
+
F
|
| 1331 |
+
(GeV) M/M⊙ R (km) R1.4 (km) Λ1.4
|
| 1332 |
+
200
|
| 1333 |
+
0.000
|
| 1334 |
+
2.41
|
| 1335 |
+
11.86
|
| 1336 |
+
11.37
|
| 1337 |
+
644
|
| 1338 |
+
200
|
| 1339 |
+
0.02
|
| 1340 |
+
2.37
|
| 1341 |
+
11.75
|
| 1342 |
+
11.22
|
| 1343 |
+
586
|
| 1344 |
+
200
|
| 1345 |
+
0.04
|
| 1346 |
+
2.17
|
| 1347 |
+
10.70
|
| 1348 |
+
10.46
|
| 1349 |
+
358
|
| 1350 |
+
200
|
| 1351 |
+
0.06
|
| 1352 |
+
1.80
|
| 1353 |
+
8.72
|
| 1354 |
+
9.01
|
| 1355 |
+
112
|
| 1356 |
+
60
|
| 1357 |
+
0.000
|
| 1358 |
+
2.41
|
| 1359 |
+
11.86
|
| 1360 |
+
11.37
|
| 1361 |
+
644
|
| 1362 |
+
60
|
| 1363 |
+
0.02
|
| 1364 |
+
2.40
|
| 1365 |
+
11.84
|
| 1366 |
+
11.30
|
| 1367 |
+
625
|
| 1368 |
+
60
|
| 1369 |
+
0.04
|
| 1370 |
+
2.33
|
| 1371 |
+
11.46
|
| 1372 |
+
11.10
|
| 1373 |
+
532
|
| 1374 |
+
60
|
| 1375 |
+
0.06
|
| 1376 |
+
2.16
|
| 1377 |
+
11.31
|
| 1378 |
+
10.43
|
| 1379 |
+
353
|
| 1380 |
+
• The qualitative results for DM admixed strange stars are
|
| 1381 |
+
independent of the quark model utilized. This is true for
|
| 1382 |
+
both bosonic and fermionic, as well it is independent of
|
| 1383 |
+
the DM mass.
|
| 1384 |
+
• For a bosonic DM with a mass of mx = 100 MeV, we
|
| 1385 |
+
have an increase of the maximum mass, while the prop-
|
| 1386 |
+
erties of low-mass strange stars are not significantly af-
|
| 1387 |
+
fected. This is the only case in that we have an in-
|
| 1388 |
+
crease in the star’s mass. Such a situation happens for
|
| 1389 |
+
the vector MIT, the CFL superconducting quark mat-
|
| 1390 |
+
ter, and also for the massless MIT, as pointed out in
|
| 1391 |
+
Refs. [27, 49].
|
| 1392 |
+
• For a bosonic DM with a mass of mx = 400 MeV, we
|
| 1393 |
+
have a decrease of the maximum mass, whilst the radii
|
| 1394 |
+
of the low-mass strange stars, in this case, are also af-
|
| 1395 |
+
fected.
|
| 1396 |
+
• For a fermionic DM, the maximum mass always de-
|
| 1397 |
+
creases. The higher the DM fraction, the lower the max-
|
| 1398 |
+
imum mass, and the smaller the radii. Also, the higher
|
| 1399 |
+
the DM mass, the higher the stellar compression and the
|
| 1400 |
+
lower the maximum mass.
|
| 1401 |
+
• Although we introduce a repulsive dark vector field
|
| 1402 |
+
with a mass 3000 times smaller than the attractive scalar
|
| 1403 |
+
field, we do not find significant variation in the stellar
|
| 1404 |
+
macroscopic properties.
|
| 1405 |
+
• There are almost degenerate results both for mx = 200
|
| 1406 |
+
GeV with kDM
|
| 1407 |
+
f
|
| 1408 |
+
= 0.04 GeV and mx = 60 GeV with
|
| 1409 |
+
kDM
|
| 1410 |
+
f
|
| 1411 |
+
= 0.06 GeV, the maximum mass, as well the prop-
|
| 1412 |
+
erties of the canonical star are essentially the same.
|
| 1413 |
+
• About the observational constraints, we can see that the
|
| 1414 |
+
mass of the PSR J0740+6620 pulsar, M = 2.08 ± 0.07
|
| 1415 |
+
M⊙ [37] is easily obtained. Even the mass range of
|
| 1416 |
+
2.35 ± 0.17 M⊙ of the black widow pulsar PSR J0952-
|
| 1417 |
+
0607 [52] can be reached for some parametrization.
|
| 1418 |
+
• The radius of the canonical star is still a matter of de-
|
| 1419 |
+
bate. Most of our results point to a radius between 11.0
|
| 1420 |
+
km to 11.5 km. In general, our results are in agreement
|
| 1421 |
+
with Ref. [54] but are too low to reproduce the NICER
|
| 1422 |
+
results [38, 39] whilst at the same time are too high to
|
| 1423 |
+
agree with Ref. [53].
|
| 1424 |
+
• Except for bosonic DM with a mass of mx = 100 MeV,
|
| 1425 |
+
in all other cases, the presence of the DM reduces the
|
| 1426 |
+
dimensionless tidal parameter Λ. In most of these cases,
|
| 1427 |
+
the constraint 70 < Λ < 580 [40] is easily fulfilled.
|
| 1428 |
+
[1] E. Annala, T. Gorda, A. Kurkela, J. N¨attil¨a, and A. Vuorinen,
|
| 1429 |
+
Nature Physics 16, 907 (2020).
|
| 1430 |
+
[2] R. X. Xu, Symposium - Intern. Astron. U. 214, 191 (2003).
|
| 1431 |
+
[3] A. R. Bodmer, Phys. Rev. D 4, 1601 (1971).
|
| 1432 |
+
[4] E. Witten, Phys. Rev. D 30, 272 (1984).
|
| 1433 |
+
[5] L. L. Lopes, C. Biesdorf, and D. P. Menezes, Physica Scripta
|
| 1434 |
+
96, 065303 (2021).
|
| 1435 |
+
[6] L. L. Lopes, C. Biesdorf, and D. P. Menezes, Monthly Notices
|
| 1436 |
+
of the Royal Astronomical Society 512, 5110 (2022).
|
| 1437 |
+
[7] E.-P. Zhou, X. Zhou, and A. Li, Phys. Rev. D 97, 083015
|
| 1438 |
+
(2018).
|
| 1439 |
+
[8] A. Aziz, S. Ray, F. Rahaman, M. Khlopov, and B. K. Guha,
|
| 1440 |
+
International Journal of Modern Physics D 28, 1941006 (2019).
|
| 1441 |
+
[9] M. Alford, Journal of Physics G: Nuclear and Particle Physics
|
| 1442 |
+
30, S441 (2003).
|
| 1443 |
+
[10] I. A. Shovkovy, Foundations of Physics 35, 1309 (2005).
|
| 1444 |
+
[11] M. G. Alford, A. Schmitt, K. Rajagopal, and T. Sch¨afer, Rev.
|
| 1445 |
+
Mod. Phys. 80, 1455 (2008).
|
| 1446 |
+
[12] M. Alford and S. Reddy, Phys. Rev. D 67, 074024 (2003).
|
| 1447 |
+
[13] A. Drago, A. Lavagno, and G. Pagliara, Phys. Rev. D 69,
|
| 1448 |
+
057505 (2004).
|
| 1449 |
+
[14] C. V. Flores and G. Lugones, Phys. Rev. C 95, 025808 (2017).
|
| 1450 |
+
[15] I. Lopes and J. Silk, Phys. Rev. D 99, 023008 (2019).
|
| 1451 |
+
[16] R. S. Bogadi, M. Govender, and S. Moyo, Phys. Rev. D 102,
|
| 1452 |
+
043026 (2020).
|
| 1453 |
+
[17] A. Li, Z.-Q. Miao, J.-L. Jiang, S.-P. Tang, and R.-X. Xu,
|
| 1454 |
+
Monthly Notices of the Royal Astronomical Society 506, 5916
|
| 1455 |
+
(2021).
|
| 1456 |
+
[18] X.-J. Wen, Phys. Rev. D 88, 034031 (2013).
|
| 1457 |
+
[19] H. Liang and X.-J. Wen, International Journal of Modern
|
| 1458 |
+
Physics A 34, 1950170 (2019).
|
| 1459 |
+
[20] Z. Roupas, G. Panotopoulos, and I. Lopes, Phys. Rev. D 103,
|
| 1460 |
+
083015 (2021).
|
| 1461 |
+
[21] Z. Miao, J.-L. Jiang, A. Li, and L.-W. Chen, The Astrophysical
|
| 1462 |
+
Journal Letters 917, L22 (2021).
|
| 1463 |
+
[22] O. Lourenc¸o, C. H. Lenzi, M. Dutra, E. J. Ferrer, V. de la In-
|
| 1464 |
+
cera, L. Paulucci, and J. E. Horvath, Phys. Rev. D 103, 103010
|
| 1465 |
+
(2021).
|
| 1466 |
+
[23] N. F. Bell, G. Busoni, M. E. Ramirez-Quezada, S. Robles, and
|
| 1467 |
+
M. Virgato, Journal of Cosmology and Astroparticle Physics
|
| 1468 |
+
2021 (10), 083.
|
| 1469 |
+
[24] H. C. Das, A. Kumar, B. Kumar, S. Kumar Biswal, T. Nakat-
|
| 1470 |
+
sukasa, A. Li, and S. K. Patra, Mon. Not. Roy. Astron. Soc. 495,
|
| 1471 |
+
4893 (2020), arXiv:2002.00594 [nucl-th].
|
| 1472 |
+
[25] H. Das, A. Kumar, B. Kumar, S. Biswal, and S. Patra, Journal
|
| 1473 |
+
of Cosmology and Astroparticle Physics 2021 (01), 007.
|
| 1474 |
+
|
| 1475 |
+
11
|
| 1476 |
+
[26] H. C. Das, A. Kumar, and S. K. Patra, Phys. Rev. D 104, 063028
|
| 1477 |
+
(2021), arXiv:2109.01853 [astro-ph.HE].
|
| 1478 |
+
[27] G. Panotopoulos and I. Lopes, Phys. Rev. D 96, 023002 (2017).
|
| 1479 |
+
[28] A. Guha and D. Sen, Journal of Cosmology and Astroparticle
|
| 1480 |
+
Physics 2021 (09), 027.
|
| 1481 |
+
[29] A. Green and P. Tanedo, Computer Physics Communications
|
| 1482 |
+
242, 120 (2019).
|
| 1483 |
+
[30] E. Aprile, M. Alfonsi, K. Arisaka, et al. (XENON100 Collabo-
|
| 1484 |
+
ration), Phys. Rev. Lett. 109, 181301 (2012).
|
| 1485 |
+
[31] E. Aprile, J. Aalbers, F. Agostini, et al. (XENON Collaboration
|
| 1486 |
+
7), Phys. Rev. Lett. 121, 111302 (2018).
|
| 1487 |
+
[32] R. Agnese, T. Aralis, T. Aramaki, et al., Phys. Rev. Lett. 121,
|
| 1488 |
+
051301 (2018).
|
| 1489 |
+
[33] D. Akerib, X. Bai, E. Bernard, et al., Astroparticle Physics 45,
|
| 1490 |
+
34 (2013).
|
| 1491 |
+
[34] Q. Wang, A. Abdukerim, W. Chen, and others (PandaX-II Col-
|
| 1492 |
+
laboration), Chinese Physics C 44, 125001 (2020).
|
| 1493 |
+
[35] O. Lourenc¸o, T. Frederico, and M. Dutra, Phys. Rev. D 105,
|
| 1494 |
+
023008 (2022).
|
| 1495 |
+
[36] H. T. Cromartie, E. Fonseca, S. M. Ransom, et al., Nature As-
|
| 1496 |
+
tronomy 4, 72 (2020).
|
| 1497 |
+
[37] E. Fonseca, H. T. Cromartie, T. T. Pennucci, et al., The Astro-
|
| 1498 |
+
physical Journal Letters 915, L12 (2021).
|
| 1499 |
+
[38] M. C. Miller, F. K. Lamb, A. J. Dittmann, et al., The Astrophys-
|
| 1500 |
+
ical Journal 887, L24 (2019).
|
| 1501 |
+
[39] T. E. Riley, A. L. Watts, S. Bogdanov, et al., The Astrophysical
|
| 1502 |
+
Journal 887, L21 (2019).
|
| 1503 |
+
[40] B. P. Abbott, R. Abbott, T. D. Abbott, et al. (The LIGO Sci-
|
| 1504 |
+
entific Collaboration and the Virgo Collaboration), Phys. Rev.
|
| 1505 |
+
Lett. 121, 161101 (2018).
|
| 1506 |
+
[41] B. D. Serot, Reports on Progress in Physics 55, 1855 (1992).
|
| 1507 |
+
[42] J. L. Zdunik and P. Haensel, Astronomy and Astrophysics 551,
|
| 1508 |
+
A61 (2013).
|
| 1509 |
+
[43] B. K. Agrawal, Phys. Rev. D 81, 023009 (2010).
|
| 1510 |
+
[44] S. Han and A. W. Steiner, Phys. Rev. D 99, 083014 (2019).
|
| 1511 |
+
[45] M. G. Alford, S. Han, and M. Prakash, Phys. Rev. D 88, 083013
|
| 1512 |
+
(2013).
|
| 1513 |
+
[46] X. Li, T. Harko, and K. Cheng, Journal of Cosmology and As-
|
| 1514 |
+
troparticle Physics 2012 (06), 001.
|
| 1515 |
+
[47] X. Li, F. Wang, and K. Cheng, Journal of Cosmology and As-
|
| 1516 |
+
troparticle Physics 2012 (10), 031.
|
| 1517 |
+
[48] F. Dalfovo, S. Giorgini, L. P. Pitaevskii, and S. Stringari, Rev.
|
| 1518 |
+
Mod. Phys. 71, 463 (1999).
|
| 1519 |
+
[49] I. Lopes and G. Panotopoulos, Phys. Rev. D 97, 024030 (2018).
|
| 1520 |
+
[50] D. Rafiei Karkevandi, S. Shakeri, V. Sagun, and O. Ivanytskyi,
|
| 1521 |
+
Phys. Rev. D 105, 023001 (2022).
|
| 1522 |
+
[51] J. R. Oppenheimer and G. M. Volkoff, Phys. Rev. 55, 374
|
| 1523 |
+
(1939).
|
| 1524 |
+
[52] R. W. Romani, D. Kandel, A. V. Filippenko, T. G. Brink, and
|
| 1525 |
+
W. Zheng, The Astrophysical Journal Letters 934, L17 (2022).
|
| 1526 |
+
[53] F. ¨Ozel, D. Psaltis, T. G¨uver, G. Baym, C. Heinke, and S. Guil-
|
| 1527 |
+
lot, Astrophys. J. 820, 28 (2016).
|
| 1528 |
+
[54] C. D. Capano, I. Tews, S. M. Brown, B. Margalit, S. De, S. Ku-
|
| 1529 |
+
mar, D. A. Brown, B. Krishnan, and S. Reddy, Nature Astron-
|
| 1530 |
+
omy 4, 625 (2020).
|
| 1531 |
+
[55] B. P. Abbott, R. Abbott, T. D. Abbott, et al. (LIGO Scientific
|
| 1532 |
+
Collaboration and Virgo Collaboration), Phys. Rev. Lett. 119,
|
| 1533 |
+
161101 (2017).
|
| 1534 |
+
[56] Flores, Cesar V., Lopes, Luiz L., Castro, Luis B., and Menezes,
|
| 1535 |
+
D´ebora P., Eur. Phys. J. C 80, 1142 (2020).
|
| 1536 |
+
[57] K.
|
| 1537 |
+
Chatziioannou,
|
| 1538 |
+
Gen.
|
| 1539 |
+
Rel.
|
| 1540 |
+
Grav.
|
| 1541 |
+
52,
|
| 1542 |
+
109
|
| 1543 |
+
(2020),
|
| 1544 |
+
arXiv:2006.03168 [gr-qc].
|
| 1545 |
+
[58] S. Postnikov, M. Prakash, and J. M. Lattimer, Phys. Rev. D 82,
|
| 1546 |
+
024016 (2010).
|
| 1547 |
+
[59] L. L. Lopes and D. P. Menezes, The Astrophysical Journal 936,
|
| 1548 |
+
41 (2022).
|
| 1549 |
+
[60] I. P. Lopes and J. Silk, Phys. Rev. Lett. 88, 151303 (2002).
|
| 1550 |
+
[61] G. Bertone and D. Hooper, Rev. Mod. Phys. 90, 045002 (2018).
|
| 1551 |
+
|
H9AyT4oBgHgl3EQfrvmy/content/tmp_files/load_file.txt
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
I9FAT4oBgHgl3EQfux7Z/content/tmp_files/2301.08672v1.pdf.txt
ADDED
|
@@ -0,0 +1,1521 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
arXiv:2301.08672v1 [math.CT] 20 Jan 2023
|
| 2 |
+
ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
|
| 3 |
+
OLIVIA MONJON, J´ERˆOME SCHERER, AND FLORENCE STERCK
|
| 4 |
+
Abstract. The correspondence between the concept of conditional flatness and admissibil-
|
| 5 |
+
ity in the sense of Galois appears in the context of localization functors in any semi-abelian
|
| 6 |
+
category admitting a fiberwise localization. It is then natural to wonder what happens in
|
| 7 |
+
the category of crossed modules where fiberwise localization is not always available. In this
|
| 8 |
+
article, we establish an equivalence between conditional flatness and admissibility in the
|
| 9 |
+
sense of Galois (for the class of regular epimorphisms) for regular-epi localization functors.
|
| 10 |
+
We use this equivalence to prove that nullification functors are admissible for the class of
|
| 11 |
+
regular epimorphisms, even if the kernels of their localization morphisms are not acyclic.
|
| 12 |
+
Introduction
|
| 13 |
+
It is a natural question to ask whether the pullback of a nice extension inherits these
|
| 14 |
+
nice properties. When working with localization functors or reflections one particularly nice
|
| 15 |
+
feature for an extension is flatness. We say that an extension is L-flat, for a localization
|
| 16 |
+
functor L, if applying L to the extension yields another extension, see Definition 2.1. The
|
| 17 |
+
question is thus to understand when the pullback of an L-flat extension is again L-flat.
|
| 18 |
+
Such questions have been studied first in a homotopical context by Berrick and Farjoun,
|
| 19 |
+
[1]. For homotopical localization functors in the category of topological spaces (in the sense
|
| 20 |
+
of Bousfield, [5], see also Farjoun’s book [13]), preservation of L-flatness (for fiber sequences)
|
| 21 |
+
under pullbacks was shown to be equivalent for L to be a so-called nullification functor. The
|
| 22 |
+
situation is surprisingly more delicate in the category of groups. Farjoun and the second
|
| 23 |
+
author proved for example that all nilpotent quotient functors have this nice property, which
|
| 24 |
+
they called conditional flatness, see [14].
|
| 25 |
+
The standard strategy to establish conditional flatness for a localization functor consists
|
| 26 |
+
in a few reduction steps culminating in a simpler form, which Gran identified as admissibility
|
| 27 |
+
in the sense of Galois for the class of regular epimorphisms [17, Proposition 3.3]. This shifted
|
| 28 |
+
the study of conditional flatness in homotopy theory to that of admissibility in semi-abelian
|
| 29 |
+
categories, see [15]. Admissibility had been introduced by Janelidze and Kelly in [17] and
|
| 30 |
+
has since then played a central role in the categorical study of extensions, let us mention for
|
| 31 |
+
example Everaert, Gran, and Van der Linden’s work in [12].
|
| 32 |
+
In this article we study admissibility for localization functors in the category of crossed
|
| 33 |
+
modules (of groups), a category of interest to both topologists due to Whitehead’s work on
|
| 34 |
+
connected 2-types, [25], and algebraists since Brown and Spencer [7] proved the equivalence
|
| 35 |
+
between crossed modules and internal groupoids in the category of groups (a result that
|
| 36 |
+
they credit to Verdier). This equivalence relates two interesting notions and allows one to
|
| 37 |
+
deal with the concept of internal groupoid in an alternative way, that is useful for compu-
|
| 38 |
+
tations. Moreover, crossed modules form a semi-abelian category in the sense of Janelidze,
|
| 39 |
+
2020 Mathematics Subject Classification. 18G45, 55P60, 18E50, 55R70, 18E13.
|
| 40 |
+
Key words and phrases. Crossed modules, Localization functors, Admissibility, Regular epimorphisms,
|
| 41 |
+
Conditional flatness, Nullifications.
|
| 42 |
+
1
|
| 43 |
+
|
| 44 |
+
2
|
| 45 |
+
OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
|
| 46 |
+
M´arki and Tholen, [18]. We adopt the algebraic point of view here and continue our work
|
| 47 |
+
started in [22]. Indeed, among the reduction steps we have mentioned above, the first one
|
| 48 |
+
calls on fiberwise localization techniques. For group theoretical localization and homotopy
|
| 49 |
+
localization functors, it allows one to reduce the study to extensions with local kernel (fiber).
|
| 50 |
+
Fiberwise localization techniques are available in the category of groups thanks to work of
|
| 51 |
+
Casacuberta and Descheemaeker, [10], but we proved in [22] that they are not at hand in
|
| 52 |
+
general for crossed modules. Our aim in this article is thus to modify the strategy to be able
|
| 53 |
+
to study admissibility in this setting.
|
| 54 |
+
We focus on localization functors such that the co-augmentation morphism ℓT: T → LT is
|
| 55 |
+
a regular epimorphism for all crossed modules T. We call them regular-epi localization and
|
| 56 |
+
notice that many examples of interest are provided by nullification functors, as defined in
|
| 57 |
+
Definition 1.10. Any crossed module A determines a nullification functor PA that “kills” all
|
| 58 |
+
morphisms from A and there are other regular-epi localization functors such as abelianization.
|
| 59 |
+
One first important observation which makes the reduction strategy viable is that, even
|
| 60 |
+
though fiberwise localization does not exist in general, even for nullification functors, we can
|
| 61 |
+
use this tool for certain extensions.
|
| 62 |
+
Lemma 2.5. Let L be a regular-epi localization. Let
|
| 63 |
+
(1)
|
| 64 |
+
T
|
| 65 |
+
Q
|
| 66 |
+
N
|
| 67 |
+
1
|
| 68 |
+
1
|
| 69 |
+
κ
|
| 70 |
+
α
|
| 71 |
+
be an L-flat exact sequence of crossed modules and g : Q′ → Q a morphism of crossed modules.
|
| 72 |
+
Then, we can construct the fiberwise localization of the pullback of (1) along g:
|
| 73 |
+
N
|
| 74 |
+
N
|
| 75 |
+
T′
|
| 76 |
+
T
|
| 77 |
+
Q′
|
| 78 |
+
Q
|
| 79 |
+
1
|
| 80 |
+
1
|
| 81 |
+
1
|
| 82 |
+
1
|
| 83 |
+
κ
|
| 84 |
+
πT
|
| 85 |
+
κ′
|
| 86 |
+
g
|
| 87 |
+
πQ′
|
| 88 |
+
α
|
| 89 |
+
This allows us to relate conditional flatness with admissibility, in the same spirit as what
|
| 90 |
+
was done in the category of groups, [14], or in the wider context of semi-abelian categories
|
| 91 |
+
where fiberwise localization exists, [15]. A localization functor L is said to be admissible for
|
| 92 |
+
the class of regular epimorphisms if it preserves any pullback of the form
|
| 93 |
+
LT
|
| 94 |
+
T′
|
| 95 |
+
Q
|
| 96 |
+
LQ
|
| 97 |
+
πLT
|
| 98 |
+
ℓQ
|
| 99 |
+
πQ
|
| 100 |
+
α
|
| 101 |
+
where α is a regular epimorphism between L-local objects.
|
| 102 |
+
Theorem 3.4.
|
| 103 |
+
Let L be a regular-epi localization functor. Then the following statements
|
| 104 |
+
are equivalent
|
| 105 |
+
(1) L is conditionally flat;
|
| 106 |
+
(2) L is admissible for the class of regular epimorphisms.
|
| 107 |
+
One difference between groups and crossed modules and maybe the main source of com-
|
| 108 |
+
plication is highlighted by the behavior of kernels. This was already the reason why one
|
| 109 |
+
|
| 110 |
+
ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
|
| 111 |
+
3
|
| 112 |
+
cannot always construct fiberwise localization and we were also surprised to find examples of
|
| 113 |
+
nullification functors for which the kernel of the nullification morphism ℓT : T → PAT is not
|
| 114 |
+
always PA-acyclic, see [22, Proposition 4.6]. For groups and spaces, this property actually
|
| 115 |
+
characterizes nullification functors.
|
| 116 |
+
Still we prove here that acyclic kernels implies admissibility and in Proposition 4.3, that if
|
| 117 |
+
the kernels of the localization morphisms are Lf-acyclic, then Lf is a nullification functor. Well
|
| 118 |
+
behaved nullification functors are therefore admissible, but what about arbitrary nullification
|
| 119 |
+
functors, for which fiberwise localization does not necessarily exist and for which the kernel of
|
| 120 |
+
the nullification is not necessarily acyclic? By carefully looking at the inductive construction
|
| 121 |
+
of PAT we show our main result, namely that all nullification functors are admissible.
|
| 122 |
+
Theorem 5.5. Let A be any crossed module. The nullification functor PA is admissible for
|
| 123 |
+
the class of regular epimorphisms.
|
| 124 |
+
We end this introduction with a short outline. The first section consists of preliminaries
|
| 125 |
+
that we use in the rest of the article. Then in Section 2 we introduce L-flat exact sequences
|
| 126 |
+
and conditionally flat localization functors in the context of crossed modules. We show how to
|
| 127 |
+
construct fiberwise localization of L-flat exact sequences. The third section is essential in the
|
| 128 |
+
development of a simpler characterisation of conditional flatness: It provides an equivalence
|
| 129 |
+
with the notion of admissibility in the specific context of regular-epi localization functors. In
|
| 130 |
+
Section 4 the link between L-acyclicity and admissibility is established and the last section
|
| 131 |
+
is devoted to the proof that every nullification functor is admissible.
|
| 132 |
+
Acknowledgments. We would like to thank Marino Gran for sharing his insight about
|
| 133 |
+
admissibility.
|
| 134 |
+
1. Preliminaries
|
| 135 |
+
1.1. The semi-abelian category of crossed modules. In this subsection, following Norrie
|
| 136 |
+
[23] and Brown-Higgins [6], we provide the basic definitions and notation concerning crossed
|
| 137 |
+
modules.
|
| 138 |
+
Definition 1.1. [25] A crossed module of groups is a pair of groups T1 and T2, an action by
|
| 139 |
+
group automorphisms of T2 on T1, denoted by T2 × T1 → T1 : (b, t) �→
|
| 140 |
+
bt, together with a
|
| 141 |
+
group homomorphism ∂T : T1 → T2 such that for any b in T2 and any t, s in T1,
|
| 142 |
+
(2)
|
| 143 |
+
∂T( bt) = b∂T(t)b−1,
|
| 144 |
+
(3)
|
| 145 |
+
∂T(t)s = tst−1.
|
| 146 |
+
Hence we often write a crossed module as a triple (T1, T2, ∂T), or simply T for short, and
|
| 147 |
+
we refer sometimes to ∂T as the connecting morphism.
|
| 148 |
+
Definition 1.2. Let N := (N1, N2, ∂N) and M := (M1, M2, ∂M) be two crossed modules. A
|
| 149 |
+
morphism of crossed modules α: N → M is a pair of group homomorphisms α1: N1 → M1
|
| 150 |
+
and α2 : N2 → M2 such that the two following diagrams commute
|
| 151 |
+
N2
|
| 152 |
+
N1
|
| 153 |
+
M1
|
| 154 |
+
M2
|
| 155 |
+
∂N
|
| 156 |
+
∂M
|
| 157 |
+
α1
|
| 158 |
+
α2
|
| 159 |
+
M2 × M1
|
| 160 |
+
N2 × N1
|
| 161 |
+
N1
|
| 162 |
+
M1.
|
| 163 |
+
(α2, α1)
|
| 164 |
+
α1
|
| 165 |
+
|
| 166 |
+
4
|
| 167 |
+
OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
|
| 168 |
+
where the horizontal arrows in the diagram on the right are the respective group actions of
|
| 169 |
+
the two crossed modules.
|
| 170 |
+
We write XMod for the category of crossed modules of groups.
|
| 171 |
+
Remark 1.3. There is an embedding of the category of groups in this category via two
|
| 172 |
+
functors which are respectively left and right adjoint to the truncation functor Tr: XMod →
|
| 173 |
+
Grp that sends a crossed module T := (T1, T2, ∂T) to T2. The functor X: Grp → XMod which
|
| 174 |
+
sends a group G to the crossed module XG = (1, G, 1) reduced to the group G at level 2 is
|
| 175 |
+
the left adjoint functor and the functor R: Grp → XMod: G �→ (G, G, IdG) is the right ajoint
|
| 176 |
+
functor. This will help us to import group theoretical results into XMod.
|
| 177 |
+
There is an obvious notion of subcrossed module, see [23]. One simply requires the sub-
|
| 178 |
+
object to be made levelwise of subgroups, the connecting homomorphism and the action are
|
| 179 |
+
induced by the given connecting homomorphism and action. The notion of normality is less
|
| 180 |
+
obvious.
|
| 181 |
+
Definition 1.4. A subcrossed module N := (N1, N2, ∂N) of T := (T1, T2, ∂T) is normal if the
|
| 182 |
+
following three conditions hold
|
| 183 |
+
(1) N2 is a normal subgroup of T2;
|
| 184 |
+
(2) for any t2 ∈ T2 and n1 ∈ N1, we have t2n1 ∈ N1;
|
| 185 |
+
(3) [N2, T1] := ⟨ n2t1t−1
|
| 186 |
+
1
|
| 187 |
+
| t1 ∈ T1, n2 ∈ N2⟩ ⊆ N1.
|
| 188 |
+
In contrast to limits, which are built component-wise, colimits are generally more delicate
|
| 189 |
+
to construct. In particular, the construction of cokernels is not straightforward, but when
|
| 190 |
+
N is a normal subcrossed module of T the cokernel is simply the levelwise quotient by the
|
| 191 |
+
normal subgroups N1 ⊳ T1 and N2 ⊳ T2.
|
| 192 |
+
The category of crossed modules shares many nice properties with the category of groups.
|
| 193 |
+
The traditional homological lemmas, [2], the Split Short Five Lemma, [3], and the Noether
|
| 194 |
+
Isomorphism Theorems, [2], hold.
|
| 195 |
+
One can recognize pullbacks by looking at kernels or
|
| 196 |
+
cokernels, [2, Lemmas 4.2.4 and 4.2.5], and in fact Xmod is a semi-abelian category, as
|
| 197 |
+
introduced by Janelidze, M´arki, and Tholen in [18]. This is shown in [18]. There is one result
|
| 198 |
+
we will use several times in this article, namely [2, Lemma 4.2.4], which we recall now.
|
| 199 |
+
Proposition 1.5. Let C be a semi-abelian (or homological) category. Consider the following
|
| 200 |
+
diagram of exact rows:
|
| 201 |
+
T ′
|
| 202 |
+
Q′
|
| 203 |
+
N′
|
| 204 |
+
T
|
| 205 |
+
Q
|
| 206 |
+
N
|
| 207 |
+
1
|
| 208 |
+
1
|
| 209 |
+
1
|
| 210 |
+
(2)
|
| 211 |
+
w
|
| 212 |
+
u
|
| 213 |
+
v
|
| 214 |
+
κ
|
| 215 |
+
α
|
| 216 |
+
κ′
|
| 217 |
+
α′
|
| 218 |
+
Then the following statements hold.
|
| 219 |
+
(1) If u is an isomorphism then (2) is a pullback.
|
| 220 |
+
(2) If u and w are regular epimorphisms then v is also a regular epimorphism.
|
| 221 |
+
1.2. Localization functors. In this subsection we recall the definition of localization func-
|
| 222 |
+
tors in the category of crossed modules. We also recall some important properties of such
|
| 223 |
+
functor as well as some examples.
|
| 224 |
+
|
| 225 |
+
ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
|
| 226 |
+
5
|
| 227 |
+
Definition 1.6. A localization functor in the category of crossed modules is a coaugmented
|
| 228 |
+
idempotent functor L: XMod → XMod. The coaugmentation ℓ: Id → L is a natural transfor-
|
| 229 |
+
mation such that ℓLX and LℓX are isomorphisms.
|
| 230 |
+
In particular we have ℓLX = LℓX, see [9, Proposition 1.1].
|
| 231 |
+
Definition 1.7. Let L be a localization functor. A crossed module T is L-local if ℓT : T → LT
|
| 232 |
+
is an isomorphism. A morphism f : N → M is an L-equivalence if Lf is an isomorphism.
|
| 233 |
+
We recall a few basic and useful closure properties of L-equivalences.
|
| 234 |
+
Lemma 1.8.
|
| 235 |
+
(1) The pushout of an L-equivalence is an L-equivalence.
|
| 236 |
+
(2) The composition of L-equivalences is an L-equivalence.
|
| 237 |
+
(3) A κ-filtered colimit of a diagram Tβ of L-equivalences Tβ → Tβ+1 for all successor
|
| 238 |
+
ordinals β + 1 < κ yields an L-equivalence T0 → Tκ = colimβ<κTβ.
|
| 239 |
+
(4) Let F be an I-indexed diagram of L-equivalences in the category of morphisms of
|
| 240 |
+
crossed modules. Then the colimit colimIF is an L-equivalence.
|
| 241 |
+
Sometimes a localization functor L is associated to a full reflexive subcategory L of XMod.
|
| 242 |
+
The pair of adjoint functors U: L ⇆ XMod: F provides a localization functor L = FU, as
|
| 243 |
+
Cassidy, H´ebert, and Kelly do in [11]. Some other times there is a morphism f one wishes
|
| 244 |
+
to invert so as to construct a localization functor often written Lf.
|
| 245 |
+
Definition 1.9. Let f be a morphism of crossed modules. A crossed module T is Lf-local if
|
| 246 |
+
Hom(f, T) is an isomorphism. A morphism g in XMod is an Lf-equivalence if Hom(g, T) is
|
| 247 |
+
an isomorphism for any Lf-local crossed module T.
|
| 248 |
+
Such localization functors exist in XMod, see for example Bousfield’s foundational work
|
| 249 |
+
[4]. Local objects and local equivalences coincide then with the notions introduced in Defini-
|
| 250 |
+
tion 1.7. Proposition 1.8 is the analogue of Hirschhorn’s [16, Proposition 1.2.20 and Propo-
|
| 251 |
+
sition 1.2.21].
|
| 252 |
+
If the codomain of the morphism f is the trivial crossed module, the functor Lf is of
|
| 253 |
+
particular interest.
|
| 254 |
+
Definition 1.10. Let A be a crossed module and f be the morphism A → 1. The localization
|
| 255 |
+
functor Lf is then written PA and is called a nullification functor. An f-local object is called
|
| 256 |
+
A-null, or A-local and a crossed module T is A-acyclic if PAT = 1. The localization morphism
|
| 257 |
+
ℓT : T → PAT is written pT.
|
| 258 |
+
Proposition 1.11. Let A and T be crossed modules. Then there exists an ordinal λ depending
|
| 259 |
+
on A such that PAT is constructed as a transfinite filtered colimit of a diagram of the form
|
| 260 |
+
T = T0 → T1 → · · · → Tβ → . . . for β < λ where all morphisms are PA-equivalences and
|
| 261 |
+
regular epimorphims.
|
| 262 |
+
This inductive construction has been carefully described in [22, Proposition 2.8]. The rea-
|
| 263 |
+
son why each step is a PA-equivalence and a regular epimorphism is that Tβ+1 is constructed
|
| 264 |
+
from Tβ by taking the cokernel of all morphisms A → Tβ. We recall the details and use
|
| 265 |
+
them in Section 5. There is a larger class of localization functors we investigate in this se-
|
| 266 |
+
quel to [22]. They share with PA the property that the localization morphism is a regular
|
| 267 |
+
epimorphism.
|
| 268 |
+
Definition 1.12. A localization functor L is a regular-epi localization if for any crossed
|
| 269 |
+
module T the coaugmentation ℓT: T → LT is a regular epimorphism.
|
| 270 |
+
|
| 271 |
+
6
|
| 272 |
+
OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
|
| 273 |
+
Remark 1.13. In the category of crossed modules, a morphism α = (α1, α2) is a regular
|
| 274 |
+
epimorphism (a coequalizer of a pair of parallel arrows) if and only if both α1 and α2 are sur-
|
| 275 |
+
jective group homomorphisms [20, Proposition 2.2]. A surjective homomorphism of crossed
|
| 276 |
+
modules is an epimorphism but there exist epimorphisms that are not surjective. In a pointed
|
| 277 |
+
protomodular category such as XMod, regular epimorphisms and normal epimorphisms (the
|
| 278 |
+
cokernel of some morphism) coincide.
|
| 279 |
+
We present now some interesting examples of localization functors that will illustrate our
|
| 280 |
+
results in the rest of the article, see also the end of [22, Section 2].
|
| 281 |
+
Example 1.14. The nullification functor PXZ with respect to the crossed module XZ is given
|
| 282 |
+
by:
|
| 283 |
+
PXZ
|
| 284 |
+
|
| 285 |
+
|
| 286 |
+
|
| 287 |
+
|
| 288 |
+
|
| 289 |
+
N1
|
| 290 |
+
N2
|
| 291 |
+
∂
|
| 292 |
+
|
| 293 |
+
|
| 294 |
+
|
| 295 |
+
|
| 296 |
+
=
|
| 297 |
+
N1/[N2, N1]
|
| 298 |
+
1
|
| 299 |
+
Example 1.15. The abelianization functor Ab: XMod → XMod is already described in [24].
|
| 300 |
+
It is defined by:
|
| 301 |
+
Ab
|
| 302 |
+
|
| 303 |
+
|
| 304 |
+
|
| 305 |
+
|
| 306 |
+
|
| 307 |
+
N1
|
| 308 |
+
N2
|
| 309 |
+
∂
|
| 310 |
+
|
| 311 |
+
|
| 312 |
+
|
| 313 |
+
|
| 314 |
+
=
|
| 315 |
+
N1/[N2, N1]
|
| 316 |
+
N2/[N2, N2]
|
| 317 |
+
˜∂
|
| 318 |
+
Example 1.16. Our third and last example of localization functor of crossed modules is
|
| 319 |
+
I: XMod → XMod, see [22, Example 2.15]:
|
| 320 |
+
I
|
| 321 |
+
|
| 322 |
+
|
| 323 |
+
|
| 324 |
+
|
| 325 |
+
|
| 326 |
+
N1
|
| 327 |
+
N2
|
| 328 |
+
∂N
|
| 329 |
+
|
| 330 |
+
|
| 331 |
+
|
| 332 |
+
|
| 333 |
+
=
|
| 334 |
+
N2
|
| 335 |
+
N2
|
| 336 |
+
IdN2
|
| 337 |
+
This functor is induced by the adjunction between the truncation functor Tr: XMod → Grp,
|
| 338 |
+
defined by Tr(T1, T2, ∂T) = T2, see Remark 1.3, and its right adjoint R: Grp → XMod that
|
| 339 |
+
sends a group T to (T, T, IdT).
|
| 340 |
+
Remark 1.17. The functor considered in Example 1.14 is a regular-epi localization, since all
|
| 341 |
+
nullification functors are so. However regular-epi localizations are not nullification functors in
|
| 342 |
+
general as illustrated by the functor Ab in Example 1.15. Indeed, if Ab were a nullification PA,
|
| 343 |
+
then A = (A1, A2, ∂A) would be a perfect crossed module, i.e. one such that Ab(A) = (1, 1, Id).
|
| 344 |
+
In particular, the group A2 would be a perfect group. But then PA(XS3) = XS3 since there
|
| 345 |
+
are no non-trivial homomorphisms from a perfect group to the symmetric group S3. But we
|
| 346 |
+
know that Ab(XS3) = XC2, where C2 is the cyclic group of order two, so abelianization is not
|
| 347 |
+
a nullification.
|
| 348 |
+
We finally note that a localization functor Lf is a regular-epi localization functor if f itself
|
| 349 |
+
is a regular epimorphism, an analogous observation appears in [8] for groups.
|
| 350 |
+
To conclude these preliminaries, let us recall the notion of fiberwise localization.
|
| 351 |
+
We
|
| 352 |
+
introduced this for crossed modules in [22, Definition 3.1], but this is not new, for spaces a
|
| 353 |
+
good reference is [13, Section I.F].
|
| 354 |
+
|
| 355 |
+
ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
|
| 356 |
+
7
|
| 357 |
+
Definition 1.18. Let L: XMod → XMod be a localization functor. An exact sequence
|
| 358 |
+
T
|
| 359 |
+
Q
|
| 360 |
+
N
|
| 361 |
+
1
|
| 362 |
+
1
|
| 363 |
+
κ
|
| 364 |
+
α
|
| 365 |
+
admits a fiberwise localization if there exists a commutative diagram of horizontal exact
|
| 366 |
+
sequences
|
| 367 |
+
T
|
| 368 |
+
Q
|
| 369 |
+
N
|
| 370 |
+
E
|
| 371 |
+
Q
|
| 372 |
+
LN
|
| 373 |
+
1
|
| 374 |
+
1
|
| 375 |
+
1
|
| 376 |
+
1
|
| 377 |
+
κ
|
| 378 |
+
j
|
| 379 |
+
ℓN
|
| 380 |
+
p
|
| 381 |
+
α
|
| 382 |
+
g
|
| 383 |
+
where g is an L-equivalence.
|
| 384 |
+
The following theorem is a fusion of two results from [22] namely Theorem 3.4 and Corollary
|
| 385 |
+
3.7. From now on, every localization functor that we consider is a regular-epi localization.
|
| 386 |
+
Theorem 1.19. Let L: XMod → XMod be a regular-epi localization functor. An exact se-
|
| 387 |
+
quence of crossed modules
|
| 388 |
+
(4)
|
| 389 |
+
T
|
| 390 |
+
Q
|
| 391 |
+
N
|
| 392 |
+
1
|
| 393 |
+
1
|
| 394 |
+
κ
|
| 395 |
+
α
|
| 396 |
+
admits a fiberwise localization if and only if we have the following inclusion
|
| 397 |
+
(5)
|
| 398 |
+
[κ2(ker(ℓN
|
| 399 |
+
2 )), T1] ⊆ κ1(ker(ℓN
|
| 400 |
+
1 ))
|
| 401 |
+
2. Fiberwise localization and flatness
|
| 402 |
+
In this section, we investigate the fiberwise localization of L-flat exact sequences and their
|
| 403 |
+
pullbacks in the context of regular-epi localization functors of crossed modules L: XMod →
|
| 404 |
+
XMod (even if this notion is not defined only for regular-epi functor as we will see in Propo-
|
| 405 |
+
sition 5.6). This section will be essential to study the link between conditionally flatness
|
| 406 |
+
and admissibility in Section 3. First, let us recall the definitions of L-flat and conditionally
|
| 407 |
+
flatness.
|
| 408 |
+
Definition 2.1. Let L be a localization functor, a short exact sequence
|
| 409 |
+
T
|
| 410 |
+
Q
|
| 411 |
+
N
|
| 412 |
+
1
|
| 413 |
+
1
|
| 414 |
+
κ
|
| 415 |
+
α
|
| 416 |
+
is called L-flat if the sequence
|
| 417 |
+
LT
|
| 418 |
+
LQ
|
| 419 |
+
LN
|
| 420 |
+
L(κ)
|
| 421 |
+
L(α)
|
| 422 |
+
is a short exact sequence.
|
| 423 |
+
Remark 2.2. We recall that limits are computed componentwise in the category of crossed
|
| 424 |
+
modules. In the case of pullbacks in XMod they are built as follows [19]. Let α: T → Q and
|
| 425 |
+
g : Q′ → Q be two morphisms of crossed modules. Then the pullback of α along g is given
|
| 426 |
+
by the following square
|
| 427 |
+
T
|
| 428 |
+
T′
|
| 429 |
+
Q′
|
| 430 |
+
Q
|
| 431 |
+
πT
|
| 432 |
+
g
|
| 433 |
+
πQ′
|
| 434 |
+
α
|
| 435 |
+
The object part T′ of the pullback is built component-wise as in the case of groups
|
| 436 |
+
(T1 ×Q1 Q′
|
| 437 |
+
1, T2 ×Q2 Q′
|
| 438 |
+
2, ∂′),
|
| 439 |
+
|
| 440 |
+
8
|
| 441 |
+
OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
|
| 442 |
+
where ∂′ and the action are induced by the universal property of the pullbacks in Grp. The
|
| 443 |
+
projections are the natural ones, given also component-wise.
|
| 444 |
+
Following the terminology introduced in [14] for groups and spaces, we define the notion
|
| 445 |
+
of conditional flatness for localization functors in crossed modules.
|
| 446 |
+
Definition 2.3. Let L be a localization functor. We say that this functor is conditionally
|
| 447 |
+
flat if the pullback of any L-flat exact sequence is L-flat.
|
| 448 |
+
In Section 3 we provide a characterization of conditional flatness. To achieve this goal we
|
| 449 |
+
will use a similar strategy to the one applied to groups and topological spaces in [14]. The
|
| 450 |
+
authors exploit heavily the existence of fiberwise localization in the categories of groups and
|
| 451 |
+
spaces. However, in our article [22], we observed that fiberwise localization does not always
|
| 452 |
+
exist for a given localization functor and a given exact sequence in XMod. Fortunately, when
|
| 453 |
+
we work with L-flat exact sequences we can show that it is always possible to construct a
|
| 454 |
+
fiberwise localization.
|
| 455 |
+
Lemma 2.4. Let L be a regular-epi localization. Then any L-flat exact sequence of crossed
|
| 456 |
+
modules admits a fiberwise localization.
|
| 457 |
+
Proof. Let
|
| 458 |
+
T
|
| 459 |
+
Q
|
| 460 |
+
N
|
| 461 |
+
1
|
| 462 |
+
1
|
| 463 |
+
κ
|
| 464 |
+
α
|
| 465 |
+
be an L-flat exact sequence of
|
| 466 |
+
crossed modules. The L-flatness of the sequence implies in particular that Lκ is a monomor-
|
| 467 |
+
phism. Consider the following diagram of exact sequences:
|
| 468 |
+
1
|
| 469 |
+
1
|
| 470 |
+
ker(ℓT)
|
| 471 |
+
(1)
|
| 472 |
+
ker(ℓN)
|
| 473 |
+
N
|
| 474 |
+
T
|
| 475 |
+
LN
|
| 476 |
+
LT
|
| 477 |
+
κ
|
| 478 |
+
Lκ
|
| 479 |
+
ℓN
|
| 480 |
+
ℓT
|
| 481 |
+
We conclude from [2, Lemma 4.2.4.(1)] that (1) is a pullback since Lκ is a monomorphism.
|
| 482 |
+
Then we have that κ(ker(ℓN)) is a normal subcrossed module of T as it can be seen as the
|
| 483 |
+
intersection of the normal subcrossed modules N and ker(ℓT) of T. Therefore, we can apply
|
| 484 |
+
Theorem 1.19
|
| 485 |
+
□
|
| 486 |
+
To understand conditional flatness we must study the pullback of an L-flat exact sequence.
|
| 487 |
+
It will thus be very handy in Section 3 to know that any such pullback admits a fiberwise
|
| 488 |
+
localization.
|
| 489 |
+
Lemma 2.5. Let L be a regular-epi localization. Let
|
| 490 |
+
(6)
|
| 491 |
+
T
|
| 492 |
+
Q
|
| 493 |
+
N
|
| 494 |
+
1
|
| 495 |
+
1
|
| 496 |
+
κ
|
| 497 |
+
α
|
| 498 |
+
be an L-flat exact sequence of crossed modules and g : Q′ → Q a morphism of crossed modules.
|
| 499 |
+
Then, we can construct the fiberwise localization of the pullback of (6) along g
|
| 500 |
+
N
|
| 501 |
+
N
|
| 502 |
+
T′
|
| 503 |
+
T
|
| 504 |
+
Q′
|
| 505 |
+
Q
|
| 506 |
+
1
|
| 507 |
+
1
|
| 508 |
+
1
|
| 509 |
+
1
|
| 510 |
+
κ
|
| 511 |
+
πT
|
| 512 |
+
κ′
|
| 513 |
+
g
|
| 514 |
+
πQ′
|
| 515 |
+
α
|
| 516 |
+
|
| 517 |
+
ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
|
| 518 |
+
9
|
| 519 |
+
Remark 2.6. In the rest of the article, and in particular in the following proof, we identify
|
| 520 |
+
N with the normal subcrossed module κ(N) of T and with κ′(N), normal subcrossed module
|
| 521 |
+
of T′. We will therefore omit the us of κ and κ′. For example an element of the group N1
|
| 522 |
+
that we want to consider in T′
|
| 523 |
+
1 will be denoted (n1, 1) instead of κ′
|
| 524 |
+
1(n1) = (κ1(n1), 1).
|
| 525 |
+
Proof of Lemma 2.5. We need to verify that ker(ℓN) is a normal crossed module of T′. Since
|
| 526 |
+
N is a subcrossed module of T′, we just need to verify (5) of Theorem 1.19. Let (t1, q1) be an
|
| 527 |
+
element in T ′
|
| 528 |
+
1 and (x2, 1) be an element of ker(ℓN
|
| 529 |
+
2 ), then we have the following equality
|
| 530 |
+
(x2,1)(t1, q1)(t1, q1)−1 = ( x2t1t−1
|
| 531 |
+
1 , q1q−1
|
| 532 |
+
1 ) = ( x2t1t−1
|
| 533 |
+
1 , 1).
|
| 534 |
+
Indeed, by Lemma 2.4 we know that the original sequence (6) admits a fiberwise localization
|
| 535 |
+
which then implies by Theorem 1.19 that [ker(ℓN
|
| 536 |
+
2 ), T1] ⊂ ker(ℓN
|
| 537 |
+
1 ) i.e for any x2 ∈ ker(ℓN
|
| 538 |
+
2 ) and
|
| 539 |
+
t1 ∈ T1 we have x2t1t−1
|
| 540 |
+
1
|
| 541 |
+
∈ ker(ℓN
|
| 542 |
+
1 ). But then, with the notation introduced in Remark 2.6,
|
| 543 |
+
this is equivalent to say that the element ( x2t1t−1
|
| 544 |
+
1 , 1) belongs to ker(ℓN
|
| 545 |
+
1 ).
|
| 546 |
+
□
|
| 547 |
+
This lemma is not trivial since the fiberwise localization of an exact sequence of crossed
|
| 548 |
+
modules does not always exist as we have proved in [22, Theorem 4.5]. If we want the strategy
|
| 549 |
+
for groups and spaces to be also viable in the study of conditional flatness for crossed modules,
|
| 550 |
+
we need a final ingredient, namely a commutation rule for the fiberwise localization and the
|
| 551 |
+
pullback operations.
|
| 552 |
+
Proposition 2.7. Let us consider an L-flat exact sequence where L is a regular-epi localization
|
| 553 |
+
functor.
|
| 554 |
+
Then, the pullback of its fiberwise localization is the fiberwise localization of its
|
| 555 |
+
pullback.
|
| 556 |
+
Proof. Let
|
| 557 |
+
N
|
| 558 |
+
N
|
| 559 |
+
T′
|
| 560 |
+
T
|
| 561 |
+
Q′
|
| 562 |
+
Q
|
| 563 |
+
1
|
| 564 |
+
1
|
| 565 |
+
1
|
| 566 |
+
1
|
| 567 |
+
κ
|
| 568 |
+
πT
|
| 569 |
+
κ′
|
| 570 |
+
g
|
| 571 |
+
πQ′
|
| 572 |
+
α
|
| 573 |
+
be the pullback of an L-flat exact sequence. Then we construct the fiberwise localizations of
|
| 574 |
+
the two sequences by quotienting out the kernel of the localization morphism ℓN as follows.
|
| 575 |
+
N
|
| 576 |
+
1
|
| 577 |
+
T′
|
| 578 |
+
Q′
|
| 579 |
+
1
|
| 580 |
+
N
|
| 581 |
+
1
|
| 582 |
+
T
|
| 583 |
+
Q
|
| 584 |
+
1
|
| 585 |
+
LN
|
| 586 |
+
1
|
| 587 |
+
T′/ker(ℓN)
|
| 588 |
+
Q′
|
| 589 |
+
1
|
| 590 |
+
LN
|
| 591 |
+
1
|
| 592 |
+
T/ker(ℓN)
|
| 593 |
+
Q
|
| 594 |
+
1
|
| 595 |
+
κ′
|
| 596 |
+
πQ′
|
| 597 |
+
κ
|
| 598 |
+
α
|
| 599 |
+
g
|
| 600 |
+
πT
|
| 601 |
+
j
|
| 602 |
+
j′
|
| 603 |
+
p
|
| 604 |
+
p′
|
| 605 |
+
g
|
| 606 |
+
f ′
|
| 607 |
+
f
|
| 608 |
+
ℓN
|
| 609 |
+
ℓN
|
| 610 |
+
We complete the diagram by defining a morphism δ: T′/ker(ℓN) → T/ker(ℓN) via the
|
| 611 |
+
universal property of the cokernel since f ◦ πT ◦ κ′|ker(ℓN) = 1, where κ′|ker(ℓN) : ker(ℓN) → T′ is
|
| 612 |
+
|
| 613 |
+
10
|
| 614 |
+
OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
|
| 615 |
+
the inclusion of the kernel of ℓN.
|
| 616 |
+
ker(ℓN)
|
| 617 |
+
ker(ℓN)
|
| 618 |
+
T′
|
| 619 |
+
T
|
| 620 |
+
T ′/ker(ℓN)
|
| 621 |
+
T/ker(ℓN)
|
| 622 |
+
1
|
| 623 |
+
1
|
| 624 |
+
1
|
| 625 |
+
1
|
| 626 |
+
κ|ker(ℓN)
|
| 627 |
+
πT
|
| 628 |
+
κ′|ker(ℓN)
|
| 629 |
+
f ′
|
| 630 |
+
f
|
| 631 |
+
δ
|
| 632 |
+
N
|
| 633 |
+
1
|
| 634 |
+
T′
|
| 635 |
+
Q′
|
| 636 |
+
1
|
| 637 |
+
N
|
| 638 |
+
1
|
| 639 |
+
T
|
| 640 |
+
Q
|
| 641 |
+
1
|
| 642 |
+
LN
|
| 643 |
+
1
|
| 644 |
+
T′/ker(ℓN)
|
| 645 |
+
Q′
|
| 646 |
+
1
|
| 647 |
+
LN
|
| 648 |
+
1
|
| 649 |
+
T/ker(ℓN)
|
| 650 |
+
Q
|
| 651 |
+
1
|
| 652 |
+
κ′
|
| 653 |
+
πQ′
|
| 654 |
+
κ
|
| 655 |
+
α
|
| 656 |
+
g
|
| 657 |
+
πT
|
| 658 |
+
j
|
| 659 |
+
j′
|
| 660 |
+
p
|
| 661 |
+
p′
|
| 662 |
+
g
|
| 663 |
+
δ
|
| 664 |
+
f ′
|
| 665 |
+
f
|
| 666 |
+
lN
|
| 667 |
+
lN
|
| 668 |
+
We can check that δ makes the two front faces commute. Indeed, the right and left faces
|
| 669 |
+
commute by using the fact that ℓN and f ′ are epimorphisms respectively.
|
| 670 |
+
The commutativity of the above diagram and Proposition 1.5 implies that
|
| 671 |
+
LN
|
| 672 |
+
T′/ker(ℓN)
|
| 673 |
+
Q′
|
| 674 |
+
1
|
| 675 |
+
1
|
| 676 |
+
j′
|
| 677 |
+
p′
|
| 678 |
+
is the pullback of
|
| 679 |
+
T/ker(ℓN)
|
| 680 |
+
Q
|
| 681 |
+
LN
|
| 682 |
+
1
|
| 683 |
+
1
|
| 684 |
+
j
|
| 685 |
+
p
|
| 686 |
+
along g.
|
| 687 |
+
□
|
| 688 |
+
Remark 2.8. In [14], the construction of the fiberwise localization in the category of groups
|
| 689 |
+
was functorial, therefore from the morphism T′ → T between the pullback sequence and the
|
| 690 |
+
sequence itself we have directly a morphism between the fiberwise localization of the pullback
|
| 691 |
+
sequence and the fiberwise localization of the original sequence. In other words the map δ
|
| 692 |
+
comes for free in contrast to the category of crossed modules where we have to build the map
|
| 693 |
+
δ explicitly.
|
| 694 |
+
3. Conditional flatness and admissibility
|
| 695 |
+
In this section, we develop a simpler characterisation of conditional flatness, thanks to
|
| 696 |
+
the results of the previous section. We introduce the notion of admissibility for the class
|
| 697 |
+
of regular epimorphisms and show that it is equivalent to conditional flatness. With this
|
| 698 |
+
equivalence, we can easily establish conditional flatness for a given localization functor. We
|
| 699 |
+
observe that some properties of localization functors, such as right-exactness, imply directly
|
| 700 |
+
admissibility for the class of regular epimorphism.
|
| 701 |
+
The first step allows us to restrict the definition of conditional flatness (Definition 2.3) to
|
| 702 |
+
fiberwise localizations of L-flat exact sequences (Lemma 3.1). More precisely, we show that
|
| 703 |
+
the pullback of an L-flat exact sequence is L-flat if and only if the pullback of its fiberwise
|
| 704 |
+
localization is so.
|
| 705 |
+
|
| 706 |
+
ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
|
| 707 |
+
11
|
| 708 |
+
Lemma 3.1. Let L be a regular-epi localization functor. Then L is conditionally flat if and
|
| 709 |
+
only if for any L-flat exact sequence
|
| 710 |
+
T
|
| 711 |
+
Q
|
| 712 |
+
N
|
| 713 |
+
1
|
| 714 |
+
1
|
| 715 |
+
κ
|
| 716 |
+
α
|
| 717 |
+
with N
|
| 718 |
+
an L-local crossed module, the pullback sequence along any morphism Q′ → Q is L-flat.
|
| 719 |
+
Proof. This is clear since f ′ and ℓN are L-equivalences in this diagram:
|
| 720 |
+
LN
|
| 721 |
+
N
|
| 722 |
+
T′
|
| 723 |
+
T′/ker(ℓN)
|
| 724 |
+
Q′
|
| 725 |
+
Q′
|
| 726 |
+
1
|
| 727 |
+
1
|
| 728 |
+
1
|
| 729 |
+
1
|
| 730 |
+
j′
|
| 731 |
+
f ′
|
| 732 |
+
ℓN
|
| 733 |
+
κ′
|
| 734 |
+
πQ′
|
| 735 |
+
p′
|
| 736 |
+
The top row is thus L-flat if and only if so is the bottom row and we conclude by Proposi-
|
| 737 |
+
tion 2.7.
|
| 738 |
+
□
|
| 739 |
+
The previous lemma allows us to follow the approach introduced in [14]. For the sake of
|
| 740 |
+
completeness, we give an explicit proof of the following results even if the arguments are
|
| 741 |
+
similar to the group theoretical ones.
|
| 742 |
+
Proposition 3.2. Let L be a regular-epi localization functor. Then L is conditionally flat if
|
| 743 |
+
and only if the pullback of any exact sequence of L-local objects is L-flat.
|
| 744 |
+
Proof. By the previous lemma it is sufficient to consider exact sequence with an L-local kernel
|
| 745 |
+
LN. Consider thus an L-flat exact sequence
|
| 746 |
+
T
|
| 747 |
+
Q
|
| 748 |
+
LN
|
| 749 |
+
1
|
| 750 |
+
1
|
| 751 |
+
j
|
| 752 |
+
p
|
| 753 |
+
.
|
| 754 |
+
We build the following diagram where g : Q′ → Q is any morphism of crossed modules and
|
| 755 |
+
(1) is a pullback.
|
| 756 |
+
LN
|
| 757 |
+
LN
|
| 758 |
+
LN
|
| 759 |
+
T′
|
| 760 |
+
(1)
|
| 761 |
+
(2)
|
| 762 |
+
T
|
| 763 |
+
LT
|
| 764 |
+
Q′
|
| 765 |
+
Q
|
| 766 |
+
LQ
|
| 767 |
+
1
|
| 768 |
+
1
|
| 769 |
+
1
|
| 770 |
+
1
|
| 771 |
+
1
|
| 772 |
+
1
|
| 773 |
+
j
|
| 774 |
+
L(j)
|
| 775 |
+
ℓT
|
| 776 |
+
ℓQ
|
| 777 |
+
πT
|
| 778 |
+
j′
|
| 779 |
+
g
|
| 780 |
+
πQ′
|
| 781 |
+
L(p)
|
| 782 |
+
p
|
| 783 |
+
We observe that since each row is exact, (2) is a pullback by Proposition 1.5, and then
|
| 784 |
+
(1) + (2) is also a pullback. Hence, the top row is the pullback of the bottom exact sequence
|
| 785 |
+
of L-local objects along the map ℓQ ◦ g, which shows the claim.
|
| 786 |
+
□
|
| 787 |
+
Definition 3.3. A localization functor L is said to be admissible for the class of regular
|
| 788 |
+
epimorphisms if it preserves any pullback of the form
|
| 789 |
+
LT
|
| 790 |
+
T′
|
| 791 |
+
Q
|
| 792 |
+
LQ
|
| 793 |
+
πLT
|
| 794 |
+
ℓQ
|
| 795 |
+
πQ
|
| 796 |
+
α
|
| 797 |
+
|
| 798 |
+
12
|
| 799 |
+
OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
|
| 800 |
+
where α is a regular epimorphism.
|
| 801 |
+
Theorem 3.4. Let L be a regular-epi localization functor. Then the following statements are
|
| 802 |
+
equivalent
|
| 803 |
+
(1) L is conditionally flat;
|
| 804 |
+
(2) L is admissible for the class of regular epimorphisms.
|
| 805 |
+
Proof. The implication (1) ⇒ (2) is trivial, so let us prove (2) ⇒ (1). Consider any exact
|
| 806 |
+
sequence of L-local objects
|
| 807 |
+
LT
|
| 808 |
+
LQ
|
| 809 |
+
LN
|
| 810 |
+
1
|
| 811 |
+
1
|
| 812 |
+
α
|
| 813 |
+
and any morphism g : A → LQ. By Proposition 3.2 conditional flatness is established if we
|
| 814 |
+
prove that the pullback of the exact sequence along g is L-flat. Let us first observe that this
|
| 815 |
+
morphism g factors through LA via the universal property of the localization:
|
| 816 |
+
A
|
| 817 |
+
LA
|
| 818 |
+
LQ
|
| 819 |
+
ℓA
|
| 820 |
+
g
|
| 821 |
+
˜g
|
| 822 |
+
Hence, we can first construct the pullback of
|
| 823 |
+
LT
|
| 824 |
+
LQ
|
| 825 |
+
LN
|
| 826 |
+
1
|
| 827 |
+
1
|
| 828 |
+
α
|
| 829 |
+
along
|
| 830 |
+
˜g and then pullback the resulting sequence along ℓA:
|
| 831 |
+
LN
|
| 832 |
+
LN
|
| 833 |
+
LN
|
| 834 |
+
T′′
|
| 835 |
+
T′
|
| 836 |
+
LT
|
| 837 |
+
A
|
| 838 |
+
LA
|
| 839 |
+
LQ
|
| 840 |
+
1
|
| 841 |
+
1
|
| 842 |
+
1
|
| 843 |
+
1
|
| 844 |
+
1
|
| 845 |
+
1
|
| 846 |
+
g
|
| 847 |
+
πLT
|
| 848 |
+
˜g
|
| 849 |
+
ℓA
|
| 850 |
+
πA
|
| 851 |
+
α
|
| 852 |
+
πLA
|
| 853 |
+
Since the category of L-local objects is closed under pullbacks, T′ is L-local and we can
|
| 854 |
+
apply condition (2) to conclude that the upper row is L-flat. This observation implies that
|
| 855 |
+
the pullback of
|
| 856 |
+
LT
|
| 857 |
+
LQ
|
| 858 |
+
LN
|
| 859 |
+
1
|
| 860 |
+
1
|
| 861 |
+
α
|
| 862 |
+
along g is an L-flat sequence as
|
| 863 |
+
desired.
|
| 864 |
+
□
|
| 865 |
+
The above theorem gives an easier characterisation of conditionally flatness in the category
|
| 866 |
+
of crossed modules. It will be useful in rest of the article.
|
| 867 |
+
Remark 3.5. Admissibility for the class of regulars epimorphisms in the context of semi-
|
| 868 |
+
abelian categories is studied in [15]. Similar results are proven for functors of localizations that
|
| 869 |
+
admit a functorial fiberwise localization. Note that their result does not imply Theorem 3.4
|
| 870 |
+
since localization functors of crossed modules do not admit functorial fiberwise localizations
|
| 871 |
+
in general. However, the implication “(1) implies (2)”, in Theorem 3.4, holds even for not
|
| 872 |
+
necessarily regular-epi localization functors.
|
| 873 |
+
|
| 874 |
+
ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
|
| 875 |
+
13
|
| 876 |
+
Proposition 3.6. If L: XMod → XMod is a localization functor that is right exact in XMod,
|
| 877 |
+
then L is admissible for the class of regular epimorphisms.
|
| 878 |
+
Proof. Let us consider the following pullback of an L-flat exact sequence of crossed modules
|
| 879 |
+
along a morphism g : Q′ → Q.
|
| 880 |
+
T′
|
| 881 |
+
Q′
|
| 882 |
+
N
|
| 883 |
+
T
|
| 884 |
+
Q
|
| 885 |
+
N
|
| 886 |
+
1
|
| 887 |
+
1
|
| 888 |
+
1
|
| 889 |
+
1
|
| 890 |
+
(1)
|
| 891 |
+
g
|
| 892 |
+
πT
|
| 893 |
+
κ
|
| 894 |
+
f
|
| 895 |
+
κ′
|
| 896 |
+
πQ′
|
| 897 |
+
By applying L to this diagram, we obtain (since L is right exact) the following diagram
|
| 898 |
+
LT′
|
| 899 |
+
LQ′
|
| 900 |
+
LN
|
| 901 |
+
LT
|
| 902 |
+
LQ
|
| 903 |
+
LN
|
| 904 |
+
1
|
| 905 |
+
1
|
| 906 |
+
1
|
| 907 |
+
L(g)
|
| 908 |
+
L(πT)
|
| 909 |
+
L(κ)
|
| 910 |
+
L(f)
|
| 911 |
+
L(κ′)
|
| 912 |
+
L(πQ′)
|
| 913 |
+
Since L(κ) = L(πT)◦L(κ′) is a (normal) monomorphism, we conclude that L(κ′) is a monomor-
|
| 914 |
+
phism. Normality follows then by right-exactness and we conclude by Theorem 3.4.
|
| 915 |
+
□
|
| 916 |
+
Note that this proof holds in any semi-abelian category.
|
| 917 |
+
Corollary 3.7. The functor of abelianization Ab: XMod → XMod is admissible for the class
|
| 918 |
+
of regular epimorphisms.
|
| 919 |
+
Proof. The functor of abelianization Ab: XMod → XMod is right exact. Since the exactness
|
| 920 |
+
can be shown component-wise, the result follows.
|
| 921 |
+
□
|
| 922 |
+
Sometimes it is handy to rely on our group theoretical knowledge to construct simple
|
| 923 |
+
examples of localization functors and how they behave on crossed modules. The proof of the
|
| 924 |
+
following proposition is based on a counter-example coming from groups via the functor X
|
| 925 |
+
defined in Remark 1.3.
|
| 926 |
+
Proposition 3.8. There are regular-epi localization functors L: XMod → XMod that are not
|
| 927 |
+
admissible for the class of regular epimorphisms.
|
| 928 |
+
Proof. We export via X: Grp → XMod the example in [14, Theorem 5.1] of a localization
|
| 929 |
+
functor in groups that is not admissible for the class of regular epimorphisms.
|
| 930 |
+
Let Lφ be the localization functor induced by the projection φ: C4 → C2, where Cn denotes
|
| 931 |
+
a cyclic group of order n. It gives rise to a localization functor LXφ : XMod → XMod. In
|
| 932 |
+
particular, if we apply X to the extension of Lφ-local groups considered in [14], we obtain an
|
| 933 |
+
exact sequence of LXφ-local crossed modules:
|
| 934 |
+
(1, Z)
|
| 935 |
+
(1, C2)
|
| 936 |
+
(1, Z)
|
| 937 |
+
1
|
| 938 |
+
1
|
| 939 |
+
If we pullback along the morphism of crossed modules Xφ, we obtain the following exact
|
| 940 |
+
sequence
|
| 941 |
+
(1, Z × C2)
|
| 942 |
+
(1, C4)
|
| 943 |
+
(1, Z)
|
| 944 |
+
1
|
| 945 |
+
1
|
| 946 |
+
|
| 947 |
+
14
|
| 948 |
+
OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
|
| 949 |
+
We conclude from [22, Lemma 1.4] that this exact sequence is not LXφ-flat. Indeed, if it was
|
| 950 |
+
the case we would have a contradiction with the group theoretical observation in [14].
|
| 951 |
+
□
|
| 952 |
+
4. Admissibility and acyclicity
|
| 953 |
+
In the categories of groups and topological spaces, the localization functor L is a nullification
|
| 954 |
+
functor if and only if the kernels of the localization morphisms are L-acyclic (which means
|
| 955 |
+
that Lker(ℓM) is trivial for any M ∈ XMod). This characterisation implies in particular that
|
| 956 |
+
any nullification functor is admissible for the class of regular epimorphisms. It is interesting
|
| 957 |
+
to notice that even if nullification functors of crossed modules do not have acyclic kernels,
|
| 958 |
+
we have a similar result in XMod: the L-acyclicity of the kernels of localization morphisms
|
| 959 |
+
implies the admissibility.
|
| 960 |
+
Proposition 4.1. Let L: XMod → XMod be a regular-epi localization functor such that
|
| 961 |
+
ker(ℓM : M → LM) is L-acyclic for any M ∈ XMod. Then L is admissible for the class of
|
| 962 |
+
regular epimorphisms.
|
| 963 |
+
Proof. Consider the pullback of
|
| 964 |
+
LT
|
| 965 |
+
LQ
|
| 966 |
+
LN
|
| 967 |
+
1
|
| 968 |
+
1
|
| 969 |
+
κ
|
| 970 |
+
f
|
| 971 |
+
along ℓQ: Q →
|
| 972 |
+
LQ:
|
| 973 |
+
LN
|
| 974 |
+
LN
|
| 975 |
+
T′
|
| 976 |
+
LT
|
| 977 |
+
Q
|
| 978 |
+
LQ
|
| 979 |
+
1
|
| 980 |
+
1
|
| 981 |
+
1
|
| 982 |
+
1
|
| 983 |
+
κ
|
| 984 |
+
πLT
|
| 985 |
+
κ′
|
| 986 |
+
ℓQ
|
| 987 |
+
πQ
|
| 988 |
+
f
|
| 989 |
+
We need to prove that πLT is an L-equivalence. Since XMod is a pointed protomodular
|
| 990 |
+
category and ℓQ is a regular epi by assumption, we know that πLT is the cokernel of ker(ℓQ) ∼=
|
| 991 |
+
ker(πLT) → T′. Let Y be a local object, for any g : T′ → Y we have the following diagram:
|
| 992 |
+
ker(ℓQ)
|
| 993 |
+
Lker(ℓQ) = 1
|
| 994 |
+
T′
|
| 995 |
+
LT
|
| 996 |
+
Y
|
| 997 |
+
g′
|
| 998 |
+
πLT
|
| 999 |
+
g
|
| 1000 |
+
˜g
|
| 1001 |
+
By the universal property of the localization there exists g′: 1 → Y that makes the left square
|
| 1002 |
+
commute. Hence, by the universal property of the cokernel there exists a unique ˜g: LT → Y
|
| 1003 |
+
such that the triangle commutes and we conclude that πLT is an L-equivalence.
|
| 1004 |
+
□
|
| 1005 |
+
However, localization functors of crossed modules do not behave like localization functors
|
| 1006 |
+
of groups. As explained above, in the category of groups (but also of topological spaces), the
|
| 1007 |
+
kernels of the localization morphisms are L-acyclic if and only if L is a nullification functor
|
| 1008 |
+
[14]. In the context of crossed modules, we do not have such a characterization of nullification
|
| 1009 |
+
functors.
|
| 1010 |
+
Remark 4.2. We know by [22, Proposition 4.6] that there are nullification functors, for
|
| 1011 |
+
example PXZ defined in Example 1.14, such that the kernels of their localization morphisms
|
| 1012 |
+
are not acyclic in general. Still, in the next proposition, we prove that if the kernel of the
|
| 1013 |
+
localization morphism is L-acyclic, as in Proposition 4.1, then the localization functor is a
|
| 1014 |
+
nullification.
|
| 1015 |
+
|
| 1016 |
+
ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
|
| 1017 |
+
15
|
| 1018 |
+
The cardinal in the next proof is chosen exactly as in Bousfield’s [5, Theorem 4.4] for
|
| 1019 |
+
spaces.
|
| 1020 |
+
Proposition 4.3. Let f : B → C be a morphism of crossed modules and Lf : XMod → XMod
|
| 1021 |
+
be a regular-epi localization functor.
|
| 1022 |
+
If the kernels of the localization morphisms are Lf-
|
| 1023 |
+
acyclic, then Lf is a nullifcation functor.
|
| 1024 |
+
Proof. Our strategy is to construct a crossed module A such that we can compare the functor
|
| 1025 |
+
Lf with the nullification functor PA (Definition 1.10) via a natural transformation ψ. We
|
| 1026 |
+
choose κ to be the first infinite ordinal greater than the number of chosen generators of B
|
| 1027 |
+
and C, i.e., generators of the groups B1, B2, C1 and C2. We construct the crossed module
|
| 1028 |
+
A := � Aα, where Aα are all the Lf-acyclic crossed modules with less than 2κ generators, see
|
| 1029 |
+
[5, Theorem 4.4].
|
| 1030 |
+
The first step of this proof is to show that if a crossed module X is Lf-local then it is A-local.
|
| 1031 |
+
Let φ be a morphism in Hom(A, X) and construct by naturality the following commutative
|
| 1032 |
+
diagram
|
| 1033 |
+
1 = LfA
|
| 1034 |
+
A
|
| 1035 |
+
X
|
| 1036 |
+
LfX
|
| 1037 |
+
Lfφ
|
| 1038 |
+
∼=
|
| 1039 |
+
φ
|
| 1040 |
+
By hypothesis, we have an isomorphism between X and LfX and by construction of A, we
|
| 1041 |
+
obtain LfA = 1. Therefore, φ factors through the zero object and hence Hom(A, X) = 1,
|
| 1042 |
+
which is equivalent to say that X is A-local. Now consider the PA-equivalence pT: T → PAT
|
| 1043 |
+
and the Lf-local object LfT. By the above observation, we have that LfT is A-local and by
|
| 1044 |
+
the universal property we have the desired morphism ψT
|
| 1045 |
+
T
|
| 1046 |
+
PAT
|
| 1047 |
+
LfT
|
| 1048 |
+
pT
|
| 1049 |
+
ℓT
|
| 1050 |
+
ψT
|
| 1051 |
+
We construct next the fiberwise A-nullification of the following exact sequence
|
| 1052 |
+
T
|
| 1053 |
+
LfT
|
| 1054 |
+
ker(ℓT)
|
| 1055 |
+
1
|
| 1056 |
+
1
|
| 1057 |
+
ℓT
|
| 1058 |
+
By assumption ker(ℓT) is Lf-acyclic, hence also PA-acyclic by design.
|
| 1059 |
+
This implies that
|
| 1060 |
+
ker
|
| 1061 |
+
�
|
| 1062 |
+
pT: ker(ℓT) → PAker(ℓT)
|
| 1063 |
+
�
|
| 1064 |
+
is equal to ker(ℓT). Hence, the exact sequence satisfies condi-
|
| 1065 |
+
tion (5) of Theorem 1.19 and we obtain the following fiberwise nullification
|
| 1066 |
+
T
|
| 1067 |
+
LfT
|
| 1068 |
+
ker(ℓT)
|
| 1069 |
+
T/ker(ℓT)
|
| 1070 |
+
LfT
|
| 1071 |
+
1
|
| 1072 |
+
1
|
| 1073 |
+
1
|
| 1074 |
+
1
|
| 1075 |
+
1
|
| 1076 |
+
pT
|
| 1077 |
+
f
|
| 1078 |
+
∼=
|
| 1079 |
+
ℓT
|
| 1080 |
+
|
| 1081 |
+
16
|
| 1082 |
+
OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
|
| 1083 |
+
Since f is a PA-equivalence, so is ℓT. Hence, we obtain a morphism ϕT in the following
|
| 1084 |
+
commutative diagram:
|
| 1085 |
+
T
|
| 1086 |
+
LfT
|
| 1087 |
+
PAT
|
| 1088 |
+
ψT
|
| 1089 |
+
ℓT
|
| 1090 |
+
pT
|
| 1091 |
+
ϕT
|
| 1092 |
+
By universal property, we can conclude that the two compositions of ψT and ϕT are isomorphic
|
| 1093 |
+
to identities so that LfT ∼= PAT. A similar argument shows the naturality of ψ and ϕ and
|
| 1094 |
+
therefore Lf is a nullification functor, namely PA.
|
| 1095 |
+
□
|
| 1096 |
+
5. Nullification functors and admissibility
|
| 1097 |
+
In the category of groups, the fact that kernels of localization morphisms are L-acyclic
|
| 1098 |
+
was fundamental to prove that nullification functors are admissible for the class of regular
|
| 1099 |
+
epimorphisms. This fact is not true in general for nullification functors in the category of
|
| 1100 |
+
crossed modules as shown in [22, Proposition 4.6], it is thus natural to ask whether nullifica-
|
| 1101 |
+
tion functors are admissible. We provide an affirmative answer in this final section, but let
|
| 1102 |
+
us first prove that our counter-example PXZ is admissible.
|
| 1103 |
+
Proposition 5.1. The nullification functor PXZ is admissible for the class of regular epimor-
|
| 1104 |
+
phisms.
|
| 1105 |
+
Proof. Theorem 5.1 in [15] implies that PXZ is admissible provided that the reflective category
|
| 1106 |
+
of PXZ-local objects is a Birkhoff subcategory, i.e., it is closed under regular quotients and
|
| 1107 |
+
subobjects. Here PXZ-local objects are crossed modules of the form A → 1 where A is any
|
| 1108 |
+
abelian group and the connecting homomorphism is the trivial homomorphism. Therefore it
|
| 1109 |
+
is clearly closed under subobjects. Moreover, the quotient of A → 1 by a normal subcrossed
|
| 1110 |
+
modules N → 1 is the crossed module A/N → 1 that is PXZ-local.
|
| 1111 |
+
□
|
| 1112 |
+
The remaining part of the section is devoted to the proof that all nullification functors are
|
| 1113 |
+
admissible for the class of regular epmorphisms. Consider a nullification functor PA where
|
| 1114 |
+
A = (A1, A2, ∂) is a crossed module. To show the admissibility, it is enough to prove that the
|
| 1115 |
+
pullback of an exact sequence of PA-local crossed modules along the coaugmentation map
|
| 1116 |
+
is PA-flat, in other words that the map f in the following commutative diagram of crossed
|
| 1117 |
+
modules is a PA-equivalence
|
| 1118 |
+
W
|
| 1119 |
+
Q
|
| 1120 |
+
PAN
|
| 1121 |
+
PAT
|
| 1122 |
+
PAQ
|
| 1123 |
+
PAN
|
| 1124 |
+
1
|
| 1125 |
+
1
|
| 1126 |
+
1
|
| 1127 |
+
1
|
| 1128 |
+
(1)
|
| 1129 |
+
pQ
|
| 1130 |
+
f
|
| 1131 |
+
h
|
| 1132 |
+
g
|
| 1133 |
+
where (1) is a pullback and g and h are regular epimorphisms. To do so we follow step by
|
| 1134 |
+
step the inductive construction of PAQ = colimQβ as presented in [22, Proposition 2.8], see
|
| 1135 |
+
also Proposition 1.11. For each successor ordinal β + 1 we obtain Qβ+1 from Qβ by killing all
|
| 1136 |
+
morphisms out of A so let us start with the construction of Q1 from Q0 = Q.
|
| 1137 |
+
|
| 1138 |
+
ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
|
| 1139 |
+
17
|
| 1140 |
+
Remark 5.2. Let ϕ : A → Q be a morphism of crossed modules. The crossed module Q1 is
|
| 1141 |
+
the quotient of Q by the normal closure KQ in Q of the image of
|
| 1142 |
+
ev:
|
| 1143 |
+
�
|
| 1144 |
+
ϕ∈Hom(A,Q)
|
| 1145 |
+
A = M −→ Q
|
| 1146 |
+
which is defined by ϕ on the copy of A indexed by ϕ. The idea behind the construction we
|
| 1147 |
+
perform next is that we do not need to kill all morphisms from A to the extension W in order
|
| 1148 |
+
to construct its nullification PAW, it is sufficient to take care of those factoring through Q.
|
| 1149 |
+
Beware that given an extension N → T → Q with N an A-acyclic crossed module, it is not
|
| 1150 |
+
true in general that all morphisms from A to T factor through Q.
|
| 1151 |
+
By definition of pQ we have the following equality for the composition pQ ◦ ϕ = 1 = h ��� 1
|
| 1152 |
+
as below. Therefore, any morphism from A to Q induces one from A to W:
|
| 1153 |
+
(7)
|
| 1154 |
+
PAT
|
| 1155 |
+
W
|
| 1156 |
+
Q
|
| 1157 |
+
PAQ
|
| 1158 |
+
A
|
| 1159 |
+
h
|
| 1160 |
+
pQ
|
| 1161 |
+
f
|
| 1162 |
+
g
|
| 1163 |
+
1
|
| 1164 |
+
ϕ
|
| 1165 |
+
∃!ψ
|
| 1166 |
+
We call ψ the morphism determined by ϕ and it makes sense now to consider KW, the normal
|
| 1167 |
+
closure in W of the image of M → W.
|
| 1168 |
+
Lemma 5.3. With the same notation as in Remark 5.2, we have an isomorphism KW ∼= KQ.
|
| 1169 |
+
Proof. Limits are computed levelwise for crossed modules, so the pullback W consists of
|
| 1170 |
+
compatible pairs (x, q) for x ∈ (PAT)i and q ∈ Qi for i = 1, 2. By construction of ψ we have
|
| 1171 |
+
ψ(a) = (1, ϕ(a)).
|
| 1172 |
+
Now, we compute the kernels of the cokernels of ev: M → Q and (1, ev): M → W. We
|
| 1173 |
+
have the two following descriptions of the kernels.
|
| 1174 |
+
KQ =
|
| 1175 |
+
�
|
| 1176 |
+
ev1(M1)Q2[ev2(M2)Q2, Q1], ev2(M2)Q2, ∂
|
| 1177 |
+
�
|
| 1178 |
+
KW =
|
| 1179 |
+
�
|
| 1180 |
+
(1, ev1)(M1)W2[(1, ev2)(M2)W2, W1], (1, ev2)(M2)W2, ∂′�
|
| 1181 |
+
The second group of the crossed module KW is the easier one:
|
| 1182 |
+
(1, ev2)(M2)W2 = {(t2,q2)(1, ev2(m2)) | (t2, q2) ∈ W2, m2 ∈ M2}
|
| 1183 |
+
= {(1, q2ev2(m2)) | q2 ∈ Q2, m2 ∈ M2}
|
| 1184 |
+
= 1 × ev2(M2)Q2.
|
| 1185 |
+
where the second equality holds since h is surjective. Via similar computations, we see that
|
| 1186 |
+
(1, ev1)(M1)W1 = 1 × ev1(M1)Q1, so we are left with proving that
|
| 1187 |
+
[(1, ev2)(M2)W2, W1] = 1 × [ev2(M2)Q2, Q1]
|
| 1188 |
+
|
| 1189 |
+
18
|
| 1190 |
+
OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
|
| 1191 |
+
This we do via the following equalities:
|
| 1192 |
+
[(1, ev2)(M2)2, W1] = [(1 × ev2(M2)Q2), W1]
|
| 1193 |
+
= {(1,x2)(t1, q1)(t1, q1)−1 | x2 ∈ ev2(M2)Q2, (t1, q1) ∈ W1}
|
| 1194 |
+
= {(1,x2 q1q−1
|
| 1195 |
+
1
|
| 1196 |
+
| x2 ∈ ev2(M2)Q2, q1 ∈ Q1}
|
| 1197 |
+
= 1 × [(ev2(M2)Q2, Q1]
|
| 1198 |
+
So finally we can conclude that KW = 1 × KQ, in particular KW and KQ are isomorphic.
|
| 1199 |
+
□
|
| 1200 |
+
Proposition 5.4. For any ordinal β, we have a commutative diagram
|
| 1201 |
+
PAT
|
| 1202 |
+
Wβ
|
| 1203 |
+
Qβ
|
| 1204 |
+
PAQ
|
| 1205 |
+
W
|
| 1206 |
+
Q
|
| 1207 |
+
(2)
|
| 1208 |
+
hβ
|
| 1209 |
+
g
|
| 1210 |
+
fβ
|
| 1211 |
+
pQ
|
| 1212 |
+
β
|
| 1213 |
+
h
|
| 1214 |
+
where (2) is a pullback square, the maps fβ : W → Wβ and pQ
|
| 1215 |
+
β : Q → Qβ are PA-equivalences,
|
| 1216 |
+
and hβ is a regular epimorphism.
|
| 1217 |
+
Proof. We prove it by induction. Since the nullification uses possibly a transfinite construc-
|
| 1218 |
+
tion we have to initialize the induction, but the case β = 0 holds by assumption, and then
|
| 1219 |
+
check the statement for successor and limit ordinals.
|
| 1220 |
+
The successor case Suppose that for an ordinal β the lemma is proved. Then we consider
|
| 1221 |
+
the kernels KW
|
| 1222 |
+
β and KQ
|
| 1223 |
+
β of the cokernels of the evaluation maps ev : �
|
| 1224 |
+
Hom(A,Qβ) A −→ Qβ and
|
| 1225 |
+
ev : �
|
| 1226 |
+
Hom(A,Qβ) A −→ Wβ respectively. They fit in the following diagram of exact rows:
|
| 1227 |
+
Wβ+1
|
| 1228 |
+
Wβ
|
| 1229 |
+
Qβ
|
| 1230 |
+
Qβ+1
|
| 1231 |
+
KW
|
| 1232 |
+
β
|
| 1233 |
+
KQ
|
| 1234 |
+
β
|
| 1235 |
+
(2)
|
| 1236 |
+
pQ
|
| 1237 |
+
(β→β+1)
|
| 1238 |
+
f(β→β+1)
|
| 1239 |
+
hβ
|
| 1240 |
+
∼=
|
| 1241 |
+
iW
|
| 1242 |
+
iQ
|
| 1243 |
+
∃!hβ+1
|
| 1244 |
+
Lemma 5.3 applies here and gives us the isomorphism between KW
|
| 1245 |
+
β and KQ
|
| 1246 |
+
β . The composition
|
| 1247 |
+
pQ
|
| 1248 |
+
(β→β+1) ◦ hβ ◦ iW : KW
|
| 1249 |
+
β → Qβ+1
|
| 1250 |
+
is zero by commutativity, yielding by the universal property of the cokernel the morphism
|
| 1251 |
+
hβ+1: Wβ+1 → Qβ+1. The isomorphism between the kernels implies that (2) is a pullback (see
|
| 1252 |
+
Proposition 1.5). By induction hypothesis hβ is a regular epimorphism and the composition
|
| 1253 |
+
pQ
|
| 1254 |
+
(β→β+1) ◦ hβ : Wβ → Qβ+1 is also a regular epimorphism, hence so is hβ+1. We show now
|
| 1255 |
+
that pQ
|
| 1256 |
+
(β→β+1) and f(β→β+1) are PA-equivalences.
|
| 1257 |
+
|
| 1258 |
+
ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
|
| 1259 |
+
19
|
| 1260 |
+
For the first one we write the cokernel Qβ+1 as the pushout along the evaluation morphism:
|
| 1261 |
+
1
|
| 1262 |
+
� A
|
| 1263 |
+
Qβ
|
| 1264 |
+
Qβ+1
|
| 1265 |
+
pQ
|
| 1266 |
+
(β→β+1)
|
| 1267 |
+
1
|
| 1268 |
+
ϕ
|
| 1269 |
+
inc
|
| 1270 |
+
where the coproduct is taken over Hom(A, Q). The trivial map A → 1 is a PA-equivalence,
|
| 1271 |
+
thus so is the pushout pQ
|
| 1272 |
+
(β→β+1) : Qβ → Qβ+1 by Lemma 1.8 (1). By composing with the
|
| 1273 |
+
PA-equivalence Q → Qβ we see that pQ
|
| 1274 |
+
β+1 : Q → Qβ+1 is a PA-equivalence as well. The same
|
| 1275 |
+
argument shows that fβ+1 : W → Wβ+1 is also a PA-equivalence. By the universal property
|
| 1276 |
+
of the localization, we obtain two maps, one from Wβ+1 to PAT and the other from Qβ+1 to
|
| 1277 |
+
PAQ such that (2) commutes:
|
| 1278 |
+
PAT
|
| 1279 |
+
Wβ+1
|
| 1280 |
+
Qβ+1
|
| 1281 |
+
PAQ
|
| 1282 |
+
W
|
| 1283 |
+
Q
|
| 1284 |
+
(2)
|
| 1285 |
+
(1)
|
| 1286 |
+
hβ+1
|
| 1287 |
+
g
|
| 1288 |
+
fβ+1
|
| 1289 |
+
pQ
|
| 1290 |
+
β+1
|
| 1291 |
+
h
|
| 1292 |
+
f
|
| 1293 |
+
pQ
|
| 1294 |
+
Since (1) and the outer rectangle are pullbacks and hβ+1 is a regular epimorphism, we can
|
| 1295 |
+
conclude by Proposition 4.1.4 in [2] that (2) is a pullback.
|
| 1296 |
+
The limit case To prove the statement for a general transfinite induction we need to prove
|
| 1297 |
+
it for a limit ordinal as well. Let γ be a limit ordinal and
|
| 1298 |
+
Qγ = colimα<γQα
|
| 1299 |
+
Wγ = colimα<γWα
|
| 1300 |
+
We have shown that pQ
|
| 1301 |
+
(α−1→α) : Qα−1 → Qα is a PA-equivalence for all α < γ. Hence the
|
| 1302 |
+
composition pQ
|
| 1303 |
+
α : Q → Qα is also a PA-equivalence and Lemma 1.8 (3), implies that pQ
|
| 1304 |
+
γ : Q →
|
| 1305 |
+
Qγ is a PA-equivalence. The same reasoning holds for fγ : W → Wγ. The existence of the
|
| 1306 |
+
maps f : W → PAT and pQ : Q → PAQ give us two maps Wγ → PAT and Qγ → PAQ as
|
| 1307 |
+
shown on the diagram below (8).
|
| 1308 |
+
The nullification PAQ is constructed as filtered colimit of the Qα, see Proposition 1.11.
|
| 1309 |
+
Filtered colimits commutes with finite limits, in particular with kernels. Therefore
|
| 1310 |
+
KQ
|
| 1311 |
+
γ := ker(Q → Qγ) ∼= colimα<γker(Q → Qα)
|
| 1312 |
+
where ker(Q → Qα) will be denoted KQ
|
| 1313 |
+
α. The category XMod is a variety of algebras (also
|
| 1314 |
+
called algebra category of fixed type). Hence, by [21, Proposition IX.1.2], we know that the
|
| 1315 |
+
forgetful functor U : XMod → Set creates filtered colimits. In other words we have :
|
| 1316 |
+
U(colimα<γKQ
|
| 1317 |
+
α) = colimα<γUKQ
|
| 1318 |
+
α =
|
| 1319 |
+
�
|
| 1320 |
+
α<γ
|
| 1321 |
+
UKQ
|
| 1322 |
+
α
|
| 1323 |
+
where the colimit in the first term lies in the category of crossed modules and the second
|
| 1324 |
+
colimit in the category of sets. This means that we know the structure of colimα<γKQ
|
| 1325 |
+
α as a
|
| 1326 |
+
|
| 1327 |
+
20
|
| 1328 |
+
OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
|
| 1329 |
+
set. Now since KQ
|
| 1330 |
+
α ∼= KW
|
| 1331 |
+
α for all α < γ and KQ
|
| 1332 |
+
γ can be written as a union of KQ
|
| 1333 |
+
α (as well as
|
| 1334 |
+
KW
|
| 1335 |
+
γ ) we conclude that KQ
|
| 1336 |
+
γ ∼= KW
|
| 1337 |
+
γ . We consider now the diagram:
|
| 1338 |
+
(8)
|
| 1339 |
+
PAT
|
| 1340 |
+
Wγ
|
| 1341 |
+
Qγ
|
| 1342 |
+
PAQ
|
| 1343 |
+
W
|
| 1344 |
+
Q
|
| 1345 |
+
(1)
|
| 1346 |
+
(2)
|
| 1347 |
+
hγ
|
| 1348 |
+
g
|
| 1349 |
+
fγ
|
| 1350 |
+
pQ
|
| 1351 |
+
γ
|
| 1352 |
+
h
|
| 1353 |
+
f
|
| 1354 |
+
pQ
|
| 1355 |
+
Since the kernels of fγ and pQ
|
| 1356 |
+
γ are isomorphic we deduce that (2) is a pullback.
|
| 1357 |
+
As we
|
| 1358 |
+
have shown that every map pQ
|
| 1359 |
+
(α→α+1) : Qα → Qα+1 is a regular epimorphism, the morphism
|
| 1360 |
+
pQ
|
| 1361 |
+
α : Q → Qα is also a regular epimorphism, being a composition of regular epimorphisms in
|
| 1362 |
+
a regular category. The colimit functor being a left adjoint functor, it preserves colimits and
|
| 1363 |
+
in particular cokernels. In a pointed protomodular category, any regular epimorphism is a
|
| 1364 |
+
cokernel, therefore
|
| 1365 |
+
pQ
|
| 1366 |
+
γ : Q → Qγ
|
| 1367 |
+
is a regular epimorphism. The composition pQ
|
| 1368 |
+
γ ◦ g is also a regular epimorphism, and we
|
| 1369 |
+
conclude that so is hγ. With the same argument as for the successor step, we get that (1) is
|
| 1370 |
+
a pullback, which ends the induction proof.
|
| 1371 |
+
□
|
| 1372 |
+
We are ready now for the main result of this section.
|
| 1373 |
+
Theorem 5.5. Let A be any crossed module. The nullification functor PA is admissible for
|
| 1374 |
+
the class of regular epimorphisms.
|
| 1375 |
+
Proof. Let W be the pullback of a regular epimorphism h: PAT → PAQ between PA-local
|
| 1376 |
+
crossed modules along the localization morphism pQ : Q → PAQ. Let λ be the ordinal such
|
| 1377 |
+
that Qλ ∼= PAQ (see Proposition 1.11). By Proposition 5.4 we have a diagram:
|
| 1378 |
+
PAT
|
| 1379 |
+
Wλ
|
| 1380 |
+
Qλ
|
| 1381 |
+
PAQ
|
| 1382 |
+
W
|
| 1383 |
+
Q
|
| 1384 |
+
(2)
|
| 1385 |
+
∼=
|
| 1386 |
+
hλ
|
| 1387 |
+
g
|
| 1388 |
+
h
|
| 1389 |
+
fλ
|
| 1390 |
+
pQ
|
| 1391 |
+
λ
|
| 1392 |
+
where the outer rectangle is a pullback, the morphisms fλ and pQ
|
| 1393 |
+
λ are PA-equivalences, and
|
| 1394 |
+
(2) is a pullback. Since isomorphisms are stable under pullbacks, we have an isomorphism
|
| 1395 |
+
Wλ ∼= PAT. We have thus proved that the map f : W → PAT is a PA-equivalence, which
|
| 1396 |
+
means that the functor PA is admissible.
|
| 1397 |
+
□
|
| 1398 |
+
In this article we have focused on regular-epi localization functors because they appear nat-
|
| 1399 |
+
urally when studying conditional flatness and admissibility in the category of groups, crossed
|
| 1400 |
+
modules, or more general semi-abelian categories. We conclude this section by observing that
|
| 1401 |
+
the notion of conditional flatness can also be defined for non regular-epi localization functor.
|
| 1402 |
+
The next proposition gives an example of such a localization functor which is conditionally
|
| 1403 |
+
|
| 1404 |
+
REFERENCES
|
| 1405 |
+
21
|
| 1406 |
+
flat. Let us stress that we will not a priori have an equivalence with admissiblity, as was
|
| 1407 |
+
the case for regular-epi localization functors by Theorem 3.4. In the proof of the following
|
| 1408 |
+
proposition we have thus to verify the more general condition for conditional flatness, as in
|
| 1409 |
+
Definition 2.3.
|
| 1410 |
+
Proposition 5.6. There exists a non regular-epi localization functor which is nevertheless
|
| 1411 |
+
conditionally flat and therefore admissible for the class of regular epimorphisms.
|
| 1412 |
+
Proof. We consider the functor I defined in Example 1.16 which sends any crossed module
|
| 1413 |
+
(N1, N2, ∂N) to (N2, N2, IdN2). This functor is not regular-epi because if we consider a crossed
|
| 1414 |
+
module for which the connecting morphism is not surjective then the localization morphism
|
| 1415 |
+
will not be a regular epimorphism.
|
| 1416 |
+
We prove now that I is conditional flat. Let
|
| 1417 |
+
T
|
| 1418 |
+
Q
|
| 1419 |
+
N
|
| 1420 |
+
1
|
| 1421 |
+
1
|
| 1422 |
+
κ
|
| 1423 |
+
α
|
| 1424 |
+
be any exact sequence of crossed modules.
|
| 1425 |
+
We see that I((N1, N2, ∂N)) = (N2, N2, IdN2)
|
| 1426 |
+
is a normal subcrossed module of (T2, T2, IdT2) = I((T1, T2, ∂T) and that I((Q1, Q2, ∂Q)) =
|
| 1427 |
+
(Q2, Q2, IdQ2) is the cokernel of κ: N → T. Therefore any exact sequence of crossed modules
|
| 1428 |
+
is I-flat. In particular any pullback along any morphism of crossed modules of an I-flat exact
|
| 1429 |
+
sequence is I-flat, hence I is conditionally flat.
|
| 1430 |
+
□
|
| 1431 |
+
References
|
| 1432 |
+
[1]
|
| 1433 |
+
A. J. Berrick and E. Dror Farjoun. “Fibrations and nullifications”. In: Israel J. Math.
|
| 1434 |
+
135 (2003), pp. 205–220.
|
| 1435 |
+
[2]
|
| 1436 |
+
F. Borceux and D. Bourn. Mal’cev, protomodular, homological and semi-abelian cate-
|
| 1437 |
+
gories. Vol. 566. Springer Science & Business Media, 2004.
|
| 1438 |
+
[3]
|
| 1439 |
+
D. Bourn. “Normalization Equivalence, Kernel Equivalence, and Affine Categories”. In:
|
| 1440 |
+
2006, pp. 43–62.
|
| 1441 |
+
[4]
|
| 1442 |
+
A. K. Bousfield. “Constructions of factorization systems in categories”. In: J. Pure
|
| 1443 |
+
Appl. Algebra 9.2 (1976), pp. 207–220.
|
| 1444 |
+
[5]
|
| 1445 |
+
A. K. Bousfield. “Homotopical localizations of spaces”. In: Amer. J. Math. 119.6 (1997),
|
| 1446 |
+
pp. 1321–1354. issn: 0002-9327. url: http://muse.jhu.edu/journals/american_journal_of_mathematics/v119/119.6bousfield.pdf.
|
| 1447 |
+
[6]
|
| 1448 |
+
R. Brown and P. Higgins. “On the connection between the second relative homotopy
|
| 1449 |
+
groups of some related spaces”. In: Proceedings of The London Mathematical Society
|
| 1450 |
+
(1978), pp. 193–212.
|
| 1451 |
+
[7]
|
| 1452 |
+
R. Brown and C. Spencer. “G-groupoids, crossed modules and the fundamental groupoid
|
| 1453 |
+
of a topological group”. In: Indag. Math. (Proceedings) 79.4 (1976), pp. 296–302.
|
| 1454 |
+
[8]
|
| 1455 |
+
C. Casacuberta. “Anderson localization from a modern point of view”. In: Contemp.
|
| 1456 |
+
Math. 181 (1995), pp. 35–46.
|
| 1457 |
+
[9]
|
| 1458 |
+
C. Casacuberta. “On structures preserved by idempotent transformations of groups
|
| 1459 |
+
and homotopy types”. In: Crystallographic groups and their generalizations (Kortrijk,
|
| 1460 |
+
1999). Vol. 262. Contemp. Math. Amer. Math. Soc., Providence, RI, 2000, pp. 39–68.
|
| 1461 |
+
[10]
|
| 1462 |
+
C. Casacuberta and A. Descheemaeker. “Relative group completions”. In: Journal of
|
| 1463 |
+
Algebra 285.2 (2005), pp. 451–469.
|
| 1464 |
+
[11]
|
| 1465 |
+
C. Cassidy, M. H´ebert, and G. M. Kelly. “Reflective subcategories, localizations and
|
| 1466 |
+
factorization systems”. In: J. Austral. Math. Soc. Ser. A 38.3 (1985), pp. 287–329.
|
| 1467 |
+
[12]
|
| 1468 |
+
T. Everaert, M. Gran, and T. Van der Linden. “Higher Hopf formulae for Homology
|
| 1469 |
+
via Galois Theory”. In: Adv. Math. 217 (2008), pp. 2231–2267.
|
| 1470 |
+
|
| 1471 |
+
22
|
| 1472 |
+
REFERENCES
|
| 1473 |
+
[13]
|
| 1474 |
+
E. Dror Farjoun. Cellular spaces, null spaces and homotopy localization. Vol. 1622.
|
| 1475 |
+
Lecture Notes in Mathematics. Springer-Verlag, Berlin, 1996, pp. xiv+199.
|
| 1476 |
+
[14]
|
| 1477 |
+
E. Dror Farjoun and J. Scherer. “Conditionally flat functors on spaces and groups”. In:
|
| 1478 |
+
Collect. Math. 66.1 (2015), pp. 149–160.
|
| 1479 |
+
[15]
|
| 1480 |
+
M. Gran and J. Scherer. “Conditional flatness and admissibility of a reflector in a
|
| 1481 |
+
semi-abelian category”. In: preprint (2022), 15 pages.
|
| 1482 |
+
[16]
|
| 1483 |
+
Philip S. Hirschhorn. Model categories and their localizations. Vol. 99. Mathemati-
|
| 1484 |
+
cal Surveys and Monographs. American Mathematical Society, Providence, RI, 2003,
|
| 1485 |
+
pp. xvi+457.
|
| 1486 |
+
[17]
|
| 1487 |
+
G. Janelidze and G. M. Kelly. “Galois theory and a general notion of central ex-
|
| 1488 |
+
tension”. In: J. Pure Appl. Algebra 97.2 (1994), pp. 135–161. issn: 0022-4049. doi:
|
| 1489 |
+
10.1016/0022-4049(94)90057-4. url: https://doi.org/10.1016/0022-4049(94)90057-4.
|
| 1490 |
+
[18]
|
| 1491 |
+
G. Janelidze, L. M´arki, and W. Tholen. “Semi-abelian categories”. In: J. Pure Appl.
|
| 1492 |
+
Algebra 168 (2002), pp. 367–386.
|
| 1493 |
+
[19]
|
| 1494 |
+
M. Ladra and A.R. Grandjean. “Crossed modules and homology”. In: Journal of Pure
|
| 1495 |
+
and Applied Algebra 95.1 (1994), pp. 41–55.
|
| 1496 |
+
[20]
|
| 1497 |
+
M. Ladra, M.P. L´opez L´opez, and E. Rodeja. “Epimorphisms of crossed modules”. In:
|
| 1498 |
+
Southeast Asian Bulletin of Mathematics 28 (Jan. 2004).
|
| 1499 |
+
[21]
|
| 1500 |
+
S. Mac Lane. Categories for the Working Mathematicians. 2nd ed. Springer, 1997.
|
| 1501 |
+
[22]
|
| 1502 |
+
O. Monjon, J. Scherer, and F. Sterck. Non-existence of fiberwise localization for crossed
|
| 1503 |
+
modules. arxiv:2207.09702, to appear in Israel J. Math. 2022.
|
| 1504 |
+
[23]
|
| 1505 |
+
K. Norrie. “Actions and automorphisms of crossed modules”. In: Bulletin de la Soci´et´e
|
| 1506 |
+
Math´ematique de France 118.2 (1990), pp. 129–146.
|
| 1507 |
+
[24]
|
| 1508 |
+
K. Norrie. “Crossed modules and analogues of group theorems”. PhD thesis. King’s
|
| 1509 |
+
College, University of London, 1987.
|
| 1510 |
+
[25]
|
| 1511 |
+
J. H. C. Whitehead. “Combinatorial homotopy II”. In: Bull. Amer. Math. Soc 55 (1949),
|
| 1512 |
+
pp. 453–496.
|
| 1513 |
+
Mathematics, Ecole Polytechnique F´ed´erale de Lausanne, EPFL, Switzerland
|
| 1514 |
+
Email address: [email protected]
|
| 1515 |
+
Mathematics, Ecole Polytechnique F´ed´erale de Lausanne, EPFL, Switzerland
|
| 1516 |
+
Email address: [email protected]
|
| 1517 |
+
Institut de Recherche en Math´ematique et Physique, Universit´e catholique de Louvain,
|
| 1518 |
+
Belgium
|
| 1519 |
+
Email address:
|
| 1520 | |
| 1521 |
+
|
JdAyT4oBgHgl3EQffviy/content/tmp_files/2301.00347v1.pdf.txt
ADDED
|
@@ -0,0 +1,692 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
JWST high redshift galaxy observations have a strong tension with Planck CMB
|
| 2 |
+
measurements
|
| 3 |
+
Deng Wang∗ and Yizhou Liu
|
| 4 |
+
National Astronomical Observatories, Chinese Academy of Sciences, Beijing, 100012, China
|
| 5 |
+
JWST high redshift galaxy observations predict a higher star formation efficiency that the stan-
|
| 6 |
+
dard cosmology, which poses a new tension to ΛCDM. We find that the situation is worse than
|
| 7 |
+
expected.
|
| 8 |
+
The true situation is that the Planck CMB measurement has a strong tension with
|
| 9 |
+
JWST high redshift galaxy observations. Specifically, we make a trial to alleviate this tension by
|
| 10 |
+
considering alternative cosmological models including dark matter-baryon interaction, f(R) gravity
|
| 11 |
+
and dynamical dark energy. Within current cosmological constraints from Planck-2018 CMB data,
|
| 12 |
+
we find that these models all fail to explain such a large tension. A possible scenario to escape
|
| 13 |
+
from cosmological constraints is the extended Press-Schechter formalism, where we consider the
|
| 14 |
+
local environmental effect on the early formation of massive galaxies. Interestingly, we find that an
|
| 15 |
+
appropriate value of nonlinear environmental overdensity of a high redshift halo can well explain
|
| 16 |
+
this tension.
|
| 17 |
+
I.
|
| 18 |
+
INTRODUCTION
|
| 19 |
+
Since the cosmic acceleration is discovered by Type Ia supernovae (SNe Ia) [1, 2] and confirmed by two independent
|
| 20 |
+
probes cosmic microwave background (CMB) [3–5] and baryon acoustic oscillations (BAO) [6, 7], the standard 6-
|
| 21 |
+
parameter cosmological model, Λ-cold dark matter (ΛCDM) has achieved great success in characterizing the physical
|
| 22 |
+
phenomena across multiple scales at the background and perturbation levels. However, the validity of ΛCDM is
|
| 23 |
+
challenged by various kinds of new observations for a long time, and consequently new puzzles emerge such as the
|
| 24 |
+
so-called Hubble constant (H0) tension (see [8, 9] for recent reviews). It is noteworthy that, so far, we can not study
|
| 25 |
+
effectively the correctness of ΛCDM around redshift z ∼ 10, since currently mainstream probes BAO and SNe Ia
|
| 26 |
+
can not give direct observations at high redshifts. The lack of stable high redshift observations will prevent us from
|
| 27 |
+
testing ΛCDM more completely during the early stage of the evolution of our universe.
|
| 28 |
+
Very excitingly, the recent released high redshift galaxy observations [10–13] in the range z ∈ [7, 11] by JWST,
|
| 29 |
+
which contains a population of surprisingly massive galaxy candidates with stellar masses of order of 109M⊙, can
|
| 30 |
+
help explore whether ΛCDM is valid at high redshifts.
|
| 31 |
+
In the literature, Refs.[10, 11, 14, 15] have reported the
|
| 32 |
+
cumulative stellar mass density (CSMD) estimated from early JWST data is higher than that predicted by ΛCDM
|
| 33 |
+
within z ∈ [7, 11]. Ref.[16] points out that dynamical dark energy (DDE) can explain this anomalous signal and the
|
| 34 |
+
corresponding constraint on DDE is displayed. Subsequently, if the nature of dark matter (DM) is fuzzy, this high
|
| 35 |
+
SMD can be recovered [17]. Furthermore, Ref.[18] discusses under which circumstances primordial non-Gaussianity
|
| 36 |
+
can act as a solution.
|
| 37 |
+
Since these high redshift galaxy observations from JWST have important implications on cosmology and astro-
|
| 38 |
+
physics, we attempt to probe whether early JWST data indicates any possible signal of new physics. Specifically, we
|
| 39 |
+
study three classes of beyond ΛCDM cosmological models, i.e., DM-baryon interaction (DMBI), modified gravity (MG)
|
| 40 |
+
and DDE. In addition, we consider the case of the extended halo mass function (HMF). We find that Within current
|
| 41 |
+
cosmological constraints from Planck-2018 CMB obervations, these three models all fail to explain this large tension.
|
| 42 |
+
A possibly successful scenario to escape from cosmological constraints is the extended Press-Schechter formalism.
|
| 43 |
+
This study is outlined in the following manner. In the next section, we introduce the basic formula of CSMD. In
|
| 44 |
+
Section III, we review briefly the alternative cosmological models and extended Press-Schechter HMF. In Section IV,
|
| 45 |
+
numerical results are displayed. The discussions and conclusions are presented in the final section.
|
| 46 |
+
II.
|
| 47 |
+
BASIC FORMULA
|
| 48 |
+
As shown in Ref.[10], the CSMD from early JWST data has a large excess relative to that predicted by ΛCDM.
|
| 49 |
+
To explain this excess, we shall briefly introduce the basic formula of the cumulative SMD. The HMF for a given
|
| 50 |
+
∗Electronic address: [email protected]
|
| 51 |
+
arXiv:2301.00347v1 [astro-ph.CO] 1 Jan 2023
|
| 52 |
+
|
| 53 |
+
2
|
| 54 |
+
cosmological model reads as
|
| 55 |
+
dn
|
| 56 |
+
dM = F(ν) ρm
|
| 57 |
+
M 2
|
| 58 |
+
����
|
| 59 |
+
d ln σ
|
| 60 |
+
d ln M
|
| 61 |
+
���� ,
|
| 62 |
+
(1)
|
| 63 |
+
where the function F(ν) for the Press-Schechter HMF [19] is expressed as
|
| 64 |
+
F(ν) =
|
| 65 |
+
�
|
| 66 |
+
2
|
| 67 |
+
π νe− ν2
|
| 68 |
+
2 ,
|
| 69 |
+
(2)
|
| 70 |
+
and ρm denotes the average background matter density, M the halo mass, σ the variance of smoothed linear matter
|
| 71 |
+
density field and reads as
|
| 72 |
+
σ2(R) =
|
| 73 |
+
1
|
| 74 |
+
2π2
|
| 75 |
+
� ∞
|
| 76 |
+
0
|
| 77 |
+
k2P(k)W 2(kR)dk,
|
| 78 |
+
(3)
|
| 79 |
+
where k is the comoving wavenumber, P(k) the matter power spectrum, W(kR) = 3(sin kR − kR cos kR)/(kR)3 the
|
| 80 |
+
Fourier transformation of a spherical top-hat filter with radius R = [3M/(4π¯ρ0)]1/3, ν = δc/[D(z) σ] [20] (δc = 1.686
|
| 81 |
+
is the critical collapsed density) and D(z) = g(z)/[g(0)(1 + z)] the linear growth factor for a specific cosmological
|
| 82 |
+
model, where g(z) for ΛCDM reads as
|
| 83 |
+
g(z) = 5
|
| 84 |
+
2Ωm(z)
|
| 85 |
+
�
|
| 86 |
+
Ωm(z)
|
| 87 |
+
4
|
| 88 |
+
7 − ΩΛ(z) +
|
| 89 |
+
�
|
| 90 |
+
1 + Ωm(z)
|
| 91 |
+
2
|
| 92 |
+
� �
|
| 93 |
+
1 + ΩΛ(z)
|
| 94 |
+
70
|
| 95 |
+
��−1
|
| 96 |
+
,
|
| 97 |
+
(4)
|
| 98 |
+
where Ωm(z) and ΩΛ(z) are energy densities of matter and dark energy (DE) at a given redshift, respectively.
|
| 99 |
+
An effective quantity to study the validity of the ΛCDM model is the CSMD ρ⋆, which can be characterized by a
|
| 100 |
+
fraction of baryon mass contained within a given DM halo above a certain mass scale M⋆ and reads as
|
| 101 |
+
ρ⋆(> M⋆, z) = ϵfb
|
| 102 |
+
� z2
|
| 103 |
+
z1
|
| 104 |
+
� ∞
|
| 105 |
+
M⋆
|
| 106 |
+
ϵfb
|
| 107 |
+
dn
|
| 108 |
+
dM MdM dV
|
| 109 |
+
dz
|
| 110 |
+
dz
|
| 111 |
+
V (z1, z2),
|
| 112 |
+
(5)
|
| 113 |
+
where ϵ is the star formation efficiency, fb the baryon fraction and V (z1, z2) the comoving volume in the redshift range
|
| 114 |
+
z ∈ [z1, z2].
|
| 115 |
+
III.
|
| 116 |
+
ALTERNATIVE MODELS
|
| 117 |
+
A.
|
| 118 |
+
Dark matter-baryon interaction
|
| 119 |
+
Up to now, the standard cosmological paradigm indicates that DM is cold, collisionless and only participates in
|
| 120 |
+
gravitational interactions [9]. In light of the lack of experimental detections of DM and emergent cosmological tensions
|
| 121 |
+
in recent years, the scenario beyond the standard DM assumption becomes more and more attractive. An interesting
|
| 122 |
+
category is interactions between DM and the Standard Model particles such as baryons, photons and neutrinos. In
|
| 123 |
+
this study, we consider the case of DMBI.
|
| 124 |
+
The interaction between DM and baryons produces a momentum exchange proportional to momentum transfer
|
| 125 |
+
cross section, which can be shown as
|
| 126 |
+
σT =
|
| 127 |
+
�
|
| 128 |
+
(1 − cos θ)dΩ d¯σ
|
| 129 |
+
dΩ,
|
| 130 |
+
(6)
|
| 131 |
+
In the weakly coupled theory, σT can just depend on even powers of DM-baryon relative velocity v and, in general, it is
|
| 132 |
+
a power law function of v. Here we adopt σT = σDM−bvnb and denote the DMBI cross section as σDM−b. Specifically,
|
| 133 |
+
we study the mini-charged DM (DM particle with a fractional electric charge) corresponding to the case of nb = −4,
|
| 134 |
+
which has been used to explain the anomalous 21 cm signal from EDGES [21].
|
| 135 |
+
For this model, we introduce two basic assumptions: (i) DM and baryons obey the Maxwell velocity distribution; (ii)
|
| 136 |
+
both species are non-relativistic. As a consequence, the Euler equation of DM can obtain an extra term ΓDM−b(θb −
|
| 137 |
+
θDM), where ΓDM−b is the conformal DM-baryon momentum exchange rate, and θDM and θb represent the velocities
|
| 138 |
+
of DM and baryons, respectively. At leading order, ΓDM−b is expressed in terms of DM bulk velocity and reads as
|
| 139 |
+
[22]
|
| 140 |
+
ΓDM−b = aρbfHeσDM−bc−4
|
| 141 |
+
mDM + mb
|
| 142 |
+
� TDM
|
| 143 |
+
mDM
|
| 144 |
+
+ Tb
|
| 145 |
+
mb
|
| 146 |
+
+ V 2
|
| 147 |
+
RMS
|
| 148 |
+
3
|
| 149 |
+
�−1.5
|
| 150 |
+
,
|
| 151 |
+
(7)
|
| 152 |
+
|
| 153 |
+
3
|
| 154 |
+
where a is the scale factor, ρb the average baryon energy density, fHe ≃ 0.76, c−4 = 0.27 the integration constant
|
| 155 |
+
(see [22, 23] for details), and Ti and mi denote the temperature and average mass of species i, respectively. The bulk
|
| 156 |
+
velocity dispersion can be shown as [24]
|
| 157 |
+
V 2
|
| 158 |
+
RMS =
|
| 159 |
+
�
|
| 160 |
+
�
|
| 161 |
+
�
|
| 162 |
+
10−8,
|
| 163 |
+
z > 103
|
| 164 |
+
(1 + z)2
|
| 165 |
+
10
|
| 166 |
+
,
|
| 167 |
+
z ≤ 103 .
|
| 168 |
+
(8)
|
| 169 |
+
The interaction between DM and baryons can produce the energy and momentum exchange. It is clear that DMBI
|
| 170 |
+
reduces to ΛCDM when σDM−b = 0. There is a possibility that DMBI can increase the baryon fraction and conse-
|
| 171 |
+
quently give a large star formation efficiency. This indicates that DMBI can act as a potential solution to the recent
|
| 172 |
+
puzzle from JWST data.
|
| 173 |
+
B.
|
| 174 |
+
Modified gravity
|
| 175 |
+
Since general relativity (GR) can not explain current cosmic expansion in the absence of cosmological constant, the
|
| 176 |
+
modifications in the gravity sector on cosmic scales has inspired a broad interest in order to describe this anomalous
|
| 177 |
+
phenomenon. Here we shall consider the simplest extension to GR, f(R) gravity, where the modification is a function
|
| 178 |
+
of Ricci scalar R. f(R) gravity was firstly introduced by Buchdahl [25] in 1970 and more detailed information can be
|
| 179 |
+
found in recent reviews [26, 27]. Its action is written as
|
| 180 |
+
S =
|
| 181 |
+
�
|
| 182 |
+
d4x√−g
|
| 183 |
+
�f(R)
|
| 184 |
+
2
|
| 185 |
+
+ Lm
|
| 186 |
+
�
|
| 187 |
+
,
|
| 188 |
+
(9)
|
| 189 |
+
where Lm and g denote the matter Lagrangian and the trace of a given metric, respectively.
|
| 190 |
+
For the late-time universe, a viable f(R) gravity scenario should explain the cosmic expansion, pass the local
|
| 191 |
+
gravity test and satisfy the stability conditions. To investigate whether MG can explain the high redshift galaxy
|
| 192 |
+
data from JWST, in this study, we consider the so-called Hu-Sawicki f(R) model (hereafter HS model) [28], which is
|
| 193 |
+
characterized by
|
| 194 |
+
f(R) = R −
|
| 195 |
+
2ΛR¯n
|
| 196 |
+
R¯n + µ2¯n ,
|
| 197 |
+
(10)
|
| 198 |
+
where ¯n and µ are two free parameters characterizing this model. By taking R ≫ µ2, the approximate f(R) function
|
| 199 |
+
can be expressed as
|
| 200 |
+
f(R) = R − 2Λ − fR0
|
| 201 |
+
¯n
|
| 202 |
+
R¯n+1
|
| 203 |
+
0
|
| 204 |
+
R¯n ,
|
| 205 |
+
(11)
|
| 206 |
+
where R0 is the present-day value of Ricci scalar and fR0 = −2Λµ2/R2
|
| 207 |
+
0. Note that HS f(R) gravity reduces to ΛCDM
|
| 208 |
+
when fR0 = 0.
|
| 209 |
+
An intriguing question is whether recent JWST anomaly is a signal of beyond GR. We will carefully analyze this
|
| 210 |
+
possibility in this study.
|
| 211 |
+
C.
|
| 212 |
+
Dynamical dark energy
|
| 213 |
+
Although Ref.[16] has claimed that DDE can explain the large CSMD from JWST, we think their method is
|
| 214 |
+
inappropriate and consequently their result maybe incorrect. We need to reanalyze the case of DDE.
|
| 215 |
+
As is well known, the equation of state (EoS) of DE w = −1 in the standard cosmological model. However, starting
|
| 216 |
+
from observations, the doubt about the correctness of ΛCDM stimulates the community to explore whether DE is
|
| 217 |
+
dynamical over time or not. In general, one depicts the DDE model by a simple Taylor expansion of DE EoS, i.e.,
|
| 218 |
+
ω(a) = ω0 + (1 − a)ωa [29, 30], where ωa characterizes the time evolution of DE EoS. The dimensionless Hubble
|
| 219 |
+
parameter is expressed as
|
| 220 |
+
EDDE(z) =
|
| 221 |
+
�
|
| 222 |
+
Ωm(1 + z)3 + (1 − Ωm)(1 + z)3(1+ω0+ωa)e
|
| 223 |
+
−3ωaz
|
| 224 |
+
1+z
|
| 225 |
+
� 1
|
| 226 |
+
2
|
| 227 |
+
.
|
| 228 |
+
(12)
|
| 229 |
+
Note that this model is a two-parameter extension to ΛCDM and it reduces to ΛCDM when ω0 = −1 and ωa = 0.
|
| 230 |
+
|
| 231 |
+
4
|
| 232 |
+
D.
|
| 233 |
+
Extended halo mass function
|
| 234 |
+
When applied into a complicated gravity system, the function of Press-Schechter HMF is limited, since it does
|
| 235 |
+
not consider the nonlinear environmental effects. To overcome this shortcoming, the extended Press-Schechter (EPS)
|
| 236 |
+
HMF is proposed in Ref.[31] and reads as
|
| 237 |
+
dn(M1, z|M2, δ2)
|
| 238 |
+
dM1
|
| 239 |
+
= M2
|
| 240 |
+
M1
|
| 241 |
+
fm(S1, δ1|S2, δ2)
|
| 242 |
+
����
|
| 243 |
+
dS1
|
| 244 |
+
dM1
|
| 245 |
+
���� ,
|
| 246 |
+
(13)
|
| 247 |
+
where the mass variance S1 = σ2(M1) and S2 = σ2(M2) (see Eq.(3)), and one can obtain the average number of
|
| 248 |
+
progenitors at time t1 in the mass range (M1, M1 + dM1) which by time t2 (t2 > t1) have merged to form a large halo
|
| 249 |
+
of mass M2. The multiplicity function fm is expressed as
|
| 250 |
+
fm(S1, δ1|S2, δ2) =
|
| 251 |
+
1
|
| 252 |
+
√
|
| 253 |
+
2π
|
| 254 |
+
δ1 − δ2
|
| 255 |
+
(S1 − S2)3/2 exp
|
| 256 |
+
�
|
| 257 |
+
− (δ1 − δ2)2
|
| 258 |
+
2(S1 − S2)
|
| 259 |
+
�
|
| 260 |
+
dS1.
|
| 261 |
+
(14)
|
| 262 |
+
δ1 and δ2 are, respectively, the linear overdensities in spherical regions of masses M1 and M2. To study the environ-
|
| 263 |
+
mental impacts on the high redshift HMF, we choose M2 as a present-day halo corresponding to current overdensity
|
| 264 |
+
δ2. To compute δ2, one should transform the nonlinear overdensity δnl at redshift z in Eulerian space into the linear
|
| 265 |
+
overdensity in Lagrangian space. The corresponding analytic fitting formula based on spherical collapse model is
|
| 266 |
+
[32, 33]
|
| 267 |
+
δ2(δnl, z) =
|
| 268 |
+
δ1
|
| 269 |
+
1.68647
|
| 270 |
+
�
|
| 271 |
+
1.68647 −
|
| 272 |
+
1.35
|
| 273 |
+
(1 + δnl)2/3 −
|
| 274 |
+
1.12431
|
| 275 |
+
(1 + δnl)1/2 +
|
| 276 |
+
0.78785
|
| 277 |
+
(1 + δnl)0.58661
|
| 278 |
+
�
|
| 279 |
+
.
|
| 280 |
+
(15)
|
| 281 |
+
Since there is a possibility that the excessively high CSMD from JWST is caused by nonlinear environmental effect,
|
| 282 |
+
we attempt to explain it using the EPS formalism.
|
| 283 |
+
IV.
|
| 284 |
+
METHODS AND RESULTS
|
| 285 |
+
At first, we employ the best fits from current cosmological constraints as our baseline values for four models. Since
|
| 286 |
+
we hope that the following calculations can be permitted by present-day observations, our discussions and results
|
| 287 |
+
will mainly focus on the allowed parameter space. Then, for different models, we use different Boltzmann codes to
|
| 288 |
+
calculate their background evolution, growth factors and matter power spectrum at different redshifts. Specifically,
|
| 289 |
+
we take CLASS [22, 23, 34] for DMBI and use modified CAMB [35, 36] for f(R) gravity, DDE and EPS scenarios. Note
|
| 290 |
+
that ΛCDM is adopted in the EPS scenario. Subsequently, we compute the HMF at different redshifts for the above
|
| 291 |
+
four models. Finally, we work out the maximal CSMD for each model according to the permitted parameter space,
|
| 292 |
+
and check whether these scenarios are consistent with the latest JWST data. Notice that Eq.(4) is only used in the
|
| 293 |
+
EPS model and the growth factors of the other three models are obtained from the corresponding software package.
|
| 294 |
+
Our numerical analysis results are presented in Figs.1-3. At first, we display the CSMD of ΛCDM in the redshift
|
| 295 |
+
range z ∈ [7, 9] and see its performance. In general, the SFE ϵ is about 10% according to current observational
|
| 296 |
+
constraints [11]. Nonetheless, one can see that in the top left panel of Fig.1, 10% is nowhere near enough to reach
|
| 297 |
+
the lower bounds of JWST data points in ΛCDM. One needs the star formation rate in galaxies to be at least 50%
|
| 298 |
+
in order to explain the inconsistency. In the meanwhile, one can easily find that ϵ = 0.8 can successfully explain two
|
| 299 |
+
data points but 100% SFE can not. Except for ΛCDM, we all calculate the maximal CSMD in the other models, i.e.,
|
| 300 |
+
assuming ϵ = 1.
|
| 301 |
+
In the second place, we make a trial to explore whether alternative cosmological models can alleviate even solve
|
| 302 |
+
the tension between JWST and Planck CMB observations. In the DMBI case, we attempt to acquire a higher baryon
|
| 303 |
+
fraction by the coupling between DM and baryons, and consequently explain this discrepancy occurred in ΛCDM.
|
| 304 |
+
However, we find that varying coupling strength σDM−b hardly affects the CSMD, and only the variation of interaction
|
| 305 |
+
DM fraction Ωidm affects significantly the CSMD. When assuming the DM particle mass mDM = 100 GeV, the cross
|
| 306 |
+
section σDM−b = 10−42 cm2 and choosing the fraction Ωidm = 0.01, 0.03 and 0.05, this tension can be efficiently
|
| 307 |
+
relieved but it seems that this model is difficult to explain both data points. However, if considering the current
|
| 308 |
+
cosmological constraint that gives a very small Ωidm [24], DMBI still behaves like ΛCDM and can not resolve this
|
| 309 |
+
discrepancy. We have also studied the impacts of mDM and find different DM particle masses also can not explain
|
| 310 |
+
JWST data.
|
| 311 |
+
In f(R) gravity, we find small fR0 such as 0.1 and 1 can not expalin the anomaly but a very large value fR0 = 10
|
| 312 |
+
can do. This implies that one needs a large deviation from GR to be responsible for JWST data. Unfortunately, the
|
| 313 |
+
|
| 314 |
+
5
|
| 315 |
+
109
|
| 316 |
+
1010
|
| 317 |
+
1011
|
| 318 |
+
M
|
| 319 |
+
102
|
| 320 |
+
103
|
| 321 |
+
104
|
| 322 |
+
105
|
| 323 |
+
106
|
| 324 |
+
107
|
| 325 |
+
108
|
| 326 |
+
( > M )[M
|
| 327 |
+
Mpc
|
| 328 |
+
3]
|
| 329 |
+
CDM, = 1
|
| 330 |
+
CDM, = 0.8
|
| 331 |
+
CDM, = 0.5
|
| 332 |
+
CDM, = 0.1
|
| 333 |
+
109
|
| 334 |
+
1010
|
| 335 |
+
1011
|
| 336 |
+
M
|
| 337 |
+
103
|
| 338 |
+
104
|
| 339 |
+
105
|
| 340 |
+
106
|
| 341 |
+
107
|
| 342 |
+
108
|
| 343 |
+
( > M )[M
|
| 344 |
+
Mpc
|
| 345 |
+
3]
|
| 346 |
+
CDM
|
| 347 |
+
idm=0.01, mDM=100 GeV
|
| 348 |
+
idm=0.03, mDM=100 GeV
|
| 349 |
+
idm=0.05, mDM=100 GeV
|
| 350 |
+
109
|
| 351 |
+
1010
|
| 352 |
+
1011
|
| 353 |
+
M
|
| 354 |
+
103
|
| 355 |
+
104
|
| 356 |
+
105
|
| 357 |
+
106
|
| 358 |
+
107
|
| 359 |
+
108
|
| 360 |
+
( > M )[M
|
| 361 |
+
Mpc
|
| 362 |
+
3]
|
| 363 |
+
CDM
|
| 364 |
+
fR0 = 0.1
|
| 365 |
+
fR0 = 1
|
| 366 |
+
fR0 = 10
|
| 367 |
+
109
|
| 368 |
+
1010
|
| 369 |
+
1011
|
| 370 |
+
M
|
| 371 |
+
102
|
| 372 |
+
103
|
| 373 |
+
104
|
| 374 |
+
105
|
| 375 |
+
106
|
| 376 |
+
107
|
| 377 |
+
108
|
| 378 |
+
( > M )[M
|
| 379 |
+
Mpc
|
| 380 |
+
3]
|
| 381 |
+
nl = 1
|
| 382 |
+
nl = 0.7
|
| 383 |
+
nl = 0.6
|
| 384 |
+
nl = 0.5
|
| 385 |
+
nl = 0.4
|
| 386 |
+
nl = 0.1
|
| 387 |
+
CDM
|
| 388 |
+
FIG. 1: The CSMDs for the ΛCDM, DMBI, f(R) gravity and EPS models are shown from top to bottom and left to right,
|
| 389 |
+
respectively. Note that for ΛCDM, we compute the CSMDs in the redshift range z ∈ [7, 9] by choosing different values of the
|
| 390 |
+
SFE ϵ. For the other models, we calculate the CSMDs in the redshift range z ∈ [9, 11] when ϵ = 1.
|
| 391 |
+
latest cosmological constraint gives log10 fR0 < −6.32 at the 2 σ confidence level [37], which is much smaller than 10.
|
| 392 |
+
Therefore, similar to DMBI, f(R) gravity also fails to alleviate this tension. Interestingly, this gives us a hint that, if
|
| 393 |
+
two galaxies observed by JWST are located in the low density region of the universe where MG effect is very large,
|
| 394 |
+
the data can be appropriately explained.
|
| 395 |
+
Furthermore, we are interested in whether the nature an simple extension to ΛCDM, DDE, can explain the incon-
|
| 396 |
+
sistency. As mentioned above, Ref.[16] claimed that JWST data can clearly constrain DDE. However, within current
|
| 397 |
+
constraining precision, we query this conclusion. To ensure the validity of our conclusion, we constrain ΛCDM and
|
| 398 |
+
DDE models using the Planck-2018 CMB temperature and polarization data (see Fig.2), and then obtain the best
|
| 399 |
+
fitting values of parameters of these two models. One can easily find the constrained values of model parameters
|
| 400 |
+
of ΛCDM in Ref.[5]. For DDE, we obtain current baryon and CDM densities Ωbh2 = 0.0225 and Ωch2 = 0.1184,
|
| 401 |
+
the ratio between angular diameter distance and sound horizon at the redshift of last scattering θMC = 1.04109,
|
| 402 |
+
the optical depth due to the reionization τ = 0.06, the amplitude and spectral index of primordial power spectrum
|
| 403 |
+
As = 2.114 × 10−9 and ns = 0.9698, and two DE EoS parameters ω0 = −0.38 and ωa = −4.8. Same as DMBI
|
| 404 |
+
and f(R) gravity models, we use the same method to work out the CSMD of DDE, and find that the variation of
|
| 405 |
+
the CSMD is largely dominated by the values of six basic parameters Ωbh2, Ωch2, θMC, τ, As and ns. Although
|
| 406 |
+
ω0 and ωa is loosely constrained by CMB data (constrained ω0-ωa parameter space is large), different values of ω0
|
| 407 |
+
and ωa hardly affect the CSMD. For instance, in the left panel of Fig.3, ω0 = −0.38 and ωa = −4.8 plus the ΛCDM
|
| 408 |
+
and DDE best fits gives completely different CSMDs. Choosing the ΛCDM best fit, (ω0, ωa) = (−0.38, −4.8) and
|
| 409 |
+
|
| 410 |
+
6
|
| 411 |
+
0.0220
|
| 412 |
+
0.0224
|
| 413 |
+
0.0228
|
| 414 |
+
bh2
|
| 415 |
+
0.7
|
| 416 |
+
0.8
|
| 417 |
+
0.9
|
| 418 |
+
1.0
|
| 419 |
+
1.1
|
| 420 |
+
8
|
| 421 |
+
0.2
|
| 422 |
+
0.3
|
| 423 |
+
0.4
|
| 424 |
+
0.5
|
| 425 |
+
m
|
| 426 |
+
50
|
| 427 |
+
60
|
| 428 |
+
70
|
| 429 |
+
80
|
| 430 |
+
90
|
| 431 |
+
H0
|
| 432 |
+
8
|
| 433 |
+
6
|
| 434 |
+
4
|
| 435 |
+
2
|
| 436 |
+
0
|
| 437 |
+
2
|
| 438 |
+
4
|
| 439 |
+
wa
|
| 440 |
+
2
|
| 441 |
+
1
|
| 442 |
+
0
|
| 443 |
+
w
|
| 444 |
+
3.00
|
| 445 |
+
3.05
|
| 446 |
+
3.10
|
| 447 |
+
ln(1010As)
|
| 448 |
+
0.96
|
| 449 |
+
0.97
|
| 450 |
+
0.98
|
| 451 |
+
ns
|
| 452 |
+
0.02
|
| 453 |
+
0.04
|
| 454 |
+
0.06
|
| 455 |
+
0.08
|
| 456 |
+
0.10
|
| 457 |
+
1.0400
|
| 458 |
+
1.0405
|
| 459 |
+
1.0410
|
| 460 |
+
1.0415
|
| 461 |
+
1.0420
|
| 462 |
+
100
|
| 463 |
+
MC
|
| 464 |
+
0.114
|
| 465 |
+
0.116
|
| 466 |
+
0.118
|
| 467 |
+
0.120
|
| 468 |
+
0.122
|
| 469 |
+
0.124
|
| 470 |
+
ch2
|
| 471 |
+
0.114
|
| 472 |
+
0.117
|
| 473 |
+
0.120
|
| 474 |
+
0.123
|
| 475 |
+
ch2
|
| 476 |
+
1.040
|
| 477 |
+
1.041
|
| 478 |
+
1.042
|
| 479 |
+
100
|
| 480 |
+
MC
|
| 481 |
+
0.02
|
| 482 |
+
0.04
|
| 483 |
+
0.06
|
| 484 |
+
0.08
|
| 485 |
+
0.10
|
| 486 |
+
0.96
|
| 487 |
+
0.97
|
| 488 |
+
0.98
|
| 489 |
+
ns
|
| 490 |
+
3.00
|
| 491 |
+
3.05
|
| 492 |
+
3.10
|
| 493 |
+
ln(1010As)
|
| 494 |
+
2
|
| 495 |
+
1
|
| 496 |
+
0
|
| 497 |
+
w
|
| 498 |
+
8
|
| 499 |
+
4
|
| 500 |
+
0
|
| 501 |
+
4
|
| 502 |
+
wa
|
| 503 |
+
50
|
| 504 |
+
60
|
| 505 |
+
70
|
| 506 |
+
80
|
| 507 |
+
90
|
| 508 |
+
H0
|
| 509 |
+
0.2
|
| 510 |
+
0.3
|
| 511 |
+
0.4
|
| 512 |
+
0.5
|
| 513 |
+
m
|
| 514 |
+
0.7
|
| 515 |
+
0.8
|
| 516 |
+
0.9
|
| 517 |
+
1.0
|
| 518 |
+
1.1
|
| 519 |
+
8
|
| 520 |
+
DDE
|
| 521 |
+
CDM
|
| 522 |
+
FIG. 2: The marginalized posterior probability distributions of the ΛCDM and DDE models from the Planck-2018 CMB
|
| 523 |
+
constraints are shown.
|
| 524 |
+
(ω0, ωa) = (−1, −1) gives very similar results in the logarithmic space. In the medium and right panels of Fig.3, we
|
| 525 |
+
verifies that taking same best fits of ΛCDM and DDE, respectively, choosing different DE EoS parameter pair just
|
| 526 |
+
produces very limited differences. After scanning the DDE parameter space, we find clearly that DDE also can not
|
| 527 |
+
explain this tension, but its best fit can help increase the value of CSMD and become closer to JWST data points (see
|
| 528 |
+
the left panel of Fig.3). The reason that the result in Ref.[16] is different from ours is that they do not implement an
|
| 529 |
+
appropriate cosmological constraint based on the Planck CMB data.
|
| 530 |
+
The result from f(R) gravity prompts us to study the environmental effect of JWST galaxies on the CSMD. The
|
| 531 |
+
most straightforward method is replacing the Press-Schechter HMF with the EPS formalism in the framework of
|
| 532 |
+
ΛCDM, where the sole parameter δnl characterizes the nonlinear environmental effect of a high redshift halo. In the
|
| 533 |
+
bottom right panel, we calculate the maximal CSMDs in the redshift range z ∈ [9, 11] for the EPS model. We find
|
| 534 |
+
that neither overlarge (δnl = 1) nor too small (δnl = 0.1) explain JWST observations and that the larger δnl is, the
|
| 535 |
+
larger the CSMD is. Since the total sky area covered by the JWST initial observation is large enough (∼ 40 armin2)
|
| 536 |
+
|
| 537 |
+
7
|
| 538 |
+
109
|
| 539 |
+
1010
|
| 540 |
+
1011
|
| 541 |
+
M
|
| 542 |
+
103
|
| 543 |
+
104
|
| 544 |
+
105
|
| 545 |
+
106
|
| 546 |
+
107
|
| 547 |
+
108
|
| 548 |
+
( > M )[M
|
| 549 |
+
Mpc
|
| 550 |
+
3]
|
| 551 |
+
CDM
|
| 552 |
+
w0=-0.38, wa=-4.8 + DDE best fit
|
| 553 |
+
w0=-0.38, wa=-4.8 + CDM best fit
|
| 554 |
+
w0=-1, wa=-1 + CDM best fit
|
| 555 |
+
3.60
|
| 556 |
+
3.62
|
| 557 |
+
3.64
|
| 558 |
+
3.66
|
| 559 |
+
3.68
|
| 560 |
+
3.70
|
| 561 |
+
M
|
| 562 |
+
1e10
|
| 563 |
+
12000
|
| 564 |
+
12200
|
| 565 |
+
12400
|
| 566 |
+
12600
|
| 567 |
+
12800
|
| 568 |
+
13000
|
| 569 |
+
( > M )[M
|
| 570 |
+
Mpc
|
| 571 |
+
3]
|
| 572 |
+
DDE w0=-0.38, wa=-4.8
|
| 573 |
+
DDE w0=-1, wa=-5
|
| 574 |
+
DDE w0=-1, wa=-1
|
| 575 |
+
DDE w0=-1, wa=0
|
| 576 |
+
3.60
|
| 577 |
+
3.62
|
| 578 |
+
3.64
|
| 579 |
+
3.66
|
| 580 |
+
3.68
|
| 581 |
+
3.70
|
| 582 |
+
M
|
| 583 |
+
1e10
|
| 584 |
+
42000
|
| 585 |
+
42500
|
| 586 |
+
43000
|
| 587 |
+
43500
|
| 588 |
+
44000
|
| 589 |
+
44500
|
| 590 |
+
45000
|
| 591 |
+
( > M )[M
|
| 592 |
+
Mpc
|
| 593 |
+
3]
|
| 594 |
+
DDE w0=-0.38, wa=-4.8
|
| 595 |
+
DDE w0=-1, wa=-5
|
| 596 |
+
DDE w0=-1, wa=-1
|
| 597 |
+
DDE w0=-1, wa=0
|
| 598 |
+
FIG. 3: The CSMDs of the DDE model computed at in the redshift range z ∈ [9, 11] are shown when assuming ϵ = 1. Left:
|
| 599 |
+
Different combinations of parameter values and best fits from constraints, respectively. Medium: Only the ΛCDM best fit;
|
| 600 |
+
Right: Only the DDE best fit.
|
| 601 |
+
[10], we can not rule out this possibly local environmental effect. However, unfortunately, there is no δnl passing two
|
| 602 |
+
data points simultaneously.
|
| 603 |
+
V.
|
| 604 |
+
DISCUSSIONS AND CONCLUSIONS
|
| 605 |
+
Recently, the early data release of JWST reveals the possible existence of high redshift galaxies. What is interesting
|
| 606 |
+
is these galaxies in the redshift range z ∈ [7, 11] exhibit the overlarge star formation rate, which is incompatible with
|
| 607 |
+
the prediction of the standard cosmology. This may indicate that JWST data contain the signal of new physics.
|
| 608 |
+
In this study, we try to resolve this tension with alternative cosmological models including DMBI, f(R) gravity
|
| 609 |
+
and DDE. We find that in light of the precision of current cosmological constraint from Planck-2018 CMB data, these
|
| 610 |
+
models all fail to explain this large tension. Specifically, for DMBI, the coupling strength σDM−b between DM and
|
| 611 |
+
baryons hardly affects the CSMD. For f(R) gravity, the effect of varying fR0 on the CSMD is too small to relive the
|
| 612 |
+
tension. For DDE, although the constrained DE EoS parameter space is large, different parameter pair (ω0, ωa) just
|
| 613 |
+
produces very limited differences in the CSMD. Interestingly, a large interacting DM fraction and a large deviation
|
| 614 |
+
from Einstein’s gravity can both generate a large CSMD.
|
| 615 |
+
A possible scenario to escape from current cosmological constraints is the EPS formalism, where we consider the
|
| 616 |
+
local environmental effect on the CSMD. We find that an appropriate value of nonlinear environmental overdensity
|
| 617 |
+
of a high redshift halo can well explain the CSMD discrepancy. However, we do not find an EPS model that can
|
| 618 |
+
simultaneously explain two data points.
|
| 619 |
+
In the near future, JWST will bring more useful data to human beings, so that we can extract more physical
|
| 620 |
+
information to uncover the mysterious veil of nature.
|
| 621 |
+
Acknowledgments
|
| 622 |
+
DW warmly thanks Liang Gao, Jie Wang and Qi Guo for helpful discussions. We thank Hang Yang for letting us
|
| 623 |
+
notice the JWST related works. This study is supported by the National Nature Science Foundation of China under
|
| 624 |
+
Grants No.11988101 and No.11851301.
|
| 625 |
+
[1] A. G. Riess et al. [Supernova Search Team], “Observational evidence from supernovae for an accelerating universe and a
|
| 626 |
+
cosmological constant,” Astron. J. 116, 1009-1038 (1998).
|
| 627 |
+
[2] S. Perlmutter et al. [Supernova Cosmology Project], “Measurements of Ω and Λ from 42 high redshift supernovae,”
|
| 628 |
+
Astrophys. J. 517, 565-586 (1999).
|
| 629 |
+
[3] D. N. Spergel et al. [WMAP Collaboration], “First year Wilkinson Microwave Anisotropy Probe (WMAP) observations:
|
| 630 |
+
Determination of cosmological parameters,” Astrophys. J. Suppl. 148, 175-194 (2003).
|
| 631 |
+
[4] P. A. R. Ade et al. [Planck Collaboration], “Planck 2013 results. XVI. Cosmological parameters,” Astron. Astrophys. 571,
|
| 632 |
+
A16 (2014).
|
| 633 |
+
|
| 634 |
+
8
|
| 635 |
+
[5] N. Aghanim et al. [Planck Collaboration], “Planck 2018 results. VI. Cosmological parameters,” Astron. Astrophys. 641,
|
| 636 |
+
A6 (2020) [erratum: Astron. Astrophys. 652, C4 (2021)].
|
| 637 |
+
[6] C. Blake and K. Glazebrook, “Probing dark energy using baryonic oscillations in the galaxy power spectrum as a cosmo-
|
| 638 |
+
logical ruler,” Astrophys. J. 594, 665-673 (2003).
|
| 639 |
+
[7] H. J. Seo and D. J. Eisenstein, “Probing dark energy with baryonic acoustic oscillations from future large galaxy redshift
|
| 640 |
+
surveys,” Astrophys. J. 598, 720 (2003).
|
| 641 |
+
[8] E. Di Valentino et al., “Snowmass2021 - Letter of interest cosmology intertwined I: Perspectives for the next decade,”
|
| 642 |
+
Astropart. Phys. 131, 102606 (2021).
|
| 643 |
+
[9] E. Abdalla et al., “Cosmology intertwined: A review of the particle physics, astrophysics, and cosmology associated with
|
| 644 |
+
the cosmological tensions and anomalies,” JHEAp 34, 49-211 (2022).
|
| 645 |
+
[10] I. Labbe et al., “A very early onset of massive galaxy formation,” [arXiv:2207.12446 [astro-ph.GA]].
|
| 646 |
+
[11] Y. Harikane et al., “A Comprehensive Study on Galaxies at z 9-16 Found in the Early JWST Data: UV Luminosity
|
| 647 |
+
Functions and Cosmic Star-Formation History at the Pre-Reionization Epoch,” [arXiv:2208.01612 [astro-ph.GA]].
|
| 648 |
+
[12] R. Naidu et al., “Two Remarkably Luminous Galaxy Candidates at z ≃ 10 − 12 Revealed by JWST,” [arXiv:2207.09434
|
| 649 |
+
[astro-ph.GA]].
|
| 650 |
+
[13] M. Castellano et al., “Early results from GLASS-JWST. III: Galaxy candidates at z ∼ 9 − 15,” [arXiv:2207.09436 [astro-
|
| 651 |
+
ph.GA]].
|
| 652 |
+
[14] M. Boylan-Kolchin, “Stress Testing ΛCDM with High-redshift Galaxy Candidates,” [arXiv:2208.01611 [astro-ph.CO]].
|
| 653 |
+
[15] C. Lovell et al., “Extreme Value Statistics of the Halo and Stellar Mass Distributions at High Redshift: are JWST Results
|
| 654 |
+
in Tension with ΛCDM?,” [arXiv:2208.10479 [astro-ph.GA]].
|
| 655 |
+
[16] N. Menci et al., “High-redshift Galaxies from Early JWST Observations: Constraints on Dark Energy Models,” Astrophys.
|
| 656 |
+
J. Lett. 938, no.1, L5 (2022).
|
| 657 |
+
[17] Y. Gong, B. Yue, Y. Cao and X. Chen, “Fuzzy Dark Matter as a Solution to the Stellar Mass Density of High-z Massive
|
| 658 |
+
Galaxies,” [arXiv:2209.13757 [astro-ph.CO]].
|
| 659 |
+
[18] M. Biagetti, G. Franciolini and A. Riotto, “The JWST High Redshift Observations and Primordial Non-Gaussianity,”
|
| 660 |
+
[arXiv:2210.04812 [astro-ph.CO]].
|
| 661 |
+
[19] W. H. Press and P. Schechter, “Formation of galaxies and clusters of galaxies by selfsimilar gravitational condensation,”
|
| 662 |
+
Astrophys. J. 187, 425-438 (1974).
|
| 663 |
+
[20] S. M. Carroll, W. H. Press and E. L. Turner, “The Cosmological constant,” Ann. Rev. Astron. Astrophys. 30, 499-542
|
| 664 |
+
(1992).
|
| 665 |
+
[21] R. Barkana, “Possible interaction between baryons and dark-matter particles revealed by the first stars,” Nature 555,
|
| 666 |
+
no.7694, 71-74 (2018).
|
| 667 |
+
[22] C. Dvorkin, K. Blum and M. Kamionkowski, “Constraining Dark Matter-Baryon Scattering with Linear Cosmology,” Phys.
|
| 668 |
+
Rev. D 89, no.2, 023519 (2014).
|
| 669 |
+
[23] W. L. Xu, C. Dvorkin and A. Chael, “Probing sub-GeV Dark Matter-Baryon Scattering with Cosmological Observables,”
|
| 670 |
+
Phys. Rev. D 97, no.10, 103530 (2018).
|
| 671 |
+
[24] N. Becker et al., “Cosmological constraints on multi-interacting dark matter,” JCAP 02, 019 (2021).
|
| 672 |
+
[25] H. A. Buchdahl, “Non-linear Lagrangians and cosmological theory,” Mon. Not. Roy. Astron. Soc. 150, 1 (1970).
|
| 673 |
+
[26] A. De Felice and S. Tsujikawa, “f(R) theories,” Living Rev. Rel. 13, 3 (2010).
|
| 674 |
+
[27] T. P. Sotiriou and V. Faraoni, “f(R) Theories Of Gravity,” Rev. Mod. Phys. 82, 451-497 (2010).
|
| 675 |
+
[28] W. Hu and I. Sawicki, “Models of f(R) Cosmic Acceleration that Evade Solar-System Tests,” Phys. Rev. D 76, 064004
|
| 676 |
+
(2007).
|
| 677 |
+
[29] M. Chevallier and D. Polarski, “Accelerating universes with scaling dark matter,” Int. J. Mod. Phys. D 10, 213-224 (2001).
|
| 678 |
+
[30] E. V. Linder, “Exploring the expansion history of the universe,” Phys. Rev. Lett. 90, 091301 (2003).
|
| 679 |
+
[31] J. R. Bond, S. Cole, G. Efstathiou and N. Kaiser, “Excursion set mass functions for hierarchical Gaussian fluctuations,”
|
| 680 |
+
Astrophys. J. 379, 440 (1991).
|
| 681 |
+
[32] H. J. Mo and S. D. M. White, “An Analytic model for the spatial clustering of dark matter halos,” Mon. Not. Roy. Astron.
|
| 682 |
+
Soc. 282, 347 (1996).
|
| 683 |
+
[33] R. K. Sheth and G. Tormen, “An Excursion Set Model of Hierarchical Clustering : Ellipsoidal Collapse and the Moving
|
| 684 |
+
Barrier,” Mon. Not. Roy. Astron. Soc. 329, 61 (2002).
|
| 685 |
+
[34] T. R. Slatyer and C. L. Wu, “Early-Universe constraints on dark matter-baryon scattering and their implications for a
|
| 686 |
+
global 21 cm signal,” Phys. Rev. D 98, no.2, 023013 (2018).
|
| 687 |
+
[35] A. Lewis, A. Challinor and A. Lasenby, “Efficient computation of CMB anisotropies in closed FRW models,” Astrophys.
|
| 688 |
+
J. 538, 473-476 (2000).
|
| 689 |
+
[36] A. Lewis, “Efficient sampling of fast and slow cosmological parameters,” Phys. Rev. D 87, no.10, 103529 (2013).
|
| 690 |
+
[37] D. Wang, “Pantheon+ constraints on dark energy and modified gravity: An evidence of dynamical dark energy,” Phys.
|
| 691 |
+
Rev. D 106, no.6, 6 (2022).
|
| 692 |
+
|