jackkuo commited on
Commit
c7b6043
·
verified ·
1 Parent(s): be0c8d2

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. .gitattributes +15 -0
  2. 0dE5T4oBgHgl3EQfOg4z/content/tmp_files/2301.05497v1.pdf.txt +450 -0
  3. 0dE5T4oBgHgl3EQfOg4z/content/tmp_files/load_file.txt +288 -0
  4. 0dE5T4oBgHgl3EQfOg4z/vector_store/index.pkl +3 -0
  5. 0tAzT4oBgHgl3EQfDPqY/content/2301.00973v1.pdf +3 -0
  6. 0tAzT4oBgHgl3EQfDPqY/content/tmp_files/2301.00973v1.pdf.txt +1482 -0
  7. 0tAzT4oBgHgl3EQfDPqY/content/tmp_files/load_file.txt +0 -0
  8. 0tAzT4oBgHgl3EQfDPqY/vector_store/index.pkl +3 -0
  9. 0tFPT4oBgHgl3EQfTjTq/content/tmp_files/2301.13054v1.pdf.txt +1564 -0
  10. 0tFPT4oBgHgl3EQfTjTq/vector_store/index.pkl +3 -0
  11. 29E2T4oBgHgl3EQfjQdC/content/tmp_files/2301.03966v1.pdf.txt +1687 -0
  12. 29E2T4oBgHgl3EQfjQdC/content/tmp_files/load_file.txt +0 -0
  13. 2tFKT4oBgHgl3EQf7y43/content/2301.11946v1.pdf +3 -0
  14. 2tFKT4oBgHgl3EQf7y43/content/tmp_files/2301.11946v1.pdf.txt +2027 -0
  15. 2tFKT4oBgHgl3EQf7y43/content/tmp_files/load_file.txt +0 -0
  16. 4tE1T4oBgHgl3EQf6QWC/content/tmp_files/2301.03521v1.pdf.txt +1047 -0
  17. 4tE1T4oBgHgl3EQf6QWC/content/tmp_files/load_file.txt +0 -0
  18. 7dE4T4oBgHgl3EQf2Q2c/content/tmp_files/load_file.txt +0 -0
  19. 7dE4T4oBgHgl3EQf2Q2c/vector_store/index.pkl +3 -0
  20. 89FST4oBgHgl3EQfajh_/content/tmp_files/2301.13796v1.pdf.txt +1672 -0
  21. 99FJT4oBgHgl3EQfpCw2/content/2301.11598v1.pdf +3 -0
  22. 99FJT4oBgHgl3EQfpCw2/content/tmp_files/2301.11598v1.pdf.txt +1960 -0
  23. 99FJT4oBgHgl3EQfpCw2/content/tmp_files/load_file.txt +0 -0
  24. 99FJT4oBgHgl3EQfpCw2/vector_store/index.pkl +3 -0
  25. 9tAyT4oBgHgl3EQfQ_bX/content/tmp_files/2301.00059v1.pdf.txt +1576 -0
  26. B9FQT4oBgHgl3EQfNza6/content/2301.13273v1.pdf +3 -0
  27. B9FQT4oBgHgl3EQfNza6/content/tmp_files/2301.13273v1.pdf.txt +0 -0
  28. B9FQT4oBgHgl3EQfNza6/content/tmp_files/load_file.txt +0 -0
  29. B9FQT4oBgHgl3EQfNza6/vector_store/index.pkl +3 -0
  30. BdE2T4oBgHgl3EQfRge6/content/tmp_files/2301.03782v1.pdf.txt +1366 -0
  31. BdE2T4oBgHgl3EQfRge6/content/tmp_files/load_file.txt +0 -0
  32. BdE2T4oBgHgl3EQfRge6/vector_store/index.pkl +3 -0
  33. BdE4T4oBgHgl3EQf5Q5A/content/2301.05321v1.pdf +3 -0
  34. BdE4T4oBgHgl3EQf5Q5A/content/tmp_files/2301.05321v1.pdf.txt +2198 -0
  35. BdE4T4oBgHgl3EQf5Q5A/content/tmp_files/load_file.txt +0 -0
  36. BdE4T4oBgHgl3EQf5Q5A/vector_store/index.pkl +3 -0
  37. BtE5T4oBgHgl3EQfTQ-D/content/tmp_files/2301.05535v1.pdf.txt +1008 -0
  38. BtFKT4oBgHgl3EQfXS78/content/tmp_files/2301.11794v1.pdf.txt +1249 -0
  39. BtFKT4oBgHgl3EQfXS78/content/tmp_files/load_file.txt +0 -0
  40. CNFAT4oBgHgl3EQfsx5b/content/2301.08660v1.pdf +3 -0
  41. CNFAT4oBgHgl3EQfsx5b/content/tmp_files/2301.08660v1.pdf.txt +1189 -0
  42. CNFAT4oBgHgl3EQfsx5b/content/tmp_files/load_file.txt +0 -0
  43. CNFAT4oBgHgl3EQfsx5b/vector_store/index.faiss +3 -0
  44. CNFAT4oBgHgl3EQfsx5b/vector_store/index.pkl +3 -0
  45. F9FKT4oBgHgl3EQfbS5P/content/tmp_files/load_file.txt +0 -0
  46. F9FKT4oBgHgl3EQfbS5P/vector_store/index.pkl +3 -0
  47. H9AyT4oBgHgl3EQfrvmy/content/tmp_files/2301.00567v1.pdf.txt +1551 -0
  48. H9AyT4oBgHgl3EQfrvmy/content/tmp_files/load_file.txt +0 -0
  49. I9FAT4oBgHgl3EQfux7Z/content/tmp_files/2301.08672v1.pdf.txt +1521 -0
  50. JdAyT4oBgHgl3EQffviy/content/tmp_files/2301.00347v1.pdf.txt +692 -0
.gitattributes CHANGED
@@ -108,3 +108,18 @@ knowledge_base/XtAzT4oBgHgl3EQfKfuP/content/2301.01098v1.pdf filter=lfs diff=lfs
108
  knowledge_base/BdE4T4oBgHgl3EQf5Q5A/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
109
  knowledge_base/BdE4T4oBgHgl3EQf5Q5A/content/2301.05321v1.pdf filter=lfs diff=lfs merge=lfs -text
110
  knowledge_base/KdFLT4oBgHgl3EQfLC8K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
108
  knowledge_base/BdE4T4oBgHgl3EQf5Q5A/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
109
  knowledge_base/BdE4T4oBgHgl3EQf5Q5A/content/2301.05321v1.pdf filter=lfs diff=lfs merge=lfs -text
110
  knowledge_base/KdFLT4oBgHgl3EQfLC8K/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
111
+ VNAyT4oBgHgl3EQf8vqZ/content/2301.00862v1.pdf filter=lfs diff=lfs merge=lfs -text
112
+ B9FQT4oBgHgl3EQfNza6/content/2301.13273v1.pdf filter=lfs diff=lfs merge=lfs -text
113
+ BdE4T4oBgHgl3EQf5Q5A/content/2301.05321v1.pdf filter=lfs diff=lfs merge=lfs -text
114
+ ytE1T4oBgHgl3EQf4AXn/content/2301.03497v1.pdf filter=lfs diff=lfs merge=lfs -text
115
+ zNFLT4oBgHgl3EQfni-P/content/2301.12128v1.pdf filter=lfs diff=lfs merge=lfs -text
116
+ jdE0T4oBgHgl3EQf7QI8/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
117
+ CNFAT4oBgHgl3EQfsx5b/content/2301.08660v1.pdf filter=lfs diff=lfs merge=lfs -text
118
+ Q9FKT4oBgHgl3EQfiC5d/content/2301.11840v1.pdf filter=lfs diff=lfs merge=lfs -text
119
+ pNE1T4oBgHgl3EQf2AWA/content/2301.03474v1.pdf filter=lfs diff=lfs merge=lfs -text
120
+ KdFLT4oBgHgl3EQfLC8K/content/2301.12010v1.pdf filter=lfs diff=lfs merge=lfs -text
121
+ pNE1T4oBgHgl3EQf2AWA/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
122
+ 0tAzT4oBgHgl3EQfDPqY/content/2301.00973v1.pdf filter=lfs diff=lfs merge=lfs -text
123
+ CNFAT4oBgHgl3EQfsx5b/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
124
+ VNAyT4oBgHgl3EQf8vqZ/vector_store/index.faiss filter=lfs diff=lfs merge=lfs -text
125
+ 2tFKT4oBgHgl3EQf7y43/content/2301.11946v1.pdf filter=lfs diff=lfs merge=lfs -text
0dE5T4oBgHgl3EQfOg4z/content/tmp_files/2301.05497v1.pdf.txt ADDED
@@ -0,0 +1,450 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ New universal partizan rulesets
2
+ Koki Suetsugu
3
+ January 2023
4
+ Abstract
5
+ Universal partizan ruleset is a ruleset in which every game value of
6
+ partizan games can be appear as a position. So far, generalized konane
7
+ and turning tiles have been proved to be universal partizan rulesets.
8
+ In this paper, we introduce two rulesets go on lattice and beyond the
9
+ door and prove that they are universal partizan rulesets by using game
10
+ tree preserving reduction.
11
+ 1
12
+ Introduction
13
+ Combinatorial game theory (CGT) studies two-player perfect information games
14
+ with no chance moves. We say a game is under normal play convention if the
15
+ player who moves last is the winner and a game is partizan game if the options
16
+ for both players can be different in some positions. Here, we introduce some
17
+ definitions and theorems of CGT for later discussion. For more details of CGT,
18
+ see [1, 3].
19
+ In this theory, the two players are called Left and Right. Since the term
20
+ “game” is polysemous, we refer to each position as a game. The description of
21
+ what moves are allowed for a given position is called the ruleset.
22
+ A game is defined by Left and Right options recursively.
23
+ Definition 1.
24
+ • {|} is a game, which is called 0.
25
+ • For games GL
26
+ 1 , GL
27
+ 2 , . . . , GL
28
+ n, GR
29
+ 1 , GR
30
+ 2 , . . . , and GR
31
+ m, G = {GL
32
+ 1 , GL
33
+ 2 , . . . , GL
34
+ n |
35
+ GR
36
+ 1 , GR
37
+ 2 , . . . , GR
38
+ m} is also a game. GL
39
+ 1 , GL
40
+ 2 , . . . , GL
41
+ n are called left options
42
+ of G and GR
43
+ 1 , GR
44
+ 2 , . . . , GR
45
+ m are called right options of G.
46
+ Let G be the set of all games.
47
+ In terms of the player who has a winning strategy, G is separated into four
48
+ sets. Let L, R, N, and P be the set of positions in which Left, Right, the Next
49
+ player, and the Previous player have winning strategies, respectively.
50
+ The sets are called outcomes of the games. Every position belongs to exactly
51
+ one of the four outcomes. For a game G, let o(G) be the outcome of G. We
52
+ define the partial order of outcomes as L > P > R, L > N > R.
53
+ 1
54
+ arXiv:2301.05497v1 [math.CO] 13 Jan 2023
55
+
56
+ The disjunctive sum of games is an important concept in Combinatorial
57
+ Game Theory. For games G and H, a position in which a player makes a move
58
+ for one or the other on their turn is called a disjunctive sum of G and H, or
59
+ G + H. More precisely, it is as follows:
60
+ Definition 2. If the game trees of G and H are isomorphic, then we say these
61
+ games are isomorphic or G ∼= H.
62
+ Definition 3. For games G ∼= {GL
63
+ 1 , GL
64
+ 2 . . . GL
65
+ n | GR
66
+ 1 , GR
67
+ 2 , . . . , GR
68
+ m} and H ∼=
69
+ {HL
70
+ 1 , HL
71
+ 2 . . . , HL
72
+ n′ | HR
73
+ 1 , HR
74
+ 2 , . . . , HR
75
+ m′}, G + H ∼= {G + HL
76
+ 1 , G + HL
77
+ 2 , . . . , G +
78
+ HL
79
+ n′, GL
80
+ 1 + H, GL
81
+ 2 + H, . . . , GL
82
+ n + H | G + HR
83
+ 1 , G + HR
84
+ 2 , . . . , G + HR
85
+ m′, GR
86
+ 1 +
87
+ H, GR
88
+ 2 + H, . . . , GR
89
+ m + H}.
90
+ We also define equality, inequality and negative of games.
91
+ Definition 4. If for any X, o(G + X) is the same as o(H + X), then we say
92
+ G = H.
93
+ Definition 5. If o(G+H) ≥ o(H +X) holds for any X, then we say G ≥ H. On
94
+ the other hand, if o(G + H) ≤ o(H + X) holds for any X, then we say G ≤ H.
95
+ We also say G ≷ H if G ̸≥ H and G ̸≤ H.
96
+ Definition 6. For a game G ∼= {GL
97
+ 1 , GL
98
+ 2 , . . . , GL
99
+ n | GR
100
+ 1 , GR
101
+ 2 , . . . , GR
102
+ m}, let −G ∼=
103
+ {−GR
104
+ 1 , −GR
105
+ 2 , −GR
106
+ m | −GL
107
+ 1 , −GL
108
+ 2 , . . . , −GL
109
+ n}.
110
+ G + (−H) is denoted by G − H.
111
+ It is known that (G, +, =) is an abelian group and (G, ≥, =) is a partial
112
+ order.
113
+ The question arises here, will there be a ruleset in which for any game there
114
+ is a position equal to the game? If the games appearing in each ruleset are
115
+ restricted, then perhaps we should think in a narrower framework.
116
+ In fact,
117
+ however, it is known that for every game, a position equal to the game appears
118
+ in some rulesets.
119
+ 1.1
120
+ Universal partizan ruleset
121
+ Definition 7. A ruleset is universal partizan ruleset if every value in G is equal
122
+ to a position of the ruleset.
123
+ Early results showed that generalized konane and turning tiles are
124
+ universal partizan ruleset ([2, 4]). In this study, we will use the latter ruleset.
125
+ Definition 8. The ruleset of turning tiles is as follows:
126
+ • Square tiles are laid out. The front side is red or blue, and the back side
127
+ is black.
128
+ • Some pieces are on tiles.
129
+ • Each player (Left, whose color is bLue and Right, whose color is Red),
130
+ in his/her turn, take a piece and move the piece straight on the tiles of
131
+ his/her color.
132
+ 2
133
+
134
+ • Tiles on which the piece pass over are turned over.
135
+ • The player who moves last is the winner.
136
+ Turning tiles is proved to be universal partizan ruleset even if the number
137
+ of pieces is restricted to be only one.
138
+ To distinguish this ruleset from the ruleset defined below, we will also refer
139
+ to it as blue-red turning tiles.
140
+ For games that use two colors, red and blue, corresponding to two players,
141
+ we often consider a variant that adds green, which can be used by both players.
142
+ For example, in blue-red-green hackenbush, Right can remove red or green
143
+ edges and Left can remove blue or green edges. From this point of view, we
144
+ consider a varant of turning tiles.
145
+ Definition 9. The ruleset of blue-red-green turning tiles is as follows:
146
+ • Square tiles are laid out. The front side is red, blue, or green, and the back
147
+ side is black.
148
+ • Some pieces are on tiles.
149
+ • Each player (Left, whose color is bLue and Right, whose color is Red),
150
+ in his/her turn, take a piece and move the piece straight on the tiles of
151
+ his/her color or of green.
152
+ • Tiles on which the piece pass over are turned over.
153
+ • The player who moves last is the winner.
154
+ Figure 1: Positions in blue-red turning tiles and blue-red-green turn-
155
+ ing tiles
156
+ Figure 1 is an example of positions in blue-red turning tiles and blue-
157
+ red-green turning tiles.
158
+ 3
159
+
160
+ L
161
+ LL
162
+ RR
163
+ LL
164
+ RR
165
+ L
166
+ R
167
+ LLLG
168
+ R
169
+ GG
170
+ RR-
171
+ G
172
+ L
173
+ RR
174
+ R
175
+ R
176
+ G
177
+ R
178
+ G
179
+ R
180
+ L
181
+ L
182
+ R
183
+ L
184
+ R
185
+ R
186
+ R
187
+ R
188
+ RR
189
+ R
190
+ R
191
+ R
192
+ RRR
193
+ R
194
+ R
195
+ RR
196
+ R
197
+ G
198
+ G
199
+ RR
200
+ R
201
+ RR
202
+ L
203
+ 7
204
+ RR
205
+ R
206
+
207
+ R
208
+ G
209
+ RR
210
+ G
211
+ R
212
+ R
213
+ P
214
+ L
215
+ R
216
+ G
217
+ G
218
+ L
219
+ R
220
+ R
221
+ LL
222
+ R
223
+ R
224
+ R
225
+ R
226
+ L
227
+ G
228
+ R
229
+ G
230
+ R
231
+ GObviously, blue-red-green turning tiles is also a universal partizan
232
+ ruleset because every position in blue-red turning tiles can be appear in
233
+ blue-red-green turning tiles.
234
+ As we have seen here, if two rulesets have an inclusion relation in terms of
235
+ the sets of positions, it can be used for proving universality of the rulesets.
236
+ Theorem 1. Let Γ and ∆ be rulesets and assume that Γ be a universal partizan
237
+ ruleset. If for every position g ∈ Γ, there is at least one position in ∆ whose
238
+ game value is the same as g, then ∆ is also a universal partizan ruleset.
239
+ Proof. This is trivial from the definition of universal partizan ruleset.
240
+ Corollary 1. Let Γ and ∆ be rulesets and assume that Γ be a universal partizan
241
+ ruleset. If for every position g ∈ Γ, there is at least one position in ∆ whose
242
+ game tree is the same as g, then ∆ is also a universal partizan ruleset.
243
+ If a ruleset is proved to be universal partizan ruleset by using Corollary 1,
244
+ we say that it is proved by game tree preserving reduction.
245
+ In the next section, we introduce two rulesets and prove that they are univer-
246
+ sal partizan ruleset by game tree preserving reduction. In Secton 3, we conclude
247
+ this study.
248
+ 2
249
+ New universal partizan rulesets
250
+ 2.1
251
+ Go on lattice
252
+ Definition 10. The rule of go on lattice is as follows:
253
+ • There is a lattice graph. There are pieces on some nodes. The edges are
254
+ colored red, blue, or dotted.
255
+ • A player, in his/her turn, chooses a piece and moves it straight on edges
256
+ colored his/her color.
257
+ • After a piece passed a node, every piece cannot get on or pass the node.
258
+ • If a player moves a piece to a node adjacent to a dotted edge, then the edge
259
+ changes to solid edge colored by the opponent’s color.
260
+ • The player who moves last is the winner.
261
+ Figure 2: Play of go on lattice
262
+ 4
263
+
264
+ 17
265
+ MFigure 2 is a play of go on lattice. We use double line for red edges for
266
+ monochrome printing.
267
+ Theorem 2. Go on lattice is a universal partizan ruleset.
268
+ Proof. Let f be a function from a position in turning tiles to a position in
269
+ go on lattice as follows:
270
+ Let G be a position in turning tiles. In f(G) there are as many nodes
271
+ as tiles in G. The tiles in G and the nodes in f(G) are arranged exactly the
272
+ same. For each piece on a tile in G, there is a corresponding piece on the node
273
+ corresponds to the tile. For any adjacent tiles A and B in G, let A′ and B′ are
274
+ corresponding nodes in f(G). If the color of A, and B are the same, then edge
275
+ between A′ and B′ is solid and the same color as A and B. If there is a piece
276
+ on A or B, then the edge between A′ and B′ is solid and the color is the same
277
+ as the other tile. Finally, if the color of A and B are different and no piece is
278
+ on each tile, then the edge between A′ and B′ is dotted line.
279
+
280
+ B
281
+ B
282
+ B
283
+ B
284
+ B
285
+ R
286
+ R
287
+ R
288
+ R
289
+
290
+ B
291
+ R
292
+ R
293
+ B
294
+ B
295
+ B
296
+ Figure 3: Corresponding positions in turning tiles and go on lattice
297
+ .
298
+ Figure 3 shows this corresponding. Here, the game tree of G and f(G) are
299
+ isomorphic. We prove that every move in one game has a corresponding move
300
+ in the other game.
301
+ Assume that in G Left can move a piece on tile A0 to
302
+ tile An through tiles A1, A2, . . . , An−1. Then, A1, A2, . . . , An are blue tiles. Let
303
+ A′
304
+ 0, A′
305
+ 1, . . . , A′
306
+ n be the corresponding nodes in f(G). Let (A′, B′) be the edge be-
307
+ tween A′ and B′. Then, from the definition of f, all of (A′
308
+ 1, A′
309
+ 2), (A′
310
+ 2, A′
311
+ 3), . . . , (A′
312
+ n−1, A′
313
+ n)
314
+ are blue edge. In addition, if A0 was a blue tile before turning, then (A′
315
+ 0, A′
316
+ 1)
317
+ is a blue edge, and if A0 was a red tile, (A′
318
+ 0, A′
319
+ 1) had been a dot edge and
320
+ after Right moved the piece to A′
321
+ 0, it changed to a blue edge. Therefore for
322
+ both case, (A′
323
+ 0, A′
324
+ 1) is a blue edge and Left can move a piece from A′
325
+ 0 to A′
326
+ n
327
+ through A′
328
+ 1, A′
329
+ 2, . . . , A′
330
+ n−1. Conversely, assume that in f(G), Left can move a
331
+ piece from A′
332
+ 0 to A′
333
+ n through A′
334
+ 1, A′
335
+ 2, . . . , A′
336
+ n−1. Then, in G, all corresponding
337
+ tiles A1, A2, . . . , An are blue tiles. Therefore, Left can move a piece from A0 to
338
+ 5
339
+
340
+ Figure 4: Play of beyond the door.
341
+ An through A1, A2, . . . , An−1 in the corresponding position in turning tiles.
342
+ Similar proof holds for Right’s moves.
343
+ Thus, from Corollary 1, go on lattice is a universal partizan ruleset.
344
+ 2.2
345
+ Beyond the door
346
+ Definition 11. The rule of beyond the door is as follows:
347
+ • Square rooms are arranged in a grid pattern. There are doors between the
348
+ rooms. The front and back of the doors are painted red or blue. There are
349
+ pieces in several rooms.
350
+ • A player, in his/her turn, chooses a piece and moves it in a straight line.
351
+ When a piece moves beyond the door, the color of the piece’s side of the
352
+ door must be the player’s color.
353
+ • After a piece passed a room, every piece can not enter the room.
354
+ • The player who moves last is the winner.
355
+ Figure 4 shows a play of beyond the door. The red sides are masked for
356
+ monochrome printing.
357
+ Theorem 3. Beyond the door is a universal partizan ruleset.
358
+ Proof. Let f ′ be a function from a position in turning tiles to a position in
359
+ beyond the door as follows:
360
+ Let G be a position in turning tiles. In f ′(G) there are as many rooms
361
+ as tiles in G and the tiles in G and the rooms in f ′(G) are arranged exactly the
362
+ same. For each piece on a tile in G, there is a corresponding piece in the room
363
+ corresponding to the tile. For any adjacent tiles A and B in G, let A′ and B′
364
+ are corresponding rooms in f ′(G). The color of the door between A′ and B′ is
365
+ the same as the color of A on the B′ side, and the same as the color of B on
366
+ the A′ side.
367
+ Figure 5 shows this corresponding. Here, the game tree of G and f ′(G) are
368
+ isomorphic. We prove that every move in one game has a corresponding move
369
+ in the other game. Assume that in G Left can move a piece on tile A0 to tile
370
+ An through tiles A1, A2, . . . , An−1. Then, A1, A2, . . . , An are blue tiles. Let
371
+ A′
372
+ 0, A′
373
+ 1, . . . , A′
374
+ n be the corresponding rooms in f ′(G). Let A′ → B′ be the color
375
+ 6
376
+
377
+ Figure 5: Corresponding positions in turning tiles and beyond the door
378
+ .
379
+ Figure 6: f and f ′ have no inverse functions.
380
+ of the door between A′ and B′ on the A′ side. Then, from the definition of f ′,
381
+ all of A′
382
+ 0 → A′
383
+ 1, A′
384
+ 1 → A′
385
+ 2, . . . , A′
386
+ n−1 → A′
387
+ n are blue. Therefore, Left can move
388
+ a piece from A′
389
+ 0 to A′
390
+ n through A′
391
+ 1, A′
392
+ 2, . . . , A′
393
+ n−1. Conversely, assume that in
394
+ f(G), Left can move a piece from A′
395
+ 0 to A′
396
+ n through A′
397
+ 1, A′
398
+ 2, . . . , A′
399
+ n−1. Then,
400
+ in G, all corresponding tiles A1, A2, . . . , An are blue tiles. Therefore, Left can
401
+ move a piece from A0 to An through A′
402
+ 1, A′
403
+ 2, . . . , A′
404
+ n−1 in the corresponding
405
+ position in turning tiles. Similar proof holds for Right’s moves.
406
+ Thus, from Corollary 1, beyond the door is a universal partizan ruleset.
407
+ Note that f and f ′ have no inverse functions. For instance, Fig. 6 shows
408
+ positions in go on lattice and beyond the door. No position in turning
409
+ tiles is mapped to these positions by f and f ′ because depending on the order
410
+ of moves, both Left and Right may move pieces to the same node or the same
411
+ room in these positions.
412
+ This is somewhat interesting.
413
+ That is, even though in some ways these
414
+ rulesets are more complex than turning tiles, considering what kind of values
415
+ 7
416
+
417
+ LLLL
418
+ L
419
+ RRR
420
+ R
421
+ R
422
+ Rcan appear in the rulesets, all of them are the same.
423
+ 3
424
+ Conclusion
425
+ In this paper, we proved go on lattice and beyond the door are universal
426
+ partizan rulesets by using game-tree preserving reduction. The method of re-
427
+ duction has been used primarily for proving complexity of problems. Since this
428
+ study shows that reduction is also effective in the proof of universality of a game,
429
+ we can expect that the knowledge accumulated in the study of computational
430
+ complexity will be utilized in the study of combinatorial game theory, and we
431
+ can expect further development of combinatorial game theory.
432
+ References
433
+ [1] M. H. Albert, R. J. Nowakowski, and D. Wolfe, Lessons in play: An Iintro-
434
+ duction to combinatorial game theory, A K Peters, Ltd. / CRC Press(2007).
435
+ [2] A. Carvalho, C. P. Santos: A nontrivial surjective map onto the short
436
+ Conway group, Games of No Chance 5 (U. Larsson, Ed.), MSRI Book
437
+ Series 70, Cambridge University Press, pp. 271–284(2019).
438
+ [3] A. N. Siegel, Combinatorial Game Theory, American Mathematical Soci-
439
+ ety(2013).
440
+ [4] K.
441
+ Suetsugu,
442
+ Discovering
443
+ a
444
+ new
445
+ universal
446
+ partizan
447
+ ruleset,
448
+ arXiv:2201.06069 [math.CO](2022).
449
+ 8
450
+
0dE5T4oBgHgl3EQfOg4z/content/tmp_files/load_file.txt ADDED
@@ -0,0 +1,288 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ filepath=/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf,len=287
2
+ page_content='New universal partizan rulesets Koki Suetsugu January 2023 Abstract Universal partizan ruleset is a ruleset in which every game value of partizan games can be appear as a position.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
3
+ page_content=' So far, generalized konane and turning tiles have been proved to be universal partizan rulesets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
4
+ page_content=' In this paper, we introduce two rulesets go on lattice and beyond the door and prove that they are universal partizan rulesets by using game tree preserving reduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
5
+ page_content=' 1 Introduction Combinatorial game theory (CGT) studies two-player perfect information games with no chance moves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
6
+ page_content=' We say a game is under normal play convention if the player who moves last is the winner and a game is partizan game if the options for both players can be different in some positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
7
+ page_content=' Here, we introduce some definitions and theorems of CGT for later discussion.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
8
+ page_content=' For more details of CGT, see [1, 3].' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
9
+ page_content=' In this theory, the two players are called Left and Right.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
10
+ page_content=' Since the term “game” is polysemous, we refer to each position as a game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
11
+ page_content=' The description of what moves are allowed for a given position is called the ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
12
+ page_content=' A game is defined by Left and Right options recursively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
13
+ page_content=' Definition 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
14
+ page_content=' {|} is a game, which is called 0.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
15
+ page_content=' For games GL 1 , GL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
16
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
17
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
18
+ page_content=' , GL n, GR 1 , GR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
19
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
20
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
21
+ page_content=' , and GR m, G = {GL 1 , GL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
22
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
23
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
24
+ page_content=' , GL n | GR 1 , GR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
25
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
26
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
27
+ page_content=' , GR m} is also a game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
28
+ page_content=' GL 1 , GL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
29
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
30
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
31
+ page_content=' , GL n are called left options of G and GR 1 , GR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
32
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
33
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
34
+ page_content=' , GR m are called right options of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
35
+ page_content=' Let G be the set of all games.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
36
+ page_content=' In terms of the player who has a winning strategy, G is separated into four sets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
37
+ page_content=' Let L, R, N, and P be the set of positions in which Left, Right, the Next player, and the Previous player have winning strategies, respectively.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
38
+ page_content=' The sets are called outcomes of the games.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
39
+ page_content=' Every position belongs to exactly one of the four outcomes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
40
+ page_content=' For a game G, let o(G) be the outcome of G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
41
+ page_content=' We define the partial order of outcomes as L > P > R, L > N > R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
42
+ page_content=' 1 arXiv:2301.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
43
+ page_content='05497v1 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
44
+ page_content='CO] 13 Jan 2023 The disjunctive sum of games is an important concept in Combinatorial Game Theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
45
+ page_content=' For games G and H, a position in which a player makes a move for one or the other on their turn is called a disjunctive sum of G and H, or G + H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
46
+ page_content=' More precisely, it is as follows: Definition 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
47
+ page_content=' If the game trees of G and H are isomorphic, then we say these games are isomorphic or G ∼= H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
48
+ page_content=' Definition 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
49
+ page_content=' For games G ∼= {GL 1 , GL 2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
50
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
51
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
52
+ page_content=' GL n | GR 1 , GR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
53
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
54
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
55
+ page_content=' , GR m} and H ∼= {HL 1 , HL 2 .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
56
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
57
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
58
+ page_content=' , HL n′ | HR 1 , HR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
59
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
60
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
61
+ page_content=' , HR m′}, G + H ∼= {G + HL 1 , G + HL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
62
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
63
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
64
+ page_content=' , G + HL n′, GL 1 + H, GL 2 + H, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
65
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
66
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
67
+ page_content=' , GL n + H | G + HR 1 , G + HR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
68
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
69
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
70
+ page_content=' , G + HR m′, GR 1 + H, GR 2 + H, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
71
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
72
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
73
+ page_content=' , GR m + H}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
74
+ page_content=' We also define equality, inequality and negative of games.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
75
+ page_content=' Definition 4.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
76
+ page_content=' If for any X, o(G + X) is the same as o(H + X), then we say G = H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
77
+ page_content=' Definition 5.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
78
+ page_content=' If o(G+H) ≥ o(H +X) holds for any X, then we say G ≥ H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
79
+ page_content=' On the other hand, if o(G + H) ≤ o(H + X) holds for any X, then we say G ≤ H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
80
+ page_content=' We also say G ≷ H if G ̸≥ H and G ̸≤ H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
81
+ page_content=' Definition 6.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
82
+ page_content=' For a game G ∼= {GL 1 , GL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
83
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
84
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
85
+ page_content=' , GL n | GR 1 , GR 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
86
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
87
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
88
+ page_content=' , GR m}, let −G ∼= {−GR 1 , −GR 2 , −GR m | −GL 1 , −GL 2 , .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
89
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
90
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
91
+ page_content=' , −GL n}.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
92
+ page_content=' G + (−H) is denoted by G − H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
93
+ page_content=' It is known that (G, +, =) is an abelian group and (G, ≥, =) is a partial order.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
94
+ page_content=' The question arises here, will there be a ruleset in which for any game there is a position equal to the game?' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
95
+ page_content=' If the games appearing in each ruleset are restricted, then perhaps we should think in a narrower framework.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
96
+ page_content=' In fact, however, it is known that for every game, a position equal to the game appears in some rulesets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
97
+ page_content=' 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
98
+ page_content='1 Universal partizan ruleset Definition 7.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
99
+ page_content=' A ruleset is universal partizan ruleset if every value in G is equal to a position of the ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
100
+ page_content=' Early results showed that generalized konane and turning tiles are universal partizan ruleset ([2, 4]).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
101
+ page_content=' In this study, we will use the latter ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
102
+ page_content=' Definition 8.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
103
+ page_content=' The ruleset of turning tiles is as follows: Square tiles are laid out.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
104
+ page_content=' The front side is red or blue, and the back side is black.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
105
+ page_content=' Some pieces are on tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
106
+ page_content=' Each player (Left, whose color is bLue and Right, whose color is Red), in his/her turn, take a piece and move the piece straight on the tiles of his/her color.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
107
+ page_content=' 2 Tiles on which the piece pass over are turned over.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
108
+ page_content=' The player who moves last is the winner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
109
+ page_content=' Turning tiles is proved to be universal partizan ruleset even if the number of pieces is restricted to be only one.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
110
+ page_content=' To distinguish this ruleset from the ruleset defined below, we will also refer to it as blue-red turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
111
+ page_content=' For games that use two colors, red and blue, corresponding to two players, we often consider a variant that adds green, which can be used by both players.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
112
+ page_content=' For example, in blue-red-green hackenbush, Right can remove red or green edges and Left can remove blue or green edges.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
113
+ page_content=' From this point of view, we consider a varant of turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
114
+ page_content=' Definition 9.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
115
+ page_content=' The ruleset of blue-red-green turning tiles is as follows: Square tiles are laid out.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
116
+ page_content=' The front side is red, blue, or green, and the back side is black.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
117
+ page_content=' Some pieces are on tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
118
+ page_content=' Each player (Left, whose color is bLue and Right, whose color is Red), in his/her turn, take a piece and move the piece straight on the tiles of his/her color or of green.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
119
+ page_content=' Tiles on which the piece pass over are turned over.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
120
+ page_content=' The player who moves last is the winner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
121
+ page_content=' Figure 1: Positions in blue-red turning tiles and blue-red-green turn- ing tiles Figure 1 is an example of positions in blue-red turning tiles and blue- red-green turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
122
+ page_content=' 3 L LL RR LL RR L R LLLG R GG RR- G L RR R R G R G R L L R L R R R R RR R R R RRR R R RR R G G RR R RR L 7 RR R 一 R G RR G R R P L R G G L R R LL R R R R L G R G R GObviously, blue-red-green turning tiles is also a universal partizan ruleset because every position in blue-red turning tiles can be appear in blue-red-green turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
123
+ page_content=' As we have seen here, if two rulesets have an inclusion relation in terms of the sets of positions, it can be used for proving universality of the rulesets.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
124
+ page_content=' Theorem 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
125
+ page_content=' Let Γ and ∆ be rulesets and assume that Γ be a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
126
+ page_content=' If for every position g ∈ Γ, there is at least one position in ∆ whose game value is the same as g, then ∆ is also a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
127
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
128
+ page_content=' This is trivial from the definition of universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
129
+ page_content=' Corollary 1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
130
+ page_content=' Let Γ and ∆ be rulesets and assume that Γ be a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
131
+ page_content=' If for every position g ∈ Γ, there is at least one position in ∆ whose game tree is the same as g, then ∆ is also a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
132
+ page_content=' If a ruleset is proved to be universal partizan ruleset by using Corollary 1, we say that it is proved by game tree preserving reduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
133
+ page_content=' In the next section, we introduce two rulesets and prove that they are univer- sal partizan ruleset by game tree preserving reduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
134
+ page_content=' In Secton 3, we conclude this study.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
135
+ page_content=' 2 New universal partizan rulesets 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
136
+ page_content='1 Go on lattice Definition 10.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
137
+ page_content=' The rule of go on lattice is as follows: There is a lattice graph.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
138
+ page_content=' There are pieces on some nodes.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
139
+ page_content=' The edges are colored red, blue, or dotted.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
140
+ page_content=' A player, in his/her turn, chooses a piece and moves it straight on edges colored his/her color.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
141
+ page_content=' After a piece passed a node, every piece cannot get on or pass the node.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
142
+ page_content=' If a player moves a piece to a node adjacent to a dotted edge, then the edge changes to solid edge colored by the opponent’s color.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
143
+ page_content=' The player who moves last is the winner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
144
+ page_content=' Figure 2: Play of go on lattice 4 17 MFigure 2 is a play of go on lattice.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
145
+ page_content=' We use double line for red edges for monochrome printing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
146
+ page_content=' Theorem 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
147
+ page_content=' Go on lattice is a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
148
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
149
+ page_content=' Let f be a function from a position in turning tiles to a position in go on lattice as follows: Let G be a position in turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
150
+ page_content=' In f(G) there are as many nodes as tiles in G.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
151
+ page_content=' The tiles in G and the nodes in f(G) are arranged exactly the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
152
+ page_content=' For each piece on a tile in G, there is a corresponding piece on the node corresponds to the tile.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
153
+ page_content=' For any adjacent tiles A and B in G, let A′ and B′ are corresponding nodes in f(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
154
+ page_content=' If the color of A, and B are the same, then edge between A′ and B′ is solid and the same color as A and B.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
155
+ page_content=' If there is a piece on A or B, then the edge between A′ and B′ is solid and the color is the same as the other tile.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
156
+ page_content=' Finally, if the color of A and B are different and no piece is on each tile, then the edge between A′ and B′ is dotted line.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
157
+ page_content=' B B B B B R R R R B R R B B B Figure 3: Corresponding positions in turning tiles and go on lattice .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
158
+ page_content=' Figure 3 shows this corresponding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
159
+ page_content=' Here, the game tree of G and f(G) are isomorphic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
160
+ page_content=' We prove that every move in one game has a corresponding move in the other game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
161
+ page_content=' Assume that in G Left can move a piece on tile A0 to tile An through tiles A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
162
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
163
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
164
+ page_content=' , An−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
165
+ page_content=' Then, A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
166
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
167
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
168
+ page_content=' , An are blue tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
169
+ page_content=' Let A′ 0, A′ 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
170
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
171
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
172
+ page_content=' , A′ n be the corresponding nodes in f(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
173
+ page_content=' Let (A′, B′) be the edge be- tween A′ and B′.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
174
+ page_content=' Then, from the definition of f, all of (A′ 1, A′ 2), (A′ 2, A′ 3), .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
175
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
176
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
177
+ page_content=' , (A′ n−1, A′ n) are blue edge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
178
+ page_content=' In addition, if A0 was a blue tile before turning, then (A′ 0, A′ 1) is a blue edge, and if A0 was a red tile, (A′ 0, A′ 1) had been a dot edge and after Right moved the piece to A′ 0, it changed to a blue edge.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
179
+ page_content=' Therefore for both case, (A′ 0, A′ 1) is a blue edge and Left can move a piece from A′ 0 to A′ n through A′ 1, A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
180
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
181
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
182
+ page_content=' , A′ n−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
183
+ page_content=' Conversely, assume that in f(G), Left can move a piece from A′ 0 to A′ n through A′ 1, A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
184
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
185
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
186
+ page_content=' , A′ n−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
187
+ page_content=' Then, in G, all corresponding tiles A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
188
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
189
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
190
+ page_content=' , An are blue tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
191
+ page_content=' Therefore, Left can move a piece from A0 to 5 Figure 4: Play of beyond the door.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
192
+ page_content=' An through A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
193
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
194
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
195
+ page_content=' , An−1 in the corresponding position in turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
196
+ page_content=' Similar proof holds for Right’s moves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
197
+ page_content=' Thus, from Corollary 1, go on lattice is a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
198
+ page_content=' 2.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
199
+ page_content='2 Beyond the door Definition 11.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
200
+ page_content=' The rule of beyond the door is as follows: Square rooms are arranged in a grid pattern.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
201
+ page_content=' There are doors between the rooms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
202
+ page_content=' The front and back of the doors are painted red or blue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
203
+ page_content=' There are pieces in several rooms.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
204
+ page_content=' A player, in his/her turn, chooses a piece and moves it in a straight line.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
205
+ page_content=' When a piece moves beyond the door, the color of the piece’s side of the door must be the player’s color.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
206
+ page_content=' After a piece passed a room, every piece can not enter the room.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
207
+ page_content=' The player who moves last is the winner.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
208
+ page_content=' Figure 4 shows a play of beyond the door.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
209
+ page_content=' The red sides are masked for monochrome printing.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
210
+ page_content=' Theorem 3.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
211
+ page_content=' Beyond the door is a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
212
+ page_content=' Proof.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
213
+ page_content=' Let f ′ be a function from a position in turning tiles to a position in beyond the door as follows: Let G be a position in turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
214
+ page_content=' In f ′(G) there are as many rooms as tiles in G and the tiles in G and the rooms in f ′(G) are arranged exactly the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
215
+ page_content=' For each piece on a tile in G, there is a corresponding piece in the room corresponding to the tile.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
216
+ page_content=' For any adjacent tiles A and B in G, let A′ and B′ are corresponding rooms in f ′(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
217
+ page_content=' The color of the door between A′ and B′ is the same as the color of A on the B′ side, and the same as the color of B on the A′ side.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
218
+ page_content=' Figure 5 shows this corresponding.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
219
+ page_content=' Here, the game tree of G and f ′(G) are isomorphic.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
220
+ page_content=' We prove that every move in one game has a corresponding move in the other game.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
221
+ page_content=' Assume that in G Left can move a piece on tile A0 to tile An through tiles A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
222
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
223
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
224
+ page_content=' , An−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
225
+ page_content=' Then, A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
226
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
227
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
228
+ page_content=' , An are blue tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
229
+ page_content=' Let A′ 0, A′ 1, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
230
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
231
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
232
+ page_content=' , A′ n be the corresponding rooms in f ′(G).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
233
+ page_content=' Let A′ → B′ be the color 6 Figure 5: Corresponding positions in turning tiles and beyond the door .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
234
+ page_content=' Figure 6: f and f ′ have no inverse functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
235
+ page_content=' of the door between A′ and B′ on the A′ side.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
236
+ page_content=' Then, from the definition of f ′, all of A′ 0 → A′ 1, A′ 1 → A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
237
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
238
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
239
+ page_content=' , A′ n−1 → A′ n are blue.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
240
+ page_content=' Therefore, Left can move a piece from A′ 0 to A′ n through A′ 1, A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
241
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
242
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
243
+ page_content=' , A′ n−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
244
+ page_content=' Conversely, assume that in f(G), Left can move a piece from A′ 0 to A′ n through A′ 1, A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
245
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
246
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
247
+ page_content=' , A′ n−1.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
248
+ page_content=' Then, in G, all corresponding tiles A1, A2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
249
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
250
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
251
+ page_content=' , An are blue tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
252
+ page_content=' Therefore, Left can move a piece from A0 to An through A′ 1, A′ 2, .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
253
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
254
+ page_content=' .' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
255
+ page_content=' , A′ n−1 in the corresponding position in turning tiles.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
256
+ page_content=' Similar proof holds for Right’s moves.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
257
+ page_content=' Thus, from Corollary 1, beyond the door is a universal partizan ruleset.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
258
+ page_content=' Note that f and f ′ have no inverse functions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
259
+ page_content=' For instance, Fig.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
260
+ page_content=' 6 shows positions in go on lattice and beyond the door.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
261
+ page_content=' No position in turning tiles is mapped to these positions by f and f ′ because depending on the order of moves, both Left and Right may move pieces to the same node or the same room in these positions.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
262
+ page_content=' This is somewhat interesting.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
263
+ page_content=' That is, even though in some ways these rulesets are more complex than turning tiles, considering what kind of values 7 LLLL L RRR R R Rcan appear in the rulesets, all of them are the same.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
264
+ page_content=' 3 Conclusion In this paper, we proved go on lattice and beyond the door are universal partizan rulesets by using game-tree preserving reduction.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
265
+ page_content=' The method of re- duction has been used primarily for proving complexity of problems.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
266
+ page_content=' Since this study shows that reduction is also effective in the proof of universality of a game, we can expect that the knowledge accumulated in the study of computational complexity will be utilized in the study of combinatorial game theory, and we can expect further development of combinatorial game theory.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
267
+ page_content=' References [1] M.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
268
+ page_content=' H.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
269
+ page_content=' Albert, R.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
270
+ page_content=' J.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
271
+ page_content=' Nowakowski, and D.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
272
+ page_content=' Wolfe, Lessons in play: An Iintro- duction to combinatorial game theory, A K Peters, Ltd.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
273
+ page_content=' / CRC Press(2007).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
274
+ page_content=' [2] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
275
+ page_content=' Carvalho, C.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
276
+ page_content=' P.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
277
+ page_content=' Santos: A nontrivial surjective map onto the short Conway group, Games of No Chance 5 (U.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
278
+ page_content=' Larsson, Ed.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
279
+ page_content=' ), MSRI Book Series 70, Cambridge University Press, pp.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
280
+ page_content=' 271–284(2019).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
281
+ page_content=' [3] A.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
282
+ page_content=' N.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
283
+ page_content=' Siegel, Combinatorial Game Theory, American Mathematical Soci- ety(2013).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
284
+ page_content=' [4] K.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
285
+ page_content=' Suetsugu, Discovering a new universal partizan ruleset, arXiv:2201.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
286
+ page_content='06069 [math.' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
287
+ page_content='CO](2022).' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
288
+ page_content=' 8' metadata={'source': '/home/zjlab/wf/langchain-ChatGLM/knowledge_base/0dE5T4oBgHgl3EQfOg4z/content/2301.05497v1.pdf'}
0dE5T4oBgHgl3EQfOg4z/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:72e8c58554f43fd8477be187000c7f95a647b3c92aca61c26f9f96eb287a00d3
3
+ size 40690
0tAzT4oBgHgl3EQfDPqY/content/2301.00973v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:c13daab503f1b67bffffdb7c8a8381e73d08fb05ab7c1cd94ef385b4acbc2a33
3
+ size 5629212
0tAzT4oBgHgl3EQfDPqY/content/tmp_files/2301.00973v1.pdf.txt ADDED
@@ -0,0 +1,1482 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2022
2
+ 1
3
+ Detecting Severity of Diabetic Retinopathy from
4
+ Fundus Images using Ensembled Transformers
5
+ Chandranath Adak, Senior Member, IEEE, Tejas Karkera, Soumi Chattopadhyay, Member, IEEE, and
6
+ Muhammad Saqib
7
+ Abstract— Diabetic Retinopathy (DR) is considered one
8
+ of the primary concerns due to its effect on vision loss
9
+ among most people with diabetes globally. The severity of
10
+ DR is mostly comprehended manually by ophthalmologists
11
+ from fundus photography-based retina images. This paper
12
+ deals with an automated understanding of the severity
13
+ stages of DR. In the literature, researchers have focused on
14
+ this automation using traditional machine learning-based
15
+ algorithms and convolutional architectures. However, the
16
+ past works hardly focused on essential parts of the retinal
17
+ image to improve the model performance. In this paper,
18
+ we adopt transformer-based learning models to capture the
19
+ crucial features of retinal images to understand DR sever-
20
+ ity better. We work with ensembling image transformers,
21
+ where we adopt four models, namely ViT (Vision Trans-
22
+ former), BEiT (Bidirectional Encoder representation for im-
23
+ age Transformer), CaiT (Class-Attention in Image Trans-
24
+ formers), and DeiT (Data efficient image Transformers), to
25
+ infer the degree of DR severity from fundus photographs.
26
+ For experiments, we used the publicly available APTOS-
27
+ 2019 blindness detection dataset, where the performances
28
+ of the transformer-based models were quite encouraging.
29
+ Index Terms— Blindness Detection, Diabetic Retinopa-
30
+ thy, Deep learning, Transformers.
31
+ I. INTRODUCTION
32
+ D
33
+ IABETES Mellitus, also known as diabetes, is a disorder
34
+ where the patient experiences increased blood sugar
35
+ levels over a long period. Diabetic Retinopathy (DR) is a mi-
36
+ crovascular complication of diabetes where the retina’s blood
37
+ vessels get damaged, which can lead to poor vision and even
38
+ blindness if untreated [1], [2]. Studies estimated that by twenty
39
+ years after diabetes onset, about 99% (or 60%) of patients
40
+ having type-I (or type-II) diabetes might have DR [1]. With
41
+ a worldwide presence of DR patients of about 126.6 million
42
+ in 2010, the current estimate is roughly around 191 million
43
+ by 2030 [3], [4]. However, about 56% of new DR cases can
44
+ be reduced by timely treatment and monitoring of the severity
45
+ [5]. The ophthalmologist analyzes fundus images for lesion-
46
+ based symptoms like microaneurysms, hard/ soft exudates, and
47
+ hemorrhages to understand the severity stages of DR [1], [2].
48
+ The positive DR is divided into the following stages [5]: (1)
49
+ mild: the earliest stage that can contain microaneurysms, (2)
50
+ C. Adak is with Dept. of CSE, IIT Patna, India-801106, T. Karkera is
51
+ with Atharva College of Engineering, Mumbai, India-400095, S. Chat-
52
+ topadhyay is with the Dept. of CSE, IIIT Guwahati, India-781015, and
53
+ M. Saqib is with Data61, CSIRO, Australia-2122.
54
+ Corresponding author: C. Adak (e-mail: [email protected])
55
+ negative
56
+ mild
57
+ moderate
58
+ severe
59
+ proliferative
60
+ Fig. 1. Fundus images with DR severity stages from APTOS-2019 [7].
61
+ moderate: here, the blood vessels lose the ability to blood
62
+ transportation, (3) severe: here, blockages in blood vessels
63
+ can occur and gives a signal to grow new blood vessels, (4)
64
+ proliferative: the advanced stage where new blood vessels start
65
+ growing. Fig. 1 shows some fundus images representing the
66
+ DR severity stages. Manual examining fundus images for DR
67
+ severity stage grading may bring inconsistencies due to a high
68
+ number of patients, less number of well-trained clinicians, long
69
+ diagnosing time, unclear lesions, etc. Moreover, there may be
70
+ disagreement among ophthalmologists in choosing the correct
71
+ severity grade [6]. Therefore, computer-aided techniques have
72
+ come into the scenario for better diagnosis and broadening the
73
+ prospects of early-stage detection [2].
74
+ Automated DR severity stage detection from fundus pho-
75
+ tographs has been performed for the last two and half decades.
76
+ Earlier, some image processing tools were used [8], [9], but
77
+ the machine learning-based DR became popular in the early
78
+ 2000s. The machine learning-based techniques mostly relied
79
+ on hand-engineered features that were carefully extracted from
80
+ the fundus images and then fed to a classifier, e.g., Random
81
+ Forest (RF) [10], KNN (K-Nearest Neighbors) [11], SVM
82
+ (Support Vector Machine) [12], and ANN (Artificial Neural
83
+ Network) [13]. Although SVM and ANN-based models were
84
+ admired in the DR community, the hand-engineered feature-
85
+ based machine learning models require efficient prior feature
86
+ extraction, which may introduce errors for complex fundus
87
+ images [1], [2]. On the other hand, deep learning-based models
88
+ extract features automatically through convolution operations
89
+ [14], [15]. Besides, from 2012, deep learning architectures
90
+ rose to prominence in the computer vision community, which
91
+ also influenced the DR severity analysis from fundus images
92
+ [1]. The past deep learning-based techniques mostly employed
93
+ CNN (Convolutional Neural Network) [1], [16]. However,
94
+ the ability to give attention to certain regions/features and
95
+ fade the remaining portions hardly exists in classical CNNs.
96
+ For this reason, some contemporary methods incorporated
97
+ attention mechanism [17], [18]. Although multiple research
98
+ arXiv:2301.00973v1 [cs.CV] 3 Jan 2023
99
+
100
+ LOGO2
101
+ GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2022
102
+ works are present in the literature [1], [2] and efforts were
103
+ made to detect the existence of DR in the initial stages
104
+ of its development, still there is a room for improving the
105
+ performance by incorporating higher degrees of automated
106
+ feature extraction using better deep learning models.
107
+ In this paper, we employ the transformer model for leverag-
108
+ ing its MSA (Multi-head Self-Attention) [19] to focus on the
109
+ DR revealing region of the fundus image for understanding
110
+ the severity. Moreover, the transformer model has shown high
111
+ performance in recent days [19], [20]. Initially, we adopted
112
+ ViT (Visual Transformer) [19] for detecting DR severity due to
113
+ its outperformance on image classification tasks. ViT divides
114
+ the input image into a sequence of patches and applies
115
+ global attention [19]. Moreover, since standard ViT requires
116
+ hefty amounts of data, we also adopted some other image
117
+ transformer models, such as CaiT (Class-attention in image
118
+ Transformers) [21], DeiT (Data-efficient image Transformer)
119
+ [22], and BEiT (Bidirectional Encoder representation for im-
120
+ age Transformer) [23]. CaiT is a modified version of ViT and
121
+ employs specific class-attention [21]. DeiT uses knowledge
122
+ distillation, which transfers the knowledge from one network
123
+ to another and builds a teacher-student hierarchical network
124
+ [22]. BEiT is inspired by BERT (Bidirectional Encoder Rep-
125
+ resentations from Transformers) [24] to implement masking
126
+ of image patches and to model the same for pre-training the
127
+ ViT [23]. For experiments, we used the publicly available
128
+ APTOS-2019 blindness detection dataset [7], where the in-
129
+ dividual image transformers did not perform well. Therefore,
130
+ we ensembled the image transformers to seek better predictive
131
+ performance. The ensembled image transformer obtained quite
132
+ encouraging results for DR severity stage detection. This is
133
+ one of the earliest attempts to adopt and ensemble image
134
+ transformers for DR severity stage detection, which is the main
135
+ contribution of this paper.
136
+ The rest of the paper is organized as follows. § II discusses
137
+ the relevant literature about DR and § III presents the proposed
138
+ methodology. Then § IV analyzes and discusses the experi-
139
+ mental results. Finally, § V concludes this paper.
140
+ II. RELATED WORK
141
+ This section briefly presents the literature on DR severity
142
+ detection from fundus images. The modern grading of DR
143
+ severity stages can be traced in the report by ETDRS research
144
+ group [25]. In the past, some image processing-based (e.g.,
145
+ wavelet transform [8], radon transform [9]) strategies were
146
+ published. For the last two decades, machine learning and
147
+ deep learning-based approaches have shown dominance. We
148
+ broadly categorize the related works into (a) hand-engineered
149
+ feature-based models [11], [26], [27], and (b) deep feature-
150
+ based models [2], which are discussed below.
151
+ A. Hand-engineered Feature-based Models
152
+ The hand-engineered feature-based models mostly em-
153
+ ployed RF [26], KNN [28], SVM [27], ANN [29] for detecting
154
+ DR severity stages. Acharya et al. [26] employed a decision
155
+ tree with discrete wavelet/cosine transform-based features ex-
156
+ tracted from retinal images. Casanova et al. [10] introduced RF
157
+ for DR severity stage classification. In [30], RF was also used
158
+ to assess DR risk. KNN classifier was employed in [11] to
159
+ detect drusen, exudates, and cotton-wool spots for diagnosing
160
+ DR. Tang et al. [28] used KNN for retinal hemorrhage detec-
161
+ tion from fundus photographs. In [27], retinal changes due to
162
+ DR was detected by using SVM. Akram et al. [12] used SVM
163
+ and GMM (Gaussian Mixture Model) with enhanced features
164
+ such as shape, intensity, and statistics of the affected region
165
+ to identify microaneurysms for early detection of DR. ANN
166
+ was employed in [13] to classify lesions for detecting DR
167
+ severity. Osareh et al. [31] employed FCM (Fuzzy C-Means)-
168
+ based segmentation and GA (Genetic algorithm)-based feature
169
+ selection with ANN to detect exudates in DR. In [29], PSO
170
+ (Particle Swarm Optimization) was used for feature selection,
171
+ followed by ANN-based DR severity classification.
172
+ B. Deep Feature-based Models
173
+ The past deep architectures mostly used CNN for tackling
174
+ DR severity. For example, Yu et al. [16] used CNN for
175
+ detecting exudates in DR, Chudzik et al. [32] worked on
176
+ microaneurysm detection using CNN with transfer learning
177
+ and layer freezing, Gargeya and Leng [33] employed CNN-
178
+ based deep residual learning to identify fundus images with
179
+ DR. In [4], CNN was also used to identify DR severity stages
180
+ and some related eye diseases, e.g., glaucoma and AMD (Age-
181
+ related Macular Degeneration). In [34], some classical CNN
182
+ architectures (e.g., AlexNet, VGG Net, GoogLeNet, ResNet)
183
+ were employed for DR severity stage detection. Wang et al.
184
+ [17] proposed Zoom-in-Net that combined CNN, attention
185
+ mechanism, and a greedy algorithm to zoom in the region
186
+ of interest for handling DR. A modified DenseNet169 ar-
187
+ chitecture in conjunction with the attention mechanism was
188
+ used in [18] to extract refined features for DR severity
189
+ grading. In [35], a modified Xception architecture was em-
190
+ ployed for DR classification. TAN (Texture Attention Net-
191
+ work) was proposed in [36] by leveraging style (texture
192
+ features) and content (semantic and contextual features) re-
193
+ calibration mechanism. Tymchenko et al. [5] ensembled three
194
+ CNN architectures (EfficientNet-B4 [37], EfficientNet-B5, and
195
+ SE- ResNeXt50 [38]) for DR severity detection. Very recently,
196
+ a few transformer-based models have come out, e.g., CoT-
197
+ XNet [39] that combined contextual transformer and Xception
198
+ architecture, SSiT [40] that employed self-supervised image
199
+ transformers guided by saliency maps.
200
+ III. METHODOLOGY
201
+ This section first formalizes the problem statement, which
202
+ is then followed by the proposal of solution architecture.
203
+ A. Problem Formulation
204
+ In this work, we are given an image I captured by the
205
+ fundus photography, which is input to the architecture. The
206
+ task is to predict the severity stage of diabetic retinopathy (DR)
207
+ among negative, mild, moderate, severe, and proliferative,
208
+ from I. We formulate the task as a multi-class classification
209
+ problem [15]. Here, from I, features are extracted and fed to
210
+
211
+ ADAK et al.: DETECTING SEVERITY OF DIABETIC RETINOPATHY FROM FUNDUS IMAGES USING ENSEMBLED TRANSFORMERS
212
+ 3
213
+ a classifier to predict the DR severity class labels Á, where
214
+ Á = {0, 1, 2, 3, 4} corresponds to {negative, mild, moderate,
215
+ severe, proliferative}, respectively.
216
+ B. Solution Architecture
217
+ For detecting the severity stage of DR from a fundus
218
+ photograph, we adopt image transformers, i.e., ViT (Vision
219
+ Transformer) [19], BEiT (Bidirectional Encoder representation
220
+ for image Transformer) [23], CaiT (Class-attention in image
221
+ Transformers) [21], and DeiT (Data efficient image Trans-
222
+ formers) [22], and ensemble them. However, we preprocess
223
+ raw fundus images before feeding them into the transformers,
224
+ which we discuss first.
225
+ 1) Preprocessing: The performance of deep learning mod-
226
+ els is susceptible to the quality and quantity of data being
227
+ passed to the model. Raw data as input can barely account for
228
+ the best achievable performance of the model due to possible
229
+ pre-existing noise and inconsistency in the images. Therefore,
230
+ a definite flow of preprocessing is essential to train the model
231
+ better [15].
232
+ We now discuss various preprocessing and augmentation
233
+ techniques [15], [41] applied to the raw fundus photographs
234
+ for better learning. In a dataset, the fundus images may be of
235
+ various sizes; therefore, we resize the image I into 256 × 256
236
+ sized image Iz. We perform data augmentations on training set
237
+ (DBtr), where we use centre cropping with central_fraction =
238
+ 0.5, horizontal/vertical flip, random rotations within a range
239
+ of [0o, 45o], random brightness-change with max_delta =
240
+ 0.95, random contrast-change in the interval [0.1, 0.9]. We
241
+ also apply CLAHE (Contrast Limited Adaptive Histogram
242
+ Equalization) [42] on 30% samples of DBtr, which ensures
243
+ over-amplification of contrast in a smaller region instead of
244
+ the entire image.
245
+ 2) Transformer Networks: Deep learning models in com-
246
+ puter vision tasks have long been dominated by CNN (Convo-
247
+ lutional Neural Network) to extract high-level feature maps by
248
+ passing the image through a series of convolution operations
249
+ before feeding into the MLP (Multi-Layer Perceptron) for clas-
250
+ sification [43]. In recent days, transformer models have shown
251
+ a substantial rise in the NLP (Natural Language Processing)
252
+ domain due to its higher performances [20]. In a similar quest
253
+ to leverage high-level performance through transformers, it
254
+ has been introduced in image classification and some other
255
+ computer vision-oriented tasks [19]. Moreover, the transformer
256
+ model has lesser image-specific inductive bias than CNN [19].
257
+ To identify the severity stages of DR from fundus images,
258
+ here we efficiently adopt and ensemble some image transform-
259
+ ers, e.g., ViT [19], BEiT [23], CaiT [21], and DeiT [22].
260
+ Before focusing on our ensembled transformer model, we
261
+ discuss the adaptation of individual image transformers for
262
+ our task, and start with ViT.
263
+ a) Vision Transformer (ViT): The ViT model adopts the idea
264
+ of text-based transformer models [44], where the idea is to take
265
+ the input image as a series of image patches instead of textual
266
+ words, and then extract features to feed it into an MLP [19].
267
+ The pictorial representation of ViT is presented in Fig. 2.
268
+ Here, the input image Iz is converted into a sequence of
269
+ Fig. 2. Workflow of ViT.
270
+ Fig. 3. Internal view of a transformer encoder (TE).
271
+ flattened patches xi
272
+ p (for i = 1, 2, . . . , np), each with size
273
+ wp × wp × cp, where cp denotes the number of channels
274
+ of Iz. Here, cp = 3, since Iz is an RGB fundus image. In
275
+ our task, Iz is of size 256 × 256, and empirically, we choose
276
+ wp = 64, which results np = ( 256
277
+ 64 )2 = 16. Each patch xi
278
+ p is
279
+ flattened further and mapped to a D-dimensional latent vector
280
+ (i.e., patch embedding z0) through transformer layers using a
281
+ trainable linear projection, as below.
282
+ z0 = [xclass ; x1
283
+ p E ; x2
284
+ p E ; . . . ; xnp
285
+ p E] + Epos
286
+ (1)
287
+ where,
288
+ E
289
+ is
290
+ the
291
+ patch
292
+ embedding
293
+ projection,
294
+ E
295
+
296
+ Rwp×wp×C×D; Epos is the position embeddings added to
297
+ patch embeddings to preserve the positional information of
298
+ patches, Epos ∈ R(np+1)×D; xclass = z0
299
+ 0 is a learnable
300
+ embedding [24].
301
+ After mapping patch images to the embedding space with
302
+ positional information, we add a sequence of transformer
303
+ encoders [19], [45]. The internal view of a transformer encoder
304
+ can be seen in Fig. 3, which includes two blocks As and Fn.
305
+ The As and Fn contain MSA (Multi-head Self-Attention) [19]
306
+ and MLP [15] modules, respectively. LN (Layer Normaliza-
307
+ tion) [46] and residual connection [15] are employed before
308
+ and after each of these modules, respectively. This is shown
309
+ in equation 2 with general semantics. Here, the MLP module
310
+ comprises two layers having 4D and D neurons with GELU
311
+ (Gaussian Error Linear Unit) non-linear activation function
312
+
313
+ Patch + Position
314
+ Embedding
315
+ 0
316
+ MLP Head
317
+ Softmax
318
+ *
319
+ Linear Projection of Flattened Patches
320
+ 1
321
+ Transformer Encoder (TE)
322
+ 2
323
+ 3
324
+ dn
325
+ np
326
+ pLx
327
+ LN
328
+ MSA
329
+ LN
330
+ MLP
331
+ zi
332
+ Zt4
333
+ GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2022
334
+ similar to [19].
335
+ z′
336
+ l = MSA(LN(zl−1)) + zl−1;
337
+ zl = MLP(LN(z′
338
+ l)) + z′
339
+ l; l = 1, 2, . . . , L
340
+ (2)
341
+ where, L is the total number of transformer blocks. The core
342
+ component of the transformer encoder is MSA with h heads,
343
+ where each head includes SA (Scaled dot-product Attention)
344
+ [19], [45]. Each head i ∈ {1, 2, ..., h} of MSA calculates a
345
+ tuple comprising query, key, and value [19], i.e., (Qi, Ki, V i)
346
+ as follows.
347
+ Qi = XW i
348
+ Q ; Ki = XW i
349
+ K ; V i = XW i
350
+ V
351
+ (3)
352
+ where, X is the input embedding, and WQ, WK, WV are the
353
+ weight matrices used in the linear transformation. The tuple
354
+ (Q, K, V ) is fed to SA that computes the attention required
355
+ to pay to the input image patches, as below.
356
+ SA(Q, K, V ) = ψ
357
+ �QKT
358
+ √Dh
359
+
360
+ V
361
+ (4)
362
+ where, ψ is softmax function, and Dh = D/h. The outcomes
363
+ of SAs across all heads are concatenated in MSA, as follows.
364
+ MSA(Q, K, V ) = [SA1 ; SA2 ; . . . ; SAh]WL
365
+ (5)
366
+ where WL is a weight matrix.
367
+ After multiple transformer encoder blocks, the <class>
368
+ token [24] enriches with the contextual information. The state
369
+ of the learnable embedding at the outcome of the Transformer
370
+ encoder (z0
371
+ L) acts as the image representation y [19].
372
+ y = LN(z0
373
+ L)
374
+ (6)
375
+ Now, as shown in Fig. 2, we add an MLP head containing
376
+ a hidden layer with 128 neurons. To capture the non-linearity,
377
+ we use Mish [47] here. In the output layer, we keep five
378
+ neurons with softmax activation function to obtain probability
379
+ distribution s(j) in order to classify a fundus photograph into
380
+ the abovementioned five severity stages of DR.
381
+ b) Data efficient image Transformers (DeiT): For a lower
382
+ amount of training data, ViT does not generalize well. In
383
+ this scenario, DeiT can perform reasonably well and uses
384
+ lower memory [22]. DeiT adopts the ViT-specific strategy and
385
+ merges with the teacher-student scheme through knowledge
386
+ distillation [48]. The crux of DeiT is the knowledge distillation
387
+ mechanism, which is basically the knowledge transfer from
388
+ one model (teacher) to another (student) [22]. Here, we use
389
+ EfficientNet-B5 [37] as a teacher model that is trained apriori.
390
+ The student model uses a transformer, which learns from the
391
+ outcome of the teacher model through attention depending
392
+ on a distillation token [22]. In this work, we employ hard-
393
+ label distillation [22], where the hard decision of the teacher
394
+ is considered as a true label, i.e., yt = argmaxcZt(c). The
395
+ hard-label distillation objective is defined as follows.
396
+ Lhard
397
+ global = 0.5 LCE(ψ(Zs), y) + 0.5 LCE(ψ(Zs), yt)
398
+ (7)
399
+ where, LCE is the cross-entropy loss on ground-truth labels
400
+ y, ψ is the softmax function, Zs and Zt are the student and
401
+ teacher models’ logits, respectively. Using label smoothing,
402
+ Fig. 4. The distillation procedure of DeiT.
403
+ hard labels can be converted into soft ones [22].
404
+ In Fig. 4, we present the distillation procedure of DeiT.
405
+ Here, we add the <distillation> token to the transformer,
406
+ which interacts with the <class> and <patch> tokens through
407
+ transformer encoders. The transformer encoder used here is
408
+ similar to the ViT’s one, which includes As and Fn blocks as
409
+ shown in Fig. 3. The objective of the <distillation> token is to
410
+ reproduce the teacher’s predicted label instead of the ground-
411
+ truth label. The <distillation> and <class> tokens are learned
412
+ by back-propagation [15].
413
+ A linear classifier is used in DeiT instead of the MLP head
414
+ of ViT [19], [22] to work efficiently with limited computa-
415
+ tional resources.
416
+ c) Class-attention in image Transformers (CaiT): CaiT
417
+ usually performs better than ViT and DeiT with lesser FLOPs
418
+ and learning parameters [15], when we need to increase the
419
+ depth of the transformer [21]. CaiT is basically an upgraded
420
+ version of ViT, which leverages layers with specific class-
421
+ attention and LayerScale [21]. In Fig. 5, we show the workflow
422
+ of CaiT.
423
+ LayerScale aids CaiT to work at larger depths, where we
424
+ separately multiply a diagonal matrix Mλ on the outputs of
425
+ As and Fn blocks.
426
+ z′
427
+ l = Mλ(λl
428
+ 1, . . . , λl
429
+ D) × MSA(LN(zl−1)) + zl−1;
430
+ zl = Mλ(λ′l
431
+ 1, . . . , λ′l
432
+ D) × MLP(LN(z′
433
+ l)) + z′
434
+ l
435
+ (8)
436
+ where, λl
437
+ i and λ′l
438
+ i are learning parameters, and other symbols
439
+ denote the same as the above-mentioned ViT.
440
+ In CaiT, the transformer layers dealing with self-attention
441
+ Fig. 5. Workflow of CaiT.
442
+
443
+ Self-attention
444
+ lass-attentionO
445
+ 口ADAK et al.: DETECTING SEVERITY OF DIABETIC RETINOPATHY FROM FUNDUS IMAGES USING ENSEMBLED TRANSFORMERS
446
+ 5
447
+ among patches are separated from class-attention layers that
448
+ are introduced to dedicatedly extract the content of the patches
449
+ into a vector, which can be sent to a linear classifier [21]. The
450
+ <class> token is inserted in the latter stage, so that the initial
451
+ layers can perform the self-attention among patches devotedly.
452
+ In the class-attention stage, we alternatively use multi-head
453
+ class-attention (Ac) [21] and Fn, as shown in Fig. 5, and
454
+ update only the class embedding.
455
+ d) Bidirectional Encoder representation for image Trans-
456
+ former (BEiT): BEiT is a self-supervised model having its
457
+ root in the BERT (Bidirectional Encoder Representations from
458
+ Transformers) [23], [24]. In Fig. 6, we present the workflow
459
+ of the pre-training of BEiT.
460
+ The input image Iz is split into patches xi
461
+ p and flattened
462
+ into vectors, similar to the early-mentioned ViT. In BEiT, a
463
+ backbone transformer is engaged, for which we use ViT [19].
464
+ On the other hand, Iz is represented as a sequence of visual
465
+ tokens vt = [vt1, vt2, . . . , vtnp] obtained by a discrete VAE
466
+ (Variational Auto-Encoder) [49]. For visual token learning, we
467
+ employ a tokenizer Tφ(vt | x) to map image pixels x to tokens
468
+ vt, and decoder Dθ(x | vt) for reconstructing input image
469
+ pixels x from vt [23].
470
+ Here, a MIM (Masked Image Modeling) [23] task is per-
471
+ formed to pre-train the image transformers, where some image
472
+ patches are randomly masked, and the corresponding visual
473
+ tokens are then predicted. The masked patches are replaced
474
+ with a learnable embedding e[M]. We feed the corrupted image
475
+ patches xM = {xi
476
+ p : i /∈ M} �{e[M] : i ∈ M} to the
477
+ transformer encoder. Here, M is the set of indices of masked
478
+ positions.
479
+ The encoded representation hL
480
+ i
481
+ is the hidden vector of
482
+ the last transformer layer L for ith patch. For each masked
483
+ Fig. 6. Workflow of BEiT pre-training.
484
+ position, a softmax classifier ψ is used to predict the respective
485
+ visual token, i.e., pMIM(vt′ | xM) = ψ(WMhL
486
+ i + bM); where,
487
+ WM and bM contain learning parameters for linear transfor-
488
+ mation. The pre-training objective of BEiT is to maximize the
489
+ log-likelihood of the correct token vti given xM, as below:
490
+ max
491
+
492
+ x∈ DBtr
493
+ EM
494
+ � �
495
+ i∈M
496
+ log pMIM
497
+
498
+ vti | xM�
499
+
500
+ where, DBtr is the training dataset. The BEiT pre-training
501
+ can be perceived as VAE training [23], [49], where we follow
502
+ two stages, i.e., stage-1: minimizing loss for visual token
503
+ reconstruction, stage-2: modeling masked image, i.e., learning
504
+ prior pMIM by keeping Tφ and Dθ fixed. It can be written as
505
+ follows:
506
+
507
+ (xi,xM
508
+ i
509
+ )
510
+ ∈ DBtr
511
+
512
+
513
+
514
+ �Evti∼Tφ(vt|xi) [log Dθ(xi|vti)]
515
+
516
+ ��
517
+
518
+ stage-1
519
+ + log pMIM
520
+
521
+ ˆ
522
+ vti|xM
523
+ i
524
+
525
+
526
+ ��
527
+
528
+ stage-2
529
+
530
+
531
+
532
+
533
+ where, ˆ
534
+ vti = argmaxvt Tφ(vt | xi).
535
+ 3) Ensembled Transformers: The abovementioned four im-
536
+ age transformers, i.e., ViT [19], DeiT [22], CaiT [21], and
537
+ BEiT [23] are pre-trained on the training set DBtr. We now
538
+ ensemble the transformers for predicting the severity stages
539
+ from fundus images of the test set DBt, since ensembling
540
+ multiple learning algorithms can achieve better performance
541
+ than the constituent algorithms alone [50]. The pictorial rep-
542
+ resentation of ensembled transformers is presented in Fig. 7.
543
+ For an image sample from DBt, we obtain the softmax
544
+ probability distribution s(j) : {P j
545
+ 1 , P j
546
+ 2 , . . . , P j
547
+ nc} over jth
548
+ transformer [15], for j = 1, 2, . . . , nT ; where, nc is the total
549
+ number of classes (severity stages), and nT is count of the
550
+ employed image transformers. Here, �nc
551
+ i=1 P j
552
+ i = 1, nc = 5
553
+ (refer to § III-A), and nT = 4 since we use four separately
554
+ trained distinct image transformers, as mentioned earlier.
555
+ We obtain the severity stages/ class_labels Á|wm and Á|mv
556
+ separately using two combination methods weighted mean and
557
+ majority voting [50], respectively.
558
+ Á|wm = argmaxi P µ
559
+ i ; for i = 1, 2, . . . , nc ;
560
+ P µ
561
+ i =
562
+ �nT
563
+ j=1 αjP j
564
+ i
565
+ �nT
566
+ j=1 αj
567
+ (9)
568
+ Fig. 7. Ensembled transformers.
569
+
570
+ Masked
571
+ Image
572
+ Patches
573
+ Original Image
574
+ latten
575
+ 0
576
+ *
577
+ Tokenizer
578
+ L
579
+ 1
580
+ BEiT Encoder
581
+ MIM Head
582
+ 2
583
+ [M]
584
+ h2
585
+ 3
586
+ Unused at
587
+ Pre-training
588
+ Decoder
589
+ Patch + Position
590
+ Embedding
591
+ Reconstructed ImageViT
592
+ s(1)
593
+ ative
594
+ s(2)
595
+ DeiT
596
+ Mild
597
+ Moderate
598
+ Severe
599
+ CaiT
600
+ s(3)
601
+ Proliferative
602
+ c
603
+ (4)
604
+ BEiT6
605
+ GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2022
606
+ In this task, we choose �nT
607
+ j=1 αj = 1.
608
+ Á|mv = mode
609
+
610
+ argmaxi(P 1
611
+ i ), argmaxi(P 2
612
+ i ), . . . , argmaxi(P nT
613
+ i
614
+ )
615
+
616
+ = mode
617
+
618
+ argmaxi(s(1)), argmaxi(s(2)), . . . , argmaxi(s(nT ))
619
+
620
+ ;
621
+ for i = 1, 2, . . . , nc
622
+ (10)
623
+ In this task, we use cross-entropy as the loss function [41]
624
+ in the employed image transformers. The AdamW optimizer
625
+ is used here due to its weight decay regularization effect
626
+ for tackling overfitting [51]. The training details with hyper-
627
+ parameter tuning are mentioned in Section IV-B.
628
+ IV. EXPERIMENTS AND DISCUSSIONS
629
+ In this section, we present the employed database, followed
630
+ by experimental results with discussions.
631
+ A. Database Employed
632
+ For our computational experiments, we used the publicly
633
+ available training samples of Kaggle APTOS (Asia Pacific
634
+ Tele-Ophthalmology Society) 2019 Blindness Detection dataset
635
+ [7], i.e., APTOS-2019. This database (DB) contains fundus
636
+ image samples of five severity stages of DR, i.e., negative,
637
+ mild, moderate, severe, and proliferative. Fig. 1 shows some
638
+ sample images from this dataset. In DB, a total of 3662 fundus
639
+ images are available, which we divide into training (DBtr) and
640
+ testing (DBt) datasets with a ratio of 7 : 3. As a matter of fact,
641
+ DBtr and DBt sets are disjoint. The sample counts of different
642
+ severity stages/ class_labels (Á) for DBtr and DBt are shown
643
+ in Fig. 8 individually. Here, 49.3% samples are of negative
644
+ DR (Á= 0). Among positive classes, most samples are from
645
+ the moderate stage (Á= 2). From this figure, it can be seen
646
+ DB is imbalanced due to containing a different number of
647
+ samples corresponding to various severity stages. Therefore,
648
+ we augmented the data during the training of our model as
649
+ mentioned in § III-B.1. The data augmentation also helped in
650
+ reducing the overfitting issue [15].
651
+ Fig. 8. Count of samples in APTOS-2019 [7].
652
+ B. Experimental Results
653
+ This section discusses the performed experiments, analyzes
654
+ the model outcome, and compares them with major state-of-
655
+ the-art methods. We begin with discussing the experimental
656
+ settings.
657
+ 1) Experiment Settings: We performed the experiments on
658
+ the TensorFlow-2 framework having Python 3.7.13 over a
659
+ machine with the following configurations: Intel(R) Xeon(R)
660
+ CPU @ 2.00GHz with 52 GB RAM and Tesla T4 16 GB
661
+ GPU. All the results shown here were obtained from DBt.
662
+ The hyper-parameters of the framework were tuned and
663
+ fixed during training with respect to the performance over
664
+ some samples of DBt employed for hyper-parameter tuning.
665
+ For all the image transformers used here (i.e., ViT, DeiT, CaiT,
666
+ and BEiT), we empirically set the following hyper-parameters:
667
+ transformer_layers (L) = 12, embedding_dimension (D) =
668
+ 384, num_heads (h) = 6. The following hyper-parameters
669
+ were selected for AdamW [51]: initial_learning_rate = 10−3;
670
+ exponential decay rates for 1st and 2nd moment estimates, i.e.,
671
+ β1 = 0.9, β2 = 0.999; zero-denominator removal parameter
672
+ (ε) = 10−8; and weight_decay = 10−3/4. For model training,
673
+ the mini-batch size was fixed to 32.
674
+ 2) Model Performance: In Table I, we present the per-
675
+ formance of our ensembled image transformer (EiT) using
676
+ the combination schemes weighted mean (wm) and majority
677
+ voting (mv), where we obtain 94.63% and 91.26% accuracy
678
+ from EiTwm and EiTmv, respectively. We also ensembled
679
+ multiple combinations of our employed transformers, and
680
+ present their performances in this table. Here, the wm scheme
681
+ performed better than mv. As evident from this table, ensem-
682
+ bling various types of transformers improved the performance.
683
+ Among single transformers (for nT = 1), CaiT performed
684
+ the best. For nT = 2 and nT = 3, “BEiT + CaiT” and
685
+ “DeiT + BEiT + CaiT” performed better than other respective
686
+ combinations. Overall, EiTwm attained the best accuracy here.
687
+ TABLE I
688
+ PERFORMANCE OVER VARIOUS ENSEMBLING OF TRANSFORMERS
689
+ nT
690
+ Ensembled Transformers
691
+ Accuracy (%)
692
+ Weighted
693
+ Majority
694
+ mean
695
+ voting
696
+ 1
697
+ ViT
698
+ 82.21
699
+ DeiT
700
+ 85.65
701
+ BEiT
702
+ 86.74
703
+ CaiT
704
+ 86.91
705
+ 2
706
+ ViT + DeiT
707
+ 87.03
708
+ 86.55
709
+ ViT + BEiT
710
+ 87.48
711
+ 87.03
712
+ ViT + CaiT
713
+ 87.77
714
+ 87.21
715
+ DeiT + BEiT
716
+ 88.18
717
+ 87.69
718
+ DeiT + CaiT
719
+ 88.86
720
+ 87.93
721
+ BEiT + CaiT
722
+ 89.28
723
+ 88.12
724
+ 3
725
+ ViT + DeiT + BEiT
726
+ 90.53
727
+ 88.87
728
+ ViT + DeiT + CaiT
729
+ 91.39
730
+ 89.56
731
+ ViT + BEiT + CaiT
732
+ 92.14
733
+ 90.28
734
+ DeiT + BEiT + CaiT
735
+ 93.46
736
+ 90.91
737
+ 4
738
+ ViT + DeiT + BEiT + CaiT
739
+ 94.63
740
+ 91.26
741
+ ( EiT )
742
+ In Fig. 10 of Appendix I, we present the coarse localization
743
+ maps generated by Grad-CAM [52] from the employed indi-
744
+ vidual image transformers to highlight the crucial regions for
745
+ understanding the severity stages.
746
+ a) Various Evaluation Metrics: Besides the accuracy, in
747
+ Table II, we present the performance of EiT with respect to
748
+ some other evaluation metrics, e.g., kappa score, precision,
749
+ recall, F1 score, specificity, balanced accuracy [53]. Here,
750
+ Cohen’s quadratic weighted kappa measures the agreement
751
+
752
+ 2000
753
+ 1800
754
+ DBtr
755
+ DBt
756
+ 1600
757
+ 541
758
+ 1400
759
+ 1200
760
+ sampl
761
+ 1000
762
+ 800
763
+ 300
764
+ #
765
+ 600
766
+ 1264
767
+ 400
768
+ 111
769
+ 699
770
+ 200
771
+ 88
772
+ 259
773
+ 135
774
+ 207
775
+ 0
776
+ 0
777
+ 1
778
+ 2
779
+ 3
780
+ 4
781
+ severity stage/ class
782
+ label (c)ADAK et al.: DETECTING SEVERITY OF DIABETIC RETINOPATHY FROM FUNDUS IMAGES USING ENSEMBLED TRANSFORMERS
783
+ 7
784
+ between human-assigned scores (i.e., DR severity stages)
785
+ and the EiT-predicted scores. Precision analyzes the true
786
+ positive samples among the total positive predictions. Recall
787
+ or sensitivity finds the true positive rate. Similarly, specificity
788
+ computes the true negative rate. F1 score is the harmonic mean
789
+ of precision and recall. Since the employed DB is imbalanced,
790
+ we also compute the balanced accuracy, which is the arithmetic
791
+ mean of sensitivity and specificity. In this table, we can see
792
+ that for both EiTwm and EiTmv, the kappa scores are greater
793
+ than 0.81, which comprehends the “almost perfect agreement”
794
+ between the human rater and EiT [53]. Here, macro means
795
+ the arithmetic mean of all per class precision/ recall/ F1 score.
796
+ TABLE II
797
+ PERFORMANCE OF EiT OVER VARIOUS EVALUATION METRICS
798
+ Metric
799
+ Weighted mean
800
+ Majority voting
801
+ (EiTwm)
802
+ (EiTmv)
803
+ Accuracy (%)
804
+ 94.63
805
+ 91.26
806
+ Kappa score
807
+ 0.92
808
+ 0.87
809
+ Macro Precision (%)
810
+ 90.55
811
+ 84.65
812
+ Macro Recall (%)
813
+ 92.88
814
+ 88.81
815
+ Macro F1-score (%)
816
+ 91.67
817
+ 86.55
818
+ Macro Specificity (%)
819
+ 98.62
820
+ 97.74
821
+ Balanced Accuracy (%)
822
+ 95.75
823
+ 93.27
824
+ b) Individual Class Performance: Table III presents the
825
+ individual performance of EiTwm and EiTmv for detecting
826
+ every severity stage of DR. From this table, we can see our
827
+ models produced the best precision and recall for negative DR
828
+ (Á= 0), and the lowest for severe DR (Á= 3).
829
+ TABLE III
830
+ PERFORMANCE OF EiT ON EVERY DR SEVERITY STAGE
831
+ class_label (Á)
832
+ 0
833
+ 1
834
+ 2
835
+ 3
836
+ 4
837
+ EiTwm
838
+ Precision (%)
839
+ 98.48
840
+ 86.67
841
+ 95.00
842
+ 83.61
843
+ 89.01
844
+ Recall (%)
845
+ 95.75
846
+ 93.69
847
+ 95.00
848
+ 87.93
849
+ 92.05
850
+ F1-score (%)
851
+ 97.09
852
+ 90.04
853
+ 95.00
854
+ 85.71
855
+ 90.50
856
+ Specificity (%)
857
+ 98.56
858
+ 98.38
859
+ 98.12
860
+ 99.04
861
+ 99.01
862
+ EiTmv
863
+ Precision (%)
864
+ 96.74
865
+ 79.67
866
+ 94.14
867
+ 70.59
868
+ 82.11
869
+ Recall (%)
870
+ 93.35
871
+ 88.29
872
+ 91.00
873
+ 82.76
874
+ 88.64
875
+ F1-score (%)
876
+ 95.01
877
+ 83.76
878
+ 92.54
879
+ 76.19
880
+ 85.25
881
+ Specificity (%)
882
+ 96.95
883
+ 97.47
884
+ 97.87
885
+ 98.08
886
+ 98.32
887
+ In each row, the best result is marked bold, second-best is italic, and lowest is underlined.
888
+ 3) Comparison: In Table IV, we present a comparative
889
+ analysis with some major contemporary deep learning archi-
890
+ tectures, e.g., ResNet50 [54], InceptionV3 [55], MobileNetV2
891
+ [56], Xception [57], DenseNet169 (Farag et al. [18]), Efficient-
892
+ Net [37], and SE-ResNeXt50 [38]. We have also compared
893
+ with recently published transformer-based models, i.e., CoT-
894
+ XNet [39], and SSiT [40]. Comparison with some major
895
+ related works [5], [35], [36] can also be seen in this table.
896
+ Our EiTwm outperformed the major state-of-the-art methods
897
+ with respect to accuracy, balanced accuracy, sensitivity, and
898
+ specificity. Our EiTmv also performed quite well in terms of
899
+ balanced accuracy.
900
+ 4) Impact of Hyper-parameters:
901
+ We
902
+ tuned
903
+ the
904
+ hyper-
905
+ parameters and observed their impact on the experiment.
906
+ a) MSA Head Count: We analyzed the performance im-
907
+ pact of the number of heads (h) of MSA (Multi-head Self-
908
+ Attention) in the transformer encoder and present in Fig. 9.
909
+ As evident from this figure, the performance (accuracy) of
910
+ TABLE IV
911
+ COMPARATIVE STUDY
912
+ Method
913
+ Accuracy
914
+ Sensitivity
915
+ Specificity
916
+ Balanced
917
+ (%)
918
+ (%)
919
+ (%)
920
+ Accuracy (%)
921
+ ResNet50 [54]
922
+ 74.64
923
+ 56.52
924
+ 85.71
925
+ 71.12
926
+ InceptionV3 [55]
927
+ 78.72
928
+ 63.64
929
+ 85.37
930
+ 74.51
931
+ MobileNetV2 [56]
932
+ 79.01
933
+ 76.47
934
+ 84.62
935
+ 80.55
936
+ Xception [57]
937
+ 79.59
938
+ 82.35
939
+ 86.32
940
+ 84.34
941
+ Farag et al. [18]
942
+ 82.00
943
+ -
944
+ -
945
+ -
946
+ Kassani et al. [35]
947
+ 83.09
948
+ 88.24
949
+ 87.00
950
+ 87.62
951
+ TAN [36]
952
+ 85.10
953
+ 90.30
954
+ 92.00
955
+ -
956
+ EfficientNet-B4 [37]
957
+ 90.30
958
+ 81.20
959
+ 97.60
960
+ 89.40
961
+ EfficientNet-B5 [37]
962
+ 90.70
963
+ 80.70
964
+ 97.70
965
+ 89.20
966
+ SE-ResNeXt50 [38]
967
+ 92.40
968
+ 87.10
969
+ 98.20
970
+ 92.65
971
+ Tymchenko et al. [5]
972
+ 92.90
973
+ 86.00
974
+ 98.30
975
+ 92.15
976
+ CoT-XNet [39]
977
+ 84.18
978
+ -
979
+ 95.74
980
+ -
981
+ SSiT [40]
982
+ 92.97
983
+ -
984
+ -
985
+ -
986
+ EiTmv [ours]
987
+ 91.26
988
+ 88.81
989
+ 97.74
990
+ 93.28
991
+ EiTwm [ours]
992
+ 94.63
993
+ 92.88
994
+ 98.62
995
+ 95.75
996
+ In each column, the best result is marked bold, and the second-best is underlined.
997
+ Fig. 9. Impact of number of heads (h) in MSA on model performance.
998
+ both EiTmv and EiTwm increased with the increment of h
999
+ till h = 6, and started decreasing thereafter.
1000
+ b) Weights αj of EiTwm: We tuned the weights αj (refer
1001
+ to Eqn. 9) to see its impact on the performance of EiTwm.
1002
+ We obtained the best accuracy of 94.63% from EiTwm for
1003
+ α1 = α2 = 0.1, and α3 = α4 = 0.4. The performance of
1004
+ EiTwm during tuning of αj’s is shown in Table V.
1005
+ In Table VI, we also present the tuned αj’s that aided in
1006
+ obtaining the best performing ensembled transformers of Table
1007
+ I.
1008
+ 5) Ablation Study: We here present the performed ablation
1009
+ study by ablating individual transformers. Our EiT is actually
1010
+ an ensembling of four different image transformers, i.e., ViT,
1011
+ DeiT, CaiT, and BEiT. We ablated each transformer and
1012
+ observed performance degradation than EiT. For example,
1013
+ considering the weighted mean scheme, when we ablated CaiT
1014
+ from EiT, the accuracy dropped by 4.1%. Similarly, ablating
1015
+ BEiT and CaiT deteriorated the accuracy by 7.6%. For our
1016
+ task, the best individual transformer (CaiT) attained 7.72%
1017
+ lower accuracy than EiTwm. More examples can be observed
1018
+ in Table I.
1019
+ 6) Pre-training with Other Datasets: We checked the perfor-
1020
+ mance of our EiT model by pre-training with some other
1021
+ dataset. We took 1200 images of MESSIDOR [58] with
1022
+ adjudicated grades by [59] (say, DBM). From IDRiD [60],
1023
+ we also used “Disease Grading” dataset containing 516 images
1024
+ (say, DBI). Here, we made four training set setups from DBM,
1025
+ by taking 25%, 50%, 75%, and 100% of samples of DBM.
1026
+
1027
+ 96
1028
+ 94.63
1029
+ EiTmv
1030
+ 94
1031
+ 92.34
1032
+ 91.92
1033
+ 92
1034
+ 91
1035
+ 90.28
1036
+ 90
1037
+ 89.43
1038
+ 88.59
1039
+ 87.67
1040
+ 88
1041
+ 87
1042
+ 86
1043
+ 84
1044
+ 82
1045
+ 80
1046
+ 6
1047
+ 8
1048
+ 108
1049
+ GENERIC COLORIZED JOURNAL, VOL. XX, NO. XX, XXXX 2022
1050
+ TABLE V
1051
+ PERFORMANCE OF EiTwm BY TUNING WEIGHTS αj
1052
+ α1
1053
+ α2
1054
+ α3
1055
+ α4
1056
+ Accuracy (%)
1057
+ 0.25
1058
+ 0.25
1059
+ 0.25
1060
+ 0.25
1061
+ 89.53
1062
+ 0.85
1063
+ 0.05
1064
+ 0.05
1065
+ 0.05
1066
+ 82.29
1067
+ 0.05
1068
+ 0.85
1069
+ 0.05
1070
+ 0.05
1071
+ 85.78
1072
+ 0.05
1073
+ 0.05
1074
+ 0.85
1075
+ 0.05
1076
+ 86.92
1077
+ 0.05
1078
+ 0.05
1079
+ 0.05
1080
+ 0.85
1081
+ 87.05
1082
+ 0.7
1083
+ 0.1
1084
+ 0.1
1085
+ 0.1
1086
+ 82.35
1087
+ 0.1
1088
+ 0.7
1089
+ 0.1
1090
+ 0.1
1091
+ 85.91
1092
+ 0.1
1093
+ 0.1
1094
+ 0.7
1095
+ 0.1
1096
+ 87.04
1097
+ 0.1
1098
+ 0.1
1099
+ 0.1
1100
+ 0.7
1101
+ 87.20
1102
+ 0.5
1103
+ 0.167
1104
+ 0.167
1105
+ 0.166
1106
+ 82.88
1107
+ 0.166
1108
+ 0.5
1109
+ 0.167
1110
+ 0.167
1111
+ 86.35
1112
+ 0.167
1113
+ 0.166
1114
+ 0.5
1115
+ 0.167
1116
+ 87.62
1117
+ 0.167
1118
+ 0.167
1119
+ 0.166
1120
+ 0.5
1121
+ 87.74
1122
+ 0.3
1123
+ 0.3
1124
+ 0.2
1125
+ 0.2
1126
+ 88.16
1127
+ 0.3
1128
+ 0.2
1129
+ 0.3
1130
+ 0.2
1131
+ 89.58
1132
+ 0.3
1133
+ 0.2
1134
+ 0.2
1135
+ 0.3
1136
+ 90.27
1137
+ 0.2
1138
+ 0.3
1139
+ 0.3
1140
+ 0.2
1141
+ 90.85
1142
+ 0.2
1143
+ 0.3
1144
+ 0.2
1145
+ 0.3
1146
+ 91.67
1147
+ 0.2
1148
+ 0.2
1149
+ 0.3
1150
+ 0.3
1151
+ 92.72
1152
+ 0.4
1153
+ 0.4
1154
+ 0.1
1155
+ 0.1
1156
+ 91.18
1157
+ 0.4
1158
+ 0.1
1159
+ 0.4
1160
+ 0.1
1161
+ 91.49
1162
+ 0.4
1163
+ 0.1
1164
+ 0.1
1165
+ 0.4
1166
+ 92.15
1167
+ 0.1
1168
+ 0.4
1169
+ 0.4
1170
+ 0.1
1171
+ 92.84
1172
+ 0.1
1173
+ 0.4
1174
+ 0.1
1175
+ 0.4
1176
+ 93.47
1177
+ 0.1
1178
+ 0.1
1179
+ 0.4
1180
+ 0.4
1181
+ 94.63
1182
+ TABLE VI
1183
+ TUNED WEIGHTS αj FOR TRANSFORMERS ENSEMBLED WITH
1184
+ WEIGHTED MEAN
1185
+ Transformerswm
1186
+ α1
1187
+ α2
1188
+ α3
1189
+ α4
1190
+ ViT + DeiT
1191
+ 0.25
1192
+ 0.75
1193
+ -
1194
+ -
1195
+ ViT + BEiT
1196
+ 0.4
1197
+ 0.6
1198
+ -
1199
+ -
1200
+ ViT + CaiT
1201
+ 0.4
1202
+ 0.6
1203
+ -
1204
+ -
1205
+ DeiT + BEiT
1206
+ 0.4
1207
+ 0.6
1208
+ -
1209
+ -
1210
+ DeiT + CaiT
1211
+ 0.3
1212
+ 0.7
1213
+ -
1214
+ -
1215
+ BEiT + CaiT
1216
+ 0.5
1217
+ 0.5
1218
+ -
1219
+ -
1220
+ ViT + DeiT + BEiT
1221
+ 0.2
1222
+ 0.3
1223
+ 0.5
1224
+ -
1225
+ ViT + DeiT + CaiT
1226
+ 0.2
1227
+ 0.3
1228
+ 0.5
1229
+ -
1230
+ ViT + BEiT + CaiT
1231
+ 0.2
1232
+ 0.4
1233
+ 0.4
1234
+ -
1235
+ DeiT + BEiT + CaiT
1236
+ 0.3
1237
+ 0.3
1238
+ 0.4
1239
+ -
1240
+ ViT + DeiT + BEiT + CaiT
1241
+ 0.1
1242
+ 0.1
1243
+ 0.4
1244
+ 0.4
1245
+ Similarly, four training setups were generated from DBI. As
1246
+ mentioned in § IV-A, we divided APTOS-2019 database (DB)
1247
+ in training (DBtr) and test (DBt) sets with a ratio of 7 : 3. In
1248
+ Table VII, we present the performance of EiT on DBt, while
1249
+ pre-training with DBM and DBI, and training with DBtr.
1250
+ It can be observed that the performance of EiT improved
1251
+ slightly when pre-trained with more data from other datasets.
1252
+ TABLE VII
1253
+ ACCURACY (%) OF EiT WITH PRE-TRAINING
1254
+ Pre-training data
1255
+ 25%
1256
+ 50%
1257
+ 75%
1258
+ 100%
1259
+ EiTwm
1260
+ DBM
1261
+ 94.71
1262
+ 94.78
1263
+ 94.83
1264
+ 94.88
1265
+ DBI
1266
+ 94.65
1267
+ 94.67
1268
+ 94.7
1269
+ 94.79
1270
+ DBM + DBI
1271
+ 94.73
1272
+ 94.85
1273
+ 94.98
1274
+ 95.13
1275
+ N.A.
1276
+ 94.63
1277
+ EiTmv
1278
+ DBM
1279
+ 91.35
1280
+ 91.48
1281
+ 91.56
1282
+ 91.61
1283
+ DBI
1284
+ 91.27
1285
+ 91.32
1286
+ 91.34
1287
+ 91.35
1288
+ DBM + DBI
1289
+ 91.42
1290
+ 91.6
1291
+ 91.68
1292
+ 91.75
1293
+ N.A.
1294
+ 91.26
1295
+ N.A.: without pre-training data
1296
+ V. CONCLUSION
1297
+ In this paper, we tackle the problem of automated severity
1298
+ stage detection of DR from fundus images. For this purpose,
1299
+ we propose two ensembled image transformers, EiTwm and
1300
+ EiTmv, by using weighted mean and majority voting combi-
1301
+ nation schemes, respectively. We here adopt four transformer
1302
+ models, i.e., ViT, DeiT, CaiT, and BEiT. For experimentation,
1303
+ we employed the publicly available APTOS-2019 blindness
1304
+ detection dataset, on which EiTwm and EiTmv attained
1305
+ accuracies of 94.63% and 91.26%, respectively. Although
1306
+ the employed dataset was imbalanced, our models performed
1307
+ quite well. Our EiTwm outperformed the major state-of-the-
1308
+ art techniques. We also performed an ablation study and
1309
+ observed the importance of the ensembling over the individual
1310
+ transformers.
1311
+ In the future, we will endeavor to improve the model perfor-
1312
+ mance with some imbalanced learning techniques. Currently,
1313
+ our model does not perform any lesion segmentation, which
1314
+ we will also attempt to explore some implicit characteristics
1315
+ of fundus images due to DR.
1316
+ APPENDIX I
1317
+ QUALITATIVE VISUALIZATION
1318
+ As mentioned in § IV-B.2, we present the Grad-CAM maps
1319
+ of the employed individual image transformers in Fig. 10.
1320
+ negative
1321
+ mild
1322
+ moderate
1323
+ severe
1324
+ proliferative
1325
+ Fig. 10.
1326
+ Fundus images (1st row) with Grad-CAM maps for ViT, DeiT,
1327
+ BEiT, CaiT as shown in 2nd, 3rd, 4th, 5th rows, respectively.
1328
+ REFERENCES
1329
+ [1] S. Stolte and R. Fang, “A survey on medical image analysis in diabetic
1330
+ retinopathy,” Medical image analysis, vol. 64, p. 101742, 2020.
1331
+ [2] N. Asiri et al., “Deep learning based computer-aided diagnosis systems
1332
+ for diabetic retinopathy: A survey,” Artificial intelligence in medicine,
1333
+ vol. 99, p. 101701, 2019.
1334
+ [3] Y. Zheng et al., “The worldwide epidemic of diabetic retinopathy,”
1335
+ Indian journal of ophthalmology, vol. 60, no. 5, p. 428, 2012.
1336
+ [4] D. S. W. Ting et al., “Development and validation of a deep learning
1337
+ system for diabetic retinopathy and related eye diseases using retinal
1338
+ images from multiethnic populations with diabetes,” JAMA, vol. 318,
1339
+ no. 22, pp. 2211–2223, 2017.
1340
+ [5] B. Tymchenko et al., “Deep learning approach to diabetic retinopathy
1341
+ detection,” in ICPRAM, 2020, pp. 501–509.
1342
+
1343
+ SADAK et al.: DETECTING SEVERITY OF DIABETIC RETINOPATHY FROM FUNDUS IMAGES USING ENSEMBLED TRANSFORMERS
1344
+ 9
1345
+ [6] J. Krause et al., “Grader variability and the importance of reference stan-
1346
+ dards for evaluating machine learning models for diabetic retinopathy,”
1347
+ Ophthalmology, vol. 125, no. 8, pp. 1264–1272, 2018.
1348
+ [7] APTOS 2019 Blindness Detection. [Online]. Available: https://www.
1349
+ kaggle.com/competitions/aptos2019-blindness-detection
1350
+ [8] G. Quellec et al., “Optimal wavelet transform for the detection of
1351
+ microaneurysms in retina photographs,” IEEE transactions on medical
1352
+ imaging, vol. 27, no. 9, pp. 1230–1241, 2008.
1353
+ [9] L. Giancardo et al., “Microaneurysm detection with radon transform-
1354
+ based classification on retina images,” in EMBS, 2011, pp. 5939–5942.
1355
+ [10] R. Casanova et al., “Application of random forests methods to diabetic
1356
+ retinopathy classification analyses,” PLOS one, vol. 9, no. 6, p. e98587,
1357
+ 2014.
1358
+ [11] M. Niemeijer et al., “Automated detection and differentiation of drusen,
1359
+ exudates, and cotton-wool spots in digital color fundus photographs for
1360
+ diabetic retinopathy diagnosis,” Investigative ophthalmology & visual
1361
+ science, vol. 48, no. 5, pp. 2260–2267, 2007.
1362
+ [12] M. U. Akram et al., “Identification and classification of microaneurysms
1363
+ for early detection of diabetic retinopathy,” Pattern recognition, vol. 46,
1364
+ no. 1, pp. 107–116, 2013.
1365
+ [13] D. Usher et al., “Automated detection of diabetic retinopathy in digital
1366
+ retinal images: a tool for diabetic retinopathy screening,” Diabetic
1367
+ Medicine, vol. 21, no. 1, pp. 84–90, 2004.
1368
+ [14] J. D. Bodapati et al., “Deep convolution feature aggregation: an appli-
1369
+ cation to diabetic retinopathy severity level prediction,” Signal, Image
1370
+ and Video Processing, vol. 15, no. 5, pp. 923–930, 2021.
1371
+ [15] A. Zhang, Z. C. Lipton, M. Li, and A. J. Smola, “Dive into deep
1372
+ learning,” arXiv:2106.11342, 2021.
1373
+ [16] S. Yu et al., “Exudate detection for diabetic retinopathy with convolu-
1374
+ tional neural networks,” in EMBC, 2017, pp. 1744–1747.
1375
+ [17] Z. Wang et al., “Zoom-in-net: Deep mining lesions for diabetic retinopa-
1376
+ thy detection,” in MICCAI, 2017, pp. 267–275.
1377
+ [18] M. M. Farag et al., “Automatic severity classification of diabetic
1378
+ retinopathy based on densenet and convolutional block attention mod-
1379
+ ule,” IEEE Access, vol. 10, pp. 38 299–38 308, 2022.
1380
+ [19] A. Dosovitskiy et al., “An image is worth 16x16 words: Transformers
1381
+ for image recognition at scale,” arXiv:2010.11929, 2020.
1382
+ [20] A. M. Bra¸soveanu and R. Andonie, “Visualizing transformers for nlp:
1383
+ a brief survey,” in Int. Conf. on Information Visualisation (IV).
1384
+ IEEE,
1385
+ 2020, pp. 270–279.
1386
+ [21] H. Touvron et al., “Going deeper with image transformers,” in ICCV,
1387
+ 2021, pp. 32–42.
1388
+ [22] ——, “Training data-efficient image transformers & distillation through
1389
+ attention,” in ICML, 2021, pp. 10 347–10 357.
1390
+ [23] H. Bao, L. Dong, and F. Wei, “BEiT: BERT Pre-Training of Image
1391
+ Transformers,” in ICLR, arXiv:2106.08254, 2022.
1392
+ [24] J. Devlin et al., “BERT: Pre-training of Deep Bidirectional Transformers
1393
+ for Language Understanding,” arXiv:1810.04805, 2018.
1394
+ [25] “Grading diabetic retinopathy from stereoscopic color fundus pho-
1395
+ tographs—an extension of the modified airlie house classification: Etdrs
1396
+ report number 10,” Ophthalmology, vol. 98, no. 5, Supplement, pp. 786–
1397
+ 806, 1991.
1398
+ [26] U. R. Acharya et al., “Automated diabetic macular edema (dme) grading
1399
+ system using dwt, dct features and maculopathy index,” Computers in
1400
+ biology and medicine, vol. 84, pp. 59–68, 2017.
1401
+ [27] K. M. Adal et al., “An automated system for the detection and clas-
1402
+ sification of retinal changes due to red lesions in longitudinal fundus
1403
+ images,” IEEE transactions on biomedical engineering, vol. 65, no. 6,
1404
+ pp. 1382–1390, 2017.
1405
+ [28] L. Tang et al., “Splat feature classification with application to retinal
1406
+ hemorrhage detection in fundus images,” IEEE Transactions on Medical
1407
+ Imaging, vol. 32, no. 2, pp. 364–375, 2013.
1408
+ [29] A. Herliana et al., “Feature selection of diabetic retinopathy disease
1409
+ using particle swarm optimization and neural network,” in CITSM.
1410
+ IEEE, 2018, pp. 1–4.
1411
+ [30] S. Sanromà et al., “Assessment of diabetic retinopathy risk with random
1412
+ forests.” in ESANN, 2016.
1413
+ [31] A. Osareh et al., “A computational-intelligence-based approach for
1414
+ detection of exudates in diabetic retinopathy images,” IEEE Transactions
1415
+ on Information Technology in Biomedicine, vol. 13, no. 4, pp. 535–545,
1416
+ 2009.
1417
+ [32] P. Chudzik et al., “Microaneurysm detection using deep learning and
1418
+ interleaved freezing,” in Medical imaging 2018: image processing, vol.
1419
+ 10574.
1420
+ SPIE, 2018, pp. 379–387.
1421
+ [33] R. Gargeya and T. Leng, “Automated identification of diabetic retinopa-
1422
+ thy using deep learning,” Ophthalmology, vol. 124, no. 7, pp. 962–969,
1423
+ 2017.
1424
+ [34] S. Wan et al., “Deep convolutional neural networks for diabetic retinopa-
1425
+ thy detection by image classification,” Computers & Electrical Engineer-
1426
+ ing, vol. 72, pp. 274–282, 2018.
1427
+ [35] S. H. Kassani et al., “Diabetic retinopathy classification using a modified
1428
+ xception architecture,” in ISSPIT, 2019, pp. 1–6.
1429
+ [36] M. D. Alahmadi, “Texture attention network for diabetic retinopathy
1430
+ classification,” IEEE Access, vol. 10, pp. 55 522–55 532, 2022.
1431
+ [37] M. Tan and Q. Le, “Efficientnet: Rethinking model scaling for convo-
1432
+ lutional neural networks,” in ICML, 2019, pp. 6105–6114.
1433
+ [38] J. Hu et al., “Squeeze-and-excitation networks,” in CVPR, 2018, pp.
1434
+ 7132–7141.
1435
+ [39] S. Zhao et al., “Cot-xnet: Contextual transformer with xception network
1436
+ for diabetic retinopathy grading,” Physics in Medicine & Biology, 2022.
1437
+ [40] Y. Huang et al., “Ssit: Saliency-guided self-supervised image trans-
1438
+ former for diabetic retinopathy grading,” arXiv:2210.10969, 2022.
1439
+ [41] I. Goodfellow et al., Deep learning.
1440
+ MIT press, 2016.
1441
+ [42] V. Stimper et al., “Multidimensional contrast limited adaptive histogram
1442
+ equalization,” IEEE Access, vol. 7, pp. 165 437–165 447, 2019.
1443
+ [43] D. Sarvamangala et al., “Convolutional neural networks in medical
1444
+ image understanding: a survey,” Evolutionary intel., pp. 1–22, 2021.
1445
+ [44] T. Wolf et al., “Transformers: State-of-the-Art Natural Language Pro-
1446
+ cessing,” in EMNLP: System Demonstrations, 2020, pp. 38–45.
1447
+ [45] A. Vaswani et al., “Attention is all you need,” Advances in neural
1448
+ information processing systems, vol. 30, 2017.
1449
+ [46] J. L. Ba, J. R. Kiros, and G. E. Hinton, “Layer normalization,”
1450
+ arXiv:1607.06450, 2016.
1451
+ [47] D. Misra, “Mish: A self regularized non-monotonic neural activation
1452
+ function,” BMVC, Paper #928, 2020.
1453
+ [48] G. Hinton, O. Vinyals, and J. Dean, “Distilling the Knowledge in a
1454
+ Neural Network,” in NIPS Deep Learning and Representation Learning
1455
+ Workshop, arXiv:1503.02531, 2015.
1456
+ [49] A. Ramesh et al., “Zero-shot text-to-image generation,” in ICML, 2021,
1457
+ pp. 8821–8831.
1458
+ [50] L. Rokach, “Ensemble-based Classifiers,” Artificial intelligence review,
1459
+ vol. 33, no. 1, pp. 1–39, 2010.
1460
+ [51] I. Loshchilov and F. Hutter, “Decoupled weight decay regularization,”
1461
+ ICLR, arXiv:1711.05101, 2019.
1462
+ [52] R. Selvaraju et al., “Grad-CAM: Visual Explanations from Deep Net-
1463
+ works via Gradient-based Localization,” in ICCV, 2017, pp. 618–626.
1464
+ [53] M. Grandini, E. Bagli, and G. Visani, “Metrics for multi-class classifi-
1465
+ cation: an overview,” arXiv preprint arXiv:2008.05756, 2020.
1466
+ [54] K. He et al., “Deep residual learning for image recognition,” in CVPR,
1467
+ 2016, pp. 770–778.
1468
+ [55] C. Szegedy et al., “Rethinking the inception architecture for computer
1469
+ vision,” in CVPR, 2016, pp. 2818–2826.
1470
+ [56] M. Sandler et al., “Mobilenetv2: Inverted residuals and linear bottle-
1471
+ necks,” in CVPR, 2018, pp. 4510–4520.
1472
+ [57] F. Chollet, “Xception: Deep learning with depthwise separable convo-
1473
+ lutions,” in CVPR, 2017, pp. 1251–1258.
1474
+ [58] E. Decencière et al., “Feedback on a publicly distributed image database:
1475
+ the Messidor database,” Image Analysis & Stereology, vol. 33, no. 3, pp.
1476
+ 231–234, 2014.
1477
+ [59] J. Krause et al., “Grader variability and the importance of reference stan-
1478
+ dards for evaluating machine learning models for diabetic retinopathy,”
1479
+ Ophthalmology, vol. 125, no. 8, pp. 1264–1272, 2018.
1480
+ [60] P. Porwal et al., “Indian Diabetic Retinopathy Image Dataset (IDRiD),”
1481
+ 2018. [Online]. Available: https://dx.doi.org/10.21227/H25W98
1482
+
0tAzT4oBgHgl3EQfDPqY/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
0tAzT4oBgHgl3EQfDPqY/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:cc427607bd91fe7c63af46d8869ec43535372a3a594fd7019d44feeaa3e8c4cc
3
+ size 149953
0tFPT4oBgHgl3EQfTjTq/content/tmp_files/2301.13054v1.pdf.txt ADDED
@@ -0,0 +1,1564 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.13054v1 [cs.FL] 30 Jan 2023
2
+ Monadic Expressions and their Derivatives
3
+ Samira Attou1, Ludovic Mignot2, Clément Miklarz2, and Florent Nicart2
4
+ 1 Université Gustave Eiffel,
5
+ 5 Boulevard Descartes — Champs s/ Marne
6
+ 77454 Marne-la-Vallée Cedex 2
7
+ 2 GR2IF,
8
+ Université de Rouen Normandie,
9
+ Avenue de l’Université,
10
+ 76801 Saint-Étienne-du-Rouvray, France
11
12
+ {ludovic.mignot,clement.miklarz1, florent.nicart}@univ-rouen.fr
13
+ Abstract. We propose another interpretation of well-known derivatives computations from regular expres-
14
+ sions, due to Brzozowski, Antimirov or Lombardy and Sakarovitch, in order to abstract the underlying data
15
+ structures (e.g. sets or linear combinations) using the notion of monad. As an example of this generalization
16
+ advantage, we first introduce a new derivation technique based on the graded module monad and then show an
17
+ application of this technique to generalize the parsing of expression with capture groups and back references.
18
+ We also extend operators defining expressions to any n-ary functions over value sets, such as classical operations
19
+ (like negation or intersection for Boolean weights) or more exotic ones (like algebraic mean for rational weights).
20
+ Moreover, we present how to compute a (non-necessarily finite) automaton from such an extended expression,
21
+ using the Colcombet and Petrisan categorical definition of automata. These category theory concepts allow us
22
+ to perform this construction in a unified way, whatever the underlying monad.
23
+ Finally, to illustrate our work, we present a Haskell implementation of these notions using advanced techniques
24
+ of functional programming, and we provide a web interface to manipulate concrete examples.
25
+ 1
26
+ Introduction
27
+ This paper is an extended version of [2].
28
+ Regular expressions are a classical way to represent associations between words and value sets. As an example,
29
+ classical regular expressions denote sets of words and regular expressions with multiplicities denote formal series.
30
+ From a regular expression, solving the membership test (determining whether a word belongs to the denoted
31
+ language) or the weighting test (determining the weight of a word in the denoted formal series) can be solved,
32
+ following Kleene theorems [11,17] by computing a finite automaton, such as the position automaton [9,3,5,6].
33
+ Another family of methods to solve these tests is the family of derivative computations, that does not require the
34
+ construction of a whole automaton. The common point of these techniques is to transform the test for an arbitrary
35
+ word into the test for the empty word, which can be easily solved in a purely syntactical way (i.e. by induction over
36
+ the structure of expressions). Brzozowski [4] shows how to compute, from a regular expression E and a word w, a
37
+ regular expression dw(E) denoting the set of words w′ such that ww′ belongs to the language denoted by E. Solving
38
+ the membership test hence becomes the membership test for the empty word in the expression dw(E). Antimirov [1]
39
+ modifies this method in order to produce sets of expressions instead of expressions, i.e. defines the partial derivatives
40
+ ∂w(E) as a set of expressions the sum of which denotes the same language as dw(E). If the number of derivatives
41
+ is exponential w.r.t. the length |E| of E in the worst case3, the partial derivatives produce at most a linear number
42
+ of expressions w.r.t. |E|. Lombardy and Sakarovitch [13] extends these methods to expressions with multiplicities.
43
+ Finally, Sulzmann and Lu [18] apply these derivation techniques to parse POSIX expressions.
44
+ It is well-known that these methods are based on a common operation, the quotient of languages. Furthermore,
45
+ Antimirov’s method can be interpreted as the derivation of regular expression with multiplicities in the Boolean
46
+ semiring. However, the Brzozowski computation does not produce the same expressions (i.e. equality over the syntax
47
+ trees) as the Antimirov one.
48
+ Main contributions: In this paper, we present a unification of these computations by applying notions of
49
+ category theory to the category of sets, and show how to compute categorical automata as defined in [7], by reinter-
50
+ preting the work started in [15]. We make use of classical monads to model well-known derivatives computations.
51
+ Furthermore, we deal with extended expressions in a general way: in this paper, expressions can support extended
52
+ 3 as far as rules of associativity, commutativity and idempotence of the sum are considered, possibly infinite otherwise.
53
+
54
+ operators like complement, intersection, but also any n-ary function (algebraic mean, extrema multiplications, etc.).
55
+ The main difference with [15] is that we formally state the languages and series that the expressions denote in an
56
+ inherent way w.r.t. the underlying monads.
57
+ More precisely, this paper presents:
58
+ – an extension of expressions to any n-ary function over the value set,
59
+ – a monadic generalization of expressions,
60
+ – a solution for the membership/weight test for these expressions,
61
+ – a computation of categorical derivative automata,
62
+ – a new monad that fits with the extension to n-ary functions,
63
+ – an illustration implemented in Haskell using advanced functional programming,
64
+ – an extension to capture groups and back references expressions.
65
+ Motivation: The unification of derivation techniques is a goal by itself. Moreover, the formal tools used to
66
+ achieve this unification are also useful: Monads offer both theoretical and practical advantages. Indeed, from a
67
+ theoretical point of view, these structures allow the abstraction of properties and focus on the principal mechanisms
68
+ that allow solving the membership and weight problems. Besides, the introduction of exotic monads can also facilitate
69
+ the study of finiteness of derivated terms. From a practical point of view, monads are easy to implement (even in
70
+ some other languages than Haskell) and allow us to produce compact and safe code. Finally, we can easily combine
71
+ different algebraic structures or add some technical functionalities (capture groups, logging, nondeterminism, etc.)
72
+ thanks to notions like monad transformers [10] that we consider in this paper.
73
+ This paper is structured as follows. In Section 2, we gather some preliminary material, like algebraic structures
74
+ or category theory notions. We also introduce some functions well-known to the Haskell community that can allow
75
+ us to reduce the size of our equations. We then structurally define the expressions we deal with, the associated series
76
+ and the weight test for the empty word in Section 3. In order to extend this test to any arbitrary word, we first state
77
+ in Section 4 some properties required by the monads we consider. Once this so-called support is determined, we show
78
+ in Section 5 how to compute the derivatives. The computation of derivative automata is explained in Section 6.
79
+ A new monad and its associated derivatives computation is given in Section 7. An implementation is presented
80
+ in Section 8. Finally, we show how to (alternatively to [18]) compute derivatives of capture group expressions in
81
+ Section 9 and show that as far as the same operators are concerned, the derivative formulae are the same whatever
82
+ the underlying monad is.
83
+ 2
84
+ Preliminaries
85
+ We denote by S → S′ the set of functions from a set S to a set S′. The notation λx → f(x) is an equivalent notation
86
+ for a function f.
87
+ A monoid is a set S endowed with an associative operation and a unit element. A semiring is a structure
88
+ (S, ×, +, 1, 0) such that (S, ×, 1) is a monoid, (S, +, 0) is a commutative monoid, × distributes over + and 0 is an
89
+ annihilator for ×. A starred semiring is a semiring with a unary function ⋆ such that
90
+ k⋆ = 1 + k × k⋆ = 1 + k⋆ × k.
91
+ A K-series over the free monoid (Σ∗, ·, ε) associated with an alphabet Σ, for a semiring K = (K, ×, +, 1, 0), is
92
+ a function from Σ∗ to K. The set of K-series can be endowed with the structure of semiring as follows:
93
+ 1(w) =
94
+
95
+ 1
96
+ if w = ε,
97
+ 0
98
+ otherwise,
99
+ 0(w) = 0,
100
+ (S1 + S2)(w) = S1(w) + S2(w),
101
+ (S1 × S2)(w) =
102
+
103
+ u·v=w
104
+ S1(u) × S2(v).
105
+ Furthermore, if S1(ε) = 0 (i.e. S1 is said to be proper), the star of S1 is the series defined by
106
+ (S1)⋆(ε) = 1,
107
+ (S1)⋆(w) =
108
+
109
+ n≤|w|,w=u1···un,uj̸=ε
110
+ S1(u1) × · · · × S1(un).
111
+ Finally, for any function f in Kn → K, we set:
112
+ (f(S1, . . . , Sn))(w) = f(S1(w), . . . , Sn(w)).
113
+ (1)
114
+ A functor 4 F associates with each set S a set F(S) and with each function f in S → S′ a function F(f) from
115
+ F(S) to F(S′) such that
116
+ F(id) = id,
117
+ F(f ◦ g) = F(f) ◦ F(g),
118
+ 4 More precisely, a functor over a subcategory of the category of sets.
119
+
120
+ where id is the identity function and ◦ the classical function composition.
121
+ A monad5 M is a functor endowed with two (families of) functions
122
+ – pure, from a set S to M(S),
123
+ – bind, sending any function f in S → M(S′) to M(S) → M(S′),
124
+ such that the three following conditions are satisfied:
125
+ bind(f)(pure(s)) = f(s),
126
+ bind(pure) = id,
127
+ bind(g)(bind(f)(m)) = bind(λx → bind(g)(f(x)))(m).
128
+ Example 1. The Maybe monad associates:
129
+ – any set S with the set Maybe(S) = {Just(s) | s ∈ S} ∪ {Nothing}, where Just and Nothing are two syntactic
130
+ tokens allowing us to extend a set with one value;
131
+ – any function f with the function Maybe(f) defined by
132
+ Maybe(f)(Just(s)) = Just(f(s)),
133
+ Maybe(f)(Nothing) = Nothing
134
+ – is endowed with the functions pure and bind defined by:
135
+ pure(s) = Just(s),
136
+ bind(f)(Just(s)) = f(s),
137
+ bind(f)(Nothing) = Nothing.
138
+ Example 2. The Set monad associates:
139
+ – with any set S the set 2S,
140
+ – with any function f the function Set(f) defined by Set(f)(R) = �
141
+ r∈R{f(r)},
142
+ – is endowed with the functions pure and bind defined by:
143
+ pure(s) = {s},
144
+ bind(f)(R) =
145
+
146
+ r∈R
147
+ f(r).
148
+ Example 3. The LinComb(K) monad, for K = (K, ×, +, 1, 0), associates:
149
+ – with any set S the set of K-linear combinations of elements of S, where a linear combination is a finite (formal,
150
+ commutative) sum of couples (denoted by ⊞) in K × S where (k, s) ⊞ (k′, s) = (k + k′, s),
151
+ – with any function f the function LinComb(K)(f) defined by
152
+ LinComb(K)(f)(R) = ⊞
153
+ (k,r)∈R
154
+ (k, f(r)),
155
+ – is endowed with the functions pure and bind defined by:
156
+ pure(s) = (1, s),
157
+ bind(f)(R) = ⊞
158
+ (k,r)∈R
159
+ k ⊗ f(r),
160
+ where k ⊗ R = ⊞
161
+ (k′,r)∈R
162
+ (k × k′, r).
163
+ To compact equations, we use the following operators for any monad M:
164
+ f <$> s = M(f)(s),
165
+ m >>= f = bind(f)(m).
166
+ If <$> can be used to lift unary functions to the monadic level, >>= and pure can be used to lift any n-ary function
167
+ f in S1 × · · · × Sn → S, defining a function liftn sending S1 × · · · × Sn → S to M(S1) × · · · × M(Sn) → M(S) as
168
+ follows:
169
+ liftn(f)(m1, . . . , mn) =m1 >>= (λs1 → . . .
170
+ mn >>= (λsn → pure(f(s1, . . . , sn))) . . .)
171
+ Let us consider the set
172
+ 1 = {⊤} with only one element. The images of this set by some previously defined monads
173
+ can be evaluated as value sets classically used to weight words in association with classical regular expressions. As
174
+ an example, Maybe(1) and Set(1) are isomorphic to the Boolean set, and any set LinComb(K)(1) can be converted
175
+ into the underlying set of K. This property allows us to extend in a coherent way classical expressions to monadic
176
+ expressions, where the type of the weights is therefore given by the ambient monad.
177
+ 5 More precisely, a monad over a subcategory of the category of sets.
178
+
179
+ 3
180
+ Monadic Expressions
181
+ As seen in the previous section, elements in M(1) can be evaluated as classical value sets for some particular
182
+ monads. Hence, we use these elements not only for the weights associated with words by expressions, but also for
183
+ the elements that act over the denoted series.
184
+ In the following, in addition to classical operators (+, · and ∗), we denote:
185
+ – the action of an element over a series by ⊙,
186
+ – the application of a function by itself.
187
+ Definition 1. Let M be a monad. An M-monadic expression E over an alphabet Σ is inductively defined as follows:
188
+ E = a,
189
+ E = ε,
190
+ E = ∅,
191
+ E = E1 + E2,
192
+ E = E1 · E2,
193
+ E = E∗
194
+ 1,
195
+ E = α ⊙ E1,
196
+ E = E1 ⊙ α,
197
+ E = f (E1, . . . , En) ,
198
+ where a is a symbol in Σ, (E1, . . . , En) are n M-monadic expressions over Σ, α is an element of M(1) and f is a
199
+ function from (M(1))n to M(1).
200
+ We denote by Exp(Σ) the set of monadic expressions over an alphabet Σ.
201
+ Example 4. As an example of functions that can be used in our extension of classical operators, one can define the
202
+ function ExtDist(x1, x2, x3) = max(x1, x2, x3) − min(x1, x2, x3) from N3 to N.
203
+ Similarly to classical regular expressions, monadic expressions associate a weight with any word. Such a relation
204
+ can be denoted via a formal series. However, before defining this notion, in order to simplify our study, we choose
205
+ to only consider proper expressions. Let us first show how to characterize them by the computation of a nullability
206
+ value.
207
+ Definition 2. Let M be a monad such that the structure (M(1), +, ×, ⋆, 1, 0) is a starred semiring. The nullability
208
+ value of an M-monadic expression E over an alphabet Σ is the element Null(E) of M(1) inductively defined as
209
+ follows:
210
+ Null(ε) = 1,
211
+ Null(∅) = 0,
212
+ Null(a) = 0,
213
+ Null(E1 + E2) = Null(E1) + Null(E2),
214
+ Null(E1 · E2) = Null(E1) × Null(E2),
215
+ Null(E∗
216
+ 1) = Null(E1)⋆,
217
+ Null(α ⊙ E1) = α × Null(E1),
218
+ Null(E1 ⊙ α) = Null(E1) × α,
219
+ Null(f(E1, . . . , En)) = f(Null(E1), . . . , Null(En)),
220
+ where a is a symbol in Σ, (E1, . . . , En) are n M-monadic expressions over Σ, α is an element of M(1) and f is a
221
+ function from (M(1))n to M(1).
222
+ When the considered semiring is not a starred one, we restrict the nullability value computation to expressions
223
+ where a starred subexpression admits a null nullability value. In order to compute it, let us consider the Maybe
224
+ monad, allowing us to elegantly deal with such a partial function.
225
+ Definition 3. Let M be a monad such that the structure (M(1), +, ×, 1, 0) is a semiring. The partial nullability
226
+ value of an M-monadic expression E over an alphabet Σ is the element PartNull(E) of Maybe(M(1)) defined as
227
+ follows:
228
+ PartNull(ε) = Just(1),
229
+ PartNull(∅) = Just(0),
230
+ PartNull(a) = Just(0),
231
+ PartNull(E1 + E2) = lift2(+)(PartNull(E1), PartNull(E2)),
232
+ PartNull(E1 · E2) = lift2(×)(PartNull(E1), PartNull(E2)),
233
+ PartNull(E∗
234
+ 1) =
235
+
236
+ Just(1)
237
+ if PartNull(E1) = Just(0),
238
+ Nothing
239
+ otherwise,
240
+ PartNull(α ⊙ E1) = (λE → α × E) <$> PartNull(E1),
241
+ PartNull(E1 ⊙ α) = (λE → E × α) <$> PartNull(E1),
242
+ PartNull(f(E1, . . . , En)) = liftn(f)(PartNull(E1), . . . , PartNull(En)),
243
+ where a is a symbol in Σ, (E1, . . . , En) are n M-monadic expressions over Σ, α is an element of M(1) and f is a
244
+ function from (M(1))n to M(1).
245
+
246
+ An expression E is proper if its partial nullability value is not Nothing, therefore if it is a value Just(v); in this
247
+ case, v is its nullability value, denoted by Null(E) (by abuse).
248
+ Definition 4. Let M be a monad such that the structure (M(1), +, ×, 1, 0) is a semiring, and E be a M-monadic
249
+ proper expression over an alphabet Σ. The series S(E) associated with E is inductively defined as follows:
250
+ S(ε)(w) =
251
+
252
+ 1
253
+ if w = ε,
254
+ 0
255
+ otherwise,
256
+ S(∅)(w) = 0,
257
+ S(a)(w) =
258
+
259
+ 1
260
+ if w = a,
261
+ 0
262
+ otherwise,
263
+ S(E1 + E2) = S(E1) + S(E2),
264
+ S(E1 · E2) = S(E1) × S(E2),
265
+ S(E∗
266
+ 1) = (S(E1))⋆,
267
+ S(α ⊙ E1)(w) = α × S(E1)(w),
268
+ S(E1 ⊙ α)(w) = S(E1)(w) × α,
269
+ S(f(E1, . . . , En)) = f(S(E1), . . . , S(En)),
270
+ where a is a symbol in Σ, (E1, . . . , En) are n M-monadic expressions over Σ, α is an element of M(1) and f is a
271
+ function from (M(1))n to M(1).
272
+ From now on, we consider the set Exp(Σ) of M-monadic expressions over Σ to be endowed with the structure of
273
+ a semiring, and two expressions denoting the same series to be equal. The weight associated with a word w in Σ∗
274
+ by E is the value weightw(E) = S(E)(w). The nullability of a proper expression is the weight it associates with ε,
275
+ following Definition 3 and Definition 4.
276
+ Proposition 1. Let M be a monad such that the structure (M(1), +, ×, 1, 0) is a semiring. Let E be an M-monadic
277
+ proper expression over Σ. Then:
278
+ Null(E) = weightε(E).
279
+ The previous proposition implies that the weight of the empty word can be syntactically computed (i.e. inductively
280
+ computed from a monadic expression). Now, let us show how to extend this computation by defining the computation
281
+ of derivatives for monadic expressions.
282
+ 4
283
+ Monadic Supports for Expressions
284
+ A K-left-semimodule, for a semiring K = (K, ×, +, 1, 0), is a commutative monoid (S, ±, 0) endowed with a function
285
+ ⊲ from K × S to S such that:
286
+ (k × k′) ⊲ s = k ⊲ (k′ ⊲ s),
287
+ (k + k′) ⊲ s = k ⊲ s ± k′ ⊲ s,
288
+ k ⊲ (s ± s′) = k ⊲ s ± k ⊲ s′,
289
+ 1 ⊲ s = s,
290
+ 0 ⊲ s = k ⊲ 0 = 0.
291
+ A K-right-semimodule can be defined symmetrically.
292
+ An operad [12,14] is a structure (O, (◦j)j∈N, id) where O is a graded set (i.e. O = �
293
+ n∈N On), id is an element of
294
+ O1, ◦j is a function defined for any three integers (i, j, k)6 with 0 < j ≤ k in Ok × Oi → Ok+i−1 such that for any
295
+ elements p1 ∈ Om, p2 ∈ On, p3 ∈ Op:
296
+ ∀0 < j ≤ m, id ◦1 p1 = p1 ◦j id = p1,
297
+ ∀0 < j ≤ m, 0 < j′ ≤ n, p1 ◦j (p2 ◦j′ p3) = (p1 ◦j p2) ◦j+j′−1 p3,
298
+ ∀0 < j′ ≤ j ≤ m, (p1 ◦j p2) ◦j′ p3 = (p1 ◦j′ p3) ◦j+p−1 p2.
299
+ Combining these compositions ◦j, one can define a composition ◦ sending Ok × Oi1 × · · · × Oik to Oi1+···+ik: for
300
+ any element (p, q1, . . . , qk) in Ok × Ok,
301
+ p ◦ (q1, . . . , qk) = (· · · ((p ◦k qk) ◦k−1 qk−1 · · · ) · · · ) ◦1 q1.
302
+ Conversely, the composition ◦ can define the compositions ◦j using the identity element: for any two elements (p, q)
303
+ in Ok × Oi, for any integer 0 < j ≤ k:
304
+ p ◦j q = p ◦ (id, . . . , id
305
+
306
+ ��
307
+
308
+ j−1 times
309
+ , q, id, . . . , id
310
+
311
+ ��
312
+
313
+ k−j times
314
+ ).
315
+ As an example, the set of n-ary functions over a set, with the identity function as unit, forms an operad.
316
+ A module over an operad (O, ◦, id) is a set S endowed with a function ⋇ from On × Sn to S such that
317
+ f ⋇ (f1 ⋇ (s1,1, . . . , s1,i1), . . . , fn ⋇ (sn,1, . . . , sn,in))
318
+ = (f ◦ (f1, . . . , fn)) ⋇ (s1,1, . . . , s1,i1, . . . , sn,1, . . . , sn,in).
319
+ 6 every couple (i, k) unambiguously defines the domain and codomain of a function ◦j
320
+
321
+ The extension of the computation of derivatives could be performed for any monad. Indeed, any monad could
322
+ be used to define well-typed auxiliary functions that mimic the classical computations. However, some properties
323
+ should be satisfied in order to compute weights equivalently to Definition 4. Therefore, in the following we consider
324
+ a restricted kind of monads.
325
+ A monadic support is a structure (M, +, ×, 1, 0, ±, 0, ⋉, ⊲, ⊳, ⋇) satisfying:
326
+ – M is a monad,
327
+ – R = (M(1), +, ×, 1, 0) is a semiring,
328
+ – M = (M(Exp(Σ)), ±, 0) is a monoid,
329
+ – (M, ⋉) is a Exp(Σ)-right-semimodule,
330
+ – (M, ⊲) is a R-left-semimodule,
331
+ – (M, ⊳) is a R-right-semimodule,
332
+ – (M(Exp(Σ)), ⋇) is a module for the operad of the functions over M(1).
333
+ An expressive support is a monadic support (M, +, ×, 1, 0, ±, 0, ⋉, ⊲, ⊳, ⋇) endowed with a function toExp from
334
+ M(Exp(Σ)) to Exp(Σ) satisfying the following conditions:
335
+ weightw(toExp(m)) = m >>= weightw
336
+ (2)
337
+ toExp(m ⋉ F) = toExp(m) · F,
338
+ (3)
339
+ toExp(m ± m′) = toExp(m) + toExp(m′),
340
+ (4)
341
+ toExp(m ⊲ x) = toExp(m) ⊙ x,
342
+ (5)
343
+ toExp(x ⊳ m) = x ⊙ toExp(m),
344
+ (6)
345
+ toExp(f ⋇ (m1, . . . , mn)) = f(toExp(m1), . . . , toExp(mn)).
346
+ (7)
347
+ Let us now illustrate this notion with three expressive supports that will allow us to model well-known derivatives
348
+ computations.
349
+ Example 5 (The Maybe support).
350
+ toExp(Nothing) = 0,
351
+ toExp(Just(E)) = E,
352
+ Nothing + m = m,
353
+ m + Nothing = m,
354
+ Just(⊤) + Just(⊤) = Just(⊤),
355
+ Nothing × m = Nothing,
356
+ m × Nothing = Nothing,
357
+ Just(⊤) × Just(⊤) = Just(⊤),
358
+ Nothing ± m = m,
359
+ m ± Nothing = m,
360
+ Just(E) ± Just(E′) = Just(E + E′),
361
+ 1 = Just(⊤),
362
+ 0 = Nothing,
363
+ 0 = Nothing,
364
+ m ⋉ F = (λE → E · F) <$> m,
365
+ m ⊲ m′ = m >>= (λx → m′),
366
+ m ⊳ m′ = m′ >>= (λx → m),
367
+ f ⋇ (m1, . . . , mn) = pure(f(toExp(m1), . . . , toExp(mn))).
368
+ Example 6 (The Set support).
369
+ toExp({E1, . . . , En}) = E1 + · · · + En,
370
+ + = ∪,
371
+ × = ∩,
372
+ ± = ∪,
373
+ 1 = {⊤},
374
+ 0 = ∅,
375
+ 0 = ∅,
376
+ m ⋉ F = (λE → E · F) <$> m,
377
+ m ⊲ m′ = m >>= (λx → m′),
378
+ m ⊳ m′ = m′ >>= (λx → m),
379
+ f ⋇ (m1, . . . , mn) = pure(f(toExp(m1), . . . , toExp(mn))).
380
+ Example 7 (The LinComb(K) support).
381
+ toExp((k1, E1) ⊞ · · · ⊞ (kn, En)) = k1 ⊙ E1 + · · · + kn ⊙ En,
382
+ + = ⊞,
383
+ (k, ⊤) × (k′, ⊤) = (k × k′, ⊤),
384
+ 1 = (1, ⊤),
385
+ 0 = (0, ⊤),
386
+ ± = ⊞,
387
+ 0 = (0, ⊤),
388
+ m ⋉ F = (λE → E · F) <$> m,
389
+ m ⊲ m′ = m >>= (λx → m′),
390
+ m ⊳ k = (λE → E ⊙ k) <$> m,
391
+ f ⋇ (m1, . . . , mn) = pure(f(toExp(m1), . . . , toExp(mn))).
392
+
393
+ 5
394
+ Monadic Derivatives
395
+ In the following, (M, +, ×, 1, 0, ±, 0, ⋉, ⊲, ⊳, ⋇, toExp) is an expressive support.
396
+ Definition 5. The derivative of an M-monadic expression E over Σ w.r.t. a symbol a in Σ is the element da(E)
397
+ in M(Exp(Σ)) inductively defined as follows:
398
+ da(ε) = 0,
399
+ da(∅) = 0,
400
+ da(b) =
401
+
402
+ pure(ε)
403
+ if a = b,
404
+ 0
405
+ otherwise,
406
+ da(E1 + E2) = da(E1) ± da(E2),
407
+ da(E∗
408
+ 1) = da(E1) ⋉ E∗
409
+ 1,
410
+ da(E1 · E2) = da(E1) ⋉ E2 ± Null(E1) ⊲ da(E2),
411
+ da(α ⊙ E1) = α ⊲ da(E1),
412
+ da(E1 ⊙ α) = da(E1) ⊳ α,
413
+ da(f(E1, . . . , En)) = f ⋇ (da(E1), . . . , da(En))
414
+ where b is a symbol in Σ, (E1, . . . , En) are n M-monadic expressions over Σ, α is an element of M(1) and f is a
415
+ function from (M(1))n to M(1).
416
+ The link between derivatives and series can be stated as follows, which is an alternative description of the classical
417
+ quotient.
418
+ Proposition 2. Let E be an M-monadic expression over an alphabet Σ, a be a symbol in Σ and w be a word in
419
+ Σ∗. Then:
420
+ weightaw(E) = da(E) >>= weightw.
421
+ Proof. Let us proceed by induction over the structure of E. All the classical cases (i.e. the function operator left
422
+ aside) can be proved following the classical methods ([1,4,13]). Therefore, let us consider this last case.
423
+ da(f(E1, . . . , En)) >>= weightw
424
+ = weightw(toExp(da(f(E1, . . . , En))))
425
+ (Eq (2))
426
+ = weightw(toExp(f ⋇ (da(E1), . . . , da(En)))
427
+ (Def 5))
428
+ = weightw(f(toExp(da(E1)), . . . , toExp(da(En))))
429
+ (Eq (7))
430
+ = f(weightw(toExp(da(E1))), . . . , weightw(toExp(da(En))))
431
+ (Def 4, Eq (1))
432
+ = f(da(E1) >>= weightw, . . . , da(En) >>= weightw)
433
+ (Eq (2))
434
+ = f(weightaw(E1), . . . , weightaw(En))
435
+ (Ind. hyp.)
436
+ = weightaw(f(E1, . . . , En))
437
+ (Def 4, Eq (1))
438
+ Let us define how to extend the derivative computation from symbols to words, using the monadic functions.
439
+ Definition 6. The derivative of an M-monadic expression E over Σ w.r.t. a word w in Σ∗ is the element dw(E)
440
+ in M(Exp(Σ)) inductively defined as follows:
441
+ dε(E) = pure(E),
442
+ da·v(E) = da(E) >>= dv,
443
+ where a is a symbol in Σ and v a word in Σ∗.
444
+ Finally, it can be easily shown, by induction over the length of the words, following Proposition 2, that the
445
+ derivatives computation can be used to define a syntactical computation of the weight of a word associated with an
446
+ expression.
447
+ Theorem 1. Let E be an M-monadic expression over an alphabet Σ and w be a word in Σ∗. Then:
448
+ weightw(E) = dw(E) >>= Null.
449
+ Notice that, restraining monadic expressions to regular ones,
450
+ – the Maybe support leads to the classical derivatives [4],
451
+ – the Set support leads to the partial derivatives [1],
452
+ – the LinComb support leads to the derivatives with multiplicities [13].
453
+ Example 8. Let us consider the function ExtDist defined in Example 4 and the LinComb(N)-monadic expression
454
+ E = ExtDist(a∗b∗ + b∗a∗, b∗a∗b∗, a∗b∗a∗).
455
+ da(E) = ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + a∗)
456
+ daa(E) = ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + 2 ⊙ a∗)
457
+
458
+ daaa(E) = ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + 3 ⊙ a∗)
459
+ daab(E) = ExtDist(b∗, b∗, b∗a∗)
460
+ weightaaa(E) = daaa(E) >>= Null
461
+ = ExtDist(1 + 1, 1, 1 + 3) = 4 − 1 = 3
462
+ weightaab(E) = daab(E) >>= Null = ExtDist(1, 1, 1) = 0
463
+ In the next section, we show how to compute the derivative automaton associated with an expression.
464
+ 6
465
+ Automata Construction
466
+ A category C is defined by:
467
+ – a class ObjC of objects,
468
+ – for any two objects A and B, a set HomC(A, B) of morphisms,
469
+ – for any three objects A, B and C, an associative composition function ◦C in HomC(B, C) −→ HomC(A, B) −→
470
+ HomC(A, C),
471
+ – for any object A, an identity morphism idA in HomC(A, A), such that for any morphisms f in HomC(A, B) and
472
+ g in HomC(B, A), f ◦C idA = f and idA ◦C g = g.
473
+ Given a category C, a C-automaton is a tuple (Σ, I, Q, F, i, δ, f) where
474
+ – Σ is a set of symbols (the alphabet),
475
+ – I is the initial object, in Obj(C),
476
+ – Q is the state object, in Obj(C),
477
+ – F is the final object, in Obj(C),
478
+ – i is the initial morphism, in HomC(I, Q),
479
+ – δ is the transition function, in Σ −→ HomC(Q, Q),
480
+ – f is the value morphism, in HomC(Q, F).
481
+ The function δ can be extended as a monoid morphism from the free monoid (Σ∗, ·, ε) to the morphism monoid
482
+ (HomC(Q, Q), ◦C, idQ), leading to the following weight definition.
483
+ The weight associated by a C-automaton A = (Σ, I, Q, F, i, δ, f) with a word w in Σ∗ is the morphism weight(w)
484
+ in HomC(I, F) defined by
485
+ weight(w) = f ◦C δ(w) ◦C i.
486
+ If the ambient category is the category of sets, and if I =
487
+ 1, the weight of a word is equivalently an element of
488
+ F. Consequently, a deterministic (complete) automaton is equivalently a Set-automaton with
489
+ 1 as the initial object
490
+ and B as the final object.
491
+ Given a monad M, the Kleisli composition of two morphisms f ∈ HomC(A, B) and g ∈ HomC(B, C) is the
492
+ morphism (f >=> g)(x) = f(x) >>= g in HomC(A, C). This composition defines a category, called the Kleisli
493
+ category K(M) of M, where:
494
+ – the objects are the sets,
495
+ – the morphisms between two sets A and B are the functions between A and M(B),
496
+ – the identity is the function pure.
497
+ Considering these categories:
498
+ – a deterministic automaton is equivalently a K(Maybe)-automaton,
499
+ – a nondeterministic automaton is equivalently a K(Set)-automaton,
500
+ – a weighted automaton over a semiring K is equivalently a K(LinComb(K))-automaton,
501
+ all with
502
+ 1 as both the initial object and the final object.
503
+ Furthermore, for a given expression E, if i = pure(E), δ(a)(E′) = da(E′) and f = Null, we can compute
504
+ the well-known derivative automata using the three previously defined supports, and the accessible part of these
505
+ automata are finite ones as far as classical expressions are concerned [4,1,13].
506
+ More precisely, extended expressions can lead to infinite automata, as shown in the next example.
507
+
508
+ Example 9. Considering the computations of Example 8, it can be shown that
509
+ dan(E) = ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + n ⊙ a∗).
510
+ Hence, there is not a finite number of derivated terms, that are the states in the classical derivative automaton.
511
+ This infinite automaton is represented in Figure 1, where the final weights of the states are represented by double
512
+ edges. The sink states are omitted.
513
+ ExtDist(a∗b∗ + b∗a∗, b∗a∗b∗, a∗b∗a∗)
514
+ ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + a∗)
515
+ ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + 2 ⊙ a∗)
516
+ ExtDist(b∗, b∗, b∗a∗)
517
+ ExtDist(0, 0, a∗)
518
+ ExtDist(b∗ + b∗a∗, b∗a∗b∗ + b∗, b∗a∗)
519
+ ExtDist(b∗ + b∗a∗, b∗a∗b∗ + 2 ⊙ b∗, b∗a∗)
520
+ ExtDist(a∗, a∗b∗, a∗)
521
+ ExtDist(0, b∗, 0)
522
+ ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + n ⊙ a∗)
523
+ ExtDist(b∗ + b∗a∗, b∗a∗b∗ + n ⊙ b∗, b∗a∗)
524
+ 1
525
+ 1
526
+ 2
527
+ n
528
+ 1
529
+ 1
530
+ 2
531
+ 1
532
+ n
533
+ a
534
+ b
535
+ b
536
+ a
537
+ b
538
+ a
539
+ b
540
+ a
541
+ b
542
+ a
543
+ b
544
+ a
545
+ b
546
+ a
547
+ b
548
+ a
549
+ b
550
+ a
551
+ Fig. 1. The (infinite) derivative weighted automaton associated with E.
552
+ In the following section, let us show how to model a new monad in order to solve this problem.
553
+ 7
554
+ The Graded Module Monad
555
+ Let us consider an operad O = (O, ◦, id) and the association sending:
556
+ – any set S to �
557
+ n∈N On × Sn,
558
+ – any f in S → S′ to the function g in �
559
+ n∈N On × Sn → �
560
+ n∈N On × S′n:
561
+ g(o, (s1, . . . , sn)) = (o, (f(s1), . . . , f(sn)))
562
+ It can be checked that this is a functor, denoted by GradMod(O). Moreover, it forms a monad considering the two
563
+ following functions:
564
+ pure(s) = (id, s),
565
+ (o, (s1, . . . , sn)) >>= f = (o ◦ (o1, . . . , on), (s1,1, . . . , s1,i1, . . . , sn,1, . . . , sn,in))
566
+ where f(sj) = (oj, sj,1, . . . , sj,ij). However, notice that GradMod(O)(1) cannot be easily evaluated as a value space.
567
+ Thus, let us compose it with another monad. As an example, let us consider a semiring K = (K, ×, +, 1, 0) and
568
+ the operad O of the n-ary functions over K. Hence, let us define the functor7 GradComb(O, K) that sends S to
569
+ GradMod(O)(LinComb(K)(S)).
570
+ 7 it is folk knowledge that the composition of two functors is a functor.
571
+
572
+ To show that this combination is a monad, let us first define a function α sending GradComb(O, K)(S) to
573
+ GradMod(O)(S). It can be easily done by converting a linear combination into an operadic combination, i.e. an
574
+ element in GradMod(O)(S), with the following function toOp:
575
+ toOp((k1, s1) ⊞ · · · ⊞ (kn, sn))
576
+ = (λ(x1, . . . , xn) → k1 × x1 + · · · + kn × xn, (s1, . . . , sn)),
577
+ α(o, (L1, . . . , Ln)) = (o ◦ (o1, . . . , on), (s1,1, . . . , s1,i1, . . . , sn,1, . . . , sn,in))
578
+ where toOp(Lj) = (oj, (sj,1, . . . , sj,ij)).
579
+ Consequently, we can define the monadic functions as follows:
580
+ pure(s) = (id, (1, s)),
581
+ (o, (L1, . . . , Ln)) >>= f = α(o, (L1, . . . , Ln)) >>= f
582
+ where the second occurrence of >>= is the monadic function associated with the monad GradMod(O).
583
+ Let us finally define an expressive support for this monad:
584
+ toExp(o, (L1, . . . , Ln)) = o(toExp(L1), . . . , toExp(Ln)),
585
+ (o, (L1, . . . , Ln)) + (o′, (L′
586
+ 1, . . . , L′
587
+ n′)) = (o + o′, (L1, . . . , Ln, L′
588
+ 1, . . . , L′
589
+ n′))
590
+ (o, (L1, . . . , Ln)) × (o′, (L′
591
+ 1, . . . , L′
592
+ n′)) = (o × o′, (L1, . . . , Ln, L′
593
+ 1, . . . , L′
594
+ n′))
595
+ ± = +,
596
+ 1 = (id, (1, ⊤)),
597
+ 0 = (id, (0, ⊤)),
598
+ 0 = (id, (0, ⊤)),
599
+ m ⋉ F = pure(toExp(m) · F),
600
+ (o, (M1, . . . , Mk)) ⊲ (o′, (L1, . . . , Ln)) = (o(M1, . . . , Mk) × o′, (L1, . . . , Ln)),
601
+ (o, (L1, . . . , Ln)) ⊳ (o′, (M1, . . . , Mk)) = (o × o′(M1, . . . , Mk), (L1, . . . , Ln))
602
+ f ⋇ ((o1, (L1,1, . . . , L1,i1)), . . . , (on, (Ln,1, . . . , Ln,in)))
603
+ = (f ◦ (o1, . . . , on), (L1,1, . . . , L1,i1, . . . , Ln,1, . . . , Ln,in))
604
+ where (o + o′)(x1, . . . , xn+n′) = o(x1, . . . , xn) + o′(xn+1, . . . , xn+n′)
605
+ (o × o′)(x1, . . . , xn+n′) = o(x1, . . . , xn) × o′(xn+1, . . . , xn+n′)
606
+ Example 10. Let us consider that two elements in GradComb(O, K)(Exp(Σ)) are equal if they have the same image
607
+ by toExp. Let us consider the expression E = ExtDist(a∗b∗ + b∗a∗, b∗a∗b∗, a∗b∗a∗) of Example 8.
608
+ da(E) = ExtDist ⋇ ((+, (a∗b∗, a∗)), (id, a∗b∗), (+, (a∗b∗a∗, a∗)))
609
+ = (ExtDist ◦ (+, id, +), (a∗b∗, a∗, a∗b∗, a∗b∗a∗, a∗))
610
+ daa(E) = (ExtDist ◦ (+, id, + ◦ (+, id)), (a∗b∗, a∗, a∗b∗, a∗b∗a∗, a∗, a∗))
611
+ = (ExtDist ◦ (+, id, + ◦ (id, 2×)), (a∗b∗, a∗, a∗b∗, a∗b∗a∗, a∗))
612
+ daaa(E) = (ExtDist ◦ (+, id, + ◦ (id, 3×)), (a∗b∗, a∗, a∗b∗, a∗b∗a∗, a∗))
613
+ daab(E) = (ExtDist ◦ (+, id, +), (b∗, ∅, b∗, b∗a∗, ∅))
614
+ = (ExtDist, (b∗, b∗, b∗a∗))
615
+ weightaaa(E) = daaa(E) >>= Null
616
+ = ExtDist ◦ (+, id, +)(1, 1, 1, 1, 3)
617
+ = ExtDist(1 + 1, 1, 1 + 3) = 4 − 1 = 3
618
+ weightaab(E) = daab(E) >>= Null = ExtDist(1, 1, 1) = 0
619
+ Using this monad, the number of derivated terms, that is the number of states in the associated derivative automaton,
620
+ is finite. Indeed, the computations are absorbed in the transition structure. This automaton is represented in
621
+ Figure 2. Notice that the dashed rectangle represent the functions that are composed during the traversal associated
622
+ with a word. The final weights are represented by double edges. The sink states are omitted. The state b∗ is duplicated
623
+ to simplify the representation.
624
+
625
+ ExtDist(a∗b∗ + b∗a∗, b∗a∗b∗, a∗b∗a∗)
626
+ ExtDist
627
+ +
628
+ +
629
+ ExtDist
630
+ +
631
+ b∗a∗b∗
632
+ +
633
+ a∗b∗a∗
634
+ +
635
+ a∗b∗
636
+ a∗
637
+ b∗
638
+ b∗a∗
639
+ b∗
640
+ 1
641
+ 1
642
+ 1
643
+ 1
644
+ 1
645
+ 1
646
+ 1
647
+ 1
648
+ a
649
+ b
650
+ a
651
+ b
652
+ b
653
+ a
654
+ b
655
+ a
656
+ a
657
+ b
658
+ b
659
+ b
660
+ Fig. 2. The Associated Derivative Automaton of ExtDist(a∗b∗ + b∗a∗, b∗a∗b∗, a∗b∗a∗).
661
+ However, notice that not every monadic expression produces a finite set of derivated terms, as shown in the next
662
+ example.
663
+ Example 11. Let us consider the expression E of Example 8 and the expression F = E · c∗. It can be shown that
664
+ dan(F) = toExp(dan(E)) · c∗
665
+ = ExtDist(a∗b∗ + a∗, a∗b∗, a∗b∗a∗ + n ⊙ a∗) · c∗.
666
+ The study of the necessary and sufficient conditions of monads that lead to a finite set of derivated terms is one
667
+ of the next steps of our work.
668
+ 8
669
+ Haskell Implementation
670
+ The notions described in the previous sections have been implemented in Haskell, as follows:
671
+ – The notion of monad over a sub-category of sets is a typeclass using the Constraint kind to specify a sub-
672
+ category;
673
+ – n-ary functions and their operadic structures are implemented using fixed length vectors, the size of which is
674
+ determined at compilation using type level programming;
675
+ – The notion of graded module is implemented through an existential type to deal with unknown arities: Its
676
+ monadic structure is based on an extension of heterogeneous lists, the graded vectors, typed w.r.t. the list of
677
+ the arities of the elements it contains;
678
+ – The parser and some type level functions are based on dependently typed programming with singletons [8],
679
+ allowing, for example, determining the type of the monads or the arity of the functions involved at run-time;
680
+ – An application is available here [16] illustrating the computations:
681
+ • the backend uses servant to define an API;
682
+
683
+ • the frontend is defined using Reflex, a functional reactive programming engine and cross compiled in
684
+ JavaScript with GHCJS.
685
+ As an example, the monadic expression of the previous examples can be entered in the web application as the
686
+ input ExtDist(a*.b*+b*.a*,b*.a*.b*,a*.b*.a*).
687
+ 9
688
+ Capture Groups
689
+ Capture groups are a standard feature of POSIX regular expressions where parenthesis are used to memorize
690
+ some part of the input string being matched in order to reuse either for substitution or matching. We give here
691
+ an equivalent definition along with derivation formulae and a monadic definition. The semantic of this definition
692
+ conforms to those of POSIX expressions. Precisely, when a capture group has been involved more than one time
693
+ due to a stared subexpression, the value of the corresponding variable corresponds to the last capture.
694
+ 9.1
695
+ Syntax of Expressions with Capture Groups
696
+ A capture-group expression E over a symbol alphabet Σ and a variable alphabet Γ (or Σ, Γ-expression for short)
697
+ is inductively defined as
698
+ E = a,
699
+ E = ε,
700
+ E = ∅,
701
+ E = F + G,
702
+ E = F · G,
703
+ E = F ∗,
704
+ E = (F)x,
705
+ E = x,
706
+ where F and G are two Σ, Γ-expressions, a is a symbol in Σ, u is in Σ∗ and x is a variable in Γ. In the POSIX
707
+ syntax, capture groups are implicitly mapped with variables respectively with the order of the opening parenthesis
708
+ of a pair. Here, each capture group is associated explicitly to a variable by indexing the closing parenthesis with
709
+ the name of this variable.
710
+ 9.2
711
+ Contextual Expressions and their Contextual Languages
712
+ In order to define the contextual language and the derivation of capture-group expressions, we need to extend the
713
+ syntax of the expressions in order to attach to any capture group the current part of the input string captured
714
+ during an execution.
715
+ A contextual capture-group expression E over a symbol alphabet Σ and a variable alphabet Γ (or Σ, Γ-expression
716
+ for short) is inductively defined as
717
+ E = a,
718
+ E = ε,
719
+ E = ∅,
720
+ E = F + G,
721
+ E = F · G,
722
+ E = F ∗,
723
+ E = (F)u
724
+ x,
725
+ E = x,
726
+ where F and G are two Σ, Γ-expressions, a is a symbol in Σ, u is in Σ∗ and x is a variable in Γ.
727
+ Notice that a Σ, Γ-expression is equivalent to a contextual capture-group expression where u = ε for every
728
+ occurrence of capture group.
729
+ In the following, we consider that a context is a function from Γ to Maybe(Σ∗), modelling the possibility that
730
+ a variable was initialized (or not) during the parsing. The set of contexts is denoted by Ctxt(Γ, Σ).
731
+ Using these notions of contexts, let us now explain the semantics of contextual capture-group expressions. While
732
+ parsing, a context is built to memorize the different affectations of words to variables. Therefore, a (contextual)
733
+ language associated with an expression is a set of couples built from a language and the context that was used to
734
+ compute it.
735
+ The classic atomic cases (a symbol, the empty word or the empty set) are easy to define, preserving the context.
736
+ Another one is the case of a variable x: the context is applied here to compute the associated word (if it exists) and
737
+ is preserved.
738
+ The recursive cases are interpreted as such:
739
+ – The contextual language of a sum of two expressions is the union of their contextual languages, computed
740
+ independently.
741
+ – The contextual language of a catenation of two expressions F and G is computed in three steps. First, the
742
+ contextual language of F is computed. Secondly, for each couple (L, ctxt) of this contextual language, the
743
+ function ctxt is considered as the new context to compute the contextual language of G, leading to new couples
744
+ (L′, ctxt′). Finally, for each of these combinations, a couple (L·L′, ctxt′) is added to form the resulting contextual
745
+ language.
746
+
747
+ – The contextual language of a starred expression is, classically, the infinite union of the powered contextual
748
+ languages, computed by iterated catenations.
749
+ – The contextual language of a captured expression (F)u
750
+ x is computed in two steps. First, the contextual language
751
+ of F is computed. Then, for each couple (L, ctxt) of it, a word w is chosen in L and the context ctxt must be
752
+ updated coherently.
753
+ More formally, the contextual language of a Σ, Γ-expression E associated with a context ctxt in Ctxt(Γ, Σ) is
754
+ the subset Lctxt(E) of 2Σ∗ × Ctxt(Γ, Σ) inductively defined as follows:
755
+ Lctxt(a) = {({a}, ctxt)},
756
+ Lctxt(ε) = {({ε}, ctxt)},
757
+ Lctxt(∅) = ∅,
758
+ Lctxt(x) =
759
+
760
+
761
+ if ctxt(x) = Nothing,
762
+ {({w}, ctxt)}
763
+ otherwise if ctxt(x) = Just(w),
764
+ Lctxt(F + G) = Lctxt(F) ∪ Lctxt(G),
765
+ Lctxt(F · G) =
766
+
767
+ (L1,ctxt1)∈Lctxt(F ),
768
+ (L2,ctxt2)∈Lctxt1(G)
769
+ {(L1 · L2, ctxt2)},
770
+ Lctxt(F ∗) =
771
+
772
+ n∈N
773
+ (Lctxt(F))
774
+ n,
775
+ Lctxt((F)u
776
+ x) =
777
+
778
+ (L1,ctxt1)∈Lctxt(F ),
779
+ w∈L1
780
+ {({w}, [ctxt1]x←uw)},
781
+ where F and G are two Σ, Γ-expressions, a is a symbol in Σ, x is a variable in Γ, u is in Σ∗, Ln is defined, for any
782
+ set L of couples (language, context) by
783
+ Ln =
784
+
785
+
786
+
787
+
788
+
789
+
790
+
791
+
792
+
793
+
794
+
795
+
796
+ (L,ctxt)∈L
797
+ {({ε}, ctxt)}
798
+ if n = 0,
799
+
800
+ (L1,ctxt1)∈L,
801
+ (L2,ctxt2)∈Ln−1
802
+ {(L1 · L2, ctxt2)}
803
+ otherwise,
804
+ and [ctxt]x←w is the context defined by
805
+ [ctxt]x←w(y) =
806
+
807
+ Just(w)
808
+ if x = y,
809
+ ctxt(y)
810
+ otherwise.
811
+ The contextual language of an expression E is the set of couples obtained from an uninitialised context, where
812
+ nothing is associated with any variable, that is the set
813
+ Lλ_→Nothing(E).
814
+ Finally, the language denoted by an expression E is the set of words obtained by forgetting the contexts, that is the
815
+ set
816
+
817
+ (L,_)∈Lλ_→Nothing(E)
818
+ L.
819
+ Example 12. Let us consider the three following expressions over the symbol alphabet {a, b, c} and the variable
820
+ alphabet {x}:
821
+ E = E1 · E2,
822
+ E1 = ((a∗)xbx)∗,
823
+ E2 = cx.
824
+ The language denoted by E2 is empty, since it is computed from the empty context, where nothing is associated
825
+ with x. However, parsing E1 allows us to compute contexts that define word values to affect to x. Let us thus show
826
+ how is defined the contextual language of E1:
827
+ – the contextual language of (a∗)x is the set�
828
+ n∈N
829
+ {({an}, λx → Just(an))}
830
+ where each word an is recorded in a context;
831
+ – the contextual language of (a∗)xbx is the set
832
+
833
+ n∈N
834
+ {({anban}, λx → Just(an))}
835
+ where each word an is recorded in a context applied to evaluate the variable x;
836
+ – the contextual language of E1 is the union of the two following sets S1 and S2:
837
+ S1 = {({��}, λx → Nothing)}
838
+ S2 = {({anban | n ∈ N}∗ · {ambam}, λx → Just(am)) | m ∈ N}
839
+ where each iteration of the outermost star produces a new record for the variable x in the context; however,
840
+ notice that only the last one is recorded at the end of the process.
841
+
842
+ Finally, the language of E is obtained by considering the contexts obtained from the parsing of E1 to evaluate the
843
+ occurrence of x in E2, leading to the set�
844
+ m∈N
845
+ ({anban | n ∈ N}∗ · {ambamcam}).
846
+ Obviously, some classical equations still hold with these computations:
847
+ Lemma 1. Let E, F and G be three Σ, Γ-expressions and ctxt be a context in Ctxt(Γ, Σ). The two following
848
+ equations hold:
849
+ Lctxt(E · (F + G)) = Lctxt(E · F + E · G)
850
+ Lctxt(F ∗) = Lctxt(ε + F · F ∗)
851
+ Proof. Let us proceed by equality sequences:
852
+ Lctxt(E · (F + G)) =
853
+
854
+ (L1,ctxt1)∈Lctxt(E),
855
+ (L2,ctxt2)∈Lctxt1 (F +G)
856
+ {(L1 · L2, ctxt2)}
857
+ =
858
+
859
+ (L1,ctxt1)∈Lctxt(E),
860
+ (L2,ctxt2)∈Lctxt1 (F )∪Lctxt1(G)
861
+ {(L1 · L2, ctxt2)}
862
+ =
863
+
864
+ (L1,ctxt1)∈Lctxt(E),
865
+ (L2,ctxt2)∈Lctxt1 (F )
866
+ {(L1 · L2, ctxt2)}
867
+
868
+
869
+ (L1,ctxt1)∈Lctxt(E),
870
+ (L2,ctxt2)∈Lctxt1(G)
871
+ {(L1 · L2, ctxt2)}
872
+ = Lctxt(E · F) ∪ Lctxt(E · G)
873
+ = Lctxt(E · F + E · G)
874
+ Lctxt(F ∗) =
875
+
876
+ n∈N
877
+ (Lctxt(F))
878
+ n
879
+ = (Lctxt(F))
880
+ 0 ∪
881
+
882
+ n∈N,n≥1
883
+ (Lctxt(F))
884
+ n
885
+ = (Lctxt(F))
886
+ 0 ∪
887
+
888
+ n∈N
889
+ Lctxt(F) · (Lctxt(F))
890
+ n
891
+ = (Lctxt(F))
892
+ 0 ∪ Lctxt(F) ·
893
+
894
+ n∈N
895
+ (Lctxt(F))
896
+ n
897
+ = Lctxt(ε + F · F ∗)
898
+ In order to solve the membership test for the contextual capture-group expressions, let us extend the classical
899
+ derivation method. But first, let us show how to extend the nullability predicate, needed at the end of the process.
900
+ 9.3
901
+ Nullability Computation
902
+ The nullability predicate allows us to determine whether the empty word belongs to the language denoted by
903
+ an expression. As far as capture groups are concerned, a context has to be computed. Therefore, the nullability
904
+ predicate can be represented as a set of contexts the application of which produces a language that contains the
905
+ empty word.
906
+ As we have seen, the nullability depends on the current context. Given an expression and a context ctxt, the
907
+ nullability predicate is a set in 2Ctxt(Γ,Σ), computed as follows:
908
+ Nullctxt(ε) = {ctxt}
909
+ Nullctxt(∅) = ∅
910
+ Nullctxt(a) = ∅
911
+ Nullctxt(x) =
912
+
913
+ {ctxt}
914
+ if ctxt(x) = Just(ε)
915
+
916
+ otherwise.
917
+ Nullctxt(E + F) = Nullctxt(E) ∪ Nullctxt(F)
918
+ Nullctxt(E · F) =
919
+
920
+ ctxt′∈Nullctxt(F ),
921
+ ctxt′′∈Nullctxt′ (G)
922
+ {ctxt′′}
923
+ Nullctxt(E∗) = {ctxt}
924
+ Nullctxt((E)u
925
+ x) =
926
+
927
+ ctxt′∈Nullctxt(F )
928
+ {[ctxt′]x←u}
929
+ where E and F are two Σ, Γ-expressions, a is a symbol in Σ, x is a variable in Γ and u is in Σ∗.
930
+ Example 13. Let us consider the three expressions of Example 12:
931
+ E = E1 · E2,
932
+ E1 = ((a∗)xbx)∗,
933
+ E2 = cx.
934
+ For any context ctxt,
935
+ Nullctxt(E1) = {ctxt},
936
+ Nullctxt(E2) = ∅,
937
+ Nullctxt(E) = ∅.
938
+ The nullability predicate allows us to determine whether there exists a couple in the contextual language of an
939
+ expression such that its first component contains the empty word.
940
+
941
+ Proposition 3. Let E be a Σ, Γ-expression and ctxt be a context in Ctxt(Γ, Σ). Then the two following conditions
942
+ are equivalent:
943
+ – Nullctxt(E) ̸= ∅,
944
+ – ∃(L, _) ∈ Lctxt(E) | ε ∈ L.
945
+ Proof. By induction over the structure of E:
946
+ – If E = a ∈ Σ or E = ∅, the property holds since Nullctxt(E) is empty and since there is no couple (L, ctxt′) in
947
+ Lctxt(E) with ε in L.
948
+ – If E = ε, the following two conditions hold,
949
+ Nullctxt(E) = {ctxt},
950
+ Lctxt(E) = {({ε}, ctxt)},
951
+ satisfying the stated condition.
952
+ – If E = F + G, the following two conditions hold:
953
+ Nullctxt(F + G) = Nullctxt(F) ∪ Nullctxt(G),
954
+ Lctxt(F + G) = Lctxt(F) ∪ Lctxt(G).
955
+ Since, by induction hypothesis, the following two conditions hold
956
+ Nullctxt(F) ̸= ∅ ⇔ ∃(L, ctxt′) ∈ Lctxt(F) | ε ∈ L,
957
+ Nullctxt(G) ̸= ∅ ⇔ ∃(L, ctxt′) ∈ Lctxt(G) | ε ∈ L,
958
+ the proposition holds.
959
+ – If E = F · G, the two following conditions hold:
960
+ Nullctxt(F · G) =
961
+
962
+ ctxt′∈Nullctxt(F ),
963
+ ctxt′′∈Nullctxt′(G),
964
+ {ctxt′′},
965
+ Lctxt(F · G) =
966
+
967
+ (L,ctxt′)∈Lctxt(F ),
968
+ (L′,ctxt′′)∈Lctxt′(G),
969
+ {(L · L′, ctxt′′)}.
970
+ Since, by induction hypothesis, the two following conditions hold,
971
+ Nullctxt(F) ̸= ∅ ⇔ ∃(L, ctxt′) ∈ Lctxt(F) | ε ∈ L,
972
+ Nullctxt′(G) ̸= ∅ ⇔ ∃(L, ctxt′′) ∈ Lctxt′(G) | ε ∈ L,
973
+ the proposition holds.
974
+ – If E = F ∗, since the two following conditions hold
975
+ Nullctxt(F ∗) = {ctxt},
976
+ Lctxt(F)
977
+ 0 = {({ε}, ctxt)} ∈ Lctxt(F ∗),
978
+ the stated condition holds.
979
+ – If E = (F)u
980
+ x, both following conditions hold:
981
+ Nullctxt((F)u
982
+ x) =
983
+
984
+ ctxt′∈Nullctxt(F )
985
+ {[ctxt′]x←u},
986
+ Lctxt((F)u
987
+ x) =
988
+
989
+ (L,ctxt′)∈Lctxt(F ),
990
+ w∈L
991
+ {({w}, [ctxt′]x←uw)}.
992
+ Then, following induction hypothesis,
993
+ Nullctxt(F) ̸= ∅ ⇔ ∃(L, ctxt′) ∈ Lctxt(F) | ε ∈ L,
994
+ the stated condition holds.
995
+ – If E = x, both following conditions hold:
996
+ Nullctxt(x) =
997
+
998
+ {ctxt}
999
+ if ctxt(x) = Just(ε)
1000
+
1001
+ otherwise,
1002
+ Lctxt(x) =
1003
+
1004
+
1005
+ if ctxt(x) = Nothing,
1006
+ {({w}, ctxt)}
1007
+ otherwise if ctxt(x) = Just(w).
1008
+ Therefore, the proposition holds.
1009
+ 9.4
1010
+ Derivation formulae
1011
+ Similarly to the nullability predicate, the derivation computation builds the context while parsing the expression.
1012
+ Therefore, the derivative of an expression with respect to a context is a set of couples (expression, context), induc-
1013
+ tively computed as follows, for any Σ, Γ-expression and for any context ctxt in Ctxt(Γ, Σ):
1014
+ dctxt
1015
+ a
1016
+ (ε) = ∅
1017
+ dctxt
1018
+ a
1019
+ (∅) = ∅
1020
+
1021
+ dctxt
1022
+ a
1023
+ (b) =
1024
+
1025
+
1026
+ if a ̸= b,
1027
+ {(ε, ctxt)}
1028
+ otherwise,
1029
+ dctxt
1030
+ a
1031
+ (x) =
1032
+
1033
+ dctxt
1034
+ a
1035
+ (w)
1036
+ if ctxt(x) = Just(w)
1037
+
1038
+ otherwise
1039
+ dctxt
1040
+ a
1041
+ (F + G) = dctxt
1042
+ a
1043
+ (F) ∪ dctxt
1044
+ a
1045
+ (G)
1046
+ dctxt
1047
+ a
1048
+ (F · G) =
1049
+
1050
+ (ctxt′,F ′)∈dctxt
1051
+ a
1052
+ (F )
1053
+ {(F ′ · G, ctxt′)}
1054
+
1055
+
1056
+ ctxt′∈Nullctxt(F )
1057
+ dctxt′
1058
+ a
1059
+ (G)
1060
+ dctxt
1061
+ a
1062
+ (F ∗) =
1063
+
1064
+ (ctxt′,F ′)∈dctxt
1065
+ a
1066
+ (F )
1067
+ {(F ′ · F ∗, ctxt′)}
1068
+ dctxt
1069
+ a
1070
+ ((F)u
1071
+ x) =
1072
+
1073
+ (ctxt′,F ′)∈dctxt
1074
+ a
1075
+ (F )
1076
+ {((F ′)u·a
1077
+ x , ctxt′)}
1078
+ where F and G are two Σ, Γ-expressions, a is a symbol in Σ, x is a variable in Γ and u is in Σ∗.
1079
+ Example 14. Let us consider the three expressions of Example 12:
1080
+ E = E1 · E2,
1081
+ E1 = ((a∗)xbx)∗,
1082
+ E2 = cx.
1083
+ Then, for any context ctxt,
1084
+ dctxt
1085
+ a
1086
+ (E) = {((a∗)a
1087
+ xbx((a∗)xbx)∗cx, ctxt)},
1088
+ dctxt
1089
+ b
1090
+ (E) = {(x((a∗)xbx)∗cx, λx → ε)},
1091
+ dctxt
1092
+ c
1093
+ (E) = {(x, ctxt)}.
1094
+ The derivation of an expression allows us to syntactically express the computation of the quotient of the language
1095
+ components in contextual languages, where the quotient w−1(L) is the set {w′ | ww′ ∈ L}.
1096
+ Proposition 4. Let E be a Σ, Γ-expression, ctxt be a context in Ctxt(Γ, Σ) and a be a symbol in Σ. Then:
1097
+
1098
+ (E′,ctxt′)∈dctxt
1099
+ a
1100
+ (E)
1101
+ Lctxt′(E′) =
1102
+
1103
+ (L′,ctxt′)∈Lctxt(E)
1104
+ {(a−1(L′), ctxt′)}
1105
+ Proof. By induction over the structure of E, assimilating ∅ and {(∅, ctxt)} for any context ctxt.
1106
+ – If E = ε or E = ∅, the property vacuously holds.
1107
+ – If E = b ∈ Σ,
1108
+
1109
+ (E′,ctxt′)∈dctxt
1110
+ a
1111
+ (b)
1112
+ Lctxt′(E′) =
1113
+
1114
+
1115
+ if b ̸= a,
1116
+ {({ε}, ctxt)}
1117
+ otherwise,
1118
+ = {(a−1({b}), ctxt)} =
1119
+
1120
+ (L′,ctxt′)∈Lctxt(b)
1121
+ {(a−1(L′), ctxt′)}.
1122
+ – If E = F + G,�
1123
+ (E′,ctxt′)∈dctxt
1124
+ a
1125
+ (F +G)
1126
+ Lctxt′(E′) =
1127
+
1128
+ (E′,ctxt′)∈dctxt
1129
+ a
1130
+ (F )∪dctxt
1131
+ a
1132
+ (G)
1133
+ Lctxt′(E′)
1134
+ =
1135
+
1136
+ (E′,ctxt′)∈dctxt
1137
+ a
1138
+ (F )
1139
+ Lctxt′(E′) ∪
1140
+
1141
+ (E′,ctxt′)∈dctxt
1142
+ a
1143
+ (G)
1144
+ Lctxt′(E′)
1145
+ =
1146
+
1147
+ (L′,ctxt′)∈Lctxt(F )
1148
+ {(a−1(L′), ctxt′)} ∪
1149
+
1150
+ (L′,ctxt′)∈Lctxt(G)
1151
+ {(a−1(L′), ctxt′)}
1152
+ =
1153
+
1154
+ (L′,ctxt′)∈Lctxt(F )∪Lctxt(G)
1155
+ {(a−1(L′), ctxt′)}
1156
+ =
1157
+
1158
+ (L′,ctxt′)∈Lctxt(F +G)
1159
+ {(a−1(L′), ctxt′)}.
1160
+ – If E = F · G,
1161
+
1162
+ (E′,ctxt′)∈dctxt
1163
+ a
1164
+ (F ·G)
1165
+ Lctxt′(E′) =
1166
+
1167
+ (ctxt′,F ′)∈dctxt
1168
+ a
1169
+ (F )
1170
+ Lctxt′(F ′ · G) ∪
1171
+
1172
+ ctxt′∈Nullctxt(F ),
1173
+ (G′,ctxt′′)∈dctxt′
1174
+ a
1175
+ (G)
1176
+ Lctxt′′(G′)
1177
+ =
1178
+
1179
+ (ctxt′,F ′)∈dctxt
1180
+ a
1181
+ (F ),
1182
+ (L1,ctxt1)∈Lctxt(F ′),
1183
+ (L2,ctxt2)∈Lctxt1(G)
1184
+ {(L1 · L2, ctxt2)} ∪
1185
+
1186
+ ctxt′∈Nullctxt(F ),
1187
+ (G′,ctxt′′)∈dctxt′
1188
+ a
1189
+ (G)
1190
+ Lctxt′′(G′)
1191
+ =
1192
+
1193
+ (L1,ctxt1)∈Lctxt(F ),
1194
+ (L2,ctxt2)∈Lctxt1 (G)
1195
+ {(a−1(L1) · L2, ctxt2)} ∪
1196
+
1197
+ ctxt1∈Nullctxt(F ),
1198
+ (L2,ctxt2)∈Lctxt1 (G)
1199
+ {(a−1(L2), ctxt2)}
1200
+
1201
+ =
1202
+
1203
+ (L1,ctxt1)∈Lctxt(F ),
1204
+ (L2,ctxt2)∈Lctxt1 (G)
1205
+ {(a−1(L1) · L2, ctxt2)} ∪
1206
+
1207
+ ∃(L,ctxt1)∈Lctxt(F )|ε∈L,
1208
+ (L2,ctxt2)∈Lctxt1(G)
1209
+ {(a−1(L2), ctxt2)}
1210
+ =
1211
+
1212
+ (L1,ctxt1)∈Lctxt(F ),
1213
+ (L2,ctxt2)∈Lctxt1 (G)
1214
+ {(a−1(L1) · L2, ctxt2)} ∪
1215
+
1216
+ (L1,ctxt1)∈Lctxt(F ),
1217
+ ε∈L1,
1218
+ (L2,ctxt2)∈Lctxt1 (G)
1219
+ {(a−1(L2), ctxt2)}
1220
+ =
1221
+
1222
+ (L1,ctxt1)∈Lctxt(F ),
1223
+ (L2,ctxt2)∈Lctxt1 (G)
1224
+ {(a−1(L1 · L2), ctxt2)}
1225
+ =
1226
+
1227
+ (L′,ctxt′)∈Lctxt(F ·G)
1228
+ {(a−1(L′), ctxt′)}.
1229
+ – If E = F ∗,
1230
+
1231
+ (E′,ctxt′)∈dctxt
1232
+ a
1233
+ (F ∗)
1234
+ Lctxt′(E′) =
1235
+
1236
+ (ctxt′,F ′)∈dctxt
1237
+ a
1238
+ (F )
1239
+ Lctxt′(F ′ · F ∗)
1240
+ =
1241
+
1242
+ (ctxt′,F ′)∈dctxt
1243
+ a
1244
+ (F ),
1245
+ (L1,ctxt1)∈Lctxt(F ′),
1246
+ (L2,ctxt2)∈Lctxt1(F ∗)
1247
+ {(L1 · L2, ctxt2)}
1248
+ =
1249
+
1250
+ (L1,ctxt1)∈Lctxt(F ),
1251
+ (L2,ctxt2)∈Lctxt1(F ∗)
1252
+ {(a−1(L1) · L2, ctxt2)}
1253
+ =
1254
+
1255
+ (L1,ctxt1)∈Lctxt(F ),
1256
+ (L2,ctxt2)∈Lctxt1(F ∗)
1257
+ {(a−1(L1 · L2), ctxt2)}
1258
+ =
1259
+
1260
+ (L′,ctxt′)∈Lctxt(F ·F ∗)
1261
+ {(a−1(L′), ctxt′)}
1262
+ =
1263
+
1264
+ (L′,ctxt′)∈Lctxt(ε+F ·F ∗)
1265
+ {(a−1(L′), ctxt′)}
1266
+ =
1267
+
1268
+ (L′,ctxt′)∈Lctxt(F ∗)
1269
+ {(a−1(L′), ctxt′)}
1270
+ – If E = (F)u
1271
+ x,
1272
+
1273
+ (E′,ctxt′)∈dctxt
1274
+ a
1275
+ ((F )u
1276
+ x)
1277
+ Lctxt′(E′) =
1278
+
1279
+ (ctxt′,F ′)∈dctxt
1280
+ a
1281
+ (F )
1282
+ Lctxt′((F ′)u·a
1283
+ x )
1284
+ =
1285
+
1286
+ (ctxt′,F ′)∈dctxt
1287
+ a
1288
+ (F )
1289
+ (L1,ctxt1)∈Lctxt′(F ′),
1290
+ w∈L1
1291
+ {({w}, [ctxt1]x←uaw)}
1292
+ =
1293
+
1294
+ (L1,ctxt1)∈Lctxt(F ),
1295
+ w∈a−1(L1)
1296
+ {({w}, [ctxt1]x←uaw)}
1297
+ =
1298
+
1299
+ (L1,ctxt1)∈Lctxt(F ),
1300
+ aw∈L1
1301
+ {({w}, [ctxt1]x←uaw)}
1302
+ =
1303
+
1304
+ (L1,ctxt1)∈Lctxt(F ),
1305
+ aw∈L1
1306
+ {(a−1({aw}), [ctxt1]x←uaw)}
1307
+ =
1308
+
1309
+ (L1,ctxt1)∈Lctxt(F ),
1310
+ w∈L1
1311
+ {(a−1({w}), [ctxt1]x←uw)}
1312
+ =
1313
+
1314
+ (L′,ctxt′)∈Lctxt((F )u
1315
+ x)
1316
+ {(a−1(L′), ctxt′)}
1317
+
1318
+ – If E = x,
1319
+
1320
+ (E′,ctxt′)∈dctxt
1321
+ a
1322
+ (x)
1323
+ Lctxt′(E′) =
1324
+
1325
+
1326
+
1327
+
1328
+
1329
+
1330
+ (E′,ctxt′)∈dctxt
1331
+ a
1332
+ (w)
1333
+ Lctxt′(E′)
1334
+ if ctxt(x) = Just(w),
1335
+
1336
+ otherwise,
1337
+ =
1338
+
1339
+
1340
+
1341
+
1342
+
1343
+
1344
+ (w,ctxt)∈dctxt
1345
+ a
1346
+ (aw)
1347
+ Lctxt(w)
1348
+ if ctxt(x) = Just(aw),
1349
+
1350
+ otherwise,
1351
+ =
1352
+
1353
+ {({w}, ctxt)}
1354
+ if ctxt(x) = Just(aw),
1355
+
1356
+ otherwise,
1357
+ =
1358
+
1359
+ {(a−1({aw}), ctxt)}
1360
+ if ctxt(x) = Just(aw),
1361
+
1362
+ otherwise,
1363
+ =
1364
+
1365
+ {(a−1({w}), ctxt)}
1366
+ if ctxt(x) = Just(w),
1367
+
1368
+ otherwise,
1369
+ =
1370
+
1371
+ (L′,ctxt′)∈Lctxt(x)
1372
+ {(a−1(L′), ctxt′)}
1373
+ The derivation w.r.t. a word is, as usual, an iterated application of the derivation w.r.t. a symbol, recursively
1374
+ defined as follows, for any Σ, Γ-expression E, for any context ctxt in Ctxt(Γ, Σ), for any symbol a in Σ and for
1375
+ any word v in Σ∗:
1376
+ dctxt
1377
+ ε
1378
+ (E) = {(E, ctxt)},
1379
+ dctxt
1380
+ a·v (E) =
1381
+
1382
+ (E′,ctxt′)∈dctxt
1383
+ a
1384
+ (E)
1385
+ dctxt′
1386
+ v
1387
+ (E′).
1388
+ Example 15. Let us consider the three expressions of Example 14:
1389
+ E = E1 · E2,
1390
+ E1 = ((a∗)xbx)∗,
1391
+ E2 = cx.
1392
+ Then, for any context ctxt,
1393
+ dctxt
1394
+ ab (E) = dctxt
1395
+ b
1396
+ ((a∗)a
1397
+ xbx((a∗)xbx)∗cx)
1398
+ = {(x((a∗)xbx)∗cx, λx → a)}
1399
+ dctxt
1400
+ aba (E) = dλx→a
1401
+ a
1402
+ (x((a∗)xbx)∗cx)
1403
+ = {(((a∗)xbx)∗cx, λx → a)}
1404
+ dctxt
1405
+ abac(E) = dλx→a
1406
+ c
1407
+ (((a∗)xbx)∗cx)
1408
+ = {(x, λx → a)}
1409
+ dctxt
1410
+ abaca(E) = dλx→a
1411
+ a
1412
+ (x)
1413
+ = {(ε, λx → a)}
1414
+ Such an operation allows us to syntactically compute the quotient.
1415
+ Proposition 5. Let E be a Σ, Γ-expression, ctxt be a context in Ctxt(Γ, Σ) and w be a word in Σ∗. Then:
1416
+
1417
+ (E′,ctxt′)∈dctxt
1418
+ w
1419
+ (E)
1420
+ Lctxt′(E′) =
1421
+
1422
+ (L′,ctxt′)∈Lctxt(E)
1423
+ {(w−1(L′), ctxt′)}
1424
+ Proof. By a direct induction over the structure of words.
1425
+ Finally, the membership test of a word w can be performed as usual by first computing the derivation w.r.t. w, and
1426
+ then by determining the existence of a nullable derivative, as a direct corollary of Proposition 3 and Proposition 5.
1427
+ Theorem 2. Let E be a Σ, Γ-expression, ctxt be a context in Ctxt(Γ, Σ) and w be a word in Σ∗. Then the two
1428
+ following conditions are equivalent:
1429
+ – ∃(L, _) ∈ Lctxt(E) | w ∈ L,
1430
+ – ∃(E′, ctxt′) ∈ dctxt
1431
+ w
1432
+ (E) | Nullctxt′(E′) ̸= ∅.
1433
+ We have shown how to compute the derivatives and solve the membership test in a classical way. Let us show how
1434
+ to embed the context computation in a convenient monad, in order to generalize the definitions to other structure
1435
+ than sets.
1436
+
1437
+ 9.5
1438
+ The StateT Monad Transformer
1439
+ Monads do not compose well in general. However, ones can consider particular combinations of these objects. Among
1440
+ those, well-known patterns are the monad transformers like the StateT Monad Transformer [10]. This combination
1441
+ allows us to mimick the use of global variables in a functional way. In our setting, it allows us to embed the context
1442
+ computation in an elegant way.
1443
+ Let S be a set and M be a monad. We denote by StateT(S, M) following the mapping:
1444
+ StateT(S, M)(A) = S → M(A × S).
1445
+ In other terms, StateT(S, M)(A) is the set of functions from S to the monadic structure M(A×S) based on couples
1446
+ in the cartesian product (A × S).
1447
+ The mapping StateT(S, M) can be equipped by a structure of functor, defined for any function f from a set A
1448
+ to a set B by
1449
+ StateT(S, M)(f)(state)(s) = M(λ(a, s) → (f(a), s))(state(s)).
1450
+ It can also be equipped with the structure of monad, defined for any function f from a set A to the set StateT(S, M)(B):
1451
+ pure(a) = λs → pure(a, s)
1452
+ bind(f)(state)(s) = state(s) >>= λ(a, s′) → f(a)(s′)
1453
+ 9.6
1454
+ Monadic Definitions
1455
+ The previous definitions associated with capture-group expressions can be equivalently restated using the StateT
1456
+ monad transformer specialised with the Set monad.
1457
+ Let us first consider the following claims where M = StateT(Ctxt(Γ, Σ), Set), allowing us to bring closer M
1458
+ and the previous notion of monadic support:
1459
+ – R = (M(1), +, ×, 1, 0) is a semiring by setting:
1460
+ f1 + f2 = λs → f1(s) ∪ f2(s),
1461
+ f1 × f2 = f1 >>= λ_ → f2,
1462
+ 1 = λs → {(⊤, s)} = pure(⊤),
1463
+ 0 = λs → ∅,
1464
+ – M = (M(Exp(Σ)), ±, 0) is a monoid by setting:
1465
+ ± = +,
1466
+ 0 = 0,
1467
+ – (M, ⋉) is a Exp(Σ)-right-semimodule by setting:
1468
+ f ⋉ F = λs →
1469
+
1470
+ (E,ctxt)∈f(s)
1471
+ {(E · F, ctxt)},
1472
+ – (M, ⊲) is a R-left-semimodule by setting:
1473
+ f1 ⊲ f2 = f1 >>= λ_ → f2.
1474
+ Then, the nullable predicate formulae can be equivalently restated as an element in StateT(Ctxt(Γ, Σ), Set)(1),
1475
+ which is equal by definition to Ctxt(Γ, Σ) → Set(1 × Ctxt(Γ, Σ)), isomorphic to Ctxt(Γ, Σ) → Set(Ctxt(Γ, Σ)). It
1476
+ can inductively be computed as follows:
1477
+ Null(ε) = 1
1478
+ Null(∅) = 0
1479
+ Null(a) = 0
1480
+ Null(E + F) = Null(E) + Null(F)
1481
+ Null(E · F) = Null(E) × Null(F)
1482
+ Null(E∗) = 1
1483
+ Null(x)(ctxt) =
1484
+
1485
+ pure((⊤, ctxt))
1486
+ if ctxt(x) = Just(ε),
1487
+
1488
+ otherwise,
1489
+ Null((E)u
1490
+ x)(ctxt) = Set(λ(⊤, ctxt′) → (⊤, [ctxt′]x←u))(Null(F)(ctxt)),
1491
+ where E and F are two Σ, Γ-expressions, a is a symbol in Σ, x is a variable in Γ and u is in Σ∗. Notice that
1492
+ these formulae are the same that the ones in Definition 2 as far as classical operators are concerned, and that these
1493
+ formulae can be easily generalized to other convenient monads than Set.
1494
+ Moreover, the derivative of an expression is an element in StateT(Ctxt(Γ, Σ), Set)(Exp(Σ, Γ)):
1495
+ da(ε) = 0
1496
+ da(∅) = 0
1497
+ da(b) =
1498
+
1499
+ 0
1500
+ if a ̸= b,
1501
+ pure(ε)
1502
+ otherwise,
1503
+ da(E + F) = da(E) ± da(F)
1504
+ da(E · F) = da(E) ⋉ F + Null(E) ⊲ da(F)
1505
+ da(E∗) = da(E) ⋉ E∗
1506
+ da((E)u
1507
+ x) = StateT(Ctxt(Γ, Σ), Set)(λF → (F)ua
1508
+ x )(da(E))
1509
+ da(x)(ctxt) =
1510
+
1511
+ pure((w, ctxt))
1512
+ if ctxt(x) = Just(aw),
1513
+
1514
+ otherwise,
1515
+
1516
+ where E and F are two Σ, Γ-expressions, a is a symbol in Σ, x is a variable in Γ and u is in Σ∗. Once again, notice
1517
+ that these formulae are the same that the ones in Definition 5 as far as classical operators are concerned, and that
1518
+ these formulae can be easily generalized to other convenient monads than Set.
1519
+ Finally, the derivation w.r.t. a word is monadically defined as in previous sections:
1520
+ dε(E) = pure(E),
1521
+ dav(E) = da(E) >>= dv,
1522
+ and the membership test of a word w can be equivalently rewritten as follows:
1523
+ (dw(E) >>= Null)(λ_ → Nothing) ̸= ∅.
1524
+ 10
1525
+ Conclusion and Perspectives
1526
+ In this paper, we achieved the first step of our plan to unify the derivative computation over word expressions.
1527
+ Monads are indeed useful tools to abstract the underlying computation structures and thus may allow us to consider
1528
+ some other functionalities, such as capture groups via the well-known StateT monad transformer [10]. We aim to
1529
+ study the conditions satisfying by monads that lead to finite set of derivated terms, and to extend this method
1530
+ to tree expressions using enriched categories. Finally, we plan to extend monadic derivation to other underlying
1531
+ monads for capture groups, linear combinations for example.
1532
+ References
1533
+ 1. Antimirov, V.M.: Partial derivatives of regular expressions and finite automaton constructions. Theor. Comput. Sci.
1534
+ 155(2) (1996) 291–319
1535
+ 2. Attou, S., Mignot, L., Miklarz, C., Nicart, F.: Monadic expressions and their derivatives. In: NCMA. Volume 367 of
1536
+ EPTCS (2022) 49–64
1537
+ 3. Berry, G., Sethi, R.:
1538
+ From regular expressions to deterministic automata.
1539
+ Theoretical computer science 48 (1986)
1540
+ 117–126
1541
+ 4. Brzozowski, J.A.: Derivatives of regular expressions. J. ACM 11(4) (1964) 481–494
1542
+ 5. Caron, P., Flouret, M.: From glushkov wfas to k-expressions. Fundam. Informaticae 109(1) (2011) 1–25
1543
+ 6. Champarnaud, J., Laugerotte, É., Ouardi, F., Ziadi, D.: From regular weighted expressions to finite automata. Int. J.
1544
+ Found. Comput. Sci. 15(5) (2004) 687–700
1545
+ 7. Colcombet, T., Petrisan, D.: Automata and minimization. SIGLOG News 4(2) (2017) 4–27
1546
+ 8. Eisenberg, R.A., Weirich, S.: Dependently typed programming with singletons. In: Haskell, ACM (2012) 117–130
1547
+ 9. Glushkov, V.M.: The abstract theory of automata. Russian Mathematical Surveys 16(5) (1961) 1
1548
+ 10. Jones, M.P.: Functional programming with overloading and higher-order polymorphism. In: Adv. Func. Prog. Volume
1549
+ 925 of LNCS, Springer (1995) 97–136
1550
+ 11. Kleene, S.: Representation of events in nerve nets and finite automata. Automata Studies Ann. Math. Studies 34
1551
+ (1956) 3–41 Princeton U. Press.
1552
+ 12. Loday, J.L., Vallette, B.: Algebraic operads. Volume 346. Springer Science & Business Media (2012)
1553
+ 13. Lombardy, S., Sakarovitch, J.: Derivatives of rational expressions with multiplicity. Theor. Comput. Sci. 332(1-3) (2005)
1554
+ 141–177
1555
+ 14. May, J.P.: The geometry of iterated loop spaces. Volume 271. Springer (2006)
1556
+ 15. Mignot, L.: Une proposition d’implantation des structures d’automates, d’expressions et de leurs algorithmes associés
1557
+ utilisant les catégories enrichies (in french).
1558
+ Habilitation à diriger des recherches, Université de Rouen normandie
1559
+ (Décembre 2020) 212 pages.
1560
+ 16. Mignot, L.: Monadic derivatives. https://github.com/LudovicMignot/MonadicDerivatives (2022)
1561
+ 17. Schützenberger, M.P.: On the definition of a family of automata. Inf. Control. 4(2-3) (1961) 245–270
1562
+ 18. Sulzmann, M., Lu, K.Z.M.: POSIX regular expression parsing with derivatives. In: FLOPS. Volume 8475 of Lecture
1563
+ Notes in Computer Science, Springer (2014) 203–220
1564
+
0tFPT4oBgHgl3EQfTjTq/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:46a711f10f601c1825a35c4c8b3d94027a479a8a4864de43e97b9d3bcd7b1b79
3
+ size 159172
29E2T4oBgHgl3EQfjQdC/content/tmp_files/2301.03966v1.pdf.txt ADDED
@@ -0,0 +1,1687 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ AdvBiom: Adversarial Attacks on Biometric
2
+ Matchers
3
+ Debayan Deb, Vishesh Mistry, Rahul Parthe
4
+ TECH5,
5
+ Troy, MI, USA
6
+ {debayan.deb, vishesh.mistry, rahul.parthe}@tech5-sa.com
7
+ Abstract
8
+ With the advent of deep learning models, face recognition systems have achieved
9
+ impressive recognition rates. The workhorses behind this success are Convolutional
10
+ Neural Networks (CNNs) and the availability of large training datasets. However,
11
+ we show that small human-imperceptible changes to face samples can evade most
12
+ prevailing face recognition systems. Even more alarming is the fact that the same
13
+ generator can be extended to other traits in the future. In this work, we present how
14
+ such a generator can be trained and also extended to other biometric modalities,
15
+ such as fingerprint recognition systems.
16
+ 1
17
+ Introduction
18
+ The last decade has seen a massive influx of deep learning-based technologies that have tackled
19
+ problems which were once thought to be unsolvable. Much of this progress can be attributed to
20
+ Convolutional Neural Networks (CNNs) [1, 2] which are now deployed in a plethora of applications
21
+ ranging from cancer detection to driving autonomous vehicles. Akin to the computer vision domain,
22
+ the use of CNNs have completely changed the face of biometrics due to the availability of powerful
23
+ computing devices (GPUs, TPUs) and deep architectures capable of learning rich features [3–5].
24
+ Automated face recognition systems (AFR) have been proven to achieve accuracies as high as 99%
25
+ True Accept Rate (TAR) @ 0.1% False Accept Rate (FAR) [6], majorly owing to publicly available
26
+ large-scale face datasets.
27
+ Unfortunately, studies have shown that CNN-based networks are vulnerable to adversarial pertur-
28
+ bations1 [7–12]. It is not surprising that AFR systems too are not impervious to these attacks.
29
+ Adversarial attacks to an AFR system can be classified into two categories - (i) impersonation attack
30
+ where the hacker tries to perturb his face image to match it to a target victim, and (ii) obfuscation
31
+ attack where the hacker’s face image is perturbed to match with a random identity. Both the above at-
32
+ tacks involve the hacker adding targeted human-imperceptible perturbations to the face image. These
33
+ adversarial attacks are different from face digital manipulation that include attribute manipulation
34
+ and synthetic faces, and also from presentation attacks which involves the perpetrator wearing a
35
+ physical artifact such as a mask or replaying a photograph/video of a genuine individual which may
36
+ be conspicuous in scenarios where human operators are involved.
37
+ Let us consider, as example, the largest deployment of fingerprint recognition systems - India’s
38
+ Aadhaar Project [13], which currently has an enrolled gallery size of about 1.35 billion faces from
39
+ nearly all of its citizens. In September 2022 alone, Aadhaar received 1.3 billion authentication
40
+ requests2. In order to deny a citizen his/her rightful access to government benefits, healthcare, and
41
+ financial services, an attacker can maliciously perturb enrolled face images such that they do not
42
+ 1Adversarial perturbations refer to altering an input image instance with small, human imperceptible changes
43
+ in a manner that can evade CNN models.
44
+ 2https://bit.ly/3BzlpZJ
45
+ arXiv:2301.03966v1 [cs.CV] 10 Jan 2023
46
+
47
+ match to the genuine person during verification. In a typical AFR system, adversarial faces can
48
+ be replaced with a captured face image in order to prevent the probe face from matching to any of
49
+ its corresponding enrolled faces. Additionally, the attacker can compromise the entire gallery by
50
+ inserting adversarial faces in the enrolled gallery, where no probe face will match to the correct
51
+ identity’s gallery.
52
+ Adversarial attacks can further be categorized into two types of attacks based on how the attack vector
53
+ is trained and generated:
54
+ 1. White-box attack: Attacks in which the hacker has full knowledge of the recognition system,
55
+ and iteratively perturbs every pixel by various optimization schemes are termed as white-box
56
+ attacks [14–22].
57
+ 2. Black-box attack: With no information about the parameters of the recognition system,
58
+ black-box attacks are deployed by either transferring attacks learned from an available AFR
59
+ system [23–28], or querying the the target system for score [29–31] or decision [32, 33].
60
+ 3. Semi-whitebox attack: Here, a white-box model is utilized only during training and then ad-
61
+ versarial examples are synthesized during inference without any knowledge of the deployed
62
+ AFR model.
63
+ We propose an automated adversarial synthesis method, named AdvBiom, which generates an ad-
64
+ versarial image for a probe image and satisfies all the above requirements. The contributions of the
65
+ paper are as follows:
66
+ 1. GAN-based AdvBiom that learns to generate visually realistic adversarial face images that
67
+ are misclassified by state-of-the-art automated biometric systems.
68
+ 2. Adversarial images generated via AdvBiom are model-agnostic and transferable, and achieve
69
+ high success rate on 5 state-of-the-art automated face recognition systems.
70
+ 3. Visualizing regions where pixels are perturbed and analyzing the transferability of AdvBiom .
71
+ 4. We show that AdvBiom achieves significantly higher attack success rate under current
72
+ defense mechanisms compared to baselines.
73
+ 5. With the addition of the proposed Minutiae Displacement and Distortion modules, we show
74
+ thatAdvBiom can also be extended to successfully evade automated fingerprint recognition
75
+ systems.
76
+ 2
77
+ Related Work
78
+ 2.1
79
+ Adversarial Attacks
80
+ As discussed earlier, adversarial attacks are broadly classified into white-box attacks and black-box
81
+ attacks. A large number of white-box attacks are gradient-based where they analyze the gradients
82
+ during the back-propagation of an available face recognition system and perform pixel-wise per-
83
+ turbations to the target face image. While approaches such as FGSM [14] and PGD [17] exploit
84
+ the high-dimensional space of deep networks to generate adversarial attacks, C&W [18] focuses on
85
+ minimizing objective functions for optimal adversarial perturbations. However, the basic assump-
86
+ tion in white-box attacks that the target recognition system will be available is not plausible. In
87
+ real-life scenarios, the hacker will not have any information regarding the architecture, training and
88
+ deployment of the recognition system.
89
+ Black-box attacks can be classified into three major categories: transfer-based, score-based, and
90
+ decision-based attacks. Transfer-based attacks train their adversarial attack generator using readily
91
+ available recognition systems and then deploy the attacks onto a black-box target system. Dong et
92
+ al. [23] proposed the use of momentum for efficient transferability of the adversarial samples. DI2-
93
+ FGSM [24] suggested to increase input data diversity for improving transferability. Other approaches
94
+ in this category include AI-FGSM [27] and TI-FGSM [28]. Score-based attacks [29–31] query the
95
+ target system for scores and try to estimate its gradients. Decision-based attacks have the most
96
+ challenging setting wherein only the decisions from the target system are queried. Some effective
97
+ methods in this category include Evolutionary attack [32] and Boundary attack [33].
98
+ 2
99
+
100
+ 2.2
101
+ Adversarial Attacks on Face Recognition
102
+ Although adversarial attacks on face recognition systems have only been recently explored, there
103
+ has been a significant number of effective approaches for evading AFR systems. Attacks on face
104
+ recognition systems can be broadly categorized into physical attacks and digital attacks. Physical
105
+ attacks involve generating adversarial physical artifacts which are ’worn’ on a face. Sharif et
106
+ al. [34, 35] proposed generating adversarial eye-glass frames for attacking face recognition systems.
107
+ In [36], adversarial printed stickers placed on a hat were generated. However, methods [34–36] are
108
+ implemented in a white-box setting which is unrealistic. Additionally, Nguyen et al. [37] proposed
109
+ an adversarial light projection attack using an on-premise projector. Yin et al. [38] generated and
110
+ printed eye makeup patches to be stuck around the eyes. More recently, authors in [39] proposed an
111
+ adversarial mask for impersonation attacks in a black-box setting. However, all the above methods
112
+ suffer a major drawback of being unrealistic in an operational setting where a human operator is
113
+ present.
114
+ Digital attacks refer to manipulating and perturbing the pixels of a digital face image before being
115
+ passed through a face recognition system. Early works [9, 18, 10, 8, 40] focused on gradient-based
116
+ attacks for face recognition. However, these methods implement lp-norm perturbations to each pixel
117
+ resulting in decreased attack transferability, and vulnerability to denoising models. Cauli et al. [41]
118
+ implemented a backdoor attack where the target face recognition system’s training samples were
119
+ manipulated. Apart from the fact that gaining access to the target AFR’s training samples is highly
120
+ improbable, a thorough visual inspection of the samples can easily identify the digital artifacts. Other
121
+ works employ more stealthy attack approaches against face recognition models. Dong et al. [32]
122
+ proposed an evolutionary optimization method for generating adversarial faces in decision-based
123
+ black-box settings. However, they require a minimum of 1,000 queries to the target face recognition
124
+ system before a realistic adversarial face can be synthesized. [42] added a conditional variational
125
+ autoencoder and attention modules to generate adversarial faces in a transfer-based black-box setting.
126
+ However, they solely focused on impersonation attacks and require at least 5 image samples of the
127
+ target subject for training and inference. Zhong et al. [43] implemented dropout [44] to improve
128
+ the transferability of the adversarial examples. [38] perturbed the eye region of a face to produce
129
+ adversarial eyeshadow artifacts. However, the artifacts are visibly conspicuous under close inspection.
130
+ Deb et al. [25] used a GAN to generate minimal perturbations in salient facial regions. More recently,
131
+ [45] and [46] have focused on manipulating facial attributes for targeted adversarial attacks.
132
+ 3
133
+ Adversarial Faces
134
+ 3.1
135
+ Preliminaries
136
+ The goal of any attacker is to evade Automated Face Recognition (AFR) systems under either of the
137
+ two settings:
138
+ • Obfuscation Manipulate input face images in a manner such that they cannot be identified
139
+ as the hacker, or
140
+ • Impersonation Edit input face images such that they are identified as a target/desired
141
+ individual (victim).
142
+ While the manipulated face image evades the AFR system, a key requirement in a successful attack is
143
+ such that the input face image should appear as a legitimate face photo of the attacker. In other words,
144
+ the attacker desires an automated method of adding small and human-imperceptible changes to an
145
+ input face image such that it can evade AFR systems while appear benign to human observers. These
146
+ changes are denoted as adversarial perturbations and the manipulated image is hereby referred to as
147
+ adversarial images3. In addition, the automated method of synthesizing adversarial perturbations is
148
+ named as adversarial generator.
149
+ Formally, given an input face image, x, an adversarial generator has two requirements under the
150
+ obfuscation scenario:
151
+ • synthesize an adversarial face image, xadv = x + δ, such that AFR systems fail to match
152
+ xadv and x, and
153
+ 3We interchangeably use the terms adversarial images and adversarial faces in this paper.
154
+ 3
155
+
156
+ • limit the magnitude of perturbation ||δ||p such that xadv appears very similar to x to humans.
157
+ When the attack aims to impersonate a target individual, we need an image of the victim xtarget
158
+ where the identity of x and xtarget are different. Therefore, constraints under the impersonation
159
+ setting are as follows:
160
+ • synthesize an adversarial face image, xadv = x + δ, such that AFR systems erroneously
161
+ match xadv and xtarget, and
162
+ • limit the magnitude of perturbation ||δ||p such that xadv appears very similar to x to humans.
163
+ Obfuscation attempts (faces are perturbed such that they cannot be identified as the attacker) are gen-
164
+ erally more effective [25], computationally efficient to synthesize [14, 17], and widely adopted [47]
165
+ compared to impersonation attacks (perturbed faces can automatically match to a target subject).
166
+ Therefore, this paper focuses on crafting obfuscation attacks, however, we will still show examples
167
+ on synthesizing impersonation attacks.
168
+ 3.2
169
+ Gradient-based Attacks
170
+ In white-box attacks, the attacker is assumed to have the knowledge and access to the AFR system’s
171
+ model and parameters. Naturally, we then expect a much better attack success rate under white-box
172
+ settings since the attacker can carefully craft adversarial perturbations that necessarily evade the target
173
+ AFR system. However, these white-box manipulations of face recognition models are impractical in
174
+ real-world scenarios. For instance, assuming access to an airport’s already deployed AFR system
175
+ may be extremely difficult.
176
+ Nevertheless, it is advantageous to understand prevailing white-box methods. That is, if given access
177
+ to a CNN-based AFR system, how could one utilize all of its model parameters to launch a successful
178
+ adversarial attack?
179
+ A common approach is to utilize gradients of the whitebox AFR models. Namely the attackers modify
180
+ the image in the direction of the gradient of the loss function with respect to the input image. There
181
+ are two prevailing approaches to perform such gradient-based attacks:
182
+ • one-shot attacks, in which the attacker takes a single step in the direction of the gradient,
183
+ and
184
+ • iterative attacks where instead of a single step, several steps are taken until we obtain a
185
+ successful adversarial pattern.
186
+ 3.2.1
187
+ Fast Gradient Sign Method (FGSM)
188
+ This method computes an adversarial image by adding a pixel-wide perturbation of magnitude in the
189
+ direction of the gradient [14]. Under FGSM attack, we take a single step towards the direction of the
190
+ gradient, and therefore, FGSM is very efficient in terms of computation time. Formally, given an
191
+ input image x, we obtain an adversarial image xadv:
192
+ xadv = x + ϵ · sign (▽xJ (x, y))
193
+ where, J is the loss function used to train the AFR system (typically, softmax cross entropy loss), and
194
+ y is the ground truth class label of x (typically, the subject ID of the identity in x).
195
+ FGSM was first proposed for the object classification domain and therefore, utilizes softmax proba-
196
+ bilities for crafting adversarial perturbations. Therefore, the number of object classes are assumed to
197
+ be known during training and testing. However, face recognition systems do not utilize the softmax
198
+ layer for classification (as the number of identities are not fixed during deployment) instead features
199
+ from the last fully connected layer are used for comparing face images.
200
+ We first modify FGSM appropriately in order to evade AFR systems rather than object classifiers.
201
+ Instead of considering the softmax cross-entropy loss as J, we craft a new loss function that models
202
+ real-world scenario4:
203
+ LfeatureMatch = 1 − Ex
204
+
205
+ F(x) · F(xadv)
206
+ ||F(x)|| ||F(xadv)||
207
+
208
+ .
209
+ 4For brevity, we denote Ex ≡ Ex∈Pdata.
210
+ 4
211
+
212
+ where, F is the matcher and F(x) is the feature representation of an input image x. The above feature
213
+ matching loss function computes the cosine distance between a pair of images and ensures that the
214
+ features between adversarial image xadv and input image x are as close as possible. Therefore, the
215
+ gradient of the above loss ensures the features do not match and hence, can be considered as an
216
+ obfuscation adversarial attack.
217
+ In Fig. 1, we show the results of launching our modified FGSM attack on a state-of-the-art AFR
218
+ system, namely ArcFace [3]. We see that with a single step and with minimal perturbations, the real
219
+ and adversarial images of Tiger Woods does not match via ArcFace while humans can easily identity
220
+ both images as pertaining to the same subject.
221
+ (a) Real Input Image
222
+ (b) Perturbation
223
+ (c) FGSM [14]
224
+ Figure 1: Adversarial face synthesized via FGSM [14]. A state-of-the-art face matcher, ArcFace [3], fails to
225
+ match the adversarial and input image. Cosine similarity score (∈ [−1, 1]) between the two images is 0.27,
226
+ while a score above 0.36 (threshold @ 0.1% False Accept Rate) indicates that two faces are of the same subject.
227
+ 3.2.2
228
+ Projected Gradient Descent (PGD)
229
+ An extreme case of white-box attacks is the PGD attack [17] where we assume that the attacker also
230
+ has unlimited number of attempts to try and evade the deployed AFR system. Unlike FGSM, PGD is
231
+ an iterative attack. PGD attempts to find the perturbation δ that maximises the loss of a model on a
232
+ particular input while keeping the size of the perturbation smaller than a specified amount referred
233
+ to as ϵ. We keep iterating until such a δ is obtained. Similar to FGSM, we modify the loss function
234
+ of PGD to fit the requirements of AFR system by again considering LfeatureMatch as the loss. Fig.
235
+ 2 shows the results of PGD attack on ArcFace matcher. Note that due to multiple iterations, PGD
236
+ attack on AFR systems is more powerful (lower cosine similarity) but also more visible to humans as
237
+ compared to the single-step FGSM attack.
238
+ (a) Real Input Image
239
+ (b) Perturbation
240
+ (c) PGD [17]
241
+ Figure 2: Adversarial face synthesized via PGD [17]. A state-of-the-art face matcher, ArcFace [3], fails to match
242
+ the adversarial and input image. Cosine similarity score (∈ [−1, 1]) between the two images is 0.12, while a
243
+ score above 0.36 (threshold @ 0.1% False Accept Rate) indicates that two faces are of the same subject.
244
+ 3.3
245
+ Geometric Perturbations (GFLM)
246
+ Prior efforts in crafting adversarial faces have also tried non-linear deformations as a natural method
247
+ for evading AFR systems [48]. Non-linear deformations are applied by performing geometric warping
248
+ to the input face images.
249
+ Unlike traditional adversarial perturbations that basically add an adversarial perturbation δ, authors
250
+ in [48] propose a fast method of generating adversarial faces by altering the landmark locations of
251
+ the input images. The resulting adversarial faces completely lie on the manifold of natural images,
252
+ which makes it extremely difficult to detect any adversarial perturbations. Results of geometrically
253
+ warped adversarial faces are presented in 3.
254
+ 5
255
+
256
+ (a) Real Input Image
257
+ (b) Perturbation
258
+ (c) GFLM
259
+ Figure 3: Adversarial face synthesized via GFLM [48]. A state-of-the-art face matcher, ArcFace [3], fails to
260
+ match the adversarial and input image. Cosine similarity score (∈ [−1, 1]) between the two images is 0.33,
261
+ while a score above 0.36 (threshold @ 0.1% False Accept Rate) indicates that two faces are of the same subject.
262
+ 3.4
263
+ Attribute-based Perturbations
264
+ Unlike geometric-warping and gradient-based attacks that may perturb every pixel in the image, a
265
+ few studies propose manipulating only salient regions in faces, e.g., eyes, nose, and mouth.
266
+ By restricting perturbations to only semantic regions of the face, SemanticAdv [46] generates
267
+ adversarial examples in a more controllable fashion by editing a single semantic aspect through
268
+ attribute-conditioned image editing. Fig. 4 shows results from adversarial manipulating semantic
269
+ attributes. We can see while the attacks are indeed successful, it comes at the cost of altering the
270
+ perceived identity as well as leads to degraded image quality.
271
+ (a) Real Input Image
272
+ (b) Blond
273
+ (c) Bangs
274
+ (d) Mouth Open
275
+ (e) Eyeglasses
276
+ (f) Makeup
277
+ Figure 4: Adversarial face synthesized via manipulating semantic attributes [46]. All adversarial images (b-f)
278
+ fail to match with the real image (a) via ArcFace [3].
279
+ 4
280
+ AdvBiom: Learning to Synthesize Adversarial Attacks
281
+ We find that majority of prior efforts on crafting adversarial attacks either degrade the visual quality
282
+ where an observant human can still visually pick out the adversarial patterns. We also identify the
283
+ following challenges with prior efforts:
284
+ • Gradient-based attacks rely on white-box settings where the entire deployed CNN-based
285
+ AFR system is available to the attacker to compute its gradients.
286
+ • Geometrically-warping faces generally do not guarantee adversarial success and greatly
287
+ distort the face image.
288
+ • Semantic attribute manipulation can also degrade visual quality and may lead to greater
289
+ conspicuous changes.
290
+ Instead, we propose to train a network to “learn" the salient regions of the face that can be perturbed
291
+ to evade AFR systems in a semi-whitebox setting. These leads to the following advantages over prior
292
+ efforts:
293
+ 6
294
+
295
+ • Perceptual Realism Given a large enough training dataset, a network can gradually learn to
296
+ synthesize adversarial face images that are perceptually realistic such that a human observer
297
+ can identify the image as a legitimate face image.
298
+ • Higher Attack Success The faces can be learned to be perturbed in a manner such that they
299
+ cannot be identified as the hacker (obfuscation at- tack) or automatically matched to a target
300
+ subject (impersonation attack) by an AFR system.
301
+ • Controllable The amount of perturbation can also be controllable by the attacker so that
302
+ they can examine the success of the learning model as a function of amount of perturbation.
303
+ • Transferability Due to the semi-whitebox setting: once the network learns to generate the
304
+ perturbed instances based on a single face recognition system, attacks can be transferred to
305
+ any black-box AFR systems.
306
+ We propose an automated adversarial biometric synthesis method, named AdvBiom, which generates
307
+ an adversarial image for a probe face image and satisfies all the above requirements.
308
+ 4.1
309
+ Methodology
310
+ Our goal is to synthesize a face image that visually appears to pertain to the target face, yet automatic
311
+ face recognition systems either incorrectly matches the synthesized image to another person or does
312
+ not match to target’s gallery images. AdvBiom comprises of a generator G, a discriminator D, and
313
+ face matcher (see Figure 5).
314
+ Probe
315
+ ℒ"#$
316
+ Synthesized
317
+ +
318
+ ℒ%&'()%)*
319
+ ℒ+',)-,./)%0(
320
+ Adversarial Mask
321
+ 1
322
+
323
+ 3
324
+ Figure 5: Given a probe face image, AdvBiom automatically generates an adversarial mask that is then added to
325
+ the probe to obtain an adversarial face image.
326
+ Generator
327
+ The proposed generator takes an input face image, x ∈ X, and outputs an image, G(x).
328
+ The generator is conditioned on the input image x; for different input faces, we will get different
329
+ synthesized images.
330
+ Since our goal is to obtain an adversarial image that is metrically similar to the probe in the image
331
+ space, x, it is not desirable to perturb all the pixels in the probe image. For this reason, we treat the
332
+ output from the generator as an additive mask and the adversarial face is defined as x + G(x). If
333
+ the magnitude of the pixels in G(x) is minimal, then the adversarial image comprises mostly of the
334
+ probe x. Here, we denote G(x) as an “adversarial mask". In order to bound the magnitude of the
335
+ adversarial mask, we introduce a perturbation loss during training by minimizing the L2 norm5:
336
+ Lperturbation = Ex [max (ϵ, ∥G(x)∥2)]
337
+ (1)
338
+ where ϵ ∈ [0, ∞) is a hyperparameter that controls the minimum amount of perturbation allowed.
339
+ 5For brevity, we denote Ex ≡ Ex∈X .
340
+ 7
341
+
342
+ In order to achieve our goal of impersonating a target subject’s face or obfuscating one’s own identity,
343
+ we need a face matcher, F, to supervise the training of AdvBiom. For obfuscation attack, at each
344
+ training iteration, AdvBiom tries to minimize the cosine similarity between face embeddings of the
345
+ input probe x and the generated image x + G(x) via an identity loss function:
346
+ Lidentity = Ex[F(x, x + G(x))]
347
+ (2)
348
+ For an impersonation attack, AdvBiom maximizes the cosine similarity between the face embeddings
349
+ of a randomly chosen target’s probe, y, and the generated adversarial face x + G(x) via:
350
+ Lidentity = Ex[1 − F(y, x + G(x))]
351
+ (3)
352
+ The perturbation and identity loss functions enforce the network to learn the salient facial regions
353
+ that can be perturbed minimally in order to evade automatic face recognition systems.
354
+ Discriminator
355
+ Akin to previous works on GANs [49, 50], we introduce a discriminator in order
356
+ to encourage perceptual realism of the generated images. We use a fully-convolution network as a
357
+ patch-based discriminator [50]. Here, the discriminator, D, aims to distinguish between a probe, x,
358
+ and a generated adversarial face image x + G(x) via a GAN loss:
359
+ LGAN =
360
+ Ex [log D(x)] +
361
+ Ex[log(1 − D(x + G(x)))]
362
+ (4)
363
+ Finally, AdvBiom is trained in an end-to-end fashion with the following objectives:
364
+ min
365
+ D LD = −LGAN
366
+ (5)
367
+ min
368
+ G LG = LGAN + λiLidentity + λpLperturbation
369
+ (6)
370
+ where λi and λp are hyper-parameters controlling the relative importance of identity and perturbation
371
+ losses, respectively. Note that LGAN and Lperturbation encourage the generated images to be visually
372
+ similar to the original face images, while Lidentity optimizes for a high attack success rate. After
373
+ training, the generator G can generate an adversarial face image for any input image and can be tested
374
+ on any black-box face recognition system.
375
+ The overall algorithm describing the training procedure of AdvBiom can be found in Algorithm 1.
376
+ 4.2
377
+ Experimental Results
378
+ Evaluation Metrics
379
+ We quantify the effectiveness of the adversarial attacks generated by Ad-
380
+ vBiom and other state-of-the-art baselines via (i) attack success rate and (ii) structural similarity
381
+ (SSIM).
382
+ The attack success rate for obfuscation attack is computed as,
383
+ Attack Success Rate = (No. of Comparisons < τ)
384
+ Total No. of Comparisons
385
+ (7)
386
+ where each comparison consists of a subject’s adversarial probe and an enrollment image. Here, τ
387
+ is a pre-determined threshold computed at, say, 0.1% FAR6. Attack success rate for impersonation
388
+ attack is defined as,
389
+ Attack Success Rate = (No. of Comparisons ≥ τ)
390
+ Total No. of Comparisons
391
+ (8)
392
+ Here, a comparison comprises of an adversarial image synthesized with a target’s probe and matched
393
+ to the target’s enrolled image. We evaluate the success rate for the impersonation setting via 10-fold
394
+ cross-validation where each fold consists of a randomly chosen target.
395
+ Similar to prior studies [42], in order to measure the similarity between the adversarial example and
396
+ the input face, we compute the structural similarity index (SSIM) between the images. SSIM is a
397
+ normalized metric between −1 (completely different image pairs) to 1 (identical image pairs).
398
+ 6For each face matcher, we pre-compute the threshold at 0.1% FAR on all possible image pairs in LFW.
399
+ For e.g., threshold @ 0.1% FAR for ArcFace is 0.28.
400
+ 8
401
+
402
+ Algorithm 1 Training AdvBiom. All experiments in this work use α = 0.0001, β1 = 0.5, β2 = 0.9,
403
+ λi = 10.0, λp = 1.0, m = 32.
404
+ We set ϵ = 3.0 (obfuscation), ϵ = 8.0 (impersonation).
405
+ 1: Input
406
+ 2:
407
+ X
408
+ Training Dataset
409
+ 3:
410
+ F
411
+ Cosine similarity between an image pair obtained by biometric matcher
412
+ 4:
413
+ G
414
+ Generator with weights Gθ
415
+ 5:
416
+ D
417
+ Discriminator with weights Dθ
418
+ 6:
419
+ m
420
+ Batch size
421
+ 7:
422
+ α
423
+ Learning rate
424
+ 8: for number of training iterations do
425
+ 9:
426
+ Sample a batch of probes {x(i)}m
427
+ i=1 ∼ X
428
+ 10:
429
+ if impersonation attack then
430
+ 11:
431
+ Sample a batch of target images y(i) ∼ X
432
+ 12:
433
+ δ(i) = G((x(i), y(i))
434
+ 13:
435
+ else if obfuscation attack then
436
+ 14:
437
+ δ(i) = G(x(i))
438
+ 15:
439
+ end if
440
+ 16:
441
+ x(i)
442
+ adv = x(i) + δ(i)
443
+ 17:
444
+ Lperturbation = 1
445
+ m
446
+ ��m
447
+ i=1 max
448
+
449
+ ϵ, ||δ(i)||2
450
+ ��
451
+ 18:
452
+ if impersonation attack then
453
+ 19:
454
+ Lidentity = 1
455
+ m
456
+ ��m
457
+ i=1 F
458
+
459
+ x(i), x(i)
460
+ adv
461
+ ��
462
+ 20:
463
+ else if obfuscation attack then
464
+ 21:
465
+ Lidentity = 1
466
+ m
467
+ ��m
468
+ i=1
469
+
470
+ 1 − F
471
+
472
+ y(i), x(i)
473
+ adv
474
+ ���
475
+ 22:
476
+ end if
477
+ 23:
478
+ LG
479
+ GAN = 1
480
+ m
481
+ ��m
482
+ i=1 log
483
+
484
+ 1 − D(x(i)
485
+ adv)
486
+ ��
487
+ 24:
488
+ LD = 1
489
+ m
490
+ �m
491
+ i=1
492
+
493
+ log
494
+
495
+ D(x(i))
496
+
497
+ + log
498
+
499
+ 1 − D(x(i)
500
+ adv)
501
+ ��
502
+ 25:
503
+ LG = LG
504
+ GAN + λiLidentity + λpLperturbation
505
+ 26:
506
+ Gθ = Adam(▽GLG, Gθ, α, β1, β2)
507
+ 27:
508
+ Dθ = Adam(▽DLD, Dθ, α, β1, β2)
509
+ 28: end for
510
+ Datasets
511
+ We train AdvBiom on CASIA-WebFace [51] and then test on LFW [52]7.
512
+ • CASIA-WebFace [51] is comprised of 494,414 face images belonging to 10,575 different
513
+ subjects. We removed 84 subjects that are also present in LFW and the testing images in
514
+ this paper.
515
+ • LFW [52] contains 13,233 web-collected images of 5,749 different subjects. In order to
516
+ compute the attack success rate, we only consider subjects with at least two face images.
517
+ After this filtering, 9,614 face images of 1,680 subjects are available for evaluation.
518
+ All the testing images in this paper have no identity overlap with the training set, CASIA-
519
+ WebFace [51].
520
+ Data Preprocessing
521
+ All face images are passed through MTCNN face detector [53] to detect five
522
+ landmarks (two eyes, nose, and two mouth corners). Via similarity transformation, the face images
523
+ are aligned. After transformation, the images are resized to 160 × 160. Prior to training and testing,
524
+ each pixel in the RGB image is normalized by subtracting 127.5 and dividing by 128.
525
+ Experimental Settings
526
+ We use ADAM optimizers in Tensorflow with β1 = 0.5 and β2 = 0.9 for
527
+ the entire network. Each mini-batch consists of 32 face images. We train AdvBiom for 200,000 steps
528
+ with a fixed learning rate of 0.0001. Since our goal is to generate adversarial faces with high success
529
+ 7Training on CASIA-WebFace and evaluating on LFW is a common approach in face recognition literature [3,
530
+ 4]
531
+ 9
532
+
533
+ rate, the identity loss is of utmost importance. We empirically set λi = 10.0 and λp = 1.0. We
534
+ train two separate models and set ϵ = 3.0 and ϵ = 8.0 for obfuscation and impersonation attacks,
535
+ respectively.
536
+ Gallery
537
+ Probe
538
+ Proposed AdvBiom
539
+ GFLM [48]
540
+ PGD [17]
541
+ FGSM [14]
542
+ 0.68
543
+ 0.14
544
+ 0.26
545
+ 0.27
546
+ 0.04
547
+ 0.38
548
+ 0.08
549
+ 0.12
550
+ 0.21
551
+ 0.02
552
+ (a) Obfuscation Attack
553
+ Target’s Gallery Target’s Probe
554
+ Probe
555
+ Proposed AdvBiom
556
+ A3GN [42]
557
+ FGSM [14]
558
+ 0.78
559
+ 0.10
560
+ 0.30
561
+ 0.29
562
+ 0.36
563
+ 0.80
564
+ 0.15
565
+ 0.34
566
+ 0.33
567
+ 0.42
568
+ (b) Impersonation Attack
569
+ Figure 6: Adversarial face synthesis results on LFW dataset in (a) obfuscation and (b) impersonation attack
570
+ settings (cosine similarity scores obtained from ArcFace [3] with threshold @ 0.1% FAR= 0.28). The proposed
571
+ method synthesizes adversarial faces that are seemingly inconspicuous and maintain high perceptual quality.
572
+ Architecture
573
+ Let c7s1-k be a 7 × 7 convolutional layer with k filters and stride 1. dk denotes a
574
+ 4 × 4 convolutional layer with k filters and stride 2. Rk denotes a residual block that contains two
575
+ 3 × 3 convolutional layers. uk denotes a 2× upsampling layer followed by a 5 × 5 convolutional
576
+ layer with k filters and stride 1. We apply Instance Normalization and Batch Normalization to the
577
+ generator and discriminator, respectively. We use Leaky ReLU with slope 0.2 in the discriminator
578
+ and ReLU activation in the generator. The architectures of the two modules are as follows:
579
+ • Generator:
580
+ c7s1-64,d128,d256,R256,R256,R256, u128, u64, c7s1-3
581
+ • Discriminator:
582
+ d32,d64,d128,d256,d512
583
+ A 1 × 1 convolutional layer with 3 filters and stride 1 is attached to the last convolutional layer of the
584
+ discriminator for the patch-based GAN loss LGAN.
585
+ We apply the tanh activation function on the last convolution layer of the generator to ensure
586
+ that the generated image ∈ [−1, 1]. In the paper, we denoted the output of the tanh layer as an
587
+ “adversarial mask”, G(x) ∈ [−1, 1] and x ∈ [−1, 1]. The final adversarial image is computed as
588
+ 10
589
+
590
+ Obfuscation Attack
591
+ Proposed AdvBiom
592
+ GFLM [48]
593
+ PGD [17]
594
+ FGSM [14]
595
+ Attack Success Rate (%) @ 0.1% FAR
596
+ FaceNet [5]
597
+ 99.67
598
+ 23.34
599
+ 99.70
600
+ 99.96
601
+ SphereFace [4]
602
+ 97.22
603
+ 29.49
604
+ 99.34
605
+ 98.71
606
+ ArcFace [3]
607
+ 64.53
608
+ 03.43
609
+ 33.25
610
+ 35.30
611
+ COTS-A
612
+ 82.98
613
+ 08.89
614
+ 18.74
615
+ 32.48
616
+ COTS-B
617
+ 60.71
618
+ 05.05
619
+ 01.49
620
+ 18.75
621
+ Structural Similarity
622
+ 0.95 ± 0.01
623
+ 0.82 ± 0.12
624
+ 0.29 ± 0.06
625
+ 0.25 ± 0.06
626
+ Computation Time (s)
627
+ 0.01
628
+ 3.22
629
+ 11.74
630
+ 0.03
631
+ Impersonation Attack
632
+ Proposed AdvBiom
633
+ A3GN [42]
634
+ PGD [17]
635
+ FGSM [14]
636
+ Attack Success Rate (%) @ 0.1% FAR
637
+ FaceNet [5]
638
+ 20.85 ± 0.40
639
+ 05.99 ± 0.19
640
+ 76.79 ± 0.26
641
+ 13.04 ± 0.12
642
+ SphereFace [4]
643
+ 20.19 ± 0.27
644
+ 07.94 ± 0.19
645
+ 09.03 ± 0.39
646
+ 02.34 ± 0.03
647
+ ArcFace [3]
648
+ 24.30 ± 0.44
649
+ 17.14 ± 0.29
650
+ 19.50 ± 1.95
651
+ 08.34 ± 0.21
652
+ COTS-A
653
+ 20.75 ± 0.35
654
+ 15.01 ± 0.30
655
+ 01.76 ± 0.10
656
+ 01.40 ± 0.08
657
+ COTS-B
658
+ 19.85 ± 0.28
659
+ 10.23 ± 0.50
660
+ 12.49 ± 0.24
661
+ 04.67 ± 0.16
662
+ Structural Similarity
663
+ 0.92 ± 0.02
664
+ 0.69 ± 0.04
665
+ 0.77 ± 0.04
666
+ 0.48 ± 0.75
667
+ Computation Time (s)
668
+ 0.01
669
+ 0.04
670
+ 11.74
671
+ 0.03
672
+ White-box matcher (used for training)
673
+ Black-box matcher (never used in training)
674
+ Table 1: Attack success rates and structural similarities between probe and gallery images for obfus-
675
+ cation and impersonation attacks. Attack rates for obfuscation comprises of 484,514 comparisons and
676
+ the mean and standard deviation across 10-folds for impersonation reported. The mean and standard
677
+ deviation of the structural similarities between adversarial and probe images along with the time
678
+ taken to generate a single adversarial image (on a Quadro M6000 GPU) also reported.
679
+ xadv = 2 × clamp
680
+
681
+ G(x) +
682
+ � x+1
683
+ 2
684
+ ��1
685
+ 0 − 1. This ensures G(x) can either add or subtract pixels from
686
+ x when G(x) ̸= 0. When G(x) → 0, then xadv → x.
687
+ Face Recognition Systems
688
+ For all our experiments, we employ 5 state-of-the-art face matchers8.
689
+ Three of them are publicly available, namely, FaceNet [5], SphereFace [4], and ArcFace [3]. We also
690
+ report our results on two commercial-off-the-shelf (COTS) face matchers, COTS-A and COTS-B9.
691
+ We use FaceNet [5] as the white-box face recognition model, F, during training. All the testing
692
+ images in this paper are generated from the same model (trained only with FaceNet) and tested on
693
+ different matchers.
694
+ 4.2.1
695
+ Comparison with Prevailing Adversarial Face Generators
696
+ We compare our adversarial face synthesis method with state-of-the-art methods that have specifi-
697
+ cally been implemented or proposed for faces, including GFLM [48], PGD [17], FGSM [14], and
698
+ A3GN [42]10. In Table 1, we find that compared to the state-of-the-art, AdvBiom generates adversarial
699
+ faces that are similar to the probe 6.
700
+ Moreover, the adversarial images attain a high obfuscation attack success rate on 4 state-of-the-art
701
+ black-box AFR systems in both obfuscation and impersonation settings. AdvBiom learns to perturb
702
+ the salient regions of the face, unlike PGD [17] and FGSM [14], which alter every pixel in the
703
+ image. GFLM [48], on the other hand, geometrically warps the face images and thereby, results
704
+ in low structural similarity. In addition, the state-of-the-art matchers are robust to such geometric
705
+ deformation which explains the low success rate of GFLM on face matchers. A3GN, another
706
+ GAN-based method, however, fails to achieve a reasonable success rate in an impersonation setting.
707
+ 8All the open-source and COTS matchers achieve 99% accuracy on LFW under LFW protocol.
708
+ 9Both COTS-A and COTS-B utilize CNNs for face recognition. COTS-B is one of the top performers in the
709
+ NIST Ongoing Face Recognition Vendor Test (FRVT) [54].
710
+ 10We train the baselines using their official implementations (detailed in the supplementary material).
711
+ 11
712
+
713
+ 4.2.2
714
+ Ablation Study
715
+ In order to analyze the importance of each module in our system, in Figure 7, we train three variants
716
+ of AdvBiom for comparison by removing the discriminator (D), perturbation loss Lperturbation, and
717
+ identity loss Lidentity, respectively.
718
+ Input
719
+ w/o D
720
+ w/o Lprt
721
+ w/o Lidt
722
+ with all
723
+ Figure 7: Variants of AdvBiom trained without the discriminator, perturbation loss, and identity loss, respectively.
724
+ Every component of AdvBiom is necessary.
725
+ The discriminator helps to ensure the visual quality of the synthesized faces are maintained. With
726
+ the generator alone, undesirable artifacts are introduced. Without the proposed perturbation loss,
727
+ perturbations in the adversarial mask are unbounded and therefore, leads to a lack in perceptual
728
+ quality. The identity loss is imperative in ensuring an adversarial image is obtained. Without the
729
+ identity loss, the synthesized image cannot evade state-of-the-art face matchers. We find that every
730
+ component of AdvBiom is necessary in order to obtain an adversarial face that is not only perceptually
731
+ realistic but can also evade state-of-the-art face matchers.
732
+ 4.2.3
733
+ What is AdvBiom Learning?
734
+ Via Lperturbation, during training, AdvBiom learns to perturb only the salient facial regions that can
735
+ evade the face matcher, F (FaceNet [5] in our case). In Figure 8, AdvBiom synthesizes the adversarial
736
+ masks corresponding to the probes. We then threshold the mask to extract pixels with perturbation
737
+ magnitudes exceeding 0.40. It can be inferred that the eyebrows, eyeballs, and nose contain highly
738
+ discriminative information that an AFR system utilizes to identify an individual. Therefore, perturbing
739
+ these salient regions are enough to evade state-of-the-art face recognition systems.
740
+ 4.2.4
741
+ Transferability of AdvBiom
742
+ In Table 1, we find that attacks synthesized by AdvBiom when trained on a white-box matcher
743
+ (FaceNet), can successfully evade 5 other face matchers that are not utilized during training in both
744
+ obfuscation and impersonation settings. In order to investigate the transferability property of AdvBiom,
745
+ we extract face embeddings of real images and their corresponding adversarial images, under the
746
+ obfuscation setting, via the white-box matcher (FaceNet) and a black-box matcher (ArcFace). In total,
747
+ we extract feature vectors from 1,456 face images of 10 subjects in the LFW dataset [52]. In Figure 9,
748
+ we plot the correlation heatmap between face features of real images, their corresponding adversarial
749
+ masks and adversarial images. First, we observe that face embeddings of real images extracted by
750
+ FaceNet and ArcFace are correlated in a similar fashion. This indicates that both matchers extract
751
+ features with related pairwise correlations. Consequently, perturbing salient features for FaceNet
752
+ can lead to high attack success rates for ArcFace as well. The similarity among the correlation
753
+ distributions of both matchers can also be observed when adversarial masks and adversarial images
754
+ are input to the matchers. That is, receptive fields for automatic face recognition systems attend to
755
+ similar regions in the face.
756
+ 12
757
+
758
+ Probe
759
+ Adv. Mask
760
+ Visualization
761
+ Adv. Image
762
+ 0.12
763
+ 0.26
764
+ Figure 8: State-of-the-art face matchers can be evaded by slightly perturbing salient facial regions, such as
765
+ eyebrows, eyeballs, and nose (cosine similarity obtained via ArcFace [3]).
766
+ Figure 9: Correlation between face features extracted via FaceNet and ArcFace from 1,456 images belonging to
767
+ 10 subjects.
768
+ To further illustrate the distributions of the embeddings of real and synthesized images, we plot
769
+ the 2D t-SNE visualization of the face embeddings for the 10 subjects in Figure 10. The identity
770
+ clusterings can be clearly observed from both real and adversarial images. In particular, the adversarial
771
+ counterpart of each subject forms a new cluster that draws closer to the adversarial clusterings of
772
+ other subjects. This shows that AdvBiom perturbs only salient pixels related to face identity while
773
+ maintaining a semantic meaning in the feature space, resulting in a similar manifold of synthesized
774
+ faces to that of real faces.
775
+ 4.2.5
776
+ Controllable Perturbation
777
+ The perturbation loss, Lperturbation is bounded by a hyper-parameter, ϵ, i.e., the L2 norm of the
778
+ adversarial mask must be at least ϵ. Without this constraint, the adversarial mask becomes a blank
779
+ image with no changes to the probe. With ϵ, we can observe a trade-off between the attack success
780
+ rate and the structural similarity between the probe and synthesized adversarial face (Fig. 11). A
781
+ higher ϵ leads to less perturbation restriction, resulting in a higher attack success rate at the cost of a
782
+ lower structural similarity. For an impersonation attack, this implies that the adversarial image may
783
+ 13
784
+
785
+ Real Image
786
+ Adversarial Mask
787
+ Adversarial Image
788
+ 0.8
789
+ FaceNet
790
+ 0.4
791
+ 0.0
792
+ ArcFace
793
+ -0.4FaceNet
794
+ Real Image
795
+ Adversarial Image (Obfuscation)
796
+ ArcFace
797
+ Figure 10: 2D t-SNE visualization of face representations extracted via FaceNet and ArcFace from 1,456 images
798
+ belonging to 10 subjects.
799
+ contain facial features from both the hacker and the target. In our experiments, we chose ϵ = 8.0 and
800
+ ϵ = 3.0 for impersonation and obfuscation attacks, respectively.
801
+ 4
802
+ 6
803
+ 8
804
+ 10
805
+ 12
806
+ 14
807
+ 16
808
+ 0.81
809
+ 0.92
810
+ 0.95
811
+ 0.76
812
+ 0.69
813
+ 5
814
+ 13
815
+ 21
816
+ 39
817
+ 52
818
+ 60
819
+ 66
820
+ Hyper-parameter (ε)
821
+ Success Rate (%)
822
+ Structural Similarity
823
+ ε = 4.0
824
+ ε = 8.0
825
+ ε = 10.0
826
+ ε = 16.0
827
+ Figure 11: Trade-off between attack success rate and structural similarity for impersonation attacks.
828
+ 4.2.6
829
+ Attacks via AdvBiom Beyond Faces
830
+ We now show that the AdvBiommethod, coupled with the proposed Minutiae Displacement and
831
+ Distortion Modules, can be extended to effectively generate adversarial fingerprints which are visually
832
+ similar to corresponding probe fingerprints while evading two state-of-the-art COTS fingerprint
833
+ matchers as well as a deep network-based fingerprint matcher.
834
+ 14
835
+
836
+ FS: 0.97
837
+ FS: 0.92
838
+ (a) Enrolled Mate
839
+ VS: 235 | FS: 0.96
840
+ VS: 172 | FS: 0.99
841
+ (b) Input Probe
842
+ VS: 31 | FS: 0.92
843
+ VS: 10 | FS: 0.92
844
+ (c) AdvBiom
845
+ VS: 134 | FS: 0.96
846
+ VS: 104 | FS: 0.96
847
+ (d) DeepFool [16]
848
+ VS: 139 | FS: 0.95
849
+ VS: 104 | FS: 0.96
850
+ (d) PGD [17]
851
+ Figure 12: Example probe and corresponding mate fingerprints along with synthesized adversarial probes. (a)
852
+ Two example mate fingerprints from NIST SD4 [55], and (b) the corresponding mates. Adversarial probe
853
+ fingerprints using different approaches are shown in: (c) proposed synthesis method, AdvBiom; (d-e) state-of-
854
+ the-art methods, DeepFool and PGD respectively. VeriFinger v11.0 match score (probe v. mate) - VS, and the
855
+ fingerprintness score (degree of similarity of a given image to a fingerprint pattern) - FS ∈ [0,1] [56], which
856
+ ranges from 1 (the highest) to 0 (the lowest), are given below each image. A VS of above 48 (at 0.01% FAR)
857
+ indicates a successful match between the probe and the mate. The proposed attack AdvBiom successfully
858
+ evades COTS and deep network-based matchers, while maintaining visual fingerprint perceptibility and high
859
+ fingerprintness scores.
860
+ Grosz et. al [57] showed that random minutiae position displacements and non-linear distortions
861
+ drastically affected the performance of COTS fingerprint matchers. AdvBiom builds upon these two
862
+ perturbations and when given a probe fingerprint, can synthesize an adversarial fingerprint image that
863
+ retains all of the original fingerprint attributes except the identity, i.e. a fingerprint recognition system
864
+ should not match the adversarial fingerprint to the probe fingerprint (obfuscation attack).
865
+ Figure 13 shows the schematic of AdvBiom conditioned for fingerprints. The following subsections
866
+ explain the major components of the approach in detail.
867
+ Minutiae Displacement Module
868
+ While the authors in [57] showed the effectiveness of random
869
+ minutiae position displacements on COTS matchers, they studied the effect of this perturbation by
870
+ directly modifying the minutiae template instead of the fingerprint image (pixel space). However, it
871
+ may be difficult to obtain the minutiae template of a given fingerprint image using COTS minutiae
872
+ extractors rather than the source fingerprint image itself. Thus, we propose a minutiae displacement
873
+ module Gdisp which, given a fingerprint image, displaces its minutiae points in random directions by
874
+ a predefined distance. To extract minutiae points from a fingerprint image, we employ a minutiae map
875
+ extractor (M) from [58]. For a fingerprint image of width w and height h, M outputs a 12 channel
876
+ heat map H ∈ Rh×w×12, where if H(i,j,c), value of the heat map at position (i,j) and channel c, is
877
+ greater than a threshold mt and is the local maximum in its 5 × 5 × 3 neighboring cube, a minutiae is
878
+ marked at (i,j). The minutiae direction θ is calculated by maximising the quadratic interpolation with
879
+ respect to:
880
+ f
881
+
882
+ (c − 1) × π
883
+ 6
884
+
885
+ = H (i, j, (c − 1)%12)
886
+ (9)
887
+ f
888
+
889
+ c × π
890
+ 6
891
+
892
+ = H(i, j, c)
893
+ (10)
894
+ f
895
+
896
+ (c + 1) × π
897
+ 6
898
+
899
+ = H(i, j, (c + 1)%12)
900
+ (11)
901
+ Figure 14 shows a fingerprint image and its corresponding 12 channel minutiae map. Once M
902
+ extracts a minutiae map Hprobe from the input probe fingerprint x, we detect minutiae points by
903
+ applying a threshold of 0.2 on Hprobe and finding closed contours. Each detected contour, at say
904
+ 15
905
+
906
+ 𝑀𝑖𝑛𝑢𝑡𝑖𝑎𝑒 𝑀𝑎𝑝
907
+ Extractor (ℳ)
908
+ 𝐷𝑖𝑠𝑐𝑟𝑖𝑚𝑖𝑛𝑎𝑡𝑜𝑟
909
+ (𝒟)
910
+ GAN Loss
911
+ ℒgan
912
+ 𝑀𝑖𝑛. 𝐷𝑖𝑠𝑝𝑙𝑎𝑐𝑒𝑚𝑒𝑛𝑡
913
+ Module (𝒢𝑑𝑖𝑠𝑝)
914
+ Probe Fingerprint
915
+ Displaced Fingerprint
916
+ Original M.Map
917
+ 𝑀𝑖𝑛𝑢𝑡𝑖𝑎𝑒 𝑃𝑖𝑥.
918
+ Displacement
919
+ Target M.Map
920
+ M.Map Sim Loss
921
+ ℒmmap_sim
922
+ Pixel Loss
923
+ ℒpixel
924
+ Predicted M.Map
925
+ M.Map Dis Loss
926
+ ℒmmap_dis
927
+ 𝐷𝑖𝑠𝑡𝑜𝑟𝑡𝑖𝑜𝑛
928
+ Module (𝒢𝑑𝑖𝑠𝑡)
929
+ 𝑀𝑖𝑛𝑢𝑡𝑖𝑎𝑒 𝑀𝑎𝑝
930
+ Extractor (ℳ)
931
+ Adversarial Fingerprint
932
+ Figure 13: Schematic of AdvBiom for generating adversarial fingerprints. Given a probe fingerprint image, it is
933
+ passed to Gdisp which randomly displaces its minutiae points. The distortion module (Gdist) identifies control
934
+ points on the displaced fingerprint and non-linearly distorts the image to output the adversarial fingerprint. The
935
+ solid black arrows show the forward pass of the network while the dotted black arrows show the propagation of
936
+ the losses.
937
+ location (i, j), is displaced by a predefined L1 distance d = |∆i|+|∆j|, giving us the target minutiae
938
+ map Htarget.
939
+ 0
940
+ 𝜋/6
941
+ 𝜋/3
942
+ 𝜋/2
943
+ 2𝜋/3
944
+ 5𝜋/6
945
+ 𝜋
946
+ 7𝜋/6
947
+ 4𝜋/3
948
+ 3𝜋/2
949
+ 5𝜋/3
950
+ 11𝜋/6
951
+ Figure 14: The 12 channel minutiae map of an example fingerprint image shown on the left. The minutiae points
952
+ (shown in red) are marked by a COTS minutiae extractor. The bright spots in each channel image indicate the
953
+ spatial location of minutiae points while the kth channel (k ∈ [0, 11]) indicate the contributions of minutiae
954
+ points to the kπ/6 orientation.
955
+ The minutiae displacement module Gdisp is essentially an autoencoder conditioned on the probe
956
+ fingerprint x and the target minutiae map Htarget. It learns to generate a displaced fingerprint xdisp
957
+ whose predicted minutiae map Hpred is as close as possible to the target minutiae map Htarget in the
958
+ pixel space. To achieve this, we have three losses that govern Gdisp:
959
+ Lmmap_sim = ||Htarget − Hpred||1
960
+ (12)
961
+ Lmmap_dis =
962
+ 1
963
+ ||Htarget − Hprobe||1
964
+ (13)
965
+ , where Lmmap_sim is the minutiae map similarity loss which minimises the distance between the
966
+ predicted and target minutiae map, while the minutiae map dissimilarity loss Lmmap_dis maximises
967
+ 16
968
+
969
+ G
970
+ QU
971
+ Q
972
+ Q
973
+ QQ
974
+ Q
975
+ Gthe distance between the predicted and probe minutiae map. In figure 15, we show two example
976
+ probe fingerprints and their corresponding displaced fingerprints after passing through Gdisp.
977
+ Distortion Module
978
+ One of the most noteworthy conclusions from [57] was that non-linear distor-
979
+ tions to minutiae points was one of the most successful perturbations to lower the similarity scores
980
+ between perturbed and corresponding unperturbed fingerprints. Again, the non-linear distortion
981
+ was applied to all the minutiae points in the template and not to the image. Thus, our next step in
982
+ generating adversarial fingerprints consists of a distortion module Gdist which learns to distort salient
983
+ points in a fingerprint image.
984
+ The architecture of Gdist consists of an encoder conditioned on the input probe fingerprint x and the
985
+ target minutiae map Hprobe. The output from the encoder is a predefined number of control points11 c.
986
+ The non-linear distortion model proposed in [59], learned using a thin plate spline (TPS) model [60]
987
+ from 320 already distorted fingerprint videos, was employed to calculate the displacements of the
988
+ predicted control points. The hyper-parameter σ is used to indicate the extent of the distortion. The
989
+ control points and their displacements are then fed to a differentiable warping module [61] to get the
990
+ resultant adversarial fingerprint xadv.
991
+ To limit the magnitude of non-linear distortion and to ensure that xdisp and xadv are close to the
992
+ probe fingerprint x, we introduce pixel loss between the image pairs (x, xdisp) and (x, xadv):
993
+ Lpixel = 1
994
+ n
995
+
996
+ i,j
997
+ |xi,j − xdispi,j|+ 1
998
+ n
999
+
1000
+ i,j
1001
+ |xi,j − xadvi,j|
1002
+ (14)
1003
+ Figure 16 shows two displaced fingerprints and their corresponding output from Gdist.
1004
+ Discriminator
1005
+ In order to guide the generative modules Gdisp and Gdist to synthesize realistic
1006
+ fingerprint images, we introduce a fully convolutional network as a patch-based discriminator D.
1007
+ The job of the discriminator is to distinguish between real fingerprint images x and the generated
1008
+ adversarial fingerprint images xadv. This is accomplished through the GAN loss:
1009
+ Lgan = logD(x) + log(1 − D(xadv))
1010
+ (15)
1011
+ The proposed approach AdvBiom is trained in an end-to-end manner with respect to the following
1012
+ objective function:
1013
+ (16)
1014
+ L = Lgan + λmmap_simLmmap_sim + λmmap_disLmmap_dis + λpixelLpixel
1015
+ where the hyper-parameters λmmap_sim, λmmap_dis, and λpixel denote the relative importance of
1016
+ their respective losses. Once trained, AdvBiom can generate an adversarial fingerprint image for
1017
+ any input probe fingerprint and can be tested on any fingerprint matcher regardless of the feature
1018
+ extraction method (minutiae or deep-features).
1019
+ 11Control points are points in an image to which non-linear distortion is applied.
1020
+ Probe Fingerprint
1021
+ Displaced Fingerprint
1022
+ Probe Fingerprint
1023
+ Displaced Fingerprint
1024
+ Figure 15: Example probe fingerprints from NIST SD4 [55] and their corresponding output from the minutiae
1025
+ displacement module Gdisp. The minutiae points (shown in red) are marked using a COTS minutiae extractor.
1026
+ 17
1027
+
1028
+ Displaced Fingerprint
1029
+ Distorted Fingerprint
1030
+ Displaced Fingerprint
1031
+ Distorted Fingerprint
1032
+ Figure 16: Fingerprints in the left column are example displaced fingerprints from Gdisp. The distortion module
1033
+ Gdist predicts control points (marked in blue) and distorts the images based on their displacements (red arrows)
1034
+ using the non-linear distortion model from [59]. The resultant distorted fingerprint images are shown in the right
1035
+ column.
1036
+ Successful
1037
+ Attacks
1038
+ Failed
1039
+ Attacks
1040
+ Original
1041
+ Probe
1042
+ Adv. Probe
1043
+ (AdvFinge)
1044
+ Mate
1045
+ Original
1046
+ Probe
1047
+ Adv. Probe
1048
+ (AdvFinge)
1049
+ Mate
1050
+ VS: 36 | FS: 0.82
1051
+ VS: 47 | FS: 0.88
1052
+ VS: 109 | FS: 0.87
1053
+ VS: 76 | FS: 0.89
1054
+ (AdvBiom)
1055
+ (AdvBiom)
1056
+ Figure 17: Example successful and failed adversarial fingerprints attack using AdvBiom on NIST SD4 [55]. The
1057
+ VeriFinger matching scores (probe v. mate): VS, and fingerprintness [56] scores: FS, of adversarial probes are
1058
+ shown below their respective triplet. Note that the VeriFinger matching threshold is 48 at 0.01% FAR.
1059
+ Evaluation Metrics:
1060
+ The requirement of a good adversarial fingerprints generator is to evade
1061
+ fingerprint matchers while preserving fingerprint attributes and being model-agnostic. Thus, in order
1062
+ to quantify the performance of adversarial attacks generated by AdvBiom and other state-of-the-art
1063
+ baselines, we employ the following evaluation metrics:
1064
+ • True Accept Rate (TAR): The extent to which an adversarial attack can evade a fingerprint
1065
+ matcher is measured by the drop in TAR at an operational setting, say 0.01% False Accept
1066
+ Rate (FAR).
1067
+ • Fingerprintness: Soweon and Jain [56] proposed a domain-specific metric called finger-
1068
+ printness to measure the degree of similarity of a given image to a fingerprint pattern.
1069
+ Fingerprintness ranges from [0,1] where higher the score, higher the probability of the
1070
+ pattern in the image corresponding to a fingerprint pattern.
1071
+ • NFIQ 2.0: Lastly, we use NFIQ 2.0 [62] quality scores to evaluate the fingerprint quality
1072
+ of adversarial fingerprint images. NFIQ scores range from [0,100] where a score of 100
1073
+ depicts the highest fingerprint quality.
1074
+ Note that since non-linear distortions change the structure of the image, using the structural similarity
1075
+ index (SSIM) metric is inappropriate as it essentially measures the local change in structures of the
1076
+ image pairs.
1077
+ Datasets: We train AdvBiom on an internal dataset of 120,000 rolled fingerprint images. Furthermore,
1078
+ we evaluate the performance of the proposed fingerprint adversarial attack and other baselines on:
1079
+ • 2,000 fingerprint pairs from NIST SD4 [55]
1080
+ • 27,000 fingerprint pairs from NIST SD14 [63]
1081
+ 18
1082
+
1083
+ 111@
1084
+ 8
1085
+ Q
1086
+ Q
1087
+ QQ
1088
+ Q
1089
+ de
1090
+ G
1091
+ G母
1092
+ Q
1093
+ %
1094
+ d
1095
+ TG
1096
+ %
1097
+ Q
1098
+ Qd
1099
+ Q
1100
+ d
1101
+ 00
1102
+ &
1103
+ QQ
1104
+ %
1105
+ CQ
1106
+ d
1107
+ 3
1108
+ d
1109
+ &
1110
+ QQQ
1111
+ @山
1112
+ G
1113
+ %Q
1114
+ QQ
1115
+ Q
1116
+ q Q
1117
+ bu
1118
+ G
1119
+ P dppdQ
1120
+ @
1121
+ d
1122
+ QQ-
1123
+ Q?
1124
+ &
1125
+ d
1126
+ &
1127
+ ?
1128
+ de
1129
+ qQ
1130
+ &
1131
+ GQ QC
1132
+ QQ
1133
+ Q
1134
+ Q
1135
+ ?
1136
+
1137
+ &
1138
+ G
1139
+ lG
1140
+ Q
1141
+ QQ
1142
+ %
1143
+ Q
1144
+ @
1145
+ G
1146
+ QQQQ
1147
+ G
1148
+ G20-
1149
+ Q
1150
+ Q
1151
+ Q
1152
+ q
1153
+ QQ
1154
+ G
1155
+ Q
1156
+ G8
1157
+ a
1158
+ QQ
1159
+ QQ
1160
+ cs
1161
+ G
1162
+ Q
1163
+ G
1164
+ QQ
1165
+ 0甲Accuracy
1166
+ Adversarial Attacks
1167
+ Original
1168
+ Probes
1169
+ FGSM
1170
+ I-FGSM
1171
+ Deep
1172
+ Fool
1173
+ PGD
1174
+ Adv
1175
+ Biom
1176
+ TAR
1177
+ (%)
1178
+ at
1179
+ 0.01%
1180
+ FAR
1181
+ NIST
1182
+ SD4
1183
+ VeriFinger
1184
+ 99.05
1185
+ 95.20
1186
+ 98.30
1187
+ 95.00
1188
+ 97.60
1189
+ 56.25
1190
+ Innovatrics
1191
+ 97.00
1192
+ 93.00
1193
+ 95.50
1194
+ 92.65
1195
+ 94.75
1196
+ 41.35
1197
+ DeepPrint
1198
+ 94.55
1199
+ 36.20
1200
+ 64.15
1201
+ 30.40
1202
+ 68.75
1203
+ 46.35
1204
+ NIST
1205
+ SD14
1206
+ VeriFinger
1207
+ 99.42
1208
+ 95.20
1209
+ 98.30
1210
+ 95.00
1211
+ 97.60
1212
+ 37.67
1213
+ Innovatrics
1214
+ 98.24
1215
+ 90.84
1216
+ 95.68
1217
+ 91.32
1218
+ 94.01
1219
+ 25.69
1220
+ DeepPrint
1221
+ 96.52
1222
+ 48.70
1223
+ 84.48
1224
+ 31.44
1225
+ 64.28
1226
+ 69.42
1227
+ FVC
1228
+ 2004
1229
+ DB1 A
1230
+ VeriFinger
1231
+ 94.89
1232
+ 91.60
1233
+ 91.53
1234
+ 86.92
1235
+ 92.69
1236
+ 22.31
1237
+ Innovatrics
1238
+ 94.15
1239
+ 87.36
1240
+ 85.68
1241
+ 82.32
1242
+ 88.75
1243
+ 5.52
1244
+ DeepPrint
1245
+ 75.36
1246
+ 13.22
1247
+ 33.31
1248
+ 6.87
1249
+ 27.39
1250
+ 20.62
1251
+ Table 2: True Accept Rate (TAR) @ 0.01% FAR of AdvBiom along with state-of-the-art baselines attacks on
1252
+ three datasets - NIST SD4 [55], NIST SD14 [63], and FVC 2004 DB1 A [64]. 2 COTS fingerprint matchers -
1253
+ VeriFinger v11.0 [65] and Innovatrics v7.6.0.627 [66], and a deep network-based matcher DeepPrint [67] were
1254
+ employed for the evaluation. It is observed that DeepPrint, a deep network-based matcher, is susceptible to all
1255
+ types of adversarial attacks while VeriFinger and Innovatrics are more robust.
1256
+ • 558 fingerprints from DB1 A of FVC 2004 [64], consisting of 1,369 genuine pairs.
1257
+ Experimental Settings: AdvBiom was trained using the Adam optimizer with β1 as 0.5 and β2 as
1258
+ 0.9. The hyper-parameters were empirically set to λmmap_sim = 0.05, λmmap_dis = 500000, and
1259
+ λpixel = 1000 for convergence. Based on the conclusions drawn in [57], d, c, and λ were set to
1260
+ 20, 16, and 2.0 respectively for optimal effectiveness against fingerprint matchers while ensuring
1261
+ fingerprint realism. AdvBiom was trained for 16,000 steps using Tensorflow r1.14.0 on an Intel Core
1262
+ i7-11700F @ 2.50GHz CPU with a RTX 3070 GPU. On the same machine, AdvBiom can synthesize
1263
+ an adversarial fingerprint within 0.35 seconds.
1264
+ Fingerprint Authentication Systems: Since AdvBiom is a black-box attack, we do not require any
1265
+ fingerprint authentication system while training the network. However, we evaluate AdvBiom and
1266
+ other baseline attacks on two COTS fingerprint matchers and one deep network-based matcher:
1267
+ • VeriFinger v11.0 [65]
1268
+ • Innovatrics v7.6.0.627 [66]
1269
+ • DeepPrint [67]
1270
+ Comparison with Prevailing Fingerprint Adversarial Generators
1271
+ We show the performance
1272
+ of our method AdvBiom as compared to other state-of-the-art attacks in Table 2. We observe that
1273
+ the TAR of two COTS and a deep network-based fingerprint matcher for the aforementioned three
1274
+ datasets. It is to note that all the baseline attacks [14, 15, 17, 16] are white-box attacks and were
1275
+ trained using DeepPrint [67]. It is evident from Table 2 that AdvBiom is the most successful attack on
1276
+ COTS matchers VeriFinger and Innovatrics, and is also able to effectively evade a deep network-based
1277
+ fingerprint matcher, namely DeepPrint. It can also be observed that while COTS fingerprint matchers
1278
+ are robust to most adversarial attacks, DeepPrint is very susceptible to the same attacks since it
1279
+ heavily relies on the texture of the fingerprint which is majorly affected by adversarial attacks.
1280
+ A successful adversarial attack should not only evade fingerprint matchers but should also preserve
1281
+ fingerprint attributes. In order to observe the effect of adversarial attacks on fingerprint pattern
1282
+ in images, we plot the fingerprintness [56] distribution of 2,000 probes from NIST SD4 [55] for
1283
+ AdvBiom as well as for other baseline attacks. Since all the state-of-the-art baselines essentially add
1284
+ noise to each pixel in the image, they do not change the structure of the fingerprint and thus do not
1285
+ 19
1286
+
1287
+ 0.6
1288
+ 0.7
1289
+ 0.8
1290
+ 0.9
1291
+ 1.0
1292
+ Fingerprintedness Scores
1293
+ 0
1294
+ 2
1295
+ 4
1296
+ 6
1297
+ 8
1298
+ 10
1299
+ 12
1300
+ Probability of occurence
1301
+ Original Probes ( = 0.91)
1302
+ AdvFinge ( = 0.86)
1303
+ FGSM ( = 0.89)
1304
+ I-FGSM ( = 0.91)
1305
+ PGD ( = 0.90)
1306
+ DeepFool ( = 0.90)
1307
+ AdvBiom
1308
+ Figure 18: Fingerprintness [56] distribution of 2,000
1309
+ probes from NIST SD4 with respect to AdvBiom and
1310
+ other state-of-the-art baselines attacks.
1311
+ 0
1312
+ 20
1313
+ 40
1314
+ 60
1315
+ 80
1316
+ 100
1317
+ NFIQ Score
1318
+ 0.000
1319
+ 0.005
1320
+ 0.010
1321
+ 0.015
1322
+ 0.020
1323
+ 0.025
1324
+ Probability of occurence
1325
+ Original Probes ( = 41.70)
1326
+ AdvFinge ( = 31.46)
1327
+ FGSM ( = 43.30)
1328
+ I-FGSM ( = 44.23)
1329
+ PGD ( = 41.28)
1330
+ DeepFool ( = 43.42)
1331
+ AdvBiom
1332
+ Figure 19: NFIQ 2.0 [62] quality scores distribution
1333
+ of 2,000 probes from NIST SD4 [55] with respect to
1334
+ AdvBiom and other baselines attacks.
1335
+ affect fingerprintness scores. AdvBiom , on the other hand, displaces minutiae points and non-linearly
1336
+ distorts the image, and still maintains a high mean fingerprintness score of µ = 0.86.
1337
+ Furthermore, we also compute the NFIQ 2.0 [62] quality scores distribution (figure 19) of the original
1338
+ and adversarial probes from NIST SD4 [55]. As shown in figure 12, baseline attacks tend to minutely
1339
+ perturb image pixels to generate adversarial fingerprints and as a result do not have much of an effect
1340
+ on the quality scores. AdvBiom , on the other hand, provides an optimal solution by successfully
1341
+ attacking fingerprint matchers while maintaining high fingerprintness and NFIQ scores.
1342
+ Genuine and Imposter Scores Distribution
1343
+ To determine the effect of adversarial fingerprint
1344
+ on both genuine and imposter pairs, we plot the genuine and imposter scores distribution of NIST
1345
+ SD4 [55] in figure 20 before and after applying AdvBiom . We computed a total of 2,000 genuine
1346
+ and 20,000 imposter scores for the evaluation. It can be observed that the genuine scores drastically
1347
+ decrease and shift to the left of the axis as their mean drops from 183.87 to 55.55 after the attack.
1348
+ However, the imposter scores remain unaffected with the mean imposter score changing by only 0.53.
1349
+ 0
1350
+ 100
1351
+ 200
1352
+ 300
1353
+ 400
1354
+ Matching Scores
1355
+ 0.00
1356
+ 0.02
1357
+ 0.04
1358
+ 0.06
1359
+ 0.08
1360
+ 0.10
1361
+ 0.12
1362
+ 0.14
1363
+ Probability of Occurence
1364
+ Genuine Scores | Before Attack ( = 183.88)
1365
+ Genuine Scores | After Attack ( = 55.55)
1366
+ Imposter Scores | Before Attack ( = 6.00)
1367
+ Imposter Scores | After Attack ( = 6.52)
1368
+ 48: Matching Threshold at 0.01% FAR
1369
+ (a) Using VeriFinger SDK [65]
1370
+ (b) Using Innovatrics SDK [66]
1371
+ 1.00
1372
+ 0.75
1373
+ 0.50
1374
+ 0.25
1375
+ 0.00
1376
+ 0.25
1377
+ 0.50
1378
+ 0.75
1379
+ 1.00
1380
+ Matching Scores
1381
+ 0.00
1382
+ 0.02
1383
+ 0.04
1384
+ 0.06
1385
+ 0.08
1386
+ 0.10
1387
+ 0.12
1388
+ Probability of Occurence
1389
+ Genuine Scores | Before Attack ( = 0.94)
1390
+ Genuine Scores | After Attack ( = 0.78)
1391
+ Imposter Scores | Before Attack ( = 0.10)
1392
+ Imposter Scores | After Attack ( = 0.09)
1393
+ 0.837: Matching Threshold at 0.01% FAR
1394
+ (c) using DeepPrint [67]
1395
+ Figure 20: Genuine and imposter scores distribution of NIST SD4 [55] before and after the adversarial attack
1396
+ AdvBiom using three state-of-the-art fingerprint matchers - VeriFinger v11.0 [65], Innovatrics v7.6.0.627 [66],
1397
+ and DeepPrint [67]. Here, µ refers to the mean of the scores distribution. In all the three cases, the genuine
1398
+ scores shift towards the left while the imposter scores do not get affected by the attack.
1399
+ Is AdvBiom Biased Towards Certain Fingerprint Types?
1400
+ The generated adversarial fingerprint
1401
+ from AdvBiom is conditioned on the input probe fingerprint. Thus, it is essential to check if there is a
1402
+ relation between the amount of perturbation applied and the fingerprint type. The confusion matrix
1403
+ for the five fingerprint types (left loop, right loop, whorl, arch, tented arch) before and after applying
1404
+ AdvBiom on the 2,000 probes of NIST SD4 [55] is shown in table 3. Note that we use NIST SD4 for
1405
+ this evaluation since it has a uniform number of fingerprint images per each type (400 fingerprints
1406
+ per type). It is evident from the table that all five fingerprint types are almost equally susceptible to
1407
+ the attack, and thus the attack crafted AdvBiom is not biased towards a particular fingerprint type.
1408
+ 20
1409
+
1410
+ Genuine Scores LBefore Attack (u = 590.00)
1411
+ Genuine Scores 1After Attack (μu = 48.72)
1412
+ 0.6
1413
+ Imposter Scores /Before Attack (μu = 1.34)
1414
+ Imposter Scores l After Attack (μ = 1.4o)
1415
+ 0.5
1416
+ Probability of Occurence
1417
+ 40:Matching Threshold at 0.01% FAR
1418
+ 0.4
1419
+ 0.3
1420
+ 0.2
1421
+ 0.1
1422
+ 0.0
1423
+ 200
1424
+ 600
1425
+ 0
1426
+ 400
1427
+ 800
1428
+ 1000
1429
+ Matching Scores0.012
1430
+ 0.010
1431
+ 0.008
1432
+ 0.006
1433
+ 0.004
1434
+ 0.002
1435
+ 0.000
1436
+ 0
1437
+ 200
1438
+ 400
1439
+ 600
1440
+ 800
1441
+ 1000Before Attack
1442
+ After Attack
1443
+ TAR
1444
+ L: 99.75%
1445
+ R: 99.25%
1446
+ W: 99.50%
1447
+ T: 99.25%
1448
+ A: 97.50%
1449
+ FAR
1450
+ L: 0%
1451
+ R: 0%
1452
+ W: 0%
1453
+ T: 0%
1454
+ A: 0%
1455
+ FRR
1456
+ L: 0.25%
1457
+ R: 0.75%
1458
+ W: 0.50%
1459
+ T: 0.75%
1460
+ A: 2.50%
1461
+ TRR
1462
+ L: 100%
1463
+ R: 100%
1464
+ W: 100%
1465
+ T: 100%
1466
+ A: 100%
1467
+ TAR
1468
+ L: 59.00%
1469
+ R: 56.50%
1470
+ W: 58.75%
1471
+ T: 56.00%
1472
+ A: 57.00%
1473
+ FAR
1474
+ L: 0%
1475
+ R: 0%
1476
+ W: 0%
1477
+ T: 0%
1478
+ A: 0%
1479
+ FRR
1480
+ L: 41.00%
1481
+ R: 43.50%
1482
+ W: 41.25%
1483
+ T: 44.00%
1484
+ A: 43.00%
1485
+ TRR
1486
+ L: 100%
1487
+ R: 100%
1488
+ W: 100%
1489
+ T: 100%
1490
+ A: 100%
1491
+ Table 3: Confusion matrix for five fingerprint types (left loop: L, right loop: R, whorl: W, tented arch: T, arch:
1492
+ A) from NIST SD4 [55] before and after the adversarial attack using AdvBiom. Here, TAR = True Accept Rate,
1493
+ FAR = False Accept Rate, FRR = False Reject Rate, and TRR = True Reject Rate. Note that the matching
1494
+ threshold was 48 at 0.01% FAR using the COTS fingerprint matcher VeriFinger. AdvBiom is not biased towards
1495
+ any fingerprint type.
1496
+ 5
1497
+ Conclusions
1498
+ We show that a new method of adversarial synthesis, namely AdvBiom, that automatically generates
1499
+ adversarial face images with imperceptible perturbations evading state-of-the-art biometric matchers.
1500
+ With the help of a GAN, and the proposed perturbation and identity losses, AdvBiom learns the set
1501
+ of pixel locations required by face matchers for identification and only perturbs those salient facial
1502
+ regions (such as eyebrows and nose). Once trained, AdvBiom generates high quality and perceptually
1503
+ realistic adversarial examples that are benign to the human eye but can evade state-of-the-art black-
1504
+ box face matchers, while outperforming other state-of-the-art adversarial face methods. Beyond
1505
+ faces, we show for the first time that such a method with the proposed Minutiae Displacement and
1506
+ Distortion Modules can also evade state-of-the-art automated fingerprint recognition systems.
1507
+ References
1508
+ [1] D. E. Rumelhart and J. L. McClelland, Learning Internal Representations by Error Propagation,
1509
+ pp. 318–362. 1987.
1510
+ [2] A. Krizhevsky, I. Sutskever, and G. E. Hinton, “Imagenet classification with deep convolutional
1511
+ neural networks,” Commun. ACM, vol. 60, p. 84–90, may 2017.
1512
+ [3] J. Deng, J. Guo, N. Xue, and S. Zafeiriou, “Arcface: Additive angular margin loss for deep
1513
+ face recognition,” in Proceedings of the IEEE/CVF conference on computer vision and pattern
1514
+ recognition, pp. 4690–4699, 2019.
1515
+ [4] W. Liu, Y. Wen, Z. Yu, M. Li, B. Raj, and L. Song, “Sphereface: Deep hypersphere embedding
1516
+ for face recognition,” in Proceedings of the IEEE conference on computer vision and pattern
1517
+ recognition, pp. 212–220, 2017.
1518
+ [5] F. Schroff, D. Kalenichenko, and J. Philbin, “Facenet: A unified embedding for face recogni-
1519
+ tion and clustering,” in Proceedings of the IEEE conference on computer vision and pattern
1520
+ recognition, pp. 815–823, 2015.
1521
+ [6] P. Grother, G. Quinn, and P. Phillips, “Report on the evaluation of 2d still-image face recognition
1522
+ algorithms,” 2010-06-17 2010.
1523
+ [7] N. Carlini and D. Wagner, “Towards evaluating the robustness of neural networks,” in 2017 ieee
1524
+ symposium on security and privacy (sp), pp. 39–57, Ieee, 2017.
1525
+ [8] Y. Dong, F. Liao, T. Pang, H. Su, J. Zhu, X. Hu, and J. Li, “Boosting adversarial attacks with
1526
+ momentum,” in Proceedings of the IEEE conference on computer vision and pattern recognition,
1527
+ pp. 9185–9193, 2018.
1528
+ [9] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,”
1529
+ arXiv preprint arXiv:1412.6572, 2014.
1530
+ [10] A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, “Towards deep learning models
1531
+ resistant to adversarial attacks,” arXiv preprint arXiv:1706.06083, 2017.
1532
+ 21
1533
+
1534
+ [11] C. Szegedy, W. Zaremba, I. Sutskever, J. Bruna, D. Erhan, I. Goodfellow, and R. Fergus,
1535
+ “Intriguing properties of neural networks,” arXiv preprint arXiv:1312.6199, 2013.
1536
+ [12] S.-M. Moosavi-Dezfooli, A. Fawzi, O. Fawzi, and P. Frossard, “Universal adversarial pertur-
1537
+ bations,” in Proceedings of the IEEE conference on computer vision and pattern recognition,
1538
+ pp. 1765–1773, 2017.
1539
+ [13] UIDAI, “Unique Identification Authority of India.” https://uidai.gov.in, 2022.
1540
+ [14] I. J. Goodfellow, J. Shlens, and C. Szegedy, “Explaining and harnessing adversarial examples,”
1541
+ in 3rd International Conference on Learning Representations, ICLR, 2015.
1542
+ [15] A. Kurakin, I. J. Goodfellow, and S. Bengio, “Adversarial examples in the physical world,” in
1543
+ 5th International Conference on Learning Representations, ICLR, 2017.
1544
+ [16] S. Moosavi-Dezfooli, A. Fawzi, and P. Frossard, “Deepfool: A simple and accurate method to
1545
+ fool deep neural networks,” in IEEE Conference on Computer Vision and Pattern Recognition,
1546
+ CVPR, pp. 2574–2582, IEEE Computer Society, 2016.
1547
+ [17] A. Madry, A. Makelov, L. Schmidt, D. Tsipras, and A. Vladu, “Towards deep learning models
1548
+ resistant to adversarial attacks,” in 6th International Conference on Learning Representations,
1549
+ ICLR, 2018.
1550
+ [18] N. Carlini and D. A. Wagner, “Towards evaluating the robustness of neural networks,” in IEEE
1551
+ Symposium on Security and Privacy, SP, pp. 39–57, IEEE Computer Society, 2017.
1552
+ [19] C. Xiao, J. Zhu, B. Li, W. He, M. Liu, and D. Song, “Spatially transformed adversarial examples,”
1553
+ in 6th International Conference on Learning Representations, ICLR, 2018.
1554
+ [20] K. Eykholt, I. Evtimov, E. Fernandes, B. Li, A. Rahmati, C. Xiao, A. Prakash, T. Kohno, and
1555
+ D. Song, “Robust physical-world attacks on deep learning visual classification,” in IEEE/CVF
1556
+ Conference on Computer Vision and Pattern Recognition, pp. 1625–1634, 2018.
1557
+ [21] N. Papernot, P. D. McDaniel, S. Jha, M. Fredrikson, Z. B. Celik, and A. Swami, “The limitations
1558
+ of deep learning in adversarial settings,” in IEEE European Symposium on Security and Privacy,
1559
+ EuroS&P, pp. 372–387, IEEE, 2016.
1560
+ [22] A. Kurakin, I. J. Goodfellow, and S. Bengio, “Adversarial machine learning at scale,” in 5th
1561
+ International Conference on Learning Representations, ICLR, 2017.
1562
+ [23] Y. Dong, F. Liao, T. Pang, H. Su, J. Zhu, X. Hu, and J. Li, “Boosting adversarial attacks
1563
+ with momentum,” in IEEE Conference on Computer Vision and Pattern Recognition, CVPR,
1564
+ pp. 9185–9193, IEEE Computer Society, 2018.
1565
+ [24] C. Xie, Z. Zhang, Y. Zhou, S. Bai, J. Wang, Z. Ren, and A. L. Yuille, “Improving transferability
1566
+ of adversarial examples with input diversity,” in Proceedings of the IEEE/CVF Conference on
1567
+ Computer Vision and Pattern Recognition, pp. 2730–2739, 2019.
1568
+ [25] D. Deb, J. Zhang, and A. K. Jain, “Advfaces: Adversarial face synthesis,” in 2020 IEEE
1569
+ International Joint Conference on Biometrics (IJCB), pp. 1–10, IEEE, 2020.
1570
+ [26] Y. Liu, X. Chen, C. Liu, and D. Song, “Delving into transferable adversarial examples and
1571
+ black-box attacks,” in 5th International Conference on Learning Representations, ICLR, 2017.
1572
+ [27] W. Xiang, H. Su, C. Liu, Y. Guo, and S. Zheng, “Improving the robustness of adversarial attacks
1573
+ using an affine-invariant gradient estimator,” Available at SSRN 4095198, 2021.
1574
+ [28] Y. Dong, T. Pang, H. Su, and J. Zhu, “Evading defenses to transferable adversarial examples by
1575
+ translation-invariant attacks,” in Proceedings of the IEEE/CVF Conference on Computer Vision
1576
+ and Pattern Recognition, pp. 4312–4321, 2019.
1577
+ [29] S. Cheng, Y. Dong, T. Pang, H. Su, and J. Zhu, “Improving black-box adversarial attacks with a
1578
+ transfer-based prior,” Advances in neural information processing systems, vol. 32, 2019.
1579
+ 22
1580
+
1581
+ [30] A. Ilyas, L. Engstrom, A. Athalye, and J. Lin, “Black-box adversarial attacks with limited
1582
+ queries and information,” in International Conference on Machine Learning, pp. 2137–2146,
1583
+ PMLR, 2018.
1584
+ [31] Y. Li, L. Li, L. Wang, T. Zhang, and B. Gong, “Nattack: Learning the distributions of adver-
1585
+ sarial examples for an improved black-box attack on deep neural networks,” in International
1586
+ Conference on Machine Learning, pp. 3866–3876, PMLR, 2019.
1587
+ [32] Y. Dong, H. Su, B. Wu, Z. Li, W. Liu, T. Zhang, and J. Zhu, “Efficient decision-based black-
1588
+ box adversarial attacks on face recognition,” in Proceedings of the IEEE/CVF Conference on
1589
+ Computer Vision and Pattern Recognition, pp. 7714–7722, 2019.
1590
+ [33] W. Brendel, J. Rauber, and M. Bethge, “Decision-based adversarial attacks: Reliable attacks
1591
+ against black-box machine learning models,” arXiv preprint arXiv:1712.04248, 2017.
1592
+ [34] M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter, “Accessorize to a crime: Real and stealthy
1593
+ attacks on state-of-the-art face recognition,” CCS ’16, (New York, NY, USA), p. 1528–1540,
1594
+ Association for Computing Machinery, 2016.
1595
+ [35] M. Sharif, S. Bhagavatula, L. Bauer, and M. K. Reiter, “A general framework for adversarial
1596
+ examples with objectives,” ACM Transactions on Privacy and Security (TOPS), vol. 22, no. 3,
1597
+ pp. 1–30, 2019.
1598
+ [36] S. Komkov and A. Petiushko, “Advhat: Real-world adversarial attack on arcface face id system,”
1599
+ in 2020 25th International Conference on Pattern Recognition (ICPR), pp. 819–826, IEEE,
1600
+ 2021.
1601
+ [37] D.-L. Nguyen, S. S. Arora, Y. Wu, and H. Yang, “Adversarial light projection attacks on face
1602
+ recognition systems: A feasibility study,” in Proceedings of the IEEE/CVF conference on
1603
+ computer vision and pattern recognition workshops, pp. 814–815, 2020.
1604
+ [38] B. Yin, W. Wang, T. Yao, J. Guo, Z. Kong, S. Ding, J. Li, and C. Liu, “Adv-makeup: A new
1605
+ imperceptible and transferable attack on face recognition,” arXiv preprint arXiv:2105.03162,
1606
+ 2021.
1607
+ [39] X. Liu, F. Shen, J. Zhao, and C. Nie, “Rstam: An effective black-box impersonation attack on
1608
+ face recognition using a mobile and compact printer,” arXiv preprint arXiv:2206.12590, 2022.
1609
+ [40] A. J. Bose and P. Aarabi, “Adversarial attacks on face detectors using neural net based con-
1610
+ strained optimization,” in 2018 IEEE 20th International Workshop on Multimedia Signal
1611
+ Processing (MMSP), pp. 1–6, IEEE, 2018.
1612
+ [41] N. Cauli, A. Ortis, and S. Battiato, “Fooling a face recognition system with a marker-free
1613
+ label-consistent backdoor attack,” in Image Analysis and Processing – ICIAP 2022: 21st Inter-
1614
+ national Conference, Lecce, Italy, May 23–27, 2022, Proceedings, Part II, (Berlin, Heidelberg),
1615
+ p. 176–185, Springer-Verlag, 2022.
1616
+ [42] L. Yang, Q. Song, and Y. Wu, “Attacks on state-of-the-art face recognition using attentional
1617
+ adversarial attack generative network,” Multimedia tools and applications, vol. 80, no. 1,
1618
+ pp. 855–875, 2021.
1619
+ [43] Y. Zhong and W. Deng, “Towards transferable adversarial attack against deep face recognition,”
1620
+ IEEE Transactions on Information Forensics and Security, vol. 16, pp. 1452–1466, 2020.
1621
+ [44] N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, “Dropout: A
1622
+ simple way to prevent neural networks from overfitting,” Journal of Machine Learning Research,
1623
+ vol. 15, no. 56, pp. 1929–1958, 2014.
1624
+ [45] S. Jia, B. Yin, T. Yao, S. Ding, C. Shen, X. Yang, and C. Ma, “Adv-attribute: Inconspicuous and
1625
+ transferable adversarial attack on face recognition,” arXiv preprint arXiv:2210.06871, 2022.
1626
+ [46] H. Qiu, C. Xiao, L. Yang, X. Yan, H. Lee, and B. Li, “Semanticadv: Generating adversarial
1627
+ examples via attribute-conditioned image editing,” in European Conference on Computer Vision,
1628
+ pp. 19–37, Springer, 2020.
1629
+ 23
1630
+
1631
+ [47] S. Shan, E. Wenger, J. Zhang, H. Li, H. Zheng, and B. Y. Zhao, “Fawkes: protecting privacy
1632
+ against unauthorized deep learning models,” in USENIX, pp. 1589–1604, 2020.
1633
+ [48] A. Dabouei, S. Soleymani, J. Dawson, and N. Nasrabadi, “Fast geometrically-perturbed adver-
1634
+ sarial faces,” in WACV, 2019.
1635
+ [49] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, and
1636
+ Y. Bengio, “Generative adversarial networks,” Communications of the ACM, vol. 63, no. 11,
1637
+ pp. 139–144, 2020.
1638
+ [50] E. L. Denton, S. Chintala, R. Fergus, et al., “Deep generative image models using a laplacian
1639
+ pyramid of adversarial networks,” Advances in neural information processing systems, vol. 28,
1640
+ 2015.
1641
+ [51] D. Yi, Z. Lei, S. Liao, and S. Z. Li, “Learning face representation from scratch,” arXiv preprint
1642
+ arXiv:1411.7923, 2014.
1643
+ [52] G. B. Huang, M. Ramesh, T. Berg, and E. Learned-Miller, “Labeled faces in the wild: A database
1644
+ for studying face recognition in unconstrained environments,” Tech. Rep. 07-49, University of
1645
+ Massachusetts, Amherst, October 2007.
1646
+ [53] K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, “Joint face detection and alignment using multitask
1647
+ cascaded convolutional networks,” IEEE SPL, vol. 23, no. 10, pp. 1499–1503, 2016.
1648
+ [54] P. J. Grother, M. Ngan, and K. Hanaoka, “Ongoing Face Recognition Vendor Test (FRVT), Part
1649
+ 2: Identification,” NIST Interagency Report, 2018.
1650
+ [55] NIST,
1651
+ “NIST
1652
+ Special
1653
+ Database
1654
+ 4.”
1655
+ https://www.nist.gov/srd/
1656
+ nist-special-database-4, 2022.
1657
+ [56] S. Yoon and A. K. Jain, “Is there a fingerprint pattern in the image?,” in 2013 International
1658
+ Conference on Biometrics (ICB), pp. 1–8, 2013.
1659
+ [57] S. A. Grosz, J. J. Engelsma, N. G. P. Jr., and A. K. Jain, “White-box evaluation of fingerprint
1660
+ matchers,” CoRR, vol. abs/1909.00799, 2019.
1661
+ [58] K. Cao, D. Nguyen, C. Tymoszek, and A. K. Jain, “End-to-end latent fingerprint search,” IEEE
1662
+ Trans. Inf. Forensics Secur., vol. 15, pp. 880–894, 2020.
1663
+ [59] X. Si, J. Feng, J. Zhou, and Y. Luo, “Detection and rectification of distorted fingerprints,” IEEE
1664
+ Trans. Pattern Anal. Mach. Intell., vol. 37, no. 3, pp. 555–568, 2015.
1665
+ [60] F. L. Bookstein, “Principal warps: Thin-plate splines and the decomposition of deformations,”
1666
+ IEEE Trans. Pattern Anal. Mach. Intell., vol. 11, no. 6, pp. 567–585, 1989.
1667
+ [61] F. Cole, D. Belanger, D. Krishnan, A. Sarna, I. Mosseri, and W. T. Freeman, “Synthesizing
1668
+ normalized faces from facial identity features,” in Proceedings of the IEEE Conference on
1669
+ Computer Vision and Pattern Recognition (CVPR), July 2017.
1670
+ [62] E. Tabassi, “NFIQ 2.0: NIST Fingerprint image quality,” NISTIR 8034, 2016.
1671
+ [63] NIST,
1672
+ “NIST
1673
+ Special
1674
+ Database
1675
+ 14.”
1676
+ https://www.nist.gov/srd/
1677
+ nist-special-database-14, 2022.
1678
+ [64] D. Maio, D. Maltoni, R. Cappelli, J. L. Wayman, and A. K. Jain, “Fvc2004: Third fingerprint
1679
+ verification competition,” in International conference on biometric authentication, pp. 1–7,
1680
+ Springer, 2004.
1681
+ [65] Neurotechnology, “VeriFinger SDK.” https://www.neurotechnology.com, 2022.
1682
+ [66] Innovatrics, “Innovatrics SDK.” https://www.innovatrics.com/innovatrics-abis/,
1683
+ 2022.
1684
+ [67] J. J. Engelsma, K. Cao, and A. K. Jain, “Learning a fixed-length fingerprint representation,”
1685
+ IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1–1, 2019.
1686
+ 24
1687
+
29E2T4oBgHgl3EQfjQdC/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
2tFKT4oBgHgl3EQf7y43/content/2301.11946v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3159fafd204453ed29f98d9337d708a94b879cc82191127cd18eec840b448685
3
+ size 381697
2tFKT4oBgHgl3EQf7y43/content/tmp_files/2301.11946v1.pdf.txt ADDED
@@ -0,0 +1,2027 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ On the motion of an electron through vacuum fluctuations
2
+ Anirudh Gundhi1, 2, ∗ and Angelo Bassi1, 2, †
3
+ 1Department of Physics, University of Trieste, Strada Costiera 11, 34151 Trieste, Italy
4
+ 2Istituto Nazionale di Fisica Nucleare, Trieste Section, Via Valerio 2, 34127 Trieste, Italy
5
+ (Dated: January 31, 2023)
6
+ We study the effects of the electromagnetic vacuum on the motion of a non-relativistic electron.
7
+ To this end, the vacuum is treated as the environment and the electron as the system within the
8
+ framework of open quantum systems.
9
+ After tracing over the environmental degrees of freedom,
10
+ we obtain the time evolution of the reduced density matrix of the electron in the position basis.
11
+ Using the master equation, in the first part of the article we derive the equation of motion for the
12
+ expectation value of the position operator. In the presence of an external potential, the equation
13
+ turns out to be the same as its classical counterpart: the Abraham-Lorentz equation. However, in
14
+ its absence, the dynamics is free of the runaway solution. In the second part of the article we study
15
+ decoherence induced by vacuum fluctuations. We show that decoherence that appears at the level
16
+ of the reduced density matrix does not correspond to actual irreversible loss of coherence.
17
+ Numerous physical phenomena such as the Casimir ef-
18
+ fect [1–3], the Unruh effect [4–6] and the Lamb shift [7–
19
+ 10] are attributed to the presence of vacuum fluctuations.
20
+ The possibility of decoherence due to vacuum fluctua-
21
+ tions, as being fundamental and unavoidable, has also
22
+ been discussed in various works [11–18] without arriving
23
+ at a general consensus.
24
+ The interaction of an electron with the vacuum fluctu-
25
+ ations can be studied within the framework of open quan-
26
+ tum systems. We use this formalism to study two spe-
27
+ cific phenomena. First, we derive the equation of motion
28
+ (EOM) for the electron in the presence of an external po-
29
+ tential that provides a quantum mechanical description
30
+ of radiation emission by an accelerated electron.
31
+ Sec-
32
+ ond, we investigate if the interactions with the vacuum
33
+ fluctuations alone can lead to spatial decoherence of the
34
+ electron.
35
+ The quantum mechanical version of the classical
36
+ Abraham-Lorentz (AL) equation, which describes the re-
37
+ coil force experienced by an accelerated electron due to
38
+ the emission of radiation [19–22], has been previously
39
+ derived, for example, in [10]. Instead of the electron’s
40
+ position, the equation was obtained for the position op-
41
+ erator and it was then argued why this operator equa-
42
+ tion is fundamentally different from the classical one.
43
+ The difficulties in making a direct connection with the
44
+ classical dynamics were attributed to the presence of the
45
+ additional transverse electric field operator of the electro-
46
+ magnetic vacuum, which is zero classically. Similar prob-
47
+ lem persists concerning the interpretation of the quantum
48
+ Langevin equation obtained in [17] for an electron inter-
49
+ acting with vacuum fluctuations.
50
+ In our work, we use the path-integral formalism to ob-
51
+ tain the explicit expression of the reduced density matrix
52
+ in the position basis. The formalism used is adopted from
53
+ [23].
54
+ Within this framework, instead of the Langevin
55
56
57
+ equation, we derive the master equation which yields the
58
+ EOM for the expectation value of the position operator
59
+ which provides a direct correspondence with the classical
60
+ dynamics. In the presence of an arbitrary potential, we
61
+ show that the classical EOM is the same as the one ob-
62
+ tained from the reduced quantum dynamics. Moreover,
63
+ the equation that emerges after a quantum mechanical
64
+ treatment appears to be free of the problems associated
65
+ with the AL equation: the existence of the runaway so-
66
+ lution which leads to an exponential increase of the elec-
67
+ tron’s acceleration, even in the absence of an external
68
+ potential [19–21].
69
+ Concerning decoherence, we show that the loss of co-
70
+ herence due to vacuum fluctuations at the level of the re-
71
+ duced density matrix is only apparent and reversible. To
72
+ this end we show that by ‘switching off’ the interactions
73
+ with the EM field, the original coherence is restored at
74
+ the level of the system. Moreover, the expression for the
75
+ decoherence factor that we obtain differs from the ones
76
+ obtained in [17, 18] where the authors argue for a finite
77
+ loss of coherence for momentum superpositions, due to
78
+ vacuum fluctuations, but with different estimates for the
79
+ magnitude of decoherence.
80
+ The action. We work in the Coulomb gauge in which the
81
+ Lagrangian relevant for the dynamics of a non-relativistic
82
+ electron in the presence of an external potential and an
83
+ external radiation field is given by [24]
84
+ L(t) = 1
85
+ 2m˙r2
86
+ e − V0(re) +
87
+
88
+ d3rLEM − ereE⊥(re) .
89
+ (1)
90
+ Here, re denotes the position of the electron, m the
91
+ bare mass, e the electric charge, V0(re) an arbitrary
92
+ bare external potential (acting only on the electron) and
93
+ LEM := (ϵ0/2)
94
+
95
+ E2
96
+ ⊥(r) − c2B2(r)
97
+ ��
98
+ in which E⊥ denotes
99
+ the transverse electric field, B the magnetic field, ϵ0 the
100
+ permittivity of free space and c the speed of light. As
101
+ detailed in Appendix A, Eq. (1) is obtained from the
102
+ general Lagrangian for electrodynamics under the non-
103
+ relativistic approximation.
104
+ Following the standard prescription, the EM field is
105
+ quantized by quantizing the transverse vector potential
106
+ arXiv:2301.11946v1 [quant-ph] 27 Jan 2023
107
+
108
+ 2
109
+ ˆA⊥. In terms of its conjugate momentum ˆΠ (which is
110
+ not proportional to E⊥ due to the form of the interaction
111
+ term in Eq. (1), c.f. Appendix A), we define and work
112
+ with ˆΠE = − ˆΠ/ϵ0, since it appears repeatedly in the
113
+ calculations. Further, the quantized EM field is initially
114
+ assumed to be in its vacuum state.
115
+ The master equation via path integral formalism.
116
+ The
117
+ position basis representation of the full density matrix
118
+ within the path integral formalism is given by [23, 25]
119
+ ⟨x′
120
+ f| ˆρ(t) |xf⟩ =
121
+
122
+ D[x, x′]e
123
+ i
124
+ ℏ (S′
125
+ T−ST)ρ(x′
126
+ i, xi, ti) .
127
+ (2)
128
+ Eq. (2) describes the density matrix at some final time t,
129
+ starting from an initial time ti, such that xi := x(ti),
130
+ x′
131
+ i := x′(ti), with S′
132
+ T := ST[x′] (and similarly ST :=
133
+ ST[x]) denoting the full action describing some general
134
+ dynamics along the x-axis. The path integral in Eq. (2)
135
+ is computed with the boundary conditions xf = x(t),
136
+ x′
137
+ f = x′(t), and includes the integral over xi and x′
138
+ i.
139
+ In our case, the quantized radiation field is treated as
140
+ the environment, initially assumed to be in its vacuum
141
+ state and the electron as the system. We are interested
142
+ in the reduced effective dynamics of the electron having
143
+ taken into account its interaction with the environment.
144
+ This is described by the reduced density matrix ˆρr which
145
+ is obtained after tracing over the environmental degrees
146
+ of freedom. After performing the trace, by assuming the
147
+ initial density matrix to be in the product state ˆρ(ti) =
148
+ ˆρS(ti) ⊗ ˆρEM(ti), ˆρr takes the form [23] (c.f. Appendix B)
149
+ ρr(x′
150
+ f, xf, t) =
151
+
152
+ D[x, x′]e
153
+ i
154
+ ℏ (S′
155
+ S−SS+SIF[x,x′])ρr(x′
156
+ i, xi, ti) ,
157
+ with, SIF = 1
158
+ 2
159
+ � t
160
+ ti
161
+ dt1dt2xa(t1)Mab(t1; t2)xb(t2) .
162
+ (3)
163
+ Here, SS denotes the action corresponding to the sys-
164
+ tem Hamiltonian (c.f. Appendix A) and, under the Ein-
165
+ stein summation convention, we have introduced the vec-
166
+ tor notation xa(t1) = x(t1) for a = 1 and xa(t1) = x′(t1)
167
+ for a = 2 such that the matrix elements Mab are re-
168
+ lated to the two-point correlations of the canonical trans-
169
+ verse electric field operator ˆΠE (c.f. Appendix B). Since
170
+ the electron’s motion is considered to be along the x-
171
+ axis only, the two-point correlations involve only the x-
172
+ component of ˆΠE. In terms of the creation and annihi-
173
+ lation operators, and the x-component of the unit polar-
174
+ ization vector εx
175
+ k, it is given by [26]
176
+ ˆΠE(r, t) = iC
177
+
178
+ d3k
179
+
180
+ k
181
+
182
+ ε
183
+ ˆaε(k)ei(k·r−ωt)εx
184
+ k + c.c , (4)
185
+ with the constant prefactor C :=
186
+
187
+ ℏc/(2ϵ0(2π)3)
188
+ � 1
189
+ 2 . By
190
+ making a change of basis to (X(t), u(t)) with X(t) =
191
+ (x(t) + x′(t))/2 and u(t) = x′(t) − x(t), the so-called
192
+ influence functional SIF [27] takes the simplified form
193
+ SIF[X, u](t) =
194
+ � t
195
+ ti
196
+ dt1dt2
197
+
198
+ iu(t1)N(t1; t2)u(t2)
199
+ 2
200
+ +
201
+ u(t1)D(t1; t2)X(t2)] ,
202
+ (5)
203
+ where the noise kernel N(t1; t2) and the dissipation ker-
204
+ nel D(t1; t2) are defined to be
205
+ N(t1; t2) := e2
206
+ 2ℏ ⟨0| {ˆΠE(t1), ˆΠE(t2)} |0⟩ ,
207
+ D(t1; t2) :=ie2
208
+ ℏ ⟨0|
209
+
210
+ ˆΠE(t1), ˆΠE(t2)
211
+
212
+ |0⟩ θ(t1 − t2) .
213
+ (6)
214
+ Here, |0⟩ is the vacuum state of the free radiation field
215
+ and θ(τ) is the Heaviside step function. As in [17, 18],
216
+ we have also used the standard non-relativistic dipole ap-
217
+ proximation in which one ignores the spatial dependence
218
+ of the EM fields. From the definitions in Eq. (6) and the
219
+ expression for ˆΠE in Eq. (4), the explicit expressions for
220
+ the noise and the dissipation kernels can be obtained.
221
+ It is important to note that the evaluation of the ker-
222
+ nels necessiates the introduction of a high frequency cut-
223
+ off in the calculations. This is due to the fact that the
224
+ expressions for the kernels, which only depend upon the
225
+ difference τ := t1 − t2, diverge at τ = 0. A cure is pro-
226
+ vided by the standard Hadamard finite part prescription
227
+ [23] which introduces the convergence factor e−k/kmax in-
228
+ side the integrals appearing in the vacuum expectation
229
+ values of the commutator and the anti-commutator. In
230
+ terms of ϵ = 1/ωmax, with ωmax = kmaxc being the high
231
+ frequency cut-off, the kernels read (c.f. Appendix C)
232
+ N(t1; t2) = N(τ) =
233
+ e2
234
+ π2ϵ0c3
235
+
236
+ ϵ4 − 6ϵ2τ 2 + τ 4�
237
+ (ϵ2 + τ 2)4
238
+ ,
239
+ (7)
240
+ D(t1; t2) = D(τ) =
241
+ e2
242
+ 3πϵ0c3 θ(τ) d3
243
+ dτ 3 δϵ(τ) .
244
+ (8)
245
+ The function πδϵ(τ) := ϵ/(τ 2 + ϵ2) appearing in Eq. (8)
246
+ behaves like a Dirac delta for τ ≫ ϵ but is non-singular
247
+ at τ = 0 due to the finite cut-off. We refer to Appendix C
248
+ for more details.
249
+ Following [23], starting from Eq. (3) and using the ex-
250
+ plicit functional form of SIF in Eq. (5), the master equa-
251
+ tion for the reduced density matrix can be derived. Upto
252
+ second order in the interactions, we obtain its expression
253
+ to be (c.f. Appendix B for a detailed derivation)
254
+ ∂tˆρr(t) = − i
255
+
256
+
257
+ ˆHs, ˆρr(t)
258
+
259
+ − 1
260
+
261
+ � t−ti
262
+ 0
263
+ dτN(t; t − τ) [ˆx, [ˆxHs(−τ), ˆρr(t)]]
264
+ + i
265
+ 2ℏ
266
+ � t−ti
267
+ 0
268
+ dτD(t; t − τ) [ˆx, {ˆxHs(−τ), ˆρr(t)}] .
269
+ (9)
270
+ The first line of the master equation is the usual Liouville-
271
+ von Neuman evolution and involves only the system
272
+ Hamiltonian ˆHs. In the second and the third lines, which
273
+ encode the system’s interaction with the environment,
274
+ the operator ˆxHs(−τ) is used as a place holder for the
275
+ expression
276
+ ˆxHs(−τ) := ˆU −1
277
+ s
278
+ (t − τ; t)ˆx ˆUs(t − τ; t) ,
279
+ (10)
280
+
281
+ 3
282
+ where ˆUs(t − τ; t) is the unitary operator that evolves
283
+ the statevector of the system from time t to t − τ via the
284
+ system Hamiltonian ˆHs only.
285
+ The operator ˆx without
286
+ the subscript is the usual Schr¨odinger operator such that
287
+ ˆxHs(0) = ˆx.
288
+ Note that due to the coupling between the position of
289
+ the electron and the transverse electric field in Eq. (1),
290
+ the system Hamiltonian receives an additional contribu-
291
+ tion such that ˆHs = ˆp2/(2m) + ˆV0(x) + ˆVEM(x), where,
292
+ having introduced a cut-off scale in the calculations and
293
+ considering the motion of the electron along the x-axis
294
+ only, ˆVEM(x) =
295
+ e2ω3
296
+ max
297
+ 3π2ϵ0c3 ˆx2 (c.f. Appendix A). We point
298
+ out that since the master equation is valid upto second
299
+ order in the interactions and since the operator ˆxHs(−τ)
300
+ appears alongside the dissipation and the noise kernels
301
+ (which are already second order in e), the time evolu-
302
+ tion governed by ˆUs(t − τ; t) in Eq. (10) is understood
303
+ to involve only ˆV0 and not ˆVEM. Therefore, upto second
304
+ order in the interactions, ˆVEM only contributes via the
305
+ Liouville-von Neuman term.
306
+ The equation of motion. Using the master equation (9),
307
+ we obtain the coupled equations for the time evolution
308
+ of ⟨ˆx⟩ and ⟨ˆp⟩. It is interesting to compare the quantum
309
+ mechanical EOM with the one derived classically.
310
+ Within classical electrodynamics, a charged spherical
311
+ shell of radius R which is accelerated by an external force
312
+ Fext, experiences an extra recoil force (radiation reaction)
313
+ due to the emission of radiation. By taking the limit R →
314
+ 0 in the equation describing its dynamics, one obtains the
315
+ Abraham-Lorentz formula
316
+ mR¨x = Fext + 2ℏα
317
+ 3c2
318
+ ...x ,
319
+ (11)
320
+ where mR denotes the observed renormalized mass. See
321
+ for example [20, 28] and the references therein for the
322
+ derivation of the AL formula. The triple derivative term
323
+ appearing in Eq. (11) can be interpreted as the friction
324
+ term that leads to energy loss due to radiation emission.
325
+ For instance, when the external potential is taken to be
326
+ V0(x) = (1/2)mω2
327
+ 0x2, one has ...x ≈ −ω2
328
+ 0 ˙x [22]. However,
329
+ the issue with Eq. (11) is that the same triple derivative
330
+ term persists even when the external potential is switched
331
+ off, leading to an exponentially increase of the particle’s
332
+ acceleration.
333
+ A discussion of the AL formula and the
334
+ problems associated with it can be found in [19–21, 28]
335
+ and the references therein.
336
+ In the case that we are considering, the rate of change
337
+ of the expectation values is calculated from Eq. (9). The
338
+ coupled differential equations for ⟨ˆx⟩ and ⟨ˆp⟩ are given
339
+ by (c.f. Appendix E)
340
+ d
341
+ dt⟨ˆx⟩ =Tr(ˆx ˙ˆρr) = ⟨ˆp⟩
342
+ m ,
343
+ (12)
344
+ d
345
+ dt⟨ˆp⟩ = − ⟨ ˆV0,x ⟩ + Tr
346
+
347
+ ˆρr(t)
348
+ � t−ti
349
+ 0
350
+ dτD(τ)ˆxHs(−τ)
351
+
352
+ − 2e2ω3
353
+ max⟨ˆx⟩/(3π2ϵ0c3) .
354
+ (13)
355
+ While it might not be apparent at the first glance,
356
+ Eq. (13) is actually local in time due the form of the
357
+ dissipation kernel in Eq. (8). To see this explicitly, the
358
+ integral involving the dissipation kernel needs to be eval-
359
+ uated. In order to do so, we integrate by parts such that
360
+ the derivatives acting on δϵ (which appear in the expres-
361
+ sion obtained for the dissipation kernel in Eq. (8)) are
362
+ shifted onto the adjacent function. The integral is calcu-
363
+ lated explicitly in Appendix D and the following identity
364
+ is derived
365
+ � t
366
+ 0
367
+ dτD(τ)f(τ) = − 2αℏ
368
+ 3c2 f ′′′(0) − 4αℏωmax
369
+ 3πc2
370
+ f ′′(0)
371
+ + 2e2ω3
372
+ maxf(0)/(3π2ϵ0c3) .
373
+ (14)
374
+ Here, the prime denotes the derivative taken with respect
375
+ to τ and α = e2/(4πϵ0ℏc) the fine structure constant.
376
+ Using the identity (14), Eq. (13) becomes
377
+ d
378
+ dt⟨ˆp⟩ = − ⟨ ˆV0,x ⟩ − 4αℏωmax
379
+ 3πc2
380
+ Tr
381
+
382
+ ˆρr(t) d2
383
+ dτ 2 ˆxHs(−τ)
384
+ ����
385
+ τ=0
386
+
387
+ − 2αℏ
388
+ 3c2 Tr
389
+
390
+ ˆρr(t) d3
391
+ dτ 3 ˆxHs(−τ)
392
+ ����
393
+ τ=0
394
+
395
+ .
396
+ (15)
397
+ We see that in the EOM (15) only the original bare po-
398
+ tential ˆV0 remains, because the contribution coming from
399
+ ˆVEM in the last line of Eq. (13) is canceled by the term
400
+ in the last line of the integral (14), after one introduces
401
+ the cut-off consistently throughout the calculations. For
402
+ more details we refer to Appendices A and E, or Ref. [17]
403
+ where the same cancellation was argued for.
404
+ The time derivatives of ˆxHs in Eq. (15) can be easily
405
+ computed, since from Eq. (10) we have the relation (upto
406
+ leading order in the interactions)
407
+ d
408
+ dτ ˆxHs(−τ) = − i
409
+
410
+
411
+ ˆV0(x) + ˆp2
412
+ 2m, ˆxHs(−τ)
413
+
414
+ .
415
+ (16)
416
+ First we consider the situation when the external poten-
417
+ tial is switched off. From Eq. (16), with ˆV0(x) = 0, taking
418
+ another time derivative of ˆxHs we get
419
+ d2
420
+ dτ 2 ˆxHs(−τ)
421
+ ����
422
+ τ=0
423
+ =
424
+ �−i
425
+
426
+ �2 � ˆp2
427
+ 2m,
428
+ � ˆp2
429
+ 2m, ˆx
430
+ ��
431
+ = 0 ,
432
+ (17)
433
+ where, in Eq. (17), we have also used the relation
434
+ ˆxHs(0) = ˆx. Similarly, the third derivative term appear-
435
+ ing in Eq. (15) also vanishes. Therefore, when ˆV0(x) = 0,
436
+ Eq. (15) simply reduces to
437
+ d
438
+ dt⟨ˆp⟩ = 0 .
439
+ (18)
440
+ Unlike the AL formula in Eq. (11), we see that upto sec-
441
+ ond order in the interactions there are no solutions which
442
+ allow for an exponential increase of the particle’s accel-
443
+ eration in the absence of an external potential.
444
+ Next we consider the case when the external potential
445
+ is switched on. When the potential does not depend ex-
446
+ plicitly on time, the double and triple derivative terms
447
+
448
+ 4
449
+ in Eq. (15) yield double and triple commutators with re-
450
+ spect to the system Hamiltonian respectively (discarding
451
+ ˆVEM upto second order). Eq. (15) can then be written as
452
+ d
453
+ dt⟨ˆp⟩ =Fext + 4αℏωmax
454
+ 3πc2
455
+ Tr
456
+ � 1
457
+ ℏ2 ˆρr(t)
458
+
459
+ ˆHs,
460
+
461
+ ˆHs, ˆx
462
+ ���
463
+ − 2αℏ
464
+ 3c2 Tr
465
+ � i
466
+ ℏ3 ˆρr(t)
467
+
468
+ ˆHs,
469
+
470
+ ˆHs,
471
+
472
+ ˆHs, ˆx
473
+ ����
474
+ . (19)
475
+ Here, we have defined Fext := −⟨ ˆV0(x),x ⟩. Due to the
476
+ presence of ˆV0(x), the commutators of ˆHs with ˆx no
477
+ longer vanish. To simplify the equation further, we shift
478
+ the commutators onto the density matrix using the cyclic
479
+ property Tr(ˆa · [ˆb, ˆc]) = Tr([ˆa,ˆb] · ˆc) such that
480
+ Tr
481
+
482
+ ˆρr
483
+
484
+ ˆHs,
485
+
486
+ ˆHs, ˆx
487
+ ���
488
+ = Tr
489
+
490
+ ˆx
491
+
492
+ ˆHs,
493
+
494
+ ˆHs, ˆρr
495
+ ���
496
+ .
497
+ (20)
498
+ The same relationship is also obtained for the triple com-
499
+ mutator term, with an additional minus sign. Remem-
500
+ bering that the master equation is only valid upto second
501
+ order in the interaction, it is sufficient to evaluate the
502
+ trace in Eq. (19) at 0th order. This implies that within
503
+ the trace, the time dependence of the density matrix can
504
+ be evaluated only by retaining the Liouville-von Neuman
505
+ term in Eq. (9). The right hand side of Eq. (20) thus
506
+ becomes proportional to Tr(ˆx¨ˆρr). With these simplifica-
507
+ tions, Eq. (19) can be written as
508
+ mR
509
+ d2
510
+ dt2 ⟨ˆx⟩ = Fext + 2αℏ
511
+ 3c2
512
+ d3
513
+ dt3 ⟨ˆx⟩ .
514
+ (21)
515
+ After identifying the observed electron mass with the re-
516
+ normalized mass mR := m + (4αℏωmax)/(3πc2), Eq. (21)
517
+ reduces to the Abraham-Lorentz formula (11). The same
518
+ result is also obtained for the general case in which the
519
+ bare potential ˆV0(x, t) depends explicitly on time, as
520
+ shown in Appendix E. We remark that the equation of
521
+ motion derived quantum mechanically only reduces to
522
+ Eq. (11) in the presence of an external potential. When
523
+ the external potential is switched off, the EOM reduces
524
+ to Eq. (18) and is therefore free of the runaway solution.
525
+ Decoherence. In this final part of the article, we are inter-
526
+ ested in assessing if the spatial superposition of a charged
527
+ particle at rest can be suppressed via its interaction with
528
+ the vacuum fluctuations alone. We begin by writing the
529
+ position space representation of the master equation (9)
530
+ relevant for decoherence
531
+ ∂tρr =
532
+
533
+ −(x′ − x)2N1(t)
534
+
535
+
536
+ ρr ,
537
+ (22)
538
+ where N1(τ) is defined to be N1(τ) :=
539
+ � τ
540
+ 0 dτ ′N(τ ′) =
541
+ −4αℏ(τ 3 − 3τϵ2)(τ 2 +ϵ2)−3(3πc2)−1 . We have set ti = 0
542
+ and only retained the second term involving the noise ker-
543
+ nel in Eq. (9). This is because the other terms typically
544
+ give subdominant contributions when the question of in-
545
+ terest is to evaluate the rate of decay of the off-diagonal
546
+ elements of the density matrix at late times [23, 29]. We
547
+ have also used the expression of the noise kernel in Eq. (7)
548
+ inside the integral to obtain the expression for N1. Inte-
549
+ grating Eq. (22) we get
550
+ ρr(x′, x, t) = exp
551
+
552
+ −(x′ − x)2
553
+
554
+ N2(t)
555
+
556
+ ρr(x′, x, 0) , (23)
557
+ where N2(t) :=
558
+ � t
559
+ 0 dτN1(τ). The function N2(t) is in-
560
+ versely proportional to the coherence length lx(t) defined
561
+ by lx(t) := (ℏ/N2(t))
562
+ 1
563
+ 2 .
564
+ After performing the integral
565
+ over N1 the expression for the coherence length is ob-
566
+ tained to be
567
+ lx(t) =
568
+
569
+ 3πc2
570
+ 2αω2
571
+ max
572
+ · (t2 + ϵ2)2
573
+ t4 + 3t2ϵ2
574
+ t≫ϵ
575
+ =
576
+
577
+
578
+
579
+ 1
580
+ kmax
581
+ .
582
+ (24)
583
+ We see that the coherence length approaches a constant
584
+ value on time scales much larger than ϵ = 1/ωmax and
585
+ that its value scales inversely with the UV cut-off. Taken
586
+ literally, if one sets kmax = 1/λdb, where λdb is the de
587
+ Broglie wavelength of the electron, one would arrive at
588
+ the conclusion that vacuum fluctuations lead to decoher-
589
+ ence with the coherence length of the charged particle
590
+ asymptotically reducing to lx ≈ 25λdb within the time
591
+ scales t ≈ λdb/c.
592
+ False Decoherence. It is clearly unsatisfactory to have
593
+ an observable effect scale explicitly with the UV cut-off,
594
+ since the precise numerical value of the cut-off is, strictly
595
+ speaking, arbitrary. A similar situation was encountered
596
+ in [30] in a different context of a harmonic oscillator cou-
597
+ pled to a massive scalar field. However, it was argued in
598
+ [30] that the reduced density matrix of the harmonic os-
599
+ cillator described false decoherence. In such a situation,
600
+ the off-diagonal elements of the density matrix are sup-
601
+ pressed simply because the state of the environment goes
602
+ into different configurations depending upon the spatial
603
+ location of the system. However, these changes in the
604
+ environmental states remain locally around the system
605
+ and are reversible. For the electron interacting with vac-
606
+ uum fluctuations, we therefore take the point of view
607
+ that if the reduced density matrix describes false deco-
608
+ herence, then after adiabatically switching off the inter-
609
+ actions with the environment (after having adiabatically
610
+ switched it on initially), the original coherence must be
611
+ fully restored at the level of the system.
612
+ To formulate the argument we consider a time depen-
613
+ dent coupling q(t) = −ef(t) such that f(t) = 1 for
614
+ most of the dynamics between the initial time t = 0
615
+ and the final time t = T, while f(0) = f(T) = 0.
616
+ The quantity relevant for decoherence is the noise kernel
617
+ which, under the time-dependent coupling, transforms as
618
+ N → ˜
619
+ N = f(t1)f(t2)N(t1; t2) = f(t1)f(t2)N(t1 − t2) .
620
+ The decoherence factor in the double commutator in
621
+ Eq. (9) involves replacing t2 with t1 − τ and then in-
622
+ tegrating over τ. Therefore, the function N1 transforms
623
+ as N1 → ˜
624
+ N1, with ˜
625
+ N1 given by
626
+ ˜
627
+ N1(t1) = f(t1)
628
+ � t1
629
+ 0
630
+ dτf(t1 − τ)N(τ) .
631
+ (25)
632
+
633
+ 5
634
+ From the definitions of N1 and N2 we have N1 =
635
+ (d/dτ)N, N2 = (d/dτ)N1 and N1(0) = N2(0) = 0. Using
636
+ these relations and integrating by parts, Eq. (25) becomes
637
+ ˜
638
+ N1(t1) =f(t1)N1(t1)f(0) + f(t1)N2(t1) ˙f(0)
639
+ + f(t1)
640
+ � t1
641
+ 0
642
+ dτN2(τ) d2
643
+ dτ 2 f(t1 − τ) .
644
+ (26)
645
+ In the limit ϵ → 0 (taking the UV cut-off to infinity), we
646
+ see from Eq. (24) that N2 looses any time dependence.
647
+ We can therefore bring N2 outside the integral such that
648
+ ˜
649
+ N1(t1) = f(t1)N1(t1)f(0)+f(t1)N2 ˙f(0)−f(t1)N2( ˙f(0)−
650
+ ˙f(t1)). The terms involving ˙f(0) cancel out and we get
651
+ ˜
652
+ N1(t1) = f(t1)N1(t1)f(0) + f(t1)N2 ˙f(t1) .
653
+ (27)
654
+ After integrating by parts Eq. (27), in order to obtain
655
+ ˜
656
+ N2(T) =
657
+ � T
658
+ 0 dt1 ˜
659
+ N1(t1), we get
660
+ ˜
661
+ N2(T) =f(0) (f(T)N2(T) − f(0)N2(0))
662
+ − f(0)N2
663
+ � T
664
+ 0
665
+ dt1 ˙f + N2
666
+ 2
667
+ � T
668
+ 0
669
+ dt1
670
+ d
671
+ dt1
672
+ f 2 .
673
+ (28)
674
+ In the limit ϵ → 0, as we noted earlier, N2(t) takes a
675
+ constant value for any time t > 0 but is zero at t = 0
676
+ from the way it is defined. Therefore, after completing
677
+ the remaining integrals, we get
678
+ ˜
679
+ N2(T) = N2
680
+ 2
681
+
682
+ f 2(0) + f 2(T)
683
+
684
+ .
685
+ (29)
686
+ Since we assume that the interactions are switched off
687
+ in the very beginning and at the very end, we see that
688
+ ˜
689
+ N2(T) = 0 such that Eq. (23) becomes ˜ρr(x′, x, T) =
690
+ ρr(x′, x, 0). Therefore, by adiabatically switching off the
691
+ interactions we recover the original coherence within the
692
+ system.
693
+ This is different from standard collisional decoherence
694
+ where, for example, one originally has ∂tρr(x′, x, t) =
695
+ −Λ(x′ − x)2ρr(x′, x, t) [29].
696
+ When in this case we
697
+ send
698
+ Λ
699
+
700
+ ˜Λ
701
+ =
702
+ f(t)Λ,
703
+ we
704
+ get
705
+ ˜ρr(x′, x, t)
706
+ =
707
+ exp
708
+
709
+ −Λ(x′ − x)2 � t
710
+ 0 dt′f(t′)
711
+
712
+ ρr(x′, x, 0).
713
+ The density
714
+ matrix depends on the integral of f(t) rather than its
715
+ end points and we see that coherence is indeed lost ir-
716
+ reversibly.
717
+ We interpret this result to imply that the
718
+ vacuum fluctuations alone do not lead to irreversible loss
719
+ of coherence. Moreover, our results imply that the ap-
720
+ parent decoherence cannot be due to emission of photons
721
+ as otherwise one would not be able to retrieve the coher-
722
+ ence back into the system simply by switching off the
723
+ interactions with the environment at late times.
724
+ Discussion.
725
+ We formulated the interaction of a non-
726
+ relativistic electron with the radiation field within the
727
+ framework of open quantum systems and obtained the
728
+ master equation for the reduced electron dynamics in the
729
+ position basis. We showed that the classical limit of the
730
+ quantum dynamics is free of the problems associated with
731
+ the purely classical derivation of the Abraham-Lorentz
732
+ formula. With respect to possible decoherence induced
733
+ by vacuum fluctuations alone, we showed that the ap-
734
+ parent decoherence at the level of the reduced density
735
+ matrix is reversible and is an artifact of the formalism
736
+ used. In mathematically tracing over the environment,
737
+ one traces over the degrees of freedom that physically
738
+ surround the system being observed. These degrees of
739
+ freedom must be considered part of the system being ob-
740
+ served, rather than the environment [16, 30]. We formu-
741
+ lated this interpretation by showing that one restores full
742
+ initial coherence back into the system after switching off
743
+ the interactions with the environment adiabatically. The
744
+ formulation is fairly general and might also be used in
745
+ other situations to distinguish true decoherence from a
746
+ false one. The analysis therefore brings together various
747
+ works in the literature [15–18, 30] and addresses some of
748
+ the conflicting results.
749
+ Acknowledgements.
750
+ A.G. thanks Davide Bason and
751
+ Lorenzo Di Pietro for numerous discussions. We thank
752
+ Oliviero Angeli for cross checking some of the results ob-
753
+ tained in the manuscript and Lajos Di´osi for discussions
754
+ concerning false decoherence. A.B. acknowledges finan-
755
+ cial support from the EIC Pathfinder project QuCoM
756
+ (GA no. 101046973) and the PNRR PE National Quan-
757
+ tum Science and Technology Institute (PE0000023). We
758
+ thank the University of Trieste and INFN for financial
759
+ support.
760
+ Appendix A: The Lagrangian and the Hamiltonian formulation
761
+ In the Coulomb gauge, the standard Lagrangian for electrodynamics is given by [24]
762
+ L = 1
763
+ 2m˙r2
764
+ e − V0(re) −
765
+
766
+ 1/2
767
+ d3k |ρ|2
768
+ ϵ0k2 + ϵ0
769
+ 2
770
+
771
+ d3r
772
+
773
+ E2
774
+ ⊥(r) − c2B2(r)
775
+
776
+ +
777
+
778
+ d3rj(r) · A⊥(r) .
779
+ (A1)
780
+ In addition to the terms that have been described in the main article, Eq. (A1) also includes the Coulomb potential
781
+ between different particles. It is given by the third term in which ρ(r) denotes the charge density and the symbol
782
+
783
+ 1/2 means that the integral is taken over half the volume in the reciprocal space. For a single particle, it reduces to
784
+ the particle’s Coulomb self energy ECoul. After the introduction of a suitable cut-off it takes a finite value given by
785
+ ECoul = αℏωmax/π [22]. The transverse vector potential is denoted by A⊥(r, t) whose negative partial time derivative
786
+ yields the transverse electric field E⊥(r, t) while its curl gives the magnetic field B(r, t). For an electron, the current
787
+
788
+ 6
789
+ density is given by j(r) = −e˙rδ(r−re) and the interaction term becomes −e˙reA⊥(re, t). For a non-relativistic charged
790
+ particle, the time derivative can be shifted from the position of the particle onto the transverse vector potential. This
791
+ is because in addition to a total derivative term, a term of the form erevi∂iA⊥(r, t) appears (where vi := ˙ri). After
792
+ the wave expansion of A⊥, this term is seen to be negligible with respect to ere ˙A⊥(re, t) = −ereE⊥(re, t) as long as
793
+ ωk ≫ vk or v ≪ c. Therefore, for the non-relativistic electron, the Lagrangian relevant for the dynamics reduces to
794
+ L(t) ≈ 1
795
+ 2m˙r2
796
+ e − V0(re) + ϵ0
797
+ 2
798
+
799
+ d3r
800
+
801
+ E2
802
+ ⊥(r) − c2B2(r)
803
+
804
+ − ereE⊥(re) .
805
+ (A2)
806
+ In Eq. (A2) the total derivative d/dt(reA⊥(re)) and the constant Coulomb self energy term have been omitted as
807
+ these do not affect the electron’s dynamics.
808
+ The Hamiltonian corresponding to the Lagrangian (A2) can now be obtained. In terms of the canonical variables
809
+ re, p, A⊥ and ΠE := − 1
810
+ ϵ0 Π, it takes the form
811
+ H = HS + HEM + Hint ,
812
+ (A3)
813
+ where HEM = ϵ0
814
+ 2
815
+
816
+ d3r(Π2
817
+ E(r) + c2B2(r)) is the free field Hamiltonian of the radiation field, Hint = ereΠE(re) the
818
+ interaction term and HS the system Hamiltonian given by
819
+ HS = p2
820
+ 2m + V0(re) + e2
821
+ 2ϵ0
822
+
823
+ d3rriδ⊥
824
+ im(r − re)δ⊥
825
+ mj(r − re)rj .
826
+ (A4)
827
+ Here, the transverse Dirac delta δ⊥
828
+ ij(r − re), which appears due to the coupling of the position of the electron with
829
+ the transverse electric field, is defined to be [22]
830
+ δ⊥
831
+ ij(r − re) :=
832
+ 1
833
+ (2π)3
834
+
835
+ d3k
836
+
837
+ δij − kikj
838
+ k2
839
+
840
+ eik·(r−re) .
841
+ (A5)
842
+ The form of HS calls for an identification of the full effective potential V (re) governing the dynamics of the electron
843
+ such that
844
+ V (re) := V0(re) + VEM(re) ,
845
+ VEM(re) = e2
846
+ 2ϵ0
847
+
848
+ d3rriδ⊥
849
+ im(r − re)δ⊥
850
+ mj(r − re)rj .
851
+ (A6)
852
+ Note that the extra term VEM(re) is not added to the bare potential by hand, but arises naturally due to the reE⊥
853
+ coupling [17]. Although it gives a divergent contribution
854
+ e2
855
+ 2ϵ0 δ⊥
856
+ ij(0)ri
857
+ erj
858
+ e, after regularizing the transverse delta function
859
+ on a minimum length scale rmin = 1/kmax, the contribution coming from this term scales as O( e2
860
+ 2ϵ0 r2
861
+ ek3
862
+ max). To be
863
+ more precise, we impose the cut-off consistently throughout the calculations by introducing the convergence factor
864
+ e−k/kmax inside the integral in the reciprocal space (c.f. Appendix C). Using this procedure, the expression for δ⊥
865
+ ij(0)
866
+ is obtained to be
867
+ δ⊥
868
+ ij(0) =
869
+ 1
870
+ (2π)3
871
+
872
+ dkk2e−k/kmax
873
+
874
+ dΩ
875
+
876
+ δij − kikj
877
+ k2
878
+
879
+ .
880
+ (A7)
881
+ First evaluating the angular integral, which gives a factor 8π
882
+ 3 δij, and then the radial integral, we get
883
+ VEM(re) = e2ω3
884
+ max
885
+ 3π2ϵ0c3 r2
886
+ e .
887
+ (A8)
888
+ Since the contribution of VEM(re) is canceled exactly by another term, as shown in the discussion around Eq. (15) of
889
+ the main text, for all practical purposes, VEM(re) has no consequences on the dynamics of the electron.
890
+ Appendix B: The master equation
891
+ The probability amplitude for a particle to be at the position xf at some final time t, starting from the position xi
892
+ at some initial time ti, is given by [25]
893
+ ⟨xf| ˆU(t; ti) |xi⟩ =
894
+
895
+ x(t)=xf,
896
+ x(ti)=xi
897
+ D[x, p]e��� i
898
+
899
+ � t
900
+ ti dt′(HT[x,p]−p ˙x) =
901
+
902
+ x(t)=xf,
903
+ x(ti)=xi
904
+ D[x]e
905
+ i
906
+ ℏ ST[x] ,
907
+ (B1)
908
+
909
+ 7
910
+ where HT is the full Hamiltonian and ST is the corresponding action describing some general dynamics. From Eq. (B1)
911
+ the expression for the density matrix at time t can be written as [23]
912
+ ⟨x′
913
+ f| ˆρ(t) |xf⟩ =
914
+
915
+ x(t)=xf,
916
+ x′(t)=x′
917
+ f
918
+ D[x, x′]e
919
+ i
920
+ ℏ (ST[x′]−ST[x])ρ(x′
921
+ i, xi, ti) ,
922
+ (B2)
923
+ where the integrals over xi and x′
924
+ i are included within the path integral. The expression analogous to Eq. (B1) also
925
+ exists for ⟨pf| ˆU(t; ti) |pi⟩ in which the boundary conditions are fixed on p(t) and the phase-space weighing function is
926
+ instead given by exp{ −i
927
+
928
+ � t
929
+ ti dt′ (HT [x, p] + x ˙p)} such that
930
+ ⟨pf| ˆU(t; ti) |pi⟩ =
931
+
932
+ p(t)=pf,
933
+ p(ti)=pi
934
+ D[x, p]e− i
935
+
936
+ � t
937
+ ti dt′(HT[x,p]+x ˙p) .
938
+ (B3)
939
+ For computing the path integral over the EM field, with a slight abuse of notation, we understand exp{ i
940
+ ℏSEM}
941
+ to be simply the appropriate phase-space weighing function appearing inside the path integral with SEM :=
942
+
943
+ � t
944
+ ti dt′d3r(HEM − Π ˙A⊥) or SEM := −
945
+ � t
946
+ ti dt′d3r(HEM + A⊥ ˙Π) depending upon the basis states between which the
947
+ transition amplitudes are calculated. We are interested in the dynamics of the electron, having taken into account its
948
+ interaction with the radiation field environment. With this distinction, the total phase-space function can be written
949
+ as ST = SS[x] + SEM[µ] + Sint[x, ΠE], where SS denotes the system action, SEM[µ] := SEM[A⊥, ΠE] the phase-space
950
+ function governing the time evolution of the free radiation field in which µ denotes its phase-space degrees of freedom
951
+ and Sint[x, ΠE] := −e
952
+ � t
953
+ ti dt′xΠE encodes the interaction between the two. The expression for the system-environment
954
+ density matrix can then be written as
955
+
956
+ x′
957
+ f; Πf′
958
+ E
959
+ �� ˆρ(t)
960
+ ��xf; Πf
961
+ E
962
+
963
+ =
964
+
965
+ x(t)=xf,
966
+ x′(t)=x′
967
+ f
968
+ D[x, x′]e
969
+ i
970
+ ℏ (SS[x′]−SS[x])ρS(x′
971
+ i, xi, ti)×
972
+ ×
973
+
974
+ ΠE(t)=Πf
975
+ E,
976
+ Π′
977
+ E(t)=Πf′
978
+ E
979
+ D[µ, µ′]e
980
+ i
981
+ ℏ (SEM[µ′]+Sint[x′,Π′
982
+ E]−SEM[µ]−Sint[x,ΠE])ρEM(Π′
983
+ E(ti), ΠE(ti), ti) ,
984
+ (B4)
985
+ where
986
+ ���Πf
987
+ E
988
+
989
+ denotes the basis state of the environment. Note that the precise choice of the environmental basis states
990
+ is unimportant since the reduced density matrix is obtained by tracing over the environment. In writing Eq. (B4) we
991
+ have also assumed the full density matrix ˆρ(ti) to be in the product state ˆρ(ti) = ˆρS(ti) ⊗ ˆρEM(ti) at the initial time
992
+ ti. We notice that SEM[µ] is quadratic in the environmental degrees of freedom while Sint[x, ΠE] is linear in both x
993
+ and ΠE. After tracing over the environment, that is integrating over ΠE(t) = Π′
994
+ E(t), the term in the second line of
995
+ Eq. (B4) yields a Gaussian in x such that [23]
996
+
997
+ ΠE(t)=Π′
998
+ E(t)
999
+ dΠE(t)D[µ, µ′]e
1000
+ i
1001
+ ℏ (SEM[µ′]+Sint[x′,Π′
1002
+ E]−SEM[µ]−Sint[x,ΠE])ρi
1003
+ EM = e
1004
+ i
1005
+ 2ℏ
1006
+ ��
1007
+ dt1dt2Mab(t1;t2)xa(t1)xb(t2) ,
1008
+ (B5)
1009
+ where ρi
1010
+ EM := ρEM(Π′
1011
+ E(ti), ΠE(ti), ti). We have also introduced the vector notation with the convention xa = x for
1012
+ a = 1, xa = x′ for a = 2 and xa = ηabxb with ηab = diag(−1, 1). It is the matrix elements Mab which determine the
1013
+ effective action of the system and contain the information about its interaction with the environment. They can be
1014
+ obtained by acting with ℏ
1015
+ i
1016
+ δ
1017
+ δxa
1018
+ δ
1019
+ δxb |xa=xb=0 (where xa and xb are set to zero after taking the derivatives) on Eq. (B5)
1020
+ such that
1021
+ M ab(t1; t2) = ie2
1022
+
1023
+
1024
+ ΠE(t)=Π′
1025
+ E(t)
1026
+ dΠE(t)D[µ, µ′]Πa
1027
+ E (t1) Πb
1028
+ E (t2) e
1029
+ i
1030
+ ℏ (SEM[µ′]−SEM[µ])ρi
1031
+ EM .
1032
+ (B6)
1033
+ Here, in the light of the standard non-relativistic dipole approximation, we have ignored the spatial dependence of the
1034
+ canonical fields (c.f. Appendix C). Depending upon the value of the indices a and b, the matrix elements correspond
1035
+ to the expectation values of the time-ordered or path-ordered correlations in the Heisenberg picture [23]. For the
1036
+ dynamics of the non-relativistic electron that we are considering, the expression for Mab reads
1037
+ Mab(t1; t2) = ie2
1038
+
1039
+
1040
+
1041
+
1042
+ ˜T {ˆΠE(t1)ˆΠE(t2)}
1043
+
1044
+ 0
1045
+
1046
+
1047
+ ˆΠE(t1)ˆΠE(t2)
1048
+
1049
+ 0
1050
+
1051
+
1052
+ ˆΠE(t2)ˆΠE(t1)
1053
+
1054
+ 0
1055
+
1056
+ T {ˆΠE(t1)ˆΠE(t2)}
1057
+
1058
+ 0
1059
+
1060
+ � .
1061
+ (B7)
1062
+
1063
+ 8
1064
+ The zero in the subscript denotes that the expectation values are calculated by disregarding the interaction with the
1065
+ system, while T and ˜T denote the time-ordered and the anti-time ordered products respectively. It is also understood
1066
+ that since the electron’s motion is considered to be along the x-axis, the canonical field operator that enters Mab is
1067
+ only the x-component given by [26]
1068
+ ˆΠE(r, t) = i
1069
+
1070
+ ℏc
1071
+ 2ϵ0(2π)3
1072
+ � 1
1073
+ 2 �
1074
+ d3k
1075
+
1076
+ k
1077
+
1078
+ ε
1079
+ ˆaε(k)ei(k·r−ωt)εx
1080
+ k + c.c .
1081
+ (B8)
1082
+ In our case, the initial state of the environment is taken to be the vacuum state |0⟩ of the radiation field such that
1083
+ ⟨·⟩0 = ⟨0| · |0⟩. After tracing over the environment, the reduced density matrix of the electron is obtained from
1084
+ Eq. (B4) to be
1085
+ ⟨x′
1086
+ f| ˆρr(t) |xf⟩ =
1087
+
1088
+ x(t)=xf,
1089
+ x′(t)=x′
1090
+ f
1091
+ D[x, x′]e
1092
+ i
1093
+ ℏ (SS[x′]−SS[x]+SIF[x,x′])ρr(x′
1094
+ i, xi, ti) ,
1095
+ (B9)
1096
+ where
1097
+ SIF[x, x′] = ie2
1098
+ 2ℏ
1099
+ � t
1100
+ ti
1101
+ dt1dt2
1102
+ ��
1103
+ ˜T {ˆΠE(t1)ˆΠE(t2)}
1104
+
1105
+ 0 x(t1)x(t2) −
1106
+
1107
+ ˆΠE(t1)ˆΠE(t2)
1108
+
1109
+ 0 x(t1)x′(t2)
1110
+
1111
+
1112
+ ˆΠE(t2)ˆΠE(t1)
1113
+
1114
+ 0 x′(t1)x(t2) +
1115
+
1116
+ T {ˆΠE(t1)ˆΠE(t2)}
1117
+
1118
+ 0 x′(t1)x′(t2)
1119
+
1120
+ .
1121
+ (B10)
1122
+ The integral
1123
+ � t
1124
+ ti stands for both the t1 and the t2 integrals which run from ti to t.
1125
+ Alternatively, the influence
1126
+ functional SIF can be written in the matrix notation as
1127
+ SIF[x, x′] = 1
1128
+ 2
1129
+ � t
1130
+ ti
1131
+ dt1dt2
1132
+ �x(t1) x′(t1)�
1133
+ ·
1134
+
1135
+ M11 M12
1136
+ M21 M22
1137
+
1138
+ ·
1139
+
1140
+ x(t2)
1141
+ x′(t2)
1142
+
1143
+ .
1144
+ (B11)
1145
+ As it is more convenient, we make a change of basis to (X , u) defined by
1146
+ X(t) :=(x′(t) + x(t))/2 ,
1147
+ u(t) = x′(t) − x(t) ,
1148
+ (B12)
1149
+ in which the influence functional transforms as
1150
+ SIF[X, u] = 1
1151
+ 2
1152
+ � t
1153
+ ti
1154
+ dt1dt2
1155
+ �X(t1) u(t1)�
1156
+ ·
1157
+ � ˜
1158
+ M11
1159
+ ˜
1160
+ M12
1161
+ ˜
1162
+ M21
1163
+ ˜
1164
+ M22
1165
+
1166
+ ·
1167
+
1168
+ X(t2)
1169
+ u(t2)
1170
+
1171
+ ,
1172
+ (B13)
1173
+ where
1174
+ � ˜
1175
+ M11
1176
+ ˜
1177
+ M12
1178
+ ˜
1179
+ M21
1180
+ ˜
1181
+ M22
1182
+
1183
+ =
1184
+
1185
+ M11 + M12 + M21 + M22
1186
+ 1
1187
+ 2 ((M12 − M21) + (M22 − M11))
1188
+ 1
1189
+ 2 (−(M12 − M21) + (M22 − M11))
1190
+ 1
1191
+ 4((M11 + M22) − (M12 + M21))
1192
+
1193
+ .
1194
+ (B14)
1195
+ From Eq. (B7) we obtain the following relations
1196
+ M11 + M22 = −(M12 + M21) = ie2
1197
+
1198
+
1199
+ {ˆΠE(t1), ˆΠE(t2)}
1200
+
1201
+ 0 ,
1202
+ (B15)
1203
+ M12 − M21 = ie2
1204
+
1205
+ ��
1206
+ ˆΠE(t2), ˆΠE(t1)
1207
+ ��
1208
+ 0 ,
1209
+ (B16)
1210
+ M22 − M11 = ie2
1211
+
1212
+ ��
1213
+ ˆΠE(t1), ˆΠE(t2)
1214
+ ��
1215
+ 0 sgn(t1 − t2) .
1216
+ (B17)
1217
+ Using these relations, ˜
1218
+ M takes the simplified form
1219
+ � ˜
1220
+ M11
1221
+ ˜
1222
+ M12
1223
+ ˜
1224
+ M21
1225
+ ˜
1226
+ M22
1227
+
1228
+ = ie2
1229
+
1230
+
1231
+
1232
+ 0
1233
+ ��
1234
+ ˆΠE(t2), ˆΠE(t1)
1235
+ ��
1236
+ 0 θ(t2 − t1)
1237
+ ��
1238
+ ˆΠE(t1), ˆΠE(t2)
1239
+ ��
1240
+ 0 θ(t1 − t2)
1241
+ 1
1242
+ 2
1243
+
1244
+ {ˆΠE(t1), ˆΠE(t2)}
1245
+
1246
+ 0
1247
+
1248
+ � ,
1249
+ (B18)
1250
+ where θ(t) is the Heaviside step function. Thus, in the (X, u) basis, the influence functional in Eq. (B10) takes the
1251
+ compact form
1252
+ SIF[X, u](t) =
1253
+ � t
1254
+ ti
1255
+ dt1dt2
1256
+
1257
+ iu(t1)N(t1; t2)u(t2)
1258
+ 2
1259
+ + u(t1)D(t1; t2)X(t2)
1260
+
1261
+ ,
1262
+ (B19)
1263
+
1264
+ 9
1265
+ where the noise kernel N and the dissipation kernel D are defined as
1266
+ N(t1; t2) := e2
1267
+ 2ℏ
1268
+
1269
+ {ˆΠE(t1), ˆΠE(t2)}
1270
+
1271
+ 0 ,
1272
+ D(t1; t2) :=ie2
1273
+
1274
+ ��
1275
+ ˆΠE(t1), ˆΠE(t2)
1276
+ ��
1277
+ 0 θ(t1 − t2) .
1278
+ (B20)
1279
+ Having determined the full effective action for the electron, in terms of the influence functional, we can now derive
1280
+ the master equation. From Eq. (B9), it can be seen that the time derivative of the reduced density matrix will have,
1281
+ in addition to the standard Liouville-von Neuman term, the contribution coming from the influence functional. In
1282
+ order to compute that we need to evaluate the rate of change of SIF. It is given by
1283
+ δtSIF[X, u] = u(t)
1284
+ � t
1285
+ ti
1286
+ dt1 (iN(t; t1)u(t1) + D(t; t1)X(t1)) .
1287
+ (B21)
1288
+ In terms of the original (x, x′) basis, the full expression for the master equation can now be written as
1289
+ ∂tρr(x′
1290
+ f, xf, t) = − i
1291
+ ℏ ⟨x′
1292
+ f|
1293
+
1294
+ ˆHs, ˆρr
1295
+
1296
+ |xf⟩ + i
1297
+
1298
+
1299
+ x(t)=xf,
1300
+ x′(t)=x′
1301
+ f
1302
+ D[x, x′]δtSIF[x′, x]e
1303
+ i
1304
+ ℏ (SS[x′]−SS[x]+SIF[x,x′])ρr(x′
1305
+ i, xi, ti)
1306
+ ≈ − i
1307
+ ℏ ⟨x′
1308
+ f|
1309
+
1310
+ ˆHs, ˆρr
1311
+
1312
+ |xf⟩ + i
1313
+
1314
+
1315
+ x(t)=xf,
1316
+ x′(t)=x′
1317
+ f
1318
+ D[x, x′]δtSIF[x′, x]e
1319
+ i
1320
+ ℏ (SS[x′]−SS[x])ρr(x′
1321
+ i, xi, ti)
1322
+ ≈ − i
1323
+ ℏ ⟨x′
1324
+ f|
1325
+
1326
+ ˆHs, ˆρr
1327
+
1328
+ |xf⟩
1329
+ − 1
1330
+ ℏ(x′
1331
+ f − xf)
1332
+ � t
1333
+ ti
1334
+ dt1N(t; t1)
1335
+
1336
+ x(t)=xf,
1337
+ x′(t)=x′
1338
+ f
1339
+ D[x, x′](x′(t1) − x(t1))e
1340
+ i
1341
+ ℏ (SS[x′]−SS[x])ρr(x′
1342
+ i, xi, ti)
1343
+ + i
1344
+ 2ℏ(x′
1345
+ f − xf)
1346
+ � t
1347
+ ti
1348
+ dt1D(t; t1)
1349
+
1350
+ x(t)=xf,
1351
+ x′(t)=x′
1352
+ f
1353
+ D[x, x′](x′(t1) + x(t1))e
1354
+ i
1355
+ ℏ (SS[x′]−SS[x])ρr(x′
1356
+ i, xi, ti) .
1357
+ (B22)
1358
+ The Liouville-von Neuman evolution is governed by the system Hamiltonian ˆHs alone. For the second term on the
1359
+ right hand side in the second line of Eq. (B22), we have omitted SIF in the exponential. This is because SIF is second
1360
+ order in the coupling constant and is already present adjacent to the exponential. Since we limit our calculations to
1361
+ second order in the interactions, SIF can be neglected inside the exponential.
1362
+ To simplify the master equation further, we note that the last two lines of Eq. (B22) can be written much more
1363
+ compactly. This is due to the following identity [23]
1364
+
1365
+ x(t)=xf,
1366
+ x′(t)=x′
1367
+ f
1368
+ D[x, x′]x′(t1)e
1369
+ i
1370
+ ℏ (SS[x′]−SS[x])ρr(x′
1371
+ i, xi, ti) =
1372
+ =
1373
+
1374
+ dx′(t1) ⟨x′
1375
+ f| ˆUs(t; t1) |x′(t1)⟩ x′(t1) ⟨x′(t1)| ˆUs(t1; ti)ˆρr(ti) ˆU −1
1376
+ s
1377
+ (t; ti) |xf⟩
1378
+ = ⟨x′
1379
+ f| ˆUs(t; t1)ˆx ˆUs(t1; ti)ˆρr(ti) ˆU −1
1380
+ s
1381
+ (t; ti) |xf⟩ = ⟨x′
1382
+ f| ˆUs(t; t1)ˆx ˆUs(t1; ti) ˆU −1
1383
+ s
1384
+ (t; ti) ˆUs(t; ti)ˆρr(ti) ˆU −1
1385
+ s
1386
+ (t; ti) |xf⟩
1387
+ = ⟨x′
1388
+ f| ˆUs(t; t1)ˆx ˆU −1
1389
+ s
1390
+ (t; t1)ˆρr(t) |xf⟩ = ⟨x′
1391
+ f| ˆxHs(−τ)ˆρr(t) |xf⟩ ,
1392
+ (B23)
1393
+ where
1394
+ ˆxHs(−τ) := ˆU −1
1395
+ s
1396
+ (t − τ; t)ˆx ˆUs(t − τ; t) ,
1397
+ τ := t − t1 .
1398
+ (B24)
1399
+ Similarly, we also have
1400
+
1401
+ x(t)=xf,
1402
+ x′(t)=x′
1403
+ f
1404
+ D[x, x′]x(t1)e
1405
+ i
1406
+ ℏ (SS[x′]−SS[x])ρr(x′
1407
+ i, xi, ti) = ⟨x′
1408
+ f| ˆρr(t)ˆxHs(−τ) |xf⟩ .
1409
+ (B25)
1410
+ The operator ˆxHs(−τ) is understood to be simply the placeholder for the expression that appears on the right hand
1411
+ side of the first equality in Eq. (B24) such that
1412
+ ˆxHs(0) = ˆx .
1413
+ (B26)
1414
+
1415
+ 10
1416
+ Here, the operator ˆx without the subscript Hs is the usual position operator in the Schr¨odinger picture. Using these
1417
+ relations, and replacing the t1 integral with the τ integral (t1 = t − τ), the master equation takes the compact form
1418
+ ∂tρr(x′
1419
+ f, xf, t) = − i
1420
+ ℏ ⟨x′
1421
+ f|
1422
+
1423
+ ˆHs, ˆρr(t)
1424
+
1425
+ |xf⟩
1426
+ − 1
1427
+ ℏ(x′
1428
+ f − xf)
1429
+ � t−ti
1430
+ 0
1431
+ dτN(t; t − τ) ⟨x′
1432
+ f| [ˆxHs(−τ), ˆρr(t)] |xf⟩
1433
+ + i
1434
+ 2ℏ(x′
1435
+ f − xf)
1436
+ � t−ti
1437
+ 0
1438
+ dτD(t; t − τ) ⟨x′
1439
+ f| {ˆxHs(−τ), ˆρr(t)} |xf⟩ .
1440
+ (B27)
1441
+ The eigenvalues outside of the integrals in Eq. (B27) can be obtained by acting with the position operator ˆx such that
1442
+ ⟨x′
1443
+ f| ∂tˆρr |xf⟩ = − i
1444
+ ℏ ⟨x′
1445
+ f|
1446
+
1447
+ ˆHs, ˆρr(t)
1448
+
1449
+ |xf⟩
1450
+ − 1
1451
+
1452
+ � t−ti
1453
+ 0
1454
+ dτN(t; t − τ) ⟨x′
1455
+ f| [ˆx, [ˆxHs(−τ), ˆρr(t)]] |xf⟩
1456
+ + i
1457
+ 2ℏ
1458
+ � t−ti
1459
+ 0
1460
+ dτD(t; t − τ) ⟨x′
1461
+ f| [ˆx, {ˆxHs(−τ), ˆρr(t)}] |xf⟩ .
1462
+ (B28)
1463
+ The master equation in the operator form can therefore be written as
1464
+ ∂tˆρr = − i
1465
+
1466
+
1467
+ ˆHs, ˆρr
1468
+
1469
+ − 1
1470
+
1471
+ � t−ti
1472
+ 0
1473
+ dτN(t; t − τ) [ˆx, [ˆxHs(−τ), ˆρr(t)]] + i
1474
+ 2ℏ
1475
+ � t−ti
1476
+ 0
1477
+ dτD(t; t − τ) [ˆx, {ˆxHs(−τ), ˆρr(t)}] .
1478
+ (B29)
1479
+ Appendix C: The dissipation and the noise kernels
1480
+ In order to solve the master equation (B29), the kernels need to be evaluated explicitly. To achieve that, we begin
1481
+ with the expression for the vacuum expectation value of the correlator
1482
+ ⟨0| ˆΠE(x(t1), t1)ˆΠE(x(t2), t2) |0⟩ =
1483
+ −iℏc
1484
+ 2ϵ04π2 ˆ□
1485
+ �1
1486
+ r
1487
+ � ∞
1488
+ 0
1489
+ dke−ikcτ �
1490
+ eikr − e−ikr��
1491
+ ,
1492
+ (C1)
1493
+ where
1494
+ r := |x(t1) − x(t2)| ,
1495
+ τ := t1 − t2 ,
1496
+ ˆ□ := − 1
1497
+ c2 ∂2
1498
+ τ + ∂2
1499
+ r .
1500
+ (C2)
1501
+ Here, the right hand side of Eq. (C1) is obtained with the help of the expression of the quantized canonical transverse
1502
+ electric field operator in Eq. (B8). The expression in Eq. (C1) becomes convergent after resorting to the standard
1503
+ Hadamard finite part prescription [23], in which the convergence factor e−ωk/ωmax is introduced inside the integral
1504
+ (with ωk = kc).
1505
+ Physically, this prescription cuts off the contribution coming from the modes ωk ≫ ωmax and
1506
+ mathematically it is the same as using the iϵ prescription where one sends τ → τ − iϵ, with ϵ = 1/ωmax. After
1507
+ completing the integral by using this prescription we get
1508
+ ⟨0| ˆΠE(1)ˆΠE(2) |0⟩ =
1509
+ ℏc
1510
+ 4π2ϵ0
1511
+ ˆ□
1512
+
1513
+ 1
1514
+ r2 − c2(τ − iϵ)2
1515
+
1516
+ =
1517
+ ℏc
1518
+ π2ϵ0
1519
+ 1
1520
+ (r2 − c2(τ − iϵ)2)2 .
1521
+ (C3)
1522
+ For the correlator in Eq. (C3), we ignore the spatial dependence of the fields in the spirit of the non-relativistic
1523
+ approximation r ≪ cτ. In this limit, the correlator becomes
1524
+ ⟨0| ˆΠE(1)ˆΠE(2) |0⟩ ≈
1525
+
1526
+ π2ϵ0c3 (τ − iϵ)4 .
1527
+ (C4)
1528
+ Using Eq. (C4), we obtain the explicit functional form of the noise and the dissipation kernels to be
1529
+ N(τ) =
1530
+ e2
1531
+ π2ϵ0c3
1532
+
1533
+ ϵ4 − 6ϵ2τ 2 + τ 4�
1534
+ (ϵ2 + τ 2)4
1535
+ ,
1536
+ (C5)
1537
+ D(τ) =
1538
+ 8e2
1539
+ π2ϵ0c3
1540
+ ϵτ(ϵ2 − τ 2)
1541
+ (ϵ2 + τ 2)4 θ(τ) .
1542
+ (C6)
1543
+
1544
+ 11
1545
+ With some algebraic manipulation, the dissipation kernel can be expressed more compactly as
1546
+ D(τ) =
1547
+ e2
1548
+ 3π2ϵ0c3 θ(τ) d3
1549
+ dτ 3
1550
+
1551
+ ϵ
1552
+ τ 2 + ϵ2
1553
+
1554
+ .
1555
+ (C7)
1556
+ Noticing that
1557
+ ϵ
1558
+ τ 2 + ϵ2 = d
1559
+ dτ tan−1(τ/ϵ) = πδϵ(τ) ,
1560
+ (C8)
1561
+ we arrive at the expression
1562
+ D(τ) =
1563
+ e2
1564
+ 3πϵ0c3 θ(τ) d3
1565
+ dτ 3 δϵ(τ) .
1566
+ (C9)
1567
+ The last equality in Eq. (C8) can be understood in the limit ϵ → 0 when the function tan−1(τ/ϵ) takes the shape of
1568
+ a step function. Such an expression for D would yield infinite results. For that, we keep in mind that these functions
1569
+ are always well behaved for a finite ϵ and that δϵ only behaves like a Dirac delta for τ ≫ ϵ.
1570
+ Appendix D: Integrals involving the dissipation kernel
1571
+ In this section we derive an identity involving the integrals of the form
1572
+
1573
+ dτD(τ)f(τ). To proceed, we keep in mind
1574
+ the situation where ϵ is small but finite so that all the derivatives of the smoothed Dirac delta are large but finite.
1575
+ However, for times τ ≫ ϵ, we have δϵ(τ) = δ′
1576
+ ϵ(τ) = δ′′
1577
+ ϵ (τ) = 0. In addition, since the derivative of the Dirac delta is an
1578
+ odd function of τ, we also have δ′
1579
+ ϵ(0) = 0. In computing the integral of D(τ) multiplying an arbitrary function f(τ),
1580
+ we shift the derivatives acting on δϵ one by one onto f(τ) by integrating by parts. Since the calculations of interest
1581
+ involve integrating
1582
+ � t
1583
+ 0 dτD(τ)f(τ), where τ takes only non-negative values from 0 to t, the step function θ(τ) can be
1584
+ omitted inside the integral.
1585
+ The first integration by parts gives (the constant pre-factors appearing in Eq. (C9) will be plugged in at the end)
1586
+ � t
1587
+ 0
1588
+ dτδ′′′
1589
+ ϵ (τ)f(τ) = −
1590
+ � t
1591
+ 0
1592
+ dτδ′′
1593
+ ϵ (τ)f ′(τ) + δ′′
1594
+ ϵ (τ)f(τ)|t
1595
+ 0 .
1596
+ (D1)
1597
+ Since δ′′
1598
+ ϵ (t) = 0, only the boundary term −δ′′
1599
+ ϵ (0)f(0) survives. Further,
1600
+
1601
+ � t
1602
+ 0
1603
+ dτδ′′
1604
+ ϵ (τ)f ′(τ) =
1605
+ � t
1606
+ 0
1607
+ dτδ′
1608
+ ϵ(τ)f ′′(τ) − δ′
1609
+ ϵ(τ) f ′(τ)|t
1610
+ 0 .
1611
+ (D2)
1612
+ Since δ′
1613
+ ϵ(t) = δ′
1614
+ ϵ(0) = 0 (δ′
1615
+ ϵ(τ) being an odd function of τ), both the boundary terms vanish. Proceeding further we
1616
+ get
1617
+ � t
1618
+ 0
1619
+ dτδ′
1620
+ ϵ(τ)f ′′(τ) = −
1621
+ � t
1622
+ 0
1623
+ dτδϵ(τ)f ′′′(τ) + δϵ(τ) f ′′(τ)|t
1624
+ 0 .
1625
+ (D3)
1626
+ As before, the boundary term at τ = t is zero and only the term −δϵ(0)f ′′(0) survives. Finally, since δϵ(τ) goes to
1627
+ zero much faster than a generic function f(τ) for a small ϵ, it can be treated like a Dirac delta such that
1628
+
1629
+ � t
1630
+ 0
1631
+ dτδϵ(τ)f ′′′(τ) = −f ′′′(0)
1632
+ 2
1633
+ .
1634
+ (D4)
1635
+ The factor of half comes because the integral is performed from 0 to t. Collecting the two boundary terms we get the
1636
+ result
1637
+ � t
1638
+ 0
1639
+ dτδ′′′
1640
+ ϵ (τ)f(τ) = −f ′′′(0)
1641
+ 2
1642
+ − δϵ(0)f ′′(0) − δ′′
1643
+ ϵ (0)f(0) .
1644
+ (D5)
1645
+ From Eq. (C8) we have δϵ(0) = 1/(πϵ) = ωmax/π and δ′′
1646
+ ϵ (0) = −2ω3
1647
+ max/π such that
1648
+ � t
1649
+ 0
1650
+ dτD(τ)f(τ) = −2αℏ
1651
+ 3c2 f ′′′(0) − 4αℏωmax
1652
+ 3πc2
1653
+ f ′′(0) + 2e2ω3
1654
+ max
1655
+ 3π2ϵ0c3 f(0) .
1656
+ (D6)
1657
+ Here, we have now plugged in the constant prefactor appearing in Eq. (C9).
1658
+
1659
+ 12
1660
+ Appendix E: The Abraham-Lorentz equation as a classical limit
1661
+ The rate of change of the expectation values can be obtained with the help of the master equation (B29). For the
1662
+ position operator it is given by
1663
+ d
1664
+ dt⟨ˆx⟩ = Tr (ˆx∂tˆρr) = − i
1665
+ ℏTr
1666
+
1667
+ ˆx ·
1668
+
1669
+ ˆHs, ˆρr
1670
+ ��
1671
+ + i
1672
+ 2ℏ
1673
+ � t−ti
1674
+ 0
1675
+ dτD(t; t − τ)Tr (ˆx · [ˆx, {ˆxHs(−τ), ˆρr(t)}])
1676
+ − 1
1677
+
1678
+ � t−ti
1679
+ 0
1680
+ dτN(t; t − τ)Tr (ˆx · [ˆx, [ˆxHs(−τ), ˆρr(t)]]) .
1681
+ (E1)
1682
+ Due to the identity
1683
+ Tr
1684
+
1685
+ ˆA ·
1686
+
1687
+ ˆB, ˆC
1688
+ ��
1689
+ = Tr
1690
+ ��
1691
+ ˆA, ˆB
1692
+
1693
+ · ˆC
1694
+
1695
+ ,
1696
+ (E2)
1697
+ the terms involving the dissipation and the noise kernels vanish and we get
1698
+ d
1699
+ dt⟨ˆx⟩ = − i
1700
+ ℏTr
1701
+
1702
+ ˆρr ·
1703
+
1704
+ ˆx, ˆHs
1705
+ ��
1706
+ = ⟨ˆp⟩
1707
+ m .
1708
+ (E3)
1709
+ Here, we remember that the system Hamiltonian ˆHs receives a contribution from ˆVEM in addition to the bare potential
1710
+ ˆV0 such that (c.f. the discussion between Eqs. (A4) and (A8))
1711
+ ˆHs(t) = ˆp2
1712
+ 2m + ˆV0(x, t) + e2ω3
1713
+ max
1714
+ 3π2ϵ0c3 ˆx2 .
1715
+ (E4)
1716
+ Similarly, for the momentum operator we obtain the relation
1717
+ d
1718
+ dt⟨ˆp⟩ = Tr (ˆp∂tˆρr) = − i
1719
+ ℏTr
1720
+ ��
1721
+ ˆp, ˆHs
1722
+
1723
+ · ˆρr
1724
+
1725
+ + i
1726
+ 2ℏ
1727
+ � t−ti
1728
+ 0
1729
+ dτD(t; t − τ)Tr ([ˆp, ˆx] · {ˆxHs(−τ), ˆρr(t)})
1730
+ − 1
1731
+
1732
+ � t−ti
1733
+ 0
1734
+ dτN(t; t − τ)Tr ([ˆp, ˆx] · [ˆxHs(−τ), ˆρr(t)]) .
1735
+ (E5)
1736
+ Since [ˆx, ˆp] = iℏ1, the term involving the noise kernel vanishes and Eq. (E5) simplifies to
1737
+ d
1738
+ dt⟨ˆp⟩ = −⟨ ˆV0,x ⟩ − 2e2ω3
1739
+ max
1740
+ 3π2ϵ0c3 ⟨ˆx⟩ + Tr
1741
+
1742
+ ˆρr(t)
1743
+ � t−ti
1744
+ 0
1745
+ dτD(τ)ˆxHs(−τ)
1746
+
1747
+ .
1748
+ (E6)
1749
+ Evaluating the integral using Eq. (D6), we see that the last term in the integral gives the contribution 2e2ω3
1750
+ max
1751
+ 3π2ϵ0c3 ⟨ˆx⟩ to
1752
+ d
1753
+ dt⟨ˆp⟩ in Eq. (E6) and cancels the contribution coming from ˆVEM. The EOM therefore reduces to
1754
+ d
1755
+ dt⟨ˆp⟩ = −⟨ ˆV0(x),x ⟩ − 2αℏ
1756
+ 3c2 Tr
1757
+
1758
+ ˆρr(t) d3
1759
+ dτ 3 ˆxHs(−τ)
1760
+ ����
1761
+ τ=0
1762
+
1763
+ − 4αℏωmax
1764
+ 3πc2
1765
+ Tr
1766
+
1767
+ ˆρr(t) d2
1768
+ dτ 2 ˆxHs(−τ)
1769
+ ����
1770
+ τ=0
1771
+
1772
+ .
1773
+ (E7)
1774
+ As shown in the main article, when ˆV0(x, t) = 0, the double and the triple derivatives acting on ˆxHs(−τ) vanish upto
1775
+ second order in the interactions. Here, we only focus on the general case in which the external (time-dependent)
1776
+ potential is switched on. To simplify the equation further, we begin by evaluating the second order derivative in
1777
+ Eq. (E7). From Eq. (B24) we have
1778
+ d2
1779
+ dτ 2 ˆxHs(−τ) = ˆU −1
1780
+ s
1781
+ (t − τ; t)ˆx ˆU ′′
1782
+ s (t − τ; t) + 2 ˆU −1′
1783
+ s
1784
+ (t − τ; t)ˆx ˆU ′
1785
+ s(t − τ; t) + ˆU −1′′
1786
+ s
1787
+ (t − τ; t)ˆx ˆUs(t − τ; t) ,
1788
+ (E8)
1789
+ where the prime denotes the derivative with respect to τ. From the Schr¨odinger equation
1790
+ ˆU ′
1791
+ s(t − τ; t) = i
1792
+
1793
+ ˆHs(t − τ) ˆUs(t − τ; t) ,
1794
+ (E9)
1795
+ the derivatives acting on the unitary operator can be expressed in terms of the Hamiltonian. It is clear that taking
1796
+ higher derivatives of ˆUs(t − τ; t) would result in higher powers of the Hamiltonian or the partial derivative of the
1797
+ Hamiltonian with respect to τ, multiplied with only a single unitary operator on the very right. However, if in the
1798
+
1799
+ 13
1800
+ end τ is set to zero, the Hamiltonian and its explicit time derivatives will be evaluated at time t, and the unitary
1801
+ operator on the very right disappears since ˆUs(t; t) = 1. We therefore have the following identities
1802
+ ˆU (′n)
1803
+ s
1804
+ (t − τ; t)
1805
+ ���
1806
+ τ=0 = (−1)n
1807
+ � dn
1808
+ dtn ˆUs(t; ti)
1809
+
1810
+ ˆU −1
1811
+ s
1812
+ (t; ti) ,
1813
+ (E10)
1814
+ ˆU −1(′n)
1815
+ s
1816
+ (t − τ; t)
1817
+ ���
1818
+ τ=0 = (−1)n ˆUs(t; ti)
1819
+ � dn
1820
+ dtn ˆU −1
1821
+ s
1822
+ (t; ti)
1823
+
1824
+ .
1825
+ (E11)
1826
+ The additional time parameter ti that appears in Eqs. (E10) and (E11) is only apparent.
1827
+ As discussed before,
1828
+ evaluating the time derivatives on the right hand side of Eq. (E10) would result in powers of ˆHs(t) and its derivatives
1829
+ evaluated at t. The remaining unitary matrix ˆUs(t; ti) would be canceled by the additional ˆU −1
1830
+ s
1831
+ (t; ti) on the very
1832
+ right such that ti disappears from the equation. Using Eqs. (E10) and (E11) in Eq. (E8) we get
1833
+ Tr
1834
+
1835
+ ˆρr(t) d2
1836
+ dτ 2 ˆxHs(−τ)
1837
+ ����
1838
+ τ=0
1839
+
1840
+ = Tr
1841
+ ��� d2
1842
+ dt2 ˆUs(t; ti)
1843
+
1844
+ ˆU −1
1845
+ s
1846
+ (t; ti)ˆρr(t)
1847
+ +2
1848
+
1849
+ − d
1850
+ dt
1851
+ ˆUs(t; ti)
1852
+
1853
+ ˆU −1
1854
+ s
1855
+ (t; ti)ˆρr(t) ˆUs(t; ti)
1856
+
1857
+ − d
1858
+ dt
1859
+ ˆU −1
1860
+ s
1861
+ (t; ti)
1862
+
1863
+ +ˆρr(t) ˆUs(t; ti)
1864
+ � d2
1865
+ dt2 ˆU −1
1866
+ s
1867
+ (t; ti)
1868
+ ��
1869
+ ˆx
1870
+
1871
+ .
1872
+ (E12)
1873
+ Here, we have used the cyclic property within the trace to shift the unitary operators ˆUs and its derivatives on the
1874
+ right of ˆx in Eq. (E8) onto the very left within the trace. To proceed further we note that the terms involving the
1875
+ trace in Eq. (E7) are multiplied by α. It is therefore sufficient to evaluate the trace at 0th order in the interactions as
1876
+ the master equation is valid only upto second order in the interactions. This implies that within the trace the time
1877
+ dependence of the density matrix can be evaluated by keeping only the Liouville-von Neuman term such that
1878
+ ˆρr(t) = ˆUs(t; ti)ˆρr(ti) ˆU −1
1879
+ s
1880
+ (t; ti) .
1881
+ (E13)
1882
+ Eq. (E12) then simplifies to
1883
+ Tr
1884
+
1885
+ ˆρr(t) d2
1886
+ dτ 2 ˆxHs(−τ)
1887
+ ����
1888
+ τ=0
1889
+
1890
+ = Tr
1891
+ ��� d2
1892
+ dt2 ˆUs(t; ti)
1893
+
1894
+ ˆρr(ti) ˆU −1
1895
+ s
1896
+ (t; ti) + 2
1897
+ � d
1898
+ dt
1899
+ ˆUs(t; ti)
1900
+
1901
+ ˆρr(ti)
1902
+ � d
1903
+ dt
1904
+ ˆU −1
1905
+ s
1906
+ (t; ti)
1907
+
1908
+ + ˆUs(t; ti)ˆρr(ti)
1909
+ � d2
1910
+ dt2 ˆU −1
1911
+ s
1912
+ (t; ti)
1913
+ ��
1914
+ ˆx
1915
+
1916
+ = Tr
1917
+ � d2
1918
+ dt2 ˆρr(t)ˆx
1919
+
1920
+ .
1921
+ (E14)
1922
+ Thus, we have the relation
1923
+ Tr
1924
+
1925
+ ˆρr(t) d2
1926
+ dτ 2 ˆxHs(−τ)
1927
+ ����
1928
+ τ=0
1929
+
1930
+ = Tr
1931
+ � d2
1932
+ dt2 ˆρr(t)ˆx
1933
+
1934
+ = d2
1935
+ dt2 ⟨ˆx⟩ .
1936
+ (E15)
1937
+ Similar line of reasoning also leads to the identity
1938
+ Tr
1939
+
1940
+ ˆρr(t) d3
1941
+ dτ 3 ˆxHs(−τ)
1942
+ ����
1943
+ τ=0
1944
+
1945
+ = −Tr
1946
+ � d3
1947
+ dt3 ˆρr(t)ˆx
1948
+
1949
+ = − d3
1950
+ dt3 ⟨ˆx⟩ .
1951
+ (E16)
1952
+ Using Eqs. (E15) and (E16) in Eq. (E7), the EOM for the expectation value of the position operator in the presence
1953
+ of an external potential is obtained to be
1954
+ mR
1955
+ d2
1956
+ dt2 ⟨ˆx⟩ = −⟨ ˆV0(x),x ⟩ + 2αℏ
1957
+ 3c2
1958
+ d3
1959
+ dt3 ⟨ˆx⟩ ,
1960
+ where
1961
+ mR := m + 4αℏωmax
1962
+ 3πc2
1963
+ .
1964
+ (E17)
1965
+ [1] H. B. G. Casimir, Indag. Math. 10, 261 (1948).
1966
+
1967
+ 14
1968
+ [2] N. D. Birrell and P. C. W. Davies, Quantum Fields in Curved Space, Cambridge Monographs on Mathematical Physics
1969
+ (Cambridge Univ. Press, Cambridge, UK, 1984).
1970
+ [3] L. Parker and D. Toms, Quantum Field Theory in Curved Spacetime: Quantized Fields and Gravity, Cambridge Mono-
1971
+ graphs on Mathematical Physics (Cambridge University Press, 2009).
1972
+ [4] W. G. Unruh, Phys. Rev. D 14, 870 (1976).
1973
+ [5] S. A. Fulling, Phys. Rev. D 7, 2850 (1973).
1974
+ [6] S. Takagi, Prog. Theor. Phys. Suppl. 88, 1 (1986).
1975
+ [7] H. A. Bethe, Phys. Rev. 72, 339 (1947).
1976
+ [8] W. E. Lamb and R. C. Retherford, Phys. Rev. 72, 241 (1947).
1977
+ [9] T. A. Welton, Phys. Rev. 74, 1157 (1948).
1978
+ [10] J. Dalibard, J. Dupont-Roc, and C. Cohen-Tannoudji, Journal de Physique 43, 1617 (1982).
1979
+ [11] E.
1980
+ Joos,
1981
+ H.
1982
+ Zeh,
1983
+ D.
1984
+ Giulini,
1985
+ C.
1986
+ Kiefer,
1987
+ J.
1988
+ Kupsch,
1989
+ and
1990
+ I.
1991
+ Stamatescu,
1992
+ Decoherence and the Appearance of a Classical World in Quantum Theory,
1993
+ Physics
1994
+ and
1995
+ astronomy
1996
+ online
1997
+ library
1998
+ (Springer, 2003).
1999
+ [12] C. Kiefer, Phys. Rev. D 46, 1658 (1992).
2000
+ [13] L. H. Ford, Phys. Rev. D 47, 5571 (1993).
2001
+ [14] G. Baym and T. Ozawa, Proceedings of the National Academy of Sciences 106, 3035 (2009).
2002
+ [15] E. Santos, Physics Letters A 188, 198 (1994).
2003
+ [16] L. Di´osi, Physics Letters A 197, 183 (1995).
2004
+ [17] P. M. V. B. Barone and A. O. Caldeira, Phys. Rev. A 43, 57 (1991).
2005
+ [18] H.-P. Breuer and F. Petruccione, in Relativistic Quantum Measurement and Decoherence, edited by H.-P. Breuer and
2006
+ F. Petruccione (Springer Berlin Heidelberg, Berlin, Heidelberg, 2000) pp. 31–65.
2007
+ [19] S. Coleman, “Classical electron theory from a modern standpoint,” in Electromagnetism: Paths to Research, edited by
2008
+ D. Teplitz (Springer US, Boston, MA, 1982) pp. 183–210.
2009
+ [20] P. Pearle, “Classical electron models,” in Electromagnetism: Paths to Research, edited by D. Teplitz (Springer US, Boston,
2010
+ MA, 1982) pp. 211–295.
2011
+ [21] D. J. Griffiths, Introduction to Electrodynamics, 4th ed. (Cambridge University Press, 2017).
2012
+ [22] C. Cohen-Tannoudji, J. Dupont-Roc, and G. Grynberg, “Classical electrodynamics: The fundamental equations and the
2013
+ dynamical variables,” in Photons and Atoms (John Wiley and Sons, Ltd, 1997) Chap. 1, pp. 5–77.
2014
+ [23] E. A. Calzetta and B.-L. B. Hu, Nonequilibrium Quantum Field Theory, Cambridge Monographs on Mathematical Physics
2015
+ (Cambridge University Press, 2008).
2016
+ [24] “Lagrangian and hamiltonian approach to electrodynamics, the standard lagrangian and the coulomb gauge,” in
2017
+ Photons and Atoms (John Wiley & Sons, Ltd, 1997) Chap. 2, pp. 79–168.
2018
+ [25] A. Altland and B. D. Simons, Condensed Matter Field Theory, 2nd ed. (Cambridge University Press, 2010).
2019
+ [26] C. Cohen-Tannoudji, J. Dupont-Roc,
2020
+ and G. Grynberg, “Quantum electrodynamics in the coulomb gauge,” in
2021
+ Photons and Atoms (John Wiley & Sons, Ltd, 1997) Chap. 3, pp. 169–252.
2022
+ [27] R. Feynman and F. Vernon, Annals of Physics 24, 118 (1963).
2023
+ [28] D. J. Griffiths, T. C. Proctor, and D. F. Schroeter, American Journal of Physics 78, 391 (2010).
2024
+ [29] M. A. Schlosshauer, Decoherence and the Quantum-To-Classical Transition (Springer-Verlag Berlin Heidelberg, 2007).
2025
+ [30] W. G. Unruh, in Relativistic Quantum Measurement and Decoherence, edited by H.-P. Breuer and F. Petruccione (Springer
2026
+ Berlin Heidelberg, Berlin, Heidelberg, 2000) pp. 125–140.
2027
+
2tFKT4oBgHgl3EQf7y43/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
4tE1T4oBgHgl3EQf6QWC/content/tmp_files/2301.03521v1.pdf.txt ADDED
@@ -0,0 +1,1047 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.03521v1 [math.SP] 9 Jan 2023
2
+ GREEN’S FUNCTIONS FOR FIRST-ORDER SYSTEMS OF
3
+ ORDINARY DIFFERENTIAL EQUATIONS WITHOUT THE
4
+ UNIQUE CONTINUATION PROPERTY
5
+ STEVEN REDOLFI AND RUDI WEIKARD
6
+ Abstract. This paper is a contribution to the spectral theory associated with
7
+ the differential equation Ju′ + qu = wf on the real interval (a, b) when J is
8
+ a constant, invertible skew-Hermitian matrix and q and w are matrices whose
9
+ entries are distributions of order zero with q Hermitian and w non-negative.
10
+ Under these hypotheses it may not be possible to uniquely continue a solution
11
+ from one point to another, thus blunting the standard tools of spectral theory.
12
+ Despite this fact we are able to describe symmetric restrictions of the maximal
13
+ relation associated with Ju′ + qu = wf and show the existence of Green’s
14
+ functions for self-adjoint relations even if unique continuation of solutions fails.
15
+ 1. Introduction
16
+ This paper is a contribution to the spectral theory for the differential equation
17
+ Ju′ + qu = wf
18
+ posed on the real interval (a, b) when J is a constant, invertible, and skew-Hermitian
19
+ n × n-matrix while the entries of the matrices q and w are distributions of order
20
+ zero1 with q Hermitian and w non-negative. Ghatasheh and Weikard [7] studied this
21
+ equation under the additional hypothesis that initial value problems have unique
22
+ balanced2 solutions in the space of functions of locally bounded variation.
23
+ The equation Ju′ + qu = wf has, of course, been investigated by many people
24
+ when the coefficients q and w are locally integrable. In that situation initial value
25
+ problems always have unique solutions. This is not necessarily the case when the
26
+ measures induced by q or w have discrete components. It appears that an equation
27
+ with measure coefficients was first considered in 1952, when Krein [8] modelled a
28
+ vibrating string. In 1964 Atkinson [2] suggested to unify the treatment of differen-
29
+ tial and difference equations by writing them as systems of integral equation where
30
+ integrals were to be viewed as matrix-valued Riemann-Stieltjes integrals. Atkinson
31
+ explained that the presence of point masses may prevent the continuation of so-
32
+ lutions across such points and posed a condition avoiding that problem but more
33
+ Date: 11. May 2022.
34
+ This is a preprint of an article published in Integral Equations and Operator Theory which is
35
+ available online at https://doi.org/10.1007/s00020-022-02703-6.
36
+ ©2022.
37
+ This manuscript version is made available under the CC-BY-NC-ND 4.0 license
38
+ http://creativecommons.org/licenses/by-nc-nd/4.0/.
39
+ 1Recall that distributions of order 0 are distributional derivatives of functions of locally
40
+ bounded variation and hence may be thought of, on compact subintervals of (a, b), as measures.
41
+ For simplicity we might use the word measure instead of distribution of order 0 below.
42
+ 2A function of locally bounded variation is called balanced, if its values at any given point are
43
+ averages of its left- and right-hand limits at that point.
44
+ 1
45
+
46
+ 2
47
+ STEVEN REDOLFI AND RUDI WEIKARD
48
+ restrictive than the one posed in [7]. In 1999 Savchuk and Shkalikov [10] treated
49
+ Schr¨odinger equations with potentials in the Sobolev space W −1,2
50
+ loc
51
+ . Their paper was
52
+ very influential and spurred many further developments. Nevertheless, Eckhardt
53
+ et al. [5] showed in 2013, with the help of quasi-derivatives or, equivalently, by
54
+ writing the equation as a system, that a treatment without leaving the realm of
55
+ locally integrable coefficients is possible. In the same year Eckhardt and Teschl [6]
56
+ investigated 2×2-systems with diagonal measure-valued matrices q and w requiring
57
+ essentially Atkinson’s condition.
58
+ A more thorough account of the subject’s history is given in [7]. The papers
59
+ [5] and [6], mentioned above, may also serve as excellent sources, with perhaps
60
+ different emphases, of this history.
61
+ One feature of systems of first-order equations is that, generally, they are repre-
62
+ sented by linear relations rather than linear operators. There is a well-developed
63
+ spectral theory for linear relations initiated by Arens [1], see also Orcutt [9], and
64
+ Bennewitz [3]. The most important results (for our purposes) are also surveyed in
65
+ Appendix B of [7].
66
+ Existence or uniqueness of solutions of an initial value problem for Ju′+qu = wf
67
+ fails when, for some x ∈ (a, b), the matrices
68
+ B±(x, 0) = J ± 1
69
+ 2∆q(x)
70
+ are not invertible. Here ∆q(x) = Q+(x)−Q−(x) when Q denotes an anti-derivative
71
+ of q. Equivalently, ∆q(x) = dQ({x}) where dQ is the measure (locally) generated
72
+ by q. Assuming the unique continuation property for solutions of Ju′ + qu = wf
73
+ Ghatasheh and Weikard defined maximal and minimal relations Tmax and Tmin
74
+ associated with the differential equation Ju′ + qu = wf and showed that Tmax
75
+ is the adjoint of Tmin. They characterized the self-adjoint restrictions of Tmax, if
76
+ any, with the aid of boundary conditions and proved that resolvents are given as
77
+ integral operators, i.e., the existence of a Green’s function for any such self-adjoint
78
+ relation T . Under even more restrictive conditions they also showed the existence
79
+ of a Fourier transform diagonalizing T .
80
+ Campbell, Nguyen, and Weikard [4] defined maximal and minimal relations and
81
+ showed that Tmax = T ∗
82
+ min without the hypothesis of unique continuation of so-
83
+ lutions. Our goal here is to advance their ideas. In particular, even though the
84
+ equation Ju′ + qu = w(λu + f) may have infinitely many linearly independent
85
+ solutions the deficiency indices, i.e., the number of linearly independent solutions
86
+ of Ju′ + qu = ±iwu of finite positive norm, is still bounded by n, the size of the
87
+ system. We show that symmetric restrictions of Tmax, in particular the self-adjoint
88
+ ones, are still given by posing boundary conditions and we show that the resolvents
89
+ of self-adjoint restrictions are integral operators by proving the existence of Green’s
90
+ functions.
91
+ We will not approach the problem of Fourier transforms and eigenfunction ex-
92
+ pansions but hope to return to it in future work.
93
+ The material in this paper is arranged as follows. In Section 2 we recall the
94
+ circumstances under which existence and uniqueness of solutions to initial value
95
+ problems does hold and investigate the sets of those x ∈ (a, b) and λ ∈ C giving
96
+ rise to trouble.
97
+ Then, in Section 3 we discuss the manifold of solutions of our
98
+ differential equation in the special case when a and b are regular endpoints. These
99
+ results are instrumental in Section 4 where we investigate the deficiency indices
100
+
101
+ GREEN’S FUNCTIONS
102
+ 3
103
+ of the minimal relation and its symmetric extensions but without the assumption
104
+ that a and b are regular. Before we prove the existence of Green’s functions for
105
+ self-adjoint restrictions of the maximal relation in Section 6 we discuss the role
106
+ played by non-trivial solutions of zero norm in Section 5.
107
+ Let us add a few words about notation. D′0((a, b)) is the space of distributions of
108
+ order 0, i.e., the space of distributional derivatives of functions of locally bounded
109
+ variation. Any function u of locally bounded variation has left- and right-hand
110
+ limits denoted by u− and u+, respectively. Also, u is called balanced if u = u# =
111
+ (u+ + u−)/2. The space of balanced functions of bounded variation defined on
112
+ (a, b) is denoted by BV#((a, b)) while BV#
113
+ loc((a, b)) stands for the space of balanced
114
+ functions of locally bounded variation.
115
+ We use
116
+ 1 to denote an identity matrix
117
+ of appropriate size and superscripts ⊤ and ∗ indicate transposition and adjoint,
118
+ respectively. The sum of two closed only trivially intersecting subspaces S and T of
119
+ some Hilbert space (i.e., their direct sum) is denoted by S ⊎ T ; if S and T are even
120
+ orthogonal we may use ⊕ instead of ⊎. The orthogonal complement of a subspace
121
+ S of a Hilbert space H is denoted by H ⊖ S or by S⊥. For c1, ..., cN ∈ Cn we
122
+ abbreviate the column vector (c⊤
123
+ 1 , ..., c⊤
124
+ N)⊤ ∈ CnN by (c1, ..., cN)⋄.
125
+ 2. Preliminaries
126
+ Throughout this paper we assume the following hypothesis to be in force.
127
+ Hypothesis 2.1. J is a constant, invertible and skew-Hermitian n × n-matrix.
128
+ Both q and w are in D′0((a, b))n×n, w is non-negative and q Hermitian.
129
+ Given that w is non-negative it gives rise to a positive measure on (a, b) and we
130
+ denote the space of functions f which satisfy
131
+
132
+ f ∗wf < ∞ by L2(w). This space
133
+ permits the semi-inner product ⟨f, g⟩ =
134
+
135
+ f ∗wg (note that ⟨f, f⟩ may be 0 without
136
+ f being 0).
137
+ Consider the differential equation
138
+ Ju′ + (q − λw)u = wf
139
+ (2.1)
140
+ where λ is a complex parameter and f an element of L2(w). The latter condition
141
+ guarantees that wf is in D′0((a, b))n. We will search for solutions in BV#
142
+ loc((a, b))n.
143
+ In this case each term in (2.1) is a distribution of order 0 so that it makes sense to
144
+ pose the equation.
145
+ The point a is called a regular endpoint for Ju′ + qu = wf, if there is a point
146
+ c ∈ (a, b) such that the left-continuous anti-derivatives Q and W of q and w are
147
+ of bounded variation on (a, c). In this case q and w may be thought of as finite
148
+ measures on (a, c). Similarly, b is called regular, if Q and W are of bounded variation
149
+ on (c, b). If an endpoint is not regular, it is called singular. Not surprisingly, the
150
+ study of our problem is less complicated when the endpoints are regular and we
151
+ will use this fact to our advantage.
152
+ Despite our earlier denigration of the existence and uniqueness theorem of so-
153
+ lutions of initial value problems it continues to play a crucial role. The following
154
+ theorem was proved in [7].
155
+ Theorem 2.2. Suppose r ∈ D′0((a, b))n×n, g ∈ D′0((a, b))n and that the matrices
156
+ 1 ± ∆r(x)/2 are invertible for all x ∈ (a, b). Let x0 be a point in (a, b). Then the
157
+ initial value problem u′ = ru + g, u(x0) = u0 ∈ Cn has a unique balanced solution
158
+ u ∈ BV#
159
+ loc((a, b))n.
160
+
161
+ 4
162
+ STEVEN REDOLFI AND RUDI WEIKARD
163
+ If a is a regular endpoint we may pose an initial condition (for u+) at a. Simi-
164
+ larly, if b is regular we may prescribe u−(b) as the initial condition.
165
+ Suppose now that u is a solution of (2.1). Treating either side of this equation
166
+ as a measure (restricted to a compact subset of (a, b)) evaluation at a singleton {x}
167
+ shows that
168
+ J(u+(x) − u−(x)) + ∆q−λw(x)u#(x) = ∆w(x)f(x)
169
+ or, equivalently,
170
+ B+(x, λ)u+(x) − B−(x, λ)u−(x) = ∆w(x)f(x)
171
+ (2.2)
172
+ when we define
173
+ B±(x, λ) = J ± 1
174
+ 2
175
+
176
+ ∆q(x) − λ∆w(x)
177
+
178
+ .
179
+ Note that, if B+(x, λ) is not invertible, we could be in one of the following two
180
+ situations: (i) a solution given on (a, x) may fail to exist on (x, b) or (ii) there
181
+ are infinitely many ways to continue a solution on (a, x) to (x, b). An analogous
182
+ statement holds, of course, if B−(x, λ) is not invertible.
183
+ Let us now investigate the circumstances when a pair (x, λ) gives such trouble.
184
+ Define the sets Λx = {λ ∈ C : det(B+(x, λ)) det(B−(x, λ)) = 0} and Ξλ = {x ∈
185
+ (a, b) : det(B+(x, λ)) det(B−(x, λ)) = 0}. First note, since B−(x, λ) = −B+(x, λ)∗,
186
+ we have that Ξλ = Ξλ and that each Λx is symmetric with respect to the real axis.
187
+ Also, Λx is empty unless at least one of ∆q(x) and ∆w(x) is different from 0 and
188
+ hence for all but countably many x. Next, we claim that Λx is finite as soon as it
189
+ misses one point. To see this suppose that B+(x, λ0) is invertible and that λ ̸= λ0.
190
+ Since
191
+ B+(x, λ) = (λ0 − λ)B+(x, λ0)
192
+ �1
193
+ 2B+(x, λ0)−1∆w(x) − 1/(λ − λ0)
194
+
195
+ we see that B+(x, λ) fails to be invertible only if 1/(λ−λ0) is an eigenvalue of some
196
+ n × n-matrix. A similar statement holds, of course, for B− proving our claim.
197
+ The really bad points x, namely those where Λx = C, are thus contained in Ξ0.
198
+ Here we wish to remove the hypothesis Ξ0 = ∅ posed in [7]. On any subinterval of
199
+ (a, b) on which q gives rise to a finite measure we find that �∞
200
+ k=1 ∥∆q(xk)∥ must be
201
+ finite, when k �→ xk is a sequence of distinct points in that interval. It follows now
202
+ that Ξ0 is a discrete set. One shows similarly that, for any fixed complex number
203
+ λ the set Ξλ is discrete.
204
+ Lemma 2.3. Suppose [s, t] ⊂ (a, b) and (s, t)∩Ξ0 = ∅. Then we have that Λ(s,t) =
205
+
206
+ x∈(s,t) Λx is a discrete subset of C.
207
+ Proof. There are only finitely many points x in (s, t) where ∥J−1∆q(x)∥ > 1. Using
208
+ a Neumann series one sees that only at such points the norm of B+(x, 0)−1 can be
209
+ larger than 2∥J−1∥. Thus there is a positive number C such that ∥B+(x, 0)−1∥ ≤ C
210
+ for all x ∈ (s, t). Now suppose that B+(x, λ) is not invertible and that |λ| ≤ R.
211
+ Then 1/λ is an eigenvalue of 1
212
+ 2B+(x, 0)−1∆w(x). This requires that ∥∆w(x)∥ ≥
213
+ 2/(RC) and thus can happen only for finitely many x ∈ (s, t). Since similar argu-
214
+ ments work for B− the number of points in �
215
+ x∈(s,t) Λx which lie in a disk of radius
216
+ R centered at 0 must be finite.
217
+
218
+ We remark that, when one of the anti-derivatives of q and w is only locally of
219
+ bounded variation, the set �
220
+ x∈(a,b) Λx need not be discrete even if every Λx is finite.
221
+
222
+ GREEN’S FUNCTIONS
223
+ 5
224
+ Theorem 2.4. Suppose [s, t] ⊂ (a, b) and (s, t) ∩ Ξ0 = ∅. If u0 ∈ Cn and λ ∈
225
+ C \ Λ(s,t), then the initial value problem Ju′ + qu = λwu, u+(s) = u0 has a unique
226
+ balanced solution in (s, t). Moreover, u(x, ·) for x ∈ (s, t) as well as u−(t, ·) are
227
+ analytic in C \ Λ(s,t) and meromorphic on C. An analogous statement holds when
228
+ the initial condition is posed at t.
229
+ Proof. The first claim is simply a consequence of Theorem 2.2. When x ∈ (s, t)
230
+ the analyticity of u(x, ·) in C \ Λ(s,t), which is an open set, was proved in Section
231
+ 2.3 of [7]. If we modify q and w by setting them 0 on [t, b) we do not change the
232
+ solution on (s, t). The solution for the modified problem evaluated at t is analytic
233
+ and coincides with u−(t, ·) proving its analyticity. It remains to show that a point
234
+ λ0 ∈ Λ(s,t) can merely give rise to poles.
235
+ We know already that there are only finitely many points x in (s, t) where one of
236
+ B±(x, λ0) fails to be invertible. Suppose x′ and x′′ are two consecutive such points.
237
+ If we know the solution on (s, x′) and that u−(x′, ·) has, at worst, a pole at λ0,
238
+ then the solution in (x′, x′′) is determined by the initial value
239
+ u+(x′, λ) = B+(x′, λ)−1B−(x′, λ)u−(x′, λ)
240
+ which also has, at worst, a pole at λ0 since this is true for B+(x′, λ)−1. For x ∈ (s, t)
241
+ the claim follows now by induction. To prove that u−(t, ·) is also meromorphic we
242
+ proceed as before and modify q and w on [t, b).
243
+
244
+ 3. Solving the differential equation
245
+ Our goal in this section is to investigate the set of solutions of the differential
246
+ equation Ju′ + (q − λw)u = wf on (a, b) under a strengthened hypothesis.
247
+ Hypothesis 3.1. In addition to Hypothesis 2.1 we ask that a and b are regular
248
+ endpoints for Ju′ + qu = wf.
249
+ Moreover, given the partition
250
+ a = x0 < x1 < x2 < ... < xN < xN+1 = b
251
+ (3.1)
252
+ of (a, b) we require that Ξ0 ⊂ {x1, ..., xN}. We then consider only λ for which both
253
+ B+(x, λ) and B−(x, λ) are invertible unless x is in {x1, ..., xN}.
254
+ This hypothesis is in force throughout this section but later only if explicitly
255
+ mentioned. We emphasize that Ξ0 is finite when a and b are regular. Also, the set
256
+ of permissible λ, which we call Ω0, is symmetric with respect to the real axis and
257
+ avoids only a discrete set.
258
+ On each interval (xj, xj+1) we let Uj(·, λ) be a fundamental matrix of balanced
259
+ solutions of the homogeneous differential equation Ju′ + (q − λw)u = 0 such that
260
+ limx↓xj Uj(x, λ) =
261
+ 1. The existence of these fundamental matrices is guaranteed by
262
+ Theorem 2.2. The general balanced solution u of the non-homogeneous equation
263
+ Ju′ + (q − λw)u = wf on (xj, xj+1) satisfies, according to Lemma 3.3 in [7],
264
+ u−(x) = U −
265
+ j (x, λ)
266
+
267
+ cj + J−1
268
+
269
+ (xj,x)
270
+ Uj(·, λ)∗wf
271
+
272
+ for any cj ∈ Cn. Define
273
+ Uj(xj+1, λ) =
274
+ lim
275
+ x↑xj+1 Uj(x, λ)
276
+ and
277
+ Ij(f, λ) =
278
+
279
+ (xj,xj+1)
280
+ Uj(·, λ)∗wf.
281
+
282
+ 6
283
+ STEVEN REDOLFI AND RUDI WEIKARD
284
+ Using u+(xj) = cj and u−(xj) = Uj−1(xj, λ)(cj−1 + J−1Ij−1(f, λ)) in equation
285
+ (2.2) gives
286
+ (−B−(xj, λ)Uj−1(xj, λ), B+(xj, λ))
287
+ �cj−1
288
+ cj
289
+
290
+ = ∆w(xj)f(xj) + B−(xj, λ)Uj−1(xj, λ)J−1Ij−1(f, λ).
291
+ We need to consider these equations for j = 1, ..., N simultaneously. This gives rise
292
+ to the system
293
+ B(λ)˜u = F0(f, λ)
294
+ (3.2)
295
+ where ˜u = (c0, ..., cN)⋄, B(λ), to be specified presently, is in CnN×n(N+1), and
296
+ F0(f, λ) is in CnN.
297
+ The two-diagonal block-matrix structure of B suggests the
298
+ introduction of matrices E⊤ and E⊥, which, respectively, strip the first and last
299
+ n components off a vector in their domain Cn(N+1). If we also define the block-
300
+ matrices
301
+ B(λ) = diag(B+(x1, λ), ..., B+(xN, λ)),
302
+ U(λ) = diag(U0(x1, λ), ..., UN−1(xN, λ)),
303
+ and J = diag(J, ..., J) and when we note that
304
+ B(λ)∗ = diag(−B−(x1, λ), ..., −B−(xN, λ)),
305
+ we obtain
306
+ B(λ) = B(λ)∗U(λ)E⊥ + B(λ)E⊤.
307
+ (3.3)
308
+ The vector F0(f, λ) is given by
309
+ F0(f, λ) = R(f) − B(λ)∗U(λ)J −1I(f, λ)
310
+ with R(f) = ((∆wf)(x1), ..., (∆wf)(xN))⋄ and I(f, λ) = (I0(f, λ), ..., IN−1(f, λ))⋄.
311
+ We now have the following theorem.
312
+ Theorem 3.2. The differential equation Ju′ + (q − λw)u = wf has a solution u
313
+ on (a, b) if and only if ˜u = (u+(x0), ..., u+(xN))⋄ is a solution of equation (3.2).
314
+ In particular, in the homogeneous case, where f = 0, the space of solutions has
315
+ dimension n(N + 1) − rk B(λ) ≥ n.
316
+ We note that rk B(λ) = n when N = 1 so that the space of solutions of Ju′ +
317
+ (q − λw)u = 0 is then exactly n-dimensional. For N = 2, however, consider the
318
+ example (a, b) = R, J =
319
+ � 0 −1
320
+ 1
321
+ 0
322
+
323
+ , q =
324
+ � 0 2
325
+ 2 0
326
+
327
+ (δ1 − δ2), w =
328
+ � 2 0
329
+ 0 0
330
+
331
+ (δ1 + δ2), where the
332
+ δk are Dirac point measures concentrated on {k}. It shows that the dimension of
333
+ the space of solutions of Ju′ + (q − λw)u = 0 may be strictly larger than n.
334
+ Next we investigate the connection between the right-hand limits of a solution u
335
+ of the homogeneous equation Ju′ + (q − λw)u = 0 at the points x0, ..., xN (given
336
+ by the vector ˜u) and the vector ˆu = (u(x1), ..., u(xN))⋄. We have ˆu = D(λ)˜u where
337
+ D(λ) = 1
338
+ 2(U(λ)E⊥ + E⊤)
339
+ (3.4)
340
+ is again a two-diagonal block-matrix. If N ≥ 2 we will also introduce the matrices
341
+ Bm(λ) and Dm(λ) which are obtained by deleting the first and last n columns from
342
+ B(λ) and D(λ), respectively. If N = 1 we should think of Bm(λ) and Dm(λ) as
343
+ maps from the trivial vector space to Cn. Their adjoints are the map from Cn to
344
+ {0}. With this understanding the following results hold also for N = 1 even though
345
+ they then involve “matrices” with no rows or columns.
346
+
347
+ GREEN’S FUNCTIONS
348
+ 7
349
+ Lemma 3.3. D(λ)∗B(λ) − B(λ)∗D(λ) = diag(−J, 0, ..., 0, J) and Dm(λ)∗B(λ) −
350
+ Bm(λ)∗D(λ) = 0.
351
+ Proof. This follows since U(λ)∗J U(λ) = J which, in turn, follows from Lemma 3.2
352
+ in [7].
353
+
354
+ Lemma 3.4. The map v �→ B(λ)v, restricted to ker D(λ), is a bijection onto
355
+ ker Dm(λ)∗. Similarly, the map v �→ D(λ)v, restricted to ker B(λ), is a bijection
356
+ onto ker Bm(λ)∗. In particular, dim ker D(λ) = dim ker Dm(λ)∗ and dim ker B(λ) =
357
+ dim ker Bm(λ)∗.
358
+ Proof. The identity Dm(λ)∗B(λ)−Bm(λ)∗D(λ) = 0 shows that B(λ) maps ker D(λ)
359
+ to ker Dm(λ)∗ as well as that D(λ) maps ker B(λ) to ker Bm(λ)∗.
360
+ If v ∈ ker B(λ) ∩ ker D(λ) one shows that E⊥v = E⊤v = 0 using the definitions
361
+ (3.3) and (3.4) of B and D and the fact that B(λ) − B(λ)∗ = 2J . This, of course,
362
+ implies that v = 0 and hence the injectivity of both B(λ)|ker D(λ) and D(λ)|ker B(λ).
363
+ Clearly, both D(λ) and Dm(λ)∗, having invertible matrices along their main
364
+ diagonal, are of full rank.
365
+ The rank-nullity theorem shows therefore that their
366
+ kernels both have dimension n. This proves surjectivity of B(λ)|ker D(λ).
367
+ Finally, assume that v ∈ ker Bm(λ)∗. Then v = D(λ)x for some x ∈ Cn(N+1)
368
+ which implies that 0 = Bm(λ)∗D(λ)x = Dm(λ)∗B(λ)x. The first part of the proof
369
+ shows that there is a y ∈ ker D(λ) such that B(λ)y = B(λ)x. Hence v = D(λ)(x���y)
370
+ where x − y ∈ ker B(λ).
371
+
372
+ The following theorem establishes a connection between solutions of the differ-
373
+ ential equation Ju′ + (q − λw)u = 0 and elements of ker Bm(λ)∗.
374
+ Theorem 3.5. If u is a solution of Ju′ + (q − λw)u = 0 on (a, b), then ˆu =
375
+ (u(x1), ..., u(xN))⋄ is in ker Bm(λ)∗.
376
+ If, in addition, u+(a) = u−(b) = 0, then
377
+ ˆu ∈ ker B(λ)∗ (a subspace of ker Bm(λ)∗).
378
+ Conversely, if ˆu ∈ ker Bm(λ)∗, then Ju′ + (q − λw)u = 0 has a unique solution
379
+ u on (a, b) such that (u(x1), ..., u(xN))⋄ = ˆu. If, indeed, ˆu ∈ ker B(λ)∗, we further
380
+ have u+(a) = u−(b) = 0.
381
+ Let us emphasize that supp u ⊂ [x1, xN] when u+(a) = u−(b) = 0.
382
+ Proof. If u solves Ju′ + (q − λw)u = 0, then, by Theorem 3.2, ˜u ∈ ker B(λ).
383
+ Lemma 3.4 shows then that ˆu = D(λ)˜u is in ker Bm(λ)∗. If u+(a) = u−(b) = 0,
384
+ then Lemma 3.3 gives 0 = B(λ)∗D(λ)˜u = B(λ)∗ˆu.
385
+ Conversely, assume that ˆu ∈ ker Bm(λ)∗ = D(λ)(ker B(λ)).
386
+ Then there is a
387
+ unique vector ˜u ∈ ker B(λ) such that ˆu = D(λ)˜u, which, in turn, defines a unique
388
+ solution u of Ju′+(q−λw)u = 0 such that (u(x1), ..., u(xN))⋄ = ˆu. If ˆu ∈ ker B(λ)∗,
389
+ then, according to Lemma 3.3, diag(−J, 0, ..., 0, J)˜u = 0 which shows that u+(a) =
390
+ u−(b) = 0.
391
+
392
+ Given an algebraic system Ax = b we know that there exist solutions only if
393
+ b ∈ ran A = (ker A∗)⊥. For the differential equation Ju′ + (q − λw)u = wf with
394
+ integrable coefficients q and w the unique continuation property for the solutions
395
+ gives rise to the variation of constants formula, which then guarantees the existence
396
+ of solutions for any non-homogeneity f (within reason). In the present situation,
397
+
398
+ 8
399
+ STEVEN REDOLFI AND RUDI WEIKARD
400
+ however, the problem of existence raises its head and we now set out to give neces-
401
+ sary and sufficient conditions for f guaranteeing the existence of a solution in the
402
+ spirit of Linear Algebra.
403
+ Lemma 3.6. If ˜v ∈ ker B(λ) and ˆv = D(λ)˜v, then
404
+ ˜v∗E∗
405
+ ⊥ = −ˆv∗B(λ)∗U(λ)J −1
406
+ and
407
+ ˜v∗E∗
408
+ ⊤ = ˆv∗B(λ)J −1.
409
+ Moreover, if f ∈ L2(w) and Jv′ + (q − λw)v = 0, then
410
+
411
+ v∗wf = ˆv∗F0(f, λ) + ˆv∗B(λ)J −1˜I(f, λ) = ˆv∗F0(f, λ) + ˜v∗E∗
412
+ ⊤˜I(f, λ)
413
+ where (v(x1), ..., v(xN))⋄ = ˆv = D(λ)˜v and ˜I(f, λ) = (0, ..., 0, IN(f, λ))⋄ ∈ CnN.
414
+ Proof. Using the definitions (3.3) and (3.4) of B and D and the identities B(λ) −
415
+ B(λ)∗ = 2J and U(λ)∗J U(λ) = J we obtain that B(λ)˜v = 0 implies
416
+ B(λ)D(λ)˜v = U(λ)∗−1J E⊥˜v
417
+ and
418
+ B(λ)∗D(λ)˜v = −J E⊤˜v.
419
+ Taking adjoints gives the first claim since ˆv = D(λ)˜v.
420
+ The second claim is an immediate consequence of this, since
421
+
422
+ v∗wf = ˆv∗R(f) + ˜v∗(I0(f, λ), ..., IN (f, λ))⋄
423
+ = ˆv∗R(f) + ˜v∗E∗
424
+ ⊥I(f, λ) + ˜v∗E∗
425
+ ⊤˜I(f, λ)
426
+ = ˆv∗R(f) − ˆv∗B(λ)∗U(λ)J −1I(f, λ) + ˆv∗B(λ)J −1˜I(f, λ)
427
+ = ˆv∗F0(f, λ) + ˆv∗B(λ)J −1˜I(f, λ).
428
+
429
+ Theorem 3.7. The differential equation Ju′ + (q − λw)u = wf has a solution on
430
+ (a, b) if and only if
431
+
432
+ v∗wf = 0 for every solution v of Jv′ + (q − λw)v = 0 which
433
+ vanishes at a and b.
434
+ Proof. By Theorem 3.2 the solution u exists if and only if the system (3.2) has a
435
+ solution ˜u = (u+(x0), ..., u+(xN))⋄. This, in turn, happens if and only if F0(f, λ) ∈
436
+ ran B(λ) = (ker B(λ)∗)⊥.
437
+ By Theorem 3.5 the solutions of Jv′ +(q −λw)v = 0 which vanish at a and b are
438
+ in one-to-one correspondence with elements of ker B(λ)∗. Since v+(xN) = 0 we have
439
+ ˜v∗E∗
440
+ ⊤˜I(f, λ) = 0 and then, from Lemma 3.6, we obtain ˆv∗F0(f, λ) =
441
+
442
+ v∗wf.
443
+
444
+ In the case of unique continuation of solutions the condition that v vanishes at a
445
+ or b implies, of course, that v = 0. Consequently, Ju′ + (q − λw)u = wf has then a
446
+ solution for any f ∈ L2(w). The set of all solutions is thus obtained by adding the
447
+ general solution of Ju′ +(q −λw)u = 0 whose dimension is n(N + 1)−rkB(λ) ≥ n.
448
+ Theorem 3.8. The differential equation Ju′ + (q − λw)u = wf has a solution on
449
+ (a, b) which vanishes at a and b if and only if
450
+
451
+ v∗wf = 0 for every solution v of
452
+ Jv′ + (q − λw)v = 0.
453
+ Proof. For u to vanish at a and b it is required that u+(x0) = 0 and u+(xN) =
454
+ −J−1IN(f, λ). The system (3.2) is therefore equivalent to
455
+ Bm(λ)(c1, ..., cN−1)⋄ = F0(f, λ) + B(λ)J −1˜I(f, λ).
456
+ The proof is now analogous to the one for Theorem 3.7.
457
+
458
+
459
+ GREEN’S FUNCTIONS
460
+ 9
461
+ We conclude this section by “counting” the solutions of Ju′ + qu = λwu which
462
+ are not compactly supported.
463
+ More precisely, we will determine the dimension
464
+ of the quotient space of all solutions of Ju′ + qu = λwu modulo the space of
465
+ compactly supported solutions. Theorem 3.5 shows that the space of all solutions of
466
+ Ju′+qu = λwu is in one-to-one correspondence with ker Bm(λ)∗ and that the space
467
+ of compactly supported solutions of Ju′+qu = λwu is in one-to-one correspondence
468
+ with ker B(λ)∗. We therefore define
469
+ ˜n(λ) = dim(ker Bm(λ)∗/ ker B(λ)∗) = dim ker Bm(λ)∗ − dim ker B(λ)∗.
470
+ Lemma 3.9. ˜n(λ) + ˜n(λ) = 2n.
471
+ Proof. Since rk B(λ) = rk B(λ)∗, the rank-nullity theorem implies
472
+ dim ker B(λ) = n(N + 1) − rk B(λ)∗ = n + dim ker B(λ)∗.
473
+ Hence, using also the analogous equation for λ,
474
+ dim ker B(λ) − dim ker B(λ)∗ + dim ker B(λ) − dim ker B(λ)∗ = 2n.
475
+ Lemma 3.4 gives that dim ker B(λ) = dim ker Bm(λ)∗ yielding the claim.
476
+
477
+ From Theorem 2.4 we know that the matrices Uj(xj+1, ·) are meromorphic on C
478
+ with poles at most at points in the complement of Ω0. It follows that the entries of
479
+ B are also meromorphic. Since the meromorphic functions on C form a field there
480
+ is a row-echelon matrix ˜B with meromorphic entries such that B˜u = 0 has the same
481
+ solutions as ˜B˜u = 0. Now define a set Ω as Ω0 without the set of all poles of ˜B as
482
+ well as their complex conjugates, and the set of zeros and their conjugates of any
483
+ of the pivots of ˜B.
484
+ Theorem 3.10. If λ ∈ Ω, then dim ker B(λ) = dim ker B(λ) and ˜n(λ) = n.
485
+ Proof. The construction of Ω entails that rk B(λ) = rk ˜B(λ) = rk B(λ) if λ ∈ Ω.
486
+ Since ˜n(λ) = dim ker B(λ) − dim ker B(λ)∗ = dim ker B(λ) + n − dim ker B(λ) we
487
+ obtain ˜n(λ) = n.
488
+
489
+ 4. Symmetric restrictions of Tmax
490
+ Given a differential equation Ju′ + qu = wf we now define associated minimal
491
+ and maximal relations. Recall that L2(w) is the space of functions f such that
492
+
493
+ f ∗wf < ∞. First we define
494
+ Tmax = {(u, f) ∈ L2(w) × L2(w) : u ∈ BV#
495
+ loc((a, b))n, Ju′ + qu = wf}.
496
+ Subsequently we will always tacitly assume that u ∈ BV#
497
+ loc((a, b))n, when we use
498
+ u′. Next, let
499
+ Tmin = {(u, f) ∈ Tmax : supp u is compact in (a, b)}.
500
+ Note that these are spaces of pairs of functions. To employ the power of functional
501
+ analysis we need to realize these relations in Hilbert spaces. Therefore we introduce,
502
+ as usual, the space L2(w) as the quotient of L2(w) modulo the subspace of all u ∈
503
+ L2(w) for which ∥u∥2 =
504
+
505
+ u∗wu = 0. Denoting the equivalence class corresponding
506
+ to u by [u] we now set
507
+ Tmax = {([u], [f]) ∈ L2(w) × L2(w) : (u, f) ∈ Tmax}
508
+
509
+ 10
510
+ STEVEN REDOLFI AND RUDI WEIKARD
511
+ and
512
+ Tmin = {([u], [f]) ∈ Tmax : (u, f) ∈ Tmin}.
513
+ Here (and elsewhere) we choose brevity over precision: whenever we have a pair
514
+ ([u], [f]) in Tmax we choose u and f such that (u, f) ∈ Tmax.
515
+ Define the vector space
516
+ L0 = {u ∈ BV#
517
+ loc((a, b))n : Ju′ + qu = 0 and ∥u∥ = 0}.
518
+ In many cases this space is trivial and some authors restrict their attention to the
519
+ case where it is; this is then called the definiteness condition. However, we will
520
+ not do so here. Note that ∥u∥ = 0 if and only if wu is the zero distribution. The
521
+ significance of L0 stems from the following fact. Suppose ([u], [f]) ∈ Tmax and that
522
+ there are u, v ∈ [u] and f, g ∈ [f] such that Ju′ + qu = wf and Jv′ + qv = wg.
523
+ Then J(u − v)′ + q(u − v) = w(f − g) = 0 as well as w(u − v) = 0, i.e., u − v ∈ L0.
524
+ In other words, in the presence of a non-trivial space L0, the class [u] has many
525
+ representatives of locally bounded variation satisfying the differential equation for a
526
+ given class [f] (the choice of a representative of [f], on the other hand, is irrelevant).
527
+ In Section 5 we will describe a procedure to choose a representative of [u] in a
528
+ distinctive way.
529
+ In [4] it was proved that Tmin is symmetric, indeed that T ∗
530
+ min = Tmax. In this case
531
+ it is well-known that von Neumann’s theorem holds. Setting Dλ = {([u], λ[u]) ∈
532
+ Tmax} it states that
533
+ Tmax = Tmin ⊎ Dλ ⊎ Dλ
534
+ when Im λ ̸= 0. Moreover, when λ = ±i, these direct sums are even orthogonal. It
535
+ is also known that the dimension of Dλ does not change as λ varies in either the
536
+ upper or the lower half plane. The numbers n± = dim D±i are called deficiency
537
+ indices of Tmin and we are now setting out to investigate these.
538
+ If u is a solution of Ju′ +qu = λwu which is compactly supported then (u, λu) ∈
539
+ Tmin and ([u], λ[u]) ∈ Tmin ∩ Dλ. If λ is not real, then Tmin ∩ Dλ is trivial and it
540
+ follows that compactly supported solutions of Ju′ + qu = λwu do not contribute to
541
+ the corresponding deficiency index. We now have, as a corollary of Theorem 3.10,
542
+ that the deficiency indices of Tmin cannot be more than n if a and b are regular
543
+ endpoints. We do not state this result separately since it is included in the next
544
+ theorem about the general case.
545
+ Thus, to emphasize, we allow in the following a and b to be either regular or
546
+ singular endpoints. Let τk, k ∈ Z, be a strictly increasing sequence in (a, b) having
547
+ a and b as its only limit points and such that all points in Ξ0 are among the
548
+ τk. Considering now only the interval Ik = (τ−k, τk) we set xj = τ−k+j for j =
549
+ 0, ..., N + 1 = 2k. We can then introduce the objects from Section 3. To emphasize
550
+ their dependence on k we will add a superscript (k) to those objects. We have then,
551
+ in particular, the matrices B(k), B(k)
552
+ m and the sets Ω(k) of permissible values of λ.
553
+ We now define Ω = �∞
554
+ k=1 Ω(k) and note that Ω is symmetric with respect to the
555
+ real axis and misses only countably many values from C.
556
+ Now fix a non-real λ ∈ Ω. If u is a solution of Ju′+qu = λwu on (a, b) we denote
557
+ its restriction to the interval Ik by u(k). We are interested in the quotient space Xk
558
+ of all solutions of Ju′ +qu = λwu on Ik modulo the compactly supported solutions.
559
+ If u is a solution of Ju′+qu = λwu on Ik we denote the associated equivalence class
560
+ in Xk by ⌊u⌋k. A compactly supported solution u of Ju′ + qu = λwu on Ik can be
561
+ extended by 0 to all of (a, b) yielding an element in Tmin ∩ Dλ. This implies, since
562
+
563
+ GREEN’S FUNCTIONS
564
+ 11
565
+ Im λ ̸= 0, that ∥u∥2 =
566
+
567
+ Ik u∗wu = 0 and shows that Xk is a normed space with the
568
+ norm given by ∥u∥2
569
+ k =
570
+
571
+ Ik u∗wu. According to Theorem 3.5 the quotient space Xk
572
+ is isomorphic to ker B(k)
573
+ m (λ)∗/ ker B(k)(λ)∗ and, by Theorem 3.10, its dimension is
574
+ equal to n since λ ∈ Ω ⊂ Ω(k).
575
+ Theorem 4.1. The deficiency indices of Tmin are less than or equal to n.
576
+ Proof. Fix a non-real λ ∈ Ω. Suppose u1, ..., um are solutions of Ju′ + qu = λwu
577
+ such that [u1], ..., [um] are linearly independent elements of Dλ. We will show below
578
+ that there is an interval Ip = (τ−p, τp) such that ⌊u(p)
579
+ 1 ⌋p, ..., ⌊u(p)
580
+ m ⌋p are linearly
581
+ independent elements of Xp. Hence m ≤ n, the dimension of Xp. Since deficiency
582
+ indices are constant in either half-plane they cannot be larger than n.
583
+ We will now prove the existence of Ip by induction. That is we prove that, for
584
+ every k ∈ {1, ..., m}, there is an interval Iℓk such that the restrictions of u1, ..., uk
585
+ to Iℓk generate linearly independent elements ⌊u(ℓk)
586
+ 1
587
+ ⌋ℓk, ..., ⌊u(ℓk)
588
+ k
589
+ ⌋ℓk of Xℓk. Once
590
+ this is achieved we set p = ℓm.
591
+ Suppose k = 1 and let Iℓ1 be an interval such that ∥u(ℓ1)
592
+ 1
593
+ ∥ > 0. By what we
594
+ argued above we know that u(ℓ1)
595
+ 1
596
+ is not compactly supported in Iℓ1 and thus gives
597
+ rise to a non-zero (and hence linearly independent) element of Xℓ1.
598
+ Now suppose we had already shown our claim for some k < m. If ⌊u(ℓk)
599
+ 1
600
+ ⌋ℓk, ...,
601
+ ⌊u(ℓk)
602
+ k+1⌋ℓk are already linearly independent as elements of Xℓk we choose ℓk+1 = ℓk
603
+ and our induction step is complete. Otherwise, there are unique complex numbers
604
+ α1, ..., αk such that
605
+ ∥(α1u1 + ... + αkuk + uk+1)(ℓk)∥ℓk = 0.
606
+ However, there must be an interval Iℓk+1 ⊃ Iℓk where
607
+ ∥(α1u1 + ... + αkuk + uk+1)(ℓk+1)∥ℓk+1 > 0
608
+ on account that [u1], ..., [uk+1] are linearly independent. It follows now that, as ele-
609
+ ments of Xℓk+1 the vectors ⌊u(ℓk+1)
610
+ 1
611
+ ⌋ℓk+1, ..., ⌊u(ℓk+1)
612
+ k+1
613
+ ⌋ℓk+1 are linearly independent.
614
+ This completes our induction step also in this case.
615
+
616
+ Corollary 4.2. If a and b are regular, then n+ = n−.
617
+ Proof. Fix a non-real λ in Ω. Since a and b are regular, the set Ξλ = Ξλ is finite.
618
+ Thus we may assume that it is contained in Ik = (τ−k, τk) for some appropriate k.
619
+ Then dim ker B(k)(λ) is the number of linearly independent solutions of Ju′ + qu =
620
+ λwu. Theorem 3.10 shows that Ju′ + qu = λwu has the same number of linearly
621
+ independent solutions. Any of these solutions has finite norm but some may have
622
+ norm 0. Now note, that if u is a solution of Ju′+qu = λwu of norm 0, then we have
623
+ wu = 0, so that u is also a solution of Ju′ + qu = λwu. Therefore n+ = n−.
624
+
625
+ As mentioned above, it is well-known, even in the case of relations, that von
626
+ Neumann’s theorem E∗ = E⊕Di⊕D−i holds when E is a closed symmetric relation
627
+ in H × H when H is a Hilbert space. In our case, when d = dim Di ⊕ D−i is finite,
628
+ as we just showed, we can use Theorem B.5 in [7] to characterize the symmetric
629
+ restriction of Tmax in terms of boundary conditions. We state that theorem here
630
+ for easy reference. The operator J appearing there is defined by J (u, f) = (f, −u)
631
+ for u, f ∈ H.
632
+
633
+ 12
634
+ STEVEN REDOLFI AND RUDI WEIKARD
635
+ Theorem 4.3. Suppose E is a closed symmetric relation in H × H with d =
636
+ dim Di ⊕ D−i < ∞ and that m ≤ d/2 is a natural number or 0. If A : E∗ → Cd−m
637
+ is a surjective linear operator such that E ⊂ ker A and AJ A∗ has rank d−2m then
638
+ ker A is a closed symmetric restriction of E∗ for which the dimension of (ker A)⊖E
639
+ is m. Conversely, every closed symmetric restriction of E∗ is the kernel of such a
640
+ linear operator A. Finally, ker A is self-adjoint if and only if AJ A∗ = 0 (entailing
641
+ m = d/2).
642
+ A second ingredient for our next considerations is Lagrange’s identity (or Green’s
643
+ formula). If (u, f) and (v, g) are in Tmax, then v∗wf and g∗wu are finite measures.
644
+ Therefore v∗Ju′ + v′∗Ju = v∗wf − g∗wu is also a finite measure. Its antiderivative
645
+ v∗Ju is of bounded variation and thus has limits at a and b. Integration now gives
646
+ Lagrange’s identity
647
+ (v∗Ju)−(b) − (v∗Ju)+(a) = ⟨v, f⟩ − ⟨g, u⟩.
648
+ (4.1)
649
+ Note the right-hand side, and hence the left-hand side, does not change upon choos-
650
+ ing different representatives in place of u, f, v, or g.
651
+ Now, if (v, g) is an element of Di⊕D−i, then (u, f) �→ ⟨(v, g), (u, f)⟩ is a bounded
652
+ linear functional on Tmax. Conversely, since Tmax is a Hilbert space, a bounded
653
+ linear functional on Tmax is given by (u, f) �→ ⟨(v, g), (u, f)⟩ for some (v, g) ∈ Tmax.
654
+ When it is also known that Tmin is in the kernel of this functional, (v, g) may be
655
+ chosen in Di ⊕ D−i. Hence, in our situation, the operator A from Theorem 4.3
656
+ is given by d − m linearly independent elements in Di ⊕ D−i. Lagrange’s identity
657
+ implies that the entries of the matrix AJ A∗ are then given by
658
+ (AJ A∗)k,ℓ = ⟨(vk, gk), (gℓ, −vℓ)⟩ = (g∗
659
+ kJgℓ)−(b) − (g∗
660
+ kJgℓ)+(a).
661
+ (4.2)
662
+ Therefore we arrive at the following theorem.
663
+ Theorem 4.4. Let d = n+ + n− and suppose that m ≤ min{n+, n−}. If (v1, g1),
664
+ ..., (vd−m, gd−m) are linearly independent elements of Di⊕D−i such that the matrix
665
+ defined in (4.2) has rank d − 2m, then
666
+ T = {(u, f) ∈ Tmax : (g∗
667
+ j Ju)−(b) − (g∗
668
+ j Ju)+(a) = 0 for j = 1, ..., d − m}
669
+ (4.3)
670
+ is a closed symmetric restriction of Tmax.
671
+ Conversely, if T is a closed symmetric restriction of Tmax and m is the dimen-
672
+ sion of T ⊖ Tmin, then T is given by (4.3) for appropriate elements (v1, g1), ...,
673
+ (vd−m, gd−m) of Di ⊕ D−i for which the matrix defined in (4.2) has rank d − 2m.
674
+ For self-adjoint restrictions of Tmax it is hence necessary and sufficient that n+ =
675
+ n− = m = d−m and that (g∗
676
+ kJgℓ)−(b)−(g∗
677
+ kJgℓ)+(a) = 0 for all 1 ≤ k, ℓ ≤ m = d/2.
678
+ 5. The space L0
679
+ We mentioned earlier that the class [u] does not have a unique balanced repre-
680
+ sentative when ([u], [f]) ∈ Tmax, if the space L0 has non-trivial elements. In this
681
+ section we describe a procedure to choose a representative in a distinctive way.
682
+ To this end we assume, without loss of generality, that B+(τ0, 0) = B−(τ0, 0) = J
683
+ so that solutions of our differential equations are continuous at τ0. Define N0 =
684
+ {h(τ0) : h ∈ L0} and for each k ∈ N both Nk = {h+(τk) : h ∈ L0, supp h ⊂ [τk, b)}
685
+ and N−k = {h−(τ−k) : h ∈ L0, supp h ⊂ (a, τ−k]}. Then, for k ∈ N0, we say that a
686
+ function u ∈ BV#
687
+ loc((a, b))n satisfies condition (±k), if u±(τ±k) is perpendicular to
688
+ N±k (using always the upper sign or always the lower sign).
689
+
690
+ GREEN’S FUNCTIONS
691
+ 13
692
+ Lemma 5.1. Suppose ([u], [f]) ∈ Tmax. Then there is a unique balanced v ∈ [u]
693
+ such that (v, f) ∈ Tmax and v satisfies condition (k) for every k ∈ Z.
694
+ Proof. First consider uniqueness. Suppose u and v are two functions satisfying the
695
+ given conditions. Then u − v ∈ L0 and hence (u − v)(τ0)∗t(τ0) = 0 for t = u and
696
+ t = v. Subtract these equations to find (u−v)(τ0) = 0, and thus u = v on (τ−1, τ1).
697
+ Moreover, h1 = (u − v)χ[τ1,b) and h−1 = (u − v)χ(a,τ−1] are in L0. Conditions (1)
698
+ and (−1) show therefore that (u−v)+(τ1) and (u−v)−(τ−1) are also 0 which proves
699
+ that u = v on (τ−2, τ2). Induction informs us now that u = v everywhere.
700
+ We now turn to existence. Pick a balanced representative u ∈ [u] such that
701
+ (u, f) ∈ Tmax. There is an element h0 ∈ L0 such that the orthogonal projection of
702
+ u(τ0) onto N0 equals h0(τ0). Thus v0 = u − h0 satisfies (v0, f) ∈ Tmax, v0 ∈ [u],
703
+ and condition (0).
704
+ Next, there is an element h1 ∈ L0 with support in [τ1, b) such that the orthogonal
705
+ projection of v+
706
+ 0 (τ1) onto N1 equals h+
707
+ 1 (τ1). We now define v1 = v0 − h1. Then
708
+ (v1, f) ∈ Tmax, v1 ∈ [u], and v1 satisfies condition (1). Notice that v1 = v0 on
709
+ (a, τ1) implying that v1 also satisfies condition (0).
710
+ Proceeding recursively, we may define, for each k ∈ N, functions hk ∈ L0 sup-
711
+ ported in [τk, b) such that vk = u−�k
712
+ j=0 hj satisfies conditions (0), ..., (k), vk ∈ [u],
713
+ and (vk, f) ∈ Tmax.
714
+ Since, for a fixed x ∈ [τ0, b), only finitely many of the numbers hk(x) are different
715
+ from 0, we find that the sequence k �→ vk converges pointwise to a function ˜v ∈ [u]
716
+ satisfying conditions (k) for all k ∈ N0 and (˜v, f) ∈ Tmax. We can now repeat
717
+ this process for negative integers starting from the function ˜v instead of u arriving
718
+ eventually at a function v ∈ [u] satisfying conditions (k) for all k ∈ Z and (v, f) ∈
719
+ Tmax.
720
+
721
+ We denote the operator which assigns the function v just constructed to a given
722
+ element ([u], [f]) ∈ Tmax by E. If Im = (τ−m, τm) we also define Em : Tmax →
723
+ BV#(Im)n by composing E with the restriction to the interval Im.
724
+ Note that
725
+ BV#(Im)n is a Banach space with the norm |||u|||m defined as the sum of the
726
+ variation of u over Im and the norm of u(τ0).
727
+ Theorem 5.2. The operator Em : Tmax → BV#(Im)n is bounded.
728
+ Proof. Due to the closed graph theorem we merely have to show that Em is a
729
+ closed operator. Thus assume that the sequence ([uj], [fj]) converges to ([u], [f]) in
730
+ Tmax and that Em([uj], [fj]) converges to v in BV#(Im)n and hence pointwise. To
731
+ simplify notation we assume that Em([uj], [fj])) and Em([u], [f]) are the restrictions
732
+ of uj and u, respectively, to the interval Im. We need to show that u = v on Im.
733
+ First note that u±
734
+ j (τ±k) ∈ N ⊥
735
+ ±k and
736
+ ��u±
737
+ j (τ±k) − v±(τ±k)
738
+ �� → 0 imply that v
739
+ satisfies conditions (±k) for each k ∈ {0, ..., m − 1}. For ℓ ∈ {−m, m − 1} and
740
+ x ∈ (τℓ, τℓ+1) we have
741
+ u−
742
+ j (x) = U −
743
+ ℓ (x)
744
+
745
+ u+
746
+ j (τℓ) + J−1
747
+
748
+ (τℓ,x)
749
+ U ∗
750
+ ℓ wfj
751
+
752
+ when Uℓ denotes the fundamental matrix of Ju′ + qu = 0 on the interval (τℓ, τℓ+1)
753
+ satisfying U +
754
+ ℓ (τℓ) =
755
+ 1. Taking the limit as j → ∞ gives
756
+ v−(x) = U −
757
+ ℓ (x)
758
+
759
+ v+(τℓ) + J−1
760
+
761
+ (τℓ,x)
762
+ U ∗
763
+ ℓ wf
764
+
765
+
766
+ 14
767
+ STEVEN REDOLFI AND RUDI WEIKARD
768
+ since the integral may be considered as a vector of scalar products which are, of
769
+ course, continuous. The variation of constants formula shows that v is a balanced
770
+ solution for Jv′ + qv = wf on (τℓ, τℓ+1). We also have
771
+ J(u+
772
+ j (τℓ) − u−
773
+ j (τℓ)) + ∆q(τℓ)uj(τℓ) = ∆w(τℓ)fj(τℓ).
774
+ (5.1)
775
+ The fact that [fj] converges to [f] in L2(w) implies, on account of the positivity
776
+ of w, that ∆w(τℓ)fj(τℓ) converges to ∆w(τℓ)f(τℓ).
777
+ Therefore taking a limit in
778
+ (5.1) shows, in conjunction with the previous observations, that Jv′ + qv = wf on
779
+ the interval Im. Since u satisfies the same equation we have that u − v satisfies
780
+ J(u − v)′ + q(u − v) = 0 on Im.
781
+ Next we show w(u − v) = 0 on Im. Fatou’s lemma implies
782
+ 0 ≤
783
+
784
+ Im
785
+ (u − v)∗w(u − v) ≤ lim inf
786
+ j→∞
787
+
788
+ Im
789
+ (u − uj)∗w(u − uj) = 0.
790
+ It follows that w(u − v) = 0 on Im.
791
+ Finally, a variant of Lemma 5.1 shows now that u = v.
792
+
793
+ 6. Green’s function
794
+ Now suppose that we have a self-adjoint restriction T of Tmax. The resolvent set
795
+ of T is the set of those λ for which T − λ : dom(T ) → L2(w) is bijective, i.e.,
796
+ ̺(T ) = {λ ∈ C : ker(T − λ) = {0}, ran(T − λ) = L2(w)}
797
+ which is an open set. We denote its complement, the spectrum of T , by σ(T ).
798
+ Since T is self-adjoint, σ(T ) is a subset of R.
799
+ If λ ∈ ̺(T ), then the resolvent
800
+ Rλ = (T − λ)−1 is a bounded linear operator from L2(w) to dom(T ). We now
801
+ define Rλ : L2(w) → BV#
802
+ loc((a, b))n by
803
+ Rλ[f] = E((Rλ[f], λRλ[f] + [f])).
804
+ Thus Rλ[f] is the unique solution of Ju′ + qu = w(λu + f) in L2(w) satisfying
805
+ condition (k) for every k ∈ Z.
806
+ We will now show that Rλ is an integral operator. Its kernel G is called a Green’s
807
+ function for T .
808
+ Theorem 6.1. If T is a self-adjoint restriction of Tmax, then there exists, for given
809
+ x ∈ (a, b) and λ ∈ ̺(T ), a matrix G(x, ·, λ) such that the columns of G(x, ·, λ)∗ are
810
+ in L2(w) and
811
+ (Rλ[f])(x) =
812
+
813
+ G(x, ·, λ)wf.
814
+ (6.1)
815
+ Proof. Fix x ∈ Im and λ ∈ ̺(T ). Consider the restriction of Rλ[f] to the interval
816
+ Im. Since Em and Rλ are bounded operators the map [f] �→ (Rλ[f])(x) is a bounded
817
+ linear map from L2(w) to Cn. Hence there are elements [g1], ..., [gn] ∈ L2(w) such
818
+ that the k-th component of (Rλ[f])(x) equals ⟨[gk], [f]⟩. Let these be the columns
819
+ of the matrix-valued function G(x, ·, λ)∗. Then we obtain (6.1).
820
+
821
+ One wishes to complement this fairly abstract existence result by a more concrete
822
+ one where Green’s function is given in terms of solutions of the differential equation
823
+ as is done in the classical case, see, for instance, Zettl [11]. This was also achieved
824
+ in [7] under the assumption that Ξ0 is empty and minor generalizations of this
825
+ are certainly possible. Such an explicit construction of Green’s function, where
826
+ possible, is the cornerstone of many other results in spectral theory, in particular
827
+
828
+ GREEN’S FUNCTIONS
829
+ 15
830
+ the development of a spectral transformation and more detailed information about
831
+ the resolvent, e.g., the compactness of the resolvent in the regular case. Due to
832
+ the difficulties posed by the absence of an existence and uniqueness theorem for
833
+ initial value problems we have, so far, not been able to obtain such a construction
834
+ in general. However, we hope to return to this issue in the future.
835
+ 7. Example
836
+ In this section we treat an example where the matrices B±(x, λ) fail to be invert-
837
+ ible for infinitely many x and all λ, in other words where Ξ0 is infinite and Λx = C
838
+ for all x ∈ Ξ0 (recall that in [7] the hypothesis Ξ0 = ∅ was made causing each Λx
839
+ to be finite). The example is Ju′ + qu = wf on (a, b) = R where
840
+ J =
841
+
842
+ 0
843
+ −1
844
+ 1
845
+ 0
846
+
847
+ , q =
848
+
849
+ 0
850
+ 2
851
+ 2
852
+ 0
853
+ � �
854
+ k∈Z
855
+ (δ2k − δ2k+1), and, w =
856
+
857
+ 2
858
+ 0
859
+ 0
860
+ 0
861
+ � �
862
+ k∈Z
863
+ δk
864
+ with δk denoting the Dirac point measure concentrated on {k}. Since we are seeking
865
+ balanced solutions we need the matrices
866
+ B−(2k − 1, λ) =
867
+ �λ
868
+ 0
869
+ 2
870
+ 0
871
+
872
+ and
873
+ B+(2k − 1, λ) =
874
+ �−λ
875
+ −2
876
+ 0
877
+ 0
878
+
879
+ as well as
880
+ B−(2k, λ) =
881
+
882
+ λ
883
+ −2
884
+ 0
885
+ 0
886
+
887
+ and
888
+ B+(2k, λ) =
889
+
890
+ −λ
891
+ 0
892
+ 2
893
+ 0
894
+
895
+ .
896
+ If x is not an integer we have B±(x, λ) = J. Note that f ∈ L2(w) if and only if
897
+ k �→ f1(k) is in ℓ2(Z) and any element in L2(w) is uniquely determined by these
898
+ values (here f1 denotes the first component of f).
899
+ In any interval (k, k + 1) solutions of Ju′ + qu = w(λu + f) are constant, say
900
+ (αk, βk)⊤. At x = 2k − 1 the equation
901
+ B+(2k − 1, λ)u+(2k − 1) − B−(2k − 1, λ)u−(2k − 1) = (2f1(2k − 1), 0)⊤
902
+ implies α2k−2 = 0 and
903
+ − λα2k−1 − 2β2k−1 = 2f1(2k − 1).
904
+ (7.1)
905
+ Similarly, at x = 2k we get α2k = 0 and
906
+ − λα2k−1 + 2β2k−1 = 2f1(2k).
907
+ (7.2)
908
+ We can now describe the space Tmax. A pair (u, f) is in Tmax if and only if the
909
+ sequences k �→ f1(k) and k �→ u1(k) are in ℓ2(Z), f1(2k) = −f1(2k − 1), u1(2k) =
910
+ u1(2k − 1), and
911
+ u =
912
+
913
+ k∈Z
914
+ � �2u1(2k)
915
+ f1(2k)
916
+
917
+ χ#
918
+ (2k−1,2k) +
919
+ � 0
920
+ β2k
921
+
922
+ χ#
923
+ (2k,2k+1)
924
+
925
+ with arbitrary numbers β2k. Note that ∥u∥2 = 4 �
926
+ k∈Z |u1(2k)|2.
927
+ Choosing here f = 0 shows that 0 is an eigenvalue of Tmax with infinite multi-
928
+ plicity. Choosing f = 0 and requiring ∥u∥ = 0 determines the space L0. Indeed,
929
+ L0 =
930
+ � �
931
+ k∈Z
932
+
933
+ 0
934
+ β2k
935
+
936
+ χ#
937
+ (2k,2k+1) : β2k ∈ C
938
+
939
+
940
+ 16
941
+ STEVEN REDOLFI AND RUDI WEIKARD
942
+ which is infinite-dimensional. We now define the sequence τ setting τ0 = 1/2 and,
943
+ for k ∈ N, τk = k and τ−k = 1 − k. A solution u of Ju′ + qu = w(λu + f) always
944
+ satisfies condition (2k + 1) and it satisfies condition (2k) exactly when β2k = 0.
945
+ For f = 0 equations (7.1) and (7.2) show that no non-zero λ can be an eigenvalue
946
+ of Tmax. In particular, the deficiency indices n± are 0, i.e., Tmax is self-adjoint. Now
947
+ choose λ ̸= 0 and f arbitrary in L2(w). Then
948
+ (Rλf)(x) = − 1
949
+
950
+
951
+ k∈Z
952
+ �2f1(2k − 1) + 2f1(2k)
953
+ λf1(2k − 1) − λf1(2k)
954
+
955
+ χ#
956
+ (2k−1,2k)(x)
957
+ (7.3)
958
+ is the unique solution of Ju′ + qu = w(λu + f) satisfying condition (k) for any
959
+ k ∈ Z. Since
960
+ ∥Rλf∥2 =
961
+
962
+ k∈Z
963
+ 2|(Rλf)1(k)|2 =
964
+ 1
965
+ |λ|2
966
+
967
+ k∈Z
968
+ |f1(2k − 1) + f1(2k)|2
969
+ (7.4)
970
+ is finite we have that C \ {0} is the resolvent set of Tmax.
971
+ We now define H = {u ∈ L2(w) : u1(2k − 1) = u1(2k)} and H∞ = {f ∈ L2(w) :
972
+ f1(2k − 1) = −f1(2k)}. These spaces are orthogonal to each other and their direct
973
+ sum is L2(w). Equation (7.4) shows that ker Rλ = H∞. Moreover, we have
974
+ Tmax = (H × {0}) ⊕ ({0} × H∞).
975
+ This is an instance of a general feature for a self-adjoint linear relation T : if H is
976
+ the closure of the domain of T , H∞ the orthogonal complement of H, and T0 =
977
+ T ∩ (H × H), then T = T0 ⊕ ({0} × H∞). The former summand is then a linear
978
+ operator densely defined in H called the operator part of T . The latter summand
979
+ is called the multi-valued part of T .
980
+ We end this example by identifying Green’s function for our example. It may
981
+ be guessed by looking at equation (7.3). In any case one can check directly that
982
+ (Rλf)(x) =
983
+
984
+ G(x, ·, λ)wf. Note that the second column of G is irrelevant since
985
+ the second row of w is 0. When x is not integer G(x, y, λ) is given by
986
+
987
+ k∈Z
988
+
989
+ − 1
990
+ λ
991
+ �1
992
+ 0
993
+ 0
994
+ 0
995
+
996
+ + 1
997
+ 2
998
+ � 0
999
+ 1
1000
+ −1
1001
+ 0
1002
+
1003
+ sgn(x − y)
1004
+
1005
+ χ#
1006
+ (2k−1,2k)(x)χ#
1007
+ (2k−1,2k)(y).
1008
+ If x is an integer we have instead
1009
+ G(2k − 1, y, λ) = 1
1010
+ 2
1011
+ lim
1012
+ x↓2k−1 G(x, y, λ)
1013
+ and
1014
+ G(2k, y, λ) = 1
1015
+ 2 lim
1016
+ x↑2k G(x, y, λ).
1017
+ References
1018
+ [1] Richard Arens. Operational calculus of linear relations. Pacific J. Math., 11:9–23, 1961.
1019
+ [2] F. V. Atkinson. Discrete and continuous boundary problems. Mathematics in Science and
1020
+ Engineering, Vol. 8. Academic Press, New York-London, 1964.
1021
+ [3] Christer Bennewitz. Symmetric relations on a Hilbert space. Pages 212–218. Lecture Notes
1022
+ in Math., Vol. 280, 1972.
1023
+ [4] Kevin Campbell, Minh Nguyen, and Rudi Weikard. On the spectral theory for first-order
1024
+ systems without the unique continuation property. Linear Multilinear Algebra, 69(12):2315–
1025
+ 2323, 2021. Published online: 04 Oct 2019.
1026
+ [5] Jonathan Eckhardt, Fritz Gesztesy, Roger Nichols, and Gerald Teschl. Weyl-Titchmarsh the-
1027
+ ory for Sturm-Liouville operators with distributional potentials. Opuscula Math., 33(3):467–
1028
+ 563, 2013.
1029
+ [6] Jonathan Eckhardt and Gerald Teschl. Sturm-Liouville operators with measure-valued coef-
1030
+ ficients. J. Anal. Math., 120:151–224, 2013.
1031
+
1032
+ GREEN’S FUNCTIONS
1033
+ 17
1034
+ [7] Ahmed Ghatasheh and Rudi Weikard. Spectral theory for systems of ordinary differential
1035
+ equations with distributional coefficients. J. Differential Equations, 268(6):2752–2801, 2020.
1036
+ [8] M. G. Kre˘ın. On a generalization of investigations of Stieltjes. Doklady Akad. Nauk SSSR
1037
+ (N.S.), 87:881–884, 1952.
1038
+ [9] Bruce Call Orcutt. Canonical differential equations. PhD thesis, University of Virginia, 1969.
1039
+ [10] A. M. Savchuk and A. A. Shkalikov. Sturm-Liouville operators with singular potentials. Math-
1040
+ ematical Notes, 66(6):741–753, 1999. Translated from Mat. Zametki, Vol. 66, pp. 897–912
1041
+ (1999).
1042
+ [11] Anton Zettl. Sturm-Liouville theory, volume 121 of Mathematical Surveys and Monographs.
1043
+ American Mathematical Society, Providence, RI, 2005.
1044
+ Department of Mathematics, University of Alabama at Birmingham, Birmingham, AL
1045
+ 35226-1170, USA
1046
1047
+
4tE1T4oBgHgl3EQf6QWC/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
7dE4T4oBgHgl3EQf2Q2c/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
7dE4T4oBgHgl3EQf2Q2c/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:be8a5013faccdd81061f3c8f73f926d2610b93bff75439220031b3032a7c9b77
3
+ size 111673
89FST4oBgHgl3EQfajh_/content/tmp_files/2301.13796v1.pdf.txt ADDED
@@ -0,0 +1,1672 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+ Scalable Grid-Aware Dynamic Matching using
3
+ Deep Reinforcement Learning
4
+ Majid Majidi Student Member, IEEE, Deepan Muthirayan Member, IEEE, Masood Parvania Senior Member,
5
+ IEEE, Pramod P. Khargonekar Fellow, IEEE
6
+ Abstract—This paper proposes a two-level hierarchical match-
7
+ ing framework for Integrated Hybrid Resources (IHRs) with grid
8
+ constraints. An IHR is a collection of Renewable Energy Sources
9
+ (RES) and flexible customers within a certain power system zone,
10
+ endowed with an agent to match. The key idea is to pick the
11
+ IHR zones so that the power loss effects within the IHRs can
12
+ be neglected. This simplifies the overall matching problem into
13
+ independent IHR-level matching problems, and an upper-level
14
+ optimal power flow problem to meet the IHR-level upstream
15
+ flow requirements while respecting the grid constraints. Within
16
+ each IHR, the agent employs a scalable Deep Reinforcement
17
+ Learning algorithm to identify matching solutions such that
18
+ the customer’s service constraints are met. The central agent
19
+ then solves an optimal power flow problem with the IHRs as
20
+ the nodes, with their active power flow and reactive power
21
+ limits, and grid constraints to determine the final flows such
22
+ that matched power can be delivered to the extent the grid
23
+ constraints are satisfied. The proposed framework is implemented
24
+ on a test power distribution system, and multiple case studies are
25
+ presented to substantiate the welfare efficiency of the proposed
26
+ solution and the satisfaction of the grid and customers’ servicing
27
+ constraints.
28
+ Index Terms—Hierarchical dynamic matching, integrated hy-
29
+ brid resources, deep reinforcement learning, uncertainty.
30
+ I. INTRODUCTION
31
+ D
32
+ RIVEN by the advances in communication technologies
33
+ and supporting policies, Distributed Energy Resources
34
+ (DERs) and flexible loads are going to be highly penetrated in
35
+ power grids. Federal Energy Regulatory Commission (FERC)
36
+ order 2222 requires power system operators to facilitate the
37
+ participation of demand-side resources in the electricity mar-
38
+ kets, reflecting their significant potential to provide energy
39
+ flexibility [1]. The DERs and flexible loads, if coordinated and
40
+ controlled carefully, can make the grid flexible and energy-
41
+ efficient [2], [3]. However, a large number of DERs and
42
+ flexible loads might challenge the structure and capacity of
43
+ power distribution grids. Hence, it is essential to develop
44
+ intelligent energy management solutions that can manage
45
+ different sorts of DERs and flexible loads in a scalable manner
46
+ without compromising the power grid’s stability.
47
+ In recent years, several efforts have been made to develop
48
+ energy management solutions for the coordination of DERs
49
+ in power distribution systems. One promising solution is
50
+ This work is supported in part by the National Science Foundation under
51
+ Grant ECCS-1839429.
52
+ M. Majidi, and M. Parvania are with the Department of Electrical and
53
+ Computer Engineering, the University of Utah, Salt Lake City, UT 84112 USA
54
+ (e-mails: {majid.majidi, masood.parvania,}@utah.edu). Deepan Muthirayan
55
+ and Pramod P. Khargonekar are with the Department of Electrical Engineering
56
+ and Computer Science, University of California, Irvine, CA 92697 USA (e-
57
+ mails: {deepan.m, pramod.khargonekar,}@uci.edu).
58
+ matching, which is a Peer-to-Peer (P2P) solution. Unlike
59
+ traditional energy management solutions based on pooling re-
60
+ sources, matching offers optimal use of energy flexibility while
61
+ accounting for the energy preferences of flexible customers.
62
+ This is the key feature that makes matching very promising to
63
+ future power grids. However, developing a matching solution
64
+ for power grids still has several challenges: (i) the solution
65
+ has to be online and capable of adapting the matching strategy
66
+ with the state of the whole grid, (ii) it has to cope with a large
67
+ number of DERs and flexible loads, and (iii) it has to satisfy
68
+ the security constraints of the grid. Although [4], [5] propose
69
+ online solutions for dynamic matching, the proposed solutions
70
+ are heuristics and therefore can be sub-optimal. Alternatively,
71
+ data-driven approaches like Reinforcement Learning (RL) can
72
+ be used to discover high-performing dynamic matching poli-
73
+ cies. However, RL approaches have severe limitations when
74
+ it comes to learning policies for power grids with constraints
75
+ such as power flow limits. For instance, [6] proposes a Deep
76
+ Reinforcement Learning (DRL) solution for dynamic matching
77
+ but it fails to account for the grid constraints. Moreover, a
78
+ central matching structure might not be efficient or feasible
79
+ for managing a large number of DERs and flexible loads in
80
+ the power grid. Hence, an efficient learning-based hierarchical
81
+ matching model with Integrated Hybrid Resources (IHRs) is of
82
+ interest in addressing dynamic matching in power grids with
83
+ grid constraints.
84
+ IHRs present a viable solution to facilitate efficient energy
85
+ management and control of uncertain DERs in various appli-
86
+ cations [7]–[10]. In a power grid, different types of renewable
87
+ and non-renewable DERs and flexible can be combined and
88
+ operated as an IHR to supply distributed energy flexibility.
89
+ The key feature of an IHR is that the resources within the IHR
90
+ can be treated as an integrated set of resources with a single
91
+ interconnection point. Therefore, from a matching solution
92
+ point of view, each IHR can be treated as a separate matching
93
+ market with a single interconnection to the distribution grid.
94
+ This then enables the use of an RL-type algorithm to determine
95
+ the optimal way to manage the DERs within each IHR,
96
+ where the RL solution does not need to take into account
97
+ the grid constraints. Once the IHR-level matching results are
98
+ determined, a central controller can re-dispatch the IHRs using
99
+ a reduced-dimension Optimal Power Flow (OPF) model with
100
+ each IHR as a node to balance the excesses while ensuring that
101
+ the grid constraints across the distribution system are satisfied.
102
+ This paper proposes a hierarchical framework for dynamic
103
+ matching markets in power distribution systems composed of
104
+ IHRs. The schematic of the proposed framework is shown
105
+ in Fig. 1. An IHR consists of an agent that employs DRL
106
+ arXiv:2301.13796v1 [eess.SY] 31 Jan 2023
107
+
108
+ 2
109
+ to locally match the distributed Renewable Energy Sources
110
+ (RES) and flexible customers in each IHR while satisfying
111
+ the quality of service constraints of customers, i.e., critical-
112
+ ity, servicing deadline, etc. Such a learning-based approach
113
+ allows for developing a very effective online matching pol-
114
+ icy, which is otherwise very difficult to design. Once the
115
+ IHR-level matching results are determined, each IHR agent
116
+ communicates the net active power flow (i.e., net active
117
+ power consumption/generation), as well as the reactive power
118
+ limits of the IHR to a central agent. The central agent then
119
+ formulates a reduced-dimension OPF model with the IHRs as
120
+ the nodes to determine the final flows (set-points) such that
121
+ the grid constraints are met. In this stage, the central agent
122
+ can curtail the IHR-level matching decisions and control the
123
+ reactive power flow from/into each IHR in order to make sure
124
+ that power flows in the grid and voltage levels across the
125
+ distribution nodes are not violated.
126
+ A. Related Works and Contributions
127
+ Several works in the literature have explored the control
128
+ and management of DERs in distribution systems. P2P energy
129
+ trading markets of different types are developed in [11]–
130
+ [20]. The authors in [12] studied the operation and benefits
131
+ of centralized and decentralized battery energy storage under
132
+ different P2P market designs. A P2P market design based
133
+ on bilateral contracts is proposed in [13] for energy trading
134
+ between multiple DERs and flexible loads, with the objective
135
+ of minimizing peak load in the low-voltage power distribution
136
+ system. A decentralized P2P optimization framework is pre-
137
+ sented in [14] to enable local energy sharing between DER
138
+ agents in the low-voltage distribution systems. A local energy
139
+ sharing framework is proposed for prosumers in low-voltage
140
+ distribution systems in [15], where the voltage regulation capa-
141
+ bility of the proposed energy sharing framework is highlighted.
142
+ An iterative sequential approach is implemented in [16] to
143
+ enable P2P energy and reserve sharing between prosumers in
144
+ power distribution systems with grid constraints. A negotiation
145
+ algorithm is proposed to facilitate energy sharing between
146
+ interconnected DER owners in [17]. The use of game theory
147
+ to determine the interaction strategy of DERs in P2P energy
148
+ sharing is investigated in [18]–[20].
149
+ The application of data-driven approaches to energy man-
150
+ agement of DERs is studied in [21]–[25]. The authors in [21]
151
+ implemented a multi-agent learning framework to determine
152
+ real-time local energy trading strategies for DER owners in
153
+ regional microgrids. A multi-energy sharing model based on
154
+ RL is proposed in [22], [23] for local heat and power sharing
155
+ in energy microgrids equipped with DERs. In [24], [25], the
156
+ authors proposed a specific price-based market framework for
157
+ coordinating the prosumers in the market to minimize the
158
+ peak load. In [26], a hierarchical energy management model
159
+ based on DRL is proposed for local energy management of
160
+ energy storage systems to improve the resilience of the power
161
+ distribution system.
162
+ Although the works reviewed here study the management
163
+ and coordination of DERs in distribution systems, their P2P
164
+ solutions address specific scenarios, and many do not account
165
+ for the grid constraints. Moreover, the existing hierarchical
166
+ energy management models for DERs in power distribution
167
+ systems neglect the preference and dynamic characteristics
168
+ of the DERs and flexible loads, which impacts the energy
169
+ flexibility available to the grid. In contrast, this paper develops
170
+ a broadly applicable online matching solution that (i) is de-
171
+ signed to maximize the integration of local RES and the overall
172
+ welfare in a very generic real-time operating scenario that can
173
+ be riddled with uncertainties, (ii) takes into consideration the
174
+ flexible loads’ servicing deadline, as well as their dynamic
175
+ criticality, and willingness to pay for a unit of energy, and (iii)
176
+ at the same time accounts for the power grid constraints. The
177
+ key contributions of the paper can be summarized as follows:
178
+ • A hierarchical dynamic matching framework for power
179
+ distribution systems constituted by IHRs.
180
+ • An efficient and scalable learning-based solution to match
181
+ the flexible loads and uncertain RES within each IHR
182
+ with no need for prior experience or expert supervision
183
+ or elaborate design. An independent DRL algorithm for
184
+ each IHR agent that matches the flexible loads and supply
185
+ sources to improve the utilization of RES and therefore
186
+ maximize the social welfare in each IHR such that the
187
+ quality of service constraints of the loads are satisfied
188
+ prior to their servicing deadline, and their dynamic will-
189
+ ingness to pay for a unit of energy is taken into account.
190
+ • An upper-level optimization model to fix the excesses or
191
+ imbalances within the IHRs. Once the matching results in
192
+ each IHR are determined, a central agent runs a reduced-
193
+ dimension OPF problem to fix the possible imbalances
194
+ within the IHRs and, at the same time, ensures the
195
+ power flow limits and voltage security constraints of the
196
+ distribution system are met.
197
+ The remaining of the paper is categorized as follows: Hi-
198
+ erarchical matching market framework is presented in Section
199
+ II. The proposed learning-based solution approach is explained
200
+ in Section III. The simulation results are presented in Section
201
+ IV, and the paper is concluded in Section V.
202
+ II. HIERARCHICAL MATCHING MARKET
203
+ The proposed hierarchical matching framework is composed
204
+ of (i) a market operator or central agent, and (ii) multiple
205
+ IHRs, with each IHR operating as a separate matching market
206
+ and the central agent acting as the coordinating agent between
207
+ the IHRs. In the proposed framework, the grid is divided into
208
+ multiple IHRs, where each IHR is an integrated unit of several
209
+ types of DERs that are treated as a single resource with a single
210
+ interconnection point to the grid. This is feasible to do when
211
+ the region of the grid representing the IHR is such that the
212
+ voltage variation within each IHR is within a small δ as [26]:
213
+ |Vit − Vjt| < δ,
214
+ ∀t, ∀b, b′, ∈ Bh, ∀h ∈ H,
215
+ (1)
216
+ where H is the set of all IHRs and b, b′, ∈ Bh represent any
217
+ pair of buses in IHR h ∈ H. Hence, each IHR is treated as a
218
+ regular matching market with no power flow constraints, and
219
+ the rest of the grid as the upstream supply source, to balance
220
+ any imbalances or excesses in the IHRs.
221
+
222
+ 3
223
+ IHR Agent
224
+ Matching
225
+ Policy
226
+ Matching
227
+ Policy
228
+ Matching Market
229
+ Constraints
230
+ Supply-Demand Balance
231
+ RES Generation Availability
232
+ Objective
233
+ Maximize Social Welfare
234
+ Customers Deadline
235
+ IHR Matching Problem
236
+ Active Customers
237
+ RES Availability
238
+ Customers Criticality
239
+ Wait
240
+ State
241
+ Match
242
+ Action
243
+ Match
244
+ Reward
245
+ Social Welfare
246
+ Constraints
247
+ Optimal Power Flow
248
+ Integrated Hybrid Resource
249
+ Objective
250
+ Minimize System Energy Cost
251
+ System-Level Power Flow Constraints
252
+ - Net Active Power
253
+ - Min & Max Reactive Power Capacity
254
+ Fixed Mismatches
255
+ Fig. 1. Structure of hierarchical dynamic matching model in power distribu-
256
+ tion systems using deep reinforcement learning.
257
+ The matching market within each IHR is an online market,
258
+ with customers and RES that are characterized by uncertain
259
+ arrivals and generation over time. In the proposed model,
260
+ each IHR is endowed with an agent which can adapt its
261
+ decision according to the state of the local IHR market, which
262
+ includes the history of customers and renewable generation.
263
+ This ensures that the decisions can be optimized with respect
264
+ to the underlying state and the expected future conditioned
265
+ on the current state. But, such state-dependent solutions are
266
+ difficult to characterize for an online market. Alternatively,
267
+ data-driven approaches like RL can be used to derive state-
268
+ dependent solutions for systems like electricity markets, which
269
+ are dynamic and uncertain. Given this, the IHR agents are
270
+ endowed with DRL algorithms to discover state-dependent
271
+ matching policies from their respective operational data.
272
+ The design of a DRL model for a matching market has many
273
+ practical limitations like scalability because of the size of the
274
+ action space, which can grow exponentially with the number
275
+ of customers, in addition to the servicing constraints that the
276
+ matching outputs from the DRL model are required to satisfy.
277
+ In this study, the scalable DRL-based solution proposed in
278
+ our prior work [6] is adopted as the DRL model for each
279
+ of the IHRs. This model is designed specifically to address
280
+ the scalability and convergence of DRL applied to matching
281
+ markets. The DRL model is discussed in the next section.
282
+ The central agent plays the role of managing the whole
283
+ grid, coordinating the upstream demand of the IHRs such
284
+ that the grid constraints are satisfied. At any moment, after
285
+ the IHR-level matching decisions are determined, the IHR
286
+ agents send their net active power and reactive power limits
287
+ to the central agent. The central agent then solves a reduced-
288
+ dimension OPF problem with IHR as the nodes to compute the
289
+ active and reactive power flows for the nodes such that the grid
290
+ constraints (i.e., overall power flow constraints and voltage
291
+ boundary limits derived from (1) are met. The voltage bound-
292
+ ary constraints ensure that the condition in (1) is satisfied,
293
+ and therefore the matched power is delivered without much
294
+ loss. The inclusion of the power flow constraints ensures that
295
+ the overall flow delivers the matched power to the extent the
296
+ constraints can be satisfied. Now, a single centralized market
297
+ can perform matching, and be adaptable to the changing
298
+ market condition, but it is typically hard to compute a solution
299
+ with DRL that satisfies stability constraints, i.e., power flow
300
+ constraints. This is the key benefit of the proposed hierarchical
301
+ approach, which uses DRL to identify state-dependent policies
302
+ and optimization to ensure the feasibility of the policies for
303
+ grid operation. The rest of the section describes the supply
304
+ and customer models, the market state, the matching market
305
+ formulation, and finally the IHR-level matching and upper-
306
+ level OPF problems.
307
+ A. Supply Model
308
+ Lets denote the time within a day by t. The matching market
309
+ comprises two sources of supply: 1) grid supply (type g),
310
+ which it can be drawn from its interconnection to the grid
311
+ and 2) RES (type s). The upstream grid supply at a time t,
312
+ denoted by gt ∈ R, is priced at the retail price of electricity,
313
+ c/kWh, while the unit cost of RES generation, rt ∈ R, is
314
+ assumed to be zero.
315
+ B. Flexible Customer Model
316
+ Each customer (or load) is characterized by three param-
317
+ eters, {ai, pi, di}, where ai ∈ N is the arrival time of the
318
+ customer, pi ∈ R is the load requested by the customer, and
319
+ di ∈ N is the servicing deadline by which the customer is
320
+ to be served. Moreover, each customer has a criticality rate
321
+ bi, at which its willingness to pay decreases from ai until di.
322
+ The heterogeneity of customers lies in the differing deadlines
323
+ and their criticality. Hence, the utility function of customer i
324
+ representing its willingness to pay for a unit of energy can be
325
+ defined as follows:
326
+ πi
327
+ t = c − bi(t − ai),
328
+ πi
329
+ t ≥ 0, ai ≤ t ≤ di,
330
+ bi = ϕc/(di − ai),
331
+ (2)
332
+ where ϕ ∈ [0, 1] determines the reduction rate in customers’
333
+ willingness to pay for a unit of energy. The utility function
334
+ for different values of criticality rate is shown in Fig. 2. In
335
+ addition to the flexible customers, the market can also have
336
+ non-flexible loads.
337
+ In Fig. 2, customer’s willingness to pay is less than or equal
338
+ to the grid supply price c/kWh. This is reasonable considering
339
+ that the grid supply is available at this price at all times. A
340
+ customer with ϕ = 1 will only be willing to pay zero if it
341
+ is served at its deadline. On the other hand, a customer with
342
+ ϕ = 0 can be served at any time without any change to the
343
+
344
+ 4
345
+ πt
346
+ t
347
+ b > 0
348
+ a
349
+ d
350
+ c
351
+ πt
352
+ t
353
+ b = 0
354
+ a
355
+ d
356
+ c
357
+ flexible load c at bus i in time t, the state equation of queuing
358
+ system can be expressed as:
359
+ ˙Qc
360
+ t,i = Ac
361
+ t,i − P c
362
+ t,i
363
+ (4)
364
+ Qc
365
+ t,i = Qc
366
+ t−∆t,i +
367
+
368
+ Ac
369
+ t,i − P c
370
+ t,i
371
+
372
+ ∆t
373
+ (5)
374
+ According to the state equations expressed in In (4)-(5), the
375
+ flexible load queue backlog in each time interval t is equal to
376
+ customer i at time k by qj (k). Then, the function χk is given
377
+ by
378
+ χk(j, i, Z) = qi
379
+ j(k), χk(j, st, Z) = qst
380
+ j (k)
381
+ (8)
382
+ Given these definitions, the matching problem for the distri-
383
+ bution system is given by the following optimization problem
384
+ Fig. 2. Illustration of utility function for different values of b.
385
+ willingness to pay. This model captures a variety of customers
386
+ in the market, where customers’ willingness to pay can remain
387
+ fixed or decay with time and at distinct rates. As the number
388
+ of customers is finite in real markets, the number of customers
389
+ arriving on the platform at any time t, nt ∈ N, is assumed to
390
+ be upper bound by a constant n.
391
+ C. IHR Market State
392
+ Let zt
393
+ :=
394
+ [a⊤
395
+ t , p⊤
396
+ t , b⊤
397
+ t , d⊤
398
+ t , rt]1 be the vector of state
399
+ parameters, where at ∈ Nn is the vector of the arrival times of
400
+ the customers which arrive at time t, pt ∈ Nn is the vector of
401
+ their respective requested loads, bt ∈ [0, 1] is the criticality rate
402
+ of customer at time t, dt ∈ Nn is the vector of their respective
403
+ deadlines, and rt ∈ R is the amount of RES generation at time
404
+ t. The scenario at time t is given by
405
+ Z⊤
406
+ t = [z⊤
407
+ 1 , z⊤
408
+ 2 , ..., z⊤
409
+ t−1, z⊤
410
+ t ].
411
+ The probability that zt = z is given by the stochastic process
412
+ modeled by P (zt = z|Zt−1). This process is not known to
413
+ the market operator. Let xt := [a⊤
414
+ t , p⊤
415
+ t , b⊤
416
+ t , d⊤
417
+ t , p⊤
418
+ u,t, b⊤
419
+ u,t, rt],
420
+ where pu,t denotes the vector of the portion of the requested
421
+ load that has not been served to the customers who arrived at
422
+ t and expressed the criticality b⊤
423
+ u,t. Let denote the set of all
424
+ possible states at time t by Ωt and the state of the market by
425
+ Xt. Then Xt is given by
426
+ X⊤
427
+ t = [x⊤
428
+ 1 , x���
429
+ 2 , ..., x⊤
430
+ t−1, x⊤
431
+ t ].
432
+ Note that the state Xt depends on the scenario Zt and the
433
+ matching decisions till time t − 1. Given that the state of the
434
+ market evolves, the matching solution will have to be able to
435
+ adapt to the changing market state.
436
+ D. Matching Market for Integrated Hybrid Resources
437
+ This part formulates the IHR-level dynamic matching mar-
438
+ ket problem for a duration of T, divided into time periods
439
+ spaced equally at an interval ∆t. The IHR-level dynamic
440
+ matching market problem aims to match the load request
441
+ of flexible and inflexible customers to maximize the social
442
+ welfare in IHR h subject to satisfying the supply-demand
443
+ balance constraint for non-flexible loads and the quality of
444
+ service constraints for flexible loads arriving sequentially. Let
445
+ define Ah,t as the set of all active customers at time t and IHR
446
+ h and define Sh,t = {g, s} as the set of supply types. The IHR
447
+ agent, at each time, can decide to match and supply or skip the
448
+ load requests. Let define pi
449
+ h,t as the skipped and unsupplied
450
+ 1[.]⊤ denotes the transpose operation.
451
+ load request of the customer i and Mh,t(j, i, Xt) ∈ R define
452
+ the amount of supply of type j matched to customer i at time
453
+ t and IHR h, at the unit cost of ch,t. The matching market
454
+ problem can be then stated as:
455
+ sup
456
+ T
457
+
458
+ t=1
459
+
460
+ i∈Ah,t
461
+
462
+ j∈Sh,t
463
+ (πi
464
+ h,t − ch,j)Mh,t(j, i, Xt), s.t.
465
+ (3)
466
+
467
+ j∈Sh,t
468
+ Mh,t(j, i, Xt) ≤ pi
469
+ h,t, ∀h ∈ H, ∀i ∈ Ah
470
+ t , t ̸= di
471
+ h,
472
+ (4)
473
+
474
+ j∈Sh,t
475
+ Mh,t(j, i, Xt) = pi
476
+ h,t, ∀h ∈ H, ∀i ∈ Ah,t, t = di
477
+ h, (5)
478
+
479
+ i∈Ah,t
480
+ Mh,t(r, i, Xt) ≤ rp
481
+ h,t, ∀h ∈ H, ∀t.
482
+ (6)
483
+ pNet
484
+ h,t =
485
+
486
+ i∈Ah,t
487
+ Mh,t(g, i, Xt), ∀h ∈ H, ∀t,
488
+ (7)
489
+ where the dependency of Mt on Xt accounts for the depen-
490
+ dency of the matching decision on the full state information in
491
+ each IHR. Here, the power balance constraint for the flexible
492
+ loads is given in (4). The power balance for the non-flexible
493
+ loads and the critical flexible loads at their departure (t=di
494
+ h)
495
+ is given in (5). The constraint (6) limits the matching power
496
+ from RES to the active power output of RES rp
497
+ h,t. Finally,
498
+ the net active power flow exchanged between the IHR and
499
+ upstream grid, pNet
500
+ h,t , is given by (7).
501
+ The output of the above problem is a matching policy M1:T
502
+ for the entire duration of a day. Because of the interdependence
503
+ across time, the optimal policy Mt is dependent on the load
504
+ arrivals and RES generation for the full day. This makes
505
+ the computation of the optimal policy through the above
506
+ approach infeasible in real-time operation. There are also no
507
+ known explicit characterizations for Mt. This is what makes
508
+ approaches like DRL very appealing, since they are general-
509
+ purpose methods that can be used to discover state-dependent
510
+ policies, such as Mt, from just operational data. Therefore, we
511
+ use a DRL algorithm to compute the matching decisions. The
512
+ proposed DRL model for a specific IHR is designed to output
513
+ a matching decision at any point of time depending on the
514
+ market state of the IHR. The DRL framework for the IHRs
515
+ matching is described in the next section.
516
+ Once the matching decisions are computed by the IHRs,
517
+ the agent determines the net active power flow, i.e., the active
518
+ power to be taken or injected from and to the upstream grid,
519
+ as well as the reactive power limits of its zone to the central
520
+ agent. The reactive power limits are utilized by the central
521
+ agent to adjust the nodal reactive power demands such that
522
+ the constraint (1) is satisfied. The reactive power limits for
523
+ each IHR, denoted by qNet
524
+ h,t
525
+ and qNet
526
+ h,t , are obtained through
527
+ (8)-(10):
528
+ rq
529
+ h,t=−
530
+
531
+ rs
532
+ h,t
533
+ 2−rp
534
+ h,t
535
+ 2 ,
536
+ rq
537
+ h,t=
538
+
539
+ rs
540
+ h,t
541
+ 2−rp
542
+ h,t
543
+ 2, ∀h∈H,∀t, (8)
544
+ qNet
545
+ h,t =
546
+
547
+ i∈Ah,t
548
+ qi
549
+ h,t − rq
550
+ h,t,
551
+ ∀h ∈ H, ∀t,
552
+ (9)
553
+ qNet
554
+ h,t =
555
+
556
+ i∈Ah,t
557
+ qi,
558
+ h,t − rq
559
+ h,t,
560
+ ∀h ∈ H, ∀t,
561
+ (10)
562
+
563
+ 5
564
+ where rq
565
+ h,t, rq
566
+ h,t are the minimum and maximum reactive
567
+ power output of RES, rs
568
+ h,t is the available RES generation and
569
+ the term qi
570
+ h,t represents the reactive power load of the IHR,
571
+ determined based on the non-flexible reactive power load and
572
+ matched power to flexible loads.
573
+ E. Reduced-Dimension Optimal Power Flow
574
+ This section describes the reduced-dimension OPF problem
575
+ solved by the central agent to determine the final flows for the
576
+ nodes in the network to deliver the matched power to the extent
577
+ it does not violate the grid constraints. The agent specifically
578
+ solves a quadratic optimization model with the IHRs as the
579
+ nodes, where the constraints are the power flow constraints
580
+ with the active power flow demand and reactive power limits
581
+ of the IHRs, and the voltage limit constraints, defined based on
582
+ (1). The voltage limit constraints ensure that the final flows are
583
+ consistent with the matched power in each of the IHRs. The
584
+ central agent also curtails the active power flow demand by ph
585
+ C
586
+ to the extent that the flow constraints are satisfied. The central
587
+ agent’s objective function, which is the distribution system
588
+ cost, is given in (11):
589
+ min
590
+
591
+ λRT P G−
592
+ H
593
+
594
+ h=1
595
+ λCpC
596
+ h
597
+
598
+ ,
599
+ (11)
600
+ where P G is the active power taken from the transmission
601
+ system at the real-time market price λRT and pC
602
+ h is the active
603
+ load request curtailment with the unit cost of λC.
604
+ 1) Power Balance Constraints: The active and reactive
605
+ energy balance equations for the slack buses in the distribution
606
+ system are given in (12)-(13), where P1h, Q1h are the active
607
+ and reactive power flows from the substation bus to the IHR
608
+ h, V sq
609
+ 1
610
+ is the squared voltage on the substation bus, g1, b1 are
611
+ the shunt conductance and susceptance at the substation bus
612
+ and L is the set of lines in the distribution grid.
613
+ P G =
614
+
615
+ 1h∈L
616
+ P1h + g1V sq
617
+ 1 ,
618
+ (12)
619
+ QG =
620
+
621
+ 1h∈L
622
+ Q1h + b1V sq
623
+ 1 .
624
+ (13)
625
+ The energy balance constraints for the IHR nodes are
626
+ presented in (14)-(15), where pNet
627
+ h
628
+ is the net active power
629
+ flow submitted by the IHR, Phh′′, Ph′h and Qhh′′, Qh′h are
630
+ the active and reactive power flows in lines hh′′ and h′h, V sq
631
+ h
632
+ is the squared voltage on IHR node h, Isq
633
+ h′h is the squared
634
+ current flow in line h′h, and rh′h, xh′h are the resistance and
635
+ reactance of the line h′h and gh, bh are the shunt conductance
636
+ and susceptance at the IHR node h. In the active power balance
637
+ constraint, the curtailment pC
638
+ h ensures that the final net active
639
+ power flow is consistent with the power flow constraints. Here,
640
+ the curtailment is only made to the extent that the constraints
641
+ are satisfied. The reactive power flow of the IHRs, denoted by
642
+ qNet
643
+ h
644
+ , is limited to the reactive power limits of IHRs in (16).
645
+ Phh′′ +pNet
646
+ h
647
+ −pC
648
+ h =
649
+
650
+ h′h∈L
651
+ (Ph′h−rh′hIsq
652
+ h′h)+ghV sq
653
+ h , ∀h∈B, (14)
654
+ Qhh′′ + qNet
655
+ h
656
+ =
657
+
658
+ h′h∈L
659
+ (Qh′h− xh′hIsq
660
+ h′h)+ bhV sq
661
+ h , ∀h ∈ B, (15)
662
+ qNet
663
+ h
664
+ ≤ qNet
665
+ h
666
+ ≤ qNet
667
+ h
668
+ , ∀h.
669
+ (16)
670
+ 2) Voltage and Power Flow Limits: The voltage drop across
671
+ the grid is given by (17). The limits on the squared voltage
672
+ level and the limits on the current flow are given in Eq. (18)
673
+ and Eq. (19), where V sq
674
+ h , V
675
+ sq
676
+ h are the minimum and maximum
677
+ squared voltage boundaries, defined based on the nominal node
678
+ voltage and δ in (1) and I
679
+ sq
680
+ h′h is the squared current flow limit.
681
+ Finally, the complex power flow constraint is given in (20).
682
+ V sq
683
+ h − V sq
684
+ h′ = −2 (rh′hPh′h + xh′hQh′h)
685
+ +
686
+
687
+ r2
688
+ h′h + x2
689
+ h′h
690
+
691
+ Isq
692
+ h′h,
693
+ ∀(h′h) ∈ L,
694
+ (17)
695
+ V sq
696
+ h ≤ V sq
697
+ h
698
+ ≤ V
699
+ sq
700
+ h ,
701
+ ∀h ∈ B,
702
+ (18)
703
+ Isq
704
+ h′h ≤ I
705
+ sq
706
+ h′h,
707
+ ∀(h′h) ∈ L,
708
+ (19)
709
+ V sq
710
+ h,tIsq
711
+ h′h ≥ P 2
712
+ h′h + Q2
713
+ h′h,
714
+ ∀(h′h) ∈ L.
715
+ (20)
716
+ Any feasible solution to the online OPF problem in (11)-
717
+ (20) ensures the matched power in each of the IHRs is
718
+ delivered to the extent the flow and voltage constraints are
719
+ met. In case a solution is feasible without any curtailment,
720
+ then the matched power will be delivered to the customers.
721
+ III. DEEP REINFORCEMENT LEARNING FOR IHRS
722
+ In the proposed hierarchical framework, each IHR agent
723
+ is endowed with a trainable policy that outputs a probability
724
+ distribution over the set of matching decisions for the flexible
725
+ loads and RES with the IHR. A policy gradient RL algorithm
726
+ is applied to train the matching policy given the load and
727
+ generation data for multiple instances of the market. This
728
+ algorithm does not require supervision or expert knowledge as
729
+ it measures its own performance for the training process. The
730
+ following subsections briefly discuss the matching policy’s
731
+ structure for an IHR and then the learning algorithm. Note
732
+ that the expectation with respect to all sources of randomness
733
+ is denoted by E[.]. It is implicit that all the descriptions in this
734
+ section are confined to a single IHR.
735
+ A. General Discrete Matching Policy
736
+ Each IHR agent in the proposed study learns an online
737
+ matching policy given by χ = {χ1, χ2, χ3, ..., χT }. The
738
+ discrete matching policy for time t, denoted by χt, indicates
739
+ whether a customer is to be matched to a supply or not,
740
+ regardless of the amount of matching. Let define Mt as the
741
+ space of discrete matching at time t. Each component in this
742
+ set m ∈ Mt, is a feasible discrete matching that specifies
743
+ whether a customer is matched or not (i.e., mi,k ∈ {0, 1} with
744
+ one indicating “matched” and zero indicating “not matched”).
745
+ Hence, the general matching policy χt can be given by:
746
+ χt : Ωt → Mt.
747
+ Aside from the fact that the matching problem is an
748
+ online decision-making procedure with a future ridden with
749
+ uncertainties, there are still several general challenges from
750
+ an RL point of view. Firstly, the action space of the matching
751
+ problem is large and specifically exponential in the number
752
+ of customers. For example, if there are m supplies and n
753
+ customers, then there are mn ways of matching; thus it is
754
+
755
+ 6
756
+ exponential in the number of active customers. Secondly,
757
+ not all the actions from this space are feasible as supply
758
+ unavailability might limit the matching decisions. There might
759
+ also be some restrictions enforced by the customers servicing
760
+ constraints. Hence, some actions are infeasible, and their
761
+ infeasibility is state-dependent. Thirdly, RL algorithms can
762
+ converge to a local optimum, a general challenge that applies
763
+ to the matching problem. Therefore, the goal is to develop
764
+ a framework based on RL that is simple and efficient to
765
+ learn, simultaneously satisfies the action constraints, and can
766
+ converge to a good solution. The proposed framework in this
767
+ paper simplifies the output of the policy to be trained by RL
768
+ to just “match” or “not to match” for each active customer,
769
+ regardless of the supply type and action feasibility. Thus, the
770
+ action space of the output of the component that is trained
771
+ is linear in the number of active consumers. Further details
772
+ regarding the proposed matching policy are given below.
773
+ B. Proposed Matching Policy
774
+ The proposed discrete matching policy is characterized by
775
+ a learnable and fixed component [6]. The first component, de-
776
+ noted by µt, determines the probability of matching customers,
777
+ and the latter makes sure that the customers are matched before
778
+ their deadline. Let PMt be the space of probability measures
779
+ over the set Mt. Then, the policy µt can be defined:
780
+ µt : Ωt → PMt.
781
+ Let mt ∈ Mt be given by mt ∼ µt. The component of mt
782
+ corresponding to the customer i is defined by mi,t, where
783
+ mi,t ∈ {0, 1}. The output mi is input to a second function, ϕ.
784
+ The function ϕ matches the customers with mi,t = 1 to the
785
+ available RES in each IHR. When total matching implied by
786
+ the discrete matching is in excess of the RES, the remaining
787
+ customers with mi,t = 1 are matched to the grid supply. When
788
+ total matching implied by the discrete matching is less than the
789
+ available RES, the excess RES generation is assigned to the
790
+ remaining customers. Denote the component of ϕ that specifies
791
+ whether customer i is matched to supply type j by ϕj,i.
792
+ The output ϕj,i is input to a third function, ν, that overturns
793
+ the matching decision for the customers with an immediate
794
+ deadline and ensures that the flexible customers in IHRs are
795
+ served by their deadline:
796
+ νj,i =
797
+
798
+
799
+
800
+ 1
801
+ if di = t, i is active, ϕs,i = 0 ∀s
802
+ and j = g,
803
+ ϕj,i
804
+ otherwise.
805
+ Thus, the overall discrete matching policy for time t, χt, is
806
+ given by:
807
+ χt = ν ◦ ϕ ◦ mt, mt ∼ µt.
808
+ (21)
809
+ The proposed policy is parameterized by θt, where the pa-
810
+ rameterization is denoted by µt(.; θt). The learning algorithm,
811
+ presented next, uses the observations from load and generation
812
+ data of the IHR and trains θt for every time step t by evaluating
813
+ its own performance.
814
+ C. Policy Gradient Learning Algorithm
815
+ This part describes the proposed policy gradient learning
816
+ algorithm. EXt∼Pt(.) is used as a shorthand for expectation
817
+ over Xt ∼ P(.|Xt−1, χt−1), where P(.|Xt−1, χt−1) denotes
818
+ the transition probability from state Xt−1 under the pol-
819
+ icy χt−1. Let mt:T
820
+ = {mt, ml+1, ..., mT } and µl:T
821
+ =
822
+ {µt, µl+1, ..., µT }. Denoting Em∼µ as a shortened form of
823
+ Emt+1:T ∼µt+1:T , the market welfare can be defined as:
824
+ V χ
825
+ t+(Xt+1):=Em∼µ
826
+ T
827
+
828
+ l=t+1
829
+
830
+ j
831
+
832
+ k∈At
833
+ (πi
834
+ l − cj)χt,j,i(Xt).
835
+ (22)
836
+ Let:
837
+
838
+ t :=
839
+
840
+ j
841
+
842
+ i∈At
843
+ (πi
844
+ l − cj)χt,j,i(Xt),
845
+ (23)
846
+ V χ
847
+ t (Xt|mt) := vχ
848
+ t + EXt+1∼Pt+1(.)
849
+
850
+ V χ
851
+ t+(Xt+1)
852
+
853
+ .
854
+ (24)
855
+ Then, from the definitions of Vχ and V χ
856
+ t (Xt), the gradient
857
+ of the value function with respect to the policy parameter θt
858
+ can be calculated as follows:
859
+ ∂Vχ
860
+ ∂θt
861
+ = EXt
862
+ �∂V χ
863
+ t (Xt)
864
+ ∂θt
865
+
866
+ ,
867
+ (25)
868
+ ∂Vχ
869
+ ∂θt
870
+ = EXt
871
+
872
+ mt∈Ht
873
+ ∂µt(mt; θt)
874
+ ∂θt
875
+ [vχ
876
+ t
877
+ +EXt+1∼Pt+1(.)V χ
878
+ t+(Xt+1)
879
+
880
+ .
881
+ (26)
882
+ The gradient of the value function with respect to the policy
883
+ parameter derived in (25)-(26) can be written as follows:
884
+ ∂Vχ
885
+ ∂θt
886
+ = EXt,mt∼µt
887
+ �∂ log µt(mt; θt)
888
+ ∂θt
889
+ V χ
890
+ t (Xt|mt)
891
+
892
+ ,
893
+ (27)
894
+ where an unbiased estimate of this relationship can defined as
895
+ follows:
896
+ δθ
897
+ t =
898
+ �∂ log µt(mt; θt)
899
+ ∂θt
900
+ V χ
901
+ t (Xt|mt)
902
+
903
+ .
904
+ (28)
905
+ Since the term V χ
906
+ t (Xt|mt) is unknown, the gradient in (28)
907
+ is not computable. Therefore, this term is replaced with the
908
+ social welfare from t to T for a sample epoch under policy χ:
909
+ δθ
910
+ t,r = ∂ log µt(mt; θt)
911
+ ∂θt
912
+ � T
913
+
914
+ l=t
915
+
916
+ l
917
+
918
+ ,
919
+ (29)
920
+ where the gradient is computable using the data from a sample
921
+ epoch (Z = {Z1, Z2, ..., ZT }) and matching decisions under
922
+ the policy χ for the same epoch. Furthermore, the gradient
923
+ estimate is unbiased as
924
+ ∂Vχ
925
+ ∂θt
926
+ = E[δθ
927
+ t,r]. The vanilla policy
928
+ gradient learning algorithm learns the policy parameter θt for
929
+ each time step using the following stochastic gradient ascent
930
+ algorithm:
931
+ θt+1 ← θt + γθδθ
932
+ t,r,
933
+ (30)
934
+ where θt is updated using the computed gradient δθ
935
+ t,r for
936
+ multiple sample epochs in every update step.
937
+ In addition to the vanilla policy gradient learning algorithm
938
+ described above, the actor-critic algorithm AC−k is also
939
+ proposed for the dynamic matching of IHRs. This algorithm
940
+ learns both the matching policy µ and an approximation of
941
+
942
+ 7
943
+ value function V χ
944
+ t (Xt). This function, which is also called
945
+ the critic function, is parameterized by φk and expressed by
946
+ V χ
947
+ k (Xk; φk). Hence, the approximate policy gradient for the
948
+ actor-critic algorithm AC−k can be defined as follows:
949
+ δθ
950
+ t,k = ∂ log µt(mt; θt)
951
+ ∂θt
952
+ �t+k−1
953
+
954
+ l=t
955
+
956
+ l + V χ
957
+ t+k(Xt+k; φt+k)
958
+
959
+ ,
960
+ (31)
961
+ where the policy parameters are learned using the following
962
+ stochastic gradient ascent algorithm in (32) and similarly the
963
+ parameter φk of the critic function is learned by stochastic
964
+ gradient descent for its least-squares error in (33).
965
+ θt+1 ← θt + γθδθ
966
+ t,k,
967
+ (32)
968
+ φk+1 ← φk − γφ
969
+
970
+ V χ
971
+ k (.; φk) −
972
+ T
973
+
974
+ l=k
975
+
976
+ l
977
+
978
+ .
979
+ (33)
980
+ Further details regarding the actor-critic algorithm are given
981
+ in Algorithm 1, where the ADAM gradient algorithm of the
982
+ gradient updates in (32) and (33) is implemented.
983
+ Algorithm 1 Actor-Critic (AC−k) Policy Gradient Learn-
984
+ ing Algorithm for an IHR
985
+ 1) Initialize D = ∅, j = 0
986
+ 2) Initialize θk ∀ k ∈ [1, ..., T]. N: number of epochs
987
+ 3) for i = 1 : N
988
+ a) j = j + 1
989
+ b) Set Di = {{Xk, mk, vχ
990
+ k } ∀ k ∈ [1, ..., T]}
991
+ c) Include Di into D
992
+ d) if j == M
993
+ Update θk by ADAM of Eq. (32) using D
994
+ Update φk by ADAM of Eq. (33) using D
995
+ j = 0; D = ∅
996
+ end
997
+ end
998
+ 4) end
999
+ The matching policy in the proposed study is trained
1000
+ with the Temporal Convolution Network (TCN), denoted
1001
+ by TCNµ. Let
1002
+ ˜Xt denote the input sequence to the TCN
1003
+ at each time step, where
1004
+ ˜X⊤
1005
+ t
1006
+ = [˜x⊤
1007
+ 1 , ˜x⊤
1008
+ 2 , ˜x⊤
1009
+ 3 , ..., ˜x⊤
1010
+ t ], and
1011
+ ˜xt = [a⊤
1012
+ t , p⊤
1013
+ t , b⊤
1014
+ t , d⊤
1015
+ t , p⊤
1016
+ u,t, b⊤
1017
+ u,t, rt]. The vector of matching
1018
+ probabilities P m
1019
+ µ
1020
+ ∈ [0, 1]n×T as the output of TCN can be
1021
+ determined as P m
1022
+ µ = TCNµ( ˜Xt). The output of TCN in the
1023
+ proposed study is fixed and capped at the maximum number
1024
+ of active customers at any time, n × T. Let P m
1025
+ µ,i denote the
1026
+ probability of matching for the active customer i at time step
1027
+ t. Hence, the distribution µt is constructed as:
1028
+ P(mt,i = 1) = P m
1029
+ µ,i, P(mt,i = 0) = 1 − P m
1030
+ µ,i.
1031
+ IV. SIMULATIONS AND RESULTS
1032
+ The proposed hierarchical matching framework is imple-
1033
+ mented on the IEEE 33-bus test distribution system using the
1034
+ 30-minute real-time California Independent System Operator
1035
+ (CAISO) load and solar generation data from January 1, 2021
1036
+ to September 28, 2021. The distribution system is divided
1037
+ into 5 IHRs, each consisting of a learning agent to control
1038
+ and match DERs with flexible loads. The structure of the
1039
+ distribution system with IHRs is shown in Fig. 3, where
1040
+ the electric vehicle (EV) charging stations supply charging
1041
+ requests of 6.6 kWh to 24 EVs in IHR 1, 30 EVs in IHR
1042
+ 2, 8 EVs in IHR 3 and 30 EVs in each one of IHRs 4 and
1043
+ 5. The CAISO solar power data is scaled to the inverter’s
1044
+ nominal capacity of 105 kW in IHR 1, 150 kW in IHR 2, 45
1045
+ kW in IHR 3, and 150 kW in each one of IHRs 4 and 5. The
1046
+ distribution system active and reactive loads are scaled to 50 %
1047
+ of their nominal rates, 3715 kW and 2300 kVAr, respectively.
1048
+ The electricity tariff is assumed to be 120 $/MWh, and the
1049
+ curtailment penalty for the central agent is assumed to be 500
1050
+ $/MWh. To validate the efficiency of the proposed hierarchical
1051
+ framework, the following scenarios are considered:
1052
+ • Scenario 1: This is a scenario where the EVs are char-
1053
+ acterized by earlier arrival times and longer departure
1054
+ times. In this scenario, waiting to match will fetch higher
1055
+ welfare. This scenario tests the capability of the IHR
1056
+ agents to learn to let the customers wait in the market
1057
+ and not match them immediately upon their arrival.
1058
+ • Scenario 2: This is a scenario where the EVs are charac-
1059
+ terized by moderate arrival and longer departure times. In
1060
+ this scenario, waiting may not result in improved welfare.
1061
+ Here, a strategy that partially waits and partially matches
1062
+ upon arrival might be needed. This scenario tests the
1063
+ capability of the algorithm to learn such hybrid strategies.
1064
+ For illustration, two matching algorithms are considered,
1065
+ one is the Learning Algorithm (LA) described in Section III,
1066
+ and the other is the standard matching heuristic, Matching on
1067
+ Arrival (MA). These matching algorithms are implemented in
1068
+ scenarios 1 and 2 under the following market models:
1069
+ • Centralized Model: In this model, a single agent manages
1070
+ the matching of the whole distribution system.
1071
+ • Decentralized Model: In this model, the distribution sys-
1072
+ tem is divided into multiple IHRs as described earlier,
1073
+ with each IHR employing a separate matching algorithm.
1074
+ The central agent solves the reduced-dimension OPF
1075
+ model described earlier to meet the respective IHRs flow
1076
+ requirements and ensure that the grid constraints are met.
1077
+ This model with the learning algorithm is the proposed
1078
+ hierarchical framework.
1079
+ The best hyper-parameters for the TCN model were iden-
1080
+ tified to be 3 for the number of blocks, 4 for the number
1081
+ of filters, 3 for the filter size, 0.1 for the dropout factor,
1082
+ and 4 for the dilation factor. Sigmoid function is utilized
1083
+ as the activation function for each output of TCN and the
1084
+ following values are considered as the parameters of the
1085
+ ADAM algorithm: α = [0.25, 0.99], β1 = 0.9, β2 = 0.999,
1086
+ ϵ = 10−8, where α is the learning rate and β1, β2 are
1087
+ exponential decay rates for the moment estimates. The best
1088
+ batch size for the LA is 20.
1089
+ A. Numerical Results
1090
+ The average social welfare achieved in scenarios 1 and 2
1091
+ for the centralized and decentralized models is summarized in
1092
+ Table I. In scenario 1, it can be seen that the MA algorithm
1093
+ achieves a welfare of 17.98$ and 16.17$ in both the centralized
1094
+
1095
+ 8
1096
+ 1
1097
+ 2
1098
+ 3
1099
+ 4
1100
+ 5
1101
+ 6
1102
+ 7
1103
+ 8
1104
+ 9
1105
+ 10 11
1106
+ 12 13
1107
+ 14
1108
+ 15
1109
+ 16
1110
+ 17
1111
+ 18
1112
+ 19
1113
+ 20
1114
+ 21
1115
+ 22
1116
+ 23
1117
+ 26
1118
+ 27 28
1119
+ 29
1120
+ 30
1121
+ 31
1122
+ 32
1123
+ 33
1124
+ 24
1125
+ 25
1126
+ L1
1127
+ L2
1128
+ L3
1129
+ L4
1130
+ L5
1131
+ L6
1132
+ L7
1133
+ L8
1134
+ L9
1135
+ L10 L11
1136
+ L12
1137
+ L13
1138
+ L14
1139
+ L15
1140
+ L16
1141
+ L17
1142
+ L23
1143
+ L24
1144
+ L26
1145
+ L27 L28
1146
+ L29 L30
1147
+ L31
1148
+ L32
1149
+ L18
1150
+ L19
1151
+ L20
1152
+ L21
1153
+ L22
1154
+ L25
1155
+ IHR 4
1156
+ IHR 5
1157
+ IHR 1
1158
+ IHR 3
1159
+ IHR 2
1160
+ Fig. 3.
1161
+ Structure of the 33-bus power distribution system, divided into 5
1162
+ integrated hybrid resources.
1163
+ TABLE I
1164
+ AVERAGE SOCIAL WELFARE ($)
1165
+ Algorithm
1166
+ Scenario
1167
+ Centralized Model
1168
+ Decentralized Model
1169
+ LA
1170
+ Scenario1
1171
+ 218.59
1172
+ 232.70
1173
+ Scenario2
1174
+ 866.33
1175
+ 893.52
1176
+ Average
1177
+ 542.46
1178
+ 563.11
1179
+ MA
1180
+ Scenario1
1181
+ 17.98
1182
+ 16.17
1183
+ Scenario2
1184
+ 742.75
1185
+ 808.20
1186
+ Average
1187
+ 380.365
1188
+ 412.185
1189
+ and decentralized models, while the LA algorithm achieves
1190
+ a higher welfare of 218.59$ and 232.7$ in the centralized
1191
+ and decentralized models respectively. This shows that the LA
1192
+ algorithm leverages the flexibility better to match the excess
1193
+ RES during the middle of the day. In scenario 2, the results
1194
+ reveal that the optimal matching policy is not to match all
1195
+ the loads on their arrival but to only match the critical ones
1196
+ on their arrival, so as to efficiently utilize the RES that is
1197
+ available during the middle of the day. In this scenario, the
1198
+ LA algorithm is the top-performing, achieving a social welfare
1199
+ of 866.33$ and 893.52$ in the centralized and decentralized
1200
+ models, followed by the MA algorithm, which achieves a
1201
+ social welfare of 742.75$ and 808.2$ in the centralized and
1202
+ decentralized models, respectively.
1203
+ Comparing the performance of LA and MA algorithms in
1204
+ the centralized and decentralized models, it can be seen that
1205
+ the decentralized model with the learning algorithm is the best
1206
+ performing, substantiating the efficacy of our approach. Table
1207
+ II summarizes the social welfare achieved by LA and MA
1208
+ in the decentralized matching model. Comparing the social
1209
+ welfare, it can be found that the LA algorithm outperforms the
1210
+ MA algorithm in each of the IHRs, showing the superiority
1211
+ of the learning-based approach.
1212
+ TABLE II
1213
+ AVERAGE SOCIAL WELFARE IN THE DECENTRALIZED MODEL ($)
1214
+ Algorithm
1215
+ Model
1216
+ IHR1
1217
+ IHR2
1218
+ IHR3
1219
+ IHR4
1220
+ IHR5
1221
+ LA
1222
+ Scenario1
1223
+ 41.65
1224
+ 55.06
1225
+ 12.3
1226
+ 60.02
1227
+ 63.67
1228
+ Scenario2
1229
+ 184.15
1230
+ 216.67
1231
+ 49.47
1232
+ 221.36
1233
+ 221.87
1234
+ Average
1235
+ 112.9
1236
+ 135.865
1237
+ 30.885
1238
+ 140.69
1239
+ 142.77
1240
+ MA
1241
+ Scenario1
1242
+ 3.06
1243
+ 3.89
1244
+ 1.02
1245
+ 4.164
1246
+ 4.04
1247
+ Scenario2
1248
+ 163.08
1249
+ 202.4
1250
+ 43.53
1251
+ 199.46
1252
+ 199.73
1253
+ Average
1254
+ 83.07
1255
+ 103.145
1256
+ 22.275
1257
+ 101.81
1258
+ 101.885
1259
+ B. Matching Market Analysis
1260
+ This section analyzes the performance of the matching
1261
+ algorithms under the centralized and decentralized matching
1262
+ markets in scenarios 1 and 2.
1263
+ 1) Scenario 1: EVs with Earlier Arrival and Longer Depar-
1264
+ ture Times: In this scenario, the flexible loads are character-
1265
+ ized by earlier arrival and longer departure (deadline) times,
1266
+ the RES generation is available during the middle of the day.
1267
+ Thus, the market operator (agent) can queue the load requests
1268
+ and match them to the RES available during the middle of
1269
+ the day. The matching by the LA and MA of IHR 2 in this
1270
+ scenario is shown in Fig. 4. The results clearly show that MA
1271
+ fails to wait to avail the RES during the middle of the day, and
1272
+ instead matches the loads to the grid supply. On the contrary,
1273
+ the LA learns to queue the non-critical loads and shift them
1274
+ to the periods where RES generation is available.
1275
+ -40
1276
+ -20
1277
+ 0
1278
+ 20
1279
+ 40
1280
+ 60
1281
+ 80
1282
+ 100
1283
+ 1
1284
+ 21
1285
+ 41
1286
+ 61
1287
+ 81
1288
+ 101
1289
+ 121
1290
+ 141
1291
+ 161
1292
+ 181
1293
+ 201
1294
+ 221
1295
+ Social Welfare ($)
1296
+ Epoch
1297
+ Average: LA
1298
+ Average: MA
1299
+ Actual: LA
1300
+ Actual: MA
1301
+ Fig. 4. Average and actual social welfare of LA and MA for IHR 2 under
1302
+ scenario 1.
1303
+ Figure 5 shows the matching market results for the LA of
1304
+ IHR 2 for a representative epoch of scenario 1. In Fig. 5,
1305
+ the initial load request of critical loads is supplied using the
1306
+ grid power, while a significant portion of non-critical loads
1307
+ is shifted to the middle of the day and matched to the RES
1308
+ generation, indicating the efficacy of the fixed and trainable
1309
+ components of the matching policy to match flexible loads
1310
+ with RES, while satisfying the quality of service constraints of
1311
+ the loads. This is evident in Fig. 5, where all the requested load
1312
+ is supplied without any curtailment and the RES generation
1313
+ is efficiently allocated to supply the queued flexible loads and
1314
+ the non-flexible loads when the flexible loads are unavailable.
1315
+ 0
1316
+ 30
1317
+ 60
1318
+ 90
1319
+ 120
1320
+ 150
1321
+ 180
1322
+ 210
1323
+ 0
1324
+ 2
1325
+ 4
1326
+ 6
1327
+ 8
1328
+ 10
1329
+ 12
1330
+ 14
1331
+ 16
1332
+ 18
1333
+ 20
1334
+ 22
1335
+ Matching Results (kW)
1336
+ Time (h)
1337
+ RES Generation
1338
+ Matched Flexible Load to RES
1339
+ Matched Flexible Load to Grid
1340
+ Curtailed Flexible Load
1341
+ Matched Non-Flexible Load to RES
1342
+ Curtailed RES Generation
1343
+ Requested Flexible Load
1344
+ Total Supplied Flexible Load
1345
+ Fig. 5. Matching market results for LA of IHR 2 for a representative epoch
1346
+ of scenario 1.
1347
+
1348
+ 9
1349
+ The performance of the decentralized and centralized mod-
1350
+ els with LA is compared in Fig. 6. As shown, the centralized
1351
+ model obtains higher welfare in the initial epochs, but the
1352
+ decentralized model achieves a higher average social welfare
1353
+ with experience.
1354
+ -30
1355
+ 0
1356
+ 30
1357
+ 60
1358
+ 90
1359
+ 120
1360
+ 150
1361
+ 180
1362
+ 210
1363
+ 240
1364
+ 1
1365
+ 21
1366
+ 41
1367
+ 61
1368
+ 81
1369
+ 101
1370
+ 121
1371
+ 141
1372
+ 161
1373
+ 181
1374
+ 201
1375
+ 221
1376
+ Average Social Welfare ($)
1377
+ Epoch
1378
+ IHR 1
1379
+ IHR 2
1380
+ IHR 3
1381
+ IHR 4
1382
+ IHR 5
1383
+ Centralized
1384
+ Fig. 6. Average social welfare of decentralized and centralized models with
1385
+ LA in scenario 1.
1386
+ 2) Scenario 2: EVs with Moderate Arrival and Longer
1387
+ Departure Times: In this scenario, the flexible loads are
1388
+ characterized by moderate arrival and longer departure times
1389
+ and the RES generation is available during the middle of the
1390
+ day. The social welfare achieved by the LA and MA of IHR 5
1391
+ in this scenario is shown in Fig. 7. The results show that both
1392
+ the LA and MA achieve a similar performance. However, as
1393
+ shown, the LA is superior to the MA in that it doesn’t match
1394
+ all the flexible loads on their arrival. This is evident in Fig. 8,
1395
+ where a portion of the load request is shifted from their arrival
1396
+ and matched to the RES generation during the middle of the
1397
+ day. As in the previous scenario, the LA is able to meet the
1398
+ quality of service constraints of the loads and utilize the RES
1399
+ generation, while ensuring that the outcomes are economically
1400
+ efficient.
1401
+ 25
1402
+ 75
1403
+ 125
1404
+ 175
1405
+ 225
1406
+ 275
1407
+ 325
1408
+ 375
1409
+ 1
1410
+ 21
1411
+ 41
1412
+ 61
1413
+ 81
1414
+ 101
1415
+ 121
1416
+ 141
1417
+ 161
1418
+ 181
1419
+ Social Welfare ($)
1420
+ Epoch
1421
+ Average: LA
1422
+ Average: MA
1423
+ Actual: LA
1424
+ Actual: MA
1425
+ Fig. 7. Average and actual social welfare of LA and MA of IHR 5 in scenario
1426
+ 2.
1427
+ C. Distribution System Constraints
1428
+ In the proposed hierarchical matching framework, the cen-
1429
+ tral agent solves a reduced-dimension OPF model with the
1430
+ IHRs as the nodes to deliver the IHR flow requirements while
1431
+ ensuring that the grid constraints are met. The agent can
1432
+ also curtail the flow to each IHR to the extent that the grid
1433
+ constraints are not violated. Figure 9 shows the voltage profiles
1434
+ of IHRs in the decentralized model and scenario 1.
1435
+ 0
1436
+ 100
1437
+ 200
1438
+ 300
1439
+ 400
1440
+ 500
1441
+ 600
1442
+ 0
1443
+ 2
1444
+ 4
1445
+ 6
1446
+ 8
1447
+ 10
1448
+ 12
1449
+ 14
1450
+ 16
1451
+ 18
1452
+ 20
1453
+ 22
1454
+ Matching Results (kW)
1455
+ Time (h)
1456
+ RES Generation
1457
+ Matched Flexible Load to RES
1458
+ Matched Flexible Load to Grid
1459
+ Matched Non-Flexible Load to RES
1460
+ Curtailed Flexible Load
1461
+ Curtailed RES Generation
1462
+ Requested Flexible Load
1463
+ Total Supplied Flexible Load
1464
+ Fig. 8.
1465
+ Matching results for LA of IHR 5 for a representative epoch in
1466
+ scenario 2.
1467
+ 12.5
1468
+ 12.55
1469
+ 12.6
1470
+ 12.65
1471
+ 12.7
1472
+ 1
1473
+ 5
1474
+ 9
1475
+ 13
1476
+ 17
1477
+ 21
1478
+ 25
1479
+ 29
1480
+ 33
1481
+ 37
1482
+ 41
1483
+ 45
1484
+ Voltage Level (kV)
1485
+ Time (h)
1486
+ Substation Bus
1487
+ IHR 1
1488
+ IHR 2
1489
+ IHR 3
1490
+ IHR 4
1491
+ IHR 5
1492
+ Fig. 9. Voltage profiles of IHR nodes in the decentralized model, scenario 1.
1493
+ In this epoch, the lower and upper voltage boundaries of
1494
+ IHRs are respectively V h = [12.37, 12.2, 12.05, 12.08, 12.22]
1495
+ and V h =[12.948, 13.11, 13.25, 13.22, 13.09]. As shown, the
1496
+ voltage level of all IHRs is within the safe lower-bound and
1497
+ upper-bound limits in all the time periods. The extent to which
1498
+ the matching decisions are met in each IHR depends on the
1499
+ power flow in the grid operation, which can be curtailed by
1500
+ the central agent to ensure that the grid constraints are met.
1501
+ Figure 10 shows the matching curtailment of different IHRs
1502
+ in the decentralized model and scenario 1. The results show
1503
+ that the initial IHR-level matching decisions are not curtailed
1504
+ in most of the epochs, though the matching decisions in some
1505
+ initial epochs are curtailed to ensure the safe operation of the
1506
+ power grid.
1507
+ 0
1508
+ 100
1509
+ 200
1510
+ 300
1511
+ 400
1512
+ 500
1513
+ 600
1514
+ 1
1515
+ 21
1516
+ 41
1517
+ 61
1518
+ 81
1519
+ 101
1520
+ 121
1521
+ 141
1522
+ 161
1523
+ 181
1524
+ 201
1525
+ 221
1526
+ Load Curtailment (kWh)
1527
+ Epoch
1528
+ IHR 1
1529
+ IHR 2
1530
+ IHR 3
1531
+ IHR 4
1532
+ IHR 5
1533
+ Fig. 10. Matching curtailment of the central agent in the decentralized model,
1534
+ scenario 1.
1535
+
1536
+ 10
1537
+ V. CONCLUSIONS
1538
+ This paper proposes a learning-based hierarchical frame-
1539
+ work for dynamic matching in power distribution systems.
1540
+ In the proposed framework, the power distribution system is
1541
+ divided into multiple IHRs, each consisting of flexible loads
1542
+ and RES. The IHR agents employ DRL to output an efficient
1543
+ and scalable online matching policy to match the available
1544
+ RES and active customers as the day progresses such that
1545
+ their quality of service constraints are not violated. Once
1546
+ the IHR-level matching decisions are determined, a central
1547
+ agent uses the net active power flow, as well as the reactive
1548
+ power limits of each IHR to formulate a reduced-dimension
1549
+ OPF model to determine the final flows such that the flow
1550
+ requirements of the IHRs are met and the grid constraints are
1551
+ not violated. The hierarchical approach offers a very effective
1552
+ way to combine the ability of DRL to learn state-dependent (or
1553
+ online) matching policies and that of optimization to ensure
1554
+ safe grid operation. The proposed hierarchical framework was
1555
+ implemented on the IEEE 33-bus test distribution system and
1556
+ tested on multiple scenarios with different matching algo-
1557
+ rithms, including the proposed learning algorithm. The results
1558
+ show that the hierarchical framework utilizes the flexible loads
1559
+ better, resulting in higher social welfare compared to the
1560
+ centralized approach that matches across the whole distribution
1561
+ system.
1562
+ REFERENCES
1563
+ [1] “Ferc
1564
+ order
1565
+ no.
1566
+ 2222:
1567
+ A
1568
+ new
1569
+ day
1570
+ for
1571
+ distributed
1572
+ energy
1573
+ resources,”
1574
+ 2020.
1575
+ [Online].
1576
+ Available:
1577
+ https://www.ferc.gov/media/
1578
+ ferc-order-no-2222-fact-sheet
1579
+ [2] K. Oikonomou, M. Parvania, and R. Khatami, “Deliverable energy flex-
1580
+ ibility scheduling for active distribution networks,” IEEE Transactions
1581
+ on Smart Grid, vol. 11, no. 1, pp. 655–664, 2019.
1582
+ [3] ——, “Coordinated deliverable energy flexibility and regulation capacity
1583
+ of distribution networks,” International Journal of Electrical Power &
1584
+ Energy Systems, vol. 123, p. 106219, 2020.
1585
+ [4] D. Muthirayan, M. Parvania, and P. P. Khargonekar, “Online algorithms
1586
+ for dynamic matching markets in power distribution systems,” IEEE
1587
+ Control Systems Letters, vol. 5, no. 3, pp. 995–1000, 2020.
1588
+ [5] M. Majidi, D. Muthirayan, M. Parvania, and P. P. Khargonekar, “Dy-
1589
+ namic matching in power systems using model predictive control,” in
1590
+ 2021 North American Power Symposium (NAPS). IEEE, 2021, pp. 1–6.
1591
+ [6] ——, “Dynamic matching markets in power grid: Concepts and solution
1592
+ using deep reinforcement learning,” arXiv preprint arXiv:2104.05654,
1593
+ 2021.
1594
+ [7] “Unlocking
1595
+ the
1596
+ flexibility
1597
+ of
1598
+ hybrid
1599
+ resources,”
1600
+ 2022.
1601
+ [On-
1602
+ line]. Available: https://www.esig.energy/wp-content/uploads/2022/03/
1603
+ ESIG-Hybrid-Resources-report-2022.pdf
1604
+ [8] “Hybrid resources white paper,” 2021. [Online]. Available: https://www.
1605
+ ferc.gov/sites/default/files/2021-05/white-paper-hybrid-resources.pdf
1606
+ [9] M. Majidi, L. Rodriguez-Garcia, and M. Parvania, “Risk-based operation
1607
+ of power networks with hybrid energy systems,” in 2022 17th Interna-
1608
+ tional Conference on Probabilistic Methods Applied to Power Systems
1609
+ (PMAPS).
1610
+ IEEE, 2022, pp. 1–6.
1611
+ [10] R. Li, X. Yan, and N. Liu, “Hybrid energy sharing considering network
1612
+ cost for prosumers in integrated energy systems,” Applied Energy, vol.
1613
+ 323, p. 119627, 2022.
1614
+ [11] W. Tushar, C. Yuen, T. K. Saha, T. Morstyn, A. C. Chapman, M. J. E.
1615
+ Alam, S. Hanif, and H. V. Poor, “Peer-to-peer energy systems for
1616
+ connected communities: A review of recent advances and emerging
1617
+ challenges,” Applied Energy, vol. 282, p. 116131, 2021.
1618
+ [12] A. L¨uth, J. M. Zepter, P. C. del Granado, and R. Egging, “Local
1619
+ electricity market designs for peer-to-peer trading: The role of battery
1620
+ flexibility,” Applied energy, vol. 229, pp. 1233–1243, 2018.
1621
+ [13] T. Morstyn, A. Teytelboym, and M. D. McCulloch, “Bilateral contract
1622
+ networks for peer-to-peer energy trading,” IEEE Transactions on Smart
1623
+ Grid, vol. 10, no. 2, pp. 2026–2035, 2018.
1624
+ [14] J. Guerrero, A. C. Chapman, and G. Verbiˇc, “Decentralized p2p energy
1625
+ trading under network constraints in a low-voltage network,” IEEE
1626
+ Transactions on Smart Grid, vol. 10, no. 5, pp. 5163–5173, 2018.
1627
+ [15] Y. Liu, C. Sun, A. Paudel, Y. Gao, Y. Li, H. B. Gooi, and J. Zhu, “Fully
1628
+ decentralized p2p energy trading in active distribution networks with
1629
+ voltage regulation,” IEEE Transactions on Smart Grid, 2022.
1630
+ [16] D. Botelho, L. de Oliveira, B. Dias, T. Soares, and C. Moraes, “In-
1631
+ tegrated prosumers–dso approach applied in peer-to-peer energy and
1632
+ reserve tradings considering network constraints,” Applied Energy, vol.
1633
+ 317, p. 119125, 2022.
1634
+ [17] L. A. Soriano, M. Avila, P. Ponce, J. de Jes´us Rubio, and A. Molina,
1635
+ “Peer-to-peer energy trades based on multi-objective optimization,”
1636
+ International Journal of Electrical Power & Energy Systems, vol. 131,
1637
+ p. 107017, 2021.
1638
+ [18] W. Amin, Q. Huang, K. Umer, Z. Zhang, M. Afzal, A. A. Khan, and
1639
+ S. A. Ahmed, “A motivational game-theoretic approach for peer-to-peer
1640
+ energy trading in islanded and grid-connected microgrid,” International
1641
+ Journal of Electrical Power & Energy Systems, vol. 123, p. 106307,
1642
+ 2020.
1643
+ [19] X. Luo, W. Shi, Y. Jiang, Y. Liu, and J. Xia, “Distributed peer-to-
1644
+ peer energy trading based on game theory in a community microgrid
1645
+ considering ownership complexity of distributed energy resources,”
1646
+ Journal of Cleaner Production, vol. 351, p. 131573, 2022.
1647
+ [20] B. Zheng, W. Wei, Y. Chen, Q. Wu, and S. Mei, “A peer-to-peer energy
1648
+ trading market embedded with residential shared energy storage units,”
1649
+ Applied Energy, vol. 308, p. 118400, 2022.
1650
+ [21] X. Fang, Q. Zhao, J. Wang, Y. Han, and Y. Li, “Multi-agent deep
1651
+ reinforcement learning for distributed energy management and strategy
1652
+ optimization of microgrid market,” Sustainable Cities and Society,
1653
+ vol. 74, p. 103163, 2021.
1654
+ [22] L. Li and S. Zhang, “Peer-to-peer multi-energy sharing for home
1655
+ microgrids: An integration of data-driven and model-driven approaches,”
1656
+ International Journal of Electrical Power & Energy Systems, vol. 133,
1657
+ p. 107243, 2021.
1658
+ [23] X. Wang, Y. Liu, J. Zhao, C. Liu, J. Liu, and J. Yan, “Surrogate model
1659
+ enabled deep reinforcement learning for hybrid energy community
1660
+ operation,” Applied Energy, vol. 289, p. 116722, 2021.
1661
+ [24] Y. Ye, Y. Tang, H. Wang, X.-P. Zhang, and G. Strbac, “A scalable
1662
+ privacy-preserving multi-agent deep reinforcement learning approach for
1663
+ large-scale peer-to-peer transactive energy trading,” IEEE Transactions
1664
+ on Smart Grid, 2021.
1665
+ [25] D. Qiu, Y. Ye, D. Papadaskalopoulos, and G. Strbac, “Scalable coordi-
1666
+ nated management of peer-to-peer energy trading: A multi-cluster deep
1667
+ reinforcement learning approach,” Applied Energy, vol. 292, p. 116940,
1668
+ 2021.
1669
+ [26] M. M. Hosseini and M. Parvania, “Hierarchical intelligent operation of
1670
+ energy storage systems in power distribution grids,” IEEE Transactions
1671
+ on Sustainable Energy, 2022.
1672
+
99FJT4oBgHgl3EQfpCw2/content/2301.11598v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:3909851f657db119e0c1d90718d9b4ae49d9a8602af2ce63c86108b8784323f5
3
+ size 1654502
99FJT4oBgHgl3EQfpCw2/content/tmp_files/2301.11598v1.pdf.txt ADDED
@@ -0,0 +1,1960 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.11598v1 [math.NA] 27 Jan 2023
2
+ Practical Sketching Algorithms for Low-Rank
3
+ Tucker Approximation of Large Tensors
4
+ Wandi Dong1, Gaohang Yu1*, Liqun Qi2,1,3 and Xiaohao Cai4
5
+ 1Department of Mathematics, Hangzhou Dianzi University,
6
+ Hangzhou, 310018, China.
7
+ 2Huawei Theory Research Lab, Hong Kong, China.
8
+ 3Department of Applied Mathematics, Hongkong Polytechnic
9
+ University, Hong Kong, China.
10
+ 4School of Electronics and Computer Science, University of
11
+ Southampton, Southampton, SO17 1BJ, UK.
12
+ *Corresponding author(s). E-mail(s): [email protected];
13
+ Contributing authors: [email protected];
14
15
+ Abstract
16
+ Low-rank approximation of tensors has been widely used in high-
17
+ dimensional data analysis. It usually involves singular value decom-
18
+ position (SVD) of large-scale matrices with high computational com-
19
+ plexity. Sketching is an effective data compression and dimension-
20
+ ality reduction technique applied to the low-rank approximation of
21
+ large matrices. This paper presents two practical randomized algo-
22
+ rithms for low-rank Tucker approximation of large tensors based
23
+ on sketching and power scheme, with a rigorous error-bound analy-
24
+ sis. Numerical experiments on synthetic and real-world tensor data
25
+ demonstrate the competitive performance of the proposed algorithms.
26
+ Keywords: tensor sketching, randomized algorithm, Tucker decomposition,
27
+ subspace power iteration, high-dimensional data
28
+ MSC Classification: 68W20 , 15A18 , 15A69
29
+ 1
30
+
31
+ 2
32
+ Sketching Algorithms for Low-Rank Tucker Approximation
33
+ 1 Introduction
34
+ In practical applications, high-dimensional data, such as color images, hyper-
35
+ spectral images and videos, often exhibit a low-rank structure. Low-rank
36
+ approximation of tensors has become a general tool for compressing and
37
+ approximating high-dimensional data and has been widely used in scientific
38
+ computing, machine learning, signal/image processing, data mining, and many
39
+ other fields [1]. The classical low-rank tensor factorization models include,
40
+ e.g., Canonical Polyadic decomposition (CP) [2, 3], Tucker decomposition [4–
41
+ 6], Hierarchical Tucker (HT) [7, 8], and Tensor Train decomposition (TT)
42
+ [9]. This paper focuses on low-rank Tucker decomposition, also known as
43
+ the low multilinear rank approximation of tensors. When the target rank
44
+ of Tucker decomposition is much smaller than the original dimensions, it
45
+ will have good compression performance. For a given Nth-order tensor X ∈
46
+ RI1×I2×...×IN , the low-rank Tucker decomposition can be formulated as the
47
+ following optimization problem, i.e.,
48
+ min
49
+ Y ∥X − Y∥2
50
+ F ,
51
+ (1)
52
+ where Y ∈ RI1×I2×...×IN , with rank(Y(n)) ≤ rn for n = 1, 2, . . ., N, Y(n) is the
53
+ mode-n unfolding matrix of Y, and rn is the rank of the mode-n unfolding
54
+ matrix of X.
55
+ For the Tucker approximation of higher-order tensors, the most fre-
56
+ quently used non-iterative algorithms are the improved algorithms for the
57
+ higher-order singular value decomposition (HOSVD) [5], the truncated higher-
58
+ order SVD (THOSVD) [10] and the sequentially truncated higher-order SVD
59
+ (STHOSVD) [11]. Although the results of THOSVD and STHOSVD are usu-
60
+ ally sub-optimal, they can use as reasonable initial solutions for iterative
61
+ methods such as higher-order orthogonal iteration (HOOI) [10]. However, both
62
+ algorithms rely directly on SVD when computing the singular vectors of inter-
63
+ mediate matrices, requiring large memory and high computational complexity
64
+ when the size of tensors is large.
65
+ Strikingly, randomized algorithms can reduce the communication among
66
+ different levels of memories and are parallelizable. In recent years, many schol-
67
+ ars have become increasingly interested in randomized algorithms for finding
68
+ approximation Tucker decomposition of large-scale data tensors [12–17, 19, 20].
69
+ For example, Zhou et al. [12] proposed a randomized version of the HOOI
70
+ algorithm for Tucker decomposition. Che and Wei [13] proposed an adaptive
71
+ randomized algorithm to solve the multilinear rank of tensors. Minster et al.
72
+ [14] designed randomized versions of the THOSVD and STHOSVD algorithms,
73
+ i.e., R-STHOSVD. Sun et al. [17] presented a single-pass randomized algorithm
74
+ to compute the low-rank Tucker approximation of tensors based on a practical
75
+ matrix sketching algorithm for streaming data, see also [18] for more details.
76
+ Regarding more randomized algorithms proposed for Tucker decomposition,
77
+ please refer to [15, 16, 19, 20] for a detailed review of randomized algorithms
78
+
79
+ Sketching Algorithms for Low-Rank Tucker Approximation
80
+ 3
81
+ for solving Tucker decomposition of tensors in recent years involving, e.g., ran-
82
+ dom projection, sampling, count-sketch, random least-squares, single-pass, and
83
+ multi-pass algorithms.
84
+ This paper presents two efficient randomized algorithms for finding the
85
+ low-rank Tucker approximation of tensors, i.e., Sketch-STHOSVD and sub-
86
+ Sketch-STHOSVD summarized in Algorithms 6 and 8, respectively. The main
87
+ contributions of this paper are threefold. Firstly, we propose a new one-pass
88
+ sketching algorithm (i.e., Algorithm 6) for low-rank Tucker approximation,
89
+ which can significantly improve the computational efficiency of STHOSVD.
90
+ Secondly, we present a new matrix sketching algorithm (i.e., Algorithm 7) by
91
+ combining the two-sided sketching algorithm proposed by Tropp et al. [18]
92
+ with subspace power iteration. Algorithm 7 can accurately and efficiently com-
93
+ pute the low-rank approximation of large-scale matrices. Thirdly, the proposed
94
+ Algorithm 8 can deliver a more accurate Tucker approximation than sim-
95
+ pler randomized algorithms by combining the subspace power iteration. More
96
+ importantly, sub-Sketch-STHOSVD can converge quickly for any data tensors
97
+ and independently of singular value gaps.
98
+ The rest of this paper is organized as follows. Section 2 briefly introduces
99
+ some basic notations, definitions, and tensor-matrix operations used in this
100
+ paper and recalls some classical algorithms, including THOSVD, STHOSVD,
101
+ and R-STHOSVD, for low-rank Tucker approximation. Our proposed two-
102
+ sided sketching algorithm for STHOSVD is given in Section 3. In Section 4,
103
+ we present an improved algorithm with subspace power iteration. The effec-
104
+ tiveness of the proposed algorithms is validated thoroughly in Section 5 by
105
+ numerical experiments on synthetic and real-world data tensors. We conclude
106
+ in Section 6.
107
+ 2 Preliminary
108
+ 2.1 Notations and basic operations
109
+ Some common symbols used in this paper are shown in the following Table 1.
110
+ Table 1 Common symbols used in this paper.
111
+ Symbols
112
+ Notations
113
+ a
114
+ scalar
115
+ A
116
+ matrix
117
+ X
118
+ tensor
119
+ X(n)
120
+ mode-n unfolding matrix of X
121
+ ×n
122
+ mode-n product of tensor and matrix
123
+ In
124
+ identity matrix with size n × n
125
+ σi(A)
126
+ the ith largest singular value of A
127
+ A⊤
128
+ transpose of A
129
+ A†
130
+ pseudo-inverse of A
131
+
132
+ 4
133
+ Sketching Algorithms for Low-Rank Tucker Approximation
134
+ We denote an Nth-order tensor X ∈ RI1×I2×...×IN with entries given by
135
+ xi1,i2,...,iN, 1 ≤ in ≤ In, n = 1, 2, ..., N. The Frobenius norm of X is defined as
136
+ ∥X∥F =
137
+
138
+
139
+
140
+
141
+ I1,I2,...,IN
142
+
143
+ i1,i2,...,iN
144
+ x2
145
+ i1,i2,...,iN .
146
+ The mode-n tensor-matrix multiplication is a frequently encountered operation
147
+ in tensor computation. The mode-n product of a tensor X ∈ RI1×I2×...×IN
148
+ by a matrix A ∈ RK×In (with entries ak,in) is denoted as Y = X ×n A ∈
149
+ RI1×...×In−1×K×In+1×...×IN, with entries
150
+ yi1,...,in−1,k,in+1,...,iN =
151
+ In
152
+
153
+ in=1
154
+ xi1,...,in−1,in,in+1,...,iNak,in.
155
+ The mode-n matricization of higher-order tensors is the reordering of ten-
156
+ sor elements into a matrix. The columns of mode-n unfolding matrix X(n) ∈
157
+ RIn×(�
158
+ N̸=n IN ) are the mode-n fibers of X. More specifically, a element
159
+ (i1, i2, ..., iN) of X is maps on a element (in, j) of X(n), where
160
+ j = 1 +
161
+ N
162
+
163
+ k=1,k̸=n
164
+ [(ik − 1)
165
+ k−1
166
+
167
+ m=1,m̸=n
168
+ Im].
169
+ Let the rank of mode-n unfolding matrix X(n) is rn, the integer array
170
+ (r1, r2, ..., rN) is Tucker-rank of Nth-order tensor X, also known as the mul-
171
+ tilinear rank. The Tucker decomposition of X with rank (r1, r2, ..., rN) is
172
+ expressed as
173
+ X = G ×1 U (1) ×2 U (2) . . . ×N U (N),
174
+ (2)
175
+ where G ∈ Rr1×r2×...×rN is the core tensor, and {U (n)}N
176
+ n=1 with U (n) ∈ RIn×rn
177
+ is the mode-n factor matrices. The graphical illustration of Tucker decom-
178
+ position for a third-order tensor shows in Figure 1. We denote an optimal
179
+ rank-(r1, r2, ..., rN) approximation of a tensor X as ˆ
180
+ Xopt, which is the optimal
181
+ Tucker approximation by solving the minimization problem in (1). Below we
182
+ Fig. 1 Tucker decomposition of a third-order tensor.
183
+ present the definitions of some concepts used in this paper.
184
+
185
+ B
186
+ 9
187
+ 3
188
+ 2
189
+ ASketching Algorithms for Low-Rank Tucker Approximation
190
+ 5
191
+ Definition 1 (Kronecker products) The Kronecker product of matrices A ∈ Rm×n
192
+ and B ∈ Rk×l is defined as
193
+ A ⊗ B =
194
+
195
+ 
196
+ a11B
197
+ a12B
198
+ ... a1nB
199
+ a21B
200
+ a22B
201
+ ... a2nB
202
+ :
203
+ :
204
+ ...
205
+ :
206
+ am1B am2B ... amnB
207
+
208
+  ∈ Rmk×nl.
209
+ The Kronecker product helps express Tucker decomposition. The Tucker
210
+ decomposition in (2) implies
211
+ X(n) = U (n)G(n)(U (N) ⊗ ... ⊗ U (n+1) ⊗ U (n−1) ⊗ ... ⊗ U (1))⊤.
212
+ Definition 2 (Standard normal matrix) The elements of a standard normal matrix
213
+ follow the real standard normal distribution (i.e., Gaussian with mean zero and
214
+ variance one) form an independent family of standard normal random variables.
215
+ Definition 3 (Standard Gaussian tensor) The elements of a standard Gaussian
216
+ tensor follow the standard Gaussian distribution.
217
+ Definition 4 (Tail energy) The jth tail energy of a matrix X is defined as
218
+ τ 2
219
+ j (X) :=
220
+ min
221
+ rank(Y )<j ∥X − Y ∥2
222
+ F =
223
+
224
+ i≥j
225
+ σ2
226
+ i (X).
227
+ 2.2 Truncated higher-order SVD
228
+ Since the actual Tucker rank of large-scale higher-order tensor is hard to com-
229
+ pute, the truncated Tucker decomposition with a pre-determined truncation
230
+ (r1, r2, ..., rN) is widely used in practice. THOSVD is a popular approach to
231
+ computing the truncated Tucker approximation, also known as the best low
232
+ multilinear rank-(r1, r2, ..., rN) approximation, which reads
233
+ min
234
+ G; U(1),U(2),··· ,U(N) ∥X − G ×1 U (1) ×2 U (2) · · · ×N U (N)∥2
235
+ F
236
+ s.t.
237
+ U (n)⊤U (n) = Irn, n ∈ {1, 2, ..., N}.
238
+ Algorithm 1 THOSVD
239
+ Require: tensor X ∈ RI1×I2×...×IN and target rank (r1, r2, . . . , rN)
240
+ Ensure: Tucker approximation ˆ
241
+ X = G ×1 U (1) ×1 U (2) · · · ×N U (N)
242
+ 1: for n = 1, 2, . . ., N do
243
+ 2:
244
+ (U (n), ∼, ∼) ← truncatedSVD(X(n), rn)
245
+ 3: end for
246
+ 4: G ← X×1U (1)⊤ ×2 U (2)⊤ · · · ×N U (N)⊤
247
+
248
+ 6
249
+ Sketching Algorithms for Low-Rank Tucker Approximation
250
+ Algorithm 1 summarizes the THOSVD approach. Each mode is processed
251
+ individually in Algorithm 1. The low-rank factor matrices of mode-n unfolding
252
+ matrix X(n) are computed through the truncated SVD, i.e.,
253
+ X(n) =
254
+
255
+ U (n)
256
+ ˜
257
+ U (n)
258
+ � �S(n)
259
+ ˜
260
+ S(n)
261
+ � �V (n)⊤
262
+ ˜
263
+ V (n)⊤
264
+
265
+ ∼= U (n)S(n)V (n)⊤,
266
+ where U (n)S(n)V (n)⊤ is a rank-rn approximation of X(n), the orthogonal
267
+ matrix U (n) ∈ RIn×rn is the mode-n factor matrix of X in Tucker decomposi-
268
+ tion, S(n) ∈ Rrn×rn and V (n) ∈ RI1...In−1In+1...IN×rn. Once all factor matrices
269
+ have been computed, the core tensor G can be computed as
270
+ G = X×1U (1)⊤ ×2 U (2)⊤ · · · ×N U (N)⊤ ∈ Rr1×r2×...×rN.
271
+ Then, the Tucker approximation ˆ
272
+ X of X can be computed as
273
+ ˆ
274
+ X = G ×1 U (1) ×2 U (2) · · · ×N U (N)
275
+ = X ×1 (U (1)U (1)⊤) ×2 (U (2)U (2)⊤) · · · ×N (U (N)U (N)⊤).
276
+ With the notation ∆2
277
+ n(X) ≜ �In
278
+ i=rn+1 σ2
279
+ i (X(n)) and ∆2
280
+ n(X) ≤ ∥X − ˆ
281
+ Xopt∥2
282
+ F
283
+ [14], the error-bound for Algorithm 1 can be stated in the following Theorem 1.
284
+ Theorem 1 ([11], Theorem 5.1) Let ˆ
285
+ X = G ×1 U(1) ×2 U(2) · · · ×N U(N) be the
286
+ low multilinear rank-(r1, r2, ..., rN) approximation of a tensor X ∈ RI1×I2×...×IN by
287
+ THOSVD. Then
288
+ ∥X − ˆ
289
+ X ∥2
290
+ F ≤
291
+ N
292
+
293
+ n=1
294
+ ∥X ×n (IIn − U(n)U(n)⊤)∥2
295
+ F =
296
+ N
297
+
298
+ n=1
299
+ In
300
+
301
+ i=rn+1
302
+ σ2
303
+ i (X(n))
304
+ =
305
+ N
306
+
307
+ n=1
308
+ ∆2
309
+ n(X ) ≤ N∥X − ˆ
310
+ Xopt∥2
311
+ F .
312
+ 2.3 Sequentially truncated higher-order SVD
313
+ Vannieuwenhoven et al.[11] proposed one more efficient and less computation-
314
+ ally complex approach for computing approximate Tucker decomposition of
315
+ tensors, called STHOSVD. Unlike THOSVD algorithm, STHOSVD updates
316
+ the core tensor simultaneously whenever a factor matrix has computed.
317
+ Given the target rank (r1, r2, . . . , rN) and a processing order sp
318
+ :
319
+ {1, 2, ..., N}, the minimization problem (1) can be formulated as the following
320
+
321
+ Sketching Algorithms for Low-Rank Tucker Approximation
322
+ 7
323
+ optimization problem
324
+ min
325
+ U(1),··· ,U(N) ∥X − X ×1 (U (1)U (1)⊤) ×2 (U (2)U (2)⊤) · · · ×N (U (N)U (N)⊤)∥2
326
+ F
327
+ =
328
+ min
329
+ U(1),··· ,U(N)(∥X ×1 (I1 − U (1)U (1)⊤)∥2
330
+ F + ∥ ˆ
331
+ X (1) ×2 (I2 − U (2)U (2)⊤)∥2
332
+ F +
333
+ · · · + ∥ ˆ
334
+ X (N−1) ×N (IN − U (N)U (N)⊤)∥2
335
+ F )
336
+ = min
337
+ U(1)(∥X ×1 (I1 − U (1)U (1)⊤)∥2
338
+ F + min
339
+ U(2)(∥ ˆ
340
+ X (1) ×2 (I2 − U (2)U (2)⊤)∥2
341
+ F +
342
+ min
343
+ U(3)(· · · + min
344
+ U(N) ∥ ˆ
345
+ X (N−1) ×N (IN − U (N)U (N)⊤)∥2
346
+ F ))),
347
+ (3)
348
+ where
349
+ ˆ
350
+ X (n) = X ×1 (U (1)U (1)⊤) ×2 (U (2)U (2)⊤) · · · ×n (U (n)U (n)⊤), n =
351
+ 1, 2, ..., N − 1, denote the intermediate approximation tensors.
352
+ Algorithm 2 STHOSVD
353
+ Require: tensor X ∈ RI1×I2×...×IN , target rank (r1, r2, . . . , rN), and process-
354
+ ing order sp : {i1, i2, . . . , iN}
355
+ Ensure: Tucker approximation ˆ
356
+ X = G ×1 U (1) ×2 U (2) . . . ×N U (N)
357
+ 1: G ← X
358
+ 2: for n = i1, i2, . . . , iN do
359
+ 3:
360
+ (U (n), S(n), V (n)⊤) ← truncatedSVD(G(n), rn)
361
+ 4:
362
+ G ← foldn(S(n)V (n)⊤) (% forming the updated tensor from its mode-n
363
+ unfolding)
364
+ 5: end for
365
+ In Algorithm 2, the solution U (n) of problem (3) can be obtained via
366
+ truncatedSVD(G(n), rn), where G(n) is mode-n unfolding matrix of the (n−1)-
367
+ th intermediate core tensor G = X ×n−1
368
+ i=1 U (i)⊤ ∈ Rr1×r2×...×rn−1×In×...×IN,
369
+ i.e.,
370
+ G(n) =
371
+
372
+ U (n)
373
+ ˜
374
+ U (n)
375
+ � �S(n)
376
+ ˜
377
+ S(n)
378
+ � �V (n)⊤
379
+ ˜
380
+ V (n)⊤
381
+
382
+ ∼= U (n)S(n)V (n)⊤,
383
+ where the orthogonal matrix U (n)
384
+ is the mode-n factor matrix, and
385
+ S(n)V (n)⊤ ∈ Rrn×r1...rn−1In+1...IN is used to update the n-th intermediate core
386
+ tensor G. Function foldn(S(n)V (n)⊤) tensorizes matrix S(n)V (n)⊤ into ten-
387
+ sor G ∈ Rr1×r2×...×rn×In+1×...×IN. When the target rank rn is much smaller
388
+ than In, the size of the updated intermediate core tensor G is much smaller
389
+ than original tensor. This method can significantly improve computational
390
+ performance. STHOSVD algorithm possesses the following error-bound.
391
+ Theorem 2 ([11], Theorem 6.5) Let ˆ
392
+ X = G ×1 U(1) ×2 U(2) . . . ×N U(N) be the
393
+ low multilinear rank-(r1, r2, ..., rN) approximation of a tensor X ∈ RI1×I2×...×IN by
394
+
395
+ 8
396
+ Sketching Algorithms for Low-Rank Tucker Approximation
397
+ STHOSVD with processsing order sp : {1, 2, . . . , N}. Then
398
+ ∥X − ˆ
399
+ X ∥2
400
+ F =
401
+ N
402
+
403
+ n=1
404
+ ∥ ˆ
405
+ X (n−1) − ˆ
406
+ X (n)∥2
407
+ F ≤
408
+ N
409
+
410
+ n=1
411
+ ∥X ×n (IIn − U(n)U(n)⊤)∥2
412
+ F
413
+ =
414
+ N
415
+
416
+ n=1
417
+ ∆2
418
+ n(X ) ≤ N∥X − ˆ
419
+ Xopt∥2
420
+ F .
421
+ Although STHOSVD has the same error-bound as THOSVD, it is less com-
422
+ putationally complex and requires less storage. As shown in Section 5 for the
423
+ numerical experiment, the running (CPU) time of the STHOSVD algorithm
424
+ is significantly reduced, and the approximation error has slightly better than
425
+ that of THOSVD in some cases.
426
+ 2.4 Randomized STHOSVD
427
+ When the dimensions of data tensors are enormous, the computational cost
428
+ of the classical deterministic algorithm TSVD for finding a low-rank approx-
429
+ imation of mode-n unfolding matrix can be expensive. Randomized low-rank
430
+ matrix algorithms replace original large-scale matrix with a new one through
431
+ a preprocessing step. The new matrix contains as much information as possi-
432
+ ble about the rows or columns of original data matrix. Its size is smaller than
433
+ original matrix, allowing the data matrix to be processed efficiently and thus
434
+ reducing the memory requirements for solving low-rank approximation of large
435
+ matrix.
436
+ Algorithm 3 R-SVD
437
+ Require: matrix A ∈ Rm×n, target rank r, and oversampling parameter p ≥ 0
438
+ Ensure: low-rank approximation matrix ˆA = ˆU ˆS ˆV ⊤ of A
439
+ 1: Ω ← randn(n, r + p)
440
+ 2: Y ← AΩ
441
+ 3: (Q, ∼) ← thinQR(Y )
442
+ 4: B ← Q⊤A
443
+ 5: (U, S, V ⊤) ← thinSVD(B)
444
+ 6: ˆU ← QU(:, 1 : r)
445
+ 7: ˆS ← S(1 : r, 1 : r), ˆV ← V (:, 1 : r)
446
+ N. Halko et al. [21] proposed a randomized SVD (R-SVD) for matrices. The
447
+ preprocessing stage of the algorithm is performed by right multiplying original
448
+ data matrix A ∈ Rm×n with a random Gaussian matrix Ω ∈ Rn×r. Each
449
+ column of the resulting new matrix Y = AΩ ∈ Rm×r is a linear combination
450
+ of the columns of original data matrix. When r < n, the size of matrix Y
451
+ is smaller than A. The oversampling technique can improve the accuracy of
452
+ solutions. Subsequent computations are summarised in Algorithm 3, where
453
+
454
+ Sketching Algorithms for Low-Rank Tucker Approximation
455
+ 9
456
+ randn generates a Gaussian random matrix, thinQR produces an economy-size
457
+ of the QR decomposition, and thinSVD is the thin SVD decomposition. When
458
+ A is dense, the arithmetic cost of Algorithm 3 is O(2(r + p)mn + r2(m + n))
459
+ flops, where p > 0 is the oversampling parameter satisfying r+p ≤ min{m, n}.
460
+ Algorithm 3 is an efficient randomized algorithm for computing rank-r
461
+ approximations to matrices. Minster et al. [14] applied Algorithm 3 directly
462
+ to the STHOSVD algorithm and then presented a randomized version of
463
+ STHOSVD (i.e., R-STHOSVD), see Algorithm 4.
464
+ Algorithm 4 R-STHOSVD
465
+ Require: tensor X ∈ RI1×I2×...×IN , targer rank (r1, r2, . . . , rN), processing
466
+ order sp : {i1, i2, . . . , iN}, and oversampling parameter p ≥ 0
467
+ Ensure: Tucker approximation ˆ
468
+ X = G ×1 U (1) ×2 U (2) . . . ×N U (N)
469
+ 1: G ← X
470
+ 2: for n = i1, i2, . . . , iN do
471
+ 3:
472
+ ( ˆU, ˆS, ˆV ⊤) ← R-SVD(G(n), rn, p) (cf. Algorithm 3)
473
+ 4:
474
+ U (n) ← ˆU
475
+ 5:
476
+ G ← foldn( ˆS ˆV ⊤)
477
+ 6: end for
478
+ 3 Sketching algorithm for STHOSVD
479
+ A drawback of R-SVD algorithm is that when both dimensions of the inter-
480
+ mediate matrices are enormous, the computational cost can still be high. To
481
+ resolve this problem, we could resort to the two-sided sketching algorithm for
482
+ low-rank matrix approximation proposed by Joel A. Tropp et al. [22]. The
483
+ preprocessing of sketching algorithm needs two sketch matrices to contain
484
+ information regarding the rows and columns of input matrix A ∈ Rm×n. Thus
485
+ we should choose two sketch size parameters k and l, s.t. , r ≤ k ≤ min{l, n},
486
+ 0 < l ≤ m. The random matrices Ω ∈ Rn×k and Ψ ∈ Rl×m are fixed indepen-
487
+ dent standard normal matrices. Then we can multiply matrix A left and right
488
+ respectively to obtain random sketch matrices Y ∈
489
+ Rm×k and W ∈ Rl×n,
490
+ which collect sufficient data about the input matrix to compute the low-rank
491
+ approximation. The dimensionality and distribution of the random sketch
492
+ matrices determine the approximation’s potential accuracy, with larger values
493
+ of k and l resulting in better approximations but also requiring more storage
494
+ and computational cost.
495
+ The sketching algorithm for low-rank approximation is given in Algorithm
496
+ 5. Function orth(A) in Step 2 produces an orthonormal basis of A. Using
497
+ orthogonalization matrices will achieve smaller errors and better numerical
498
+ stability than directly using the randomly generated Gaussian matrices. In
499
+ particular, when A is dense, the arithmetic cost of Algorithm 5 is O((k +
500
+ l)mn + kl(m + n)) flops. Algorithm 5 is simple, practical, and possesses the
501
+ sub-optimal error-bound as stated in the following Theorem 3. In Theorem 3,
502
+
503
+ 10
504
+ Sketching Algorithms for Low-Rank Tucker Approximation
505
+ Algorithm 5 Sketch for low-rank approximation
506
+ Require: matrix A ∈ Rm×n, and sketch size parameters k, l
507
+ Ensure: rank-k approximation ˆA = QX of A
508
+ 1: Ω ← randn(n, k), Ψ ← randn(l, m)
509
+ 2: Ω ← orth(Ω), Ψ⊤ ← orth(Ψ⊤)
510
+ 3: Y ← AΩ
511
+ 4: W ← ΨA
512
+ 5: (Q, ∼) ← thinQR(Y )
513
+ 6: X ← (ΨQ)†W
514
+ function f(s, t) := s/(t − s − 1)(t > s + 1 > 1). The minimum in Theorem
515
+ 3 reveals that the low rank approximation of given matrix A automatically
516
+ exploits the decay of tail energy.
517
+ Theorem 3 ([22], Theorem 4.3) Assume that the sketch size parameters satisfy
518
+ l > k + 1, and draw random test matrices Ω ∈ Rn×k and Ψ∈ Rl×m independently
519
+ forming the standard normal distribution. Then the rank-k approximation ˆA obtained
520
+ from Algorithm 5 satisfies
521
+ E ∥ A − ˆA ∥2
522
+ F ≤ (1 + f(k, l)) · min
523
+ ̺<k−1(1 + f(̺, k)) · τ 2
524
+ ̺+1(A)
525
+ =
526
+ k
527
+ l − k − 1 · min
528
+ ̺<k−1
529
+ k
530
+ k − ̺ − 1 · τ 2
531
+ ̺+1(A).
532
+ Using the two-sided sketching algorithm to leverage STHOSVD algorithm,
533
+ we propose a practical sketching algorithm for STHOSVD named Sketch-
534
+ STHOSVD. We summarize the procedures of Sketch-STHOSVD algorithm in
535
+ Algorithm 6, with its error analysis stated in Theorem 4.
536
+ Algorithm 6 Sketch-STHOSVD
537
+ Require: tensor X ∈ RI1×I2×...×IN , targer rank (r1, r2, . . . , rN), processing
538
+ order sp : {i1, i2, . . . , iN}, and sketch size parameters {l1, l2, ..., lN}
539
+ Ensure: Tucker approximation ˆ
540
+ X = G ×1 U (1) ×2 U (2) . . . ×N U (N)
541
+ 1: G ← X
542
+ 2: for n = i1, i2, . . . , iN do
543
+ 3:
544
+ (Q, X) ← Sketch(G(n), rn, ln) (cf. Algorithm 5)
545
+ 4:
546
+ U (n) ← Q
547
+ 5:
548
+ G ← foldn(X)
549
+ 6: end for
550
+ Theorem 4 Let ˆ
551
+ X = G ×1 U(1) ×2 U(2) . . . ×N U(N) be the Tucker approximation
552
+ of a tensor X ∈ RI1×I2×...×IN by the Sketch-STHOSVD algorithm (i.e., Algorithm
553
+ 6) with target rank rn < In, n = 1, 2, ..., N, sketch size parameters {l1, l2, ..., lN} and
554
+
555
+ Sketching Algorithms for Low-Rank Tucker Approximation
556
+ 11
557
+ processing order sp : {1, 2, . . . , N}. Then
558
+ E{Ωj}N
559
+ j=1∥X − �
560
+ X ∥2
561
+ F ≤
562
+ N
563
+
564
+ n=1
565
+ rn
566
+ ln − rn − 1
567
+ min
568
+ ̺n<rn−1
569
+ rn
570
+ rn − ̺n − 1∆2
571
+ n(X )
572
+
573
+ N
574
+
575
+ n=1
576
+ rn
577
+ ln − rn − 1
578
+ min
579
+ ̺n<rn−1
580
+ rn
581
+ rn − ̺n − 1∥X − ˆ
582
+ Xopt∥2
583
+ F .
584
+ Proof Combining Theorem 2 and Theorem 3, we have
585
+ E{Ωj}N
586
+ j=1∥X − �
587
+ X ∥2
588
+ F
589
+ =
590
+ N
591
+
592
+ n=1
593
+ E{Ωj}N
594
+ j=1∥ ˆ
595
+ X (n−1) − ˆ
596
+ X (n)∥2
597
+ F
598
+ =
599
+ N
600
+
601
+ n=1
602
+ E{Ωj}n−1
603
+ j=1
604
+
605
+ EΩn∥ ˆ
606
+ X (n−1) − ˆ
607
+ X (n)∥2
608
+ F
609
+
610
+ =
611
+ N
612
+
613
+ n=1
614
+ E{Ωj}n−1
615
+ j=1
616
+
617
+ EΩn∥G(n−1) ×n−1
618
+ i=1 U(i)×n(I − U(n)U(n)⊤)∥2
619
+ F
620
+
621
+
622
+ N
623
+
624
+ n=1
625
+ E{Ωj}n−1
626
+ j=1
627
+
628
+ EΩn∥(I − U(n)U(n)⊤)Gn−1
629
+ n
630
+ )∥2
631
+ F
632
+
633
+
634
+ N
635
+
636
+ n=1
637
+ E{Ωj}n−1
638
+ j=1
639
+ rn
640
+ ln − rn − 1
641
+ min
642
+ ̺n<rn−1
643
+ rn
644
+ rn − ̺n − 1
645
+ In
646
+
647
+ i=rn+1
648
+ σ2
649
+ i (G(n−1)
650
+ (n)
651
+ )
652
+
653
+ N
654
+
655
+ n=1
656
+ E{Ωj}n−1
657
+ j=1
658
+ rn
659
+ ln − rn − 1
660
+ min
661
+ ̺n<rn−1
662
+ rn
663
+ rn − ̺n − 1∆2
664
+ n(X )
665
+ =
666
+ N
667
+
668
+ n=1
669
+ rn
670
+ ln − rn − 1
671
+ min
672
+ ̺n<rn−1
673
+ rn
674
+ rn − ̺n − 1∆2
675
+ n(X )
676
+
677
+ N
678
+
679
+ n=1
680
+ rn
681
+ ln − rn − 1
682
+ min
683
+ ̺n<rn−1
684
+ rn
685
+ rn − ̺n − 1∥X − ˆ
686
+ Xopt∥2
687
+ F .
688
+
689
+ We assume the processing order for STHOSVD, R-STHOSVD, and Sketch-
690
+ STHOSVD algorithms is sp : {1, 2, ..., N}. Table 2 summarises the arithmetic
691
+ cost of different algorithms for the cases related to the general higher-order
692
+ tensor X ∈ RI1×I2×...×IN with target rank (r1, r2, . . . , rN) and the special
693
+ cubic tensor X ∈ RI×I×...×I with target rank (r, r, ..., r). Here the tensors are
694
+ dense and the target ranks rj ≪ Ij, j = 1, 2, . . ., N.
695
+
696
+ 12
697
+ Sketching Algorithms for Low-Rank Tucker Approximation
698
+ Table 2 Arithmetic cost for the algorithms THOSVD, STHOSVD, R-STHOSVD, and
699
+ the proposed Sketch-STHOSVD.
700
+ Algorithm
701
+ X ∈ RI1×I2×...×IN
702
+ X ∈ RI×I×...×I
703
+ THOSVD
704
+ O(
705
+ N
706
+
707
+ j=1
708
+ Ij I1:N + �N
709
+ j=1 r1:j Ij:N )
710
+ O(NIN+1 +
711
+ N
712
+
713
+ j=1
714
+ rj IN−j+1)
715
+ STHOSVD
716
+ O(
717
+ N
718
+
719
+ j=1
720
+ Ij r1:j−1Ij:N +
721
+ N
722
+
723
+ j=1
724
+ r1:j Ij+1:N )
725
+ O(
726
+ N
727
+
728
+ j=1
729
+ rj−1IN−j+2 + rj IN−j)
730
+ R-STHOSVD
731
+ O(
732
+ N
733
+
734
+ j=1
735
+ r1:jIj:N +
736
+ N
737
+
738
+ j=1
739
+ r1:j Ij+1:N )
740
+ O(
741
+ N
742
+
743
+ j=1
744
+ rj IN−j+1 + rj IN−j )
745
+ Sketch-STHOSVD
746
+ O(
747
+ N
748
+
749
+ j=1
750
+ rj lj(Ij + r1:j−1Ij+1:N ) +
751
+ N
752
+
753
+ j=1
754
+ r1:j Ij+1:N )
755
+ O(
756
+ N
757
+
758
+ j=1
759
+ rl(I + rj−1IN−j ) + rj IN−j )
760
+ 4 Sketching algorithm with subspace power
761
+ iteration
762
+ When the size of original matrix is very large or the singular spectrum of
763
+ original matrix decays slowly, Algorithm 5 may produce a poor basis in many
764
+ applications. Inspired by [23], we suggest using the power iteration technique
765
+ to enhance the sketching algorithm by replacing A with (AA⊤)qA, where q
766
+ is a positive integer. According to the SVD decomposition of matrix A, i.e.,
767
+ A = USV ⊤, we know that (AA⊤)qA = US2q+1V ⊤. It can see that A and
768
+ (AA⊤)qA have the same left and right singular vectors, but the latter has a
769
+ faster decay rate of singular values, making its tail energy much smaller.
770
+ Algorithm 7 Sketching algorithm with subspace power iteration (sub-
771
+ Sketch)
772
+ Require: matrix A ∈ Rm×n, sketch size parameters k, l, and integer q > 0
773
+ Ensure: rank-k approximation ˆA = QX of A
774
+ 1: Ω ← randn(n, k), Ψ ← randn(l, m)
775
+ 2: Ω ← orth(Ω), Ψ⊤ ← orth(Ψ⊤)
776
+ 3: Y = AΩ, W = ΨA
777
+ 4: Q0 ← thinQR(Y )
778
+ 5: for j = 1, . . . , q do
779
+ 6:
780
+ ˆYj = A⊤Qj−1
781
+ 7:
782
+ ( ˆQj, ∼) ← thinQR( ˆYj)
783
+ 8:
784
+ Yj = A ˆQj
785
+ 9:
786
+ (Qj, ∼) ← thinQR(Yj)
787
+ 10: end for
788
+ 11: Q = Qq
789
+ 12: X ← (ΨQ)†W
790
+ Although power iteration can improve the accuracy of Algorithm 5 to some
791
+ extent, it still suffers from a problem, i.e., during the execution with power
792
+ iteration, the rounding errors will eliminate all information about the singular
793
+ modes associated with the singular values. To address this issue, we propose an
794
+
795
+ Sketching Algorithms for Low-Rank Tucker Approximation
796
+ 13
797
+ improved sketching algorithm by orthonormalizing the columns of the sample
798
+ matrix between each application of A and A⊤, see Algorithm 7. When A is
799
+ dense, the arithmetic cost of Algorithm 7 is O((q + 1)(k + l)mn + kl(m + n))
800
+ flops. Numerical experiments show that a good approximation can achieve
801
+ with a choice of 1 or 2 for subspace power iteration parameter [21].
802
+ Algorithm 8 sub-Sketch-STHOSVD
803
+ Require: tensor X ∈ RI1×I2×...×IN , targer rank (r1, r2, . . . , rN), processing
804
+ order sp : {i1, i2, . . . , iN}, sketch size parameters {l1, l2, ..., lN}, and integer
805
+ q > 0
806
+ Ensure: Tucker approximation ˆ
807
+ X = G ×1 U (1) ×2 U (2) . . . ×N U (N)
808
+ 1: G ← X
809
+ 2: for n = i1, i2, . . . , iN do
810
+ 3:
811
+ (Q, X) ← sub-Sketch(G(n), rn, ln, q) (cf. Algorithm 7)
812
+ 4:
813
+ U (n) ← Q
814
+ 5:
815
+ G ← foldn(X)
816
+ 6: end for
817
+ Using Algorithm 7 to compute the low-rank approximations of intermedi-
818
+ ate matrices, we can obtain an improved sketching algorithm for STHOSVD,
819
+ called sub-Sketch-STHOSVD, see Algorithm 8. The error-bound for Algorithm
820
+ 8 states in the following Theorem 5. Its proof is deferred in Appendix.
821
+ Theorem 5 Let ˆ
822
+ X = G ×1 U(1) ×2 U(2) . . . ×N U(N) be the Tucker approximation
823
+ of a tensor X ∈ RI1×I2×...×IN obtained by the sub-Sketch-STHOSVD algorithm
824
+ (i.e., Algorithm 8) with target rank rn < In, n = 1, 2, ..., N, sketch size parameters
825
+ {l1, l2, ..., lN} and processing order p : {1, 2, . . . , N}. Let ̟k ≡
826
+ σk+1
827
+ σk
828
+ denote the
829
+ singular value gap, then
830
+ E{Ωj}N
831
+ j=1∥X − �
832
+ X ∥2
833
+ F ≤
834
+ N
835
+
836
+ n=1
837
+ (1 + f(rn, ln)) ·
838
+ min
839
+ ̺n<rn−1(1 + f(̺n, rn)̟r4q) · τ 2
840
+ ̺+1(X(n))
841
+
842
+ N
843
+
844
+ n=1
845
+ (1 + f(rn, ln)) ·
846
+ min
847
+ ̺n<rn−1(1 + f(̺n, rn)̟r4q)∥X − ˆ
848
+ Xopt∥2
849
+ F .
850
+ Proof See Appendix.
851
+
852
+ 5 Numerical experiments
853
+ This section conducts numerical experiments with synthetic data and
854
+ real-world data, including comparisons between the traditional THOSVD,
855
+ STHOSVD algorithms, the R-STHOSVD algorithm proposed in [14], and our
856
+
857
+ 14
858
+ Sketching Algorithms for Low-Rank Tucker Approximation
859
+ proposed algorithms Sketch-STHOSVD and sub-Sketch-STHOSVD. Regard-
860
+ ing the numerical settings, the oversampling parameter p = 5 is used in
861
+ Algorithm 3, the sketch parameters ln = rn + 2, n = 1, 2, . . ., N, are used
862
+ in Algorithms 6 and 8, and the power iteration parameter q = 1 is used in
863
+ Algorithm 8.
864
+ 5.1 Hilbert tensor
865
+ Hilbert tensor is a synthetic and supersymmetric tensor, with each entry
866
+ defined as
867
+ Xi1i2...in =
868
+ 1
869
+ i1 + i2 + ... + in
870
+ , 1 ≤ in ≤ In, n = 1, 2, ..., N.
871
+ In the first experiment, we set N = 5 and In = 25, n = 1, 2, . . . , N. The target
872
+ rank is chosen as (r, r, r, r, r), where r ∈ [1, 25]. Due to the supersymmetry of
873
+ the Hilbert tensor, the processing order in the algorithms does not affect the
874
+ final experimental results, and thus the processing order can be directly chosen
875
+ as sp : {1, 2, 3, 4, 5}.
876
+ 0
877
+ 5
878
+ 10
879
+ 15
880
+ 20
881
+ 25
882
+ Target rank
883
+ 10-15
884
+ 10-10
885
+ 10-5
886
+ 100
887
+ Relative Error
888
+ THOSVD
889
+ STHOSVD
890
+ R-STHOSVD
891
+ Sketch-STHOSVD
892
+ sub-Sketch-STHOSVD
893
+ 0
894
+ 5
895
+ 10
896
+ 15
897
+ 20
898
+ 25
899
+ Target rank
900
+ 10-1
901
+ 100
902
+ 101
903
+ 102
904
+ Running Time
905
+ THOSVD
906
+ STHOSVD
907
+ R-STHOSVD
908
+ Sketch-STHOSVD
909
+ sub-Sketch-STHOSVD
910
+ Fig. 2 Results comparison on the Hilbert tensor with a size of 25 × 25 × 25 × 25 × 25 in
911
+ terms of numerical error (left) and CPU time (right).
912
+ The results of different algorithms are given in Figure 2. It shows that our
913
+ proposed algorithms (i.e., Sketch-STHOSVD and sub-Sketch-STHOSVD) and
914
+ algorithm R-STHOSVD outperform the algorithms THOSVD and STHOSVD.
915
+ In particular, the error of the proposed algorithms Sketch-STHOSVD and sub-
916
+ Sketch-STHOSVD is comparable to R-STHOSVD (see the left plot in Figure
917
+ 2), while they both use less CPU time than R-STHOSVD (see the right plot in
918
+ Figure 2). This result demonstrates the excellent performance of the proposed
919
+
920
+ Sketching Algorithms for Low-Rank Tucker Approximation
921
+ 15
922
+ algorithms and indicates that the two-sided sketching method and the subspace
923
+ power iteration used in our algorithms can indeed improve the performance of
924
+ STHOSVD algorithm.
925
+ For a large-scale test, we use a Hilbert tensor with a size of 500×500×500
926
+ and conduct experiments using ten different approximate multilinear ranks. We
927
+ perform the tests ten times and report the algorithms’ average running time
928
+ and relative error in Table 3 and Table 4, respectively. The results show that
929
+ the randomized algorithms can achieve higher accuracy than the deterministic
930
+ algorithms. The proposed Sketch-STHOSVD algorithm is the fastest, and the
931
+ sub-Sketch-STHOSVD algorithm achieves the highest accuracy efficiently.
932
+ Table 3 Results comparison in terms of the CPU time (in second) on the Hilbert tensor
933
+ with a size of 500 × 500 × 500 as the target rank increases.
934
+ Target rank
935
+ THOSVD
936
+ STHOSVD
937
+ R-STHOSVD
938
+ Sketch-STHOSVD
939
+ sub-Sketch-STHOSVD
940
+ (10,10,10)
941
+ 17.18
942
+ 7.49
943
+ 0.92
944
+ 0.86
945
+ 0.98
946
+ (20,20,20)
947
+ 23.13
948
+ 8.87
949
+ 1.25
950
+ 1.05
951
+ 1.48
952
+ (30,30,30)
953
+ 24.91
954
+ 9.35
955
+ 1.66
956
+ 1.53
957
+ 2.16
958
+ (40,40,40)
959
+ 28.05
960
+ 10.41
961
+ 1.94
962
+ 1.44
963
+ 2.11
964
+ (50,50,50)
965
+ 29.44
966
+ 11.39
967
+ 2.07
968
+ 1.67
969
+ 2.43
970
+ (60,60,60)
971
+ 30.14
972
+ 11.07
973
+ 2.37
974
+ 1.90
975
+ 2.77
976
+ (70,70,70)
977
+ 29.44
978
+ 11.18
979
+ 2.57
980
+ 2.10
981
+ 3.02
982
+ (80,80,80)
983
+ 29.65
984
+ 12.30
985
+ 3.05
986
+ 2.54
987
+ 3.75
988
+ (90,90,90)
989
+ 31.11
990
+ 12.80
991
+ 3.80
992
+ 2.80
993
+ 4.33
994
+ (100,100,100)
995
+ 32.22
996
+ 13.51
997
+ 4.04
998
+ 3.07
999
+ 4.61
1000
+ Table 4 Results comparison in terms of the relative error on the Hilbert tensor with a
1001
+ size of 500 × 500 × 500 as the target rank increases.
1002
+ Target rank
1003
+ THOSVD
1004
+ STHOSVD
1005
+ R-STHOSVD
1006
+ Sketch-STHOSVD
1007
+ sub-Sketch-STHOSVD
1008
+ (10,10,10)
1009
+ 2.7354e-06
1010
+ 2.7347e-06
1011
+ 2.7347e-06
1012
+ 1.1178e-05
1013
+ 2.7568e-06
1014
+ (20,20,20)
1015
+ 1.1794e-12
1016
+ 1.1793e-12
1017
+ 1.1794e-12
1018
+ 7.1408e-12
1019
+ 1.2677e-12
1020
+ (30,30,30)
1021
+ 4.6574e-15
1022
+ 3.2739e-15
1023
+ 3.2201e-15
1024
+ 4.0641e-15
1025
+ 2.0182e-15
1026
+ (40,40,40)
1027
+ 4.4282e-15
1028
+ 3.4249e-15
1029
+ 2.8212e-15
1030
+ 2.1562e-15
1031
+ 1.7860e-15
1032
+ (50,50,50)
1033
+ 4.1628e-15
1034
+ 3.2342e-15
1035
+ 2.6823e-15
1036
+ 2.3205e-15
1037
+ 1.8625e-15
1038
+ (60,60,60)
1039
+ 4.1214e-15
1040
+ 3.1271e-15
1041
+ 2.3652e-15
1042
+ 2.2920e-15
1043
+ 1.7472e-15
1044
+ (70,70,70)
1045
+ 4.1085e-15
1046
+ 3.0000e-15
1047
+ 2.1761e-15
1048
+ 2.0499e-15
1049
+ 1.6370e-15
1050
+ (80,80,80)
1051
+ 4.0956e-15
1052
+ 3.1350e-15
1053
+ 1.8382e-15
1054
+ 1.8209e-15
1055
+ 1.6424e-15
1056
+ (90,90,90)
1057
+ 4.0792e-15
1058
+ 3.3742e-15
1059
+ 1.8102e-15
1060
+ 1.7193e-15
1061
+ 1.5264e-15
1062
+ (100,100,100)
1063
+ 4.0390e-15
1064
+ 3.0571e-15
1065
+ 1.7323e-15
1066
+ 1.6304e-15
1067
+ 1.4957e-15
1068
+ 5.2 Sparse tensor
1069
+ In this experiment, we test the performance of different algorithms on a sparse
1070
+ tensor X ∈ R200×200×200, i.e.,
1071
+ X =
1072
+ 10
1073
+
1074
+ i=1
1075
+ γ
1076
+ i2 xi ◦ yi ◦ zi +
1077
+ 200
1078
+
1079
+ i=11
1080
+ 1
1081
+ i2 xi ◦ yi ◦ zi.
1082
+ Where xi, yi, zi ∈ Rn are sparse vectors all generated using the sprand com-
1083
+ mand in MATLAB with 5% nonzeros each, and γ is a user-defined parameter
1084
+
1085
+ 16
1086
+ Sketching Algorithms for Low-Rank Tucker Approximation
1087
+ 20
1088
+ 40
1089
+ 60
1090
+ 80
1091
+ 100
1092
+ Target rank
1093
+ 10-3
1094
+ 10-2
1095
+ Relative Error
1096
+ THOSVD
1097
+ STHOSVD
1098
+ R-STHOSVD
1099
+ Sketch-STHOSVD
1100
+ sub-Sketch-STHOSVD
1101
+ 20
1102
+ 40
1103
+ 60
1104
+ 80
1105
+ 100
1106
+ Target rank
1107
+ 10-4
1108
+ 10-3
1109
+ Relative Error
1110
+ THOSVD
1111
+ STHOSVD
1112
+ R-STHOSVD
1113
+ Sketch-STHOSVD
1114
+ sub-Sketch-STHOSVD
1115
+ 20
1116
+ 40
1117
+ 60
1118
+ 80
1119
+ 100
1120
+ Target rank
1121
+ 10-6
1122
+ 10-5
1123
+ Relative Error
1124
+ THOSVD
1125
+ STHOSVD
1126
+ R-STHOSVD
1127
+ Sketch-STHOSVD
1128
+ sub-Sketch-STHOSVD
1129
+ 20
1130
+ 40
1131
+ 60
1132
+ 80
1133
+ 100
1134
+ Target rank
1135
+ 10-1
1136
+ 100
1137
+ Running Time
1138
+ THOSVD
1139
+ STHOSVD
1140
+ R-STHOSVD
1141
+ Sketch-STHOSVD
1142
+ sub-Sketch-STHOSVD
1143
+ 20
1144
+ 40
1145
+ 60
1146
+ 80
1147
+ 100
1148
+ Target rank
1149
+ 10-1
1150
+ 100
1151
+ Running Time
1152
+ THOSVD
1153
+ STHOSVD
1154
+ R-STHOSVD
1155
+ Sketch-STHOSVD
1156
+ sub-Sketch-STHOSVD
1157
+ 20
1158
+ 40
1159
+ 60
1160
+ 80
1161
+ 100
1162
+ Target rank
1163
+ 10-1
1164
+ 100
1165
+ Running Time
1166
+ THOSVD
1167
+ STHOSVD
1168
+ R-STHOSVD
1169
+ Sketch-STHOSVD
1170
+ sub-Sketch-STHOSVD
1171
+ Fig. 3 Results comparison on a sparse tensor with a size of 200 × 200 × 200 in terms of
1172
+ numerical error (first row) and CPU time (second row).
1173
+ which determines the strength of the gap between the first ten terms and the
1174
+ rest terms. The target rank is chosen as (r, r, r), where r ∈ [20, 100]. The exper-
1175
+ imental results show in Figure 3, in which three different values γ = 2, 10, 200
1176
+ are tested. The increase of gap means that the tail energy will be reduced, and
1177
+ the accuracy of the algorithms will be improved. Our numerical experiments
1178
+ also verified this result.
1179
+ Figure 3 demonstrates the superiority of the proposed sketching algo-
1180
+ rithms. In particular, we see that the proposed Sketch-STHOSVD is the fastest
1181
+ algorithm, with a comparable error against R-STHOSVD; the proposed sub-
1182
+ Sketch-STHOSVD can reach the same accuracy as the STHOSVD algorithm
1183
+ but in much less CPU time; and the proposed sub-Sketch-STHOSVD achieves
1184
+ much better low-rank approximation than R-STHOSVD with similar CPU
1185
+ time.
1186
+ Now we consider the influence of noise on algorithms’ performance. Specif-
1187
+ ically, the sparse tensor X with noise is designed in the same manner as in
1188
+
1189
+ Sketching Algorithms for Low-Rank Tucker Approximation
1190
+ 17
1191
+ 20
1192
+ 40
1193
+ 60
1194
+ 80
1195
+ 100
1196
+ Target rank
1197
+ 0.19
1198
+ 0.195
1199
+ 0.2
1200
+ 0.205
1201
+ 0.21
1202
+ 0.215
1203
+ 0.22
1204
+ 0.225
1205
+ Relative Error
1206
+ THOSVD
1207
+ STHOSVD
1208
+ R-STHOSVD
1209
+ Sketch-STHOSVD
1210
+ sub-Sketch-STHOSVD
1211
+ 20
1212
+ 40
1213
+ 60
1214
+ 80
1215
+ 100
1216
+ Target rank
1217
+ 0.045
1218
+ 0.05
1219
+ 0.055
1220
+ 0.06
1221
+ Relative Error
1222
+ THOSVD
1223
+ STHOSVD
1224
+ R-STHOSVD
1225
+ Sketch-STHOSVD
1226
+ sub-Sketch-STHOSVD
1227
+ 20
1228
+ 40
1229
+ 60
1230
+ 80
1231
+ 100
1232
+ Target rank
1233
+ 1.45
1234
+ 1.5
1235
+ 1.55
1236
+ 1.6
1237
+ 1.65
1238
+ 1.7
1239
+ 1.75
1240
+ 1.8
1241
+ 1.85
1242
+ 1.9
1243
+ 1.95
1244
+ Relative Error
1245
+ 10-3
1246
+ THOSVD
1247
+ STHOSVD
1248
+ R-STHOSVD
1249
+ Sketch-STHOSVD
1250
+ sub-Sketch-STHOSVD
1251
+ 20
1252
+ 40
1253
+ 60
1254
+ 80
1255
+ 100
1256
+ Target rank
1257
+ 10-1
1258
+ 100
1259
+ Running Time
1260
+ THOSVD
1261
+ STHOSVD
1262
+ R-STHOSVD
1263
+ Sketch-STHOSVD
1264
+ sub-Sketch-STHOSVD
1265
+ 20
1266
+ 40
1267
+ 60
1268
+ 80
1269
+ 100
1270
+ Target rank
1271
+ 10-1
1272
+ 100
1273
+ Running Time
1274
+ THOSVD
1275
+ STHOSVD
1276
+ R-STHOSVD
1277
+ Sketch-STHOSVD
1278
+ sub-Sketch-STHOSVD
1279
+ 20
1280
+ 40
1281
+ 60
1282
+ 80
1283
+ 100
1284
+ Target rank
1285
+ 10-1
1286
+ 100
1287
+ Running Time
1288
+ THOSVD
1289
+ STHOSVD
1290
+ R-STHOSVD
1291
+ Sketch-STHOSVD
1292
+ sub-Sketch-STHOSVD
1293
+ Fig. 4 Results comparison on a 200×200×200 sparse tensor with noise in terms of numerical
1294
+ error (first row) and CPU time (second row).
1295
+ [24], i.e.,
1296
+ ˆ
1297
+ X = X + δK,
1298
+ where K is a standard Gaussian tensor and δ is used to control the noise
1299
+ level. Let δ = 10−3 and keep the rest parameters the same as the settings
1300
+ in the previous experiment. The relative error and running time of different
1301
+ algorithms are shown in Figure 4. In Figure 4, we see that noise indeed affects
1302
+ the accuracy of the low-rank approximation, especially when the gap is small.
1303
+ However, the influence of noise does not change the conclusion obtained on
1304
+ the case without noise. The accuracy of our sub-Sketch-STHOSVD algorithm
1305
+ is the highest among the randomized algorithms. As γ increases, sub-Sketch-
1306
+ STHOSVD can achieve almost the same accuracy as that of THOSVD and
1307
+ STHOSVD in a comparable CPU time against R-STHOSVD.
1308
+
1309
+ 18
1310
+ Sketching Algorithms for Low-Rank Tucker Approximation
1311
+ 5.3 Real-world data tensor
1312
+ In this experiment, we test the performance of different algorithms on a colour
1313
+ image, called HDU picture1, with a size of 1200 × 1800 × 3. We also evaluate
1314
+ the proposed sketching algorithms on the widely used YUV Video Sequences2.
1315
+ Taking the ‘hall monitor’ video as an example and using the first 30 frames, a
1316
+ three order tensor with a size of 144 × 176 × 30 is then formed for this test.
1317
+ Firstly, we conduct an experiment on the HDU picture with target rank
1318
+ (500, 500, 3), and compare the PSNR and CPU time of different algorithms.
1319
+ The experimental result is shown in Figure 5, which shows that the PSNR
1320
+ of sub-Sketch-STHOSVD, THOSVD and STHOSVD is very similar (i.e.,
1321
+ ∼ 40) and that sub-Sketch-STHOSVD is more efficient in terms of CPU
1322
+ time. R-STHOSVD and Sketch-STHOSVD are also very efficient compared to
1323
+ sub-Sketch-STHOSVD; however, the PSNR they achieve is 5 dB less than sub-
1324
+ Sketch-STHOSVD. Then we conduct separate numerical experiments on the
1325
+ HDU picture and the ‘hall monitor’ video clip as the target rank increases, and
1326
+ compare these algorithms in terms of the relative error, CPU time and PSNR,
1327
+ see Figure 6 and Figure 7. These experimental results again demonstrate
1328
+ the superiority (i.e., low error and good approximation with high efficiency)
1329
+ of the proposed sub-Sketch-STHOSVD algorithm in computing the Tucker
1330
+ decomposition approximation.
1331
+ Original
1332
+ THOSVD (2.62; 40.61)
1333
+ STHOSVD (1.89; 40.65)
1334
+ R-STHOSVD
1335
+ Sketch-STHOSVD
1336
+ sub-Sketch-STHOSVD
1337
+ (0.61; 34.72)
1338
+ (0.55; 34.63)
1339
+ (0.84; 39.97)
1340
+ Fig. 5 Results comparison on a HDU picture with a size of 1200 × 1800 × 3 in terms of
1341
+ PSNR (i.e., peak signal-to-noise ratio) and CPU time. The target rank is (500,500,3). The
1342
+ two values in e.g. (2.62; 40.61) represent the CPU time and the PSNR, respectively.
1343
+ In the last experiment, a larger-scale real-world tensor data is used. We
1344
+ choose a color image (called the LONDON picture) with a size of 4775×7155×3
1345
+ as the test image and consider the influence of noise. The LONDON picture
1346
+ 1https://www.hdu.edu.cn/landscape
1347
+ 2http://trace.eas.asu.edu/yuv/index.html
1348
+
1349
+ Sketching Algorithms for Low-Rank Tucker Approximation
1350
+ 19
1351
+ 0
1352
+ 200
1353
+ 400
1354
+ 600
1355
+ 800
1356
+ 1000
1357
+ Target rank
1358
+ -11
1359
+ -10
1360
+ -9
1361
+ -8
1362
+ -7
1363
+ -6
1364
+ -5
1365
+ -4
1366
+ Relative Error
1367
+ THOSVD
1368
+ STHOSVD
1369
+ R-STHOSVD
1370
+ Sketch-STHOSVD
1371
+ sub-Sketch-STHOSVD
1372
+ 0
1373
+ 200
1374
+ 400
1375
+ 600
1376
+ 800
1377
+ 1000
1378
+ Target rank
1379
+ 0.5
1380
+ 1
1381
+ 1.5
1382
+ 2
1383
+ 2.5
1384
+ 3
1385
+ 3.5
1386
+ Running Time
1387
+ THOSVD
1388
+ STHOSVD
1389
+ R-STHOSVD
1390
+ Sketch-STHOSVD
1391
+ sub-Sketch-STHOSVD
1392
+ 0
1393
+ 200
1394
+ 400
1395
+ 600
1396
+ 800
1397
+ 1000
1398
+ Target rank
1399
+ 20
1400
+ 25
1401
+ 30
1402
+ 35
1403
+ 40
1404
+ 45
1405
+ 50
1406
+ 55
1407
+ PSNR
1408
+ THOSVD
1409
+ STHOSVD
1410
+ R-STHOSVD
1411
+ Sketch-STHOSVD
1412
+ sub-Sketch-STHOSVD
1413
+ Fig. 6 Results comparison on a HDU picture with size of 1200 × 1800 × 3 in terms of
1414
+ numerical error (left), CPU time (middle) and PSNR (right). The HDU picture is with target
1415
+ rank (r, r, 3), r ∈ [50, 1000].
1416
+ 0
1417
+ 20
1418
+ 40
1419
+ 60
1420
+ 80
1421
+ 100
1422
+ Target rank
1423
+ -9
1424
+ -8
1425
+ -7
1426
+ -6
1427
+ -5
1428
+ -4
1429
+ -3
1430
+ Relative Error
1431
+ THOSVD
1432
+ STHOSVD
1433
+ R-STHOSVD
1434
+ Sketch-STHOSVD
1435
+ sub-Sketch-STHOSVD
1436
+ 0
1437
+ 20
1438
+ 40
1439
+ 60
1440
+ 80
1441
+ 100
1442
+ Target rank
1443
+ 0.005
1444
+ 0.01
1445
+ 0.015
1446
+ 0.02
1447
+ 0.025
1448
+ 0.03
1449
+ 0.035
1450
+ 0.04
1451
+ 0.045
1452
+ 0.05
1453
+ 0.055
1454
+ Running Time
1455
+ THOSVD
1456
+ STHOSVD
1457
+ R-STHOSVD
1458
+ Sketch-STHOSVD
1459
+ sub-Sketch-STHOSVD
1460
+ 0
1461
+ 20
1462
+ 40
1463
+ 60
1464
+ 80
1465
+ 100
1466
+ Target rank
1467
+ 10
1468
+ 15
1469
+ 20
1470
+ 25
1471
+ 30
1472
+ 35
1473
+ PSNR
1474
+ THOSVD
1475
+ STHOSVD
1476
+ R-STHOSVD
1477
+ Sketch-STHOSVD
1478
+ sub-Sketch-STHOSVD
1479
+ Fig. 7 Results comparison on the ‘hall monitor’ grey video with size of 144 × 176 × 30 in
1480
+ terms of numerical error (left), CPU time (middle) and PSNR (right). The ‘hall monitor’
1481
+ grey video is with target rank (r, r, 10), r ∈ [5, 100].
1482
+ with white Gaussian noise is generated using the awgn(X,SNR) built-in function
1483
+ in MATLAB. We set the target rank as (50,50,3) and SNR to 20. The results
1484
+ comparisons without and with white Gaussian noise are respectively shown in
1485
+ Figure 8 and Figure 9 in terms of the CPU time and PSNR. Moreover, we also
1486
+ test the algorithms on the LONDON picture as the target rank increases. The
1487
+ results regarding the relative error, the CPU time and the PSNR are reported
1488
+ in Tables 5, 6 and 7, respectively. On the whole, the results again show the
1489
+ consistent performance of the proposed methods.
1490
+
1491
+ 20
1492
+ Sketching Algorithms for Low-Rank Tucker Approximation
1493
+ Original
1494
+ THOSVD (154.95; 24.07)
1495
+ STHOSVD (49.34; 24.09)
1496
+ R-STHOSVD
1497
+ Sketch-STHOSVD
1498
+ sub-Sketch-STHOSVD
1499
+ (1.29; 21.27)
1500
+ (1.17; 21.09)
1501
+ (1.29; 23.65)
1502
+ Fig. 8 Results comparison on LONDON picture with a size of 4775 × 7155 × 3 in terms of
1503
+ CPU time and PSNR. The target rank is (50,50,3).
1504
+ Noisy picture(PSNR=16.92)
1505
+ THOSVD (160.59; 20.54)
1506
+ STHOSVD (50.16; 20.54)
1507
+ R-STHOSVD
1508
+ Sketch-STHOSVD
1509
+ sub-Sketch-STHOSVD
1510
+ (1,25; 19.37)
1511
+ (1.15; 19.25)
1512
+ (1.45; 20.45)
1513
+ Fig. 9 Results comparison on LONDON picture with a size of 4775 × 7155 × 3 and white
1514
+ Gaussian noise in terms of CPU time and PSNR. The target rank is (50,50,3).
1515
+ In summary, the numerical results show the superiority of the sub-sketch
1516
+ STHOSVD algorithm for large-scale tensors with or without noise. We can see
1517
+ that sub-Sketch-STHOSVD could achieve close approximations to that of the
1518
+ deterministic algorithms in a time similar to other randomized algorithms.
1519
+
1520
+ Sketching Algorithms for Low-Rank Tucker Approximation
1521
+ 21
1522
+ Table 5 Results comparison in terms of the relative error on the LONDON picture with a
1523
+ size of 4775 × 7155 × 3 as the target rank increases.
1524
+ Target rank
1525
+ THOSVD
1526
+ STHOSVD
1527
+ R-STHOSVD
1528
+ Sketch-STHOSVD
1529
+ sub-Sketch-STHOSVD
1530
+ (10,10,10)
1531
+ 0.019037
1532
+ 0.019025
1533
+ 0.031000
1534
+ 0.040006
1535
+ 0.020756
1536
+ (20,20,20)
1537
+ 0.012669
1538
+ 0.012644
1539
+ 0.023467
1540
+ 0.027398
1541
+ 0.013703
1542
+ (30,30,30)
1543
+ 0.010168
1544
+ 0.010124
1545
+ 0.018354
1546
+ 0.020451
1547
+ 0.010965
1548
+ (40,40,40)
1549
+ 0.008630
1550
+ 0.008599
1551
+ 0.015792
1552
+ 0.017029
1553
+ 0.009443
1554
+ (50,50,50)
1555
+ 0.007576
1556
+ 0.007532
1557
+ 0.013917
1558
+ 0.015333
1559
+ 0.008286
1560
+ (60,60,60)
1561
+ 0.006778
1562
+ 0.006710
1563
+ 0.012967
1564
+ 0.013589
1565
+ 0.007359
1566
+ (70,70,70)
1567
+ 0.006119
1568
+ 0.006049
1569
+ 0.011813
1570
+ 0.011886
1571
+ 0.006687
1572
+ (80,80,80)
1573
+ 0.005532
1574
+ 0.005491
1575
+ 0.010658
1576
+ 0.011148
1577
+ 0.006123
1578
+ (90,90,90)
1579
+ 0.005076
1580
+ 0.005023
1581
+ 0.010018
1582
+ 0.010378
1583
+ 0.005602
1584
+ (100,100,100)
1585
+ 0.004669
1586
+ 0.004619
1587
+ 0.009249
1588
+ 0.009578
1589
+ 0.005172
1590
+ Table 6 Results comparison in terms of the CPU time (in second) on the LONDON
1591
+ picture with a size of 4775 × 7155 × 3 as the target rank increases.
1592
+ Target rank
1593
+ THOSVD
1594
+ STHOSVD
1595
+ R-STHOSVD
1596
+ Sketch-STHOSVD
1597
+ sub-Sketch-STHOSVD
1598
+ (10,10,10)
1599
+ 156.13
1600
+ 49.22
1601
+ 0.94
1602
+ 0.99
1603
+ 1.12
1604
+ (20,20,20)
1605
+ 165.22
1606
+ 77.64
1607
+ 1.24
1608
+ 1.48
1609
+ 1.56
1610
+ (30,30,30)
1611
+ 241.11
1612
+ 76.57
1613
+ 1.69
1614
+ 1.39
1615
+ 1.69
1616
+ (40,40,40)
1617
+ 242.08
1618
+ 74.25
1619
+ 1.57
1620
+ 1.45
1621
+ 1.68
1622
+ (50,50,50)
1623
+ 268.71
1624
+ 72.85
1625
+ 1.51
1626
+ 1.45
1627
+ 1.80
1628
+ (60,60,60)
1629
+ 265.52
1630
+ 77.80
1631
+ 1.75
1632
+ 1.51
1633
+ 2.26
1634
+ (70,70,70)
1635
+ 241.95
1636
+ 77.82
1637
+ 1.93
1638
+ 1.78
1639
+ 2.24
1640
+ (80,80,80)
1641
+ 264.86
1642
+ 73.53
1643
+ 1.86
1644
+ 1.74
1645
+ 2.31
1646
+ (90,90,90)
1647
+ 274.73
1648
+ 72.67
1649
+ 1.93
1650
+ 1.83
1651
+ 2.16
1652
+ (100,100,100)
1653
+ 283.88
1654
+ 86.42
1655
+ 2.24
1656
+ 2.20
1657
+ 2.46
1658
+ Table 7 Results comparison in terms of the PSNR on the LONDON picture with a size
1659
+ of 4775 × 7155 × 3 as the target rank increases.
1660
+ Target rank
1661
+ THOSVD
1662
+ STHOSVD
1663
+ R-STHOSVD
1664
+ Sketch-STHOSVD
1665
+ sub-Sketch-STHOSVD
1666
+ (10,10,10)
1667
+ 20.06
1668
+ 20.07
1669
+ 17.96
1670
+ 16.86
1671
+ 19.70
1672
+ (20,20,20)
1673
+ 21.84
1674
+ 21.84
1675
+ 19.18
1676
+ 18.51
1677
+ 21.50
1678
+ (30,30,30)
1679
+ 22.79
1680
+ 22.81
1681
+ 20.25
1682
+ 19.78
1683
+ 22.46
1684
+ (40,40,40)
1685
+ 23.50
1686
+ 23.52
1687
+ 20.90
1688
+ 20.57
1689
+ 23.11
1690
+ (50,50,50)
1691
+ 24.07
1692
+ 24.09
1693
+ 21.45
1694
+ 21.03
1695
+ 23.68
1696
+ (60,60,60)
1697
+ 24.55
1698
+ 24.60
1699
+ 21.76
1700
+ 21.55
1701
+ 24.20
1702
+ (70,70,70)
1703
+ 25.00
1704
+ 25.05
1705
+ 22.16
1706
+ 22.13
1707
+ 24.61
1708
+ (80,80,80)
1709
+ 25.43
1710
+ 25.47
1711
+ 22.61
1712
+ 22.41
1713
+ 25.00
1714
+ (90,90,90)
1715
+ 25.81
1716
+ 25.85
1717
+ 22.87
1718
+ 22.72
1719
+ 25.38
1720
+ (100,100,100)
1721
+ 26.17
1722
+ 26.22
1723
+ 23.22
1724
+ 23.07
1725
+ 25.73
1726
+ 6 Conclusion
1727
+ In this paper we proposed efficient sketching algorithms, i.e., Sketch-
1728
+ STHOSVD and sub-Sketch-STHOSVD, to calculate the low-rank Tucker
1729
+ approximation of tensors by combining the two-sided sketching technique with
1730
+ the STHOSVD algorithm and using the subspace power iteration. Detailed
1731
+ error analysis is also conducted. Numerical results on both synthetic and real-
1732
+ world data tensors demonstrate the competitive performance of the proposed
1733
+ algorithms in comparison to the state-of-the-art algorithms.
1734
+ Acknowledgements
1735
+ We would like to thank the anonymous referees for their comments and sug-
1736
+ gestions on our paper, which lead to great improvements of the presentation.
1737
+
1738
+ 22
1739
+ Sketching Algorithms for Low-Rank Tucker Approximation
1740
+ G. Yu’s work was supported in part by National Natural Science Foundation
1741
+ of China (No. 12071104) and Natural Science Foundation of Zhejiang Province
1742
+ (No. LD19A010002).
1743
+ Appendix
1744
+ Lemma 1 [[25], Theorem 2] Let ̺ < k − 1 be a positive natural number and Ω ∈
1745
+ Rk×n be a Gaussian random matrix. Suppose Q is obtained from Algorithm 7. Then
1746
+ ∀A ∈ Rm×n, we have
1747
+ EΩ∥A − QQ⊤A∥2
1748
+ F ≤ (1 + f(̺, k)̟4q
1749
+ k ) · τ 2
1750
+ ̺+1(A).
1751
+ (4)
1752
+ Lemma 2 [[22], Lemma A.3] Let A ∈ Rm×n be an input matrix and ˆA = QX
1753
+ be the approximation obtained from Algorithm 7. The approximation error can be
1754
+ decomposed as
1755
+ ∥A − ˆA∥2
1756
+ F = ∥A − QQ⊤A∥2
1757
+ F + ∥X − Q⊤A∥2
1758
+ F .
1759
+ (5)
1760
+ Lemma 3 [[22], Lemma A.5] Assume Ψ ∈ Rl×n is a standard normal matrix
1761
+ independent from Ω. Then
1762
+ EΨ∥X − Q⊤A∥2
1763
+ F = f(k, l) · ∥A − QQ⊤A∥2
1764
+ F .
1765
+ (6)
1766
+ The error-bound for Algorithm 7 can be shown in Lemma 4 below.
1767
+ Lemma 4 Assume the sketch size parameter satisfies l > k + 1. Draw random
1768
+ test matrices Ω ∈ Rn×k and Ψ∈ Rl×m independently from the standard normal
1769
+ distribution. Then the rank-k approximation ˆA obtained from Algorithm 7 satisfies
1770
+ E ∥ A − ˆA ∥2
1771
+ F ≤ (1 + f(k, l)) · min
1772
+ ̺<k−1(1 + f(̺, k)̟k
1773
+ 4q) · τ 2
1774
+ ̺+1(A).
1775
+ Proof Using equations (4), (5) and (6), we have
1776
+ E ∥ A − ˆA ∥2
1777
+ F = EΩ∥A − QQ⊤A∥2
1778
+ F + EΩEΨ∥X − Q⊤A∥2
1779
+ F
1780
+ = (1 + f(k, l)) · EΩ∥A − QQ⊤A∥2
1781
+ F
1782
+ ≤ (1 + f(k, l)) · (1 + f(̺, k)̟k
1783
+ 4q) · τ 2
1784
+ ̺+1(A).
1785
+ After minimizing over eligible index ̺ < k − 1, the proof is completed.
1786
+
1787
+
1788
+ Sketching Algorithms for Low-Rank Tucker Approximation
1789
+ 23
1790
+ We are now in the position to prove Theorem 5. Combining Theorem 2
1791
+ and Lemma 4, we have
1792
+ E{Ωj}N
1793
+ j=1∥X − �
1794
+ X ∥2
1795
+ F
1796
+ =
1797
+ N
1798
+
1799
+ n=1
1800
+ E{Ωj}N
1801
+ j=1∥ ˆ
1802
+ X (n−1) − ˆ
1803
+ X (n)∥2
1804
+ F
1805
+ =
1806
+ N
1807
+
1808
+ n=1
1809
+ E{Ωj}n−1
1810
+ j=1
1811
+
1812
+ EΩn∥ ˆ
1813
+ X (n−1) − ˆ
1814
+ X (n)∥2
1815
+ F
1816
+
1817
+ =
1818
+ N
1819
+
1820
+ n=1
1821
+ E{Ωj}n−1
1822
+ j=1
1823
+
1824
+ EΩn∥G(n−1) ×n−1
1825
+ i=1 U (i)×n(I − U (n)U (n)⊤)∥2
1826
+ F
1827
+
1828
+
1829
+ N
1830
+
1831
+ n=1
1832
+ E{Ωj}n−1
1833
+ j=1
1834
+
1835
+ EΩn∥(I − U (n)U (n)⊤)G(n−1)
1836
+ (n)
1837
+ )∥2
1838
+ F
1839
+
1840
+
1841
+ N
1842
+
1843
+ n=1
1844
+ E{Ωj}n−1
1845
+ j=1 (1 + f(rn, ln)) ·
1846
+ min
1847
+ ̺n<rn−1(1 + f(̺n, rn)̟r
1848
+ 4q)
1849
+ In
1850
+
1851
+ i=rn+1
1852
+ σ2
1853
+ i (G(n−1)
1854
+ (n)
1855
+ )
1856
+
1857
+ N
1858
+
1859
+ n=1
1860
+ E{Ωj}n−1
1861
+ j=1 (1 + f(rn, ln)) ·
1862
+ min
1863
+ ̺n<rn−1(1 + f(̺n, rn)̟r4q)∆2
1864
+ n(X)
1865
+ =
1866
+ N
1867
+
1868
+ n=1
1869
+ (1 + f(rn, ln)) ·
1870
+ min
1871
+ ̺n<rn−1(1 + f(̺n, rn)̟r
1872
+ 4q)∆2
1873
+ n(X)
1874
+
1875
+ N
1876
+
1877
+ n=1
1878
+ (1 + f(rn, ln)) ·
1879
+ min
1880
+ ̺n<rn−1(1 + f(̺n, rn)̟r
1881
+ 4q)∥X − ˆ
1882
+ Xopt∥2
1883
+ F ,
1884
+ which completes the proof of Theorem 5.
1885
+ References
1886
+ [1] Comon, P.: Tensors: A brief introduction. IEEE Signal Processing Maga-
1887
+ zine. 31(3), 44-53(2014)
1888
+ [2] Hitchcock, F. L.: Multiple Invariants and Generalized Rank of a P-
1889
+ Way Matrix or Tensor. Journal of Mathematics and Physics. 7(1-4),
1890
+ 39-79(1928)
1891
+ [3] Kiers, H. A. L.: Towards a standardized notation and terminology in
1892
+ multiway analysis. Journal of Chemometrics Society. 14(3), 105-122(2000)
1893
+ [4] Tucker, L. R.: Implications of factor analysis of three-way matrices for
1894
+ measurement of change. Problems in measuring change. 15, 122-137(1963)
1895
+
1896
+ 24
1897
+ Sketching Algorithms for Low-Rank Tucker Approximation
1898
+ [5] Tucker, L. R.: Some mathematical notes on three-mode factor analysis.
1899
+ Psychometrika. 31(3), 279-311(1966)
1900
+ [6] De Lathauwer, L., De Moor, B., Vandewalle, J.: A multilinear singu-
1901
+ lar value decomposition. SIAM journal on Matrix Analysis Applications.
1902
+ 21(4), 1253-1278(2000)
1903
+ [7] Hackbusch, W., K¨uhn, S.: A new scheme for the tensor representation.
1904
+ Journal of Fourier analysis applications. 15(5), 706-722(2009)
1905
+ [8] Grasedyck, L.: Hierarchical Singular Value Decomposition of Tensors.
1906
+ SIAM journal on Matrix Analysis Applications. 31(4), 2029-2054 (2010)
1907
+ [9] Oseledets, I. V.: Tensor-train decomposition. SIAM Journal on Scientific
1908
+ Computing. 33(5), 2295-2317(2011)
1909
+ [10] De Lathauwer, L., De Moor, B., Vandewalle, J.: On the best rank-1 and
1910
+ rank-(r1, r2,...,rn) approximation of higher-order tensors. SIAM journal
1911
+ on Matrix Analysis Applications. 21(4), 1324-1342(2000)
1912
+ [11] Vannieuwenhoven, N., Vandebril, R., Meerbergen, K.: A new truncation
1913
+ strategy for the higher-order singular value decomposition. SIAM Journal
1914
+ on Scientific Computing. 34(2), A1027-A1052(2012)
1915
+ [12] Zhou, G., Cichocki, A., Xie, S.: Decomposition of big tensors with low
1916
+ multilinear rank. arXiv preprint, arXiv:1412.1885(2014)
1917
+ [13] Che, M., Wei, Y.: Randomized algorithms for the approximations of
1918
+ Tucker and the tensor train decompositions. Advances in Computational
1919
+ Mathematics. 45(1), 395-428(2019)
1920
+ [14] Minster, R., Saibaba, A. K., Kilmer, M. E.: Randomized algorithms for
1921
+ low-rank tensor decompositions in the Tucker format. SIAM Journal on
1922
+ Mathematics of Data Science. 2(1), 189-215 (2020)
1923
+ [15] Che, M., Wei, Y., Yan, H.: The computation of low multilinear rank
1924
+ approximations of tensors via power scheme and random projection.
1925
+ SIAM Journal on Matrix Analysis Applications. 41(2), 605-636 (2020)
1926
+ [16] Che, M., Wei, Y., Yan, H.: Randomized algorithms for the low multilin-
1927
+ ear rank approximations of tensors. Journal of Computational Applied
1928
+ Mathematics. 390(2), 113380(2021)
1929
+ [17] Sun, Y., Guo, Y., Luo, C., Tropp, J., Udell, M.: Low-rank tucker approx-
1930
+ imation of a tensor from streaming data. SIAM Journal on Mathematics
1931
+ of Data Science. 2(4), 1123-1150(2020)
1932
+
1933
+ Sketching Algorithms for Low-Rank Tucker Approximation
1934
+ 25
1935
+ [18] Tropp, J. A., Yurtsever, A., Udell, M., Cevher, V.: Streaming low-rank
1936
+ matrix approximation with an application to scientific simulation. SIAM
1937
+ Journal on Scientific Computing. 41(4), A2430-A2463(2019)
1938
+ [19] Malik, O. A., Becker, S.: Low-rank tucker decomposition of large tensors
1939
+ using tensorsketch. Advances in neural information processing systems.
1940
+ 31, 10116-10126 (2018)
1941
+ [20] Ahmadi-Asl, S., Abukhovich, S., Asante-Mensah, M. G., Cichocki, A.,
1942
+ Phan, A. H., Tanaka, T.: Randomized algorithms for computation of
1943
+ Tucker decomposition and higher order SVD (HOSVD). IEEE Access. 9,
1944
+ 28684-28706(2021)
1945
+ [21] Halko, N., Martinsson, P.-G., Tropp, J. A.: Finding structure with ran-
1946
+ domness: Probabilistic algorithms for constructing approximate matrix
1947
+ decompositions. SIAM review. 53(2), 217-288 (2011)
1948
+ [22] Tropp, J. A., Yurtsever, A., Udell, M., Cevher, V.: Practical sketching
1949
+ algorithms for low-rank matrix approximation. SIAM Journal on Matrix
1950
+ Analysis Applications. 38(4), 1454-1485(2017)
1951
+ [23] Rokhlin, V., Szlam, A., Tygert, M.: A randomized algorithm for princi-
1952
+ pal component analysis. SIAM Journal on Matrix Analysis Applications,
1953
+ 31(3), 1100-1124(2009)
1954
+ [24] Xiao, C., Yang, C., Li, M.: Efficient Alternating Least Squares Algorithms
1955
+ for Low Multilinear Rank Approximation of Tensors. Journal of Scientific
1956
+ Computing. 87(3), 1-25(2021)
1957
+ [25] Zhang, J., Saibaba, A. K., Kilmer, M. E., Aeron, S.: A randomized tensor
1958
+ singular value decomposition based on the t-product. Numerical Linear
1959
+ Algebra with Applications. 25(5), e2179(2018)
1960
+
99FJT4oBgHgl3EQfpCw2/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
99FJT4oBgHgl3EQfpCw2/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:99160d4abd7469d43569b83852673022f7f391d8e721189d99b48392a28ab396
3
+ size 170524
9tAyT4oBgHgl3EQfQ_bX/content/tmp_files/2301.00059v1.pdf.txt ADDED
@@ -0,0 +1,1576 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+
3
+ Describing NMR chemical exchange by effective phase diffusion approach
4
+ Guoxing Lin*
5
+ Carlson School of Chemistry and Biochemistry, Clark University, Worcester, MA 01610, USA
6
+
7
+ *Email: [email protected]
8
+
9
+ Abstract
10
+ This paper proposes an effective phase diffusion method to analyze chemical exchange in nuclear
11
+ magnetic resonance (NMR). The chemical exchange involves spin jumps around different sites where the
12
+ spin angular frequencies vary, which leads to a random phase walk viewed from the rotating frame
13
+ reference. Therefore, the random walk in phase space can be treated by the effective phase diffusion
14
+ method. Both the coupled and uncoupled phase diffusions are considered; additionally, it includes normal
15
+ diffusion as well as fractional diffusion. Based on these phase diffusion equations, the line shape of NMR
16
+ exchange spectrum can be analyzed. By comparing these theoretical results with the conventional theory,
17
+ this phase diffusion approach works for fast exchange, ranging from slightly faster than intermediate
18
+ exchange to very fast exchange. For normal diffusion models, the theoretically predicted curves agree
19
+ with those predicted from traditional models in the literature, and the characteristic exchange time
20
+ obtained from phase diffusion with a fixed jump time is the same as that obtained from the conventional
21
+ model. However, the phase diffusion with a monoexponential time distribution gives a characteristic
22
+ exchange time constant which is half of that obtained from the traditional model. Additionally, the
23
+ fractional diffusion obtains a significantly different line shape than that predicted based on normal
24
+ diffusion.
25
+ Keywords: NMR, chemical exchange, Mittag-Leffler function, phase diffusion
26
+
27
+ 1.
28
+ Introduction
29
+ Chemical exchange is a powerful nuclear magnetic resonance (NMR) technique to detect dynamics
30
+ behavior in biological and polymer systems at the atomic level [1,2,3,4]. Chemical exchange NMR
31
+ monitors spin jumping around different environmental sites due to changes in conformational or chemical
32
+ states. In chemical exchange, the angular frequency of the spin precession changes, which results in
33
+ observable line shape changes in the NMR spectrum. Although chemical exchange has been a established
34
+ tool, theoretical developments are still needed to better understand the chemical exchange NMR,
35
+ particularly for complex systems.
36
+ The characteristic exchange time could follow a complicated distribution. Many theoretical models
37
+ have been developed to analyze chemical exchanges in NMR [3, 5, 6]. The two-site exchange model based
38
+ on the modified-Bloch equation successfully interprets many NMR lines hape [5], where the jump time in
39
+ the exchange equation is a fixed constant. However, in a real system, the exchange time could follow a
40
+ distribution such as the exponential function in the Gaussian exchange model reported in [7].
41
+ Additionally, a complex exchange distribution could exist in complicated conformational change or
42
+ diffusion-induced exchange, such as Xenon diffusing in the heterogeneous system [8]. In a complex
43
+ system, a monoexponential time distribution may not be sufficient to explain the dynamics behavior. For
44
+ complicated system the time distribution function could be the Mittag-Leffler function (MLF) 𝐸𝛼 (− (
45
+ 𝑡
46
+ 𝜏)
47
+ 𝛼
48
+ )
49
+ [9,10], or a stretched exponential function (SEF) exp (− (
50
+ 𝑡
51
+ 𝜏)
52
+ 𝛼
53
+ ) , where α is the time-fractional derivative
54
+ order, and 𝜏 is the characteristic time. The MLF 𝐸𝛼(−𝑡𝛼) = ∑
55
+ (−𝑡𝛼)𝑛
56
+ Γ(𝑛𝛼+1)
57
+
58
+ 𝑛=0
59
+ , can be reduced to a SEF
60
+
61
+ 2
62
+
63
+ exp (−
64
+ 𝑡𝛼
65
+ Γ(1+𝛼)) when 𝑡 is small. The SEF exp (− (
66
+ 𝑡
67
+ 𝜏)
68
+ 𝛼
69
+ ) is the same as the Kohlrausch-Williams-Watts (KWW)
70
+ function [11,12,13,14]], a well-known time correlation function in macromolecular systems. The Mittag-
71
+ Leffler function-based distribution is heavy-tailed. Mittag Leffler function has been employed to analyze
72
+ anomalous NMR dynamics processes such as PFG anomalous diffusion [15,16], and anomalous NMR
73
+ relaxation [17,18,19,20]. Currently chemical theories of NMR are still difficult to handle these complex
74
+ distributions.
75
+ A phase diffusion method is proposed in this paper to explain the NMR chemical exchange. Most
76
+ current methods are real space approaches, such as the modified Bloch exchange equations [3,4,6], while
77
+ the Gaussian exchange model is a phase space method based on evaluating the accumulated phase
78
+ variance for the random phase process during the exchange process. As the spin phase in the chemical
79
+ exchange undergoes a random walk in the rotating frame reference, an effective phase diffusion method
80
+ will be employed in this paper to analyze the exchange. Effective phase diffusion has been applied to
81
+ analyze PFG diffusion and NMR relaxation. It has advantages over the traditional methods: It can provide
82
+ the exact phase distribution that cannot be obtained by conventional real space theoretical method;
83
+ additionally, the NMR signal can be directly obtained from vector sum by Fourier transform in phase
84
+ space, which makes the analysis intuitive and often simplifies the solving process; furthermore, the phase
85
+ diffusion method could be straightforwardly applied to anomalous dynamics process based on fractional
86
+ diffusion [18, 21, 22, 23,24,25]. Both the normal and fractional phase diffusion are considered, where the
87
+ exchange time can be a simple constant or a certain type of distribution.
88
+ Additionally, each the individual phase jump length is proportional to the jump time and the angular
89
+ frequency. Because both the jump time and angular frequency fluctuate and obey certain types of
90
+ distributions, the distribution of phase jump length could be either strongly or weakly correlated to the
91
+ jump time distribution. The phase walk with weak phase time correlation can be treated by the uncoupled
92
+ diffusion, while the strong correlation may require coupled diffusion model [26]. The traditional
93
+ uncoupled diffusion has been successful in explaining many transport phenomena. However, it is
94
+ insufficient to account for the divergence of the second moment of Levy flight processes [26], where a
95
+ coupled diffusion is needed.
96
+ The rest of the paper is organized as follows. Section 2.1 treats the simplest normal diffusion with a
97
+ fixed jump time: The obtained exchange time agrees well with the traditional two-site exchange. While
98
+ the phase diffusion with jump time distribution is presented in Section 2.2: Firstly, the general expressions
99
+ for phase evolution in chemical exchange are derived in Section 2.2.1; secondly, the normal diffusion is
100
+ presented in Section 2.2.2, with both uncoupled and coupled diffusion, and it is found that the exchange
101
+ time constant is two-time faster than that of the traditional model and the fixed jump time diffusion result;
102
+ thirdly, the fractional diffusion with MLF based jump time distribution is derived in Section 2.2.3, where
103
+ the uncoupled diffusion is handled by time-fractional diffusion equation, and the coupled fractional
104
+ diffusion is handled by coupled random walk model [27]. The results here give additional insights into
105
+ the NMR chemical exchange, which could improve the analysis of NMR and magnetic resonance imaging
106
+ (MRI) experiments, particularly in complicated systems.
107
+ 2. Theory
108
+ The chemical exchange occurs when the spin jumps among different sites where the spin precession
109
+ frequencies are different [1,2,5]. The precession frequencies of the spin moment are proportional to the
110
+ intensity of the local magnetic field, which is affected by the surrounding electron cloud and nearby spin
111
+ moments [2]. For simplicity, we consider only the basic exchange between two sites with equal
112
+ populations [3,5] in this paper, neglecting the relaxation effect. The average precession angular frequencies
113
+ for these two sites are arbitrarily set as 𝜔1 and 𝜔2 respectively, with 𝜔1 < 𝜔2 and
114
+
115
+ 3
116
+
117
+ ∆𝜔 = 𝜔2 − 𝜔1.
118
+ If the angular frequency of the rotating frame reference is set as
119
+ 𝜔1+𝜔2
120
+ 2
121
+ ; the two sites have relative
122
+ angular frequencies -𝜔0 and 𝜔0, respectively, 𝜔0 =
123
+ 𝜔2−𝜔1
124
+ 2
125
+ .
126
+
127
+ The phase of spin undergoes chemical exchange during a time interval 𝜏 changes either by 𝜔0𝜏 or
128
+ -𝜔0𝜏 depending on the site. From the traditional exchange equations for chemical exchange, the spin
129
+ always jumps to a site with a different angular frequency after a time interval 𝜏. Here, the choice for
130
+ the next sites is assumed to be random; the next site's angular frequency could be either the same or
131
+ different. This assumption may be more realistic; for instance, after a time interval 𝜏, a spin may
132
+ successfully jump to another site or return to the original site; or in a heterogeneous system, the spin
133
+ moves to a similar environment with the same frequency or a different environment with a different
134
+ frequency. The random phase jump can be viewed as a random walk process in phase space and
135
+ analyzed by phase diffusion [16,17]. Both the normal and fractional phase diffusion will be
136
+ considered in the following.
137
+ 2.1 Simple normal diffusion with a fixed jump time
138
+ If the jump time interval 𝜏 is a constant, the random phase jumps with average jump length ∆𝜙 equaling
139
+ −𝜔0𝜏 or 𝜔0𝜏. The effective phase diffusion constant 𝐷𝜙,𝑠 for such a simple normal diffusion can be obtained
140
+ by [16]
141
+
142
+
143
+
144
+ 𝐷𝜙,𝑠 =
145
+ 〈(∆𝜙)2〉
146
+ 2𝜏
147
+ =
148
+ (𝜔0𝜏)2
149
+ 2𝜏
150
+ =
151
+ 𝜔02
152
+ 2 τ,
153
+
154
+
155
+
156
+ (1)
157
+ and the normal phase diffusion equation can be described by [16,17]
158
+ 𝑑𝑃(𝜙,𝑡)
159
+ 𝑑𝑡
160
+ = 𝐷𝜙,𝑠Δ𝑃(𝜙, 𝑡),
161
+
162
+
163
+
164
+
165
+ ( 2)
166
+ where 𝜙 is the phase and 𝑃(𝜙, 𝑡) is the probability density function of spin at time t with 𝜙. The solution
167
+ of Eq. (3) is [16]
168
+ 𝑃(𝜙, 𝑡) =
169
+ 1
170
+ √4𝜋𝐷𝜙,𝑠𝑡 𝑒𝑥𝑝 [−
171
+ 𝜙2
172
+ 4𝐷𝜙,𝑠𝑡].
173
+
174
+
175
+ (3)
176
+ The total magnetization 𝑀(𝑡) is obtained by
177
+ 𝑀(𝑡) = ∫
178
+ 𝑑𝜙
179
+
180
+ −∞
181
+ 𝑒𝑖𝜙𝑃(𝜙, 𝑡) = 𝑒𝑥𝑝(−𝐷𝜙,𝑠𝑡),
182
+
183
+
184
+ (4)
185
+ which is a time domain signal. By Fourier transform, we have the frequency domain signal
186
+ 𝑆(𝜔) =
187
+ 𝐷𝜙,𝑠
188
+ 𝐷𝜙,𝑠2+𝜔2 =
189
+ 𝜔02
190
+ 2 τ
191
+ (
192
+ 𝜔02
193
+ 2 τ)
194
+ 2
195
+ +𝜔2
196
+ .
197
+
198
+
199
+
200
+ (5)
201
+ Note that both 𝜔 and 𝜔0 are the angular frequencies in the rotating frame reference.
202
+ 2.2 Diffusion with waiting time distribution
203
+ 2.2.1 General expressions for phase evolution in chemical exchange
204
+ A more realistic exchange time should follow a certain type of time distribution function 𝜑(𝑡), which is
205
+ often related to the time correlation function 𝐺(𝑡) by 𝜑(𝑡) = −
206
+ 𝑑𝐺(𝑡)
207
+ 𝑑𝑡 . A commonly used simple time
208
+ correlation function is the mono exponential distribution; in contrast, in a complicated system, it can be a
209
+ Mittage Leffler function [20] or stretched exponential function such as the KWW function [11-14].
210
+ For a spin starting jumps at a time 𝑡′ from the site with frequency 𝜔𝑖,0, the probability of acquiring
211
+ phase 𝜔𝑖,0𝑡′+ 𝜙 at time t is
212
+
213
+ 4
214
+
215
+ 𝑃𝜔𝑖,0(𝜙, 𝑡) = 𝜑(𝑡′)𝑃(𝜙, 𝑡 − 𝑡′),
216
+
217
+
218
+ (6)
219
+ where the phase change 𝜔𝑖,0𝑡′ is obtained from time 0 to time 𝑡′ when the spin stays immobile at the site,
220
+ and 𝑃(𝜙, 𝑡 − 𝑡′) is the phase PDF resulting from the diffusion, or random walk in the phase space during
221
+ 𝑡 − 𝑡′. Summing all possible magnetization vectors with different phase 𝜔𝑖,0𝑡′ + 𝜙, at time t, the net
222
+ magnetization 𝑀𝜔𝑖,0(𝑡′, 𝑡) contributed from these spins beginning to jump randomly from time 𝑡′ is
223
+ 𝑀𝜔𝑖,0(𝑡′, 𝑡) = ∫
224
+ 𝑑𝜙
225
+
226
+ −∞
227
+ 𝑒𝑖𝜔𝑖,0𝑡′+𝜙𝑃𝜔𝑖,0(𝜙, 𝑡 − 𝑡′) = 𝑒𝑖𝜔𝑖,0𝑡′𝜑(𝑡′)𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1 ,
228
+ (7)
229
+ where
230
+ 𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1 = ∫
231
+ 𝑑𝜙
232
+
233
+ −∞
234
+ 𝑒𝑖𝑘𝜙𝑃(𝜙, 𝑡 − 𝑡′).
235
+
236
+
237
+ (8)
238
+ The total magnetization from all spins in the systems at time t is
239
+ 𝑀(𝑡) = ∫ 𝑑𝑡′
240
+ 𝑡
241
+ 0
242
+ ∑ 𝑝𝑖𝑀𝜔𝑖,0(𝑡′, 𝑡)
243
+ 𝑖
244
+ ,
245
+
246
+
247
+ (9)
248
+ where 𝑝𝑖 is the population of spins at site i. For simplicity, only exchange with two equal population sites
249
+ will be considered here; let 𝜔1,0 = −𝜔0, 𝜔2,0 = 𝜔0 and all the subindexes i will be dropped out throughout
250
+ the rest of the paper. For a two-site system with equal populations 𝑝1 = 𝑝2 =
251
+ 1
252
+ 2,
253
+ 𝑀(𝑡) = ∫ 𝑑𝑡′
254
+ 𝑡
255
+ 0
256
+ 1
257
+ 2 [𝑀−𝜔0(𝑡′, 𝑡) + 𝑀𝜔0(𝑡′, 𝑡)]
258
+
259
+ = ∫ 𝑑𝑡′
260
+ 𝑡
261
+ 0
262
+
263
+ 1
264
+ 2 [𝑒−𝑖𝜔0𝑡′ + 𝑒𝑖𝜔0𝑡′] 𝜑(𝑡′)𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1
265
+ = ∫ 𝑑𝑡′
266
+ 𝑡
267
+ 0
268
+ 𝐵(𝑡′)𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1 , (10a)
269
+ where
270
+ 𝐵(𝑡′) =
271
+ 1
272
+ 2 [𝑒−𝑖𝜔0𝑡′ + 𝑒𝑖𝜔0𝑡′]𝜑(𝑡′). (10b)
273
+ Eq. (10a) involves the convolution of 𝐵(𝑡′) and 𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1. In Laplace representation [25],
274
+ 𝑀(𝑠) = 𝐵(𝑠)𝑝(𝑘, 𝑠)|𝑘=1;
275
+
276
+
277
+
278
+ (11)
279
+ in many cases (the coupled diffusion in the paper), the frequency domain signal can be obtained by the
280
+ Fourier transform of 𝑀(𝑡):
281
+ 𝑆(𝜔) = ∫
282
+ 𝑒𝑖𝜔𝑡𝑀(𝑡)𝑑𝑡
283
+
284
+ 0
285
+ = 𝐵(𝜔)𝑝(𝑘, 𝜔)|𝑘=1
286
+
287
+ (12)
288
+ 2.2.2 Normal diffusion with monoexponential distribution function
289
+ Now, let us consider if the jump time follows a monoexponential distribution 𝜑(𝑡) described by
290
+ [25]
291
+ 𝜑(𝑡) =
292
+ 1
293
+ 𝜏 exp (−
294
+ 𝑡′
295
+ 𝜏 ) ,
296
+
297
+
298
+
299
+
300
+ (13)
301
+ whose Laplace representation is
302
+ 𝜑(𝑠) =
303
+ 1
304
+ 𝑠𝜏+1
305
+
306
+
307
+
308
+
309
+
310
+ (14)
311
+ According to Eq. (10),
312
+ 𝐵(𝑡) =
313
+ 1
314
+ 2 [𝑒−𝑖𝜔0𝑡′ + 𝑒𝑖𝜔0𝑡′]
315
+ 1
316
+ 𝜏 exp (−
317
+ 𝑡′
318
+ 𝜏 ),
319
+
320
+ (15a)
321
+ whose Laplace representation is [25]
322
+
323
+ 5
324
+
325
+ 𝐵(𝑠) =
326
+ 1
327
+ 2 [
328
+ 1
329
+ 𝜏(𝑠−𝑖𝜔0)+1 +
330
+ 1
331
+ 𝜏(𝑠+𝑖𝜔0)+1] ≈
332
+ 1
333
+ 1+𝜔02𝜏2+𝜏𝑠(1−𝜔02𝜏2) =
334
+ 1
335
+ 1+𝜔02𝜏2
336
+ 1+𝑠
337
+ 𝜏(1−𝜔02𝜏2)
338
+ 1+𝜔02𝜏2
339
+ .
340
+ (15b)
341
+ I.
342
+ Uncoupled normal diffusion
343
+ The spin angular frequency is often affected by a random fluctuating magnetic field, which is produced
344
+ by surrounding spins undergoing the thermal motion [**]; additionally, the angular frequency could be
345
+ affected by the electron cloud change during the exchange process; further, the chemical exchange may
346
+ take place because the spin moves among different domains in a heterogeneous system where the
347
+ frequency fluctuating around positive or negative 𝜔0 . This angular frequency can be denoted as 𝜔, and
348
+ the average of its absolute value is 〈|𝜔|〉 = 𝜔0. Because 𝜔 is randomly fluctuating, the individual random
349
+ phase jump ∆𝜙 = 𝜔��𝑗𝑢𝑚𝑝 randomly fluctuates for each jump time 𝜏𝑗𝑢𝑚𝑝; the space and time uncoupled
350
+ phase diffusion could be applied to treat the phase random walk, a more complicated coupled diffusion
351
+ will be considered in Section in subsequence. For an uncoupled diffusion,
352
+ 〈𝜏𝑗𝑢𝑚𝑝〉 = ∫
353
+ 𝑡
354
+ 𝜏 exp (−
355
+ 𝑡
356
+ 𝜏) 𝑑𝑡 = 𝜏
357
+
358
+ 0
359
+ ,
360
+
361
+
362
+
363
+ (16)
364
+ 〈𝜏𝑗𝑢𝑚𝑝
365
+ 2
366
+ 〉 = ∫
367
+ 𝑡2
368
+ 𝜏 exp (−
369
+ 𝑡
370
+ 𝜏) 𝑑𝑡 = 2𝜏2
371
+
372
+ 0
373
+ .
374
+
375
+
376
+
377
+ (17)
378
+ The average phase jump length square 〈(∆𝜙)2〉 is
379
+
380
+ 〈(∆𝜙)2〉 = 〈(|𝜔|𝜏𝑗𝑢𝑚𝑝)2〉 = 〈𝜔2〉〈𝜏𝑗𝑢𝑚𝑝
381
+ 2
382
+ 〉 = 𝜔0
383
+ 22𝜏2 = 2𝜔0
384
+ 2𝜏2.
385
+
386
+ (18)
387
+ Such an uncoupled random walk has an effective phase diffusion constant
388
+
389
+ 𝐷𝜙 =
390
+ 〈(∆𝜙)2〉
391
+ 2〈𝜏𝑗𝑢𝑚𝑝〉 =
392
+ 〈(𝜔𝜏𝑗𝑢𝑚𝑝)2〉
393
+ 2𝜏
394
+ =
395
+ 〈𝜔2〉〈𝜏𝑗𝑢𝑚𝑝
396
+ 2
397
+
398
+ 2𝜏
399
+ =
400
+ 𝜔022𝜏2
401
+ 2𝜏
402
+ = 𝜔0
403
+ 2𝜏.
404
+
405
+
406
+ (19)
407
+ With 𝐷𝜙 , the normal phase diffusion equation can be described by [18]
408
+ 𝑑𝑃(𝜙,𝑡)
409
+ 𝑑𝑡
410
+ = 𝐷𝜙Δ𝑃(𝜙, 𝑡).
411
+
412
+
413
+
414
+
415
+ (20)
416
+ From Eq (20), the probability density function is
417
+ 𝑃(𝜙, 𝑡) =
418
+ 1
419
+ √4𝜋𝐷𝜙𝑡 𝑒𝑥𝑝 [−
420
+ 𝜙2
421
+ 4𝐷𝜙𝑡].
422
+
423
+
424
+ (21)
425
+ Substituting Eq. (21) into Eq. (8), we have
426
+ 𝑝(𝑘, 𝑡 − 𝑡′)|𝑘=1 = ∫
427
+ 𝑑𝜙
428
+
429
+ −∞
430
+ 𝑃(𝜙, 𝑡 − 𝑡′) = 𝑒𝑥𝑝[−𝐷𝜙(𝑡 − 𝑡′)],
431
+
432
+ (22)
433
+ whose Laplace transform representation is
434
+ 𝑝(𝑘, 𝑠)|𝑘=1 =
435
+ 1
436
+ 𝑠+𝐷𝜙.
437
+
438
+
439
+
440
+
441
+
442
+ (23)
443
+ Substituting Eqs. (15b) and (23) into Eq. (11) yields
444
+ 𝑀(𝑠) = 𝐵(𝑠)𝑝(𝑘, 𝑠)|𝑘=1=
445
+ 1
446
+ 1+𝜔02𝜏2
447
+ 1+𝑠
448
+ 𝜏(1−𝜔02𝜏2)
449
+ 1+𝜔02𝜏2
450
+ 1
451
+ 𝑠+𝐷𝜙.
452
+
453
+
454
+ (24)
455
+ From 𝑀(𝑠), the inverse Laplace transform gives
456
+ 𝑀(𝑡) = ∫
457
+ 𝑑𝑡
458
+
459
+ 0
460
+ 1
461
+ 𝜏(1−𝜔02𝜏2) exp (−
462
+ 𝑡′
463
+ 𝜏(1−𝜔02𝜏2)
464
+ 1+𝜔02𝜏2
465
+ ) 𝑒𝑥𝑝[−𝐷𝜙(𝑡 − 𝑡′)].
466
+ (25)
467
+
468
+ 6
469
+
470
+ Eq. (25) includes the convolution of two parts, the
471
+ 1
472
+ 𝜏(1−𝜔02𝜏2) exp (−
473
+ 𝑡′
474
+ 𝜏(1−𝜔02𝜏2)
475
+ 1+𝜔02𝜏2
476
+ ) comes from the Fourier
477
+ transform of the 𝜑(𝑡), while 𝑒𝑥𝑝[−𝐷𝜙(𝑡 − 𝑡′)] results from the phase diffusion; the Frequency domain
478
+ signal can be obtained from the Fourier Transform of expression (25) as
479
+ 𝑆(𝜔) =
480
+ 1
481
+ 1+𝜔02𝜏2
482
+ 1+[
483
+ 𝜏(1−𝜔02𝜏2)
484
+ 1+𝜔02𝜏2 ]
485
+ 2
486
+ 𝜔2
487
+
488
+ 𝐷𝜙
489
+ 𝐷𝜙2+𝜔2.
490
+
491
+
492
+ (26)
493
+ II.
494
+ Coupled normal diffusion with monoexponential distribution function
495
+ The coupled random phase walk has a joint probability function 𝜓(𝜙, 𝑡) expressed by {25}
496
+ 𝜓(𝜙, 𝑡) = 𝜑(𝑡)Φ(𝜙|𝑡),
497
+
498
+
499
+
500
+
501
+ (27)
502
+ where 𝜑(𝑡) is the waiting time function, and Φ(𝜙|𝑡) is the conditional probability that a phase jump length
503
+ 𝜙 requiring time t. In Fourier-Laplace representation, the probability density function of a coupled random
504
+ walk has been derived in Ref. [25] as
505
+ 𝑃(𝑘, 𝑠) =
506
+ Ψ(𝑘,𝑠)
507
+ 1−𝜓(𝑘,𝑠) ,
508
+
509
+
510
+
511
+
512
+ (28)
513
+ where 𝜓(𝑘, 𝑠) is the joint probability, and Ψ(𝜙, 𝑡) is the PDF for the phase displacement of the last,
514
+ incomplete walk, which is [25]
515
+ Ψ(𝜙, 𝑡) = 𝛿( 𝜙) ∫
516
+ 𝜑(𝑡′)𝑑𝑡′
517
+
518
+ 𝑡
519
+ ,
520
+
521
+
522
+
523
+ (29a)
524
+ and
525
+ Ψ(𝑘, 𝑠) =
526
+ 1−𝜑(𝑠)
527
+ 𝑠
528
+ .
529
+
530
+
531
+
532
+
533
+ (29b)
534
+ By substituting Eq. (29b) into Eq. (28), it arrives [25]
535
+ 𝑃(𝑘, 𝑠) =
536
+ Ψ(𝑘,𝑠)
537
+ 1−𝜓(𝑘,𝑠) =
538
+ 1−𝜑(𝑠)
539
+ 𝑠
540
+ 1
541
+ 1−𝜓(𝑘,𝑠).
542
+
543
+
544
+
545
+ (30)
546
+ In the chemical exchange, the joint probability could be described by
547
+ Φ(𝜙|𝑡) =
548
+ 1
549
+ 2 𝛿(|𝜙| − 𝜔0𝑡),
550
+
551
+
552
+
553
+ (31a)
554
+ 𝜓(𝜙, 𝑡) =
555
+ 1
556
+ 2 𝜑(𝑡)𝛿(|𝜙| − 𝜔0𝑡),
557
+
558
+
559
+
560
+ (31b)
561
+ and
562
+ 𝜓(𝑘, 𝑠)=∫ 𝑒𝑖𝑘𝜙−𝑠𝑡𝜓(𝜙, 𝑡)𝑑𝜙𝑑𝑡=
563
+ 1
564
+ 2 [
565
+ 1
566
+ 𝜏(𝑠−𝑖𝑘𝜔0)+1 +
567
+ 1
568
+ 𝜏(𝑠+𝑖𝑘𝜔0)+1] ≈
569
+ 1+𝜏𝑠
570
+ 1+𝑘2𝜔02𝜏2+2𝜏𝑠.
571
+
572
+ (31c)
573
+ Substitute Eq. (31c) into Eq. (30), and we get
574
+ 𝑃(𝑘, 𝑠) =
575
+ Ψ(𝑘,𝑠)
576
+ 1−𝜓(𝑘,𝑠) =
577
+ 1−𝜑(𝑠)
578
+ 𝑠
579
+ 1
580
+ 1−𝜓(𝑘,𝑠) =
581
+ 𝜏
582
+ 1−
583
+ 1+𝜏𝑠
584
+ 1+𝑘2𝜔02𝜏2+2𝜏𝑠
585
+ .
586
+
587
+ (32)
588
+ and
589
+
590
+
591
+
592
+
593
+
594
+ 𝑝(𝑘, 𝑠)|𝑘=1 =
595
+ 𝜏
596
+ 1−
597
+ 1+𝜏𝑠
598
+ 1+𝜔02𝜏2+2𝜏𝑠
599
+ .
600
+
601
+
602
+
603
+ (33)
604
+
605
+ Substituting Eqs. (15b) and (33) into Eq. (11) yields
606
+
607
+ 7
608
+
609
+
610
+ 𝑀(𝑠) =
611
+ 1+𝜏𝑠
612
+ 1+𝜔02𝜏2+2𝜏𝑠
613
+ 𝜏
614
+ 1−
615
+ 1+𝜏𝑠
616
+ 1+12𝜔02𝜏2+2𝜏𝑠
617
+ =
618
+ 𝜏(1+𝜏𝑠)
619
+ 𝜔02𝜏2+𝜏𝑠 ≈
620
+ 𝜏
621
+ 𝜏𝑠(1−𝜔02𝜏2)+𝜔02𝜏2 =
622
+ 𝜏/𝜔02𝜏2
623
+ 𝜏𝑠(1−𝜔02𝜏2)/𝜔02𝜏2+1
624
+
625
+ (34)
626
+ From 𝑀(𝑠), the inverse Laplace transform gives
627
+ 𝑀(𝑡) =
628
+ 1
629
+ 1−𝜔02𝜏2 exp (−
630
+ 𝑡
631
+ 𝜏(1−𝜔02𝜏2)
632
+ 𝜔02𝜏2
633
+ ).
634
+
635
+
636
+
637
+ (35)
638
+ The frequency domain NMR signal can be obtained from the Fourier Transform of ���(𝑡) in Eq. (35) as
639
+ 𝑆(𝜔) =
640
+ 1
641
+ 1−𝜔02𝜏2
642
+ 𝜏(1−𝜔02𝜏2)
643
+ 𝜔02𝜏2
644
+ (
645
+ 𝜏(1−𝜔02𝜏2)
646
+ 𝜔02𝜏2
647
+ )
648
+ 2
649
+ 𝜔2+1
650
+ =
651
+ 𝜏
652
+ 𝜏2(1−𝜔02𝜏2)2𝜔2+𝜔02𝜏2.
653
+
654
+ (36)
655
+ 2.2.3 Fractional phase diffusion
656
+ For a complicated system, the time correlation function may not be a simple monoexponential function,
657
+ such as the Kohlrausch-Williams-Watts (KWW) function, or Mittag-Leffler function, and the
658
+ corresponding phase diffusion could be an anomalous diffusion [21-24]. The time fractional phase
659
+ diffusion will be investigated here, and the time correlation function is assumed as a MLF,
660
+ G(t) = 𝐸𝛼 (− (
661
+ 𝑡
662
+ 𝜏)
663
+ 𝛼
664
+ ),
665
+
666
+
667
+
668
+
669
+ (37)
670
+ and its waiting time distribution function will be a heavy-tailed time distribution [27]
671
+ 𝜑𝑓(𝑡) = −
672
+ 𝑑
673
+ 𝑑𝑡 𝐸𝛼 (− (
674
+ 𝑡
675
+ 𝜏)
676
+ 𝛼
677
+ ) ,
678
+
679
+
680
+
681
+ (38)
682
+ whose Laplace transform is [25,27]
683
+ 𝜑𝑓(𝑠) =
684
+ 1
685
+ 𝑠𝛼𝜏𝛼+1.
686
+
687
+
688
+
689
+
690
+ (39)
691
+ Based on Eqs. (10b), (38) and (39), we have
692
+ 𝐵(𝑠) = 𝑅𝑒𝜑𝑓(𝑠 + 𝑖𝜔) = 𝑅𝑒 1
693
+ 2 [
694
+ 1
695
+ 𝜏𝛼
696
+ 𝜔0
697
+ 𝛼 [cos (𝜋
698
+ 2 𝛼 − 𝑠𝛼
699
+ 𝜔0) + 𝑖 sin (𝜋
700
+ 2 𝛼 − 𝑠𝛼
701
+ 𝜔0)] + 1
702
+ 𝜏𝛼
703
+ ]
704
+
705
+ 𝜔0𝛼𝜏𝛼(cos𝜋
706
+ 2𝛼+
707
+ 1
708
+ 𝜔0𝛼𝜏𝛼)
709
+ 1+𝜔02𝛼𝜏2𝛼+2𝜔0𝛼𝜏𝛼cos𝜋
710
+ 2𝛼+𝑠𝛼𝜔0𝛼−1𝜏𝛼sin𝜋
711
+ 2𝛼
712
+ 1−𝜔02𝛼𝜏2𝛼
713
+ 𝜔0𝛼𝜏𝛼cos𝜋
714
+ 2𝛼+1
715
+ =
716
+ 𝑐
717
+ 1+𝑠𝜏′ ,
718
+
719
+
720
+
721
+
722
+
723
+
724
+
725
+
726
+
727
+
728
+
729
+ (40a)
730
+ where
731
+ 𝑐 =
732
+ 𝜔0𝛼𝜏𝛼(cos𝜋
733
+ 2𝛼+
734
+ 1
735
+ 𝜔0𝛼𝜏𝛼)
736
+ 1+𝜔02𝛼𝜏2𝛼+2𝜔0𝛼𝜏𝛼cos𝜋
737
+ 2𝛼 ,
738
+
739
+
740
+
741
+
742
+
743
+
744
+ (40b)
745
+ and
746
+
747
+
748
+
749
+ 𝜏′ =
750
+ 𝛼𝜔0𝛼−1𝜏𝛼sin𝜋
751
+ 2𝛼
752
+ 1−𝜔02𝛼𝜏2𝛼
753
+ 𝜔0𝛼𝜏𝛼cos𝜋
754
+ 2𝛼+1
755
+ 1+𝜔02𝛼𝜏2𝛼+2𝜔0𝛼𝜏𝛼cos𝜋
756
+ 2𝛼 .
757
+
758
+
759
+
760
+ (40c)
761
+
762
+ I.
763
+ Uncoupled fractional diffusion
764
+
765
+
766
+ For such a time distribution function, the phase diffusion constant can be calculated according to Ref. [16,
767
+
768
+ 8
769
+
770
+ 22,23] as
771
+
772
+
773
+
774
+
775
+ 𝐷𝜙𝑓 =
776
+ 〈(∆𝜙)2〉
777
+ 2Γ(1+𝛼)𝜏𝛼.
778
+
779
+
780
+
781
+ (41a)
782
+ The average phase jump may be assumed as 〈(∆𝜙)2〉 = 𝜔0
783
+ 22𝜏2, then
784
+
785
+
786
+
787
+
788
+
789
+
790
+ 𝐷𝜙𝑓 =
791
+ 𝜔02𝜏2−𝛼
792
+ Γ(1+𝛼)𝜏𝛼 .
793
+
794
+
795
+
796
+ (41b)
797
+ With 𝐷𝜙𝑓 , the fractional phase diffusion equation can be described by [16,17,21,23,24]
798
+ 𝑡𝐷∗
799
+ 𝛼𝑃𝑓 = 𝐷𝜙𝑓Δ𝑃𝑓(𝜙, 𝑡).
800
+
801
+
802
+
803
+ (42)
804
+ where 0 < 𝛼, 𝛽 ≤ 2, 𝐷𝑓𝑟 is the rotational diffusion coefficient, a is the spherical radius, 𝑡𝐷∗
805
+ 𝛼 is the Caputo
806
+ fractional derivative defined by [22,23]
807
+ 𝑡𝐷∗
808
+ 𝛼𝑓(𝑡): = {
809
+ 1
810
+ 𝛤(𝑚−𝛼) ∫
811
+ 𝑓(𝑚)(𝜏)𝑑𝜏
812
+ (𝑡−𝜏)𝛼+1−𝑚 , 𝑚 − 1 < 𝛼 < 𝑚,
813
+ 𝑡
814
+ 0
815
+ 𝑑𝑚
816
+ 𝑑𝑡𝑚 𝑓(𝑡), 𝛼 = 𝑚,
817
+
818
+
819
+
820
+ Fourier transform of Eq. (42) give [
821
+ 𝑡𝐷∗
822
+ 𝛼𝑝(𝑘, 𝑡) = −𝐷𝜙𝑓𝑘2𝑝(𝑘, 𝑡).
823
+
824
+
825
+
826
+
827
+ (43)
828
+ The solution of Eq. (43) is 𝑝(𝑘, 𝑡) = 𝐸𝛼[−𝐷𝜙𝑓𝑘2𝑡𝛼] [16,17], whose Laplace representation is [22,23,25]
829
+
830
+
831
+
832
+
833
+
834
+ 𝑝(𝑘, 𝑠) =
835
+ 𝑆𝛼−1
836
+ 𝑆𝛼+𝐷𝜙𝑓𝑘2,
837
+
838
+
839
+
840
+
841
+ (44)
842
+ then
843
+
844
+
845
+
846
+
847
+
848
+ 𝑝(𝑘, 𝑠)|𝑘=1 =
849
+ 𝑆𝛼−1
850
+ 𝑆𝛼+𝐷𝜙𝑓.
851
+
852
+
853
+
854
+
855
+ (45)
856
+ Substituting Eqs. (40) and (45) into Eq. (11), we get
857
+
858
+ 𝑀(𝑠) =
859
+ 𝑐
860
+ 1+𝑠𝜏′
861
+ 𝑆𝛼−1
862
+ 𝑆𝛼+𝐷𝜙𝑓,
863
+
864
+
865
+
866
+
867
+ (46)
868
+ whose inverse Laplace transform gives
869
+ M(𝑡) = ∫ 𝑑𝑡′
870
+ 𝑡
871
+ 0
872
+ 𝑐
873
+ 𝜏′ exp (−
874
+ 𝑡′
875
+ 𝜏′)𝐸𝛼[−𝐷𝜙𝑓(𝑡 − 𝑡′)𝛼].
876
+
877
+
878
+ (47)
879
+ The NMR signal can be obtained from the Fourier transform of M(𝑡), which is
880
+ 𝑆(𝜔) = 𝐵(𝜔) ∙ 𝐸(𝜔) =
881
+ 𝑐
882
+ 1+𝜏′2𝜔2 ∙
883
+ 𝜔𝛼−1(
884
+ 1
885
+ 𝐷𝜙𝑓
886
+ ) sin(𝜋
887
+ 2𝛼)
888
+ 𝜔2𝛼(
889
+ 1
890
+ 𝐷𝜙𝑓
891
+ )
892
+ 2
893
+ +2𝜔𝛼(
894
+ 1
895
+ 𝐷𝜙𝑓
896
+ ) cos(𝜋
897
+ 2𝛼)+1
898
+ . (48)
899
+ II. Coupled fractional diffusion
900
+ Similarly, for the coupled normal diffusion, the joint probability could be described by [25]
901
+ Φ(𝜙|𝑡) =
902
+ 1
903
+ 2 𝛿(|𝜙| − 𝜔0𝑡),
904
+
905
+
906
+
907
+
908
+ (49a)
909
+ 𝜓(𝜙, 𝑡) =
910
+ 1
911
+ 2 𝜑(𝑡)𝛿(|𝜙| − 𝜔0𝑡),
912
+
913
+
914
+
915
+ (49b)
916
+ 𝜓(𝑘, 𝑠)=∫ 𝑒𝑖𝑘𝜙−𝑠𝑡𝜓(𝜙, 𝑡)𝑑𝜙𝑑𝑡=
917
+ 1
918
+ 2 [
919
+ 1
920
+ 𝜏𝛼(𝑠−𝑖𝑘𝜔0)𝛼+1 +
921
+ 1
922
+ 𝜏𝛼(𝑠+𝑖𝑘𝜔0)𝛼+1].
923
+ (49c)
924
+ and
925
+
926
+ 9
927
+
928
+ 𝜓(1, 𝑠) ≈
929
+ 1
930
+ 2 [
931
+ 1
932
+ 𝜏𝛼(𝑠−𝑖𝜔0)𝛼+1 +
933
+ 1
934
+ 𝜏𝛼(𝑠+𝑖𝜔0)𝛼+1].
935
+
936
+
937
+
938
+ (50)
939
+ Compared to Eq. (40a), it is obvious that
940
+ 𝜓(1, 𝑠) = 𝐵(𝑠) =
941
+ 𝑐
942
+ 1+𝑠𝜏′ .
943
+
944
+
945
+
946
+ (51)
947
+ Substituted Eq. (51) into Eq. (30), we get
948
+ 𝑝(𝑘, 𝑠)|𝑘=1 =
949
+ Ψ(𝑘,𝑠)
950
+ 1−𝜓(1,𝑠) =
951
+ 1−𝜑(𝑠)
952
+ 𝑠
953
+ 1
954
+ 1−𝜓(1,𝑠)=
955
+ 𝜏𝛼𝑠𝛼−1
956
+ 1���
957
+ 𝑐
958
+ 1+𝑠𝜏′
959
+ .
960
+
961
+
962
+ (52)
963
+ Eq. (52) can be substituted into Eq. (11) to give
964
+ 𝑀(𝑠) = 𝐵(𝑠)𝑝(𝑘, 𝑠)|𝑘=1 =
965
+ 𝑐
966
+ 1+𝑠𝜏′
967
+ 𝜏𝛼𝑠𝛼−1
968
+ 1−
969
+ 𝑐
970
+ 1+𝑠𝜏′
971
+ =
972
+ 𝑐𝜏𝛼𝑠𝛼−1
973
+ 1+𝑠𝜏′−𝑐 =
974
+ 1
975
+ 𝑆𝛼−1
976
+ 𝑐𝜏𝛼
977
+ 1+𝑠𝜏′−𝑐=
978
+ 1
979
+ 𝑆𝛼−1
980
+ 𝑐𝜏𝛼
981
+ 1−𝑐
982
+ 1+𝑠 𝜏′
983
+ 1−𝑐
984
+ ,
985
+
986
+ (53)
987
+ whose inverse Laplace transform yields
988
+ 𝑀(𝑡) = ∫ 𝑑𝑡′
989
+ 1
990
+ Γ(1−𝛼) 𝑡′−𝛼 𝑐
991
+ 𝑡
992
+ 0
993
+ 𝜏𝛼 1
994
+ 𝜏′ exp (−
995
+ 𝑡−𝑡′
996
+ 𝜏′
997
+ 1−𝑐
998
+ ) .
999
+
1000
+
1001
+ (54)
1002
+ The Fourier transform of 𝑀(𝑡) gives NMR frequency domain signal
1003
+ 𝑆(𝜔) = sin (
1004
+ 𝜋
1005
+ 2 𝛼) |𝜔|𝛼−1 𝑐𝜏𝛼
1006
+ 𝜏′
1007
+ 𝜏′
1008
+ 1−𝑐
1009
+ 1+( 𝜏′
1010
+ 1−𝑐)
1011
+ 2
1012
+ 𝜔2 = sin (
1013
+ 𝜋
1014
+ 2 𝛼) |𝜔|𝛼−1
1015
+ 𝑐𝜏𝛼
1016
+ 1−𝑐
1017
+ 1+( 𝜏′
1018
+ 1−𝑐)
1019
+ 2
1020
+ 𝜔2.
1021
+ (55)
1022
+ 3. Results
1023
+
1024
+ A phase diffusion equation method is proposed to describe the effect of chemical exchange on NMR
1025
+ spectrum, based on uncoupled and coupled normal and fractional diffusions. The exchange between two
1026
+ sites with equal populations is considered, and the theoretical expressions are organized in Table 1.
1027
+ Table 1
1028
+ Comparison of theoretical NMR line shape expressions from phase diffusion method to traditional results for
1029
+ chemical exchange between two sites with equal populations.
1030
+ Frequency domain signal expression from phase diffusion results:
1031
+ Simple phase diffusion with a constant jump time
1032
+ 𝑆(𝜔) =
1033
+ 𝐷𝜙,𝑠
1034
+ 𝐷𝜙,𝑠2+𝜔2, 𝐷𝜙,𝑠 =
1035
+ 𝜔02
1036
+ 2 τ.
1037
+ Normal phase diffusion with monoexponential function
1038
+ Uncoupled diffusion
1039
+ 𝑆(𝜔) =
1040
+ 1
1041
+ 1+𝜔02𝜏2
1042
+ 1+[
1043
+ 𝜏(1−𝜔02𝜏2)
1044
+ 1+𝜔02𝜏2 ]
1045
+ 2
1046
+ 𝜔2
1047
+ 𝐷𝜙
1048
+ 𝐷𝜙2+𝜔2, 𝐷𝜙 = 𝜔0
1049
+ 2𝜏.
1050
+ Coupled diffusion
1051
+ 𝑆(𝜔) =
1052
+ 𝜏
1053
+ 𝜏2(1−𝜔0
1054
+ 2𝜏2)2𝜔2+𝜔0
1055
+ 2𝜏2.
1056
+ Fractional phase diffusion with heavy-tailed time distribution
1057
+ 𝑐 =
1058
+ 𝜔0𝛼𝜏𝛼(cos𝜋
1059
+ 2𝛼+
1060
+ 1
1061
+ 𝜔0𝛼𝜏𝛼)
1062
+ 1+𝜔0
1063
+ 2𝛼𝜏2𝛼+2𝜔0
1064
+ 𝛼𝜏𝛼cos𝜋
1065
+ 2𝛼 , 𝜏′ =
1066
+ 𝛼𝜔0𝛼−1𝜏𝛼sin𝜋
1067
+ 2𝛼
1068
+ 1−𝜔02𝛼𝜏2𝛼
1069
+ 𝜔0𝛼𝜏𝛼cos𝜋
1070
+ 2𝛼+1
1071
+ 1+𝜔0
1072
+ 2𝛼𝜏2𝛼+2𝜔0
1073
+ 𝛼𝜏𝛼cos𝜋
1074
+ 2𝛼
1075
+ Uncoupled diffusion
1076
+ 𝑆(𝜔) =
1077
+ 𝑐
1078
+ 1+𝜏′2𝜔2 ∙
1079
+ 𝜔𝛼−1(
1080
+ 1
1081
+ 𝐷𝜙𝑓) sin(𝜋
1082
+ 2𝛼)
1083
+ 𝜔2𝛼(
1084
+ 1
1085
+ 𝐷𝜙𝑓)
1086
+ 2
1087
+ +2𝜔𝛼(
1088
+ 1
1089
+ 𝐷𝜙𝑓)cos(𝜋
1090
+ 2𝛼)+1
1091
+ , 𝐷𝜙 =
1092
+ 𝜔02𝜏2
1093
+ Γ(1+𝛼)𝜏𝛼
1094
+ Coupled diffusion
1095
+ 𝑆(𝜔) = sin (𝜋
1096
+ 2 𝛼) |𝜔|𝛼−1
1097
+ 𝑐𝜏𝛼
1098
+ 1 − 𝑐
1099
+ 1 + ( 𝜏′
1100
+ 1 − 𝑐)
1101
+ 2
1102
+ 𝜔2
1103
+
1104
+ Frequency domain signal expression from traditional method:
1105
+
1106
+ 𝑆(𝜔) =
1107
+ 𝜔02𝜏
1108
+ 2
1109
+ [𝜏
1110
+ 2(𝜔0
1111
+ 2−𝜔2)]
1112
+ 2
1113
+ +𝜔2 [3,4,5]
1114
+
1115
+ 10
1116
+
1117
+
1118
+
1119
+ phasediff_tau_2overkex_kex30dw_beta_0.75_122722 - Copy
1120
+ Traditional
1121
+ Fixed_jump_time_diffusion
1122
+ Uncoupled_normal_diffusion
1123
+ Coupled_Normal_diffusion
1124
+ Uncoupled_fractional_diffusion
1125
+ Coupled_fractional_diffusion
1126
+ 0
1127
+ 0.01
1128
+ 0.02
1129
+ 0.03
1130
+ 0.04
1131
+ 0.05
1132
+ 0.06
1133
+ 0.07
1134
+ 0.08
1135
+ -150
1136
+ -100
1137
+ -50
1138
+ 0
1139
+ 50
1140
+ 100
1141
+ 150
1142
+ /2 (Hz)
1143
+ S()
1144
+ a
1145
+  = 2'
1146
+   traditional model, fixed time diffusion
1147
+ '  coupled and uncoupled
1148
+ norrmal and fractional diffusion
1149
+  = 2' =(15)
1150
+ phasediff_tau_2overkex_kex5dw_beta_0.75_122722 - Copy
1151
+ Traditional
1152
+ Fixed_jump_time_diffusion
1153
+ Uncoupled_normal_diffusion
1154
+ Coupled_Normal_diffusion
1155
+ Uncoupled_fractional_diffusion
1156
+ Coupled_fractional_diffusion
1157
+ 0
1158
+ 0.01
1159
+ 0.02
1160
+ 0.03
1161
+ 0.04
1162
+ 0.05
1163
+ -150
1164
+ -100
1165
+ -50
1166
+ 0
1167
+ 50
1168
+ 100
1169
+ 150
1170
+ S()
1171
+ /2 (Hz)
1172
+  = 2' =(2.5)
1173
+ b
1174
+   traditional model, fixed time diffusion
1175
+ '  coupled and uncoupled
1176
+ norrmal and fractional diffusion
1177
+
1178
+ 0
1179
+ 0.005
1180
+ 0.01
1181
+ 0.015
1182
+ 0.02
1183
+ -150
1184
+ -100
1185
+ -50
1186
+ 0
1187
+ 50
1188
+ 100
1189
+ 150
1190
+ phasediff_tau_2overkex_kex2dw_beta_0.75_122722 - Copy
1191
+ Traditional
1192
+ Fixed_jump_time_diffusion
1193
+ Uncoupled_normal_diffusion
1194
+ Coupled_Normal_diffusion
1195
+ Uncoupled_fractional_diffusion
1196
+ Coupled_fractional_diffusion
1197
+ S()
1198
+ /2 (Hz)
1199
+ c
1200
+  = 2' = 1 
1201
+ 0
1202
+ 0.001
1203
+ 0.002
1204
+ 0.003
1205
+ 0.004
1206
+ 0.005
1207
+ 0.006
1208
+ 0.007
1209
+ -150
1210
+ -100
1211
+ -50
1212
+ 0
1213
+ 50
1214
+ 100
1215
+ 150
1216
+ phasediff_tau_2overkex_kex1dw_beta_0.75_122722 - Copy
1217
+ Traditional
1218
+ Fixed_jump_time_diffusion
1219
+ Uncoupled_normal_diffusion
1220
+ Coupled_Normal_diffusion
1221
+ Uncoupled_fractional_diffusion
1222
+ Coupled_fractional_diffusion
1223
+ /2 (Hz)
1224
+ S()
1225
+ d
1226
+  = 2' =1(0.5)
1227
+
1228
+ 0
1229
+ 0.001
1230
+ 0.002
1231
+ 0.003
1232
+ 0.004
1233
+ 0.005
1234
+ -150
1235
+ -100
1236
+ -50
1237
+ 0
1238
+ 50
1239
+ 100
1240
+ 150
1241
+ phasediff_tau_2overkex_kex0.6dw_beta_0.75_122722 - Copy
1242
+ Traditional
1243
+ Fixed_jump_time_diffusion
1244
+ Uncoupled_normal_diffusion
1245
+ Coupled_Normal_diffusion
1246
+ Uncoupled_fractional_diffusion
1247
+ Coupled_fractional_diffusion
1248
+ S()
1249
+ /2 (Hz)
1250
+ e
1251
+  = 2' = 1 (0.3)
1252
+ tau = 2/kex = 2/0.6 dw
1253
+ 0
1254
+ 0.002
1255
+ 0.004
1256
+ 0.006
1257
+ 0.008
1258
+ 0.01
1259
+ -150
1260
+ -100
1261
+ -50
1262
+ 0
1263
+ 50
1264
+ 100
1265
+ 150
1266
+ phasediff_tau_2overkex_kex0.1dw_beta_0.75_122722 - Copy
1267
+ Traditional
1268
+ Fixed_jump_time_diffusion
1269
+ Uncoupled_normal_diffusion
1270
+ Coupled_Normal_diffusion
1271
+ Uncoupled_fractional_diffusion
1272
+ Coupled_fractional_diffusion
1273
+ S()
1274
+ /2 (Hz)
1275
+ f
1276
+  = 2' =(0.05 )
1277
+
1278
+ Fig. 1 The comparison among the various theoretical results obtained from the phase diffusion models and those
1279
+ obtained by the traditional two-site exchange model, all equations listed in Table 1, with ∆𝜔/2𝜋 = 100 Hz, and 𝛼 = 0.75
1280
+ for fractional phase diffusion.
1281
+
1282
+
1283
+
1284
+
1285
+
1286
+
1287
+
1288
+ 11
1289
+
1290
+ 4. Discussion
1291
+
1292
+ In rotating frame reference, the spin phase in chemical exchange undergoes random phase jumps,
1293
+ which can be intrinsically describe by either uncoupled effective phase diffusion equation or coupled
1294
+ random walk.
1295
+ Figure 1 shows the comparison among the various theoretical results obtained from the phase diffusion
1296
+ models and those obtained by the traditional two-site exchange model, all equations listed in Table 1. From
1297
+ Figure 1, when the exchange is sufficiently fast, 𝜏 = 2𝜏′ ≤ 1/∆𝜔, the theoretical curves from diffusion with
1298
+ a fixed jump time, uncoupled and coupled normal diffusion almost overlap with that predicted from the
1299
+ traditional model. However, the exchange time constant 𝜏 for the traditional model and the fixed time
1300
+ diffusion is two times as 𝜏′ for the coupled and uncoupled normal diffusion with the monoexponential
1301
+ distribution. The difference in exchange time could be explained by the following: the effective phase
1302
+ diffusion constant is
1303
+ 𝜔02
1304
+ 2 τ for diffusion with a fixed jump time τ; in contrast, it is 𝜔0
1305
+ 2τ for the uncoupled
1306
+ diffusion with a monoexponential time distribution. The two-time difference in diffusion coefficients
1307
+ resulted from the 〈𝜏𝑗𝑢𝑚𝑝
1308
+ 2
1309
+ 〉 = ∫
1310
+ 𝑡2
1311
+ 𝜏 exp (−
1312
+ 𝑡
1313
+ 𝜏) 𝑑𝑡 = 2𝜏2
1314
+
1315
+ 0
1316
+ , while in is the fixed time jump 〈𝜏𝑗𝑢𝑚𝑝
1317
+ 2
1318
+ 〉 = 𝜏2. The same
1319
+ phase diffusion coefficient 𝜔0
1320
+ 2τ has been used in Ref. [17] to obtain NMR relaxation expressions, which
1321
+ replicate the traditional NMR relaxation theories; these NMR relaxation expressions have been verified by
1322
+ numerous experimental results; although this theoretical and experimental confirm is from relaxation
1323
+ NMR, it still provide a strong support to select 𝜔0
1324
+ 2τ rather than
1325
+ 𝜔02
1326
+ 2 τ as a phase diffusion coefficient,
1327
+ considering both the exchange and relaxation are random phase walk processes. Therefore, in the analysis
1328
+ of NMR chemical exchange line shape, the exchange time constant could be a two-time difference
1329
+ depending on the employed models.
1330
+ Additionally, in Figure 1, the exchange line shapes in normal diffusion and fractional diffusion are
1331
+ significantly different. The spectrum line from coupled fractional diffusion is broader than that of
1332
+ uncoupled fractional diffusion, which may be reasonable because there is a more direct effect of heavy-
1333
+ tailed time distribution on the phase length in the coupled fractional diffusion than that of uncoupled
1334
+ fractional diffusion. Meanwhile, the effect of coupled and uncoupled diffusion on the NMR line shape
1335
+ is different in normal and fractional diffusions; the difference between the coupled and uncoupled
1336
+ diffusion is negligible in normal diffusion but significant in fractional diffusion.
1337
+ Both the theoretical curves from the coupled and uncoupled fractional phase diffusion become
1338
+ narrower when the fractional derivative parameter 𝛼 decreases. The overlapped curves in Figure 2 imply
1339
+ the fractional diffusion results reduce to the normal diffusion results when 𝛼 = 1. While, Figure 3 shows
1340
+ the changes in coupled and uncoupled fractional diffusion among different fractional derivative orders, 𝛼
1341
+ = 1, 0.9, 0.75 and 0.5. The smaller the 𝛼 is, the broader the NMR peak is. Additionally, the middle part and
1342
+ the end part of the fractional diffusion curves have different features: the middle part is a narrow peak,
1343
+ while the end parts are broad shoulders. The narrower peak could come from fast exchange time, while
1344
+ broader end shoulders come from slow exchange. In the view of the traditional model, this could be
1345
+ interpreted as a bimodal exchange. However, both the fast and slow exchange times come from the same
1346
+ heavy-tailed time distribution.
1347
+ The diffusion method proposed here shows excellent results in the fast exchange range, but it
1348
+ encounters challenges in slow exchange. This difficulty in slow exchange results from that the diffusion
1349
+ limit is not met because the experimental time window in NMR is not infinite. It requires further effort to
1350
+ overcome the hurdle. The current method can be combined with other anomalous diffusion models, such
1351
+ as the fractal derivative [28,29,30]. Further research is needed to understand and apply the models,
1352
+
1353
+ 12
1354
+
1355
+ particularly the fractional diffusion model, and to extend the current method for multiple sites and unequal
1356
+ population exchange.
1357
+
1358
+
1359
+
1360
+ 0
1361
+ 0.002
1362
+ 0.004
1363
+ 0.006
1364
+ 0.008
1365
+ 0.01
1366
+ 0.012
1367
+ -150
1368
+ -100
1369
+ -50
1370
+ 0
1371
+ 50
1372
+ 100
1373
+ 150
1374
+ phasediff_tau_2overkex_kex2dw_beta_1_122722 3:20:13 PM 12/29/2022
1375
+ Uncoupled_normal_diffusion
1376
+ Uncoupled_fractional_diffusion
1377
+ ' = 1/  =
1378
+ S()
1379
+ /2 (Hz)
1380
+ a
1381
+
1382
+ 0
1383
+ 0.002
1384
+ 0.004
1385
+ 0.006
1386
+ 0.008
1387
+ 0.01
1388
+ 0.012
1389
+ -150
1390
+ -100
1391
+ -50
1392
+ 0
1393
+ 50
1394
+ 100
1395
+ 150
1396
+ phasediff_tau_2overkex_kex2dw_beta_1_122722
1397
+ Coupled_Normal_diffusion
1398
+ Coupled_fractional_diffusion
1399
+ S()
1400
+ /2 (Hz)
1401
+ b
1402
+ ' = 1/  =
1403
+
1404
+
1405
+ Fig. 2 The fractional diffusion results reduce to the normal diffusion results when 𝛼 = 1, and ∆𝜔/2𝜋 = 100 Hz.
1406
+
1407
+ 0
1408
+ 0.005
1409
+ 0.01
1410
+ 0.015
1411
+ 0.02
1412
+ -100
1413
+ -50
1414
+ 0
1415
+ 50
1416
+ 100
1417
+ Uncoupled Fractional Diffusion
1418
+  = 
1419
+  = 
1420
+  = 
1421
+  = 
1422
+ S()
1423
+ a
1424
+ /2 (Hz)
1425
+ ' = 1   =
1426
+ ' = 1/
1427
+ 0
1428
+ 0.005
1429
+ 0.01
1430
+ 0.015
1431
+ 0.02
1432
+ -100
1433
+ -50
1434
+ 0
1435
+ 50
1436
+ 100
1437
+ Coupled Fractional Diffusion
1438
+  = 
1439
+  = 
1440
+  = 
1441
+  = 
1442
+ S()
1443
+ b
1444
+ /2 (Hz)
1445
+ ' = 1/
1446
+
1447
+
1448
+ Fig. 3 The changes in coupled and uncoupled fractional diffusion among different fractional derivative orders, 𝛼 = 1,
1449
+ 0.9, 0.75 and 0.5, and ∆𝜔/2𝜋 = 100 Hz.
1450
+
1451
+
1452
+
1453
+
1454
+
1455
+
1456
+ 13
1457
+
1458
+ 5. Conclusion
1459
+ This paper proposes a phase diffusion method to describe the chemical exchange NMR spectrum. The
1460
+ major conclusions are summarized in the following:
1461
+ 1. This method directly analyzes the spin system evolution in phase space rather than real space used
1462
+ by most other traditional models.
1463
+ 2. The line shape difference between coupled and uncoupled phase diffusion is not obvious in
1464
+ normal diffusion but significant in fractional diffusion.
1465
+ 3. There is a significant difference in the line shape between the normal and fractional diffusions.
1466
+ 4. Unlike the traditional method, the exchange time constant can follow certain types of distributions.
1467
+ Additionally, the exchange time constant is two times faster based on the monoexponential time
1468
+ distribution than that obtained by the traditional model.
1469
+ 5. The method could be extended to multiple sites and unequal population chemical exchange.
1470
+ Furthermore, this phase diffusion method could be combined with other phase diffusion equations
1471
+ in relaxation and PFG diffusion to deal with more complicated scenarios.
1472
+
1473
+
1474
+
1475
+
1476
+
1477
+
1478
+
1479
+
1480
+
1481
+
1482
+
1483
+
1484
+
1485
+
1486
+
1487
+
1488
+
1489
+
1490
+
1491
+
1492
+
1493
+
1494
+
1495
+
1496
+
1497
+
1498
+
1499
+
1500
+
1501
+
1502
+
1503
+
1504
+
1505
+
1506
+ 14
1507
+
1508
+ References
1509
+
1510
+ 1. A. Abragam, Principles of Nuclear Magnetism, Clarendon Press, Oxford, 1961.
1511
+ 2. C. P. Slichter. Principles of magnetic resonance, Springer series in Solid‐State Sciences, Vol.
1512
+ 1, Ed by M. Cardoua, P. Fulde and H. J. Queisser, Springer‐Verlag, Berlin (1978).
1513
+ 3. A. G. Palmer, H. Koss, Chapter Six - Chemical Exchange, Editor(s): A. J. Wand, Methods in
1514
+ Enzymology, Academic Press, Volume 615, 2019, 177-236.
1515
+ 4. J. I. Kaplan, G. Fraenkel, NMR of Chemically Exchanging Systems, Academic Press, New
1516
+ York, 1980.
1517
+ 5. C. S. Johnson, Chemical rate processes and magnetic resonance, Adv. Magn. Reson. 1, 33
1518
+ (1965).
1519
+ 6. N. Daffern, C. Nordyke, M. Zhang, A. G. Palmer, J. E. Straub. Dynamical Models of Chemical
1520
+ Exchange in Nuclear Magnetic Resonance Spectroscopy, The Biophysicist 3(1) (2022): 13-34
1521
+ 7. J. M. Schurr, B. S. Fujimoto, R. Diaz, B. H. Robinson. 1999. Manifestations of slow site exchange
1522
+ processes in solution NMR: a continuous Gaussian exchange model, J. Magn. Reson. 140
1523
+ (1999) 404–431.
1524
+ 8. G. Lin, A. A. Jones. A lattice model for the simulation of one and two dimensional 129Xe
1525
+ exchange spectra produced by translational diffusion, Solid State Nuclear Magnetic
1526
+ Resonance. 26(2) (2004) 87-98.
1527
+ 9. R. Gorenflo, A.A. Kilbas, F. Mainardi, S.V. Rogosin. Mittag-Leffler Functions, Related Topics
1528
+ and Applications; Springer: Berlin, 2014.
1529
+ 10. T. Sandev, Z. Tomovsky, Fractional equations and models. Theory and applications, Springer
1530
+ Nature Switzerland AG, Cham, Switzerland, 2019.
1531
+ 11. R. Kohlrausch, Theorie des elektrischen Rückstandes in der Leidner Flasche, Annalen der
1532
+ Physik und Chemie. 91 (1854) 179–213.
1533
+ 12. G. Williams, D. C. Watts, Non-Symmetrical Dielectric Relaxation Behavior Arising from a
1534
+ Simple Empirical Decay Function, Transactions of the Faraday Society 66 (1970) 80–85.
1535
+ 13. T. R. Lutz, Y. He, M. D. Ediger, H. Cao, G. Lin, A. A. Jones, Macromolecules 36 (2003) 1724.
1536
+ 14. E. Krygier, G. Lin, J. Mendes, G. Mukandela, D. Azar, A.A. Jones, J. A.Pathak, R. H. Colby, S.
1537
+ K. Kumar, G. Floudas, R. Krishnamoorti, R. Faust, Macromolecules 38 (2005), 7721.
1538
+ 15. G. Lin, General pulsed-field gradient signal attenuation expression based on a fractional
1539
+ integral modified-Bloch equation, Commu Nonlinear Sci. Numer. Simul. 63 (2018) 404-420..
1540
+ 16. G. Lin, An effective phase shift diffusion equation method for analysis of PFG normal and
1541
+ fractional diffusions, J. Magn. Reson. 259 (2015) 232–240.
1542
+ 17. G. Lin, Describing NMR relaxation by effective phase diffusion equation, Communications in
1543
+ Nonlinear Science and Numerical Simulation. 99 (2021) 105825.
1544
+ 18. R. L. Magin, Weiguo Li, M. P. Velasco, J. Trujillo, D. A. Reiter, A. Morgenstern, R. G. Spencer,
1545
+ Anomalous NMR relaxation in cartilage matrix components and native cartilage: Fractional-
1546
+ order models, J. Magn. Reson. 210 (2011)184-191.
1547
+
1548
+ 15
1549
+
1550
+
1551
+ 19. T. Zavada, N. Südland, R. Kimmich, T.F. Nonnenmacher, Propagator representation of
1552
+ anomalous diffusion: The orientational structure factor formalism in NMR, Phys. Rev. 60
1553
+ (1999) 1292-1298.
1554
+ 20. G. Lin, Describe NMR relaxation by anomalous rotational or translational diffusion, Commu
1555
+ Nonlinear Sci. Numer. Simul. 72 (2019) 232.
1556
+ 21. W. Wyss, J. Math. Phys. (1986) 2782-2785.
1557
+ 22. A. I. Saichev, G.M. Zaslavsky, Fractional kinetic equations: Solutions and applications. Chaos
1558
+ 7 (1997) 753–764.
1559
+ 23. R. Gorenflo, F. Mainardi, Fractional Diffusion Processes: Probability Distributions and
1560
+ Continuous Time Random Walk, in: Lecture Notes in Physics, No 621, Springer-Verlag, Berlin,
1561
+ 2003, pp. 148–166.
1562
+ 24. F. Mainardi, Yu. Luchko, G. Pagnini, The fundamental solution of the space-time fractional
1563
+ diffusion equation, Fract. Calc. Appl. Anal. 4 (2001) 153–192.
1564
+ 25. Y. Povstenko. Linear Fractional Diffusion-Wave Equation for Scientists and Engineers,
1565
+ Birkhäuser, New York, 2015.
1566
+ 26. R. Metzler, J. Klafter, The random walk’s guide to anomalous diffusion: a fractional dynamics
1567
+ approach, Phys. Rep. 339 (2000) 1–77.
1568
+ 27. G. Germano, M. Politi, E. Scalas, R. L. Schilling. Phys Rev E 2009;79:066102.
1569
+ 28. W. Chen, Time space fabric underlying anomalous diffusion, Chaos Solitons Fractals 28 (2006)
1570
+ 923.
1571
+ 29. W. Chen, H. Sun, X. Zhang, D. Korošak, Anomalous diffusion modeling by fractal and
1572
+ fractional derivatives, Comput. Math. Appl. 5 (5) (2010) 1754–1758.
1573
+ 30. H. Sun, M.M. Meerschaert, Y. Zhang, J. Zhu, W. Chen, A fractal Richards’ equation to capture
1574
+ the non-Boltzmann scaling of water transport in unsaturated media, Adv. Water Resour. 52
1575
+ (2013) 292–295.
1576
+
B9FQT4oBgHgl3EQfNza6/content/2301.13273v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:5c095e2eec9a0acab55a0fce87404221faff6bb1201c383ef634897691828ffd
3
+ size 999109
B9FQT4oBgHgl3EQfNza6/content/tmp_files/2301.13273v1.pdf.txt ADDED
The diff for this file is too large to render. See raw diff
 
B9FQT4oBgHgl3EQfNza6/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
B9FQT4oBgHgl3EQfNza6/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:23bf556e08c24a06de86c6004ca0fa54745b612266a65149236336be39051469
3
+ size 309174
BdE2T4oBgHgl3EQfRge6/content/tmp_files/2301.03782v1.pdf.txt ADDED
@@ -0,0 +1,1366 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Multiple phenotypes in HL60 leukemia cell population
2
+ Yue Wang1,2, Joseph X. Zhou3, Edoardo Pedrini3, Irit Rubin3, May Khalil3, Hong
3
+ Qian2, and Sui Huang3
4
+ 1Department of Computational Medicine, University of California, Los Angeles,
5
+ California, United States of America
6
+ 2Department of Applied Mathematics, University of Washington, Seattle,
7
+ Washington, United States of America
8
+ 3Institute for Systems Biology, Seattle, Washington, United States of America
9
+ Abstract
10
+ Recent studies at individual cell resolution have revealed phenotypic heterogene-
11
+ ity in nominally clonal tumor cell populations. The heterogeneity affects cell growth
12
+ behaviors, which can result in departure from the idealized exponential growth. Here
13
+ we measured the stochastic time courses of growth of an ensemble of populations of
14
+ HL60 leukemia cells in cultures, starting with distinct initial cell numbers to capture
15
+ the departure from the exponential growth model in the initial growth phase. De-
16
+ spite being derived from the same cell clone, we observed significant variations in the
17
+ early growth patterns of individual cultures with statistically significant differences in
18
+ growth kinetics and the presence of subpopulations with different growth rates that
19
+ endured for many generations. Based on the hypothesis of existence of multiple inter-
20
+ converting subpopulations, we developed a branching process model that captures the
21
+ experimental observations.
22
+ 1
23
+ Introduction
24
+ Cancer has long been considered a genetic disease caused by oncogenic mutations in so-
25
+ matic cells that confer a proliferation advantage. According to the clonal evolution theory,
26
+ accumulation of random genetic mutations produces cell clones with cancerous cell phe-
27
+ notype. Specifically, cells with the novel genotype(s) may display increased proliferative
28
+ fitness and gradually out-grow the normal cells, break down tissue homeostasis and gain
29
+ other cancer hallmarks [15]. In this view, a genetically distinct clone of cells dominates the
30
+ cancer cell population and is presumed to be uniform in terms of the phenotype of indi-
31
+ vidual cells within an isogenic clone. In this traditional paradigm, non-genetic phenotypic
32
+ variation within one clone is not taken into account.
33
+ 1
34
+ arXiv:2301.03782v1 [q-bio.PE] 10 Jan 2023
35
+
36
+ With the advent of systematic single-cell resolution analysis, however, non-genetic cell
37
+ heterogeneity within clonal (cancer) cell populations is found to be universal [33]. This
38
+ feature led to the consideration of the possibility of biologically (qualitatively) distinct
39
+ (meta)stable cell subpopulations due to gene expression noise, representing intra-clonal
40
+ variability of features beyond the rapid random micro-fluctuations.
41
+ Hence, transitions
42
+ between the subpopulations, as well as heterotypic interactions among them may influence
43
+ cell growth, migration, drug resistance, etc. [39, 13, 9]. Thus, an emerging view is that
44
+ cancer is more akin to an evolving ecosystem [11] in which cells form distinct subpopulations
45
+ with persistent characteristic features that determine their mode of interaction, directly
46
+ or indirectly via competition for resources [10, 36]. However, once non-genetic dynamics
47
+ is considered, cell “ecology” differs fundamentally from the classic ecological system in
48
+ macroscopic biology: the subpopulations can reversibly switch between each other whereas
49
+ species in an ecological population do not convert between each other [7]. This affords
50
+ cancer cell populations a remarkable heterogeneity, plasticity and evolvability, which may
51
+ play important roles in their growth and in the development of resistance to treatment
52
+ [30].
53
+ Many new questions arise following the hypothesis that phenotypic heterogeneity and
54
+ transitions between phenotypes within one genetic clone are important factors in cancer.
55
+ Can tumors arise, as theoretical considerations indicate, because of a state conversion
56
+ (within one clone) to a phenotype capable of faster, more autonomous growth as opposed
57
+ to acquisition of a new genetic mutation that confers such a selectable phenotype [55,
58
+ 1, 18, 34, 33, 56, 23, 41]? Is the macroscopic, apparently sudden outgrowth of a tumor
59
+ driven by a new fastest-growing clone (or subpopulation) taking off exponentially, or due
60
+ to the cell population reaching a critical mass that permits positive feedback between its
61
+ subpopulations that stimulates outgrowth, akin to a collectively autocatalytic set [17]?
62
+ Should therapy target the fastest growing subpopulations, or target the interactions and
63
+ interconversions of cancer cells?
64
+ At the core of these deliberations is the fundamental question on the mode of tumor
65
+ cell population growth that now must consider the influence of inherent phenotypic hetero-
66
+ geneity of cells and the non-genetic (hence potentially reversible) inter-conversion of cells
67
+ between the phenotypes that manifest various growth behaviors and the interplay between
68
+ these two modalities.
69
+ Traditionally tumor growth has been described as following an exponential growth law,
70
+ motivated by the notion of uniform cell division rate for each cell, i.e. a first order growth
71
+ kinetics [29]. But departure from the exponential model has long been noted. To better fit
72
+ experimental data, two major modifications have been developed, namely the Gompertz
73
+ model and the West law model [53]. While no one specific model can adequately describe
74
+ any one tumor, each model highlights certain aspects of macroscopic tumor kinetics, mainly
75
+ the maximum size and the change in growth rate at different stages. These models however
76
+ are not specifically motivated by cellular heterogeneity. Assuming non-genetic heterogene-
77
+ ity with transitions between the cell states, the population behavior is influenced by many
78
+ 2
79
+
80
+ intrinsic and extrinsic factors that are both variable and unpredictable at the single-cell
81
+ level. Thus, unlike macroscopic population dynamics [43], tumor growth cannot be ad-
82
+ equately captured by a deterministic model, but a stochastic cell and population level
83
+ kinetic model is more realistic.
84
+ Using stochastic processes in modeling cell growth via clonal expansion has a long
85
+ history [54]. An early work is the Luria-Delbr¨uck model, which assumes cells grow deter-
86
+ ministically, with wildtype cells mutating and becoming (due to rare and quasi-irreversible
87
+ mutations) cells with a different phenotype randomly [28]. Since then, there have been
88
+ many further developments that incorporate stochastic elements into the model, such as
89
+ those proposed by Lea and Coulson [25], Koch [22], Moolgavkar and Luebeck [27], and
90
+ Dewanji et al. [8]. We can find various stochastic processes: Poisson processes [2], Markov
91
+ chains [14], and branching processes [19], or even random sums of birth-death processes [8],
92
+ all playing key roles in the mathematical theories of cellular clonal growth and evolution.
93
+ These models have been applied to clinical data on lung cancer [31], breast cancer [37],
94
+ and treatment of cancer [38].
95
+ At single-cell resolution, another cause for departure from exponential growth is the
96
+ presence of positive (growth promoting) cell-cell interactions (Allee effect) in the early
97
+ phase of population growth, such that cell density plays a role in stimulating division,
98
+ giving rise to the critical mass dynamics [20, 24].
99
+ To understand the intrinsic tumor growth behavior (change of tumor volume over time)
100
+ it is therefore essential to study tumor cell populations in culture which affords detailed
101
+ quantitative analysis of cell numbers over time, unaffected by the tumor microenvironment,
102
+ and to measure departure from exponential growth.
103
+ This paper focuses on stochastic
104
+ growth of clonal but phenotypically heterogeneous HL60 leukemia cells with near single-cell
105
+ sensitivities in the early phase of growth, that is, in sparse cultures. We and others have in
106
+ the past years noted that at the level of single cells, each cell behaves akin to an individual,
107
+ differently from another, which can be explained by the slow correlated transcriptome-wide
108
+ fluctuations of gene expression [4, 26]. Given the phenotypic heterogeneity and anticipated
109
+ functional consequences, grouping of cells is necessary. Such classification would require
110
+ molecular cell markers for said functional implication, but such markers are often difficult
111
+ to determine a priori.
112
+ Here, since most pertinent to cancer biology, we directly use a
113
+ functional marker that is of central relevance for cancer: cell division, which maps into cell
114
+ population growth potential — in brief “cell growth”.
115
+ Therefore, we monitored longitudinally the growth of cancer cell populations seeded at
116
+ very small numbers of cells (1, 4, or 10 cells) in statistical ensembles of microcultures (wells
117
+ on a plate of wells). We found evidence that clonal HL60 leukemia cell populations contain
118
+ subpopulations that exhibit diverse growth patterns.
119
+ Based on statistical analysis, we
120
+ propose the existence of three distinctive cell phenotypic states with respect to cell growth.
121
+ We show that a branching process model captures the population growth kinetics of a
122
+ population with distinct cell subpopulations. Our results suggest that the initial phase cell
123
+ growth (“take-off” of a cell culture) in the HL60 leukemic cells is predominantly driven by
124
+ 3
125
+
126
+ the fast-growing cell subpopulation. Reseeding experiments revealed that the fast-growing
127
+ subpopulation could maintain its growth rate over several cell generations, even after the
128
+ placement in a new environment. Our observations underscore the need to not only target
129
+ the fast-growing cells but also the transition to them from the other cell subpopulations.
130
+ 2
131
+ Results
132
+ 2.1
133
+ Experiment of the cell population growth from distinct initial cell
134
+ numbers.
135
+ To expose the variability of growth kinetics as a function of initial cell density N0 (“initial
136
+ seed number”), HL60 cells were sorted into wells of a 384-well plate (0.084 cm2 area)
137
+ to obtain “statistical ensembles” of replicate microcultures (wells) of the same condition,
138
+ distinct only by N0. Based on prior titration experiments to determine ranges of interest
139
+ for N0 and statistical power, for this experiment we plated 80 wells with N0 = 10 cells
140
+ (N0 = 10-cell group), 80 wells with N0 = 4 cells (N0 = 4-cell group), and 80 wells with
141
+ N0 = 1 cell (N0 = 1-cell group). Cells were grown in the same conditions for 23 days (for
142
+ details of cell culture and sorting, see the Methods section). Digital images were taken
143
+ every 24 hours for each well from Day 4 on, and the area occupied by cells in each well
144
+ was determined using computational image analysis. We had previously determined that
145
+ one area unit equals approximately 500 cells. This is consistent and readily measurable
146
+ because the relatively rigid and uniformly spherical HL60 cells grow as a non-adherent
147
+ “packed” monolayer at the bottom of the well. Note that we are interested in the initial
148
+ exponential growth (and departure from it) and not in the latter phases when the culture
149
+ becomes saturated as has been the historical focus of analysis (see Introduction).
150
+ Wells that have reached at least 5 area units were considered for the characterization
151
+ of early phase (before plateau) growth kinetics by plotting the areas in logarithmic scale as
152
+ a function of time (Fig. 1). All the N0 = 10-cell wells required 3.6-4.6 days to grow from
153
+ 5 area units to 50 area units (mean=4.05, standard deviation=0.23). For the N0 = 1-cell
154
+ wells, we observed a diversity of behaviors. While some of the cultures only took 3.5-5
155
+ days to grow from 5 area units to 50 area units, others needed 6-7.2 days (mean=5.02,
156
+ standard deviation=0.75). The N0 = 4-cell wells had a mean=4.50 days and standard
157
+ deviation=0.44 to reach that same population size.
158
+ To examine the exponential growth model, in Fig. 2 (left panel), we plotted the per
159
+ capita growth rate versus cell population size, where each point represents a well (popu-
160
+ lation) at a time point. As expected, as the population became crowded, the growth rate
161
+ decreased toward zero. But in the earlier phase, many populations in the N0 = 1-cell group
162
+ had a lower per capita growth rate than those in the N0 = 10-cell group, even at the same
163
+ population size – thus departing from the expected behavior of exponential growth. The
164
+ weighted Welch’s t-test showed that the difference in these growth rates was significant
165
+ (see the Methods section).
166
+ 4
167
+
168
+ While qualitative differences in the behaviors of cultures with different initial seeding
169
+ cell numbers N0 can be expected for biological reasons (see below), in the elementary
170
+ exponential growth model, the difference of growth rate should disappear when populations
171
+ with distinct seeding numbers are aligned for the same population size that they have
172
+ reached as in Fig. 2. A simple possibility is that the deviations of expected growth rates
173
+ emanate from difference in cell-intrinsic properties.
174
+ Some cells grew faster, with a per
175
+ capita growth rate of 0.6 ∼ 0.9 (all N0 = 10-cell wells and some N0 = 1-cell wells), while
176
+ some cells grew slower, with a per capita growth rate of 0.3 ∼ 0.5 (some of the N0 = 1-
177
+ cell wells). In other words, there is intrinsic heterogeneity in the cell population that is
178
+ not “averaged out” in the culture with low N0, and the sampling process exposes these
179
+ differences between the cells that appear to be relatively stable.
180
+ To illustrate the inherent diversity of initial growth rates, in Fig. 3 (left panel), we
181
+ display the daily cell-occupied areas plotted on a linear scale starting from Day 4. All wells
182
+ with seed of N0 = 10 or N0 = 4 cells grew exponentially. Among the N0 = 1-cell wells,
183
+ 14 populations died out. Four wells in the N0 = 1-cell group had more than 10 cells on
184
+ Day 8 but never grew exponentially, and had fewer than 1000 cells after 15 days (on Day
185
+ 23). For these non-growing or slow-growing N0 = 1-cell wells, the per capita growth rate
186
+ was 0 ∼ 0.2. In comparison, all the N0 = 10-cell wells needed at most 15 days to reach
187
+ the carrying capacity (around 80 area units, or 40000 cells). See Table 1 for a summary of
188
+ the N0 = 1-cell group’s growth patterns. This behavior is not idiosyncratic to the culture
189
+ system because they recapitulate a pilot experiment performed in the larger scale format
190
+ of 96-well plates (not shown).
191
+ From the above experimental observations, we asserted that there might be at least
192
+ three stable cell growth phenotypes in a population: a fast type, whose growth rate was
193
+ 0.6 ∼ 0.9/day for non-crowded conditions; a moderate type, whose growth rate was 0.3 ∼
194
+ 0.5/day for non-crowded conditions; and a slow type, whose growth rate was 0 ∼ 0.2/day
195
+ for the non-crowded population.
196
+ The graphs of Fig. 3 also revealed other phenomena of growth kinetics: (1) Most
197
+ N0 = 4-cell wells plateaued by Day 14 to Day 17, but some lagged significantly behind.
198
+ (2) Similarly, four wells in the N0 = 1-cell group exhibited longer lag-times before the
199
+ exponential growth phase, and never reached half-maximal cell numbers by Day 23. These
200
+ outliers reveal intrinsic variability and were taken into account in the parameter scanning
201
+ (see the Methods section).
202
+ 2.2
203
+ Reseeding experiments revealing the enduring intrinsic growth pat-
204
+ terns.
205
+ When a well in the N0 = 1-cell group had grown to 10 cells, population behavior was
206
+ still different from those in the N0 = 10-cell group at the outset. In view of the spate of
207
+ recent results revealing phenotypic heterogeneity, we hypothesized that the difference was
208
+ cell-intrinsic as opposed to being a consequence of the environment (e.g., culture medium
209
+ 5
210
+
211
+ Growth pattern
212
+ Well label
213
+ Day 1
214
+ Day 8
215
+ Day 14
216
+ Day 19
217
+ Day 23
218
+ No growth,
219
+ extinction
220
+ 162,167,170,176,
221
+ 177,179,182,183,
222
+ 186,201,234,236,
223
+ 239,240
224
+ 1
225
+ <10
226
+ <10
227
+ ∼0
228
+ Empty
229
+ Slow growth,
230
+ no exponential
231
+ growth
232
+ 165
233
+ 1
234
+ 89
235
+ ∼300
236
+ ∼350
237
+ ∼500
238
+ 166
239
+ 1
240
+ 36
241
+ ∼110
242
+ ∼120
243
+ ∼150
244
+ 178
245
+ 1
246
+ 43
247
+ ∼140
248
+ ∼170
249
+ ∼200
250
+ 211
251
+ 1
252
+ 16
253
+ ∼90
254
+ ∼200
255
+ ∼400
256
+ Delayed
257
+ exponential
258
+ growth
259
+ 163
260
+ 1
261
+ 12
262
+ ∼130
263
+ ∼300
264
+ ∼5000
265
+ 181
266
+ 1
267
+ 44
268
+ ∼270
269
+ ∼550
270
+ ∼5500
271
+ 193
272
+ 1
273
+ 25
274
+ ∼200
275
+ ∼800
276
+ ∼9000
277
+ 204
278
+ 1
279
+ 21
280
+ ∼100
281
+ ∼600
282
+ ∼6000
283
+ Normal
284
+ exponential
285
+ growth
286
+ 200 and
287
+ many others
288
+ 1
289
+ ∼130
290
+ ∼20000
291
+ ∼40000
292
+ (full)
293
+ ∼40000
294
+ (full)
295
+ Table 1: The population of some wells in the N0 = 1-cell group in the growth experiment
296
+ with different initial cell numbers, where ∼ meant approximate cell number. These wells
297
+ illustrated different growth patterns from those wells starting with N0 = 10 or N0 = 4
298
+ cells. Such differences implied that cells from wells with different initial cell numbers were
299
+ essentially different.
300
+ 6
301
+
302
+ Time (days) to
303
+ reach one half area
304
+ 11
305
+ 12
306
+ 13
307
+ 14
308
+ 15
309
+ 16–20
310
+ >20
311
+ Faster wells
312
+ 26
313
+ 2
314
+ 1
315
+ 2
316
+ 1
317
+ 0
318
+ 0
319
+ Slower wells
320
+ 0
321
+ 0
322
+ 0
323
+ 1
324
+ 1
325
+ 25
326
+ 5
327
+ Table 2: The distribution of time needed for each well to reach the “half area” population
328
+ size in the reseeding experiment. We reseeded equal numbers of cells that grew faster (from
329
+ a full well) and cells that grew slower (from a half-full well), and cultivated them under the
330
+ same new fresh medium environment to compare their intrinsic growth rates. The results
331
+ showed that faster growing cells, even reseeded, still grew faster.
332
+ in N0 = 1 vs N0 = 10 -cell wells).
333
+ To test our hypothesis and exclude differences in the culture environment as determi-
334
+ nants of growth behavior, we reseeded the cells that exhibited the different growth rates
335
+ in fresh cultures. We started with a number of N0 = 1-cell wells. After a period of almost
336
+ 3 weeks, again some wells showed rapid proliferation, with cells covering the well, while
337
+ others were half full and yet others wells were almost empty. We collected cells from the full
338
+ and half-full wells and reseeded them into 32 wells each (at about N0 = 78 cells per well).
339
+ These 64 wells were monitored for another 20 days. We found that most wells reseeded
340
+ from the full well took around 11 days to reach the population size of a half-full well, while
341
+ most wells reseeded from the half-full well required around 16 ∼ 20 days to reach the same
342
+ half full well population size. Five wells reseeded from the half-full wells were far from even
343
+ reaching half full well population size by Day 20 (see Table 2). Permutation test showed
344
+ that this difference in growth rate was significant (see the Methods section).
345
+ This reseeding experiment shows that the difference in growth rate was maintained
346
+ over multiple generations, even after slowing down in the plateau phase (full well) and
347
+ was maintained when restarting a microculture at low density in fresh medium devoid of
348
+ secreted cell products. Therefore, it is plausible that there exists endogenous heterogeneity
349
+ of growth phenotypes in the clonal HL60 cell line and that these distinct growth phenotypes
350
+ are stable for at least 15 ∼ 20 cell generations.
351
+ 2.3
352
+ Quantitative analysis of experimental results.
353
+ In the experiments with different initial cell numbers N0, we observed at least three patterns
354
+ with different growth rates, and the reseeding showed that these growth patterns were
355
+ endogenous to the cells. Therefore, we propose that each growth pattern discussed above
356
+ corresponded to a cell phenotype that dominated the population: fast, moderate, and slow.
357
+ In the initial seeding of cells that varies N0, the cells were randomly chosen (by FACS);
358
+ thus, their intrinsic growth phenotypes were randomly distributed. During growth, the
359
+ population of a well would be dominated by the fastest type that existed in the seeding
360
+ cells, thus qualitatively, we have following scenarios: (1) A well in the N0 = 10-cell group
361
+ 7
362
+
363
+ almost certainly had at least one initial cell of fast type, and the population would be
364
+ dominated by fast type cells. Different wells had almost the same growth rate, reaching
365
+ saturation at almost the same time. (2) For an N0 = 1-cell well, if the only initial cell is of
366
+ the fast type, then the population has only the fast type, and the growth pattern will be
367
+ close to that of N0 = 10-cell wells. If the only initial cell is of the moderate type, then the
368
+ population could still grow exponentially, but with a slower growth rate. This explains why
369
+ after reaching 5 area units, many but not all N0 = 1-cell wells were slower than N0 = 10-
370
+ cell wells. (3) Moreover, in such an N0 = 1-cell well with a moderate type initial cell, the
371
+ cell might not divide quite often during the first few days due to randomness of entering
372
+ the cell cycle. This would lead to a considerable delay in entering the exponential growth
373
+ phase. (4) By contrast, for an N0 = 1-cell well with a slow type initial cell, the growth rate
374
+ could be too small, and the population might die out or survive without ever entering the
375
+ exponential growth phase in duration of the experiment. (5) Most N0 = 4-cell wells had at
376
+ least one fast type initial cell, and the growth pattern was the same as N0 = 10-cell wells.
377
+ A few N0 = 4-cell wells only had moderate and slow cells, and thus had slower growth
378
+ patterns.
379
+ The above verbal argument is shown in Fig. 4 and entails mathematical modeling with
380
+ the appropriate parameters that relate the relative frequency of these cell types in the
381
+ original population, their associated growth and transition rates to examine whether it
382
+ explains the data.
383
+ 2.4
384
+ Branching process model.
385
+ To construct a quantitative dynamical model to recapitulate the growth dynamics differ-
386
+ ences from cell populations with distinct initial seed cell numbers N0, and three intrinsic
387
+ types of proliferation behaviors, we used a multi-type discrete-time branching process.
388
+ The traditional method of population dynamics based on ordinary differential equation
389
+ (ODE), which is deterministic and has continuous variables, is not suited when the cell
390
+ population is small as is the case for the earliest stage of proliferation from a few cells
391
+ being studied in our experiments. Deterministic models are also unfit because with such
392
+ small populations and measurements at single-cell resolution, stochasticity in cell activity
393
+ does not average out. The nuanced differences between individual cells cannot be captured
394
+ by a different deterministic mechanism of each individual cell, and the only information
395
+ available is the initial cell number. Thus, the unobservable nuances between cells are taken
396
+ care of by a stochastic model.
397
+ Given the small populations, our model should be purely stochastic, without determin-
398
+ istic growth. The focus is the concrete population size of a finite number (three) of types,
399
+ thus Poisson processes are not suitable. Markov chains can partially describe the propor-
400
+ tions under some conditions [47], but population sizes are known, not just their ratios,
401
+ therefore Markov chains are not necessary. Even the lifted Markov chains [48] and random
402
+ dynamical systems [52] are not applicable in this situation, since the population should be
403
+ 8
404
+
405
+ non-negative. Branching processes can describe the population size of multiple types with
406
+ symmetric and asymmetric division, transition, and death [19]. Also, the parameters can
407
+ be temporally and spatially inhomogeneous, which is convenient. Therefore, we utilized
408
+ branching processes in our model.
409
+ In the branching process, each cell during each time interval independently and ran-
410
+ domly chooses a behavior: division, death, or stagnation in the quiescent state, whose rates
411
+ depend on the cell growth type. Denoting the growth rate and death rate of the fast type
412
+ by gF and dF respectively, and the population size of fast type cells on Day n by F(n), the
413
+ population at Day n + 1 is:
414
+ F(n + 1) =
415
+ F(n)
416
+
417
+ i=1
418
+ Ai,
419
+ where Ai for different i are independent. Ai represents the descendants of a fast type cell i
420
+ after one day. It equals 2 with probability gF, 0 with probability dF, and 1 with probability
421
+ 1 − gF − dF. Therefore, given F(n), the distribution of F(n + 1) is:
422
+ P[F(n + 1) = N] =
423
+
424
+ 2a+b=N
425
+ F(n)!
426
+ a!b![F(n) − a − b]!ga
427
+ Fd[F(n)−a−b]
428
+ F
429
+ (1 − gF − dF)b,
430
+ where the summation is taken for all non-negative integer pairs (a, b) with 2a + b = N.
431
+ Moderate and slow types evolve similarly, with their corresponding growth rates gM, gS,
432
+ and death rates dM, dS.
433
+ As shown in Fig. 2, the growth rates gF, gM, and gS should be decreasing functions of
434
+ the total population. In our model, we adopted a quadratic function.
435
+ We performed a parameter scan to show that our model could reproduce experimental
436
+ phenomena for a wide range of model parameters (see details in Table 3).
437
+ The simulation results are shown on the right panels of Figs. 1–3, in comparison with
438
+ the experimental data in the left. Our model qualitatively captured the growth patterns
439
+ of groups with different initial seeding cell numbers. For example, in Fig. 2, when wells
440
+ were less than half full (cell number < 20000), most wells in the N0 = 10-cell group grew
441
+ faster than the N0 = 1-cell group even when they had the same cell number. In Fig. 3,
442
+ all wells in the N0 = 10-cell group in our model grew quickly until saturation. Similar to
443
+ the experiment, some wells in the N0 = 1-cell group in our model never grew, while some
444
+ began to take off very late.
445
+ In our model, the high extinction rate in the N0 = 1-cell group (14/80) was explained
446
+ as “bad luck” at the early stage, since birth rate and death rate were close, and a cell could
447
+ easily die without division. Another possible explanation for such a difference in growth
448
+ rates was that the population would be 10 small colonies when starting from 10 initial cells,
449
+ while starting from 1 initial cell, the population would be 1 large colony. With the same
450
+ area, 10 small colonies should have a larger total perimeter, thus larger growth space and
451
+ larger growth rate than that of 1 large colony. However, we carefully checked the photos,
452
+ 9
453
+
454
+ Parameters
455
+ Appearance of experimental phenomena
456
+ pF
457
+ pM
458
+ pS
459
+ d
460
+ g0
461
+ r
462
+ Feature 1
463
+ Feature 2
464
+ Feature 3
465
+ Feature 4
466
+ 0.4
467
+ 0.4
468
+ 0.2
469
+ 0.01
470
+ 0.5
471
+ 0.1
472
+ Yes
473
+ Yes
474
+ Yes
475
+ Yes
476
+ 0.4
477
+ 0.4
478
+ 0.2
479
+ 0
480
+ 0.5
481
+ 0.1
482
+ Yes
483
+ Yes
484
+ Yes
485
+ Yes
486
+ 0.4
487
+ 0.4
488
+ 0.2
489
+ 0.05
490
+ 0.5
491
+ 0.1
492
+ Yes
493
+ Yes
494
+ Yes
495
+ Yes
496
+ 0.4
497
+ 0.4
498
+ 0.2
499
+ 0.1
500
+ 0.5
501
+ 0.1
502
+ No
503
+ Yes
504
+ Yes
505
+ No
506
+ 0.4
507
+ 0.4
508
+ 0.2
509
+ 0.01
510
+ 0.45
511
+ 0.1
512
+ Yes
513
+ Yes
514
+ Yes
515
+ Yes
516
+ 0.4
517
+ 0.4
518
+ 0.2
519
+ 0.01
520
+ 0.6
521
+ 0.1
522
+ Yes
523
+ Yes
524
+ Yes
525
+ Yes
526
+ 0.4
527
+ 0.4
528
+ 0.2
529
+ 0.01
530
+ 0.4
531
+ 0.1
532
+ Yes
533
+ Yes
534
+ Yes
535
+ No
536
+ 0.4
537
+ 0.4
538
+ 0.2
539
+ 0.01
540
+ 0.5
541
+ 0.05
542
+ Yes
543
+ Yes
544
+ Yes
545
+ Yes
546
+ 0.4
547
+ 0.4
548
+ 0.2
549
+ 0.01
550
+ 0.5
551
+ 0
552
+ Yes
553
+ Yes
554
+ Yes
555
+ Yes
556
+ 0.4
557
+ 0.4
558
+ 0.2
559
+ 0.01
560
+ 0.5
561
+ 0.15
562
+ Yes
563
+ Yes
564
+ Yes
565
+ No
566
+ 0.4
567
+ 0.4
568
+ 0.2
569
+ 0.01
570
+ 0.5
571
+ 0.2
572
+ No
573
+ Yes
574
+ Yes
575
+ No
576
+ 0.3
577
+ 0.5
578
+ 0.2
579
+ 0.01
580
+ 0.5
581
+ 0.1
582
+ Yes
583
+ Yes
584
+ Yes
585
+ Yes
586
+ 0.5
587
+ 0.3
588
+ 0.2
589
+ 0.01
590
+ 0.5
591
+ 0.1
592
+ Yes
593
+ Yes
594
+ Yes
595
+ Yes
596
+ 0.4
597
+ 0.5
598
+ 0.1
599
+ 0.01
600
+ 0.5
601
+ 0.1
602
+ Yes
603
+ Yes
604
+ Yes
605
+ Yes
606
+ 0.4
607
+ 0.3
608
+ 0.3
609
+ 0.01
610
+ 0.5
611
+ 0.1
612
+ Yes
613
+ Yes
614
+ Yes
615
+ Yes
616
+ 0.5
617
+ 0.4
618
+ 0.1
619
+ 0.01
620
+ 0.5
621
+ 0.1
622
+ Yes
623
+ Yes
624
+ Yes
625
+ Yes
626
+ 0.3
627
+ 0.4
628
+ 0.3
629
+ 0.01
630
+ 0.5
631
+ 0.1
632
+ Yes
633
+ Yes
634
+ Yes
635
+ Yes
636
+ 0.1
637
+ 0.1
638
+ 0.8
639
+ 0.01
640
+ 0.5
641
+ 0.1
642
+ No
643
+ Yes
644
+ Yes
645
+ No
646
+ 0.5
647
+ 0.5
648
+ 0
649
+ 0.01
650
+ 0.5
651
+ 0.1
652
+ Yes
653
+ Yes
654
+ No
655
+ Yes
656
+ 0
657
+ 0.5
658
+ 0.5
659
+ 0.01
660
+ 0.5
661
+ 0.1
662
+ No
663
+ Yes
664
+ Yes
665
+ Yes
666
+ 0.5
667
+ 0
668
+ 0.5
669
+ 0.01
670
+ 0.5
671
+ 0.1
672
+ Yes
673
+ No
674
+ Yes
675
+ No
676
+ 1
677
+ 0
678
+ 0
679
+ 0.01
680
+ 0.5
681
+ 0.1
682
+ Yes
683
+ No
684
+ No
685
+ No
686
+ Table 3: Performance of our model with different parameters. Here we adjusted the param-
687
+ eters of our model in a wide range and observed whether the model could still reproduce
688
+ four important “features” in the experiment. This parameter scan showed that our model
689
+ is robust under perturbations on parameters. Here pF, pM, pS are the probabilities that an
690
+ initial cell is of fast, moderate, or slow type; d is the death rate; g0 is the growth factor;
691
+ r is the range of the random modifier. See the Methods section for explanations of these
692
+ parameters.
693
+ Feature 1, all wells in the N0 = 10-cell group were saturated; Feature 2,
694
+ presence of late-growing wells in the N0 = 1-cell group; Feature 3, presence of non-growing
695
+ wells in the N0 = 1-cell group; Feature 4, different growth rates at the same population
696
+ size between the N0 = 10-cell group and the N0 = 1-cell group.
697
+ 10
698
+
699
+ and found that almost all wells produced 1 large colony with nearly the same shape, and
700
+ there was no significant relationship between colony perimeter and growth rate.
701
+ 3
702
+ Discussion
703
+ As many recent single-cell level data have shown, a tumor can contain multiple distinct
704
+ subpopulations engaging in interconversions and interactions among them that can in-
705
+ fluence cancer cell proliferation, death, migration, and other features that contribute to
706
+ malignancy [33, 55, 1, 18, 34, 56, 20, 24, 5, 32, 6]. Presence of these two intra-population
707
+ behaviors can be manifest as departure from the elementary model of exponential growth
708
+ [35] (in the early phase of population growth, far away from carrying capacity of the culture
709
+ environment which is trivially non-exponential). The exponential growth model assumes
710
+ uniformity of cell division rates across all cells (hence a population doubling rate that is
711
+ proportional to a given population size N(t)) and the absence of cell-cell interactions that
712
+ affect cell division and death rates. Investigating the “non-genetic heterogeneity” hypoth-
713
+ esis of cancer cells quantitatively is therefore paramount for understanding cancer biology
714
+ but also for elementary principles of cell population growth.
715
+ As an example, here we showed that clonal cell populations of the leukemia HL60
716
+ cell line are heterogeneous with regard to growth behaviors of individual cells that can
717
+ be summarized in subpopulations characterized by a distinct intrinsic growth rates which
718
+ were revealed by analysis of the early population growth starting with microcultures seeded
719
+ with varying (low) cell number N0.
720
+ Since we have noted only very weak effect of cell-cell interactions on cell growth be-
721
+ haviors (Allee effect) in this cell line (as opposed to another cell tumor cell line in which
722
+ we found that departure from exponential growth could be explained by the Allee effect
723
+ [20]), we focused on the very presence among HL60 cells of subpopulations with distinct
724
+ proliferative capacity as a mechanism for the departure of the early population growth
725
+ curve from exponential growth.
726
+ The reseeding experiment demonstrated that the characteristic growth behaviors of
727
+ subpopulations could be inherited across cell generations and after moving to a new envi-
728
+ ronment (fresh culture), consistent with long-enduring endogenous properties of the cells.
729
+ This result might be explained by cells occupying distinct stable cell states (in a multi-
730
+ stable system). Thus, we introduced multiple cell types with different growth rates in our
731
+ stochastic model. Specifically, in a branching process model, we assumed the existence
732
+ of three types: fast, moderate, and slow cells. The model we built could replicate the
733
+ key features in the experimental data, such as different growth rates at the same popula-
734
+ tion size between the N0 = 10-cell group and the N0 = 1-cell group, and the presence of
735
+ late-growing and non-growing wells in the N0 = 1-cell group.
736
+ While we were able to fit the observed behaviors in which the growth rate depended not
737
+ only on N(t) but also on N0, the existence of the three or even more cell types still needs
738
+ 11
739
+
740
+ to be verified experimentally. For instance, statistical cluster analysis of transcriptomes of
741
+ individual cells by single-cell RNA-seq [3] over the population may identify the presence
742
+ of transcriptomically distinct subpopulations that could be isolated (e.g., after association
743
+ with cell surface markers) and evaluated separately for their growth behaviors. We might
744
+ apply inference methods on such sequencing data to determine the gene regulatory relations
745
+ that lead to multiple phenotypes [50, 44], although the causal relationship might not always
746
+ be determined [49]. Besides, since the existence of transposons might affect the growth
747
+ rates, corresponding analysis should be conducted [21, 40].
748
+ The central assumption of coexistence of multiple subpopulations in the cell line stock
749
+ must be accompanied by the second assumption that there are transitions between these
750
+ distinct cell populations. For otherwise, in the stock population the fastest growing cell
751
+ would eventually outgrow the slow growing cells. Furthermore, one has to assume a steady-
752
+ state in which the population of slow growing cells are continuously replenished from the
753
+ population of fast-growing cells. Finally, we must assume that the steady-state proportions
754
+ of the subpopulations are such that at low seeding wells with N0 = 1 cells, there is a sizable
755
+ probability that a microculture receives cells from each of the (three) presumed subtypes of
756
+ cells. The number of wells in the ensemble of replicate microcultures for each N0- condition
757
+ has been sufficiently large for us to make the observations and inform the model, but a
758
+ larger ensemble would be required to determine with satisfactory accuracy the relative
759
+ proportions of the cell types in the parental stock population.
760
+ Transitions might also have been happening during our experiment. For example, those
761
+ late growing wells in the N0 = 1-cell group could be explained by such a transition: Initially,
762
+ only slow type cells were present, but once one of these slow growing cells switched to the
763
+ moderate type, an exponential growth ensued at the same rate that is intrinsic to that of
764
+ moderate cells.
765
+ If there are transitions, what is the transition rate? Our reseeding experiments are
766
+ compatible with a relatively slow rate for interconversion of growth behaviors in that the
767
+ same growth type was maintained across 30 generations. An alternative to the principle
768
+ of transition at a constant intrinsic to each of the types of cells may be that transition
769
+ is extrinsically determined. Specifically, the seeding in the “lone” condition of N0 = 1
770
+ may induce a dormant state, that is a transition to a slower growth mode that is then
771
+ maintained, on average over 30+ generations, with occasional return to the faster types
772
+ that account for the delayed exponential growth. The lack of experimental data might be
773
+ partially made up by inference methods [51].
774
+ This model however would bring back the notion of “environment awareness”, or the
775
+ principle of a “critical density” for growth implemented by cell-cell interaction (Allee effect)
776
+ which we had deliberately not considered (see above) since it was not necessary. We do not
777
+ exclude this possibility which could be experimentally tested as follows: Cultivate N0 = 1-
778
+ cell wells for 20 days when the delayed exponential growth has happened in some wells,
779
+ but then use the cells of those wells with fast-growing population (which should contain of
780
+ the fast type) to restart the experiment, seeded at N0 = 10, 4, 1 cells. If wells with different
781
+ 12
782
+
783
+ seeding numbers exhibit the same growth rates, then the growth difference in the original
784
+ experiment is solely due to preexisting (slow interconverting) cell phenotypes. If now the
785
+ N0 = 1-cell wells resumes the typical slow growth, this would indicate a density induced
786
+ transition to the slow growth type. If cell-cell interaction needs to be taken into account,
787
+ certain results in developmental biology might help, since they study the emergence of
788
+ patterns through strong cell-cell interactions [46, 45, 42].
789
+ In the spirit of Occam’s razor, and given the technical difficulty in separate experiments
790
+ to demonstrate cell-cell interactions in HL60 cells, we were able to model the observed
791
+ behaviors with the simplest assumption of cell-autonomous properties, including existence
792
+ of multiple states (growth behaviors) and slow transitions between them but without cell
793
+ density dependence or interactions.
794
+ Taken together, we showed that one manifestation of the burgeoning awareness of ubiq-
795
+ uitous cell phenotype heterogeneity in an isogenic cell population is the presence of distinct
796
+ intrinsic types of cells that slowly interconvert among them, resulting in a stationary popu-
797
+ lation composition. The differing growth rates of the subtypes and their stable proportions
798
+ may be an elementary characteristic of a given population that by itself can account for the
799
+ departure of early population growth kinetics from the basic exponential growth model.
800
+ 4
801
+ Methods
802
+ 4.1
803
+ Setup of growth experiment with different initial cell numbers.
804
+ HL60 cells were maintained in IMDM wGln, 20% FBS(heat inactivated), 1% P/S at a
805
+ cell density between 3 × 105 and 2.5 × 106 cells/ml (GIBCO). Cells were always handled
806
+ and maintained under sterile conditions (tissue culture hood; 37◦C, 5% CO2, humidified
807
+ incubator). At the beginning of the experiment, cells were collected, washed two times in
808
+ PBS, and stained for vitality (Trypan blue GIBCO). The population of cells was first gated
809
+ for morphology and then for vitality staining. Only Trypan negative cells were sorted (BD
810
+ FACSAria II). The cells were sorted in a 384 well plate with IMDM wGln, 20% FBS(heat
811
+ inactivated), and 1% P/S (GIBCO).
812
+ Cell population growth was monitored using a Leica microscope (heated environmental
813
+ chamber and CO2 levels control) with a motorized tray. Starting from Day 4, the 384
814
+ well plate was placed inside the environmental chamber every 24 hours. The images were
815
+ acquired in a 3 × 3 grid for each well; after acquisition, the 9 fields were stitched into a
816
+ single image. Software ImageJ was applied to identify and estimate the area occupied by
817
+ “entities” in each image. The area (proportional to cell number) was used to follow the
818
+ cell growth.
819
+ 13
820
+
821
+ 4.2
822
+ Setup of reseeding experiment for growth pattern inheritance.
823
+ HL60 cells were cultivated for 3 weeks, and then we chose one full well and one half full
824
+ well. We supposed the full well was dominated by fast type cells, and the half-full well
825
+ was dominated by moderate type cells, which had lower growth rates. We reseeded cells
826
+ from these two wells and cultivated them in two 96-well (rows A-H, columns 1-12) plates.
827
+ In each plate, B2-B11, D2-D11, and F2-F11 wells started with 78 fast cells, while C2-C11,
828
+ E2-E11, and G2-G11 wells started with 78 moderate cells. Rows A, H, columns 1, 12 had
829
+ no cells and no media, and we found that wells in rows B, G, columns 2, 11, which were
830
+ the outmost non-empty wells, evaporated much faster than inner wells. Therefore, the
831
+ growth of cells in those wells was much slower than inner wells. Hence we only considered
832
+ inner wells, where D3-D10 and F3-F10 started with fast cells, C3-C10 and E3-E10 started
833
+ with moderate cells, namely 32 fast wells and 32 moderate wells in total.
834
+ During the
835
+ experiment, no media was added. Each day, we observed those wells to check whether
836
+ their areas exceeded one-half of the whole well. The experiment was terminated after 20
837
+ days.
838
+ 4.3
839
+ Weighted Welch’s t-test.
840
+ The weighted Welch’s t-test is used to test the hypothesis that two populations have equal
841
+ mean, while sample values have different weights [12].
842
+ Assume for group i (i = 1, 2),
843
+ the sample size is Ni and the jth sample is the average of cj
844
+ i independent and identically
845
+ distributed variables. Let Xj
846
+ i be the observed average for the jth sample. Set ν1 = N1 − 1,
847
+ ν2 = N2 − 1. Define
848
+ ¯
849
+ Xi
850
+ W = (
851
+ Ni
852
+
853
+ j=1
854
+ Xj
855
+ i cj)/(
856
+ Ni
857
+
858
+ j=1
859
+ )cj,
860
+ s2
861
+ i,W =
862
+ Ni[�Ni
863
+ j=1(Xj
864
+ i )2cj]/(�Ni
865
+ j=1 cj
866
+ i) − Ni( ¯
867
+ Xi
868
+ W )2
869
+ Ni − 1
870
+ ,
871
+ t =
872
+ ¯
873
+ X1
874
+ W − ¯
875
+ X2
876
+ W
877
+
878
+ s2
879
+ 1,W
880
+ N1 +
881
+ s2
882
+ 2,W
883
+ N2
884
+ ,
885
+ ν =
886
+ (
887
+ s2
888
+ 1,W
889
+ N1 +
890
+ s2
891
+ 2,W
892
+ N2 )2
893
+ s4
894
+ 1,W
895
+ N2
896
+ 1 ν1 +
897
+ s4
898
+ 2,W
899
+ N2
900
+ 2 ν2
901
+ .
902
+ If two populations have equal mean, then t satisfies the t-distribution with degree of freedom
903
+ ν.
904
+ The weighted Welch’s t-test was applied to the growth experiment with different initial
905
+ cell numbers, in order to determine whether the growth rates during exponential phase
906
+ 14
907
+
908
+ (5–50 area units) were different between groups. Here Xj
909
+ i corresponded to growth rate,
910
+ and cj
911
+ i corresponded to cell area. The p-value for N0 = 10-cell group vs. N0 = 4-cell group
912
+ was 2.12 × 10−8; the p-value for N0 = 10-cell group vs. N0 = 1-cell group was smaller than
913
+ 10−12; the p-value for N0 = 4-cell group vs. N0 = 1-cell group was 5.35 × 10−5. Therefore,
914
+ the growth rate difference between any two groups was statistically significant.
915
+ 4.4
916
+ Permutation Test.
917
+ The permutation test is a non-parametric method to test whether two samples are signifi-
918
+ cantly different with respect to a statistic (e.g., sample mean) [16]. It is easy to calculate
919
+ and fits our situation, thus we adopt this test rather than other more complicated tests,
920
+ such as the Mann-Whitney test.
921
+ For two samples {x1, · · · , xm}, {y1, · · · , yn}, consider
922
+ the null hypothesis: the mean of x and y are the same. For these samples, calculate the
923
+ mean of the first sample: µ0 =
924
+ 1
925
+ m
926
+ � xi. Then we randomly divide these m + n samples
927
+ into two groups with size m and n: {x′
928
+ 1, · · · , x′
929
+ m}, {y′
930
+ 1, · · · , y′
931
+ n}, such that each permuta-
932
+ tion has equal probability. For these new samples, calculate the mean of the first sample:
933
+ µ′
934
+ 0 = 1
935
+ m
936
+ � x′
937
+ i. Then the two-sided p-value is defined as
938
+ p = 2 min{P(µ0 ≤ µ′
939
+ 0), 1 − P(µ0 ≤ µ′
940
+ 0)}.
941
+ If µ0 is an extreme value in the distribution of µ′
942
+ 0, then the two sample means are different.
943
+ In the reseeding experiment, the mean time of exceeding half well for the fast group
944
+ was 11.4375 days. For all
945
+ �64
946
+ 32
947
+
948
+ possible result combinations, only 7 combinations had equal
949
+ or less mean time. Thus the p-value was 2 × 7/
950
+ �64
951
+ 32
952
+
953
+ = 7.6 × 10−18. This indicated that the
954
+ growth rate difference between fast group and moderate group was significant.
955
+ 4.5
956
+ Model Details.
957
+ The simulation time interval was half day, but we only utilized the results in full days. For
958
+ each initial cell, the probabilities of being fast, moderate or slow type, pF, pM, pS, were 0.4,
959
+ 0.4, 0.2.
960
+ Each half day, a fast type cell had probability d to die, and probability gF to divide.
961
+ The division produced two fast cells, capturing the intrinsic growth behavior that is to
962
+ some extent inheritable. Denote the total cell number of previous day as N, then
963
+ gF = g0(1 − N2/C2) + δ,
964
+ where δ is a random variable that satisfies the uniform distribution on [−r, r], and it is a
965
+ constant for all cells in the same well. If gF < 0, set gF = 0. If gF > 1 − d, set gF = 1 − d.
966
+ In the simulation displayed, death rate d = 0.01, carrying capacity C = 40000, growth
967
+ factor g0 = 0.5, and the range of random modifier r = 0.1.
968
+ Each half day, a moderate type cell had probability d to die, and probability gM to
969
+ divide. The division produced two moderate cells. gM = gF/1.5.
970
+ 15
971
+
972
+ Similarly, each half day, a slow type cell had probability d to die, and probability gS to
973
+ divide. The division produced two slow-growing cells. gS = gF/3.
974
+ 4.6
975
+ Parameter scan.
976
+ Since growth is measured by the area covered by cells, we could not experimentally verify
977
+ most assumptions of our model, or determine the values of parameters.
978
+ Therefore, we
979
+ performed a parameter scan by evaluating the performance of our model for different sets
980
+ of parameters.
981
+ We adjusted 6 parameters: initial type probabilities pF, pM, pS, death
982
+ rate d, growth factor g0, and random modifier r. We checked whether these 4 features
983
+ observable in the experiment could be reproduced: growth of all wells in the N0 = 10-cell
984
+ group to saturation; existence of late-growing wells in the N0 = 1-cell group; existence of
985
+ non-growing wells in the N0 = 1-cell group; difference in growth rates in the N0 = 10-cell
986
+ group and the N0 = 1-cell group at the same population size. Table 3 shows the results
987
+ of the performance of simulations with the various parameter sets. Within a wide range
988
+ of parameters, our model is able to replicate the experimental results shown in Figs. 1–3,
989
+ indicating that our model is robust under perturbations.
990
+ Acknowledgements
991
+ We would like to thank Ivana Bozic, Yifei Liu, Georg Luebeck, Weili Wang, Yuting Wei
992
+ and Lingxue Zhu for helpful advice and discussions.
993
+ References
994
+ [1] Angelini, E., Wang, Y., Zhou, J. X., Qian, H., and Huang, S. A model for
995
+ the intrinsic limit of cancer therapy: Duality of treatment-induced cell death and
996
+ treatment-induced stemness. PLOS Comput. Biol. 18, 7 (2022), e1010319.
997
+ [2] Bartoszynski, R., Brown, B. W., McBride, C. M., and Thompson, J. R.
998
+ Some nonparametric techniques for estimating the intensity function of a cancer re-
999
+ lated nonstationary Poisson process. Ann. Stat. (1981), 1050–1060.
1000
+ [3] Bhartiya, D., Kausik, A., Singh, P., and Sharma, D. Will single-cell rnaseq
1001
+ decipher stem cells biology in normal and cancerous tissues?
1002
+ Hum. Reprod. Update
1003
+ 27, 2 (2021), 421–421.
1004
+ [4] Chang, H. H., Hemberg, M., Barahona, M., Ingber, D. E., and Huang,
1005
+ S. Transcriptome-wide noise controls lineage choice in mammalian progenitor cells.
1006
+ Nature 453, 7194 (2008), 544–547.
1007
+ 16
1008
+
1009
+ [5] Chapman, A., del Ama, L. F., Ferguson, J., Kamarashev, J., Wellbrock,
1010
+ C., and Hurlstone, A. Heterogeneous tumor subpopulations cooperate to drive
1011
+ invasion. Cell Rep. 8, 3 (2014), 688–695.
1012
+ [6] Chen, X., Wang, Y., Feng, T., Yi, M., Zhang, X., and Zhou, D. The overshoot
1013
+ and phenotypic equilibrium in characterizing cancer dynamics of reversible phenotypic
1014
+ plasticity. J. Theor. Biol. 390 (2016), 40–49.
1015
+ [7] Clark, W. H. Tumour progression and the nature of cancer. Br. J. Cancer 64, 4
1016
+ (1991), 631.
1017
+ [8] Dewanji, A., Luebeck, E. G., and Moolgavkar, S. H. A generalized Luria–
1018
+ Delbr¨uck model. Math. Biosci. 197, 2 (2005), 140–152.
1019
+ [9] Durrett, R., Foo, J., Leder, K., Mayberry, J., and Michor, F. Intratumor
1020
+ heterogeneity in evolutionary models of tumor progression. Genetics 188, 2 (2011),
1021
+ 461–477.
1022
+ [10] Egeblad, M., Nakasone, E. S., and Werb, Z.
1023
+ Tumors as organs: Complex
1024
+ tissues that interface with the entire organism. Dev. Cell 18, 6 (2010), 884–901.
1025
+ [11] Gatenby, R. A., Cunningham, J. J., and Brown, J. S. Evolutionary triage gov-
1026
+ erns fitness in driver and passenger mutations and suggests targeting never mutations.
1027
+ Nat. Commun. 5 (2014), 5499.
1028
+ [12] Goldberg, L. R., Kercheval, A. N., and Lee, K.
1029
+ T-statistics for weighted
1030
+ means in credit risk modeling. J. Risk Finance 6, 4 (2005), 349–365.
1031
+ [13] Gunnarsson, E. B., De, S., Leder, K., and Foo, J. Understanding the role of
1032
+ phenotypic switching in cancer drug resistance. J. Theor. Biol 490 (2020), 110162.
1033
+ [14] Gupta, P. B., Fillmore, C. M., Jiang, G., Shapira, S. D., Tao, K., Kuper-
1034
+ wasser, C., and Lander, E. S. Stochastic state transitions give rise to phenotypic
1035
+ equilibrium in populations of cancer cells. Cell 146, 4 (2011), 633–644.
1036
+ [15] Hanahan, D., and Weinberg, R. A. Hallmarks of cancer: The next generation.
1037
+ Cell 144, 5 (2011), 646–674.
1038
+ [16] Hastie, T., Tibshirani, R., and Friedman, J. The Elements of Statistical Learn-
1039
+ ing, 2nd ed. Springer, New York, 2016.
1040
+ [17] Hordijk, W., Steel, M., and Dittrich, P.
1041
+ Autocatalytic sets and chemical
1042
+ organizations: modeling self-sustaining reaction networks at the origin of life. New J.
1043
+ Phys. 20, 1 (2018), 015011.
1044
+ 17
1045
+
1046
+ [18] Howard, G. R., Johnson, K. E., Rodriguez Ayala, A., Yankeelov, T. E.,
1047
+ and Brock, A. A multi-state model of chemoresistance to characterize phenotypic
1048
+ dynamics in breast cancer. Sci. Rep. 8, 1 (2018), 1–11.
1049
+ [19] Jiang, D.-Q., Wang, Y., and Zhou, D. Phenotypic equilibrium as probabilistic
1050
+ convergence in multi-phenotype cell population dynamics. PLOS ONE 12, 2 (2017),
1051
+ e0170916.
1052
+ [20] Johnson, K. E., Howard, G., Mo, W., Strasser, M. K., Lima, E. A., Huang,
1053
+ S., and Brock, A. Cancer cell population growth kinetics at low densities deviate
1054
+ from the exponential growth model and suggest an Allee effect. PLOS Biol. 17, 8
1055
+ (2019), e3000399.
1056
+ [21] Kang, Y., Gu, C., Yuan, L., Wang, Y., Zhu, Y., Li, X., Luo, Q., Xiao, J.,
1057
+ Jiang, D., Qian, M., et al. Flexibility and symmetry of prokaryotic genome re-
1058
+ arrangement reveal lineage-associated core-gene-defined genome organizational frame-
1059
+ works. mBio 5, 6 (2014), e01867–14.
1060
+ [22] Koch, A. L. Mutation and growth rates from Luria-Delbr¨uck fluctuation tests. Mutat.
1061
+ Res. -Fund. Mol. M. 95, 2-3 (1982), 129–143.
1062
+ [23] Kochanowski, K., Sander, T., Link, H., Chang, J., Altschuler, S. J., and
1063
+ Wu, L. F. Systematic alteration of in vitro metabolic environments reveals empirical
1064
+ growth relationships in cancer cell phenotypes. Cell Rep. 34, 3 (2021), 108647.
1065
+ [24] Korolev, K. S., Xavier, J. B., and Gore, J. Turning ecology and evolution
1066
+ against cancer. Nat. Rev. Cancer 14, 5 (2014), 371–380.
1067
+ [25] Lea, D. E., and Coulson, C. A. The distribution of the numbers of mutants in
1068
+ bacterial populations. J. Genet. 49, 3 (1949), 264–285.
1069
+ [26] Li, Q., Wennborg, A., Aurell, E., Dekel, E., Zou, J.-Z., Xu, Y., Huang, S.,
1070
+ and Ernberg, I. Dynamics inside the cancer cell attractor reveal cell heterogeneity,
1071
+ limits of stability, and escape. Proc. Natl. Acad. Sci. U.S.A. 113, 10 (2016), 2672–2677.
1072
+ [27] Luebeck, G., and Moolgavkar, S. H. Multistage carcinogenesis and the incidence
1073
+ of colorectal cancer. Proc. Natl. Acad. Sci. 99, 23 (2002), 15095–15100.
1074
+ [28] Luria, S. E., and Delbr¨uck, M. Mutations of bacteria from virus sensitivity to
1075
+ virus resistance. Genetics 28, 6 (1943), 491.
1076
+ [29] Mackillop, W. J. The growth kinetics of human tumours. Clin. Phys. Physiol. M.
1077
+ 11, 4A (1990), 121.
1078
+ [30] Meacham, C. E., and Morrison, S. J.
1079
+ Tumour heterogeneity and cancer cell
1080
+ plasticity. Nature 501, 7467 (2013), 328–337.
1081
+ 18
1082
+
1083
+ [31] Newton, P. K., Mason, J., Bethel, K., Bazhenova, L. A., Nieva, J., and
1084
+ Kuhn, P.
1085
+ A stochastic markov chain model to describe lung cancer growth and
1086
+ metastasis. PLOS ONE 7, 4 (2012), e34637.
1087
+ [32] Niu, Y., Wang, Y., and Zhou, D. The phenotypic equilibrium of cancer cells:
1088
+ From average-level stability to path-wise convergence. J. Theor. Biol. 386 (2015),
1089
+ 7–17.
1090
+ [33] Pisco, A. O., and Huang, S. Non-genetic cancer cell plasticity and therapy-induced
1091
+ stemness in tumour relapse: ‘What does not kill me strengthens me’. Br. J. Cancer
1092
+ 112, 11 (2015), 1725–1732.
1093
+ [34] Sahoo, S., Mishra, A., Kaur, H., Hari, K., Muralidharan, S., Mandal, S.,
1094
+ and Jolly, M. K. A mechanistic model captures the emergence and implications of
1095
+ non-genetic heterogeneity and reversible drug resistance in ER+ breast cancer cells.
1096
+ NAR Cancer 3, 3 (2021), zcab027.
1097
+ [35] Skehan, P., and Friedman, S. J. Non-exponential growth by mammalian cells in
1098
+ culture. Cell Prolif. 17, 4 (1984), 335–343.
1099
+ [36] Sonnenschein, C., and Soto, A. M. Somatic mutation theory of carcinogenesis:
1100
+ Why it should be dropped and replaced. Mol. Carcinog. 29, 4 (2000), 205–211.
1101
+ [37] Speer, J. F., Petrosky, V. E., Retsky, M. W., and Wardwell, R. H. A
1102
+ stochastic numerical model of breast cancer growth that simulates clinical data. Cancer
1103
+ Res. 44, 9 (1984), 4124–4130.
1104
+ [38] Spina, S., Giorno, V., Rom´an-Rom´an, P., and Torres-Ruiz, F. A stochastic
1105
+ model of cancer growth subject to an intermittent treatment with combined effects:
1106
+ Reduction in tumor size and rise in growth rate. Bull. Math. Biol. 76, 11 (2014),
1107
+ 2711–2736.
1108
+ [39] Tabassum, D. P., and Polyak, K. Tumorigenesis: It takes a village. Nat. Rev.
1109
+ Cancer 15, 8 (2015), 473–483.
1110
+ [40] Wang, Y.
1111
+ Algorithms for finding transposons in gene sequences.
1112
+ arXiv preprint
1113
+ arXiv:1506.02424 (2015).
1114
+ [41] Wang, Y. Some Problems in Stochastic Dynamics and Statistical Analysis of Single-
1115
+ Cell Biology of Cancer. Ph.D. thesis, University of Washington, 2018.
1116
+ [42] Wang, Y. Two metrics on rooted unordered trees with labels. Algorithms for Molec-
1117
+ ular Biology 17, 1 (2022), 1–17.
1118
+ 19
1119
+
1120
+ [43] Wang, Y., Dessalles, R., and Chou, T. Modelling the impact of birth control
1121
+ policies on China’s population and age: effects of delayed births and minimum birth
1122
+ age constraints. Royal Society Open Science 9, 6 (2022), 211619.
1123
+ [44] Wang, Y., and He, S. Inference on autoregulation in gene expression. arXiv preprint
1124
+ arXiv:2201.03164 (2022).
1125
+ [45] Wang, Y., Kropp, J., and Morozova, N. Biological notion of positional informa-
1126
+ tion/value in morphogenesis theory. International Journal of Developmental Biology
1127
+ 64, 10-11-12 (2020), 453–463.
1128
+ [46] Wang, Y., Minarsky, A., Penner, R., Soul´e, C., and Morozova, N. Model
1129
+ of morphogenesis. Journal of Computational Biology 27, 9 (2020), 1373–1383.
1130
+ [47] Wang, Y., Mistry, B. A., and Chou, T. Discrete stochastic models of selex:
1131
+ Aptamer capture probabilities and protocol optimization. The Journal of Chemical
1132
+ Physics 156, 24 (2022), 244103.
1133
+ [48] Wang, Y., and Qian, H. Mathematical representation of Clausius’ and Kelvin’s
1134
+ statements of the second law and irreversibility. Journal of Statistical Physics 179, 3
1135
+ (2020), 808–837.
1136
+ [49] Wang, Y., and Wang, L. Causal inference in degenerate systems: An impossibility
1137
+ result. In International Conference on Artificial Intelligence and Statistics (2020),
1138
+ PMLR, pp. 3383–3392.
1139
+ [50] Wang, Y., and Wang, Z. Inference on the structure of gene regulatory networks.
1140
+ Journal of Theoretical Biology 539 (2022), 111055.
1141
+ [51] Wang, Y., Zhang, B., Kropp, J., and Morozova, N. Inference on tissue trans-
1142
+ plantation experiments. Journal of Theoretical Biology 520 (2021), 110645.
1143
+ [52] Ye, F. X.-F., Wang, Y., and Qian, H. Stochastic dynamics: Markov chains and
1144
+ random transformations. Discrete & Continuous Dynamical Systems-B 21, 7 (2016),
1145
+ 2337.
1146
+ [53] Yorke, E. D., Fuks, Z., Norton, L., Whitmore, W., and Ling, C. C. Model-
1147
+ ing the development of metastases from primary and locally recurrent tumors: Com-
1148
+ parison with a clinical data base for prostatic cancer.
1149
+ Cancer Res. 53, 13 (1993),
1150
+ 2987–2993.
1151
+ [54] Zheng, Q. Progress of a half century in the study of the Luria–Delbr¨uck distribution.
1152
+ Math. Biosci. 162, 1 (1999), 1–32.
1153
+ [55] Zhou, D., Wang, Y., and Wu, B.
1154
+ A multi-phenotypic cancer model with cell
1155
+ plasticity. J. Theor. Biol. 357 (2014), 35–45.
1156
+ 20
1157
+
1158
+ [56] Zhou, J. X., Pisco, A. O., Qian, H., and Huang, S. Nonequilibrium population
1159
+ dynamics of phenotype conversion of cancer cells. PLOS ONE 9, 12 (2014), e110714.
1160
+ 21
1161
+
1162
+ Figure 1: Growth curves of the experiment (left) and simulation (right), starting from
1163
+ the time of reaching 5 area units (experiment) or having 2500 cells (simulation), with a
1164
+ logarithm scale for the y-axis. The time required for reaching 5 area units was determined
1165
+ by exponential extrapolation, as reliable imaging started at > 5 area units. The x-axis is
1166
+ the time from reaching 5 area units (experiment) or 2500 cells (simulation). Red, green,
1167
+ or blue curves correspond to 10, 4, or 1 initial cell(s). Although starting from the same
1168
+ population level, patterns are different for distinct initial cell numbers. The N0 = 1-cell
1169
+ group has higher diversity.
1170
+ 22
1171
+
1172
+ experimental
1173
+ 80
1174
+ cell area
1175
+ 40
1176
+ 20
1177
+ 10-cell group
1178
+ 4-cell group
1179
+ 10
1180
+ 1-cell group
1181
+ 5
1182
+ 0
1183
+ 5
1184
+ 10
1185
+ 15
1186
+ time (day)
1187
+ 80
1188
+ cell area
1189
+ 40
1190
+ 20simulation
1191
+ 40000
1192
+ cell number
1193
+ 20000
1194
+ 10000
1195
+ 5000
1196
+ 2500
1197
+ 0
1198
+ 5
1199
+ 10
1200
+ 15
1201
+ time (day)
1202
+ 40000
1203
+ ell number
1204
+ 20000
1205
+ 100005
1206
+ 0
1207
+ 5
1208
+ 10
1209
+ 15
1210
+ time (day)
1211
+ 80
1212
+ cell area
1213
+ 40
1214
+ 20
1215
+ 10
1216
+ 5
1217
+ 0
1218
+ 5
1219
+ 10
1220
+ 15
1221
+ time (day)8
1222
+ QQQ
1223
+ 2500
1224
+ 0
1225
+ 5
1226
+ 10
1227
+ 15
1228
+ time (day)
1229
+ 40000
1230
+ cell number
1231
+ 20000
1232
+ 10000
1233
+ 5000
1234
+ 2500
1235
+ 0
1236
+ 5
1237
+ 10
1238
+ 15
1239
+ time (day)20
1240
+ 40
1241
+ 60
1242
+ 80
1243
+ cell area
1244
+ 0
1245
+ 0.5
1246
+ 1
1247
+ 1.5
1248
+ growth rate
1249
+ experimental
1250
+ 10-cell group
1251
+ 4-cell group
1252
+ 1-cell group
1253
+ 0
1254
+ 20
1255
+ 40
1256
+ 60
1257
+ 80
1258
+ cell area
1259
+ 0
1260
+ 0.5
1261
+ 1
1262
+ 1.5
1263
+ growth rate
1264
+ 1
1265
+ 2
1266
+ 3
1267
+ 4
1268
+ cell number
1269
+ 104
1270
+ 0
1271
+ 0.5
1272
+ 1
1273
+ 1.5
1274
+ growth rate
1275
+ simulation
1276
+ 0
1277
+ 1
1278
+ 2
1279
+ 3
1280
+ 4
1281
+ cell number
1282
+ 104
1283
+ 0
1284
+ 0.5
1285
+ 1
1286
+ 1.5
1287
+ growth rate
1288
+ Figure 2: Per capita growth rate (averaged within one day) vs. cell population for the
1289
+ experiment (left) and simulation (right). Each point represents one well in one day. Red,
1290
+ green, or blue points correspond to 10, 4, or 1 initial cell(s).
1291
+ 23
1292
+
1293
+ 0
1294
+ 5
1295
+ 10
1296
+ 15
1297
+ 20
1298
+ time (day)
1299
+ 0
1300
+ 20
1301
+ 40
1302
+ 60
1303
+ 80
1304
+ cell area
1305
+ experimental
1306
+ 10-cell group
1307
+ 4-cell group
1308
+ 1-cell group
1309
+ 0
1310
+ 5
1311
+ 10
1312
+ 15
1313
+ 20
1314
+ time (day)
1315
+ 5
1316
+ 10
1317
+ 20
1318
+ 40
1319
+ 80
1320
+ cell area
1321
+ 0
1322
+ 5
1323
+ 10
1324
+ 15
1325
+ 20
1326
+ time (day)
1327
+ 0
1328
+ 1
1329
+ 2
1330
+ 3
1331
+ 4
1332
+ cell number
1333
+ 104
1334
+ simulation
1335
+ 0
1336
+ 5
1337
+ 10
1338
+ 15
1339
+ 20
1340
+ time (day)
1341
+ 2500
1342
+ 5000
1343
+ 10000
1344
+ 20000
1345
+ 40000
1346
+ cel number
1347
+ Figure 3: Growth curves of the experiments with different initial cell numbers N0 (left)
1348
+ and growth curves of corresponding simulation (right). Each curve describes the change in
1349
+ the cell population (measured by area or number) over a well along time. Red, green, or
1350
+ blue curves correspond to N0 = 10, 4, or 1 initial cell(s).
1351
+ 24
1352
+
1353
+ Figure 4: Schematic illustration of the qualitative argument: Three cell types and growth
1354
+ patterns (three colors) with different seeding numbers. One N0 = 10-cell well will have
1355
+ at least one fast type cell with high probability, which will dominate the population. One
1356
+ N0 = 1-cell well can only have one cell type, thus in the microculture ensemble of replicate
1357
+ wells, three possible growth patterns for wells can be observed.
1358
+ 25
1359
+
1360
+ fast
1361
+ moderate
1362
+ slow
1363
+ fast
1364
+ fast
1365
+ moderate
1366
+ slow
BdE2T4oBgHgl3EQfRge6/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BdE2T4oBgHgl3EQfRge6/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:92a209d77bde2f71d9801d94de1e39f975e17a8eaeb69d4ad8362b722afe07a1
3
+ size 151696
BdE4T4oBgHgl3EQf5Q5A/content/2301.05321v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:6d96a590ac96bc21cd11ad454bc2ad0b2970aec2742165ec1bf0ef55d16bce30
3
+ size 983040
BdE4T4oBgHgl3EQf5Q5A/content/tmp_files/2301.05321v1.pdf.txt ADDED
@@ -0,0 +1,2198 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Springer Nature 2021 LATEX template
2
+ Homeostatic regulation of renewing tissue cell
3
+ populations via crowding control: stability,
4
+ robustness and quasi-dedifferentiation
5
+ Cristina Parigini1,2,3 and Philip Greulich1,2*
6
+ 1*School of Mathematical Sciences, University of Southampton,
7
+ Southampton, United Kingdom.
8
+ 2Institute for Life Sciences, University of Southampton,
9
+ Southampton, United Kingdom.
10
+ 3Te P¯unaha ¯Atea - Space Institute, University of Auckland,
11
+ Auckland, New Zealand.
12
+ *Corresponding author(s). E-mail(s): [email protected];
13
+ Contributing authors: [email protected];
14
+ Abstract
15
+ To maintain renewing epithelial tissues in a healthy, homeostatic state,
16
+ (stem) cell divisions and differentiation need to be tightly regulated.
17
+ Mechanisms of homeostatic control often rely on crowding control: cells
18
+ are able to sense the cell density in their environment (via various
19
+ molecular and mechanosensing pathways) and respond by adjusting
20
+ division, differentiation, and cell state transitions appropriately. Here
21
+ we determine, via a mathematically rigorous framework, which general
22
+ conditions for the crowding feedback regulation (i) must be minimally
23
+ met, and (ii) are sufficient, to allow the maintenance of homeosta-
24
+ sis in renewing tissues. We show that those conditions naturally allow
25
+ for a degree of robustness toward disruption of regulation. Further-
26
+ more, intrinsic to this feedback regulation is that stem cell identity is
27
+ established collectively by the cell population, not by individual cells,
28
+ which implies the possibility of ‘quasi-dedifferentiation’, in which cells
29
+ committed to differentiation may reacquire stem cell properties upon
30
+ depletion of the stem cell pool. These findings can guide future exper-
31
+ imental campaigns to identify specific crowding feedback mechanisms.
32
+ Keywords: keyword1, Keyword2, Keyword3, Keyword4
33
+ 1
34
+ arXiv:2301.05321v1 [q-bio.TO] 12 Jan 2023
35
+
36
+ Springer Nature 2021 LATEX template
37
+ 2
38
+ Homeostatic regulation of renewing tissue cell populations via crowding control
39
+ 1 Introduction
40
+ Many adult tissues are renewing, that is, terminally differentiated cells are
41
+ steadily removed and replaced by new cells produced by the division of cycling
42
+ cells (stem cells and progenitor cells), which then differentiate. In order to
43
+ maintain those tissues in a healthy, homeostatic state, (stem) cell divisions
44
+ and differentiation must be tightly balanced. Adult stem cells are the key
45
+ players in maintaining and renewing such tissues due to their ability to produce
46
+ cells through cell division and differentiation persistently [1]. However, the
47
+ underlying cell-intrinsic and extrinsic factors that regulate a homeostatic state
48
+ are complex and not always well understood.
49
+ Several experimental studies have identified mechanisms and pathways that
50
+ regulate homeostasis. For example, cell crowding can trigger delamination and
51
+ thus loss of cells in Drosophila back [2], and differentiation in cultured human
52
+ colon, various zebrafish epiderimises, and canine kidney cells [3, 4]. On the
53
+ other hand, cell crowding can affect cell proliferation: overcrowding can inhibit
54
+ proliferation [5], whereas a reduction in the cell density, obtained, for example,
55
+ by stretching a tissue [6] causes an increase in proliferative activity (both
56
+ shown in cultured canine kidney cells). Although the mechanisms to mediate
57
+ this regulation are not always clear, experimental studies on mechanosensing
58
+ showed that cell overcrowding reduces cell motility and consequently produces
59
+ a compression on cells that inhibits cell proliferation [5, 7]. Another mechanism
60
+ utilising crowding feedback is the competition for limited growth signalling
61
+ factors [8]. More specifically, in the mouse germ line, cells in the niche respond
62
+ to a growth factor (FGF5) that promotes proliferation over differentiation,
63
+ which they deplete upon being exposed to it. Therefore, the more cells are
64
+ in the niche, the less FGF5 is available per cell, and the less proliferation (or
65
+ more differentiation) occurs.
66
+ Despite differing in the involved molecular pathways and many other
67
+ details, all these regulatory mechanisms are, in essence, sensing the cell den-
68
+ sity in their environment and responding by adjusting their propensities to
69
+ divide, differentiate, die, or emigrate from the tissue. This class of mechanisms,
70
+ for which cell fate propensities depend on the cell density, can be classified as
71
+ crowding feedback regulation: the cell density determines the cells’ prolifera-
72
+ tion and differentiation, which affects their population dynamics and thus the
73
+ cell density. However, the crowding response to changes in cell density cannot
74
+ be arbitrary in order to maintain homeostasis. It must provide a (negative)
75
+ feedback, in the sense that cells sense the cell density and adjust proliferation,
76
+ differentiation, and cell loss, such that the cell density is decreased if it is too
77
+ high and increased if it is too low. For simple tissues consisting of a single
78
+ cell type with a unique cell state, it is relatively straightforward to give the
79
+ conditions for crowding feedback to maintain homeostasis successfully. In this
80
+ case, when the cell division rate decreases with cell density and differentiation
81
+ and or death rate increase with cell density, a homeostatic state is maintained.
82
+ However, such conclusions are not as simple to make when a tissue consists of
83
+ a complex lineage hierarchy and a multitude of underlying cellular states. In
84
+
85
+ Springer Nature 2021 LATEX template
86
+ Homeostatic regulation of renewing tissue cell populations via crowding control
87
+ 3
88
+ the latter, more realistic case, conditions for successful homeostatic regulation
89
+ – in which case we speak of crowding control – may take more complex forms.
90
+ Previous studies based on mathematical modelling have shed some light
91
+ on quantitative mechanisms for homeostatic control [9–13]. In particular, in
92
+ [13], a mathematical assessment of crowding feedback modelling shows that
93
+ a (dynamic) homeostatic state exists under reasonable biological conditions.
94
+ Nevertheless, the case of dynamic homeostasis considered there may not nec-
95
+ essarily be a steady state but could also exhibit oscillations in cell numbers
96
+ (as does realistically happen in the uterus during the menstrual cycle). While
97
+ the criterion presented in [13] provides a valid sufficient condition for dynamic
98
+ homeostasis, it relies on a rather abstract mathematical quantity – the domi-
99
+ nant eigenvalue of the dynamical matrix – that is difficult, if not impossible,
100
+ to measure in reality.
101
+ Here, we wish to generalise previous findings and seek to identify general
102
+ conditions for successful homeostatic control if propensities for cell division,
103
+ differentiation, and loss are responsive to variations in cell density. More
104
+ precisely, we derive conditions that must be minimally fulfilled (necessary
105
+ conditions) and conditions which are sufficient, to ensure that homeostasis pre-
106
+ vails. To identify and formulate those conditions, we note that homeostasis is
107
+ a property of the tissue cell population dynamics, which can be mathemati-
108
+ cally expressed as a dynamical system. Even if a numerically exact formulation
109
+ of the dynamics may not be possible, one can formulate generic yet mathe-
110
+ matically rigorous conditions by referring to the criteria for the existence of
111
+ stable steady states in the cell population dynamics of renewing tissues. We
112
+ will derive those conditions by mathematical, analytical means, augmented by
113
+ a numerical analysis testing the limits of those conditions.
114
+ We will also show that homeostatic control by crowding feedback possesses
115
+ inherent robustness to failures and perturbations of the regulatory pathways,
116
+ which may occur through external influences (e.g. wide-spread biochemical fac-
117
+ tors) and genetic mutations. Finally, we will assess the response of cells when
118
+ the pool of stem cells is depleted. Crucially, we find that inherent to crowd-
119
+ ing feedback control is that formerly committed progenitor cells reacquire
120
+ self-renewal capacity without substantial changes in their internal states. Ded-
121
+ ifferentiation has been widely reported under conditions of tissue regeneration
122
+ [14, 15] or when stem cells are depleted [16–19], which is usually thought to
123
+ involve a substantial reprogramming of the cell-intrinsic states towards a stem
124
+ cell type. On the other hand, our analysis suggests the possibility of “quasi”-
125
+ dedifferentiation, the reversion from a committed cell to a stem cell by a
126
+ mere quantitative adjustment of the pacing of proliferation and differentiation,
127
+ without a substantial qualitative change in its expression profiles.
128
+
129
+ Springer Nature 2021 LATEX template
130
+ 4
131
+ Homeostatic regulation of renewing tissue cell populations via crowding control
132
+ 2 Modelling of tissue cell dynamics under
133
+ crowding feedback
134
+ We seek to assess the conditions for homeostasis in renewing tissue cell pop-
135
+ ulations, that is, either a steady state of the tissue cell population (strict
136
+ homeostasis) or long-term, bounded oscillations or fluctuations (dynamic
137
+ homeostasis), which represent well-defined constraints on the dynamics of the
138
+ tissue cell population. To this end, we will here derive a formal, mathematical
139
+ representation of the tissue cell dynamics under crowding feedback.
140
+ The cell population is fully defined by (i) the number of cells, (ii) the
141
+ internal (biochemical and mechanical) states of each cell, and (iii) the spatial
142
+ position of cells. We assume that a cell’s behaviour can depend on the cell
143
+ density and the states of cells in its close cellular environment. As we examine
144
+ a situation close to a homeostatic state, we assume that the cell density is
145
+ homogeneous over the range of interaction between cells, which expands over
146
+ a volume V . Hence, the cell density ρ is proportional to the average number
147
+ of cells, ¯n, in that volume, ρ =
148
+ ¯n
149
+ V . Similarly, we define the number of cells
150
+ in internal state i as ni, and the cell density of cells in internal state i as
151
+ ρi = ¯ni
152
+ V , where ¯ni is the expected value of ni. As we consider only the crowding
153
+ feedback response of cells, which only accounts for the cell densities ρi but
154
+ not the explicit position of cells, the spatial configuration (iii) is not relevant
155
+ to our considerations. Thus, the configuration of the cell population and its
156
+ time evolution is entirely determined by the average number of cells in each
157
+ state i, as a function of time t, ¯ni(t). The configuration of cell numbers ni
158
+ can change only through three processes: (1) cell division, whereby it must be
159
+ distinguished between the cell state of daughter cells, (2) the transition from
160
+ one cell state to another, (3) loss of a cell, through cell death or emigration
161
+ out of the tissue. Following the lines of Refs. [13, 20] and denoting as Xi,j,k a
162
+ cell in internal states i, j, k, respectively, we can formalise these events as:
163
+ cell division: Xi
164
+ λirjk
165
+ i
166
+ −−−→ Xj + Xk
167
+ (1)
168
+ cell state transition: Xi
169
+ ωij
170
+ −−→ Xj
171
+ (2)
172
+ cell loss: Xi
173
+ γi
174
+ −→ ∅ ,
175
+ (3)
176
+ where the symbols above the arrows denote the dynamical rates of the transi-
177
+ tions, i.e. the average frequency at which such events occur. In particular, γi
178
+ is the rate at which a cell in state i is lost, ωij the rate at which a cell changes
179
+ its state from i to j and λirjk
180
+ i
181
+ denotes the rate at which a cell i divides to pro-
182
+ duce two daughter cells, one in state j and one in state k (i = j, j = k, k = i
183
+ are possible). For later convenience, we distinguish here the overall rate of cell
184
+ division in state i, λi and the probability rjk
185
+ i
186
+ that such a division produces
187
+ daughter cells in states j and k.
188
+ Since we consider a situation where cells can respond to the cell densities
189
+ ρi via crowding feedback, all the rates and probabilities (λi, γi, ωij, rjk
190
+ i ) may
191
+
192
+ Springer Nature 2021 LATEX template
193
+ Homeostatic regulation of renewing tissue cell populations via crowding control
194
+ 5
195
+ depend on the cell densities of either state j, ρj. For convenience, we discretise
196
+ the number of states in case the state space is a continuum and only distinguish
197
+ states which have substantially different propensities (λi, γi, ωij, rjk
198
+ i ). Without
199
+ loss of generality, we assume that there are m states, that is, i, j, k = 1, ..., m
200
+ (for a rigorous argument for the discretisation of the state space, see [13]).
201
+ The rates given above denote the average number of events happening per
202
+ time unit. Thus, we can express the total rate of change of the average (i.e.
203
+ expected) number of cells ¯ni(t), that is, the derivative ˙¯ni = d¯ni
204
+ dt , in terms of
205
+ the rates of those events. This defines a set of ordinary differential equations.
206
+ Following the lines of Refs. [13, 20], we can write ˙ni as,
207
+ ˙¯ni =
208
+ ��
209
+ j
210
+ ωji¯nj + λj
211
+ ��
212
+ k
213
+ rik
214
+ j + rki
215
+ j
216
+
217
+ ¯nj
218
+
219
+ − ¯ni
220
+
221
+ λi + γi +
222
+
223
+ j
224
+ ωij
225
+
226
+ ,
227
+ (4)
228
+ where for convenience, we did not write the time dependence explicitly, i.e.
229
+ ni = ni(t), and all parameters may depend on the cell densities ρj. Since V is
230
+ constant, we can divide by V to equivalently express this in terms of the cell
231
+ state densities, ρi = ¯ni
232
+ V , and then write Eq. (4) compactly as,
233
+ d
234
+ dtρ(t) = A(ρ(t)) ρ(t)
235
+ (5)
236
+ where ρ = (ρ1, ρ2, ...) is the vector of cell state densities and A(ρ) is the matrix,
237
+ A =
238
+
239
+
240
+ λ1 − �
241
+ j̸=1 κ1j − γ1
242
+ κ21
243
+ κ31
244
+ · · ·
245
+ κ12
246
+ λ2 − �
247
+ j̸=2 κ2j − γ2 κ32
248
+ · · ·
249
+ κ1m
250
+ κ2m
251
+ · · · λm − �
252
+ j̸=m κmj − γm
253
+
254
+ � ,
255
+ (6)
256
+ in which κij = λi2rj
257
+ i + ωij, with rj
258
+ i = �
259
+ k(rjk
260
+ i
261
+ + rkj
262
+ i )/2, is the total transition
263
+ rate, that combines all transitions from Xi to Xj by cell divisions and direct
264
+ state transitions (again, all parameters may depend on ρ, as therefore also
265
+ does A). We can thus generally write the elements of the matrix A, aij with
266
+ i, j = 1, ..., m as
267
+ aij =
268
+ � λi − γi − �
269
+ k̸=i κik
270
+ for i = j
271
+ κji
272
+ for i ̸= j
273
+ (7)
274
+ We now make the mild assumption that divisions of the form Xi → Xj+Xk
275
+ are effectively three events, namely, cell duplication, Xi → Xi + Xi coupled to
276
+ cell state changes, Xi → Xj and Xi → Xk, if j ̸= i or k ̸= i. In this view, the
277
+ parameters relevant for crowding feedback are the total cell state transition
278
+ propensities κij and the cell division rate λi, as in (6), instead of ωij and rjk
279
+ i .
280
+ These equations describe a dynamical system which, for given initial con-
281
+ ditions, determines the time evolution of the cell densities, ρi(t). Crucially,
282
+
283
+ Springer Nature 2021 LATEX template
284
+ 6
285
+ Homeostatic regulation of renewing tissue cell populations via crowding control
286
+ this description allows for a rigorous mathematical definition of what a home-
287
+ ostatic state is, and to apply tools of dynamical systems analysis to determine
288
+ the circumstances under which a homeostatic state prevails. In particular, we
289
+ define a strict homeostatic state as a steady state of the system, (5), when the
290
+ cell numbers – and thus cell densities, given that V is fixed – in each state
291
+ do not change, mathematically expressed as dρ
292
+ dt = 0 (a fixed point of the sys-
293
+ tem). A dynamic homeostatic state is when cell densities may also oscillate
294
+ or fluctuate but remain bounded and thus possess a finite long-term average
295
+ cell population (in which case the system either approaches a steady state or
296
+ limit cycles – that is, oscillations – or chaotic but bounded behaviour). Based
297
+ on these definitions, we can now analyse under which circumstances crowd-
298
+ ing feedback can maintain those states, which in the case of strict homeostasis
299
+ requires, in addition, that the corresponding steady state is stable.
300
+ 2.1 Cell types and lineage hierarchies
301
+ According to [13], cell population dynamics of the type (5) can be associated
302
+ with a cell state network, in which each state is a node, and the nodes are
303
+ connected through cell state transition (direct transitions and cell divisions).
304
+ Furthermore, by decomposing this network in strongly connected components
305
+ (SCCs), the cell fate model can be viewed as a directed acyclic network [21],
306
+ generally called the condensed network. Here, we follow the definitions of [13]
307
+ and define a cell type as an SCC of the cell state network, so that any cell states
308
+ connected via cyclic cell state trajectories (sequences of cell state transitions)
309
+ are of the same type, and the condensed network of cell types represents the
310
+ cell lineage hierarchy. This definition ensures that cells of the same type have
311
+ the same lineage potential (outgoing cell state trajectories) and that the stages
312
+ of the cell cycle are associated with the same cell type. In this context, we
313
+ will in the following also speak of differentiation when a cell state transition
314
+ between different cell types occurs.
315
+ Each cell type can be classified as self-renewing, declining or hyper-
316
+ proliferating, depending on the dominant eigenvalue µ (called growth parame-
317
+ ter) of the dynamical matrix A (from Eq. (5) ff.) reduced to that SCC. This
318
+ is µ = 0 for self-renewing cell types, when cell numbers of that type remain
319
+ constant over time, µ < 0 (µ > 0) for the declining (hyperproliferating) types
320
+ when cell numbers decline (increase) in the long term [13]. Importantly, for the
321
+ population dynamics to be strictly homeostatic, which means that a steady
322
+ state of model (5) exists, the cell type network must fulfil strict rules. These
323
+ are: (i) at least one self-renewing cell type (with µ = 0) must exist; (ii) self-
324
+ renewing cell types must stay at an apex of the condensed network; (iii) all
325
+ the other cells must be of declining types. This means that the critical task of
326
+ homeostatic control is to ensure that the kinetic parameters of the cell type at
327
+ the apex of the cell lineage hierarchy are fine-tuned to maintain exactly µ = 0.
328
+ Therefore, we can restrict our analysis to find conditions for the cell type
329
+ at the lineage hierarchy’s apex to be self-renewing, which we will do in the
330
+ following. Other cell types simply need that differentiation (transition towards
331
+
332
+ Springer Nature 2021 LATEX template
333
+ Homeostatic regulation of renewing tissue cell populations via crowding control
334
+ 7
335
+ another cell type) or loss is faster than proliferation, so that they become
336
+ declining cell types, µ < 0, but those rates do not require fine-tuning and thus
337
+ trivially regulated. We note that when we consider only cell states of the type
338
+ at the apex of the cell lineage hierarchy, any differentiation event is – according
339
+ to this restricted model – a cell loss event and included as event occurring with
340
+ rates γi. Given that cell loss from a cell type at the lineage apex is rare, we
341
+ will therefore in the following also denote the rates γi simply as differentiation
342
+ rates.
343
+ 3 Results
344
+ We will now determine necessary and sufficient conditions for the establish-
345
+ ment of strict and dynamical homeostasis when subject to crowding feedback,
346
+ which we here define through the derivatives of the dynamical parameters
347
+ λi, rjk
348
+ i , ωij, γi as a function of the cell densities. As argued before, we only need
349
+ to consider cell types at an apex of the cell type network, which, for home-
350
+ ostasis to prevail, must have a growth parameter (i.e. dominant eigenvalue of
351
+ matrix A in Eq. (6)) µ = 0. Furthermore, we assume that the apex cell type
352
+ resides in a separate stem cell niche. Therefore, the parameters only depend
353
+ on cell densities ρi of states associated with that cell type, i.e. we can write
354
+ A = A(ρ), where ρ = �
355
+ i∈S ρi comprises only cell states of the apex cell type
356
+ S. Provided that, the matrix elements are functions of ρ, and therefore also µ
357
+ is a function of ρ. Thus, self-renewal corresponds to a non-trivial fixed point,
358
+ ρ∗, of Eq. (5), restricted to cell type S, for which the dominant eigenvalue of
359
+ A is zero, that is µ(ρ∗) = 0 (ρ∗ = �
360
+ i∈S ρ∗
361
+ i ).
362
+ For convenience, we will often generally refer to parameters as αi, i =
363
+ 1, ..., 2m + m2, where αi stands for any of the parameters, {λi, γi, κij|i, j =
364
+ 1, ..., m}, respectively1. Hence, we study which conditions the functions αi(ρ)
365
+ must meet to maintain homeostasis. In particular, we study how those param-
366
+ eters qualitatively change with the cell density – increase or decrease – that
367
+ is, we study how the sign and magnitude of derivatives α′
368
+ i :=
369
+ dαi
370
+
371
+ affects
372
+ homeostasis.
373
+ A crucial property of the matrix A(ρ) is that it is always a Metzler matrix,
374
+ since all its off-diagonal elements, κij ≥ 0. Since the cell state network of a
375
+ cell type is strongly connected, we can further state that A(ρ) is irreducible.
376
+ Notably, for irreducible Metzler matrices holds the Perron-Frobenius theorem
377
+ [22], and thus A(ρ) possesses a simple, real dominant eigenvalue µ. Besides,
378
+ it as left and right eigenvectors associated with µ, respectively indicated as v
379
+ and w, which are strictly positive, that is, all their entries are vi > 0, wi > 0.
380
+ From this follows that the partial derivative of the dominant eigenvalue µ by
381
+ 1More
382
+ precisely,
383
+ αi|i=1,..,m
384
+ :=
385
+ λi, αi|i=m+1,..,2m
386
+ :=
387
+ γi−m, αi|i=2m+1,..,2m+m2
388
+ :=
389
+ κ⌊(i−2m)/m⌋,i−⌊(i−2m)/m⌋m
390
+
391
+ Springer Nature 2021 LATEX template
392
+ 8
393
+ Homeostatic regulation of renewing tissue cell populations via crowding control
394
+ the i, j-th element of A, aij = [A]ij is always positive:
395
+ ∂µ
396
+ ∂aij
397
+ = viwj
398
+ vw > 0
399
+ (8)
400
+ where the left equality is according to [23] and is generally valid for simple
401
+ eigenvalues. Here, v is assumed to be in row form, and vw thus corresponds
402
+ to a scalar product.
403
+ 3.1 Sufficient condition for dynamic homeostasis
404
+ In [13], it was shown that a dynamic homeostatic state, where cell numbers
405
+ may change over time but stay bounded, is assured if, 2
406
+ µ′(ρ) < 0 for all ρ > 0.
407
+ (9)
408
+ This sufficient condition requires that the dominant eigenvalue of A as a func-
409
+ tion of the cell density, µ(ρ), is a strictly decreasing function of cell density.
410
+ Also, the range of this function must be sufficiently large so that it has a root,
411
+ i.e. a value ρ∗ with µ(ρ∗) = 0 must exist for the function µ(ρ).
412
+ Assuming that a non-trivial steady state, ρ∗ > 0, exists, we now translate
413
+ the sufficient condition for a dynamic homeostatic state, Eq. (9), into condi-
414
+ tions on the parameters as a function of the cell density, αi(ρ). In particular,
415
+ we can write,
416
+ µ′(ρ) =
417
+
418
+ ij
419
+ ∂µ
420
+ ∂aij
421
+ ∂aij
422
+ ∂ρ =
423
+
424
+ ij
425
+ viwj
426
+ vw a′
427
+ ij =
428
+
429
+ i
430
+ viwi
431
+ vw a′
432
+ ii +
433
+
434
+ i,j̸=i
435
+ viwj
436
+ vw a′
437
+ ij
438
+ =
439
+
440
+ i
441
+ viwi
442
+ vw
443
+
444
+ �λ′
445
+ i − γ′
446
+ i −
447
+
448
+ j̸=i
449
+ κ′
450
+ ij
451
+
452
+ � +
453
+
454
+ i,j̸=i
455
+ vjwi
456
+ vw κ′
457
+ ij ,
458
+ (10)
459
+ where we used Eq. (8) and the explicit forms of aij, the elements of the matrix
460
+ A according to Eq. (7). Provided that all the parameters depend on ρ, condition
461
+ (9) results in:
462
+ 0 > µ′ =⇒ 0 >
463
+
464
+ i
465
+ viwi (λ′
466
+ i − γ′
467
+ i) + wi
468
+
469
+ j̸=i
470
+ (vj − vi)κ′
471
+ ij
472
+ for all ρ > 0 ,
473
+ (11)
474
+ While we cannot give an explicit general expression for the dominant eigen-
475
+ vectors v, w, this condition is sufficiently fulfilled if each term of the sum on
476
+ the right-hand side of Eq. (11) is negative. More restrictively, we have Eq. (11)
477
+ 2In [13], this condition, defined through dependency on cell number, can be directly translated
478
+ into a condition on the cell density derivative if the volume is assumed as a constant.
479
+
480
+ Springer Nature 2021 LATEX template
481
+ Homeostatic regulation of renewing tissue cell populations via crowding control
482
+ 9
483
+ sufficiently fulfilled if
484
+
485
+
486
+
487
+
488
+
489
+ λ′
490
+ i ≤ 0, γ′
491
+ i ≥ 0 for all i
492
+ λ′
493
+ i < 0 or γ′
494
+ i > 0 at for least one i
495
+ κ′
496
+ ij = 0 for all i, j
497
+ for ρ > 0
498
+ (12)
499
+ This means that, excluding rates that are zero, which are biologically mean-
500
+ ingless, if no direct state transitions within a cell type are subject to crowding
501
+ feedback (κ′
502
+ ij = 0), while all (non-zero) cell division rates depend negatively
503
+ on ρ (λ′
504
+ i < 0), and differentiation rates depend positively (γ′
505
+ i > 0), for all
506
+ attainable levels of ρ, then dynamical homeostasis is ensured.
507
+ Alternatively, we can rewrite Eq. (11) as
508
+ 0 >
509
+
510
+ i
511
+ viwi
512
+ vw
513
+
514
+ �λ′
515
+ i − γ′
516
+ i −
517
+
518
+ j̸=i
519
+ κ′
520
+ ij +
521
+
522
+ j̸=i
523
+ vj
524
+ vi
525
+ κ′
526
+ ij
527
+
528
+
529
+ for all ρ > 0 ,
530
+ (13)
531
+ which, due to
532
+ vj
533
+ vi
534
+ > 0, implies another sufficient condition for dynamic
535
+ homeostasis:
536
+
537
+
538
+
539
+
540
+
541
+ λ′
542
+ i ≤ 0, γ′
543
+ i ≥ 0 for all i
544
+ λ′
545
+ i < 0 or γ′
546
+ i > 0 at for least one i
547
+ κ′
548
+ ij ≤ 0 with |�
549
+ j κ′
550
+ ij| ≤ γ′
551
+ i − λ′
552
+ i for all i, j
553
+ (14)
554
+ The above condition is less restrictive than Eq. (12), allowing for some non-
555
+ zero crowding feedback dependency of state transition rates κij, as long as the
556
+ crowding feedback strength of the total outgoing transition rate of each state
557
+ does not outweigh the feedback on proliferation and differentiation rate of that
558
+ state (if there is).
559
+ 3.2 Necessary condition for strict homeostasis
560
+ We now consider the circumstances under which a strict homeostatic is main-
561
+ tained, that is, when a steady state of the cell population exists and is
562
+ asymptotically stable.
563
+ A necessary condition for the existence of a steady state ρ∗ (irrespective
564
+ of stability) has been given in [13], namely, that the cell type at the apex of
565
+ the lineage hierarchy is self-renewing, i.e. its dynamical matrix A has µ = 0.
566
+ µ depends on the cell density ρ of the apex cell type, since the dynamical
567
+ parameters αi and thus A depend on ρ. As before, it is required that µ(ρ∗)
568
+ has sufficient range so that a value ρ∗ with µ(ρ∗) = 0 exists. This condition is
569
+ fulfilled if the range of the feedback parameters αi(ρ) is sufficiently large. In
570
+ that case there exists an eigenvector ρ∗ with A(ρ∗)ρ∗ = 0, which can be chosen
571
+ by normalisation to fulfil �
572
+ i∈S ρ∗
573
+ i = ρ∗. Thus, ρ∗ is a fixed point (steady state)
574
+
575
+ Springer Nature 2021 LATEX template
576
+ 10
577
+ Homeostatic regulation of renewing tissue cell populations via crowding control
578
+ of the cell population system (5). Hence, we need to establish what is required
579
+ for this state to be asymptotically stable.
580
+ To start with, we give the Jacobian matrix of the system (5) at the fixed
581
+ point ρ∗ :
582
+ [J]ij = ∂[A(ρ)ρ]i
583
+ ∂ρj
584
+ ����
585
+ ρ=ρ∗
586
+ = a∗
587
+ ij + ηi ,
588
+ (15)
589
+ where
590
+ ηi =
591
+
592
+ k
593
+ a′
594
+ ikρ∗
595
+ k .
596
+ (16)
597
+ Here and in the following, we assume the derivatives to be taken at the steady
598
+ state, i.e. a′
599
+ ij :=
600
+ daij
601
+ dρ |ρ=ρ∗. The eigenvalues of the Jacobian matrix J at ρ∗
602
+ determine the stability of the steady state ρ∗: it is asymptotically stable if and
603
+ only if the real part of all eigenvalues of J(ρ∗) is negative.
604
+ The Routh-Hurwitz theorem [24] states that for a polynomial to have only
605
+ roots with negative real part, all its coefficients must necessarily be positive.
606
+ Given that the eigenvalues of the Jacobian matrix J are the roots of its char-
607
+ acteristic polynomial, a necessary condition for ρ∗ to be asymptotically stable
608
+ is that the coefficients of the characteristic polynomial of J are all positive.
609
+ Let us start by considering a self-renewing cell type with exactly two cell
610
+ states being at the apex of a lineage hierarchy. This system has a 2 × 2 dynam-
611
+ ical matrix A and Jacobian J, whereby A is irreducible and has dominant
612
+ eigenvalue µA = 0. The characteristic polynomial of a generic 2×2 matrix, M,
613
+ is
614
+ P M(s) = s2 + pM
615
+ 1 s + pM
616
+ 0 .
617
+ (17)
618
+ with pM
619
+ 1 = −tr(M) and pM
620
+ 0 = det(M). In particular, since A has an eigenvalue
621
+ zero,
622
+ pA
623
+ 0 = det(A) = a11a22 − a12a21 = 0 .
624
+ (18)
625
+ From this follows that the right and left eigenvectors to the matrix A
626
+ associated with the dominant eigenvalue µA = 0, w and v, are:
627
+ w =
628
+
629
+ −a22
630
+ a21
631
+
632
+ and v =
633
+
634
+ −a22 a12
635
+
636
+ .
637
+ (19)
638
+ From the Jacobian matrix J, we get equivalently,
639
+ pJ
640
+ 0 = det(J) = (a21 − a22)(−a22η1 + a12η2)
641
+ a22
642
+ = vη |w|
643
+ a22
644
+ ,
645
+ (20)
646
+ with the L1-norm |w| = w1 + w2 = −a22 + a213. Here we used the form of J
647
+ in Eq. (15) with η = (η1, η2) from (16), as well as the relations (18) and (19),
648
+ and we factorised the determinant.
649
+ 3Note that aii is always negative or zero
650
+
651
+ Springer Nature 2021 LATEX template
652
+ Homeostatic regulation of renewing tissue cell populations via crowding control
653
+ 11
654
+ From Eq. (10), we can further establish:
655
+ µ′ =
656
+
657
+ ij
658
+ viwj
659
+ vw a′
660
+ ij =
661
+
662
+ ij
663
+ |w|
664
+ ρ∗
665
+ viρ∗
666
+ j
667
+ vw a′
668
+ ij = |w|
669
+ ρ∗
670
+
671
+ vw
672
+ (21)
673
+ = − a22pJ
674
+ 0
675
+ ρ∗pJ
676
+ 1 a22
677
+ .
678
+ (22)
679
+ Here, we used that ρ∗ is a dominant right eigenvector, and thus ρ∗ =
680
+ ρ∗
681
+ |w|w,
682
+ and furthermore we used the definition of ηi = �
683
+ j a′
684
+ ijρ∗
685
+ j, we substituted Eq.
686
+ (20), and used that vw = a2
687
+ 22 + a12a21 = −pA
688
+ 1 a22. Finally, we get:
689
+ pJ
690
+ 0 = −µ′ρ∗pA
691
+ 1 .
692
+ (23)
693
+ Notably, we can show that this relation also holds for higher dimensions by
694
+ explicitly computing the coefficients of characteristic polynomials pA,J
695
+ i
696
+ , the
697
+ eigenvalues and eigenvectors, and then evaluating both sides of the equation.
698
+ For systems with three states, this can be done analytically. For systems with
699
+ 4,5, and 6 states we tested relation (23) numerically by generating N =1000
700
+ random matrices with entries chosen from a uniform distribution4. In each
701
+ case, this relation was fulfilled. Hence we are confident that this relation holds
702
+ up to 6 states, and it is reasonable to expect this to hold also for larger systems.
703
+ Since A has a simple dominant eigenvalue µA = 0, we can factorise one term
704
+ from the characteristic polynomial, P(s) = sQ(s) knowing that all roots of
705
+ Q(s) are negative. Applying the Routh-Hurwitz necessary condition to Q(s), it
706
+ follows that the coefficients of the polynomial Q, pQ
707
+ i > 0, where i = 1, 2, ..., n−
708
+ 1. Thus, pA
709
+ 1 > 0 and considering that ρ∗ > 0 by definition, then for having
710
+ pJ
711
+ 0 > 0 we must require µ′ < 0. Therefore, a necessary condition for a stable,
712
+ strict homeostatic state is
713
+ 0 > µ′ =⇒ 0 >
714
+
715
+ i
716
+ viwi (λ′
717
+ i − γ′
718
+ i) + wi
719
+
720
+ j̸=i
721
+ (vj − vi)κ′
722
+ ij
723
+ ������
724
+ ρ=ρ∗
725
+ ,
726
+ (24)
727
+ where on the right-hand side, we used Eq. (11). This condition is bound to the
728
+ validity of Eq. (23), that is, we can show it analytically for up to three states
729
+ and numerically up to 6 states. Nonetheless, we also expect this to be true for
730
+ larger systems.
731
+ One way to satisfy this necessary condition is if at ρ = ρ∗
732
+
733
+
734
+
735
+
736
+
737
+ �
738
+ i ≤ 0, γ′
739
+ i ≥ 0 for all i
740
+ λ′
741
+ i < 0 or γ′
742
+ i > 0 at for least one i
743
+ κ′
744
+ ij = 0
745
+ .
746
+ (25)
747
+ 4The diagonal elements of the random matrix are tuned using a local optimiser (fmincon
748
+ function of Matab) so that the matrix has a zero dominant eigenvalue.
749
+
750
+ Springer Nature 2021 LATEX template
751
+ 12
752
+ Homeostatic regulation of renewing tissue cell populations via crowding control
753
+ Notably, the necessary conditions (24) and (25) only differ from the suffi-
754
+ cient conditions for dynamic heterogeneity, Eqs. (11) and (12), by needing to
755
+ be fulfilled only at the steady-state cell density ρ∗, whereas to ensure dynamic
756
+ homeostasis, those should be valid for a sufficiently large range of ρ.
757
+ 3.3 Sufficient condition for strict homeostasis
758
+ Now we assess under which circumstances a strict homeostatic state is assured
759
+ to prevail.
760
+ First of all, the necessary conditions from above need to be fulfilled. In
761
+ particular, the parameter functions αi(ρ) must have a sufficient range so that
762
+ µ(ρ) has a root, i.e. ρ∗ with µ(ρ∗) = 0 exists, from which the existence of
763
+ a steady state follows. The question now is whether we can find sufficient
764
+ conditions assuring that the fixed point ρ∗ with �
765
+ i ρ∗
766
+ i = ρ∗ is (asymptotically)
767
+ stable.
768
+ Let us define a matrix B(x), x = (x1, ..., xm) with bij(x) = [B]ij(x) =
769
+ a∗
770
+ ij +xi. Hence, B(xi = 0) = A(ρ∗) and B(xi = ηi) = J, where J, the Jacobian
771
+ matrix, and ηi are defined as in (15) and (16), respectively. We consider now the
772
+ dominant eigenvalue as function of the entries of B, µ[B] := µ({bij}|i,j=1,...,m)
773
+ (the square brackets are chosen to denote the difference from the function
774
+ µ(ρ)). For sufficiently small ηi, we can then express the dominant eigenvalue
775
+ of the Jacobian matrix J, µ[J], relative to the dominant eigenvalues of A∗ :=
776
+ A(ρ∗) as,
777
+ µ[J] = µ[A∗] +
778
+
779
+ i
780
+ ∂µ
781
+ ∂xi
782
+ |xi=0 ηi + O(η2) ,
783
+ (26)
784
+ with,
785
+ ∂µ
786
+ ∂xi
787
+ |xi=0 =
788
+
789
+ ij
790
+ ∂µ
791
+ ∂bij
792
+ ∂bij
793
+ ∂xi
794
+ |xi=0 =
795
+
796
+ ij
797
+ ∂µ
798
+ ∂aij
799
+ |B=A∗ ,
800
+ (27)
801
+ since for x = 0, bij = aij for all i, j. It follows that for sufficiently small5 ηi,
802
+ and if all ηi < 0, we have
803
+ µJ = µ[A∗](ρ∗) +
804
+
805
+ i
806
+ ∂µB
807
+ ∂xi
808
+ |xi=0ηi + O(η2
809
+ i ) ≈
810
+
811
+ i
812
+ ∂µA
813
+ ∂aij
814
+ ηi < 0
815
+ (28)
816
+ since all ∂µA
817
+ ∂aij > 0 (according to Eq. (8)) and µA(ρ∗) = 0. Hence, since µJ < 0,
818
+ the steady state ρ∗ is asymptotically stable if all ηi < 0. Thus, we get a
819
+ sufficient condition for asymptotic stability of the steady state ρ∗:
820
+ 0 > ηi = ρ∗
821
+ i (λ′
822
+ i − γ′
823
+ i) +
824
+
825
+ k̸=i
826
+ (κ′
827
+ kiρ∗
828
+ k − κ′
829
+ ikρ∗
830
+ i ) > −ϵi for all i
831
+ (29)
832
+ 5That is, there exist ϵi > 0 so that this is valid for any |ηi| < ϵi
833
+
834
+ Springer Nature 2021 LATEX template
835
+ Homeostatic regulation of renewing tissue cell populations via crowding control
836
+ 13
837
+ where ϵi > 0 is sufficiently small. As this is an asymptotically stable steady
838
+ state, it corresponds to a controlled strict homeostatic state. In this case,
839
+ even if the cell numbers are disturbed (to some degree), the cell population is
840
+ regulated to return to the strict homeostatic state.
841
+ Notably, condition (29) is fulfilled if,
842
+
843
+
844
+
845
+
846
+
847
+
848
+
849
+
850
+
851
+ λ′
852
+ i ≤ 0, γ′
853
+ i ≥ 0 for all i
854
+ λ′
855
+ i < 0 or γ′
856
+ i > 0 at for least one i
857
+ κ′
858
+ ij = 0
859
+ and |λ′
860
+ i|, |γ′
861
+ i|, < ϵi
862
+ (30)
863
+ Furthermore, we may soften the condition on κij to
864
+ κ′
865
+ ij
866
+ κ′
867
+ ji <
868
+ ρ∗
869
+ j
870
+ ρ∗
871
+ i to allow also
872
+ some degree of feedback for the κij.
873
+ The conditions (30) are very similar to the ones for dynamic homeostasis,
874
+ (12), but here these conditions only need to be fulfilled at ρ = ρ∗, whereas
875
+ for dynamic homeostasis they need to be fulfilled for a sufficient range of ρ.
876
+ Moreover, in addition to the qualitative nature of the feedback (related to
877
+ the signs of λ′
878
+ i, γ′
879
+ i), the ‘strength’ of the crowding feedback, i.e. the absolute
880
+ values of λ′
881
+ i, γ′
882
+ i must not be ‘too large’, that is, smaller than ϵi. We cannot, in
883
+ general and for all system sizes, give a definite value for the feedback strength
884
+ bound ϵi below which strict homeostasis is assured. Nevertheless, by using the
885
+ sufficient stability criterion based on the Routh-Hurwitz criterion [24] we can
886
+ identify those bounds for systems with up to three cell states, which guides
887
+ expectations for larger systems. The details of this criterion and the necessary
888
+ derivations are shown in Appendix A. There, we show that for systems with one
889
+ or two cell states, ϵi = ∞, which means that asymptotic stability is ensured for
890
+ arbitrary feedback strengths. For systems with three cell states, we can assure
891
+ that ϵi = ∞ if certain further conditions are met (see Eq. (A13)). Otherwise,
892
+ ϵi can be determined implicitly from the roots of a quadratic form (Eq. (A14)),
893
+ and thus stability may depend on the magnitude of the feedback. In principle,
894
+ such bounds can be found for larger systems too, but the algebraic complexity
895
+ of this process renders it unfeasible to do this in practical terms.
896
+ 3.4 Robustness to perturbations and failures
897
+ Now, we wish to assess the robustness of the above crowding control mecha-
898
+ nism, i.e. what occurs if it is disrupted, for example, by the action of toxins,
899
+ other environmental cues, or by cell mutations. More precisely, we will study
900
+ what happens if one or more feedback pathways, here characterised as a param-
901
+ eter αi with α′
902
+ i ̸= 0 fulfilling the conditions for (dynamic or strict) homeostatic
903
+ control, is failing, that is, it becomes α′
904
+ i = 0. We will first address the case
905
+ of tissue-extrinsic factors, i.e. those affecting all the cells in the tissue, and
906
+ then the case of single-cell mutations. In the latter case, only a single cell
907
+ would initially show a dysregulated behaviour, yet, if this confers a proliferative
908
+ advantage, it can lead to hyperplasia and possibly cancer [25–27].
909
+
910
+ Springer Nature 2021 LATEX template
911
+ 14
912
+ Homeostatic regulation of renewing tissue cell populations via crowding control
913
+ First, we note that the sufficient condition for strict homeostasis, given
914
+ by Eq. (30), is overly restrictive. In a tissue cell type under crowding feed-
915
+ back control with λ′
916
+ i < 0 and γ′
917
+ i > 0 for more than one i, there is a degree
918
+ of redundancy. That is, if the feedback is removed for one or more of these
919
+ parameters (changing to λ′
920
+ i = 0 and, or γ′
921
+ i = 0), then the sufficient condition
922
+ for a strict homeostatic state remains fulfilled as long as at least one λ′
923
+ i or
924
+ γ′
925
+ i remains non-zero. This possible redundancy confers a degree of robustness,
926
+ meaning that feedback pathways can be removed – setting α′
927
+ i = 0 – without
928
+ losing homeostatic control. Since the necessary conditions, Eqs. (24), are even
929
+ less restrictive, tissue homeostasis may even tolerate more severe disruptions
930
+ that reverse some feedback pathways, e.g. switching from λ′
931
+ i < 0 to λ′
932
+ i > 0,
933
+ as long as other terms in the sum on the right-hand side of (24) compensate
934
+ for this changed sign, ensuring that the sum as a whole is negative. In any
935
+ case, it is important to remind the underlying assumption for which a non-
936
+ trivial steady state exists. In case the variability of the kinetic parameters is
937
+ not enough to assure the condition µ(ρ∗ = 0), then the tissue will degenerate,
938
+ either shrinking and eventually disappearing or indefinitely growing.
939
+ From the above considerations, we conclude that if crowding control applies
940
+ to more than one parameter αi, that is, α′
941
+ i ̸= 0 with appropriate sign and
942
+ magnitude, homeostasis is potentially robust to feedback disruption. This may
943
+ include a simple variation of the feedback function α′
944
+ i but also perturbation in
945
+ the feedback functions shape and complete feedback failure, α′
946
+ i = 0.
947
+ An illustrative example of this situation is shown in Figure 1. Here, the time
948
+ evolution of the cell density is shown for a three-state cell fate model, which has
949
+ been computed by integration of the dynamical system (5) (the details of this
950
+ model are given in Appendix B as Eq. (B15) and illustrated in Figure B1). Four
951
+ kinetic parameters are regulated via crowding control satisfying the sufficient
952
+ condition for strict homeostasis, (30). Then, starting from this homeostatic
953
+ configuration, feedback disruption is introduced at a time equal to zero. In one
954
+ case (“Single failure”), a single kinetic parameter suffers a complete failure of
955
+ the type α′
956
+ i = 0. In this case, the remaining feedback functions compensate
957
+ for this failure, and a new homeostatic condition is achieved. Instead, in the
958
+ second case (“Multiple failures”), failures are applied so that three of the four
959
+ kinetic parameters initially regulated do not adjust with cell density6. Notably,
960
+ the only feedback function left satisfies the condition for asymptotic stability,
961
+ (30). Nevertheless, the variability of this kinetic parameter is not enough to
962
+ assure the existence of a steady state, since in this case, the function µ(ρ) does
963
+ not possess any root. Hence µ > 0 for all ρ, leading to an indefinite growth of
964
+ the cell population. Additional test cases are presented in Appendix B.2.
965
+ So far, we modelled the feedback dysregulation as acting on a global scale,
966
+ thus changing the whole tissue’s dynamics behaviour. This situation represents
967
+ a feedback mechanism affected by cell-extrinsic signals, in which any dysregu-
968
+ lation applies to all the cells in the same way. However, dysregulation can also
969
+ 6Only in this example, feedback control fails upon multiple failures, while in general, multiple
970
+ failures may still be compensated to maintain homeostatic control.
971
+
972
+ Springer Nature 2021 LATEX template
973
+ Homeostatic regulation of renewing tissue cell populations via crowding control
974
+ 15
975
+ -10
976
+ 0
977
+ 10
978
+ 20
979
+ 30
980
+ 40
981
+ 0
982
+ 2
983
+ 4
984
+ 6
985
+ 8
986
+ 10
987
+ Homeostasis
988
+ Single failure
989
+ Multiple failures
990
+ -10
991
+ 0
992
+ 10
993
+ 20
994
+ 30
995
+ 40
996
+ -0.1
997
+ -0.05
998
+ 0
999
+ 0.05
1000
+ 0.1
1001
+ 0.15
1002
+ Homeostasis
1003
+ Single failure
1004
+ Multiple failures
1005
+ Fig. 1
1006
+ Cell dynamics in terms of cell density, scaled by the steady state in the homeostatic
1007
+ case, as a function of time (left) and the corresponding variation of the dominant eigenvalue µ
1008
+ (right). Time is scaled by the inverse of ¯α = mini α∗
1009
+ i . The homeostatic model is perturbed at
1010
+ a time equal to zero to include feedback failure of the type α′
1011
+ i = 0. In the case where only one
1012
+ feedback function fails (“Single failure”), the system is able to achieve and maintain a new
1013
+ homeostatic state, characterised by a constant cell density and a zero dominant eigenvalue.
1014
+ In case more than one feedback fails (“Multiple failures”), the cell dynamics are unstable
1015
+ since a steady state does not exist and µ > 0 for all ρ. The cell fate model corresponds to
1016
+ model (B15) with parameters given in Table B1 and Table B2.
1017
+ act at the single-cell level, for example, when DNA mutations occur. In this
1018
+ case, the impact of the dysregulation is slightly different, as explained in the
1019
+ following.
1020
+ Suppose, upon disruption of crowding control in a single cell, for example,
1021
+ by DNA mutations, a sufficient number of crowding feedback pathways remain
1022
+ so that there is a steady state and the sufficient condition (30) is still fulfilled.
1023
+ In that case, homeostasis is retained, just as when this occurs in a tissue-wide
1024
+ disruption. However, if the homeostatic control of that single cell fails such that
1025
+ the cell becomes hyperproliferative, µ > 0, or declining, µ < 0, the tissue may
1026
+ still remain homeostatic. If µ < 0, the single mutated cell will be lost, upon
1027
+ which only a population of crowding controlled cells remain, which remain in
1028
+ homeostasis. If µ > 0 in a single cell, hyper-proliferation is not ensured either:
1029
+ while the probability for mutated cells to grow in numbers is larger than to
1030
+ decline, due to the low numbers, mere randomness can lead to the loss of the
1031
+ mutated cell with a non-zero probability, which results in the extinction of
1032
+ the dysregulated mutant7. In that case, the mutant cells go extinct and the
1033
+ tissue remains homeostatic despite the disruption of homeostatic control in
1034
+ the mutated cells; a stark contrast to disruption on the tissue level. Otherwise,
1035
+ if the mutant clone (randomly) survives, it will continue to hyper-proliferate
1036
+ and eventually dominate the tissue, which is thus rendered non-homeostatic.
1037
+ However, the tissue divergence time scale may be much longer than the case
1038
+ where the same dysregulation occurs in all cells.
1039
+ The deterministic cell population model (5) is suitable for describing the
1040
+ average cell numbers. Nevertheless, it fails to describe the stochastic nature of
1041
+ 7For example, in the case of a single state with cell division rate λ and loss rate γ – a simple
1042
+ branching process – the probability for a mutant with µ > 0, that is, λ > γ, to establish is 1−γ/λ,
1043
+ which is less than certainty.
1044
+
1045
+ Springer Nature 2021 LATEX template
1046
+ 16
1047
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1048
+ single-cell fate choice. Thus, assessing a single cell’s impact on tissue dynamics
1049
+ requires stochastic modelling. To that end, we implemented this situation as
1050
+ a Markov process with the same rates as the tissue cell population dynamics
1051
+ model8 (see Appendix B.3 for more details).
1052
+ In Figure 2, we show numerical simulation results of a stochastic version
1053
+ of the model used for previous results in Figure 1, depicted in terms of tissue
1054
+ cell density as a function of time. Here, two possible realisations of the same
1055
+ stochastic process are presented. We note that the initially homeostatic tissue
1056
+ results in stochastic fluctuations of the cell density, which remain, on average,
1057
+ constant. At a time equal to zero, a single cell in this tissue switches behaviour,
1058
+ presenting multiple failures which, if applied to all the cells, would determine
1059
+ the growth of the tissue (corresponding to Multiple failures curve in Figure 1).
1060
+ In one instance of the stochastic simulation, however, the mutated clone goes
1061
+ extinct after some time, leaving a tissue globally unaffected by the mutation.
1062
+ On the other hand, in another instance, the mutated clone prevails, leading to
1063
+ the growth of the tissue cell population. The fact that vastly different outcomes
1064
+ can occur with the same parameters and starting conditions demonstrates the
1065
+ impact of stochasticity in the case of a single-cell mutation.
1066
+ -10
1067
+ 0
1068
+ 10
1069
+ 20
1070
+ 30
1071
+ 40
1072
+ 50
1073
+ 1
1074
+ 1.2
1075
+ 1.4
1076
+ Homeostasis
1077
+ Multiple Failure (instance #1)
1078
+ Multiple Failure (instance #2)
1079
+ Fig. 2
1080
+ Numerical simulation results of a stochastic version of the model used in Figure 1
1081
+ upon disruption of crowding control in a single cell, mimicking a DNA mutation. At a
1082
+ time equal to 0, the initially homeostatic model is disrupted with a single cell presenting
1083
+ multiple failures in the feedback control, as in Figure 1. Two instances of simulations run
1084
+ with identical parameters are presented. The rescaled cell density ρ/ρ∗ is shown as a function
1085
+ of the time, scaled by the inverse of ¯α = mini α∗
1086
+ i . Whilst the mutated cell and its progeny go
1087
+ extinct in one instance (#1), in the other (#2), mutated cells prevail and hyper-proliferate
1088
+ so that tissue homeostasis is lost. The simulation stops when the clone goes extinct or when
1089
+ instability is detected. Full details of the simulation are provided in Appendix B.3.
1090
+ 3.5 Quasi-dedifferentiation
1091
+ In the previous section, we addressed the case where external or cell-intrinsic
1092
+ factors disrupt homeostatic control in self-renewing cells of a tissue. However,
1093
+ 8While a Markov process is an approximation which not necessarily reflects the probability
1094
+ distribution of subsequent event times realistically, it is often sufficient to assess the qualitative
1095
+ behaviour of a system with low numbers, subject to random influences from the environment.
1096
+
1097
+ Springer Nature 2021 LATEX template
1098
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1099
+ 17
1100
+ situations such as injury, poisoning, or cell radiation might also affect home-
1101
+ ostasis in other ways. An example is when stem cells are completely depleted
1102
+ from the tissue. In this context, many studies about tissue regeneration after
1103
+ injury report evidence of cell plasticity [17, 18], when committed cells regain
1104
+ the potential of the previously depleted stem cells. Cell dedifferentiation is just
1105
+ an example where differentiated cells return to an undifferentiated state as a
1106
+ response to tissue damage. Lineage tracing experiments confirmed this feature
1107
+ in vivo in several cases [16, 28–30].
1108
+ In the following, we assess how committed progenitor cells respond to the
1109
+ depletion of the stem cell pool if they are under crowding feedback control.
1110
+ Without loss of generality, let us consider an initially homeostatic scenario
1111
+ where there is a self-renewing (i.e. stem) cell type (S) – with growth param-
1112
+ eter µ = 0 – at the apex of a lineage hierarchy, and a committed progenitor
1113
+ cell type (C) – with µ < 0, but with at least one state that has a non-zero
1114
+ cell division rate – below type S in the hierarchy, as depicted in Figure 3.
1115
+ Based on this cell fate model, S-cells proliferate and differentiate into C-cells
1116
+ while maintaining the S-cell population. The C-cells also proliferate and dif-
1117
+ ferentiate into other downstream cell types which we do not explicitly consider
1118
+ here. C-cells do not maintain their own population; only the steady influx of
1119
+ new cells of that type via differentiation of S-cells into C-cells maintains the
1120
+ latter population (see [13]). We further assume that both S- and C-cells are
1121
+ under appropriate crowding control, fulfilling both the sufficient conditions for
1122
+ dynamic homeostasis, (12), and for stable, strict homeostasis, (30).
1123
+ Based on the above modelling, we can write the dynamics of the cell
1124
+ densities belonging to the committed progenitor type as,
1125
+ d
1126
+ dtρc = Ac(ρc)ρc + u ,
1127
+ (31)
1128
+ where ρc = (ρms+1, ρms+2, .., ρms+mc) are the cell densities in the committed
1129
+ C-type, with ms being the number of states of the self-renewing S-type. Ac is
1130
+ the dynamical matrix restricted to states in the C-type and ui = �ms
1131
+ j=1 κjiρj
1132
+ is a constant vector quantifying the influx of cells into the C-type.
1133
+ First, we note that the Jacobian matrix of a committed cell type, described
1134
+ by (31), J =
1135
+
1136
+ ∂A(ρc)ρc
1137
+ ∂ρj
1138
+
1139
+ j=ms+1,...,ms+mc
1140
+ , has the same form as a cell type at the
1141
+ apex of the hierarchy, since u does not depend on the densities ρms+1,...,ms+mc.
1142
+ From this follows that if C-cells are regulated by crowding control, fulfilling the
1143
+ conditions (30), then also the population of C-cells is stable around a steady
1144
+ state ρ∗
1145
+ c, albeit with a growth parameter µc(ρ∗
1146
+ c) < 09.
1147
+ We now consider the scenario where all stem cells are depleted at some
1148
+ point, as was experimentally done in [16, 18]. This would stop any replen-
1149
+ ishment of C-cells through differentiation of S-cells, corresponding to setting
1150
+ 9This can be seen when multiplying the steady state condition for (31), Ac(ρs, ρc)ρc + u = 0
1151
+ with a positive left dominant eigenvector v, giving, µcvρ∗
1152
+ c + vu = 0. Since ρ∗ and v have all
1153
+ positive entries and u is non-negative, this equation can only be fulfilled for µc < 0.
1154
+
1155
+ Springer Nature 2021 LATEX template
1156
+ 18
1157
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1158
+ Fig. 3 Sketch representative of the quasi-dedifferentiation scenario. A homeostatic system
1159
+ enclosed in the black box comprises two cell types: a stem cell type, S, (blue) and a com-
1160
+ mitted cell type, C, (green). In the unperturbed homeostatic scenario, S is self-renewing,
1161
+ characterised by a growth parameter at the steady state µ∗ = 0, and C is transient, with
1162
+ a growth parameter at the steady state µ∗ < 0. Both cell types are subject to crowding
1163
+ control, fulfilling both conditions (12), and (30). By removing the stem cell type XS, the
1164
+ committed cell type acquires self-renewing property through crowding control, effectively
1165
+ becoming a stem cell type (see Figure 4).
1166
+ u = 0 in (31). Hence we end up with the dynamics ˙ρc = A(ρc)ρc. Now, assum-
1167
+ ing that the function µ(ρ) has sufficient range, so that µ(ρ∗∗
1168
+ c ) = 0 for some
1169
+ ρ∗∗
1170
+ c , and provided that A(ρc) is under crowding control fulfilling the sufficient
1171
+ conditions for asymptotic stability of a steady state, then, following our argu-
1172
+ ments from section 3.3, the population of C-cells will attain a stable steady
1173
+ state. In other words, those previously committed cells become self-renewing
1174
+ cells. Also, since they now reside at the apex of the lineage hierarchy (given
1175
+ that S-cells are absent), they effectively become stem cells.
1176
+ Hence, under crowding control, previously committed progenitor cells
1177
+ (committed cells that can divide) will automatically become stem cells if the
1178
+ original stem cells are depleted. Commonly, such a reversion of a committed cell
1179
+ type to a stem cell type would be called ‘dedifferentiation’ or ‘reprogramming’.
1180
+ However, in this case, no genuine reversion of cell states occurs; previously
1181
+ committed cells do not transition back to states associated with the stem cell
1182
+ type. Instead, they respond by crowding feedback and adjust their dynamical
1183
+ rates so that µ becomes zero, hence attaining a self-renewing cell type. Cru-
1184
+ cially, this new stem cell type is fundamentally different to the original one
1185
+ and still most similar to the original committed type. We call this process
1186
+ quasi-dedifferentiation. The quasi-dedifferentiation follows the same reversion
1187
+ of proliferative potential as in ‘genuine’ dedifferentiation but without explicit
1188
+ reversion in the cell state trajectories.
1189
+ The following numerical example illustrates this situation. We focus on the
1190
+ cell dynamics of a single C-type regulated via crowding feedback (detail of
1191
+ the model are provided in Appendix B.4). The cell density as a function of
1192
+ the time, shown in Figure 4, is obtained by integrating the corresponding cell
1193
+ population model according to Eq. (5). The system is initially in a homeostatic
1194
+ condition, meaning that there is a constant influx of cells from some upstream
1195
+ self-renewing types. Such upstream types are assumed to be properly regulated
1196
+ such that this cell influx is constant over time. At a time equal to zero, the cell
1197
+ influx becomes suddenly zero, representing an instantaneous removal of all the
1198
+
1199
+ Xo-
1200
+ HomeostasisSpringer Nature 2021 LATEX template
1201
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1202
+ 19
1203
+ -10
1204
+ 0
1205
+ 10
1206
+ 20
1207
+ 30
1208
+ 40
1209
+ 0
1210
+ 0.2
1211
+ 0.4
1212
+ 0.6
1213
+ 0.8
1214
+ 1
1215
+ Homeostasis
1216
+ Quasi-dedifferentiation
1217
+ -10
1218
+ 0
1219
+ 10
1220
+ 20
1221
+ 30
1222
+ 40
1223
+ -0.2
1224
+ -0.1
1225
+ 0
1226
+ Homeostasis
1227
+ Quasi-dedifferentiation
1228
+ Fig. 4 Cell dynamics of an initially committed cell type C (µ < 0) upon removal of all stem
1229
+ cells. (Left) Cell density scaled by the steady-state density as a function of time. (Right)
1230
+ Corresponding variation of the dominant eigenvalue µc. Time is scaled by the inverse of
1231
+ ¯α = mini α∗
1232
+ i . It is assumed that a stem cell type, S, initially resides in the lineage hierarchy
1233
+ above the committed cell type (as in Figure 3). S cells differentiate into C cells, which is
1234
+ modelled as a constant cell influx of C-cells (S is not explicitly simulated). At a time equal
1235
+ to zero, a sudden depletion of S cells is modelled by stopping the cell influx. After some
1236
+ transitory phase, the cell population stabilises around a new steady state and becomes self-
1237
+ renewing with µc = 0. The full description of the dynamical model, which corresponds to
1238
+ model (B15) with parameters given in Table B1, is reported in Appendix B.4.
1239
+ self-renewing cells from the tissue. A new homeostatic condition is achieved
1240
+ after a transitory phase thanks to the crowding feedback acting on the C-
1241
+ type. This example demonstrates how an initially committed cell type, i.e.
1242
+ with µc < 0, regulated via crowding feedback, might be able to switch, upon
1243
+ disruption, to a self-renewing behaviour µc = 0.
1244
+ 4 Discussion
1245
+ For maintaining healthy adult tissue, the tissue cell population must be
1246
+ maintained in a homeostatic state. Here, we assessed one of the most com-
1247
+ mon generalised regulation mechanisms of homeostasis, which we refer to as
1248
+ crowding feedback. Based on this, progenitor cells (stem cells and committed
1249
+ progenitors) adjust their propensities to divide, differentiate, and die, accord-
1250
+ ing to the surrounding density of cells, which they sense via biochemical or
1251
+ mechanical signals. For this purpose, we used a generic mathematical model
1252
+ introduced before in Refs. [13, 20], which describes tissue cell population
1253
+ dynamics in the most generic way, including cell divisions, cell state transi-
1254
+ tions, and cell loss / differentiation. Based on this model, we rigorously define
1255
+ what is meant when speaking of a ‘homeostatic state’, introducing two notions:
1256
+ a strict homeostasis is a steady state of the tissue cell population dynamics,
1257
+ while dynamical homeostasis allows, in addition to strict homeostasis, for oscil-
1258
+ lations and fluctuations, as long as a finite long-term average cell population
1259
+ is maintained (such as the endometrium during the menstrual cycle).
1260
+ By analysing this dynamical system, we find several sufficient and necessary
1261
+ conditions for homeostasis. These conditions are formulated in terms of how
1262
+ the propensities of cell division, differentiation, and cell state changes, of cells
1263
+
1264
+ Springer Nature 2021 LATEX template
1265
+ 20
1266
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1267
+ whose type is at the apex of an adult cell lineage hierarchy, may depend on
1268
+ their cell density. We find that when, for a wide range of cell density values,
1269
+ the cell division propensity of at least one state decreases with cell density or
1270
+ the differentiation propensity increases with it, while other propensities (e.g.
1271
+ of cell state transitions) are not affected by the cell density, then dynamic
1272
+ homeostasis prevails (12). For strict homeostasis to prevail, this only needs
1273
+ to be fulfilled at the steady state itself, but in addition, the magnitude of
1274
+ the feedback strength may not be too large (30). We can derive explicit and
1275
+ implicit expressions for the bound on feedback strength for systems of two
1276
+ and three-cell states but cannot do so for arbitrary systems. Furthermore, we
1277
+ find that a necessary condition for strict homeostasis is that the conditions for
1278
+ dynamic homeostasis are met at least at the steady state cell density.
1279
+ A direct consequence of the conditions we found is that they allow for a
1280
+ considerable degree of redundancy when more than one propensity depends
1281
+ appropriately on the cell density. Hence feedback pathways, that is, cell dynam-
1282
+ ics parameters depending on the cell density, may serve as ‘back-ups’ to each
1283
+ other if one fails. We demonstrate that this confers robustness to the home-
1284
+ ostatic system in that one or more crowding feedback pathways may fail, yet
1285
+ the tissue remains in homeostasis.
1286
+ Finally, we assess how crowding feedback regulation affects the response of
1287
+ committed progenitor cells to a complete depletion of all stem cells. We showed
1288
+ that committed cells which can divide and are under appropriate crowding
1289
+ feedback control (that is, meeting the sufficient conditions (12) and (30)), will
1290
+ necessarily, without additional mechanisms or assumptions, reacquire stem cell
1291
+ identity, that is, become self-renewing and are at the apex of the lineage hierar-
1292
+ chy. Notably, while this process resembles that of dedifferentiation, it does not
1293
+ involve explicit reprogramming, in that the cell state transitions are reversed.
1294
+ Instead, only the cell fate propensities adjust to the changing environment by
1295
+ balancing proliferation and differentiation as is required for self-renewal. While
1296
+ these are purely theoretical considerations, and such a process has not yet
1297
+ been experimentally found, we predict that it must necessarily occur under the
1298
+ appropriate conditions. This can be measured by assessing the gene expression
1299
+ profiles (e.g. via single-cell RNA sequencing) of cells that ‘dedifferentiate’, i.e.
1300
+ reacquire stemness after depletion of stem cells. Moreover, those considerations
1301
+ yield further, more general insights:
1302
+ • Stem cell identity is neither the property of individual cells nor is it strictly
1303
+ associated with particular cell types or states. Any cell that can divide and
1304
+ differentiate, committed or not, may become a stem cell under appropriate
1305
+ environmental control.
1306
+ • From the latter follows that stemness is a property determined by the
1307
+ environment, not the cell itself.
1308
+ • ‘Cell plasticity’ might need to be seen in a wider context. Usually, cell
1309
+ plasticity is associated with a change of a cell’s type when subjected to
1310
+ environmental cues, which involves a substantial remodelling of the cell’s
1311
+ morphology and biochemical state. However, we see that a committed cell
1312
+
1313
+ Springer Nature 2021 LATEX template
1314
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1315
+ 21
1316
+ may turn into a stem cell simply by adjusting the pace of the cell cycle
1317
+ and differentiation processes to the environment. This may not require
1318
+ substantial changes in the cell’s state.
1319
+ This exemplifies that homeostatic control through crowding feedback is not
1320
+ only a way to render homeostasis stable and robust, but also to create stem
1321
+ cell identities as a collective property of the tissue cell population.
1322
+ Acknowledgments.
1323
+ We thank Ben MacArthur and Ruben Sanchez-Garcia
1324
+ for valuable discussions.
1325
+ Declarations
1326
+ PG is supported by an MRC New Investigator Award, Grant number
1327
+ MR/R026610/1. The code generated for numerical computations in the cur-
1328
+ rent study is available on Github, https://github.com/cp4u17/Feedback. No
1329
+ other data was generated for this work.
1330
+ Contributions are as follows: C.P. and P.G. conceptualised the paper, C.P.
1331
+ and P.G. did the mathematical analysis, C.P. did the numerical analysis, P.G.
1332
+ supervised the work.
1333
+ The authors have no competing interests to declare that are relevant to the
1334
+ content of this article.
1335
+ Appendix A
1336
+ Asymptotic stability assessment
1337
+ based on Routh-Hurwitz
1338
+ A.1
1339
+ Background
1340
+ In control system theory, a commonly used method for assessing the stability
1341
+ of a linear system is the Routh-Hurtwiz (RH) criterion [24]. It is an algebraic
1342
+ criterion providing a necessary and sufficient condition on the parameters of a
1343
+ dynamic system of arbitrary order to ensure the dynamics are asymptotically
1344
+ stable. In particular, the criterion defines a set of conditions on the coefficients,
1345
+ pi, of the characteristic polynomial, P(s), written as
1346
+ P(s) = sn +
1347
+ n
1348
+
1349
+ i=1
1350
+ pisn−i ,
1351
+ (A1)
1352
+ in which n corresponds to the dimension of the system. Note that the notation
1353
+ used in this section, based on that from [24], is different from that of the main
1354
+ text, where pi is the polynomial coefficient of ith order.
1355
+ A first result of the RH criterion is that a necessary condition for the
1356
+ dynamical system to be asymptotically stable is that all the coefficients must
1357
+ be positive, that is,
1358
+ pi > 0, for all i .
1359
+ (A2)
1360
+
1361
+ Springer Nature 2021 LATEX template
1362
+ 22
1363
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1364
+ Additional conditions on the polynomial coefficients are added for a necessary
1365
+ and sufficient condition. These conditions are based on Routh’s array, written
1366
+ as
1367
+
1368
+ �����
1369
+ 1 p2 p4 ... 0
1370
+ p1 p3 ...
1371
+ b1 b2 ...
1372
+ c1
1373
+ ...
1374
+
1375
+ �����
1376
+ ,
1377
+ (A3)
1378
+ in which the first two rows contain all the coefficients of the characteristic
1379
+ polynomial, and the following ones are recursively computed as
1380
+ bi = −
1381
+ det
1382
+
1383
+ 1
1384
+ p2i
1385
+ p1 p2i+1
1386
+
1387
+ p1
1388
+ ,
1389
+ (A4)
1390
+ ci = −
1391
+ det
1392
+
1393
+ p1 p2i+1
1394
+ b1
1395
+ bi
1396
+
1397
+ b1
1398
+ ,
1399
+ (A5)
1400
+ and so on until a zero is encountered. The RH criterion states that the system is
1401
+ asymptotically stable if and only if the elements in the first column of Routh’s
1402
+ array are positive.
1403
+ Based on that, it can be easily shown that for a second-order polynomial,
1404
+ the necessary condition (A2) is also sufficient for asymptotic stability (a.s.)
1405
+ since b1 = p1p2, which means that
1406
+ The system is a. s.
1407
+ ⇐⇒ pi > 0, for i = 1, 2 .
1408
+ (A6)
1409
+ Instead, the necessary and sufficient condition for a polynomial of order three
1410
+ results in
1411
+ The system is a. s.
1412
+ ⇐⇒ pi > 0, for i = 1, 2, 3 and p1p2 − p3 > 0 .
1413
+ (A7)
1414
+ The same reasoning can be applied to higher-order dynamics to derive
1415
+ additional conditions on the coefficients pi.
1416
+ A.2
1417
+ Verification of the necessary condition for
1418
+ asymptotic stability
1419
+ The Matlab code for verifying (23) is provided in https://github.com/
1420
+ cp4u17/Feedback.git.
1421
+ The strategy used is to evaluate each term in Eq. (23) and simply compare
1422
+ the left and right-hand sides of the equation. We followed a symbolic approach
1423
+ (based on the Matlab symbolic toolbox) for an arbitrary three-state model. A
1424
+ numerical approach was used instead for higher-order dynamics, specifically
1425
+ 4, 5 and 6 state cell fate models. To do so, we randomly defined the cell
1426
+ dynamical matrix at the steady state, A(ρ∗), and its derivative with respect
1427
+
1428
+ Springer Nature 2021 LATEX template
1429
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1430
+ 23
1431
+ to ρ. Entries were chosen from a uniform distribution and, for assuring a zero
1432
+ dominant eigenvalue for A(ρ∗), a local optimiser (fmincon function of Matlab)
1433
+ was used to find appropriate diagonal elements. For each dimension of the cell
1434
+ fate model, we tested up to 1000 random cases.
1435
+ A.3
1436
+ Sufficient condition for asymptotic stability
1437
+ In this section, we will indicate with the superscripts A and J the coefficients of
1438
+ the characteristic polynomial expressed as Eq. (A1) respectively of the matrix
1439
+ of the dynamical system, Eq. (6), and those of the Jacobian matrix, Eq. (15).
1440
+ For a two and three-state system, the following relations can be alge-
1441
+ braically derived
1442
+ pJ
1443
+ 1 = pA
1444
+ 1 −
1445
+
1446
+ i
1447
+ ηi .
1448
+ (A8)
1449
+ where ηi is according to Eq. (16). Again, considering that pA
1450
+ 1 > 0, if all ηi ≤ 0
1451
+ then pJ
1452
+ 1 > 0.
1453
+ Hence, the above relation implies that in a two-state system, the RH cri-
1454
+ terion given by Eq. (A6) is fulfilled when η ≤ 0, with at least one negative
1455
+ component (otherwise J = A) and therefore the system is asymptotically sta-
1456
+ ble. We recall that asking ηi ≤ 0 without further constraints is equivalent to
1457
+ the previously derived condition (30) with ϵi = ∞.
1458
+ For applying the RH criterion to a three-state cell dynamic system, given
1459
+ by Eq. (A7), we need to evaluate the sign of pJ
1460
+ 2 and then that of pJ
1461
+ 1 pJ
1462
+ 2 − pJ
1463
+ 3 .
1464
+ To do so, we first write
1465
+ pJ
1466
+ 2 = pA
1467
+ 2 −
1468
+
1469
+ i
1470
+ fiηi ,
1471
+ (A9)
1472
+ in which fi = �
1473
+ j aji − Tr(A) for i = 1, 2, 3. Since the off-diagonal elements
1474
+ are non-negative, and the trace of A is negative, then fi > 0 for i = 1, 2, 3.
1475
+ That means that if all ηi ≤ 0 then pJ
1476
+ 2 > 0. Concerning the term pJ
1477
+ 1 pJ
1478
+ 2 − pJ
1479
+ 3 ,
1480
+ this can be written as a quadratic form in η =
1481
+
1482
+ η1, η2, η3
1483
+
1484
+ as
1485
+ pJ
1486
+ 1 pJ
1487
+ 2 − pJ
1488
+ 3 = Q(η) = ηT AQη + bT
1489
+ Qη + cQ ,
1490
+ (A10)
1491
+ in which
1492
+ AQ =
1493
+
1494
+
1495
+ f1 f1 f1
1496
+ f2 f2 f2
1497
+ f3 f3 f3
1498
+
1499
+ � ,
1500
+ (A11)
1501
+ bQ = −pA
1502
+ 1
1503
+
1504
+
1505
+ f1
1506
+ f2
1507
+ f3
1508
+
1509
+ � − pA
1510
+ 2
1511
+ vw
1512
+
1513
+
1514
+ v3(w3 − w1) + v2(w2 − w1)
1515
+ v3(w3 − w2) + v1(w1 − w2)
1516
+ v2(w2 − w3) + v1(w1 − w3)
1517
+
1518
+ � ,
1519
+ (A12)
1520
+ and cQ = pA
1521
+ 1 pA
1522
+ 2 . Here, v = (v1, v2, v3) is a left dominant eigenvector and
1523
+ w = (w1, w2, w3) a right dominant eigenvector.
1524
+ We now note that the matrix AQ is semidefinite positive since two eigen-
1525
+ values are zero (the rows are two-fold degenerate) and one is positive, equal
1526
+ to Tr(AQ) = �
1527
+ i fi, and cQ > 0. We now distinguish two cases, depending on
1528
+
1529
+ Springer Nature 2021 LATEX template
1530
+ 24
1531
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1532
+ the sign of bQ elements. First, if bQ ≤ 0, then Q(η) > 0 for any η ≤ 0. Since
1533
+ fi, pA
1534
+ 1 , pA
1535
+ 2 , vw > 0, we get a sufficient condition for bQ ≤ 0, namely,
1536
+ 0 ≤ v3(w3 − w1) + v2(w2 − w1)
1537
+ (A13)
1538
+ 0 ≤ v3(w3 − w2) + v1(w1 − w2)
1539
+ 0 ≤ v2(w2 − w3) + v1(w1 − w3)
1540
+ In that case, asymptotic stability and thus crowding feedback control is assured
1541
+ for any η < 0, and thus the bound for feedback strength is ϵi = ∞ for i =
1542
+ 1, 2, 3.
1543
+ Otherwise, if there is at least one positive element in bQ, then Q(η) > 0
1544
+ only if |ηi| < ϵi, where ϵ = (ϵ1, ϵ2, ϵ3) are the absolute values of the solutions
1545
+ to the equation Q(η) = 0, that is – given that ηi are negative – the solution to,
1546
+ 0 = ϵT AQϵ − bT
1547
+ Qϵ + cQ .
1548
+ (A14)
1549
+ Importantly, we note that the elements of bQ depend uniquely on the proper-
1550
+ ties of the dynamical system and therefore, they can be determined without
1551
+ requiring the knowledge of the parameter derivatives, i.e. the specific crowding
1552
+ feedback dependencies.
1553
+ The Matlab code for verifying (A8), (A9) and (A10) is provided in
1554
+ https://github.com/cp4u17/Feedback.git.
1555
+ Appendix B
1556
+ Test case
1557
+ B.1
1558
+ Asymptotic stability
1559
+ This section reports the details of the model used for numerical examples
1560
+ presented in the main text. The cell dynamics correspond to the following
1561
+ three-state cell fate model
1562
+ X1
1563
+ λ1
1564
+ −→ X1 + X1,
1565
+ X1
1566
+ ω13
1567
+ −−→ X3,
1568
+ X1
1569
+ γ1
1570
+ −→ ∅
1571
+ X2
1572
+ ω21
1573
+ −−→ X1,
1574
+ X2
1575
+ ω23
1576
+ −−→ X3,
1577
+ X2
1578
+ γ2
1579
+ −→ ∅
1580
+ X3
1581
+ λ3
1582
+ −→ X3 + X3,
1583
+ X3
1584
+ ω31
1585
+ −−→ X1,
1586
+ X3
1587
+ ω32
1588
+ −−→ X2,
1589
+ (B15)
1590
+ whose network is shown in Figure B1. In such a model, for simplicity, we only
1591
+ consider symmetric self-renewing divisions so that κij = ωij. Also, we apply
1592
+ the crowding feedback to division rates, λi, and differentiation rates γi. In this
1593
+ way, it is straightforward to apply the sufficient condition (30) for asymptotic
1594
+ stability since κ′
1595
+ ij = 0 for all i, j.
1596
+ Hence, each kinetic parameter of the type αi ∈ {λj, γj}j=1,...,3 is expressed
1597
+ as a function of ρ, whilst those of the type αi ∈ {κjk}j,k=1,...,3 are constant. In
1598
+ particular, we chose a Hill function [31] where αi(ρ) = ci + kiρni/(Kni
1599
+ i
1600
+ + ρni)
1601
+ in case αi is a differentiation rate, so that α′
1602
+ i = ∂αi/∂ρ > 0, and αi(ρ) =
1603
+
1604
+ Springer Nature 2021 LATEX template
1605
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1606
+ 25
1607
+ ci +ki/(Kni
1608
+ i +ρ/ni) in case it is a proliferation rate, so that α′
1609
+ i < 0. According
1610
+ to (30) this choice assures that, if there is a value ρ = ρ∗ for which µ(ρ∗) = 0,
1611
+ this corresponds to an asymptotically stable steady state.
1612
+ The parameter values used in our example are reported in Table B1, and
1613
+ the profiles of the proliferation and differentiation rates as a function of ρ are
1614
+ shown in Figure B2. Based on these values, the steady state corresponds to
1615
+ ρ∗ = 1 (arbitrary unit). As expected, the dominant eigenvalue of the Jacobian
1616
+ at the steady state is negative (µJ = −1.21).
1617
+ To test the dynamical behaviour of the tissue cell population, we numer-
1618
+ ically solved the system of ODEs (5) for different initial conditions based on
1619
+ the explicit Runge-Kutta Dormand-Prince method (Matlab ode45 function).
1620
+ The results are shown in Figure B3 as the time evolution of ρ, normalised
1621
+ by the steady-state ρ∗, (left panels), and of the dominant eigenvalue, µ (right
1622
+ panels). The label H indicates an initial condition corresponding to the self-
1623
+ renewing state ρ∗, that is, the system is initially in homeostasis. In the
1624
+ simulations labelled as P− and P+, we applied perturbation in the initial
1625
+ state ρ∗ = (ρ∗
1626
+ 1, ρ∗
1627
+ 2, ρ∗
1628
+ 3), which are, respectively,
1629
+
1630
+ 0.8ρ∗
1631
+ 1, 0.75ρ∗
1632
+ 2, 0.85ρ∗
1633
+ 3
1634
+
1635
+ and
1636
+
1637
+ 1.5ρ∗
1638
+ 1 1.1ρ∗
1639
+ 2 1.2ρ∗
1640
+ 3
1641
+
1642
+ . As expected, in all these cases, the feedback’s effect is sta-
1643
+ bilising the system so that it returns to the steady state upon perturbation,
1644
+ ρ → ρ∗, (asymptotic stability) and thus regains self-renewal property, µ → 0,
1645
+ over time.
1646
+ Fig. B1
1647
+ Cell state network representing a cell type composed of three states. The links
1648
+ represent direct transitions, ωij; symmetric divisions occur with rates λi and differentiation
1649
+ with rate γi, where subscripts i, j = 1, 2, 3 indicate the corresponding cell state, as per model
1650
+ (B15).
1651
+ B.2
1652
+ Failure of feedback function
1653
+ Based on the cell fate model regulated via crowding feedback described in
1654
+ the previous section, we assess the impact of failure in one or more feedback
1655
+ functions. In particular, the failure of the crowding regulation is modelled,
1656
+ assuming one or more kinetic parameters as a constant. Five different failure
1657
+ test cases are assessed. For doing so, we chose αi = (1 + C)α∗
1658
+ i being constant
1659
+ instead of depending on ρ, in which α∗ is the value at the steady state when
1660
+
1661
+ M
1662
+ Y1
1663
+ XI
1664
+ 23
1665
+ 1
1666
+ 013
1667
+ 021
1668
+ 1
1669
+ 031
1670
+ -
1671
+ X
1672
+ X2
1673
+ 023
1674
+ 032Springer Nature 2021 LATEX template
1675
+ 26
1676
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1677
+ k
1678
+ K
1679
+ n
1680
+ α∗
1681
+ α′
1682
+ λ1
1683
+ 0.74
1684
+ 0.57
1685
+ 2.00
1686
+ 0.61
1687
+ -0.84
1688
+ λ3
1689
+ 7.79
1690
+ 2.07
1691
+ 2.00
1692
+ 1.53
1693
+ -0.56
1694
+ γ1
1695
+ 3.07
1696
+ 1.22
1697
+ 2.00
1698
+ 1.28
1699
+ 1.48
1700
+ γ2
1701
+ 2.28
1702
+ 0.43
1703
+ 2.00
1704
+ 1.97
1705
+ 0.61
1706
+ κ13
1707
+
1708
+ 0.95
1709
+ 0.00
1710
+ κ21
1711
+
1712
+ 1.44
1713
+ 0.00
1714
+ κ23
1715
+
1716
+ 1.71
1717
+ 0.00
1718
+ κ31
1719
+
1720
+ 2.03
1721
+ 0.00
1722
+ κ32
1723
+
1724
+ 1.35
1725
+ 0.00
1726
+ Table B1
1727
+ Values of the Hill function parameters describing the kinetic parameters in
1728
+ case of homeostasis regulation via crowding feedback for the cell fate model (B15). The
1729
+ generic kinetic parameters (represented as αi in the right columns of the table) are a
1730
+ function of the total cell density, ρ, and are given by γi(ρ) = c + kρn/(Kn + ρn) and
1731
+ λi(ρ) = c + k/(Kn + ρn) with i = 1, 2, 3. A common value c = 0.05 is assumed. State
1732
+ transition rates ωij, are constant and equal to κij. For such a cell fate dynamics, the steady
1733
+ state is ρ∗ = 1. The unit of the kinetic parameter is arbitrary and therefore omitted. Unless
1734
+ specified otherwise, these values apply to all the numerical examples presented in this work.
1735
+ 0
1736
+ 0.5
1737
+ 1
1738
+ 1.5
1739
+ 2
1740
+ 0
1741
+ 0.5
1742
+ 1
1743
+ 1.5
1744
+ 2
1745
+ 2.5
1746
+ 0
1747
+ 0.5
1748
+ 1
1749
+ 1.5
1750
+ 2
1751
+ -4
1752
+ -2
1753
+ 0
1754
+ 2
1755
+ 4
1756
+ Fig. B2
1757
+ Proliferation and differentiation rates (left panels, with α as a generic placeholder
1758
+ for parameters), and their derivative with respect to ρ (right panels) as functions of cell
1759
+ density normalised by the steady-state ρ∗ for the cell fate model (B15) schematised in
1760
+ Figure B1. The profiles in the left panel correspond to Hill functions defined in Table B1.
1761
+ there are no failures (reported in Table B1) and C is a constant (reported in
1762
+ Table B2). Five test cases, indicated as F1−5, are assessed.
1763
+ In test case F1, only one feedback fails. Three of the four kinetic parameters
1764
+ fail in cases F2−4. Finally, F5 represents a case where all the feedback functions
1765
+ fail. The corresponding variability of the dominant eigenvalue, µ, as a function
1766
+ of the cell density is shown in Figure B4. It is clear that whilst F1−4 cases
1767
+ satisfy the sufficient condition for strict homeostasis, (30), in test cases F5,
1768
+ the dominant eigenvalue being constant means that there is no homeostatic
1769
+ regulation. Importantly, there is no steady state in test cases F2,4 since the
1770
+ dominant eigenvalue is always positive in one case or negative in the other.
1771
+ Based on these assumptions, we numerically solved the system of ODEs
1772
+ (5) using the explicit Runge-Kutta Dormand-Prince method (Matlab ode45
1773
+ function). The failure test cases start at time 0 from an initially homeostatic
1774
+ condition, H. The results are shown in Figure B5 as the time evolution of
1775
+ ρ, normalised by the homeostatic steady-state, ρ∗, (left panels), and of the
1776
+
1777
+ Springer Nature 2021 LATEX template
1778
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1779
+ 27
1780
+ 0
1781
+ 5
1782
+ 10
1783
+ 15
1784
+ 0.8
1785
+ 1
1786
+ 1.2
1787
+ 1.4
1788
+ H
1789
+ P-
1790
+ P+
1791
+ 0
1792
+ 5
1793
+ 10
1794
+ 15
1795
+ -0.6
1796
+ -0.4
1797
+ -0.2
1798
+ 0
1799
+ 0.2
1800
+ 0.4
1801
+ H
1802
+ P-
1803
+ P+
1804
+ Fig. B3
1805
+ Effect of perturbation of homeostasis under crowding control, when feedback
1806
+ parameters are according to Table B1. (Left) Cell density ρ, scaled by the steady-state ρ∗,
1807
+ as a function of time. (Right) Corresponding variation of the dominant eigenvalue µ. Time
1808
+ is scaled by the inverse of ¯α = mini α∗
1809
+ i . Three different initial condition are tested: H,
1810
+ corresponds to the steady state ρ∗ = (ρ∗
1811
+ 1, ρ∗
1812
+ 2, ρ∗
1813
+ 3), P− to
1814
+ �0.8ρ∗
1815
+ 1, 0.75ρ∗
1816
+ 2, 0.85ρ∗
1817
+ 3
1818
+
1819
+ and P+
1820
+ to
1821
+ �1.5ρ∗
1822
+ 1, 1.1ρ∗
1823
+ 1, 1.2ρ∗
1824
+ 1
1825
+
1826
+ . Since the steady state is asymptotically stable, thanks to crowding
1827
+ control, the cell population remain in, or return to, a homeostatic state characterised by
1828
+ µ = 0.
1829
+ Parameter
1830
+ F1
1831
+ F2
1832
+ F3
1833
+ F4
1834
+ F5
1835
+ λ1
1836
+ +5%
1837
+ +5%
1838
+ +5%
1839
+ -20%
1840
+ -5%
1841
+ λ3
1842
+ -
1843
+ +5%
1844
+ +5%
1845
+ -20%
1846
+ -5%
1847
+ γ1
1848
+ -
1849
+ -5%
1850
+ -
1851
+ +20%
1852
+ -5%
1853
+ γ2
1854
+ -
1855
+ -
1856
+ -5%
1857
+ -
1858
+ -5%
1859
+ Table B2
1860
+ Value of the constant C in the feedback failure test cases. Whenever a failure
1861
+ in the feedback of one kinetic parameter α occurs, that parameter is modelled as a
1862
+ constant, α = (1 + C)α∗, in which the steady-state value, α∗, is reported in Table B1. Test
1863
+ cases F1 and F2 correspond to those presented in the main text (Figure 1).
1864
+ dominant eigenvalue, µ, (right panels). Note that the cases F1,2 correspond
1865
+ respectively to the Single failure and Multiple failures reported in the
1866
+ main text (Figure 1).
1867
+ In two cases, F1,3, despite a single or multiple feedback functions failing, a
1868
+ new homeostatic condition is reached after some time, where µ = 0. However,
1869
+ suppose a different set of feedback fails, like in F2,4, such that the dominant
1870
+ eigenvalue is respectively positive or negative for any ρ. In that case, no steady
1871
+ state can be attained, and the tissue cell population will hyper-proliferate or
1872
+ decline in the long term. Hence, even if the condition for asymptotic stability
1873
+ is met, there is no steady state. Finally, if homeostasis is not regulated at
1874
+ all, as in F5, then the population dynamics only depend on the value of the
1875
+ dominant eigenvalue (the cell dynamical model (5) turns linear). In the case
1876
+ shown, µ > 0 and therefore, the cell population diverges.
1877
+ B.3
1878
+ Single cell mutation scenario
1879
+ To assess the tissue dynamics with a single-cell mutation, as presented in the
1880
+ main text, we modelled the clonal dynamics, namely, the dynamics of single
1881
+ cells and their progeny. For doing so, we considered the model (B15) as a
1882
+
1883
+ Springer Nature 2021 LATEX template
1884
+ 28
1885
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1886
+ 0
1887
+ 0.5
1888
+ 1
1889
+ 1.5
1890
+ 2
1891
+ -2
1892
+ 0
1893
+ 2
1894
+ 4
1895
+ H
1896
+ F1
1897
+ F2
1898
+ F3
1899
+ F4
1900
+ F5
1901
+ Fig. B4
1902
+ Variation of the dominant eigenvalue µ as a function of the cell density, ρ,
1903
+ normalised by the reference homeostatic state value, ρ∗. The curve H corresponds to the
1904
+ reference homeostatic model presented in Appendix B.1. The other curves, F1−5, represent
1905
+ different sets of feedback failure, as reported in Table B2.
1906
+ -10
1907
+ 0
1908
+ 10
1909
+ 20
1910
+ 30
1911
+ 40
1912
+ 0
1913
+ 0.5
1914
+ 1
1915
+ 1.5
1916
+ 2
1917
+ 2.5
1918
+ H
1919
+ F1
1920
+ F2
1921
+ F3
1922
+ F4
1923
+ F5
1924
+ -10
1925
+ 0
1926
+ 10
1927
+ 20
1928
+ 30
1929
+ 40
1930
+ -0.6
1931
+ -0.4
1932
+ -0.2
1933
+ 0
1934
+ 0.2
1935
+ H
1936
+ F1
1937
+ F2
1938
+ F3
1939
+ F4
1940
+ F5
1941
+ Fig. B5
1942
+ Failure of feedback control. (Left) Cell density, scaled by the steady state in the
1943
+ homeostatic case, as a function of time. (Right) Corresponding variation of the dominant
1944
+ eigenvalue µ. Time is scaled by the inverse of ¯α = mini α∗
1945
+ i . The homeostatic model, H, is
1946
+ perturbed at a time equal to zero to include the feedback failure reported in Table B2. Whilst
1947
+ in F1,3, the regulation is able to achieve and maintain a new homeostatic state (µ = 0),
1948
+ the remaining case fails to regulate the cell population, leading to an indefinite growth or
1949
+ shrinking of the tissue.
1950
+ Markov process with the same numerical rates as before, but now events are
1951
+ treated as stochastic. Then, we run numerical simulations using the Gillespie
1952
+ algorithm [32] to evaluate this model. In particular, the results presented in
1953
+ this work are based on 100 independent instances, where each instance is a
1954
+ possible realisation of the stochastic process. We chose a total cell number
1955
+ N0 = 5000 as the initial condition (cell density is based on unitary volume).
1956
+ In real tissues, the number of cells could be a few orders of magnitude larger.
1957
+ However, this number is sufficiently large to avoid the extinction of the process
1958
+ in the time scale analysed, so once rescaled, these dynamics are representative
1959
+ of those in the tissue. All the simulations are stopped when the mutated clone
1960
+ goes extinct or divergence of the dynamics is detected, defined as reaching
1961
+ N = 5N0.
1962
+
1963
+ Springer Nature 2021 LATEX template
1964
+ Homeostatic regulation of renewing tissue cell populations via crowding control
1965
+ 29
1966
+ From an implementation point of view, we consider a cell fate model
1967
+ represented by two disconnected cell state networks to model the tissue dynam-
1968
+ ics, including the mutated cell. One network corresponds to the unperturbed
1969
+ test case H, and the other to the dysregulated one, F2 (both described in
1970
+ Appendix B.2). The simulation starts with N0 cells in the H network, dis-
1971
+ tributed in each state proportionally to the expected steady-state distribution
1972
+ in the tissue, and no cells in the F2 network. Thus, since the two networks
1973
+ are disconnected, F2 remains empty, and the simulation represents the tissue
1974
+ dynamics before the dysregulation. At a time equal to zero, we moved one
1975
+ cell from a random state in the H network to the corresponding state in the
1976
+ F2 one. This simulation represents the tissue dynamics, including the single
1977
+ mutated cell.
1978
+ In Figure B6 (left), all the trajectories where the mutated clones go extinct
1979
+ are shown. In these cases, the tissue dynamics remain globally unaffected by
1980
+ the mutation. Due to the stochastic nature of the process, mutant clones can
1981
+ go extinct even if the growth parameter is positive. That is, even in cases where
1982
+ divergence would be observed for the tissue-wide disruption. However, this does
1983
+ not occur in all the instances. The right panel of the same figure shows those
1984
+ instances where the mutated clone does not go extinct and eventually prevails,
1985
+ resulting in diverging cell population dynamics. For the chosen parameters,
1986
+ this divergence of the mutated clone is detected in 6% of all cases. Surprisingly,
1987
+ only a few clones survive despite a proliferative advantage, but this is plausible
1988
+ for a small fitness advantage (For example, in the case of a single state with
1989
+ cell division rate λ and loss rate γ – a simple branching process [33] – the
1990
+ probability for the a mutant with µ > 0, that is, λ > γ, to establish is 1−γ/λ,
1991
+ which can be very low for λ ≈ γ).
1992
+ In the main text (Figure 2), only one profile for each scenario is shown,
1993
+ respectively. They correspond to instance #24 for the homeostatic case and
1994
+ instance #43 for the diverging case.
1995
+ B.4
1996
+ Quasi-dedifferentiation
1997
+ The numerical example presented in the main text is based on the same cell
1998
+ fate model described in Appendix B.1. To model the dynamics of a committed
1999
+ cell type, we choose a constant non-negative u =
2000
+
2001
+ 0.02 0.07 0.06
2002
+ �T to model
2003
+ for the cell influx. For such a model, the steady state, ρ∗
2004
+ c, is asymptotically
2005
+ stable.
2006
+ The figures presented in the main text are based on the numerical integra-
2007
+ tion of the system of ordinary differential equation (31). In particular, we used
2008
+ the explicit Runge-Kutta Dormand-Prince method (Matlab ode45 function).
2009
+ References
2010
+ [1] National Institute of Health: Stem Cell Basics (2016). https://stemcells.
2011
+ nih.gov/info/basics
2012
+
2013
+ Springer Nature 2021 LATEX template
2014
+ 30
2015
+ Homeostatic regulation of renewing tissue cell populations via crowding control
2016
+ -5
2017
+ 0
2018
+ 5
2019
+ 10
2020
+ 15
2021
+ 20
2022
+ 0.8
2023
+ 0.9
2024
+ 1
2025
+ 1.1
2026
+ 1.2
2027
+ H
2028
+ F2
2029
+ 0
2030
+ 20
2031
+ 40
2032
+ 60
2033
+ 80
2034
+ 0.8
2035
+ 0.9
2036
+ 1
2037
+ 1.1
2038
+ 1.2
2039
+ H
2040
+ F2
2041
+ Fig. B6
2042
+ Results of numerical simulations of the stochastic process representing the cell
2043
+ dynamics, according to section B.3. The cell density, scaled by the steady state in the
2044
+ homeostatic case, as a function of the time is shown for 100 random instances. Each shown
2045
+ trajectory is the result of a different instance of the stochastic process. At a time equal to
2046
+ zero, the cell mutation is modelled as a switch of a single random cell from the homeostatic
2047
+ H cell dynamics to the F2 model assessed in Appendix B.2. On the left panel, only the
2048
+ trajectories for which the mutated clone goes extinct are shown. The right panel shows the
2049
+ trajectories in which the mutated clone prevails. Dynamics are scaled by ¯α = mini{α∗
2050
+ i }.
2051
+ [2] Marinari, E., Mehonic, A., Curran, S., Gale, J., Duke, T., Baum, B.:
2052
+ Live-cell delamination counterbalances epithelial growth to limit tis-
2053
+ sue overcrowding. Nature 484(7395), 542–545 (2012). https://doi.org/10.
2054
+ 1038/nature10984
2055
+ [3] Eisenhoffer, G.T., Loftus, P.D., Yoshigi, M., Otsuna, H., Chien, C.-B.,
2056
+ Morcos, P.A., Rosenblatt, J.: Crowding induces live cell extrusion to main-
2057
+ tain homeostatic cell numbers in epithelia. Nature 484(7395), 546–549
2058
+ (2012). https://doi.org/10.1038/nature10999
2059
+ [4] Eisenhoffer, G.T., Rosenblatt, J.: Bringing balance by force: Live cell
2060
+ extrusion controls epithelial cell numbers. Trends in Cell Biology 23(4),
2061
+ 185–192 (2013). https://doi.org/10.1016/j.tcb.2012.11.006
2062
+ [5] Puliafito, A., Hufnagel, L., Neveu, P., Streichan, S., Sigal, A., Fygenson,
2063
+ D.K., Shraiman, B.I.: Collective and single cell behavior in epithelial con-
2064
+ tact inhibition. Proceedings of the National Academy of Sciences 109(3),
2065
+ 739–744 (2012). https://doi.org/10.1016/j.juro.2012.06.073
2066
+ [6] Gudipaty, S.A., Lindblom, J., Loftus, P.D., Redd, M.J., Edes, K., Davey,
2067
+ C.F., Krishnegowda, V., Rosenblatt, J.: Mechanical stretch triggers rapid
2068
+ epithelial cell division through Piezo1. Nature 543(7643), 118–121 (2017).
2069
+ https://doi.org/10.1038/nature21407
2070
+ [7] Shraiman, B.I.: Mechanical feedback as a possible regulator of tis-
2071
+ sue growth. Proceedings of the National Academy of Sciences 102(9),
2072
+ 3318–3323 (2005). https://doi.org/10.1073/pnas.0404782102
2073
+ [8] Kitadate, Y., J¨org, D.J., Tokue, M., Maruyama, A., Ichikawa, R.,
2074
+
2075
+ Springer Nature 2021 LATEX template
2076
+ Homeostatic regulation of renewing tissue cell populations via crowding control
2077
+ 31
2078
+ Tsuchiya, S., Segi-Nishida, E., Nakagawa, T., Uchida, A., Kimura-
2079
+ Yoshida, C., Mizuno, S., Sugiyama, F., Azami, T., Ema, M., Noda, C.,
2080
+ Kobayashi, S., Matsuo, I., Kanai, Y., Nagasawa, T., Sugimoto, Y., Taka-
2081
+ hashi, S., Simons, B.D., Yoshida, S.: Competition for Mitogens Regulates
2082
+ Spermatogenic Stem Cell Homeostasis in an Open Niche. Cell Stem Cell
2083
+ 24(1), 79–92 (2019). https://doi.org/10.1016/j.stem.2018.11.013
2084
+ [9] Johnston, M.D., Edwards, C.M., Bodmer, W.F., Maini, P.K., Chapman,
2085
+ S.J.: Mathematical modeling of cell population dynamics in the colonic
2086
+ crypt and in colorectal cancer. Proceedings of the National Academy
2087
+ of Sciences 104(10), 4008–4013 (2007). https://doi.org/10.1073/pnas.
2088
+ 0611179104
2089
+ [10] Sun, Z., Komarova, N.L.: Stochastic modeling of stem-cell dynamics with
2090
+ control Zheng. Math Bioscience 240(2), 231–240 (2012). https://doi.org/
2091
+ 10.1016/j.mbs.2012.08.004
2092
+ [11] Bocharov, G., Quiel, J., Luzyanina, T., Alon, H., Chiglintsev, E., Cheresh-
2093
+ nev, V., Meier-Schellersheim, M., Paul, W.E., Grossman, Z.: Feedback
2094
+ regulation of proliferation vs. differentiation rates explains the depen-
2095
+ dence of CD4 T-cell expansion on precursor number. Proceedings of the
2096
+ National Academy of Sciences of the United States of America 108(8),
2097
+ 3318–3323 (2011). https://doi.org/10.1073/pnas.1019706108
2098
+ [12] Greulich, P., Simons, B.D.: Dynamic heterogeneity as a strategy of
2099
+ stem cell self-renewal. Proceedings of the National Academy of Sciences
2100
+ 113(27), 7509–7514 (2016). https://doi.org/10.1073/pnas.1602779113
2101
+ [13] Greulich, P., MacArthur, B.D., Parigini, C., S´anchez-Garc´ıa, R.J.: Uni-
2102
+ versal principles of lineage architecture and stem cell identity in renewing
2103
+ tissues. Development 148, 194399 (2021)
2104
+ [14] Donati, G., Rognoni, E., Hiratsuka, T., Liakath-Ali, K., Hoste, E., Kar,
2105
+ G., Kayikci, M., Russell, R., Kretzschmar, K., Mulder, K.W., Teich-
2106
+ mann, S.A., Watt, F.M.: Wounding induces dedifferentiation of epidermal
2107
+ Gata6+ cells and acquisition of stem cell properties. Nature Cell Biology
2108
+ 19, 603–613 (2017). https://doi.org/10.1038/ncb3532
2109
+ [15] Jopling, C., Boue, S., Belmonte, J.C.I.: Dedifferentiation, transdifferenti-
2110
+ ation and reprogramming: three routes to regeneration. Nature Reviews
2111
+ Molecular Cell Biology 12, 79 (2011)
2112
+ [16] Tata, P.R., Mou, H., Pardo-Saganta, A., Zhao, R., Prabhu, M., Law, B.M.,
2113
+ Vinarsky, V., Cho, J.L., Breton, S., Sahay, A., Medoff, B.D., Rajagopal,
2114
+ J.: Dedifferentiation of committed epithelial cells into stem cells in vivo.
2115
+ Nature 503(7475), 218–223 (2013). https://doi.org/10.1038/nature12777
2116
+
2117
+ Springer Nature 2021 LATEX template
2118
+ 32
2119
+ Homeostatic regulation of renewing tissue cell populations via crowding control
2120
+ [17] Tetteh, P.W., Farin, H.F., Clevers, H.: Plasticity within stem cell hier-
2121
+ archies in mammalian epithelia. Trends in Cell Biology 25(2), 100–108
2122
+ (2015). https://doi.org/10.1016/j.tcb.2014.09.003
2123
+ [18] Tetteh, P.W., Basak, O., Farin, H.F., Wiebrands, K., Kretzschmar, K.,
2124
+ Begthel, H., van den Born, M., Korving, J., De Sauvage, F.J., van Es, J.H.,
2125
+ Van Oudenaarden, A., Clevers, H.: Replacement of Lost Lgr5-Positive
2126
+ Stem Cells through Plasticity of Their Enterocyte-Lineage Daughters.
2127
+ Cell Stem Cell 18(2), 203–213 (2016). https://doi.org/10.1016/j.stem.
2128
+ 2016.01.001
2129
+ [19] Murata, K., Jadhav, U., Madha, S., van Es, J., Dean, J., Cavazza, A.,
2130
+ Wucherpfennig, K., Michor, F., Clevers, H., Shivdasani, R.A.: Ascl2-
2131
+ Dependent Cell Dedifferentiation Drives Regeneration of Ablated Intesti-
2132
+ nal Stem Cells. Cell Stem Cell 26(3), 377–3906 (2020). https://doi.org/
2133
+ 10.1016/j.stem.2019.12.011
2134
+ [20] Parigini, C., Greulich, P.: Universality of clonal dynamics poses funda-
2135
+ mental limits to identify stem cell self-renewal strategies. eLife 9, 1–44
2136
+ (2020). https://doi.org/10.7554/eLife.56532
2137
+ [21] Bollob´as, B.: Modern Graph Theory, 1st edn. Graduate Texts in Mathe-
2138
+ matics 184. Springer, New York (1998)
2139
+ [22] MacCluer, C.R.: The Many Proofs and Applications of Perron’s Theorem.
2140
+ SIAM Review 42(3), 487–498 (2000)
2141
+ [23] Horn,
2142
+ R.A.,
2143
+ Johnson,
2144
+ C.R.:
2145
+ Matrix
2146
+ Analysis,
2147
+ 2nd
2148
+ edn.
2149
+ Cam-
2150
+ bridge University Press, Cambridge (1985). https://doi.org/10.1017/
2151
+ cbo9780511810817
2152
+ [24] Franklin, G.F., Powell, J.D., Emami-Naeini, A.: Feedback Control of
2153
+ Dynamic Systems, 7th edn. Prentice Hall Press, USA (2014)
2154
+ [25] Tomasetti, C., Vogelstein, B., Parmigiani, G.: Half or more of the somatic
2155
+ mutations in cancers of self-renewing tissues originate prior to tumor
2156
+ initiation. Proceedings of the National Academy of Sciences 110(6),
2157
+ 1999–2004 (2013). https://doi.org/10.1073/pnas.1221068110
2158
+ [26] Colom, B., Jones, P.H.: Clonal analysis of stem cells in differentiation
2159
+ and disease. Current Opinion in Cell Biology 43, 14–21 (2016). https:
2160
+ //doi.org/10.1016/j.ceb.2016.07.002
2161
+ [27] Rodilla, V., Fre, S.: Cellular plasticity of mammary epithelial cells under-
2162
+ lies heterogeneity of breast cancer. Biomedicines 6(4), 9–12 (2018). https:
2163
+ //doi.org/10.3390/biomedicines6040103
2164
+
2165
+ Springer Nature 2021 LATEX template
2166
+ Homeostatic regulation of renewing tissue cell populations via crowding control
2167
+ 33
2168
+ [28] Tata, P.R., Rajagopal, J.: Cellular plasticity: 1712 to the present day.
2169
+ Current Opinion in Cell Biology 43, 46–54 (2016). https://doi.org/10.
2170
+ 1016/j.ceb.2016.07.005
2171
+ [29] Merrell,
2172
+ A.J.,
2173
+ Stanger,
2174
+ B.Z.:
2175
+ Adult
2176
+ cell
2177
+ plasticity
2178
+ in
2179
+ vivo:
2180
+ De-
2181
+ differentiation and transdifferentiation are back in style. Nature Reviews
2182
+ Molecular Cell Biology 17(7), 413–425 (2016). https://doi.org/10.1038/
2183
+ nrm.2016.24
2184
+ [30] Puri, S., Folias, A.E., Hebrok, M.: Plasticity and dedifferentiation within
2185
+ the pancreas: Development, homeostasis, and disease. Cell Stem Cell
2186
+ 16(1), 18–31 (2015). https://doi.org/10.1016/j.stem.2014.11.001
2187
+ [31] Lei, J., Levin, S.A., Nie, Q.: Mathematical model of adult stem cell
2188
+ regeneration with cross-talk between genetic and epigenetic regulation.
2189
+ Proceedings of the National Academy of Sciences 111(10) (2014). https:
2190
+ //doi.org/10.1073/pnas.1324267111
2191
+ [32] Gillespie, D.T.: Exact stochastic simulation of coupled chemical reactions.
2192
+ The Journal of Physical Chemistry 81(25), 2340–2361 (1977). https://
2193
+ doi.org/10.1021/j100540a008
2194
+ [33] Haccou, P., Jagers, P., Vatutin, V.A.: Branching Processes: Varia-
2195
+ tion, Growth, and Extinction of Populations. Cambridge University
2196
+ Press, Cambridge (2005). https://doi.org/10.2277/0521832209. http://
2197
+ pure.iiasa.ac.at/7598/
2198
+
BdE4T4oBgHgl3EQf5Q5A/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
BdE4T4oBgHgl3EQf5Q5A/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d32a4ea40e522757e60d681544db9a465613159dea5e610cf94df6b37ad2c1d1
3
+ size 194487
BtE5T4oBgHgl3EQfTQ-D/content/tmp_files/2301.05535v1.pdf.txt ADDED
@@ -0,0 +1,1008 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+
2
+
3
+
4
+ Using the profile of publishers to predict
5
+ barriers across news articles
6
+
7
+ Abdul Sittar1,2[0000−0003−0280−9594] and Dunja Mladeni´c1,2[0000−0002−0360−6505]
8
+ 1 Joˇzef Stefan Institute, Slovenia,
9
+ 2 Joˇzef Stefan International Postgraduate School, Slovenia,
10
+ Jamova cesta 39
11
+ {abdul.sittar, dunja.mladenic}@ijs.si
12
+
13
+ Abstract. Detection of news propagation barriers, being economical,
14
+ cultural, political, time zonal, or geographical, is still an open research
15
+ issue. We present an approach to barrier detection in news spreading
16
+ by utilizing Wikipedia-concepts and metadata associated with each bar-
17
+ rier. Solving this problem can not only convey the information about the
18
+ coverage of an event but it can also show whether an event has been
19
+ able to cross a specific barrier or not. Experimental results on IPoNews
20
+ dataset (dataset for information spreading over the news) reveals that
21
+ simple classification models are able to detect barriers with high accu-
22
+ racy. We believe that our approach can serve to provide useful insights
23
+ which pave the way for the future development of a system for predicting
24
+ information spreading barriers over the news.
25
+
26
+ Keywords: news propagation · news spreading barriers · cultural bar-
27
+ rier · economical barriers · geographical barrier · political barrier · time
28
+ zone barrier · classification methods
29
+
30
+ 1 Introduction
31
+ The phenomenon of event-centric news spreading due to globalization has been
32
+ exposed internationally [8]. International events capture attention from all cor-
33
+ ners of the world. News agencies play their part to bring our attentions on some
34
+ events and not on others. Varying nature of living styles, cultures, economic con-
35
+ ditions, time zone, and geographical juxtaposition of countries present a signifi-
36
+ cant role in process of publishing news related to different events [3, 6, 13, 19–21].
37
+ For example, publishing about sports events could be dependent on culture, epi-
38
+ demic events can reach firstly to neighboring countries due to geographic prox-
39
+ imity and, news on a luxury product may be relevant for economically strong
40
+ countries due to demand of wealthy people. We represent this differentiation
41
+ along with different barriers. These barriers include but are not limited to 1)
42
+ Economic Barrier, 2) Cultural Barrier, 3) Political Barrier, 4) Geographical Bar-
43
+ rier, and 5) Time Zone Barrier. Detection of the overpass of these barriers does
44
+ Copyright © 2021 for this paper by its authors. Use permitted under Creative
45
+ Commons License Attribution 4.0 International (CC BY 4.0).
46
+
47
+ 2
48
+ A. Sittar et al.
49
+
50
+
51
+ not only tell us the area where the broadcasting of an event reached, but it also
52
+ shows us events-location relation as countries have different culture, economic
53
+ conditions, geographical placement on the globe, political point of view, and
54
+ time zone. Following are the definitions of news crossing these barriers:
55
+ Cultural Barrier. If we identify the coverage of specific event-centric news by
56
+ publishers that are surrounded by different cultures, then we can say that the
57
+ news related to the event crossed cultural barriers.
58
+ Political Barrier. If news about a specific event is disseminated from publishers
59
+ having different political alignment, we can say that the news related to that
60
+ event crossed the political barrier.
61
+ Geographical Barrier. We say that some news related to a specific event
62
+ overpasses geographical barriers if that event gets attention by publishers of
63
+ countries located in different geographical regions.
64
+ Time Zone Barrier. We can claim that event-centric news has crossed the
65
+ time zone barrier if it has been published by publishers located in different time
66
+ zones.
67
+ Economic Barrier. It can be asserted that a piece of event-centric news has
68
+ crossed economic barriers if it is published in countries having different economic
69
+ conditions.
70
+ In this paper, we propose a methodology for detection of different barriers
71
+ during information propagation in form of news that utilize data (IPoNews) [18]
72
+ related to three contrasting events (earthquake, Global warming, and FIFA world
73
+ cup) in different domains (natural disasters, climate changes, and sports) in 5
74
+ different languages: English, Slovene, Portuguese, German, and Spanish.
75
+
76
+ 1.1 Contributions
77
+ Following are the main scientific contributions of this paper:
78
+
79
+ – A novel methodology for barrier detection in news spreading.
80
+ – Experimental comparison of several simple classification models that can
81
+ serve as a baseline.
82
+
83
+ 1.2 Problem Statement
84
+ Observing the spreading of news on a particular event over time, we want to
85
+ predict whether a barrier (cultural, political, geographical, time zone, economi-
86
+ cal) is likely to hamper information while information propagates over the news
87
+ (binary classification).
88
+
89
+ 2 RELATED WORK
90
+
91
+ Multiple barriers come across event-centric news specifically when the news is
92
+ concerned about international or national events. According to news flow theo-
93
+ ries, multiple determinants impact international news spreading. The economic
94
+
95
+ Using the profile of publishers to predict barriers across news articles
96
+ 3
97
+
98
+
99
+ power of a country is one of the factors that influence news spreading. Moreover,
100
+ economic variations has different influence for different events (e.g. protests, con-
101
+ flicts, disasters) [15]. The magnitude of economic interactivity between countries
102
+ can also impact the news flow [21]. Economic growth/income level shows the eco-
103
+ nomic condition of a country. Multiple organizations are working on generating
104
+ prosperity and welfare index on yearly basis. Among them, “The Legatum Pros-
105
+ perity Index” and “Human Development Index” are popular 1, 2. Geographical
106
+ representation of entities and events has been utilized extensively in the past
107
+ to detect local, global, and critical events [3, 13, 19, 20]. It has been said that
108
+ countries with close distance share culture and language up to a certain extent
109
+ which can further unfold interesting facts about shared tendencies in informa-
110
+ tion spreading [15, 16].
111
+
112
+ News agencies tend to follow the national context in which journalists op-
113
+ erate. One of the related examples is the SARS epidemic study which found
114
+ that cross-national contextual values such as political and economic situations
115
+ impact the news selection [5]. It will be true to say that fake news is produced
116
+ based on many factors and it is surrounded by a paramount factor that is polit-
117
+ ical effect [11]. A great amount of work regarding fake news dwells on different
118
+ strategies and few studies considered political alignment to have a compelling
119
+ effect on news spreading [4, 12]. [12] strongly proved it to be a major strategy
120
+ in news agencies to control the news and change accordingly due to the involve-
121
+ ment of journalists and political actors. Countries that share common culture
122
+ are expected to have heavier news flow about between them reporting on similar
123
+ events [21]. Many quantitative studies found demographic, psychological, socio-
124
+ cultural, source, system, and content-related aspects [1]. Many models have tried
125
+ to explain cultural differences between societies. Hofstede’s national culture di-
126
+ mensions (HNCD) has been widely used and cited in different disciplines [7, 9].
127
+
128
+ News classification for different kinds of problems is a well-known topic since
129
+ the past and features used to classify varies depending upon the problem. [17]
130
+ used news content and user profile to classify the news whether it is fake or
131
+ not. [2] calculated TF-IDF score and Word2Vec score of most frequent words
132
+ and used them as features to classify into one of the five categories (state, econ-
133
+ omy, entertainment, international, and sports). Similarly, [14] performed part-
134
+ of-speech (POS) tagging at sentences level and used them as features, and built
135
+ supervised learning classifiers to classify news articles based on their location.
136
+ Mostly classifier trained to utilize popular supervised learning methods such as
137
+ Random Forest, Support Vector Machine (SVM), Naive Bayes, k-Nearest Neigh-
138
+ bour (kNN), and Decision Tree. In this work, we used the profile of each barrier
139
+ for each news publisher (see section 3.5) and most frequent 300 Wikipedia con-
140
+ cepts from the dataset that appeared in the list of news articles related to three
141
+ contrasting events (earthquake, Global Warming, and FIFA world cup). We also
142
+
143
+ 1 http://hdr.undp.org/en/content/human-development-index-hdi
144
+ 2 https://www.prosperity.com/
145
+
146
+ 4
147
+ A. Sittar et al.
148
+
149
+
150
+
151
+ compared the results of popular classifiers such as SVM, Random Forest, Deci-
152
+ sion Tree, Naive Bayes, and kNN (see Section 5.4).
153
+
154
+ 3 DATA DESCRIPTION
155
+
156
+ 3.1 Dataset
157
+
158
+ We utilized dataset ”A dataset for information spreading over the news (IPoNews)”
159
+ that consists of pairs of news articles that were labeled based on the level of their
160
+ similarity, as described in [18]. This dataset was collected from Event Registry,
161
+ a platform that identifies events by collecting related articles written in differ-
162
+ ent languages from tens of thousands of news sources [10]. The similarity score
163
+ among cross-lingual news articles was calculated using concept-based similar-
164
+ ity employing Wikifier service3. [18] describes the criteria when information is
165
+ considered to be propagated. Statistics of the data set are shown in table 3.
166
+
167
+ Table 1. Statistics about dataset
168
+
169
+ Dataset Domain
170
+ Event type
171
+ Articles per Language Total Articles
172
+
173
+ 1
174
+
175
+ Sports
176
+
177
+ FIFA World Cup
178
+ Eng Spa Ger Slv Por
179
+
180
+ 2682
181
+ 983 762 711 10 216
182
+ 2
183
+ Natural Disaster Earthquake
184
+ 941 999 937 19 251
185
+ 3147
186
+ 3
187
+ Climate Changes Global Warming 996 298 545 8
188
+ 97
189
+ 1944
190
+
191
+
192
+ The dataset contains a list of pairs of news articles annotated with one of
193
+ the labels such as ”information-Propagated”, ”Unsure”, or ”Information-Not-
194
+ Propagated” (see Table 2). The information is considered to be propagated if the
195
+ cosine similarity score of the two articles in the pair is above a predefined thresh-
196
+ old ( 0.7 for Information-Propagated, < 0.4 for Information-not-Propagated,
197
+ otherwise Unsure). We restructured the original dataset to include only exam-
198
+ ples labeled as spreading information. In this way, we have pair of news articles
199
+ where we observe information spreading from one to the other. Furthermore, for
200
+ each example, instead of having a pair of articles, we kept only the article that
201
+ was published earlier. In this way, each example contains an article that spreads
202
+ information.
203
+
204
+ Table 2. Articles with metadata
205
+
206
+ from
207
+ to
208
+ weight Class
209
+ from-publisher to-publisher from-pub-uri
210
+ to-pub-uri
211
+ Por44
212
+ Por43
213
+ 0.627
214
+ Unsure
215
+ ClicRBS
216
+ SAPO 24
217
+ jornald.clicrbs.com.br 24.sapo.pt
218
+ English881 English880 1
219
+ Information-Propagated
220
+ Sky News
221
+ 247 Wall St.
222
+ news.sky.com
223
+ 247wallst.com
224
+ English258 English329 0.313
225
+ Information-Not-Propagated Sify
226
+ 4-traders
227
+ sify.com
228
+ 4-traders.com
229
+ English793 English787 0.238
230
+ Information-Not-Propagated Bioengineer.org 7NEWS Sydney scienmag.com
231
+ 7news.com.au
232
+ German237 German236 0.979
233
+ Information-Propagated
234
+ watson
235
+ watson
236
+ aargauerzeitung.ch
237
+ aargauerzeitung.ch
238
+
239
+
240
+ 3 http://wikifier.org/info.html, https://github.com/abdulsittar/IPoNews
241
+
242
+ Using the profile of publishers to predict barriers across news articles
243
+ 5
244
+
245
+
246
+ 3.2 Statistics after restructuring the data
247
+
248
+ The original dataset describes in Section 3 contains pairs of articles along with
249
+ the information on whether there was the propagation of information related to a
250
+ specific event or not. We used only examples labeled as propagating information
251
+ 4. Based on the available metadata for articles, we ignored articles that do not
252
+ have metadata information in our database (see Section 3.4). Table 3 shows the
253
+ statistics for each barrier after filtering the original dataset.
254
+
255
+ Table 3. Statistics about barrier
256
+
257
+ Dataset Domain
258
+ Event type
259
+ Articles for each barrier
260
+
261
+ 1
262
+
263
+ Sports
264
+
265
+ FIFA World Cup
266
+ Time-Zone Cultural Political Geographical Economical
267
+ 724
268
+ 699
269
+ 143
270
+ 726
271
+ 634
272
+ 2
273
+ Natural Disaster Earthquake
274
+ 1102
275
+ 1113
276
+ 227
277
+ 1113
278
+ 1010
279
+ 3
280
+ Climate Changes Global Warming 586
281
+ 445
282
+ 108
283
+ 487
284
+ 463
285
+
286
+
287
+
288
+
289
+ 3.3 Wikipedia Concepts as Features
290
+
291
+ As our dataset already mention (see Section 3) if information in news is spread-
292
+ ing from an article to another based on Wikipedia-concepts, we utilized the
293
+ most frequent (top 300) Wikipedia-concepts as features. Figure 1 portrays these
294
+ Wikipedia-concepts for all three events in form of word clouds.
295
+
296
+
297
+
298
+
299
+
300
+
301
+
302
+
303
+ Fig. 1. Word clouds of most frequent words related to earthquake, FIFA
304
+ World Cup and Global Warming events respectively.
305
+
306
+
307
+
308
+
309
+ 3.4 Barriers Knowledge
310
+
311
+ Barriers knowledge refers to a database that contains metadata about each bar-
312
+ rier. Figure 3 shows schema of database and Table 4 presents barriers along with
313
+ their characteristics. Each barrier depends on one main information that is the
314
+ country name of the headquarter of the news publishers. Since the utilized data
315
+ 4 https://doi.org/10.5281/zenodo.3950064
316
+
317
+ DEBpresident
318
+ United
319
+ Yor
320
+ Wart
321
+ overnmen
322
+ States
323
+ nameGermanname
324
+ football
325
+ SWar
326
+ ummerWorld
327
+ assoclation
328
+ Unitednationa
329
+ CUDFIFAASSO
330
+ ation
331
+ FIFAWorldYorKname
332
+ War
333
+ States
334
+ IInchEarthFranceUnited
335
+ United
336
+ New
337
+ Globa
338
+ disambiguation6
339
+ A. Sittar et al.
340
+
341
+
342
+ set already contains headquarter of publishers therefore we fetched the coun-
343
+ try associated with headquarters. For economical barrier, we fetched economical
344
+ profile for each country using “”The Legatum Prosperity Index”” 5. Cultural
345
+ differences among different regions were collected using Hofstede’s national cul-
346
+ ture dimensions (HNCD). For time zone and geographical barrier, we stored
347
+ general UTC-offset, latitude, and longitude. For political barrier we are using
348
+ the political alignment of the newspaper/magazine that we determined based on
349
+ Wikipedia infobox at their Wikipedia page. For instance, for Austrian newspa-
350
+ per ”Der Standard” we find social liberalism as political alignment (See Figure
351
+ 2), for British newspaper ”Daily Mail” we find right-wing as political alignment,
352
+ for German ”Stern” magazine there is no information in its Wikipedia infobox
353
+ on the political alignment thus we label political alignment as unknown.
354
+
355
+
356
+
357
+ Fig. 2. Three Wikipedia infobox for three different newspapers/magazines
358
+ with political alignment
359
+
360
+
361
+
362
+ 5 https://www.prosperity.com/
363
+
364
+ Der Standard
365
+ DERSTANDARD
366
+ Type
367
+ Daily newspaper
368
+ Owner(s)
369
+ Oscar Bronner
370
+ Publisher
371
+ Oscar Bronner
372
+ Martin Kotynek
373
+ Founded
374
+ 19 October 1988: 32 years
375
+ ago
376
+ Political
377
+ Social liberalism
378
+ alignment
379
+ Headguarters
380
+ Vienna
381
+ Circulation
382
+ 86,000 (2013)
383
+ Website
384
+ www.derstandard.de
385
+ www.derstandard.at DailyMail
386
+ DailumlailFREE
387
+ MICHELIN
388
+ SO MUCH
389
+ FOR THE
390
+ BONFIRE
391
+ OF THE
392
+ QUANGOS!
393
+ aplasticheart
394
+ DailyMail frontpageon 4August 2010
395
+ Type
396
+ Dailynewspaper
397
+ Format
398
+ Tabloid
399
+ Owner(s)
400
+ DailyMail and General Trust
401
+ Founder(s)
402
+ AlfredHarmsworthandHarold
403
+ Harmsworth
404
+ Publisher
405
+ DMGMedia
406
+ Editor
407
+ GeordieGreig
408
+ Founded
409
+ 4 May1896:124 years ago
410
+ Political
411
+ Right-wing[1]2][3]
412
+ alignment
413
+ Language
414
+ English
415
+ Headquarters Northcliffe House
416
+ 2 Derry Street
417
+ LondonW85TT
418
+ Circulation
419
+ 1.134.184(asofFebruary
420
+ 2020)[4]
421
+ ISSN
422
+ 0307-7578
423
+ OCLC
424
+ 16310567
425
+ number
426
+ Website
427
+ www.dailymail.co.ukStern
428
+ ?
429
+ stern
430
+ ?
431
+ stern
432
+ KRERSMID
433
+ Alein in turopa
434
+ IXABE
435
+ HRSECIEENE
436
+ Sternmagazinecoveron18February2016
437
+ Editor
438
+ FlorianGless,Anna-Beeke
439
+ Gretemeier
440
+ Categories Newsmagazine
441
+ FrequencyWeekly
442
+ Circulation390,000(2020)
443
+ Year
444
+ 1948
445
+ founded
446
+ Firstissue
447
+ 1August1948,72yearsago
448
+ Company
449
+ Gruner+Jahr
450
+ Country
451
+ Gemany
452
+ Basedin
453
+ Hamburg
454
+ Language
455
+ Geman
456
+ Website
457
+ www.stern.de
458
+ ISSN
459
+ 0039-1239Using the profile of publishers to predict barriers across news articles
460
+ 7
461
+
462
+
463
+ 3.5 Features for Individual Barrier
464
+ We represented each barrier with a specific profile containing a list of features.
465
+ Table 4 depicts the list of features for each barrier. Economic and cultural bar-
466
+ riers consist of a vector of length 11 and 6 features whereas geographical, time
467
+ zone, and political only contain 1 or 2 features such as latitude-longitude, UTC-
468
+ offset, and political alignment.
469
+
470
+
471
+
472
+ Fig. 3. Database Schema for Barriers
473
+
474
+
475
+
476
+
477
+ 3.6 Dataset Annotation
478
+ We queried the metadata information for each article and generated a CSV file
479
+ for each barrier. We annotated each article based on that meta information to be
480
+ used for model training and classification. For economic and cultural barriers, we
481
+ calculated cosine similarity between vectors of economical values and vectors of
482
+ cultural values. Score greater than the threshold value of 0.9 labeled as FALSE
483
+ otherwise TRUE. We set the lowest value as a threshold based on the fact that
484
+ if two countries have a little gap concerning culture or economical values then
485
+ there exists a barrier. For geographical barriers, we compared the latitude and
486
+ longitude of the country of each publisher. If a country name or lat/lat appeared
487
+ to be the same then we annotated it with FALSE otherwise TRUE. Lastly, for
488
+
489
+ Enterprise Conditions
490
+ Social Capital
491
+ Education
492
+ EconomicQuality
493
+ Marketaccessand
494
+ Individualistic cuiture
495
+ Living Conditions
496
+ Economic
497
+ infrastructure
498
+ Power distance
499
+ Profile
500
+ Governance
501
+ Natural Environment
502
+ afety
503
+ Fam
504
+ Health
505
+ nty
506
+ Cultural Value's
507
+ Has
508
+ Has
509
+ induigence vs
510
+ restraint
511
+ Headquarter
512
+ Has
513
+ Country
514
+ Has
515
+ Geographical
516
+ Values
517
+ (Lat/Lon)
518
+ Has
519
+ name
520
+ Has
521
+ Longitude
522
+ Latitude
523
+ Political barrier
524
+ Time-Zone
525
+ Political
526
+ UTC-offset
527
+ Alignment8
528
+ A. Sittar et al.
529
+
530
+
531
+ Table 4. Features of each barrier
532
+
533
+ Barrier
534
+ Features
535
+
536
+ Economic
537
+ Rank, Safety-Security,
538
+ Personal-Freedom, Governance, Social-Capital, Investment-Environment,
539
+ Enterprise-Conditions, Market-Infrastructure, Economic-Quality,
540
+ Living-Conditions, Health, Education, Natural-Environment
541
+
542
+ Cultural
543
+ Power-Distance,
544
+ Uncertainty-Avoidance-By-Individuals, Individualistic-Cultures,
545
+ Masculinity-Femininity, Long-Term-Orientation, Indulgence-Restraint
546
+ Geographical Latitude, Longitude
547
+ Time Zone
548
+ UTC-offset
549
+ Political
550
+ Political-Alignment
551
+
552
+
553
+
554
+
555
+ time-zone and political barriers, we followed the same process that was for the
556
+ geographical barrier. if political alignment or UTC-offset appeared to be the
557
+ same for a pair then it is annotated with FALSE otherwise TRUE. Figure 4
558
+ depicts the class distribution for each barrier. We can notice unbalanced class
559
+ distribution with majority of the examples being False. This is especially true
560
+ for Cultural and Political barrier with 91 percent of example being False. Thus
561
+ in our evaluation we rely more on F1 measure than classification accuracy.
562
+
563
+
564
+
565
+
566
+
567
+
568
+
569
+ Fig. 4. Class Distribution for Each Barrier
570
+
571
+ 2000
572
+ True
573
+ 2014
574
+ False
575
+ 1500
576
+ 1588
577
+ 1599
578
+ 1324
579
+ 1000
580
+ 948
581
+ 670
582
+ 500
583
+ 478
584
+ 408
585
+ 203
586
+ 42
587
+ 0
588
+ I Barrier
589
+ nical
590
+ olitical Barrier
591
+ Econom
592
+ TimeUsing the profile of publishers to predict barriers across news articles
593
+ 9
594
+
595
+
596
+ 4 MATERIALS AND METHODS
597
+ 4.1 Problem Modeling
598
+ For each barrier, we have a list of news articles where each article is associated
599
+ with 300 Wikipedia-concepts and features related to that barrier. The task is to
600
+ predict the status S of each barrier B.
601
+ S = f (C, B)
602
+ f is the learning function for barrier detection, C is donating here Wikipedia-
603
+ concepts related to an article and B is the list of features related to a specific
604
+ barrier (see Table 4).
605
+
606
+ 4.2 Methodology
607
+ We utilized dataset IPoNews [18] and built a database on top of this dataset
608
+ that includes barrier knowledge. Figure 5 explains the overall process of model
609
+ construction from news articles to results generation. We created a list of in-
610
+ stances using the most frequent Wikipedia-concepts based on news articles and
611
+ joined them along with barrier knowledge. After performing the annotation (see
612
+ Section 3.6), we trained popular classification models and generated the results
613
+ on test data (see Section 5.4).
614
+
615
+
616
+
617
+ Fig. 5. Steps for Model Construction
618
+
619
+
620
+
621
+ 5 EXPERIMENTAL EVALUATION
622
+ 5.1 Baselines
623
+ We used the following methods as baselines for all our models.
624
+ – Uniform: Generates predictions uniformly at random.
625
+ – Stratified: Generates predictions by respecting the training set’s class dis-
626
+ tribution.
627
+ – Most Frequent: Always predicts the most frequent label in the training
628
+ set.
629
+
630
+ Barrier's
631
+ Results
632
+ knowledge
633
+ Testset
634
+ Newsarticles (IPoNews)
635
+ Metadata
636
+ Barriers'Annotation
637
+ Wikipediaconcepts
638
+ Model Construction
639
+ Trainset10
640
+ A. Sittar et al.
641
+
642
+ sum
643
+ sum
644
+ sum
645
+ sum
646
+
647
+ 5.2 Classification Methods
648
+
649
+ We trained popular classification models for each barrier such as SVM, kNN,
650
+ Decision Tree, Random Forest, and Naive Bayes using Scikit-Learn. We applied
651
+ a stratified 10-fold cross-validator to split the dataset for training and testing.
652
+ For Random Forest, kNN, and Decision Tree, we varied the size of n-estimator,
653
+ value of k, and max-leafs and chosen the one with the best score on test data
654
+ respectively. Implementation of this methodology to barrier detection can be
655
+ found on GitHub 6.
656
+
657
+ 5.3 Evaluation Metric
658
+
659
+ Due to imbalance in the class distribution for all barriers, we used micro averaged
660
+ precision and recall to evaluate our models. 7
661
+ – Micro-Precision: The precision of average contributions from each class is
662
+ calculated in micro-precision whereas the following question is answered by
663
+ precision: What proportion of positive predictions was correct? It is defined
664
+ as:
665
+
666
+ TruePositivesum
667
+
668
+ Micro − Precision = TruePositive
669
+ + FalsePositive
670
+ – Micro-Recall: Recall of average contributions from each class is calculated
671
+ in micro-recall whereas the following question is answered by recall: What
672
+ proportion of actual positives was predicted correctly? It is defined as:
673
+
674
+ TruePositivesum
675
+
676
+ Micro − Recall = TruePositive
677
+ + FalseNegative
678
+
679
+ 5.4 Results and Analysis
680
+
681
+ Table 5 shows the results of all the classifiers for each barrier along with baselines.
682
+ Analysis of the experimental results show that overall all the machine learning
683
+ models outperform the three baselines. For all the barriers, we can notice Micro-
684
+ Recall is equal to Micro-Precision. The best performing baseline is the ”Most-
685
+ frequent” with Micro-F1 for economic, cultural, geographical, time zone, and
686
+ political barrier equal to 0.70, 0.90, 0.58, 0.70, and 0.90 respectively. The best
687
+ performing models on all the barriers are Decision Tree, Random Forest, and
688
+ kNN. Looking at Micro-F1, we can see that on the Economic and Cultural
689
+ barrier kNN achieved the best performance of 0.75 and 0.95 respectively. On
690
+ Geographical barriers, kNN and Decision Tree performed the best achieving 0.81.
691
+ On Time-Zone, the best performing classifier is Random Forest with Micro-F1
692
+ 6 https://github.com/cleopatra-itn/BarrierDetection-Classification
693
+ 7 https://peltarion.com/knowledge-center/documentation/evaluation-
694
+ view/classification-loss-metrics/micro-recall
695
+
696
+ Using the profile of publishers to predict barriers across news articles
697
+ 11
698
+
699
+
700
+ 0.83. On Political barriers, SVM, kNN, and Random Forest achieve the best
701
+ Micro-F1 score of 0.97.
702
+ In terms of classification accuracy, we can see that Random Forest outper-
703
+ forms the baselines as well as the other four classifiers for the first four barriers.
704
+ Notice that Random forest performs better than decision tree but takes more
705
+ time. Naive-Bayes achieves a little bit lower classification accuracy than the Deci-
706
+ sion Tree for the first four barriers. On the political barrier Naive-Bayes achieves
707
+ the best classification accuracy (0.98) but lower Micro-F1 (0.66).
708
+
709
+ 6 CONCLUSIONS AND FUTURE WORK
710
+
711
+ It is highly important to detect the barriers while information propagates specif-
712
+ ically through the news. For journalists, marketers, and social scientists, the phe-
713
+ nomenon of knowing which barrier appeared most frequently for what type of
714
+ events, is significantly helpful to solve business and marketing problems. In this
715
+ regard, we proposed a simple methodology. Though its results are good enough
716
+ for three types of events, we would like to enhance features as well as events. We
717
+ used only Wikipedia-concepts and meta information to detect barriers. In the
718
+ future, we would like to use DMoz categories provided by Event Registry [10],
719
+ and transformation of the text of news articles as a feature for barrier detection.
720
+ Currently geographical and time zone barriers are calculated in a binary way ei-
721
+ ther the same or different. In the future, we would like to introduce the distance
722
+ between countries and between time zones as labels instead of the currently used
723
+ binary labeling.
724
+
725
+ 7 ACKNOWLEDGMENTS
726
+
727
+ The research described in this paper was supported by the Slovenian research
728
+ agency under the project J2-1736 Causalify and co-financed by the Republic
729
+ of Slovenia and the European Union’s Horizon 2020 research and innovation
730
+ program under the Marie Sk-lodowska-Curie grant agreement No 812997.
731
+
732
+ 12
733
+ A. Sittar et al.
734
+
735
+
736
+
737
+ Table 5. Classifiers’ comparison with baselines
738
+
739
+ Barrier
740
+ Model
741
+ CA Mic-Pre Mic-Rec Mic-F1
742
+ Economic
743
+ Uniform
744
+ 0.50 0.50
745
+ 0.49
746
+ 0.49
747
+
748
+ Stratified
749
+ 0.58 0.59
750
+ 0.57
751
+ 0.59
752
+
753
+ Most Frequent 0.70 0.70
754
+ 0.70
755
+ 0.70
756
+
757
+ SVM
758
+ 0.66 0.69
759
+ 0.69
760
+ 0.69
761
+
762
+ kNN
763
+ 0.70 0.75
764
+ 0.75
765
+ 0.75
766
+
767
+ Decision Tree
768
+ 0.69 0.73
769
+ 0.73
770
+ 0.73
771
+
772
+ Random Forest 0.74 0.74
773
+ 0.74
774
+ 0.74
775
+
776
+ Naive Bayes
777
+ 0.61 0.63
778
+ 0.63
779
+ 0.63
780
+
781
+
782
+ Cultural
783
+ Uniform
784
+ 0.50 0.50
785
+ 0.49
786
+ 0.50
787
+
788
+ Stratified
789
+ 0.83 0.83
790
+ 0.83
791
+ 0.83
792
+
793
+ Most Frequent 0.90 0.90
794
+ 0.90
795
+ 0.90
796
+
797
+ SVM
798
+ 0.84 0.93
799
+ 0.93
800
+ 0.93
801
+
802
+ kNN
803
+ 0.55 0.95
804
+ 0.95
805
+ 0.95
806
+
807
+ Decision Tree
808
+ 0.90 0.94
809
+ 0.94
810
+ 0.94
811
+
812
+ Random Forest 0.93 0.93
813
+ 0.93
814
+ 0.93
815
+
816
+ Naive Bayes
817
+ 0.83 0.51
818
+ 0.51
819
+ 0.51
820
+
821
+
822
+ Geographical Uniform
823
+ 0.49 0.50
824
+ 0.50
825
+ 0.50
826
+
827
+ Stratified
828
+ 0.50 0.51
829
+ 0.51
830
+ 0.51
831
+
832
+ Most Frequent 0.58 0.58
833
+ 0.58
834
+ 0.58
835
+
836
+ SVM
837
+ 0.81 0.76
838
+ 0.76
839
+ 0.76
840
+
841
+ kNN
842
+ 0.79 0.81
843
+ 0.81
844
+ 0.81
845
+
846
+ Decision Tree
847
+ 0.78 0.81
848
+ 0.81
849
+ 0.81
850
+
851
+ Random Forest 0.79 0.79
852
+ 0.79
853
+ 0.79
854
+
855
+ Naive Bayes
856
+ 0.76 0.79
857
+ 0.79
858
+ 0.79
859
+
860
+
861
+ Time Zone
862
+ Uniform
863
+ 0.49 0.49
864
+ 0.49
865
+ 0.49
866
+
867
+ Stratified
868
+ 0.59 0.58
869
+ 0.58
870
+ 0.58
871
+
872
+ Most Frequent 0.70 0.70
873
+ 0.70
874
+ 0.70
875
+
876
+ SVM
877
+ 0.78 0.77
878
+ 0.77
879
+ 0.77
880
+
881
+ kNN
882
+ 0.70 0.78
883
+ 0.78
884
+ 0.78
885
+
886
+ Decision Tree
887
+ 0.80 0.81
888
+ 0.81
889
+ 0.81
890
+
891
+ Random Forest 0.83 0.83
892
+ 0.83
893
+ 0.83
894
+
895
+ Naive Bayes
896
+ 0.72 0.64
897
+ 0.64
898
+ 0.64
899
+
900
+
901
+ Political
902
+ Uniform
903
+ 0.51 0.52
904
+ 0.50
905
+ 0.50
906
+
907
+ Stratified
908
+ 0.84 0.83
909
+ 0.81
910
+ 0.82
911
+
912
+ Most Frequent 0.90 0.90
913
+ 0.90
914
+ 0.90
915
+
916
+ SVM
917
+ 0.79 0.97
918
+ 0.97
919
+ 0.97
920
+
921
+ kNN
922
+ 0.62 0.97
923
+ 0.97
924
+ 0.97
925
+
926
+ Decision Tree
927
+ 0.79 0.91
928
+ 0.91
929
+ 0.91
930
+
931
+ Random Forest 0.97 0.97
932
+ 0.97
933
+ 0.97
934
+
935
+ Naive Bayes
936
+ 0.98 0.66
937
+ 0.66
938
+ 0.66
939
+
940
+ Using the profile of publishers to predict barriers across news articles
941
+ 13
942
+
943
+
944
+ References
945
+ 1. Al-Samarraie, H., Eldenfria, A., Dawoud, H.: The impact of personality traits on
946
+ users’ information-seeking behavior. Information Processing & Management 53(1),
947
+ 237–247 (2017)
948
+ 2. Alam, M.T., Islam, M.M.: Bard: Bangla article classification using a new compre-
949
+ hensive dataset. In: 2018 International Conference on Bangla Speech and Language
950
+ Processing (ICBSLP). pp. 1–5. IEEE (2018)
951
+ 3. Andrews, S., Gibson, H., Domdouzis, K., Akhgar, B.: Creating corroborated cri-
952
+ sis reports from social media data through formal concept analysis. Journal of
953
+ Intelligent Information Systems 47(2), 287–312 (2016)
954
+ 4. Bakshy, E., Messing, S., Adamic, L.A.: Exposure to ideologically diverse news and
955
+ opinion on facebook. Science 348(6239), 1130–1132 (2015)
956
+ 5. Camaj, L.: Media framing through stages of a political discourse: International
957
+ news agencies’ coverage of kosovo’s status negotiations. International Communica-
958
+ tion Gazette 72(7), 635–653 (2010)
959
+ 6. Dagon, D., Zou, C.C., Lee, W.: Modeling botnet propagation using time zones. In:
960
+ NDSS. vol. 6, pp. 2–13 (2006)
961
+ 7. He, M., Lee, J.: Social culture and innovation diffusion: a theoretically founded
962
+ agent-based model. Journal of Evolutionary Economics pp. 1–41 (2020)
963
+ 8. Hong, X., Yu, Z., Tang, M., Xian, Y.: Cross-lingual event-centered news clustering
964
+ based on elements semantic correlations of different news. Multimedia Tools and
965
+ Applications 76(23), 25129–25143 (2017)
966
+ 9. Khosrowjerdi, M., Sundqvist, A., Bystr¨om, K.: Cultural patterns of information
967
+ source use: A global study of 47 countries. Journal of the Association for Informa-
968
+ tion Science and Technology 71(6), 711–724 (2020)
969
+ 10. Leban, G., Fortuna, B., Brank, J., Grobelnik, M.: Event registry: learning about
970
+ world events from news. In: Proceedings of the 23rd International Conference on
971
+ World Wide Web. pp. 107–110 (2014)
972
+ 11. Martens, B., Aguiar, L., Gomez-Herrera, E., Mueller-Langer, F.: The digital trans-
973
+ formation of news media and the rise of disinformation and fake news (2018)
974
+ 12. Maurer, P., Beiler, M.: Networking and political alignment as strategies to con-
975
+ trol the news: Interaction between journalists and politicians. Journalism Studies
976
+ 19(14), 2024–2041 (2018)
977
+ 13. Quezada, M., Pen˜a-Araya, V., Poblete, B.: Location-aware model for news events
978
+ in social media. In: Proceedings of the 38th International ACM SIGIR Conference
979
+ on Research and Development in Information Retrieval. pp. 935–938 (2015)
980
+ 14. Rao, V., Sachdev, J.: A machine learning approach to classify news articles based
981
+ on location. In: 2017 International Conference on Intelligent Sustainable Systems
982
+ (ICISS). pp. 863–867. IEEE (2017)
983
+ 15. Segev, E.: Visible and invisible countries: News flow theory revised. Journalism
984
+ 16(3), 412–428 (2015)
985
+ 16. Segev, E., Hills, T.: When news and memory come apart: A cross-national com-
986
+ parison of countries’ mentions. International Communication Gazette 76(1), 67–85
987
+ (2014)
988
+ 17. Shu, K., Zhou, X., Wang, S., Zafarani, R., Liu, H.: The role of user profiles for fake
989
+ news detection. In: Proceedings of the 2019 IEEE/ACM international conference
990
+ on advances in social networks analysis and mining. pp. 436–439 (2019)
991
+ 18. Sittar, A., Mladeni´c, D., Erjavec, T.: A dataset for information spreading over the
992
+ news. In: Proc. of Slovenian KDD Conf. on Data Mining and Data Warehouses
993
+ (SiKDD) (2020)
994
+
995
+ 14
996
+ A. Sittar et al.
997
+
998
+
999
+ 19. Watanabe, K., Ochi, M., Okabe, M., Onai, R.: Jasmine: a real-time local-event
1000
+ detection system based on geolocation information propagated to microblogs. In:
1001
+ Proceedings of the 20th ACM international conference on Information and knowl-
1002
+ edge management. pp. 2541–2544 (2011)
1003
+ 20. Wei, H., Sankaranarayanan, J., Samet, H.: Enhancing local live tweet stream to
1004
+ detect news. GeoInformatica pp. 1–31 (2020)
1005
+ 21. Wu, H.D.: A brave new world for international news? exploring the determinants of
1006
+ the coverage of foreign news on us websites. International Communication Gazette
1007
+ 69(6), 539–551 (2007)
1008
+
BtFKT4oBgHgl3EQfXS78/content/tmp_files/2301.11794v1.pdf.txt ADDED
@@ -0,0 +1,1249 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Thermodynamic features of the 1D dilute Ising model
2
+ in the external magnetic field
3
+ A.V. Shadrina,∗, Yu.D. Panova
4
+ aInstitute of Natural Sciences and Mathematics, Ural Federal University, 620002, 19 Mira
5
+ street, Ekaterinburg, Russia
6
+ Abstract
7
+ We consider the effects of the magnetic field on the frustrated phase states of
8
+ the dilute Ising chain, especially, the behavior of the magnetic entropy change
9
+ and the isentropic dependence of the temperature on the magnetic field, which
10
+ are the key parameters of the magnetocaloric effect. The found temperature
11
+ dependences of entropy demonstrate the nonequivalence of frustrated phases in
12
+ the antiferromagnetic and ferromagnetic cases. In the antiferromagnetic case,
13
+ the nonzero magnetic field at certain parameters causes a charge ordering for
14
+ nonmagnetic impurities at a half-filling, while in the ferromagnetic case, the
15
+ magnetic field reduces the frustration of the ground state only partially. It is
16
+ also shown, that impurities radically change the magnetic Gr¨uneisen parameter
17
+ in comparison with the case of a pure Ising chain.
18
+ Keywords:
19
+ dilute Ising chain, frustrated magnets, magnetic entropy change
20
+ 1. Introduction
21
+ One of the remarkable features of low-dimensional systems, such as deco-
22
+ rated Ising models [1–7], the anisotropic Potts chain [8], the diamond Hubbard
23
+ chain [9], is the presence, under certain parameters, of a frustrated ground state
24
+ for which the residual entropy is nonzero. Despite the absence of a real phase
25
+ transition at finite temperatures according to the Perron–Frobenius theorem for
26
+ square real matrices [10] the thermodynamic behavior near the boundaries be-
27
+ tween different phases of the ground state for these systems can exhibit striking
28
+ features. As shown in [11], if one of the phases has a nonzero residual entropy
29
+ that preserves continuity at the boundary with the other phase, then the ther-
30
+ modynamic characteristics of the system will demonstrate pseudo-transitions at
31
+ a finite temperature. Entropy, heat capacity, magnetization, and susceptibility
32
+ have similar features to the behavior of these properties at conventional phase
33
+ transitions, including the presence of quasicritical exponents [12].
34
+ ∗Corresponding author
35
+ Email address: [email protected] (A.V. Shadrin)
36
+ Preprint submitted to Journal of Magnetism and Magnetic Materials
37
+ January 30, 2023
38
+ arXiv:2301.11794v1 [cond-mat.stat-mech] 27 Jan 2023
39
+
40
+ Recently, frustrated magnetic systems have also attracted the attention of
41
+ researchers due to the enhanced magnetocaloric effect in the vicinity of finite-
42
+ field transitions [13, 14]. Besides to geometric factors, the impurities are also
43
+ the reason for the existence of frustrations in the magnetic system. The simplest
44
+ example of a magnetic system that is frustrated by impurities is a diluted Ising
45
+ chain. The Hamiltonian of 1D diluted Ising model can be written in the following
46
+ form
47
+ H = −J
48
+
49
+ i
50
+ Sz,iSz,i+1 + V
51
+
52
+ i
53
+ P0,iP0,i+1 − h
54
+
55
+ i
56
+ Sz,i − µ
57
+
58
+ i
59
+ P0,i.
60
+ (1)
61
+ Here we use the S = 1 pseudospin operators. The states for a given lattice
62
+ site with the pseudospin projections Sz = ±1 correspond to the two magnetic
63
+ states with the conventional spin projections sz = ±1/2, while the state with
64
+ Sz = 0 corresponds to the charged nonmagnetic state. Sz,i is a z-projection of
65
+ the on-site pseudospin operator, P0,i = 1 − S2
66
+ z,i is the projection operator onto
67
+ the Sz = 0 state, J is the exchange constant, V > 0 is the inter-site correlation
68
+ parameter for impurities, h is an external magnetic field, and µ is a chemical
69
+ potential for impurities. Further we will assume that nonmagnetic impurities
70
+ are mobile, which corresponds to the annealed system.
71
+ As well known [15],
72
+ V = V0 + V1 − 2V01 describes the interaction for a more general case:
73
+ V0
74
+
75
+ i
76
+ P0,iP0,i+1 + V1
77
+
78
+ i
79
+ P1,iP1,i+1 + V01
80
+
81
+ i
82
+
83
+ P0,iP1,i+1 + P1,iP0,i+1
84
+
85
+ ,
86
+ (2)
87
+ where P1 = S2
88
+ z, is the projection operator onto magnetic states. The solutions
89
+ and various thermodynamic properties of the 1D dilute Ising model at zero
90
+ external magnetic field was found in [16–20]. If h ̸= 0, then there are no explicit
91
+ analytical expressions for various thermodynamic functions of the model (1). It
92
+ is known the account of magnetic field for the S = 1 Ising chain significantly
93
+ expands the list of possible phase states of the system and leads to various
94
+ features of thermodynamic behavior [21, 22].
95
+ In the present paper, we consider the effects of the magnetic field on the
96
+ frustrated phase states of the model (1). We focused on the behavior of entropy
97
+ and, in particular, on the magnetic entropy change, which is the key parameter
98
+ of the magnetocaloric effect.
99
+ Also, we explore the isentropic dependence of
100
+ the temperature on the magnetic field. The paper is organized as follows. We
101
+ briefly describe the methods in section 2, and section 3 the results, including
102
+ the ground state phase diagram, and their discussions are given. Conclusions
103
+ are presented in section 4.
104
+ 2. Methods
105
+ We define the transfer matrix for the model (1) as
106
+ τ =
107
+
108
+
109
+ xz
110
+ z1/2 t1/2
111
+ x−1
112
+ z1/2 t1/2
113
+ y−1t
114
+ z−1/2 t1/2
115
+ x−1
116
+ z−1/2 t1/2
117
+ xz−1
118
+
119
+ � ,
120
+ (3)
121
+ 2
122
+
123
+ where x = eβJ, y = eβV , z = eβh, t = eβµ and β = 1/T, and we assume kB = 1.
124
+ From (3), we found the characteristic equation for the eigenvalues λi:
125
+ λ3 − λ2 �
126
+ ty−1 + x(z + z−1)
127
+
128
+ − λ
129
+
130
+ x2 − x−2 + t
131
+
132
+ xy−1 − 1
133
+
134
+ (z + z−1)
135
+
136
+ − 2t(x − x−1) − tx−2y−1 = 0.
137
+ (4)
138
+ The eigenvalues in a general case are cumbersome functions, but at h = 0 they
139
+ could be reduced to the known expressions [20]:
140
+ λ1,2
141
+ =
142
+ 1
143
+ 2
144
+
145
+ x + x−1 + y−1t
146
+
147
+ ±
148
+
149
+ 2t + 1
150
+ 4
151
+
152
+ x + x−1 − y−1t
153
+ �2�1/2
154
+ ,
155
+ λ3
156
+ =
157
+ x − x−1.
158
+ (5)
159
+ According to the Perron–Frobenius theorem [10], there is only one maximum
160
+ eigenvalue, λ1, and in the thermodynamic limit we obtain the grand potential
161
+ and the entropy in the following form:
162
+ Ω = Nω = −NT ln λ1,
163
+ S = −
164
+ � ∂ω
165
+ ∂T
166
+
167
+ h,µ
168
+ = ln λ1 + T
169
+ λ1
170
+ �∂λ1
171
+ ∂T
172
+
173
+ h,µ
174
+ .
175
+ (6)
176
+ The grand potential and entropy found depend on parameters J, V , h, µ, and
177
+ T. But in the present problem, it is more convenient to use the concentration n
178
+ of impurities as an external parameter. The dependence n(µ) can be obtained
179
+ from the equation
180
+ n = −
181
+ �∂ω
182
+ ∂µ
183
+
184
+ T,h
185
+ = T
186
+ λ1
187
+ �∂λ1
188
+ ∂µ
189
+
190
+ T,h
191
+ .
192
+ (7)
193
+ In a general case h ̸= 0, we used numerical methods to get the inverse
194
+ dependence µ(n) and fix the concentration of impurities n at all temperatures.
195
+ If h = 0, we obtain the explicit expressions [20]:
196
+ µ = ln
197
+
198
+ y
199
+
200
+ x + x−1� g + m
201
+ g − m
202
+
203
+ ,
204
+ (8)
205
+ S = 1
206
+ 2 ln 2 (1 + 2g)2
207
+ 1 − 4m2
208
+ + g + 2m2
209
+ 1 + 2g
210
+ ln y − m ln
211
+ ��
212
+ x + x−1� g + m
213
+ g − m
214
+
215
+ − (1 − 2m) (g − m)
216
+
217
+ x − x−1�
218
+ (1 + 2g) (x + x−1) ln x,
219
+ (9)
220
+ where
221
+ g =
222
+
223
+ m2 + 1
224
+ 2
225
+ �1
226
+ 4 − m2
227
+
228
+ y−1 �
229
+ x + x−1��1/2
230
+ ,
231
+ (10)
232
+ and we introduced the deviation of the concentration of impurities from half-
233
+ filling, m = n − 1/2.
234
+ 3
235
+
236
+ The knowledge of the entropy from Eqs. (6,7) gives an opportunity to explore
237
+ magnetocaloric properties of the dilute Ising chain for a given n. We explore the
238
+ magnetic entropy change, the isentropic dependencies of the temperature on the
239
+ magnetic field and the magnetic Gr¨uneisen parameter, which can be calculated
240
+ from the relation
241
+ Γmag = 1
242
+ T
243
+ �∂T
244
+ ∂h
245
+
246
+ S,n
247
+ = − 1
248
+ T
249
+ (∂S/∂h)T,n
250
+ (∂S/∂T)h,n
251
+ .
252
+ (11)
253
+ The explicit expression that we use to calculate Γmag for a given n in variables
254
+ (T, h, µ) has the following form:
255
+ Γmag = − 1
256
+ T
257
+
258
+ (∂S/∂h)T,µ (∂n/∂µ)T,h − (∂S/∂µ)T,h (∂n/∂h)T,µ
259
+ (∂S/∂T)h,µ (∂n/∂µ)T,h − (∂S/∂µ)T,h (∂n/∂T)h,µ
260
+
261
+ .
262
+ (12)
263
+ 3. Results
264
+ 3.1. Phase diagram at zero temperature.
265
+ The phase diagram of the dilute Ising chain in longitudinal magnetic field at
266
+ zero temperature is shown in Fig. 1 for the J − h plane. The limiting case for
267
+ the Ising chain without impurities, m = −1/2, is given in Fig. 1(a). Two ground
268
+ states, the ferromagnetic (FM) state with magnetic moment oriented towards
269
+ the field, and the antiferromagnetic (AFM) state with zero magnetic moment,
270
+ are separated by the critical value of magnetic field |hc| = −2J at which the spin-
271
+ flip transition occurs. Figures 1(b) and 1(c) show the cases of a weakly diluted
272
+ chain, −1/2 < m < 0, and a strongly diluted chain, 0 ≤ m < 1/2, respectively.
273
+ Dilution with impurities leads to the appearance of two new boundary lines on
274
+ the J − h plane, J = V and |h| = −J − V . If J > V , the ground state is
275
+ represented by macroscopic FM domains (or drops) separated by macroscopic
276
+ impurity domains.
277
+ Similarly, the AFM domains arise when J < −V − |h|.
278
+ Schematically, this is shown in Fig. 1(b,c), where the arrows correspond to the
279
+ spins, and the circles correspond to the impurities. For both FM and AFM
280
+ phases, the entropy is zero.
281
+ Analysis of the ground state of the model (1) in zero magnetic field shows [19,
282
+ 20] that phases with the nonzero residual entropy exist at |J| < V and at
283
+ |J| = V . For the weak exchange, when |J| < V , the spin correlation length is
284
+ always finite, but the impurity correlation length with the temperature lowering
285
+ tends to infinity at the half-filling concentration, m = 0, due to the formation of
286
+ charge ordering [20]. If |J| = V and h = 0, the spin correlation length and the
287
+ impurity correlation length are finite for all values of the impurity concentration
288
+ and temperature.
289
+ In magnetic field, if −V − |h| < J < V , the residual entropy is also not zero,
290
+ so the ground state is frustrated. If −1/2 < m < 0, the ground state of the
291
+ chain is a set of finite AFM or FM spin clusters separated by impurities. This
292
+ state we call frustrated ferromagnetic (FR-FM) or frustrated antiferromagnetic
293
+ (FR-AFM) respectively.
294
+ The FR-FM and FR-AFM states separated by the
295
+ 4
296
+
297
+ J
298
+ J
299
+ J
300
+ h
301
+ h
302
+ h
303
+ V
304
+ V
305
+ -V
306
+ -V
307
+ |h|=-V-J
308
+ |h|=-V-J
309
+ |h|=-2J
310
+ |h|=-2J
311
+ 0 Ј m < 0.5
312
+ -0.5 < m < 0
313
+ m = -0.5
314
+ (b)
315
+ (a)
316
+ (c)
317
+ AFM
318
+ AFM
319
+ AFM
320
+ FR-PM
321
+ FR-AFM
322
+ FR-FM
323
+ FM
324
+ FM
325
+ FM
326
+ 0
327
+ 0
328
+ 0
329
+ Figure 1:
330
+ Phase diagram at zero temperature for a dilute Ising chain in a longitudinal
331
+ magnetic field: (a) the Ising chain without impurities, n = 0, (b) the case of a weakly diluted
332
+ chain, (c) the case of a strongly diluted chain.
333
+ 5
334
+
335
+ spin-flip line, |h| = −2J, as it is shown in Fig. 1(b). In the strongly diluted
336
+ case, 0 ≤ m < 1/2, there are single spins separated by impurity clusters, and
337
+ the system exhibits a paramagnetic response, which is uniform over the entire
338
+ range −V −|h| < J < V . This frustrated paramagnetic (FR-PM) state is shown
339
+ in Fig. 1(c).
340
+ 3.2. The magnetic entropy change.
341
+ Temperature dependences of the entropy S and the magnetic entropy change,
342
+ ∆S = S(h = 0)−S(h ̸= 0), are shown in Fig. 2 for the antiferromagnetic (AFM)
343
+ sign of the exchange constant, J < 0, and in Fig. 3 for the ferromagnetic (FM)
344
+ sign, J > 0. The correlation parameter for impurities V accepted and used as
345
+ a positive scaling factor.
346
+ Fig. 2 shows the temperature dependences of the entropy for J/V = −1,
347
+ h = 0 in panel (a), and for J/V = −1, h/V = 0.5 in panel (b). If at h = 0 the
348
+ entropy monotonically depends on |m| and has a maximum at m = 0, at h ̸= 0
349
+ the dependence on |m| has a local minimum at m = 0. The magnetic entropy
350
+ change for J/V = −1 is shown in panel (c). The maximum ∆S for all m is
351
+ achieved at T = 0 and also has a minimum with ∆S < 0 at finite temperature
352
+ for small values of impurity concentrations.
353
+ It is worth noting that in the AFM chain, for any value of the applied
354
+ magnetic field, we get zero entropy at m = 0, because there is only one way to
355
+ minimize the energy: alternating spins and charges, and all spins are oriented
356
+ along the magnetic field. In a certain sense, in this case we get a kind of magneto-
357
+ electric effect: an external magnetic field causes a charge ordering. This also
358
+ gives us the maximum change in entropy at half-filling.
359
+ The temperature dependences of the entropy for J/V = −0, 5, h = 0 are
360
+ shown in Fig. 2(d), and for J/V = −0.5, h/V = 0.5 in Fig. 2(e).
361
+ The de-
362
+ pendences of S on |m| have a local minimum at m = 0 both at h = 0 and at
363
+ h/V = 0.5. The magnetic entropy change for J/V = −0.5 is shown in Fig. 2(f).
364
+ In a contrast to the previous case, the ∆S dependences show a maximum at
365
+ finite temperature for some m ≥ 0, and also show a minimum with ∆S < 0 at
366
+ finite temperature in some range for m < 0.
367
+ Fig. 3 shows the temperature dependences of the entropy for J/V = 1, h = 0
368
+ in panel (a), and for J/V = 1, h/V = 0.5 in panel (b). The magnetic entropy
369
+ change for J/V = 1 is shown in panel (c). Both at h = 0 and h ̸= 0 the entropy
370
+ monotonically depends on |m| and has a maximum at m = 0. The magnetic
371
+ entropy change has a maximum at finite temperature for some m < 0, and near
372
+ the m = 0 it also has a local minimum at a finite temperature. In the case
373
+ of FM, we will not get the same effect at h > 0 as for J/V = −1, because it
374
+ makes no sense to split the spin clusters into more than one spin in order to
375
+ minimize the energy. But the entropy is still slightly reduced, because there is
376
+ no ordering chaos for different the spin clusters: they will all be oriented by a
377
+ magnetic field.
378
+ The temperature dependences of the entropy for J/V = 0.5, h = 0 are
379
+ shown Fig. 3 in panel (d), and for J/V = 0.5, h/V = 0.5 in panel (e). The
380
+ 6
381
+
382
+ -0.1
383
+ 0.0
384
+ 0.1
385
+ 0.2
386
+ 0.3
387
+ 0.4
388
+ 0.5
389
+ 0.0
390
+ 0.5
391
+ 1.0
392
+ 1.5
393
+ 2.0
394
+ S
395
+ S
396
+ S
397
+ S
398
+ T/V
399
+ T/V
400
+ T/V
401
+ T/V
402
+ T/V
403
+ T/V
404
+ 0.0
405
+ 0.5
406
+ 1.0
407
+ 1.5
408
+ 2.0
409
+ 0.0
410
+ 0.2
411
+ 0.4
412
+ 0.6
413
+ 0.8
414
+ 1.0
415
+ 0.0
416
+ 0.5
417
+ 1.0
418
+ 1.5
419
+ 2.0
420
+ 0.0
421
+ 0.2
422
+ 0.4
423
+ 0.6
424
+ 0.8
425
+ 1.0
426
+ 0.0
427
+ 0.5
428
+ 1.0
429
+ 1.5
430
+ 2.0
431
+ 0.0
432
+ 0.2
433
+ 0.4
434
+ 0.6
435
+ 0.8
436
+ 1.0
437
+ 0.0
438
+ 0.5
439
+ 1.0
440
+ 1.5
441
+ 2.0
442
+ 0.0
443
+ 0.2
444
+ 0.4
445
+ 0.6
446
+ 0.8
447
+ 1.0
448
+ 0.0
449
+ 0.5
450
+ 1.0
451
+ 1.5
452
+ 2.0
453
+ 0.0
454
+ 0.2
455
+ 0.4
456
+ 0.6
457
+ 0.8
458
+ DS
459
+ DS
460
+ (a)
461
+ (b)
462
+ (c)
463
+ (d)
464
+ (e)
465
+ (f)
466
+ 0.5
467
+ 0.4
468
+ 0.3
469
+ 0.2
470
+ 0.1
471
+ -0.5
472
+ -0.4
473
+ -0.3
474
+ -0.2
475
+ -0.1
476
+ 0.
477
+ 0.
478
+ -0.4
479
+ -0.5
480
+ -0.3
481
+ 0.5
482
+ 0.4
483
+ 0.3
484
+ 0.2
485
+ 0.1
486
+ -0.1
487
+ 0.5
488
+ 0.5
489
+ 0.4
490
+ 0.4
491
+ 0.3
492
+ 0.3
493
+ 0.2
494
+ 0.2
495
+ 0.1
496
+ 0.1
497
+ -0.5
498
+ -0.4
499
+ 0.
500
+ 0.
501
+ -0.3
502
+ -0.2
503
+ -0.1
504
+ -0.2
505
+ -0.5
506
+ -0.1
507
+ -0.2
508
+ -0.3
509
+ -0.4
510
+ 0.
511
+ -0.5
512
+ 0.
513
+ -0.4
514
+ -0.3
515
+ -0.2
516
+ -0.1
517
+ 0.1
518
+ 0.2
519
+ 0.3
520
+ 0.4
521
+ 0.5
522
+ -0.1
523
+ -0.2
524
+ -0.3
525
+ -0.4
526
+ -0.5
527
+ 0.1
528
+ 0.2
529
+ 0.3
530
+ 0.4 0.5
531
+ Figure 2: (color online) Temperature dependences of the entropy S and the magnetic entropy
532
+ change ∆S in the AFM case (J < 0). Panels (a), (b), and (c) correspond to J/V = −1;
533
+ (d), (e), (f) – to J/V = −0.5. Panels (a) and (d) show the entropy S at h = 0, (b) and (e)
534
+ – at h/V = 0.5, (c) and (f) – the magnetic entropy change ∆S = S(h = 0) − S(h = 0.5).
535
+ The numbers near lines correspond to the deviation of the impurity concentration n from
536
+ half-filling, m = n − 1/2. Solid (dashed) lines correspond to m ≤ 0 (m > 0).
537
+ 7
538
+
539
+ S
540
+ S
541
+ S
542
+ S
543
+ T/V
544
+ T/V
545
+ T/V
546
+ T/V
547
+ T/V
548
+ T/V
549
+ 0.0
550
+ 0.2
551
+ 0.4
552
+ 0.6
553
+ 0.8
554
+ 1.0
555
+ 0.0
556
+ 0.5
557
+ 1.0
558
+ 1.5
559
+ 2.0
560
+ 0.0
561
+ 0.1
562
+ 0.2
563
+ 0.3
564
+ DS
565
+ DS
566
+ 0.0
567
+ 0.5
568
+ 1.0
569
+ 1.5
570
+ 2.0
571
+ 0.0
572
+ 0.1
573
+ 0.2
574
+ 0.3
575
+ 0.4
576
+ 0.0
577
+ 0.5
578
+ 1.0
579
+ 1.5
580
+ 2.0
581
+ 0.0
582
+ 0.5
583
+ 1.0
584
+ 1.5
585
+ 2.0
586
+ 0.0
587
+ 0.2
588
+ 0.4
589
+ 0.6
590
+ 0.8
591
+ 1.0
592
+ 0.0
593
+ 0.5
594
+ 1.0
595
+ 1.5
596
+ 2.0
597
+ 0.0
598
+ 0.2
599
+ 0.4
600
+ 0.6
601
+ 0.8
602
+ 1.0
603
+ 0.0
604
+ 0.5
605
+ 1.0
606
+ 1.5
607
+ 2.0
608
+ 0.0
609
+ 0.2
610
+ 0.4
611
+ 0.6
612
+ 0.8
613
+ 1.0 (d)
614
+ (a)
615
+ (b)
616
+ (c)
617
+ (e)
618
+ (f)
619
+ 0.5
620
+ 0.5
621
+ 0.4
622
+ 0.4
623
+ 0.3
624
+ 0.3
625
+ 0.2
626
+ 0.2
627
+ 0.1
628
+ 0.1
629
+ -0.1
630
+ 0.
631
+ 0.
632
+ -0.5
633
+ -0.5
634
+ -0.4
635
+ -0.4
636
+ -0.3
637
+ -0.3
638
+ -0.2
639
+ -0.2
640
+ -0.1
641
+ 0.5
642
+ 0.5
643
+ 0.4
644
+ 0.4
645
+ 0.3
646
+ 0.3
647
+ -0.5
648
+ -0.5
649
+ -0.4
650
+ -0.4
651
+ -0.3
652
+ -0.3
653
+ 0.
654
+ 0.
655
+ 0.2
656
+ 0.2
657
+ 0.1
658
+ 0.1
659
+ -0.1
660
+ -0.1
661
+ -0.2
662
+ 0.5
663
+ -0.5
664
+ 0.4
665
+ -0.4
666
+ -0.3
667
+ -0.2
668
+ -0.1
669
+ 0.
670
+ 0.3
671
+ 0.2
672
+ 0.1
673
+ -0.5
674
+ -0.4
675
+ -0.3
676
+ 0.
677
+ -0.2
678
+ -0.1
679
+ 0.5
680
+ 0.4
681
+ 0.3
682
+ 0.2
683
+ 0.1
684
+ -0.2
685
+ Figure 3: (color online) Temperature dependences of the entropy S and the magnetic entropy
686
+ change ∆S in the FM case (J > 0). Panels (a), (b), and (c) correspond to J/V = 1; (d),
687
+ (e), (f) – to J/V = 0.5.
688
+ Panels (a) and (d) show the entropy S at h = 0, (b) and (e) –
689
+ at h/V = 0.5, (c) and (f) – the magnetic entropy change ∆S = S(h = 0) − S(h = 0.5).
690
+ The numbers near lines correspond to the deviation of the impurity concentration n from
691
+ half-filling, m = n − 1/2. Solid (dashed) lines correspond to m ≤ 0 (m > 0).
692
+ magnetic entropy change for J/V = 0.5 is shown in panel (f). Qualitatively,
693
+ the behavior of entropy differs from J/V = 1 case at some region near |m| = 0,
694
+ where the tendency to the charge ordering causes the decreasing of S. The ∆S
695
+ dependences also show local maxima at finite temperature in some range for
696
+ m < 0, and a monotonic behavior with maximal value at T = 0 for m ≥ 0. The
697
+ magnetic entropy change for FM case is always positive.
698
+ The concentration dependences of entropy at T/V = 0.05 shown in Fig. 4
699
+ allow estimating approximately the features of the residual entropy S0. The
700
+ dependences of S0 on m have the following form [20]:
701
+ S0 = ln
702
+ �1
703
+ 2 + g0
704
+
705
+ + 1
706
+ 2 ln
707
+ 2
708
+ 1
709
+ 4 − m2 − m ln g0 + m
710
+ g0 − m,
711
+ |J|/V = 1,
712
+ (13)
713
+ S0 = 1
714
+ 2 ln
715
+ 1
716
+ 2 + |m|
717
+ 1
718
+ 2 − |m| + |m| ln
719
+ 1
720
+ 4 − m2
721
+ 8m2
722
+ + 1
723
+ 2 ln 2,
724
+ |J|/V < 1,
725
+ (14)
726
+ where
727
+ g0 =
728
+ 1
729
+
730
+ 2
731
+ �1
732
+ 4 + m2
733
+ �1/2
734
+ .
735
+ (15)
736
+ These expressions depend only on |m| and are identical for the AFM and FM
737
+ cases. The curves of S(h = 0) in Fig. 4(a) and (c), and in Fig. 4(b) and (d)
738
+ 8
739
+
740
+ (d)
741
+ S
742
+ 0.8
743
+ 0.0
744
+ 0.2
745
+ 0.4
746
+ 0.6
747
+ S
748
+ 0.0
749
+ 0.1
750
+ 0.2
751
+ 0.3
752
+ 0.4
753
+ 0.5
754
+ 0.6
755
+ 0.7
756
+ m
757
+ m
758
+ m
759
+ m
760
+ S
761
+ 0.5
762
+ 0.5
763
+ 0.5
764
+ 0.5
765
+ 0.8
766
+ 0.0
767
+ 0.2
768
+ 0.4
769
+ 0.6
770
+ 0.25
771
+ 0.25
772
+ 0.25
773
+ 0.25
774
+ -0.25
775
+ -0.25
776
+ -0.25
777
+ -0.25
778
+ -0.5
779
+ -0.5
780
+ -0.5
781
+ -0.5
782
+ S
783
+ 0.0
784
+ 0.1
785
+ 0.2
786
+ 0.3
787
+ 0.4
788
+ 0.5
789
+ 0.6
790
+ 0.7
791
+ (a)
792
+ (c)
793
+ (b)
794
+ DS
795
+ DS
796
+ DS
797
+ DS
798
+ S(h=0)
799
+ S(h=0)
800
+ S(h=0)
801
+ S(h=0)
802
+ S(h№0)
803
+ S(h№0)
804
+ S(h№0)
805
+ S(h№0)
806
+ 0.0
807
+ 0.0
808
+ 0.0
809
+ 0.0
810
+ Figure 4: (color online) The dependence of the entropy S (solid lines) and the magnetic entropy
811
+ change ∆S (dashed lines) on the deviation of the impurity concentration n from half-filling,
812
+ m = n − 1/2, at T/V = 0.05. Panel (a) corresponds to J/V = −1, (b) – to J/V = −0.5, (c)
813
+ – to J/V = 1, and (d) – to J/V = 0.5.
814
+ confirm this property. For h ̸= 0 the concentration dependences of the residual
815
+ entropy become asymmetric with respect to m = 0 for AFM case, but save
816
+ the symmetry in FM case. The same dependence for the AFM and FM cases
817
+ holds only at m > 0 for |J| < V , when the ground state consists of single spins
818
+ separated by nonmagnetic impurities, and the sign of the exchange constant has
819
+ no effect.
820
+ 3.3. The isentropic dependence of the temperature on the magnetic field.
821
+ Fig. 5 shows the isentropic lines in the h − T parameter plane for the fer-
822
+ romagnetic sign of exchange constant, J > 0.
823
+ For the Ising chain without
824
+ impurities, the isentropes slope near the critical field hc = 0 is almost vertical
825
+ that leads to extremely high and narrow peak of the Gr¨uneisen parameter [23],
826
+ which is proportional to e2J/T at h ∝ T e−2J/T . The impurities change this
827
+ 9
828
+
829
+ h/V
830
+ T/ V
831
+ T/ V
832
+ T/ V
833
+ 0.01
834
+ 0.1
835
+ 0.3
836
+ 0.55
837
+ 0.65
838
+ 0.75
839
+ 0.85
840
+ 0.95
841
+ 0.5
842
+ 0.5
843
+ 0.55
844
+ 0.55
845
+ 0.6
846
+ 0.6
847
+ 0.65
848
+ 0.7
849
+ -3
850
+ 10
851
+ -6
852
+ 10
853
+ -0.4
854
+ -0.2
855
+ 0.0
856
+ 0.2
857
+ 0.4
858
+ 0.1
859
+ 0.3
860
+ 0.5
861
+ 0.7
862
+ 0.1
863
+ 0.3
864
+ 0.5
865
+ 0.7
866
+ 0.1
867
+ 0.3
868
+ 0.5
869
+ 0.7
870
+ n=0
871
+ n=0.25
872
+ n=0.75
873
+ 0.1
874
+ 0.135
875
+ 0.15
876
+ 0.2
877
+ 0.25
878
+ -0.4
879
+ -0.2
880
+ 0.0
881
+ 0.2
882
+ 0.4
883
+ 0.2
884
+ 0.5
885
+ 0.65
886
+ 0.75
887
+ 0.85
888
+ h/V
889
+ 0.1
890
+ 0.3
891
+ 0.5
892
+ 0.7
893
+ T/ V
894
+ 0.1
895
+ 0.3
896
+ 0.5
897
+ 0.7
898
+ T/ V
899
+ 0.1
900
+ 0.3
901
+ 0.5
902
+ 0.7
903
+ T/ V
904
+ -5
905
+ 10
906
+ 0.01
907
+ 0.05
908
+ -8
909
+ 10
910
+ -3
911
+ 10
912
+ n=0
913
+ n=0.03
914
+ n=0.5
915
+ (a)
916
+ (b)
917
+ Figure 5:
918
+ The isentropic lines in the h − T parameter plane (a) for J/V = 1.3 and (b) for
919
+ J/V = 0.5. The value of the impurity concentration n is given in the frame. The numbers
920
+ next to the lines show the entropy values.
921
+ picture drastically: the entropy value increases by several orders of magnitude,
922
+ and the isentropes slope near hc = 0 remains finite.
923
+ The magnetic Gr¨uneisen parameter can be rewritten [24] in the scaling form
924
+ as
925
+ Γmag = −Gr
926
+ 1
927
+ h − hc
928
+ ,
929
+ (16)
930
+ where −Gr is a prefactor, and hc is a critical magnetic field. Fig. 6 shows the
931
+ value −Gr for hc = 0 as a function of T and h for J/V = 1.3, n = 0.03 in
932
+ panel (a), and for J/V = 0.5, n = 0.25 in panel (b). As can be seen, in both
933
+ cases, impurities lead to suppression of the singular behavior of the magnetic
934
+ Gr¨uneisen parameter which is observed for the Ising chain without impurities.
935
+ At low temperatures, in the FR-FM state, the system behaves like an ideal
936
+ paramagnet near h = 0 with a prefactor value −Gr = 1 [24].
937
+ Fig. 7 shows the isentropic lines in the h − T parameter plane for the anti-
938
+ ferromagnetic sign of exchange constant, J < 0. The case of a moderate value
939
+ of the exchange constant, J/V = −1.3, is given in panel (a). In the absence of
940
+ impurities, there is practically no dependence of entropy on the magnetic field.
941
+ Impurities lead to an increase in the entropy of the system by several orders
942
+ of magnitude and the appearance of two critical values of the magnetic field,
943
+ 10
944
+
945
+ (a)
946
+ (b)
947
+ Figure 6: (color online) The prefactor of the Gr¨uneisen parameter −Gr (a) for J/V = 1.3,
948
+ n = 0.03, (b) for J/V = 0.5, n = 0.25.
949
+ |hc| = −J − V , which correspond to the transition lines from AFM to FR-AFM
950
+ or FR-PM states. It is worth to note, that for comparable values of |J| and
951
+ V , the critical field |hc| = −J − V can be much smaller than the spin-flip field
952
+ |hc| = −2J. The case of a small exchange constant, J/V = −0.15, is given
953
+ in panel (b). Without impurities, the system has two critical spin-flip fields,
954
+ |hc| = −2J. Impurities lead to the appearance of a critical field hc = 0. As
955
+ a result, there are three critical fields for a weakly diluted case, and only one
956
+ critical field hc = 0 for a strongly diluted case.
957
+ Fig. 8 shows the prefactor of the magnetic Gr¨uneisen parameter as a function
958
+ of T and h near the corresponding critical fields: for J/V = −1.3, n = 0.25,
959
+ hc/V = −1 − J/V = 0.3 in panel (a), for J/V = −0.15, n = 0.25, hc = 0 in
960
+ panel (b), and for J/V = −0.15, n = 0.25, hc/V = −2J/V = 0.3 in panel (c).
961
+ In all cases, the prefactor tends to −Gr = 1 at sufficiently low temperatures.
962
+ 4. Conclusion
963
+ We examined the effects of the magnetic field on the frustrated phase states
964
+ of the dilute Ising chain.
965
+ The temperature dependences of entropy and the
966
+ magnetic entropy change show the nonequivalence of frustrated phases in AFM
967
+ and FM cases. The largest effect is achieved when |J|/V = 1. In the AFM case,
968
+ J/V = −1, the nonzero magnetic field causes a charge ordering for nonmagnetic
969
+ impurities and leads to the maximal value of the magnetic entropy change at a
970
+ half-filling. In the FM case, J/V = 1, the magnetic field reduces the frustration
971
+ of the ground state only partially. Impurities radically change the magnetic
972
+ Gr¨uneisen parameter in comparison with the case of a pure Ising chain. They
973
+ suppress the singular behavior of Γmag near h = 0 in the FM case and produce
974
+ the paramagnetic behavior in the FR-FM case. In the AFM case, additional
975
+ values of the critical magnetic field for Γmag appear, which are associated with
976
+ the transition line from AFM to frustrated ground state. In the FR-AFM state,
977
+ Γmag exhibits paramagnetic behavior at h = 0.
978
+ 11
979
+
980
+ 0.6
981
+ 0.4
982
+ 0.8
983
+ 0.2
984
+ 0.6
985
+ 0.0
986
+ -0.5
987
+ 0.4 T/ V
988
+ 0.0
989
+ 0.2
990
+ h/V
991
+ 0.51.0
992
+ 0.8
993
+ 0.5
994
+ 0.6
995
+ 0.0
996
+ -0.5
997
+ 0.4
998
+ T/V
999
+ 0.0
1000
+ 0.2
1001
+ h/ V
1002
+ 0.5h/V
1003
+ T/ V
1004
+ T/ V
1005
+ T/ V
1006
+ -0.4
1007
+ -0.2
1008
+ 0.0
1009
+ 0.2
1010
+ 0.4
1011
+ 0.1
1012
+ 0.1
1013
+ 0.1
1014
+ 0.2
1015
+ 0.2
1016
+ 0.2
1017
+ 0.3
1018
+ 0.3
1019
+ 0.3
1020
+ 0.4
1021
+ 0.4
1022
+ 0.4
1023
+ 0.5
1024
+ 0.1
1025
+ 0.2
1026
+ 0.3
1027
+ 0.1
1028
+ 0.2
1029
+ 0.3
1030
+ 0.1
1031
+ 0.2
1032
+ 0.3
1033
+ 0.4
1034
+ 0.4
1035
+ 0.5
1036
+ 0.5
1037
+ 0.5
1038
+ 0.5
1039
+ 0.6
1040
+ 0.6
1041
+ 0.6
1042
+ 0.6
1043
+ 0.7
1044
+ 0.8
1045
+ 0.48
1046
+ 0.48
1047
+ 0.5
1048
+ 0.5
1049
+ 0.55
1050
+ 0.55
1051
+ 0.6
1052
+ 0.6
1053
+ 0.65
1054
+ n=0
1055
+ n=0.25
1056
+ n=0.75
1057
+ h/V
1058
+ T/ V
1059
+ T/ V
1060
+ T/ V
1061
+ -0.4
1062
+ -0.2
1063
+ 0.0
1064
+ 0.2
1065
+ 0.4
1066
+ 0.05
1067
+ 0.05
1068
+ 0.05
1069
+ 0.1
1070
+ 0.1
1071
+ 0.1
1072
+ 0.15
1073
+ 0.15
1074
+ 0.15
1075
+ 0.2
1076
+ 0.2
1077
+ 0.2
1078
+ 0.1
1079
+ 0.3
1080
+ 0.4
1081
+ 0.4
1082
+ 0.4
1083
+ 0.5
1084
+ 0.6
1085
+ 0.1
1086
+ 0.25
1087
+ 0.4
1088
+ 0.5
1089
+ 0.5
1090
+ 0.5
1091
+ 0.6
1092
+ -13
1093
+ 10
1094
+ -10
1095
+ 10
1096
+ -8
1097
+ 10
1098
+ -6
1099
+ 10
1100
+ -5
1101
+ 10
1102
+ n=0
1103
+ n=0.25
1104
+ n=0.75
1105
+ (a)
1106
+ (b)
1107
+ Figure 7:
1108
+ The isentropic lines in the h − T parameter plane (a) for J/V = −1.3 and (b) for
1109
+ J/V = −0.15. The value of the impurity concentration n is given in the frame. The numbers
1110
+ next to the lines show the entropy values.
1111
+ (a)
1112
+ (b)
1113
+ (c)
1114
+ Figure 8: (color online) The prefactor of the Gr¨uneisen parameter −Gr near the critical field
1115
+ (a) for J/V = −1.3, n = 0.25, hc/V = 0.3, (b) for J/V = −0.15, n = 0.25, hc = 0, (c) for
1116
+ J/V = −0.15, n = 0.25, hc = 0.3.
1117
+ 12
1118
+
1119
+ 1.0
1120
+ 0.5
1121
+ 0.20
1122
+ 0.0
1123
+ 0.15
1124
+ 0.0
1125
+ T/V
1126
+ 0.10
1127
+ 0.2
1128
+ h/ V
1129
+ 0.4
1130
+ 0.051.0
1131
+ 0.3
1132
+ 0.5
1133
+ 0.2
1134
+ 0.0
1135
+ T/V
1136
+ -0.1
1137
+ 0.1
1138
+ 0.0
1139
+ h/ V
1140
+ 0.11.0
1141
+ 0.5
1142
+ 0.3
1143
+ 0.0
1144
+ 0.2
1145
+ T/V
1146
+ 0.2
1147
+ 0.1
1148
+ 0.3
1149
+ h/ V
1150
+ 0.4
1151
+ 0.5Acknowledgments
1152
+ This work was supported by the Ministry of Education and Science of the
1153
+ Russian Federation, project FEUZ-2020-0054.
1154
+ References
1155
+ [1] L. ˇCanov´a, J. Streˇcka, M. Jaˇsˇcur, Geometric frustration in the class of ex-
1156
+ actly solvable Ising–Heisenberg diamond chains, Journal of Physics: Con-
1157
+ densed Matter 18 (20) (2006) 4967–4984. doi:10.1088/0953-8984/18/
1158
+ 20/020.
1159
+ [2] J. Torrico, M. Rojas, S. M. de Souza, O. Rojas, N. S. Ananikian, Pair-
1160
+ wise thermal entanglement in the ising-xyz diamond chain structure in an
1161
+ external magnetic field, EPL (Europhysics Letters) 108 (5) (2014) 50007.
1162
+ doi:10.1209/0295-5075/108/50007.
1163
+ [3] J. Streˇcka, Anomalous Thermodynamic Response in the Vicinity of a
1164
+ Pseudo-Transition of a Spin-1/2 Ising Diamond Chain, Acta Physica
1165
+ Polonica A 137 (5) (2020) 610–612. doi:10.12693/APhysPolA.137.610.
1166
+ [4] L. G´alisov´a,
1167
+ J. Streˇcka,
1168
+ Vigorous thermal excitations in a double-
1169
+ tetrahedral chain of localized Ising spins and mobile electrons mimic a
1170
+ temperature-driven first-order phase transition, Physical Review E 91 (2)
1171
+ (2015) 022134. doi:10.1103/PhysRevE.91.022134.
1172
+ [5] O. Rojas, J. Streˇcka, S. de Souza, Thermal entanglement and sharp specific-
1173
+ heat peak in an exactly solved spin-1/2 Ising-Heisenberg ladder with alter-
1174
+ nating Ising and Heisenberg inter–leg couplings, Solid State Communica-
1175
+ tions 246 (2016) 68–75. doi:10.1016/j.ssc.2016.08.002.
1176
+ [6] J. Streˇcka, R. C. Al´ecio, M. L. Lyra, O. Rojas, Spin frustration of a spin-
1177
+ 1/2 Ising–Heisenberg three-leg tube as an indispensable ground for thermal
1178
+ entanglement, Journal of Magnetism and Magnetic Materials 409 (2016)
1179
+ 124–133. doi:10.1016/j.jmmm.2016.02.095.
1180
+ [7] S. de Souza, O. Rojas, Quasi-phases and pseudo-transitions in one-
1181
+ dimensional models with nearest neighbor interactions, Solid State Com-
1182
+ munications 269 (2018) 131–134. doi:10.1016/j.ssc.2017.10.006.
1183
+ [8] Y. Panov, O. Rojas, Unconventional low-temperature features in the one-
1184
+ dimensional frustrated q-state potts model, Physical Review E 103 (6)
1185
+ (2021) 062107. doi:10.1103/PhysRevE.103.062107.
1186
+ [9] O. Rojas, S. M. de Souza, J. Torrico, L. M. Ver´ıssimo, M. S. S. Pereira,
1187
+ M. L. Lyra, Low-temperature pseudo-phase-transition in an extended hub-
1188
+ bard diamond chain, Physical Review E 103 (4) (2021) 042123.
1189
+ doi:
1190
+ 10.1103/PhysRevE.103.042123.
1191
+ 13
1192
+
1193
+ [10] F. Ninio, A simple proof of the Perron-Frobenius theorem for positive sym-
1194
+ metric matrices, Journal of Physics A: Mathematical and General 9 (8)
1195
+ (1976) 1281–1282. doi:10.1088/0305-4470/9/8/017.
1196
+ [11] O. Rojas, A Conjecture on the Relationship Between Critical Residual
1197
+ Entropy and Finite Temperature Pseudo-transitions of One-dimensional
1198
+ Models, Brazilian Journal of Physics 50 (6) (2020) 675–686. doi:10.1007/
1199
+ s13538-020-00773-8.
1200
+ [12] O. Rojas, J. Streˇcka, M. L. Lyra, S. M. de Souza, Universality and qua-
1201
+ sicritical exponents of one-dimensional models displaying a quasitransi-
1202
+ tion at finite temperatures, Physical Review E 99 (4) (2019) 042117.
1203
+ doi:10.1103/PhysRevE.99.042117.
1204
+ [13] M. E. Zhitomirsky, Enhanced magnetocaloric effect in frustrated magnets,
1205
+ Physical Review B 67 (10) (2003) 104421.
1206
+ doi:10.1103/PhysRevB.67.
1207
+ 104421.
1208
+ [14] M. E. Zhitomirsky, A. Honecker, Magnetocaloric effect in one-dimensional
1209
+ antiferromagnets, Journal of Statistical Mechanics:
1210
+ Theory and Ex-
1211
+ periment 2004 (07) (2004) P07012.
1212
+ doi:10.1088/1742-5468/2004/07/
1213
+ P07012.
1214
+ [15] T. L. Hill, Statistical Mechanics: Principles and Selected Applications,
1215
+ Dover, New York, 1956.
1216
+ [16] F. Rys, A. Hintermann, Gittermodell eines ungeordneten Ferromagneten
1217
+ II. Exakte Losung des eindimensionalen Dodells, Helv. Phys. Acta 42 (4)
1218
+ (1969) 608.
1219
+ [17] F. Matsubara, K. Yoshimura, S. Katsura, Magnetic Properties of One-
1220
+ Dimensional Dilute Ising Systems. I, Canadian Journal of Physics 51 (10)
1221
+ (1973) 1053–1063. doi:10.1139/p73-140.
1222
+ [18] Y. Termonia, J. Deltour, Thermodynamic properties of one-dimensional
1223
+ dilute Ising systems with interacting impurities, Journal of Physics C: Solid
1224
+ State Physics 7 (24) (1974) 4441–4451. doi:10.1088/0022-3719/7/24/
1225
+ 007.
1226
+ [19] B. Balagurov, V. Vaks, R. Zaitsev, Statistics of a One-Dimensional Model
1227
+ of a Solid Solution, Sov Phys Solid State 16 (8) (1974) 1498–1502.
1228
+ [20] Y. Panov, Local distributions of the 1D dilute Ising model, Journal of
1229
+ Magnetism and Magnetic Materials 514 (July) (2020) 167224.
1230
+ doi:10.
1231
+ 1016/j.jmmm.2020.167224.
1232
+ [21] F. A. Kassan-ogly,
1233
+ One-dimensional ising model with next-nearest-
1234
+ neighbour interaction in magnetic field, Phase Transitions 74 (4) (2001)
1235
+ 353–365. doi:10.1080/01411590108227581.
1236
+ 14
1237
+
1238
+ [22] A. V. Zarubin, F. A. Kassan-Ogly, A. I. Proshkin, A. E. Shestakov, Frustra-
1239
+ tion Properties of the 1D Ising Model, Journal of Experimental and Theo-
1240
+ retical Physics 128 (5) (2019) 778–807. doi:10.1134/S106377611904006X.
1241
+ [23] G. O. Gomes, L. Squillante, A. C. Seridonio, A. Ney, R. E. Lagos,
1242
+ M. de Souza, Magnetic Gr¨uneisen parameter for model systems, Physical
1243
+ Review B 100 (5) (2019) 054446. doi:10.1103/PhysRevB.100.054446.
1244
+ [24] B. Wolf, A. Honecker, W. Hofstetter, U. Tutsch, M. Lang, Cooling through
1245
+ quantum criticality and many-body effects in condensed matter and cold
1246
+ gases, International Journal of Modern Physics B 28 (26) (2014) 1–35.
1247
+ doi:10.1142/S0217979214300175.
1248
+ 15
1249
+
BtFKT4oBgHgl3EQfXS78/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CNFAT4oBgHgl3EQfsx5b/content/2301.08660v1.pdf ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:27af67c791568940162b8257793e5675179fb69e7418c7739df9b9a401b1b3b6
3
+ size 2004952
CNFAT4oBgHgl3EQfsx5b/content/tmp_files/2301.08660v1.pdf.txt ADDED
@@ -0,0 +1,1189 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ 1
2
+
3
+ A BIG-DATA DRIVEN FRAMEWORK TO ESTIMATING VEHICLE VOLUME BASED
4
+ ON MOBILE DEVICE LOCATION DATA
5
+
6
+ Mofeng Yang1, Weiyu Luo2, Mohammad Ashoori3, Jina Mahmoudi4, Chenfeng Xiong5*, Jiawei
7
+ Lu6, Guangchen Zhao7, Saeed Saleh Namadi8, Songhua Hu9 and Aliakbar Kabiri10
8
+
9
+
10
+ 1. Ph.D. ([email protected])
11
+ 2. Graduate Research Assistant ([email protected])
12
+ 3. Graduate Research Assistant ([email protected])
13
+ 4. Ph.D., P.E., Research Scientist ([email protected])
14
+ 5. Assistant Professor ([email protected]), *Corresponding Author
15
+ 6. Graduate Research Assistant ([email protected])
16
+ 7. Graduate Research Assistant ([email protected])
17
+ 8. Graduate Research Assistant ([email protected])
18
+ 9. Graduate Research Assistant ([email protected])
19
+ 10. Graduate Research Assistant ([email protected])
20
+
21
+
22
+ 1-4, 7-10: Maryland Transportation Institute (MTI), Department of Civil and Environmental
23
+ Engineering, 1173 Glenn Martin Hall, University of Maryland, College Park MD 20742, USA.
24
+ 5: Department of Civil and Environmental Engineering, College of Engineering, Villanova
25
+ University, Villanova, PA 19085, USA
26
+ 6. School of Sustainable Engineering and the Built Environment, Arizona State University, Tempe,
27
+ AZ 85281, USA
28
+
29
+
30
+ Words Count: 4,623 + 2 Tables (250*2) = 5,123
31
+
32
+ Submission Date: 07/31/2022
33
+
34
+
35
+
36
+
37
+ 2
38
+
39
+ ABSTRACT
40
+
41
+ Vehicle volume serves as a critical metric and the fundamental basis for traffic signal control,
42
+ transportation project prioritization, road maintenance plans and more. Traditional methods of
43
+ quantifying vehicle volume rely on manual counting, video cameras, and loop detectors at a limited
44
+ number of locations. These efforts require significant labor and cost for expansions. Researchers
45
+ and private sector companies have also explored alternative solutions such as probe vehicle data,
46
+ while still suffering from a low penetration rate. In recent years, along with the technological
47
+ advancement in mobile sensors and mobile networks, Mobile Device Location Data (MDLD) have
48
+ been growing dramatically in terms of the spatiotemporal coverage of the population and its
49
+ mobility. This paper presents a big-data driven framework that can ingest terabytes of MDLD and
50
+ estimate vehicle volume at a larger geographical area with a larger sample size. The proposed
51
+ framework first employs a series of cloud-based computational algorithms to extract multimodal
52
+ trajectories and trip rosters. A scalable map matching and routing algorithm is then applied to snap
53
+ and route vehicle trajectories to the roadway network. The observed vehicle counts on each
54
+ roadway segment are weighted and calibrated against ground truth control totals, i.e., Annual
55
+ Vehicle-Miles of Travel (AVMT), and Annual Average Daily Traffic (AADT). The proposed
56
+ framework is implemented on the all-street network in the state of Maryland using MDLD for the
57
+ entire year of 2019. Results indicate that our proposed framework produces reliable vehicle
58
+ volume estimates and also demonstrate its transferability and the generalization ability.
59
+
60
+ Keywords: mobile device location data; big data analytics; vehicle volume; cloud computing; map
61
+ matching and routing.
62
+
63
+
64
+
65
+
66
+
67
+ 3
68
+
69
+ 1. INTRODUCTION
70
+
71
+ Vehicle volume measures the amount of traffic traveling through a roadway segment given a
72
+ specific period of time. It serves as a critical metric and the fundamental basis for various
73
+ transportation applications including traffic signal control, transportation project prioritization and
74
+ road maintenance plan. Traditional methods to quantify vehicle volume rely on manual counting,
75
+ video cameras, and loop detectors at a limited number of locations, a practice that requires
76
+ significant human labor and a high cost for expansions (1-5). Researchers and private sector
77
+ companies have also explored alternative solutions such as probe vehicle data, while still suffering
78
+ from the low penetration rate issue (6-10).
79
+
80
+ In the past two decades, along with the technological advancement in mobile sensors and mobile
81
+ networks, mobile device location data (MDLD) have been growing dramatically in terms of
82
+ coverage and size, with broader spatiotemporal coverage of the population and its mobility. A
83
+ series of research studies have demonstrated the usefulness of MDLD for enhancing the traditional
84
+ travel survey and have revealed its potential to substitute surveys (11, 12). At the same time,
85
+ obtaining travel statistics solely based on MDLD is also worth investigating to reduce human labor
86
+ and cost. However, MDLD do not include any ground truth information such as trip origins and
87
+ destinations, travel modes, and trip purposes, which requires computational algorithms to be
88
+ developed and validated against the existing travel surveys. More importantly, unlike travel
89
+ surveys which collect information from representative samples to obtain population-representative
90
+ statistics, MDLD contain all available mobile devices with uneven data quality.
91
+
92
+ This study was conducted as part of the Vulnerable Road User Density Exposure Dashboard
93
+ project (https://mti.umd.edu/sdi) - an interactive dashboard that utilizes MDLD to provide data
94
+ and insights on multimodal volume and safety risk exposure of vulnerable road users (e.g.,
95
+ pedestrians, bicycles) at intersections and roadway segments within Maryland. In this study, we
96
+ present a big-data driven framework that ingests terabytes of MDLD and estimates vehicle volume
97
+ for all roadway segments. First, a series of cloud-based computational algorithms are applied—
98
+ including but not limited to—a trip and tour identification algorithm to mine travel behavior
99
+ information and a travel mode imputation model that impute multimodal trajectories from MDLD.
100
+ A map matching and routing algorithm is then applied to snap and route vehicle trajectories to the
101
+ roadway network. The observed vehicle counts on each roadway segment are weighted to match
102
+ the Annual Vehicle Miles of Travel (AVMT) by county, urban/rural status, and functional classes.
103
+ Further, a random forest regression model is used to calibrate the weighted vehicle volume against
104
+ the Annual Average Daily Traffic (AADT) acquired from loop detectors. The proposed framework
105
+ is implemented on the all-street network in the state of Maryland using MDLD data for the entire
106
+ year of 2019.
107
+
108
+ 2. LITERATURE REVIEW
109
+
110
+ 2.1. Application of Mobile Device Location Data in Transportation Research
111
+
112
+ The appearance of MDLD in the transportation industry started in the 1990s. Since the mid-1990s,
113
+ researchers began installing Global Positioning System (GPS) data loggers in vehicles to
114
+ supplement travel surveys (13-15). With high-frequency in-vehicle GPS data, this approach can
115
+
116
+ 4
117
+
118
+ significantly improve the accuracy of travel surveys by recording the exact origin and destination
119
+ as well as the departure and arrival times. However, only a small number of vehicles can be
120
+ sampled with this technique, a drawback limiting its capability. Similarly, the wearable GPS,
121
+ which was introduced in the early 2000s, allowed respondents to report non-vehicle travel modes
122
+ while still suffering from small sample size issues (16, 17). In the past decade, private sector
123
+ entities such as INRIX and RITIS also started to incorporate the probe vehicle data into their
124
+ commercial products (18-21). Nonetheless, the low penetration rate (i.e., 2%-10%) of the
125
+ commercial probe vehicle data remains the core challenge with respect to drawing the whole
126
+ picture of travel patterns.
127
+
128
+ As mentioned above, despite having high precision, traditional MDLD usually suffer from small-
129
+ sample-size issues, which significantly limits the usefulness of the data. Since mobile devices,
130
+ such as smartphones and tablets, have become more popular, MDLD generated from these devices
131
+ have a greater potential for being used in transportation applications. These new types of MDLD,
132
+ namely cellular data and Location-Based Service (LBS) data, offer a more extensive
133
+ spatiotemporal coverage and a larger sample size. The cellular data are generated through
134
+ communication between cellphones and cell towers (22) and can be further categorized into Call
135
+ Detail Record (CDR) and sightings (11). The CDR data can only capture the cell tower location,
136
+ whereas the sightings provide the exact latitude and longitude values. Both types of cellular data
137
+ have been widely applied to research topics such as travel behavior, human mobility, and social
138
+ networks in the past two decades (23-31). Despite the large volume of data, cellular data are limited
139
+ by their spatial and temporal resolution, which is determined by the density of cell towers and
140
+ users’ cellphone usage levels (32). On a positive note, however, cellular data require less advanced
141
+ phones and can raise fewer user privacy concerns. The LBS data provide the exact locations
142
+ generated when a mobile application updates the device’s location with the most accurate sources,
143
+ based on the existing location sensors such as Wi-Fi, Bluetooth, cellular tower, and GPS (11, 23-
144
+ 25, 33, 34). Many applications have been developed using the LBS data. For instance, a recent
145
+ smartphone-enhanced travel survey conducted in the U.S. used a mobile application, rMove
146
+ developed by Resource Systems Group (RSG), to collect high-frequency location data and allow
147
+ the respondents to recall their trips by showing the trajectories in rMove (35-38). Additionally,
148
+ Airsage leveraged LBS data to develop a traffic platform that can estimate traffic flow, speed,
149
+ congestion and road user sociodemographic for every road and time of day (39). Further, the
150
+ Maryland Transportation Institute (MTI) at the University of Maryland (UMD) developed the
151
+ COVID-19 Impact Analysis Platform (https://data.covid.umd.edu) to provide insight on COVID-
152
+ 19’s impact on mobility, health, economy, and society across the U.S. (40-43).
153
+
154
+ 2.2. Vehicle Volume Estimation Methods
155
+
156
+ 2.2.1. Estimating Vehicle Volume with Loop Detectors
157
+
158
+ Loop detectors are widely used to record traffic volumes and occupancy levels. These sensors are
159
+ usually buried under the pavements to detect the induction change from the presence of a vehicle.
160
+ Kwon et al. 2003 developed an algorithm using data from single loop detectors to estimate truck
161
+ traffic volumes (1). The results showed a 5.7% error compared with the ground truth highway data.
162
+ Loop detector data were also applied together with probe vehicle data to estimate queue length (44)
163
+ and vehicle volume at a city-wide scale (45). Although proven to be efficient in estimating vehicle
164
+
165
+ 5
166
+
167
+ volume, the high installation and maintenance cost of loop detectors limit their capability of being
168
+ scaled up to cover the entire transportation network. Therefore, loop detector datasets are often
169
+ incomplete and mostly unavailable at minor arterials and local streets.
170
+
171
+ 2.2.2. Estimating Vehicle Volume with Probe Vehicle Data
172
+
173
+ In the past two decades, MDLD have gained significant attention and have been utilized for
174
+ estimating various traffic characteristics including vehicle volume. With the development of
175
+ MDLD, estimating vehicle volume at the city scale became a reality. Probe vehicles can record
176
+ their trajectory data with high granularity (i.e., 1Hz). Based on the trajectory data obtained from
177
+ probe vehicles, a wide range of methods can be used by researchers to solve transportation
178
+ problems. Zhao et al. proposed novel methods to estimate queue length and vehicle volume based
179
+ on the probability theory without prior information about the penetration rate or queue length
180
+ distribution (6). Guo et al. estimated vehicle volume and queue length at signalized intersections
181
+ and proposed a new framework to optimize traffic signal control operations (7). Sekuła et al.
182
+ applied several machine learning and neural networks to estimate historical hourly vehicle volume
183
+ between sparsely located sensors based on the probe vehicle data (8). Shockwave theories were
184
+ also applied to probe vehicle data by a few studies (9, 10).
185
+
186
+ 2.2.3. Estimating Vehicle Volume with Mobile Device Location Data
187
+ Many studies have been conducted focusing on estimating traffic flow and detecting congestion
188
+ using cellular data (46, 47). Xing et al. 2019 utilized CDR with Time Difference of Arrival (TDOA)
189
+ positioning technique in order to estimate multimodal traffic volumes on different types of urban
190
+ roadways by identifying three modes of travel – namely, drive alone, carpooling, and bus (48).
191
+ The results showed that compared with the ground truth vehicle volume obtained from License
192
+ Plate Recognition (LPR) cameras, the mean relative error was in the range of 17.1% to 25.7%,
193
+ depending on the roadway type. Despite significant advances in positioning techniques, cellular
194
+ data still suffers from low accuracy issues, whereas LBS data have a noticeable advantage due to
195
+ utilizing different sources to accurately locate the user – a feature that has resulted in an increased
196
+ usage of this type of data by researchers and the private sector for estimating vehicle volume. Fan
197
+ et al. 2019 developed a computing framework alongside a heuristic map matching algorithm to
198
+ estimate Vehicle Miles of Travel (VMT) and AADT for the state of Maryland using INRIX data.
199
+ The results showed an R2 of 0.878 when fitting the estimated AADT with the ground truth AADT
200
+ (49). Moreover, a number of state agencies conducted rigorous evaluations of vehicle volume
201
+ obtained through traditional methods as well as from MDLD obtained by private sector companies.
202
+ They found the latter to be a promising source for supplementing current surveys and traditional
203
+ methods (50).
204
+ 3. THE BIG-DATA DRIVEN VEHICLE VOLUME ESTIMATION FRAMEWORK
205
+
206
+ 3.1. Overview of the Framework
207
+
208
+ In this study, we propose a big-data driven vehicle volume estimation framework, which offers the
209
+ capability of efficiently estimating vehicle volume ingested from terabytes of MDLD. Figure 1
210
+ shows the proposed framework. The proposed framework is built on Amazon Web Services
211
+ (AWS). MDLD and all supporting data are stored in Simple Cloud Storage (S3). All algorithms
212
+
213
+ 6
214
+
215
+ are developed based on Apache Spark, which uses Resilient Distributed Datasets (RDD), and are
216
+ coded in PySpark using the Elastic MapReduce (EMR) services. In the cloud environment, MDLD
217
+ are spliced into RDDs given the number of executors (43, 49). At the same time, all external data
218
+ sources (i.e., K-D Tree, network, routing engine) are broadcasted into all executors for master and
219
+ core nodes. The same algorithms are applied to each RDD along with the broadcasted variables,
220
+ and the results are aggregated and outputted into S3.
221
+
222
+
223
+ Figure 1. The Big-Data Driven Vehicle Volume Estimation Framework
224
+
225
+ 3.2. Trip End Identification and Travel Mode Imputation
226
+
227
+ Trip is the basic unit of analysis for almost all transportation applications. However, MDLD
228
+ usually do not contain any trip-related information. Therefore, in this study, a trip end
229
+ identification algorithm is used to extract trip-level information from the MDLD, including trip
230
+ start location, trip end location, departure time, and arrival time. Then, a travel mode imputation
231
+ model is further applied to infer four travel modes–namely, the air, drive, rail, and nonmotorized
232
+ modes based on heuristic rules and a random forest model. Detailed descriptions of the trip end
233
+ identification algorithm and the travel mode imputation model can be found in the following
234
+ references (12, 51).
235
+
236
+ 3.3. Map Matching and Routing
237
+
238
+ To ensure flexibility and scalability of our map matching and routing method across the entire
239
+ U.S., we extract the drivable network from OpenStreetMap (OSM) using the latest open-source
240
+ Python package osm2gmns. The osm2gmns package can parse roadway network data from OSM
241
+ and output networks to csv files in the General Modeling Network Specification (GMNS) format.
242
+ It provides customized and practical functions to facilitate traffic modeling. Functions include
243
+ complex intersection consolidation, movement generation, traffic zone creation, short link
244
+
245
+ Cloud Computing
246
+ aws
247
+ Data Source
248
+ Local Server Backup
249
+ MobileDevice
250
+ 5
251
+ DATA
252
+ Location Data
253
+ S3Online Bucket
254
+ Geospatial Maps
255
+ spark
256
+ Smart Location
257
+ AnnualAverage
258
+ Database
259
+ DailyTraffic
260
+ Amazon EMR
261
+ AmazonEC2
262
+ DailyUpdate:1176.52to3401.80million
263
+ Annual VehicleMiles
264
+ OpenStreetMap
265
+ PySpark
266
+ points; 15.05 to 17.36 million devices.
267
+ ofTravel
268
+ Computation
269
+ Roadway Network
270
+ osm2gmns
271
+ WeightingandCalibration
272
+ ALGORITHM
273
+ Algorithms
274
+ 1.Network parsing
275
+ RandomForestModel
276
+ Data Preprocessing
277
+ 2. Missing value
278
+ 3.ScalableacrossU.S.
279
+ 8
280
+ TripEnd Identification
281
+ County
282
+ networkx
283
+ Urban/Rural Status
284
+ Travel ModeImputation
285
+ 1.Routing engine
286
+ #ofLanes,Speed Limit
287
+ MapMatchingandRouting
288
+ 2. Short path algorithm
289
+ Weighting and Calibration
290
+ Built Environments
291
+ APPLICATION
292
+ VulnerableUserExposureRiskDashboard
293
+ Decision Support
294
+ Mobility Tracking
295
+ Safety Improvement7
296
+
297
+ combination, and network visualization. More details about osm2gmns can be found here:
298
+ https://osm2gmns.readthedocs.io/en/latest/
299
+
300
+ To match each location sighting to our OSM network, the OSM network is firstly parsed and
301
+ converted into the routable formats, where roadway segments are represented by links and nodes.
302
+ With the network topology, we use the networkX package to build a shortest path-based routing
303
+ engine. We then transform the latitude and longitude of the start node and end node for each link
304
+ to the plane coordinate (in meters), and then calculate link direction (degree) using the arctan value
305
+ between the two nodes (see Figure 3 for details). The travel direction between consecutive
306
+ sightings is also calculated. Similar to the method for link direction calculation, the coordinates of
307
+ each sighting are converted to plane coordinates, then the degree is calculated using the arctan
308
+ value between consecutive sightings. A spatial index structure, K-Dimensional Tree (K-D Tree),
309
+ is built using the link geometric nodes (i.e., link nodes). Then, for each sighting, we search all link
310
+ nodes that are within 100 meters. The 100-meter threshold is selected to balance the algorithm
311
+ efficacy and the computing speed. If we increase the value, more candidate links will be considered
312
+ but this will require more computing resources. If we decrease the value, we might not be able to
313
+ find a candidate link when the observation is sparse. To validate, we calculate the distance between
314
+ consecutive link nodes using the Maryland OSM network as an example. Results indicate that
315
+ more than 95% of the link nodes are within 100 meters of their neighbors, as shown in Figure 2.
316
+ Therefore, using the 100-meter value as the radius for searching candidate nodes is reasonable.
317
+
318
+
319
+ Figure 2. Distribution of Distance between Link Nodes in the OSM Network
320
+
321
+ As the next step, for each sighting, we compare its travel direction to all candidate links. The
322
+ closest link with an absolute travel direction difference smaller than 30 degrees will be selected as
323
+ a valid matched link for the sighting. This 30-degree threshold is selected mainly to avoid the
324
+ sighting being matched to the link in the opposite direction. In common cases, the degree
325
+ difference between the travel direction and the link direction should be approximately 0. Here, we
326
+ use a 30-degree threshold to consider the uncertainty of location accuracy in MDLD. After the
327
+ matched link for each sighting is found, given the observed link sequence, the routing engine can
328
+ fill the gap between consecutively observed links and retrieve the complete route. Another layer
329
+ of reasonable checks is conducted at the routing stage. For each pair of consecutive sightings that
330
+
331
+ Distribution of Distance between Link Nodes
332
+ 40%
333
+ 35%
334
+ 30%
335
+ 25%
336
+ 20%
337
+ 15%
338
+ 10%
339
+ 5%
340
+ 0%8
341
+
342
+ are snapped to links, the routed distance is calculated by summing the link length of all the links
343
+ traveled between the two sightings. Two reasonableness checks are carried out:
344
+
345
+ (1) If the routed distance is greater than the cumulative distance between the two sightings
346
+ snapped to links by 2,000 meters or more, we consider the route invalid.
347
+ (2) The travel time on these links will be calculated based on the timestamp difference between
348
+ the two sightings. With the routed distance and travel time, the average travel speed on
349
+ these links can be calculated. If the speed exceeds 50 m/s (i.e., 112 mph or 180 km/h), we
350
+ assume that one of the two sightings is matched to the wrong link.
351
+
352
+ If either of these two violations is observed, we apply a trial-and-error process by removing the
353
+ latter sighting and performing the routing using the next sighting snapped to the network until it
354
+ does not violate the 2,000-meter threshold or the 50 m/s threshold (52). A simple example of the
355
+ map matching and routing method is illustrated in Figure 3.
356
+
357
+
358
+ Figure 3. Example of Map Matching and Routing.
359
+
360
+ 3.4. Weighting
361
+
362
+ After map matching and routing, we collect routes for all vehicle trips and aggregate them by links
363
+ to obtain the observed vehicle volume for each link. Afterward, we develop a link-based weighting
364
+ method to match the AVMT in the region. We classify each link by county, urban/rural status, and
365
+ functional classes and calculate the link weight using the formula below:
366
+
367
+ 𝑤𝐶,𝑢,𝑓 = 𝐴𝑉𝑀𝑇𝐶,𝑢,𝑓
368
+
369
+ 𝑂𝐶,𝑢,𝑓,𝑖
370
+ 𝑁𝐶
371
+
372
+
373
+ where 𝑤𝐶,𝑢,𝑓 represents the weight for links in county C, with urban/rural status of u, and with
374
+ functional class f; 𝐴𝑉𝑀𝑇𝑐,𝑢,𝑓 represent the AVMT; and 𝑂𝐶,𝑢,𝑓,𝑖 represents the observed vehicle
375
+ volume on link i; 𝑁𝐶 represents the total number of links in county C. For instance, if the study
376
+ area has 20 counties, 2 urban/rural status and 6 functional classes, then a total of 240 link-based
377
+
378
+ >TravelDirection
379
+ o Link Centroid
380
+ Observation
381
+ Node
382
+ Matched Link
383
+ Degree
384
+ CandidateLink
385
+ Routed Link9
386
+
387
+ weights will be generated. Subsequently, the weighted vehicle volume for each link can be
388
+ calculated as:
389
+
390
+ 𝑉𝑐,𝑢,𝑓,𝑖 = 𝑤𝐶,𝑢,𝑓 × 𝑂𝑐,𝑢,𝑓,𝑖
391
+
392
+ where 𝑉𝑐,𝑢,𝑓,𝑖 represents the weighted vehicle volume on link i.
393
+
394
+ 3.5. Volume Calibration
395
+
396
+ The weighted vehicle volume is further calibrated to match the ground truth AADT collected from
397
+ loop detectors at a limited number of locations. In this study, we use the random forest regression
398
+ to calibrate the weighted vehicle volume against the AADT to obtain the final vehicle volume.
399
+ During the calibration process, a 10-fold cross-validation (CV) process is used to fine-tune the
400
+ random forest regression hyperparameters with 90% training data. The fine-tuned models are then
401
+ applied to the 10% testing data.
402
+
403
+ 4. CASE STUDY: THE STATE OF MARYLAND
404
+
405
+ 4.1. Data
406
+
407
+ 4.1.1. Mobile Device Location Data and the Study Area
408
+
409
+ This study used MDLD data obtained from Maryland Transportation Institute (MTI). MTI
410
+ integrated and cleaned the raw MDLD from multiple data vendors and built a national MDLD data
411
+ panel that consists of more than 270,000,000 Monthly Active Users (MAU) and represents
412
+ movements across the nation. (40-43, 51). Figure 4 shows the density of location sightings
413
+ covering locations within and outside of the boundaries of the state of Maryland. In this study, we
414
+ used all MDLD data that are observed in the state of Maryland for the entire year of 2019. The
415
+ MDLD is processed on a daily basis and the results are aggregated to produce an annual total result.
416
+
417
+
418
+ Figure 4. Mobile Device Location Data around the State of Maryland.
419
+
420
+
421
+ 10
422
+
423
+ 4.1.2. OpenStreetMap Network
424
+
425
+ Using the osm2gmns package, we extracted a total of 634,516 drivable roadway segments within
426
+ the state of Maryland. Information about the number of lanes and speed limits was recorded for
427
+ only 111,835 roadway segments (17.6%) and 84,728 roadway segments (13.4%), respectively. As
428
+ shown on the left-hand side in Figure 5, the missing values for the number of lanes and speed
429
+ limits were estimated based on the corresponding values on nearby roadways in the same county,
430
+ and with the same urban/rural status, and road functional classes. These two variables are further
431
+ used as features in the vehicle volume calibration model.
432
+
433
+
434
+ Figure 5. Number of Lanes and Speed Limits in OSM
435
+
436
+ 4.1.3. Annual Vehicle Miles of Travel Data
437
+
438
+ We use the vehicle miles traveled data from the Maryland Department of Transportation State
439
+ Highway Administration (MDOT SHA) as a control total number to weight observed vehicle
440
+ volume. Every year, MDOT SHA publishes an annual vehicle miles of travel (AVMT) report by
441
+ county and functional classification for the state, county, and municipal highway systems. This
442
+ AVMT report features the current FHWA Functional Classification Codes (1-7) and provides
443
+ additional classifications (i.e., Urban, Rural, Principal Arterial and Other Freeways and
444
+ Expressways, and Minor Collector). As discussed in the methodology section, the weights are
445
+ generated based on county, urban/rural status and functional classes. Here, 23 Maryland counties
446
+ plus Baltimore City, urban or rural, and two function classes (highway and non-highway) are
447
+ considered. We map the OSM link type to the FHWA Functional Classification Codes and
448
+ generated the highway and non-highway classes. More specifically, “motorway”, “trunk” and
449
+ “ramp” are classified as highway (i.e., 1, 2 in FHWA class), and the other types are classified as
450
+ non-highway (i.e., 3,4,5,6,7 in FHWA class). More details about the AVMT data can be found
451
+ here: https://www.roads.maryland.gov/mdotsha/Pages/index.aspx?PageId=302
452
+
453
+
454
+ EstimatedNumberof
455
+ Lanes (lane)
456
+ 1Lane
457
+ 2Lanes
458
+ 3or4Lanes
459
+ 5or6Lanes
460
+ Morethan6Lanes
461
+ (a)
462
+ (b)
463
+ EstimatedSpeedLimits
464
+ (mph)
465
+ 5-15
466
+ 15-25
467
+ 25-45
468
+ 45-60
469
+ 60-70
470
+ (c)
471
+ (d)11
472
+
473
+ 4.1.4. Annual Average Daily Traffic Data
474
+
475
+ We use the AADT also from MDOT SHA to calibrate weighted vehicle volume against the ground
476
+ truth at a limited number of locations. The AADT data consists of linear and point geometric
477
+ features which represent the geographic locations and segments of roadway throughout the state
478
+ of Maryland that include traffic volume metrics such as AADT. More details about the AADT can
479
+ be found here:https://data.imap.maryland.gov/maps/77010abe7558425997b4fcdab02e2b64/about
480
+
481
+ 4.1.5. Smart Location Database and Features for Volume Calibration
482
+
483
+ The Smart Location Database (SLD) is a nationwide geographic data resource for measuring
484
+ location efficiency. The SLD is produced by the U.S. Environmental Protection Agency (EPA)’s
485
+ Smart Growth Program. It provides more than 90 variables on land use and built environment
486
+ characteristics such as population and employment densities, land use diversity, urban design
487
+ attributes, destination accessibility, transit accessibility, and socioeconomic/sociodemographic
488
+ characteristics at the census block group level. Most attributes are available for every census block
489
+ group in the United States. In this study, we use SLD variables as features in the random forest
490
+ regression to calibrate weighted vehicle volume to account for the effects of the built environment.
491
+ The SLD variables used in this study include “TotEMP”, “Pct_AO0”, “D1A”, “D1C”, “D3AAO”,
492
+ “D3B”, and “D5AR”:
493
+ • TotEMP = total employment;
494
+ • Pct_AO0 = percent of zero-car households;
495
+ • D1A = gross residential density (housing units per acre) on unprotected land;
496
+ • D1C = gross employment density (jobs per acre) on unprotected land;
497
+ • D3AAO = network density in terms of facility miles of auto-oriented links per square
498
+ miles;
499
+ • D3B = street intersection density (weighted, auto-oriented intersections eliminated);
500
+ • D5AR = jobs within 45 minutes auto travel time, time decay (network travel time)
501
+ weighted
502
+ We also include urban/rural status, county code, link type, number of lanes, and speed limits as
503
+ features in the calibration process.
504
+
505
+ 4.2. Results
506
+
507
+ 4.2.1. Overall Comparison
508
+
509
+ Figure 6 shows the weighting and calibration results for both training and testing sets. The blue
510
+ dots represent weighted volume comparisons and the green dots represent calibrated vehicle
511
+ volume comparisons with MDOT SHA AADT. Figure 6 (a) and (b) compares the weighted vehicle
512
+ volume and calibrated vehicle volume with the MDOT SHA AADT in the training set respectively;
513
+ Figure 6 (c) and (d) compares the weighted vehicle volume and calibrated vehicle volume with the
514
+ MDOT SHA AADT in the testing set respectively. As it can be seen from Figure 6 (a), for the
515
+ training set, the Pearson correlation value and the Root Mean Square Error (RMSE) between the
516
+ weighted vehicle volume and the ground truth AADT are 0.746 and 7,912, respectively. These
517
+ values are improved to 0.966 and 2,996 after calibration, as shown in Figure 6 (b). Similarly, for
518
+
519
+ 12
520
+
521
+ the testing set, the Pearson correlation and RMSE are improved from 0.764 and 7,548, to 0.854
522
+ and 5,701 respectively after calibration.
523
+
524
+
525
+ Figure 6. (a) Weighted Vehicle Volume in Training Set; (b) Calibrated Vehicle Volume in Training Set;
526
+ (c) Weighted Vehicle Volume in Testing Set; (d) Calibrated Vehicle Volume in Testing Set.
527
+
528
+ 4.2.2. Vehicle Volume Validation by Link Types and Urban/Rural Status
529
+
530
+ Figure 7 and Table 1 show the calibrated vehicle volume by link types for both the training and
531
+ testing sets. For all link types, a good correlation (i.e., over 0.80) can be observed between the
532
+ calibrated vehicle volume and the ground truth AADT, except for Local Roads and Highway
533
+ Ramps in the testing set. The results indicate that our proposed framework can accurately estimate
534
+ vehicle volume on higher-level roadways (i.e., Interstate Highways and Highways, Primary Roads,
535
+ Secondary Roads), while concurrently maintaining high correlations for lower-level roadways (i.e.,
536
+ Tertiary Roads, Local Roads, Highway Ramps). The relatively weaker performance for the case
537
+ of lower-level roadways can be attributed to limitations in technology. The MDLD only capture
538
+ part of the daily trips of a device within the area with mobile network connections and higher-level
539
+ roadways usually have a better coverage compared to lower-level ones. This variability might also
540
+ result in capturing more travelers on highways and major arterials. In addition, the LBS data
541
+ sample is more likely to include the active travelers that make more trips and/or longer-duration
542
+
543
+ 140000
544
+ 140000
545
+ Corr.=0.746
546
+ MDOT SHA AADT (veh/day)
547
+ Corr.=0.966
548
+ 120000
549
+ RMSE=7912
550
+ 120000
551
+ RMSE=2996
552
+ 100000
553
+ 100000
554
+ 80000
555
+ 80000
556
+ .
557
+ 60000
558
+ 60000
559
+ 40000
560
+ :
561
+ 40000
562
+ 20000
563
+ 20000
564
+ 0
565
+ 0
566
+ 0
567
+ 20000
568
+ 40000
569
+ 60000
570
+ 80000100000120000
571
+ 140000
572
+ 0
573
+ 20000
574
+ 40000
575
+ 60000
576
+ 80000100000120000
577
+ 140000
578
+ WeightedVehicleVolume(veh/day)
579
+ CalibratedVehicleVolume (veh/day)
580
+ 140000
581
+ 140000
582
+ Corr.= 0.764
583
+ (veh/day)
584
+ Corr.=0.854
585
+ MDOT SHA AADT (veh/day)
586
+ 120000
587
+ RMSE=7548
588
+ 120000
589
+ RMSE=5701
590
+ 100000
591
+ 100000
592
+ MDOT SHA AADT
593
+ 80000
594
+ 80000
595
+ 60000
596
+ 60000
597
+ 40000
598
+ 40000
599
+ 20000
600
+ 20000
601
+ 0
602
+ 0
603
+ 0
604
+ 20000
605
+ 40000
606
+ 60000
607
+ 80000
608
+ 100000120000140000
609
+ 0
610
+ 20000
611
+ 40000
612
+ 60000
613
+ 80000
614
+ 100000
615
+ 120000
616
+ 140000
617
+ Weighted Vehicle Volume (veh/day)
618
+ CalibratedVehicleVolume(veh/day)13
619
+
620
+ trips, such as long-distance travel for leisure or business purposes or long-distance commute which
621
+ usually happen on interstate highways.
622
+
623
+
624
+ Figure 7. Volume Calibration Results Comparison by Link Type.
625
+
626
+ Figure 8 and Table 2 show the calibration of vehicle volume by urban/rural status for both the
627
+ training and testing sets. In summary, for both urban and rural roads, a good correlation (i.e., over
628
+
629
+ 100000
630
+ 100000
631
+ 100000
632
+ 100000
633
+ 50000
634
+ 50000
635
+ 50000
636
+ 50000
637
+ +0
638
+ -0
639
+ 50000100000
640
+ 0
641
+ 50000100000
642
+ 0
643
+ 50000100000
644
+ 0
645
+ 50000100000
646
+ Ro
647
+ Road
648
+ 60000
649
+ 60000
650
+ 60000
651
+ 60000
652
+ 40000
653
+ 40000
654
+ 40000
655
+ 40000
656
+ 20000
657
+ 20000
658
+ 20000
659
+ 20000
660
+ 0
661
+ 0-
662
+ 0
663
+ 0-
664
+ 0
665
+ 2500050000
666
+ 0
667
+ 2500050000
668
+ 0
669
+ 2500050000
670
+ 0
671
+ 2500050000
672
+ yR
673
+ Roa
674
+ 40000
675
+ 40000
676
+ 40000
677
+ 40000
678
+ (veh/day)
679
+ (veh/day)
680
+ 20000
681
+ 20000
682
+ 20000
683
+ 20000
684
+ 1
685
+ 0
686
+ 20000 40000
687
+ 2000040000
688
+ 2000040000
689
+ 0
690
+ 2000040000
691
+ MDOT SHA AADT
692
+ AADT
693
+ Ro
694
+ load
695
+ SHA
696
+ 60000
697
+ 60000
698
+ 60000
699
+ 60000
700
+ 40000
701
+ 40000
702
+ MDOT :
703
+ 40000
704
+ 40000
705
+ 20000
706
+ 20000
707
+ 20000
708
+ 20000
709
+ 0.
710
+ 0
711
+ 50000
712
+ 0
713
+ 50000
714
+ 0
715
+ 50000
716
+ 50000
717
+ Roa
718
+ ads
719
+ 30000
720
+ 30000
721
+ 30000
722
+ 30000
723
+ 20000
724
+ 20000
725
+ 20000
726
+ 20000
727
+ 10000
728
+ 10000
729
+ 10000
730
+ 10000
731
+ 1
732
+ +0
733
+ 20000
734
+ 0
735
+ 20000
736
+ 0
737
+ 20000
738
+ 20000
739
+ Ral
740
+ amj
741
+ 80000
742
+ 80000
743
+ 80000
744
+ 80000
745
+ 60000
746
+ 60000
747
+ 60000
748
+ 60000
749
+ 40000
750
+ 40000
751
+ 40000
752
+ 40000
753
+ 20000
754
+ 20000
755
+ 20000-
756
+ 20000
757
+
758
+ 0
759
+ 0
760
+ 0
761
+ 50000
762
+ 0
763
+ 50000
764
+ 0
765
+ 50000
766
+ 0
767
+ 5000014
768
+
769
+ 0.80) can be observed between the calibrated vehicle volume and the ground truth AADT, whereas
770
+ a higher correlation can be observed for urban roads. The relatively weaker performance in rural
771
+ roadways can also be attributed to the technology limitation mentioned above.
772
+
773
+ Figure 8. Volume Calibration Results Comparison by Urban/Rural Status.
774
+
775
+ Table 1. Volume Calibration Results Comparison by Link Type
776
+ Link Type
777
+ Training Set
778
+ Testing Set
779
+ Corr.
780
+ RMSE
781
+ Corr.
782
+ RMSE
783
+ Before
784
+ After
785
+ Before
786
+ After
787
+ Before
788
+ After
789
+ Before
790
+ After
791
+ All
792
+ 0.746
793
+ 0.966
794
+ 7912
795
+ 2996
796
+ 0.764
797
+ 0.854
798
+ 7548
799
+ 5701
800
+ Interstate Highways
801
+ and Highways
802
+ 0.752
803
+ 0.975
804
+ 20081
805
+ 6559
806
+ 0.712
807
+ 0.775
808
+ 19633
809
+ 15246
810
+ Primary Roads
811
+ 0.699
812
+ 0.971
813
+ 7909
814
+ 2695
815
+ 0.721
816
+ 0.846
817
+ 8665
818
+ 6509
819
+ Secondary Roads
820
+ 0.627
821
+ 0.960
822
+ 4899
823
+ 1776
824
+ 0.617
825
+ 0.813
826
+ 3667
827
+ 2667
828
+ Tertiary Roads
829
+ 0.414
830
+ 0.959
831
+ 3486
832
+ 994
833
+ 0.511
834
+ 0.869
835
+ 3090
836
+ 1877
837
+ Local Roads
838
+ 0.374
839
+ 0.944
840
+ 2474
841
+ 853
842
+ 0.426
843
+ 0.742
844
+ 1701
845
+ 1083
846
+ Highway Ramps
847
+ 0.242
848
+ 0.866
849
+ 10426
850
+ 4722
851
+ 0.182
852
+ 0.402
853
+ 9119
854
+ 6846
855
+
856
+ Table 2. Volume Calibration Results by Urban/Rural Status.
857
+ Link Type
858
+ Training Set
859
+ Testing Set
860
+ Corr.
861
+ RMSE
862
+ Corr.
863
+ RMSE
864
+ Before
865
+ After
866
+ Before
867
+ After
868
+ Before
869
+ After
870
+ Before
871
+ After
872
+ All
873
+ 0.746
874
+ 0.966
875
+ 7912
876
+ 2996
877
+ 0.764
878
+ 0.854
879
+ 7548
880
+ 5701
881
+ Rural
882
+ 0.769
883
+ 0.967
884
+ 3583
885
+ 1442
886
+ 0.727
887
+ 0.826
888
+ 4810
889
+ 4075
890
+
891
+ -
892
+ .
893
+ 60000
894
+ 60000
895
+ 60000
896
+ 60000
897
+ 40000
898
+ (veh/day)
899
+ 40000
900
+ 20000
901
+ 20000
902
+ 20000
903
+ 20000
904
+ E
905
+ 200004000060000
906
+ 200004000060000
907
+ 200004000060000
908
+ 200004000060000
909
+ MDOT SHA
910
+ 125000
911
+ 125000
912
+ 2
913
+ 100000
914
+ 100000
915
+ 100000
916
+ 75000
917
+ 75000
918
+ 75000
919
+ 50000
920
+ 50000
921
+ 50000
922
+ C
923
+ 25000
924
+ 25000
925
+ 25000
926
+ 0
927
+ 0
928
+ 50000
929
+ 100000
930
+ 50000
931
+ 100000
932
+ 0
933
+ 50000
934
+ 100000
935
+ 50000
936
+ 10000015
937
+
938
+ Urban
939
+ 0.738
940
+ 0.964
941
+ 8913
942
+ 3363
943
+ 0.764
944
+ 0.853
945
+ 8311
946
+ 6179
947
+
948
+ Figure 9 visualizes the calibrated vehicle volume averaged from the entire year of 2019
949
+ (represented as AADT) on the all-street network in the state of Maryland. It can be seen that the
950
+ interstate highway and the highway skeletons can be clearly identified from the map. Major
951
+ arterials also stand out from the map. Figure 9 (b) zooms into the Washington D.C. area, where I-
952
+ 495, I-270, I-95 and the Baltimore/Washington Parkway are clearly seen. Figure 9(c) zooms into
953
+ the Baltimore area, where I-395, I-695, I-795, I-95, and I-70 are all captured. Figure 9(d) zooms
954
+ into Hagerstown, MD, which is a city in Washington County, MD near the border of Pennsylvania.
955
+ The I-70, I-81, and MD-40 are all captured, demonstrating the ability of our proposed framework
956
+ to produce reliable results in rural areas.
957
+
958
+
959
+ Figure 9. Visualization of Calibrated Vehicle Volume. (a) the State of Maryland; (b) Washington D.C.;
960
+ (c) Baltimore City; (d) Hagerstown, MD.
961
+
962
+ 5. CONCLUSIONS AND DISCUSSIONS
963
+
964
+ This paper presents a big-data driven framework that is able to ingest terabytes of MDLD and
965
+ estimate vehicle volume based on MDLD. The proposed framework first employs a series of
966
+ cloud-based computational algorithms to extract vehicle trajectories. A map-matching and routing
967
+ algorithm is then applied to snap and route vehicle trajectories to the road network. The observed
968
+ vehicle counts on each road segment are weighted and calibrated against the control total, i.e.,
969
+ annual vehicle miles traveled (VMT), and data collected from real-world loop detectors. The
970
+ proposed framework is implemented and validated on the all-street network in the state of
971
+
972
+ (a)
973
+ (b)
974
+ Calibrated VehicleVolume
975
+ (AADT) (veh/day)
976
+ <=5,000
977
+ 5,000-10,000
978
+ 10,00025,000
979
+ 25,000-50,000
980
+ 50,000-120,000
981
+ (c)
982
+ (d)16
983
+
984
+ Maryland using MDLD data from 2019. After weighting and calibration processes, high
985
+ correlation and low RMSE values are observed between our vehicle volume estimates and the
986
+ ground truth data.
987
+
988
+ The framework proposed in this study and the study findings have practical implications. For
989
+ instance, estimated vehicle volume based on MDLD can be leveraged in safety risk exposure
990
+ analysis. In particular, the proposed estimation method can particularly be beneficial for safety
991
+ risk exposure and crash analysis with respect to vulnerable road users (e.g., pedestrians and
992
+ bicyclists). Pedestrian and bicyclist exposure data have traditionally been collected through
993
+ surveys or count collections at sample locations (53, 54). In addition to being costly and labor-
994
+ intensive, these conventional data collection methods are susceptible to subjectivity and may yield
995
+ inaccurate data. Consequently, high-quality and readily-available pedestrian and bicyclist
996
+ exposure data are considered as a limitation in safety analysis (55). As exposure data are crucial
997
+ for contextualization of crash analysis and prioritization of safety countermeasures (53), utilization
998
+ of high-quality and consistent exposure data is imperative. When it comes to safety analysis, using
999
+ MDLD for volume estimation—as performed in this study—provides a tremendous advantage
1000
+ over using data obtained from traditional volume estimation methods. This is due to the potential
1001
+ of the MDLD to produce more reliable exposure data. Employment of such high-fidelity exposure
1002
+ data (i.e., MDLD-estimated volumes) as input for safety and crash analyses can lead to more
1003
+ accurate results and guide data-driven, evidence-based policy decision-making to improve the
1004
+ safety of all road users including the most vulnerable ones.
1005
+
1006
+ ACKNOWLEDGEMENTS
1007
+ This study was conducted as part of a collaboration among the Maryland Department of
1008
+ Transportation State Highway Administration (MDOT SHA), Maryland Transportation Institute
1009
+ (MTI) at the University of Maryland College Park, and Shock, Trauma and Anesthesiology
1010
+ Research (STAR) Center at the University of Maryland Baltimore through the sponsorship from
1011
+ the Safety Data Initiative from the U.S. Department of Transportation (USDOT).
1012
+
1013
+ CONFLICT OF INTEREST
1014
+ The authors declare that they have no conflict of interest.
1015
+
1016
+ AUTHOR CONTRIBUTION STATEMENT
1017
+ The authors confirm contribution to the paper as follows: study conception and design: M.Y., W.L.,
1018
+ C.X.; data collection: M.Y., M.A., J.M., G.C., S.S.N.; analysis and interpretation of results: M.Y.,
1019
+ J.M., W.L.; methodology support (osm2gmns): J.L.; draft manuscript preparation: M.Y., W.L.,
1020
+ M.A., J.M., G.C., S.S.N., A.K..
1021
+
1022
+ REFERENCE
1023
+
1024
+ 1. Kwon, J., Varaiya, P. and Skabardonis, A.. Estimation of truck traffic volume from single loop
1025
+ detectors with lane-to-lane speed correlation. Transportation Research Record, 1856(1),
1026
+ pp.106-117 (2003).
1027
+ 2. Muñoz, L., Sun, X., Horowitz, R., and Alvarez, L.. Traffic density estimation with the cell
1028
+ transmission model. In American Control Conference. Proceedings of the 2003, Vol. 5. IEEE,
1029
+ 3750–3755 (2003).
1030
+
1031
+ 17
1032
+
1033
+ 3. Okutani, I. and Stephanedes, Y. J.. Dynamic prediction of traffic volume through Kalman
1034
+ filtering theory. Transportation Research Part B: Methodological 18, 1 (1984), 1–11
1035
+ 4. Wilkie, D., Sewall, J., and Lin, M.. Flow reconstruction for data driven traffic animation. ACM
1036
+ Transactions on Graphics (TOG) 32, 4 (2013), 89
1037
+ 5. Jia, Z., C. Chen, B. Coifman, and P. Varaiya. The PeMS Algorithms for Accurate, Real-Time
1038
+ Estimates of g-Factors and Speeds from Single Loop Detectors. Proc., IEEE Intelligent
1039
+ Transportation Systems Council Annual Meeting, IEEE, Piscataway, N.J., pp. 536–541 (2001).
1040
+ 6. Zhao, Y., Zheng, J., Wong, W., Wang, X., Meng, Y., & Liu, H. X.. Various methods for queue
1041
+ length and traffic volume estimation using probe vehicle trajectories. Transportation Research
1042
+ Part C: Emerging Technologies, 107, 70–91 (2019). https://doi.org/10.1016/j.trc.2019.07.008
1043
+ 7. Guo, Q., Li, L., & (Jeff) Ban, X.. Urban traffic signal control with connected and automated
1044
+ vehicles: A survey. In Transportation Research Part C: Emerging Technologies (Vol. 101, pp.
1045
+ 313–334) (2019). Elsevier Ltd. https://doi.org/10.1016/j.trc.2019.01.026
1046
+ 8. Sekuła, P., Marković, N., vander Laan, Z., & Sadabadi, K. F.. Estimating historical hourly
1047
+ traffic volumes via machine learning and vehicle probe data: A Maryland case study.
1048
+ Transportation Research Part C: Emerging Technologies, 97, 147–158 (2018).
1049
+ https://doi.org/10.1016/j.trc.2018.10.012
1050
+ 9. Anuar, K., & Cetin, M.. Estimating Freeway Traffic Volume Using Shockwaves and Probe
1051
+ Vehicle Trajectory Data. Transportation Research Procedia, 22, 183–192 (2017).
1052
+ https://doi.org/10.1016/j.trpro.2017.03.025
1053
+ 10. Li, F., Tang, K., Yao, J., & Li, K.. Real-Time Queue Length Estimation for Signalized
1054
+ Intersections Using Vehicle Trajectory Data. Transportation Research Record, 2623(1), 49–59
1055
+ (2017). https://doi.org/10.3141/2623-06
1056
+ 11. Chen, C., Ma, J., Susilo, Y., Liu, Y., & Wang, M.. The promises of big data and small data for
1057
+ travel behavior (aka human mobility) analysis. Transportation Research Part C: Emerging
1058
+ Technologies. 68, 285-299, (2016).
1059
+ 12. Yang, M., Pan, Y., Darzi, A., Ghader, S., Xiong, C. and Zhang, L.. A data-driven travel mode
1060
+ share estimation framework based on mobile device location data. Transportation, pp.1-45
1061
+ (2021).
1062
+ 13. Battelle. Global Positioning Systems for Personal Travel Surveys: Lexington Area Travel Data
1063
+ Collection Test. Final Report. FHWA, U.S. Department of Transportation, (1997).
1064
+ 14. 2000–2001 California Statewide Household Travel Survey. Final Report. NuStats, Austin, Tex
1065
+ (2002).
1066
+ 15. Kansas City Regional Travel Survey. Final Report. NuStats, Austin, Tex, (2004).
1067
+ 16. Mid-Region Council of Governments 2013 Household Travel Survey. Final Report. Westat,
1068
+ Rockville, Md, (2014).
1069
+ 17. 2014 Southern Nevada Household Travel Survey. Final Report. Westat, Rockville, Md, (2015).
1070
+ 18. INRIX Traffic. http://www.inrix.com/, (2020).
1071
+ 19. Haghani, Ali, Masoud Hamedi, and Kaveh Farokhi Sadabadi. I-95 Corridor coalition vehicle
1072
+ probe project: Validation of INRIX data. I-95 Corridor Coalition 9, (2009).
1073
+ 20. Schrank, D., Eisele, B., & Lomax, T.. 2014 Urban mobility report: powered by Inrix Traffic
1074
+ Data (No. SWUTC/15/161302-1), (2015).
1075
+ 21. Cui, Z., Ke, R., Pu, Z., & Wang, Y.. Deep bidirectional and unidirectional LSTM recurrent
1076
+ neural network for network-wide traffic speed prediction. arXiv preprint arXiv:1801.02143,
1077
+ (2018).
1078
+
1079
+ 18
1080
+
1081
+ 22. Horak, Ray. Telecommunications and data communications handbook. John Wiley & Sons,
1082
+ (2007).
1083
+ 23. Gonzalez, M. C., Hidalgo, C. A., & Barabasi, A. L.. Understanding individual human mobility
1084
+ patterns. Nature, 453(7196), 779-782, (2008).
1085
+ 24. Kang, C., Liu, Y., Ma, X., & Wu, L.. Towards estimating urban population distributions from
1086
+ mobile call data. Journal of Urban Technology, 19(4), 3-21, (2012).
1087
+ 25. Kang, C., Ma, X., Tong, D., & Liu, Y.. Intra-urban human mobility patterns: An urban
1088
+ morphology perspective. Physica A: Statistical Mechanics and its Applications, 391(4), 1702-
1089
+ 1717, (2012).
1090
+ 26. Pappalardo, L., F. Simini, S. Rinzivillo, D. Pedreschi, F. Giannotti and A.-L. Barabási.
1091
+ Returners and Explorers Dichotomy in Human Mobility. Nature communications. Vol. 6,pp.
1092
+ 8166. (2015).
1093
+ 27. Song, C., T. Koren, P. Wang and A.-L. Barabási. Modelling the Scaling Properties of Human
1094
+ Mobility. Nature Physics. Vol. 6, No. 10, pp. 818. (2010).
1095
+ 28. Song, C., Z. Qu, N. Blumm and A.-L. Barabási. Limits of Predictability in Human Mobility.
1096
+ Science. Vol. 327, No. 5968, pp. 1018-102. (2010).
1097
+ 29. Çolak, S., A. Lima and M. C. González. Understanding Congested Travel in Urban Areas.
1098
+ Nature communications. Vol. 7, pp. 10793. (2016).
1099
+ 30. Bachir, D., Khodabandelou, G., Gauthier, V., El Yacoubi, M. and Puchinger, J. Inferring
1100
+ dynamic origin-destination flows by transport mode using mobile phone data. Transportation
1101
+ Research Part C: Emerging Technologies, 101, pp.254-275. (2019).
1102
+ 31. Fekih, M., Bellemans, T., Smoreda, Z., Bonnel, P., Furno, A. and Galland, S.. A data-driven
1103
+ approach for origin–destination matrix construction from cellular network signalling data: a
1104
+ case study of Lyon region (France). Transportation, pp.1-32. (2020).
1105
+ 32. Landmark, A.D., Arnesen, P., Södersten, C.J. and Hjelkrem, O.A.. Mobile phone data in
1106
+ transportation research: methods for benchmarking against other data sources. Transportation,
1107
+ pp.1-23. (2021).
1108
+ 33. Wang, F., & Chen, C.. On data processing required to derive mobility patterns from passively-
1109
+ generated mobile phone data. Transportation Research Part C: Emerging Technologies. 87,
1110
+ 58-74, (2018).
1111
+ 34. Wang, F., Wang, J., Cao, J., Chen, C., & Ban, X. J.. Extracting trips from multi-sourced data
1112
+ for mobility pattern analysis: An app-based data example. Transportation Research Part C:
1113
+ Emerging Technologies. 105, 183-202, (2019).
1114
+ 35. Puget Sound Regional Travel Study. Report: Spring 2014 Household Travel Survey. RSG,
1115
+ (2014).
1116
+ 36. In-The-Moment Travel Study. Revised Report. RSG, (2015).
1117
+ 37. Puget Sound Regional Travel Study. Report: 2015 Household Travel Survey. RSG, (2015).
1118
+ 38. 2017 Puget Sound Regional Travel Study. Draft Final Report. RSG, (2017).
1119
+ 39. Airsage. https://www.airsage.com/, (2020).
1120
+ 40. Zhang, L., Darzi, A., Ghader, S., Pack, M.L., Xiong, C., Yang, M., Sun, Q., Kabiri, A. and Hu,
1121
+ S..
1122
+ Interactive
1123
+ covid-19
1124
+ mobility
1125
+ impact
1126
+ and
1127
+ social
1128
+ distancing
1129
+ analysis
1130
+ platform. Transportation Research Record, p.03611981211043813 (2020).
1131
+ 41. Xiong, C., Hu, S., Yang, M., Luo, W., and Zhang, L.. Mobile device data reveal the dynamics
1132
+ in a positive relationship between human mobility and COVID-19 infections. Proceedings of
1133
+ the National Academy of Sciences, 117(44), 27087-27089 (2020a).
1134
+
1135
+ 19
1136
+
1137
+ 42. Xiong, C., Hu, S., Yang, M., Younes, H., Luo, W., Ghader, S. and Zhang, L.. Mobile device
1138
+ location data reveal human mobility response to state-level stay-at-home orders during the
1139
+ COVID-19 pandemic in the USA. Journal of the Royal Society Interface, 17(173), p.20200344.
1140
+ (2020b).
1141
+ 43. Hu, S., Xiong, C., Yang, M., Younes, H., Luo, W. and Zhang, L., 2021. A big-data driven
1142
+ approach to analyzing and modeling human mobility trend under non-pharmaceutical
1143
+ interventions during COVID-19 pandemic. Transportation Research Part C: Emerging
1144
+ Technologies, 124, p.102955.
1145
+ 44. Li, J.Q., Zhou, K., Shladover, S.E. and Skabardonis, A.. Estimating queue length under
1146
+ connected vehicle technology: Using probe vehicle, loop detector, and fused
1147
+ data. Transportation research record, 2356(1), pp.17-22 (2013).
1148
+ 45. Meng, C., Yi, X., Su, L., Gao, J. and Zheng, Y.. City-wide traffic volume inference with loop
1149
+ detector data and taxi trajectories. In Proceedings of the 25th ACM SIGSPATIAL International
1150
+ Conference on Advances in Geographic Information Systems (pp. 1-10) (2017).
1151
+ 46. Caceres, N., Romero, L. M., Benitez, F. G. and del Castillo, J. M.. Traffic Flow Estimation
1152
+ Models Using Cellular Phone Data. IEEE Transactions on Intelligent Transportation Systems,
1153
+ vol. 13, no. 3, pp. 1430-1441 (2012). doi: 10.1109/TITS.2012.2189006
1154
+ 47. Janecek, A., Valerio, D., Hummel, K. A., Ricciato, F. and Hlavacs, H.. The Cellular Network
1155
+ as a Sensor: From Mobile Phone Data to Real-Time Road Traffic Monitoring. IEEE
1156
+ Transactions on Intelligent Transportation Systems, vol. 16, no. 5, pp. 2551-2572, doi:
1157
+ 10.1109/TITS.2015.2413215 (2015).
1158
+ 48. Xing, J., Liu, Z., Wu, C., & Chen, S.. Traffic volume estimation in multimodal urban networks
1159
+ using cell phone location data. IEEE Intelligent Transportation Systems Magazine, 11(3), 93-
1160
+ 104 (2019).
1161
+ 49. Fan, J., Fu, C., Stewart, K., and Zhang, L.. Using big GPS trajectory data analytics for vehicle
1162
+ miles traveled estimation. Transportation research part C: emerging technologies 103 (2019):
1163
+ 298-307.
1164
+ 50. Codjoe, Julius, Grace Ashley, and William Saunders. Evaluating cell phone data for AADT
1165
+ estimation. No. FHWA/LA. 18/591, LTRC Project Number: 16-3SA, State Project Number:
1166
+ DOTLT1000110. Louisiana Transportation Research Center, (2018).
1167
+ 51. Zhang, L., Ghader, S., Darzi, A., Pan, Y., Yang, M., Sun, Q., Kabiri, A. and Zhao, G.. Data
1168
+ analytics and modeling methods for tracking and predicting origin-destination travel trends
1169
+ based on mobile device data. Federal Highway Administration Exploratory Advanced
1170
+ Research Program (2020).
1171
+ 52. Newson, P. and Krumm, J.. Hidden Markov map matching through noise and sparseness.
1172
+ In Proceedings of the 17th ACM SIGSPATIAL international conference on advances in
1173
+ geographic information systems (pp. 336-343) (2009).
1174
+ 53. Sanders, R.L., Frackelton, A., Gardner, S., Schneider, R., Hintze, M. Ballpark Method for
1175
+ Estimating Pedestrian and Bicyclist Exposure in Seattle, Washington: Potential Option for
1176
+ Resource-constrained Cities in an Age of Big Data. Transportation Research Record, 2605(1),
1177
+ pp.32–44 (2017).
1178
+ 54. Lee, K., and Sener, I.N. Emerging Data Mining for Pedestrian and Bicyclist Monitoring: A
1179
+ Literature Review Report. Safety through Disruption, National University Transportation
1180
+ Center (UTC) Program. (2017). https://safed.vtti.vt.edu/wp-content/uploads/2020/07/UTC-
1181
+ Safe-D_Emerging-Data-Mining-for-PedBike_TTI-Report_26Sep17_final.pdf. Accessed July
1182
+ 10, 2021.
1183
+
1184
+ 20
1185
+
1186
+ 55. Synthesis of Methods of Estimating Pedestrian and Bicyclist Exposure to Risk at Areawide
1187
+ Levels and on Specific Transportation Facilities. FHWA-SA-17-041. FHWA, U.S.
1188
+ Department of Transportation, (2017).
1189
+
CNFAT4oBgHgl3EQfsx5b/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
CNFAT4oBgHgl3EQfsx5b/vector_store/index.faiss ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:96d0bce6dfc1b7672d9a66e83a94acadd6b37857a79fe2d91a32599af60599d6
3
+ size 4325421
CNFAT4oBgHgl3EQfsx5b/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:be96a0404281fd1420de0277849ab9072e3c08199b1709c75513f56b67a207a0
3
+ size 145839
F9FKT4oBgHgl3EQfbS5P/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
F9FKT4oBgHgl3EQfbS5P/vector_store/index.pkl ADDED
@@ -0,0 +1,3 @@
 
 
 
 
1
+ version https://git-lfs.github.com/spec/v1
2
+ oid sha256:d9cff610be896d59369b5be5ff5c2b3fad8b788bba9d25d2c816c082ecb0daed
3
+ size 175551
H9AyT4oBgHgl3EQfrvmy/content/tmp_files/2301.00567v1.pdf.txt ADDED
@@ -0,0 +1,1551 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ Strange Stars within Bosonic and Fermionic Admixed Dark Matter
2
+ Luiz L. Lopes1∗ and H. C. Das2,3†
3
+ 1Centro Federal de Educac¸˜ao Tecnol´ogica de Minas Gerais Campus VIII; CEP 37.022-560, Varginha - MG - Brasil
4
+ 2Institute of Physics, Sachivalaya Marg, Bhubaneswar 751005, India and
5
+ 3Homi Bhabha National Institute, Training School Complex, Anushakti Nagar, Mumbai 400094, India
6
+ (Dated: January 3, 2023)
7
+ In this work, we study dark matter (DM) admixed strange quark stars exploring the different possibilities
8
+ about the nature of the DM and their effects on the macroscopic properties of strange stars, such as maximum
9
+ masses, radii, as well the dimensionless tidal parameter. We observe that the DM significantly affects the
10
+ macroscopic properties that depend on the DM mass, type, and fraction inside the star.
11
+ I.
12
+ INTRODUCTION
13
+ Recently, it was suggested that quarks probable appear in-
14
+ side the core of a massive neutron star (NS) due to a very high
15
+ density, where hadronic matter undergoes phase transitions to
16
+ a new phase of quarks and gluons [1]. Furthermore, several
17
+ exotic particles, such as hyperons production, dark matter ac-
18
+ cretions, kaon condensations, and so on, appeared primarily in
19
+ the core of the NS. As a result, in those regimes, the equation
20
+ of state (EoS) is the fundamental component that can describe
21
+ both micro/macroscopic properties. Another possibility is that
22
+ at least some of the observed pulsars are indeed stable quark
23
+ stars, or strange stars. Several theoretical works have pro-
24
+ posed the existence of strange quark stars (SQSs) [2], which
25
+ are made up of u, d, and s quarks in equilibrium in terms
26
+ of weak interactions. The Bodmen-Witten conjecture states
27
+ that strange quark matter (SQM) can have a lower energy per
28
+ baryon than pure nucleons because the exclusion principle
29
+ may be dominant at absolute zero pressure and temperature
30
+ [3, 4]. Hence, the SQM might be the true ground state of the
31
+ hadronic matter. Hence, it stands to reason that the SQS must
32
+ be more stable than the ordinary NS.
33
+ Various phenomenological models have been proposed to
34
+ explore the SQSs properties.
35
+ Among them, the MIT bag
36
+ model and Nambu-Jona-Lasinio (NJL) have been widely
37
+ used. In this study, we use the vector MIT (vMIT) bag model
38
+ to describe the quark matter interactions [5, 6]. In the MIT
39
+ bag model, it has been assumed that the quarks are bound
40
+ in a bag of finite dimensions. In contrast to their absolute
41
+ mass, which is very high, it is hypothesized that quarks in-
42
+ side the bag have a very low mass. The system is given a
43
+ bag constant B as a constant energy density to balance the
44
+ bag’s behavior and determine its size. The inward pressure
45
+ at the bag’s surface counterbalances the outward pressure the
46
+ quarks cause, which means the pressure between the true and
47
+ perturbative vacuum. Consequently, as B increases, the quark
48
+ pressure lowers, which impacts the star’s structure. The value
49
+ of B relies on the mass of the strange quark when u and d
50
+ quarks have very low masses. The values of B still need to
51
+ be established and are fully model-dependent. One can con-
52
+ strain its values with the help of observational results. For
53
54
55
+ example, in the observational limit of GW170817, the pre-
56
+ dicted values of B1/4 = 134.1 − 141.4 MeV with low-spin
57
+ prior and B1/4 = 126.1 − 141.4 MeV with high spin prior
58
+ for SQSs [7]. In Ref. [8], they have predicted the range of
59
+ B1/4 = 133.68 − 222.5 MeV for SQSs. However, in the
60
+ vMIT bag model [5, 6], the value of B can be obtained by
61
+ including the stability window, as mentioned in Refs. [3, 4].
62
+ Moreover, there are different phenomenological and macro-
63
+ scopic studies suggesting that the quark phases inside the
64
+ compact stars can undergo a phase transition into a color su-
65
+ perconducting state of 2-flavour superconducting (2SC), and
66
+ color-flavor locked (CFL) [9, 10]. They form Cooper pairs
67
+ at high density and low-temperature [11]. The gap parameter
68
+ (∆) determines the pairing strength of Cooper pairs influence
69
+ the formation of pure CFL stars [12–17] and CFL magnetars
70
+ [18, 19]. Recently, it has been suggested that with the proper
71
+ choice of ∆ and bag pressure B, the CFL stars and their EoS
72
+ can successfully reproduce various observational constraints
73
+ such as GW and NICER results [20–22]. In this study, we
74
+ want to explore the dark matter (DM) effects on the strange
75
+ stars with with and without CFL phases and try to constrain
76
+ the macroscopic properties with various observational data.
77
+ The compact objects such as NS, white dwarfs captures
78
+ some amount of DM inside it in their evolving time. The
79
+ amount of DM particles acrreted inside the star due to its im-
80
+ mense gravitational potential. Various theoretical predictions
81
+ provide us with the unknown nature of DM. Still, numerous
82
+ work has been fully dedicated to explaining its properties by
83
+ applying it to different systems such as white dwarf [23], NS
84
+ [24–28], and even our earth [29]. In the present study, we as-
85
+ sume that the SQSs might contain a certain amount of DM
86
+ in their life time. The types of DM particles may be either
87
+ bosonic or fermionic, and also the percentage of DM depends
88
+ on the (i) evolution time and (ii) types of accretions. How-
89
+ ever, the accreted DM particles interact directly or indirectly
90
+ with hadrons by exchanging other bosonic particles, mainly
91
+ depending on the model used. Here, we take different types
92
+ of possible scenarios for DM admixed SQS.
93
+ The direct detection experiments have already been estab-
94
+ lished, such as XENON100 [30], XENON1T[31], CDMS
95
+ [32], LUX [33], PANDAX-II [34] etc. to measure the scat-
96
+ tering cross-section of the DM and nucleons.
97
+ Although,
98
+ they provided some exclusions bound to the scattering cross-
99
+ section. Still, the null results provided by the experiments
100
+ alluded to an inconclusive nature of DM. However, the exclu-
101
+ sion bounds prescribed by such direct detection experiments
102
+ arXiv:2301.00567v1 [astro-ph.HE] 2 Jan 2023
103
+
104
+ 2
105
+ depend on the local DM density around the solar neighbor-
106
+ hood, which does not affect the density of DM in the NS/SQS
107
+ environment. After the accretion of DM inside NS/SQS, it
108
+ collides with nucleons or quarks by losing its kinetic energy,
109
+ and eventually, it is bound inside the star. When the accre-
110
+ tion ends, the DM particles finally reach thermal equilibrium
111
+ with one another due to their internal interactions. This ex-
112
+ plains why NSs with admixed DM have essentially constant
113
+ DM particle densities [25, 27, 28, 35]. Therefore, the accreted
114
+ DM particles are restricted to a narrow radius area inside the
115
+ star. In this study, we choose two types of DM and see their
116
+ effects on the SQS properties with the vMIT bag model and a
117
+ model with superconducting phases.
118
+ Recently, the fastest and heaviest Galactic NS named PSR
119
+ J0952-0607 (black widow) in the disk of the Milky Way has
120
+ been detected to have mass M = 2.35 ± 0.17 M⊙ in continu-
121
+ ation of the pulsars PSR J0740+6620 (M = 2.08 ± 0.07 M⊙
122
+ [36, 37]). The simultaneous measurements of the M and R
123
+ for NS are done by neutron star interior composition explorer
124
+ (NICER) [38, 39] while the limit on the dimensionless tidal
125
+ deformability of Λ1.4 = 190+390
126
+ −120 was provided in GW170817
127
+ event [40]. We calculate the mass, radius, and tidal deforma-
128
+ bility for the DM admixed SQS and put constraints using
129
+ the observational results obtained from different x-ray/pulsars
130
+ data, GW170817 data.
131
+ II.
132
+ FORMALISM
133
+ A.
134
+ Vector MIT bag model
135
+ We use the thermodynamic consistent vector MIT bag
136
+ model introduced in Ref. [5, 6] to describe the quark matter.
137
+ In this model, the quark interaction is mediated by the vec-
138
+ tor channel V µ, analogous to the ω meson in QHD [41]. Its
139
+ Lagrangian reads:
140
+ LvMIT =
141
+
142
+ ¯ψq
143
+
144
+ γµ(i∂µ − gqV Vµ) − mq
145
+
146
+ ψq
147
+ −B + 1
148
+ 2m2
149
+ V V µVµ
150
+
151
+ Θ( ¯ψqψq),
152
+ (1)
153
+ where mq is the mass of the quark q of flavor u, d or s, ψq
154
+ is the Dirac quark field, B is the constant vacuum pressure,
155
+ and Θ( ¯ψqψq) is the Heaviside step function to assure that
156
+ the quarks exist only confined to the bag. Applying Euler-
157
+ Lagrange, we obtain the energy eigenvalue, which at T = 0
158
+ K, is also the chemical potential:
159
+ Eq = µq =
160
+
161
+ m2q + k2 + gqV Vµ,
162
+ (2)
163
+ now, using Fermi-Dirac statistics, we can obtain the EoS in
164
+ mean field approximation. The energy density of the quarks
165
+ is:
166
+ ϵq = Nc
167
+ π2
168
+ � kf
169
+ 0
170
+ Eqk2d3k,
171
+ (3)
172
+ where Nc = 3 is the number of colors and kf is the Fermi
173
+ momentum. The contribution of the bag and the mesonic mass
174
+ term is obtained with the Hamiltonian: H = −⟨L⟩. The total
175
+ quark energy density now reads:
176
+ ϵ =
177
+
178
+ q
179
+ ϵq + B − 1
180
+ 2m2
181
+ vV 2
182
+ 0 .
183
+ (4)
184
+ To construct an electrically neutral, beta-stable matter, leptons
185
+ are added as a free Fermi gas. The pressure is obtained via the
186
+ relation: p = � µn − ϵ, where the sum runs over all the
187
+ fermions.
188
+ The parameters utilized in this work are the same as pre-
189
+ sented in Ref. [5]. We use mu = md = 4 MeV, and ms = 95
190
+ MeV. We also assume a universal coupling of quarks with the
191
+ vector meson, i.e., guV = gdV = gsV = gV , and use a value
192
+ of GV = 0.3 fm2 as defined below:
193
+ GV =
194
+ � gV
195
+ mV
196
+ �2
197
+ = 0.3 fm2.
198
+ (5)
199
+ Now, the value of GV is somewhat arbitrary. To reproduce
200
+ stable strange matter, the value of GV combined with the bag
201
+ must lie in the range known as the stability window. The sta-
202
+ bility window is related to the so-called Bodmer-Witten con-
203
+ jecture [3, 4], which states that the true ground state of the
204
+ strongly interacting matter is not protons and neutrons but
205
+ consists of strange quark matter, which in turn is composed
206
+ of deconfined up, down, and strange quarks. For the SQM
207
+ hypothesis to be accurate, the energy per baryon of the decon-
208
+ fined phase (for p = 0 and T = 0) is lower than the nonstrange
209
+ infinite baryonic matter [3–5].
210
+ Euds/A < 930 MeV,
211
+ (6)
212
+ at the same time, the nonstrange matter still needs to have
213
+ an energy per baryon higher than nonstrange infinite baryonic
214
+ one; otherwise, protons and neutrons would decay into u and
215
+ d quarks:
216
+ Eud/A > 930 MeV.
217
+ (7)
218
+ Therefore, both, Eqs. 6 and 7 must simultaneously satisfied.
219
+ For GV = 0.3 fm2 used in this work, the stability window
220
+ lies between 139 MeV < B1/4 < 146 MeV [5]. Here, we
221
+ assume the maximum allowed value: B1/4 = 146 MeV, as it
222
+ will produce the lower radius for the canonical star, as well the
223
+ lower value of the dimensionless tidal parameter Λ, while still
224
+ producing very massive strange quark stars, M > 2.40 M⊙.
225
+ B.
226
+ Superconducting CFL quark matter via analytical
227
+ approximation
228
+ Due to the low temperature and high densities reached in
229
+ the strange star interiors, the quark matter may be a color
230
+ superconductor, which is a degenerate Fermi gas of quarks
231
+ with a condensate of Cooper pairs near the Fermi surface
232
+ that induces color Meissner effects [11]. Among the vari-
233
+ ous possible configurations of superconducting matter, we can
234
+ cite two possibilities: The two-flavor color-superconducting
235
+
236
+ 3
237
+ phase, where quarks with two out of three colors and two out
238
+ of three flavors pair in the standard BCS fashion. The flavors
239
+ with the most phase space near their Fermi surfaces, namely,
240
+ u and d, are the ones that pair, leaving the strange quark and
241
+ the remaining color unpaired. Such phase is expected at den-
242
+ sities around 2 < n/n0 < 4 [42]. Another one is the color-
243
+ flavor locked phase, where the up, down, and strange quarks
244
+ can be treated on an equal footing, and the disruptive effects
245
+ of the strange quark mass can be neglected. In this phase,
246
+ quarks of all three colors and all three flavors form conven-
247
+ tional spinless Cooper pairs. The CFL phase is expected at
248
+ n > 4n0 [42]. For additional discussion about 2SC, CFL,
249
+ and other color superconducting phases, see Ref. [11] and the
250
+ references therein.
251
+ The 2SC and the CFL phases were explored within the NJL
252
+ model in Ref. [43], while in Ref. [42], the authors show that
253
+ the color superconducting NJL EoS is very well fitted by an
254
+ analytical approximation, called constant-sound-speed (CSS)
255
+ parameterization, whose EoS reads [42, 44, 45]:
256
+ p = a(ϵ − ϵ∗),
257
+ n = n∗[(1 + a)p/(aϵ∗)]1/(1+a).
258
+ (8)
259
+ We have, therefore, three free parameters, the square of the
260
+ speed of sound (v2
261
+ s = a), the energy density at p = 0 (ϵ∗),
262
+ which plays a role similar to the bag in the MIT base models,
263
+ and the number density at p = 0 (n∗). In Ref. [42], the authors
264
+ freely vary the value of a in the range 0.2 < a < 0.8 and
265
+ found that - depending on the NJL parametrization - the 2SC
266
+ phase is well described by a < 0.33 while the CFL phase is
267
+ described by a > 0.35. On the other hand, Ref. [44] uses the
268
+ extreme case a = 1. Here we consider that the quark matter
269
+ is in the CFL phase and use an intermediate value, a = 0.6
270
+ (see the text and Fig. 4 from Ref. [42], as well Ref. [45]).
271
+ The value of ϵ∗ is chosen as 203 MeV/fm3 to match the value
272
+ coming from the vector MIT bag model. Finally, n∗ has to
273
+ be constrained, as we still need to reproduce strange quark
274
+ stars in accordance with the Bodmer-Witten conjecture. We
275
+ choose n∗ = 0.24 fm−3, which is very close to n0 = 0.23 fm−3
276
+ coming from the vector MIT. Within this value, we have E/A
277
+ = 906 MeV, with implies that the analytical approximation
278
+ of the CFL satisfies Eq. 6 and, therefore, the Bodmer-Witten
279
+ conjecture.
280
+ III.
281
+ RESULTS AND DISCUSSIONS
282
+ A.
283
+ Bosonic DM
284
+ This section briefly reviews the formalism of a bosonic DM
285
+ model initially proposed in Refs. [46, 47]. At very low tem-
286
+ peratures, all particles in a dilute Bose gas condense to the
287
+ same quantum ground state, forming a Bose-Einstein Con-
288
+ densate (BEC). Particles become correlated when their wave-
289
+ lengths overlap; that means the thermal wavelength is greater
290
+ than the mean inter-particle distance. Assuming T = 0 K
291
+ approximation, almost all the DM particles are in the con-
292
+ densate. Only binary collisions at low energy are relevant in
293
+ a dilute and cold gas. These collisions are characterized by
294
+ a single parameter, the s-wave scattering length la, indepen-
295
+ dently of the details of the two-body potential. Therefore, one
296
+ can replace the interaction potential with an effective repul-
297
+ sive interaction [48]:
298
+ V (⃗r − ⃗r′) = 4πla
299
+ mx
300
+ δ(⃗r − ⃗r′),
301
+ (9)
302
+ where mx is the mass of the bosonic DM.
303
+ The ground state properties of the DM are described by the
304
+ mean-field Gross-Pitaevskii (GP) equation, and the equation
305
+ of the state (EoS) has the form [27, 46, 47, 49]:
306
+ px = 2πla
307
+ m3x
308
+ ϵ2
309
+ x..
310
+ (10)
311
+ The scattering length la is assumed equal to 1 fm, as in the
312
+ Ref. [27, 46, 47, 49]. Moreover, the pressure strongly de-
313
+ pends on the bosonic DM’s mass due to the cubic dependence.
314
+ Therefore this parameter must be taken with care. Based on
315
+ the self-interaction cross-section of the DM constraint (see
316
+ Refs. [27, 49], the DM mass in the range 50 MeV < mx <
317
+ 160 MeV. However, the original works from Ref. [46, 47] sug-
318
+ gest a mass of around 1 GeV. It is worth emphasizing that a
319
+ mass ten times larger imply in pressure 1000 times lower! In
320
+ Ref. [50], the authors use a slightly different model of bosonic
321
+ DM, where the self-interaction is based on a scalar quartic
322
+ term in the potential.
323
+ They use the same constraint based
324
+ on the self-interaction cross-section of the DM and suggest
325
+ a mass of 400 MeV. To explore the ambiguity relative to the
326
+ mass of the bosonic DM, we use here two values: 100 MeV,
327
+ which agrees with Ref. [27, 49] and 400 MeV, which is in
328
+ agreement with Ref. [50], and it is not so far from 1 GeV as
329
+ suggested in Ref. [46, 47]. With these settings, the pressure
330
+ for mx = 400 MeV is 64 times lower than for mx = 100 MeV.
331
+ The total EoS of the strange star is, therefore, the sum of
332
+ the contribution of the ordinary quark matter and the DM:
333
+ p = pq + px,
334
+ and
335
+ ϵ = ϵq + ϵx.
336
+ (11)
337
+ Another important quantity is the fraction of the DM. To solve
338
+ the TOV equations [51], we need to specify the central values
339
+ both for normal matter and for DM: pq(0), px(0) respectively.
340
+ Here, we follow Ref. [27, 49] and define:
341
+ fx =
342
+ px(0)
343
+ pq(0) + px(0),
344
+ (12)
345
+ and use three different values for fx = 0.05, 0.075 and 0.10.
346
+ As pointed out in Ref. [27, 49], these values agree with the
347
+ current DM constraints obtained from stars like the Sun.
348
+ 1. Bosonic DM within vector MIT bag model
349
+ In Fig. 1, we plot the TOV solution for bosonic DM ad-
350
+ mixed strange stars with the mass of 100 MeV and 400 MeV.
351
+ As can be seen, for a bosonic DM mass of 100 MeV, we
352
+ have an increase in the maximum mass with the increase of the
353
+
354
+ 4
355
+ 1
356
+ 1.4
357
+ 1.8
358
+ 2.2
359
+ 2.6
360
+ 10
361
+ 10.5
362
+ 11
363
+ 11.5
364
+ 12
365
+ 12.5
366
+ 13
367
+ mx = 100 MeV
368
+ M/M0
369
+ R (km)
370
+ fx = 0.000
371
+ fx = 0.050
372
+ fx = 0.075
373
+ fx = 0.100
374
+ 1
375
+ 1.4
376
+ 1.8
377
+ 2.2
378
+ 2.6
379
+ 10
380
+ 10.5
381
+ 11
382
+ 11.5
383
+ 12
384
+ 12.5
385
+ 13
386
+ mx = 400 MeV
387
+ M/M0
388
+ R (km)
389
+ fx = 0.000
390
+ fx = 0.050
391
+ fx = 0.075
392
+ fx = 0.100
393
+ FIG. 1. Mass-radius relation for bosonic DM admixed strange stars
394
+ with mx =100 MeV (left) and mx = 400 MeV (right).
395
+ fraction of DM. This result is coherent with those presented in
396
+ Ref. [27, 49] for the original, massless MIT. Moreover, as in
397
+ the case of the original massless MIT, with the massive vector
398
+ MIT, we also see that the presence of DM affects only massive
399
+ stars. Strange stars with M < 1.5 M⊙ reproduced essentially
400
+ the same radii. The maximum masses vary from 2.41 M⊙ for
401
+ pure strange stars to 2.51M⊙ for bosonic DM admixed with
402
+ a fraction of 0.10. This indicates that the PSR J0740+6620
403
+ with a gravitational mass of 2.08 ± 0.07 M⊙ [37] can indeed
404
+ be a stable strange star with or without admixed bosonic DM.
405
+ Even the possible mass of 2.35 ± 0.17 M⊙ of the black widow
406
+ pulsar PSR J0952-0607 [52] can be explained as bosonic DM
407
+ matter admixed strange star. On the other hand, the radius
408
+ of the canonical star is in the narrow range of 11.37 km to
409
+ 11.40 km. In the literature, there is no consensus about the
410
+ true value of the radius of the canonical star. For instance, in
411
+ ref. [53], the constraint on the radius of the canonical star is
412
+ 10.1 − 11.1 km, which provides a very narrow range. If this
413
+ is true, neither of our results can fulfill such tight constraints.
414
+ In Ref. [54], an upper limit of 11.9 km was provided. In this
415
+ case, our results are in full agreement. However, recent results
416
+ from the NICER x-ray telescope point that the radius of the
417
+ canonical star is between 11.52 km and 13.85 km [39] and
418
+ between 11.96 km and 14.26 km as given in Ref. [38]. In
419
+ these cases, our radii are too small.
420
+ 0
421
+ 200
422
+ 400
423
+ 600
424
+ 800
425
+ 1000
426
+ 1.2
427
+ 1.4
428
+ 1.6
429
+ 1.8
430
+ 2
431
+ 2.2
432
+ 2.4
433
+ 2.6
434
+ mx = 100 MeV
435
+ Λ
436
+ M/M0
437
+ fx = 0.000
438
+ fx = 0.050
439
+ fx = 0.075
440
+ fx = 0.100
441
+ 0
442
+ 200
443
+ 400
444
+ 600
445
+ 800
446
+ 1000
447
+ 1.2
448
+ 1.4
449
+ 1.6
450
+ 1.8
451
+ 2
452
+ 2.2
453
+ 2.4
454
+ 2.6
455
+ mx = 400 MeV
456
+ Λ
457
+ M/M0
458
+ fx = 0.000
459
+ fx = 0.050
460
+ fx = 0.075
461
+ fx = 0.100
462
+ FIG. 2. Dimensionless tidal parameter Λ for bosonic DM admixed
463
+ strange stars with mx = 100 MeV (top) and mx = 400 MeV (bot-
464
+ tom).
465
+ Now, we have opposite results for a mass mx = 400 MeV!
466
+ First, the maximum mass decrease with the increase of DM
467
+ fraction, dropping from 2.41 M⊙ to 2.29 M⊙ for a fraction fx
468
+ of 0.10. However, all values agree with the mass of the PSR
469
+ J0740+6620 [37] and the PSR J0952-0607 [52]. Secondly,
470
+ we see that even low-mass strange stars are already affected
471
+ by the DM and are significantly more compact. The radius
472
+ of the 1.4 M⊙ strange star can reach a value as low as 11.08
473
+ km. Therefore, this result is in agreement with both Refs. [53,
474
+ 54]. The polytropic EoS of Eq. 10 can easily explain these
475
+ results. A four times higher DM matter mass produces sixty-
476
+ four times smaller pressure! The reduction of the pressure
477
+ causes the reduction of the maximum mass and increases the
478
+ star compression.
479
+ Another essential quantity and constraint is the so-called
480
+ dimensionless tidal deformability parameter Λ. If we put an
481
+ extended body in an inhomogeneous external field, it will ex-
482
+ perience different forces throughout its surface. The result is a
483
+ tidal interaction. The tidal deformability of a compact object
484
+ is a single parameter λ that quantifies how easily the object
485
+ is deformed when subjected to an external tidal field. Larger
486
+ tidal deformability indicates that the object is easily deformed.
487
+ Conversely, a compact object with a small tidal deformability
488
+ parameter is more compact and more difficult to deform. The
489
+
490
+ 5
491
+ TABLE I. Macroscopic properties of bosonic DM admixed strange
492
+ stars
493
+ mx (MeV)
494
+ fx
495
+ M/M⊙ R (km) R1.4 (km) Λ1.4
496
+ 100
497
+ 0.000
498
+ 2.41
499
+ 11.86
500
+ 11.37
501
+ 644
502
+ 100
503
+ 0.050
504
+ 2.46
505
+ 12.01
506
+ 11.37
507
+ 638
508
+ 100
509
+ 0.075
510
+ 2.48
511
+ 12.06
512
+ 11.38
513
+ 645
514
+ 100
515
+ 0.100
516
+ 2.51
517
+ 12.08
518
+ 11.40
519
+ 652
520
+ 400
521
+ 0.000
522
+ 2.41
523
+ 11.86
524
+ 11.37
525
+ 644
526
+ 400
527
+ 0.050
528
+ 2.31
529
+ 11.42
530
+ 11.16
531
+ 526
532
+ 400
533
+ 0.075
534
+ 2.30
535
+ 11.38
536
+ 11.12
537
+ 497
538
+ 400
539
+ 0.100
540
+ 2.29
541
+ 11.31
542
+ 11.08
543
+ 480
544
+ tidal deformability is defined as:
545
+ Λ ≡
546
+ λ
547
+ M 5 ≡ 2k2
548
+ 3C5 ,
549
+ (13)
550
+ where M is the compact object mass and C = GM/R is
551
+ its compactness. The parameter k2 is called the second (or-
552
+ der) Love number. Additional discussion about the theory of
553
+ tidal deformability and the tidal Love numbers are beyond the
554
+ scope of this work and can be found in Refs. [22, 40, 55–
555
+ 59] and references therein. Nevertheless, as pointed out in
556
+ Refs. [22, 58], the value of yR must be corrected since strange
557
+ stars are self-bound and present a discontinuity at the surface.
558
+ Therefore we must have
559
+ yR → yR − 4πR3∆ϵS
560
+ M
561
+ ,
562
+ (14)
563
+ where R and M are the star radius and mass, respectively,
564
+ and ∆ϵS is the difference between the energy density at the
565
+ surface (p = 0) and the star’s exterior (which implies ϵ = 0).
566
+ The results for the dimensionless tidal parameter are displayed
567
+ in Fig. 2.
568
+ As we can be seen, some features present in the mass-radius
569
+ relation are also present here. For instance, for a mass mx =
570
+ 100 MeV, the low masses of strange stars have similar tidal
571
+ parameters, despite their DM fraction. The tidal parameter for
572
+ the canonical mass lies between 638 and 644. These values
573
+ are in agreement with the constraint Λ < 800 [55], but fail to
574
+ fulfill the constraint 70 < Λ < 580 [40].
575
+ In the case of mx = 400 MeV, the strange stars’ huge com-
576
+ pression due to an increase in the DM fraction reduces the
577
+ tidal parameter Λ. The tidal parameter now lies around 500.
578
+ This indicates that for mx = 400 MeV, we are able to explain
579
+ very massive neutron stars as the PSR J0952-0607 [52], and
580
+ simultaneously fulfills the constraints of Λ < 800 [55] and 70
581
+ < Λ < 580 [40]. We summarize the results of this section in
582
+ Tab I.
583
+ 2. Bosonic DM within CFL quark matter
584
+ In order to better understand the effects of the DM in
585
+ strange stars, we now assume that the quark matters are in
586
+ 1
587
+ 1.5
588
+ 2
589
+ 2.5
590
+ 3
591
+ 10
592
+ 11
593
+ 12
594
+ 13
595
+ 14
596
+ mx = 100 MeV
597
+ M/M0
598
+ R (km)
599
+ fx = 0.000
600
+ fx = 0.050
601
+ fx = 0.075
602
+ fx = 0.100
603
+ 1
604
+ 1.5
605
+ 2
606
+ 2.5
607
+ 3
608
+ 10
609
+ 11
610
+ 12
611
+ 13
612
+ 14
613
+ mx = 400 MeV
614
+ M/M0
615
+ R (km)
616
+ fx = 0.000
617
+ fx = 0.050
618
+ fx = 0.075
619
+ fx = 0.100
620
+ FIG. 3. Mass-radius relation for bosonic DM admixed CFL strange
621
+ stars with mx =100 MeV (left) and mx = 400 MeV (right).
622
+ the CFL superconducting phase via the analytical approxima-
623
+ tion EoS in Eq. 8. The mass-radius relations are presented in
624
+ Fig. 3.
625
+ As can be seen, for a bosonic DM mass of 100 MeV, we
626
+ have an increase in the maximum mass with the increase of the
627
+ fraction of DM. The qualitative results for CFL superconduct-
628
+ ing quark stars are analogous to both the original, massless
629
+ MIT as showed in Ref. [27, 49], as well for the massive vector
630
+ MIT bag model as presented in the last section. This indicates
631
+ a possible model-independent behavior about the effect of the
632
+ bosonic DM. Moreover, as in the case of the original mass-
633
+ less MIT and the massive vector MIT, in the CFL phase, we
634
+ also see that the presence of DM affects only massive stars.
635
+ CFL strange stars with M < 1.8 M⊙ reproduced essentially
636
+ the same radii. The maximum masses vary from 2.81 M⊙ for
637
+ pure strange stars to 2.88M⊙ for bosonic DM admixed with a
638
+ fraction of 0.10. This indicates that the PSR J0740+6620 with
639
+ M = 2.08 ± 0.07 M⊙ [37] can be a stable CFL strange star
640
+ with or without admixed bosonic DM. Even the possible mass
641
+ of 2.35 ± 0.17 M⊙ of the pulsar PSR J0952-0607 [52] can
642
+ be explained as bosonic DM matter admixed strange star. On
643
+ the other hand, the radius of the canonical star presents almost
644
+ no variation and is fixed at around 11.57 km. Such a value is
645
+ too low to reproduce the constraint range of 10.1 − 11.1 km,
646
+ shown in Ref. [53] while agreeing with Ref. [54], whose upper
647
+
648
+ 6
649
+ 0
650
+ 200
651
+ 400
652
+ 600
653
+ 800
654
+ 1000
655
+ 1.2
656
+ 1.4
657
+ 1.6
658
+ 1.8
659
+ 2
660
+ 2.2
661
+ 2.4
662
+ 2.6
663
+ mx = 100 MeV
664
+ Λ
665
+ M/M0
666
+ fx = 0.000
667
+ fx = 0.050
668
+ fx = 0.075
669
+ fx = 0.100
670
+ 0
671
+ 200
672
+ 400
673
+ 600
674
+ 800
675
+ 1000
676
+ 1.2
677
+ 1.4
678
+ 1.6
679
+ 1.8
680
+ 2
681
+ 2.2
682
+ 2.4
683
+ 2.6
684
+ mx = 400 MeV
685
+ Λ
686
+ M/M0
687
+ fx = 0.000
688
+ fx = 0.050
689
+ fx = 0.075
690
+ fx = 0.100
691
+ FIG. 4. Dimensionless tidal parameter Λ for bosonic DM admixed
692
+ CFL superconducting strange stars with mx = 100 MeV (top) and
693
+ mx = 400 MeV (bottom).
694
+ limit is 11.9 km. About the NICER x-ray telescope, the con-
695
+ straint between 11.52 km and 13.85 km pointed in Ref. [39]
696
+ is fulfilled, but the bound in the range between 11.96 km and
697
+ 14.26 km (Ref. [38]) is not.
698
+ For a mass mx = 400 MeV, the results for CLF super-
699
+ conducting strange stars are analogous to the massive MIT
700
+ bag model discussed in the last section. The maximum mass
701
+ decrease with the increase of DM fraction, dropping from
702
+ 2.81 M⊙ to 2.61 M⊙ for a fraction fx of 0.10. However, all
703
+ values agree with the mass of the PSR J0740+6620 [37] and
704
+ the black widow pulsar PSR J0952-0607 [52]. Secondly, we
705
+ see that even low-mass strange stars are already affected by
706
+ the DM and are significantly more compact. The radius of
707
+ the 1.4 M⊙ for fx = 0.10 is about 11.29 km. Such a low ra-
708
+ dius fails to fulfill both NICER constraints [38, 39], but is in
709
+ agreement with Capano et al. [54]. The reduction of the CFL
710
+ strange star and its compression can again be explained by the
711
+ polytropic EoS of Eq. 10. A four times higher DM matter
712
+ mass produces sixty-four times smaller pressure! The reduc-
713
+ tion of the pressure causes the reduction of the maximum mass
714
+ and increases the star compression.
715
+ We also calculate the dimensionless tidal parameter Λ for
716
+ the CFL superconducting strange stars. The results are pre-
717
+ sented in Fig. 4. As we can be seen, the results are analogous
718
+ TABLE II. Macroscopic properties of bosonic DM admixed CFL su-
719
+ perconducting strange stars
720
+ mx (MeV)
721
+ fx
722
+ M/M⊙ R (km) R1.4 (km) Λ1.4
723
+ 100
724
+ 0.000
725
+ 2.81
726
+ 12.89
727
+ 11.57
728
+ 721
729
+ 100
730
+ 0.050
731
+ 2.83
732
+ 12.84
733
+ 11.57
734
+ 709
735
+ 100
736
+ 0.075
737
+ 2.86
738
+ 12.96
739
+ 11.58
740
+ 717
741
+ 100
742
+ 0.100
743
+ 2.88
744
+ 13.00
745
+ 11.58
746
+ 717
747
+ 400
748
+ 0.000
749
+ 2.81
750
+ 12.89
751
+ 11.57
752
+ 721
753
+ 400
754
+ 0.050
755
+ 2.63
756
+ 12.30
757
+ 11.37
758
+ 570
759
+ 400
760
+ 0.075
761
+ 2.62
762
+ 12.22
763
+ 11.32
764
+ 545
765
+ 400
766
+ 0.100
767
+ 2.61
768
+ 12.13
769
+ 11.29
770
+ 531
771
+ to the vector MIT bag model. As in the case of the mass-radius
772
+ relation, for low mass stars there is very low variation in the
773
+ Λ. For instance, for a mass mx = 100 MeV, the low masses
774
+ strange stars have similar tidal parameters, despite their DM
775
+ fraction. The tidal parameter for the canonical mass lies be-
776
+ tween 709 and 721. These values are in agreement with the
777
+ constraint Λ < 800 [55], but fail to fulfill the constraint 70
778
+ < Λ < 580 [40].
779
+ In the case of mx = 400 MeV, the results for CFL super-
780
+ conducting strange stars are again analogous to vector MIT
781
+ strange stars. The stars’ huge compression as the DM fraction
782
+ increases reduce the tidal parameter Λ. The tidal parameter
783
+ now lies around 550. This indicates that for mx = 400 MeV,
784
+ we are able to explain very massive neutron stars as the PSR
785
+ J0952-0607 [52], and simultaneously fulfills the constraints
786
+ of Λ < 800 [55] and 70 < Λ < 580 [40]. We summarize the
787
+ results of this section in Tab II.
788
+ B.
789
+ Fermionic DM
790
+ The Lagrangian of the fermionic DM reads [22, 25, 35]:
791
+ LDM = ¯χ(iγµ∂µ − (mx − gHh))χ
792
+ +1
793
+ 2(∂µh∂µh − m2
794
+ Hh2).
795
+ (15)
796
+ Here, we assume a dark fermion represented by the Dirac
797
+ field χ that self-interacts through the exchange of the Higgs
798
+ boson, whose mass is mH = 125 GeV. The coupling con-
799
+ stant is assumed to be gH = 0.1, which agrees with the con-
800
+ straints in Refs. [25, 27]. Within this prescription, the DM
801
+ self-interaction is very feeble and behaves as a free Fermi gas.
802
+ More explicitly, the strength of the interaction is:
803
+ GH =
804
+ � gH
805
+ mH
806
+ �2
807
+ = 2.492 × 10−8
808
+ fm2.
809
+ (16)
810
+ The EoS is easily obtained in mean field approximation,
811
+ completely analogous to the QHD model [41]. The fermionic
812
+ DM is assumed to be the lightest neutralino, with mx = 200
813
+ GeV, as done in Ref. [25, 35]. However, as pointed out in
814
+ Ref. [60], the lower limit for weakly interacting massive par-
815
+ ticles (WIMP) is 60 GeV. Therefore we also use mx = 60 GeV
816
+
817
+ 7
818
+ 1
819
+ 1.4
820
+ 1.8
821
+ 2.2
822
+ 2.6
823
+ 6
824
+ 7
825
+ 8
826
+ 9
827
+ 10
828
+ 11
829
+ 12
830
+ 13
831
+ mx = 200 GeV
832
+ M/M0
833
+ R (km)
834
+ kf = 0.00 GeV
835
+ kf = 0.02 GeV
836
+ kf = 0.04 GeV
837
+ kf = 0.06 GeV
838
+ 1
839
+ 1.4
840
+ 1.8
841
+ 2.2
842
+ 2.6
843
+ 6
844
+ 7
845
+ 8
846
+ 9
847
+ 10
848
+ 11
849
+ 12
850
+ 13
851
+ mx = 60 GeV
852
+ M/M0
853
+ R (km)
854
+ kf = 0.00 GeV
855
+ kf = 0.02 GeV
856
+ kf = 0.04 GeV
857
+ kf = 0.06 GeV
858
+ FIG. 5. Mass-radius relation for fermionic DM admixed strange stars
859
+ with mx = 200 GeV (top) and mx = 60 GeV (bottom).
860
+ to better study the influence of the DM mass. As in the case
861
+ of the bosonic DM, we must fix the DM fraction. As we are
862
+ dealing here with fermionic DM, we follow ref. [25, 28, 35]
863
+ and use the Fermi momentum to fix the DM fraction, using
864
+ three different values: kDM
865
+ F
866
+ = 0.02 GeV, 0.04 GeV, and 0.06
867
+ GeV.
868
+ 1. Fermionic DM within vector MIT bag model
869
+ We display in Fig. 5 the TOV solution for a fermionic DM
870
+ with a mass of 200 GeV and 60 GeV within the vector MIT
871
+ bag model. As can be seen, the results for fermionic DM are
872
+ significantly different when compared with bosonic DM. The
873
+ maximum masses are always reduced, and the star compres-
874
+ sion always increases, even for very low masses. Also, differ-
875
+ ent DM fractions always produce different mass-radius rela-
876
+ tions, affecting all the strange star families, unlike the bosonic
877
+ case, where we have very similar stars for different DM frac-
878
+ tions, which is easily understood by the different criteria of
879
+ the DM fraction. In the case of bosonic DM, the DM frac-
880
+ tion is dependent on the quark EoS via Eq. 12. In the case of
881
+ fermionic DM, the Fermi momentum is fixed and independent
882
+ of the quark EoS.
883
+ Qualitatively, the results for mx = 200 GeV and 60 GeV
884
+ TABLE III. Macroscopic properties of fermionic DM admixed
885
+ strange stars
886
+ mx (GeV) kDM
887
+ F
888
+ (GeV) M/M⊙ R (km) R1.4 (km) Λ1.4
889
+ 200
890
+ 0.000
891
+ 2.41
892
+ 11.86
893
+ 11.37
894
+ 644
895
+ 200
896
+ 0.02
897
+ 2.37
898
+ 11.75
899
+ 11.22
900
+ 586
901
+ 200
902
+ 0.04
903
+ 2.16
904
+ 10.70
905
+ 10.39
906
+ 346
907
+ 200
908
+ 0.06
909
+ 1.80
910
+ 8.72
911
+ 8.95
912
+ 108
913
+ 60
914
+ 0.000
915
+ 2.41
916
+ 11.86
917
+ 11.37
918
+ 644
919
+ 60
920
+ 0.02
921
+ 2.40
922
+ 11.84
923
+ 11.30
924
+ 625
925
+ 60
926
+ 0.04
927
+ 2.33
928
+ 11.46
929
+ 11.05
930
+ 524
931
+ 60
932
+ 0.06
933
+ 2.16
934
+ 11.31
935
+ 10.42
936
+ 351
937
+ are the same. Increasing the DM fraction compress the star
938
+ and reduces the maximum mass. Quantitatively, we see that
939
+ a higher DM mass has a strong influence once it has a higher
940
+ increase in the energy density, and at the same time, that pro-
941
+ duces a lower contribution to the pressure. The maximum
942
+ mass drops from 2.41 M⊙ for kDM
943
+ F
944
+ = 0.00 to only 1.80 M⊙
945
+ for kDM
946
+ F
947
+ = 0.06 GeV in the case of mx = 200 GeV and to 2.16
948
+ M⊙ for mx = 60 GeV. In the same sense, the radius of the
949
+ canonical star drops from 11.37 km for kDM
950
+ F
951
+ = 0.00 to only
952
+ 8.95 km for kDM
953
+ F
954
+ = 0.06 GeV in the case of mx = 200 GeV,
955
+ and to 10.42 km for mx = 60 GeV. As can be seen, the results
956
+ for kDM
957
+ F
958
+ = 0.06 GeV with mx = 200 GeV can be ruled out
959
+ once it has a very low maximum mass in disagreement with
960
+ the NICER result of the PSR J0740+6620 with a gravitational
961
+ mass of 2.08 ± 0.07 M⊙ [37], and also a very low radius for
962
+ the canonical star, in disagreement even with the low limit of
963
+ 10.1 km presented in Ref. [53].
964
+ We plot in Fig. 6 the dimensionless parameter Λ for
965
+ fermionic DM admixed strange stars with mx = 200 GeV and
966
+ mx = 60 GeV within the vector MIT bag model. As we can
967
+ see, the strong compression due to the fermionic DM contri-
968
+ bution reduces the tidal parameter significantly. In the case
969
+ with mx = 200 GeV and kDM
970
+ F
971
+ = 0.06 GeV, the tidal parame-
972
+ ter drops to only 108, which is six times lower than for kDM
973
+ F
974
+ =
975
+ 0.00, although, as we pointed out before, such parametrization
976
+ must be ruled out.
977
+ As can be seen, most of the parametrizations are able to
978
+ fulfill the main constraints for pulsar observations, i.e., M >
979
+ 2.01M⊙ and 70
980
+ <
981
+ Λ
982
+ < 580. Indeed, the presence of
983
+ DM improves the theoretical prediction and the observational
984
+ constraints, although it can be some debate about the radius of
985
+ the canonical star. They do not fulfill NICER results [38, 39]
986
+ but agree with Ref. [54].
987
+ It is also worth to point the existence of almost degenerate
988
+ results. As can be seen, for mx = 200 GeV with kDM
989
+ f
990
+ = 0.04
991
+ GeV, the macroscopic are essentially the same for the mx = 60
992
+ GeV and kDM
993
+ f
994
+ = 0.06 GeV. The main results are summarized
995
+ in Tab. III.
996
+
997
+ 8
998
+ 0
999
+ 200
1000
+ 400
1001
+ 600
1002
+ 800
1003
+ 1000
1004
+ 1.2
1005
+ 1.4
1006
+ 1.6
1007
+ 1.8
1008
+ 2
1009
+ 2.2
1010
+ 2.4
1011
+ 2.6
1012
+ mx = 200 GeV
1013
+ Λ
1014
+ M/M0
1015
+ kf = 0.00 GeV
1016
+ kf = 0.02 GeV
1017
+ kf = 0.04 GeV
1018
+ kf = 0.06 GeV
1019
+ 0
1020
+ 200
1021
+ 400
1022
+ 600
1023
+ 800
1024
+ 1000
1025
+ 1.2
1026
+ 1.4
1027
+ 1.6
1028
+ 1.8
1029
+ 2
1030
+ 2.2
1031
+ 2.4
1032
+ 2.6
1033
+ mx = 60 GeV
1034
+ Λ
1035
+ M/M0
1036
+ kf = 0.00 GeV
1037
+ kf = 0.02 GeV
1038
+ kf = 0.04 GeV
1039
+ kf = 0.06 GeV
1040
+ FIG. 6. Dimensionless tidal parameter Λ for fermionic DM admixed
1041
+ strange stars with mx = 200 GeV (top) and mx = 60 GeV (bottom).
1042
+ 2. Fermionic DM within CFL quark matter
1043
+ We now study the effect of Fermionic DM in CFL super-
1044
+ conducting matter described by the analytical approximation
1045
+ of Eq. 8.
1046
+ We display in Fig. 7 the TOV solution for a fermionic DM
1047
+ with a mass of 200 GeV and 60 GeV. As in the case of the vec-
1048
+ tor MIT bag model, for CFL superconducting quark matter,
1049
+ the results for fermionic DM are significantly different when
1050
+ compared with bosonic DM. And again, the qualitative effect
1051
+ of fermionic DM is the same for CFL as it is for the vector
1052
+ MIT bag model. The maximum masses are always reduced,
1053
+ and the star compression always increases, even for very low
1054
+ masses. Again, different DM fractions always produce differ-
1055
+ ent mass-radius relations, affecting all the strange star fami-
1056
+ lies.
1057
+ From the quantitative point of view, the maximum mass
1058
+ drops from 2.81 M⊙ for kDM
1059
+ F
1060
+ = 0.00 to 2.04 M⊙ for kDM
1061
+ F
1062
+ = 0.06 GeV in the case of mx = 200 GeV and to 2.49 M⊙
1063
+ for mx = 60 GeV. In the same sense, the radius of the canon-
1064
+ ical star drops from 11.57 km for kDM
1065
+ F
1066
+ = 0.00 to 9.21 km for
1067
+ kDM
1068
+ F
1069
+ = 0.06 GeV in the case of mx = 200 GeV, and 10.66
1070
+ km for mx = 60 GeV. Now, unlike the case of the vector MIT,
1071
+ none of the CFL superconducting strange stars can be ruled
1072
+ 1
1073
+ 1.5
1074
+ 2
1075
+ 2.5
1076
+ 3
1077
+ 6
1078
+ 7
1079
+ 8
1080
+ 9
1081
+ 10
1082
+ 11
1083
+ 12
1084
+ 13
1085
+ 14
1086
+ mx = 200 GeV
1087
+ M/M0
1088
+ R (km)
1089
+ kf = 0.00 GeV
1090
+ kf = 0.02 GeV
1091
+ kf = 0.04 GeV
1092
+ kf = 0.06 GeV
1093
+ 1
1094
+ 1.5
1095
+ 2
1096
+ 2.5
1097
+ 3
1098
+ 6
1099
+ 7
1100
+ 8
1101
+ 9
1102
+ 10
1103
+ 11
1104
+ 12
1105
+ 13
1106
+ 14
1107
+ mx = 60 GeV
1108
+ M/M0
1109
+ R (km)
1110
+ kf = 0.00 GeV
1111
+ kf = 0.02 GeV
1112
+ kf = 0.04 GeV
1113
+ kf = 0.06 GeV
1114
+ FIG. 7. Mass-radius relation for fermionic DM admixed CFL super-
1115
+ conducting strange stars with mx = 200 GeV (top) and mx = 60
1116
+ GeV (bottom).
1117
+ out in the light of the PSR J0740+6620, M
1118
+ = 2.08 ± 0.07
1119
+ M⊙ [37], although for kDM
1120
+ F
1121
+ = 0.06 GeV and mx = 200 GeV
1122
+ the radius of the canonical star is below the lower limit of 10.1
1123
+ km presented in Ref. [53].
1124
+ We plot in Fig. 8 the dimensionless parameter Λ for
1125
+ fermionic DM admixed superconducting strange stars with
1126
+ mx = 200 GeV and mx = 60 GeV. The results are completely
1127
+ analogous to the case of the vector MIT bag model; however,
1128
+ the value of Λ here is always higher. The compression due to
1129
+ the fermionic DM contribution reduces the tidal parameter. In
1130
+ the case with mx = 200 GeV and kDM
1131
+ F
1132
+ = 0.06 GeV, the tidal
1133
+ parameter drops from 721 to 151.
1134
+ It is also worth noting that some parametrizations can ful-
1135
+ fill the main constraints for pulsar observations, 70 < Λ <
1136
+ 580, and yet produce a very high maximum mass, sometimes
1137
+ reaching 2.50 M⊙. The presence of DM again improves the
1138
+ theoretical prediction and the observational constraints, al-
1139
+ though it can be some debate about the radius of the canonical
1140
+ star. They do not fulfill NICER results [38, 39], but agree with
1141
+ Ref. [54]. Moreover, most parametrizations can explain even
1142
+ the black widow pulsar PSR J0952-0607 [52].
1143
+ Finally, even when we use a different model for the quark
1144
+ matter, the existence of almost degenerate results is still
1145
+ present: for mx = 200 GeV with kDM
1146
+ f
1147
+ = 0.04 GeV and mx =
1148
+
1149
+ 9
1150
+ 0
1151
+ 200
1152
+ 400
1153
+ 600
1154
+ 800
1155
+ 1000
1156
+ 1.2
1157
+ 1.4
1158
+ 1.6
1159
+ 1.8
1160
+ 2
1161
+ 2.2
1162
+ 2.4
1163
+ 2.6
1164
+ mx = 200 GeV
1165
+ Λ
1166
+ M/M0
1167
+ kf = 0.00 GeV
1168
+ kf = 0.02 GeV
1169
+ kf = 0.04 GeV
1170
+ kf = 0.06 GeV
1171
+ 0
1172
+ 200
1173
+ 400
1174
+ 600
1175
+ 800
1176
+ 1000
1177
+ 1.2
1178
+ 1.4
1179
+ 1.6
1180
+ 1.8
1181
+ 2
1182
+ 2.2
1183
+ 2.4
1184
+ 2.6
1185
+ mx = 60 GeV
1186
+ Λ
1187
+ M/M0
1188
+ kf = 0.00 GeV
1189
+ kf = 0.02 GeV
1190
+ kf = 0.04 GeV
1191
+ kf = 0.06 GeV
1192
+ FIG. 8. Dimensionless tidal parameter Λ for fermionic DM admixed
1193
+ CFL strange stars with mx = 200 GeV (top) and mx = 60 GeV
1194
+ (bottom).
1195
+ TABLE IV. Macroscopic properties of fermionic DM admixed color
1196
+ superconducting quark stars
1197
+ mx (GeV) kDM
1198
+ F
1199
+ (GeV) M/M⊙ R (km) R1.4 (km) Λ1.4
1200
+ 200
1201
+ 0.000
1202
+ 2.81
1203
+ 12.89
1204
+ 11.57
1205
+ 721
1206
+ 200
1207
+ 0.02
1208
+ 2.75
1209
+ 12.65
1210
+ 11.43
1211
+ 653
1212
+ 200
1213
+ 0.04
1214
+ 2.50
1215
+ 11.50
1216
+ 10.67
1217
+ 421
1218
+ 200
1219
+ 0.06
1220
+ 2.04
1221
+ 9.38
1222
+ 9.21
1223
+ 151
1224
+ 60
1225
+ 0.000
1226
+ 2.81
1227
+ 12.89
1228
+ 11.57
1229
+ 721
1230
+ 60
1231
+ 0.02
1232
+ 2.78
1233
+ 12.75
1234
+ 11.53
1235
+ 694
1236
+ 60
1237
+ 0.04
1238
+ 2.69
1239
+ 12.45
1240
+ 11.28
1241
+ 610
1242
+ 60
1243
+ 0.06
1244
+ 2.49
1245
+ 11.53
1246
+ 10.66
1247
+ 422
1248
+ 60 GeV with kDM
1249
+ f
1250
+ = 0.06 GeV. The main results are summa-
1251
+ rized in Tab. IV.
1252
+ 3. Fermionic DM with a vector channel
1253
+ Now we study if the presence of a dark, repulsive vector
1254
+ channel affects the macroscopic properties of the fermionic
1255
+ DM admixed strange stars. The new Lagrangian is the La-
1256
+ grangian in Eq. 15 plus the repulsive channel and the respec-
1257
+ tive meson mass, and reads [28]:
1258
+ LVDM = gξ ¯χ(γµξµ)χ + 1
1259
+ 2m2
1260
+ ξξµξµ − 1
1261
+ 4V µνVµν.
1262
+ (17)
1263
+ The Lagrangian of Eq. 17 is analogous to the ω contribution
1264
+ to the QHD Lagrangian [5, 41]. Indeed, the junction of Eq. 15
1265
+ and Eq. 17 makes this model of DM fully analogous to the
1266
+ original σ −ω model of the QHD [41]. The coupling constant
1267
+ gξ = 0.1 is fixed, and it is equal to the gH, while the mass of
1268
+ the vector of the dark meson is assumed to be 34 MeV, follow-
1269
+ ing Ref. [28]. As the mass of the dark vector meson is 3000
1270
+ times smaller than the mass of the Higgs boson, the repulsive
1271
+ channel is much stronger than the attractive one. Indeed, we
1272
+ have
1273
+ Gξ =
1274
+ � gξ
1275
+
1276
+ �2
1277
+ = 0.337
1278
+ fm2,
1279
+ (18)
1280
+ which is stronger than the quark repulsion and millions of
1281
+ times higher than the DM scalar coupling (Eq. 16). Never-
1282
+ theless, despite the strong self-repulsion of the fermionic DM,
1283
+ the numerical results are barely affected by the repulsive chan-
1284
+ nel. For the vector MIT bag model, the only noticeable dif-
1285
+ ference appears for mx = 200 GeV and kDM
1286
+ F
1287
+ = 0.04 GeV. In
1288
+ this case, the maximum mass increase from 2.16 M⊙ to 2.17
1289
+ M⊙. The radius of the canonical star also grows from 11.39
1290
+ km to 11.46 km. The tidal parameter Λ1.4 also increases from
1291
+ 346 to 358. It is worth noticing that all these variations are far
1292
+ beyond the precision with which experimental measurements
1293
+ are made. All the other parametrizations present even lower
1294
+ (or none) differences. Herefore, we do not provide any figures
1295
+ in this section since they would be visually indistinguishable
1296
+ from those in the last paragraph. We only display the main
1297
+ results in Tab. V. In the case of CFL superconducting quark
1298
+ matter, the differences are even smaller!
1299
+ The nature of the vector coupling can explain why the
1300
+ differences are so small. The vector mesons couple to the
1301
+ number density, and we are dealing with a very low-density
1302
+ regime. Indeed, even kDM
1303
+ F
1304
+ = 0.06 GeV implies a number den-
1305
+ sity is around 9.6 × 10−4 fm−3. Of course, we could increase
1306
+ the repulsion of the dark vector boson, but we believe this
1307
+ would be very unrealistic since DM was proposed to explain
1308
+ higher attraction in galaxy curves [61].
1309
+ IV.
1310
+ CONCLUSIONS
1311
+ In this work, we calculate the properties for the DM ad-
1312
+ mixed for strange quark stars. We use two different mod-
1313
+ els for the quark model: the vector MIT bag model, as pre-
1314
+ sented in Refs. [5, 6] and the CFL color superconducting
1315
+ quark matter via an analytical approximation, as discussed
1316
+ in Refs. [42, 44, 45]; and two different kinds of dark mat-
1317
+ ter: a bosonic as discussed in Refs. [27, 46, 47, 49] and for
1318
+ fermionic [22, 25, 35]. For each kind of DM, we use two
1319
+ different mass values, and the strange stars always agree with
1320
+ the Bodmer-Witten conjecture [3, 4]. Our main conclusions
1321
+ can be summarized as follows:
1322
+
1323
+ 10
1324
+ TABLE V. Macroscopic properties of dark vector boson fermionic
1325
+ DM admixed strange stars within the vector MIT bag model. The
1326
+ only significant differences are for kDM
1327
+ F
1328
+ = 0.04 GeV
1329
+ mx (GeV) kDM
1330
+ F
1331
+ (GeV) M/M⊙ R (km) R1.4 (km) Λ1.4
1332
+ 200
1333
+ 0.000
1334
+ 2.41
1335
+ 11.86
1336
+ 11.37
1337
+ 644
1338
+ 200
1339
+ 0.02
1340
+ 2.37
1341
+ 11.75
1342
+ 11.22
1343
+ 586
1344
+ 200
1345
+ 0.04
1346
+ 2.17
1347
+ 10.70
1348
+ 10.46
1349
+ 358
1350
+ 200
1351
+ 0.06
1352
+ 1.80
1353
+ 8.72
1354
+ 9.01
1355
+ 112
1356
+ 60
1357
+ 0.000
1358
+ 2.41
1359
+ 11.86
1360
+ 11.37
1361
+ 644
1362
+ 60
1363
+ 0.02
1364
+ 2.40
1365
+ 11.84
1366
+ 11.30
1367
+ 625
1368
+ 60
1369
+ 0.04
1370
+ 2.33
1371
+ 11.46
1372
+ 11.10
1373
+ 532
1374
+ 60
1375
+ 0.06
1376
+ 2.16
1377
+ 11.31
1378
+ 10.43
1379
+ 353
1380
+ • The qualitative results for DM admixed strange stars are
1381
+ independent of the quark model utilized. This is true for
1382
+ both bosonic and fermionic, as well it is independent of
1383
+ the DM mass.
1384
+ • For a bosonic DM with a mass of mx = 100 MeV, we
1385
+ have an increase of the maximum mass, while the prop-
1386
+ erties of low-mass strange stars are not significantly af-
1387
+ fected. This is the only case in that we have an in-
1388
+ crease in the star’s mass. Such a situation happens for
1389
+ the vector MIT, the CFL superconducting quark mat-
1390
+ ter, and also for the massless MIT, as pointed out in
1391
+ Refs. [27, 49].
1392
+ • For a bosonic DM with a mass of mx = 400 MeV, we
1393
+ have a decrease of the maximum mass, whilst the radii
1394
+ of the low-mass strange stars, in this case, are also af-
1395
+ fected.
1396
+ • For a fermionic DM, the maximum mass always de-
1397
+ creases. The higher the DM fraction, the lower the max-
1398
+ imum mass, and the smaller the radii. Also, the higher
1399
+ the DM mass, the higher the stellar compression and the
1400
+ lower the maximum mass.
1401
+ • Although we introduce a repulsive dark vector field
1402
+ with a mass 3000 times smaller than the attractive scalar
1403
+ field, we do not find significant variation in the stellar
1404
+ macroscopic properties.
1405
+ • There are almost degenerate results both for mx = 200
1406
+ GeV with kDM
1407
+ f
1408
+ = 0.04 GeV and mx = 60 GeV with
1409
+ kDM
1410
+ f
1411
+ = 0.06 GeV, the maximum mass, as well the prop-
1412
+ erties of the canonical star are essentially the same.
1413
+ • About the observational constraints, we can see that the
1414
+ mass of the PSR J0740+6620 pulsar, M = 2.08 ± 0.07
1415
+ M⊙ [37] is easily obtained. Even the mass range of
1416
+ 2.35 ± 0.17 M⊙ of the black widow pulsar PSR J0952-
1417
+ 0607 [52] can be reached for some parametrization.
1418
+ • The radius of the canonical star is still a matter of de-
1419
+ bate. Most of our results point to a radius between 11.0
1420
+ km to 11.5 km. In general, our results are in agreement
1421
+ with Ref. [54] but are too low to reproduce the NICER
1422
+ results [38, 39] whilst at the same time are too high to
1423
+ agree with Ref. [53].
1424
+ • Except for bosonic DM with a mass of mx = 100 MeV,
1425
+ in all other cases, the presence of the DM reduces the
1426
+ dimensionless tidal parameter Λ. In most of these cases,
1427
+ the constraint 70 < Λ < 580 [40] is easily fulfilled.
1428
+ [1] E. Annala, T. Gorda, A. Kurkela, J. N¨attil¨a, and A. Vuorinen,
1429
+ Nature Physics 16, 907 (2020).
1430
+ [2] R. X. Xu, Symposium - Intern. Astron. U. 214, 191 (2003).
1431
+ [3] A. R. Bodmer, Phys. Rev. D 4, 1601 (1971).
1432
+ [4] E. Witten, Phys. Rev. D 30, 272 (1984).
1433
+ [5] L. L. Lopes, C. Biesdorf, and D. P. Menezes, Physica Scripta
1434
+ 96, 065303 (2021).
1435
+ [6] L. L. Lopes, C. Biesdorf, and D. P. Menezes, Monthly Notices
1436
+ of the Royal Astronomical Society 512, 5110 (2022).
1437
+ [7] E.-P. Zhou, X. Zhou, and A. Li, Phys. Rev. D 97, 083015
1438
+ (2018).
1439
+ [8] A. Aziz, S. Ray, F. Rahaman, M. Khlopov, and B. K. Guha,
1440
+ International Journal of Modern Physics D 28, 1941006 (2019).
1441
+ [9] M. Alford, Journal of Physics G: Nuclear and Particle Physics
1442
+ 30, S441 (2003).
1443
+ [10] I. A. Shovkovy, Foundations of Physics 35, 1309 (2005).
1444
+ [11] M. G. Alford, A. Schmitt, K. Rajagopal, and T. Sch¨afer, Rev.
1445
+ Mod. Phys. 80, 1455 (2008).
1446
+ [12] M. Alford and S. Reddy, Phys. Rev. D 67, 074024 (2003).
1447
+ [13] A. Drago, A. Lavagno, and G. Pagliara, Phys. Rev. D 69,
1448
+ 057505 (2004).
1449
+ [14] C. V. Flores and G. Lugones, Phys. Rev. C 95, 025808 (2017).
1450
+ [15] I. Lopes and J. Silk, Phys. Rev. D 99, 023008 (2019).
1451
+ [16] R. S. Bogadi, M. Govender, and S. Moyo, Phys. Rev. D 102,
1452
+ 043026 (2020).
1453
+ [17] A. Li, Z.-Q. Miao, J.-L. Jiang, S.-P. Tang, and R.-X. Xu,
1454
+ Monthly Notices of the Royal Astronomical Society 506, 5916
1455
+ (2021).
1456
+ [18] X.-J. Wen, Phys. Rev. D 88, 034031 (2013).
1457
+ [19] H. Liang and X.-J. Wen, International Journal of Modern
1458
+ Physics A 34, 1950170 (2019).
1459
+ [20] Z. Roupas, G. Panotopoulos, and I. Lopes, Phys. Rev. D 103,
1460
+ 083015 (2021).
1461
+ [21] Z. Miao, J.-L. Jiang, A. Li, and L.-W. Chen, The Astrophysical
1462
+ Journal Letters 917, L22 (2021).
1463
+ [22] O. Lourenc¸o, C. H. Lenzi, M. Dutra, E. J. Ferrer, V. de la In-
1464
+ cera, L. Paulucci, and J. E. Horvath, Phys. Rev. D 103, 103010
1465
+ (2021).
1466
+ [23] N. F. Bell, G. Busoni, M. E. Ramirez-Quezada, S. Robles, and
1467
+ M. Virgato, Journal of Cosmology and Astroparticle Physics
1468
+ 2021 (10), 083.
1469
+ [24] H. C. Das, A. Kumar, B. Kumar, S. Kumar Biswal, T. Nakat-
1470
+ sukasa, A. Li, and S. K. Patra, Mon. Not. Roy. Astron. Soc. 495,
1471
+ 4893 (2020), arXiv:2002.00594 [nucl-th].
1472
+ [25] H. Das, A. Kumar, B. Kumar, S. Biswal, and S. Patra, Journal
1473
+ of Cosmology and Astroparticle Physics 2021 (01), 007.
1474
+
1475
+ 11
1476
+ [26] H. C. Das, A. Kumar, and S. K. Patra, Phys. Rev. D 104, 063028
1477
+ (2021), arXiv:2109.01853 [astro-ph.HE].
1478
+ [27] G. Panotopoulos and I. Lopes, Phys. Rev. D 96, 023002 (2017).
1479
+ [28] A. Guha and D. Sen, Journal of Cosmology and Astroparticle
1480
+ Physics 2021 (09), 027.
1481
+ [29] A. Green and P. Tanedo, Computer Physics Communications
1482
+ 242, 120 (2019).
1483
+ [30] E. Aprile, M. Alfonsi, K. Arisaka, et al. (XENON100 Collabo-
1484
+ ration), Phys. Rev. Lett. 109, 181301 (2012).
1485
+ [31] E. Aprile, J. Aalbers, F. Agostini, et al. (XENON Collaboration
1486
+ 7), Phys. Rev. Lett. 121, 111302 (2018).
1487
+ [32] R. Agnese, T. Aralis, T. Aramaki, et al., Phys. Rev. Lett. 121,
1488
+ 051301 (2018).
1489
+ [33] D. Akerib, X. Bai, E. Bernard, et al., Astroparticle Physics 45,
1490
+ 34 (2013).
1491
+ [34] Q. Wang, A. Abdukerim, W. Chen, and others (PandaX-II Col-
1492
+ laboration), Chinese Physics C 44, 125001 (2020).
1493
+ [35] O. Lourenc¸o, T. Frederico, and M. Dutra, Phys. Rev. D 105,
1494
+ 023008 (2022).
1495
+ [36] H. T. Cromartie, E. Fonseca, S. M. Ransom, et al., Nature As-
1496
+ tronomy 4, 72 (2020).
1497
+ [37] E. Fonseca, H. T. Cromartie, T. T. Pennucci, et al., The Astro-
1498
+ physical Journal Letters 915, L12 (2021).
1499
+ [38] M. C. Miller, F. K. Lamb, A. J. Dittmann, et al., The Astrophys-
1500
+ ical Journal 887, L24 (2019).
1501
+ [39] T. E. Riley, A. L. Watts, S. Bogdanov, et al., The Astrophysical
1502
+ Journal 887, L21 (2019).
1503
+ [40] B. P. Abbott, R. Abbott, T. D. Abbott, et al. (The LIGO Sci-
1504
+ entific Collaboration and the Virgo Collaboration), Phys. Rev.
1505
+ Lett. 121, 161101 (2018).
1506
+ [41] B. D. Serot, Reports on Progress in Physics 55, 1855 (1992).
1507
+ [42] J. L. Zdunik and P. Haensel, Astronomy and Astrophysics 551,
1508
+ A61 (2013).
1509
+ [43] B. K. Agrawal, Phys. Rev. D 81, 023009 (2010).
1510
+ [44] S. Han and A. W. Steiner, Phys. Rev. D 99, 083014 (2019).
1511
+ [45] M. G. Alford, S. Han, and M. Prakash, Phys. Rev. D 88, 083013
1512
+ (2013).
1513
+ [46] X. Li, T. Harko, and K. Cheng, Journal of Cosmology and As-
1514
+ troparticle Physics 2012 (06), 001.
1515
+ [47] X. Li, F. Wang, and K. Cheng, Journal of Cosmology and As-
1516
+ troparticle Physics 2012 (10), 031.
1517
+ [48] F. Dalfovo, S. Giorgini, L. P. Pitaevskii, and S. Stringari, Rev.
1518
+ Mod. Phys. 71, 463 (1999).
1519
+ [49] I. Lopes and G. Panotopoulos, Phys. Rev. D 97, 024030 (2018).
1520
+ [50] D. Rafiei Karkevandi, S. Shakeri, V. Sagun, and O. Ivanytskyi,
1521
+ Phys. Rev. D 105, 023001 (2022).
1522
+ [51] J. R. Oppenheimer and G. M. Volkoff, Phys. Rev. 55, 374
1523
+ (1939).
1524
+ [52] R. W. Romani, D. Kandel, A. V. Filippenko, T. G. Brink, and
1525
+ W. Zheng, The Astrophysical Journal Letters 934, L17 (2022).
1526
+ [53] F. ¨Ozel, D. Psaltis, T. G¨uver, G. Baym, C. Heinke, and S. Guil-
1527
+ lot, Astrophys. J. 820, 28 (2016).
1528
+ [54] C. D. Capano, I. Tews, S. M. Brown, B. Margalit, S. De, S. Ku-
1529
+ mar, D. A. Brown, B. Krishnan, and S. Reddy, Nature Astron-
1530
+ omy 4, 625 (2020).
1531
+ [55] B. P. Abbott, R. Abbott, T. D. Abbott, et al. (LIGO Scientific
1532
+ Collaboration and Virgo Collaboration), Phys. Rev. Lett. 119,
1533
+ 161101 (2017).
1534
+ [56] Flores, Cesar V., Lopes, Luiz L., Castro, Luis B., and Menezes,
1535
+ D´ebora P., Eur. Phys. J. C 80, 1142 (2020).
1536
+ [57] K.
1537
+ Chatziioannou,
1538
+ Gen.
1539
+ Rel.
1540
+ Grav.
1541
+ 52,
1542
+ 109
1543
+ (2020),
1544
+ arXiv:2006.03168 [gr-qc].
1545
+ [58] S. Postnikov, M. Prakash, and J. M. Lattimer, Phys. Rev. D 82,
1546
+ 024016 (2010).
1547
+ [59] L. L. Lopes and D. P. Menezes, The Astrophysical Journal 936,
1548
+ 41 (2022).
1549
+ [60] I. P. Lopes and J. Silk, Phys. Rev. Lett. 88, 151303 (2002).
1550
+ [61] G. Bertone and D. Hooper, Rev. Mod. Phys. 90, 045002 (2018).
1551
+
H9AyT4oBgHgl3EQfrvmy/content/tmp_files/load_file.txt ADDED
The diff for this file is too large to render. See raw diff
 
I9FAT4oBgHgl3EQfux7Z/content/tmp_files/2301.08672v1.pdf.txt ADDED
@@ -0,0 +1,1521 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ arXiv:2301.08672v1 [math.CT] 20 Jan 2023
2
+ ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
3
+ OLIVIA MONJON, J´ERˆOME SCHERER, AND FLORENCE STERCK
4
+ Abstract. The correspondence between the concept of conditional flatness and admissibil-
5
+ ity in the sense of Galois appears in the context of localization functors in any semi-abelian
6
+ category admitting a fiberwise localization. It is then natural to wonder what happens in
7
+ the category of crossed modules where fiberwise localization is not always available. In this
8
+ article, we establish an equivalence between conditional flatness and admissibility in the
9
+ sense of Galois (for the class of regular epimorphisms) for regular-epi localization functors.
10
+ We use this equivalence to prove that nullification functors are admissible for the class of
11
+ regular epimorphisms, even if the kernels of their localization morphisms are not acyclic.
12
+ Introduction
13
+ It is a natural question to ask whether the pullback of a nice extension inherits these
14
+ nice properties. When working with localization functors or reflections one particularly nice
15
+ feature for an extension is flatness. We say that an extension is L-flat, for a localization
16
+ functor L, if applying L to the extension yields another extension, see Definition 2.1. The
17
+ question is thus to understand when the pullback of an L-flat extension is again L-flat.
18
+ Such questions have been studied first in a homotopical context by Berrick and Farjoun,
19
+ [1]. For homotopical localization functors in the category of topological spaces (in the sense
20
+ of Bousfield, [5], see also Farjoun’s book [13]), preservation of L-flatness (for fiber sequences)
21
+ under pullbacks was shown to be equivalent for L to be a so-called nullification functor. The
22
+ situation is surprisingly more delicate in the category of groups. Farjoun and the second
23
+ author proved for example that all nilpotent quotient functors have this nice property, which
24
+ they called conditional flatness, see [14].
25
+ The standard strategy to establish conditional flatness for a localization functor consists
26
+ in a few reduction steps culminating in a simpler form, which Gran identified as admissibility
27
+ in the sense of Galois for the class of regular epimorphisms [17, Proposition 3.3]. This shifted
28
+ the study of conditional flatness in homotopy theory to that of admissibility in semi-abelian
29
+ categories, see [15]. Admissibility had been introduced by Janelidze and Kelly in [17] and
30
+ has since then played a central role in the categorical study of extensions, let us mention for
31
+ example Everaert, Gran, and Van der Linden’s work in [12].
32
+ In this article we study admissibility for localization functors in the category of crossed
33
+ modules (of groups), a category of interest to both topologists due to Whitehead’s work on
34
+ connected 2-types, [25], and algebraists since Brown and Spencer [7] proved the equivalence
35
+ between crossed modules and internal groupoids in the category of groups (a result that
36
+ they credit to Verdier). This equivalence relates two interesting notions and allows one to
37
+ deal with the concept of internal groupoid in an alternative way, that is useful for compu-
38
+ tations. Moreover, crossed modules form a semi-abelian category in the sense of Janelidze,
39
+ 2020 Mathematics Subject Classification. 18G45, 55P60, 18E50, 55R70, 18E13.
40
+ Key words and phrases. Crossed modules, Localization functors, Admissibility, Regular epimorphisms,
41
+ Conditional flatness, Nullifications.
42
+ 1
43
+
44
+ 2
45
+ OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
46
+ M´arki and Tholen, [18]. We adopt the algebraic point of view here and continue our work
47
+ started in [22]. Indeed, among the reduction steps we have mentioned above, the first one
48
+ calls on fiberwise localization techniques. For group theoretical localization and homotopy
49
+ localization functors, it allows one to reduce the study to extensions with local kernel (fiber).
50
+ Fiberwise localization techniques are available in the category of groups thanks to work of
51
+ Casacuberta and Descheemaeker, [10], but we proved in [22] that they are not at hand in
52
+ general for crossed modules. Our aim in this article is thus to modify the strategy to be able
53
+ to study admissibility in this setting.
54
+ We focus on localization functors such that the co-augmentation morphism ℓT: T → LT is
55
+ a regular epimorphism for all crossed modules T. We call them regular-epi localization and
56
+ notice that many examples of interest are provided by nullification functors, as defined in
57
+ Definition 1.10. Any crossed module A determines a nullification functor PA that “kills” all
58
+ morphisms from A and there are other regular-epi localization functors such as abelianization.
59
+ One first important observation which makes the reduction strategy viable is that, even
60
+ though fiberwise localization does not exist in general, even for nullification functors, we can
61
+ use this tool for certain extensions.
62
+ Lemma 2.5. Let L be a regular-epi localization. Let
63
+ (1)
64
+ T
65
+ Q
66
+ N
67
+ 1
68
+ 1
69
+ κ
70
+ α
71
+ be an L-flat exact sequence of crossed modules and g : Q′ → Q a morphism of crossed modules.
72
+ Then, we can construct the fiberwise localization of the pullback of (1) along g:
73
+ N
74
+ N
75
+ T′
76
+ T
77
+ Q′
78
+ Q
79
+ 1
80
+ 1
81
+ 1
82
+ 1
83
+ κ
84
+ πT
85
+ κ′
86
+ g
87
+ πQ′
88
+ α
89
+ This allows us to relate conditional flatness with admissibility, in the same spirit as what
90
+ was done in the category of groups, [14], or in the wider context of semi-abelian categories
91
+ where fiberwise localization exists, [15]. A localization functor L is said to be admissible for
92
+ the class of regular epimorphisms if it preserves any pullback of the form
93
+ LT
94
+ T′
95
+ Q
96
+ LQ
97
+ πLT
98
+ ℓQ
99
+ πQ
100
+ α
101
+ where α is a regular epimorphism between L-local objects.
102
+ Theorem 3.4.
103
+ Let L be a regular-epi localization functor. Then the following statements
104
+ are equivalent
105
+ (1) L is conditionally flat;
106
+ (2) L is admissible for the class of regular epimorphisms.
107
+ One difference between groups and crossed modules and maybe the main source of com-
108
+ plication is highlighted by the behavior of kernels. This was already the reason why one
109
+
110
+ ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
111
+ 3
112
+ cannot always construct fiberwise localization and we were also surprised to find examples of
113
+ nullification functors for which the kernel of the nullification morphism ℓT : T → PAT is not
114
+ always PA-acyclic, see [22, Proposition 4.6]. For groups and spaces, this property actually
115
+ characterizes nullification functors.
116
+ Still we prove here that acyclic kernels implies admissibility and in Proposition 4.3, that if
117
+ the kernels of the localization morphisms are Lf-acyclic, then Lf is a nullification functor. Well
118
+ behaved nullification functors are therefore admissible, but what about arbitrary nullification
119
+ functors, for which fiberwise localization does not necessarily exist and for which the kernel of
120
+ the nullification is not necessarily acyclic? By carefully looking at the inductive construction
121
+ of PAT we show our main result, namely that all nullification functors are admissible.
122
+ Theorem 5.5. Let A be any crossed module. The nullification functor PA is admissible for
123
+ the class of regular epimorphisms.
124
+ We end this introduction with a short outline. The first section consists of preliminaries
125
+ that we use in the rest of the article. Then in Section 2 we introduce L-flat exact sequences
126
+ and conditionally flat localization functors in the context of crossed modules. We show how to
127
+ construct fiberwise localization of L-flat exact sequences. The third section is essential in the
128
+ development of a simpler characterisation of conditional flatness: It provides an equivalence
129
+ with the notion of admissibility in the specific context of regular-epi localization functors. In
130
+ Section 4 the link between L-acyclicity and admissibility is established and the last section
131
+ is devoted to the proof that every nullification functor is admissible.
132
+ Acknowledgments. We would like to thank Marino Gran for sharing his insight about
133
+ admissibility.
134
+ 1. Preliminaries
135
+ 1.1. The semi-abelian category of crossed modules. In this subsection, following Norrie
136
+ [23] and Brown-Higgins [6], we provide the basic definitions and notation concerning crossed
137
+ modules.
138
+ Definition 1.1. [25] A crossed module of groups is a pair of groups T1 and T2, an action by
139
+ group automorphisms of T2 on T1, denoted by T2 × T1 → T1 : (b, t) �→
140
+ bt, together with a
141
+ group homomorphism ∂T : T1 → T2 such that for any b in T2 and any t, s in T1,
142
+ (2)
143
+ ∂T( bt) = b∂T(t)b−1,
144
+ (3)
145
+ ∂T(t)s = tst−1.
146
+ Hence we often write a crossed module as a triple (T1, T2, ∂T), or simply T for short, and
147
+ we refer sometimes to ∂T as the connecting morphism.
148
+ Definition 1.2. Let N := (N1, N2, ∂N) and M := (M1, M2, ∂M) be two crossed modules. A
149
+ morphism of crossed modules α: N → M is a pair of group homomorphisms α1: N1 → M1
150
+ and α2 : N2 → M2 such that the two following diagrams commute
151
+ N2
152
+ N1
153
+ M1
154
+ M2
155
+ ∂N
156
+ ∂M
157
+ α1
158
+ α2
159
+ M2 × M1
160
+ N2 × N1
161
+ N1
162
+ M1.
163
+ (α2, α1)
164
+ α1
165
+
166
+ 4
167
+ OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
168
+ where the horizontal arrows in the diagram on the right are the respective group actions of
169
+ the two crossed modules.
170
+ We write XMod for the category of crossed modules of groups.
171
+ Remark 1.3. There is an embedding of the category of groups in this category via two
172
+ functors which are respectively left and right adjoint to the truncation functor Tr: XMod →
173
+ Grp that sends a crossed module T := (T1, T2, ∂T) to T2. The functor X: Grp → XMod which
174
+ sends a group G to the crossed module XG = (1, G, 1) reduced to the group G at level 2 is
175
+ the left adjoint functor and the functor R: Grp → XMod: G �→ (G, G, IdG) is the right ajoint
176
+ functor. This will help us to import group theoretical results into XMod.
177
+ There is an obvious notion of subcrossed module, see [23]. One simply requires the sub-
178
+ object to be made levelwise of subgroups, the connecting homomorphism and the action are
179
+ induced by the given connecting homomorphism and action. The notion of normality is less
180
+ obvious.
181
+ Definition 1.4. A subcrossed module N := (N1, N2, ∂N) of T := (T1, T2, ∂T) is normal if the
182
+ following three conditions hold
183
+ (1) N2 is a normal subgroup of T2;
184
+ (2) for any t2 ∈ T2 and n1 ∈ N1, we have t2n1 ∈ N1;
185
+ (3) [N2, T1] := ⟨ n2t1t−1
186
+ 1
187
+ | t1 ∈ T1, n2 ∈ N2⟩ ⊆ N1.
188
+ In contrast to limits, which are built component-wise, colimits are generally more delicate
189
+ to construct. In particular, the construction of cokernels is not straightforward, but when
190
+ N is a normal subcrossed module of T the cokernel is simply the levelwise quotient by the
191
+ normal subgroups N1 ⊳ T1 and N2 ⊳ T2.
192
+ The category of crossed modules shares many nice properties with the category of groups.
193
+ The traditional homological lemmas, [2], the Split Short Five Lemma, [3], and the Noether
194
+ Isomorphism Theorems, [2], hold.
195
+ One can recognize pullbacks by looking at kernels or
196
+ cokernels, [2, Lemmas 4.2.4 and 4.2.5], and in fact Xmod is a semi-abelian category, as
197
+ introduced by Janelidze, M´arki, and Tholen in [18]. This is shown in [18]. There is one result
198
+ we will use several times in this article, namely [2, Lemma 4.2.4], which we recall now.
199
+ Proposition 1.5. Let C be a semi-abelian (or homological) category. Consider the following
200
+ diagram of exact rows:
201
+ T ′
202
+ Q′
203
+ N′
204
+ T
205
+ Q
206
+ N
207
+ 1
208
+ 1
209
+ 1
210
+ (2)
211
+ w
212
+ u
213
+ v
214
+ κ
215
+ α
216
+ κ′
217
+ α′
218
+ Then the following statements hold.
219
+ (1) If u is an isomorphism then (2) is a pullback.
220
+ (2) If u and w are regular epimorphisms then v is also a regular epimorphism.
221
+ 1.2. Localization functors. In this subsection we recall the definition of localization func-
222
+ tors in the category of crossed modules. We also recall some important properties of such
223
+ functor as well as some examples.
224
+
225
+ ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
226
+ 5
227
+ Definition 1.6. A localization functor in the category of crossed modules is a coaugmented
228
+ idempotent functor L: XMod → XMod. The coaugmentation ℓ: Id → L is a natural transfor-
229
+ mation such that ℓLX and LℓX are isomorphisms.
230
+ In particular we have ℓLX = LℓX, see [9, Proposition 1.1].
231
+ Definition 1.7. Let L be a localization functor. A crossed module T is L-local if ℓT : T → LT
232
+ is an isomorphism. A morphism f : N → M is an L-equivalence if Lf is an isomorphism.
233
+ We recall a few basic and useful closure properties of L-equivalences.
234
+ Lemma 1.8.
235
+ (1) The pushout of an L-equivalence is an L-equivalence.
236
+ (2) The composition of L-equivalences is an L-equivalence.
237
+ (3) A κ-filtered colimit of a diagram Tβ of L-equivalences Tβ → Tβ+1 for all successor
238
+ ordinals β + 1 < κ yields an L-equivalence T0 → Tκ = colimβ<κTβ.
239
+ (4) Let F be an I-indexed diagram of L-equivalences in the category of morphisms of
240
+ crossed modules. Then the colimit colimIF is an L-equivalence.
241
+ Sometimes a localization functor L is associated to a full reflexive subcategory L of XMod.
242
+ The pair of adjoint functors U: L ⇆ XMod: F provides a localization functor L = FU, as
243
+ Cassidy, H´ebert, and Kelly do in [11]. Some other times there is a morphism f one wishes
244
+ to invert so as to construct a localization functor often written Lf.
245
+ Definition 1.9. Let f be a morphism of crossed modules. A crossed module T is Lf-local if
246
+ Hom(f, T) is an isomorphism. A morphism g in XMod is an Lf-equivalence if Hom(g, T) is
247
+ an isomorphism for any Lf-local crossed module T.
248
+ Such localization functors exist in XMod, see for example Bousfield’s foundational work
249
+ [4]. Local objects and local equivalences coincide then with the notions introduced in Defini-
250
+ tion 1.7. Proposition 1.8 is the analogue of Hirschhorn’s [16, Proposition 1.2.20 and Propo-
251
+ sition 1.2.21].
252
+ If the codomain of the morphism f is the trivial crossed module, the functor Lf is of
253
+ particular interest.
254
+ Definition 1.10. Let A be a crossed module and f be the morphism A → 1. The localization
255
+ functor Lf is then written PA and is called a nullification functor. An f-local object is called
256
+ A-null, or A-local and a crossed module T is A-acyclic if PAT = 1. The localization morphism
257
+ ℓT : T → PAT is written pT.
258
+ Proposition 1.11. Let A and T be crossed modules. Then there exists an ordinal λ depending
259
+ on A such that PAT is constructed as a transfinite filtered colimit of a diagram of the form
260
+ T = T0 → T1 → · · · → Tβ → . . . for β < λ where all morphisms are PA-equivalences and
261
+ regular epimorphims.
262
+ This inductive construction has been carefully described in [22, Proposition 2.8]. The rea-
263
+ son why each step is a PA-equivalence and a regular epimorphism is that Tβ+1 is constructed
264
+ from Tβ by taking the cokernel of all morphisms A → Tβ. We recall the details and use
265
+ them in Section 5. There is a larger class of localization functors we investigate in this se-
266
+ quel to [22]. They share with PA the property that the localization morphism is a regular
267
+ epimorphism.
268
+ Definition 1.12. A localization functor L is a regular-epi localization if for any crossed
269
+ module T the coaugmentation ℓT: T → LT is a regular epimorphism.
270
+
271
+ 6
272
+ OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
273
+ Remark 1.13. In the category of crossed modules, a morphism α = (α1, α2) is a regular
274
+ epimorphism (a coequalizer of a pair of parallel arrows) if and only if both α1 and α2 are sur-
275
+ jective group homomorphisms [20, Proposition 2.2]. A surjective homomorphism of crossed
276
+ modules is an epimorphism but there exist epimorphisms that are not surjective. In a pointed
277
+ protomodular category such as XMod, regular epimorphisms and normal epimorphisms (the
278
+ cokernel of some morphism) coincide.
279
+ We present now some interesting examples of localization functors that will illustrate our
280
+ results in the rest of the article, see also the end of [22, Section 2].
281
+ Example 1.14. The nullification functor PXZ with respect to the crossed module XZ is given
282
+ by:
283
+ PXZ
284
+
285
+
286
+
287
+
288
+
289
+ N1
290
+ N2
291
+
292
+
293
+
294
+
295
+
296
+  =
297
+ N1/[N2, N1]
298
+ 1
299
+ Example 1.15. The abelianization functor Ab: XMod → XMod is already described in [24].
300
+ It is defined by:
301
+ Ab
302
+
303
+
304
+
305
+
306
+
307
+ N1
308
+ N2
309
+
310
+
311
+
312
+
313
+
314
+  =
315
+ N1/[N2, N1]
316
+ N2/[N2, N2]
317
+ ˜∂
318
+ Example 1.16. Our third and last example of localization functor of crossed modules is
319
+ I: XMod → XMod, see [22, Example 2.15]:
320
+ I
321
+
322
+
323
+
324
+
325
+
326
+ N1
327
+ N2
328
+ ∂N
329
+
330
+
331
+
332
+
333
+  =
334
+ N2
335
+ N2
336
+ IdN2
337
+ This functor is induced by the adjunction between the truncation functor Tr: XMod → Grp,
338
+ defined by Tr(T1, T2, ∂T) = T2, see Remark 1.3, and its right adjoint R: Grp → XMod that
339
+ sends a group T to (T, T, IdT).
340
+ Remark 1.17. The functor considered in Example 1.14 is a regular-epi localization, since all
341
+ nullification functors are so. However regular-epi localizations are not nullification functors in
342
+ general as illustrated by the functor Ab in Example 1.15. Indeed, if Ab were a nullification PA,
343
+ then A = (A1, A2, ∂A) would be a perfect crossed module, i.e. one such that Ab(A) = (1, 1, Id).
344
+ In particular, the group A2 would be a perfect group. But then PA(XS3) = XS3 since there
345
+ are no non-trivial homomorphisms from a perfect group to the symmetric group S3. But we
346
+ know that Ab(XS3) = XC2, where C2 is the cyclic group of order two, so abelianization is not
347
+ a nullification.
348
+ We finally note that a localization functor Lf is a regular-epi localization functor if f itself
349
+ is a regular epimorphism, an analogous observation appears in [8] for groups.
350
+ To conclude these preliminaries, let us recall the notion of fiberwise localization.
351
+ We
352
+ introduced this for crossed modules in [22, Definition 3.1], but this is not new, for spaces a
353
+ good reference is [13, Section I.F].
354
+
355
+ ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
356
+ 7
357
+ Definition 1.18. Let L: XMod → XMod be a localization functor. An exact sequence
358
+ T
359
+ Q
360
+ N
361
+ 1
362
+ 1
363
+ κ
364
+ α
365
+ admits a fiberwise localization if there exists a commutative diagram of horizontal exact
366
+ sequences
367
+ T
368
+ Q
369
+ N
370
+ E
371
+ Q
372
+ LN
373
+ 1
374
+ 1
375
+ 1
376
+ 1
377
+ κ
378
+ j
379
+ ℓN
380
+ p
381
+ α
382
+ g
383
+ where g is an L-equivalence.
384
+ The following theorem is a fusion of two results from [22] namely Theorem 3.4 and Corollary
385
+ 3.7. From now on, every localization functor that we consider is a regular-epi localization.
386
+ Theorem 1.19. Let L: XMod → XMod be a regular-epi localization functor. An exact se-
387
+ quence of crossed modules
388
+ (4)
389
+ T
390
+ Q
391
+ N
392
+ 1
393
+ 1
394
+ κ
395
+ α
396
+ admits a fiberwise localization if and only if we have the following inclusion
397
+ (5)
398
+ [κ2(ker(ℓN
399
+ 2 )), T1] ⊆ κ1(ker(ℓN
400
+ 1 ))
401
+ 2. Fiberwise localization and flatness
402
+ In this section, we investigate the fiberwise localization of L-flat exact sequences and their
403
+ pullbacks in the context of regular-epi localization functors of crossed modules L: XMod →
404
+ XMod (even if this notion is not defined only for regular-epi functor as we will see in Propo-
405
+ sition 5.6). This section will be essential to study the link between conditionally flatness
406
+ and admissibility in Section 3. First, let us recall the definitions of L-flat and conditionally
407
+ flatness.
408
+ Definition 2.1. Let L be a localization functor, a short exact sequence
409
+ T
410
+ Q
411
+ N
412
+ 1
413
+ 1
414
+ κ
415
+ α
416
+ is called L-flat if the sequence
417
+ LT
418
+ LQ
419
+ LN
420
+ L(κ)
421
+ L(α)
422
+ is a short exact sequence.
423
+ Remark 2.2. We recall that limits are computed componentwise in the category of crossed
424
+ modules. In the case of pullbacks in XMod they are built as follows [19]. Let α: T → Q and
425
+ g : Q′ → Q be two morphisms of crossed modules. Then the pullback of α along g is given
426
+ by the following square
427
+ T
428
+ T′
429
+ Q′
430
+ Q
431
+ πT
432
+ g
433
+ πQ′
434
+ α
435
+ The object part T′ of the pullback is built component-wise as in the case of groups
436
+ (T1 ×Q1 Q′
437
+ 1, T2 ×Q2 Q′
438
+ 2, ∂′),
439
+
440
+ 8
441
+ OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
442
+ where ∂′ and the action are induced by the universal property of the pullbacks in Grp. The
443
+ projections are the natural ones, given also component-wise.
444
+ Following the terminology introduced in [14] for groups and spaces, we define the notion
445
+ of conditional flatness for localization functors in crossed modules.
446
+ Definition 2.3. Let L be a localization functor. We say that this functor is conditionally
447
+ flat if the pullback of any L-flat exact sequence is L-flat.
448
+ In Section 3 we provide a characterization of conditional flatness. To achieve this goal we
449
+ will use a similar strategy to the one applied to groups and topological spaces in [14]. The
450
+ authors exploit heavily the existence of fiberwise localization in the categories of groups and
451
+ spaces. However, in our article [22], we observed that fiberwise localization does not always
452
+ exist for a given localization functor and a given exact sequence in XMod. Fortunately, when
453
+ we work with L-flat exact sequences we can show that it is always possible to construct a
454
+ fiberwise localization.
455
+ Lemma 2.4. Let L be a regular-epi localization. Then any L-flat exact sequence of crossed
456
+ modules admits a fiberwise localization.
457
+ Proof. Let
458
+ T
459
+ Q
460
+ N
461
+ 1
462
+ 1
463
+ κ
464
+ α
465
+ be an L-flat exact sequence of
466
+ crossed modules. The L-flatness of the sequence implies in particular that Lκ is a monomor-
467
+ phism. Consider the following diagram of exact sequences:
468
+ 1
469
+ 1
470
+ ker(ℓT)
471
+ (1)
472
+ ker(ℓN)
473
+ N
474
+ T
475
+ LN
476
+ LT
477
+ κ
478
+
479
+ ℓN
480
+ ℓT
481
+ We conclude from [2, Lemma 4.2.4.(1)] that (1) is a pullback since Lκ is a monomorphism.
482
+ Then we have that κ(ker(ℓN)) is a normal subcrossed module of T as it can be seen as the
483
+ intersection of the normal subcrossed modules N and ker(ℓT) of T. Therefore, we can apply
484
+ Theorem 1.19
485
+
486
+ To understand conditional flatness we must study the pullback of an L-flat exact sequence.
487
+ It will thus be very handy in Section 3 to know that any such pullback admits a fiberwise
488
+ localization.
489
+ Lemma 2.5. Let L be a regular-epi localization. Let
490
+ (6)
491
+ T
492
+ Q
493
+ N
494
+ 1
495
+ 1
496
+ κ
497
+ α
498
+ be an L-flat exact sequence of crossed modules and g : Q′ → Q a morphism of crossed modules.
499
+ Then, we can construct the fiberwise localization of the pullback of (6) along g
500
+ N
501
+ N
502
+ T′
503
+ T
504
+ Q′
505
+ Q
506
+ 1
507
+ 1
508
+ 1
509
+ 1
510
+ κ
511
+ πT
512
+ κ′
513
+ g
514
+ πQ′
515
+ α
516
+
517
+ ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
518
+ 9
519
+ Remark 2.6. In the rest of the article, and in particular in the following proof, we identify
520
+ N with the normal subcrossed module κ(N) of T and with κ′(N), normal subcrossed module
521
+ of T′. We will therefore omit the us of κ and κ′. For example an element of the group N1
522
+ that we want to consider in T′
523
+ 1 will be denoted (n1, 1) instead of κ′
524
+ 1(n1) = (κ1(n1), 1).
525
+ Proof of Lemma 2.5. We need to verify that ker(ℓN) is a normal crossed module of T′. Since
526
+ N is a subcrossed module of T′, we just need to verify (5) of Theorem 1.19. Let (t1, q1) be an
527
+ element in T ′
528
+ 1 and (x2, 1) be an element of ker(ℓN
529
+ 2 ), then we have the following equality
530
+ (x2,1)(t1, q1)(t1, q1)−1 = ( x2t1t−1
531
+ 1 , q1q−1
532
+ 1 ) = ( x2t1t−1
533
+ 1 , 1).
534
+ Indeed, by Lemma 2.4 we know that the original sequence (6) admits a fiberwise localization
535
+ which then implies by Theorem 1.19 that [ker(ℓN
536
+ 2 ), T1] ⊂ ker(ℓN
537
+ 1 ) i.e for any x2 ∈ ker(ℓN
538
+ 2 ) and
539
+ t1 ∈ T1 we have x2t1t−1
540
+ 1
541
+ ∈ ker(ℓN
542
+ 1 ). But then, with the notation introduced in Remark 2.6,
543
+ this is equivalent to say that the element ( x2t1t−1
544
+ 1 , 1) belongs to ker(ℓN
545
+ 1 ).
546
+
547
+ This lemma is not trivial since the fiberwise localization of an exact sequence of crossed
548
+ modules does not always exist as we have proved in [22, Theorem 4.5]. If we want the strategy
549
+ for groups and spaces to be also viable in the study of conditional flatness for crossed modules,
550
+ we need a final ingredient, namely a commutation rule for the fiberwise localization and the
551
+ pullback operations.
552
+ Proposition 2.7. Let us consider an L-flat exact sequence where L is a regular-epi localization
553
+ functor.
554
+ Then, the pullback of its fiberwise localization is the fiberwise localization of its
555
+ pullback.
556
+ Proof. Let
557
+ N
558
+ N
559
+ T′
560
+ T
561
+ Q′
562
+ Q
563
+ 1
564
+ 1
565
+ 1
566
+ 1
567
+ κ
568
+ πT
569
+ κ′
570
+ g
571
+ πQ′
572
+ α
573
+ be the pullback of an L-flat exact sequence. Then we construct the fiberwise localizations of
574
+ the two sequences by quotienting out the kernel of the localization morphism ℓN as follows.
575
+ N
576
+ 1
577
+ T′
578
+ Q′
579
+ 1
580
+ N
581
+ 1
582
+ T
583
+ Q
584
+ 1
585
+ LN
586
+ 1
587
+ T′/ker(ℓN)
588
+ Q′
589
+ 1
590
+ LN
591
+ 1
592
+ T/ker(ℓN)
593
+ Q
594
+ 1
595
+ κ′
596
+ πQ′
597
+ κ
598
+ α
599
+ g
600
+ πT
601
+ j
602
+ j′
603
+ p
604
+ p′
605
+ g
606
+ f ′
607
+ f
608
+ ℓN
609
+ ℓN
610
+ We complete the diagram by defining a morphism δ: T′/ker(ℓN) → T/ker(ℓN) via the
611
+ universal property of the cokernel since f ◦ πT ◦ κ′|ker(ℓN) = 1, where κ′|ker(ℓN) : ker(ℓN) → T′ is
612
+
613
+ 10
614
+ OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
615
+ the inclusion of the kernel of ℓN.
616
+ ker(ℓN)
617
+ ker(ℓN)
618
+ T′
619
+ T
620
+ T ′/ker(ℓN)
621
+ T/ker(ℓN)
622
+ 1
623
+ 1
624
+ 1
625
+ 1
626
+ κ|ker(ℓN)
627
+ πT
628
+ κ′|ker(ℓN)
629
+ f ′
630
+ f
631
+ δ
632
+ N
633
+ 1
634
+ T′
635
+ Q′
636
+ 1
637
+ N
638
+ 1
639
+ T
640
+ Q
641
+ 1
642
+ LN
643
+ 1
644
+ T′/ker(ℓN)
645
+ Q′
646
+ 1
647
+ LN
648
+ 1
649
+ T/ker(ℓN)
650
+ Q
651
+ 1
652
+ κ′
653
+ πQ′
654
+ κ
655
+ α
656
+ g
657
+ πT
658
+ j
659
+ j′
660
+ p
661
+ p′
662
+ g
663
+ δ
664
+ f ′
665
+ f
666
+ lN
667
+ lN
668
+ We can check that δ makes the two front faces commute. Indeed, the right and left faces
669
+ commute by using the fact that ℓN and f ′ are epimorphisms respectively.
670
+ The commutativity of the above diagram and Proposition 1.5 implies that
671
+ LN
672
+ T′/ker(ℓN)
673
+ Q′
674
+ 1
675
+ 1
676
+ j′
677
+ p′
678
+ is the pullback of
679
+ T/ker(ℓN)
680
+ Q
681
+ LN
682
+ 1
683
+ 1
684
+ j
685
+ p
686
+ along g.
687
+
688
+ Remark 2.8. In [14], the construction of the fiberwise localization in the category of groups
689
+ was functorial, therefore from the morphism T′ → T between the pullback sequence and the
690
+ sequence itself we have directly a morphism between the fiberwise localization of the pullback
691
+ sequence and the fiberwise localization of the original sequence. In other words the map δ
692
+ comes for free in contrast to the category of crossed modules where we have to build the map
693
+ δ explicitly.
694
+ 3. Conditional flatness and admissibility
695
+ In this section, we develop a simpler characterisation of conditional flatness, thanks to
696
+ the results of the previous section. We introduce the notion of admissibility for the class
697
+ of regular epimorphisms and show that it is equivalent to conditional flatness. With this
698
+ equivalence, we can easily establish conditional flatness for a given localization functor. We
699
+ observe that some properties of localization functors, such as right-exactness, imply directly
700
+ admissibility for the class of regular epimorphism.
701
+ The first step allows us to restrict the definition of conditional flatness (Definition 2.3) to
702
+ fiberwise localizations of L-flat exact sequences (Lemma 3.1). More precisely, we show that
703
+ the pullback of an L-flat exact sequence is L-flat if and only if the pullback of its fiberwise
704
+ localization is so.
705
+
706
+ ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
707
+ 11
708
+ Lemma 3.1. Let L be a regular-epi localization functor. Then L is conditionally flat if and
709
+ only if for any L-flat exact sequence
710
+ T
711
+ Q
712
+ N
713
+ 1
714
+ 1
715
+ κ
716
+ α
717
+ with N
718
+ an L-local crossed module, the pullback sequence along any morphism Q′ → Q is L-flat.
719
+ Proof. This is clear since f ′ and ℓN are L-equivalences in this diagram:
720
+ LN
721
+ N
722
+ T′
723
+ T′/ker(ℓN)
724
+ Q′
725
+ Q′
726
+ 1
727
+ 1
728
+ 1
729
+ 1
730
+ j′
731
+ f ′
732
+ ℓN
733
+ κ′
734
+ πQ′
735
+ p′
736
+ The top row is thus L-flat if and only if so is the bottom row and we conclude by Proposi-
737
+ tion 2.7.
738
+
739
+ The previous lemma allows us to follow the approach introduced in [14]. For the sake of
740
+ completeness, we give an explicit proof of the following results even if the arguments are
741
+ similar to the group theoretical ones.
742
+ Proposition 3.2. Let L be a regular-epi localization functor. Then L is conditionally flat if
743
+ and only if the pullback of any exact sequence of L-local objects is L-flat.
744
+ Proof. By the previous lemma it is sufficient to consider exact sequence with an L-local kernel
745
+ LN. Consider thus an L-flat exact sequence
746
+ T
747
+ Q
748
+ LN
749
+ 1
750
+ 1
751
+ j
752
+ p
753
+ .
754
+ We build the following diagram where g : Q′ → Q is any morphism of crossed modules and
755
+ (1) is a pullback.
756
+ LN
757
+ LN
758
+ LN
759
+ T′
760
+ (1)
761
+ (2)
762
+ T
763
+ LT
764
+ Q′
765
+ Q
766
+ LQ
767
+ 1
768
+ 1
769
+ 1
770
+ 1
771
+ 1
772
+ 1
773
+ j
774
+ L(j)
775
+ ℓT
776
+ ℓQ
777
+ πT
778
+ j′
779
+ g
780
+ πQ′
781
+ L(p)
782
+ p
783
+ We observe that since each row is exact, (2) is a pullback by Proposition 1.5, and then
784
+ (1) + (2) is also a pullback. Hence, the top row is the pullback of the bottom exact sequence
785
+ of L-local objects along the map ℓQ ◦ g, which shows the claim.
786
+
787
+ Definition 3.3. A localization functor L is said to be admissible for the class of regular
788
+ epimorphisms if it preserves any pullback of the form
789
+ LT
790
+ T′
791
+ Q
792
+ LQ
793
+ πLT
794
+ ℓQ
795
+ πQ
796
+ α
797
+
798
+ 12
799
+ OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
800
+ where α is a regular epimorphism.
801
+ Theorem 3.4. Let L be a regular-epi localization functor. Then the following statements are
802
+ equivalent
803
+ (1) L is conditionally flat;
804
+ (2) L is admissible for the class of regular epimorphisms.
805
+ Proof. The implication (1) ⇒ (2) is trivial, so let us prove (2) ⇒ (1). Consider any exact
806
+ sequence of L-local objects
807
+ LT
808
+ LQ
809
+ LN
810
+ 1
811
+ 1
812
+ α
813
+ and any morphism g : A → LQ. By Proposition 3.2 conditional flatness is established if we
814
+ prove that the pullback of the exact sequence along g is L-flat. Let us first observe that this
815
+ morphism g factors through LA via the universal property of the localization:
816
+ A
817
+ LA
818
+ LQ
819
+ ℓA
820
+ g
821
+ ˜g
822
+ Hence, we can first construct the pullback of
823
+ LT
824
+ LQ
825
+ LN
826
+ 1
827
+ 1
828
+ α
829
+ along
830
+ ˜g and then pullback the resulting sequence along ℓA:
831
+ LN
832
+ LN
833
+ LN
834
+ T′′
835
+ T′
836
+ LT
837
+ A
838
+ LA
839
+ LQ
840
+ 1
841
+ 1
842
+ 1
843
+ 1
844
+ 1
845
+ 1
846
+ g
847
+ πLT
848
+ ˜g
849
+ ℓA
850
+ πA
851
+ α
852
+ πLA
853
+ Since the category of L-local objects is closed under pullbacks, T′ is L-local and we can
854
+ apply condition (2) to conclude that the upper row is L-flat. This observation implies that
855
+ the pullback of
856
+ LT
857
+ LQ
858
+ LN
859
+ 1
860
+ 1
861
+ α
862
+ along g is an L-flat sequence as
863
+ desired.
864
+
865
+ The above theorem gives an easier characterisation of conditionally flatness in the category
866
+ of crossed modules. It will be useful in rest of the article.
867
+ Remark 3.5. Admissibility for the class of regulars epimorphisms in the context of semi-
868
+ abelian categories is studied in [15]. Similar results are proven for functors of localizations that
869
+ admit a functorial fiberwise localization. Note that their result does not imply Theorem 3.4
870
+ since localization functors of crossed modules do not admit functorial fiberwise localizations
871
+ in general. However, the implication “(1) implies (2)”, in Theorem 3.4, holds even for not
872
+ necessarily regular-epi localization functors.
873
+
874
+ ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
875
+ 13
876
+ Proposition 3.6. If L: XMod → XMod is a localization functor that is right exact in XMod,
877
+ then L is admissible for the class of regular epimorphisms.
878
+ Proof. Let us consider the following pullback of an L-flat exact sequence of crossed modules
879
+ along a morphism g : Q′ → Q.
880
+ T′
881
+ Q′
882
+ N
883
+ T
884
+ Q
885
+ N
886
+ 1
887
+ 1
888
+ 1
889
+ 1
890
+ (1)
891
+ g
892
+ πT
893
+ κ
894
+ f
895
+ κ′
896
+ πQ′
897
+ By applying L to this diagram, we obtain (since L is right exact) the following diagram
898
+ LT′
899
+ LQ′
900
+ LN
901
+ LT
902
+ LQ
903
+ LN
904
+ 1
905
+ 1
906
+ 1
907
+ L(g)
908
+ L(πT)
909
+ L(κ)
910
+ L(f)
911
+ L(κ′)
912
+ L(πQ′)
913
+ Since L(κ) = L(πT)◦L(κ′) is a (normal) monomorphism, we conclude that L(κ′) is a monomor-
914
+ phism. Normality follows then by right-exactness and we conclude by Theorem 3.4.
915
+
916
+ Note that this proof holds in any semi-abelian category.
917
+ Corollary 3.7. The functor of abelianization Ab: XMod → XMod is admissible for the class
918
+ of regular epimorphisms.
919
+ Proof. The functor of abelianization Ab: XMod → XMod is right exact. Since the exactness
920
+ can be shown component-wise, the result follows.
921
+
922
+ Sometimes it is handy to rely on our group theoretical knowledge to construct simple
923
+ examples of localization functors and how they behave on crossed modules. The proof of the
924
+ following proposition is based on a counter-example coming from groups via the functor X
925
+ defined in Remark 1.3.
926
+ Proposition 3.8. There are regular-epi localization functors L: XMod → XMod that are not
927
+ admissible for the class of regular epimorphisms.
928
+ Proof. We export via X: Grp → XMod the example in [14, Theorem 5.1] of a localization
929
+ functor in groups that is not admissible for the class of regular epimorphisms.
930
+ Let Lφ be the localization functor induced by the projection φ: C4 → C2, where Cn denotes
931
+ a cyclic group of order n. It gives rise to a localization functor LXφ : XMod → XMod. In
932
+ particular, if we apply X to the extension of Lφ-local groups considered in [14], we obtain an
933
+ exact sequence of LXφ-local crossed modules:
934
+ (1, Z)
935
+ (1, C2)
936
+ (1, Z)
937
+ 1
938
+ 1
939
+ If we pullback along the morphism of crossed modules Xφ, we obtain the following exact
940
+ sequence
941
+ (1, Z × C2)
942
+ (1, C4)
943
+ (1, Z)
944
+ 1
945
+ 1
946
+
947
+ 14
948
+ OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
949
+ We conclude from [22, Lemma 1.4] that this exact sequence is not LXφ-flat. Indeed, if it was
950
+ the case we would have a contradiction with the group theoretical observation in [14].
951
+
952
+ 4. Admissibility and acyclicity
953
+ In the categories of groups and topological spaces, the localization functor L is a nullification
954
+ functor if and only if the kernels of the localization morphisms are L-acyclic (which means
955
+ that Lker(ℓM) is trivial for any M ∈ XMod). This characterisation implies in particular that
956
+ any nullification functor is admissible for the class of regular epimorphisms. It is interesting
957
+ to notice that even if nullification functors of crossed modules do not have acyclic kernels,
958
+ we have a similar result in XMod: the L-acyclicity of the kernels of localization morphisms
959
+ implies the admissibility.
960
+ Proposition 4.1. Let L: XMod → XMod be a regular-epi localization functor such that
961
+ ker(ℓM : M → LM) is L-acyclic for any M ∈ XMod. Then L is admissible for the class of
962
+ regular epimorphisms.
963
+ Proof. Consider the pullback of
964
+ LT
965
+ LQ
966
+ LN
967
+ 1
968
+ 1
969
+ κ
970
+ f
971
+ along ℓQ: Q →
972
+ LQ:
973
+ LN
974
+ LN
975
+ T′
976
+ LT
977
+ Q
978
+ LQ
979
+ 1
980
+ 1
981
+ 1
982
+ 1
983
+ κ
984
+ πLT
985
+ κ′
986
+ ℓQ
987
+ πQ
988
+ f
989
+ We need to prove that πLT is an L-equivalence. Since XMod is a pointed protomodular
990
+ category and ℓQ is a regular epi by assumption, we know that πLT is the cokernel of ker(ℓQ) ∼=
991
+ ker(πLT) → T′. Let Y be a local object, for any g : T′ → Y we have the following diagram:
992
+ ker(ℓQ)
993
+ Lker(ℓQ) = 1
994
+ T′
995
+ LT
996
+ Y
997
+ g′
998
+ πLT
999
+ g
1000
+ ˜g
1001
+ By the universal property of the localization there exists g′: 1 → Y that makes the left square
1002
+ commute. Hence, by the universal property of the cokernel there exists a unique ˜g: LT → Y
1003
+ such that the triangle commutes and we conclude that πLT is an L-equivalence.
1004
+
1005
+ However, localization functors of crossed modules do not behave like localization functors
1006
+ of groups. As explained above, in the category of groups (but also of topological spaces), the
1007
+ kernels of the localization morphisms are L-acyclic if and only if L is a nullification functor
1008
+ [14]. In the context of crossed modules, we do not have such a characterization of nullification
1009
+ functors.
1010
+ Remark 4.2. We know by [22, Proposition 4.6] that there are nullification functors, for
1011
+ example PXZ defined in Example 1.14, such that the kernels of their localization morphisms
1012
+ are not acyclic in general. Still, in the next proposition, we prove that if the kernel of the
1013
+ localization morphism is L-acyclic, as in Proposition 4.1, then the localization functor is a
1014
+ nullification.
1015
+
1016
+ ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
1017
+ 15
1018
+ The cardinal in the next proof is chosen exactly as in Bousfield’s [5, Theorem 4.4] for
1019
+ spaces.
1020
+ Proposition 4.3. Let f : B → C be a morphism of crossed modules and Lf : XMod → XMod
1021
+ be a regular-epi localization functor.
1022
+ If the kernels of the localization morphisms are Lf-
1023
+ acyclic, then Lf is a nullifcation functor.
1024
+ Proof. Our strategy is to construct a crossed module A such that we can compare the functor
1025
+ Lf with the nullification functor PA (Definition 1.10) via a natural transformation ψ. We
1026
+ choose κ to be the first infinite ordinal greater than the number of chosen generators of B
1027
+ and C, i.e., generators of the groups B1, B2, C1 and C2. We construct the crossed module
1028
+ A := � Aα, where Aα are all the Lf-acyclic crossed modules with less than 2κ generators, see
1029
+ [5, Theorem 4.4].
1030
+ The first step of this proof is to show that if a crossed module X is Lf-local then it is A-local.
1031
+ Let φ be a morphism in Hom(A, X) and construct by naturality the following commutative
1032
+ diagram
1033
+ 1 = LfA
1034
+ A
1035
+ X
1036
+ LfX
1037
+ Lfφ
1038
+ ∼=
1039
+ φ
1040
+ By hypothesis, we have an isomorphism between X and LfX and by construction of A, we
1041
+ obtain LfA = 1. Therefore, φ factors through the zero object and hence Hom(A, X) = 1,
1042
+ which is equivalent to say that X is A-local. Now consider the PA-equivalence pT: T → PAT
1043
+ and the Lf-local object LfT. By the above observation, we have that LfT is A-local and by
1044
+ the universal property we have the desired morphism ψT
1045
+ T
1046
+ PAT
1047
+ LfT
1048
+ pT
1049
+ ℓT
1050
+ ψT
1051
+ We construct next the fiberwise A-nullification of the following exact sequence
1052
+ T
1053
+ LfT
1054
+ ker(ℓT)
1055
+ 1
1056
+ 1
1057
+ ℓT
1058
+ By assumption ker(ℓT) is Lf-acyclic, hence also PA-acyclic by design.
1059
+ This implies that
1060
+ ker
1061
+
1062
+ pT: ker(ℓT) → PAker(ℓT)
1063
+
1064
+ is equal to ker(ℓT). Hence, the exact sequence satisfies condi-
1065
+ tion (5) of Theorem 1.19 and we obtain the following fiberwise nullification
1066
+ T
1067
+ LfT
1068
+ ker(ℓT)
1069
+ T/ker(ℓT)
1070
+ LfT
1071
+ 1
1072
+ 1
1073
+ 1
1074
+ 1
1075
+ 1
1076
+ pT
1077
+ f
1078
+ ∼=
1079
+ ℓT
1080
+
1081
+ 16
1082
+ OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
1083
+ Since f is a PA-equivalence, so is ℓT. Hence, we obtain a morphism ϕT in the following
1084
+ commutative diagram:
1085
+ T
1086
+ LfT
1087
+ PAT
1088
+ ψT
1089
+ ℓT
1090
+ pT
1091
+ ϕT
1092
+ By universal property, we can conclude that the two compositions of ψT and ϕT are isomorphic
1093
+ to identities so that LfT ∼= PAT. A similar argument shows the naturality of ψ and ϕ and
1094
+ therefore Lf is a nullification functor, namely PA.
1095
+
1096
+ 5. Nullification functors and admissibility
1097
+ In the category of groups, the fact that kernels of localization morphisms are L-acyclic
1098
+ was fundamental to prove that nullification functors are admissible for the class of regular
1099
+ epimorphisms. This fact is not true in general for nullification functors in the category of
1100
+ crossed modules as shown in [22, Proposition 4.6], it is thus natural to ask whether nullifica-
1101
+ tion functors are admissible. We provide an affirmative answer in this final section, but let
1102
+ us first prove that our counter-example PXZ is admissible.
1103
+ Proposition 5.1. The nullification functor PXZ is admissible for the class of regular epimor-
1104
+ phisms.
1105
+ Proof. Theorem 5.1 in [15] implies that PXZ is admissible provided that the reflective category
1106
+ of PXZ-local objects is a Birkhoff subcategory, i.e., it is closed under regular quotients and
1107
+ subobjects. Here PXZ-local objects are crossed modules of the form A → 1 where A is any
1108
+ abelian group and the connecting homomorphism is the trivial homomorphism. Therefore it
1109
+ is clearly closed under subobjects. Moreover, the quotient of A → 1 by a normal subcrossed
1110
+ modules N → 1 is the crossed module A/N → 1 that is PXZ-local.
1111
+
1112
+ The remaining part of the section is devoted to the proof that all nullification functors are
1113
+ admissible for the class of regular epmorphisms. Consider a nullification functor PA where
1114
+ A = (A1, A2, ∂) is a crossed module. To show the admissibility, it is enough to prove that the
1115
+ pullback of an exact sequence of PA-local crossed modules along the coaugmentation map
1116
+ is PA-flat, in other words that the map f in the following commutative diagram of crossed
1117
+ modules is a PA-equivalence
1118
+ W
1119
+ Q
1120
+ PAN
1121
+ PAT
1122
+ PAQ
1123
+ PAN
1124
+ 1
1125
+ 1
1126
+ 1
1127
+ 1
1128
+ (1)
1129
+ pQ
1130
+ f
1131
+ h
1132
+ g
1133
+ where (1) is a pullback and g and h are regular epimorphisms. To do so we follow step by
1134
+ step the inductive construction of PAQ = colimQβ as presented in [22, Proposition 2.8], see
1135
+ also Proposition 1.11. For each successor ordinal β + 1 we obtain Qβ+1 from Qβ by killing all
1136
+ morphisms out of A so let us start with the construction of Q1 from Q0 = Q.
1137
+
1138
+ ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
1139
+ 17
1140
+ Remark 5.2. Let ϕ : A → Q be a morphism of crossed modules. The crossed module Q1 is
1141
+ the quotient of Q by the normal closure KQ in Q of the image of
1142
+ ev:
1143
+
1144
+ ϕ∈Hom(A,Q)
1145
+ A = M −→ Q
1146
+ which is defined by ϕ on the copy of A indexed by ϕ. The idea behind the construction we
1147
+ perform next is that we do not need to kill all morphisms from A to the extension W in order
1148
+ to construct its nullification PAW, it is sufficient to take care of those factoring through Q.
1149
+ Beware that given an extension N → T → Q with N an A-acyclic crossed module, it is not
1150
+ true in general that all morphisms from A to T factor through Q.
1151
+ By definition of pQ we have the following equality for the composition pQ ◦ ϕ = 1 = h ��� 1
1152
+ as below. Therefore, any morphism from A to Q induces one from A to W:
1153
+ (7)
1154
+ PAT
1155
+ W
1156
+ Q
1157
+ PAQ
1158
+ A
1159
+ h
1160
+ pQ
1161
+ f
1162
+ g
1163
+ 1
1164
+ ϕ
1165
+ ∃!ψ
1166
+ We call ψ the morphism determined by ϕ and it makes sense now to consider KW, the normal
1167
+ closure in W of the image of M → W.
1168
+ Lemma 5.3. With the same notation as in Remark 5.2, we have an isomorphism KW ∼= KQ.
1169
+ Proof. Limits are computed levelwise for crossed modules, so the pullback W consists of
1170
+ compatible pairs (x, q) for x ∈ (PAT)i and q ∈ Qi for i = 1, 2. By construction of ψ we have
1171
+ ψ(a) = (1, ϕ(a)).
1172
+ Now, we compute the kernels of the cokernels of ev: M → Q and (1, ev): M → W. We
1173
+ have the two following descriptions of the kernels.
1174
+ KQ =
1175
+
1176
+ ev1(M1)Q2[ev2(M2)Q2, Q1], ev2(M2)Q2, ∂
1177
+
1178
+ KW =
1179
+
1180
+ (1, ev1)(M1)W2[(1, ev2)(M2)W2, W1], (1, ev2)(M2)W2, ∂′�
1181
+ The second group of the crossed module KW is the easier one:
1182
+ (1, ev2)(M2)W2 = {(t2,q2)(1, ev2(m2)) | (t2, q2) ∈ W2, m2 ∈ M2}
1183
+ = {(1, q2ev2(m2)) | q2 ∈ Q2, m2 ∈ M2}
1184
+ = 1 × ev2(M2)Q2.
1185
+ where the second equality holds since h is surjective. Via similar computations, we see that
1186
+ (1, ev1)(M1)W1 = 1 × ev1(M1)Q1, so we are left with proving that
1187
+ [(1, ev2)(M2)W2, W1] = 1 × [ev2(M2)Q2, Q1]
1188
+
1189
+ 18
1190
+ OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
1191
+ This we do via the following equalities:
1192
+ [(1, ev2)(M2)2, W1] = [(1 × ev2(M2)Q2), W1]
1193
+ = {(1,x2)(t1, q1)(t1, q1)−1 | x2 ∈ ev2(M2)Q2, (t1, q1) ∈ W1}
1194
+ = {(1,x2 q1q−1
1195
+ 1
1196
+ | x2 ∈ ev2(M2)Q2, q1 ∈ Q1}
1197
+ = 1 × [(ev2(M2)Q2, Q1]
1198
+ So finally we can conclude that KW = 1 × KQ, in particular KW and KQ are isomorphic.
1199
+
1200
+ Proposition 5.4. For any ordinal β, we have a commutative diagram
1201
+ PAT
1202
+
1203
+
1204
+ PAQ
1205
+ W
1206
+ Q
1207
+ (2)
1208
+
1209
+ g
1210
+
1211
+ pQ
1212
+ β
1213
+ h
1214
+ where (2) is a pullback square, the maps fβ : W → Wβ and pQ
1215
+ β : Q → Qβ are PA-equivalences,
1216
+ and hβ is a regular epimorphism.
1217
+ Proof. We prove it by induction. Since the nullification uses possibly a transfinite construc-
1218
+ tion we have to initialize the induction, but the case β = 0 holds by assumption, and then
1219
+ check the statement for successor and limit ordinals.
1220
+ The successor case Suppose that for an ordinal β the lemma is proved. Then we consider
1221
+ the kernels KW
1222
+ β and KQ
1223
+ β of the cokernels of the evaluation maps ev : �
1224
+ Hom(A,Qβ) A −→ Qβ and
1225
+ ev : �
1226
+ Hom(A,Qβ) A −→ Wβ respectively. They fit in the following diagram of exact rows:
1227
+ Wβ+1
1228
+
1229
+
1230
+ Qβ+1
1231
+ KW
1232
+ β
1233
+ KQ
1234
+ β
1235
+ (2)
1236
+ pQ
1237
+ (β→β+1)
1238
+ f(β→β+1)
1239
+
1240
+ ∼=
1241
+ iW
1242
+ iQ
1243
+ ∃!hβ+1
1244
+ Lemma 5.3 applies here and gives us the isomorphism between KW
1245
+ β and KQ
1246
+ β . The composition
1247
+ pQ
1248
+ (β→β+1) ◦ hβ ◦ iW : KW
1249
+ β → Qβ+1
1250
+ is zero by commutativity, yielding by the universal property of the cokernel the morphism
1251
+ hβ+1: Wβ+1 → Qβ+1. The isomorphism between the kernels implies that (2) is a pullback (see
1252
+ Proposition 1.5). By induction hypothesis hβ is a regular epimorphism and the composition
1253
+ pQ
1254
+ (β→β+1) ◦ hβ : Wβ → Qβ+1 is also a regular epimorphism, hence so is hβ+1. We show now
1255
+ that pQ
1256
+ (β→β+1) and f(β→β+1) are PA-equivalences.
1257
+
1258
+ ADMISSIBILITY OF LOCALIZATIONS OF CROSSED MODULES
1259
+ 19
1260
+ For the first one we write the cokernel Qβ+1 as the pushout along the evaluation morphism:
1261
+ 1
1262
+ � A
1263
+
1264
+ Qβ+1
1265
+ pQ
1266
+ (β→β+1)
1267
+ 1
1268
+ ϕ
1269
+ inc
1270
+ where the coproduct is taken over Hom(A, Q). The trivial map A → 1 is a PA-equivalence,
1271
+ thus so is the pushout pQ
1272
+ (β→β+1) : Qβ → Qβ+1 by Lemma 1.8 (1). By composing with the
1273
+ PA-equivalence Q → Qβ we see that pQ
1274
+ β+1 : Q → Qβ+1 is a PA-equivalence as well. The same
1275
+ argument shows that fβ+1 : W → Wβ+1 is also a PA-equivalence. By the universal property
1276
+ of the localization, we obtain two maps, one from Wβ+1 to PAT and the other from Qβ+1 to
1277
+ PAQ such that (2) commutes:
1278
+ PAT
1279
+ Wβ+1
1280
+ Qβ+1
1281
+ PAQ
1282
+ W
1283
+ Q
1284
+ (2)
1285
+ (1)
1286
+ hβ+1
1287
+ g
1288
+ fβ+1
1289
+ pQ
1290
+ β+1
1291
+ h
1292
+ f
1293
+ pQ
1294
+ Since (1) and the outer rectangle are pullbacks and hβ+1 is a regular epimorphism, we can
1295
+ conclude by Proposition 4.1.4 in [2] that (2) is a pullback.
1296
+ The limit case To prove the statement for a general transfinite induction we need to prove
1297
+ it for a limit ordinal as well. Let γ be a limit ordinal and
1298
+ Qγ = colimα<γQα
1299
+ Wγ = colimα<γWα
1300
+ We have shown that pQ
1301
+ (α−1→α) : Qα−1 → Qα is a PA-equivalence for all α < γ. Hence the
1302
+ composition pQ
1303
+ α : Q → Qα is also a PA-equivalence and Lemma 1.8 (3), implies that pQ
1304
+ γ : Q →
1305
+ Qγ is a PA-equivalence. The same reasoning holds for fγ : W → Wγ. The existence of the
1306
+ maps f : W → PAT and pQ : Q → PAQ give us two maps Wγ → PAT and Qγ → PAQ as
1307
+ shown on the diagram below (8).
1308
+ The nullification PAQ is constructed as filtered colimit of the Qα, see Proposition 1.11.
1309
+ Filtered colimits commutes with finite limits, in particular with kernels. Therefore
1310
+ KQ
1311
+ γ := ker(Q → Qγ) ∼= colimα<γker(Q → Qα)
1312
+ where ker(Q → Qα) will be denoted KQ
1313
+ α. The category XMod is a variety of algebras (also
1314
+ called algebra category of fixed type). Hence, by [21, Proposition IX.1.2], we know that the
1315
+ forgetful functor U : XMod → Set creates filtered colimits. In other words we have :
1316
+ U(colimα<γKQ
1317
+ α) = colimα<γUKQ
1318
+ α =
1319
+
1320
+ α<γ
1321
+ UKQ
1322
+ α
1323
+ where the colimit in the first term lies in the category of crossed modules and the second
1324
+ colimit in the category of sets. This means that we know the structure of colimα<γKQ
1325
+ α as a
1326
+
1327
+ 20
1328
+ OLIVIA MONJON, J´ER ˆOME SCHERER, AND FLORENCE STERCK
1329
+ set. Now since KQ
1330
+ α ∼= KW
1331
+ α for all α < γ and KQ
1332
+ γ can be written as a union of KQ
1333
+ α (as well as
1334
+ KW
1335
+ γ ) we conclude that KQ
1336
+ γ ∼= KW
1337
+ γ . We consider now the diagram:
1338
+ (8)
1339
+ PAT
1340
+
1341
+
1342
+ PAQ
1343
+ W
1344
+ Q
1345
+ (1)
1346
+ (2)
1347
+
1348
+ g
1349
+
1350
+ pQ
1351
+ γ
1352
+ h
1353
+ f
1354
+ pQ
1355
+ Since the kernels of fγ and pQ
1356
+ γ are isomorphic we deduce that (2) is a pullback.
1357
+ As we
1358
+ have shown that every map pQ
1359
+ (α→α+1) : Qα → Qα+1 is a regular epimorphism, the morphism
1360
+ pQ
1361
+ α : Q → Qα is also a regular epimorphism, being a composition of regular epimorphisms in
1362
+ a regular category. The colimit functor being a left adjoint functor, it preserves colimits and
1363
+ in particular cokernels. In a pointed protomodular category, any regular epimorphism is a
1364
+ cokernel, therefore
1365
+ pQ
1366
+ γ : Q → Qγ
1367
+ is a regular epimorphism. The composition pQ
1368
+ γ ◦ g is also a regular epimorphism, and we
1369
+ conclude that so is hγ. With the same argument as for the successor step, we get that (1) is
1370
+ a pullback, which ends the induction proof.
1371
+
1372
+ We are ready now for the main result of this section.
1373
+ Theorem 5.5. Let A be any crossed module. The nullification functor PA is admissible for
1374
+ the class of regular epimorphisms.
1375
+ Proof. Let W be the pullback of a regular epimorphism h: PAT → PAQ between PA-local
1376
+ crossed modules along the localization morphism pQ : Q → PAQ. Let λ be the ordinal such
1377
+ that Qλ ∼= PAQ (see Proposition 1.11). By Proposition 5.4 we have a diagram:
1378
+ PAT
1379
+
1380
+
1381
+ PAQ
1382
+ W
1383
+ Q
1384
+ (2)
1385
+ ∼=
1386
+
1387
+ g
1388
+ h
1389
+
1390
+ pQ
1391
+ λ
1392
+ where the outer rectangle is a pullback, the morphisms fλ and pQ
1393
+ λ are PA-equivalences, and
1394
+ (2) is a pullback. Since isomorphisms are stable under pullbacks, we have an isomorphism
1395
+ Wλ ∼= PAT. We have thus proved that the map f : W → PAT is a PA-equivalence, which
1396
+ means that the functor PA is admissible.
1397
+
1398
+ In this article we have focused on regular-epi localization functors because they appear nat-
1399
+ urally when studying conditional flatness and admissibility in the category of groups, crossed
1400
+ modules, or more general semi-abelian categories. We conclude this section by observing that
1401
+ the notion of conditional flatness can also be defined for non regular-epi localization functor.
1402
+ The next proposition gives an example of such a localization functor which is conditionally
1403
+
1404
+ REFERENCES
1405
+ 21
1406
+ flat. Let us stress that we will not a priori have an equivalence with admissiblity, as was
1407
+ the case for regular-epi localization functors by Theorem 3.4. In the proof of the following
1408
+ proposition we have thus to verify the more general condition for conditional flatness, as in
1409
+ Definition 2.3.
1410
+ Proposition 5.6. There exists a non regular-epi localization functor which is nevertheless
1411
+ conditionally flat and therefore admissible for the class of regular epimorphisms.
1412
+ Proof. We consider the functor I defined in Example 1.16 which sends any crossed module
1413
+ (N1, N2, ∂N) to (N2, N2, IdN2). This functor is not regular-epi because if we consider a crossed
1414
+ module for which the connecting morphism is not surjective then the localization morphism
1415
+ will not be a regular epimorphism.
1416
+ We prove now that I is conditional flat. Let
1417
+ T
1418
+ Q
1419
+ N
1420
+ 1
1421
+ 1
1422
+ κ
1423
+ α
1424
+ be any exact sequence of crossed modules.
1425
+ We see that I((N1, N2, ∂N)) = (N2, N2, IdN2)
1426
+ is a normal subcrossed module of (T2, T2, IdT2) = I((T1, T2, ∂T) and that I((Q1, Q2, ∂Q)) =
1427
+ (Q2, Q2, IdQ2) is the cokernel of κ: N → T. Therefore any exact sequence of crossed modules
1428
+ is I-flat. In particular any pullback along any morphism of crossed modules of an I-flat exact
1429
+ sequence is I-flat, hence I is conditionally flat.
1430
+
1431
+ References
1432
+ [1]
1433
+ A. J. Berrick and E. Dror Farjoun. “Fibrations and nullifications”. In: Israel J. Math.
1434
+ 135 (2003), pp. 205–220.
1435
+ [2]
1436
+ F. Borceux and D. Bourn. Mal’cev, protomodular, homological and semi-abelian cate-
1437
+ gories. Vol. 566. Springer Science & Business Media, 2004.
1438
+ [3]
1439
+ D. Bourn. “Normalization Equivalence, Kernel Equivalence, and Affine Categories”. In:
1440
+ 2006, pp. 43–62.
1441
+ [4]
1442
+ A. K. Bousfield. “Constructions of factorization systems in categories”. In: J. Pure
1443
+ Appl. Algebra 9.2 (1976), pp. 207–220.
1444
+ [5]
1445
+ A. K. Bousfield. “Homotopical localizations of spaces”. In: Amer. J. Math. 119.6 (1997),
1446
+ pp. 1321–1354. issn: 0002-9327. url: http://muse.jhu.edu/journals/american_journal_of_mathematics/v119/119.6bousfield.pdf.
1447
+ [6]
1448
+ R. Brown and P. Higgins. “On the connection between the second relative homotopy
1449
+ groups of some related spaces”. In: Proceedings of The London Mathematical Society
1450
+ (1978), pp. 193–212.
1451
+ [7]
1452
+ R. Brown and C. Spencer. “G-groupoids, crossed modules and the fundamental groupoid
1453
+ of a topological group”. In: Indag. Math. (Proceedings) 79.4 (1976), pp. 296–302.
1454
+ [8]
1455
+ C. Casacuberta. “Anderson localization from a modern point of view”. In: Contemp.
1456
+ Math. 181 (1995), pp. 35–46.
1457
+ [9]
1458
+ C. Casacuberta. “On structures preserved by idempotent transformations of groups
1459
+ and homotopy types”. In: Crystallographic groups and their generalizations (Kortrijk,
1460
+ 1999). Vol. 262. Contemp. Math. Amer. Math. Soc., Providence, RI, 2000, pp. 39–68.
1461
+ [10]
1462
+ C. Casacuberta and A. Descheemaeker. “Relative group completions”. In: Journal of
1463
+ Algebra 285.2 (2005), pp. 451–469.
1464
+ [11]
1465
+ C. Cassidy, M. H´ebert, and G. M. Kelly. “Reflective subcategories, localizations and
1466
+ factorization systems”. In: J. Austral. Math. Soc. Ser. A 38.3 (1985), pp. 287–329.
1467
+ [12]
1468
+ T. Everaert, M. Gran, and T. Van der Linden. “Higher Hopf formulae for Homology
1469
+ via Galois Theory”. In: Adv. Math. 217 (2008), pp. 2231–2267.
1470
+
1471
+ 22
1472
+ REFERENCES
1473
+ [13]
1474
+ E. Dror Farjoun. Cellular spaces, null spaces and homotopy localization. Vol. 1622.
1475
+ Lecture Notes in Mathematics. Springer-Verlag, Berlin, 1996, pp. xiv+199.
1476
+ [14]
1477
+ E. Dror Farjoun and J. Scherer. “Conditionally flat functors on spaces and groups”. In:
1478
+ Collect. Math. 66.1 (2015), pp. 149–160.
1479
+ [15]
1480
+ M. Gran and J. Scherer. “Conditional flatness and admissibility of a reflector in a
1481
+ semi-abelian category”. In: preprint (2022), 15 pages.
1482
+ [16]
1483
+ Philip S. Hirschhorn. Model categories and their localizations. Vol. 99. Mathemati-
1484
+ cal Surveys and Monographs. American Mathematical Society, Providence, RI, 2003,
1485
+ pp. xvi+457.
1486
+ [17]
1487
+ G. Janelidze and G. M. Kelly. “Galois theory and a general notion of central ex-
1488
+ tension”. In: J. Pure Appl. Algebra 97.2 (1994), pp. 135–161. issn: 0022-4049. doi:
1489
+ 10.1016/0022-4049(94)90057-4. url: https://doi.org/10.1016/0022-4049(94)90057-4.
1490
+ [18]
1491
+ G. Janelidze, L. M´arki, and W. Tholen. “Semi-abelian categories”. In: J. Pure Appl.
1492
+ Algebra 168 (2002), pp. 367–386.
1493
+ [19]
1494
+ M. Ladra and A.R. Grandjean. “Crossed modules and homology”. In: Journal of Pure
1495
+ and Applied Algebra 95.1 (1994), pp. 41–55.
1496
+ [20]
1497
+ M. Ladra, M.P. L´opez L´opez, and E. Rodeja. “Epimorphisms of crossed modules”. In:
1498
+ Southeast Asian Bulletin of Mathematics 28 (Jan. 2004).
1499
+ [21]
1500
+ S. Mac Lane. Categories for the Working Mathematicians. 2nd ed. Springer, 1997.
1501
+ [22]
1502
+ O. Monjon, J. Scherer, and F. Sterck. Non-existence of fiberwise localization for crossed
1503
+ modules. arxiv:2207.09702, to appear in Israel J. Math. 2022.
1504
+ [23]
1505
+ K. Norrie. “Actions and automorphisms of crossed modules”. In: Bulletin de la Soci´et´e
1506
+ Math´ematique de France 118.2 (1990), pp. 129–146.
1507
+ [24]
1508
+ K. Norrie. “Crossed modules and analogues of group theorems”. PhD thesis. King’s
1509
+ College, University of London, 1987.
1510
+ [25]
1511
+ J. H. C. Whitehead. “Combinatorial homotopy II”. In: Bull. Amer. Math. Soc 55 (1949),
1512
+ pp. 453–496.
1513
+ Mathematics, Ecole Polytechnique F´ed´erale de Lausanne, EPFL, Switzerland
1514
+ Email address: [email protected]
1515
+ Mathematics, Ecole Polytechnique F´ed´erale de Lausanne, EPFL, Switzerland
1516
+ Email address: [email protected]
1517
+ Institut de Recherche en Math´ematique et Physique, Universit´e catholique de Louvain,
1518
+ Belgium
1519
+ Email address:
1520
1521
+
JdAyT4oBgHgl3EQffviy/content/tmp_files/2301.00347v1.pdf.txt ADDED
@@ -0,0 +1,692 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ JWST high redshift galaxy observations have a strong tension with Planck CMB
2
+ measurements
3
+ Deng Wang∗ and Yizhou Liu
4
+ National Astronomical Observatories, Chinese Academy of Sciences, Beijing, 100012, China
5
+ JWST high redshift galaxy observations predict a higher star formation efficiency that the stan-
6
+ dard cosmology, which poses a new tension to ΛCDM. We find that the situation is worse than
7
+ expected.
8
+ The true situation is that the Planck CMB measurement has a strong tension with
9
+ JWST high redshift galaxy observations. Specifically, we make a trial to alleviate this tension by
10
+ considering alternative cosmological models including dark matter-baryon interaction, f(R) gravity
11
+ and dynamical dark energy. Within current cosmological constraints from Planck-2018 CMB data,
12
+ we find that these models all fail to explain such a large tension. A possible scenario to escape
13
+ from cosmological constraints is the extended Press-Schechter formalism, where we consider the
14
+ local environmental effect on the early formation of massive galaxies. Interestingly, we find that an
15
+ appropriate value of nonlinear environmental overdensity of a high redshift halo can well explain
16
+ this tension.
17
+ I.
18
+ INTRODUCTION
19
+ Since the cosmic acceleration is discovered by Type Ia supernovae (SNe Ia) [1, 2] and confirmed by two independent
20
+ probes cosmic microwave background (CMB) [3–5] and baryon acoustic oscillations (BAO) [6, 7], the standard 6-
21
+ parameter cosmological model, Λ-cold dark matter (ΛCDM) has achieved great success in characterizing the physical
22
+ phenomena across multiple scales at the background and perturbation levels. However, the validity of ΛCDM is
23
+ challenged by various kinds of new observations for a long time, and consequently new puzzles emerge such as the
24
+ so-called Hubble constant (H0) tension (see [8, 9] for recent reviews). It is noteworthy that, so far, we can not study
25
+ effectively the correctness of ΛCDM around redshift z ∼ 10, since currently mainstream probes BAO and SNe Ia
26
+ can not give direct observations at high redshifts. The lack of stable high redshift observations will prevent us from
27
+ testing ΛCDM more completely during the early stage of the evolution of our universe.
28
+ Very excitingly, the recent released high redshift galaxy observations [10–13] in the range z ∈ [7, 11] by JWST,
29
+ which contains a population of surprisingly massive galaxy candidates with stellar masses of order of 109M⊙, can
30
+ help explore whether ΛCDM is valid at high redshifts.
31
+ In the literature, Refs.[10, 11, 14, 15] have reported the
32
+ cumulative stellar mass density (CSMD) estimated from early JWST data is higher than that predicted by ΛCDM
33
+ within z ∈ [7, 11]. Ref.[16] points out that dynamical dark energy (DDE) can explain this anomalous signal and the
34
+ corresponding constraint on DDE is displayed. Subsequently, if the nature of dark matter (DM) is fuzzy, this high
35
+ SMD can be recovered [17]. Furthermore, Ref.[18] discusses under which circumstances primordial non-Gaussianity
36
+ can act as a solution.
37
+ Since these high redshift galaxy observations from JWST have important implications on cosmology and astro-
38
+ physics, we attempt to probe whether early JWST data indicates any possible signal of new physics. Specifically, we
39
+ study three classes of beyond ΛCDM cosmological models, i.e., DM-baryon interaction (DMBI), modified gravity (MG)
40
+ and DDE. In addition, we consider the case of the extended halo mass function (HMF). We find that Within current
41
+ cosmological constraints from Planck-2018 CMB obervations, these three models all fail to explain this large tension.
42
+ A possibly successful scenario to escape from cosmological constraints is the extended Press-Schechter formalism.
43
+ This study is outlined in the following manner. In the next section, we introduce the basic formula of CSMD. In
44
+ Section III, we review briefly the alternative cosmological models and extended Press-Schechter HMF. In Section IV,
45
+ numerical results are displayed. The discussions and conclusions are presented in the final section.
46
+ II.
47
+ BASIC FORMULA
48
+ As shown in Ref.[10], the CSMD from early JWST data has a large excess relative to that predicted by ΛCDM.
49
+ To explain this excess, we shall briefly introduce the basic formula of the cumulative SMD. The HMF for a given
50
+ ∗Electronic address: [email protected]
51
+ arXiv:2301.00347v1 [astro-ph.CO] 1 Jan 2023
52
+
53
+ 2
54
+ cosmological model reads as
55
+ dn
56
+ dM = F(ν) ρm
57
+ M 2
58
+ ����
59
+ d ln σ
60
+ d ln M
61
+ ���� ,
62
+ (1)
63
+ where the function F(ν) for the Press-Schechter HMF [19] is expressed as
64
+ F(ν) =
65
+
66
+ 2
67
+ π νe− ν2
68
+ 2 ,
69
+ (2)
70
+ and ρm denotes the average background matter density, M the halo mass, σ the variance of smoothed linear matter
71
+ density field and reads as
72
+ σ2(R) =
73
+ 1
74
+ 2π2
75
+ � ∞
76
+ 0
77
+ k2P(k)W 2(kR)dk,
78
+ (3)
79
+ where k is the comoving wavenumber, P(k) the matter power spectrum, W(kR) = 3(sin kR − kR cos kR)/(kR)3 the
80
+ Fourier transformation of a spherical top-hat filter with radius R = [3M/(4π¯ρ0)]1/3, ν = δc/[D(z) σ] [20] (δc = 1.686
81
+ is the critical collapsed density) and D(z) = g(z)/[g(0)(1 + z)] the linear growth factor for a specific cosmological
82
+ model, where g(z) for ΛCDM reads as
83
+ g(z) = 5
84
+ 2Ωm(z)
85
+
86
+ Ωm(z)
87
+ 4
88
+ 7 − ΩΛ(z) +
89
+
90
+ 1 + Ωm(z)
91
+ 2
92
+ � �
93
+ 1 + ΩΛ(z)
94
+ 70
95
+ ��−1
96
+ ,
97
+ (4)
98
+ where Ωm(z) and ΩΛ(z) are energy densities of matter and dark energy (DE) at a given redshift, respectively.
99
+ An effective quantity to study the validity of the ΛCDM model is the CSMD ρ⋆, which can be characterized by a
100
+ fraction of baryon mass contained within a given DM halo above a certain mass scale M⋆ and reads as
101
+ ρ⋆(> M⋆, z) = ϵfb
102
+ � z2
103
+ z1
104
+ � ∞
105
+ M⋆
106
+ ϵfb
107
+ dn
108
+ dM MdM dV
109
+ dz
110
+ dz
111
+ V (z1, z2),
112
+ (5)
113
+ where ϵ is the star formation efficiency, fb the baryon fraction and V (z1, z2) the comoving volume in the redshift range
114
+ z ∈ [z1, z2].
115
+ III.
116
+ ALTERNATIVE MODELS
117
+ A.
118
+ Dark matter-baryon interaction
119
+ Up to now, the standard cosmological paradigm indicates that DM is cold, collisionless and only participates in
120
+ gravitational interactions [9]. In light of the lack of experimental detections of DM and emergent cosmological tensions
121
+ in recent years, the scenario beyond the standard DM assumption becomes more and more attractive. An interesting
122
+ category is interactions between DM and the Standard Model particles such as baryons, photons and neutrinos. In
123
+ this study, we consider the case of DMBI.
124
+ The interaction between DM and baryons produces a momentum exchange proportional to momentum transfer
125
+ cross section, which can be shown as
126
+ σT =
127
+
128
+ (1 − cos θ)dΩ d¯σ
129
+ dΩ,
130
+ (6)
131
+ In the weakly coupled theory, σT can just depend on even powers of DM-baryon relative velocity v and, in general, it is
132
+ a power law function of v. Here we adopt σT = σDM−bvnb and denote the DMBI cross section as σDM−b. Specifically,
133
+ we study the mini-charged DM (DM particle with a fractional electric charge) corresponding to the case of nb = −4,
134
+ which has been used to explain the anomalous 21 cm signal from EDGES [21].
135
+ For this model, we introduce two basic assumptions: (i) DM and baryons obey the Maxwell velocity distribution; (ii)
136
+ both species are non-relativistic. As a consequence, the Euler equation of DM can obtain an extra term ΓDM−b(θb −
137
+ θDM), where ΓDM−b is the conformal DM-baryon momentum exchange rate, and θDM and θb represent the velocities
138
+ of DM and baryons, respectively. At leading order, ΓDM−b is expressed in terms of DM bulk velocity and reads as
139
+ [22]
140
+ ΓDM−b = aρbfHeσDM−bc−4
141
+ mDM + mb
142
+ � TDM
143
+ mDM
144
+ + Tb
145
+ mb
146
+ + V 2
147
+ RMS
148
+ 3
149
+ �−1.5
150
+ ,
151
+ (7)
152
+
153
+ 3
154
+ where a is the scale factor, ρb the average baryon energy density, fHe ≃ 0.76, c−4 = 0.27 the integration constant
155
+ (see [22, 23] for details), and Ti and mi denote the temperature and average mass of species i, respectively. The bulk
156
+ velocity dispersion can be shown as [24]
157
+ V 2
158
+ RMS =
159
+
160
+
161
+
162
+ 10−8,
163
+ z > 103
164
+ (1 + z)2
165
+ 10
166
+ ,
167
+ z ≤ 103 .
168
+ (8)
169
+ The interaction between DM and baryons can produce the energy and momentum exchange. It is clear that DMBI
170
+ reduces to ΛCDM when σDM−b = 0. There is a possibility that DMBI can increase the baryon fraction and conse-
171
+ quently give a large star formation efficiency. This indicates that DMBI can act as a potential solution to the recent
172
+ puzzle from JWST data.
173
+ B.
174
+ Modified gravity
175
+ Since general relativity (GR) can not explain current cosmic expansion in the absence of cosmological constant, the
176
+ modifications in the gravity sector on cosmic scales has inspired a broad interest in order to describe this anomalous
177
+ phenomenon. Here we shall consider the simplest extension to GR, f(R) gravity, where the modification is a function
178
+ of Ricci scalar R. f(R) gravity was firstly introduced by Buchdahl [25] in 1970 and more detailed information can be
179
+ found in recent reviews [26, 27]. Its action is written as
180
+ S =
181
+
182
+ d4x√−g
183
+ �f(R)
184
+ 2
185
+ + Lm
186
+
187
+ ,
188
+ (9)
189
+ where Lm and g denote the matter Lagrangian and the trace of a given metric, respectively.
190
+ For the late-time universe, a viable f(R) gravity scenario should explain the cosmic expansion, pass the local
191
+ gravity test and satisfy the stability conditions. To investigate whether MG can explain the high redshift galaxy
192
+ data from JWST, in this study, we consider the so-called Hu-Sawicki f(R) model (hereafter HS model) [28], which is
193
+ characterized by
194
+ f(R) = R −
195
+ 2ΛR¯n
196
+ R¯n + µ2¯n ,
197
+ (10)
198
+ where ¯n and µ are two free parameters characterizing this model. By taking R ≫ µ2, the approximate f(R) function
199
+ can be expressed as
200
+ f(R) = R − 2Λ − fR0
201
+ ¯n
202
+ R¯n+1
203
+ 0
204
+ R¯n ,
205
+ (11)
206
+ where R0 is the present-day value of Ricci scalar and fR0 = −2Λµ2/R2
207
+ 0. Note that HS f(R) gravity reduces to ΛCDM
208
+ when fR0 = 0.
209
+ An intriguing question is whether recent JWST anomaly is a signal of beyond GR. We will carefully analyze this
210
+ possibility in this study.
211
+ C.
212
+ Dynamical dark energy
213
+ Although Ref.[16] has claimed that DDE can explain the large CSMD from JWST, we think their method is
214
+ inappropriate and consequently their result maybe incorrect. We need to reanalyze the case of DDE.
215
+ As is well known, the equation of state (EoS) of DE w = −1 in the standard cosmological model. However, starting
216
+ from observations, the doubt about the correctness of ΛCDM stimulates the community to explore whether DE is
217
+ dynamical over time or not. In general, one depicts the DDE model by a simple Taylor expansion of DE EoS, i.e.,
218
+ ω(a) = ω0 + (1 − a)ωa [29, 30], where ωa characterizes the time evolution of DE EoS. The dimensionless Hubble
219
+ parameter is expressed as
220
+ EDDE(z) =
221
+
222
+ Ωm(1 + z)3 + (1 − Ωm)(1 + z)3(1+ω0+ωa)e
223
+ −3ωaz
224
+ 1+z
225
+ � 1
226
+ 2
227
+ .
228
+ (12)
229
+ Note that this model is a two-parameter extension to ΛCDM and it reduces to ΛCDM when ω0 = −1 and ωa = 0.
230
+
231
+ 4
232
+ D.
233
+ Extended halo mass function
234
+ When applied into a complicated gravity system, the function of Press-Schechter HMF is limited, since it does
235
+ not consider the nonlinear environmental effects. To overcome this shortcoming, the extended Press-Schechter (EPS)
236
+ HMF is proposed in Ref.[31] and reads as
237
+ dn(M1, z|M2, δ2)
238
+ dM1
239
+ = M2
240
+ M1
241
+ fm(S1, δ1|S2, δ2)
242
+ ����
243
+ dS1
244
+ dM1
245
+ ���� ,
246
+ (13)
247
+ where the mass variance S1 = σ2(M1) and S2 = σ2(M2) (see Eq.(3)), and one can obtain the average number of
248
+ progenitors at time t1 in the mass range (M1, M1 + dM1) which by time t2 (t2 > t1) have merged to form a large halo
249
+ of mass M2. The multiplicity function fm is expressed as
250
+ fm(S1, δ1|S2, δ2) =
251
+ 1
252
+
253
+
254
+ δ1 − δ2
255
+ (S1 − S2)3/2 exp
256
+
257
+ − (δ1 − δ2)2
258
+ 2(S1 − S2)
259
+
260
+ dS1.
261
+ (14)
262
+ δ1 and δ2 are, respectively, the linear overdensities in spherical regions of masses M1 and M2. To study the environ-
263
+ mental impacts on the high redshift HMF, we choose M2 as a present-day halo corresponding to current overdensity
264
+ δ2. To compute δ2, one should transform the nonlinear overdensity δnl at redshift z in Eulerian space into the linear
265
+ overdensity in Lagrangian space. The corresponding analytic fitting formula based on spherical collapse model is
266
+ [32, 33]
267
+ δ2(δnl, z) =
268
+ δ1
269
+ 1.68647
270
+
271
+ 1.68647 −
272
+ 1.35
273
+ (1 + δnl)2/3 −
274
+ 1.12431
275
+ (1 + δnl)1/2 +
276
+ 0.78785
277
+ (1 + δnl)0.58661
278
+
279
+ .
280
+ (15)
281
+ Since there is a possibility that the excessively high CSMD from JWST is caused by nonlinear environmental effect,
282
+ we attempt to explain it using the EPS formalism.
283
+ IV.
284
+ METHODS AND RESULTS
285
+ At first, we employ the best fits from current cosmological constraints as our baseline values for four models. Since
286
+ we hope that the following calculations can be permitted by present-day observations, our discussions and results
287
+ will mainly focus on the allowed parameter space. Then, for different models, we use different Boltzmann codes to
288
+ calculate their background evolution, growth factors and matter power spectrum at different redshifts. Specifically,
289
+ we take CLASS [22, 23, 34] for DMBI and use modified CAMB [35, 36] for f(R) gravity, DDE and EPS scenarios. Note
290
+ that ΛCDM is adopted in the EPS scenario. Subsequently, we compute the HMF at different redshifts for the above
291
+ four models. Finally, we work out the maximal CSMD for each model according to the permitted parameter space,
292
+ and check whether these scenarios are consistent with the latest JWST data. Notice that Eq.(4) is only used in the
293
+ EPS model and the growth factors of the other three models are obtained from the corresponding software package.
294
+ Our numerical analysis results are presented in Figs.1-3. At first, we display the CSMD of ΛCDM in the redshift
295
+ range z ∈ [7, 9] and see its performance. In general, the SFE ϵ is about 10% according to current observational
296
+ constraints [11]. Nonetheless, one can see that in the top left panel of Fig.1, 10% is nowhere near enough to reach
297
+ the lower bounds of JWST data points in ΛCDM. One needs the star formation rate in galaxies to be at least 50%
298
+ in order to explain the inconsistency. In the meanwhile, one can easily find that ϵ = 0.8 can successfully explain two
299
+ data points but 100% SFE can not. Except for ΛCDM, we all calculate the maximal CSMD in the other models, i.e.,
300
+ assuming ϵ = 1.
301
+ In the second place, we make a trial to explore whether alternative cosmological models can alleviate even solve
302
+ the tension between JWST and Planck CMB observations. In the DMBI case, we attempt to acquire a higher baryon
303
+ fraction by the coupling between DM and baryons, and consequently explain this discrepancy occurred in ΛCDM.
304
+ However, we find that varying coupling strength σDM−b hardly affects the CSMD, and only the variation of interaction
305
+ DM fraction Ωidm affects significantly the CSMD. When assuming the DM particle mass mDM = 100 GeV, the cross
306
+ section σDM−b = 10−42 cm2 and choosing the fraction Ωidm = 0.01, 0.03 and 0.05, this tension can be efficiently
307
+ relieved but it seems that this model is difficult to explain both data points. However, if considering the current
308
+ cosmological constraint that gives a very small Ωidm [24], DMBI still behaves like ΛCDM and can not resolve this
309
+ discrepancy. We have also studied the impacts of mDM and find different DM particle masses also can not explain
310
+ JWST data.
311
+ In f(R) gravity, we find small fR0 such as 0.1 and 1 can not expalin the anomaly but a very large value fR0 = 10
312
+ can do. This implies that one needs a large deviation from GR to be responsible for JWST data. Unfortunately, the
313
+
314
+ 5
315
+ 109
316
+ 1010
317
+ 1011
318
+ M
319
+ 102
320
+ 103
321
+ 104
322
+ 105
323
+ 106
324
+ 107
325
+ 108
326
+ ( > M )[M
327
+ Mpc
328
+ 3]
329
+ CDM, = 1
330
+ CDM, = 0.8
331
+ CDM, = 0.5
332
+ CDM, = 0.1
333
+ 109
334
+ 1010
335
+ 1011
336
+ M
337
+ 103
338
+ 104
339
+ 105
340
+ 106
341
+ 107
342
+ 108
343
+ ( > M )[M
344
+ Mpc
345
+ 3]
346
+ CDM
347
+ idm=0.01, mDM=100 GeV
348
+ idm=0.03, mDM=100 GeV
349
+ idm=0.05, mDM=100 GeV
350
+ 109
351
+ 1010
352
+ 1011
353
+ M
354
+ 103
355
+ 104
356
+ 105
357
+ 106
358
+ 107
359
+ 108
360
+ ( > M )[M
361
+ Mpc
362
+ 3]
363
+ CDM
364
+ fR0 = 0.1
365
+ fR0 = 1
366
+ fR0 = 10
367
+ 109
368
+ 1010
369
+ 1011
370
+ M
371
+ 102
372
+ 103
373
+ 104
374
+ 105
375
+ 106
376
+ 107
377
+ 108
378
+ ( > M )[M
379
+ Mpc
380
+ 3]
381
+ nl = 1
382
+ nl = 0.7
383
+ nl = 0.6
384
+ nl = 0.5
385
+ nl = 0.4
386
+ nl = 0.1
387
+ CDM
388
+ FIG. 1: The CSMDs for the ΛCDM, DMBI, f(R) gravity and EPS models are shown from top to bottom and left to right,
389
+ respectively. Note that for ΛCDM, we compute the CSMDs in the redshift range z ∈ [7, 9] by choosing different values of the
390
+ SFE ϵ. For the other models, we calculate the CSMDs in the redshift range z ∈ [9, 11] when ϵ = 1.
391
+ latest cosmological constraint gives log10 fR0 < −6.32 at the 2 σ confidence level [37], which is much smaller than 10.
392
+ Therefore, similar to DMBI, f(R) gravity also fails to alleviate this tension. Interestingly, this gives us a hint that, if
393
+ two galaxies observed by JWST are located in the low density region of the universe where MG effect is very large,
394
+ the data can be appropriately explained.
395
+ Furthermore, we are interested in whether the nature an simple extension to ΛCDM, DDE, can explain the incon-
396
+ sistency. As mentioned above, Ref.[16] claimed that JWST data can clearly constrain DDE. However, within current
397
+ constraining precision, we query this conclusion. To ensure the validity of our conclusion, we constrain ΛCDM and
398
+ DDE models using the Planck-2018 CMB temperature and polarization data (see Fig.2), and then obtain the best
399
+ fitting values of parameters of these two models. One can easily find the constrained values of model parameters
400
+ of ΛCDM in Ref.[5]. For DDE, we obtain current baryon and CDM densities Ωbh2 = 0.0225 and Ωch2 = 0.1184,
401
+ the ratio between angular diameter distance and sound horizon at the redshift of last scattering θMC = 1.04109,
402
+ the optical depth due to the reionization τ = 0.06, the amplitude and spectral index of primordial power spectrum
403
+ As = 2.114 × 10−9 and ns = 0.9698, and two DE EoS parameters ω0 = −0.38 and ωa = −4.8. Same as DMBI
404
+ and f(R) gravity models, we use the same method to work out the CSMD of DDE, and find that the variation of
405
+ the CSMD is largely dominated by the values of six basic parameters Ωbh2, Ωch2, θMC, τ, As and ns. Although
406
+ ω0 and ωa is loosely constrained by CMB data (constrained ω0-ωa parameter space is large), different values of ω0
407
+ and ωa hardly affect the CSMD. For instance, in the left panel of Fig.3, ω0 = −0.38 and ωa = −4.8 plus the ΛCDM
408
+ and DDE best fits gives completely different CSMDs. Choosing the ΛCDM best fit, (ω0, ωa) = (−0.38, −4.8) and
409
+
410
+ 6
411
+ 0.0220
412
+ 0.0224
413
+ 0.0228
414
+ bh2
415
+ 0.7
416
+ 0.8
417
+ 0.9
418
+ 1.0
419
+ 1.1
420
+ 8
421
+ 0.2
422
+ 0.3
423
+ 0.4
424
+ 0.5
425
+ m
426
+ 50
427
+ 60
428
+ 70
429
+ 80
430
+ 90
431
+ H0
432
+ 8
433
+ 6
434
+ 4
435
+ 2
436
+ 0
437
+ 2
438
+ 4
439
+ wa
440
+ 2
441
+ 1
442
+ 0
443
+ w
444
+ 3.00
445
+ 3.05
446
+ 3.10
447
+ ln(1010As)
448
+ 0.96
449
+ 0.97
450
+ 0.98
451
+ ns
452
+ 0.02
453
+ 0.04
454
+ 0.06
455
+ 0.08
456
+ 0.10
457
+ 1.0400
458
+ 1.0405
459
+ 1.0410
460
+ 1.0415
461
+ 1.0420
462
+ 100
463
+ MC
464
+ 0.114
465
+ 0.116
466
+ 0.118
467
+ 0.120
468
+ 0.122
469
+ 0.124
470
+ ch2
471
+ 0.114
472
+ 0.117
473
+ 0.120
474
+ 0.123
475
+ ch2
476
+ 1.040
477
+ 1.041
478
+ 1.042
479
+ 100
480
+ MC
481
+ 0.02
482
+ 0.04
483
+ 0.06
484
+ 0.08
485
+ 0.10
486
+ 0.96
487
+ 0.97
488
+ 0.98
489
+ ns
490
+ 3.00
491
+ 3.05
492
+ 3.10
493
+ ln(1010As)
494
+ 2
495
+ 1
496
+ 0
497
+ w
498
+ 8
499
+ 4
500
+ 0
501
+ 4
502
+ wa
503
+ 50
504
+ 60
505
+ 70
506
+ 80
507
+ 90
508
+ H0
509
+ 0.2
510
+ 0.3
511
+ 0.4
512
+ 0.5
513
+ m
514
+ 0.7
515
+ 0.8
516
+ 0.9
517
+ 1.0
518
+ 1.1
519
+ 8
520
+ DDE
521
+ CDM
522
+ FIG. 2: The marginalized posterior probability distributions of the ΛCDM and DDE models from the Planck-2018 CMB
523
+ constraints are shown.
524
+ (ω0, ωa) = (−1, −1) gives very similar results in the logarithmic space. In the medium and right panels of Fig.3, we
525
+ verifies that taking same best fits of ΛCDM and DDE, respectively, choosing different DE EoS parameter pair just
526
+ produces very limited differences. After scanning the DDE parameter space, we find clearly that DDE also can not
527
+ explain this tension, but its best fit can help increase the value of CSMD and become closer to JWST data points (see
528
+ the left panel of Fig.3). The reason that the result in Ref.[16] is different from ours is that they do not implement an
529
+ appropriate cosmological constraint based on the Planck CMB data.
530
+ The result from f(R) gravity prompts us to study the environmental effect of JWST galaxies on the CSMD. The
531
+ most straightforward method is replacing the Press-Schechter HMF with the EPS formalism in the framework of
532
+ ΛCDM, where the sole parameter δnl characterizes the nonlinear environmental effect of a high redshift halo. In the
533
+ bottom right panel, we calculate the maximal CSMDs in the redshift range z ∈ [9, 11] for the EPS model. We find
534
+ that neither overlarge (δnl = 1) nor too small (δnl = 0.1) explain JWST observations and that the larger δnl is, the
535
+ larger the CSMD is. Since the total sky area covered by the JWST initial observation is large enough (∼ 40 armin2)
536
+
537
+ 7
538
+ 109
539
+ 1010
540
+ 1011
541
+ M
542
+ 103
543
+ 104
544
+ 105
545
+ 106
546
+ 107
547
+ 108
548
+ ( > M )[M
549
+ Mpc
550
+ 3]
551
+ CDM
552
+ w0=-0.38, wa=-4.8 + DDE best fit
553
+ w0=-0.38, wa=-4.8 + CDM best fit
554
+ w0=-1, wa=-1 + CDM best fit
555
+ 3.60
556
+ 3.62
557
+ 3.64
558
+ 3.66
559
+ 3.68
560
+ 3.70
561
+ M
562
+ 1e10
563
+ 12000
564
+ 12200
565
+ 12400
566
+ 12600
567
+ 12800
568
+ 13000
569
+ ( > M )[M
570
+ Mpc
571
+ 3]
572
+ DDE w0=-0.38, wa=-4.8
573
+ DDE w0=-1, wa=-5
574
+ DDE w0=-1, wa=-1
575
+ DDE w0=-1, wa=0
576
+ 3.60
577
+ 3.62
578
+ 3.64
579
+ 3.66
580
+ 3.68
581
+ 3.70
582
+ M
583
+ 1e10
584
+ 42000
585
+ 42500
586
+ 43000
587
+ 43500
588
+ 44000
589
+ 44500
590
+ 45000
591
+ ( > M )[M
592
+ Mpc
593
+ 3]
594
+ DDE w0=-0.38, wa=-4.8
595
+ DDE w0=-1, wa=-5
596
+ DDE w0=-1, wa=-1
597
+ DDE w0=-1, wa=0
598
+ FIG. 3: The CSMDs of the DDE model computed at in the redshift range z ∈ [9, 11] are shown when assuming ϵ = 1. Left:
599
+ Different combinations of parameter values and best fits from constraints, respectively. Medium: Only the ΛCDM best fit;
600
+ Right: Only the DDE best fit.
601
+ [10], we can not rule out this possibly local environmental effect. However, unfortunately, there is no δnl passing two
602
+ data points simultaneously.
603
+ V.
604
+ DISCUSSIONS AND CONCLUSIONS
605
+ Recently, the early data release of JWST reveals the possible existence of high redshift galaxies. What is interesting
606
+ is these galaxies in the redshift range z ∈ [7, 11] exhibit the overlarge star formation rate, which is incompatible with
607
+ the prediction of the standard cosmology. This may indicate that JWST data contain the signal of new physics.
608
+ In this study, we try to resolve this tension with alternative cosmological models including DMBI, f(R) gravity
609
+ and DDE. We find that in light of the precision of current cosmological constraint from Planck-2018 CMB data, these
610
+ models all fail to explain this large tension. Specifically, for DMBI, the coupling strength σDM−b between DM and
611
+ baryons hardly affects the CSMD. For f(R) gravity, the effect of varying fR0 on the CSMD is too small to relive the
612
+ tension. For DDE, although the constrained DE EoS parameter space is large, different parameter pair (ω0, ωa) just
613
+ produces very limited differences in the CSMD. Interestingly, a large interacting DM fraction and a large deviation
614
+ from Einstein’s gravity can both generate a large CSMD.
615
+ A possible scenario to escape from current cosmological constraints is the EPS formalism, where we consider the
616
+ local environmental effect on the CSMD. We find that an appropriate value of nonlinear environmental overdensity
617
+ of a high redshift halo can well explain the CSMD discrepancy. However, we do not find an EPS model that can
618
+ simultaneously explain two data points.
619
+ In the near future, JWST will bring more useful data to human beings, so that we can extract more physical
620
+ information to uncover the mysterious veil of nature.
621
+ Acknowledgments
622
+ DW warmly thanks Liang Gao, Jie Wang and Qi Guo for helpful discussions. We thank Hang Yang for letting us
623
+ notice the JWST related works. This study is supported by the National Nature Science Foundation of China under
624
+ Grants No.11988101 and No.11851301.
625
+ [1] A. G. Riess et al. [Supernova Search Team], “Observational evidence from supernovae for an accelerating universe and a
626
+ cosmological constant,” Astron. J. 116, 1009-1038 (1998).
627
+ [2] S. Perlmutter et al. [Supernova Cosmology Project], “Measurements of Ω and Λ from 42 high redshift supernovae,”
628
+ Astrophys. J. 517, 565-586 (1999).
629
+ [3] D. N. Spergel et al. [WMAP Collaboration], “First year Wilkinson Microwave Anisotropy Probe (WMAP) observations:
630
+ Determination of cosmological parameters,” Astrophys. J. Suppl. 148, 175-194 (2003).
631
+ [4] P. A. R. Ade et al. [Planck Collaboration], “Planck 2013 results. XVI. Cosmological parameters,” Astron. Astrophys. 571,
632
+ A16 (2014).
633
+
634
+ 8
635
+ [5] N. Aghanim et al. [Planck Collaboration], “Planck 2018 results. VI. Cosmological parameters,” Astron. Astrophys. 641,
636
+ A6 (2020) [erratum: Astron. Astrophys. 652, C4 (2021)].
637
+ [6] C. Blake and K. Glazebrook, “Probing dark energy using baryonic oscillations in the galaxy power spectrum as a cosmo-
638
+ logical ruler,” Astrophys. J. 594, 665-673 (2003).
639
+ [7] H. J. Seo and D. J. Eisenstein, “Probing dark energy with baryonic acoustic oscillations from future large galaxy redshift
640
+ surveys,” Astrophys. J. 598, 720 (2003).
641
+ [8] E. Di Valentino et al., “Snowmass2021 - Letter of interest cosmology intertwined I: Perspectives for the next decade,”
642
+ Astropart. Phys. 131, 102606 (2021).
643
+ [9] E. Abdalla et al., “Cosmology intertwined: A review of the particle physics, astrophysics, and cosmology associated with
644
+ the cosmological tensions and anomalies,” JHEAp 34, 49-211 (2022).
645
+ [10] I. Labbe et al., “A very early onset of massive galaxy formation,” [arXiv:2207.12446 [astro-ph.GA]].
646
+ [11] Y. Harikane et al., “A Comprehensive Study on Galaxies at z 9-16 Found in the Early JWST Data: UV Luminosity
647
+ Functions and Cosmic Star-Formation History at the Pre-Reionization Epoch,” [arXiv:2208.01612 [astro-ph.GA]].
648
+ [12] R. Naidu et al., “Two Remarkably Luminous Galaxy Candidates at z ≃ 10 − 12 Revealed by JWST,” [arXiv:2207.09434
649
+ [astro-ph.GA]].
650
+ [13] M. Castellano et al., “Early results from GLASS-JWST. III: Galaxy candidates at z ∼ 9 − 15,” [arXiv:2207.09436 [astro-
651
+ ph.GA]].
652
+ [14] M. Boylan-Kolchin, “Stress Testing ΛCDM with High-redshift Galaxy Candidates,” [arXiv:2208.01611 [astro-ph.CO]].
653
+ [15] C. Lovell et al., “Extreme Value Statistics of the Halo and Stellar Mass Distributions at High Redshift: are JWST Results
654
+ in Tension with ΛCDM?,” [arXiv:2208.10479 [astro-ph.GA]].
655
+ [16] N. Menci et al., “High-redshift Galaxies from Early JWST Observations: Constraints on Dark Energy Models,” Astrophys.
656
+ J. Lett. 938, no.1, L5 (2022).
657
+ [17] Y. Gong, B. Yue, Y. Cao and X. Chen, “Fuzzy Dark Matter as a Solution to the Stellar Mass Density of High-z Massive
658
+ Galaxies,” [arXiv:2209.13757 [astro-ph.CO]].
659
+ [18] M. Biagetti, G. Franciolini and A. Riotto, “The JWST High Redshift Observations and Primordial Non-Gaussianity,”
660
+ [arXiv:2210.04812 [astro-ph.CO]].
661
+ [19] W. H. Press and P. Schechter, “Formation of galaxies and clusters of galaxies by selfsimilar gravitational condensation,”
662
+ Astrophys. J. 187, 425-438 (1974).
663
+ [20] S. M. Carroll, W. H. Press and E. L. Turner, “The Cosmological constant,” Ann. Rev. Astron. Astrophys. 30, 499-542
664
+ (1992).
665
+ [21] R. Barkana, “Possible interaction between baryons and dark-matter particles revealed by the first stars,” Nature 555,
666
+ no.7694, 71-74 (2018).
667
+ [22] C. Dvorkin, K. Blum and M. Kamionkowski, “Constraining Dark Matter-Baryon Scattering with Linear Cosmology,” Phys.
668
+ Rev. D 89, no.2, 023519 (2014).
669
+ [23] W. L. Xu, C. Dvorkin and A. Chael, “Probing sub-GeV Dark Matter-Baryon Scattering with Cosmological Observables,”
670
+ Phys. Rev. D 97, no.10, 103530 (2018).
671
+ [24] N. Becker et al., “Cosmological constraints on multi-interacting dark matter,” JCAP 02, 019 (2021).
672
+ [25] H. A. Buchdahl, “Non-linear Lagrangians and cosmological theory,” Mon. Not. Roy. Astron. Soc. 150, 1 (1970).
673
+ [26] A. De Felice and S. Tsujikawa, “f(R) theories,” Living Rev. Rel. 13, 3 (2010).
674
+ [27] T. P. Sotiriou and V. Faraoni, “f(R) Theories Of Gravity,” Rev. Mod. Phys. 82, 451-497 (2010).
675
+ [28] W. Hu and I. Sawicki, “Models of f(R) Cosmic Acceleration that Evade Solar-System Tests,” Phys. Rev. D 76, 064004
676
+ (2007).
677
+ [29] M. Chevallier and D. Polarski, “Accelerating universes with scaling dark matter,” Int. J. Mod. Phys. D 10, 213-224 (2001).
678
+ [30] E. V. Linder, “Exploring the expansion history of the universe,” Phys. Rev. Lett. 90, 091301 (2003).
679
+ [31] J. R. Bond, S. Cole, G. Efstathiou and N. Kaiser, “Excursion set mass functions for hierarchical Gaussian fluctuations,”
680
+ Astrophys. J. 379, 440 (1991).
681
+ [32] H. J. Mo and S. D. M. White, “An Analytic model for the spatial clustering of dark matter halos,” Mon. Not. Roy. Astron.
682
+ Soc. 282, 347 (1996).
683
+ [33] R. K. Sheth and G. Tormen, “An Excursion Set Model of Hierarchical Clustering : Ellipsoidal Collapse and the Moving
684
+ Barrier,” Mon. Not. Roy. Astron. Soc. 329, 61 (2002).
685
+ [34] T. R. Slatyer and C. L. Wu, “Early-Universe constraints on dark matter-baryon scattering and their implications for a
686
+ global 21 cm signal,” Phys. Rev. D 98, no.2, 023013 (2018).
687
+ [35] A. Lewis, A. Challinor and A. Lasenby, “Efficient computation of CMB anisotropies in closed FRW models,” Astrophys.
688
+ J. 538, 473-476 (2000).
689
+ [36] A. Lewis, “Efficient sampling of fast and slow cosmological parameters,” Phys. Rev. D 87, no.10, 103529 (2013).
690
+ [37] D. Wang, “Pantheon+ constraints on dark energy and modified gravity: An evidence of dynamical dark energy,” Phys.
691
+ Rev. D 106, no.6, 6 (2022).
692
+